general protection: 0000
CPU: 0
EIP: 0010:[<0011b834>]
EFLAGS: 00010206
eax: 00000210 ebx: 00005000 ecx: 001df000 edx: 00201a88
esi: 003da000 edi: 004df4b0 ebp: 00001000 esp: 009f5f40
ds: 0018 es: 0018 fs: 002b gs: 002b ss: 0018
Process expireover (pid: 2405, process nr: 24, stackpage=009f5000)
Stack: 001e8b50 00000000 004df4b0 0011bc96 004df4b0 00005000 00000000 00c986f0
00001ff0 004df4b0 0805c010 00005000 00000000 00137d2c 003e2000 00000000
00000fed 00000000 00004000 00000001 00000003 0012183c 004df4b0 00c986f0
Call Trace: [<0011bc96>] [<00137d2c>] [<0012183c>] [<0010a519>]
Code: ff 89 d1 85 c9 74 15 ff 09 89 f0 5b 5e 5f c3 90 90 90 90 90
Here's the output of ksymoops:
Using `/System.map' to map addresses to symbols.
>>EIP: 11b834 <try_to_read_ahead+94/150>
Trace: 11bc96 <generic_file_read+2d6/440>
Trace: 137d2c <sock_getsockopt+1fc/220>
Trace: 12183c <sys_read+8c/b0>
Trace: 10a519 <system_call+59/a0>
-- Eric Dittman Texas Instruments - Component Test Facility dittman@skitzo.dseg.ti.com (214) 462-4292 Disclaimer: Not even my opinions. I found them by the side of the road.