On killing irattach, I get the following (not yet posted to lkml).
irattach is started as:
/usr/sbin/irattach /dev/ttyS1 -s
ksymoops 2.3.4 on i686 2.4.0-test12. Options used
-V (default)
-k /proc/ksyms (default)
-l /proc/modules (default)
-o /lib/modules/2.4.0-test12/ (default)
-m /usr/src/linux/System.map (default)
Warning: You did not tell me where to find symbol information. I will
assume that the log matches the kernel and modules that are running
right now and I'll use the default options above for symbol resolution.
If the current kernel and/or modules do not match the log, you can get
more accurate output by telling me the kernel version and where to find
map, modules, ksyms etc. ksymoops -h explains the options.
Nov 29 23:51:51 tigger kernel: Unable to handle kernel NULL pointer dereference at
virtual address 00000008
Nov 29 23:51:51 tigger kernel: c0113d9c
Nov 29 23:51:51 tigger kernel: *pde = 00000000
Nov 29 23:51:51 tigger kernel: Oops: 0000
Nov 29 23:51:51 tigger kernel: CPU: 0
Nov 29 23:51:51 tigger kernel: EIP: 0010:[exec_usermodehelper+668/872]
Nov 29 23:51:51 tigger kernel: EIP: 0010:[<c0113d9c>]
Using defaults from ksymoops -t elf32-i386 -a i386
Nov 29 23:51:51 tigger kernel: EFLAGS: 00010246
Nov 29 23:51:51 tigger kernel: eax: c5cfe564 ebx: c702e000 ecx: c12fb3a0 edx:
00000000
Nov 29 23:51:51 tigger kernel: esi: 00000006 edi: 00000000 ebp: c12fb3a0 esp:
c702ffb8
Nov 29 23:51:51 tigger kernel: ds: 0018 es: 0018 ss: 0018
Nov 29 23:51:51 tigger kernel: Process irattach (pid: 349, stackpage=c702f000)
Nov 29 23:51:51 tigger kernel: Stack: 00000100 c6e7ddc0 c6e7ddf0 c6e4c000 c12fb3a0
c12fb3a0 c12b7420 c12b7420
Nov 29 23:51:51 tigger kernel: c12b7420 c12b7420 c0114090 c0200f80 c6e7de80
c6e7de6c c0108dd4 c6e7ddf0
Nov 29 23:51:51 tigger kernel: 00000078 c6e7de80
Nov 29 23:51:51 tigger kernel: Call Trace: [exec_helper+20/24] [kernel_thread+40/56]
Nov 29 23:51:51 tigger kernel: Call Trace: [<c0114090>] [<c0108dd4>]
Nov 29 23:51:51 tigger kernel: Code: 8b 4f 08 39 ca 7d 22 8b 47 14 83 3c 90 00 74 14
89 f0 89 d3
>>EIP; c0113d9c <exec_usermodehelper+29c/368> <=====
Trace; c0114090 <exec_helper+14/18>
Trace; c0108dd4 <kernel_thread+28/38>
Code; c0113d9c <exec_usermodehelper+29c/368>
00000000 <_EIP>:
Code; c0113d9c <exec_usermodehelper+29c/368> <=====
0: 8b 4f 08 mov 0x8(%edi),%ecx <=====
Code; c0113d9f <exec_usermodehelper+29f/368>
3: 39 ca cmp %ecx,%edx
Code; c0113da1 <exec_usermodehelper+2a1/368>
5: 7d 22 jge 29 <_EIP+0x29> c0113dc5
<exec_usermodehelper+2c5/368>
Code; c0113da3 <exec_usermodehelper+2a3/368>
7: 8b 47 14 mov 0x14(%edi),%eax
Code; c0113da6 <exec_usermodehelper+2a6/368>
a: 83 3c 90 00 cmpl $0x0,(%eax,%edx,4)
Code; c0113daa <exec_usermodehelper+2aa/368>
e: 74 14 je 24 <_EIP+0x24> c0113dc0
<exec_usermodehelper+2c0/368>
Code; c0113dac <exec_usermodehelper+2ac/368>
10: 89 f0 mov %esi,%eax
Code; c0113dae <exec_usermodehelper+2ae/368>
12: 89 d3 mov %edx,%ebx
1 warning issued. Results may not be reliable.
_______________________________________________
Linux-IrDA mailing list - [EMAIL PROTECTED]
http://www.pasta.cs.UiT.No/mailman/listinfo/linux-irda