On killing irattach, I get the following (not yet posted to lkml). 
irattach is started as:

/usr/sbin/irattach /dev/ttyS1 -s


ksymoops 2.3.4 on i686 2.4.0-test12.  Options used
     -V (default)
     -k /proc/ksyms (default)
     -l /proc/modules (default)
     -o /lib/modules/2.4.0-test12/ (default)
     -m /usr/src/linux/System.map (default)

Warning: You did not tell me where to find symbol information.  I will
assume that the log matches the kernel and modules that are running
right now and I'll use the default options above for symbol resolution.
If the current kernel and/or modules do not match the log, you can get
more accurate output by telling me the kernel version and where to find
map, modules, ksyms etc.  ksymoops -h explains the options.

Nov 29 23:51:51 tigger kernel: Unable to handle kernel NULL pointer dereference at 
virtual address 00000008 
Nov 29 23:51:51 tigger kernel: c0113d9c 
Nov 29 23:51:51 tigger kernel: *pde = 00000000 
Nov 29 23:51:51 tigger kernel: Oops: 0000 
Nov 29 23:51:51 tigger kernel: CPU:    0 
Nov 29 23:51:51 tigger kernel: EIP:    0010:[exec_usermodehelper+668/872] 
Nov 29 23:51:51 tigger kernel: EIP:    0010:[<c0113d9c>] 
Using defaults from ksymoops -t elf32-i386 -a i386
Nov 29 23:51:51 tigger kernel: EFLAGS: 00010246 
Nov 29 23:51:51 tigger kernel: eax: c5cfe564   ebx: c702e000   ecx: c12fb3a0   edx: 
00000000 
Nov 29 23:51:51 tigger kernel: esi: 00000006   edi: 00000000   ebp: c12fb3a0   esp: 
c702ffb8 
Nov 29 23:51:51 tigger kernel: ds: 0018   es: 0018   ss: 0018 
Nov 29 23:51:51 tigger kernel: Process irattach (pid: 349, stackpage=c702f000) 
Nov 29 23:51:51 tigger kernel: Stack: 00000100 c6e7ddc0 c6e7ddf0 c6e4c000 c12fb3a0 
c12fb3a0 c12b7420 c12b7420  
Nov 29 23:51:51 tigger kernel:        c12b7420 c12b7420 c0114090 c0200f80 c6e7de80 
c6e7de6c c0108dd4 c6e7ddf0  
Nov 29 23:51:51 tigger kernel:        00000078 c6e7de80  
Nov 29 23:51:51 tigger kernel: Call Trace: [exec_helper+20/24] [kernel_thread+40/56]  
Nov 29 23:51:51 tigger kernel: Call Trace: [<c0114090>] [<c0108dd4>]  
Nov 29 23:51:51 tigger kernel: Code: 8b 4f 08 39 ca 7d 22 8b 47 14 83 3c 90 00 74 14 
89 f0 89 d3  

>>EIP; c0113d9c <exec_usermodehelper+29c/368>   <=====
Trace; c0114090 <exec_helper+14/18>
Trace; c0108dd4 <kernel_thread+28/38>
Code;  c0113d9c <exec_usermodehelper+29c/368>
00000000 <_EIP>:
Code;  c0113d9c <exec_usermodehelper+29c/368>   <=====
   0:   8b 4f 08                  mov    0x8(%edi),%ecx   <=====
Code;  c0113d9f <exec_usermodehelper+29f/368>
   3:   39 ca                     cmp    %ecx,%edx
Code;  c0113da1 <exec_usermodehelper+2a1/368>
   5:   7d 22                     jge    29 <_EIP+0x29> c0113dc5 
<exec_usermodehelper+2c5/368>
Code;  c0113da3 <exec_usermodehelper+2a3/368>
   7:   8b 47 14                  mov    0x14(%edi),%eax
Code;  c0113da6 <exec_usermodehelper+2a6/368>
   a:   83 3c 90 00               cmpl   $0x0,(%eax,%edx,4)
Code;  c0113daa <exec_usermodehelper+2aa/368>
   e:   74 14                     je     24 <_EIP+0x24> c0113dc0 
<exec_usermodehelper+2c0/368>
Code;  c0113dac <exec_usermodehelper+2ac/368>
  10:   89 f0                     mov    %esi,%eax
Code;  c0113dae <exec_usermodehelper+2ae/368>
  12:   89 d3                     mov    %edx,%ebx


1 warning issued.  Results may not be reliable.


_______________________________________________
Linux-IrDA mailing list  -  [EMAIL PROTECTED]
http://www.pasta.cs.UiT.No/mailman/listinfo/linux-irda

Reply via email to