>Is it just me, or don't kernel Oopses usually contain symbol data?

not until  the person with the oops  uses the ksymoops util.

save what you sent below in a text file, and compile (g++ ksymoops.cc)
/usr/src/linux/scripts/ksymoops.cc
then cat that text file | ksymoops.cc /boot/System.map

then send us the output.


sorry, this connection sucks so im gonna sign off without saying anything else
>>EIP:0010:[<00125918>]
>>
>>EFLAGS:00060286
>>
>>eax:64ff5030  ebx:00000307   ecx:03823f94  edx:00000603
>>
>>ds:0018  es:0018  fs:002b  gs:002b  ss:0018
>>
>>process e2fsck (pid:148, process nr:14, stackpage=03823000
>>
>>stack: 00000002  00020307  03823e94  03823d30  00000c03  00126179  00000307
>>       00024f04  00000400  00000002  03823e94  00000000  00000001  00129c4f
>>       00000307  00024f04  00000400  03ec1880  00000400  03acbac00  000c5da0
>>
>>call trace:
>>[<00126179>][<00129c4f>][<00126179>][<0018a7eb>][<0011cdb2>][00112f54>]
>>[<0012f1c>][<00112f54>][<00118983>][<0010abab>][<0012990c>][<00123c02>]
>>[<0010ac25>]
>>
>>Code: 39 38 75 24 66 39 58 04 75 1e 39 68 20 74 22 56 e8 db f9 ff
>>Segmentation fault
>>------------------------------------------------------------
>>[end black screen of death]
>---------------------------------------------------------------------------
>Send administrative requests to [EMAIL PROTECTED]
>
---------------------------------------------------------------------------
Send administrative requests to [EMAIL PROTECTED]

Reply via email to