Error (regular_file): read_ksyms stat /proc/ksyms failed
No modules in ksyms, skipping objects
No ksyms, skipping lsmod
Error (regular_file): read_system_map stat /boot/System.map-2.5.60-jak1
failed
Feb 11 22:25:05 tranquility kernel: c021b209
Feb 11 22:25:05 tranquility kernel: Oops: 0000
Feb 11 22:25:05 tranquility kernel: CPU: 0
Feb 11 22:25:05 tranquility kernel: EIP: 0060:[<c021b209>] Not
tainted
Using defaults from ksymoops -t elf32-i386 -a i386
Feb 11 22:25:05 tranquility kernel: EFLAGS: 00010246
Feb 11 22:25:05 tranquility kernel: eax: 00000000 ebx: 8172d550 ecx:
00000000 edx: 00000006
Feb 11 22:25:05 tranquility kernel: esi: 8172d550 edi: c12bbda8 ebp:
c12bbd50 esp: c12bbd4c
Feb 11 22:25:05 tranquility kernel: ds: 007b es: 007b ss: 0068
Feb 11 22:25:05 tranquility kernel: Stack: c12bbd7c c12bbd68 c0219d27
8172d550 c12bbd7c c12bbda8 8172d550 c12bbd98
Feb 11 22:25:05 tranquility kernel: c022a3aa 8172d550 c0236bba
c12bbda8 00010000 c04064ad c04064a4 0000005e
Feb 11 22:25:05 tranquility kernel: c12bbdac c12bbdac 8172d550
c12bbdc8 c023061a 8172d550 c12bbda8 00000000
Feb 11 22:25:05 tranquility kernel: Call Trace: [<c0219d27>]
[<c022a3aa>] [<c0236bba>] [<c023061a>] [<c02265fa>] [<c02309ee>]
[<c0230d48>
[<c0124b10>] [<c0124b10>] [<c0136ad0>] [<c010825d>]
Feb 11 22:25:05 tranquility kernel: Code: 80 3b aa 0f 44 c3 5b 5d c3 a1
b4 74 4c c0 eb f6 55 89 e5 8b
>>EIP; c021b209 <sha1_transform+1639/16e0> <=====
Trace; c0219d27 <sha1_transform+157/16e0>
Trace; c022a3aa <twofish_encrypt+9da/ae0>
Trace; c0236bba <zlib_inflate_flush+aa/188>
Trace; c023061a <aes_decrypt+bca/1680>
Trace; c02265fa <twofish_setkey+3b9a/6f70>
Trace; c02309ee <aes_decrypt+f9e/1680>
Trace; c0230d48 <aes_decrypt+12f8/1680>
Trace; c0124b10 <io_apic_set_pci_routing+270/2e0>
Trace; c0124b10 <io_apic_set_pci_routing+270/2e0>
Trace; c0136ad0 <register_proc_table+40/130>
Trace; c010825d <show_regs+14d/158>
Code; c021b209 <sha1_transform+1639/16e0>
00000000 <_EIP>:
Code; c021b209 <sha1_transform+1639/16e0> <=====
0: 80 3b aa cmpb $0xaa,(%ebx) <=====
Code; c021b20c <sha1_transform+163c/16e0>
3: 0f 44 c3 cmove %ebx,%eax
Code; c021b20f <sha1_transform+163f/16e0>
6: 5b pop %ebx
Code; c021b210 <sha1_transform+1640/16e0>
7: 5d pop %ebp
Code; c021b211 <sha1_transform+1641/16e0>
8: c3 ret
Code; c021b212 <sha1_transform+1642/16e0>
9: a1 b4 74 4c c0 mov 0xc04c74b4,%eax
Code; c021b217 <sha1_transform+1647/16e0>
e: eb f6 jmp 6 <_EIP+0x6>
Code; c021b219 <sha1_transform+1649/16e0>
10: 55 push %ebp
Code; c021b21a <sha1_transform+164a/16e0>
11: 89 e5 mov %esp,%ebp
Code; c021b21c <sha1_transform+164c/16e0>
13: 8b 00 mov (%eax),%eax
-- Jonathan Kline <klinej@msoe.edu> Milwaukee School of engineering - To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/