Greetings, I get an oops kernel panic. I have general quesiton about reading the output. Any info about reading the following ksymoops output will be highly appreciated. Please note, I am not asking a hardware specific quesiton, or to solve my oops issue, but how to read this output, and track it back to the src code ********************************************************************** root@172.20.1.151:~/sandeep# ksymoops -m /System.map -v /vmlinux out ksymoops 2.4.3 on armv4b 2.4.17_mvl21-ixm1200. Options used -v /vmlinux (specified) -k /proc/ksyms (default) -l /proc/modules (default) -o /lib/modules/2.4.17_mvl21-ixm1200/ (default) -m /System.map (specified) Warning (compare_maps): ksyms_base symbol fp_printk not found in vmlinux. Ignorin g ksyms_base entry Warning (compare_maps): ksyms_base symbol fp_send_sig not found in vmlinux. Ignor ing ksyms_base entry Warning (compare_maps): ksyms_base symbol kern_fp_enter not found in vmlinux. Ign oring ksyms_base entry Unable to handle kernel paging request at virtual address 06070899 *pgd = 00000000, *pmd = 00000000 Internal error: Oops: 0 CPU: 0 pc : [<c006e2a8>] lr : [<c006f060>] Tainted: PF Using defaults from ksymoops -t elf32-bigarm -a arm sp : c03cbedc ip : c03cbeec fp : c03cbf24 r10: c7f0d001 r9 : 00000009 r8 : c03ca000 Warning (Oops_set_i370_regs): garbage 'r9 : 00000009 r8 : c03ca000' at end of i37 0 register line ignored r7 : c03cbf58 r6 : 06070809 r5 : c7f0d000 r4 : 00000000 r3 : c03ca000 r2 : c03ce420 r1 : 00000001 r0 : 06070809 Flags: nZCv IRQs on FIQs on Mode SVC_32 Segment user Control: C002D1FF Table: C002D1FF DAC: 00000015 Process init (pid: 1, stackpage=c03cb000) Stack: (0xc03cbecc to 0xc03cc000) bec0: c006f060 c006e2a8 60000013 ffffffff c03cbf24 bee0: c03cbeec c006f060 c006e2ac c00736fc c03ca000 c015ae40 0000e2e4 00000000 bf00: c7f0d000 c03cbf58 00000009 c0037b64 c03ca000 401389e4 c03cbf34 c03cbf28 bf20: c006f0a0 c006e74c c03cbf54 c03cbf38 c006f61c c006f08c c03cbf58 bffff8c8 bf40: bffff7f0 000000c3 c03cbf8c c03cbf58 c006b9b8 c006f5cc c03ce420 c037b2e0 bf60: 00016604 c03cbf8c c03cbf74 00000009 00000001 bffffbb0 bffff8c8 bffffbac bf80: 00000000 c03cbf90 c00379e0 c006b9a0 bffffbb0 c003e070 0000e2e4 bffff7f0 bfa0: 4013e890 0000182c bffffbb0 bffff8c8 bffffbac bffff7f0 00000003 0000e2e4 bfc0: 401389e4 bffff8b8 bffff8bc bffff7ec 0000c5e8 400df710 60000010 0000e2e4 bfe0: 00008000 c016f9a0 c014fbdc c014fbd0 00000000 c03cc000 c0038dc4 c0037244 Backtrace: Function entered at [<c006e740>] from [<c006f0a0>] Function entered at [<c006f080>] from [<c006f61c>] Function entered at [<c006f5c0>] from [<c006b9b8>] r7 = 000000C3 r6 = BFFFF7F0 r5 = BFFFF8C8 r4 = C03CBF58 Function entered at [<c006b994>] from [<c00379e0>] r6 = BFFFFBAC r5 = BFFFF8C8 r4 = BFFFFBB0 Code: e1a0c00d e92dd800 (e5903090) e24cb004 e3530000 >>PC; c006e2a8 <permission+8/38> <===== >>r10; c7f0d000 <_end+7d99c24/8690c24> Trace; c006e740 <link_path_walk+0/940> Trace; c006f0a0 <path_walk+20/24> Trace; c006f080 <path_walk+0/24> Trace; c006f61c <__user_walk+5c/7c> Trace; c006f5c0 <__user_walk+0/7c> Trace; c006b9b8 <sys_stat64+24/8c> Trace; c006b994 <sys_stat64+0/8c> Trace; c00379e0 <ret_fast_syscall+0/38> Code; c006e2a0 <permission+0/38> 00000000 <_PC>: Code; c006e2a0 <permission+0/38> 0: e1a0c00d mov ip, sp Code; c006e2a4 <permission+4/38> 4: e92dd800 stmdb sp!, {fp, ip, lr, pc} Code; c006e2a8 <permission+8/38> <===== 8: e5903090 ldr r3, [r0, #144] <===== Code; c006e2ac <permission+c/38> c: e24cb004 sub fp, ip, #4 ; 0x4 Code; c006e2b0 <permission+10/38> 10: e3530000 cmp r3, #0 ; 0x0 Kernel panic: Attempted to kill init! 4 warnings issued. Results may not be reliable. root@172.20.1.151:~/sandeep# ********************************************************************** One question specific to this output, why am I getting the warnings? How can I get rid of them? Thanks in advance, Ahmed. _________________________________________________________________ Chat with friends online, try MSN Messenger: http://messenger.msn.com -- Kernelnewbies: Help each other learn about the Linux kernel. Archive: http://mail.nl.linux.org/kernelnewbies/ FAQ: http://kernelnewbies.org/faq/