Here's an oops I got repeatedly trying to run 2.3.99-pre8. Reverted to pre7 for now. (Please do NOT Cc me when replying to the list.) Unable to handle kernel NULL pointer dereference at virtual address 00000034 printing eip: c014f4e1 *pde = 00000000 Oops: 0000 CPU: 0 EIP: 0010:[<c014f4e1>] EFLAGS: 00010202 eax: 00000000 ebx: 00000000 ecx: 00000001 edx: c0db5f54 esi: ffff8180 edi: 00000004 ebp: c0db5f24 esp: c0db5ee8 ds: 0018 es: 0018 ss: 0018 Process wdm (pid: 409, stackpage=c0db5000) Stack: 00000000 c015021a 00000000 00000001 c0db5f54 ffff8180 c0b0cee0 bfffeb2c 00000001 c0db5f2c 0000000b c0133c98 ffffff86 00005f58 c0b64240 00000000 00000000 00000000 00000000 c0129f44 c0b0cee0 c0db5f54 c0b64240 ffffffff Call Trace: [<c015021a>] [<c0133c98>] [<c0129f44>] [<c0134a0d>] [<c0129f9b>] [<c011d6b4>] [<c010a383>] Code: f6 43 34 40 74 09 31 c0 e9 01 01 00 00 89 f6 8b 53 48 85 d2 And the ksymoops output: ksymoops 2.3.4 on i586 2.4.0-test8. Options used -V (default) -k /proc/ksyms (default) -l /proc/modules (default) -o /lib/modules/2.4.0-test8/ (default) -m /boot/System.map-2.4.0-test8 (default) Warning: You did not tell me where to find symbol information. I will assume that the log matches the kernel and modules that are running right now and I'll use the default options above for symbol resolution. If the current kernel and/or modules do not match the log, you can get more accurate output by telling me the kernel version and where to find map, modules, ksyms etc. ksymoops -h explains the options. Unable to handle kernel NULL pointer dereference at virtual address 00000034 c014f4e1 *pde = 00000000 Oops: 0000 CPU: 0 EIP: 0010:[<c014f4e1>] Using defaults from ksymoops -t elf32-i386 -a i386 EFLAGS: 00010202 eax: 00000000 ebx: 00000000 ecx: 00000001 edx: c0db5f54 esi: ffff8180 edi: 00000004 ebp: c0db5f24 esp: c0db5ee8 ds: 0018 es: 0018 ss: 0018 Process wdm (pid: 409, stackpage=c0db5000) Stack: 00000000 c015021a 00000000 00000001 c0db5f54 ffff8180 c0b0cee0 bfffeb2c 00000001 c0db5f2c 0000000b c0133c98 ffffff86 00005f58 c0b64240 00000000 00000000 00000000 00000000 c0129f44 c0b0cee0 c0db5f54 c0b64240 ffffffff Call Trace: [<c015021a>] [<c0133c98>] [<c0129f44>] [<c0134a0d>] [<c0129f9b>] [<c011d6b4>] [<c010a383>] Code: f6 43 34 40 74 09 31 c0 e9 01 01 00 00 89 f6 8b 53 48 85 d2 >>EIP; c014f4e1 <check_idq+d/120> <===== Trace; c015021a <dquot_transfer+26a/490> Trace; c0133c98 <cached_lookup+10/54> Trace; c0129f44 <chown_common+100/124> Trace; c0134a0d <__user_walk+4d/58> Trace; c0129f9b <sys_chown+33/48> Trace; c011d6b4 <sys_chown16+34/38> Trace; c010a383 <system_call+33/40> Code; c014f4e1 <check_idq+d/120> 00000000 <_EIP>: Code; c014f4e1 <check_idq+d/120> <===== 0: f6 43 34 40 testb $0x40,0x34(%ebx) <===== Code; c014f4e5 <check_idq+11/120> 4: 74 09 je f <_EIP+0xf> c014f4f0 <check_idq+1c/120> Code; c014f4e7 <check_idq+13/120> 6: 31 c0 xor %eax,%eax Code; c014f4e9 <check_idq+15/120> 8: e9 01 01 00 00 jmp 10e <_EIP+0x10e> c014f5ef <check_idq+11b/120> Code; c014f4ee <check_idq+1a/120> d: 89 f6 mov %esi,%esi Code; c014f4f0 <check_idq+1c/120> f: 8b 53 48 mov 0x48(%ebx),%edx Code; c014f4f3 <check_idq+1f/120> 12: 85 d2 test %edx,%edx 1 warning issued. Results may not be reliable. -- Daniel Schepler "Please don't disillusion me. I [EMAIL PROTECTED] haven't had breakfast yet." -- Orson Scott Card - To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to [EMAIL PROTECTED] Please read the FAQ at http://www.tux.org/lkml/