$ ./scripts/decode_stacktrace.sh /media/files/git/staging/arch/x86/boot/bzImage /media/files/git/staging < ~/files/report_rtsx/input.log [ 4.155887] usb_hcd_submit_urb+0x7c/0xb30 [ 4.155892] ? __kmalloc+0x16d/0x370 [ 4.155896] usb_start_wait_urb+0x8a/0x180 Server query failed: No such file or directory Server query failed: No such file or directory Server query failed: No such file or directory readelf: Error: Not an ELF file - it has the wrong magic bytes at the start readelf: Error: Not an ELF file - it has the wrong magic bytes at the start readelf: Error: Not an ELF file - it has the wrong magic bytes at the start WARNING! Modules path isn't set, but is needed to parse this symbol [ 4.155900] rtsx_usb_send_cmd+0x58/0xa0 rtsx_usb Server query failed: No such file or directory Server query failed: No such file or directory Server query failed: No such file or directory readelf: Error: Not an ELF file - it has the wrong magic bytes at the start readelf: Error: Not an ELF file - it has the wrong magic bytes at the start readelf: Error: Not an ELF file - it has the wrong magic bytes at the start WARNING! Modules path isn't set, but is needed to parse this symbol [ 4.155907] rtsx_usb_probe+0x140/0x3a0 rtsx_usb [ 4.155913] usb_probe_interface+0xe2/0x2b0 [ 4.155916] really_probe+0x1a1/0x370 [ 4.155920] __driver_probe_device+0xfc/0x170 [ 4.156140] driver_probe_device+0x1f/0x90 [ 4.156145] __driver_attach+0xbb/0x190 [ 4.156148] ? __device_attach_driver+0xe0/0xe0 [ 4.156151] bus_for_each_dev+0x83/0xc0 [ 4.156155] bus_add_driver+0x14e/0x1f0 [ 4.156158] driver_register+0x89/0xd0 [ 4.156161] usb_register_driver+0x84/0x120 [ 4.156165] ? 0xffffffffc0568000 [ 4.156168] do_one_initcall+0x59/0x220 [ 4.156172] do_init_module+0x4a/0x230 [ 4.156176] __do_sys_init_module+0x138/0x1b0 [ 4.156180] do_syscall_64+0x5b/0x80 [ 4.156184] ? ksys_read+0x6b/0xf0 [ 4.156187] ? syscall_exit_to_user_mode+0x22/0x40 [ 4.156190] ? do_syscall_64+0x67/0x80 [ 4.156192] ? exc_page_fault+0x70/0x170 [ 4.156196] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 4.156199] RIP: 0033:0x7fc63a11299e [ 4.156202] Code: 48 8b 0d fd a3 0e 00 f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 90 f3 0f 1e fa 49 89 ca b8 af 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d ca a3 0e 00 f7 d8 64 89 01 48 All code ======== 0: 48 8b 0d fd a3 0e 00 mov 0xea3fd(%rip),%rcx # 0xea404 7: f7 d8 neg %eax 9: 64 89 01 mov %eax,%fs:(%rcx) c: 48 83 c8 ff or $0xffffffffffffffff,%rax 10: c3 ret 11: 66 2e 0f 1f 84 00 00 cs nopw 0x0(%rax,%rax,1) 18: 00 00 00 1b: 90 nop 1c: f3 0f 1e fa endbr64 20: 49 89 ca mov %rcx,%r10 23: b8 af 00 00 00 mov $0xaf,%eax 28: 0f 05 syscall 2a:* 48 3d 01 f0 ff ff cmp $0xfffffffffffff001,%rax <-- trapping instruction 30: 73 01 jae 0x33 32: c3 ret 33: 48 8b 0d ca a3 0e 00 mov 0xea3ca(%rip),%rcx # 0xea404 3a: f7 d8 neg %eax 3c: 64 89 01 mov %eax,%fs:(%rcx) 3f: 48 rex.W Code starting with the faulting instruction =========================================== 0: 48 3d 01 f0 ff ff cmp $0xfffffffffffff001,%rax 6: 73 01 jae 0x9 8: c3 ret 9: 48 8b 0d ca a3 0e 00 mov 0xea3ca(%rip),%rcx # 0xea3da 10: f7 d8 neg %eax 12: 64 89 01 mov %eax,%fs:(%rcx) 15: 48 rex.W