ksymoops 2.3.4 on i686 2.4.0-test11. Options used -V (default) -k /proc/ksyms (default) -l /proc/modules (default) -o /lib/modules/2.4.0-test11/ (default) -m /boot/System.map-2.4.0-test11 (default) Warning: You did not tell me where to find symbol information. I will assume that the log matches the kernel and modules that are running right now and I'll use the default options above for symbol resolution. If the current kernel and/or modules do not match the log, you can get more accurate output by telling me the kernel version and where to find map, modules, ksyms etc. ksymoops -h explains the options. Error (regular_file): read_ksyms stat /proc/ksyms failed No modules in ksyms, skipping objects No ksyms, skipping lsmod connect: NMI Watchdog detected LOCKUP on CPU0, registers: CPU: 0 EIP: 0010:[] Using defaults from ksymoops -t elf32-i386 -a i386 EFLAGS: 00000082 eax: 00000000 ebx: c029e440 ecx: 00000000 edx: ffffffff esi: c026a000 edi: c010a3f0 ebp: c026bfdc esp: c026bfa8 ds: 0018 es: 0018 ss: 0018 Process swapper (pid: 0, stackpage=c026b000) Stack: c010a3f0 c026a000 c010a3f0 c026a000 c026a000 c010a3f0 0008e000 00000000 00080018 ffff0018 00000000 c026a000 c029e440 0008e000 c010a48e c026a000 0009b800 c0105000 c026cb06 00000003 c02a0760 c01001b0 Call Trace: [] [] [] [] [] [] Code: 80 3d 00 e4 29 c0 00 f3 90 7e f5 e9 3b 2c f1 ff 80 bb 74 06 >>EIP; c02065fc <===== Trace; c010a3f0 Trace; c010a3f0 Trace; c010a3f0 Trace; c010a48e Trace; c0105000 Trace; c01001b0 Code; c02065fc 00000000 <_EIP>: Code; c02065fc <===== 0: 80 3d 00 e4 29 c0 00 cmpb $0x0,0xc029e400 <===== Code; c0206603 7: f3 90 repz nop Code; c0206605 9: 7e f5 jle 0 <_EIP> Code; c0206607 b: e9 3b 2c f1 ff jmp fff12c4b <_EIP+0xfff12c4b> c0119247 Code; c020660c 10: 80 bb 74 06 00 00 00 cmpb $0x0,0x674(%ebx) CPU: 1 1 warning and 1 error issued. Results may not be reliable.