ksymoops 2.4.1 on i586 2.4.9. Options used -V (default) -k /proc/ksyms (default) -l /proc/modules (default) -o /lib/modules/2.4.9/ (default) -m /usr/src/linux/System.map (default) Warning: You did not tell me where to find symbol information. I will assume that the log matches the kernel and modules that are running right now and I'll use the default options above for symbol resolution. If the current kernel and/or modules do not match the log, you can get more accurate output by telling me the kernel version and where to find map, modules, ksyms etc. ksymoops -h explains the options. Error (regular_file): read_ksyms stat /proc/ksyms failed No modules in ksyms, skipping objects No ksyms, skipping lsmod kernel BUG at inode.c:682! invalid operand: 0000 CPU: 0 EIP: 0010:[] Using defaults from ksymoops -t elf32-i386 -a i386 EFLAGS: 00010282 eax: 0000001b ebx: c39c22c8 ecx: c113e000 edx: 00000000 esi: c39c22c0 edi: c39c24a8 ebp: c113ffa8 esp: c113ff80 ds: 0018 es: 0018 ss: 0018 Process kswapd (pid: 5, stackpage=c113f000) Stack: c0278686 c0278702 000002aa 00000006 000000c0 0000003f 00000000 00000008 c0c0c7c8 c39e5608 00000001 c013ebc4 00000002 c012665b 00000006 000000c0 00000006 000000c0 c113e000 c0275351 c113e239 0008e000 c0126721 000000c0 Call Trace: [] [] [] [] Code: 0f 0b 83 c4 0c 8b 53 04 8b 03 89 50 04 89 02 8b 53 fc 8b 43 >>EIP; c013eb2c <===== Trace; c013ebc4 Trace; c012665b Trace; c0126721 Trace; c0105448 Code; c013eb2c 00000000 <_EIP>: Code; c013eb2c <===== 0: 0f 0b ud2a <===== Code; c013eb2e 2: 83 c4 0c add $0xc,%esp Code; c013eb31 5: 8b 53 04 mov 0x4(%ebx),%edx Code; c013eb34 8: 8b 03 mov (%ebx),%eax Code; c013eb36 a: 89 50 04 mov %edx,0x4(%eax) Code; c013eb39 d: 89 02 mov %eax,(%edx) Code; c013eb3b f: 8b 53 fc mov 0xfffffffc(%ebx),%edx Code; c013eb3e 12: 8b 43 00 mov 0x0(%ebx),%eax kernel BUG at inode.c:682! invalid operand: 0000 CPU: 0 EIP: 0010:[] EFLAGS: 00010282 eax: 0000001b ebx: c39c22c8 ecx: c2a5e000 edx: c21875a0 esi: c39c22c0 edi: c39c24a8 ebp: c2a5fe9c esp: c2a5fe74 ds: 0018 es: 0018 ss: 0018 Process grep (pid: 3843, stackpage=c2a5f000) Stack: c0278686 c0278702 000002aa 00000006 000000d2 0000003f 00000000 00000000 c2a5fe94 c2a5fe94 00000001 c013ebc4 0000000a c012665b 00000006 000000d2 00000006 000000d2 c2a5e000 c02c60e8 00000000 00000010 c01267aa 000000d2 Call Trace: [] [] [] [] [] [] [] [] [] [] [] Code: 0f 0b 83 c4 0c 8b 53 04 8b 03 89 50 04 89 02 8b 53 fc 8b 43 >>EIP; c013eb2c <===== Trace; c013ebc4 Trace; c012665b Trace; c01267aa Trace; c0127390 <__alloc_pages+1cc/278> Trace; c01271c2 <_alloc_pages+16/18> Trace; c011fa18 Trace; c011fe3a Trace; c0120089 Trace; c011ffc0 Trace; c012c4b5 Trace; c0106b03 Code; c013eb2c 00000000 <_EIP>: Code; c013eb2c <===== 0: 0f 0b ud2a <===== Code; c013eb2e 2: 83 c4 0c add $0xc,%esp Code; c013eb31 5: 8b 53 04 mov 0x4(%ebx),%edx Code; c013eb34 8: 8b 03 mov (%ebx),%eax Code; c013eb36 a: 89 50 04 mov %edx,0x4(%eax) Code; c013eb39 d: 89 02 mov %eax,(%edx) Code; c013eb3b f: 8b 53 fc mov 0xfffffffc(%ebx),%edx Code; c013eb3e 12: 8b 43 00 mov 0x0(%ebx),%eax kernel BUG at inode.c:682! invalid operand: 0000 CPU: 0 EIP: 0010:[] EFLAGS: 00010286 eax: 0000001b ebx: c39c22c8 ecx: c2a5e000 edx: c21875a0 esi: c39c22c0 edi: c39c24a8 ebp: c2a5fd8c esp: c2a5fd64 ds: 0018 es: 0018 ss: 0018 Process grep (pid: 3844, stackpage=c2a5f000) Stack: c0278686 c0278702 000002aa 00000006 000000d2 0000003f 00000000 00000000 c2a5fd84 c2a5fd84 00000001 c013ebc4 0000000a c012665b 00000006 000000d2 00000006 000000d2 c2a5e000 c02c60e8 00000000 00000010 c01267aa 000000d2 Call Trace: [] [] [] [] [] [] [] [] [] [] [] [] [] [] [] [] [] [] [] Code: 0f 0b 83 c4 0c 8b 53 04 8b 03 89 50 04 89 02 8b 53 fc 8b 43 >>EIP; c013eb2c <===== Trace; c013ebc4 Trace; c012665b Trace; c01267aa Trace; c0127390 <__alloc_pages+1cc/278> Trace; c01271c2 <_alloc_pages+16/18> Trace; c011d07f Trace; c011d77e Trace; c010ff34 Trace; c0110094 Trace; c010ff34 Trace; c0152b83 Trace; c012495a Trace; c0106c14 Trace; c011fff3 Trace; c011fcb6 Trace; c0120089 Trace; c011ffc0 Trace; c012c4b5 Trace; c0106b03 Code; c013eb2c 00000000 <_EIP>: Code; c013eb2c <===== 0: 0f 0b ud2a <===== Code; c013eb2e 2: 83 c4 0c add $0xc,%esp Code; c013eb31 5: 8b 53 04 mov 0x4(%ebx),%edx Code; c013eb34 8: 8b 03 mov (%ebx),%eax Code; c013eb36 a: 89 50 04 mov %edx,0x4(%eax) Code; c013eb39 d: 89 02 mov %eax,(%edx) Code; c013eb3b f: 8b 53 fc mov 0xfffffffc(%ebx),%edx Code; c013eb3e 12: 8b 43 00 mov 0x0(%ebx),%eax kernel BUG at inode.c:682! invalid operand: 0000 CPU: 0 EIP: 0010:[] EFLAGS: 00010282 eax: 0000001b ebx: c39c22c8 ecx: c2a5e000 edx: c21875a0 esi: c39c22c0 edi: c39c24a8 ebp: c2a5fdfc esp: c2a5fdd4 ds: 0018 es: 0018 ss: 0018 Process sh (pid: 3845, stackpage=c2a5f000) Stack: c0278686 c0278702 000002aa 00000006 000000f0 0000003e 00000000 00000007 c39c7628 c3d2cde8 00000001 c013ebc4 00000003 c012665b 00000006 000000f0 00000006 000000f0 c2a5e000 c02c60c8 00000000 00000010 c01267aa 000000f0 Call Trace: [] [] [] [] [] [] [] [] [] [] [] [] [] [] [] [] [] [] Code: 0f 0b 83 c4 0c 8b 53 04 8b 03 89 50 04 89 02 8b 53 fc 8b 43 >>EIP; c013eb2c <===== Trace; c013ebc4 Trace; c012665b Trace; c01267aa Trace; c0127390 <__alloc_pages+1cc/278> Trace; c01271c2 <_alloc_pages+16/18> Trace; c0127446 <__get_free_pages+a/18> Trace; c0123e8a Trace; c014d827 Trace; c01242d9 Trace; c013ed74 Trace; c013f056 Trace; c014d98a Trace; c0135c87 Trace; c013632f Trace; c0135a2e Trace; c0136906 <__user_walk+3a/54> Trace; c01337f9 Trace; c0106b03 Code; c013eb2c 00000000 <_EIP>: Code; c013eb2c <===== 0: 0f 0b ud2a <===== Code; c013eb2e 2: 83 c4 0c add $0xc,%esp Code; c013eb31 5: 8b 53 04 mov 0x4(%ebx),%edx Code; c013eb34 8: 8b 03 mov (%ebx),%eax Code; c013eb36 a: 89 50 04 mov %edx,0x4(%eax) Code; c013eb39 d: 89 02 mov %eax,(%edx) Code; c013eb3b f: 8b 53 fc mov 0xfffffffc(%ebx),%edx Code; c013eb3e 12: 8b 43 00 mov 0x0(%ebx),%eax kernel BUG at inode.c:682! invalid operand: 0000 CPU: 0 EIP: 0010:[] EFLAGS: 00010286 eax: 0000001b ebx: c39c22c8 ecx: c343e000 edx: c2187460 esi: c39c22c0 edi: c39c24a8 ebp: c343fe54 esp: c343fe2c ds: 0018 es: 0018 ss: 0018 Process enlightenment (pid: 3635, stackpage=c343f000) Stack: c0278686 c0278702 000002aa 00000006 000000f0 0000003f 00000000 00000003 c39c7448 c39c7808 00000001 c013ebc4 00000007 c012665b 00000006 000000f0 00000006 000000f0 c343e000 c02c60c8 00000000 00000010 c01267aa 000000f0 Call Trace: [] [] [] [] [] [] [] [] [] [] [] [] [] Code: 0f 0b 83 c4 0c 8b 53 04 8b 03 89 50 04 89 02 8b 53 fc 8b 43 >>EIP; c013eb2c <===== Trace; c013ebc4 Trace; c012665b Trace; c01267aa Trace; c0127390 <__alloc_pages+1cc/278> Trace; c01271c2 <_alloc_pages+16/18> Trace; c0127446 <__get_free_pages+a/18> Trace; c0139bb7 <__pollwait+33/90> Trace; c024d1e2 Trace; c021b2ad Trace; c0139d99 Trace; c013a202 Trace; c010ade6 Trace; c0106b03 Code; c013eb2c 00000000 <_EIP>: Code; c013eb2c <===== 0: 0f 0b ud2a <===== Code; c013eb2e 2: 83 c4 0c add $0xc,%esp Code; c013eb31 5: 8b 53 04 mov 0x4(%ebx),%edx Code; c013eb34 8: 8b 03 mov (%ebx),%eax Code; c013eb36 a: 89 50 04 mov %edx,0x4(%eax) Code; c013eb39 d: 89 02 mov %eax,(%edx) Code; c013eb3b f: 8b 53 fc mov 0xfffffffc(%ebx),%edx Code; c013eb3e 12: 8b 43 00 mov 0x0(%ebx),%eax kernel BUG at inode.c:682! invalid operand: 0000 CPU: 0 EIP: 0010:[] EFLAGS: 00010286 eax: 0000001b ebx: c39c22c8 ecx: c0b70000 edx: c2187640 esi: c39c22c0 edi: c39c24a8 ebp: c0b71e28 esp: c0b71e00 ds: 0018 es: 0018 ss: 0018 Process X (pid: 3633, stackpage=c0b71000) Stack: c0278686 c0278702 000002aa 00000006 000000d2 0000003e 00000000 00000006 c1ae6dc8 c1ae6468 00000001 c013ebc4 00000005 c012665b 00000006 000000d2 00000006 000000d2 c0b70000 c02c60e8 00000000 00000010 c01267aa 000000d2 Call Trace: [] [] [] [] [] [] [] [] [] [] [] [] [] [] [] [] [] [] [] [] Code: 0f 0b 83 c4 0c 8b 53 04 8b 03 89 50 04 89 02 8b 53 fc 8b 43 >>EIP; c013eb2c <===== Trace; c013ebc4 Trace; c012665b Trace; c01267aa Trace; c0127390 <__alloc_pages+1cc/278> Trace; c01271c2 <_alloc_pages+16/18> Trace; c0127a75 Trace; c011d388 Trace; c011d3e5 Trace; c011d760 Trace; c010ff34 Trace; c0110094 Trace; c010ff34 Trace; c01de0f5 Trace; c01e33e7 Trace; c01df94b Trace; c01e3380 Trace; c0107cec Trace; c0109d68 Trace; c0107e6d Trace; c0106c14 Code; c013eb2c 00000000 <_EIP>: Code; c013eb2c <===== 0: 0f 0b ud2a <===== Code; c013eb2e 2: 83 c4 0c add $0xc,%esp Code; c013eb31 5: 8b 53 04 mov 0x4(%ebx),%edx Code; c013eb34 8: 8b 03 mov (%ebx),%eax Code; c013eb36 a: 89 50 04 mov %edx,0x4(%eax) Code; c013eb39 d: 89 02 mov %eax,(%edx) Code; c013eb3b f: 8b 53 fc mov 0xfffffffc(%ebx),%edx Code; c013eb3e 12: 8b 43 00 mov 0x0(%ebx),%eax 1 warning and 1 error issued. Results may not be reliable.