ksymoops 2.4.5 on i686 2.4.19-pre5-ac3. Options used -V (default) -k /proc/ksyms (default) -l /proc/modules (default) -o /lib/modules/2.4.19-pre5-ac3/ (default) -m /boot/System.map-2.4.19-pre5-ac3 (default) Warning: You did not tell me where to find symbol information. I will assume that the log matches the kernel and modules that are running right now and I'll use the default options above for symbol resolution. If the current kernel and/or modules do not match the log, you can get more accurate output by telling me the kernel version and where to find map, modules, ksyms etc. ksymoops -h explains the options. CPU: 0 EIP: 0010:[] Not tainted Using defaults from ksymoops -t elf32-i386 -a i386 EFLAGS: 00000206 eax: c125e3e0 ebx: 00000000 ecx: 00000200 edx: 00000000 esi: 08052200 edi: cba89200 ebp: c125e3e0 esp: d8d07f50 ds: 0018 es: 0018 ss: 0018 Process dd (pid: 2001, stackpage=d8d07000) Stack: 08052200 c01265d9 00000000 da9633c0 ffffffea 00000200 d956f0ac 00000200 00000000 00000000 00000200 00000200 00000200 1f77e200 00000000 d956f040 d956f0f4 00000000 00000200 c01319e6 da9633c0 08052200 00000000 da9633e0 Call Trace: [] [] [] Code: 53 89 c3 0f b6 43 1b 8b 14 85 44 ad 31 c0 69 c3 b1 79 37 9e >>EIP; c0123cfd <===== >>eax; c125e3e0 <_end+f20224/207ebe44> >>esi; 08052200 Before first symbol >>edi; cba89200 <_end+b74b044/207ebe44> >>ebp; c125e3e0 <_end+f20224/207ebe44> >>esp; d8d07f50 <_end+189c9d94/207ebe44> Trace; c01265d9 Trace; c01319e6 Trace; c0108523 Code; c0123cfd 00000000 <_EIP>: Code; c0123cfd <===== 0: 53 push %ebx <===== Code; c0123cfe 1: 89 c3 mov %eax,%ebx Code; c0123d00 3: 0f b6 43 1b movzbl 0x1b(%ebx),%eax Code; c0123d04 7: 8b 14 85 44 ad 31 c0 mov 0xc031ad44(,%eax,4),%edx Code; c0123d0b e: 69 c3 b1 79 37 9e imul $0x9e3779b1,%ebx,%eax 1 warning issued. Results may not be reliable.