ksymoops 2.4.5 on i686 2.4.19-pre5-ac3. Options used -V (default) -k /proc/ksyms (default) -l /proc/modules (default) -o /lib/modules/2.4.19-pre5-ac3/ (default) -m /boot/System.map-2.4.19-pre5-ac3 (default) Warning: You did not tell me where to find symbol information. I will assume that the log matches the kernel and modules that are running right now and I'll use the default options above for symbol resolution. If the current kernel and/or modules do not match the log, you can get more accurate output by telling me the kernel version and where to find map, modules, ksyms etc. ksymoops -h explains the options. No modules in ksyms, skipping objects Warning (read_lsmod): no symbols in lsmod, is /proc/modules a valid lsmod file? CPU: 0 EIP: 0010:[] Not tainted Using defaults from ksymoops -t elf32-i386 -a i386 EFLAGS: 00000246 eax: 00000000 ebx: ce63c000 ecx: c1761420 edx: e0a7c000 esi: 00027f40 edi: df7e9400 ebp: c12ec43c esp: dc66ff18 ds: 0018 es: 0018 ss: 0018 Process dd (pid: 710, stackpage=dc66f000) Stack: 00027f40 c12ec43c df7e9400 c0285f6f 00000000 00000001 c0181be5 df7e9400 ce63c000 00027f40 dfef2768 c0126546 c1761420 c12ec43c 00000800 00000a00 00000000 c1761420 ffffffea 00000200 dc64bbec 00000a00 00000000 00000800 Call Trace: [] [] [] [] Code: 5e 5f 83 c4 10 c3 83 ec 18 55 57 56 53 8b 7c 24 2c 8b 74 24 >>EIP; c01944fe <===== >>ebx; ce63c000 >>ecx; c1761420 >>edx; e0a7c000 >>esi; 00027f40 Before first symbol >>edi; df7e9400 >>ebp; c12ec43c >>esp; dc66ff18 Trace; c0181be5 Trace; c0126546 Trace; c01319e6 Trace; c0108523 Code; c01944fe 00000000 <_EIP>: Code; c01944fe <===== 0: 5e pop %esi <===== Code; c01944ff 1: 5f pop %edi Code; c0194500 2: 83 c4 10 add $0x10,%esp Code; c0194503 5: c3 ret Code; c0194504 6: 83 ec 18 sub $0x18,%esp Code; c0194507 9: 55 push %ebp Code; c0194508 a: 57 push %edi Code; c0194509 b: 56 push %esi Code; c019450a c: 53 push %ebx Code; c019450b d: 8b 7c 24 2c mov 0x2c(%esp,1),%edi Code; c019450f 11: 8b 74 24 00 mov 0x0(%esp,1),%esi 2 warnings issued. Results may not be reliable.