ksymoops 2.4.4 on i686 2.4.20-2-PE2650-6650. Options used -V (default) -k /proc/ksyms (default) -l /proc/modules (default) -o /lib/modules/2.4.20-2-PE2650-6650/ (default) -m /boot/System.map-2.4.20-2-PE2650-6650 (default) Warning: You did not tell me where to find symbol information. I will assume that the log matches the kernel and modules that are running right now and I'll use the default options above for symbol resolution. If the current kernel and/or modules do not match the log, you can get more accurate output by telling me the kernel version and where to find map, modules, ksyms etc. ksymoops -h explains the options. NMI Watchdog detected LOCKUP on CPU1, eip c01ec9d6, registers: CPU: 1 EIP: 0010:[] Not tainted Using defaults from ksymoops -t elf32-i386 -a i386 EFLAGS: 00000002 eax: 00000002 ebx: f149d880 ecx: 00000000 edx: c027a3d0 esi: c027a3d0 edi: 00000400 ebp: 00000062 esp: efa29ea8 ds: 0018 es: 0018 ss: 0018 Process setiathome (pid: 7422, stackpage=efa39000) Stack: f71d3600 c01272d2 00000046 efa38000 00000000 f149d880 c01ecc54 c027a3d0 f149d880 00000001 00000020 00000062 c01e8d0f 000000bc f7ba0000 f149d880 f69a1cf4 c01a47bf f149d880 f149d880 f7ba0000 00000066 f7ba0174 f5bc3240 Call Trace: [] [] [] [] [] [] [] [] Code: a1 04 4d 30 c0 83 e0 02 75 f6 f0 83 44 24 00 00 56 8b 43 18 >>EIP; c01ec9d6 <===== Trace; c01272d2 Trace; c01ecc54 Trace; c01e8d0f Trace; c01a47bf Trace; c01a4940 Trace; c01ece5f Trace; c011c2db Trace; c0108c8e Code; c01ec9d6 00000000 <_EIP>: Code; c01ec9d6 <===== 0: a1 04 4d 30 c0 mov 0xc0304d04,%eax <===== Code; c01ec9db 5: 83 e0 02 and $0x2,%eax Code; c01ec9de 8: 75 f6 jne 0 <_EIP> Code; c01ec9e0 a: f0 83 44 24 00 00 lock addl $0x0,0x0(%esp,1) Code; c01ec9e6 10: 56 push %esi Code; c01ec9e7 11: 8b 43 18 mov 0x18(%ebx),%eax esi: c01a73b0 edi: 00000100 ebp: 00000000 esp: efa3df3c ds: 0018 es: 0018 ss: 0018 Process setiathome (pid: 7420, stackpage=efa3d000) Stack: 1 warning issued. Results may not be reliable.