ksymoops 2.4.5 on i586 2.4.20-rc1. Options used -V (default) -k /proc/ksyms (default) -l /proc/modules (default) -o /lib/modules/2.4.20-rc1/ (default) -m /boot/System.map-2.4.20-rc1 (default) Warning: You did not tell me where to find symbol information. I will assume that the log matches the kernel and modules that are running right now and I'll use the default options above for symbol resolution. If the current kernel and/or modules do not match the log, you can get more accurate output by telling me the kernel version and where to find map, modules, ksyms etc. ksymoops -h explains the options. Warning (compare_maps): ksyms_base symbol sk_chk_filter_R__ver_sk_chk_filter not found in System.map. Ignoring ksyms_base entry Warning (compare_maps): ksyms_base symbol sk_run_filter_R__ver_sk_run_filter not found in System.map. Ignoring ksyms_base entry 8139too Fast Ethernet driver 0.9.26 Unable to handle kernel paging request at virtual address 08000034 c01454fb *pde = 06bb4067 Oops: 0000 CPU: 0 EIP: 0010:[] Not tainted Using defaults from ksymoops -t elf32-i386 -a i386 EFLAGS: 00010217 eax: c125a978 ebx: 08000000 ecx: 0000000f edx: c1240000 esi: 07fffff0 edi: 00000000 ebp: 1aaf151b esp: c18aff00 ds: 0018 es: 0018 ss: 0018 Process find (pid: 29587, stackpage=c18af000) Stack: c1217f18 07fffff0 c125a978 c8ef3000 0000000b c8ef3000 c8ef300b 00000000 c18aff98 c013c90e c7bbfb60 c18aff50 c8ef3000 c013ce7e c7bbfb60 c18aff50 00000000 00000008 c2c68900 00000000 c8ef3000 0000000b 1aaf151b 00000008 Call Trace: [] [] [] [] [] [] Code: 39 6e 44 8b 1b 75 e8 8b 7c 24 28 39 7e 0c 75 df 8b 47 4c 85 >>EIP; c01454fb <===== >>eax; c125a978 <_end+f82260/c5418e8> >>ebx; 08000000 Before first symbol >>edx; c1240000 <_end+f678e8/c5418e8> >>esi; 07fffff0 Before first symbol >>ebp; 1aaf151b Before first symbol >>esp; c18aff00 <_end+15d77e8/c5418e8> Trace; c013c90e Trace; c013ce7e Trace; c013d329 Trace; c013d58a <__user_walk+2a/40> Trace; c013a1b7 Trace; c01071c3 Code; c01454fb 00000000 <_EIP>: Code; c01454fb <===== 0: 39 6e 44 cmp %ebp,0x44(%esi) <===== Code; c01454fe 3: 8b 1b mov (%ebx),%ebx Code; c0145500 5: 75 e8 jne ffffffef <_EIP+0xffffffef> c01454ea Code; c0145502 7: 8b 7c 24 28 mov 0x28(%esp,1),%edi Code; c0145506 b: 39 7e 0c cmp %edi,0xc(%esi) Code; c0145509 e: 75 df jne ffffffef <_EIP+0xffffffef> c01454ea Code; c014550b 10: 8b 47 4c mov 0x4c(%edi),%eax Code; c014550e 13: 85 00 test %eax,(%eax) <1>Unable to handle kernel paging request at virtual address 2f636f98 c01454fb *pde = 00000000 Oops: 0000 CPU: 0 EIP: 0010:[] Not tainted EFLAGS: 00010213 eax: c125a978 ebx: 2f636f64 ecx: 0000000f edx: c1240000 esi: 2f636f54 edi: 00000000 ebp: 1aaf151b esp: c277bf00 ds: 0018 es: 0018 ss: 0018 Process integrit (pid: 29621, stackpage=c277b000) Stack: c397000a 2f636f54 c125a978 c3970014 0000000b c3970014 c397001f 00000000 c277bf98 c013c90e c7bbfb60 c277bf50 c3970014 c013ce7e c7bbfb60 c277bf50 00000000 00000008 c2c68900 00000000 c3970014 0000000b 1aaf151b 00000008 Call Trace: [] [] [] [] [] [] Code: 39 6e 44 8b 1b 75 e8 8b 7c 24 28 39 7e 0c 75 df 8b 47 4c 85 >>EIP; c01454fb <===== >>eax; c125a978 <_end+f82260/c5418e8> >>ebx; 2f636f64 Before first symbol >>edx; c1240000 <_end+f678e8/c5418e8> >>esi; 2f636f54 Before first symbol >>ebp; 1aaf151b Before first symbol >>esp; c277bf00 <_end+24a37e8/c5418e8> Trace; c013c90e Trace; c013ce7e Trace; c013d329 Trace; c013d58a <__user_walk+2a/40> Trace; c013a1b7 Trace; c01071c3 Code; c01454fb 00000000 <_EIP>: Code; c01454fb <===== 0: 39 6e 44 cmp %ebp,0x44(%esi) <===== Code; c01454fe 3: 8b 1b mov (%ebx),%ebx Code; c0145500 5: 75 e8 jne ffffffef <_EIP+0xffffffef> c01454ea Code; c0145502 7: 8b 7c 24 28 mov 0x28(%esp,1),%edi Code; c0145506 b: 39 7e 0c cmp %edi,0xc(%esi) Code; c0145509 e: 75 df jne ffffffef <_EIP+0xffffffef> c01454ea Code; c014550b 10: 8b 47 4c mov 0x4c(%edi),%eax Code; c014550e 13: 85 00 test %eax,(%eax) <1>Unable to handle kernel paging request at virtual address 2f636f98 c01454fb *pde = 00000000 Oops: 0000 CPU: 0 EIP: 0010:[] Not tainted EFLAGS: 00010213 eax: c125a978 ebx: 2f636f64 ecx: 0000000f edx: c1240000 esi: 2f636f54 edi: 00000000 ebp: 1aaf151b esp: cb2c3f00 ds: 0018 es: 0018 ss: 0018 Process find (pid: 29816, stackpage=cb2c3000) Stack: c5d08000 2f636f54 c125a978 c5d08000 0000000b c5d08000 c5d0800b 00000000 cb2c3f98 c013c90e c7bbfb60 cb2c3f50 c5d08000 c013ce7e c7bbfb60 cb2c3f50 00000000 00000008 c2c68900 00000000 c5d08000 0000000b 1aaf151b 00000008 Call Trace: [] [] [] [] [] [] Code: 39 6e 44 8b 1b 75 e8 8b 7c 24 28 39 7e 0c 75 df 8b 47 4c 85 >>EIP; c01454fb <===== >>eax; c125a978 <_end+f82260/c5418e8> >>ebx; 2f636f64 Before first symbol >>edx; c1240000 <_end+f678e8/c5418e8> >>esi; 2f636f54 Before first symbol >>ebp; 1aaf151b Before first symbol >>esp; cb2c3f00 <_end+afeb7e8/c5418e8> Trace; c013c90e Trace; c013ce7e Trace; c013d329 Trace; c013d58a <__user_walk+2a/40> Trace; c013a1b7 Trace; c01071c3 Code; c01454fb 00000000 <_EIP>: Code; c01454fb <===== 0: 39 6e 44 cmp %ebp,0x44(%esi) <===== Code; c01454fe 3: 8b 1b mov (%ebx),%ebx Code; c0145500 5: 75 e8 jne ffffffef <_EIP+0xffffffef> c01454ea Code; c0145502 7: 8b 7c 24 28 mov 0x28(%esp,1),%edi Code; c0145506 b: 39 7e 0c cmp %edi,0xc(%esi) Code; c0145509 e: 75 df jne ffffffef <_EIP+0xffffffef> c01454ea Code; c014550b 10: 8b 47 4c mov 0x4c(%edi),%eax Code; c014550e 13: 85 00 test %eax,(%eax) 3 warnings issued. Results may not be reliable.