ksymoops 2.3.3 on i686 2.3.99-pre4-4. Options used -V (default) -k /proc/ksyms (default) -l /proc/modules (default) -o /lib/modules/2.3.99-pre4-4/ (default) -m /boot/System.map-2.3.99-pre4-4 (default) Warning: You did not tell me where to find symbol information. I will assume that the log matches the kernel and modules that are running right now and I'll use the default options above for symbol resolution. If the current kernel and/or modules do not match the log, you can get more accurate output by telling me the kernel version and where to find map, modules, ksyms etc. ksymoops -h explains the options. invalid operand: 0000 CPU: 0 EIP: 0010:[] Using defaults from ksymoops -t elf32-i386 -a i386 EFLAGS: 00010286 eax: 0000001c ebx: c30809c0 ecx: c01fa4bc edx: c01fa4bc esi: ffffffff edi: c3b9d400 ebp: c01fdde0 esp: c35674fc ds: 0018 es: 0018 ss: 0018 Process umount (pid: 7649, stackpage=c3567000) Stack: c01cf2ad c01cf348 000000ac c30809c0 c2d15800 c013c2c0 c30809c0 fffffffe c3b9d400 00000307 c0130e58 c3b9d400 c01fdde0 00000307 fffffffa c0130fd7 00000307 00000000 00000001 00000000 00000307 c3b4f720 08053040 c013110f Call Trace: [] [] [] [] [] [] [] Code: 0f 0b 83 c4 0c 5b c3 8d 76 00 53 8b 5c 24 08 8d 43 18 39 >>EIP; c013c04d <===== Trace; c01cf2ad Trace; c01cf348 Trace; c013c2c0 Trace; c0130e58 Trace; c0130fd7 Trace; c013110f Trace; c010ad0c Code; c013c04d 00000000 <_EIP>: Code; c013c04d <===== 0: 0f 0b ud2a <===== Code; c013c04f 2: 83 c4 0c add $0xc,%esp Code; c013c052 5: 5b pop %ebx Code; c013c053 6: c3 ret Code; c013c054 7: 8d 76 00 lea 0x0(%esi),%esi Code; c013c057 a: 53 push %ebx Code; c013c058 b: 8b 5c 24 08 mov 0x8(%esp,1),%ebx Code; c013c05c f: 8d 43 18 lea 0x18(%ebx),%eax Code; c013c05f 12: 39 00 cmp %eax,(%eax) 1 warning issued. Results may not be reliable.