ksymoops 2.4.5 on i586 2.4.21.19062003. Options used -V (default) -k /proc/ksyms (default) -l /proc/modules (default) -o /lib/modules/2.4.21.19062003/ (default) -m /boot/System.map-2.4.21.19062003 (default) Warning: You did not tell me where to find symbol information. I will assume that the log matches the kernel and modules that are running right now and I'll use the default options above for symbol resolution. If the current kernel and/or modules do not match the log, you can get more accurate output by telling me the kernel version and where to find map, modules, ksyms etc. ksymoops -h explains the options. Aug 8 21:15:01 www kernel: c012d765 Aug 8 21:15:01 www kernel: Oops: 0000 Aug 8 21:15:01 www kernel: CPU: 0 Aug 8 21:15:01 www kernel: EIP: 0010:[filemap_nopage+21/524] Not tainted Aug 8 21:15:01 www kernel: EFLAGS: 00010282 Aug 8 21:15:01 www kernel: eax: c99cdff0 ebx: c1164260 ecx: c2d2c260 edx: 08079000 Aug 8 21:15:01 www kernel: esi: 080798c0 edi: 00000000 ebp: c2d2c260 esp: c3971ea0 Aug 8 21:15:01 www kernel: ds: 0018 es: 0018 ss: 0018 Aug 8 21:15:01 www kernel: Process python (pid: 17362, stackpage=c3971000) Aug 8 21:15:01 www kernel: Stack: c1164260 080798c0 00000000 c2d2c260 00000069 c10df214 c170c040 c1171720 Aug 8 21:15:01 www kernel: c0129bd6 c2d2c260 08079000 00000000 c1164260 080798c0 00000000 c2d2c260 Aug 8 21:15:02 www kernel: c0129dc4 c1164260 c2d2c260 080798c0 00000000 c0d811e4 c2d2c260 c1164260 Aug 8 21:15:02 www kernel: Call Trace: [do_no_page+90/492] [handle_mm_fault+92/192] [do_page_fault+378/1184] [do_page_fault+0/1184] [open_namei+744/1588] Aug 8 21:15:02 www kernel: Code: 8b 40 08 8b 5c 24 24 8b a8 ac 00 00 00 8b 44 24 28 8b 55 20 Using defaults from ksymoops -t elf32-i386 -a i386 >>eax; c99cdff0 >>ebx; c1164260 <_end+cf8c5c/43eb9fc> >>ecx; c2d2c260 <_end+28c0c5c/43eb9fc> >>edx; 08079000 Before first symbol >>esi; 080798c0 Before first symbol >>ebp; c2d2c260 <_end+28c0c5c/43eb9fc> >>esp; c3971ea0 <_end+350689c/43eb9fc> Code; 00000000 Before first symbol 00000000 <_EIP>: Code; 00000000 Before first symbol 0: 8b 40 08 mov 0x8(%eax),%eax Code; 00000003 Before first symbol 3: 8b 5c 24 24 mov 0x24(%esp,1),%ebx Code; 00000007 Before first symbol 7: 8b a8 ac 00 00 00 mov 0xac(%eax),%ebp Code; 0000000d Before first symbol d: 8b 44 24 28 mov 0x28(%esp,1),%eax Code; 00000011 Before first symbol 11: 8b 55 20 mov 0x20(%ebp),%edx Aug 8 21:40:17 www kernel: Intel Pentium with F0 0F bug - workaround enabled. Aug 8 21:40:18 www kernel: DC390: 0 adapters found Aug 8 21:40:18 www kernel: ds: no socket drivers loaded! Aug 9 05:48:54 www kernel: Intel Pentium with F0 0F bug - workaround enabled. Aug 9 05:48:55 www kernel: DC390: 0 adapters found Aug 9 05:48:55 www kernel: ds: no socket drivers loaded! Aug 9 11:31:45 www kernel: c3b79fbf Aug 9 11:31:45 www kernel: Oops: 0002 Aug 9 11:31:45 www kernel: CPU: 0 Aug 9 11:31:46 www kernel: EIP: 0010:[ppp_async:__insmod_ppp_async_O/lib/modules/2.4.21.19062003/kernel/dri+-13791297/96] Not tainted Aug 9 11:31:46 www kernel: EFLAGS: 00010a13 Aug 9 11:31:46 www kernel: eax: c0149b8b ebx: ffffffff ecx: c376631c edx: c0379e60 Aug 9 11:31:46 www kernel: esi: c29ab0e0 edi: c0149a20 ebp: c376631c esp: c3b79f8c Aug 9 11:31:46 www kernel: ds: 0018 es: 0018 ss: 0018 Aug 9 11:31:46 www kernel: Process leafnode (pid: 5069, stackpage=c3b79000) Aug 9 11:31:46 www kernel: Stack: c3b78000 00000002 00000003 bfffdbdc 400135cc bffffdc4 00000000 40137e48 Aug 9 11:31:46 www kernel: 00000029 08059348 00000000 00001000 00000000 c0108b73 00000003 08059348 Aug 9 11:31:46 www kernel: 00001000 00000002 00000003 bfffdbdc 000000dc 0000002b 0000002b 000000dc Aug 9 11:31:46 www kernel: Call Trace: [system_call+51/64] Aug 9 11:31:46 www kernel: Code: 00 73 8b 10 c0 03 00 00 00 48 93 05 08 00 10 00 00 02 00 00 >>eax; c0149b8b >>ebx; ffffffff >>ecx; c376631c <_end+32fad18/43eb9fc> >>edx; c0379e60 >>esi; c29ab0e0 <_end+253fadc/43eb9fc> >>edi; c0149a20 >>ebp; c376631c <_end+32fad18/43eb9fc> >>esp; c3b79f8c <_end+370e988/43eb9fc> Code; 00000000 Before first symbol 00000000 <_EIP>: Code; 00000000 Before first symbol 0: 00 73 8b add %dh,0xffffff8b(%ebx) Code; 00000003 Before first symbol 3: 10 c0 adc %al,%al Code; 00000005 Before first symbol 5: 03 00 add (%eax),%eax Code; 00000007 Before first symbol 7: 00 00 add %al,(%eax) Code; 00000009 Before first symbol 9: 48 dec %eax Code; 0000000a Before first symbol a: 93 xchg %eax,%ebx Code; 0000000b Before first symbol b: 05 08 00 10 00 add $0x100008,%eax Code; 00000010 Before first symbol 10: 00 02 add %al,(%edx) Aug 9 12:13:11 www kernel: Intel Pentium with F0 0F bug - workaround enabled. Aug 9 12:13:12 www kernel: DC390: 0 adapters found Aug 9 12:13:12 www kernel: ds: no socket drivers loaded! Aug 9 12:32:01 www kernel: Intel Pentium with F0 0F bug - workaround enabled. Aug 9 12:32:02 www kernel: DC390: 0 adapters found Aug 9 12:32:02 www kernel: ds: no socket drivers loaded! Aug 9 13:11:48 www kernel: c0118fbc Aug 9 13:11:48 www kernel: Oops: 0002 Aug 9 13:11:48 www kernel: CPU: 0 Aug 9 13:11:48 www kernel: EIP: 0010:[add_wait_queue+12/52] Not tainted Aug 9 13:11:48 www kernel: EFLAGS: 00010046 Aug 9 13:11:48 www kernel: eax: e1ebdfe2 ebx: e1ebdfe2 ecx: 00000246 edx: c3cdff64 Aug 9 13:11:48 www kernel: esi: c3cdff64 edi: c04dede0 ebp: c3cdff64 esp: c3cdff38 Aug 9 13:11:48 www kernel: ds: 0018 es: 0018 ss: 0018 Aug 9 13:11:48 www kernel: Process jpegtopnm (pid: 1126, stackpage=c3cdf000) Aug 9 13:11:48 www kernel: Stack: c3cde000 c04dede0 c0143639 c3cde000 c0a9dde0 c04dede0 00001000 00000000 Aug 9 13:11:48 www kernel: c3cde000 00000000 00000000 00000000 c3cde000 00000000 00000000 c0143949 Aug 9 13:11:48 www kernel: c04dede0 00000000 c13c7de0 ffffffea 00001000 c04dee48 fffffe00 00000000 Aug 9 13:11:48 www kernel: Call Trace: [pipe_wait+105/164] [pipe_write+213/644] [sys_write+143/260] [system_call+51/64] Aug 9 13:11:48 www kernel: Code: f0 fe 0b 0f 88 19 13 00 00 8d 46 08 8b 53 04 89 42 04 89 56 >>eax; e1ebdfe2 >>ebx; e1ebdfe2 >>edx; c3cdff64 <_end+3874960/43eb9fc> >>esi; c3cdff64 <_end+3874960/43eb9fc> >>edi; c04dede0 <_end+737dc/43eb9fc> >>ebp; c3cdff64 <_end+3874960/43eb9fc> >>esp; c3cdff38 <_end+3874934/43eb9fc> Code; 00000000 Before first symbol 00000000 <_EIP>: Code; 00000000 Before first symbol 0: f0 fe 0b lock decb (%ebx) Code; 00000003 Before first symbol 3: 0f 88 19 13 00 00 js 1322 <_EIP+0x1322> 00001322 Before first symbol Code; 00000009 Before first symbol 9: 8d 46 08 lea 0x8(%esi),%eax Code; 0000000c Before first symbol c: 8b 53 04 mov 0x4(%ebx),%edx Code; 0000000f Before first symbol f: 89 42 04 mov %eax,0x4(%edx) Code; 00000012 Before first symbol 12: 89 56 00 mov %edx,0x0(%esi) Aug 9 13:40:07 www kernel: Intel Pentium with F0 0F bug - workaround enabled. Aug 9 13:40:08 www kernel: DC390: 0 adapters found Aug 9 13:40:08 www kernel: ds: no socket drivers loaded! Aug 9 14:11:43 www kernel: kernel BUG at sched.c:564! Aug 9 14:11:43 www kernel: invalid operand: 0000 Aug 9 14:11:43 www kernel: CPU: 0 Aug 9 14:11:43 www kernel: EIP: 0010:[schedule+77/1328] Not tainted Aug 9 14:11:43 www kernel: EFLAGS: 00010086 Aug 9 14:11:43 www kernel: eax: 00000018 ebx: 00000000 ecx: ffffffff edx: 00000001 Aug 9 14:11:43 www kernel: esi: 00000006 edi: c011668c ebp: c1c1ffbc esp: c1c1ff94 Aug 9 14:11:43 www kernel: ds: 0018 es: 0018 ss: 0018 Aug 9 14:11:43 www kernel: Process troff (pid: 992, stackpage=c1c1f000) Aug 9 14:11:43 www kernel: Stack: c03069be c1c1e000 00000006 c011668c c012a260 080df000 00001000 00000000 Aug 9 14:11:43 www kernel: c1c1e000 c0108c84 bfffe54c c0108c35 40199e48 00000ff9 401976a0 080deff8 Aug 9 14:11:43 www kernel: 00000002 bfffe54c 080df008 0000002b 0000002b ffffffff 400f09ef 00000023 Aug 9 14:11:43 www kernel: Call Trace: [do_page_fault+0/1184] [sys_brk+188/232] [error_code+52/64] [reschedule+5/16] Aug 9 14:11:43 www kernel: Code: 0f 0b 34 02 b6 69 30 c0 83 c4 04 8b 4d f8 83 79 1c 00 7c 08 >>ecx; ffffffff >>edi; c011668c >>ebp; c1c1ffbc <_end+17b49b8/43eb9fc> >>esp; c1c1ff94 <_end+17b4990/43eb9fc> Code; 00000000 Before first symbol 00000000 <_EIP>: Code; 00000000 Before first symbol 0: 0f 0b ud2a Code; 00000002 Before first symbol 2: 34 02 xor $0x2,%al Code; 00000004 Before first symbol 4: b6 69 mov $0x69,%dh Code; 00000006 Before first symbol 6: 30 c0 xor %al,%al Code; 00000008 Before first symbol 8: 83 c4 04 add $0x4,%esp Code; 0000000b Before first symbol b: 8b 4d f8 mov 0xfffffff8(%ebp),%ecx Code; 0000000e Before first symbol e: 83 79 1c 00 cmpl $0x0,0x1c(%ecx) Code; 00000012 Before first symbol 12: 7c 08 jl 1c <_EIP+0x1c> 0000001c Before first symbol 1 warning issued. Results may not be reliable.