ksymoops 2.4.9 on i686 2.4.32. Options used -V (default) -k /proc/ksyms (default) -l /proc/modules (default) -o /lib/modules/2.4.32/ (default) -m /boot/System.map-2.4.32 (default) Warning: You did not tell me where to find symbol information. I will assume that the log matches the kernel and modules that are running right now and I'll use the default options above for symbol resolution. If the current kernel and/or modules do not match the log, you can get more accurate output by telling me the kernel version and where to find map, modules, ksyms etc. ksymoops -h explains the options. Unable to handle kernel NULL pointer dereference at virtual address 00000174 c015b300 *pde = 00000000 Oops: 0000 CPU: 0 EIP: 0010:[] Not tainted Using defaults from ksymoops -t elf32-i386 -a i386 EFLAGS: 00010002 eax: 00000170 ebx: da02df44 ecx: 00000001 edx: 00000174 esi: da02df3c edi: 001a7000 ebp: c014839c esp: da02de70 ds: 0018 es: 0018 ss: 0018 Process ps (pid: 674, stackpage=da02d000) Stack: e465f6c0 e17d0000 c015b898 e17d0000 da02df3c da02df44 0000000a c03f3f30 00000050 00000050 c8dbf000 c8dbf000 db840000 00000001 da02def3 c020f2f3 db840000 da02def4 00000000 00000001 e7e77960 01c5a71f 00000001 e175200a Call Trace: [] [] [] [] [] [] [] Code: 8b 02 83 f8 01 74 17 85 c0 74 06 8d 41 ff 0f ab 03 41 83 c2 >>EIP; c015b300 <===== >>ebx; da02df44 <_end+19b8364c/284ba788> >>esi; da02df3c <_end+19b83644/284ba788> >>ebp; c014839c >>esp; da02de70 <_end+19b83578/284ba788> Trace; c015b898 Trace; c020f2f3 Trace; c01432cb Trace; c0143c0e Trace; c0159418 Trace; c01396d7 Trace; c0106eff Code; c015b300 00000000 <_EIP>: Code; c015b300 <===== 0: 8b 02 mov (%edx),%eax <===== Code; c015b302 2: 83 f8 01 cmp $0x1,%eax Code; c015b305 5: 74 17 je 1e <_EIP+0x1e> Code; c015b307 7: 85 c0 test %eax,%eax Code; c015b309 9: 74 06 je 11 <_EIP+0x11> Code; c015b30b b: 8d 41 ff lea 0xffffffff(%ecx),%eax Code; c015b30e e: 0f ab 03 bts %eax,(%ebx) Code; c015b311 11: 41 inc %ecx Code; c015b312 12: 83 c2 00 add $0x0,%edx 1 warning issued. Results may not be reliable.