ksymoops 2.3.4 on i586 2.2.15. Options used -V (default) -k /proc/ksyms (default) -l /proc/modules (default) -o /lib/modules/2.2.15/ (default) -m /usr/src/linux/System.map (default) Warning: You did not tell me where to find symbol information. I will assume that the log matches the kernel and modules that are running right now and I'll use the default options above for symbol resolution. If the current kernel and/or modules do not match the log, you can get more accurate output by telling me the kernel version and where to find map, modules, ksyms etc. ksymoops -h explains the options. Warning (compare_ksyms_lsmod): module ip_masq_ftp is in lsmod but not in ksyms, probably no symbols exported Unable to handle kernel NULL pointer dereference at virtual address 0000001c current->tss.cr3 = 006a2000, %cr3 = 006a2000 *pde = 00000000 Oops: 0000 CPU: 0 EIP: 0010:[] Using defaults from ksymoops -t elf32-i386 -a i386 EFLAGS: 00010287 eax: 00000000 ebx: c3993f84 ecx: 000001f4 edx: c0cce110 esi: ffff01f4 edi: c14d7160 ebp: bfffb1e8 esp: c3993f80 ds: 0018 es: 0018 ss: 0018 Process queued (pid: 3263, process nr: 89, stackpage=c3993000) Stack: 000001f4 00000046 01f4c1ff c01201f4 c2e2d000 c012caf8 c2e2d000 c3992000 080725c0 c0123821 c14d7160 000001f4 000001f4 c3992000 080725c0 00000000 c0108b4c 00000000 000001f4 000001f4 080725c0 00000000 bfffb1e8 0000005f Call Trace: [] [] [] [] Code: 8b 40 1c 85 c0 74 2f 6a ff 52 8b 00 ff d0 8b 47 08 8b 40 68 >>EIP; c01236e6 <===== Trace; c01201f4 Trace; c012caf8 Trace; c0123821 Trace; c0108b4c Code; c01236e6 00000000 <_EIP>: Code; c01236e6 <===== 0: 8b 40 1c movl 0x1c(%eax),%eax <===== Code; c01236e9 3: 85 c0 testl %eax,%eax Code; c01236eb 5: 74 2f je 36 <_EIP+0x36> c012371c Code; c01236ed 7: 6a ff pushl $0xffffffff Code; c01236ef 9: 52 pushl %edx Code; c01236f0 a: 8b 00 movl (%eax),%eax Code; c01236f2 c: ff d0 call *%eax Code; c01236f4 e: 8b 47 08 movl 0x8(%edi),%eax Code; c01236f7 11: 8b 40 68 movl 0x68(%eax),%eax Unable to handle kernel NULL pointer dereference at virtual address 0000001c current->tss.cr3 = 039a9000, %cr3 = 039a9000 *pde = 00000000 Oops: 0000 CPU: 0 EIP: 0010:[] EFLAGS: 00010287 eax: 00000000 ebx: c106ff84 ecx: 000001f4 edx: c0cce220 esi: ffff01f4 edi: c14d7860 ebp: bfffb1e8 esp: c106ff80 ds: 0018 es: 0018 ss: 0018 Process queued (pid: 3288, process nr: 87, stackpage=c106f000) Stack: 000001f4 00000046 01f4c1ff c01201f4 c0e03840 c012caf8 c0e03840 c106e000 080725c0 c0123821 c14d7860 000001f4 000001f4 c106e000 080725c0 00000000 c0108b4c 00000000 000001f4 000001f4 080725c0 00000000 bfffb1e8 0000005f Call Trace: [] [] [] [] Code: 8b 40 1c 85 c0 74 2f 6a ff 52 8b 00 ff d0 8b 47 08 8b 40 68 >>EIP; c01236e6 <===== Trace; c01201f4 Trace; c012caf8 Trace; c0123821 Trace; c0108b4c Code; c01236e6 00000000 <_EIP>: Code; c01236e6 <===== 0: 8b 40 1c movl 0x1c(%eax),%eax <===== Code; c01236e9 3: 85 c0 testl %eax,%eax Code; c01236eb 5: 74 2f je 36 <_EIP+0x36> c012371c Code; c01236ed 7: 6a ff pushl $0xffffffff Code; c01236ef 9: 52 pushl %edx Code; c01236f0 a: 8b 00 movl (%eax),%eax Code; c01236f2 c: ff d0 call *%eax Code; c01236f4 e: 8b 47 08 movl 0x8(%edi),%eax Code; c01236f7 11: 8b 40 68 movl 0x68(%eax),%eax Unable to handle kernel NULL pointer dereference at virtual address 0000001c current->tss.cr3 = 039c4000, %cr3 = 039c4000 *pde = 00000000 Oops: 0000 CPU: 0 EIP: 0010:[] EFLAGS: 00010287 eax: 00000000 ebx: c238df84 ecx: 000001f4 edx: c39be770 esi: ffff01f4 edi: c11b25c0 ebp: bfffb1e8 esp: c238df80 ds: 0018 es: 0018 ss: 0018 Process queued (pid: 3366, process nr: 71, stackpage=c238d000) Stack: 000001f4 00000046 01f4c1ff c01201f4 c1d9fb60 c012caf8 c1d9fb60 c238c000 080725c0 c0123821 c11b25c0 000001f4 000001f4 c238c000 080725c0 00000000 c0108b4c 00000000 000001f4 000001f4 080725c0 00000000 bfffb1e8 0000005f Call Trace: [] [] [] [] Code: 8b 40 1c 85 c0 74 2f 6a ff 52 8b 00 ff d0 8b 47 08 8b 40 68 >>EIP; c01236e6 <===== Trace; c01201f4 Trace; c012caf8 Trace; c0123821 Trace; c0108b4c Code; c01236e6 00000000 <_EIP>: Code; c01236e6 <===== 0: 8b 40 1c movl 0x1c(%eax),%eax <===== Code; c01236e9 3: 85 c0 testl %eax,%eax Code; c01236eb 5: 74 2f je 36 <_EIP+0x36> c012371c Code; c01236ed 7: 6a ff pushl $0xffffffff Code; c01236ef 9: 52 pushl %edx Code; c01236f0 a: 8b 00 movl (%eax),%eax Code; c01236f2 c: ff d0 call *%eax Code; c01236f4 e: 8b 47 08 movl 0x8(%edi),%eax Code; c01236f7 11: 8b 40 68 movl 0x68(%eax),%eax Unable to handle kernel NULL pointer dereference at virtual address 0000001c current->tss.cr3 = 039a9000, %cr3 = 039a9000 *pde = 00000000 Oops: 0000 CPU: 0 EIP: 0010:[] EFLAGS: 00010287 eax: 00000000 ebx: c106ff84 ecx: 000001f4 edx: c39be440 esi: ffff01f4 edi: c10864e0 ebp: bfffb1e8 esp: c106ff80 ds: 0018 es: 0018 ss: 0018 Process queued (pid: 3394, process nr: 87, stackpage=c106f000) Stack: 000001f4 00000046 01f4c1ff c01201f4 c1d9f200 c012caf8 c1d9f200 c106e000 080725c0 c0123821 c10864e0 000001f4 000001f4 c106e000 080725c0 00000000 c0108b4c 00000000 000001f4 000001f4 080725c0 00000000 bfffb1e8 0000005f Call Trace: [] [] [] [] Code: 8b 40 1c 85 c0 74 2f 6a ff 52 8b 00 ff d0 8b 47 08 8b 40 68 >>EIP; c01236e6 <===== Trace; c01201f4 Trace; c012caf8 Trace; c0123821 Trace; c0108b4c Code; c01236e6 00000000 <_EIP>: Code; c01236e6 <===== 0: 8b 40 1c movl 0x1c(%eax),%eax <===== Code; c01236e9 3: 85 c0 testl %eax,%eax Code; c01236eb 5: 74 2f je 36 <_EIP+0x36> c012371c Code; c01236ed 7: 6a ff pushl $0xffffffff Code; c01236ef 9: 52 pushl %edx Code; c01236f0 a: 8b 00 movl (%eax),%eax Code; c01236f2 c: ff d0 call *%eax Code; c01236f4 e: 8b 47 08 movl 0x8(%edi),%eax Code; c01236f7 11: 8b 40 68 movl 0x68(%eax),%eax 2 warnings issued. Results may not be reliable.