ksymoops 0.7c on i686 2.4.0-test3. Options used -V (default) -k /proc/ksyms (default) -l /proc/modules (default) -o /lib/modules/2.4.0-test3/ (default) -m /usr/src/linux/System.map (default) Warning: You did not tell me where to find symbol information. I will assume that the log matches the kernel and modules that are running right now and I'll use the default options above for symbol resolution. If the current kernel and/or modules do not match the log, you can get more accurate output by telling me the kernel version and where to find map, modules, ksyms etc. ksymoops -h explains the options. Unable to handle kernel NULL pointer dereference at virtual address 00000008 c014b785 *pde = 00000000 Oops: 0000 CPU: 0 EIP: 0010:[proc_permission+169/336] EFLAGS: 00010207 eax: c1171a60 ebx: c11787a0 ecx: 00000000 edx: 00000000 esi: c11243a0 edi: 00000000 ebp: c11787a0 esp: c3573f00 ds: 0018 es: 0018 ss: 0018 Process pidof (pid: 487, stackpage=c3573000) Stack: c3aab280 c3573fa4 c3aab280 c35a000b 00000000 00000000 00000000 c014bd83 c3aab280 00000001 c3573fa4 c3d28b60 c3d28b60 c013cc3c c3d28b60 c3573fa4 c3aab280 00000000 c35a0000 c3573fa4 bffffaac c3572000 c3573fa8 c3572000 Call Trace: [proc_pid_follow_link+27/64] [path_walk+1768/2076] [__user_walk+60/88] [sys_newstat+22/112] [system_call+52/56] Code: 8b 42 08 39 c2 0f 84 87 00 00 00 8b 0a 89 44 24 18 89 c2 39 Using defaults from ksymoops -t elf32-i386 -a i386 Code; 00000000 Before first symbol 00000000 <_EIP>: Code; 00000000 Before first symbol 0: 8b 42 08 mov 0x8(%edx),%eax Code; 00000003 Before first symbol 3: 39 c2 cmp %eax,%edx Code; 00000005 Before first symbol 5: 0f 84 87 00 00 00 je 92 <_EIP+0x92> 00000092 Before first symbol Code; 0000000b Before first symbol b: 8b 0a mov (%edx),%ecx Code; 0000000d Before first symbol d: 89 44 24 18 mov %eax,0x18(%esp,1) Code; 00000011 Before first symbol 11: 89 c2 mov %eax,%edx Code; 00000013 Before first symbol 13: 39 00 cmp %eax,(%eax) 1 warning issued. Results may not be reliable.