ksymoops 2.4.4 on i686 2.4.19-pre7-ac4. Options used -V (default) -k /proc/ksyms (default) -l /proc/modules (default) -o /lib/modules/2.4.19-pre7-ac4/ (default) -m /boot/System.map (default) Warning: You did not tell me where to find symbol information. I will assume that the log matches the kernel and modules that are running right now and I'll use the default options above for symbol resolution. If the current kernel and/or modules do not match the log, you can get more accurate output by telling me the kernel version and where to find map, modules, ksyms etc. ksymoops -h explains the options. cpu: 0, clocks: 668209, slice: 334104 Unable to handle kernel paging request at virtual address 0100001b c012b455 *pde = 00000000 Oops: 0000 CPU: 0 EIP: 0010:[] Not tainted Using defaults from ksymoops -t elf32-i386 -a i386 EFLAGS: 00013246 eax: 01000000 ebx: c545a000 ecx: c1112254 edx: 00000000 esi: c1112254 edi: c02792c0 ebp: c6667ed8 esp: c6667ed0 ds: 0018 es: 0018 ss: 0018 Process X (pid: 102, stackpage=c6667000) Stack: c545a000 c1112254 c6667eec c018e4b2 c1112254 c7b407cc c7b41800 c6667f08 c018e511 c02792c0 c545a000 00000000 bffff968 c02792c0 c6667f68 c018e9e9 c02792c0 00000000 c02792c0 00000002 00000000 00000000 00000000 00000000 Call Trace: [] [] [] [] [] [] Code: 0f b6 50 1b 8b 1c 95 04 e4 25 c0 89 c2 69 d2 b1 79 37 9e 8b >>EIP; c012b455 <===== Trace; c018e4b2 Trace; c018e511 Trace; c018e9e9 Trace; c018df04 Trace; c0149edb Trace; c0108c5b Code; c012b455 00000000 <_EIP>: Code; c012b455 <===== 0: 0f b6 50 1b movzbl 0x1b(%eax),%edx <===== Code; c012b459 4: 8b 1c 95 04 e4 25 c0 mov 0xc025e404(,%edx,4),%ebx Code; c012b460 b: 89 c2 mov %eax,%edx Code; c012b462 d: 69 d2 b1 79 37 9e imul $0x9e3779b1,%edx,%edx Code; c012b468 13: 8b 00 mov (%eax),%eax 1 warning issued. Results may not be reliable.