ksymoops 2.4.8 on i686 2.5.74. Options used -V (default) -k /proc/ksyms (default) -l /proc/modules (default) -o /lib/modules/2.5.74/ (default) -m /boot/System.map-2.5.74 (default) Warning: You did not tell me where to find symbol information. I will assume that the log matches the kernel and modules that are running right now and I'll use the default options above for symbol resolution. If the current kernel and/or modules do not match the log, you can get more accurate output by telling me the kernel version and where to find map, modules, ksyms etc. ksymoops -h explains the options. Error (regular_file): read_ksyms stat /proc/ksyms failed No modules in ksyms, skipping objects No ksyms, skipping lsmod Machine check exception polling timer started. e1000: eth0 NIC Link is Up 100 Mbps Half Duplex Unable to handle kernel NULL pointer dereference at virtual address 00000000 c0136704 *pde = 00000000 Oops: 0000 [#1] CPU: 0 EIP: 0060:[] Not tainted Using defaults from ksymoops -t elf32-i386 -a i386 EFLAGS: 00010006 eax: 00a00000 ebx: ddadc7c0 ecx: dc7e9990 edx: 00000000 esi: 00000100 edi: 00000206 ebp: dc7e9990 esp: dc7ebf44 ds: 007b es: 007b ss: 0068 Stack: 00000000 00000080 ddadc7c0 dca6af00 dc7e9990 c01664ae 00000100 dca6af00 dca6af00 c0166489 dff63f40 c014a7a7 dc7e9990 dca6af00 dca6c780 dca6af00 dca6af00 dcfab580 00000000 c0148f09 dca6af00 dcfab580 dcfab580 dca6af00 Call Trace: [] [] [] [] [] [] Code: 8b 1a 8b 03 3b 43 04 73 19 89 74 83 10 83 03 01 57 9d 8b 5c >>EIP; c0136704 <===== >>eax; 00a00000 <__crc_flush_scheduled_work+1fe988/58d288> >>ebx; ddadc7c0 <__crc_ext2_xattr_get+5fb00a/691b31> >>ecx; dc7e9990 <__crc_wait_for_ready+35e12/11edac> >>ebp; dc7e9990 <__crc_wait_for_ready+35e12/11edac> >>esp; dc7ebf44 <__crc_wait_for_ready+383c6/11edac> Trace; c01664ae Trace; c0166489 Trace; c014a7a7 <__fput+10c/111> Trace; c0148f09 Trace; c0148fa3 Trace; c0108ec3 Code; c0136704 00000000 <_EIP>: Code; c0136704 <===== 0: 8b 1a mov (%edx),%ebx <===== Code; c0136706 2: 8b 03 mov (%ebx),%eax Code; c0136708 4: 3b 43 04 cmp 0x4(%ebx),%eax Code; c013670b 7: 73 19 jae 22 <_EIP+0x22> Code; c013670d 9: 89 74 83 10 mov %esi,0x10(%ebx,%eax,4) Code; c0136711 d: 83 03 01 addl $0x1,(%ebx) Code; c0136714 10: 57 push %edi Code; c0136715 11: 9d popf Code; c0136716 12: 8b 5c 00 00 mov 0x0(%eax,%eax,1),%ebx <1>Unable to handle kernel NULL pointer dereference at virtual address 00000000 c0136704 *pde = 00000000 Oops: 0000 [#2] CPU: 0 EIP: 0060:[] Not tainted EFLAGS: 00010006 eax: 00a00000 ebx: ddadcf00 ecx: dc7e9990 edx: 00000000 esi: 00000100 edi: 00000206 ebp: dc7e9990 esp: dd51df44 ds: 007b es: 007b ss: 0068 Stack: 00000000 00000080 ddadcf00 dca6a480 dc7e9990 c01664ae 00000100 dca6a480 dca6a480 c0166489 dff63f40 c014a7a7 dc7e9990 dca6a480 dca6c780 dca6a480 dca6a480 dcfab380 00000000 c0148f09 dca6a480 dcfab380 dcfab380 dca6a480 Call Trace: [] [] [] [] [] [] Code: 8b 1a 8b 03 3b 43 04 73 19 89 74 83 10 83 03 01 57 9d 8b 5c >>EIP; c0136704 <===== >>eax; 00a00000 <__crc_flush_scheduled_work+1fe988/58d288> >>ebx; ddadcf00 <__crc_ext2_xattr_get+5fb74a/691b31> >>ecx; dc7e9990 <__crc_wait_for_ready+35e12/11edac> >>ebp; dc7e9990 <__crc_wait_for_ready+35e12/11edac> >>esp; dd51df44 <__crc_ext2_xattr_get+3c78e/691b31> Trace; c01664ae Trace; c0166489 Trace; c014a7a7 <__fput+10c/111> Trace; c0148f09 Trace; c0148fa3 Trace; c0108ec3 Code; c0136704 00000000 <_EIP>: Code; c0136704 <===== 0: 8b 1a mov (%edx),%ebx <===== Code; c0136706 2: 8b 03 mov (%ebx),%eax Code; c0136708 4: 3b 43 04 cmp 0x4(%ebx),%eax Code; c013670b 7: 73 19 jae 22 <_EIP+0x22> Code; c013670d 9: 89 74 83 10 mov %esi,0x10(%ebx,%eax,4) Code; c0136711 d: 83 03 01 addl $0x1,(%ebx) Code; c0136714 10: 57 push %edi Code; c0136715 11: 9d popf Code; c0136716 12: 8b 5c 00 00 mov 0x0(%eax,%eax,1),%ebx 1 warning and 1 error issued. Results may not be reliable.