ksymoops 2.4.4 on i686 2.4.23. Options used -V (default) -k /proc/ksyms (default) -l /proc/modules (default) -o /lib/modules/2.4.23/ (default) -m /boot/System.map-2.4.23 (default) Warning: You did not tell me where to find symbol information. I will assume that the log matches the kernel and modules that are running right now and I'll use the default options above for symbol resolution. If the current kernel and/or modules do not match the log, you can get more accurate output by telling me the kernel version and where to find map, modules, ksyms etc. ksymoops -h explains the options. <1>Unable to handle kernel NULL pointer dereference at virtual address 00000121 c0159379 *pde = 00000000 Oops: 0002 CPU: 0 EIP: 0010:[] Not tainted Using defaults from ksymoops -t elf32-i386 -a i386 EFLAGS: 00010286 eax: 0000011d ebx: cc0d0084 ecx: d96cfab0 edx: cc0d0094 esi: d96cfa80 edi: cc0d0084 ebp: e46ec580 esp: cf8abed0 ds: 0018 es: 0018 ss: 0018 Process sshd (pid: 30631, stackpage=cf8ab000) Stack: e2e80680 00000006 c01680a2 d96cfa80 cc0d0084 00008006 fffffff4 db4c79ec cf8aa000 db4c7980 c014ec42 db4c7980 d96cfa80 d96cfa80 00000000 c8d0f00f 00000000 cf8abf90 c014f3e0 d96cf280 cf8abf34 00000000 00000008 db4c7980 Call Trace: [] [] [] [] [] [] [] Code: 89 48 04 89 46 30 89 51 04 89 4b 10 89 5e 00 c6 05 80 7b 3f >>EIP; c0159379 <===== Trace; c01680a2 Trace; c014ec42 Trace; c014f3e0 Trace; c014f709 Trace; c014fa69 <__user_walk+49/60> Trace; c014b8f4 Trace; c010938f Code; c0159379 00000000 <_EIP>: Code; c0159379 <===== 0: 89 48 04 mov %ecx,0x4(%eax) <===== Code; c015937c 3: 89 46 30 mov %eax,0x30(%esi) Code; c015937f 6: 89 51 04 mov %edx,0x4(%ecx) Code; c0159382 9: 89 4b 10 mov %ecx,0x10(%ebx) Code; c0159385 c: 89 5e 00 mov %ebx,0x0(%esi) Code; c0159388 f: c6 05 80 7b 3f 00 00 movb $0x0,0x3f7b80 1 warning issued. Results may not be reliable.