ksymoops 2.4.9 on i686 2.6.13-came32. Options used -V (default) -k /proc/ksyms (default) -l /proc/modules (default) -o /lib/modules/2.6.13-came32/ (default) -m /boot/System.map-2.6.13-came32 (default) Warning: You did not tell me where to find symbol information. I will assume that the log matches the kernel and modules that are running right now and I'll use the default options above for symbol resolution. If the current kernel and/or modules do not match the log, you can get more accurate output by telling me the kernel version and where to find map, modules, ksyms etc. ksymoops -h explains the options. Error (regular_file): read_ksyms stat /proc/ksyms failed No modules in ksyms, skipping objects No ksyms, skipping lsmod Unable to handle kernel NULL pointer dereference at virtual address 0000007a c021be3e *pde = 00000000 Oops: 0002 [#1] CPU: 0 EIP: 0060:[] Not tainted VLI Using defaults from ksymoops -t elf32-i386 -a i386 EFLAGS: 00010297 (2.6.13-came32) eax: 0000007a ebx: 00000007 ecx: e788d73c edx: 0000007a esi: f7fcbdcc edi: db311000 ebp: f4a34674 esp: f7fcbd40 ds: 007b es: 007b ss: 0068 Stack: f760de20 0a8c0010 00078000 f4a34674 c0236837 f4a34674 db311000 00000000 00000000 db311000 c021d343 f4a34674 00000000 00000000 00000000 f4a34674 00000000 e788d73c c05fa2c0 db311010 00000000 0000002d f7bc9400 00000007 Call Trace: [] xfs_btree_check_sblock+0x77/0xe0 [] xfs_alloc_lookup+0x143/0x440 [] xfs_alloc_delete+0x1b/0x80 [] xfs_free_ag_extent+0x142/0x680 [] xfs_free_extent+0xc6/0xf0 [] kmem_zone_zalloc+0x22/0x50 [] xfs_trans_get_efd+0x22/0x30 [] xfs_bmap_finish+0x102/0x180 [] xfs_remove+0x29c/0x440 [] linvfs_permission+0x1b/0x30 [] linvfs_unlink+0x1b/0x40 [] vfs_unlink+0x12d/0x1a0 [] sys_unlink+0x99/0x110 [] syscall_call+0x7/0xb Code: 8b 79 60 66 8b 47 06 25 ff ff 00 00 89 c2 c1 e2 08 c1 e8 08 09 c2 81 e2 ff ff 00 00 39 d3 7e 0f 8b 9c 24 88 00 00 00 c7 03 00 00 <00> 00 eb b8 ba 00 e0 ff ff b8 c0 a2 5f c0 21 e2 8b 52 10 8b 0c >>EIP; c021be3e <===== >>ecx; e788d73c >>esi; f7fcbdcc >>edi; db311000 >>ebp; f4a34674 >>esp; f7fcbd40 Trace; c0236837 Trace; c021d343 Trace; c021e7eb Trace; c021a6c2 Trace; c021baf6 Trace; c0273aa2 Trace; c0269c52 Trace; c022d4b2 Trace; c026fd8c Trace; c027a5cb Trace; c027a31b Trace; c01660fd Trace; c0166209 Trace; c0102c79 This architecture has variable length instructions, decoding before eip is unreliable, take these instructions with a pinch of salt. Code; c021be13 00000000 <_EIP>: Code; c021be13 0: 8b 79 60 mov 0x60(%ecx),%edi Code; c021be16 3: 66 8b 47 06 mov 0x6(%edi),%ax Code; c021be1a 7: 25 ff ff 00 00 and $0xffff,%eax Code; c021be1f c: 89 c2 mov %eax,%edx Code; c021be21 e: c1 e2 08 shl $0x8,%edx Code; c021be24 11: c1 e8 08 shr $0x8,%eax Code; c021be27 14: 09 c2 or %eax,%edx Code; c021be29 16: 81 e2 ff ff 00 00 and $0xffff,%edx Code; c021be2f 1c: 39 d3 cmp %edx,%ebx Code; c021be31 1e: 7e 0f jle 2f <_EIP+0x2f> Code; c021be33 20: 8b 9c 24 88 00 00 00 mov 0x88(%esp),%ebx Code; c021be3a 27: c7 .byte 0xc7 Code; c021be3b 28: 03 00 add (%eax),%eax This decode from eip onwards should be reliable Code; c021be3e 00000000 <_EIP>: Code; c021be3e <===== 0: 00 00 add %al,(%eax) <===== Code; c021be40 2: eb b8 jmp ffffffbc <_EIP+0xffffffbc> Code; c021be42 4: ba 00 e0 ff ff mov $0xffffe000,%edx Code; c021be47 9: b8 c0 a2 5f c0 mov $0xc05fa2c0,%eax Code; c021be4c e: 21 e2 and %esp,%edx Code; c021be4e 10: 8b 52 10 mov 0x10(%edx),%edx Code; c021be51 13: 8b .byte 0x8b Code; c021be52 14: 0c .byte 0xc 1 warning and 1 error issued. Results may not be reliable.