ksymoops 2.3.7 on i686 2.4.0. Options used -V (default) -k /proc/ksyms (default) -l /proc/modules (default) -o /lib/modules/2.4.0/ (default) -m /boot/System.map (specified) kernel BUG at page_alloc.c:190! invalid operand: 0000 CPU: 0 EIP: 0010:[] Using defaults from ksymoops -t elf32-i386 -a i386 EFLAGS: 00010092 eax: 00000020 ebx: c12bd09c ecx: 00000000 edx: 00000007 esi: c01ed9e0 edi: c01ed9b8 ebp: 00000000 esp: caa73e44 ds: 0018 es: 0018 ss: 0018 Process cpp (pid: 22337, stackpage=caa73000) Stack: c01c6865 c01c69f3 000000be c01ed9b8 c01edb90 00000001 ca79b398 00000005 c01edb34 c01edb30 00000286 00000000 c01ed9b8 c012b80b cc75ce40 cc75ce40 ccddbcc0 ca79b398 00000000 cfcdca04 00000005 00000001 c01edb8c c012185f Call Trace: [] [] [] [] [] [] [] [] [] [] Code: 0f 0b 83 c4 0c 89 f6 8b 53 04 8b 03 89 50 04 89 02 89 5c 24 >>EIP; c012b46d <===== Trace; c012b80b <__alloc_pages+eb/300> Trace; c012185f Trace; c01218e0 Trace; c0121a58 Trace; c0111fc7 Trace; c0111e70 Trace; c0122768 Trace; c0122a8a Trace; c0121c6b Trace; c0109040 Code; c012b46d 00000000 <_EIP>: Code; c012b46d <===== 0: 0f 0b ud2a <===== Code; c012b46f 2: 83 c4 0c addl $0xc,%esp Code; c012b472 5: 89 f6 movl %esi,%esi Code; c012b474 7: 8b 53 04 movl 0x4(%ebx),%edx Code; c012b477 a: 8b 03 movl (%ebx),%eax Code; c012b479 c: 89 50 04 movl %edx,0x4(%eax) Code; c012b47c f: 89 02 movl %eax,(%edx) Code; c012b47e 11: 89 5c 24 00 movl %ebx,0x0(%esp,1) Unable to handle kernel NULL pointer dereference at virtual address 00000000 c012a6c9 *pde = 00000000 Oops: 0002 CPU: 0 EIP: 0010:[] EFLAGS: 00010282 eax: c02486a8 ebx: c12bc6e4 ecx: 00000001 edx: 00000000 esi: c12bc6c8 edi: 00000015 ebp: 00000000 esp: c147ffc8 ds: 0018 es: 0018 ss: 0018 Process kswapd (pid: 3, stackpage=c147f000) Stack: 00010f00 c01c6631 c147e239 0008e000 c012aaf6 00000006 00000000 c1449fbc c0105000 ffffff9c c01074f3 00000000 c022c48c c01fbfc4 Call Trace: [] [] [] Code: 89 02 ff 0d b4 84 24 c0 e9 96 00 00 00 89 f6 b8 02 00 00 00 >>EIP; c012a6c9 <===== Trace; c012aaf6 Trace; c0105000 Trace; c01074f3 Code; c012a6c9 00000000 <_EIP>: Code; c012a6c9 <===== 0: 89 02 movl %eax,(%edx) <===== Code; c012a6cb 2: ff 0d b4 84 24 c0 decl 0xc02484b4 Code; c012a6d1 8: e9 96 00 00 00 jmp a3 <_EIP+0xa3> c012a76c Code; c012a6d6 d: 89 f6 movl %esi,%esi Code; c012a6d8 f: b8 02 00 00 00 movl $0x2,%eax Unable to handle kernel NULL pointer dereference at virtual address 00000018 c0122f07 *pde = 00000000 Oops: 0002 CPU: 0 EIP: 0010:[] EFLAGS: 00010246 eax: 00000000 ebx: c12bd344 ecx: 00000001 edx: 00000001 esi: 00000000 edi: ca13d9a4 ebp: 00000000 esp: cd2fbef4 ds: 0018 es: 0018 ss: 0018 Process rm (pid: 22364, stackpage=cd2fb000) Stack: c12bd344 c0122f6a c12bd344 c12bd344 c0123188 c12bd344 cd2fbf44 ca13d9ac ca13d9a4 ca13d9b4 cc65acc0 c12bd344 cd2fbf44 c012325f ca13d900 c01f0240 cc63f3c0 cc6450b0 00000000 ca13d9ac 00000000 c0143e40 ca13d9a4 00000000 Call Trace: [] [] [] [] [] [] [] [] Code: ff 48 18 8b 53 04 8b 03 89 50 04 89 02 c7 43 08 00 00 00 00 >>EIP; c0122f07 <__remove_inode_page+27/60> <===== Trace; c0122f6a Trace; c0123188 Trace; c012325f Trace; c0143e40 Trace; c014292e Trace; c013c2ce Trace; c013c3a5 Trace; c0108f27 Code; c0122f07 <__remove_inode_page+27/60> 00000000 <_EIP>: Code; c0122f07 <__remove_inode_page+27/60> <===== 0: ff 48 18 decl 0x18(%eax) <===== Code; c0122f0a <__remove_inode_page+2a/60> 3: 8b 53 04 movl 0x4(%ebx),%edx Code; c0122f0d <__remove_inode_page+2d/60> 6: 8b 03 movl (%ebx),%eax Code; c0122f0f <__remove_inode_page+2f/60> 8: 89 50 04 movl %edx,0x4(%eax) Code; c0122f12 <__remove_inode_page+32/60> b: 89 02 movl %eax,(%edx) Code; c0122f14 <__remove_inode_page+34/60> d: c7 43 08 00 00 00 00 movl $0x0,0x8(%ebx)