ksymoops 2.4.0 on i686 2.4.12-lsm. Options used -V (default) -k /proc/ksyms (default) -l /proc/modules (default) -o /lib/modules/2.4.12-lsm/ (default) -m /boot/System.map-2.4.12-lsm (default) Warning: You did not tell me where to find symbol information. I will assume that the log matches the kernel and modules that are running right now and I'll use the default options above for symbol resolution. If the current kernel and/or modules do not match the log, you can get more accurate output by telling me the kernel version and where to find map, modules, ksyms etc. ksymoops -h explains the options. Warning (compare_maps): mismatch on symbol partition_name , ksyms_base says c022f660, System.map says c0151f80. Ignoring ksyms_base entry Unable to handle kernel paging request at virtual address 465ec21c c01ad045 *pde = 00000000 Oops: 0000 CPU: 1 EIP: 0010:[convert_context+117/320] Not tainted EIP: 0010:[] Not tainted Using defaults from ksymoops -t elf32-i386 -a i386 EFLAGS: 00010282 eax: ddee9000 ebx: d6df3864 ecx: d71df620 edx: da1c0c88 esi: d6cdbdd8 edi: ffffffea ebp: d6cdbde0 esp: d6cdbd7c ds: 0018 es: 0018 ss: 0018 Process load_policy (pid: 10363, stackpage=d6cdb000) Stack: 000000ff d6cdbde0 00000002 00000005 da1c0c88 da1c03e0 d6df3860 d6df3880 00000079 c01a949c 000000f9 d6df3864 d6cdbdd8 d6cdbde0 c036a220 de6d0b20 d6cdbe20 c01ad1d1 d6cdbde0 c01acfd0 d6cdbdd8 00000000 00000000 c036a220 Call Trace: [sidtab_map_remove_on_error+44/144] [security_load_policy+193/432] [convert_context+0/320] [inode_has_perm+284/672] [task_precondition+40/816] Call Trace: [] [] [] [] [] [] [] [] [] [] [] [] [] [] Code: 8b 54 90 fc 52 8b 46 04 8b 40 18 50 e8 7a be ff ff 5a 85 c0 >>EIP; c01ad045 <===== Trace; c01a949c Trace; c01ad1d1 Trace; c01acfd0 Trace; c019b69c Trace; c019a9b8 Trace; c019b445 Trace; c019fa07 Trace; c013394a Trace; c0132546 Trace; c01ae4bd Trace; c01a7f4f Trace; c01328bd Trace; c01967d7 Trace; c0106f1b Code; c01ad045 00000000 <_EIP>: Code; c01ad045 <===== 0: 8b 54 90 fc mov 0xfffffffc(%eax,%edx,4),%edx <===== Code; c01ad049 4: 52 push %edx Code; c01ad04a 5: 8b 46 04 mov 0x4(%esi),%eax Code; c01ad04d 8: 8b 40 18 mov 0x18(%eax),%eax Code; c01ad050 b: 50 push %eax Code; c01ad051 c: e8 7a be ff ff call ffffbe8b <_EIP+0xffffbe8b> c01a8ed0 Code; c01ad056 11: 5a pop %edx Code; c01ad057 12: 85 c0 test %eax,%eax 2 warnings issued. Results may not be reliable.