Hy, I post a kernel crash in this adress last week. (see [EMAIL PROTECTED] it's me!) Now that i had the crash another times, i used the program ksymoops to trace the problem. I use a 2.4.2 Linux kernel on a i586 (Pentium 133Mhz) Here is the /var/log/syslog trace: Mar 10 04:40:02 palerme kernel: Unable to handle kernel NULL pointer dereference at virtual address 00000000 Mar 10 04:40:02 palerme kernel: *pde = 00000000 Mar 11 04:40:02 palerme kernel: Unable to handle kernel NULL pointer dereference at virtual address 00000000 Mar 11 04:40:02 palerme kernel: *pde = 00000000 Mar 12 04:40:02 palerme kernel: Unable to handle kernel NULL pointer dereference at virtual address 00000000 Mar 12 04:40:02 palerme kernel: *pde = 00000000 I use a Slackware Linux distribution. With Slackware the crontab execute the command updatedb each day at 4:40 am. I used this command to generate the ksymoops output : dmesg > dmesg_output; ksymoops < dmesg_output There is no modules in the kernel. Hope it will be helpfull. Pierre ksymoops 2.3.7 on i586 2.4.2. Options used -V (default) -k /proc/ksyms (default) -l /proc/modules (default) -o /lib/modules/2.4.2/ (default) -m /usr/src/linux/System.map (default) Warning: You did not tell me where to find symbol information. I will assume that the log matches the kernel and modules that are running right now and I'll use the default options above for symbol resolution. If the current kernel and/or modules do not match the log, you can get more accurate output by telling me the kernel version and where to find map, modules, ksyms etc. ksymoops -h explains the options. No modules in ksyms, skipping objects Warning (read_lsmod): no symbols in lsmod, is /proc/modules a valid lsmod file? Intel Pentium with F0 0F bug - workaround enabled. Uhhuh. NMI received. Dazed and confused, but trying to continue Uhhuh. NMI received for unknown reason 35. Unable to handle kernel NULL pointer dereference at virtual address 00000000 c013f084 *pde = 00000000 Oops: 0000 CPU: 0 EIP: 0010:[<c013f084>] Using defaults from ksymoops -t elf32-i386 -a i386 EFLAGS: 00010203 eax: c11cac30 ebx: ffffffe8 ecx: 0000000e edx: c11c0000 esi: 3af9f1c1 edi: c58d3f68 ebp: 00000000 esp: c58d3f04 ds: 0018 es: 0018 ss: 0018 Process find (pid: 6064, stackpage=c58d3000) Stack: 3af9f1c1 00000000 c58d3f68 c1cc800b c11cac30 c1cc8000 3af9f1c1 0000000b c0137000 c0cbf8c0 c58d3f68 3af9f1c1 c01377f8 c0cbf8c0 c58d3f68 00000000 c1cc8000 00000000 c58d3fa4 bffff4e0 c58d2000 c0136e20 c58d2000 00000008 Call Trace: [<c0137000>] [<c01377f8>] [<c0136e20>] [<c0137e34>] [<c0134aee>] [<c012d1cf>] [<c0108e13>] Code: 8b 6d 00 8b 74 24 18 39 73 48 75 78 8b 74 24 24 39 73 0c 75 >>EIP; c013f084 <d_lookup+60/fc> <===== Trace; c0137000 <cached_lookup+10/54> Trace; c01377f8 <path_walk+5b4/83c> Trace; c0136e20 <getname+5c/a0> Trace; c0137e34 <__user_walk+3c/58> Trace; c0134aee <sys_newlstat+16/74> Trace; c012d1cf <sys_close+43/54> Trace; c0108e13 <system_call+33/40> Code; c013f084 <d_lookup+60/fc> 00000000 <_EIP>: Code; c013f084 <d_lookup+60/fc> <===== 0: 8b 6d 00 movl 0x0(%ebp),%ebp <===== Code; c013f087 <d_lookup+63/fc> 3: 8b 74 24 18 movl 0x18(%esp,1),%esi Code; c013f08b <d_lookup+67/fc> 7: 39 73 48 cmpl %esi,0x48(%ebx) Code; c013f08e <d_lookup+6a/fc> a: 75 78 jne 84 <_EIP+0x84> c013f108 <d_lookup+e4/fc> Code; c013f090 <d_lookup+6c/fc> c: 8b 74 24 24 movl 0x24(%esp,1),%esi Code; c013f094 <d_lookup+70/fc> 10: 39 73 0c cmpl %esi,0xc(%ebx) Code; c013f097 <d_lookup+73/fc> 13: 75 00 jne 15 <_EIP+0x15> c013f099 <d_lookup+75/fc> Unable to handle kernel NULL pointer dereference at virtual address 00000000 c013f084 *pde = 00000000 Oops: 0000 CPU: 0 EIP: 0010:[<c013f084>] EFLAGS: 00010203 eax: c11cac30 ebx: ffffffe8 ecx: 0000000e edx: c11c0000 esi: 3af9f1c1 edi: c1cb9f68 ebp: 00000000 esp: c1cb9f04 ds: 0018 es: 0018 ss: 0018 Process find (pid: 6844, stackpage=c1cb9000) Stack: 3af9f1c1 00000000 c1cb9f68 c371400b c11cac30 c3714000 3af9f1c1 0000000b c0137000 c0cbf8c0 c1cb9f68 3af9f1c1 c01377f8 c0cbf8c0 c1cb9f68 00000000 c3714000 00000000 c1cb9fa4 bffff4e0 c1cb8000 c0136e20 c1cb8000 00000008 Call Trace: [<c0137000>] [<c01377f8>] [<c0136e20>] [<c0137e34>] [<c0134aee>] [<c012d1cf>] [<c0108e13>] Code: 8b 6d 00 8b 74 24 18 39 73 48 75 78 8b 74 24 24 39 73 0c 75 >>EIP; c013f084 <d_lookup+60/fc> <===== Trace; c0137000 <cached_lookup+10/54> Trace; c01377f8 <path_walk+5b4/83c> Trace; c0136e20 <getname+5c/a0> Trace; c0137e34 <__user_walk+3c/58> Trace; c0134aee <sys_newlstat+16/74> Trace; c012d1cf <sys_close+43/54> Trace; c0108e13 <system_call+33/40> Code; c013f084 <d_lookup+60/fc> 00000000 <_EIP>: Code; c013f084 <d_lookup+60/fc> <===== 0: 8b 6d 00 movl 0x0(%ebp),%ebp <===== Code; c013f087 <d_lookup+63/fc> 3: 8b 74 24 18 movl 0x18(%esp,1),%esi Code; c013f08b <d_lookup+67/fc> 7: 39 73 48 cmpl %esi,0x48(%ebx) Code; c013f08e <d_lookup+6a/fc> a: 75 78 jne 84 <_EIP+0x84> c013f108 <d_lookup+e4/fc> Code; c013f090 <d_lookup+6c/fc> c: 8b 74 24 24 movl 0x24(%esp,1),%esi Code; c013f094 <d_lookup+70/fc> 10: 39 73 0c cmpl %esi,0xc(%ebx) Code; c013f097 <d_lookup+73/fc> 13: 75 00 jne 15 <_EIP+0x15> c013f099 <d_lookup+75/fc> Unable to handle kernel NULL pointer dereference at virtual address 00000000 c013f084 *pde = 00000000 Oops: 0000 CPU: 0 EIP: 0010:[<c013f084>] EFLAGS: 00010203 eax: c11cac30 ebx: ffffffe8 ecx: 0000000e edx: c11c0000 esi: 3af9f1c1 edi: c1cb9f68 ebp: 00000000 esp: c1cb9f04 ds: 0018 es: 0018 ss: 0018 Process find (pid: 7624, stackpage=c1cb9000) Stack: 3af9f1c1 00000000 c1cb9f68 c1de000b c11cac30 c1de0000 3af9f1c1 0000000b c0137000 c0cbf8c0 c1cb9f68 3af9f1c1 c01377f8 c0cbf8c0 c1cb9f68 00000000 c1de0000 00000000 c1cb9fa4 bffff4e0 c1cb8000 c0136e20 c1cb8000 00000008 Call Trace: [<c0137000>] [<c01377f8>] [<c0136e20>] [<c0137e34>] [<c0134aee>] [<c012d1cf>] [<c0108e13>] Code: 8b 6d 00 8b 74 24 18 39 73 48 75 78 8b 74 24 24 39 73 0c 75 >>EIP; c013f084 <d_lookup+60/fc> <===== Trace; c0137000 <cached_lookup+10/54> Trace; c01377f8 <path_walk+5b4/83c> Trace; c0136e20 <getname+5c/a0> Trace; c0137e34 <__user_walk+3c/58> Trace; c0134aee <sys_newlstat+16/74> Trace; c012d1cf <sys_close+43/54> Trace; c0108e13 <system_call+33/40> Code; c013f084 <d_lookup+60/fc> 00000000 <_EIP>: Code; c013f084 <d_lookup+60/fc> <===== 0: 8b 6d 00 movl 0x0(%ebp),%ebp <===== Code; c013f087 <d_lookup+63/fc> 3: 8b 74 24 18 movl 0x18(%esp,1),%esi Code; c013f08b <d_lookup+67/fc> 7: 39 73 48 cmpl %esi,0x48(%ebx) Code; c013f08e <d_lookup+6a/fc> a: 75 78 jne 84 <_EIP+0x84> c013f108 <d_lookup+e4/fc> Code; c013f090 <d_lookup+6c/fc> c: 8b 74 24 24 movl 0x24(%esp,1),%esi Code; c013f094 <d_lookup+70/fc> 10: 39 73 0c cmpl %esi,0xc(%ebx) Code; c013f097 <d_lookup+73/fc> 13: 75 00 jne 15 <_EIP+0x15> c013f099 <d_lookup+75/fc> 2 warnings issued. Results may not be reliable. - To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to [EMAIL PROTECTED] More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/