Unable to handle kernel NULL pointer dereference at virtual address
0000004e
current->tss.cr3 = 0122d000, %cr3 = 0122d000
*pde = 00000000
Oops: 0000
CPU: 0
EIP: 0010:[<c01297aa>]
EFLAGS: 00010282
eax: c222d840 ebx: c222d840 ecx: 00000000 edx: fffffffe
esi: c222d840 edi: c2ce4ea0 ebp: 00000001 esp: c03aff18
ds: 0018 es: 0018 ss: 0018
Process tin (pid: 3699, process nr: 51, stackpage=c03af000)
Stack: c222d840 c2ce4ea0 c26d6019 c012999c c2ce4ea0 c222d840 c26d6000 000001b6
00000242 000001b6 000081a4 00000001 c0129500 c26d600f 0000000a 218206cb
c0129aa8 c26d6000 00000000 00000001 c24a4b40 000001b6 c26d6000 000001b6
Call Trace: [<c012999c>] [<c0129500>] [<c0129aa8>] [<c0121e83>] [<c0122037>] [<c01091fa>]
Code: 8b 42 50 85 c0 74 5d 83 78 2c 00 74 57 89 e0 89 c3 81 e3 00
Segmentation fault
Here's the trace:
Using `/boot/System.map' to map addresses to symbols.
>>EIP: c01297aa <do_follow_link+12/88>
Trace: c012999c <lookup_dentry+17c/1bc>
Trace: c0129500 <getname+bc/144>
Trace: c0129aa8 <open_namei+48/314>
Trace: c0121e83 <do_open+4b/134>
Trace: c0122037 <sys_open+3b/6c>
Trace: c01091fa <system_call+3a/40>
Code: c01297aa <do_follow_link+12/88>
Code: c01297aa <do_follow_link+12/88> 8b 42 50 movl 0x50(%edx),%eax
Code: c01297ad <do_follow_link+15/88> 85 c0 testl %eax,%eax
Code: c01297af <do_follow_link+17/88> 74 5d je c012980e <do_follow_link+76/88>
Code: c01297b1 <do_follow_link+19/88> 83 78 2c 00 cmpl $0x0,0x2c(%eax)
Code: c01297bb <do_follow_link+23/88> 74 57 je c012980e <do_follow_link+76/88>
Code: c01297bd <do_follow_link+25/88> 89 e0 movl %esp,%eax
Code: c01297bf <do_follow_link+27/88> 89 c3 movl %eax,%ebx
Code: c01297c1 <do_follow_link+29/88> 81 e3 00 00 90 andl $0x90900000,%ebx
Code: c01297cd <do_follow_link+35/88> 90 nop
Hope that's of use.
John Hayward-Warburton