[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[Xen-users] Unable to handle kernel paging request at virtual address cfd0f11c



Hello all!:

Someone can give some light about this messages?

The dom0/domU are fedora core 3 systems.

I was able to login to the system but I want to know what kind of error
is showed here.

Thanks,

Jorge Davila.

xm console LTSDom
************ REMOTE CONSOLE: CTRL-] TO QUIT ********
device eth0 entered promiscuous mode
device eth0 left promiscuous mode
device eth0 entered promiscuous mode
device eth0 left promiscuous mode
device eth0 entered promiscuous mode
device eth0 left promiscuous mode
Unable to handle kernel paging request at virtual address cfd0f11c
 printing eip:
c0142780
*pde = ma 1ff5b067 pa 0003d067
*pte = ma 2aac5063 pa 0fd0f063
 [<c014299e>] zap_pmd_range+0x57/0x75
 [<c01429f6>] zap_pud_range+0x3a/0x5e
 [<c0142a8e>] unmap_page_range+0x74/0x8b
 [<c0142ba2>] unmap_vmas+0xfd/0x21c
 [<c0147c6e>] exit_mmap+0x84/0x15b
 [<c01176da>] mmput+0x2b/0x93
 [<c015d832>] exec_mmap+0xd5/0x13c
 [<c015da37>] flush_old_exec+0x104/0x902
 [<c01535a6>] vfs_read+0xb9/0x129
 [<c015d754>] kernel_read+0x4a/0x53
 [<c017ae2c>] load_elf_binary+0x37d/0xc92
 [<c012856e>] in_group_p+0x3c/0x70
 [<c017aaaf>] load_elf_binary+0x0/0xc92
 [<c015e4cd>] search_binary_handler+0xbb/0x303
 [<c017a094>] load_script+0x230/0x25c
 [<c0236405>] copy_from_user+0x3d/0x68
 [<c0179e64>] load_script+0x0/0x25c
 [<c015e4cd>] search_binary_handler+0xbb/0x303
 [<c015e895>] do_execve+0x180/0x1fa
 [<c0107937>] sys_execve+0x3d/0x85
 [<c0108d3c>] syscall_call+0x7/0xb
Oops: 0003 [#3]
PREEMPT
Modules linked in:
CPU:    0
EIP:    0061:[<c0142780>]    Not tainted VLI
EFLAGS: 00010202   (2.6.11.12-xenUIPSecTun)
EIP is at zap_pte_range+0x14b/0x312
eax: 00000000   ebx: 39ada025   ecx: c13397c0   edx: 0001a000
esi: 00000000   edi: 00039ada   ebp: cfd0f11c   esp: c9869c20
ds: 007b   es: 007b   ss: 0069
Process sh (pid: 16528, threadinfo=c9868000 task=cd4b8510)
Stack: c0387e44 00000000 00000008 00000000 c13397c0 00000000 00008000
08047000
       c039fe70 08447000 cee84084 0804f000 00000000 c014299e c039fe70
cee84080
       08047000 00008000 00000000 08047000 cee84084 0804f000 00000000
c01429f6
Call Trace:
 [<c0387e44>] kernel_param_sysfs_setup+0x9a/0xb7
 [<c014299e>] zap_pmd_range+0x57/0x75
 [<c01429f6>] zap_pud_range+0x3a/0x5e
 [<c0142a8e>] unmap_page_range+0x74/0x8b
 [<c0142ba2>] unmap_vmas+0xfd/0x21c
 [<c0147c6e>] exit_mmap+0x84/0x15b
 [<c01176da>] mmput+0x2b/0x93
 [<c015d832>] exec_mmap+0xd5/0x13c
 [<c015da37>] flush_old_exec+0x104/0x902
 [<c01535a6>] vfs_read+0xb9/0x129
 [<c015d754>] kernel_read+0x4a/0x53
 [<c017ae2c>] load_elf_binary+0x37d/0xc92
 [<c012856e>] in_group_p+0x3c/0x70
 [<c017aaaf>] load_elf_binary+0x0/0xc92
 [<c015e4cd>] search_binary_handler+0xbb/0x303
 [<c017a094>] load_script+0x230/0x25c
 [<c0236405>] copy_from_user+0x3d/0x68
 [<c0179e64>] load_script+0x0/0x25c
 [<c015e4cd>] search_binary_handler+0xbb/0x303
 [<c015e895>] do_execve+0x180/0x1fa
 [<c0107937>] sys_execve+0x3d/0x85
 [<c0108d3c>] syscall_call+0x7/0xb
Code: b0 8c 3a c0 89 4c 24 10 01 c1 8b 01 f6 c4 08 b8 00 00 00 00 0f 44
c1 89 44 24 10 8b 44 24 14 85 c0 0f 85 ea 00 00 00 85 db 74 07 <c7> 45
00 00 00 00 00 8b 44 24 20 c7 40 08 01 00 00 00 8b 44 24
 <6>note: sh[16528] exited with preempt_count 1

-- 
Jorge Isaac Davila Lopez
Nicaragua Open Source
+505 808 2478
davila@xxxxxxxxxxxxxxxxxxxxxxx


_______________________________________________
Xen-users mailing list
Xen-users@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-users


 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.