WARNING - OLD ARCHIVES

This is an archived copy of the Xen.org mailing list, which we have preserved to ensure that existing links to archives are not broken. The live archive, which contains the latest emails, can be found at http://lists.xen.org/
   
 
 
Xen 
 
Home Products Support Community News
 
   
 

xen-users

[Xen-users] Unable to handle kernel paging request at virtual address cf

To: xen-users@xxxxxxxxxxxxxxxxxxx
Subject: [Xen-users] Unable to handle kernel paging request at virtual address cfd0f11c
From: Jorge Davila <davila@xxxxxxxxxxxxxxxxxxxxxxx>
Date: Fri, 04 Aug 2006 07:20:44 -0600
Delivery-date: Fri, 04 Aug 2006 06:21:30 -0700
Envelope-to: www-data@xxxxxxxxxxxxxxxxxx
List-help: <mailto:xen-users-request@lists.xensource.com?subject=help>
List-id: Xen user discussion <xen-users.lists.xensource.com>
List-post: <mailto:xen-users@lists.xensource.com>
List-subscribe: <http://lists.xensource.com/cgi-bin/mailman/listinfo/xen-users>, <mailto:xen-users-request@lists.xensource.com?subject=subscribe>
List-unsubscribe: <http://lists.xensource.com/cgi-bin/mailman/listinfo/xen-users>, <mailto:xen-users-request@lists.xensource.com?subject=unsubscribe>
Organization: NicaraguaOpenSource.com
Reply-to: davila@xxxxxxxxxxxxxxxxxxxxxxx
Sender: xen-users-bounces@xxxxxxxxxxxxxxxxxxx
Hello all!:

Someone can give some light about this messages?

The dom0/domU are fedora core 3 systems.

I was able to login to the system but I want to know what kind of error
is showed here.

Thanks,

Jorge Davila.

xm console LTSDom
************ REMOTE CONSOLE: CTRL-] TO QUIT ********
device eth0 entered promiscuous mode
device eth0 left promiscuous mode
device eth0 entered promiscuous mode
device eth0 left promiscuous mode
device eth0 entered promiscuous mode
device eth0 left promiscuous mode
Unable to handle kernel paging request at virtual address cfd0f11c
 printing eip:
c0142780
*pde = ma 1ff5b067 pa 0003d067
*pte = ma 2aac5063 pa 0fd0f063
 [<c014299e>] zap_pmd_range+0x57/0x75
 [<c01429f6>] zap_pud_range+0x3a/0x5e
 [<c0142a8e>] unmap_page_range+0x74/0x8b
 [<c0142ba2>] unmap_vmas+0xfd/0x21c
 [<c0147c6e>] exit_mmap+0x84/0x15b
 [<c01176da>] mmput+0x2b/0x93
 [<c015d832>] exec_mmap+0xd5/0x13c
 [<c015da37>] flush_old_exec+0x104/0x902
 [<c01535a6>] vfs_read+0xb9/0x129
 [<c015d754>] kernel_read+0x4a/0x53
 [<c017ae2c>] load_elf_binary+0x37d/0xc92
 [<c012856e>] in_group_p+0x3c/0x70
 [<c017aaaf>] load_elf_binary+0x0/0xc92
 [<c015e4cd>] search_binary_handler+0xbb/0x303
 [<c017a094>] load_script+0x230/0x25c
 [<c0236405>] copy_from_user+0x3d/0x68
 [<c0179e64>] load_script+0x0/0x25c
 [<c015e4cd>] search_binary_handler+0xbb/0x303
 [<c015e895>] do_execve+0x180/0x1fa
 [<c0107937>] sys_execve+0x3d/0x85
 [<c0108d3c>] syscall_call+0x7/0xb
Oops: 0003 [#3]
PREEMPT
Modules linked in:
CPU:    0
EIP:    0061:[<c0142780>]    Not tainted VLI
EFLAGS: 00010202   (2.6.11.12-xenUIPSecTun)
EIP is at zap_pte_range+0x14b/0x312
eax: 00000000   ebx: 39ada025   ecx: c13397c0   edx: 0001a000
esi: 00000000   edi: 00039ada   ebp: cfd0f11c   esp: c9869c20
ds: 007b   es: 007b   ss: 0069
Process sh (pid: 16528, threadinfo=c9868000 task=cd4b8510)
Stack: c0387e44 00000000 00000008 00000000 c13397c0 00000000 00008000
08047000
       c039fe70 08447000 cee84084 0804f000 00000000 c014299e c039fe70
cee84080
       08047000 00008000 00000000 08047000 cee84084 0804f000 00000000
c01429f6
Call Trace:
 [<c0387e44>] kernel_param_sysfs_setup+0x9a/0xb7
 [<c014299e>] zap_pmd_range+0x57/0x75
 [<c01429f6>] zap_pud_range+0x3a/0x5e
 [<c0142a8e>] unmap_page_range+0x74/0x8b
 [<c0142ba2>] unmap_vmas+0xfd/0x21c
 [<c0147c6e>] exit_mmap+0x84/0x15b
 [<c01176da>] mmput+0x2b/0x93
 [<c015d832>] exec_mmap+0xd5/0x13c
 [<c015da37>] flush_old_exec+0x104/0x902
 [<c01535a6>] vfs_read+0xb9/0x129
 [<c015d754>] kernel_read+0x4a/0x53
 [<c017ae2c>] load_elf_binary+0x37d/0xc92
 [<c012856e>] in_group_p+0x3c/0x70
 [<c017aaaf>] load_elf_binary+0x0/0xc92
 [<c015e4cd>] search_binary_handler+0xbb/0x303
 [<c017a094>] load_script+0x230/0x25c
 [<c0236405>] copy_from_user+0x3d/0x68
 [<c0179e64>] load_script+0x0/0x25c
 [<c015e4cd>] search_binary_handler+0xbb/0x303
 [<c015e895>] do_execve+0x180/0x1fa
 [<c0107937>] sys_execve+0x3d/0x85
 [<c0108d3c>] syscall_call+0x7/0xb
Code: b0 8c 3a c0 89 4c 24 10 01 c1 8b 01 f6 c4 08 b8 00 00 00 00 0f 44
c1 89 44 24 10 8b 44 24 14 85 c0 0f 85 ea 00 00 00 85 db 74 07 <c7> 45
00 00 00 00 00 8b 44 24 20 c7 40 08 01 00 00 00 8b 44 24
 <6>note: sh[16528] exited with preempt_count 1

-- 
Jorge Isaac Davila Lopez
Nicaragua Open Source
+505 808 2478
davila@xxxxxxxxxxxxxxxxxxxxxxx


_______________________________________________
Xen-users mailing list
Xen-users@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-users

<Prev in Thread] Current Thread [Next in Thread>
  • [Xen-users] Unable to handle kernel paging request at virtual address cfd0f11c, Jorge Davila <=