Xen Oops
Unable to handle kernel paging request at virtual address 62cbda43
printing eip:
c0177c6b
02192000 -> *pde = 00000001:c8ac2001
02015000 -> *pme = 00000000:00000000
Oops: 0000 [#1]
SMP
Modules linked in:
CPU: 1
EIP: 0061:[<c0177c6b>] Not tainted VLI
EFLAGS: 00010206 (2.6.16.13-domU-linode3 #1)
EIP is at __link_path_walk+0x17b/0xe50
eax: 62cbda1b ebx: 00000000 ecx: 00000000 edx: c47db414
esi: c2e25e2c edi: c0fb7214 ebp: c4f7c013 esp: c2e25df0
ds: 007b es: 007b ss: 0069
Process sh (pid: 27738, threadinfo=c2e24000 task=c28c4030)
Stack: <0>c2e25f08 00000001 0000019f c2e24000 c2e24000 c2e24000 c2e24000 c2e24000
c2e25f08 c4f7c00b 00000001 c2e24000 c2e24000 00000007 00000007 f44feac3
00000007 c4f7c00b c05f2240 c47db414 c2e24000 c05f2240 c5f63c94 c2e25f08
Call Trace:
[<c017899d>] link_path_walk+0x5d/0x100
[<c014907a>] __alloc_pages+0x6a/0x300
[<c0178eee>] do_path_lookup+0x11e/0x270
[<c017668a>] getname+0xda/0x100
[<c017969c>] __user_walk_fd+0x3c/0x70
[<c0171d34>] vfs_stat_fd+0x24/0x60
[<c014907a>] __alloc_pages+0x6a/0x300
[<c0171d8f>] vfs_stat+0x1f/0x30
[<c0172738>] sys_stat64+0x18/0x40
[<c0112ba0>] do_page_fault+0x0/0x961
[<c0105289>] syscall_call+0x7/0xb
Code: 2c fd ff ff 85 c0 89 c3 0f 85 23 02 00 00 8b 54 24 4c 8b 7a 0c 85 ff 0f 84 2d 08 00 00 8b 87 94 00 00 00 85 c0 0f 84 e5 07 00 00 <8b> 48 28 85 c9 0f 84 b4 05 00 00 8b 4c 24 1c 8b 01 83 b8 b4 01
<1>Unable to handle kernel paging request at virtual address 7fe22d28
printing eip:
c0163dd9
05092000 -> *pde = 00000001:fde5d001
05879000 -> *pme = 00000000:00000000
Oops: 0002 [#2]
SMP
Modules linked in:
CPU: 0
EIP: 0061:[<c0163dd9>] Not tainted VLI
EFLAGS: 00210097 (2.6.16.13-domU-linode3 #1)
EIP is at cache_alloc_refill+0xb9/0x560
eax: c008e4c0 ebx: 00000006 ecx: c008e4c0 edx: 7fe22d24
esi: c0fb7140 edi: 41a003b9 ebp: c00f77c0 esp: c3217d08
ds: 007b es: 007b ss: 0069
Process apache2 (pid: 27725, threadinfo=c3216000 task=c2044550)
Stack: <0>00000001 00000001 00000001 00000050 00003a89 00000050 c1197ec0 c00f8400
c008e4c0 00000000 c3859770 c3216000 c17c7c20 c281109c 00000007 00000000
00000000 c120da00 c1130be0 c0163d17 00000000 c120da00 c01e8bb8 c1197ec0
Call Trace:
[<c0163d17>] kmem_cache_alloc+0x77/0x80
[<c01e8bb8>] ext3_alloc_inode+0x18/0x50
[<c018256a>] alloc_inode+0x1a/0x160
[<c0183ac8>] iget_locked+0x78/0x152
[<c01e8466>] ext3_lookup+0x66/0xb0
[<c0177abe>] do_lookup+0x14e/0x180
[<c017830c>] __link_path_walk+0x81c/0xe50
[<c017899d>] link_path_walk+0x5d/0x100
[<c017c0b8>] poll_freewait+0x48/0x60
[<c0178eee>] do_path_lookup+0x11e/0x270
[<c017668a>] getname+0xda/0x100
[<c017969c>] __user_walk_fd+0x3c/0x70
[<c0171d34>] vfs_stat_fd+0x24/0x60
[<c017c0b8>] poll_freewait+0x48/0x60
[<c0171d8f>] vfs_stat+0x1f/0x30
[<c0172738>] sys_stat64+0x18/0x40
[<c012595b>] sys_gettimeofday+0x3b/0xa0
[<c0105289>] syscall_call+0x7/0xb
Code: 85 d2 0f 85 4a 01 00 00 85 db 7e 4f 8b 4c 24 20 8b 31 39 ce 0f 84 17 01 00 00 8b 44 24 18 8b 7e 10 39 78 38 77 6e 8b 16 8b 46 04 <89> 42 04 89 10 83 7e 14 ff c7 06 00 01 10 00 c7 46 04 00 02 20</c0105289></c012595b></c0172738></c0171d8f></c017c0b8></c0171d34></c017969c></c017668a></c0178eee></c017c0b8></c017899d></c017830c></c0177abe></c01e8466></c0183ac8></c018256a></c01e8bb8></c0163d17></c0163dd9></c0105289></c0112ba0></c0172738></c0171d8f></c014907a></c0171d34></c017969c></c017668a></c0178eee></c014907a></c017899d></c0177c6b>