Unable to boot the RHEL 6 XEN guest with kernel-2.6.32-696.20.1.el6.x86_64.
Issue
- The Xen guest fails to boot with the following logs
------------[ cut here ]------------
WARNING: at /builddir/build/BUILD/kernel-2.6.32-696.20.1.el6/linux-2.6.32-696.20.1.el6.x86_64/arch/x86/include/asm/tlbflush.h:147 kaiser_remove_mapping+0x127/0x140() (Not tainted)
Modules linked in: xenfs ipv6 microcode xen_netfront ext4 jbd2 mbcache xen_blkfront dm_mirror dm_region_hash dm_log dm_mod [last unloaded: scsi_wait_scan]
Pid: 1004, comm: xe-daemon Not tainted 2.6.32-696.20.1.el6.x86_64 #1
Call Trace:
[<ffffffff8107cf61>] ? warn_slowpath_common+0x91/0xe0
[<ffffffff81004add>] ? __raw_callee_save_xen_make_pte+0x11/0x1e
[<ffffffff8107cfca>] ? warn_slowpath_null+0x1a/0x20
[<ffffffff81058997>] ? kaiser_remove_mapping+0x127/0x140
[<ffffffff8100f73a>] ? destroy_context+0x3a/0xc0
[<ffffffff8107a0cb>] ? __mmdrop+0x2b/0x60
[<ffffffff8107a1d5>] ? mmput+0xd5/0x120
[<ffffffff811a3c43>] ? flush_old_exec+0x4b3/0x790
[<ffffffff8119b02f>] ? vfs_read+0x12f/0x1a0
[<ffffffff811f76c0>] ? load_elf_binary+0x350/0x1b50
[<ffffffff81004aa1>] ? __raw_callee_save_xen_pte_val+0x11/0x1e
[<ffffffff81155f51>] ? follow_page+0x4b1/0x540
[<ffffffff8115b220>] ? __get_user_pages+0x110/0x430
[<ffffffff811f496e>] ? load_misc_binary+0x9e/0x3f0
[<ffffffff8115b5d9>] ? get_user_pages+0x49/0x50
[<ffffffff811a3559>] ? search_binary_handler+0x139/0x370
[<ffffffff811f110f>] ? compat_do_execve+0x20f/0x290
[<ffffffff8105beca>] ? sys32_execve+0x4a/0x80
[<ffffffff81559a45>] ? ia32_ptregs_common+0x25/0xbb
[<ffffffff81558ec6>] ? ia32_sysenter_target+0x126/0x213
[<ffffffff81558ebf>] ? ia32_sysenter_target+0x11f/0x213
[<ffffffff81558eb8>] ? ia32_sysenter_target+0x118/0x213
[<ffffffff81558eb1>] ? ia32_sysenter_target+0x111/0x213
---[ end trace b24ea8f7f372c395 ]---
1 multicall(s) failed: cpu 0
Pid: 996, comm: xe-daemon Tainted: G W -- ------------ 2.6.32-696.20.1.el6.x86_64 #1
Call Trace:
[<ffffffff81004843>] ? xen_mc_flush+0x1c3/0x250
[<ffffffff810072bd>] ? __xen_pgd_pin+0xdd/0x140
[<ffffffff81007354>] ? xen_dup_mmap+0x34/0x50
[<ffffffff8107a659>] ? dup_mm+0x439/0x520
[<ffffffff8107b862>] ? copy_process+0xe12/0x1520
[<ffffffff8107c006>] ? do_fork+0x96/0x4c0
[<ffffffff811bad52>] ? alloc_fd+0x92/0x160
[<ffffffff811973c7>] ? fd_install+0x47/0x90
[<ffffffff81558f36>] ? ia32_sysenter_target+0x196/0x213
[<ffffffff8105be76>] ? sys32_clone+0x26/0x30
[<ffffffff81559a45>] ? ia32_ptregs_common+0x25/0xbb
[<ffffffff81558ec6>] ? ia32_sysenter_target+0x126/0x213
[<ffffffff81558ebf>] ? ia32_sysenter_target+0x11f/0x213
[<ffffffff81558eb8>] ? ia32_sysenter_target+0x118/0x213
[<ffffffff81558eb1>] ? ia32_sysenter_target+0x111/0x213
call 1/19: op=14 arg=[ffff8800faf0b000] result=0 xen_pin_page+0x6f/0x110
Environment
- Red Hat Enterprise Linux 6
- kernel-2.6.32-696.20.1.el6.x86_64
- XEN hypervisor guest
- xe-guest-utilities-7.1.0-41.x86_64
Subscriber exclusive content
A Red Hat subscription provides unlimited access to our knowledgebase, tools, and much more.