Unable to boot the RHEL 6 XEN guest with kernel-2.6.32-696.20.1.el6.x86_64.

Solution Verified - Updated -

Issue

  • The Xen guest fails to boot with the following logs
------------[ cut here ]------------
WARNING: at /builddir/build/BUILD/kernel-2.6.32-696.20.1.el6/linux-2.6.32-696.20.1.el6.x86_64/arch/x86/include/asm/tlbflush.h:147 kaiser_remove_mapping+0x127/0x140() (Not tainted)
Modules linked in: xenfs ipv6 microcode xen_netfront ext4 jbd2 mbcache xen_blkfront dm_mirror dm_region_hash dm_log dm_mod [last unloaded: scsi_wait_scan]
Pid: 1004, comm: xe-daemon Not tainted 2.6.32-696.20.1.el6.x86_64 #1
Call Trace:
 [<ffffffff8107cf61>] ? warn_slowpath_common+0x91/0xe0
 [<ffffffff81004add>] ? __raw_callee_save_xen_make_pte+0x11/0x1e
 [<ffffffff8107cfca>] ? warn_slowpath_null+0x1a/0x20
 [<ffffffff81058997>] ? kaiser_remove_mapping+0x127/0x140
 [<ffffffff8100f73a>] ? destroy_context+0x3a/0xc0
 [<ffffffff8107a0cb>] ? __mmdrop+0x2b/0x60
 [<ffffffff8107a1d5>] ? mmput+0xd5/0x120
 [<ffffffff811a3c43>] ? flush_old_exec+0x4b3/0x790
 [<ffffffff8119b02f>] ? vfs_read+0x12f/0x1a0
 [<ffffffff811f76c0>] ? load_elf_binary+0x350/0x1b50
 [<ffffffff81004aa1>] ? __raw_callee_save_xen_pte_val+0x11/0x1e
 [<ffffffff81155f51>] ? follow_page+0x4b1/0x540
 [<ffffffff8115b220>] ? __get_user_pages+0x110/0x430
 [<ffffffff811f496e>] ? load_misc_binary+0x9e/0x3f0
 [<ffffffff8115b5d9>] ? get_user_pages+0x49/0x50
 [<ffffffff811a3559>] ? search_binary_handler+0x139/0x370
 [<ffffffff811f110f>] ? compat_do_execve+0x20f/0x290
 [<ffffffff8105beca>] ? sys32_execve+0x4a/0x80
 [<ffffffff81559a45>] ? ia32_ptregs_common+0x25/0xbb
 [<ffffffff81558ec6>] ? ia32_sysenter_target+0x126/0x213
 [<ffffffff81558ebf>] ? ia32_sysenter_target+0x11f/0x213
 [<ffffffff81558eb8>] ? ia32_sysenter_target+0x118/0x213
 [<ffffffff81558eb1>] ? ia32_sysenter_target+0x111/0x213
---[ end trace b24ea8f7f372c395 ]---
1 multicall(s) failed: cpu 0
Pid: 996, comm: xe-daemon Tainted: G        W  -- ------------    2.6.32-696.20.1.el6.x86_64 #1
Call Trace:
 [<ffffffff81004843>] ? xen_mc_flush+0x1c3/0x250
 [<ffffffff810072bd>] ? __xen_pgd_pin+0xdd/0x140
 [<ffffffff81007354>] ? xen_dup_mmap+0x34/0x50
 [<ffffffff8107a659>] ? dup_mm+0x439/0x520
 [<ffffffff8107b862>] ? copy_process+0xe12/0x1520
 [<ffffffff8107c006>] ? do_fork+0x96/0x4c0
 [<ffffffff811bad52>] ? alloc_fd+0x92/0x160
 [<ffffffff811973c7>] ? fd_install+0x47/0x90
 [<ffffffff81558f36>] ? ia32_sysenter_target+0x196/0x213
 [<ffffffff8105be76>] ? sys32_clone+0x26/0x30
 [<ffffffff81559a45>] ? ia32_ptregs_common+0x25/0xbb
 [<ffffffff81558ec6>] ? ia32_sysenter_target+0x126/0x213
 [<ffffffff81558ebf>] ? ia32_sysenter_target+0x11f/0x213
 [<ffffffff81558eb8>] ? ia32_sysenter_target+0x118/0x213
 [<ffffffff81558eb1>] ? ia32_sysenter_target+0x111/0x213
  call  1/19: op=14 arg=[ffff8800faf0b000] result=0 xen_pin_page+0x6f/0x110

Environment

  • Red Hat Enterprise Linux 6
  • kernel-2.6.32-696.20.1.el6.x86_64
  • XEN hypervisor guest
  • xe-guest-utilities-7.1.0-41.x86_64

Subscriber exclusive content

A Red Hat subscription provides unlimited access to our knowledgebase, tools, and much more.

Current Customers and Partners

Log in for full access

Log In

New to Red Hat?

Learn more about Red Hat subscriptions

Using a Red Hat product through a public cloud?

How to access this content