Unable to boot the RHEL 6 XEN guest with kernel-2.6.32-696.20.1.el6.x86_64.

Solution Verified - Updated -

Issue

  • The Xen guest fails to boot with the following logs
------------[ cut here ]------------
WARNING: at /builddir/build/BUILD/kernel-2.6.32-696.20.1.el6/linux-2.6.32-696.20.1.el6.x86_64/arch/x86/include/asm/tlbflush.h:147 kaiser_remove_mapping+0x127/0x140() (Not tainted)
Modules linked in: xenfs ipv6 microcode xen_netfront ext4 jbd2 mbcache xen_blkfront dm_mirror dm_region_hash dm_log dm_mod [last unloaded: scsi_wait_scan]
Pid: 1004, comm: xe-daemon Not tainted 2.6.32-696.20.1.el6.x86_64 #1
Call Trace:
 [<ffffffff8107cf61>] ? warn_slowpath_common+0x91/0xe0
 [<ffffffff81004add>] ? __raw_callee_save_xen_make_pte+0x11/0x1e
 [<ffffffff8107cfca>] ? warn_slowpath_null+0x1a/0x20
 [<ffffffff81058997>] ? kaiser_remove_mapping+0x127/0x140
 [<ffffffff8100f73a>] ? destroy_context+0x3a/0xc0
 [<ffffffff8107a0cb>] ? __mmdrop+0x2b/0x60
 [<ffffffff8107a1d5>] ? mmput+0xd5/0x120
 [<ffffffff811a3c43>] ? flush_old_exec+0x4b3/0x790
 [<ffffffff8119b02f>] ? vfs_read+0x12f/0x1a0
 [<ffffffff811f76c0>] ? load_elf_binary+0x350/0x1b50
 [<ffffffff81004aa1>] ? __raw_callee_save_xen_pte_val+0x11/0x1e
 [<ffffffff81155f51>] ? follow_page+0x4b1/0x540
 [<ffffffff8115b220>] ? __get_user_pages+0x110/0x430
 [<ffffffff811f496e>] ? load_misc_binary+0x9e/0x3f0
 [<ffffffff8115b5d9>] ? get_user_pages+0x49/0x50
 [<ffffffff811a3559>] ? search_binary_handler+0x139/0x370
 [<ffffffff811f110f>] ? compat_do_execve+0x20f/0x290
 [<ffffffff8105beca>] ? sys32_execve+0x4a/0x80
 [<ffffffff81559a45>] ? ia32_ptregs_common+0x25/0xbb
 [<ffffffff81558ec6>] ? ia32_sysenter_target+0x126/0x213
 [<ffffffff81558ebf>] ? ia32_sysenter_target+0x11f/0x213
 [<ffffffff81558eb8>] ? ia32_sysenter_target+0x118/0x213
 [<ffffffff81558eb1>] ? ia32_sysenter_target+0x111/0x213
---[ end trace b24ea8f7f372c395 ]---
1 multicall(s) failed: cpu 0
Pid: 996, comm: xe-daemon Tainted: G        W  -- ------------    2.6.32-696.20.1.el6.x86_64 #1
Call Trace:
 [<ffffffff81004843>] ? xen_mc_flush+0x1c3/0x250
 [<ffffffff810072bd>] ? __xen_pgd_pin+0xdd/0x140
 [<ffffffff81007354>] ? xen_dup_mmap+0x34/0x50
 [<ffffffff8107a659>] ? dup_mm+0x439/0x520
 [<ffffffff8107b862>] ? copy_process+0xe12/0x1520
 [<ffffffff8107c006>] ? do_fork+0x96/0x4c0
 [<ffffffff811bad52>] ? alloc_fd+0x92/0x160
 [<ffffffff811973c7>] ? fd_install+0x47/0x90
 [<ffffffff81558f36>] ? ia32_sysenter_target+0x196/0x213
 [<ffffffff8105be76>] ? sys32_clone+0x26/0x30
 [<ffffffff81559a45>] ? ia32_ptregs_common+0x25/0xbb
 [<ffffffff81558ec6>] ? ia32_sysenter_target+0x126/0x213
 [<ffffffff81558ebf>] ? ia32_sysenter_target+0x11f/0x213
 [<ffffffff81558eb8>] ? ia32_sysenter_target+0x118/0x213
 [<ffffffff81558eb1>] ? ia32_sysenter_target+0x111/0x213
  call  1/19: op=14 arg=[ffff8800faf0b000] result=0 xen_pin_page+0x6f/0x110

Environment

  • Red Hat Enterprise Linux 6
  • kernel-2.6.32-696.20.1.el6.x86_64
  • XEN hypervisor guest
  • xe-guest-utilities-7.1.0-41.x86_64

Subscriber exclusive content

A Red Hat subscription provides unlimited access to our knowledgebase of over 48,000 articles and solutions.

Current Customers and Partners

Log in for full access

Log In
Close

Welcome! Check out the Getting Started with Red Hat page for quick tours and guides for common tasks.