Unable to boot the RHEL 6 XEN guest with kernel-2.6.32-696.20.1.el6.x86_64.
Issue
- The Xen guest fails to boot with the following logs
------------[ cut here ]------------
WARNING: at /builddir/build/BUILD/kernel-2.6.32-696.20.1.el6/linux-2.6.32-696.20.1.el6.x86_64/arch/x86/include/asm/tlbflush.h:147 kaiser_remove_mapping+0x127/0x140() (Not tainted)
Modules linked in: xenfs ipv6 microcode xen_netfront ext4 jbd2 mbcache xen_blkfront dm_mirror dm_region_hash dm_log dm_mod [last unloaded: scsi_wait_scan]
Pid: 1004, comm: xe-daemon Not tainted 2.6.32-696.20.1.el6.x86_64 #1
Call Trace:
[<ffffffff8107cf61>] ? warn_slowpath_common+0x91/0xe0
[<ffffffff81004add>] ? __raw_callee_save_xen_make_pte+0x11/0x1e
[<ffffffff8107cfca>] ? warn_slowpath_null+0x1a/0x20
[<ffffffff81058997>] ? kaiser_remove_mapping+0x127/0x140
[<ffffffff8100f73a>] ? destroy_context+0x3a/0xc0
[<ffffffff8107a0cb>] ? __mmdrop+0x2b/0x60
[<ffffffff8107a1d5>] ? mmput+0xd5/0x120
[<ffffffff811a3c43>] ? flush_old_exec+0x4b3/0x790
[<ffffffff8119b02f>] ? vfs_read+0x12f/0x1a0
[<ffffffff811f76c0>] ? load_elf_binary+0x350/0x1b50
[<ffffffff81004aa1>] ? __raw_callee_save_xen_pte_val+0x11/0x1e
[<ffffffff81155f51>] ? follow_page+0x4b1/0x540
[<ffffffff8115b220>] ? __get_user_pages+0x110/0x430
[<ffffffff811f496e>] ? load_misc_binary+0x9e/0x3f0
[<ffffffff8115b5d9>] ? get_user_pages+0x49/0x50
[<ffffffff811a3559>] ? search_binary_handler+0x139/0x370
[<ffffffff811f110f>] ? compat_do_execve+0x20f/0x290
[<ffffffff8105beca>] ? sys32_execve+0x4a/0x80
[<ffffffff81559a45>] ? ia32_ptregs_common+0x25/0xbb
[<ffffffff81558ec6>] ? ia32_sysenter_target+0x126/0x213
[<ffffffff81558ebf>] ? ia32_sysenter_target+0x11f/0x213
[<ffffffff81558eb8>] ? ia32_sysenter_target+0x118/0x213
[<ffffffff81558eb1>] ? ia32_sysenter_target+0x111/0x213
---[ end trace b24ea8f7f372c395 ]---
1 multicall(s) failed: cpu 0
Pid: 996, comm: xe-daemon Tainted: G W -- ------------ 2.6.32-696.20.1.el6.x86_64 #1
Call Trace:
[<ffffffff81004843>] ? xen_mc_flush+0x1c3/0x250
[<ffffffff810072bd>] ? __xen_pgd_pin+0xdd/0x140
[<ffffffff81007354>] ? xen_dup_mmap+0x34/0x50
[<ffffffff8107a659>] ? dup_mm+0x439/0x520
[<ffffffff8107b862>] ? copy_process+0xe12/0x1520
[<ffffffff8107c006>] ? do_fork+0x96/0x4c0
[<ffffffff811bad52>] ? alloc_fd+0x92/0x160
[<ffffffff811973c7>] ? fd_install+0x47/0x90
[<ffffffff81558f36>] ? ia32_sysenter_target+0x196/0x213
[<ffffffff8105be76>] ? sys32_clone+0x26/0x30
[<ffffffff81559a45>] ? ia32_ptregs_common+0x25/0xbb
[<ffffffff81558ec6>] ? ia32_sysenter_target+0x126/0x213
[<ffffffff81558ebf>] ? ia32_sysenter_target+0x11f/0x213
[<ffffffff81558eb8>] ? ia32_sysenter_target+0x118/0x213
[<ffffffff81558eb1>] ? ia32_sysenter_target+0x111/0x213
call 1/19: op=14 arg=[ffff8800faf0b000] result=0 xen_pin_page+0x6f/0x110
Environment
- Red Hat Enterprise Linux 6
- kernel-2.6.32-696.20.1.el6.x86_64
- XEN hypervisor guest
- xe-guest-utilities-7.1.0-41.x86_64
Subscriber exclusive content
A Red Hat subscription provides unlimited access to our knowledgebase of over 48,000 articles and solutions.
Welcome! Check out the Getting Started with Red Hat page for quick tours and guides for common tasks.
