Kexec and kernel oops

Adam Sulmicki adam at cfar.umd.edu
Sun Apr 13 02:24:00 CEST 2003


for oops report to be usefull it needs to be decoded.

see linux/Documentation/oops-tracing.txt

basically you need to turn them thuru ksymoops program first.

On Sun, 13 Apr 2003, Gregg C Levine wrote:

> Hello from Gregg C Levine
> Here is a strange bit of events, I just finished recompiling my Linux
> box's 2.4.20 kernel, after applying the kernel patch supplied by
> Andrew Ip. The patch applied with the usual amount of fuss. No
> problems surfaced during the build process. Nor with anything else.
> Except for the kernel exec tool. Since I wasn't sure if Andrew had
> back ported the ones from the 2.5 series to the 2.4.20, and 2.4.19
> ones, I chose the original command line one, and built that.
>
> I chose the original 2..2.19 kernel as the one to exec. Original that
> is, because this version of Slackware is 8.0, and that's the version
> that works for it to install correctly here. Also the tools that I
> have used, are from that release version.
> Each of the different versions of the make elf Image tools from 1.6,
> to 2.0 that I tried,. gave me an oops message, and caused the program
> to abort with a segmentation fault. Here's a cut and paste of my oops
> message from the dmesg log:
> Script started on Sun Apr 13 02:36:24 2003
>
> root at who4:/usr/src/LoBos/work#
> kernel BUG at slab.c:1437!
> invalid operand: 0000
> CPU:    0
> EIP:    0010:[<c012b79a>]    Not tainted
> EFLAGS: 00010016
> eax: 5a2cf071   ebx: c10b6020   ecx: c105f2c0   edx: 6444c888
> esi: c10b6f18   edi: 0002df48   ebp: c0eafd40   esp: c0eafd20
> ds: 0018   es: 0018   ss: 0018
> Process kexec (pid: 131, stackpage=c0eaf000)
> Stack: 04000000 00010740 c10b6f9c c0eafd9c 00000080 c10b6f1c 00000282
> c105f2c0
>        c0eafd9c c014f00e c10b6f1c 00000080 c0eafdd0 c0eafe9c 00000000
> 00010740
>        00000004 c10b6f1c 464c457f 00010101 00000000 00000000 00030002
> 00000001
> Call Trace:    [<c014f00e>] [<c014b903>] [<c012041d>] [<c01bdfbd>]
> [<c0186c38>]
>   [<c017f32f>] [<c017b02e>] [<c017f14c>] [<c0132e27>] [<c0108a73>]
>
> Code: 0f 0b 9d 05 80 89 22 c0 8b 7d fc b8 71 f0 2c 5a 89 f2 03 57
>  kernel BUG at slab.c:1437!
> invalid operand: 0000
> CPU:    0
> EIP:    0010:[<c012b79a>]    Not tainted
> EFLAGS: 00010016
> eax: 5a2cf071   ebx: c10b6020   ecx: c105f2c0   edx: 6444c888
> esi: c10b69c8   edi: 0002df48   ebp: c0e8dd40   esp: c0e8dd20
> ds: 0018   es: 0018   ss: 0018
> Process kexec (pid: 146, stackpage=c0e8d000)
> Stack: 04000000 00010740 c10b6a4c c0e8dd9c 00000080 c10b69cc 00000286
> c105f2c0
>        c0e8dd9c c014f00e c10b69cc 00000080 c0e8ddd0 c0e8de9c 00000000
> 00010740
>        00000004 c10b69cc 464c457f 00010101 00000000 00000000 00030002
> 00000001
> Call Trace:    [<c014f00e>] [<c014b903>] [<c012041d>] [<c01bdfbd>]
> [<c0186c38>]
>   [<c017f32f>] [<c017b02e>] [<c017f14c>] [<c0132e27>] [<c0108a73>]
>
> Code: 0f 0b 9d 05 80 89 22 c0 8b 7d fc b8 71 f0 2c 5a 89 f2 03 57
>  kernel BUG at slab.c:1437!
> invalid operand: 0000
> CPU:    0
> EIP:    0010:[<c012b79a>]    Not tainted
> EFLAGS: 00010016
> eax: 5a2cf071   ebx: c10b6020   ecx: c105f2c0   edx: 6444c888
> esi: c10b6f18   edi: 0002df48   ebp: c0e8dd40   esp: c0e8dd20
> ds: 0018   es: 0018   ss: 0018
> Process kexec (pid: 150, stackpage=c0e8d000)
> Stack: 04000000 00010740 c10b6f9c c0e8dd9c 00000080 c10b6f1c 00000282
> c105f2c0
>        c0e8dd9c c014f00e c10b6f1c 00000080 c0e8ddd0 c0e8de9c 00000000
> 00010740
>        00000004 c10b6f1c 464c457f 00010101 00000000 00000000 00030002
> 00000001
> Call Trace:    [<c014f00e>] [<c014b903>] [<c012041d>] [<c01bdfbd>]
> [<c0186c38>]
>   [<c017f32f>] [<c017b02e>] [<c017f14c>] [<c0132e27>] [<c0108a73>]
>
> Code: 0f 0b 9d 05 80 89 22 c0 8b 7d fc b8 71 f0 2c 5a 89 f2 03 57
>  kernel BUG at slab.c:1437!
> invalid operand: 0000
> CPU:    0
> EIP:    0010:[<c012b79a>]    Not tainted
> EFLAGS: 00010016
> eax: 5a2cf071   ebx: c10b6020   ecx: c105f2c0   edx: 6444c888
> esi: c10b69c8   edi: 0002df48   ebp: c1e83d40   esp: c1e83d20
> ds: 0018   es: 0018   ss: 0018
> Process kexec (pid: 170, stackpage=c1e83000)
> Stack: 04000000 00010740 c10b6a4c c1e83d9c 00000080 c10b69cc 00000286
> c105f2c0
>        c1e83d9c c014f00e c10b69cc 00000080 c1e83dd0 c1e83e9c 00000000
> 00010740
>        00000004 c10b69cc 464c457f 00010101 00000000 00000000 00030002
> 00000001
> Call Trace:    [<c014f00e>] [<c014b903>] [<c012041d>] [<c01bdfbd>]
> [<c0186c38>]
>   [<c017f32f>] [<c017b02e>] [<c017f14c>] [<c0132e27>] [<c0108a73>]
>
> Code: 0f 0b 9d 05 80 89 22 c0 8b 7d fc b8 71 f0 2c 5a 89 f2 03 57
>  kernel BUG at slab.c:1437!
> invalid operand: 0000
> CPU:    0
> EIP:    0010:[<c012b79a>]    Not tainted
> EFLAGS: 00010016
> eax: 5a2cf071   ebx: c10b6020   ecx: c105f2c0   edx: 6444c888
> esi: c10b6f18   edi: 0002df48   ebp: c1727d40   esp: c1727d20
> ds: 0018   es: 0018   ss: 0018
> Process kexec (pid: 213, stackpage=c1727000)
> Stack: 04000000 000107a0 c10b6f9c c1727d9c 00000080 c10b6f1c 00000282
> c105f2c0
>        c1727d9c c014f00e c10b6f1c 00000080 c1727dd0 c1727e9c 00000000
> 000107a0
>        00000004 c10b6f1c 464c457f 00010101 00000000 00000000 00030002
> 00000001
> Call Trace:    [<c014f00e>] [<c014b903>] [<c012041d>] [<c01bdfbd>]
> [<c0186c38>]
>   [<c017f32f>] [<c017b02e>] [<c017f14c>] [<c0132e27>] [<c0108a73>]
>
> Code: 0f 0b 9d 05 80 89 22 c0 8b 7d fc b8 71 f0 2c 5a 89 f2 03 57
>  kernel BUG at slab.c:1437!
> invalid operand: 0000
> CPU:    0
> EIP:    0010:[<c012b79a>]    Not tainted
> EFLAGS: 00010016
> eax: 5a2cf071   ebx: c10b6020   ecx: c105f2c0   edx: 6444c888
> esi: c10b69c8   edi: 0002df48   ebp: c1727d40   esp: c1727d20
> ds: 0018   es: 0018   ss: 0018
> Process kexec (pid: 840, stackpage=c1727000)
> Stack: 04000000 000107a0 c10b6a4c c1727d9c 00000080 c10b69cc 00000286
> c105f2c0
>        c1727d9c c014f00e c10b69cc 00000080 c1727dd0 c1727e9c 00000000
> 000107a0
>        00000004 c10b69cc 464c457f 00010101 00000000 00000000 00030002
> 00000001
> Call Trace:    [<c014f00e>] [<c014b903>] [<c012041d>] [<c01bdfbd>]
> [<c0186c38>]
>   [<c017f32f>] [<c017b02e>] [<c017f14c>] [<c0132e27>] [<c0108a73>]
>
> Code: 0f 0b 9d 05 80 89 22 c0 8b 7d fc b8 71 f0 2c 5a 89 f2 03 57
>  kernel BUG at slab.c:1437!
> invalid operand: 0000
> CPU:    0
> EIP:    0010:[<c012b79a>]    Not tainted
> EFLAGS: 00010016
> eax: 5a2cf071   ebx: c10b6020   ecx: c105f2c0   edx: 6444c888
> esi: c10b6f18   edi: 0002df48   ebp: c19d9d40   esp: c19d9d20
> ds: 0018   es: 0018   ss: 0018
> Process kexec (pid: 845, stackpage=c19d9000)
> Stack: 04000000 000107a0 c10b6f9c c19d9d9c 00000080 c10b6f1c 00000282
> c105f2c0
>        c19d9d9c c014f00e c10b6f1c 00000080 c19d9dd0 c19d9e9c 00000000
> 000107a0
>        00000004 c10b6f1c 464c457f 00010101 00000000 00000000 00030002
> 00000001
> Call Trace:    [<c014f00e>] [<c014b903>] [<c017e7b8>] [<c012041d>]
> [<c017cd39>]
>   [<c017d2a2>] [<c017f32f>] [<c017b02e>] [<c0114dc6>] [<c0108a73>]
>
> Code: 0f 0b 9d 05 80 89 22 c0 8b 7d fc b8 71 f0 2c 5a 89 f2 03 57
>  kernel BUG at slab.c:1437!
> invalid operand: 0000
> CPU:    0
> EIP:    0010:[<c012b79a>]    Not tainted
> EFLAGS: 00010016
> eax: 5a2cf071   ebx: c10b6020   ecx: c105f2c0   edx: 6444c888
> esi: c10b6f18   edi: 0002df48   ebp: c1a6fd40   esp: c1a6fd20
> ds: 0018   es: 0018   ss: 0018
> Process kexec (pid: 868, stackpage=c1a6f000)
> Stack: 04000000 000107a0 c10b6f9c c1a6fd9c 00000080 c10b6f1c 00000282
> c105f2c0
>        c1a6fd9c c014f00e c10b6f1c 00000080 c1a6fdd0 c1a6fe9c 00000000
> 000107a0
>        00000004 c10b6f1c 464c457f 00010101 00000000 00000000 00030002
> 00000001
> Call Trace:    [<c014f00e>] [<c014b903>] [<c017e7b8>] [<c012041d>]
> [<c017cd39>]
>   [<c017d2a2>] [<c017f32f>] [<c017b02e>] [<c0114dc6>] [<c0108a73>]
>
> Code: 0f 0b 9d 05 80 89 22 c0 8b 7d fc b8 71 f0 2c 5a 89 f2 03 57
>
> root at who4:/usr/src/LoBos/work# exit
> Script done on Sun Apr 13 02:36:28 2003
>
> As you can see, that's what caused the message. This time I tripped
> the kernel exec on a remote console, and watched the main one. The
> main one displayed the oops, and the remote console gave a
> segmentation fault as its error. So? Anybody out there, recognize the
> fault? I personally think it has to do with my choice of kernel exec
> command line tools. Also, versions 2.1, and 2.2. and 2.3 of the make
> elf Image too, didn't work here. I'll grab that as a script file for
> the latest release, and present it later.
>
> Andrew did you indeed back port the 2.5 series of kernel exec patch
> functions to the 2..4.19, and 2.4.20, as I have now decided?
> -------------------
> P.S. If that's the case, then don't worry about it any. It is my fault
> for choosing the wrong tool to use first.
> ---------------------
> Gregg C Levine hansolofalcon at worldnet.att.net
> ------------------------------------------------------------
> "The Force will be with you...Always." Obi-Wan Kenobi
> "Use the Force, Luke."  Obi-Wan Kenobi
> (This company dedicates this E-Mail to General Obi-Wan Kenobi )
> (This company dedicates this E-Mail to Master Yoda )
>
>
>
>
> _______________________________________________
> Linuxbios mailing list
> Linuxbios at clustermatic.org
> http://www.clustermatic.org/mailman/listinfo/linuxbios
>


-- 
Adam Sulmicki
http://www.eax.com 	The Supreme Headquarters of the 32 bit registers





More information about the coreboot mailing list