Hello from Gregg C Levine
Here is a strange bit of events, I just finished recompiling my Linux
box's 2.4.20 kernel, after applying the kernel patch supplied by
Andrew Ip. The patch applied with the usual amount of fuss. No
problems surfaced during the build process. Nor with anything else.
Except for the kernel exec tool. Since I wasn't sure if Andrew had
back ported the ones from the 2.5 series to the 2.4.20, and 2.4.19
ones, I chose the original command line one, and built that.
I chose the original 2..2.19 kernel as the one to exec. Original that
is, because this version of Slackware is 8.0, and that's the version
that works for it to install correctly here. Also the tools that I
have used, are from that release version.
Each of the different versions of the make elf Image tools from 1.6,
to 2.0 that I tried,. gave me an oops message, and caused the program
to abort with a segmentation fault. Here's a cut and paste of my oops
message from the dmesg log:
Script started on Sun Apr 13 02:36:24 2003
root@who4:/usr/src/LoBos/work#
kernel BUG at slab.c:1437!
invalid operand: 0000
CPU: 0
EIP: 0010:[<c012b79a>] Not tainted
EFLAGS: 00010016
eax: 5a2cf071 ebx: c10b6020 ecx: c105f2c0 edx: 6444c888
esi: c10b6f18 edi: 0002df48 ebp: c0eafd40 esp: c0eafd20
ds: 0018 es: 0018 ss: 0018
Process kexec (pid: 131, stackpage=c0eaf000)
Stack: 04000000 00010740 c10b6f9c c0eafd9c 00000080 c10b6f1c 00000282
c105f2c0
c0eafd9c c014f00e c10b6f1c 00000080 c0eafdd0 c0eafe9c 00000000
00010740
00000004 c10b6f1c 464c457f 00010101 00000000 00000000 00030002
00000001
Call Trace: [<c014f00e>] [<c014b903>] [<c012041d>] [<c01bdfbd>]
[<c0186c38>]
[<c017f32f>] [<c017b02e>] [<c017f14c>] [<c0132e27>] [<c0108a73>]
Code: 0f 0b 9d 05 80 89 22 c0 8b 7d fc b8 71 f0 2c 5a 89 f2 03 57
kernel BUG at slab.c:1437!
invalid operand: 0000
CPU: 0
EIP: 0010:[<c012b79a>] Not tainted
EFLAGS: 00010016
eax: 5a2cf071 ebx: c10b6020 ecx: c105f2c0 edx: 6444c888
esi: c10b69c8 edi: 0002df48 ebp: c0e8dd40 esp: c0e8dd20
ds: 0018 es: 0018 ss: 0018
Process kexec (pid: 146, stackpage=c0e8d000)
Stack: 04000000 00010740 c10b6a4c c0e8dd9c 00000080 c10b69cc 00000286
c105f2c0
c0e8dd9c c014f00e c10b69cc 00000080 c0e8ddd0 c0e8de9c 00000000
00010740
00000004 c10b69cc 464c457f 00010101 00000000 00000000 00030002
00000001
Call Trace: [<c014f00e>] [<c014b903>] [<c012041d>] [<c01bdfbd>]
[<c0186c38>]
[<c017f32f>] [<c017b02e>] [<c017f14c>] [<c0132e27>] [<c0108a73>]
Code: 0f 0b 9d 05 80 89 22 c0 8b 7d fc b8 71 f0 2c 5a 89 f2 03 57
kernel BUG at slab.c:1437!
invalid operand: 0000
CPU: 0
EIP: 0010:[<c012b79a>] Not tainted
EFLAGS: 00010016
eax: 5a2cf071 ebx: c10b6020 ecx: c105f2c0 edx: 6444c888
esi: c10b6f18 edi: 0002df48 ebp: c0e8dd40 esp: c0e8dd20
ds: 0018 es: 0018 ss: 0018
Process kexec (pid: 150, stackpage=c0e8d000)
Stack: 04000000 00010740 c10b6f9c c0e8dd9c 00000080 c10b6f1c 00000282
c105f2c0
c0e8dd9c c014f00e c10b6f1c 00000080 c0e8ddd0 c0e8de9c 00000000
00010740
00000004 c10b6f1c 464c457f 00010101 00000000 00000000 00030002
00000001
Call Trace: [<c014f00e>] [<c014b903>] [<c012041d>] [<c01bdfbd>]
[<c0186c38>]
[<c017f32f>] [<c017b02e>] [<c017f14c>] [<c0132e27>] [<c0108a73>]
Code: 0f 0b 9d 05 80 89 22 c0 8b 7d fc b8 71 f0 2c 5a 89 f2 03 57
kernel BUG at slab.c:1437!
invalid operand: 0000
CPU: 0
EIP: 0010:[<c012b79a>] Not tainted
EFLAGS: 00010016
eax: 5a2cf071 ebx: c10b6020 ecx: c105f2c0 edx: 6444c888
esi: c10b69c8 edi: 0002df48 ebp: c1e83d40 esp: c1e83d20
ds: 0018 es: 0018 ss: 0018
Process kexec (pid: 170, stackpage=c1e83000)
Stack: 04000000 00010740 c10b6a4c c1e83d9c 00000080 c10b69cc 00000286
c105f2c0
c1e83d9c c014f00e c10b69cc 00000080 c1e83dd0 c1e83e9c 00000000
00010740
00000004 c10b69cc 464c457f 00010101 00000000 00000000 00030002
00000001
Call Trace: [<c014f00e>] [<c014b903>] [<c012041d>] [<c01bdfbd>]
[<c0186c38>]
[<c017f32f>] [<c017b02e>] [<c017f14c>] [<c0132e27>] [<c0108a73>]
Code: 0f 0b 9d 05 80 89 22 c0 8b 7d fc b8 71 f0 2c 5a 89 f2 03 57
kernel BUG at slab.c:1437!
invalid operand: 0000
CPU: 0
EIP: 0010:[<c012b79a>] Not tainted
EFLAGS: 00010016
eax: 5a2cf071 ebx: c10b6020 ecx: c105f2c0 edx: 6444c888
esi: c10b6f18 edi: 0002df48 ebp: c1727d40 esp: c1727d20
ds: 0018 es: 0018 ss: 0018
Process kexec (pid: 213, stackpage=c1727000)
Stack: 04000000 000107a0 c10b6f9c c1727d9c 00000080 c10b6f1c 00000282
c105f2c0
c1727d9c c014f00e c10b6f1c 00000080 c1727dd0 c1727e9c 00000000
000107a0
00000004 c10b6f1c 464c457f 00010101 00000000 00000000 00030002
00000001
Call Trace: [<c014f00e>] [<c014b903>] [<c012041d>] [<c01bdfbd>]
[<c0186c38>]
[<c017f32f>] [<c017b02e>] [<c017f14c>] [<c0132e27>] [<c0108a73>]
Code: 0f 0b 9d 05 80 89 22 c0 8b 7d fc b8 71 f0 2c 5a 89 f2 03 57
kernel BUG at slab.c:1437!
invalid operand: 0000
CPU: 0
EIP: 0010:[<c012b79a>] Not tainted
EFLAGS: 00010016
eax: 5a2cf071 ebx: c10b6020 ecx: c105f2c0 edx: 6444c888
esi: c10b69c8 edi: 0002df48 ebp: c1727d40 esp: c1727d20
ds: 0018 es: 0018 ss: 0018
Process kexec (pid: 840, stackpage=c1727000)
Stack: 04000000 000107a0 c10b6a4c c1727d9c 00000080 c10b69cc 00000286
c105f2c0
c1727d9c c014f00e c10b69cc 00000080 c1727dd0 c1727e9c 00000000
000107a0
00000004 c10b69cc 464c457f 00010101 00000000 00000000 00030002
00000001
Call Trace: [<c014f00e>] [<c014b903>] [<c012041d>] [<c01bdfbd>]
[<c0186c38>]
[<c017f32f>] [<c017b02e>] [<c017f14c>] [<c0132e27>] [<c0108a73>]
Code: 0f 0b 9d 05 80 89 22 c0 8b 7d fc b8 71 f0 2c 5a 89 f2 03 57
kernel BUG at slab.c:1437!
invalid operand: 0000
CPU: 0
EIP: 0010:[<c012b79a>] Not tainted
EFLAGS: 00010016
eax: 5a2cf071 ebx: c10b6020 ecx: c105f2c0 edx: 6444c888
esi: c10b6f18 edi: 0002df48 ebp: c19d9d40 esp: c19d9d20
ds: 0018 es: 0018 ss: 0018
Process kexec (pid: 845, stackpage=c19d9000)
Stack: 04000000 000107a0 c10b6f9c c19d9d9c 00000080 c10b6f1c 00000282
c105f2c0
c19d9d9c c014f00e c10b6f1c 00000080 c19d9dd0 c19d9e9c 00000000
000107a0
00000004 c10b6f1c 464c457f 00010101 00000000 00000000 00030002
00000001
Call Trace: [<c014f00e>] [<c014b903>] [<c017e7b8>] [<c012041d>]
[<c017cd39>]
[<c017d2a2>] [<c017f32f>] [<c017b02e>] [<c0114dc6>] [<c0108a73>]
Code: 0f 0b 9d 05 80 89 22 c0 8b 7d fc b8 71 f0 2c 5a 89 f2 03 57
kernel BUG at slab.c:1437!
invalid operand: 0000
CPU: 0
EIP: 0010:[<c012b79a>] Not tainted
EFLAGS: 00010016
eax: 5a2cf071 ebx: c10b6020 ecx: c105f2c0 edx: 6444c888
esi: c10b6f18 edi: 0002df48 ebp: c1a6fd40 esp: c1a6fd20
ds: 0018 es: 0018 ss: 0018
Process kexec (pid: 868, stackpage=c1a6f000)
Stack: 04000000 000107a0 c10b6f9c c1a6fd9c 00000080 c10b6f1c 00000282
c105f2c0
c1a6fd9c c014f00e c10b6f1c 00000080 c1a6fdd0 c1a6fe9c 00000000
000107a0
00000004 c10b6f1c 464c457f 00010101 00000000 00000000 00030002
00000001
Call Trace: [<c014f00e>] [<c014b903>] [<c017e7b8>] [<c012041d>]
[<c017cd39>]
[<c017d2a2>] [<c017f32f>] [<c017b02e>] [<c0114dc6>] [<c0108a73>]
Code: 0f 0b 9d 05 80 89 22 c0 8b 7d fc b8 71 f0 2c 5a 89 f2 03 57
root@who4:/usr/src/LoBos/work# exit
Script done on Sun Apr 13 02:36:28 2003
As you can see, that's what caused the message. This time I tripped
the kernel exec on a remote console, and watched the main one. The
main one displayed the oops, and the remote console gave a
segmentation fault as its error. So? Anybody out there, recognize the
fault? I personally think it has to do with my choice of kernel exec
command line tools. Also, versions 2.1, and 2.2. and 2.3 of the make
elf Image too, didn't work here. I'll grab that as a script file for
the latest release, and present it later.
Andrew did you indeed back port the 2.5 series of kernel exec patch
functions to the 2..4.19, and 2.4.20, as I have now decided?
-------------------
P.S. If that's the case, then don't worry about it any. It is my fault
for choosing the wrong tool to use first.
---------------------
Gregg C Levine hansolofalcon(a)worldnet.att.net
------------------------------------------------------------
"The Force will be with you...Always." Obi-Wan Kenobi
"Use the Force, Luke." Obi-Wan Kenobi
(This company dedicates this E-Mail to General Obi-Wan Kenobi )
(This company dedicates this E-Mail to Master Yoda )