Hello from Gregg C Levine Here is a strange bit of events, I just finished recompiling my Linux box's 2.4.20 kernel, after applying the kernel patch supplied by Andrew Ip. The patch applied with the usual amount of fuss. No problems surfaced during the build process. Nor with anything else. Except for the kernel exec tool. Since I wasn't sure if Andrew had back ported the ones from the 2.5 series to the 2.4.20, and 2.4.19 ones, I chose the original command line one, and built that.
I chose the original 2..2.19 kernel as the one to exec. Original that is, because this version of Slackware is 8.0, and that's the version that works for it to install correctly here. Also the tools that I have used, are from that release version. Each of the different versions of the make elf Image tools from 1.6, to 2.0 that I tried,. gave me an oops message, and caused the program to abort with a segmentation fault. Here's a cut and paste of my oops message from the dmesg log: Script started on Sun Apr 13 02:36:24 2003
root@who4:/usr/src/LoBos/work# kernel BUG at slab.c:1437! invalid operand: 0000 CPU: 0 EIP: 0010:[<c012b79a>] Not tainted EFLAGS: 00010016 eax: 5a2cf071 ebx: c10b6020 ecx: c105f2c0 edx: 6444c888 esi: c10b6f18 edi: 0002df48 ebp: c0eafd40 esp: c0eafd20 ds: 0018 es: 0018 ss: 0018 Process kexec (pid: 131, stackpage=c0eaf000) Stack: 04000000 00010740 c10b6f9c c0eafd9c 00000080 c10b6f1c 00000282 c105f2c0 c0eafd9c c014f00e c10b6f1c 00000080 c0eafdd0 c0eafe9c 00000000 00010740 00000004 c10b6f1c 464c457f 00010101 00000000 00000000 00030002 00000001 Call Trace: [<c014f00e>] [<c014b903>] [<c012041d>] [<c01bdfbd>] [<c0186c38>] [<c017f32f>] [<c017b02e>] [<c017f14c>] [<c0132e27>] [<c0108a73>]
Code: 0f 0b 9d 05 80 89 22 c0 8b 7d fc b8 71 f0 2c 5a 89 f2 03 57 kernel BUG at slab.c:1437! invalid operand: 0000 CPU: 0 EIP: 0010:[<c012b79a>] Not tainted EFLAGS: 00010016 eax: 5a2cf071 ebx: c10b6020 ecx: c105f2c0 edx: 6444c888 esi: c10b69c8 edi: 0002df48 ebp: c0e8dd40 esp: c0e8dd20 ds: 0018 es: 0018 ss: 0018 Process kexec (pid: 146, stackpage=c0e8d000) Stack: 04000000 00010740 c10b6a4c c0e8dd9c 00000080 c10b69cc 00000286 c105f2c0 c0e8dd9c c014f00e c10b69cc 00000080 c0e8ddd0 c0e8de9c 00000000 00010740 00000004 c10b69cc 464c457f 00010101 00000000 00000000 00030002 00000001 Call Trace: [<c014f00e>] [<c014b903>] [<c012041d>] [<c01bdfbd>] [<c0186c38>] [<c017f32f>] [<c017b02e>] [<c017f14c>] [<c0132e27>] [<c0108a73>]
Code: 0f 0b 9d 05 80 89 22 c0 8b 7d fc b8 71 f0 2c 5a 89 f2 03 57 kernel BUG at slab.c:1437! invalid operand: 0000 CPU: 0 EIP: 0010:[<c012b79a>] Not tainted EFLAGS: 00010016 eax: 5a2cf071 ebx: c10b6020 ecx: c105f2c0 edx: 6444c888 esi: c10b6f18 edi: 0002df48 ebp: c0e8dd40 esp: c0e8dd20 ds: 0018 es: 0018 ss: 0018 Process kexec (pid: 150, stackpage=c0e8d000) Stack: 04000000 00010740 c10b6f9c c0e8dd9c 00000080 c10b6f1c 00000282 c105f2c0 c0e8dd9c c014f00e c10b6f1c 00000080 c0e8ddd0 c0e8de9c 00000000 00010740 00000004 c10b6f1c 464c457f 00010101 00000000 00000000 00030002 00000001 Call Trace: [<c014f00e>] [<c014b903>] [<c012041d>] [<c01bdfbd>] [<c0186c38>] [<c017f32f>] [<c017b02e>] [<c017f14c>] [<c0132e27>] [<c0108a73>]
Code: 0f 0b 9d 05 80 89 22 c0 8b 7d fc b8 71 f0 2c 5a 89 f2 03 57 kernel BUG at slab.c:1437! invalid operand: 0000 CPU: 0 EIP: 0010:[<c012b79a>] Not tainted EFLAGS: 00010016 eax: 5a2cf071 ebx: c10b6020 ecx: c105f2c0 edx: 6444c888 esi: c10b69c8 edi: 0002df48 ebp: c1e83d40 esp: c1e83d20 ds: 0018 es: 0018 ss: 0018 Process kexec (pid: 170, stackpage=c1e83000) Stack: 04000000 00010740 c10b6a4c c1e83d9c 00000080 c10b69cc 00000286 c105f2c0 c1e83d9c c014f00e c10b69cc 00000080 c1e83dd0 c1e83e9c 00000000 00010740 00000004 c10b69cc 464c457f 00010101 00000000 00000000 00030002 00000001 Call Trace: [<c014f00e>] [<c014b903>] [<c012041d>] [<c01bdfbd>] [<c0186c38>] [<c017f32f>] [<c017b02e>] [<c017f14c>] [<c0132e27>] [<c0108a73>]
Code: 0f 0b 9d 05 80 89 22 c0 8b 7d fc b8 71 f0 2c 5a 89 f2 03 57 kernel BUG at slab.c:1437! invalid operand: 0000 CPU: 0 EIP: 0010:[<c012b79a>] Not tainted EFLAGS: 00010016 eax: 5a2cf071 ebx: c10b6020 ecx: c105f2c0 edx: 6444c888 esi: c10b6f18 edi: 0002df48 ebp: c1727d40 esp: c1727d20 ds: 0018 es: 0018 ss: 0018 Process kexec (pid: 213, stackpage=c1727000) Stack: 04000000 000107a0 c10b6f9c c1727d9c 00000080 c10b6f1c 00000282 c105f2c0 c1727d9c c014f00e c10b6f1c 00000080 c1727dd0 c1727e9c 00000000 000107a0 00000004 c10b6f1c 464c457f 00010101 00000000 00000000 00030002 00000001 Call Trace: [<c014f00e>] [<c014b903>] [<c012041d>] [<c01bdfbd>] [<c0186c38>] [<c017f32f>] [<c017b02e>] [<c017f14c>] [<c0132e27>] [<c0108a73>]
Code: 0f 0b 9d 05 80 89 22 c0 8b 7d fc b8 71 f0 2c 5a 89 f2 03 57 kernel BUG at slab.c:1437! invalid operand: 0000 CPU: 0 EIP: 0010:[<c012b79a>] Not tainted EFLAGS: 00010016 eax: 5a2cf071 ebx: c10b6020 ecx: c105f2c0 edx: 6444c888 esi: c10b69c8 edi: 0002df48 ebp: c1727d40 esp: c1727d20 ds: 0018 es: 0018 ss: 0018 Process kexec (pid: 840, stackpage=c1727000) Stack: 04000000 000107a0 c10b6a4c c1727d9c 00000080 c10b69cc 00000286 c105f2c0 c1727d9c c014f00e c10b69cc 00000080 c1727dd0 c1727e9c 00000000 000107a0 00000004 c10b69cc 464c457f 00010101 00000000 00000000 00030002 00000001 Call Trace: [<c014f00e>] [<c014b903>] [<c012041d>] [<c01bdfbd>] [<c0186c38>] [<c017f32f>] [<c017b02e>] [<c017f14c>] [<c0132e27>] [<c0108a73>]
Code: 0f 0b 9d 05 80 89 22 c0 8b 7d fc b8 71 f0 2c 5a 89 f2 03 57 kernel BUG at slab.c:1437! invalid operand: 0000 CPU: 0 EIP: 0010:[<c012b79a>] Not tainted EFLAGS: 00010016 eax: 5a2cf071 ebx: c10b6020 ecx: c105f2c0 edx: 6444c888 esi: c10b6f18 edi: 0002df48 ebp: c19d9d40 esp: c19d9d20 ds: 0018 es: 0018 ss: 0018 Process kexec (pid: 845, stackpage=c19d9000) Stack: 04000000 000107a0 c10b6f9c c19d9d9c 00000080 c10b6f1c 00000282 c105f2c0 c19d9d9c c014f00e c10b6f1c 00000080 c19d9dd0 c19d9e9c 00000000 000107a0 00000004 c10b6f1c 464c457f 00010101 00000000 00000000 00030002 00000001 Call Trace: [<c014f00e>] [<c014b903>] [<c017e7b8>] [<c012041d>] [<c017cd39>] [<c017d2a2>] [<c017f32f>] [<c017b02e>] [<c0114dc6>] [<c0108a73>]
Code: 0f 0b 9d 05 80 89 22 c0 8b 7d fc b8 71 f0 2c 5a 89 f2 03 57 kernel BUG at slab.c:1437! invalid operand: 0000 CPU: 0 EIP: 0010:[<c012b79a>] Not tainted EFLAGS: 00010016 eax: 5a2cf071 ebx: c10b6020 ecx: c105f2c0 edx: 6444c888 esi: c10b6f18 edi: 0002df48 ebp: c1a6fd40 esp: c1a6fd20 ds: 0018 es: 0018 ss: 0018 Process kexec (pid: 868, stackpage=c1a6f000) Stack: 04000000 000107a0 c10b6f9c c1a6fd9c 00000080 c10b6f1c 00000282 c105f2c0 c1a6fd9c c014f00e c10b6f1c 00000080 c1a6fdd0 c1a6fe9c 00000000 000107a0 00000004 c10b6f1c 464c457f 00010101 00000000 00000000 00030002 00000001 Call Trace: [<c014f00e>] [<c014b903>] [<c017e7b8>] [<c012041d>] [<c017cd39>] [<c017d2a2>] [<c017f32f>] [<c017b02e>] [<c0114dc6>] [<c0108a73>]
Code: 0f 0b 9d 05 80 89 22 c0 8b 7d fc b8 71 f0 2c 5a 89 f2 03 57
root@who4:/usr/src/LoBos/work# exit Script done on Sun Apr 13 02:36:28 2003
As you can see, that's what caused the message. This time I tripped the kernel exec on a remote console, and watched the main one. The main one displayed the oops, and the remote console gave a segmentation fault as its error. So? Anybody out there, recognize the fault? I personally think it has to do with my choice of kernel exec command line tools. Also, versions 2.1, and 2.2. and 2.3 of the make elf Image too, didn't work here. I'll grab that as a script file for the latest release, and present it later.
Andrew did you indeed back port the 2.5 series of kernel exec patch functions to the 2..4.19, and 2.4.20, as I have now decided? ------------------- P.S. If that's the case, then don't worry about it any. It is my fault for choosing the wrong tool to use first. --------------------- Gregg C Levine hansolofalcon@worldnet.att.net ------------------------------------------------------------ "The Force will be with you...Always." Obi-Wan Kenobi "Use the Force, Luke." Obi-Wan Kenobi (This company dedicates this E-Mail to General Obi-Wan Kenobi ) (This company dedicates this E-Mail to Master Yoda )
for oops report to be usefull it needs to be decoded.
see linux/Documentation/oops-tracing.txt
basically you need to turn them thuru ksymoops program first.
On Sun, 13 Apr 2003, Gregg C Levine wrote:
Hello from Gregg C Levine Here is a strange bit of events, I just finished recompiling my Linux box's 2.4.20 kernel, after applying the kernel patch supplied by Andrew Ip. The patch applied with the usual amount of fuss. No problems surfaced during the build process. Nor with anything else. Except for the kernel exec tool. Since I wasn't sure if Andrew had back ported the ones from the 2.5 series to the 2.4.20, and 2.4.19 ones, I chose the original command line one, and built that.
I chose the original 2..2.19 kernel as the one to exec. Original that is, because this version of Slackware is 8.0, and that's the version that works for it to install correctly here. Also the tools that I have used, are from that release version. Each of the different versions of the make elf Image tools from 1.6, to 2.0 that I tried,. gave me an oops message, and caused the program to abort with a segmentation fault. Here's a cut and paste of my oops message from the dmesg log: Script started on Sun Apr 13 02:36:24 2003
root@who4:/usr/src/LoBos/work# kernel BUG at slab.c:1437! invalid operand: 0000 CPU: 0 EIP: 0010:[<c012b79a>] Not tainted EFLAGS: 00010016 eax: 5a2cf071 ebx: c10b6020 ecx: c105f2c0 edx: 6444c888 esi: c10b6f18 edi: 0002df48 ebp: c0eafd40 esp: c0eafd20 ds: 0018 es: 0018 ss: 0018 Process kexec (pid: 131, stackpage=c0eaf000) Stack: 04000000 00010740 c10b6f9c c0eafd9c 00000080 c10b6f1c 00000282 c105f2c0 c0eafd9c c014f00e c10b6f1c 00000080 c0eafdd0 c0eafe9c 00000000 00010740 00000004 c10b6f1c 464c457f 00010101 00000000 00000000 00030002 00000001 Call Trace: [<c014f00e>] [<c014b903>] [<c012041d>] [<c01bdfbd>] [<c0186c38>] [<c017f32f>] [<c017b02e>] [<c017f14c>] [<c0132e27>] [<c0108a73>]
Code: 0f 0b 9d 05 80 89 22 c0 8b 7d fc b8 71 f0 2c 5a 89 f2 03 57 kernel BUG at slab.c:1437! invalid operand: 0000 CPU: 0 EIP: 0010:[<c012b79a>] Not tainted EFLAGS: 00010016 eax: 5a2cf071 ebx: c10b6020 ecx: c105f2c0 edx: 6444c888 esi: c10b69c8 edi: 0002df48 ebp: c0e8dd40 esp: c0e8dd20 ds: 0018 es: 0018 ss: 0018 Process kexec (pid: 146, stackpage=c0e8d000) Stack: 04000000 00010740 c10b6a4c c0e8dd9c 00000080 c10b69cc 00000286 c105f2c0 c0e8dd9c c014f00e c10b69cc 00000080 c0e8ddd0 c0e8de9c 00000000 00010740 00000004 c10b69cc 464c457f 00010101 00000000 00000000 00030002 00000001 Call Trace: [<c014f00e>] [<c014b903>] [<c012041d>] [<c01bdfbd>] [<c0186c38>] [<c017f32f>] [<c017b02e>] [<c017f14c>] [<c0132e27>] [<c0108a73>]
Code: 0f 0b 9d 05 80 89 22 c0 8b 7d fc b8 71 f0 2c 5a 89 f2 03 57 kernel BUG at slab.c:1437! invalid operand: 0000 CPU: 0 EIP: 0010:[<c012b79a>] Not tainted EFLAGS: 00010016 eax: 5a2cf071 ebx: c10b6020 ecx: c105f2c0 edx: 6444c888 esi: c10b6f18 edi: 0002df48 ebp: c0e8dd40 esp: c0e8dd20 ds: 0018 es: 0018 ss: 0018 Process kexec (pid: 150, stackpage=c0e8d000) Stack: 04000000 00010740 c10b6f9c c0e8dd9c 00000080 c10b6f1c 00000282 c105f2c0 c0e8dd9c c014f00e c10b6f1c 00000080 c0e8ddd0 c0e8de9c 00000000 00010740 00000004 c10b6f1c 464c457f 00010101 00000000 00000000 00030002 00000001 Call Trace: [<c014f00e>] [<c014b903>] [<c012041d>] [<c01bdfbd>] [<c0186c38>] [<c017f32f>] [<c017b02e>] [<c017f14c>] [<c0132e27>] [<c0108a73>]
Code: 0f 0b 9d 05 80 89 22 c0 8b 7d fc b8 71 f0 2c 5a 89 f2 03 57 kernel BUG at slab.c:1437! invalid operand: 0000 CPU: 0 EIP: 0010:[<c012b79a>] Not tainted EFLAGS: 00010016 eax: 5a2cf071 ebx: c10b6020 ecx: c105f2c0 edx: 6444c888 esi: c10b69c8 edi: 0002df48 ebp: c1e83d40 esp: c1e83d20 ds: 0018 es: 0018 ss: 0018 Process kexec (pid: 170, stackpage=c1e83000) Stack: 04000000 00010740 c10b6a4c c1e83d9c 00000080 c10b69cc 00000286 c105f2c0 c1e83d9c c014f00e c10b69cc 00000080 c1e83dd0 c1e83e9c 00000000 00010740 00000004 c10b69cc 464c457f 00010101 00000000 00000000 00030002 00000001 Call Trace: [<c014f00e>] [<c014b903>] [<c012041d>] [<c01bdfbd>] [<c0186c38>] [<c017f32f>] [<c017b02e>] [<c017f14c>] [<c0132e27>] [<c0108a73>]
Code: 0f 0b 9d 05 80 89 22 c0 8b 7d fc b8 71 f0 2c 5a 89 f2 03 57 kernel BUG at slab.c:1437! invalid operand: 0000 CPU: 0 EIP: 0010:[<c012b79a>] Not tainted EFLAGS: 00010016 eax: 5a2cf071 ebx: c10b6020 ecx: c105f2c0 edx: 6444c888 esi: c10b6f18 edi: 0002df48 ebp: c1727d40 esp: c1727d20 ds: 0018 es: 0018 ss: 0018 Process kexec (pid: 213, stackpage=c1727000) Stack: 04000000 000107a0 c10b6f9c c1727d9c 00000080 c10b6f1c 00000282 c105f2c0 c1727d9c c014f00e c10b6f1c 00000080 c1727dd0 c1727e9c 00000000 000107a0 00000004 c10b6f1c 464c457f 00010101 00000000 00000000 00030002 00000001 Call Trace: [<c014f00e>] [<c014b903>] [<c012041d>] [<c01bdfbd>] [<c0186c38>] [<c017f32f>] [<c017b02e>] [<c017f14c>] [<c0132e27>] [<c0108a73>]
Code: 0f 0b 9d 05 80 89 22 c0 8b 7d fc b8 71 f0 2c 5a 89 f2 03 57 kernel BUG at slab.c:1437! invalid operand: 0000 CPU: 0 EIP: 0010:[<c012b79a>] Not tainted EFLAGS: 00010016 eax: 5a2cf071 ebx: c10b6020 ecx: c105f2c0 edx: 6444c888 esi: c10b69c8 edi: 0002df48 ebp: c1727d40 esp: c1727d20 ds: 0018 es: 0018 ss: 0018 Process kexec (pid: 840, stackpage=c1727000) Stack: 04000000 000107a0 c10b6a4c c1727d9c 00000080 c10b69cc 00000286 c105f2c0 c1727d9c c014f00e c10b69cc 00000080 c1727dd0 c1727e9c 00000000 000107a0 00000004 c10b69cc 464c457f 00010101 00000000 00000000 00030002 00000001 Call Trace: [<c014f00e>] [<c014b903>] [<c012041d>] [<c01bdfbd>] [<c0186c38>] [<c017f32f>] [<c017b02e>] [<c017f14c>] [<c0132e27>] [<c0108a73>]
Code: 0f 0b 9d 05 80 89 22 c0 8b 7d fc b8 71 f0 2c 5a 89 f2 03 57 kernel BUG at slab.c:1437! invalid operand: 0000 CPU: 0 EIP: 0010:[<c012b79a>] Not tainted EFLAGS: 00010016 eax: 5a2cf071 ebx: c10b6020 ecx: c105f2c0 edx: 6444c888 esi: c10b6f18 edi: 0002df48 ebp: c19d9d40 esp: c19d9d20 ds: 0018 es: 0018 ss: 0018 Process kexec (pid: 845, stackpage=c19d9000) Stack: 04000000 000107a0 c10b6f9c c19d9d9c 00000080 c10b6f1c 00000282 c105f2c0 c19d9d9c c014f00e c10b6f1c 00000080 c19d9dd0 c19d9e9c 00000000 000107a0 00000004 c10b6f1c 464c457f 00010101 00000000 00000000 00030002 00000001 Call Trace: [<c014f00e>] [<c014b903>] [<c017e7b8>] [<c012041d>] [<c017cd39>] [<c017d2a2>] [<c017f32f>] [<c017b02e>] [<c0114dc6>] [<c0108a73>]
Code: 0f 0b 9d 05 80 89 22 c0 8b 7d fc b8 71 f0 2c 5a 89 f2 03 57 kernel BUG at slab.c:1437! invalid operand: 0000 CPU: 0 EIP: 0010:[<c012b79a>] Not tainted EFLAGS: 00010016 eax: 5a2cf071 ebx: c10b6020 ecx: c105f2c0 edx: 6444c888 esi: c10b6f18 edi: 0002df48 ebp: c1a6fd40 esp: c1a6fd20 ds: 0018 es: 0018 ss: 0018 Process kexec (pid: 868, stackpage=c1a6f000) Stack: 04000000 000107a0 c10b6f9c c1a6fd9c 00000080 c10b6f1c 00000282 c105f2c0 c1a6fd9c c014f00e c10b6f1c 00000080 c1a6fdd0 c1a6fe9c 00000000 000107a0 00000004 c10b6f1c 464c457f 00010101 00000000 00000000 00030002 00000001 Call Trace: [<c014f00e>] [<c014b903>] [<c017e7b8>] [<c012041d>] [<c017cd39>] [<c017d2a2>] [<c017f32f>] [<c017b02e>] [<c0114dc6>] [<c0108a73>]
Code: 0f 0b 9d 05 80 89 22 c0 8b 7d fc b8 71 f0 2c 5a 89 f2 03 57
root@who4:/usr/src/LoBos/work# exit Script done on Sun Apr 13 02:36:28 2003
As you can see, that's what caused the message. This time I tripped the kernel exec on a remote console, and watched the main one. The main one displayed the oops, and the remote console gave a segmentation fault as its error. So? Anybody out there, recognize the fault? I personally think it has to do with my choice of kernel exec command line tools. Also, versions 2.1, and 2.2. and 2.3 of the make elf Image too, didn't work here. I'll grab that as a script file for the latest release, and present it later.
Andrew did you indeed back port the 2.5 series of kernel exec patch functions to the 2..4.19, and 2.4.20, as I have now decided?
P.S. If that's the case, then don't worry about it any. It is my fault for choosing the wrong tool to use first.
Gregg C Levine hansolofalcon@worldnet.att.net
"The Force will be with you...Always." Obi-Wan Kenobi "Use the Force, Luke."� Obi-Wan Kenobi (This company dedicates this E-Mail to General Obi-Wan Kenobi ) (This company dedicates this E-Mail to Master Yoda )
Linuxbios mailing list Linuxbios@clustermatic.org http://www.clustermatic.org/mailman/listinfo/linuxbios
Greg,
As you can see, that's what caused the message. This time I tripped the kernel exec on a remote console, and watched the main one. The main one displayed the oops, and the remote console gave a segmentation fault as its error. So? Anybody out there, recognize the fault? I personally think it has to do with my choice of kernel exec command line tools. Also, versions 2.1, and 2.2. and 2.3 of the make elf Image too, didn't work here. I'll grab that as a script file for the latest release, and present it later. Andrew did you indeed back port the 2.5 series of kernel exec patch functions to the 2..4.19, and 2.4.20, as I have now decided?
Can you try 2.4.19? It did work when I boot off from DOC and then kexec 2.4.19 kernel from IDE hd. For 2.4.20, I will have to double check.
-Andrew