Kexec and kernel oops

Gregg C Levine hansolofalcon at worldnet.att.net
Sun Apr 13 02:21:01 CEST 2003


Hello from Gregg C Levine
Here is a strange bit of events, I just finished recompiling my Linux
box's 2.4.20 kernel, after applying the kernel patch supplied by
Andrew Ip. The patch applied with the usual amount of fuss. No
problems surfaced during the build process. Nor with anything else.
Except for the kernel exec tool. Since I wasn't sure if Andrew had
back ported the ones from the 2.5 series to the 2.4.20, and 2.4.19
ones, I chose the original command line one, and built that. 

I chose the original 2..2.19 kernel as the one to exec. Original that
is, because this version of Slackware is 8.0, and that's the version
that works for it to install correctly here. Also the tools that I
have used, are from that release version.
Each of the different versions of the make elf Image tools from 1.6,
to 2.0 that I tried,. gave me an oops message, and caused the program
to abort with a segmentation fault. Here's a cut and paste of my oops
message from the dmesg log:
Script started on Sun Apr 13 02:36:24 2003

root at who4:/usr/src/LoBos/work#
kernel BUG at slab.c:1437!
invalid operand: 0000
CPU:    0
EIP:    0010:[<c012b79a>]    Not tainted
EFLAGS: 00010016
eax: 5a2cf071   ebx: c10b6020   ecx: c105f2c0   edx: 6444c888
esi: c10b6f18   edi: 0002df48   ebp: c0eafd40   esp: c0eafd20
ds: 0018   es: 0018   ss: 0018
Process kexec (pid: 131, stackpage=c0eaf000)
Stack: 04000000 00010740 c10b6f9c c0eafd9c 00000080 c10b6f1c 00000282
c105f2c0 
       c0eafd9c c014f00e c10b6f1c 00000080 c0eafdd0 c0eafe9c 00000000
00010740 
       00000004 c10b6f1c 464c457f 00010101 00000000 00000000 00030002
00000001 
Call Trace:    [<c014f00e>] [<c014b903>] [<c012041d>] [<c01bdfbd>]
[<c0186c38>]
  [<c017f32f>] [<c017b02e>] [<c017f14c>] [<c0132e27>] [<c0108a73>]

Code: 0f 0b 9d 05 80 89 22 c0 8b 7d fc b8 71 f0 2c 5a 89 f2 03 57 
 kernel BUG at slab.c:1437!
invalid operand: 0000
CPU:    0
EIP:    0010:[<c012b79a>]    Not tainted
EFLAGS: 00010016
eax: 5a2cf071   ebx: c10b6020   ecx: c105f2c0   edx: 6444c888
esi: c10b69c8   edi: 0002df48   ebp: c0e8dd40   esp: c0e8dd20
ds: 0018   es: 0018   ss: 0018
Process kexec (pid: 146, stackpage=c0e8d000)
Stack: 04000000 00010740 c10b6a4c c0e8dd9c 00000080 c10b69cc 00000286
c105f2c0 
       c0e8dd9c c014f00e c10b69cc 00000080 c0e8ddd0 c0e8de9c 00000000
00010740 
       00000004 c10b69cc 464c457f 00010101 00000000 00000000 00030002
00000001 
Call Trace:    [<c014f00e>] [<c014b903>] [<c012041d>] [<c01bdfbd>]
[<c0186c38>]
  [<c017f32f>] [<c017b02e>] [<c017f14c>] [<c0132e27>] [<c0108a73>]

Code: 0f 0b 9d 05 80 89 22 c0 8b 7d fc b8 71 f0 2c 5a 89 f2 03 57 
 kernel BUG at slab.c:1437!
invalid operand: 0000
CPU:    0
EIP:    0010:[<c012b79a>]    Not tainted
EFLAGS: 00010016
eax: 5a2cf071   ebx: c10b6020   ecx: c105f2c0   edx: 6444c888
esi: c10b6f18   edi: 0002df48   ebp: c0e8dd40   esp: c0e8dd20
ds: 0018   es: 0018   ss: 0018
Process kexec (pid: 150, stackpage=c0e8d000)
Stack: 04000000 00010740 c10b6f9c c0e8dd9c 00000080 c10b6f1c 00000282
c105f2c0 
       c0e8dd9c c014f00e c10b6f1c 00000080 c0e8ddd0 c0e8de9c 00000000
00010740 
       00000004 c10b6f1c 464c457f 00010101 00000000 00000000 00030002
00000001 
Call Trace:    [<c014f00e>] [<c014b903>] [<c012041d>] [<c01bdfbd>]
[<c0186c38>]
  [<c017f32f>] [<c017b02e>] [<c017f14c>] [<c0132e27>] [<c0108a73>]

Code: 0f 0b 9d 05 80 89 22 c0 8b 7d fc b8 71 f0 2c 5a 89 f2 03 57 
 kernel BUG at slab.c:1437!
invalid operand: 0000
CPU:    0
EIP:    0010:[<c012b79a>]    Not tainted
EFLAGS: 00010016
eax: 5a2cf071   ebx: c10b6020   ecx: c105f2c0   edx: 6444c888
esi: c10b69c8   edi: 0002df48   ebp: c1e83d40   esp: c1e83d20
ds: 0018   es: 0018   ss: 0018
Process kexec (pid: 170, stackpage=c1e83000)
Stack: 04000000 00010740 c10b6a4c c1e83d9c 00000080 c10b69cc 00000286
c105f2c0 
       c1e83d9c c014f00e c10b69cc 00000080 c1e83dd0 c1e83e9c 00000000
00010740 
       00000004 c10b69cc 464c457f 00010101 00000000 00000000 00030002
00000001 
Call Trace:    [<c014f00e>] [<c014b903>] [<c012041d>] [<c01bdfbd>]
[<c0186c38>]
  [<c017f32f>] [<c017b02e>] [<c017f14c>] [<c0132e27>] [<c0108a73>]

Code: 0f 0b 9d 05 80 89 22 c0 8b 7d fc b8 71 f0 2c 5a 89 f2 03 57 
 kernel BUG at slab.c:1437!
invalid operand: 0000
CPU:    0
EIP:    0010:[<c012b79a>]    Not tainted
EFLAGS: 00010016
eax: 5a2cf071   ebx: c10b6020   ecx: c105f2c0   edx: 6444c888
esi: c10b6f18   edi: 0002df48   ebp: c1727d40   esp: c1727d20
ds: 0018   es: 0018   ss: 0018
Process kexec (pid: 213, stackpage=c1727000)
Stack: 04000000 000107a0 c10b6f9c c1727d9c 00000080 c10b6f1c 00000282
c105f2c0 
       c1727d9c c014f00e c10b6f1c 00000080 c1727dd0 c1727e9c 00000000
000107a0 
       00000004 c10b6f1c 464c457f 00010101 00000000 00000000 00030002
00000001 
Call Trace:    [<c014f00e>] [<c014b903>] [<c012041d>] [<c01bdfbd>]
[<c0186c38>]
  [<c017f32f>] [<c017b02e>] [<c017f14c>] [<c0132e27>] [<c0108a73>]

Code: 0f 0b 9d 05 80 89 22 c0 8b 7d fc b8 71 f0 2c 5a 89 f2 03 57 
 kernel BUG at slab.c:1437!
invalid operand: 0000
CPU:    0
EIP:    0010:[<c012b79a>]    Not tainted
EFLAGS: 00010016
eax: 5a2cf071   ebx: c10b6020   ecx: c105f2c0   edx: 6444c888
esi: c10b69c8   edi: 0002df48   ebp: c1727d40   esp: c1727d20
ds: 0018   es: 0018   ss: 0018
Process kexec (pid: 840, stackpage=c1727000)
Stack: 04000000 000107a0 c10b6a4c c1727d9c 00000080 c10b69cc 00000286
c105f2c0 
       c1727d9c c014f00e c10b69cc 00000080 c1727dd0 c1727e9c 00000000
000107a0 
       00000004 c10b69cc 464c457f 00010101 00000000 00000000 00030002
00000001 
Call Trace:    [<c014f00e>] [<c014b903>] [<c012041d>] [<c01bdfbd>]
[<c0186c38>]
  [<c017f32f>] [<c017b02e>] [<c017f14c>] [<c0132e27>] [<c0108a73>]

Code: 0f 0b 9d 05 80 89 22 c0 8b 7d fc b8 71 f0 2c 5a 89 f2 03 57 
 kernel BUG at slab.c:1437!
invalid operand: 0000
CPU:    0
EIP:    0010:[<c012b79a>]    Not tainted
EFLAGS: 00010016
eax: 5a2cf071   ebx: c10b6020   ecx: c105f2c0   edx: 6444c888
esi: c10b6f18   edi: 0002df48   ebp: c19d9d40   esp: c19d9d20
ds: 0018   es: 0018   ss: 0018
Process kexec (pid: 845, stackpage=c19d9000)
Stack: 04000000 000107a0 c10b6f9c c19d9d9c 00000080 c10b6f1c 00000282
c105f2c0 
       c19d9d9c c014f00e c10b6f1c 00000080 c19d9dd0 c19d9e9c 00000000
000107a0 
       00000004 c10b6f1c 464c457f 00010101 00000000 00000000 00030002
00000001 
Call Trace:    [<c014f00e>] [<c014b903>] [<c017e7b8>] [<c012041d>]
[<c017cd39>]
  [<c017d2a2>] [<c017f32f>] [<c017b02e>] [<c0114dc6>] [<c0108a73>]

Code: 0f 0b 9d 05 80 89 22 c0 8b 7d fc b8 71 f0 2c 5a 89 f2 03 57 
 kernel BUG at slab.c:1437!
invalid operand: 0000
CPU:    0
EIP:    0010:[<c012b79a>]    Not tainted
EFLAGS: 00010016
eax: 5a2cf071   ebx: c10b6020   ecx: c105f2c0   edx: 6444c888
esi: c10b6f18   edi: 0002df48   ebp: c1a6fd40   esp: c1a6fd20
ds: 0018   es: 0018   ss: 0018
Process kexec (pid: 868, stackpage=c1a6f000)
Stack: 04000000 000107a0 c10b6f9c c1a6fd9c 00000080 c10b6f1c 00000282
c105f2c0 
       c1a6fd9c c014f00e c10b6f1c 00000080 c1a6fdd0 c1a6fe9c 00000000
000107a0 
       00000004 c10b6f1c 464c457f 00010101 00000000 00000000 00030002
00000001 
Call Trace:    [<c014f00e>] [<c014b903>] [<c017e7b8>] [<c012041d>]
[<c017cd39>]
  [<c017d2a2>] [<c017f32f>] [<c017b02e>] [<c0114dc6>] [<c0108a73>]

Code: 0f 0b 9d 05 80 89 22 c0 8b 7d fc b8 71 f0 2c 5a 89 f2 03 57 
 
root at who4:/usr/src/LoBos/work# exit
Script done on Sun Apr 13 02:36:28 2003

As you can see, that's what caused the message. This time I tripped
the kernel exec on a remote console, and watched the main one. The
main one displayed the oops, and the remote console gave a
segmentation fault as its error. So? Anybody out there, recognize the
fault? I personally think it has to do with my choice of kernel exec
command line tools. Also, versions 2.1, and 2.2. and 2.3 of the make
elf Image too, didn't work here. I'll grab that as a script file for
the latest release, and present it later.

Andrew did you indeed back port the 2.5 series of kernel exec patch
functions to the 2..4.19, and 2.4.20, as I have now decided?
-------------------
P.S. If that's the case, then don't worry about it any. It is my fault
for choosing the wrong tool to use first.
---------------------
Gregg C Levine hansolofalcon at worldnet.att.net
------------------------------------------------------------
"The Force will be with you...Always." Obi-Wan Kenobi
"Use the Force, Luke."  Obi-Wan Kenobi
(This company dedicates this E-Mail to General Obi-Wan Kenobi )
(This company dedicates this E-Mail to Master Yoda )







More information about the coreboot mailing list