load image oops
Emil Natan
shlyoko at gmail.com
Wed Feb 27 03:44:15 EST 2008
Hi list,
I'm trying for some time to use kexec on a dual CPU machine with 3GB of RAM
running Debian Etch and I got oops every few times I try to load a new
kernel. The issue is always reproducible (sometimes I got the error
immediately and sometimes after 50-100 iterations when running the kexec -l
and kexec -u commands in a loop). The error slightly differs when using the
original Etch kernel 2.6.18-[456]-686 and a newer one - 2.6.24-1-686. The
problem does not exist when the currently running kernel (not the kexec'd
one) is 486 in which case only 1GB of memory is recognized, or when 686
kernel was run with mem=900M kernel argument (mem=1G still causes the
problem). As far as I understand this means that the problem exist when the
HIGHMEM is used. Here are the oops messages:
from the 2.6.24-1-686 kernel:
BUG: unable to handle kernel paging request at virtual address ffa0e538
printing eip: c0149643 *pde = 00004067 *pte = 00000000
Oops: 0000 [#1] SMP
Modules linked in: ipv6 ipt_LOG xt_limit xt_tcpudp iptable_filter ip_tables
x_tables dm_snaps
hot dm_mirror dm_mod serio_raw psmouse iTCO_wdt floppy pcspkr container
button e752x_edac eda
c_core shpchp pci_hotplug evdev ext3 jbd mbcache ide_generic ide_cd cdrom
generic piix ide_co
re ata_generic libata uhci_hcd cciss tg3 ehci_hcd scsi_mod usbcore thermal
processor fan
Pid: 3333, comm: kexec Not tainted (2.6.24-1-686 #1)
EIP: 0060:[<c0149643>] EFLAGS: 00010282 CPU: 0
EIP is at kimage_add_entry+0x9/0x6e
EAX: ffa0e538 EBX: f71ac800 ECX: f71ac840 EDX: b5fd5008
ESI: b5fd5008 EDI: 00000000 EBP: 00001000 ESP: f7105f54
DS: 007b ES: 007b FS: 00d8 GS: 0033 SS: 0068
Process kexec (pid: 3333, ti=f7104000 task=f7fc37b0 task.ti=f7104000)
Stack: 00001000 c26bfaa0 c0149bc9 08071718 ff800000 f71ac840 c03e19a0
f71ac800
00000003 0000000a b7c27008 000d4000 000d302a 1ff2b000 b7faccc0
bfcda6a0
00000046 c2813060 c01292ac f71ac800 00096498 00000000 000000d6
f7104000
Call Trace:
[<c0149bc9>] sys_kexec_load+0x2b5/0x4b4
[<c01292ac>] irq_exit+0x53/0x6b
[<c0103ed6>] syscall_call+0x7/0xb
[<c02b0000>] unix_mkname+0x4d/0x6f
=======================
Code: 00 eb 15 8b 16 8d 47 18 89 42 04 89 57 18 89 70 04 89 06 e9 bf fe ff
ff 83 c4 1c 89 f8
5b 5e 5f 5d c3 56 89 d6 53 89 c3 8b 40 04 <83> 38 00 74 06 83 c0 04 89 43 04
8b 43 04 3b 43 0
8 75 36 83 c9
EIP: [<c0149643>] kimage_add_entry+0x9/0x6e SS:ESP 0068:f7105f54
---[ end trace edb4bca1461a27d3 ]---
test1:/images# test1 kernel: Oops: 0000 [#1] SMP
test1 kernel: Process kexec (pid: 3333, ti=f7104000 task=f7fc37b0
task.ti=f7104000)
test1 kernel: Stack: 00001000 c26bfaa0 c0149bc9 08071718 ff800000 f71ac840
c03e19a0 f71ac800
test1 kernel: 00000003 0000000a b7c27008 000d4000 000d302a 1ff2b000 b7faccc0
bfcda6a0
test1 kernel: 00000046 c2813060 c01292ac f71ac800 00096498 00000000 000000d6
f7104000
test1 kernel: Call Trace:
test1 kernel: [<c0149bc9>] sys_kexec_load+0x2b5/0x4b4
test1 kernel: [<c01292ac>] irq_exit+0x53/0x6b
test1 kernel: [<c0103ed6>] syscall_call+0x7/0xb
test1 kernel: [<c02b0000>] unix_mkname+0x4d/0x6f
test1 kernel: =======================
test1 kernel: Code: 00 eb 15 8b 16 8d 47 18 89 42 04 89 57 18 89 70 04 89 06
e9 bf fe ff ff 8
3 c4 1c 89 f8 5b 5e 5f 5d c3 56 89 d6 53 89 c3 8b 40 04 <83> 38 00 74 06 83
c0 04 89 43 04 8b
43 04 3b 43 08 75 36 83 c9
test1 kernel: EIP: [<c0149643>] kimage_add_entry+0x9/0x6e SS:ESP
0068:f7105f54
####################################################################################
and from the 2.6.18 one:
test1 kernel: Oops: 0002 [#1]
test1 kernel: SMP
test1 kernel: CPU: 1
test1 kernel: EIP is at kimage_add_entry+0x55/0x6e
test1 kernel: eax: 00000000 ebx: f7ccc600 ecx: c2b03ffc edx: 40000002
test1 kernel: esi: b22dd008 edi: 00000000 ebp: 00001000 esp: f795bf5c
test1 kernel: ds: 007b es: 007b ss: 0068
test1 kernel: Process kexec (pid: 4749, ti=f795a000 task=dfa5c550
task.ti=f795a000)
test1 kernel: Stack: 00001000 c2645ba0 c013a316 ff81d000 f7ccc640 c0367058
f7ccc600 00000003
test1 kernel: 0000000a b7b1e008 001a2000 001a1e55 1fe5d000 00000001 c030cf48
0000000a
test1 kernel: c0121838 00000046 f7ccc600 00096498 00000000 000000ab f795a000
c0102c7b
test1 kernel: Call Trace:
test1 kernel: Code: ff ba f4 ff ff ff 85 c0 74 35 e8 c8 07 01 00 8b 4b 04 8d
90 00 00 00 40 83 ca 02 89 11 89 43 04 05 fc 0f 00 00 89 43 08 8b 43 04 <89>
30 8b 53 04 8d 42 04 89 43 04 c7 42 04 00 00 00 00 31 d2 5b
test1 kernel: EIP: [<c0139ddd>] kimage_add_entry+0x55/0x6e SS:ESP
0068:f795bf5c
Segmentation fault
###########################################################################
BUG: unable to handle kernel NULL pointer dereference at virtual address
00000000
printing eip:
c0139ddd
*pde = 00000000
Oops: 0002 [#1]
SMP
Modules linked in: ipv6 ipt_LOG xt_limit xt_tcpudp iptable_filter ip_tables
x_tables dm_snapshot dm_mirror dm_mod tsdev floppy psmouse serio_raw pcspkr
e752x_edac edac_mc shpchp pci_hotplug evdev ext3 jbd mbcache ide_generic
ide_cd cdrom generic tg3 ehci_hcd uhci_hcd cciss scsi_mod piix ide_core
usbcore thermal processor fan
CPU: 1
EIP: 0060:[<c0139ddd>] Not tainted VLI
EFLAGS: 00010206 (2.6.18-5-686 #1)
EIP is at kimage_add_entry+0x55/0x6e
eax: 00000000 ebx: f7ccc600 ecx: c2b03ffc edx: 40000002
esi: b22dd008 edi: 00000000 ebp: 00001000 esp: f795bf5c
ds: 007b es: 007b ss: 0068
Process kexec (pid: 4749, ti=f795a000 task=dfa5c550 task.ti=f795a000)
Stack: 00001000 c2645ba0 c013a316 ff81d000 f7ccc640 c0367058 f7ccc600
00000003
0000000a b7b1e008 001a2000 001a1e55 1fe5d000 00000001 c030cf48
0000000a
c0121838 00000046 f7ccc600 00096498 00000000 000000ab f795a000
c0102c7b
Call Trace:
[<c013a316>] sys_kexec_load+0x2b5/0x4ad
[<c0121838>] __do_softirq+0x5a/0xbb
[<c0102c7b>] syscall_call+0x7/0xb
Code: ff ba f4 ff ff ff 85 c0 74 35 e8 c8 07 01 00 8b 4b 04 8d 90 00 00 00
40 83 ca 02 89 11 89 43 04 05 fc 0f 00 00 89 43 08 8b 43 04 <89> 30 8b 53 04
8d 42 04 89 43 04 c7 42 04 00 00 00 00 31 d2 5b
EIP: [<c0139ddd>] kimage_add_entry+0x55/0x6e SS:ESP 0068:f795bf5c
The problem is reproducible on two different machines (both HP DL360 G4) so
I assume it is not hardware dependent.
Hope someone can help.
Thanks
ena
-------------- next part --------------
An HTML attachment was scrubbed...
URL: http://lists.infradead.org/pipermail/kexec/attachments/20080227/bd80c81c/attachment.html
More information about the kexec
mailing list