Hi list,<br><br>I'm trying for some time to use kexec on a dual CPU
machine with 3GB of RAM running Debian Etch and I got oops every few
times I try to load a new kernel. The issue is always reproducible
(sometimes I got the error immediately and sometimes after 50-100
iterations when running the kexec -l and kexec -u commands in a loop).
The error slightly differs when using the original Etch kernel
2.6.18-[456]-686 and a newer one - 2.6.24-1-686. The problem does not
exist when the currently running kernel (not the kexec'd one) is 486 in
which case only 1GB of memory is recognized, or when 686 kernel was run
with mem=900M kernel argument (mem=1G still causes the problem). As far
as I understand this means that the problem exist when the HIGHMEM is
used. Here are the oops messages:<br>
<br>from the 2.6.24-1-686 kernel:<br><br>BUG: unable to handle kernel paging request at virtual address ffa0e538<br>printing eip: c0149643 *pde = 00004067 *pte = 00000000 <br>Oops: 0000 [#1] SMP <br>Modules linked in: ipv6 ipt_LOG xt_limit xt_tcpudp iptable_filter ip_tables x_tables dm_snaps<br>
hot dm_mirror dm_mod serio_raw psmouse iTCO_wdt floppy pcspkr container button e752x_edac eda<br>c_core shpchp pci_hotplug evdev ext3 jbd mbcache ide_generic ide_cd cdrom generic piix ide_co<br>re ata_generic libata uhci_hcd cciss tg3 ehci_hcd scsi_mod usbcore thermal processor fan<br>
<br>Pid: 3333, comm: kexec Not tainted (2.6.24-1-686 #1)<br>EIP: 0060:[<c0149643>] EFLAGS: 00010282 CPU: 0<br>EIP is at kimage_add_entry+0x9/0x6e<br>EAX: ffa0e538 EBX: f71ac800 ECX: f71ac840 EDX: b5fd5008<br>ESI: b5fd5008 EDI: 00000000 EBP: 00001000 ESP: f7105f54<br>
DS: 007b ES: 007b FS: 00d8 GS: 0033 SS: 0068<br>Process kexec (pid: 3333, ti=f7104000 task=f7fc37b0 task.ti=f7104000)<br>Stack: 00001000 c26bfaa0 c0149bc9 08071718 ff800000 f71ac840 c03e19a0 f71ac800 <br> 00000003 0000000a b7c27008 000d4000 000d302a 1ff2b000 b7faccc0 bfcda6a0 <br>
00000046 c2813060 c01292ac f71ac800 00096498 00000000 000000d6 f7104000 <br>Call Trace:<br> [<c0149bc9>] sys_kexec_load+0x2b5/0x4b4<br> [<c01292ac>] irq_exit+0x53/0x6b<br> [<c0103ed6>] syscall_call+0x7/0xb<br>
[<c02b0000>] unix_mkname+0x4d/0x6f<br> =======================<br>Code: 00 eb 15 8b 16 8d 47 18 89 42 04 89 57 18 89 70 04 89 06 e9 bf fe ff ff 83 c4 1c 89 f8 <br>5b 5e 5f 5d c3 56 89 d6 53 89 c3 8b 40 04 <83> 38 00 74 06 83 c0 04 89 43 04 8b 43 04 3b 43 0<br>
8 75 36 83 c9 <br>EIP: [<c0149643>] kimage_add_entry+0x9/0x6e SS:ESP 0068:f7105f54<br>---[ end trace edb4bca1461a27d3 ]---<br>test1:/images# test1 kernel: Oops: 0000 [#1] SMP <br>test1 kernel: Process kexec (pid: 3333, ti=f7104000 task=f7fc37b0 task.ti=f7104000)<br>
test1 kernel: Stack: 00001000 c26bfaa0 c0149bc9 08071718 ff800000 f71ac840 c03e19a0 f71ac800 <br>test1 kernel: 00000003 0000000a b7c27008 000d4000 000d302a 1ff2b000 b7faccc0 bfcda6a0 <br>test1 kernel: 00000046 c2813060 c01292ac f71ac800 00096498 00000000 000000d6 f7104000 <br>
test1 kernel: Call Trace:<br>test1 kernel: [<c0149bc9>] sys_kexec_load+0x2b5/0x4b4<br>test1 kernel: [<c01292ac>] irq_exit+0x53/0x6b<br>test1 kernel: [<c0103ed6>] syscall_call+0x7/0xb<br>test1 kernel: [<c02b0000>] unix_mkname+0x4d/0x6f<br>
test1 kernel: =======================<br>test1 kernel: Code: 00 eb 15 8b 16 8d 47 18 89 42 04 89 57 18 89 70 04 89 06 e9 bf fe ff ff 8<br>3 c4 1c 89 f8 5b 5e 5f 5d c3 56 89 d6 53 89 c3 8b 40 04 <83> 38 00 74 06 83 c0 04 89 43 04 8b<br>
43 04 3b 43 08 75 36 83 c9 <br>test1 kernel: EIP: [<c0149643>] kimage_add_entry+0x9/0x6e SS:ESP 0068:f7105f54<br><br><br>####################################################################################<br><br>
and from the 2.6.18 one:<br>
<br>test1 kernel: Oops: 0002 [#1]<br>test1 kernel: SMP <br>test1 kernel: CPU: 1<br>test1 kernel: EIP is at kimage_add_entry+0x55/0x6e<br>test1 kernel: eax: 00000000 ebx: f7ccc600 ecx: c2b03ffc edx: 40000002<br>test1 kernel: esi: b22dd008 edi: 00000000 ebp: 00001000 esp: f795bf5c<br>
test1 kernel: ds: 007b es: 007b ss: 0068<br>test1 kernel: Process kexec (pid: 4749, ti=f795a000 task=dfa5c550 task.ti=f795a000)<br>test1 kernel: Stack: 00001000 c2645ba0 c013a316 ff81d000 f7ccc640 c0367058 f7ccc600 00000003 <br>
test1 kernel: 0000000a b7b1e008 001a2000 001a1e55 1fe5d000 00000001 c030cf48 0000000a <br>test1 kernel: c0121838 00000046 f7ccc600 00096498 00000000 000000ab f795a000 c0102c7b <br>test1 kernel: Call Trace:<br>test1
kernel: Code: ff ba f4 ff ff ff 85 c0 74 35 e8 c8 07 01 00 8b 4b 04 8d
90 00 00 00 40 83 ca 02 89 11 89 43 04 05 fc 0f 00 00 89 43 08 8b 43 04
<89> 30 8b 53 04 8d 42 04 89 43 04 c7 42 04 00 00 00 00 31 d2 5b <br>
test1 kernel: EIP: [<c0139ddd>] kimage_add_entry+0x55/0x6e SS:ESP 0068:f795bf5c<br>Segmentation fault<br><br>###########################################################################<br><br>BUG: unable to handle kernel NULL pointer dereference at virtual address 00000000<br>
printing eip:<br> c0139ddd<br> *pde = 00000000<br> Oops: 0002 [#1]<br> SMP <br> Modules
linked in: ipv6 ipt_LOG xt_limit xt_tcpudp iptable_filter ip_tables
x_tables dm_snapshot dm_mirror dm_mod tsdev floppy psmouse serio_raw
pcspkr e752x_edac edac_mc shpchp pci_hotplug evdev ext3 jbd mbcache
ide_generic ide_cd cdrom generic tg3 ehci_hcd uhci_hcd cciss scsi_mod
piix ide_core usbcore thermal processor fan<br>
CPU: 1<br> EIP: 0060:[<c0139ddd>] Not tainted VLI<br> EFLAGS: 00010206 (2.6.18-5-686 #1) <br> EIP is at kimage_add_entry+0x55/0x6e<br> eax: 00000000 ebx: f7ccc600 ecx: c2b03ffc edx: 40000002<br> esi: b22dd008 edi: 00000000 ebp: 00001000 esp: f795bf5c<br>
ds: 007b es: 007b ss: 0068<br> Process kexec (pid: 4749, ti=f795a000 task=dfa5c550 task.ti=f795a000)<br> Stack: 00001000 c2645ba0 c013a316 ff81d000 f7ccc640 c0367058 f7ccc600 00000003 <br> 0000000a b7b1e008 001a2000 001a1e55 1fe5d000 00000001 c030cf48 0000000a <br>
c0121838 00000046 f7ccc600 00096498 00000000 000000ab f795a000 c0102c7b <br> Call Trace:<br> [<c013a316>] sys_kexec_load+0x2b5/0x4ad<br> [<c0121838>] __do_softirq+0x5a/0xbb<br> [<c0102c7b>] syscall_call+0x7/0xb<br>
Code: ff ba f4 ff ff ff 85 c0 74 35 e8 c8 07 01 00 8b 4b 04 8d 90 00
00 00 40 83 ca 02 89 11 89 43 04 05 fc 0f 00 00 89 43 08 8b 43 04
<89> 30 8b 53 04 8d 42 04 89 43 04 c7 42 04 00 00 00 00 31 d2 5b <br>EIP: [<c0139ddd>] kimage_add_entry+0x55/0x6e SS:ESP 0068:f795bf5c<br>
<br><br>The problem is reproducible on two different machines (both HP DL360 G4) so I assume it is not hardware dependent.<br>Hope someone can help.<br>Thanks<br><br>ena