On Mon, Feb 12, 2018 at 7:56 AM, Bhupesh SHARMA <bhupesh.linux@xxxxxxxxx> wrote: > Hello, > > On Fri, Feb 9, 2018 at 7:24 PM, Gioh Kim <gurugio@xxxxxxxxx> wrote: >> Hello, >> >> "echo c > /proc/sysrq-trigger" generates the kernel dump but it >> reboots the system. >> I'd like to generate kernel dump without system reboot. >> >> I think it is possible to jump to the kdump kernel and generate kernel >> dump, and come back to the operating kernel with kexec. >> I know I can jump to the kdump kernel with "kexec -e" but I cannot >> figure out how to come back to the operating kernel. >> >> For example, I tried following sequences after reading kexec manual page. >> >> 0. rebuild kernel with CONFIG_KEXEC_JUMP option >> 1. kexec --load=/boot/vmlinuz --initrd=/boot/initrd --reuse-cmdline > > Instead you should be using something like: > # kexec -l /boot/vmlinuz-`uname -r` --initrd=/boot/initramfs-`uname > -r`.img --reuse-cmdline --load-preserve-context --mem-min=addr > --mem-max=addr Hello Bhupesh, Thank you for your advice. I tried load-preserve-context as below but it failed with "Invalid argument" error. There is no reason in the error message. But there is entry address that looks like the address "kexec -e" in the kdump kernel will jump to. Following is what I did. root@pserver:~# kexec -l /boot/vmlinuz-`uname -r` --initrd=/boot/initrd.img-`uname -r` --reuse-cmdline --load-preserve-context --mem-min=0x1000000 --mem-max=0xffffffff kexec_load failed: Invalid argument entry = 0xbffcb7f0 flags = 0x3e0002 nr_segments = 7 segment[0].buf = (nil) segment[0].bufsz = 0x0 segment[0].mem = 0x1000000 segment[0].memsz = 0xba080000 segment[1].buf = 0x7fe372eaa010 segment[1].bufsz = 0x2f7fddc segment[1].mem = 0xbb080000 segment[1].memsz = 0x2f80000 segment[2].buf = 0x7fe375e2e210 segment[2].bufsz = 0x61c840 segment[2].mem = 0xbe000000 segment[2].memsz = 0x14e1000 segment[3].buf = (nil) segment[3].bufsz = 0x0 segment[3].mem = 0xbf4e1000 segment[3].memsz = 0xae5000 segment[4].buf = 0x25eb920 segment[4].bufsz = 0x42c6 segment[4].mem = 0xbffc6000 segment[4].memsz = 0x5000 segment[5].buf = 0x25e27c0 segment[5].bufsz = 0x9100 segment[5].mem = 0xbffcb000 segment[5].memsz = 0xb000 segment[6].buf = 0x25e1e20 segment[6].bufsz = 0x400 segment[6].mem = 0xbffd6000 segment[6].memsz = 0x4000 root@pserver:~# root@pserver:~# root@pserver:~# kexec -e Nothing has been loaded! I added an output with adding -d option for your information. > > to let the kernel know that the primary kernel context should be > retained so that we can return to the same once we do a 'kexec -e' > from the secondary kernel. > > Can you please try the same. Also can you please share the details of > the hardware you are using this one, AFAIK only x86 and sh > architectures support CONFIG_KEXEC_JUMP in upstream linux. Of course, I'm using x86 platform. I'm testing v4.4 and v4.14 kernel on x86 Dell desktop and x86 Qemu virtual machine. > > Regards, > Bhupesh > >> 2. kexec -e >> 3. now kdump kernel is running >> 4. kexec --load-jump-back-helper --entry=<ADDRESS> >> 5. kexec -e >> >> I can jump to the kdump kernel with step 1 and step 2. >> kexec manual says I need an entry address. >> I don't know what address I should use. >> I found a email thread about jump_back_entry= but there is no >> parameter like jump_back_entry in kernel booting parameters of >> v4.4~v4.14. >> >> Does anybody know how to use kexec to jump between kdump kernel and >> operating kernel? >> >> >> -- >> >> Best regards, >> Gioh Kim >> >> _______________________________________________ >> kexec mailing list >> kexec@xxxxxxxxxxxxxxxxxxx >> http://lists.infradead.org/mailman/listinfo/kexec Following is the output of kexec with -d option. root@pserver:~# kexec -d -l /boot/vmlinuz-`uname -r` --initrd=/boot/initrd.img-`uname -r` --reuse-cmdline --load-preserve-context --mem-min=0x1000000 --mem-max=0xffffffff kernel: 0x7fd6b55eb010 kernel_size: 0x620a40 MEMORY RANGES 0000000000000100-000000000009fbff (0) 000000000009fc00-000000000009ffff (1) 00000000000f0000-00000000000fffff (1) 0000000000100000-00000000bffd9fff (0) 00000000bffda000-00000000bfffffff (1) 00000000feffc000-00000000feffffff (1) 00000000fffc0000-00000000ffffffff (1) 0000000100000000-000000013fffffff (0) 0000000000000000-0000000000000fff : reserved 0000000000001000-000000000009fbff : System RAM 000000000009fc00-000000000009ffff : reserved 00000000000a0000-00000000000bffff : PCI Bus 0000:00 00000000000c0000-00000000000c95ff : Video ROM 00000000000c9800-00000000000ca5ff : Adapter ROM 00000000000ca800-00000000000ccbff : Adapter ROM 00000000000f0000-00000000000fffff : reserved 00000000000f0000-00000000000fffff : System ROM 0000000000100000-00000000bffd9fff : System RAM 0000000001000000-0000000001846440 : Kernel code 0000000001846441-0000000001f5baff : Kernel data 00000000020af000-000000000236efff : Kernel bss 000000002a000000-0000000031ffffff : Crash kernel 00000000bffda000-00000000bfffffff : reserved 00000000c0000000-00000000febfffff : PCI Bus 0000:00 00000000fc000000-00000000fdffffff : 0000:00:02.0 00000000fe000000-00000000fe003fff : 0000:00:06.0 00000000fe000000-00000000fe003fff : virtio-pci-modern 00000000fe004000-00000000fe007fff : 0000:00:07.0 00000000fe004000-00000000fe007fff : virtio-pci-modern 00000000fe008000-00000000fe00bfff : 0000:00:08.0 00000000fe008000-00000000fe00bfff : virtio-pci-modern 00000000feb80000-00000000febbffff : 0000:00:03.0 00000000febc0000-00000000febdffff : 0000:00:03.0 00000000febc0000-00000000febdffff : e1000 00000000febe0000-00000000febeffff : 0000:00:02.0 00000000febf0000-00000000febf0fff : 0000:00:02.0 00000000febf1000-00000000febf1fff : 0000:00:06.0 00000000febf2000-00000000febf2fff : 0000:00:07.0 00000000febf3000-00000000febf3fff : 0000:00:08.0 00000000fec00000-00000000fec003ff : IOAPIC 0 00000000fed00000-00000000fed003ff : HPET 0 00000000fed00000-00000000fed003ff : PNP0103:00 00000000fee00000-00000000fee00fff : Local APIC 00000000feffc000-00000000feffffff : reserved 00000000fffc0000-00000000ffffffff : reserved 0000000100000000-000000013fffffff : System RAM get_backup_area: 0000000000001000-000000000009fbff : System RAM CRASH MEMORY RANGES 0000000000000000-0000000000000fff (1) 0000000000001000-000000000009fbff (0) 000000000009fc00-000000000009ffff (1) 0000000100000000-00000000000fffff (1) 0000000000100000-00000000000effff (0) 00000000bffda000-00000000000effff (1) 00000000feffc000-00000000000effff (1) 0000000100000000-00000000feffffff (0) 00000000fffc0000-00000000000effff (1) 0000000100000000-000000013fffffff (0) kernel load physical addr start = 0x0000000001000000 kernel symbol _stext vaddr = ffffffff810002b8 kernel vaddr = 0xffffffff81000000 size = 0x1395000 Memmap after adding segment 0000000000001000-000000000009fbff (0) Memmap after adding segment 0000000000001000-000000000009fbff (0) 00000000000f0000-00000000ffffffff (0) get_crash_notes_per_cpu: crash_notes addr = 137619200, size = 368 Elf header: p_type = 4, p_offset = 0x137619200 p_paddr = 0x137619200 p_vaddr = 0x0 p_filesz = 0x170 p_memsz = 0x170 get_crash_notes_per_cpu: crash_notes addr = 137639200, size = 368 Elf header: p_type = 4, p_offset = 0x137639200 p_paddr = 0x137639200 p_vaddr = 0x0 p_filesz = 0x170 p_memsz = 0x170 get_crash_notes_per_cpu: crash_notes addr = 137659200, size = 368 Elf header: p_type = 4, p_offset = 0x137659200 p_paddr = 0x137659200 p_vaddr = 0x0 p_filesz = 0x170 p_memsz = 0x170 get_crash_notes_per_cpu: crash_notes addr = 137679200, size = 368 Elf header: p_type = 4, p_offset = 0x137679200 p_paddr = 0x137679200 p_vaddr = 0x0 p_filesz = 0x170 p_memsz = 0x170 Kernel text Elf header: p_type = 1, p_offset = 0x1000000 p_paddr = 0x1000000 p_vaddr = 0xffffffff81000000 p_filesz = 0x1395000 p_memsz = 0x1395000 Elf header: p_type = 1, p_offset = 0x0 p_paddr = 0x1000 p_vaddr = 0xffff880000001000 p_filesz = 0x9ec00 p_memsz = 0x9ec00 Elf header: p_type = 1, p_offset = 0x100000 p_paddr = 0x100000 p_vaddr = 0xffff880000100000 p_filesz = 0xffffffffffff0000 p_memsz = 0xffffffffffff0000 Elf header: p_type = 1, p_offset = 0x100000000 p_paddr = 0x100000000 p_vaddr = 0xffff880100000000 p_filesz = 0xffffffffff000000 p_memsz = 0xffffffffff000000 Elf header: p_type = 1, p_offset = 0x100000000 p_paddr = 0x100000000 p_vaddr = 0xffff880100000000 p_filesz = 0x40000000 p_memsz = 0x40000000 Created elf header segment at 0xbffd6000 Memmap after deleting segment 0000000000001000-000000000009fbff (0) 00000000000f0000-00000000bffd5fff (0) 00000000bffda000-00000000ffffffff (0) Command line after adding elfcorehdr root=UUID=4845fda7-1e7f-4aa8-8e09-2076ddc8e17f ro quiet crashkernel=128M possible_cpus=512 crashkernel=384M-:128M elfcorehdr=3145560K Memmap after adding segment 0000000000000000-0000000000000fff (1) 0000000000001000-000000000009fbff (0) 00000000000f0000-00000000bffd5fff (0) 00000000bffda000-00000000ffffffff (0) Memmap after adding segment 0000000000000000-0000000000000fff (1) 0000000000001000-000000000009fbff (0) 000000000009fc00-000000000009ffff (1) 00000000000f0000-00000000bffd5fff (0) 00000000bffda000-00000000ffffffff (0) Memmap after adding segment 0000000000000000-0000000000000fff (1) 0000000000001000-000000000009fbff (0) 000000000009fc00-000000000009ffff (1) 00000000000f0000-00000000bffd5fff (0) 00000000bffda000-00000000ffffffff (0) 0000000100000000-00000000000fffff (1) Memmap after adding segment 0000000000000000-0000000000000fff (1) 0000000000001000-000000000009fbff (0) 000000000009fc00-000000000009ffff (1) 00000000000f0000-00000000bffd5fff (0) 00000000bffda000-00000000ffffffff (0) 0000000100000000-00000000000fffff (1) 00000000bffda000-00000000000effff (1) Memmap after adding segment 0000000000000000-0000000000000fff (1) 0000000000001000-000000000009fbff (0) 000000000009fc00-000000000009ffff (1) 00000000000f0000-00000000bffd5fff (0) 00000000bffda000-00000000ffffffff (0) 0000000100000000-00000000000fffff (1) 00000000bffda000-00000000000effff (1) 00000000feffc000-00000000000effff (1) Memmap after adding segment 0000000000000000-0000000000000fff (1) 0000000000001000-000000000009fbff (0) 000000000009fc00-000000000009ffff (1) 00000000000f0000-00000000bffd5fff (0) 00000000bffda000-00000000ffffffff (0) 0000000100000000-00000000000fffff (1) 00000000bffda000-00000000000effff (1) 00000000feffc000-00000000000effff (1) 00000000fffc0000-00000000000effff (1) sym: sha256_update info: 12 other: 00 shndx: 1 value: 5880 size: 152 sym: sha256_update value: bffd0880 addr: bffcb005 R_X86_64_64 sym: sha256_regions info: 11 other: 00 shndx: 9 value: 40 size: 100 sym: sha256_regions value: bffd2040 addr: bffcb010 R_X86_64_64 sym: sha256_starts info: 12 other: 00 shndx: 1 value: 1180 size: 79 sym: sha256_starts value: bffcc180 addr: bffcb037 R_X86_64_64 sym: sha256_regions info: 11 other: 00 shndx: 9 value: 40 size: 100 sym: sha256_regions value: bffd2140 addr: bffcb053 R_X86_64_64 sym: sha256_finish info: 12 other: 00 shndx: 1 value: 59d2 size: 375 sym: sha256_finish value: bffd09d2 addr: bffcb06a R_X86_64_64 sym: sha256_digest info: 11 other: 00 shndx: 9 value: 0 size: 20 sym: sha256_digest value: bffd2000 addr: bffcb07b R_X86_64_64 sym: memcmp info: 12 other: 00 shndx: 1 value: 65e size: 1d sym: memcmp value: bffcb65e addr: bffcb08a R_X86_64_64 sym: .rodata.str1.1 info: 03 other: 00 shndx: 6 value: 0 size: 0 sym: .rodata.str1.1 value: bffd0e60 addr: bffcb0a0 R_X86_64_64 sym: printf info: 12 other: 00 shndx: 1 value: 550 size: c9 sym: printf value: bffcb550 addr: bffcb0ac R_X86_64_64 sym: .rodata.str1.1 info: 03 other: 00 shndx: 6 value: 0 size: 0 sym: .rodata.str1.1 value: bffd0e80 addr: bffcb0b8 R_X86_64_64 sym: .rodata.str1.1 info: 03 other: 00 shndx: 6 value: 0 size: 0 sym: .rodata.str1.1 value: bffd0e90 addr: bffcb0d0 R_X86_64_64 sym: printf info: 12 other: 00 shndx: 1 value: 550 size: c9 sym: printf value: bffcb550 addr: bffcb0da R_X86_64_64 sym: .rodata.str1.1 info: 03 other: 00 shndx: 6 value: 0 size: 0 sym: .rodata.str1.1 value: bffd0e96 addr: bffcb0ec R_X86_64_64 sym: .rodata.str1.1 info: 03 other: 00 shndx: 6 value: 0 size: 0 sym: .rodata.str1.1 value: bffd0e98 addr: bffcb0fd R_X86_64_64 sym: sha256_digest info: 11 other: 00 shndx: 9 value: 0 size: 20 sym: sha256_digest value: bffd2000 addr: bffcb10c R_X86_64_64 sym: .rodata.str1.1 info: 03 other: 00 shndx: 6 value: 0 size: 0 sym: .rodata.str1.1 value: bffd0e90 addr: bffcb120 R_X86_64_64 sym: .rodata.str1.1 info: 03 other: 00 shndx: 6 value: 0 size: 0 sym: .rodata.str1.1 value: bffd0e96 addr: bffcb134 R_X86_64_64 sym: printf info: 12 other: 00 shndx: 1 value: 550 size: c9 sym: printf value: bffcb550 addr: bffcb13e R_X86_64_64 sym: __stack_chk_fail info: 10 other: 00 shndx: 0 value: 0 size: 0 sym: __stack_chk_fail value: 0 addr: bffcb162 R_X86_64_64 sym: .rodata.str1.1 info: 03 other: 00 shndx: 6 value: 0 size: 0 sym: .rodata.str1.1 value: bffd0ea8 addr: bffcb17a R_X86_64_64 sym: printf info: 12 other: 00 shndx: 1 value: 550 size: c9 sym: printf value: bffcb550 addr: bffcb186 R_X86_64_64 sym: setup_arch info: 12 other: 00 shndx: 1 value: 822 size: 3a sym: setup_arch value: bffcb822 addr: bffcb193 R_X86_64_64 sym: verify_sha256_digest info: 12 other: 00 shndx: 1 value: 0 size: 178 sym: verify_sha256_digest value: bffcb000 addr: bffcb19f R_X86_64_64 sym: post_verification_setup_arch info: 12 other: 00 shndx: 1 value: 894 size: 3b sym: post_verification_setup_arch value: bffcb894 addr: bffcb1b2 R_X86_64_64 sym: putchar info: 12 other: 00 shndx: 1 value: e13 size: 141 sym: putchar value: bffcbe13 addr: bffcb20a R_X86_64_64 sym: putchar info: 12 other: 00 shndx: 1 value: e13 size: 141 sym: putchar value: bffcbe13 addr: bffcb24d R_X86_64_64 sym: .rodata.str1.1 info: 03 other: 00 shndx: 6 value: 0 size: 0 sym: .rodata.str1.1 value: bffd0eba addr: bffcb31c R_X86_64_64 sym: putchar info: 12 other: 00 shndx: 1 value: e13 size: 141 sym: putchar value: bffcbe13 addr: bffcb429 R_X86_64_64 sym: __stack_chk_fail info: 10 other: 00 shndx: 0 value: 0 size: 0 sym: __stack_chk_fail value: 0 addr: bffcb478 R_X86_64_64 sym: vsprintf info: 12 other: 00 shndx: 1 value: 1bc size: 2d5 sym: vsprintf value: bffcb1bc addr: bffcb522 R_X86_64_64 sym: __stack_chk_fail info: 10 other: 00 shndx: 0 value: 0 size: 0 sym: __stack_chk_fail value: 0 addr: bffcb53e R_X86_64_64 sym: vsprintf info: 12 other: 00 shndx: 1 value: 1bc size: 2d5 sym: vsprintf value: bffcb1bc addr: bffcb5eb R_X86_64_64 sym: __stack_chk_fail info: 10 other: 00 shndx: 0 value: 0 size: 0 sym: __stack_chk_fail value: 0 addr: bffcb607 R_X86_64_64 sym: entry32 info: 10 other: 00 shndx: 1 value: 680 size: 0 sym: entry32 value: bffcb67c addr: bffcb68d R_X86_64_PC32 sym: entry32 info: 10 other: 00 shndx: 1 value: 680 size: 0 sym: entry32 value: bffcb67c addr: bffcb6a2 R_X86_64_PC32 sym: .data info: 03 other: 00 shndx: 9 value: 0 size: 0 sym: .data value: bffd215c addr: bffcb6bd R_X86_64_PC32 sym: .data info: 03 other: 00 shndx: 9 value: 0 size: 0 sym: .data value: bffd213c addr: bffcb6c4 R_X86_64_PC32 sym: .rodata info: 03 other: 00 shndx: 4 value: 0 size: 0 sym: .rodata value: bffd0d74 addr: bffcb6ca R_X86_64_PC32 sym: .data info: 03 other: 00 shndx: 9 value: 0 size: 0 sym: .data value: bffd21ac addr: bffcb6d0 R_X86_64_PC32 sym: .rodata info: 03 other: 00 shndx: 4 value: 0 size: 0 sym: .rodata value: bffd0d4c addr: bffcb6d6 R_X86_64_PC32 sym: .rodata info: 03 other: 00 shndx: 4 value: 0 size: 0 sym: .rodata value: bffd0de1 addr: bffcb709 R_X86_64_PC32 sym: .rodata info: 03 other: 00 shndx: 4 value: 0 size: 0 sym: .rodata value: bffd0df0 addr: bffcb710 R_X86_64_PC32 sym: .rodata info: 03 other: 00 shndx: 4 value: 0 size: 0 sym: .rodata value: bffd0dfb addr: bffcb717 R_X86_64_PC32 sym: .rodata info: 03 other: 00 shndx: 4 value: 0 size: 0 sym: .rodata value: bffd0e06 addr: bffcb71e R_X86_64_PC32 sym: .rodata info: 03 other: 00 shndx: 4 value: 0 size: 0 sym: .rodata value: bffd0e11 addr: bffcb725 R_X86_64_PC32 sym: .rodata info: 03 other: 00 shndx: 4 value: 0 size: 0 sym: .rodata value: bffd0e1c addr: bffcb72c R_X86_64_PC32 sym: .rodata info: 03 other: 00 shndx: 4 value: 0 size: 0 sym: .rodata value: bffd0e27 addr: bffcb733 R_X86_64_PC32 sym: .rodata info: 03 other: 00 shndx: 4 value: 0 size: 0 sym: .rodata value: bffd0e16 addr: bffcb73a R_X86_64_PC32 sym: .data info: 03 other: 00 shndx: 9 value: 0 size: 0 sym: .data value: bffd2271 addr: bffcb741 R_X86_64_PC32 sym: .rodata info: 03 other: 00 shndx: 4 value: 0 size: 0 sym: .rodata value: bffd0e0c addr: bffcb753 R_X86_64_PC32 sym: .rodata info: 03 other: 00 shndx: 4 value: 0 size: 0 sym: .rodata value: bffd0e3c addr: bffcb769 R_X86_64_PC32 sym: .rodata info: 03 other: 00 shndx: 4 value: 0 size: 0 sym: .rodata value: bffd0d7c addr: bffcb77c R_X86_64_PC32 sym: .rodata info: 03 other: 00 shndx: 4 value: 0 size: 0 sym: .rodata value: bffd0d84 addr: bffcb783 R_X86_64_PC32 sym: .rodata info: 03 other: 00 shndx: 4 value: 0 size: 0 sym: .rodata value: bffd0d8c addr: bffcb78a R_X86_64_PC32 sym: .rodata info: 03 other: 00 shndx: 4 value: 0 size: 0 sym: .rodata value: bffd0d94 addr: bffcb791 R_X86_64_PC32 sym: .rodata info: 03 other: 00 shndx: 4 value: 0 size: 0 sym: .rodata value: bffd0d9c addr: bffcb798 R_X86_64_PC32 sym: .rodata info: 03 other: 00 shndx: 4 value: 0 size: 0 sym: .rodata value: bffd0da4 addr: bffcb79f R_X86_64_PC32 sym: .rodata info: 03 other: 00 shndx: 4 value: 0 size: 0 sym: .rodata value: bffd0dac addr: bffcb7a6 R_X86_64_PC32 sym: .rodata info: 03 other: 00 shndx: 4 value: 0 size: 0 sym: .rodata value: bffd0db4 addr: bffcb7ad R_X86_64_PC32 sym: .rodata info: 03 other: 00 shndx: 4 value: 0 size: 0 sym: .rodata value: bffd0dbc addr: bffcb7b4 R_X86_64_PC32 sym: .rodata info: 03 other: 00 shndx: 4 value: 0 size: 0 sym: .rodata value: bffd0dc4 addr: bffcb7bb R_X86_64_PC32 sym: .rodata info: 03 other: 00 shndx: 4 value: 0 size: 0 sym: .rodata value: bffd0dcc addr: bffcb7c2 R_X86_64_PC32 sym: .rodata info: 03 other: 00 shndx: 4 value: 0 size: 0 sym: .rodata value: bffd0dd4 addr: bffcb7c9 R_X86_64_PC32 sym: .rodata info: 03 other: 00 shndx: 4 value: 0 size: 0 sym: .rodata value: bffd0ddc addr: bffcb7d0 R_X86_64_PC32 sym: .rodata info: 03 other: 00 shndx: 4 value: 0 size: 0 sym: .rodata value: bffd0de4 addr: bffcb7d7 R_X86_64_PC32 sym: .rodata info: 03 other: 00 shndx: 4 value: 0 size: 0 sym: .rodata value: bffd0dec addr: bffcb7de R_X86_64_PC32 sym: .rodata info: 03 other: 00 shndx: 4 value: 0 size: 0 sym: .rodata value: bffd0df4 addr: bffcb7e5 R_X86_64_PC32 sym: .rodata info: 03 other: 00 shndx: 4 value: 0 size: 0 sym: .rodata value: bffd0dfc addr: bffcb7eb R_X86_64_PC32 sym: .rodata info: 03 other: 00 shndx: 4 value: 0 size: 0 sym: .rodata value: bffd0e3c addr: bffcb7f3 R_X86_64_PC32 sym: jump_back_entry info: 11 other: 00 shndx: 9 value: 2008 size: 8 sym: jump_back_entry value: bffd4004 addr: bffcb80d R_X86_64_PC32 sym: .bss info: 03 other: 00 shndx: b value: 0 size: 0 sym: .bss value: bffd5ffc addr: bffcb814 R_X86_64_PC32 sym: purgatory info: 12 other: 00 shndx: 1 value: 178 size: 44 sym: purgatory value: bffcb174 addr: bffcb819 R_X86_64_PC32 sym: entry64 info: 10 other: 00 shndx: 1 value: 750 size: 0 sym: entry64 value: bffcb74c addr: bffcb81e R_X86_64_PC32 sym: reset_vga info: 11 other: 00 shndx: 9 value: 2012 size: 1 sym: reset_vga value: bffd4012 addr: bffcb824 R_X86_64_64 sym: x86_reset_vga info: 12 other: 00 shndx: 1 value: f54 size: 1fb sym: x86_reset_vga value: bffcbf54 addr: bffcb834 R_X86_64_64 sym: legacy_pic info: 11 other: 00 shndx: 9 value: 2011 size: 1 sym: legacy_pic value: bffd4011 addr: bffcb840 R_X86_64_64 sym: x86_setup_legacy_pic info: 12 other: 00 shndx: 1 value: 114f size: 31 sym: x86_setup_legacy_pic value: bffcc14f addr: bffcb850 R_X86_64_64 sym: cmdline_end info: 11 other: 00 shndx: 9 value: 2000 size: 8 sym: cmdline_end value: bffd4000 addr: bffcb85e R_X86_64_64 sym: jump_back_entry info: 11 other: 00 shndx: 9 value: 2008 size: 8 sym: jump_back_entry value: bffd4008 addr: bffcb870 R_X86_64_64 sym: .rodata.str1.1 info: 03 other: 00 shndx: 6 value: 0 size: 0 sym: .rodata.str1.1 value: bffd0ecb addr: bffcb87a R_X86_64_64 sym: sprintf info: 12 other: 00 shndx: 1 value: 491 size: bf sym: sprintf value: bffcb491 addr: bffcb887 R_X86_64_64 sym: panic_kernel info: 11 other: 00 shndx: 9 value: 2010 size: 1 sym: panic_kernel value: bffd4010 addr: bffcb896 R_X86_64_64 sym: crashdump_backup_memory info: 12 other: 00 shndx: 1 value: d33 size: 3e sym: crashdump_backup_memory value: bffcbd33 addr: bffcb8a6 R_X86_64_64 sym: jump_back_entry info: 11 other: 00 shndx: 9 value: 2008 size: 8 sym: jump_back_entry value: bffd4008 addr: bffcb8b2 R_X86_64_64 sym: x86_setup_jump_back_entry info: 12 other: 00 shndx: 1 value: 85c size: 38 sym: x86_setup_jump_back_entry value: bffcb85c addr: bffcb8c3 R_X86_64_64 sym: .data info: 03 other: 00 shndx: 9 value: 0 size: 0 sym: .data value: bffd4047 addr: bffcb8e7 R_X86_64_PC32 sym: .data info: 03 other: 00 shndx: 9 value: 0 size: 0 sym: .data value: bffd404f addr: bffcb8ed R_X86_64_PC32 sym: .data info: 03 other: 00 shndx: 9 value: 0 size: 0 sym: .data value: bffd4075 addr: bffcb90d R_X86_64_PC32 sym: .data info: 03 other: 00 shndx: 9 value: 0 size: 0 sym: .data value: bffd407f addr: bffcb913 R_X86_64_PC32 sym: .data info: 03 other: 00 shndx: 9 value: 0 size: 0 sym: .data value: bffd4089 addr: bffcb919 R_X86_64_PC32 sym: .data info: 03 other: 00 shndx: 9 value: 0 size: 0 sym: .data value: bffd4093 addr: bffcb91f R_X86_64_PC32 sym: .data info: 03 other: 00 shndx: 9 value: 0 size: 0 sym: .data value: bffd4076 addr: bffcb926 R_X86_64_PC32 sym: .data info: 03 other: 00 shndx: 9 value: 0 size: 0 sym: .data value: bffd408d addr: bffcb92d R_X86_64_PC32 sym: .data info: 03 other: 00 shndx: 9 value: 0 size: 0 sym: .data value: bffd406d addr: bffcb9f7 R_X86_64_PC32 sym: .data info: 03 other: 00 shndx: 9 value: 0 size: 0 sym: .data value: bffd4075 addr: bffcb9fd R_X86_64_PC32 sym: .data info: 03 other: 00 shndx: 9 value: 0 size: 0 sym: .data value: bffd409b addr: bffcba1d R_X86_64_PC32 sym: .data info: 03 other: 00 shndx: 9 value: 0 size: 0 sym: .data value: bffd40a5 addr: bffcba23 R_X86_64_PC32 sym: .data info: 03 other: 00 shndx: 9 value: 0 size: 0 sym: .data value: bffd40af addr: bffcba29 R_X86_64_PC32 sym: .data info: 03 other: 00 shndx: 9 value: 0 size: 0 sym: .data value: bffd40b9 addr: bffcba2f R_X86_64_PC32 sym: .data info: 03 other: 00 shndx: 9 value: 0 size: 0 sym: .data value: bffd40e2 addr: bffcba72 R_X86_64_PC32 sym: .data info: 03 other: 00 shndx: 9 value: 0 size: 0 sym: .data value: bffd412b addr: bffcbab5 R_X86_64_PC32 sym: backup_src_start info: 11 other: 00 shndx: 9 value: 2078 size: 8 sym: backup_src_start value: bffd4078 addr: bffcbd35 R_X86_64_64 sym: backup_src_size info: 11 other: 00 shndx: 9 value: 2070 size: 8 sym: backup_src_size value: bffd4070 addr: bffcbd42 R_X86_64_64 sym: backup_start info: 11 other: 00 shndx: 9 value: 2080 size: 8 sym: backup_start value: bffd4080 addr: bffcbd54 R_X86_64_64 sym: memcpy info: 12 other: 00 shndx: 1 value: 646 size: 18 sym: memcpy value: bffcb646 addr: bffcbd66 R_X86_64_64 sym: .data info: 03 other: 00 shndx: 9 value: 0 size: 0 sym: .data value: bffd4088 addr: bffcbd73 R_X86_64_64 sym: serial_base info: 11 other: 00 shndx: 9 value: 2090 size: 2 sym: serial_base value: bffd4090 addr: bffcbd80 R_X86_64_64 sym: serial_baud info: 11 other: 00 shndx: 9 value: 208c size: 4 sym: serial_baud value: bffd408c addr: bffcbdbd R_X86_64_64 sym: .data info: 03 other: 00 shndx: 9 value: 0 size: 0 sym: .data value: bffd4088 addr: bffcbded R_X86_64_64 sym: console_vga info: 11 other: 00 shndx: 9 value: 2093 size: 1 sym: console_vga value: bffd4093 addr: bffcbe15 R_X86_64_64 sym: .data info: 03 other: 00 shndx: 9 value: 0 size: 0 sym: .data value: bffd4098 addr: bffcbe2c R_X86_64_64 sym: .data info: 03 other: 00 shndx: 9 value: 0 size: 0 sym: .data value: bffd4098 addr: bffcbe91 R_X86_64_64 sym: .data info: 03 other: 00 shndx: 9 value: 0 size: 0 sym: .data value: bffd4094 addr: bffcbea6 R_X86_64_64 sym: .data info: 03 other: 00 shndx: 9 value: 0 size: 0 sym: .data value: bffd4098 addr: bffcbeb5 R_X86_64_64 sym: .data info: 03 other: 00 shndx: 9 value: 0 size: 0 sym: .data value: bffd4098 addr: bffcbec8 R_X86_64_64 sym: .data info: 03 other: 00 shndx: 9 value: 0 size: 0 sym: .data value: bffd4094 addr: bffcbed4 R_X86_64_64 sym: .data info: 03 other: 00 shndx: 9 value: 0 size: 0 sym: .data value: bffd4094 addr: bffcbeeb R_X86_64_64 sym: .data info: 03 other: 00 shndx: 9 value: 0 size: 0 sym: .data value: bffd4094 addr: bffcbf09 R_X86_64_64 sym: .data info: 03 other: 00 shndx: 9 value: 0 size: 0 sym: .data value: bffd4098 addr: bffcbf1b R_X86_64_64 sym: console_serial info: 11 other: 00 shndx: 9 value: 2092 size: 1 sym: console_serial value: bffd4092 addr: bffcbf25 R_X86_64_64 sym: .text info: 03 other: 00 shndx: 1 value: 0 size: 0 sym: .text value: bffcbd71 addr: bffcbf37 R_X86_64_64 sym: __stack_chk_fail info: 10 other: 00 shndx: 0 value: 0 size: 0 sym: __stack_chk_fail value: 0 addr: bffd0874 R_X86_64_64 sym: memcpy info: 12 other: 00 shndx: 1 value: 646 size: 18 sym: memcpy value: bffcb646 addr: bffd0932 R_X86_64_64 sym: sha256_process info: 12 other: 00 shndx: 1 value: 11f9 size: 4687 sym: sha256_process value: bffcc1f9 addr: bffd0950 R_X86_64_64 sym: sha256_process info: 12 other: 00 shndx: 1 value: 11f9 size: 4687 sym: sha256_process value: bffcc1f9 addr: bffd0984 R_X86_64_64 sym: memcpy info: 12 other: 00 shndx: 1 value: 646 size: 18 sym: memcpy value: bffcb646 addr: bffd09c6 R_X86_64_64 sym: .data info: 03 other: 00 shndx: 9 value: 0 size: 0 sym: .data value: bffd40c0 addr: bffd0a8e R_X86_64_64 sym: sha256_update info: 12 other: 00 shndx: 1 value: 5880 size: 152 sym: sha256_update value: bffd0880 addr: bffd0a9b R_X86_64_64 sym: sha256_update info: 12 other: 00 shndx: 1 value: 5880 size: 152 sym: sha256_update value: bffd0880 addr: bffd0aba R_X86_64_64 sym: __stack_chk_fail info: 10 other: 00 shndx: 0 value: 0 size: 0 sym: __stack_chk_fail value: 0 addr: bffd0d3b R_X86_64_64 sym: entry16 info: 10 other: 00 shndx: 1 value: 8d0 size: 0 sym: entry16 value: bffcb8d0 addr: bffd0d78 R_X86_64_64 sym: entry32 info: 10 other: 00 shndx: 1 value: 680 size: 0 sym: entry32 value: bffcb680 addr: bffd0e00 R_X86_64_64 sym: .rodata info: 03 other: 00 shndx: 4 value: 0 size: 0 sym: .rodata value: bffd0e10 addr: bffd0e12 R_X86_64_64 sym: .rodata info: 03 other: 00 shndx: 4 value: 0 size: 0 sym: .rodata value: bffd0e40 addr: bffd0e42 R_X86_64_64 sym: .text info: 03 other: 00 shndx: 1 value: 0 size: 0 sym: .text value: bffcb000 addr: bffd0f08 R_X86_64_PC32 sym: .text info: 03 other: 00 shndx: 1 value: 0 size: 0 sym: .text value: bffcb178 addr: bffd0f40 R_X86_64_PC32 sym: .text info: 03 other: 00 shndx: 1 value: 0 size: 0 sym: .text value: bffcb1bc addr: bffd0f70 R_X86_64_PC32 sym: .text info: 03 other: 00 shndx: 1 value: 0 size: 0 sym: .text value: bffcb491 addr: bffd0fc0 R_X86_64_PC32 sym: .text info: 03 other: 00 shndx: 1 value: 0 size: 0 sym: .text value: bffcb550 addr: bffd0fe0 R_X86_64_PC32 sym: .text info: 03 other: 00 shndx: 1 value: 0 size: 0 sym: .text value: bffcb619 addr: bffd1018 R_X86_64_PC32 sym: .text info: 03 other: 00 shndx: 1 value: 0 size: 0 sym: .text value: bffcb632 addr: bffd1030 R_X86_64_PC32 sym: .text info: 03 other: 00 shndx: 1 value: 0 size: 0 sym: .text value: bffcb646 addr: bffd1048 R_X86_64_PC32 sym: .text info: 03 other: 00 shndx: 1 value: 0 size: 0 sym: .text value: bffcb65e addr: bffd1060 R_X86_64_PC32 sym: .text info: 03 other: 00 shndx: 1 value: 0 size: 0 sym: .text value: bffcb822 addr: bffd1090 R_X86_64_PC32 sym: .text info: 03 other: 00 shndx: 1 value: 0 size: 0 sym: .text value: bffcb85c addr: bffd10b0 R_X86_64_PC32 sym: .text info: 03 other: 00 shndx: 1 value: 0 size: 0 sym: .text value: bffcb894 addr: bffd10c8 R_X86_64_PC32 sym: .text info: 03 other: 00 shndx: 1 value: 0 size: 0 sym: .text value: bffcbd33 addr: bffd1100 R_X86_64_PC32 sym: .text info: 03 other: 00 shndx: 1 value: 0 size: 0 sym: .text value: bffcbd71 addr: bffd1130 R_X86_64_PC32 sym: .text info: 03 other: 00 shndx: 1 value: 0 size: 0 sym: .text value: bffcbe13 addr: bffd1148 R_X86_64_PC32 sym: .text info: 03 other: 00 shndx: 1 value: 0 size: 0 sym: .text value: bffcbf54 addr: bffd1190 R_X86_64_PC32 sym: .text info: 03 other: 00 shndx: 1 value: 0 size: 0 sym: .text value: bffcc14f addr: bffd11c0 R_X86_64_PC32 sym: .text info: 03 other: 00 shndx: 1 value: 0 size: 0 sym: .text value: bffcc180 addr: bffd11f0 R_X86_64_PC32 sym: .text info: 03 other: 00 shndx: 1 value: 0 size: 0 sym: .text value: bffcc1f9 addr: bffd1210 R_X86_64_PC32 sym: .text info: 03 other: 00 shndx: 1 value: 0 size: 0 sym: .text value: bffd0880 addr: bffd1230 R_X86_64_PC32 sym: .text info: 03 other: 00 shndx: 1 value: 0 size: 0 sym: .text value: bffd09d2 addr: bffd1250 R_X86_64_PC32 sym: .data info: 03 other: 00 shndx: 9 value: 0 size: 0 sym: .data value: bffd2140 addr: bffd2142 R_X86_64_64 Loaded purgatory at addr 0xbffcb000 Loaded real_mode_data and command line at 0xbffc6000 kernel init_size 0x14e1000 Loaded 64bit kernel at 0xbe000000 Loaded initrd at 0xbb080000 size 0x2f7fddc E820 memmap: 0000000000000100-000000000009fbff (1) 000000000009fc00-000000000009ffff (2) 00000000000f0000-00000000000fffff (2) 0000000000100000-00000000bffd9fff (1) 00000000bffda000-00000000bfffffff (2) 00000000feffc000-00000000feffffff (2) 00000000fffc0000-00000000ffffffff (2) 0000000100000000-000000013fffffff (1) /sys/firmware/edd does not exist. kexec_load: entry = 0xbffcb7f0 flags = 0x3e0002 nr_segments = 7 segment[0].buf = (nil) segment[0].bufsz = 0x0 segment[0].mem = 0x1000000 segment[0].memsz = 0xba080000 segment[1].buf = 0x7fd6b266b010 segment[1].bufsz = 0x2f7fddc segment[1].mem = 0xbb080000 segment[1].memsz = 0x2f80000 segment[2].buf = 0x7fd6b55ef210 segment[2].bufsz = 0x61c840 segment[2].mem = 0xbe000000 segment[2].memsz = 0x14e1000 segment[3].buf = (nil) segment[3].bufsz = 0x0 segment[3].mem = 0xbf4e1000 segment[3].memsz = 0xae5000 segment[4].buf = 0x1776920 segment[4].bufsz = 0x42c6 segment[4].mem = 0xbffc6000 segment[4].memsz = 0x5000 segment[5].buf = 0x176d7c0 segment[5].bufsz = 0x9100 segment[5].mem = 0xbffcb000 segment[5].memsz = 0xb000 segment[6].buf = 0x176ce20 segment[6].bufsz = 0x400 segment[6].mem = 0xbffd6000 segment[6].memsz = 0x4000 kexec_load failed: Invalid argument entry = 0xbffcb7f0 flags = 0x3e0002 nr_segments = 7 segment[0].buf = (nil) segment[0].bufsz = 0x0 segment[0].mem = 0x1000000 segment[0].memsz = 0xba080000 segment[1].buf = 0x7fd6b266b010 segment[1].bufsz = 0x2f7fddc segment[1].mem = 0xbb080000 segment[1].memsz = 0x2f80000 segment[2].buf = 0x7fd6b55ef210 segment[2].bufsz = 0x61c840 segment[2].mem = 0xbe000000 segment[2].memsz = 0x14e1000 segment[3].buf = (nil) segment[3].bufsz = 0x0 segment[3].mem = 0xbf4e1000 segment[3].memsz = 0xae5000 segment[4].buf = 0x1776920 segment[4].bufsz = 0x42c6 segment[4].mem = 0xbffc6000 segment[4].memsz = 0x5000 segment[5].buf = 0x176d7c0 segment[5].bufsz = 0x9100 segment[5].mem = 0xbffcb000 segment[5].memsz = 0xb000 segment[6].buf = 0x176ce20 segment[6].bufsz = 0x400 segment[6].mem = 0xbffd6000 segment[6].memsz = 0x4000 -- Best regards, Gioh Kim _______________________________________________ kexec mailing list kexec@xxxxxxxxxxxxxxxxxxx http://lists.infradead.org/mailman/listinfo/kexec