kexec -e 可以工作,但 kexec -p 不起作用

问题描述 投票:0回答:1

我想使用kdump&&kexec,所以我安装了kexec-tools,配置了/etc/kdump.conf和kdump.service。 STFW,按照步骤,我可以使用kexec -l,然后kexec -e,成功更改为新内核。 但是当我使用具有相同参数的 kexec -p 时,触发恐慌,新内核在没有“启动故障转储内核...再见!”的情况下无法工作

/# systemctl is-active kdump
active
/# echo c >/proc/sysrq-trigger
[  230.708406] sysrq: Trigger a crash
[  230.711948] Unable to handle kernel NULL pointer dereference at virtual address 00000000
[  230.720290] Mem abort info:
[  230.723110]   Exception class = DABT (current EL), IL = 32 bits
[  230.729049]   SET = 0, FnV = 0
[  230.732140]   EA = 0, S1PTW = 0
[  230.735304] Data abort info:
[  230.738209]   ISV = 0, ISS = 0x00000044
[  230.742058]   CM = 0, WnR = 1
[  230.745062] user pgtable: 4k pages, 48-bit VAs, pgd = ffff800230cb6000
[  230.751609] [0000000000000000] *pgd=0000000000000000
[  230.756728] Internal error: Oops: 96000044 [#1] PREEMPT SMP
[  230.762316] Modules linked in:
[  230.765381] Process bash (pid: 2939, stack limit = 0xffff800230fb4000)
[  230.771926] CPU: 1 PID: 2939 Comm: bash Not tainted 4.14.207-10.3.9.0-2 #1
[  230.778818] Hardware name: Model: Marvell CN9130 development board (CP NOR) setup(A) (DT)
[  230.787015] task: ffff800230c19b80 task.stack: ffff800230fb4000
[  230.792952] pc : sysrq_handle_crash+0x54/0x98
[  230.797319] lr : sysrq_handle_crash+0x40/0x98
[  230.801686] sp : ffff800230fb7d20 pstate : 60000145
[  230.806576] x29: ffff800230fb7d20 x28: ffff800230c19b80 
[  230.811905] x27: ffff000008ee1000 x26: 0000000000000040 
[  230.817234] x25: 0000000000000124 x24: 0000000000000000 
[  230.822562] x23: 000000000000000a x22: ffff000009663990 
[  230.827890] x21: ffff000009616000 x20: 0000000000000063 
[  230.833218] x19: ffff000009616f70 x18: 0000000000005a04 
[  230.838546] x17: 000000000000df54 x16: 0000000000000000 
[  230.843874] x15: 0000000000005a03 x14: 0000000000000038 
[  230.849202] x13: ffff00000970cfa8 x12: 000000000000001c 
[  230.854530] x11: 0000000000000038 x10: 0000000000000990 
[  230.859858] x9 : 0000000000000001 x8 : ffff00000813b000 
[  230.865186] x7 : 0000000000000000 x6 : ffff800230c1a4e0 
[  230.870513] x5 : 000000009795e467 x4 : 0000000041e70b64 
[  230.875841] x3 : 940d79af250dbf15 x2 : 0000000000000002 
[  230.881169] x1 : 0000000000000000 x0 : 0000000000000001 
[  230.886497] Call trace:
[  230.888950]  sysrq_handle_crash+0x54/0x98
[  230.892969]  __handle_sysrq+0xdc/0x248
[  230.896726]  write_sysrq_trigger+0x90/0xa8
[  230.900835]  proc_reg_write+0x6c/0xa0
[  230.904506]  __vfs_write+0x18/0x118
[  230.908003]  vfs_write+0xa8/0x1b8
[  230.911325]  SyS_write+0x50/0xc8
[  230.914563]  __sys_trace_return+0x0/0x4
[  230.918410] Code: 52800020 b90f8820 d5033e9f d2800001 (39000020) 
[  230.924525] SMP: stopping secondary CPUs
[  230.928464] Unable to handle kernel NULL pointer dereference at virtual address 00000038
[  230.936573] Mem abort info:
[  230.939373]   Exception class = DABT (current EL), IL = 32 bits
[  230.945306]   SET = 0, FnV = 0
[  230.948366]   EA = 0, S1PTW = 0
[  230.951513] Data abort info:
[  230.954399]   ISV = 0, ISS = 0x00000004
[  230.958243]   CM = 0, WnR = 0
[  230.961218] user pgtable: 4k pages, 48-bit VAs, pgd = ffff800230cb6000
[  230.967760] [0000000000000038] *pgd=0000000000000000
WDT:   Started with servicing (60s timeout)

以下信息是我的配置,有什么错误或遗漏吗?有人可以帮助我吗,我将不胜感激,谢谢~

/# cat /proc/cmdline
ubi.mtd=6 root=ubi0:rootfs rootwait rootfstype=ubifs console=ttyS1,115200 earlycon=uart8250,mmio32,0xf0512000 mem=8192M rw root=/dev/nfs nfsroot=192.168.3.131:/home/zyj/rootfs_mvl proto=tcp ip=192.168.3.196:192.168.3.131:10.4.50.254:255.255.255.0::eth0:on rw crashkernel=1024M debug nokaslr earlyprintk systemd.journald.forward_to_console=1

/# cat /proc/iomem | grep Crash
  80000000-bfffffff : Crash kernel

/# cat /sys/kernel/kexec_crash_size
1073741824

/# cat /etc/kdump.conf
# kdump.conf configuration file for kdump service

# Set the NFS server and shared directory path
# nfs 192.168.3.131:/home/zyj/rootfs_mvl

# Set the path where the crash dump will be stored
path /var/crash

# Specify the URL where the crash dump will be saved
# This can be a local path, an NFS mount, or a remote server
kdump_url file:///var/crash
  
# Configure the core collector tool
#core_collector /sbin/crash
core_collector makedumpfile -c --message-level 1 -d 31

# Reserve memory for kdump as specified in the GRUB configuration
# This should match the 'crashkernel' parameter in your GRUB settings
reserve_memory = 1024M

# Control whether to write the memory contents to the crash dump
write_memory = yes

# Set the timeout for kdump to wait before rebooting the system
timeout = 300

# Enable or disable automatic reboot after a crash dump
reboot = no
default dump_to_rootfs
# Compress the crash dump to save disk space
compress = yes

# Save the crash dump to a remote NFS server
# nfs 192.168.3.131:/home/zyj/rootfs_mvl

# Configure network settings for the kdump capture kernel
# Replace 'eth0' with the name of your network interface
network eth0
network 192.168.3.196/24

# Configure firewall rules to allow network access for the capture kernel
# This is optional and depends on your network configuration
firewall --rule 22

# Additional options can be added here as needed

/# cat /etc/systemd/system/kdump.service 
[Unit]
Description=Kernel Crash Dump Service
After=local-fs.target remote-fs.target nss-lookup.target

[Service]
Type=oneshot
ExecStart=/sbin/kexec -p -d /beifen/vmlinux --reuse-cmdline --dtb=/beifen/cn9130-db-A.dtb --command-line="root=/dev/nfs nfsroot=192.168.3.131:/home/zyj/rootfs_mvl proto=tcp nfsvers=3 rootwait rootfstype=ubifs console=ttyS1,115200 init=/linuxrc earlycon=uart8250,mmio32,0xf0512000 mem=8192M rw ip=192.168.3.196:192.168.3.131:192.168.3.1:255.255.255.0::eth0:on rw irqpoll nr_cpus=1 reset_devices cgroup_disable=memory mce=off numa=off udev.children-max=2 panic=10 rootflags=nofail acpi_no_memhotplug transparent_hugepage=never nokaslr novmcoredd hest_disable"
RemainAfterExit=yes

[Install]
WantedBy=multi-user.target

/# cat /sys/kernel/kexec_crash_loaded 
1
/# cat /proc/sys/kernel/kexec_load_disabled
0

当我启动 kdump 时,以下是信息:

/# systemctl restart kdump
[ 4758.820389] systemd[1]: kdump.service: Deactivated successfully.
[ 4758.821[ 4758.903930] systemd-journald[1835]: Successfully sent stream file descriptor to service manager.
304] systemd[1]: Stopped Kernel Crash Dump Service.
[ 4758.821686] systemd[1]: Stopping Kernel Crash Dump Service...
[ 4758.825076] systemd[1]: Starting Kernel Crash Dump Service...
[ 4758.837512] kexec[3082]: kernel symbol _text vaddr = ffff000008080000
[ 4758.837766] kexec[3082]: kernel symbol _stext vaddr = ffff000008081000
[ 4758.956751] kexec[3082]: kernel symbol __init_begin vaddr = ffff000009360000
[ 4758.957124] kexec[3082]: arch_process_options:178: command_line: ubi.mtd=6 root=ubi0:rootfs rootwait rootfstype=ubifs console=ttyS1,115200 earlycon=uart8250,mmio32,0xf0512000 mem=8192M rw root=/dev/nfs nfsroot=192.168.3.131:/home/zyj/rootfs_mvl proto=tcp ip=192.168.3.196:192.168.3.131:10.4.50.254:255.255.255.0::eth0:on rw debug nokaslr earlyprintk systemd.journald.forward_to_console=1 root=/dev/nfs nfsroot=192.168.3.131:/home/zyj/rootfs_mvl proto=tcp nfsvers=3 rootwait rootfstype=ubifs console=ttyS1,115200 init=/linuxrc earlycon=uart8250,mmio32,0xf0512000 mem=8192M rw ip=192.168.3.196:192.168.3.131:192.168.3.1:255.255.255.0::eth0:on rw irqpoll nr_cpus=1 reset_devices cgroup_disable=memory mce=off numa=off udev.children-max=2 panic=10 rootflags=nofail acpi_no_memhotplug transparent_hugepage=never nokaslr novmcoredd hest_disable
[ 4758.957322] kexec[3082]: arch_process_options:180: initrd: (null)
[ 4758.957531] kexec[3082]: arch_process_options:182: dtb: /beifen/cn9130-db-A.dtb
[ 4758.957717] kexec[3082]: arch_process_options:185: console: (null)
[ 4759.240333] kexec[3082]: kernel: 0xffff8a919010 kernel_size: 0x15016d48
[ 4759.240668] kexec[3082]: kernel symbol _text vaddr = ffff000008080000
[ 4759.240852] kexec[3082]: Warning, can't get the VA_BITS from kcore
[ 4759.241071] kexec[3082]: kernel symbol _stext vaddr = ffff000008081000
[ 4759.241244] kexec[3082]: va_bits : 48
[ 4759.241416] kexec[3082]: page_offset : ffff800000000000
[ 4759.241587] kexec[3082]: set_phys_offset: phys_offset : 0000000000000000 (method : pt_load)
[ 4759.241775] kexec[3082]: get_memory_ranges:+[0] 0000000000000000 - 0000000003ffffff
[ 4759.241947] kexec[3082]: get_memory_ranges:+[1] 0000000004200000 - 00000000043fffff
[ 4759.242120] kexec[3082]: get_memory_ranges:+[2] 0000000005400000 - 00000000bfffffff
[ 4759.242398] kexec[3082]: get_memory_ranges:+[3] 0000000100000000 - 000000023fffffff
[ 4759.242572] kexec[3082]: System RAM ranges;
[ 4759.242742] kexec[3082]: 0000000000000000-0000000003ffffff (0)
[ 4759.242909] kexec[3082]: 0000000004200000-00000000043fffff (0)
[ 4759.243090] kexec[3082]: 0000000005400000-00000000bfffffff (0)
[ 4759.243258] kexec[3082]: 0000000100000000-000000023fffffff (0)
[ 4759.243423] kexec[3082]: elf_arm64_load: e_entry:        ffff000008080000
[ 4759.243718] kexec[3082]: elf_arm64_load: p_vaddr:        ffff000008080000
[ 4759.243892] kexec[3082]: elf_arm64_load: header_offset:  0000000000000000
[ 4759.244157] kexec[3082]: elf_arm64_load: kernel_segment: 0000000080000000
[ 4759.244341] kexec[3082]: elf_arm64_load: text_offset:    0000000000080000
[ 4759.244526] kexec[3082]: elf_arm64_load: image_size:     0000000003f65000
[ 4759.244696] kexec[3082]: elf_arm64_load: phys_offset:    0000000000000000
[ 4759.244865] kexec[3082]: elf_arm64_load: vp_offset:      ffff000008000000
[ 4759.245033] kexec[3082]: elf_arm64_load: PE format:      yes
[ 4759.245202] kexec[3082]: Reserved memory range
[ 4759.245371] kexec[3082]: 0000000080000000-00000000bfffffff (0)
[ 4759.245539] kexec[3082]: Coredump memory ranges
[ 4759.245708] kexec[3082]: 0000000000000000-0000000003ffffff (0)
[ 4759.245888] kexec[3082]: 0000000004200000-00000000043fffff (0)
[ 4759.246058] kexec[3082]: 0000000005400000-000000007fffffff (0)
[ 4759.246228] kexec[3082]: 0000000100000000-000000023fffffff (0)
[ 4759.246398] kexec[3082]: kernel symbol _text vaddr = ffff000008080000
[ 4759.246568] kexec[3082]: kernel symbol _text vaddr = ffff000008080000
[ 4759.246748] kexec[3082]: va_bits : 48
[ 4759.246918] kexec[3082]: page_offset : ffff800000000000
[ 4759.247087] kexec[3082]: load_crashdump_segments: page_offset:   ffff800000000000
[ 4759.247269] kexec[3082]: get_crash_notes_per_cpu: crash_notes addr = 23746a200, size = 424
[ 4759.247440] kexec[3082]: Elf header: p_type = 4, p_offset = 0x23746a200 p_paddr = 0x23746a200 p_vaddr = 0x0 p_filesz = 0x1a8 p_memsz = 0x1a8
[ 4759.247724] kexec[3082]: get_crash_notes_per_cpu: crash_notes addr = 237645200, size = 424
[ 4759.247903] kexec[3082]: Elf header: p_type = 4, p_offset = 0x237645200 p_paddr = 0x237645200 p_vaddr = 0x0 p_filesz = 0x1a8 p_memsz = 0x1a8
[ 4759.248110] kexec[3082]: get_crash_notes_per_cpu: crash_notes addr = 237820200, size = 424
[ 4759.248283] kexec[3082]: Elf header: p_type = 4, p_offset = 0x237820200 p_paddr = 0x237820200 p_vaddr = 0x0 p_filesz = 0x1a8 p_memsz = 0x1a8
[ 4759.248450] kexec[3082]: get_crash_notes_per_cpu: crash_notes addr = 2379fb200, size = 424
[ 4759.248616] kexec[3082]: Elf header: p_type = 4, p_offset = 0x2379fb200 p_paddr = 0x2379fb200 p_vaddr = 0x0 p_filesz = 0x1a8 p_memsz = 0x1a8
[ 4759.248796] kexec[3082]: vmcoreinfo header: p_type = 4, p_offset = 0x235008000 p_paddr = 0x235008000 p_vaddr = 0x0 p_filesz = 0x1024 p_memsz = 0x1024
[ 4759.248962] kexec[3082]: Kernel text Elf header: p_type = 1, p_offset = 0x7080000 p_paddr = 0x7080000 p_vaddr = 0xffff000008080000 p_filesz = 0x2354000 p_memsz = 0x2354000
[ 4759.249129] kexec[3082]: Elf header: p_type = 1, [ 4759.662167] systemd-journald[1835]: /var/log/journal/6f090d1f237546fda94534ae49608464/system.journal: Allocation limit reached, rotating.
p_offset = 0x0 p[ 4759.675967] systemd-journald[1835]: Journal file /var/log/journal/6f090d1f237546fda94534ae49608464/system.journal is full, rotating to a new file
_paddr = 0x0 p_v[ 4759.690480] systemd-journald[1835]: Rotating...
addr = 0xffff800[ 4759.697049] systemd-journald[1835]: Reserving 333 entries in field hash table.
000000000 p_file[ 4759.706077] systemd-journald[1835]: Reserving 2047 entries in data hash table.
sz = 0x4000000 p[ 4759.714117] systemd-journald[1835]: Vacuuming...
_memsz = 0x4000000
[ 4759.24929[ 4759.721974] systemd-journald[1835]: Vacuuming done, freed 0B of archived journals from /var/log/journal/6f090d1f237546fda94534ae49608464.
4] kexec[3082]: [ 4759.725699] systemd-journald[1835]: Failed to re-enable copy-on-write for /var/log/journal/6f090d1f237546fda94534ae49608464/system@43c4b96683db4bd4840786b8d83dea55-0000000000002aac-000622d9fbee7478.journal: Inappropriate ioctl for device, rewriting file
Elf header: p_type = 1, p_offset = 0x4200000 p_paddr = 0x4200000 p_vaddr = 0xffff800004200000 p_filesz = 0x200000 p_memsz = 0x200000
[ 4759.583064] kexec[3082][ 4759.771594] systemd-journald[1835]: Failed to re-enable copy-on-write for /var/log/journal/6f090d1f237546fda94534ae49608464/system@43c4b96683db4bd4840786b8d83dea55-0000000000002aac-000622d9fbee7478.journal: Inappropriate ioctl for device, rewriting file
: Elf header: p_type = 1, p_offs[ 4759.797715] systemd-journald[1835]: Retrying write.
et = 0x5400000 p_paddr = 0x5400000 p_vaddr = 0xffff800005400000 p_filesz = 0x7ac00000 p_memsz = 0x7ac00000
[ 4759.583257] kexec[3082]: Elf header: p_type = 1, p_offset = 0x100000000 p_paddr = 0x100000000 p_vaddr = 0xffff800100000000 p_filesz = 0x140000000 p_memsz = 0x140000000
[ 4759.583426] kexec[3082]: load_crashdump_segments: elfcorehdr 0xbffff000-0xbffff3ff
[ 4759.583594] kexec[3082]: arm64_load_other_segments:741: purgatory sink: 0x0
[ 4759.583760] kexec[3082]: get_cells_size: #address-cells:2 #size-cells:2
[ 4759.583925] kexec[3082]: cells_size_fitted: bffff000-bffff3ff
[ 4759.584169] kexec[3082]: cells_size_fitted: 80000000-bfffffff
[ 4759.725213] kexec[3082]: setup_2nd_dtb: no kaslr-seed found
[ 4759.725786] kexec[3082]: dtb_delete_property: fdt_delprop failed: <valid offset/length>
[ 4759.725980] kexec[3082]: dtb_delete_property: fdt_delprop failed: <valid offset/length>
[ 4759.726164] kexec[3082]: dtb:    base 83fe5000, size 83a5h (33701)
[ 4759.726348] kexec[3082]: sym: sha256_starts info: 12 other: 00 shndx: 1 value: f80 size: 50
[ 4759.726553] kexec[3082]: sym: sha256_starts value: 83feef80 addr: 83fee014
[ 4759.726739] kexec[3082]: machine_apply_elf_rel: CALL26 9000000094000000->90000000940003db
[ 4759.726923] kexec[3082]: sym:      .text info: 03 other: 00 shndx: 1 value: 0 size: 0
[ 4759.728539] kexec[3082]: sym: .text value: 83fee0f8 addr: 83fee018
[ 4759.728741] kexec[3082]: machine_apply_elf_rel: ADR_PREL_PG_HI21 f940001390000000->f940001390000000
[ 4759.728928] kexec[3082]: sym:      .text info: 03 other: 00 shndx: 1 value: 0 size: 0
[ 4759.729116] kexec[3082]: sym: .text value: 83fee0f8 addr: 83fee01c
[ 4759.729320] kexec[3082]: machine_apply_elf_rel: LDST64_ABS_LO12_NC aa1303f5f9400013->aa1303f5f9407c13
[ 4759.729514] kexec[3082]: sym: sha256_update info: 12 other: 00 shndx: 1 value: 2ef0 size: c
[ 4759.729697] kexec[3082]: sym: sha256_update value: 83ff0ef0 addr: 83fee034
[ 4759.729879] kexec[3082]: machine_apply_elf_rel: CALL26 eb14027f94000000->eb14027f94000baf
[ 4759.730061] kexec[3082]: sym: sha256_finish info: 12 other: 00 shndx: 1 value: 2f00 size: 194
[ 4759.730247] kexec[3082]: sym: sha256_finish value: 83ff0f00 addr: 83fee04c
[ 4759.730428] kexec[3082]: machine_apply_elf_rel: CALL26 d280040294000000->d280040294000bad
[ 4759.730613] kexec[3082]: sym:     memcmp info: 12 other: 00 shndx: 1 value: 66c size: 34
[ 4759.730806] kexec[3082]: sym: memcmp value: 83fee66c addr: 83fee05c
[ 4759.730988] kexec[3082]: machine_apply_elf_rel: CALL26 3400042094000000->3400042094000184
[ 4759.731173] kexec[3082]: sym:      .text info: 03 other: 00 shndx: 1 value: 0 size: 0
[ 4759.731354] kexec[3082]: sym: .text value: 83fee100 addr: 83fee064
[ 4759.731537] kexec[3082]: machine_apply_elf_rel: ADR_PREL_PG_HI21 9000001490000000->9000001490000000
[ 4759.731722] kexec[3082]: sym:      .text info: 03 other: 00 shndx: 1 value: 0 size: 0
[ 4759.731904] kexec[3082]: sym: .text value: 83fee110 addr: 83fee068
[ 4759.732086] kexec[3082]: machine_apply_elf_rel: ADR_PREL_PG_HI21 9100029490000014->9100029490000014
[ 4759.732287] kexec[3082]: sym:      .text info: 03 other: 00 shndx: 1 value: 0 size: 0
[ 4759.732471] kexec[3082]: sym: .text value: 83fee110 addr: 83fee06c
[ 4759.732653] kexec[3082]: machine_apply_elf_rel: ADD_ABS_LO12_NC f940000091000294->f940000091044294
[ 4759.732835] kexec[3082]: sym:      .text info: 03 other: 00 shndx: 1 value: 0 size: 0
[ 4759.733018] kexec[3082]: sym: .text value: 83fee100 addr: 83fee070
[ 4759.733199] kexec[3082]: machine_apply_elf_rel: LDST64_ABS_LO12_NC d2800013f9400000->d2800013f9408000
[ 4759.733381] kexec[3082]: sym:     printf info: 12 other: 00 shndx: 1 value: 594 size: 78
[ 4759.733563] kexec[3082]: sym: printf value: 83fee594 addr: 83fee078
[ 4759.733744] kexec[3082]: machine_apply_elf_rel: CALL26 9000000094000000->9000000094000147
[ 4759.733925] kexec[3082]: sym:      .text info: 03 other: 00 shndx: 1 value: 0 size: 0
[ 4759.734108] kexec[3082]: sym: .text value: 83fee108 addr: 83fee07c
[ 4759.734306] kexec[3082]: machine_apply_elf_rel: ADR_PREL_PG_HI21 f940000090000000->f940000090000000
[ 4759.734498] kexec[3082]: sym:      .text info: 03 other: 00 shndx: 1 value: 0 size: 0
[ 4760.068430] kexec[3082]: sym: .text value: 83fee108 addr: 83fee080
[ 4760.069702] kexec[3082]: machine_apply_elf_rel: LDST64_ABS_LO12_NC 94000000f9400000->94000000f9408400
[ 4760.069921] kexec[3082]: sym:     printf info: 12 other: 00 shndx: 1 value: 594 size: 78
[ 4760.070135] kexec[3082]: sym: printf value: 83fee594 addr: 83fee084
[ 4760.070352] kexec[3082]: machine_apply_elf_rel: CALL26 f940028094000000->f940028094000144
[ 4760.070558] kexec[3082]: sym:     printf info: 12 other: 00 shndx: 1 value: 594 size: 78
[ 4760.070765] kexec[3082]: sym: printf value: 83fee594 addr: 83fee094
[ 4760.070972] kexec[3082]: machine_apply_elf_rel: CALL26 f100827f94000000->f100827f94000140
[ 4760.071178] kexec[3082]: sym:      .text info: 03 other: 00 shndx: 1 value: 0 size: 0
[ 4760.071383] kexec[3082]: sym: .text value: 83fee118 addr: 83fee0a0
[ 4760.071588] kexec[3082]: machine_apply_elf_rel: ADR_PREL_PG_HI21 d280001390000016->d280001390000016
[ 4760.071809] kexec[3082]: sym:      .text info: 03 other: 00 shndx: 1 value: 0 size: 0
[ 4760.072048] kexec[3082]: sym: .text value: 83fee118 addr: 83fee0a8
[ 4760.072248] kexec[3082]: machine_apply_elf_rel: LDST64_ABS_LO12_NC 910402b5f94002c0->910402b5f9408ec0
[ 4760.072438] kexec[3082]: sym:     printf info: 12 other: 00 shndx: 1 value: 594 size: 78
[ 4760.072640] kexec[3082]: sym: printf value: 83fee594 addr: 83fee0b0
[ 4760.072832] kexec[3082]: machine_apply_elf_rel: CALL26 9000000094000000->9000000094000139
[ 4760.073026] kexec[3082]: sym:      .text info: 03 other: 00 shndx: 1 value: 0 size: 0
[ 4760.073222] kexec[3082]: sym: .text value: 83fee120 addr: 83fee0b4
[ 4760.073415] kexec[3082]: machine_apply_elf_rel: ADR_PREL_PG_HI21 f940000090000000->f940000090000000
[ 4760.073608] kexec[3082]: sym:      .text info: 03 other: 00 shndx: 1 value: 0 size: 0
[ 4760.073800] kexec[3082]: sym: .text value: 83fee120 addr: 83fee0b8
[ 4760.073989] kexec[3082]: machine_apply_elf_rel: LDST64_ABS_LO12_NC 94000000f9400000->94000000f9409000
[ 4760.074182] kexec[3082]: sym:     printf info: 12 other: 00 shndx: 1 value: 594 size: 78
[ 4760.074372] kexec[3082]: sym: printf value: 83fee594 addr: 83fee0bc
[ 4760.074563] kexec[3082]: machine_apply_elf_rel: CALL26 f940028094000000->f940028094000136
[ 4760.074756] kexec[3082]: sym:     printf info: 12 other: 00 shndx: 1 value: 594 size: 78
[ 4760.074947] kexec[3082]: sym: printf value: 83fee594 addr: 83fee0cc
[ 4760.075142] kexec[3082]: machine_apply_elf_rel: CALL26 f100827f94000000->f100827f94000132
[ 4760.075340] kexec[3082]: sym:      .text info: 03 other: 00 shndx: 1 value: 0 size: 0
[ 4760.075533] kexec[3082]: sym: .text value: 83fee118 addr: 83fee0d8
[ 4760.075724] kexec[3082]: machine_apply_elf_rel: LDST64_ABS_LO12_NC 94000000f94002c0->94000000f9408ec0
[ 4760.075919] kexec[3082]: sym:     printf info: 12 other: 00 shndx: 1 value: 594 size: 78
[ 4760.076111] kexec[3082]: sym: printf value: 83fee594 addr: 83fee0dc
[ 4760.076304] kexec[3082]: machine_apply_elf_rel: CALL26 5280002094000000->528000209400012e
[ 4760.076770] kexec[3082]: sym:      .data info: 03 other: 00 shndx: 6 value: 0 size: 0
[ 4760.076976] kexec[3082]: sym: .data value: 83ff13f8 addr: 83fee0f8
[ 4760.077169] kexec[3082]: machine_apply_elf_rel: ABS64 0000000000000000->0000000083ff13f8
[ 4760.077365] kexec[3082]: sym: .rodata.str1.1 info: 03 other: 00 shndx: 3 value: 0 size: 0
[ 4760.077560] kexec[3082]: sym: .rodata.str1.1 value: 83ff10a0 addr: 83fee100
[ 4760.077766] kexec[3082]: machine_apply_elf_rel: ABS64 0000000000000000->0000000083ff10a0
[ 4760.077961] kexec[3082]: sym: .rodata.str1.1 info: 03 other: 00 shndx: 3 value: 0 size: 0
[ 4760.078152] kexec[3082]: sym: .rodata.str1.1 value: 83ff10c0 addr: 83fee108
[ 4760.078345] kexec[3082]: machine_apply_elf_rel: ABS64 0000000000000000->0000000083ff10c0
[ 4760.078537] kexec[3082]: sym: .rodata.str1.1 info: 03 other: 00 shndx: 3 value: 0 size: 0
[ 4760.411800] kexec[3082]: sym: .rodata.str1.1 value: 83ff10d0 addr: 83fee110
[ 4760.411995] kexec[3082]: machine_apply_elf_rel: ABS64 0000000000000000->0000000083ff10d0
[ 4760.412220] kexec[3082]: sym: .rodata.str1.1 info: 03 other: 00 shndx: 3 value: 0 size: 0
[ 4760.412404] kexec[3082]: sym: .rodata.str1.1 value: 83ff10d6 addr: 83fee118
[ 4760.412588] kexec[3082]: machine_apply_elf_rel: ABS64 0000000000000000->0000000083ff10d6
[ 4760.412770] kexec[3082]: sym: .rodata.str1.1 info: 03 other: 00 shndx: 3 value: 0 size: 0
[ 4760.412951] kexec[3082]: sym: .rodata.str1.1 value: 83ff10d8 addr: 83fee120
[ 4760.413133] kexec[3082]: machine_apply_elf_rel: ABS64 0000000000000000->0000000083ff10d8
[ 4760.413315] kexec[3082]: sym:      .text info: 03 other: 00 shndx: 1 value: 0 size: 0
[ 4760.413499] kexec[3082]: sym: .text value: 83fee168 addr: 83fee128
[ 4760.413681] kexec[3082]: machine_apply_elf_rel: ADR_PREL_PG_HI21 a9bf7bfd90000000->a9bf7bfd90000000
[ 4760.413876] kexec[3082]: sym:      .text info: 03 other: 00 shndx: 1 value: 0 size: 0
[ 4760.414059] kexec[3082]: sym: .text value: 83fee168 addr: 83fee134
[ 4760.414241] kexec[3082]: machine_apply_elf_rel: LDST64_ABS_LO12_NC 94000000f9400000->94000000f940b400
[ 4760.414429] kexec[3082]: sym:     printf info: 12 other: 00 shndx: 1 value: 594 size: 78
[ 4760.414612] kexec[3082]: sym: printf value: 83fee594 addr: 83fee138
[ 4760.414795] kexec[3082]: machine_apply_elf_rel: CALL26 9400000094000000->9400000094000117
[ 4760.414978] kexec[3082]: sym: setup_arch info: 12 other: 00 shndx: 1 value: f20 size: 3c
[ 4760.415173] kexec[3082]: sym: setup_arch value: 83feef20 addr: 83fee13c
[ 4760.415367] kexec[3082]: machine_apply_elf_rel: CALL26 9000000094000000->9000000094000379
[ 4760.415550] kexec[3082]: sym:      .text info: 03 other: 00 shndx: 1 value: 0 size: 0
[ 4760.415733] kexec[3082]: sym: .text value: 83fee170 addr: 83fee140
[ 4760.415915] kexec[3082]: machine_apply_elf_rel: ADR_PREL_PG_HI21 f940000090000000->f940000090000000
[ 4760.416096] kexec[3082]: sym:      .text info: 03 other: 00 shndx: 1 value: 0 size: 0
[ 4760.416277] kexec[3082]: sym: .text value: 83fee170 addr: 83fee144
[ 4760.416826] kexec[3082]: machine_apply_elf_rel: LDST64_ABS_LO12_NC b9412000f9400000->b9412000f940b800
[ 4760.417028] kexec[3082]: sym: verify_sha256_digest info: 12 other: 00 shndx: 1 value: 0 size: f4
[ 4760.417221] kexec[3082]: sym: verify_sha256_digest value: 83fee000 addr: 83fee150
[ 4760.417407] kexec[3082]: machine_apply_elf_rel: CALL26 3400004094000000->3400004097ffffac
[ 4760.417592] kexec[3082]: sym: post_verification_setup_arch info: 12 other: 00 shndx: 1 value: f08 size: c
[ 4760.417777] kexec[3082]: sym: post_verification_setup_arch value: 83feef08 addr: 83fee160
[ 4760.417989] kexec[3082]: machine_apply_elf_rel: JUMP26 d503201f14000000->d503201f1400036a
[ 4760.418175] kexec[3082]: sym: .rodata.str1.1 info: 03 other: 00 shndx: 3 value: 0 size: 0
[ 4760.418357] kexec[3082]: sym: .rodata.str1.1 value: 83ff10e8 addr: 83fee168
[ 4760.418541] kexec[3082]: machine_apply_elf_rel: ABS64 0000000000000000->0000000083ff10e8
[ 4760.418723] kexec[3082]: sym:      .data info: 03 other: 00 shndx: 6 value: 0 size: 0
[ 4760.418904] kexec[3082]: sym: .data value: 83ff13f8 addr: 83fee170
[ 4761.103979] kexec[3082]: machine_apply_elf_rel: LDST64_ABS_LO12_NC 14000000f9400000->14000000f947bc00
[ 4761.104162] kexec[3082]: sym:     printf info: 12 other: 00 shndx: 1 value: 594 size: 78
[ 4761.104344] kexec[3082]: sym: printf value: 83fee594 addr: 83feef58
[ 4761.104525] kexec[3082]: machine_apply_elf_rel: JUMP26 d503201f14000000->d503201f17fffd8f
[ 4761.104708] kexec[3082]: sym: arm64_kernel_entry info: 10 other: 00 shndx: 6 value: 128 size: 8
[ 4761.104890] kexec[3082]: sym: arm64_kernel_entry value: 83ff1520 addr: 83feef60
[ 4761.105072] kexec[3082]: machine_apply_elf_rel: ABS64 0000000000000000->0000000083ff1520
[ 4761.105255] kexec[3082]: sym: .rodata.str1.1 info: 03 other: 00 shndx: 3 value: 0 size: 0
**[ 4761.105482] systemd[1]: Finished Kernel Crash Dump Service.**
[ 4761.442732] kexec[3082]: machine_apply_elf_rel: CALL26 f100fedf94000000->f100fedf97fff848
[ 4761.442919] kexec[3082]: sym:     memcpy info: 12 other: 00 shndx: 1 value: 64c size: 20
[ 4761.443108] kexec[3082]: sym: memcpy value: 83fee64c addr: 83ff0ee4
[ 4761.443291] kexec[3082]: machine_apply_elf_rel: JUMP26 d503201f14000000->d503201f17fff5da
[ 4761.443483] kexec[3082]: sym:      .text info: 03 other: 00 shndx: 1 value: 0 size: 0
[ 4761.443680] kexec[3082]: sym: .text value: 83ff1098 addr: 83ff0f08
[ 4761.787901] kexec[3082]: machine_apply_elf_rel: PREL32 0000010800000000->00000108fffffa5c
[ 4761.788116] kexec[3082]: sym:      .text info: 03 other: 00 shndx: 1 value: 0 size: 0
[ 4761.788308] kexec[3082]: sym: .text value: 83ff0ef0 addr: 83ff13c4
[ 4761.788494] kexec[3082]: machine_apply_elf_rel: PREL32 0000000c00000000->0000000cfffffb2c
[ 4761.788682] kexec[3082]: sym:      .text info: 03 other: 00 shndx: 1 value: 0 size: 0
[ 4761.788868] kexec[3082]: sym: .text value: 83ff0f00 addr: 83ff13d8
[ 4761.789069] kexec[3082]: machine_apply_elf_rel: PREL32 0000019400000000->00000194fffffb28
[ 4761.789258] kexec[3082]: **kexec_load: entry = 0x83fee6a0 flags = 0xb70001**
[ 4761.789444] kexec[3082]: nr_segments = 5
[ 4761.789629] kexec[3082]: segment[0].buf   = 0xffff8a929010
[ 4761.789815] kexec[3082]: segment[0].bufsz = 0x1a4bc50
[ 4761.790000] kexec[3082]: segment[0].mem   = 0x80080000
[ 4761.790185] kexec[3082]: segment[0].memsz = 0x1a4c000
[ 4761.790382] kexec[3082]: segment[1].buf   = 0xffff8c379010
[ 4761.790569] kexec[3082]: segment[1].bufsz = 0x1836a00
[ 4761.790764] kexec[3082]: segment[1].mem   = 0x81ad0000
[ 4761.790952] kexec[3082]: segment[1].memsz = 0x250f000
[ 4761.791137] kexec[3082]: segment[2].buf   = 0xaaaaef28b3d0
[ 4761.791323] kexec[3082]: segment[2].bufsz = 0x83a5
[ 4761.791507] kexec[3082]: segment[2].mem   = 0x83fe5000
[ 4761.791705] kexec[3082]: segment[2].memsz = 0x9000
[ 4761.791892] kexec[3082]: segment[3].buf   = 0xaaaaef293ce0
[ 4761.792128] kexec[3082]: segment[3].bufsz = 0x3578
[ 4761.792319] kexec[3082]: segment[3].mem   = 0x83fee000
[ 4761.792508] kexec[3082]: segment[3].memsz = 0x4000
[ 4761.792695] kexec[3082]: segment[4].buf   = 0xaaaaef278480
[ 4761.792881] kexec[3082]: segment[4].bufsz = 0x400
[ 4761.793067] kexec[3082]: segment[4].mem   = 0xbffff000
[ 4761.793268] kexec[3082]: segment[4].memsz = 0x1000
/# 
linux-kernel arm64 panic
1个回答
0
投票

因此,您上面显示的“恐慌”并不是崩溃内核启动的失败(或成功) - 它仍然是普通主机内核的输出(它是对SysRq-C

的“反应”)。

您的内核消息显示第二个页面错误(

Unable to handle kernel NULL pointer dereference at virtual address 00000038

 - 注意
0x38
不是“触发”中的
0
),不确定代码方面的位置,并且可以想象在尝试期间会发生这种情况“移交”到崩溃内核。但至少您显示的日志/控制台消息没有崩溃内核加载或启动的证据。如果无法访问您的特定硬件,就很难“暗示”这背后可能是什么。我会按照这些思路在某个地方进行故障排除:

    这些之后还有其他控制台消息吗?或者控制台/系统此时卡住了吗?
  • 当“那里”时,系统是否仍然对
  • SysRq
    做出反应?如果是这样,则表明崩溃内核尚未启动;使用 
    SysRq
     (
    t
    ,
    l
    ,
    w
    , ...) 提取有关系统当时可能(不)做什么的更多诊断信息。
  • 它是否仍然对 NMI 做出反应(许多系统允许 NMI 通过按钮或管理控制器触发;同样,我不知道您拥有哪种 ARM 系统 - 开发人员基板、服务器计算机,或介于两者之间的任何东西)。如果是这样,显示什么?
  • 您可以尝试使用
  • kexec -p --append=...
     将更详细/更“喋喋不休”的命令行选项和/或其他仅调试控制台设备传递到崩溃内核,并查看是否会提供更多输出。
  • 同样,在触发恐慌之前,使主机内核的控制台输出尽可能详细(
  • echo 9 > /proc/sysrq-trigger
    )。
另外,尝试通过 kexec 邮件列表获取帮助,

http://lists.infradead.org/pipermail/kexec/ - 它相当活跃。

© www.soinside.com 2019 - 2024. All rights reserved.