Kdump/Kexec + Crash in I.MX8 EVK

cancel
Showing results for 
Show  only  | Search instead for 
Did you mean: 

Kdump/Kexec + Crash in I.MX8 EVK

548 Views
daweichen
Contributor III

Hi NXP,

I have NXP's i.MX8M EVK reference board.   I tried the procedures described in Kdump + Crash in I.MX - NXP Community and  "kdump/kexec User Manual.  I am still unable to get it to work.  The console reported loading the 2nd kernel and bye almost immediately.  It looks to me the 2nd  kernel was not loaded successfully. Any help from NXP will be appreciated.  I am not sure which step I did wrong.

BELOW is my procedure:

In u-boot, I added crashkernel and nokasl to mmcargs to enable support.

setenv mmcargs setenv bootargs ${jh_clk} crashkernel=256M nokaslr console=${console} root=${mmcroot}

After the u-boot, I entered the following command to load the 2nd kernel.

kexec -d -p /boot/Image --append="root=/dev/mmcblk1p2 rw rootdelay=10 console=ttyS0,115200 1 maxcpus=1 reset_devices"

Subsequently, I entered echo c > /proc/sysrq-trigger to trigger kernel panic.  I saw 

[ 181.173168] Starting crashdump kernel...
[ 181.177091] Bye!

Please see below for more detailed logs.

root@imx8mqevk:~# kexec -d -p /boot/Image --append="root=/dev/mmcblk1p2 rw rootdelay=10 console=ttyS0,115200 1 maxcpus=1 reset_devices"
arch_process_options:173: command_line: root=/dev/mmcblk1p2 rw rootdelay=10 console=ttyS0,115200 1 maxcpus=1 reset_devices
arch_process_options:175: initrd: (null)
arch_process_options:177: dtb: (null)
kernel: 0xffff7effe010 kernel_size: 0x17c2a00
set_phys_offset: phys_offset : 0000000040000000 (method : vmcoreinfo pt_note)
get_memory_ranges_iomem_cb: 0000000040000000 - 00000000b7ffffff : System RAM
get_memory_ranges_iomem_cb: 0000000041a30000 - 0000000041b0ffff : reserved
get_memory_ranges_iomem_cb: 0000000043000000 - 000000004300bfff : reserved
get_memory_ranges_iomem_cb: 0000000044000000 - 000000007fffffff : reserved
get_memory_ranges_iomem_cb: 00000000b8400000 - 00000000fdffffff : System RAM
get_memory_ranges_iomem_cb: 00000000ea000000 - 00000000ea7fffff : reserved
get_memory_ranges_iomem_cb: 00000000ea9fe000 - 00000000ed7fffff : reserved
get_memory_ranges_iomem_cb: 00000000ed977000 - 00000000ed977fff : reserved
get_memory_ranges_iomem_cb: 00000000ed978000 - 00000000ed9d7fff : reserved
get_memory_ranges_iomem_cb: 00000000ed9da000 - 00000000ed9dafff : reserved
get_memory_ranges_iomem_cb: 00000000ed9db000 - 00000000ed9dffff : reserved
get_memory_ranges_iomem_cb: 00000000ed9e0000 - 00000000eda11fff : reserved
get_memory_ranges_iomem_cb: 00000000eda12000 - 00000000eddfffff : reserved
get_memory_ranges_iomem_cb: 00000000fde00000 - 00000000fdffffff : reserved
elf_arm64_probe: Not an ELF executable.
image_arm64_load: kernel_segment: 00000000ede00000
image_arm64_load: text_offset: 0000000000080000
image_arm64_load: image_size: 00000000018c3000
image_arm64_load: phys_offset: 0000000040000000
image_arm64_load: vp_offset: ffffffffffffffff
image_arm64_load: PE format: yes
Reserved memory range
00000000ede00000-00000000fddfffff (0)
Coredump memory ranges
0000000040000000-00000000b7ffffff (0)
00000000b8400000-00000000eddfffff (0)
00000000fde00000-00000000fdffffff (0)
kernel symbol _text vaddr = ffff800010080000
load_crashdump_segments: page_offset: ffffc00000000000
get_crash_notes_per_cpu: crash_notes addr = ed98ae00, size = 424
Elf header: p_type = 4, p_offset = 0xed98ae00 p_paddr = 0xed98ae00 p_vaddr = 0x0 p_filesz = 0x1a8 p_memsz = 0x1a8
get_crash_notes_per_cpu: crash_notes addr = ed9a2e00, size = 424
Elf header: p_type = 4, p_offset = 0xed9a2e00 p_paddr = 0xed9a2e00 p_vaddr = 0x0 p_filesz = 0x1a8 p_memsz = 0x1a8
get_crash_notes_per_cpu: crash_notes addr = ed9bae00, size = 424
Elf header: p_type = 4, p_offset = 0xed9bae00 p_paddr = 0xed9bae00 p_vaddr = 0x0 p_filesz = 0x1a8 p_memsz = 0x1a8
get_crash_notes_per_cpu: crash_notes addr = ed9d2e00, size = 424
Elf header: p_type = 4, p_offset = 0xed9d2e00 p_paddr = 0xed9d2e00 p_vaddr = 0x0 p_filesz = 0x1a8 p_memsz = 0x1a8
vmcoreinfo header: p_type = 4, p_offset = 0xe83dc000 p_paddr = 0xe83dc000 p_vaddr = 0x0 p_filesz = 0x1024 p_memsz = 0x1024
Kernel text Elf header: p_type = 1, p_offset = 0x40480000 p_paddr = 0x40480000 p_vaddr = 0xffff800010080000 p_filesz = 0x18c3000 p_memsz = 0x18c3000
Elf header: p_type = 1, p_offset = 0x40000000 p_paddr = 0x40000000 p_vaddr = 0xffffc00000000000 p_filesz = 0x78000000 p_memsz = 0x78000000
Elf header: p_type = 1, p_offset = 0xb8400000 p_paddr = 0xb8400000 p_vaddr = 0xffffc00078400000 p_filesz = 0x35a00000 p_memsz = 0x35a00000
Elf header: p_type = 1, p_offset = 0xfde00000 p_paddr = 0xfde00000 p_vaddr = 0xffffc000bde00000 p_filesz = 0x200000 p_memsz = 0x200000
load_crashdump_segments: elfcorehdr 0xfddff000-0xfddff3ff
read_1st_dtb: found /sys/firmware/fdt
get_cells_size: #address-cells:2 #size-cells:2
cells_size_fitted: fddff000-fddff3ff
cells_size_fitted: ede00000-fddfffff
setup_2nd_dtb: no kaslr-seed found
dtb_delete_property: fdt_delprop failed: <valid offset/length>
dtb_delete_property: fdt_delprop failed: <valid offset/length>
dtb: base ef743000, size b3f6h (46070)
sym: sha256_starts info: 12 other: 00 shndx: 1 value: ed0 size: 50
sym: sha256_starts value: ef74fed0 addr: ef74f014
machine_apply_elf_rel: CALL26 9000000094000000->90000000940003af
sym: .text info: 03 other: 00 shndx: 1 value: 0 size: 0
sym: .text value: ef74f0f8 addr: ef74f018
machine_apply_elf_rel: ADR_PREL_PG_HI21 f940001390000000->f940001390000000
sym: .text info: 03 other: 00 shndx: 1 value: 0 size: 0
sym: .text value: ef74f0f8 addr: ef74f01c
machine_apply_elf_rel: LDST64_ABS_LO12_NC aa1303f6f9400013->aa1303f6f9407c13
sym: sha256_update info: 12 other: 00 shndx: 1 value: 2e30 size: c
sym: sha256_update value: ef751e30 addr: ef74f034
machine_apply_elf_rel: CALL26 eb14027f94000000->eb14027f94000b7f
sym: sha256_finish info: 12 other: 00 shndx: 1 value: 2e40 size: 194
sym: sha256_finish value: ef751e40 addr: ef74f04c
machine_apply_elf_rel: CALL26 aa1303e194000000->aa1303e194000b7d
sym: memcmp info: 12 other: 00 shndx: 1 value: 65c size: 34
sym: memcmp value: ef74f65c addr: ef74f05c
machine_apply_elf_rel: CALL26 3400042094000000->3400042094000180
sym: .text info: 03 other: 00 shndx: 1 value: 0 size: 0
sym: .text value: ef74f100 addr: ef74f064
machine_apply_elf_rel: ADR_PREL_PG_HI21 f940000090000000->f940000090000000
sym: .text info: 03 other: 00 shndx: 1 value: 0 size: 0
sym: .text value: ef74f100 addr: ef74f068
machine_apply_elf_rel: LDST64_ABS_LO12_NC 90000015f9400000->90000015f9408000
sym: .text info: 03 other: 00 shndx: 1 value: 0 size: 0
sym: .text value: ef74f110 addr: ef74f06c
machine_apply_elf_rel: ADR_PREL_PG_HI21 910002b590000015->910002b590000015
sym: .text info: 03 other: 00 shndx: 1 value: 0 size: 0
sym: .text value: ef74f110 addr: ef74f070
machine_apply_elf_rel: ADD_ABS_LO12_NC d2800013910002b5->d2800013910442b5
sym: printf info: 12 other: 00 shndx: 1 value: 57c size: 80
sym: printf value: ef74f57c addr: ef74f078
machine_apply_elf_rel: CALL26 9000000094000000->9000000094000141
sym: .text info: 03 other: 00 shndx: 1 value: 0 size: 0
sym: .text value: ef74f108 addr: ef74f07c
machine_apply_elf_rel: ADR_PREL_PG_HI21 f940000090000000->f940000090000000
sym: .text info: 03 other: 00 shndx: 1 value: 0 size: 0
sym: .text value: ef74f108 addr: ef74f080
machine_apply_elf_rel: LDST64_ABS_LO12_NC 94000000f9400000->94000000f9408400
sym: printf info: 12 other: 00 shndx: 1 value: 57c size: 80
sym: printf value: ef74f57c addr: ef74f084
machine_apply_elf_rel: CALL26 38736a8194000000->38736a819400013e
sym: printf info: 12 other: 00 shndx: 1 value: 57c size: 80
sym: printf value: ef74f57c addr: ef74f094
machine_apply_elf_rel: CALL26 f100827f94000000->f100827f9400013a
sym: .text info: 03 other: 00 shndx: 1 value: 0 size: 0
sym: .text value: ef74f118 addr: ef74f0a0
machine_apply_elf_rel: ADR_PREL_PG_HI21 f940026090000013->f940026090000013
sym: .text info: 03 other: 00 shndx: 1 value: 0 size: 0
sym: .text value: ef74f118 addr: ef74f0a4
machine_apply_elf_rel: LDST64_ABS_LO12_NC 910402d6f9400260->910402d6f9408e60
sym: printf info: 12 other: 00 shndx: 1 value: 57c size: 80
sym: printf value: ef74f57c addr: ef74f0b0
machine_apply_elf_rel: CALL26 9000000094000000->9000000094000133
sym: .text info: 03 other: 00 shndx: 1 value: 0 size: 0
sym: .text value: ef74f120 addr: ef74f0b4
machine_apply_elf_rel: ADR_PREL_PG_HI21 f940000090000000->f940000090000000
sym: .text info: 03 other: 00 shndx: 1 value: 0 size: 0
sym: .text value: ef74f120 addr: ef74f0b8
machine_apply_elf_rel: LDST64_ABS_LO12_NC 94000000f9400000->94000000f9409000
sym: printf info: 12 other: 00 shndx: 1 value: 57c size: 80
sym: printf value: ef74f57c addr: ef74f0bc
machine_apply_elf_rel: CALL26 38746ac194000000->38746ac194000130
sym: printf info: 12 other: 00 shndx: 1 value: 57c size: 80
sym: printf value: ef74f57c addr: ef74f0cc
machine_apply_elf_rel: CALL26 f100829f94000000->f100829f9400012c
sym: .text info: 03 other: 00 shndx: 1 value: 0 size: 0
sym: .text value: ef74f118 addr: ef74f0d8
machine_apply_elf_rel: LDST64_ABS_LO12_NC 94000000f9400260->94000000f9408e60
sym: printf info: 12 other: 00 shndx: 1 value: 57c size: 80
sym: printf value: ef74f57c addr: ef74f0dc
machine_apply_elf_rel: CALL26 5280002094000000->5280002094000128
sym: .data info: 03 other: 00 shndx: 6 value: 0 size: 0
sym: .data value: ef7522e8 addr: ef74f0f8
machine_apply_elf_rel: ABS64 0000000000000000->00000000ef7522e8
sym: .rodata.str1.1 info: 03 other: 00 shndx: 3 value: 0 size: 0
sym: .rodata.str1.1 value: ef751fe0 addr: ef74f100
machine_apply_elf_rel: ABS64 0000000000000000->00000000ef751fe0
sym: .rodata.str1.1 info: 03 other: 00 shndx: 3 value: 0 size: 0
sym: .rodata.str1.1 value: ef752000 addr: ef74f108
machine_apply_elf_rel: ABS64 0000000000000000->00000000ef752000
sym: .rodata.str1.1 info: 03 other: 00 shndx: 3 value: 0 size: 0
sym: .rodata.str1.1 value: ef752010 addr: ef74f110
machine_apply_elf_rel: ABS64 0000000000000000->00000000ef752010
sym: .rodata.str1.1 info: 03 other: 00 shndx: 3 value: 0 size: 0
sym: .rodata.str1.1 value: ef752016 addr: ef74f118
machine_apply_elf_rel: ABS64 0000000000000000->00000000ef752016
sym: .rodata.str1.1 info: 03 other: 00 shndx: 3 value: 0 size: 0
sym: .rodata.str1.1 value: ef752018 addr: ef74f120
machine_apply_elf_rel: ABS64 0000000000000000->00000000ef752018
sym: .text info: 03 other: 00 shndx: 1 value: 0 size: 0
sym: .text value: ef74f168 addr: ef74f130
machine_apply_elf_rel: ADR_PREL_PG_HI21 f940000090000000->f940000090000000
sym: .text info: 03 other: 00 shndx: 1 value: 0 size: 0
sym: .text value: ef74f168 addr: ef74f134
machine_apply_elf_rel: LDST64_ABS_LO12_NC 94000000f9400000->94000000f940b400
sym: printf info: 12 other: 00 shndx: 1 value: 57c size: 80
sym: printf value: ef74f57c addr: ef74f138
machine_apply_elf_rel: CALL26 9400000094000000->9400000094000111
sym: setup_arch info: 12 other: 00 shndx: 1 value: ec8 size: 4
sym: setup_arch value: ef74fec8 addr: ef74f13c
machine_apply_elf_rel: CALL26 9000000094000000->9000000094000363
sym: .text info: 03 other: 00 shndx: 1 value: 0 size: 0
sym: .text value: ef74f170 addr: ef74f140
machine_apply_elf_rel: ADR_PREL_PG_HI21 f940000090000000->f940000090000000
sym: .text info: 03 other: 00 shndx: 1 value: 0 size: 0
sym: .text value: ef74f170 addr: ef74f144
machine_apply_elf_rel: LDST64_ABS_LO12_NC b9412000f9400000->b9412000f940b800
sym: verify_sha256_digest info: 12 other: 00 shndx: 1 value: 0 size: f4
sym: verify_sha256_digest value: ef74f000 addr: ef74f150
machine_apply_elf_rel: CALL26 3400004094000000->3400004097ffffac
sym: post_verification_setup_arch info: 12 other: 00 shndx: 1 value: ec4 size: 4
sym: post_verification_setup_arch value: ef74fec4 addr: ef74f160
machine_apply_elf_rel: JUMP26 d503201f14000000->d503201f14000359
sym: .rodata.str1.1 info: 03 other: 00 shndx: 3 value: 0 size: 0
sym: .rodata.str1.1 value: ef752028 addr: ef74f168
machine_apply_elf_rel: ABS64 0000000000000000->00000000ef752028
sym: .data info: 03 other: 00 shndx: 6 value: 0 size: 0
sym: .data value: ef7522e8 addr: ef74f170
machine_apply_elf_rel: ABS64 0000000000000000->00000000ef7522e8
sym: .text info: 03 other: 00 shndx: 1 value: 0 size: 0
sym: .text value: ef74f500 addr: ef74f1ac
machine_apply_elf_rel: ADR_PREL_PG_HI21 394002c090000019->394002c090000019
sym: putchar info: 12 other: 00 shndx: 1 value: ec0 size: 4
sym: putchar value: ef74fec0 addr: ef74f1fc
machine_apply_elf_rel: CALL26 17fffffb94000000->17fffffb94000331
sym: putchar info: 12 other: 00 shndx: 1 value: ec0 size: 4
sym: putchar value: ef74fec0 addr: ef74f268
machine_apply_elf_rel: CALL26 17fffffd94000000->17fffffd94000316
sym: .text info: 03 other: 00 shndx: 1 value: 0 size: 0
sym: .text value: ef74f500 addr: ef74f2c0
machine_apply_elf_rel: LDST64_ABS_LO12_NC 9ac224a3f9400326->9ac224a3f9428326
sym: putchar info: 12 other: 00 shndx: 1 value: ec0 size: 4
sym: putchar value: ef74fec0 addr: ef74f4f4
machine_apply_elf_rel: CALL26 17fffffd94000000->17fffffd94000273
sym: .rodata.str1.1 info: 03 other: 00 shndx: 3 value: 0 size: 0
sym: .rodata.str1.1 value: ef75203a addr: ef74f500
machine_apply_elf_rel: ABS64 0000000000000000->00000000ef75203a
sym: vsprintf info: 12 other: 00 shndx: 1 value: 178 size: 384
sym: vsprintf value: ef74f178 addr: ef74f570
machine_apply_elf_rel: CALL26 a8d07bfd94000000->a8d07bfd97ffff02
sym: vsprintf info: 12 other: 00 shndx: 1 value: 178 size: 384
sym: vsprintf value: ef74f178 addr: ef74f5f0
machine_apply_elf_rel: CALL26 a8d17bfd94000000->a8d17bfd97fffee2
sym: purgatory info: 12 other: 00 shndx: 1 value: 128 size: 3c
sym: purgatory value: ef74f128 addr: ef74f698
machine_apply_elf_rel: CALL26 5800001194000000->5800001197fffea4
sym: arm64_kernel_entry info: 10 other: 00 shndx: 6 value: 128 size: 8
sym: arm64_kernel_entry value: ef752410 addr: ef74f69c
machine_apply_elf_rel: LD_PREL_LO19 5800000058000011->5800000058016bb1
sym: arm64_dtb_addr info: 10 other: 00 shndx: 6 value: 130 size: 8
sym: arm64_dtb_addr value: ef752418 addr: ef74f6a0
machine_apply_elf_rel: LD_PREL_LO19 aa1f03e158000000->aa1f03e158016bc0
sym: sha256_process info: 12 other: 00 shndx: 1 value: f20 size: 1dfc
sym: sha256_process value: ef74ff20 addr: ef751d9c
machine_apply_elf_rel: CALL26 eb15027f94000000->eb15027f97fff861
sym: memcpy info: 12 other: 00 shndx: 1 value: 63c size: 20
sym: memcpy value: ef74f63c addr: ef751dd8
machine_apply_elf_rel: CALL26 8b1602f694000000->8b1602f697fff619
sym: sha256_process info: 12 other: 00 shndx: 1 value: f20 size: 1dfc
sym: sha256_process value: ef74ff20 addr: ef751de8
machine_apply_elf_rel: CALL26 8b15027394000000->8b15027397fff84e
sym: memcpy info: 12 other: 00 shndx: 1 value: 63c size: 20
sym: memcpy value: ef74f63c addr: ef751e24
machine_apply_elf_rel: JUMP26 d503201f14000000->d503201f17fff606
sym: .text info: 03 other: 00 shndx: 1 value: 0 size: 0
sym: .text value: ef751fd8 addr: ef751e44
machine_apply_elf_rel: ADR_PREL_PG_HI21 5280070590000002->5280070590000002
sym: .text info: 03 other: 00 shndx: 1 value: 0 size: 0
sym: .text value: ef751fd8 addr: ef751e5c
machine_apply_elf_rel: LDST64_ABS_LO12_NC aa0003f3f9400041->aa0003f3f947ec41
sym: .data info: 03 other: 00 shndx: 6 value: 0 size: 0
sym: .data value: ef752420 addr: ef751fd8
machine_apply_elf_rel: ABS64 0000000000000000->00000000ef752420
sym: .text info: 03 other: 00 shndx: 1 value: 0 size: 0
sym: .text value: ef74f000 addr: ef75206c
machine_apply_elf_rel: PREL32 000000f400000000->000000f4ffffcf94
sym: .text info: 03 other: 00 shndx: 1 value: 0 size: 0
sym: .text value: ef74f128 addr: ef752098
machine_apply_elf_rel: PREL32 0000003c00000000->0000003cffffd090
sym: .text info: 03 other: 00 shndx: 1 value: 0 size: 0
sym: .text value: ef74f178 addr: ef7520cc
machine_apply_elf_rel: PREL32 0000038400000000->00000384ffffd0ac
sym: .text info: 03 other: 00 shndx: 1 value: 0 size: 0
sym: .text value: ef74f508 addr: ef752110
machine_apply_elf_rel: PREL32 0000007400000000->00000074ffffd3f8
sym: .text info: 03 other: 00 shndx: 1 value: 0 size: 0
sym: .text value: ef74f57c addr: ef752130
machine_apply_elf_rel: PREL32 0000008000000000->00000080ffffd44c
sym: .text info: 03 other: 00 shndx: 1 value: 0 size: 0
sym: .text value: ef74f5fc addr: ef752164
machine_apply_elf_rel: PREL32 0000002400000000->00000024ffffd498
sym: .text info: 03 other: 00 shndx: 1 value: 0 size: 0
sym: .text value: ef74f620 addr: ef752178
machine_apply_elf_rel: PREL32 0000001c00000000->0000001cffffd4a8
sym: .text info: 03 other: 00 shndx: 1 value: 0 size: 0
sym: .text value: ef74f63c addr: ef75218c
machine_apply_elf_rel: PREL32 0000002000000000->00000020ffffd4b0
sym: .text info: 03 other: 00 shndx: 1 [ 33.868822] vdd_arm: disabling
value: 0 size: 0
sym: .text valu[ 33.873208] VGEN1: disabling
e: ef74f65c addr: ef7521a0
machi[ 33.879474] VGEN6: disabling
ne_apply_elf_rel: PREL32 0000003400000000->00000034ffffd4bc
sym: .text info: 03 other: 00 shndx: 1 value: 0 size: 0
sym: .text value: ef74fec0 addr: ef7521cc
machine_apply_elf_rel: PREL32 0000000400000000->00000004ffffdcf4
sym: .text info: 03 other: 00 shndx: 1 value: 0 size: 0
sym: .text value: ef74fec4 addr: ef7521e0
machine_apply_elf_rel: PREL32 0000000400000000->00000004ffffdce4
sym: .text info: 03 other: 00 shndx: 1 value: 0 size: 0
sym: .text value: ef74fec8 addr: ef7521f4
machine_apply_elf_rel: PREL32 0000000400000000->00000004ffffdcd4
sym: .text info: 03 other: 00 shndx: 1 value: 0 size: 0
sym: .text value: ef74fed0 addr: ef75221c
machine_apply_elf_rel: PREL32 0000005000000000->00000050ffffdcb4
sym: .text info: 03 other: 00 shndx: 1 value: 0 size: 0
sym: .text value: ef74ff20 addr: ef752230
machine_apply_elf_rel: PREL32 00001dfc00000000->00001dfcffffdcf0
sym: .text info: 03 other: 00 shndx: 1 value: 0 size: 0
sym: .text value: ef751d20 addr: ef752270
machine_apply_elf_rel: PREL32 0000010800000000->00000108fffffab0
sym: .text info: 03 other: 00 shndx: 1 value: 0 size: 0
sym: .text value: ef751e30 addr: ef7522b0
machine_apply_elf_rel: PREL32 0000000c00000000->0000000cfffffb80
sym: .text info: 03 other: 00 shndx: 1 value: 0 size: 0
sym: .text value: ef751e40 addr: ef7522c4
machine_apply_elf_rel: PREL32 0000019400000000->00000194fffffb7c
kexec_load: entry = 0xef74f690 flags = 0xb70001
nr_segments = 4
segment[0].buf = 0xffff7effe010
segment[0].bufsz = 0x17c2a00
segment[0].mem = 0xede80000
segment[0].memsz = 0x18c3000
segment[1].buf = 0xaaaae587f510
segment[1].bufsz = 0xb3f6
segment[1].mem = 0xef743000
segment[1].memsz = 0xc000
segment[2].buf = 0xaaaae588aee0
segment[2].bufsz = 0x3460
segment[2].mem = 0xef74f000
segment[2].memsz = 0x4000
segment[3].buf = 0xaaaae5866e90
segment[3].bufsz = 0x400
segment[3].mem = 0xfddff000
segment[3].memsz = 0x1000

root@imx8mqevk:~# echo c > /proc/sysrq-trigger
[ 181.089304] sysrq: Trigger a crash
[ 181.092729] Kernel panic - not syncing: sysrq triggered crash
[ 181.098477] CPU: 2 PID: 383 Comm: sh Kdump: loaded Not tainted 5.4.70-2.3.0+g4f2631b022d8 #1
[ 181.106913] Hardware name: NXP i.MX8MQ EVK (DT)
[ 181.111441] Call trace:
[ 181.113893] dump_backtrace+0x0/0x140
[ 181.117556] show_stack+0x14/0x20
[ 181.120872] dump_stack+0xb4/0x114
[ 181.124275] panic+0x158/0x324
[ 181.127330] sysrq_handle_reboot+0x0/0x20
[ 181.131340] __handle_sysrq+0x88/0x180
[ 181.135088] write_sysrq_trigger+0x8c/0xb0
[ 181.139186] proc_reg_write+0x78/0xb0
[ 181.142849] __vfs_write+0x18/0x40
[ 181.146250] vfs_write+0xdc/0x1c8
[ 181.149563] ksys_write+0x68/0xf0
[ 181.152877] __arm64_sys_write+0x18/0x20
[ 181.156805] el0_svc_common.constprop.0+0x68/0x160
[ 181.161593] el0_svc_handler+0x20/0x80
[ 181.165342] el0_svc+0x8/0x208
[ 181.168404] SMP: stopping secondary CPUs
[ 181.173168] Starting crashdump kernel...
[ 181.177091] Bye!

 

 

 

Labels (1)
0 Kudos
0 Replies