Login
Log in using an SSO provider:
Fedora Account System
Red Hat Associate
Red Hat Customer
Login using a Red Hat Bugzilla account
Forgot Password
Create an Account
Red Hat Bugzilla – Attachment 1860314 Details for
Bug 2052949
kdump load failed with message "machine_apply_elf_rel: ERROR Unknown type: 299"
Home
New
Search
Simple Search
Advanced Search
My Links
Browse
Requests
Reports
Current State
Search
Tabular reports
Graphical reports
Duplicates
Other Reports
User Changes
Plotly Reports
Bug Status
Bug Severity
Non-Defaults
Product Dashboard
Help
Page Help!
Bug Writing Guidelines
What's new
Browser Support Policy
5.0.4.rh90 Release notes
FAQ
Guides index
User guide
Web Services
Contact
Legal
[?]
This site requires JavaScript to be enabled to function correctly, please enable it.
The whole log of kdump loading
kdump.log (text/plain), 20.12 KB, created by
Baoquan He
on 2022-02-10 10:33:39 UTC
(
hide
)
Description:
The whole log of kdump loading
Filename:
MIME Type:
Creator:
Baoquan He
Created:
2022-02-10 10:33:39 UTC
Size:
20.12 KB
patch
obsolete
>+ 2022-02-08 08:31:28 /usr/bin/kdumpctl@647: /sbin/kexec -s -d -p '--command-line=BOOT_IMAGE=(hd0,gpt2)/vmlinuz-5.17.0-rc3 ro acpi=force irqpoll nr_cpus=1 reset_devices cgroup_disable=memory udev.children-max=2 panic=10 swiotlb=noforce novmcoredd cma=0 hugetlb_cma=0' --initrd=/boot/initramfs-5.17.0-rc3kdump.img /boot/vmlinuz-5.17.0-rc3 >arch_process_options:178: command_line: BOOT_IMAGE=(hd0,gpt2)/vmlinuz-5.17.0-rc3 ro acpi=force irqpoll nr_cpus=1 reset_devices cgroup_disable=memory udev.children-max=2 panic=10 swiotlb=noforce novmcoredd cma=0 hugetlb_cma=0 >arch_process_options:180: initrd: /boot/initramfs-5.17.0-rc3kdump.img >arch_process_options:182: dtb: (null) >arch_process_options:185: console: (null) >Try gzip decompression. >elf_arm64_probe: Not an ELF executable. >image_arm64_probe: Bad arm64 image header. >zImage_arm64_probe: Try gzip decompression. >+ 2022-02-08 08:31:28 /usr/bin/kdumpctl@651: ret=0 >+ 2022-02-08 08:31:28 /usr/bin/kdumpctl@652: set +x >+ 2022-02-08 08:31:43 /usr/bin/kdumpctl@647: /sbin/kexec -d -p '--command-line=BOOT_IMAGE=(hd0,gpt2)/vmlinuz-5.17.0-rc3 ro acpi=force rd.memdebug=1 irqpoll nr_cpus=1 reset_devices cgroup_disable=memory udev.children-max=2 panic=10 swiotlb=noforce novmcoredd cma=0 hugetlb_cma=0' --initrd=/boot/initramfs-5.17.0-rc3kdump.img /boot/vmlinuz-5.17.0-rc3 >arch_process_options:178: command_line: BOOT_IMAGE=(hd0,gpt2)/vmlinuz-5.17.0-rc3 ro acpi=force rd.memdebug=1 irqpoll nr_cpus=1 reset_devices cgroup_disable=memory udev.children-max=2 panic=10 swiotlb=noforce novmcoredd cma=0 hugetlb_cma=0 >arch_process_options:180: initrd: /boot/initramfs-5.17.0-rc3kdump.img >arch_process_options:182: dtb: (null) >arch_process_options:185: console: (null) >Try gzip decompression. >kernel: 0xffffb74c7010 kernel_size: 0x1e2ba00 >set_phys_offset: phys_offset : 0000000040000000 (method : vmcoreinfo pt_note) >get_memory_ranges:+[0] 0000000040000000 - 00000007bbbcffff >get_memory_ranges:- 00000000d8000000 - 00000000dbffffff >get_memory_ranges:- 00000000fc000000 - 00000000ffffffff >get_memory_ranges:- 00000001001b8000 - 00000001001b8fff >get_memory_ranges:- 00000001001f0000 - 00000001001fffff >get_memory_ranges:- 0000000100200000 - 000000010020ffff >get_memory_ranges:- 0000000100210000 - 000000010021ffff >get_memory_ranges:- 0000000100220000 - 000000010022ffff >get_memory_ranges:- 0000000100230000 - 000000010023ffff >get_memory_ranges:- 000000050ce00000 - 000000050d02ffff >get_memory_ranges:- 00000007538e0000 - 00000007538e0fff >get_memory_ranges:- 0000000753ae0000 - 0000000753aeffff >get_memory_ranges:- 0000000753af4000 - 0000000754dbcfff >get_memory_ranges:- 000000079aa00000 - 00000007bb9fffff >get_memory_ranges:+[10] 00000007bbbe0000 - 00000007bbdbffff >get_memory_ranges:- 00000007bbc04000 - 00000007bbd50fff >get_memory_ranges:+[12] 00000007bc000000 - 00000007bc01ffff >get_memory_ranges:+[13] 00000007bc1b0000 - 00000007bf48ffff >get_memory_ranges:- 00000007bc1b1000 - 00000007bc1b1fff >get_memory_ranges:- 00000007bc1b5000 - 00000007bc1b5fff >get_memory_ranges:- 00000007bc1b8000 - 00000007bc1b9fff >get_memory_ranges:- 00000007bc1ba000 - 00000007bc1bafff >get_memory_ranges:- 00000007bc1bb000 - 00000007bdb17fff >get_memory_ranges:- 00000007bdb18000 - 00000007bdb18fff >get_memory_ranges:- 00000007bdb19000 - 00000007bf48ffff >get_memory_ranges:+[16] 00000007bf520000 - 00000007bf52ffff >get_memory_ranges:- 00000007bf520000 - 00000007bf52ffff >get_memory_ranges:+[16] 00000007bf650000 - 00000007bfffffff >get_memory_ranges:- 00000007bf650000 - 00000007bfffffff >System RAM ranges; >0000000040000000-00000000d7ffffff (0) >00000000dc000000-00000000fbffffff (0) >0000000100000000-00000001001b7fff (0) >00000001001b9000-00000001001effff (0) >0000000100240000-000000050cdfffff (0) >000000050d030000-00000007538dffff (0) >00000007538e1000-0000000753adffff (0) >0000000753af0000-0000000753af3fff (0) >0000000754dbd000-000000079a9fffff (0) >00000007bba00000-00000007bbbcffff (0) >00000007bbbe0000-00000007bbc03fff (0) >00000007bbd51000-00000007bbdbffff (0) >00000007bc000000-00000007bc01ffff (0) >00000007bc1b0000-00000007bc1b0fff (0) >00000007bc1b2000-00000007bc1b4fff (0) >00000007bc1b6000-00000007bc1b7fff (0) >elf_arm64_probe: Not an ELF executable. >image_arm64_load: kernel_segment: 00000000dc000000 >image_arm64_load: text_offset: 0000000000000000 >image_arm64_load: image_size: 00000000028c0000 >image_arm64_load: phys_offset: 0000000040000000 >image_arm64_load: vp_offset: ffffffffffffffff >image_arm64_load: PE format: yes >Reserved memory range >00000000dc000000-00000000fbffffff (0) >Coredump memory ranges >0000000040000000-00000000dbffffff (0) >00000000fc000000-00000007bbbcffff (0) >00000007bbbe0000-00000007bbdbffff (0) >00000007bc000000-00000007bc01ffff (0) >00000007bc1b0000-00000007bf48ffff (0) >00000007bf520000-00000007bf52ffff (0) >00000007bf650000-00000007bfffffff (0) >kernel symbol _text vaddr = ffffdc0081c20000 >load_crashdump_segments: page_offset: ffffe00000000000 >get_crash_notes_per_cpu: crash_notes addr = 7bbcde800, size = 424 >Elf header: p_type = 4, p_offset = 0x7bbcde800 p_paddr = 0x7bbcde800 p_vaddr = 0x0 p_filesz = 0x1a8 p_memsz = 0x1a8 >get_crash_notes_per_cpu: crash_notes addr = 7bbcfd800, size = 424 >Elf header: p_type = 4, p_offset = 0x7bbcfd800 p_paddr = 0x7bbcfd800 p_vaddr = 0x0 p_filesz = 0x1a8 p_memsz = 0x1a8 >get_crash_notes_per_cpu: crash_notes addr = 7bbd1c800, size = 424 >Elf header: p_type = 4, p_offset = 0x7bbd1c800 p_paddr = 0x7bbd1c800 p_vaddr = 0x0 p_filesz = 0x1a8 p_memsz = 0x1a8 >get_crash_notes_per_cpu: crash_notes addr = 7bbd3b800, size = 424 >Elf header: p_type = 4, p_offset = 0x7bbd3b800 p_paddr = 0x7bbd3b800 p_vaddr = 0x0 p_filesz = 0x1a8 p_memsz = 0x1a8 >vmcoreinfo header: p_type = 4, p_offset = 0x1003c2000 p_paddr = 0x1003c2000 p_vaddr = 0x0 p_filesz = 0x1024 p_memsz = 0x1024 >Kernel text Elf header: p_type = 1, p_offset = 0x50b600000 p_paddr = 0x50b600000 p_vaddr = 0xffffdc0081c20000 p_filesz = 0x28e0000 p_memsz = 0x28e0000 >Elf header: p_type = 1, p_offset = 0x40000000 p_paddr = 0x40000000 p_vaddr = 0xffffe00000000000 p_filesz = 0x9c000000 p_memsz = 0x9c000000 >Elf header: p_type = 1, p_offset = 0xfc000000 p_paddr = 0xfc000000 p_vaddr = 0xffffe000bc000000 p_filesz = 0x6bfbd0000 p_memsz = 0x6bfbd0000 >Elf header: p_type = 1, p_offset = 0x7bbbe0000 p_paddr = 0x7bbbe0000 p_vaddr = 0xffffe0077bbe0000 p_filesz = 0x1e0000 p_memsz = 0x1e0000 >Elf header: p_type = 1, p_offset = 0x7bc000000 p_paddr = 0x7bc000000 p_vaddr = 0xffffe0077c000000 p_filesz = 0x20000 p_memsz = 0x20000 >Elf header: p_type = 1, p_offset = 0x7bc1b0000 p_paddr = 0x7bc1b0000 p_vaddr = 0xffffe0077c1b0000 p_filesz = 0x32e0000 p_memsz = 0x32e0000 >Elf header: p_type = 1, p_offset = 0x7bf520000 p_paddr = 0x7bf520000 p_vaddr = 0xffffe0077f520000 p_filesz = 0x10000 p_memsz = 0x10000 >Elf header: p_type = 1, p_offset = 0x7bf650000 p_paddr = 0x7bf650000 p_vaddr = 0xffffe0077f650000 p_filesz = 0x9b0000 p_memsz = 0x9b0000 >load_crashdump_segments: elfcorehdr 0xfbfff000-0xfbfff3ff >arm64_load_other_segments:722: purgatory sink: 0x0 >read_1st_dtb: found /sys/firmware/fdt >get_cells_size: #address-cells:2 #size-cells:2 >cells_size_fitted: fbfff000-fbfff3ff >cells_size_fitted: dc000000-fbffffff >initrd: base de8c0000, size 1c8a800h (29927424) >dtb_set_initrd: start 3733716992, end 3763644416, size 29927424 (29226 KiB) >dtb: base e054b000, size 30ch (780) >sym: sha256_starts info: 12 other: 00 shndx: 1 value: f80 size: 1c >sym: sha256_starts value: e054cf80 addr: e054c014 >machine_apply_elf_rel: CALL26 9000000094000000->90000000940003db >sym: .text info: 03 other: 00 shndx: 1 value: 0 size: 0 >sym: .text value: e054c0f8 addr: e054c018 >machine_apply_elf_rel: ADR_PREL_PG_HI21 f940001390000000->f940001390000000 >sym: .text info: 03 other: 00 shndx: 1 value: 0 size: 0 >sym: .text value: e054c0f8 addr: e054c01c >machine_apply_elf_rel: LDST64_ABS_LO12_NC aa1303f5f9400013->aa1303f5f9407c13 >sym: sha256_update info: 12 other: 00 shndx: 1 value: 2ee0 size: c >sym: sha256_update value: e054eee0 addr: e054c034 >machine_apply_elf_rel: CALL26 eb14027f94000000->eb14027f94000bab >sym: sha256_finish info: 12 other: 00 shndx: 1 value: 2ef0 size: 1cc >sym: sha256_finish value: e054eef0 addr: e054c04c >machine_apply_elf_rel: CALL26 aa1303e194000000->aa1303e194000ba9 >sym: memcmp info: 12 other: 00 shndx: 1 value: 66c size: 34 >sym: memcmp value: e054c66c addr: e054c05c >machine_apply_elf_rel: CALL26 3400042094000000->3400042094000184 >sym: .text info: 03 other: 00 shndx: 1 value: 0 size: 0 >sym: .text value: e054c100 addr: e054c064 >machine_apply_elf_rel: ADR_PREL_PG_HI21 9000001490000000->9000001490000000 >sym: .text info: 03 other: 00 shndx: 1 value: 0 size: 0 >sym: .text value: e054c110 addr: e054c068 >machine_apply_elf_rel: ADR_PREL_PG_HI21 9100029490000014->9100029490000014 >sym: .text info: 03 other: 00 shndx: 1 value: 0 size: 0 >sym: .text value: e054c110 addr: e054c06c >machine_apply_elf_rel: ADD_ABS_LO12_NC d280001391000294->d280001391044294 >sym: .text info: 03 other: 00 shndx: 1 value: 0 size: 0 >sym: .text value: e054c100 addr: e054c074 >machine_apply_elf_rel: LDST64_ABS_LO12_NC 94000000f9400000->94000000f9408000 >sym: printf info: 12 other: 00 shndx: 1 value: 594 size: 78 >sym: printf value: e054c594 addr: e054c078 >machine_apply_elf_rel: CALL26 9000000094000000->9000000094000147 >sym: .text info: 03 other: 00 shndx: 1 value: 0 size: 0 >sym: .text value: e054c108 addr: e054c07c >machine_apply_elf_rel: ADR_PREL_PG_HI21 f940000090000000->f940000090000000 >sym: .text info: 03 other: 00 shndx: 1 value: 0 size: 0 >sym: .text value: e054c108 addr: e054c080 >machine_apply_elf_rel: LDST64_ABS_LO12_NC 94000000f9400000->94000000f9408400 >sym: printf info: 12 other: 00 shndx: 1 value: 594 size: 78 >sym: printf value: e054c594 addr: e054c084 >machine_apply_elf_rel: CALL26 f940028094000000->f940028094000144 >sym: printf info: 12 other: 00 shndx: 1 value: 594 size: 78 >sym: printf value: e054c594 addr: e054c094 >machine_apply_elf_rel: CALL26 f100827f94000000->f100827f94000140 >sym: .text info: 03 other: 00 shndx: 1 value: 0 size: 0 >sym: .text value: e054c118 addr: e054c0a0 >machine_apply_elf_rel: ADR_PREL_PG_HI21 910402b590000016->910402b590000016 >sym: .text info: 03 other: 00 shndx: 1 value: 0 size: 0 >sym: .text value: e054c118 addr: e054c0ac >machine_apply_elf_rel: LDST64_ABS_LO12_NC 94000000f94002c0->94000000f9408ec0 >sym: printf info: 12 other: 00 shndx: 1 value: 594 size: 78 >sym: printf value: e054c594 addr: e054c0b0 >machine_apply_elf_rel: CALL26 9000000094000000->9000000094000139 >sym: .text info: 03 other: 00 shndx: 1 value: 0 size: 0 >sym: .text value: e054c120 addr: e054c0b4 >machine_apply_elf_rel: ADR_PREL_PG_HI21 f940000090000000->f940000090000000 >sym: .text info: 03 other: 00 shndx: 1 value: 0 size: 0 >sym: .text value: e054c120 addr: e054c0b8 >machine_apply_elf_rel: LDST64_ABS_LO12_NC 94000000f9400000->94000000f9409000 >sym: printf info: 12 other: 00 shndx: 1 value: 594 size: 78 >sym: printf value: e054c594 addr: e054c0bc >machine_apply_elf_rel: CALL26 f940028094000000->f940028094000136 >sym: printf info: 12 other: 00 shndx: 1 value: 594 size: 78 >sym: printf value: e054c594 addr: e054c0cc >machine_apply_elf_rel: CALL26 f100827f94000000->f100827f94000132 >sym: .text info: 03 other: 00 shndx: 1 value: 0 size: 0 >sym: .text value: e054c118 addr: e054c0d8 >machine_apply_elf_rel: LDST64_ABS_LO12_NC 94000000f94002c0->94000000f9408ec0 >sym: printf info: 12 other: 00 shndx: 1 value: 594 size: 78 >sym: printf value: e054c594 addr: e054c0dc >machine_apply_elf_rel: CALL26 5280002094000000->528000209400012e >sym: .data info: 03 other: 00 shndx: 6 value: 0 size: 0 >sym: .data value: e054f420 addr: e054c0f8 >machine_apply_elf_rel: ABS64 0000000000000000->00000000e054f420 >sym: .rodata.str1.1 info: 03 other: 00 shndx: 3 value: 0 size: 0 >sym: .rodata.str1.1 value: e054f0c8 addr: e054c100 >machine_apply_elf_rel: ABS64 0000000000000000->00000000e054f0c8 >sym: .rodata.str1.1 info: 03 other: 00 shndx: 3 value: 0 size: 0 >sym: .rodata.str1.1 value: e054f0e8 addr: e054c108 >machine_apply_elf_rel: ABS64 0000000000000000->00000000e054f0e8 >sym: .rodata.str1.1 info: 03 other: 00 shndx: 3 value: 0 size: 0 >sym: .rodata.str1.1 value: e054f0f8 addr: e054c110 >machine_apply_elf_rel: ABS64 0000000000000000->00000000e054f0f8 >sym: .rodata.str1.1 info: 03 other: 00 shndx: 3 value: 0 size: 0 >sym: .rodata.str1.1 value: e054f0fe addr: e054c118 >machine_apply_elf_rel: ABS64 0000000000000000->00000000e054f0fe >sym: .rodata.str1.1 info: 03 other: 00 shndx: 3 value: 0 size: 0 >sym: .rodata.str1.1 value: e054f100 addr: e054c120 >machine_apply_elf_rel: ABS64 0000000000000000->00000000e054f100 >sym: .text info: 03 other: 00 shndx: 1 value: 0 size: 0 >sym: .text value: e054c168 addr: e054c12c >machine_apply_elf_rel: ADR_PREL_PG_HI21 910003fd90000000->910003fd90000000 >sym: .text info: 03 other: 00 shndx: 1 value: 0 size: 0 >sym: .text value: e054c168 addr: e054c134 >machine_apply_elf_rel: LDST64_ABS_LO12_NC 94000000f9400000->94000000f940b400 >sym: printf info: 12 other: 00 shndx: 1 value: 594 size: 78 >sym: printf value: e054c594 addr: e054c138 >machine_apply_elf_rel: CALL26 9400000094000000->9400000094000117 >sym: setup_arch info: 12 other: 00 shndx: 1 value: f20 size: 3c >sym: setup_arch value: e054cf20 addr: e054c13c >machine_apply_elf_rel: CALL26 9000000094000000->9000000094000379 >sym: .text info: 03 other: 00 shndx: 1 value: 0 size: 0 >sym: .text value: e054c170 addr: e054c140 >machine_apply_elf_rel: ADR_PREL_PG_HI21 f940000090000000->f940000090000000 >sym: .text info: 03 other: 00 shndx: 1 value: 0 size: 0 >sym: .text value: e054c170 addr: e054c144 >machine_apply_elf_rel: LDST64_ABS_LO12_NC b9412000f9400000->b9412000f940b800 >sym: verify_sha256_digest info: 12 other: 00 shndx: 1 value: 0 size: f4 >sym: verify_sha256_digest value: e054c000 addr: e054c150 >machine_apply_elf_rel: CALL26 3400004094000000->3400004097ffffac >sym: post_verification_setup_arch info: 12 other: 00 shndx: 1 value: f08 size: c >sym: post_verification_setup_arch value: e054cf08 addr: e054c160 >machine_apply_elf_rel: JUMP26 d503201f14000000->d503201f1400036a >sym: .rodata.str1.1 info: 03 other: 00 shndx: 3 value: 0 size: 0 >sym: .rodata.str1.1 value: e054f110 addr: e054c168 >machine_apply_elf_rel: ABS64 0000000000000000->00000000e054f110 >sym: .data info: 03 other: 00 shndx: 6 value: 0 size: 0 >sym: .data value: e054f420 addr: e054c170 >machine_apply_elf_rel: ABS64 0000000000000000->00000000e054f420 >sym: putchar info: 12 other: 00 shndx: 1 value: ed0 size: 2c >sym: putchar value: e054ced0 addr: e054c1ec >machine_apply_elf_rel: CALL26 17fffffa94000000->17fffffa94000339 >sym: putchar info: 12 other: 00 shndx: 1 value: ed0 size: 2c >sym: putchar value: e054ced0 addr: e054c250 >machine_apply_elf_rel: CALL26 17fffff694000000->17fffff694000320 >sym: .text info: 03 other: 00 shndx: 1 value: 0 size: 0 >sym: .text value: e054c520 addr: e054c2a8 >machine_apply_elf_rel: ADR_PREL_PG_HI21 f94000e690000007->f94000e690000007 >sym: .text info: 03 other: 00 shndx: 1 value: 0 size: 0 >sym: .text value: e054c520 addr: e054c2ac >machine_apply_elf_rel: LDST64_ABS_LO12_NC 9ac124a4f94000e6->9ac124a4f94290e6 >sym: putchar info: 12 other: 00 shndx: 1 value: ed0 size: 2c >sym: putchar value: e054ced0 addr: e054c518 >machine_apply_elf_rel: CALL26 17fffffd94000000->17fffffd9400026e >sym: .rodata.str1.1 info: 03 other: 00 shndx: 3 value: 0 size: 0 >sym: .rodata.str1.1 value: e054f122 addr: e054c520 >machine_apply_elf_rel: ABS64 0000000000000000->00000000e054f122 >sym: vsprintf info: 12 other: 00 shndx: 1 value: 178 size: 3a8 >sym: vsprintf value: e054c178 addr: e054c588 >machine_apply_elf_rel: CALL26 a8d07bfd94000000->a8d07bfd97fffefc >sym: vsprintf info: 12 other: 00 shndx: 1 value: 178 size: 3a8 >sym: vsprintf value: e054c178 addr: e054c600 >machine_apply_elf_rel: CALL26 a8d17bfd94000000->a8d17bfd97fffede >sym: purgatory info: 12 other: 00 shndx: 1 value: 128 size: 3c >sym: purgatory value: e054c128 addr: e054c6a8 >machine_apply_elf_rel: CALL26 5800001194000000->5800001197fffea0 >sym: arm64_kernel_entry info: 10 other: 00 shndx: 6 value: 128 size: 8 >sym: arm64_kernel_entry value: e054f548 addr: e054c6ac >machine_apply_elf_rel: LD_PREL_LO19 5800000058000011->58000000580174f1 >sym: arm64_dtb_addr info: 10 other: 00 shndx: 6 value: 130 size: 8 >sym: arm64_dtb_addr value: e054f550 addr: e054c6b0 >machine_apply_elf_rel: LD_PREL_LO19 aa1f03e158000000->aa1f03e158017500 >sym: .text info: 03 other: 00 shndx: 1 value: 0 size: 0 >sym: .text value: e054cf00 addr: e054ced0 >machine_apply_elf_rel: ADR_PREL_PG_HI21 f940002190000001->f940002190000001 >sym: .text info: 03 other: 00 shndx: 1 value: 0 size: 0 >sym: .text value: e054cf00 addr: e054ced4 >machine_apply_elf_rel: LDST64_ABS_LO12_NC f9400022f9400021->f9400022f9478021 >sym: data info: 03 other: 00 shndx: 7 value: 0 size: 0 >sym: data value: e054f5a0 addr: e054cf00 >machine_apply_elf_rel: ABS64 0000000000000000->00000000e054f5a0 >sym: .text info: 03 other: 00 shndx: 1 value: 0 size: 0 >sym: .text value: e054cf18 addr: e054cf08 >machine_apply_elf_rel: ADR_PREL_PG_HI21 f940000090000000->f940000090000000 >sym: .text info: 03 other: 00 shndx: 1 value: 0 size: 0 >sym: .text value: e054cf18 addr: e054cf0c >machine_apply_elf_rel: LDST64_ABS_LO12_NC 14000000f9400000->14000000f9478c00 >sym: printf info: 12 other: 00 shndx: 1 value: 594 size: 78 >sym: printf value: e054c594 addr: e054cf10 >machine_apply_elf_rel: JUMP26 d503201f14000000->d503201f17fffda1 >sym: .rodata.str1.1 info: 03 other: 00 shndx: 3 value: 0 size: 0 >sym: .rodata.str1.1 value: e054f133 addr: e054cf18 >machine_apply_elf_rel: ABS64 0000000000000000->00000000e054f133 >sym: .text info: 03 other: 00 shndx: 1 value: 0 size: 0 >sym: .text value: e054cf60 addr: e054cf24 >machine_apply_elf_rel: ADR_PREL_PG_HI21 910003fd90000000->910003fd90000000 >sym: .text info: 03 other: 00 shndx: 1 value: 0 size: 0 >sym: .text value: e054cf60 addr: e054cf2c >machine_apply_elf_rel: LDST64_ABS_LO12_NC f9400001f9400000->f9400001f947b000 >sym: .text info: 03 other: 00 shndx: 1 value: 0 size: 0 >sym: .text value: e054cf68 addr: e054cf34 >machine_apply_elf_rel: ADR_PREL_PG_HI21 f940000090000000->f940000090000000 >sym: .text info: 03 other: 00 shndx: 1 value: 0 size: 0 >sym: .text value: e054cf68 addr: e054cf38 >machine_apply_elf_rel: LDST64_ABS_LO12_NC 94000000f9400000->94000000f947b400 >sym: printf info: 12 other: 00 shndx: 1 value: 594 size: 78 >sym: printf value: e054c594 addr: e054cf3c >machine_apply_elf_rel: CALL26 9000000094000000->9000000097fffd96 >sym: .text info: 03 other: 00 shndx: 1 value: 0 size: 0 >sym: .text value: e054cf70 addr: e054cf40 >machine_apply_elf_rel: ADR_PREL_PG_HI21 a8c17bfd90000000->a8c17bfd90000000 >sym: .text info: 03 other: 00 shndx: 1 value: 0 size: 0 >sym: .text value: e054cf70 addr: e054cf48 >machine_apply_elf_rel: LDST64_ABS_LO12_NC f9400001f9400000->f9400001f947b800 >sym: .text info: 03 other: 00 shndx: 1 value: 0 size: 0 >sym: .text value: e054cf78 addr: e054cf50 >machine_apply_elf_rel: ADR_PREL_PG_HI21 f940000090000000->f940000090000000 >sym: .text info: 03 other: 00 shndx: 1 value: 0 size: 0 >sym: .text value: e054cf78 addr: e054cf54 >machine_apply_elf_rel: LDST64_ABS_LO12_NC 14000000f9400000->14000000f947bc00 >sym: printf info: 12 other: 00 shndx: 1 value: 594 size: 78 >sym: printf value: e054c594 addr: e054cf58 >machine_apply_elf_rel: JUMP26 d503201f14000000->d503201f17fffd8f >sym: arm64_kernel_entry info: 10 other: 00 shndx: 6 value: 128 size: 8 >sym: arm64_kernel_entry value: e054f548 addr: e054cf60 >machine_apply_elf_rel: ABS64 0000000000000000->00000000e054f548 >sym: .rodata.str1.1 info: 03 other: 00 shndx: 3 value: 0 size: 0 >sym: .rodata.str1.1 value: e054f152 addr: e054cf68 >machine_apply_elf_rel: ABS64 0000000000000000->00000000e054f152 >sym: arm64_dtb_addr info: 10 other: 00 shndx: 6 value: 130 size: 8 >sym: arm64_dtb_addr value: e054f550 addr: e054cf70 >machine_apply_elf_rel: ABS64 0000000000000000->00000000e054f550 >sym: .rodata.str1.1 info: 03 other: 00 shndx: 3 value: 0 size: 0 >sym: .rodata.str1.1 value: e054f168 addr: e054cf78 >machine_apply_elf_rel: ABS64 0000000000000000->00000000e054f168 >sym: .text info: 03 other: 00 shndx: 1 value: 0 size: 0 >sym: .text value: e054cfa0 addr: e054cf80 >machine_apply_elf_rel: ADR_PREL_PG_HI21 a9007c1f90000001->a9007c1f90000001 >sym: .text info: 03 other: 00 shndx: 1 value: 0 size: 0 >sym: .text value: e054cfa0 addr: e054cf88 >machine_apply_elf_rel: ERROR Unknown type: 299
You cannot view the attachment while viewing its details because your browser does not support IFRAMEs.
View the attachment on a separate page
.
View Attachment As Raw
Actions:
View
Attachments on
bug 2052949
: 1860314