adding "-d" to kexec which shows debugging info. I did not see any error...

[  441.468322] kdump-tools[7548]: arch_process_options:178: command_line: 
BOOT_IMAGE=/boot/vmlinuz-5.15.0-1031-bluefield root=1
[  441.468586] kdump-tools[7548]: arch_process_options:180: initrd: 
/var/lib/kdump/initrd.img
[  441.468726] kdump-tools[7548]: arch_process_options:182: dtb: (null)
[  441.468827] kdump-tools[7548]: arch_process_options:185: console: (null)
[  441.468936] kdump-tools[7548]: Try gzip decompression.
[  441.734545] kdump-tools[7548]: kernel: 0xffffa6946010 kernel_size: 0x2c9c198
[  441.734767] kdump-tools[7548]: set_phys_offset: phys_offset : 
0000000080000000 (method : vmcoreinfo pt_note)
[  441.734967] kdump-tools[7548]: get_memory_ranges:+[0] 0000000082000000 - 
0000000087ffffff
[  441.735103] kdump-tools[7548]: get_memory_ranges:+[1] 0000000088002000 - 
00000000fffdffff
[  441.735209] kdump-tools[7548]: get_memory_ranges:-      00000000b9000000 - 
00000000bcffffff
[  441.735308] kdump-tools[7548]: get_memory_ranges:-      00000000fd000000 - 
00000000feffffff
[  441.735391] kdump-tools[7548]: get_memory_ranges:+[4] 0000000100000000 - 
000000085a0bffff
[  441.735467] kdump-tools[7548]: get_memory_ranges:-      00000001001ea000 - 
00000001001eafff
[  441.735568] kdump-tools[7548]: get_memory_ranges:-      0000000100220000 - 
000000010022ffff
[  441.735655] kdump-tools[7548]: get_memory_ranges:-      0000000100230000 - 
000000010023ffff
[  441.735737] kdump-tools[7548]: get_memory_ranges:-      0000000100240000 - 
000000010024ffff
[  441.735813] kdump-tools[7548]: get_memory_ranges:-      0000000100250000 - 
000000010025ffff
[  441.735885] kdump-tools[7548]: get_memory_ranges:-      0000000100260000 - 
000000010026ffff
[  441.735968] kdump-tools[7548]: get_memory_ranges:-      0000000100270000 - 
000000010027ffff
[  441.736117] kdump-tools[7548]: get_memory_ranges:-      0000000100280000 - 
000000010028ffff
[  441.736224] kdump-tools[7548]: get_memory_ranges:-      0000000100290000 - 
000000010029ffff
[  441.736306] kdump-tools[7548]: get_memory_ranges:-      00000001002a0000 - 
00000001002affff
[  441.736380] kdump-tools[7548]: get_memory_ranges:-      00000001002b0000 - 
00000001002bffff
[  441.736481] kdump-tools[7548]: get_memory_ranges:-      00000001002c0000 - 
00000001002cffff
[  441.736570] kdump-tools[7548]: get_memory_ranges:-      00000001002d0000 - 
00000001002dffff
[  441.736650] kdump-tools[7548]: get_memory_ranges:-      00000001002e0000 - 
00000001002effff
[  441.736737] kdump-tools[7548]: get_memory_ranges:-      00000001002f0000 - 
00000001002fffff
[  441.736815] kdump-tools[7548]: get_memory_ranges:-      0000000100300000 - 
000000010030ffff
[  441.736887] kdump-tools[7548]: get_memory_ranges:-      0000000100310000 - 
000000010031ffff
[  441.736957] kdump-tools[7548]: get_memory_ranges:-      0000000100320000 - 
000000010032ffff
[  441.737028] kdump-tools[7548]: get_memory_ranges:-      0000000276d50000 - 
00000002776affff
[  441.737096] kdump-tools[7548]: get_memory_ranges:-      000000082f400000 - 
000000084ebfffff
[  441.737240] kdump-tools[7548]: get_memory_ranges:-      000000084ed50000 - 
000000084ed50fff
[  441.737392] kdump-tools[7548]: get_memory_ranges:-      0000000851d30000 - 
0000000851d3ffff
[  441.737504] kdump-tools[7548]: get_memory_ranges:-      000000085214b000 - 
0000000854ee6fff
[  441.737588] kdump-tools[7548]: get_memory_ranges:-      00000008570c0000 - 
000000085a0bffff
[  441.737665] kdump-tools[7548]: get_memory_ranges:+[12] 000000085a0d0000 - 
000000085a1affff
[  441.737740] kdump-tools[7548]: get_memory_ranges:+[13] 000000085a2a0000 - 
000000085a49afff
[  441.737828] kdump-tools[7548]: get_memory_ranges:-      000000085a2ac000 - 
000000085a2acfff
[  441.737912] kdump-tools[7548]: get_memory_ranges:+[15] 000000085a4f7000 - 
000000085a4fffff
[  441.738007] kdump-tools[7548]: get_memory_ranges:+[16] 000000085a640000 - 
000000085a79ffff
[  441.738099] kdump-tools[7548]: get_memory_ranges:+[17] 000000085a7c0000 - 
000000085a7cffff
[  441.738180] kdump-tools[7548]: get_memory_ranges:+[18] 000000085a910000 - 
000000085a92ffff
[  441.738253] kdump-tools[7548]: get_memory_ranges:+[19] 000000085a9d0000 - 
000000085aa0ffff
[  441.738328] kdump-tools[7548]: get_memory_ranges:-      000000085a9d0000 - 
000000085a9d0fff
[  441.738399] kdump-tools[7548]: get_memory_ranges:+[20] 000000085acc0000 - 
000000085ad9ffff
[  441.738486] kdump-tools[7548]: get_memory_ranges:-      000000085ad90000 - 
000000085ad9ffff
[  441.738567] kdump-tools[7548]: get_memory_ranges:+[21] 000000085af80000 - 
000000085ff9ffff
[  441.738642] kdump-tools[7548]: get_memory_ranges:-      000000085bde4000 - 
000000085c083fff
[  441.738736] kdump-tools[7548]: get_memory_ranges:-      000000085c086000 - 
000000085c087fff
[  441.738822] kdump-tools[7548]: get_memory_ranges:-      000000085c088000 - 
000000085c088fff
[  441.738895] kdump-tools[7548]: get_memory_ranges:-      000000085c089000 - 
000000085c08afff
[  441.738972] kdump-tools[7548]: get_memory_ranges:-      000000085c08b000 - 
000000085e446fff
[  441.739057] kdump-tools[7548]: get_memory_ranges:-      000000085e447000 - 
000000085e447fff
[  441.739139] kdump-tools[7548]: get_memory_ranges:-      000000085e448000 - 
000000085e45afff
[  441.739223] kdump-tools[7548]: get_memory_ranges:-      000000085e45b000 - 
000000085e45bfff
[  441.739302] kdump-tools[7548]: get_memory_ranges:-      000000085e45c000 - 
000000085ff9ffff
[  441.739376] kdump-tools[7548]: get_memory_ranges:+[23] 000000085fff0000 - 
000000085fffffff
[  441.739453] kdump-tools[7548]: get_memory_ranges:-      000000085fff0000 - 
000000085fffffff
[  441.739548] kdump-tools[7548]: System RAM ranges;
[  441.739636] kdump-tools[7548]: 0000000082000000-0000000087ffffff (0)
[  441.739728] kdump-tools[7548]: 0000000088002000-00000000b8ffffff (0)
[  441.739809] kdump-tools[7548]: 00000000bd000000-00000000fcffffff (0)
[  441.739878] kdump-tools[7548]: 00000000ff000000-00000000fffdffff (0)
[  441.739964] kdump-tools[7548]: 0000000100000000-00000001001e9fff (0)
[  441.740078] kdump-tools[7548]: 00000001001eb000-000000010021ffff (0)
[  441.740166] kdump-tools[7548]: 0000000100330000-0000000276d4ffff (0)
[  441.740239] kdump-tools[7548]: 00000002776b0000-000000082f3fffff (0)
[  441.740312] kdump-tools[7548]: 000000084ec00000-000000084ed4ffff (0)
[  441.740429] kdump-tools[7548]: 000000084ed51000-0000000851d2ffff (0)
[  441.740591] kdump-tools[7548]: 0000000851d40000-000000085214afff (0)
[  441.740701] kdump-tools[7548]: 0000000854ee7000-00000008570bffff (0)
[  441.740778] kdump-tools[7548]: 000000085a0d0000-000000085a1affff (0)
[  441.740854] kdump-tools[7548]: 000000085a2a0000-000000085a2abfff (0)
[  441.740945] kdump-tools[7548]: 000000085a2ad000-000000085a49afff (0)
[  441.741026] kdump-tools[7548]: 000000085a4f7000-000000085a4fffff (0)
[  441.741111] kdump-tools[7548]: 000000085a640000-000000085a79ffff (0)
[  441.741191] kdump-tools[7548]: 000000085a7c0000-000000085a7cffff (0)
[  441.741274] kdump-tools[7548]: 000000085a910000-000000085a92ffff (0)
[  441.741370] kdump-tools[7548]: 000000085a9d1000-000000085aa0ffff (0)
[  441.741462] kdump-tools[7548]: 000000085acc0000-000000085ad8ffff (0)
[  441.741550] kdump-tools[7548]: 000000085af80000-000000085bde3fff (0)
[  441.741626] kdump-tools[7548]: 000000085c084000-000000085c085fff (0)
[  441.741711] kdump-tools[7548]: elf_arm64_probe: Not an ELF executable.
[  441.741802] kdump-tools[7548]: image_arm64_load: kernel_segment: 
00000000bd000000
[  441.741882] kdump-tools[7548]: image_arm64_load: text_offset:    
0000000000000000
[  441.741960] kdump-tools[7548]: image_arm64_load: image_size:     
0000000002dd0000
[  441.742038] kdump-tools[7548]: image_arm64_load: phys_offset:    
0000000080000000
[  441.742114] kdump-tools[7548]: image_arm64_load: vp_offset:      
ffffffffffffffff
[  441.742187] kdump-tools[7548]: image_arm64_load: PE format:      yes
[  441.742275] kdump-tools[7548]: Reserved memory range
[  441.742359] kdump-tools[7548]: 00000000bd000000-00000000fcffffff (0)
[  441.742432] kdump-tools[7548]: Coredump memory ranges
[  441.742521] kdump-tools[7548]: 0000000082000000-0000000087ffffff (0)
[  441.742598] kdump-tools[7548]: 0000000088002000-00000000bcffffff (0)
[  441.742671] kdump-tools[7548]: 00000000fd000000-00000000fffdffff (0)
[  441.742743] kdump-tools[7548]: 0000000100000000-000000085a0bffff (0)
[  441.742821] kdump-tools[7548]: 000000085a0d0000-000000085a1affff (0)
[  441.742895] kdump-tools[7548]: 000000085a2a0000-000000085a49afff (0)
[  441.742969] kdump-tools[7548]: 000000085a4f7000-000000085a4fffff (0)
[  441.743063] kdump-tools[7548]: 000000085a640000-000000085a79ffff (0)
[  441.743148] kdump-tools[7548]: 000000085a7c0000-000000085a7cffff (0)
[  441.743221] kdump-tools[7548]: 000000085a910000-000000085a92ffff (0)
[  441.743292] kdump-tools[7548]: 000000085a9d0000-000000085aa0ffff (0)
[  441.743377] kdump-tools[7548]: 000000085acc0000-000000085ad9ffff (0)
[  441.743454] kdump-tools[7548]: 000000085af80000-000000085ff9ffff (0)
[  441.743527] kdump-tools[7548]: 000000085fff0000-000000085fffffff (0)
[  441.743599] kdump-tools[7548]: kernel symbol _text vaddr = ffffb3ec4e890000
[  441.743671] kdump-tools[7548]: load_crashdump_segments: page_offset:   
ffffc00000000000
[  441.743783] kdump-tools[7548]: get_crash_notes_per_cpu: crash_notes addr = 
85bebe200, size = 424
[  441.743886] kdump-tools[7548]: Elf header: p_type = 4, p_offset = 
0x85bebe200 p_paddr = 0x85bebe200 p_vaddr = 0x0 p_filesz 8
[  441.743976] kdump-tools[7548]: get_crash_notes_per_cpu: crash_notes addr = 
85bedc200, size = 424
[  441.744079] kdump-tools[7548]: Elf header: p_type = 4, p_offset = 
0x85bedc200 p_paddr = 0x85bedc200 p_vaddr = 0x0 p_filesz 8
[  441.744163] kdump-tools[7548]: get_crash_notes_per_cpu: crash_notes addr = 
85befa200, size = 424
[  441.744295] kdump-tools[7548]: Elf header: p_type = 4, p_offset = 
0x85befa200 p_paddr = 0x85befa200 p_vaddr = 0x0 p_filesz 8
[  441.744397] kdump-tools[7548]: get_crash_notes_per_cpu: crash_notes addr = 
85bf18200, size = 424
[  441.744525] kdump-tools[7548]: Elf header: p_type = 4, p_offset = 
0x85bf18200 p_paddr = 0x85bf18200 p_vaddr = 0x0 p_filesz 8
[  441.744633] kdump-tools[7548]: get_crash_notes_per_cpu: crash_notes addr = 
85bf36200, size = 424
[  441.744725] kdump-tools[7548]: Elf header: p_type = 4, p_offset = 
0x85bf36200 p_paddr = 0x85bf36200 p_vaddr = 0x0 p_filesz 8
[  441.744830] kdump-tools[7548]: get_crash_notes_per_cpu: crash_notes addr = 
85bf54200, size = 424
[  441.744915] kdump-tools[7548]: Elf header: p_type = 4, p_offset = 
0x85bf54200 p_paddr = 0x85bf54200 p_vaddr = 0x0 p_filesz 8
[  441.744990] kdump-tools[7548]: get_crash_notes_per_cpu: crash_notes addr = 
85bf72200, size = 424
[  441.745063] kdump-tools[7548]: Elf header: p_type = 4, p_offset = 
0x85bf72200 p_paddr = 0x85bf72200 p_vaddr = 0x0 p_filesz 8
[  441.745140] kdump-tools[7548]: get_crash_notes_per_cpu: crash_notes addr = 
85bf90200, size = 424
[  441.745214] kdump-tools[7548]: Elf header: p_type = 4, p_offset = 
0x85bf90200 p_paddr = 0x85bf90200 p_vaddr = 0x0 p_filesz 8
[  441.745301] kdump-tools[7548]: get_crash_notes_per_cpu: crash_notes addr = 
85bfae200, size = 424
[  441.745390] kdump-tools[7548]: Elf header: p_type = 4, p_offset = 
0x85bfae200 p_paddr = 0x85bfae200 p_vaddr = 0x0 p_filesz 8
[  441.745486] kdump-tools[7548]: get_crash_notes_per_cpu: crash_notes addr = 
85bfcc200, size = 424
[  441.745572] kdump-tools[7548]: Elf header: p_type = 4, p_offset = 
0x85bfcc200 p_paddr = 0x85bfcc200 p_vaddr = 0x0 p_filesz 8
[  441.745658] kdump-tools[7548]: get_crash_notes_per_cpu: crash_notes addr = 
85bfea200, size = 424
[  441.745737] kdump-tools[7548]: Elf header: p_type = 4, p_offset = 
0x85bfea200 p_paddr = 0x85bfea200 p_vaddr = 0x0 p_filesz 8
[  441.745812] kdump-tools[7548]: get_crash_notes_per_cpu: crash_notes addr = 
85c008200, size = 424
[  441.745886] kdump-tools[7548]: Elf header: p_type = 4, p_offset = 
0x85c008200 p_paddr = 0x85c008200 p_vaddr = 0x0 p_filesz 8
[  441.745971] kdump-tools[7548]: get_crash_notes_per_cpu: crash_notes addr = 
85c026200, size = 424
[  441.746062] kdump-tools[7548]: Elf header: p_type = 4, p_offset = 
0x85c026200 p_paddr = 0x85c026200 p_vaddr = 0x0 p_filesz 8
[  441.746141] kdump-tools[7548]: get_crash_notes_per_cpu: crash_notes addr = 
85c044200, size = 424
[  441.746263] kdump-tools[7548]: Elf header: p_type = 4, p_offset = 
0x85c044200 p_paddr = 0x85c044200 p_vaddr = 0x0 p_filesz 8
[  441.746387] kdump-tools[7548]: get_crash_notes_per_cpu: crash_notes addr = 
85c062200, size = 424
[  441.746481] kdump-tools[7548]: Elf header: p_type = 4, p_offset = 
0x85c062200 p_paddr = 0x85c062200 p_vaddr = 0x0 p_filesz 8
[  441.746578] kdump-tools[7548]: get_crash_notes_per_cpu: crash_notes addr = 
85c080200, size = 424
[  441.746670] kdump-tools[7548]: Elf header: p_type = 4, p_offset = 
0x85c080200 p_paddr = 0x85c080200 p_vaddr = 0x0 p_filesz 8
[  441.746754] kdump-tools[7548]: vmcoreinfo header: p_type = 4, p_offset = 
0x1003da000 p_paddr = 0x1003da000 p_vaddr = 0x0 p_4
[  441.746833] kdump-tools[7548]: Kernel text Elf header: p_type = 1, p_offset 
= 0x274ea0000 p_paddr = 0x274ea0000 p_vaddr = 00
[  441.746924] kdump-tools[7548]: Elf header: p_type = 1, p_offset = 0x82000000 
p_paddr = 0x82000000 p_vaddr = 0xffffc000020000
[  441.747008] kdump-tools[7548]: Elf header: p_type = 1, p_offset = 0x88002000 
p_paddr = 0x88002000 p_vaddr = 0xffffc000080020
[  441.747086] kdump-tools[7548]: Elf header: p_type = 1, p_offset = 0xfd000000 
p_paddr = 0xfd000000 p_vaddr = 0xffffc0007d0000
[  441.747176] kdump-tools[7548]: Elf header: p_type = 1, p_offset = 
0x100000000 p_paddr = 0x100000000 p_vaddr = 0xffffc0008000
[  441.747277] kdump-tools[7548]: Elf header: p_type = 1, p_offset = 
0x85a0d0000 p_paddr = 0x85a0d0000 p_vaddr = 0xffffc007da00
[  441.747382] kdump-tools[7548]: Elf header: p_type = 1, p_offset = 
0x85a2a0000 p_paddr = 0x85a2a0000 p_vaddr = 0xffffc007da20
[  441.747471] kdump-tools[7548]: Elf header: p_type = 1, p_offset = 
0x85a4f7000 p_paddr = 0x85a4f7000 p_vaddr = 0xffffc007da40
[  441.747552] kdump-tools[7548]: Elf header: p_type = 1, p_offset = 
0x85a640000 p_paddr = 0x85a640000 p_vaddr = 0xffffc007da60
[  441.747632] kdump-tools[7548]: Elf header: p_type = 1, p_offset = 
0x85a7c0000 p_paddr = 0x85a7c0000 p_vaddr = 0xffffc007da70
[  441.747801] kdump-tools[7548]: Elf header: p_type = 1, p_offset = 
0x85a910000 p_paddr = 0x85a910000 p_vaddr = 0xffffc007da90
[  441.747921] kdump-tools[7548]: Elf header: p_type = 1, p_offset = 
0x85a9d0000 p_paddr = 0x85a9d0000 p_vaddr = 0xffffc007da90
[  441.748042] kdump-tools[7548]: Elf header: p_type = 1, p_offset = 
0x85acc0000 p_paddr = 0x85acc0000 p_vaddr = 0xffffc007dac0
[  441.748147] kdump-tools[7548]: Elf header: p_type = 1, p_offset = 
0x85af80000 p_paddr = 0x85af80000 p_vaddr = 0xffffc007daf0
[  441.748230] kdump-tools[7548]: Elf header: p_type = 1, p_offset = 
0x85fff0000 p_paddr = 0x85fff0000 p_vaddr = 0xffffc007dff0
[  441.748342] kdump-tools[7548]: load_crashdump_segments: elfcorehdr 
0xfcfff000-0xfcfff7ff
[  441.748439] kdump-tools[7548]: arm64_load_other_segments:741: purgatory 
sink: 0x0
[  441.748529] kdump-tools[7548]: read_1st_dtb: found /sys/firmware/fdt
[  441.748614] kdump-tools[7548]: get_cells_size: #address-cells:2 #size-cells:2
[  441.748698] kdump-tools[7548]: cells_size_fitted: fcfff000-fcfff7ff
[  441.748777] kdump-tools[7548]: cells_size_fitted: bd000000-fcffffff
[  441.748851] kdump-tools[7548]: initrd: base bfdd0000, size 1905028h 
(26234920)
[  441.748935] kdump-tools[7548]: dtb_set_initrd: start 3218931712, end 
3245166632, size 26234920 (25620 KiB)
[  441.749020] kdump-tools[7548]: dtb:    base c16d6000, size 36bh (875)
[  441.749107] kdump-tools[7548]: sym: sha256_starts info: 12 other: 00 shndx: 
1 value: f60 size: 50
[  441.749185] kdump-tools[7548]: sym: sha256_starts value: c16d7f60 addr: 
c16d7014
[  441.749280] kdump-tools[7548]: machine_apply_elf_rel: CALL26 
9000000094000000->90000000940003d3
[  441.749363] kdump-tools[7548]: sym:      .text info: 03 other: 00 shndx: 1 
value: 0 size: 0
[  441.749448] kdump-tools[7548]: sym: .text value: c16d70f8 addr: c16d7018
[  441.749546] kdump-tools[7548]: machine_apply_elf_rel: ADR_PREL_PG_HI21 
f940001390000000->f940001390000000
[  441.749633] kdump-tools[7548]: sym:      .text info: 03 other: 00 shndx: 1 
value: 0 size: 0
[  441.749710] kdump-tools[7548]: sym: .text value: c16d70f8 addr: c16d701c
[  441.749803] kdump-tools[7548]: machine_apply_elf_rel: LDST64_ABS_LO12_NC 
aa1303f5f9400013->aa1303f5f9407c13
[  441.749896] kdump-tools[7548]: sym: sha256_update info: 12 other: 00 shndx: 
1 value: 2eb0 size: c
[  441.749973] kdump-tools[7548]: sym: sha256_update value: c16d9eb0 addr: 
c16d7034
[  441.750048] kdump-tools[7548]: machine_apply_elf_rel: CALL26 
eb14027f94000000->eb14027f94000b9f
[  441.750140] kdump-tools[7548]: sym: sha256_finish info: 12 other: 00 shndx: 
1 value: 2ec0 size: 194
[  441.750232] kdump-tools[7548]: sym: sha256_finish value: c16d9ec0 addr: 
c16d704c
[  441.750321] kdump-tools[7548]: machine_apply_elf_rel: CALL26 
aa1303e194000000->aa1303e194000b9d
[  441.750467] kdump-tools[7548]: sym:     memcmp info: 12 other: 00 shndx: 1 
value: 64c size: 34
[  441.750573] kdump-tools[7548]: sym: memcmp value: c16d764c addr: c16d705c
[  441.750666] kdump-tools[7548]: machine_apply_elf_rel: CALL26 
3400042094000000->340004209400017c
[  441.750750] kdump-tools[7548]: sym:      .text info: 03 other: 00 shndx: 1 
value: 0 size: 0
[  441.750829] kdump-tools[7548]: sym: .text value: c16d7100 addr: c16d7064
[  441.750897] kdump-tools[7548]: machine_apply_elf_rel: ADR_PREL_PG_HI21 
9000001490000000->9000001490000000
[  441.750966] kdump-tools[7548]: sym:      .text info: 03 other: 00 shndx: 1 
value: 0 size: 0
[  441.751056] kdump-tools[7548]: sym: .text value: c16d7110 addr: c16d7068
[  441.751159] kdump-tools[7548]: machine_apply_elf_rel: ADR_PREL_PG_HI21 
9100029490000014->9100029490000014
[  441.751243] kdump-tools[7548]: sym:      .text info: 03 other: 00 shndx: 1 
value: 0 size: 0
[  441.751316] kdump-tools[7548]: sym: .text value: c16d7110 addr: c16d706c
[  441.751391] kdump-tools[7548]: machine_apply_elf_rel: ADD_ABS_LO12_NC 
d280001391000294->d280001391044294
[  441.751477] kdump-tools[7548]: sym:      .text info: 03 other: 00 shndx: 1 
value: 0 size: 0
[  441.751556] kdump-tools[7548]: sym: .text value: c16d7100 addr: c16d7074
[  441.751633] kdump-tools[7548]: machine_apply_elf_rel: LDST64_ABS_LO12_NC 
94000000f9400000->94000000f9408000
[  441.751707] kdump-tools[7548]: sym:     printf info: 12 other: 00 shndx: 1 
value: 574 size: 78
[  441.751793] kdump-tools[7548]: sym: printf value: c16d7574 addr: c16d7078
[  441.751894] kdump-tools[7548]: machine_apply_elf_rel: CALL26 
9000000094000000->900000009400013f
[  441.751983] kdump-tools[7548]: sym:      .text info: 03 other: 00 shndx: 1 
value: 0 size: 0
[  441.752079] kdump-tools[7548]: sym: .text value: c16d7108 addr: c16d707c
[  441.752182] kdump-tools[7548]: machine_apply_elf_rel: ADR_PREL_PG_HI21 
f940000090000000->f940000090000000
[  441.752288] kdump-tools[7548]: sym:      .text info: 03 other: 00 shndx: 1 
value: 0 size: 0
[  441.752377] kdump-tools[7548]: sym: .text value: c16d7108 addr: c16d7080
[  441.752458] kdump-tools[7548]: machine_apply_elf_rel: LDST64_ABS_LO12_NC 
94000000f9400000->94000000f9408400
[  441.752537] kdump-tools[7548]: sym:     printf info: 12 other: 00 shndx: 1 
value: 574 size: 78
[  441.752621] kdump-tools[7548]: sym: printf value: c16d7574 addr: c16d7084
[  441.752704] kdump-tools[7548]: machine_apply_elf_rel: CALL26 
38736ac194000000->38736ac19400013c
[  441.752784] kdump-tools[7548]: sym:     printf info: 12 other: 00 shndx: 1 
value: 574 size: 78
[  441.752883] kdump-tools[7548]: sym: printf value: c16d7574 addr: c16d7094
[  441.752983] kdump-tools[7548]: machine_apply_elf_rel: CALL26 
f100827f94000000->f100827f94000138
[  441.753067] kdump-tools[7548]: sym:      .text info: 03 other: 00 shndx: 1 
value: 0 size: 0
[  441.753144] kdump-tools[7548]: sym: .text value: c16d7118 addr: c16d70a0
[  441.753219] kdump-tools[7548]: machine_apply_elf_rel: ADR_PREL_PG_HI21 
910402b590000016->910402b590000016
[  441.753291] kdump-tools[7548]: sym:      .text info: 03 other: 00 shndx: 1 
value: 0 size: 0
[  441.753365] kdump-tools[7548]: sym: .text value: c16d7118 addr: c16d70ac
[  441.753509] kdump-tools[7548]: machine_apply_elf_rel: LDST64_ABS_LO12_NC 
94000000f94002c0->94000000f9408ec0
[  441.753637] kdump-tools[7548]: sym:     printf info: 12 other: 00 shndx: 1 
value: 574 size: 78
[  441.753731] kdump-tools[7548]: sym: printf value: c16d7574 addr: c16d70b0
[  441.753831] kdump-tools[7548]: machine_apply_elf_rel: CALL26 
9000000094000000->9000000094000131
[  441.753920] kdump-tools[7548]: sym:      .text info: 03 other: 00 shndx: 1 
value: 0 size: 0
[  441.753996] kdump-tools[7548]: sym: .text value: c16d7120 addr: c16d70b4
[  441.754072] kdump-tools[7548]: machine_apply_elf_rel: ADR_PREL_PG_HI21 
f940000090000000->f940000090000000
[  441.754143] kdump-tools[7548]: sym:      .text info: 03 other: 00 shndx: 1 
value: 0 size: 0
[  441.754217] kdump-tools[7548]: sym: .text value: c16d7120 addr: c16d70b8
[  441.754304] kdump-tools[7548]: machine_apply_elf_rel: LDST64_ABS_LO12_NC 
94000000f9400000->94000000f9409000
[  441.754391] kdump-tools[7548]: sym:     printf info: 12 other: 00 shndx: 1 
value: 574 size: 78
[  441.754474] kdump-tools[7548]: sym: printf value: c16d7574 addr: c16d70bc
[  441.754550] kdump-tools[7548]: machine_apply_elf_rel: CALL26 
38736aa194000000->38736aa19400012e
[  441.754642] kdump-tools[7548]: sym:     printf info: 12 other: 00 shndx: 1 
value: 574 size: 78
[  441.754726] kdump-tools[7548]: sym: printf value: c16d7574 addr: c16d70cc
[  441.754798] kdump-tools[7548]: machine_apply_elf_rel: CALL26 
f100827f94000000->f100827f9400012a
[  441.754873] kdump-tools[7548]: sym:      .text info: 03 other: 00 shndx: 1 
value: 0 size: 0
[  441.754949] kdump-tools[7548]: sym: .text value: c16d7118 addr: c16d70d8
[  441.755036] kdump-tools[7548]: machine_apply_elf_rel: LDST64_ABS_LO12_NC 
94000000f94002c0->94000000f9408ec0
[  441.755119] kdump-tools[7548]: sym:     printf info: 12 other: 00 shndx: 1 
value: 574 size: 78
[  441.755197] kdump-tools[7548]: sym: printf value: c16d7574 addr: c16d70dc
[  441.755282] kdump-tools[7548]: machine_apply_elf_rel: CALL26 
5280002094000000->5280002094000126
[  441.755395] kdump-tools[7548]: sym:      .data info: 03 other: 00 shndx: 6 
value: 0 size: 0
[  441.755502] kdump-tools[7548]: sym: .data value: c16da3c0 addr: c16d70f8
[  441.755593] kdump-tools[7548]: machine_apply_elf_rel: ABS64 
0000000000000000->00000000c16da3c0
[  441.755674] kdump-tools[7548]: sym: .rodata.str1.1 info: 03 other: 00 shndx: 
3 value: 0 size: 0
[  441.755767] kdump-tools[7548]: sym: .rodata.str1.1 value: c16da060 addr: 
c16d7100
[  441.755850] kdump-tools[7548]: machine_apply_elf_rel: ABS64 
0000000000000000->00000000c16da060
[  441.755931] kdump-tools[7548]: sym: .rodata.str1.1 info: 03 other: 00 shndx: 
3 value: 0 size: 0
[  441.756023] kdump-tools[7548]: sym: .rodata.str1.1 value: c16da080 addr: 
c16d7108
[  441.756108] kdump-tools[7548]: machine_apply_elf_rel: ABS64 
0000000000000000->00000000c16da080
[  441.756182] kdump-tools[7548]: sym: .rodata.str1.1 info: 03 other: 00 shndx: 
3 value: 0 size: 0
[  441.756287] kdump-tools[7548]: sym: .rodata.str1.1 value: c16da090 addr: 
c16d7110
[  441.756377] kdump-tools[7548]: machine_apply_elf_rel: ABS64 
0000000000000000->00000000c16da090
[  441.756525] kdump-tools[7548]: sym: .rodata.str1.1 info: 03 other: 00 shndx: 
3 value: 0 size: 0
[  441.756630] kdump-tools[7548]: sym: .rodata.str1.1 value: c16da096 addr: 
c16d7118
[  441.756709] kdump-tools[7548]: machine_apply_elf_rel: ABS64 
0000000000000000->00000000c16da096
[  441.756796] kdump-tools[7548]: sym: .rodata.str1.1 info: 03 other: 00 shndx: 
3 value: 0 size: 0
[  441.756880] kdump-tools[7548]: sym: .rodata.str1.1 value: c16da098 addr: 
c16d7120
[  441.756954] kdump-tools[7548]: machine_apply_elf_rel: ABS64 
0000000000000000->00000000c16da098
[  441.757028] kdump-tools[7548]: sym:      .text info: 03 other: 00 shndx: 1 
value: 0 size: 0
[  441.757102] kdump-tools[7548]: sym: .text value: c16d7168 addr: c16d712c
[  441.757301] kdump-tools[7548]: machine_apply_elf_rel: ADR_PREL_PG_HI21 
910003fd90000000->910003fd90000000
[  441.757449] kdump-tools[7548]: sym:      .text info: 03 other: 00 shndx: 1 
value: 0 size: 0
[  441.757543] kdump-tools[7548]: sym: .text value: c16d7168 addr: c16d7134
[  441.757628] kdump-tools[7548]: machine_apply_elf_rel: LDST64_ABS_LO12_NC 
94000000f9400000->94000000f940b400
[  441.757706] kdump-tools[7548]: sym:     printf info: 12 other: 00 shndx: 1 
value: 574 size: 78
[  441.757782] kdump-tools[7548]: sym: printf value: c16d7574 addr: c16d7138
[  441.757872] kdump-tools[7548]: machine_apply_elf_rel: CALL26 
9400000094000000->940000009400010f
[  441.757953] kdump-tools[7548]: sym: setup_arch info: 12 other: 00 shndx: 1 
value: f00 size: 3c
[  441.758032] kdump-tools[7548]: sym: setup_arch value: c16d7f00 addr: c16d713c
[  441.758123] kdump-tools[7548]: machine_apply_elf_rel: CALL26 
9000000094000000->9000000094000371
[  441.758226] kdump-tools[7548]: sym:      .text info: 03 other: 00 shndx: 1 
value: 0 size: 0
[  441.758322] kdump-tools[7548]: sym: .text value: c16d7170 addr: c16d7140
[  441.758408] kdump-tools[7548]: machine_apply_elf_rel: ADR_PREL_PG_HI21 
f940000090000000->f940000090000000
[  441.758487] kdump-tools[7548]: sym:      .text info: 03 other: 00 shndx: 1 
value: 0 size: 0
[  441.758563] kdump-tools[7548]: sym: .text value: c16d7170 addr: c16d7144
[  441.758659] kdump-tools[7548]: machine_apply_elf_rel: LDST64_ABS_LO12_NC 
b9412000f9400000->b9412000f940b800
[  441.758747] kdump-tools[7548]: sym: verify_sha256_digest info: 12 other: 00 
shndx: 1 value: 0 size: f4
[  441.758836] kdump-tools[7548]: sym: verify_sha256_digest value: c16d7000 
addr: c16d7150
[  441.758916] kdump-tools[7548]: machine_apply_elf_rel: CALL26 
3400004094000000->3400004097ffffac
[  441.758990] kdump-tools[7548]: sym: post_verification_setup_arch info: 12 
other: 00 shndx: 1 value: ee8 size: c
[  441.759064] kdump-tools[7548]: sym: post_verification_setup_arch value: 
c16d7ee8 addr: c16d7160
[  441.759155] kdump-tools[7548]: machine_apply_elf_rel: JUMP26 
d503201f14000000->d503201f14000362
[  441.759238] kdump-tools[7548]: sym: .rodata.str1.1 info: 03 other: 00 shndx: 
3 value: 0 size: 0
[  441.759314] kdump-tools[7548]: sym: .rodata.str1.1 value: c16da0a8 addr: 
c16d7168
[  441.759400] kdump-tools[7548]: machine_apply_elf_rel: ABS64 
0000000000000000->00000000c16da0a8
[  441.759552] kdump-tools[7548]: sym:      .data info: 03 other: 00 shndx: 6 
value: 0 size: 0
[  441.759664] kdump-tools[7548]: sym: .data value: c16da3c0 addr: c16d7170
[  441.759745] kdump-tools[7548]: machine_apply_elf_rel: ABS64 
0000000000000000->00000000c16da3c0
[  441.759820] kdump-tools[7548]: sym:      .text info: 03 other: 00 shndx: 1 
value: 0 size: 0
[  441.759896] kdump-tools[7548]: sym: .text value: c16d7500 addr: c16d71ac
[  441.759969] kdump-tools[7548]: machine_apply_elf_rel: ADR_PREL_PG_HI21 
394002c090000019->394002c090000019
[  441.760097] kdump-tools[7548]: sym:    putchar info: 12 other: 00 shndx: 1 
value: eb0 size: 2c
[  441.760210] kdump-tools[7548]: sym: putchar value: c16d7eb0 addr: c16d71fc
[  441.760301] kdump-tools[7548]: machine_apply_elf_rel: CALL26 
17fffffb94000000->17fffffb9400032d
[  441.760383] kdump-tools[7548]: sym:    putchar info: 12 other: 00 shndx: 1 
value: eb0 size: 2c
[  441.760457] kdump-tools[7548]: sym: putchar value: c16d7eb0 addr: c16d7268
[  441.760530] kdump-tools[7548]: machine_apply_elf_rel: CALL26 
17fffffd94000000->17fffffd94000312
[  441.760602] kdump-tools[7548]: sym:      .text info: 03 other: 00 shndx: 1 
value: 0 size: 0
[  441.760678] kdump-tools[7548]: sym: .text value: c16d7500 addr: c16d72c4
[  441.760752] kdump-tools[7548]: machine_apply_elf_rel: LDST64_ABS_LO12_NC 
9ac224a4f9400326->9ac224a4f9428326
[  441.760825] kdump-tools[7548]: sym:    putchar info: 12 other: 00 shndx: 1 
value: eb0 size: 2c
[  441.760919] kdump-tools[7548]: sym: putchar value: c16d7eb0 addr: c16d74f4
[  441.761013] kdump-tools[7548]: machine_apply_elf_rel: CALL26 
17fffffd94000000->17fffffd9400026f
[  441.761091] kdump-tools[7548]: sym: .rodata.str1.1 info: 03 other: 00 shndx: 
3 value: 0 size: 0
[  441.761174] kdump-tools[7548]: sym: .rodata.str1.1 value: c16da0ba addr: 
c16d7500
[  441.761249] kdump-tools[7548]: machine_apply_elf_rel: ABS64 
0000000000000000->00000000c16da0ba
[  441.761319] kdump-tools[7548]: sym:   vsprintf info: 12 other: 00 shndx: 1 
value: 178 size: 384
[  441.761404] kdump-tools[7548]: sym: vsprintf value: c16d7178 addr: c16d7568
[  441.761485] kdump-tools[7548]: machine_apply_elf_rel: CALL26 
a8d07bfd94000000->a8d07bfd97ffff04
[  441.761570] kdump-tools[7548]: sym:   vsprintf info: 12 other: 00 shndx: 1 
value: 178 size: 384
[  441.761653] kdump-tools[7548]: sym: vsprintf value: c16d7178 addr: c16d75e0
[  441.761747] kdump-tools[7548]: machine_apply_elf_rel: CALL26 
a8d17bfd94000000->a8d17bfd97fffee6
[  441.761833] kdump-tools[7548]: sym:  purgatory info: 12 other: 00 shndx: 1 
value: 128 size: 3c
[  441.761912] kdump-tools[7548]: sym: purgatory value: c16d7128 addr: c16d7688
[  441.761998] kdump-tools[7548]: machine_apply_elf_rel: CALL26 
5800001194000000->5800001197fffea8
[  441.762076] kdump-tools[7548]: sym: arm64_kernel_entry info: 10 other: 00 
shndx: 6 value: 128 size: 8
[  441.762159] kdump-tools[7548]: sym: arm64_kernel_entry value: c16da4e8 addr: 
c16d768c
[  441.762248] kdump-tools[7548]: machine_apply_elf_rel: LD_PREL_LO19 
5800000058000011->58000000580172f1
[  441.762329] kdump-tools[7548]: sym: arm64_dtb_addr info: 10 other: 00 shndx: 
6 value: 130 size: 8
[  441.762459] kdump-tools[7548]: sym: arm64_dtb_addr value: c16da4f0 addr: 
c16d7690
[  441.762563] kdump-tools[7548]: machine_apply_elf_rel: LD_PREL_LO19 
aa1f03e158000000->aa1f03e158017300
[  441.762656] kdump-tools[7548]: sym:      .text info: 03 other: 00 shndx: 1 
value: 0 size: 0
[  441.762756] kdump-tools[7548]: sym: .text value: c16d7ee0 addr: c16d7eb0
[  441.762840] kdump-tools[7548]: machine_apply_elf_rel: ADR_PREL_PG_HI21 
f940002190000001->f940002190000001
[  441.762919] kdump-tools[7548]: sym:      .text info: 03 other: 00 shndx: 1 
value: 0 size: 0
[  441.762993] kdump-tools[7548]: sym: .text value: c16d7ee0 addr: c16d7eb4
[  441.763075] kdump-tools[7548]: machine_apply_elf_rel: LDST64_ABS_LO12_NC 
f9400022f9400021->f9400022f9477021
[  441.763154] kdump-tools[7548]: sym:       data info: 03 other: 00 shndx: 7 
value: 0 size: 0
[  441.763228] kdump-tools[7548]: sym: data value: c16da538 addr: c16d7ee0
[  441.763302] kdump-tools[7548]: machine_apply_elf_rel: ABS64 
0000000000000000->00000000c16da538
[  441.763385] kdump-tools[7548]: sym:      .text info: 03 other: 00 shndx: 1 
value: 0 size: 0
[  441.763465] kdump-tools[7548]: sym: .text value: c16d7ef8 addr: c16d7ee8
[  441.763562] kdump-tools[7548]: machine_apply_elf_rel: ADR_PREL_PG_HI21 
f940000090000000->f940000090000000
[  441.763649] kdump-tools[7548]: sym:      .text info: 03 other: 00 shndx: 1 
value: 0 size: 0
[  441.763724] kdump-tools[7548]: sym: .text value: c16d7ef8 addr: c16d7eec
[  441.763808] kdump-tools[7548]: machine_apply_elf_rel: LDST64_ABS_LO12_NC 
14000000f9400000->14000000f9477c00
[  441.763896] kdump-tools[7548]: sym:     printf info: 12 other: 00 shndx: 1 
value: 574 size: 78
[  441.763975] kdump-tools[7548]: sym: printf value: c16d7574 addr: c16d7ef0
[  441.764225] kdump-tools[7548]: machine_apply_elf_rel: JUMP26 
d503201f14000000->d503201f17fffda1
[  441.764355] kdump-tools[7548]: sym: .rodata.str1.1 info: 03 other: 00 shndx: 
3 value: 0 size: 0
[  441.764453] kdump-tools[7548]: sym: .rodata.str1.1 value: c16da0cb addr: 
c16d7ef8
[  441.764540] kdump-tools[7548]: machine_apply_elf_rel: ABS64 
0000000000000000->00000000c16da0cb
[  441.764647] kdump-tools[7548]: sym:      .text info: 03 other: 00 shndx: 1 
value: 0 size: 0
[  441.764741] kdump-tools[7548]: sym: .text value: c16d7f40 addr: c16d7f04
[  441.764822] kdump-tools[7548]: machine_apply_elf_rel: ADR_PREL_PG_HI21 
910003fd90000000->910003fd90000000
[  441.764901] kdump-tools[7548]: sym:      .text info: 03 other: 00 shndx: 1 
value: 0 size: 0
[  441.764977] kdump-tools[7548]: sym: .text value: c16d7f40 addr: c16d7f0c
[  441.765050] kdump-tools[7548]: machine_apply_elf_rel: LDST64_ABS_LO12_NC 
f9400001f9400000->f9400001f947a000
[  441.765126] kdump-tools[7548]: sym:      .text info: 03 other: 00 shndx: 1 
value: 0 size: 0
[  441.765203] kdump-tools[7548]: sym: .text value: c16d7f48 addr: c16d7f14
[  441.765292] kdump-tools[7548]: machine_apply_elf_rel: ADR_PREL_PG_HI21 
f940000090000000->f940000090000000
[  441.765394] kdump-tools[7548]: sym:      .text info: 03 other: 00 shndx: 1 
value: 0 size: 0
[  441.765497] kdump-tools[7548]: sym: .text value: c16d7f48 addr: c16d7f18
[  441.765658] kdump-tools[7548]: machine_apply_elf_rel: LDST64_ABS_LO12_NC 
94000000f9400000->94000000f947a400
[  441.765770] kdump-tools[7548]: sym:     printf info: 12 other: 00 shndx: 1 
value: 574 size: 78
[  441.765877] kdump-tools[7548]: sym: printf value: c16d7574 addr: c16d7f1c
[  441.765974] kdump-tools[7548]: machine_apply_elf_rel: CALL26 
9000000094000000->9000000097fffd96
[  441.766065] kdump-tools[7548]: sym:      .text info: 03 other: 00 shndx: 1 
value: 0 size: 0
[  441.766145] kdump-tools[7548]: sym: .text value: c16d7f50 addr: c16d7f20
[  441.766221] kdump-tools[7548]: machine_apply_elf_rel: ADR_PREL_PG_HI21 
a8c17bfd90000000->a8c17bfd90000000
[  441.766294] kdump-tools[7548]: sym:      .text info: 03 other: 00 shndx: 1 
value: 0 size: 0
[  441.766385] kdump-tools[7548]: sym: .text value: c16d7f50 addr: c16d7f28
[  441.766470] kdump-tools[7548]: machine_apply_elf_rel: LDST64_ABS_LO12_NC 
f9400001f9400000->f9400001f947a800
[  441.766553] kdump-tools[7548]: sym:      .text info: 03 other: 00 shndx: 1 
value: 0 size: 0
[  441.766644] kdump-tools[7548]: sym: .text value: c16d7f58 addr: c16d7f30
[  441.766722] kdump-tools[7548]: machine_apply_elf_rel: ADR_PREL_PG_HI21 
f940000090000000->f940000090000000
[  441.766796] kdump-tools[7548]: sym:      .text info: 03 other: 00 shndx: 1 
value: 0 size: 0
[  441.766869] kdump-tools[7548]: sym: .text value: c16d7f58 addr: c16d7f34
[  441.766952] kdump-tools[7548]: machine_apply_elf_rel: LDST64_ABS_LO12_NC 
14000000f9400000->14000000f947ac00
[  441.767031] kdump-tools[7548]: sym:     printf info: 12 other: 00 shndx: 1 
value: 574 size: 78
[  441.767105] kdump-tools[7548]: sym: printf value: c16d7574 addr: c16d7f38
[  441.767194] kdump-tools[7548]: machine_apply_elf_rel: JUMP26 
d503201f14000000->d503201f17fffd8f
[  441.767286] kdump-tools[7548]: sym: arm64_kernel_entry info: 10 other: 00 
shndx: 6 value: 128 size: 8
[  441.767368] kdump-tools[7548]: sym: arm64_kernel_entry value: c16da4e8 addr: 
c16d7f40
[  441.767444] kdump-tools[7548]: machine_apply_elf_rel: ABS64 
0000000000000000->00000000c16da4e8
[  441.767525] kdump-tools[7548]: sym: .rodata.str1.1 info: 03 other: 00 shndx: 
3 value: 0 size: 0
[  441.767615] kdump-tools[7548]: sym: .rodata.str1.1 value: c16da0ea addr: 
c16d7f48
[  441.767707] kdump-tools[7548]: machine_apply_elf_rel: ABS64 
0000000000000000->00000000c16da0ea
[  441.767798] kdump-tools[7548]: sym: arm64_dtb_addr info: 10 other: 00 shndx: 
6 value: 130 size: 8
[  441.767885] kdump-tools[7548]: sym: arm64_dtb_addr value: c16da4f0 addr: 
c16d7f50
[  441.767968] kdump-tools[7548]: machine_apply_elf_rel: ABS64 
0000000000000000->00000000c16da4f0
[  441.768067] kdump-tools[7548]: sym: .rodata.str1.1 info: 03 other: 00 shndx: 
3 value: 0 size: 0
[  441.768153] kdump-tools[7548]: sym: .rodata.str1.1 value: c16da100 addr: 
c16d7f58
[  441.768232] kdump-tools[7548]: machine_apply_elf_rel: ABS64 
0000000000000000->00000000c16da100
[  441.768306] kdump-tools[7548]: sym: sha256_process info: 12 other: 00 shndx: 
1 value: fb0 size: 1df4
[  441.768414] kdump-tools[7548]: sym: sha256_process value: c16d7fb0 addr: 
c16d9e24
[  441.768516] kdump-tools[7548]: machine_apply_elf_rel: CALL26 
eb15027f94000000->eb15027f97fff863
[  441.768673] kdump-tools[7548]: sym:     memcpy info: 12 other: 00 shndx: 1 
value: 62c size: 20
[  441.768804] kdump-tools[7548]: sym: memcpy value: c16d762c addr: c16d9e60
[  441.768897] kdump-tools[7548]: machine_apply_elf_rel: CALL26 
aa1803e194000000->aa1803e197fff5f3
[  441.768979] kdump-tools[7548]: sym: sha256_process info: 12 other: 00 shndx: 
1 value: fb0 size: 1df4
[  441.769055] kdump-tools[7548]: sym: sha256_process value: c16d7fb0 addr: 
c16d9e70
[  441.769128] kdump-tools[7548]: machine_apply_elf_rel: CALL26 
8b15027394000000->8b15027397fff850
[  441.769205] kdump-tools[7548]: sym:     memcpy info: 12 other: 00 shndx: 1 
value: 62c size: 20
[  441.769277] kdump-tools[7548]: sym: memcpy value: c16d762c addr: c16d9eac
[  441.769365] kdump-tools[7548]: machine_apply_elf_rel: JUMP26 
b400004214000000->b400004217fff5e0
[  441.769464] kdump-tools[7548]: sym:      .text info: 03 other: 00 shndx: 1 
value: 0 size: 0
[  441.769567] kdump-tools[7548]: sym: .text value: c16da058 addr: c16d9ec4
[  441.769648] kdump-tools[7548]: machine_apply_elf_rel: ADR_PREL_PG_HI21 
5280070590000002->52800705b0000002
[  441.769728] kdump-tools[7548]: sym:      .text info: 03 other: 00 shndx: 1 
value: 0 size: 0
[  441.769801] kdump-tools[7548]: sym: .text value: c16da058 addr: c16d9edc
[  441.769874] kdump-tools[7548]: machine_apply_elf_rel: LDST64_ABS_LO12_NC 
aa0003f3f9400041->aa0003f3f9402c41
[  441.769950] kdump-tools[7548]: sym:      .data info: 03 other: 00 shndx: 6 
value: 0 size: 0
[  441.770022] kdump-tools[7548]: sym: .data value: c16da4f8 addr: c16da058
[  441.770113] kdump-tools[7548]: machine_apply_elf_rel: ABS64 
0000000000000000->00000000c16da4f8
[  441.770193] kdump-tools[7548]: sym:      .text info: 03 other: 00 shndx: 1 
value: 0 size: 0
[  441.770271] kdump-tools[7548]: sym: .text value: c16d7000 addr: c16da134
[  441.770369] kdump-tools[7548]: machine_apply_elf_rel: PREL32 
000000f400000000->000000f4ffffcecc
[  441.770454] kdump-tools[7548]: sym:      .text info: 03 other: 00 shndx: 1 
value: 0 size: 0
[  441.770532] kdump-tools[7548]: sym: .text value: c16d7128 addr: c16da160
[  441.770609] kdump-tools[7548]: machine_apply_elf_rel: PREL32 
0000003c00000000->0000003cffffcfc8
[  441.770686] kdump-tools[7548]: sym:      .text info: 03 other: 00 shndx: 1 
value: 0 size: 0
[  441.770761] kdump-tools[7548]: sym: .text value: c16d7178 addr: c16da194
[  441.770854] kdump-tools[7548]: machine_apply_elf_rel: PREL32 
0000038400000000->00000384ffffcfe4
[  441.770963] kdump-tools[7548]: sym:      .text info: 03 other: 00 shndx: 1 
value: 0 size: 0
[  441.771055] kdump-tools[7548]: sym: .text value: c16d7508 addr: c16da1d8
[  441.771134] kdump-tools[7548]: machine_apply_elf_rel: PREL32 
0000006c00000000->0000006cffffd330
[  441.771210] kdump-tools[7548]: sym:      .text info: 03 other: 00 shndx: 1 
value: 0 size: 0
[  441.771286] kdump-tools[7548]: sym: .text value: c16d7574 addr: c16da1f8
[  441.771362] kdump-tools[7548]: machine_apply_elf_rel: PREL32 
0000007800000000->00000078ffffd37c
[  441.771449] kdump-tools[7548]: sym:      .text info: 03 other: 00 shndx: 1 
value: 0 size: 0
[  441.771531] kdump-tools[7548]: sym: .text value: c16d75ec addr: c16da22c
[  441.771676] kdump-tools[7548]: machine_apply_elf_rel: PREL32 
0000002400000000->00000024ffffd3c0
[  441.771798] kdump-tools[7548]: sym:      .text info: 03 other: 00 shndx: 1 
value: 0 size: 0
[  441.771906] kdump-tools[7548]: sym: .text value: c16d7610 addr: c16da240
[  441.771994] kdump-tools[7548]: machine_apply_elf_rel: PREL32 
0000001c00000000->0000001cffffd3d0
[  441.772092] kdump-tools[7548]: sym:      .text info: 03 other: 00 shndx: 1 
value: 0 size: 0
[  441.772175] kdump-tools[7548]: sym: .text value: c16d762c addr: c16da254
[  441.772276] kdump-tools[7548]: machine_apply_elf_rel: PREL32 
0000002000000000->00000020ffffd3d8
[  441.772368] kdump-tools[7548]: sym:      .text info: 03 other: 00 shndx: 1 
value: 0 size: 0
[  441.772467] kdump-tools[7548]: sym: .text value: c16d764c addr: c16da268
[  441.772556] kdump-tools[7548]: machine_apply_elf_rel: PREL32 
0000003400000000->00000034ffffd3e4
[  441.772644] kdump-tools[7548]: sym:      .text info: 03 other: 00 shndx: 1 
value: 0 size: 0
[  441.772728] kdump-tools[7548]: sym: .text value: c16d7eb0 addr: c16da294
[  441.772822] kdump-tools[7548]: machine_apply_elf_rel: PREL32 
0000002c00000000->0000002cffffdc1c
[  441.772905] kdump-tools[7548]: sym:      .text info: 03 other: 00 shndx: 1 
value: 0 size: 0
[  441.772987] kdump-tools[7548]: sym: .text value: c16d7ee8 addr: c16da2a8
[  441.773075] kdump-tools[7548]: machine_apply_elf_rel: PREL32 
0000000c00000000->0000000cffffdc40
[  441.773160] kdump-tools[7548]: sym:      .text info: 03 other: 00 shndx: 1 
value: 0 size: 0
[  441.773238] kdump-tools[7548]: sym: .text value: c16d7f00 addr: c16da2bc
[  441.773312] kdump-tools[7548]: machine_apply_elf_rel: PREL32 
0000003c00000000->0000003cffffdc44
[  441.773399] kdump-tools[7548]: sym:      .text info: 03 other: 00 shndx: 1 
value: 0 size: 0
[  441.773482] kdump-tools[7548]: sym: .text value: c16d7f60 addr: c16da2f4
[  441.773560] kdump-tools[7548]: machine_apply_elf_rel: PREL32 
0000005000000000->00000050ffffdc6c
[  441.773646] kdump-tools[7548]: sym:      .text info: 03 other: 00 shndx: 1 
value: 0 size: 0
[  441.773744] kdump-tools[7548]: sym: .text value: c16d7fb0 addr: c16da308
[  441.773832] kdump-tools[7548]: machine_apply_elf_rel: PREL32 
00001df400000000->00001df4ffffdca8
[  441.773928] kdump-tools[7548]: sym:      .text info: 03 other: 00 shndx: 1 
value: 0 size: 0
[  441.774100] kdump-tools[7548]: sym: .text value: c16d9da4 addr: c16da34c
[  441.774220] kdump-tools[7548]: machine_apply_elf_rel: PREL32 
0000010c00000000->0000010cfffffa58
[  441.774319] kdump-tools[7548]: sym:      .text info: 03 other: 00 shndx: 1 
value: 0 size: 0
[  441.774412] kdump-tools[7548]: sym: .text value: c16d9eb0 addr: c16da38c
[  441.774514] kdump-tools[7548]: machine_apply_elf_rel: PREL32 
0000000c00000000->0000000cfffffb24
[  441.774615] kdump-tools[7548]: sym:      .text info: 03 other: 00 shndx: 1 
value: 0 size: 0
[  441.774703] kdump-tools[7548]: sym: .text value: c16d9ec0 addr: c16da3a0
[  441.774785] kdump-tools[7548]: machine_apply_elf_rel: PREL32 
0000019400000000->00000194fffffb20
[  442.039812] kdump-tools[7548]: kexec_load: entry = 0xc16d7680 flags = 
0xb70001
[  442.040109] kdump-tools[7548]: nr_segments = 5
[  442.040257] kdump-tools[7548]: segment[0].buf   = 0xffffa6946010
[  442.040373] kdump-tools[7548]: segment[0].bufsz = 0x2c9c198
[  442.040475] kdump-tools[7548]: segment[0].mem   = 0xbd000000
[  442.040576] kdump-tools[7548]: segment[0].memsz = 0x2dd0000
[  442.040662] kdump-tools[7548]: segment[1].buf   = 0xffffad02a010
[  442.040751] kdump-tools[7548]: segment[1].bufsz = 0x1905028
[  442.040826] kdump-tools[7548]: segment[1].mem   = 0xbfdd0000
[  442.040893] kdump-tools[7548]: segment[1].memsz = 0x1906000
[  442.040959] kdump-tools[7548]: segment[2].buf   = 0xaaab0b707730
[  442.041053] kdump-tools[7548]: segment[2].bufsz = 0x36b
[  442.041150] kdump-tools[7548]: segment[2].mem   = 0xc16d6000
[  442.041247] kdump-tools[7548]: segment[2].memsz = 0x1000
[  442.041338] kdump-tools[7548]: segment[3].buf   = 0xaaab0b708210
[  442.041435] kdump-tools[7548]: segment[3].bufsz = 0x3540
[  442.041526] kdump-tools[7548]: segment[3].mem   = 0xc16d7000
[  442.041611] kdump-tools[7548]: segment[3].memsz = 0x4000
[  442.041684] kdump-tools[7548]: segment[4].buf   = 0xaaab0b705b60
[  442.041763] kdump-tools[7548]: segment[4].bufsz = 0x800
[  442.041852] kdump-tools[7548]: segment[4].mem   = 0xfcfff000
[  442.041941] kdump-tools[7548]: segment[4].memsz = 0x1000
[  442.067104] kdump-tools[7507]:  * loaded kdump kernel

** Summary changed:

- kdump cannot generate coredump file on bluefield with 5.4 kernel
+ kdump cannot generate coredump file on bluefield with 5.4  and 5.15 kernel

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-bluefield in Ubuntu.
https://bugs.launchpad.net/bugs/2021930

Title:
  kdump cannot generate coredump file on bluefield with 5.4  and 5.15
  kernel

Status in linux-bluefield package in Ubuntu:
  New

Bug description:
  kdump cannot generate coredump file on bluefield with 5.4 kernel

  Bug description:

  Following the instruction in 
https://ubuntu.com/server/docs/kernel-crash-dump, the coredump file cannot be 
generated.
        
  Bluefield is running 5.4 kernel
        bf2:~$ uname -a
        Linux sw-mtx-008-bf2 5.4.0-1060-bluefield #66-Ubuntu SMP PREEMPT Mon 
Mar 27 15:52:50 UTC 2023 aarch64 aarch64 aarch64 GNU/Linux
        
  crashkernel parameter is configured
        bf2:~$ cat /proc/cmdline
        BOOT_IMAGE=/boot/vmlinuz-5.4.0-1060-bluefield 
root=UUID=52ddbe2c-ee4f-48d4-b7d4-ab76e264e438 ro console=hvc0 console=ttyAMA0 
earlycon=pl011,0x01000000 fixrtc net.ifnames=0 biosdevname=0 
iommu.passthrough=1 
crashkernel=2G-4G:320M,4G-32G:512M,32G-64G:1024M,64G-128G:2048M,128G-:4096M
        bf2:~$ dmesg | grep -i crash
        [    0.000000] crashkernel reserved: 0x00000000cfe00000 - 
0x00000000efe00000 (512 MB)
        [    0.000000] Kernel command line: 
BOOT_IMAGE=/boot/vmlinuz-5.4.0-1060-bluefield 
root=UUID=52ddbe2c-ee4f-48d4-b7d4-ab76e264e438 ro console=hvc0 console=ttyAMA0 
earlycon=pl011,0x01000000 fixrtc net.ifnames=0 biosdevname=0 
iommu.passthrough=1 
crashkernel=2G-4G:320M,4G-32G:512M,32G-64G:1024M,64G-128G:2048M,128G-:4096M
        [    8.070921] pstore: Using crash dump compression: deflate
        
  kdump-config is as below:
        bf2:~$ kdump-config show
        DUMP_MODE:        kdump
        USE_KDUMP:        1
        KDUMP_SYSCTL:     kernel.panic_on_oops=1
        KDUMP_COREDIR:    /var/crash
        crashkernel addr: 0x
                /var/lib/kdump/vmlinuz: symbolic link to 
/boot/vmlinuz-5.4.0-1060-bluefield
        kdump initrd:
                /var/lib/kdump/initrd.img: symbolic link to 
/var/lib/kdump/initrd.img-5.4.0-1060-bluefield
        current state:    ready to kdump

        kexec command:
                /sbin/kexec -p 
--command-line="BOOT_IMAGE=/boot/vmlinuz-5.4.0-1060-bluefield 
root=UUID=52ddbe2c-ee4f-48d4-b7d4-ab76e264e438 ro console=hvc0 console=ttyAMA0 
earlycon=pl011,0x01000000 fixrtc net.ifnames=0 biosdevname=0 
iommu.passthrough=1 reset_devices systemd.unit=kdump-tools-dump.service 
nr_cpus=1" --initrd=/var/lib/kdump/initrd.img /var/lib/kdump/vmlinuz

  sysrq:
        bf2:/# cat /proc/sys/kernel/sysrq
        176

  After trigged the crash manually with "echo c > /proc/sysrq-trigger", the 
system could not come up because of OOM. And after change the crashkernel with 
1024M memory it still hangs.
        With default 512M, it hangs at "Killed process 674"
                [    8.718188] systemd-journald[368]: File 
/var/log/journal/8244d38b2f804fc692f3f2dbf8206f57/system.journal corrupted or 
uncleanly shut down, renaming and re.
                [   30.252513] Out of memory: Killed process 651 
(systemd-resolve) total-vm:24380kB, anon-rss:3812kB, file-rss:1828kB, 
shmem-rss:0kB, UID:101 pgtables:80kB o0
                ...
                [   34.651927] Out of memory: Killed process 674 (dbus-daemon) 
total-vm:7884kB, anon-rss:552kB, file-rss:1380kB, shmem-rss:0kB, UID:103 
pgtables:52kB oom_sco0
        With 1024M, it hangs at following
                [    8.733323] systemd-journald[369]: File 
/var/log/journal/8244d38b2f804fc692f3f2dbf8206f57/system.journal corrupted or 
uncleanly shut down, renaming and re.

  After soft reboot the Bluefield, there's no coredump file generated.
        bf2:~$ ls /var/crash/ -la
        total 52
        drwxrwxrwt  3 root   root    4096 May 31 01:43 .
        drwxr-xr-x 14 root   root    4096 Apr 30 11:26 ..
        drwxrwxr-x  2 ubuntu ubuntu  4096 May 31 01:43 202305310143
        -rw-r-----  1 root   root   34307 May 31 01:18 
_usr_share_netplan_netplan.script.0.crash
        -rw-r--r--  1 root   root       0 May 31 03:47 kdump_lock
        -rw-r--r--  1 root   root     358 May 31 03:48 kexec_cmd
        bf2:~$ ls /var/crash/202305310143/ -la
        total 8
        drwxrwxr-x 2 ubuntu ubuntu 4096 May 31 01:43 .
        drwxrwxrwt 3 root   root   4096 May 31 01:43 ..

  This issue also happens on 5.4.0-1049-bluefield kernel.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux-bluefield/+bug/2021930/+subscriptions


-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to     : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp

Reply via email to