$ cat /etc/issue
Ubuntu 16.10 \n \l

$ uname -a 
Linux myvm 4.8.0-54-generic #57-Ubuntu SMP Wed May 24 10:21:41 UTC 2017 aarch64 
aarch64 aarch64 GNU/Linux

$ dpkg -l | grep kexec-tools
ii  kexec-tools                                1:2.0.10-2ubuntu1.2              
                arm64        tools to support fast kexec reboots

$ sudo file /boot/vmlinuz-4.10.0-22-generic
/boot/vmlinuz-4.10.0-22-generic: gzip compressed data, max compression, from 
Unix

$ sudo kexec -d -l /boot/vmlinuz-4.10.0-22-generic 
--initrd=/boot/initrd.img-4.10.0-22-generic --reuse-cmdline
arch_process_options:141: command_line: root=LABEL=cloudimg-rootfs ro quiet 
splash vt.handoff=7
arch_process_options:143: initrd: /boot/initrd.img-4.10.0-22-generic
arch_process_options:144: dtb: (null)
Try gzip decompression.
kernel: 0xffffaf279010 kernel_size: 0x12bc200
get_memory_ranges_iomem_cb: 0000000040000000 - 000000005855ffff : System RAM
get_memory_ranges_iomem_cb: 00000000585c0000 - 00000000585ebfff : System RAM
get_memory_ranges_iomem_cb: 0000000058750000 - 000000005bc1ffff : System RAM
get_memory_ranges_iomem_cb: 000000005c000000 - 000000005fffffff : System RAM
elf_arm64_probe: Not an ELF executable.
image_arm64_load: kernel_segment: 0000000040000000
image_arm64_load: text_offset:    0000000000080000
image_arm64_load: image_size:     00000000013cf000
image_arm64_load: phys_offset:    0000000040000000
image_arm64_load: vp_offset:      ffffffffffffffff
image_arm64_load: PE format:      yes
read_1st_dtb: found /sys/firmware/fdt
initrd: base 4144f000, size 1af840fh (28279823)
dtb_set_initrd: start 1095036928, end 1123316751, size 28279823 (27617 KiB)
dtb:    base 42f48000, size 1c49h (7241)
sym: sha256_starts info: 12 other: 00 shndx: 1 value: e80 size: 58
sym: sha256_starts value: 42f4ae80 addr: 42f4a014
machine_apply_elf_rel: CALL26 5800065394000000->580006539400039b
sym: sha256_update info: 12 other: 00 shndx: 1 value: 2df0 size: c
sym: sha256_update value: 42f4cdf0 addr: 42f4a030
machine_apply_elf_rel: CALL26 eb16027f94000000->eb16027f94000b70
sym: sha256_finish info: 12 other: 00 shndx: 1 value: 2e00 size: 1bc
sym: sha256_finish value: 42f4ce00 addr: 42f4a048
machine_apply_elf_rel: CALL26 aa1603e194000000->aa1603e194000b6e
sym:     memcmp info: 12 other: 00 shndx: 1 value: 604 size: 34
sym: memcmp value: 42f4a604 addr: 42f4a058
machine_apply_elf_rel: CALL26 340003a094000000->340003a09400016b
sym:     printf info: 12 other: 00 shndx: 1 value: 524 size: 80
sym: printf value: 42f4a524 addr: 42f4a068
machine_apply_elf_rel: CALL26 5800042094000000->580004209400012f
sym:     printf info: 12 other: 00 shndx: 1 value: 524 size: 80
sym: printf value: 42f4a524 addr: 42f4a070
machine_apply_elf_rel: CALL26 5800043694000000->580004369400012d
sym:     printf info: 12 other: 00 shndx: 1 value: 524 size: 80
sym: printf value: 42f4a524 addr: 42f4a084
machine_apply_elf_rel: CALL26 f100827f94000000->f100827f94000128
sym:     printf info: 12 other: 00 shndx: 1 value: 524 size: 80
sym: printf value: 42f4a524 addr: 42f4a0a0
machine_apply_elf_rel: CALL26 5800032094000000->5800032094000121
sym:     printf info: 12 other: 00 shndx: 1 value: 524 size: 80
sym: printf value: 42f4a524 addr: 42f4a0a8
machine_apply_elf_rel: CALL26 38736a8194000000->38736a819400011f
sym:     printf info: 12 other: 00 shndx: 1 value: 524 size: 80
sym: printf value: 42f4a524 addr: 42f4a0b8
machine_apply_elf_rel: CALL26 f100827f94000000->f100827f9400011b
sym:     printf info: 12 other: 00 shndx: 1 value: 524 size: 80
sym: printf value: 42f4a524 addr: 42f4a0c8
machine_apply_elf_rel: CALL26 5280002094000000->5280002094000117
sym:      .data info: 03 other: 00 shndx: 4 value: 0 size: 0
sym: .data value: 42f4d038 addr: 42f4a0e0
machine_apply_elf_rel: ABS64 0000000000000000->0000000042f4d038
sym: .rodata.str1.1 info: 03 other: 00 shndx: 3 value: 0 size: 0
sym: .rodata.str1.1 value: 42f4cfc8 addr: 42f4a0e8
machine_apply_elf_rel: ABS64 0000000000000000->0000000042f4cfc8
sym: .rodata.str1.1 info: 03 other: 00 shndx: 3 value: 0 size: 0
sym: .rodata.str1.1 value: 42f4cfe8 addr: 42f4a0f0
machine_apply_elf_rel: ABS64 0000000000000000->0000000042f4cfe8
sym: .rodata.str1.1 info: 03 other: 00 shndx: 3 value: 0 size: 0
sym: .rodata.str1.1 value: 42f4cff8 addr: 42f4a0f8
machine_apply_elf_rel: ABS64 0000000000000000->0000000042f4cff8
sym: .rodata.str1.1 info: 03 other: 00 shndx: 3 value: 0 size: 0
sym: .rodata.str1.1 value: 42f4cffe addr: 42f4a100
machine_apply_elf_rel: ABS64 0000000000000000->0000000042f4cffe
sym: .rodata.str1.1 info: 03 other: 00 shndx: 3 value: 0 size: 0
sym: .rodata.str1.1 value: 42f4d000 addr: 42f4a108
machine_apply_elf_rel: ABS64 0000000000000000->0000000042f4d000
sym:     printf info: 12 other: 00 shndx: 1 value: 524 size: 80
sym: printf value: 42f4a524 addr: 42f4a11c
machine_apply_elf_rel: CALL26 9400000094000000->9400000094000102
sym: setup_arch info: 12 other: 00 shndx: 1 value: e78 size: 4
sym: setup_arch value: 42f4ae78 addr: 42f4a120
machine_apply_elf_rel: CALL26 9400000094000000->9400000094000356
sym: verify_sha256_digest info: 12 other: 00 shndx: 1 value: 0 size: e0
sym: verify_sha256_digest value: 42f4a000 addr: 42f4a124
machine_apply_elf_rel: CALL26 3400004094000000->3400004097ffffb7
sym: post_verification_setup_arch info: 12 other: 00 shndx: 1 value: e74 size: 4
sym: post_verification_setup_arch value: 42f4ae74 addr: 42f4a134
machine_apply_elf_rel: JUMP26 0000000014000000->0000000014000350
sym: .rodata.str1.1 info: 03 other: 00 shndx: 3 value: 0 size: 0
sym: .rodata.str1.1 value: 42f4d010 addr: 42f4a138
machine_apply_elf_rel: ABS64 0000000000000000->0000000042f4d010
sym:    putchar info: 12 other: 00 shndx: 1 value: e70 size: 4
sym: putchar value: 42f4ae70 addr: 42f4a1cc
machine_apply_elf_rel: CALL26 2a1303e194000000->2a1303e194000329
sym:    putchar info: 12 other: 00 shndx: 1 value: e70 size: 4
sym: putchar value: 42f4ae70 addr: 42f4a240
machine_apply_elf_rel: CALL26 b9406ba194000000->b9406ba19400030c
sym:    putchar info: 12 other: 00 shndx: 1 value: e70 size: 4
sym: putchar value: 42f4ae70 addr: 42f4a49c
machine_apply_elf_rel: CALL26 f94037a194000000->f94037a194000275
sym: .rodata.str1.1 info: 03 other: 00 shndx: 3 value: 0 size: 0
sym: .rodata.str1.1 value: 42f4d022 addr: 42f4a4a8
machine_apply_elf_rel: ABS64 0000000000000000->0000000042f4d022
sym:   vsprintf info: 12 other: 00 shndx: 1 value: 140 size: 368
sym: vsprintf value: 42f4a140 addr: 42f4a518
machine_apply_elf_rel: CALL26 a8d07bfd94000000->a8d07bfd97ffff0a
sym:   vsprintf info: 12 other: 00 shndx: 1 value: 140 size: 368
sym: vsprintf value: 42f4a140 addr: 42f4a598
machine_apply_elf_rel: CALL26 a8d17bfd94000000->a8d17bfd97fffeea
sym:  purgatory info: 12 other: 00 shndx: 1 value: 110 size: 28
sym: purgatory value: 42f4a110 addr: 42f4a648
machine_apply_elf_rel: CALL26 5800001194000000->5800001197fffeb2
sym: arm64_kernel_entry info: 10 other: 00 shndx: 4 value: 120 size: 8
sym: arm64_kernel_entry value: 42f4d158 addr: 42f4a64c
machine_apply_elf_rel: LD_PREL_LO19 5800000058000011->5800000058015871
sym: arm64_dtb_addr info: 10 other: 00 shndx: 4 value: 128 size: 8
sym: arm64_dtb_addr value: 42f4d160 addr: 42f4a650
machine_apply_elf_rel: LD_PREL_LO19 aa1f03e158000000->aa1f03e158015880
sym: sha256_process info: 12 other: 00 shndx: 1 value: ed8 size: 1e00
sym: sha256_process value: 42f4aed8 addr: 42f4cd5c
machine_apply_elf_rel: CALL26 eb15027f94000000->eb15027f97fff85f
sym:     memcpy info: 12 other: 00 shndx: 1 value: 5e4 size: 20
sym: memcpy value: 42f4a5e4 addr: 42f4cdbc
machine_apply_elf_rel: JUMP26 9100c29314000000->9100c29317fff60a
sym:     memcpy info: 12 other: 00 shndx: 1 value: 5e4 size: 20
sym: memcpy value: 42f4a5e4 addr: 42f4cdd8
machine_apply_elf_rel: CALL26 aa1303e194000000->aa1303e197fff603
sym: sha256_process info: 12 other: 00 shndx: 1 value: ed8 size: 1e00
sym: sha256_process value: 42f4aed8 addr: 42f4cde4
machine_apply_elf_rel: CALL26 17ffffd394000000->17ffffd397fff83d
sym:      .data info: 03 other: 00 shndx: 4 value: 0 size: 0
sym: .data value: 42f4d168 addr: 42f4cfc0
machine_apply_elf_rel: ABS64 0000000000000000->0000000042f4d168
kexec_load: entry = 0x42f4a640 flags = 0xb70000
nr_segments = 4
segment[0].buf   = 0xffffaf279010
segment[0].bufsz = 0x12bc200
segment[0].mem   = 0x40080000
segment[0].memsz = 0x13cf000
segment[1].buf   = 0xffffb1769010
segment[1].bufsz = 0x1af840f
segment[1].mem   = 0x4144f000
segment[1].memsz = 0x1af9000
segment[2].buf   = 0x28b5e10
segment[2].bufsz = 0x1c49
segment[2].mem   = 0x42f48000
segment[2].memsz = 0x2000
segment[3].buf   = 0x28b7dc0
segment[3].bufsz = 0x31a8
segment[3].mem   = 0x42f4a000
segment[3].memsz = 0x4000


** Tags removed: verification-needed
** Tags added: verification-done

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to kexec-tools in Ubuntu.
https://bugs.launchpad.net/bugs/1671246

Title:
  kexec-tools does not build for armhf

Status in kexec-tools package in Ubuntu:
  Fix Released
Status in kexec-tools source package in Xenial:
  Fix Committed
Status in kexec-tools source package in Yakkety:
  Fix Committed

Bug description:
  [Impact]
  On armhf system kexec build fails as follows:
  gcc -g -O2 -fstack-protector-strong -Wformat -Werror=format-security 
-fno-strict-aliasing -Wall -Wstrict-prototypes -Wdate-time -D_FORTIFY_SOURCE=2 
-I./include -I./util_lib/include -Iinclude/ -I./kexec/libfdt 
-I./kexec/arch/arm/include  -c -MD -o kexec/arch/arm/phys_to_virt.o 
kexec/arch/arm/phys_to_virt.c
  make[1]: *** No rule to make target 'kexec/arch/arm/iomem.o', needed by 
'build/sbin/kexec'.  Stop.

  The fix for this issue is already upstream:

  From c901bae8683c59a7bc002bd6a1e3e4b6b7d9c5f1 Mon Sep 17 00:00:00 2001
  From: Simon Horman <ho...@verge.net.au>
  Date: Fri, 9 Dec 2016 10:10:49 +0100
  Subject: [PATCH] arm: do not build iomem.o target with no soruce

  Header files should be added to the distribution but not
  used to derive targets for compilation. In this an attempt was
  made to build iomem.o, but iomem.c does not exist so this fails.

  Fixes: 1574ff1aae4f ("arm: include phys_to_virt.h and iomem.h in 
distribution")
  Signed-off-by: Simon Horman <ho...@verge.net.au>
  Reviewed-by: Pratyush Anand <pan...@redhat.com>

  [Test Case]
  Build kexec-tools package from Xenial/Yakkety source in armhf system.

  [Regression Potential]
  Since patch is confined to arm there is a low overall risk of regression

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/kexec-tools/+bug/1671246/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to     : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp

Reply via email to