Displaying 20 results from an estimated 297 matches for "0xe8".
Did you mean:
0x08
2005 Mar 21
0
Comport access error
...te tcgetattr or ioctl error
'Input/output error'
trace:comm:PurgeComm handle 0xe4, flags f
trace:comm:EscapeCommFunction handle 0xe4, function=6
trace:comm:EscapeCommFunction handle 0xe4, function=4
fixme:comm:SetupComm insize 1024 outsize 1024
unimplemented stub
trace:comm:SetCommTimeouts (0xe8,0x4069bb44)
trace:comm:GetCommState handle 0xe8, ptr 0x4069bb58
trace:comm:GetCommState OK
trace:comm:GetCommState bytesize 8 baudrate 38400
fParity 0 Parity 0 st
opbits 1
trace:comm:GetCommState IXON ~IXOFF
trace:comm:GetCommState fOutxCtsFlow 0 fRtsControl 0
trace:comm:GetCommState fOutxDsrFlow 0...
2017 Nov 16
1
[PATCH 10/13] x86/alternative: Support indirect call replacement
...a 100644
> > --- a/arch/x86/kernel/alternative.c
> > +++ b/arch/x86/kernel/alternative.c
> > @@ -410,20 +410,28 @@ void __init_or_module noinline apply_alternatives(struct alt_instr *start,
> > insnbuf_sz = a->replacementlen;
> >
> > /*
> > - * 0xe8 is a relative jump; fix the offset.
> > - *
> > - * Instruction length is checked before the opcode to avoid
> > - * accessing uninitialized bytes for zero-length replacements.
> > + * Fix the address offsets for call and jump instructions which
> > + * use P...
2017 Nov 16
1
[PATCH 10/13] x86/alternative: Support indirect call replacement
...a 100644
> > --- a/arch/x86/kernel/alternative.c
> > +++ b/arch/x86/kernel/alternative.c
> > @@ -410,20 +410,28 @@ void __init_or_module noinline apply_alternatives(struct alt_instr *start,
> > insnbuf_sz = a->replacementlen;
> >
> > /*
> > - * 0xe8 is a relative jump; fix the offset.
> > - *
> > - * Instruction length is checked before the opcode to avoid
> > - * accessing uninitialized bytes for zero-length replacements.
> > + * Fix the address offsets for call and jump instructions which
> > + * use P...
2017 Oct 04
1
[PATCH 10/13] x86/alternative: Support indirect call replacement
...tive.c b/arch/x86/kernel/alternative.c
index 3344d3382e91..81c577c7deba 100644
--- a/arch/x86/kernel/alternative.c
+++ b/arch/x86/kernel/alternative.c
@@ -410,20 +410,28 @@ void __init_or_module noinline apply_alternatives(struct alt_instr *start,
insnbuf_sz = a->replacementlen;
/*
- * 0xe8 is a relative jump; fix the offset.
- *
- * Instruction length is checked before the opcode to avoid
- * accessing uninitialized bytes for zero-length replacements.
+ * Fix the address offsets for call and jump instructions which
+ * use PC-relative addressing.
*/
if (a->replace...
2017 Oct 25
0
[PATCH 10/13] x86/alternative: Support indirect call replacement
...gt; index 3344d3382e91..81c577c7deba 100644
> --- a/arch/x86/kernel/alternative.c
> +++ b/arch/x86/kernel/alternative.c
> @@ -410,20 +410,28 @@ void __init_or_module noinline apply_alternatives(struct alt_instr *start,
> insnbuf_sz = a->replacementlen;
>
> /*
> - * 0xe8 is a relative jump; fix the offset.
> - *
> - * Instruction length is checked before the opcode to avoid
> - * accessing uninitialized bytes for zero-length replacements.
> + * Fix the address offsets for call and jump instructions which
> + * use PC-relative addressing.
&g...
2009 Jun 02
0
[PATCH] [memdisk] Add some DriveShiftLimit logic
...ge of already-present BIOS drives starting
with our desired number
3. Save the top-most drive number of this contiguous range
4. Install the INTerrupt hooks
5. Our INTerrupt code will only shift drive numbers within this range
Why? As an example, suppose that we have BIOS drives 0x00, 0x80, 0x81,
0xE8. If we wish to hook our MEMDISK disk as the new 0x80, we shift the
previous 0x80 to become 0x81, we shift the previous 0x81 to become 0x82,
but we leave 0xE8 alone, because it's outside of the contiguous range we
probed for starting at 0x80. In this way, any system code already
installed and...
2002 Oct 09
1
ERROR: buffer overflow in receive_file_entry
has anyone seen this error:
ns1: /acct/peter> rsync ns1.pad.com::acct
overflow: flags=0xe8 l1=3 l2=20709376 lastname=.
ERROR: buffer overflow in receive_file_entry
rsync error: error allocating core memory buffers (code 22) at util.c(238)
ns1: /acct/peter>
--
Peter Dominguez
72 Belvedere Dr
Yonkers, NY 10705-2814
USA
Tel: 914-423-4000
Fax: 914-423-8640
Email: peter@pad.com
2017 Dec 13
2
[PATCHv2] virtio_mmio: fix devm cleanup
.../0x51c
> > [ 3.569184] __warn+0x29c/0x31c
> > [ 3.576023] report_bug+0x1d4/0x290
> > [ 3.586069] bug_handler.part.2+0x40/0x100
> > [ 3.597820] bug_handler+0x4c/0x88
> > [ 3.608400] brk_handler+0x11c/0x218
> > [ 3.613430] do_debug_exception+0xe8/0x318
> > [ 3.627370] el1_dbg+0x18/0x78
> > [ 3.634037] __vunmap+0x1b8/0x220
> > [ 3.648747] vunmap+0x6c/0xc0
> > [ 3.653864] __iounmap+0x44/0x58
> > [ 3.659771] devm_ioremap_release+0x34/0x68
> > [ 3.672983] release_nodes+0x404/0x880
>...
2017 Dec 13
2
[PATCHv2] virtio_mmio: fix devm cleanup
.../0x51c
> > [ 3.569184] __warn+0x29c/0x31c
> > [ 3.576023] report_bug+0x1d4/0x290
> > [ 3.586069] bug_handler.part.2+0x40/0x100
> > [ 3.597820] bug_handler+0x4c/0x88
> > [ 3.608400] brk_handler+0x11c/0x218
> > [ 3.613430] do_debug_exception+0xe8/0x318
> > [ 3.627370] el1_dbg+0x18/0x78
> > [ 3.634037] __vunmap+0x1b8/0x220
> > [ 3.648747] vunmap+0x6c/0xc0
> > [ 3.653864] __iounmap+0x44/0x58
> > [ 3.659771] devm_ioremap_release+0x34/0x68
> > [ 3.672983] release_nodes+0x404/0x880
>...
2017 Mar 21
0
use-after-free bug with GT218 on arm64 machine
...ption bug on my arm64
machine which appears to be in the nouveau driver.
I got the following splat from the refcount debugging code:
"""
refcount_t: underflow; use-after-free.
------------[ cut here ]------------
WARNING: CPU: 0 PID: 3366 at lib/refcount.c:128 refcount_sub_and_test+0xe8/0x108
Modules linked in: fuse nouveau ttm drm_kms_helper drm ip_tables x_tables ipv6
CPU: 0 PID: 3366 Comm: gnome-shell Not tainted 4.11.0-rc3-00407-g97da3854c526 #1
Hardware name: AMD Seattle/Seattle, BIOS 11:14:27 Mar 20 2017
task: ffffffd6cca5b600 task.stack: ffffffd6c8120000
PC is at refcount_...
2017 Dec 12
2
[PATCH] virtio_mmio: fix devm cleanup
....547767] dump_stack+0x108/0x164
[ 3.559584] panic+0x25c/0x51c
[ 3.569184] __warn+0x29c/0x31c
[ 3.576023] report_bug+0x1d4/0x290
[ 3.586069] bug_handler.part.2+0x40/0x100
[ 3.597820] bug_handler+0x4c/0x88
[ 3.608400] brk_handler+0x11c/0x218
[ 3.613430] do_debug_exception+0xe8/0x318
[ 3.627370] el1_dbg+0x18/0x78
[ 3.634037] __vunmap+0x1b8/0x220
[ 3.648747] vunmap+0x6c/0xc0
[ 3.653864] __iounmap+0x44/0x58
[ 3.659771] devm_ioremap_release+0x34/0x68
[ 3.672983] release_nodes+0x404/0x880
[ 3.683543] devres_release_all+0x6c/0xe8
[ 3.695692] dri...
2017 Dec 12
2
[PATCH] virtio_mmio: fix devm cleanup
....547767] dump_stack+0x108/0x164
[ 3.559584] panic+0x25c/0x51c
[ 3.569184] __warn+0x29c/0x31c
[ 3.576023] report_bug+0x1d4/0x290
[ 3.586069] bug_handler.part.2+0x40/0x100
[ 3.597820] bug_handler+0x4c/0x88
[ 3.608400] brk_handler+0x11c/0x218
[ 3.613430] do_debug_exception+0xe8/0x318
[ 3.627370] el1_dbg+0x18/0x78
[ 3.634037] __vunmap+0x1b8/0x220
[ 3.648747] vunmap+0x6c/0xc0
[ 3.653864] __iounmap+0x44/0x58
[ 3.659771] devm_ioremap_release+0x34/0x68
[ 3.672983] release_nodes+0x404/0x880
[ 3.683543] devres_release_all+0x6c/0xe8
[ 3.695692] dri...
2017 Dec 12
4
[PATCHv2] virtio_mmio: fix devm cleanup
....547767] dump_stack+0x108/0x164
[ 3.559584] panic+0x25c/0x51c
[ 3.569184] __warn+0x29c/0x31c
[ 3.576023] report_bug+0x1d4/0x290
[ 3.586069] bug_handler.part.2+0x40/0x100
[ 3.597820] bug_handler+0x4c/0x88
[ 3.608400] brk_handler+0x11c/0x218
[ 3.613430] do_debug_exception+0xe8/0x318
[ 3.627370] el1_dbg+0x18/0x78
[ 3.634037] __vunmap+0x1b8/0x220
[ 3.648747] vunmap+0x6c/0xc0
[ 3.653864] __iounmap+0x44/0x58
[ 3.659771] devm_ioremap_release+0x34/0x68
[ 3.672983] release_nodes+0x404/0x880
[ 3.683543] devres_release_all+0x6c/0xe8
[ 3.695692] dri...
2017 Dec 12
4
[PATCHv2] virtio_mmio: fix devm cleanup
....547767] dump_stack+0x108/0x164
[ 3.559584] panic+0x25c/0x51c
[ 3.569184] __warn+0x29c/0x31c
[ 3.576023] report_bug+0x1d4/0x290
[ 3.586069] bug_handler.part.2+0x40/0x100
[ 3.597820] bug_handler+0x4c/0x88
[ 3.608400] brk_handler+0x11c/0x218
[ 3.613430] do_debug_exception+0xe8/0x318
[ 3.627370] el1_dbg+0x18/0x78
[ 3.634037] __vunmap+0x1b8/0x220
[ 3.648747] vunmap+0x6c/0xc0
[ 3.653864] __iounmap+0x44/0x58
[ 3.659771] devm_ioremap_release+0x34/0x68
[ 3.672983] release_nodes+0x404/0x880
[ 3.683543] devres_release_all+0x6c/0xe8
[ 3.695692] dri...
2018 Feb 23
2
v4.16-rc2: virtio-block + ext4 lockdep splats / sleeping from invalid context
...9287] *** DEADLOCK ***
[ 162.409287]
[ 162.410447] 2 locks held by swapper/0/0:
[ 162.411248] #0: (&(&vblk->vqs[i].lock)->rlock){-.-.}, at: [<00000000b75553ae>] virtblk_done+0x50/0xf8
[ 162.413101] #1: (rcu_read_lock){....}, at: [<000000002bf2a216>] hctx_lock+0x1c/0xe8
[ 162.414630]
[ 162.414630] stack backtrace:
[ 162.415492] CPU: 0 PID: 0 Comm: swapper/0 Not tainted 4.16.0-rc2 #1
[ 162.429624] Hardware name: linux,dummy-virt (DT)
[ 162.430631] Call trace:
[ 162.431196] dump_backtrace+0x0/0x1c8
[ 162.432005] show_stack+0x14/0x20
[ 162.432747] dump_sta...
2018 Feb 23
2
v4.16-rc2: virtio-block + ext4 lockdep splats / sleeping from invalid context
...9287] *** DEADLOCK ***
[ 162.409287]
[ 162.410447] 2 locks held by swapper/0/0:
[ 162.411248] #0: (&(&vblk->vqs[i].lock)->rlock){-.-.}, at: [<00000000b75553ae>] virtblk_done+0x50/0xf8
[ 162.413101] #1: (rcu_read_lock){....}, at: [<000000002bf2a216>] hctx_lock+0x1c/0xe8
[ 162.414630]
[ 162.414630] stack backtrace:
[ 162.415492] CPU: 0 PID: 0 Comm: swapper/0 Not tainted 4.16.0-rc2 #1
[ 162.429624] Hardware name: linux,dummy-virt (DT)
[ 162.430631] Call trace:
[ 162.431196] dump_backtrace+0x0/0x1c8
[ 162.432005] show_stack+0x14/0x20
[ 162.432747] dump_sta...
2012 Aug 14
1
Problem with heaps of sleeping smb processes due to panic action
...ba/lib/private/libtevent.so.0(tevent_common_loop_immediate+0x1f9) [0x7f37c376a090]
#15 /usr/local/samba/lib/libsmbconf.so.0(run_events_poll+0x57) [0x7f37c351d23f]
#16 /usr/local/samba/lib/libsmbconf.so.0(+0x44ac2) [0x7f37c351dac2]
#17 /usr/local/samba/lib/private/libtevent.so.0(_tevent_loop_once+0xe8) [0x7f37c376918f]
#18 /usr/local/samba/lib/private/libsmbd_base.so(smbd_process+0x10ed) [0x7f37c4af4569]
#19 /usr/local/samba/sbin/smbd() [0x409c48]
#20 /usr/local/samba/lib/libsmbconf.so.0(run_events_poll+0x71a) [0x7f37c351d902]
#21 /usr/local/samba/lib/libsmbconf.so.0(+0x44ba2) [0x7f37c351dba...
2009 Nov 14
2
[LLVMdev] Very slow performance of lli on x86
...db, 0xdc, 0xde },
{ 0xdb, 0xdc, 0xdd, 0xdf },
{ 0xdc, 0xdd, 0xde, 0xe0 },
{ 0xdd, 0xde, 0xdf, 0xe1 },
{ 0xde, 0xdf, 0xe0, 0xe2 },
{ 0xdf, 0xe0, 0xe1, 0xe3 },
{ 0xe0, 0xe1, 0xe2, 0xe4 },
{ 0xe1, 0xe2, 0xe3, 0xe5 },
{ 0xe2, 0xe3, 0xe4, 0xe6 },
{ 0xe3, 0xe4, 0xe5, 0xe7 },
{ 0xe4, 0xe5, 0xe6, 0xe8 },
{ 0xe5, 0xe6, 0xe7, 0xe9 },
{ 0xe6, 0xe7, 0xe8, 0xea },
{ 0xe7, 0xe8, 0xe9, 0xeb },
{ 0xe8, 0xe9, 0xea, 0xec },
{ 0xe9, 0xea, 0xeb, 0xed },
{ 0xea, 0xeb, 0xec, 0xee },
{ 0xeb, 0xec, 0xed, 0xef },
{ 0xec, 0xed, 0xee, 0xf0 },
{ 0xed, 0xee, 0xef, 0xf1 },
{ 0xee, 0xef, 0xf0, 0xf2 },
{ 0xe...
2019 Jun 13
3
dev_pagemap related cleanups
...inted: G OE
> 5.2.0-rc3+ #3399
> Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 0.0.0 02/06/2015
> RIP: 0010:percpu_ref_kill_and_confirm+0x1e/0x180
> [..]
> Call Trace:
> release_nodes+0x234/0x280
> device_release_driver_internal+0xe8/0x1b0
> bus_remove_device+0xf2/0x160
> device_del+0x166/0x370
> unregister_dev_dax+0x23/0x50
> release_nodes+0x234/0x280
> device_release_driver_internal+0xe8/0x1b0
> unbind_store+0x94/0x120
> kernfs_fop_write+0xf0/0x1a0
> vfs_write+0x...
2018 Feb 26
0
v4.16-rc2: virtio-block + ext4 lockdep splats / sleeping from invalid context
...***
> [ 162.409287]
> [ 162.410447] 2 locks held by swapper/0/0:
> [ 162.411248] #0: (&(&vblk->vqs[i].lock)->rlock){-.-.}, at: [<00000000b75553ae>] virtblk_done+0x50/0xf8
> [ 162.413101] #1: (rcu_read_lock){....}, at: [<000000002bf2a216>] hctx_lock+0x1c/0xe8
> [ 162.414630]
> [ 162.414630] stack backtrace:
> [ 162.415492] CPU: 0 PID: 0 Comm: swapper/0 Not tainted 4.16.0-rc2 #1
> [ 162.429624] Hardware name: linux,dummy-virt (DT)
> [ 162.430631] Call trace:
> [ 162.431196] dump_backtrace+0x0/0x1c8
> [ 162.432005] show_stack...