search for: 0xe8

Displaying 20 results from an estimated 297 matches for "0xe8".

Did you mean: 0x08
2005 Mar 21
0
Comport access error
...te tcgetattr or ioctl error 'Input/output error' trace:comm:PurgeComm handle 0xe4, flags f trace:comm:EscapeCommFunction handle 0xe4, function=6 trace:comm:EscapeCommFunction handle 0xe4, function=4 fixme:comm:SetupComm insize 1024 outsize 1024 unimplemented stub trace:comm:SetCommTimeouts (0xe8,0x4069bb44) trace:comm:GetCommState handle 0xe8, ptr 0x4069bb58 trace:comm:GetCommState OK trace:comm:GetCommState bytesize 8 baudrate 38400 fParity 0 Parity 0 st opbits 1 trace:comm:GetCommState IXON ~IXOFF trace:comm:GetCommState fOutxCtsFlow 0 fRtsControl 0 trace:comm:GetCommState fOutxDsrFlow 0...
2017 Nov 16
1
[PATCH 10/13] x86/alternative: Support indirect call replacement
...a 100644 > > --- a/arch/x86/kernel/alternative.c > > +++ b/arch/x86/kernel/alternative.c > > @@ -410,20 +410,28 @@ void __init_or_module noinline apply_alternatives(struct alt_instr *start, > > insnbuf_sz = a->replacementlen; > > > > /* > > - * 0xe8 is a relative jump; fix the offset. > > - * > > - * Instruction length is checked before the opcode to avoid > > - * accessing uninitialized bytes for zero-length replacements. > > + * Fix the address offsets for call and jump instructions which > > + * use P...
2017 Nov 16
1
[PATCH 10/13] x86/alternative: Support indirect call replacement
...a 100644 > > --- a/arch/x86/kernel/alternative.c > > +++ b/arch/x86/kernel/alternative.c > > @@ -410,20 +410,28 @@ void __init_or_module noinline apply_alternatives(struct alt_instr *start, > > insnbuf_sz = a->replacementlen; > > > > /* > > - * 0xe8 is a relative jump; fix the offset. > > - * > > - * Instruction length is checked before the opcode to avoid > > - * accessing uninitialized bytes for zero-length replacements. > > + * Fix the address offsets for call and jump instructions which > > + * use P...
2017 Oct 04
1
[PATCH 10/13] x86/alternative: Support indirect call replacement
...tive.c b/arch/x86/kernel/alternative.c index 3344d3382e91..81c577c7deba 100644 --- a/arch/x86/kernel/alternative.c +++ b/arch/x86/kernel/alternative.c @@ -410,20 +410,28 @@ void __init_or_module noinline apply_alternatives(struct alt_instr *start, insnbuf_sz = a->replacementlen; /* - * 0xe8 is a relative jump; fix the offset. - * - * Instruction length is checked before the opcode to avoid - * accessing uninitialized bytes for zero-length replacements. + * Fix the address offsets for call and jump instructions which + * use PC-relative addressing. */ if (a->replace...
2017 Oct 25
0
[PATCH 10/13] x86/alternative: Support indirect call replacement
...gt; index 3344d3382e91..81c577c7deba 100644 > --- a/arch/x86/kernel/alternative.c > +++ b/arch/x86/kernel/alternative.c > @@ -410,20 +410,28 @@ void __init_or_module noinline apply_alternatives(struct alt_instr *start, > insnbuf_sz = a->replacementlen; > > /* > - * 0xe8 is a relative jump; fix the offset. > - * > - * Instruction length is checked before the opcode to avoid > - * accessing uninitialized bytes for zero-length replacements. > + * Fix the address offsets for call and jump instructions which > + * use PC-relative addressing. &g...
2009 Jun 02
0
[PATCH] [memdisk] Add some DriveShiftLimit logic
...ge of already-present BIOS drives starting with our desired number 3. Save the top-most drive number of this contiguous range 4. Install the INTerrupt hooks 5. Our INTerrupt code will only shift drive numbers within this range Why? As an example, suppose that we have BIOS drives 0x00, 0x80, 0x81, 0xE8. If we wish to hook our MEMDISK disk as the new 0x80, we shift the previous 0x80 to become 0x81, we shift the previous 0x81 to become 0x82, but we leave 0xE8 alone, because it's outside of the contiguous range we probed for starting at 0x80. In this way, any system code already installed and...
2002 Oct 09
1
ERROR: buffer overflow in receive_file_entry
has anyone seen this error: ns1: /acct/peter> rsync ns1.pad.com::acct overflow: flags=0xe8 l1=3 l2=20709376 lastname=. ERROR: buffer overflow in receive_file_entry rsync error: error allocating core memory buffers (code 22) at util.c(238) ns1: /acct/peter> -- Peter Dominguez 72 Belvedere Dr Yonkers, NY 10705-2814 USA Tel: 914-423-4000 Fax: 914-423-8640 Email: peter@pad.com
2017 Dec 13
2
[PATCHv2] virtio_mmio: fix devm cleanup
.../0x51c > > [ 3.569184] __warn+0x29c/0x31c > > [ 3.576023] report_bug+0x1d4/0x290 > > [ 3.586069] bug_handler.part.2+0x40/0x100 > > [ 3.597820] bug_handler+0x4c/0x88 > > [ 3.608400] brk_handler+0x11c/0x218 > > [ 3.613430] do_debug_exception+0xe8/0x318 > > [ 3.627370] el1_dbg+0x18/0x78 > > [ 3.634037] __vunmap+0x1b8/0x220 > > [ 3.648747] vunmap+0x6c/0xc0 > > [ 3.653864] __iounmap+0x44/0x58 > > [ 3.659771] devm_ioremap_release+0x34/0x68 > > [ 3.672983] release_nodes+0x404/0x880 >...
2017 Dec 13
2
[PATCHv2] virtio_mmio: fix devm cleanup
.../0x51c > > [ 3.569184] __warn+0x29c/0x31c > > [ 3.576023] report_bug+0x1d4/0x290 > > [ 3.586069] bug_handler.part.2+0x40/0x100 > > [ 3.597820] bug_handler+0x4c/0x88 > > [ 3.608400] brk_handler+0x11c/0x218 > > [ 3.613430] do_debug_exception+0xe8/0x318 > > [ 3.627370] el1_dbg+0x18/0x78 > > [ 3.634037] __vunmap+0x1b8/0x220 > > [ 3.648747] vunmap+0x6c/0xc0 > > [ 3.653864] __iounmap+0x44/0x58 > > [ 3.659771] devm_ioremap_release+0x34/0x68 > > [ 3.672983] release_nodes+0x404/0x880 >...
2017 Mar 21
0
use-after-free bug with GT218 on arm64 machine
...ption bug on my arm64 machine which appears to be in the nouveau driver. I got the following splat from the refcount debugging code: """ refcount_t: underflow; use-after-free. ------------[ cut here ]------------ WARNING: CPU: 0 PID: 3366 at lib/refcount.c:128 refcount_sub_and_test+0xe8/0x108 Modules linked in: fuse nouveau ttm drm_kms_helper drm ip_tables x_tables ipv6 CPU: 0 PID: 3366 Comm: gnome-shell Not tainted 4.11.0-rc3-00407-g97da3854c526 #1 Hardware name: AMD Seattle/Seattle, BIOS 11:14:27 Mar 20 2017 task: ffffffd6cca5b600 task.stack: ffffffd6c8120000 PC is at refcount_...
2017 Dec 12
2
[PATCH] virtio_mmio: fix devm cleanup
....547767] dump_stack+0x108/0x164 [ 3.559584] panic+0x25c/0x51c [ 3.569184] __warn+0x29c/0x31c [ 3.576023] report_bug+0x1d4/0x290 [ 3.586069] bug_handler.part.2+0x40/0x100 [ 3.597820] bug_handler+0x4c/0x88 [ 3.608400] brk_handler+0x11c/0x218 [ 3.613430] do_debug_exception+0xe8/0x318 [ 3.627370] el1_dbg+0x18/0x78 [ 3.634037] __vunmap+0x1b8/0x220 [ 3.648747] vunmap+0x6c/0xc0 [ 3.653864] __iounmap+0x44/0x58 [ 3.659771] devm_ioremap_release+0x34/0x68 [ 3.672983] release_nodes+0x404/0x880 [ 3.683543] devres_release_all+0x6c/0xe8 [ 3.695692] dri...
2017 Dec 12
2
[PATCH] virtio_mmio: fix devm cleanup
....547767] dump_stack+0x108/0x164 [ 3.559584] panic+0x25c/0x51c [ 3.569184] __warn+0x29c/0x31c [ 3.576023] report_bug+0x1d4/0x290 [ 3.586069] bug_handler.part.2+0x40/0x100 [ 3.597820] bug_handler+0x4c/0x88 [ 3.608400] brk_handler+0x11c/0x218 [ 3.613430] do_debug_exception+0xe8/0x318 [ 3.627370] el1_dbg+0x18/0x78 [ 3.634037] __vunmap+0x1b8/0x220 [ 3.648747] vunmap+0x6c/0xc0 [ 3.653864] __iounmap+0x44/0x58 [ 3.659771] devm_ioremap_release+0x34/0x68 [ 3.672983] release_nodes+0x404/0x880 [ 3.683543] devres_release_all+0x6c/0xe8 [ 3.695692] dri...
2017 Dec 12
4
[PATCHv2] virtio_mmio: fix devm cleanup
....547767] dump_stack+0x108/0x164 [ 3.559584] panic+0x25c/0x51c [ 3.569184] __warn+0x29c/0x31c [ 3.576023] report_bug+0x1d4/0x290 [ 3.586069] bug_handler.part.2+0x40/0x100 [ 3.597820] bug_handler+0x4c/0x88 [ 3.608400] brk_handler+0x11c/0x218 [ 3.613430] do_debug_exception+0xe8/0x318 [ 3.627370] el1_dbg+0x18/0x78 [ 3.634037] __vunmap+0x1b8/0x220 [ 3.648747] vunmap+0x6c/0xc0 [ 3.653864] __iounmap+0x44/0x58 [ 3.659771] devm_ioremap_release+0x34/0x68 [ 3.672983] release_nodes+0x404/0x880 [ 3.683543] devres_release_all+0x6c/0xe8 [ 3.695692] dri...
2017 Dec 12
4
[PATCHv2] virtio_mmio: fix devm cleanup
....547767] dump_stack+0x108/0x164 [ 3.559584] panic+0x25c/0x51c [ 3.569184] __warn+0x29c/0x31c [ 3.576023] report_bug+0x1d4/0x290 [ 3.586069] bug_handler.part.2+0x40/0x100 [ 3.597820] bug_handler+0x4c/0x88 [ 3.608400] brk_handler+0x11c/0x218 [ 3.613430] do_debug_exception+0xe8/0x318 [ 3.627370] el1_dbg+0x18/0x78 [ 3.634037] __vunmap+0x1b8/0x220 [ 3.648747] vunmap+0x6c/0xc0 [ 3.653864] __iounmap+0x44/0x58 [ 3.659771] devm_ioremap_release+0x34/0x68 [ 3.672983] release_nodes+0x404/0x880 [ 3.683543] devres_release_all+0x6c/0xe8 [ 3.695692] dri...
2018 Feb 23
2
v4.16-rc2: virtio-block + ext4 lockdep splats / sleeping from invalid context
...9287] *** DEADLOCK *** [ 162.409287] [ 162.410447] 2 locks held by swapper/0/0: [ 162.411248] #0: (&(&vblk->vqs[i].lock)->rlock){-.-.}, at: [<00000000b75553ae>] virtblk_done+0x50/0xf8 [ 162.413101] #1: (rcu_read_lock){....}, at: [<000000002bf2a216>] hctx_lock+0x1c/0xe8 [ 162.414630] [ 162.414630] stack backtrace: [ 162.415492] CPU: 0 PID: 0 Comm: swapper/0 Not tainted 4.16.0-rc2 #1 [ 162.429624] Hardware name: linux,dummy-virt (DT) [ 162.430631] Call trace: [ 162.431196] dump_backtrace+0x0/0x1c8 [ 162.432005] show_stack+0x14/0x20 [ 162.432747] dump_sta...
2018 Feb 23
2
v4.16-rc2: virtio-block + ext4 lockdep splats / sleeping from invalid context
...9287] *** DEADLOCK *** [ 162.409287] [ 162.410447] 2 locks held by swapper/0/0: [ 162.411248] #0: (&(&vblk->vqs[i].lock)->rlock){-.-.}, at: [<00000000b75553ae>] virtblk_done+0x50/0xf8 [ 162.413101] #1: (rcu_read_lock){....}, at: [<000000002bf2a216>] hctx_lock+0x1c/0xe8 [ 162.414630] [ 162.414630] stack backtrace: [ 162.415492] CPU: 0 PID: 0 Comm: swapper/0 Not tainted 4.16.0-rc2 #1 [ 162.429624] Hardware name: linux,dummy-virt (DT) [ 162.430631] Call trace: [ 162.431196] dump_backtrace+0x0/0x1c8 [ 162.432005] show_stack+0x14/0x20 [ 162.432747] dump_sta...
2012 Aug 14
1
Problem with heaps of sleeping smb processes due to panic action
...ba/lib/private/libtevent.so.0(tevent_common_loop_immediate+0x1f9) [0x7f37c376a090] #15 /usr/local/samba/lib/libsmbconf.so.0(run_events_poll+0x57) [0x7f37c351d23f] #16 /usr/local/samba/lib/libsmbconf.so.0(+0x44ac2) [0x7f37c351dac2] #17 /usr/local/samba/lib/private/libtevent.so.0(_tevent_loop_once+0xe8) [0x7f37c376918f] #18 /usr/local/samba/lib/private/libsmbd_base.so(smbd_process+0x10ed) [0x7f37c4af4569] #19 /usr/local/samba/sbin/smbd() [0x409c48] #20 /usr/local/samba/lib/libsmbconf.so.0(run_events_poll+0x71a) [0x7f37c351d902] #21 /usr/local/samba/lib/libsmbconf.so.0(+0x44ba2) [0x7f37c351dba...
2009 Nov 14
2
[LLVMdev] Very slow performance of lli on x86
...db, 0xdc, 0xde }, { 0xdb, 0xdc, 0xdd, 0xdf }, { 0xdc, 0xdd, 0xde, 0xe0 }, { 0xdd, 0xde, 0xdf, 0xe1 }, { 0xde, 0xdf, 0xe0, 0xe2 }, { 0xdf, 0xe0, 0xe1, 0xe3 }, { 0xe0, 0xe1, 0xe2, 0xe4 }, { 0xe1, 0xe2, 0xe3, 0xe5 }, { 0xe2, 0xe3, 0xe4, 0xe6 }, { 0xe3, 0xe4, 0xe5, 0xe7 }, { 0xe4, 0xe5, 0xe6, 0xe8 }, { 0xe5, 0xe6, 0xe7, 0xe9 }, { 0xe6, 0xe7, 0xe8, 0xea }, { 0xe7, 0xe8, 0xe9, 0xeb }, { 0xe8, 0xe9, 0xea, 0xec }, { 0xe9, 0xea, 0xeb, 0xed }, { 0xea, 0xeb, 0xec, 0xee }, { 0xeb, 0xec, 0xed, 0xef }, { 0xec, 0xed, 0xee, 0xf0 }, { 0xed, 0xee, 0xef, 0xf1 }, { 0xee, 0xef, 0xf0, 0xf2 }, { 0xe...
2019 Jun 13
3
dev_pagemap related cleanups
...inted: G OE > 5.2.0-rc3+ #3399 > Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 0.0.0 02/06/2015 > RIP: 0010:percpu_ref_kill_and_confirm+0x1e/0x180 > [..] > Call Trace: > release_nodes+0x234/0x280 > device_release_driver_internal+0xe8/0x1b0 > bus_remove_device+0xf2/0x160 > device_del+0x166/0x370 > unregister_dev_dax+0x23/0x50 > release_nodes+0x234/0x280 > device_release_driver_internal+0xe8/0x1b0 > unbind_store+0x94/0x120 > kernfs_fop_write+0xf0/0x1a0 > vfs_write+0x...
2018 Feb 26
0
v4.16-rc2: virtio-block + ext4 lockdep splats / sleeping from invalid context
...*** > [ 162.409287] > [ 162.410447] 2 locks held by swapper/0/0: > [ 162.411248] #0: (&(&vblk->vqs[i].lock)->rlock){-.-.}, at: [<00000000b75553ae>] virtblk_done+0x50/0xf8 > [ 162.413101] #1: (rcu_read_lock){....}, at: [<000000002bf2a216>] hctx_lock+0x1c/0xe8 > [ 162.414630] > [ 162.414630] stack backtrace: > [ 162.415492] CPU: 0 PID: 0 Comm: swapper/0 Not tainted 4.16.0-rc2 #1 > [ 162.429624] Hardware name: linux,dummy-virt (DT) > [ 162.430631] Call trace: > [ 162.431196] dump_backtrace+0x0/0x1c8 > [ 162.432005] show_stack...