search for: 637f

Displaying 5 results from an estimated 5 matches for "637f".

Did you mean: 637
2016 Jun 16
2
[PATCH v7 00/12] Support non-lru page migration
...k this time. but the problem is > still the same. > > zs_compact() > ... > 6371: e8 00 00 00 00 callq 6376 <zs_compact+0x22b> > 6376: 0f 0b ud2 > 6378: 48 8b 95 a8 fe ff ff mov -0x158(%rbp),%rdx > 637f: 4d 8d 74 24 78 lea 0x78(%r12),%r14 > 6384: 4c 89 ee mov %r13,%rsi > 6387: 4c 89 e7 mov %r12,%rdi > 638a: e8 86 c7 ff ff callq 2b15 <get_first_obj_offset> > 638f: 41 89 c5...
2016 Jun 16
2
[PATCH v7 00/12] Support non-lru page migration
...k this time. but the problem is > still the same. > > zs_compact() > ... > 6371: e8 00 00 00 00 callq 6376 <zs_compact+0x22b> > 6376: 0f 0b ud2 > 6378: 48 8b 95 a8 fe ff ff mov -0x158(%rbp),%rdx > 637f: 4d 8d 74 24 78 lea 0x78(%r12),%r14 > 6384: 4c 89 ee mov %r13,%rsi > 6387: 4c 89 e7 mov %r12,%rdi > 638a: e8 86 c7 ff ff callq 2b15 <get_first_obj_offset> > 638f: 41 89 c5...
2016 Jun 15
2
[PATCH v7 00/12] Support non-lru page migration
Hi Sergey, On Wed, Jun 15, 2016 at 04:59:09PM +0900, Sergey Senozhatsky wrote: > Hello Minchan, > > -next 4.7.0-rc3-next-20160614 > > > [ 315.146533] kasan: CONFIG_KASAN_INLINE enabled > [ 315.146538] kasan: GPF could be caused by NULL-ptr deref or user memory access > [ 315.146546] general protection fault: 0000 [#1] PREEMPT SMP KASAN > [ 315.146576] Modules
2016 Jun 15
2
[PATCH v7 00/12] Support non-lru page migration
Hi Sergey, On Wed, Jun 15, 2016 at 04:59:09PM +0900, Sergey Senozhatsky wrote: > Hello Minchan, > > -next 4.7.0-rc3-next-20160614 > > > [ 315.146533] kasan: CONFIG_KASAN_INLINE enabled > [ 315.146538] kasan: GPF could be caused by NULL-ptr deref or user memory access > [ 315.146546] general protection fault: 0000 [#1] PREEMPT SMP KASAN > [ 315.146576] Modules
2016 Jun 16
0
[PATCH v7 00/12] Support non-lru page migration
.... reproduced. a bit different call stack this time. but the problem is still the same. zs_compact() ... 6371: e8 00 00 00 00 callq 6376 <zs_compact+0x22b> 6376: 0f 0b ud2 6378: 48 8b 95 a8 fe ff ff mov -0x158(%rbp),%rdx 637f: 4d 8d 74 24 78 lea 0x78(%r12),%r14 6384: 4c 89 ee mov %r13,%rsi 6387: 4c 89 e7 mov %r12,%rdi 638a: e8 86 c7 ff ff callq 2b15 <get_first_obj_offset> 638f: 41 89 c5 mov %ea...