Displaying 5 results from an estimated 5 matches for "637f".
Did you mean:
637
2016 Jun 16
2
[PATCH v7 00/12] Support non-lru page migration
...k this time. but the problem is
> still the same.
>
> zs_compact()
> ...
> 6371: e8 00 00 00 00 callq 6376 <zs_compact+0x22b>
> 6376: 0f 0b ud2
> 6378: 48 8b 95 a8 fe ff ff mov -0x158(%rbp),%rdx
> 637f: 4d 8d 74 24 78 lea 0x78(%r12),%r14
> 6384: 4c 89 ee mov %r13,%rsi
> 6387: 4c 89 e7 mov %r12,%rdi
> 638a: e8 86 c7 ff ff callq 2b15 <get_first_obj_offset>
> 638f: 41 89 c5...
2016 Jun 16
2
[PATCH v7 00/12] Support non-lru page migration
...k this time. but the problem is
> still the same.
>
> zs_compact()
> ...
> 6371: e8 00 00 00 00 callq 6376 <zs_compact+0x22b>
> 6376: 0f 0b ud2
> 6378: 48 8b 95 a8 fe ff ff mov -0x158(%rbp),%rdx
> 637f: 4d 8d 74 24 78 lea 0x78(%r12),%r14
> 6384: 4c 89 ee mov %r13,%rsi
> 6387: 4c 89 e7 mov %r12,%rdi
> 638a: e8 86 c7 ff ff callq 2b15 <get_first_obj_offset>
> 638f: 41 89 c5...
2016 Jun 15
2
[PATCH v7 00/12] Support non-lru page migration
Hi Sergey,
On Wed, Jun 15, 2016 at 04:59:09PM +0900, Sergey Senozhatsky wrote:
> Hello Minchan,
>
> -next 4.7.0-rc3-next-20160614
>
>
> [ 315.146533] kasan: CONFIG_KASAN_INLINE enabled
> [ 315.146538] kasan: GPF could be caused by NULL-ptr deref or user memory access
> [ 315.146546] general protection fault: 0000 [#1] PREEMPT SMP KASAN
> [ 315.146576] Modules
2016 Jun 15
2
[PATCH v7 00/12] Support non-lru page migration
Hi Sergey,
On Wed, Jun 15, 2016 at 04:59:09PM +0900, Sergey Senozhatsky wrote:
> Hello Minchan,
>
> -next 4.7.0-rc3-next-20160614
>
>
> [ 315.146533] kasan: CONFIG_KASAN_INLINE enabled
> [ 315.146538] kasan: GPF could be caused by NULL-ptr deref or user memory access
> [ 315.146546] general protection fault: 0000 [#1] PREEMPT SMP KASAN
> [ 315.146576] Modules
2016 Jun 16
0
[PATCH v7 00/12] Support non-lru page migration
....
reproduced. a bit different call stack this time. but the problem is
still the same.
zs_compact()
...
6371: e8 00 00 00 00 callq 6376 <zs_compact+0x22b>
6376: 0f 0b ud2
6378: 48 8b 95 a8 fe ff ff mov -0x158(%rbp),%rdx
637f: 4d 8d 74 24 78 lea 0x78(%r12),%r14
6384: 4c 89 ee mov %r13,%rsi
6387: 4c 89 e7 mov %r12,%rdi
638a: e8 86 c7 ff ff callq 2b15 <get_first_obj_offset>
638f: 41 89 c5 mov %ea...