Displaying 14 results from an estimated 14 matches for "__die".
2013 Nov 20
0
[PATCH -tip v3 18/23] x86/dumpstack: Use NOKPROBE_SYMBOL macro in dumpstack.c
...gs *regs, int signr)
{
if (regs && kexec_should_crash(current))
crash_kexec(regs);
@@ -247,8 +248,9 @@ void __kprobes oops_end(unsigned long flags, struct pt_regs *regs, int signr)
panic("Fatal exception");
do_exit(signr);
}
+NOKPROBE_SYMBOL(oops_end);
-int __kprobes __die(const char *str, struct pt_regs *regs, long err)
+int __die(const char *str, struct pt_regs *regs, long err)
{
#ifdef CONFIG_X86_32
unsigned short ss;
@@ -291,6 +293,7 @@ int __kprobes __die(const char *str, struct pt_regs *regs, long err)
#endif
return 0;
}
+NOKPROBE_SYMBOL(__die);
/*...
2023 Jul 26
1
[PATCH] vdpa/mlx5: Fix crash on shutdown for when no ndev exists
...000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 0000000000000300 CR3: 00000001051cd006 CR4: 0000000000370eb0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
<TASK>
? __die+0x20/0x60
? page_fault_oops+0x14c/0x3c0
? exc_page_fault+0x75/0x140
? asm_exc_page_fault+0x22/0x30
? mlx5v_shutdown+0xe/0x50 [mlx5_vdpa]
device_shutdown+0x13e/0x1e0
kernel_restart+0x36/0x90
__do_sys_reboot+0x141/0x210
? vfs_writev+0xcd/0x140
? handle_mm_fault+0x161/0x260
? do_wr...
2023 Jul 27
1
[PATCH] vdpa/mlx5: Fix crash on shutdown for when no ndev exists
...00000000000300 CR3: 00000001051cd006 CR4: 0000000000370eb0
> > > ?DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
> > > ?DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
> > > ?Call Trace:
> > > ? <TASK>
> > > ? ? __die+0x20/0x60
> > > ? ? page_fault_oops+0x14c/0x3c0
> > > ? ? exc_page_fault+0x75/0x140
> > > ? ? asm_exc_page_fault+0x22/0x30
> > > ? ? mlx5v_shutdown+0xe/0x50 [mlx5_vdpa]
> > > ? device_shutdown+0x13e/0x1e0
> > > ? kernel_restart+0x36/0x90
> &g...
2023 Jul 31
1
[PATCH] vdpa/mlx5: Fix crash on shutdown for when no ndev exists
...001051cd006 CR4: 0000000000370eb0
> > > > ?DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
> > > > ?DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
> > > > ?Call Trace:
> > > > ? <TASK>
> > > > ? ? __die+0x20/0x60
> > > > ? ? page_fault_oops+0x14c/0x3c0
> > > > ? ? exc_page_fault+0x75/0x140
> > > > ? ? asm_exc_page_fault+0x22/0x30
> > > > ? ? mlx5v_shutdown+0xe/0x50 [mlx5_vdpa]
> > > > ? device_shutdown+0x13e/0x1e0
> > > > ? ke...
2023 Jul 31
1
[PATCH] vdpa/mlx5: Fix crash on shutdown for when no ndev exists
...00370eb0
> > > > > ?DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
> > > > > ?DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
> > > > > ?Call Trace:
> > > > > ? <TASK>
> > > > > ? ? __die+0x20/0x60
> > > > > ? ? page_fault_oops+0x14c/0x3c0
> > > > > ? ? exc_page_fault+0x75/0x140
> > > > > ? ? asm_exc_page_fault+0x22/0x30
> > > > > ? ? mlx5v_shutdown+0xe/0x50 [mlx5_vdpa]
> > > > > ? device_shutdown+0x13e/0x1e0...
2023 Aug 01
1
[PATCH] vdpa/mlx5: Fix crash on shutdown for when no ndev exists
...gt; > > DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
> > > > > > DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
> > > > > > Call Trace:
> > > > > > <TASK>
> > > > > > ? __die+0x20/0x60
> > > > > > ? page_fault_oops+0x14c/0x3c0
> > > > > > ? exc_page_fault+0x75/0x140
> > > > > > ? asm_exc_page_fault+0x22/0x30
> > > > > > ? mlx5v_shutdown+0xe/0x50 [mlx5_vdpa]
> > > > > > de...
2023 Aug 01
1
[PATCH] vdpa/mlx5: Fix crash on shutdown for when no ndev exists
...0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
> > > > > > > ?DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
> > > > > > > ?Call Trace:
> > > > > > > ? <TASK>
> > > > > > > ? ? __die+0x20/0x60
> > > > > > > ? ? page_fault_oops+0x14c/0x3c0
> > > > > > > ? ? exc_page_fault+0x75/0x140
> > > > > > > ? ? asm_exc_page_fault+0x22/0x30
> > > > > > > ? ? mlx5v_shutdown+0xe/0x50 [mlx5_vdpa]
> > >...
2010 Apr 23
0
vmcore on 5.4
...--- <exception stack> ---
#3 [ffff810115f2fea8] acpi_processor_idle at ffffffff8019765e
#4 [ffff810115f2fef0] cpu_idle at ffffffff8004939e
PID: 0 TASK: ffff810115f20080 CPU: 2 COMMAND: "swapper"
#0 [ffff810115f6bbc0] crash_kexec at ffffffff800ac5b9
#1 [ffff810115f6bc80] __die at ffffffff80065127
#2 [ffff810115f6bcc0] do_page_fault at ffffffff80066da7
#3 [ffff810115f6bdb0] error_exit at ffffffff8005dde9
[exception RIP: pskb_copy+307]
RIP: ffffffff8022486b RSP: ffff810115f6be60 RFLAGS: 00010282
RAX: ffff81062cd5f540 RBX: ffff81062cac3980 RCX: ffff81046fb...
2010 Sep 17
1
General protection fault
...b_imageblit+0x25/0x30 [vga16fb]
Sep 17 15:26:18 box6 kernel: [ 1948.826084] [<ffffffff81557efa>] printk
+0x41/0x47
Sep 17 15:26:18 box6 kernel: [ 1948.826088] [<ffffffff8155c0ae>] ?
perf_event_nmi_handler+0xe/0x60
Sep 17 15:26:18 box6 kernel: [ 1948.826091] [<ffffffff8155bb08>] __die
+0x48/0xf0
Sep 17 15:26:18 box6 kernel: [ 1948.826095] [<ffffffff81017108>] die
+0x48/0x90
Sep 17 15:26:18 box6 kernel: [ 1948.826098] [<ffffffff8155b7e2>]
do_general_protection+0x152/0x160
Sep 17 15:26:18 box6 kernel: [ 1948.826102] [<ffffffff8155afa5>]
general_protection+0x25...
2013 Nov 15
23
[PATCH -tip RFC v2 00/22] kprobes: introduce NOKPROBE_SYMBOL() and general cleaning of kprobe blacklist
Currently the blacklist is maintained by hand in kprobes.c
which is separated from the function definition and is hard
to catch up the kernel update.
To solve this issue, I've tried to implement new
NOKPROBE_SYMBOL() macro for making kprobe blacklist at
build time. Since the NOKPROBE_SYMBOL() macros can be placed
right after the function is defined, it is easy to maintain.
This series
2013 Nov 15
23
[PATCH -tip RFC v2 00/22] kprobes: introduce NOKPROBE_SYMBOL() and general cleaning of kprobe blacklist
Currently the blacklist is maintained by hand in kprobes.c
which is separated from the function definition and is hard
to catch up the kernel update.
To solve this issue, I've tried to implement new
NOKPROBE_SYMBOL() macro for making kprobe blacklist at
build time. Since the NOKPROBE_SYMBOL() macros can be placed
right after the function is defined, it is easy to maintain.
This series
2013 Nov 20
28
[PATCH -tip v3 00/23] kprobes: introduce NOKPROBE_SYMBOL() and general cleaning of kprobe blacklist
Hi,
Here is the version 3 of NOKPORBE_SYMBOL series.
Currently the blacklist is maintained by hand in kprobes.c
which is separated from the function definition and is hard
to catch up the kernel update.
To solve this issue, I've introduced NOKPROBE_SYMBOL() macro
for making kprobe blacklist at build time. Since the
NOKPROBE_SYMBOL() macros can be placed right after the
function is defined
2013 Nov 20
28
[PATCH -tip v3 00/23] kprobes: introduce NOKPROBE_SYMBOL() and general cleaning of kprobe blacklist
Hi,
Here is the version 3 of NOKPORBE_SYMBOL series.
Currently the blacklist is maintained by hand in kprobes.c
which is separated from the function definition and is hard
to catch up the kernel update.
To solve this issue, I've introduced NOKPROBE_SYMBOL() macro
for making kprobe blacklist at build time. Since the
NOKPROBE_SYMBOL() macros can be placed right after the
function is defined
2013 Oct 06
40
[xen] double fault: 0000 [#1] PREEMPT SMP DEBUG_PAGEALLOC
...0000 0000000000000040 ffff88000f005ec8 ffffffff8102c039
[ 4.140042] Call Trace:
[ 4.140042] <#DF>
[ 4.140042] [<ffffffff8102c039>] show_regs+0x70/0x1d8
[ 4.140042] [<ffffffff810aa597>] ? atomic_notifier_call_chain+0xf/0x11
[ 4.140042] [<ffffffff8102cf01>] __die+0xaa/0xe9
[ 4.140042] [<ffffffff8102cf82>] die+0x42/0x5e
[ 4.140042] [<ffffffff8102aadb>] do_double_fault+0x5f/0x61
[ 4.140042] [<ffffffff8185a39d>] double_fault+0x2d/0x40
[ 4.140042] <<EOE>>
[ 4.140042] Code: 4d 8b 76 f8 e8 e4 f9 81 00 eb 09 41 f7...