search for: __vfs_read

Displaying 16 results from an estimated 16 matches for "__vfs_read".

2016 May 25
3
[PATCH] x86/paravirt: Do not trace _paravirt_ident_*() functions
...fff810ab741>] __do_page_fault+0x1b1/0x4e0 [<ffffffff810aba92>] do_page_fault+0x22/0x30 [<ffffffff81cc7f68>] page_fault+0x28/0x30 [<ffffffff81574af5>] ? copy_user_enhanced_fast_string+0x5/0x10 [<ffffffff8129dec5>] ? seq_read+0x305/0x370 [<ffffffff81279668>] __vfs_read+0x28/0xe0 [<ffffffff81279645>] ? __vfs_read+0x5/0xe0 [<ffffffff81279645>] ? __vfs_read+0x5/0xe0 [<ffffffff81279df6>] vfs_read+0x86/0x130 [<ffffffff8127b216>] SyS_read+0x46/0xa0 [<ffffffff81cc6176>] entry_SYSCALL_64_fastpath+0x1e/0xa8 Code: 12 48 c1 ea 0c 83...
2016 May 25
3
[PATCH] x86/paravirt: Do not trace _paravirt_ident_*() functions
...fff810ab741>] __do_page_fault+0x1b1/0x4e0 [<ffffffff810aba92>] do_page_fault+0x22/0x30 [<ffffffff81cc7f68>] page_fault+0x28/0x30 [<ffffffff81574af5>] ? copy_user_enhanced_fast_string+0x5/0x10 [<ffffffff8129dec5>] ? seq_read+0x305/0x370 [<ffffffff81279668>] __vfs_read+0x28/0xe0 [<ffffffff81279645>] ? __vfs_read+0x5/0xe0 [<ffffffff81279645>] ? __vfs_read+0x5/0xe0 [<ffffffff81279df6>] vfs_read+0x86/0x130 [<ffffffff8127b216>] SyS_read+0x46/0xa0 [<ffffffff81cc6176>] entry_SYSCALL_64_fastpath+0x1e/0xa8 Code: 12 48 c1 ea 0c 83...
2016 Sep 02
0
[PATCH] x86/paravirt: Do not trace _paravirt_ident_*() functions
...e_fault+0x1b1/0x4e0 > [<ffffffff810aba92>] do_page_fault+0x22/0x30 > [<ffffffff81cc7f68>] page_fault+0x28/0x30 > [<ffffffff81574af5>] ? copy_user_enhanced_fast_string+0x5/0x10 > [<ffffffff8129dec5>] ? seq_read+0x305/0x370 > [<ffffffff81279668>] __vfs_read+0x28/0xe0 > [<ffffffff81279645>] ? __vfs_read+0x5/0xe0 > [<ffffffff81279645>] ? __vfs_read+0x5/0xe0 > [<ffffffff81279df6>] vfs_read+0x86/0x130 > [<ffffffff8127b216>] SyS_read+0x46/0xa0 > [<ffffffff81cc6176>] entry_SYSCALL_64_fastpath+0x1e/0xa8...
2017 Dec 06
2
[PATCH] ptr_ring: Add barriers to fix NULL-pointer exception
...lt;ffff000008a79488>] skb_release_all+0x20/0x40 [35322.697663] [<ffff000008a79678>] consume_skb+0x38/0xd8 [35322.708120] [<ffff000008812f24>] tun_do_read.part.9+0x20c/0x4f0 [35322.720149] [<ffff0000088133f0>] tun_chr_read_iter+0xc0/0xe0 [35322.731638] [<ffff000008288f80>] __vfs_read+0x100/0x160 [35322.742249] [<ffff00000828a224>] vfs_read+0x8c/0x148 [35322.752344] [<ffff00000828b464>] SyS_read+0x6c/0xd8 [35322.762263] [<ffff0000080833f0>] el0_svc_naked+0x24/0x28 [35322.773042] Code: d503201f f9400e93 b940e280 91051274 (f9403261) Reported-by: Joseph DeVincent...
2017 Dec 06
2
[PATCH] ptr_ring: Add barriers to fix NULL-pointer exception
...lt;ffff000008a79488>] skb_release_all+0x20/0x40 [35322.697663] [<ffff000008a79678>] consume_skb+0x38/0xd8 [35322.708120] [<ffff000008812f24>] tun_do_read.part.9+0x20c/0x4f0 [35322.720149] [<ffff0000088133f0>] tun_chr_read_iter+0xc0/0xe0 [35322.731638] [<ffff000008288f80>] __vfs_read+0x100/0x160 [35322.742249] [<ffff00000828a224>] vfs_read+0x8c/0x148 [35322.752344] [<ffff00000828b464>] SyS_read+0x6c/0xd8 [35322.762263] [<ffff0000080833f0>] el0_svc_naked+0x24/0x28 [35322.773042] Code: d503201f f9400e93 b940e280 91051274 (f9403261) Reported-by: Joseph DeVincent...
2017 Jan 24
1
[PATCH 2/2] drm/nouveau: Queue hpd_work on (runtime) resume
...ce6b>] pci_config_pm_runtime_get+0x3b/0x60 [ 246.899922] [<ffffffff8c4d1bac>] pci_read_config+0x7c/0x260 [ 246.899927] [<ffffffff8c30fe60>] sysfs_kf_bin_read+0x50/0x80 [ 246.899929] [<ffffffff8c30f91a>] kernfs_fop_read+0xba/0x1c0 [ 246.899934] [<ffffffff8c277d98>] __vfs_read+0x28/0x130 [ 246.899939] [<ffffffff8c3cb7be>] ? security_file_permission+0x9e/0xc0 [ 246.899942] [<ffffffff8c278dee>] ? rw_verify_area+0x4e/0xc0 [ 246.899945] [<ffffffff8c278ef6>] vfs_read+0x96/0x140 [ 246.899948] [<ffffffff8c27a4ba>] SyS_pread64+0x7a/0x90 [ 246.899...
2017 Jun 05
0
BUG: KASAN: use-after-free in free_old_xmit_skbs
...0 > > [ 310.131110] sock_write_iter+0x2e4/0x6a0 > > [ 310.132433] ? core_sys_select+0x47d/0x780 > > [ 310.133779] ? sock_sendmsg+0xf0/0xf0 > > [ 310.134591] __vfs_write+0x4e0/0x960 > > [ 310.135351] ? kvm_clock_get_cycles+0x1e/0x20 > > [ 310.136160] ? __vfs_read+0x950/0x950 > > [ 310.136931] ? rw_verify_area+0xbd/0x2b0 > > [ 310.137711] vfs_write+0x155/0x4b0 > > [ 310.138454] SyS_write+0xf7/0x240 > > [ 310.139183] ? SyS_read+0x240/0x240 > > [ 310.139922] ? SyS_read+0x240/0x240 > > [ 310.140649] do_syscall_64+...
2017 Jun 05
0
BUG: KASAN: use-after-free in free_old_xmit_skbs
...0 > > [ 310.131110] sock_write_iter+0x2e4/0x6a0 > > [ 310.132433] ? core_sys_select+0x47d/0x780 > > [ 310.133779] ? sock_sendmsg+0xf0/0xf0 > > [ 310.134591] __vfs_write+0x4e0/0x960 > > [ 310.135351] ? kvm_clock_get_cycles+0x1e/0x20 > > [ 310.136160] ? __vfs_read+0x950/0x950 > > [ 310.136931] ? rw_verify_area+0xbd/0x2b0 > > [ 310.137711] vfs_write+0x155/0x4b0 > > [ 310.138454] SyS_write+0xf7/0x240 > > [ 310.139183] ? SyS_read+0x240/0x240 > > [ 310.139922] ? SyS_read+0x240/0x240 > > [ 310.140649] do_syscall_64+...
2017 Dec 03
0
nouveau: refcount_t splat on 4.15-rc1 on nv50
...fffffffc05f6000 [ 8.209938] do_one_initcall+0x4b/0x190 [ 8.209941] ? _cond_resched+0x15/0x40 [ 8.209943] ? kmem_cache_alloc_trace+0x103/0x1e0 [ 8.209947] ? do_init_module+0x22/0x201 [ 8.209949] do_init_module+0x5b/0x201 [ 8.209951] load_module+0x242b/0x2b20 [ 8.209953] ? __vfs_read+0xd2/0x140 [ 8.209956] ? SYSC_finit_module+0x90/0xb0 [ 8.209958] SYSC_finit_module+0x90/0xb0 [ 8.209961] entry_SYSCALL_64_fastpath+0x1e/0x81 [ 8.209963] RIP: 0033:0x7f19ed6365b9 [ 8.209965] RSP: 002b:00007ffc34049688 EFLAGS: 00000246 ORIG_RAX: 0000000000000139 [ 8.209967] RAX:...
2017 Dec 06
0
[PATCH] ptr_ring: Add barriers to fix NULL-pointer exception
...gt;] skb_release_all+0x20/0x40 > [35322.697663] [<ffff000008a79678>] consume_skb+0x38/0xd8 > [35322.708120] [<ffff000008812f24>] tun_do_read.part.9+0x20c/0x4f0 > [35322.720149] [<ffff0000088133f0>] tun_chr_read_iter+0xc0/0xe0 > [35322.731638] [<ffff000008288f80>] __vfs_read+0x100/0x160 > [35322.742249] [<ffff00000828a224>] vfs_read+0x8c/0x148 > [35322.752344] [<ffff00000828b464>] SyS_read+0x6c/0xd8 > [35322.762263] [<ffff0000080833f0>] el0_svc_naked+0x24/0x28 > [35322.773042] Code: d503201f f9400e93 b940e280 91051274 (f9403261) > >...
2017 Dec 06
1
[PATCH] ptr_ring: Add barriers to fix NULL-pointer exception
...gt;] skb_release_all+0x20/0x40 > [35322.697663] [<ffff000008a79678>] consume_skb+0x38/0xd8 > [35322.708120] [<ffff000008812f24>] tun_do_read.part.9+0x20c/0x4f0 > [35322.720149] [<ffff0000088133f0>] tun_chr_read_iter+0xc0/0xe0 > [35322.731638] [<ffff000008288f80>] __vfs_read+0x100/0x160 > [35322.742249] [<ffff00000828a224>] vfs_read+0x8c/0x148 > [35322.752344] [<ffff00000828b464>] SyS_read+0x6c/0xd8 > [35322.762263] [<ffff0000080833f0>] el0_svc_naked+0x24/0x28 > [35322.773042] Code: d503201f f9400e93 b940e280 91051274 (f9403261) > >...
2017 Dec 06
1
[PATCH] ptr_ring: Add barriers to fix NULL-pointer exception
...gt;] skb_release_all+0x20/0x40 > [35322.697663] [<ffff000008a79678>] consume_skb+0x38/0xd8 > [35322.708120] [<ffff000008812f24>] tun_do_read.part.9+0x20c/0x4f0 > [35322.720149] [<ffff0000088133f0>] tun_chr_read_iter+0xc0/0xe0 > [35322.731638] [<ffff000008288f80>] __vfs_read+0x100/0x160 > [35322.742249] [<ffff00000828a224>] vfs_read+0x8c/0x148 > [35322.752344] [<ffff00000828b464>] SyS_read+0x6c/0xd8 > [35322.762263] [<ffff0000080833f0>] el0_svc_naked+0x24/0x28 > [35322.773042] Code: d503201f f9400e93 b940e280 91051274 (f9403261) > >...
2016 Nov 21
2
[PATCH 1/2] drm/nouveau: Rename acpi_work to hpd_work
We need to call drm_helper_hpd_irq_event() on resume to properly detect monitor connection / disconnection on some laptops. For runtime-resume (which gets called on resume from normal suspend too) we must call drm_helper_hpd_irq_event() from a workqueue to avoid a deadlock. Rename acpi_work to hpd_work, and move it out of the #ifdef CONFIG_ACPI blocks to make it suitable for generic work.
2014 Oct 26
9
[Bug 85471] New: nouveau/kernel 3.18.0-rc1: nouveau deadlocks on 2nd Xorg start or reboot
https://bugs.freedesktop.org/show_bug.cgi?id=85471 Bug ID: 85471 Summary: nouveau/kernel 3.18.0-rc1: nouveau deadlocks on 2nd Xorg start or reboot Product: xorg Version: unspecified Hardware: x86-64 (AMD64) OS: Linux (All) Status: NEW Severity: major Priority: medium
2017 Oct 25
0
a570843ee9 ("virtio_blk: Fix an SG_IO regression"): kernel BUG at include/linux/scatterlist.h:92!
...blk_serial_show+0x79/0xd7 [ 15.253033] ? virtblk_cache_type_show+0x46/0x46 [ 15.256436] dev_attr_show+0x25/0x49 [ 15.259273] sysfs_kf_seq_show+0x7f/0xcf [ 15.262768] kernfs_seq_show+0x27/0x29 [ 15.265724] seq_read+0x177/0x333 [ 15.268372] kernfs_fop_read+0x3c/0x15d [ 15.271562] __vfs_read+0x26/0x9d [ 15.274213] ? fsnotify_perm+0x63/0x6f [ 15.276933] ? security_file_permission+0x3b/0x42 [ 15.280369] ? rw_verify_area+0x7c/0xb5 [ 15.283008] vfs_read+0xb7/0xef [ 15.285395] SyS_read+0x50/0x7e [ 15.287702] entry_SYSCALL_64_fastpath+0x1f/0xbe [ 15.290831] RIP: 0033:0x7f...
2017 Oct 25
0
a570843ee9 ("virtio_blk: Fix an SG_IO regression"): kernel BUG at include/linux/scatterlist.h:92!
...blk_serial_show+0x79/0xd7 [ 15.253033] ? virtblk_cache_type_show+0x46/0x46 [ 15.256436] dev_attr_show+0x25/0x49 [ 15.259273] sysfs_kf_seq_show+0x7f/0xcf [ 15.262768] kernfs_seq_show+0x27/0x29 [ 15.265724] seq_read+0x177/0x333 [ 15.268372] kernfs_fop_read+0x3c/0x15d [ 15.271562] __vfs_read+0x26/0x9d [ 15.274213] ? fsnotify_perm+0x63/0x6f [ 15.276933] ? security_file_permission+0x3b/0x42 [ 15.280369] ? rw_verify_area+0x7c/0xb5 [ 15.283008] vfs_read+0xb7/0xef [ 15.285395] SyS_read+0x50/0x7e [ 15.287702] entry_SYSCALL_64_fastpath+0x1f/0xbe [ 15.290831] RIP: 0033:0x7f...