search for: invalid_op

Displaying 20 results from an estimated 24 matches for "invalid_op".

2023 Feb 17
1
[PATCH] ocfs2: fix defrag path triggering jbd2 ASSERT
...; #0 [ffffb25d8dad3900] machine_kexec at ffffffff8386fe01 #1 [ffffb25d8dad3958] __crash_kexec at ffffffff8395959d #2 [ffffb25d8dad3a20] crash_kexec at ffffffff8395a45d #3 [ffffb25d8dad3a38] oops_end at ffffffff83836d3f #4 [ffffb25d8dad3a58] do_trap at ffffffff83833205 #5 [ffffb25d8dad3aa0] do_invalid_op at ffffffff83833aa6 #6 [ffffb25d8dad3ac0] invalid_op at ffffffff84200d18 [exception RIP: jbd2_journal_dirty_metadata+0x2ba] RIP: ffffffffc09ca54a RSP: ffffb25d8dad3b70 RFLAGS: 00010207 RAX: 0000000000000000 RBX: ffff9706eedc5248 RCX: 0000000000000000 RDX: 0000000000000001 RSI:...
2012 Sep 11
0
[PATCH 1/3] x86/hvm: don't use indirect calls without need
...ent_register cs; - hvm_get_segment_register(v, x86_seg_cs, &cs); - if ( vmxop_check ) { if ( !(v->arch.hvm_vcpu.guest_cr[0] & X86_CR0_PE) || @@ -302,6 +300,8 @@ static int vmx_inst_check_privilege(stru else if ( !vcpu_2_nvmx(v).vmxon_region_pa ) goto invalid_op; + vmx_get_segment_register(v, x86_seg_cs, &cs); + if ( (regs->eflags & X86_EFLAGS_VM) || (hvm_long_mode_enabled(v) && cs.attr.fields.l == 0) ) goto invalid_op; @@ -358,13 +358,13 @@ static int decode_vmx_inst(struct cpu_us if ( hvm_long_mo...
2017 Jul 11
2
[regression drm/noveau] suspend to ram -> BOOM: exception RIP: drm_calc_vbltimestamp_from_scanoutpos+335
...0000000006 ORIG_RAX: ffffffffffffffff CS: 0010 SS: 0018 #7 [ffffc900039f7910] report_bug at ffffffff81672248 #8 [ffffc900039f7938] fixup_bug at ffffffff8101af85 #9 [ffffc900039f7950] do_trap at ffffffff8101b0d9 #10 [ffffc900039f79a0] do_error_trap at ffffffff8101b190 #11 [ffffc900039f7a50] invalid_op at ffffffff8169063e [exception RIP: drm_calc_vbltimestamp_from_scanoutpos+335] RIP: ffffffffa020af0f RSP: ffffc900039f7b00 RFLAGS: 00010086 RAX: ffffffffa04fa100 RBX: ffff8803f9550800 RCX: 0000000000000001 RDX: ffffffffa0228a58 RSI: 0000000000000001 RDI: ffffffffa022321b R...
1997 Nov 13
0
Linux F00F Patch [Forwarded e-mail from Aleph One]
...linux/arch/i386/mm/fault.c Wed Nov 12 11:09:55 1997 @@ -74,6 +74,25 @@ return 0; } +asmlinkage void divide_error(void); +asmlinkage void debug(void); +asmlinkage void nmi(void); +asmlinkage void int3(void); +asmlinkage void overflow(void); +asmlinkage void bounds(void); +asmlinkage void invalid_op(void); + +asmlinkage void do_divide_error (struct pt_regs *, unsigned long); +asmlinkage void do_debug (struct pt_regs *, unsigned long); +asmlinkage void do_nmi (struct pt_regs *, unsigned long); +asmlinkage void do_int3 (struct pt_regs *, unsigned long); +asmlinkage void do_overflow (struct pt_re...
2014 Oct 20
1
Virtio_config BUG with 3.18-rc1
...r_trap+0xa6/0x180 [ 2.234004] [<ffffffffa0210032>] ? virtio_device_ready.part.12+0x4/0x6 [virtio_console] [ 2.234004] [<ffffffff81736032>] ? klist_add_tail+0x32/0x40 [ 2.234004] [<ffffffff81495149>] ? device_add+0x219/0x630 [ 2.234004] [<ffffffff81014d10>] do_invalid_op+0x20/0x30 [ 2.234004] [<ffffffff8174cf9e>] invalid_op+0x1e/0x30 [ 2.234004] [<ffffffffa0210032>] ? virtio_device_ready.part.12+0x4/0x6 [virtio_console] [ 2.234004] [<ffffffffa0031109>] ? vp_get_status+0x19/0x20 [virtio_pci] [ 2.234004] [<ffffffffa020f757>] ad...
2014 Oct 20
1
Virtio_config BUG with 3.18-rc1
...r_trap+0xa6/0x180 [ 2.234004] [<ffffffffa0210032>] ? virtio_device_ready.part.12+0x4/0x6 [virtio_console] [ 2.234004] [<ffffffff81736032>] ? klist_add_tail+0x32/0x40 [ 2.234004] [<ffffffff81495149>] ? device_add+0x219/0x630 [ 2.234004] [<ffffffff81014d10>] do_invalid_op+0x20/0x30 [ 2.234004] [<ffffffff8174cf9e>] invalid_op+0x1e/0x30 [ 2.234004] [<ffffffffa0210032>] ? virtio_device_ready.part.12+0x4/0x6 [virtio_console] [ 2.234004] [<ffffffffa0031109>] ? vp_get_status+0x19/0x20 [virtio_pci] [ 2.234004] [<ffffffffa020f757>] ad...
2010 Oct 24
0
BUG: soft lockup - CPU#7 stuck for 61s! [udisks-dm-expor:11772]
...? _spin_unlock_irqrestore+0xd/0xe [22077.214046]  [<ffffffff8104f2a5>] ? release_console_sem+0x17e/0x1af [22077.214105]  [<ffffffff8130beda>] ? _spin_unlock_irqrestore+0xd/0xe [22077.214164]  [<ffffffff8130cd7d>] ? oops_end+0xaf/0xb4 [22077.214222]  [<ffffffff810135f0>] ? do_invalid_op+0x8b/0x95 [22077.214279]  [<ffffffff8100c60c>] ? pin_pagetable_pfn+0x2d/0x36 [22077.214338]  [<ffffffff810bacff>] ? __alloc_pages_nodemask+0x11c/0x5f5 [22077.214397]  [<ffffffff8101293b>] ? invalid_op+0x1b/0x20 [22077.214454]  [<ffffffff8100c60c>] ? pin_pagetable_pfn+0x2d/0x...
2017 Jul 11
0
[regression drm/noveau] suspend to ram -> BOOM: exception RIP: drm_calc_vbltimestamp_from_scanoutpos+335
...ffffffffffffffff CS: 0010 SS: 0018 > #7 [ffffc900039f7910] report_bug at ffffffff81672248 > #8 [ffffc900039f7938] fixup_bug at ffffffff8101af85 > #9 [ffffc900039f7950] do_trap at ffffffff8101b0d9 > #10 [ffffc900039f79a0] do_error_trap at ffffffff8101b190 > #11 [ffffc900039f7a50] invalid_op at ffffffff8169063e > [exception RIP: drm_calc_vbltimestamp_from_scanoutpos+335] > RIP: ffffffffa020af0f RSP: ffffc900039f7b00 RFLAGS: 00010086 > RAX: ffffffffa04fa100 RBX: ffff8803f9550800 RCX: 0000000000000001 > RDX: ffffffffa0228a58 RSI: 0000000000000001 RDI: ff...
2023 Feb 28
0
[merged mm-hotfixes-stable] ocfs2-fix-defrag-path-triggering-jbd2-assert.patch removed from -mm tree
...; #0 [ffffb25d8dad3900] machine_kexec at ffffffff8386fe01 #1 [ffffb25d8dad3958] __crash_kexec at ffffffff8395959d #2 [ffffb25d8dad3a20] crash_kexec at ffffffff8395a45d #3 [ffffb25d8dad3a38] oops_end at ffffffff83836d3f #4 [ffffb25d8dad3a58] do_trap at ffffffff83833205 #5 [ffffb25d8dad3aa0] do_invalid_op at ffffffff83833aa6 #6 [ffffb25d8dad3ac0] invalid_op at ffffffff84200d18 [exception RIP: jbd2_journal_dirty_metadata+0x2ba] RIP: ffffffffc09ca54a RSP: ffffb25d8dad3b70 RFLAGS: 00010207 RAX: 0000000000000000 RBX: ffff9706eedc5248 RCX: 0000000000000000 RDX: 0000000000000001 RSI:...
2023 Mar 06
0
Patch "ocfs2: fix defrag path triggering jbd2 ASSERT" has been added to the 6.2-stable tree
...; #0 [ffffb25d8dad3900] machine_kexec at ffffffff8386fe01 #1 [ffffb25d8dad3958] __crash_kexec at ffffffff8395959d #2 [ffffb25d8dad3a20] crash_kexec at ffffffff8395a45d #3 [ffffb25d8dad3a38] oops_end at ffffffff83836d3f #4 [ffffb25d8dad3a58] do_trap at ffffffff83833205 #5 [ffffb25d8dad3aa0] do_invalid_op at ffffffff83833aa6 #6 [ffffb25d8dad3ac0] invalid_op at ffffffff84200d18 [exception RIP: jbd2_journal_dirty_metadata+0x2ba] RIP: ffffffffc09ca54a RSP: ffffb25d8dad3b70 RFLAGS: 00010207 RAX: 0000000000000000 RBX: ffff9706eedc5248 RCX: 0000000000000000 RDX: 0000000000000001 RSI:...
2023 Mar 06
0
Patch "ocfs2: fix defrag path triggering jbd2 ASSERT" has been added to the 5.15-stable tree
...; #0 [ffffb25d8dad3900] machine_kexec at ffffffff8386fe01 #1 [ffffb25d8dad3958] __crash_kexec at ffffffff8395959d #2 [ffffb25d8dad3a20] crash_kexec at ffffffff8395a45d #3 [ffffb25d8dad3a38] oops_end at ffffffff83836d3f #4 [ffffb25d8dad3a58] do_trap at ffffffff83833205 #5 [ffffb25d8dad3aa0] do_invalid_op at ffffffff83833aa6 #6 [ffffb25d8dad3ac0] invalid_op at ffffffff84200d18 [exception RIP: jbd2_journal_dirty_metadata+0x2ba] RIP: ffffffffc09ca54a RSP: ffffb25d8dad3b70 RFLAGS: 00010207 RAX: 0000000000000000 RBX: ffff9706eedc5248 RCX: 0000000000000000 RDX: 0000000000000001 RSI:...
2023 Mar 06
0
Patch "ocfs2: fix defrag path triggering jbd2 ASSERT" has been added to the 5.10-stable tree
...; #0 [ffffb25d8dad3900] machine_kexec at ffffffff8386fe01 #1 [ffffb25d8dad3958] __crash_kexec at ffffffff8395959d #2 [ffffb25d8dad3a20] crash_kexec at ffffffff8395a45d #3 [ffffb25d8dad3a38] oops_end at ffffffff83836d3f #4 [ffffb25d8dad3a58] do_trap at ffffffff83833205 #5 [ffffb25d8dad3aa0] do_invalid_op at ffffffff83833aa6 #6 [ffffb25d8dad3ac0] invalid_op at ffffffff84200d18 [exception RIP: jbd2_journal_dirty_metadata+0x2ba] RIP: ffffffffc09ca54a RSP: ffffb25d8dad3b70 RFLAGS: 00010207 RAX: 0000000000000000 RBX: ffff9706eedc5248 RCX: 0000000000000000 RDX: 0000000000000001 RSI:...
2023 Mar 06
0
Patch "ocfs2: fix defrag path triggering jbd2 ASSERT" has been added to the 5.4-stable tree
...; #0 [ffffb25d8dad3900] machine_kexec at ffffffff8386fe01 #1 [ffffb25d8dad3958] __crash_kexec at ffffffff8395959d #2 [ffffb25d8dad3a20] crash_kexec at ffffffff8395a45d #3 [ffffb25d8dad3a38] oops_end at ffffffff83836d3f #4 [ffffb25d8dad3a58] do_trap at ffffffff83833205 #5 [ffffb25d8dad3aa0] do_invalid_op at ffffffff83833aa6 #6 [ffffb25d8dad3ac0] invalid_op at ffffffff84200d18 [exception RIP: jbd2_journal_dirty_metadata+0x2ba] RIP: ffffffffc09ca54a RSP: ffffb25d8dad3b70 RFLAGS: 00010207 RAX: 0000000000000000 RBX: ffff9706eedc5248 RCX: 0000000000000000 RDX: 0000000000000001 RSI:...
2023 Mar 06
0
Patch "ocfs2: fix defrag path triggering jbd2 ASSERT" has been added to the 4.19-stable tree
...; #0 [ffffb25d8dad3900] machine_kexec at ffffffff8386fe01 #1 [ffffb25d8dad3958] __crash_kexec at ffffffff8395959d #2 [ffffb25d8dad3a20] crash_kexec at ffffffff8395a45d #3 [ffffb25d8dad3a38] oops_end at ffffffff83836d3f #4 [ffffb25d8dad3a58] do_trap at ffffffff83833205 #5 [ffffb25d8dad3aa0] do_invalid_op at ffffffff83833aa6 #6 [ffffb25d8dad3ac0] invalid_op at ffffffff84200d18 [exception RIP: jbd2_journal_dirty_metadata+0x2ba] RIP: ffffffffc09ca54a RSP: ffffb25d8dad3b70 RFLAGS: 00010207 RAX: 0000000000000000 RBX: ffff9706eedc5248 RCX: 0000000000000000 RDX: 0000000000000001 RSI:...
2023 Mar 06
0
Patch "ocfs2: fix defrag path triggering jbd2 ASSERT" has been added to the 4.14-stable tree
...; #0 [ffffb25d8dad3900] machine_kexec at ffffffff8386fe01 #1 [ffffb25d8dad3958] __crash_kexec at ffffffff8395959d #2 [ffffb25d8dad3a20] crash_kexec at ffffffff8395a45d #3 [ffffb25d8dad3a38] oops_end at ffffffff83836d3f #4 [ffffb25d8dad3a58] do_trap at ffffffff83833205 #5 [ffffb25d8dad3aa0] do_invalid_op at ffffffff83833aa6 #6 [ffffb25d8dad3ac0] invalid_op at ffffffff84200d18 [exception RIP: jbd2_journal_dirty_metadata+0x2ba] RIP: ffffffffc09ca54a RSP: ffffb25d8dad3b70 RFLAGS: 00010207 RAX: 0000000000000000 RBX: ffff9706eedc5248 RCX: 0000000000000000 RDX: 0000000000000001 RSI:...
2023 Feb 23
0
+ ocfs2-fix-defrag-path-triggering-jbd2-assert.patch added to mm-hotfixes-unstable branch
...; #0 [ffffb25d8dad3900] machine_kexec at ffffffff8386fe01 #1 [ffffb25d8dad3958] __crash_kexec at ffffffff8395959d #2 [ffffb25d8dad3a20] crash_kexec at ffffffff8395a45d #3 [ffffb25d8dad3a38] oops_end at ffffffff83836d3f #4 [ffffb25d8dad3a58] do_trap at ffffffff83833205 #5 [ffffb25d8dad3aa0] do_invalid_op at ffffffff83833aa6 #6 [ffffb25d8dad3ac0] invalid_op at ffffffff84200d18 [exception RIP: jbd2_journal_dirty_metadata+0x2ba] RIP: ffffffffc09ca54a RSP: ffffb25d8dad3b70 RFLAGS: 00010207 RAX: 0000000000000000 RBX: ffff9706eedc5248 RCX: 0000000000000000 RDX: 0000000000000001 RSI:...
2018 Apr 23
3
[Bug 1247] New: Module crash due to broken count
...e/0x80 [ 782.525558] fixup_exception+0x33/0x40 [ 782.525563] do_trap+0x83/0x140 [ 782.525565] do_error_trap+0x83/0xf0 [ 782.525568] ? ip_vs_conn_drop_conntrack+0x120/0x1a5 [ip_vs] [ 782.525574] ? ip_finish_output2+0x29c/0x390 [ 782.525575] ? ip_finish_output2+0x1a2/0x390 [ 782.525580] invalid_op+0x1b/0x40 [ 782.525582] RIP: 0010:ip_vs_conn_put+0x31/0x40 [ip_vs] [ 782.525583] RSP: 0000:ffffa344dde03bb8 EFLAGS: 00010246 [ 782.525584] RAX: 0000000000000001 RBX: ffffa344df31cf00 RCX: ffffa344d7450198 [ 782.525585] RDX: 0000000000000003 RSI: 00000000fffffe01 RDI: ffffa344d7450140 [ 782.525...
2012 May 24
11
[PATCH 0/3] XEN: fix vmx exception mistake
This series of patches fix the mistake for debug exception(#DB), overflow exception(#OF) and INT3(#BP), INTn instruction emulation. Introduce new function vmx_inject_sw_exception() which deliver the software excetion, software interrupt and privileged software exception. Split hardware exception as a seperate function(old function vmx_inject_hw_exception()). Also Passed down intruction length
2012 Jul 25
9
Regression in kernel 3.5 as Dom0 regarding PCI Passthrough?!
Hi! i notice a serious regression with 3.5 as Dom0 kernel (3.4 was rock stable): 1st: only the GPU PCI Passthrough works, the PCI USB Controller is not recognized within the DomU (HVM Win7 64) Dom0 cmdline is: ro root=LABEL=dom0root xen-pciback.hide=(08:00.0)(08:00.1)(00:1d.0)(00:1d.1)(00:1d.2)(00:1d.7) security=apparmor noirqdebug nouveau.msi=1 Only 8:00.0 and 8:00.1 get passed through
2012 May 30
12
[PATCH v2 0/4] XEN: fix vmx exception mistake
Changes from v1: - Define new struct hvm_trap to represent information of trap, include instruction length. - Renames hvm_inject_exception to hvm_inject_trap. Then define a couple of wrappers around that function for existing callers, so that their parameter lists actually *shrink*. This series of patches fix the mistake for debug exception(#DB), overflow exception(#OF) and INT3(#BP),