Displaying 20 results from an estimated 24 matches for "invalid_op".
2023 Feb 17
1
[PATCH] ocfs2: fix defrag path triggering jbd2 ASSERT
...;
#0 [ffffb25d8dad3900] machine_kexec at ffffffff8386fe01
#1 [ffffb25d8dad3958] __crash_kexec at ffffffff8395959d
#2 [ffffb25d8dad3a20] crash_kexec at ffffffff8395a45d
#3 [ffffb25d8dad3a38] oops_end at ffffffff83836d3f
#4 [ffffb25d8dad3a58] do_trap at ffffffff83833205
#5 [ffffb25d8dad3aa0] do_invalid_op at ffffffff83833aa6
#6 [ffffb25d8dad3ac0] invalid_op at ffffffff84200d18
[exception RIP: jbd2_journal_dirty_metadata+0x2ba]
RIP: ffffffffc09ca54a RSP: ffffb25d8dad3b70 RFLAGS: 00010207
RAX: 0000000000000000 RBX: ffff9706eedc5248 RCX: 0000000000000000
RDX: 0000000000000001 RSI:...
2012 Sep 11
0
[PATCH 1/3] x86/hvm: don't use indirect calls without need
...ent_register cs;
- hvm_get_segment_register(v, x86_seg_cs, &cs);
-
if ( vmxop_check )
{
if ( !(v->arch.hvm_vcpu.guest_cr[0] & X86_CR0_PE) ||
@@ -302,6 +300,8 @@ static int vmx_inst_check_privilege(stru
else if ( !vcpu_2_nvmx(v).vmxon_region_pa )
goto invalid_op;
+ vmx_get_segment_register(v, x86_seg_cs, &cs);
+
if ( (regs->eflags & X86_EFLAGS_VM) ||
(hvm_long_mode_enabled(v) && cs.attr.fields.l == 0) )
goto invalid_op;
@@ -358,13 +358,13 @@ static int decode_vmx_inst(struct cpu_us
if ( hvm_long_mo...
2017 Jul 11
2
[regression drm/noveau] suspend to ram -> BOOM: exception RIP: drm_calc_vbltimestamp_from_scanoutpos+335
...0000000006
ORIG_RAX: ffffffffffffffff CS: 0010 SS: 0018
#7 [ffffc900039f7910] report_bug at ffffffff81672248
#8 [ffffc900039f7938] fixup_bug at ffffffff8101af85
#9 [ffffc900039f7950] do_trap at ffffffff8101b0d9
#10 [ffffc900039f79a0] do_error_trap at ffffffff8101b190
#11 [ffffc900039f7a50] invalid_op at ffffffff8169063e
[exception RIP: drm_calc_vbltimestamp_from_scanoutpos+335]
RIP: ffffffffa020af0f RSP: ffffc900039f7b00 RFLAGS: 00010086
RAX: ffffffffa04fa100 RBX: ffff8803f9550800 RCX: 0000000000000001
RDX: ffffffffa0228a58 RSI: 0000000000000001 RDI: ffffffffa022321b
R...
1997 Nov 13
0
Linux F00F Patch [Forwarded e-mail from Aleph One]
...linux/arch/i386/mm/fault.c Wed Nov 12 11:09:55 1997
@@ -74,6 +74,25 @@
return 0;
}
+asmlinkage void divide_error(void);
+asmlinkage void debug(void);
+asmlinkage void nmi(void);
+asmlinkage void int3(void);
+asmlinkage void overflow(void);
+asmlinkage void bounds(void);
+asmlinkage void invalid_op(void);
+
+asmlinkage void do_divide_error (struct pt_regs *, unsigned long);
+asmlinkage void do_debug (struct pt_regs *, unsigned long);
+asmlinkage void do_nmi (struct pt_regs *, unsigned long);
+asmlinkage void do_int3 (struct pt_regs *, unsigned long);
+asmlinkage void do_overflow (struct pt_re...
2014 Oct 20
1
Virtio_config BUG with 3.18-rc1
...r_trap+0xa6/0x180
[ 2.234004] [<ffffffffa0210032>] ?
virtio_device_ready.part.12+0x4/0x6 [virtio_console]
[ 2.234004] [<ffffffff81736032>] ? klist_add_tail+0x32/0x40
[ 2.234004] [<ffffffff81495149>] ? device_add+0x219/0x630
[ 2.234004] [<ffffffff81014d10>] do_invalid_op+0x20/0x30
[ 2.234004] [<ffffffff8174cf9e>] invalid_op+0x1e/0x30
[ 2.234004] [<ffffffffa0210032>] ?
virtio_device_ready.part.12+0x4/0x6 [virtio_console]
[ 2.234004] [<ffffffffa0031109>] ? vp_get_status+0x19/0x20 [virtio_pci]
[ 2.234004] [<ffffffffa020f757>] ad...
2014 Oct 20
1
Virtio_config BUG with 3.18-rc1
...r_trap+0xa6/0x180
[ 2.234004] [<ffffffffa0210032>] ?
virtio_device_ready.part.12+0x4/0x6 [virtio_console]
[ 2.234004] [<ffffffff81736032>] ? klist_add_tail+0x32/0x40
[ 2.234004] [<ffffffff81495149>] ? device_add+0x219/0x630
[ 2.234004] [<ffffffff81014d10>] do_invalid_op+0x20/0x30
[ 2.234004] [<ffffffff8174cf9e>] invalid_op+0x1e/0x30
[ 2.234004] [<ffffffffa0210032>] ?
virtio_device_ready.part.12+0x4/0x6 [virtio_console]
[ 2.234004] [<ffffffffa0031109>] ? vp_get_status+0x19/0x20 [virtio_pci]
[ 2.234004] [<ffffffffa020f757>] ad...
2010 Oct 24
0
BUG: soft lockup - CPU#7 stuck for 61s! [udisks-dm-expor:11772]
...? _spin_unlock_irqrestore+0xd/0xe
[22077.214046] [<ffffffff8104f2a5>] ? release_console_sem+0x17e/0x1af
[22077.214105] [<ffffffff8130beda>] ? _spin_unlock_irqrestore+0xd/0xe
[22077.214164] [<ffffffff8130cd7d>] ? oops_end+0xaf/0xb4
[22077.214222] [<ffffffff810135f0>] ? do_invalid_op+0x8b/0x95
[22077.214279] [<ffffffff8100c60c>] ? pin_pagetable_pfn+0x2d/0x36
[22077.214338] [<ffffffff810bacff>] ? __alloc_pages_nodemask+0x11c/0x5f5
[22077.214397] [<ffffffff8101293b>] ? invalid_op+0x1b/0x20
[22077.214454] [<ffffffff8100c60c>] ? pin_pagetable_pfn+0x2d/0x...
2017 Jul 11
0
[regression drm/noveau] suspend to ram -> BOOM: exception RIP: drm_calc_vbltimestamp_from_scanoutpos+335
...ffffffffffffffff CS: 0010 SS: 0018
> #7 [ffffc900039f7910] report_bug at ffffffff81672248
> #8 [ffffc900039f7938] fixup_bug at ffffffff8101af85
> #9 [ffffc900039f7950] do_trap at ffffffff8101b0d9
> #10 [ffffc900039f79a0] do_error_trap at ffffffff8101b190
> #11 [ffffc900039f7a50] invalid_op at ffffffff8169063e
> [exception RIP: drm_calc_vbltimestamp_from_scanoutpos+335]
> RIP: ffffffffa020af0f RSP: ffffc900039f7b00 RFLAGS: 00010086
> RAX: ffffffffa04fa100 RBX: ffff8803f9550800 RCX: 0000000000000001
> RDX: ffffffffa0228a58 RSI: 0000000000000001 RDI: ff...
[merged mm-hotfixes-stable] ocfs2-fix-defrag-path-triggering-jbd2-assert.patch removed from -mm tree
2023 Feb 28
0
[merged mm-hotfixes-stable] ocfs2-fix-defrag-path-triggering-jbd2-assert.patch removed from -mm tree
...;
#0 [ffffb25d8dad3900] machine_kexec at ffffffff8386fe01
#1 [ffffb25d8dad3958] __crash_kexec at ffffffff8395959d
#2 [ffffb25d8dad3a20] crash_kexec at ffffffff8395a45d
#3 [ffffb25d8dad3a38] oops_end at ffffffff83836d3f
#4 [ffffb25d8dad3a58] do_trap at ffffffff83833205
#5 [ffffb25d8dad3aa0] do_invalid_op at ffffffff83833aa6
#6 [ffffb25d8dad3ac0] invalid_op at ffffffff84200d18
[exception RIP: jbd2_journal_dirty_metadata+0x2ba]
RIP: ffffffffc09ca54a RSP: ffffb25d8dad3b70 RFLAGS: 00010207
RAX: 0000000000000000 RBX: ffff9706eedc5248 RCX: 0000000000000000
RDX: 0000000000000001 RSI:...
2023 Mar 06
0
Patch "ocfs2: fix defrag path triggering jbd2 ASSERT" has been added to the 6.2-stable tree
...;
#0 [ffffb25d8dad3900] machine_kexec at ffffffff8386fe01
#1 [ffffb25d8dad3958] __crash_kexec at ffffffff8395959d
#2 [ffffb25d8dad3a20] crash_kexec at ffffffff8395a45d
#3 [ffffb25d8dad3a38] oops_end at ffffffff83836d3f
#4 [ffffb25d8dad3a58] do_trap at ffffffff83833205
#5 [ffffb25d8dad3aa0] do_invalid_op at ffffffff83833aa6
#6 [ffffb25d8dad3ac0] invalid_op at ffffffff84200d18
[exception RIP: jbd2_journal_dirty_metadata+0x2ba]
RIP: ffffffffc09ca54a RSP: ffffb25d8dad3b70 RFLAGS: 00010207
RAX: 0000000000000000 RBX: ffff9706eedc5248 RCX: 0000000000000000
RDX: 0000000000000001 RSI:...
2023 Mar 06
0
Patch "ocfs2: fix defrag path triggering jbd2 ASSERT" has been added to the 5.15-stable tree
...;
#0 [ffffb25d8dad3900] machine_kexec at ffffffff8386fe01
#1 [ffffb25d8dad3958] __crash_kexec at ffffffff8395959d
#2 [ffffb25d8dad3a20] crash_kexec at ffffffff8395a45d
#3 [ffffb25d8dad3a38] oops_end at ffffffff83836d3f
#4 [ffffb25d8dad3a58] do_trap at ffffffff83833205
#5 [ffffb25d8dad3aa0] do_invalid_op at ffffffff83833aa6
#6 [ffffb25d8dad3ac0] invalid_op at ffffffff84200d18
[exception RIP: jbd2_journal_dirty_metadata+0x2ba]
RIP: ffffffffc09ca54a RSP: ffffb25d8dad3b70 RFLAGS: 00010207
RAX: 0000000000000000 RBX: ffff9706eedc5248 RCX: 0000000000000000
RDX: 0000000000000001 RSI:...
2023 Mar 06
0
Patch "ocfs2: fix defrag path triggering jbd2 ASSERT" has been added to the 5.10-stable tree
...;
#0 [ffffb25d8dad3900] machine_kexec at ffffffff8386fe01
#1 [ffffb25d8dad3958] __crash_kexec at ffffffff8395959d
#2 [ffffb25d8dad3a20] crash_kexec at ffffffff8395a45d
#3 [ffffb25d8dad3a38] oops_end at ffffffff83836d3f
#4 [ffffb25d8dad3a58] do_trap at ffffffff83833205
#5 [ffffb25d8dad3aa0] do_invalid_op at ffffffff83833aa6
#6 [ffffb25d8dad3ac0] invalid_op at ffffffff84200d18
[exception RIP: jbd2_journal_dirty_metadata+0x2ba]
RIP: ffffffffc09ca54a RSP: ffffb25d8dad3b70 RFLAGS: 00010207
RAX: 0000000000000000 RBX: ffff9706eedc5248 RCX: 0000000000000000
RDX: 0000000000000001 RSI:...
2023 Mar 06
0
Patch "ocfs2: fix defrag path triggering jbd2 ASSERT" has been added to the 5.4-stable tree
...;
#0 [ffffb25d8dad3900] machine_kexec at ffffffff8386fe01
#1 [ffffb25d8dad3958] __crash_kexec at ffffffff8395959d
#2 [ffffb25d8dad3a20] crash_kexec at ffffffff8395a45d
#3 [ffffb25d8dad3a38] oops_end at ffffffff83836d3f
#4 [ffffb25d8dad3a58] do_trap at ffffffff83833205
#5 [ffffb25d8dad3aa0] do_invalid_op at ffffffff83833aa6
#6 [ffffb25d8dad3ac0] invalid_op at ffffffff84200d18
[exception RIP: jbd2_journal_dirty_metadata+0x2ba]
RIP: ffffffffc09ca54a RSP: ffffb25d8dad3b70 RFLAGS: 00010207
RAX: 0000000000000000 RBX: ffff9706eedc5248 RCX: 0000000000000000
RDX: 0000000000000001 RSI:...
2023 Mar 06
0
Patch "ocfs2: fix defrag path triggering jbd2 ASSERT" has been added to the 4.19-stable tree
...;
#0 [ffffb25d8dad3900] machine_kexec at ffffffff8386fe01
#1 [ffffb25d8dad3958] __crash_kexec at ffffffff8395959d
#2 [ffffb25d8dad3a20] crash_kexec at ffffffff8395a45d
#3 [ffffb25d8dad3a38] oops_end at ffffffff83836d3f
#4 [ffffb25d8dad3a58] do_trap at ffffffff83833205
#5 [ffffb25d8dad3aa0] do_invalid_op at ffffffff83833aa6
#6 [ffffb25d8dad3ac0] invalid_op at ffffffff84200d18
[exception RIP: jbd2_journal_dirty_metadata+0x2ba]
RIP: ffffffffc09ca54a RSP: ffffb25d8dad3b70 RFLAGS: 00010207
RAX: 0000000000000000 RBX: ffff9706eedc5248 RCX: 0000000000000000
RDX: 0000000000000001 RSI:...
2023 Mar 06
0
Patch "ocfs2: fix defrag path triggering jbd2 ASSERT" has been added to the 4.14-stable tree
...;
#0 [ffffb25d8dad3900] machine_kexec at ffffffff8386fe01
#1 [ffffb25d8dad3958] __crash_kexec at ffffffff8395959d
#2 [ffffb25d8dad3a20] crash_kexec at ffffffff8395a45d
#3 [ffffb25d8dad3a38] oops_end at ffffffff83836d3f
#4 [ffffb25d8dad3a58] do_trap at ffffffff83833205
#5 [ffffb25d8dad3aa0] do_invalid_op at ffffffff83833aa6
#6 [ffffb25d8dad3ac0] invalid_op at ffffffff84200d18
[exception RIP: jbd2_journal_dirty_metadata+0x2ba]
RIP: ffffffffc09ca54a RSP: ffffb25d8dad3b70 RFLAGS: 00010207
RAX: 0000000000000000 RBX: ffff9706eedc5248 RCX: 0000000000000000
RDX: 0000000000000001 RSI:...
2023 Feb 23
0
+ ocfs2-fix-defrag-path-triggering-jbd2-assert.patch added to mm-hotfixes-unstable branch
...;
#0 [ffffb25d8dad3900] machine_kexec at ffffffff8386fe01
#1 [ffffb25d8dad3958] __crash_kexec at ffffffff8395959d
#2 [ffffb25d8dad3a20] crash_kexec at ffffffff8395a45d
#3 [ffffb25d8dad3a38] oops_end at ffffffff83836d3f
#4 [ffffb25d8dad3a58] do_trap at ffffffff83833205
#5 [ffffb25d8dad3aa0] do_invalid_op at ffffffff83833aa6
#6 [ffffb25d8dad3ac0] invalid_op at ffffffff84200d18
[exception RIP: jbd2_journal_dirty_metadata+0x2ba]
RIP: ffffffffc09ca54a RSP: ffffb25d8dad3b70 RFLAGS: 00010207
RAX: 0000000000000000 RBX: ffff9706eedc5248 RCX: 0000000000000000
RDX: 0000000000000001 RSI:...
2018 Apr 23
3
[Bug 1247] New: Module crash due to broken count
...e/0x80
[ 782.525558] fixup_exception+0x33/0x40
[ 782.525563] do_trap+0x83/0x140
[ 782.525565] do_error_trap+0x83/0xf0
[ 782.525568] ? ip_vs_conn_drop_conntrack+0x120/0x1a5 [ip_vs]
[ 782.525574] ? ip_finish_output2+0x29c/0x390
[ 782.525575] ? ip_finish_output2+0x1a2/0x390
[ 782.525580] invalid_op+0x1b/0x40
[ 782.525582] RIP: 0010:ip_vs_conn_put+0x31/0x40 [ip_vs]
[ 782.525583] RSP: 0000:ffffa344dde03bb8 EFLAGS: 00010246
[ 782.525584] RAX: 0000000000000001 RBX: ffffa344df31cf00 RCX:
ffffa344d7450198
[ 782.525585] RDX: 0000000000000003 RSI: 00000000fffffe01 RDI:
ffffa344d7450140
[ 782.525...
2012 May 24
11
[PATCH 0/3] XEN: fix vmx exception mistake
This series of patches fix the mistake for debug exception(#DB), overflow
exception(#OF) and INT3(#BP), INTn instruction emulation.
Introduce new function vmx_inject_sw_exception() which deliver the software
excetion, software interrupt and privileged software exception. Split hardware
exception as a seperate function(old function vmx_inject_hw_exception()).
Also Passed down intruction length
2012 Jul 25
9
Regression in kernel 3.5 as Dom0 regarding PCI Passthrough?!
Hi!
i notice a serious regression with 3.5 as Dom0 kernel (3.4 was rock
stable):
1st: only the GPU PCI Passthrough works, the PCI USB Controller is not
recognized within the DomU (HVM Win7 64)
Dom0 cmdline is:
ro root=LABEL=dom0root
xen-pciback.hide=(08:00.0)(08:00.1)(00:1d.0)(00:1d.1)(00:1d.2)(00:1d.7)
security=apparmor noirqdebug nouveau.msi=1
Only 8:00.0 and 8:00.1 get passed through
2012 May 30
12
[PATCH v2 0/4] XEN: fix vmx exception mistake
Changes from v1:
- Define new struct hvm_trap to represent information of trap, include
instruction length.
- Renames hvm_inject_exception to hvm_inject_trap. Then define a couple of
wrappers around that function for existing callers, so that their parameter
lists actually *shrink*.
This series of patches fix the mistake for debug exception(#DB), overflow
exception(#OF) and INT3(#BP),