search for: next_sp

Displaying 5 results from an estimated 5 matches for "next_sp".

Did you mean: next_p
2020 Apr 28
0
[PATCH v3 45/75] x86/dumpstack/64: Handle #VC exception stacks
...egin + sizeof(vc_stacks->stacks[i].stack); + + if (stk >= begin && stk < end) + goto found; + } + + return false; + +found: + + regs = (struct pt_regs *)end - 1; + info->type = type; + info->begin = (unsigned long *)begin; + info->end = (unsigned long *)end; + info->next_sp = (unsigned long *)regs->sp; + + return true; +#else + return false; +#endif +} + static bool in_exception_stack(unsigned long *stack, struct stack_info *info) { unsigned long begin, end, stk = (unsigned long)stack; @@ -173,6 +217,9 @@ int get_stack_info(unsigned long *stack, struct task_str...
2017 Oct 05
0
24e700e291 ("Merge branch 'x86-apic-for-linus' of .."): WARNING: kernel stack regs at 979f9f70 in kworker/u4:1:648 has bad 'bp' value (null)
...18.115792] init: tty6 main process ended, respawning [init] Using pid_max = 4096 [init] Started watchdog process, PID is 559 [main] Main thread is alive. [ 20.993350] WARNING: kernel stack regs at 979f9f70 in kworker/u4:1:648 has bad 'bp' value (null) [ 20.993353] unwind stack type:0 next_sp: (null) mask:0x2 graph_idx:0 [ 20.993355] 979f9e14: 00000000 ... [ 20.993359] 979f9e18: 979f9e64 (0x979f9e64) [ 20.993366] 979f9e1c: 9462d75f (__save_stack_trace+0x112/0x11c) [ 20.993369] 979f9e20: 009f9e2c (0x9f9e2c) # HH:MM RESUL...
2017 Oct 05
0
24e700e291 ("Merge branch 'x86-apic-for-linus' of .."): WARNING: kernel stack regs at 979f9f70 in kworker/u4:1:648 has bad 'bp' value (null)
...18.115792] init: tty6 main process ended, respawning [init] Using pid_max = 4096 [init] Started watchdog process, PID is 559 [main] Main thread is alive. [ 20.993350] WARNING: kernel stack regs at 979f9f70 in kworker/u4:1:648 has bad 'bp' value (null) [ 20.993353] unwind stack type:0 next_sp: (null) mask:0x2 graph_idx:0 [ 20.993355] 979f9e14: 00000000 ... [ 20.993359] 979f9e18: 979f9e64 (0x979f9e64) [ 20.993366] 979f9e1c: 9462d75f (__save_stack_trace+0x112/0x11c) [ 20.993369] 979f9e20: 009f9e2c (0x9f9e2c) # HH:MM RESUL...
2020 Apr 28
116
[PATCH v3 00/75] x86: SEV-ES Guest Support
Hi, here is the next version of changes to enable Linux to run as an SEV-ES guest. The code was rebased to v5.7-rc3 and got a fair number of changes since the last version. What is SEV-ES ============== SEV-ES is an acronym for 'Secure Encrypted Virtualization - Encrypted State' and means a hardware feature of AMD processors which hides the register state of VCPUs to the hypervisor by
2020 Apr 28
116
[PATCH v3 00/75] x86: SEV-ES Guest Support
Hi, here is the next version of changes to enable Linux to run as an SEV-ES guest. The code was rebased to v5.7-rc3 and got a fair number of changes since the last version. What is SEV-ES ============== SEV-ES is an acronym for 'Secure Encrypted Virtualization - Encrypted State' and means a hardware feature of AMD processors which hides the register state of VCPUs to the hypervisor by