Displaying 20 results from an estimated 65 matches for "sysenter_past_esp".
2007 Apr 18
1
[PATCH 1/2] Transparent entry.S IRQ holdoff handling
...(%ebp), %ecx
@@ -172,7 +173,7 @@ ENTRY(resume_userspace)
#ifdef CONFIG_PREEMPT
ENTRY(resume_kernel)
- cli
+ CLI
cmpl $0,TI_preempt_count(%ebp) # non-zero preempt_count ?
jnz restore_nocheck
need_resched:
@@ -193,7 +194,7 @@ ENTRY(sysenter_entry)
movl TSS_sysenter_esp0(%esp),%esp
.globl sysenter_past_esp
sysenter_past_esp:
- sti
+ STI
pushl $(__USER_DS)
pushl %ebp
pushfl
@@ -223,7 +224,7 @@ sysenter_past_esp:
jae syscall_badsys
call *sys_call_table(,%eax,4)
movl %eax,EAX(%esp)
- cli
+ CLI
movl TI_flags(%ebp), %ecx
testw $_TIF_ALLWORK_MASK, %cx
jne syscall_exit_work
@@ -231,9 +232...
2007 Apr 18
1
[PATCH 1/2] Transparent entry.S IRQ holdoff handling
...(%ebp), %ecx
@@ -172,7 +173,7 @@ ENTRY(resume_userspace)
#ifdef CONFIG_PREEMPT
ENTRY(resume_kernel)
- cli
+ CLI
cmpl $0,TI_preempt_count(%ebp) # non-zero preempt_count ?
jnz restore_nocheck
need_resched:
@@ -193,7 +194,7 @@ ENTRY(sysenter_entry)
movl TSS_sysenter_esp0(%esp),%esp
.globl sysenter_past_esp
sysenter_past_esp:
- sti
+ STI
pushl $(__USER_DS)
pushl %ebp
pushfl
@@ -223,7 +224,7 @@ sysenter_past_esp:
jae syscall_badsys
call *sys_call_table(,%eax,4)
movl %eax,EAX(%esp)
- cli
+ CLI
movl TI_flags(%ebp), %ecx
testw $_TIF_ALLWORK_MASK, %cx
jne syscall_exit_work
@@ -231,9 +232...
2006 Nov 23
1
BUG: warning at kernel/softirq.c:141
...te_inode+0x0/0xba [ext3] <b016809c>
generic_delete_inode+0x9e/0x101
<b0167b87> iput+0x5e/0x60 <b0166d66> dput+0xfe/0x116
<b0160a4f> sys_renameat+0x15f/0x1b9 <b01b04d2>
_atomic_dec_and_lock+0x2a/0x44
<b0160aba> sys_rename+0x11/0x15 <b0102af3>
sysenter_past_esp+0x54/0x75
BUG: warning at kernel/softirq.c:141/local_bh_enable()
<b0120e27> local_bh_enable+0x25/0x64 <b02160f4>
sock_fasync+0x105/0x111
<b0216fa1> sock_close+0x1e/0x2a <b0153fcd> __fput+0x87/0x13c
<b0151b57> filp_close+0x4e/0x54 <b011e0a1> put_fil...
2015 Nov 18
4
[PATCH 1/3] x86/xen: Avoid fast syscall path for Xen PV guests
...compat mode even though stack does not need
> to be fixed. This will allow us to drop usergs_sysret32 paravirt op (in
> the subsequent patch)
Looks generally quite nice. Minor comments below:
> --- a/arch/x86/entry/entry_32.S
> +++ b/arch/x86/entry/entry_32.S
> @@ -308,7 +308,8 @@ sysenter_past_esp:
>
> movl %esp, %eax
> call do_fast_syscall_32
> - testl %eax, %eax
> + /* XEN PV guests always use IRET path */
> + ALTERNATIVE "testl %eax, %eax", "xor %eax, %eax", X86_FEATURE_XENPV
> jz .Lsyscall_32_...
2015 Nov 18
4
[PATCH 1/3] x86/xen: Avoid fast syscall path for Xen PV guests
...compat mode even though stack does not need
> to be fixed. This will allow us to drop usergs_sysret32 paravirt op (in
> the subsequent patch)
Looks generally quite nice. Minor comments below:
> --- a/arch/x86/entry/entry_32.S
> +++ b/arch/x86/entry/entry_32.S
> @@ -308,7 +308,8 @@ sysenter_past_esp:
>
> movl %esp, %eax
> call do_fast_syscall_32
> - testl %eax, %eax
> + /* XEN PV guests always use IRET path */
> + ALTERNATIVE "testl %eax, %eax", "xor %eax, %eax", X86_FEATURE_XENPV
> jz .Lsyscall_32_...
2007 Apr 25
1
Problem with SuSe 10.0 and zaptel 1.2.17
...x93 [ext3]
[<c0159466>] do_sync_write+0xb6/0x110
[<f8a7ac33>] zt_ioctl+0x93/0x100 [zaptel]
[<f8a7aba0>] zt_ioctl+0x0/0x100 [zaptel]
[<c0169b5e>] do_ioctl+0x4e/0x60
[<c0169c6f>] vfs_ioctl+0x4f/0x1c0
[<c0169e17>] sys_ioctl+0x37/0x70
[<c0102d3b>] sysenter_past_esp+0x54/0x79
Code: ff 89 f8 89 f1 e8 75 88 77 c7 31 ff c7 85 94 06 00 00 00 00 00 00 e9 77 f4 ff ff 8b 4c 24 24 e9 e4 f8 ff ff 8b 04 95 20 0d aa f8 <8b> 80 9c 00 00 00 e8 5d a9 6c c7 8b 44 24 20 8b 04 85 20 0d aa
I've since installed zaptel 1.2.16 again and it's fine. Is anyone else...
2007 Apr 18
1
[RFC, PATCH 8/24] i386 Vmi syscall assembly
...%ecx
@@ -159,7 +160,7 @@ ENTRY(resume_userspace)
#ifdef CONFIG_PREEMPT
ENTRY(resume_kernel)
- cli
+ CLI
cmpl $0,TI_preempt_count(%ebp) # non-zero preempt_count ?
jnz restore_nocheck
need_resched:
@@ -179,7 +180,7 @@ need_resched:
ENTRY(sysenter_entry)
movl TSS_sysenter_esp0(%esp),%esp
sysenter_past_esp:
- sti
+ STI
pushl $(__USER_DS)
pushl %ebp
pushfl
@@ -209,7 +210,7 @@ sysenter_past_esp:
jae syscall_badsys
call *sys_call_table(,%eax,4)
movl %eax,EAX(%esp)
- cli
+ CLI
movl TI_flags(%ebp), %ecx
testw $_TIF_ALLWORK_MASK, %cx
jne syscall_exit_work
@@ -217,8 +218,7 @@ sysenter_past...
2007 Apr 18
1
[RFC, PATCH 8/24] i386 Vmi syscall assembly
...%ecx
@@ -159,7 +160,7 @@ ENTRY(resume_userspace)
#ifdef CONFIG_PREEMPT
ENTRY(resume_kernel)
- cli
+ CLI
cmpl $0,TI_preempt_count(%ebp) # non-zero preempt_count ?
jnz restore_nocheck
need_resched:
@@ -179,7 +180,7 @@ need_resched:
ENTRY(sysenter_entry)
movl TSS_sysenter_esp0(%esp),%esp
sysenter_past_esp:
- sti
+ STI
pushl $(__USER_DS)
pushl %ebp
pushfl
@@ -209,7 +210,7 @@ sysenter_past_esp:
jae syscall_badsys
call *sys_call_table(,%eax,4)
movl %eax,EAX(%esp)
- cli
+ CLI
movl TI_flags(%ebp), %ecx
testw $_TIF_ALLWORK_MASK, %cx
jne syscall_exit_work
@@ -217,8 +218,7 @@ sysenter_past...
2009 Jul 11
1
Samba freezes server when writing 50MB MS Word document (sometimes)
...s+0x25e/0x270
Jul 3 15:01:44 [..] [<c019a2c0>] do_sync_write+0x0/0x120
Jul 3 15:01:44 [..] [vfs_write+0xb9/0x170] vfs_write+0xb9/0x170
Jul 3 15:01:44 [..] [__capable+0x8/0x20] __capable+0x8/0x20
Jul 3 15:01:44 [..] [sys_pwrite64+0x66/0x80] sys_pwrite64+0x66/0x80
Jul 3 15:01:44 [..] [sysenter_past_esp+0x6b/0xa1]
sysenter_past_esp+0x6b/0xa1
Jul 3 15:01:44 [..] =======================
[.. this repeats x times ...]
[.. REBOOT / relevant boot messages ..]
Jul 3 15:33:04 [..] [ 115.676800] Driver 'sd' needs updating - please use
bus_type methods
Jul 3 15:33:04 [..] [ 115.676853] sd 0:0:...
2006 Oct 03
1
a domain VTx with the VNIF does hang.
...[<c014b5d8>] kmem_cache_free+0x27/0x2b
[<c013dac4>] free_pgtables+0x31/0x63
[<c01421ab>] exit_mmap+0x6a/0xb6
[<c0115f53>] mmput+0x1f/0x76
[<c011a58d>] do_exit+0x173/0x32b
[<c011a7f7>] sys_exit_group+0x0/0xd
[<c01029f3>] sysenter_past_esp+0x54/0x75
printk: 64425470 messages suppressed.
netfront: rx->offset: 0, size: 4294967295
printk: 64601036 messages suppressed.
netfront: rx->offset: 0, size: 4294967295
*** Please look at screenshots about the detail of the log. ***
The test environment is as follows.
- Ar...
2008 Jan 19
1
[bugreport] btrfs 0.11
...c0141ac0>] autoremove_wake_function+0x0/0x40
<0>[45260.817299] [<e0ac0f30>] btrfs_file_write+0x0/0x7c0 [btrfs]
<0>[45260.819050] [<c0189919>] vfs_write+0xb9/0x170
<0>[45260.820691] [<c018a051>] sys_write+0x41/0x70
<0>[45260.822306] [<c01053a2>] sysenter_past_esp+0x6b/0xa9
<0>[45260.824497] =======================
<0>[45260.825628] Code: eb d2 90 8d b4 26 00 00 00 00 53 80 ce 02 83 ec
30 89 c3 89 14 24 8b 13 89 e1 8b 40 04 e8 58 92 03 00 83 c4 30 5b c3 8d
76 00 53 <8b> 40 0c 0f b7 50 6a 89 d0 25 00 08 00 00 83 f8 01 19 db 81
e2
<0>...
2010 Apr 26
2
trouble with xenserver and xfs (soft lockup - CPU#0 stuck for 61s!)
...vfs_lstat_fd+0x12/0x3
[212455.928003] [<c0191912>] ? sys_lstat64+0xf/0x23
[212455.928003] [<c0199124>] ? vfs_readdir+0x7c/0x8c
[212455.928003] [<c0198e80>] ? filldir64+0x0/0xc5
[212455.928003] [<c01991cf>] ? sys_getdents64+0x9b/0xa5
[212455.928003] [<c0107f23>] ? sysenter_past_esp+0x3c/0x62
[212455.928003] [<c0107f5b>] ? sysenter_do_call+0x12/0x2f
I have to force reboot to bring the vm back online. Are there any known
problems with xfs and xen? Because i know from another deployment that
they are having nearly the same issues with xfs. There are no problems
with t...
2008 Jul 03
2
iozone remove_suid oops...
...n+0x50/0x60
[ 899.119277] [<c016e56a>] __filemap_fdatawrite_range+0x7a/0xa0
[ 899.119300] [<f90f44e0>] btrfs_file_write+0x0/0x900 [btrfs]
[ 899.119341] [<c01921b9>] vfs_write+0xb9/0x170
[ 899.119356] [<c01928f1>] sys_write+0x41/0x70
[ 899.119375] [<c01043c2>] sysenter_past_esp+0x6b/0xa9
[ 899.119388] =======================
[ 899.119390] Code: eb d2 90 8d b4 26 00 00 00 00 53 80 ce 02 83 ec
30 89 c3 89 14 24 8b 13 89 e1 8b 40 04 e8 18 97 03 00 83 c4 30 5b c3
8d 76 00 53 <8b> 40 0c 0f b7 50 6a 89 d0 25 00 08 00 00 83 f8 01 19 db
81 e2
[ 899.119421] EIP: [<c01...
2005 Apr 05
0
Help Disecting kernel crash with ldisc
...:21 sydlxfw01 last message repeated 2 times
Apr 5 20:00:21 sydlxfw01 kernel: [tty_read+246/288]
tty_read+0xf6/0x120
Apr 5 20:00:21 sydlxfw01 kernel: [vfs_read+229/352]
vfs_read+0xe5/0x160
Apr 5 20:00:21 sydlxfw01 kernel: [sys_read+81/128] sys_read+0x51/0x80
Apr 5 20:00:21 sydlxfw01 kernel: [sysenter_past_esp+82/117]
sysenter_past_esp+0x52/0x75
Apr 5 20:00:21 sydlxfw01 kernel: Code: 54 24 34 90 8d b4 26 00 00 00 00
b9 02 00 00 00 89 fa b8 2c b2 30 c0 e8 cf 3a f4 ff
89 1c 24 e8 07 ff ff ff 85 c0 75 07 e8 fe ed <09> 00 eb dc 89 fa b8 2c
b2 30 c0 e8 f0 3b f4 ff 8b 7b 54 85 ff
Apr 5 20:00:21 sydlx...
2015 Nov 18
0
[PATCH 1/3] x86/xen: Avoid fast syscall path for Xen PV guests
...xed. This will allow us to drop usergs_sysret32 paravirt op (in
>>> the subsequent patch)
>>
>> Looks generally quite nice. Minor comments below:
>>
>>> --- a/arch/x86/entry/entry_32.S
>>> +++ b/arch/x86/entry/entry_32.S
>>> @@ -308,7 +308,8 @@ sysenter_past_esp:
>>>
>>> movl %esp, %eax
>>> call do_fast_syscall_32
>>> - testl %eax, %eax
>>> + /* XEN PV guests always use IRET path */
>>> + ALTERNATIVE "testl %eax, %eax", "xor %eax, %eax", X86_...
2015 Nov 18
1
[PATCH 1/3] x86/xen: Avoid fast syscall path for Xen PV guests
...s not need
>> to be fixed. This will allow us to drop usergs_sysret32 paravirt op (in
>> the subsequent patch)
>
> Looks generally quite nice. Minor comments below:
>
>> --- a/arch/x86/entry/entry_32.S
>> +++ b/arch/x86/entry/entry_32.S
>> @@ -308,7 +308,8 @@ sysenter_past_esp:
>>
>> movl %esp, %eax
>> call do_fast_syscall_32
>> - testl %eax, %eax
>> + /* XEN PV guests always use IRET path */
>> + ALTERNATIVE "testl %eax, %eax", "xor %eax, %eax", X86_FEATURE_XENPV
>>...
2007 Apr 18
0
[Bridge] bug(?) in br_device_event causes kernel panic for 2.6.14
...ifconfig (pid 22092, threadinfo:c18e9999 task:c165c600)
Stack: ....(I assume this is ifconfig's stack, and probably not a lot
of interest to the problem...)
Call Trace:
notifier_call_chain
dev_close
dev_change_flags
devinet_ioctl
inet_ioctl
sock_ioctl
do_ioctl
do_page_fault
vfs_ioctl
sys_ioctl
sysenter_past_esp
....
(0)Kernel panic- not syncing: Fatal exception in interrupt
Note- may have some typos, this is actually a PVR box plugged into a
tv- not the easiest to work with ;-)
Hope that's enough info to be useful, feel free to ask for more- so
long as you're willing to guide me in what info yo...
2007 Jun 13
2
HTB deadlock
...[<c014bb99>] __handle_mm_fault+0x21c/0x943
[<c02e24c5>] _spin_unlock_bh+0x5/0xd
[<c027b475>] sock_setsockopt+0x63/0x59d
[<c0151801>] anon_vma_prepare+0x1b/0xcb
[<c027a2ea>] sys_socketcall+0x24f/0x271
[<c02e3ad0>] do_page_fault+0x0/0x600
[<c01038f1>] sysenter_past_esp+0x56/0x79
=======================
BUG: soft lockup detected on CPU#1!
[<c013c890>] softlockup_tick+0x93/0xc2
[<c0127585>] update_process_times+0x26/0x5c
[<c0111cd5>] smp_apic_timer_interrupt+0x97/0xb2
[<c0104373>] apic_timer_interrupt+0x1f/0x24
[<c01c007b>] blk_d...
2015 Nov 18
8
[PATCH 0/3] Fix and cleanup for 32-bit PV sysexit
The first patch fixes Xen PV regression introduced by 32-bit rewrite. Unlike the
earlier version it uses ALTERNATIVE instruction and avoids using xen_sysexit
(and sysret32 in compat mode) pv ops, as suggested by Andy. (I ended up patching
TEST with XOR to avoid extra NOPs, even though I said yesterday it would be
wrong. It's not wrong)
As result of this patch irq_enable_sysexit and
2015 Nov 18
8
[PATCH 0/3] Fix and cleanup for 32-bit PV sysexit
The first patch fixes Xen PV regression introduced by 32-bit rewrite. Unlike the
earlier version it uses ALTERNATIVE instruction and avoids using xen_sysexit
(and sysret32 in compat mode) pv ops, as suggested by Andy. (I ended up patching
TEST with XOR to avoid extra NOPs, even though I said yesterday it would be
wrong. It's not wrong)
As result of this patch irq_enable_sysexit and