#!/bin/sh # This validates that the kernel will fall back to using the user helper # to load firmware it can't find on disk itself. We must request a firmware # that the kernel won't find, and any installed helper (e.g. udev) also # won't find so that we can do the load ourself manually. set -e modprobe test_firmware DIR=/sys/devices/virtual/misc/test_firmware # CONFIG_FW_LOADER_USER_HELPER has a sysfs class under /sys/class/firmware/ # These days no one enables CONFIG_FW_LOADER_USER_HELPER so check for that # as an indicator for CONFIG_FW_LOADER_USER_HELPER. HAS_FW_LOADER_USER_HELPER=$(if [ -d /sys/class/firmware/ ]; then echo yes; else echo no; fi) if [ "$HAS_FW_LOADER_USER_HELPER" = "yes" ]; then OLD_TIMEOUT=$(cat /sys/class/firmware/timeout) else echo "usermode helper disabled so ignoring test" exit 0 fi FWPATH=$(mktemp -d) FW="$FWPATH/test-firmware.bin" test_finish() { echo "$OLD_TIMEOUT" >/sys/class/firmware/timeout rm -f "$FW" rmdir "$FWPATH" } load_fw() { local name="$1" local file="$2" # This will block until our load (below) has finished. echo -n "$name" >"$DIR"/trigger_request & # Give kernel a chance to react. local timeout=10 while [ ! -e "$DIR"/"$name"/loading ]; do sleep 0.1 timeout=$(( $timeout - 1 )) if [ "$timeout" -eq 0 ]; then echo "$0: firmware interface never appeared" >&2 exit 1 fi done echo 1 >"$DIR"/"$name"/loading cat "$file" >"$DIR"/"$name"/data echo 0 >"$DIR"/"$name"/loading # Wait for request to finish. wait } trap "test_finish" EXIT # This is an unlikely real-world firmware content. :) echo "ABCD0123" >"$FW" NAME=$(basename "$FW") # Test failure when doing nothing (timeout works). echo 1 >/sys/class/firmware/timeout echo -n "$NAME" >"$DIR"/trigger_request if diff -q "$FW" /dev/test_firmware >/dev/null ; then echo "$0: firmware was not expected to match" >&2 exit 1 else echo "$0: timeout works" fi # Put timeout high enough for us to do work but not so long that failures # slow down this test too much. echo 4 >/sys/class/firmware/timeout # Load this script instead of the desired firmware. load_fw "$NAME" "$0" if diff -q "$FW" /dev/test_firmware >/dev/null ; then echo "$0: firmware was not expected to match" >&2 exit 1 else echo "$0: firmware comparison works" fi # Do a proper load, which should work correctly. load_fw "$NAME" "$FW" if ! diff -q "$FW" /dev/test_firmware >/dev/null ; then echo "$0: firmware was not loaded" >&2 exit 1 else echo "$0: user helper firmware loading works" fi exit 0 43cd5f67fc6ee7c05a88e4996e8177f91b'/>
path: root/include/net/ip_tunnels.h
diff options
context:
space:
mode:
authorBenjamin Herrenschmidt <benh@kernel.crashing.org>2017-02-03 17:10:28 +1100
committerMichael Ellerman <mpe@ellerman.id.au>2017-02-08 23:36:29 +1100
commitd7df2443cd5f67fc6ee7c05a88e4996e8177f91b (patch)
tree098a7c0ca4fceb8a65cb1f693c9d71990388933d /include/net/ip_tunnels.h
parenta0615a16f7d0ceb5804d295203c302d496d8ee91 (diff)
powerpc/mm: Fix spurrious segfaults on radix with autonuma
When autonuma (Automatic NUMA balancing) marks a PTE inaccessible it clears all the protection bits but leave the PTE valid. With the Radix MMU, an attempt at executing from such a PTE will take a fault with bit 35 of SRR1 set "SRR1_ISI_N_OR_G". It is thus incorrect to treat all such faults as errors. We should pass them to handle_mm_fault() for autonuma to deal with. The case of pages that are really not executable is handled by the existing test for VM_EXEC further down. That leaves us with catching the kernel attempts at executing user pages. We can catch that earlier, even before we do find_vma. It is never valid on powerpc for the kernel to take an exec fault to begin with. So fold that test with the existing test for the kernel faulting on kernel addresses to bail out early. Fixes: 1d18ad026844 ("powerpc/mm: Detect instruction fetch denied and report") Signed-off-by: Benjamin Herrenschmidt <benh@kernel.crashing.org> Reviewed-by: Aneesh Kumar K.V <aneesh.kumar@linux.vnet.ibm.com> Acked-by: Balbir Singh <bsingharora@gmail.com> Signed-off-by: Michael Ellerman <mpe@ellerman.id.au>
Diffstat (limited to 'include/net/ip_tunnels.h')