/* * memfd test file-system * This file uses FUSE to create a dummy file-system with only one file /memfd. * This file is read-only and takes 1s per read. * * This file-system is used by the memfd test-cases to force the kernel to pin * pages during reads(). Due to the 1s delay of this file-system, this is a * nice way to test race-conditions against get_user_pages() in the kernel. * * We use direct_io==1 to force the kernel to use direct-IO for this * file-system. */ #define FUSE_USE_VERSION 26 #include #include #include #include #include #include static const char memfd_content[] = "memfd-example-content"; static const char memfd_path[] = "/memfd"; static int memfd_getattr(const char *path, struct stat *st) { memset(st, 0, sizeof(*st)); if (!strcmp(path, "/")) { st->st_mode = S_IFDIR | 0755; st->st_nlink = 2; } else if (!strcmp(path, memfd_path)) { st->st_mode = S_IFREG | 0444; st->st_nlink = 1; st->st_size = strlen(memfd_content); } else { return -ENOENT; } return 0; } static int memfd_readdir(const char *path, void *buf, fuse_fill_dir_t filler, off_t offset, struct fuse_file_info *fi) { if (strcmp(path, "/")) return -ENOENT; filler(buf, ".", NULL, 0); filler(buf, "..", NULL, 0); filler(buf, memfd_path + 1, NULL, 0); return 0; } static int memfd_open(const char *path, struct fuse_file_info *fi) { if (strcmp(path, memfd_path)) return -ENOENT; if ((fi->flags & 3) != O_RDONLY) return -EACCES; /* force direct-IO */ fi->direct_io = 1; return 0; } static int memfd_read(const char *path, char *buf, size_t size, off_t offset, struct fuse_file_info *fi) { size_t len; if (strcmp(path, memfd_path) != 0) return -ENOENT; sleep(1); len = strlen(memfd_content); if (offset < len) { if (offset + size > len) size = len - offset; memcpy(buf, memfd_content + offset, size); } else { size = 0; } return size; } static struct fuse_operations memfd_ops = { .getattr = memfd_getattr, .readdir = memfd_readdir, .open = memfd_open, .read = memfd_read, }; int main(int argc, char *argv[]) { return fuse_main(argc, argv, &memfd_ops, NULL); } ypto/public_key.h?h=nds-private-remove&id=dfef358bd1beb4e7b5c94eca944be9cd23dfc752'>diff
diff options
context:
space:
mode:
authorChristoph Hellwig <hch@lst.de>2017-01-30 13:15:41 +0100
committerBjorn Helgaas <bhelgaas@google.com>2017-02-02 10:35:46 -0600
commitdfef358bd1beb4e7b5c94eca944be9cd23dfc752 (patch)
treeb9a2afb38a4c2ac8ad31f49ec0d71fe9e5b1994c /include/crypto/public_key.h
parent030305d69fc6963c16003f50d7e8d74b02d0a143 (diff)
PCI/MSI: Don't apply affinity if there aren't enough vectors left
Bart reported a problem wіth an out of bounds access in the low-level IRQ affinity code, which we root caused to the qla2xxx driver assigning all its MSI-X vectors to the pre and post vectors, and not having any left for the actually spread IRQs. Fix this issue by not asking for affinity assignment when there are no vectors to assign left. Fixes: 402723ad5c62 ("PCI/MSI: Provide pci_alloc_irq_vectors_affinity()") Link: https://lkml.kernel.org/r/1485359225.3093.3.camel@sandisk.com Reported-by: Bart Van Assche <bart.vanassche@sandisk.com> Tested-by: Bart Van Assche <bart.vanassche@sandisk.com> Signed-off-by: Christoph Hellwig <hch@lst.de> Signed-off-by: Bjorn Helgaas <bhelgaas@google.com>
Diffstat (limited to 'include/crypto/public_key.h')