/* * Copyright 2016, Cyril Bur, IBM Corp. * * This program is free software; you can redistribute it and/or * modify it under the terms of the GNU General Public License * as published by the Free Software Foundation; either version * 2 of the License, or (at your option) any later version. * * * Test the kernel's signal frame code. * * The kernel sets up two sets of ucontexts if the signal was to be * delivered while the thread was in a transaction. * Expected behaviour is that the checkpointed state is in the user * context passed to the signal handler. The speculated state can be * accessed with the uc_link pointer. * * The rationale for this is that if TM unaware code (which linked * against TM libs) installs a signal handler it will not know of the * speculative nature of the 'live' registers and may infer the wrong * thing. */ #include #include #include #include #include #include #include "utils.h" #include "tm.h" #define MAX_ATTEMPT 500000 #define NV_VSX_REGS 12 long tm_signal_self_context_load(pid_t pid, long *gprs, double *fps, vector int *vms, vector int *vss); static sig_atomic_t fail; vector int vss[] = { {1, 2, 3, 4 },{5, 6, 7, 8 },{9, 10,11,12}, {13,14,15,16},{17,18,19,20},{21,22,23,24}, {25,26,27,28},{29,30,31,32},{33,34,35,36}, {37,38,39,40},{41,42,43,44},{45,46,47,48}, {-1, -2, -3, -4 },{-5, -6, -7, -8 },{-9, -10,-11,-12}, {-13,-14,-15,-16},{-17,-18,-19,-20},{-21,-22,-23,-24}, {-25,-26,-27,-28},{-29,-30,-31,-32},{-33,-34,-35,-36}, {-37,-38,-39,-40},{-41,-42,-43,-44},{-45,-46,-47,-48} }; static void signal_usr1(int signum, siginfo_t *info, void *uc) { int i; uint8_t vsc[sizeof(vector int)]; uint8_t vst[sizeof(vector int)]; ucontext_t *ucp = uc; ucontext_t *tm_ucp = ucp->uc_link; /* * The other half of the VSX regs will be after v_regs. * * In short, vmx_reserve array holds everything. v_regs is a 16 * byte aligned pointer at the start of vmx_reserve (vmx_reserve * may or may not be 16 aligned) where the v_regs structure exists. * (half of) The VSX regsters are directly after v_regs so the * easiest way to find them below. */ long *vsx_ptr = (long *)(ucp->uc_mcontext.v_regs + 1); long *tm_vsx_ptr = (long *)(tm_ucp->uc_mcontext.v_regs + 1); for (i = 0; i < NV_VSX_REGS && !fail; i++) { memcpy(vsc, &ucp->uc_mcontext.fp_regs[i + 20], 8); memcpy(vsc + 8, &vsx_ptr[20 + i], 8); fail = memcmp(vsc, &vss[i], sizeof(vector int)); memcpy(vst, &tm_ucp->uc_mcontext.fp_regs[i + 20], 8); memcpy(vst + 8, &tm_vsx_ptr[20 + i], 8); fail |= memcmp(vst, &vss[i + NV_VSX_REGS], sizeof(vector int)); if (fail) { int j; fprintf(stderr, "Failed on %d vsx 0x", i); for (j = 0; j < 16; j++) fprintf(stderr, "%02x", vsc[j]); fprintf(stderr, " vs 0x"); for (j = 0; j < 16; j++) fprintf(stderr, "%02x", vst[j]); fprintf(stderr, "\n"); } } } static int tm_signal_context_chk() { struct sigaction act; int i; long rc; pid_t pid = getpid(); SKIP_IF(!have_htm()); act.sa_sigaction = signal_usr1; sigemptyset(&act.sa_mask); act.sa_flags = SA_SIGINFO; if (sigaction(SIGUSR1, &act, NULL) < 0) { perror("sigaction sigusr1"); exit(1); } i = 0; while (i < MAX_ATTEMPT && !fail) { rc = tm_signal_self_context_load(pid, NULL, NULL, NULL, vss); FAIL_IF(rc != pid); i++; } return fail; } int main(void) { return test_harness(tm_signal_context_chk, "tm_signal_context_chk_vsx"); } te-remove&id=433e19cf33d34bb6751c874a9c00980552fe508c'>Kconfig
diff options
context:
space:
mode:
authorDexuan Cui <decui@microsoft.com>2017-01-28 11:46:02 -0700
committerGreg Kroah-Hartman <gregkh@linuxfoundation.org>2017-01-31 10:59:48 +0100
commit433e19cf33d34bb6751c874a9c00980552fe508c (patch)
treece6547ef2987fbb289fa28f03536328a42781651 /drivers/usb/misc/Kconfig
parent191e885a2e130e639bb0c8ee350d7047294f2ce6 (diff)
Drivers: hv: vmbus: finally fix hv_need_to_signal_on_read()
Commit a389fcfd2cb5 ("Drivers: hv: vmbus: Fix signaling logic in hv_need_to_signal_on_read()") added the proper mb(), but removed the test "prev_write_sz < pending_sz" when making the signal decision. As a result, the guest can signal the host unnecessarily, and then the host can throttle the guest because the host thinks the guest is buggy or malicious; finally the user running stress test can perceive intermittent freeze of the guest. This patch brings back the test, and properly handles the in-place consumption APIs used by NetVSC (see get_next_pkt_raw(), put_pkt_raw() and commit_rd_index()). Fixes: a389fcfd2cb5 ("Drivers: hv: vmbus: Fix signaling logic in hv_need_to_signal_on_read()") Signed-off-by: Dexuan Cui <decui@microsoft.com> Reported-by: Rolf Neugebauer <rolf.neugebauer@docker.com> Tested-by: Rolf Neugebauer <rolf.neugebauer@docker.com> Cc: "K. Y. Srinivasan" <kys@microsoft.com> Cc: Haiyang Zhang <haiyangz@microsoft.com> Cc: Stephen Hemminger <sthemmin@microsoft.com> Cc: <stable@vger.kernel.org> Signed-off-by: K. Y. Srinivasan <kys@microsoft.com> Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
Diffstat (limited to 'drivers/usb/misc/Kconfig')