#ifndef __TRACE_AGENT_H__ #define __TRACE_AGENT_H__ #include #include #define MAX_CPUS 256 #define PIPE_INIT (1024*1024) /* * agent_info - structure managing total information of guest agent * @pipe_size: size of pipe (default 1MB) * @use_stdout: set to true when o option is added (default false) * @cpus: total number of CPUs * @ctl_fd: fd of control path, /dev/virtio-ports/agent-ctl-path * @rw_ti: structure managing information of read/write threads */ struct agent_info { unsigned long pipe_size; bool use_stdout; int cpus; int ctl_fd; struct rw_thread_info *rw_ti[MAX_CPUS]; }; /* * rw_thread_info - structure managing a read/write thread a cpu * @cpu_num: cpu number operating this read/write thread * @in_fd: fd of reading trace data path in cpu_num * @out_fd: fd of writing trace data path in cpu_num * @read_pipe: fd of read pipe * @write_pipe: fd of write pipe * @pipe_size: size of pipe (default 1MB) */ struct rw_thread_info { int cpu_num; int in_fd; int out_fd; int read_pipe; int write_pipe; unsigned long pipe_size; }; /* use for stopping rw threads */ extern bool global_sig_receive; /* use for notification */ extern bool global_run_operation; extern pthread_mutex_t mutex_notify; extern pthread_cond_t cond_wakeup; /* for controller of read/write threads */ extern int rw_ctl_init(const char *ctl_path); extern void *rw_ctl_loop(int ctl_fd); /* for trace read/write thread */ extern void *rw_thread_info_new(void); extern void *rw_thread_init(int cpu, const char *in_path, const char *out_path, bool stdout_flag, unsigned long pipe_size, struct rw_thread_info *rw_ti); extern pthread_t rw_thread_run(struct rw_thread_info *rw_ti); static inline void *zalloc(size_t size) { return calloc(1, size); } #define pr_err(format, ...) fprintf(stderr, format, ## __VA_ARGS__) #define pr_info(format, ...) fprintf(stdout, format, ## __VA_ARGS__) #ifdef DEBUG #define pr_debug(format, ...) fprintf(stderr, format, ## __VA_ARGS__) #else #define pr_debug(format, ...) do {} while (0) #endif #endif /*__TRACE_AGENT_H__*/ /net-next.git/diff/tools/perf/ui/browsers?h=nds-private-remove&id=1a902f6b70c55171ca2419d946b85274e35c9757'>diff
r>
AgeCommit message (Expand)AuthorFilesLines
context:
space:
mode:
authorChristoph Hellwig <hch@lst.de>2017-01-30 13:15:41 +0100
committerBjorn Helgaas <bhelgaas@google.com>2017-02-02 10:35:46 -0600
commitdfef358bd1beb4e7b5c94eca944be9cd23dfc752 (patch)
treeb9a2afb38a4c2ac8ad31f49ec0d71fe9e5b1994c /tools/perf/pmu-events/json.h
parent030305d69fc6963c16003f50d7e8d74b02d0a143 (diff)
PCI/MSI: Don't apply affinity if there aren't enough vectors left
Bart reported a problem wіth an out of bounds access in the low-level IRQ affinity code, which we root caused to the qla2xxx driver assigning all its MSI-X vectors to the pre and post vectors, and not having any left for the actually spread IRQs. Fix this issue by not asking for affinity assignment when there are no vectors to assign left. Fixes: 402723ad5c62 ("PCI/MSI: Provide pci_alloc_irq_vectors_affinity()") Link: https://lkml.kernel.org/r/1485359225.3093.3.camel@sandisk.com Reported-by: Bart Van Assche <bart.vanassche@sandisk.com> Tested-by: Bart Van Assche <bart.vanassche@sandisk.com> Signed-off-by: Christoph Hellwig <hch@lst.de> Signed-off-by: Bjorn Helgaas <bhelgaas@google.com>
Diffstat (limited to 'tools/perf/pmu-events/json.h')