diff options
author | Linus Torvalds <torvalds@linux-foundation.org> | 2014-01-31 11:38:18 -0500 |
---|---|---|
committer | Linus Torvalds <torvalds@linux-foundation.org> | 2014-01-31 11:38:18 -0500 |
commit | 14164b46fc994bcf82963ace00372cf808a31af1 (patch) | |
tree | e2a26a3a42a55bc3d2887cf9793d03843e1fa272 /drivers/block | |
parent | e2a0f813e0d53014b78aae76f0359c8a41f05eeb (diff) | |
parent | f93576e1ac34fd7a93d6f3432e71295bbe6a27ce (diff) |
Merge tag 'stable/for-linus-3.14-rc0-late-tag' of git://git.kernel.org/pub/scm/linux/kernel/git/xen/tip
Pull Xen bugfixes from Konrad Rzeszutek Wilk:
"Bug-fixes for the new features that were added during this cycle.
There are also two fixes for long-standing issues for which we have a
solution: grant-table operations extra work that was not needed
causing performance issues and the self balloon code was too
aggressive causing OOMs.
Details:
- Xen ARM couldn't use the new FIFO events
- Xen ARM couldn't use the SWIOTLB if compiled as 32-bit with 64-bit PCIe devices.
- Grant table were doing needless M2P operations.
- Ratchet down the self-balloon code so it won't OOM.
- Fix misplaced kfree in Xen PVH error code paths"
* tag 'stable/for-linus-3.14-rc0-late-tag' of git://git.kernel.org/pub/scm/linux/kernel/git/xen/tip:
xen/pvh: Fix misplaced kfree from xlated_setup_gnttab_pages
drivers: xen: deaggressive selfballoon driver
xen/grant-table: Avoid m2p_override during mapping
xen/gnttab: Use phys_addr_t to describe the grant frame base address
xen: swiotlb: handle sizeof(dma_addr_t) != sizeof(phys_addr_t)
arm/xen: Initialize event channels earlier
Diffstat (limited to 'drivers/block')
-rw-r--r-- | drivers/block/xen-blkback/blkback.c | 15 |
1 files changed, 6 insertions, 9 deletions
diff --git a/drivers/block/xen-blkback/blkback.c b/drivers/block/xen-blkback/blkback.c index 4b97b86da926..da18046d0e07 100644 --- a/drivers/block/xen-blkback/blkback.c +++ b/drivers/block/xen-blkback/blkback.c | |||
@@ -285,8 +285,7 @@ static void free_persistent_gnts(struct xen_blkif *blkif, struct rb_root *root, | |||
285 | 285 | ||
286 | if (++segs_to_unmap == BLKIF_MAX_SEGMENTS_PER_REQUEST || | 286 | if (++segs_to_unmap == BLKIF_MAX_SEGMENTS_PER_REQUEST || |
287 | !rb_next(&persistent_gnt->node)) { | 287 | !rb_next(&persistent_gnt->node)) { |
288 | ret = gnttab_unmap_refs(unmap, NULL, pages, | 288 | ret = gnttab_unmap_refs(unmap, pages, segs_to_unmap); |
289 | segs_to_unmap); | ||
290 | BUG_ON(ret); | 289 | BUG_ON(ret); |
291 | put_free_pages(blkif, pages, segs_to_unmap); | 290 | put_free_pages(blkif, pages, segs_to_unmap); |
292 | segs_to_unmap = 0; | 291 | segs_to_unmap = 0; |
@@ -321,8 +320,7 @@ static void unmap_purged_grants(struct work_struct *work) | |||
321 | pages[segs_to_unmap] = persistent_gnt->page; | 320 | pages[segs_to_unmap] = persistent_gnt->page; |
322 | 321 | ||
323 | if (++segs_to_unmap == BLKIF_MAX_SEGMENTS_PER_REQUEST) { | 322 | if (++segs_to_unmap == BLKIF_MAX_SEGMENTS_PER_REQUEST) { |
324 | ret = gnttab_unmap_refs(unmap, NULL, pages, | 323 | ret = gnttab_unmap_refs(unmap, pages, segs_to_unmap); |
325 | segs_to_unmap); | ||
326 | BUG_ON(ret); | 324 | BUG_ON(ret); |
327 | put_free_pages(blkif, pages, segs_to_unmap); | 325 | put_free_pages(blkif, pages, segs_to_unmap); |
328 | segs_to_unmap = 0; | 326 | segs_to_unmap = 0; |
@@ -330,7 +328,7 @@ static void unmap_purged_grants(struct work_struct *work) | |||
330 | kfree(persistent_gnt); | 328 | kfree(persistent_gnt); |
331 | } | 329 | } |
332 | if (segs_to_unmap > 0) { | 330 | if (segs_to_unmap > 0) { |
333 | ret = gnttab_unmap_refs(unmap, NULL, pages, segs_to_unmap); | 331 | ret = gnttab_unmap_refs(unmap, pages, segs_to_unmap); |
334 | BUG_ON(ret); | 332 | BUG_ON(ret); |
335 | put_free_pages(blkif, pages, segs_to_unmap); | 333 | put_free_pages(blkif, pages, segs_to_unmap); |
336 | } | 334 | } |
@@ -670,15 +668,14 @@ static void xen_blkbk_unmap(struct xen_blkif *blkif, | |||
670 | GNTMAP_host_map, pages[i]->handle); | 668 | GNTMAP_host_map, pages[i]->handle); |
671 | pages[i]->handle = BLKBACK_INVALID_HANDLE; | 669 | pages[i]->handle = BLKBACK_INVALID_HANDLE; |
672 | if (++invcount == BLKIF_MAX_SEGMENTS_PER_REQUEST) { | 670 | if (++invcount == BLKIF_MAX_SEGMENTS_PER_REQUEST) { |
673 | ret = gnttab_unmap_refs(unmap, NULL, unmap_pages, | 671 | ret = gnttab_unmap_refs(unmap, unmap_pages, invcount); |
674 | invcount); | ||
675 | BUG_ON(ret); | 672 | BUG_ON(ret); |
676 | put_free_pages(blkif, unmap_pages, invcount); | 673 | put_free_pages(blkif, unmap_pages, invcount); |
677 | invcount = 0; | 674 | invcount = 0; |
678 | } | 675 | } |
679 | } | 676 | } |
680 | if (invcount) { | 677 | if (invcount) { |
681 | ret = gnttab_unmap_refs(unmap, NULL, unmap_pages, invcount); | 678 | ret = gnttab_unmap_refs(unmap, unmap_pages, invcount); |
682 | BUG_ON(ret); | 679 | BUG_ON(ret); |
683 | put_free_pages(blkif, unmap_pages, invcount); | 680 | put_free_pages(blkif, unmap_pages, invcount); |
684 | } | 681 | } |
@@ -740,7 +737,7 @@ again: | |||
740 | } | 737 | } |
741 | 738 | ||
742 | if (segs_to_map) { | 739 | if (segs_to_map) { |
743 | ret = gnttab_map_refs(map, NULL, pages_to_gnt, segs_to_map); | 740 | ret = gnttab_map_refs(map, pages_to_gnt, segs_to_map); |
744 | BUG_ON(ret); | 741 | BUG_ON(ret); |
745 | } | 742 | } |
746 | 743 | ||