On 18/04/17 08:27 AM, Konrad Rzeszutek Wilk wrote: > Interesting that you didn't CC any of the maintainers. Could you > do that in the future please? Please read the cover letter. The distribution list for the patchset would have been way too large to cc every maintainer (even as limited as it was, I had mailing lists yelling at me). My plan was to get buy in for the first patch, get it merged and resend the rest independently to their respective maintainers. Of course, though, I'd be open to other suggestions. >>> >>> Signed-off-by: Logan Gunthorpe <logang@xxxxxxxxxxxx> >>> --- >>> drivers/block/xen-blkfront.c | 33 +++++++++++++++++++++++++++------ >>> 1 file changed, 27 insertions(+), 6 deletions(-) >>> >>> diff --git a/drivers/block/xen-blkfront.c b/drivers/block/xen-blkfront.c >>> index 5067a0a..7dcf41d 100644 >>> --- a/drivers/block/xen-blkfront.c >>> +++ b/drivers/block/xen-blkfront.c >>> @@ -807,8 +807,19 @@ static int blkif_queue_rw_req(struct request *req, struct blkfront_ring_info *ri >>> BUG_ON(sg->offset + sg->length > PAGE_SIZE); >>> >>> if (setup.need_copy) { >>> - setup.bvec_off = sg->offset; >>> - setup.bvec_data = kmap_atomic(sg_page(sg)); >>> + setup.bvec_off = 0; >>> + setup.bvec_data = sg_map(sg, SG_KMAP_ATOMIC); >>> + if (IS_ERR(setup.bvec_data)) { >>> + /* >>> + * This should really never happen unless >>> + * the code is changed to use memory that is >>> + * not mappable in the sg. Seeing there is a >>> + * questionable error path out of here, >>> + * we WARN. >>> + */ >>> + WARN(1, "Non-mappable memory used in sg!"); >>> + return 1; >>> + } >> ... >> >> Perhaps add a flag to mark failure as 'unexpected' and trace (and panic?) >> inside sg_map(). Thanks, that's a good suggestion. I'll make the change for v2. Logan -- To unsubscribe from this list: send the line "unsubscribe linux-mmc" in the body of a message to majordomo@xxxxxxxxxxxxxxx More majordomo info at http://vger.kernel.org/majordomo-info.html