Message ID | 20160914071901.8127-4-juerg.haefliger@hpe.com (mailing list archive) |
---|---|
State | New, archived |
Headers | show |
On Wed, Sep 14, 2016 at 09:19:01AM +0200, Juerg Haefliger wrote: > This is a temporary hack to prevent the use of bio_map_user_iov() > which causes XPFO page faults. > > Signed-off-by: Juerg Haefliger <juerg.haefliger@hpe.com> Sorry, but if your scheme doesn't support get_user_pages access to user memory is't a steaming pile of crap and entirely unacceptable.
diff --git a/block/blk-map.c b/block/blk-map.c index b8657fa8dc9a..e889dbfee6fb 100644 --- a/block/blk-map.c +++ b/block/blk-map.c @@ -52,7 +52,7 @@ static int __blk_rq_map_user_iov(struct request *rq, struct bio *bio, *orig_bio; int ret; - if (copy) + if (copy || IS_ENABLED(CONFIG_XPFO)) bio = bio_copy_user_iov(q, map_data, iter, gfp_mask); else bio = bio_map_user_iov(q, iter, gfp_mask);
This is a temporary hack to prevent the use of bio_map_user_iov() which causes XPFO page faults. Signed-off-by: Juerg Haefliger <juerg.haefliger@hpe.com> --- block/blk-map.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-)