]> git.ipfire.org Git - thirdparty/kernel/stable-queue.git/commitdiff
5.4-stable patches
authorGreg Kroah-Hartman <gregkh@linuxfoundation.org>
Sat, 9 Oct 2021 14:17:44 +0000 (16:17 +0200)
committerGreg Kroah-Hartman <gregkh@linuxfoundation.org>
Sat, 9 Oct 2021 14:17:44 +0000 (16:17 +0200)
added patches:
arm-dts-omap3430-sdp-fix-nand-device-node.patch
arm-dts-qcom-apq8064-use-compatible-which-contains-chipid.patch
mmc-meson-gx-do-not-use-memcpy_to-fromio-for-dram-access-quirk.patch
nfsd-fix-error-handling-of-register_pernet_subsys-in-init_nfsd.patch
nfsd4-handle-the-nfsv4-readdir-dircount-hint-being-zero.patch
ovl-fix-missing-negative-dentry-check-in-ovl_rename.patch
xen-balloon-fix-cancelled-balloon-action.patch

queue-5.4/arm-dts-omap3430-sdp-fix-nand-device-node.patch [new file with mode: 0644]
queue-5.4/arm-dts-qcom-apq8064-use-compatible-which-contains-chipid.patch [new file with mode: 0644]
queue-5.4/mmc-meson-gx-do-not-use-memcpy_to-fromio-for-dram-access-quirk.patch [new file with mode: 0644]
queue-5.4/nfsd-fix-error-handling-of-register_pernet_subsys-in-init_nfsd.patch [new file with mode: 0644]
queue-5.4/nfsd4-handle-the-nfsv4-readdir-dircount-hint-being-zero.patch [new file with mode: 0644]
queue-5.4/ovl-fix-missing-negative-dentry-check-in-ovl_rename.patch [new file with mode: 0644]
queue-5.4/series
queue-5.4/xen-balloon-fix-cancelled-balloon-action.patch [new file with mode: 0644]

diff --git a/queue-5.4/arm-dts-omap3430-sdp-fix-nand-device-node.patch b/queue-5.4/arm-dts-omap3430-sdp-fix-nand-device-node.patch
new file mode 100644 (file)
index 0000000..d3d815f
--- /dev/null
@@ -0,0 +1,31 @@
+From 80d680fdccba214e8106dc1aa33de5207ad75394 Mon Sep 17 00:00:00 2001
+From: Roger Quadros <rogerq@kernel.org>
+Date: Thu, 2 Sep 2021 12:58:28 +0300
+Subject: ARM: dts: omap3430-sdp: Fix NAND device node
+
+From: Roger Quadros <rogerq@kernel.org>
+
+commit 80d680fdccba214e8106dc1aa33de5207ad75394 upstream.
+
+Nand is on CS1 so reg properties first field should be 1 not 0.
+
+Fixes: 44e4716499b8 ("ARM: dts: omap3: Fix NAND device nodes")
+Cc: stable@vger.kernel.org # v4.6+
+Signed-off-by: Roger Quadros <rogerq@kernel.org>
+Signed-off-by: Tony Lindgren <tony@atomide.com>
+Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
+---
+ arch/arm/boot/dts/omap3430-sdp.dts |    2 +-
+ 1 file changed, 1 insertion(+), 1 deletion(-)
+
+--- a/arch/arm/boot/dts/omap3430-sdp.dts
++++ b/arch/arm/boot/dts/omap3430-sdp.dts
+@@ -101,7 +101,7 @@
+       nand@1,0 {
+               compatible = "ti,omap2-nand";
+-              reg = <0 0 4>; /* CS0, offset 0, IO size 4 */
++              reg = <1 0 4>; /* CS1, offset 0, IO size 4 */
+               interrupt-parent = <&gpmc>;
+               interrupts = <0 IRQ_TYPE_NONE>, /* fifoevent */
+                            <1 IRQ_TYPE_NONE>; /* termcount */
diff --git a/queue-5.4/arm-dts-qcom-apq8064-use-compatible-which-contains-chipid.patch b/queue-5.4/arm-dts-qcom-apq8064-use-compatible-which-contains-chipid.patch
new file mode 100644 (file)
index 0000000..416a755
--- /dev/null
@@ -0,0 +1,43 @@
+From f5c03f131dae3f06d08464e6157dd461200f78d9 Mon Sep 17 00:00:00 2001
+From: David Heidelberg <david@ixit.cz>
+Date: Wed, 18 Aug 2021 08:53:17 +0200
+Subject: ARM: dts: qcom: apq8064: use compatible which contains chipid
+
+From: David Heidelberg <david@ixit.cz>
+
+commit f5c03f131dae3f06d08464e6157dd461200f78d9 upstream.
+
+Also resolves these kernel warnings for APQ8064:
+adreno 4300000.adreno-3xx: Using legacy qcom,chipid binding!
+adreno 4300000.adreno-3xx: Use compatible qcom,adreno-320.2 instead.
+
+Tested on Nexus 7 2013, no functional changes.
+
+Cc: <stable@vger.kernel.org>
+Signed-off-by: David Heidelberg <david@ixit.cz>
+Link: https://lore.kernel.org/r/20210818065317.19822-1-david@ixit.cz
+Signed-off-by: Bjorn Andersson <bjorn.andersson@linaro.org>
+Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
+---
+ arch/arm/boot/dts/qcom-apq8064.dtsi |    3 +--
+ 1 file changed, 1 insertion(+), 2 deletions(-)
+
+--- a/arch/arm/boot/dts/qcom-apq8064.dtsi
++++ b/arch/arm/boot/dts/qcom-apq8064.dtsi
+@@ -1147,7 +1147,7 @@
+               };
+               gpu: adreno-3xx@4300000 {
+-                      compatible = "qcom,adreno-3xx";
++                      compatible = "qcom,adreno-320.2", "qcom,adreno";
+                       reg = <0x04300000 0x20000>;
+                       reg-names = "kgsl_3d0_reg_memory";
+                       interrupts = <GIC_SPI 80 IRQ_TYPE_LEVEL_HIGH>;
+@@ -1162,7 +1162,6 @@
+                           <&mmcc GFX3D_AHB_CLK>,
+                           <&mmcc GFX3D_AXI_CLK>,
+                           <&mmcc MMSS_IMEM_AHB_CLK>;
+-                      qcom,chipid = <0x03020002>;
+                       iommus = <&gfx3d 0
+                                 &gfx3d 1
diff --git a/queue-5.4/mmc-meson-gx-do-not-use-memcpy_to-fromio-for-dram-access-quirk.patch b/queue-5.4/mmc-meson-gx-do-not-use-memcpy_to-fromio-for-dram-access-quirk.patch
new file mode 100644 (file)
index 0000000..562d48b
--- /dev/null
@@ -0,0 +1,154 @@
+From 8a38a4d51c5055d0201542e5ea3c0cb287f6e223 Mon Sep 17 00:00:00 2001
+From: Neil Armstrong <narmstrong@baylibre.com>
+Date: Tue, 28 Sep 2021 09:36:52 +0200
+Subject: mmc: meson-gx: do not use memcpy_to/fromio for dram-access-quirk
+
+From: Neil Armstrong <narmstrong@baylibre.com>
+
+commit 8a38a4d51c5055d0201542e5ea3c0cb287f6e223 upstream.
+
+The memory at the end of the controller only accepts 32bit read/write
+accesses, but the arm64 memcpy_to/fromio implementation only uses 64bit
+(which will be split into two 32bit access) and 8bit leading to incomplete
+copies to/from this memory when the buffer is not multiple of 8bytes.
+
+Add a local copy using writel/readl accesses to make sure we use the right
+memory access width.
+
+The switch to memcpy_to/fromio was done because of 285133040e6c
+("arm64: Import latest memcpy()/memmove() implementation"), but using memcpy
+worked before since it mainly used 32bit memory acceses.
+
+Fixes: 103a5348c22c ("mmc: meson-gx: use memcpy_to/fromio for dram-access-quirk")
+Reported-by: Christian Hewitt <christianshewitt@gmail.com>
+Suggested-by: Martin Blumenstingl <martin.blumenstingl@googlemail.com>
+Signed-off-by: Neil Armstrong <narmstrong@baylibre.com>
+Tested-by: Martin Blumenstingl <martin.blumenstingl@googlemail.com>
+Cc: stable@vger.kernel.org
+Link: https://lore.kernel.org/r/20210928073652.434690-1-narmstrong@baylibre.com
+Signed-off-by: Ulf Hansson <ulf.hansson@linaro.org>
+Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
+---
+ drivers/mmc/host/meson-gx-mmc.c |   73 ++++++++++++++++++++++++++++++++--------
+ 1 file changed, 59 insertions(+), 14 deletions(-)
+
+--- a/drivers/mmc/host/meson-gx-mmc.c
++++ b/drivers/mmc/host/meson-gx-mmc.c
+@@ -738,7 +738,7 @@ static void meson_mmc_desc_chain_transfe
+       writel(start, host->regs + SD_EMMC_START);
+ }
+-/* local sg copy to buffer version with _to/fromio usage for dram_access_quirk */
++/* local sg copy for dram_access_quirk */
+ static void meson_mmc_copy_buffer(struct meson_host *host, struct mmc_data *data,
+                                 size_t buflen, bool to_buffer)
+ {
+@@ -756,21 +756,27 @@ static void meson_mmc_copy_buffer(struct
+       sg_miter_start(&miter, sgl, nents, sg_flags);
+       while ((offset < buflen) && sg_miter_next(&miter)) {
+-              unsigned int len;
++              unsigned int buf_offset = 0;
++              unsigned int len, left;
++              u32 *buf = miter.addr;
+               len = min(miter.length, buflen - offset);
++              left = len;
+-              /* When dram_access_quirk, the bounce buffer is a iomem mapping */
+-              if (host->dram_access_quirk) {
+-                      if (to_buffer)
+-                              memcpy_toio(host->bounce_iomem_buf + offset, miter.addr, len);
+-                      else
+-                              memcpy_fromio(miter.addr, host->bounce_iomem_buf + offset, len);
++              if (to_buffer) {
++                      do {
++                              writel(*buf++, host->bounce_iomem_buf + offset + buf_offset);
++
++                              buf_offset += 4;
++                              left -= 4;
++                      } while (left);
+               } else {
+-                      if (to_buffer)
+-                              memcpy(host->bounce_buf + offset, miter.addr, len);
+-                      else
+-                              memcpy(miter.addr, host->bounce_buf + offset, len);
++                      do {
++                              *buf++ = readl(host->bounce_iomem_buf + offset + buf_offset);
++
++                              buf_offset += 4;
++                              left -= 4;
++                      } while (left);
+               }
+               offset += len;
+@@ -822,7 +828,11 @@ static void meson_mmc_start_cmd(struct m
+               if (data->flags & MMC_DATA_WRITE) {
+                       cmd_cfg |= CMD_CFG_DATA_WR;
+                       WARN_ON(xfer_bytes > host->bounce_buf_size);
+-                      meson_mmc_copy_buffer(host, data, xfer_bytes, true);
++                      if (host->dram_access_quirk)
++                              meson_mmc_copy_buffer(host, data, xfer_bytes, true);
++                      else
++                              sg_copy_to_buffer(data->sg, data->sg_len,
++                                                host->bounce_buf, xfer_bytes);
+                       dma_wmb();
+               }
+@@ -841,12 +851,43 @@ static void meson_mmc_start_cmd(struct m
+       writel(cmd->arg, host->regs + SD_EMMC_CMD_ARG);
+ }
++static int meson_mmc_validate_dram_access(struct mmc_host *mmc, struct mmc_data *data)
++{
++      struct scatterlist *sg;
++      int i;
++
++      /* Reject request if any element offset or size is not 32bit aligned */
++      for_each_sg(data->sg, sg, data->sg_len, i) {
++              if (!IS_ALIGNED(sg->offset, sizeof(u32)) ||
++                  !IS_ALIGNED(sg->length, sizeof(u32))) {
++                      dev_err(mmc_dev(mmc), "unaligned sg offset %u len %u\n",
++                              data->sg->offset, data->sg->length);
++                      return -EINVAL;
++              }
++      }
++
++      return 0;
++}
++
+ static void meson_mmc_request(struct mmc_host *mmc, struct mmc_request *mrq)
+ {
+       struct meson_host *host = mmc_priv(mmc);
+       bool needs_pre_post_req = mrq->data &&
+                       !(mrq->data->host_cookie & SD_EMMC_PRE_REQ_DONE);
++      /*
++       * The memory at the end of the controller used as bounce buffer for
++       * the dram_access_quirk only accepts 32bit read/write access,
++       * check the aligment and length of the data before starting the request.
++       */
++      if (host->dram_access_quirk && mrq->data) {
++              mrq->cmd->error = meson_mmc_validate_dram_access(mmc, mrq->data);
++              if (mrq->cmd->error) {
++                      mmc_request_done(mmc, mrq);
++                      return;
++              }
++      }
++
+       if (needs_pre_post_req) {
+               meson_mmc_get_transfer_mode(mmc, mrq);
+               if (!meson_mmc_desc_chain_mode(mrq->data))
+@@ -991,7 +1032,11 @@ static irqreturn_t meson_mmc_irq_thread(
+       if (meson_mmc_bounce_buf_read(data)) {
+               xfer_bytes = data->blksz * data->blocks;
+               WARN_ON(xfer_bytes > host->bounce_buf_size);
+-              meson_mmc_copy_buffer(host, data, xfer_bytes, false);
++              if (host->dram_access_quirk)
++                      meson_mmc_copy_buffer(host, data, xfer_bytes, false);
++              else
++                      sg_copy_from_buffer(data->sg, data->sg_len,
++                                          host->bounce_buf, xfer_bytes);
+       }
+       next_cmd = meson_mmc_get_next_command(cmd);
diff --git a/queue-5.4/nfsd-fix-error-handling-of-register_pernet_subsys-in-init_nfsd.patch b/queue-5.4/nfsd-fix-error-handling-of-register_pernet_subsys-in-init_nfsd.patch
new file mode 100644 (file)
index 0000000..89f2783
--- /dev/null
@@ -0,0 +1,43 @@
+From 1d625050c7c2dd877e108e382b8aaf1ae3cfe1f4 Mon Sep 17 00:00:00 2001
+From: Patrick Ho <Patrick.Ho@netapp.com>
+Date: Sat, 21 Aug 2021 02:56:26 -0400
+Subject: nfsd: fix error handling of register_pernet_subsys() in init_nfsd()
+
+From: Patrick Ho <Patrick.Ho@netapp.com>
+
+commit 1d625050c7c2dd877e108e382b8aaf1ae3cfe1f4 upstream.
+
+init_nfsd() should not unregister pernet subsys if the register fails
+but should instead unwind from the last successful operation which is
+register_filesystem().
+
+Unregistering a failed register_pernet_subsys() call can result in
+a kernel GPF as revealed by programmatically injecting an error in
+register_pernet_subsys().
+
+Verified the fix handled failure gracefully with no lingering nfsd
+entry in /proc/filesystems.  This change was introduced by the commit
+bd5ae9288d64 ("nfsd: register pernet ops last, unregister first"),
+the original error handling logic was correct.
+
+Fixes: bd5ae9288d64 ("nfsd: register pernet ops last, unregister first")
+Cc: stable@vger.kernel.org
+Signed-off-by: Patrick Ho <Patrick.Ho@netapp.com>
+Acked-by: J. Bruce Fields <bfields@redhat.com>
+Signed-off-by: Chuck Lever <chuck.lever@oracle.com>
+Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
+---
+ fs/nfsd/nfsctl.c |    2 +-
+ 1 file changed, 1 insertion(+), 1 deletion(-)
+
+--- a/fs/nfsd/nfsctl.c
++++ b/fs/nfsd/nfsctl.c
+@@ -1549,7 +1549,7 @@ static int __init init_nfsd(void)
+               goto out_free_all;
+       return 0;
+ out_free_all:
+-      unregister_pernet_subsys(&nfsd_net_ops);
++      unregister_filesystem(&nfsd_fs_type);
+ out_free_exports:
+       remove_proc_entry("fs/nfs/exports", NULL);
+       remove_proc_entry("fs/nfs", NULL);
diff --git a/queue-5.4/nfsd4-handle-the-nfsv4-readdir-dircount-hint-being-zero.patch b/queue-5.4/nfsd4-handle-the-nfsv4-readdir-dircount-hint-being-zero.patch
new file mode 100644 (file)
index 0000000..6edb32c
--- /dev/null
@@ -0,0 +1,52 @@
+From f2e717d655040d632c9015f19aa4275f8b16e7f2 Mon Sep 17 00:00:00 2001
+From: Trond Myklebust <trond.myklebust@hammerspace.com>
+Date: Thu, 30 Sep 2021 15:44:41 -0400
+Subject: nfsd4: Handle the NFSv4 READDIR 'dircount' hint being zero
+
+From: Trond Myklebust <trond.myklebust@hammerspace.com>
+
+commit f2e717d655040d632c9015f19aa4275f8b16e7f2 upstream.
+
+RFC3530 notes that the 'dircount' field may be zero, in which case the
+recommendation is to ignore it, and only enforce the 'maxcount' field.
+In RFC5661, this recommendation to ignore a zero valued field becomes a
+requirement.
+
+Fixes: aee377644146 ("nfsd4: fix rd_dircount enforcement")
+Cc: <stable@vger.kernel.org>
+Signed-off-by: Trond Myklebust <trond.myklebust@hammerspace.com>
+Signed-off-by: Chuck Lever <chuck.lever@oracle.com>
+Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
+---
+ fs/nfsd/nfs4xdr.c |   19 +++++++++++--------
+ 1 file changed, 11 insertions(+), 8 deletions(-)
+
+--- a/fs/nfsd/nfs4xdr.c
++++ b/fs/nfsd/nfs4xdr.c
+@@ -3131,15 +3131,18 @@ nfsd4_encode_dirent(void *ccdv, const ch
+               goto fail;
+       cd->rd_maxcount -= entry_bytes;
+       /*
+-       * RFC 3530 14.2.24 describes rd_dircount as only a "hint", so
+-       * let's always let through the first entry, at least:
++       * RFC 3530 14.2.24 describes rd_dircount as only a "hint", and
++       * notes that it could be zero. If it is zero, then the server
++       * should enforce only the rd_maxcount value.
+        */
+-      if (!cd->rd_dircount)
+-              goto fail;
+-      name_and_cookie = 4 + 4 * XDR_QUADLEN(namlen) + 8;
+-      if (name_and_cookie > cd->rd_dircount && cd->cookie_offset)
+-              goto fail;
+-      cd->rd_dircount -= min(cd->rd_dircount, name_and_cookie);
++      if (cd->rd_dircount) {
++              name_and_cookie = 4 + 4 * XDR_QUADLEN(namlen) + 8;
++              if (name_and_cookie > cd->rd_dircount && cd->cookie_offset)
++                      goto fail;
++              cd->rd_dircount -= min(cd->rd_dircount, name_and_cookie);
++              if (!cd->rd_dircount)
++                      cd->rd_maxcount = 0;
++      }
+       cd->cookie_offset = cookie_offset;
+ skip_entry:
diff --git a/queue-5.4/ovl-fix-missing-negative-dentry-check-in-ovl_rename.patch b/queue-5.4/ovl-fix-missing-negative-dentry-check-in-ovl_rename.patch
new file mode 100644 (file)
index 0000000..1182dbf
--- /dev/null
@@ -0,0 +1,62 @@
+From a295aef603e109a47af355477326bd41151765b6 Mon Sep 17 00:00:00 2001
+From: Zheng Liang <zhengliang6@huawei.com>
+Date: Fri, 24 Sep 2021 09:16:27 +0800
+Subject: ovl: fix missing negative dentry check in ovl_rename()
+
+From: Zheng Liang <zhengliang6@huawei.com>
+
+commit a295aef603e109a47af355477326bd41151765b6 upstream.
+
+The following reproducer
+
+  mkdir lower upper work merge
+  touch lower/old
+  touch lower/new
+  mount -t overlay overlay -olowerdir=lower,upperdir=upper,workdir=work merge
+  rm merge/new
+  mv merge/old merge/new & unlink upper/new
+
+may result in this race:
+
+PROCESS A:
+  rename("merge/old", "merge/new");
+  overwrite=true,ovl_lower_positive(old)=true,
+  ovl_dentry_is_whiteout(new)=true -> flags |= RENAME_EXCHANGE
+
+PROCESS B:
+  unlink("upper/new");
+
+PROCESS A:
+  lookup newdentry in new_upperdir
+  call vfs_rename() with negative newdentry and RENAME_EXCHANGE
+
+Fix by adding the missing check for negative newdentry.
+
+Signed-off-by: Zheng Liang <zhengliang6@huawei.com>
+Fixes: e9be9d5e76e3 ("overlay filesystem")
+Cc: <stable@vger.kernel.org> # v3.18
+Signed-off-by: Miklos Szeredi <mszeredi@redhat.com>
+Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
+---
+ fs/overlayfs/dir.c |   10 +++++++---
+ 1 file changed, 7 insertions(+), 3 deletions(-)
+
+--- a/fs/overlayfs/dir.c
++++ b/fs/overlayfs/dir.c
+@@ -1162,9 +1162,13 @@ static int ovl_rename(struct inode *oldd
+                               goto out_dput;
+               }
+       } else {
+-              if (!d_is_negative(newdentry) &&
+-                  (!new_opaque || !ovl_is_whiteout(newdentry)))
+-                      goto out_dput;
++              if (!d_is_negative(newdentry)) {
++                      if (!new_opaque || !ovl_is_whiteout(newdentry))
++                              goto out_dput;
++              } else {
++                      if (flags & RENAME_EXCHANGE)
++                              goto out_dput;
++              }
+       }
+       if (olddentry == trap)
index ed78b4515b6bb3c6f92fd3d07e21191d4534010d..ce16a5602232374dcedbbd6d9411b235499f3e0f 100644 (file)
@@ -3,3 +3,10 @@ usb-cdc-acm-fix-racy-tty-buffer-accesses.patch
 usb-cdc-acm-fix-break-reporting.patch
 usb-typec-tcpm-handle-src_startup-state-if-cc-changes.patch
 xen-privcmd-fix-error-handling-in-mmap-resource-processing.patch
+mmc-meson-gx-do-not-use-memcpy_to-fromio-for-dram-access-quirk.patch
+ovl-fix-missing-negative-dentry-check-in-ovl_rename.patch
+nfsd-fix-error-handling-of-register_pernet_subsys-in-init_nfsd.patch
+nfsd4-handle-the-nfsv4-readdir-dircount-hint-being-zero.patch
+xen-balloon-fix-cancelled-balloon-action.patch
+arm-dts-omap3430-sdp-fix-nand-device-node.patch
+arm-dts-qcom-apq8064-use-compatible-which-contains-chipid.patch
diff --git a/queue-5.4/xen-balloon-fix-cancelled-balloon-action.patch b/queue-5.4/xen-balloon-fix-cancelled-balloon-action.patch
new file mode 100644 (file)
index 0000000..c85a4ef
--- /dev/null
@@ -0,0 +1,73 @@
+From 319933a80fd4f07122466a77f93e5019d71be74c Mon Sep 17 00:00:00 2001
+From: Juergen Gross <jgross@suse.com>
+Date: Tue, 5 Oct 2021 15:34:33 +0200
+Subject: xen/balloon: fix cancelled balloon action
+MIME-Version: 1.0
+Content-Type: text/plain; charset=UTF-8
+Content-Transfer-Encoding: 8bit
+
+From: Juergen Gross <jgross@suse.com>
+
+commit 319933a80fd4f07122466a77f93e5019d71be74c upstream.
+
+In case a ballooning action is cancelled the new kernel thread handling
+the ballooning might end up in a busy loop.
+
+Fix that by handling the cancelled action gracefully.
+
+While at it introduce a short wait for the BP_WAIT case.
+
+Cc: stable@vger.kernel.org
+Fixes: 8480ed9c2bbd56 ("xen/balloon: use a kernel thread instead a workqueue")
+Reported-by: Marek Marczykowski-Górecki <marmarek@invisiblethingslab.com>
+Signed-off-by: Juergen Gross <jgross@suse.com>
+Tested-by: Jason Andryuk <jandryuk@gmail.com>
+Reviewed-by: Boris Ostrovsky <boris.ostrovsky@oracle.com>
+Link: https://lore.kernel.org/r/20211005133433.32008-1-jgross@suse.com
+Signed-off-by: Juergen Gross <jgross@suse.com>
+Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
+---
+ drivers/xen/balloon.c |   21 +++++++++++++++------
+ 1 file changed, 15 insertions(+), 6 deletions(-)
+
+--- a/drivers/xen/balloon.c
++++ b/drivers/xen/balloon.c
+@@ -508,12 +508,12 @@ static enum bp_state decrease_reservatio
+ }
+ /*
+- * Stop waiting if either state is not BP_EAGAIN and ballooning action is
+- * needed, or if the credit has changed while state is BP_EAGAIN.
++ * Stop waiting if either state is BP_DONE and ballooning action is
++ * needed, or if the credit has changed while state is not BP_DONE.
+  */
+ static bool balloon_thread_cond(enum bp_state state, long credit)
+ {
+-      if (state != BP_EAGAIN)
++      if (state == BP_DONE)
+               credit = 0;
+       return current_credit() != credit || kthread_should_stop();
+@@ -533,10 +533,19 @@ static int balloon_thread(void *unused)
+       set_freezable();
+       for (;;) {
+-              if (state == BP_EAGAIN)
+-                      timeout = balloon_stats.schedule_delay * HZ;
+-              else
++              switch (state) {
++              case BP_DONE:
++              case BP_ECANCELED:
+                       timeout = 3600 * HZ;
++                      break;
++              case BP_EAGAIN:
++                      timeout = balloon_stats.schedule_delay * HZ;
++                      break;
++              case BP_WAIT:
++                      timeout = HZ;
++                      break;
++              }
++
+               credit = current_credit();
+               wait_event_freezable_timeout(balloon_thread_wq,