Build fixes for grant tables.
authorsmh22@firebug.cl.cam.ac.uk <smh22@firebug.cl.cam.ac.uk>
Sun, 14 Aug 2005 22:56:46 +0000 (22:56 +0000)
committersmh22@firebug.cl.cam.ac.uk <smh22@firebug.cl.cam.ac.uk>
Sun, 14 Aug 2005 22:56:46 +0000 (22:56 +0000)
Signed-off-by: Steven Hand <steven@xensource.com>
linux-2.6-xen-sparse/drivers/xen/netback/interface.c
linux-2.6-xen-sparse/drivers/xen/netback/netback.c
linux-2.6-xen-sparse/drivers/xen/netfront/netfront.c

index acf5f80540af00a17a5dd466879f77478d85f143..832691522054cc29220cab22df3af2ac5b198802 100644 (file)
@@ -383,12 +383,6 @@ void netif_connect(netif_be_connect_t *connect)
             return;
         }
 
-            DPRINTK(" Grant table operation failure !\n");
-            connect->status = NETIF_BE_STATUS_MAPPING_ERROR;
-            vfree(vma->addr);
-            return;
-        }
-
         netif->rx_shmem_ref    = rx_ref;
         netif->rx_shmem_handle = handle;
         netif->rx_shmem_vaddr  = VMALLOC_VMADDR(vma->addr) + PAGE_SIZE;
index 038b5e3e75230aad9455ae1d6bdf43438df2c2db..0de0b0b0643bc630a43cf7881ce6736b02a29623 100644 (file)
@@ -55,6 +55,8 @@ static DECLARE_TASKLET(net_rx_tasklet, net_rx_action, 0);
 
 static struct timer_list net_timer;
 
+#define MAX_PENDING_REQS 256
+
 static struct sk_buff_head rx_queue;
 static multicall_entry_t rx_mcl[NETIF_RX_RING_SIZE*2+1];
 static mmu_update_t rx_mmu[NETIF_RX_RING_SIZE];
@@ -68,7 +70,6 @@ static unsigned char rx_notify[NR_EVENT_CHANNELS];
 /* Don't currently gate addition of an interface to the tx scheduling list. */
 #define tx_work_exists(_if) (1)
 
-#define MAX_PENDING_REQS 256
 static unsigned long mmap_vstart;
 #define MMAP_VADDR(_req) (mmap_vstart + ((_req) * PAGE_SIZE))
 
index 7c78eb1ec4a253dd7c30292fa1bffb38001d15a7..742c3fd46c392ea9986643636112edfe9431d29b 100644 (file)
@@ -356,7 +356,7 @@ static void network_tx_buf_gc(struct net_device *dev)
             id  = np->tx->ring[MASK_NETIF_TX_IDX(i)].resp.id;
             skb = np->tx_skbs[id];
 #ifdef CONFIG_XEN_NETDEV_GRANT_TX
-            if (unlikey(gnttab_query_foreign_access(grant_tx_ref[id]) != 0)) {
+            if (unlikely(gnttab_query_foreign_access(grant_tx_ref[id]) != 0)) {
                 /* other domain is still using this grant - shouldn't happen
                    but if it does, we'll try to reclaim the grant later */
                 printk(KERN_ALERT "network_tx_buf_gc: warning -- grant "