search for: enobufs

Displaying 20 results from an estimated 354 matches for "enobufs".

2008 Jan 01
0
Errno::ENOBUFS:
Hello all, I am facing an error when I send a hit to the app. The page doesnt display anything and the server console says: ERROR Errno::ENOBUFS: An operation on a socket could not be performed because the system lacked sufficient buffer space or because a queue was full. Any insight into this error ?? -- Regards Haris Gulzar --~--~---------~--~----~------------~-------~--~----~ You received this message because you are subscribed to t...
2008 Sep 09
3
No buffer space available
Hi, I'm running Dovecot 1.1.3 on FreeBSD 7.0. In the past couple days, I've been seeing errors like this: Sep 9 08:43:51 sysvol dovecot: pop3-login: socketpair() failed: No buffer space available Sep 9 08:43:51 sysvol dovecot: pop3-login: socket(default) failed: No buffer space available Sep 9 08:43:51 sysvol dovecot: pop3-login: Can't connect to auth server at default: No
2023 Mar 21
1
[PATCH v3 4/8] vringh: support VA with iotlb
...host_iotlb *iotlb = vrh->iotlb; @@ -1107,9 +1115,9 @@ static int iotlb_translate(const struct vringh *vrh, spin_lock(vrh->iotlb_lock); while (len > s) { - u64 size, pa, pfn; + u64 size; - if (unlikely(ret >= iov_size)) { + if (unlikely(ret >= ivec->count)) { ret = -ENOBUFS; break; } @@ -1124,10 +1132,22 @@ static int iotlb_translate(const struct vringh *vrh, } size = map->size - addr + map->start; - pa = map->addr + addr - map->start; - pfn = pa >> PAGE_SHIFT; - bvec_set_page(&iov[ret], pfn_to_page(pfn), min(len - s, size), -...
2023 May 11
0
[PATCH v2] vhost_net: revert upend_idx only on retriable error
...+934,18 @@ static void handle_tx_zerocopy(struct vhost_net *net, struct socket *sock) > > err = sock->ops->sendmsg(sock, &msg, len); > if (unlikely(err < 0)) { > + bool retry = err == -EAGAIN || err == -ENOMEM || err == -ENOBUFS; > + > if (zcopy_used) { > if (vq->heads[ubuf->desc].len == VHOST_DMA_IN_PROGRESS) > vhost_net_ubuf_put(ubufs); > - nvq->upend_idx = ((unsigned)nvq-&...
2010 Sep 14
1
[PATCH] vhost-net: fix range checking in mrg bufs case
...d5..f095de6 100644 --- a/drivers/vhost/net.c +++ b/drivers/vhost/net.c @@ -245,7 +245,7 @@ static int get_rx_bufs(struct vhost_virtqueue *vq, int r, nlogs = 0; while (datalen > 0) { - if (unlikely(headcount >= VHOST_NET_MAX_SG)) { + if (unlikely(seg >= VHOST_NET_MAX_SG)) { r = -ENOBUFS; goto err; } -- 1.7.3.rc1.5.ge5969
2010 Sep 14
1
[PATCH] vhost-net: fix range checking in mrg bufs case
...d5..f095de6 100644 --- a/drivers/vhost/net.c +++ b/drivers/vhost/net.c @@ -245,7 +245,7 @@ static int get_rx_bufs(struct vhost_virtqueue *vq, int r, nlogs = 0; while (datalen > 0) { - if (unlikely(headcount >= VHOST_NET_MAX_SG)) { + if (unlikely(seg >= VHOST_NET_MAX_SG)) { r = -ENOBUFS; goto err; } -- 1.7.3.rc1.5.ge5969
2009 Sep 26
2
Config XLSUITE in Windows
...Mongrel listening at 0.0.0.0:3000 Exiting c:/ruby/lib/ruby/gems/1.8/gems/mongrel-1.1.5-x86-mswin32-60/lib/mongrel/tcphack. rb:13:in `listen'': An operation on a socket could not be performed because the s ystem lacked sufficient buffer space or because a queue was full. - listen(2) (E rrno::ENOBUFS) from c:/ruby/lib/ruby/gems/1.8/gems/mongrel-1.1.5-x86-mswin32-60/lib/mon grel/tcphack.rb:13:in `initialize'' from c:/ruby/lib/ruby/gems/1.8/gems/mongrel-1.1.5-x86-mswin32-60/lib/mon grel.rb:93:in `new'' from c:/ruby/lib/ruby/gems/1.8/gems/mongrel-1.1.5-x86-m...
2013 Sep 04
2
[PATCH V3 4/6] vhost_net: determine whether or not to use zerocopy at one time
...uf); > + ubufs = nvq->ubufs; > + kref_get(&ubufs->kref); > nvq->upend_idx = (nvq->upend_idx + 1) % UIO_MAXIOV; > - } else > + } else { > msg.msg_control = NULL; > + ubufs = NULL; > + } > /* TODO: Check specific error and bomb out unless ENOBUFS? */ > err = sock->ops->sendmsg(NULL, sock, &msg, len); > if (unlikely(err < 0)) { > if (zcopy_used) { > - if (ubufs) > - vhost_net_ubuf_put(ubufs); > + vhost_net_ubuf_put(ubufs); > nvq->upend_idx = ((unsigned)nvq->upend_idx - 1) >...
2013 Sep 04
2
[PATCH V3 4/6] vhost_net: determine whether or not to use zerocopy at one time
...uf); > + ubufs = nvq->ubufs; > + kref_get(&ubufs->kref); > nvq->upend_idx = (nvq->upend_idx + 1) % UIO_MAXIOV; > - } else > + } else { > msg.msg_control = NULL; > + ubufs = NULL; > + } > /* TODO: Check specific error and bomb out unless ENOBUFS? */ > err = sock->ops->sendmsg(NULL, sock, &msg, len); > if (unlikely(err < 0)) { > if (zcopy_used) { > - if (ubufs) > - vhost_net_ubuf_put(ubufs); > + vhost_net_ubuf_put(ubufs); > nvq->upend_idx = ((unsigned)nvq->upend_idx - 1) >...
2017 Sep 28
1
[PATCH net-next RFC 5/5] vhost_net: basic tx virtqueue batched processing
...if (zcopy) > @@ -486,95 +492,114 @@ static void handle_tx(struct vhost_net *net) > if (unlikely(vhost_exceeds_maxpend(net))) > break; > + /* TODO: Check specific error and bomb out > + * unless ENOBUFS? > + */ > + err = sock->ops->sendmsg(sock, &msg, len); > + if (unlikely(err < 0)) { > + if (zcopy_used) { > + vhost_net_ubuf_put(ubufs);...
2017 Sep 28
1
[PATCH net-next RFC 5/5] vhost_net: basic tx virtqueue batched processing
...if (zcopy) > @@ -486,95 +492,114 @@ static void handle_tx(struct vhost_net *net) > if (unlikely(vhost_exceeds_maxpend(net))) > break; > + /* TODO: Check specific error and bomb out > + * unless ENOBUFS? > + */ > + err = sock->ops->sendmsg(sock, &msg, len); > + if (unlikely(err < 0)) { > + if (zcopy_used) { > + vhost_net_ubuf_put(ubufs);...
2023 Mar 23
1
[PATCH v3 4/8] vringh: support VA with iotlb
...in_lock(vrh->iotlb_lock); > > while (len > s) { > - u64 size, pa, pfn; > + u64 size; > > - if (unlikely(ret >= iov_size)) { > + if (unlikely(ret >= ivec->count)) { > ret = -ENOBUFS; > break; > } > @@ -1124,10 +1132,22 @@ static int iotlb_translate(const struct vringh *vrh, > } > > size = map->size - addr + map->start; > - pa = map->addr + addr - map->start; &...
2018 Jul 03
0
[PATCH net-next 1/8] vhost: move get_rx_bufs to vhost.c
...0; - int headcount = 0; - unsigned d; - int r, nlogs = 0; - /* len is always initialized before use since we are always called with - * datalen > 0. - */ - u32 uninitialized_var(len); - - while (datalen > 0 && headcount < quota) { - if (unlikely(seg >= UIO_MAXIOV)) { - r = -ENOBUFS; - goto err; - } - r = vhost_get_vq_desc(vq, vq->iov + seg, - ARRAY_SIZE(vq->iov) - seg, &out, - &in, log, log_num); - if (unlikely(r < 0)) - goto err; - - d = r; - if (d == vq->num) { - r = 0; - goto err; - } - if (unlikely(out || in <= 0)) {...
2003 Jul 18
10
[HTB] htb_dequeue_tree assertion (kernel 2.4.21-ac4)
Hello, I think the BUG_TRAP() in the htb_dequeue_tree() is wrong. First it checks if the class pointer "cl" is NULL, which is obviously right. But I do not understand why we also check whenever the queue length of the leaf queue is zero "cl->un.leaf.q->q.qlen". I would have put that in the expression of the "if" statements that comes afterwards. A queue
2012 Apr 25
1
forwarding packets to service in same host without using loopback network
...printf ("pkt received\n"); nfq_handle_packet (h, buf, rv); continue; } /* if your application is too slow to digest the packets that * are sent from kernel-space, the socket buffer that we use * to enqueue packets may fill up returning ENOBUFS. Depending * on your application, this error may be ignored. Please, see * the doxygen documentation of this library on how to improve * this situation. */ if (rv < 0 && errno == ENOBUFS) { printf ("losing packets!\n&...
2018 May 21
1
[RFC PATCH net-next 04/12] vhost_net: split out datacopy logic
...len; > + if (total_len < VHOST_NET_WEIGHT && > + vhost_has_more_pkts(net, vq)) { > + msg.msg_flags |= MSG_MORE; > + } else { > + msg.msg_flags &= ~MSG_MORE; > + } don't need { } here. > + > + /* TODO: Check specific error and bomb out unless ENOBUFS? */ > + err = sock->ops->sendmsg(sock, &msg, len); > + if (unlikely(err < 0)) { > + vhost_discard_vq_desc(vq, 1); > + vhost_net_enable_vq(net, vq); > + break; > + } > + if (err != len) > + pr_debug("Truncated TX packet: " > + "...
2018 Apr 23
0
[RFC V3 PATCH 1/8] vhost: move get_rx_bufs to vhost.c
...0; - int headcount = 0; - unsigned d; - int r, nlogs = 0; - /* len is always initialized before use since we are always called with - * datalen > 0. - */ - u32 uninitialized_var(len); - - while (datalen > 0 && headcount < quota) { - if (unlikely(seg >= UIO_MAXIOV)) { - r = -ENOBUFS; - goto err; - } - r = vhost_get_vq_desc(vq, vq->iov + seg, - ARRAY_SIZE(vq->iov) - seg, &out, - &in, log, log_num); - if (unlikely(r < 0)) - goto err; - - d = r; - if (d == vq->num) { - r = 0; - goto err; - } - if (unlikely(out || in <= 0)) {...
2023 Mar 02
8
[PATCH v2 0/8] vdpa_sim: add support for user VA
v2: - rebased on Linus' tree, commit ae3419fbac84 ("vc_screen: don't clobber return value in vcs_read") - removed `struct task_struct *owner` param (unused for now, maybe ?useful to support cgroups) [Jason] - add unbind_mm callback [Jason] - call the new unbind_mm callback during the release [Jason] - avoid to call bind_mm callback after the reset, since the device ?is not
2020 Sep 10
0
[PATCH v7 3/3] vhost: add an RPMsg API
...; + if (iter->head == vq->num) + iter->head = -EAGAIN; + + if (iter->head < 0) { + ret = iter->head; + goto unlock; + } + + tmp = iov_length(vq->iov, cnt); + if (tmp < sizeof(iter->rhdr)) { + vq_err(vq, "%s(): size %zu too small\n", __func__, tmp); + ret = -ENOBUFS; + goto return_buf; + } + + switch (qid) { + case VIRTIO_RPMSG_REQUEST: + if (len >= 0) { + if (tmp < sizeof(iter->rhdr) + len) { + ret = -ENOBUFS; + goto return_buf; + } + + tmp = len + sizeof(iter->rhdr); + } + + /* len is now the size of the payload */ + iov_iter_ini...
2020 May 27
0
[PATCH v3 5/5] vhost: add an RPMsg API
...vhost_rpmsg_get_single(vq); + if (iter->head == vq->num) + iter->head = -EAGAIN; + + if (iter->head < 0) + goto unlock; + + tmp = vq->iov[0].iov_len; + if (tmp < sizeof(iter->rhdr)) { + vq_err(vq, "%s(): size %zu too small\n", __func__, tmp); + iter->head = -ENOBUFS; + goto return_buf; + } + + switch (qid) { + case VIRTIO_RPMSG_REQUEST: + if (len < 0) { + len = tmp - sizeof(iter->rhdr); + } else if (tmp < sizeof(iter->rhdr) + len) { + iter->head = -ENOBUFS; + goto return_buf; + } + + /* len is now the size of the payload */ + iov_ite...