Displaying 4 results from an estimated 4 matches for "netbk_tx_err".
2013 Feb 01
45
netback Oops then xenwatch stuck in D state
We''ve been hitting the following issue on a variety of hosts and recent
Xen/dom0 version combinations. Here''s an excerpt from our latest:
Xen: 4.1.4 (xenbits @ 23432)
Dom0: 3.7.1-x86_64
BUG: unable to handle kernel NULL pointer dereference at 000000000000001c
IP: [<ffffffff8141a301>] evtchn_from_irq+0x11/0x40
PGD 0
Oops: 0000 [#1] SMP
Modules linked in: ebt_comment
2013 Feb 06
0
[PATCH 1/4] xen/netback: shutdown the ring if it contains garbage.
...it_event(vif->waiting_to_free, atomic_read(&vif->refcnt) == 0);
diff --git a/drivers/net/xen-netback/netback.c b/drivers/net/xen-netback/netback.c
index f2d6b78..1a449f9 100644
--- a/drivers/net/xen-netback/netback.c
+++ b/drivers/net/xen-netback/netback.c
@@ -888,6 +888,13 @@ static void netbk_tx_err(struct xenvif *vif,
xenvif_put(vif);
}
+static void netbk_fatal_tx_err(struct xenvif *vif)
+{
+ netdev_err(vif->dev, "fatal error; disabling device\n");
+ xenvif_carrier_off(vif);
+ xenvif_put(vif);
+}
+
static int netbk_count_requests(struct xenvif *vif,
struct xen_netif_tx...
2013 Apr 17
1
Bug#701744: We see the same with Debian wheezy.
...ffffc90017356ec0
Apr 16 16:02:25 hypervisor3 kernel: [2441115.678152] Call Trace:
Apr 16 16:02:25 hypervisor3 kernel: [2441115.678191]
[<ffffffffa048cddd>] ? xen_netbk_schedule_xenvif+0x35/0xd6 [xen_netback]
Apr 16 16:02:25 hypervisor3 kernel: [2441115.678264]
[<ffffffffa048cf71>] ? netbk_tx_err+0x3f/0x4b [xen_netback]
Apr 16 16:02:25 hypervisor3 kernel: [2441115.678311]
[<ffffffffa048d517>] ? xen_netbk_tx_build_gops+0x59a/0x9e2 [xen_netback]
Apr 16 16:02:25 hypervisor3 kernel: [2441115.678384]
[<ffffffff81004be5>] ? phys_to_machine+0x13/0x1c
Apr 16 16:02:25 hypervisor3 ker...
2013 Apr 30
6
[PATCH net-next 2/2] xen-netback: avoid allocating variable size array on stack
...netbk_fatal_tx_err(vif);
return -EINVAL;
}
- } while ((txp++)->flags & XEN_NETTXF_more_data);
+
+ keep_looping = (!drop_err && (txp++)->flags & XEN_NETTXF_more_data) ||
+ (dropped_tx.flags & XEN_NETTXF_more_data);
+ } while (keep_looping);
if (drop_err) {
netbk_tx_err(vif, first, cons + slots);
@@ -1408,7 +1424,7 @@ static unsigned xen_netbk_tx_build_gops(struct xen_netbk *netbk)
!list_empty(&netbk->net_schedule_list)) {
struct xenvif *vif;
struct xen_netif_tx_request txreq;
- struct xen_netif_tx_request txfrags[max_skb_slots];
+ struct xen_net...