search for: netbk_tx_err

Displaying 4 results from an estimated 4 matches for "netbk_tx_err".

2013 Feb 01
45
netback Oops then xenwatch stuck in D state
We''ve been hitting the following issue on a variety of hosts and recent Xen/dom0 version combinations. Here''s an excerpt from our latest: Xen: 4.1.4 (xenbits @ 23432) Dom0: 3.7.1-x86_64 BUG: unable to handle kernel NULL pointer dereference at 000000000000001c IP: [<ffffffff8141a301>] evtchn_from_irq+0x11/0x40 PGD 0 Oops: 0000 [#1] SMP Modules linked in: ebt_comment
2013 Feb 06
0
[PATCH 1/4] xen/netback: shutdown the ring if it contains garbage.
...it_event(vif->waiting_to_free, atomic_read(&vif->refcnt) == 0); diff --git a/drivers/net/xen-netback/netback.c b/drivers/net/xen-netback/netback.c index f2d6b78..1a449f9 100644 --- a/drivers/net/xen-netback/netback.c +++ b/drivers/net/xen-netback/netback.c @@ -888,6 +888,13 @@ static void netbk_tx_err(struct xenvif *vif, xenvif_put(vif); } +static void netbk_fatal_tx_err(struct xenvif *vif) +{ + netdev_err(vif->dev, "fatal error; disabling device\n"); + xenvif_carrier_off(vif); + xenvif_put(vif); +} + static int netbk_count_requests(struct xenvif *vif, struct xen_netif_tx...
2013 Apr 17
1
Bug#701744: We see the same with Debian wheezy.
...ffffc90017356ec0 Apr 16 16:02:25 hypervisor3 kernel: [2441115.678152] Call Trace: Apr 16 16:02:25 hypervisor3 kernel: [2441115.678191] [<ffffffffa048cddd>] ? xen_netbk_schedule_xenvif+0x35/0xd6 [xen_netback] Apr 16 16:02:25 hypervisor3 kernel: [2441115.678264] [<ffffffffa048cf71>] ? netbk_tx_err+0x3f/0x4b [xen_netback] Apr 16 16:02:25 hypervisor3 kernel: [2441115.678311] [<ffffffffa048d517>] ? xen_netbk_tx_build_gops+0x59a/0x9e2 [xen_netback] Apr 16 16:02:25 hypervisor3 kernel: [2441115.678384] [<ffffffff81004be5>] ? phys_to_machine+0x13/0x1c Apr 16 16:02:25 hypervisor3 ker...
2013 Apr 30
6
[PATCH net-next 2/2] xen-netback: avoid allocating variable size array on stack
...netbk_fatal_tx_err(vif); return -EINVAL; } - } while ((txp++)->flags & XEN_NETTXF_more_data); + + keep_looping = (!drop_err && (txp++)->flags & XEN_NETTXF_more_data) || + (dropped_tx.flags & XEN_NETTXF_more_data); + } while (keep_looping); if (drop_err) { netbk_tx_err(vif, first, cons + slots); @@ -1408,7 +1424,7 @@ static unsigned xen_netbk_tx_build_gops(struct xen_netbk *netbk) !list_empty(&netbk->net_schedule_list)) { struct xenvif *vif; struct xen_netif_tx_request txreq; - struct xen_netif_tx_request txfrags[max_skb_slots]; + struct xen_net...