Displaying 20 results from an estimated 300 matches similar to: "[PATCH 1/4] xen/netback: shutdown the ring if it contains garbage."
2013 Apr 30
6
[PATCH net-next 2/2] xen-netback: avoid allocating variable size array on stack
Tune xen_netbk_count_requests to not touch working array beyond limit, so that
we can make working array size constant.
Signed-off-by: Wei Liu <wei.liu2@citrix.com>
---
drivers/net/xen-netback/netback.c | 26 +++++++++++++++++++++-----
1 file changed, 21 insertions(+), 5 deletions(-)
diff --git a/drivers/net/xen-netback/netback.c b/drivers/net/xen-netback/netback.c
index
2013 Jun 24
3
[PATCH v2] xen-netback: add a pseudo pps rate limit
VM traffic is already limited by a throughput limit, but there is no
control over the maximum packet per second (PPS).
In DDOS attack the major issue is rather PPS than throughput.
With provider offering more bandwidth to VMs, it becames easy to
coordinate a massive attack using VMs. Example: 100Mbits ~ 200kpps using
64B packets.
This patch provides a new option to limit VMs maximum packets per
2013 Feb 01
45
netback Oops then xenwatch stuck in D state
We''ve been hitting the following issue on a variety of hosts and recent
Xen/dom0 version combinations. Here''s an excerpt from our latest:
Xen: 4.1.4 (xenbits @ 23432)
Dom0: 3.7.1-x86_64
BUG: unable to handle kernel NULL pointer dereference at 000000000000001c
IP: [<ffffffff8141a301>] evtchn_from_irq+0x11/0x40
PGD 0
Oops: 0000 [#1] SMP
Modules linked in: ebt_comment
2013 Apr 17
1
Bug#701744: We see the same with Debian wheezy.
Hello we see the same with debian Wheezy.
Apr 16 16:02:25 hypervisor3 kernel: [2441115.664216] vif vif-17-0:
vif17.0: Frag is bigger than frame.
Apr 16 16:02:25 hypervisor3 kernel: [2441115.664267] vif vif-17-0:
vif17.0: fatal error; disabling device
Apr 16 16:02:25 hypervisor3 kernel: [2441115.675667] BUG: unable to
handle kernel NULL pointer dereference at 00000000000008b8
Apr 16 16:02:25
2013 Feb 15
1
[PATCH 7/8] netback: split event channels support
Netback and netfront only use one event channel to do tx / rx notification.
This may cause unnecessary wake-up of process routines. This patch adds a new
feature called feautre-split-event-channel to netback, enabling it to handle
Tx and Rx event separately.
Netback will use tx_irq to notify guest for tx completion, rx_irq for rx
notification.
If frontend doesn''t support this feature,
2013 Oct 10
3
[PATCH net-next v3 5/5] xen-netback: enable IPv6 TCP GSO to the guest
This patch adds code to handle SKB_GSO_TCPV6 skbs and construct appropriate
extra or prefix segments to pass the large packet to the frontend. New
xenstore flags, feature-gso-tcpv6 and feature-gso-tcpv6-prefix, are sampled
to determine if the frontend is capable of handling such packets.
Signed-off-by: Paul Durrant <paul.durrant@citrix.com>
Cc: Wei Liu <wei.liu2@citrix.com>
Cc: David
2013 Oct 28
3
[PATCH net V2] xen-netback: use jiffies_64 value to calculate credit timeout
time_after_eq() only works if the delta is < MAX_ULONG/2.
For a 32bit Dom0, if netfront sends packets at a very low rate, the time
between subsequent calls to tx_credit_exceeded() may exceed MAX_ULONG/2
and the test for timer_after_eq() will be incorrect. Credit will not be
replenished and the guest may become unable to send packets (e.g., if
prior to the long gap, all credit was exhausted).
2009 Oct 26
1
IAX jitterbufer oddity
Hi,
First a confession - The box in question is a 1.2.35 box, so this may
be solved in a newer version as I know the JB code is all hugely
changed, but... It may be worth checking into.
Scenario:
- IAX outbound call from Asterisk, which rings okay.
- Remote end sends ANSWER, which we immediately ACK.
- The ANSWER control packet gets put into the JB (that's how I read the code)
- The remote
2013 Feb 28
3
Questions about XSA39
Hi Xen developers,
I had some questions regarding XSA39, and I hope you all can answer them.
We''ve been rolling out some hosts with the XSA39 patch applied and have
come across a problem where a few of our customer DomUs keep hitting the
conditions which call netbk_fatal_tx_err(), mostly "Frag is bigger than
frame." These specific DomUs hit it repeatedly, between once every
2013 Jul 02
3
[PATCH RFC] xen-netback: remove guest RX path dependence on MAX_SKB_FRAGS
This dependence is undesirable and logically incorrect.
It''s undesirable because Xen network protocol should not depend on a
OS-specific constant.
It''s incorrect because the ring slots required doesn''t correspond to the
number of frags a SKB has (consider compound page frags).
This patch removes this dependence by correctly counting the ring slots
required.
2005 Oct 18
1
sip rfc bye violated?
I have this in sip show history for a particular channel marked as dead
(should be removed) in sip show channels:
1. TxReqRel INVITE / 102 INVITE
2. Rx SIP/2.0 / 102 INVITE
3. CancelDestroy
4. Rx SIP/2.0 / 102 INVITE
5. CancelDestroy
6. Unhold SIP/2.0
7. Rx SIP/2.0 / 102 INVITE
8. CancelDestroy
9. Unhold SIP/2.0
10. Rx
2004 Oct 06
0
iax2, strange native bridge problem????
hallo,
i am really confused how nativ briging is working with asterisk,
i use a asterisk server as central server and register another asterisk and
an iaxcomm client to the server, all three have public ips on the internet.
somtimes, when i call from iaxcomm to my asterisk, the calls go peer to
peer (i can see it with tcpdump) but sometimes the get routed through the
central asterisk server
2013 Nov 28
4
[PATCH net] xen-netback: fix fragment detection in checksum setup
The code to detect fragments in checksum_setup() was missing for IPv4 and
too eager for IPv6. (It transpires that Windows seems to send IPv6 packets
with a fragment header even if they are not a fragment - i.e. offset is zero,
and M bit is not set).
Signed-off-by: Paul Durrant <paul.durrant@citrix.com>
Cc: Wei Liu <wei.liu2@citrix.com>
Cc: Ian Campbell <ian.campbell@citrix.com>
2005 Sep 09
0
Transferred calls dropping out of MeetMe
I'm taking inbound calls on an * server, then transferring them to a
second * server where they join a MeetMe conference. If I have
'notransfer=yes' set on the first * server it works fine, but if I
allow the transfer (call then shifts to be between the DID provider
and the second server), the call is dropped 3-5 minutes later.
There is no firewall on my end, and the two
2012 Oct 19
2
[PATCH] xen-netback: allow changing the MAC address of the interface
Reported-by: Nikita Borzykh <sample.n@gmail.com>
Reported-by: Paul Harvey <stockingpaul@hotmail.com>
Suggested-by: Ian Campbell <Ian.Campbell@citrix.com>
Signed-off-by: Matt Wilson <msw@amazon.com>
---
drivers/net/xen-netback/interface.c | 2 ++
1 files changed, 2 insertions(+), 0 deletions(-)
diff --git a/drivers/net/xen-netback/interface.c
2010 Sep 17
1
Attended Transfer does not release channels
Hi all,
i have the following setup
PSTN -> routing server (asterisk 1.6.2.11) -> IAX -> callcenter asterisk
1.6.2.9 -> SIP -> agent
Does work quit fine - then agent does have the abibility to transfer a call
to a third party - the agent can initiate the transfer over a web interface
- it does generate a asterisk manager atxfer request...
So agent does initiate transfer - call
2016 Oct 20
0
[PATCH net-next v2 6/9] net: use core MTU range checking in virt drivers
On Thu, Oct 20, 2016 at 01:55:21PM -0400, Jarod Wilson wrote:
> hyperv_net:
> - set min/max_mtu, per Haiyang, after rndis_filter_device_add
>
> virtio_net:
> - set min/max_mtu
> - remove virtnet_change_mtu
> vmxnet3:
> - set min/max_mtu
>
> xen-netback:
> - min_mtu = 0, max_mtu = 65517
>
> xen-netfront:
> - min_mtu = 0, max_mtu = 65535
>
>
2010 Mar 12
0
Asterisk 1.6.1.18 Now Available
The Asterisk Development Team has announced the release of Asterisk 1.6.1.18.
This release is available for immediate download at
http://downloads.asterisk.org/pub/telephony/asterisk/
The release of Asterisk 1.6.1.18 resolves several issues reported by the
community, and would have not been possible without your participation. Thank
you!
The following are a few of the issues resolved by
2010 Mar 12
0
Asterisk 1.6.1.18 Now Available
The Asterisk Development Team has announced the release of Asterisk 1.6.1.18.
This release is available for immediate download at
http://downloads.asterisk.org/pub/telephony/asterisk/
The release of Asterisk 1.6.1.18 resolves several issues reported by the
community, and would have not been possible without your participation. Thank
you!
The following are a few of the issues resolved by
2010 Mar 12
0
Asterisk 1.6.2.6 Now Available
The Asterisk Development Team has announced the release of Asterisk 1.6.2.6.
This release is available for immediate download at
http://downloads.asterisk.org/pub/telephony/asterisk/
The release of Asterisk 1.6.2.6 resolves several issues reported by the
community, and would have not been possible without your participation. Thank
you!
The following are a few of the issues resolved by community