* [PATCHv1 0/2 net] xen-netback: fix ethtool stats and memory
@ 2015-03-03 16:26 David Vrabel
2015-03-03 16:26 ` [PATCHv1 1/2] xen-netback: return correct ethtool stats David Vrabel
` (2 more replies)
0 siblings, 3 replies; 9+ messages in thread
From: David Vrabel @ 2015-03-03 16:26 UTC (permalink / raw)
To: netdev; +Cc: David Vrabel, xen-devel, Ian Campbell, Wei Liu
A couple of bug fixes for netback:
- make ethool stats to report the correct values.
- don't leak 1 MiB every time a VIF is destroyed.
David
^ permalink raw reply [flat|nested] 9+ messages in thread* [PATCHv1 1/2] xen-netback: return correct ethtool stats 2015-03-03 16:26 [PATCHv1 0/2 net] xen-netback: fix ethtool stats and memory David Vrabel @ 2015-03-03 16:26 ` David Vrabel 2015-03-04 12:50 ` Sergei Shtylyov 2015-03-03 16:26 ` [PATCHv1 2/2] xen-netback: unref frags when handling a from-guest skb with a frag list David Vrabel 2015-03-04 5:22 ` [PATCHv1 0/2 net] xen-netback: fix ethtool stats and memory David Miller 2 siblings, 1 reply; 9+ messages in thread From: David Vrabel @ 2015-03-03 16:26 UTC (permalink / raw) To: netdev; +Cc: David Vrabel, xen-devel, Ian Campbell, Wei Liu Use correct pointer arithmetic to get the pointer to each stat. Signed-off-by: David Vrabel <david.vrabel@citrix.com> --- drivers/net/xen-netback/interface.c | 3 +-- 1 file changed, 1 insertion(+), 2 deletions(-) diff --git a/drivers/net/xen-netback/interface.c b/drivers/net/xen-netback/interface.c index f38227a..3aa8648 100644 --- a/drivers/net/xen-netback/interface.c +++ b/drivers/net/xen-netback/interface.c @@ -340,12 +340,11 @@ static void xenvif_get_ethtool_stats(struct net_device *dev, unsigned int num_queues = vif->num_queues; int i; unsigned int queue_index; - struct xenvif_stats *vif_stats; for (i = 0; i < ARRAY_SIZE(xenvif_stats); i++) { unsigned long accum = 0; for (queue_index = 0; queue_index < num_queues; ++queue_index) { - vif_stats = &vif->queues[queue_index].stats; + void *vif_stats = &vif->queues[queue_index].stats; accum += *(unsigned long *)(vif_stats + xenvif_stats[i].offset); } data[i] = accum; -- 1.7.10.4 ^ permalink raw reply related [flat|nested] 9+ messages in thread
* Re: [PATCHv1 1/2] xen-netback: return correct ethtool stats 2015-03-03 16:26 ` [PATCHv1 1/2] xen-netback: return correct ethtool stats David Vrabel @ 2015-03-04 12:50 ` Sergei Shtylyov 0 siblings, 0 replies; 9+ messages in thread From: Sergei Shtylyov @ 2015-03-04 12:50 UTC (permalink / raw) To: David Vrabel, netdev; +Cc: xen-devel, Ian Campbell, Wei Liu Hello. On 3/3/2015 7:26 PM, David Vrabel wrote: > Use correct pointer arithmetic to get the pointer to each stat. > Signed-off-by: David Vrabel <david.vrabel@citrix.com> > --- > drivers/net/xen-netback/interface.c | 3 +-- > 1 file changed, 1 insertion(+), 2 deletions(-) > diff --git a/drivers/net/xen-netback/interface.c b/drivers/net/xen-netback/interface.c > index f38227a..3aa8648 100644 > --- a/drivers/net/xen-netback/interface.c > +++ b/drivers/net/xen-netback/interface.c > @@ -340,12 +340,11 @@ static void xenvif_get_ethtool_stats(struct net_device *dev, > unsigned int num_queues = vif->num_queues; > int i; > unsigned int queue_index; > - struct xenvif_stats *vif_stats; > > for (i = 0; i < ARRAY_SIZE(xenvif_stats); i++) { > unsigned long accum = 0; > for (queue_index = 0; queue_index < num_queues; ++queue_index) { > - vif_stats = &vif->queues[queue_index].stats; > + void *vif_stats = &vif->queues[queue_index].stats; Need empty line after declaration; checkpatch.pl should have complained here. > accum += *(unsigned long *)(vif_stats + xenvif_stats[i].offset); > } > data[i] = accum; WBR, Sergei ^ permalink raw reply [flat|nested] 9+ messages in thread
* [PATCHv1 2/2] xen-netback: unref frags when handling a from-guest skb with a frag list 2015-03-03 16:26 [PATCHv1 0/2 net] xen-netback: fix ethtool stats and memory David Vrabel 2015-03-03 16:26 ` [PATCHv1 1/2] xen-netback: return correct ethtool stats David Vrabel @ 2015-03-03 16:26 ` David Vrabel 2015-03-03 16:56 ` [Xen-devel] " Zoltan Kiss 2015-03-04 9:48 ` Ian Campbell 2015-03-04 5:22 ` [PATCHv1 0/2 net] xen-netback: fix ethtool stats and memory David Miller 2 siblings, 2 replies; 9+ messages in thread From: David Vrabel @ 2015-03-03 16:26 UTC (permalink / raw) To: netdev; +Cc: David Vrabel, xen-devel, Ian Campbell, Wei Liu Every time a VIF is destroyed up-to 256 pages may be leaked if packets with more than MAX_SKB_FRAGS frags where transmitted from the guest. Even worse, if another user of ballooned pages allocated one of these ballooned pages it would not handle the the unexpectedly non-zero page count (e.g., gntdev would deadlock when unmapping a grant because the page count would never reach 1). When handling a from-guest skb with a frag list, unref the frags before releasing them so they are freed correctly when the VIF is destroyed. Also swap over to the new (local) frags /after/ calling the skb destructor. This isn't strictly necessary but it's less confusing. Signed-off-by: David Vrabel <david.vrabel@citrix.com> --- drivers/net/xen-netback/netback.c | 43 +++++++++++++++++++------------------ 1 file changed, 22 insertions(+), 21 deletions(-) diff --git a/drivers/net/xen-netback/netback.c b/drivers/net/xen-netback/netback.c index f7a31d2..3d06eeb 100644 --- a/drivers/net/xen-netback/netback.c +++ b/drivers/net/xen-netback/netback.c @@ -1343,7 +1343,7 @@ static int xenvif_handle_frag_list(struct xenvif_queue *queue, struct sk_buff *s { unsigned int offset = skb_headlen(skb); skb_frag_t frags[MAX_SKB_FRAGS]; - int i; + int i, nr_frags; struct ubuf_info *uarg; struct sk_buff *nskb = skb_shinfo(skb)->frag_list; @@ -1357,17 +1357,16 @@ static int xenvif_handle_frag_list(struct xenvif_queue *queue, struct sk_buff *s skb->data_len += nskb->len; /* create a brand new frags array and coalesce there */ - for (i = 0; offset < skb->len; i++) { + for (nr_frags = 0; offset < skb->len; nr_frags++) { struct page *page; unsigned int len; - BUG_ON(i >= MAX_SKB_FRAGS); + BUG_ON(nr_frags >= MAX_SKB_FRAGS); page = alloc_page(GFP_ATOMIC); if (!page) { - int j; skb->truesize += skb->data_len; - for (j = 0; j < i; j++) - put_page(frags[j].page.p); + for (i = 0; i < nr_frags; i++) + put_page(frags[i].page.p); return -ENOMEM; } @@ -1379,27 +1378,29 @@ static int xenvif_handle_frag_list(struct xenvif_queue *queue, struct sk_buff *s BUG(); offset += len; - frags[i].page.p = page; - frags[i].page_offset = 0; - skb_frag_size_set(&frags[i], len); + frags[nr_frags].page.p = page; + frags[nr_frags].page_offset = 0; + skb_frag_size_set(&frags[nr_frags], len); } - /* swap out with old one */ - memcpy(skb_shinfo(skb)->frags, - frags, - i * sizeof(skb_frag_t)); - skb_shinfo(skb)->nr_frags = i; - skb->truesize += i * PAGE_SIZE; - - /* remove traces of mapped pages and frag_list */ + + /* Copied all the bits from the frag list -- free it. */ skb_frag_list_init(skb); - uarg = skb_shinfo(skb)->destructor_arg; - /* increase inflight counter to offset decrement in callback */ + xenvif_skb_zerocopy_prepare(queue, nskb); + kfree_skb(nskb); + + /* Release all the original (foreign) frags. */ + for (i = 0; i < skb_shinfo(skb)->nr_frags; i++) + skb_frag_unref(skb, i); atomic_inc(&queue->inflight_packets); + uarg = skb_shinfo(skb)->destructor_arg; uarg->callback(uarg, true); skb_shinfo(skb)->destructor_arg = NULL; - xenvif_skb_zerocopy_prepare(queue, nskb); - kfree_skb(nskb); + /* Fill the skb with the new (local) frags. */ + memcpy(skb_shinfo(skb)->frags, frags, + nr_frags * sizeof(skb_frag_t)); + skb_shinfo(skb)->nr_frags = nr_frags; + skb->truesize += nr_frags * PAGE_SIZE; return 0; } -- 1.7.10.4 ^ permalink raw reply related [flat|nested] 9+ messages in thread
* Re: [Xen-devel] [PATCHv1 2/2] xen-netback: unref frags when handling a from-guest skb with a frag list 2015-03-03 16:26 ` [PATCHv1 2/2] xen-netback: unref frags when handling a from-guest skb with a frag list David Vrabel @ 2015-03-03 16:56 ` Zoltan Kiss 2015-03-04 9:48 ` Ian Campbell 1 sibling, 0 replies; 9+ messages in thread From: Zoltan Kiss @ 2015-03-03 16:56 UTC (permalink / raw) To: David Vrabel, netdev; +Cc: xen-devel, Wei Liu, Ian Campbell On 03/03/15 16:26, David Vrabel wrote: > Every time a VIF is destroyed up-to 256 pages may be leaked if packets "up to" (and maybe a comma before it?) > with more than MAX_SKB_FRAGS frags where transmitted from the guest. were > Even worse, if another user of ballooned pages allocated one of these > ballooned pages it would not handle the the unexpectedly non-zero page ^^^ One too many "the" > count (e.g., gntdev would deadlock when unmapping a grant because the > page count would never reach 1). > > When handling a from-guest skb with a frag list, unref the frags > before releasing them so they are freed correctly when the VIF is > destroyed. > > Also swap over to the new (local) frags /after/ calling the skb > destructor. This isn't strictly necessary but it's less confusing. > > Signed-off-by: David Vrabel <david.vrabel@citrix.com> Reviewed-by: Zoltan Kiss <zoltan.kiss@linaro.org> > --- > drivers/net/xen-netback/netback.c | 43 +++++++++++++++++++------------------ > 1 file changed, 22 insertions(+), 21 deletions(-) > > diff --git a/drivers/net/xen-netback/netback.c b/drivers/net/xen-netback/netback.c > index f7a31d2..3d06eeb 100644 > --- a/drivers/net/xen-netback/netback.c > +++ b/drivers/net/xen-netback/netback.c > @@ -1343,7 +1343,7 @@ static int xenvif_handle_frag_list(struct xenvif_queue *queue, struct sk_buff *s > { > unsigned int offset = skb_headlen(skb); > skb_frag_t frags[MAX_SKB_FRAGS]; > - int i; > + int i, nr_frags; > struct ubuf_info *uarg; > struct sk_buff *nskb = skb_shinfo(skb)->frag_list; > > @@ -1357,17 +1357,16 @@ static int xenvif_handle_frag_list(struct xenvif_queue *queue, struct sk_buff *s > skb->data_len += nskb->len; > > /* create a brand new frags array and coalesce there */ > - for (i = 0; offset < skb->len; i++) { > + for (nr_frags = 0; offset < skb->len; nr_frags++) { > struct page *page; > unsigned int len; > > - BUG_ON(i >= MAX_SKB_FRAGS); > + BUG_ON(nr_frags >= MAX_SKB_FRAGS); > page = alloc_page(GFP_ATOMIC); > if (!page) { > - int j; > skb->truesize += skb->data_len; > - for (j = 0; j < i; j++) > - put_page(frags[j].page.p); > + for (i = 0; i < nr_frags; i++) > + put_page(frags[i].page.p); > return -ENOMEM; > } > > @@ -1379,27 +1378,29 @@ static int xenvif_handle_frag_list(struct xenvif_queue *queue, struct sk_buff *s > BUG(); > > offset += len; > - frags[i].page.p = page; > - frags[i].page_offset = 0; > - skb_frag_size_set(&frags[i], len); > + frags[nr_frags].page.p = page; > + frags[nr_frags].page_offset = 0; > + skb_frag_size_set(&frags[nr_frags], len); > } > - /* swap out with old one */ > - memcpy(skb_shinfo(skb)->frags, > - frags, > - i * sizeof(skb_frag_t)); > - skb_shinfo(skb)->nr_frags = i; > - skb->truesize += i * PAGE_SIZE; > - > - /* remove traces of mapped pages and frag_list */ > + > + /* Copied all the bits from the frag list -- free it. */ > skb_frag_list_init(skb); > - uarg = skb_shinfo(skb)->destructor_arg; > - /* increase inflight counter to offset decrement in callback */ > + xenvif_skb_zerocopy_prepare(queue, nskb); > + kfree_skb(nskb); > + > + /* Release all the original (foreign) frags. */ > + for (i = 0; i < skb_shinfo(skb)->nr_frags; i++) > + skb_frag_unref(skb, i); > atomic_inc(&queue->inflight_packets); > + uarg = skb_shinfo(skb)->destructor_arg; > uarg->callback(uarg, true); > skb_shinfo(skb)->destructor_arg = NULL; > > - xenvif_skb_zerocopy_prepare(queue, nskb); > - kfree_skb(nskb); > + /* Fill the skb with the new (local) frags. */ > + memcpy(skb_shinfo(skb)->frags, frags, > + nr_frags * sizeof(skb_frag_t)); > + skb_shinfo(skb)->nr_frags = nr_frags; > + skb->truesize += nr_frags * PAGE_SIZE; > > return 0; > } > ^ permalink raw reply [flat|nested] 9+ messages in thread
* Re: [PATCHv1 2/2] xen-netback: unref frags when handling a from-guest skb with a frag list 2015-03-03 16:26 ` [PATCHv1 2/2] xen-netback: unref frags when handling a from-guest skb with a frag list David Vrabel 2015-03-03 16:56 ` [Xen-devel] " Zoltan Kiss @ 2015-03-04 9:48 ` Ian Campbell 2015-03-04 9:56 ` [Xen-devel] " David Vrabel 1 sibling, 1 reply; 9+ messages in thread From: Ian Campbell @ 2015-03-04 9:48 UTC (permalink / raw) To: David Vrabel; +Cc: netdev, xen-devel, Wei Liu On Tue, 2015-03-03 at 16:26 +0000, David Vrabel wrote: > Every time a VIF is destroyed up-to 256 pages may be leaked if packets > with more than MAX_SKB_FRAGS frags where transmitted from the guest. > Even worse, if another user of ballooned pages allocated one of these > ballooned pages it would not handle the the unexpectedly non-zero page > count (e.g., gntdev would deadlock when unmapping a grant because the > page count would never reach 1). > > When handling a from-guest skb with a frag list, unref the frags > before releasing them so they are freed correctly when the VIF is > destroyed. Am I right that the majority of the first 2 hunks (and various bits of the 3rd) are just switching the outer loop to nr_frags instead of i, to free up i for use in the new code below? And also to switch j to the now available i in the inner loop. > Also swap over to the new (local) frags /after/ calling the skb > destructor. This isn't strictly necessary but it's less confusing. My only concern would be that this now means there is a period where the frags list is invalid. However I think the calling context is such that nobody else can have a reference to an skb which has the same shinfo as the one in our hand. Is that right? (If not then I think the old code was also buggy/racy, but with a smaller window) > > Signed-off-by: David Vrabel <david.vrabel@citrix.com> > --- > drivers/net/xen-netback/netback.c | 43 +++++++++++++++++++------------------ > 1 file changed, 22 insertions(+), 21 deletions(-) > > diff --git a/drivers/net/xen-netback/netback.c b/drivers/net/xen-netback/netback.c > index f7a31d2..3d06eeb 100644 > --- a/drivers/net/xen-netback/netback.c > +++ b/drivers/net/xen-netback/netback.c > @@ -1343,7 +1343,7 @@ static int xenvif_handle_frag_list(struct xenvif_queue *queue, struct sk_buff *s > { > unsigned int offset = skb_headlen(skb); > skb_frag_t frags[MAX_SKB_FRAGS]; > - int i; > + int i, nr_frags; > struct ubuf_info *uarg; > struct sk_buff *nskb = skb_shinfo(skb)->frag_list; > > @@ -1357,17 +1357,16 @@ static int xenvif_handle_frag_list(struct xenvif_queue *queue, struct sk_buff *s > skb->data_len += nskb->len; > > /* create a brand new frags array and coalesce there */ > - for (i = 0; offset < skb->len; i++) { > + for (nr_frags = 0; offset < skb->len; nr_frags++) { > struct page *page; > unsigned int len; > > - BUG_ON(i >= MAX_SKB_FRAGS); > + BUG_ON(nr_frags >= MAX_SKB_FRAGS); > page = alloc_page(GFP_ATOMIC); > if (!page) { > - int j; > skb->truesize += skb->data_len; > - for (j = 0; j < i; j++) > - put_page(frags[j].page.p); > + for (i = 0; i < nr_frags; i++) > + put_page(frags[i].page.p); > return -ENOMEM; > } > > @@ -1379,27 +1378,29 @@ static int xenvif_handle_frag_list(struct xenvif_queue *queue, struct sk_buff *s > BUG(); > > offset += len; > - frags[i].page.p = page; > - frags[i].page_offset = 0; > - skb_frag_size_set(&frags[i], len); > + frags[nr_frags].page.p = page; > + frags[nr_frags].page_offset = 0; > + skb_frag_size_set(&frags[nr_frags], len); > } > - /* swap out with old one */ > - memcpy(skb_shinfo(skb)->frags, > - frags, > - i * sizeof(skb_frag_t)); > - skb_shinfo(skb)->nr_frags = i; > - skb->truesize += i * PAGE_SIZE; > - > - /* remove traces of mapped pages and frag_list */ > + > + /* Copied all the bits from the frag list -- free it. */ > skb_frag_list_init(skb); > - uarg = skb_shinfo(skb)->destructor_arg; > - /* increase inflight counter to offset decrement in callback */ > + xenvif_skb_zerocopy_prepare(queue, nskb); > + kfree_skb(nskb); > + > + /* Release all the original (foreign) frags. */ > + for (i = 0; i < skb_shinfo(skb)->nr_frags; i++) > + skb_frag_unref(skb, i); > atomic_inc(&queue->inflight_packets); > + uarg = skb_shinfo(skb)->destructor_arg; > uarg->callback(uarg, true); > skb_shinfo(skb)->destructor_arg = NULL; > > - xenvif_skb_zerocopy_prepare(queue, nskb); > - kfree_skb(nskb); > + /* Fill the skb with the new (local) frags. */ > + memcpy(skb_shinfo(skb)->frags, frags, > + nr_frags * sizeof(skb_frag_t)); > + skb_shinfo(skb)->nr_frags = nr_frags; > + skb->truesize += nr_frags * PAGE_SIZE; > > return 0; > } ^ permalink raw reply [flat|nested] 9+ messages in thread
* Re: [Xen-devel] [PATCHv1 2/2] xen-netback: unref frags when handling a from-guest skb with a frag list 2015-03-04 9:48 ` Ian Campbell @ 2015-03-04 9:56 ` David Vrabel 2015-03-04 10:02 ` Ian Campbell 0 siblings, 1 reply; 9+ messages in thread From: David Vrabel @ 2015-03-04 9:56 UTC (permalink / raw) To: Ian Campbell, David Vrabel; +Cc: netdev, Wei Liu, xen-devel On 04/03/15 09:48, Ian Campbell wrote: > On Tue, 2015-03-03 at 16:26 +0000, David Vrabel wrote: >> Every time a VIF is destroyed up-to 256 pages may be leaked if packets >> with more than MAX_SKB_FRAGS frags where transmitted from the guest. >> Even worse, if another user of ballooned pages allocated one of these >> ballooned pages it would not handle the the unexpectedly non-zero page >> count (e.g., gntdev would deadlock when unmapping a grant because the >> page count would never reach 1). >> >> When handling a from-guest skb with a frag list, unref the frags >> before releasing them so they are freed correctly when the VIF is >> destroyed. > > Am I right that the majority of the first 2 hunks (and various bits of > the 3rd) are just switching the outer loop to nr_frags instead of i, to > free up i for use in the new code below? And also to switch j to the now > available i in the inner loop. Yes. If you prefer I can split this into one patch that adds the skb_frag_unref() calls and one that reorders/refactors. >> Also swap over to the new (local) frags /after/ calling the skb >> destructor. This isn't strictly necessary but it's less confusing. > > My only concern would be that this now means there is a period where the > frags list is invalid. However I think the calling context is such that > nobody else can have a reference to an skb which has the same shinfo as > the one in our hand. Is that right? That is correct. This skb is allocated by netback and has not yet been passed up to the network stack. David ^ permalink raw reply [flat|nested] 9+ messages in thread
* Re: [Xen-devel] [PATCHv1 2/2] xen-netback: unref frags when handling a from-guest skb with a frag list 2015-03-04 9:56 ` [Xen-devel] " David Vrabel @ 2015-03-04 10:02 ` Ian Campbell 0 siblings, 0 replies; 9+ messages in thread From: Ian Campbell @ 2015-03-04 10:02 UTC (permalink / raw) To: David Vrabel; +Cc: netdev, Wei Liu, xen-devel On Wed, 2015-03-04 at 09:56 +0000, David Vrabel wrote: > On 04/03/15 09:48, Ian Campbell wrote: > > On Tue, 2015-03-03 at 16:26 +0000, David Vrabel wrote: > >> Every time a VIF is destroyed up-to 256 pages may be leaked if packets > >> with more than MAX_SKB_FRAGS frags where transmitted from the guest. > >> Even worse, if another user of ballooned pages allocated one of these > >> ballooned pages it would not handle the the unexpectedly non-zero page > >> count (e.g., gntdev would deadlock when unmapping a grant because the > >> page count would never reach 1). > >> > >> When handling a from-guest skb with a frag list, unref the frags > >> before releasing them so they are freed correctly when the VIF is > >> destroyed. > > > > Am I right that the majority of the first 2 hunks (and various bits of > > the 3rd) are just switching the outer loop to nr_frags instead of i, to > > free up i for use in the new code below? And also to switch j to the now > > available i in the inner loop. > > Yes. If you prefer I can split this into one patch that adds the > skb_frag_unref() calls and one that reorders/refactors. If you can be bothered that might make things easier to read, thanks. > >> Also swap over to the new (local) frags /after/ calling the skb > >> destructor. This isn't strictly necessary but it's less confusing. > > > > My only concern would be that this now means there is a period where the > > frags list is invalid. However I think the calling context is such that > > nobody else can have a reference to an skb which has the same shinfo as > > the one in our hand. Is that right? > > That is correct. This skb is allocated by netback and has not yet been > passed up to the network stack. Phew! ;-) ^ permalink raw reply [flat|nested] 9+ messages in thread
* Re: [PATCHv1 0/2 net] xen-netback: fix ethtool stats and memory 2015-03-03 16:26 [PATCHv1 0/2 net] xen-netback: fix ethtool stats and memory David Vrabel 2015-03-03 16:26 ` [PATCHv1 1/2] xen-netback: return correct ethtool stats David Vrabel 2015-03-03 16:26 ` [PATCHv1 2/2] xen-netback: unref frags when handling a from-guest skb with a frag list David Vrabel @ 2015-03-04 5:22 ` David Miller 2 siblings, 0 replies; 9+ messages in thread From: David Miller @ 2015-03-04 5:22 UTC (permalink / raw) To: david.vrabel; +Cc: netdev, xen-devel, ian.campbell, wei.liu2 From: David Vrabel <david.vrabel@citrix.com> Date: Tue, 3 Mar 2015 16:26:09 +0000 > A couple of bug fixes for netback: > - make ethool stats to report the correct values. > - don't leak 1 MiB every time a VIF is destroyed. Please fix up the minor commit message issues in patch #2 and resubmit this series, thanks. ^ permalink raw reply [flat|nested] 9+ messages in thread
end of thread, other threads:[~2015-03-04 12:50 UTC | newest] Thread overview: 9+ messages (download: mbox.gz follow: Atom feed -- links below jump to the message on this page -- 2015-03-03 16:26 [PATCHv1 0/2 net] xen-netback: fix ethtool stats and memory David Vrabel 2015-03-03 16:26 ` [PATCHv1 1/2] xen-netback: return correct ethtool stats David Vrabel 2015-03-04 12:50 ` Sergei Shtylyov 2015-03-03 16:26 ` [PATCHv1 2/2] xen-netback: unref frags when handling a from-guest skb with a frag list David Vrabel 2015-03-03 16:56 ` [Xen-devel] " Zoltan Kiss 2015-03-04 9:48 ` Ian Campbell 2015-03-04 9:56 ` [Xen-devel] " David Vrabel 2015-03-04 10:02 ` Ian Campbell 2015-03-04 5:22 ` [PATCHv1 0/2 net] xen-netback: fix ethtool stats and memory David Miller
This is a public inbox, see mirroring instructions for how to clone and mirror all data and code used for this inbox; as well as URLs for NNTP newsgroup(s).