* [PATCHv1 0/2 net] xen-netback: fix ethtool stats and memory
@ 2015-03-03 16:26 David Vrabel
2015-03-03 16:26 ` [PATCHv1 1/2] xen-netback: return correct ethtool stats David Vrabel
` (2 more replies)
0 siblings, 3 replies; 9+ messages in thread
From: David Vrabel @ 2015-03-03 16:26 UTC (permalink / raw)
To: netdev; +Cc: David Vrabel, xen-devel, Ian Campbell, Wei Liu
A couple of bug fixes for netback:
- make ethool stats to report the correct values.
- don't leak 1 MiB every time a VIF is destroyed.
David
^ permalink raw reply [flat|nested] 9+ messages in thread
* [PATCHv1 1/2] xen-netback: return correct ethtool stats
2015-03-03 16:26 [PATCHv1 0/2 net] xen-netback: fix ethtool stats and memory David Vrabel
@ 2015-03-03 16:26 ` David Vrabel
2015-03-04 12:50 ` Sergei Shtylyov
2015-03-03 16:26 ` [PATCHv1 2/2] xen-netback: unref frags when handling a from-guest skb with a frag list David Vrabel
2015-03-04 5:22 ` [PATCHv1 0/2 net] xen-netback: fix ethtool stats and memory David Miller
2 siblings, 1 reply; 9+ messages in thread
From: David Vrabel @ 2015-03-03 16:26 UTC (permalink / raw)
To: netdev; +Cc: David Vrabel, xen-devel, Ian Campbell, Wei Liu
Use correct pointer arithmetic to get the pointer to each stat.
Signed-off-by: David Vrabel <david.vrabel@citrix.com>
---
drivers/net/xen-netback/interface.c | 3 +--
1 file changed, 1 insertion(+), 2 deletions(-)
diff --git a/drivers/net/xen-netback/interface.c b/drivers/net/xen-netback/interface.c
index f38227a..3aa8648 100644
--- a/drivers/net/xen-netback/interface.c
+++ b/drivers/net/xen-netback/interface.c
@@ -340,12 +340,11 @@ static void xenvif_get_ethtool_stats(struct net_device *dev,
unsigned int num_queues = vif->num_queues;
int i;
unsigned int queue_index;
- struct xenvif_stats *vif_stats;
for (i = 0; i < ARRAY_SIZE(xenvif_stats); i++) {
unsigned long accum = 0;
for (queue_index = 0; queue_index < num_queues; ++queue_index) {
- vif_stats = &vif->queues[queue_index].stats;
+ void *vif_stats = &vif->queues[queue_index].stats;
accum += *(unsigned long *)(vif_stats + xenvif_stats[i].offset);
}
data[i] = accum;
--
1.7.10.4
^ permalink raw reply related [flat|nested] 9+ messages in thread
* [PATCHv1 2/2] xen-netback: unref frags when handling a from-guest skb with a frag list
2015-03-03 16:26 [PATCHv1 0/2 net] xen-netback: fix ethtool stats and memory David Vrabel
2015-03-03 16:26 ` [PATCHv1 1/2] xen-netback: return correct ethtool stats David Vrabel
@ 2015-03-03 16:26 ` David Vrabel
2015-03-03 16:56 ` [Xen-devel] " Zoltan Kiss
2015-03-04 9:48 ` Ian Campbell
2015-03-04 5:22 ` [PATCHv1 0/2 net] xen-netback: fix ethtool stats and memory David Miller
2 siblings, 2 replies; 9+ messages in thread
From: David Vrabel @ 2015-03-03 16:26 UTC (permalink / raw)
To: netdev; +Cc: David Vrabel, xen-devel, Ian Campbell, Wei Liu
Every time a VIF is destroyed up-to 256 pages may be leaked if packets
with more than MAX_SKB_FRAGS frags where transmitted from the guest.
Even worse, if another user of ballooned pages allocated one of these
ballooned pages it would not handle the the unexpectedly non-zero page
count (e.g., gntdev would deadlock when unmapping a grant because the
page count would never reach 1).
When handling a from-guest skb with a frag list, unref the frags
before releasing them so they are freed correctly when the VIF is
destroyed.
Also swap over to the new (local) frags /after/ calling the skb
destructor. This isn't strictly necessary but it's less confusing.
Signed-off-by: David Vrabel <david.vrabel@citrix.com>
---
drivers/net/xen-netback/netback.c | 43 +++++++++++++++++++------------------
1 file changed, 22 insertions(+), 21 deletions(-)
diff --git a/drivers/net/xen-netback/netback.c b/drivers/net/xen-netback/netback.c
index f7a31d2..3d06eeb 100644
--- a/drivers/net/xen-netback/netback.c
+++ b/drivers/net/xen-netback/netback.c
@@ -1343,7 +1343,7 @@ static int xenvif_handle_frag_list(struct xenvif_queue *queue, struct sk_buff *s
{
unsigned int offset = skb_headlen(skb);
skb_frag_t frags[MAX_SKB_FRAGS];
- int i;
+ int i, nr_frags;
struct ubuf_info *uarg;
struct sk_buff *nskb = skb_shinfo(skb)->frag_list;
@@ -1357,17 +1357,16 @@ static int xenvif_handle_frag_list(struct xenvif_queue *queue, struct sk_buff *s
skb->data_len += nskb->len;
/* create a brand new frags array and coalesce there */
- for (i = 0; offset < skb->len; i++) {
+ for (nr_frags = 0; offset < skb->len; nr_frags++) {
struct page *page;
unsigned int len;
- BUG_ON(i >= MAX_SKB_FRAGS);
+ BUG_ON(nr_frags >= MAX_SKB_FRAGS);
page = alloc_page(GFP_ATOMIC);
if (!page) {
- int j;
skb->truesize += skb->data_len;
- for (j = 0; j < i; j++)
- put_page(frags[j].page.p);
+ for (i = 0; i < nr_frags; i++)
+ put_page(frags[i].page.p);
return -ENOMEM;
}
@@ -1379,27 +1378,29 @@ static int xenvif_handle_frag_list(struct xenvif_queue *queue, struct sk_buff *s
BUG();
offset += len;
- frags[i].page.p = page;
- frags[i].page_offset = 0;
- skb_frag_size_set(&frags[i], len);
+ frags[nr_frags].page.p = page;
+ frags[nr_frags].page_offset = 0;
+ skb_frag_size_set(&frags[nr_frags], len);
}
- /* swap out with old one */
- memcpy(skb_shinfo(skb)->frags,
- frags,
- i * sizeof(skb_frag_t));
- skb_shinfo(skb)->nr_frags = i;
- skb->truesize += i * PAGE_SIZE;
-
- /* remove traces of mapped pages and frag_list */
+
+ /* Copied all the bits from the frag list -- free it. */
skb_frag_list_init(skb);
- uarg = skb_shinfo(skb)->destructor_arg;
- /* increase inflight counter to offset decrement in callback */
+ xenvif_skb_zerocopy_prepare(queue, nskb);
+ kfree_skb(nskb);
+
+ /* Release all the original (foreign) frags. */
+ for (i = 0; i < skb_shinfo(skb)->nr_frags; i++)
+ skb_frag_unref(skb, i);
atomic_inc(&queue->inflight_packets);
+ uarg = skb_shinfo(skb)->destructor_arg;
uarg->callback(uarg, true);
skb_shinfo(skb)->destructor_arg = NULL;
- xenvif_skb_zerocopy_prepare(queue, nskb);
- kfree_skb(nskb);
+ /* Fill the skb with the new (local) frags. */
+ memcpy(skb_shinfo(skb)->frags, frags,
+ nr_frags * sizeof(skb_frag_t));
+ skb_shinfo(skb)->nr_frags = nr_frags;
+ skb->truesize += nr_frags * PAGE_SIZE;
return 0;
}
--
1.7.10.4
^ permalink raw reply related [flat|nested] 9+ messages in thread
* Re: [Xen-devel] [PATCHv1 2/2] xen-netback: unref frags when handling a from-guest skb with a frag list
2015-03-03 16:26 ` [PATCHv1 2/2] xen-netback: unref frags when handling a from-guest skb with a frag list David Vrabel
@ 2015-03-03 16:56 ` Zoltan Kiss
2015-03-04 9:48 ` Ian Campbell
1 sibling, 0 replies; 9+ messages in thread
From: Zoltan Kiss @ 2015-03-03 16:56 UTC (permalink / raw)
To: David Vrabel, netdev; +Cc: xen-devel, Wei Liu, Ian Campbell
On 03/03/15 16:26, David Vrabel wrote:
> Every time a VIF is destroyed up-to 256 pages may be leaked if packets
"up to" (and maybe a comma before it?)
> with more than MAX_SKB_FRAGS frags where transmitted from the guest.
were
> Even worse, if another user of ballooned pages allocated one of these
> ballooned pages it would not handle the the unexpectedly non-zero page
^^^
One too many "the"
> count (e.g., gntdev would deadlock when unmapping a grant because the
> page count would never reach 1).
>
> When handling a from-guest skb with a frag list, unref the frags
> before releasing them so they are freed correctly when the VIF is
> destroyed.
>
> Also swap over to the new (local) frags /after/ calling the skb
> destructor. This isn't strictly necessary but it's less confusing.
>
> Signed-off-by: David Vrabel <david.vrabel@citrix.com>
Reviewed-by: Zoltan Kiss <zoltan.kiss@linaro.org>
> ---
> drivers/net/xen-netback/netback.c | 43 +++++++++++++++++++------------------
> 1 file changed, 22 insertions(+), 21 deletions(-)
>
> diff --git a/drivers/net/xen-netback/netback.c b/drivers/net/xen-netback/netback.c
> index f7a31d2..3d06eeb 100644
> --- a/drivers/net/xen-netback/netback.c
> +++ b/drivers/net/xen-netback/netback.c
> @@ -1343,7 +1343,7 @@ static int xenvif_handle_frag_list(struct xenvif_queue *queue, struct sk_buff *s
> {
> unsigned int offset = skb_headlen(skb);
> skb_frag_t frags[MAX_SKB_FRAGS];
> - int i;
> + int i, nr_frags;
> struct ubuf_info *uarg;
> struct sk_buff *nskb = skb_shinfo(skb)->frag_list;
>
> @@ -1357,17 +1357,16 @@ static int xenvif_handle_frag_list(struct xenvif_queue *queue, struct sk_buff *s
> skb->data_len += nskb->len;
>
> /* create a brand new frags array and coalesce there */
> - for (i = 0; offset < skb->len; i++) {
> + for (nr_frags = 0; offset < skb->len; nr_frags++) {
> struct page *page;
> unsigned int len;
>
> - BUG_ON(i >= MAX_SKB_FRAGS);
> + BUG_ON(nr_frags >= MAX_SKB_FRAGS);
> page = alloc_page(GFP_ATOMIC);
> if (!page) {
> - int j;
> skb->truesize += skb->data_len;
> - for (j = 0; j < i; j++)
> - put_page(frags[j].page.p);
> + for (i = 0; i < nr_frags; i++)
> + put_page(frags[i].page.p);
> return -ENOMEM;
> }
>
> @@ -1379,27 +1378,29 @@ static int xenvif_handle_frag_list(struct xenvif_queue *queue, struct sk_buff *s
> BUG();
>
> offset += len;
> - frags[i].page.p = page;
> - frags[i].page_offset = 0;
> - skb_frag_size_set(&frags[i], len);
> + frags[nr_frags].page.p = page;
> + frags[nr_frags].page_offset = 0;
> + skb_frag_size_set(&frags[nr_frags], len);
> }
> - /* swap out with old one */
> - memcpy(skb_shinfo(skb)->frags,
> - frags,
> - i * sizeof(skb_frag_t));
> - skb_shinfo(skb)->nr_frags = i;
> - skb->truesize += i * PAGE_SIZE;
> -
> - /* remove traces of mapped pages and frag_list */
> +
> + /* Copied all the bits from the frag list -- free it. */
> skb_frag_list_init(skb);
> - uarg = skb_shinfo(skb)->destructor_arg;
> - /* increase inflight counter to offset decrement in callback */
> + xenvif_skb_zerocopy_prepare(queue, nskb);
> + kfree_skb(nskb);
> +
> + /* Release all the original (foreign) frags. */
> + for (i = 0; i < skb_shinfo(skb)->nr_frags; i++)
> + skb_frag_unref(skb, i);
> atomic_inc(&queue->inflight_packets);
> + uarg = skb_shinfo(skb)->destructor_arg;
> uarg->callback(uarg, true);
> skb_shinfo(skb)->destructor_arg = NULL;
>
> - xenvif_skb_zerocopy_prepare(queue, nskb);
> - kfree_skb(nskb);
> + /* Fill the skb with the new (local) frags. */
> + memcpy(skb_shinfo(skb)->frags, frags,
> + nr_frags * sizeof(skb_frag_t));
> + skb_shinfo(skb)->nr_frags = nr_frags;
> + skb->truesize += nr_frags * PAGE_SIZE;
>
> return 0;
> }
>
^ permalink raw reply [flat|nested] 9+ messages in thread
* Re: [PATCHv1 0/2 net] xen-netback: fix ethtool stats and memory
2015-03-03 16:26 [PATCHv1 0/2 net] xen-netback: fix ethtool stats and memory David Vrabel
2015-03-03 16:26 ` [PATCHv1 1/2] xen-netback: return correct ethtool stats David Vrabel
2015-03-03 16:26 ` [PATCHv1 2/2] xen-netback: unref frags when handling a from-guest skb with a frag list David Vrabel
@ 2015-03-04 5:22 ` David Miller
2 siblings, 0 replies; 9+ messages in thread
From: David Miller @ 2015-03-04 5:22 UTC (permalink / raw)
To: david.vrabel; +Cc: netdev, xen-devel, ian.campbell, wei.liu2
From: David Vrabel <david.vrabel@citrix.com>
Date: Tue, 3 Mar 2015 16:26:09 +0000
> A couple of bug fixes for netback:
> - make ethool stats to report the correct values.
> - don't leak 1 MiB every time a VIF is destroyed.
Please fix up the minor commit message issues in patch #2
and resubmit this series, thanks.
^ permalink raw reply [flat|nested] 9+ messages in thread
* Re: [PATCHv1 2/2] xen-netback: unref frags when handling a from-guest skb with a frag list
2015-03-03 16:26 ` [PATCHv1 2/2] xen-netback: unref frags when handling a from-guest skb with a frag list David Vrabel
2015-03-03 16:56 ` [Xen-devel] " Zoltan Kiss
@ 2015-03-04 9:48 ` Ian Campbell
2015-03-04 9:56 ` [Xen-devel] " David Vrabel
1 sibling, 1 reply; 9+ messages in thread
From: Ian Campbell @ 2015-03-04 9:48 UTC (permalink / raw)
To: David Vrabel; +Cc: netdev, xen-devel, Wei Liu
On Tue, 2015-03-03 at 16:26 +0000, David Vrabel wrote:
> Every time a VIF is destroyed up-to 256 pages may be leaked if packets
> with more than MAX_SKB_FRAGS frags where transmitted from the guest.
> Even worse, if another user of ballooned pages allocated one of these
> ballooned pages it would not handle the the unexpectedly non-zero page
> count (e.g., gntdev would deadlock when unmapping a grant because the
> page count would never reach 1).
>
> When handling a from-guest skb with a frag list, unref the frags
> before releasing them so they are freed correctly when the VIF is
> destroyed.
Am I right that the majority of the first 2 hunks (and various bits of
the 3rd) are just switching the outer loop to nr_frags instead of i, to
free up i for use in the new code below? And also to switch j to the now
available i in the inner loop.
> Also swap over to the new (local) frags /after/ calling the skb
> destructor. This isn't strictly necessary but it's less confusing.
My only concern would be that this now means there is a period where the
frags list is invalid. However I think the calling context is such that
nobody else can have a reference to an skb which has the same shinfo as
the one in our hand. Is that right?
(If not then I think the old code was also buggy/racy, but with a
smaller window)
>
> Signed-off-by: David Vrabel <david.vrabel@citrix.com>
> ---
> drivers/net/xen-netback/netback.c | 43 +++++++++++++++++++------------------
> 1 file changed, 22 insertions(+), 21 deletions(-)
>
> diff --git a/drivers/net/xen-netback/netback.c b/drivers/net/xen-netback/netback.c
> index f7a31d2..3d06eeb 100644
> --- a/drivers/net/xen-netback/netback.c
> +++ b/drivers/net/xen-netback/netback.c
> @@ -1343,7 +1343,7 @@ static int xenvif_handle_frag_list(struct xenvif_queue *queue, struct sk_buff *s
> {
> unsigned int offset = skb_headlen(skb);
> skb_frag_t frags[MAX_SKB_FRAGS];
> - int i;
> + int i, nr_frags;
> struct ubuf_info *uarg;
> struct sk_buff *nskb = skb_shinfo(skb)->frag_list;
>
> @@ -1357,17 +1357,16 @@ static int xenvif_handle_frag_list(struct xenvif_queue *queue, struct sk_buff *s
> skb->data_len += nskb->len;
>
> /* create a brand new frags array and coalesce there */
> - for (i = 0; offset < skb->len; i++) {
> + for (nr_frags = 0; offset < skb->len; nr_frags++) {
> struct page *page;
> unsigned int len;
>
> - BUG_ON(i >= MAX_SKB_FRAGS);
> + BUG_ON(nr_frags >= MAX_SKB_FRAGS);
> page = alloc_page(GFP_ATOMIC);
> if (!page) {
> - int j;
> skb->truesize += skb->data_len;
> - for (j = 0; j < i; j++)
> - put_page(frags[j].page.p);
> + for (i = 0; i < nr_frags; i++)
> + put_page(frags[i].page.p);
> return -ENOMEM;
> }
>
> @@ -1379,27 +1378,29 @@ static int xenvif_handle_frag_list(struct xenvif_queue *queue, struct sk_buff *s
> BUG();
>
> offset += len;
> - frags[i].page.p = page;
> - frags[i].page_offset = 0;
> - skb_frag_size_set(&frags[i], len);
> + frags[nr_frags].page.p = page;
> + frags[nr_frags].page_offset = 0;
> + skb_frag_size_set(&frags[nr_frags], len);
> }
> - /* swap out with old one */
> - memcpy(skb_shinfo(skb)->frags,
> - frags,
> - i * sizeof(skb_frag_t));
> - skb_shinfo(skb)->nr_frags = i;
> - skb->truesize += i * PAGE_SIZE;
> -
> - /* remove traces of mapped pages and frag_list */
> +
> + /* Copied all the bits from the frag list -- free it. */
> skb_frag_list_init(skb);
> - uarg = skb_shinfo(skb)->destructor_arg;
> - /* increase inflight counter to offset decrement in callback */
> + xenvif_skb_zerocopy_prepare(queue, nskb);
> + kfree_skb(nskb);
> +
> + /* Release all the original (foreign) frags. */
> + for (i = 0; i < skb_shinfo(skb)->nr_frags; i++)
> + skb_frag_unref(skb, i);
> atomic_inc(&queue->inflight_packets);
> + uarg = skb_shinfo(skb)->destructor_arg;
> uarg->callback(uarg, true);
> skb_shinfo(skb)->destructor_arg = NULL;
>
> - xenvif_skb_zerocopy_prepare(queue, nskb);
> - kfree_skb(nskb);
> + /* Fill the skb with the new (local) frags. */
> + memcpy(skb_shinfo(skb)->frags, frags,
> + nr_frags * sizeof(skb_frag_t));
> + skb_shinfo(skb)->nr_frags = nr_frags;
> + skb->truesize += nr_frags * PAGE_SIZE;
>
> return 0;
> }
^ permalink raw reply [flat|nested] 9+ messages in thread
* Re: [Xen-devel] [PATCHv1 2/2] xen-netback: unref frags when handling a from-guest skb with a frag list
2015-03-04 9:48 ` Ian Campbell
@ 2015-03-04 9:56 ` David Vrabel
2015-03-04 10:02 ` Ian Campbell
0 siblings, 1 reply; 9+ messages in thread
From: David Vrabel @ 2015-03-04 9:56 UTC (permalink / raw)
To: Ian Campbell, David Vrabel; +Cc: netdev, Wei Liu, xen-devel
On 04/03/15 09:48, Ian Campbell wrote:
> On Tue, 2015-03-03 at 16:26 +0000, David Vrabel wrote:
>> Every time a VIF is destroyed up-to 256 pages may be leaked if packets
>> with more than MAX_SKB_FRAGS frags where transmitted from the guest.
>> Even worse, if another user of ballooned pages allocated one of these
>> ballooned pages it would not handle the the unexpectedly non-zero page
>> count (e.g., gntdev would deadlock when unmapping a grant because the
>> page count would never reach 1).
>>
>> When handling a from-guest skb with a frag list, unref the frags
>> before releasing them so they are freed correctly when the VIF is
>> destroyed.
>
> Am I right that the majority of the first 2 hunks (and various bits of
> the 3rd) are just switching the outer loop to nr_frags instead of i, to
> free up i for use in the new code below? And also to switch j to the now
> available i in the inner loop.
Yes. If you prefer I can split this into one patch that adds the
skb_frag_unref() calls and one that reorders/refactors.
>> Also swap over to the new (local) frags /after/ calling the skb
>> destructor. This isn't strictly necessary but it's less confusing.
>
> My only concern would be that this now means there is a period where the
> frags list is invalid. However I think the calling context is such that
> nobody else can have a reference to an skb which has the same shinfo as
> the one in our hand. Is that right?
That is correct. This skb is allocated by netback and has not yet been
passed up to the network stack.
David
^ permalink raw reply [flat|nested] 9+ messages in thread
* Re: [Xen-devel] [PATCHv1 2/2] xen-netback: unref frags when handling a from-guest skb with a frag list
2015-03-04 9:56 ` [Xen-devel] " David Vrabel
@ 2015-03-04 10:02 ` Ian Campbell
0 siblings, 0 replies; 9+ messages in thread
From: Ian Campbell @ 2015-03-04 10:02 UTC (permalink / raw)
To: David Vrabel; +Cc: netdev, Wei Liu, xen-devel
On Wed, 2015-03-04 at 09:56 +0000, David Vrabel wrote:
> On 04/03/15 09:48, Ian Campbell wrote:
> > On Tue, 2015-03-03 at 16:26 +0000, David Vrabel wrote:
> >> Every time a VIF is destroyed up-to 256 pages may be leaked if packets
> >> with more than MAX_SKB_FRAGS frags where transmitted from the guest.
> >> Even worse, if another user of ballooned pages allocated one of these
> >> ballooned pages it would not handle the the unexpectedly non-zero page
> >> count (e.g., gntdev would deadlock when unmapping a grant because the
> >> page count would never reach 1).
> >>
> >> When handling a from-guest skb with a frag list, unref the frags
> >> before releasing them so they are freed correctly when the VIF is
> >> destroyed.
> >
> > Am I right that the majority of the first 2 hunks (and various bits of
> > the 3rd) are just switching the outer loop to nr_frags instead of i, to
> > free up i for use in the new code below? And also to switch j to the now
> > available i in the inner loop.
>
> Yes. If you prefer I can split this into one patch that adds the
> skb_frag_unref() calls and one that reorders/refactors.
If you can be bothered that might make things easier to read, thanks.
> >> Also swap over to the new (local) frags /after/ calling the skb
> >> destructor. This isn't strictly necessary but it's less confusing.
> >
> > My only concern would be that this now means there is a period where the
> > frags list is invalid. However I think the calling context is such that
> > nobody else can have a reference to an skb which has the same shinfo as
> > the one in our hand. Is that right?
>
> That is correct. This skb is allocated by netback and has not yet been
> passed up to the network stack.
Phew! ;-)
^ permalink raw reply [flat|nested] 9+ messages in thread
* Re: [PATCHv1 1/2] xen-netback: return correct ethtool stats
2015-03-03 16:26 ` [PATCHv1 1/2] xen-netback: return correct ethtool stats David Vrabel
@ 2015-03-04 12:50 ` Sergei Shtylyov
0 siblings, 0 replies; 9+ messages in thread
From: Sergei Shtylyov @ 2015-03-04 12:50 UTC (permalink / raw)
To: David Vrabel, netdev; +Cc: xen-devel, Ian Campbell, Wei Liu
Hello.
On 3/3/2015 7:26 PM, David Vrabel wrote:
> Use correct pointer arithmetic to get the pointer to each stat.
> Signed-off-by: David Vrabel <david.vrabel@citrix.com>
> ---
> drivers/net/xen-netback/interface.c | 3 +--
> 1 file changed, 1 insertion(+), 2 deletions(-)
> diff --git a/drivers/net/xen-netback/interface.c b/drivers/net/xen-netback/interface.c
> index f38227a..3aa8648 100644
> --- a/drivers/net/xen-netback/interface.c
> +++ b/drivers/net/xen-netback/interface.c
> @@ -340,12 +340,11 @@ static void xenvif_get_ethtool_stats(struct net_device *dev,
> unsigned int num_queues = vif->num_queues;
> int i;
> unsigned int queue_index;
> - struct xenvif_stats *vif_stats;
>
> for (i = 0; i < ARRAY_SIZE(xenvif_stats); i++) {
> unsigned long accum = 0;
> for (queue_index = 0; queue_index < num_queues; ++queue_index) {
> - vif_stats = &vif->queues[queue_index].stats;
> + void *vif_stats = &vif->queues[queue_index].stats;
Need empty line after declaration; checkpatch.pl should have complained here.
> accum += *(unsigned long *)(vif_stats + xenvif_stats[i].offset);
> }
> data[i] = accum;
WBR, Sergei
^ permalink raw reply [flat|nested] 9+ messages in thread
end of thread, other threads:[~2015-03-04 12:50 UTC | newest]
Thread overview: 9+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2015-03-03 16:26 [PATCHv1 0/2 net] xen-netback: fix ethtool stats and memory David Vrabel
2015-03-03 16:26 ` [PATCHv1 1/2] xen-netback: return correct ethtool stats David Vrabel
2015-03-04 12:50 ` Sergei Shtylyov
2015-03-03 16:26 ` [PATCHv1 2/2] xen-netback: unref frags when handling a from-guest skb with a frag list David Vrabel
2015-03-03 16:56 ` [Xen-devel] " Zoltan Kiss
2015-03-04 9:48 ` Ian Campbell
2015-03-04 9:56 ` [Xen-devel] " David Vrabel
2015-03-04 10:02 ` Ian Campbell
2015-03-04 5:22 ` [PATCHv1 0/2 net] xen-netback: fix ethtool stats and memory David Miller
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).