Skip site navigation (1)Skip section navigation (2)
Date:      Fri, 11 Jun 2010 19:17:36 +0000 (UTC)
From:      "Kenneth D. Merry" <ken@FreeBSD.org>
To:        cvs-src-old@freebsd.org
Subject:   cvs commit: src/sys/amd64/include/xen xenfunc.h xenvar.h src/sys/dev/cxgb/sys mvec.h uipc_mvec.c src/sys/dev/xen/netfront netfront.c src/sys/i386/include/xen xenfunc.h xenvar.h src/sys/kern subr_bufring.c src/sys/sys buf_ring.h
Message-ID:  <201006111919.o5BJJJl8058102@repoman.freebsd.org>

next in thread | raw e-mail | index | archive | help
ken         2010-06-11 19:17:36 UTC

  FreeBSD src repository

  Modified files:        (Branch: RELENG_8)
    sys/amd64/include/xen xenfunc.h xenvar.h 
    sys/dev/cxgb/sys     mvec.h uipc_mvec.c 
    sys/dev/xen/netfront netfront.c 
    sys/i386/include/xen xenfunc.h xenvar.h 
    sys/kern             subr_bufring.c 
    sys/sys              buf_ring.h 
  Log:
  SVN rev 209061 on 2010-06-11 19:17:36Z by ken
  
  MFC 199549, 199997, 204158, 207673, and 208901.
  
  Bring in a number of netfront changes:
  
  r199549 | jhb
  
    Remove commented out reference to if_watchdog and an assignment of zero to
    if_timer.
  
    Reviewed by:  scottl
  
  r199997 | gibbs
  
    Add media ioctl support and link notifications so that devd will attempt
    to run dhclient on a netfront (xn) device that is setup for DHCP in
    /etc/rc.conf.
  
    PR:           kern/136251 (fixed differently than the submitted patch)
  
  r204158 | kmacy
  
    - make printf conditional
    - fix witness warnings by making configuration lock a mutex
  
  r207673 | joel
  
    Switch to our preferred 2-clause BSD license.
  
    Approved by:  kmacy
  
  r208901 | ken
  
    A number of netfront fixes and stability improvements:
  
     - Re-enable TSO.  This was broken previously due to CSUM_TSO clearing the
       CSUM_TCP flag, so our checksum flags were incorrectly set going to the
       netback driver.  That was fixed in r206844 in tcp_output.c, so we can
       turn TSO back on here.
  
     - Fix the way transmit slots are calculated, so that we can't overfill
       the ring.
  
     - Avoid sending packets with more fragments/segments than netback can
       handle.  The Linux netback code can only handle packets of
       MAX_SKB_FRAGS, which turns out to be 18 on machines with 4K pages.  We
       can easily generate packets with 32 or so fragments with TSO turned on.
       Right now the solution is just to drop the packets (since netback
       doesn't seem to handle it gracefully), but we should come up with a way
       to allow a driver to tell the TCP stack the maximum number of fragments
       it can handle in a single packet.
  
     - Fix the way the consumer is tracked in the receive path.  It could get
       out of sync fairly easily.
  
     - Use standard Xen ring macros to make it clearer how netfront is using
       the rings.
  
     - Get rid of Linux-ish negative errno return values.
  
     - Added more documentation to the driver.
  
     - Refactored code to make it easier to read.
  
     - Some other minor fixes.
  
    Reviewed by:  gibbs
    Sponsored by: Spectra Logic
  
  Approved by:    re (bz)
  
  Revision  Changes    Path
  1.1.2.1   +15 -16    src/sys/amd64/include/xen/xenfunc.h
  1.1.2.2   +12 -14    src/sys/amd64/include/xen/xenvar.h
  1.19.2.2  +20 -22    src/sys/dev/cxgb/sys/mvec.h
  1.35.2.2  +20 -24    src/sys/dev/cxgb/sys/uipc_mvec.c
  1.24.2.2  +435 -327  src/sys/dev/xen/netfront/netfront.c
  1.4.2.2   +13 -16    src/sys/i386/include/xen/xenfunc.h
  1.4.2.2   +13 -14    src/sys/i386/include/xen/xenvar.h
  1.1.2.2   +21 -24    src/sys/kern/subr_bufring.c
  1.6.2.2   +20 -22    src/sys/sys/buf_ring.h



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?201006111919.o5BJJJl8058102>