So with the added debugging and running the reproducer with the outside bridge (and so the vifs) and the PV guests eth0 set to 9001 (as seen on EC2), I get the following (format is <length>@<offset>):
[ 698.108119] xen_netfront: xennet: skb rides the rocket: 19 slots [ 698.108134] header 1490@238 -> 1 slots [ 698.108139] frag #0 1614@2164 -> + 1 pages [ 698.108143] frag #1 3038@1296 -> + 2 pages [ 698.108147] frag #2 6076@1852 -> + 2 pages [ 698.108151] frag #3 6076@292 -> + 2 pages [ 698.108156] frag #4 6076@2828 -> + 3 pages [ 698.108160] frag #5 3038@1268 -> + 2 pages [ 698.108164] frag #6 2272@1824 -> + 1 pages [ 698.108168] frag #7 3804@0 -> + 1 pages [ 698.108172] frag #8 6076@264 -> + 2 pages [ 698.108177] frag #9 3946@2800 -> + 2 pages [ 698.108180] frags adding 18 slots So multiple frags can point to a compound page and also start at an offset. Which makes either the assumption about the size required to handle N frags is wrong or whatever creates that buffer... -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1317811 Title: Dropped packets on EC2, "xen_netfront: xennet: skb rides the rocket: x slots" To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1317811/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs