From 2445b61b3187d860fab76ed60e3e4732cfecb62e Mon Sep 17 00:00:00 2001 From: Jeremy Fitzhardinge Date: Mon, 13 Aug 2007 12:54:37 -0700 Subject: [PATCH] --- yaml --- r: 63987 b: refs/heads/master c: 10a273a67343e1f317652d69b09a212ee0284b44 h: refs/heads/master i: 63985: 5b8ab5ac4bd81d3f48de96cb485898363d8982b0 63983: 236f03826733ef92785acd0a9dd812cbe7b8a181 v: v3 --- [refs] | 2 +- trunk/drivers/net/xen-netfront.c | 7 ++++--- 2 files changed, 5 insertions(+), 4 deletions(-) diff --git a/[refs] b/[refs] index 176a1754d48d..383e6107beb3 100644 --- a/[refs] +++ b/[refs] @@ -1,2 +1,2 @@ --- -refs/heads/master: a6d89915aa668776494fec8568d46aa6043ff848 +refs/heads/master: 10a273a67343e1f317652d69b09a212ee0284b44 diff --git a/trunk/drivers/net/xen-netfront.c b/trunk/drivers/net/xen-netfront.c index 489f69c5d6ca..4445810335a8 100644 --- a/trunk/drivers/net/xen-netfront.c +++ b/trunk/drivers/net/xen-netfront.c @@ -566,6 +566,10 @@ static int xennet_start_xmit(struct sk_buff *skb, struct net_device *dev) if (notify) notify_remote_via_irq(np->netdev->irq); + np->stats.tx_bytes += skb->len; + np->stats.tx_packets++; + + /* Note: It is not safe to access skb after xennet_tx_buf_gc()! */ xennet_tx_buf_gc(dev); if (!netfront_tx_slot_available(np)) @@ -573,9 +577,6 @@ static int xennet_start_xmit(struct sk_buff *skb, struct net_device *dev) spin_unlock_irq(&np->tx_lock); - np->stats.tx_bytes += skb->len; - np->stats.tx_packets++; - return 0; drop: