search for: __x64_sys_sendto

Displaying 7 results from an estimated 7 matches for "__x64_sys_sendto".

2019 Jun 14
0
memory leak in vhost_net_ioctl
...;] sock_sendmsg+0x54/0x70 net/socket.c:665 [<000000007791ad47>] __sys_sendto+0x148/0x1f0 net/socket.c:1958 [<00000000d6f3807d>] __do_sys_sendto net/socket.c:1970 [inline] [<00000000d6f3807d>] __se_sys_sendto net/socket.c:1966 [inline] [<00000000d6f3807d>] __x64_sys_sendto+0x2a/0x30 net/socket.c:1966 BUG: memory leak unreferenced object 0xffff8881024a3340 (size 64): comm "softirq", pid 0, jiffies 4294943678 (age 434.730s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 e0 2c 66 04 81 88 ff ff .........,f..... 00 00 00 00 00 00 00 00 20...
2019 Jun 14
0
memory leak in vhost_net_ioctl
...0x54/0x70 net/socket.c:665 > [<000000007791ad47>] __sys_sendto+0x148/0x1f0 net/socket.c:1958 > [<00000000d6f3807d>] __do_sys_sendto net/socket.c:1970 [inline] > [<00000000d6f3807d>] __se_sys_sendto net/socket.c:1966 [inline] > [<00000000d6f3807d>] __x64_sys_sendto+0x2a/0x30 net/socket.c:1966 > >BUG: memory leak >unreferenced object 0xffff8881024a3340 (size 64): > comm "softirq", pid 0, jiffies 4294943678 (age 434.730s) > hex dump (first 32 bytes): > 00 00 00 00 00 00 00 00 e0 2c 66 04 81 88 ff ff .........,f..... >...
2019 Jun 14
0
memory leak in vhost_net_ioctl
...0x54/0x70 net/socket.c:665 > [<000000007791ad47>] __sys_sendto+0x148/0x1f0 net/socket.c:1958 > [<00000000d6f3807d>] __do_sys_sendto net/socket.c:1970 [inline] > [<00000000d6f3807d>] __se_sys_sendto net/socket.c:1966 [inline] > [<00000000d6f3807d>] __x64_sys_sendto+0x2a/0x30 net/socket.c:1966 > >BUG: memory leak >unreferenced object 0xffff8881024a3340 (size 64): > comm "softirq", pid 0, jiffies 4294943678 (age 434.730s) > hex dump (first 32 bytes): > 00 00 00 00 00 00 00 00 e0 2c 66 04 81 88 ff ff .........,f..... >...
2019 Jun 14
2
memory leak in vhost_net_ioctl
Hello Syzbot On Fri, 14 Jun 2019 02:26:02 +0800 syzbot wrote: > > Hello, > > syzbot has tested the proposed patch but the reproducer still triggered crash: > memory leak in vhost_net_ioctl > Oh sorry for my poor patch. > ANGE): hsr_slave_1: link becomes ready > 2019/06/13 18:24:57 executed programs: 18 > BUG: memory leak > unreferenced object 0xffff88811cbc6ac0
2019 Jun 14
2
memory leak in vhost_net_ioctl
Hello Syzbot On Fri, 14 Jun 2019 02:26:02 +0800 syzbot wrote: > > Hello, > > syzbot has tested the proposed patch but the reproducer still triggered crash: > memory leak in vhost_net_ioctl > Oh sorry for my poor patch. > ANGE): hsr_slave_1: link becomes ready > 2019/06/13 18:24:57 executed programs: 18 > BUG: memory leak > unreferenced object 0xffff88811cbc6ac0
2023 Apr 13
1
[PATCH net-next V2 0/2] virtio-net: don't busy poll for cvq command
...cv_msg_doit.isra.0+0xb8/0x100 [<0>] genl_rcv_msg+0x151/0x290 [<0>] netlink_rcv_skb+0x54/0x100 [<0>] genl_rcv+0x24/0x40 [<0>] netlink_unicast+0x217/0x340 [<0>] netlink_sendmsg+0x23e/0x4a0 [<0>] sock_sendmsg+0x8f/0xa0 [<0>] __sys_sendto+0xfc/0x170 [<0>] __x64_sys_sendto+0x20/0x30 [<0>] do_syscall_64+0x59/0x90 [<0>] entry_SYSCALL_64_after_hwframe+0x72/0xdc Once fixed on DPDK side (you can use my vduse_v1 branch [0] for testing), it works fine: Tested-by: Maxime Coquelin <maxime.coquelin at redhat.com> For the potential missing interrupt with no...
2023 Apr 13
3
[PATCH net-next V2 0/2] virtio-net: don't busy poll for cvq command
Hi all: The code used to busy poll for cvq command which turns out to have several side effects: 1) infinite poll for buggy devices 2) bad interaction with scheduler So this series tries to use sleep instead of busy polling. In this version, I take a step back: the hardening part is not implemented and leave for future investigation. We use to aggree to use interruptible sleep but it