Hi, Michael
I just got the following kernel bug while working on Dave's net tree
in a KVM guest. It looks like a bug in virtio.
Let me know if you need more information.
[ 69.816089] BUG kmalloc-64 (Not tainted): Poison overwritten
[ 69.816089]
Hi all,
I have a question about the vring_avail:
It only includes an idx (equivalent to the ring tail), which is used by the
frontend (virtio_net) to fill bufs. The backend (e.g. vhost_net) maintains the
ring head (last_avail_idx) by itself. The frontend checks if the ring is full
or empty via
On Tue, Aug 25, 2015 at 2:11 PM, Cong Wang cw...@twopensource.com wrote:
Hi, Michael
I just got the following kernel bug while working on Dave's net tree
in a KVM guest. It looks like a bug in virtio.
Hmm, the stack trace is misleading, it could be caused by my own networking
code even
From: Jason Wang jasow...@redhat.com
Date: Thu, 27 Aug 2015 14:53:06 +0800
Usually an skb does not have up to MAX_SKB_FRAGS frags. So no need to
initialize the unuse part of sg. This patch initialize the sg based on
the real number it will used:
- during xmit, it could be inferred from
Usually an skb does not have up to MAX_SKB_FRAGS frags. So no need to
initialize the unuse part of sg. This patch initialize the sg based on
the real number it will used:
- during xmit, it could be inferred from nr_frags and can_push.
- for small receive buffer, it will also be 2.
Cc: Michael S.
WorldCIST'16 - 4th World Conference on Information Systems and Technologies
Recife, PE, Brazil
22th-24th of March 2016
http://www.aisti.eu/worldcist16/
---
SCOPE
The WorldCist'16 - 4th World Conference on Information Systems and
Technologies, to be