Search String: Display: Description: Sort:

Results:

References: [ +subject:/^(?:^\s*(re|sv|fwd|fw)[\[\]\d]*[:>-]+\s*)*\[PATCH\s+net\s+v2\]\s+ipvs\:\s+fix\s+possible\s+memory\s+leak\s+in\s+ip_vs_control_net_init\s*$/: 5 ]

Total 5 documents matching your query.

1. Re: [PATCH net v2] ipvs: fix possible memory leak in ip_vs_control_net_init (score: 1)
Author: "wanghai (M)" <wanghai38@xxxxxxxxxx>
Date: Tue, 24 Nov 2020 16:07:00 +0800
2020/11/24 3:04, Julian Anastasov : Hello, 2020/11/22 19:20, Julian Anastasov : Hello, + if (!proc_create_net_single("ip_vs_stats_percpu", 0, + ip_vs_stats_percpu_show, NULL)) + goto err_percpu; Make
/html/lvs-devel/2020-11/msg00025.html (12,652 bytes)

2. Re: [PATCH net v2] ipvs: fix possible memory leak in ip_vs_control_net_init (score: 1)
Author: Julian Anastasov <ja@xxxxxx>
Date: Mon, 23 Nov 2020 21:04:27 +0200 (EET)
Hello, Visually, they should look like this: if (!proc_create_net("ip_vs", 0, ipvs->net->proc_net, &ip_vs_info_seq_ops, sizeof(struct ip_vs_iter))) goto err_vs; if (!proc_create_net_single("ip_vs_sta
/html/lvs-devel/2020-11/msg00023.html (11,392 bytes)

3. Re: [PATCH net v2] ipvs: fix possible memory leak in ip_vs_control_net_init (score: 1)
Author: "wanghai (M)" <wanghai38@xxxxxxxxxx>
Date: Mon, 23 Nov 2020 22:49:10 +0800
2020/11/22 19:20, Julian Anastasov : Hello, kmemleak report a memory leak as follows: BUG: memory leak unreferenced object 0xffff8880759ea000 (size 256): comm "syz-executor.3", pid 6484, jiffies 4297
/html/lvs-devel/2020-11/msg00022.html (13,798 bytes)

4. Re: [PATCH net v2] ipvs: fix possible memory leak in ip_vs_control_net_init (score: 1)
Author: Julian Anastasov <ja@xxxxxx>
Date: Sun, 22 Nov 2020 13:20:59 +0200 (EET)
Hello, Make sure the parameters are properly aligned to function open parenthesis without exceeding 80 columns: linux# scripts/checkpatch.pl --strict /tmp/file.patch It was true only for first call d
/html/lvs-devel/2020-11/msg00019.html (14,958 bytes)

5. [PATCH net v2] ipvs: fix possible memory leak in ip_vs_control_net_init (score: 1)
Author: Wang Hai <wanghai38@xxxxxxxxxx>
Date: Fri, 20 Nov 2020 16:26:10 +0800
kmemleak report a memory leak as follows: BUG: memory leak unreferenced object 0xffff8880759ea000 (size 256): comm "syz-executor.3", pid 6484, jiffies 4297476946 (age 48.546s) hex dump (first 32 byte
/html/lvs-devel/2020-11/msg00017.html (13,913 bytes)


This search system is powered by Namazu