From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from mails.dpdk.org (mails.dpdk.org [217.70.189.124]) by inbox.dpdk.org (Postfix) with ESMTP id BB814A0C45; Mon, 13 Sep 2021 04:29:46 +0200 (CEST) Received: from [217.70.189.124] (localhost [127.0.0.1]) by mails.dpdk.org (Postfix) with ESMTP id 281B64014F; Mon, 13 Sep 2021 04:29:46 +0200 (CEST) Received: from mga06.intel.com (mga06.intel.com [134.134.136.31]) by mails.dpdk.org (Postfix) with ESMTP id EBA6D40041; Mon, 13 Sep 2021 04:29:44 +0200 (CEST) X-IronPort-AV: E=McAfee;i="6200,9189,10105"; a="282550517" X-IronPort-AV: E=Sophos;i="5.85,288,1624345200"; d="scan'208";a="282550517" Received: from orsmga002.jf.intel.com ([10.7.209.21]) by orsmga104.jf.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 12 Sep 2021 19:29:43 -0700 X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="5.85,288,1624345200"; d="scan'208";a="451375203" Received: from fmsmsx605.amr.corp.intel.com ([10.18.126.85]) by orsmga002.jf.intel.com with ESMTP; 12 Sep 2021 19:29:42 -0700 Received: from shsmsx604.ccr.corp.intel.com (10.109.6.214) by fmsmsx605.amr.corp.intel.com (10.18.126.85) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2242.12; Sun, 12 Sep 2021 19:29:42 -0700 Received: from shsmsx601.ccr.corp.intel.com (10.109.6.141) by SHSMSX604.ccr.corp.intel.com (10.109.6.214) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2242.12; Mon, 13 Sep 2021 10:29:40 +0800 Received: from shsmsx601.ccr.corp.intel.com ([10.109.6.141]) by SHSMSX601.ccr.corp.intel.com ([10.109.6.141]) with mapi id 15.01.2242.012; Mon, 13 Sep 2021 10:29:40 +0800 From: "Zhang, Qi Z" To: "chenqiming_huawei@163.com" , "dev@dpdk.org" CC: "Xing, Beilei" , "stable@dpdk.org" Thread-Topic: [dpdk-dev] [PATCH] net/i40e: fix mbuf leak Thread-Index: AQHXl8GKNUsLy8UCeEar8nJDlSPRLquhXrvQ Date: Mon, 13 Sep 2021 02:29:39 +0000 Message-ID: References: <20210823015034.6922-1-chenqiming_huawei@163.com> In-Reply-To: <20210823015034.6922-1-chenqiming_huawei@163.com> Accept-Language: en-US Content-Language: en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: dlp-reaction: no-action dlp-version: 11.5.1.3 dlp-product: dlpe-windows x-originating-ip: [10.239.127.36] Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: quoted-printable MIME-Version: 1.0 Subject: Re: [dpdk-dev] [PATCH] net/i40e: fix mbuf leak X-BeenThere: dev@dpdk.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: DPDK patches and discussions List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: dev-bounces@dpdk.org Sender: "dev" > -----Original Message----- > From: dev On Behalf Of > chenqiming_huawei@163.com > Sent: Monday, August 23, 2021 9:51 AM > To: dev@dpdk.org > Cc: Xing, Beilei ; Qiming Chen > ; stable@dpdk.org > Subject: [dpdk-dev] [PATCH] net/i40e: fix mbuf leak >=20 > From: Qiming Chen >=20 > A local test found that repeated port start and stop operations during th= e > continuous SSE vector bufflist receiving process will cause the mbuf reso= urce > to run out. The final positioning is when the port is stopped, the mbuf o= f the > pkt_first_seg pointer is not released. Resources lead. > The patch scheme is to judge whether the pointer is empty when the port i= s > stopped, and release the corresponding mbuf if it is not empty. >=20 > Fixes: 5c9222058df7 ("i40e: move to drivers/net/") Fixes: 4861cde46116 ("i40e: new poll mode driver") > Cc: stable@dpdk.org >=20 > Signed-off-by: Qiming Chen Acked-by: Qi Zhang Applied to dpdk-next-net-intel. Thanks Qi