From owner-freebsd-bugs Sat Dec 16 13:40:13 1995 Return-Path: owner-bugs Received: (from root@localhost) by freefall.freebsd.org (8.7.3/8.7.3) id NAA02867 for bugs-outgoing; Sat, 16 Dec 1995 13:40:13 -0800 (PST) Received: (from gnats@localhost) by freefall.freebsd.org (8.7.3/8.7.3) id NAA02834 Sat, 16 Dec 1995 13:40:08 -0800 (PST) Resent-Date: Sat, 16 Dec 1995 13:40:08 -0800 (PST) Resent-Message-Id: <199512162140.NAA02834@freefall.freebsd.org> Resent-From: gnats (GNATS Management) Resent-To: freebsd-bugs Resent-Reply-To: FreeBSD-gnats@freefall.FreeBSD.org, jc@irbs.com Received: from irbs.irbs.com (irbs.com [199.182.75.129]) by freefall.freebsd.org (8.7.3/8.7.3) with SMTP id NAA02751 for ; Sat, 16 Dec 1995 13:39:23 -0800 (PST) Received: (from jc@localhost) by irbs.irbs.com (8.6.12/8.6.6) id QAA00570; Sat, 16 Dec 1995 16:38:49 -0500 Message-Id: <199512162138.QAA00570@irbs.irbs.com> Date: Sat, 16 Dec 1995 16:38:49 -0500 From: John Capo Reply-To: jc@irbs.com To: FreeBSD-gnats-submit@freebsd.org X-Send-Pr-Version: 3.2 Subject: bin/895: ppp predictor-1 memory leak [PATCH included] Sender: owner-bugs@freebsd.org Precedence: bulk >Number: 895 >Category: bin >Synopsis: ppp predictor-1 memory leak [PATCH included] >Confidential: no >Severity: non-critical >Priority: medium >Responsible: freebsd-bugs >State: open >Class: sw-bug >Submitter-Id: current-users >Arrival-Date: Sat Dec 16 13:40:02 PST 1995 >Last-Modified: >Originator: John Capo >Organization: IRBS Engineering >Release: FreeBSD 2.1-STABLE i386 >Environment: >Description: A link problem, like a silo overflow, that will cause a FCS error results in a memory leak for each input packet and FCS failures on all subsequent predictor-1 compressed input packets. >How-To-Repeat: Enable and allow predictor-1 compression Run something that will generate considerable input to ppp Cause a silo overflow, start Xinside for instance >Fix: *** pred.c.orig Mon May 29 23:50:55 1995 --- pred.c Sat Dec 16 16:27:20 1995 *************** *** 182,187 **** --- 182,188 ---- if (len != len1) { /* Error is detected. Send reset request */ CcpSendResetReq(&CcpFsm); pfree(bp); + pfree(wp); return; } cp += olen - 4; *************** *** 213,218 **** --- 214,224 ---- proto = (proto << 8) | *pp++; } DecodePacket(proto, wp); + } + else + { + CcpSendResetReq(&CcpFsm); + pfree(wp); } pfree(bp); } >Audit-Trail: >Unformatted: