From owner-svn-src-stable-9@FreeBSD.ORG Tue Nov 27 01:33:23 2012 Return-Path: Delivered-To: svn-src-stable-9@freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [69.147.83.52]) by hub.freebsd.org (Postfix) with ESMTP id A9216E3B; Tue, 27 Nov 2012 01:33:23 +0000 (UTC) (envelope-from mjg@FreeBSD.org) Received: from svn.freebsd.org (svn.freebsd.org [IPv6:2001:1900:2254:2068::e6a:0]) by mx1.freebsd.org (Postfix) with ESMTP id 8D05B8FC08; Tue, 27 Nov 2012 01:33:23 +0000 (UTC) Received: from svn.freebsd.org (localhost [127.0.0.1]) by svn.freebsd.org (8.14.5/8.14.5) with ESMTP id qAR1XNUC034989; Tue, 27 Nov 2012 01:33:23 GMT (envelope-from mjg@svn.freebsd.org) Received: (from mjg@localhost) by svn.freebsd.org (8.14.5/8.14.5/Submit) id qAR1XNx4034987; Tue, 27 Nov 2012 01:33:23 GMT (envelope-from mjg@svn.freebsd.org) Message-Id: <201211270133.qAR1XNx4034987@svn.freebsd.org> From: Mateusz Guzik Date: Tue, 27 Nov 2012 01:33:23 +0000 (UTC) To: src-committers@freebsd.org, svn-src-all@freebsd.org, svn-src-stable@freebsd.org, svn-src-stable-9@freebsd.org Subject: svn commit: r243584 - stable/9/sys/kern X-SVN-Group: stable-9 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit X-BeenThere: svn-src-stable-9@freebsd.org X-Mailman-Version: 2.1.14 Precedence: list List-Id: SVN commit messages for only the 9-stable src tree List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 27 Nov 2012 01:33:23 -0000 Author: mjg Date: Tue Nov 27 01:33:23 2012 New Revision: 243584 URL: http://svnweb.freebsd.org/changeset/base/243584 Log: MFC r243234: Fix possible fp reference leak in posix_openpt Modified: stable/9/sys/kern/tty_pts.c Directory Properties: stable/9/sys/ (props changed) Modified: stable/9/sys/kern/tty_pts.c ============================================================================== --- stable/9/sys/kern/tty_pts.c Tue Nov 27 01:30:12 2012 (r243583) +++ stable/9/sys/kern/tty_pts.c Tue Nov 27 01:33:23 2012 (r243584) @@ -836,6 +836,7 @@ sys_posix_openpt(struct thread *td, stru error = pts_alloc(FFLAGS(uap->flags & O_ACCMODE), td, fp); if (error != 0) { fdclose(td->td_proc->p_fd, fp, fd, td); + fdrop(fp, td); return (error); }