Skip site navigation (1)Skip section navigation (2)
Date:      Mon, 15 Jul 2013 11:36:16 +0200
From:      Ulrich =?utf-8?B?U3DDtnJsZWlu?= <uqs@FreeBSD.org>
To:        Andre Oppermann <andre@FreeBSD.org>
Cc:        svn-src-head@freebsd.org, svn-src-all@freebsd.org, src-committers@freebsd.org
Subject:   Re: svn commit: r253210 - in head/sys: conf netinet
Message-ID:  <20130715093615.GC2294@acme.spoerlein.net>
In-Reply-To: <201307111529.r6BFTPSf016809@svn.freebsd.org>
References:  <201307111529.r6BFTPSf016809@svn.freebsd.org>

next in thread | previous in thread | raw e-mail | index | archive | help
Hey Andre,

I don't see why this commit triggers it, but Coverity Scan found a new
resource leak in this file. syncache_expand() will leak *s when line
1071 is reached. The "failed:" case below correctly frees the resources.

1068/* how do we find the inp for the new socket? */
        22. Condition "sc != &scs", taking true branch
1069        if (sc != &scs)
1070                syncache_free(sc);
        
CID null (#1 of 1): Resource leak (RESOURCE_LEAK)
23. leaked_storage: Variable "s" going out of scope leaks the storage it points to.
1071        return (1);
1072failed:
1073        if (sc != NULL && sc != &scs)
1074                syncache_free(sc);
1075        if (s != NULL)
1076                free(s, M_TCPLOG);
1077        *lsop = NULL;
1078        return (0);
1079}

This has no CID yet ...

Cheers,
Uli



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20130715093615.GC2294>