Date: Mon, 15 Jul 2013 11:36:16 +0200 From: Ulrich =?utf-8?B?U3DDtnJsZWlu?= <uqs@FreeBSD.org> To: Andre Oppermann <andre@FreeBSD.org> Cc: svn-src-head@freebsd.org, svn-src-all@freebsd.org, src-committers@freebsd.org Subject: Re: svn commit: r253210 - in head/sys: conf netinet Message-ID: <20130715093615.GC2294@acme.spoerlein.net> In-Reply-To: <201307111529.r6BFTPSf016809@svn.freebsd.org> References: <201307111529.r6BFTPSf016809@svn.freebsd.org>
next in thread | previous in thread | raw e-mail | index | archive | help
Hey Andre, I don't see why this commit triggers it, but Coverity Scan found a new resource leak in this file. syncache_expand() will leak *s when line 1071 is reached. The "failed:" case below correctly frees the resources. 1068/* how do we find the inp for the new socket? */ 22. Condition "sc != &scs", taking true branch 1069 if (sc != &scs) 1070 syncache_free(sc); CID null (#1 of 1): Resource leak (RESOURCE_LEAK) 23. leaked_storage: Variable "s" going out of scope leaks the storage it points to. 1071 return (1); 1072failed: 1073 if (sc != NULL && sc != &scs) 1074 syncache_free(sc); 1075 if (s != NULL) 1076 free(s, M_TCPLOG); 1077 *lsop = NULL; 1078 return (0); 1079} This has no CID yet ... Cheers, Uli
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20130715093615.GC2294>