From owner-freebsd-hackers Tue May 25 18: 1: 8 1999 Delivered-To: freebsd-hackers@freebsd.org Received: from mercury.inktomi.com (mercury.inktomi.com [209.1.32.126]) by hub.freebsd.org (Postfix) with ESMTP id E848914D8B for ; Tue, 25 May 1999 18:01:04 -0700 (PDT) (envelope-from jplevyak@inktomi.com) Received: from tsdev (tsdev.inktomi.com [209.1.32.119]) by mercury.inktomi.com (8.9.1a/8.9.1) with ESMTP id SAA03606 for ; Tue, 25 May 1999 18:01:12 -0700 (PDT) Received: (from jplevyak@localhost) by tsdev (SMI-8.6/) id SAA22582 for freebsd-hackers@freebsd.org; Tue, 25 May 1999 18:01:05 -0700 Message-ID: <19990525180105.A17170@tsdev.inktomi.com> Date: Tue, 25 May 1999 18:01:05 -0700 From: John Plevyak To: freebsd-hackers@freebsd.org Subject: mbuf leak Mime-Version: 1.0 Content-Type: text/plain; charset=us-ascii X-Mailer: Mutt 0.93.2i Sender: owner-freebsd-hackers@FreeBSD.ORG Precedence: bulk X-Loop: FreeBSD.ORG In 3.2-STABLE as of a few days ago, there is the potential for an mbuf leak in tcp_usr_send if sotoinpcb(so) == NULL. The COMMON_START code does not take into account the semantics of tcp_usr_send which requires 'm' to be free'd if it is not NULL. john -- John Bradley Plevyak, PhD, jplevyak@inktomi.com, PGP KeyID: 051130BD Inktomi Corporation, 1900 S. Norfolk Street, Suite 310, San Mateo, CA 94403 W:(650)653-2830 F:(650)653-2889 P:(888)491-1332/5103192436.4911332@pagenet.net To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-hackers" in the body of the message