Skip site navigation (1)Skip section navigation (2)
Date:      Tue, 25 May 1999 18:01:05 -0700
From:      John Plevyak <jplevyak@inktomi.com>
To:        freebsd-hackers@freebsd.org
Subject:   mbuf leak
Message-ID:  <19990525180105.A17170@tsdev.inktomi.com>

next in thread | raw e-mail | index | archive | help

In 3.2-STABLE as of a few days ago, there is the potential for an
mbuf leak in tcp_usr_send if sotoinpcb(so) == NULL.

The COMMON_START code does not take into account the semantics
of tcp_usr_send which requires 'm' to be free'd if it is not NULL.

john

-- 
John Bradley Plevyak,    PhD,    jplevyak@inktomi.com,     PGP KeyID: 051130BD
Inktomi Corporation,  1900 S. Norfolk Street,  Suite 310,  San Mateo, CA 94403
W:(650)653-2830 F:(650)653-2889 P:(888)491-1332/5103192436.4911332@pagenet.net


To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-hackers" in the body of the message




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?19990525180105.A17170>