From owner-freebsd-bugs Tue Sep 4 5:10: 5 2001 Delivered-To: freebsd-bugs@hub.freebsd.org Received: from freefall.freebsd.org (freefall.freebsd.org [216.136.204.21]) by hub.freebsd.org (Postfix) with ESMTP id B72E337B406 for ; Tue, 4 Sep 2001 05:10:01 -0700 (PDT) Received: (from gnats@localhost) by freefall.freebsd.org (8.11.4/8.11.4) id f84CA1T71434; Tue, 4 Sep 2001 05:10:01 -0700 (PDT) (envelope-from gnats) Date: Tue, 4 Sep 2001 05:10:01 -0700 (PDT) Message-Id: <200109041210.f84CA1T71434@freefall.freebsd.org> To: freebsd-bugs@FreeBSD.org Cc: From: Poul-Henning Kamp Subject: Re: kern/30306: Memory leak in __getcwd Reply-To: Poul-Henning Kamp Sender: owner-freebsd-bugs@FreeBSD.ORG Precedence: bulk List-ID: List-Archive: (Web Archive) List-Help: (List Instructions) List-Subscribe: List-Unsubscribe: X-Loop: FreeBSD.org The following reply was made to PR kern/30306; it has been noted by GNATS. From: Poul-Henning Kamp To: Mike Potanin Cc: freebsd-gnats-submit@FreeBSD.ORG Subject: Re: kern/30306: Memory leak in __getcwd Date: Tue, 04 Sep 2001 14:08:54 +0200 In message <200109041159.f84BxMD67053@freefall.freebsd.org>, Mike Potanin writes: > for (vp = fdp->fd_cdir; vp != fdp->fd_rdir && vp != rootvnode;) { > if (vp->v_flag & VROOT) { >- if (vp->v_mount == NULL) { /* forced unmount */ >- free(buf, M_TEMP); >+ if (vp->v_mount == NULL) /* forced unmount */ > return (EBADF); >- } > vp = vp->v_mount->mnt_vnodecovered; > continue; Uhm, is this patch reversed by any chance ? -- Poul-Henning Kamp | UNIX since Zilog Zeus 3.20 phk@FreeBSD.ORG | TCP/IP since RFC 956 FreeBSD committer | BSD since 4.3-tahoe Never attribute to malice what can adequately be explained by incompetence. To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-bugs" in the body of the message