From owner-freebsd-hackers Tue Jan 28 16:24:54 1997 Return-Path: Received: (from root@localhost) by freefall.freebsd.org (8.8.5/8.8.5) id QAA23569 for hackers-outgoing; Tue, 28 Jan 1997 16:24:54 -0800 (PST) Received: from awfulhak.demon.co.uk (awfulhak.demon.co.uk [158.152.17.1]) by freefall.freebsd.org (8.8.5/8.8.5) with ESMTP id QAA23564 for ; Tue, 28 Jan 1997 16:24:48 -0800 (PST) Received: from awfulhak.demon.co.uk (localhost.coverform.lan [127.0.0.1]) by awfulhak.demon.co.uk (8.8.4/8.7.3) with ESMTP id AAA23335 for ; Wed, 29 Jan 1997 00:24:45 GMT Message-Id: <199701290024.AAA23335@awfulhak.demon.co.uk> X-Mailer: exmh version 1.6.9 8/22/96 To: hackers@freebsd.org Subject: PR2347 - recursive malloc() in ppp Mime-Version: 1.0 Content-Type: text/plain; charset=us-ascii Date: Wed, 29 Jan 1997 00:24:45 +0000 From: Brian Somers Sender: owner-hackers@freebsd.org X-Loop: FreeBSD.org Precedence: bulk Anyone interested in running the "fixed" version? It seems ok on my machine. All I've done is made the "work" happen in a call from the top level read-a-packet loop, and triggered it via a variable that's set when an alarm happens. If anyone's interested, there's a compiled copy on freefall in ~brian/src/usr.sbin/ppp Cheers -- Brian , Don't _EVER_ lose your sense of humour....