Home
last modified time | relevance | path

Searched hist:e5fffe9a (Results 1 – 1 of 1) sorted by relevance

/freebsd/sys/netinet6/
H A Dfrag6.ce5fffe9a Thu Oct 24 19:47:32 GMT 2019 Bjoern A. Zeeb <bz@FreeBSD.org> frag6.c: do not leak packet queue entry in error case

When we are checking for the maximum reassembled packet size of the
fragmentable part and run into the error case (packet too big),
we are leaking the packet queue enntry if this was a first fragment
to arrive.
Properly cleanup, removing the queue entry from the bucket, decrementing
counters, and freeing the memory.

MFC after: 3 weeks
Sponsored by: Netflix
e5fffe9a Thu Oct 24 19:47:32 GMT 2019 Bjoern A. Zeeb <bz@FreeBSD.org> frag6.c: do not leak packet queue entry in error case

When we are checking for the maximum reassembled packet size of the
fragmentable part and run into the error case (packet too big),
we are leaking the packet queue enntry if this was a first fragment
to arrive.
Properly cleanup, removing the queue entry from the bucket, decrementing
counters, and freeing the memory.

MFC after: 3 weeks
Sponsored by: Netflix
e5fffe9a Thu Oct 24 19:47:32 GMT 2019 Bjoern A. Zeeb <bz@FreeBSD.org> frag6.c: do not leak packet queue entry in error case

When we are checking for the maximum reassembled packet size of the
fragmentable part and run into the error case (packet too big),
we are leaking the packet queue enntry if this was a first fragment
to arrive.
Properly cleanup, removing the queue entry from the bucket, decrementing
counters, and freeing the memory.

MFC after: 3 weeks
Sponsored by: Netflix
e5fffe9a Thu Oct 24 19:47:32 GMT 2019 Bjoern A. Zeeb <bz@FreeBSD.org> frag6.c: do not leak packet queue entry in error case

When we are checking for the maximum reassembled packet size of the
fragmentable part and run into the error case (packet too big),
we are leaking the packet queue enntry if this was a first fragment
to arrive.
Properly cleanup, removing the queue entry from the bucket, decrementing
counters, and freeing the memory.

MFC after: 3 weeks
Sponsored by: Netflix
e5fffe9a Thu Oct 24 19:47:32 GMT 2019 Bjoern A. Zeeb <bz@FreeBSD.org> frag6.c: do not leak packet queue entry in error case

When we are checking for the maximum reassembled packet size of the
fragmentable part and run into the error case (packet too big),
we are leaking the packet queue enntry if this was a first fragment
to arrive.
Properly cleanup, removing the queue entry from the bucket, decrementing
counters, and freeing the memory.

MFC after: 3 weeks
Sponsored by: Netflix
e5fffe9a Thu Oct 24 19:47:32 GMT 2019 Bjoern A. Zeeb <bz@FreeBSD.org> frag6.c: do not leak packet queue entry in error case

When we are checking for the maximum reassembled packet size of the
fragmentable part and run into the error case (packet too big),
we are leaking the packet queue enntry if this was a first fragment
to arrive.
Properly cleanup, removing the queue entry from the bucket, decrementing
counters, and freeing the memory.

MFC after: 3 weeks
Sponsored by: Netflix
e5fffe9a Thu Oct 24 19:47:32 GMT 2019 Bjoern A. Zeeb <bz@FreeBSD.org> frag6.c: do not leak packet queue entry in error case

When we are checking for the maximum reassembled packet size of the
fragmentable part and run into the error case (packet too big),
we are leaking the packet queue enntry if this was a first fragment
to arrive.
Properly cleanup, removing the queue entry from the bucket, decrementing
counters, and freeing the memory.

MFC after: 3 weeks
Sponsored by: Netflix