rt remote free backtrace

Peter Avalos pavalos at theshell.com
Thu Oct 30 09:33:05 PDT 2008

On Wed, Oct 29, 2008 at 10:12:04PM +0800, Sepherosa Ziehau wrote:
> For a listen socket on tcp_input path, the listen socket's inp route
> cache will be used to send RST, if it receives a TCP segment with
> invalid flags combination.  This may lead to this route entry remote
> free.
> Please test/review following patch:
> http://leaf.dragonflybsd.org/~sephe/tcp_respond.diff

I noticed you only committed the tcp_subr.c part of this patch and not
the in_pcb.c.  Was that intentional?

-------------- next part --------------
A non-text attachment was scrubbed...
Name: pgp00002.pgp
Type: application/octet-stream
Size: 197 bytes
Desc: "Description: PGP signature"
URL: <http://lists.dragonflybsd.org/pipermail/bugs/attachments/20081030/49fea0a1/attachment-0022.obj>

More information about the Bugs mailing list