rt remote free backtrace

Sepherosa Ziehau sepherosa at gmail.com
Thu Oct 30 18:23:00 PDT 2008

On Fri, Oct 31, 2008 at 12:31 AM, Peter Avalos <pavalos at theshell.com> wrote:
> On Wed, Oct 29, 2008 at 10:12:04PM +0800, Sepherosa Ziehau wrote:
>> For a listen socket on tcp_input path, the listen socket's inp route
>> cache will be used to send RST, if it receives a TCP segment with
>> invalid flags combination.  This may lead to this route entry remote
>> free.
>> Please test/review following patch:
>> http://leaf.dragonflybsd.org/~sephe/tcp_respond.diff
> I noticed you only committed the tcp_subr.c part of this patch and not
> the in_pcb.c.  Was that intentional?

Yep.  The change in in_pcb.c shows the confidence that remote rt free
will not happen; nothing serious.  But the rt remote free you showed
after I posted this patch indicated that we are not that ready yet :)

Best Regards,

Live Free or Die

More information about the Bugs mailing list