This is an archived copy of the Xen.org mailing list, which we have preserved to ensure that existing links to archives are not broken. The live archive, which contains the latest emails, can be found at http://lists.xen.org/
Home Products Support Community News


Re: [Xen-devel] [PATCH] Fix leak in blkback initialization

To: Vincent Hanquez <vincent.hanquez@xxxxxxxxxxxx>
Subject: Re: [Xen-devel] [PATCH] Fix leak in blkback initialization
From: Glauber de Oliveira Costa <glommer@xxxxxxxxx>
Date: Thu, 5 Jan 2006 12:33:17 -0200
Cc: xen-devel@xxxxxxxxxxxxxxxxxxx, Glauber de Oliveira Costa <glommer@xxxxxxxxxx>
Delivery-date: Thu, 05 Jan 2006 14:38:44 +0000
Domainkey-signature: a=rsa-sha1; q=dns; c=nofws; s=beta; d=gmail.com; h=received:message-id:date:from:to:subject:cc:in-reply-to:mime-version:content-type:content-transfer-encoding:content-disposition:references; b=BVM2JoJxja+DU7WtK0oF2rjyhxghC987Ufx629EkOmbTDifugEgW2hxeyspRFTAgMKOBsQQztNu3XsC18Yjargx5FPC2H7eyGcJ1gsPVf9dQ6N6BCj9OJk8b0dYvq6bgXQbtCsSZXudUizNR+11/NFcG9YfFK4sUK/Sk3ORLLjE=
Envelope-to: www-data@xxxxxxxxxxxxxxxxxxx
In-reply-to: <20060105140610.GA7951@xxxxxxxxx>
List-help: <mailto:xen-devel-request@lists.xensource.com?subject=help>
List-id: Xen developer discussion <xen-devel.lists.xensource.com>
List-post: <mailto:xen-devel@lists.xensource.com>
List-subscribe: <http://lists.xensource.com/cgi-bin/mailman/listinfo/xen-devel>, <mailto:xen-devel-request@lists.xensource.com?subject=subscribe>
List-unsubscribe: <http://lists.xensource.com/cgi-bin/mailman/listinfo/xen-devel>, <mailto:xen-devel-request@lists.xensource.com?subject=unsubscribe>
References: <20060104151506.GA26795@xxxxxxxxxx> <20060105140610.GA7951@xxxxxxxxx>
Sender: xen-devel-bounces@xxxxxxxxxxxxxxxxxxx
Yes, I saw that. It just happened to me to see the error a little bit
before seeing the correction =]



On 1/5/06, Vincent Hanquez <vincent.hanquez@xxxxxxxxxxxx> wrote:
> On Wed, Jan 04, 2006 at 03:15:06PM +0000, Glauber de Oliveira Costa wrote:
> > In case of failing due to lack of memory in the system, blkif_init
> > potentially leaves a leak if some of the allocations was sucessfully
> > suceeded.
> >
> > This patch frees the memory allocated, avoiding the leak.
> This has already been corrected (changeset 8469)
> Thanks,
> --
> Vincent Hanquez
> _______________________________________________
> Xen-devel mailing list
> Xen-devel@xxxxxxxxxxxxxxxxxxx
> http://lists.xensource.com/xen-devel

Free Software : Technology for a better world
Glauber de Oliveira Costa
jabber: glommer@xxxxxxxxxx

Xen-devel mailing list

<Prev in Thread] Current Thread [Next in Thread>