From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from relay.sgi.com (relay1.corp.sgi.com [137.38.102.111]) by oss.sgi.com (Postfix) with ESMTP id C33477F92 for ; Wed, 2 Oct 2013 08:24:42 -0500 (CDT) Received: from eagdhcp-232-155.americas.sgi.com (eagdhcp-232-155.americas.sgi.com [128.162.232.155]) by relay1.corp.sgi.com (Postfix) with ESMTP id A659C8F804C for ; Wed, 2 Oct 2013 06:24:42 -0700 (PDT) Received: from eagdhcp-232-155.americas.sgi.com (localhost [127.0.0.1]) by eagdhcp-232-155.americas.sgi.com (8.14.5/8.14.5) with ESMTP id r92DOflm002403 for ; Wed, 2 Oct 2013 08:24:41 -0500 (CDT) (envelope-from tinguely@eagdhcp-232-155.americas.sgi.com) Message-Id: <20131002125110.745269864@sgi.com> Date: Wed, 02 Oct 2013 07:51:10 -0500 From: Mark Tinguely Subject: [PATCH 0/2] misc kernel leak patches List-Id: XFS Filesystem from SGI List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , MIME-Version: 1.0 Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: 7bit Errors-To: xfs-bounces@oss.sgi.com Sender: xfs-bounces@oss.sgi.com To: xfs@oss.sgi.com Here are a couple patches to free leaked memory. First patch is v2 of a Coverity found leak in xfs_dir2_node_removename(). Second patch arose from an eariler leak found by Coverity. In looking at that patch, Eric noted that it appeared that the transaction's item list is also leaked if recovery fails. I tested this patch by forcing errors into the recovery code to verify that the items are now being released. I will send patches for xfsprogs equivalent. --Mark. _______________________________________________ xfs mailing list xfs@oss.sgi.com http://oss.sgi.com/mailman/listinfo/xfs