From owner-svn-src-stable@FreeBSD.ORG Mon Jun 11 18:10:13 2012 Return-Path: Delivered-To: svn-src-stable@freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:4f8:fff6::34]) by hub.freebsd.org (Postfix) with ESMTP id 5FD92106567F; Mon, 11 Jun 2012 18:10:13 +0000 (UTC) (envelope-from mjg@FreeBSD.org) Received: from svn.freebsd.org (svn.freebsd.org [IPv6:2001:4f8:fff6::2c]) by mx1.freebsd.org (Postfix) with ESMTP id 4BF928FC1D; Mon, 11 Jun 2012 18:10:13 +0000 (UTC) Received: from svn.freebsd.org (localhost [127.0.0.1]) by svn.freebsd.org (8.14.4/8.14.4) with ESMTP id q5BIADk6001807; Mon, 11 Jun 2012 18:10:13 GMT (envelope-from mjg@svn.freebsd.org) Received: (from mjg@localhost) by svn.freebsd.org (8.14.4/8.14.4/Submit) id q5BIAD6a001805; Mon, 11 Jun 2012 18:10:13 GMT (envelope-from mjg@svn.freebsd.org) Message-Id: <201206111810.q5BIAD6a001805@svn.freebsd.org> From: Mateusz Guzik Date: Mon, 11 Jun 2012 18:10:13 +0000 (UTC) To: src-committers@freebsd.org, svn-src-all@freebsd.org, svn-src-stable@freebsd.org, svn-src-stable-8@freebsd.org X-SVN-Group: stable-8 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Cc: Subject: svn commit: r236903 - stable/8/sys/kern X-BeenThere: svn-src-stable@freebsd.org X-Mailman-Version: 2.1.5 Precedence: list List-Id: SVN commit messages for all the -stable branches of the src tree List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Mon, 11 Jun 2012 18:10:13 -0000 Author: mjg Date: Mon Jun 11 18:10:12 2012 New Revision: 236903 URL: http://svn.freebsd.org/changeset/base/236903 Log: MFC r236738: Plug socket refcount leak on error in sys_sctp_peeloff. Modified: stable/8/sys/kern/uipc_syscalls.c Directory Properties: stable/8/sys/ (props changed) Modified: stable/8/sys/kern/uipc_syscalls.c ============================================================================== --- stable/8/sys/kern/uipc_syscalls.c Mon Jun 11 18:09:04 2012 (r236902) +++ stable/8/sys/kern/uipc_syscalls.c Mon Jun 11 18:10:12 2012 (r236903) @@ -2302,11 +2302,11 @@ sctp_peeloff(td, uap) goto done2; if (head->so_proto->pr_protocol != IPPROTO_SCTP) { error = EOPNOTSUPP; - goto done2; + goto done; } error = sctp_can_peel_off(head, (sctp_assoc_t)uap->name); if (error) - goto done2; + goto done; /* * At this point we know we do have a assoc to pull * we proceed to get the fd setup. This may block