[PATCH 02/11] ipaccess: fix leak of e1inp_line

This is merely a historical archive of years 2008-2021, before the migration to mailman3.

A maintained and still updated list archive can be found at https://lists.osmocom.org/hyperkitty/list/OpenBSC@lists.osmocom.org/.

Holger Hans Peter Freyther holger at freyther.de
Thu Aug 23 07:26:46 UTC 2012


On Wed, Aug 22, 2012 at 07:44:19PM +0200, Pablo Neira Ayuso wrote:
> On Wed, Aug 22, 2012 at 05:04:44PM +0200, pablo at gnumonks.org wrote:
> > From: Pablo Neira Ayuso <pablo at gnumonks.org>
> > 
> > Holger reported a leak in the ipaccess_drop path.
> 
> New version of this patch, this time based on Holger's plus handling
> the case in which no full OML / RSL has been established.

You obviously know this code a lot more than I do. The manual test for
it is. I will test it but probably not today.

1.) Use the drop bts ... command in OpenBSC... drop the RSL link, drop
the OML link.. check if there is a leak or crash.
2.) Force the bts to reconnect (either by using tcpkill or such) or by...
and check if there is a leak.




More information about the OpenBSC mailing list