Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1751952Ab0LYPCq (ORCPT ); Sat, 25 Dec 2010 10:02:46 -0500 Received: from unix.wroclaw.pl ([94.23.28.62]:37417 "EHLO unix.wroclaw.pl" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1751550Ab0LYPCp (ORCPT ); Sat, 25 Dec 2010 10:02:45 -0500 Date: Sat, 25 Dec 2010 16:02:40 +0100 From: Mariusz Kozlowski To: Jesper Juhl Cc: linux-btrfs@vger.kernel.org, Chris Mason , linux-kernel@vger.kernel.org Subject: Re: [PATCH] BTRFS: Don't leak memory in btrfs_get_acl() Message-ID: <20101225150240.GA7938@mako-laptop> References: MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: User-Agent: Mutt/1.5.20 (2009-06-14) X-SA-Report: SpamAssassin 3.2.5 (2008-06-10) on unix.wroclaw.pl Spam=No score=-1.4 bayes=0.5 autolearn=disabled Spam Tests: * -1.4 ALL_TRUSTED Passed through trusted hosts only via SMTP Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 583 Lines: 17 On Fri, Dec 24, 2010 at 11:45:21PM +0100, Jesper Juhl wrote: > Hi, > > Currrently we leak memory in btrfs_get_acl::btrfs_get_acl() if > posix_acl_from_xattr() fails. With this patch we do not. I sent similar patch some time ago but no reply from Chris so far. http://marc.info/?l=linux-kernel&m=129247984126414 -- Mariusz Kozlowski -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/