Received: by 2002:a25:4158:0:0:0:0:0 with SMTP id o85csp5023448yba; Wed, 8 May 2019 06:47:45 -0700 (PDT) X-Google-Smtp-Source: APXvYqw0FsEn6f0Trp063iPUDKzOzP7UAVfPNmxirElxOeLGEGM14vQmwQY1xZj4vdUpCKcDvf66 X-Received: by 2002:a63:f712:: with SMTP id x18mr47834172pgh.293.1557323265157; Wed, 08 May 2019 06:47:45 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1557323265; cv=none; d=google.com; s=arc-20160816; b=y0q355SDPOvVDaEtfxnY2YRrOrn2UNMbX9edknRnkzWy7VO2eNX2jf4VXNUS0015E1 puFpvUuuEa9pWasQG7qIec+pjnTkGGE3fAROskjfrQd5220Ly65kOcv+ZQ7E3VLjXl3+ vyZs4d2dNxzoQndtVKauaosunLJoUXrzAtibaY484sX2pw5z1iuIv3o/lDNPMMgEH4HE aY4u0ynEXvZYkF2nnBJYOSGS67+m7LQ0MWRzIowAbLTVrQphgT94MhtxMvf19z7205pV 2jObX8GUVYLVcFU1rrz0C4hPLP4bzhMX2idUOLZ83+K0JKd5faotJIBVQeiVB0uZOIZX bRYg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:to:from; bh=z4+TrXhr6Dltj+finvTzt9AC7v7xrNL+y/j78UKrvLc=; b=lKJEvJJhmGvr8+/4xsgl85uhFw4Lu0uf0sILxzZIwMqgxcZmyNVbXAdPFAMOQWMPXT wTAEME8Wab3RrJ4c38J5+SVgZ1fEMl+yf4NXzGBB6gf2FhmiQPrrTw6VwrCS8kQVWR7W yXt6vUedrR3y1uLMvM3l1H4FCiRO4qvBFOl1t5veqxFZGi9xVy5jQhHfaYDgE4JeGUvZ BoqJGIyndNLDl3KG40Z+csiL+9WF0InTa5fIzL/ZAt2bduG7TaU4sWn6tmkUfoO7qM/f EKQMufPvzQ5E+lAWVo+ZBbvdybbLaytJL9rEpYiCesMCoFQocnhniQFHYjUTS13x+6FB waUQ== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-nfs-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-nfs-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=redhat.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id m3si22848682plt.394.2019.05.08.06.47.28; Wed, 08 May 2019 06:47:45 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-nfs-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-nfs-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-nfs-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=redhat.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726762AbfEHNfm (ORCPT + 99 others); Wed, 8 May 2019 09:35:42 -0400 Received: from mx1.redhat.com ([209.132.183.28]:50484 "EHLO mx1.redhat.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726254AbfEHNfm (ORCPT ); Wed, 8 May 2019 09:35:42 -0400 Received: from smtp.corp.redhat.com (int-mx06.intmail.prod.int.phx2.redhat.com [10.5.11.16]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by mx1.redhat.com (Postfix) with ESMTPS id 7F8798FADD for ; Wed, 8 May 2019 13:35:42 +0000 (UTC) Received: from madhat.boston.devel.redhat.com (ovpn-116-59.phx2.redhat.com [10.3.116.59]) by smtp.corp.redhat.com (Postfix) with ESMTP id 3B72D5C640 for ; Wed, 8 May 2019 13:35:41 +0000 (UTC) From: Steve Dickson To: Linux NFS Mailing list Subject: [PATCH 05/19] Removed a resource leak from nfs/svc_socket.c Date: Wed, 8 May 2019 09:35:22 -0400 Message-Id: <20190508133536.6077-6-steved@redhat.com> In-Reply-To: <20190508133536.6077-1-steved@redhat.com> References: <20190508133536.6077-1-steved@redhat.com> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-Scanned-By: MIMEDefang 2.79 on 10.5.11.16 X-Greylist: Sender IP whitelisted, not delayed by milter-greylist-4.5.16 (mx1.redhat.com [10.5.110.27]); Wed, 08 May 2019 13:35:42 +0000 (UTC) Sender: linux-nfs-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-nfs@vger.kernel.org nfs/svc_socket.c:137: leaked_handle: Handle variable "sock" going out of scope leaks the handle. Signed-off-by: Steve Dickson --- support/nfs/svc_socket.c | 1 + 1 file changed, 1 insertion(+) diff --git a/support/nfs/svc_socket.c b/support/nfs/svc_socket.c index d56507a..5afc6aa 100644 --- a/support/nfs/svc_socket.c +++ b/support/nfs/svc_socket.c @@ -134,6 +134,7 @@ svc_socket (u_long number, int type, int protocol, int reuse) if (ret < 0) { xlog(L_ERROR, "svc_socket: socket reuse problem: %m"); + (void) __close(sock); return ret; } } -- 2.20.1