Received: by 2002:a25:8b12:0:0:0:0:0 with SMTP id i18csp4307440ybl; Mon, 26 Aug 2019 08:31:06 -0700 (PDT) X-Google-Smtp-Source: APXvYqzCuwoM8pM5xFBXBv18oQOH2oHB6heubCoAAjkVvuUYTFtRxJYgg4yOuwJI5FBg0OMKm1Ve X-Received: by 2002:a17:90a:ae15:: with SMTP id t21mr20357727pjq.50.1566833466820; Mon, 26 Aug 2019 08:31:06 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1566833466; cv=none; d=google.com; s=arc-20160816; b=h4jWF8y76GsarICzrENTpjUkJmjId51lIV8CRmYcQX7sMGC+3xgm7K/qOf7B9VZtlw DBTPXUyrIMoNBgNKx9H6AOYlB+018qrCB4GGQlHJX3JsW9eHJccF6BQ4vbU4xlhikwB2 V3enN+7tQwNmZ/LyAnCMaqE4l9qHe8nfVIOealP5MRRGt67erUk6/yME5luUmN85E7t7 Cz1Cc364k6XbkytCwMiXum+QQwwWBhCGwCW2AalSYWg0GPeO84frwjCvSwL59aYFnqzR Z1FftyKPBuSq2kDGLq1qiwxSU9Hxc5/WM+9KoUeZAuVojYYOLAdz8WwEK9denNf9KZuU 8rcg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :message-id:date:subject:to:from; bh=87LnG7odysTTq+xoi0YBIbRYtrDwfUwFuevUTc/E9ew=; b=aH4GBILzxG95g4GFiy4QydpfM+Oxpw+Fe4xMuThz6Dg7IW5YmJxI3UZA5FEzPwArz2 o4ZrODdvgdyqVK6ao9IjCqs2geFJxS3TD1puq0WDloadU6dQeY2s08ssCRSAU9zCpTLp xWb8KUDyLrOmHBqiUbhPdnwrajRfqyFXLv6j/ffGx0wv21Qdks49MYO6lQ7Em+3/aCvP G6yw5vy2II/9eU7xbM1VGi/mKZIT5zGvxtH4rhk47N0CkcLs1tQSUbJLVyc+BjV74qsP oNL/tf9WJRvtX5gis5xKDgc7JJsxoJQ4WwSf+/P9/3zeKsTUci4kuN7xbdqzPmFYd6Ka r62w== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-nfs-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-nfs-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=redhat.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id y63si9204335pgd.403.2019.08.26.08.30.42; Mon, 26 Aug 2019 08:31:06 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-nfs-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-nfs-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-nfs-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=redhat.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1731604AbfHZOeY (ORCPT + 99 others); Mon, 26 Aug 2019 10:34:24 -0400 Received: from mx1.redhat.com ([209.132.183.28]:31931 "EHLO mx1.redhat.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726484AbfHZOeY (ORCPT ); Mon, 26 Aug 2019 10:34:24 -0400 Received: from smtp.corp.redhat.com (int-mx07.intmail.prod.int.phx2.redhat.com [10.5.11.22]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by mx1.redhat.com (Postfix) with ESMTPS id 44CF3A2E0E8 for ; Mon, 26 Aug 2019 14:34:24 +0000 (UTC) Received: from madhat.boston.devel.redhat.com (ovpn-116-35.phx2.redhat.com [10.3.116.35]) by smtp.corp.redhat.com (Postfix) with ESMTP id 01B761001B11 for ; Mon, 26 Aug 2019 14:34:23 +0000 (UTC) From: Steve Dickson To: Linux NFS Mailing list Subject: [PATCH 1/2] nfs-utils: Removed a number of Coverity Scan RESOURCE_LEAK errors Date: Mon, 26 Aug 2019 10:34:20 -0400 Message-Id: <20190826143421.13712-1-steved@redhat.com> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-Scanned-By: MIMEDefang 2.84 on 10.5.11.22 X-Greylist: Sender IP whitelisted, not delayed by milter-greylist-4.6.2 (mx1.redhat.com [10.5.110.68]); Mon, 26 Aug 2019 14:34:24 +0000 (UTC) Sender: linux-nfs-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-nfs@vger.kernel.org Signed-off-by: Steve Dickson --- support/nfsidmap/libnfsidmap.c | 3 +++ utils/gssd/krb5_util.c | 4 ++++ 2 files changed, 7 insertions(+) diff --git a/support/nfsidmap/libnfsidmap.c b/support/nfsidmap/libnfsidmap.c index 7b8a871..9299e65 100644 --- a/support/nfsidmap/libnfsidmap.c +++ b/support/nfsidmap/libnfsidmap.c @@ -486,6 +486,9 @@ out: if (gss_methods) conf_free_list(gss_methods); + if (nfs4_methods) + conf_free_list(nfs4_methods); + return ret ? -ENOENT: 0; } diff --git a/utils/gssd/krb5_util.c b/utils/gssd/krb5_util.c index 454a6eb..f68be85 100644 --- a/utils/gssd/krb5_util.c +++ b/utils/gssd/krb5_util.c @@ -912,6 +912,8 @@ find_keytab_entry(krb5_context context, krb5_keytab kt, k5err = gssd_k5_err_msg(context, code); printerr(3, "%s while getting keytab entry for '%s'\n", k5err, spn); + free(k5err); + k5err = NULL; /* * We tried the active directory machine account * with the hostname part as-is and failed... @@ -1231,6 +1233,8 @@ gssd_destroy_krb5_machine_creds(void) k5err = gssd_k5_err_msg(context, code); printerr(0, "WARNING: %s while destroying credential " "cache '%s'\n", k5err, ple->ccname); + free(k5err); + k5err = NULL; } } krb5_free_context(context); -- 2.21.0