Received: by 2002:a25:8b12:0:0:0:0:0 with SMTP id i18csp4532281ybl; Mon, 26 Aug 2019 11:49:47 -0700 (PDT) X-Google-Smtp-Source: APXvYqyrjboDpM85ZoafQXXFiV8G6/wHVVorgTWt671xEWQFeJM5jdFtV2ycVFD1flQ7TFje+X9S X-Received: by 2002:a63:188:: with SMTP id 130mr17555102pgb.231.1566845387019; Mon, 26 Aug 2019 11:49:47 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1566845387; cv=none; d=google.com; s=arc-20160816; b=w46Pw541Q0JlUXH8xsRcpDD4QJpdNoIR6UCWEIAHJemEHwbTCErfV49CTxe/5PaevN ycdl0lplBNdQnSO+ax9XEN/p6KN/lFnYY8HKomLQiEvvIy9IGa2tjKyS0+6ld+582ros GbJEG9llT/RI/Tcsz9W0FxzY2OhIvdMTkK7NYMO5++I/2sRDBo6rEf8w1HSLhvy0StVK Z2gFrzuV+qJSVBSxeOj2IlB+K62r+h/X3zLWS8rLR5/eMPFEJk+wU7PnVhqPUvhUdzV4 asJp2W61qUJ3KXTTEg89DIuXTd2bGCbO9c0IBrBefZ5i3cktDf4clzFuGkN500jboVIa wFqw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding :content-language:in-reply-to:mime-version:user-agent:date :message-id:from:references:to:subject; bh=J0QNJB2AUAHG7yvZQd12S/i1o7cc9ISfSfgIE7S3Qmo=; b=C1oWHs9QhbF1AAQ0S1k/AtXV4oxZOEA0wRNRKfYSH3oSZtIsig1hAw7U4QZX1IYYiK 7S6pBMkbplT/PKzHcArbw2K+o+FbR2Uofy/bjLXLUfAWEtXINBpOmPoj5cpCKYG3Y8iR /ncFlaY+p7vWhPHBUcL1R3SdEdSvQhKEDfeXxJC8RZNu01g+h28+P6xtg1tEpUviLUlY FbzQfNWcC8g1lcm2QqraK1SQNrVYUfqGrisM6hGybGFWFLzEJ4kB30fHq2Z9og7G9xfC sKodPUAs/VmWsHKi5WB89MotqED5Xm0gO4s8gK9Omp4UiPyQMGNlzmc6SIpPgNkeK2FI XbcQ== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-nfs-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-nfs-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=redhat.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id gn17si8328794plb.170.2019.08.26.11.49.26; Mon, 26 Aug 2019 11:49:47 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-nfs-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-nfs-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-nfs-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=redhat.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2387526AbfHZRxC (ORCPT + 99 others); Mon, 26 Aug 2019 13:53:02 -0400 Received: from mx1.redhat.com ([209.132.183.28]:36065 "EHLO mx1.redhat.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1728280AbfHZRxC (ORCPT ); Mon, 26 Aug 2019 13:53:02 -0400 Received: from smtp.corp.redhat.com (int-mx06.intmail.prod.int.phx2.redhat.com [10.5.11.16]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by mx1.redhat.com (Postfix) with ESMTPS id CE8B68342DA for ; Mon, 26 Aug 2019 17:53:01 +0000 (UTC) Received: from madhat.boston.devel.redhat.com (ovpn-116-35.phx2.redhat.com [10.3.116.35]) by smtp.corp.redhat.com (Postfix) with ESMTP id 9A5B55C1D8 for ; Mon, 26 Aug 2019 17:53:01 +0000 (UTC) Subject: Re: [PATCH 1/2] nfs-utils: Removed a number of Coverity Scan RESOURCE_LEAK errors To: Linux NFS Mailing list References: <20190826143421.13712-1-steved@redhat.com> From: Steve Dickson Message-ID: <08a5ee99-7c7b-9a2d-3c23-dd07ad4a60ca@RedHat.com> Date: Mon, 26 Aug 2019 13:53:01 -0400 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:60.0) Gecko/20100101 Thunderbird/60.8.0 MIME-Version: 1.0 In-Reply-To: <20190826143421.13712-1-steved@redhat.com> Content-Type: text/plain; charset=utf-8 Content-Language: en-US Content-Transfer-Encoding: 7bit X-Scanned-By: MIMEDefang 2.79 on 10.5.11.16 X-Greylist: Sender IP whitelisted, not delayed by milter-greylist-4.6.2 (mx1.redhat.com [10.5.110.69]); Mon, 26 Aug 2019 17:53:01 +0000 (UTC) Sender: linux-nfs-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-nfs@vger.kernel.org On 8/26/19 10:34 AM, Steve Dickson wrote: > Signed-off-by: Steve Dickson > --- > support/nfsidmap/libnfsidmap.c | 3 +++ > utils/gssd/krb5_util.c | 4 ++++ > 2 files changed, 7 insertions(+) Committed... steved. > > diff --git a/support/nfsidmap/libnfsidmap.c b/support/nfsidmap/libnfsidmap.c > index 7b8a871..9299e65 100644 > --- a/support/nfsidmap/libnfsidmap.c > +++ b/support/nfsidmap/libnfsidmap.c > @@ -486,6 +486,9 @@ out: > if (gss_methods) > conf_free_list(gss_methods); > > + if (nfs4_methods) > + conf_free_list(nfs4_methods); > + > return ret ? -ENOENT: 0; > } > > diff --git a/utils/gssd/krb5_util.c b/utils/gssd/krb5_util.c > index 454a6eb..f68be85 100644 > --- a/utils/gssd/krb5_util.c > +++ b/utils/gssd/krb5_util.c > @@ -912,6 +912,8 @@ find_keytab_entry(krb5_context context, krb5_keytab kt, > k5err = gssd_k5_err_msg(context, code); > printerr(3, "%s while getting keytab entry for '%s'\n", > k5err, spn); > + free(k5err); > + k5err = NULL; > /* > * We tried the active directory machine account > * with the hostname part as-is and failed... > @@ -1231,6 +1233,8 @@ gssd_destroy_krb5_machine_creds(void) > k5err = gssd_k5_err_msg(context, code); > printerr(0, "WARNING: %s while destroying credential " > "cache '%s'\n", k5err, ple->ccname); > + free(k5err); > + k5err = NULL; > } > } > krb5_free_context(context); >