From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from mx1.redhat.com ([209.132.183.28]:39136 "EHLO mx1.redhat.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1752230AbdDIQMW (ORCPT ); Sun, 9 Apr 2017 12:12:22 -0400 Received: from smtp.corp.redhat.com (int-mx03.intmail.prod.int.phx2.redhat.com [10.5.11.13]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by mx1.redhat.com (Postfix) with ESMTPS id D7B053D945 for ; Sun, 9 Apr 2017 16:12:21 +0000 (UTC) From: ChunYu Wang To: steved@redhat.com Cc: linux-nfs@vger.kernel.org, yoyang@redhat.com, jiyin@redhat.com, ChunYu Wang Subject: [PATCH] nfs-server-generator: fix a potential memory leak issue Date: Mon, 10 Apr 2017 00:12:08 +0800 Message-Id: <1491754328-28518-1-git-send-email-chunwang@redhat.com> Sender: linux-nfs-owner@vger.kernel.org List-ID: Signed-off-by: ChunYu Wang --- Fix a potential memory leak issue caused by unfree pathname 'path'. systemd/nfs-server-generator.c | 1 + 1 file changed, 1 insertion(+) diff --git a/systemd/nfs-server-generator.c b/systemd/nfs-server-generator.c index 4aa6509..441cec5 100644 --- a/systemd/nfs-server-generator.c +++ b/systemd/nfs-server-generator.c @@ -139,6 +139,7 @@ int main(int argc, char *argv[]) strcat(path, filebase); f = fopen(path, "w"); if (!f) + free(path); exit(1); fprintf(f, "# Automatically generated by nfs-server-generator\n\n[Unit]\n"); -- 2.7.4