On 25.03.19 13:45, [ext] Andreas Reichel wrote:
On Mon, Mar 25, 2019 at 03:35:39PM +0300, Hosgor, Tolga (CT RDA DS EU TR MTS)
wrote:
From: Can ÜNSAL <[email protected]>
When efibootguard is invoked to read environment variables with
ebg_env_open_current /proc/mounts file descriptor is opened in get_mountpoint
without closing it.
Signed-off-by: Can ÜNSAL <[email protected]>
---
env/env_disk_utils.c | 1 +
1 file changed, 1 insertion(+)
diff --git a/env/env_disk_utils.c b/env/env_disk_utils.c
index 9fad94b..78ad130 100644
--- a/env/env_disk_utils.c
+++ b/env/env_disk_utils.c
@@ -39,6 +39,7 @@ char *get_mountpoint(char *devpath)
if (!mntpoint) {
break;
}
+ endmntent(mtab);
return mntpoint;
}
}
Ow.. thanks.
Acked-by: Andreas Reichel <[email protected]>
Thanks, applied to next.
I will follow up with a refactoring of this function to avoid this duplication
(and the risk to leak).
Jan
--
Siemens AG, Corporate Technology, CT RDA IOT SES-DE
Corporate Competence Center Embedded Linux
--
You received this message because you are subscribed to the Google Groups "EFI Boot
Guard" group.
To unsubscribe from this group and stop receiving emails from it, send an email
to [email protected].
To post to this group, send email to [email protected].
To view this discussion on the web visit
https://groups.google.com/d/msgid/efibootguard-dev/b0176eec-30e7-1676-73a5-2c3fcda04bf6%40siemens.com.
For more options, visit https://groups.google.com/d/optout.