Blame SOURCES/rsyslog-8.2102.0-rhbz1938863-covscan.patch

f4f2f7
diff -up rsyslog-8.2102.0/contrib/imdocker/imdocker.c.covscan rsyslog-8.2102.0/contrib/imdocker/imdocker.c
f4f2f7
--- rsyslog-8.2102.0/contrib/imdocker/imdocker.c.covscan	2021-01-18 11:21:14.000000000 +0100
f4f2f7
+++ rsyslog-8.2102.0/contrib/imdocker/imdocker.c	2021-07-22 14:10:31.877231143 +0200
f4f2f7
@@ -1527,6 +1527,7 @@ process_json(sbool isInit, const char* j
f4f2f7
 									pInstances->last_container_id,
f4f2f7
 									(unsigned)pInstances->last_container_created);
f4f2f7
 						}
f4f2f7
+						// coverity[leaked_storage : FALSE]
f4f2f7
 						CHKiRet(dockerContLogsInstSetUrlById(isInit, pInst,
f4f2f7
 									pInstances->curlm, containerId));
f4f2f7
 						CHKiRet(dockerContLogReqsAdd(pInstances, pInst));
f4f2f7
diff -up rsyslog-8.2102.0/contrib/omhiredis/omhiredis.c.covscan rsyslog-8.2102.0/contrib/omhiredis/omhiredis.c
f4f2f7
--- rsyslog-8.2102.0/contrib/omhiredis/omhiredis.c.covscan	2020-10-03 19:06:47.000000000 +0200
f4f2f7
+++ rsyslog-8.2102.0/contrib/omhiredis/omhiredis.c	2021-07-22 14:10:31.877231143 +0200
f4f2f7
@@ -324,7 +324,6 @@ BEGINnewActInst
f4f2f7
 	struct cnfparamvals *pvals;
f4f2f7
 	int i;
f4f2f7
 	int iNumTpls;
f4f2f7
-	uchar *keydup = NULL;
f4f2f7
 CODESTARTnewActInst
f4f2f7
 	if((pvals = nvlstGetParams(lst, &actpblk, NULL)) == NULL)
f4f2f7
 		ABORT_FINALIZE(RS_RET_MISSING_CNFPARAMS);
f4f2f7
@@ -417,14 +416,11 @@ CODESTARTnewActInst
f4f2f7
 	CHKiRet(OMSRsetEntry(*ppOMSR, 0, (uchar*)pData->tplName, OMSR_NO_RQD_TPL_OPTS));
f4f2f7
 
f4f2f7
 	if (pData->dynaKey) {
f4f2f7
-		CHKmalloc(keydup = ustrdup(pData->key));
f4f2f7
 		CHKiRet(OMSRsetEntry(*ppOMSR, 1, ustrdup(pData->key), OMSR_NO_RQD_TPL_OPTS));
f4f2f7
-		keydup = NULL; /* handed over */
f4f2f7
 	}
f4f2f7
 
f4f2f7
 CODE_STD_FINALIZERnewActInst
f4f2f7
 	cnfparamvalsDestruct(pvals, &actpblk);
f4f2f7
-	free(keydup);
f4f2f7
 ENDnewActInst
f4f2f7
 
f4f2f7
 
f4f2f7
diff -up rsyslog-8.2102.0/contrib/omrabbitmq/omrabbitmq.c.covscan rsyslog-8.2102.0/contrib/omrabbitmq/omrabbitmq.c
f4f2f7
--- rsyslog-8.2102.0/contrib/omrabbitmq/omrabbitmq.c.covscan	2021-01-18 11:21:14.000000000 +0100
f4f2f7
+++ rsyslog-8.2102.0/contrib/omrabbitmq/omrabbitmq.c	2021-07-22 14:10:31.877231143 +0200
f4f2f7
@@ -778,6 +778,7 @@ static rsRetVal publishRabbitMQ(wrkrInst
f4f2f7
 		ABORT_FINALIZE(RS_RET_RABBITMQ_CONN_ERR);
f4f2f7
 	}
f4f2f7
 
f4f2f7
+	// coverity[identical_branches : FALSE]
f4f2f7
 	if (manage_error(amqp_basic_publish(self->a_conn, 1, exchange, routing_key,
f4f2f7
 			0, 0, p_amqp_props, body_bytes), "amqp_basic_publish")) {
f4f2f7
 		/* error already notified */
f4f2f7
diff -up rsyslog-8.2102.0/grammar/rainerscript.c.covscan rsyslog-8.2102.0/grammar/rainerscript.c
f4f2f7
--- rsyslog-8.2102.0/grammar/rainerscript.c.covscan	2021-02-15 12:06:16.000000000 +0100
f4f2f7
+++ rsyslog-8.2102.0/grammar/rainerscript.c	2021-07-22 14:10:31.878231140 +0200
f4f2f7
@@ -2814,7 +2814,7 @@ evalVar(struct cnfvar *__restrict__ cons
f4f2f7
 		if(bMustBeFreed)
f4f2f7
 			free(pszProp);
f4f2f7
 	}
f4f2f7
-
f4f2f7
+	// coverity[leaked_storage : FALSE]
f4f2f7
 }
f4f2f7
 
f4f2f7
 /* perform a string comparision operation against a while array. Semantic is
f4f2f7
diff -up rsyslog-8.2102.0/plugins/imfile/imfile.c.covscan rsyslog-8.2102.0/plugins/imfile/imfile.c
f4f2f7
--- rsyslog-8.2102.0/plugins/imfile/imfile.c.covscan	2021-01-18 11:21:14.000000000 +0100
f4f2f7
+++ rsyslog-8.2102.0/plugins/imfile/imfile.c	2021-07-22 14:10:31.878231140 +0200
f4f2f7
@@ -1278,6 +1278,7 @@ static void ATTR_NONNULL(1)
f4f2f7
 getFileID(act_obj_t *const act)
f4f2f7
 {
f4f2f7
 	char tmp_id[FILE_ID_HASH_SIZE];
f4f2f7
+	// coverity[buffer_size_warning : FALSE]
f4f2f7
 	strncpy(tmp_id, (const char*)act->file_id, FILE_ID_HASH_SIZE);
f4f2f7
 	act->file_id[0] = '\0';
f4f2f7
 	assert(act->fd >= 0); /* fd must have been opened at act_obj_t creation! */
f4f2f7
@@ -1290,6 +1291,7 @@ getFileID(act_obj_t *const act)
f4f2f7
 		DBGPRINTF("getFileID partial or error read, ret %d\n", r);
f4f2f7
 	}
f4f2f7
 	if (strncmp(tmp_id, act->file_id, FILE_ID_HASH_SIZE)) {/* save the old id for cleaning purposes */
f4f2f7
+		// coverity[buffer_size_warning : FALSE]
f4f2f7
 		strncpy(act->file_id_prev, tmp_id, FILE_ID_HASH_SIZE);
f4f2f7
 	}
f4f2f7
 	DBGPRINTF("getFileID for '%s', file_id_hash '%s'\n", act->name, act->file_id);
f4f2f7
@@ -1544,6 +1546,7 @@ openFileWithoutStateFile(act_obj_t *cons
f4f2f7
 		const int fd = open(act->name, O_RDONLY | O_CLOEXEC);
f4f2f7
 		if(fd >= 0) {
f4f2f7
 			act->pStrm->iCurrOffs = lseek64(fd, 0, SEEK_END);
f4f2f7
+			close(fd);
f4f2f7
 			if(act->pStrm->iCurrOffs < 0) {
f4f2f7
 				act->pStrm->iCurrOffs = 0;
f4f2f7
 				LogError(errno, RS_RET_ERR, "imfile: could not query current "
f4f2f7
diff -up rsyslog-8.2102.0/plugins/imptcp/imptcp.c.covscan rsyslog-8.2102.0/plugins/imptcp/imptcp.c
f4f2f7
--- rsyslog-8.2102.0/plugins/imptcp/imptcp.c.covscan	2021-01-18 11:21:14.000000000 +0100
f4f2f7
+++ rsyslog-8.2102.0/plugins/imptcp/imptcp.c	2021-07-22 14:10:31.878231140 +0200
f4f2f7
@@ -1920,6 +1920,7 @@ lstnActivity(ptcplstn_t *const pLstn)
f4f2f7
 	}
f4f2f7
 
f4f2f7
 finalize_it:
f4f2f7
+	// coverity[leaked_handle : FALSE]
f4f2f7
 	RETiRet;
f4f2f7
 }
f4f2f7
 
f4f2f7
diff -up rsyslog-8.2102.0/plugins/mmjsonparse/mmjsonparse.c.covscan rsyslog-8.2102.0/plugins/mmjsonparse/mmjsonparse.c
f4f2f7
--- rsyslog-8.2102.0/plugins/mmjsonparse/mmjsonparse.c.covscan	2020-10-03 19:06:47.000000000 +0200
f4f2f7
+++ rsyslog-8.2102.0/plugins/mmjsonparse/mmjsonparse.c	2021-07-22 14:10:31.879231138 +0200
f4f2f7
@@ -394,7 +394,7 @@ CODEmodInit_QueryRegCFSLineHdlr
f4f2f7
 		ABORT_FINALIZE(RS_RET_NO_MSG_PASSING);
f4f2f7
 	}
f4f2f7
 
f4f2f7
-	
f4f2f7
+	// coverity[identical_branches : FALSE]
f4f2f7
 	CHKiRet(omsdRegCFSLineHdlr((uchar *)"resetconfigvariables", 1, eCmdHdlrCustomHandler,
f4f2f7
 				    resetConfigVariables, NULL, STD_LOADABLE_MODULE_ID));
f4f2f7
 ENDmodInit
f4f2f7
diff -up rsyslog-8.2102.0/plugins/omclickhouse/omclickhouse.c.covscan rsyslog-8.2102.0/plugins/omclickhouse/omclickhouse.c
f4f2f7
--- rsyslog-8.2102.0/plugins/omclickhouse/omclickhouse.c.covscan	2020-10-03 19:06:47.000000000 +0200
f4f2f7
+++ rsyslog-8.2102.0/plugins/omclickhouse/omclickhouse.c	2021-07-22 14:10:31.879231138 +0200
f4f2f7
@@ -368,6 +368,7 @@ writeDataError(wrkrInstanceData_t *const
f4f2f7
 	}
f4f2f7
 
f4f2f7
 finalize_it:
f4f2f7
+	// coverity[leaked_storage : FALSE]
f4f2f7
 	RETiRet;
f4f2f7
 }
f4f2f7
 
f4f2f7
diff -up rsyslog-8.2102.0/runtime/nsd_gtls.c.covscan rsyslog-8.2102.0/runtime/nsd_gtls.c
f4f2f7
--- rsyslog-8.2102.0/runtime/nsd_gtls.c.covscan	2021-01-18 11:21:14.000000000 +0100
f4f2f7
+++ rsyslog-8.2102.0/runtime/nsd_gtls.c	2021-07-22 14:17:06.183174167 +0200
f4f2f7
@@ -227,7 +227,7 @@ gtlsLoadOurCertKey(nsd_gtls_t *pThis)
f4f2f7
 	pThis->bOurKeyIsInit = 1;
f4f2f7
 	CHKgnutls(gnutls_x509_privkey_import(pThis->ourKey, &data, GNUTLS_X509_FMT_PEM));
f4f2f7
 	free(data.data);
f4f2f7
-
f4f2f7
+	data.data = NULL;
f4f2f7
 
f4f2f7
 finalize_it:
f4f2f7
 	if(iRet == RS_RET_CERTLESS) {
f4f2f7
diff -up rsyslog-8.2102.0/runtime/nsd_ptcp.c.covscan rsyslog-8.2102.0/runtime/nsd_ptcp.c
f4f2f7
--- rsyslog-8.2102.0/runtime/nsd_ptcp.c.covscan	2021-02-15 08:20:04.000000000 +0100
f4f2f7
+++ rsyslog-8.2102.0/runtime/nsd_ptcp.c	2021-07-22 14:10:31.879231138 +0200
f4f2f7
@@ -191,6 +191,7 @@ SetTlsVerifyDepth(nsd_t __attribute__((u
f4f2f7
 	nsd_ptcp_t *pThis = (nsd_ptcp_t*) pNsd;
f4f2f7
 	DEFiRet;
f4f2f7
 	ISOBJ_TYPE_assert((pThis), nsd_ptcp);
f4f2f7
+	// coverity[identical_branches : FALSE]
f4f2f7
 	if (verifyDepth == 0) {
f4f2f7
 		FINALIZE;
f4f2f7
 	}
f4f2f7
diff -up rsyslog-8.2102.0/tools/rsyslogd.c.covscan rsyslog-8.2102.0/tools/rsyslogd.c
f4f2f7
--- rsyslog-8.2102.0/tools/rsyslogd.c.covscan	2021-01-18 11:21:14.000000000 +0100
f4f2f7
+++ rsyslog-8.2102.0/tools/rsyslogd.c	2021-07-22 14:10:31.879231138 +0200
f4f2f7
@@ -293,6 +293,7 @@ writePidFile(void)
f4f2f7
 		free((void*)tmpPidFile);
f4f2f7
 	}
f4f2f7
 finalize_it:
f4f2f7
+	// coverity[leaked_storage : FALSE]
f4f2f7
 	RETiRet;
f4f2f7
 }
f4f2f7
 
f4f2f7
@@ -1026,6 +1027,7 @@ splitOversizeMessage(smsg_t *const pMsg)
f4f2f7
 	/* if necessary, write partial last segment */
f4f2f7
 	if(len_last_segment != 0) {
f4f2f7
 		CHKmalloc(pMsg_seg = MsgDup(pMsg));
f4f2f7
+		// coverity[copy_paste_error : FALSE]
f4f2f7
 		MsgSetRawMsg(pMsg_seg, rawmsg + (nsegments * maxlen), len_last_segment);
f4f2f7
 		submitMsg2(pMsg_seg);
f4f2f7
 	}