]> git.ipfire.org Git - thirdparty/systemd.git/commitdiff
core: free the strings in the set in other places too
authorDavid Tardon <dtardon@redhat.com>
Tue, 1 Aug 2023 08:44:06 +0000 (10:44 +0200)
committerYu Watanabe <watanabe.yu+github@gmail.com>
Tue, 1 Aug 2023 11:53:19 +0000 (20:53 +0900)
Follow-up for #28551.

src/core/dbus-cgroup.c
src/core/dbus-execute.c
src/core/load-fragment.c
src/journal/journald-context.c

index 9ab806b22d7bbabc37222c4e903bf3c6f05fc771..5347525844e27e7e8bfa55bdb79c1eef82529076 100644 (file)
@@ -2159,7 +2159,7 @@ int bus_cgroup_set_property(
 
                         if (strv_isempty(l)) {
                                 c->restrict_network_interfaces_is_allow_list = false;
-                                c->restrict_network_interfaces = set_free(c->restrict_network_interfaces);
+                                c->restrict_network_interfaces = set_free_free(c->restrict_network_interfaces);
 
                                 unit_write_settingf(u, flags, name, "%s=", name);
                                 return 1;
index c3255398c6fdb4eb43ace1a5cb1ab88f3f04178a..52964390ae85fa4069694cd3eba7bb1db415db98 100644 (file)
@@ -1915,8 +1915,8 @@ int bus_exec_context_set_transient_property(
 
                 if (!UNIT_WRITE_FLAGS_NOOP(flags)) {
                         if (strv_isempty(allow_list) && strv_isempty(deny_list)) {
-                                c->log_filter_allowed_patterns = set_free(c->log_filter_allowed_patterns);
-                                c->log_filter_denied_patterns = set_free(c->log_filter_denied_patterns);
+                                c->log_filter_allowed_patterns = set_free_free(c->log_filter_allowed_patterns);
+                                c->log_filter_denied_patterns = set_free_free(c->log_filter_denied_patterns);
                                 unit_write_settingf(u, flags, name, "%s=", name);
                         } else {
                                 r = set_put_strdupv(&c->log_filter_allowed_patterns, allow_list);
@@ -2124,7 +2124,7 @@ int bus_exec_context_set_transient_property(
 
                         if (strv_isempty(l)) {
                                 c->restrict_filesystems_allow_list = false;
-                                c->restrict_filesystems = set_free(c->restrict_filesystems);
+                                c->restrict_filesystems = set_free_free(c->restrict_filesystems);
 
                                 unit_write_setting(u, flags, name, "RestrictFileSystems=");
                                 return 1;
@@ -2374,7 +2374,7 @@ int bus_exec_context_set_transient_property(
                         return r;
 
                 if (!UNIT_WRITE_FLAGS_NOOP(flags) && isempty) {
-                        c->import_credentials = set_free(c->import_credentials);
+                        c->import_credentials = set_free_free(c->import_credentials);
                         (void) unit_write_settingf(u, flags, name, "%s=", name);
                 }
 
index c69d47c22842f6b304c3001552ec59ac5c9718e9..219a84a234df7e280b40ff2bad1bceb5ea0fbe86 100644 (file)
@@ -3664,7 +3664,7 @@ int config_parse_restrict_filesystems(
 
         if (isempty(rvalue)) {
                 /* Empty assignment resets the list */
-                c->restrict_filesystems = set_free(c->restrict_filesystems);
+                c->restrict_filesystems = set_free_free(c->restrict_filesystems);
                 c->restrict_filesystems_allow_list = false;
                 return 0;
         }
@@ -4977,7 +4977,7 @@ int config_parse_import_credential(
 
         if (isempty(rvalue)) {
                 /* Empty assignment resets the list */
-                *import_credentials = set_free(*import_credentials);
+                *import_credentials = set_free_free(*import_credentials);
                 return 0;
         }
 
@@ -6053,7 +6053,7 @@ int config_parse_restrict_network_interfaces(
 
         if (isempty(rvalue)) {
                 /* Empty assignment resets the list */
-                c->restrict_network_interfaces = set_free(c->restrict_network_interfaces);
+                c->restrict_network_interfaces = set_free_free(c->restrict_network_interfaces);
                 return 0;
         }
 
@@ -6647,8 +6647,8 @@ int config_parse_log_filter_patterns(
 
         if (isempty(pattern)) {
                 /* Empty assignment resets the lists. */
-                c->log_filter_allowed_patterns = set_free(c->log_filter_allowed_patterns);
-                c->log_filter_denied_patterns = set_free(c->log_filter_denied_patterns);
+                c->log_filter_allowed_patterns = set_free_free(c->log_filter_allowed_patterns);
+                c->log_filter_denied_patterns = set_free_free(c->log_filter_denied_patterns);
                 return 0;
         }
 
index 9a09d544533b0058240fe31e173c34c99c032909..7274f5f3e93661843a0a47f9bc3c43ffc5c8f3f8 100644 (file)
@@ -182,8 +182,8 @@ static void client_context_reset(Server *s, ClientContext *c) {
         c->log_ratelimit_interval = s->ratelimit_interval;
         c->log_ratelimit_burst = s->ratelimit_burst;
 
-        c->log_filter_allowed_patterns = set_free(c->log_filter_allowed_patterns);
-        c->log_filter_denied_patterns = set_free(c->log_filter_denied_patterns);
+        c->log_filter_allowed_patterns = set_free_free(c->log_filter_allowed_patterns);
+        c->log_filter_denied_patterns = set_free_free(c->log_filter_denied_patterns);
 }
 
 static ClientContext* client_context_free(Server *s, ClientContext *c) {