summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorBrian Cain <brian.cain@gmail.com>2015-05-06 15:34:38 -0400
committerPaul Moore <pmoore@redhat.com>2015-05-06 15:34:38 -0400
commit713cc03591eb21d36e56f14a1db85ad084b92d03 (patch)
tree5896e837808a18e42e1a4d0c7c25776b097c816f
parent7b8e5023add1d9b22e7367c230c1b1935ea232bc (diff)
downloadlibseccomp-713cc03591eb21d36e56f14a1db85ad084b92d03.tar.gz
tests: fixed leak in basic-resolver
seccomp_syscall_resolve_num_arch() returns a string from strdup() that needs to be reaped. I found this bug using clang and address-sanitizer. Signed-off-by: Brian Cain <brian.cain@gmail.com> Signed-off-by: Paul Moore <pmoore@redhat.com> (imported from commit 5b813a7331dcadd5d8b63532df8d07cdf47a041e)
-rw-r--r--tests/15-basic-resolver.c31
1 files changed, 21 insertions, 10 deletions
diff --git a/tests/15-basic-resolver.c b/tests/15-basic-resolver.c
index a8988fd..0bd0cf8 100644
--- a/tests/15-basic-resolver.c
+++ b/tests/15-basic-resolver.c
@@ -21,40 +21,51 @@
#include <errno.h>
#include <string.h>
+#include <stdlib.h>
#include <seccomp.h>
int main(int argc, char *argv[])
{
- char *name;
+ char *name = NULL;
if (seccomp_syscall_resolve_name("open") != __NR_open)
- return 1;
+ goto fail;
if (seccomp_syscall_resolve_name("socket") != __NR_socket)
- return 1;
+ goto fail;
if (seccomp_syscall_resolve_name("INVALID") != __NR_SCMP_ERROR)
- return 1;
+ goto fail;
if (seccomp_syscall_resolve_name_arch(SCMP_ARCH_NATIVE,
"open") != __NR_open)
- return 1;
+ goto fail;
if (seccomp_syscall_resolve_name_arch(SCMP_ARCH_NATIVE,
"socket") != __NR_socket)
- return 1;
+ goto fail;
if (seccomp_syscall_resolve_name_arch(SCMP_ARCH_NATIVE,
"INVALID") != __NR_SCMP_ERROR)
- return 1;
+ goto fail;
name = seccomp_syscall_resolve_num_arch(SCMP_ARCH_NATIVE, __NR_open);
if (name == NULL || strcmp(name, "open") != 0)
- return 1;
+ goto fail;
+ free(name);
+
name = seccomp_syscall_resolve_num_arch(SCMP_ARCH_NATIVE, __NR_socket);
if (name == NULL || strcmp(name, "socket") != 0)
- return 1;
+ goto fail;
+ free(name);
+
name = seccomp_syscall_resolve_num_arch(SCMP_ARCH_NATIVE,
__NR_SCMP_ERROR);
if (name != NULL)
- return 1;
+ goto fail;
+ free(name);
return 0;
+
+fail:
+ if (name != NULL)
+ free(name);
+ return 1;
}