[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
[tor-commits] [tor/master] Fix numerous leaks and memory errors in tests. Found by valgrind
commit b7941cbfbb5a121425d9d0c5e1f903efd563a173
Author: Nick Mathewson <nickm@xxxxxxxxxxxxxx>
Date: Wed Oct 21 08:49:29 2015 -0400
Fix numerous leaks and memory errors in tests. Found by valgrind
---
src/test/rend_test_helpers.c | 6 ++-
src/test/test_dir_handle_get.c | 84 +++++++++++++++++++++++-----------------
2 files changed, 54 insertions(+), 36 deletions(-)
diff --git a/src/test/rend_test_helpers.c b/src/test/rend_test_helpers.c
index f076d76..f16d67f 100644
--- a/src/test/rend_test_helpers.c
+++ b/src/test/rend_test_helpers.c
@@ -20,8 +20,12 @@ generate_desc(int time_diff, rend_encoded_v2_service_descriptor_t **desc,
rend_encode_v2_descriptors(descs, generated, now, 0, REND_NO_AUTH, NULL,
NULL);
- *desc = ((rend_encoded_v2_service_descriptor_t *)smartlist_get(descs, 0));
+ tor_assert(smartlist_len(descs) > 1);
+ *desc = smartlist_get(descs, 0);
+ smartlist_set(descs, 0, NULL);
+ SMARTLIST_FOREACH(descs, rend_encoded_v2_service_descriptor_t *, d,
+ rend_encoded_v2_service_descriptor_free(d));
smartlist_free(descs);
rend_service_descriptor_free(generated);
}
diff --git a/src/test/test_dir_handle_get.c b/src/test/test_dir_handle_get.c
index b6056a9..486d5d3 100644
--- a/src/test/test_dir_handle_get.c
+++ b/src/test/test_dir_handle_get.c
@@ -6,6 +6,8 @@
#define RENDCOMMON_PRIVATE
#define GEOIP_PRIVATE
#define CONNECTION_PRIVATE
+#define CONFIG_PRIVATE
+#define RENDCACHE_PRIVATE
#include "or.h"
#include "config.h"
@@ -264,6 +266,7 @@ test_dir_handle_get_bytes_txt(void *data)
connection_free_(TO_CONN(conn));
tor_free(header);
tor_free(body);
+ tor_free(exp_body);
}
#define RENDEZVOUS2_GET(descid) GET("/tor/rendezvous2/" descid)
@@ -395,7 +398,7 @@ static const routerinfo_t *
NS(router_get_my_routerinfo)(void)
{
if (!mock_routerinfo) {
- mock_routerinfo = tor_malloc(sizeof(routerinfo_t));
+ mock_routerinfo = tor_malloc_zero(sizeof(routerinfo_t));
}
return mock_routerinfo;
@@ -471,10 +474,14 @@ test_dir_handle_get_rendezvous2_on_encrypted_conn_success(void *data)
UNMOCK(connection_write_to_buf_impl_);
NS_UNMOCK(router_get_my_routerinfo);
NS_UNMOCK(hid_serv_responsible_for_desc_id);
+ tor_free(mock_routerinfo->cache_info.signed_descriptor_body);
+ tor_free(mock_routerinfo);
connection_free_(TO_CONN(conn));
tor_free(header);
tor_free(body);
+ rend_encoded_v2_service_descriptor_free(desc_holder);
+ tor_free(service_id);
rend_cache_free_all();
}
@@ -592,8 +599,7 @@ test_dir_handle_get_micro_d(void *data)
UNMOCK(get_options);
UNMOCK(connection_write_to_buf_impl_);
- if (mock_options)
- tor_free(mock_options->DataDirectory);
+ or_options_free(mock_options); mock_options = NULL;
connection_free_(TO_CONN(conn));
tor_free(header);
tor_free(body);
@@ -655,9 +661,7 @@ test_dir_handle_get_micro_d_server_busy(void *data)
UNMOCK(get_options);
UNMOCK(connection_write_to_buf_impl_);
- if (mock_options)
- tor_free(mock_options->DataDirectory);
-
+ or_options_free(mock_options); mock_options = NULL;
connection_free_(TO_CONN(conn));
tor_free(header);
smartlist_free(list);
@@ -694,7 +698,7 @@ test_dir_handle_get_networkstatus_bridges_not_found_without_auth(void *data)
done:
UNMOCK(get_options);
UNMOCK(connection_write_to_buf_impl_);
- tor_free(mock_options);
+ or_options_free(mock_options); mock_options = NULL;
connection_free_(TO_CONN(conn));
tor_free(header);
}
@@ -734,7 +738,7 @@ test_dir_handle_get_networkstatus_bridges(void *data)
done:
UNMOCK(get_options);
UNMOCK(connection_write_to_buf_impl_);
- tor_free(mock_options);
+ or_options_free(mock_options); mock_options = NULL;
connection_free_(TO_CONN(conn));
tor_free(header);
}
@@ -771,7 +775,7 @@ test_dir_handle_get_networkstatus_bridges_not_found_wrong_auth(void *data)
done:
UNMOCK(get_options);
UNMOCK(connection_write_to_buf_impl_);
- tor_free(mock_options);
+ or_options_free(mock_options); mock_options = NULL;
connection_free_(TO_CONN(conn));
tor_free(header);
}
@@ -799,7 +803,7 @@ test_dir_handle_get_server_descriptors_not_found(void* data)
done:
UNMOCK(connection_write_to_buf_impl_);
- tor_free(mock_options);
+ or_options_free(mock_options); mock_options = NULL;
connection_free_(TO_CONN(conn));
tor_free(header);
}
@@ -931,7 +935,8 @@ test_dir_handle_get_server_descriptors_authority(void* data)
long annotation_len = strstr(TEST_DESCRIPTOR, "router ") - TEST_DESCRIPTOR;
mock_routerinfo->cache_info.signed_descriptor_body =
tor_strdup(TEST_DESCRIPTOR);
- mock_routerinfo->cache_info.signed_descriptor_len = strlen(TEST_DESCRIPTOR);
+ mock_routerinfo->cache_info.signed_descriptor_len =
+ strlen(TEST_DESCRIPTOR) - annotation_len;;
mock_routerinfo->cache_info.annotations_len = annotation_len;
conn = dir_connection_new(tor_addr_family(&MOCK_TOR_ADDR));
@@ -952,10 +957,7 @@ test_dir_handle_get_server_descriptors_authority(void* data)
tt_assert(strstr(header, "Content-Type: text/plain\r\n"));
tt_assert(strstr(header, "Content-Encoding: identity\r\n"));
- //TODO: Is this a BUG?
- //This is what should be expected:
- //tt_int_op(body_used, OP_EQ, strlen(body));
- tt_int_op(body_used, OP_EQ, strlen(TEST_DESCRIPTOR));
+ tt_int_op(body_used, OP_EQ, strlen(body));
tt_str_op(body, OP_EQ, TEST_DESCRIPTOR + annotation_len);
tt_int_op(conn->dir_spool_src, OP_EQ, DIR_SPOOL_NONE);
@@ -963,6 +965,7 @@ test_dir_handle_get_server_descriptors_authority(void* data)
done:
NS_UNMOCK(router_get_my_routerinfo);
UNMOCK(connection_write_to_buf_impl_);
+ tor_free(mock_routerinfo->cache_info.signed_descriptor_body);
tor_free(mock_routerinfo);
connection_free_(TO_CONN(conn));
tor_free(header);
@@ -996,7 +999,8 @@ test_dir_handle_get_server_descriptors_fp(void* data)
long annotation_len = strstr(TEST_DESCRIPTOR, "router ") - TEST_DESCRIPTOR;
mock_routerinfo->cache_info.signed_descriptor_body =
tor_strdup(TEST_DESCRIPTOR);
- mock_routerinfo->cache_info.signed_descriptor_len = strlen(TEST_DESCRIPTOR);
+ mock_routerinfo->cache_info.signed_descriptor_len =
+ strlen(TEST_DESCRIPTOR) - annotation_len;
mock_routerinfo->cache_info.annotations_len = annotation_len;
conn = dir_connection_new(tor_addr_family(&MOCK_TOR_ADDR));
@@ -1023,10 +1027,7 @@ test_dir_handle_get_server_descriptors_fp(void* data)
tt_assert(strstr(header, "Content-Type: text/plain\r\n"));
tt_assert(strstr(header, "Content-Encoding: identity\r\n"));
- //TODO: Is this a BUG?
- //This is what should be expected:
- //tt_int_op(body_used, OP_EQ, strlen(body));
- tt_int_op(body_used, OP_EQ, strlen(TEST_DESCRIPTOR));
+ tt_int_op(body_used, OP_EQ, strlen(body));
tt_str_op(body, OP_EQ, TEST_DESCRIPTOR + annotation_len);
tt_int_op(conn->dir_spool_src, OP_EQ, DIR_SPOOL_NONE);
@@ -1034,6 +1035,7 @@ test_dir_handle_get_server_descriptors_fp(void* data)
done:
NS_UNMOCK(router_get_my_routerinfo);
UNMOCK(connection_write_to_buf_impl_);
+ tor_free(mock_routerinfo->cache_info.signed_descriptor_body);
tor_free(mock_routerinfo);
connection_free_(TO_CONN(conn));
tor_free(header);
@@ -1351,7 +1353,7 @@ test_dir_handle_get_server_keys_authority(void* data)
connection_free_(TO_CONN(conn));
tor_free(header);
tor_free(body);
- tor_free(mock_cert);
+ authority_cert_free(mock_cert); mock_cert = NULL;
}
static void
@@ -1502,6 +1504,7 @@ test_dir_handle_get_server_keys_sk(void* data)
UNMOCK(get_my_v3_authority_cert);
UNMOCK(connection_write_to_buf_impl_);
connection_free_(TO_CONN(conn));
+ authority_cert_free(mock_cert); mock_cert = NULL;
tor_free(header);
tor_free(body);
}
@@ -1638,7 +1641,7 @@ test_dir_handle_get_server_keys_busy(void* data)
UNMOCK(connection_write_to_buf_impl_);
connection_free_(TO_CONN(conn));
tor_free(header);
- tor_free(mock_options);
+ or_options_free(mock_options); mock_options = NULL;
clear_dir_servers();
routerlist_free_all();
@@ -1657,6 +1660,7 @@ test_dir_handle_get_status_vote_current_consensus_ns_not_enough_sigs(void* d)
{
dir_connection_t *conn = NULL;
char *header = NULL;
+ char *stats = NULL;
(void) d;
/* init mock */
@@ -1686,7 +1690,7 @@ test_dir_handle_get_status_vote_current_consensus_ns_not_enough_sigs(void* d)
tt_assert(header);
tt_str_op(NOT_ENOUGH_CONSENSUS_SIGNATURES, OP_EQ, header);
- char *stats = geoip_format_dirreq_stats(time(NULL));
+ stats = geoip_format_dirreq_stats(time(NULL));
tt_assert(stats);
tt_assert(strstr(stats, "not-enough-sigs=8"));
@@ -1697,9 +1701,10 @@ test_dir_handle_get_status_vote_current_consensus_ns_not_enough_sigs(void* d)
connection_free_(TO_CONN(conn));
tor_free(header);
+ tor_free(stats);
smartlist_free(mock_ns_val->voters);
tor_free(mock_ns_val);
- tor_free(mock_options);
+ or_options_free(mock_options); mock_options = NULL;
}
static void
@@ -1707,6 +1712,7 @@ test_dir_handle_get_status_vote_current_consensus_ns_not_found(void* data)
{
dir_connection_t *conn = NULL;
char *header = NULL;
+ char *stats = NULL;
(void) data;
init_mock_options();
@@ -1727,7 +1733,7 @@ test_dir_handle_get_status_vote_current_consensus_ns_not_found(void* data)
tt_assert(header);
tt_str_op(NOT_FOUND, OP_EQ, header);
- char *stats = geoip_format_dirreq_stats(time(NULL));
+ stats = geoip_format_dirreq_stats(time(NULL));
tt_assert(stats);
tt_assert(strstr(stats, "not-found=8"));
@@ -1736,7 +1742,8 @@ test_dir_handle_get_status_vote_current_consensus_ns_not_found(void* data)
UNMOCK(get_options);
connection_free_(TO_CONN(conn));
tor_free(header);
- tor_free(mock_options);
+ tor_free(stats);
+ or_options_free(mock_options); mock_options = NULL;
}
NS_DECL(int, geoip_get_country_by_addr, (const tor_addr_t *addr));
@@ -1840,7 +1847,7 @@ test_dir_handle_get_status_vote_current_consensus_ns(void* data)
tor_free(body);
tor_free(stats);
tor_free(hist);
- tor_free(mock_options);
+ or_options_free(mock_options); mock_options = NULL;
dirserv_free_all();
clear_geoip_db();
@@ -1852,6 +1859,7 @@ test_dir_handle_get_status_vote_current_consensus_ns_busy(void* data)
char *header = NULL;
char *body = NULL;
size_t body_used = 0;
+ char *stats = NULL;
(void) data;
dirserv_free_all();
@@ -1868,7 +1876,7 @@ test_dir_handle_get_status_vote_current_consensus_ns_busy(void* data)
tt_str_op(SERVER_BUSY, OP_EQ, header);
- char *stats = geoip_format_dirreq_stats(time(NULL));
+ stats = geoip_format_dirreq_stats(time(NULL));
tt_assert(stats);
tt_assert(strstr(stats, "busy=8"));
@@ -1876,8 +1884,9 @@ test_dir_handle_get_status_vote_current_consensus_ns_busy(void* data)
UNMOCK(get_options);
tor_free(header);
tor_free(body);
- tor_free(mock_options);
+ or_options_free(mock_options); mock_options = NULL;
+ tor_free(stats);
dirserv_free_all();
clear_geoip_db();
}
@@ -2043,7 +2052,7 @@ test_dir_handle_get_status_vote_d(void* data)
done:
tor_free(header);
tor_free(body);
- tor_free(mock_options);
+ or_options_free(mock_options); mock_options = NULL;
clear_dir_servers();
dirvote_free_all();
@@ -2215,7 +2224,7 @@ test_dir_handle_get_status_vote_next_consensus_busy(void* data)
UNMOCK(get_options);
tor_free(header);
tor_free(body);
- tor_free(mock_options);
+ or_options_free(mock_options); mock_options = NULL;
}
static void
@@ -2234,6 +2243,7 @@ status_vote_next_consensus_signatures_test(char **header, char **body,
body, body_used, 22, 0);
done:
+ connection_free_(TO_CONN(conn));
UNMOCK(connection_write_to_buf_impl_);
}
@@ -2316,7 +2326,7 @@ test_dir_handle_get_status_vote_next_consensus_signatures_busy(void* data)
connection_free_(TO_CONN(conn));
tor_free(header);
tor_free(body);
- tor_free(mock_options);
+ or_options_free(mock_options); mock_options = NULL;
}
static void
@@ -2386,8 +2396,10 @@ test_dir_handle_get_status_vote_next_authority(void* data)
UNMOCK(get_my_v3_authority_cert);
connection_free_(TO_CONN(conn));
tor_free(header);
- tor_free(mock_cert);
-
+ tor_free(body);
+ authority_cert_free(mock_cert); mock_cert = NULL;
+ or_options_free(mock_options); mock_options = NULL;
+
clear_dir_servers();
routerlist_free_all();
dirvote_free_all();
@@ -2465,7 +2477,9 @@ test_dir_handle_get_status_vote_current_authority(void* data)
UNMOCK(get_my_v3_authority_cert);
connection_free_(TO_CONN(conn));
tor_free(header);
- tor_free(mock_cert);
+ tor_free(body);
+ authority_cert_free(mock_cert); mock_cert = NULL;
+ or_options_free(mock_options); mock_options = NULL;
clear_dir_servers();
routerlist_free_all();
_______________________________________________
tor-commits mailing list
tor-commits@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits