mirror of
https://github.com/AuxXxilium/linux_dsm_epyc7002.git
synced 2024-12-27 20:55:09 +07:00
f97a8991d3
=================================================================
==7506==ERROR: LeakSanitizer: detected memory leaks
Direct leak of 13 byte(s) in 3 object(s) allocated from:
#0 0x7f03339d6070 in __interceptor_strdup (/usr/lib/x86_64-linux-gnu/libasan.so.5+0x3b070)
#1 0x5625e53aaef0 in expr__find_other util/expr.y:221
#2 0x5625e51bcd3f in test__expr tests/expr.c:52
#3 0x5625e51528e6 in run_test tests/builtin-test.c:358
#4 0x5625e5152baf in test_and_print tests/builtin-test.c:388
#5 0x5625e51543fe in __cmd_test tests/builtin-test.c:583
#6 0x5625e515572f in cmd_test tests/builtin-test.c:722
#7 0x5625e51c3fb8 in run_builtin /home/changbin/work/linux/tools/perf/perf.c:302
#8 0x5625e51c44f7 in handle_internal_command /home/changbin/work/linux/tools/perf/perf.c:354
#9 0x5625e51c48fb in run_argv /home/changbin/work/linux/tools/perf/perf.c:398
#10 0x5625e51c5069 in main /home/changbin/work/linux/tools/perf/perf.c:520
#11 0x7f033214d09a in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x2409a)
Signed-off-by: Changbin Du <changbin.du@gmail.com>
Cc: Alexei Starovoitov <ast@kernel.org>
Cc: Andi Kleen <ak@linux.intel.com>
Cc: Daniel Borkmann <daniel@iogearbox.net>
Cc: Jiri Olsa <jolsa@kernel.org>
Cc: Namhyung Kim <namhyung@kernel.org>
Cc: Peter Zijlstra <peterz@infradead.org>
Cc: Steven Rostedt (VMware) <rostedt@goodmis.org>
Fixes: 075167363f
("perf tools: Add a simple expression parser for JSON")
Link: http://lkml.kernel.org/r/20190316080556.3075-16-changbin.du@gmail.com
Signed-off-by: Arnaldo Carvalho de Melo <acme@redhat.com>
66 lines
1.7 KiB
C
66 lines
1.7 KiB
C
// SPDX-License-Identifier: GPL-2.0
|
|
#include "util/debug.h"
|
|
#include "util/expr.h"
|
|
#include "tests.h"
|
|
#include <stdlib.h>
|
|
|
|
static int test(struct parse_ctx *ctx, const char *e, double val2)
|
|
{
|
|
double val;
|
|
|
|
if (expr__parse(&val, ctx, &e))
|
|
TEST_ASSERT_VAL("parse test failed", 0);
|
|
TEST_ASSERT_VAL("unexpected value", val == val2);
|
|
return 0;
|
|
}
|
|
|
|
int test__expr(struct test *t __maybe_unused, int subtest __maybe_unused)
|
|
{
|
|
const char *p;
|
|
const char **other;
|
|
double val;
|
|
int i, ret;
|
|
struct parse_ctx ctx;
|
|
int num_other;
|
|
|
|
expr__ctx_init(&ctx);
|
|
expr__add_id(&ctx, "FOO", 1);
|
|
expr__add_id(&ctx, "BAR", 2);
|
|
|
|
ret = test(&ctx, "1+1", 2);
|
|
ret |= test(&ctx, "FOO+BAR", 3);
|
|
ret |= test(&ctx, "(BAR/2)%2", 1);
|
|
ret |= test(&ctx, "1 - -4", 5);
|
|
ret |= test(&ctx, "(FOO-1)*2 + (BAR/2)%2 - -4", 5);
|
|
ret |= test(&ctx, "1-1 | 1", 1);
|
|
ret |= test(&ctx, "1-1 & 1", 0);
|
|
ret |= test(&ctx, "min(1,2) + 1", 2);
|
|
ret |= test(&ctx, "max(1,2) + 1", 3);
|
|
ret |= test(&ctx, "1+1 if 3*4 else 0", 2);
|
|
|
|
if (ret)
|
|
return ret;
|
|
|
|
p = "FOO/0";
|
|
ret = expr__parse(&val, &ctx, &p);
|
|
TEST_ASSERT_VAL("division by zero", ret == 1);
|
|
|
|
p = "BAR/";
|
|
ret = expr__parse(&val, &ctx, &p);
|
|
TEST_ASSERT_VAL("missing operand", ret == 1);
|
|
|
|
TEST_ASSERT_VAL("find other",
|
|
expr__find_other("FOO + BAR + BAZ + BOZO", "FOO", &other, &num_other) == 0);
|
|
TEST_ASSERT_VAL("find other", num_other == 3);
|
|
TEST_ASSERT_VAL("find other", !strcmp(other[0], "BAR"));
|
|
TEST_ASSERT_VAL("find other", !strcmp(other[1], "BAZ"));
|
|
TEST_ASSERT_VAL("find other", !strcmp(other[2], "BOZO"));
|
|
TEST_ASSERT_VAL("find other", other[3] == NULL);
|
|
|
|
for (i = 0; i < num_other; i++)
|
|
free((void *)other[i]);
|
|
free((void *)other);
|
|
|
|
return 0;
|
|
}
|