Add double free protection to checkseapp.
A double free error occurs when building with non glibc
devices. The hdestroy() function frees all comparison
keys internally in these cases. So avoid an explicit
call to free().
Change-Id: If9c5dc1a969605cd1eeb9218de02a9f8dbbd3ae1
Signed-off-by: rpcraig <rpcraig@tycho.ncsc.mil>
diff --git a/check_seapp/check_seapp.c b/check_seapp/check_seapp.c
index 93ecb2f..eab4c35 100644
--- a/check_seapp/check_seapp.c
+++ b/check_seapp/check_seapp.c
@@ -428,8 +428,11 @@
free(m->data);
}
+/* hdestroy() frees comparsion keys for non glibc */
+#ifdef __GLIBC__
if(s == rule_map_destroy_key && rm->key)
free(rm->key);
+#endif
free(rm);
}
@@ -778,7 +781,10 @@
*/
preserved_key = tmp->r->key;
rule_map_free(tmp->r, rule_map_preserve_key);
+/* hdestroy() frees comparsion keys for non glibc */
+#ifdef __GLIBC__
free(rm->key);
+#endif
rm->key = preserved_key;
tmp->r = rm;
}