mirror of
https://github.com/yuzu-emu/breakpad
synced 2024-11-22 15:43:56 +00:00
Fix some Coverity defects.
Fix a few issues Coverity detected in exploitability_linux.cc: CID 277681, 277682, 277683 Change-Id: I8ad0581f075da7346b9be8100b3690555a358b16 Reviewed-on: https://chromium-review.googlesource.com/c/breakpad/breakpad/+/3872234 Reviewed-by: Mike Frysinger <vapier@chromium.org>
This commit is contained in:
parent
5d6d250150
commit
30c7f3cfc1
1 changed files with 3 additions and 4 deletions
|
@ -518,18 +518,17 @@ bool ExploitabilityLinux::DisassembleBytes(const string& architecture,
|
|||
raw_bytes_tmpfile);
|
||||
FILE* objdump_fp = popen(cmd, "r");
|
||||
if (!objdump_fp) {
|
||||
fclose(objdump_fp);
|
||||
unlink(raw_bytes_tmpfile);
|
||||
BPLOG(ERROR) << "Failed to call objdump.";
|
||||
return false;
|
||||
}
|
||||
if (fread(objdump_output_buffer, 1, buffer_len, objdump_fp) <= 0) {
|
||||
fclose(objdump_fp);
|
||||
if (fread(objdump_output_buffer, 1, buffer_len, objdump_fp) != buffer_len) {
|
||||
pclose(objdump_fp);
|
||||
unlink(raw_bytes_tmpfile);
|
||||
BPLOG(ERROR) << "Failed to read objdump output.";
|
||||
return false;
|
||||
}
|
||||
fclose(objdump_fp);
|
||||
pclose(objdump_fp);
|
||||
unlink(raw_bytes_tmpfile);
|
||||
return true;
|
||||
}
|
||||
|
|
Loading…
Reference in a new issue