* If we expect the child to get the broadcast
* message, then check the received cookie.
*/
- if (child_status == 0)
+ if (!child_status) {
ASSERT_EXIT(expected_cookie,==,msg->cookie);
+ kdbus_msg_free(msg);
+ }
/* Use expected_cookie since 'msg' might be NULL */
ASSERT_EXIT_ZERO(kdbus_msg_send(child, NULL, expected_cookie + 1, 0, 0, 0, KDBUS_DST_ID_BROADCAST));
- kdbus_msg_free(msg);
kdbus_conn_free(child);
}),
({
ASSERT_ZERO(kdbus_msg_send(child_2, NULL, expected_cookie, 0, 0, 0, KDBUS_DST_ID_BROADCAST));
/* Use a little bit high time */
- ASSERT_RETURN(parent_status,==,kdbus_msg_recv_poll(child_2, 1000, &msg, NULL));
+ ret = kdbus_msg_recv_poll(child_2, 1000, &msg, NULL);
+ ASSERT_RETURN(parent_status,==,ret);
/*
* Check returned cookie in case we expect
* success.
*/
- if (ret == 0)
+ if (!ret) {
ASSERT_RETURN(msg->cookie,==,expected_cookie + 1);
-
- kdbus_msg_free(msg);
+ kdbus_msg_free(msg);
+ }
} else {
/*
* Two unprivileged users will try to
* Check returned cookie in case we expect
* success.
*/
- if (ret == 0)
+ if (!ret) {
ASSERT_EXIT(msg->cookie,==,expected_cookie + 1);
+ kdbus_msg_free(msg);
+ }
- kdbus_msg_free(msg);
kdbus_conn_free(child_2);
}),
({}));