diff mbox series

[bpf-next] selftests: bpf: fix sockmap update nits

Message ID 20200824084523.13104-1-lmb@cloudflare.com
State Accepted
Delegated to: BPF Maintainers
Headers show
Series [bpf-next] selftests: bpf: fix sockmap update nits | expand

Commit Message

Lorenz Bauer Aug. 24, 2020, 8:45 a.m. UTC
Address review by Yonghong, to bring the new tests in line with the
usual code style.

Signed-off-by: Lorenz Bauer <lmb@cloudflare.com>
---
 .../testing/selftests/bpf/prog_tests/sockmap_basic.c | 12 +++++-------
 1 file changed, 5 insertions(+), 7 deletions(-)

Comments

Yonghong Song Aug. 24, 2020, 3:15 p.m. UTC | #1
On 8/24/20 1:45 AM, Lorenz Bauer wrote:
> Address review by Yonghong, to bring the new tests in line with the
> usual code style.
> 
> Signed-off-by: Lorenz Bauer <lmb@cloudflare.com>

Acked-by: Yonghong Song <yhs@fb.com>
Alexei Starovoitov Aug. 24, 2020, 9:52 p.m. UTC | #2
On Mon, Aug 24, 2020 at 8:15 AM Yonghong Song <yhs@fb.com> wrote:
>
>
>
> On 8/24/20 1:45 AM, Lorenz Bauer wrote:
> > Address review by Yonghong, to bring the new tests in line with the
> > usual code style.
> >
> > Signed-off-by: Lorenz Bauer <lmb@cloudflare.com>
>
> Acked-by: Yonghong Song <yhs@fb.com>

Applied. Thanks
diff mbox series

Patch

diff --git a/tools/testing/selftests/bpf/prog_tests/sockmap_basic.c b/tools/testing/selftests/bpf/prog_tests/sockmap_basic.c
index 65ce7c289534..0b79d78b98db 100644
--- a/tools/testing/selftests/bpf/prog_tests/sockmap_basic.c
+++ b/tools/testing/selftests/bpf/prog_tests/sockmap_basic.c
@@ -118,10 +118,8 @@  static void test_sockmap_update(enum bpf_map_type map_type)
 		return;
 
 	skel = test_sockmap_update__open_and_load();
-	if (CHECK(!skel, "open_and_load", "cannot load skeleton\n")) {
-		close(sk);
-		return;
-	}
+	if (CHECK(!skel, "open_and_load", "cannot load skeleton\n"))
+		goto close_sk;
 
 	prog = bpf_program__fd(skel->progs.copy_sock_map);
 	src = bpf_map__fd(skel->maps.src);
@@ -158,8 +156,9 @@  static void test_sockmap_update(enum bpf_map_type map_type)
 	      dst_cookie, src_cookie);
 
 out:
-	close(sk);
 	test_sockmap_update__destroy(skel);
+close_sk:
+	close(sk);
 }
 
 static void test_sockmap_invalid_update(void)
@@ -168,8 +167,7 @@  static void test_sockmap_invalid_update(void)
 	int duration = 0;
 
 	skel = test_sockmap_invalid_update__open_and_load();
-	CHECK(skel, "open_and_load", "verifier accepted map_update\n");
-	if (skel)
+	if (CHECK(skel, "open_and_load", "verifier accepted map_update\n"))
 		test_sockmap_invalid_update__destroy(skel);
 }