Linux kernel mirror (for testing) git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git
kernel os linux

selftests/bpf: Use log_err in open_netns/close_netns

ASSERT helpers defined in test_progs.h shouldn't be used in public
functions like open_netns() and close_netns(). Since they depend on
test__fail() which defined in test_progs.c. Public functions may be
used not only in test_progs.c, but in other tests like test_sock_addr.c
in the next commit.

This patch uses log_err() to replace ASSERT helpers in open_netns()
and close_netns() in network_helpers.c to decouple dependencies, then
uses ASSERT_OK_PTR() to check the return values of all open_netns().

Signed-off-by: Geliang Tang <tanggeliang@kylinos.cn>
Link: https://lore.kernel.org/r/d1dad22b2ff4909af3f8bfd0667d046e235303cb.1713868264.git.tanggeliang@kylinos.cn
Signed-off-by: Martin KaFai Lau <martin.lau@kernel.org>

authored by

Geliang Tang and committed by
Martin KaFai Lau
285cffba 151f7442

+39 -6
+14 -5
tools/testing/selftests/bpf/network_helpers.c
··· 459 459 struct nstoken *token; 460 460 461 461 token = calloc(1, sizeof(struct nstoken)); 462 - if (!ASSERT_OK_PTR(token, "malloc token")) 462 + if (!token) { 463 + log_err("Failed to malloc token"); 463 464 return NULL; 465 + } 464 466 465 467 token->orig_netns_fd = open("/proc/self/ns/net", O_RDONLY); 466 - if (!ASSERT_GE(token->orig_netns_fd, 0, "open /proc/self/ns/net")) 468 + if (token->orig_netns_fd == -1) { 469 + log_err("Failed to open(/proc/self/ns/net)"); 467 470 goto fail; 471 + } 468 472 469 473 snprintf(nspath, sizeof(nspath), "%s/%s", "/var/run/netns", name); 470 474 nsfd = open(nspath, O_RDONLY | O_CLOEXEC); 471 - if (!ASSERT_GE(nsfd, 0, "open netns fd")) 475 + if (nsfd == -1) { 476 + log_err("Failed to open(%s)", nspath); 472 477 goto fail; 478 + } 473 479 474 480 err = setns(nsfd, CLONE_NEWNET); 475 481 close(nsfd); 476 - if (!ASSERT_OK(err, "setns")) 482 + if (err) { 483 + log_err("Failed to setns(nsfd)"); 477 484 goto fail; 485 + } 478 486 479 487 return token; 480 488 fail: ··· 497 489 if (!token) 498 490 return; 499 491 500 - ASSERT_OK(setns(token->orig_netns_fd, CLONE_NEWNET), "setns"); 492 + if (setns(token->orig_netns_fd, CLONE_NEWNET)) 493 + log_err("Failed to setns(orig_netns_fd)"); 501 494 close(token->orig_netns_fd); 502 495 free(token); 503 496 }
+2
tools/testing/selftests/bpf/prog_tests/empty_skb.c
··· 94 94 95 95 SYS(out, "ip netns add empty_skb"); 96 96 tok = open_netns("empty_skb"); 97 + if (!ASSERT_OK_PTR(tok, "setns")) 98 + goto out; 97 99 SYS(out, "ip link add veth0 type veth peer veth1"); 98 100 SYS(out, "ip link set dev veth0 up"); 99 101 SYS(out, "ip link set dev veth1 up");
+2
tools/testing/selftests/bpf/prog_tests/ip_check_defrag.c
··· 88 88 int err = -1; 89 89 90 90 nstoken = open_netns(NS1); 91 + if (!ASSERT_OK_PTR(nstoken, "setns")) 92 + goto out; 91 93 92 94 skel->links.defrag = bpf_program__attach_netfilter(skel->progs.defrag, &opts); 93 95 if (!ASSERT_OK_PTR(skel->links.defrag, "program attach"))
+1 -1
tools/testing/selftests/bpf/prog_tests/tc_redirect.c
··· 530 530 __u64 tstamp = 0; 531 531 532 532 nstoken = open_netns(NS_DST); 533 - if (!nstoken) 533 + if (!ASSERT_OK_PTR(nstoken, "setns dst")) 534 534 return -1; 535 535 536 536 srv_fd = start_server(AF_INET6, SOCK_DGRAM, "::1", 0, 0);
+4
tools/testing/selftests/bpf/prog_tests/test_tunnel.c
··· 612 612 613 613 /* ping from at_ns0 namespace test */ 614 614 nstoken = open_netns("at_ns0"); 615 + if (!ASSERT_OK_PTR(nstoken, "setns")) 616 + goto done; 615 617 err = test_ping(AF_INET, IP4_ADDR_TUNL_DEV1); 616 618 if (!ASSERT_OK(err, "test_ping")) 617 619 goto done; ··· 668 666 669 667 /* ping from at_ns0 namespace test */ 670 668 nstoken = open_netns("at_ns0"); 669 + if (!ASSERT_OK_PTR(nstoken, "setns")) 670 + goto done; 671 671 err = test_ping(AF_INET, IP4_ADDR_TUNL_DEV1); 672 672 close_netns(nstoken); 673 673 if (!ASSERT_OK(err, "test_ping"))
+16
tools/testing/selftests/bpf/prog_tests/xdp_metadata.c
··· 384 384 SYS(out, "ip netns add " RX_NETNS_NAME); 385 385 386 386 tok = open_netns(TX_NETNS_NAME); 387 + if (!ASSERT_OK_PTR(tok, "setns")) 388 + goto out; 387 389 SYS(out, "ip link add numtxqueues 1 numrxqueues 1 " TX_NAME 388 390 " type veth peer " RX_NAME " numtxqueues 1 numrxqueues 1"); 389 391 SYS(out, "ip link set " RX_NAME " netns " RX_NETNS_NAME); ··· 402 400 SYS(out, "ip -4 neigh add " RX_ADDR " lladdr " RX_MAC " dev " TX_NAME_VLAN); 403 401 404 402 switch_ns_to_rx(&tok); 403 + if (!ASSERT_OK_PTR(tok, "setns rx")) 404 + goto out; 405 405 406 406 SYS(out, "ip link set dev " RX_NAME " address " RX_MAC); 407 407 SYS(out, "ip link set dev " RX_NAME " up"); ··· 453 449 goto out; 454 450 455 451 switch_ns_to_tx(&tok); 452 + if (!ASSERT_OK_PTR(tok, "setns tx")) 453 + goto out; 456 454 457 455 /* Setup separate AF_XDP for TX interface nad send packet to the RX socket. */ 458 456 tx_ifindex = if_nametoindex(TX_NAME); ··· 467 461 goto out; 468 462 469 463 switch_ns_to_rx(&tok); 464 + if (!ASSERT_OK_PTR(tok, "setns rx")) 465 + goto out; 470 466 471 467 /* Verify packet sent from AF_XDP has proper metadata. */ 472 468 if (!ASSERT_GE(verify_xsk_metadata(&rx_xsk, true), 0, ··· 476 468 goto out; 477 469 478 470 switch_ns_to_tx(&tok); 471 + if (!ASSERT_OK_PTR(tok, "setns tx")) 472 + goto out; 479 473 complete_tx(&tx_xsk); 480 474 481 475 /* Now check metadata of packet, generated with network stack */ ··· 485 475 goto out; 486 476 487 477 switch_ns_to_rx(&tok); 478 + if (!ASSERT_OK_PTR(tok, "setns rx")) 479 + goto out; 488 480 489 481 if (!ASSERT_GE(verify_xsk_metadata(&rx_xsk, false), 0, 490 482 "verify_xsk_metadata")) ··· 510 498 goto out; 511 499 512 500 switch_ns_to_tx(&tok); 501 + if (!ASSERT_OK_PTR(tok, "setns tx")) 502 + goto out; 513 503 514 504 /* Send packet to trigger . */ 515 505 if (!ASSERT_GE(generate_packet(&tx_xsk, AF_XDP_CONSUMER_PORT), 0, ··· 519 505 goto out; 520 506 521 507 switch_ns_to_rx(&tok); 508 + if (!ASSERT_OK_PTR(tok, "setns rx")) 509 + goto out; 522 510 523 511 while (!retries--) { 524 512 if (bpf_obj2->bss->called)