@@ -204,7 +204,7 @@ static void test_skmsg_helpers_with_link(enum bpf_map_type map_type)
204204 /* Fail since bpf_link for the same prog type has been created. */
205205 link2 = bpf_program__attach_sockmap (prog_clone , map );
206206 if (!ASSERT_ERR_PTR (link2 , "bpf_program__attach_sockmap" )) {
207- bpf_link__detach (link2 );
207+ bpf_link__destroy (link2 );
208208 goto out ;
209209 }
210210
@@ -230,7 +230,7 @@ static void test_skmsg_helpers_with_link(enum bpf_map_type map_type)
230230 if (!ASSERT_OK (err , "bpf_link_update" ))
231231 goto out ;
232232out :
233- bpf_link__detach (link );
233+ bpf_link__destroy (link );
234234 test_skmsg_load_helpers__destroy (skel );
235235}
236236
@@ -417,7 +417,7 @@ static void test_sockmap_skb_verdict_attach_with_link(void)
417417 if (!ASSERT_OK_PTR (link , "bpf_program__attach_sockmap" ))
418418 goto out ;
419419
420- bpf_link__detach (link );
420+ bpf_link__destroy (link );
421421
422422 err = bpf_prog_attach (bpf_program__fd (prog ), map , BPF_SK_SKB_STREAM_VERDICT , 0 );
423423 if (!ASSERT_OK (err , "bpf_prog_attach" ))
@@ -426,7 +426,7 @@ static void test_sockmap_skb_verdict_attach_with_link(void)
426426 /* Fail since attaching with the same prog/map has been done. */
427427 link = bpf_program__attach_sockmap (prog , map );
428428 if (!ASSERT_ERR_PTR (link , "bpf_program__attach_sockmap" ))
429- bpf_link__detach (link );
429+ bpf_link__destroy (link );
430430
431431 err = bpf_prog_detach2 (bpf_program__fd (prog ), map , BPF_SK_SKB_STREAM_VERDICT );
432432 if (!ASSERT_OK (err , "bpf_prog_detach2" ))
@@ -747,13 +747,13 @@ static void test_sockmap_skb_verdict_peek_with_link(void)
747747 test_sockmap_skb_verdict_peek_helper (map );
748748 ASSERT_EQ (pass -> bss -> clone_called , 1 , "clone_called" );
749749out :
750- bpf_link__detach (link );
750+ bpf_link__destroy (link );
751751 test_sockmap_pass_prog__destroy (pass );
752752}
753753
754754static void test_sockmap_unconnected_unix (void )
755755{
756- int err , map , stream = 0 , dgram = 0 , zero = 0 ;
756+ int err , map , stream = -1 , dgram = -1 , zero = 0 ;
757757 struct test_sockmap_pass_prog * skel ;
758758
759759 skel = test_sockmap_pass_prog__open_and_load ();
@@ -764,22 +764,22 @@ static void test_sockmap_unconnected_unix(void)
764764
765765 stream = xsocket (AF_UNIX , SOCK_STREAM , 0 );
766766 if (stream < 0 )
767- return ;
767+ goto out ;
768768
769769 dgram = xsocket (AF_UNIX , SOCK_DGRAM , 0 );
770- if (dgram < 0 ) {
771- close (stream );
772- return ;
773- }
770+ if (dgram < 0 )
771+ goto out ;
774772
775773 err = bpf_map_update_elem (map , & zero , & stream , BPF_ANY );
776- ASSERT_ERR (err , "bpf_map_update_elem(stream)" );
774+ if (!ASSERT_ERR (err , "bpf_map_update_elem(stream)" ))
775+ goto out ;
777776
778777 err = bpf_map_update_elem (map , & zero , & dgram , BPF_ANY );
779778 ASSERT_OK (err , "bpf_map_update_elem(dgram)" );
780-
779+ out :
781780 close (stream );
782781 close (dgram );
782+ test_sockmap_pass_prog__destroy (skel );
783783}
784784
785785static void test_sockmap_many_socket (void )
@@ -1027,7 +1027,7 @@ static void test_sockmap_skb_verdict_vsock_poll(void)
10271027 if (xrecv_nonblock (conn , & buf , 1 , 0 ) != 1 )
10281028 FAIL ("xrecv_nonblock" );
10291029detach :
1030- bpf_link__detach (link );
1030+ bpf_link__destroy (link );
10311031close :
10321032 xclose (conn );
10331033 xclose (peer );
0 commit comments