Received: by 2002:a25:ca44:0:0:0:0:0 with SMTP id a65csp2457998ybg; Thu, 30 Jul 2020 23:17:35 -0700 (PDT) X-Google-Smtp-Source: ABdhPJy4ho5doMgbp28El7zNatZaouqhIE5hN9rRGpR1eOF33wBnEmtJof68Z+AUjd1sjosaLV3m X-Received: by 2002:a50:d78f:: with SMTP id w15mr2355910edi.260.1596176255078; Thu, 30 Jul 2020 23:17:35 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1596176255; cv=none; d=google.com; s=arc-20160816; b=IdnqdccoUGTnV29WHuwXZ3+qBInYTQiPKIDN0jtu6ikS+uYXZWbXYIkGR0YBVgtSJF DleBkdseHx1UiG3fYFb4g77iRxSWEKe44dmusTV/AyE+WkvvyaHPVhmfd1naQN8VKg4z Qc8Ngazzbh0JgdHBfKBvHxDf7K0DojgxvdTSDa/45b+QTNZXgP7NJi0Vpu3A3d8ZNRzF kZ11th1/hm91a67Die8ZP2/FMe1hnMu1JT7wsxaJrp3A90BBSF92vpHZ45Uun5BJlvSF h0VS5la3ZqZj7Lj694RV0gNjgyrzFP+jHamW3uHut5jluZHngy7tnwT25RBv7EKfXX1H JXJA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :message-id:date:subject:cc:to:from; bh=ABqBjbXrPX5x5bAY5yA6UqSvikUTgLk2Z0NjrrEXdiQ=; b=SpnollNryOVhRLkTMbN0ufEFoEO45Fj8iB1sI85KO413adDoeW+dB86pHfPhSSHS1s yNv1hckxW5go2rESYQ2xF7CRzMLOlSz0yHulco37DxqXe643GSZlYVigtAt2IkrRbtOv 8Z22MxRHfvLviksMRK56CQAwPnO77hlb0VzbMfOGpZdiPpJGYDyv+rpTHZxGyjNGEQs5 BwGZS3yucIvGT05SYPsKdrdRP/An0loDGjfjWcoMzC0M3fBReHFI1yGgato/pLntx9Ls J7od8nNZd32Tyc3bXmciajoF7flf7qYp8zXNVOBexT8pDkrUOYGzeQ8/0apYPzN48Ema PFQA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id o7si4943196ejh.78.2020.07.30.23.17.11; Thu, 30 Jul 2020 23:17:35 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1731366AbgGaGQu (ORCPT + 99 others); Fri, 31 Jul 2020 02:16:50 -0400 Received: from foss.arm.com ([217.140.110.172]:50114 "EHLO foss.arm.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1731152AbgGaGQt (ORCPT ); Fri, 31 Jul 2020 02:16:49 -0400 Received: from usa-sjc-imap-foss1.foss.arm.com (unknown [10.121.207.14]) by usa-sjc-mx-foss1.foss.arm.com (Postfix) with ESMTP id 9CCE41FB; Thu, 30 Jul 2020 23:16:48 -0700 (PDT) Received: from net-arm-thunderx2-02.shanghai.arm.com (net-arm-thunderx2-02.shanghai.arm.com [10.169.210.119]) by usa-sjc-imap-foss1.foss.arm.com (Postfix) with ESMTPA id 7F0923F66E; Thu, 30 Jul 2020 23:16:45 -0700 (PDT) From: Jianlin Lv To: bpf@vger.kernel.org Cc: davem@davemloft.net, kuba@kernel.org, ast@kernel.org, daniel@iogearbox.net, yhs@fb.com, Song.Zhu@arm.com, Jianlin.Lv@arm.com, linux-kernel@vger.kernel.org, netdev@vger.kernel.org Subject: [PATCH bpf-next] bpf: fix compilation warning of selftests Date: Fri, 31 Jul 2020 14:16:00 +0800 Message-Id: <20200731061600.18344-1-Jianlin.Lv@arm.com> X-Mailer: git-send-email 2.17.1 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Clang compiler version: 12.0.0 The following warning appears during the selftests/bpf compilation: prog_tests/send_signal.c:51:3: warning: ignoring return value of ‘write’, declared with attribute warn_unused_result [-Wunused-result] 51 | write(pipe_c2p[1], buf, 1); | ^~~~~~~~~~~~~~~~~~~~~~~~~~ prog_tests/send_signal.c:54:3: warning: ignoring return value of ‘read’, declared with attribute warn_unused_result [-Wunused-result] 54 | read(pipe_p2c[0], buf, 1); | ^~~~~~~~~~~~~~~~~~~~~~~~~ ...... prog_tests/stacktrace_build_id_nmi.c:13:2: warning: ignoring return value of ‘fscanf’,declared with attribute warn_unused_result [-Wunused-resul] 13 | fscanf(f, "%llu", &sample_freq); | ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ test_tcpnotify_user.c:133:2: warning:ignoring return value of ‘system’, declared with attribute warn_unused_result [-Wunused-result] 133 | system(test_script); | ^~~~~~~~~~~~~~~~~~~ test_tcpnotify_user.c:138:2: warning:ignoring return value of ‘system’, declared with attribute warn_unused_result [-Wunused-result] 138 | system(test_script); | ^~~~~~~~~~~~~~~~~~~ test_tcpnotify_user.c:143:2: warning:ignoring return value of ‘system’, declared with attribute warn_unused_result [-Wunused-result] 143 | system(test_script); | ^~~~~~~~~~~~~~~~~~~ Add code that fix compilation warning about ignoring return value and handles any errors; Check return value of library`s API make the code more secure. Signed-off-by: Jianlin Lv --- .../selftests/bpf/prog_tests/send_signal.c | 37 ++++++++++++++----- .../bpf/prog_tests/stacktrace_build_id_nmi.c | 3 +- .../selftests/bpf/test_tcpnotify_user.c | 15 ++++++-- 3 files changed, 41 insertions(+), 14 deletions(-) diff --git a/tools/testing/selftests/bpf/prog_tests/send_signal.c b/tools/testing/selftests/bpf/prog_tests/send_signal.c index 504abb7bfb95..7a5272e4e810 100644 --- a/tools/testing/selftests/bpf/prog_tests/send_signal.c +++ b/tools/testing/selftests/bpf/prog_tests/send_signal.c @@ -48,22 +48,31 @@ static void test_send_signal_common(struct perf_event_attr *attr, close(pipe_p2c[1]); /* close write */ /* notify parent signal handler is installed */ - write(pipe_c2p[1], buf, 1); + if (CHECK_FAIL(write(pipe_c2p[1], buf, 1) != 1)) { + perror("Child: write pipe error"); + goto close_out; + } /* make sure parent enabled bpf program to send_signal */ - read(pipe_p2c[0], buf, 1); + if (CHECK_FAIL(read(pipe_p2c[0], buf, 1) != 1)) { + perror("Child: read pipe error"); + goto close_out; + } /* wait a little for signal handler */ sleep(1); - if (sigusr1_received) - write(pipe_c2p[1], "2", 1); - else - write(pipe_c2p[1], "0", 1); + buf[0] = sigusr1_received ? '2' : '0'; + if (CHECK_FAIL(write(pipe_c2p[1], buf, 1) != 1)) { + perror("Child: write pipe error"); + goto close_out; + } /* wait for parent notification and exit */ - read(pipe_p2c[0], buf, 1); + if (CHECK_FAIL(read(pipe_p2c[0], buf, 1) != 1)) + perror("Child: read pipe error"); +close_out: close(pipe_c2p[1]); close(pipe_p2c[0]); exit(0); @@ -99,7 +108,11 @@ static void test_send_signal_common(struct perf_event_attr *attr, } /* wait until child signal handler installed */ - read(pipe_c2p[0], buf, 1); + if (CHECK_FAIL(read(pipe_c2p[0], buf, 1) != 1)) { + perror("Parent: read pipe error"); + goto disable_pmu; + } + /* trigger the bpf send_signal */ skel->bss->pid = pid; @@ -107,7 +120,10 @@ static void test_send_signal_common(struct perf_event_attr *attr, skel->bss->signal_thread = signal_thread; /* notify child that bpf program can send_signal now */ - write(pipe_p2c[1], buf, 1); + if (CHECK_FAIL(write(pipe_p2c[1], buf, 1) != 1)) { + perror("Parent: write pipe error"); + goto disable_pmu; + } /* wait for result */ err = read(pipe_c2p[0], buf, 1); @@ -121,7 +137,8 @@ static void test_send_signal_common(struct perf_event_attr *attr, CHECK(buf[0] != '2', test_name, "incorrect result\n"); /* notify child safe to exit */ - write(pipe_p2c[1], buf, 1); + if (CHECK_FAIL(write(pipe_p2c[1], buf, 1) != 1)) + perror("Parent: write pipe error"); disable_pmu: close(pmu_fd); diff --git a/tools/testing/selftests/bpf/prog_tests/stacktrace_build_id_nmi.c b/tools/testing/selftests/bpf/prog_tests/stacktrace_build_id_nmi.c index f002e3090d92..a27de3d46e58 100644 --- a/tools/testing/selftests/bpf/prog_tests/stacktrace_build_id_nmi.c +++ b/tools/testing/selftests/bpf/prog_tests/stacktrace_build_id_nmi.c @@ -10,7 +10,8 @@ static __u64 read_perf_max_sample_freq(void) f = fopen("/proc/sys/kernel/perf_event_max_sample_rate", "r"); if (f == NULL) return sample_freq; - fscanf(f, "%llu", &sample_freq); + if (CHECK_FAIL(fscanf(f, "%llu", &sample_freq) != 1)) + perror("Get max sample rate fail, return default value: 5000\n"); fclose(f); return sample_freq; } diff --git a/tools/testing/selftests/bpf/test_tcpnotify_user.c b/tools/testing/selftests/bpf/test_tcpnotify_user.c index f9765ddf0761..869e28c92d73 100644 --- a/tools/testing/selftests/bpf/test_tcpnotify_user.c +++ b/tools/testing/selftests/bpf/test_tcpnotify_user.c @@ -130,17 +130,26 @@ int main(int argc, char **argv) sprintf(test_script, "iptables -A INPUT -p tcp --dport %d -j DROP", TESTPORT); - system(test_script); + if (system(test_script)) { + printf("FAILED: execute command: %s\n", test_script); + goto err; + } sprintf(test_script, "nc 127.0.0.1 %d < /etc/passwd > /dev/null 2>&1 ", TESTPORT); - system(test_script); + if (system(test_script)) { + printf("FAILED: execute command: %s\n", test_script); + goto err; + } sprintf(test_script, "iptables -D INPUT -p tcp --dport %d -j DROP", TESTPORT); - system(test_script); + if (system(test_script)) { + printf("FAILED: execute command: %s\n", test_script); + goto err; + } rv = bpf_map_lookup_elem(bpf_map__fd(global_map), &key, &g); if (rv != 0) { -- 2.17.1