@@ -56,10 +56,10 @@ int main(int argc, char *argv[]) {
5656 assert_se (runtime_dir = setup_fake_runtime_dir ());
5757
5858 r = bpf_program_new (BPF_PROG_TYPE_CGROUP_SKB , & p );
59- assert (r == 0 );
59+ assert_se (r == 0 );
6060
6161 r = bpf_program_add_instructions (p , exit_insn , ELEMENTSOF (exit_insn ));
62- assert (r == 0 );
62+ assert_se (r == 0 );
6363
6464 if (getuid () != 0 )
6565 return log_tests_skipped ("not running as root" );
@@ -76,7 +76,7 @@ int main(int argc, char *argv[]) {
7676 log_notice ("BPF firewalling (though without BPF_F_ALLOW_MULTI) supported. Good." );
7777
7878 r = bpf_program_load_kernel (p , log_buf , ELEMENTSOF (log_buf ));
79- assert (r >= 0 );
79+ assert_se (r >= 0 );
8080
8181 if (test_custom_filter ) {
8282 zero (attr );
@@ -158,8 +158,8 @@ int main(int argc, char *argv[]) {
158158 return log_tests_skipped ("Kernel doesn't support the necessary bpf bits (masked out via seccomp?)" );
159159 assert_se (r >= 0 );
160160
161- assert (u -> ip_bpf_ingress );
162- assert (u -> ip_bpf_egress );
161+ assert_se (u -> ip_bpf_ingress );
162+ assert_se (u -> ip_bpf_egress );
163163
164164 r = bpf_program_load_kernel (u -> ip_bpf_ingress , log_buf , ELEMENTSOF (log_buf ));
165165
@@ -168,7 +168,7 @@ int main(int argc, char *argv[]) {
168168 log_notice ("%s" , log_buf );
169169 log_notice ("-------" );
170170
171- assert (r >= 0 );
171+ assert_se (r >= 0 );
172172
173173 r = bpf_program_load_kernel (u -> ip_bpf_egress , log_buf , ELEMENTSOF (log_buf ));
174174
@@ -177,7 +177,7 @@ int main(int argc, char *argv[]) {
177177 log_notice ("%s" , log_buf );
178178 log_notice ("-------" );
179179
180- assert (r >= 0 );
180+ assert_se (r >= 0 );
181181
182182 assert_se (unit_start (u ) >= 0 );
183183
0 commit comments