diff --git a/gtests/net/packetdrill/run_system_call.c b/gtests/net/packetdrill/run_system_call.c index 187842d6be63ea0608fecc5348f7e5f69e0bab45..6330bdd83f743c253d7f9845614d3de4720799fd 100644 --- a/gtests/net/packetdrill/run_system_call.c +++ b/gtests/net/packetdrill/run_system_call.c @@ -514,7 +514,7 @@ static void begin_syscall(struct state *state, struct syscall_spec *syscall) enum result_check_t { CHECK_EXACT, /* check that result matches exactly */ CHECK_NON_NEGATIVE, /* check that result is non-negative */ - CHECK_ACCEPT, /* checks for results after accept-syscall */ + CHECK_ALLOW_MAPPING, /* checks for results after accept-syscall */ }; static int end_syscall(struct state *state, struct syscall_spec *syscall, enum result_check_t mode, int actual, char **error) @@ -558,21 +558,21 @@ static int end_syscall(struct state *state, struct syscall_spec *syscall, expected, actual); return STATUS_ERR; } - } else if (mode == CHECK_ACCEPT) { - if (expected >= 0 && actual < 0) { + } else if (mode == CHECK_ALLOW_MAPPING) { + if ((expected >= 0) && (actual < 0)) { asprintf(error, "Expected non-negative result but got %d " "with errno %d (%s)", actual, actual_errno, strerror(actual_errno)); return STATUS_ERR; } - else if (expected < 0 && actual != expected) { + else if ((expected < 0) && (actual != expected)) { asprintf(error, - "Expected result %d but got %d", - expected, actual); + "Expected result %d but got %d", + expected, actual); return STATUS_ERR; } - }else { + } else { assert(!"bad mode"); } @@ -1009,7 +1009,7 @@ static int syscall_accept(struct state *state, struct syscall_spec *syscall, result = accept(live_fd, (struct sockaddr *)&live_addr, &live_addrlen); - if (end_syscall(state, syscall, CHECK_ACCEPT, result, error)) + if (end_syscall(state, syscall, CHECK_ALLOW_MAPPING, result, error)) return STATUS_ERR; if (result >= 0) {