[LTP] [PATCH v1] Fixes: #776, tst_taint prints human readable error messages instead of numerical codes
Martin Doucha
mdoucha@suse.cz
Tue Jan 18 12:28:39 CET 2022
Hi,
On 14. 01. 22 17:16, Kushal Chand wrote:
> This patch prints human readable messages when kernel is tainted instead
> of numerical codes.
>
> Git Hub Issue link - https://github.com/linux-test-project/ltp/issues/776
>
> Signed-off-by: Kushal Chand <kushalkataria5@gmail.com>
>
> ---
> lib/tst_taint.c | 45 ++++++++++++++++++++++++++++++++++++++++++++-
> 1 file changed, 44 insertions(+), 1 deletion(-)
>
> diff --git a/lib/tst_taint.c b/lib/tst_taint.c
> index 49146aacb..049769873 100644
> --- a/lib/tst_taint.c
> +++ b/lib/tst_taint.c
> @@ -8,6 +8,48 @@
>
> static unsigned int taint_mask = -1;
>
> +struct pair {
> + const char *name;
> + int val;
> +};
> +
> +#define PAIR(def)[def] = {.name = #def, .val = def},
> +
> +#define STRPAIR(key, value)[key] = {.name = value, .val = key},
> +
> +#define PAIR_LOOKUP(pair_arr, idx) do { \
> + if (idx < 0 || (size_t)idx >= ARRAY_SIZE(pair_arr) || \
> + pair_arr[idx].name == NULL) \
> + return "???"; \
> + return pair_arr[idx].name; \
> +} while (0)
> +
> +const char *tst_strtaint(int err)
> +{
> + static const struct pair taint_pairs[] = {
> + STRPAIR(TST_TAINT_A, "TAINT_A(ACPI table overridden)")
> + STRPAIR(TST_TAINT_B, "TAINT_B(Bad page reference)")
> + STRPAIR(TST_TAINT_C, "TAINT_C(Staging driver loaded)")
> + STRPAIR(TST_TAINT_D, "TAINT_D(OOPS/BUG)")
> + STRPAIR(TST_TAINT_E, "TAINT_E(Unsigned module loaded)")
> + STRPAIR(TST_TAINT_F, "TAINT_F(Module force loaded)")
> + STRPAIR(TST_TAINT_G, "TAINT_G(Propriety module loaded)")
> + STRPAIR(TST_TAINT_I, "TAINT_I(Workaround BIOS/FW bug)")
> + STRPAIR(TST_TAINT_K, "TAINT_K(Live patched)")
> + STRPAIR(TST_TAINT_L, "TAINT_L(Soft lock up occured)")
> + STRPAIR(TST_TAINT_M, "TAINT_M(Machine check exception)")
> + STRPAIR(TST_TAINT_O, "TAINT_O(Out of tree module loaded)")
> + STRPAIR(TST_TAINT_R, "TAINT_R(Module force unloaded)")
> + STRPAIR(TST_TAINT_S, "TAINT_S(Running on out of spec system)")
> + STRPAIR(TST_TAINT_T, "TAINT_T(Built with struct randomization)")
> + STRPAIR(TST_TAINT_U, "TAINT_U(User request)")
> + STRPAIR(TST_TAINT_W, "TAINT_W(Warning)")
> + STRPAIR(TST_TAINT_X, "TAINT_X(Auxilary)")
> + };
> +
> + PAIR_LOOKUP(taint_pairs, err);
This is not the correct approach. You've constructed an array with
131,073 items to store a total of 18 strings. And the value passed in
the "err" parameter is a bitmask which can hold multiple taint flags.
What you should do is this:
const char *taint_strings[] = {
"G (Propriety module loaded)",
"F (Module force loaded)",
"S (Running on out of spec system)",
"R (Module force unloaded)",
...
"X (Auxilary)",
"T (Built with struct randomization)"
};
Then loop from 0 to ARRAY_SIZE(taint_strings) and print taint_strings[i]
if (err & (1 << i)) != 0
--
Martin Doucha mdoucha@suse.cz
QA Engineer for Software Maintenance
SUSE LINUX, s.r.o.
CORSO IIa
Krizikova 148/34
186 00 Prague 8
Czech Republic
More information about the ltp
mailing list