[Crash-utility] [PATCH 0/3] Show that the kernel is tainted at init-time
lijiang
lijiang at redhat.com
Thu Nov 18 09:06:15 UTC 2021
On Mon, Nov 15, 2021 at 5:00 PM <crash-utility-request at redhat.com> wrote:
> Date: Mon, 15 Nov 2021 08:58:56 +0000
> From: HAGIO KAZUHITO(?????) <k-hagio-ab at nec.com>
> To: "Discussion list for crash utility usage, maintenance and
> development" <crash-utility at redhat.com>
> Cc: "atomlin at atomlin.com" <atomlin at atomlin.com>
> Subject: Re: [Crash-utility] [PATCH 0/3] Show that the kernel is
> tainted at init-time
> Message-ID:
> <
> TYYPR01MB6777B57F3C397E7C9F0F7E14DD989 at TYYPR01MB6777.jpnprd01.prod.outlook.com
> >
>
> Content-Type: text/plain; charset="iso-2022-jp"
>
> Hi Aaron,
>
> sorry for the delay.
>
> -----Original Message-----
> > The goal of this patchset is to explicitly indicate to the
> > user that the Linux kernel is "tainted" at init-time or
> > when the 'sys' command is used. In additional to the above
> > show_kernel_taints() has been consolidated to avoid
> > duplication and hopefully improve readability.
>
> That would be usuful and looks more readable, thanks.
>
> To stop the compilation warning below, with initializing the variables,
> Acked-by: Kazuhito Hagio <k-hagio-ab at nec.com>
>
>
> cc -c -g -DX86_64 -DLZO -DSNAPPY -DZSTD -DGDB_10_2 kernel.c -Wall -O2
> -Wstrict-prototypes -Wmissing-prototypes -fstack-protector -Wformat-security
> kernel.c: In function ?show_kernel_taints?:
> kernel.c:11268:12: warning: ?sp? may be used uninitialized in this
> function [-Wmaybe-uninitialized]
> tnts_addr = sp->value;
> ~~~~~~~~~~^~~~~~~~~~~
> kernel.c:11222:6: warning: ?tnts_len? may be used uninitialized in this
> function [-Wmaybe-uninitialized]
> int tnts_len;
> ^~~~~~~~
>
> --- a/kernel.c
> +++ b/kernel.c
> @@ -11219,11 +11219,11 @@ show_kernel_taints(char *buf, int verbose)
> int i, bx;
> uint8_t tnt_bit;
> char tnt_true, tnt_false;
> - int tnts_len;
> + int tnts_len = 0;
> ulong tnts_addr;
> ulong tainted_mask, *tainted_mask_ptr;
> int tainted;
> - struct syment *sp;
> + struct syment *sp = NULL;
>
> if (kernel_symbol_exists("tainted")) {
> get_symbol_data("tainted", sizeof(int), &tainted);
>
>
Applied together with the above warning fixes and code indent fixes :
[1]
https://github.com/crash-utility/crash/commit/bfa596f40650e5a061b15d41b0a5b108610b11e9
[2]
https://github.com/crash-utility/crash/commit/64f48ee6719632895cd8a0922e84a4626e3790d8
[3]
https://github.com/crash-utility/crash/commit/b0dd73d2368275e101688b2aca0bc297fd1ba300
Thank you for the patchset, Aaron.
------
ERROR: trailing whitespace
#111: FILE: kernel.c:11233:
+^I} else if (VALID_STRUCT(tnt) || $
ERROR: trailing whitespace
#113: FILE: kernel.c:11235:
+^I^Iif (!VALID_STRUCT(tnt)) { $
ERROR: trailing whitespace
#180: FILE: kernel.c:11278:
+^I^I^I^IKVADDR, &tnt_bit, sizeof(uint8_t), $
ERROR: trailing whitespace
#185: FILE: kernel.c:11283:
+^I^I^I^I^IKVADDR, &tnt_true, sizeof(char), $
ERROR: trailing whitespace
#190: FILE: kernel.c:11288:
+^I^I^I^I^IKVADDR, &tnt_false, sizeof(char), $
total: 5 errors, 0 warnings, 204 lines checked
>
> >
> >
> > Aaron Tomlin (3):
> > kernel: consolidate show_kernel_taints()
> > kernel: Introduce is_kernel_tainted()
> > kernel: show that the kernel is tainted at init-time
> >
> > kernel.c | 210 ++++++++++++++++++++++++++-----------------------------
> > 1 file changed, 98 insertions(+), 112 deletions(-)
> >
> > --
> > 2.31.1
> >
>
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://listman.redhat.com/archives/crash-utility/attachments/20211118/cc8a8754/attachment.htm>
More information about the Crash-utility
mailing list