Received: by 2002:a25:8b91:0:0:0:0:0 with SMTP id j17csp13334403ybl; Sun, 29 Dec 2019 09:31:57 -0800 (PST) X-Google-Smtp-Source: APXvYqzMBWtet8wL2SMOUBi4NqbowFptrq8QGHXZZOqV78GPLyHpai6KGhn64TYBJGdhtqCGAqwj X-Received: by 2002:a05:6830:681:: with SMTP id q1mr71693307otr.162.1577640717826; Sun, 29 Dec 2019 09:31:57 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1577640717; cv=none; d=google.com; s=arc-20160816; b=CocD0DeJ7sNd+E00jHSn61zOg922pCeX2uRL68e9F+uwkP1qOHgAIHkUykFD0vk8R7 YTUxlAaXYDfJXrFHg6eldcTC8DQM37zFiMyy/UhteFYKVzb/oUMKRi9tZJbzzud+5BlY gZFslmAhFe/XKbHuPuz+BAR4OgJz+Hta3qu6W7itEW+ulOrJlTu4JK0hJS6hIIsQGsJb tA053a5rO84R95JUSZS3lFKbKPopMLUGCx03fS7vKE5VfodUBOORA9eMIF8+zg3utTRQ FQTHhYU91whqp/mvmsudWYZhWuiW1rK9ElL0v3RnXESOZ9OlHE0J0StuCnj0GdFb9hQM LU/A== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=aQLt69z9ZxUezGJ/K9TSkdLt770ZtHJOXqRpmCUebAs=; b=Fcibsm4GmRg8I7X9/tnH3Sw3KDLwHRBib+rVJvmYNJJdxrgj8kX9C8LkTmyW7ptJmU KtOJyRk4q8nQhNih7UyKHrMFX8OBfBwNxOnUYEBciYf64RC1RCDAQLXudkjPjXrAKu/1 VFTLWmavi+LxbMplkxLIvjrFHOlPluQ0M+qQLz0XyLuZyBVXv5h44CH9KQh462Afhykc wRkxalPQbB/gq1Hz7myNVYphP28DqM5lB4d4IdkBrBq6MR3/MxJQqK2lrpyZrtud6ph8 Zt4mB1pAlXn/tsuay5SGIprywUoOzWwTxGkaojK1GhffAniyYzF0m+1Kg1LboIUXm1dW jWog== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=0R3PNYmP; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id e26si14962005otj.113.2019.12.29.09.31.47; Sun, 29 Dec 2019 09:31:57 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=0R3PNYmP; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728887AbfL2R3w (ORCPT + 99 others); Sun, 29 Dec 2019 12:29:52 -0500 Received: from mail.kernel.org ([198.145.29.99]:54908 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1728839AbfL2R3t (ORCPT ); Sun, 29 Dec 2019 12:29:49 -0500 Received: from localhost (83-86-89-107.cable.dynamic.v4.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 3658120722; Sun, 29 Dec 2019 17:29:48 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1577640588; bh=ufOD0zut50l7qEjz3ehKvPv2iU4SkU5G21+uEke8yGI=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=0R3PNYmPL9tcmLM3p6SQxWilnPpI3UnPOQIE/zGkfqMd0yfSjLFxBdL6ilV7yHii6 net8bzWazgMhdt17FLQPuwZH19UHiJAEVKcrJkUZaTql0AtsqJbGjStz+wHoyZGIJM UluaaX5CogHTJDAA2DC+LU6ey6brlAHT036GdnhU= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, "Daniel T. Lee" , Jesper Dangaard Brouer , "David S. Miller" , Sasha Levin Subject: [PATCH 4.19 058/219] samples: pktgen: fix proc_cmd command result check logic Date: Sun, 29 Dec 2019 18:17:40 +0100 Message-Id: <20191229162515.759492926@linuxfoundation.org> X-Mailer: git-send-email 2.24.1 In-Reply-To: <20191229162508.458551679@linuxfoundation.org> References: <20191229162508.458551679@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Daniel T. Lee [ Upstream commit 3cad8f911575191fb3b81d8ed0e061e30f922223 ] Currently, proc_cmd is used to dispatch command to 'pg_ctrl', 'pg_thread', 'pg_set'. proc_cmd is designed to check command result with grep the "Result:", but this might fail since this string is only shown in 'pg_thread' and 'pg_set'. This commit fixes this logic by grep-ing the "Result:" string only when the command is not for 'pg_ctrl'. For clarity of an execution flow, 'errexit' flag has been set. To cleanup pktgen on exit, trap has been added for EXIT signal. Signed-off-by: Daniel T. Lee Acked-by: Jesper Dangaard Brouer Signed-off-by: David S. Miller Signed-off-by: Sasha Levin --- samples/pktgen/functions.sh | 17 +++++++++++------ 1 file changed, 11 insertions(+), 6 deletions(-) diff --git a/samples/pktgen/functions.sh b/samples/pktgen/functions.sh index f8bb3cd0f4ce..7d928571b25c 100644 --- a/samples/pktgen/functions.sh +++ b/samples/pktgen/functions.sh @@ -5,6 +5,8 @@ # Author: Jesper Dangaaard Brouer # License: GPL +set -o errexit + ## -- General shell logging cmds -- function err() { local exitcode=$1 @@ -58,6 +60,7 @@ function pg_set() { function proc_cmd() { local result local proc_file=$1 + local status=0 # after shift, the remaining args are contained in $@ shift local proc_ctrl=${PROC_DIR}/$proc_file @@ -73,13 +76,13 @@ function proc_cmd() { echo "cmd: $@ > $proc_ctrl" fi # Quoting of "$@" is important for space expansion - echo "$@" > "$proc_ctrl" - local status=$? + echo "$@" > "$proc_ctrl" || status=$? - result=$(grep "Result: OK:" $proc_ctrl) - # Due to pgctrl, cannot use exit code $? from grep - if [[ "$result" == "" ]]; then - grep "Result:" $proc_ctrl >&2 + if [[ "$proc_file" != "pgctrl" ]]; then + result=$(grep "Result: OK:" $proc_ctrl) || true + if [[ "$result" == "" ]]; then + grep "Result:" $proc_ctrl >&2 + fi fi if (( $status != 0 )); then err 5 "Write error($status) occurred cmd: \"$@ > $proc_ctrl\"" @@ -105,6 +108,8 @@ function pgset() { fi } +[[ $EUID -eq 0 ]] && trap 'pg_ctrl "reset"' EXIT + ## -- General shell tricks -- function root_check_run_with_sudo() { -- 2.20.1