Received: by 2002:a25:8b91:0:0:0:0:0 with SMTP id j17csp13385996ybl; Sun, 29 Dec 2019 10:37:45 -0800 (PST) X-Google-Smtp-Source: APXvYqyOmJGQRSv7/GxsyZ3qEu6WpOSDcOqS6/l+2RY/y0gA45X3NTapijMW0t3TcxDsMzqfx4gt X-Received: by 2002:a9d:4d86:: with SMTP id u6mr47310028otk.42.1577644665612; Sun, 29 Dec 2019 10:37:45 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1577644665; cv=none; d=google.com; s=arc-20160816; b=g/Q3HrPYni5xFmvfbmWGzRipV9T+xLmT+bj/vHlqPCZ3Fy3Nqd2HT6yXWA7NSs2JHY 5g1Anvx3JCce/e0mh0PX2eB4BUflSewRTVWxgahvqaE5NTuRjXszolrJFCliJFjJYsHI OISYVEILq3ABVPzk7W5QWV4yOpHqKUKq9kqxhs6cNr5MmaCVPPW3YwiZnae0tFyYjYOu 2aMQWZV8J5dwxlmt/pDcOFzJ0aK8ZvEjcny0pkzrVKOBXeR5j85RMj23zv9pkQ7fdwra CUhk0JXkCZv1WfBKkYKl5WiLFXmcOqUIE/8jEuX7VHaALWYYVFIV8Q//cBtqzN7QXVXf e0Zw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=FQlp7RsoTJqz6Bmfify8tW6IsAHO/IRYUXP34XEeW+w=; b=QSx5TLF0VIcM64eyuVBhfuEFyCVu53J+nGGvBFOaRIr5LGdSWmo9S5q/5pJL4smNmv nqh//mQtTuE34MSbUt5NvezE47sVMoF7PIrjBq3Pl2z6336om047RwSR5LOOW4/Yq7Ek Bigp+TkQwsVvUqZnFp8Tp5lHV4yWuWH91EYRG3BaI6JwClCjHUdyo1Ipb9VOFUm6215f vot7JT0HVIORjmPnSwjPL6K5mZRa0ZmWaaScbRGv0WXcwaRuO78mdKtsy3TBvcVPiRfh Hg8GO366NrHJp2+hra7V8q6tU1WcEhb1N9jqwyiogaVw7PwBZDTtUYpQlgHEqrMPHsr3 jWjg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=EU6q+qKq; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id j16si22445574otq.23.2019.12.29.10.37.34; Sun, 29 Dec 2019 10:37:45 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=EU6q+qKq; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727720AbfL2RYX (ORCPT + 99 others); Sun, 29 Dec 2019 12:24:23 -0500 Received: from mail.kernel.org ([198.145.29.99]:42942 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1727695AbfL2RYU (ORCPT ); Sun, 29 Dec 2019 12:24:20 -0500 Received: from localhost (83-86-89-107.cable.dynamic.v4.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id E5C7C20722; Sun, 29 Dec 2019 17:24:19 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1577640260; bh=av8gZuq+0abHRu6UaGoeAMPxv9tgYdnnG/MRCOMyuMU=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=EU6q+qKqp5ua3nkNY+dil1qRcJmkF213d7cZSFP10PVPw330xgTrBzOCzSPl3jKLs PZSEfJHkfLSoFR0PjfewN2e2zCMntLAgTjK/8W9BfWvFXMs7AtoZi5gv4C9YjOk3vI vcyUO9wtU7nVxiq9ytHzx672b7Hb73JOScWo3zDQ= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, "Daniel T. Lee" , Jesper Dangaard Brouer , "David S. Miller" , Sasha Levin Subject: [PATCH 4.14 046/161] samples: pktgen: fix proc_cmd command result check logic Date: Sun, 29 Dec 2019 18:18:14 +0100 Message-Id: <20191229162413.268801453@linuxfoundation.org> X-Mailer: git-send-email 2.24.1 In-Reply-To: <20191229162355.500086350@linuxfoundation.org> References: <20191229162355.500086350@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Daniel T. Lee [ Upstream commit 3cad8f911575191fb3b81d8ed0e061e30f922223 ] Currently, proc_cmd is used to dispatch command to 'pg_ctrl', 'pg_thread', 'pg_set'. proc_cmd is designed to check command result with grep the "Result:", but this might fail since this string is only shown in 'pg_thread' and 'pg_set'. This commit fixes this logic by grep-ing the "Result:" string only when the command is not for 'pg_ctrl'. For clarity of an execution flow, 'errexit' flag has been set. To cleanup pktgen on exit, trap has been added for EXIT signal. Signed-off-by: Daniel T. Lee Acked-by: Jesper Dangaard Brouer Signed-off-by: David S. Miller Signed-off-by: Sasha Levin --- samples/pktgen/functions.sh | 17 +++++++++++------ 1 file changed, 11 insertions(+), 6 deletions(-) diff --git a/samples/pktgen/functions.sh b/samples/pktgen/functions.sh index 205e4cde4601..065a7e296ee3 100644 --- a/samples/pktgen/functions.sh +++ b/samples/pktgen/functions.sh @@ -5,6 +5,8 @@ # Author: Jesper Dangaaard Brouer # License: GPL +set -o errexit + ## -- General shell logging cmds -- function err() { local exitcode=$1 @@ -58,6 +60,7 @@ function pg_set() { function proc_cmd() { local result local proc_file=$1 + local status=0 # after shift, the remaining args are contained in $@ shift local proc_ctrl=${PROC_DIR}/$proc_file @@ -73,13 +76,13 @@ function proc_cmd() { echo "cmd: $@ > $proc_ctrl" fi # Quoting of "$@" is important for space expansion - echo "$@" > "$proc_ctrl" - local status=$? + echo "$@" > "$proc_ctrl" || status=$? - result=$(grep "Result: OK:" $proc_ctrl) - # Due to pgctrl, cannot use exit code $? from grep - if [[ "$result" == "" ]]; then - grep "Result:" $proc_ctrl >&2 + if [[ "$proc_file" != "pgctrl" ]]; then + result=$(grep "Result: OK:" $proc_ctrl) || true + if [[ "$result" == "" ]]; then + grep "Result:" $proc_ctrl >&2 + fi fi if (( $status != 0 )); then err 5 "Write error($status) occurred cmd: \"$@ > $proc_ctrl\"" @@ -105,6 +108,8 @@ function pgset() { fi } +[[ $EUID -eq 0 ]] && trap 'pg_ctrl "reset"' EXIT + ## -- General shell tricks -- function root_check_run_with_sudo() { -- 2.20.1