lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Thu, 30 Apr 2015 14:33:48 +0200 From: Richard Weinberger <richard@....at> To: dsterba@...e.cz, Bartosz Golaszewski <bgolaszewski@...libre.com>, LKML <linux-kernel@...r.kernel.org>, linux-kbuild <linux-kbuild@...r.kernel.org> Subject: Re: [RFC] scripts: kerrno.sh - errno translator Am 30.04.2015 um 14:25 schrieb David Sterba: > On Thu, Apr 30, 2015 at 01:29:41PM +0200, Bartosz Golaszewski wrote: >> 2015-04-30 13:04 GMT+02:00 Richard Weinberger <richard.weinberger@...il.com>: >>> On Thu, Apr 30, 2015 at 12:53 PM, Bartosz Golaszewski >>> <bgolaszewski@...libre.com> wrote: >>>> Shell script allowing to find errno definitions and descriptions in the >>>> kernel source. >>>> >>>> Signed-off-by: Bartosz Golaszewski <bgolaszewski@...libre.com> >>>> --- >>>> This is a simple script I use when seeing messages like: >>>> >>>> some_func() failed: -123 >>> >>> What is wrong with a one-liner like: >>> gcc -E -dD - < include/uapi/linux/errno.h |grep -E "^#define E.* 123$" >> >> Nothing really - the output is less nice, that's all. > > I'd find a helper script useful in situations where I don't know the > error code immediatelly and have to convert it from a hexa value first. > Eg. when RAX contains an error code after a BUG_ON: > > RAX: 00000000ffffffe4 > > this translates to -28 == -ENOSPC. You mean a script where you can pipe a register dump into and it tries to translate all registers values to meaningful values? Yes, that would be nice... :) Thanks, //richard -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@...r.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/
Powered by blists - more mailing lists