mirror of
https://github.com/AuxXxilium/linux_dsm_epyc7002.git
synced 2024-12-28 11:18:45 +07:00
579e5ff629
Generalizing pkey_alloc__scnprintf_access_rights(), so that we can use it with other flags-like arguments, such as mount's mountflags argument. Cc: Adrian Hunter <adrian.hunter@intel.com> Cc: Benjamin Peterson <benjamin@python.org> Cc: David Ahern <dsahern@gmail.com> Cc: Jiri Olsa <jolsa@kernel.org> Cc: Namhyung Kim <namhyung@kernel.org> Cc: Wang Nan <wangnan0@huawei.com> Link: https://lkml.kernel.org/n/tip-o3ymi3104m8moaz9865g09w9@git.kernel.org Signed-off-by: Arnaldo Carvalho de Melo <acme@redhat.com>
55 lines
1.4 KiB
C
55 lines
1.4 KiB
C
// SPDX-License-Identifier: LGPL-2.1
|
|
/*
|
|
* trace/beauty/pkey_alloc.c
|
|
*
|
|
* Copyright (C) 2017, Red Hat Inc, Arnaldo Carvalho de Melo <acme@redhat.com>
|
|
*/
|
|
|
|
#include "trace/beauty/beauty.h"
|
|
#include <linux/kernel.h>
|
|
#include <linux/log2.h>
|
|
|
|
size_t strarray__scnprintf_flags(struct strarray *sa, char *bf, size_t size, unsigned long flags)
|
|
{
|
|
int i, printed = 0;
|
|
|
|
if (flags == 0) {
|
|
const char *s = sa->entries[0];
|
|
if (s)
|
|
return scnprintf(bf, size, "%s", s);
|
|
return scnprintf(bf, size, "%d", 0);
|
|
}
|
|
|
|
for (i = 1; i < sa->nr_entries; ++i) {
|
|
unsigned long bit = 1UL << (i - 1);
|
|
|
|
if (!(flags & bit))
|
|
continue;
|
|
|
|
if (printed != 0)
|
|
printed += scnprintf(bf + printed, size - printed, "|");
|
|
|
|
if (sa->entries[i] != NULL)
|
|
printed += scnprintf(bf + printed, size - printed, "%s", sa->entries[i]);
|
|
else
|
|
printed += scnprintf(bf + printed, size - printed, "0x%#", bit);
|
|
}
|
|
|
|
return printed;
|
|
}
|
|
|
|
static size_t pkey_alloc__scnprintf_access_rights(int access_rights, char *bf, size_t size)
|
|
{
|
|
#include "trace/beauty/generated/pkey_alloc_access_rights_array.c"
|
|
static DEFINE_STRARRAY(pkey_alloc_access_rights);
|
|
|
|
return strarray__scnprintf_flags(&strarray__pkey_alloc_access_rights, bf, size, access_rights);
|
|
}
|
|
|
|
size_t syscall_arg__scnprintf_pkey_alloc_access_rights(char *bf, size_t size, struct syscall_arg *arg)
|
|
{
|
|
unsigned long cmd = arg->val;
|
|
|
|
return pkey_alloc__scnprintf_access_rights(cmd, bf, size);
|
|
}
|