linux-kernel.vger.kernel.org archive mirror
 help / color / mirror / Atom feed
From: Dave Jones <davej@codemonkey.org.uk>
To: hpa@zytor.com, dbueso@suse.de, darren@dvhart.com,
	dave@stgolabs.net, linux-kernel@vger.kernel.org,
	mingo@kernel.org, peterz@infradead.org, tglx@linutronix.de
Subject: Re: [tip:locking/core] futex: Fault/error injection capabilities
Date: Mon, 20 Jul 2015 10:35:54 -0400	[thread overview]
Message-ID: <20150720143554.GA23521@codemonkey.org.uk> (raw)
In-Reply-To: <tip-ab51fbab39d864f3223e44a2600fd951df261f0b@git.kernel.org>

On Mon, Jul 20, 2015 at 03:57:58AM -0700, tip-bot for Davidlohr Bueso wrote:
 > Commit-ID:  ab51fbab39d864f3223e44a2600fd951df261f0b
 > Gitweb:     http://git.kernel.org/tip/ab51fbab39d864f3223e44a2600fd951df261f0b
 > Author:     Davidlohr Bueso <dave@stgolabs.net>
 > AuthorDate: Mon, 29 Jun 2015 23:26:02 -0700
 > Committer:  Thomas Gleixner <tglx@linutronix.de>
 > CommitDate: Mon, 20 Jul 2015 11:45:45 +0200
 > 
 > futex: Fault/error injection capabilities
 > 
 > Although futexes are well known for being a royal pita,
 > we really have very little debugging capabilities - except
 > for relying on tglx's eye half the time.
 > 
 > By simply making use of the existing fault-injection machinery,
 > we can improve this situation, allowing generating artificial
 > uaddress faults and deadlock scenarios. Of course, when this is
 > disabled in production systems, the overhead for failure checks
 > is practically zero -- so this is very cheap at the same time.
 > Future work would be nice to now enhance trinity to make use of
 > this.

If you enable any of the fault injection modules, ie, like you demonstrate here:

 > +- /sys/kernel/debug/fail_futex/ignore-private:
 > +
 > +	Format: { 'Y' | 'N' }
 > +	default is 'N', setting it to 'Y' will disable failure injections
 > +	when dealing with private (address space) futexes.
 > +

each pid gets a a make-it-fail file in /proc/self/.  If present, trinity will set this to 1
for child processes.

So it should work today unless I've missed something.

	Dave

  reply	other threads:[~2015-07-20 14:36 UTC|newest]

Thread overview: 11+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2015-06-30  6:26 [PATCH -tip 0/2] futex: Fault/error injection capabilities Davidlohr Bueso
2015-06-30  6:26 ` [PATCH 1/2] futex: Enhance comments in futex_lock_pi() for blocking paths Davidlohr Bueso
2015-07-20 10:57   ` [tip:locking/core] " tip-bot for Davidlohr Bueso
2015-07-20 21:24     ` Darren Hart
2015-07-20 21:59       ` Davidlohr Bueso
2015-07-20 22:02         ` Darren Hart
2015-06-30  6:26 ` [PATCH 2/2] futex: Fault/error injection capabilities Davidlohr Bueso
2015-07-20 10:57   ` [tip:locking/core] " tip-bot for Davidlohr Bueso
2015-07-20 14:35     ` Dave Jones [this message]
2015-07-13  9:41 ` [PATCH -tip 0/2] " Davidlohr Bueso
2015-07-16 12:55   ` Thomas Gleixner

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=20150720143554.GA23521@codemonkey.org.uk \
    --to=davej@codemonkey.org.uk \
    --cc=darren@dvhart.com \
    --cc=dave@stgolabs.net \
    --cc=dbueso@suse.de \
    --cc=hpa@zytor.com \
    --cc=linux-kernel@vger.kernel.org \
    --cc=mingo@kernel.org \
    --cc=peterz@infradead.org \
    --cc=tglx@linutronix.de \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).