Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1755244AbbGTOgg (ORCPT ); Mon, 20 Jul 2015 10:36:36 -0400 Received: from arcturus.aphlor.org ([188.246.204.175]:40649 "EHLO arcturus.aphlor.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1752913AbbGTOge (ORCPT ); Mon, 20 Jul 2015 10:36:34 -0400 Date: Mon, 20 Jul 2015 10:35:54 -0400 From: Dave Jones To: hpa@zytor.com, dbueso@suse.de, darren@dvhart.com, dave@stgolabs.net, linux-kernel@vger.kernel.org, mingo@kernel.org, peterz@infradead.org, tglx@linutronix.de Subject: Re: [tip:locking/core] futex: Fault/error injection capabilities Message-ID: <20150720143554.GA23521@codemonkey.org.uk> Mail-Followup-To: Dave Jones , hpa@zytor.com, dbueso@suse.de, darren@dvhart.com, dave@stgolabs.net, linux-kernel@vger.kernel.org, mingo@kernel.org, peterz@infradead.org, tglx@linutronix.de References: <1435645562-975-3-git-send-email-dave@stgolabs.net> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: User-Agent: Mutt/1.5.23 (2014-03-12) X-Spam-Score: -2.9 (--) X-Spam-Report: Spam report generated by SpamAssassin on "arcturus.aphlor.org" Content analysis details: (-2.9 points, 5.0 required) pts rule name description ---- ---------------------- -------------------------------------------------- -1.0 ALL_TRUSTED Passed through trusted hosts only via SMTP -1.9 BAYES_00 BODY: Bayes spam probability is 0 to 1% [score: 0.0000] X-Authenticated-User: davej@codemonkey.org.uk Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 1761 Lines: 42 On Mon, Jul 20, 2015 at 03:57:58AM -0700, tip-bot for Davidlohr Bueso wrote: > Commit-ID: ab51fbab39d864f3223e44a2600fd951df261f0b > Gitweb: http://git.kernel.org/tip/ab51fbab39d864f3223e44a2600fd951df261f0b > Author: Davidlohr Bueso > AuthorDate: Mon, 29 Jun 2015 23:26:02 -0700 > Committer: Thomas Gleixner > CommitDate: Mon, 20 Jul 2015 11:45:45 +0200 > > futex: Fault/error injection capabilities > > Although futexes are well known for being a royal pita, > we really have very little debugging capabilities - except > for relying on tglx's eye half the time. > > By simply making use of the existing fault-injection machinery, > we can improve this situation, allowing generating artificial > uaddress faults and deadlock scenarios. Of course, when this is > disabled in production systems, the overhead for failure checks > is practically zero -- so this is very cheap at the same time. > Future work would be nice to now enhance trinity to make use of > this. If you enable any of the fault injection modules, ie, like you demonstrate here: > +- /sys/kernel/debug/fail_futex/ignore-private: > + > + Format: { 'Y' | 'N' } > + default is 'N', setting it to 'Y' will disable failure injections > + when dealing with private (address space) futexes. > + each pid gets a a make-it-fail file in /proc/self/. If present, trinity will set this to 1 for child processes. So it should work today unless I've missed something. Dave -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/