Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S932467AbdHWRbu (ORCPT ); Wed, 23 Aug 2017 13:31:50 -0400 Received: from esa2.hgst.iphmx.com ([68.232.143.124]:41951 "EHLO esa2.hgst.iphmx.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S932216AbdHWRbs (ORCPT ); Wed, 23 Aug 2017 13:31:48 -0400 X-IronPort-AV: E=Sophos;i="5.41,417,1498492800"; d="scan'208";a="141209655" From: Bart Van Assche To: "akinobu.mita@gmail.com" CC: "linux-kernel@vger.kernel.org" , "linux-block@vger.kernel.org" , "dvyukov@google.com" , "akpm@linux-foundation.org" , "mhocko@kernel.org" Subject: Re: [PATCH v2 1/2] fault-inject: Restore support for task-independent fault injection Thread-Topic: [PATCH v2 1/2] fault-inject: Restore support for task-independent fault injection Thread-Index: AQHTG5qI+aRdMEZSjky7RyvQ/PBtGqKRETOAgAEiwoA= Date: Wed, 23 Aug 2017 17:31:00 +0000 Message-ID: <1503509459.2484.13.camel@wdc.com> References: <20170822230043.9968-1-bart.vanassche@wdc.com> <20170822230043.9968-2-bart.vanassche@wdc.com> In-Reply-To: Accept-Language: en-US Content-Language: en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: authentication-results: spf=none (sender IP is ) smtp.mailfrom=Bart.VanAssche@wdc.com; x-originating-ip: [63.163.107.100] x-ms-publictraffictype: Email x-microsoft-exchange-diagnostics: 1;CY1PR0401MB1721;20:RXpRXxWVE8VxquHvuhMfhCLLm1WPbihFsWX1NWZ/ae2jfaEz1wRxcWrSQOu03c/VwwHYdx9Qpd6kbwt6YbRrEEYqz990O1ar102AX22bxm3ksLUa3lWI79Ynvx5aL1gevjnkbF6KMlEsypUknzQUR3c6Q6eAQLJpc1M1l/HHUWI= x-ms-exchange-antispam-srfa-diagnostics: SSOS; x-ms-office365-filtering-correlation-id: 62464c7a-b64a-4c83-31ef-08d4ea4cb8dc x-ms-office365-filtering-ht: Tenant x-microsoft-antispam: UriScan:;BCL:0;PCL:0;RULEID:(300000500095)(300135000095)(300000501095)(300135300095)(22001)(300000502095)(300135100095)(2017030254152)(48565401081)(300000503095)(300135400095)(2017052603187)(201703131423075)(201703031133081)(201702281549075)(300000504095)(300135200095)(300000505095)(300135600095)(300000506095)(300135500095);SRVR:CY1PR0401MB1721; x-ms-traffictypediagnostic: CY1PR0401MB1721: wdcipoutbound: EOP-TRUE x-exchange-antispam-report-test: UriScan:; x-microsoft-antispam-prvs: x-exchange-antispam-report-cfa-test: BCL:0;PCL:0;RULEID:(100000700101)(100105000095)(100000701101)(100105300095)(100000702101)(100105100095)(6040450)(601004)(2401047)(8121501046)(5005006)(10201501046)(100000703101)(100105400095)(93006095)(93001095)(3002001)(6055026)(6041248)(20161123558100)(201703131423075)(201702281528075)(201703061421075)(201703061406153)(20161123564025)(20161123562025)(20161123555025)(20161123560025)(6072148)(201708071742011)(100000704101)(100105200095)(100000705101)(100105500095);SRVR:CY1PR0401MB1721;BCL:0;PCL:0;RULEID:(100000800101)(100110000095)(100000801101)(100110300095)(100000802101)(100110100095)(100000803101)(100110400095)(100000804101)(100110200095)(100000805101)(100110500095);SRVR:CY1PR0401MB1721; x-forefront-prvs: 040866B734 x-forefront-antispam-report: SFV:NSPM;SFS:(10019020)(6009001)(39860400002)(199003)(189002)(24454002)(377424004)(2900100001)(8936002)(81156014)(8676002)(6916009)(66066001)(68736007)(478600001)(6436002)(39060400002)(229853002)(97736004)(6116002)(6486002)(81166006)(6506006)(2950100002)(86362001)(110136004)(2501003)(36756003)(6246003)(77096006)(102836003)(3846002)(4326008)(305945005)(103116003)(33646002)(2906002)(72206003)(14454004)(101416001)(5640700003)(3660700001)(53936002)(189998001)(99286003)(6512007)(105586002)(2351001)(54356999)(5660300001)(76176999)(106356001)(25786009)(54906002)(3280700002)(50986999)(7736002);DIR:OUT;SFP:1102;SCL:1;SRVR:CY1PR0401MB1721;H:CY1PR0401MB1536.namprd04.prod.outlook.com;FPR:;SPF:None;PTR:InfoNoRecords;A:1;MX:1;LANG:en; spamdiagnosticoutput: 1:99 spamdiagnosticmetadata: NSPM Content-Type: text/plain; charset="utf-8" Content-ID: <9BCC1355337BC54D81916DFDCD8CBE6B@namprd04.prod.outlook.com> MIME-Version: 1.0 X-OriginatorOrg: wdc.com X-MS-Exchange-CrossTenant-originalarrivaltime: 23 Aug 2017 17:31:00.5153 (UTC) X-MS-Exchange-CrossTenant-fromentityheader: Hosted X-MS-Exchange-CrossTenant-id: b61c8803-16f3-4c35-9b17-6f65f441df86 X-MS-Exchange-Transport-CrossTenantHeadersStamped: CY1PR0401MB1721 Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Content-Transfer-Encoding: 8bit X-MIME-Autoconverted: from base64 to 8bit by nfs id v7NHVtpY029121 Content-Length: 1100 Lines: 26 On Wed, 2017-08-23 at 09:10 +0900, Akinobu Mita wrote: > 2017-08-23 8:00 GMT+09:00 Bart Van Assche : > > Certain faults should be injected independent of the context > > in which these occur. Commit e41d58185f14 made it impossible to > > inject faults independent of their context. Restore support for > > task-independent fault injection by adding the attribute 'global'. > > There was a the problem reported by fail-make-request user and the > problem is introduced by the follow-up patches for systematic > fault injection. > > Please check the commit 9eeb52ae712e ("fault-inject: fix wrong > should_fail() decision in task context") and see if the problem > you reported is identical to the commit. Hello Akinobu, Since I was using the block layer for-next branch as the basis of my tests, commit 9eeb52ae712e was not present in the kernel tree used in my tests. However, with that commit 9eeb52ae712e applied I don't need my two patches anymore to inject block layer timeout faults successfully. So I'm fine with dropping my two patches. Sorry for the noise. Bart.