Received: by 10.192.165.148 with SMTP id m20csp137775imm; Fri, 20 Apr 2018 04:29:46 -0700 (PDT) X-Google-Smtp-Source: AIpwx48NYyWul8ZlnmgY2z1bmrKA9F4SdtZ35GUHPJDU+xCiBHgbX6ytTDif1VYbUHXomPOxQdD8 X-Received: by 10.99.179.6 with SMTP id i6mr8288685pgf.434.1524223786177; Fri, 20 Apr 2018 04:29:46 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1524223786; cv=none; d=google.com; s=arc-20160816; b=qASNDu32LHNnshc0d2lHgSKAkMJtPUfyxbrw+hSK0ZlSu0B6uYrpX5dpULdI17X7fp CtbjPA9LWw92hVq2jCwfyS0eJiZ2c5ZCly9WMIVNgumnhj18N7tXchCp3iqvs4jIXQlu tlA1iFVVQv9uzWOj5ZBRoG6dC+5k4skxBDG8arvp62MRUUasHicpVxGtx2z7IJ4/+s1t Q5xcB2x+vham3LGDzxTzJabOLbeoIVDrglIvXxBBwPSh4/ucQQBLjAe02hVsCppFNF0Q i+xcwwvN5n6JmMg/nQkAhLbhymbKq89qSV8NN9COzGoVVuGhQSTsHpjsih6IGMcDtW1b ckiA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding :content-language:in-reply-to:mime-version:user-agent:date :message-id:from:references:cc:to:subject:arc-authentication-results; bh=s+x6yDTWuq7dKax6ISvDF8luoN56aHuOs+63lZJY0rk=; b=vo7oZUWlO45vZ1/aBTm6SS9xax5zsFen0cvxW+CSp/86q7YVIFL0agLbGI9VXm0zr2 J7iYMML/LD53PlplNOUlUIxTWqXu4VnGm9H8xZS+r3ss17XqCPlLXBSFUD2Vy5+4BHHq eQa1G2MA1ps6NoBc06q8oVt0ZwMG4BKY4eqZAkqc+DX1I9HGhfXSLe9PmCB9N5A/y7X7 XgE5J7sv3P5dvCqDvkqzcSOPxmKl6OrYiMkTtSQxWJ2ONsC524eUx75HUNSSFXstVqbb l8Wlpv9ykGPd8sD1Z9bplN/5Vhs72GNttIBbqK+Wn6+rrqNiZS0DBltDA6ek31EnVhaY SA4A== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id 92-v6si571956plw.299.2018.04.20.04.29.31; Fri, 20 Apr 2018 04:29:46 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1754656AbeDTL2Z (ORCPT + 99 others); Fri, 20 Apr 2018 07:28:25 -0400 Received: from mx2.suse.de ([195.135.220.15]:40229 "EHLO mx2.suse.de" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1754549AbeDTL2X (ORCPT ); Fri, 20 Apr 2018 07:28:23 -0400 X-Virus-Scanned: by amavisd-new at test-mx.suse.de Received: from relay1.suse.de (charybdis-ext.suse.de [195.135.220.254]) by mx2.suse.de (Postfix) with ESMTP id 3CD1CAD48; Fri, 20 Apr 2018 11:28:22 +0000 (UTC) Subject: Re: [PATCH 3/3] xen blkback: add fault injection facility To: Stanislav Kinsburskii Cc: jakub.kicinski@netronome.com, hpa@zytor.com, mcroce@redhat.com, tglx@linutronix.de, ggarcia@abra.uab.cat, daniel@iogearbox.net, x86@kernel.org, mingo@redhat.com, xen-devel@lists.xenproject.org, axboe@kernel.dk, konrad.wilk@oracle.com, amir.jer.levy@intel.com, paul.durrant@citrix.com, stefanha@redhat.com, dsa@cumulusnetworks.com, boris.ostrovsky@oracle.com, linux-block@vger.kernel.org, wei.liu2@citrix.com, netdev@vger.kernel.org, linux-kernel@vger.kernel.org, davem@davemloft.net, dwmw@amazon.co.uk, roger.pau@citrix.com References: <20180420104603.17823.31095.stgit@dev-dsk-staskins-1a-ca5afbf2.eu-west-1.amazon.com> <20180420104736.17823.42983.stgit@dev-dsk-staskins-1a-ca5afbf2.eu-west-1.amazon.com> From: Juergen Gross Message-ID: Date: Fri, 20 Apr 2018 13:28:19 +0200 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:52.0) Gecko/20100101 Thunderbird/52.7.0 MIME-Version: 1.0 In-Reply-To: <20180420104736.17823.42983.stgit@dev-dsk-staskins-1a-ca5afbf2.eu-west-1.amazon.com> Content-Type: text/plain; charset=utf-8 Content-Language: de-DE Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 20/04/18 12:47, Stanislav Kinsburskii wrote: > This patch adds wrapper helpers around generic Xen fault inject > facility. > The major reason is to keep all the module fault injection directories > in a dedicated subdirectory instead of Xen fault inject root. > > IOW, when using these helpers, per-device and named by device name > fault injection control directories will appear under the following > directory: > - /sys/kernel/debug/xen/fault_inject/xen-blkback/ > instead of: > - /sys/kernel/debug/xen/fault_inject/ > > Signed-off-by: Stanislav Kinsburskii > CC: Jens Axboe > CC: Konrad Rzeszutek Wilk > CC: "Roger Pau Monné" > CC: linux-kernel@vger.kernel.org > CC: linux-block@vger.kernel.org > CC: xen-devel@lists.xenproject.org > CC: Stanislav Kinsburskii > CC: David Woodhouse This is an exact copy of the netback patch apart from the names. I don't like adding multiple copies of the same coding to the tree. Juergen