Received: by 2002:a25:b794:0:0:0:0:0 with SMTP id n20csp5686727ybh; Wed, 7 Aug 2019 09:44:49 -0700 (PDT) X-Google-Smtp-Source: APXvYqxJXc1MVL5bSN7tmEcgfyIlZGmsTEeAj/u46awqcFoSp2sr0FA2LL0ksm5LrKoClOR62maX X-Received: by 2002:a17:902:106:: with SMTP id 6mr9195495plb.64.1565196289340; Wed, 07 Aug 2019 09:44:49 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1565196289; cv=none; d=google.com; s=arc-20160816; b=Uq7IJi63AQ7rieJuTQy4sUsCc2SfyPkFuiJ2iSBeEyoUjpKw93D3SIYIQXam9ceaRL ORV9UdWUCyzL+EaAp/uzkdoW8n1xkme2hjhT3h10NQAEUlnhd6IMVKQxicpGAreO6EnB JLFjEizda3wcqlweRCSVvIisvgb9CLolEVDfyCqNtUuSBRsBbsQR8Ix15hNbUm+DsBop UiGHaSmVmdT78UCyki/rLMzbl8ri8ynDEp8xf+6e4axJHtKQFe6nKxhW/2l1/W9yepfU VxTSXAISvLXv/SxVngIFv/OVblDh7+YjFDOb6GIZV2w6fkx/IfoomNTEItMTOP997k9u 7zeg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:message-id:subject:cc :to:from:date:dkim-signature; bh=q212TWBWob+GPIMhBlXu/hyTk6fj5VhX0ouHyrL1hug=; b=PZGMnqdEY/siqs+EsKzqgebM9ZB8+gwBfV/SScARhh75hK+tGwvQBXKyS7PkvY0fB3 iZ24Movzmtk1qL387AMX6ey/ZUNw64VZqoMBDOGioNDhR3ovSMzmZp2g6nybNVPs+v1V t8KEHjT2RIEpDrSDxyBkCStoSmBPLPOmxkNhSa8uevw5lS2OD051MR/4nRV+X+II8ej1 ok29Wctz9+pvZXnwHu//lH0Klb3QvIKghAUNn2q9FcBbLfufn8bvQIvu1j5hIvkQ8IcB J6Ge+nqn1P4SZiLpH//ttUBKUGNEx7j8EskCFSPMaDJXPODbUj7ml7rE9m6BZGo5Vosy usCw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=SEj+6gpn; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id 29si53187752pgk.306.2019.08.07.09.44.33; Wed, 07 Aug 2019 09:44:49 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=SEj+6gpn; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2388912AbfHGQHM (ORCPT + 99 others); Wed, 7 Aug 2019 12:07:12 -0400 Received: from mail.kernel.org ([198.145.29.99]:50764 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S2387626AbfHGQHL (ORCPT ); Wed, 7 Aug 2019 12:07:11 -0400 Received: from willie-the-truck (236.31.169.217.in-addr.arpa [217.169.31.236]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 8A13A21BE6; Wed, 7 Aug 2019 16:07:06 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1565194030; bh=E8bdniH7GEe82u/7JEL+uxk6gjFBOvyc0Oi4etg1SVc=; h=Date:From:To:Cc:Subject:References:In-Reply-To:From; b=SEj+6gpnphgaOuGwin4BSXurY7dltSUAWKl1HeSn+kqS15h5ms8/G14epxZhTJgUK mHGkYeitoMqI4n99Q0+4t+6gSft95N6CpaSiCYPgJEQDOfnb7DRodvpDALtHfeOJxM 6TC/+7TGJwCx/duzyyqtESUSzkEgmwFgHUivMDWU= Date: Wed, 7 Aug 2019 17:07:03 +0100 From: Will Deacon To: Leo Yan Cc: Russell King , Oleg Nesterov , Catalin Marinas , Benjamin Herrenschmidt , Paul Mackerras , Michael Ellerman , Thomas Gleixner , Ingo Molnar , Borislav Petkov , "H. Peter Anvin" , x86@kernel.org, Arnd Bergmann , Alexei Starovoitov , Daniel Borkmann , Martin KaFai Lau , Song Liu , Yonghong Song , "Naveen N. Rao" , linux-arm-kernel@lists.infradead.org, linux-kernel@vger.kernel.org, linuxppc-dev@lists.ozlabs.org, linux-arch@vger.kernel.org, netdev@vger.kernel.org, bpf@vger.kernel.org, clang-built-linux@googlegroups.com, Masami Hiramatsu Subject: Re: [PATCH v2 0/3] arm/arm64: Add support for function error injection Message-ID: <20190807160703.pe4jxak7hs7ptvde@willie-the-truck> References: <20190806100015.11256-1-leo.yan@linaro.org> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20190806100015.11256-1-leo.yan@linaro.org> User-Agent: NeoMutt/20170113 (1.7.2) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Tue, Aug 06, 2019 at 06:00:12PM +0800, Leo Yan wrote: > This small patch set is to add support for function error injection; > this can be used to eanble more advanced debugging feature, e.g. > CONFIG_BPF_KPROBE_OVERRIDE. > > The patch 01/03 is to consolidate the function definition which can be > suared cross architectures, patches 02,03/03 are used for enabling > function error injection on arm64 and arm architecture respectively. > > I tested on arm64 platform Juno-r2 and one of my laptop with x86 > architecture with below steps; I don't test for Arm architecture so > only pass compilation. Thanks. I've queued the first two patches up here: https://git.kernel.org/pub/scm/linux/kernel/git/arm64/linux.git/log/?h=for-next/error-injection Will