From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1755224Ab2FZX60 (ORCPT ); Tue, 26 Jun 2012 19:58:26 -0400 Received: from mx1.redhat.com ([209.132.183.28]:50455 "EHLO mx1.redhat.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1754368Ab2FZX6Z (ORCPT ); Tue, 26 Jun 2012 19:58:25 -0400 Date: Tue, 26 Jun 2012 19:58:04 -0400 From: Dave Jones To: Andrew Morton Cc: Akinobu Mita , Greg KH , linux-kernel@vger.kernel.org, linux-mm@kvack.org, Paul Mackerras , =?iso-8859-1?Q?Am=E9rico?= Wang , linux-pm@lists.linux-foundation.org, linuxppc-dev@lists.ozlabs.org Subject: Re: [linux-pm] [PATCH -v4 6/6] fault-injection: add notifier error injection testing scripts Message-ID: <20120626235804.GA7525@redhat.com> Mail-Followup-To: Dave Jones , Andrew Morton , Akinobu Mita , Greg KH , linux-kernel@vger.kernel.org, linux-mm@kvack.org, Paul Mackerras , =?iso-8859-1?Q?Am=E9rico?= Wang , linux-pm@lists.linux-foundation.org, linuxppc-dev@lists.ozlabs.org References: <1340463502-15341-1-git-send-email-akinobu.mita@gmail.com> <1340463502-15341-7-git-send-email-akinobu.mita@gmail.com> <20120626163147.93181e21.akpm@linux-foundation.org> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20120626163147.93181e21.akpm@linux-foundation.org> User-Agent: Mutt/1.5.21 (2010-09-15) Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Tue, Jun 26, 2012 at 04:31:47PM -0700, Andrew Morton wrote: > My overall take on the fault-injection code is that there has been a > disappointing amount of uptake: I don't see many developers using them > for whitebox testing their stuff. I guess this patchset addresses > that, in a way. I added support for make-it-fail to my syscall fuzzer a while ago. (if the file exists, the child processes set it before calling the fuzzed syscall). I've not had a chance to really play with it, because I find enough problems already even without it. Dave From mboxrd@z Thu Jan 1 00:00:00 1970 From: Dave Jones Subject: Re: [linux-pm] [PATCH -v4 6/6] fault-injection: add notifier error injection testing scripts Date: Tue, 26 Jun 2012 19:58:04 -0400 Message-ID: <20120626235804.GA7525@redhat.com> References: <1340463502-15341-1-git-send-email-akinobu.mita@gmail.com> <1340463502-15341-7-git-send-email-akinobu.mita@gmail.com> <20120626163147.93181e21.akpm@linux-foundation.org> Mime-Version: 1.0 Content-Type: text/plain; charset=us-ascii Return-path: Content-Disposition: inline In-Reply-To: <20120626163147.93181e21.akpm@linux-foundation.org> Sender: owner-linux-mm@kvack.org To: Andrew Morton Cc: Akinobu Mita , Greg KH , linux-kernel@vger.kernel.org, linux-mm@kvack.org, Paul Mackerras , =?iso-8859-1?Q?Am=E9rico?= Wang , linux-pm@lists.linux-foundation.org, linuxppc-dev@lists.ozlabs.org List-Id: linux-pm@vger.kernel.org On Tue, Jun 26, 2012 at 04:31:47PM -0700, Andrew Morton wrote: > My overall take on the fault-injection code is that there has been a > disappointing amount of uptake: I don't see many developers using them > for whitebox testing their stuff. I guess this patchset addresses > that, in a way. I added support for make-it-fail to my syscall fuzzer a while ago. (if the file exists, the child processes set it before calling the fuzzed syscall). I've not had a chance to really play with it, because I find enough problems already even without it. Dave -- To unsubscribe, send a message with 'unsubscribe linux-mm' in the body to majordomo@kvack.org. For more info on Linux MM, see: http://www.linux-mm.org/ . Don't email: email@kvack.org From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from mx1.redhat.com (mx1.redhat.com [209.132.183.28]) by ozlabs.org (Postfix) with ESMTP id 78B70B6FC3 for ; Wed, 27 Jun 2012 09:58:21 +1000 (EST) Date: Tue, 26 Jun 2012 19:58:04 -0400 From: Dave Jones To: Andrew Morton Subject: Re: [linux-pm] [PATCH -v4 6/6] fault-injection: add notifier error injection testing scripts Message-ID: <20120626235804.GA7525@redhat.com> References: <1340463502-15341-1-git-send-email-akinobu.mita@gmail.com> <1340463502-15341-7-git-send-email-akinobu.mita@gmail.com> <20120626163147.93181e21.akpm@linux-foundation.org> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii In-Reply-To: <20120626163147.93181e21.akpm@linux-foundation.org> Cc: Greg KH , Akinobu Mita , linux-kernel@vger.kernel.org, linux-mm@kvack.org, Paul Mackerras , =?iso-8859-1?Q?Am=E9rico?= Wang , linux-pm@lists.linux-foundation.org, linuxppc-dev@lists.ozlabs.org List-Id: Linux on PowerPC Developers Mail List List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , On Tue, Jun 26, 2012 at 04:31:47PM -0700, Andrew Morton wrote: > My overall take on the fault-injection code is that there has been a > disappointing amount of uptake: I don't see many developers using them > for whitebox testing their stuff. I guess this patchset addresses > that, in a way. I added support for make-it-fail to my syscall fuzzer a while ago. (if the file exists, the child processes set it before calling the fuzzed syscall). I've not had a chance to really play with it, because I find enough problems already even without it. Dave