From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-7.6 required=3.0 tests=DKIMWL_WL_HIGH,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,MAILING_LIST_MULTI,MENTIONS_GIT_HOSTING, SPF_HELO_NONE,SPF_PASS,USER_AGENT_SANE_1 autolearn=unavailable autolearn_force=no version=3.4.0 Received: from mail.kernel.org (mail.kernel.org [198.145.29.99]) by smtp.lore.kernel.org (Postfix) with ESMTP id 037CEC433FF for ; Wed, 7 Aug 2019 16:07:15 +0000 (UTC) Received: from vger.kernel.org (vger.kernel.org [209.132.180.67]) by mail.kernel.org (Postfix) with ESMTP id C7C9A21E73 for ; Wed, 7 Aug 2019 16:07:14 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1565194034; bh=E8bdniH7GEe82u/7JEL+uxk6gjFBOvyc0Oi4etg1SVc=; h=Date:From:To:Cc:Subject:References:In-Reply-To:List-ID:From; b=DC5aDnmVt1PI6JSnl+SylDD+iCOQocKAR6mGnLsOcSYx22eNB/EZ8+RNIZ0QyK3bQ r7SYWh2nNmFiqnFPlx/pSa0RUi82w3u51ZYXF7UWPE9dpSwLF91gbC0X+2knIZEfED 8N+eLUml30U4M5xzdBXrnf74C/l/YPYWBZ6XFJX4= Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2388910AbfHGQHM (ORCPT ); Wed, 7 Aug 2019 12:07:12 -0400 Received: from mail.kernel.org ([198.145.29.99]:50764 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S2387626AbfHGQHL (ORCPT ); Wed, 7 Aug 2019 12:07:11 -0400 Received: from willie-the-truck (236.31.169.217.in-addr.arpa [217.169.31.236]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 8A13A21BE6; Wed, 7 Aug 2019 16:07:06 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1565194030; bh=E8bdniH7GEe82u/7JEL+uxk6gjFBOvyc0Oi4etg1SVc=; h=Date:From:To:Cc:Subject:References:In-Reply-To:From; b=SEj+6gpnphgaOuGwin4BSXurY7dltSUAWKl1HeSn+kqS15h5ms8/G14epxZhTJgUK mHGkYeitoMqI4n99Q0+4t+6gSft95N6CpaSiCYPgJEQDOfnb7DRodvpDALtHfeOJxM 6TC/+7TGJwCx/duzyyqtESUSzkEgmwFgHUivMDWU= Date: Wed, 7 Aug 2019 17:07:03 +0100 From: Will Deacon To: Leo Yan Cc: Russell King , Oleg Nesterov , Catalin Marinas , Benjamin Herrenschmidt , Paul Mackerras , Michael Ellerman , Thomas Gleixner , Ingo Molnar , Borislav Petkov , "H. Peter Anvin" , x86@kernel.org, Arnd Bergmann , Alexei Starovoitov , Daniel Borkmann , Martin KaFai Lau , Song Liu , Yonghong Song , "Naveen N. Rao" , linux-arm-kernel@lists.infradead.org, linux-kernel@vger.kernel.org, linuxppc-dev@lists.ozlabs.org, linux-arch@vger.kernel.org, netdev@vger.kernel.org, bpf@vger.kernel.org, clang-built-linux@googlegroups.com, Masami Hiramatsu Subject: Re: [PATCH v2 0/3] arm/arm64: Add support for function error injection Message-ID: <20190807160703.pe4jxak7hs7ptvde@willie-the-truck> References: <20190806100015.11256-1-leo.yan@linaro.org> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20190806100015.11256-1-leo.yan@linaro.org> User-Agent: NeoMutt/20170113 (1.7.2) Sender: netdev-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: netdev@vger.kernel.org On Tue, Aug 06, 2019 at 06:00:12PM +0800, Leo Yan wrote: > This small patch set is to add support for function error injection; > this can be used to eanble more advanced debugging feature, e.g. > CONFIG_BPF_KPROBE_OVERRIDE. > > The patch 01/03 is to consolidate the function definition which can be > suared cross architectures, patches 02,03/03 are used for enabling > function error injection on arm64 and arm architecture respectively. > > I tested on arm64 platform Juno-r2 and one of my laptop with x86 > architecture with below steps; I don't test for Arm architecture so > only pass compilation. Thanks. I've queued the first two patches up here: https://git.kernel.org/pub/scm/linux/kernel/git/arm64/linux.git/log/?h=for-next/error-injection Will