public inbox for systemtap@sourceware.org
 help / color / mirror / Atom feed
From: Anup C Shan <anupcshan@gmail.com>
To: systemtap@sources.redhat.com
Cc: kghoshnitk@gmail.com, akinobu.mita@gmail.com, k-tanaka@ce.jp.nec.com
Subject: [RFC 2/5] Memory subsystem fault injection tapset
Date: Fri, 11 Jul 2008 10:08:00 -0000	[thread overview]
Message-ID: <487730B4.5070106@gmail.com> (raw)
In-Reply-To: <48773047.1050906@gmail.com>

[-- Attachment #1: Type: text/plain, Size: 1 bytes --]



[-- Attachment #2: mm-faultinject.stp --]
[-- Type: text/plain, Size: 1270 bytes --]

/*
 * This tapset contains functions and parameters specific to the 
 * memory management subsystem of the kernel.
 */

function fij_add_gfp_wait_param()
{
	fij_add_option("ignore_gfp_wait",1,
			"inject failures only into non-sleep allocations")
}

function fij_get_gfp_wait()
%{
	THIS->__retvalue = __GFP_WAIT;
%}

function fij_should_fail_gfp_wait(flags:long)
{
	GFPWAIT = fij_get_gfp_wait()
	if (fij_params["ignore_gfp_wait"] == 1) {
		if (flags&GFPWAIT) {
			fij_logger(100,
				sprintf("Skipping on ignore_gfp_wait %d",
								flags&GFPWAIT))
			return 0
		} else
			fij_logger(100,
				sprintf("Continuing on ignore_gfp_wait %d",
								flags&GFPWAIT))
	}
	return 1
}

function fij_add_gfp_highmem_param()
{
	fij_add_option("ignore_gfp_highmem",1,
			"1 => inject failures highmem/user allocations")
}

function fij_get_gfp_highmem()
%{
	THIS->__retvalue = __GFP_HIGHMEM;
%}

function fij_should_fail_gfp_highmem(flags:long)
{
	GFPHIGHMEM = fij_get_gfp_highmem()
	if (fij_params["ignore_gfp_highmem"] == 1) {
		if (flags&GFPHIGHMEM) {
			fij_logger(100,
				sprintf("Skipping on ignore_gfp_highmem %d",
							flags&GFPHIGHMEM))
			return 0
		} else
			fij_logger(100,
				sprintf("Continuing on ignore_gfp_highmem %d"
							,flags&GFPHIGHMEM))
	}
	return 1
}

  reply	other threads:[~2008-07-11 10:08 UTC|newest]

Thread overview: 5+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2008-07-11 10:06 [RFC 1/5] Kernel Fault injection framework using SystemTap Anup C Shan
2008-07-11 10:08 ` Anup C Shan [this message]
2008-07-11 10:10   ` [RFC 3/5] Slab allocation fault injection script Anup C Shan
2008-07-11 10:10     ` [RFC 4/5] Page " Anup C Shan
2008-07-12  1:58 ` [RFC 1/5] Kernel Fault injection framework using SystemTap Frank Ch. Eigler

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=487730B4.5070106@gmail.com \
    --to=anupcshan@gmail.com \
    --cc=akinobu.mita@gmail.com \
    --cc=k-tanaka@ce.jp.nec.com \
    --cc=kghoshnitk@gmail.com \
    --cc=systemtap@sources.redhat.com \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for read-only IMAP folder(s) and NNTP newsgroup(s).