On 11/22/2017 10:23 PM, Josef Bacik wrote: > From: Josef Bacik <jbacik@xxxxxx> > > Error injection is sloppy and very ad-hoc. BPF could fill this niche > perfectly with it's kprobe functionality. We could make sure errors are > only triggered in specific call chains that we care about with very > specific situations. Accomplish this with the bpf_override_funciton > helper. This will modify the probe'd callers return value to the > specified value and set the PC to an override function that simply > returns, bypassing the originally probed function. This gives us a nice > clean way to implement systematic error injection for all of our code > paths. > > Acked-by: Alexei Starovoitov <ast@xxxxxxxxxx> > Acked-by: Ingo Molnar <mingo@xxxxxxxxxx> > Signed-off-by: Josef Bacik <jbacik@xxxxxx> Series looks good to me as well; BPF bits: Acked-by: Daniel Borkmann <daniel@xxxxxxxxxxxxx> -- To unsubscribe from this list: send the line "unsubscribe linux-btrfs" in the body of a message to majordomo@xxxxxxxxxxxxxxx More majordomo info at http://vger.kernel.org/majordomo-info.html
