lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Wed, 23 Aug 2006 14:03:55 +0200 From: Jens Axboe <axboe@...e.de> To: Akinobu Mita <mita@...aclelinux.com> Cc: linux-kernel@...r.kernel.org, akpm@...l.org, okuji@...ug.org Subject: Re: [patch 4/5] fail-injection capability for disk IO On Wed, Aug 23 2006, Akinobu Mita wrote: > This patch provides fail-injection capability for disk IO. > > Boot option: > > fail_make_request=<probability>,<interval>,<times>,<space> > > <probability> > > specifies how often it should fail in percent. > > <interval> > > specifies the interval of failures. > > <times> > > specifies how many times failures may happen at most. > > <space> > > specifies the size of free space where disk IO can be issued > safely in bytes. > > Example: > > fail_make_request=100,10,-1,0 > > generic_make_request() fails once per 10 times. Hmm dunno, seems a pretty useless feature to me. Wouldn't it make a lot more sense to do this per-queue instead of a global entity? -- Jens Axboe - To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@...r.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/
Powered by blists - more mailing lists