From patchwork Thu Dec 15 15:03:30 2022 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Chao Yu X-Patchwork-Id: 33668 Return-Path: Delivered-To: ouuuleilei@gmail.com Received: by 2002:adf:e747:0:0:0:0:0 with SMTP id c7csp413051wrn; Thu, 15 Dec 2022 07:07:50 -0800 (PST) X-Google-Smtp-Source: AA0mqf5USNvT/9/NDQ7TtRWGmZHjrZoj0YtP5E1i2yYD/d+HlO11mjPOMaCBC2aIGC0s9W2mSLH+ X-Received: by 2002:a17:902:bb8a:b0:189:abdd:400a with SMTP id m10-20020a170902bb8a00b00189abdd400amr30844046pls.15.1671116869860; Thu, 15 Dec 2022 07:07:49 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1671116869; cv=none; d=google.com; s=arc-20160816; b=vG2SQtdY+n8CbGhmLkcVxhyL7eo2/4fBWn1c3UqNylzs7p9SBPeFJLpdOg9FnGIJad +nEmJThnM2wx5ChTFNs7ItjhOtGRgj3R6fKKyndNczjJt/yb+OBluOSFeZ+Qr6SAQmqP APRwB+H685lK4jMHuaMB7b9DqlRXaEuApmB7/gYwZhruxhX/lisxe3Zdw0eQYkrEdmAi /oVcM6USEvR3gqHte3wp8171g3fBq1uPfYGmoqQRlHCnNOA0uTaCyYX4kmnh+FQ6JG7C PU6ZwwKXijHrns48Z1ALmXyXaPuuk3ahithxJDCpV63AGhOkifPXAi8Z8QxCQxnVKU+Z Z3aQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :message-id:date:subject:cc:to:from:dkim-signature; bh=ddqcWl9djDGmRaVcjcRwrBsXdNCed8EFy9fIXc09C2k=; b=WRoUVLpJEm+CfkyOVgg+Hc9Gj+Sf+CgkRmqLagslQu+ZsdewREsWvdYwDxfbkcdFwd 92ksn0kptvkHPPKOkhiE3kYbegcwtR4UMl8vH78hBIFeC4oLW1KOsu6fU1Fh3gRcrLIA xhdKb3JeAX4kRLNwgi7NMsxSL/hh5MY0A7sZyqjGzrDO/boWbgsCwdC/ipGNtll96BPq lw38GWT7741ZTiw8U7ValUK9H5BAceLovfMuD4WY0y8mkMlp/zD9tcXyAbfVjnPN7Pyu zuODFUSsFcG1yQQYjGo5P/zkagmZdZ/bdhOxWGp70NbqG7HDpBdvajbXblBw7fvk2yxF plSw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=N0gJMnnV; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id p13-20020a170902f08d00b00189e2777ec1si5440182pla.459.2022.12.15.07.07.35; Thu, 15 Dec 2022 07:07:49 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=N0gJMnnV; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S229506AbiLOPDp (ORCPT + 99 others); Thu, 15 Dec 2022 10:03:45 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:34422 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229742AbiLOPDm (ORCPT ); Thu, 15 Dec 2022 10:03:42 -0500 Received: from ams.source.kernel.org (ams.source.kernel.org [IPv6:2604:1380:4601:e00::1]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id A694B2F65B for ; Thu, 15 Dec 2022 07:03:41 -0800 (PST) Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ams.source.kernel.org (Postfix) with ESMTPS id 66A8EB81B51 for ; Thu, 15 Dec 2022 15:03:40 +0000 (UTC) Received: by smtp.kernel.org (Postfix) with ESMTPSA id 2E355C433D2; Thu, 15 Dec 2022 15:03:37 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1671116619; bh=in5CD1zMVADf1W0JGm7pLPBBonN1e05ohjCzNE+pQKY=; h=From:To:Cc:Subject:Date:From; b=N0gJMnnV22ePOdxgEKgpMWrhNDqEdffrWTnDAtsLLXSyRKLVMB9IHXaXxDCvLhUXp IhTok1aPSo6HRj795Dp2Y/SVaPbis8AEIXBOokvIEDmdIWE3jtgdaFAvx3BcCcOh7k w8XU/WwHtB7FMXKecAOOEkLyGKYn/Hb0ZYfq4tlrYxsCBK3GabxChEu/6gzD/zUYuZ fPaHGwSdOvgjGZHBNS4oVST/7muEs9pnlBvQ5mj5loK15I72joVcVcHNxvxmk4TJH8 /x23FGAx/gbby3hq3J4TEcPyyhaHUnZx6xCWNupdiuNSkmJqeZ9CHY8AIfZROL7tb+ 06zcy6kXPw1bQ== From: Chao Yu To: jaegeuk@kernel.org Cc: linux-f2fs-devel@lists.sourceforge.net, linux-kernel@vger.kernel.org, Chao Yu , Sheng Yong Subject: [PATCH v2] f2fs: add missing doc for fault injection sysfs Date: Thu, 15 Dec 2022 23:03:30 +0800 Message-Id: <20221215150330.39240-1-chao@kernel.org> X-Mailer: git-send-email 2.36.1 MIME-Version: 1.0 X-Spam-Status: No, score=-7.1 required=5.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,RCVD_IN_DNSWL_HI, SPF_HELO_NONE,SPF_PASS autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org X-getmail-retrieved-from-mailbox: =?utf-8?q?INBOX?= X-GMAIL-THRID: =?utf-8?q?1752288657747926987?= X-GMAIL-MSGID: =?utf-8?q?1752293042884922832?= We supported configuring fault injection parameter via sysfs w/ below commits, however, we forgot to add doc entry, fix it. commit 087968974fcd ("f2fs: add fault injection to sysfs") /sys/fs/f2fs/fault_injection/fault_* commit 1ecc0c5c50ce ("f2fs: support configuring fault injection per superblock") /sys/fs/f2fs//fault_* Cc: Sheng Yong Signed-off-by: Chao Yu --- v2: - fix to handle merge conflict correctly. Documentation/ABI/testing/sysfs-fs-f2fs | 39 +++++++++++++++++++++++++ 1 file changed, 39 insertions(+) diff --git a/Documentation/ABI/testing/sysfs-fs-f2fs b/Documentation/ABI/testing/sysfs-fs-f2fs index 9e3756625a81..aaa379bb8a8f 100644 --- a/Documentation/ABI/testing/sysfs-fs-f2fs +++ b/Documentation/ABI/testing/sysfs-fs-f2fs @@ -669,3 +669,42 @@ Contact: "Ping Xiong" Description: When DATA SEPARATION is on, it controls the age threshold to indicate the data blocks as warm. By default it was initialized as 2621440 blocks (equals to 10GB). + +What: /sys/fs/f2fs//fault_rate +Date: May 2016 +Contact: "Sheng Yong" +Contact: "Chao Yu" +Description: Enable fault injection in all supported types with + specified injection rate. + +What: /sys/fs/f2fs//fault_type +Date: May 2016 +Contact: "Sheng Yong" +Contact: "Chao Yu" +Description: Support configuring fault injection type, should be + enabled with fault_injection option, fault type value + is shown below, it supports single or combined type. + + =================== =========== + Type_Name Type_Value + =================== =========== + FAULT_KMALLOC 0x000000001 + FAULT_KVMALLOC 0x000000002 + FAULT_PAGE_ALLOC 0x000000004 + FAULT_PAGE_GET 0x000000008 + FAULT_ALLOC_BIO 0x000000010 (obsolete) + FAULT_ALLOC_NID 0x000000020 + FAULT_ORPHAN 0x000000040 + FAULT_BLOCK 0x000000080 + FAULT_DIR_DEPTH 0x000000100 + FAULT_EVICT_INODE 0x000000200 + FAULT_TRUNCATE 0x000000400 + FAULT_READ_IO 0x000000800 + FAULT_CHECKPOINT 0x000001000 + FAULT_DISCARD 0x000002000 + FAULT_WRITE_IO 0x000004000 + FAULT_SLAB_ALLOC 0x000008000 + FAULT_DQUOT_INIT 0x000010000 + FAULT_LOCK_OP 0x000020000 + FAULT_BLKADDR 0x000040000 + =================== ===========