diff options
author | Wolfram Sang <wsa+renesas@sang-engineering.com> | 2021-06-03 15:58:41 +0300 |
---|---|---|
committer | Greg Kroah-Hartman <gregkh@linuxfoundation.org> | 2023-01-14 12:15:19 +0300 |
commit | f649e18c9c1036f02d372afff036f4afb1beeaf9 (patch) | |
tree | cd5fbc6d9a220ad783535ee3a8717c2b786e59b7 /net/ceph/crypto.c | |
parent | 869a37ad6f7827893082d0796e6191e879b6a5ef (diff) | |
download | linux-f649e18c9c1036f02d372afff036f4afb1beeaf9.tar.xz |
docs: fault-injection: fix non-working usage of negative values
[ Upstream commit 005747526d4f3c2ec995891e95cb7625161022f9 ]
Fault injection uses debugfs in a way that the provided values via sysfs
are interpreted as u64. Providing negative numbers results in an error:
/sys/kernel/debug/fail_function# echo -1 > times
sh: write error: Invalid argument
Update the docs and examples to use "printf %#x <val>" in these cases.
For "retval", reword the paragraph a little and fix a typo.
Signed-off-by: Wolfram Sang <wsa+renesas@sang-engineering.com>
Link: https://lore.kernel.org/r/20210603125841.27436-1-wsa+renesas@sang-engineering.com
Signed-off-by: Jonathan Corbet <corbet@lwn.net>
Stable-dep-of: d472cf797c4e ("debugfs: fix error when writing negative value to atomic_t debugfs file")
Signed-off-by: Sasha Levin <sashal@kernel.org>
Diffstat (limited to 'net/ceph/crypto.c')
0 files changed, 0 insertions, 0 deletions