Received: by 2002:a05:6a10:22f:0:0:0:0 with SMTP id 15csp594456pxk; Wed, 23 Sep 2020 10:47:23 -0700 (PDT) X-Google-Smtp-Source: ABdhPJw4fc0yStAaxtf27hsZCEolYqNyM8KzErVEGJbc4PYzvxmdlRDYHPpWdAW9J+aIQRKAI1C0 X-Received: by 2002:aa7:cb8f:: with SMTP id r15mr510539edt.356.1600883242882; Wed, 23 Sep 2020 10:47:22 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1600883242; cv=none; d=google.com; s=arc-20160816; b=mmRvFH/dIi7nvfKScCFD0KbG+8RgeQK8KHAWccDDkXAfYV1sphw7GH0yC1eZrZOe5b L0ELLKUZN7k8P7BpGV35uWYOezoK2tJW04Czo1DO19HcJosgEYDhjpSqOMCuBaNDtDMs IjsVS99R6JantGEDse3gO9w75b+F4QaOYFCD2aM1wIr9X/y4UVzo97wt0/xEgMDcv3+u KZ1Pgb7JlJObWhzLfPqalP/nr9jsDi57GqT7kFp4lZ2ivNr1KhXFgdQO3d6Q0kIN7Kh8 IOPwNgNkHDiWPofTtUx7EVpRGQyqNywjFMJFDs5w1zdlOXio3X77HCCN1kldQPBovhKB 8mSQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:in-reply-to:content-disposition:mime-version :references:message-id:subject:cc:to:from:date:dkim-signature; bh=9fVRreP89O8OFVUPL/6Ua0CvQl+6kaxS8LDM2K3KiFI=; b=MXBWcqSf85lhG751gMajjrma8oQfErWEYSB8lBeEgT94n7tBB9KJRxr1ejDjKK0jUe +BKWwMCtUcs27VePRc0Spg/e6nr2x7nVKVboGqFvkB5ox+jIkAUKDsqN4Y+SR/9MFnEb /gEu9c0TWOmK1d6AxrnVEecc8VE4r2VeWnBXn6xrOIoYAML3JvCOgjqbFw/GUNYlIbGJ hNlqFZ6B1hFrOqpIbxnWsDRduT3zYIh1ArOGBu9BhJpm8RrmCVLyTc4GmUuQ81SqsLzX 4fDmyE4Hq0o5OjufFa3c0SCix19BMlgMnzcFNOf55O0aXQn8DLuc2fY6wW1lq28qY8Vk i58g== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=q5+c02wj; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id o9si512274ejr.108.2020.09.23.10.46.59; Wed, 23 Sep 2020 10:47:22 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=q5+c02wj; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726634AbgIWRp0 (ORCPT + 99 others); Wed, 23 Sep 2020 13:45:26 -0400 Received: from mail.kernel.org ([198.145.29.99]:45272 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726130AbgIWRpZ (ORCPT ); Wed, 23 Sep 2020 13:45:25 -0400 Received: from localhost (83-86-74-64.cable.dynamic.v4.ziggo.nl [83.86.74.64]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id A866C20665; Wed, 23 Sep 2020 17:45:24 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1600883125; bh=w57gLA/9GdadrUmtXx3y4slqkrBIQ4xrA6PFRXb3JHE=; h=Date:From:To:Cc:Subject:References:In-Reply-To:From; b=q5+c02wj9CcexOQDZEP1wD1mXA2n0wV6XuQdMVJ2WCZbm1bBA9VcHtPe+vh4jRQrh 0LJxvGIJINVFVIq2l7AfuZ6RDHd/vKY4JSM+FT04CPV6Lb4ajrs9pmH3U1vewfOsGW kQBnxuvVB9ob9Ml5OtNyMNr8RWkgiwwhabKYLcJI= Date: Wed, 23 Sep 2020 19:45:43 +0200 From: Greg Kroah-Hartman To: Maximilian Luz Cc: linux-kernel@vger.kernel.org, linux-serial@vger.kernel.org, Arnd Bergmann , Rob Herring , Jiri Slaby , =?utf-8?B?Qmxhxb4=?= Hrastnik , Dorian Stoll Subject: Re: [RFC PATCH 5/9] surface_aggregator: Add error injection capabilities Message-ID: <20200923174543.GA102853@kroah.com> References: <20200923151511.3842150-1-luzmaximilian@gmail.com> <20200923151511.3842150-6-luzmaximilian@gmail.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20200923151511.3842150-6-luzmaximilian@gmail.com> Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Wed, Sep 23, 2020 at 05:15:07PM +0200, Maximilian Luz wrote: > This commit adds error injection hooks to the Surface Serial Hub > communication protocol implementation, to: > > - simulate simple serial transmission errors, > > - drop packets, requests, and responses, simulating communication > failures and potentially trigger retransmission timeouts, as well as > > - inject invalid data into submitted and received packets. > > Together with the trace points introduced in the previous commit, these > facilities are intended to aid in testing, validation, and debugging of > the Surface Aggregator communication layer. > > Signed-off-by: Maximilian Luz Ok, this is ridiculous. You are dropping a whole new subsystem on us, with full documentation, correct driver model integration, crazy debugfs interactions (I made fun of the patch, but the code did work, you just did more work than was needed), proper auto-loading of modules, tracing, documentation for more things than is ever expected, and now you are adding error injection support? You just made all other code submissions of new subsystems I have gotten in the past 2 months look like total crud. Which, to be fair, they probably were, but wow, you just stepped up the level of professionalism to a whole new height. I can only dream that "real Linux companies" take note and try to follow this example. I think I will point them all at this in the future and say, "go do it like this one." very very very nice work, we owe you the beverage of your choice. greg k-h