Received: by 2002:a05:6358:d09b:b0:dc:cd0c:909e with SMTP id jc27csp1421147rwb; Thu, 1 Dec 2022 17:34:02 -0800 (PST) X-Google-Smtp-Source: AA0mqf5Lb/178sMKdkb82mOi0Xw+Yl5YdCscsJdVKmXyzMs7oY9XJp7/ETGwlq3mUQfUlaeMgCt3 X-Received: by 2002:aa7:9892:0:b0:576:4aef:f1e7 with SMTP id r18-20020aa79892000000b005764aeff1e7mr2265486pfl.18.1669944841843; Thu, 01 Dec 2022 17:34:01 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1669944841; cv=none; d=google.com; s=arc-20160816; b=PigKi5GFWm9chskXqkbAeQDwT/Q/Ae+mclzeKaWj5t1QSrtOcp280ZRw6DEmnL01fp YIK4NLOUG6pNugnOM6/eOwIIOahWHtUMOXJenTJFfd8fZtSEETnydwvMo9RSbD7wmphW N3E2crineIEtY7Rd25ZUMsJ3rMs5GeHRPA3fVJBXfx2YnWakjCTauXNBU3rf1w5KwW3b YpYGHtsET+x1FYZo6y9i2UQTSLq8niGTEUS9rUn+ZlVtFz6JFZXWFQdYhb4mi0+xHxFu 74wf5RxbgDiWPmQeC7efSVfpBfHmJeBemQCbljM+UNUjhKahM5WVEqslnP5DR1O7K4rg AJ0w== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:mime-version:user-agent:references:message-id :in-reply-to:subject:cc:to:from:date:dkim-signature; bh=suaJE6rhXG0NljJP28iPjY2xQrOrMNzu8m369mjpUVg=; b=ykRRh5xOQOfLvbFdNydrW7FuRuUkJjVlv8Jq+KRRsmyRcWq9GSIXr5O86y/PXzxgOX Du1deLEY2n15M8LbKewAggqvVI8xDfPCOfWzV6iGJI7WbfmggmdtRwCbRRRQoCR+BZCk F3sxacBK+/8mC6yZjHz22pbbosW29nSg8eFVRv5Ew62uZzf4jg9OzhBzx2EepECUMNbo u7Bcpy65HmasOxOhuoUpsrZDobo+b8RhgMElzV8mMP9Yu+ijZwebtYEK76BfJkW+B5ef 1P9DL4hbWJBm1dteooLRGsXpPjqyp1vbdrxuJ304beuYBycpW2Mcw7aSqQ8uEFpJhDCl fbHQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=m+c3nf0f; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id 11-20020a63030b000000b0047018d5b375si6002269pgd.561.2022.12.01.17.33.51; Thu, 01 Dec 2022 17:34:01 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=m+c3nf0f; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S231667AbiLBBDL (ORCPT + 81 others); Thu, 1 Dec 2022 20:03:11 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:55052 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S232218AbiLBBDJ (ORCPT ); Thu, 1 Dec 2022 20:03:09 -0500 Received: from ams.source.kernel.org (ams.source.kernel.org [145.40.68.75]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 888BACCECA for ; Thu, 1 Dec 2022 17:03:08 -0800 (PST) Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ams.source.kernel.org (Postfix) with ESMTPS id 3B6B8B8206B for ; Fri, 2 Dec 2022 01:03:07 +0000 (UTC) Received: by smtp.kernel.org (Postfix) with ESMTPSA id B716AC433D6; Fri, 2 Dec 2022 01:03:02 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1669942986; bh=UYiR2KwlVMPHkoc3wjPpttxppo0m+c1eNSro/IUkOi8=; h=Date:From:To:cc:Subject:In-Reply-To:References:From; b=m+c3nf0f6Kc/qTWMo7WRforD99NC71b495YZjFqI1vnTWGau16Zq8VymR0wYD5Ugo ce/fd446+6tpYBdd6KxBUh2Mm3oOmyvNDTeZrBEkVfJMvI5t3R4saSBjxqoamvBO5f WYavhBHx/U1qzkv7ynRPbFiNIXGkCSTCc/HDvwFmwMp9E+1W8piRX/9ErmE9OAhQvo AapiKCGvetCAmxsoBmEYwDtu92LT+ZhU/B7MbLAXnBfb9tDJ+9PLWPfg5cU4sIahQF ACousRacwWtD5HrlP3MHfpAswC4DE2tCwZvW/mgWECbxiKJrL3QoFbqP/zHzD7lUSb 8UUmG8r5F81LA== Date: Fri, 2 Dec 2022 02:03:03 +0100 (CET) From: Jiri Kosina To: Linus Torvalds cc: Alexei Starovoitov , Andrew Morton , Chris Mason , Steven Rostedt , Borislav Petkov , LKML , Masami Hiramatsu , Peter Zijlstra , Kees Cook , Josh Poimboeuf , KP Singh , Mark Rutland , Florent Revest , Greg Kroah-Hartman , Christoph Hellwig , Benjamin Tissoires Subject: Re: [PATCH] error-injection: Add prompt for function error injection In-Reply-To: Message-ID: References: <20221121104403.1545f9b5@gandalf.local.home> <3fa8ec60-dd96-c41f-ea46-8856bf855949@meta.com> <20221122132905.12a8d5ad@gandalf.local.home> <20221130143719.07e36277d1471b83e9a1b627@linux-foundation.org> User-Agent: Alpine 2.21 (LSU 202 2017-01-01) MIME-Version: 1.0 Content-Type: text/plain; charset=US-ASCII X-Spam-Status: No, score=-7.1 required=5.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,RCVD_IN_DNSWL_HI, SPF_HELO_NONE,SPF_PASS autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Thu, 1 Dec 2022, Linus Torvalds wrote: > > Anyway, I believe [1] that ERROR_INJECTION has been designed as a > > debugging feature in the first place, and should stay so. After figuring > > out now that HID-BPF actually has hard dependence on it, I fully agree [2] > > that the series should be ditched for 6.2 and will work with Benjamin to > > have it removed from current hid.git#for-next. > > I do think that it is interesting to have a "let's have a bpf > insertion hook here", so I'm not against the _concept_ of HID doing > that. Absolutely, me neither, quite the contrary -- I am quite happy to see HID-BPF happening, because it'll actually make life easier for everybody: for people with quirky hardware (trivial testing of fixes), for kernel developers (trivial testing of fixes), and for distributions (trivial distribution of fixes). > It's not so different from user-mode drivers, after all, which we also > have. A kind of half-way state where we have a kernel driver, but one > that may need custom site-specific (or machine-specific) tweaks. Indeed. The whole rationale from Benjamin, explaining quite nicely why HID-BPF is a good thing, can be found in the very original, initial ancient cover letter: https://lore.kernel.org/lkml/20220224110828.2168231-1-benjamin.tissoires@redhat.com/ > So I don't want to come across as being against having bpf used for > tuning some HID issue (and I can imagine it making sense in other places > that have machine-specific tweaks - I'm thinking of all the thermal > probe or pincontrol mess where sometimes you have GPIO's or motherboard > thermal sensors etc that are literally "user connected it to X"). > > But the notion that we'd use some error injection framework for it, > and that you'd mix those concepts up - *that* I really think is just > horrendous. Fully agreed. I unfortunately missed that particular aspect during review, and it popped up only after HID-BPF appeared in linux-next. -- Jiri Kosina SUSE Labs