Received: by 2002:a05:6358:9144:b0:117:f937:c515 with SMTP id r4csp2797188rwr; Fri, 21 Apr 2023 14:25:13 -0700 (PDT) X-Google-Smtp-Source: AKy350a3QNb3BgcTgr94/w9gIJizQq4w0vKces5wGVrXQSnt/MPIvBTvelIMIrcPRJ8oHnu3XKs5 X-Received: by 2002:a05:6a00:f87:b0:63d:344c:f123 with SMTP id ct7-20020a056a000f8700b0063d344cf123mr6766815pfb.1.1682112313053; Fri, 21 Apr 2023 14:25:13 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1682112313; cv=none; d=google.com; s=arc-20160816; b=pMcc/oRnuGRwLL8p5nLfyRmy1bDQd4Blc/jV+nWCtJh3Uyv0lOX4de9hfH6w8H1+s0 PRN2it7Pl0ZV5/CUID5D59hDMhwFo0NiQ+/m8K/KgakElhQDhmwLCFo74gUvfEzu6LYk e0wEq+4u7iOJnu09IJKYbPxhcKlhQ2tpQw+EG4IgurC2mEBnkXsZaTMwhOw50IeIILin ODQ2nSWbLOekkIbghjdGP37XWbSYRra/1xMV91ej2SVsuwnLlxw99wdD11eg9V5kDBwd S7MVY24wjFYAa0oiG7wvMmtQPjAwdcDaCwHJSPL1Pg6ITXitJhYj+AaIteYojnoW6nj4 B9GQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:thread-index:thread-topic :content-transfer-encoding:mime-version:subject:references :in-reply-to:message-id:cc:to:from:date; bh=QM7UltNQ6JdrkKtNeqWR/vvLAuQI7vrAuoRVx2fG27Y=; b=III+hRJLLWHmFcbwEx1rUUiYdEUgIb9VwIXyMDeYGvebvdtpHY+khbavHiOVlRQL7V Hkt1RI+UizK/O1eoqcTFDuX/uXFbHQP7yect9ZGhR5XqWqoEJihTaifojg8aShDj1EJ5 ISUFPDlTX6H3B64+lJw9LFEO2oQU5h9r3+Sk2cvgmWxufyLAqEItiC3+iH5DhDJfWpEY +/0DDxH2miciL2NXX6LWQzRJwhsgMPvADfJY922Ruu4NIwzX0rXVsheQtzUwyb70AXq8 yWw0bixUawv7/+nKIl1l4ZJ3I2Ll0qU9VVfmsQUT7P0rZsfUSWnVMri9JSJ5m7ZH28kR VqMw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id j188-20020a6255c5000000b006262531b3cdsi5144904pfb.356.2023.04.21.14.25.02; Fri, 21 Apr 2023 14:25:13 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S233542AbjDUVSX convert rfc822-to-8bit (ORCPT + 99 others); Fri, 21 Apr 2023 17:18:23 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:56338 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229843AbjDUVSV (ORCPT ); Fri, 21 Apr 2023 17:18:21 -0400 Received: from lithops.sigma-star.at (lithops.sigma-star.at [195.201.40.130]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id F251B1FF0 for ; Fri, 21 Apr 2023 14:18:18 -0700 (PDT) Received: from localhost (localhost [127.0.0.1]) by lithops.sigma-star.at (Postfix) with ESMTP id 7B69B63CC16F; Fri, 21 Apr 2023 23:18:16 +0200 (CEST) Received: from lithops.sigma-star.at ([127.0.0.1]) by localhost (lithops.sigma-star.at [127.0.0.1]) (amavisd-new, port 10032) with ESMTP id SnRLdqdW0iV1; Fri, 21 Apr 2023 23:18:16 +0200 (CEST) Received: from localhost (localhost [127.0.0.1]) by lithops.sigma-star.at (Postfix) with ESMTP id 17D266418F2B; Fri, 21 Apr 2023 23:18:16 +0200 (CEST) Received: from lithops.sigma-star.at ([127.0.0.1]) by localhost (lithops.sigma-star.at [127.0.0.1]) (amavisd-new, port 10026) with ESMTP id auZ6_yP3xkVD; Fri, 21 Apr 2023 23:18:16 +0200 (CEST) Received: from lithops.sigma-star.at (lithops.sigma-star.at [195.201.40.130]) by lithops.sigma-star.at (Postfix) with ESMTP id EC79563CC16F; Fri, 21 Apr 2023 23:18:15 +0200 (CEST) Date: Fri, 21 Apr 2023 23:18:15 +0200 (CEST) From: Richard Weinberger To: ZhaoLong Wang Cc: Miquel Raynal , Vignesh Raghavendra , linux-mtd , linux-kernel , chengzhihao1 , yi zhang Message-ID: <1751647898.236371.1682111895850.JavaMail.zimbra@nod.at> In-Reply-To: <20230318015621.1408243-1-wangzhaolong1@huawei.com> References: <20230318015621.1408243-1-wangzhaolong1@huawei.com> Subject: Re: [PATCH 0/5] ubi: Enhanced fault injection capability for the UBI driver MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Transfer-Encoding: 8BIT X-Originating-IP: [195.201.40.130] X-Mailer: Zimbra 8.8.12_GA_3807 (ZimbraWebClient - FF97 (Linux)/8.8.12_GA_3809) Thread-Topic: Enhanced fault injection capability for the UBI driver Thread-Index: zOuMq5RgU5mOajBYreOdiSG1qqplFg== X-Spam-Status: No, score=-1.9 required=5.0 tests=BAYES_00,SPF_HELO_NONE, T_SCC_BODY_TEXT_LINE,T_SPF_PERMERROR autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org ----- Ursprüngliche Mail ----- > Von: "ZhaoLong Wang" > The existing fault injection capability of UBI is too simple. > It uses hard-coded fault probability values and lacks other > configurable options. As a result, these interfaces are difficult > to use when digging defects in the abnormal path of code and > reproducing some problems. > > The kernel provides a powerful fault injection framework, which > provides rich configurable fault injection attributes during runtime. > So it can be used to improve the fault injection capability of the > UBI driver. > > This series of patches refactor the existing fault injection interface > and add some fault injection types to help testers and developers > find potential problems in the code. In general I like having some new and advanced way to test UBI. But your patches seem to remove the old interface from debugfs, this will cause breakage of existing test scripts. So please keep the old interface too. Thanks, //richard