Received: by 2002:a05:6358:9144:b0:117:f937:c515 with SMTP id r4csp4458660rwr; Sun, 23 Apr 2023 06:13:56 -0700 (PDT) X-Google-Smtp-Source: AKy350Y+RiMWFr7Chaag0ouYriUudlkWUSB0bokW6aXUNafVkmrYNoxTKxEXJwBfo3ixvAv0XDUF X-Received: by 2002:a17:903:2304:b0:1a9:1b4:9fdd with SMTP id d4-20020a170903230400b001a901b49fddmr12886334plh.2.1682255635932; Sun, 23 Apr 2023 06:13:55 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1682255635; cv=none; d=google.com; s=arc-20160816; b=JLAgpuhxkO10EeMODIvb76I7r/CffLWV7oUa4UM5503tvYq4tYFFCbbVp1pQf250fG jB40I1i2OleXgv3E7pJb9RZfqn1mChCzdHZt+4JlWRE8X0WiGOs2PtrnmMRtVPWZsL9I qJYDEJ1SaBhf2Ikwfe3vZO4cPAFc4TnWfn4j/nEj+ss7liZAJe/jN5+3PYAPJ3kT/2Yb 3yxAr+uJkezjdAZsLoy5tz9wswS5FvZ3iTIkmWnSgtucuwItno+XmVeSwQcxI1Ypf4GX eDTQtSGuWY6W9CnKwR+QAiPsVWJyD4YDfEzpxtgIHZYcp6PLVXYnj5Vgzv7vH/LiaRi/ OYqQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:in-reply-to:from :references:cc:to:subject:user-agent:mime-version:date:message-id; bh=Y943QBzifI/o92Fa0ZopMNdNetPFei+3YhIAJG5CUZ4=; b=hBf1Q+J2lQERG5xMm0Jq5p02r7LiDvviqb68wsZg8XtXAbwhwPz05vt1mgvdubSx0k 7LdSkMNROlYHIFkKCsCQNnAZzS+qx2E4m2N/zlfCK9T4e1SmTfRKOKgiGzar8Caei2QJ PQ1pju0irRO0Ctc6dOtfV6XjZPvQ4qaI6TXQufEi+Y8dxLB3pvc5qJpUiRJ10ACYrdrX e0WMPkKHR/qoPuOwNxLPGHGFBGX8XZ/ynqEr5lXY2E1s/hEekbqHLqLFbZB0mwLI3gRQ cD0QYGoodKsWeYsuvT+QSzdv9mKQhA8/81w0IokwdGsTtNTyhwfcsCvS7YTWefr7vSPG /uzQ== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=QUARANTINE sp=QUARANTINE dis=NONE) header.from=huawei.com Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id z14-20020a1709027e8e00b001a643243618si8652684pla.246.2023.04.23.06.13.41; Sun, 23 Apr 2023 06:13:55 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=QUARANTINE sp=QUARANTINE dis=NONE) header.from=huawei.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S229759AbjDWMye (ORCPT + 99 others); Sun, 23 Apr 2023 08:54:34 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:37528 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229709AbjDWMyd (ORCPT ); Sun, 23 Apr 2023 08:54:33 -0400 Received: from szxga03-in.huawei.com (szxga03-in.huawei.com [45.249.212.189]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 3A36E10D0 for ; Sun, 23 Apr 2023 05:54:31 -0700 (PDT) Received: from dggpemm500009.china.huawei.com (unknown [172.30.72.57]) by szxga03-in.huawei.com (SkyGuard) with ESMTP id 4Q47VN5l6BzKsxn; Sun, 23 Apr 2023 20:53:32 +0800 (CST) Received: from [10.174.178.209] (10.174.178.209) by dggpemm500009.china.huawei.com (7.185.36.225) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2507.23; Sun, 23 Apr 2023 20:54:27 +0800 Message-ID: Date: Sun, 23 Apr 2023 20:54:27 +0800 MIME-Version: 1.0 User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:102.0) Gecko/20100101 Thunderbird/102.9.0 Subject: Re: [PATCH 0/5] ubi: Enhanced fault injection capability for the UBI driver To: Richard Weinberger CC: Miquel Raynal , Vignesh Raghavendra , linux-mtd , linux-kernel , chengzhihao1 , yi zhang References: <20230318015621.1408243-1-wangzhaolong1@huawei.com> <1751647898.236371.1682111895850.JavaMail.zimbra@nod.at> From: ZhaoLong Wang In-Reply-To: <1751647898.236371.1682111895850.JavaMail.zimbra@nod.at> Content-Type: text/plain; charset="UTF-8"; format=flowed Content-Transfer-Encoding: 8bit X-Originating-IP: [10.174.178.209] X-ClientProxiedBy: dggems705-chm.china.huawei.com (10.3.19.182) To dggpemm500009.china.huawei.com (7.185.36.225) X-CFilter-Loop: Reflected X-Spam-Status: No, score=-6.4 required=5.0 tests=BAYES_00,NICE_REPLY_A, RCVD_IN_DNSWL_MED,SPF_HELO_NONE,SPF_PASS,T_SCC_BODY_TEXT_LINE autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Thank you very much for replying to my email. I agree with you. I'll tweak my patch in the next few weeks, try to keep the old interface and be compatible with the new interface. Best Regards ZhaoLong Wang 在 2023/4/22 5:18, Richard Weinberger 写道: > ----- Ursprüngliche Mail ----- >> Von: "ZhaoLong Wang" >> The existing fault injection capability of UBI is too simple. >> It uses hard-coded fault probability values and lacks other >> configurable options. As a result, these interfaces are difficult >> to use when digging defects in the abnormal path of code and >> reproducing some problems. >> >> The kernel provides a powerful fault injection framework, which >> provides rich configurable fault injection attributes during runtime. >> So it can be used to improve the fault injection capability of the >> UBI driver. >> >> This series of patches refactor the existing fault injection interface >> and add some fault injection types to help testers and developers >> find potential problems in the code. > In general I like having some new and advanced way to test UBI. > But your patches seem to remove the old interface from debugfs, > this will cause breakage of existing test scripts. > > So please keep the old interface too. > > Thanks, > //richard >