Received: by 2002:a05:6358:d09b:b0:dc:cd0c:909e with SMTP id jc27csp4516068rwb; Tue, 8 Nov 2022 18:59:51 -0800 (PST) X-Google-Smtp-Source: AMsMyM4a886mPAprIU8MN2d5YLU2GLzhYQ5zVI2UVQ4WktUQCY4XcDauuHQVX0at1TQhy9LPwsgv X-Received: by 2002:a63:101:0:b0:460:6d90:3f81 with SMTP id 1-20020a630101000000b004606d903f81mr49027827pgb.545.1667962791426; Tue, 08 Nov 2022 18:59:51 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1667962791; cv=none; d=google.com; s=arc-20160816; b=ltJqqVZV+Uc+oL71EANI7GLcLi5MmkaGOFMn2EuSisfvet6s8/HaKuVQSvk6tNhGiq vKSQIQPd6Ij7+Abo5UZsMaOPdvZssmreqSE4tF14RduCiZca+gHkR+W28bSfp8GO+zEP 8u2IppCOaUXOehjGY6ZHWAMy91+tQB8v4On/QLvobO/L7MEsSQO8Ubua70sldi7cq5Oh 1POVDJzMkJdEYOEXLLCusaI65i908cw3FvyLmDsj4wJBH9LFoVND0O2SO3kglK+xbE4k Nt3vTxsBNT9pw20SkqOUrKSzVB8GVfO5fTQrtiiPFNgq6j9k+GCUlgTB2/9Omiz+24zq ANjw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :message-id:date:subject:cc:to:from; bh=a/TdFrUlDzOJrTvpCV3e0MZuPqucZsdZT/XQTfeBaBA=; b=HCaFV2cY+vFkOkBWikfT6UZ9oKM8py+rupVzcThuglz9laZ3/ogcKBLQrVhQH+UQKJ 4UlcFp8WtYCV61X3M2unqecl3BRgMAfbAX0R7m6EYP2g4AWvfvX2aPkJ0fYHjC0aOKCV A3sU1HKzR26U34bwkhnCXdfZHG4/2t/iPHCGJsNYWpzGThFTPXYYeQRlKdkDWAN0Ep98 IxyS/munA5dc1zPvtkEOf9PaHTLLStWv39uRKr5PR0gVesl2NfBpo+buQvbD9xdMOASu VB2ogXDR352zFdxtgr31FhTqrbIYFY0AIPtsNjJGjxzMSrRhB0qwJTEOgA0fbCLnQmrf orzg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=QUARANTINE sp=QUARANTINE dis=NONE) header.from=huawei.com Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id z15-20020aa79f8f000000b005251aec9b1esi14463658pfr.225.2022.11.08.18.59.38; Tue, 08 Nov 2022 18:59:51 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=QUARANTINE sp=QUARANTINE dis=NONE) header.from=huawei.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S229591AbiKICnw (ORCPT + 93 others); Tue, 8 Nov 2022 21:43:52 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:35108 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229492AbiKICnu (ORCPT ); Tue, 8 Nov 2022 21:43:50 -0500 Received: from szxga01-in.huawei.com (szxga01-in.huawei.com [45.249.212.187]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 196E5FD14; Tue, 8 Nov 2022 18:43:49 -0800 (PST) Received: from dggpemm500024.china.huawei.com (unknown [172.30.72.56]) by szxga01-in.huawei.com (SkyGuard) with ESMTP id 4N6Thl1zc8zpWDb; Wed, 9 Nov 2022 10:40:07 +0800 (CST) Received: from dggpemm500017.china.huawei.com (7.185.36.178) by dggpemm500024.china.huawei.com (7.185.36.203) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2375.31; Wed, 9 Nov 2022 10:43:47 +0800 Received: from build.huawei.com (10.175.101.6) by dggpemm500017.china.huawei.com (7.185.36.178) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2375.31; Wed, 9 Nov 2022 10:43:47 +0800 From: Wenchao Hao To: "James E . J . Bottomley" , "Martin K . Petersen" , Doug Gilbert CC: , , Wenchao Hao Subject: [RFC PATCH 0/5] scsi:scsi_debug:Add error injection for single lun Date: Wed, 9 Nov 2022 10:59:45 -0500 Message-ID: <20221109155950.3536976-1-haowenchao@huawei.com> X-Mailer: git-send-email 2.32.0 MIME-Version: 1.0 Content-Transfer-Encoding: 7BIT Content-Type: text/plain; charset=US-ASCII X-Originating-IP: [10.175.101.6] X-ClientProxiedBy: dggems703-chm.china.huawei.com (10.3.19.180) To dggpemm500017.china.huawei.com (7.185.36.178) X-CFilter-Loop: Reflected X-Spam-Status: No, score=-1.0 required=5.0 tests=BAYES_00,DATE_IN_FUTURE_12_24, RCVD_IN_DNSWL_MED,SPF_HELO_NONE,SPF_PASS autolearn=no autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org The original error injection mechanism was based on scsi_host which could not inject fault for a single SCSI device. This patchset provides the ability to inject errors for a single SCSI device. Now we supports inject timeout errors, queuecommand errors, and hostbyte, driverbyte, statusbyte, and sense data for specific SCSI Command The first patch add an sysfs interface to add and inquiry single device's error injection info; the second patch defined how to remove an injection which has been added. The following 3 patches use the injection info and generate the related error type. Wenchao Hao (5): scsi:scsi_debug: Add sysfs interface to manager single devices' error inject scsi:scsi_debug: Add interface to remove injection which has been added scsi:scsi_debug: make command timeout if timeout error is injected scsi:scsi_debug: Return failed value for specific command's queuecommand scsi:scsi_debug: fail specific scsi command with result and sense data drivers/scsi/scsi_debug.c | 295 ++++++++++++++++++++++++++++++++++++++ 1 file changed, 295 insertions(+) -- 2.35.3