Received: by 2002:ac8:156:0:b0:3e0:cd10:60c8 with SMTP id f22csp2499647qtg; Thu, 23 Mar 2023 04:58:36 -0700 (PDT) X-Google-Smtp-Source: AK7set8cG5X11CIG2M1r+9zMZnxmUynNCfx6eF8L+jyqkSzf+tlMEj/1lXnMIyWLsUPlJEj+IUUx X-Received: by 2002:a17:906:3e4b:b0:929:37c3:1021 with SMTP id t11-20020a1709063e4b00b0092937c31021mr9958268eji.48.1679572716024; Thu, 23 Mar 2023 04:58:36 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1679572716; cv=none; d=google.com; s=arc-20160816; b=akIcAXKrmDnkjf9mJQoGSKeP3YwIS/EdRr2FmCrifyOcwCPYKgqMTql+4WHwyCinKZ D14dmbxLFB8FbOAAhhh+nODZ53uNXdeFdU/OCSqZX9ujwZrcZyNuIpn9fWwynTW9dEWL FEOQ5q1bIE/z3gSnEI0KACS3AHA7RIX9M/1oWdsaAyD93Pq4B+xerLLuQqVN3vYJMeOS TCwjhvLETDFPJhabj33WfptJ6Wx3hWFu7OIEzdpLCVcBFe3Dq4KwRobTuz7apnwdHRAq 50rGAqS9aJTOetE0nzcRmtg4/aWAoX7fav9uXsv6ZAslYkAxsVCsbK0fRrne/Ift56Gt 5olQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :message-id:date:subject:cc:to:from; bh=orQZh5VUemF4Y9NDuleqmXFK7QWOLj3ensmnNr3qDP8=; b=ST5AtSN9pZ8eY2Jsb2tgqpBj8jW3Yan2IXB7nNkcS7kYg4hiijMk8/bx+9WHQtByjx ZlIsPz5fOuoEzEZJQvic2V4ndCB0FHNSrkNS7EYKmLsy+gI5+riRU85g3HH7CFh6IsWL fKvtF2BOka+m2wFORJH8GJTyPHtkFfb1NItke/O2qviz/I/ol2Ot8pfXVrQG7+IL0QZE 33yYCvq1eCc0hVc3qxxB7GpQxjtKRp9TILEyHA2qhZBalEpr7Qap43g/b96OPPIzWpx4 6HjBGphR8keoZMA8KwRfW7ztiiFthIp2VdK8tLRRyo/bqhxEHG1O+jMfoYFeZFaNA8qz +WtA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=QUARANTINE sp=QUARANTINE dis=NONE) header.from=huawei.com Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id ud11-20020a170907c60b00b00931ac4cb302si16608200ejc.948.2023.03.23.04.58.12; Thu, 23 Mar 2023 04:58:36 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=QUARANTINE sp=QUARANTINE dis=NONE) header.from=huawei.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S231344AbjCWL5i (ORCPT + 99 others); Thu, 23 Mar 2023 07:57:38 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:53984 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S231183AbjCWL5U (ORCPT ); Thu, 23 Mar 2023 07:57:20 -0400 Received: from szxga01-in.huawei.com (szxga01-in.huawei.com [45.249.212.187]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 47D8735261; Thu, 23 Mar 2023 04:56:56 -0700 (PDT) Received: from kwepemm600012.china.huawei.com (unknown [172.30.72.57]) by szxga01-in.huawei.com (SkyGuard) with ESMTP id 4Pj3dj110tzbcPB; Thu, 23 Mar 2023 19:53:45 +0800 (CST) Received: from build.huawei.com (10.175.101.6) by kwepemm600012.china.huawei.com (7.193.23.74) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2507.21; Thu, 23 Mar 2023 19:56:52 +0800 From: Wenchao Hao To: "James E . J . Bottomley" , "Martin K . Petersen" , Douglas Gilbert , , CC: , , Subject: [PATCH 0/5]scsi:scsi_debug: Add error injection for single device Date: Thu, 23 Mar 2023 19:55:56 +0800 Message-ID: <20230323115601.178494-1-haowenchao2@huawei.com> X-Mailer: git-send-email 2.32.0 MIME-Version: 1.0 Content-Transfer-Encoding: 7BIT Content-Type: text/plain; charset=US-ASCII X-Originating-IP: [10.175.101.6] X-ClientProxiedBy: dggems706-chm.china.huawei.com (10.3.19.183) To kwepemm600012.china.huawei.com (7.193.23.74) X-CFilter-Loop: Reflected X-Spam-Status: No, score=-2.3 required=5.0 tests=RCVD_IN_DNSWL_MED, SPF_HELO_NONE,SPF_PASS autolearn=unavailable autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org The original error injection mechanism was based on scsi_host which could not inject fault for a single SCSI device. This patchset provides the ability to inject errors for a single SCSI device. Now we supports inject timeout errors, queuecommand errors, and hostbyte, driverbyte, statusbyte, and sense data for specific SCSI Command. The first patch add an sysfs interface to add and inquiry single device's error injection info; the second patch defined how to remove an injection which has been added. The following 3 patches use the injection info and generate the related error type. Wenchao Hao (5): scsi:scsi_debug: Add sysfs interface to manage scsi devices' error injection scsi:scsi_debug: Define grammar to remove added error injection scsi:scsi_debug: timeout command if the error is injected scsi:scsi_debug: Return failed value if the error is injected scsi:scsi_debug: set command's result and sense data if the error is injected drivers/scsi/scsi_debug.c | 296 ++++++++++++++++++++++++++++++++++++++ 1 file changed, 296 insertions(+) -- 2.35.3