Received: by 2002:a05:7412:d8a:b0:e2:908c:2ebd with SMTP id b10csp978rdg; Tue, 10 Oct 2023 02:21:52 -0700 (PDT) X-Google-Smtp-Source: AGHT+IE5Q2I7HfT2uV2a83JLkGMexNKa5gPj3k0GIPB08yzYOA1lPcbtNoMgN82RFmY05umbw3JD X-Received: by 2002:a05:6a20:8e28:b0:140:d536:d434 with SMTP id y40-20020a056a208e2800b00140d536d434mr22605192pzj.10.1696929712056; Tue, 10 Oct 2023 02:21:52 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1696929712; cv=none; d=google.com; s=arc-20160816; b=VTFG7ouQ9C6Ivqz1kZsSc43QWjOG5d9WmGjmB7bYDEhGRWxz1lqCHjqkXWqwrTkFjn K97wm2ksCHmJAckWCP4tvXVT5FDnprd4T9lejprlYOScnaAHVDXmAH16mjh2mJ9tB2Wz YvlaqpzDOtvGbI/gfO3ijtnUsN3xJuGJ3dCi9x+0Pdscds/CLjqgrUDZjbig0Xyc9ECM RRewYFORVsh5Q2Z9vxura6ks/SdhX53xaGMJg/CLgeKKRyqMDpI+iYARyHl3ZPhpJhBs pSpxYDMjQtv+tcaiJg650iOMZx27PnAZ/8Mh0r1RzkMZBotlO4GhNTng85/PfxgokZD2 V8Rg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :message-id:date:subject:cc:to:from; bh=sUDzXNRKDCl02vXqbGVSqTkI4sH1zxD4R1L0o3d/6bQ=; fh=Bw74vauKC02eaEbQr8FoniTYtc//6dp3BvPBLCS/H3M=; b=MEICIV2DaGhFLRq6Wf0Jg46J4/zclxXWZMP/o7homhV1sd+uWAF6dsBFQ7PxB79RdP OrksEDhNRvx1dVDTaNqKbqZF20iRtBurD/iI+jrpgSFKwdCmH/pbyVod7OGOPty9l0ft FQTOrk2cxtx3eSWKLGpmqS5CL3q02JE/4MZvrZRUO+S3g7d/wFejKfoAVnm67II6EFaJ Sqk4wr8JkzMngJcCeI+PEnEPx27divv8vjQUoHLjOfCoKldiWV/T6Y0GX5+RaQKLzqe9 c08wLyM1+YAnrK3TVLvxBUltKwqVGyrpB/piVXqFhW5ASvL+hSknhuhz2GTSHDZIkKIk cbgQ== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::3:7 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=QUARANTINE sp=QUARANTINE dis=NONE) header.from=huawei.com Return-Path: Received: from snail.vger.email (snail.vger.email. [2620:137:e000::3:7]) by mx.google.com with ESMTPS id p16-20020a056a000b5000b0069ce50e2e34si9120609pfo.290.2023.10.10.02.21.33 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Tue, 10 Oct 2023 02:21:52 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::3:7 as permitted sender) client-ip=2620:137:e000::3:7; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::3:7 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=QUARANTINE sp=QUARANTINE dis=NONE) header.from=huawei.com Received: from out1.vger.email (depot.vger.email [IPv6:2620:137:e000::3:0]) by snail.vger.email (Postfix) with ESMTP id D8FC0813A586; Tue, 10 Oct 2023 02:21:32 -0700 (PDT) X-Virus-Status: Clean X-Virus-Scanned: clamav-milter 0.103.10 at snail.vger.email Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S230062AbjJJJVZ (ORCPT + 99 others); Tue, 10 Oct 2023 05:21:25 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:60162 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229585AbjJJJVW (ORCPT ); Tue, 10 Oct 2023 05:21:22 -0400 Received: from szxga08-in.huawei.com (szxga08-in.huawei.com [45.249.212.255]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 51D0B9F; Tue, 10 Oct 2023 02:21:20 -0700 (PDT) Received: from kwepemm000012.china.huawei.com (unknown [172.30.72.57]) by szxga08-in.huawei.com (SkyGuard) with ESMTP id 4S4Vh60dQhz1M9Gb; Tue, 10 Oct 2023 17:18:46 +0800 (CST) Received: from build.huawei.com (10.175.101.6) by kwepemm000012.china.huawei.com (7.193.23.142) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2507.31; Tue, 10 Oct 2023 17:21:17 +0800 From: Wenchao Hao To: "Martin K . Petersen" , Douglas Gilbert CC: "James E . J . Bottomley" , , , , Wenchao Hao Subject: [PATCH v6 00/10] scsi:scsi_debug: Add error injection for single device Date: Tue, 10 Oct 2023 17:20:41 +0800 Message-ID: <20231010092051.608007-1-haowenchao2@huawei.com> X-Mailer: git-send-email 2.32.0 MIME-Version: 1.0 Content-Transfer-Encoding: 7BIT Content-Type: text/plain; charset=US-ASCII X-Originating-IP: [10.175.101.6] X-ClientProxiedBy: dggems703-chm.china.huawei.com (10.3.19.180) To kwepemm000012.china.huawei.com (7.193.23.142) X-CFilter-Loop: Reflected X-Spam-Status: No, score=-4.2 required=5.0 tests=BAYES_00,RCVD_IN_DNSWL_MED, SPF_HELO_NONE,SPF_PASS autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org X-Greylist: Sender passed SPF test, not delayed by milter-greylist-4.6.4 (snail.vger.email [0.0.0.0]); Tue, 10 Oct 2023 02:21:33 -0700 (PDT) The original error injection mechanism was based on scsi_host which could not inject fault for a single SCSI device. This patchset provides the ability to inject errors for a single SCSI device. Now we support inject timeout errors, queuecommand errors, and hostbyte, driverbyte, statusbyte, and sense data for specific SCSI Command. Two new error injection is defined to make abort command or reset LUN failed. Besides error injection for single device, this patchset add a new interface to make reset target failed for each scsi_target. The first two patch add a debugfs interface to add and inquiry single device's error injection info; the third patch defined how to remove an injection which has been added. The following 5 patches use the injection info and generate the related error type. The last two just add a new interface to make reset target failed and control scsi_device's allow_restart flag. V6: - Check return value of debugfs_create_xxx() and print error log if debugfs_create_xxx() return error - Fix typo in description of patch7 and patch8 - Update the description of patch10 V5: - Using rcu list to sync between error inject add, remove and check - Add module parameter "allow_restart" to control scsi_device's allow_restart flag V4: - Fix BUG_ON triggered by schedule in atomic context when rmmod scsi_debug Closes: https://lore.kernel.org/oe-lkp/202308031027.5941ce5f-oliver.sang@intel.com V3: - Add two more error types to fail abort command and lun reset - Fix memleak when rmmod scsi_debug without clearing errors injected - Fix memkeak because did not implement release in sdebug_error_fops - Fix possible NULL point access in scsi_debug_slave_destroy - Move specific error type's description to each single patch which implement this error type - Add interface to make target reset fail V2: - Using debugfs rather than sysfs attribute interface to manage error Wenchao Hao (10): scsi: scsi_debug: create scsi_debug directory in the debugfs filesystem scsi: scsi_debug: Add interface to manage single device's error inject scsi: scsi_debug: Define grammar to remove added error injection scsi: scsi_debug: timeout command if the error is injected scsi: scsi_debug: Return failed value if the error is injected scsi: scsi_debug: set command's result and sense data if the error is injected scsi: scsi_debug: Add new error injection abort failed scsi: scsi_debug: Add new error injection reset lun failed scsi: scsi_debug: Add debugfs interface to fail target reset scsi: scsi_debug: Add param to control sdev's allow_restart drivers/scsi/scsi_debug.c | 575 +++++++++++++++++++++++++++++++++++++- 1 file changed, 570 insertions(+), 5 deletions(-) -- 2.32.0