Received: by 2002:a05:7412:d8a:b0:e2:908c:2ebd with SMTP id b10csp2242573rdg; Sun, 15 Oct 2023 19:10:02 -0700 (PDT) X-Google-Smtp-Source: AGHT+IHYvCQbJi2uXAmvL7m6Vdi3bdHtkRtNzVBXaCPhE4mXVKbktzA47x6fd8ei/K2EYmsLlPIK X-Received: by 2002:a17:902:e54f:b0:1c9:f6df:8a88 with SMTP id n15-20020a170902e54f00b001c9f6df8a88mr9512924plf.26.1697422202056; Sun, 15 Oct 2023 19:10:02 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1697422202; cv=none; d=google.com; s=arc-20160816; b=MkhAgOAtMvCgvjMQ3SKoSpt/hRpeUf3BU42XO8oOd2XUT0x6XfxoGJsKao2mR1SUDM 8QqpjLjEnLrJTmTtOgiRGr0x6VvkvOldDZjLYOSk9wwhb010tf3bFuwfSrQHmwcC+yh1 PlKCLy6hDoZnFQE1AGUR3ngNV9M3iI3gU7ndnBJ1GLx3uft7ZSZLhU9/Cs5w98I8alt5 EZDZqcp4wkWMZNYb10aD46a4hVeoWzvpHdDey65C2ha9ydNSqibJhTnjC2A8sqGUd8/w YbD/dLfcJMvIGH766DUg3Js76EwstMdCs/L8VTWMcb1mc2emaWLrenI9BmiMiL7/Oetv ukQg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:in-reply-to:from :references:cc:to:content-language:subject:user-agent:mime-version :date:message-id; bh=HwhvCvIcxHfurCMyMNkg1E7Nvuskz0k/zYDhbZ5exJU=; fh=Tr4YG1ReBxfyg7o+f8n0SfjNv8LhYn87mLdZtcjZE6E=; b=rMU+nynu8uH044HfwDJCzhvFAv6AhAy4h997i+PxXmU/+BZl3y/t9W0UNuPAkIJHiJ 6Bjgdb6eE8dVh94TVmPFLlCgYdRDP4ULnrCLc/WvB6heO2ItHJLyK3IJy0Zycs4kSMMZ X8454mOc19hjuSLQAL/ATrEKp3jaAh7KE49xCYGne0ybZZYi/SlrMcADKWY3Ft/y3Apo hmEkfwvRC+SS9FcnMTKlUx+QXsCkEXMZz6PQs7qwUe9+PmrrKZBQAE6jQYV8tWxrKAvy iLtfjg1fZ6bh3iJp3xwFym08m1SnuIImQ/Bm+gTaVIJca2ICQbQYul2O9TwjBuYGHTMk MxsQ== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::3:6 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=QUARANTINE sp=QUARANTINE dis=NONE) header.from=huawei.com Return-Path: Received: from pete.vger.email (pete.vger.email. [2620:137:e000::3:6]) by mx.google.com with ESMTPS id bv64-20020a632e43000000b00585a45417a3si9390612pgb.156.2023.10.15.19.10.01 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Sun, 15 Oct 2023 19:10:02 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::3:6 as permitted sender) client-ip=2620:137:e000::3:6; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::3:6 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=QUARANTINE sp=QUARANTINE dis=NONE) header.from=huawei.com Received: from out1.vger.email (depot.vger.email [IPv6:2620:137:e000::3:0]) by pete.vger.email (Postfix) with ESMTP id 6FFC8805DEEB; Sun, 15 Oct 2023 19:09:59 -0700 (PDT) X-Virus-Status: Clean X-Virus-Scanned: clamav-milter 0.103.10 at pete.vger.email Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S231325AbjJPCJu (ORCPT + 99 others); Sun, 15 Oct 2023 22:09:50 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:43288 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S231135AbjJPCJt (ORCPT ); Sun, 15 Oct 2023 22:09:49 -0400 Received: from szxga08-in.huawei.com (szxga08-in.huawei.com [45.249.212.255]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 88123AB; Sun, 15 Oct 2023 19:09:47 -0700 (PDT) Received: from kwepemm000012.china.huawei.com (unknown [172.30.72.55]) by szxga08-in.huawei.com (SkyGuard) with ESMTP id 4S80qF33b0z15NRk; Mon, 16 Oct 2023 10:07:05 +0800 (CST) Received: from [10.174.178.220] (10.174.178.220) by kwepemm000012.china.huawei.com (7.193.23.142) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2507.31; Mon, 16 Oct 2023 10:09:44 +0800 Message-ID: Date: Mon, 16 Oct 2023 10:09:43 +0800 MIME-Version: 1.0 User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:102.0) Gecko/20100101 Thunderbird/102.8.0 Subject: Re: [PATCH v6 00/10] scsi:scsi_debug: Add error injection for single device Content-Language: en-US To: "Martin K . Petersen" , Douglas Gilbert CC: "James E . J . Bottomley" , , , References: <20231010092051.608007-1-haowenchao2@huawei.com> From: Wenchao Hao In-Reply-To: <20231010092051.608007-1-haowenchao2@huawei.com> Content-Type: text/plain; charset="UTF-8"; format=flowed Content-Transfer-Encoding: 7bit X-Originating-IP: [10.174.178.220] X-ClientProxiedBy: dggems701-chm.china.huawei.com (10.3.19.178) To kwepemm000012.china.huawei.com (7.193.23.142) X-CFilter-Loop: Reflected X-Spam-Status: No, score=-4.1 required=5.0 tests=HEADER_FROM_DIFFERENT_DOMAINS, MAILING_LIST_MULTI,NICE_REPLY_A,SPF_HELO_NONE,SPF_PASS autolearn=unavailable autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on pete.vger.email Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org X-Greylist: Sender passed SPF test, not delayed by milter-greylist-4.6.4 (pete.vger.email [0.0.0.0]); Sun, 15 Oct 2023 19:09:59 -0700 (PDT) On 2023/10/10 17:20, Wenchao Hao wrote: > The original error injection mechanism was based on scsi_host which > could not inject fault for a single SCSI device. > > This patchset provides the ability to inject errors for a single > SCSI device. Now we support inject timeout errors, queuecommand > errors, and hostbyte, driverbyte, statusbyte, and sense data for > specific SCSI Command. Two new error injection is defined to make > abort command or reset LUN failed. > > Besides error injection for single device, this patchset add a > new interface to make reset target failed for each scsi_target. > > The first two patch add a debugfs interface to add and inquiry single > device's error injection info; the third patch defined how to remove > an injection which has been added. The following 5 patches use the > injection info and generate the related error type. The last two just > add a new interface to make reset target failed and control > scsi_device's allow_restart flag. > Friendly ping... > V6: > - Check return value of debugfs_create_xxx() and print error log > if debugfs_create_xxx() return error > - Fix typo in description of patch7 and patch8 > - Update the description of patch10 > > V5: > - Using rcu list to sync between error inject add, remove and check > - Add module parameter "allow_restart" to control scsi_device's > allow_restart flag > > V4: > - Fix BUG_ON triggered by schedule in atomic context when rmmod scsi_debug > Closes: https://lore.kernel.org/oe-lkp/202308031027.5941ce5f-oliver.sang@intel.com > > V3: > - Add two more error types to fail abort command and lun reset > - Fix memleak when rmmod scsi_debug without clearing errors injected > - Fix memkeak because did not implement release in sdebug_error_fops > - Fix possible NULL point access in scsi_debug_slave_destroy > - Move specific error type's description to each single patch which > implement this error type > - Add interface to make target reset fail > > V2: > - Using debugfs rather than sysfs attribute interface to manage error > > Wenchao Hao (10): > scsi: scsi_debug: create scsi_debug directory in the debugfs filesystem > scsi: scsi_debug: Add interface to manage single device's error inject > scsi: scsi_debug: Define grammar to remove added error injection > scsi: scsi_debug: timeout command if the error is injected > scsi: scsi_debug: Return failed value if the error is injected > scsi: scsi_debug: set command's result and sense data if the error is injected > scsi: scsi_debug: Add new error injection abort failed > scsi: scsi_debug: Add new error injection reset lun failed > scsi: scsi_debug: Add debugfs interface to fail target reset > scsi: scsi_debug: Add param to control sdev's allow_restart > > drivers/scsi/scsi_debug.c | 575 +++++++++++++++++++++++++++++++++++++- > 1 file changed, 570 insertions(+), 5 deletions(-) >