Received: by 2002:a05:6358:11c7:b0:104:8066:f915 with SMTP id i7csp5636821rwl; Tue, 11 Apr 2023 08:04:56 -0700 (PDT) X-Google-Smtp-Source: AKy350bRpd7XlcEeoZ1KXAXm3nuakM2Ci+YGFyxweHrNzN3B3XOKQUO9mM9GcnkeRUgCqDu7dIPp X-Received: by 2002:a17:906:454a:b0:94a:5602:5d6a with SMTP id s10-20020a170906454a00b0094a56025d6amr2913618ejq.9.1681225496611; Tue, 11 Apr 2023 08:04:56 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1681225496; cv=none; d=google.com; s=arc-20160816; b=ZbEKJm3ecE+fRpN+vrD7Hcc3wTh1HBxQFY6cH6aICcUDPGhQY0HCzB8sDi1ZeVhvDk rDMPRWFeuxFsmxU/Hcen/D4rdZ8lkNe+wx6Rb8+itgLyr1Yu6uCdLCj4ITTwxmsWnpXa 33y3wwEEOL1qQOsXNynr02jv2y1uMRWTe1mveCzCCv4q3Rj+gcDS5bEYDsEWh7ofLp5S YBZ8Io/r6hfgAaOnLEb6V/i6SoxPGNScn2LdEx+gplRzICSp3vE8nlp14yOD/GNff5Hm +LWFLrEOHRR8pWvRQ57l1Tr2vTnPqsdCtHNkqoAyedcc8Xy/60Rr9idvypBRp40T8P4b 2H0g== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:in-reply-to:content-disposition:mime-version :references:message-id:subject:cc:to:from:date:dkim-signature :dkim-signature; bh=obptCKCQzxtBRtmeQkubwSx5aUwtUWvLtRvvPs19XGQ=; b=dXd39xbxReQsubBCRZFfwcWHqmOC/90XWeLiNlpU1dJAHuSHC4UMEJUZEMgjn8jXal Wbb/b0F43tMVcJxtcUmgSJ+7pEQdgTZWlea76dvAhkVaVbilHDHmumliG5SVImUBhdBO PYvvLCL9pWrLINbB9oh0CGeZSz+AEiE79O7EyeXcrruxVaJy3EZaJnNJC9D0K1EbtrBG 7pplOoq0yBdUTVhPaPCRy74xIzb3N55CNYjKFzlxwRemPfwgl/p/S4p2jxrEXqpL8bLa UWEluI00Bsg2xFRFn/ID/v0PecEFmdvSWPj3U2QkkG8xWBbxFayIvcnqBVKNuBv1hTAq oqfQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@suse.de header.s=susede2_rsa header.b=xiYgXQh6; dkim=neutral (no key) header.i=@suse.de header.s=susede2_ed25519 header.b=u07dUPE9; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=suse.de Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id x21-20020a170906805500b0094a775a0bf2si208107ejw.155.2023.04.11.08.04.28; Tue, 11 Apr 2023 08:04:56 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@suse.de header.s=susede2_rsa header.b=xiYgXQh6; dkim=neutral (no key) header.i=@suse.de header.s=susede2_ed25519 header.b=u07dUPE9; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=suse.de Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S229492AbjDKPAw (ORCPT + 99 others); Tue, 11 Apr 2023 11:00:52 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:53212 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S230147AbjDKPAo (ORCPT ); Tue, 11 Apr 2023 11:00:44 -0400 Received: from smtp-out1.suse.de (smtp-out1.suse.de [195.135.220.28]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id D7E3D272B for ; Tue, 11 Apr 2023 08:00:39 -0700 (PDT) Received: from imap2.suse-dmz.suse.de (imap2.suse-dmz.suse.de [192.168.254.74]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature ECDSA (P-521) server-digest SHA512) (No client certificate requested) by smtp-out1.suse.de (Postfix) with ESMTPS id 82049219EF; Tue, 11 Apr 2023 15:00:38 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.de; s=susede2_rsa; t=1681225238; h=from:from:reply-to:date:date:message-id:message-id:to:to:cc:cc: mime-version:mime-version:content-type:content-type: in-reply-to:in-reply-to:references:references; bh=obptCKCQzxtBRtmeQkubwSx5aUwtUWvLtRvvPs19XGQ=; b=xiYgXQh6gxorTUcefpy17ytbQFVYoPYIIOyBDppJuO9Yf602EaDVgh0z759AuDTGGNqkxX GqLaW/g2Q3cBmHeV0arsnzOFExcF8ERnQNJz8eMp94W5ilJbuk7tcgD2PeQiGkOYEw8/jr 0zGRhaUvbmpX8CGzIx1PfFgphTq8nFE= DKIM-Signature: v=1; a=ed25519-sha256; c=relaxed/relaxed; d=suse.de; s=susede2_ed25519; t=1681225238; h=from:from:reply-to:date:date:message-id:message-id:to:to:cc:cc: mime-version:mime-version:content-type:content-type: in-reply-to:in-reply-to:references:references; bh=obptCKCQzxtBRtmeQkubwSx5aUwtUWvLtRvvPs19XGQ=; b=u07dUPE9HzhxeWCrY8FmNs4IG1IMB95tbUdQVdqGEAqzigjbF68axqKAjGwJNPEEIRHtLU brVgJLTsWJFysYAQ== Received: from imap2.suse-dmz.suse.de (imap2.suse-dmz.suse.de [192.168.254.74]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature ECDSA (P-521) server-digest SHA512) (No client certificate requested) by imap2.suse-dmz.suse.de (Postfix) with ESMTPS id 7473D13638; Tue, 11 Apr 2023 15:00:38 +0000 (UTC) Received: from dovecot-director2.suse.de ([192.168.254.65]) by imap2.suse-dmz.suse.de with ESMTPSA id IedkHBZ2NWRobQAAMHmgww (envelope-from ); Tue, 11 Apr 2023 15:00:38 +0000 Date: Tue, 11 Apr 2023 17:00:37 +0200 From: Daniel Wagner To: linux-nvme@lists.infradead.org Cc: linux-kernel@vger.kernel.org, Sagi Grimberg , James Smart , Chaitanya Kulkarni , Shin'ichiro Kawasaki Subject: Re: [PATCH v2 0/4] nvmet-fcloop: unblock module removal Message-ID: References: <20230411120718.14477-1-dwagner@suse.de> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20230411120718.14477-1-dwagner@suse.de> X-Spam-Status: No, score=-2.5 required=5.0 tests=DKIM_SIGNED,DKIM_VALID, DKIM_VALID_AU,DKIM_VALID_EF,RCVD_IN_DNSWL_MED,SPF_HELO_NONE,SPF_PASS autolearn=unavailable autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Tue, Apr 11, 2023 at 02:07:14PM +0200, Daniel Wagner wrote: > loop: module loaded > run blktests nvme/003 at 2023-04-11 13:55:57 > nvmet: adding nsid 1 to subsystem blktests-subsystem-1 > nvme nvme0: NVME-FC{0}: create association : host wwpn 0x20001100aa000002 rport wwpn 0x20001100aa000001: NQN "nqn.2014-08.org.nvmexpress.discovery" > (NULL device *): {0:0} Association created > [71] nvmet: ctrl 1 start keep-alive timer for 120 secs > nvmet: creating discovery controller 1 for subsystem nqn.2014-08.org.nvmexpress.discovery for NQN nqn.2014-08.org.nvmexpress:uuid:242d4a24-2484-4a80-8234-d0169409c5e8. > nvme nvme0: NVME-FC{0}: controller connect complete > nvme nvme0: NVME-FC{0}: new ctrl: NQN "nqn.2014-08.org.nvmexpress.discovery" > nvme nvme1: NVME-FC{1}: create association : host wwpn 0x20001100aa000002 rport wwpn 0x20001100aa000001: NQN "blktests-subsystem-1" > (NULL device *): {0:1} Association created > [453] nvmet: ctrl 2 start keep-alive timer for 5 secs > nvmet: creating nvm controller 2 for subsystem blktests-subsystem-1 for NQN nqn.2014-08.org.nvmexpress:uuid:242d4a24-2484-4a80-8234-d0169409c5e8. > [71] nvmet: adding queue 1 to ctrl 2. > [45] nvmet: adding queue 2 to ctrl 2. > [453] nvmet: adding queue 3 to ctrl 2. > [105] nvmet: adding queue 4 to ctrl 2. > nvme nvme1: NVME-FC{1}: controller connect complete > nvme nvme1: NVME-FC{1}: new ctrl: NQN "blktests-subsystem-1" > [453] nvmet: ctrl 2 reschedule traffic based keep-alive timer > [105] nvmet: ctrl 2 update keep-alive timer for 5 secs > [105] nvmet: ctrl 2 update keep-alive timer for 5 secs > nvme nvme0: Removing ctrl: NQN "nqn.2014-08.org.nvmexpress.discovery" > [45] nvmet: ctrl 1 stop keep-alive > (NULL device *): {0:0} Association deleted > (NULL device *): {0:0} Association freed > (NULL device *): Disconnect LS failed: No Association It turns out this sequence is triggered the udev auto connect rules. As I read the _setup_nvmet() code, the connect should happen via blktest and not udev. Obviously, this messes with the test case. I'll try to figure out how we can disable the udev rules during test run.