Received: by 2002:a05:6358:9144:b0:117:f937:c515 with SMTP id r4csp7551rwr; Wed, 19 Apr 2023 02:34:23 -0700 (PDT) X-Google-Smtp-Source: AKy350YlE/UF/1Gpmxksd/N3n2Kr18HcMfllAAEa6dq8Pmcmg7CI8tAwpT9tXm95Y2jtEvBc3gPR X-Received: by 2002:a17:902:e54a:b0:1a9:1ff6:1152 with SMTP id n10-20020a170902e54a00b001a91ff61152mr1369940plf.11.1681896862764; Wed, 19 Apr 2023 02:34:22 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1681896862; cv=none; d=google.com; s=arc-20160816; b=kmk5ys4xSKH8QT2upIFPehuMjiRIYIvguMlqQxw73q3aPy/dLOsaWhryJEE5X8ykIO /PkKetzcBU90+dcw0tiSEjRHlxon9odIq1G9p4To7CXD0dR6vrt64xIb80axHGuDwEuD L4MUFOid9XssvN2PcAt/L4pg42NWX58AbgPxnRknlwq2G4o9xu2jNy4BCFKuf+PyzgSC VqIBpBDjqZvXWwuUyccsrIPKHN5anrRYyHs0mGmlkoaNetegliKKR+HTS/kd43fb6zYO rD1QR9+p95mLTwOsy81Wlf2+4msUSSD3mg9RzitFPdqDpKP/tec5+Ot+Q4AvZX8jd2ST +Ebg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:in-reply-to:content-disposition:mime-version :references:message-id:subject:cc:to:from:date:dkim-signature :dkim-signature; bh=7j4qJXIawGY6mpyNjNiUk4lxy3e36PGk3TvZkti17I0=; b=Po2pXuD6VCW0BOLRprvqBn1xg1Z7EtIYRHyG9ecHCwp5mRuro4cjcbuF6iYOt24iE6 Vug7pTtwM39eEgTfTQFcC2fPEDOMuychVp3mRf4rYWOCNrcMyOrF1RfmUsu3Vn1qQKFt pBplJ7JWBEXdKGq+N0Wu8wbX5nN/p+nQPZb9lei2e5to8YyAqCQCtMfRxzJxQZ/LOIyK YO9N4g5PxTyY1H1aLK8APZgV1r85WplYtrfWyGIcKQL2OU2o0bfMFjHh07o3oNS6Jgtu uIZX3tgBZTrGp/OWHefRNb/aEJZGGw37M6M5c/Vl5DJIE/LgKcXzkdpTmdD+qJS/043N oYyw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@suse.de header.s=susede2_rsa header.b=Tj94UxfK; dkim=neutral (no key) header.i=@suse.de; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=suse.de Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id f3-20020a170902e98300b001a50a33295esi15794555plb.278.2023.04.19.02.34.08; Wed, 19 Apr 2023 02:34:22 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@suse.de header.s=susede2_rsa header.b=Tj94UxfK; dkim=neutral (no key) header.i=@suse.de; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=suse.de Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S230521AbjDSJDj (ORCPT + 99 others); Wed, 19 Apr 2023 05:03:39 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:41406 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S230492AbjDSJDh (ORCPT ); Wed, 19 Apr 2023 05:03:37 -0400 Received: from smtp-out1.suse.de (smtp-out1.suse.de [IPv6:2001:67c:2178:6::1c]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 676EC19AA; Wed, 19 Apr 2023 02:03:35 -0700 (PDT) Received: from imap2.suse-dmz.suse.de (imap2.suse-dmz.suse.de [192.168.254.74]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature ECDSA (P-521) server-digest SHA512) (No client certificate requested) by smtp-out1.suse.de (Postfix) with ESMTPS id 1F69C218FA; Wed, 19 Apr 2023 09:03:34 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.de; s=susede2_rsa; t=1681895014; h=from:from:reply-to:date:date:message-id:message-id:to:to:cc:cc: mime-version:mime-version:content-type:content-type: in-reply-to:in-reply-to:references:references; bh=7j4qJXIawGY6mpyNjNiUk4lxy3e36PGk3TvZkti17I0=; b=Tj94UxfK6K7wLBKigrc77QBvPBsPY3QM40KxLpP4L0LQPc2W038uyhv3sIcCc9PE4Pl8BT He/xvrLP+yyOb7sNDD7lF7p08k55WDUc/AYRVXHGAXqN/4+sOFQxAfziCSTujQRivroeLw o43QR8IJGzXvf8OIqFION0pMXX+mx4o= DKIM-Signature: v=1; a=ed25519-sha256; c=relaxed/relaxed; d=suse.de; s=susede2_ed25519; t=1681895014; h=from:from:reply-to:date:date:message-id:message-id:to:to:cc:cc: mime-version:mime-version:content-type:content-type: in-reply-to:in-reply-to:references:references; bh=7j4qJXIawGY6mpyNjNiUk4lxy3e36PGk3TvZkti17I0=; b=53tm+o8syWXozVEDsTToCP6FxOj/tYgzwaWPw46EzsVUdElogZnK1JYTQ6i1RZDTcbFW5q J0w4T4jrXjagHGAw== Received: from imap2.suse-dmz.suse.de (imap2.suse-dmz.suse.de [192.168.254.74]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature ECDSA (P-521) server-digest SHA512) (No client certificate requested) by imap2.suse-dmz.suse.de (Postfix) with ESMTPS id 119F513580; Wed, 19 Apr 2023 09:03:34 +0000 (UTC) Received: from dovecot-director2.suse.de ([192.168.254.65]) by imap2.suse-dmz.suse.de with ESMTPSA id XglHBGauP2Q1fgAAMHmgww (envelope-from ); Wed, 19 Apr 2023 09:03:34 +0000 Date: Wed, 19 Apr 2023 11:03:33 +0200 From: Daniel Wagner To: linux-nvme@lists.infradead.org Cc: linux-kernel@vger.kernel.org, linux-block@vger.kernel.org, Sagi Grimberg , James Smart , Chaitanya Kulkarni , Martin Belanger , Shinichiro Kawasaki Subject: Re: [PATCH v3 0/4] nvmet-fcloop: unblock module removal Message-ID: References: <20230418130159.11075-1-dwagner@suse.de> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: X-Spam-Status: No, score=-4.4 required=5.0 tests=BAYES_00,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,RCVD_IN_DNSWL_MED,SPF_HELO_NONE, SPF_PASS,T_SCC_BODY_TEXT_LINE,URIBL_BLOCKED autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Tue, Apr 18, 2023 at 04:26:27PM +0200, Daniel Wagner wrote: > On Tue, Apr 18, 2023 at 03:43:22PM +0200, Daniel Wagner wrote: > > On Tue, Apr 18, 2023 at 03:01:55PM +0200, Daniel Wagner wrote: > > > nvme/041 (Create authenticated connections) [failed] > > > nvme/042 (Test dhchap key types for authenticated connections) [failed] > > > nvme/043 (Test hash and DH group variations for authenticated connections) [passed] > > > nvme/044 (Test bi-directional authentication) [failed] > > > nvme/045 (Test re-authentication) [passed] > > > > I suppose these should be disabled for fc as all this is tcp specific. > > After a fresh reboot the deleter tport, lport and rport trouble is back... > > nvme/003 (test if we're sending keep-alives to a discovery controller) [passed] > runtime 10.265s ... 10.365s > tests/nvme/rc: line 198: /sys/class/fcloop/ctl/del_target_port: No such file or directory > tests/nvme/rc: line 190: /sys/class/fcloop/ctl/del_local_port: No such file or directory > tests/nvme/rc: line 182: /sys/class/fcloop/ctl/del_remote_port: No such file or directory Eventually, I figured the out the root problem. The modules got unloaded before the resource were freed. This explains a lot of the nasty problems I saw. Anyway, I posted an updated blktests fixes but I think we should still consider these patches here. https://lore.kernel.org/linux-nvme/20230419084757.24846-1-dwagner@suse.de/ BTW, the authentication tests fail for fc, but not for the rest. And after reading up on it, it supposed to work on fc as well. So here we go first real bugs found.