Received: by 2002:a05:6358:3188:b0:123:57c1:9b43 with SMTP id q8csp6040892rwd; Mon, 19 Jun 2023 01:08:07 -0700 (PDT) X-Google-Smtp-Source: ACHHUZ4iQFIu8tdA/NbVCRaeWuDbgOkg07se23SQ2Oya29Hg77de7nKDYEFW3NQEnyiz9witXrY5 X-Received: by 2002:a17:903:48c:b0:1b1:99c9:8ce5 with SMTP id jj12-20020a170903048c00b001b199c98ce5mr16236140plb.16.1687162087165; Mon, 19 Jun 2023 01:08:07 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1687162087; cv=none; d=google.com; s=arc-20160816; b=0sauj+ZpXEJtaauRr444/n+SF4+XopaLAnSBa0HNDGaYr3GfAVP6+PNbDBvTs5WPth SO5A/NpFVVUjee8lD8vXGxxfxjS2TUFhFVy2nRKAIcoercXSSSfSkTW/He2F5TVR3XW1 6tJcFw18tXn/ezq3CjiE+Zez5P3gFp4HGIoKNz/unpGE/g+PoxbL5le+603Vj3b/xOkM 0W7TmCU0Vy+c1PjXEDjfhYqAY6RuTEcKStfb8uLAr63CZs8ExiUoftUCp8Lkq6VgGCBS OSillXYG9V+CDWV/Pb8YZemM62hrqgiO1BsXdN1LOaBKVk70CgQE2cUdkA9+5BjmroPI OqmA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:in-reply-to:content-disposition:mime-version :references:message-id:subject:cc:to:from:date:dkim-signature :dkim-signature; bh=mzodxslVWR34FWKTezh8R+HCLqkf9hKJ6nwhZ2cYyW0=; b=kRj0UytM8UVu6a3/NwOypPlxV9Kt642zOSDhiq8H+IoLFYiOJW1fq67Hn1gJGQpIZ3 BVXrSBsLNKGg82ORLGV3ZFGX5UPab0Rre24wui80RV9NSS6vIqdmho7qAJF3als+5wVU dEuxx4pMXtU1VbrvYvhTvQyDYggdesXMto7bDShmKApZUULsIzkNPMyJ2Q+a8dvO5hNV FkmJ5CqRdQ7wdOmwEyMeBX1EjaPC2veXcUwgWkmBbk6mnuXgdcX01u3YxsDWkt67kG8G L3OKNLD7ctcsR1o4qHSUZ9XJgynfYK8VTS5g/IT9z5CeEwddlyg5lq9pbusRv1ttGocn W7Rg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@suse.de header.s=susede2_rsa header.b=eNlw2lEd; dkim=neutral (no key) header.i=@suse.de header.s=susede2_ed25519 header.b=5dGQ0ErR; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=suse.de Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id j15-20020a170902da8f00b001b0f727bc35si15986392plx.157.2023.06.19.01.07.41; Mon, 19 Jun 2023 01:08:07 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@suse.de header.s=susede2_rsa header.b=eNlw2lEd; dkim=neutral (no key) header.i=@suse.de header.s=susede2_ed25519 header.b=5dGQ0ErR; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=suse.de Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S229732AbjFSHzT (ORCPT + 99 others); Mon, 19 Jun 2023 03:55:19 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:43198 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229481AbjFSHzR (ORCPT ); Mon, 19 Jun 2023 03:55:17 -0400 Received: from smtp-out1.suse.de (smtp-out1.suse.de [IPv6:2001:67c:2178:6::1c]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 19560FA; Mon, 19 Jun 2023 00:55:16 -0700 (PDT) Received: from imap2.suse-dmz.suse.de (imap2.suse-dmz.suse.de [192.168.254.74]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature ECDSA (P-521) server-digest SHA512) (No client certificate requested) by smtp-out1.suse.de (Postfix) with ESMTPS id B877B2188E; Mon, 19 Jun 2023 07:55:14 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.de; s=susede2_rsa; t=1687161314; h=from:from:reply-to:date:date:message-id:message-id:to:to:cc:cc: mime-version:mime-version:content-type:content-type: in-reply-to:in-reply-to:references:references; bh=mzodxslVWR34FWKTezh8R+HCLqkf9hKJ6nwhZ2cYyW0=; b=eNlw2lEdFwRO24qHwcZk6RTiyPfPkFK/qnznneFVO8rBVp3e+AZ/aqo7cxuiWUi7UZx3/u vkV2Xoh4sMJjXcH5IJeusAnX5mWTuVn8oi5gpUC4jlQYE+YlD/QdEUarmKV36IYMkRGmVb scGcJ9MfBs7nhXYSgMCL6L2HxVXQ96Y= DKIM-Signature: v=1; a=ed25519-sha256; c=relaxed/relaxed; d=suse.de; s=susede2_ed25519; t=1687161314; h=from:from:reply-to:date:date:message-id:message-id:to:to:cc:cc: mime-version:mime-version:content-type:content-type: in-reply-to:in-reply-to:references:references; bh=mzodxslVWR34FWKTezh8R+HCLqkf9hKJ6nwhZ2cYyW0=; b=5dGQ0ErR9rr16jt9qdW7WZcepprWjTCTT6S4BuS9s9Siz9XZJXBmmJ4JbJ68RjM0Wj1Dsm qnkil/Q7ipU84tCA== Received: from imap2.suse-dmz.suse.de (imap2.suse-dmz.suse.de [192.168.254.74]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature ECDSA (P-521) server-digest SHA512) (No client certificate requested) by imap2.suse-dmz.suse.de (Postfix) with ESMTPS id A99C3139C2; Mon, 19 Jun 2023 07:55:14 +0000 (UTC) Received: from dovecot-director2.suse.de ([192.168.254.65]) by imap2.suse-dmz.suse.de with ESMTPSA id 3PtfKeIJkGRQBgAAMHmgww (envelope-from ); Mon, 19 Jun 2023 07:55:14 +0000 Date: Mon, 19 Jun 2023 09:55:14 +0200 From: Daniel Wagner To: linux-nvme@lists.infradead.org Cc: linux-kernel@vger.kernel.org, linux-block@vger.kernel.org, Chaitanya Kulkarni , Shin'ichiro Kawasaki , Sagi Grimberg , Hannes Reinecke , James Smart Subject: Re: [PATCH v1 0/2] nvme-fc: Fix blktests hangers Message-ID: References: <20230615094356.14878-1-dwagner@suse.de> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20230615094356.14878-1-dwagner@suse.de> X-Spam-Status: No, score=-4.4 required=5.0 tests=BAYES_00,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,RCVD_IN_DNSWL_MED,SPF_HELO_NONE, SPF_PASS,T_SCC_BODY_TEXT_LINE autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Thu, Jun 15, 2023 at 11:43:54AM +0200, Daniel Wagner wrote: > A couple more fixes to enable blktests for the fc transport. I let run blktests in a loop and eventually the unloading of the fs module blocked again with nvme_fcloop: fcloop_exit: Failed deleting remote port nvme_fcloop: fcloop_exit: Failed deleting target port So the reordering of the module unloades in blktets just made it a bit harder to hit but it's still possible to hit this. So we should also consider https://lore.kernel.org/linux-nvme/20230418130159.11075-2-dwagner@suse.de/