Received: by 2002:a05:6358:c692:b0:131:369:b2a3 with SMTP id fe18csp990493rwb; Wed, 26 Jul 2023 06:09:20 -0700 (PDT) X-Google-Smtp-Source: APBJJlHH9pcNfmmTOtFern56KQ9V+oHzXJVgoPKoyIQjwoyiw8S+OKq+FiLKKuHkcxFUmUJtC3NM X-Received: by 2002:ac2:4d82:0:b0:4fe:629:9265 with SMTP id g2-20020ac24d82000000b004fe06299265mr1403978lfe.20.1690376960248; Wed, 26 Jul 2023 06:09:20 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1690376960; cv=none; d=google.com; s=arc-20160816; b=Nq7Df7HRygtwU8I2h1ReQPECTP0TsOkctjttIfNZXmhbzvWQWe23CRdGPAUb77utAO WIRNdrN9nUXt7XZmr5x9OJGdBO+MVQIftbuRm/PFAwVOZtfgPndln95OMHUQBZmltqoC 6gxn69kBovfLqmDeAomCpRUhSXMXMIto9nPhUsdr0sk51KGzT0VCWucZL1ZaXxvAgBdM yzrOtORK0kAdzcjG0mMweD/g9t45gX0Ww8c1TPm5tVAlHpBQipQV7PuoaEUN30nKW2vj 6QMlkx8QUx4XVAN1Fdm7fpTSTN3xRBtzg7s4dtwNiAzP4RoAES2MlzFzTouEthP+0A0+ jtYA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :message-id:date:subject:cc:to:from:dkim-signature:dkim-signature; bh=EiMntcZNL9Bmmzjn0NGwCc0QnLuebbsVshrPJM/t5TE=; fh=yOxxhxcNlYDvRknRRq8NylD2QGGuF+oF8+pXpC2Qo68=; b=FxAIQzToFb+KNzjnZj4PPSdA/ll23nUVPVpj5nYK8U3Di1itEQgr5SRJJsKX0TUoiw 6EIMjeGNo+oaxVD55lQ+IfrGET64XZV9kW9oJUJnTilEbaWztavPv2WedlA80TjUGE08 0Y5mscv/EweeMmOF2giH1MTQdrkjviGcxMQUP2KJCFf1Woq9M/hIxOSdImC91Tslwrdn EDCgZokOBvOicLVwfThzb1kkpG7svuDzW0yZDOSfDT4I5yz4YgYkHSkqN5FN8kwafmhJ z5TicrJ7zyFrKo+HAbco+LEk/VNSAlnG5XgHjt9+fHUzTjGLeq1YuyofHXJy2KeqL2mY Nd3A== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@suse.de header.s=susede2_rsa header.b=XeWhdRRh; dkim=neutral (no key) header.i=@suse.de; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=suse.de Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id md21-20020a170906ae9500b0098f99532db4si9212453ejb.664.2023.07.26.06.08.54; Wed, 26 Jul 2023 06:09:20 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@suse.de header.s=susede2_rsa header.b=XeWhdRRh; dkim=neutral (no key) header.i=@suse.de; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=suse.de Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S234364AbjGZMrS (ORCPT + 99 others); Wed, 26 Jul 2023 08:47:18 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:49488 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S234043AbjGZMrE (ORCPT ); Wed, 26 Jul 2023 08:47:04 -0400 Received: from smtp-out2.suse.de (smtp-out2.suse.de [IPv6:2001:67c:2178:6::1d]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id C7B8819BE; Wed, 26 Jul 2023 05:46:59 -0700 (PDT) Received: from imap2.suse-dmz.suse.de (imap2.suse-dmz.suse.de [192.168.254.74]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature ECDSA (P-521) server-digest SHA512) (No client certificate requested) by smtp-out2.suse.de (Postfix) with ESMTPS id 184D11F85D; Wed, 26 Jul 2023 12:46:52 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.de; s=susede2_rsa; t=1690375612; h=from:from:reply-to:date:date:message-id:message-id:to:to:cc:cc: mime-version:mime-version: content-transfer-encoding:content-transfer-encoding; bh=EiMntcZNL9Bmmzjn0NGwCc0QnLuebbsVshrPJM/t5TE=; b=XeWhdRRh/c1oBzGA94U2MbTAqQ3lq1XXWVOCZFJ8QqFWdcx4lPSDPCjoM4sVWHpnZ6cA/M IpaTpqKudLV3Go8k2jCqSWU3o6B3Yf66VsfYBeF0h6W3czjm/NTLLdeNqPvtYMF31QyRWo bK/au2TkDqGpKpwKCgHzxiBo4YvNfU4= DKIM-Signature: v=1; a=ed25519-sha256; c=relaxed/relaxed; d=suse.de; s=susede2_ed25519; t=1690375612; h=from:from:reply-to:date:date:message-id:message-id:to:to:cc:cc: mime-version:mime-version: content-transfer-encoding:content-transfer-encoding; bh=EiMntcZNL9Bmmzjn0NGwCc0QnLuebbsVshrPJM/t5TE=; b=91S1RSdUqtTwR7+CDUjSgkAZzbSOl+9/gsfFOPMHbnelanUebSDBLTI2InkbRV/m8esg0H ohNISCoa7jCsCICA== Received: from imap2.suse-dmz.suse.de (imap2.suse-dmz.suse.de [192.168.254.74]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature ECDSA (P-521) server-digest SHA512) (No client certificate requested) by imap2.suse-dmz.suse.de (Postfix) with ESMTPS id F2B41139BD; Wed, 26 Jul 2023 12:46:51 +0000 (UTC) Received: from dovecot-director2.suse.de ([192.168.254.65]) by imap2.suse-dmz.suse.de with ESMTPSA id sMI2O7sVwWQdUAAAMHmgww (envelope-from ); Wed, 26 Jul 2023 12:46:51 +0000 From: Daniel Wagner To: linux-nvme@lists.infradead.org Cc: linux-kernel@vger.kernel.org, linux-block@vger.kernel.org, Chaitanya Kulkarni , Shin'ichiro Kawasaki , Max Gurtovoy , Hannes Reinecke , Sagi Grimberg , James Smart , Daniel Wagner Subject: [PATCH blktests v1 00/11] Switch to allowed_host Date: Wed, 26 Jul 2023 14:46:33 +0200 Message-ID: <20230726124644.12619-1-dwagner@suse.de> X-Mailer: git-send-email 2.41.0 MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-Spam-Status: No, score=-4.4 required=5.0 tests=BAYES_00,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,RCVD_IN_DNSWL_MED,SPF_HELO_NONE, SPF_PASS,T_SCC_BODY_TEXT_LINE,URIBL_BLOCKED autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Max asked me to replace replace the 'nvme/rc: Avoid triggering host nvme-cli autoconnect' feature with using allowed_host on the target side [1] So while looking into this new feature, I first started to refactor existing code so that it looks a bit more consistent. I think there is even more potential to make it smaller, by introducing something similiar to _nvmet_passthru_target_setup() and _nvmet_passthru_target_cleanup() for non passthru tests. A lot of duplicated setup/cleanup code in many tests. Except the last two patches are just refactoring patches. So if we decide to use common target setup/cleanup helpers, I think we could add them before the last two patches, which would make the last patch way smaller. Daniel [1] https://lore.kernel.org/all/4b17be94-d068-f026-756f-59208075e254@nvidia.com/ Daniel Wagner (11): nvme/{003,004,005,013,046,049}: Group all variables declarations nvme: Reorganize test preamble code section nvme/rc: Add common subsystem nqn define nvme: Use def_subsysnqn variable instead local variable nvme/{041,042,043,044,045,048}: Remove local variable hostnqn and hostid nvme/rc: Add common file_path name define nvme: Use def_file_path variable instead local variable nvme/rc: Add common def_subsys_uuid define nvme: Use def_subsys_uuid variable nvme/rc: Add helper for adding/removing to allow list nvme: Add explicitly host to allow_host list tests/nvme/003 | 11 ++++---- tests/nvme/004 | 27 +++++++++++--------- tests/nvme/005 | 27 +++++++++++--------- tests/nvme/006 | 21 ++++++++------- tests/nvme/007 | 20 ++++++--------- tests/nvme/008 | 26 +++++++++---------- tests/nvme/009 | 24 +++++++++--------- tests/nvme/010 | 26 +++++++++---------- tests/nvme/011 | 25 +++++++++--------- tests/nvme/012 | 26 +++++++++---------- tests/nvme/013 | 25 +++++++++--------- tests/nvme/014 | 26 +++++++++---------- tests/nvme/015 | 24 +++++++++--------- tests/nvme/016 | 17 ++++++------- tests/nvme/017 | 26 ++++++++----------- tests/nvme/018 | 24 +++++++++--------- tests/nvme/019 | 26 +++++++++---------- tests/nvme/020 | 24 +++++++++--------- tests/nvme/021 | 24 +++++++++--------- tests/nvme/022 | 24 +++++++++--------- tests/nvme/023 | 26 +++++++++---------- tests/nvme/024 | 24 +++++++++--------- tests/nvme/025 | 24 +++++++++--------- tests/nvme/026 | 24 +++++++++--------- tests/nvme/027 | 24 +++++++++--------- tests/nvme/028 | 24 +++++++++--------- tests/nvme/029 | 26 +++++++++---------- tests/nvme/030 | 19 +++++++------- tests/nvme/031 | 14 +++++----- tests/nvme/033 | 9 ++++--- tests/nvme/034 | 9 ++++--- tests/nvme/035 | 9 ++++--- tests/nvme/036 | 9 ++++--- tests/nvme/037 | 8 +++--- tests/nvme/038 | 6 ++--- tests/nvme/039 | 4 +-- tests/nvme/040 | 30 ++++++++++++---------- tests/nvme/041 | 50 ++++++++++++++++-------------------- tests/nvme/042 | 55 ++++++++++++++++++---------------------- tests/nvme/043 | 52 +++++++++++++++++-------------------- tests/nvme/044 | 69 +++++++++++++++++++++++--------------------------- tests/nvme/045 | 61 ++++++++++++++++++++------------------------ tests/nvme/046 | 1 + tests/nvme/047 | 30 +++++++++++----------- tests/nvme/048 | 46 +++++++++++++++------------------ tests/nvme/049 | 1 + tests/nvme/rc | 30 +++++++++++++++++++--- 47 files changed, 572 insertions(+), 585 deletions(-) -- 2.41.0