From patchwork Sun Oct 13 15:30:52 2024 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Chuck Lever X-Patchwork-Id: 13833464 Received: from smtp.kernel.org (aws-us-west-2-korg-mail-1.web.codeaurora.org [10.30.226.201]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id BF4BA156CF for ; Sun, 13 Oct 2024 15:30:59 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=10.30.226.201 ARC-Seal: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1728833459; cv=none; b=hmAfpZ+8o0y2dY6tHa3cipeh29kd61RKcfUg7xQHAIFCefh8JnTnvL4yz0GGkvoo551XV8tlavU8VzMUUYn+7GlIR8FrSU18/Hb1sI5YBzbhX2vT//5n0qNaGn/Q7vGnh0QcwGANFo8La7FV3p/wfaiyNKDqPallm7dIPMVIsRQ= ARC-Message-Signature: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1728833459; c=relaxed/simple; bh=nzGgt+BW7CWRIHvyKzdO6ri7W9tMdFjdcq7elni9L3k=; h=From:To:Cc:Subject:Date:Message-ID:MIME-Version; b=SVA64efAyVDOxBKmxcoSU9OkwCBPfp1kOEfpPQCki1NLpfR5GDeJsQ68PBvS0wSvsydepZAruhMFzY+5FaNCiNgOzh1p0gAuy+lEW+DNoHKrQL1dhsCrlUNecPpK6FBlpT6VgZtYtbo5GuLVv7hshsfA3EJpTUcvTRGrzIGrDwk= ARC-Authentication-Results: i=1; smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=kernel.org header.i=@kernel.org header.b=qr+XLPs9; arc=none smtp.client-ip=10.30.226.201 Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=kernel.org header.i=@kernel.org header.b="qr+XLPs9" Received: by smtp.kernel.org (Postfix) with ESMTPSA id 3DBA1C4CEC5; Sun, 13 Oct 2024 15:30:59 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1728833459; bh=nzGgt+BW7CWRIHvyKzdO6ri7W9tMdFjdcq7elni9L3k=; h=From:To:Cc:Subject:Date:From; b=qr+XLPs9nhe188tx3iNrtAoAj1cD00PJodBQ8AbSsTuXjIaFoOPqobGCABz7TF0F+ SBsuT5MfmFR2Z+69eFoutGKAZlYSY3pVYRNwEBQ0tYrZZIWO7utVcsLdsgShA/Z3P+ nva28v9oRhr1CmEHLntQMH5o6qKjy7RP0HVPYh6fOD/W5ra8sdOoau0o7HNaxRUN2+ iDX24e3LLirUpqO+iiT0ziNMLX8GhqlbWy7iKkT6fKgYsy19v/sdDBcFhY81js81Dt uTyddpwfs9SdkuUbLcnwOlmDYJe2fsVC5r3K3AeCt3ZPlDET4KMhwCn1bZIAmtaCOY seABA4QuUa+4w== From: cel@kernel.org To: Cc: Chuck Lever Subject: [PATCH 1/2] fstests: Run the NFS/RDMA section with NFSv4.1 Date: Sun, 13 Oct 2024 11:30:52 -0400 Message-ID: <20241013153053.1431805-1-cel@kernel.org> X-Mailer: git-send-email 2.46.1 Precedence: bulk X-Mailing-List: kdevops@lists.linux.dev List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 From: Chuck Lever Seeing some test hangs here that might be due to known bugs in NFSv4.2. Force the NFS/RDMA test section to use NFSv4.1, not the default NFS version (which on modern distros is NFSv4.2). Signed-off-by: Chuck Lever --- playbooks/roles/fstests/templates/nfs/nfs.config | 4 ++-- workflows/fstests/nfs/Kconfig | 4 ++++ 2 files changed, 6 insertions(+), 2 deletions(-) diff --git a/playbooks/roles/fstests/templates/nfs/nfs.config b/playbooks/roles/fstests/templates/nfs/nfs.config index 00911af6437a..3605e582b2d7 100644 --- a/playbooks/roles/fstests/templates/nfs/nfs.config +++ b/playbooks/roles/fstests/templates/nfs/nfs.config @@ -22,14 +22,14 @@ MOUNT_OPTIONS="-o vers=4.1" # Test over RDMA [nfs_rdma] TEST_FS_MOUNT_OPTS="-o rdma" -MOUNT_OPTIONS="-o rdma" +MOUNT_OPTIONS="-o rdma,vers=4.1" {% endif %} {% if fstests_nfs_section_tls -%} # Test NFS with RPC over TLS [nfs_tls] TEST_FS_MOUNT_OPTS="-o xprtsec=mtls" -MOUNT_OPTIONS="-o xprtsec=mtls" +MOUNT_OPTIONS="-o xprtsec=mtls,vers=4.1" {% endif %} {% if fstests_nfs_section_nfsd -%} diff --git a/workflows/fstests/nfs/Kconfig b/workflows/fstests/nfs/Kconfig index 0b32e710fa58..3c373d7eedfc 100644 --- a/workflows/fstests/nfs/Kconfig +++ b/workflows/fstests/nfs/Kconfig @@ -61,6 +61,8 @@ config FSTESTS_NFS_SECTION_RDMA the target nodes have RDMA hardware already, enable one of the software RDMA options as well. + This test uses an NFSv4.1 mount. + config FSTESTS_NFS_SECTION_TLS bool "Enable testing section: nfs_tls" default n @@ -68,6 +70,8 @@ config FSTESTS_NFS_SECTION_TLS help Enabling this will test with the xprtsec=tls mount option. + This test uses an NFSv4.1 mount. + config FSTESTS_NFS_SECTION_NFSD bool "Enable testing section: nfsd" output yaml