From patchwork Wed Jun 12 10:05:44 2019 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Filipe Manana X-Patchwork-Id: 10989329 Return-Path: Received: from mail.wl.linuxfoundation.org (pdx-wl-mail.web.codeaurora.org [172.30.200.125]) by pdx-korg-patchwork-2.web.codeaurora.org (Postfix) with ESMTP id 4421A1515 for ; Wed, 12 Jun 2019 10:05:52 +0000 (UTC) Received: from mail.wl.linuxfoundation.org (localhost [127.0.0.1]) by mail.wl.linuxfoundation.org (Postfix) with ESMTP id 32D5028468 for ; Wed, 12 Jun 2019 10:05:52 +0000 (UTC) Received: by mail.wl.linuxfoundation.org (Postfix, from userid 486) id 25F2428722; Wed, 12 Jun 2019 10:05:52 +0000 (UTC) X-Spam-Checker-Version: SpamAssassin 3.3.1 (2010-03-16) on pdx-wl-mail.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-8.0 required=2.0 tests=BAYES_00,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,MAILING_LIST_MULTI,RCVD_IN_DNSWL_HI autolearn=unavailable version=3.3.1 Received: from vger.kernel.org (vger.kernel.org [209.132.180.67]) by mail.wl.linuxfoundation.org (Postfix) with ESMTP id B334B288C4 for ; Wed, 12 Jun 2019 10:05:51 +0000 (UTC) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2437931AbfFLKFu (ORCPT ); Wed, 12 Jun 2019 06:05:50 -0400 Received: from mail.kernel.org ([198.145.29.99]:58370 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S2437919AbfFLKFu (ORCPT ); Wed, 12 Jun 2019 06:05:50 -0400 Received: from localhost.localdomain (bl8-197-74.dsl.telepac.pt [85.241.197.74]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id BA2342080A; Wed, 12 Jun 2019 10:05:48 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1560333949; bh=k4A2pzobBLPXbGTuKkiFRaUB9wIe16jn/DYgJKaaS4c=; h=From:To:Cc:Subject:Date:From; b=hvvnagZ+rUOggi0Nty7gSqjvT2MJObv8mhIQofsQupeQ4z8vIjvu7jD/Bcd5W8dw+ FDcuJJzruJkL8xwyZIebeAXy3Hw+MdNEwwo9HUkKiOOjLE17uaAbMj92Q1+neKaLZX hXRTaHK3D56HQwhBxr9JjQH5CoBxbo0NzhllBf2s= From: fdmanana@kernel.org To: fstests@vger.kernel.org Cc: linux-btrfs@vger.kernel.org, Filipe Manana Subject: [PATCH] btrfs/146: remove unnecessary scratch unmount to avoid test failure Date: Wed, 12 Jun 2019 11:05:44 +0100 Message-Id: <20190612100544.1890-1-fdmanana@kernel.org> X-Mailer: git-send-email 2.11.0 Sender: fstests-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: fstests@vger.kernel.org X-Virus-Scanned: ClamAV using ClamSMTP From: Filipe Manana Right at the beginning of the test we are unmonting the scratch device, however at this point the device was never mounted, so the unmount fails with an error message like the following: umount: /home/fdmanana/btrfs-tests/scratch_1: not mounted Which is not expected by the golden output and therefore causes the test to fail. Since the device/mount point was not mounted yet in the test, and since the test framework unmounts the scratch device after each test finishes, just remove the call to _scratch_unmount. Signed-off-by: Filipe Manana --- tests/btrfs/146 | 1 - 1 file changed, 1 deletion(-) diff --git a/tests/btrfs/146 b/tests/btrfs/146 index 8ec3128b..18e2eec0 100755 --- a/tests/btrfs/146 +++ b/tests/btrfs/146 @@ -38,7 +38,6 @@ _require_test_program fsync-err _require_test_program dmerror # bring up dmerror device -_scratch_unmount _dmerror_init # Replace first device with error-test device