Received: by 2002:a05:6358:700f:b0:131:369:b2a3 with SMTP id 15csp841582rwo; Wed, 2 Aug 2023 05:12:24 -0700 (PDT) X-Google-Smtp-Source: APBJJlFHcm+oDmxl/Wddpo6BhOs7m98nAVWy7ExaK6FWc2aRUSc8yMLlmiADWQWQlykrnAIPhyvW X-Received: by 2002:a17:90a:6fa6:b0:268:2658:3b01 with SMTP id e35-20020a17090a6fa600b0026826583b01mr13057763pjk.39.1690978344341; Wed, 02 Aug 2023 05:12:24 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1690978344; cv=none; d=google.com; s=arc-20160816; b=j3QVncrLBe4sB/uw82lFX57hDQRaaaunW0YtItRCdbdiNY3ZwOpX24EstqD3OyT4fb DMlpiTGL4UT7yLaAURoWQWKYRC8ldtnQ1uSlhg79XaSJj6hFeqKD4m01UdHnXJFsI2Cn BrabP5g0UZ1jY6fyQcS/NGV85hhmKnlVvyqYgusi2w7QaayZ3fok5J3LvMUpcRG5hxqP LeHVGUEUqsUXarcYwTXdklM47pzRnLJwXV/WpyT8fSEBCwWo70s/lYpMKUJluz+DPJHS zYViPA3ayUgcOjHhWL65rIJ6IGS/S23/IaNByyZoVY6aQIYhHoaFEZmkKuC7dG5JZrga 6TuA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:in-reply-to:content-disposition:mime-version :references:message-id:subject:cc:to:from:date; bh=1AlS6UgZVJMAAiFxjBPp6mNDBqTd3w/ij3nTSpurPpk=; fh=D2PANbAw5+cPG5lFIaktk67dGVJlB/1JG9EWwKlKa1c=; b=xlte/TzKSStYWANHDdvYkYllvIxUhCAxpPkgpcd/SfwcQU2VbzL1aDVpFFQep+AIOp 8hDwWEvhTBhtB9ZjZEljc4850o12kQOYnLSk7e9p91y8JNAidQtyekC465SUA1Hps+TB qsvwK9Ah12sF64AocLdXMl67PyVVvX5mVepVAukXbRjglEbUWsUvmOB+usZESCnhuMfW AExwf/EtwvZZUrJZ5RJ0dikws4zHmNWhKtJ3NjiLxSwrzrlq/TzSQBGh65IlHvKcup4Z DGsYV+4H3wvx807rB6hQZX21F4bokOjeij6Pw/NV14y1iCmOt3GXea9I6JhEVJ5fBvUT le/w== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id a21-20020a63e855000000b0055b618c77f1si10188551pgk.194.2023.08.02.05.12.06; Wed, 02 Aug 2023 05:12:24 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S232505AbjHBKsT (ORCPT + 99 others); Wed, 2 Aug 2023 06:48:19 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:33474 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S234098AbjHBKsB (ORCPT ); Wed, 2 Aug 2023 06:48:01 -0400 Received: from muru.com (muru.com [72.249.23.125]) by lindbergh.monkeyblade.net (Postfix) with ESMTP id 414C71FD6; Wed, 2 Aug 2023 03:47:54 -0700 (PDT) Received: from localhost (localhost [127.0.0.1]) by muru.com (Postfix) with ESMTPS id 612DB80AE; Wed, 2 Aug 2023 10:47:53 +0000 (UTC) Date: Wed, 2 Aug 2023 13:47:52 +0300 From: Tony Lindgren To: Greg Kroah-Hartman Cc: kernel test robot , oe-lkp@lists.linux.dev, lkp@intel.com, Andy Shevchenko , linux-kernel@vger.kernel.org, linux-serial@vger.kernel.org, Jiri Slaby , Andy Shevchenko , Dhruva Gole , Ilpo =?utf-8?B?SsOkcnZpbmVu?= , John Ogness , Johan Hovold , Sebastian Andrzej Siewior , Vignesh Raghavendra Subject: Re: [PATCH v5 3/3] serial: core: Fix serial core controller port name to show controller id Message-ID: <20230802104752.GD14799@atomide.com> References: <20230725054216.45696-4-tony@atomide.com> <202308021529.35b3ad6c-oliver.sang@intel.com> <20230802092354.GC14799@atomide.com> <2023080236-gurgling-violet-b54e@gregkh> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <2023080236-gurgling-violet-b54e@gregkh> X-Spam-Status: No, score=-1.9 required=5.0 tests=BAYES_00,SPF_HELO_NONE, SPF_NONE,T_SCC_BODY_TEXT_LINE autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org * Greg Kroah-Hartman [230802 09:40]: > On Wed, Aug 02, 2023 at 12:23:54PM +0300, Tony Lindgren wrote: > > * kernel test robot [230802 08:16]: > > > from serial, we observed last print out is: > > > > > > [ 15.584772][ T954] EDAC MC0: Giving out device to module skx_edac controller Skylake Socket#0 IMC#0: DEV 0000:3a:0a.0 (INTERRUPT) > > > [ 15.597328][ T954] EDAC MC1: Giving out device to module skx_edac controller Skylake Socket#0 IMC#1: DEV 0000:3a:0c.0 (INTERRUPT) > > > [ 15.610326][ T954] EDAC MC2: Giving out device to module skx_edac controller Skylake Socket#1 IMC#0: DEV 0000:ae:0a.0 (INTERRUPT) > > > [ 15.623375][ T954] EDAC MC3: Giving out device to module skx_edac controller Skylake Socket#1 IMC#1: DEV 0000:ae:0c.0 (INTERRUPT) > > > [ 15.640145][ T19] intel_rapl_common: Found RAPL domain package > > > [ 15.655890][ T19] intel_rapl_common: Found RAPL domain dram > > > [ 15.661983][ T19] intel_rapl_common: package-0:package:long_term locked by BIOS > > > [ 15.678564][ T19] intel_rapl_common: package-0:package:short_term locked by BIOS > > > [ 15.695259][ T19] intel_rapl_common: package-0:dram:long_term locked by BIOS > > > [ 15.713068][ T158] intel_rapl_common: Found RAPL domain package > > > [ 15.728719][ T158] intel_rapl_common: Found RAPL domain dram > > > [ 15.734743][ T158] intel_rapl_common: package-1:package:long_term locked by BIOS > > > [ 15.745244][ T1154] raid6: avx512x4 gen() 18153 MB/s > > > [ 15.761297][ T158] intel_rapl_common: package-1:package:short_term locked by BIOS > > > [ 15.767244][ T1154] raid6: avx512x2 gen() 18130 MB/s > > > [ 15.768866][ T158] intel_rapl_common: package-1:dram:long_term locked by BIOS > > > [ 15.790243][ T1154] raid6: avx512x1 gen() 18155 MB/s > > > [ 15.812245][ T1154] raid6: avx2x4 gen() 18060 MB/s > > > [ 15.834244][ T1154] raid6: avx2x2 gen() 18076 MB/s > > > [ 15.856244][ T1154] raid6: avx2x1 gen() 13836 MB/s > > > [ 15.861474][ T1154] raid6: using algorithm avx512x1 gen() 18155 MB/s > > > [ 15.884243][ T1154] raid6: .... xor() 27974 MB/s, rmw enabled > > > [ 15.890254][ T1154] raid6: using avx512x2 recovery algorithm > > > [ 15.897891][ T1154] xor: measuring software checksum speed > > > [ 15.904013][ T1154] prefetch64-sse : 31308 MB/sec > > > [ 15.909878][ T1154] generic_sse : 22929 MB/sec > > > [ 15.915230][ T1154] xor: using function: prefetch64-sse (31308 MB/sec) > > > [ 16.042623][ T1154] Btrfs loaded, zoned=no, fsverity=no > > > [ 16.054593][ T930] BTRFS: device fsid e422031c-19be-42f5-ab4f-be5f306aa6e1 devid 1 transid 39725 /dev/sda2 scanned by systemd-udevd (930) > > > > > > > > > then the machine is just stuck there. (whole dmesg captured from serial is > > > attached), and the issue is 100% reproducible for this commit. > > > > > > for parent, we never observed the boot failure. > > > > > > it looks quite strange to us why this commit could cause this behavior on our > > > machine. could you help check dmesg, config and kernel command line which is > > > also captured in dmesg, etc. and guide us if anything need to be updated to be > > > compatible with this change? Thanks! > > > > Thanks for the report. With the ctrl and port prefixes dropped, I broke > > serial_base_match() looks like. As we attempt to continue anyways, things > > still mostly work.. > > > > Greg, can you please drop the related commit? > > > > It's the following commit: > > > > 1ef2c2df1199 ("serial: core: Fix serial core controller port name to show controller id") > > Please send me a revert, I can't rewrite history in my public branches. OK. The fix might be just to check for device_type in serial_base_match(). Regards, Tony