Received: by 2002:a05:7412:bc1a:b0:d7:7d3a:4fe2 with SMTP id ki26csp293241rdb; Sat, 19 Aug 2023 01:53:26 -0700 (PDT) X-Google-Smtp-Source: AGHT+IEJLzGx3nTmazhzTHU6Yd3ZBalZqbp0Hz5PKisBVRGJCgCLNCf9mDHzXTzW5vu1+hineKPT X-Received: by 2002:a05:6808:189c:b0:3a7:4cf6:f0cb with SMTP id bi28-20020a056808189c00b003a74cf6f0cbmr2352895oib.21.1692435206512; Sat, 19 Aug 2023 01:53:26 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1692435206; cv=none; d=google.com; s=arc-20160816; b=0cG1p9pvlerbyMCgZmeCorRun8n2ZkdG4rbQlDT5LRNpxpPzeArSNxsri1O01tl5PM jXLlkLm1c1Z1qLnM1zaQQ2F2AWHE3NxpSEDrZnJQuyjeoC077dfaDZR/vNcK0m46SDxS T4AMVe+PH4GXZCwy1LIoIRyxI7NgwtzIT35tVTqxD/notv3xL4Oc3OjQpRYPKdY0bu54 oXDnTf9VsqJ8HTQL/bL+cv1GfKLCmNFnI6SFL0/t83o1tH6m3FTLnWQ3Ig9j1xopHblA FSHoOnZSZQXDoW3lC6XYkxqbRUXP2rRlIq9tqt2HteYt8RS/RuOKCAYEusX3MjPD1dBW t9Uw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:in-reply-to:content-disposition:mime-version :references:message-id:subject:cc:to:from:date:dkim-signature; bh=5p3tdSxzMpD/Wr9oolKIJTZ2ITutxM9KyVoGQpf28Dw=; fh=44VvFOTmtwIezCV82bjpE+jyK+9GHnApEmbuXXk5yFk=; b=EeG2Iaa33Y5GAt+gl/b1KuAzKcNdas5tb4tYJSjQZVrL0OndzIt5zz70Knsh5/YSoU rGaKjyDJXjBTuvJ6OgGdxeOQDheQahDZyK10XjkRvG1RIrptnJac3QFDy2JxUXR4GHrD v71H9GA8D38Bg7AykwwSGIilDABZCPr2fTZL18QcYJZ8n9gCe1vbwmowvUcFX/xPUw9E meQ3q2mhcJyFhizGCkNSf4Aqaz/++rtIZwN0964cZthSNzoVtfU92ga/iAnnJNIxBuy3 EN0/1a6DNoVcNUA+k6+zNoAfHn9SkTF3XZ+ZaP+aXDA2BnfGWHVnaZ8TOSuqXD2CvTLe +DPQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=J9BPGJFQ; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id l25-20020a63ba59000000b00565f611a1fesi3041630pgu.317.2023.08.19.01.53.13; Sat, 19 Aug 2023 01:53:26 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=J9BPGJFQ; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1346349AbjHPVEm (ORCPT + 99 others); Wed, 16 Aug 2023 17:04:42 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:58308 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1346418AbjHPVE2 (ORCPT ); Wed, 16 Aug 2023 17:04:28 -0400 Received: from dfw.source.kernel.org (dfw.source.kernel.org [139.178.84.217]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 235382736 for ; Wed, 16 Aug 2023 14:04:21 -0700 (PDT) Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits)) (No client certificate requested) by dfw.source.kernel.org (Postfix) with ESMTPS id B21B866EE7 for ; Wed, 16 Aug 2023 21:04:20 +0000 (UTC) Received: by smtp.kernel.org (Postfix) with ESMTPSA id B0189C433C7; Wed, 16 Aug 2023 21:04:19 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1692219860; bh=mMTfeKxGVaY+Llzxiq+JdTAw0bShPwSNTGJpRtPVghU=; h=Date:From:To:Cc:Subject:References:In-Reply-To:From; b=J9BPGJFQQwO12dgLBeIPuJpXSTPAa2GDKIUiYQx/xfKLQw2UgZ7KoJ3Vk5bt6V4or d2o3C11X45pJJiMlwRMwyyrgQCwrA+UDzJxLGbQJbqmdFjdhfC9iLzoYZaef4h2X02 zKFtRjYl7gTrjMZ/69YiLq/1vqYwo6QEN1LSQhttjOqRmDs2NP/CcknbiJTc0LuEKU YFlnnxUrmyqNGiFprF5HTH37CB8iyaJmpY6Usqp/YYFbH8VeZJfbfgOf4eiAgXjZ7V +YhWtQTtG8rjemiuXGvqoSHfe/YD9bkzk3Eg07j4tQMCZYnthC7lauH6rZqcVVKVUL TaSU9kNIinIsQ== Date: Wed, 16 Aug 2023 15:04:17 -0600 From: Keith Busch To: Genes Lists Cc: linux-kernel@vger.kernel.org, axboe@kernel.dk, sagi@grimberg.me, linux-nvme@lists.infradead.org, hch@lst.de Subject: Re: Possible nvme regression in 6.4.11 Message-ID: References: <5f968b95-6b1c-4d6f-aac7-5d54f66834a8@sapience.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <5f968b95-6b1c-4d6f-aac7-5d54f66834a8@sapience.com> X-Spam-Status: No, score=-7.1 required=5.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,RCVD_IN_DNSWL_HI, SPF_HELO_NONE,SPF_PASS autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Wed, Aug 16, 2023 at 04:39:34PM -0400, Genes Lists wrote: > Also reported to bugzilla [1] > > Failure happens on 1 laptop with samsung ssd. > > Boot log manually transcribed: > > kernel: nvme nvme0: controller is down; will reset: CSTS:0xffffffff, > PCI_STATUS=0xffff > kernel: nvme nvme0: Does your device have a faulty power saving mode > enabled? > kernel: nvme nvme0: try "nvme_core.default_ps_max_latency_us=0 > pcie_aspm=off" and report a bug > kernel: nvme 0000:04:00.0: Unable to change power state from D3cold to D0, > device inaccessible > kernel: nvme nvme0: Disabling device after reset failure: -19 > mount[353]: mount /sysroot: can't read suprtblock on /dev/nvme0n1p5. > mount[353]: dmesg(1) may have more information after failed moutn > system call. > kernel: nvme0m1: detected capacity change from 2000409264 to 0 > kernel: EXT4-fs (nvme0n1p5): unable to read superblock > systemd([1]: sysroot.mount: Mount process exited, code=exited, status=32/n/a > ... > > All kernels are upstream, untainted and compiled on Arch using: > > gcc version 13.2.1 > > Kernels Tested: > - 6.4.10 - works fine > - 6.4.11 - fails > - 6.5-rc6 - fails > - 6.4.11 + nvme_core.default_ps_max_latency_us=0 pcie_aspm=off - fails > - 6.4.11 with 1 revert below - fails > > Revert "nvme-pci: add NVME_QUIRK_BOGUS_NID for Samsung PM9B1 256G and > 512G" > This reverts commit 061fbf64825fb47367bbb6e0a528611f08119473. It sounds like you can recreate this. Since .10 worked and .11 doesn't, could you bisect the git commits? It looks like it will take 7 steps between those two versions. I don't think there are any nvme specific patches that could contribute to what you're seeing, it's more likely some lower level platform patch if a kernel change really did cause the regression. None of the recent commits really stood out to me, so bisect is what I'd recommend.