Received: by 2002:a05:7412:31a9:b0:e2:908c:2ebd with SMTP id et41csp3276381rdb; Wed, 13 Sep 2023 07:28:35 -0700 (PDT) X-Google-Smtp-Source: AGHT+IHwBMIl3xqKHj47psaFEnLVZ3S0Sh78vVkoHypYvh+YyaTFw8QyjGF005thuI8Z458M1IKS X-Received: by 2002:a05:6a21:47cb:b0:14c:7e3:149b with SMTP id as11-20020a056a2147cb00b0014c07e3149bmr2218139pzc.62.1694615315076; Wed, 13 Sep 2023 07:28:35 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1694615315; cv=none; d=google.com; s=arc-20160816; b=ftfDxgv6O9FO/ohAOgaaye1ddeVvoO7dFQCHY3JbJ0y3HfHXLeuCy8ltADn0/j+v8U +w3+/r8FgmB5F4b7EaGjekz7G0h1mGFJu+yG0OqCwX5fkA6jpXD1GrWfwC/5n4VnprP2 DuDRQTWx6Srz3Xr5GHS1jU7g+wozCKcNhy6VVvOqeualAnl8U7wilIyhNn6/80HRawJL uL8Wt5AVkqKrz6tGc06g6PF8DCE6zPdfpB3eTNh74FPkh6wuvkw1a/1aDn8PQma/CYXj MAqWKJc5GwTSQXSUzRcs60xri0/zfsM4CDETjuwW0xXN+OBBDntn/8bd3V8F3Q0vNhVB 9FPQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:in-reply-to:content-disposition:mime-version :message-id:subject:cc:to:from:date:dkim-signature; bh=gSNXD860TFWiEd3l7MIQC2U9vbVLR0MYXvKHobuw33A=; fh=csT81Cp2lEbu/LtugPNz310ReBRoERRqyJZvwAHbKeg=; b=LA8MfF1tOMEJZQ0+l5djXOaFcs6ahzY9RWhw+ufDmEr0cAWuzAGKEdvdVcTUjnXjPY H4L/FOaOqgln9F/uTpzvyy7gkWQiSXIbm5qCfv8KokMZixbV9FyXbVEyBasEukdPvPLF Zm8egnuNnrmy+Wn1Np/yWxiDBFdtkJpFTJrWwDa3IDePzw4havjLwx9pXx/06OOegQKF o7SLlKaUHkEKESFdavh0Le4HZOYdgsaC84daK0zbpma1tFX2dsPm71c4R9AQRYJXsjiW AGZvyNJlPoaxZVi+IpE5dO9qMb3kWR84ckQrA4JMNbY5z236xjgWXmrWs5f3NuhEOF3M HPLg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=Xw95oeyZ; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::3:5 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from groat.vger.email (groat.vger.email. [2620:137:e000::3:5]) by mx.google.com with ESMTPS id x28-20020a056a00189c00b0068e44a5e7ffsi6212083pfh.90.2023.09.13.07.28.34 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Wed, 13 Sep 2023 07:28:35 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::3:5 as permitted sender) client-ip=2620:137:e000::3:5; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=Xw95oeyZ; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::3:5 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: from out1.vger.email (depot.vger.email [IPv6:2620:137:e000::3:0]) by groat.vger.email (Postfix) with ESMTP id 3C60B808D2BD; Wed, 13 Sep 2023 07:23:54 -0700 (PDT) X-Virus-Status: Clean X-Virus-Scanned: clamav-milter 0.103.10 at groat.vger.email Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S238226AbjIMOXl (ORCPT + 99 others); Wed, 13 Sep 2023 10:23:41 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:43952 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S230467AbjIMOXk (ORCPT ); Wed, 13 Sep 2023 10:23:40 -0400 Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 7EEB498; Wed, 13 Sep 2023 07:23:36 -0700 (PDT) Received: by smtp.kernel.org (Postfix) with ESMTPSA id EA890C433C7; Wed, 13 Sep 2023 14:23:35 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1694615016; bh=YiQrzuAh1fMDV3leNvWvYNpRFAWU7q18Jvl/4gilNQw=; h=Date:From:To:Cc:Subject:In-Reply-To:From; b=Xw95oeyZTs8tiMck+I72MQ6IqeSOdGtF+CxXy5/7/Whah8lHm4lFw7iJOgZtC0HGf 9y3j8VosYGPgeMF3Dc7PKJ4WtWbfb/QmYOWLYRuIHZvuW/+6FzKCwd5sOv2u93pSDY /Tz1++6Y+PpHgIiO8HLhRpaHMdpYlMpaQ2lwN+cwhsSvKaUiIu6rtLGyAvlVtfMw6+ N+6JmuMx4TOF7rbzqNtFif1tTBgtDG1Ya65fHbnUFtTERWmfSw6YP6LR0/6tSmqDeK 4aM2XCKmWEEHiV3JdPgU9L4CqGJv0nTwEzxVCUu3BFcBush9Ng4IkSSiOinuknKm5l C+03B2XfnXrLw== Date: Wed, 13 Sep 2023 09:23:33 -0500 From: Bjorn Helgaas To: Bagas Sanjaya Cc: Damien Le Moal , Bjorn Helgaas , patenteng , Linux Kernel Mailing List , Linux Regressions , Linux IDE and libata , Linux PCI Subject: Re: Fwd: Kernel 6.5.2 Causes Marvell Technology Group 88SE9128 PCIe SATA to Constantly Reset Message-ID: <20230913142333.GA431715@bhelgaas> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org X-Greylist: Sender passed SPF test, not delayed by milter-greylist-4.6.4 (groat.vger.email [0.0.0.0]); Wed, 13 Sep 2023 07:23:54 -0700 (PDT) X-Spam-Status: No, score=-1.2 required=5.0 tests=DKIMWL_WL_HIGH,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,MAILING_LIST_MULTI, SPF_HELO_NONE,SPF_PASS autolearn=unavailable autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on groat.vger.email On Wed, Sep 13, 2023 at 06:25:31PM +0700, Bagas Sanjaya wrote: > I notice a regression report on Bugzilla [1]. Quoting from it: > > > After upgrading to 6.5.2 from 6.4.12 I keep getting the following kernel messages around three times per second: > > > > [ 9683.269830] ata16: SATA link up 1.5 Gbps (SStatus 113 SControl 300) > > [ 9683.270399] ata16.00: configured for UDMA/66 > > > > So I've tracked the offending device: > > > > ll /sys/class/ata_port/ata16 > > lrwxrwxrwx 1 root root 0 Sep 10 21:51 /sys/class/ata_port/ata16 -> ../../devices/pci0000:00/0000:00:1c.7/0000:0a:00.0/ata16/ata_port/ata16 > > > > cat /sys/bus/pci/devices/0000:0a:00.0/uevent > > DRIVER=ahci > > PCI_CLASS=10601 > > PCI_ID=1B4B:9130 > > PCI_SUBSYS_ID=1043:8438 > > PCI_SLOT_NAME=0000:0a:00.0 > > MODALIAS=pci:v00001B4Bd00009130sv00001043sd00008438bc01sc06i01 > > > > lspci | grep 0a:00.0 > > 0a:00.0 SATA controller: Marvell Technology Group Ltd. 88SE9128 PCIe SATA 6 Gb/s RAID controller with HyperDuo (rev 11) > > > > I am not using the 88SE9128, so I have no way of knowing whether it works or not. It may simply be getting reset a couple of times per second or it may not function at all. > > See Bugzilla for the full thread. > > patenteng: I have asked you to bisect this regression. Any conclusion? > ... > [1]: https://bugzilla.kernel.org/show_bug.cgi?id=217902 Thanks for the heads-up. I can't tell whether PCI is involved here. The bugzilla only mentions the SATA link, which is on the downstream side of the PCI SATA device. If PCI is involved, e.g., if the PCI core reset the SATA device because of an error, there may be hints in the dmesg log. Can you attach the complete dmesg log and "sudo lspci -vv" output to the bugzillla? Bjorn