Received: by 2002:ac0:a5a6:0:0:0:0:0 with SMTP id m35-v6csp73494imm; Wed, 29 Aug 2018 14:18:30 -0700 (PDT) X-Google-Smtp-Source: ANB0VdabarrJSfGF0YJgo2gB/aBWYG7cAhYmAML8ir7gnXv3P//qZMLqdykh0vfFpZH2ImVdYt9e X-Received: by 2002:a17:902:4324:: with SMTP id i33-v6mr7284226pld.43.1535577510508; Wed, 29 Aug 2018 14:18:30 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1535577510; cv=none; d=google.com; s=arc-20160816; b=q1YFs0JiPR8+9koZQburmhbE8atlqoXLFN48WG+iP963wfegL1JgsVwmSAAwrJnXK2 dmeWaGDIAOGNOXOQumZ4Z9wPwuXxr69I+64LRQr4kWJuLqX82bfIimd2V2Ar0UoTzfjr /MA2/WuVK+YoUmXO1C5RUSoY6qxonSF+E6UndDnpFKe18Kk23d2U1V9bflsUOaj1EC9m 1X+uDPGfJ+KpmN4vg1CJMrJr9qBi+7y4GVVmhjTC8Jw/x3KmsGi3vOFRFiWUJeyCLu+R huQ0vmEvOtpl0/VDplsN+NFEmH4SMal18qLxTfFNkHjM6MRQOlA80W+6HQbIEi/C/Kw+ GFZg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:mime-version:content-transfer-encoding :content-language:accept-language:references:message-id:date :thread-index:thread-topic:subject:cc:to:from:dkim-signature :arc-authentication-results; bh=fXMs6XQHbDPX/LX2jsruet93lP4/PYcTgsopB7EKyRI=; b=X4hrPIRUtRCdorsquI9Z8XjOf8YRXDCaPfnb86csqYCn3adXclBL3MplrEBNtSFiT7 SAaoAa7F/kuA3HfzjTmihLYjbPa1gOGDqYU65zbipRVQscd7n4rQG1f+2ZZeb4Rulbax MViWWUwFltMDvr6GUDbTj72YXFNhpTmUL2O7O43PYLa1pxWwGMa23svBd9TLTuZw7I1T L6lgEJYNpfjjcnWEcvHOD/6RYaGtdbIpYejdWTnFQsYXdnNx0fLVD7Ek/uTtq6Zva79b fh5otThP95T52NrkoDQPaCnw9ONkLVoRiuG3YSUGUl9iILaaobCoI4julbn6QnC9Xdj0 x0NA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@synopsys.com header.s=mail header.b=H23YSXgi; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=synopsys.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id z4-v6si4553887pgl.666.2018.08.29.14.18.15; Wed, 29 Aug 2018 14:18:30 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@synopsys.com header.s=mail header.b=H23YSXgi; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=synopsys.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728830AbeH3BPa (ORCPT + 99 others); Wed, 29 Aug 2018 21:15:30 -0400 Received: from smtprelay4.synopsys.com ([198.182.47.9]:51006 "EHLO smtprelay.synopsys.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1727595AbeH3BP3 (ORCPT ); Wed, 29 Aug 2018 21:15:29 -0400 Received: from mailhost.synopsys.com (mailhost2.synopsys.com [10.13.184.66]) by smtprelay.synopsys.com (Postfix) with ESMTP id 4BAA824E0A3F; Wed, 29 Aug 2018 14:16:45 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=synopsys.com; s=mail; t=1535577405; bh=fXMs6XQHbDPX/LX2jsruet93lP4/PYcTgsopB7EKyRI=; h=From:To:CC:Subject:Date:References:From; b=H23YSXgiDwMtY80FuIkP1yQfHUeP5EllqH2KLzmJdql+f0vGxaQGdvHOqTyaBPAM1 5xKXekqmn3SgOuJbcJGk17frdrvkz+5am3K8Mq2YfWKBL1m0qYysXctMH9XNfuObQg snW/7gwrP3SSQ401FTD2WND6MwMO/K0bBsMNHftIF47a8GGBdcMPTh3/a7rWdIXxFh 2MblBn8tZvLDUSbR2AqTFkNBxctsiRB1/XbBxkIbQqavDCW74CFl8DskFwd3q0e6tO g3TGelXX4NNh3djgdFywr4JGJHXSCqa4KHm2Ie10P6HMkhxfJYWKF2TzpEYQ61bhDg 9MYgqgCRC9P0w== Received: from US01WEHTC3.internal.synopsys.com (us01wehtc3.internal.synopsys.com [10.15.84.232]) by mailhost.synopsys.com (Postfix) with ESMTP id 0FD6E3581; Wed, 29 Aug 2018 14:16:45 -0700 (PDT) Received: from us01wembx1.internal.synopsys.com ([169.254.1.253]) by US01WEHTC3.internal.synopsys.com ([::1]) with mapi id 14.03.0361.001; Wed, 29 Aug 2018 14:16:44 -0700 From: Vineet Gupta To: Eugeniy Paltsev , "linux-kernel@vger.kernel.org" , "will.deacon@arm.com" CC: "mingo@kernel.org" , "peterz@infradead.org" , "tglx@linutronix.de" , "linux-snps-arc@lists.infradead.org" , Alexey Brodkin , "yamada.masahiro@socionext.com" , "linux-arm-kernel@lists.infradead.org" , "linux-arch@vger.kernel.org" Subject: Re: Patch "asm-generic/bitops/lock.h: Rewrite using atomic_fetch_" causes kernel crash Thread-Topic: Patch "asm-generic/bitops/lock.h: Rewrite using atomic_fetch_" causes kernel crash Thread-Index: AQHUP8bWpY6ZRO7qfEeDcvF8FJVDUg== Date: Wed, 29 Aug 2018 21:16:43 +0000 Message-ID: References: <1535567633.4465.23.camel@synopsys.com> Accept-Language: en-US Content-Language: en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: x-originating-ip: [10.144.199.104] Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: quoted-printable MIME-Version: 1.0 Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 08/29/2018 11:33 AM, Eugeniy Paltsev wrote:=0A= > Hi Guys,=0A= > Since v4.19-rc1 we are getting a serious regression on platforms with ARC= architecture.=0A= > The kernel have become unstable and spontaneously crashes on LTP tests ex= ecution / IO tests or=0A= > even on boot.=0A= >=0A= > I don't know exactly what breaks but bisect clearly assign the blame to t= his commit:=0A= > 84c6591103db ("locking/atomics, asm-generic/bitops/lock.h: Rewrite using = atomic_fetch_*()")=0A= > https://github.com/torvalds/linux/commit/84c6591103dbeaf393a092a3fc7b0951= 0825f6b9=0A= >=0A= > Reverting the commit solves this problem.=0A= >=0A= > I tested v4.19-rc1 on ARM (wandboard, i.mx6, 32bit, quard core, ARMv7) wh= ich uses same=0A= > generic bitops implementation and it works fine.=0A= >=0A= > Do you have any ideas what went wrong?=0A= =0A= Back in 2016, Peter had fixed this file due to a problem I reported on ARC.= See=0A= commit f75d48644c56a ("bitops: Do not default to __clear_bit() for=0A= __clear_bit_unlock()")=0A= That made __clear_bit_unlock() use the atomic clear_bit() vs. non-atomic=0A= __clear_bit(), effectively making clear_bit_unlock() and __clear_bit_unlock= () same.=0A= =0A= This patch undoes that which could explain the issues you see. @Peter, @Wil= l ?=0A= =0A= -Vineet=0A=