Received: by 2002:a5b:505:0:0:0:0:0 with SMTP id o5csp740681ybp; Fri, 11 Oct 2019 03:41:11 -0700 (PDT) X-Google-Smtp-Source: APXvYqxaZ3eChVZ834LdpZJ5JOLpCSpsW1pIqMMWgBmQJ0u0lapUDOHH9Gjsm02jjVspEY4VWd2c X-Received: by 2002:a17:906:e113:: with SMTP id gj19mr13172444ejb.203.1570790471512; Fri, 11 Oct 2019 03:41:11 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1570790471; cv=none; d=google.com; s=arc-20160816; b=s2Sm5xpRp2Kkj16wy3NzLUMTLwdHLr0DSqZl2SBIFwownprXiE5Qn4yywAiK0s+KA9 sQlRXirmjfMGDswI5l8FHFM7T1YnXj/5/3qiuq9rjwlezXg4VVJ7bCYjywMDmDe3sbvi sTrLQ6RjBIi2efdh1ES9O02wspjMD1zLIMqPuAM0uL7//qlULgQm2gfh3aBKGGeHXYjI 55eK/Zx5SWNFQr8SfF7soWadtAl9PT17MH+mLuiecQ+6X/tnJ6147+rWVmI+dVIlwd8M 0IKBJfmk3Rfecj+4TVDFV1zHJxUUEyX1fgBYKUTtmGslYJTckIHaQNAwKHFNF4ApbEUV lavQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding :content-language:in-reply-to:mime-version:user-agent:date :message-id:from:references:cc:to:subject; bh=sfOIuZz8mkIEEiDEqR46XHsyF+eJCKYPFX3HjyLAiI0=; b=xR1Yc0j4O2mqhez/EUzPPmPIaVj3bOXD8oobvD2harZs5vDq3ly+bdv0CrKfRUQzgj dmt3WeqtXAjShe++/pzPdUss/NCRVAyxmWSucIaDifUMzXDygkh8ofzEGZixxpD7SIQX RVGX7ILcdzQYbWk8jkvpQE78kWf2aMFvPosLrHzC8KgeKirNo94UPilxSyVem2YqeuSr +KFJa6TIBsjoXGISaRMWZy6t/RmSqIZ48NsnomprKbAP/MoffP0X04Lr2OpMLCkShvTP AMv8mO2w5SdH3ebf0PDatvq+UfYOzGTqWX9mMbfaLpt1IxwUZsBt0ciT/YZoOUsz/ToF ZSTw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id p14si5538369eda.411.2019.10.11.03.40.47; Fri, 11 Oct 2019 03:41:11 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727538AbfJKKiV (ORCPT + 99 others); Fri, 11 Oct 2019 06:38:21 -0400 Received: from foss.arm.com ([217.140.110.172]:56024 "EHLO foss.arm.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726290AbfJKKiV (ORCPT ); Fri, 11 Oct 2019 06:38:21 -0400 Received: from usa-sjc-imap-foss1.foss.arm.com (unknown [10.121.207.14]) by usa-sjc-mx-foss1.foss.arm.com (Postfix) with ESMTP id 68AA228; Fri, 11 Oct 2019 03:38:20 -0700 (PDT) Received: from [10.1.196.105] (eglon.cambridge.arm.com [10.1.196.105]) by usa-sjc-imap-foss1.foss.arm.com (Postfix) with ESMTPSA id 288213F703; Fri, 11 Oct 2019 03:38:19 -0700 (PDT) Subject: Re: ARM Juno r1 + CONFIG_PROVE_LOCKING=y => boot failure To: Sudeep Holla , Marek Szyprowski Cc: Lorenzo Pieralisi , Catalin Marinas , Liviu Dudau , LKML , Will Deacon , linux-arm-kernel@lists.infradead.org References: <33a83dce-e9f0-7814-923b-763d33e70257@samsung.com> <20191011100521.GA5122@bogus> From: James Morse Message-ID: <7655fb41-cd13-0bc4-e656-040e0875bab8@arm.com> Date: Fri, 11 Oct 2019 11:38:17 +0100 User-Agent: Mozilla/5.0 (X11; Linux aarch64; rv:60.0) Gecko/20100101 Thunderbird/60.9.0 MIME-Version: 1.0 In-Reply-To: <20191011100521.GA5122@bogus> Content-Type: text/plain; charset=utf-8 Content-Language: en-GB Content-Transfer-Encoding: 7bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Hi guys, On 11/10/2019 11:05, Sudeep Holla wrote: > On Fri, Oct 11, 2019 at 11:26:04AM +0200, Marek Szyprowski wrote: >> Recently I've got access to ARM Juno R1 board and did some tests with >> current mainline kernel on it. I'm a bit surprised that enabling >> CONFIG_PROVE_LOCKING causes a boot failure on this board. After enabling >> this Kconfig option, I get no single message from the kernel, although I >> have earlycon enabled. > I don't have Juno R1 but I tried defconfig + CONFIG_PROVE_LOCKING and > it boots fine. I just tried this on my r1, v5.4-rc1 with this configuration worked just fine. My cmdline is: | root=/dev/sda6 loglevel=9 earlycon=pl011,0x7ff80000 hugepagesz=2M hugepages=512 | crashkernel=1G console=ttyAMA0 resume=/dev/sda2 no_console_suspend efi=debug >> I've did my test with default defconfig and current linux-next, >> v5.4-rc1, v5.3 and v4.19. In all cases the result is the same. I'm >> booting kernel using a precompiled uboot from Linaro release and TFTP >> download. > OK, I use UEFI+GRUB but I don't think that should cause any issue. ... same ... this uboot binary looks like the main difference. Is it using u-boots UEFI support? Is it possible to turn that off? It may that lockdep is just perturbing the size of the binary. It adds an extra 4MB for me. Thanks, James