Received: by 2002:a5b:505:0:0:0:0:0 with SMTP id o5csp756342ybp; Fri, 11 Oct 2019 04:00:35 -0700 (PDT) X-Google-Smtp-Source: APXvYqybxIPLtZxTkkaxGypcLZpbzhE6jGUjHJHGW2OHZnjumPGifXcQH0w8zQqMycNvt8/5ngRo X-Received: by 2002:a17:906:4d95:: with SMTP id s21mr12969605eju.175.1570791635541; Fri, 11 Oct 2019 04:00:35 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1570791635; cv=none; d=google.com; s=arc-20160816; b=yqxv0uQzDsg1IFzFqYkwxFkITF1gbKbgcICUkSzKo8RaN2xDZicp8hjg5DWb5WmFAi 88gUM6gNefClyuSDYfTj6xU2lDW8FNgBUfdPQ73VlJYdUgOEJOp3AIncik6V4OI30kYB /hjRdMuyY/IJGC5Sm4ClaolQirgsaXAaA5Ofg6qPl6ZDEE2veiXE35TZKM7mhXu2hrrw DJ7ZZM59rF4nh/mMALApnMGP9Ec/6tFuwy7kWefJudLXW4VXsRh0IO/t6PepzxOV+x5z n3Lsc0nznPH/ZRcGVc9sC7oHEV05KYb93wSkqvwv8oufbpw1H7b27cXO5yQqDvJFnXH/ 57bg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:message-id:subject:cc :to:from:date; bh=4hIXb1LRMO3sXwDBTf5AWxzRmOg9paUI3FhmqD7rH0k=; b=fCMMA+KVN6+8mfubrUZMyiv3lMM0Li6jlmFxuTc3eSdOE34TlgTBqwLyQtvvQ+Q2+E r4ryaIkVaZJWteo5KYmgYsctzTyprP6aoGy44eMKt97Zc3N0z1bYXKaiNzblkuiIZR1r OMQ/a4qWY5rzXIoVv1X230ud9aoFSnuJVXP/I27avSg62lnJaekfinsNqFmBnNz1th88 bzvUm81mKkyqNHlma7/s8VQZfJuIl7eCGC1EyAgYJUh/57OkjfFeTSDlVa0jQ6oL6orf VqEqKhlVmbk/2s2bQ4FT/IVbXlE9casW3k0ZzM2xuudtPHz12KcNM2zdqPos8BUp8So6 +zBw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id c19si6109796ede.360.2019.10.11.04.00.11; Fri, 11 Oct 2019 04:00:35 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727629AbfJKK71 (ORCPT + 99 others); Fri, 11 Oct 2019 06:59:27 -0400 Received: from foss.arm.com ([217.140.110.172]:56512 "EHLO foss.arm.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726885AbfJKK71 (ORCPT ); Fri, 11 Oct 2019 06:59:27 -0400 Received: from usa-sjc-imap-foss1.foss.arm.com (unknown [10.121.207.14]) by usa-sjc-mx-foss1.foss.arm.com (Postfix) with ESMTP id 5BF3428; Fri, 11 Oct 2019 03:59:26 -0700 (PDT) Received: from bogus (e107155-lin.cambridge.arm.com [10.1.196.42]) by usa-sjc-imap-foss1.foss.arm.com (Postfix) with ESMTPSA id 2293E3F703; Fri, 11 Oct 2019 03:59:25 -0700 (PDT) Date: Fri, 11 Oct 2019 11:59:23 +0100 From: Sudeep Holla To: Marek Szyprowski Cc: James Morse , Lorenzo Pieralisi , Catalin Marinas , Liviu Dudau , Sudeep Holla , LKML , Will Deacon , linux-arm-kernel@lists.infradead.org Subject: Re: ARM Juno r1 + CONFIG_PROVE_LOCKING=y => boot failure Message-ID: <20191011105923.GB5122@bogus> References: <33a83dce-e9f0-7814-923b-763d33e70257@samsung.com> <20191011100521.GA5122@bogus> <7655fb41-cd13-0bc4-e656-040e0875bab8@arm.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <7655fb41-cd13-0bc4-e656-040e0875bab8@arm.com> User-Agent: Mutt/1.9.4 (2018-02-28) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Fri, Oct 11, 2019 at 11:38:17AM +0100, James Morse wrote: > Hi guys, > > On 11/10/2019 11:05, Sudeep Holla wrote: > > On Fri, Oct 11, 2019 at 11:26:04AM +0200, Marek Szyprowski wrote: > >> Recently I've got access to ARM Juno R1 board and did some tests with > >> current mainline kernel on it. I'm a bit surprised that enabling > >> CONFIG_PROVE_LOCKING causes a boot failure on this board. After enabling > >> this Kconfig option, I get no single message from the kernel, although I > >> have earlycon enabled. > > > I don't have Juno R1 but I tried defconfig + CONFIG_PROVE_LOCKING and > > it boots fine. > > I just tried this on my r1, v5.4-rc1 with this configuration worked just fine. > > My cmdline is: > | root=/dev/sda6 loglevel=9 earlycon=pl011,0x7ff80000 hugepagesz=2M hugepages=512 > | crashkernel=1G console=ttyAMA0 resume=/dev/sda2 no_console_suspend efi=debug > > > >> I've did my test with default defconfig and current linux-next, > >> v5.4-rc1, v5.3 and v4.19. In all cases the result is the same. I'm > >> booting kernel using a precompiled uboot from Linaro release and TFTP > >> download. > > > OK, I use UEFI+GRUB but I don't think that should cause any issue. > > ... same ... this uboot binary looks like the main difference. > Is it using u-boots UEFI support? Is it possible to turn that off? > Did give a quick try with mainline uboot on my Juno R2 and it boots fine. Not sure if EFI support is default there. I am using vexpress_aemv8a_juno_defconfig > It may that lockdep is just perturbing the size of the binary. It adds an > extra 4MB for me. The image size was 35MB. I was thinking if it has some wrongly configured firmware, but since defconfig works, it must have sane firmware. -- Regards, Sudeep