Received: by 10.223.176.46 with SMTP id f43csp2591091wra; Thu, 25 Jan 2018 12:13:56 -0800 (PST) X-Google-Smtp-Source: AH8x224lOgfk3mtxPAQpPiZGsvcfO5vcqIg4ENEwLUS2babw7Z0bcfUYcDBpSeb8B9l5Z2KToBlg X-Received: by 2002:a17:902:47c2:: with SMTP id d2-v6mr10134314plh.222.1516911236632; Thu, 25 Jan 2018 12:13:56 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1516911236; cv=none; d=google.com; s=arc-20160816; b=D1sv7MNwzhIkK1C9NrK7DTanrbWEOqMgk37Vq5dcAysPhflS74Nmpoc8q24Zgjy4NS WP3D9xS04aqFHRH8TqSh7SKDdueZAcCG17GCwAyGEERzHAow28TCn3Nj/MnJ+urii9lF 76mcO6Fmdq2pvquCx6+tLCYq1ne2KUq2arfRBkLQ4w+ydFoSxA+iPsRHAVMsstT9CtS/ /SMRj5tidGThh54fssQ+CZ+z2IbKQQladcf7s/O7gu+jI6EhBO5ecgXq/32uRNA6Lovu xYGo/kWrVDWqV/MUc42rkoYcvYujcrEZWdHj5X9MXI1tDkMATsfdIoauxS6MYhTkjY1w IGYA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:mime-version:user-agent:references :message-id:in-reply-to:subject:cc:to:from:date :arc-authentication-results; bh=9mOAnUytPyaxKbxt1P5VZI9jXnBxrTnmaL9NQMhaGPI=; b=wW7eueK0GFS9XSjZbfk/1/wAc1UrKeRz5C8AoDOhRiL4n+XLPlCfAbuVshAM2Rx7QO B8sevzfzjSm/Lt0ej+CKtKBjdFdm9TW9FWy7aSczorJY3LlBDaM8roW5Y57rkUWLCTi6 Cxoo5VwDmyxdWOMiVMkCQ+yMOMi8SIdJA6sySi5IdUP8029cAiTkDsSUGCfxNuJyCHxT ALWpVlwJM+j8gUMMW9Tqy5oash3FOa+dtiENjfQXIbZ3Wfk/3uVUwfAQLBayS4lxFYJd C4VeZ1+Gz8wtpW8dIF36JhiSHX0pjy3e0m+qpvEZdKA1mtVfAbsJNBAsJlW8WCNtX2x/ DbfA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id b7-v6si2531925pll.312.2018.01.25.12.13.41; Thu, 25 Jan 2018 12:13:56 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1751279AbeAYUMb (ORCPT + 99 others); Thu, 25 Jan 2018 15:12:31 -0500 Received: from Galois.linutronix.de ([146.0.238.70]:36030 "EHLO Galois.linutronix.de" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1751108AbeAYUMa (ORCPT ); Thu, 25 Jan 2018 15:12:30 -0500 Received: from p4fea5f09.dip0.t-ipconnect.de ([79.234.95.9] helo=nanos) by Galois.linutronix.de with esmtpsa (TLS1.2:DHE_RSA_AES_256_CBC_SHA256:256) (Exim 4.80) (envelope-from ) id 1eenpz-0006SK-Cw; Thu, 25 Jan 2018 21:09:31 +0100 Date: Thu, 25 Jan 2018 21:12:13 +0100 (CET) From: Thomas Gleixner To: Lyude Paul cc: "Ghannam, Yazen" , "hpa@zytor.com" , "keith.busch@intel.com" , "mingo@kernel.org" , "linux-kernel@vger.kernel.org" , Borislav Petkov Subject: Re: "irq/matrix: Spread interrupts on allocation" breaks nouveau in mainline kernel In-Reply-To: <1516908343.5161.4.camel@redhat.com> Message-ID: References: <1516744873.29151.3.camel@redhat.com> <1516757219.29151.7.camel@redhat.com> <1516816150.4109.2.camel@redhat.com> <1516823810.4109.26.camel@redhat.com> <1516904638.5161.1.camel@redhat.com> <1516908343.5161.4.camel@redhat.com> User-Agent: Alpine 2.20 (DEB 67 2015-01-07) MIME-Version: 1.0 Content-Type: text/plain; charset=US-ASCII X-Linutronix-Spam-Score: -1.0 X-Linutronix-Spam-Level: - X-Linutronix-Spam-Status: No , -1.0 points, 5.0 required, ALL_TRUSTED=-1,SHORTCIRCUIT=-0.0001 Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Thu, 25 Jan 2018, Lyude Paul wrote: > On Thu, 2018-01-25 at 19:46 +0100, Thomas Gleixner wrote: > > On Thu, 25 Jan 2018, Lyude Paul wrote: > > > > > I think you are right, apologies. Glad to know this isn't a regression in > > > the > > > IRQ handling code :). It looks like our nouveau problems are probably coming > > > from the fact that we don't just leave IRQs setup through suspend/resume > > > which > > > as far as I can tell, is probably not the correct thing to do. > > > > If you tear down the interrupt, then you have to make sure that it's > > completely masked and disabled on the device side (including MSI). > Does this only need to be done if we handle irq_request()/irq_free() ourselves, > or can we skip some of these steps if we let the kernel handle > disabling/enabling IRQs during s/r? If you do not free the interrupt on suspend, then the core does the right thing. Though you should not inflict an interrupt storm in that case either :) Thanks, tglx