Received: by 2002:a25:4158:0:0:0:0:0 with SMTP id o85csp514527yba; Mon, 1 Apr 2019 10:50:09 -0700 (PDT) X-Google-Smtp-Source: APXvYqzLdX/NL88Re4Pqv0+w1wv0N+biw8C0m/CXT29N00KwbI4AJLSXZ08gmmOlYegCJcbFXk0s X-Received: by 2002:a17:902:2927:: with SMTP id g36mr37501696plb.57.1554141009870; Mon, 01 Apr 2019 10:50:09 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1554141009; cv=none; d=google.com; s=arc-20160816; b=hbTrbaoXVV/7TJ7DD38/75ceto6S+RszOqy8GJL7QHnAPpIvukgcI44jfh2O/ega9d pWXmQqg3RgXyx+b4ZvUo1gUEScRP3K1UlgjvKNSXV/wlc2BvifYfFG4U/dPZuu+NnUc6 SsHG0QwZeoBJyynW4axUgFsWURjIlpas60XUizwDXfwRoeSR0/ZX80Lxki8KOn6MzRmJ uOKx/UP9IiG4FSFkLv/FcJdlMeac4/ycdgU/7XeAJIUa16o4uxRQY4HpScKKf1SqhEFb 1IO4kJfEyEqNSypi9W+pSmNSuW2Ux84B72QOJvp4lKyBKDBZ3v8MtUEEEvwvVK4rTPuB QUfg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=htDl+bKb9bcwsB+75ThhDkIbwtCyj3wXZJaQtmm3XpQ=; b=i+A8111y5dkXkKMxBdV0Huw+N0B79Hd2Uhw5EEbakmS5jF6WB+X0OGXRHQkrEb+a7t dnLOIrCMqk4iYiMOxyT7mmsbPqhp8FB9ZNFiuqw5nJkTXKaErU3aVTs8mCSJzTEU+JRv K3xzN/7o+48RA16XtRWDUTVML0+XYaMiQOjdgX9q9TtcA/zO2bjxUQ2IKeiQeMHf6Qqa X7XLt0iHiAzt9nhyYJ9UNWsHMEHSibK8IcRYFFxFMETVNmwfq2l0FaUH5a5HxA63LwMR g2vZieHdy4Tae3HKY9MgUUj2X4aXLixhS1n6UVHP+RNVZWJrv/34sh7q+c+Uq4PH795d hc1w== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=K4v67NfA; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id j5si9115333pfi.166.2019.04.01.10.49.54; Mon, 01 Apr 2019 10:50:09 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=K4v67NfA; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1733267AbfDARbg (ORCPT + 99 others); Mon, 1 Apr 2019 13:31:36 -0400 Received: from mail.kernel.org ([198.145.29.99]:39084 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1732850AbfDARbb (ORCPT ); Mon, 1 Apr 2019 13:31:31 -0400 Received: from localhost (83-86-89-107.cable.dynamic.v4.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 76E2E2070B; Mon, 1 Apr 2019 17:31:30 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1554139891; bh=lWIPZIahIXGMlmldylMrGQ+SRRWjPowzvzQfxtL9Osk=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=K4v67NfAenAKQZ6hlaK0o6+zk7LwbbdI8HhD9loMk0Q9Ljtj7SR/hTe4wX4ZzG6bB 7tz8WoXp52FT8y38it/1MSFYZMeqZyh0IYXgJJACIcsDRfF31+HcTcL5SelEnWUD3x BQYK/BWVCJNBNcpQT+1mtLhNv+Dp8DBAQkeZUIuM= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Sergei Shtylyov , Wolfram Sang , Simon Horman , Ulf Hansson Subject: [PATCH 4.4 010/131] mmc: tmio_mmc_core: dont claim spurious interrupts Date: Mon, 1 Apr 2019 19:01:20 +0200 Message-Id: <20190401170052.649350619@linuxfoundation.org> X-Mailer: git-send-email 2.21.0 In-Reply-To: <20190401170051.645954551@linuxfoundation.org> References: <20190401170051.645954551@linuxfoundation.org> User-Agent: quilt/0.65 X-stable: review X-Patchwork-Hint: ignore MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org 4.4-stable review patch. If anyone has any objections, please let me know. ------------------ From: Sergei Shtylyov commit 5c27ff5db1491a947264d6d4e4cbe43ae6535bae upstream. I have encountered an interrupt storm during the eMMC chip probing (and the chip finally didn't get detected). It turned out that U-Boot left the DMAC interrupts enabled while the Linux driver didn't use those. The SDHI driver's interrupt handler somehow assumes that, even if an SDIO interrupt didn't happen, it should return IRQ_HANDLED. I think that if none of the enabled interrupts happened and got handled, we should return IRQ_NONE -- that way the kernel IRQ code recoginizes a spurious interrupt and masks it off pretty quickly... Fixes: 7729c7a232a9 ("mmc: tmio: Provide separate interrupt handlers") Signed-off-by: Sergei Shtylyov Reviewed-by: Wolfram Sang Tested-by: Wolfram Sang Reviewed-by: Simon Horman Cc: stable@vger.kernel.org Signed-off-by: Ulf Hansson Signed-off-by: Greg Kroah-Hartman --- drivers/mmc/host/tmio_mmc_pio.c | 8 +++----- 1 file changed, 3 insertions(+), 5 deletions(-) --- a/drivers/mmc/host/tmio_mmc_pio.c +++ b/drivers/mmc/host/tmio_mmc_pio.c @@ -716,7 +716,7 @@ irqreturn_t tmio_mmc_sdio_irq(int irq, v unsigned int sdio_status; if (!(pdata->flags & TMIO_MMC_SDIO_IRQ)) - return IRQ_HANDLED; + return IRQ_NONE; status = sd_ctrl_read16(host, CTL_SDIO_STATUS); ireg = status & TMIO_SDIO_MASK_ALL & ~host->sdcard_irq_mask; @@ -730,7 +730,7 @@ irqreturn_t tmio_mmc_sdio_irq(int irq, v if (mmc->caps & MMC_CAP_SDIO_IRQ && ireg & TMIO_SDIO_STAT_IOIRQ) mmc_signal_sdio_irq(mmc); - return IRQ_HANDLED; + return IRQ_RETVAL(ireg); } EXPORT_SYMBOL(tmio_mmc_sdio_irq); @@ -747,9 +747,7 @@ irqreturn_t tmio_mmc_irq(int irq, void * if (__tmio_mmc_sdcard_irq(host, ireg, status)) return IRQ_HANDLED; - tmio_mmc_sdio_irq(irq, devid); - - return IRQ_HANDLED; + return tmio_mmc_sdio_irq(irq, devid); } EXPORT_SYMBOL(tmio_mmc_irq);