Received: by 2002:a17:90a:8504:0:0:0:0 with SMTP id l4csp388660pjn; Wed, 23 Oct 2019 01:07:39 -0700 (PDT) X-Google-Smtp-Source: APXvYqyQN08aWtzB2eHL9QdCRDSkqjls5MCHtS/2KLy2wTifM/W+R5Ios7QVQDPgBxqDNicZkMmI X-Received: by 2002:a50:99d9:: with SMTP id n25mr19310138edb.263.1571818059031; Wed, 23 Oct 2019 01:07:39 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1571818059; cv=none; d=google.com; s=arc-20160816; b=RTbALWjHrwN16XLfXlKWyhqDMJkyehW1MCaomyoJ3TGECJZB25Uyen9+84KZgtSpcI bWT2XULpNmvqrtWkm9eJyheNmwAqwzMdpbWGO5qRtC0c4KObOzGctcErK7kS29JRlQyC lRN8ogDK/VyVdFezwv2MrhwuljJBMGcTWmbJ7O3UuvGQzqixM/CN1jBXi0QfkcWRTH2Q wNW74LD1E98DghLz313RnzcAJxY8PZ7hHETax2pxNPF9abkS+ZirEw9SN+8Xc2oH33DJ S7q1bpFuue3zMFitaDxlW1il4SYtiaDmkt3RKWEl4EBGKKqyHBGMBSgFWeldG8DPNDE1 NcZA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:message-id:subject:cc :to:from:date; bh=gWMMFXc6TKgnzLi+LNgEKoonqyootnNhymsfLGuNDhY=; b=uPjDk9cZiBJ8vwQ5PGmP6WglE36953Jh8bEfRCqcCn/F8Ko3FZfFa0krx4BUiZHftM uVgpBn+AGUD2yr9IrCg3KatiUImWzr2V+X9atkOOZiIWD9lbku5eOeFIhDJink2EV0hb 6Teyae8p5VHNlDjvsQn90uYUuLgSd8KLXw+PJHTmAU42vizgutqe6hoRgCQ5J61LnbFx nCeb/vYM08ckGdh98NyL/CCsSgFUbSjvJyq6DxYiN5jyk/F9diYAShicJvIgNKnhr3JL v0O5Y5BasVBeNiARgT/Iombp3oaccC1H9vZPPKJ6kfYo0VUWvTTfH1mZNm2hrZIpT715 7o8g== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id h52si7030233edb.77.2019.10.23.01.07.14; Wed, 23 Oct 2019 01:07:39 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2390143AbfJWIGn (ORCPT + 99 others); Wed, 23 Oct 2019 04:06:43 -0400 Received: from mx2.suse.de ([195.135.220.15]:48138 "EHLO mx1.suse.de" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S1727574AbfJWIGm (ORCPT ); Wed, 23 Oct 2019 04:06:42 -0400 X-Virus-Scanned: by amavisd-new at test-mx.suse.de Received: from relay2.suse.de (unknown [195.135.220.254]) by mx1.suse.de (Postfix) with ESMTP id 9EFE6BB24; Wed, 23 Oct 2019 08:06:40 +0000 (UTC) Date: Wed, 23 Oct 2019 10:06:40 +0200 From: Daniel Wagner To: Jakub Kicinski Cc: Sebastian Andrzej Siewior , UNGLinuxDriver@microchip.com, netdev@vger.kernel.org, linux-usb@vger.kernel.org, linux-kernel@vger.kernel.org, linux-rt-users@vger.kernel.org, Woojung Huh , Marc Zyngier , Andrew Lunn , Stefan Wahren , Jisheng Zhang , Thomas Gleixner Subject: Re: [PATCH] net: usb: lan78xx: Use phy_mac_interrupt() for interrupt handling Message-ID: <20191023080640.zcw2f2v7fpanoewm@beryllium.lan> References: <20191018082817.111480-1-dwagner@suse.de> <20191018131532.dsfhyiilsi7cy4cm@linutronix.de> <20191022101747.001b6d06@cakuba.netronome.com> <20191023074719.gcov5xfrcvns5tlg@beryllium.lan> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20191023074719.gcov5xfrcvns5tlg@beryllium.lan> User-Agent: NeoMutt/20180716 Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Sebastian suggested to try this here: --- a/drivers/net/usb/lan78xx.c +++ b/drivers/net/usb/lan78xx.c @@ -1264,8 +1264,11 @@ static void lan78xx_status(struct lan78xx_net *dev, struct urb *urb) netif_dbg(dev, link, dev->net, "PHY INTR: 0x%08x\n", intdata); lan78xx_defer_kevent(dev, EVENT_LINK_RESET); - if (dev->domain_data.phyirq > 0) + if (dev->domain_data.phyirq > 0) { + local_irq_disable(); generic_handle_irq(dev->domain_data.phyirq); + local_irq_enable(); + } } else netdev_warn(dev->net, "unexpected interrupt: 0x%08x\n", intdata); While this gets rid of the warning, the networking interface is not really stable: [ 43.999628] nfs: server 192.168.19.2 not responding, still trying [ 43.999633] nfs: server 192.168.19.2 not responding, still trying [ 43.999649] nfs: server 192.168.19.2 not responding, still trying [ 43.999674] nfs: server 192.168.19.2 not responding, still trying [ 43.999678] nfs: server 192.168.19.2 not responding, still trying [ 44.006712] nfs: server 192.168.19.2 OK [ 44.018443] nfs: server 192.168.19.2 OK [ 44.024765] nfs: server 192.168.19.2 OK [ 44.025361] nfs: server 192.168.19.2 OK [ 44.025420] nfs: server 192.168.19.2 OK [ 256.991659] nfs: server 192.168.19.2 not responding, still trying [ 256.991664] nfs: server 192.168.19.2 not responding, still trying [ 256.991669] nfs: server 192.168.19.2 not responding, still trying [ 256.991685] nfs: server 192.168.19.2 not responding, still trying [ 256.991713] nfs: server 192.168.19.2 not responding, still trying [ 256.998797] nfs: server 192.168.19.2 OK [ 256.999745] nfs: server 192.168.19.2 OK [ 256.999828] nfs: server 192.168.19.2 OK [ 257.000438] nfs: server 192.168.19.2 OK [ 257.004784] nfs: server 192.168.19.2 OK Eventually, the rootfs can be loaded and the system boots. Though the system is not really usable because it often stalls: root@debian:~# apt update Ign:1 http://deb.debian.org/debian stretch InRelease Hit:2 http://deb.debian.org/debian stretch Release Reading package lists... 0% I don't see this with the irqdomain code reverted.