Received: by 2002:a25:8b91:0:0:0:0:0 with SMTP id j17csp1952378ybl; Sun, 19 Jan 2020 15:20:24 -0800 (PST) X-Google-Smtp-Source: APXvYqxGjwBiFugcANwpaBVeJTlhVLao6kn3OXfuzTeKEhy/ngbBNgrxAYB/NjexOSVePANp4aD0 X-Received: by 2002:a9d:ec1:: with SMTP id 59mr13576019otj.141.1579476024811; Sun, 19 Jan 2020 15:20:24 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1579476024; cv=none; d=google.com; s=arc-20160816; b=d/fMYpzSF5rIknZyIedJL/N6H7X2XdYosEawAn8BdDMzDKmFyV8IbJE7WwoXtoMUrk tk07rPfqo85Uri/0qDFc+nESa+Mp/GggJCvxUl9+MyjtUKYy+ukqJTn4KLDuPb6C/YSu r0CgosPhIjXAU7hZyHuMtmvJpZ8Oet+Lfq5h8x03Jdi7mvFN9F44wzUqTd9+quVH9G68 uPXNxh6LbJ1sJiMZQDR9QJV1OMejHS6DI2wa8gI0bHIsEvGKaPW/kOR0p9203hwFjete naMnPTyg2CFBhjAQN/1S0i69jq2lk4Wpz7cRsXh43adapPZjrvN2IDVTFxAjJt13X4Yx Ir3w== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:date:subject:from:references:in-reply-to :message-id:cc:to; bh=03N/QrgOKXhUlIRolbKGI+S+ViSPxm+uFTXoiR2wuUk=; b=mnE2onxhQg36grPUd5ictksctrQ6JHk5+UbGhxmuZumi57cM4XQanuudIirlyVkH9a V0/YedU90U6GuDNpqoCsuUvlyyw0kBN8CBicZfeIROmO4CJxHt3TLO+kAb+80+LNNFby HBP/w45J3OQUTiozYhX6frEI1WBpGxauNhxue4zlgVGYOZ8TNCM50GXGTN1zduRpX3g0 lB1E2FKTfGJ9AgFTIFPWIOSnc/7lJrYBJqzJm1iIXkJarp6waOG2l8+8bnJAGcobKcE1 txHen05bsU1ojD5WJA9ULWd/VtsA75qO77RNRV35QmCCkAWah1XkU9z5AAgFabKhOs0A RRVA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id v9si9613165otp.219.2020.01.19.15.20.13; Sun, 19 Jan 2020 15:20:24 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1729534AbgASXSE (ORCPT + 99 others); Sun, 19 Jan 2020 18:18:04 -0500 Received: from kvm5.telegraphics.com.au ([98.124.60.144]:49796 "EHLO kvm5.telegraphics.com.au" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1728946AbgASXQc (ORCPT ); Sun, 19 Jan 2020 18:16:32 -0500 Received: by kvm5.telegraphics.com.au (Postfix, from userid 502) id 0F4862996F; Sun, 19 Jan 2020 18:16:31 -0500 (EST) To: "David S. Miller" Cc: Thomas Bogendoerfer , Chris Zankel , Laurent Vivier , netdev@vger.kernel.org, linux-kernel@vger.kernel.org Message-Id: <0975406d8cd8d821db7475e9546c32e94f680f0b.1579474569.git.fthain@telegraphics.com.au> In-Reply-To: References: From: Finn Thain Subject: [PATCH net 06/19] net/macsonic: Remove interrupt handler wrapper Date: Mon, 20 Jan 2020 09:56:09 +1100 Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On m68k, local irqs remain enabled while interrupt handlers execute. Therefore the macsonic driver has had to disable interrupts to avoid re-entering sonic_interrupt(). With the preceding patch, sonic_interrupt() was made re-entrant, which means its wrapper is now redundant. Tested-by: Stan Johnson Signed-off-by: Finn Thain --- drivers/net/ethernet/natsemi/macsonic.c | 19 ++++--------------- 1 file changed, 4 insertions(+), 15 deletions(-) diff --git a/drivers/net/ethernet/natsemi/macsonic.c b/drivers/net/ethernet/natsemi/macsonic.c index 0f4d0c25d626..1b5559aacb38 100644 --- a/drivers/net/ethernet/natsemi/macsonic.c +++ b/drivers/net/ethernet/natsemi/macsonic.c @@ -114,17 +114,6 @@ static inline void bit_reverse_addr(unsigned char addr[6]) addr[i] = bitrev8(addr[i]); } -static irqreturn_t macsonic_interrupt(int irq, void *dev_id) -{ - irqreturn_t result; - unsigned long flags; - - local_irq_save(flags); - result = sonic_interrupt(irq, dev_id); - local_irq_restore(flags); - return result; -} - static int macsonic_open(struct net_device* dev) { int retval; @@ -135,12 +124,12 @@ static int macsonic_open(struct net_device* dev) dev->name, dev->irq); goto err; } - /* Under the A/UX interrupt scheme, the onboard SONIC interrupt comes - * in at priority level 3. However, we sometimes get the level 2 inter- - * rupt as well, which must prevent re-entrance of the sonic handler. + /* Under the A/UX interrupt scheme, the onboard SONIC interrupt gets + * moved from level 2 to level 3. Unfortunately we still get some + * level 2 interrupts so register the handler for both. */ if (dev->irq == IRQ_AUTO_3) { - retval = request_irq(IRQ_NUBUS_9, macsonic_interrupt, 0, + retval = request_irq(IRQ_NUBUS_9, sonic_interrupt, 0, "sonic", dev); if (retval) { printk(KERN_ERR "%s: unable to get IRQ %d.\n", -- 2.24.1