Received: by 2002:a25:ef43:0:0:0:0:0 with SMTP id w3csp730925ybm; Fri, 29 May 2020 10:46:03 -0700 (PDT) X-Google-Smtp-Source: ABdhPJwrjbYXcQGhMDpcq9FsH3CCA84/qdLZh5otSKsEf0b3Ab2GS3NZcZcU0hR3im8z1ELpCE2c X-Received: by 2002:a17:906:6d44:: with SMTP id a4mr9123416ejt.541.1590774363492; Fri, 29 May 2020 10:46:03 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1590774363; cv=none; d=google.com; s=arc-20160816; b=FGkM+YtKB0euRsD2Qh6yV6F/tkILkkXw0xnpg1cG+w1QzuQDVAGi6hpYllHdi4M2QZ QNivq60qEH5ZWsMHo0rnJtzOXvpJoqq84j8g4kS7sYjN/eEYr3ObaNSIVELwhl1qLBPa Pd2GbFNAllsv6jwjaf5A9uZZC04AVeGLnTxGMC/XFpMdTAXr8CLwT6ac/EcjkKZTEPub 78qRM3eqmyA+ICCZGJ4zMP/k1b92MJcikN/AXxBBiqrEJBbUYW0gS8l71jeY3f5QBfHG 7P5161Q91R7Pwv357zmLQUorHRtjFJSeaFN0VS95hUv366B9tGmTQGqJ+tlPm5oC4Gkb EXOw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:message-id:subject:cc :to:from:date; bh=5O3YjsG1f6LMxzKJkgWya3jAtqSqrTRF15qRH/h+ME4=; b=hDRUPH1rNbuG0WEH3eVLun86Zkers4zyv3579jlAhntFu4SkcCuN3smHcT7cwpc+BQ PVJlSzipTVij+GT93WpKNsY1T1TdYod5NLeRz4+Qs5/dy15YPJYr8YaUowQLMw+t7b0m 5b1jGQmvuhXajoCejHr8zdMbwcaWbGXV1p6fQzUOv8EKpfYhgBx4I/+LhMrrLQ5OH3kV 4oN8n55CExKE8yZiIEvzKJHnP1e8BjdNksPJCdQmxJ2V1VE/Fh/ByAPKH4tdRVen6aMW HBafNwbjFIJAPMVhHoBHb4HOy1eaSxvqLi4AoYQHj6+dYo+dPpq/fWGlKX16QTN/UOWh Gecw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id z8si5674588edx.161.2020.05.29.10.45.40; Fri, 29 May 2020 10:46:03 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727789AbgE2RoB (ORCPT + 99 others); Fri, 29 May 2020 13:44:01 -0400 Received: from bmailout2.hostsharing.net ([83.223.78.240]:54299 "EHLO bmailout2.hostsharing.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726555AbgE2RoB (ORCPT ); Fri, 29 May 2020 13:44:01 -0400 Received: from h08.hostsharing.net (h08.hostsharing.net [IPv6:2a01:37:1000::53df:5f1c:0]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client CN "*.hostsharing.net", Issuer "COMODO RSA Domain Validation Secure Server CA" (not verified)) by bmailout2.hostsharing.net (Postfix) with ESMTPS id E157C2800A291; Fri, 29 May 2020 19:43:58 +0200 (CEST) Received: by h08.hostsharing.net (Postfix, from userid 100393) id B102810D0CE; Fri, 29 May 2020 19:43:58 +0200 (CEST) Date: Fri, 29 May 2020 19:43:58 +0200 From: Lukas Wunner To: Nicolas Saenz Julienne Cc: Mark Brown , Florian Fainelli , Ray Jui , Scott Branden , bcm-kernel-feedback-list@broadcom.com, Martin Sperl , linux-spi@vger.kernel.org, linux-rpi-kernel@lists.infradead.org, linux-arm-kernel@lists.infradead.org, linux-kernel@vger.kernel.org Subject: Re: [PATCH] spi: bcm2835: Enable shared interrupt support Message-ID: <20200529174358.som3snunfxch6phi@wunner.de> References: <20200528185805.28991-1-nsaenzjulienne@suse.de> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20200528185805.28991-1-nsaenzjulienne@suse.de> User-Agent: NeoMutt/20170113 (1.7.2) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Thu, May 28, 2020 at 08:58:04PM +0200, Nicolas Saenz Julienne wrote: > --- a/drivers/spi/spi-bcm2835.c > +++ b/drivers/spi/spi-bcm2835.c > @@ -379,6 +379,10 @@ static irqreturn_t bcm2835_spi_interrupt(int irq, void *dev_id) > if (bs->tx_len && cs & BCM2835_SPI_CS_DONE) > bcm2835_wr_fifo_blind(bs, BCM2835_SPI_FIFO_SIZE); > > + /* check if we got interrupt enabled */ > + if (!(bcm2835_rd(bs, BCM2835_SPI_CS) & BCM2835_SPI_CS_INTR)) > + return IRQ_NONE; > + > /* Read as many bytes as possible from FIFO */ > bcm2835_rd_fifo(bs); > /* Write as many bytes as possible to FIFO */ This definitely looks wrong. The check whether the interrupt is enabled should be moved *before* the conditional calls to bcm2835_rd_fifo_blind() and bcm2835_wr_fifo_blind(), i.e. to the top of the function. Otherwise if an interrupt is raised by another SPI controller, this function may perform read/write accesses to the FIFO and interfere with an ongoing transfer in DMA or poll mode. Also, instead of performing an MMIO read, just use the "cs" variable which was assigned at the top of the function. The code comment should explain that the check is necessary because the interrupt may be shared with other controllers on the BCM2711. Finally, it would be nice if the check would be optimized away when compiling for pre-RasPi4 products, maybe something like: + if (IS_ENABLED(CONFIG_ARM_LPAE) && !(cs & BCM2835_SPI_CS_INTR)) + return IRQ_NONE; Thanks, Lukas