Received: by 2002:a05:6a10:9e8c:0:0:0:0 with SMTP id y12csp380891pxx; Wed, 28 Oct 2020 07:07:28 -0700 (PDT) X-Google-Smtp-Source: ABdhPJxVnW2xk/tew//ntKL8aUwx1p6UCi1z/Hg45/HP/bm12HOEdDJjWXfmXS/0KC2NBrTSqJ3c X-Received: by 2002:aa7:d38d:: with SMTP id x13mr8099246edq.355.1603894048346; Wed, 28 Oct 2020 07:07:28 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1603894048; cv=none; d=google.com; s=arc-20160816; b=kTx0YBCdHmCbyOsNKZ7XcjrugwXoryXCscq7FcEd99D9Eqqlz0fl1OInEZMLUsjy/c aRXDJ/Mpo8IdjUhrHBgDDX0Cx3IyVv+TTehsJYOenZsaUaFGVIaEwGzV3y9/p+xv4svj UM6y20W3VHfsM535oFKCcf332GuvlhDOqccNy18JeAqHslwyl9Ms5t3LyAGRDnKz3McB r69HWUSD5UoT8YefH3Vz4nHf0OU0XdkLwVkIYJ93WFga6GpmFa+BOV45d6uxKk7JFnl+ /8buMCunBkiomZTcPuMTSZJ8JF+3gHXLei532ShkNoe/IT9ZBhx08UiB8K40iI5pDa6y VDWg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=vTpm4e4w9FhVBhjL71KlzTDV8V1JakGmsV29BypD38Y=; b=mZroNQP/XLHayA/yeydBvHdp5yZ0Vh6nDlwbGeyTPW7Z0sRREqCnfmB2denpFvs7Ik FZR0/oXc9m5cAc213O/GC2OCm/AfAWlrkD0Z9aLX422GRrmO9Xk9eLlQ34MBqljCGqQz cmTuA36VFMOt76b0mDipYEqFD1+MdHiABvTHP3HTXKyzo2TP4Eu7w7qfzHT3n4Z4GmGE ee+v3cgcwjIkVW1RO+AT6+k85iO69dZ7z3chbwgDekNNrwiY1NllcTtkjWb4m/d7v7gq 1CLbdo654Repg3lB4kLoc5/TFWLJUW0yoJ+WS0nC38EWZrhNkECeVdXA/fOE3qH3WbUz ak/Q== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=XYiyvbpL; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id y19si2789537ejd.730.2020.10.28.07.07.03; Wed, 28 Oct 2020 07:07:28 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=XYiyvbpL; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1804060AbgJ0Pxk (ORCPT + 99 others); Tue, 27 Oct 2020 11:53:40 -0400 Received: from mail.kernel.org ([198.145.29.99]:57700 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1796564AbgJ0PTf (ORCPT ); Tue, 27 Oct 2020 11:19:35 -0400 Received: from localhost (83-86-74-64.cable.dynamic.v4.ziggo.nl [83.86.74.64]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 296182064B; Tue, 27 Oct 2020 15:19:33 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1603811974; bh=gl9jYQHB64yfPpXuZ30FP/ZZmJq9n0BwfJEhUgXzYZY=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=XYiyvbpL2lxzESXhhJJR/RCv8oqPHj2i+FfSQZYtTR+l4RGHapRmqBRt3gBUnRzIg qsPSyADise96FJG58mvu6uAvjYzklvip2wxRRGi769DJmdGPZhdVHQnB5fNiWJ/xzk caAo1fIN33fs7ofMmeXI0SLh3h82AbxuuclG0x6Y= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Heiner Kallweit , Jakub Kicinski Subject: [PATCH 5.9 049/757] r8169: fix operation under forced interrupt threading Date: Tue, 27 Oct 2020 14:44:59 +0100 Message-Id: <20201027135452.851788913@linuxfoundation.org> X-Mailer: git-send-email 2.29.1 In-Reply-To: <20201027135450.497324313@linuxfoundation.org> References: <20201027135450.497324313@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Heiner Kallweit [ Upstream commit 424a646e072a887aa87283b53aa6f8b19c2a7bef ] For several network drivers it was reported that using __napi_schedule_irqoff() is unsafe with forced threading. One way to fix this is switching back to __napi_schedule, but then we lose the benefit of the irqoff version in general. As stated by Eric it doesn't make sense to make the minimal hard irq handlers in drivers using NAPI a thread. Therefore ensure that the hard irq handler is never thread-ified. Fixes: 9a899a35b0d6 ("r8169: switch to napi_schedule_irqoff") Link: https://lkml.org/lkml/2020/10/18/19 Signed-off-by: Heiner Kallweit Link: https://lore.kernel.org/r/4d3ef84a-c812-5072-918a-22a6f6468310@gmail.com Signed-off-by: Jakub Kicinski Signed-off-by: Greg Kroah-Hartman --- drivers/net/ethernet/realtek/r8169_main.c | 8 ++++---- 1 file changed, 4 insertions(+), 4 deletions(-) --- a/drivers/net/ethernet/realtek/r8169_main.c +++ b/drivers/net/ethernet/realtek/r8169_main.c @@ -4686,7 +4686,7 @@ static int rtl8169_close(struct net_devi phy_disconnect(tp->phydev); - pci_free_irq(pdev, 0, tp); + free_irq(pci_irq_vector(pdev, 0), tp); dma_free_coherent(&pdev->dev, R8169_RX_RING_BYTES, tp->RxDescArray, tp->RxPhyAddr); @@ -4737,8 +4737,8 @@ static int rtl_open(struct net_device *d rtl_request_firmware(tp); - retval = pci_request_irq(pdev, 0, rtl8169_interrupt, NULL, tp, - dev->name); + retval = request_irq(pci_irq_vector(pdev, 0), rtl8169_interrupt, + IRQF_NO_THREAD | IRQF_SHARED, dev->name, tp); if (retval < 0) goto err_release_fw_2; @@ -4755,7 +4755,7 @@ out: return retval; err_free_irq: - pci_free_irq(pdev, 0, tp); + free_irq(pci_irq_vector(pdev, 0), tp); err_release_fw_2: rtl_release_firmware(tp); rtl8169_rx_clear(tp);