Received: by 2002:a05:6a10:f347:0:0:0:0 with SMTP id d7csp1909676pxu; Tue, 24 Nov 2020 11:49:59 -0800 (PST) X-Google-Smtp-Source: ABdhPJzOfWU7HSqyf1pgcHnoZWwFGde7KT1FAQ+00IU4ORjHM3tzpZFT7jUBLNBXZReyOlAcUjw6 X-Received: by 2002:a17:906:f05:: with SMTP id z5mr54551eji.8.1606247399485; Tue, 24 Nov 2020 11:49:59 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1606247399; cv=none; d=google.com; s=arc-20160816; b=O5wy0nKCE7d55+4pe3g/Sww9812pG2x9fdjio2O9uy27UjJZPwzX2P9seSq8WnmiSy sAhtu1YlYEPRygcnj33Kgp79Mkr6pldOWhXRqUH3rfx1jrMzRD6p42o8ikwia+BIly50 q3+eJUafMYDIUCZ2YcqCQumQkfrgGoHbRDrauZ4oy+6yrDeBi/dqGPZbUY4u54u0ka0l O2PfYmy3qIFLM7CSa7pV7RqWyan0fwgISLe8s51+0/zEfaKICPZdRdgZEczVAqfM5vQc saoGIIgcHHw+8gYnG5Sy2qY+uvXZzJ3uObbjJmvMCgE97F6DmbZfzu38YpY6Rmh4Prm1 dD/w== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:references:in-reply-to:message-id:date:subject :cc:to:from; bh=wIlpiJDNgQN0lHX/bvW9FtXWE8NC3hCqxJ5UUIwjaRM=; b=Q2ZXEG9E6JNEFZZCLgIE+CDRF5vU7MIW1qBjgaY46zFEnRBXoeCTH0Z1xbPUwHBAOt yPqCJBTOeV2tzTymt8Ws76dtIp8ne60qVAM4i6a3/B3s/yPdezsqAvH9MzUHRh1q8/96 11Smmquf0s7gXW25ArtOwmGHHD4QfZpOoiKvWLyvj0YyD7vGl5aQLq+ij5fnhUUHk00X s2nxNFHjmaRWTvn9RS9AjAELzMAjEh1gU2K49K3eXNwDpW1jmlnUbbaml9s8GdfQx5MJ ZMveF/pFw0IH/9yTayP8uNSBMQXFpewGWOHpA5f8LC/ppt/zm7IW3FSBnAGpw0Tz1asJ VR5w== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id q10si5928043edi.178.2020.11.24.11.49.36; Tue, 24 Nov 2020 11:49:59 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728910AbgKXGSe (ORCPT + 99 others); Tue, 24 Nov 2020 01:18:34 -0500 Received: from ozlabs.ru ([107.174.27.60]:49790 "EHLO ozlabs.ru" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1727946AbgKXGSd (ORCPT ); Tue, 24 Nov 2020 01:18:33 -0500 Received: from fstn1-p1.ozlabs.ibm.com (localhost [IPv6:::1]) by ozlabs.ru (Postfix) with ESMTP id 894A2AE8024F; Tue, 24 Nov 2020 01:17:57 -0500 (EST) From: Alexey Kardashevskiy To: linux-kernel@vger.kernel.org Cc: =?UTF-8?q?C=C3=A9dric=20Le=20Goater?= , Frederic Barrat , =?UTF-8?q?Michal=20Such=C3=A1nek?= , "Oliver O'Halloran" , Marc Zyngier , Thomas Gleixner , linux-arm-kernel@lists.infradead.org, linux-gpio@vger.kernel.org, x86@kernel.org, linuxppc-dev@lists.ozlabs.org, Alexey Kardashevskiy Subject: [PATCH kernel v4 4/8] genirq: Free IRQ descriptor via embedded kobject Date: Tue, 24 Nov 2020 17:17:16 +1100 Message-Id: <20201124061720.86766-5-aik@ozlabs.ru> X-Mailer: git-send-email 2.17.1 In-Reply-To: <20201124061720.86766-1-aik@ozlabs.ru> References: <20201124061720.86766-1-aik@ozlabs.ru> Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org At the moment the IRQ descriptor is freed via the free_desc() helper. We want to add reference counting to IRQ descriptors and there is already kobj embedded into irq_desc which we want to reuse. This shuffles free_desc()/etc to make it simply call kobject_put() and moves all the cleanup into the kobject_release hook. As a bonus, we do not need irq_sysfs_del() as kobj removes itself from sysfs if it knows that it was added. This should cause no behavioral change. Signed-off-by: Alexey Kardashevskiy --- kernel/irq/irqdesc.c | 42 ++++++++++++------------------------------ 1 file changed, 12 insertions(+), 30 deletions(-) diff --git a/kernel/irq/irqdesc.c b/kernel/irq/irqdesc.c index 1a7723604399..75374b7944b5 100644 --- a/kernel/irq/irqdesc.c +++ b/kernel/irq/irqdesc.c @@ -295,18 +295,6 @@ static void irq_sysfs_add(int irq, struct irq_desc *desc) } } -static void irq_sysfs_del(struct irq_desc *desc) -{ - /* - * If irq_sysfs_init() has not yet been invoked (early boot), then - * irq_kobj_base is NULL and the descriptor was never added. - * kobject_del() complains about a object with no parent, so make - * it conditional. - */ - if (irq_kobj_base) - kobject_del(&desc->kobj); -} - static int __init irq_sysfs_init(void) { struct irq_desc *desc; @@ -337,7 +325,6 @@ static struct kobj_type irq_kobj_type = { }; static void irq_sysfs_add(int irq, struct irq_desc *desc) {} -static void irq_sysfs_del(struct irq_desc *desc) {} #endif /* CONFIG_SYSFS */ @@ -419,39 +406,34 @@ static struct irq_desc *alloc_desc(int irq, int node, unsigned int flags, return NULL; } -static void irq_kobj_release(struct kobject *kobj) -{ - struct irq_desc *desc = container_of(kobj, struct irq_desc, kobj); - - free_masks(desc); - free_percpu(desc->kstat_irqs); - kfree(desc); -} - static void delayed_free_desc(struct rcu_head *rhp) { struct irq_desc *desc = container_of(rhp, struct irq_desc, rcu); + free_masks(desc); + free_percpu(desc->kstat_irqs); + kfree(desc); +} + +static void free_desc(unsigned int irq) +{ + struct irq_desc *desc = irq_to_desc(irq); + kobject_put(&desc->kobj); } -static void free_desc(unsigned int irq) +static void irq_kobj_release(struct kobject *kobj) { - struct irq_desc *desc = irq_to_desc(irq); + struct irq_desc *desc = container_of(kobj, struct irq_desc, kobj); + unsigned int irq = desc->irq_data.irq; irq_remove_debugfs_entry(desc); unregister_irq_proc(irq, desc); /* - * sparse_irq_lock protects also show_interrupts() and - * kstat_irq_usr(). Once we deleted the descriptor from the - * sparse tree we can free it. Access in proc will fail to - * lookup the descriptor. - * * The sysfs entry must be serialized against a concurrent * irq_sysfs_init() as well. */ - irq_sysfs_del(desc); delete_irq_desc(irq); /* -- 2.17.1