Received: by 2002:a05:6a10:9848:0:0:0:0 with SMTP id x8csp3227292pxf; Mon, 15 Mar 2021 04:58:37 -0700 (PDT) X-Google-Smtp-Source: ABdhPJyoDCsS45CrPi5tECjQ1CyW/MH5IOqsUwbqVOHwCBV1UhuWo0k2zJLLM7LLk+3IgadNL+8Q X-Received: by 2002:a17:906:38da:: with SMTP id r26mr23707519ejd.251.1615809516956; Mon, 15 Mar 2021 04:58:36 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1615809516; cv=none; d=google.com; s=arc-20160816; b=vQUgp/br5J5JntbBBVtcDtYBAgynLtioMpTwnKvHFfMyQBySc3J7iiqdPhU6sVPMCL D34KWIX5tX6ybJR+TGwK/siu/VJK/Z0gZ8TTJZSiNQiJNrzPhIf3njhNHOWH/yIi+DoG PDPIa26PMYcVh0SWtUcNYkmJigzX9cGcDwrSuwf5hlJxZcZTuCMw3MCUyLLhCoUUQfJ+ s7lt0teMfj6fDCdhCMCx62IboLg38NYKjGgWGuIW+Iy4K13eem3TeBgNzIZGtsiae/ja lOPJPC5DJiiWWg6LyuWV9DkvhIRLAwOk6Hc70NOgZ5O88yzCvWovwzy8maABVyWcg+S0 +hoQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:references:in-reply-to:message-id:date:subject :cc:to:from; bh=p963nLICQgNr+d0X794iVyOMd4c2h32BFNe3eq1XV1k=; b=xJJNG+Q3zdILKmQZJYAnK6ONYZ/4AKJVKU6497elW7C2IPK47HRx5ZEM9AXR8+D9HP U6DeUwAVEIHdI0RmNGsx+J7KsSnpwvFs/ZmxEagmoGn7kCDQDI6h2t8Hkk9Xup0HBQs+ WURQusgQwnvjH2QFrrdcB4n/HeLTUaGqQOyuaxwywgT6yqWT3sY48q9roB+DXRN3apQX X/I07hOo+xmC2I5hHss+z6WMr95qZdyPCh2rVT8CRyWikc2yi5hBTVY9lPR4dU31fevj MFI95acNv4no8uGqcEyOsRf8hTNoVUCEe8VHS7suSg8f59xc2TtPgbPw/2EnaBHMEibz mG8g== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=arm.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id s20si10318076ejx.652.2021.03.15.04.58.14; Mon, 15 Mar 2021 04:58:36 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=arm.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S230388AbhCOL4v (ORCPT + 99 others); Mon, 15 Mar 2021 07:56:51 -0400 Received: from foss.arm.com ([217.140.110.172]:35068 "EHLO foss.arm.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229921AbhCOL4o (ORCPT ); Mon, 15 Mar 2021 07:56:44 -0400 Received: from usa-sjc-imap-foss1.foss.arm.com (unknown [10.121.207.14]) by usa-sjc-mx-foss1.foss.arm.com (Postfix) with ESMTP id 0156611D4; Mon, 15 Mar 2021 04:56:44 -0700 (PDT) Received: from lakrids.cambridge.arm.com (usa-sjc-imap-foss1.foss.arm.com [10.121.207.14]) by usa-sjc-imap-foss1.foss.arm.com (Postfix) with ESMTPA id BEEC33F792; Mon, 15 Mar 2021 04:56:42 -0700 (PDT) From: Mark Rutland To: linux-arm-kernel@lists.infradead.org, linux-kernel@vger.kernel.org, will@kernel.org, catalin.marinas@arm.com Cc: james.morse@arm.com, marcan@marcan.st, mark.rutland@arm.com, maz@kernel.org, tglx@linutronix.de Subject: [PATCHv3 3/6] arm64: irq: rework root IRQ handler registration Date: Mon, 15 Mar 2021 11:56:26 +0000 Message-Id: <20210315115629.57191-4-mark.rutland@arm.com> X-Mailer: git-send-email 2.11.0 In-Reply-To: <20210315115629.57191-1-mark.rutland@arm.com> References: <20210315115629.57191-1-mark.rutland@arm.com> Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org If we accidentally unmask IRQs before we've registered a root IRQ handler, handle_arch_irq will be NULL, and the IRQ exception handler will branch to a bogus address. To make this easier to debug, this patch initialises handle_arch_irq to a default handler which will panic(), making such problems easier to debug. When we add support for FIQ handlers, we can follow the same approach. When we add support for a root FIQ handler, it's possible to have root IRQ handler without an root FIQ handler, and in theory the inverse is also possible. To permit this, and to keep the IRQ/FIQ registration logic similar, this patch removes the panic in the absence of a root IRQ controller. Instead, set_handle_irq() logs when a handler is registered, which is sufficient for debug purposes. Signed-off-by: Mark Rutland Tested-by: Hector Martin Cc: Catalin Marinas Cc: James Morse Cc: Marc Zyngier Cc: Thomas Gleixner Cc: Will Deacon --- arch/arm64/kernel/irq.c | 12 ++++++++---- 1 file changed, 8 insertions(+), 4 deletions(-) diff --git a/arch/arm64/kernel/irq.c b/arch/arm64/kernel/irq.c index ad63bd50fa7b..2fe0b535de30 100644 --- a/arch/arm64/kernel/irq.c +++ b/arch/arm64/kernel/irq.c @@ -71,14 +71,20 @@ static void init_irq_stacks(void) } #endif -void (*handle_arch_irq)(struct pt_regs *) __ro_after_init; +static void default_handle_irq(struct pt_regs *regs) +{ + panic("IRQ taken without a root IRQ handler\n"); +} + +void (*handle_arch_irq)(struct pt_regs *) __ro_after_init = default_handle_irq; int __init set_handle_irq(void (*handle_irq)(struct pt_regs *)) { - if (handle_arch_irq) + if (handle_arch_irq != default_handle_irq) return -EBUSY; handle_arch_irq = handle_irq; + pr_info("Root IRQ handler: %ps\n", handle_irq); return 0; } @@ -87,8 +93,6 @@ void __init init_IRQ(void) init_irq_stacks(); init_irq_scs(); irqchip_init(); - if (!handle_arch_irq) - panic("No interrupt controller found."); if (system_uses_irq_prio_masking()) { /* -- 2.11.0