Received: by 2002:a05:6a10:206:0:0:0:0 with SMTP id 6csp4694958pxj; Tue, 25 May 2021 14:10:23 -0700 (PDT) X-Google-Smtp-Source: ABdhPJytf4fkDcccOlumblKNI7b7nbr7mFE9t54pCMzTSqefgZRtnkZ8p1hICx2kskopCjlIZqP6 X-Received: by 2002:a5d:9d05:: with SMTP id j5mr24432467ioj.16.1621977023148; Tue, 25 May 2021 14:10:23 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1621977023; cv=none; d=google.com; s=arc-20160816; b=dnknENDiz/1iL1n7gaAZ6S9NBfvdS7+/BSKCgXyWQ9w0V03J08qFpPYzpwjQXqGuBP sWQ+52iyaB/BRXkz+7tNvZo1Yk5jcpT1I+JFANF/VQM2Fy3KbF3KM/p953jqmEwL08I+ 0P28h+NDczf6LKZs7osM5eyhkb9RNJzjgNNcb9p/YFP1RkfHSoEe1NpK8Xn+faejtweC gQ1044UEt8L5k612k1nGN9KJ2TkY9hXcwUaJf98BXRR+FXw3KvGlbh7rd2TU1tvmcG6p 2w4IqcIHyIVoU5WRnC7jdLXn7h42OshXZ41xWS2/jW89yLLyqUY5IZHQF2P7Yo4fPu48 gnTg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from; bh=miusHcVkalmMz4dWPUJ4OQxVJ+Wk7mfnVORat5YVhXI=; b=JYQVToLyPCS019gnvsDZ4CWg5yE5H7ls5bn1MbUaJCyqpom+SuXNwkLTKy0uFXzLes FD7JoyVAqPTeBqdEjKv3/1pFKrUYVdxoOqM2StN3DliiKq3QFJ51Tmfv6SFg9Qc365LS 79a9AxPD8pcL4/pEBLTq1eLOsUyJltku+LW/l7KR2tWGVRVJDfrN6DO2nmGlCh5bGS4B tD2vPD59VRjXYCVPzay+fpPHDmgCoXyCQFlOvIaZQPKF/cMTpWCw3KGSy6vowawWqynH qvJuEr4EMsgSt6u67lqEqwMTl5AWCxqAmXV6l5CWqC1EWArJV+1EXPceP6JmqP0Cqg2R bB4w== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=arm.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id f10si21157707ilu.68.2021.05.25.14.10.09; Tue, 25 May 2021 14:10:23 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=arm.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S234154AbhEYRfJ (ORCPT + 99 others); Tue, 25 May 2021 13:35:09 -0400 Received: from foss.arm.com ([217.140.110.172]:33076 "EHLO foss.arm.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S233922AbhEYRex (ORCPT ); Tue, 25 May 2021 13:34:53 -0400 Received: from usa-sjc-imap-foss1.foss.arm.com (unknown [10.121.207.14]) by usa-sjc-mx-foss1.foss.arm.com (Postfix) with ESMTP id EC6081692; Tue, 25 May 2021 10:33:22 -0700 (PDT) Received: from e113632-lin.cambridge.arm.com (e113632-lin.cambridge.arm.com [10.1.194.46]) by usa-sjc-imap-foss1.foss.arm.com (Postfix) with ESMTPA id CF75F3F73B; Tue, 25 May 2021 10:33:21 -0700 (PDT) From: Valentin Schneider To: linux-kernel@vger.kernel.org, linux-arm-kernel@lists.infradead.org Cc: Marc Zyngier , Thomas Gleixner , Lorenzo Pieralisi , Vincenzo Frascino Subject: [RFC PATCH v2 06/10] genirq: Don't mask IRQ within flow handler if IRQ is flow-masked Date: Tue, 25 May 2021 18:32:51 +0100 Message-Id: <20210525173255.620606-7-valentin.schneider@arm.com> X-Mailer: git-send-email 2.25.1 In-Reply-To: <20210525173255.620606-1-valentin.schneider@arm.com> References: <20210525173255.620606-1-valentin.schneider@arm.com> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org mask_irq() lets an IRQ with IRQD_IRQ_FLOW_MASKED set be further masked via chip->irq_mask(). This is necessary for unhandled IRQs as we want to keep them masked beyond eoi_irq() (which clears IRQD_IRQ_FLOW_MASKED). This is however not necessary in paths that do end up handling the IRQ and are bounded by a final eoi_irq() - this is the case for chips with IRQCHIP_AUTOMASKS_FLOW and IRQCHIP_EOI_THREADED. Make handle_strict_flow_irq() leverage IRQCHIP_AUTOMASKS_FLOW and issue an ack_irq() rather than a mask_ack_irq() when possible. Signed-off-by: Valentin Schneider --- kernel/irq/chip.c | 24 ++++++++++++++++++++---- 1 file changed, 20 insertions(+), 4 deletions(-) diff --git a/kernel/irq/chip.c b/kernel/irq/chip.c index 699e70b51aae..c2ca6b748987 100644 --- a/kernel/irq/chip.c +++ b/kernel/irq/chip.c @@ -896,6 +896,12 @@ void handle_edge_eoi_irq(struct irq_desc *desc) } #endif +/* + * AUTOMASKS_FLOW tells us ack/eoi handle the masking, EOI_THREADED tells us + * that masking will persist until irq_finalize_oneshot() + */ +#define ONESHOT_AUTOMASK_FLAGS (IRQCHIP_AUTOMASKS_FLOW | IRQCHIP_EOI_THREADED) + /** * handle_strict_flow_irq - irq handler for strict controllers * @desc: the interrupt description structure for this irq @@ -909,10 +915,9 @@ void handle_strict_flow_irq(struct irq_desc *desc) struct irq_chip *chip = desc->irq_data.chip; raw_spin_lock(&desc->lock); - mask_ack_irq(desc); if (!irq_may_run(desc)) - goto out; + goto out_mask; desc->istate &= ~(IRQS_REPLAY | IRQS_WAITING); @@ -922,10 +927,20 @@ void handle_strict_flow_irq(struct irq_desc *desc) */ if (unlikely(!desc->action || irqd_irq_disabled(&desc->irq_data))) { desc->istate |= IRQS_PENDING; - goto out; + goto out_mask; } kstat_incr_irqs_this_cpu(desc); + /* + * Masking is required if IRQ is ONESHOT and we can't rely on the + * flow-masking persisting down to irq_finalize_oneshot() + * (in the IRQ thread). + */ + if ((desc->istate & IRQS_ONESHOT) && + ((chip->flags & ONESHOT_AUTOMASK_FLAGS) != ONESHOT_AUTOMASK_FLAGS)) + mask_ack_irq(desc); + else + ack_irq(desc); handle_irq_event(desc); @@ -933,7 +948,8 @@ void handle_strict_flow_irq(struct irq_desc *desc) raw_spin_unlock(&desc->lock); return; -out: +out_mask: + mask_ack_irq(desc); /* * XXX: this is where IRQCHIP_EOI_IF_HANDLED would be checked, but * it's conceptually incompatible with this handler (it breaks the -- 2.25.1