Received: by 2002:a6b:fb09:0:0:0:0:0 with SMTP id h9csp1147054iog; Sat, 25 Jun 2022 02:06:04 -0700 (PDT) X-Google-Smtp-Source: AGRyM1vvo6mdsDcSi8bcVChCRrTbRTHuuTFUqgd7zqgKEESHb2RLk36+i10mBSQ6PYSd+oOTvIkg X-Received: by 2002:a05:6402:3818:b0:436:f2e1:64b3 with SMTP id es24-20020a056402381800b00436f2e164b3mr3909230edb.111.1656147963976; Sat, 25 Jun 2022 02:06:03 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1656147963; cv=none; d=google.com; s=arc-20160816; b=OaLmAsVPseVt5LED17kIjgoc5+/Djr/SoR7heW//v1YXU+npb8kKlBLC6lfEiK/8FI pKklRubSa9P68HtF1BoGoVQom9YejPcnkcrldaoGAWDxY4LtdHBVXpb3ZBT4NReMe4vH Nglr/XTtS9ezwqLoyyoh6SDd3j5dym7Sbp/vNwe1gA0qFUJV0447KxlG/S23Hmect2uY N01qODE2mYysaPGkKEcLWp8lVPnsGZeRiWOve5BiXS743E9qARpl3RBOsz7Eil+JzmGF eoqQ+xHQrjs4drBXroB87Uuw9etlRFt8jjIMsOhn3jOnG/pbi/pMs06bKw1ZZqsCmIS5 o88w== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:mime-version:user-agent:references:in-reply-to :subject:cc:to:from:message-id:date:dkim-signature; bh=eXOhiudUninKqRwSMzisZzJfKgyug57XiX1/hsnLGfw=; b=JV7Z1/8+2G1YgZHwHzjjEkZ6WetuZHL4eqmEyVCZ0RVUhVMTWbwOYtucEco5H9XjAV gduvjC26G3oibNgiw3BYjyX0Z99CQ4gEHflaxqCpzwqrxIeijPIC7Bt2bFkS9eNzGkRj 2aK2vkdY2oAHeq+wfreAgRZ7i88Q3kwZynOaKMfgjNrxtL+2DO7drwOuN/si3tSWLLoY HjFlzpwmGjoC3xv6F+gKmOSHSNLgqp2vaxmpRvXokJC+GDdEWRcaMZEvNilsJmEevL5Z BlygAS4HTA1xV3csuSPbW8AOmHfemtUmLQOBW/lAJfxlYDKm9apAxAAGNj86d+LllBMZ BU6Q== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=GHR5jvNl; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id h3-20020a056402280300b00435bb0732fesi7382069ede.234.2022.06.25.02.05.39; Sat, 25 Jun 2022 02:06:03 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=GHR5jvNl; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S232297AbiFYJDv (ORCPT + 99 others); Sat, 25 Jun 2022 05:03:51 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:43474 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S230268AbiFYJDu (ORCPT ); Sat, 25 Jun 2022 05:03:50 -0400 Received: from dfw.source.kernel.org (dfw.source.kernel.org [IPv6:2604:1380:4641:c500::1]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 8328A30F43; Sat, 25 Jun 2022 02:03:49 -0700 (PDT) Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by dfw.source.kernel.org (Postfix) with ESMTPS id 0F84260C62; Sat, 25 Jun 2022 09:03:48 +0000 (UTC) Received: by smtp.kernel.org (Postfix) with ESMTPSA id 283C8C341C7; Sat, 25 Jun 2022 09:03:47 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1656147827; bh=oEBOr5nihwu0e5C08ofN61Rn4yRRvUL8uiYvbyfu/aU=; h=Date:From:To:Cc:Subject:In-Reply-To:References:From; b=GHR5jvNlT9kroKwU5IEA3i/s0quzy+bpY4LobmUUj+72TZVQAHn8F4OyjMmxZ21nI OHYReAhUW44IS2IzPU5V2bt/dkIXYoOOqa/zBJ6mqxkwTjPGy8dQ+w0ukwsgOWAS9G GYKkWQUCryBxWbAYlB6HNB8mE2zp0TLTGM3mlqpohVJxGLMDTjVYn/r/pgFyDy80nc FOeMb9dvof0SK3kJsRD8LzoTsIMiYZppkTVuzMl+rXwRnzgItrllQuzrEZXYw/eXD0 z4a+4AZOPJgsE4bLDSzOmsJdfeuaEDpGbKmxqU0ua8n5bQZpRhuwzp7PqxzTkaXUXI gnjnF5rw0szXg== Received: from sofa.misterjones.org ([185.219.108.64] helo=wait-a-minute.misterjones.org) by disco-boy.misterjones.org with esmtpsa (TLS1.3) tls TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (Exim 4.95) (envelope-from ) id 1o51gz-0032Mt-Cz; Sat, 25 Jun 2022 10:03:44 +0100 Date: Sat, 25 Jun 2022 10:03:06 +0100 Message-ID: <8735ftf73p.wl-maz@kernel.org> From: Marc Zyngier To: Lad Prabhakar Cc: Thomas Gleixner , Rob Herring , Krzysztof Kozlowski , Sagar Kadam , Palmer Dabbelt , Paul Walmsley , linux-riscv@lists.infradead.org, devicetree@vger.kernel.org, Geert Uytterhoeven , linux-renesas-soc@vger.kernel.org, linux-kernel@vger.kernel.org, Prabhakar , Biju Das Subject: Re: [PATCH 2/2] irqchip/sifive-plic: Add support for Renesas RZ/Five SoC In-Reply-To: <20220624180311.3007-3-prabhakar.mahadev-lad.rj@bp.renesas.com> References: <20220624180311.3007-1-prabhakar.mahadev-lad.rj@bp.renesas.com> <20220624180311.3007-3-prabhakar.mahadev-lad.rj@bp.renesas.com> User-Agent: Wanderlust/2.15.9 (Almost Unreal) SEMI-EPG/1.14.7 (Harue) FLIM-LB/1.14.9 (=?UTF-8?B?R29qxY0=?=) APEL-LB/10.8 EasyPG/1.0.0 Emacs/27.1 (x86_64-pc-linux-gnu) MULE/6.0 (HANACHIRUSATO) MIME-Version: 1.0 (generated by SEMI-EPG 1.14.7 - "Harue") Content-Type: text/plain; charset=US-ASCII X-SA-Exim-Connect-IP: 185.219.108.64 X-SA-Exim-Rcpt-To: prabhakar.mahadev-lad.rj@bp.renesas.com, tglx@linutronix.de, robh+dt@kernel.org, krzysztof.kozlowski+dt@linaro.org, sagar.kadam@sifive.com, palmer@dabbelt.com, paul.walmsley@sifive.com, linux-riscv@lists.infradead.org, devicetree@vger.kernel.org, geert+renesas@glider.be, linux-renesas-soc@vger.kernel.org, linux-kernel@vger.kernel.org, prabhakar.csengg@gmail.com, biju.das.jz@bp.renesas.com X-SA-Exim-Mail-From: maz@kernel.org X-SA-Exim-Scanned: No (on disco-boy.misterjones.org); SAEximRunCond expanded to false X-Spam-Status: No, score=-7.7 required=5.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,RCVD_IN_DNSWL_HI, SPF_HELO_NONE,SPF_PASS,T_SCC_BODY_TEXT_LINE autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Fri, 24 Jun 2022 19:03:11 +0100, Lad Prabhakar wrote: > > The Renesas RZ/Five SoC has a RISC-V AX45MP AndesCore with NCEPLIC100. The > NCEPLIC100 supports both edge-triggered and level-triggered interrupts. In > case of edge-triggered interrupts NCEPLIC100 ignores the next interrupt > edge until the previous completion message has been received and > NCEPLIC100 doesn't support pending interrupt counter, hence losing the > interrupts if not acknowledged in time. > > So the workaround for edge-triggered interrupts to be handled correctly > and without losing is that it needs to be acknowledged first and then > handler must be run so that we don't miss on the next edge-triggered > interrupt. > > This patch adds a new compatible string for Renesas RZ/Five SoC and > changes the chained interrupt haindler for RZ/Five SoC. > > Signed-off-by: Lad Prabhakar > --- > RFC-->v1: > * Fixed review comments pointed by Geert > * Dropped handle_fasteoi_ack_irq support as for the PLIC we need to > claim the interrupt by reading the register and then acknowledge it. Why? This is exactly what the fasteoi_ack flow gives you, and your initial patch was much better that this one in that regard. > * Add a new chained handler for RZ/Five SoC. > --- > drivers/irqchip/irq-sifive-plic.c | 95 +++++++++++++++++++++++++++++-- > 1 file changed, 91 insertions(+), 4 deletions(-) > > diff --git a/drivers/irqchip/irq-sifive-plic.c b/drivers/irqchip/irq-sifive-plic.c > index 173446cc9204..f53dff49e122 100644 > --- a/drivers/irqchip/irq-sifive-plic.c > +++ b/drivers/irqchip/irq-sifive-plic.c > @@ -60,10 +60,13 @@ > #define PLIC_DISABLE_THRESHOLD 0x7 > #define PLIC_ENABLE_THRESHOLD 0 > > +#define PLIC_INTERRUPT_CELL_SIZE2 2 > + > struct plic_priv { > struct cpumask lmask; > struct irq_domain *irqdomain; > void __iomem *regs; > + u32 intsize; > }; > > struct plic_handler { > @@ -163,7 +166,7 @@ static int plic_set_affinity(struct irq_data *d, > } > #endif > > -static void plic_irq_eoi(struct irq_data *d) > +static void plic_irq_ack(struct irq_data *d) > { > struct plic_handler *handler = this_cpu_ptr(&plic_handlers); > > @@ -176,6 +179,23 @@ static void plic_irq_eoi(struct irq_data *d) > } > } > > +static void plic_irq_eoi(struct irq_data *d) > +{ > + struct plic_handler *handler = this_cpu_ptr(&plic_handlers); > + unsigned int irq = irq_find_mapping(handler->priv->irqdomain, d->hwirq); > + > + /* > + * For Renesas RZ/Five (R9A07G043) SoC if the interrupt type is > + * IRQ_TYPE_EDGE_RISING we have already acknowledged it in the > + * handler. > + */ > + if (handler->priv->intsize == PLIC_INTERRUPT_CELL_SIZE2 && This costs you an extra two reads on the fast path, which is an unnecessary overhead for existing systems that do not suffer from this problem. Consider turning it into a static key. Also, blindly renaming plic_irq_eoi() to ack() is extremely confusing. I really think you should have your own callbacks instead of making a mess of the existing one. > + (irq_get_trigger_type(irq) & IRQ_TYPE_EDGE_RISING)) > + return; > + > + plic_irq_ack(d); > +} > + > static const struct irq_chip plic_chip = { > .name = "SiFive PLIC", > .irq_mask = plic_irq_mask, > @@ -198,6 +218,19 @@ static int plic_irqdomain_map(struct irq_domain *d, unsigned int irq, > return 0; > } > > +static int plic_irq_domain_translate(struct irq_domain *d, > + struct irq_fwspec *fwspec, > + unsigned long *hwirq, > + unsigned int *type) > +{ > + struct plic_priv *priv = d->host_data; > + > + if (priv->intsize == PLIC_INTERRUPT_CELL_SIZE2) > + return irq_domain_translate_twocell(d, fwspec, hwirq, type); > + > + return irq_domain_translate_onecell(d, fwspec, hwirq, type); > +} > + > static int plic_irq_domain_alloc(struct irq_domain *domain, unsigned int virq, > unsigned int nr_irqs, void *arg) > { > @@ -206,7 +239,7 @@ static int plic_irq_domain_alloc(struct irq_domain *domain, unsigned int virq, > unsigned int type; > struct irq_fwspec *fwspec = arg; > > - ret = irq_domain_translate_onecell(domain, fwspec, &hwirq, &type); > + ret = plic_irq_domain_translate(domain, fwspec, &hwirq, &type); > if (ret) > return ret; > > @@ -220,11 +253,55 @@ static int plic_irq_domain_alloc(struct irq_domain *domain, unsigned int virq, > } > > static const struct irq_domain_ops plic_irqdomain_ops = { > - .translate = irq_domain_translate_onecell, > + .translate = plic_irq_domain_translate, > .alloc = plic_irq_domain_alloc, > .free = irq_domain_free_irqs_top, > }; > > +/* > + * On Renesas RZ/Five (R9A07G043) SoC IRQ_TYPE_LEVEL_HIGH and > + * IRQ_TYPE_EDGE_RISING interrupts are the supported interrupt types. > + * If the global interrupt source was edge-triggered NCEPLIC100 (PLIC > + * core on Renesas RZ/Five SoC) ignores next edge interrupts until the > + * previous completion message is received. NCEPLIC100 on Renesas RZ/Five > + * SoC doesn't stack the pending interrupts so in case there is a delay > + * in handling the IRQ_TYPE_EDGE_RISING interrupt we lose the subsequent > + * interrupts. The workaround for IRQ_TYPE_EDGE_RISING interrupt is to > + * first we have to claim the interrupt by reading the claim register, > + * then quickly issue an complete interrupt by writing the source ID > + * register back to the claim register and then later run the handler. > + */ > +static void renesas_rzfive_plic_handle_irq(struct irq_desc *desc) > +{ > + struct plic_handler *handler = this_cpu_ptr(&plic_handlers); > + struct irq_chip *chip = irq_desc_get_chip(desc); > + void __iomem *claim = handler->hart_base + CONTEXT_CLAIM; > + irq_hw_number_t hwirq; > + unsigned int irq; > + int err; > + > + WARN_ON_ONCE(!handler->present); > + > + chained_irq_enter(chip, desc); > + > + while ((hwirq = readl(claim))) { > + irq = irq_find_mapping(handler->priv->irqdomain, hwirq); > + if (!irq) { > + pr_warn_ratelimited("can't find mapping for hwirq %lu\n", hwirq); > + break; > + } > + > + if (irq_get_trigger_type(irq) & IRQ_TYPE_EDGE_RISING) > + plic_irq_ack(irq_get_irq_data(irq)); > + > + err = generic_handle_irq(irq); No. We're not going back to this sort of constructs. Using the fasteoi_ack flow should work if properly configured. Also, looking up the interrupt *four* times in various tables/trees is not exactly the sort of things I want to see for a driver written in this century. Please explain why fasteoi_ack doesn't work. It really should work out of the box (I asked you to look into debugfs last time, but didn't ear anything from you on the subject). And if something is broken, let's fix it. But none of the above, please. > + if (err) > + pr_warn_ratelimited("error handling irq %u\n", irq); > + } > + > + chained_irq_exit(chip, desc); > +} > + > /* > * Handling an interrupt is a two-step process: first you claim the interrupt > * by reading the claim register, then you complete the interrupt by writing > @@ -288,11 +365,20 @@ static int __init plic_init(struct device_node *node, > u32 nr_irqs; > struct plic_priv *priv; > struct plic_handler *handler; > + irq_flow_handler_t plic_chanined_handler; > > priv = kzalloc(sizeof(*priv), GFP_KERNEL); > if (!priv) > return -ENOMEM; > > + if (of_property_read_u32(node, "#interrupt-cells", &priv->intsize)) > + return -EINVAL; > + > + if (priv->intsize == PLIC_INTERRUPT_CELL_SIZE2) Please gate this on the compatible string, not on the number of cells. M. -- Without deviation from the norm, progress is not possible.