Received: by 2002:a05:6358:d09b:b0:dc:cd0c:909e with SMTP id jc27csp12813726rwb; Sat, 26 Nov 2022 16:07:26 -0800 (PST) X-Google-Smtp-Source: AA0mqf5jewNudZEdrfZeEcK6mjgJzIfuvR3PDs+uyHt6syckt9GznjfE1ZuqhEDD7fSOEDfr2p2v X-Received: by 2002:a62:fb11:0:b0:56b:dbab:5362 with SMTP id x17-20020a62fb11000000b0056bdbab5362mr46242378pfm.47.1669507645911; Sat, 26 Nov 2022 16:07:25 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1669507645; cv=none; d=google.com; s=arc-20160816; b=obSV/0MEZzh+DfUt4w9WcTvSmWOs8hrkDyMhmxzgWJFhrWI4fyboZr4wugNe9eFE3X PMqk+cE7uwZcSmbNhcxXpAJfSiX5CDA6XN/iX1Z1vx8pRY6d6v3F02IrmpMujPlwC4uc 1kNZWxDYNNXOydrAexEyfxDG1JZYJSArc5+fghpyTMRvnn9fKEvE42OCXrNofDgMQb+l 2U+EDPf9xaJjepxpHOHsD+s9KMTMOg0eFRsp6qCCyngArSEyANKav3hNzxww3206v3W+ ebaYR8vkodGFFJyieAYcLf7x7yoBz71LDyr/qzaHaQtnSaIhSt8RMbooaf96VeM5YCxK WRiw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from :feedback-id:dkim-signature:dkim-signature; bh=ZvVBWKmSl7xxBZYvHtE90BQ1WRQAgayEAOP6BQlkaCs=; b=VZbsaejm0ns+YG2fbBdBt5tY+gGPTekn40l4O7Loe09L4mOiVMPzqpRlz/LzTCKuVS SGwB0gCBV6qChE3SJiiaUlHIFbRQCDR0TsG9C3Y8V5Bs0S8tIrJ9QnlUn5lXAH9JYcNU s8VQcgqNfdToSBdW+I2BmWKIPhuAlI4KB1qohuQobTl7iYmdVBhjBgzO+9SGoM2tAxie hVoIACRG1+OLDy9QJaXr2SuFg9/IT65Rz0XIdaLijQJQjIKx5zVR/wqcrmsQdqsBaAT5 qAfjLduY5g5NCzynqZNqPUVxzmp48fdKZUdhmI4XFXRaQMHqUha7ojFF8O/IzuaaWDp5 KLGA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@sholland.org header.s=fm2 header.b="SjgYiyY/"; dkim=pass header.i=@messagingengine.com header.s=fm1 header.b=WCctj4ZJ; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=sholland.org Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id u17-20020a634711000000b00450b99448b0si7694888pga.341.2022.11.26.16.07.12; Sat, 26 Nov 2022 16:07:25 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@sholland.org header.s=fm2 header.b="SjgYiyY/"; dkim=pass header.i=@messagingengine.com header.s=fm1 header.b=WCctj4ZJ; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=sholland.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S229564AbiKZXlp (ORCPT + 84 others); Sat, 26 Nov 2022 18:41:45 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:56954 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229502AbiKZXlk (ORCPT ); Sat, 26 Nov 2022 18:41:40 -0500 Received: from out1-smtp.messagingengine.com (out1-smtp.messagingengine.com [66.111.4.25]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 1A28EEE1F for ; Sat, 26 Nov 2022 15:41:39 -0800 (PST) Received: from compute3.internal (compute3.nyi.internal [10.202.2.43]) by mailout.nyi.internal (Postfix) with ESMTP id 5FC1E5C0089; Sat, 26 Nov 2022 18:41:38 -0500 (EST) Received: from mailfrontend2 ([10.202.2.163]) by compute3.internal (MEProxy); Sat, 26 Nov 2022 18:41:38 -0500 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=sholland.org; h= cc:cc:content-transfer-encoding:date:date:from:from:in-reply-to :in-reply-to:message-id:mime-version:references:reply-to:sender :subject:subject:to:to; s=fm2; t=1669506098; x=1669592498; bh=Zv VBWKmSl7xxBZYvHtE90BQ1WRQAgayEAOP6BQlkaCs=; b=SjgYiyY/+S4zUa5tKl Cq5BDioncqCbaLz6IfExhT6rEGVgTVEiY5XMUgFwJxUrObXfQLGmIwj8iQEjFKyX QrVM1/rjS5gGEMgjOQiADW+SfFvVKkzUAQgsfTl7asHghlW5mq21olV/bVA6A2EX +rnAyzBsG73Wewm01Cm/269UOTFslFtKHtzUyLm3rf7+hMf69l+EAACCbBkEqA8S VJJ8l0SlXSU/03OXmAvUlkcbFbcgupNce2G029DKafKMuJtbvEaec+jcpxRGnhMy yHhbomkpg4kiBweYpEGKwaqaWRO7V22WfVSdFiZ3svsH4Rid8ccWx20KXWBc3u4r Lg6Q== DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d= messagingengine.com; h=cc:cc:content-transfer-encoding:date:date :feedback-id:feedback-id:from:from:in-reply-to:in-reply-to :message-id:mime-version:references:reply-to:sender:subject :subject:to:to:x-me-proxy:x-me-proxy:x-me-sender:x-me-sender :x-sasl-enc; s=fm1; t=1669506098; x=1669592498; bh=ZvVBWKmSl7xxB ZYvHtE90BQ1WRQAgayEAOP6BQlkaCs=; b=WCctj4ZJYSG7ke3JogAFaH9a/pYC/ 7GsYbN8g6AALi2DTzuxojVpXOnPUqvm03CjDmT8fdPfOKZGChQsXe7wrRhMSnnC9 49qvAadRQP8i2yzKoiG81avxhxdTQahft6x7+EiSuZawW5n8/8/olEOxL+Hfh6l2 lajEZPV3grAgD4refxGVtfE1Xgl1JUbXE/wc2ZW7VGmtU6idt0Ur5VtY6QG2SMeU JqX+J9snBGFR9lbwyASwMGoG4z1JK/0u76h+o2m9X9EHmSbTSKpkLvtYjIzSQSVK zFAePkQG5Gcr5ShRHYUezadsyK+z4tbl+LUpyi+PEwpjTPyUorcK3KWPg== X-ME-Sender: X-ME-Received: X-ME-Proxy-Cause: gggruggvucftvghtrhhoucdtuddrgedvgedrieekgdduvdcutefuodetggdotefrodftvf curfhrohhfihhlvgemucfhrghsthforghilhdpqfgfvfdpuffrtefokffrpgfnqfghnecu uegrihhlohhuthemuceftddtnecusecvtfgvtghiphhivghnthhsucdlqddutddtmdenuc fjughrpefhvfevufffkffojghfggfgsedtkeertdertddtnecuhfhrohhmpefurghmuhgv lhcujfholhhlrghnugcuoehsrghmuhgvlhesshhhohhllhgrnhgurdhorhhgqeenucggtf frrghtthgvrhhnpedukeetueduhedtleetvefguddvvdejhfefudelgfduveeggeehgfdu feeitdevteenucevlhhushhtvghrufhiiigvpedtnecurfgrrhgrmhepmhgrihhlfhhroh hmpehsrghmuhgvlhesshhhohhllhgrnhgurdhorhhg X-ME-Proxy: Feedback-ID: i0ad843c9:Fastmail Received: by mail.messagingengine.com (Postfix) with ESMTPA; Sat, 26 Nov 2022 18:41:37 -0500 (EST) From: Samuel Holland To: Marc Zyngier , Thomas Gleixner , Palmer Dabbelt Cc: linux-riscv@lists.infradead.org, Samuel Holland , Paul Walmsley , linux-kernel@vger.kernel.org Subject: [PATCH 2/3] genirq: Add support for oneshot-safe threaded EOIs Date: Sat, 26 Nov 2022 17:41:33 -0600 Message-Id: <20221126234134.32660-3-samuel@sholland.org> X-Mailer: git-send-email 2.37.4 In-Reply-To: <20221126234134.32660-1-samuel@sholland.org> References: <20221126234134.32660-1-samuel@sholland.org> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-Spam-Status: No, score=-2.8 required=5.0 tests=BAYES_00,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,RCVD_IN_DNSWL_LOW, RCVD_IN_MSPIKE_H3,RCVD_IN_MSPIKE_WL,SPF_HELO_PASS,SPF_PASS autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org For irqchips such as the SiFive PLIC with a claim/EOI flow, each IRQ is implicitly masked during the claim operation and unmasked after the EOI. By delaying the EOI until after the thread runs, we can support threaded IRQs without any explicit mask/unmask operations. irqchips can declare this capability using the combination of flags IRQCHIP_ONESHOT_SAFE | IRQCHIP_EOI_THREADED. In this case, we still set IRQF_ONESHOT and thus action->thread_mask, so we know based on desc->threads_oneshot when to send the EOI. However, we do not set IRQS_ONESHOT, so we skip the actual mask/unmask operations. Signed-off-by: Samuel Holland --- kernel/irq/chip.c | 4 +++- kernel/irq/manage.c | 15 ++++++++++----- 2 files changed, 13 insertions(+), 6 deletions(-) diff --git a/kernel/irq/chip.c b/kernel/irq/chip.c index 672bad021a1f..7a4b3fa85da0 100644 --- a/kernel/irq/chip.c +++ b/kernel/irq/chip.c @@ -446,7 +446,9 @@ void unmask_threaded_irq(struct irq_desc *desc) if (chip->flags & IRQCHIP_EOI_THREADED) chip->irq_eoi(&desc->irq_data); - unmask_irq(desc); + if (!irqd_irq_disabled(&desc->irq_data) && + (desc->istate & IRQS_ONESHOT)) + unmask_irq(desc); } /* diff --git a/kernel/irq/manage.c b/kernel/irq/manage.c index 40fe7806cc8c..b9edb66428cd 100644 --- a/kernel/irq/manage.c +++ b/kernel/irq/manage.c @@ -1074,9 +1074,10 @@ static int irq_wait_for_interrupt(struct irqaction *action) static void irq_finalize_oneshot(struct irq_desc *desc, struct irqaction *action) { - if (!(desc->istate & IRQS_ONESHOT) || + if (!(action->flags & IRQF_ONESHOT) || action->handler == irq_forced_secondary_handler) return; + again: chip_bus_lock(desc); raw_spin_lock_irq(&desc->lock); @@ -1112,8 +1113,7 @@ static void irq_finalize_oneshot(struct irq_desc *desc, desc->threads_oneshot &= ~action->thread_mask; - if (!desc->threads_oneshot && !irqd_irq_disabled(&desc->irq_data) && - irqd_irq_masked(&desc->irq_data)) + if (!desc->threads_oneshot) unmask_threaded_irq(desc); out_unlock: @@ -1565,8 +1565,12 @@ __setup_irq(unsigned int irq, struct irq_desc *desc, struct irqaction *new) * MSI based interrupts are per se one shot safe. Check the * chip flags, so we can avoid the unmask dance at the end of * the threaded handler for those. + * + * If IRQCHIP_EOI_THREADED is also set, we do an EOI dance + * instead of a mask/unmask dance. */ - if (desc->irq_data.chip->flags & IRQCHIP_ONESHOT_SAFE) + if (desc->irq_data.chip->flags & IRQCHIP_ONESHOT_SAFE && + !(desc->irq_data.chip->flags & IRQCHIP_EOI_THREADED)) new->flags &= ~IRQF_ONESHOT; /* @@ -1755,7 +1759,8 @@ __setup_irq(unsigned int irq, struct irq_desc *desc, struct irqaction *new) if (noirqdebug) irq_settings_set_no_debug(desc); - if (new->flags & IRQF_ONESHOT) + if (new->flags & IRQF_ONESHOT && + !(desc->irq_data.chip->flags & IRQCHIP_ONESHOT_SAFE)) desc->istate |= IRQS_ONESHOT; /* Exclude IRQ from balancing if requested */ -- 2.37.4