Received: by 2002:a05:7412:3b8b:b0:fc:a2b0:25d7 with SMTP id nd11csp1290846rdb; Fri, 9 Feb 2024 17:28:00 -0800 (PST) X-Forwarded-Encrypted: i=3; AJvYcCUklWFGYmJ+ojdwaBcwvHLS3bclrvyNQ4FwRsXl4agaDCwau4g0aXxZ/JGmjCAerztV8C6mW6tjkFooGOh+1VLCos5Z3esNTloslzRtHA== X-Google-Smtp-Source: AGHT+IHZOHcRkmvPjHkJUgHdMpzln7oAcIZ0dKULJYZ2nfHp87iHARIWDIvNouxdX0wyT0e8Mh6s X-Received: by 2002:a19:6501:0:b0:511:60eb:cb1e with SMTP id z1-20020a196501000000b0051160ebcb1emr314581lfb.67.1707528480788; Fri, 09 Feb 2024 17:28:00 -0800 (PST) ARC-Seal: i=2; a=rsa-sha256; t=1707528480; cv=pass; d=google.com; s=arc-20160816; b=dPaPI6VG0XtgfHV9CtpuxpNdhei0fGm0AyIwBdeSugCh0IPmy084sNkleuul8w7JCq wH6y2ldVRZRBgUms7MDxk76vQtlN9BlzLW+ParFC9RiPsP/Ah6irqZTp7uH+lyQuHETr NNm8/Mc2FYJjQ87EIHKhqiuBHprhxt1ZU5Jcnwx6fx9NPytS/aW5T7oInDMLO5+Hgylw ifARYS/FP4MmgVcFSaDR7R1Dhe8t0pl4sv8aGyQbJ4AniX0k+7mXLGUaBEMAnpXDe3qL wkasZJN+b1ZgK6E19/CZCrdKM0DF5QxrPIjWohfglBAf5naP0qBs7jp+xXEuLoeJ2Tfa Xjmw== ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=content-transfer-encoding:mime-version:list-unsubscribe :list-subscribe:list-id:precedence:message-id:date:subject:cc:to :from:dkim-signature:dkim-filter; bh=s/R5pbpyzO8qZk6EBdMvvfPQcZ9psRubuS5Q4E3zz6Y=; fh=PfzquOvRXJHcKFNPFXkmlajcYyDVSPuKORpjIz0gGlA=; b=tHVX7O9ryPdK51yUjqbFStMYUr/x98Iosi3FC6yF3EEERO3qcHyusCtylZ/Hwz4OEY hPoWfINBa40BfDmI6HrovBZIFg/f3Oym4K+FMVeN8HnyXrkHUxkL4JyrL28AORmXqdZv PZ9oEbsk0rp7tgzA5MrGau0T3TY/sudl3TxEuWYPupMb8aMaUK8MvERe82IPaGtBWRz7 UlyBb2c+T/WQxv2KvCI4Quf2NAKXTk1UcDVqBjKZZggpz4Kt8m6DWJbwrXopyAVKRv+8 DzQdHUP7ecR6zbRB77y4GTxcl7QBhQshu2knkrAKLcUy9R8SEGvoqCUO54/gViOtVrhI CskA==; dara=google.com ARC-Authentication-Results: i=2; mx.google.com; dkim=pass header.i=@broadcom.com header.s=dkimrelay header.b=ZEkE3+Eo; arc=pass (i=1 dkim=pass dkdomain=broadcom.com dmarc=pass fromdomain=broadcom.com); spf=pass (google.com: domain of linux-kernel+bounces-60234-linux.lists.archive=gmail.com@vger.kernel.org designates 2604:1380:4601:e00::3 as permitted sender) smtp.mailfrom="linux-kernel+bounces-60234-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=pass (p=QUARANTINE sp=QUARANTINE dis=NONE) header.from=broadcom.com X-Forwarded-Encrypted: i=2; AJvYcCVco7NcDrMifmbG0MqRV1bXTpwEsbIju1BlbqmjdtEM1r0pGP0pP/B6G/jJsxqKqGfriBQ8GUhD8dWCJqBe3At5W7UqzD7LRFnhK2PahA== Return-Path: Received: from am.mirrors.kernel.org (am.mirrors.kernel.org. [2604:1380:4601:e00::3]) by mx.google.com with ESMTPS id n16-20020a170906841000b00a3803c2983esi1365353ejx.590.2024.02.09.17.28.00 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Fri, 09 Feb 2024 17:28:00 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel+bounces-60234-linux.lists.archive=gmail.com@vger.kernel.org designates 2604:1380:4601:e00::3 as permitted sender) client-ip=2604:1380:4601:e00::3; Authentication-Results: mx.google.com; dkim=pass header.i=@broadcom.com header.s=dkimrelay header.b=ZEkE3+Eo; arc=pass (i=1 dkim=pass dkdomain=broadcom.com dmarc=pass fromdomain=broadcom.com); spf=pass (google.com: domain of linux-kernel+bounces-60234-linux.lists.archive=gmail.com@vger.kernel.org designates 2604:1380:4601:e00::3 as permitted sender) smtp.mailfrom="linux-kernel+bounces-60234-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=pass (p=QUARANTINE sp=QUARANTINE dis=NONE) header.from=broadcom.com Received: from smtp.subspace.kernel.org (wormhole.subspace.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by am.mirrors.kernel.org (Postfix) with ESMTPS id 543211F293BF for ; Sat, 10 Feb 2024 01:26:47 +0000 (UTC) Received: from localhost.localdomain (localhost.localdomain [127.0.0.1]) by smtp.subspace.kernel.org (Postfix) with ESMTP id 3438A1BC49; Sat, 10 Feb 2024 01:25:02 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; dkim=pass (1024-bit key) header.d=broadcom.com header.i=@broadcom.com header.b="ZEkE3+Eo" Received: from relay.smtp-ext.broadcom.com (relay.smtp-ext.broadcom.com [192.19.144.205]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id D5B4928371; Sat, 10 Feb 2024 01:24:59 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=192.19.144.205 ARC-Seal:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1707528301; cv=none; b=dPE21uU6EguussxQZT8WcyATSslQ5N1J4vJKsPb3GR4zGh4V+I3ZvKFZexzf4SQK5lvKQiBzkH4kY7Kp7uuCDqe/wluKW9o32XlTtMB392A8FompX59xDtdWBc9HUrJvJususGomNgRwxrl9Aa0pqt8L/2buIHI3MZoAEk+n/30= ARC-Message-Signature:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1707528301; c=relaxed/simple; bh=xxXAvFJcsZzZwiPknF3QF04PRu/JojlyXTHWeEtALdU=; h=From:To:Cc:Subject:Date:Message-Id:MIME-Version; b=DM+Qb5Z2RGPbdiAKqCQVMtm0naIfI4xgNrfvx5BQboivsaf4nW0Lw5bkTtU2SXIs93no0xpC7tyfuZ5SaadPvbZeoU0NH2dEWO3YhSTk0bxVcvD2kLn5a3Vg7sKWA00tdkD40sK+9yrU20ytTho74/D41E5bFMi9whb3rzRN9Kc= ARC-Authentication-Results:i=1; smtp.subspace.kernel.org; dmarc=pass (p=quarantine dis=none) header.from=broadcom.com; spf=fail smtp.mailfrom=broadcom.com; dkim=pass (1024-bit key) header.d=broadcom.com header.i=@broadcom.com header.b=ZEkE3+Eo; arc=none smtp.client-ip=192.19.144.205 Authentication-Results: smtp.subspace.kernel.org; dmarc=pass (p=quarantine dis=none) header.from=broadcom.com Authentication-Results: smtp.subspace.kernel.org; spf=fail smtp.mailfrom=broadcom.com Received: from mail-lvn-it-01.lvn.broadcom.net (mail-lvn-it-01.lvn.broadcom.net [10.36.132.253]) by relay.smtp-ext.broadcom.com (Postfix) with ESMTP id E3480C0000E8; Fri, 9 Feb 2024 17:24:52 -0800 (PST) DKIM-Filter: OpenDKIM Filter v2.11.0 relay.smtp-ext.broadcom.com E3480C0000E8 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=broadcom.com; s=dkimrelay; t=1707528293; bh=xxXAvFJcsZzZwiPknF3QF04PRu/JojlyXTHWeEtALdU=; h=From:To:Cc:Subject:Date:From; b=ZEkE3+EoCdjX3b21BnhGHFsVlZ4nRVj4bXX0scg0IQDki3QtARbi9uIE+mb+te4mY VthG9C4Qn84KV+bCTTvOg3FdoT0TQiH/5cRTkVcIJ4IJpnyNewUlZQJSa1EoI95VaT EfbpYaPeeZttX+41nC7TlWr5dDCNChw1QvfZi3zM= Received: from stbirv-lnx-1.igp.broadcom.net (stbirv-lnx-1.igp.broadcom.net [10.67.48.32]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail-lvn-it-01.lvn.broadcom.net (Postfix) with ESMTPSA id 2C94C18041CAC4; Fri, 9 Feb 2024 17:24:51 -0800 (PST) From: Florian Fainelli To: linux-kernel@vger.kernel.org Cc: maz@kernel.org, Doug Berger , Florian Fainelli , Broadcom internal kernel review list , Thomas Gleixner , Brian Norris , Jason Cooper , linux-mips@vger.kernel.org (open list:BROADCOM BMIPS MIPS ARCHITECTURE), linux-arm-kernel@lists.infradead.org (moderated list:BROADCOM BCM7XXX ARM ARCHITECTURE) Subject: [PATCH v2] irqchip/irq-brcmstb-l2: add write memory barrier before exit Date: Fri, 9 Feb 2024 17:24:49 -0800 Message-Id: <20240210012449.3009125-1-florian.fainelli@broadcom.com> X-Mailer: git-send-email 2.34.1 Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Transfer-Encoding: 8bit From: Doug Berger It was observed on Broadcom devices that use GIC v3 architecture L1 interrupt controllers as the parent of brcmstb-l2 interrupt controllers that the deactivation of the parent irq could happen before the brcmstb-l2 deasserted its output. This would lead the GIC to reactivate the irq only to find that no L2 interrupt was pending. The result was a spurious interrupt invoking the handle_bad_irq() with its associated messaging. While this did not create a functional problem it is a waste of cycles. The hazard exists because the memory mapped bus writes to the brcmstb-l2 registers are buffered and the GIC v3 architecture uses a very efficient system register write to deactivate the interrupt. This commit adds a write memory barrier prior to invoking chained_irq_exit() to introduce a dsb(st) on those systems to ensure the system register write cannot be executed until the memory mapped writes are visible to the system. Signed-off-by: Doug Berger Acked-by: Florian Fainelli Fixes: 7f646e92766e ("irqchip: brcmstb-l2: Add Broadcom Set Top Box Level-2 interrupt controller") [florian: Added Fixes tag] Signed-off-by: Florian Fainelli --- Changes in v2: - add Fixes tag - bump copyright drivers/irqchip/irq-brcmstb-l2.c | 5 ++++- 1 file changed, 4 insertions(+), 1 deletion(-) diff --git a/drivers/irqchip/irq-brcmstb-l2.c b/drivers/irqchip/irq-brcmstb-l2.c index 5559c943f03f..63aed60dd3f1 100644 --- a/drivers/irqchip/irq-brcmstb-l2.c +++ b/drivers/irqchip/irq-brcmstb-l2.c @@ -2,7 +2,7 @@ /* * Generic Broadcom Set Top Box Level 2 Interrupt controller driver * - * Copyright (C) 2014-2017 Broadcom + * Copyright (C) 2014-2024 Broadcom */ #define pr_fmt(fmt) KBUILD_MODNAME ": " fmt @@ -112,6 +112,9 @@ static void brcmstb_l2_intc_irq_handle(struct irq_desc *desc) generic_handle_domain_irq(b->domain, irq); } while (status); out: + /* Don't ack parent before all device writes are done */ + wmb(); + chained_irq_exit(chip, desc); } -- 2.34.1