Blame view
kernel/irq/spurious.c
11.9 KB
1da177e4c
|
1 2 3 4 5 6 7 |
/* * linux/kernel/irq/spurious.c * * Copyright (C) 1992, 1998-2004 Linus Torvalds, Ingo Molnar * * This file contains spurious interrupt handling. */ |
188fd89d5
|
8 |
#include <linux/jiffies.h> |
1da177e4c
|
9 10 11 12 |
#include <linux/irq.h> #include <linux/module.h> #include <linux/kallsyms.h> #include <linux/interrupt.h> |
9e094c17e
|
13 |
#include <linux/moduleparam.h> |
f84dbb912
|
14 |
#include <linux/timer.h> |
1da177e4c
|
15 |
|
bd1514122
|
16 |
#include "internals.h" |
83d4e6e7f
|
17 |
static int irqfixup __read_mostly; |
200803dfe
|
18 |
|
f84dbb912
|
19 20 21 |
#define POLL_SPURIOUS_IRQ_INTERVAL (HZ/10) static void poll_spurious_irqs(unsigned long dummy); static DEFINE_TIMER(poll_spurious_irq_timer, poll_spurious_irqs, 0, 0); |
d05c65fff
|
22 23 |
static int irq_poll_cpu; static atomic_t irq_poll_active; |
f84dbb912
|
24 |
|
200803dfe
|
25 |
/* |
fe200ae48
|
26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 |
* We wait here for a poller to finish. * * If the poll runs on this CPU, then we yell loudly and return * false. That will leave the interrupt line disabled in the worst * case, but it should never happen. * * We wait until the poller is done and then recheck disabled and * action (about to be disabled). Only if it's still active, we return * true and let the handler run. */ bool irq_wait_for_poll(struct irq_desc *desc) { if (WARN_ONCE(irq_poll_cpu == smp_processor_id(), "irq poll in progress on cpu %d for irq %d ", smp_processor_id(), desc->irq_data.irq)) return false; #ifdef CONFIG_SMP do { raw_spin_unlock(&desc->lock); |
32f4125eb
|
47 |
while (irqd_irq_inprogress(&desc->irq_data)) |
fe200ae48
|
48 49 |
cpu_relax(); raw_spin_lock(&desc->lock); |
a6aeddd1c
|
50 |
} while (irqd_irq_inprogress(&desc->irq_data)); |
fe200ae48
|
51 |
/* Might have been disabled in meantime */ |
32f4125eb
|
52 |
return !irqd_irq_disabled(&desc->irq_data) && desc->action; |
fe200ae48
|
53 54 55 56 |
#else return false; #endif } |
0877d6625
|
57 |
|
fe200ae48
|
58 |
/* |
200803dfe
|
59 60 |
* Recovery handler for misrouted interrupts. */ |
c7259cd7a
|
61 |
static int try_one_irq(int irq, struct irq_desc *desc, bool force) |
200803dfe
|
62 |
{ |
0877d6625
|
63 |
irqreturn_t ret = IRQ_NONE; |
f84dbb912
|
64 |
struct irqaction *action; |
200803dfe
|
65 |
|
239007b84
|
66 |
raw_spin_lock(&desc->lock); |
c7259cd7a
|
67 |
|
b39898cd4
|
68 69 70 71 72 73 74 |
/* * PER_CPU, nested thread interrupts and interrupts explicitely * marked polled are excluded from polling. */ if (irq_settings_is_per_cpu(desc) || irq_settings_is_nested_thread(desc) || irq_settings_is_polled(desc)) |
c7259cd7a
|
75 76 77 78 79 80 |
goto out; /* * Do not poll disabled interrupts unless the spurious * disabled poller asks explicitely. */ |
32f4125eb
|
81 |
if (irqd_irq_disabled(&desc->irq_data) && !force) |
c7259cd7a
|
82 83 84 85 |
goto out; /* * All handlers must agree on IRQF_SHARED, so we test just the |
e716efde7
|
86 |
* first. |
c7259cd7a
|
87 88 89 |
*/ action = desc->action; if (!action || !(action->flags & IRQF_SHARED) || |
e716efde7
|
90 |
(action->flags & __IRQF_TIMER)) |
c7259cd7a
|
91 |
goto out; |
f84dbb912
|
92 |
/* Already running on another processor */ |
32f4125eb
|
93 |
if (irqd_irq_inprogress(&desc->irq_data)) { |
f84dbb912
|
94 95 96 97 |
/* * Already running: If it is shared get the other * CPU to go looking for our mystery interrupt too */ |
2a0d6fb33
|
98 |
desc->istate |= IRQS_PENDING; |
fa27271bc
|
99 |
goto out; |
c7259cd7a
|
100 |
} |
fa27271bc
|
101 |
|
0877d6625
|
102 |
/* Mark it poll in progress */ |
6954b75b4
|
103 |
desc->istate |= IRQS_POLL_INPROGRESS; |
fa27271bc
|
104 |
do { |
0877d6625
|
105 106 |
if (handle_irq_event(desc) == IRQ_HANDLED) ret = IRQ_HANDLED; |
e716efde7
|
107 |
/* Make sure that there is still a valid action */ |
fa27271bc
|
108 |
action = desc->action; |
2a0d6fb33
|
109 |
} while ((desc->istate & IRQS_PENDING) && action); |
6954b75b4
|
110 |
desc->istate &= ~IRQS_POLL_INPROGRESS; |
fa27271bc
|
111 112 |
out: raw_spin_unlock(&desc->lock); |
0877d6625
|
113 |
return ret == IRQ_HANDLED; |
f84dbb912
|
114 115 116 117 |
} static int misrouted_irq(int irq) { |
e00585bb7
|
118 |
struct irq_desc *desc; |
d3c60047b
|
119 |
int i, ok = 0; |
f84dbb912
|
120 |
|
c75d720fc
|
121 |
if (atomic_inc_return(&irq_poll_active) != 1) |
d05c65fff
|
122 123 124 |
goto out; irq_poll_cpu = smp_processor_id(); |
e00585bb7
|
125 126 127 |
for_each_irq_desc(i, desc) { if (!i) continue; |
f84dbb912
|
128 129 130 |
if (i == irq) /* Already tried */ continue; |
c7259cd7a
|
131 |
if (try_one_irq(i, desc, false)) |
f84dbb912
|
132 |
ok = 1; |
200803dfe
|
133 |
} |
d05c65fff
|
134 135 |
out: atomic_dec(&irq_poll_active); |
200803dfe
|
136 137 138 |
/* So the caller can adjust the irq error counts */ return ok; } |
663e69592
|
139 |
static void poll_spurious_irqs(unsigned long dummy) |
f84dbb912
|
140 |
{ |
e00585bb7
|
141 |
struct irq_desc *desc; |
d3c60047b
|
142 |
int i; |
e00585bb7
|
143 |
|
d05c65fff
|
144 145 146 |
if (atomic_inc_return(&irq_poll_active) != 1) goto out; irq_poll_cpu = smp_processor_id(); |
e00585bb7
|
147 |
for_each_irq_desc(i, desc) { |
7acdd53e5
|
148 |
unsigned int state; |
f84dbb912
|
149 |
|
e00585bb7
|
150 151 |
if (!i) continue; |
f84dbb912
|
152 |
/* Racy but it doesn't matter */ |
7acdd53e5
|
153 |
state = desc->istate; |
f84dbb912
|
154 |
barrier(); |
7acdd53e5
|
155 |
if (!(state & IRQS_SPURIOUS_DISABLED)) |
f84dbb912
|
156 |
continue; |
e7e7e0c08
|
157 |
local_irq_disable(); |
c7259cd7a
|
158 |
try_one_irq(i, desc, true); |
e7e7e0c08
|
159 |
local_irq_enable(); |
f84dbb912
|
160 |
} |
d05c65fff
|
161 162 |
out: atomic_dec(&irq_poll_active); |
d3c60047b
|
163 164 |
mod_timer(&poll_spurious_irq_timer, jiffies + POLL_SPURIOUS_IRQ_INTERVAL); |
f84dbb912
|
165 |
} |
3a43e05f4
|
166 167 168 169 170 171 |
static inline int bad_action_ret(irqreturn_t action_ret) { if (likely(action_ret <= (IRQ_HANDLED | IRQ_WAKE_THREAD))) return 0; return 1; } |
1da177e4c
|
172 173 174 175 176 177 178 |
/* * If 99,900 of the previous 100,000 interrupts have not been handled * then assume that the IRQ is stuck in some manner. Drop a diagnostic * and try to turn the IRQ off. * * (The other 100-of-100,000 interrupts may have been a correctly * functioning device sharing an IRQ with the failing one) |
1da177e4c
|
179 |
*/ |
1da177e4c
|
180 |
static void |
34ffdb723
|
181 182 |
__report_bad_irq(unsigned int irq, struct irq_desc *desc, irqreturn_t action_ret) |
1da177e4c
|
183 184 |
{ struct irqaction *action; |
1082687e8
|
185 |
unsigned long flags; |
1da177e4c
|
186 |
|
3a43e05f4
|
187 |
if (bad_action_ret(action_ret)) { |
1da177e4c
|
188 189 190 191 |
printk(KERN_ERR "irq event %d: bogus return value %x ", irq, action_ret); } else { |
200803dfe
|
192 193 194 |
printk(KERN_ERR "irq %d: nobody cared (try booting with " "the \"irqpoll\" option) ", irq); |
1da177e4c
|
195 196 197 198 |
} dump_stack(); printk(KERN_ERR "handlers: "); |
06fcb0c6f
|
199 |
|
1082687e8
|
200 201 202 203 204 205 206 |
/* * We need to take desc->lock here. note_interrupt() is called * w/o desc->lock held, but IRQ_PROGRESS set. We might race * with something else removing an action. It's ok to take * desc->lock here. See synchronize_irq(). */ raw_spin_lock_irqsave(&desc->lock, flags); |
1da177e4c
|
207 208 |
action = desc->action; while (action) { |
ef26f20cd
|
209 210 211 212 213 214 |
printk(KERN_ERR "[<%p>] %pf", action->handler, action->handler); if (action->thread_fn) printk(KERN_CONT " threaded [<%p>] %pf", action->thread_fn, action->thread_fn); printk(KERN_CONT " "); |
1da177e4c
|
215 216 |
action = action->next; } |
1082687e8
|
217 |
raw_spin_unlock_irqrestore(&desc->lock, flags); |
1da177e4c
|
218 |
} |
06fcb0c6f
|
219 |
static void |
34ffdb723
|
220 |
report_bad_irq(unsigned int irq, struct irq_desc *desc, irqreturn_t action_ret) |
1da177e4c
|
221 222 223 224 225 226 227 228 |
{ static int count = 100; if (count > 0) { count--; __report_bad_irq(irq, desc, action_ret); } } |
d3c60047b
|
229 230 231 |
static inline int try_misrouted_irq(unsigned int irq, struct irq_desc *desc, irqreturn_t action_ret) |
92ea77275
|
232 233 234 235 236 237 238 239 240 241 242 243 244 245 246 247 248 249 250 251 252 253 254 255 256 257 258 259 260 261 262 |
{ struct irqaction *action; if (!irqfixup) return 0; /* We didn't actually handle the IRQ - see if it was misrouted? */ if (action_ret == IRQ_NONE) return 1; /* * But for 'irqfixup == 2' we also do it for handled interrupts if * they are marked as IRQF_IRQPOLL (or for irq zero, which is the * traditional PC timer interrupt.. Legacy) */ if (irqfixup < 2) return 0; if (!irq) return 1; /* * Since we don't get the descriptor lock, "action" can * change under us. We don't really care, but we don't * want to follow a NULL pointer. So tell the compiler to * just load it once by using a barrier. */ action = desc->action; barrier(); return action && (action->flags & IRQF_IRQPOLL); } |
1e77d0a1e
|
263 |
#define SPURIOUS_DEFERRED 0x80000000 |
34ffdb723
|
264 |
void note_interrupt(unsigned int irq, struct irq_desc *desc, |
7d12e780e
|
265 |
irqreturn_t action_ret) |
1da177e4c
|
266 |
{ |
b39898cd4
|
267 268 |
if (desc->istate & IRQS_POLL_INPROGRESS || irq_settings_is_polled(desc)) |
fe200ae48
|
269 |
return; |
3a43e05f4
|
270 271 272 273 |
if (bad_action_ret(action_ret)) { report_bad_irq(irq, desc, action_ret); return; } |
1e77d0a1e
|
274 275 276 277 278 279 280 281 282 283 284 285 286 287 288 289 290 291 292 293 294 295 296 297 298 299 300 301 302 303 304 305 306 307 308 309 310 311 312 313 314 315 316 317 318 319 320 321 322 323 324 325 326 327 328 329 330 331 332 333 334 335 336 337 338 339 340 341 342 343 344 345 346 347 348 349 350 351 352 353 354 355 356 357 358 359 360 361 362 363 364 365 366 367 368 369 370 371 372 |
/* * We cannot call note_interrupt from the threaded handler * because we need to look at the compound of all handlers * (primary and threaded). Aside of that in the threaded * shared case we have no serialization against an incoming * hardware interrupt while we are dealing with a threaded * result. * * So in case a thread is woken, we just note the fact and * defer the analysis to the next hardware interrupt. * * The threaded handlers store whether they sucessfully * handled an interrupt and we check whether that number * changed versus the last invocation. * * We could handle all interrupts with the delayed by one * mechanism, but for the non forced threaded case we'd just * add pointless overhead to the straight hardirq interrupts * for the sake of a few lines less code. */ if (action_ret & IRQ_WAKE_THREAD) { /* * There is a thread woken. Check whether one of the * shared primary handlers returned IRQ_HANDLED. If * not we defer the spurious detection to the next * interrupt. */ if (action_ret == IRQ_WAKE_THREAD) { int handled; /* * We use bit 31 of thread_handled_last to * denote the deferred spurious detection * active. No locking necessary as * thread_handled_last is only accessed here * and we have the guarantee that hard * interrupts are not reentrant. */ if (!(desc->threads_handled_last & SPURIOUS_DEFERRED)) { desc->threads_handled_last |= SPURIOUS_DEFERRED; return; } /* * Check whether one of the threaded handlers * returned IRQ_HANDLED since the last * interrupt happened. * * For simplicity we just set bit 31, as it is * set in threads_handled_last as well. So we * avoid extra masking. And we really do not * care about the high bits of the handled * count. We just care about the count being * different than the one we saw before. */ handled = atomic_read(&desc->threads_handled); handled |= SPURIOUS_DEFERRED; if (handled != desc->threads_handled_last) { action_ret = IRQ_HANDLED; /* * Note: We keep the SPURIOUS_DEFERRED * bit set. We are handling the * previous invocation right now. * Keep it for the current one, so the * next hardware interrupt will * account for it. */ desc->threads_handled_last = handled; } else { /* * None of the threaded handlers felt * responsible for the last interrupt * * We keep the SPURIOUS_DEFERRED bit * set in threads_handled_last as we * need to account for the current * interrupt as well. */ action_ret = IRQ_NONE; } } else { /* * One of the primary handlers returned * IRQ_HANDLED. So we don't care about the * threaded handlers on the same line. Clear * the deferred detection bit. * * In theory we could/should check whether the * deferred bit is set and take the result of * the previous run into account here as * well. But it's really not worth the * trouble. If every other interrupt is * handled we never trigger the spurious * detector. And if this is just the one out * of 100k unhandled ones which is handled * then we merily delay the spurious detection * by one hard interrupt. Not a real problem. */ desc->threads_handled_last &= ~SPURIOUS_DEFERRED; } } |
3a43e05f4
|
373 |
if (unlikely(action_ret == IRQ_NONE)) { |
4f27c00bf
|
374 375 376 |
/* * If we are seeing only the odd spurious IRQ caused by * bus asynchronicity then don't eventually trigger an error, |
fbfecd371
|
377 |
* otherwise the counter becomes a doomsday timer for otherwise |
4f27c00bf
|
378 379 |
* working systems */ |
188fd89d5
|
380 |
if (time_after(jiffies, desc->last_unhandled + HZ/10)) |
4f27c00bf
|
381 382 383 384 |
desc->irqs_unhandled = 1; else desc->irqs_unhandled++; desc->last_unhandled = jiffies; |
1da177e4c
|
385 |
} |
92ea77275
|
386 387 388 389 |
if (unlikely(try_misrouted_irq(irq, desc, action_ret))) { int ok = misrouted_irq(irq); if (action_ret == IRQ_NONE) desc->irqs_unhandled -= ok; |
200803dfe
|
390 |
} |
1da177e4c
|
391 |
desc->irq_count++; |
83d4e6e7f
|
392 |
if (likely(desc->irq_count < 100000)) |
1da177e4c
|
393 394 395 |
return; desc->irq_count = 0; |
83d4e6e7f
|
396 |
if (unlikely(desc->irqs_unhandled > 99900)) { |
1da177e4c
|
397 398 399 400 401 402 403 404 405 |
/* * The interrupt is stuck */ __report_bad_irq(irq, desc, action_ret); /* * Now kill the IRQ */ printk(KERN_EMERG "Disabling IRQ #%d ", irq); |
7acdd53e5
|
406 |
desc->istate |= IRQS_SPURIOUS_DISABLED; |
1adb0850a
|
407 |
desc->depth++; |
87923470c
|
408 |
irq_disable(desc); |
f84dbb912
|
409 |
|
d3c60047b
|
410 411 |
mod_timer(&poll_spurious_irq_timer, jiffies + POLL_SPURIOUS_IRQ_INTERVAL); |
1da177e4c
|
412 413 414 |
} desc->irqs_unhandled = 0; } |
2329abfa3
|
415 |
bool noirqdebug __read_mostly; |
1da177e4c
|
416 |
|
343cde51b
|
417 |
int noirqdebug_setup(char *str) |
1da177e4c
|
418 419 420 421 |
{ noirqdebug = 1; printk(KERN_INFO "IRQ lockup detection disabled "); |
06fcb0c6f
|
422 |
|
1da177e4c
|
423 424 425 426 |
return 1; } __setup("noirqdebug", noirqdebug_setup); |
9e094c17e
|
427 428 |
module_param(noirqdebug, bool, 0644); MODULE_PARM_DESC(noirqdebug, "Disable irq lockup detection when true"); |
1da177e4c
|
429 |
|
200803dfe
|
430 431 432 433 434 435 436 |
static int __init irqfixup_setup(char *str) { irqfixup = 1; printk(KERN_WARNING "Misrouted IRQ fixup support enabled. "); printk(KERN_WARNING "This may impact system performance. "); |
06fcb0c6f
|
437 |
|
200803dfe
|
438 439 440 441 |
return 1; } __setup("irqfixup", irqfixup_setup); |
9e094c17e
|
442 |
module_param(irqfixup, int, 0644); |
200803dfe
|
443 444 445 446 447 448 449 450 451 452 453 454 455 456 |
static int __init irqpoll_setup(char *str) { irqfixup = 2; printk(KERN_WARNING "Misrouted IRQ fixup and polling support " "enabled "); printk(KERN_WARNING "This may significantly impact system " "performance "); return 1; } __setup("irqpoll", irqpoll_setup); |