From mboxrd@z Thu Jan 1 00:00:00 1970 Received: from smtp.kernel.org (aws-us-west-2-korg-mail-1.web.codeaurora.org [10.30.226.201]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id CA5753C199B for ; Tue, 31 Mar 2026 07:26:14 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=10.30.226.201 ARC-Seal:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1774941974; cv=none; b=SLjOICuyTHbOZOvJFuL9DxEdC+7Qm4GUdT/SE6S4CZDhJnyvp546ax/ORy79aGS4yUeraF4Q2cMcUr/MNabwa1Vd7ZUC0oFbyz+9uI3Ke2dWJGHkq1XR3wGCnB7Yj1VwNW0R1DleWLOLLSAvpPbmEsn2Ux2CPIeMwvJW2NshqSE= ARC-Message-Signature:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1774941974; c=relaxed/simple; bh=6+7HNw8/xBnvIjwnxMCAUCmDYEgaIuljqZlpai4G470=; h=Date:Message-ID:From:To:Cc:Subject:References:MIME-Version: Content-Type; b=jWew62ne+WwnaRJAeNInI+v8WTaLcLu2RbDUN9GwFU5gPGLEJkkKRj2oanipu+k/x1hcyeNjl3NWXKbNvk8KB2BQIADy4q2z0Hc6i2hn1HmPukptBM6+4l0S1e+eXUlmA79rpECuH61dZw832PYLnEQUGiVl8ts9F0EakKj2HsM= ARC-Authentication-Results:i=1; smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=kernel.org header.i=@kernel.org header.b=U5uqOsKc; arc=none smtp.client-ip=10.30.226.201 Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=kernel.org header.i=@kernel.org header.b="U5uqOsKc" Received: by smtp.kernel.org (Postfix) with ESMTPSA id 90773C19424; Tue, 31 Mar 2026 07:26:13 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1774941974; bh=6+7HNw8/xBnvIjwnxMCAUCmDYEgaIuljqZlpai4G470=; h=Date:From:To:Cc:Subject:References:From; b=U5uqOsKcQOvgVaQmaJIqx0alm2oOMkz9XGqltBa+7pwsN7M0B7TviqeLyK+YMg+zk xh7ajALZXcuSmAySut04nR398trWJZYU76x/pNh6SNkq/DnPXGYzOTfwsKr3tq1noh xx5ZZeULo15Eo0T7onUCgmf5CYyxoFK38JgjukIFAz8mFduvsUWHmFXgJ1ppJ0w825 I5acR3eQjpvIcxQkKUF61BSwIoViWdrNs6xwfI/5MXGr1vcEVAjUvPObRfnz8ZjjOq ziUEspd8c+byLnPw6lpgZbBsPa8EjXnH0qCuLPpmBD7OKwMvbE/SUjlii0jlC4vluu CV6UAs8FLoiWQ== Date: Tue, 31 Mar 2026 09:26:11 +0200 Message-ID: <20260331072419.150825020@kernel.org> User-Agent: quilt/0.68 From: Thomas Gleixner To: LKML Cc: x86@kernel.org, Michael Kelley , Dmitry Ilvokhin , Radu Rendec , Jan Kiszka , Kieran Bingham , Florian Fainelli , Marc Zyngier Subject: [patch V4 09/15] genirq/manage: Make NMI cleanup RT safe References: <20260331071453.172185305@kernel.org> Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Eventually blocking functions cannot be invoked with interrupts disabled and a raw spin lock held. Restructure the code so this happens outside of the descriptor lock held region. Signed-off-by: Thomas Gleixner --- V4: New patch. Found when adding the validation update to it --- kernel/irq/manage.c | 37 +++++++++++++++++++++---------------- 1 file changed, 21 insertions(+), 16 deletions(-) --- a/kernel/irq/manage.c +++ b/kernel/irq/manage.c @@ -2026,24 +2026,30 @@ const void *free_irq(unsigned int irq, v } EXPORT_SYMBOL(free_irq); -/* This function must be called with desc->lock held */ static const void *__cleanup_nmi(unsigned int irq, struct irq_desc *desc) { + struct irqaction *action = NULL; const char *devname = NULL; - desc->istate &= ~IRQS_NMI; + scoped_guard(raw_spinlock_irqsave, &desc->lock) { + irq_nmi_teardown(desc); - if (!WARN_ON(desc->action == NULL)) { - irq_pm_remove_action(desc, desc->action); - devname = desc->action->name; - unregister_handler_proc(irq, desc->action); + desc->istate &= ~IRQS_NMI; - kfree(desc->action); + if (!WARN_ON(desc->action == NULL)) { + action = desc->action; + irq_pm_remove_action(desc, action); + devname = action->name; + } desc->action = NULL; + + irq_settings_clr_disable_unlazy(desc); + irq_shutdown_and_deactivate(desc); } - irq_settings_clr_disable_unlazy(desc); - irq_shutdown_and_deactivate(desc); + if (action) + unregister_handler_proc(irq, action); + kfree(action); irq_release_resources(desc); @@ -2067,8 +2073,6 @@ const void *free_nmi(unsigned int irq, v if (WARN_ON(desc->depth == 0)) disable_nmi_nosync(irq); - guard(raw_spinlock_irqsave)(&desc->lock); - irq_nmi_teardown(desc); return __cleanup_nmi(irq, desc); } @@ -2318,13 +2322,14 @@ int request_nmi(unsigned int irq, irq_ha /* Setup NMI state */ desc->istate |= IRQS_NMI; retval = irq_nmi_setup(desc); - if (retval) { - __cleanup_nmi(irq, desc); - return -EINVAL; - } - return 0; } + if (retval) { + __cleanup_nmi(irq, desc); + return -EINVAL; + } + return 0; + err_irq_setup: irq_chip_pm_put(&desc->irq_data); err_out: