mirror of https://gitee.com/openkylin/linux.git
spi: fsl-espi: Only process interrupts for expected events
The SPIE register contains counts for the TX FIFO so any time the irq
handler was invoked we would attempt to process the RX/TX fifos. Use the
SPIM value to mask the events so that we only process interrupts that
were expected.
This was a latent issue exposed by commit 3282a3da25
("powerpc/64:
Implement soft interrupt replay in C").
Signed-off-by: Chris Packham <chris.packham@alliedtelesis.co.nz>
Link: https://lore.kernel.org/r/20200904002812.7300-1-chris.packham@alliedtelesis.co.nz
Signed-off-by: Mark Brown <broonie@kernel.org>
This commit is contained in:
parent
50851f5033
commit
b867eef4cf
|
@ -564,13 +564,14 @@ static void fsl_espi_cpu_irq(struct fsl_espi *espi, u32 events)
|
||||||
static irqreturn_t fsl_espi_irq(s32 irq, void *context_data)
|
static irqreturn_t fsl_espi_irq(s32 irq, void *context_data)
|
||||||
{
|
{
|
||||||
struct fsl_espi *espi = context_data;
|
struct fsl_espi *espi = context_data;
|
||||||
u32 events;
|
u32 events, mask;
|
||||||
|
|
||||||
spin_lock(&espi->lock);
|
spin_lock(&espi->lock);
|
||||||
|
|
||||||
/* Get interrupt events(tx/rx) */
|
/* Get interrupt events(tx/rx) */
|
||||||
events = fsl_espi_read_reg(espi, ESPI_SPIE);
|
events = fsl_espi_read_reg(espi, ESPI_SPIE);
|
||||||
if (!events) {
|
mask = fsl_espi_read_reg(espi, ESPI_SPIM);
|
||||||
|
if (!(events & mask)) {
|
||||||
spin_unlock(&espi->lock);
|
spin_unlock(&espi->lock);
|
||||||
return IRQ_NONE;
|
return IRQ_NONE;
|
||||||
}
|
}
|
||||||
|
|
Loading…
Reference in New Issue