diff options
author | Frederic Weisbecker <frederic@kernel.org> | 2020-12-02 14:57:32 +0300 |
---|---|---|
committer | Thomas Gleixner <tglx@linutronix.de> | 2020-12-02 22:20:05 +0300 |
commit | d14ce74f1fb376ccbbc0b05ded477ada51253729 (patch) | |
tree | 4458ca24e001e08e17815d169d1266690c02cd2a /arch/powerpc/include/asm/security_features.h | |
parent | d3759e7184f8f6187e62f8c4e7dcb1f6c47c075a (diff) | |
download | linux-d14ce74f1fb376ccbbc0b05ded477ada51253729.tar.xz |
irq: Call tick_irq_enter() inside HARDIRQ_OFFSET
Now that account_hardirq_enter() is called after HARDIRQ_OFFSET has
been incremented, there is nothing left that prevents us from also
moving tick_irq_enter() after HARDIRQ_OFFSET is incremented.
The desired outcome is to remove the nasty hack that prevents softirqs
from being raised through ksoftirqd instead of the hardirq bottom half.
Also tick_irq_enter() then becomes appropriately covered by lockdep.
Signed-off-by: Frederic Weisbecker <frederic@kernel.org>
Signed-off-by: Thomas Gleixner <tglx@linutronix.de>
Link: https://lore.kernel.org/r/20201202115732.27827-6-frederic@kernel.org
Diffstat (limited to 'arch/powerpc/include/asm/security_features.h')
0 files changed, 0 insertions, 0 deletions