1 // SPDX-License-Identifier: GPL-2.0-only 2 /* 3 * linux/kernel/softirq.c 4 * 5 * Copyright (C) 1992 Linus Torvalds 6 * 7 * Rewritten. Old one was good in 2.2, but in 2.3 it was immoral. --ANK (990903) 8 */ 9 10 #define pr_fmt(fmt) KBUILD_MODNAME ": " fmt 11 12 #include <linux/export.h> 13 #include <linux/kernel_stat.h> 14 #include <linux/interrupt.h> 15 #include <linux/init.h> 16 #include <linux/local_lock.h> 17 #include <linux/mm.h> 18 #include <linux/notifier.h> 19 #include <linux/percpu.h> 20 #include <linux/cpu.h> 21 #include <linux/freezer.h> 22 #include <linux/kthread.h> 23 #include <linux/rcupdate.h> 24 #include <linux/ftrace.h> 25 #include <linux/smp.h> 26 #include <linux/smpboot.h> 27 #include <linux/tick.h> 28 #include <linux/irq.h> 29 #include <linux/wait_bit.h> 30 #include <linux/workqueue.h> 31 32 #include <asm/softirq_stack.h> 33 34 #define CREATE_TRACE_POINTS 35 #include <trace/events/irq.h> 36 37 /* 38 - No shared variables, all the data are CPU local. 39 - If a softirq needs serialization, let it serialize itself 40 by its own spinlocks. 41 - Even if softirq is serialized, only local cpu is marked for 42 execution. Hence, we get something sort of weak cpu binding. 43 Though it is still not clear, will it result in better locality 44 or will not. 45 46 Examples: 47 - NET RX softirq. It is multithreaded and does not require 48 any global serialization. 49 - NET TX softirq. It kicks software netdevice queues, hence 50 it is logically serialized per device, but this serialization 51 is invisible to common code. 52 - Tasklets: serialized wrt itself. 53 */ 54 55 #ifndef __ARCH_IRQ_STAT 56 DEFINE_PER_CPU_ALIGNED(irq_cpustat_t, irq_stat); 57 EXPORT_PER_CPU_SYMBOL(irq_stat); 58 #endif 59 60 static struct softirq_action softirq_vec[NR_SOFTIRQS] __cacheline_aligned_in_smp; 61 62 DEFINE_PER_CPU(struct task_struct *, ksoftirqd); 63 64 const char * const softirq_to_name[NR_SOFTIRQS] = { 65 "HI", "TIMER", "NET_TX", "NET_RX", "BLOCK", "IRQ_POLL", 66 "TASKLET", "SCHED", "HRTIMER", "RCU" 67 }; 68 69 /* 70 * we cannot loop indefinitely here to avoid userspace starvation, 71 * but we also don't want to introduce a worst case 1/HZ latency 72 * to the pending events, so lets the scheduler to balance 73 * the softirq load for us. 74 */ 75 static void wakeup_softirqd(void) 76 { 77 /* Interrupts are disabled: no need to stop preemption */ 78 struct task_struct *tsk = __this_cpu_read(ksoftirqd); 79 80 if (tsk) 81 wake_up_process(tsk); 82 } 83 84 #ifdef CONFIG_TRACE_IRQFLAGS 85 DEFINE_PER_CPU(int, hardirqs_enabled); 86 DEFINE_PER_CPU(int, hardirq_context); 87 EXPORT_PER_CPU_SYMBOL_GPL(hardirqs_enabled); 88 EXPORT_PER_CPU_SYMBOL_GPL(hardirq_context); 89 #endif 90 91 /* 92 * SOFTIRQ_OFFSET usage: 93 * 94 * On !RT kernels 'count' is the preempt counter, on RT kernels this applies 95 * to a per CPU counter and to task::softirqs_disabled_cnt. 96 * 97 * - count is changed by SOFTIRQ_OFFSET on entering or leaving softirq 98 * processing. 99 * 100 * - count is changed by SOFTIRQ_DISABLE_OFFSET (= 2 * SOFTIRQ_OFFSET) 101 * on local_bh_disable or local_bh_enable. 102 * 103 * This lets us distinguish between whether we are currently processing 104 * softirq and whether we just have bh disabled. 105 */ 106 #ifdef CONFIG_PREEMPT_RT 107 108 /* 109 * RT accounts for BH disabled sections in task::softirqs_disabled_cnt and 110 * also in per CPU softirq_ctrl::cnt. This is necessary to allow tasks in a 111 * softirq disabled section to be preempted. 112 * 113 * The per task counter is used for softirq_count(), in_softirq() and 114 * in_serving_softirqs() because these counts are only valid when the task 115 * holding softirq_ctrl::lock is running. 116 * 117 * The per CPU counter prevents pointless wakeups of ksoftirqd in case that 118 * the task which is in a softirq disabled section is preempted or blocks. 119 */ 120 struct softirq_ctrl { 121 local_lock_t lock; 122 int cnt; 123 }; 124 125 static DEFINE_PER_CPU(struct softirq_ctrl, softirq_ctrl) = { 126 .lock = INIT_LOCAL_LOCK(softirq_ctrl.lock), 127 }; 128 129 /** 130 * local_bh_blocked() - Check for idle whether BH processing is blocked 131 * 132 * Returns false if the per CPU softirq::cnt is 0 otherwise true. 133 * 134 * This is invoked from the idle task to guard against false positive 135 * softirq pending warnings, which would happen when the task which holds 136 * softirq_ctrl::lock was the only running task on the CPU and blocks on 137 * some other lock. 138 */ 139 bool local_bh_blocked(void) 140 { 141 return __this_cpu_read(softirq_ctrl.cnt) != 0; 142 } 143 144 void __local_bh_disable_ip(unsigned long ip, unsigned int cnt) 145 { 146 unsigned long flags; 147 int newcnt; 148 149 WARN_ON_ONCE(in_hardirq()); 150 151 /* First entry of a task into a BH disabled section? */ 152 if (!current->softirq_disable_cnt) { 153 if (preemptible()) { 154 local_lock(&softirq_ctrl.lock); 155 /* Required to meet the RCU bottomhalf requirements. */ 156 rcu_read_lock(); 157 } else { 158 DEBUG_LOCKS_WARN_ON(this_cpu_read(softirq_ctrl.cnt)); 159 } 160 } 161 162 /* 163 * Track the per CPU softirq disabled state. On RT this is per CPU 164 * state to allow preemption of bottom half disabled sections. 165 */ 166 newcnt = __this_cpu_add_return(softirq_ctrl.cnt, cnt); 167 /* 168 * Reflect the result in the task state to prevent recursion on the 169 * local lock and to make softirq_count() & al work. 170 */ 171 current->softirq_disable_cnt = newcnt; 172 173 if (IS_ENABLED(CONFIG_TRACE_IRQFLAGS) && newcnt == cnt) { 174 raw_local_irq_save(flags); 175 lockdep_softirqs_off(ip); 176 raw_local_irq_restore(flags); 177 } 178 } 179 EXPORT_SYMBOL(__local_bh_disable_ip); 180 181 static void __local_bh_enable(unsigned int cnt, bool unlock) 182 { 183 unsigned long flags; 184 int newcnt; 185 186 DEBUG_LOCKS_WARN_ON(current->softirq_disable_cnt != 187 this_cpu_read(softirq_ctrl.cnt)); 188 189 if (IS_ENABLED(CONFIG_TRACE_IRQFLAGS) && softirq_count() == cnt) { 190 raw_local_irq_save(flags); 191 lockdep_softirqs_on(_RET_IP_); 192 raw_local_irq_restore(flags); 193 } 194 195 newcnt = __this_cpu_sub_return(softirq_ctrl.cnt, cnt); 196 current->softirq_disable_cnt = newcnt; 197 198 if (!newcnt && unlock) { 199 rcu_read_unlock(); 200 local_unlock(&softirq_ctrl.lock); 201 } 202 } 203 204 void __local_bh_enable_ip(unsigned long ip, unsigned int cnt) 205 { 206 bool preempt_on = preemptible(); 207 unsigned long flags; 208 u32 pending; 209 int curcnt; 210 211 WARN_ON_ONCE(in_hardirq()); 212 lockdep_assert_irqs_enabled(); 213 214 local_irq_save(flags); 215 curcnt = __this_cpu_read(softirq_ctrl.cnt); 216 217 /* 218 * If this is not reenabling soft interrupts, no point in trying to 219 * run pending ones. 220 */ 221 if (curcnt != cnt) 222 goto out; 223 224 pending = local_softirq_pending(); 225 if (!pending) 226 goto out; 227 228 /* 229 * If this was called from non preemptible context, wake up the 230 * softirq daemon. 231 */ 232 if (!preempt_on) { 233 wakeup_softirqd(); 234 goto out; 235 } 236 237 /* 238 * Adjust softirq count to SOFTIRQ_OFFSET which makes 239 * in_serving_softirq() become true. 240 */ 241 cnt = SOFTIRQ_OFFSET; 242 __local_bh_enable(cnt, false); 243 __do_softirq(); 244 245 out: 246 __local_bh_enable(cnt, preempt_on); 247 local_irq_restore(flags); 248 } 249 EXPORT_SYMBOL(__local_bh_enable_ip); 250 251 /* 252 * Invoked from ksoftirqd_run() outside of the interrupt disabled section 253 * to acquire the per CPU local lock for reentrancy protection. 254 */ 255 static inline void ksoftirqd_run_begin(void) 256 { 257 __local_bh_disable_ip(_RET_IP_, SOFTIRQ_OFFSET); 258 local_irq_disable(); 259 } 260 261 /* Counterpart to ksoftirqd_run_begin() */ 262 static inline void ksoftirqd_run_end(void) 263 { 264 __local_bh_enable(SOFTIRQ_OFFSET, true); 265 WARN_ON_ONCE(in_interrupt()); 266 local_irq_enable(); 267 } 268 269 static inline void softirq_handle_begin(void) { } 270 static inline void softirq_handle_end(void) { } 271 272 static inline bool should_wake_ksoftirqd(void) 273 { 274 return !this_cpu_read(softirq_ctrl.cnt); 275 } 276 277 static inline void invoke_softirq(void) 278 { 279 if (should_wake_ksoftirqd()) 280 wakeup_softirqd(); 281 } 282 283 /* 284 * flush_smp_call_function_queue() can raise a soft interrupt in a function 285 * call. On RT kernels this is undesired and the only known functionality 286 * in the block layer which does this is disabled on RT. If soft interrupts 287 * get raised which haven't been raised before the flush, warn so it can be 288 * investigated. 289 */ 290 void do_softirq_post_smp_call_flush(unsigned int was_pending) 291 { 292 if (WARN_ON_ONCE(was_pending != local_softirq_pending())) 293 invoke_softirq(); 294 } 295 296 #else /* CONFIG_PREEMPT_RT */ 297 298 /* 299 * This one is for softirq.c-internal use, where hardirqs are disabled 300 * legitimately: 301 */ 302 #ifdef CONFIG_TRACE_IRQFLAGS 303 void __local_bh_disable_ip(unsigned long ip, unsigned int cnt) 304 { 305 unsigned long flags; 306 307 WARN_ON_ONCE(in_hardirq()); 308 309 raw_local_irq_save(flags); 310 /* 311 * The preempt tracer hooks into preempt_count_add and will break 312 * lockdep because it calls back into lockdep after SOFTIRQ_OFFSET 313 * is set and before current->softirq_enabled is cleared. 314 * We must manually increment preempt_count here and manually 315 * call the trace_preempt_off later. 316 */ 317 __preempt_count_add(cnt); 318 /* 319 * Were softirqs turned off above: 320 */ 321 if (softirq_count() == (cnt & SOFTIRQ_MASK)) 322 lockdep_softirqs_off(ip); 323 raw_local_irq_restore(flags); 324 325 if (preempt_count() == cnt) { 326 #ifdef CONFIG_DEBUG_PREEMPT 327 current->preempt_disable_ip = get_lock_parent_ip(); 328 #endif 329 trace_preempt_off(CALLER_ADDR0, get_lock_parent_ip()); 330 } 331 } 332 EXPORT_SYMBOL(__local_bh_disable_ip); 333 #endif /* CONFIG_TRACE_IRQFLAGS */ 334 335 static void __local_bh_enable(unsigned int cnt) 336 { 337 lockdep_assert_irqs_disabled(); 338 339 if (preempt_count() == cnt) 340 trace_preempt_on(CALLER_ADDR0, get_lock_parent_ip()); 341 342 if (softirq_count() == (cnt & SOFTIRQ_MASK)) 343 lockdep_softirqs_on(_RET_IP_); 344 345 __preempt_count_sub(cnt); 346 } 347 348 /* 349 * Special-case - softirqs can safely be enabled by __do_softirq(), 350 * without processing still-pending softirqs: 351 */ 352 void _local_bh_enable(void) 353 { 354 WARN_ON_ONCE(in_hardirq()); 355 __local_bh_enable(SOFTIRQ_DISABLE_OFFSET); 356 } 357 EXPORT_SYMBOL(_local_bh_enable); 358 359 void __local_bh_enable_ip(unsigned long ip, unsigned int cnt) 360 { 361 WARN_ON_ONCE(in_hardirq()); 362 lockdep_assert_irqs_enabled(); 363 #ifdef CONFIG_TRACE_IRQFLAGS 364 local_irq_disable(); 365 #endif 366 /* 367 * Are softirqs going to be turned on now: 368 */ 369 if (softirq_count() == SOFTIRQ_DISABLE_OFFSET) 370 lockdep_softirqs_on(ip); 371 /* 372 * Keep preemption disabled until we are done with 373 * softirq processing: 374 */ 375 __preempt_count_sub(cnt - 1); 376 377 if (unlikely(!in_interrupt() && local_softirq_pending())) { 378 /* 379 * Run softirq if any pending. And do it in its own stack 380 * as we may be calling this deep in a task call stack already. 381 */ 382 do_softirq(); 383 } 384 385 preempt_count_dec(); 386 #ifdef CONFIG_TRACE_IRQFLAGS 387 local_irq_enable(); 388 #endif 389 preempt_check_resched(); 390 } 391 EXPORT_SYMBOL(__local_bh_enable_ip); 392 393 static inline void softirq_handle_begin(void) 394 { 395 __local_bh_disable_ip(_RET_IP_, SOFTIRQ_OFFSET); 396 } 397 398 static inline void softirq_handle_end(void) 399 { 400 __local_bh_enable(SOFTIRQ_OFFSET); 401 WARN_ON_ONCE(in_interrupt()); 402 } 403 404 static inline void ksoftirqd_run_begin(void) 405 { 406 local_irq_disable(); 407 } 408 409 static inline void ksoftirqd_run_end(void) 410 { 411 local_irq_enable(); 412 } 413 414 static inline bool should_wake_ksoftirqd(void) 415 { 416 return true; 417 } 418 419 static inline void invoke_softirq(void) 420 { 421 if (!force_irqthreads() || !__this_cpu_read(ksoftirqd)) { 422 #ifdef CONFIG_HAVE_IRQ_EXIT_ON_IRQ_STACK 423 /* 424 * We can safely execute softirq on the current stack if 425 * it is the irq stack, because it should be near empty 426 * at this stage. 427 */ 428 __do_softirq(); 429 #else 430 /* 431 * Otherwise, irq_exit() is called on the task stack that can 432 * be potentially deep already. So call softirq in its own stack 433 * to prevent from any overrun. 434 */ 435 do_softirq_own_stack(); 436 #endif 437 } else { 438 wakeup_softirqd(); 439 } 440 } 441 442 asmlinkage __visible void do_softirq(void) 443 { 444 __u32 pending; 445 unsigned long flags; 446 447 if (in_interrupt()) 448 return; 449 450 local_irq_save(flags); 451 452 pending = local_softirq_pending(); 453 454 if (pending) 455 do_softirq_own_stack(); 456 457 local_irq_restore(flags); 458 } 459 460 #endif /* !CONFIG_PREEMPT_RT */ 461 462 /* 463 * We restart softirq processing for at most MAX_SOFTIRQ_RESTART times, 464 * but break the loop if need_resched() is set or after 2 ms. 465 * The MAX_SOFTIRQ_TIME provides a nice upper bound in most cases, but in 466 * certain cases, such as stop_machine(), jiffies may cease to 467 * increment and so we need the MAX_SOFTIRQ_RESTART limit as 468 * well to make sure we eventually return from this method. 469 * 470 * These limits have been established via experimentation. 471 * The two things to balance is latency against fairness - 472 * we want to handle softirqs as soon as possible, but they 473 * should not be able to lock up the box. 474 */ 475 #define MAX_SOFTIRQ_TIME msecs_to_jiffies(2) 476 #define MAX_SOFTIRQ_RESTART 10 477 478 #ifdef CONFIG_TRACE_IRQFLAGS 479 /* 480 * When we run softirqs from irq_exit() and thus on the hardirq stack we need 481 * to keep the lockdep irq context tracking as tight as possible in order to 482 * not miss-qualify lock contexts and miss possible deadlocks. 483 */ 484 485 static inline bool lockdep_softirq_start(void) 486 { 487 bool in_hardirq = false; 488 489 if (lockdep_hardirq_context()) { 490 in_hardirq = true; 491 lockdep_hardirq_exit(); 492 } 493 494 lockdep_softirq_enter(); 495 496 return in_hardirq; 497 } 498 499 static inline void lockdep_softirq_end(bool in_hardirq) 500 { 501 lockdep_softirq_exit(); 502 503 if (in_hardirq) 504 lockdep_hardirq_enter(); 505 } 506 #else 507 static inline bool lockdep_softirq_start(void) { return false; } 508 static inline void lockdep_softirq_end(bool in_hardirq) { } 509 #endif 510 511 static void handle_softirqs(bool ksirqd) 512 { 513 unsigned long end = jiffies + MAX_SOFTIRQ_TIME; 514 unsigned long old_flags = current->flags; 515 int max_restart = MAX_SOFTIRQ_RESTART; 516 struct softirq_action *h; 517 bool in_hardirq; 518 __u32 pending; 519 int softirq_bit; 520 521 /* 522 * Mask out PF_MEMALLOC as the current task context is borrowed for the 523 * softirq. A softirq handled, such as network RX, might set PF_MEMALLOC 524 * again if the socket is related to swapping. 525 */ 526 current->flags &= ~PF_MEMALLOC; 527 528 pending = local_softirq_pending(); 529 530 softirq_handle_begin(); 531 in_hardirq = lockdep_softirq_start(); 532 account_softirq_enter(current); 533 534 restart: 535 /* Reset the pending bitmask before enabling irqs */ 536 set_softirq_pending(0); 537 538 local_irq_enable(); 539 540 h = softirq_vec; 541 542 while ((softirq_bit = ffs(pending))) { 543 unsigned int vec_nr; 544 int prev_count; 545 546 h += softirq_bit - 1; 547 548 vec_nr = h - softirq_vec; 549 prev_count = preempt_count(); 550 551 kstat_incr_softirqs_this_cpu(vec_nr); 552 553 trace_softirq_entry(vec_nr); 554 h->action(); 555 trace_softirq_exit(vec_nr); 556 if (unlikely(prev_count != preempt_count())) { 557 pr_err("huh, entered softirq %u %s %p with preempt_count %08x, exited with %08x?\n", 558 vec_nr, softirq_to_name[vec_nr], h->action, 559 prev_count, preempt_count()); 560 preempt_count_set(prev_count); 561 } 562 h++; 563 pending >>= softirq_bit; 564 } 565 566 if (!IS_ENABLED(CONFIG_PREEMPT_RT) && ksirqd) 567 rcu_softirq_qs(); 568 569 local_irq_disable(); 570 571 pending = local_softirq_pending(); 572 if (pending) { 573 if (time_before(jiffies, end) && !need_resched() && 574 --max_restart) 575 goto restart; 576 577 wakeup_softirqd(); 578 } 579 580 account_softirq_exit(current); 581 lockdep_softirq_end(in_hardirq); 582 softirq_handle_end(); 583 current_restore_flags(old_flags, PF_MEMALLOC); 584 } 585 586 asmlinkage __visible void __softirq_entry __do_softirq(void) 587 { 588 handle_softirqs(false); 589 } 590 591 /** 592 * irq_enter_rcu - Enter an interrupt context with RCU watching 593 */ 594 void irq_enter_rcu(void) 595 { 596 __irq_enter_raw(); 597 598 if (tick_nohz_full_cpu(smp_processor_id()) || 599 (is_idle_task(current) && (irq_count() == HARDIRQ_OFFSET))) 600 tick_irq_enter(); 601 602 account_hardirq_enter(current); 603 } 604 605 /** 606 * irq_enter - Enter an interrupt context including RCU update 607 */ 608 void irq_enter(void) 609 { 610 ct_irq_enter(); 611 irq_enter_rcu(); 612 } 613 614 static inline void tick_irq_exit(void) 615 { 616 #ifdef CONFIG_NO_HZ_COMMON 617 int cpu = smp_processor_id(); 618 619 /* Make sure that timer wheel updates are propagated */ 620 if ((sched_core_idle_cpu(cpu) && !need_resched()) || tick_nohz_full_cpu(cpu)) { 621 if (!in_hardirq()) 622 tick_nohz_irq_exit(); 623 } 624 #endif 625 } 626 627 #ifdef CONFIG_IRQ_FORCED_THREADING 628 DEFINE_PER_CPU(struct task_struct *, ktimerd); 629 DEFINE_PER_CPU(unsigned long, pending_timer_softirq); 630 631 static void wake_timersd(void) 632 { 633 struct task_struct *tsk = __this_cpu_read(ktimerd); 634 635 if (tsk) 636 wake_up_process(tsk); 637 } 638 639 #else 640 641 static inline void wake_timersd(void) { } 642 643 #endif 644 645 static inline void __irq_exit_rcu(void) 646 { 647 #ifndef __ARCH_IRQ_EXIT_IRQS_DISABLED 648 local_irq_disable(); 649 #else 650 lockdep_assert_irqs_disabled(); 651 #endif 652 account_hardirq_exit(current); 653 preempt_count_sub(HARDIRQ_OFFSET); 654 if (!in_interrupt() && local_softirq_pending()) 655 invoke_softirq(); 656 657 if (IS_ENABLED(CONFIG_IRQ_FORCED_THREADING) && force_irqthreads() && 658 local_timers_pending_force_th() && !(in_nmi() | in_hardirq())) 659 wake_timersd(); 660 661 tick_irq_exit(); 662 } 663 664 /** 665 * irq_exit_rcu() - Exit an interrupt context without updating RCU 666 * 667 * Also processes softirqs if needed and possible. 668 */ 669 void irq_exit_rcu(void) 670 { 671 __irq_exit_rcu(); 672 /* must be last! */ 673 lockdep_hardirq_exit(); 674 } 675 676 /** 677 * irq_exit - Exit an interrupt context, update RCU and lockdep 678 * 679 * Also processes softirqs if needed and possible. 680 */ 681 void irq_exit(void) 682 { 683 __irq_exit_rcu(); 684 ct_irq_exit(); 685 /* must be last! */ 686 lockdep_hardirq_exit(); 687 } 688 689 /* 690 * This function must run with irqs disabled! 691 */ 692 inline void raise_softirq_irqoff(unsigned int nr) 693 { 694 __raise_softirq_irqoff(nr); 695 696 /* 697 * If we're in an interrupt or softirq, we're done 698 * (this also catches softirq-disabled code). We will 699 * actually run the softirq once we return from 700 * the irq or softirq. 701 * 702 * Otherwise we wake up ksoftirqd to make sure we 703 * schedule the softirq soon. 704 */ 705 if (!in_interrupt() && should_wake_ksoftirqd()) 706 wakeup_softirqd(); 707 } 708 709 void raise_softirq(unsigned int nr) 710 { 711 unsigned long flags; 712 713 local_irq_save(flags); 714 raise_softirq_irqoff(nr); 715 local_irq_restore(flags); 716 } 717 718 void __raise_softirq_irqoff(unsigned int nr) 719 { 720 lockdep_assert_irqs_disabled(); 721 trace_softirq_raise(nr); 722 or_softirq_pending(1UL << nr); 723 } 724 725 void open_softirq(int nr, void (*action)(void)) 726 { 727 softirq_vec[nr].action = action; 728 } 729 730 /* 731 * Tasklets 732 */ 733 struct tasklet_head { 734 struct tasklet_struct *head; 735 struct tasklet_struct **tail; 736 }; 737 738 static DEFINE_PER_CPU(struct tasklet_head, tasklet_vec); 739 static DEFINE_PER_CPU(struct tasklet_head, tasklet_hi_vec); 740 741 static void __tasklet_schedule_common(struct tasklet_struct *t, 742 struct tasklet_head __percpu *headp, 743 unsigned int softirq_nr) 744 { 745 struct tasklet_head *head; 746 unsigned long flags; 747 748 local_irq_save(flags); 749 head = this_cpu_ptr(headp); 750 t->next = NULL; 751 *head->tail = t; 752 head->tail = &(t->next); 753 raise_softirq_irqoff(softirq_nr); 754 local_irq_restore(flags); 755 } 756 757 void __tasklet_schedule(struct tasklet_struct *t) 758 { 759 __tasklet_schedule_common(t, &tasklet_vec, 760 TASKLET_SOFTIRQ); 761 } 762 EXPORT_SYMBOL(__tasklet_schedule); 763 764 void __tasklet_hi_schedule(struct tasklet_struct *t) 765 { 766 __tasklet_schedule_common(t, &tasklet_hi_vec, 767 HI_SOFTIRQ); 768 } 769 EXPORT_SYMBOL(__tasklet_hi_schedule); 770 771 static bool tasklet_clear_sched(struct tasklet_struct *t) 772 { 773 if (test_and_clear_wake_up_bit(TASKLET_STATE_SCHED, &t->state)) 774 return true; 775 776 WARN_ONCE(1, "tasklet SCHED state not set: %s %pS\n", 777 t->use_callback ? "callback" : "func", 778 t->use_callback ? (void *)t->callback : (void *)t->func); 779 780 return false; 781 } 782 783 static void tasklet_action_common(struct tasklet_head *tl_head, 784 unsigned int softirq_nr) 785 { 786 struct tasklet_struct *list; 787 788 local_irq_disable(); 789 list = tl_head->head; 790 tl_head->head = NULL; 791 tl_head->tail = &tl_head->head; 792 local_irq_enable(); 793 794 while (list) { 795 struct tasklet_struct *t = list; 796 797 list = list->next; 798 799 if (tasklet_trylock(t)) { 800 if (!atomic_read(&t->count)) { 801 if (tasklet_clear_sched(t)) { 802 if (t->use_callback) { 803 trace_tasklet_entry(t, t->callback); 804 t->callback(t); 805 trace_tasklet_exit(t, t->callback); 806 } else { 807 trace_tasklet_entry(t, t->func); 808 t->func(t->data); 809 trace_tasklet_exit(t, t->func); 810 } 811 } 812 tasklet_unlock(t); 813 continue; 814 } 815 tasklet_unlock(t); 816 } 817 818 local_irq_disable(); 819 t->next = NULL; 820 *tl_head->tail = t; 821 tl_head->tail = &t->next; 822 __raise_softirq_irqoff(softirq_nr); 823 local_irq_enable(); 824 } 825 } 826 827 static __latent_entropy void tasklet_action(void) 828 { 829 workqueue_softirq_action(false); 830 tasklet_action_common(this_cpu_ptr(&tasklet_vec), TASKLET_SOFTIRQ); 831 } 832 833 static __latent_entropy void tasklet_hi_action(void) 834 { 835 workqueue_softirq_action(true); 836 tasklet_action_common(this_cpu_ptr(&tasklet_hi_vec), HI_SOFTIRQ); 837 } 838 839 void tasklet_setup(struct tasklet_struct *t, 840 void (*callback)(struct tasklet_struct *)) 841 { 842 t->next = NULL; 843 t->state = 0; 844 atomic_set(&t->count, 0); 845 t->callback = callback; 846 t->use_callback = true; 847 t->data = 0; 848 } 849 EXPORT_SYMBOL(tasklet_setup); 850 851 void tasklet_init(struct tasklet_struct *t, 852 void (*func)(unsigned long), unsigned long data) 853 { 854 t->next = NULL; 855 t->state = 0; 856 atomic_set(&t->count, 0); 857 t->func = func; 858 t->use_callback = false; 859 t->data = data; 860 } 861 EXPORT_SYMBOL(tasklet_init); 862 863 #if defined(CONFIG_SMP) || defined(CONFIG_PREEMPT_RT) 864 /* 865 * Do not use in new code. Waiting for tasklets from atomic contexts is 866 * error prone and should be avoided. 867 */ 868 void tasklet_unlock_spin_wait(struct tasklet_struct *t) 869 { 870 while (test_bit(TASKLET_STATE_RUN, &(t)->state)) { 871 if (IS_ENABLED(CONFIG_PREEMPT_RT)) { 872 /* 873 * Prevent a live lock when current preempted soft 874 * interrupt processing or prevents ksoftirqd from 875 * running. If the tasklet runs on a different CPU 876 * then this has no effect other than doing the BH 877 * disable/enable dance for nothing. 878 */ 879 local_bh_disable(); 880 local_bh_enable(); 881 } else { 882 cpu_relax(); 883 } 884 } 885 } 886 EXPORT_SYMBOL(tasklet_unlock_spin_wait); 887 #endif 888 889 void tasklet_kill(struct tasklet_struct *t) 890 { 891 if (in_interrupt()) 892 pr_notice("Attempt to kill tasklet from interrupt\n"); 893 894 wait_on_bit_lock(&t->state, TASKLET_STATE_SCHED, TASK_UNINTERRUPTIBLE); 895 896 tasklet_unlock_wait(t); 897 tasklet_clear_sched(t); 898 } 899 EXPORT_SYMBOL(tasklet_kill); 900 901 #if defined(CONFIG_SMP) || defined(CONFIG_PREEMPT_RT) 902 void tasklet_unlock(struct tasklet_struct *t) 903 { 904 clear_and_wake_up_bit(TASKLET_STATE_RUN, &t->state); 905 } 906 EXPORT_SYMBOL_GPL(tasklet_unlock); 907 908 void tasklet_unlock_wait(struct tasklet_struct *t) 909 { 910 wait_on_bit(&t->state, TASKLET_STATE_RUN, TASK_UNINTERRUPTIBLE); 911 } 912 EXPORT_SYMBOL_GPL(tasklet_unlock_wait); 913 #endif 914 915 void __init softirq_init(void) 916 { 917 int cpu; 918 919 for_each_possible_cpu(cpu) { 920 per_cpu(tasklet_vec, cpu).tail = 921 &per_cpu(tasklet_vec, cpu).head; 922 per_cpu(tasklet_hi_vec, cpu).tail = 923 &per_cpu(tasklet_hi_vec, cpu).head; 924 } 925 926 open_softirq(TASKLET_SOFTIRQ, tasklet_action); 927 open_softirq(HI_SOFTIRQ, tasklet_hi_action); 928 } 929 930 static int ksoftirqd_should_run(unsigned int cpu) 931 { 932 return local_softirq_pending(); 933 } 934 935 static void run_ksoftirqd(unsigned int cpu) 936 { 937 ksoftirqd_run_begin(); 938 if (local_softirq_pending()) { 939 /* 940 * We can safely run softirq on inline stack, as we are not deep 941 * in the task stack here. 942 */ 943 handle_softirqs(true); 944 ksoftirqd_run_end(); 945 cond_resched(); 946 return; 947 } 948 ksoftirqd_run_end(); 949 } 950 951 #ifdef CONFIG_HOTPLUG_CPU 952 static int takeover_tasklets(unsigned int cpu) 953 { 954 workqueue_softirq_dead(cpu); 955 956 /* CPU is dead, so no lock needed. */ 957 local_irq_disable(); 958 959 /* Find end, append list for that CPU. */ 960 if (&per_cpu(tasklet_vec, cpu).head != per_cpu(tasklet_vec, cpu).tail) { 961 *__this_cpu_read(tasklet_vec.tail) = per_cpu(tasklet_vec, cpu).head; 962 __this_cpu_write(tasklet_vec.tail, per_cpu(tasklet_vec, cpu).tail); 963 per_cpu(tasklet_vec, cpu).head = NULL; 964 per_cpu(tasklet_vec, cpu).tail = &per_cpu(tasklet_vec, cpu).head; 965 } 966 raise_softirq_irqoff(TASKLET_SOFTIRQ); 967 968 if (&per_cpu(tasklet_hi_vec, cpu).head != per_cpu(tasklet_hi_vec, cpu).tail) { 969 *__this_cpu_read(tasklet_hi_vec.tail) = per_cpu(tasklet_hi_vec, cpu).head; 970 __this_cpu_write(tasklet_hi_vec.tail, per_cpu(tasklet_hi_vec, cpu).tail); 971 per_cpu(tasklet_hi_vec, cpu).head = NULL; 972 per_cpu(tasklet_hi_vec, cpu).tail = &per_cpu(tasklet_hi_vec, cpu).head; 973 } 974 raise_softirq_irqoff(HI_SOFTIRQ); 975 976 local_irq_enable(); 977 return 0; 978 } 979 #else 980 #define takeover_tasklets NULL 981 #endif /* CONFIG_HOTPLUG_CPU */ 982 983 static struct smp_hotplug_thread softirq_threads = { 984 .store = &ksoftirqd, 985 .thread_should_run = ksoftirqd_should_run, 986 .thread_fn = run_ksoftirqd, 987 .thread_comm = "ksoftirqd/%u", 988 }; 989 990 #ifdef CONFIG_IRQ_FORCED_THREADING 991 static void ktimerd_setup(unsigned int cpu) 992 { 993 /* Above SCHED_NORMAL to handle timers before regular tasks. */ 994 sched_set_fifo_low(current); 995 } 996 997 static int ktimerd_should_run(unsigned int cpu) 998 { 999 return local_timers_pending_force_th(); 1000 } 1001 1002 void raise_ktimers_thread(unsigned int nr) 1003 { 1004 trace_softirq_raise(nr); 1005 __this_cpu_or(pending_timer_softirq, BIT(nr)); 1006 } 1007 1008 static void run_ktimerd(unsigned int cpu) 1009 { 1010 unsigned int timer_si; 1011 1012 ksoftirqd_run_begin(); 1013 1014 timer_si = local_timers_pending_force_th(); 1015 __this_cpu_write(pending_timer_softirq, 0); 1016 or_softirq_pending(timer_si); 1017 1018 __do_softirq(); 1019 1020 ksoftirqd_run_end(); 1021 } 1022 1023 static struct smp_hotplug_thread timer_thread = { 1024 .store = &ktimerd, 1025 .setup = ktimerd_setup, 1026 .thread_should_run = ktimerd_should_run, 1027 .thread_fn = run_ktimerd, 1028 .thread_comm = "ktimers/%u", 1029 }; 1030 #endif 1031 1032 static __init int spawn_ksoftirqd(void) 1033 { 1034 cpuhp_setup_state_nocalls(CPUHP_SOFTIRQ_DEAD, "softirq:dead", NULL, 1035 takeover_tasklets); 1036 BUG_ON(smpboot_register_percpu_thread(&softirq_threads)); 1037 #ifdef CONFIG_IRQ_FORCED_THREADING 1038 if (force_irqthreads()) 1039 BUG_ON(smpboot_register_percpu_thread(&timer_thread)); 1040 #endif 1041 return 0; 1042 } 1043 early_initcall(spawn_ksoftirqd); 1044 1045 /* 1046 * [ These __weak aliases are kept in a separate compilation unit, so that 1047 * GCC does not inline them incorrectly. ] 1048 */ 1049 1050 int __init __weak early_irq_init(void) 1051 { 1052 return 0; 1053 } 1054 1055 int __init __weak arch_probe_nr_irqs(void) 1056 { 1057 return NR_IRQS_LEGACY; 1058 } 1059 1060 int __init __weak arch_early_irq_init(void) 1061 { 1062 return 0; 1063 } 1064 1065 unsigned int __weak arch_dynirq_lower_bound(unsigned int from) 1066 { 1067 return from; 1068 } 1069