]> git.proxmox.com Git - mirror_ubuntu-artful-kernel.git/blame - arch/x86/kernel/irq_32.c
genirq: Move field 'msi_desc' from irq_data into irq_common_data
[mirror_ubuntu-artful-kernel.git] / arch / x86 / kernel / irq_32.c
CommitLineData
1da177e4 1/*
1da177e4
LT
2 * Copyright (C) 1992, 1998 Linus Torvalds, Ingo Molnar
3 *
4 * This file contains the lowest level x86-specific interrupt
5 * entry, irq-stacks and irq statistics code. All the remaining
6 * irq logic is done by the generic kernel/irq/ code and
7 * by the x86-specific irq controller code. (e.g. i8259.c and
8 * io_apic.c.)
9 */
10
1da177e4
LT
11#include <linux/module.h>
12#include <linux/seq_file.h>
13#include <linux/interrupt.h>
14#include <linux/kernel_stat.h>
f3705136
ZM
15#include <linux/notifier.h>
16#include <linux/cpu.h>
17#include <linux/delay.h>
72ade5f9 18#include <linux/uaccess.h>
42f8faec 19#include <linux/percpu.h>
5c1eb089 20#include <linux/mm.h>
1da177e4 21
e05d723f 22#include <asm/apic.h>
e05d723f 23
de9b10af 24#ifdef CONFIG_DEBUG_STACKOVERFLOW
53b56502
IM
25
26int sysctl_panic_on_stackoverflow __read_mostly;
27
de9b10af
TG
28/* Debugging check for stack overflow: is there less than 1KB free? */
29static int check_stack_overflow(void)
30{
31 long sp;
32
33 __asm__ __volatile__("andl %%esp,%0" :
34 "=r" (sp) : "0" (THREAD_SIZE - 1));
35
36 return sp < (sizeof(struct thread_info) + STACK_WARN);
37}
38
39static void print_stack_overflow(void)
40{
41 printk(KERN_WARNING "low stack detected by irq handler\n");
42 dump_stack();
55af7796
MH
43 if (sysctl_panic_on_stackoverflow)
44 panic("low stack detected by irq handler - check messages\n");
de9b10af
TG
45}
46
47#else
48static inline int check_stack_overflow(void) { return 0; }
49static inline void print_stack_overflow(void) { }
50#endif
51
198d208d
SR
52DEFINE_PER_CPU(struct irq_stack *, hardirq_stack);
53DEFINE_PER_CPU(struct irq_stack *, softirq_stack);
1da177e4 54
403d8efc 55static void call_on_stack(void *func, void *stack)
04b361ab 56{
403d8efc
TG
57 asm volatile("xchgl %%ebx,%%esp \n"
58 "call *%%edi \n"
59 "movl %%ebx,%%esp \n"
60 : "=b" (stack)
61 : "0" (stack),
62 "D"(func)
63 : "memory", "cc", "edx", "ecx", "eax");
04b361ab 64}
1da177e4 65
198d208d
SR
66static inline void *current_stack(void)
67{
83653c16 68 return (void *)(current_stack_pointer() & ~(THREAD_SIZE - 1));
198d208d
SR
69}
70
de9b10af
TG
71static inline int
72execute_on_irq_stack(int overflow, struct irq_desc *desc, int irq)
73{
198d208d 74 struct irq_stack *curstk, *irqstk;
0788aa6a 75 u32 *isp, *prev_esp, arg1, arg2;
1da177e4 76
198d208d
SR
77 curstk = (struct irq_stack *) current_stack();
78 irqstk = __this_cpu_read(hardirq_stack);
1da177e4
LT
79
80 /*
81 * this is where we switch to the IRQ stack. However, if we are
82 * already using the IRQ stack (because we interrupted a hardirq
83 * handler) we can't do that and just have to keep using the
84 * current stack (which is the irq stack already after all)
85 */
198d208d 86 if (unlikely(curstk == irqstk))
de9b10af 87 return 0;
1da177e4 88
198d208d
SR
89 isp = (u32 *) ((char *)irqstk + sizeof(*irqstk));
90
91 /* Save the next esp at the bottom of the stack */
92 prev_esp = (u32 *)irqstk;
83653c16 93 *prev_esp = current_stack_pointer();
1da177e4 94
de9b10af 95 if (unlikely(overflow))
403d8efc
TG
96 call_on_stack(print_stack_overflow, isp);
97
98 asm volatile("xchgl %%ebx,%%esp \n"
99 "call *%%edi \n"
100 "movl %%ebx,%%esp \n"
101 : "=a" (arg1), "=d" (arg2), "=b" (isp)
102 : "0" (irq), "1" (desc), "2" (isp),
103 "D" (desc->handle_irq)
104 : "memory", "cc", "ecx");
1da177e4
LT
105 return 1;
106}
107
1da177e4
LT
108/*
109 * allocate per-cpu stacks for hardirq and for softirq processing
110 */
148f9bb8 111void irq_ctx_init(int cpu)
1da177e4 112{
198d208d 113 struct irq_stack *irqstk;
1da177e4 114
198d208d 115 if (per_cpu(hardirq_stack, cpu))
1da177e4
LT
116 return;
117
198d208d 118 irqstk = page_address(alloc_pages_node(cpu_to_node(cpu),
38e7c572
TG
119 THREADINFO_GFP,
120 THREAD_SIZE_ORDER));
198d208d 121 per_cpu(hardirq_stack, cpu) = irqstk;
1da177e4 122
198d208d 123 irqstk = page_address(alloc_pages_node(cpu_to_node(cpu),
38e7c572
TG
124 THREADINFO_GFP,
125 THREAD_SIZE_ORDER));
198d208d 126 per_cpu(softirq_stack, cpu) = irqstk;
1da177e4 127
403d8efc 128 printk(KERN_DEBUG "CPU %u irqstacks, hard=%p soft=%p\n",
198d208d 129 cpu, per_cpu(hardirq_stack, cpu), per_cpu(softirq_stack, cpu));
1da177e4
LT
130}
131
7d65f4a6 132void do_softirq_own_stack(void)
1da177e4 133{
198d208d
SR
134 struct thread_info *curstk;
135 struct irq_stack *irqstk;
0788aa6a 136 u32 *isp, *prev_esp;
1da177e4 137
198d208d
SR
138 curstk = current_stack();
139 irqstk = __this_cpu_read(softirq_stack);
1da177e4 140
7d65f4a6 141 /* build the stack frame on the softirq stack */
198d208d 142 isp = (u32 *) ((char *)irqstk + sizeof(*irqstk));
1da177e4 143
0788aa6a 144 /* Push the previous esp onto the stack */
198d208d 145 prev_esp = (u32 *)irqstk;
83653c16 146 *prev_esp = current_stack_pointer();
0788aa6a 147
7d65f4a6 148 call_on_stack(__do_softirq, isp);
1da177e4 149}
403d8efc 150
a782a7e4 151bool handle_irq(struct irq_desc *desc, struct pt_regs *regs)
9b2b76a3 152{
a47d4576 153 unsigned int irq;
9b2b76a3
JF
154 int overflow;
155
156 overflow = check_stack_overflow();
157
a782a7e4 158 if (IS_ERR_OR_NULL(desc))
9b2b76a3
JF
159 return false;
160
a47d4576 161 irq = irq_desc_get_irq(desc);
f39b6f0e 162 if (user_mode(regs) || !execute_on_irq_stack(overflow, desc, irq)) {
9b2b76a3
JF
163 if (unlikely(overflow))
164 print_stack_overflow();
a782a7e4 165 generic_handle_irq_desc(irq, desc);
9b2b76a3
JF
166 }
167
168 return true;
169}