]> git.proxmox.com Git - mirror_ubuntu-artful-kernel.git/blame - arch/x86/kernel/irq_64.c
sched/headers: Prepare for new header dependencies before moving code to <linux/sched...
[mirror_ubuntu-artful-kernel.git] / arch / x86 / kernel / irq_64.c
CommitLineData
1da177e4 1/*
1da177e4
LT
2 * Copyright (C) 1992, 1998 Linus Torvalds, Ingo Molnar
3 *
4 * This file contains the lowest level x86_64-specific interrupt
5 * entry and irq statistics code. All the remaining irq logic is
6 * done by the generic kernel/irq/ code and in the
7 * x86_64-specific irq controller code. (e.g. i8259.c and
8 * io_apic.c.)
9 */
10
11#include <linux/kernel_stat.h>
12#include <linux/interrupt.h>
13#include <linux/seq_file.h>
76e4f660 14#include <linux/delay.h>
bcbc4f20 15#include <linux/ftrace.h>
5f66b2a0
JSR
16#include <linux/uaccess.h>
17#include <linux/smp.h>
68db0cf1 18#include <linux/sched/task_stack.h>
1da177e4 19#include <asm/io_apic.h>
3819cd48 20#include <asm/apic.h>
1da177e4 21
55af7796
MH
22int sysctl_panic_on_stackoverflow;
23
4961f10e
ES
24/*
25 * Probabilistic stack overflow check:
26 *
27 * Only check the stack in process context, because everything else
28 * runs on the big interrupt stacks. Checking reliably is too expensive,
29 * so we just check from interrupts.
30 */
31static inline void stack_overflow_check(struct pt_regs *regs)
32{
f377fa12 33#ifdef CONFIG_DEBUG_STACKOVERFLOW
d2db6610 34#define STACK_TOP_MARGIN 128
37fe6a42
MH
35 struct orig_ist *oist;
36 u64 irq_stack_top, irq_stack_bottom;
37 u64 estack_top, estack_bottom;
c9f4f06d 38 u64 curbase = (u64)task_stack_page(current);
f377fa12 39
f39b6f0e 40 if (user_mode(regs))
69682b62
MH
41 return;
42
15f4eae7 43 if (regs->sp >= curbase + sizeof(struct pt_regs) + STACK_TOP_MARGIN &&
467e6b7a 44 regs->sp <= curbase + THREAD_SIZE)
37fe6a42
MH
45 return;
46
89cbc767 47 irq_stack_top = (u64)this_cpu_ptr(irq_stack_union.irq_stack) +
d2db6610 48 STACK_TOP_MARGIN;
89cbc767 49 irq_stack_bottom = (u64)__this_cpu_read(irq_stack_ptr);
37fe6a42
MH
50 if (regs->sp >= irq_stack_top && regs->sp <= irq_stack_bottom)
51 return;
52
89cbc767 53 oist = this_cpu_ptr(&orig_ist);
d2db6610 54 estack_top = (u64)oist->ist[0] - EXCEPTION_STKSZ + STACK_TOP_MARGIN;
37fe6a42
MH
55 estack_bottom = (u64)oist->ist[N_EXCEPTION_STACKS - 1];
56 if (regs->sp >= estack_top && regs->sp <= estack_bottom)
57 return;
f377fa12 58
37fe6a42
MH
59 WARN_ONCE(1, "do_IRQ(): %s has overflown the kernel stack (cur:%Lx,sp:%lx,irq stk top-bottom:%Lx-%Lx,exception stk top-bottom:%Lx-%Lx)\n",
60 current->comm, curbase, regs->sp,
61 irq_stack_top, irq_stack_bottom,
62 estack_top, estack_bottom);
55af7796
MH
63
64 if (sysctl_panic_on_stackoverflow)
65 panic("low stack detected by irq handler - check messages\n");
4961f10e 66#endif
f377fa12 67}
4961f10e 68
a782a7e4 69bool handle_irq(struct irq_desc *desc, struct pt_regs *regs)
9b2b76a3 70{
9b2b76a3
JF
71 stack_overflow_check(regs);
72
a7e705af 73 if (IS_ERR_OR_NULL(desc))
9b2b76a3
JF
74 return false;
75
bd0b9ac4 76 generic_handle_irq_desc(desc);
9b2b76a3
JF
77 return true;
78}