cregit-Linux how code gets into the kernel

Release 4.10 arch/x86/kernel/irq_64.c

Directory: arch/x86/kernel
/*
 *      Copyright (C) 1992, 1998 Linus Torvalds, Ingo Molnar
 *
 * This file contains the lowest level x86_64-specific interrupt
 * entry and irq statistics code. All the remaining irq logic is
 * done by the generic kernel/irq/ code and in the
 * x86_64-specific irq controller code. (e.g. i8259.c and
 * io_apic.c.)
 */

#include <linux/kernel_stat.h>
#include <linux/interrupt.h>
#include <linux/seq_file.h>
#include <linux/delay.h>
#include <linux/ftrace.h>
#include <linux/uaccess.h>
#include <linux/smp.h>
#include <asm/io_apic.h>
#include <asm/apic.h>


int sysctl_panic_on_stackoverflow;

/*
 * Probabilistic stack overflow check:
 *
 * Only check the stack in process context, because everything else
 * runs on the big interrupt stacks. Checking reliably is too expensive,
 * so we just check from interrupts.
 */

static inline void stack_overflow_check(struct pt_regs *regs) { #ifdef CONFIG_DEBUG_STACKOVERFLOW #define STACK_TOP_MARGIN 128 struct orig_ist *oist; u64 irq_stack_top, irq_stack_bottom; u64 estack_top, estack_bottom; u64 curbase = (u64)task_stack_page(current); if (user_mode(regs)) return; if (regs->sp >= curbase + sizeof(struct pt_regs) + STACK_TOP_MARGIN && regs->sp <= curbase + THREAD_SIZE) return; irq_stack_top = (u64)this_cpu_ptr(irq_stack_union.irq_stack) + STACK_TOP_MARGIN; irq_stack_bottom = (u64)__this_cpu_read(irq_stack_ptr); if (regs->sp >= irq_stack_top && regs->sp <= irq_stack_bottom) return; oist = this_cpu_ptr(&orig_ist); estack_top = (u64)oist->ist[0] - EXCEPTION_STKSZ + STACK_TOP_MARGIN; estack_bottom = (u64)oist->ist[N_EXCEPTION_STACKS - 1]; if (regs->sp >= estack_top && regs->sp <= estack_bottom) return; WARN_ONCE(1, "do_IRQ(): %s has overflown the kernel stack (cur:%Lx,sp:%lx,irq stk top-bottom:%Lx-%Lx,exception stk top-bottom:%Lx-%Lx)\n", current->comm, curbase, regs->sp, irq_stack_top, irq_stack_bottom, estack_top, estack_bottom); if (sysctl_panic_on_stackoverflow) panic("low stack detected by irq handler - check messages\n"); #endif }

Contributors

PersonTokensPropCommitsCommitProp
mitsuo hayasakamitsuo hayasaka14871.84%541.67%
eric sandeeneric sandeen4119.90%18.33%
ingo molnaringo molnar41.94%18.33%
christoph lameterchristoph lameter41.94%18.33%
roman zippelroman zippel31.46%18.33%
jia zhangjia zhang31.46%18.33%
h. peter anvinh. peter anvin20.97%18.33%
andy lutomirskiandy lutomirski10.49%18.33%
Total206100.00%12100.00%


bool handle_irq(struct irq_desc *desc, struct pt_regs *regs) { stack_overflow_check(regs); if (IS_ERR_OR_NULL(desc)) return false; generic_handle_irq_desc(desc); return true; }

Contributors

PersonTokensPropCommitsCommitProp
jeremy fitzhardingejeremy fitzhardinge3284.21%150.00%
thomas gleixnerthomas gleixner615.79%150.00%
Total38100.00%2100.00%


Overall Contributors

PersonTokensPropCommitsCommitProp
mitsuo hayasakamitsuo hayasaka15154.71%521.74%
eric sandeeneric sandeen4215.22%14.35%
jeremy fitzhardingejeremy fitzhardinge3211.59%14.35%
andi kleenandi kleen145.07%28.70%
thomas gleixnerthomas gleixner62.17%14.35%
ingo molnaringo molnar51.81%28.70%
christoph lameterchristoph lameter41.45%14.35%
ashok rajashok raj31.09%14.35%
jia zhangjia zhang31.09%14.35%
roman zippelroman zippel31.09%14.35%
jaswinder singh rajputjaswinder singh rajput31.09%14.35%
frederic weisbeckerfrederic weisbecker31.09%14.35%
eric w. biedermaneric w. biederman20.72%14.35%
h. peter anvinh. peter anvin20.72%14.35%
andy lutomirskiandy lutomirski10.36%14.35%
brian gerstbrian gerst10.36%14.35%
dave jonesdave jones10.36%14.35%
Total276100.00%23100.00%
Directory: arch/x86/kernel
Information contained on this website is for historical information purposes only and does not indicate or represent copyright ownership.