cregit-Linux how code gets into the kernel

Release 4.14 arch/x86/kernel/irq_64.c

Directory: arch/x86/kernel
// SPDX-License-Identifier: GPL-2.0
/*
 *      Copyright (C) 1992, 1998 Linus Torvalds, Ingo Molnar
 *
 * This file contains the lowest level x86_64-specific interrupt
 * entry and irq statistics code. All the remaining irq logic is
 * done by the generic kernel/irq/ code and in the
 * x86_64-specific irq controller code. (e.g. i8259.c and
 * io_apic.c.)
 */

#include <linux/kernel_stat.h>
#include <linux/interrupt.h>
#include <linux/seq_file.h>
#include <linux/delay.h>
#include <linux/ftrace.h>
#include <linux/uaccess.h>
#include <linux/smp.h>
#include <linux/sched/task_stack.h>
#include <asm/io_apic.h>
#include <asm/apic.h>


int sysctl_panic_on_stackoverflow;

/*
 * Probabilistic stack overflow check:
 *
 * Only check the stack in process context, because everything else
 * runs on the big interrupt stacks. Checking reliably is too expensive,
 * so we just check from interrupts.
 */

static inline void stack_overflow_check(struct pt_regs *regs) { #ifdef CONFIG_DEBUG_STACKOVERFLOW #define STACK_TOP_MARGIN 128 struct orig_ist *oist; u64 irq_stack_top, irq_stack_bottom; u64 estack_top, estack_bottom; u64 curbase = (u64)task_stack_page(current); if (user_mode(regs)) return; if (regs->sp >= curbase + sizeof(struct pt_regs) + STACK_TOP_MARGIN && regs->sp <= curbase + THREAD_SIZE) return; irq_stack_top = (u64)this_cpu_ptr(irq_stack_union.irq_stack) + STACK_TOP_MARGIN; irq_stack_bottom = (u64)__this_cpu_read(irq_stack_ptr); if (regs->sp >= irq_stack_top && regs->sp <= irq_stack_bottom) return; oist = this_cpu_ptr(&orig_ist); estack_top = (u64)oist->ist[0] - EXCEPTION_STKSZ + STACK_TOP_MARGIN; estack_bottom = (u64)oist->ist[N_EXCEPTION_STACKS - 1]; if (regs->sp >= estack_top && regs->sp <= estack_bottom) return; WARN_ONCE(1, "do_IRQ(): %s has overflown the kernel stack (cur:%Lx,sp:%lx,irq stk top-bottom:%Lx-%Lx,exception stk top-bottom:%Lx-%Lx)\n", current->comm, curbase, regs->sp, irq_stack_top, irq_stack_bottom, estack_top, estack_bottom); if (sysctl_panic_on_stackoverflow) panic("low stack detected by irq handler - check messages\n"); #endif }

Contributors

PersonTokensPropCommitsCommitProp
Mitsuo Hayasaka14871.84%541.67%
Eric Sandeen4119.90%18.33%
Ingo Molnar41.94%18.33%
Christoph Lameter41.94%18.33%
jia zhang31.46%18.33%
Roman Zippel31.46%18.33%
H. Peter Anvin20.97%18.33%
Andrew Lutomirski10.49%18.33%
Total206100.00%12100.00%


bool handle_irq(struct irq_desc *desc, struct pt_regs *regs) { stack_overflow_check(regs); if (IS_ERR_OR_NULL(desc)) return false; generic_handle_irq_desc(desc); return true; }

Contributors

PersonTokensPropCommitsCommitProp
Jeremy Fitzhardinge3284.21%150.00%
Thomas Gleixner615.79%150.00%
Total38100.00%2100.00%


Overall Contributors

PersonTokensPropCommitsCommitProp
Mitsuo Hayasaka15153.93%520.00%
Eric Sandeen4215.00%14.00%
Jeremy Fitzhardinge3211.43%14.00%
Andi Kleen145.00%28.00%
Ingo Molnar82.86%312.00%
Thomas Gleixner62.14%14.00%
Christoph Lameter41.43%14.00%
Ashok Raj31.07%14.00%
Frédéric Weisbecker31.07%14.00%
Roman Zippel31.07%14.00%
Jaswinder Singh Rajput31.07%14.00%
jia zhang31.07%14.00%
Eric W. Biedermann20.71%14.00%
H. Peter Anvin20.71%14.00%
Greg Kroah-Hartman10.36%14.00%
Brian Gerst10.36%14.00%
Andrew Lutomirski10.36%14.00%
Dave Jones10.36%14.00%
Total280100.00%25100.00%
Directory: arch/x86/kernel
Information contained on this website is for historical information purposes only and does not indicate or represent copyright ownership.
Created with cregit.