x86/irq/32: Rename hard/softirq_stack to hard/softirq_stack_ptr
[linux-2.6-block.git] / arch / x86 / kernel / irq_32.c
CommitLineData
b2441318 1// SPDX-License-Identifier: GPL-2.0
1da177e4 2/*
1da177e4
LT
3 * Copyright (C) 1992, 1998 Linus Torvalds, Ingo Molnar
4 *
5 * This file contains the lowest level x86-specific interrupt
6 * entry, irq-stacks and irq statistics code. All the remaining
7 * irq logic is done by the generic kernel/irq/ code and
8 * by the x86-specific irq controller code. (e.g. i8259.c and
9 * io_apic.c.)
10 */
11
1da177e4
LT
12#include <linux/seq_file.h>
13#include <linux/interrupt.h>
447ae316 14#include <linux/irq.h>
1da177e4 15#include <linux/kernel_stat.h>
f3705136
ZM
16#include <linux/notifier.h>
17#include <linux/cpu.h>
18#include <linux/delay.h>
72ade5f9 19#include <linux/uaccess.h>
42f8faec 20#include <linux/percpu.h>
5c1eb089 21#include <linux/mm.h>
1da177e4 22
e05d723f 23#include <asm/apic.h>
7614e913 24#include <asm/nospec-branch.h>
e05d723f 25
de9b10af 26#ifdef CONFIG_DEBUG_STACKOVERFLOW
53b56502
IM
27
28int sysctl_panic_on_stackoverflow __read_mostly;
29
de9b10af
TG
30/* Debugging check for stack overflow: is there less than 1KB free? */
31static int check_stack_overflow(void)
32{
33 long sp;
34
35 __asm__ __volatile__("andl %%esp,%0" :
36 "=r" (sp) : "0" (THREAD_SIZE - 1));
37
38 return sp < (sizeof(struct thread_info) + STACK_WARN);
39}
40
41static void print_stack_overflow(void)
42{
43 printk(KERN_WARNING "low stack detected by irq handler\n");
44 dump_stack();
55af7796
MH
45 if (sysctl_panic_on_stackoverflow)
46 panic("low stack detected by irq handler - check messages\n");
de9b10af
TG
47}
48
49#else
50static inline int check_stack_overflow(void) { return 0; }
51static inline void print_stack_overflow(void) { }
52#endif
53
a754fe2b
TG
54DEFINE_PER_CPU(struct irq_stack *, hardirq_stack_ptr);
55DEFINE_PER_CPU(struct irq_stack *, softirq_stack_ptr);
1da177e4 56
403d8efc 57static void call_on_stack(void *func, void *stack)
04b361ab 58{
403d8efc 59 asm volatile("xchgl %%ebx,%%esp \n"
7614e913 60 CALL_NOSPEC
403d8efc
TG
61 "movl %%ebx,%%esp \n"
62 : "=b" (stack)
63 : "0" (stack),
7614e913 64 [thunk_target] "D"(func)
403d8efc 65 : "memory", "cc", "edx", "ecx", "eax");
04b361ab 66}
1da177e4 67
198d208d
SR
68static inline void *current_stack(void)
69{
196bd485 70 return (void *)(current_stack_pointer & ~(THREAD_SIZE - 1));
198d208d
SR
71}
72
bd0b9ac4 73static inline int execute_on_irq_stack(int overflow, struct irq_desc *desc)
de9b10af 74{
198d208d 75 struct irq_stack *curstk, *irqstk;
bd0b9ac4 76 u32 *isp, *prev_esp, arg1;
1da177e4 77
198d208d 78 curstk = (struct irq_stack *) current_stack();
a754fe2b 79 irqstk = __this_cpu_read(hardirq_stack_ptr);
1da177e4
LT
80
81 /*
82 * this is where we switch to the IRQ stack. However, if we are
83 * already using the IRQ stack (because we interrupted a hardirq
84 * handler) we can't do that and just have to keep using the
85 * current stack (which is the irq stack already after all)
86 */
198d208d 87 if (unlikely(curstk == irqstk))
de9b10af 88 return 0;
1da177e4 89
198d208d
SR
90 isp = (u32 *) ((char *)irqstk + sizeof(*irqstk));
91
92 /* Save the next esp at the bottom of the stack */
93 prev_esp = (u32 *)irqstk;
196bd485 94 *prev_esp = current_stack_pointer;
1da177e4 95
de9b10af 96 if (unlikely(overflow))
403d8efc
TG
97 call_on_stack(print_stack_overflow, isp);
98
99 asm volatile("xchgl %%ebx,%%esp \n"
7614e913 100 CALL_NOSPEC
403d8efc 101 "movl %%ebx,%%esp \n"
bd0b9ac4
TG
102 : "=a" (arg1), "=b" (isp)
103 : "0" (desc), "1" (isp),
7614e913 104 [thunk_target] "D" (desc->handle_irq)
403d8efc 105 : "memory", "cc", "ecx");
1da177e4
LT
106 return 1;
107}
108
1da177e4
LT
109/*
110 * allocate per-cpu stacks for hardirq and for softirq processing
111 */
148f9bb8 112void irq_ctx_init(int cpu)
1da177e4 113{
198d208d 114 struct irq_stack *irqstk;
1da177e4 115
a754fe2b 116 if (per_cpu(hardirq_stack_ptr, cpu))
1da177e4
LT
117 return;
118
198d208d 119 irqstk = page_address(alloc_pages_node(cpu_to_node(cpu),
38e7c572
TG
120 THREADINFO_GFP,
121 THREAD_SIZE_ORDER));
a754fe2b 122 per_cpu(hardirq_stack_ptr, cpu) = irqstk;
1da177e4 123
198d208d 124 irqstk = page_address(alloc_pages_node(cpu_to_node(cpu),
38e7c572
TG
125 THREADINFO_GFP,
126 THREAD_SIZE_ORDER));
a754fe2b 127 per_cpu(softirq_stack_ptr, cpu) = irqstk;
1da177e4 128
a754fe2b
TG
129 pr_debug("CPU %u irqstacks, hard=%p soft=%p\n",
130 cpu, per_cpu(hardirq_stack_ptr, cpu),
131 per_cpu(softirq_stack_ptr, cpu));
1da177e4
LT
132}
133
7d65f4a6 134void do_softirq_own_stack(void)
1da177e4 135{
198d208d 136 struct irq_stack *irqstk;
0788aa6a 137 u32 *isp, *prev_esp;
1da177e4 138
a754fe2b 139 irqstk = __this_cpu_read(softirq_stack_ptr);
1da177e4 140
7d65f4a6 141 /* build the stack frame on the softirq stack */
198d208d 142 isp = (u32 *) ((char *)irqstk + sizeof(*irqstk));
1da177e4 143
0788aa6a 144 /* Push the previous esp onto the stack */
198d208d 145 prev_esp = (u32 *)irqstk;
196bd485 146 *prev_esp = current_stack_pointer;
0788aa6a 147
7d65f4a6 148 call_on_stack(__do_softirq, isp);
1da177e4 149}
403d8efc 150
a782a7e4 151bool handle_irq(struct irq_desc *desc, struct pt_regs *regs)
9b2b76a3 152{
bd0b9ac4 153 int overflow = check_stack_overflow();
9b2b76a3 154
a782a7e4 155 if (IS_ERR_OR_NULL(desc))
9b2b76a3
JF
156 return false;
157
bd0b9ac4 158 if (user_mode(regs) || !execute_on_irq_stack(overflow, desc)) {
9b2b76a3
JF
159 if (unlikely(overflow))
160 print_stack_overflow();
bd0b9ac4 161 generic_handle_irq_desc(desc);
9b2b76a3
JF
162 }
163
164 return true;
165}