x86: Prepare removal of previous_esp from i386 thread_info structure
[deliverable/linux.git] / arch / x86 / kernel / irq_32.c
CommitLineData
1da177e4 1/*
1da177e4
LT
2 * Copyright (C) 1992, 1998 Linus Torvalds, Ingo Molnar
3 *
4 * This file contains the lowest level x86-specific interrupt
5 * entry, irq-stacks and irq statistics code. All the remaining
6 * irq logic is done by the generic kernel/irq/ code and
7 * by the x86-specific irq controller code. (e.g. i8259.c and
8 * io_apic.c.)
9 */
10
1da177e4
LT
11#include <linux/module.h>
12#include <linux/seq_file.h>
13#include <linux/interrupt.h>
14#include <linux/kernel_stat.h>
f3705136
ZM
15#include <linux/notifier.h>
16#include <linux/cpu.h>
17#include <linux/delay.h>
72ade5f9 18#include <linux/uaccess.h>
42f8faec 19#include <linux/percpu.h>
5c1eb089 20#include <linux/mm.h>
1da177e4 21
e05d723f 22#include <asm/apic.h>
e05d723f 23
f34e3b61 24DEFINE_PER_CPU_SHARED_ALIGNED(irq_cpustat_t, irq_stat);
1da177e4
LT
25EXPORT_PER_CPU_SYMBOL(irq_stat);
26
7c3576d2
JF
27DEFINE_PER_CPU(struct pt_regs *, irq_regs);
28EXPORT_PER_CPU_SYMBOL(irq_regs);
29
de9b10af 30#ifdef CONFIG_DEBUG_STACKOVERFLOW
53b56502
IM
31
32int sysctl_panic_on_stackoverflow __read_mostly;
33
de9b10af
TG
34/* Debugging check for stack overflow: is there less than 1KB free? */
35static int check_stack_overflow(void)
36{
37 long sp;
38
39 __asm__ __volatile__("andl %%esp,%0" :
40 "=r" (sp) : "0" (THREAD_SIZE - 1));
41
42 return sp < (sizeof(struct thread_info) + STACK_WARN);
43}
44
45static void print_stack_overflow(void)
46{
47 printk(KERN_WARNING "low stack detected by irq handler\n");
48 dump_stack();
55af7796
MH
49 if (sysctl_panic_on_stackoverflow)
50 panic("low stack detected by irq handler - check messages\n");
de9b10af
TG
51}
52
53#else
54static inline int check_stack_overflow(void) { return 0; }
55static inline void print_stack_overflow(void) { }
56#endif
57
1da177e4
LT
58/*
59 * per-CPU IRQ handling contexts (thread information and stack)
60 */
61union irq_ctx {
62 struct thread_info tinfo;
63 u32 stack[THREAD_SIZE/sizeof(u32)];
25897374 64} __attribute__((aligned(THREAD_SIZE)));
1da177e4 65
42f8faec
LJ
66static DEFINE_PER_CPU(union irq_ctx *, hardirq_ctx);
67static DEFINE_PER_CPU(union irq_ctx *, softirq_ctx);
1da177e4 68
403d8efc 69static void call_on_stack(void *func, void *stack)
04b361ab 70{
403d8efc
TG
71 asm volatile("xchgl %%ebx,%%esp \n"
72 "call *%%edi \n"
73 "movl %%ebx,%%esp \n"
74 : "=b" (stack)
75 : "0" (stack),
76 "D"(func)
77 : "memory", "cc", "edx", "ecx", "eax");
04b361ab 78}
1da177e4 79
de9b10af
TG
80static inline int
81execute_on_irq_stack(int overflow, struct irq_desc *desc, int irq)
82{
83 union irq_ctx *curctx, *irqctx;
0788aa6a 84 u32 *isp, *prev_esp, arg1, arg2;
1da177e4
LT
85
86 curctx = (union irq_ctx *) current_thread_info();
0a3aee0d 87 irqctx = __this_cpu_read(hardirq_ctx);
1da177e4
LT
88
89 /*
90 * this is where we switch to the IRQ stack. However, if we are
91 * already using the IRQ stack (because we interrupted a hardirq
92 * handler) we can't do that and just have to keep using the
93 * current stack (which is the irq stack already after all)
94 */
de9b10af
TG
95 if (unlikely(curctx == irqctx))
96 return 0;
1da177e4 97
de9b10af 98 /* build the stack frame on the IRQ stack */
72ade5f9 99 isp = (u32 *) ((char *)irqctx + sizeof(*irqctx));
de9b10af 100 irqctx->tinfo.task = curctx->tinfo.task;
0788aa6a
SR
101 /* Save the next esp after thread_info */
102 prev_esp = (u32 *) ((char *)irqctx + sizeof(struct thread_info) -
103 sizeof(long));
104 *prev_esp = current_stack_pointer;
1da177e4 105
de9b10af 106 if (unlikely(overflow))
403d8efc
TG
107 call_on_stack(print_stack_overflow, isp);
108
109 asm volatile("xchgl %%ebx,%%esp \n"
110 "call *%%edi \n"
111 "movl %%ebx,%%esp \n"
112 : "=a" (arg1), "=d" (arg2), "=b" (isp)
113 : "0" (irq), "1" (desc), "2" (isp),
114 "D" (desc->handle_irq)
115 : "memory", "cc", "ecx");
1da177e4
LT
116 return 1;
117}
118
1da177e4
LT
119/*
120 * allocate per-cpu stacks for hardirq and for softirq processing
121 */
148f9bb8 122void irq_ctx_init(int cpu)
1da177e4
LT
123{
124 union irq_ctx *irqctx;
125
42f8faec 126 if (per_cpu(hardirq_ctx, cpu))
1da177e4
LT
127 return;
128
5c1eb089 129 irqctx = page_address(alloc_pages_node(cpu_to_node(cpu),
38e7c572
TG
130 THREADINFO_GFP,
131 THREAD_SIZE_ORDER));
7b698ea3 132 memset(&irqctx->tinfo, 0, sizeof(struct thread_info));
403d8efc 133 irqctx->tinfo.cpu = cpu;
403d8efc 134 irqctx->tinfo.addr_limit = MAKE_MM_SEG(0);
1da177e4 135
42f8faec 136 per_cpu(hardirq_ctx, cpu) = irqctx;
1da177e4 137
5c1eb089 138 irqctx = page_address(alloc_pages_node(cpu_to_node(cpu),
38e7c572
TG
139 THREADINFO_GFP,
140 THREAD_SIZE_ORDER));
7b698ea3 141 memset(&irqctx->tinfo, 0, sizeof(struct thread_info));
403d8efc 142 irqctx->tinfo.cpu = cpu;
403d8efc 143 irqctx->tinfo.addr_limit = MAKE_MM_SEG(0);
1da177e4 144
42f8faec 145 per_cpu(softirq_ctx, cpu) = irqctx;
1da177e4 146
403d8efc 147 printk(KERN_DEBUG "CPU %u irqstacks, hard=%p soft=%p\n",
42f8faec 148 cpu, per_cpu(hardirq_ctx, cpu), per_cpu(softirq_ctx, cpu));
1da177e4
LT
149}
150
7d65f4a6 151void do_softirq_own_stack(void)
1da177e4 152{
1da177e4
LT
153 struct thread_info *curctx;
154 union irq_ctx *irqctx;
0788aa6a 155 u32 *isp, *prev_esp;
1da177e4 156
7d65f4a6
FW
157 curctx = current_thread_info();
158 irqctx = __this_cpu_read(softirq_ctx);
159 irqctx->tinfo.task = curctx->task;
1da177e4 160
7d65f4a6
FW
161 /* build the stack frame on the softirq stack */
162 isp = (u32 *) ((char *)irqctx + sizeof(*irqctx));
1da177e4 163
0788aa6a
SR
164 /* Push the previous esp onto the stack */
165 prev_esp = (u32 *) ((char *)irqctx + sizeof(struct thread_info) -
166 sizeof(long));
167 *prev_esp = current_stack_pointer;
168
7d65f4a6 169 call_on_stack(__do_softirq, isp);
1da177e4 170}
403d8efc 171
9b2b76a3
JF
172bool handle_irq(unsigned irq, struct pt_regs *regs)
173{
174 struct irq_desc *desc;
175 int overflow;
176
177 overflow = check_stack_overflow();
178
179 desc = irq_to_desc(irq);
180 if (unlikely(!desc))
181 return false;
182
986cb48c 183 if (user_mode_vm(regs) || !execute_on_irq_stack(overflow, desc, irq)) {
9b2b76a3
JF
184 if (unlikely(overflow))
185 print_stack_overflow();
186 desc->handle_irq(irq, desc);
187 }
188
189 return true;
190}
This page took 0.714313 seconds and 5 git commands to generate.