[PATCH v3 0/3] Handle IST interrupts from userspace on the normal stack

From: Andy Lutomirski
Date: Tue Nov 18 2014 - 18:15:30 EST


We currently run IST interrupt handlers on the IST stack. Changing
it may simplify a few things. See patch 2 for details.

Patch 1 is a fix for a not-quite-bug in uprobes that Oleg noticed
that would be exposed by patch 2.

NB: Tony has seen odd behavior when stress-testing injected
machine checks with this series applied. I suspect that
it's a bug in something else, possibly his BIOS. Bugs in
this series shouldn't be ruled out, though.

Andy Lutomirski (3):
uprobes, x86: Fix _TIF_UPROBE vs _TIF_NOTIFY_RESUME
x86, entry: Switch stacks on a paranoid entry from userspace
sched, x86: Check that we're on the right stack in schedule and
__might_sleep

Documentation/x86/entry_64.txt | 18 ++++---
Documentation/x86/x86_64/kernel-stacks | 8 ++--
arch/x86/Kconfig | 1 +
arch/x86/include/asm/thread_info.h | 19 +++++++-
arch/x86/kernel/entry_64.S | 86 ++++++++++++++++++----------------
arch/x86/kernel/irq_32.c | 13 ++---
arch/x86/kernel/traps.c | 23 ++-------
include/linux/thread_info.h | 7 +++
kernel/Kconfig.locks | 3 ++
kernel/events/uprobes.c | 1 -
kernel/sched/core.c | 14 ++++--
11 files changed, 109 insertions(+), 84 deletions(-)

--
1.9.3

--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@xxxxxxxxxxxxxxx
More majordomo info at http://vger.kernel.org/majordomo-info.html
Please read the FAQ at http://www.tux.org/lkml/