[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-Id: <cover.1416352397.git.luto@amacapital.net>
Date: Tue, 18 Nov 2014 15:15:16 -0800
From: Andy Lutomirski <luto@...capital.net>
To: Borislav Petkov <bp@...en8.de>, x86@...nel.org,
Linus Torvalds <torvalds@...ux-foundation.org>
Cc: linux-kernel@...r.kernel.org,
Peter Zijlstra <peterz@...radead.org>,
Oleg Nesterov <oleg@...hat.com>,
Tony Luck <tony.luck@...el.com>,
Andi Kleen <andi@...stfloor.org>,
Andy Lutomirski <luto@...capital.net>
Subject: [PATCH v3 0/3] Handle IST interrupts from userspace on the normal stack
We currently run IST interrupt handlers on the IST stack. Changing
it may simplify a few things. See patch 2 for details.
Patch 1 is a fix for a not-quite-bug in uprobes that Oleg noticed
that would be exposed by patch 2.
NB: Tony has seen odd behavior when stress-testing injected
machine checks with this series applied. I suspect that
it's a bug in something else, possibly his BIOS. Bugs in
this series shouldn't be ruled out, though.
Andy Lutomirski (3):
uprobes, x86: Fix _TIF_UPROBE vs _TIF_NOTIFY_RESUME
x86, entry: Switch stacks on a paranoid entry from userspace
sched, x86: Check that we're on the right stack in schedule and
__might_sleep
Documentation/x86/entry_64.txt | 18 ++++---
Documentation/x86/x86_64/kernel-stacks | 8 ++--
arch/x86/Kconfig | 1 +
arch/x86/include/asm/thread_info.h | 19 +++++++-
arch/x86/kernel/entry_64.S | 86 ++++++++++++++++++----------------
arch/x86/kernel/irq_32.c | 13 ++---
arch/x86/kernel/traps.c | 23 ++-------
include/linux/thread_info.h | 7 +++
kernel/Kconfig.locks | 3 ++
kernel/events/uprobes.c | 1 -
kernel/sched/core.c | 14 ++++--
11 files changed, 109 insertions(+), 84 deletions(-)
--
1.9.3
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at http://vger.kernel.org/majordomo-info.html
Please read the FAQ at http://www.tux.org/lkml/
Powered by blists - more mailing lists