[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-Id: <20190331214020.836098943@linutronix.de>
Date: Sun, 31 Mar 2019 23:40:20 +0200
From: Thomas Gleixner <tglx@...utronix.de>
To: LKML <linux-kernel@...r.kernel.org>
Cc: x86@...nel.org, Andy Lutomirski <luto@...nel.org>,
Josh Poimboeuf <jpoimboe@...hat.com>
Subject: [patch 00/14] x86/exceptions: Add guard patches to IST stacks
Hi!
While looking for something different I stumbled over the comment in struct
cpu_entry_area:
* Exception stacks used for IST entries.
*
* In the future, this should have a separate slot for each stack
* with guard pages between them.
As usual with such comments they are added in good faith and then
forgotten. Looking what it takes to fix that let me stumble over some other
leftovers like orig_ist[], now unused macros, useless defines and a bunch
of assumptions about the exception stacks being a big lump. Aside of that I
found a too broad check of the exception stack in the x86/64 stack overflow
detector.
The following series cleans that up and gradually prepares for guard pages
between the IST stacks.
Thanks,
tglx
8<-------------------
Documentation/x86/kernel-stacks | 8 ++--
arch/x86/entry/entry_64.S | 4 +-
arch/x86/include/asm/cpu_entry_area.h | 35 ++++++++++++++++---
arch/x86/include/asm/page_32_types.h | 6 ---
arch/x86/include/asm/page_64_types.h | 13 ++++---
arch/x86/include/asm/processor.h | 9 -----
arch/x86/kernel/cpu/common.c | 41 +++-------------------
arch/x86/kernel/dumpstack_64.c | 49 +++++++++++++++++----------
arch/x86/kernel/idt.c | 19 +++++-----
arch/x86/kernel/irq_64.c | 31 ++++++++++++-----
arch/x86/mm/cpu_entry_area.c | 61 +++++++++++++++++++++++-----------
arch/x86/mm/fault.c | 3 +
12 files changed, 159 insertions(+), 120 deletions(-)
Powered by blists - more mailing lists