aboutsummaryrefslogtreecommitdiffstats
path: root/security
diff options
context:
space:
mode:
authorMark Rutland <mark.rutland@arm.com>2017-07-31 21:17:03 +0100
committerMark Rutland <mark.rutland@arm.com>2017-08-15 18:35:54 +0100
commitf60fe78f133243e6de0f05fdefc3ed2f3c5085ca (patch)
tree3c507d62a32b88811d2c13bb8d70c5b5a2786001 /security
parentarm64: assembler: allow adr_this_cpu to use the stack pointer (diff)
downloadlinux-dev-f60fe78f133243e6de0f05fdefc3ed2f3c5085ca.tar.xz
linux-dev-f60fe78f133243e6de0f05fdefc3ed2f3c5085ca.zip
arm64: use an irq stack pointer
We allocate our IRQ stacks using a percpu array. This allows us to generate our IRQ stack pointers with adr_this_cpu, but bloats the kernel Image with the boot CPU's IRQ stack. Additionally, these are packed with other percpu variables, and aren't guaranteed to have guard pages. When we enable VMAP_STACK we'll want to vmap our IRQ stacks also, in order to provide guard pages and to permit more stringent alignment requirements. Doing so will require that we use a percpu pointer to each IRQ stack, rather than allocating a percpu IRQ stack in the kernel image. This patch updates our IRQ stack code to use a percpu pointer to the base of each IRQ stack. This will allow us to change the way the stack is allocated with minimal changes elsewhere. In some cases we may try to backtrace before the IRQ stack pointers are initialised, so on_irq_stack() is updated to account for this. In testing with cyclictest, there was no measureable difference between using adr_this_cpu (for irq_stack) and ldr_this_cpu (for irq_stack_ptr) in the IRQ entry path. Signed-off-by: Mark Rutland <mark.rutland@arm.com> Reviewed-by: Will Deacon <will.deacon@arm.com> Tested-by: Laura Abbott <labbott@redhat.com> Cc: Ard Biesheuvel <ard.biesheuvel@linaro.org> Cc: Catalin Marinas <catalin.marinas@arm.com> Cc: James Morse <james.morse@arm.com>
Diffstat (limited to 'security')
0 files changed, 0 insertions, 0 deletions