xref: /OK3568_Linux_fs/kernel/arch/arm64/include/asm/processor.h (revision 4882a59341e53eb6f0b4789bf948001014eff981)
1*4882a593Smuzhiyun /* SPDX-License-Identifier: GPL-2.0-only */
2*4882a593Smuzhiyun /*
3*4882a593Smuzhiyun  * Based on arch/arm/include/asm/processor.h
4*4882a593Smuzhiyun  *
5*4882a593Smuzhiyun  * Copyright (C) 1995-1999 Russell King
6*4882a593Smuzhiyun  * Copyright (C) 2012 ARM Ltd.
7*4882a593Smuzhiyun  */
8*4882a593Smuzhiyun #ifndef __ASM_PROCESSOR_H
9*4882a593Smuzhiyun #define __ASM_PROCESSOR_H
10*4882a593Smuzhiyun 
11*4882a593Smuzhiyun #define KERNEL_DS		UL(-1)
12*4882a593Smuzhiyun #define USER_DS			((UL(1) << VA_BITS) - 1)
13*4882a593Smuzhiyun 
14*4882a593Smuzhiyun /*
15*4882a593Smuzhiyun  * On arm64 systems, unaligned accesses by the CPU are cheap, and so there is
16*4882a593Smuzhiyun  * no point in shifting all network buffers by 2 bytes just to make some IP
17*4882a593Smuzhiyun  * header fields appear aligned in memory, potentially sacrificing some DMA
18*4882a593Smuzhiyun  * performance on some platforms.
19*4882a593Smuzhiyun  */
20*4882a593Smuzhiyun #define NET_IP_ALIGN	0
21*4882a593Smuzhiyun 
22*4882a593Smuzhiyun #define MTE_CTRL_GCR_USER_EXCL_SHIFT	0
23*4882a593Smuzhiyun #define MTE_CTRL_GCR_USER_EXCL_MASK	0xffff
24*4882a593Smuzhiyun 
25*4882a593Smuzhiyun #define MTE_CTRL_TCF_SYNC		(1UL << 16)
26*4882a593Smuzhiyun #define MTE_CTRL_TCF_ASYNC		(1UL << 17)
27*4882a593Smuzhiyun 
28*4882a593Smuzhiyun #ifndef __ASSEMBLY__
29*4882a593Smuzhiyun 
30*4882a593Smuzhiyun #include <linux/build_bug.h>
31*4882a593Smuzhiyun #include <linux/cache.h>
32*4882a593Smuzhiyun #include <linux/init.h>
33*4882a593Smuzhiyun #include <linux/stddef.h>
34*4882a593Smuzhiyun #include <linux/string.h>
35*4882a593Smuzhiyun #include <linux/thread_info.h>
36*4882a593Smuzhiyun #include <linux/android_vendor.h>
37*4882a593Smuzhiyun 
38*4882a593Smuzhiyun #include <vdso/processor.h>
39*4882a593Smuzhiyun 
40*4882a593Smuzhiyun #include <asm/alternative.h>
41*4882a593Smuzhiyun #include <asm/cpufeature.h>
42*4882a593Smuzhiyun #include <asm/hw_breakpoint.h>
43*4882a593Smuzhiyun #include <asm/kasan.h>
44*4882a593Smuzhiyun #include <asm/lse.h>
45*4882a593Smuzhiyun #include <asm/pgtable-hwdef.h>
46*4882a593Smuzhiyun #include <asm/pointer_auth.h>
47*4882a593Smuzhiyun #include <asm/ptrace.h>
48*4882a593Smuzhiyun #include <asm/spectre.h>
49*4882a593Smuzhiyun #include <asm/types.h>
50*4882a593Smuzhiyun 
51*4882a593Smuzhiyun /*
52*4882a593Smuzhiyun  * TASK_SIZE - the maximum size of a user space task.
53*4882a593Smuzhiyun  * TASK_UNMAPPED_BASE - the lower boundary of the mmap VM area.
54*4882a593Smuzhiyun  */
55*4882a593Smuzhiyun 
56*4882a593Smuzhiyun #define DEFAULT_MAP_WINDOW_64	(UL(1) << VA_BITS_MIN)
57*4882a593Smuzhiyun #define TASK_SIZE_64		(UL(1) << vabits_actual)
58*4882a593Smuzhiyun 
59*4882a593Smuzhiyun #ifdef CONFIG_COMPAT
60*4882a593Smuzhiyun #if defined(CONFIG_ARM64_64K_PAGES) && defined(CONFIG_KUSER_HELPERS)
61*4882a593Smuzhiyun /*
62*4882a593Smuzhiyun  * With CONFIG_ARM64_64K_PAGES enabled, the last page is occupied
63*4882a593Smuzhiyun  * by the compat vectors page.
64*4882a593Smuzhiyun  */
65*4882a593Smuzhiyun #define TASK_SIZE_32		UL(0x100000000)
66*4882a593Smuzhiyun #else
67*4882a593Smuzhiyun #define TASK_SIZE_32		(UL(0x100000000) - PAGE_SIZE)
68*4882a593Smuzhiyun #endif /* CONFIG_ARM64_64K_PAGES */
69*4882a593Smuzhiyun #define TASK_SIZE		(test_thread_flag(TIF_32BIT) ? \
70*4882a593Smuzhiyun 				TASK_SIZE_32 : TASK_SIZE_64)
71*4882a593Smuzhiyun #define TASK_SIZE_OF(tsk)	(test_tsk_thread_flag(tsk, TIF_32BIT) ? \
72*4882a593Smuzhiyun 				TASK_SIZE_32 : TASK_SIZE_64)
73*4882a593Smuzhiyun #define DEFAULT_MAP_WINDOW	(test_thread_flag(TIF_32BIT) ? \
74*4882a593Smuzhiyun 				TASK_SIZE_32 : DEFAULT_MAP_WINDOW_64)
75*4882a593Smuzhiyun #else
76*4882a593Smuzhiyun #define TASK_SIZE		TASK_SIZE_64
77*4882a593Smuzhiyun #define DEFAULT_MAP_WINDOW	DEFAULT_MAP_WINDOW_64
78*4882a593Smuzhiyun #endif /* CONFIG_COMPAT */
79*4882a593Smuzhiyun 
80*4882a593Smuzhiyun #ifdef CONFIG_ARM64_FORCE_52BIT
81*4882a593Smuzhiyun #define STACK_TOP_MAX		TASK_SIZE_64
82*4882a593Smuzhiyun #define TASK_UNMAPPED_BASE	(PAGE_ALIGN(TASK_SIZE / 4))
83*4882a593Smuzhiyun #else
84*4882a593Smuzhiyun #define STACK_TOP_MAX		DEFAULT_MAP_WINDOW_64
85*4882a593Smuzhiyun #define TASK_UNMAPPED_BASE	(PAGE_ALIGN(DEFAULT_MAP_WINDOW / 4))
86*4882a593Smuzhiyun #endif /* CONFIG_ARM64_FORCE_52BIT */
87*4882a593Smuzhiyun 
88*4882a593Smuzhiyun #ifdef CONFIG_COMPAT
89*4882a593Smuzhiyun #define AARCH32_VECTORS_BASE	0xffff0000
90*4882a593Smuzhiyun #define STACK_TOP		(test_thread_flag(TIF_32BIT) ? \
91*4882a593Smuzhiyun 				AARCH32_VECTORS_BASE : STACK_TOP_MAX)
92*4882a593Smuzhiyun #else
93*4882a593Smuzhiyun #define STACK_TOP		STACK_TOP_MAX
94*4882a593Smuzhiyun #endif /* CONFIG_COMPAT */
95*4882a593Smuzhiyun 
96*4882a593Smuzhiyun #ifndef CONFIG_ARM64_FORCE_52BIT
97*4882a593Smuzhiyun #define arch_get_mmap_end(addr) ((addr > DEFAULT_MAP_WINDOW) ? TASK_SIZE :\
98*4882a593Smuzhiyun 				DEFAULT_MAP_WINDOW)
99*4882a593Smuzhiyun 
100*4882a593Smuzhiyun #define arch_get_mmap_base(addr, base) ((addr > DEFAULT_MAP_WINDOW) ? \
101*4882a593Smuzhiyun 					base + TASK_SIZE - DEFAULT_MAP_WINDOW :\
102*4882a593Smuzhiyun 					base)
103*4882a593Smuzhiyun #endif /* CONFIG_ARM64_FORCE_52BIT */
104*4882a593Smuzhiyun 
105*4882a593Smuzhiyun extern phys_addr_t arm64_dma_phys_limit;
106*4882a593Smuzhiyun #define ARCH_LOW_ADDRESS_LIMIT	(arm64_dma_phys_limit - 1)
107*4882a593Smuzhiyun 
108*4882a593Smuzhiyun struct debug_info {
109*4882a593Smuzhiyun #ifdef CONFIG_HAVE_HW_BREAKPOINT
110*4882a593Smuzhiyun 	/* Have we suspended stepping by a debugger? */
111*4882a593Smuzhiyun 	int			suspended_step;
112*4882a593Smuzhiyun 	/* Allow breakpoints and watchpoints to be disabled for this thread. */
113*4882a593Smuzhiyun 	int			bps_disabled;
114*4882a593Smuzhiyun 	int			wps_disabled;
115*4882a593Smuzhiyun 	/* Hardware breakpoints pinned to this task. */
116*4882a593Smuzhiyun 	struct perf_event	*hbp_break[ARM_MAX_BRP];
117*4882a593Smuzhiyun 	struct perf_event	*hbp_watch[ARM_MAX_WRP];
118*4882a593Smuzhiyun #endif
119*4882a593Smuzhiyun };
120*4882a593Smuzhiyun 
121*4882a593Smuzhiyun struct cpu_context {
122*4882a593Smuzhiyun 	unsigned long x19;
123*4882a593Smuzhiyun 	unsigned long x20;
124*4882a593Smuzhiyun 	unsigned long x21;
125*4882a593Smuzhiyun 	unsigned long x22;
126*4882a593Smuzhiyun 	unsigned long x23;
127*4882a593Smuzhiyun 	unsigned long x24;
128*4882a593Smuzhiyun 	unsigned long x25;
129*4882a593Smuzhiyun 	unsigned long x26;
130*4882a593Smuzhiyun 	unsigned long x27;
131*4882a593Smuzhiyun 	unsigned long x28;
132*4882a593Smuzhiyun 	unsigned long fp;
133*4882a593Smuzhiyun 	unsigned long sp;
134*4882a593Smuzhiyun 	unsigned long pc;
135*4882a593Smuzhiyun };
136*4882a593Smuzhiyun 
137*4882a593Smuzhiyun struct thread_struct {
138*4882a593Smuzhiyun 	struct cpu_context	cpu_context;	/* cpu context */
139*4882a593Smuzhiyun 
140*4882a593Smuzhiyun 	/*
141*4882a593Smuzhiyun 	 * Whitelisted fields for hardened usercopy:
142*4882a593Smuzhiyun 	 * Maintainers must ensure manually that this contains no
143*4882a593Smuzhiyun 	 * implicit padding.
144*4882a593Smuzhiyun 	 */
145*4882a593Smuzhiyun 	struct {
146*4882a593Smuzhiyun 		unsigned long	tp_value;	/* TLS register */
147*4882a593Smuzhiyun 		unsigned long	tp2_value;
148*4882a593Smuzhiyun 		struct user_fpsimd_state fpsimd_state;
149*4882a593Smuzhiyun 	} uw;
150*4882a593Smuzhiyun 
151*4882a593Smuzhiyun 	ANDROID_VENDOR_DATA(1);
152*4882a593Smuzhiyun 
153*4882a593Smuzhiyun 	unsigned int		fpsimd_cpu;
154*4882a593Smuzhiyun 	void			*sve_state;	/* SVE registers, if any */
155*4882a593Smuzhiyun 	unsigned int		sve_vl;		/* SVE vector length */
156*4882a593Smuzhiyun 	unsigned int		sve_vl_onexec;	/* SVE vl after next exec */
157*4882a593Smuzhiyun 	unsigned long		fault_address;	/* fault info */
158*4882a593Smuzhiyun 	unsigned long		fault_code;	/* ESR_EL1 value */
159*4882a593Smuzhiyun 	struct debug_info	debug;		/* debugging */
160*4882a593Smuzhiyun #ifdef CONFIG_ARM64_PTR_AUTH
161*4882a593Smuzhiyun 	struct ptrauth_keys_user	keys_user;
162*4882a593Smuzhiyun 	struct ptrauth_keys_kernel	keys_kernel;
163*4882a593Smuzhiyun #endif
164*4882a593Smuzhiyun #ifdef CONFIG_ARM64_MTE
165*4882a593Smuzhiyun 	u64			mte_ctrl;
166*4882a593Smuzhiyun #endif
167*4882a593Smuzhiyun 	u64			sctlr_user;
168*4882a593Smuzhiyun };
169*4882a593Smuzhiyun 
170*4882a593Smuzhiyun #define SCTLR_USER_MASK                                                        \
171*4882a593Smuzhiyun 	(SCTLR_ELx_ENIA | SCTLR_ELx_ENIB | SCTLR_ELx_ENDA | SCTLR_ELx_ENDB |   \
172*4882a593Smuzhiyun 	 SCTLR_EL1_TCF0_MASK)
173*4882a593Smuzhiyun 
arch_thread_struct_whitelist(unsigned long * offset,unsigned long * size)174*4882a593Smuzhiyun static inline void arch_thread_struct_whitelist(unsigned long *offset,
175*4882a593Smuzhiyun 						unsigned long *size)
176*4882a593Smuzhiyun {
177*4882a593Smuzhiyun 	/* Verify that there is no padding among the whitelisted fields: */
178*4882a593Smuzhiyun 	BUILD_BUG_ON(sizeof_field(struct thread_struct, uw) !=
179*4882a593Smuzhiyun 		     sizeof_field(struct thread_struct, uw.tp_value) +
180*4882a593Smuzhiyun 		     sizeof_field(struct thread_struct, uw.tp2_value) +
181*4882a593Smuzhiyun 		     sizeof_field(struct thread_struct, uw.fpsimd_state));
182*4882a593Smuzhiyun 
183*4882a593Smuzhiyun 	*offset = offsetof(struct thread_struct, uw);
184*4882a593Smuzhiyun 	*size = sizeof_field(struct thread_struct, uw);
185*4882a593Smuzhiyun }
186*4882a593Smuzhiyun 
187*4882a593Smuzhiyun #ifdef CONFIG_COMPAT
188*4882a593Smuzhiyun #define task_user_tls(t)						\
189*4882a593Smuzhiyun ({									\
190*4882a593Smuzhiyun 	unsigned long *__tls;						\
191*4882a593Smuzhiyun 	if (is_compat_thread(task_thread_info(t)))			\
192*4882a593Smuzhiyun 		__tls = &(t)->thread.uw.tp2_value;			\
193*4882a593Smuzhiyun 	else								\
194*4882a593Smuzhiyun 		__tls = &(t)->thread.uw.tp_value;			\
195*4882a593Smuzhiyun 	__tls;								\
196*4882a593Smuzhiyun  })
197*4882a593Smuzhiyun #else
198*4882a593Smuzhiyun #define task_user_tls(t)	(&(t)->thread.uw.tp_value)
199*4882a593Smuzhiyun #endif
200*4882a593Smuzhiyun 
201*4882a593Smuzhiyun /* Sync TPIDR_EL0 back to thread_struct for current */
202*4882a593Smuzhiyun void tls_preserve_current_state(void);
203*4882a593Smuzhiyun 
204*4882a593Smuzhiyun #define INIT_THREAD {				\
205*4882a593Smuzhiyun 	.fpsimd_cpu = NR_CPUS,			\
206*4882a593Smuzhiyun }
207*4882a593Smuzhiyun 
start_thread_common(struct pt_regs * regs,unsigned long pc)208*4882a593Smuzhiyun static inline void start_thread_common(struct pt_regs *regs, unsigned long pc)
209*4882a593Smuzhiyun {
210*4882a593Smuzhiyun 	s32 previous_syscall = regs->syscallno;
211*4882a593Smuzhiyun 	memset(regs, 0, sizeof(*regs));
212*4882a593Smuzhiyun 	regs->syscallno = previous_syscall;
213*4882a593Smuzhiyun 	regs->pc = pc;
214*4882a593Smuzhiyun 
215*4882a593Smuzhiyun 	if (system_uses_irq_prio_masking())
216*4882a593Smuzhiyun 		regs->pmr_save = GIC_PRIO_IRQON;
217*4882a593Smuzhiyun }
218*4882a593Smuzhiyun 
start_thread(struct pt_regs * regs,unsigned long pc,unsigned long sp)219*4882a593Smuzhiyun static inline void start_thread(struct pt_regs *regs, unsigned long pc,
220*4882a593Smuzhiyun 				unsigned long sp)
221*4882a593Smuzhiyun {
222*4882a593Smuzhiyun 	start_thread_common(regs, pc);
223*4882a593Smuzhiyun 	regs->pstate = PSR_MODE_EL0t;
224*4882a593Smuzhiyun 	spectre_v4_enable_task_mitigation(current);
225*4882a593Smuzhiyun 	regs->sp = sp;
226*4882a593Smuzhiyun }
227*4882a593Smuzhiyun 
228*4882a593Smuzhiyun #ifdef CONFIG_COMPAT
compat_start_thread(struct pt_regs * regs,unsigned long pc,unsigned long sp)229*4882a593Smuzhiyun static inline void compat_start_thread(struct pt_regs *regs, unsigned long pc,
230*4882a593Smuzhiyun 				       unsigned long sp)
231*4882a593Smuzhiyun {
232*4882a593Smuzhiyun 	start_thread_common(regs, pc);
233*4882a593Smuzhiyun 	regs->pstate = PSR_AA32_MODE_USR;
234*4882a593Smuzhiyun 	if (pc & 1)
235*4882a593Smuzhiyun 		regs->pstate |= PSR_AA32_T_BIT;
236*4882a593Smuzhiyun 
237*4882a593Smuzhiyun #ifdef __AARCH64EB__
238*4882a593Smuzhiyun 	regs->pstate |= PSR_AA32_E_BIT;
239*4882a593Smuzhiyun #endif
240*4882a593Smuzhiyun 
241*4882a593Smuzhiyun 	spectre_v4_enable_task_mitigation(current);
242*4882a593Smuzhiyun 	regs->compat_sp = sp;
243*4882a593Smuzhiyun }
244*4882a593Smuzhiyun #endif
245*4882a593Smuzhiyun 
is_ttbr0_addr(unsigned long addr)246*4882a593Smuzhiyun static inline bool is_ttbr0_addr(unsigned long addr)
247*4882a593Smuzhiyun {
248*4882a593Smuzhiyun 	/* entry assembly clears tags for TTBR0 addrs */
249*4882a593Smuzhiyun 	return addr < TASK_SIZE;
250*4882a593Smuzhiyun }
251*4882a593Smuzhiyun 
is_ttbr1_addr(unsigned long addr)252*4882a593Smuzhiyun static inline bool is_ttbr1_addr(unsigned long addr)
253*4882a593Smuzhiyun {
254*4882a593Smuzhiyun 	/* TTBR1 addresses may have a tag if KASAN_SW_TAGS is in use */
255*4882a593Smuzhiyun 	return arch_kasan_reset_tag(addr) >= PAGE_OFFSET;
256*4882a593Smuzhiyun }
257*4882a593Smuzhiyun 
258*4882a593Smuzhiyun /* Forward declaration, a strange C thing */
259*4882a593Smuzhiyun struct task_struct;
260*4882a593Smuzhiyun 
261*4882a593Smuzhiyun /* Free all resources held by a thread. */
262*4882a593Smuzhiyun extern void release_thread(struct task_struct *);
263*4882a593Smuzhiyun 
264*4882a593Smuzhiyun unsigned long get_wchan(struct task_struct *p);
265*4882a593Smuzhiyun 
266*4882a593Smuzhiyun void update_sctlr_el1(u64 sctlr);
267*4882a593Smuzhiyun 
268*4882a593Smuzhiyun /* Thread switching */
269*4882a593Smuzhiyun extern struct task_struct *cpu_switch_to(struct task_struct *prev,
270*4882a593Smuzhiyun 					 struct task_struct *next);
271*4882a593Smuzhiyun 
272*4882a593Smuzhiyun #define task_pt_regs(p) \
273*4882a593Smuzhiyun 	((struct pt_regs *)(THREAD_SIZE + task_stack_page(p)) - 1)
274*4882a593Smuzhiyun 
275*4882a593Smuzhiyun #define KSTK_EIP(tsk)	((unsigned long)task_pt_regs(tsk)->pc)
276*4882a593Smuzhiyun #define KSTK_ESP(tsk)	user_stack_pointer(task_pt_regs(tsk))
277*4882a593Smuzhiyun 
278*4882a593Smuzhiyun /*
279*4882a593Smuzhiyun  * Prefetching support
280*4882a593Smuzhiyun  */
281*4882a593Smuzhiyun #define ARCH_HAS_PREFETCH
prefetch(const void * ptr)282*4882a593Smuzhiyun static inline void prefetch(const void *ptr)
283*4882a593Smuzhiyun {
284*4882a593Smuzhiyun 	asm volatile("prfm pldl1keep, %a0\n" : : "p" (ptr));
285*4882a593Smuzhiyun }
286*4882a593Smuzhiyun 
287*4882a593Smuzhiyun #define ARCH_HAS_PREFETCHW
prefetchw(const void * ptr)288*4882a593Smuzhiyun static inline void prefetchw(const void *ptr)
289*4882a593Smuzhiyun {
290*4882a593Smuzhiyun 	asm volatile("prfm pstl1keep, %a0\n" : : "p" (ptr));
291*4882a593Smuzhiyun }
292*4882a593Smuzhiyun 
293*4882a593Smuzhiyun #define ARCH_HAS_SPINLOCK_PREFETCH
spin_lock_prefetch(const void * ptr)294*4882a593Smuzhiyun static inline void spin_lock_prefetch(const void *ptr)
295*4882a593Smuzhiyun {
296*4882a593Smuzhiyun 	asm volatile(ARM64_LSE_ATOMIC_INSN(
297*4882a593Smuzhiyun 		     "prfm pstl1strm, %a0",
298*4882a593Smuzhiyun 		     "nop") : : "p" (ptr));
299*4882a593Smuzhiyun }
300*4882a593Smuzhiyun 
301*4882a593Smuzhiyun extern unsigned long __ro_after_init signal_minsigstksz; /* sigframe size */
302*4882a593Smuzhiyun extern void __init minsigstksz_setup(void);
303*4882a593Smuzhiyun 
304*4882a593Smuzhiyun /*
305*4882a593Smuzhiyun  * Not at the top of the file due to a direct #include cycle between
306*4882a593Smuzhiyun  * <asm/fpsimd.h> and <asm/processor.h>.  Deferring this #include
307*4882a593Smuzhiyun  * ensures that contents of processor.h are visible to fpsimd.h even if
308*4882a593Smuzhiyun  * processor.h is included first.
309*4882a593Smuzhiyun  *
310*4882a593Smuzhiyun  * These prctl helpers are the only things in this file that require
311*4882a593Smuzhiyun  * fpsimd.h.  The core code expects them to be in this header.
312*4882a593Smuzhiyun  */
313*4882a593Smuzhiyun #include <asm/fpsimd.h>
314*4882a593Smuzhiyun 
315*4882a593Smuzhiyun /* Userspace interface for PR_SVE_{SET,GET}_VL prctl()s: */
316*4882a593Smuzhiyun #define SVE_SET_VL(arg)	sve_set_current_vl(arg)
317*4882a593Smuzhiyun #define SVE_GET_VL()	sve_get_current_vl()
318*4882a593Smuzhiyun 
319*4882a593Smuzhiyun /* PR_PAC_RESET_KEYS prctl */
320*4882a593Smuzhiyun #define PAC_RESET_KEYS(tsk, arg)	ptrauth_prctl_reset_keys(tsk, arg)
321*4882a593Smuzhiyun 
322*4882a593Smuzhiyun /* PR_PAC_{SET,GET}_ENABLED_KEYS prctl */
323*4882a593Smuzhiyun #define PAC_SET_ENABLED_KEYS(tsk, keys, enabled)				\
324*4882a593Smuzhiyun 	ptrauth_set_enabled_keys(tsk, keys, enabled)
325*4882a593Smuzhiyun #define PAC_GET_ENABLED_KEYS(tsk) ptrauth_get_enabled_keys(tsk)
326*4882a593Smuzhiyun 
327*4882a593Smuzhiyun #ifdef CONFIG_ARM64_TAGGED_ADDR_ABI
328*4882a593Smuzhiyun /* PR_{SET,GET}_TAGGED_ADDR_CTRL prctl */
329*4882a593Smuzhiyun long set_tagged_addr_ctrl(struct task_struct *task, unsigned long arg);
330*4882a593Smuzhiyun long get_tagged_addr_ctrl(struct task_struct *task);
331*4882a593Smuzhiyun #define SET_TAGGED_ADDR_CTRL(arg)	set_tagged_addr_ctrl(current, arg)
332*4882a593Smuzhiyun #define GET_TAGGED_ADDR_CTRL()		get_tagged_addr_ctrl(current)
333*4882a593Smuzhiyun #endif
334*4882a593Smuzhiyun 
335*4882a593Smuzhiyun /*
336*4882a593Smuzhiyun  * For CONFIG_GCC_PLUGIN_STACKLEAK
337*4882a593Smuzhiyun  *
338*4882a593Smuzhiyun  * These need to be macros because otherwise we get stuck in a nightmare
339*4882a593Smuzhiyun  * of header definitions for the use of task_stack_page.
340*4882a593Smuzhiyun  */
341*4882a593Smuzhiyun 
342*4882a593Smuzhiyun #define current_top_of_stack()							\
343*4882a593Smuzhiyun ({										\
344*4882a593Smuzhiyun 	struct stack_info _info;						\
345*4882a593Smuzhiyun 	BUG_ON(!on_accessible_stack(current, current_stack_pointer, &_info));	\
346*4882a593Smuzhiyun 	_info.high;								\
347*4882a593Smuzhiyun })
348*4882a593Smuzhiyun #define on_thread_stack()	(on_task_stack(current, current_stack_pointer, NULL))
349*4882a593Smuzhiyun 
350*4882a593Smuzhiyun #endif /* __ASSEMBLY__ */
351*4882a593Smuzhiyun #endif /* __ASM_PROCESSOR_H */
352