Merge tag 'probes-fixes-v6.16-rc6' of git://git.kernel.org/pub/scm/linux/kernel/git...
[linux-2.6-block.git] / arch / arm64 / include / asm / processor.h
CommitLineData
caab277b 1/* SPDX-License-Identifier: GPL-2.0-only */
9cce7a43
CM
2/*
3 * Based on arch/arm/include/asm/processor.h
4 *
5 * Copyright (C) 1995-1999 Russell King
6 * Copyright (C) 2012 ARM Ltd.
9cce7a43
CM
7 */
8#ifndef __ASM_PROCESSOR_H
9#define __ASM_PROCESSOR_H
10
26a4676f
AB
11/*
12 * On arm64 systems, unaligned accesses by the CPU are cheap, and so there is
13 * no point in shifting all network buffers by 2 bytes just to make some IP
14 * header fields appear aligned in memory, potentially sacrificing some DMA
15 * performance on some platforms.
16 */
17#define NET_IP_ALIGN 0
18
638982a0
PC
19#define MTE_CTRL_GCR_USER_EXCL_SHIFT 0
20#define MTE_CTRL_GCR_USER_EXCL_MASK 0xffff
21
433c38f4
PC
22#define MTE_CTRL_TCF_SYNC (1UL << 16)
23#define MTE_CTRL_TCF_ASYNC (1UL << 17)
766121ba 24#define MTE_CTRL_TCF_ASYMM (1UL << 18)
433c38f4 25
eef94a3d 26#ifndef __ASSEMBLY__
9cce7a43 27
65896545 28#include <linux/build_bug.h>
94b07c1f
DM
29#include <linux/cache.h>
30#include <linux/init.h>
65896545 31#include <linux/stddef.h>
9cce7a43 32#include <linux/string.h>
bfe29874 33#include <linux/thread_info.h>
9cce7a43 34
f511e079
VF
35#include <vdso/processor.h>
36
cd5e10bd 37#include <asm/alternative.h>
c0cda3b8 38#include <asm/cpufeature.h>
9cce7a43 39#include <asm/hw_breakpoint.h>
bfe29874 40#include <asm/kasan.h>
afb83cc3 41#include <asm/lse.h>
2ec4560b 42#include <asm/pgtable-hwdef.h>
ba830885 43#include <asm/pointer_auth.h>
9cce7a43 44#include <asm/ptrace.h>
d4647f0a 45#include <asm/spectre.h>
9cce7a43
CM
46#include <asm/types.h>
47
eef94a3d
YN
48/*
49 * TASK_SIZE - the maximum size of a user space task.
50 * TASK_UNMAPPED_BASE - the lower boundary of the mmap VM area.
51 */
363524d2 52
90ec95cd 53#define DEFAULT_MAP_WINDOW_64 (UL(1) << VA_BITS_MIN)
2c624fe6 54#define TASK_SIZE_64 (UL(1) << vabits_actual)
3d2403fd 55#define TASK_SIZE_MAX (UL(1) << VA_BITS)
67e7fdfc 56
eef94a3d 57#ifdef CONFIG_COMPAT
359db57c 58#if defined(CONFIG_ARM64_64K_PAGES) && defined(CONFIG_KUSER_HELPERS)
d2631193
VF
59/*
60 * With CONFIG_ARM64_64K_PAGES enabled, the last page is occupied
61 * by the compat vectors page.
62 */
eef94a3d 63#define TASK_SIZE_32 UL(0x100000000)
d2631193
VF
64#else
65#define TASK_SIZE_32 (UL(0x100000000) - PAGE_SIZE)
66#endif /* CONFIG_ARM64_64K_PAGES */
eef94a3d
YN
67#define TASK_SIZE (test_thread_flag(TIF_32BIT) ? \
68 TASK_SIZE_32 : TASK_SIZE_64)
69#define TASK_SIZE_OF(tsk) (test_tsk_thread_flag(tsk, TIF_32BIT) ? \
70 TASK_SIZE_32 : TASK_SIZE_64)
363524d2
SC
71#define DEFAULT_MAP_WINDOW (test_thread_flag(TIF_32BIT) ? \
72 TASK_SIZE_32 : DEFAULT_MAP_WINDOW_64)
eef94a3d
YN
73#else
74#define TASK_SIZE TASK_SIZE_64
363524d2 75#define DEFAULT_MAP_WINDOW DEFAULT_MAP_WINDOW_64
eef94a3d
YN
76#endif /* CONFIG_COMPAT */
77
b9567720
SC
78#ifdef CONFIG_ARM64_FORCE_52BIT
79#define STACK_TOP_MAX TASK_SIZE_64
80#define TASK_UNMAPPED_BASE (PAGE_ALIGN(TASK_SIZE / 4))
81#else
363524d2 82#define STACK_TOP_MAX DEFAULT_MAP_WINDOW_64
b9567720
SC
83#define TASK_UNMAPPED_BASE (PAGE_ALIGN(DEFAULT_MAP_WINDOW / 4))
84#endif /* CONFIG_ARM64_FORCE_52BIT */
eef94a3d 85
9cce7a43
CM
86#ifdef CONFIG_COMPAT
87#define AARCH32_VECTORS_BASE 0xffff0000
88#define STACK_TOP (test_thread_flag(TIF_32BIT) ? \
89 AARCH32_VECTORS_BASE : STACK_TOP_MAX)
90#else
91#define STACK_TOP STACK_TOP_MAX
92#endif /* CONFIG_COMPAT */
f483a853 93
b9567720 94#ifndef CONFIG_ARM64_FORCE_52BIT
2cb4de08
CL
95#define arch_get_mmap_end(addr, len, flags) \
96 (((addr) > DEFAULT_MAP_WINDOW) ? TASK_SIZE : DEFAULT_MAP_WINDOW)
e5d99157
SC
97
98#define arch_get_mmap_base(addr, base) ((addr > DEFAULT_MAP_WINDOW) ? \
99 base + TASK_SIZE - DEFAULT_MAP_WINDOW :\
100 base)
b9567720 101#endif /* CONFIG_ARM64_FORCE_52BIT */
e5d99157 102
a1e50a82 103extern phys_addr_t arm64_dma_phys_limit;
d78050ee 104#define ARCH_LOW_ADDRESS_LIMIT (arm64_dma_phys_limit - 1)
9cce7a43
CM
105
106struct debug_info {
fda89d9e 107#ifdef CONFIG_HAVE_HW_BREAKPOINT
9cce7a43
CM
108 /* Have we suspended stepping by a debugger? */
109 int suspended_step;
110 /* Allow breakpoints and watchpoints to be disabled for this thread. */
111 int bps_disabled;
112 int wps_disabled;
113 /* Hardware breakpoints pinned to this task. */
114 struct perf_event *hbp_break[ARM_MAX_BRP];
115 struct perf_event *hbp_watch[ARM_MAX_WRP];
fda89d9e 116#endif
9cce7a43
CM
117};
118
b5bc00ff
MB
119enum vec_type {
120 ARM64_VEC_SVE = 0,
b42990d3 121 ARM64_VEC_SME,
b5bc00ff
MB
122 ARM64_VEC_MAX,
123};
124
baa85152 125enum fp_type {
deeb8f9a 126 FP_STATE_CURRENT, /* Save based on current task state. */
baa85152
MB
127 FP_STATE_FPSIMD,
128 FP_STATE_SVE,
129};
130
9cce7a43
CM
131struct cpu_context {
132 unsigned long x19;
133 unsigned long x20;
134 unsigned long x21;
135 unsigned long x22;
136 unsigned long x23;
137 unsigned long x24;
138 unsigned long x25;
139 unsigned long x26;
140 unsigned long x27;
141 unsigned long x28;
142 unsigned long fp;
143 unsigned long sp;
144 unsigned long pc;
145};
146
147struct thread_struct {
148 struct cpu_context cpu_context; /* cpu context */
65896545
DM
149
150 /*
151 * Whitelisted fields for hardened usercopy:
152 * Maintainers must ensure manually that this contains no
153 * implicit padding.
154 */
155 struct {
156 unsigned long tp_value; /* TLS register */
157 unsigned long tp2_value;
203f2b95
MB
158 u64 fpmr;
159 unsigned long pad;
65896545
DM
160 struct user_fpsimd_state fpsimd_state;
161 } uw;
162
baa85152 163 enum fp_type fp_type; /* registers FPSIMD or SVE? */
20b85472 164 unsigned int fpsimd_cpu;
bc0ee476 165 void *sve_state; /* SVE registers, if any */
ce514000 166 void *sme_state; /* ZA and ZT state, if any */
5838a155
MB
167 unsigned int vl[ARM64_VEC_MAX]; /* vector length */
168 unsigned int vl_onexec[ARM64_VEC_MAX]; /* vl after next exec */
9cce7a43 169 unsigned long fault_address; /* fault info */
9141300a 170 unsigned long fault_code; /* ESR_EL1 value */
9cce7a43 171 struct debug_info debug; /* debugging */
aefbab8e
AB
172
173 struct user_fpsimd_state kernel_fpsimd_state;
2632e252 174 unsigned int kernel_fpsimd_cpu;
84931327 175#ifdef CONFIG_ARM64_PTR_AUTH
91a1b6cc 176 struct ptrauth_keys_user keys_user;
d053e71a 177#ifdef CONFIG_ARM64_PTR_AUTH_KERNEL
33e45234 178 struct ptrauth_keys_kernel keys_kernel;
84931327 179#endif
d053e71a 180#endif
1c101da8 181#ifdef CONFIG_ARM64_MTE
638982a0 182 u64 mte_ctrl;
1c101da8 183#endif
2f79d2fc 184 u64 sctlr_user;
b40c559b 185 u64 svcr;
a9d69158 186 u64 tpidr2_el0;
160a8e13 187 u64 por_el0;
fc84bc53
MB
188#ifdef CONFIG_ARM64_GCS
189 unsigned int gcs_el0_mode;
b57180c7 190 unsigned int gcs_el0_locked;
fc84bc53
MB
191 u64 gcspr_el0;
192 u64 gcs_base;
193 u64 gcs_size;
194#endif
9cce7a43
CM
195};
196
5838a155
MB
197static inline unsigned int thread_get_vl(struct thread_struct *thread,
198 enum vec_type type)
199{
200 return thread->vl[type];
201}
202
0423eedc
MB
203static inline unsigned int thread_get_sve_vl(struct thread_struct *thread)
204{
5838a155
MB
205 return thread_get_vl(thread, ARM64_VEC_SVE);
206}
207
af7167d6
MB
208static inline unsigned int thread_get_sme_vl(struct thread_struct *thread)
209{
210 return thread_get_vl(thread, ARM64_VEC_SME);
211}
212
85ed24da
MB
213static inline unsigned int thread_get_cur_vl(struct thread_struct *thread)
214{
ec0067a6 215 if (system_supports_sme() && (thread->svcr & SVCR_SM_MASK))
85ed24da
MB
216 return thread_get_sme_vl(thread);
217 else
218 return thread_get_sve_vl(thread);
219}
220
5838a155
MB
221unsigned int task_get_vl(const struct task_struct *task, enum vec_type type);
222void task_set_vl(struct task_struct *task, enum vec_type type,
223 unsigned long vl);
224void task_set_vl_onexec(struct task_struct *task, enum vec_type type,
225 unsigned long vl);
226unsigned int task_get_vl_onexec(const struct task_struct *task,
227 enum vec_type type);
228
229static inline unsigned int task_get_sve_vl(const struct task_struct *task)
230{
231 return task_get_vl(task, ARM64_VEC_SVE);
0423eedc
MB
232}
233
af7167d6
MB
234static inline unsigned int task_get_sme_vl(const struct task_struct *task)
235{
236 return task_get_vl(task, ARM64_VEC_SME);
237}
238
5838a155
MB
239static inline void task_set_sve_vl(struct task_struct *task, unsigned long vl)
240{
241 task_set_vl(task, ARM64_VEC_SVE, vl);
242}
243
244static inline unsigned int task_get_sve_vl_onexec(const struct task_struct *task)
245{
246 return task_get_vl_onexec(task, ARM64_VEC_SVE);
247}
248
249static inline void task_set_sve_vl_onexec(struct task_struct *task,
250 unsigned long vl)
251{
252 task_set_vl_onexec(task, ARM64_VEC_SVE, vl);
253}
0423eedc 254
20169862
PC
255#define SCTLR_USER_MASK \
256 (SCTLR_ELx_ENIA | SCTLR_ELx_ENIB | SCTLR_ELx_ENDA | SCTLR_ELx_ENDB | \
257 SCTLR_EL1_TCF0_MASK)
2f79d2fc 258
9e8084d3
KC
259static inline void arch_thread_struct_whitelist(unsigned long *offset,
260 unsigned long *size)
261{
65896545
DM
262 /* Verify that there is no padding among the whitelisted fields: */
263 BUILD_BUG_ON(sizeof_field(struct thread_struct, uw) !=
264 sizeof_field(struct thread_struct, uw.tp_value) +
265 sizeof_field(struct thread_struct, uw.tp2_value) +
203f2b95
MB
266 sizeof_field(struct thread_struct, uw.fpmr) +
267 sizeof_field(struct thread_struct, uw.pad) +
65896545
DM
268 sizeof_field(struct thread_struct, uw.fpsimd_state));
269
270 *offset = offsetof(struct thread_struct, uw);
271 *size = sizeof_field(struct thread_struct, uw);
9e8084d3
KC
272}
273
d00a3810
WD
274#ifdef CONFIG_COMPAT
275#define task_user_tls(t) \
276({ \
277 unsigned long *__tls; \
278 if (is_compat_thread(task_thread_info(t))) \
65896545 279 __tls = &(t)->thread.uw.tp2_value; \
d00a3810 280 else \
65896545 281 __tls = &(t)->thread.uw.tp_value; \
d00a3810
WD
282 __tls; \
283 })
284#else
65896545 285#define task_user_tls(t) (&(t)->thread.uw.tp_value)
d00a3810
WD
286#endif
287
936eb65c
DM
288/* Sync TPIDR_EL0 back to thread_struct for current */
289void tls_preserve_current_state(void);
290
df3fb968
DM
291#define INIT_THREAD { \
292 .fpsimd_cpu = NR_CPUS, \
293}
9cce7a43 294
f260c442
MR
295static inline void start_thread_common(struct pt_regs *regs, unsigned long pc,
296 unsigned long pstate)
9cce7a43 297{
f260c442
MR
298 /*
299 * Ensure all GPRs are zeroed, and initialize PC + PSTATE.
300 * The SP (or compat SP) will be initialized later.
301 */
302 regs->user_regs = (struct user_pt_regs) {
303 .pc = pc,
304 .pstate = pstate,
305 };
133d0518 306
f260c442
MR
307 /*
308 * To allow the syscalls:sys_exit_execve tracepoint we need to preserve
309 * syscallno, but do not need orig_x0 or the original GPRs.
310 */
311 regs->orig_x0 = 0;
133d0518 312
f260c442
MR
313 /*
314 * An exec from a kernel thread won't have an existing PMR value.
315 */
133d0518 316 if (system_uses_irq_prio_masking())
00d95979 317 regs->pmr = GIC_PRIO_IRQON;
f260c442
MR
318
319 /*
320 * The pt_regs::stackframe field must remain valid throughout this
321 * function as a stacktrace can be taken at any time. Any user or
322 * kernel task should have a valid final frame.
323 */
324 WARN_ON_ONCE(regs->stackframe.record.fp != 0);
325 WARN_ON_ONCE(regs->stackframe.record.lr != 0);
326 WARN_ON_ONCE(regs->stackframe.type != FRAME_META_TYPE_FINAL);
9cce7a43
CM
327}
328
329static inline void start_thread(struct pt_regs *regs, unsigned long pc,
330 unsigned long sp)
331{
f260c442 332 start_thread_common(regs, pc, PSR_MODE_EL0t);
c2876207 333 spectre_v4_enable_task_mitigation(current);
9cce7a43 334 regs->sp = sp;
9cce7a43
CM
335}
336
337#ifdef CONFIG_COMPAT
338static inline void compat_start_thread(struct pt_regs *regs, unsigned long pc,
339 unsigned long sp)
340{
f260c442 341 unsigned long pstate = PSR_AA32_MODE_USR;
9cce7a43 342 if (pc & 1)
f260c442
MR
343 pstate |= PSR_AA32_T_BIT;
344 if (IS_ENABLED(CONFIG_CPU_BIG_ENDIAN))
345 pstate |= PSR_AA32_E_BIT;
a795a38e 346
f260c442 347 start_thread_common(regs, pc, pstate);
c2876207 348 spectre_v4_enable_task_mitigation(current);
9cce7a43 349 regs->compat_sp = sp;
9cce7a43
CM
350}
351#endif
352
d8c1d798 353static __always_inline bool is_ttbr0_addr(unsigned long addr)
a8de9498
WD
354{
355 /* entry assembly clears tags for TTBR0 addrs */
356 return addr < TASK_SIZE;
357}
358
d8c1d798 359static __always_inline bool is_ttbr1_addr(unsigned long addr)
a8de9498
WD
360{
361 /* TTBR1 addresses may have a tag if KASAN_SW_TAGS is in use */
362 return arch_kasan_reset_tag(addr) >= PAGE_OFFSET;
363}
364
9cce7a43
CM
365/* Forward declaration, a strange C thing */
366struct task_struct;
367
42a20f86 368unsigned long __get_wchan(struct task_struct *p);
9cce7a43 369
d2e0d8f9 370void update_sctlr_el1(u64 sctlr);
2f79d2fc 371
9cce7a43
CM
372/* Thread switching */
373extern struct task_struct *cpu_switch_to(struct task_struct *prev,
374 struct task_struct *next);
375
9cce7a43 376#define task_pt_regs(p) \
34be98f4 377 ((struct pt_regs *)(THREAD_SIZE + task_stack_page(p)) - 1)
9cce7a43 378
ebe6152e 379#define KSTK_EIP(tsk) ((unsigned long)task_pt_regs(tsk)->pc)
3168a743 380#define KSTK_ESP(tsk) user_stack_pointer(task_pt_regs(tsk))
9cce7a43
CM
381
382/*
383 * Prefetching support
384 */
385#define ARCH_HAS_PREFETCH
386static inline void prefetch(const void *ptr)
387{
388 asm volatile("prfm pldl1keep, %a0\n" : : "p" (ptr));
389}
390
391#define ARCH_HAS_PREFETCHW
392static inline void prefetchw(const void *ptr)
393{
394 asm volatile("prfm pstl1keep, %a0\n" : : "p" (ptr));
395}
396
94b07c1f
DM
397extern unsigned long __ro_after_init signal_minsigstksz; /* sigframe size */
398extern void __init minsigstksz_setup(void);
399
9a6e5948
DM
400/*
401 * Not at the top of the file due to a direct #include cycle between
402 * <asm/fpsimd.h> and <asm/processor.h>. Deferring this #include
403 * ensures that contents of processor.h are visible to fpsimd.h even if
404 * processor.h is included first.
405 *
406 * These prctl helpers are the only things in this file that require
407 * fpsimd.h. The core code expects them to be in this header.
408 */
409#include <asm/fpsimd.h>
410
9e4ab6c8 411/* Userspace interface for PR_S[MV]E_{SET,GET}_VL prctl()s: */
2d2123bc
DM
412#define SVE_SET_VL(arg) sve_set_current_vl(arg)
413#define SVE_GET_VL() sve_get_current_vl()
9e4ab6c8
MB
414#define SME_SET_VL(arg) sme_set_current_vl(arg)
415#define SME_GET_VL() sme_get_current_vl()
2d2123bc 416
ba830885
KM
417/* PR_PAC_RESET_KEYS prctl */
418#define PAC_RESET_KEYS(tsk, arg) ptrauth_prctl_reset_keys(tsk, arg)
419
20169862
PC
420/* PR_PAC_{SET,GET}_ENABLED_KEYS prctl */
421#define PAC_SET_ENABLED_KEYS(tsk, keys, enabled) \
422 ptrauth_set_enabled_keys(tsk, keys, enabled)
423#define PAC_GET_ENABLED_KEYS(tsk) ptrauth_get_enabled_keys(tsk)
424
63f0c603
CM
425#ifdef CONFIG_ARM64_TAGGED_ADDR_ABI
426/* PR_{SET,GET}_TAGGED_ADDR_CTRL prctl */
93f067f6
CM
427long set_tagged_addr_ctrl(struct task_struct *task, unsigned long arg);
428long get_tagged_addr_ctrl(struct task_struct *task);
429#define SET_TAGGED_ADDR_CTRL(arg) set_tagged_addr_ctrl(current, arg)
430#define GET_TAGGED_ADDR_CTRL() get_tagged_addr_ctrl(current)
63f0c603
CM
431#endif
432
3e9e67e1
PC
433int get_tsc_mode(unsigned long adr);
434int set_tsc_mode(unsigned int val);
435#define GET_TSC_CTL(adr) get_tsc_mode((adr))
436#define SET_TSC_CTL(val) set_tsc_mode((val))
437
eef94a3d 438#endif /* __ASSEMBLY__ */
9cce7a43 439#endif /* __ASM_PROCESSOR_H */