2019-04-16 23:46:14 +08:00
|
|
|
/* SPDX-License-Identifier: GPL-2.0 */
|
2017-12-21 01:28:54 +08:00
|
|
|
|
|
|
|
#ifndef _ASM_X86_CPU_ENTRY_AREA_H
|
|
|
|
#define _ASM_X86_CPU_ENTRY_AREA_H
|
|
|
|
|
|
|
|
#include <linux/percpu-defs.h>
|
|
|
|
#include <asm/processor.h>
|
2017-12-04 22:07:49 +08:00
|
|
|
#include <asm/intel_ds.h>
|
2017-12-21 01:28:54 +08:00
|
|
|
|
2019-04-14 23:59:47 +08:00
|
|
|
#ifdef CONFIG_X86_64
|
|
|
|
|
|
|
|
/* Macro to enforce the same ordering and stack sizes */
|
2019-04-14 23:59:57 +08:00
|
|
|
#define ESTACKS_MEMBERS(guardsize, db2_holesize)\
|
2019-04-14 23:59:47 +08:00
|
|
|
char DF_stack_guard[guardsize]; \
|
|
|
|
char DF_stack[EXCEPTION_STKSZ]; \
|
|
|
|
char NMI_stack_guard[guardsize]; \
|
|
|
|
char NMI_stack[EXCEPTION_STKSZ]; \
|
2019-04-14 23:59:57 +08:00
|
|
|
char DB2_stack_guard[guardsize]; \
|
|
|
|
char DB2_stack[db2_holesize]; \
|
|
|
|
char DB1_stack_guard[guardsize]; \
|
|
|
|
char DB1_stack[EXCEPTION_STKSZ]; \
|
2019-04-14 23:59:47 +08:00
|
|
|
char DB_stack_guard[guardsize]; \
|
2019-04-14 23:59:57 +08:00
|
|
|
char DB_stack[EXCEPTION_STKSZ]; \
|
2019-04-14 23:59:47 +08:00
|
|
|
char MCE_stack_guard[guardsize]; \
|
|
|
|
char MCE_stack[EXCEPTION_STKSZ]; \
|
|
|
|
char IST_top_guard[guardsize]; \
|
|
|
|
|
|
|
|
/* The exception stacks' physical storage. No guard pages required */
|
|
|
|
struct exception_stacks {
|
2019-04-14 23:59:57 +08:00
|
|
|
ESTACKS_MEMBERS(0, 0)
|
2019-04-14 23:59:47 +08:00
|
|
|
};
|
|
|
|
|
2019-04-14 23:59:56 +08:00
|
|
|
/* The effective cpu entry area mapping with guard pages. */
|
2019-04-14 23:59:47 +08:00
|
|
|
struct cea_exception_stacks {
|
2019-04-14 23:59:57 +08:00
|
|
|
ESTACKS_MEMBERS(PAGE_SIZE, EXCEPTION_STKSZ)
|
2019-04-14 23:59:47 +08:00
|
|
|
};
|
|
|
|
|
2019-04-14 23:59:55 +08:00
|
|
|
/*
|
|
|
|
* The exception stack ordering in [cea_]exception_stacks
|
|
|
|
*/
|
|
|
|
enum exception_stack_ordering {
|
|
|
|
ESTACK_DF,
|
|
|
|
ESTACK_NMI,
|
2019-04-14 23:59:57 +08:00
|
|
|
ESTACK_DB2,
|
|
|
|
ESTACK_DB1,
|
2019-04-14 23:59:55 +08:00
|
|
|
ESTACK_DB,
|
|
|
|
ESTACK_MCE,
|
|
|
|
N_EXCEPTION_STACKS
|
|
|
|
};
|
|
|
|
|
2019-04-14 23:59:47 +08:00
|
|
|
#define CEA_ESTACK_SIZE(st) \
|
|
|
|
sizeof(((struct cea_exception_stacks *)0)->st## _stack)
|
|
|
|
|
|
|
|
#define CEA_ESTACK_BOT(ceastp, st) \
|
|
|
|
((unsigned long)&(ceastp)->st## _stack)
|
|
|
|
|
|
|
|
#define CEA_ESTACK_TOP(ceastp, st) \
|
|
|
|
(CEA_ESTACK_BOT(ceastp, st) + CEA_ESTACK_SIZE(st))
|
|
|
|
|
|
|
|
#define CEA_ESTACK_OFFS(st) \
|
|
|
|
offsetof(struct cea_exception_stacks, st## _stack)
|
|
|
|
|
|
|
|
#define CEA_ESTACK_PAGES \
|
|
|
|
(sizeof(struct cea_exception_stacks) / PAGE_SIZE)
|
|
|
|
|
|
|
|
#endif
|
|
|
|
|
2017-12-21 01:28:54 +08:00
|
|
|
/*
|
|
|
|
* cpu_entry_area is a percpu region that contains things needed by the CPU
|
|
|
|
* and early entry/exit code. Real types aren't used for all fields here
|
|
|
|
* to avoid circular header dependencies.
|
|
|
|
*
|
|
|
|
* Every field is a virtual alias of some other allocated backing store.
|
|
|
|
* There is no direct allocation of a struct cpu_entry_area.
|
|
|
|
*/
|
|
|
|
struct cpu_entry_area {
|
|
|
|
char gdt[PAGE_SIZE];
|
|
|
|
|
|
|
|
/*
|
|
|
|
* The GDT is just below entry_stack and thus serves (on x86_64) as
|
2019-11-21 07:40:24 +08:00
|
|
|
* a read-only guard page. On 32-bit the GDT must be writeable, so
|
|
|
|
* it needs an extra guard page.
|
2017-12-21 01:28:54 +08:00
|
|
|
*/
|
2019-11-21 07:40:24 +08:00
|
|
|
#ifdef CONFIG_X86_32
|
|
|
|
char guard_entry_stack[PAGE_SIZE];
|
|
|
|
#endif
|
2017-12-21 01:28:54 +08:00
|
|
|
struct entry_stack_page entry_stack_page;
|
|
|
|
|
|
|
|
/*
|
|
|
|
* On x86_64, the TSS is mapped RO. On x86_32, it's mapped RW because
|
|
|
|
* we need task switches to work, and task switches write to the TSS.
|
|
|
|
*/
|
|
|
|
struct tss_struct tss;
|
|
|
|
|
|
|
|
#ifdef CONFIG_X86_64
|
|
|
|
/*
|
2019-04-14 23:59:47 +08:00
|
|
|
* Exception stacks used for IST entries with guard pages.
|
2017-12-21 01:28:54 +08:00
|
|
|
*/
|
2019-04-14 23:59:47 +08:00
|
|
|
struct cea_exception_stacks estacks;
|
2017-12-21 01:28:54 +08:00
|
|
|
#endif
|
2017-12-04 22:07:49 +08:00
|
|
|
/*
|
|
|
|
* Per CPU debug store for Intel performance monitoring. Wastes a
|
|
|
|
* full page at the moment.
|
|
|
|
*/
|
|
|
|
struct debug_store cpu_debug_store;
|
|
|
|
/*
|
|
|
|
* The actual PEBS/BTS buffers must be mapped to user space
|
|
|
|
* Reserve enough fixmap PTEs.
|
|
|
|
*/
|
|
|
|
struct debug_store_buffers cpu_debug_buffers;
|
2017-12-21 01:28:54 +08:00
|
|
|
};
|
|
|
|
|
x86/pti/32: Calculate the various PTI cpu_entry_area sizes correctly, make the CPU_ENTRY_AREA_PAGES assert precise
When two recent commits that increased the size of the 'struct cpu_entry_area'
were merged in -tip, the 32-bit defconfig build started failing on the following
build time assert:
./include/linux/compiler.h:391:38: error: call to ‘__compiletime_assert_189’ declared with attribute error: BUILD_BUG_ON failed: CPU_ENTRY_AREA_PAGES * PAGE_SIZE < CPU_ENTRY_AREA_MAP_SIZE
arch/x86/mm/cpu_entry_area.c:189:2: note: in expansion of macro ‘BUILD_BUG_ON’
In function ‘setup_cpu_entry_area_ptes’,
Which corresponds to the following build time assert:
BUILD_BUG_ON(CPU_ENTRY_AREA_PAGES * PAGE_SIZE < CPU_ENTRY_AREA_MAP_SIZE);
The purpose of this assert is to sanity check the fixed-value definition of
CPU_ENTRY_AREA_PAGES arch/x86/include/asm/pgtable_32_types.h:
#define CPU_ENTRY_AREA_PAGES (NR_CPUS * 41)
The '41' is supposed to match sizeof(struct cpu_entry_area)/PAGE_SIZE, which value
we didn't want to define in such a low level header, because it would cause
dependency hell.
Every time the size of cpu_entry_area is changed, we have to adjust CPU_ENTRY_AREA_PAGES
accordingly - and this assert is checking that constraint.
But the assert is both imprecise and buggy, primarily because it doesn't
include the single readonly IDT page that is mapped at CPU_ENTRY_AREA_BASE
(which begins at a PMD boundary).
This bug was hidden by the fact that by accident CPU_ENTRY_AREA_PAGES is defined
too large upstream (v5.4-rc8):
#define CPU_ENTRY_AREA_PAGES (NR_CPUS * 40)
While 'struct cpu_entry_area' is 155648 bytes, or 38 pages. So we had two extra
pages, which hid the bug.
The following commit (not yet upstream) increased the size to 40 pages:
x86/iopl: ("Restrict iopl() permission scope")
... but increased CPU_ENTRY_AREA_PAGES only 41 - i.e. shortening the gap
to just 1 extra page.
Then another not-yet-upstream commit changed the size again:
880a98c33996: ("x86/cpu_entry_area: Add guard page for entry stack on 32bit")
Which increased the cpu_entry_area size from 38 to 39 pages, but
didn't change CPU_ENTRY_AREA_PAGES (kept it at 40). This worked
fine, because we still had a page left from the accidental 'reserve'.
But when these two commits were merged into the same tree, the
combined size of cpu_entry_area grew from 38 to 40 pages, while
CPU_ENTRY_AREA_PAGES finally caught up to 40 as well.
Which is fine in terms of functionality, but the assert broke:
BUILD_BUG_ON(CPU_ENTRY_AREA_PAGES * PAGE_SIZE < CPU_ENTRY_AREA_MAP_SIZE);
because CPU_ENTRY_AREA_MAP_SIZE is the total size of the area,
which is 1 page larger due to the IDT page.
To fix all this, change the assert to two precise asserts:
BUILD_BUG_ON((CPU_ENTRY_AREA_PAGES+1)*PAGE_SIZE != CPU_ENTRY_AREA_MAP_SIZE);
BUILD_BUG_ON(CPU_ENTRY_AREA_TOTAL_SIZE != CPU_ENTRY_AREA_MAP_SIZE);
This takes the IDT page into account, and also connects the size-based
define of CPU_ENTRY_AREA_TOTAL_SIZE with the address-subtraction based
define of CPU_ENTRY_AREA_MAP_SIZE.
Also clean up some of the names which made it rather confusing:
- 'CPU_ENTRY_AREA_TOT_SIZE' wasn't actually the 'total' size of
the cpu-entry-area, but the per-cpu array size, so rename this
to CPU_ENTRY_AREA_ARRAY_SIZE.
- Introduce CPU_ENTRY_AREA_TOTAL_SIZE that _is_ the total mapping
size, with the IDT included.
- Add comments where '+1' denotes the IDT mapping - it wasn't
obvious and took me about 3 hours to decode...
Finally, because this particular commit is actually applied after
this patch:
880a98c33996: ("x86/cpu_entry_area: Add guard page for entry stack on 32bit")
Fix the CPU_ENTRY_AREA_PAGES value from 40 pages to the correct 39 pages.
All future commits that change cpu_entry_area will have to adjust
this value precisely.
As a side note, we should probably attempt to remove CPU_ENTRY_AREA_PAGES
and derive its value directly from the structure, without causing
header hell - but that is an adventure for another day! :-)
Fixes: 880a98c33996: ("x86/cpu_entry_area: Add guard page for entry stack on 32bit")
Cc: Thomas Gleixner <tglx@linutronix.de>
Cc: Borislav Petkov <bp@alien8.de>
Cc: Peter Zijlstra (Intel) <peterz@infradead.org>
Cc: Linus Torvalds <torvalds@linux-foundation.org>
Cc: Andy Lutomirski <luto@kernel.org>
Cc: stable@kernel.org
Signed-off-by: Ingo Molnar <mingo@kernel.org>
2019-11-24 18:21:44 +08:00
|
|
|
#define CPU_ENTRY_AREA_SIZE (sizeof(struct cpu_entry_area))
|
|
|
|
#define CPU_ENTRY_AREA_ARRAY_SIZE (CPU_ENTRY_AREA_SIZE * NR_CPUS)
|
|
|
|
|
|
|
|
/* Total size includes the readonly IDT mapping page as well: */
|
|
|
|
#define CPU_ENTRY_AREA_TOTAL_SIZE (CPU_ENTRY_AREA_ARRAY_SIZE + PAGE_SIZE)
|
2017-12-21 01:28:54 +08:00
|
|
|
|
|
|
|
DECLARE_PER_CPU(struct cpu_entry_area *, cpu_entry_area);
|
2019-04-14 23:59:49 +08:00
|
|
|
DECLARE_PER_CPU(struct cea_exception_stacks *, cea_exception_stacks);
|
2017-12-21 01:28:54 +08:00
|
|
|
|
|
|
|
extern void setup_cpu_entry_areas(void);
|
2017-12-21 01:51:31 +08:00
|
|
|
extern void cea_set_pte(void *cea_vaddr, phys_addr_t pa, pgprot_t flags);
|
|
|
|
|
x86/pti/32: Calculate the various PTI cpu_entry_area sizes correctly, make the CPU_ENTRY_AREA_PAGES assert precise
When two recent commits that increased the size of the 'struct cpu_entry_area'
were merged in -tip, the 32-bit defconfig build started failing on the following
build time assert:
./include/linux/compiler.h:391:38: error: call to ‘__compiletime_assert_189’ declared with attribute error: BUILD_BUG_ON failed: CPU_ENTRY_AREA_PAGES * PAGE_SIZE < CPU_ENTRY_AREA_MAP_SIZE
arch/x86/mm/cpu_entry_area.c:189:2: note: in expansion of macro ‘BUILD_BUG_ON’
In function ‘setup_cpu_entry_area_ptes’,
Which corresponds to the following build time assert:
BUILD_BUG_ON(CPU_ENTRY_AREA_PAGES * PAGE_SIZE < CPU_ENTRY_AREA_MAP_SIZE);
The purpose of this assert is to sanity check the fixed-value definition of
CPU_ENTRY_AREA_PAGES arch/x86/include/asm/pgtable_32_types.h:
#define CPU_ENTRY_AREA_PAGES (NR_CPUS * 41)
The '41' is supposed to match sizeof(struct cpu_entry_area)/PAGE_SIZE, which value
we didn't want to define in such a low level header, because it would cause
dependency hell.
Every time the size of cpu_entry_area is changed, we have to adjust CPU_ENTRY_AREA_PAGES
accordingly - and this assert is checking that constraint.
But the assert is both imprecise and buggy, primarily because it doesn't
include the single readonly IDT page that is mapped at CPU_ENTRY_AREA_BASE
(which begins at a PMD boundary).
This bug was hidden by the fact that by accident CPU_ENTRY_AREA_PAGES is defined
too large upstream (v5.4-rc8):
#define CPU_ENTRY_AREA_PAGES (NR_CPUS * 40)
While 'struct cpu_entry_area' is 155648 bytes, or 38 pages. So we had two extra
pages, which hid the bug.
The following commit (not yet upstream) increased the size to 40 pages:
x86/iopl: ("Restrict iopl() permission scope")
... but increased CPU_ENTRY_AREA_PAGES only 41 - i.e. shortening the gap
to just 1 extra page.
Then another not-yet-upstream commit changed the size again:
880a98c33996: ("x86/cpu_entry_area: Add guard page for entry stack on 32bit")
Which increased the cpu_entry_area size from 38 to 39 pages, but
didn't change CPU_ENTRY_AREA_PAGES (kept it at 40). This worked
fine, because we still had a page left from the accidental 'reserve'.
But when these two commits were merged into the same tree, the
combined size of cpu_entry_area grew from 38 to 40 pages, while
CPU_ENTRY_AREA_PAGES finally caught up to 40 as well.
Which is fine in terms of functionality, but the assert broke:
BUILD_BUG_ON(CPU_ENTRY_AREA_PAGES * PAGE_SIZE < CPU_ENTRY_AREA_MAP_SIZE);
because CPU_ENTRY_AREA_MAP_SIZE is the total size of the area,
which is 1 page larger due to the IDT page.
To fix all this, change the assert to two precise asserts:
BUILD_BUG_ON((CPU_ENTRY_AREA_PAGES+1)*PAGE_SIZE != CPU_ENTRY_AREA_MAP_SIZE);
BUILD_BUG_ON(CPU_ENTRY_AREA_TOTAL_SIZE != CPU_ENTRY_AREA_MAP_SIZE);
This takes the IDT page into account, and also connects the size-based
define of CPU_ENTRY_AREA_TOTAL_SIZE with the address-subtraction based
define of CPU_ENTRY_AREA_MAP_SIZE.
Also clean up some of the names which made it rather confusing:
- 'CPU_ENTRY_AREA_TOT_SIZE' wasn't actually the 'total' size of
the cpu-entry-area, but the per-cpu array size, so rename this
to CPU_ENTRY_AREA_ARRAY_SIZE.
- Introduce CPU_ENTRY_AREA_TOTAL_SIZE that _is_ the total mapping
size, with the IDT included.
- Add comments where '+1' denotes the IDT mapping - it wasn't
obvious and took me about 3 hours to decode...
Finally, because this particular commit is actually applied after
this patch:
880a98c33996: ("x86/cpu_entry_area: Add guard page for entry stack on 32bit")
Fix the CPU_ENTRY_AREA_PAGES value from 40 pages to the correct 39 pages.
All future commits that change cpu_entry_area will have to adjust
this value precisely.
As a side note, we should probably attempt to remove CPU_ENTRY_AREA_PAGES
and derive its value directly from the structure, without causing
header hell - but that is an adventure for another day! :-)
Fixes: 880a98c33996: ("x86/cpu_entry_area: Add guard page for entry stack on 32bit")
Cc: Thomas Gleixner <tglx@linutronix.de>
Cc: Borislav Petkov <bp@alien8.de>
Cc: Peter Zijlstra (Intel) <peterz@infradead.org>
Cc: Linus Torvalds <torvalds@linux-foundation.org>
Cc: Andy Lutomirski <luto@kernel.org>
Cc: stable@kernel.org
Signed-off-by: Ingo Molnar <mingo@kernel.org>
2019-11-24 18:21:44 +08:00
|
|
|
/* Single page reserved for the readonly IDT mapping: */
|
2017-12-21 01:51:31 +08:00
|
|
|
#define CPU_ENTRY_AREA_RO_IDT CPU_ENTRY_AREA_BASE
|
|
|
|
#define CPU_ENTRY_AREA_PER_CPU (CPU_ENTRY_AREA_RO_IDT + PAGE_SIZE)
|
|
|
|
|
|
|
|
#define CPU_ENTRY_AREA_RO_IDT_VADDR ((void *)CPU_ENTRY_AREA_RO_IDT)
|
|
|
|
|
|
|
|
#define CPU_ENTRY_AREA_MAP_SIZE \
|
x86/pti/32: Calculate the various PTI cpu_entry_area sizes correctly, make the CPU_ENTRY_AREA_PAGES assert precise
When two recent commits that increased the size of the 'struct cpu_entry_area'
were merged in -tip, the 32-bit defconfig build started failing on the following
build time assert:
./include/linux/compiler.h:391:38: error: call to ‘__compiletime_assert_189’ declared with attribute error: BUILD_BUG_ON failed: CPU_ENTRY_AREA_PAGES * PAGE_SIZE < CPU_ENTRY_AREA_MAP_SIZE
arch/x86/mm/cpu_entry_area.c:189:2: note: in expansion of macro ‘BUILD_BUG_ON’
In function ‘setup_cpu_entry_area_ptes’,
Which corresponds to the following build time assert:
BUILD_BUG_ON(CPU_ENTRY_AREA_PAGES * PAGE_SIZE < CPU_ENTRY_AREA_MAP_SIZE);
The purpose of this assert is to sanity check the fixed-value definition of
CPU_ENTRY_AREA_PAGES arch/x86/include/asm/pgtable_32_types.h:
#define CPU_ENTRY_AREA_PAGES (NR_CPUS * 41)
The '41' is supposed to match sizeof(struct cpu_entry_area)/PAGE_SIZE, which value
we didn't want to define in such a low level header, because it would cause
dependency hell.
Every time the size of cpu_entry_area is changed, we have to adjust CPU_ENTRY_AREA_PAGES
accordingly - and this assert is checking that constraint.
But the assert is both imprecise and buggy, primarily because it doesn't
include the single readonly IDT page that is mapped at CPU_ENTRY_AREA_BASE
(which begins at a PMD boundary).
This bug was hidden by the fact that by accident CPU_ENTRY_AREA_PAGES is defined
too large upstream (v5.4-rc8):
#define CPU_ENTRY_AREA_PAGES (NR_CPUS * 40)
While 'struct cpu_entry_area' is 155648 bytes, or 38 pages. So we had two extra
pages, which hid the bug.
The following commit (not yet upstream) increased the size to 40 pages:
x86/iopl: ("Restrict iopl() permission scope")
... but increased CPU_ENTRY_AREA_PAGES only 41 - i.e. shortening the gap
to just 1 extra page.
Then another not-yet-upstream commit changed the size again:
880a98c33996: ("x86/cpu_entry_area: Add guard page for entry stack on 32bit")
Which increased the cpu_entry_area size from 38 to 39 pages, but
didn't change CPU_ENTRY_AREA_PAGES (kept it at 40). This worked
fine, because we still had a page left from the accidental 'reserve'.
But when these two commits were merged into the same tree, the
combined size of cpu_entry_area grew from 38 to 40 pages, while
CPU_ENTRY_AREA_PAGES finally caught up to 40 as well.
Which is fine in terms of functionality, but the assert broke:
BUILD_BUG_ON(CPU_ENTRY_AREA_PAGES * PAGE_SIZE < CPU_ENTRY_AREA_MAP_SIZE);
because CPU_ENTRY_AREA_MAP_SIZE is the total size of the area,
which is 1 page larger due to the IDT page.
To fix all this, change the assert to two precise asserts:
BUILD_BUG_ON((CPU_ENTRY_AREA_PAGES+1)*PAGE_SIZE != CPU_ENTRY_AREA_MAP_SIZE);
BUILD_BUG_ON(CPU_ENTRY_AREA_TOTAL_SIZE != CPU_ENTRY_AREA_MAP_SIZE);
This takes the IDT page into account, and also connects the size-based
define of CPU_ENTRY_AREA_TOTAL_SIZE with the address-subtraction based
define of CPU_ENTRY_AREA_MAP_SIZE.
Also clean up some of the names which made it rather confusing:
- 'CPU_ENTRY_AREA_TOT_SIZE' wasn't actually the 'total' size of
the cpu-entry-area, but the per-cpu array size, so rename this
to CPU_ENTRY_AREA_ARRAY_SIZE.
- Introduce CPU_ENTRY_AREA_TOTAL_SIZE that _is_ the total mapping
size, with the IDT included.
- Add comments where '+1' denotes the IDT mapping - it wasn't
obvious and took me about 3 hours to decode...
Finally, because this particular commit is actually applied after
this patch:
880a98c33996: ("x86/cpu_entry_area: Add guard page for entry stack on 32bit")
Fix the CPU_ENTRY_AREA_PAGES value from 40 pages to the correct 39 pages.
All future commits that change cpu_entry_area will have to adjust
this value precisely.
As a side note, we should probably attempt to remove CPU_ENTRY_AREA_PAGES
and derive its value directly from the structure, without causing
header hell - but that is an adventure for another day! :-)
Fixes: 880a98c33996: ("x86/cpu_entry_area: Add guard page for entry stack on 32bit")
Cc: Thomas Gleixner <tglx@linutronix.de>
Cc: Borislav Petkov <bp@alien8.de>
Cc: Peter Zijlstra (Intel) <peterz@infradead.org>
Cc: Linus Torvalds <torvalds@linux-foundation.org>
Cc: Andy Lutomirski <luto@kernel.org>
Cc: stable@kernel.org
Signed-off-by: Ingo Molnar <mingo@kernel.org>
2019-11-24 18:21:44 +08:00
|
|
|
(CPU_ENTRY_AREA_PER_CPU + CPU_ENTRY_AREA_ARRAY_SIZE - CPU_ENTRY_AREA_BASE)
|
2017-12-21 01:51:31 +08:00
|
|
|
|
|
|
|
extern struct cpu_entry_area *get_cpu_entry_area(int cpu);
|
|
|
|
|
|
|
|
static inline struct entry_stack *cpu_entry_stack(int cpu)
|
|
|
|
{
|
|
|
|
return &get_cpu_entry_area(cpu)->entry_stack_page.stack;
|
|
|
|
}
|
2017-12-21 01:28:54 +08:00
|
|
|
|
2019-04-14 23:59:49 +08:00
|
|
|
#define __this_cpu_ist_top_va(name) \
|
|
|
|
CEA_ESTACK_TOP(__this_cpu_read(cea_exception_stacks), name)
|
|
|
|
|
2017-12-21 01:28:54 +08:00
|
|
|
#endif
|