blob: 59663c08c949321e7fe0f3cc12c58eb4642da5cf [file] [log] [blame]
Greg Kroah-Hartmanb2441312017-11-01 15:07:57 +01001/* SPDX-License-Identifier: GPL-2.0 */
H. Peter Anvin1965aae2008-10-22 22:26:29 -07002#ifndef _ASM_X86_PROCESSOR_H
3#define _ASM_X86_PROCESSOR_H
Glauber de Oliveira Costac758ecf2008-01-30 13:31:03 +01004
Glauber de Oliveira Costa053de042008-01-30 13:31:27 +01005#include <asm/processor-flags.h>
6
Glauber de Oliveira Costa683e0252008-01-30 13:31:27 +01007/* Forward declaration, a strange C thing */
8struct task_struct;
9struct mm_struct;
Brian Gerst9fda6a02015-07-29 01:41:16 -040010struct vm86;
Glauber de Oliveira Costa683e0252008-01-30 13:31:27 +010011
Glauber de Oliveira Costa2f66dcc2008-01-30 13:31:57 +010012#include <asm/math_emu.h>
13#include <asm/segment.h>
Glauber de Oliveira Costa2f66dcc2008-01-30 13:31:57 +010014#include <asm/types.h>
Ingo Molnardecb4c42015-09-05 09:32:43 +020015#include <uapi/asm/sigcontext.h>
Glauber de Oliveira Costa2f66dcc2008-01-30 13:31:57 +010016#include <asm/current.h>
Borislav Petkovcd4d09e2016-01-26 22:12:04 +010017#include <asm/cpufeatures.h>
Glauber de Oliveira Costac72dcf82008-01-30 13:31:27 +010018#include <asm/page.h>
Jeremy Fitzhardinge54321d92009-02-11 10:20:05 -080019#include <asm/pgtable_types.h>
Glauber de Oliveira Costaca241c72008-01-30 13:31:31 +010020#include <asm/percpu.h>
Glauber de Oliveira Costa2f66dcc2008-01-30 13:31:57 +010021#include <asm/msr.h>
22#include <asm/desc_defs.h>
Andi Kleenbd616432008-01-30 13:32:38 +010023#include <asm/nops.h>
David Howellsf05e7982012-03-28 18:11:12 +010024#include <asm/special_insns.h>
Ingo Molnar14b96752015-04-22 09:57:24 +020025#include <asm/fpu/types.h>
Josh Poimboeuf76846bf2017-07-11 10:33:45 -050026#include <asm/unwind_hints.h>
Ingo Molnar4d46a892008-02-21 04:24:40 +010027
Glauber de Oliveira Costa2f66dcc2008-01-30 13:31:57 +010028#include <linux/personality.h>
Glauber de Oliveira Costa5300db82008-01-30 13:31:33 +010029#include <linux/cache.h>
Glauber de Oliveira Costa2f66dcc2008-01-30 13:31:57 +010030#include <linux/threads.h>
Peter Zijlstra5cbc19a2009-09-02 11:49:52 +020031#include <linux/math64.h>
Peter Zijlstrafaa46022010-03-25 14:51:50 +010032#include <linux/err.h>
David Howellsf05e7982012-03-28 18:11:12 +010033#include <linux/irqflags.h>
Tom Lendacky21729f82017-07-17 16:10:07 -050034#include <linux/mem_encrypt.h>
David Howellsf05e7982012-03-28 18:11:12 +010035
36/*
37 * We handle most unaligned accesses in hardware. On the other hand
38 * unaligned DMA can be quite expensive on some Nehalem processors.
39 *
40 * Based on this we disable the IP header alignment in network drivers.
41 */
42#define NET_IP_ALIGN 0
Glauber de Oliveira Costac72dcf82008-01-30 13:31:27 +010043
K.Prasadb332828c2009-06-01 23:43:10 +053044#define HBP_NUM 4
Glauber de Oliveira Costa0ccb8ac2008-01-30 13:31:27 +010045/*
46 * Default implementation of macro that returns current
47 * instruction pointer ("program counter").
48 */
49static inline void *current_text_addr(void)
50{
51 void *pc;
Ingo Molnar4d46a892008-02-21 04:24:40 +010052
53 asm volatile("mov $1f, %0; 1:":"=r" (pc));
54
Glauber de Oliveira Costa0ccb8ac2008-01-30 13:31:27 +010055 return pc;
56}
57
Ingo Molnarb8c1b8ea2015-05-24 09:58:12 +020058/*
59 * These alignment constraints are for performance in the vSMP case,
60 * but in the task_struct case we must also meet hardware imposed
61 * alignment requirements of the FPU state:
62 */
Glauber de Oliveira Costadbcb4662008-01-30 13:31:31 +010063#ifdef CONFIG_X86_VSMP
Ingo Molnar4d46a892008-02-21 04:24:40 +010064# define ARCH_MIN_TASKALIGN (1 << INTERNODE_CACHE_SHIFT)
65# define ARCH_MIN_MMSTRUCT_ALIGN (1 << INTERNODE_CACHE_SHIFT)
Glauber de Oliveira Costadbcb4662008-01-30 13:31:31 +010066#else
Ingo Molnarb8c1b8ea2015-05-24 09:58:12 +020067# define ARCH_MIN_TASKALIGN __alignof__(union fpregs_state)
Ingo Molnar4d46a892008-02-21 04:24:40 +010068# define ARCH_MIN_MMSTRUCT_ALIGN 0
Glauber de Oliveira Costadbcb4662008-01-30 13:31:31 +010069#endif
70
Alex Shie0ba94f2012-06-28 09:02:16 +080071enum tlb_infos {
72 ENTRIES,
73 NR_INFO
74};
75
76extern u16 __read_mostly tlb_lli_4k[NR_INFO];
77extern u16 __read_mostly tlb_lli_2m[NR_INFO];
78extern u16 __read_mostly tlb_lli_4m[NR_INFO];
79extern u16 __read_mostly tlb_lld_4k[NR_INFO];
80extern u16 __read_mostly tlb_lld_2m[NR_INFO];
81extern u16 __read_mostly tlb_lld_4m[NR_INFO];
Kirill A. Shutemovdd360392013-12-23 14:16:58 +020082extern u16 __read_mostly tlb_lld_1g[NR_INFO];
Alex Shic4211f42012-06-28 09:02:19 +080083
Glauber de Oliveira Costa5300db82008-01-30 13:31:33 +010084/*
85 * CPU type and hardware bug flags. Kept separately for each CPU.
Mathias Krause04402112017-02-12 22:12:07 +010086 * Members of this structure are referenced in head_32.S, so think twice
Glauber de Oliveira Costa5300db82008-01-30 13:31:33 +010087 * before touching them. [mj]
88 */
89
90struct cpuinfo_x86 {
Ingo Molnar4d46a892008-02-21 04:24:40 +010091 __u8 x86; /* CPU family */
92 __u8 x86_vendor; /* CPU vendor */
93 __u8 x86_model;
Jia Zhangb3991512018-01-01 09:52:10 +080094 __u8 x86_stepping;
Mathias Krause64158132017-02-12 22:12:08 +010095#ifdef CONFIG_X86_64
Ingo Molnar4d46a892008-02-21 04:24:40 +010096 /* Number of 4K pages in DTLB/ITLB combined(in pages): */
H. Peter Anvinb1882e62009-01-23 17:18:52 -080097 int x86_tlbsize;
Jan Beulich13c6c532009-03-12 12:37:34 +000098#endif
Ingo Molnar4d46a892008-02-21 04:24:40 +010099 __u8 x86_virt_bits;
100 __u8 x86_phys_bits;
101 /* CPUID returned core id bits: */
102 __u8 x86_coreid_bits;
Borislav Petkov79a8b9a2017-02-05 11:50:21 +0100103 __u8 cu_id;
Ingo Molnar4d46a892008-02-21 04:24:40 +0100104 /* Max extended CPUID function supported: */
105 __u32 extended_cpuid_level;
Ingo Molnar4d46a892008-02-21 04:24:40 +0100106 /* Maximum supported CPUID level, -1=no CPUID: */
107 int cpuid_level;
Borislav Petkov65fc9852013-03-20 15:07:23 +0100108 __u32 x86_capability[NCAPINTS + NBUGINTS];
Ingo Molnar4d46a892008-02-21 04:24:40 +0100109 char x86_vendor_id[16];
110 char x86_model_id[64];
111 /* in KB - valid for CPUS which support this call: */
Gustavo A. R. Silva24dbc602018-02-13 13:22:08 -0600112 unsigned int x86_cache_size;
Ingo Molnar4d46a892008-02-21 04:24:40 +0100113 int x86_cache_alignment; /* In bytes */
Peter P Waskiewicz Jrcbc82b12015-01-23 18:45:43 +0000114 /* Cache QoS architectural values: */
115 int x86_cache_max_rmid; /* max index */
116 int x86_cache_occ_scale; /* scale to bytes */
Ingo Molnar4d46a892008-02-21 04:24:40 +0100117 int x86_power;
118 unsigned long loops_per_jiffy;
Ingo Molnar4d46a892008-02-21 04:24:40 +0100119 /* cpuid returned max cores value: */
120 u16 x86_max_cores;
121 u16 apicid;
Yinghai Lu01aaea12008-03-06 13:46:39 -0800122 u16 initial_apicid;
Ingo Molnar4d46a892008-02-21 04:24:40 +0100123 u16 x86_clflush_size;
Ingo Molnar4d46a892008-02-21 04:24:40 +0100124 /* number of cores as seen by the OS: */
125 u16 booted_cores;
126 /* Physical processor id: */
127 u16 phys_proc_id;
Thomas Gleixner1f12e322016-02-22 22:19:15 +0000128 /* Logical processor id: */
129 u16 logical_proc_id;
Ingo Molnar4d46a892008-02-21 04:24:40 +0100130 /* Core id: */
131 u16 cpu_core_id;
132 /* Index into per_cpu list: */
133 u16 cpu_index;
Andi Kleen506ed6b2011-10-12 17:46:33 -0700134 u32 microcode;
Andi Kleen30bb9812017-11-14 07:42:56 -0500135 unsigned initialized : 1;
Kees Cook3859a272016-10-28 01:22:25 -0700136} __randomize_layout;
Glauber de Oliveira Costa5300db82008-01-30 13:31:33 +0100137
He Chen47f10a32016-11-11 17:25:34 +0800138struct cpuid_regs {
139 u32 eax, ebx, ecx, edx;
140};
141
142enum cpuid_regs_idx {
143 CPUID_EAX = 0,
144 CPUID_EBX,
145 CPUID_ECX,
146 CPUID_EDX,
147};
148
Ingo Molnar4d46a892008-02-21 04:24:40 +0100149#define X86_VENDOR_INTEL 0
150#define X86_VENDOR_CYRIX 1
151#define X86_VENDOR_AMD 2
152#define X86_VENDOR_UMC 3
Ingo Molnar4d46a892008-02-21 04:24:40 +0100153#define X86_VENDOR_CENTAUR 5
154#define X86_VENDOR_TRANSMETA 7
155#define X86_VENDOR_NSC 8
156#define X86_VENDOR_NUM 9
157
158#define X86_VENDOR_UNKNOWN 0xff
Glauber de Oliveira Costa5300db82008-01-30 13:31:33 +0100159
Glauber de Oliveira Costa1a539052008-01-30 13:31:39 +0100160/*
161 * capabilities of CPUs
162 */
Ingo Molnar4d46a892008-02-21 04:24:40 +0100163extern struct cpuinfo_x86 boot_cpu_data;
164extern struct cpuinfo_x86 new_cpu_data;
165
Andy Lutomirski7fb983b2017-12-04 15:07:17 +0100166extern struct x86_hw_tss doublefault_tss;
Thomas Gleixner6cbd2172017-12-04 15:07:32 +0100167extern __u32 cpu_caps_cleared[NCAPINTS + NBUGINTS];
168extern __u32 cpu_caps_set[NCAPINTS + NBUGINTS];
Glauber de Oliveira Costa5300db82008-01-30 13:31:33 +0100169
170#ifdef CONFIG_SMP
Jan Beulich2c773dd2014-11-04 08:26:42 +0000171DECLARE_PER_CPU_READ_MOSTLY(struct cpuinfo_x86, cpu_info);
Glauber de Oliveira Costa5300db82008-01-30 13:31:33 +0100172#define cpu_data(cpu) per_cpu(cpu_info, cpu)
Glauber de Oliveira Costa5300db82008-01-30 13:31:33 +0100173#else
Tejun Heo7b543a52010-12-18 16:30:05 +0100174#define cpu_info boot_cpu_data
Glauber de Oliveira Costa5300db82008-01-30 13:31:33 +0100175#define cpu_data(cpu) boot_cpu_data
Glauber de Oliveira Costa5300db82008-01-30 13:31:33 +0100176#endif
177
Jaswinder Singh1c6c7272008-07-21 22:40:37 +0530178extern const struct seq_operations cpuinfo_op;
179
Ingo Molnar4d46a892008-02-21 04:24:40 +0100180#define cache_line_size() (boot_cpu_data.x86_cache_alignment)
181
182extern void cpu_detect(struct cpuinfo_x86 *c);
Glauber de Oliveira Costa1a539052008-01-30 13:31:39 +0100183
Yinghai Luf5803662008-06-21 03:24:19 -0700184extern void early_cpu_init(void);
Glauber de Oliveira Costa1a539052008-01-30 13:31:39 +0100185extern void identify_boot_cpu(void);
186extern void identify_secondary_cpu(struct cpuinfo_x86 *);
Glauber de Oliveira Costa5300db82008-01-30 13:31:33 +0100187extern void print_cpu_info(struct cpuinfo_x86 *);
Yinghai Lu21c3fcf2012-02-12 09:53:57 -0800188void print_cpu_msr(struct cpuinfo_x86 *);
Glauber de Oliveira Costa1a539052008-01-30 13:31:39 +0100189
Fenghua Yud288e1c2012-12-20 23:44:23 -0800190#ifdef CONFIG_X86_32
191extern int have_cpuid_p(void);
192#else
193static inline int have_cpuid_p(void)
194{
195 return 1;
196}
197#endif
Glauber de Oliveira Costac758ecf2008-01-30 13:31:03 +0100198static inline void native_cpuid(unsigned int *eax, unsigned int *ebx,
Ingo Molnar4d46a892008-02-21 04:24:40 +0100199 unsigned int *ecx, unsigned int *edx)
Glauber de Oliveira Costac758ecf2008-01-30 13:31:03 +0100200{
201 /* ecx is often an input as well as an output. */
Suresh Siddha45a94d72009-12-16 16:25:42 -0800202 asm volatile("cpuid"
Joe Perchescca2e6f2008-03-23 01:03:15 -0700203 : "=a" (*eax),
204 "=b" (*ebx),
205 "=c" (*ecx),
206 "=d" (*edx)
Andi Kleen506ed6b2011-10-12 17:46:33 -0700207 : "0" (*eax), "2" (*ecx)
208 : "memory");
Glauber de Oliveira Costac758ecf2008-01-30 13:31:03 +0100209}
210
Borislav Petkov5dedade2017-01-09 12:41:43 +0100211#define native_cpuid_reg(reg) \
212static inline unsigned int native_cpuid_##reg(unsigned int op) \
213{ \
214 unsigned int eax = op, ebx, ecx = 0, edx; \
215 \
216 native_cpuid(&eax, &ebx, &ecx, &edx); \
217 \
218 return reg; \
219}
220
221/*
222 * Native CPUID functions returning a single datum.
223 */
224native_cpuid_reg(eax)
225native_cpuid_reg(ebx)
226native_cpuid_reg(ecx)
227native_cpuid_reg(edx)
228
Andy Lutomirski6c690ee2017-06-12 10:26:14 -0700229/*
230 * Friendlier CR3 helpers.
231 */
232static inline unsigned long read_cr3_pa(void)
233{
234 return __read_cr3() & CR3_ADDR_MASK;
235}
236
Tom Lendackyeef9c4a2017-07-17 16:10:08 -0500237static inline unsigned long native_read_cr3_pa(void)
238{
239 return __native_read_cr3() & CR3_ADDR_MASK;
240}
241
Glauber de Oliveira Costac72dcf82008-01-30 13:31:27 +0100242static inline void load_cr3(pgd_t *pgdir)
243{
Tom Lendacky21729f82017-07-17 16:10:07 -0500244 write_cr3(__sme_pa(pgdir));
Glauber de Oliveira Costac72dcf82008-01-30 13:31:27 +0100245}
Glauber de Oliveira Costac758ecf2008-01-30 13:31:03 +0100246
Andy Lutomirski7fb983b2017-12-04 15:07:17 +0100247/*
248 * Note that while the legacy 'TSS' name comes from 'Task State Segment',
249 * on modern x86 CPUs the TSS also holds information important to 64-bit mode,
250 * unrelated to the task-switch mechanism:
251 */
Thomas Gleixner96a388d2007-10-11 11:20:03 +0200252#ifdef CONFIG_X86_32
Glauber de Oliveira Costaca241c72008-01-30 13:31:31 +0100253/* This is the TSS defined by the hardware. */
254struct x86_hw_tss {
Ingo Molnar4d46a892008-02-21 04:24:40 +0100255 unsigned short back_link, __blh;
256 unsigned long sp0;
257 unsigned short ss0, __ss0h;
Andy Lutomirskicf9328c2015-04-02 12:41:45 -0700258 unsigned long sp1;
Andy Lutomirski76e4c492015-03-10 11:06:00 -0700259
260 /*
Andy Lutomirskicf9328c2015-04-02 12:41:45 -0700261 * We don't use ring 1, so ss1 is a convenient scratch space in
262 * the same cacheline as sp0. We use ss1 to cache the value in
263 * MSR_IA32_SYSENTER_CS. When we context switch
264 * MSR_IA32_SYSENTER_CS, we first check if the new value being
265 * written matches ss1, and, if it's not, then we wrmsr the new
266 * value and update ss1.
Andy Lutomirski76e4c492015-03-10 11:06:00 -0700267 *
Andy Lutomirskicf9328c2015-04-02 12:41:45 -0700268 * The only reason we context switch MSR_IA32_SYSENTER_CS is
269 * that we set it to zero in vm86 tasks to avoid corrupting the
270 * stack if we were to go through the sysenter path from vm86
271 * mode.
Andy Lutomirski76e4c492015-03-10 11:06:00 -0700272 */
Andy Lutomirski76e4c492015-03-10 11:06:00 -0700273 unsigned short ss1; /* MSR_IA32_SYSENTER_CS */
274
275 unsigned short __ss1h;
Ingo Molnar4d46a892008-02-21 04:24:40 +0100276 unsigned long sp2;
277 unsigned short ss2, __ss2h;
278 unsigned long __cr3;
279 unsigned long ip;
280 unsigned long flags;
281 unsigned long ax;
282 unsigned long cx;
283 unsigned long dx;
284 unsigned long bx;
285 unsigned long sp;
286 unsigned long bp;
287 unsigned long si;
288 unsigned long di;
289 unsigned short es, __esh;
290 unsigned short cs, __csh;
291 unsigned short ss, __ssh;
292 unsigned short ds, __dsh;
293 unsigned short fs, __fsh;
294 unsigned short gs, __gsh;
295 unsigned short ldt, __ldth;
296 unsigned short trace;
297 unsigned short io_bitmap_base;
298
Glauber de Oliveira Costaca241c72008-01-30 13:31:31 +0100299} __attribute__((packed));
300#else
301struct x86_hw_tss {
Ingo Molnar4d46a892008-02-21 04:24:40 +0100302 u32 reserved1;
303 u64 sp0;
Andy Lutomirski9aaefe72017-12-04 15:07:21 +0100304
305 /*
306 * We store cpu_current_top_of_stack in sp1 so it's always accessible.
307 * Linux does not use ring 1, so sp1 is not otherwise needed.
308 */
Ingo Molnar4d46a892008-02-21 04:24:40 +0100309 u64 sp1;
Andy Lutomirski9aaefe72017-12-04 15:07:21 +0100310
Ingo Molnar4d46a892008-02-21 04:24:40 +0100311 u64 sp2;
312 u64 reserved2;
313 u64 ist[7];
314 u32 reserved3;
315 u32 reserved4;
316 u16 reserved5;
317 u16 io_bitmap_base;
318
Andy Lutomirskid3273de2017-02-20 08:56:13 -0800319} __attribute__((packed));
Glauber de Oliveira Costaca241c72008-01-30 13:31:31 +0100320#endif
321
322/*
Ingo Molnar4d46a892008-02-21 04:24:40 +0100323 * IO-bitmap sizes:
Glauber de Oliveira Costaca241c72008-01-30 13:31:31 +0100324 */
Ingo Molnar4d46a892008-02-21 04:24:40 +0100325#define IO_BITMAP_BITS 65536
326#define IO_BITMAP_BYTES (IO_BITMAP_BITS/8)
327#define IO_BITMAP_LONGS (IO_BITMAP_BYTES/sizeof(long))
Andy Lutomirski7fb983b2017-12-04 15:07:17 +0100328#define IO_BITMAP_OFFSET (offsetof(struct tss_struct, io_bitmap) - offsetof(struct tss_struct, x86_tss))
Ingo Molnar4d46a892008-02-21 04:24:40 +0100329#define INVALID_IO_BITMAP_OFFSET 0x8000
Glauber de Oliveira Costaca241c72008-01-30 13:31:31 +0100330
Dave Hansen4fe2d8b2017-12-04 17:25:07 -0800331struct entry_stack {
Andy Lutomirski0f9a4812017-12-04 15:07:28 +0100332 unsigned long words[64];
333};
334
Dave Hansen4fe2d8b2017-12-04 17:25:07 -0800335struct entry_stack_page {
336 struct entry_stack stack;
Andy Lutomirskic482fee2017-12-04 15:07:29 +0100337} __aligned(PAGE_SIZE);
Andy Lutomirski1a935bc2017-12-04 15:07:19 +0100338
Glauber de Oliveira Costaca241c72008-01-30 13:31:31 +0100339struct tss_struct {
Ingo Molnar4d46a892008-02-21 04:24:40 +0100340 /*
Andy Lutomirski1a935bc2017-12-04 15:07:19 +0100341 * The fixed hardware portion. This must not cross a page boundary
342 * at risk of violating the SDM's advice and potentially triggering
343 * errata.
Ingo Molnar4d46a892008-02-21 04:24:40 +0100344 */
345 struct x86_hw_tss x86_tss;
Glauber de Oliveira Costaca241c72008-01-30 13:31:31 +0100346
347 /*
348 * The extra 1 is there because the CPU will access an
349 * additional byte beyond the end of the IO permission
350 * bitmap. The extra byte must be all 1 bits, and must
351 * be within the limit.
352 */
Ingo Molnar4d46a892008-02-21 04:24:40 +0100353 unsigned long io_bitmap[IO_BITMAP_LONGS + 1];
Andy Lutomirski1a935bc2017-12-04 15:07:19 +0100354} __aligned(PAGE_SIZE);
Ingo Molnar4d46a892008-02-21 04:24:40 +0100355
Andy Lutomirskic482fee2017-12-04 15:07:29 +0100356DECLARE_PER_CPU_PAGE_ALIGNED(struct tss_struct, cpu_tss_rw);
Glauber de Oliveira Costaca241c72008-01-30 13:31:31 +0100357
Andy Lutomirski4f53ab12017-02-20 08:56:09 -0800358/*
359 * sizeof(unsigned long) coming from an extra "long" at the end
360 * of the iobitmap.
361 *
362 * -1? seg base+limit should be pointing to the address of the
363 * last valid byte
364 */
365#define __KERNEL_TSS_LIMIT \
366 (IO_BITMAP_OFFSET + IO_BITMAP_BYTES + sizeof(unsigned long) - 1)
367
Andy Lutomirskia7fcf282015-03-06 17:50:19 -0800368#ifdef CONFIG_X86_32
369DECLARE_PER_CPU(unsigned long, cpu_current_top_of_stack);
Andy Lutomirski9aaefe72017-12-04 15:07:21 +0100370#else
Andy Lutomirskic482fee2017-12-04 15:07:29 +0100371/* The RO copy can't be accessed with this_cpu_xyz(), so use the RW copy. */
372#define cpu_current_top_of_stack cpu_tss_rw.x86_tss.sp1
Andy Lutomirskia7fcf282015-03-06 17:50:19 -0800373#endif
374
Ingo Molnar4d46a892008-02-21 04:24:40 +0100375/*
376 * Save the original ist values for checking stack pointers during debugging
377 */
Glauber de Oliveira Costa1a539052008-01-30 13:31:39 +0100378struct orig_ist {
Ingo Molnar4d46a892008-02-21 04:24:40 +0100379 unsigned long ist[7];
Glauber de Oliveira Costa1a539052008-01-30 13:31:39 +0100380};
381
Glauber Costafe676202008-03-03 14:12:56 -0300382#ifdef CONFIG_X86_64
Glauber de Oliveira Costa2f66dcc2008-01-30 13:31:57 +0100383DECLARE_PER_CPU(struct orig_ist, orig_ist);
Brian Gerst26f80bd2009-01-19 00:38:58 +0900384
Brian Gerst947e76c2009-01-19 12:21:28 +0900385union irq_stack_union {
386 char irq_stack[IRQ_STACK_SIZE];
387 /*
388 * GCC hardcodes the stack canary as %gs:40. Since the
389 * irq_stack is the object at %gs:0, we reserve the bottom
390 * 48 bytes of the irq stack for the canary.
391 */
392 struct {
393 char gs_base[40];
394 unsigned long stack_canary;
395 };
396};
397
Andi Kleen277d5b42013-08-05 15:02:43 -0700398DECLARE_PER_CPU_FIRST(union irq_stack_union, irq_stack_union) __visible;
Brian Gerst2add8e22009-02-08 09:58:39 -0500399DECLARE_INIT_PER_CPU(irq_stack_union);
400
Vitaly Kuznetsov35060ed2018-03-13 18:48:05 +0100401static inline unsigned long cpu_kernelmode_gs_base(int cpu)
402{
403 return (unsigned long)per_cpu(irq_stack_union.gs_base, cpu);
404}
405
Brian Gerst26f80bd2009-01-19 00:38:58 +0900406DECLARE_PER_CPU(char *, irq_stack_ptr);
Jaswinder Singh Rajput9766cdb2009-03-14 11:19:49 +0530407DECLARE_PER_CPU(unsigned int, irq_count);
Jaswinder Singh Rajput9766cdb2009-03-14 11:19:49 +0530408extern asmlinkage void ignore_sysret(void);
Vitaly Kuznetsov42b933b2018-03-13 18:48:04 +0100409
410#if IS_ENABLED(CONFIG_KVM)
411/* Save actual FS/GS selectors and bases to current->thread */
412void save_fsgs_for_kvm(void);
413#endif
Tejun Heo60a53172009-02-09 22:17:40 +0900414#else /* X86_64 */
Linus Torvalds050e9ba2018-06-14 12:21:18 +0900415#ifdef CONFIG_STACKPROTECTOR
Jeremy Fitzhardinge1ea0d142009-09-03 12:27:15 -0700416/*
417 * Make sure stack canary segment base is cached-aligned:
418 * "For Intel Atom processors, avoid non zero segment base address
419 * that is not aligned to cache line boundary at all cost."
420 * (Optim Ref Manual Assembly/Compiler Coding Rule 15.)
421 */
422struct stack_canary {
423 char __pad[20]; /* canary at %gs:20 */
424 unsigned long canary;
425};
Jeremy Fitzhardinge53f82452009-09-03 14:31:44 -0700426DECLARE_PER_CPU_ALIGNED(struct stack_canary, stack_canary);
Thomas Gleixner96a388d2007-10-11 11:20:03 +0200427#endif
Steven Rostedt198d2082014-02-06 09:41:31 -0500428/*
429 * per-CPU IRQ handling stacks
430 */
431struct irq_stack {
432 u32 stack[THREAD_SIZE/sizeof(u32)];
433} __aligned(THREAD_SIZE);
434
435DECLARE_PER_CPU(struct irq_stack *, hardirq_stack);
436DECLARE_PER_CPU(struct irq_stack *, softirq_stack);
Tejun Heo60a53172009-02-09 22:17:40 +0900437#endif /* X86_64 */
Glauber de Oliveira Costac758ecf2008-01-30 13:31:03 +0100438
Fenghua Yubf15a8c2016-05-20 10:47:06 -0700439extern unsigned int fpu_kernel_xstate_size;
Fenghua Yua1141e02016-05-20 10:47:05 -0700440extern unsigned int fpu_user_xstate_size;
Glauber de Oliveira Costa683e0252008-01-30 13:31:27 +0100441
Frederic Weisbecker24f1e32c2009-09-09 19:22:48 +0200442struct perf_event;
443
Andy Lutomirski13d4ea02016-07-14 13:22:57 -0700444typedef struct {
445 unsigned long seg;
446} mm_segment_t;
447
Glauber de Oliveira Costacb38d372008-01-30 13:31:31 +0100448struct thread_struct {
Ingo Molnar4d46a892008-02-21 04:24:40 +0100449 /* Cached TLS descriptors: */
450 struct desc_struct tls_array[GDT_ENTRY_TLS_ENTRIES];
Andy Lutomirskid375cf12017-11-02 00:59:16 -0700451#ifdef CONFIG_X86_32
Ingo Molnar4d46a892008-02-21 04:24:40 +0100452 unsigned long sp0;
Andy Lutomirskid375cf12017-11-02 00:59:16 -0700453#endif
Ingo Molnar4d46a892008-02-21 04:24:40 +0100454 unsigned long sp;
Glauber de Oliveira Costacb38d372008-01-30 13:31:31 +0100455#ifdef CONFIG_X86_32
Ingo Molnar4d46a892008-02-21 04:24:40 +0100456 unsigned long sysenter_cs;
Glauber de Oliveira Costacb38d372008-01-30 13:31:31 +0100457#else
Ingo Molnar4d46a892008-02-21 04:24:40 +0100458 unsigned short es;
459 unsigned short ds;
460 unsigned short fsindex;
461 unsigned short gsindex;
Glauber de Oliveira Costacb38d372008-01-30 13:31:31 +0100462#endif
Andy Lutomirskib9d989c2016-09-13 14:29:21 -0700463
Alexey Dobriyand756f4ad2009-05-04 03:29:52 +0400464#ifdef CONFIG_X86_64
Andy Lutomirski296f7812016-04-26 12:23:29 -0700465 unsigned long fsbase;
466 unsigned long gsbase;
467#else
468 /*
469 * XXX: this could presumably be unsigned short. Alternatively,
470 * 32-bit kernels could be taught to use fsindex instead.
471 */
472 unsigned long fs;
473 unsigned long gs;
Alexey Dobriyand756f4ad2009-05-04 03:29:52 +0400474#endif
Ingo Molnarc5bedc62015-04-23 12:49:20 +0200475
Frederic Weisbecker24f1e32c2009-09-09 19:22:48 +0200476 /* Save middle states of ptrace breakpoints */
477 struct perf_event *ptrace_bps[HBP_NUM];
478 /* Debug status used for traps, single steps, etc... */
479 unsigned long debugreg6;
Frederic Weisbecker326264a2010-02-18 18:24:18 +0100480 /* Keep track of the exact dr7 value set by the user */
481 unsigned long ptrace_dr7;
Ingo Molnar4d46a892008-02-21 04:24:40 +0100482 /* Fault info: */
483 unsigned long cr2;
Srikar Dronamraju51e7dc72012-03-12 14:55:55 +0530484 unsigned long trap_nr;
Ingo Molnar4d46a892008-02-21 04:24:40 +0100485 unsigned long error_code;
Brian Gerst9fda6a02015-07-29 01:41:16 -0400486#ifdef CONFIG_VM86
Ingo Molnar4d46a892008-02-21 04:24:40 +0100487 /* Virtual 86 mode info */
Brian Gerst9fda6a02015-07-29 01:41:16 -0400488 struct vm86 *vm86;
Glauber de Oliveira Costacb38d372008-01-30 13:31:31 +0100489#endif
Ingo Molnar4d46a892008-02-21 04:24:40 +0100490 /* IO permissions: */
491 unsigned long *io_bitmap_ptr;
492 unsigned long iopl;
493 /* Max allowed port in the bitmap, in bytes: */
494 unsigned io_bitmap_max;
Dave Hansen0c8c0f02015-07-17 12:28:11 +0200495
Andy Lutomirski13d4ea02016-07-14 13:22:57 -0700496 mm_segment_t addr_limit;
497
Ingo Molnar2a53ccb2016-07-15 10:21:11 +0200498 unsigned int sig_on_uaccess_err:1;
Andy Lutomirskidfa9a942016-07-14 13:22:56 -0700499 unsigned int uaccess_err:1; /* uaccess failed */
500
Dave Hansen0c8c0f02015-07-17 12:28:11 +0200501 /* Floating point and extended processor state */
502 struct fpu fpu;
503 /*
504 * WARNING: 'fpu' is dynamically-sized. It *MUST* be at
505 * the end.
506 */
Glauber de Oliveira Costacb38d372008-01-30 13:31:31 +0100507};
508
Kees Cookf7d83c12017-08-16 13:26:03 -0700509/* Whitelist the FPU state from the task_struct for hardened usercopy. */
510static inline void arch_thread_struct_whitelist(unsigned long *offset,
511 unsigned long *size)
512{
513 *offset = offsetof(struct thread_struct, fpu.state);
514 *size = fpu_kernel_xstate_size;
515}
516
Glauber de Oliveira Costa62d7d7e2008-01-30 13:31:27 +0100517/*
Andy Lutomirskib9d989c2016-09-13 14:29:21 -0700518 * Thread-synchronous status.
519 *
520 * This is different from the flags in that nobody else
521 * ever touches our thread-synchronous status, so we don't
522 * have to worry about atomic accesses.
523 */
524#define TS_COMPAT 0x0002 /* 32bit syscall active (64BIT)*/
525
526/*
Glauber de Oliveira Costa62d7d7e2008-01-30 13:31:27 +0100527 * Set IOPL bits in EFLAGS from given mask
528 */
529static inline void native_set_iopl_mask(unsigned mask)
530{
531#ifdef CONFIG_X86_32
532 unsigned int reg;
Ingo Molnar4d46a892008-02-21 04:24:40 +0100533
Joe Perchescca2e6f2008-03-23 01:03:15 -0700534 asm volatile ("pushfl;"
535 "popl %0;"
536 "andl %1, %0;"
537 "orl %2, %0;"
538 "pushl %0;"
539 "popfl"
540 : "=&r" (reg)
541 : "i" (~X86_EFLAGS_IOPL), "r" (mask));
Glauber de Oliveira Costa62d7d7e2008-01-30 13:31:27 +0100542#endif
543}
544
Ingo Molnar4d46a892008-02-21 04:24:40 +0100545static inline void
Andy Lutomirskida51da12017-11-02 00:59:10 -0700546native_load_sp0(unsigned long sp0)
Glauber de Oliveira Costa7818a1e2008-01-30 13:31:31 +0100547{
Andy Lutomirskic482fee2017-12-04 15:07:29 +0100548 this_cpu_write(cpu_tss_rw.x86_tss.sp0, sp0);
Glauber de Oliveira Costa7818a1e2008-01-30 13:31:31 +0100549}
Glauber de Oliveira Costa1b46cbe2008-01-30 13:31:27 +0100550
Glauber de Oliveira Costae801f862008-01-30 13:32:08 +0100551static inline void native_swapgs(void)
552{
553#ifdef CONFIG_X86_64
554 asm volatile("swapgs" ::: "memory");
555#endif
556}
557
Andy Lutomirskia7fcf282015-03-06 17:50:19 -0800558static inline unsigned long current_top_of_stack(void)
Andy Lutomirski8ef46a62015-03-05 19:19:02 -0800559{
Andy Lutomirski9aaefe72017-12-04 15:07:21 +0100560 /*
561 * We can't read directly from tss.sp0: sp0 on x86_32 is special in
562 * and around vm86 mode and sp0 on x86_64 is special because of the
563 * entry trampoline.
564 */
Andy Lutomirskia7fcf282015-03-06 17:50:19 -0800565 return this_cpu_read_stable(cpu_current_top_of_stack);
Andy Lutomirski8ef46a62015-03-05 19:19:02 -0800566}
567
Andy Lutomirski33836422017-11-02 00:59:17 -0700568static inline bool on_thread_stack(void)
569{
570 return (unsigned long)(current_top_of_stack() -
571 current_stack_pointer) < THREAD_SIZE;
572}
573
Glauber de Oliveira Costa7818a1e2008-01-30 13:31:31 +0100574#ifdef CONFIG_PARAVIRT
575#include <asm/paravirt.h>
576#else
Ingo Molnar4d46a892008-02-21 04:24:40 +0100577#define __cpuid native_cpuid
Glauber de Oliveira Costa1b46cbe2008-01-30 13:31:27 +0100578
Andy Lutomirskida51da12017-11-02 00:59:10 -0700579static inline void load_sp0(unsigned long sp0)
Glauber de Oliveira Costa7818a1e2008-01-30 13:31:31 +0100580{
Andy Lutomirskida51da12017-11-02 00:59:10 -0700581 native_load_sp0(sp0);
Glauber de Oliveira Costa7818a1e2008-01-30 13:31:31 +0100582}
583
Glauber de Oliveira Costa62d7d7e2008-01-30 13:31:27 +0100584#define set_iopl_mask native_set_iopl_mask
Glauber de Oliveira Costa1b46cbe2008-01-30 13:31:27 +0100585#endif /* CONFIG_PARAVIRT */
586
Glauber de Oliveira Costa683e0252008-01-30 13:31:27 +0100587/* Free all resources held by a thread. */
588extern void release_thread(struct task_struct *);
589
Glauber de Oliveira Costa683e0252008-01-30 13:31:27 +0100590unsigned long get_wchan(struct task_struct *p);
Glauber de Oliveira Costac758ecf2008-01-30 13:31:03 +0100591
592/*
593 * Generic CPUID function
594 * clear %ecx since some cpus (Cyrix MII) do not set or clear %ecx
595 * resulting in stale register contents being returned.
596 */
597static inline void cpuid(unsigned int op,
598 unsigned int *eax, unsigned int *ebx,
599 unsigned int *ecx, unsigned int *edx)
600{
601 *eax = op;
602 *ecx = 0;
603 __cpuid(eax, ebx, ecx, edx);
604}
605
606/* Some CPUID calls want 'count' to be placed in ecx */
607static inline void cpuid_count(unsigned int op, int count,
608 unsigned int *eax, unsigned int *ebx,
609 unsigned int *ecx, unsigned int *edx)
610{
611 *eax = op;
612 *ecx = count;
613 __cpuid(eax, ebx, ecx, edx);
614}
615
616/*
617 * CPUID functions returning a single datum
618 */
619static inline unsigned int cpuid_eax(unsigned int op)
620{
621 unsigned int eax, ebx, ecx, edx;
622
623 cpuid(op, &eax, &ebx, &ecx, &edx);
Ingo Molnar4d46a892008-02-21 04:24:40 +0100624
Glauber de Oliveira Costac758ecf2008-01-30 13:31:03 +0100625 return eax;
626}
Ingo Molnar4d46a892008-02-21 04:24:40 +0100627
Glauber de Oliveira Costac758ecf2008-01-30 13:31:03 +0100628static inline unsigned int cpuid_ebx(unsigned int op)
629{
630 unsigned int eax, ebx, ecx, edx;
631
632 cpuid(op, &eax, &ebx, &ecx, &edx);
Ingo Molnar4d46a892008-02-21 04:24:40 +0100633
Glauber de Oliveira Costac758ecf2008-01-30 13:31:03 +0100634 return ebx;
635}
Ingo Molnar4d46a892008-02-21 04:24:40 +0100636
Glauber de Oliveira Costac758ecf2008-01-30 13:31:03 +0100637static inline unsigned int cpuid_ecx(unsigned int op)
638{
639 unsigned int eax, ebx, ecx, edx;
640
641 cpuid(op, &eax, &ebx, &ecx, &edx);
Ingo Molnar4d46a892008-02-21 04:24:40 +0100642
Glauber de Oliveira Costac758ecf2008-01-30 13:31:03 +0100643 return ecx;
644}
Ingo Molnar4d46a892008-02-21 04:24:40 +0100645
Glauber de Oliveira Costac758ecf2008-01-30 13:31:03 +0100646static inline unsigned int cpuid_edx(unsigned int op)
647{
648 unsigned int eax, ebx, ecx, edx;
649
650 cpuid(op, &eax, &ebx, &ecx, &edx);
Ingo Molnar4d46a892008-02-21 04:24:40 +0100651
Glauber de Oliveira Costac758ecf2008-01-30 13:31:03 +0100652 return edx;
653}
654
Glauber de Oliveira Costa683e0252008-01-30 13:31:27 +0100655/* REP NOP (PAUSE) is a good thing to insert into busy-wait loops. */
Denys Vlasenko0b101e62015-09-24 14:02:29 +0200656static __always_inline void rep_nop(void)
Glauber de Oliveira Costa683e0252008-01-30 13:31:27 +0100657{
Joe Perchescca2e6f2008-03-23 01:03:15 -0700658 asm volatile("rep; nop" ::: "memory");
Glauber de Oliveira Costa683e0252008-01-30 13:31:27 +0100659}
660
Denys Vlasenko0b101e62015-09-24 14:02:29 +0200661static __always_inline void cpu_relax(void)
Ingo Molnar4d46a892008-02-21 04:24:40 +0100662{
663 rep_nop();
664}
665
Andy Lutomirskic198b122016-12-09 10:24:08 -0800666/*
667 * This function forces the icache and prefetched instruction stream to
668 * catch up with reality in two very specific cases:
669 *
670 * a) Text was modified using one virtual address and is about to be executed
671 * from the same physical page at a different virtual address.
672 *
673 * b) Text was modified on a different CPU, may subsequently be
674 * executed on this CPU, and you want to make sure the new version
675 * gets executed. This generally means you're calling this in a IPI.
676 *
677 * If you're calling this for a different reason, you're probably doing
678 * it wrong.
679 */
Glauber de Oliveira Costa683e0252008-01-30 13:31:27 +0100680static inline void sync_core(void)
681{
Andy Lutomirskic198b122016-12-09 10:24:08 -0800682 /*
683 * There are quite a few ways to do this. IRET-to-self is nice
684 * because it works on every CPU, at any CPL (so it's compatible
685 * with paravirtualization), and it never exits to a hypervisor.
686 * The only down sides are that it's a bit slow (it seems to be
687 * a bit more than 2x slower than the fastest options) and that
688 * it unmasks NMIs. The "push %cs" is needed because, in
689 * paravirtual environments, __KERNEL_CS may not be a valid CS
690 * value when we do IRET directly.
691 *
692 * In case NMI unmasking or performance ever becomes a problem,
693 * the next best option appears to be MOV-to-CR2 and an
694 * unconditional jump. That sequence also works on all CPUs,
Juergen Grossecda85e2017-08-16 19:31:57 +0200695 * but it will fault at CPL3 (i.e. Xen PV).
Andy Lutomirskic198b122016-12-09 10:24:08 -0800696 *
697 * CPUID is the conventional way, but it's nasty: it doesn't
698 * exist on some 486-like CPUs, and it usually exits to a
699 * hypervisor.
700 *
701 * Like all of Linux's memory ordering operations, this is a
702 * compiler barrier as well.
703 */
Andy Lutomirski1c52d852016-12-09 10:24:05 -0800704#ifdef CONFIG_X86_32
Andy Lutomirskic198b122016-12-09 10:24:08 -0800705 asm volatile (
706 "pushfl\n\t"
707 "pushl %%cs\n\t"
708 "pushl $1f\n\t"
709 "iret\n\t"
710 "1:"
Josh Poimboeuff5caf622017-09-20 16:24:33 -0500711 : ASM_CALL_CONSTRAINT : : "memory");
H. Peter Anvin45c39fb2012-11-28 11:50:30 -0800712#else
Andy Lutomirskic198b122016-12-09 10:24:08 -0800713 unsigned int tmp;
714
715 asm volatile (
Josh Poimboeuf76846bf2017-07-11 10:33:45 -0500716 UNWIND_HINT_SAVE
Andy Lutomirskic198b122016-12-09 10:24:08 -0800717 "mov %%ss, %0\n\t"
718 "pushq %q0\n\t"
719 "pushq %%rsp\n\t"
720 "addq $8, (%%rsp)\n\t"
721 "pushfq\n\t"
722 "mov %%cs, %0\n\t"
723 "pushq %q0\n\t"
724 "pushq $1f\n\t"
725 "iretq\n\t"
Josh Poimboeuf76846bf2017-07-11 10:33:45 -0500726 UNWIND_HINT_RESTORE
Andy Lutomirskic198b122016-12-09 10:24:08 -0800727 "1:"
Josh Poimboeuff5caf622017-09-20 16:24:33 -0500728 : "=&r" (tmp), ASM_CALL_CONSTRAINT : : "cc", "memory");
Ben Hutchings5367b682009-09-10 02:53:50 +0100729#endif
Glauber de Oliveira Costa683e0252008-01-30 13:31:27 +0100730}
731
Glauber de Oliveira Costa683e0252008-01-30 13:31:27 +0100732extern void select_idle_routine(const struct cpuinfo_x86 *c);
Borislav Petkov07c94a32016-12-09 19:29:11 +0100733extern void amd_e400_c1e_apic_setup(void);
Glauber de Oliveira Costa683e0252008-01-30 13:31:27 +0100734
Ingo Molnar4d46a892008-02-21 04:24:40 +0100735extern unsigned long boot_option_idle_override;
Glauber de Oliveira Costa683e0252008-01-30 13:31:27 +0100736
Thomas Renningerd1896042010-11-03 17:06:14 +0100737enum idle_boot_override {IDLE_NO_OVERRIDE=0, IDLE_HALT, IDLE_NOMWAIT,
Len Brown69fb3672013-02-10 01:38:39 -0500738 IDLE_POLL};
Thomas Renningerd1896042010-11-03 17:06:14 +0100739
Glauber de Oliveira Costa1a539052008-01-30 13:31:39 +0100740extern void enable_sep_cpu(void);
741extern int sysenter_setup(void);
742
H. Peter Anvin8170e6b2013-01-24 12:19:52 -0800743void early_trap_pf_init(void);
Jan Kiszka29c84392010-05-20 21:04:29 -0500744
Glauber de Oliveira Costa1a539052008-01-30 13:31:39 +0100745/* Defined in head.S */
Ingo Molnar4d46a892008-02-21 04:24:40 +0100746extern struct desc_ptr early_gdt_descr;
Glauber de Oliveira Costa1a539052008-01-30 13:31:39 +0100747
Brian Gerst552be872009-01-30 17:47:53 +0900748extern void switch_to_new_gdt(int);
Thomas Garnier45fc8752017-03-14 10:05:08 -0700749extern void load_direct_gdt(int);
Thomas Garnier69218e42017-03-14 10:05:07 -0700750extern void load_fixmap_gdt(int);
Jeremy Fitzhardinge11e3a842009-01-30 17:47:54 +0900751extern void load_percpu_segment(int);
Glauber de Oliveira Costa1a539052008-01-30 13:31:39 +0100752extern void cpu_init(void);
Glauber de Oliveira Costa1a539052008-01-30 13:31:39 +0100753
Markus Metzgerc2724772008-12-11 13:49:59 +0100754static inline unsigned long get_debugctlmsr(void)
755{
Peter Zijlstraea8e61b2010-03-25 14:51:51 +0100756 unsigned long debugctlmsr = 0;
Markus Metzgerc2724772008-12-11 13:49:59 +0100757
758#ifndef CONFIG_X86_DEBUGCTLMSR
759 if (boot_cpu_data.x86 < 6)
760 return 0;
761#endif
762 rdmsrl(MSR_IA32_DEBUGCTLMSR, debugctlmsr);
763
Peter Zijlstraea8e61b2010-03-25 14:51:51 +0100764 return debugctlmsr;
Markus Metzgerc2724772008-12-11 13:49:59 +0100765}
766
Jan Beulich5b0e5082008-03-10 13:11:17 +0000767static inline void update_debugctlmsr(unsigned long debugctlmsr)
768{
769#ifndef CONFIG_X86_DEBUGCTLMSR
770 if (boot_cpu_data.x86 < 6)
771 return;
772#endif
773 wrmsrl(MSR_IA32_DEBUGCTLMSR, debugctlmsr);
774}
775
Oleg Nesterov9bd11902012-09-03 15:24:17 +0200776extern void set_task_blockstep(struct task_struct *task, bool on);
777
Ingo Molnar4d46a892008-02-21 04:24:40 +0100778/* Boot loader type from the setup header: */
779extern int bootloader_type;
H. Peter Anvin50312962009-05-07 16:54:11 -0700780extern int bootloader_version;
Glauber de Oliveira Costa1a539052008-01-30 13:31:39 +0100781
Ingo Molnar4d46a892008-02-21 04:24:40 +0100782extern char ignore_fpu_irq;
Glauber de Oliveira Costa683e0252008-01-30 13:31:27 +0100783
784#define HAVE_ARCH_PICK_MMAP_LAYOUT 1
785#define ARCH_HAS_PREFETCHW
786#define ARCH_HAS_SPINLOCK_PREFETCH
787
Glauber de Oliveira Costaae2e15e2008-01-30 13:31:40 +0100788#ifdef CONFIG_X86_32
Borislav Petkova930dc42015-01-18 17:48:18 +0100789# define BASE_PREFETCH ""
Ingo Molnar4d46a892008-02-21 04:24:40 +0100790# define ARCH_HAS_PREFETCH
Glauber de Oliveira Costaae2e15e2008-01-30 13:31:40 +0100791#else
Borislav Petkova930dc42015-01-18 17:48:18 +0100792# define BASE_PREFETCH "prefetcht0 %P1"
Glauber de Oliveira Costaae2e15e2008-01-30 13:31:40 +0100793#endif
794
Ingo Molnar4d46a892008-02-21 04:24:40 +0100795/*
796 * Prefetch instructions for Pentium III (+) and AMD Athlon (+)
797 *
798 * It's not worth to care about 3dnow prefetches for the K6
799 * because they are microcoded there and very slow.
800 */
Glauber de Oliveira Costaae2e15e2008-01-30 13:31:40 +0100801static inline void prefetch(const void *x)
802{
Borislav Petkova930dc42015-01-18 17:48:18 +0100803 alternative_input(BASE_PREFETCH, "prefetchnta %P1",
Glauber de Oliveira Costaae2e15e2008-01-30 13:31:40 +0100804 X86_FEATURE_XMM,
Borislav Petkova930dc42015-01-18 17:48:18 +0100805 "m" (*(const char *)x));
Glauber de Oliveira Costaae2e15e2008-01-30 13:31:40 +0100806}
807
Ingo Molnar4d46a892008-02-21 04:24:40 +0100808/*
809 * 3dnow prefetch to get an exclusive cache line.
810 * Useful for spinlocks to avoid one state transition in the
811 * cache coherency protocol:
812 */
Glauber de Oliveira Costaae2e15e2008-01-30 13:31:40 +0100813static inline void prefetchw(const void *x)
814{
Borislav Petkova930dc42015-01-18 17:48:18 +0100815 alternative_input(BASE_PREFETCH, "prefetchw %P1",
816 X86_FEATURE_3DNOWPREFETCH,
817 "m" (*(const char *)x));
Glauber de Oliveira Costaae2e15e2008-01-30 13:31:40 +0100818}
819
Ingo Molnar4d46a892008-02-21 04:24:40 +0100820static inline void spin_lock_prefetch(const void *x)
821{
822 prefetchw(x);
823}
824
Andy Lutomirskid9e05cc2015-03-10 11:05:59 -0700825#define TOP_OF_INIT_STACK ((unsigned long)&init_stack + sizeof(init_stack) - \
826 TOP_OF_KERNEL_STACK_PADDING)
827
Andy Lutomirski35001302017-11-02 00:59:11 -0700828#define task_top_of_stack(task) ((unsigned long)(task_pt_regs(task) + 1))
829
Andy Lutomirskid375cf12017-11-02 00:59:16 -0700830#define task_pt_regs(task) \
831({ \
832 unsigned long __ptr = (unsigned long)task_stack_page(task); \
833 __ptr += THREAD_SIZE - TOP_OF_KERNEL_STACK_PADDING; \
834 ((struct pt_regs *)__ptr) - 1; \
835})
836
Glauber de Oliveira Costa2f66dcc2008-01-30 13:31:57 +0100837#ifdef CONFIG_X86_32
838/*
839 * User space process size: 3GB (default).
840 */
Dmitry Safonov8f3e4742017-03-06 17:17:18 +0300841#define IA32_PAGE_OFFSET PAGE_OFFSET
Ingo Molnar4d46a892008-02-21 04:24:40 +0100842#define TASK_SIZE PAGE_OFFSET
Kirill A. Shutemovb569bab2017-07-17 01:59:52 +0300843#define TASK_SIZE_LOW TASK_SIZE
Ingo Molnard9517342009-02-20 23:32:28 +0100844#define TASK_SIZE_MAX TASK_SIZE
Kirill A. Shutemov44b04912017-07-17 01:59:51 +0300845#define DEFAULT_MAP_WINDOW TASK_SIZE
Ingo Molnar4d46a892008-02-21 04:24:40 +0100846#define STACK_TOP TASK_SIZE
847#define STACK_TOP_MAX STACK_TOP
Glauber de Oliveira Costa2f66dcc2008-01-30 13:31:57 +0100848
Ingo Molnar4d46a892008-02-21 04:24:40 +0100849#define INIT_THREAD { \
Andy Lutomirskid9e05cc2015-03-10 11:05:59 -0700850 .sp0 = TOP_OF_INIT_STACK, \
Ingo Molnar4d46a892008-02-21 04:24:40 +0100851 .sysenter_cs = __KERNEL_CS, \
852 .io_bitmap_ptr = NULL, \
Andy Lutomirski13d4ea02016-07-14 13:22:57 -0700853 .addr_limit = KERNEL_DS, \
Glauber de Oliveira Costa2f66dcc2008-01-30 13:31:57 +0100854}
855
Ingo Molnar4d46a892008-02-21 04:24:40 +0100856#define KSTK_ESP(task) (task_pt_regs(task)->sp)
Glauber de Oliveira Costa2f66dcc2008-01-30 13:31:57 +0100857
858#else
859/*
Andy Lutomirskif55f0502017-12-12 07:56:45 -0800860 * User space process size. This is the first address outside the user range.
861 * There are a few constraints that determine this:
862 *
863 * On Intel CPUs, if a SYSCALL instruction is at the highest canonical
864 * address, then that syscall will enter the kernel with a
865 * non-canonical return address, and SYSRET will explode dangerously.
866 * We avoid this particular problem by preventing anything executable
867 * from being mapped at the maximum canonical address.
868 *
869 * On AMD CPUs in the Ryzen family, there's a nasty bug in which the
870 * CPUs malfunction if they execute code from the highest canonical page.
871 * They'll speculate right off the end of the canonical space, and
872 * bad things happen. This is worked around in the same way as the
873 * Intel problem.
874 *
875 * With page table isolation enabled, we map the LDT in ... [stay tuned]
Glauber de Oliveira Costa2f66dcc2008-01-30 13:31:57 +0100876 */
Kirill A. Shutemovee00f4a2017-07-17 01:59:53 +0300877#define TASK_SIZE_MAX ((1UL << __VIRTUAL_MASK_SHIFT) - PAGE_SIZE)
Glauber de Oliveira Costa2f66dcc2008-01-30 13:31:57 +0100878
Kirill A. Shutemovee00f4a2017-07-17 01:59:53 +0300879#define DEFAULT_MAP_WINDOW ((1UL << 47) - PAGE_SIZE)
Glauber de Oliveira Costa2f66dcc2008-01-30 13:31:57 +0100880
881/* This decides where the kernel will search for a free chunk of vm
882 * space during mmap's.
883 */
Ingo Molnar4d46a892008-02-21 04:24:40 +0100884#define IA32_PAGE_OFFSET ((current->personality & ADDR_LIMIT_3GB) ? \
885 0xc0000000 : 0xFFFFe000)
Glauber de Oliveira Costa2f66dcc2008-01-30 13:31:57 +0100886
Kirill A. Shutemovb569bab2017-07-17 01:59:52 +0300887#define TASK_SIZE_LOW (test_thread_flag(TIF_ADDR32) ? \
888 IA32_PAGE_OFFSET : DEFAULT_MAP_WINDOW)
H. Peter Anvin6bd33002012-02-06 13:03:09 -0800889#define TASK_SIZE (test_thread_flag(TIF_ADDR32) ? \
Ingo Molnard9517342009-02-20 23:32:28 +0100890 IA32_PAGE_OFFSET : TASK_SIZE_MAX)
H. Peter Anvin6bd33002012-02-06 13:03:09 -0800891#define TASK_SIZE_OF(child) ((test_tsk_thread_flag(child, TIF_ADDR32)) ? \
Ingo Molnard9517342009-02-20 23:32:28 +0100892 IA32_PAGE_OFFSET : TASK_SIZE_MAX)
Glauber de Oliveira Costa2f66dcc2008-01-30 13:31:57 +0100893
Kirill A. Shutemovb569bab2017-07-17 01:59:52 +0300894#define STACK_TOP TASK_SIZE_LOW
Ingo Molnard9517342009-02-20 23:32:28 +0100895#define STACK_TOP_MAX TASK_SIZE_MAX
David Howells922a70d2008-02-08 04:19:26 -0800896
Andy Lutomirski13d4ea02016-07-14 13:22:57 -0700897#define INIT_THREAD { \
Andy Lutomirski13d4ea02016-07-14 13:22:57 -0700898 .addr_limit = KERNEL_DS, \
Glauber de Oliveira Costa2f66dcc2008-01-30 13:31:57 +0100899}
900
Stefani Seibold89240ba2009-11-03 10:22:40 +0100901extern unsigned long KSTK_ESP(struct task_struct *task);
H. J. Lud046ff82012-02-14 13:49:48 -0800902
Glauber de Oliveira Costa2f66dcc2008-01-30 13:31:57 +0100903#endif /* CONFIG_X86_64 */
904
Ingo Molnar513ad842008-02-21 05:18:40 +0100905extern void start_thread(struct pt_regs *regs, unsigned long new_ip,
906 unsigned long new_sp);
907
Ingo Molnar4d46a892008-02-21 04:24:40 +0100908/*
909 * This decides where the kernel will search for a free chunk of vm
Glauber de Oliveira Costa683e0252008-01-30 13:31:27 +0100910 * space during mmap's.
911 */
Dmitry Safonov8f3e4742017-03-06 17:17:18 +0300912#define __TASK_UNMAPPED_BASE(task_size) (PAGE_ALIGN(task_size / 3))
Kirill A. Shutemovb569bab2017-07-17 01:59:52 +0300913#define TASK_UNMAPPED_BASE __TASK_UNMAPPED_BASE(TASK_SIZE_LOW)
Glauber de Oliveira Costa683e0252008-01-30 13:31:27 +0100914
Ingo Molnar4d46a892008-02-21 04:24:40 +0100915#define KSTK_EIP(task) (task_pt_regs(task)->ip)
Glauber de Oliveira Costa683e0252008-01-30 13:31:27 +0100916
Erik Bosman529e25f2008-04-14 00:24:18 +0200917/* Get/set a process' ability to use the timestamp counter instruction */
918#define GET_TSC_CTL(adr) get_tsc_mode((adr))
919#define SET_TSC_CTL(val) set_tsc_mode((val))
920
921extern int get_tsc_mode(unsigned long adr);
922extern int set_tsc_mode(unsigned int val);
923
Kyle Hueye9ea1e72017-03-20 01:16:26 -0700924DECLARE_PER_CPU(u64, msr_misc_features_shadow);
925
Dave Hansenfe3d1972014-11-14 07:18:29 -0800926/* Register/unregister a process' MPX related resource */
Dave Hansen46a6e0c2015-06-07 11:37:02 -0700927#define MPX_ENABLE_MANAGEMENT() mpx_enable_management()
928#define MPX_DISABLE_MANAGEMENT() mpx_disable_management()
Dave Hansenfe3d1972014-11-14 07:18:29 -0800929
930#ifdef CONFIG_X86_INTEL_MPX
Dave Hansen46a6e0c2015-06-07 11:37:02 -0700931extern int mpx_enable_management(void);
932extern int mpx_disable_management(void);
Dave Hansenfe3d1972014-11-14 07:18:29 -0800933#else
Dave Hansen46a6e0c2015-06-07 11:37:02 -0700934static inline int mpx_enable_management(void)
Dave Hansenfe3d1972014-11-14 07:18:29 -0800935{
936 return -EINVAL;
937}
Dave Hansen46a6e0c2015-06-07 11:37:02 -0700938static inline int mpx_disable_management(void)
Dave Hansenfe3d1972014-11-14 07:18:29 -0800939{
940 return -EINVAL;
941}
942#endif /* CONFIG_X86_INTEL_MPX */
943
Borislav Petkovbc8e80d2017-06-13 18:28:30 +0200944#ifdef CONFIG_CPU_SUP_AMD
Daniel J Blueman8b84c8d2012-11-27 14:32:10 +0800945extern u16 amd_get_nb_id(int cpu);
Aravind Gopalakrishnancc2749e2015-06-15 10:28:15 +0200946extern u32 amd_get_nodes_per_socket(void);
Borislav Petkovbc8e80d2017-06-13 18:28:30 +0200947#else
948static inline u16 amd_get_nb_id(int cpu) { return 0; }
949static inline u32 amd_get_nodes_per_socket(void) { return 0; }
950#endif
Andreas Herrmann6a812692009-09-16 11:33:40 +0200951
Jason Wang96e39ac2013-07-25 16:54:32 +0800952static inline uint32_t hypervisor_cpuid_base(const char *sig, uint32_t leaves)
953{
954 uint32_t base, eax, signature[3];
955
956 for (base = 0x40000000; base < 0x40010000; base += 0x100) {
957 cpuid(base, &eax, &signature[0], &signature[1], &signature[2]);
958
959 if (!memcmp(sig, signature, 12) &&
960 (leaves == 0 || ((eax - base) >= leaves)))
961 return base;
962 }
963
964 return 0;
965}
966
David Howellsf05e7982012-03-28 18:11:12 +0100967extern unsigned long arch_align_stack(unsigned long sp);
968extern void free_init_pages(char *what, unsigned long begin, unsigned long end);
Dave Hansen6ea27382018-08-02 15:58:29 -0700969extern void free_kernel_image_pages(void *begin, void *end);
David Howellsf05e7982012-03-28 18:11:12 +0100970
971void default_idle(void);
Len Brown6a377dd2013-02-09 23:08:07 -0500972#ifdef CONFIG_XEN
973bool xen_set_default_idle(void);
974#else
975#define xen_set_default_idle 0
976#endif
David Howellsf05e7982012-03-28 18:11:12 +0100977
978void stop_this_cpu(void *dummy);
Borislav Petkov4d067d82013-05-09 12:02:29 +0200979void df_debug(struct pt_regs *regs, long error_code);
Borislav Petkov1008c522018-02-16 12:26:39 +0100980void microcode_check(void);
H. Peter Anvin1965aae2008-10-22 22:26:29 -0700981#endif /* _ASM_X86_PROCESSOR_H */