blob: b2bb1d691efc54139d9635b42a11df53de4b035d [file] [log] [blame]
Greg Kroah-Hartmanb2441312017-11-01 15:07:57 +01001/* SPDX-License-Identifier: GPL-2.0 */
H. Peter Anvin1965aae2008-10-22 22:26:29 -07002#ifndef _ASM_X86_PROCESSOR_H
3#define _ASM_X86_PROCESSOR_H
Glauber de Oliveira Costac758ecf2008-01-30 13:31:03 +01004
Glauber de Oliveira Costa053de042008-01-30 13:31:27 +01005#include <asm/processor-flags.h>
6
Glauber de Oliveira Costa683e0252008-01-30 13:31:27 +01007/* Forward declaration, a strange C thing */
8struct task_struct;
9struct mm_struct;
Brian Gerst9fda6a02015-07-29 01:41:16 -040010struct vm86;
Glauber de Oliveira Costa683e0252008-01-30 13:31:27 +010011
Glauber de Oliveira Costa2f66dcc2008-01-30 13:31:57 +010012#include <asm/math_emu.h>
13#include <asm/segment.h>
Glauber de Oliveira Costa2f66dcc2008-01-30 13:31:57 +010014#include <asm/types.h>
Ingo Molnardecb4c42015-09-05 09:32:43 +020015#include <uapi/asm/sigcontext.h>
Glauber de Oliveira Costa2f66dcc2008-01-30 13:31:57 +010016#include <asm/current.h>
Borislav Petkovcd4d09e2016-01-26 22:12:04 +010017#include <asm/cpufeatures.h>
Glauber de Oliveira Costac72dcf82008-01-30 13:31:27 +010018#include <asm/page.h>
Jeremy Fitzhardinge54321d92009-02-11 10:20:05 -080019#include <asm/pgtable_types.h>
Glauber de Oliveira Costaca241c72008-01-30 13:31:31 +010020#include <asm/percpu.h>
Glauber de Oliveira Costa2f66dcc2008-01-30 13:31:57 +010021#include <asm/msr.h>
22#include <asm/desc_defs.h>
Andi Kleenbd616432008-01-30 13:32:38 +010023#include <asm/nops.h>
David Howellsf05e7982012-03-28 18:11:12 +010024#include <asm/special_insns.h>
Ingo Molnar14b96752015-04-22 09:57:24 +020025#include <asm/fpu/types.h>
Josh Poimboeuf76846bf2017-07-11 10:33:45 -050026#include <asm/unwind_hints.h>
Ingo Molnar4d46a892008-02-21 04:24:40 +010027
Glauber de Oliveira Costa2f66dcc2008-01-30 13:31:57 +010028#include <linux/personality.h>
Glauber de Oliveira Costa5300db82008-01-30 13:31:33 +010029#include <linux/cache.h>
Glauber de Oliveira Costa2f66dcc2008-01-30 13:31:57 +010030#include <linux/threads.h>
Peter Zijlstra5cbc19a2009-09-02 11:49:52 +020031#include <linux/math64.h>
Peter Zijlstrafaa46022010-03-25 14:51:50 +010032#include <linux/err.h>
David Howellsf05e7982012-03-28 18:11:12 +010033#include <linux/irqflags.h>
Tom Lendacky21729f82017-07-17 16:10:07 -050034#include <linux/mem_encrypt.h>
David Howellsf05e7982012-03-28 18:11:12 +010035
36/*
37 * We handle most unaligned accesses in hardware. On the other hand
38 * unaligned DMA can be quite expensive on some Nehalem processors.
39 *
40 * Based on this we disable the IP header alignment in network drivers.
41 */
42#define NET_IP_ALIGN 0
Glauber de Oliveira Costac72dcf82008-01-30 13:31:27 +010043
K.Prasadb332828c2009-06-01 23:43:10 +053044#define HBP_NUM 4
Glauber de Oliveira Costa0ccb8ac2008-01-30 13:31:27 +010045/*
46 * Default implementation of macro that returns current
47 * instruction pointer ("program counter").
48 */
49static inline void *current_text_addr(void)
50{
51 void *pc;
Ingo Molnar4d46a892008-02-21 04:24:40 +010052
53 asm volatile("mov $1f, %0; 1:":"=r" (pc));
54
Glauber de Oliveira Costa0ccb8ac2008-01-30 13:31:27 +010055 return pc;
56}
57
Ingo Molnarb8c1b8ea2015-05-24 09:58:12 +020058/*
59 * These alignment constraints are for performance in the vSMP case,
60 * but in the task_struct case we must also meet hardware imposed
61 * alignment requirements of the FPU state:
62 */
Glauber de Oliveira Costadbcb4662008-01-30 13:31:31 +010063#ifdef CONFIG_X86_VSMP
Ingo Molnar4d46a892008-02-21 04:24:40 +010064# define ARCH_MIN_TASKALIGN (1 << INTERNODE_CACHE_SHIFT)
65# define ARCH_MIN_MMSTRUCT_ALIGN (1 << INTERNODE_CACHE_SHIFT)
Glauber de Oliveira Costadbcb4662008-01-30 13:31:31 +010066#else
Ingo Molnarb8c1b8ea2015-05-24 09:58:12 +020067# define ARCH_MIN_TASKALIGN __alignof__(union fpregs_state)
Ingo Molnar4d46a892008-02-21 04:24:40 +010068# define ARCH_MIN_MMSTRUCT_ALIGN 0
Glauber de Oliveira Costadbcb4662008-01-30 13:31:31 +010069#endif
70
Alex Shie0ba94f2012-06-28 09:02:16 +080071enum tlb_infos {
72 ENTRIES,
73 NR_INFO
74};
75
76extern u16 __read_mostly tlb_lli_4k[NR_INFO];
77extern u16 __read_mostly tlb_lli_2m[NR_INFO];
78extern u16 __read_mostly tlb_lli_4m[NR_INFO];
79extern u16 __read_mostly tlb_lld_4k[NR_INFO];
80extern u16 __read_mostly tlb_lld_2m[NR_INFO];
81extern u16 __read_mostly tlb_lld_4m[NR_INFO];
Kirill A. Shutemovdd360392013-12-23 14:16:58 +020082extern u16 __read_mostly tlb_lld_1g[NR_INFO];
Alex Shic4211f42012-06-28 09:02:19 +080083
Glauber de Oliveira Costa5300db82008-01-30 13:31:33 +010084/*
85 * CPU type and hardware bug flags. Kept separately for each CPU.
Mathias Krause04402112017-02-12 22:12:07 +010086 * Members of this structure are referenced in head_32.S, so think twice
Glauber de Oliveira Costa5300db82008-01-30 13:31:33 +010087 * before touching them. [mj]
88 */
89
90struct cpuinfo_x86 {
Ingo Molnar4d46a892008-02-21 04:24:40 +010091 __u8 x86; /* CPU family */
92 __u8 x86_vendor; /* CPU vendor */
93 __u8 x86_model;
Jia Zhangb3991512018-01-01 09:52:10 +080094 __u8 x86_stepping;
Mathias Krause64158132017-02-12 22:12:08 +010095#ifdef CONFIG_X86_64
Ingo Molnar4d46a892008-02-21 04:24:40 +010096 /* Number of 4K pages in DTLB/ITLB combined(in pages): */
H. Peter Anvinb1882e62009-01-23 17:18:52 -080097 int x86_tlbsize;
Jan Beulich13c6c532009-03-12 12:37:34 +000098#endif
Ingo Molnar4d46a892008-02-21 04:24:40 +010099 __u8 x86_virt_bits;
100 __u8 x86_phys_bits;
101 /* CPUID returned core id bits: */
102 __u8 x86_coreid_bits;
Borislav Petkov79a8b9a2017-02-05 11:50:21 +0100103 __u8 cu_id;
Ingo Molnar4d46a892008-02-21 04:24:40 +0100104 /* Max extended CPUID function supported: */
105 __u32 extended_cpuid_level;
Ingo Molnar4d46a892008-02-21 04:24:40 +0100106 /* Maximum supported CPUID level, -1=no CPUID: */
107 int cpuid_level;
Borislav Petkov65fc9852013-03-20 15:07:23 +0100108 __u32 x86_capability[NCAPINTS + NBUGINTS];
Ingo Molnar4d46a892008-02-21 04:24:40 +0100109 char x86_vendor_id[16];
110 char x86_model_id[64];
111 /* in KB - valid for CPUS which support this call: */
Gustavo A. R. Silva24dbc602018-02-13 13:22:08 -0600112 unsigned int x86_cache_size;
Ingo Molnar4d46a892008-02-21 04:24:40 +0100113 int x86_cache_alignment; /* In bytes */
Peter P Waskiewicz Jrcbc82b12015-01-23 18:45:43 +0000114 /* Cache QoS architectural values: */
115 int x86_cache_max_rmid; /* max index */
116 int x86_cache_occ_scale; /* scale to bytes */
Ingo Molnar4d46a892008-02-21 04:24:40 +0100117 int x86_power;
118 unsigned long loops_per_jiffy;
Ingo Molnar4d46a892008-02-21 04:24:40 +0100119 /* cpuid returned max cores value: */
120 u16 x86_max_cores;
121 u16 apicid;
Yinghai Lu01aaea12008-03-06 13:46:39 -0800122 u16 initial_apicid;
Ingo Molnar4d46a892008-02-21 04:24:40 +0100123 u16 x86_clflush_size;
Ingo Molnar4d46a892008-02-21 04:24:40 +0100124 /* number of cores as seen by the OS: */
125 u16 booted_cores;
126 /* Physical processor id: */
127 u16 phys_proc_id;
Thomas Gleixner1f12e322016-02-22 22:19:15 +0000128 /* Logical processor id: */
129 u16 logical_proc_id;
Ingo Molnar4d46a892008-02-21 04:24:40 +0100130 /* Core id: */
131 u16 cpu_core_id;
132 /* Index into per_cpu list: */
133 u16 cpu_index;
Andi Kleen506ed6b2011-10-12 17:46:33 -0700134 u32 microcode;
Andi Kleencc51e542018-08-24 10:03:50 -0700135 /* Address space bits used by the cache internally */
136 u8 x86_cache_bits;
Andi Kleen30bb9812017-11-14 07:42:56 -0500137 unsigned initialized : 1;
Kees Cook3859a272016-10-28 01:22:25 -0700138} __randomize_layout;
Glauber de Oliveira Costa5300db82008-01-30 13:31:33 +0100139
He Chen47f10a32016-11-11 17:25:34 +0800140struct cpuid_regs {
141 u32 eax, ebx, ecx, edx;
142};
143
144enum cpuid_regs_idx {
145 CPUID_EAX = 0,
146 CPUID_EBX,
147 CPUID_ECX,
148 CPUID_EDX,
149};
150
Ingo Molnar4d46a892008-02-21 04:24:40 +0100151#define X86_VENDOR_INTEL 0
152#define X86_VENDOR_CYRIX 1
153#define X86_VENDOR_AMD 2
154#define X86_VENDOR_UMC 3
Ingo Molnar4d46a892008-02-21 04:24:40 +0100155#define X86_VENDOR_CENTAUR 5
156#define X86_VENDOR_TRANSMETA 7
157#define X86_VENDOR_NSC 8
158#define X86_VENDOR_NUM 9
159
160#define X86_VENDOR_UNKNOWN 0xff
Glauber de Oliveira Costa5300db82008-01-30 13:31:33 +0100161
Glauber de Oliveira Costa1a539052008-01-30 13:31:39 +0100162/*
163 * capabilities of CPUs
164 */
Ingo Molnar4d46a892008-02-21 04:24:40 +0100165extern struct cpuinfo_x86 boot_cpu_data;
166extern struct cpuinfo_x86 new_cpu_data;
167
Andy Lutomirski7fb983b2017-12-04 15:07:17 +0100168extern struct x86_hw_tss doublefault_tss;
Thomas Gleixner6cbd2172017-12-04 15:07:32 +0100169extern __u32 cpu_caps_cleared[NCAPINTS + NBUGINTS];
170extern __u32 cpu_caps_set[NCAPINTS + NBUGINTS];
Glauber de Oliveira Costa5300db82008-01-30 13:31:33 +0100171
172#ifdef CONFIG_SMP
Jan Beulich2c773dd2014-11-04 08:26:42 +0000173DECLARE_PER_CPU_READ_MOSTLY(struct cpuinfo_x86, cpu_info);
Glauber de Oliveira Costa5300db82008-01-30 13:31:33 +0100174#define cpu_data(cpu) per_cpu(cpu_info, cpu)
Glauber de Oliveira Costa5300db82008-01-30 13:31:33 +0100175#else
Tejun Heo7b543a52010-12-18 16:30:05 +0100176#define cpu_info boot_cpu_data
Glauber de Oliveira Costa5300db82008-01-30 13:31:33 +0100177#define cpu_data(cpu) boot_cpu_data
Glauber de Oliveira Costa5300db82008-01-30 13:31:33 +0100178#endif
179
Jaswinder Singh1c6c7272008-07-21 22:40:37 +0530180extern const struct seq_operations cpuinfo_op;
181
Ingo Molnar4d46a892008-02-21 04:24:40 +0100182#define cache_line_size() (boot_cpu_data.x86_cache_alignment)
183
184extern void cpu_detect(struct cpuinfo_x86 *c);
Glauber de Oliveira Costa1a539052008-01-30 13:31:39 +0100185
Vlastimil Babka9df95162018-08-20 11:58:35 +0200186static inline unsigned long long l1tf_pfn_limit(void)
Andi Kleen17dbca12018-06-13 15:48:26 -0700187{
Andi Kleencc51e542018-08-24 10:03:50 -0700188 return BIT_ULL(boot_cpu_data.x86_cache_bits - 1 - PAGE_SHIFT);
Andi Kleen17dbca12018-06-13 15:48:26 -0700189}
190
Yinghai Luf5803662008-06-21 03:24:19 -0700191extern void early_cpu_init(void);
Glauber de Oliveira Costa1a539052008-01-30 13:31:39 +0100192extern void identify_boot_cpu(void);
193extern void identify_secondary_cpu(struct cpuinfo_x86 *);
Glauber de Oliveira Costa5300db82008-01-30 13:31:33 +0100194extern void print_cpu_info(struct cpuinfo_x86 *);
Yinghai Lu21c3fcf2012-02-12 09:53:57 -0800195void print_cpu_msr(struct cpuinfo_x86 *);
Glauber de Oliveira Costa1a539052008-01-30 13:31:39 +0100196
Fenghua Yud288e1c2012-12-20 23:44:23 -0800197#ifdef CONFIG_X86_32
198extern int have_cpuid_p(void);
199#else
200static inline int have_cpuid_p(void)
201{
202 return 1;
203}
204#endif
Glauber de Oliveira Costac758ecf2008-01-30 13:31:03 +0100205static inline void native_cpuid(unsigned int *eax, unsigned int *ebx,
Ingo Molnar4d46a892008-02-21 04:24:40 +0100206 unsigned int *ecx, unsigned int *edx)
Glauber de Oliveira Costac758ecf2008-01-30 13:31:03 +0100207{
208 /* ecx is often an input as well as an output. */
Suresh Siddha45a94d72009-12-16 16:25:42 -0800209 asm volatile("cpuid"
Joe Perchescca2e6f2008-03-23 01:03:15 -0700210 : "=a" (*eax),
211 "=b" (*ebx),
212 "=c" (*ecx),
213 "=d" (*edx)
Andi Kleen506ed6b2011-10-12 17:46:33 -0700214 : "0" (*eax), "2" (*ecx)
215 : "memory");
Glauber de Oliveira Costac758ecf2008-01-30 13:31:03 +0100216}
217
Borislav Petkov5dedade2017-01-09 12:41:43 +0100218#define native_cpuid_reg(reg) \
219static inline unsigned int native_cpuid_##reg(unsigned int op) \
220{ \
221 unsigned int eax = op, ebx, ecx = 0, edx; \
222 \
223 native_cpuid(&eax, &ebx, &ecx, &edx); \
224 \
225 return reg; \
226}
227
228/*
229 * Native CPUID functions returning a single datum.
230 */
231native_cpuid_reg(eax)
232native_cpuid_reg(ebx)
233native_cpuid_reg(ecx)
234native_cpuid_reg(edx)
235
Andy Lutomirski6c690ee2017-06-12 10:26:14 -0700236/*
237 * Friendlier CR3 helpers.
238 */
239static inline unsigned long read_cr3_pa(void)
240{
241 return __read_cr3() & CR3_ADDR_MASK;
242}
243
Tom Lendackyeef9c4a2017-07-17 16:10:08 -0500244static inline unsigned long native_read_cr3_pa(void)
245{
246 return __native_read_cr3() & CR3_ADDR_MASK;
247}
248
Glauber de Oliveira Costac72dcf82008-01-30 13:31:27 +0100249static inline void load_cr3(pgd_t *pgdir)
250{
Tom Lendacky21729f82017-07-17 16:10:07 -0500251 write_cr3(__sme_pa(pgdir));
Glauber de Oliveira Costac72dcf82008-01-30 13:31:27 +0100252}
Glauber de Oliveira Costac758ecf2008-01-30 13:31:03 +0100253
Andy Lutomirski7fb983b2017-12-04 15:07:17 +0100254/*
255 * Note that while the legacy 'TSS' name comes from 'Task State Segment',
256 * on modern x86 CPUs the TSS also holds information important to 64-bit mode,
257 * unrelated to the task-switch mechanism:
258 */
Thomas Gleixner96a388d2007-10-11 11:20:03 +0200259#ifdef CONFIG_X86_32
Glauber de Oliveira Costaca241c72008-01-30 13:31:31 +0100260/* This is the TSS defined by the hardware. */
261struct x86_hw_tss {
Ingo Molnar4d46a892008-02-21 04:24:40 +0100262 unsigned short back_link, __blh;
263 unsigned long sp0;
264 unsigned short ss0, __ss0h;
Andy Lutomirskicf9328c2015-04-02 12:41:45 -0700265 unsigned long sp1;
Andy Lutomirski76e4c492015-03-10 11:06:00 -0700266
267 /*
Andy Lutomirskicf9328c2015-04-02 12:41:45 -0700268 * We don't use ring 1, so ss1 is a convenient scratch space in
269 * the same cacheline as sp0. We use ss1 to cache the value in
270 * MSR_IA32_SYSENTER_CS. When we context switch
271 * MSR_IA32_SYSENTER_CS, we first check if the new value being
272 * written matches ss1, and, if it's not, then we wrmsr the new
273 * value and update ss1.
Andy Lutomirski76e4c492015-03-10 11:06:00 -0700274 *
Andy Lutomirskicf9328c2015-04-02 12:41:45 -0700275 * The only reason we context switch MSR_IA32_SYSENTER_CS is
276 * that we set it to zero in vm86 tasks to avoid corrupting the
277 * stack if we were to go through the sysenter path from vm86
278 * mode.
Andy Lutomirski76e4c492015-03-10 11:06:00 -0700279 */
Andy Lutomirski76e4c492015-03-10 11:06:00 -0700280 unsigned short ss1; /* MSR_IA32_SYSENTER_CS */
281
282 unsigned short __ss1h;
Ingo Molnar4d46a892008-02-21 04:24:40 +0100283 unsigned long sp2;
284 unsigned short ss2, __ss2h;
285 unsigned long __cr3;
286 unsigned long ip;
287 unsigned long flags;
288 unsigned long ax;
289 unsigned long cx;
290 unsigned long dx;
291 unsigned long bx;
292 unsigned long sp;
293 unsigned long bp;
294 unsigned long si;
295 unsigned long di;
296 unsigned short es, __esh;
297 unsigned short cs, __csh;
298 unsigned short ss, __ssh;
299 unsigned short ds, __dsh;
300 unsigned short fs, __fsh;
301 unsigned short gs, __gsh;
302 unsigned short ldt, __ldth;
303 unsigned short trace;
304 unsigned short io_bitmap_base;
305
Glauber de Oliveira Costaca241c72008-01-30 13:31:31 +0100306} __attribute__((packed));
307#else
308struct x86_hw_tss {
Ingo Molnar4d46a892008-02-21 04:24:40 +0100309 u32 reserved1;
310 u64 sp0;
Andy Lutomirski9aaefe72017-12-04 15:07:21 +0100311
312 /*
313 * We store cpu_current_top_of_stack in sp1 so it's always accessible.
314 * Linux does not use ring 1, so sp1 is not otherwise needed.
315 */
Ingo Molnar4d46a892008-02-21 04:24:40 +0100316 u64 sp1;
Andy Lutomirski9aaefe72017-12-04 15:07:21 +0100317
Andy Lutomirski98f05b52018-09-03 15:59:43 -0700318 /*
319 * Since Linux does not use ring 2, the 'sp2' slot is unused by
320 * hardware. entry_SYSCALL_64 uses it as scratch space to stash
321 * the user RSP value.
322 */
Ingo Molnar4d46a892008-02-21 04:24:40 +0100323 u64 sp2;
Andy Lutomirski98f05b52018-09-03 15:59:43 -0700324
Ingo Molnar4d46a892008-02-21 04:24:40 +0100325 u64 reserved2;
326 u64 ist[7];
327 u32 reserved3;
328 u32 reserved4;
329 u16 reserved5;
330 u16 io_bitmap_base;
331
Andy Lutomirskid3273de2017-02-20 08:56:13 -0800332} __attribute__((packed));
Glauber de Oliveira Costaca241c72008-01-30 13:31:31 +0100333#endif
334
335/*
Ingo Molnar4d46a892008-02-21 04:24:40 +0100336 * IO-bitmap sizes:
Glauber de Oliveira Costaca241c72008-01-30 13:31:31 +0100337 */
Ingo Molnar4d46a892008-02-21 04:24:40 +0100338#define IO_BITMAP_BITS 65536
339#define IO_BITMAP_BYTES (IO_BITMAP_BITS/8)
340#define IO_BITMAP_LONGS (IO_BITMAP_BYTES/sizeof(long))
Andy Lutomirski7fb983b2017-12-04 15:07:17 +0100341#define IO_BITMAP_OFFSET (offsetof(struct tss_struct, io_bitmap) - offsetof(struct tss_struct, x86_tss))
Ingo Molnar4d46a892008-02-21 04:24:40 +0100342#define INVALID_IO_BITMAP_OFFSET 0x8000
Glauber de Oliveira Costaca241c72008-01-30 13:31:31 +0100343
Dave Hansen4fe2d8b2017-12-04 17:25:07 -0800344struct entry_stack {
Andy Lutomirski0f9a4812017-12-04 15:07:28 +0100345 unsigned long words[64];
346};
347
Dave Hansen4fe2d8b2017-12-04 17:25:07 -0800348struct entry_stack_page {
349 struct entry_stack stack;
Andy Lutomirskic482fee2017-12-04 15:07:29 +0100350} __aligned(PAGE_SIZE);
Andy Lutomirski1a935bc2017-12-04 15:07:19 +0100351
Glauber de Oliveira Costaca241c72008-01-30 13:31:31 +0100352struct tss_struct {
Ingo Molnar4d46a892008-02-21 04:24:40 +0100353 /*
Andy Lutomirski1a935bc2017-12-04 15:07:19 +0100354 * The fixed hardware portion. This must not cross a page boundary
355 * at risk of violating the SDM's advice and potentially triggering
356 * errata.
Ingo Molnar4d46a892008-02-21 04:24:40 +0100357 */
358 struct x86_hw_tss x86_tss;
Glauber de Oliveira Costaca241c72008-01-30 13:31:31 +0100359
360 /*
361 * The extra 1 is there because the CPU will access an
362 * additional byte beyond the end of the IO permission
363 * bitmap. The extra byte must be all 1 bits, and must
364 * be within the limit.
365 */
Ingo Molnar4d46a892008-02-21 04:24:40 +0100366 unsigned long io_bitmap[IO_BITMAP_LONGS + 1];
Andy Lutomirski1a935bc2017-12-04 15:07:19 +0100367} __aligned(PAGE_SIZE);
Ingo Molnar4d46a892008-02-21 04:24:40 +0100368
Andy Lutomirskic482fee2017-12-04 15:07:29 +0100369DECLARE_PER_CPU_PAGE_ALIGNED(struct tss_struct, cpu_tss_rw);
Glauber de Oliveira Costaca241c72008-01-30 13:31:31 +0100370
Andy Lutomirski4f53ab12017-02-20 08:56:09 -0800371/*
372 * sizeof(unsigned long) coming from an extra "long" at the end
373 * of the iobitmap.
374 *
375 * -1? seg base+limit should be pointing to the address of the
376 * last valid byte
377 */
378#define __KERNEL_TSS_LIMIT \
379 (IO_BITMAP_OFFSET + IO_BITMAP_BYTES + sizeof(unsigned long) - 1)
380
Andy Lutomirskia7fcf282015-03-06 17:50:19 -0800381#ifdef CONFIG_X86_32
382DECLARE_PER_CPU(unsigned long, cpu_current_top_of_stack);
Andy Lutomirski9aaefe72017-12-04 15:07:21 +0100383#else
Andy Lutomirskic482fee2017-12-04 15:07:29 +0100384/* The RO copy can't be accessed with this_cpu_xyz(), so use the RW copy. */
385#define cpu_current_top_of_stack cpu_tss_rw.x86_tss.sp1
Andy Lutomirskia7fcf282015-03-06 17:50:19 -0800386#endif
387
Ingo Molnar4d46a892008-02-21 04:24:40 +0100388/*
389 * Save the original ist values for checking stack pointers during debugging
390 */
Glauber de Oliveira Costa1a539052008-01-30 13:31:39 +0100391struct orig_ist {
Ingo Molnar4d46a892008-02-21 04:24:40 +0100392 unsigned long ist[7];
Glauber de Oliveira Costa1a539052008-01-30 13:31:39 +0100393};
394
Glauber Costafe676202008-03-03 14:12:56 -0300395#ifdef CONFIG_X86_64
Glauber de Oliveira Costa2f66dcc2008-01-30 13:31:57 +0100396DECLARE_PER_CPU(struct orig_ist, orig_ist);
Brian Gerst26f80bd2009-01-19 00:38:58 +0900397
Brian Gerst947e76c2009-01-19 12:21:28 +0900398union irq_stack_union {
399 char irq_stack[IRQ_STACK_SIZE];
400 /*
401 * GCC hardcodes the stack canary as %gs:40. Since the
402 * irq_stack is the object at %gs:0, we reserve the bottom
403 * 48 bytes of the irq stack for the canary.
404 */
405 struct {
406 char gs_base[40];
407 unsigned long stack_canary;
408 };
409};
410
Andi Kleen277d5b42013-08-05 15:02:43 -0700411DECLARE_PER_CPU_FIRST(union irq_stack_union, irq_stack_union) __visible;
Brian Gerst2add8e22009-02-08 09:58:39 -0500412DECLARE_INIT_PER_CPU(irq_stack_union);
413
Vitaly Kuznetsov35060ed2018-03-13 18:48:05 +0100414static inline unsigned long cpu_kernelmode_gs_base(int cpu)
415{
416 return (unsigned long)per_cpu(irq_stack_union.gs_base, cpu);
417}
418
Brian Gerst26f80bd2009-01-19 00:38:58 +0900419DECLARE_PER_CPU(char *, irq_stack_ptr);
Jaswinder Singh Rajput9766cdb2009-03-14 11:19:49 +0530420DECLARE_PER_CPU(unsigned int, irq_count);
Jaswinder Singh Rajput9766cdb2009-03-14 11:19:49 +0530421extern asmlinkage void ignore_sysret(void);
Vitaly Kuznetsov42b933b2018-03-13 18:48:04 +0100422
423#if IS_ENABLED(CONFIG_KVM)
424/* Save actual FS/GS selectors and bases to current->thread */
425void save_fsgs_for_kvm(void);
426#endif
Tejun Heo60a53172009-02-09 22:17:40 +0900427#else /* X86_64 */
Linus Torvalds050e9ba2018-06-14 12:21:18 +0900428#ifdef CONFIG_STACKPROTECTOR
Jeremy Fitzhardinge1ea0d142009-09-03 12:27:15 -0700429/*
430 * Make sure stack canary segment base is cached-aligned:
431 * "For Intel Atom processors, avoid non zero segment base address
432 * that is not aligned to cache line boundary at all cost."
433 * (Optim Ref Manual Assembly/Compiler Coding Rule 15.)
434 */
435struct stack_canary {
436 char __pad[20]; /* canary at %gs:20 */
437 unsigned long canary;
438};
Jeremy Fitzhardinge53f82452009-09-03 14:31:44 -0700439DECLARE_PER_CPU_ALIGNED(struct stack_canary, stack_canary);
Thomas Gleixner96a388d2007-10-11 11:20:03 +0200440#endif
Steven Rostedt198d2082014-02-06 09:41:31 -0500441/*
442 * per-CPU IRQ handling stacks
443 */
444struct irq_stack {
445 u32 stack[THREAD_SIZE/sizeof(u32)];
446} __aligned(THREAD_SIZE);
447
448DECLARE_PER_CPU(struct irq_stack *, hardirq_stack);
449DECLARE_PER_CPU(struct irq_stack *, softirq_stack);
Tejun Heo60a53172009-02-09 22:17:40 +0900450#endif /* X86_64 */
Glauber de Oliveira Costac758ecf2008-01-30 13:31:03 +0100451
Fenghua Yubf15a8c2016-05-20 10:47:06 -0700452extern unsigned int fpu_kernel_xstate_size;
Fenghua Yua1141e02016-05-20 10:47:05 -0700453extern unsigned int fpu_user_xstate_size;
Glauber de Oliveira Costa683e0252008-01-30 13:31:27 +0100454
Frederic Weisbecker24f1e32c2009-09-09 19:22:48 +0200455struct perf_event;
456
Andy Lutomirski13d4ea02016-07-14 13:22:57 -0700457typedef struct {
458 unsigned long seg;
459} mm_segment_t;
460
Glauber de Oliveira Costacb38d372008-01-30 13:31:31 +0100461struct thread_struct {
Ingo Molnar4d46a892008-02-21 04:24:40 +0100462 /* Cached TLS descriptors: */
463 struct desc_struct tls_array[GDT_ENTRY_TLS_ENTRIES];
Andy Lutomirskid375cf12017-11-02 00:59:16 -0700464#ifdef CONFIG_X86_32
Ingo Molnar4d46a892008-02-21 04:24:40 +0100465 unsigned long sp0;
Andy Lutomirskid375cf12017-11-02 00:59:16 -0700466#endif
Ingo Molnar4d46a892008-02-21 04:24:40 +0100467 unsigned long sp;
Glauber de Oliveira Costacb38d372008-01-30 13:31:31 +0100468#ifdef CONFIG_X86_32
Ingo Molnar4d46a892008-02-21 04:24:40 +0100469 unsigned long sysenter_cs;
Glauber de Oliveira Costacb38d372008-01-30 13:31:31 +0100470#else
Ingo Molnar4d46a892008-02-21 04:24:40 +0100471 unsigned short es;
472 unsigned short ds;
473 unsigned short fsindex;
474 unsigned short gsindex;
Glauber de Oliveira Costacb38d372008-01-30 13:31:31 +0100475#endif
Andy Lutomirskib9d989c2016-09-13 14:29:21 -0700476
Alexey Dobriyand756f4ad2009-05-04 03:29:52 +0400477#ifdef CONFIG_X86_64
Andy Lutomirski296f7812016-04-26 12:23:29 -0700478 unsigned long fsbase;
479 unsigned long gsbase;
480#else
481 /*
482 * XXX: this could presumably be unsigned short. Alternatively,
483 * 32-bit kernels could be taught to use fsindex instead.
484 */
485 unsigned long fs;
486 unsigned long gs;
Alexey Dobriyand756f4ad2009-05-04 03:29:52 +0400487#endif
Ingo Molnarc5bedc62015-04-23 12:49:20 +0200488
Frederic Weisbecker24f1e32c2009-09-09 19:22:48 +0200489 /* Save middle states of ptrace breakpoints */
490 struct perf_event *ptrace_bps[HBP_NUM];
491 /* Debug status used for traps, single steps, etc... */
492 unsigned long debugreg6;
Frederic Weisbecker326264a2010-02-18 18:24:18 +0100493 /* Keep track of the exact dr7 value set by the user */
494 unsigned long ptrace_dr7;
Ingo Molnar4d46a892008-02-21 04:24:40 +0100495 /* Fault info: */
496 unsigned long cr2;
Srikar Dronamraju51e7dc72012-03-12 14:55:55 +0530497 unsigned long trap_nr;
Ingo Molnar4d46a892008-02-21 04:24:40 +0100498 unsigned long error_code;
Brian Gerst9fda6a02015-07-29 01:41:16 -0400499#ifdef CONFIG_VM86
Ingo Molnar4d46a892008-02-21 04:24:40 +0100500 /* Virtual 86 mode info */
Brian Gerst9fda6a02015-07-29 01:41:16 -0400501 struct vm86 *vm86;
Glauber de Oliveira Costacb38d372008-01-30 13:31:31 +0100502#endif
Ingo Molnar4d46a892008-02-21 04:24:40 +0100503 /* IO permissions: */
504 unsigned long *io_bitmap_ptr;
505 unsigned long iopl;
506 /* Max allowed port in the bitmap, in bytes: */
507 unsigned io_bitmap_max;
Dave Hansen0c8c0f02015-07-17 12:28:11 +0200508
Andy Lutomirski13d4ea02016-07-14 13:22:57 -0700509 mm_segment_t addr_limit;
510
Ingo Molnar2a53ccb2016-07-15 10:21:11 +0200511 unsigned int sig_on_uaccess_err:1;
Andy Lutomirskidfa9a942016-07-14 13:22:56 -0700512 unsigned int uaccess_err:1; /* uaccess failed */
513
Dave Hansen0c8c0f02015-07-17 12:28:11 +0200514 /* Floating point and extended processor state */
515 struct fpu fpu;
516 /*
517 * WARNING: 'fpu' is dynamically-sized. It *MUST* be at
518 * the end.
519 */
Glauber de Oliveira Costacb38d372008-01-30 13:31:31 +0100520};
521
Kees Cookf7d83c12017-08-16 13:26:03 -0700522/* Whitelist the FPU state from the task_struct for hardened usercopy. */
523static inline void arch_thread_struct_whitelist(unsigned long *offset,
524 unsigned long *size)
525{
526 *offset = offsetof(struct thread_struct, fpu.state);
527 *size = fpu_kernel_xstate_size;
528}
529
Glauber de Oliveira Costa62d7d7e2008-01-30 13:31:27 +0100530/*
Andy Lutomirskib9d989c2016-09-13 14:29:21 -0700531 * Thread-synchronous status.
532 *
533 * This is different from the flags in that nobody else
534 * ever touches our thread-synchronous status, so we don't
535 * have to worry about atomic accesses.
536 */
537#define TS_COMPAT 0x0002 /* 32bit syscall active (64BIT)*/
538
539/*
Glauber de Oliveira Costa62d7d7e2008-01-30 13:31:27 +0100540 * Set IOPL bits in EFLAGS from given mask
541 */
542static inline void native_set_iopl_mask(unsigned mask)
543{
544#ifdef CONFIG_X86_32
545 unsigned int reg;
Ingo Molnar4d46a892008-02-21 04:24:40 +0100546
Joe Perchescca2e6f2008-03-23 01:03:15 -0700547 asm volatile ("pushfl;"
548 "popl %0;"
549 "andl %1, %0;"
550 "orl %2, %0;"
551 "pushl %0;"
552 "popfl"
553 : "=&r" (reg)
554 : "i" (~X86_EFLAGS_IOPL), "r" (mask));
Glauber de Oliveira Costa62d7d7e2008-01-30 13:31:27 +0100555#endif
556}
557
Ingo Molnar4d46a892008-02-21 04:24:40 +0100558static inline void
Andy Lutomirskida51da12017-11-02 00:59:10 -0700559native_load_sp0(unsigned long sp0)
Glauber de Oliveira Costa7818a1e2008-01-30 13:31:31 +0100560{
Andy Lutomirskic482fee2017-12-04 15:07:29 +0100561 this_cpu_write(cpu_tss_rw.x86_tss.sp0, sp0);
Glauber de Oliveira Costa7818a1e2008-01-30 13:31:31 +0100562}
Glauber de Oliveira Costa1b46cbe2008-01-30 13:31:27 +0100563
Glauber de Oliveira Costae801f862008-01-30 13:32:08 +0100564static inline void native_swapgs(void)
565{
566#ifdef CONFIG_X86_64
567 asm volatile("swapgs" ::: "memory");
568#endif
569}
570
Andy Lutomirskia7fcf282015-03-06 17:50:19 -0800571static inline unsigned long current_top_of_stack(void)
Andy Lutomirski8ef46a62015-03-05 19:19:02 -0800572{
Andy Lutomirski9aaefe72017-12-04 15:07:21 +0100573 /*
574 * We can't read directly from tss.sp0: sp0 on x86_32 is special in
575 * and around vm86 mode and sp0 on x86_64 is special because of the
576 * entry trampoline.
577 */
Andy Lutomirskia7fcf282015-03-06 17:50:19 -0800578 return this_cpu_read_stable(cpu_current_top_of_stack);
Andy Lutomirski8ef46a62015-03-05 19:19:02 -0800579}
580
Andy Lutomirski33836422017-11-02 00:59:17 -0700581static inline bool on_thread_stack(void)
582{
583 return (unsigned long)(current_top_of_stack() -
584 current_stack_pointer) < THREAD_SIZE;
585}
586
Glauber de Oliveira Costa7818a1e2008-01-30 13:31:31 +0100587#ifdef CONFIG_PARAVIRT
588#include <asm/paravirt.h>
589#else
Ingo Molnar4d46a892008-02-21 04:24:40 +0100590#define __cpuid native_cpuid
Glauber de Oliveira Costa1b46cbe2008-01-30 13:31:27 +0100591
Andy Lutomirskida51da12017-11-02 00:59:10 -0700592static inline void load_sp0(unsigned long sp0)
Glauber de Oliveira Costa7818a1e2008-01-30 13:31:31 +0100593{
Andy Lutomirskida51da12017-11-02 00:59:10 -0700594 native_load_sp0(sp0);
Glauber de Oliveira Costa7818a1e2008-01-30 13:31:31 +0100595}
596
Glauber de Oliveira Costa62d7d7e2008-01-30 13:31:27 +0100597#define set_iopl_mask native_set_iopl_mask
Glauber de Oliveira Costa1b46cbe2008-01-30 13:31:27 +0100598#endif /* CONFIG_PARAVIRT */
599
Glauber de Oliveira Costa683e0252008-01-30 13:31:27 +0100600/* Free all resources held by a thread. */
601extern void release_thread(struct task_struct *);
602
Glauber de Oliveira Costa683e0252008-01-30 13:31:27 +0100603unsigned long get_wchan(struct task_struct *p);
Glauber de Oliveira Costac758ecf2008-01-30 13:31:03 +0100604
605/*
606 * Generic CPUID function
607 * clear %ecx since some cpus (Cyrix MII) do not set or clear %ecx
608 * resulting in stale register contents being returned.
609 */
610static inline void cpuid(unsigned int op,
611 unsigned int *eax, unsigned int *ebx,
612 unsigned int *ecx, unsigned int *edx)
613{
614 *eax = op;
615 *ecx = 0;
616 __cpuid(eax, ebx, ecx, edx);
617}
618
619/* Some CPUID calls want 'count' to be placed in ecx */
620static inline void cpuid_count(unsigned int op, int count,
621 unsigned int *eax, unsigned int *ebx,
622 unsigned int *ecx, unsigned int *edx)
623{
624 *eax = op;
625 *ecx = count;
626 __cpuid(eax, ebx, ecx, edx);
627}
628
629/*
630 * CPUID functions returning a single datum
631 */
632static inline unsigned int cpuid_eax(unsigned int op)
633{
634 unsigned int eax, ebx, ecx, edx;
635
636 cpuid(op, &eax, &ebx, &ecx, &edx);
Ingo Molnar4d46a892008-02-21 04:24:40 +0100637
Glauber de Oliveira Costac758ecf2008-01-30 13:31:03 +0100638 return eax;
639}
Ingo Molnar4d46a892008-02-21 04:24:40 +0100640
Glauber de Oliveira Costac758ecf2008-01-30 13:31:03 +0100641static inline unsigned int cpuid_ebx(unsigned int op)
642{
643 unsigned int eax, ebx, ecx, edx;
644
645 cpuid(op, &eax, &ebx, &ecx, &edx);
Ingo Molnar4d46a892008-02-21 04:24:40 +0100646
Glauber de Oliveira Costac758ecf2008-01-30 13:31:03 +0100647 return ebx;
648}
Ingo Molnar4d46a892008-02-21 04:24:40 +0100649
Glauber de Oliveira Costac758ecf2008-01-30 13:31:03 +0100650static inline unsigned int cpuid_ecx(unsigned int op)
651{
652 unsigned int eax, ebx, ecx, edx;
653
654 cpuid(op, &eax, &ebx, &ecx, &edx);
Ingo Molnar4d46a892008-02-21 04:24:40 +0100655
Glauber de Oliveira Costac758ecf2008-01-30 13:31:03 +0100656 return ecx;
657}
Ingo Molnar4d46a892008-02-21 04:24:40 +0100658
Glauber de Oliveira Costac758ecf2008-01-30 13:31:03 +0100659static inline unsigned int cpuid_edx(unsigned int op)
660{
661 unsigned int eax, ebx, ecx, edx;
662
663 cpuid(op, &eax, &ebx, &ecx, &edx);
Ingo Molnar4d46a892008-02-21 04:24:40 +0100664
Glauber de Oliveira Costac758ecf2008-01-30 13:31:03 +0100665 return edx;
666}
667
Glauber de Oliveira Costa683e0252008-01-30 13:31:27 +0100668/* REP NOP (PAUSE) is a good thing to insert into busy-wait loops. */
Denys Vlasenko0b101e62015-09-24 14:02:29 +0200669static __always_inline void rep_nop(void)
Glauber de Oliveira Costa683e0252008-01-30 13:31:27 +0100670{
Joe Perchescca2e6f2008-03-23 01:03:15 -0700671 asm volatile("rep; nop" ::: "memory");
Glauber de Oliveira Costa683e0252008-01-30 13:31:27 +0100672}
673
Denys Vlasenko0b101e62015-09-24 14:02:29 +0200674static __always_inline void cpu_relax(void)
Ingo Molnar4d46a892008-02-21 04:24:40 +0100675{
676 rep_nop();
677}
678
Andy Lutomirskic198b122016-12-09 10:24:08 -0800679/*
680 * This function forces the icache and prefetched instruction stream to
681 * catch up with reality in two very specific cases:
682 *
683 * a) Text was modified using one virtual address and is about to be executed
684 * from the same physical page at a different virtual address.
685 *
686 * b) Text was modified on a different CPU, may subsequently be
687 * executed on this CPU, and you want to make sure the new version
688 * gets executed. This generally means you're calling this in a IPI.
689 *
690 * If you're calling this for a different reason, you're probably doing
691 * it wrong.
692 */
Glauber de Oliveira Costa683e0252008-01-30 13:31:27 +0100693static inline void sync_core(void)
694{
Andy Lutomirskic198b122016-12-09 10:24:08 -0800695 /*
696 * There are quite a few ways to do this. IRET-to-self is nice
697 * because it works on every CPU, at any CPL (so it's compatible
698 * with paravirtualization), and it never exits to a hypervisor.
699 * The only down sides are that it's a bit slow (it seems to be
700 * a bit more than 2x slower than the fastest options) and that
701 * it unmasks NMIs. The "push %cs" is needed because, in
702 * paravirtual environments, __KERNEL_CS may not be a valid CS
703 * value when we do IRET directly.
704 *
705 * In case NMI unmasking or performance ever becomes a problem,
706 * the next best option appears to be MOV-to-CR2 and an
707 * unconditional jump. That sequence also works on all CPUs,
Juergen Grossecda85e2017-08-16 19:31:57 +0200708 * but it will fault at CPL3 (i.e. Xen PV).
Andy Lutomirskic198b122016-12-09 10:24:08 -0800709 *
710 * CPUID is the conventional way, but it's nasty: it doesn't
711 * exist on some 486-like CPUs, and it usually exits to a
712 * hypervisor.
713 *
714 * Like all of Linux's memory ordering operations, this is a
715 * compiler barrier as well.
716 */
Andy Lutomirski1c52d852016-12-09 10:24:05 -0800717#ifdef CONFIG_X86_32
Andy Lutomirskic198b122016-12-09 10:24:08 -0800718 asm volatile (
719 "pushfl\n\t"
720 "pushl %%cs\n\t"
721 "pushl $1f\n\t"
722 "iret\n\t"
723 "1:"
Josh Poimboeuff5caf622017-09-20 16:24:33 -0500724 : ASM_CALL_CONSTRAINT : : "memory");
H. Peter Anvin45c39fb2012-11-28 11:50:30 -0800725#else
Andy Lutomirskic198b122016-12-09 10:24:08 -0800726 unsigned int tmp;
727
728 asm volatile (
Josh Poimboeuf76846bf2017-07-11 10:33:45 -0500729 UNWIND_HINT_SAVE
Andy Lutomirskic198b122016-12-09 10:24:08 -0800730 "mov %%ss, %0\n\t"
731 "pushq %q0\n\t"
732 "pushq %%rsp\n\t"
733 "addq $8, (%%rsp)\n\t"
734 "pushfq\n\t"
735 "mov %%cs, %0\n\t"
736 "pushq %q0\n\t"
737 "pushq $1f\n\t"
738 "iretq\n\t"
Josh Poimboeuf76846bf2017-07-11 10:33:45 -0500739 UNWIND_HINT_RESTORE
Andy Lutomirskic198b122016-12-09 10:24:08 -0800740 "1:"
Josh Poimboeuff5caf622017-09-20 16:24:33 -0500741 : "=&r" (tmp), ASM_CALL_CONSTRAINT : : "cc", "memory");
Ben Hutchings5367b682009-09-10 02:53:50 +0100742#endif
Glauber de Oliveira Costa683e0252008-01-30 13:31:27 +0100743}
744
Glauber de Oliveira Costa683e0252008-01-30 13:31:27 +0100745extern void select_idle_routine(const struct cpuinfo_x86 *c);
Borislav Petkov07c94a32016-12-09 19:29:11 +0100746extern void amd_e400_c1e_apic_setup(void);
Glauber de Oliveira Costa683e0252008-01-30 13:31:27 +0100747
Ingo Molnar4d46a892008-02-21 04:24:40 +0100748extern unsigned long boot_option_idle_override;
Glauber de Oliveira Costa683e0252008-01-30 13:31:27 +0100749
Thomas Renningerd1896042010-11-03 17:06:14 +0100750enum idle_boot_override {IDLE_NO_OVERRIDE=0, IDLE_HALT, IDLE_NOMWAIT,
Len Brown69fb3672013-02-10 01:38:39 -0500751 IDLE_POLL};
Thomas Renningerd1896042010-11-03 17:06:14 +0100752
Glauber de Oliveira Costa1a539052008-01-30 13:31:39 +0100753extern void enable_sep_cpu(void);
754extern int sysenter_setup(void);
755
H. Peter Anvin8170e6b2013-01-24 12:19:52 -0800756void early_trap_pf_init(void);
Jan Kiszka29c84392010-05-20 21:04:29 -0500757
Glauber de Oliveira Costa1a539052008-01-30 13:31:39 +0100758/* Defined in head.S */
Ingo Molnar4d46a892008-02-21 04:24:40 +0100759extern struct desc_ptr early_gdt_descr;
Glauber de Oliveira Costa1a539052008-01-30 13:31:39 +0100760
Brian Gerst552be872009-01-30 17:47:53 +0900761extern void switch_to_new_gdt(int);
Thomas Garnier45fc8752017-03-14 10:05:08 -0700762extern void load_direct_gdt(int);
Thomas Garnier69218e42017-03-14 10:05:07 -0700763extern void load_fixmap_gdt(int);
Jeremy Fitzhardinge11e3a842009-01-30 17:47:54 +0900764extern void load_percpu_segment(int);
Glauber de Oliveira Costa1a539052008-01-30 13:31:39 +0100765extern void cpu_init(void);
Glauber de Oliveira Costa1a539052008-01-30 13:31:39 +0100766
Markus Metzgerc2724772008-12-11 13:49:59 +0100767static inline unsigned long get_debugctlmsr(void)
768{
Peter Zijlstraea8e61b2010-03-25 14:51:51 +0100769 unsigned long debugctlmsr = 0;
Markus Metzgerc2724772008-12-11 13:49:59 +0100770
771#ifndef CONFIG_X86_DEBUGCTLMSR
772 if (boot_cpu_data.x86 < 6)
773 return 0;
774#endif
775 rdmsrl(MSR_IA32_DEBUGCTLMSR, debugctlmsr);
776
Peter Zijlstraea8e61b2010-03-25 14:51:51 +0100777 return debugctlmsr;
Markus Metzgerc2724772008-12-11 13:49:59 +0100778}
779
Jan Beulich5b0e5082008-03-10 13:11:17 +0000780static inline void update_debugctlmsr(unsigned long debugctlmsr)
781{
782#ifndef CONFIG_X86_DEBUGCTLMSR
783 if (boot_cpu_data.x86 < 6)
784 return;
785#endif
786 wrmsrl(MSR_IA32_DEBUGCTLMSR, debugctlmsr);
787}
788
Oleg Nesterov9bd11902012-09-03 15:24:17 +0200789extern void set_task_blockstep(struct task_struct *task, bool on);
790
Ingo Molnar4d46a892008-02-21 04:24:40 +0100791/* Boot loader type from the setup header: */
792extern int bootloader_type;
H. Peter Anvin50312962009-05-07 16:54:11 -0700793extern int bootloader_version;
Glauber de Oliveira Costa1a539052008-01-30 13:31:39 +0100794
Ingo Molnar4d46a892008-02-21 04:24:40 +0100795extern char ignore_fpu_irq;
Glauber de Oliveira Costa683e0252008-01-30 13:31:27 +0100796
797#define HAVE_ARCH_PICK_MMAP_LAYOUT 1
798#define ARCH_HAS_PREFETCHW
799#define ARCH_HAS_SPINLOCK_PREFETCH
800
Glauber de Oliveira Costaae2e15e2008-01-30 13:31:40 +0100801#ifdef CONFIG_X86_32
Borislav Petkova930dc42015-01-18 17:48:18 +0100802# define BASE_PREFETCH ""
Ingo Molnar4d46a892008-02-21 04:24:40 +0100803# define ARCH_HAS_PREFETCH
Glauber de Oliveira Costaae2e15e2008-01-30 13:31:40 +0100804#else
Borislav Petkova930dc42015-01-18 17:48:18 +0100805# define BASE_PREFETCH "prefetcht0 %P1"
Glauber de Oliveira Costaae2e15e2008-01-30 13:31:40 +0100806#endif
807
Ingo Molnar4d46a892008-02-21 04:24:40 +0100808/*
809 * Prefetch instructions for Pentium III (+) and AMD Athlon (+)
810 *
811 * It's not worth to care about 3dnow prefetches for the K6
812 * because they are microcoded there and very slow.
813 */
Glauber de Oliveira Costaae2e15e2008-01-30 13:31:40 +0100814static inline void prefetch(const void *x)
815{
Borislav Petkova930dc42015-01-18 17:48:18 +0100816 alternative_input(BASE_PREFETCH, "prefetchnta %P1",
Glauber de Oliveira Costaae2e15e2008-01-30 13:31:40 +0100817 X86_FEATURE_XMM,
Borislav Petkova930dc42015-01-18 17:48:18 +0100818 "m" (*(const char *)x));
Glauber de Oliveira Costaae2e15e2008-01-30 13:31:40 +0100819}
820
Ingo Molnar4d46a892008-02-21 04:24:40 +0100821/*
822 * 3dnow prefetch to get an exclusive cache line.
823 * Useful for spinlocks to avoid one state transition in the
824 * cache coherency protocol:
825 */
Glauber de Oliveira Costaae2e15e2008-01-30 13:31:40 +0100826static inline void prefetchw(const void *x)
827{
Borislav Petkova930dc42015-01-18 17:48:18 +0100828 alternative_input(BASE_PREFETCH, "prefetchw %P1",
829 X86_FEATURE_3DNOWPREFETCH,
830 "m" (*(const char *)x));
Glauber de Oliveira Costaae2e15e2008-01-30 13:31:40 +0100831}
832
Ingo Molnar4d46a892008-02-21 04:24:40 +0100833static inline void spin_lock_prefetch(const void *x)
834{
835 prefetchw(x);
836}
837
Andy Lutomirskid9e05cc2015-03-10 11:05:59 -0700838#define TOP_OF_INIT_STACK ((unsigned long)&init_stack + sizeof(init_stack) - \
839 TOP_OF_KERNEL_STACK_PADDING)
840
Andy Lutomirski35001302017-11-02 00:59:11 -0700841#define task_top_of_stack(task) ((unsigned long)(task_pt_regs(task) + 1))
842
Andy Lutomirskid375cf12017-11-02 00:59:16 -0700843#define task_pt_regs(task) \
844({ \
845 unsigned long __ptr = (unsigned long)task_stack_page(task); \
846 __ptr += THREAD_SIZE - TOP_OF_KERNEL_STACK_PADDING; \
847 ((struct pt_regs *)__ptr) - 1; \
848})
849
Glauber de Oliveira Costa2f66dcc2008-01-30 13:31:57 +0100850#ifdef CONFIG_X86_32
851/*
852 * User space process size: 3GB (default).
853 */
Dmitry Safonov8f3e4742017-03-06 17:17:18 +0300854#define IA32_PAGE_OFFSET PAGE_OFFSET
Ingo Molnar4d46a892008-02-21 04:24:40 +0100855#define TASK_SIZE PAGE_OFFSET
Kirill A. Shutemovb569bab2017-07-17 01:59:52 +0300856#define TASK_SIZE_LOW TASK_SIZE
Ingo Molnard9517342009-02-20 23:32:28 +0100857#define TASK_SIZE_MAX TASK_SIZE
Kirill A. Shutemov44b04912017-07-17 01:59:51 +0300858#define DEFAULT_MAP_WINDOW TASK_SIZE
Ingo Molnar4d46a892008-02-21 04:24:40 +0100859#define STACK_TOP TASK_SIZE
860#define STACK_TOP_MAX STACK_TOP
Glauber de Oliveira Costa2f66dcc2008-01-30 13:31:57 +0100861
Ingo Molnar4d46a892008-02-21 04:24:40 +0100862#define INIT_THREAD { \
Andy Lutomirskid9e05cc2015-03-10 11:05:59 -0700863 .sp0 = TOP_OF_INIT_STACK, \
Ingo Molnar4d46a892008-02-21 04:24:40 +0100864 .sysenter_cs = __KERNEL_CS, \
865 .io_bitmap_ptr = NULL, \
Andy Lutomirski13d4ea02016-07-14 13:22:57 -0700866 .addr_limit = KERNEL_DS, \
Glauber de Oliveira Costa2f66dcc2008-01-30 13:31:57 +0100867}
868
Ingo Molnar4d46a892008-02-21 04:24:40 +0100869#define KSTK_ESP(task) (task_pt_regs(task)->sp)
Glauber de Oliveira Costa2f66dcc2008-01-30 13:31:57 +0100870
871#else
872/*
Andy Lutomirskif55f0502017-12-12 07:56:45 -0800873 * User space process size. This is the first address outside the user range.
874 * There are a few constraints that determine this:
875 *
876 * On Intel CPUs, if a SYSCALL instruction is at the highest canonical
877 * address, then that syscall will enter the kernel with a
878 * non-canonical return address, and SYSRET will explode dangerously.
879 * We avoid this particular problem by preventing anything executable
880 * from being mapped at the maximum canonical address.
881 *
882 * On AMD CPUs in the Ryzen family, there's a nasty bug in which the
883 * CPUs malfunction if they execute code from the highest canonical page.
884 * They'll speculate right off the end of the canonical space, and
885 * bad things happen. This is worked around in the same way as the
886 * Intel problem.
887 *
888 * With page table isolation enabled, we map the LDT in ... [stay tuned]
Glauber de Oliveira Costa2f66dcc2008-01-30 13:31:57 +0100889 */
Kirill A. Shutemovee00f4a2017-07-17 01:59:53 +0300890#define TASK_SIZE_MAX ((1UL << __VIRTUAL_MASK_SHIFT) - PAGE_SIZE)
Glauber de Oliveira Costa2f66dcc2008-01-30 13:31:57 +0100891
Kirill A. Shutemovee00f4a2017-07-17 01:59:53 +0300892#define DEFAULT_MAP_WINDOW ((1UL << 47) - PAGE_SIZE)
Glauber de Oliveira Costa2f66dcc2008-01-30 13:31:57 +0100893
894/* This decides where the kernel will search for a free chunk of vm
895 * space during mmap's.
896 */
Ingo Molnar4d46a892008-02-21 04:24:40 +0100897#define IA32_PAGE_OFFSET ((current->personality & ADDR_LIMIT_3GB) ? \
898 0xc0000000 : 0xFFFFe000)
Glauber de Oliveira Costa2f66dcc2008-01-30 13:31:57 +0100899
Kirill A. Shutemovb569bab2017-07-17 01:59:52 +0300900#define TASK_SIZE_LOW (test_thread_flag(TIF_ADDR32) ? \
901 IA32_PAGE_OFFSET : DEFAULT_MAP_WINDOW)
H. Peter Anvin6bd33002012-02-06 13:03:09 -0800902#define TASK_SIZE (test_thread_flag(TIF_ADDR32) ? \
Ingo Molnard9517342009-02-20 23:32:28 +0100903 IA32_PAGE_OFFSET : TASK_SIZE_MAX)
H. Peter Anvin6bd33002012-02-06 13:03:09 -0800904#define TASK_SIZE_OF(child) ((test_tsk_thread_flag(child, TIF_ADDR32)) ? \
Ingo Molnard9517342009-02-20 23:32:28 +0100905 IA32_PAGE_OFFSET : TASK_SIZE_MAX)
Glauber de Oliveira Costa2f66dcc2008-01-30 13:31:57 +0100906
Kirill A. Shutemovb569bab2017-07-17 01:59:52 +0300907#define STACK_TOP TASK_SIZE_LOW
Ingo Molnard9517342009-02-20 23:32:28 +0100908#define STACK_TOP_MAX TASK_SIZE_MAX
David Howells922a70d2008-02-08 04:19:26 -0800909
Andy Lutomirski13d4ea02016-07-14 13:22:57 -0700910#define INIT_THREAD { \
Andy Lutomirski13d4ea02016-07-14 13:22:57 -0700911 .addr_limit = KERNEL_DS, \
Glauber de Oliveira Costa2f66dcc2008-01-30 13:31:57 +0100912}
913
Stefani Seibold89240ba2009-11-03 10:22:40 +0100914extern unsigned long KSTK_ESP(struct task_struct *task);
H. J. Lud046ff82012-02-14 13:49:48 -0800915
Glauber de Oliveira Costa2f66dcc2008-01-30 13:31:57 +0100916#endif /* CONFIG_X86_64 */
917
Ingo Molnar513ad842008-02-21 05:18:40 +0100918extern void start_thread(struct pt_regs *regs, unsigned long new_ip,
919 unsigned long new_sp);
920
Ingo Molnar4d46a892008-02-21 04:24:40 +0100921/*
922 * This decides where the kernel will search for a free chunk of vm
Glauber de Oliveira Costa683e0252008-01-30 13:31:27 +0100923 * space during mmap's.
924 */
Dmitry Safonov8f3e4742017-03-06 17:17:18 +0300925#define __TASK_UNMAPPED_BASE(task_size) (PAGE_ALIGN(task_size / 3))
Kirill A. Shutemovb569bab2017-07-17 01:59:52 +0300926#define TASK_UNMAPPED_BASE __TASK_UNMAPPED_BASE(TASK_SIZE_LOW)
Glauber de Oliveira Costa683e0252008-01-30 13:31:27 +0100927
Ingo Molnar4d46a892008-02-21 04:24:40 +0100928#define KSTK_EIP(task) (task_pt_regs(task)->ip)
Glauber de Oliveira Costa683e0252008-01-30 13:31:27 +0100929
Erik Bosman529e25f2008-04-14 00:24:18 +0200930/* Get/set a process' ability to use the timestamp counter instruction */
931#define GET_TSC_CTL(adr) get_tsc_mode((adr))
932#define SET_TSC_CTL(val) set_tsc_mode((val))
933
934extern int get_tsc_mode(unsigned long adr);
935extern int set_tsc_mode(unsigned int val);
936
Kyle Hueye9ea1e72017-03-20 01:16:26 -0700937DECLARE_PER_CPU(u64, msr_misc_features_shadow);
938
Dave Hansenfe3d1972014-11-14 07:18:29 -0800939/* Register/unregister a process' MPX related resource */
Dave Hansen46a6e0c2015-06-07 11:37:02 -0700940#define MPX_ENABLE_MANAGEMENT() mpx_enable_management()
941#define MPX_DISABLE_MANAGEMENT() mpx_disable_management()
Dave Hansenfe3d1972014-11-14 07:18:29 -0800942
943#ifdef CONFIG_X86_INTEL_MPX
Dave Hansen46a6e0c2015-06-07 11:37:02 -0700944extern int mpx_enable_management(void);
945extern int mpx_disable_management(void);
Dave Hansenfe3d1972014-11-14 07:18:29 -0800946#else
Dave Hansen46a6e0c2015-06-07 11:37:02 -0700947static inline int mpx_enable_management(void)
Dave Hansenfe3d1972014-11-14 07:18:29 -0800948{
949 return -EINVAL;
950}
Dave Hansen46a6e0c2015-06-07 11:37:02 -0700951static inline int mpx_disable_management(void)
Dave Hansenfe3d1972014-11-14 07:18:29 -0800952{
953 return -EINVAL;
954}
955#endif /* CONFIG_X86_INTEL_MPX */
956
Borislav Petkovbc8e80d2017-06-13 18:28:30 +0200957#ifdef CONFIG_CPU_SUP_AMD
Daniel J Blueman8b84c8d2012-11-27 14:32:10 +0800958extern u16 amd_get_nb_id(int cpu);
Aravind Gopalakrishnancc2749e2015-06-15 10:28:15 +0200959extern u32 amd_get_nodes_per_socket(void);
Borislav Petkovbc8e80d2017-06-13 18:28:30 +0200960#else
961static inline u16 amd_get_nb_id(int cpu) { return 0; }
962static inline u32 amd_get_nodes_per_socket(void) { return 0; }
963#endif
Andreas Herrmann6a812692009-09-16 11:33:40 +0200964
Jason Wang96e39ac2013-07-25 16:54:32 +0800965static inline uint32_t hypervisor_cpuid_base(const char *sig, uint32_t leaves)
966{
967 uint32_t base, eax, signature[3];
968
969 for (base = 0x40000000; base < 0x40010000; base += 0x100) {
970 cpuid(base, &eax, &signature[0], &signature[1], &signature[2]);
971
972 if (!memcmp(sig, signature, 12) &&
973 (leaves == 0 || ((eax - base) >= leaves)))
974 return base;
975 }
976
977 return 0;
978}
979
David Howellsf05e7982012-03-28 18:11:12 +0100980extern unsigned long arch_align_stack(unsigned long sp);
981extern void free_init_pages(char *what, unsigned long begin, unsigned long end);
Dave Hansen6ea27382018-08-02 15:58:29 -0700982extern void free_kernel_image_pages(void *begin, void *end);
David Howellsf05e7982012-03-28 18:11:12 +0100983
984void default_idle(void);
Len Brown6a377dd2013-02-09 23:08:07 -0500985#ifdef CONFIG_XEN
986bool xen_set_default_idle(void);
987#else
988#define xen_set_default_idle 0
989#endif
David Howellsf05e7982012-03-28 18:11:12 +0100990
991void stop_this_cpu(void *dummy);
Borislav Petkov4d067d82013-05-09 12:02:29 +0200992void df_debug(struct pt_regs *regs, long error_code);
Borislav Petkov1008c522018-02-16 12:26:39 +0100993void microcode_check(void);
Jiri Kosinad90a7a02018-07-13 16:23:25 +0200994
995enum l1tf_mitigations {
996 L1TF_MITIGATION_OFF,
997 L1TF_MITIGATION_FLUSH_NOWARN,
998 L1TF_MITIGATION_FLUSH,
999 L1TF_MITIGATION_FLUSH_NOSMT,
1000 L1TF_MITIGATION_FULL,
1001 L1TF_MITIGATION_FULL_FORCE
1002};
1003
1004extern enum l1tf_mitigations l1tf_mitigation;
1005
H. Peter Anvin1965aae2008-10-22 22:26:29 -07001006#endif /* _ASM_X86_PROCESSOR_H */