blob: 79e409974ccc89dc0e74f302ddb02c51861b2c07 [file] [log] [blame]
Greg Kroah-Hartmanb2441312017-11-01 15:07:57 +01001/* SPDX-License-Identifier: GPL-2.0 */
H. Peter Anvin1965aae2008-10-22 22:26:29 -07002#ifndef _ASM_X86_PROCESSOR_H
3#define _ASM_X86_PROCESSOR_H
Glauber de Oliveira Costac758ecf2008-01-30 13:31:03 +01004
Glauber de Oliveira Costa053de042008-01-30 13:31:27 +01005#include <asm/processor-flags.h>
6
Glauber de Oliveira Costa683e0252008-01-30 13:31:27 +01007/* Forward declaration, a strange C thing */
8struct task_struct;
9struct mm_struct;
Brian Gerst9fda6a02015-07-29 01:41:16 -040010struct vm86;
Glauber de Oliveira Costa683e0252008-01-30 13:31:27 +010011
Glauber de Oliveira Costa2f66dcc2008-01-30 13:31:57 +010012#include <asm/math_emu.h>
13#include <asm/segment.h>
Glauber de Oliveira Costa2f66dcc2008-01-30 13:31:57 +010014#include <asm/types.h>
Ingo Molnardecb4c42015-09-05 09:32:43 +020015#include <uapi/asm/sigcontext.h>
Glauber de Oliveira Costa2f66dcc2008-01-30 13:31:57 +010016#include <asm/current.h>
Borislav Petkovcd4d09e2016-01-26 22:12:04 +010017#include <asm/cpufeatures.h>
Glauber de Oliveira Costac72dcf82008-01-30 13:31:27 +010018#include <asm/page.h>
Jeremy Fitzhardinge54321d92009-02-11 10:20:05 -080019#include <asm/pgtable_types.h>
Glauber de Oliveira Costaca241c72008-01-30 13:31:31 +010020#include <asm/percpu.h>
Glauber de Oliveira Costa2f66dcc2008-01-30 13:31:57 +010021#include <asm/msr.h>
22#include <asm/desc_defs.h>
Andi Kleenbd616432008-01-30 13:32:38 +010023#include <asm/nops.h>
David Howellsf05e7982012-03-28 18:11:12 +010024#include <asm/special_insns.h>
Ingo Molnar14b96752015-04-22 09:57:24 +020025#include <asm/fpu/types.h>
Josh Poimboeuf76846bf2017-07-11 10:33:45 -050026#include <asm/unwind_hints.h>
Ingo Molnar4d46a892008-02-21 04:24:40 +010027
Glauber de Oliveira Costa2f66dcc2008-01-30 13:31:57 +010028#include <linux/personality.h>
Glauber de Oliveira Costa5300db82008-01-30 13:31:33 +010029#include <linux/cache.h>
Glauber de Oliveira Costa2f66dcc2008-01-30 13:31:57 +010030#include <linux/threads.h>
Peter Zijlstra5cbc19a2009-09-02 11:49:52 +020031#include <linux/math64.h>
Peter Zijlstrafaa46022010-03-25 14:51:50 +010032#include <linux/err.h>
David Howellsf05e7982012-03-28 18:11:12 +010033#include <linux/irqflags.h>
Tom Lendacky21729f82017-07-17 16:10:07 -050034#include <linux/mem_encrypt.h>
David Howellsf05e7982012-03-28 18:11:12 +010035
36/*
37 * We handle most unaligned accesses in hardware. On the other hand
38 * unaligned DMA can be quite expensive on some Nehalem processors.
39 *
40 * Based on this we disable the IP header alignment in network drivers.
41 */
42#define NET_IP_ALIGN 0
Glauber de Oliveira Costac72dcf82008-01-30 13:31:27 +010043
K.Prasadb332828c2009-06-01 23:43:10 +053044#define HBP_NUM 4
Glauber de Oliveira Costa0ccb8ac2008-01-30 13:31:27 +010045/*
46 * Default implementation of macro that returns current
47 * instruction pointer ("program counter").
48 */
49static inline void *current_text_addr(void)
50{
51 void *pc;
Ingo Molnar4d46a892008-02-21 04:24:40 +010052
53 asm volatile("mov $1f, %0; 1:":"=r" (pc));
54
Glauber de Oliveira Costa0ccb8ac2008-01-30 13:31:27 +010055 return pc;
56}
57
Ingo Molnarb8c1b8ea2015-05-24 09:58:12 +020058/*
59 * These alignment constraints are for performance in the vSMP case,
60 * but in the task_struct case we must also meet hardware imposed
61 * alignment requirements of the FPU state:
62 */
Glauber de Oliveira Costadbcb4662008-01-30 13:31:31 +010063#ifdef CONFIG_X86_VSMP
Ingo Molnar4d46a892008-02-21 04:24:40 +010064# define ARCH_MIN_TASKALIGN (1 << INTERNODE_CACHE_SHIFT)
65# define ARCH_MIN_MMSTRUCT_ALIGN (1 << INTERNODE_CACHE_SHIFT)
Glauber de Oliveira Costadbcb4662008-01-30 13:31:31 +010066#else
Ingo Molnarb8c1b8ea2015-05-24 09:58:12 +020067# define ARCH_MIN_TASKALIGN __alignof__(union fpregs_state)
Ingo Molnar4d46a892008-02-21 04:24:40 +010068# define ARCH_MIN_MMSTRUCT_ALIGN 0
Glauber de Oliveira Costadbcb4662008-01-30 13:31:31 +010069#endif
70
Alex Shie0ba94f2012-06-28 09:02:16 +080071enum tlb_infos {
72 ENTRIES,
73 NR_INFO
74};
75
76extern u16 __read_mostly tlb_lli_4k[NR_INFO];
77extern u16 __read_mostly tlb_lli_2m[NR_INFO];
78extern u16 __read_mostly tlb_lli_4m[NR_INFO];
79extern u16 __read_mostly tlb_lld_4k[NR_INFO];
80extern u16 __read_mostly tlb_lld_2m[NR_INFO];
81extern u16 __read_mostly tlb_lld_4m[NR_INFO];
Kirill A. Shutemovdd360392013-12-23 14:16:58 +020082extern u16 __read_mostly tlb_lld_1g[NR_INFO];
Alex Shic4211f42012-06-28 09:02:19 +080083
Glauber de Oliveira Costa5300db82008-01-30 13:31:33 +010084/*
85 * CPU type and hardware bug flags. Kept separately for each CPU.
Mathias Krause04402112017-02-12 22:12:07 +010086 * Members of this structure are referenced in head_32.S, so think twice
Glauber de Oliveira Costa5300db82008-01-30 13:31:33 +010087 * before touching them. [mj]
88 */
89
90struct cpuinfo_x86 {
Ingo Molnar4d46a892008-02-21 04:24:40 +010091 __u8 x86; /* CPU family */
92 __u8 x86_vendor; /* CPU vendor */
93 __u8 x86_model;
Jia Zhangb3991512018-01-01 09:52:10 +080094 __u8 x86_stepping;
Mathias Krause64158132017-02-12 22:12:08 +010095#ifdef CONFIG_X86_64
Ingo Molnar4d46a892008-02-21 04:24:40 +010096 /* Number of 4K pages in DTLB/ITLB combined(in pages): */
H. Peter Anvinb1882e62009-01-23 17:18:52 -080097 int x86_tlbsize;
Jan Beulich13c6c532009-03-12 12:37:34 +000098#endif
Ingo Molnar4d46a892008-02-21 04:24:40 +010099 __u8 x86_virt_bits;
100 __u8 x86_phys_bits;
101 /* CPUID returned core id bits: */
102 __u8 x86_coreid_bits;
Borislav Petkov79a8b9a2017-02-05 11:50:21 +0100103 __u8 cu_id;
Ingo Molnar4d46a892008-02-21 04:24:40 +0100104 /* Max extended CPUID function supported: */
105 __u32 extended_cpuid_level;
Ingo Molnar4d46a892008-02-21 04:24:40 +0100106 /* Maximum supported CPUID level, -1=no CPUID: */
107 int cpuid_level;
Borislav Petkov65fc9852013-03-20 15:07:23 +0100108 __u32 x86_capability[NCAPINTS + NBUGINTS];
Ingo Molnar4d46a892008-02-21 04:24:40 +0100109 char x86_vendor_id[16];
110 char x86_model_id[64];
111 /* in KB - valid for CPUS which support this call: */
Gustavo A. R. Silva24dbc602018-02-13 13:22:08 -0600112 unsigned int x86_cache_size;
Ingo Molnar4d46a892008-02-21 04:24:40 +0100113 int x86_cache_alignment; /* In bytes */
Peter P Waskiewicz Jrcbc82b12015-01-23 18:45:43 +0000114 /* Cache QoS architectural values: */
115 int x86_cache_max_rmid; /* max index */
116 int x86_cache_occ_scale; /* scale to bytes */
Ingo Molnar4d46a892008-02-21 04:24:40 +0100117 int x86_power;
118 unsigned long loops_per_jiffy;
Ingo Molnar4d46a892008-02-21 04:24:40 +0100119 /* cpuid returned max cores value: */
120 u16 x86_max_cores;
121 u16 apicid;
Yinghai Lu01aaea12008-03-06 13:46:39 -0800122 u16 initial_apicid;
Ingo Molnar4d46a892008-02-21 04:24:40 +0100123 u16 x86_clflush_size;
Ingo Molnar4d46a892008-02-21 04:24:40 +0100124 /* number of cores as seen by the OS: */
125 u16 booted_cores;
126 /* Physical processor id: */
127 u16 phys_proc_id;
Thomas Gleixner1f12e322016-02-22 22:19:15 +0000128 /* Logical processor id: */
129 u16 logical_proc_id;
Ingo Molnar4d46a892008-02-21 04:24:40 +0100130 /* Core id: */
131 u16 cpu_core_id;
132 /* Index into per_cpu list: */
133 u16 cpu_index;
Andi Kleen506ed6b2011-10-12 17:46:33 -0700134 u32 microcode;
Andi Kleen30bb9812017-11-14 07:42:56 -0500135 unsigned initialized : 1;
Kees Cook3859a272016-10-28 01:22:25 -0700136} __randomize_layout;
Glauber de Oliveira Costa5300db82008-01-30 13:31:33 +0100137
He Chen47f10a32016-11-11 17:25:34 +0800138struct cpuid_regs {
139 u32 eax, ebx, ecx, edx;
140};
141
142enum cpuid_regs_idx {
143 CPUID_EAX = 0,
144 CPUID_EBX,
145 CPUID_ECX,
146 CPUID_EDX,
147};
148
Ingo Molnar4d46a892008-02-21 04:24:40 +0100149#define X86_VENDOR_INTEL 0
150#define X86_VENDOR_CYRIX 1
151#define X86_VENDOR_AMD 2
152#define X86_VENDOR_UMC 3
Ingo Molnar4d46a892008-02-21 04:24:40 +0100153#define X86_VENDOR_CENTAUR 5
154#define X86_VENDOR_TRANSMETA 7
155#define X86_VENDOR_NSC 8
156#define X86_VENDOR_NUM 9
157
158#define X86_VENDOR_UNKNOWN 0xff
Glauber de Oliveira Costa5300db82008-01-30 13:31:33 +0100159
Glauber de Oliveira Costa1a539052008-01-30 13:31:39 +0100160/*
161 * capabilities of CPUs
162 */
Ingo Molnar4d46a892008-02-21 04:24:40 +0100163extern struct cpuinfo_x86 boot_cpu_data;
164extern struct cpuinfo_x86 new_cpu_data;
165
Andy Lutomirski7fb983b2017-12-04 15:07:17 +0100166extern struct x86_hw_tss doublefault_tss;
Thomas Gleixner6cbd2172017-12-04 15:07:32 +0100167extern __u32 cpu_caps_cleared[NCAPINTS + NBUGINTS];
168extern __u32 cpu_caps_set[NCAPINTS + NBUGINTS];
Glauber de Oliveira Costa5300db82008-01-30 13:31:33 +0100169
170#ifdef CONFIG_SMP
Jan Beulich2c773dd2014-11-04 08:26:42 +0000171DECLARE_PER_CPU_READ_MOSTLY(struct cpuinfo_x86, cpu_info);
Glauber de Oliveira Costa5300db82008-01-30 13:31:33 +0100172#define cpu_data(cpu) per_cpu(cpu_info, cpu)
Glauber de Oliveira Costa5300db82008-01-30 13:31:33 +0100173#else
Tejun Heo7b543a52010-12-18 16:30:05 +0100174#define cpu_info boot_cpu_data
Glauber de Oliveira Costa5300db82008-01-30 13:31:33 +0100175#define cpu_data(cpu) boot_cpu_data
Glauber de Oliveira Costa5300db82008-01-30 13:31:33 +0100176#endif
177
Jaswinder Singh1c6c7272008-07-21 22:40:37 +0530178extern const struct seq_operations cpuinfo_op;
179
Ingo Molnar4d46a892008-02-21 04:24:40 +0100180#define cache_line_size() (boot_cpu_data.x86_cache_alignment)
181
182extern void cpu_detect(struct cpuinfo_x86 *c);
Glauber de Oliveira Costa1a539052008-01-30 13:31:39 +0100183
Andi Kleen17dbca12018-06-13 15:48:26 -0700184static inline unsigned long l1tf_pfn_limit(void)
185{
186 return BIT(boot_cpu_data.x86_phys_bits - 1 - PAGE_SHIFT) - 1;
187}
188
Yinghai Luf5803662008-06-21 03:24:19 -0700189extern void early_cpu_init(void);
Glauber de Oliveira Costa1a539052008-01-30 13:31:39 +0100190extern void identify_boot_cpu(void);
191extern void identify_secondary_cpu(struct cpuinfo_x86 *);
Glauber de Oliveira Costa5300db82008-01-30 13:31:33 +0100192extern void print_cpu_info(struct cpuinfo_x86 *);
Yinghai Lu21c3fcf2012-02-12 09:53:57 -0800193void print_cpu_msr(struct cpuinfo_x86 *);
Glauber de Oliveira Costa1a539052008-01-30 13:31:39 +0100194
Fenghua Yud288e1c2012-12-20 23:44:23 -0800195#ifdef CONFIG_X86_32
196extern int have_cpuid_p(void);
197#else
198static inline int have_cpuid_p(void)
199{
200 return 1;
201}
202#endif
Glauber de Oliveira Costac758ecf2008-01-30 13:31:03 +0100203static inline void native_cpuid(unsigned int *eax, unsigned int *ebx,
Ingo Molnar4d46a892008-02-21 04:24:40 +0100204 unsigned int *ecx, unsigned int *edx)
Glauber de Oliveira Costac758ecf2008-01-30 13:31:03 +0100205{
206 /* ecx is often an input as well as an output. */
Suresh Siddha45a94d72009-12-16 16:25:42 -0800207 asm volatile("cpuid"
Joe Perchescca2e6f2008-03-23 01:03:15 -0700208 : "=a" (*eax),
209 "=b" (*ebx),
210 "=c" (*ecx),
211 "=d" (*edx)
Andi Kleen506ed6b2011-10-12 17:46:33 -0700212 : "0" (*eax), "2" (*ecx)
213 : "memory");
Glauber de Oliveira Costac758ecf2008-01-30 13:31:03 +0100214}
215
Borislav Petkov5dedade2017-01-09 12:41:43 +0100216#define native_cpuid_reg(reg) \
217static inline unsigned int native_cpuid_##reg(unsigned int op) \
218{ \
219 unsigned int eax = op, ebx, ecx = 0, edx; \
220 \
221 native_cpuid(&eax, &ebx, &ecx, &edx); \
222 \
223 return reg; \
224}
225
226/*
227 * Native CPUID functions returning a single datum.
228 */
229native_cpuid_reg(eax)
230native_cpuid_reg(ebx)
231native_cpuid_reg(ecx)
232native_cpuid_reg(edx)
233
Andy Lutomirski6c690ee2017-06-12 10:26:14 -0700234/*
235 * Friendlier CR3 helpers.
236 */
237static inline unsigned long read_cr3_pa(void)
238{
239 return __read_cr3() & CR3_ADDR_MASK;
240}
241
Tom Lendackyeef9c4a2017-07-17 16:10:08 -0500242static inline unsigned long native_read_cr3_pa(void)
243{
244 return __native_read_cr3() & CR3_ADDR_MASK;
245}
246
Glauber de Oliveira Costac72dcf82008-01-30 13:31:27 +0100247static inline void load_cr3(pgd_t *pgdir)
248{
Tom Lendacky21729f82017-07-17 16:10:07 -0500249 write_cr3(__sme_pa(pgdir));
Glauber de Oliveira Costac72dcf82008-01-30 13:31:27 +0100250}
Glauber de Oliveira Costac758ecf2008-01-30 13:31:03 +0100251
Andy Lutomirski7fb983b2017-12-04 15:07:17 +0100252/*
253 * Note that while the legacy 'TSS' name comes from 'Task State Segment',
254 * on modern x86 CPUs the TSS also holds information important to 64-bit mode,
255 * unrelated to the task-switch mechanism:
256 */
Thomas Gleixner96a388d2007-10-11 11:20:03 +0200257#ifdef CONFIG_X86_32
Glauber de Oliveira Costaca241c72008-01-30 13:31:31 +0100258/* This is the TSS defined by the hardware. */
259struct x86_hw_tss {
Ingo Molnar4d46a892008-02-21 04:24:40 +0100260 unsigned short back_link, __blh;
261 unsigned long sp0;
262 unsigned short ss0, __ss0h;
Andy Lutomirskicf9328c2015-04-02 12:41:45 -0700263 unsigned long sp1;
Andy Lutomirski76e4c492015-03-10 11:06:00 -0700264
265 /*
Andy Lutomirskicf9328c2015-04-02 12:41:45 -0700266 * We don't use ring 1, so ss1 is a convenient scratch space in
267 * the same cacheline as sp0. We use ss1 to cache the value in
268 * MSR_IA32_SYSENTER_CS. When we context switch
269 * MSR_IA32_SYSENTER_CS, we first check if the new value being
270 * written matches ss1, and, if it's not, then we wrmsr the new
271 * value and update ss1.
Andy Lutomirski76e4c492015-03-10 11:06:00 -0700272 *
Andy Lutomirskicf9328c2015-04-02 12:41:45 -0700273 * The only reason we context switch MSR_IA32_SYSENTER_CS is
274 * that we set it to zero in vm86 tasks to avoid corrupting the
275 * stack if we were to go through the sysenter path from vm86
276 * mode.
Andy Lutomirski76e4c492015-03-10 11:06:00 -0700277 */
Andy Lutomirski76e4c492015-03-10 11:06:00 -0700278 unsigned short ss1; /* MSR_IA32_SYSENTER_CS */
279
280 unsigned short __ss1h;
Ingo Molnar4d46a892008-02-21 04:24:40 +0100281 unsigned long sp2;
282 unsigned short ss2, __ss2h;
283 unsigned long __cr3;
284 unsigned long ip;
285 unsigned long flags;
286 unsigned long ax;
287 unsigned long cx;
288 unsigned long dx;
289 unsigned long bx;
290 unsigned long sp;
291 unsigned long bp;
292 unsigned long si;
293 unsigned long di;
294 unsigned short es, __esh;
295 unsigned short cs, __csh;
296 unsigned short ss, __ssh;
297 unsigned short ds, __dsh;
298 unsigned short fs, __fsh;
299 unsigned short gs, __gsh;
300 unsigned short ldt, __ldth;
301 unsigned short trace;
302 unsigned short io_bitmap_base;
303
Glauber de Oliveira Costaca241c72008-01-30 13:31:31 +0100304} __attribute__((packed));
305#else
306struct x86_hw_tss {
Ingo Molnar4d46a892008-02-21 04:24:40 +0100307 u32 reserved1;
308 u64 sp0;
Andy Lutomirski9aaefe72017-12-04 15:07:21 +0100309
310 /*
311 * We store cpu_current_top_of_stack in sp1 so it's always accessible.
312 * Linux does not use ring 1, so sp1 is not otherwise needed.
313 */
Ingo Molnar4d46a892008-02-21 04:24:40 +0100314 u64 sp1;
Andy Lutomirski9aaefe72017-12-04 15:07:21 +0100315
Ingo Molnar4d46a892008-02-21 04:24:40 +0100316 u64 sp2;
317 u64 reserved2;
318 u64 ist[7];
319 u32 reserved3;
320 u32 reserved4;
321 u16 reserved5;
322 u16 io_bitmap_base;
323
Andy Lutomirskid3273de2017-02-20 08:56:13 -0800324} __attribute__((packed));
Glauber de Oliveira Costaca241c72008-01-30 13:31:31 +0100325#endif
326
327/*
Ingo Molnar4d46a892008-02-21 04:24:40 +0100328 * IO-bitmap sizes:
Glauber de Oliveira Costaca241c72008-01-30 13:31:31 +0100329 */
Ingo Molnar4d46a892008-02-21 04:24:40 +0100330#define IO_BITMAP_BITS 65536
331#define IO_BITMAP_BYTES (IO_BITMAP_BITS/8)
332#define IO_BITMAP_LONGS (IO_BITMAP_BYTES/sizeof(long))
Andy Lutomirski7fb983b2017-12-04 15:07:17 +0100333#define IO_BITMAP_OFFSET (offsetof(struct tss_struct, io_bitmap) - offsetof(struct tss_struct, x86_tss))
Ingo Molnar4d46a892008-02-21 04:24:40 +0100334#define INVALID_IO_BITMAP_OFFSET 0x8000
Glauber de Oliveira Costaca241c72008-01-30 13:31:31 +0100335
Dave Hansen4fe2d8b2017-12-04 17:25:07 -0800336struct entry_stack {
Andy Lutomirski0f9a4812017-12-04 15:07:28 +0100337 unsigned long words[64];
338};
339
Dave Hansen4fe2d8b2017-12-04 17:25:07 -0800340struct entry_stack_page {
341 struct entry_stack stack;
Andy Lutomirskic482fee2017-12-04 15:07:29 +0100342} __aligned(PAGE_SIZE);
Andy Lutomirski1a935bc2017-12-04 15:07:19 +0100343
Glauber de Oliveira Costaca241c72008-01-30 13:31:31 +0100344struct tss_struct {
Ingo Molnar4d46a892008-02-21 04:24:40 +0100345 /*
Andy Lutomirski1a935bc2017-12-04 15:07:19 +0100346 * The fixed hardware portion. This must not cross a page boundary
347 * at risk of violating the SDM's advice and potentially triggering
348 * errata.
Ingo Molnar4d46a892008-02-21 04:24:40 +0100349 */
350 struct x86_hw_tss x86_tss;
Glauber de Oliveira Costaca241c72008-01-30 13:31:31 +0100351
352 /*
353 * The extra 1 is there because the CPU will access an
354 * additional byte beyond the end of the IO permission
355 * bitmap. The extra byte must be all 1 bits, and must
356 * be within the limit.
357 */
Ingo Molnar4d46a892008-02-21 04:24:40 +0100358 unsigned long io_bitmap[IO_BITMAP_LONGS + 1];
Andy Lutomirski1a935bc2017-12-04 15:07:19 +0100359} __aligned(PAGE_SIZE);
Ingo Molnar4d46a892008-02-21 04:24:40 +0100360
Andy Lutomirskic482fee2017-12-04 15:07:29 +0100361DECLARE_PER_CPU_PAGE_ALIGNED(struct tss_struct, cpu_tss_rw);
Glauber de Oliveira Costaca241c72008-01-30 13:31:31 +0100362
Andy Lutomirski4f53ab12017-02-20 08:56:09 -0800363/*
364 * sizeof(unsigned long) coming from an extra "long" at the end
365 * of the iobitmap.
366 *
367 * -1? seg base+limit should be pointing to the address of the
368 * last valid byte
369 */
370#define __KERNEL_TSS_LIMIT \
371 (IO_BITMAP_OFFSET + IO_BITMAP_BYTES + sizeof(unsigned long) - 1)
372
Andy Lutomirskia7fcf282015-03-06 17:50:19 -0800373#ifdef CONFIG_X86_32
374DECLARE_PER_CPU(unsigned long, cpu_current_top_of_stack);
Andy Lutomirski9aaefe72017-12-04 15:07:21 +0100375#else
Andy Lutomirskic482fee2017-12-04 15:07:29 +0100376/* The RO copy can't be accessed with this_cpu_xyz(), so use the RW copy. */
377#define cpu_current_top_of_stack cpu_tss_rw.x86_tss.sp1
Andy Lutomirskia7fcf282015-03-06 17:50:19 -0800378#endif
379
Ingo Molnar4d46a892008-02-21 04:24:40 +0100380/*
381 * Save the original ist values for checking stack pointers during debugging
382 */
Glauber de Oliveira Costa1a539052008-01-30 13:31:39 +0100383struct orig_ist {
Ingo Molnar4d46a892008-02-21 04:24:40 +0100384 unsigned long ist[7];
Glauber de Oliveira Costa1a539052008-01-30 13:31:39 +0100385};
386
Glauber Costafe676202008-03-03 14:12:56 -0300387#ifdef CONFIG_X86_64
Glauber de Oliveira Costa2f66dcc2008-01-30 13:31:57 +0100388DECLARE_PER_CPU(struct orig_ist, orig_ist);
Brian Gerst26f80bd2009-01-19 00:38:58 +0900389
Brian Gerst947e76c2009-01-19 12:21:28 +0900390union irq_stack_union {
391 char irq_stack[IRQ_STACK_SIZE];
392 /*
393 * GCC hardcodes the stack canary as %gs:40. Since the
394 * irq_stack is the object at %gs:0, we reserve the bottom
395 * 48 bytes of the irq stack for the canary.
396 */
397 struct {
398 char gs_base[40];
399 unsigned long stack_canary;
400 };
401};
402
Andi Kleen277d5b42013-08-05 15:02:43 -0700403DECLARE_PER_CPU_FIRST(union irq_stack_union, irq_stack_union) __visible;
Brian Gerst2add8e22009-02-08 09:58:39 -0500404DECLARE_INIT_PER_CPU(irq_stack_union);
405
Vitaly Kuznetsov35060ed2018-03-13 18:48:05 +0100406static inline unsigned long cpu_kernelmode_gs_base(int cpu)
407{
408 return (unsigned long)per_cpu(irq_stack_union.gs_base, cpu);
409}
410
Brian Gerst26f80bd2009-01-19 00:38:58 +0900411DECLARE_PER_CPU(char *, irq_stack_ptr);
Jaswinder Singh Rajput9766cdb2009-03-14 11:19:49 +0530412DECLARE_PER_CPU(unsigned int, irq_count);
Jaswinder Singh Rajput9766cdb2009-03-14 11:19:49 +0530413extern asmlinkage void ignore_sysret(void);
Vitaly Kuznetsov42b933b2018-03-13 18:48:04 +0100414
415#if IS_ENABLED(CONFIG_KVM)
416/* Save actual FS/GS selectors and bases to current->thread */
417void save_fsgs_for_kvm(void);
418#endif
Tejun Heo60a53172009-02-09 22:17:40 +0900419#else /* X86_64 */
Linus Torvalds050e9ba2018-06-14 12:21:18 +0900420#ifdef CONFIG_STACKPROTECTOR
Jeremy Fitzhardinge1ea0d142009-09-03 12:27:15 -0700421/*
422 * Make sure stack canary segment base is cached-aligned:
423 * "For Intel Atom processors, avoid non zero segment base address
424 * that is not aligned to cache line boundary at all cost."
425 * (Optim Ref Manual Assembly/Compiler Coding Rule 15.)
426 */
427struct stack_canary {
428 char __pad[20]; /* canary at %gs:20 */
429 unsigned long canary;
430};
Jeremy Fitzhardinge53f82452009-09-03 14:31:44 -0700431DECLARE_PER_CPU_ALIGNED(struct stack_canary, stack_canary);
Thomas Gleixner96a388d2007-10-11 11:20:03 +0200432#endif
Steven Rostedt198d2082014-02-06 09:41:31 -0500433/*
434 * per-CPU IRQ handling stacks
435 */
436struct irq_stack {
437 u32 stack[THREAD_SIZE/sizeof(u32)];
438} __aligned(THREAD_SIZE);
439
440DECLARE_PER_CPU(struct irq_stack *, hardirq_stack);
441DECLARE_PER_CPU(struct irq_stack *, softirq_stack);
Tejun Heo60a53172009-02-09 22:17:40 +0900442#endif /* X86_64 */
Glauber de Oliveira Costac758ecf2008-01-30 13:31:03 +0100443
Fenghua Yubf15a8c2016-05-20 10:47:06 -0700444extern unsigned int fpu_kernel_xstate_size;
Fenghua Yua1141e02016-05-20 10:47:05 -0700445extern unsigned int fpu_user_xstate_size;
Glauber de Oliveira Costa683e0252008-01-30 13:31:27 +0100446
Frederic Weisbecker24f1e32c2009-09-09 19:22:48 +0200447struct perf_event;
448
Andy Lutomirski13d4ea02016-07-14 13:22:57 -0700449typedef struct {
450 unsigned long seg;
451} mm_segment_t;
452
Glauber de Oliveira Costacb38d372008-01-30 13:31:31 +0100453struct thread_struct {
Ingo Molnar4d46a892008-02-21 04:24:40 +0100454 /* Cached TLS descriptors: */
455 struct desc_struct tls_array[GDT_ENTRY_TLS_ENTRIES];
Andy Lutomirskid375cf12017-11-02 00:59:16 -0700456#ifdef CONFIG_X86_32
Ingo Molnar4d46a892008-02-21 04:24:40 +0100457 unsigned long sp0;
Andy Lutomirskid375cf12017-11-02 00:59:16 -0700458#endif
Ingo Molnar4d46a892008-02-21 04:24:40 +0100459 unsigned long sp;
Glauber de Oliveira Costacb38d372008-01-30 13:31:31 +0100460#ifdef CONFIG_X86_32
Ingo Molnar4d46a892008-02-21 04:24:40 +0100461 unsigned long sysenter_cs;
Glauber de Oliveira Costacb38d372008-01-30 13:31:31 +0100462#else
Ingo Molnar4d46a892008-02-21 04:24:40 +0100463 unsigned short es;
464 unsigned short ds;
465 unsigned short fsindex;
466 unsigned short gsindex;
Glauber de Oliveira Costacb38d372008-01-30 13:31:31 +0100467#endif
Andy Lutomirskib9d989c2016-09-13 14:29:21 -0700468
Alexey Dobriyand756f4ad2009-05-04 03:29:52 +0400469#ifdef CONFIG_X86_64
Andy Lutomirski296f7812016-04-26 12:23:29 -0700470 unsigned long fsbase;
471 unsigned long gsbase;
472#else
473 /*
474 * XXX: this could presumably be unsigned short. Alternatively,
475 * 32-bit kernels could be taught to use fsindex instead.
476 */
477 unsigned long fs;
478 unsigned long gs;
Alexey Dobriyand756f4ad2009-05-04 03:29:52 +0400479#endif
Ingo Molnarc5bedc62015-04-23 12:49:20 +0200480
Frederic Weisbecker24f1e32c2009-09-09 19:22:48 +0200481 /* Save middle states of ptrace breakpoints */
482 struct perf_event *ptrace_bps[HBP_NUM];
483 /* Debug status used for traps, single steps, etc... */
484 unsigned long debugreg6;
Frederic Weisbecker326264a2010-02-18 18:24:18 +0100485 /* Keep track of the exact dr7 value set by the user */
486 unsigned long ptrace_dr7;
Ingo Molnar4d46a892008-02-21 04:24:40 +0100487 /* Fault info: */
488 unsigned long cr2;
Srikar Dronamraju51e7dc72012-03-12 14:55:55 +0530489 unsigned long trap_nr;
Ingo Molnar4d46a892008-02-21 04:24:40 +0100490 unsigned long error_code;
Brian Gerst9fda6a02015-07-29 01:41:16 -0400491#ifdef CONFIG_VM86
Ingo Molnar4d46a892008-02-21 04:24:40 +0100492 /* Virtual 86 mode info */
Brian Gerst9fda6a02015-07-29 01:41:16 -0400493 struct vm86 *vm86;
Glauber de Oliveira Costacb38d372008-01-30 13:31:31 +0100494#endif
Ingo Molnar4d46a892008-02-21 04:24:40 +0100495 /* IO permissions: */
496 unsigned long *io_bitmap_ptr;
497 unsigned long iopl;
498 /* Max allowed port in the bitmap, in bytes: */
499 unsigned io_bitmap_max;
Dave Hansen0c8c0f02015-07-17 12:28:11 +0200500
Andy Lutomirski13d4ea02016-07-14 13:22:57 -0700501 mm_segment_t addr_limit;
502
Ingo Molnar2a53ccb2016-07-15 10:21:11 +0200503 unsigned int sig_on_uaccess_err:1;
Andy Lutomirskidfa9a942016-07-14 13:22:56 -0700504 unsigned int uaccess_err:1; /* uaccess failed */
505
Dave Hansen0c8c0f02015-07-17 12:28:11 +0200506 /* Floating point and extended processor state */
507 struct fpu fpu;
508 /*
509 * WARNING: 'fpu' is dynamically-sized. It *MUST* be at
510 * the end.
511 */
Glauber de Oliveira Costacb38d372008-01-30 13:31:31 +0100512};
513
Kees Cookf7d83c12017-08-16 13:26:03 -0700514/* Whitelist the FPU state from the task_struct for hardened usercopy. */
515static inline void arch_thread_struct_whitelist(unsigned long *offset,
516 unsigned long *size)
517{
518 *offset = offsetof(struct thread_struct, fpu.state);
519 *size = fpu_kernel_xstate_size;
520}
521
Glauber de Oliveira Costa62d7d7e2008-01-30 13:31:27 +0100522/*
Andy Lutomirskib9d989c2016-09-13 14:29:21 -0700523 * Thread-synchronous status.
524 *
525 * This is different from the flags in that nobody else
526 * ever touches our thread-synchronous status, so we don't
527 * have to worry about atomic accesses.
528 */
529#define TS_COMPAT 0x0002 /* 32bit syscall active (64BIT)*/
530
531/*
Glauber de Oliveira Costa62d7d7e2008-01-30 13:31:27 +0100532 * Set IOPL bits in EFLAGS from given mask
533 */
534static inline void native_set_iopl_mask(unsigned mask)
535{
536#ifdef CONFIG_X86_32
537 unsigned int reg;
Ingo Molnar4d46a892008-02-21 04:24:40 +0100538
Joe Perchescca2e6f2008-03-23 01:03:15 -0700539 asm volatile ("pushfl;"
540 "popl %0;"
541 "andl %1, %0;"
542 "orl %2, %0;"
543 "pushl %0;"
544 "popfl"
545 : "=&r" (reg)
546 : "i" (~X86_EFLAGS_IOPL), "r" (mask));
Glauber de Oliveira Costa62d7d7e2008-01-30 13:31:27 +0100547#endif
548}
549
Ingo Molnar4d46a892008-02-21 04:24:40 +0100550static inline void
Andy Lutomirskida51da12017-11-02 00:59:10 -0700551native_load_sp0(unsigned long sp0)
Glauber de Oliveira Costa7818a1e2008-01-30 13:31:31 +0100552{
Andy Lutomirskic482fee2017-12-04 15:07:29 +0100553 this_cpu_write(cpu_tss_rw.x86_tss.sp0, sp0);
Glauber de Oliveira Costa7818a1e2008-01-30 13:31:31 +0100554}
Glauber de Oliveira Costa1b46cbe2008-01-30 13:31:27 +0100555
Glauber de Oliveira Costae801f862008-01-30 13:32:08 +0100556static inline void native_swapgs(void)
557{
558#ifdef CONFIG_X86_64
559 asm volatile("swapgs" ::: "memory");
560#endif
561}
562
Andy Lutomirskia7fcf282015-03-06 17:50:19 -0800563static inline unsigned long current_top_of_stack(void)
Andy Lutomirski8ef46a62015-03-05 19:19:02 -0800564{
Andy Lutomirski9aaefe72017-12-04 15:07:21 +0100565 /*
566 * We can't read directly from tss.sp0: sp0 on x86_32 is special in
567 * and around vm86 mode and sp0 on x86_64 is special because of the
568 * entry trampoline.
569 */
Andy Lutomirskia7fcf282015-03-06 17:50:19 -0800570 return this_cpu_read_stable(cpu_current_top_of_stack);
Andy Lutomirski8ef46a62015-03-05 19:19:02 -0800571}
572
Andy Lutomirski33836422017-11-02 00:59:17 -0700573static inline bool on_thread_stack(void)
574{
575 return (unsigned long)(current_top_of_stack() -
576 current_stack_pointer) < THREAD_SIZE;
577}
578
Glauber de Oliveira Costa7818a1e2008-01-30 13:31:31 +0100579#ifdef CONFIG_PARAVIRT
580#include <asm/paravirt.h>
581#else
Ingo Molnar4d46a892008-02-21 04:24:40 +0100582#define __cpuid native_cpuid
Glauber de Oliveira Costa1b46cbe2008-01-30 13:31:27 +0100583
Andy Lutomirskida51da12017-11-02 00:59:10 -0700584static inline void load_sp0(unsigned long sp0)
Glauber de Oliveira Costa7818a1e2008-01-30 13:31:31 +0100585{
Andy Lutomirskida51da12017-11-02 00:59:10 -0700586 native_load_sp0(sp0);
Glauber de Oliveira Costa7818a1e2008-01-30 13:31:31 +0100587}
588
Glauber de Oliveira Costa62d7d7e2008-01-30 13:31:27 +0100589#define set_iopl_mask native_set_iopl_mask
Glauber de Oliveira Costa1b46cbe2008-01-30 13:31:27 +0100590#endif /* CONFIG_PARAVIRT */
591
Glauber de Oliveira Costa683e0252008-01-30 13:31:27 +0100592/* Free all resources held by a thread. */
593extern void release_thread(struct task_struct *);
594
Glauber de Oliveira Costa683e0252008-01-30 13:31:27 +0100595unsigned long get_wchan(struct task_struct *p);
Glauber de Oliveira Costac758ecf2008-01-30 13:31:03 +0100596
597/*
598 * Generic CPUID function
599 * clear %ecx since some cpus (Cyrix MII) do not set or clear %ecx
600 * resulting in stale register contents being returned.
601 */
602static inline void cpuid(unsigned int op,
603 unsigned int *eax, unsigned int *ebx,
604 unsigned int *ecx, unsigned int *edx)
605{
606 *eax = op;
607 *ecx = 0;
608 __cpuid(eax, ebx, ecx, edx);
609}
610
611/* Some CPUID calls want 'count' to be placed in ecx */
612static inline void cpuid_count(unsigned int op, int count,
613 unsigned int *eax, unsigned int *ebx,
614 unsigned int *ecx, unsigned int *edx)
615{
616 *eax = op;
617 *ecx = count;
618 __cpuid(eax, ebx, ecx, edx);
619}
620
621/*
622 * CPUID functions returning a single datum
623 */
624static inline unsigned int cpuid_eax(unsigned int op)
625{
626 unsigned int eax, ebx, ecx, edx;
627
628 cpuid(op, &eax, &ebx, &ecx, &edx);
Ingo Molnar4d46a892008-02-21 04:24:40 +0100629
Glauber de Oliveira Costac758ecf2008-01-30 13:31:03 +0100630 return eax;
631}
Ingo Molnar4d46a892008-02-21 04:24:40 +0100632
Glauber de Oliveira Costac758ecf2008-01-30 13:31:03 +0100633static inline unsigned int cpuid_ebx(unsigned int op)
634{
635 unsigned int eax, ebx, ecx, edx;
636
637 cpuid(op, &eax, &ebx, &ecx, &edx);
Ingo Molnar4d46a892008-02-21 04:24:40 +0100638
Glauber de Oliveira Costac758ecf2008-01-30 13:31:03 +0100639 return ebx;
640}
Ingo Molnar4d46a892008-02-21 04:24:40 +0100641
Glauber de Oliveira Costac758ecf2008-01-30 13:31:03 +0100642static inline unsigned int cpuid_ecx(unsigned int op)
643{
644 unsigned int eax, ebx, ecx, edx;
645
646 cpuid(op, &eax, &ebx, &ecx, &edx);
Ingo Molnar4d46a892008-02-21 04:24:40 +0100647
Glauber de Oliveira Costac758ecf2008-01-30 13:31:03 +0100648 return ecx;
649}
Ingo Molnar4d46a892008-02-21 04:24:40 +0100650
Glauber de Oliveira Costac758ecf2008-01-30 13:31:03 +0100651static inline unsigned int cpuid_edx(unsigned int op)
652{
653 unsigned int eax, ebx, ecx, edx;
654
655 cpuid(op, &eax, &ebx, &ecx, &edx);
Ingo Molnar4d46a892008-02-21 04:24:40 +0100656
Glauber de Oliveira Costac758ecf2008-01-30 13:31:03 +0100657 return edx;
658}
659
Glauber de Oliveira Costa683e0252008-01-30 13:31:27 +0100660/* REP NOP (PAUSE) is a good thing to insert into busy-wait loops. */
Denys Vlasenko0b101e62015-09-24 14:02:29 +0200661static __always_inline void rep_nop(void)
Glauber de Oliveira Costa683e0252008-01-30 13:31:27 +0100662{
Joe Perchescca2e6f2008-03-23 01:03:15 -0700663 asm volatile("rep; nop" ::: "memory");
Glauber de Oliveira Costa683e0252008-01-30 13:31:27 +0100664}
665
Denys Vlasenko0b101e62015-09-24 14:02:29 +0200666static __always_inline void cpu_relax(void)
Ingo Molnar4d46a892008-02-21 04:24:40 +0100667{
668 rep_nop();
669}
670
Andy Lutomirskic198b122016-12-09 10:24:08 -0800671/*
672 * This function forces the icache and prefetched instruction stream to
673 * catch up with reality in two very specific cases:
674 *
675 * a) Text was modified using one virtual address and is about to be executed
676 * from the same physical page at a different virtual address.
677 *
678 * b) Text was modified on a different CPU, may subsequently be
679 * executed on this CPU, and you want to make sure the new version
680 * gets executed. This generally means you're calling this in a IPI.
681 *
682 * If you're calling this for a different reason, you're probably doing
683 * it wrong.
684 */
Glauber de Oliveira Costa683e0252008-01-30 13:31:27 +0100685static inline void sync_core(void)
686{
Andy Lutomirskic198b122016-12-09 10:24:08 -0800687 /*
688 * There are quite a few ways to do this. IRET-to-self is nice
689 * because it works on every CPU, at any CPL (so it's compatible
690 * with paravirtualization), and it never exits to a hypervisor.
691 * The only down sides are that it's a bit slow (it seems to be
692 * a bit more than 2x slower than the fastest options) and that
693 * it unmasks NMIs. The "push %cs" is needed because, in
694 * paravirtual environments, __KERNEL_CS may not be a valid CS
695 * value when we do IRET directly.
696 *
697 * In case NMI unmasking or performance ever becomes a problem,
698 * the next best option appears to be MOV-to-CR2 and an
699 * unconditional jump. That sequence also works on all CPUs,
Juergen Grossecda85e2017-08-16 19:31:57 +0200700 * but it will fault at CPL3 (i.e. Xen PV).
Andy Lutomirskic198b122016-12-09 10:24:08 -0800701 *
702 * CPUID is the conventional way, but it's nasty: it doesn't
703 * exist on some 486-like CPUs, and it usually exits to a
704 * hypervisor.
705 *
706 * Like all of Linux's memory ordering operations, this is a
707 * compiler barrier as well.
708 */
Andy Lutomirski1c52d852016-12-09 10:24:05 -0800709#ifdef CONFIG_X86_32
Andy Lutomirskic198b122016-12-09 10:24:08 -0800710 asm volatile (
711 "pushfl\n\t"
712 "pushl %%cs\n\t"
713 "pushl $1f\n\t"
714 "iret\n\t"
715 "1:"
Josh Poimboeuff5caf622017-09-20 16:24:33 -0500716 : ASM_CALL_CONSTRAINT : : "memory");
H. Peter Anvin45c39fb2012-11-28 11:50:30 -0800717#else
Andy Lutomirskic198b122016-12-09 10:24:08 -0800718 unsigned int tmp;
719
720 asm volatile (
Josh Poimboeuf76846bf2017-07-11 10:33:45 -0500721 UNWIND_HINT_SAVE
Andy Lutomirskic198b122016-12-09 10:24:08 -0800722 "mov %%ss, %0\n\t"
723 "pushq %q0\n\t"
724 "pushq %%rsp\n\t"
725 "addq $8, (%%rsp)\n\t"
726 "pushfq\n\t"
727 "mov %%cs, %0\n\t"
728 "pushq %q0\n\t"
729 "pushq $1f\n\t"
730 "iretq\n\t"
Josh Poimboeuf76846bf2017-07-11 10:33:45 -0500731 UNWIND_HINT_RESTORE
Andy Lutomirskic198b122016-12-09 10:24:08 -0800732 "1:"
Josh Poimboeuff5caf622017-09-20 16:24:33 -0500733 : "=&r" (tmp), ASM_CALL_CONSTRAINT : : "cc", "memory");
Ben Hutchings5367b682009-09-10 02:53:50 +0100734#endif
Glauber de Oliveira Costa683e0252008-01-30 13:31:27 +0100735}
736
Glauber de Oliveira Costa683e0252008-01-30 13:31:27 +0100737extern void select_idle_routine(const struct cpuinfo_x86 *c);
Borislav Petkov07c94a32016-12-09 19:29:11 +0100738extern void amd_e400_c1e_apic_setup(void);
Glauber de Oliveira Costa683e0252008-01-30 13:31:27 +0100739
Ingo Molnar4d46a892008-02-21 04:24:40 +0100740extern unsigned long boot_option_idle_override;
Glauber de Oliveira Costa683e0252008-01-30 13:31:27 +0100741
Thomas Renningerd1896042010-11-03 17:06:14 +0100742enum idle_boot_override {IDLE_NO_OVERRIDE=0, IDLE_HALT, IDLE_NOMWAIT,
Len Brown69fb3672013-02-10 01:38:39 -0500743 IDLE_POLL};
Thomas Renningerd1896042010-11-03 17:06:14 +0100744
Glauber de Oliveira Costa1a539052008-01-30 13:31:39 +0100745extern void enable_sep_cpu(void);
746extern int sysenter_setup(void);
747
H. Peter Anvin8170e6b2013-01-24 12:19:52 -0800748void early_trap_pf_init(void);
Jan Kiszka29c84392010-05-20 21:04:29 -0500749
Glauber de Oliveira Costa1a539052008-01-30 13:31:39 +0100750/* Defined in head.S */
Ingo Molnar4d46a892008-02-21 04:24:40 +0100751extern struct desc_ptr early_gdt_descr;
Glauber de Oliveira Costa1a539052008-01-30 13:31:39 +0100752
Brian Gerst552be872009-01-30 17:47:53 +0900753extern void switch_to_new_gdt(int);
Thomas Garnier45fc8752017-03-14 10:05:08 -0700754extern void load_direct_gdt(int);
Thomas Garnier69218e42017-03-14 10:05:07 -0700755extern void load_fixmap_gdt(int);
Jeremy Fitzhardinge11e3a842009-01-30 17:47:54 +0900756extern void load_percpu_segment(int);
Glauber de Oliveira Costa1a539052008-01-30 13:31:39 +0100757extern void cpu_init(void);
Glauber de Oliveira Costa1a539052008-01-30 13:31:39 +0100758
Markus Metzgerc2724772008-12-11 13:49:59 +0100759static inline unsigned long get_debugctlmsr(void)
760{
Peter Zijlstraea8e61b2010-03-25 14:51:51 +0100761 unsigned long debugctlmsr = 0;
Markus Metzgerc2724772008-12-11 13:49:59 +0100762
763#ifndef CONFIG_X86_DEBUGCTLMSR
764 if (boot_cpu_data.x86 < 6)
765 return 0;
766#endif
767 rdmsrl(MSR_IA32_DEBUGCTLMSR, debugctlmsr);
768
Peter Zijlstraea8e61b2010-03-25 14:51:51 +0100769 return debugctlmsr;
Markus Metzgerc2724772008-12-11 13:49:59 +0100770}
771
Jan Beulich5b0e5082008-03-10 13:11:17 +0000772static inline void update_debugctlmsr(unsigned long debugctlmsr)
773{
774#ifndef CONFIG_X86_DEBUGCTLMSR
775 if (boot_cpu_data.x86 < 6)
776 return;
777#endif
778 wrmsrl(MSR_IA32_DEBUGCTLMSR, debugctlmsr);
779}
780
Oleg Nesterov9bd11902012-09-03 15:24:17 +0200781extern void set_task_blockstep(struct task_struct *task, bool on);
782
Ingo Molnar4d46a892008-02-21 04:24:40 +0100783/* Boot loader type from the setup header: */
784extern int bootloader_type;
H. Peter Anvin50312962009-05-07 16:54:11 -0700785extern int bootloader_version;
Glauber de Oliveira Costa1a539052008-01-30 13:31:39 +0100786
Ingo Molnar4d46a892008-02-21 04:24:40 +0100787extern char ignore_fpu_irq;
Glauber de Oliveira Costa683e0252008-01-30 13:31:27 +0100788
789#define HAVE_ARCH_PICK_MMAP_LAYOUT 1
790#define ARCH_HAS_PREFETCHW
791#define ARCH_HAS_SPINLOCK_PREFETCH
792
Glauber de Oliveira Costaae2e15e2008-01-30 13:31:40 +0100793#ifdef CONFIG_X86_32
Borislav Petkova930dc42015-01-18 17:48:18 +0100794# define BASE_PREFETCH ""
Ingo Molnar4d46a892008-02-21 04:24:40 +0100795# define ARCH_HAS_PREFETCH
Glauber de Oliveira Costaae2e15e2008-01-30 13:31:40 +0100796#else
Borislav Petkova930dc42015-01-18 17:48:18 +0100797# define BASE_PREFETCH "prefetcht0 %P1"
Glauber de Oliveira Costaae2e15e2008-01-30 13:31:40 +0100798#endif
799
Ingo Molnar4d46a892008-02-21 04:24:40 +0100800/*
801 * Prefetch instructions for Pentium III (+) and AMD Athlon (+)
802 *
803 * It's not worth to care about 3dnow prefetches for the K6
804 * because they are microcoded there and very slow.
805 */
Glauber de Oliveira Costaae2e15e2008-01-30 13:31:40 +0100806static inline void prefetch(const void *x)
807{
Borislav Petkova930dc42015-01-18 17:48:18 +0100808 alternative_input(BASE_PREFETCH, "prefetchnta %P1",
Glauber de Oliveira Costaae2e15e2008-01-30 13:31:40 +0100809 X86_FEATURE_XMM,
Borislav Petkova930dc42015-01-18 17:48:18 +0100810 "m" (*(const char *)x));
Glauber de Oliveira Costaae2e15e2008-01-30 13:31:40 +0100811}
812
Ingo Molnar4d46a892008-02-21 04:24:40 +0100813/*
814 * 3dnow prefetch to get an exclusive cache line.
815 * Useful for spinlocks to avoid one state transition in the
816 * cache coherency protocol:
817 */
Glauber de Oliveira Costaae2e15e2008-01-30 13:31:40 +0100818static inline void prefetchw(const void *x)
819{
Borislav Petkova930dc42015-01-18 17:48:18 +0100820 alternative_input(BASE_PREFETCH, "prefetchw %P1",
821 X86_FEATURE_3DNOWPREFETCH,
822 "m" (*(const char *)x));
Glauber de Oliveira Costaae2e15e2008-01-30 13:31:40 +0100823}
824
Ingo Molnar4d46a892008-02-21 04:24:40 +0100825static inline void spin_lock_prefetch(const void *x)
826{
827 prefetchw(x);
828}
829
Andy Lutomirskid9e05cc2015-03-10 11:05:59 -0700830#define TOP_OF_INIT_STACK ((unsigned long)&init_stack + sizeof(init_stack) - \
831 TOP_OF_KERNEL_STACK_PADDING)
832
Andy Lutomirski35001302017-11-02 00:59:11 -0700833#define task_top_of_stack(task) ((unsigned long)(task_pt_regs(task) + 1))
834
Andy Lutomirskid375cf12017-11-02 00:59:16 -0700835#define task_pt_regs(task) \
836({ \
837 unsigned long __ptr = (unsigned long)task_stack_page(task); \
838 __ptr += THREAD_SIZE - TOP_OF_KERNEL_STACK_PADDING; \
839 ((struct pt_regs *)__ptr) - 1; \
840})
841
Glauber de Oliveira Costa2f66dcc2008-01-30 13:31:57 +0100842#ifdef CONFIG_X86_32
843/*
844 * User space process size: 3GB (default).
845 */
Dmitry Safonov8f3e4742017-03-06 17:17:18 +0300846#define IA32_PAGE_OFFSET PAGE_OFFSET
Ingo Molnar4d46a892008-02-21 04:24:40 +0100847#define TASK_SIZE PAGE_OFFSET
Kirill A. Shutemovb569bab2017-07-17 01:59:52 +0300848#define TASK_SIZE_LOW TASK_SIZE
Ingo Molnard9517342009-02-20 23:32:28 +0100849#define TASK_SIZE_MAX TASK_SIZE
Kirill A. Shutemov44b04912017-07-17 01:59:51 +0300850#define DEFAULT_MAP_WINDOW TASK_SIZE
Ingo Molnar4d46a892008-02-21 04:24:40 +0100851#define STACK_TOP TASK_SIZE
852#define STACK_TOP_MAX STACK_TOP
Glauber de Oliveira Costa2f66dcc2008-01-30 13:31:57 +0100853
Ingo Molnar4d46a892008-02-21 04:24:40 +0100854#define INIT_THREAD { \
Andy Lutomirskid9e05cc2015-03-10 11:05:59 -0700855 .sp0 = TOP_OF_INIT_STACK, \
Ingo Molnar4d46a892008-02-21 04:24:40 +0100856 .sysenter_cs = __KERNEL_CS, \
857 .io_bitmap_ptr = NULL, \
Andy Lutomirski13d4ea02016-07-14 13:22:57 -0700858 .addr_limit = KERNEL_DS, \
Glauber de Oliveira Costa2f66dcc2008-01-30 13:31:57 +0100859}
860
Ingo Molnar4d46a892008-02-21 04:24:40 +0100861#define KSTK_ESP(task) (task_pt_regs(task)->sp)
Glauber de Oliveira Costa2f66dcc2008-01-30 13:31:57 +0100862
863#else
864/*
Andy Lutomirskif55f0502017-12-12 07:56:45 -0800865 * User space process size. This is the first address outside the user range.
866 * There are a few constraints that determine this:
867 *
868 * On Intel CPUs, if a SYSCALL instruction is at the highest canonical
869 * address, then that syscall will enter the kernel with a
870 * non-canonical return address, and SYSRET will explode dangerously.
871 * We avoid this particular problem by preventing anything executable
872 * from being mapped at the maximum canonical address.
873 *
874 * On AMD CPUs in the Ryzen family, there's a nasty bug in which the
875 * CPUs malfunction if they execute code from the highest canonical page.
876 * They'll speculate right off the end of the canonical space, and
877 * bad things happen. This is worked around in the same way as the
878 * Intel problem.
879 *
880 * With page table isolation enabled, we map the LDT in ... [stay tuned]
Glauber de Oliveira Costa2f66dcc2008-01-30 13:31:57 +0100881 */
Kirill A. Shutemovee00f4a2017-07-17 01:59:53 +0300882#define TASK_SIZE_MAX ((1UL << __VIRTUAL_MASK_SHIFT) - PAGE_SIZE)
Glauber de Oliveira Costa2f66dcc2008-01-30 13:31:57 +0100883
Kirill A. Shutemovee00f4a2017-07-17 01:59:53 +0300884#define DEFAULT_MAP_WINDOW ((1UL << 47) - PAGE_SIZE)
Glauber de Oliveira Costa2f66dcc2008-01-30 13:31:57 +0100885
886/* This decides where the kernel will search for a free chunk of vm
887 * space during mmap's.
888 */
Ingo Molnar4d46a892008-02-21 04:24:40 +0100889#define IA32_PAGE_OFFSET ((current->personality & ADDR_LIMIT_3GB) ? \
890 0xc0000000 : 0xFFFFe000)
Glauber de Oliveira Costa2f66dcc2008-01-30 13:31:57 +0100891
Kirill A. Shutemovb569bab2017-07-17 01:59:52 +0300892#define TASK_SIZE_LOW (test_thread_flag(TIF_ADDR32) ? \
893 IA32_PAGE_OFFSET : DEFAULT_MAP_WINDOW)
H. Peter Anvin6bd33002012-02-06 13:03:09 -0800894#define TASK_SIZE (test_thread_flag(TIF_ADDR32) ? \
Ingo Molnard9517342009-02-20 23:32:28 +0100895 IA32_PAGE_OFFSET : TASK_SIZE_MAX)
H. Peter Anvin6bd33002012-02-06 13:03:09 -0800896#define TASK_SIZE_OF(child) ((test_tsk_thread_flag(child, TIF_ADDR32)) ? \
Ingo Molnard9517342009-02-20 23:32:28 +0100897 IA32_PAGE_OFFSET : TASK_SIZE_MAX)
Glauber de Oliveira Costa2f66dcc2008-01-30 13:31:57 +0100898
Kirill A. Shutemovb569bab2017-07-17 01:59:52 +0300899#define STACK_TOP TASK_SIZE_LOW
Ingo Molnard9517342009-02-20 23:32:28 +0100900#define STACK_TOP_MAX TASK_SIZE_MAX
David Howells922a70d2008-02-08 04:19:26 -0800901
Andy Lutomirski13d4ea02016-07-14 13:22:57 -0700902#define INIT_THREAD { \
Andy Lutomirski13d4ea02016-07-14 13:22:57 -0700903 .addr_limit = KERNEL_DS, \
Glauber de Oliveira Costa2f66dcc2008-01-30 13:31:57 +0100904}
905
Stefani Seibold89240ba2009-11-03 10:22:40 +0100906extern unsigned long KSTK_ESP(struct task_struct *task);
H. J. Lud046ff82012-02-14 13:49:48 -0800907
Glauber de Oliveira Costa2f66dcc2008-01-30 13:31:57 +0100908#endif /* CONFIG_X86_64 */
909
Ingo Molnar513ad842008-02-21 05:18:40 +0100910extern void start_thread(struct pt_regs *regs, unsigned long new_ip,
911 unsigned long new_sp);
912
Ingo Molnar4d46a892008-02-21 04:24:40 +0100913/*
914 * This decides where the kernel will search for a free chunk of vm
Glauber de Oliveira Costa683e0252008-01-30 13:31:27 +0100915 * space during mmap's.
916 */
Dmitry Safonov8f3e4742017-03-06 17:17:18 +0300917#define __TASK_UNMAPPED_BASE(task_size) (PAGE_ALIGN(task_size / 3))
Kirill A. Shutemovb569bab2017-07-17 01:59:52 +0300918#define TASK_UNMAPPED_BASE __TASK_UNMAPPED_BASE(TASK_SIZE_LOW)
Glauber de Oliveira Costa683e0252008-01-30 13:31:27 +0100919
Ingo Molnar4d46a892008-02-21 04:24:40 +0100920#define KSTK_EIP(task) (task_pt_regs(task)->ip)
Glauber de Oliveira Costa683e0252008-01-30 13:31:27 +0100921
Erik Bosman529e25f2008-04-14 00:24:18 +0200922/* Get/set a process' ability to use the timestamp counter instruction */
923#define GET_TSC_CTL(adr) get_tsc_mode((adr))
924#define SET_TSC_CTL(val) set_tsc_mode((val))
925
926extern int get_tsc_mode(unsigned long adr);
927extern int set_tsc_mode(unsigned int val);
928
Kyle Hueye9ea1e72017-03-20 01:16:26 -0700929DECLARE_PER_CPU(u64, msr_misc_features_shadow);
930
Dave Hansenfe3d1972014-11-14 07:18:29 -0800931/* Register/unregister a process' MPX related resource */
Dave Hansen46a6e0c2015-06-07 11:37:02 -0700932#define MPX_ENABLE_MANAGEMENT() mpx_enable_management()
933#define MPX_DISABLE_MANAGEMENT() mpx_disable_management()
Dave Hansenfe3d1972014-11-14 07:18:29 -0800934
935#ifdef CONFIG_X86_INTEL_MPX
Dave Hansen46a6e0c2015-06-07 11:37:02 -0700936extern int mpx_enable_management(void);
937extern int mpx_disable_management(void);
Dave Hansenfe3d1972014-11-14 07:18:29 -0800938#else
Dave Hansen46a6e0c2015-06-07 11:37:02 -0700939static inline int mpx_enable_management(void)
Dave Hansenfe3d1972014-11-14 07:18:29 -0800940{
941 return -EINVAL;
942}
Dave Hansen46a6e0c2015-06-07 11:37:02 -0700943static inline int mpx_disable_management(void)
Dave Hansenfe3d1972014-11-14 07:18:29 -0800944{
945 return -EINVAL;
946}
947#endif /* CONFIG_X86_INTEL_MPX */
948
Borislav Petkovbc8e80d2017-06-13 18:28:30 +0200949#ifdef CONFIG_CPU_SUP_AMD
Daniel J Blueman8b84c8d2012-11-27 14:32:10 +0800950extern u16 amd_get_nb_id(int cpu);
Aravind Gopalakrishnancc2749e2015-06-15 10:28:15 +0200951extern u32 amd_get_nodes_per_socket(void);
Borislav Petkovbc8e80d2017-06-13 18:28:30 +0200952#else
953static inline u16 amd_get_nb_id(int cpu) { return 0; }
954static inline u32 amd_get_nodes_per_socket(void) { return 0; }
955#endif
Andreas Herrmann6a812692009-09-16 11:33:40 +0200956
Jason Wang96e39ac2013-07-25 16:54:32 +0800957static inline uint32_t hypervisor_cpuid_base(const char *sig, uint32_t leaves)
958{
959 uint32_t base, eax, signature[3];
960
961 for (base = 0x40000000; base < 0x40010000; base += 0x100) {
962 cpuid(base, &eax, &signature[0], &signature[1], &signature[2]);
963
964 if (!memcmp(sig, signature, 12) &&
965 (leaves == 0 || ((eax - base) >= leaves)))
966 return base;
967 }
968
969 return 0;
970}
971
David Howellsf05e7982012-03-28 18:11:12 +0100972extern unsigned long arch_align_stack(unsigned long sp);
973extern void free_init_pages(char *what, unsigned long begin, unsigned long end);
974
975void default_idle(void);
Len Brown6a377dd2013-02-09 23:08:07 -0500976#ifdef CONFIG_XEN
977bool xen_set_default_idle(void);
978#else
979#define xen_set_default_idle 0
980#endif
David Howellsf05e7982012-03-28 18:11:12 +0100981
982void stop_this_cpu(void *dummy);
Borislav Petkov4d067d82013-05-09 12:02:29 +0200983void df_debug(struct pt_regs *regs, long error_code);
Borislav Petkov1008c522018-02-16 12:26:39 +0100984void microcode_check(void);
Jiri Kosinad90a7a02018-07-13 16:23:25 +0200985
986enum l1tf_mitigations {
987 L1TF_MITIGATION_OFF,
988 L1TF_MITIGATION_FLUSH_NOWARN,
989 L1TF_MITIGATION_FLUSH,
990 L1TF_MITIGATION_FLUSH_NOSMT,
991 L1TF_MITIGATION_FULL,
992 L1TF_MITIGATION_FULL_FORCE
993};
994
995extern enum l1tf_mitigations l1tf_mitigation;
996
H. Peter Anvin1965aae2008-10-22 22:26:29 -0700997#endif /* _ASM_X86_PROCESSOR_H */