1b2441318SGreg Kroah-Hartman /* SPDX-License-Identifier: GPL-2.0 */ 21965aae3SH. Peter Anvin #ifndef _ASM_X86_PROCESSOR_H 31965aae3SH. Peter Anvin #define _ASM_X86_PROCESSOR_H 4bb898558SAl Viro 5bb898558SAl Viro #include <asm/processor-flags.h> 6bb898558SAl Viro 7bb898558SAl Viro /* Forward declaration, a strange C thing */ 8bb898558SAl Viro struct task_struct; 9bb898558SAl Viro struct mm_struct; 10577d5cd7SThomas Gleixner struct io_bitmap; 119fda6a06SBrian Gerst struct vm86; 12bb898558SAl Viro 13bb898558SAl Viro #include <asm/math_emu.h> 14bb898558SAl Viro #include <asm/segment.h> 15bb898558SAl Viro #include <asm/types.h> 16decb4c41SIngo Molnar #include <uapi/asm/sigcontext.h> 17bb898558SAl Viro #include <asm/current.h> 18cd4d09ecSBorislav Petkov #include <asm/cpufeatures.h> 19bb898558SAl Viro #include <asm/page.h> 2054321d94SJeremy Fitzhardinge #include <asm/pgtable_types.h> 21bb898558SAl Viro #include <asm/percpu.h> 22bb898558SAl Viro #include <asm/msr.h> 23bb898558SAl Viro #include <asm/desc_defs.h> 24bb898558SAl Viro #include <asm/nops.h> 25f05e798aSDavid Howells #include <asm/special_insns.h> 2614b9675aSIngo Molnar #include <asm/fpu/types.h> 2776846bf3SJosh Poimboeuf #include <asm/unwind_hints.h> 28bb898558SAl Viro 29bb898558SAl Viro #include <linux/personality.h> 30bb898558SAl Viro #include <linux/cache.h> 31bb898558SAl Viro #include <linux/threads.h> 325cbc19a9SPeter Zijlstra #include <linux/math64.h> 33faa4602eSPeter Zijlstra #include <linux/err.h> 34f05e798aSDavid Howells #include <linux/irqflags.h> 3521729f81STom Lendacky #include <linux/mem_encrypt.h> 36f05e798aSDavid Howells 37f05e798aSDavid Howells /* 38f05e798aSDavid Howells * We handle most unaligned accesses in hardware. On the other hand 39f05e798aSDavid Howells * unaligned DMA can be quite expensive on some Nehalem processors. 40f05e798aSDavid Howells * 41f05e798aSDavid Howells * Based on this we disable the IP header alignment in network drivers. 42f05e798aSDavid Howells */ 43f05e798aSDavid Howells #define NET_IP_ALIGN 0 44bb898558SAl Viro 45b332828cSK.Prasad #define HBP_NUM 4 46bb898558SAl Viro 47b8c1b8eaSIngo Molnar /* 48b8c1b8eaSIngo Molnar * These alignment constraints are for performance in the vSMP case, 49b8c1b8eaSIngo Molnar * but in the task_struct case we must also meet hardware imposed 50b8c1b8eaSIngo Molnar * alignment requirements of the FPU state: 51b8c1b8eaSIngo Molnar */ 52bb898558SAl Viro #ifdef CONFIG_X86_VSMP 53bb898558SAl Viro # define ARCH_MIN_TASKALIGN (1 << INTERNODE_CACHE_SHIFT) 54bb898558SAl Viro # define ARCH_MIN_MMSTRUCT_ALIGN (1 << INTERNODE_CACHE_SHIFT) 55bb898558SAl Viro #else 56b8c1b8eaSIngo Molnar # define ARCH_MIN_TASKALIGN __alignof__(union fpregs_state) 57bb898558SAl Viro # define ARCH_MIN_MMSTRUCT_ALIGN 0 58bb898558SAl Viro #endif 59bb898558SAl Viro 60e0ba94f1SAlex Shi enum tlb_infos { 61e0ba94f1SAlex Shi ENTRIES, 62e0ba94f1SAlex Shi NR_INFO 63e0ba94f1SAlex Shi }; 64e0ba94f1SAlex Shi 65e0ba94f1SAlex Shi extern u16 __read_mostly tlb_lli_4k[NR_INFO]; 66e0ba94f1SAlex Shi extern u16 __read_mostly tlb_lli_2m[NR_INFO]; 67e0ba94f1SAlex Shi extern u16 __read_mostly tlb_lli_4m[NR_INFO]; 68e0ba94f1SAlex Shi extern u16 __read_mostly tlb_lld_4k[NR_INFO]; 69e0ba94f1SAlex Shi extern u16 __read_mostly tlb_lld_2m[NR_INFO]; 70e0ba94f1SAlex Shi extern u16 __read_mostly tlb_lld_4m[NR_INFO]; 71dd360393SKirill A. Shutemov extern u16 __read_mostly tlb_lld_1g[NR_INFO]; 72c4211f42SAlex Shi 73bb898558SAl Viro /* 74bb898558SAl Viro * CPU type and hardware bug flags. Kept separately for each CPU. 7504402116SMathias Krause * Members of this structure are referenced in head_32.S, so think twice 76bb898558SAl Viro * before touching them. [mj] 77bb898558SAl Viro */ 78bb898558SAl Viro 79bb898558SAl Viro struct cpuinfo_x86 { 80bb898558SAl Viro __u8 x86; /* CPU family */ 81bb898558SAl Viro __u8 x86_vendor; /* CPU vendor */ 82bb898558SAl Viro __u8 x86_model; 83b399151cSJia Zhang __u8 x86_stepping; 846415813bSMathias Krause #ifdef CONFIG_X86_64 85bb898558SAl Viro /* Number of 4K pages in DTLB/ITLB combined(in pages): */ 86bb898558SAl Viro int x86_tlbsize; 8713c6c532SJan Beulich #endif 88bb898558SAl Viro __u8 x86_virt_bits; 89bb898558SAl Viro __u8 x86_phys_bits; 90bb898558SAl Viro /* CPUID returned core id bits: */ 91bb898558SAl Viro __u8 x86_coreid_bits; 9279a8b9aaSBorislav Petkov __u8 cu_id; 93bb898558SAl Viro /* Max extended CPUID function supported: */ 94bb898558SAl Viro __u32 extended_cpuid_level; 95bb898558SAl Viro /* Maximum supported CPUID level, -1=no CPUID: */ 96bb898558SAl Viro int cpuid_level; 9765fc985bSBorislav Petkov __u32 x86_capability[NCAPINTS + NBUGINTS]; 98bb898558SAl Viro char x86_vendor_id[16]; 99bb898558SAl Viro char x86_model_id[64]; 100bb898558SAl Viro /* in KB - valid for CPUS which support this call: */ 10124dbc600SGustavo A. R. Silva unsigned int x86_cache_size; 102bb898558SAl Viro int x86_cache_alignment; /* In bytes */ 103cbc82b17SPeter P Waskiewicz Jr /* Cache QoS architectural values: */ 104cbc82b17SPeter P Waskiewicz Jr int x86_cache_max_rmid; /* max index */ 105cbc82b17SPeter P Waskiewicz Jr int x86_cache_occ_scale; /* scale to bytes */ 106bb898558SAl Viro int x86_power; 107bb898558SAl Viro unsigned long loops_per_jiffy; 108bb898558SAl Viro /* cpuid returned max cores value: */ 109bb898558SAl Viro u16 x86_max_cores; 110bb898558SAl Viro u16 apicid; 111bb898558SAl Viro u16 initial_apicid; 112bb898558SAl Viro u16 x86_clflush_size; 113bb898558SAl Viro /* number of cores as seen by the OS: */ 114bb898558SAl Viro u16 booted_cores; 115bb898558SAl Viro /* Physical processor id: */ 116bb898558SAl Viro u16 phys_proc_id; 1171f12e32fSThomas Gleixner /* Logical processor id: */ 1181f12e32fSThomas Gleixner u16 logical_proc_id; 119bb898558SAl Viro /* Core id: */ 120bb898558SAl Viro u16 cpu_core_id; 1217745f03eSLen Brown u16 cpu_die_id; 122212bf4fdSLen Brown u16 logical_die_id; 123bb898558SAl Viro /* Index into per_cpu list: */ 124bb898558SAl Viro u16 cpu_index; 125506ed6b5SAndi Kleen u32 microcode; 126cc51e542SAndi Kleen /* Address space bits used by the cache internally */ 127cc51e542SAndi Kleen u8 x86_cache_bits; 12830bb9811SAndi Kleen unsigned initialized : 1; 1293859a271SKees Cook } __randomize_layout; 130bb898558SAl Viro 13147f10a36SHe Chen struct cpuid_regs { 13247f10a36SHe Chen u32 eax, ebx, ecx, edx; 13347f10a36SHe Chen }; 13447f10a36SHe Chen 13547f10a36SHe Chen enum cpuid_regs_idx { 13647f10a36SHe Chen CPUID_EAX = 0, 13747f10a36SHe Chen CPUID_EBX, 13847f10a36SHe Chen CPUID_ECX, 13947f10a36SHe Chen CPUID_EDX, 14047f10a36SHe Chen }; 14147f10a36SHe Chen 142bb898558SAl Viro #define X86_VENDOR_INTEL 0 143bb898558SAl Viro #define X86_VENDOR_CYRIX 1 144bb898558SAl Viro #define X86_VENDOR_AMD 2 145bb898558SAl Viro #define X86_VENDOR_UMC 3 146bb898558SAl Viro #define X86_VENDOR_CENTAUR 5 147bb898558SAl Viro #define X86_VENDOR_TRANSMETA 7 148bb898558SAl Viro #define X86_VENDOR_NSC 8 149c9661c1eSPu Wen #define X86_VENDOR_HYGON 9 150761fdd5eSTony W Wang-oc #define X86_VENDOR_ZHAOXIN 10 151761fdd5eSTony W Wang-oc #define X86_VENDOR_NUM 11 152bb898558SAl Viro 153bb898558SAl Viro #define X86_VENDOR_UNKNOWN 0xff 154bb898558SAl Viro 155bb898558SAl Viro /* 156bb898558SAl Viro * capabilities of CPUs 157bb898558SAl Viro */ 158bb898558SAl Viro extern struct cpuinfo_x86 boot_cpu_data; 159bb898558SAl Viro extern struct cpuinfo_x86 new_cpu_data; 160bb898558SAl Viro 1617fb983b4SAndy Lutomirski extern struct x86_hw_tss doublefault_tss; 1626cbd2171SThomas Gleixner extern __u32 cpu_caps_cleared[NCAPINTS + NBUGINTS]; 1636cbd2171SThomas Gleixner extern __u32 cpu_caps_set[NCAPINTS + NBUGINTS]; 164bb898558SAl Viro 165bb898558SAl Viro #ifdef CONFIG_SMP 1662c773dd3SJan Beulich DECLARE_PER_CPU_READ_MOSTLY(struct cpuinfo_x86, cpu_info); 167bb898558SAl Viro #define cpu_data(cpu) per_cpu(cpu_info, cpu) 168bb898558SAl Viro #else 1697b543a53STejun Heo #define cpu_info boot_cpu_data 170bb898558SAl Viro #define cpu_data(cpu) boot_cpu_data 171bb898558SAl Viro #endif 172bb898558SAl Viro 173bb898558SAl Viro extern const struct seq_operations cpuinfo_op; 174bb898558SAl Viro 175bb898558SAl Viro #define cache_line_size() (boot_cpu_data.x86_cache_alignment) 176bb898558SAl Viro 177bb898558SAl Viro extern void cpu_detect(struct cpuinfo_x86 *c); 178bb898558SAl Viro 1799df95169SVlastimil Babka static inline unsigned long long l1tf_pfn_limit(void) 18017dbca11SAndi Kleen { 181cc51e542SAndi Kleen return BIT_ULL(boot_cpu_data.x86_cache_bits - 1 - PAGE_SHIFT); 18217dbca11SAndi Kleen } 18317dbca11SAndi Kleen 184bb898558SAl Viro extern void early_cpu_init(void); 185bb898558SAl Viro extern void identify_boot_cpu(void); 186bb898558SAl Viro extern void identify_secondary_cpu(struct cpuinfo_x86 *); 187bb898558SAl Viro extern void print_cpu_info(struct cpuinfo_x86 *); 18821c3fcf3SYinghai Lu void print_cpu_msr(struct cpuinfo_x86 *); 189bb898558SAl Viro 190d288e1cfSFenghua Yu #ifdef CONFIG_X86_32 191d288e1cfSFenghua Yu extern int have_cpuid_p(void); 192d288e1cfSFenghua Yu #else 193d288e1cfSFenghua Yu static inline int have_cpuid_p(void) 194d288e1cfSFenghua Yu { 195d288e1cfSFenghua Yu return 1; 196d288e1cfSFenghua Yu } 197d288e1cfSFenghua Yu #endif 198bb898558SAl Viro static inline void native_cpuid(unsigned int *eax, unsigned int *ebx, 199bb898558SAl Viro unsigned int *ecx, unsigned int *edx) 200bb898558SAl Viro { 201bb898558SAl Viro /* ecx is often an input as well as an output. */ 20245a94d7cSSuresh Siddha asm volatile("cpuid" 203bb898558SAl Viro : "=a" (*eax), 204bb898558SAl Viro "=b" (*ebx), 205bb898558SAl Viro "=c" (*ecx), 206bb898558SAl Viro "=d" (*edx) 207506ed6b5SAndi Kleen : "0" (*eax), "2" (*ecx) 208506ed6b5SAndi Kleen : "memory"); 209bb898558SAl Viro } 210bb898558SAl Viro 2115dedade6SBorislav Petkov #define native_cpuid_reg(reg) \ 2125dedade6SBorislav Petkov static inline unsigned int native_cpuid_##reg(unsigned int op) \ 2135dedade6SBorislav Petkov { \ 2145dedade6SBorislav Petkov unsigned int eax = op, ebx, ecx = 0, edx; \ 2155dedade6SBorislav Petkov \ 2165dedade6SBorislav Petkov native_cpuid(&eax, &ebx, &ecx, &edx); \ 2175dedade6SBorislav Petkov \ 2185dedade6SBorislav Petkov return reg; \ 2195dedade6SBorislav Petkov } 2205dedade6SBorislav Petkov 2215dedade6SBorislav Petkov /* 2225dedade6SBorislav Petkov * Native CPUID functions returning a single datum. 2235dedade6SBorislav Petkov */ 2245dedade6SBorislav Petkov native_cpuid_reg(eax) 2255dedade6SBorislav Petkov native_cpuid_reg(ebx) 2265dedade6SBorislav Petkov native_cpuid_reg(ecx) 2275dedade6SBorislav Petkov native_cpuid_reg(edx) 2285dedade6SBorislav Petkov 2296c690ee1SAndy Lutomirski /* 2306c690ee1SAndy Lutomirski * Friendlier CR3 helpers. 2316c690ee1SAndy Lutomirski */ 2326c690ee1SAndy Lutomirski static inline unsigned long read_cr3_pa(void) 2336c690ee1SAndy Lutomirski { 2346c690ee1SAndy Lutomirski return __read_cr3() & CR3_ADDR_MASK; 2356c690ee1SAndy Lutomirski } 2366c690ee1SAndy Lutomirski 237eef9c4abSTom Lendacky static inline unsigned long native_read_cr3_pa(void) 238eef9c4abSTom Lendacky { 239eef9c4abSTom Lendacky return __native_read_cr3() & CR3_ADDR_MASK; 240eef9c4abSTom Lendacky } 241eef9c4abSTom Lendacky 242bb898558SAl Viro static inline void load_cr3(pgd_t *pgdir) 243bb898558SAl Viro { 24421729f81STom Lendacky write_cr3(__sme_pa(pgdir)); 245bb898558SAl Viro } 246bb898558SAl Viro 2477fb983b4SAndy Lutomirski /* 2487fb983b4SAndy Lutomirski * Note that while the legacy 'TSS' name comes from 'Task State Segment', 2497fb983b4SAndy Lutomirski * on modern x86 CPUs the TSS also holds information important to 64-bit mode, 2507fb983b4SAndy Lutomirski * unrelated to the task-switch mechanism: 2517fb983b4SAndy Lutomirski */ 252bb898558SAl Viro #ifdef CONFIG_X86_32 253bb898558SAl Viro /* This is the TSS defined by the hardware. */ 254bb898558SAl Viro struct x86_hw_tss { 255bb898558SAl Viro unsigned short back_link, __blh; 256bb898558SAl Viro unsigned long sp0; 257bb898558SAl Viro unsigned short ss0, __ss0h; 258cf9328ccSAndy Lutomirski unsigned long sp1; 25976e4c490SAndy Lutomirski 26076e4c490SAndy Lutomirski /* 261cf9328ccSAndy Lutomirski * We don't use ring 1, so ss1 is a convenient scratch space in 262cf9328ccSAndy Lutomirski * the same cacheline as sp0. We use ss1 to cache the value in 263cf9328ccSAndy Lutomirski * MSR_IA32_SYSENTER_CS. When we context switch 264cf9328ccSAndy Lutomirski * MSR_IA32_SYSENTER_CS, we first check if the new value being 265cf9328ccSAndy Lutomirski * written matches ss1, and, if it's not, then we wrmsr the new 266cf9328ccSAndy Lutomirski * value and update ss1. 26776e4c490SAndy Lutomirski * 268cf9328ccSAndy Lutomirski * The only reason we context switch MSR_IA32_SYSENTER_CS is 269cf9328ccSAndy Lutomirski * that we set it to zero in vm86 tasks to avoid corrupting the 270cf9328ccSAndy Lutomirski * stack if we were to go through the sysenter path from vm86 271cf9328ccSAndy Lutomirski * mode. 27276e4c490SAndy Lutomirski */ 27376e4c490SAndy Lutomirski unsigned short ss1; /* MSR_IA32_SYSENTER_CS */ 27476e4c490SAndy Lutomirski 27576e4c490SAndy Lutomirski unsigned short __ss1h; 276bb898558SAl Viro unsigned long sp2; 277bb898558SAl Viro unsigned short ss2, __ss2h; 278bb898558SAl Viro unsigned long __cr3; 279bb898558SAl Viro unsigned long ip; 280bb898558SAl Viro unsigned long flags; 281bb898558SAl Viro unsigned long ax; 282bb898558SAl Viro unsigned long cx; 283bb898558SAl Viro unsigned long dx; 284bb898558SAl Viro unsigned long bx; 285bb898558SAl Viro unsigned long sp; 286bb898558SAl Viro unsigned long bp; 287bb898558SAl Viro unsigned long si; 288bb898558SAl Viro unsigned long di; 289bb898558SAl Viro unsigned short es, __esh; 290bb898558SAl Viro unsigned short cs, __csh; 291bb898558SAl Viro unsigned short ss, __ssh; 292bb898558SAl Viro unsigned short ds, __dsh; 293bb898558SAl Viro unsigned short fs, __fsh; 294bb898558SAl Viro unsigned short gs, __gsh; 295bb898558SAl Viro unsigned short ldt, __ldth; 296bb898558SAl Viro unsigned short trace; 297bb898558SAl Viro unsigned short io_bitmap_base; 298bb898558SAl Viro 299bb898558SAl Viro } __attribute__((packed)); 300bb898558SAl Viro #else 301bb898558SAl Viro struct x86_hw_tss { 302bb898558SAl Viro u32 reserved1; 303bb898558SAl Viro u64 sp0; 3049aaefe7bSAndy Lutomirski 3059aaefe7bSAndy Lutomirski /* 3069aaefe7bSAndy Lutomirski * We store cpu_current_top_of_stack in sp1 so it's always accessible. 3079aaefe7bSAndy Lutomirski * Linux does not use ring 1, so sp1 is not otherwise needed. 3089aaefe7bSAndy Lutomirski */ 309bb898558SAl Viro u64 sp1; 3109aaefe7bSAndy Lutomirski 31198f05b51SAndy Lutomirski /* 31298f05b51SAndy Lutomirski * Since Linux does not use ring 2, the 'sp2' slot is unused by 31398f05b51SAndy Lutomirski * hardware. entry_SYSCALL_64 uses it as scratch space to stash 31498f05b51SAndy Lutomirski * the user RSP value. 31598f05b51SAndy Lutomirski */ 316bb898558SAl Viro u64 sp2; 31798f05b51SAndy Lutomirski 318bb898558SAl Viro u64 reserved2; 319bb898558SAl Viro u64 ist[7]; 320bb898558SAl Viro u32 reserved3; 321bb898558SAl Viro u32 reserved4; 322bb898558SAl Viro u16 reserved5; 323bb898558SAl Viro u16 io_bitmap_base; 324bb898558SAl Viro 325d3273deaSAndy Lutomirski } __attribute__((packed)); 326bb898558SAl Viro #endif 327bb898558SAl Viro 328bb898558SAl Viro /* 329bb898558SAl Viro * IO-bitmap sizes: 330bb898558SAl Viro */ 331bb898558SAl Viro #define IO_BITMAP_BITS 65536 332f5848e5fSThomas Gleixner #define IO_BITMAP_BYTES (IO_BITMAP_BITS / BITS_PER_BYTE) 333bb898558SAl Viro #define IO_BITMAP_LONGS (IO_BITMAP_BYTES / sizeof(long)) 334ecc7e37dSThomas Gleixner 335c8137aceSThomas Gleixner #define IO_BITMAP_OFFSET_VALID_MAP \ 336f5848e5fSThomas Gleixner (offsetof(struct tss_struct, io_bitmap.bitmap) - \ 337ecc7e37dSThomas Gleixner offsetof(struct tss_struct, x86_tss)) 338ecc7e37dSThomas Gleixner 339c8137aceSThomas Gleixner #define IO_BITMAP_OFFSET_VALID_ALL \ 340c8137aceSThomas Gleixner (offsetof(struct tss_struct, io_bitmap.mapall) - \ 341c8137aceSThomas Gleixner offsetof(struct tss_struct, x86_tss)) 342c8137aceSThomas Gleixner 343*111e7b15SThomas Gleixner #ifdef CONFIG_X86_IOPL_IOPERM 344ecc7e37dSThomas Gleixner /* 345c8137aceSThomas Gleixner * sizeof(unsigned long) coming from an extra "long" at the end of the 346c8137aceSThomas Gleixner * iobitmap. The limit is inclusive, i.e. the last valid byte. 347ecc7e37dSThomas Gleixner */ 348ecc7e37dSThomas Gleixner # define __KERNEL_TSS_LIMIT \ 349c8137aceSThomas Gleixner (IO_BITMAP_OFFSET_VALID_ALL + IO_BITMAP_BYTES + \ 350c8137aceSThomas Gleixner sizeof(unsigned long) - 1) 351*111e7b15SThomas Gleixner #else 352*111e7b15SThomas Gleixner # define __KERNEL_TSS_LIMIT \ 353*111e7b15SThomas Gleixner (offsetof(struct tss_struct, x86_tss) + sizeof(struct x86_hw_tss) - 1) 354*111e7b15SThomas Gleixner #endif 355ecc7e37dSThomas Gleixner 356ecc7e37dSThomas Gleixner /* Base offset outside of TSS_LIMIT so unpriviledged IO causes #GP */ 357ecc7e37dSThomas Gleixner #define IO_BITMAP_OFFSET_INVALID (__KERNEL_TSS_LIMIT + 1) 358bb898558SAl Viro 3594fe2d8b1SDave Hansen struct entry_stack { 3600f9a4810SAndy Lutomirski unsigned long words[64]; 3610f9a4810SAndy Lutomirski }; 3620f9a4810SAndy Lutomirski 3634fe2d8b1SDave Hansen struct entry_stack_page { 3644fe2d8b1SDave Hansen struct entry_stack stack; 365c482feefSAndy Lutomirski } __aligned(PAGE_SIZE); 3661a935bc3SAndy Lutomirski 367f5848e5fSThomas Gleixner /* 368f5848e5fSThomas Gleixner * All IO bitmap related data stored in the TSS: 369f5848e5fSThomas Gleixner */ 370f5848e5fSThomas Gleixner struct x86_io_bitmap { 371060aa16fSThomas Gleixner /* The sequence number of the last active bitmap. */ 372060aa16fSThomas Gleixner u64 prev_sequence; 373060aa16fSThomas Gleixner 374f5848e5fSThomas Gleixner /* 375f5848e5fSThomas Gleixner * Store the dirty size of the last io bitmap offender. The next 376f5848e5fSThomas Gleixner * one will have to do the cleanup as the switch out to a non io 377f5848e5fSThomas Gleixner * bitmap user will just set x86_tss.io_bitmap_base to a value 378f5848e5fSThomas Gleixner * outside of the TSS limit. So for sane tasks there is no need to 379f5848e5fSThomas Gleixner * actually touch the io_bitmap at all. 380f5848e5fSThomas Gleixner */ 381f5848e5fSThomas Gleixner unsigned int prev_max; 382f5848e5fSThomas Gleixner 383f5848e5fSThomas Gleixner /* 384f5848e5fSThomas Gleixner * The extra 1 is there because the CPU will access an 385f5848e5fSThomas Gleixner * additional byte beyond the end of the IO permission 386f5848e5fSThomas Gleixner * bitmap. The extra byte must be all 1 bits, and must 387f5848e5fSThomas Gleixner * be within the limit. 388f5848e5fSThomas Gleixner */ 389f5848e5fSThomas Gleixner unsigned long bitmap[IO_BITMAP_LONGS + 1]; 390c8137aceSThomas Gleixner 391c8137aceSThomas Gleixner /* 392c8137aceSThomas Gleixner * Special I/O bitmap to emulate IOPL(3). All bytes zero, 393c8137aceSThomas Gleixner * except the additional byte at the end. 394c8137aceSThomas Gleixner */ 395c8137aceSThomas Gleixner unsigned long mapall[IO_BITMAP_LONGS + 1]; 396f5848e5fSThomas Gleixner }; 397f5848e5fSThomas Gleixner 398bb898558SAl Viro struct tss_struct { 399bb898558SAl Viro /* 4001a935bc3SAndy Lutomirski * The fixed hardware portion. This must not cross a page boundary 4011a935bc3SAndy Lutomirski * at risk of violating the SDM's advice and potentially triggering 4021a935bc3SAndy Lutomirski * errata. 403bb898558SAl Viro */ 404bb898558SAl Viro struct x86_hw_tss x86_tss; 405bb898558SAl Viro 406*111e7b15SThomas Gleixner #ifdef CONFIG_X86_IOPL_IOPERM 407f5848e5fSThomas Gleixner struct x86_io_bitmap io_bitmap; 408*111e7b15SThomas Gleixner #endif 4091a935bc3SAndy Lutomirski } __aligned(PAGE_SIZE); 410bb898558SAl Viro 411c482feefSAndy Lutomirski DECLARE_PER_CPU_PAGE_ALIGNED(struct tss_struct, cpu_tss_rw); 412bb898558SAl Viro 413e6401c13SAndy Lutomirski /* Per CPU interrupt stacks */ 414e6401c13SAndy Lutomirski struct irq_stack { 415e6401c13SAndy Lutomirski char stack[IRQ_STACK_SIZE]; 416e6401c13SAndy Lutomirski } __aligned(IRQ_STACK_SIZE); 417e6401c13SAndy Lutomirski 418e6401c13SAndy Lutomirski DECLARE_PER_CPU(struct irq_stack *, hardirq_stack_ptr); 419e6401c13SAndy Lutomirski 420a7fcf28dSAndy Lutomirski #ifdef CONFIG_X86_32 421a7fcf28dSAndy Lutomirski DECLARE_PER_CPU(unsigned long, cpu_current_top_of_stack); 4229aaefe7bSAndy Lutomirski #else 423c482feefSAndy Lutomirski /* The RO copy can't be accessed with this_cpu_xyz(), so use the RW copy. */ 424c482feefSAndy Lutomirski #define cpu_current_top_of_stack cpu_tss_rw.x86_tss.sp1 425a7fcf28dSAndy Lutomirski #endif 426a7fcf28dSAndy Lutomirski 427bb898558SAl Viro #ifdef CONFIG_X86_64 428e6401c13SAndy Lutomirski struct fixed_percpu_data { 429947e76cdSBrian Gerst /* 430947e76cdSBrian Gerst * GCC hardcodes the stack canary as %gs:40. Since the 431947e76cdSBrian Gerst * irq_stack is the object at %gs:0, we reserve the bottom 432947e76cdSBrian Gerst * 48 bytes of the irq stack for the canary. 433947e76cdSBrian Gerst */ 434947e76cdSBrian Gerst char gs_base[40]; 435947e76cdSBrian Gerst unsigned long stack_canary; 436947e76cdSBrian Gerst }; 437947e76cdSBrian Gerst 438e6401c13SAndy Lutomirski DECLARE_PER_CPU_FIRST(struct fixed_percpu_data, fixed_percpu_data) __visible; 439e6401c13SAndy Lutomirski DECLARE_INIT_PER_CPU(fixed_percpu_data); 4402add8e23SBrian Gerst 44135060ed6SVitaly Kuznetsov static inline unsigned long cpu_kernelmode_gs_base(int cpu) 44235060ed6SVitaly Kuznetsov { 443e6401c13SAndy Lutomirski return (unsigned long)per_cpu(fixed_percpu_data.gs_base, cpu); 44435060ed6SVitaly Kuznetsov } 44535060ed6SVitaly Kuznetsov 4469766cdbcSJaswinder Singh Rajput DECLARE_PER_CPU(unsigned int, irq_count); 4479766cdbcSJaswinder Singh Rajput extern asmlinkage void ignore_sysret(void); 44842b933b5SVitaly Kuznetsov 44942b933b5SVitaly Kuznetsov #if IS_ENABLED(CONFIG_KVM) 45042b933b5SVitaly Kuznetsov /* Save actual FS/GS selectors and bases to current->thread */ 45142b933b5SVitaly Kuznetsov void save_fsgs_for_kvm(void); 45242b933b5SVitaly Kuznetsov #endif 45360a5317fSTejun Heo #else /* X86_64 */ 454050e9baaSLinus Torvalds #ifdef CONFIG_STACKPROTECTOR 4551ea0d14eSJeremy Fitzhardinge /* 4561ea0d14eSJeremy Fitzhardinge * Make sure stack canary segment base is cached-aligned: 4571ea0d14eSJeremy Fitzhardinge * "For Intel Atom processors, avoid non zero segment base address 4581ea0d14eSJeremy Fitzhardinge * that is not aligned to cache line boundary at all cost." 4591ea0d14eSJeremy Fitzhardinge * (Optim Ref Manual Assembly/Compiler Coding Rule 15.) 4601ea0d14eSJeremy Fitzhardinge */ 4611ea0d14eSJeremy Fitzhardinge struct stack_canary { 4621ea0d14eSJeremy Fitzhardinge char __pad[20]; /* canary at %gs:20 */ 4631ea0d14eSJeremy Fitzhardinge unsigned long canary; 4641ea0d14eSJeremy Fitzhardinge }; 46553f82452SJeremy Fitzhardinge DECLARE_PER_CPU_ALIGNED(struct stack_canary, stack_canary); 466bb898558SAl Viro #endif 467e6401c13SAndy Lutomirski /* Per CPU softirq stack pointer */ 468a754fe2bSThomas Gleixner DECLARE_PER_CPU(struct irq_stack *, softirq_stack_ptr); 46960a5317fSTejun Heo #endif /* X86_64 */ 470bb898558SAl Viro 471bf15a8cfSFenghua Yu extern unsigned int fpu_kernel_xstate_size; 472a1141e0bSFenghua Yu extern unsigned int fpu_user_xstate_size; 473bb898558SAl Viro 47424f1e32cSFrederic Weisbecker struct perf_event; 47524f1e32cSFrederic Weisbecker 47613d4ea09SAndy Lutomirski typedef struct { 47713d4ea09SAndy Lutomirski unsigned long seg; 47813d4ea09SAndy Lutomirski } mm_segment_t; 47913d4ea09SAndy Lutomirski 480bb898558SAl Viro struct thread_struct { 481bb898558SAl Viro /* Cached TLS descriptors: */ 482bb898558SAl Viro struct desc_struct tls_array[GDT_ENTRY_TLS_ENTRIES]; 483d375cf15SAndy Lutomirski #ifdef CONFIG_X86_32 484bb898558SAl Viro unsigned long sp0; 485d375cf15SAndy Lutomirski #endif 486bb898558SAl Viro unsigned long sp; 487bb898558SAl Viro #ifdef CONFIG_X86_32 488bb898558SAl Viro unsigned long sysenter_cs; 489bb898558SAl Viro #else 490bb898558SAl Viro unsigned short es; 491bb898558SAl Viro unsigned short ds; 492bb898558SAl Viro unsigned short fsindex; 493bb898558SAl Viro unsigned short gsindex; 494bb898558SAl Viro #endif 495b9d989c7SAndy Lutomirski 496d756f4adSAlexey Dobriyan #ifdef CONFIG_X86_64 497296f781aSAndy Lutomirski unsigned long fsbase; 498296f781aSAndy Lutomirski unsigned long gsbase; 499296f781aSAndy Lutomirski #else 500296f781aSAndy Lutomirski /* 501296f781aSAndy Lutomirski * XXX: this could presumably be unsigned short. Alternatively, 502296f781aSAndy Lutomirski * 32-bit kernels could be taught to use fsindex instead. 503296f781aSAndy Lutomirski */ 504bb898558SAl Viro unsigned long fs; 505bb898558SAl Viro unsigned long gs; 506296f781aSAndy Lutomirski #endif 507c5bedc68SIngo Molnar 50824f1e32cSFrederic Weisbecker /* Save middle states of ptrace breakpoints */ 50924f1e32cSFrederic Weisbecker struct perf_event *ptrace_bps[HBP_NUM]; 51024f1e32cSFrederic Weisbecker /* Debug status used for traps, single steps, etc... */ 511bb898558SAl Viro unsigned long debugreg6; 512326264a0SFrederic Weisbecker /* Keep track of the exact dr7 value set by the user */ 513326264a0SFrederic Weisbecker unsigned long ptrace_dr7; 514bb898558SAl Viro /* Fault info: */ 515bb898558SAl Viro unsigned long cr2; 51651e7dc70SSrikar Dronamraju unsigned long trap_nr; 517bb898558SAl Viro unsigned long error_code; 5189fda6a06SBrian Gerst #ifdef CONFIG_VM86 519bb898558SAl Viro /* Virtual 86 mode info */ 5209fda6a06SBrian Gerst struct vm86 *vm86; 521bb898558SAl Viro #endif 522bb898558SAl Viro /* IO permissions: */ 523577d5cd7SThomas Gleixner struct io_bitmap *io_bitmap; 524c8137aceSThomas Gleixner 525c8137aceSThomas Gleixner /* 526a24ca997SThomas Gleixner * IOPL. Priviledge level dependent I/O permission which is 527a24ca997SThomas Gleixner * emulated via the I/O bitmap to prevent user space from disabling 528a24ca997SThomas Gleixner * interrupts. 529c8137aceSThomas Gleixner */ 530c8137aceSThomas Gleixner unsigned long iopl_emul; 5310c8c0f03SDave Hansen 53213d4ea09SAndy Lutomirski mm_segment_t addr_limit; 53313d4ea09SAndy Lutomirski 5342a53ccbcSIngo Molnar unsigned int sig_on_uaccess_err:1; 535dfa9a942SAndy Lutomirski unsigned int uaccess_err:1; /* uaccess failed */ 536dfa9a942SAndy Lutomirski 5370c8c0f03SDave Hansen /* Floating point and extended processor state */ 5380c8c0f03SDave Hansen struct fpu fpu; 5390c8c0f03SDave Hansen /* 5400c8c0f03SDave Hansen * WARNING: 'fpu' is dynamically-sized. It *MUST* be at 5410c8c0f03SDave Hansen * the end. 5420c8c0f03SDave Hansen */ 543bb898558SAl Viro }; 544bb898558SAl Viro 545f7d83c1cSKees Cook /* Whitelist the FPU state from the task_struct for hardened usercopy. */ 546f7d83c1cSKees Cook static inline void arch_thread_struct_whitelist(unsigned long *offset, 547f7d83c1cSKees Cook unsigned long *size) 548f7d83c1cSKees Cook { 549f7d83c1cSKees Cook *offset = offsetof(struct thread_struct, fpu.state); 550f7d83c1cSKees Cook *size = fpu_kernel_xstate_size; 551f7d83c1cSKees Cook } 552f7d83c1cSKees Cook 553bb898558SAl Viro /* 554b9d989c7SAndy Lutomirski * Thread-synchronous status. 555b9d989c7SAndy Lutomirski * 556b9d989c7SAndy Lutomirski * This is different from the flags in that nobody else 557b9d989c7SAndy Lutomirski * ever touches our thread-synchronous status, so we don't 558b9d989c7SAndy Lutomirski * have to worry about atomic accesses. 559b9d989c7SAndy Lutomirski */ 560b9d989c7SAndy Lutomirski #define TS_COMPAT 0x0002 /* 32bit syscall active (64BIT)*/ 561b9d989c7SAndy Lutomirski 562bb898558SAl Viro static inline void 563da51da18SAndy Lutomirski native_load_sp0(unsigned long sp0) 564bb898558SAl Viro { 565c482feefSAndy Lutomirski this_cpu_write(cpu_tss_rw.x86_tss.sp0, sp0); 566bb898558SAl Viro } 567bb898558SAl Viro 568bb898558SAl Viro static inline void native_swapgs(void) 569bb898558SAl Viro { 570bb898558SAl Viro #ifdef CONFIG_X86_64 571bb898558SAl Viro asm volatile("swapgs" ::: "memory"); 572bb898558SAl Viro #endif 573bb898558SAl Viro } 574bb898558SAl Viro 575a7fcf28dSAndy Lutomirski static inline unsigned long current_top_of_stack(void) 5768ef46a67SAndy Lutomirski { 5779aaefe7bSAndy Lutomirski /* 5789aaefe7bSAndy Lutomirski * We can't read directly from tss.sp0: sp0 on x86_32 is special in 5799aaefe7bSAndy Lutomirski * and around vm86 mode and sp0 on x86_64 is special because of the 5809aaefe7bSAndy Lutomirski * entry trampoline. 5819aaefe7bSAndy Lutomirski */ 582a7fcf28dSAndy Lutomirski return this_cpu_read_stable(cpu_current_top_of_stack); 5838ef46a67SAndy Lutomirski } 5848ef46a67SAndy Lutomirski 5853383642cSAndy Lutomirski static inline bool on_thread_stack(void) 5863383642cSAndy Lutomirski { 5873383642cSAndy Lutomirski return (unsigned long)(current_top_of_stack() - 5883383642cSAndy Lutomirski current_stack_pointer) < THREAD_SIZE; 5893383642cSAndy Lutomirski } 5903383642cSAndy Lutomirski 5919bad5658SJuergen Gross #ifdef CONFIG_PARAVIRT_XXL 592bb898558SAl Viro #include <asm/paravirt.h> 593bb898558SAl Viro #else 594bb898558SAl Viro #define __cpuid native_cpuid 595bb898558SAl Viro 596da51da18SAndy Lutomirski static inline void load_sp0(unsigned long sp0) 597bb898558SAl Viro { 598da51da18SAndy Lutomirski native_load_sp0(sp0); 599bb898558SAl Viro } 600bb898558SAl Viro 6019bad5658SJuergen Gross #endif /* CONFIG_PARAVIRT_XXL */ 602bb898558SAl Viro 603bb898558SAl Viro /* Free all resources held by a thread. */ 604bb898558SAl Viro extern void release_thread(struct task_struct *); 605bb898558SAl Viro 606bb898558SAl Viro unsigned long get_wchan(struct task_struct *p); 607bb898558SAl Viro 608bb898558SAl Viro /* 609bb898558SAl Viro * Generic CPUID function 610bb898558SAl Viro * clear %ecx since some cpus (Cyrix MII) do not set or clear %ecx 611bb898558SAl Viro * resulting in stale register contents being returned. 612bb898558SAl Viro */ 613bb898558SAl Viro static inline void cpuid(unsigned int op, 614bb898558SAl Viro unsigned int *eax, unsigned int *ebx, 615bb898558SAl Viro unsigned int *ecx, unsigned int *edx) 616bb898558SAl Viro { 617bb898558SAl Viro *eax = op; 618bb898558SAl Viro *ecx = 0; 619bb898558SAl Viro __cpuid(eax, ebx, ecx, edx); 620bb898558SAl Viro } 621bb898558SAl Viro 622bb898558SAl Viro /* Some CPUID calls want 'count' to be placed in ecx */ 623bb898558SAl Viro static inline void cpuid_count(unsigned int op, int count, 624bb898558SAl Viro unsigned int *eax, unsigned int *ebx, 625bb898558SAl Viro unsigned int *ecx, unsigned int *edx) 626bb898558SAl Viro { 627bb898558SAl Viro *eax = op; 628bb898558SAl Viro *ecx = count; 629bb898558SAl Viro __cpuid(eax, ebx, ecx, edx); 630bb898558SAl Viro } 631bb898558SAl Viro 632bb898558SAl Viro /* 633bb898558SAl Viro * CPUID functions returning a single datum 634bb898558SAl Viro */ 635bb898558SAl Viro static inline unsigned int cpuid_eax(unsigned int op) 636bb898558SAl Viro { 637bb898558SAl Viro unsigned int eax, ebx, ecx, edx; 638bb898558SAl Viro 639bb898558SAl Viro cpuid(op, &eax, &ebx, &ecx, &edx); 640bb898558SAl Viro 641bb898558SAl Viro return eax; 642bb898558SAl Viro } 643bb898558SAl Viro 644bb898558SAl Viro static inline unsigned int cpuid_ebx(unsigned int op) 645bb898558SAl Viro { 646bb898558SAl Viro unsigned int eax, ebx, ecx, edx; 647bb898558SAl Viro 648bb898558SAl Viro cpuid(op, &eax, &ebx, &ecx, &edx); 649bb898558SAl Viro 650bb898558SAl Viro return ebx; 651bb898558SAl Viro } 652bb898558SAl Viro 653bb898558SAl Viro static inline unsigned int cpuid_ecx(unsigned int op) 654bb898558SAl Viro { 655bb898558SAl Viro unsigned int eax, ebx, ecx, edx; 656bb898558SAl Viro 657bb898558SAl Viro cpuid(op, &eax, &ebx, &ecx, &edx); 658bb898558SAl Viro 659bb898558SAl Viro return ecx; 660bb898558SAl Viro } 661bb898558SAl Viro 662bb898558SAl Viro static inline unsigned int cpuid_edx(unsigned int op) 663bb898558SAl Viro { 664bb898558SAl Viro unsigned int eax, ebx, ecx, edx; 665bb898558SAl Viro 666bb898558SAl Viro cpuid(op, &eax, &ebx, &ecx, &edx); 667bb898558SAl Viro 668bb898558SAl Viro return edx; 669bb898558SAl Viro } 670bb898558SAl Viro 671bb898558SAl Viro /* REP NOP (PAUSE) is a good thing to insert into busy-wait loops. */ 6720b101e62SDenys Vlasenko static __always_inline void rep_nop(void) 673bb898558SAl Viro { 674bb898558SAl Viro asm volatile("rep; nop" ::: "memory"); 675bb898558SAl Viro } 676bb898558SAl Viro 6770b101e62SDenys Vlasenko static __always_inline void cpu_relax(void) 678bb898558SAl Viro { 679bb898558SAl Viro rep_nop(); 680bb898558SAl Viro } 681bb898558SAl Viro 682c198b121SAndy Lutomirski /* 683c198b121SAndy Lutomirski * This function forces the icache and prefetched instruction stream to 684c198b121SAndy Lutomirski * catch up with reality in two very specific cases: 685c198b121SAndy Lutomirski * 686c198b121SAndy Lutomirski * a) Text was modified using one virtual address and is about to be executed 687c198b121SAndy Lutomirski * from the same physical page at a different virtual address. 688c198b121SAndy Lutomirski * 689c198b121SAndy Lutomirski * b) Text was modified on a different CPU, may subsequently be 690c198b121SAndy Lutomirski * executed on this CPU, and you want to make sure the new version 691c198b121SAndy Lutomirski * gets executed. This generally means you're calling this in a IPI. 692c198b121SAndy Lutomirski * 693c198b121SAndy Lutomirski * If you're calling this for a different reason, you're probably doing 694c198b121SAndy Lutomirski * it wrong. 695c198b121SAndy Lutomirski */ 696bb898558SAl Viro static inline void sync_core(void) 697bb898558SAl Viro { 698c198b121SAndy Lutomirski /* 699c198b121SAndy Lutomirski * There are quite a few ways to do this. IRET-to-self is nice 700c198b121SAndy Lutomirski * because it works on every CPU, at any CPL (so it's compatible 701c198b121SAndy Lutomirski * with paravirtualization), and it never exits to a hypervisor. 702c198b121SAndy Lutomirski * The only down sides are that it's a bit slow (it seems to be 703c198b121SAndy Lutomirski * a bit more than 2x slower than the fastest options) and that 704c198b121SAndy Lutomirski * it unmasks NMIs. The "push %cs" is needed because, in 705c198b121SAndy Lutomirski * paravirtual environments, __KERNEL_CS may not be a valid CS 706c198b121SAndy Lutomirski * value when we do IRET directly. 707c198b121SAndy Lutomirski * 708c198b121SAndy Lutomirski * In case NMI unmasking or performance ever becomes a problem, 709c198b121SAndy Lutomirski * the next best option appears to be MOV-to-CR2 and an 710c198b121SAndy Lutomirski * unconditional jump. That sequence also works on all CPUs, 711ecda85e7SJuergen Gross * but it will fault at CPL3 (i.e. Xen PV). 712c198b121SAndy Lutomirski * 713c198b121SAndy Lutomirski * CPUID is the conventional way, but it's nasty: it doesn't 714c198b121SAndy Lutomirski * exist on some 486-like CPUs, and it usually exits to a 715c198b121SAndy Lutomirski * hypervisor. 716c198b121SAndy Lutomirski * 717c198b121SAndy Lutomirski * Like all of Linux's memory ordering operations, this is a 718c198b121SAndy Lutomirski * compiler barrier as well. 719c198b121SAndy Lutomirski */ 7201c52d859SAndy Lutomirski #ifdef CONFIG_X86_32 721c198b121SAndy Lutomirski asm volatile ( 722c198b121SAndy Lutomirski "pushfl\n\t" 723c198b121SAndy Lutomirski "pushl %%cs\n\t" 724c198b121SAndy Lutomirski "pushl $1f\n\t" 725c198b121SAndy Lutomirski "iret\n\t" 72645c39fb0SH. Peter Anvin "1:" 727f5caf621SJosh Poimboeuf : ASM_CALL_CONSTRAINT : : "memory"); 72845c39fb0SH. Peter Anvin #else 729c198b121SAndy Lutomirski unsigned int tmp; 730c198b121SAndy Lutomirski 731c198b121SAndy Lutomirski asm volatile ( 73276846bf3SJosh Poimboeuf UNWIND_HINT_SAVE 733c198b121SAndy Lutomirski "mov %%ss, %0\n\t" 734c198b121SAndy Lutomirski "pushq %q0\n\t" 735c198b121SAndy Lutomirski "pushq %%rsp\n\t" 736c198b121SAndy Lutomirski "addq $8, (%%rsp)\n\t" 737c198b121SAndy Lutomirski "pushfq\n\t" 738c198b121SAndy Lutomirski "mov %%cs, %0\n\t" 739c198b121SAndy Lutomirski "pushq %q0\n\t" 740c198b121SAndy Lutomirski "pushq $1f\n\t" 741c198b121SAndy Lutomirski "iretq\n\t" 74276846bf3SJosh Poimboeuf UNWIND_HINT_RESTORE 743c198b121SAndy Lutomirski "1:" 744f5caf621SJosh Poimboeuf : "=&r" (tmp), ASM_CALL_CONSTRAINT : : "cc", "memory"); 74545c39fb0SH. Peter Anvin #endif 746bb898558SAl Viro } 747bb898558SAl Viro 748bb898558SAl Viro extern void select_idle_routine(const struct cpuinfo_x86 *c); 74907c94a38SBorislav Petkov extern void amd_e400_c1e_apic_setup(void); 750bb898558SAl Viro 751bb898558SAl Viro extern unsigned long boot_option_idle_override; 752bb898558SAl Viro 753d1896049SThomas Renninger enum idle_boot_override {IDLE_NO_OVERRIDE=0, IDLE_HALT, IDLE_NOMWAIT, 75469fb3676SLen Brown IDLE_POLL}; 755d1896049SThomas Renninger 756bb898558SAl Viro extern void enable_sep_cpu(void); 757bb898558SAl Viro extern int sysenter_setup(void); 758bb898558SAl Viro 75929c84391SJan Kiszka 760bb898558SAl Viro /* Defined in head.S */ 761bb898558SAl Viro extern struct desc_ptr early_gdt_descr; 762bb898558SAl Viro 763552be871SBrian Gerst extern void switch_to_new_gdt(int); 76445fc8757SThomas Garnier extern void load_direct_gdt(int); 76569218e47SThomas Garnier extern void load_fixmap_gdt(int); 76611e3a840SJeremy Fitzhardinge extern void load_percpu_segment(int); 767bb898558SAl Viro extern void cpu_init(void); 7687652ac92SThomas Gleixner extern void cr4_init(void); 769bb898558SAl Viro 770c2724775SMarkus Metzger static inline unsigned long get_debugctlmsr(void) 771c2724775SMarkus Metzger { 772c2724775SMarkus Metzger unsigned long debugctlmsr = 0; 773c2724775SMarkus Metzger 774c2724775SMarkus Metzger #ifndef CONFIG_X86_DEBUGCTLMSR 775c2724775SMarkus Metzger if (boot_cpu_data.x86 < 6) 776c2724775SMarkus Metzger return 0; 777c2724775SMarkus Metzger #endif 778c2724775SMarkus Metzger rdmsrl(MSR_IA32_DEBUGCTLMSR, debugctlmsr); 779c2724775SMarkus Metzger 780c2724775SMarkus Metzger return debugctlmsr; 781c2724775SMarkus Metzger } 782c2724775SMarkus Metzger 783bb898558SAl Viro static inline void update_debugctlmsr(unsigned long debugctlmsr) 784bb898558SAl Viro { 785bb898558SAl Viro #ifndef CONFIG_X86_DEBUGCTLMSR 786bb898558SAl Viro if (boot_cpu_data.x86 < 6) 787bb898558SAl Viro return; 788bb898558SAl Viro #endif 789bb898558SAl Viro wrmsrl(MSR_IA32_DEBUGCTLMSR, debugctlmsr); 790bb898558SAl Viro } 791bb898558SAl Viro 7929bd1190aSOleg Nesterov extern void set_task_blockstep(struct task_struct *task, bool on); 7939bd1190aSOleg Nesterov 794bb898558SAl Viro /* Boot loader type from the setup header: */ 795bb898558SAl Viro extern int bootloader_type; 7965031296cSH. Peter Anvin extern int bootloader_version; 797bb898558SAl Viro 798bb898558SAl Viro extern char ignore_fpu_irq; 799bb898558SAl Viro 800bb898558SAl Viro #define HAVE_ARCH_PICK_MMAP_LAYOUT 1 801bb898558SAl Viro #define ARCH_HAS_PREFETCHW 802bb898558SAl Viro #define ARCH_HAS_SPINLOCK_PREFETCH 803bb898558SAl Viro 804bb898558SAl Viro #ifdef CONFIG_X86_32 805a930dc45SBorislav Petkov # define BASE_PREFETCH "" 806bb898558SAl Viro # define ARCH_HAS_PREFETCH 807bb898558SAl Viro #else 808a930dc45SBorislav Petkov # define BASE_PREFETCH "prefetcht0 %P1" 809bb898558SAl Viro #endif 810bb898558SAl Viro 811bb898558SAl Viro /* 812bb898558SAl Viro * Prefetch instructions for Pentium III (+) and AMD Athlon (+) 813bb898558SAl Viro * 814bb898558SAl Viro * It's not worth to care about 3dnow prefetches for the K6 815bb898558SAl Viro * because they are microcoded there and very slow. 816bb898558SAl Viro */ 817bb898558SAl Viro static inline void prefetch(const void *x) 818bb898558SAl Viro { 819a930dc45SBorislav Petkov alternative_input(BASE_PREFETCH, "prefetchnta %P1", 820bb898558SAl Viro X86_FEATURE_XMM, 821a930dc45SBorislav Petkov "m" (*(const char *)x)); 822bb898558SAl Viro } 823bb898558SAl Viro 824bb898558SAl Viro /* 825bb898558SAl Viro * 3dnow prefetch to get an exclusive cache line. 826bb898558SAl Viro * Useful for spinlocks to avoid one state transition in the 827bb898558SAl Viro * cache coherency protocol: 828bb898558SAl Viro */ 829bb898558SAl Viro static inline void prefetchw(const void *x) 830bb898558SAl Viro { 831a930dc45SBorislav Petkov alternative_input(BASE_PREFETCH, "prefetchw %P1", 832a930dc45SBorislav Petkov X86_FEATURE_3DNOWPREFETCH, 833a930dc45SBorislav Petkov "m" (*(const char *)x)); 834bb898558SAl Viro } 835bb898558SAl Viro 836bb898558SAl Viro static inline void spin_lock_prefetch(const void *x) 837bb898558SAl Viro { 838bb898558SAl Viro prefetchw(x); 839bb898558SAl Viro } 840bb898558SAl Viro 841d9e05cc5SAndy Lutomirski #define TOP_OF_INIT_STACK ((unsigned long)&init_stack + sizeof(init_stack) - \ 842d9e05cc5SAndy Lutomirski TOP_OF_KERNEL_STACK_PADDING) 843d9e05cc5SAndy Lutomirski 8443500130bSAndy Lutomirski #define task_top_of_stack(task) ((unsigned long)(task_pt_regs(task) + 1)) 8453500130bSAndy Lutomirski 846d375cf15SAndy Lutomirski #define task_pt_regs(task) \ 847d375cf15SAndy Lutomirski ({ \ 848d375cf15SAndy Lutomirski unsigned long __ptr = (unsigned long)task_stack_page(task); \ 849d375cf15SAndy Lutomirski __ptr += THREAD_SIZE - TOP_OF_KERNEL_STACK_PADDING; \ 850d375cf15SAndy Lutomirski ((struct pt_regs *)__ptr) - 1; \ 851d375cf15SAndy Lutomirski }) 852d375cf15SAndy Lutomirski 853bb898558SAl Viro #ifdef CONFIG_X86_32 854bb898558SAl Viro /* 855bb898558SAl Viro * User space process size: 3GB (default). 856bb898558SAl Viro */ 8578f3e474fSDmitry Safonov #define IA32_PAGE_OFFSET PAGE_OFFSET 858bb898558SAl Viro #define TASK_SIZE PAGE_OFFSET 859b569bab7SKirill A. Shutemov #define TASK_SIZE_LOW TASK_SIZE 860d9517346SIngo Molnar #define TASK_SIZE_MAX TASK_SIZE 86144b04912SKirill A. Shutemov #define DEFAULT_MAP_WINDOW TASK_SIZE 862bb898558SAl Viro #define STACK_TOP TASK_SIZE 863bb898558SAl Viro #define STACK_TOP_MAX STACK_TOP 864bb898558SAl Viro 865bb898558SAl Viro #define INIT_THREAD { \ 866d9e05cc5SAndy Lutomirski .sp0 = TOP_OF_INIT_STACK, \ 867bb898558SAl Viro .sysenter_cs = __KERNEL_CS, \ 86813d4ea09SAndy Lutomirski .addr_limit = KERNEL_DS, \ 869bb898558SAl Viro } 870bb898558SAl Viro 871bb898558SAl Viro #define KSTK_ESP(task) (task_pt_regs(task)->sp) 872bb898558SAl Viro 873bb898558SAl Viro #else 874bb898558SAl Viro /* 875f55f0501SAndy Lutomirski * User space process size. This is the first address outside the user range. 876f55f0501SAndy Lutomirski * There are a few constraints that determine this: 877f55f0501SAndy Lutomirski * 878f55f0501SAndy Lutomirski * On Intel CPUs, if a SYSCALL instruction is at the highest canonical 879f55f0501SAndy Lutomirski * address, then that syscall will enter the kernel with a 880f55f0501SAndy Lutomirski * non-canonical return address, and SYSRET will explode dangerously. 881f55f0501SAndy Lutomirski * We avoid this particular problem by preventing anything executable 882f55f0501SAndy Lutomirski * from being mapped at the maximum canonical address. 883f55f0501SAndy Lutomirski * 884f55f0501SAndy Lutomirski * On AMD CPUs in the Ryzen family, there's a nasty bug in which the 885f55f0501SAndy Lutomirski * CPUs malfunction if they execute code from the highest canonical page. 886f55f0501SAndy Lutomirski * They'll speculate right off the end of the canonical space, and 887f55f0501SAndy Lutomirski * bad things happen. This is worked around in the same way as the 888f55f0501SAndy Lutomirski * Intel problem. 889f55f0501SAndy Lutomirski * 890f55f0501SAndy Lutomirski * With page table isolation enabled, we map the LDT in ... [stay tuned] 891bb898558SAl Viro */ 892ee00f4a3SKirill A. Shutemov #define TASK_SIZE_MAX ((1UL << __VIRTUAL_MASK_SHIFT) - PAGE_SIZE) 893bb898558SAl Viro 894ee00f4a3SKirill A. Shutemov #define DEFAULT_MAP_WINDOW ((1UL << 47) - PAGE_SIZE) 895bb898558SAl Viro 896bb898558SAl Viro /* This decides where the kernel will search for a free chunk of vm 897bb898558SAl Viro * space during mmap's. 898bb898558SAl Viro */ 899bb898558SAl Viro #define IA32_PAGE_OFFSET ((current->personality & ADDR_LIMIT_3GB) ? \ 900bb898558SAl Viro 0xc0000000 : 0xFFFFe000) 901bb898558SAl Viro 902b569bab7SKirill A. Shutemov #define TASK_SIZE_LOW (test_thread_flag(TIF_ADDR32) ? \ 903b569bab7SKirill A. Shutemov IA32_PAGE_OFFSET : DEFAULT_MAP_WINDOW) 9046bd33008SH. Peter Anvin #define TASK_SIZE (test_thread_flag(TIF_ADDR32) ? \ 905d9517346SIngo Molnar IA32_PAGE_OFFSET : TASK_SIZE_MAX) 9066bd33008SH. Peter Anvin #define TASK_SIZE_OF(child) ((test_tsk_thread_flag(child, TIF_ADDR32)) ? \ 907d9517346SIngo Molnar IA32_PAGE_OFFSET : TASK_SIZE_MAX) 908bb898558SAl Viro 909b569bab7SKirill A. Shutemov #define STACK_TOP TASK_SIZE_LOW 910d9517346SIngo Molnar #define STACK_TOP_MAX TASK_SIZE_MAX 911bb898558SAl Viro 912bb898558SAl Viro #define INIT_THREAD { \ 91313d4ea09SAndy Lutomirski .addr_limit = KERNEL_DS, \ 914bb898558SAl Viro } 915bb898558SAl Viro 91689240ba0SStefani Seibold extern unsigned long KSTK_ESP(struct task_struct *task); 917d046ff8bSH. J. Lu 918bb898558SAl Viro #endif /* CONFIG_X86_64 */ 919bb898558SAl Viro 920bb898558SAl Viro extern void start_thread(struct pt_regs *regs, unsigned long new_ip, 921bb898558SAl Viro unsigned long new_sp); 922bb898558SAl Viro 923bb898558SAl Viro /* 924bb898558SAl Viro * This decides where the kernel will search for a free chunk of vm 925bb898558SAl Viro * space during mmap's. 926bb898558SAl Viro */ 9278f3e474fSDmitry Safonov #define __TASK_UNMAPPED_BASE(task_size) (PAGE_ALIGN(task_size / 3)) 928b569bab7SKirill A. Shutemov #define TASK_UNMAPPED_BASE __TASK_UNMAPPED_BASE(TASK_SIZE_LOW) 929bb898558SAl Viro 930bb898558SAl Viro #define KSTK_EIP(task) (task_pt_regs(task)->ip) 931bb898558SAl Viro 932bb898558SAl Viro /* Get/set a process' ability to use the timestamp counter instruction */ 933bb898558SAl Viro #define GET_TSC_CTL(adr) get_tsc_mode((adr)) 934bb898558SAl Viro #define SET_TSC_CTL(val) set_tsc_mode((val)) 935bb898558SAl Viro 936bb898558SAl Viro extern int get_tsc_mode(unsigned long adr); 937bb898558SAl Viro extern int set_tsc_mode(unsigned int val); 938bb898558SAl Viro 939e9ea1e7fSKyle Huey DECLARE_PER_CPU(u64, msr_misc_features_shadow); 940e9ea1e7fSKyle Huey 941fe3d197fSDave Hansen /* Register/unregister a process' MPX related resource */ 94246a6e0cfSDave Hansen #define MPX_ENABLE_MANAGEMENT() mpx_enable_management() 94346a6e0cfSDave Hansen #define MPX_DISABLE_MANAGEMENT() mpx_disable_management() 944fe3d197fSDave Hansen 945fe3d197fSDave Hansen #ifdef CONFIG_X86_INTEL_MPX 94646a6e0cfSDave Hansen extern int mpx_enable_management(void); 94746a6e0cfSDave Hansen extern int mpx_disable_management(void); 948fe3d197fSDave Hansen #else 94946a6e0cfSDave Hansen static inline int mpx_enable_management(void) 950fe3d197fSDave Hansen { 951fe3d197fSDave Hansen return -EINVAL; 952fe3d197fSDave Hansen } 95346a6e0cfSDave Hansen static inline int mpx_disable_management(void) 954fe3d197fSDave Hansen { 955fe3d197fSDave Hansen return -EINVAL; 956fe3d197fSDave Hansen } 957fe3d197fSDave Hansen #endif /* CONFIG_X86_INTEL_MPX */ 958fe3d197fSDave Hansen 959bc8e80d5SBorislav Petkov #ifdef CONFIG_CPU_SUP_AMD 9608b84c8dfSDaniel J Blueman extern u16 amd_get_nb_id(int cpu); 961cc2749e4SAravind Gopalakrishnan extern u32 amd_get_nodes_per_socket(void); 962bc8e80d5SBorislav Petkov #else 963bc8e80d5SBorislav Petkov static inline u16 amd_get_nb_id(int cpu) { return 0; } 964bc8e80d5SBorislav Petkov static inline u32 amd_get_nodes_per_socket(void) { return 0; } 965bc8e80d5SBorislav Petkov #endif 9666a812691SAndreas Herrmann 96796e39ac0SJason Wang static inline uint32_t hypervisor_cpuid_base(const char *sig, uint32_t leaves) 96896e39ac0SJason Wang { 96996e39ac0SJason Wang uint32_t base, eax, signature[3]; 97096e39ac0SJason Wang 97196e39ac0SJason Wang for (base = 0x40000000; base < 0x40010000; base += 0x100) { 97296e39ac0SJason Wang cpuid(base, &eax, &signature[0], &signature[1], &signature[2]); 97396e39ac0SJason Wang 97496e39ac0SJason Wang if (!memcmp(sig, signature, 12) && 97596e39ac0SJason Wang (leaves == 0 || ((eax - base) >= leaves))) 97696e39ac0SJason Wang return base; 97796e39ac0SJason Wang } 97896e39ac0SJason Wang 97996e39ac0SJason Wang return 0; 98096e39ac0SJason Wang } 98196e39ac0SJason Wang 982f05e798aSDavid Howells extern unsigned long arch_align_stack(unsigned long sp); 983e5cb113fSAlexey Dobriyan void free_init_pages(const char *what, unsigned long begin, unsigned long end); 9846ea2738eSDave Hansen extern void free_kernel_image_pages(void *begin, void *end); 985f05e798aSDavid Howells 986f05e798aSDavid Howells void default_idle(void); 9876a377ddcSLen Brown #ifdef CONFIG_XEN 9886a377ddcSLen Brown bool xen_set_default_idle(void); 9896a377ddcSLen Brown #else 9906a377ddcSLen Brown #define xen_set_default_idle 0 9916a377ddcSLen Brown #endif 992f05e798aSDavid Howells 993f05e798aSDavid Howells void stop_this_cpu(void *dummy); 9944d067d8eSBorislav Petkov void df_debug(struct pt_regs *regs, long error_code); 9951008c52cSBorislav Petkov void microcode_check(void); 996d90a7a0eSJiri Kosina 997d90a7a0eSJiri Kosina enum l1tf_mitigations { 998d90a7a0eSJiri Kosina L1TF_MITIGATION_OFF, 999d90a7a0eSJiri Kosina L1TF_MITIGATION_FLUSH_NOWARN, 1000d90a7a0eSJiri Kosina L1TF_MITIGATION_FLUSH, 1001d90a7a0eSJiri Kosina L1TF_MITIGATION_FLUSH_NOSMT, 1002d90a7a0eSJiri Kosina L1TF_MITIGATION_FULL, 1003d90a7a0eSJiri Kosina L1TF_MITIGATION_FULL_FORCE 1004d90a7a0eSJiri Kosina }; 1005d90a7a0eSJiri Kosina 1006d90a7a0eSJiri Kosina extern enum l1tf_mitigations l1tf_mitigation; 1007d90a7a0eSJiri Kosina 1008bc124170SThomas Gleixner enum mds_mitigations { 1009bc124170SThomas Gleixner MDS_MITIGATION_OFF, 1010bc124170SThomas Gleixner MDS_MITIGATION_FULL, 101122dd8365SThomas Gleixner MDS_MITIGATION_VMWERV, 1012bc124170SThomas Gleixner }; 1013bc124170SThomas Gleixner 10141965aae3SH. Peter Anvin #endif /* _ASM_X86_PROCESSOR_H */ 1015