11965aae3SH. Peter Anvin #ifndef _ASM_X86_PROCESSOR_H 21965aae3SH. Peter Anvin #define _ASM_X86_PROCESSOR_H 3bb898558SAl Viro 4bb898558SAl Viro #include <asm/processor-flags.h> 5bb898558SAl Viro 6bb898558SAl Viro /* Forward declaration, a strange C thing */ 7bb898558SAl Viro struct task_struct; 8bb898558SAl Viro struct mm_struct; 9bb898558SAl Viro 10bb898558SAl Viro #include <asm/vm86.h> 11bb898558SAl Viro #include <asm/math_emu.h> 12bb898558SAl Viro #include <asm/segment.h> 13bb898558SAl Viro #include <asm/types.h> 14bb898558SAl Viro #include <asm/sigcontext.h> 15bb898558SAl Viro #include <asm/current.h> 16bb898558SAl Viro #include <asm/cpufeature.h> 17bb898558SAl Viro #include <asm/system.h> 18bb898558SAl Viro #include <asm/page.h> 1954321d94SJeremy Fitzhardinge #include <asm/pgtable_types.h> 20bb898558SAl Viro #include <asm/percpu.h> 21bb898558SAl Viro #include <asm/msr.h> 22bb898558SAl Viro #include <asm/desc_defs.h> 23bb898558SAl Viro #include <asm/nops.h> 24bb898558SAl Viro 25bb898558SAl Viro #include <linux/personality.h> 26bb898558SAl Viro #include <linux/cpumask.h> 27bb898558SAl Viro #include <linux/cache.h> 28bb898558SAl Viro #include <linux/threads.h> 295cbc19a9SPeter Zijlstra #include <linux/math64.h> 30bb898558SAl Viro #include <linux/init.h> 31faa4602eSPeter Zijlstra #include <linux/err.h> 32bb898558SAl Viro 33b332828cSK.Prasad #define HBP_NUM 4 34bb898558SAl Viro /* 35bb898558SAl Viro * Default implementation of macro that returns current 36bb898558SAl Viro * instruction pointer ("program counter"). 37bb898558SAl Viro */ 38bb898558SAl Viro static inline void *current_text_addr(void) 39bb898558SAl Viro { 40bb898558SAl Viro void *pc; 41bb898558SAl Viro 42bb898558SAl Viro asm volatile("mov $1f, %0; 1:":"=r" (pc)); 43bb898558SAl Viro 44bb898558SAl Viro return pc; 45bb898558SAl Viro } 46bb898558SAl Viro 47bb898558SAl Viro #ifdef CONFIG_X86_VSMP 48bb898558SAl Viro # define ARCH_MIN_TASKALIGN (1 << INTERNODE_CACHE_SHIFT) 49bb898558SAl Viro # define ARCH_MIN_MMSTRUCT_ALIGN (1 << INTERNODE_CACHE_SHIFT) 50bb898558SAl Viro #else 51bb898558SAl Viro # define ARCH_MIN_TASKALIGN 16 52bb898558SAl Viro # define ARCH_MIN_MMSTRUCT_ALIGN 0 53bb898558SAl Viro #endif 54bb898558SAl Viro 55bb898558SAl Viro /* 56bb898558SAl Viro * CPU type and hardware bug flags. Kept separately for each CPU. 57bb898558SAl Viro * Members of this structure are referenced in head.S, so think twice 58bb898558SAl Viro * before touching them. [mj] 59bb898558SAl Viro */ 60bb898558SAl Viro 61bb898558SAl Viro struct cpuinfo_x86 { 62bb898558SAl Viro __u8 x86; /* CPU family */ 63bb898558SAl Viro __u8 x86_vendor; /* CPU vendor */ 64bb898558SAl Viro __u8 x86_model; 65bb898558SAl Viro __u8 x86_mask; 66bb898558SAl Viro #ifdef CONFIG_X86_32 67bb898558SAl Viro char wp_works_ok; /* It doesn't on 386's */ 68bb898558SAl Viro 69bb898558SAl Viro /* Problems on some 486Dx4's and old 386's: */ 70bb898558SAl Viro char hlt_works_ok; 71bb898558SAl Viro char hard_math; 72bb898558SAl Viro char rfu; 73bb898558SAl Viro char fdiv_bug; 74bb898558SAl Viro char f00f_bug; 75bb898558SAl Viro char coma_bug; 76bb898558SAl Viro char pad0; 77bb898558SAl Viro #else 78bb898558SAl Viro /* Number of 4K pages in DTLB/ITLB combined(in pages): */ 79bb898558SAl Viro int x86_tlbsize; 8013c6c532SJan Beulich #endif 81bb898558SAl Viro __u8 x86_virt_bits; 82bb898558SAl Viro __u8 x86_phys_bits; 83bb898558SAl Viro /* CPUID returned core id bits: */ 84bb898558SAl Viro __u8 x86_coreid_bits; 85bb898558SAl Viro /* Max extended CPUID function supported: */ 86bb898558SAl Viro __u32 extended_cpuid_level; 87bb898558SAl Viro /* Maximum supported CPUID level, -1=no CPUID: */ 88bb898558SAl Viro int cpuid_level; 89bb898558SAl Viro __u32 x86_capability[NCAPINTS]; 90bb898558SAl Viro char x86_vendor_id[16]; 91bb898558SAl Viro char x86_model_id[64]; 92bb898558SAl Viro /* in KB - valid for CPUS which support this call: */ 93bb898558SAl Viro int x86_cache_size; 94bb898558SAl Viro int x86_cache_alignment; /* In bytes */ 95bb898558SAl Viro int x86_power; 96bb898558SAl Viro unsigned long loops_per_jiffy; 97bb898558SAl Viro #ifdef CONFIG_SMP 98bb898558SAl Viro /* cpus sharing the last level cache: */ 99155dd720SRusty Russell cpumask_var_t llc_shared_map; 100bb898558SAl Viro #endif 101bb898558SAl Viro /* cpuid returned max cores value: */ 102bb898558SAl Viro u16 x86_max_cores; 103bb898558SAl Viro u16 apicid; 104bb898558SAl Viro u16 initial_apicid; 105bb898558SAl Viro u16 x86_clflush_size; 106bb898558SAl Viro #ifdef CONFIG_SMP 107bb898558SAl Viro /* number of cores as seen by the OS: */ 108bb898558SAl Viro u16 booted_cores; 109bb898558SAl Viro /* Physical processor id: */ 110bb898558SAl Viro u16 phys_proc_id; 111bb898558SAl Viro /* Core id: */ 112bb898558SAl Viro u16 cpu_core_id; 113*6057b4d3SAndreas Herrmann /* Compute unit id */ 114*6057b4d3SAndreas Herrmann u8 compute_unit_id; 115bb898558SAl Viro /* Index into per_cpu list: */ 116bb898558SAl Viro u16 cpu_index; 117bb898558SAl Viro #endif 118bb898558SAl Viro } __attribute__((__aligned__(SMP_CACHE_BYTES))); 119bb898558SAl Viro 120bb898558SAl Viro #define X86_VENDOR_INTEL 0 121bb898558SAl Viro #define X86_VENDOR_CYRIX 1 122bb898558SAl Viro #define X86_VENDOR_AMD 2 123bb898558SAl Viro #define X86_VENDOR_UMC 3 124bb898558SAl Viro #define X86_VENDOR_CENTAUR 5 125bb898558SAl Viro #define X86_VENDOR_TRANSMETA 7 126bb898558SAl Viro #define X86_VENDOR_NSC 8 127bb898558SAl Viro #define X86_VENDOR_NUM 9 128bb898558SAl Viro 129bb898558SAl Viro #define X86_VENDOR_UNKNOWN 0xff 130bb898558SAl Viro 131bb898558SAl Viro /* 132bb898558SAl Viro * capabilities of CPUs 133bb898558SAl Viro */ 134bb898558SAl Viro extern struct cpuinfo_x86 boot_cpu_data; 135bb898558SAl Viro extern struct cpuinfo_x86 new_cpu_data; 136bb898558SAl Viro 137bb898558SAl Viro extern struct tss_struct doublefault_tss; 1383e0c3737SYinghai Lu extern __u32 cpu_caps_cleared[NCAPINTS]; 1393e0c3737SYinghai Lu extern __u32 cpu_caps_set[NCAPINTS]; 140bb898558SAl Viro 141bb898558SAl Viro #ifdef CONFIG_SMP 1429b8de747SDavid Howells DECLARE_PER_CPU_SHARED_ALIGNED(struct cpuinfo_x86, cpu_info); 143bb898558SAl Viro #define cpu_data(cpu) per_cpu(cpu_info, cpu) 144bb898558SAl Viro #define current_cpu_data __get_cpu_var(cpu_info) 145bb898558SAl Viro #else 146bb898558SAl Viro #define cpu_data(cpu) boot_cpu_data 147bb898558SAl Viro #define current_cpu_data boot_cpu_data 148bb898558SAl Viro #endif 149bb898558SAl Viro 150bb898558SAl Viro extern const struct seq_operations cpuinfo_op; 151bb898558SAl Viro 152bb898558SAl Viro static inline int hlt_works(int cpu) 153bb898558SAl Viro { 154bb898558SAl Viro #ifdef CONFIG_X86_32 155bb898558SAl Viro return cpu_data(cpu).hlt_works_ok; 156bb898558SAl Viro #else 157bb898558SAl Viro return 1; 158bb898558SAl Viro #endif 159bb898558SAl Viro } 160bb898558SAl Viro 161bb898558SAl Viro #define cache_line_size() (boot_cpu_data.x86_cache_alignment) 162bb898558SAl Viro 163bb898558SAl Viro extern void cpu_detect(struct cpuinfo_x86 *c); 164bb898558SAl Viro 165bb898558SAl Viro extern struct pt_regs *idle_regs(struct pt_regs *); 166bb898558SAl Viro 167bb898558SAl Viro extern void early_cpu_init(void); 168bb898558SAl Viro extern void identify_boot_cpu(void); 169bb898558SAl Viro extern void identify_secondary_cpu(struct cpuinfo_x86 *); 170bb898558SAl Viro extern void print_cpu_info(struct cpuinfo_x86 *); 171bb898558SAl Viro extern void init_scattered_cpuid_features(struct cpuinfo_x86 *c); 172bb898558SAl Viro extern unsigned int init_intel_cacheinfo(struct cpuinfo_x86 *c); 173bb898558SAl Viro extern unsigned short num_cache_leaves; 174bb898558SAl Viro 175bb898558SAl Viro extern void detect_extended_topology(struct cpuinfo_x86 *c); 176bb898558SAl Viro extern void detect_ht(struct cpuinfo_x86 *c); 177bb898558SAl Viro 178bb898558SAl Viro static inline void native_cpuid(unsigned int *eax, unsigned int *ebx, 179bb898558SAl Viro unsigned int *ecx, unsigned int *edx) 180bb898558SAl Viro { 181bb898558SAl Viro /* ecx is often an input as well as an output. */ 18245a94d7cSSuresh Siddha asm volatile("cpuid" 183bb898558SAl Viro : "=a" (*eax), 184bb898558SAl Viro "=b" (*ebx), 185bb898558SAl Viro "=c" (*ecx), 186bb898558SAl Viro "=d" (*edx) 187bb898558SAl Viro : "0" (*eax), "2" (*ecx)); 188bb898558SAl Viro } 189bb898558SAl Viro 190bb898558SAl Viro static inline void load_cr3(pgd_t *pgdir) 191bb898558SAl Viro { 192bb898558SAl Viro write_cr3(__pa(pgdir)); 193bb898558SAl Viro } 194bb898558SAl Viro 195bb898558SAl Viro #ifdef CONFIG_X86_32 196bb898558SAl Viro /* This is the TSS defined by the hardware. */ 197bb898558SAl Viro struct x86_hw_tss { 198bb898558SAl Viro unsigned short back_link, __blh; 199bb898558SAl Viro unsigned long sp0; 200bb898558SAl Viro unsigned short ss0, __ss0h; 201bb898558SAl Viro unsigned long sp1; 202bb898558SAl Viro /* ss1 caches MSR_IA32_SYSENTER_CS: */ 203bb898558SAl Viro unsigned short ss1, __ss1h; 204bb898558SAl Viro unsigned long sp2; 205bb898558SAl Viro unsigned short ss2, __ss2h; 206bb898558SAl Viro unsigned long __cr3; 207bb898558SAl Viro unsigned long ip; 208bb898558SAl Viro unsigned long flags; 209bb898558SAl Viro unsigned long ax; 210bb898558SAl Viro unsigned long cx; 211bb898558SAl Viro unsigned long dx; 212bb898558SAl Viro unsigned long bx; 213bb898558SAl Viro unsigned long sp; 214bb898558SAl Viro unsigned long bp; 215bb898558SAl Viro unsigned long si; 216bb898558SAl Viro unsigned long di; 217bb898558SAl Viro unsigned short es, __esh; 218bb898558SAl Viro unsigned short cs, __csh; 219bb898558SAl Viro unsigned short ss, __ssh; 220bb898558SAl Viro unsigned short ds, __dsh; 221bb898558SAl Viro unsigned short fs, __fsh; 222bb898558SAl Viro unsigned short gs, __gsh; 223bb898558SAl Viro unsigned short ldt, __ldth; 224bb898558SAl Viro unsigned short trace; 225bb898558SAl Viro unsigned short io_bitmap_base; 226bb898558SAl Viro 227bb898558SAl Viro } __attribute__((packed)); 228bb898558SAl Viro #else 229bb898558SAl Viro struct x86_hw_tss { 230bb898558SAl Viro u32 reserved1; 231bb898558SAl Viro u64 sp0; 232bb898558SAl Viro u64 sp1; 233bb898558SAl Viro u64 sp2; 234bb898558SAl Viro u64 reserved2; 235bb898558SAl Viro u64 ist[7]; 236bb898558SAl Viro u32 reserved3; 237bb898558SAl Viro u32 reserved4; 238bb898558SAl Viro u16 reserved5; 239bb898558SAl Viro u16 io_bitmap_base; 240bb898558SAl Viro 241bb898558SAl Viro } __attribute__((packed)) ____cacheline_aligned; 242bb898558SAl Viro #endif 243bb898558SAl Viro 244bb898558SAl Viro /* 245bb898558SAl Viro * IO-bitmap sizes: 246bb898558SAl Viro */ 247bb898558SAl Viro #define IO_BITMAP_BITS 65536 248bb898558SAl Viro #define IO_BITMAP_BYTES (IO_BITMAP_BITS/8) 249bb898558SAl Viro #define IO_BITMAP_LONGS (IO_BITMAP_BYTES/sizeof(long)) 250bb898558SAl Viro #define IO_BITMAP_OFFSET offsetof(struct tss_struct, io_bitmap) 251bb898558SAl Viro #define INVALID_IO_BITMAP_OFFSET 0x8000 252bb898558SAl Viro 253bb898558SAl Viro struct tss_struct { 254bb898558SAl Viro /* 255bb898558SAl Viro * The hardware state: 256bb898558SAl Viro */ 257bb898558SAl Viro struct x86_hw_tss x86_tss; 258bb898558SAl Viro 259bb898558SAl Viro /* 260bb898558SAl Viro * The extra 1 is there because the CPU will access an 261bb898558SAl Viro * additional byte beyond the end of the IO permission 262bb898558SAl Viro * bitmap. The extra byte must be all 1 bits, and must 263bb898558SAl Viro * be within the limit. 264bb898558SAl Viro */ 265bb898558SAl Viro unsigned long io_bitmap[IO_BITMAP_LONGS + 1]; 266bb898558SAl Viro 267bb898558SAl Viro /* 268bb898558SAl Viro * .. and then another 0x100 bytes for the emergency kernel stack: 269bb898558SAl Viro */ 270bb898558SAl Viro unsigned long stack[64]; 271bb898558SAl Viro 272bb898558SAl Viro } ____cacheline_aligned; 273bb898558SAl Viro 2749b8de747SDavid Howells DECLARE_PER_CPU_SHARED_ALIGNED(struct tss_struct, init_tss); 275bb898558SAl Viro 276bb898558SAl Viro /* 277bb898558SAl Viro * Save the original ist values for checking stack pointers during debugging 278bb898558SAl Viro */ 279bb898558SAl Viro struct orig_ist { 280bb898558SAl Viro unsigned long ist[7]; 281bb898558SAl Viro }; 282bb898558SAl Viro 283bb898558SAl Viro #define MXCSR_DEFAULT 0x1f80 284bb898558SAl Viro 285bb898558SAl Viro struct i387_fsave_struct { 286bb898558SAl Viro u32 cwd; /* FPU Control Word */ 287bb898558SAl Viro u32 swd; /* FPU Status Word */ 288bb898558SAl Viro u32 twd; /* FPU Tag Word */ 289bb898558SAl Viro u32 fip; /* FPU IP Offset */ 290bb898558SAl Viro u32 fcs; /* FPU IP Selector */ 291bb898558SAl Viro u32 foo; /* FPU Operand Pointer Offset */ 292bb898558SAl Viro u32 fos; /* FPU Operand Pointer Selector */ 293bb898558SAl Viro 294bb898558SAl Viro /* 8*10 bytes for each FP-reg = 80 bytes: */ 295bb898558SAl Viro u32 st_space[20]; 296bb898558SAl Viro 297bb898558SAl Viro /* Software status information [not touched by FSAVE ]: */ 298bb898558SAl Viro u32 status; 299bb898558SAl Viro }; 300bb898558SAl Viro 301bb898558SAl Viro struct i387_fxsave_struct { 302bb898558SAl Viro u16 cwd; /* Control Word */ 303bb898558SAl Viro u16 swd; /* Status Word */ 304bb898558SAl Viro u16 twd; /* Tag Word */ 305bb898558SAl Viro u16 fop; /* Last Instruction Opcode */ 306bb898558SAl Viro union { 307bb898558SAl Viro struct { 308bb898558SAl Viro u64 rip; /* Instruction Pointer */ 309bb898558SAl Viro u64 rdp; /* Data Pointer */ 310bb898558SAl Viro }; 311bb898558SAl Viro struct { 312bb898558SAl Viro u32 fip; /* FPU IP Offset */ 313bb898558SAl Viro u32 fcs; /* FPU IP Selector */ 314bb898558SAl Viro u32 foo; /* FPU Operand Offset */ 315bb898558SAl Viro u32 fos; /* FPU Operand Selector */ 316bb898558SAl Viro }; 317bb898558SAl Viro }; 318bb898558SAl Viro u32 mxcsr; /* MXCSR Register State */ 319bb898558SAl Viro u32 mxcsr_mask; /* MXCSR Mask */ 320bb898558SAl Viro 321bb898558SAl Viro /* 8*16 bytes for each FP-reg = 128 bytes: */ 322bb898558SAl Viro u32 st_space[32]; 323bb898558SAl Viro 324bb898558SAl Viro /* 16*16 bytes for each XMM-reg = 256 bytes: */ 325bb898558SAl Viro u32 xmm_space[64]; 326bb898558SAl Viro 327bb898558SAl Viro u32 padding[12]; 328bb898558SAl Viro 329bb898558SAl Viro union { 330bb898558SAl Viro u32 padding1[12]; 331bb898558SAl Viro u32 sw_reserved[12]; 332bb898558SAl Viro }; 333bb898558SAl Viro 334bb898558SAl Viro } __attribute__((aligned(16))); 335bb898558SAl Viro 336bb898558SAl Viro struct i387_soft_struct { 337bb898558SAl Viro u32 cwd; 338bb898558SAl Viro u32 swd; 339bb898558SAl Viro u32 twd; 340bb898558SAl Viro u32 fip; 341bb898558SAl Viro u32 fcs; 342bb898558SAl Viro u32 foo; 343bb898558SAl Viro u32 fos; 344bb898558SAl Viro /* 8*10 bytes for each FP-reg = 80 bytes: */ 345bb898558SAl Viro u32 st_space[20]; 346bb898558SAl Viro u8 ftop; 347bb898558SAl Viro u8 changed; 348bb898558SAl Viro u8 lookahead; 349bb898558SAl Viro u8 no_update; 350bb898558SAl Viro u8 rm; 351bb898558SAl Viro u8 alimit; 352ae6af41fSTejun Heo struct math_emu_info *info; 353bb898558SAl Viro u32 entry_eip; 354bb898558SAl Viro }; 355bb898558SAl Viro 356a30469e7SSuresh Siddha struct ymmh_struct { 357a30469e7SSuresh Siddha /* 16 * 16 bytes for each YMMH-reg = 256 bytes */ 358a30469e7SSuresh Siddha u32 ymmh_space[64]; 359a30469e7SSuresh Siddha }; 360a30469e7SSuresh Siddha 361bb898558SAl Viro struct xsave_hdr_struct { 362bb898558SAl Viro u64 xstate_bv; 363bb898558SAl Viro u64 reserved1[2]; 364bb898558SAl Viro u64 reserved2[5]; 365bb898558SAl Viro } __attribute__((packed)); 366bb898558SAl Viro 367bb898558SAl Viro struct xsave_struct { 368bb898558SAl Viro struct i387_fxsave_struct i387; 369bb898558SAl Viro struct xsave_hdr_struct xsave_hdr; 370a30469e7SSuresh Siddha struct ymmh_struct ymmh; 371bb898558SAl Viro /* new processor state extensions will go here */ 372bb898558SAl Viro } __attribute__ ((packed, aligned (64))); 373bb898558SAl Viro 374bb898558SAl Viro union thread_xstate { 375bb898558SAl Viro struct i387_fsave_struct fsave; 376bb898558SAl Viro struct i387_fxsave_struct fxsave; 377bb898558SAl Viro struct i387_soft_struct soft; 378bb898558SAl Viro struct xsave_struct xsave; 379bb898558SAl Viro }; 380bb898558SAl Viro 38186603283SAvi Kivity struct fpu { 38286603283SAvi Kivity union thread_xstate *state; 38386603283SAvi Kivity }; 38486603283SAvi Kivity 385bb898558SAl Viro #ifdef CONFIG_X86_64 386bb898558SAl Viro DECLARE_PER_CPU(struct orig_ist, orig_ist); 38726f80bd6SBrian Gerst 388947e76cdSBrian Gerst union irq_stack_union { 389947e76cdSBrian Gerst char irq_stack[IRQ_STACK_SIZE]; 390947e76cdSBrian Gerst /* 391947e76cdSBrian Gerst * GCC hardcodes the stack canary as %gs:40. Since the 392947e76cdSBrian Gerst * irq_stack is the object at %gs:0, we reserve the bottom 393947e76cdSBrian Gerst * 48 bytes of the irq stack for the canary. 394947e76cdSBrian Gerst */ 395947e76cdSBrian Gerst struct { 396947e76cdSBrian Gerst char gs_base[40]; 397947e76cdSBrian Gerst unsigned long stack_canary; 398947e76cdSBrian Gerst }; 399947e76cdSBrian Gerst }; 400947e76cdSBrian Gerst 4019b8de747SDavid Howells DECLARE_PER_CPU_FIRST(union irq_stack_union, irq_stack_union); 4022add8e23SBrian Gerst DECLARE_INIT_PER_CPU(irq_stack_union); 4032add8e23SBrian Gerst 40426f80bd6SBrian Gerst DECLARE_PER_CPU(char *, irq_stack_ptr); 4059766cdbcSJaswinder Singh Rajput DECLARE_PER_CPU(unsigned int, irq_count); 4069766cdbcSJaswinder Singh Rajput extern unsigned long kernel_eflags; 4079766cdbcSJaswinder Singh Rajput extern asmlinkage void ignore_sysret(void); 40860a5317fSTejun Heo #else /* X86_64 */ 40960a5317fSTejun Heo #ifdef CONFIG_CC_STACKPROTECTOR 4101ea0d14eSJeremy Fitzhardinge /* 4111ea0d14eSJeremy Fitzhardinge * Make sure stack canary segment base is cached-aligned: 4121ea0d14eSJeremy Fitzhardinge * "For Intel Atom processors, avoid non zero segment base address 4131ea0d14eSJeremy Fitzhardinge * that is not aligned to cache line boundary at all cost." 4141ea0d14eSJeremy Fitzhardinge * (Optim Ref Manual Assembly/Compiler Coding Rule 15.) 4151ea0d14eSJeremy Fitzhardinge */ 4161ea0d14eSJeremy Fitzhardinge struct stack_canary { 4171ea0d14eSJeremy Fitzhardinge char __pad[20]; /* canary at %gs:20 */ 4181ea0d14eSJeremy Fitzhardinge unsigned long canary; 4191ea0d14eSJeremy Fitzhardinge }; 42053f82452SJeremy Fitzhardinge DECLARE_PER_CPU_ALIGNED(struct stack_canary, stack_canary); 421bb898558SAl Viro #endif 42260a5317fSTejun Heo #endif /* X86_64 */ 423bb898558SAl Viro 424bb898558SAl Viro extern unsigned int xstate_size; 425bb898558SAl Viro extern void free_thread_xstate(struct task_struct *); 426bb898558SAl Viro extern struct kmem_cache *task_xstate_cachep; 427bb898558SAl Viro 42824f1e32cSFrederic Weisbecker struct perf_event; 42924f1e32cSFrederic Weisbecker 430bb898558SAl Viro struct thread_struct { 431bb898558SAl Viro /* Cached TLS descriptors: */ 432bb898558SAl Viro struct desc_struct tls_array[GDT_ENTRY_TLS_ENTRIES]; 433bb898558SAl Viro unsigned long sp0; 434bb898558SAl Viro unsigned long sp; 435bb898558SAl Viro #ifdef CONFIG_X86_32 436bb898558SAl Viro unsigned long sysenter_cs; 437bb898558SAl Viro #else 438bb898558SAl Viro unsigned long usersp; /* Copy from PDA */ 439bb898558SAl Viro unsigned short es; 440bb898558SAl Viro unsigned short ds; 441bb898558SAl Viro unsigned short fsindex; 442bb898558SAl Viro unsigned short gsindex; 443bb898558SAl Viro #endif 4440c23590fSAlexey Dobriyan #ifdef CONFIG_X86_32 445bb898558SAl Viro unsigned long ip; 4460c23590fSAlexey Dobriyan #endif 447d756f4adSAlexey Dobriyan #ifdef CONFIG_X86_64 448bb898558SAl Viro unsigned long fs; 449d756f4adSAlexey Dobriyan #endif 450bb898558SAl Viro unsigned long gs; 45124f1e32cSFrederic Weisbecker /* Save middle states of ptrace breakpoints */ 45224f1e32cSFrederic Weisbecker struct perf_event *ptrace_bps[HBP_NUM]; 45324f1e32cSFrederic Weisbecker /* Debug status used for traps, single steps, etc... */ 454bb898558SAl Viro unsigned long debugreg6; 455326264a0SFrederic Weisbecker /* Keep track of the exact dr7 value set by the user */ 456326264a0SFrederic Weisbecker unsigned long ptrace_dr7; 457bb898558SAl Viro /* Fault info: */ 458bb898558SAl Viro unsigned long cr2; 459bb898558SAl Viro unsigned long trap_no; 460bb898558SAl Viro unsigned long error_code; 461bb898558SAl Viro /* floating point and extended processor state */ 46286603283SAvi Kivity struct fpu fpu; 463bb898558SAl Viro #ifdef CONFIG_X86_32 464bb898558SAl Viro /* Virtual 86 mode info */ 465bb898558SAl Viro struct vm86_struct __user *vm86_info; 466bb898558SAl Viro unsigned long screen_bitmap; 467bb898558SAl Viro unsigned long v86flags; 468bb898558SAl Viro unsigned long v86mask; 469bb898558SAl Viro unsigned long saved_sp0; 470bb898558SAl Viro unsigned int saved_fs; 471bb898558SAl Viro unsigned int saved_gs; 472bb898558SAl Viro #endif 473bb898558SAl Viro /* IO permissions: */ 474bb898558SAl Viro unsigned long *io_bitmap_ptr; 475bb898558SAl Viro unsigned long iopl; 476bb898558SAl Viro /* Max allowed port in the bitmap, in bytes: */ 477bb898558SAl Viro unsigned io_bitmap_max; 478bb898558SAl Viro }; 479bb898558SAl Viro 480bb898558SAl Viro static inline unsigned long native_get_debugreg(int regno) 481bb898558SAl Viro { 482bb898558SAl Viro unsigned long val = 0; /* Damn you, gcc! */ 483bb898558SAl Viro 484bb898558SAl Viro switch (regno) { 485bb898558SAl Viro case 0: 486bb898558SAl Viro asm("mov %%db0, %0" :"=r" (val)); 487bb898558SAl Viro break; 488bb898558SAl Viro case 1: 489bb898558SAl Viro asm("mov %%db1, %0" :"=r" (val)); 490bb898558SAl Viro break; 491bb898558SAl Viro case 2: 492bb898558SAl Viro asm("mov %%db2, %0" :"=r" (val)); 493bb898558SAl Viro break; 494bb898558SAl Viro case 3: 495bb898558SAl Viro asm("mov %%db3, %0" :"=r" (val)); 496bb898558SAl Viro break; 497bb898558SAl Viro case 6: 498bb898558SAl Viro asm("mov %%db6, %0" :"=r" (val)); 499bb898558SAl Viro break; 500bb898558SAl Viro case 7: 501bb898558SAl Viro asm("mov %%db7, %0" :"=r" (val)); 502bb898558SAl Viro break; 503bb898558SAl Viro default: 504bb898558SAl Viro BUG(); 505bb898558SAl Viro } 506bb898558SAl Viro return val; 507bb898558SAl Viro } 508bb898558SAl Viro 509bb898558SAl Viro static inline void native_set_debugreg(int regno, unsigned long value) 510bb898558SAl Viro { 511bb898558SAl Viro switch (regno) { 512bb898558SAl Viro case 0: 513bb898558SAl Viro asm("mov %0, %%db0" ::"r" (value)); 514bb898558SAl Viro break; 515bb898558SAl Viro case 1: 516bb898558SAl Viro asm("mov %0, %%db1" ::"r" (value)); 517bb898558SAl Viro break; 518bb898558SAl Viro case 2: 519bb898558SAl Viro asm("mov %0, %%db2" ::"r" (value)); 520bb898558SAl Viro break; 521bb898558SAl Viro case 3: 522bb898558SAl Viro asm("mov %0, %%db3" ::"r" (value)); 523bb898558SAl Viro break; 524bb898558SAl Viro case 6: 525bb898558SAl Viro asm("mov %0, %%db6" ::"r" (value)); 526bb898558SAl Viro break; 527bb898558SAl Viro case 7: 528bb898558SAl Viro asm("mov %0, %%db7" ::"r" (value)); 529bb898558SAl Viro break; 530bb898558SAl Viro default: 531bb898558SAl Viro BUG(); 532bb898558SAl Viro } 533bb898558SAl Viro } 534bb898558SAl Viro 535bb898558SAl Viro /* 536bb898558SAl Viro * Set IOPL bits in EFLAGS from given mask 537bb898558SAl Viro */ 538bb898558SAl Viro static inline void native_set_iopl_mask(unsigned mask) 539bb898558SAl Viro { 540bb898558SAl Viro #ifdef CONFIG_X86_32 541bb898558SAl Viro unsigned int reg; 542bb898558SAl Viro 543bb898558SAl Viro asm volatile ("pushfl;" 544bb898558SAl Viro "popl %0;" 545bb898558SAl Viro "andl %1, %0;" 546bb898558SAl Viro "orl %2, %0;" 547bb898558SAl Viro "pushl %0;" 548bb898558SAl Viro "popfl" 549bb898558SAl Viro : "=&r" (reg) 550bb898558SAl Viro : "i" (~X86_EFLAGS_IOPL), "r" (mask)); 551bb898558SAl Viro #endif 552bb898558SAl Viro } 553bb898558SAl Viro 554bb898558SAl Viro static inline void 555bb898558SAl Viro native_load_sp0(struct tss_struct *tss, struct thread_struct *thread) 556bb898558SAl Viro { 557bb898558SAl Viro tss->x86_tss.sp0 = thread->sp0; 558bb898558SAl Viro #ifdef CONFIG_X86_32 559bb898558SAl Viro /* Only happens when SEP is enabled, no need to test "SEP"arately: */ 560bb898558SAl Viro if (unlikely(tss->x86_tss.ss1 != thread->sysenter_cs)) { 561bb898558SAl Viro tss->x86_tss.ss1 = thread->sysenter_cs; 562bb898558SAl Viro wrmsr(MSR_IA32_SYSENTER_CS, thread->sysenter_cs, 0); 563bb898558SAl Viro } 564bb898558SAl Viro #endif 565bb898558SAl Viro } 566bb898558SAl Viro 567bb898558SAl Viro static inline void native_swapgs(void) 568bb898558SAl Viro { 569bb898558SAl Viro #ifdef CONFIG_X86_64 570bb898558SAl Viro asm volatile("swapgs" ::: "memory"); 571bb898558SAl Viro #endif 572bb898558SAl Viro } 573bb898558SAl Viro 574bb898558SAl Viro #ifdef CONFIG_PARAVIRT 575bb898558SAl Viro #include <asm/paravirt.h> 576bb898558SAl Viro #else 577bb898558SAl Viro #define __cpuid native_cpuid 578bb898558SAl Viro #define paravirt_enabled() 0 579bb898558SAl Viro 580bb898558SAl Viro /* 581bb898558SAl Viro * These special macros can be used to get or set a debugging register 582bb898558SAl Viro */ 583bb898558SAl Viro #define get_debugreg(var, register) \ 584bb898558SAl Viro (var) = native_get_debugreg(register) 585bb898558SAl Viro #define set_debugreg(value, register) \ 586bb898558SAl Viro native_set_debugreg(register, value) 587bb898558SAl Viro 588bb898558SAl Viro static inline void load_sp0(struct tss_struct *tss, 589bb898558SAl Viro struct thread_struct *thread) 590bb898558SAl Viro { 591bb898558SAl Viro native_load_sp0(tss, thread); 592bb898558SAl Viro } 593bb898558SAl Viro 594bb898558SAl Viro #define set_iopl_mask native_set_iopl_mask 595bb898558SAl Viro #endif /* CONFIG_PARAVIRT */ 596bb898558SAl Viro 597bb898558SAl Viro /* 598bb898558SAl Viro * Save the cr4 feature set we're using (ie 599bb898558SAl Viro * Pentium 4MB enable and PPro Global page 600bb898558SAl Viro * enable), so that any CPU's that boot up 601bb898558SAl Viro * after us can get the correct flags. 602bb898558SAl Viro */ 603bb898558SAl Viro extern unsigned long mmu_cr4_features; 604bb898558SAl Viro 605bb898558SAl Viro static inline void set_in_cr4(unsigned long mask) 606bb898558SAl Viro { 607bb898558SAl Viro unsigned cr4; 608bb898558SAl Viro 609bb898558SAl Viro mmu_cr4_features |= mask; 610bb898558SAl Viro cr4 = read_cr4(); 611bb898558SAl Viro cr4 |= mask; 612bb898558SAl Viro write_cr4(cr4); 613bb898558SAl Viro } 614bb898558SAl Viro 615bb898558SAl Viro static inline void clear_in_cr4(unsigned long mask) 616bb898558SAl Viro { 617bb898558SAl Viro unsigned cr4; 618bb898558SAl Viro 619bb898558SAl Viro mmu_cr4_features &= ~mask; 620bb898558SAl Viro cr4 = read_cr4(); 621bb898558SAl Viro cr4 &= ~mask; 622bb898558SAl Viro write_cr4(cr4); 623bb898558SAl Viro } 624bb898558SAl Viro 625bb898558SAl Viro typedef struct { 626bb898558SAl Viro unsigned long seg; 627bb898558SAl Viro } mm_segment_t; 628bb898558SAl Viro 629bb898558SAl Viro 630bb898558SAl Viro /* 631bb898558SAl Viro * create a kernel thread without removing it from tasklists 632bb898558SAl Viro */ 633bb898558SAl Viro extern int kernel_thread(int (*fn)(void *), void *arg, unsigned long flags); 634bb898558SAl Viro 635bb898558SAl Viro /* Free all resources held by a thread. */ 636bb898558SAl Viro extern void release_thread(struct task_struct *); 637bb898558SAl Viro 638bb898558SAl Viro /* Prepare to copy thread state - unlazy all lazy state */ 639bb898558SAl Viro extern void prepare_to_copy(struct task_struct *tsk); 640bb898558SAl Viro 641bb898558SAl Viro unsigned long get_wchan(struct task_struct *p); 642bb898558SAl Viro 643bb898558SAl Viro /* 644bb898558SAl Viro * Generic CPUID function 645bb898558SAl Viro * clear %ecx since some cpus (Cyrix MII) do not set or clear %ecx 646bb898558SAl Viro * resulting in stale register contents being returned. 647bb898558SAl Viro */ 648bb898558SAl Viro static inline void cpuid(unsigned int op, 649bb898558SAl Viro unsigned int *eax, unsigned int *ebx, 650bb898558SAl Viro unsigned int *ecx, unsigned int *edx) 651bb898558SAl Viro { 652bb898558SAl Viro *eax = op; 653bb898558SAl Viro *ecx = 0; 654bb898558SAl Viro __cpuid(eax, ebx, ecx, edx); 655bb898558SAl Viro } 656bb898558SAl Viro 657bb898558SAl Viro /* Some CPUID calls want 'count' to be placed in ecx */ 658bb898558SAl Viro static inline void cpuid_count(unsigned int op, int count, 659bb898558SAl Viro unsigned int *eax, unsigned int *ebx, 660bb898558SAl Viro unsigned int *ecx, unsigned int *edx) 661bb898558SAl Viro { 662bb898558SAl Viro *eax = op; 663bb898558SAl Viro *ecx = count; 664bb898558SAl Viro __cpuid(eax, ebx, ecx, edx); 665bb898558SAl Viro } 666bb898558SAl Viro 667bb898558SAl Viro /* 668bb898558SAl Viro * CPUID functions returning a single datum 669bb898558SAl Viro */ 670bb898558SAl Viro static inline unsigned int cpuid_eax(unsigned int op) 671bb898558SAl Viro { 672bb898558SAl Viro unsigned int eax, ebx, ecx, edx; 673bb898558SAl Viro 674bb898558SAl Viro cpuid(op, &eax, &ebx, &ecx, &edx); 675bb898558SAl Viro 676bb898558SAl Viro return eax; 677bb898558SAl Viro } 678bb898558SAl Viro 679bb898558SAl Viro static inline unsigned int cpuid_ebx(unsigned int op) 680bb898558SAl Viro { 681bb898558SAl Viro unsigned int eax, ebx, ecx, edx; 682bb898558SAl Viro 683bb898558SAl Viro cpuid(op, &eax, &ebx, &ecx, &edx); 684bb898558SAl Viro 685bb898558SAl Viro return ebx; 686bb898558SAl Viro } 687bb898558SAl Viro 688bb898558SAl Viro static inline unsigned int cpuid_ecx(unsigned int op) 689bb898558SAl Viro { 690bb898558SAl Viro unsigned int eax, ebx, ecx, edx; 691bb898558SAl Viro 692bb898558SAl Viro cpuid(op, &eax, &ebx, &ecx, &edx); 693bb898558SAl Viro 694bb898558SAl Viro return ecx; 695bb898558SAl Viro } 696bb898558SAl Viro 697bb898558SAl Viro static inline unsigned int cpuid_edx(unsigned int op) 698bb898558SAl Viro { 699bb898558SAl Viro unsigned int eax, ebx, ecx, edx; 700bb898558SAl Viro 701bb898558SAl Viro cpuid(op, &eax, &ebx, &ecx, &edx); 702bb898558SAl Viro 703bb898558SAl Viro return edx; 704bb898558SAl Viro } 705bb898558SAl Viro 706bb898558SAl Viro /* REP NOP (PAUSE) is a good thing to insert into busy-wait loops. */ 707bb898558SAl Viro static inline void rep_nop(void) 708bb898558SAl Viro { 709bb898558SAl Viro asm volatile("rep; nop" ::: "memory"); 710bb898558SAl Viro } 711bb898558SAl Viro 712bb898558SAl Viro static inline void cpu_relax(void) 713bb898558SAl Viro { 714bb898558SAl Viro rep_nop(); 715bb898558SAl Viro } 716bb898558SAl Viro 7175367b688SBen Hutchings /* Stop speculative execution and prefetching of modified code. */ 718bb898558SAl Viro static inline void sync_core(void) 719bb898558SAl Viro { 720bb898558SAl Viro int tmp; 721bb898558SAl Viro 7225367b688SBen Hutchings #if defined(CONFIG_M386) || defined(CONFIG_M486) 7235367b688SBen Hutchings if (boot_cpu_data.x86 < 5) 7245367b688SBen Hutchings /* There is no speculative execution. 7255367b688SBen Hutchings * jmp is a barrier to prefetching. */ 7265367b688SBen Hutchings asm volatile("jmp 1f\n1:\n" ::: "memory"); 7275367b688SBen Hutchings else 7285367b688SBen Hutchings #endif 7295367b688SBen Hutchings /* cpuid is a barrier to speculative execution. 7305367b688SBen Hutchings * Prefetched instructions are automatically 7315367b688SBen Hutchings * invalidated when modified. */ 732bb898558SAl Viro asm volatile("cpuid" : "=a" (tmp) : "0" (1) 733bb898558SAl Viro : "ebx", "ecx", "edx", "memory"); 734bb898558SAl Viro } 735bb898558SAl Viro 736bb898558SAl Viro static inline void __monitor(const void *eax, unsigned long ecx, 737bb898558SAl Viro unsigned long edx) 738bb898558SAl Viro { 739bb898558SAl Viro /* "monitor %eax, %ecx, %edx;" */ 740bb898558SAl Viro asm volatile(".byte 0x0f, 0x01, 0xc8;" 741bb898558SAl Viro :: "a" (eax), "c" (ecx), "d"(edx)); 742bb898558SAl Viro } 743bb898558SAl Viro 744bb898558SAl Viro static inline void __mwait(unsigned long eax, unsigned long ecx) 745bb898558SAl Viro { 746bb898558SAl Viro /* "mwait %eax, %ecx;" */ 747bb898558SAl Viro asm volatile(".byte 0x0f, 0x01, 0xc9;" 748bb898558SAl Viro :: "a" (eax), "c" (ecx)); 749bb898558SAl Viro } 750bb898558SAl Viro 751bb898558SAl Viro static inline void __sti_mwait(unsigned long eax, unsigned long ecx) 752bb898558SAl Viro { 753bb898558SAl Viro trace_hardirqs_on(); 754bb898558SAl Viro /* "mwait %eax, %ecx;" */ 755bb898558SAl Viro asm volatile("sti; .byte 0x0f, 0x01, 0xc9;" 756bb898558SAl Viro :: "a" (eax), "c" (ecx)); 757bb898558SAl Viro } 758bb898558SAl Viro 759bb898558SAl Viro extern void mwait_idle_with_hints(unsigned long eax, unsigned long ecx); 760bb898558SAl Viro 761bb898558SAl Viro extern void select_idle_routine(const struct cpuinfo_x86 *c); 76230e1e6d1SRusty Russell extern void init_c1e_mask(void); 763bb898558SAl Viro 764bb898558SAl Viro extern unsigned long boot_option_idle_override; 765bb898558SAl Viro extern unsigned long idle_halt; 766bb898558SAl Viro extern unsigned long idle_nomwait; 767e8c534ecSMichal Schmidt extern bool c1e_detected; 768bb898558SAl Viro 769bb898558SAl Viro /* 770bb898558SAl Viro * on systems with caches, caches must be flashed as the absolute 771bb898558SAl Viro * last instruction before going into a suspended halt. Otherwise, 772bb898558SAl Viro * dirty data can linger in the cache and become stale on resume, 773bb898558SAl Viro * leading to strange errors. 774bb898558SAl Viro * 775bb898558SAl Viro * perform a variety of operations to guarantee that the compiler 776bb898558SAl Viro * will not reorder instructions. wbinvd itself is serializing 777bb898558SAl Viro * so the processor will not reorder. 778bb898558SAl Viro * 779bb898558SAl Viro * Systems without cache can just go into halt. 780bb898558SAl Viro */ 781bb898558SAl Viro static inline void wbinvd_halt(void) 782bb898558SAl Viro { 783bb898558SAl Viro mb(); 784bb898558SAl Viro /* check for clflush to determine if wbinvd is legal */ 785bb898558SAl Viro if (cpu_has_clflush) 786bb898558SAl Viro asm volatile("cli; wbinvd; 1: hlt; jmp 1b" : : : "memory"); 787bb898558SAl Viro else 788bb898558SAl Viro while (1) 789bb898558SAl Viro halt(); 790bb898558SAl Viro } 791bb898558SAl Viro 792bb898558SAl Viro extern void enable_sep_cpu(void); 793bb898558SAl Viro extern int sysenter_setup(void); 794bb898558SAl Viro 79529c84391SJan Kiszka extern void early_trap_init(void); 79629c84391SJan Kiszka 797bb898558SAl Viro /* Defined in head.S */ 798bb898558SAl Viro extern struct desc_ptr early_gdt_descr; 799bb898558SAl Viro 800bb898558SAl Viro extern void cpu_set_gdt(int); 801552be871SBrian Gerst extern void switch_to_new_gdt(int); 80211e3a840SJeremy Fitzhardinge extern void load_percpu_segment(int); 803bb898558SAl Viro extern void cpu_init(void); 804bb898558SAl Viro 805c2724775SMarkus Metzger static inline unsigned long get_debugctlmsr(void) 806c2724775SMarkus Metzger { 807c2724775SMarkus Metzger unsigned long debugctlmsr = 0; 808c2724775SMarkus Metzger 809c2724775SMarkus Metzger #ifndef CONFIG_X86_DEBUGCTLMSR 810c2724775SMarkus Metzger if (boot_cpu_data.x86 < 6) 811c2724775SMarkus Metzger return 0; 812c2724775SMarkus Metzger #endif 813c2724775SMarkus Metzger rdmsrl(MSR_IA32_DEBUGCTLMSR, debugctlmsr); 814c2724775SMarkus Metzger 815c2724775SMarkus Metzger return debugctlmsr; 816c2724775SMarkus Metzger } 817c2724775SMarkus Metzger 818bb898558SAl Viro static inline void update_debugctlmsr(unsigned long debugctlmsr) 819bb898558SAl Viro { 820bb898558SAl Viro #ifndef CONFIG_X86_DEBUGCTLMSR 821bb898558SAl Viro if (boot_cpu_data.x86 < 6) 822bb898558SAl Viro return; 823bb898558SAl Viro #endif 824bb898558SAl Viro wrmsrl(MSR_IA32_DEBUGCTLMSR, debugctlmsr); 825bb898558SAl Viro } 826bb898558SAl Viro 827bb898558SAl Viro /* 828bb898558SAl Viro * from system description table in BIOS. Mostly for MCA use, but 829bb898558SAl Viro * others may find it useful: 830bb898558SAl Viro */ 831bb898558SAl Viro extern unsigned int machine_id; 832bb898558SAl Viro extern unsigned int machine_submodel_id; 833bb898558SAl Viro extern unsigned int BIOS_revision; 834bb898558SAl Viro 835bb898558SAl Viro /* Boot loader type from the setup header: */ 836bb898558SAl Viro extern int bootloader_type; 8375031296cSH. Peter Anvin extern int bootloader_version; 838bb898558SAl Viro 839bb898558SAl Viro extern char ignore_fpu_irq; 840bb898558SAl Viro 841bb898558SAl Viro #define HAVE_ARCH_PICK_MMAP_LAYOUT 1 842bb898558SAl Viro #define ARCH_HAS_PREFETCHW 843bb898558SAl Viro #define ARCH_HAS_SPINLOCK_PREFETCH 844bb898558SAl Viro 845bb898558SAl Viro #ifdef CONFIG_X86_32 846bb898558SAl Viro # define BASE_PREFETCH ASM_NOP4 847bb898558SAl Viro # define ARCH_HAS_PREFETCH 848bb898558SAl Viro #else 849bb898558SAl Viro # define BASE_PREFETCH "prefetcht0 (%1)" 850bb898558SAl Viro #endif 851bb898558SAl Viro 852bb898558SAl Viro /* 853bb898558SAl Viro * Prefetch instructions for Pentium III (+) and AMD Athlon (+) 854bb898558SAl Viro * 855bb898558SAl Viro * It's not worth to care about 3dnow prefetches for the K6 856bb898558SAl Viro * because they are microcoded there and very slow. 857bb898558SAl Viro */ 858bb898558SAl Viro static inline void prefetch(const void *x) 859bb898558SAl Viro { 860bb898558SAl Viro alternative_input(BASE_PREFETCH, 861bb898558SAl Viro "prefetchnta (%1)", 862bb898558SAl Viro X86_FEATURE_XMM, 863bb898558SAl Viro "r" (x)); 864bb898558SAl Viro } 865bb898558SAl Viro 866bb898558SAl Viro /* 867bb898558SAl Viro * 3dnow prefetch to get an exclusive cache line. 868bb898558SAl Viro * Useful for spinlocks to avoid one state transition in the 869bb898558SAl Viro * cache coherency protocol: 870bb898558SAl Viro */ 871bb898558SAl Viro static inline void prefetchw(const void *x) 872bb898558SAl Viro { 873bb898558SAl Viro alternative_input(BASE_PREFETCH, 874bb898558SAl Viro "prefetchw (%1)", 875bb898558SAl Viro X86_FEATURE_3DNOW, 876bb898558SAl Viro "r" (x)); 877bb898558SAl Viro } 878bb898558SAl Viro 879bb898558SAl Viro static inline void spin_lock_prefetch(const void *x) 880bb898558SAl Viro { 881bb898558SAl Viro prefetchw(x); 882bb898558SAl Viro } 883bb898558SAl Viro 884bb898558SAl Viro #ifdef CONFIG_X86_32 885bb898558SAl Viro /* 886bb898558SAl Viro * User space process size: 3GB (default). 887bb898558SAl Viro */ 888bb898558SAl Viro #define TASK_SIZE PAGE_OFFSET 889d9517346SIngo Molnar #define TASK_SIZE_MAX TASK_SIZE 890bb898558SAl Viro #define STACK_TOP TASK_SIZE 891bb898558SAl Viro #define STACK_TOP_MAX STACK_TOP 892bb898558SAl Viro 893bb898558SAl Viro #define INIT_THREAD { \ 894bb898558SAl Viro .sp0 = sizeof(init_stack) + (long)&init_stack, \ 895bb898558SAl Viro .vm86_info = NULL, \ 896bb898558SAl Viro .sysenter_cs = __KERNEL_CS, \ 897bb898558SAl Viro .io_bitmap_ptr = NULL, \ 898bb898558SAl Viro } 899bb898558SAl Viro 900bb898558SAl Viro /* 901bb898558SAl Viro * Note that the .io_bitmap member must be extra-big. This is because 902bb898558SAl Viro * the CPU will access an additional byte beyond the end of the IO 903bb898558SAl Viro * permission bitmap. The extra byte must be all 1 bits, and must 904bb898558SAl Viro * be within the limit. 905bb898558SAl Viro */ 906bb898558SAl Viro #define INIT_TSS { \ 907bb898558SAl Viro .x86_tss = { \ 908bb898558SAl Viro .sp0 = sizeof(init_stack) + (long)&init_stack, \ 909bb898558SAl Viro .ss0 = __KERNEL_DS, \ 910bb898558SAl Viro .ss1 = __KERNEL_CS, \ 911bb898558SAl Viro .io_bitmap_base = INVALID_IO_BITMAP_OFFSET, \ 912bb898558SAl Viro }, \ 913bb898558SAl Viro .io_bitmap = { [0 ... IO_BITMAP_LONGS] = ~0 }, \ 914bb898558SAl Viro } 915bb898558SAl Viro 916bb898558SAl Viro extern unsigned long thread_saved_pc(struct task_struct *tsk); 917bb898558SAl Viro 918bb898558SAl Viro #define THREAD_SIZE_LONGS (THREAD_SIZE/sizeof(unsigned long)) 919bb898558SAl Viro #define KSTK_TOP(info) \ 920bb898558SAl Viro ({ \ 921bb898558SAl Viro unsigned long *__ptr = (unsigned long *)(info); \ 922bb898558SAl Viro (unsigned long)(&__ptr[THREAD_SIZE_LONGS]); \ 923bb898558SAl Viro }) 924bb898558SAl Viro 925bb898558SAl Viro /* 926bb898558SAl Viro * The below -8 is to reserve 8 bytes on top of the ring0 stack. 927bb898558SAl Viro * This is necessary to guarantee that the entire "struct pt_regs" 928bb898558SAl Viro * is accessable even if the CPU haven't stored the SS/ESP registers 929bb898558SAl Viro * on the stack (interrupt gate does not save these registers 930bb898558SAl Viro * when switching to the same priv ring). 931bb898558SAl Viro * Therefore beware: accessing the ss/esp fields of the 932bb898558SAl Viro * "struct pt_regs" is possible, but they may contain the 933bb898558SAl Viro * completely wrong values. 934bb898558SAl Viro */ 935bb898558SAl Viro #define task_pt_regs(task) \ 936bb898558SAl Viro ({ \ 937bb898558SAl Viro struct pt_regs *__regs__; \ 938bb898558SAl Viro __regs__ = (struct pt_regs *)(KSTK_TOP(task_stack_page(task))-8); \ 939bb898558SAl Viro __regs__ - 1; \ 940bb898558SAl Viro }) 941bb898558SAl Viro 942bb898558SAl Viro #define KSTK_ESP(task) (task_pt_regs(task)->sp) 943bb898558SAl Viro 944bb898558SAl Viro #else 945bb898558SAl Viro /* 946bb898558SAl Viro * User space process size. 47bits minus one guard page. 947bb898558SAl Viro */ 948d9517346SIngo Molnar #define TASK_SIZE_MAX ((1UL << 47) - PAGE_SIZE) 949bb898558SAl Viro 950bb898558SAl Viro /* This decides where the kernel will search for a free chunk of vm 951bb898558SAl Viro * space during mmap's. 952bb898558SAl Viro */ 953bb898558SAl Viro #define IA32_PAGE_OFFSET ((current->personality & ADDR_LIMIT_3GB) ? \ 954bb898558SAl Viro 0xc0000000 : 0xFFFFe000) 955bb898558SAl Viro 956bb898558SAl Viro #define TASK_SIZE (test_thread_flag(TIF_IA32) ? \ 957d9517346SIngo Molnar IA32_PAGE_OFFSET : TASK_SIZE_MAX) 958bb898558SAl Viro #define TASK_SIZE_OF(child) ((test_tsk_thread_flag(child, TIF_IA32)) ? \ 959d9517346SIngo Molnar IA32_PAGE_OFFSET : TASK_SIZE_MAX) 960bb898558SAl Viro 961bb898558SAl Viro #define STACK_TOP TASK_SIZE 962d9517346SIngo Molnar #define STACK_TOP_MAX TASK_SIZE_MAX 963bb898558SAl Viro 964bb898558SAl Viro #define INIT_THREAD { \ 965bb898558SAl Viro .sp0 = (unsigned long)&init_stack + sizeof(init_stack) \ 966bb898558SAl Viro } 967bb898558SAl Viro 968bb898558SAl Viro #define INIT_TSS { \ 969bb898558SAl Viro .x86_tss.sp0 = (unsigned long)&init_stack + sizeof(init_stack) \ 970bb898558SAl Viro } 971bb898558SAl Viro 972bb898558SAl Viro /* 973bb898558SAl Viro * Return saved PC of a blocked thread. 974bb898558SAl Viro * What is this good for? it will be always the scheduler or ret_from_fork. 975bb898558SAl Viro */ 976bb898558SAl Viro #define thread_saved_pc(t) (*(unsigned long *)((t)->thread.sp - 8)) 977bb898558SAl Viro 978bb898558SAl Viro #define task_pt_regs(tsk) ((struct pt_regs *)(tsk)->thread.sp0 - 1) 97989240ba0SStefani Seibold extern unsigned long KSTK_ESP(struct task_struct *task); 980bb898558SAl Viro #endif /* CONFIG_X86_64 */ 981bb898558SAl Viro 982bb898558SAl Viro extern void start_thread(struct pt_regs *regs, unsigned long new_ip, 983bb898558SAl Viro unsigned long new_sp); 984bb898558SAl Viro 985bb898558SAl Viro /* 986bb898558SAl Viro * This decides where the kernel will search for a free chunk of vm 987bb898558SAl Viro * space during mmap's. 988bb898558SAl Viro */ 989bb898558SAl Viro #define TASK_UNMAPPED_BASE (PAGE_ALIGN(TASK_SIZE / 3)) 990bb898558SAl Viro 991bb898558SAl Viro #define KSTK_EIP(task) (task_pt_regs(task)->ip) 992bb898558SAl Viro 993bb898558SAl Viro /* Get/set a process' ability to use the timestamp counter instruction */ 994bb898558SAl Viro #define GET_TSC_CTL(adr) get_tsc_mode((adr)) 995bb898558SAl Viro #define SET_TSC_CTL(val) set_tsc_mode((val)) 996bb898558SAl Viro 997bb898558SAl Viro extern int get_tsc_mode(unsigned long adr); 998bb898558SAl Viro extern int set_tsc_mode(unsigned int val); 999bb898558SAl Viro 10006a812691SAndreas Herrmann extern int amd_get_nb_id(int cpu); 10016a812691SAndreas Herrmann 10025cbc19a9SPeter Zijlstra struct aperfmperf { 10035cbc19a9SPeter Zijlstra u64 aperf, mperf; 10045cbc19a9SPeter Zijlstra }; 10055cbc19a9SPeter Zijlstra 10065cbc19a9SPeter Zijlstra static inline void get_aperfmperf(struct aperfmperf *am) 10075cbc19a9SPeter Zijlstra { 10085cbc19a9SPeter Zijlstra WARN_ON_ONCE(!boot_cpu_has(X86_FEATURE_APERFMPERF)); 10095cbc19a9SPeter Zijlstra 10105cbc19a9SPeter Zijlstra rdmsrl(MSR_IA32_APERF, am->aperf); 10115cbc19a9SPeter Zijlstra rdmsrl(MSR_IA32_MPERF, am->mperf); 10125cbc19a9SPeter Zijlstra } 10135cbc19a9SPeter Zijlstra 10145cbc19a9SPeter Zijlstra #define APERFMPERF_SHIFT 10 10155cbc19a9SPeter Zijlstra 10165cbc19a9SPeter Zijlstra static inline 10175cbc19a9SPeter Zijlstra unsigned long calc_aperfmperf_ratio(struct aperfmperf *old, 10185cbc19a9SPeter Zijlstra struct aperfmperf *new) 10195cbc19a9SPeter Zijlstra { 10205cbc19a9SPeter Zijlstra u64 aperf = new->aperf - old->aperf; 10215cbc19a9SPeter Zijlstra u64 mperf = new->mperf - old->mperf; 10225cbc19a9SPeter Zijlstra unsigned long ratio = aperf; 10235cbc19a9SPeter Zijlstra 10245cbc19a9SPeter Zijlstra mperf >>= APERFMPERF_SHIFT; 10255cbc19a9SPeter Zijlstra if (mperf) 10265cbc19a9SPeter Zijlstra ratio = div64_u64(aperf, mperf); 10275cbc19a9SPeter Zijlstra 10285cbc19a9SPeter Zijlstra return ratio; 10295cbc19a9SPeter Zijlstra } 10305cbc19a9SPeter Zijlstra 1031d78d671dSHans Rosenfeld /* 1032d78d671dSHans Rosenfeld * AMD errata checking 1033d78d671dSHans Rosenfeld */ 1034d78d671dSHans Rosenfeld #ifdef CONFIG_CPU_SUP_AMD 10351be85a6dSHans Rosenfeld extern const int amd_erratum_383[]; 10369d8888c2SHans Rosenfeld extern const int amd_erratum_400[]; 1037d78d671dSHans Rosenfeld extern bool cpu_has_amd_erratum(const int *); 1038d78d671dSHans Rosenfeld 1039d78d671dSHans Rosenfeld #define AMD_LEGACY_ERRATUM(...) { -1, __VA_ARGS__, 0 } 1040d78d671dSHans Rosenfeld #define AMD_OSVW_ERRATUM(osvw_id, ...) { osvw_id, __VA_ARGS__, 0 } 1041d78d671dSHans Rosenfeld #define AMD_MODEL_RANGE(f, m_start, s_start, m_end, s_end) \ 1042d78d671dSHans Rosenfeld ((f << 24) | (m_start << 16) | (s_start << 12) | (m_end << 4) | (s_end)) 1043d78d671dSHans Rosenfeld #define AMD_MODEL_RANGE_FAMILY(range) (((range) >> 24) & 0xff) 1044d78d671dSHans Rosenfeld #define AMD_MODEL_RANGE_START(range) (((range) >> 12) & 0xfff) 1045d78d671dSHans Rosenfeld #define AMD_MODEL_RANGE_END(range) ((range) & 0xfff) 1046d78d671dSHans Rosenfeld 1047d78d671dSHans Rosenfeld #else 1048d78d671dSHans Rosenfeld #define cpu_has_amd_erratum(x) (false) 1049d78d671dSHans Rosenfeld #endif /* CONFIG_CPU_SUP_AMD */ 1050d78d671dSHans Rosenfeld 10511965aae3SH. Peter Anvin #endif /* _ASM_X86_PROCESSOR_H */ 1052