x86/amd: Simplify AMD E400 aware idle routine
[linux-2.6-block.git] / arch / x86 / include / asm / processor.h
CommitLineData
1965aae3
PA
1#ifndef _ASM_X86_PROCESSOR_H
2#define _ASM_X86_PROCESSOR_H
c758ecf6 3
053de044
GOC
4#include <asm/processor-flags.h>
5
683e0253
GOC
6/* Forward declaration, a strange C thing */
7struct task_struct;
8struct mm_struct;
9fda6a06 9struct vm86;
683e0253 10
2f66dcc9
GOC
11#include <asm/math_emu.h>
12#include <asm/segment.h>
2f66dcc9 13#include <asm/types.h>
decb4c41 14#include <uapi/asm/sigcontext.h>
2f66dcc9 15#include <asm/current.h>
cd4d09ec 16#include <asm/cpufeatures.h>
2f66dcc9 17#include <asm/page.h>
54321d94 18#include <asm/pgtable_types.h>
5300db88 19#include <asm/percpu.h>
2f66dcc9
GOC
20#include <asm/msr.h>
21#include <asm/desc_defs.h>
bd61643e 22#include <asm/nops.h>
f05e798a 23#include <asm/special_insns.h>
14b9675a 24#include <asm/fpu/types.h>
4d46a89e 25
2f66dcc9 26#include <linux/personality.h>
5300db88 27#include <linux/cache.h>
2f66dcc9 28#include <linux/threads.h>
5cbc19a9 29#include <linux/math64.h>
faa4602e 30#include <linux/err.h>
f05e798a
DH
31#include <linux/irqflags.h>
32
33/*
34 * We handle most unaligned accesses in hardware. On the other hand
35 * unaligned DMA can be quite expensive on some Nehalem processors.
36 *
37 * Based on this we disable the IP header alignment in network drivers.
38 */
39#define NET_IP_ALIGN 0
c72dcf83 40
b332828c 41#define HBP_NUM 4
0ccb8acc
GOC
42/*
43 * Default implementation of macro that returns current
44 * instruction pointer ("program counter").
45 */
46static inline void *current_text_addr(void)
47{
48 void *pc;
4d46a89e
IM
49
50 asm volatile("mov $1f, %0; 1:":"=r" (pc));
51
0ccb8acc
GOC
52 return pc;
53}
54
b8c1b8ea
IM
55/*
56 * These alignment constraints are for performance in the vSMP case,
57 * but in the task_struct case we must also meet hardware imposed
58 * alignment requirements of the FPU state:
59 */
dbcb4660 60#ifdef CONFIG_X86_VSMP
4d46a89e
IM
61# define ARCH_MIN_TASKALIGN (1 << INTERNODE_CACHE_SHIFT)
62# define ARCH_MIN_MMSTRUCT_ALIGN (1 << INTERNODE_CACHE_SHIFT)
dbcb4660 63#else
b8c1b8ea 64# define ARCH_MIN_TASKALIGN __alignof__(union fpregs_state)
4d46a89e 65# define ARCH_MIN_MMSTRUCT_ALIGN 0
dbcb4660
GOC
66#endif
67
e0ba94f1
AS
68enum tlb_infos {
69 ENTRIES,
70 NR_INFO
71};
72
73extern u16 __read_mostly tlb_lli_4k[NR_INFO];
74extern u16 __read_mostly tlb_lli_2m[NR_INFO];
75extern u16 __read_mostly tlb_lli_4m[NR_INFO];
76extern u16 __read_mostly tlb_lld_4k[NR_INFO];
77extern u16 __read_mostly tlb_lld_2m[NR_INFO];
78extern u16 __read_mostly tlb_lld_4m[NR_INFO];
dd360393 79extern u16 __read_mostly tlb_lld_1g[NR_INFO];
c4211f42 80
5300db88
GOC
81/*
82 * CPU type and hardware bug flags. Kept separately for each CPU.
83 * Members of this structure are referenced in head.S, so think twice
84 * before touching them. [mj]
85 */
86
87struct cpuinfo_x86 {
4d46a89e
IM
88 __u8 x86; /* CPU family */
89 __u8 x86_vendor; /* CPU vendor */
90 __u8 x86_model;
91 __u8 x86_mask;
5300db88 92#ifdef CONFIG_X86_32
4d46a89e
IM
93 char wp_works_ok; /* It doesn't on 386's */
94
95 /* Problems on some 486Dx4's and old 386's: */
4d46a89e 96 char rfu;
4d46a89e 97 char pad0;
60e019eb 98 char pad1;
5300db88 99#else
4d46a89e 100 /* Number of 4K pages in DTLB/ITLB combined(in pages): */
b1882e68 101 int x86_tlbsize;
13c6c532 102#endif
4d46a89e
IM
103 __u8 x86_virt_bits;
104 __u8 x86_phys_bits;
105 /* CPUID returned core id bits: */
106 __u8 x86_coreid_bits;
107 /* Max extended CPUID function supported: */
108 __u32 extended_cpuid_level;
4d46a89e
IM
109 /* Maximum supported CPUID level, -1=no CPUID: */
110 int cpuid_level;
65fc985b 111 __u32 x86_capability[NCAPINTS + NBUGINTS];
4d46a89e
IM
112 char x86_vendor_id[16];
113 char x86_model_id[64];
114 /* in KB - valid for CPUS which support this call: */
115 int x86_cache_size;
116 int x86_cache_alignment; /* In bytes */
cbc82b17
PWJ
117 /* Cache QoS architectural values: */
118 int x86_cache_max_rmid; /* max index */
119 int x86_cache_occ_scale; /* scale to bytes */
4d46a89e
IM
120 int x86_power;
121 unsigned long loops_per_jiffy;
4d46a89e
IM
122 /* cpuid returned max cores value: */
123 u16 x86_max_cores;
124 u16 apicid;
01aaea1a 125 u16 initial_apicid;
4d46a89e 126 u16 x86_clflush_size;
4d46a89e
IM
127 /* number of cores as seen by the OS: */
128 u16 booted_cores;
129 /* Physical processor id: */
130 u16 phys_proc_id;
1f12e32f
TG
131 /* Logical processor id: */
132 u16 logical_proc_id;
4d46a89e
IM
133 /* Core id: */
134 u16 cpu_core_id;
135 /* Index into per_cpu list: */
136 u16 cpu_index;
506ed6b5 137 u32 microcode;
2c773dd3 138};
5300db88 139
4d46a89e
IM
140#define X86_VENDOR_INTEL 0
141#define X86_VENDOR_CYRIX 1
142#define X86_VENDOR_AMD 2
143#define X86_VENDOR_UMC 3
4d46a89e
IM
144#define X86_VENDOR_CENTAUR 5
145#define X86_VENDOR_TRANSMETA 7
146#define X86_VENDOR_NSC 8
147#define X86_VENDOR_NUM 9
148
149#define X86_VENDOR_UNKNOWN 0xff
5300db88 150
1a53905a
GOC
151/*
152 * capabilities of CPUs
153 */
4d46a89e
IM
154extern struct cpuinfo_x86 boot_cpu_data;
155extern struct cpuinfo_x86 new_cpu_data;
156
157extern struct tss_struct doublefault_tss;
3e0c3737
YL
158extern __u32 cpu_caps_cleared[NCAPINTS];
159extern __u32 cpu_caps_set[NCAPINTS];
5300db88
GOC
160
161#ifdef CONFIG_SMP
2c773dd3 162DECLARE_PER_CPU_READ_MOSTLY(struct cpuinfo_x86, cpu_info);
5300db88 163#define cpu_data(cpu) per_cpu(cpu_info, cpu)
5300db88 164#else
7b543a53 165#define cpu_info boot_cpu_data
5300db88 166#define cpu_data(cpu) boot_cpu_data
5300db88
GOC
167#endif
168
1c6c727d
JS
169extern const struct seq_operations cpuinfo_op;
170
4d46a89e
IM
171#define cache_line_size() (boot_cpu_data.x86_cache_alignment)
172
173extern void cpu_detect(struct cpuinfo_x86 *c);
1a53905a 174
f580366f 175extern void early_cpu_init(void);
1a53905a
GOC
176extern void identify_boot_cpu(void);
177extern void identify_secondary_cpu(struct cpuinfo_x86 *);
5300db88 178extern void print_cpu_info(struct cpuinfo_x86 *);
21c3fcf3 179void print_cpu_msr(struct cpuinfo_x86 *);
5300db88
GOC
180extern void init_scattered_cpuid_features(struct cpuinfo_x86 *c);
181extern unsigned int init_intel_cacheinfo(struct cpuinfo_x86 *c);
04a15418 182extern void init_amd_cacheinfo(struct cpuinfo_x86 *c);
5300db88 183
bbb65d2d 184extern void detect_extended_topology(struct cpuinfo_x86 *c);
1a53905a 185extern void detect_ht(struct cpuinfo_x86 *c);
1a53905a 186
d288e1cf
FY
187#ifdef CONFIG_X86_32
188extern int have_cpuid_p(void);
189#else
190static inline int have_cpuid_p(void)
191{
192 return 1;
193}
194#endif
c758ecf6 195static inline void native_cpuid(unsigned int *eax, unsigned int *ebx,
4d46a89e 196 unsigned int *ecx, unsigned int *edx)
c758ecf6
GOC
197{
198 /* ecx is often an input as well as an output. */
45a94d7c 199 asm volatile("cpuid"
cca2e6f8
JP
200 : "=a" (*eax),
201 "=b" (*ebx),
202 "=c" (*ecx),
203 "=d" (*edx)
506ed6b5
AK
204 : "0" (*eax), "2" (*ecx)
205 : "memory");
c758ecf6
GOC
206}
207
c72dcf83
GOC
208static inline void load_cr3(pgd_t *pgdir)
209{
210 write_cr3(__pa(pgdir));
211}
c758ecf6 212
ca241c75
GOC
213#ifdef CONFIG_X86_32
214/* This is the TSS defined by the hardware. */
215struct x86_hw_tss {
4d46a89e
IM
216 unsigned short back_link, __blh;
217 unsigned long sp0;
218 unsigned short ss0, __ss0h;
cf9328cc 219 unsigned long sp1;
76e4c490
AL
220
221 /*
cf9328cc
AL
222 * We don't use ring 1, so ss1 is a convenient scratch space in
223 * the same cacheline as sp0. We use ss1 to cache the value in
224 * MSR_IA32_SYSENTER_CS. When we context switch
225 * MSR_IA32_SYSENTER_CS, we first check if the new value being
226 * written matches ss1, and, if it's not, then we wrmsr the new
227 * value and update ss1.
76e4c490 228 *
cf9328cc
AL
229 * The only reason we context switch MSR_IA32_SYSENTER_CS is
230 * that we set it to zero in vm86 tasks to avoid corrupting the
231 * stack if we were to go through the sysenter path from vm86
232 * mode.
76e4c490 233 */
76e4c490
AL
234 unsigned short ss1; /* MSR_IA32_SYSENTER_CS */
235
236 unsigned short __ss1h;
4d46a89e
IM
237 unsigned long sp2;
238 unsigned short ss2, __ss2h;
239 unsigned long __cr3;
240 unsigned long ip;
241 unsigned long flags;
242 unsigned long ax;
243 unsigned long cx;
244 unsigned long dx;
245 unsigned long bx;
246 unsigned long sp;
247 unsigned long bp;
248 unsigned long si;
249 unsigned long di;
250 unsigned short es, __esh;
251 unsigned short cs, __csh;
252 unsigned short ss, __ssh;
253 unsigned short ds, __dsh;
254 unsigned short fs, __fsh;
255 unsigned short gs, __gsh;
256 unsigned short ldt, __ldth;
257 unsigned short trace;
258 unsigned short io_bitmap_base;
259
ca241c75
GOC
260} __attribute__((packed));
261#else
262struct x86_hw_tss {
4d46a89e
IM
263 u32 reserved1;
264 u64 sp0;
265 u64 sp1;
266 u64 sp2;
267 u64 reserved2;
268 u64 ist[7];
269 u32 reserved3;
270 u32 reserved4;
271 u16 reserved5;
272 u16 io_bitmap_base;
273
ca241c75
GOC
274} __attribute__((packed)) ____cacheline_aligned;
275#endif
276
277/*
4d46a89e 278 * IO-bitmap sizes:
ca241c75 279 */
4d46a89e
IM
280#define IO_BITMAP_BITS 65536
281#define IO_BITMAP_BYTES (IO_BITMAP_BITS/8)
282#define IO_BITMAP_LONGS (IO_BITMAP_BYTES/sizeof(long))
283#define IO_BITMAP_OFFSET offsetof(struct tss_struct, io_bitmap)
284#define INVALID_IO_BITMAP_OFFSET 0x8000
ca241c75
GOC
285
286struct tss_struct {
4d46a89e
IM
287 /*
288 * The hardware state:
289 */
290 struct x86_hw_tss x86_tss;
ca241c75
GOC
291
292 /*
293 * The extra 1 is there because the CPU will access an
294 * additional byte beyond the end of the IO permission
295 * bitmap. The extra byte must be all 1 bits, and must
296 * be within the limit.
297 */
4d46a89e 298 unsigned long io_bitmap[IO_BITMAP_LONGS + 1];
4d46a89e 299
6dcc9414 300#ifdef CONFIG_X86_32
ca241c75 301 /*
2a41aa4f 302 * Space for the temporary SYSENTER stack.
ca241c75 303 */
2a41aa4f 304 unsigned long SYSENTER_stack_canary;
d828c71f 305 unsigned long SYSENTER_stack[64];
6dcc9414 306#endif
4d46a89e 307
84e65b0a 308} ____cacheline_aligned;
ca241c75 309
24933b82 310DECLARE_PER_CPU_SHARED_ALIGNED(struct tss_struct, cpu_tss);
ca241c75 311
a7fcf28d
AL
312#ifdef CONFIG_X86_32
313DECLARE_PER_CPU(unsigned long, cpu_current_top_of_stack);
314#endif
315
4d46a89e
IM
316/*
317 * Save the original ist values for checking stack pointers during debugging
318 */
1a53905a 319struct orig_ist {
4d46a89e 320 unsigned long ist[7];
1a53905a
GOC
321};
322
fe676203 323#ifdef CONFIG_X86_64
2f66dcc9 324DECLARE_PER_CPU(struct orig_ist, orig_ist);
26f80bd6 325
947e76cd
BG
326union irq_stack_union {
327 char irq_stack[IRQ_STACK_SIZE];
328 /*
329 * GCC hardcodes the stack canary as %gs:40. Since the
330 * irq_stack is the object at %gs:0, we reserve the bottom
331 * 48 bytes of the irq stack for the canary.
332 */
333 struct {
334 char gs_base[40];
335 unsigned long stack_canary;
336 };
337};
338
277d5b40 339DECLARE_PER_CPU_FIRST(union irq_stack_union, irq_stack_union) __visible;
2add8e23
BG
340DECLARE_INIT_PER_CPU(irq_stack_union);
341
26f80bd6 342DECLARE_PER_CPU(char *, irq_stack_ptr);
9766cdbc 343DECLARE_PER_CPU(unsigned int, irq_count);
9766cdbc 344extern asmlinkage void ignore_sysret(void);
60a5317f
TH
345#else /* X86_64 */
346#ifdef CONFIG_CC_STACKPROTECTOR
1ea0d14e
JF
347/*
348 * Make sure stack canary segment base is cached-aligned:
349 * "For Intel Atom processors, avoid non zero segment base address
350 * that is not aligned to cache line boundary at all cost."
351 * (Optim Ref Manual Assembly/Compiler Coding Rule 15.)
352 */
353struct stack_canary {
354 char __pad[20]; /* canary at %gs:20 */
355 unsigned long canary;
356};
53f82452 357DECLARE_PER_CPU_ALIGNED(struct stack_canary, stack_canary);
96a388de 358#endif
198d208d
SR
359/*
360 * per-CPU IRQ handling stacks
361 */
362struct irq_stack {
363 u32 stack[THREAD_SIZE/sizeof(u32)];
364} __aligned(THREAD_SIZE);
365
366DECLARE_PER_CPU(struct irq_stack *, hardirq_stack);
367DECLARE_PER_CPU(struct irq_stack *, softirq_stack);
60a5317f 368#endif /* X86_64 */
c758ecf6 369
bf15a8cf 370extern unsigned int fpu_kernel_xstate_size;
a1141e0b 371extern unsigned int fpu_user_xstate_size;
683e0253 372
24f1e32c
FW
373struct perf_event;
374
13d4ea09
AL
375typedef struct {
376 unsigned long seg;
377} mm_segment_t;
378
cb38d377 379struct thread_struct {
4d46a89e
IM
380 /* Cached TLS descriptors: */
381 struct desc_struct tls_array[GDT_ENTRY_TLS_ENTRIES];
382 unsigned long sp0;
383 unsigned long sp;
cb38d377 384#ifdef CONFIG_X86_32
4d46a89e 385 unsigned long sysenter_cs;
cb38d377 386#else
4d46a89e
IM
387 unsigned short es;
388 unsigned short ds;
389 unsigned short fsindex;
390 unsigned short gsindex;
cb38d377 391#endif
b9d989c7
AL
392
393 u32 status; /* thread synchronous flags */
394
d756f4ad 395#ifdef CONFIG_X86_64
296f781a
AL
396 unsigned long fsbase;
397 unsigned long gsbase;
398#else
399 /*
400 * XXX: this could presumably be unsigned short. Alternatively,
401 * 32-bit kernels could be taught to use fsindex instead.
402 */
403 unsigned long fs;
404 unsigned long gs;
d756f4ad 405#endif
c5bedc68 406
24f1e32c
FW
407 /* Save middle states of ptrace breakpoints */
408 struct perf_event *ptrace_bps[HBP_NUM];
409 /* Debug status used for traps, single steps, etc... */
410 unsigned long debugreg6;
326264a0
FW
411 /* Keep track of the exact dr7 value set by the user */
412 unsigned long ptrace_dr7;
4d46a89e
IM
413 /* Fault info: */
414 unsigned long cr2;
51e7dc70 415 unsigned long trap_nr;
4d46a89e 416 unsigned long error_code;
9fda6a06 417#ifdef CONFIG_VM86
4d46a89e 418 /* Virtual 86 mode info */
9fda6a06 419 struct vm86 *vm86;
cb38d377 420#endif
4d46a89e
IM
421 /* IO permissions: */
422 unsigned long *io_bitmap_ptr;
423 unsigned long iopl;
424 /* Max allowed port in the bitmap, in bytes: */
425 unsigned io_bitmap_max;
0c8c0f03 426
13d4ea09
AL
427 mm_segment_t addr_limit;
428
2a53ccbc 429 unsigned int sig_on_uaccess_err:1;
dfa9a942
AL
430 unsigned int uaccess_err:1; /* uaccess failed */
431
0c8c0f03
DH
432 /* Floating point and extended processor state */
433 struct fpu fpu;
434 /*
435 * WARNING: 'fpu' is dynamically-sized. It *MUST* be at
436 * the end.
437 */
cb38d377
GOC
438};
439
b9d989c7
AL
440/*
441 * Thread-synchronous status.
442 *
443 * This is different from the flags in that nobody else
444 * ever touches our thread-synchronous status, so we don't
445 * have to worry about atomic accesses.
446 */
447#define TS_COMPAT 0x0002 /* 32bit syscall active (64BIT)*/
448
62d7d7ed
GOC
449/*
450 * Set IOPL bits in EFLAGS from given mask
451 */
452static inline void native_set_iopl_mask(unsigned mask)
453{
454#ifdef CONFIG_X86_32
455 unsigned int reg;
4d46a89e 456
cca2e6f8
JP
457 asm volatile ("pushfl;"
458 "popl %0;"
459 "andl %1, %0;"
460 "orl %2, %0;"
461 "pushl %0;"
462 "popfl"
463 : "=&r" (reg)
464 : "i" (~X86_EFLAGS_IOPL), "r" (mask));
62d7d7ed
GOC
465#endif
466}
467
4d46a89e
IM
468static inline void
469native_load_sp0(struct tss_struct *tss, struct thread_struct *thread)
7818a1e0
GOC
470{
471 tss->x86_tss.sp0 = thread->sp0;
472#ifdef CONFIG_X86_32
4d46a89e 473 /* Only happens when SEP is enabled, no need to test "SEP"arately: */
7818a1e0
GOC
474 if (unlikely(tss->x86_tss.ss1 != thread->sysenter_cs)) {
475 tss->x86_tss.ss1 = thread->sysenter_cs;
476 wrmsr(MSR_IA32_SYSENTER_CS, thread->sysenter_cs, 0);
477 }
478#endif
479}
1b46cbe0 480
e801f864
GOC
481static inline void native_swapgs(void)
482{
483#ifdef CONFIG_X86_64
484 asm volatile("swapgs" ::: "memory");
485#endif
486}
487
a7fcf28d 488static inline unsigned long current_top_of_stack(void)
8ef46a67 489{
a7fcf28d 490#ifdef CONFIG_X86_64
24933b82 491 return this_cpu_read_stable(cpu_tss.x86_tss.sp0);
a7fcf28d
AL
492#else
493 /* sp0 on x86_32 is special in and around vm86 mode. */
494 return this_cpu_read_stable(cpu_current_top_of_stack);
495#endif
8ef46a67
AL
496}
497
7818a1e0
GOC
498#ifdef CONFIG_PARAVIRT
499#include <asm/paravirt.h>
500#else
4d46a89e 501#define __cpuid native_cpuid
1b46cbe0 502
cca2e6f8
JP
503static inline void load_sp0(struct tss_struct *tss,
504 struct thread_struct *thread)
7818a1e0
GOC
505{
506 native_load_sp0(tss, thread);
507}
508
62d7d7ed 509#define set_iopl_mask native_set_iopl_mask
1b46cbe0
GOC
510#endif /* CONFIG_PARAVIRT */
511
683e0253
GOC
512/* Free all resources held by a thread. */
513extern void release_thread(struct task_struct *);
514
683e0253 515unsigned long get_wchan(struct task_struct *p);
c758ecf6
GOC
516
517/*
518 * Generic CPUID function
519 * clear %ecx since some cpus (Cyrix MII) do not set or clear %ecx
520 * resulting in stale register contents being returned.
521 */
522static inline void cpuid(unsigned int op,
523 unsigned int *eax, unsigned int *ebx,
524 unsigned int *ecx, unsigned int *edx)
525{
526 *eax = op;
527 *ecx = 0;
528 __cpuid(eax, ebx, ecx, edx);
529}
530
531/* Some CPUID calls want 'count' to be placed in ecx */
532static inline void cpuid_count(unsigned int op, int count,
533 unsigned int *eax, unsigned int *ebx,
534 unsigned int *ecx, unsigned int *edx)
535{
536 *eax = op;
537 *ecx = count;
538 __cpuid(eax, ebx, ecx, edx);
539}
540
541/*
542 * CPUID functions returning a single datum
543 */
544static inline unsigned int cpuid_eax(unsigned int op)
545{
546 unsigned int eax, ebx, ecx, edx;
547
548 cpuid(op, &eax, &ebx, &ecx, &edx);
4d46a89e 549
c758ecf6
GOC
550 return eax;
551}
4d46a89e 552
c758ecf6
GOC
553static inline unsigned int cpuid_ebx(unsigned int op)
554{
555 unsigned int eax, ebx, ecx, edx;
556
557 cpuid(op, &eax, &ebx, &ecx, &edx);
4d46a89e 558
c758ecf6
GOC
559 return ebx;
560}
4d46a89e 561
c758ecf6
GOC
562static inline unsigned int cpuid_ecx(unsigned int op)
563{
564 unsigned int eax, ebx, ecx, edx;
565
566 cpuid(op, &eax, &ebx, &ecx, &edx);
4d46a89e 567
c758ecf6
GOC
568 return ecx;
569}
4d46a89e 570
c758ecf6
GOC
571static inline unsigned int cpuid_edx(unsigned int op)
572{
573 unsigned int eax, ebx, ecx, edx;
574
575 cpuid(op, &eax, &ebx, &ecx, &edx);
4d46a89e 576
c758ecf6
GOC
577 return edx;
578}
579
683e0253 580/* REP NOP (PAUSE) is a good thing to insert into busy-wait loops. */
0b101e62 581static __always_inline void rep_nop(void)
683e0253 582{
cca2e6f8 583 asm volatile("rep; nop" ::: "memory");
683e0253
GOC
584}
585
0b101e62 586static __always_inline void cpu_relax(void)
4d46a89e
IM
587{
588 rep_nop();
589}
590
3a6bfbc9
DB
591#define cpu_relax_lowlatency() cpu_relax()
592
5367b688 593/* Stop speculative execution and prefetching of modified code. */
683e0253
GOC
594static inline void sync_core(void)
595{
596 int tmp;
4d46a89e 597
eb068e78 598#ifdef CONFIG_M486
45c39fb0
PA
599 /*
600 * Do a CPUID if available, otherwise do a jump. The jump
601 * can conveniently enough be the jump around CPUID.
602 */
603 asm volatile("cmpl %2,%1\n\t"
604 "jl 1f\n\t"
605 "cpuid\n"
606 "1:"
607 : "=a" (tmp)
608 : "rm" (boot_cpu_data.cpuid_level), "ri" (0), "0" (1)
609 : "ebx", "ecx", "edx", "memory");
610#else
611 /*
612 * CPUID is a barrier to speculative execution.
613 * Prefetched instructions are automatically
614 * invalidated when modified.
615 */
616 asm volatile("cpuid"
617 : "=a" (tmp)
618 : "0" (1)
619 : "ebx", "ecx", "edx", "memory");
5367b688 620#endif
683e0253
GOC
621}
622
683e0253 623extern void select_idle_routine(const struct cpuinfo_x86 *c);
07c94a38 624extern void amd_e400_c1e_apic_setup(void);
683e0253 625
4d46a89e 626extern unsigned long boot_option_idle_override;
683e0253 627
d1896049 628enum idle_boot_override {IDLE_NO_OVERRIDE=0, IDLE_HALT, IDLE_NOMWAIT,
69fb3676 629 IDLE_POLL};
d1896049 630
1a53905a
GOC
631extern void enable_sep_cpu(void);
632extern int sysenter_setup(void);
633
29c84391 634extern void early_trap_init(void);
8170e6be 635void early_trap_pf_init(void);
29c84391 636
1a53905a 637/* Defined in head.S */
4d46a89e 638extern struct desc_ptr early_gdt_descr;
1a53905a
GOC
639
640extern void cpu_set_gdt(int);
552be871 641extern void switch_to_new_gdt(int);
11e3a840 642extern void load_percpu_segment(int);
1a53905a 643extern void cpu_init(void);
1a53905a 644
c2724775
MM
645static inline unsigned long get_debugctlmsr(void)
646{
ea8e61b7 647 unsigned long debugctlmsr = 0;
c2724775
MM
648
649#ifndef CONFIG_X86_DEBUGCTLMSR
650 if (boot_cpu_data.x86 < 6)
651 return 0;
652#endif
653 rdmsrl(MSR_IA32_DEBUGCTLMSR, debugctlmsr);
654
ea8e61b7 655 return debugctlmsr;
c2724775
MM
656}
657
5b0e5084
JB
658static inline void update_debugctlmsr(unsigned long debugctlmsr)
659{
660#ifndef CONFIG_X86_DEBUGCTLMSR
661 if (boot_cpu_data.x86 < 6)
662 return;
663#endif
664 wrmsrl(MSR_IA32_DEBUGCTLMSR, debugctlmsr);
665}
666
9bd1190a
ON
667extern void set_task_blockstep(struct task_struct *task, bool on);
668
4d46a89e
IM
669/* Boot loader type from the setup header: */
670extern int bootloader_type;
5031296c 671extern int bootloader_version;
1a53905a 672
4d46a89e 673extern char ignore_fpu_irq;
683e0253
GOC
674
675#define HAVE_ARCH_PICK_MMAP_LAYOUT 1
676#define ARCH_HAS_PREFETCHW
677#define ARCH_HAS_SPINLOCK_PREFETCH
678
ae2e15eb 679#ifdef CONFIG_X86_32
a930dc45 680# define BASE_PREFETCH ""
4d46a89e 681# define ARCH_HAS_PREFETCH
ae2e15eb 682#else
a930dc45 683# define BASE_PREFETCH "prefetcht0 %P1"
ae2e15eb
GOC
684#endif
685
4d46a89e
IM
686/*
687 * Prefetch instructions for Pentium III (+) and AMD Athlon (+)
688 *
689 * It's not worth to care about 3dnow prefetches for the K6
690 * because they are microcoded there and very slow.
691 */
ae2e15eb
GOC
692static inline void prefetch(const void *x)
693{
a930dc45 694 alternative_input(BASE_PREFETCH, "prefetchnta %P1",
ae2e15eb 695 X86_FEATURE_XMM,
a930dc45 696 "m" (*(const char *)x));
ae2e15eb
GOC
697}
698
4d46a89e
IM
699/*
700 * 3dnow prefetch to get an exclusive cache line.
701 * Useful for spinlocks to avoid one state transition in the
702 * cache coherency protocol:
703 */
ae2e15eb
GOC
704static inline void prefetchw(const void *x)
705{
a930dc45
BP
706 alternative_input(BASE_PREFETCH, "prefetchw %P1",
707 X86_FEATURE_3DNOWPREFETCH,
708 "m" (*(const char *)x));
ae2e15eb
GOC
709}
710
4d46a89e
IM
711static inline void spin_lock_prefetch(const void *x)
712{
713 prefetchw(x);
714}
715
d9e05cc5
AL
716#define TOP_OF_INIT_STACK ((unsigned long)&init_stack + sizeof(init_stack) - \
717 TOP_OF_KERNEL_STACK_PADDING)
718
2f66dcc9
GOC
719#ifdef CONFIG_X86_32
720/*
721 * User space process size: 3GB (default).
722 */
4d46a89e 723#define TASK_SIZE PAGE_OFFSET
d9517346 724#define TASK_SIZE_MAX TASK_SIZE
4d46a89e
IM
725#define STACK_TOP TASK_SIZE
726#define STACK_TOP_MAX STACK_TOP
727
728#define INIT_THREAD { \
d9e05cc5 729 .sp0 = TOP_OF_INIT_STACK, \
4d46a89e
IM
730 .sysenter_cs = __KERNEL_CS, \
731 .io_bitmap_ptr = NULL, \
13d4ea09 732 .addr_limit = KERNEL_DS, \
2f66dcc9
GOC
733}
734
2f66dcc9 735/*
5c39403e 736 * TOP_OF_KERNEL_STACK_PADDING reserves 8 bytes on top of the ring0 stack.
2f66dcc9 737 * This is necessary to guarantee that the entire "struct pt_regs"
b595076a 738 * is accessible even if the CPU haven't stored the SS/ESP registers
2f66dcc9
GOC
739 * on the stack (interrupt gate does not save these registers
740 * when switching to the same priv ring).
741 * Therefore beware: accessing the ss/esp fields of the
742 * "struct pt_regs" is possible, but they may contain the
743 * completely wrong values.
744 */
5c39403e
DV
745#define task_pt_regs(task) \
746({ \
747 unsigned long __ptr = (unsigned long)task_stack_page(task); \
748 __ptr += THREAD_SIZE - TOP_OF_KERNEL_STACK_PADDING; \
749 ((struct pt_regs *)__ptr) - 1; \
2f66dcc9
GOC
750})
751
4d46a89e 752#define KSTK_ESP(task) (task_pt_regs(task)->sp)
2f66dcc9
GOC
753
754#else
755/*
07114f0f
AL
756 * User space process size. 47bits minus one guard page. The guard
757 * page is necessary on Intel CPUs: if a SYSCALL instruction is at
758 * the highest possible canonical userspace address, then that
759 * syscall will enter the kernel with a non-canonical return
760 * address, and SYSRET will explode dangerously. We avoid this
761 * particular problem by preventing anything from being mapped
762 * at the maximum canonical address.
2f66dcc9 763 */
d9517346 764#define TASK_SIZE_MAX ((1UL << 47) - PAGE_SIZE)
2f66dcc9
GOC
765
766/* This decides where the kernel will search for a free chunk of vm
767 * space during mmap's.
768 */
4d46a89e
IM
769#define IA32_PAGE_OFFSET ((current->personality & ADDR_LIMIT_3GB) ? \
770 0xc0000000 : 0xFFFFe000)
2f66dcc9 771
6bd33008 772#define TASK_SIZE (test_thread_flag(TIF_ADDR32) ? \
d9517346 773 IA32_PAGE_OFFSET : TASK_SIZE_MAX)
6bd33008 774#define TASK_SIZE_OF(child) ((test_tsk_thread_flag(child, TIF_ADDR32)) ? \
d9517346 775 IA32_PAGE_OFFSET : TASK_SIZE_MAX)
2f66dcc9 776
922a70d3 777#define STACK_TOP TASK_SIZE
d9517346 778#define STACK_TOP_MAX TASK_SIZE_MAX
922a70d3 779
13d4ea09
AL
780#define INIT_THREAD { \
781 .sp0 = TOP_OF_INIT_STACK, \
782 .addr_limit = KERNEL_DS, \
2f66dcc9
GOC
783}
784
4d46a89e 785#define task_pt_regs(tsk) ((struct pt_regs *)(tsk)->thread.sp0 - 1)
89240ba0 786extern unsigned long KSTK_ESP(struct task_struct *task);
d046ff8b 787
2f66dcc9
GOC
788#endif /* CONFIG_X86_64 */
789
ffcb043b
BG
790extern unsigned long thread_saved_pc(struct task_struct *tsk);
791
513ad84b
IM
792extern void start_thread(struct pt_regs *regs, unsigned long new_ip,
793 unsigned long new_sp);
794
4d46a89e
IM
795/*
796 * This decides where the kernel will search for a free chunk of vm
683e0253
GOC
797 * space during mmap's.
798 */
799#define TASK_UNMAPPED_BASE (PAGE_ALIGN(TASK_SIZE / 3))
800
4d46a89e 801#define KSTK_EIP(task) (task_pt_regs(task)->ip)
683e0253 802
529e25f6
EB
803/* Get/set a process' ability to use the timestamp counter instruction */
804#define GET_TSC_CTL(adr) get_tsc_mode((adr))
805#define SET_TSC_CTL(val) set_tsc_mode((val))
806
807extern int get_tsc_mode(unsigned long adr);
808extern int set_tsc_mode(unsigned int val);
809
fe3d197f 810/* Register/unregister a process' MPX related resource */
46a6e0cf
DH
811#define MPX_ENABLE_MANAGEMENT() mpx_enable_management()
812#define MPX_DISABLE_MANAGEMENT() mpx_disable_management()
fe3d197f
DH
813
814#ifdef CONFIG_X86_INTEL_MPX
46a6e0cf
DH
815extern int mpx_enable_management(void);
816extern int mpx_disable_management(void);
fe3d197f 817#else
46a6e0cf 818static inline int mpx_enable_management(void)
fe3d197f
DH
819{
820 return -EINVAL;
821}
46a6e0cf 822static inline int mpx_disable_management(void)
fe3d197f
DH
823{
824 return -EINVAL;
825}
826#endif /* CONFIG_X86_INTEL_MPX */
827
8b84c8df 828extern u16 amd_get_nb_id(int cpu);
cc2749e4 829extern u32 amd_get_nodes_per_socket(void);
6a812691 830
96e39ac0
JW
831static inline uint32_t hypervisor_cpuid_base(const char *sig, uint32_t leaves)
832{
833 uint32_t base, eax, signature[3];
834
835 for (base = 0x40000000; base < 0x40010000; base += 0x100) {
836 cpuid(base, &eax, &signature[0], &signature[1], &signature[2]);
837
838 if (!memcmp(sig, signature, 12) &&
839 (leaves == 0 || ((eax - base) >= leaves)))
840 return base;
841 }
842
843 return 0;
844}
845
f05e798a
DH
846extern unsigned long arch_align_stack(unsigned long sp);
847extern void free_init_pages(char *what, unsigned long begin, unsigned long end);
848
849void default_idle(void);
6a377ddc
LB
850#ifdef CONFIG_XEN
851bool xen_set_default_idle(void);
852#else
853#define xen_set_default_idle 0
854#endif
f05e798a
DH
855
856void stop_this_cpu(void *dummy);
4d067d8e 857void df_debug(struct pt_regs *regs, long error_code);
1965aae3 858#endif /* _ASM_X86_PROCESSOR_H */