1 /* SPDX-License-Identifier: GPL-2.0 */
2 #ifndef _ASM_X86_PAGE_64_DEFS_H
3 #define _ASM_X86_PAGE_64_DEFS_H
4 
5 #ifndef __ASSEMBLY__
6 #include <asm/kaslr.h>
7 #endif
8 
9 #ifdef CONFIG_KASAN
10 #define KASAN_STACK_ORDER 1
11 #else
12 #define KASAN_STACK_ORDER 0
13 #endif
14 
15 #define THREAD_SIZE_ORDER	(2 + KASAN_STACK_ORDER)
16 #define THREAD_SIZE  (PAGE_SIZE << THREAD_SIZE_ORDER)
17 
18 #define EXCEPTION_STACK_ORDER (0 + KASAN_STACK_ORDER)
19 #define EXCEPTION_STKSZ (PAGE_SIZE << EXCEPTION_STACK_ORDER)
20 
21 #define IRQ_STACK_ORDER (2 + KASAN_STACK_ORDER)
22 #define IRQ_STACK_SIZE (PAGE_SIZE << IRQ_STACK_ORDER)
23 
24 /*
25  * The index for the tss.ist[] array. The hardware limit is 7 entries.
26  */
27 #define	IST_INDEX_DF		0
28 #define	IST_INDEX_NMI		1
29 #define	IST_INDEX_DB		2
30 #define	IST_INDEX_MCE		3
31 #define	IST_INDEX_VC		4
32 
33 /*
34  * Set __PAGE_OFFSET to the most negative possible address +
35  * PGDIR_SIZE*17 (pgd slot 273).
36  *
37  * The gap is to allow a space for LDT remap for PTI (1 pgd slot) and space for
38  * a hypervisor (16 slots). Choosing 16 slots for a hypervisor is arbitrary,
39  * but it's what Xen requires.
40  */
41 #define __PAGE_OFFSET_BASE_L5	_AC(0xff11000000000000, UL)
42 #define __PAGE_OFFSET_BASE_L4	_AC(0xffff888000000000, UL)
43 
44 #ifdef CONFIG_DYNAMIC_MEMORY_LAYOUT
45 #define __PAGE_OFFSET           page_offset_base
46 #else
47 #define __PAGE_OFFSET           __PAGE_OFFSET_BASE_L4
48 #endif /* CONFIG_DYNAMIC_MEMORY_LAYOUT */
49 
50 #define __START_KERNEL_map	_AC(0xffffffff80000000, UL)
51 
52 /* See Documentation/x86/x86_64/mm.rst for a description of the memory map. */
53 
54 #define __PHYSICAL_MASK_SHIFT	52
55 
56 #ifdef CONFIG_X86_5LEVEL
57 #define __VIRTUAL_MASK_SHIFT	(pgtable_l5_enabled() ? 56 : 47)
58 #else
59 #define __VIRTUAL_MASK_SHIFT	47
60 #endif
61 
62 /*
63  * User space process size.  This is the first address outside the user range.
64  * There are a few constraints that determine this:
65  *
66  * On Intel CPUs, if a SYSCALL instruction is at the highest canonical
67  * address, then that syscall will enter the kernel with a
68  * non-canonical return address, and SYSRET will explode dangerously.
69  * We avoid this particular problem by preventing anything executable
70  * from being mapped at the maximum canonical address.
71  *
72  * On AMD CPUs in the Ryzen family, there's a nasty bug in which the
73  * CPUs malfunction if they execute code from the highest canonical page.
74  * They'll speculate right off the end of the canonical space, and
75  * bad things happen.  This is worked around in the same way as the
76  * Intel problem.
77  *
78  * With page table isolation enabled, we map the LDT in ... [stay tuned]
79  */
80 #define TASK_SIZE_MAX	((_AC(1,UL) << __VIRTUAL_MASK_SHIFT) - PAGE_SIZE)
81 
82 #define DEFAULT_MAP_WINDOW	((1UL << 47) - PAGE_SIZE)
83 
84 /* This decides where the kernel will search for a free chunk of vm
85  * space during mmap's.
86  */
87 #define IA32_PAGE_OFFSET	((current->personality & ADDR_LIMIT_3GB) ? \
88 					0xc0000000 : 0xFFFFe000)
89 
90 #define TASK_SIZE_LOW		(test_thread_flag(TIF_ADDR32) ? \
91 					IA32_PAGE_OFFSET : DEFAULT_MAP_WINDOW)
92 #define TASK_SIZE		(test_thread_flag(TIF_ADDR32) ? \
93 					IA32_PAGE_OFFSET : TASK_SIZE_MAX)
94 #define TASK_SIZE_OF(child)	((test_tsk_thread_flag(child, TIF_ADDR32)) ? \
95 					IA32_PAGE_OFFSET : TASK_SIZE_MAX)
96 
97 #define STACK_TOP		TASK_SIZE_LOW
98 #define STACK_TOP_MAX		TASK_SIZE_MAX
99 
100 /*
101  * Maximum kernel image size is limited to 1 GiB, due to the fixmap living
102  * in the next 1 GiB (see level2_kernel_pgt in arch/x86/kernel/head_64.S).
103  *
104  * On KASLR use 1 GiB by default, leaving 1 GiB for modules once the
105  * page tables are fully set up.
106  *
107  * If KASLR is disabled we can shrink it to 0.5 GiB and increase the size
108  * of the modules area to 1.5 GiB.
109  */
110 #ifdef CONFIG_RANDOMIZE_BASE
111 #define KERNEL_IMAGE_SIZE	(1024 * 1024 * 1024)
112 #else
113 #define KERNEL_IMAGE_SIZE	(512 * 1024 * 1024)
114 #endif
115 
116 #endif /* _ASM_X86_PAGE_64_DEFS_H */
117