• Home
  • Line#
  • Scopes#
  • Navigate#
  • Raw
  • Download
1 /* SPDX-License-Identifier: GPL-2.0 */
2 #ifndef _ASM_X86_PAGE_64_DEFS_H
3 #define _ASM_X86_PAGE_64_DEFS_H
4 
5 #ifndef __ASSEMBLY__
6 #include <asm/kaslr.h>
7 #endif
8 
9 #ifdef CONFIG_KASAN
10 #define KASAN_STACK_ORDER 1
11 #else
12 #define KASAN_STACK_ORDER 0
13 #endif
14 
15 #define THREAD_SIZE_ORDER	(2 + KASAN_STACK_ORDER)
16 #define THREAD_SIZE  (PAGE_SIZE << THREAD_SIZE_ORDER)
17 
18 #define EXCEPTION_STACK_ORDER (1 + KASAN_STACK_ORDER)
19 #define EXCEPTION_STKSZ (PAGE_SIZE << EXCEPTION_STACK_ORDER)
20 
21 #define IRQ_STACK_ORDER (2 + KASAN_STACK_ORDER)
22 #define IRQ_STACK_SIZE (PAGE_SIZE << IRQ_STACK_ORDER)
23 
24 /*
25  * The index for the tss.ist[] array. The hardware limit is 7 entries.
26  */
27 #define	IST_INDEX_DF		0
28 #define	IST_INDEX_NMI		1
29 #define	IST_INDEX_DB		2
30 #define	IST_INDEX_MCE		3
31 
32 /*
33  * Set __PAGE_OFFSET to the most negative possible address +
34  * PGDIR_SIZE*17 (pgd slot 273).
35  *
36  * The gap is to allow a space for LDT remap for PTI (1 pgd slot) and space for
37  * a hypervisor (16 slots). Choosing 16 slots for a hypervisor is arbitrary,
38  * but it's what Xen requires.
39  */
40 #define __PAGE_OFFSET_BASE_L5	_AC(0xff11000000000000, UL)
41 #define __PAGE_OFFSET_BASE_L4	_AC(0xffff888000000000, UL)
42 
43 #ifdef CONFIG_DYNAMIC_MEMORY_LAYOUT
44 #define __PAGE_OFFSET           page_offset_base
45 #else
46 #define __PAGE_OFFSET           __PAGE_OFFSET_BASE_L4
47 #endif /* CONFIG_DYNAMIC_MEMORY_LAYOUT */
48 
49 #define __START_KERNEL_map	_AC(0xffffffff80000000, UL)
50 
51 /* See Documentation/x86/x86_64/mm.rst for a description of the memory map. */
52 
53 #define __PHYSICAL_MASK_SHIFT	52
54 
55 #ifdef CONFIG_X86_5LEVEL
56 #define __VIRTUAL_MASK_SHIFT	(pgtable_l5_enabled() ? 56 : 47)
57 #else
58 #define __VIRTUAL_MASK_SHIFT	47
59 #endif
60 
61 /*
62  * Maximum kernel image size is limited to 1 GiB, due to the fixmap living
63  * in the next 1 GiB (see level2_kernel_pgt in arch/x86/kernel/head_64.S).
64  *
65  * On KASLR use 1 GiB by default, leaving 1 GiB for modules once the
66  * page tables are fully set up.
67  *
68  * If KASLR is disabled we can shrink it to 0.5 GiB and increase the size
69  * of the modules area to 1.5 GiB.
70  */
71 #ifdef CONFIG_RANDOMIZE_BASE
72 #define KERNEL_IMAGE_SIZE	(1024 * 1024 * 1024)
73 #else
74 #define KERNEL_IMAGE_SIZE	(512 * 1024 * 1024)
75 #endif
76 
77 #endif /* _ASM_X86_PAGE_64_DEFS_H */
78