]>
Commit | Line | Data |
---|---|---|
b2441318 | 1 | /* SPDX-License-Identifier: GPL-2.0 */ |
51c78eb3 JF |
2 | #ifndef _ASM_X86_PAGE_64_DEFS_H |
3 | #define _ASM_X86_PAGE_64_DEFS_H | |
4 | ||
021182e5 TG |
5 | #ifndef __ASSEMBLY__ |
6 | #include <asm/kaslr.h> | |
7 | #endif | |
8 | ||
c420f167 AR |
9 | #ifdef CONFIG_KASAN |
10 | #define KASAN_STACK_ORDER 1 | |
11 | #else | |
12 | #define KASAN_STACK_ORDER 0 | |
13 | #endif | |
14 | ||
15 | #define THREAD_SIZE_ORDER (2 + KASAN_STACK_ORDER) | |
38e7c572 | 16 | #define THREAD_SIZE (PAGE_SIZE << THREAD_SIZE_ORDER) |
51c78eb3 JF |
17 | #define CURRENT_MASK (~(THREAD_SIZE - 1)) |
18 | ||
c420f167 | 19 | #define EXCEPTION_STACK_ORDER (0 + KASAN_STACK_ORDER) |
51c78eb3 JF |
20 | #define EXCEPTION_STKSZ (PAGE_SIZE << EXCEPTION_STACK_ORDER) |
21 | ||
22 | #define DEBUG_STACK_ORDER (EXCEPTION_STACK_ORDER + 1) | |
23 | #define DEBUG_STKSZ (PAGE_SIZE << DEBUG_STACK_ORDER) | |
24 | ||
c420f167 | 25 | #define IRQ_STACK_ORDER (2 + KASAN_STACK_ORDER) |
51c78eb3 JF |
26 | #define IRQ_STACK_SIZE (PAGE_SIZE << IRQ_STACK_ORDER) |
27 | ||
6f442be2 AL |
28 | #define DOUBLEFAULT_STACK 1 |
29 | #define NMI_STACK 2 | |
30 | #define DEBUG_STACK 3 | |
31 | #define MCE_STACK 4 | |
32 | #define N_EXCEPTION_STACKS 4 /* hw limit: 7 */ | |
51c78eb3 | 33 | |
51c78eb3 JF |
34 | /* |
35 | * Set __PAGE_OFFSET to the most negative possible address + | |
d52888aa KS |
36 | * PGDIR_SIZE*17 (pgd slot 273). |
37 | * | |
38 | * The gap is to allow a space for LDT remap for PTI (1 pgd slot) and space for | |
39 | * a hypervisor (16 slots). Choosing 16 slots for a hypervisor is arbitrary, | |
40 | * but it's what Xen requires. | |
51c78eb3 | 41 | */ |
d52888aa KS |
42 | #define __PAGE_OFFSET_BASE_L5 _AC(0xff11000000000000, UL) |
43 | #define __PAGE_OFFSET_BASE_L4 _AC(0xffff888000000000, UL) | |
4c7c4483 | 44 | |
eedb92ab | 45 | #ifdef CONFIG_DYNAMIC_MEMORY_LAYOUT |
021182e5 TG |
46 | #define __PAGE_OFFSET page_offset_base |
47 | #else | |
4fa5662b | 48 | #define __PAGE_OFFSET __PAGE_OFFSET_BASE_L4 |
eedb92ab | 49 | #endif /* CONFIG_DYNAMIC_MEMORY_LAYOUT */ |
51c78eb3 | 50 | |
51c78eb3 JF |
51 | #define __START_KERNEL_map _AC(0xffffffff80000000, UL) |
52 | ||
c898faf9 | 53 | /* See Documentation/x86/x86_64/mm.txt for a description of the memory map. */ |
b83ce5ee | 54 | |
4c7c4483 | 55 | #define __PHYSICAL_MASK_SHIFT 52 |
b83ce5ee KS |
56 | |
57 | #ifdef CONFIG_X86_5LEVEL | |
ed7588d5 | 58 | #define __VIRTUAL_MASK_SHIFT (pgtable_l5_enabled() ? 56 : 47) |
4c7c4483 | 59 | #else |
9063c61f | 60 | #define __VIRTUAL_MASK_SHIFT 47 |
4c7c4483 | 61 | #endif |
51c78eb3 JF |
62 | |
63 | /* | |
06d4a462 BH |
64 | * Maximum kernel image size is limited to 1 GiB, due to the fixmap living |
65 | * in the next 1 GiB (see level2_kernel_pgt in arch/x86/kernel/head_64.S). | |
66 | * | |
67 | * On KASLR use 1 GiB by default, leaving 1 GiB for modules once the | |
68 | * page tables are fully set up. | |
69 | * | |
70 | * If KASLR is disabled we can shrink it to 0.5 GiB and increase the size | |
71 | * of the modules area to 1.5 GiB. | |
51c78eb3 | 72 | */ |
06d4a462 | 73 | #ifdef CONFIG_RANDOMIZE_BASE |
e8581e3d | 74 | #define KERNEL_IMAGE_SIZE (1024 * 1024 * 1024) |
6145cfe3 | 75 | #else |
e8581e3d | 76 | #define KERNEL_IMAGE_SIZE (512 * 1024 * 1024) |
6145cfe3 | 77 | #endif |
51c78eb3 | 78 | |
51c78eb3 | 79 | #endif /* _ASM_X86_PAGE_64_DEFS_H */ |