root/arch/x86/include/asm/page_64_types.h

/* [<][>][^][v][top][bottom][index][help] */

INCLUDED FROM


   1 /* SPDX-License-Identifier: GPL-2.0 */
   2 #ifndef _ASM_X86_PAGE_64_DEFS_H
   3 #define _ASM_X86_PAGE_64_DEFS_H
   4 
   5 #ifndef __ASSEMBLY__
   6 #include <asm/kaslr.h>
   7 #endif
   8 
   9 #ifdef CONFIG_KASAN
  10 #define KASAN_STACK_ORDER 1
  11 #else
  12 #define KASAN_STACK_ORDER 0
  13 #endif
  14 
  15 #define THREAD_SIZE_ORDER       (2 + KASAN_STACK_ORDER)
  16 #define THREAD_SIZE  (PAGE_SIZE << THREAD_SIZE_ORDER)
  17 
  18 #define EXCEPTION_STACK_ORDER (0 + KASAN_STACK_ORDER)
  19 #define EXCEPTION_STKSZ (PAGE_SIZE << EXCEPTION_STACK_ORDER)
  20 
  21 #define IRQ_STACK_ORDER (2 + KASAN_STACK_ORDER)
  22 #define IRQ_STACK_SIZE (PAGE_SIZE << IRQ_STACK_ORDER)
  23 
  24 /*
  25  * The index for the tss.ist[] array. The hardware limit is 7 entries.
  26  */
  27 #define IST_INDEX_DF            0
  28 #define IST_INDEX_NMI           1
  29 #define IST_INDEX_DB            2
  30 #define IST_INDEX_MCE           3
  31 
  32 /*
  33  * Set __PAGE_OFFSET to the most negative possible address +
  34  * PGDIR_SIZE*17 (pgd slot 273).
  35  *
  36  * The gap is to allow a space for LDT remap for PTI (1 pgd slot) and space for
  37  * a hypervisor (16 slots). Choosing 16 slots for a hypervisor is arbitrary,
  38  * but it's what Xen requires.
  39  */
  40 #define __PAGE_OFFSET_BASE_L5   _AC(0xff11000000000000, UL)
  41 #define __PAGE_OFFSET_BASE_L4   _AC(0xffff888000000000, UL)
  42 
  43 #ifdef CONFIG_DYNAMIC_MEMORY_LAYOUT
  44 #define __PAGE_OFFSET           page_offset_base
  45 #else
  46 #define __PAGE_OFFSET           __PAGE_OFFSET_BASE_L4
  47 #endif /* CONFIG_DYNAMIC_MEMORY_LAYOUT */
  48 
  49 #define __START_KERNEL_map      _AC(0xffffffff80000000, UL)
  50 
  51 /* See Documentation/x86/x86_64/mm.rst for a description of the memory map. */
  52 
  53 #define __PHYSICAL_MASK_SHIFT   52
  54 
  55 #ifdef CONFIG_X86_5LEVEL
  56 #define __VIRTUAL_MASK_SHIFT    (pgtable_l5_enabled() ? 56 : 47)
  57 #else
  58 #define __VIRTUAL_MASK_SHIFT    47
  59 #endif
  60 
  61 /*
  62  * Maximum kernel image size is limited to 1 GiB, due to the fixmap living
  63  * in the next 1 GiB (see level2_kernel_pgt in arch/x86/kernel/head_64.S).
  64  *
  65  * On KASLR use 1 GiB by default, leaving 1 GiB for modules once the
  66  * page tables are fully set up.
  67  *
  68  * If KASLR is disabled we can shrink it to 0.5 GiB and increase the size
  69  * of the modules area to 1.5 GiB.
  70  */
  71 #ifdef CONFIG_RANDOMIZE_BASE
  72 #define KERNEL_IMAGE_SIZE       (1024 * 1024 * 1024)
  73 #else
  74 #define KERNEL_IMAGE_SIZE       (512 * 1024 * 1024)
  75 #endif
  76 
  77 #endif /* _ASM_X86_PAGE_64_DEFS_H */

/* [<][>][^][v][top][bottom][index][help] */