1/* SPDX-License-Identifier: GPL-2.0 */
2#ifndef _ASM_X86_PAGE_64_DEFS_H
3#define _ASM_X86_PAGE_64_DEFS_H
4
5#ifndef __ASSEMBLY__
6#include <asm/kaslr.h>
7#endif
8
9#ifdef CONFIG_KASAN
10#define KASAN_STACK_ORDER 1
11#else
12#define KASAN_STACK_ORDER 0
13#endif
14
15#define THREAD_SIZE_ORDER (2 + KASAN_STACK_ORDER)
16#define THREAD_SIZE (PAGE_SIZE << THREAD_SIZE_ORDER)
17#define CURRENT_MASK (~(THREAD_SIZE - 1))
18
19#define EXCEPTION_STACK_ORDER (0 + KASAN_STACK_ORDER)
20#define EXCEPTION_STKSZ (PAGE_SIZE << EXCEPTION_STACK_ORDER)
21
22#define DEBUG_STACK_ORDER (EXCEPTION_STACK_ORDER + 1)
23#define DEBUG_STKSZ (PAGE_SIZE << DEBUG_STACK_ORDER)
24
25#define IRQ_STACK_ORDER (2 + KASAN_STACK_ORDER)
26#define IRQ_STACK_SIZE (PAGE_SIZE << IRQ_STACK_ORDER)
27
28#define DOUBLEFAULT_STACK 1
29#define NMI_STACK 2
30#define DEBUG_STACK 3
31#define MCE_STACK 4
32#define N_EXCEPTION_STACKS 4 /* hw limit: 7 */
33
34/*
35 * Set __PAGE_OFFSET to the most negative possible address +
36 * PGDIR_SIZE*17 (pgd slot 273).
37 *
38 * The gap is to allow a space for LDT remap for PTI (1 pgd slot) and space for
39 * a hypervisor (16 slots). Choosing 16 slots for a hypervisor is arbitrary,
40 * but it's what Xen requires.
41 */
42#define __PAGE_OFFSET_BASE_L5 _AC(0xff11000000000000, UL)
43#define __PAGE_OFFSET_BASE_L4 _AC(0xffff888000000000, UL)
44
45#ifdef CONFIG_DYNAMIC_MEMORY_LAYOUT
46#define __PAGE_OFFSET page_offset_base
47#else
48#define __PAGE_OFFSET __PAGE_OFFSET_BASE_L4
49#endif /* CONFIG_DYNAMIC_MEMORY_LAYOUT */
50
51#define __START_KERNEL_map _AC(0xffffffff80000000, UL)
52
53/* See Documentation/x86/x86_64/mm.txt for a description of the memory map. */
54
55#define __PHYSICAL_MASK_SHIFT 52
56
57#ifdef CONFIG_X86_5LEVEL
58#define __VIRTUAL_MASK_SHIFT (pgtable_l5_enabled() ? 56 : 47)
59#else
60#define __VIRTUAL_MASK_SHIFT 47
61#endif
62
63/*
64 * Maximum kernel image size is limited to 1 GiB, due to the fixmap living
65 * in the next 1 GiB (see level2_kernel_pgt in arch/x86/kernel/head_64.S).
66 *
67 * On KASLR use 1 GiB by default, leaving 1 GiB for modules once the
68 * page tables are fully set up.
69 *
70 * If KASLR is disabled we can shrink it to 0.5 GiB and increase the size
71 * of the modules area to 1.5 GiB.
72 */
73#ifdef CONFIG_RANDOMIZE_BASE
74#define KERNEL_IMAGE_SIZE (1024 * 1024 * 1024)
75#else
76#define KERNEL_IMAGE_SIZE (512 * 1024 * 1024)
77#endif
78
79#endif /* _ASM_X86_PAGE_64_DEFS_H */
80