blob: bb988a24db927d758f9120d45f90d1c160628790 [file] [log] [blame]
Greg Kroah-Hartmanb2441312017-11-01 15:07:57 +01001// SPDX-License-Identifier: GPL-2.0
Joe Perchesc767a542012-05-21 19:50:07 -07002#define pr_fmt(fmt) KBUILD_MODNAME ": " fmt
3
Suresh Siddha61c46282008-03-10 15:28:04 -07004#include <linux/errno.h>
5#include <linux/kernel.h>
6#include <linux/mm.h>
7#include <linux/smp.h>
Jeremy Fitzhardinge389d1fb2009-02-27 13:25:28 -08008#include <linux/prctl.h>
Suresh Siddha61c46282008-03-10 15:28:04 -07009#include <linux/slab.h>
10#include <linux/sched.h>
Ingo Molnar4c822692017-02-01 16:36:40 +010011#include <linux/sched/idle.h>
Ingo Molnarb17b0152017-02-08 18:51:35 +010012#include <linux/sched/debug.h>
Ingo Molnar29930022017-02-08 18:51:36 +010013#include <linux/sched/task.h>
Ingo Molnar68db0cf2017-02-08 18:51:37 +010014#include <linux/sched/task_stack.h>
Paul Gortmaker186f4362016-07-13 20:18:56 -040015#include <linux/init.h>
16#include <linux/export.h>
Peter Zijlstra7f424a82008-04-25 17:39:01 +020017#include <linux/pm.h>
Thomas Gleixner162a6882015-04-03 02:01:28 +020018#include <linux/tick.h>
Amerigo Wang9d62dcd2009-05-11 22:05:28 -040019#include <linux/random.h>
Avi Kivity7c68af62009-09-19 09:40:22 +030020#include <linux/user-return-notifier.h>
Andy Isaacson814e2c82009-12-08 00:29:42 -080021#include <linux/dmi.h>
22#include <linux/utsname.h>
Richard Weinberger90e24012012-03-25 23:00:04 +020023#include <linux/stackprotector.h>
24#include <linux/tick.h>
25#include <linux/cpuidle.h>
Arjan van de Ven61613522009-09-17 16:11:28 +020026#include <trace/events/power.h>
Frederic Weisbecker24f1e32c2009-09-09 19:22:48 +020027#include <linux/hw_breakpoint.h>
Borislav Petkov93789b32011-01-20 15:42:52 +010028#include <asm/cpu.h>
Ivan Vecerad3ec5ca2008-11-11 14:33:44 +010029#include <asm/apic.h>
Jaswinder Singh Rajput2c1b2842009-04-11 00:03:10 +053030#include <asm/syscalls.h>
Linus Torvalds7c0f6ba2016-12-24 11:46:01 -080031#include <linux/uaccess.h>
Len Brownb2531492014-01-15 00:37:34 -050032#include <asm/mwait.h>
Ingo Molnar78f7f1e2015-04-24 02:54:44 +020033#include <asm/fpu/internal.h>
K.Prasad66cb5912009-06-01 23:44:55 +053034#include <asm/debugreg.h>
Richard Weinberger90e24012012-03-25 23:00:04 +020035#include <asm/nmi.h>
Andy Lutomirski375074c2014-10-24 15:58:07 -070036#include <asm/tlbflush.h>
Ashok Raj8838eb62015-08-12 18:29:40 +020037#include <asm/mce.h>
Brian Gerst9fda6a02015-07-29 01:41:16 -040038#include <asm/vm86.h>
Brian Gerst7b32aea2016-08-13 12:38:18 -040039#include <asm/switch_to.h>
Andy Lutomirskib7ffc442017-02-20 08:56:14 -080040#include <asm/desc.h>
Kyle Hueye9ea1e72017-03-20 01:16:26 -070041#include <asm/prctl.h>
Richard Weinberger90e24012012-03-25 23:00:04 +020042
Thomas Gleixner45046892012-05-03 09:03:01 +000043/*
44 * per-CPU TSS segments. Threads are completely 'soft' on Linux,
45 * no more per-task TSS's. The TSS size is kept cacheline-aligned
46 * so they are allowed to end up in the .data..cacheline_aligned
47 * section. Since TSS's are completely CPU-local, we want them
48 * on exact cacheline boundaries, to eliminate cacheline ping-pong.
49 */
Andy Lutomirskid0a0de22015-03-05 19:19:06 -080050__visible DEFINE_PER_CPU_SHARED_ALIGNED(struct tss_struct, cpu_tss) = {
51 .x86_tss = {
Andy Lutomirski20bb8342017-11-02 00:59:13 -070052 /*
53 * .sp0 is only used when entering ring 0 from a lower
54 * privilege level. Since the init task never runs anything
55 * but ring 0 code, there is no need for a valid value here.
56 * Poison it.
57 */
58 .sp0 = (1UL << (BITS_PER_LONG-1)) + 1,
Andy Lutomirskid0a0de22015-03-05 19:19:06 -080059#ifdef CONFIG_X86_32
60 .ss0 = __KERNEL_DS,
61 .ss1 = __KERNEL_CS,
62 .io_bitmap_base = INVALID_IO_BITMAP_OFFSET,
63#endif
64 },
65#ifdef CONFIG_X86_32
66 /*
67 * Note that the .io_bitmap member must be extra-big. This is because
68 * the CPU will access an additional byte beyond the end of the IO
69 * permission bitmap. The extra byte must be all 1 bits, and must
70 * be within the limit.
71 */
72 .io_bitmap = { [0 ... IO_BITMAP_LONGS] = ~0 },
73#endif
Andy Lutomirski2a41aa42016-03-09 19:00:33 -080074#ifdef CONFIG_X86_32
75 .SYSENTER_stack_canary = STACK_END_MAGIC,
76#endif
Andy Lutomirskid0a0de22015-03-05 19:19:06 -080077};
Marc Dionnede71ad22015-05-04 15:16:44 -030078EXPORT_PER_CPU_SYMBOL(cpu_tss);
Thomas Gleixner45046892012-05-03 09:03:01 +000079
Andy Lutomirskib7ceaec2017-02-22 07:36:16 -080080DEFINE_PER_CPU(bool, __tss_limit_invalid);
81EXPORT_PER_CPU_SYMBOL_GPL(__tss_limit_invalid);
Andy Lutomirskib7ffc442017-02-20 08:56:14 -080082
Suresh Siddha55ccf3f2012-05-16 15:03:51 -070083/*
84 * this gets called so that we can store lazy state into memory and copy the
85 * current task into the new thread.
86 */
Suresh Siddha61c46282008-03-10 15:28:04 -070087int arch_dup_task_struct(struct task_struct *dst, struct task_struct *src)
88{
Ingo Molnar5aaeb5c2015-07-17 12:28:12 +020089 memcpy(dst, src, arch_task_struct_size);
Andy Lutomirski2459ee82015-10-30 22:42:46 -070090#ifdef CONFIG_VM86
91 dst->thread.vm86 = NULL;
92#endif
Oleg Nesterovf1853502014-09-02 19:57:23 +020093
Ingo Molnarc69e0982015-04-24 02:07:15 +020094 return fpu__copy(&dst->thread.fpu, &src->thread.fpu);
Suresh Siddha61c46282008-03-10 15:28:04 -070095}
Peter Zijlstra7f424a82008-04-25 17:39:01 +020096
Thomas Gleixner00dba562008-06-09 18:35:28 +020097/*
Jeremy Fitzhardinge389d1fb2009-02-27 13:25:28 -080098 * Free current thread data structures etc..
99 */
Jiri Slabye6464692016-05-20 17:00:20 -0700100void exit_thread(struct task_struct *tsk)
Jeremy Fitzhardinge389d1fb2009-02-27 13:25:28 -0800101{
Jiri Slabye6464692016-05-20 17:00:20 -0700102 struct thread_struct *t = &tsk->thread;
Thomas Gleixner250981e2009-03-16 13:07:21 +0100103 unsigned long *bp = t->io_bitmap_ptr;
Ingo Molnarca6787b2015-04-23 12:33:50 +0200104 struct fpu *fpu = &t->fpu;
Jeremy Fitzhardinge389d1fb2009-02-27 13:25:28 -0800105
Thomas Gleixner250981e2009-03-16 13:07:21 +0100106 if (bp) {
Andy Lutomirski24933b82015-03-05 19:19:05 -0800107 struct tss_struct *tss = &per_cpu(cpu_tss, get_cpu());
Jeremy Fitzhardinge389d1fb2009-02-27 13:25:28 -0800108
Jeremy Fitzhardinge389d1fb2009-02-27 13:25:28 -0800109 t->io_bitmap_ptr = NULL;
110 clear_thread_flag(TIF_IO_BITMAP);
111 /*
112 * Careful, clear this in the TSS too:
113 */
114 memset(tss->io_bitmap, 0xff, t->io_bitmap_max);
115 t->io_bitmap_max = 0;
116 put_cpu();
Thomas Gleixner250981e2009-03-16 13:07:21 +0100117 kfree(bp);
Jeremy Fitzhardinge389d1fb2009-02-27 13:25:28 -0800118 }
Suresh Siddha1dcc8d72012-05-16 15:03:54 -0700119
Brian Gerst9fda6a02015-07-29 01:41:16 -0400120 free_vm86(t);
121
Ingo Molnar50338612015-04-29 19:04:31 +0200122 fpu__drop(fpu);
Jeremy Fitzhardinge389d1fb2009-02-27 13:25:28 -0800123}
124
125void flush_thread(void)
126{
127 struct task_struct *tsk = current;
128
Frederic Weisbecker24f1e32c2009-09-09 19:22:48 +0200129 flush_ptrace_hw_breakpoint(tsk);
Jeremy Fitzhardinge389d1fb2009-02-27 13:25:28 -0800130 memset(tsk->thread.tls_array, 0, sizeof(tsk->thread.tls_array));
Oleg Nesterov110d7f72015-01-19 19:52:12 +0100131
Ingo Molnar04c8e012015-04-29 20:35:33 +0200132 fpu__clear(&tsk->thread.fpu);
Jeremy Fitzhardinge389d1fb2009-02-27 13:25:28 -0800133}
134
Jeremy Fitzhardinge389d1fb2009-02-27 13:25:28 -0800135void disable_TSC(void)
136{
137 preempt_disable();
138 if (!test_and_set_thread_flag(TIF_NOTSC))
139 /*
140 * Must flip the CPU state synchronously with
141 * TIF_NOTSC in the current running context.
142 */
Thomas Gleixner5a920152017-02-14 00:11:04 -0800143 cr4_set_bits(X86_CR4_TSD);
Jeremy Fitzhardinge389d1fb2009-02-27 13:25:28 -0800144 preempt_enable();
145}
146
Jeremy Fitzhardinge389d1fb2009-02-27 13:25:28 -0800147static void enable_TSC(void)
148{
149 preempt_disable();
150 if (test_and_clear_thread_flag(TIF_NOTSC))
151 /*
152 * Must flip the CPU state synchronously with
153 * TIF_NOTSC in the current running context.
154 */
Thomas Gleixner5a920152017-02-14 00:11:04 -0800155 cr4_clear_bits(X86_CR4_TSD);
Jeremy Fitzhardinge389d1fb2009-02-27 13:25:28 -0800156 preempt_enable();
157}
158
159int get_tsc_mode(unsigned long adr)
160{
161 unsigned int val;
162
163 if (test_thread_flag(TIF_NOTSC))
164 val = PR_TSC_SIGSEGV;
165 else
166 val = PR_TSC_ENABLE;
167
168 return put_user(val, (unsigned int __user *)adr);
169}
170
171int set_tsc_mode(unsigned int val)
172{
173 if (val == PR_TSC_SIGSEGV)
174 disable_TSC();
175 else if (val == PR_TSC_ENABLE)
176 enable_TSC();
177 else
178 return -EINVAL;
179
180 return 0;
181}
182
Kyle Hueye9ea1e72017-03-20 01:16:26 -0700183DEFINE_PER_CPU(u64, msr_misc_features_shadow);
184
185static void set_cpuid_faulting(bool on)
186{
187 u64 msrval;
188
189 msrval = this_cpu_read(msr_misc_features_shadow);
190 msrval &= ~MSR_MISC_FEATURES_ENABLES_CPUID_FAULT;
191 msrval |= (on << MSR_MISC_FEATURES_ENABLES_CPUID_FAULT_BIT);
192 this_cpu_write(msr_misc_features_shadow, msrval);
193 wrmsrl(MSR_MISC_FEATURES_ENABLES, msrval);
194}
195
196static void disable_cpuid(void)
197{
198 preempt_disable();
199 if (!test_and_set_thread_flag(TIF_NOCPUID)) {
200 /*
201 * Must flip the CPU state synchronously with
202 * TIF_NOCPUID in the current running context.
203 */
204 set_cpuid_faulting(true);
205 }
206 preempt_enable();
207}
208
209static void enable_cpuid(void)
210{
211 preempt_disable();
212 if (test_and_clear_thread_flag(TIF_NOCPUID)) {
213 /*
214 * Must flip the CPU state synchronously with
215 * TIF_NOCPUID in the current running context.
216 */
217 set_cpuid_faulting(false);
218 }
219 preempt_enable();
220}
221
222static int get_cpuid_mode(void)
223{
224 return !test_thread_flag(TIF_NOCPUID);
225}
226
227static int set_cpuid_mode(struct task_struct *task, unsigned long cpuid_enabled)
228{
229 if (!static_cpu_has(X86_FEATURE_CPUID_FAULT))
230 return -ENODEV;
231
232 if (cpuid_enabled)
233 enable_cpuid();
234 else
235 disable_cpuid();
236
237 return 0;
238}
239
240/*
241 * Called immediately after a successful exec.
242 */
243void arch_setup_new_exec(void)
244{
245 /* If cpuid was previously disabled for this task, re-enable it. */
246 if (test_thread_flag(TIF_NOCPUID))
247 enable_cpuid();
248}
249
Kyle Hueyaf8b3cd2017-02-14 00:11:02 -0800250static inline void switch_to_bitmap(struct tss_struct *tss,
251 struct thread_struct *prev,
252 struct thread_struct *next,
253 unsigned long tifp, unsigned long tifn)
Jeremy Fitzhardinge389d1fb2009-02-27 13:25:28 -0800254{
Kyle Hueyaf8b3cd2017-02-14 00:11:02 -0800255 if (tifn & _TIF_IO_BITMAP) {
Jeremy Fitzhardinge389d1fb2009-02-27 13:25:28 -0800256 /*
257 * Copy the relevant range of the IO bitmap.
258 * Normally this is 128 bytes or less:
259 */
260 memcpy(tss->io_bitmap, next->io_bitmap_ptr,
261 max(prev->io_bitmap_max, next->io_bitmap_max));
Andy Lutomirskib7ffc442017-02-20 08:56:14 -0800262 /*
263 * Make sure that the TSS limit is correct for the CPU
264 * to notice the IO bitmap.
265 */
Andy Lutomirskib7ceaec2017-02-22 07:36:16 -0800266 refresh_tss_limit();
Kyle Hueyaf8b3cd2017-02-14 00:11:02 -0800267 } else if (tifp & _TIF_IO_BITMAP) {
Jeremy Fitzhardinge389d1fb2009-02-27 13:25:28 -0800268 /*
269 * Clear any possible leftover bits:
270 */
271 memset(tss->io_bitmap, 0xff, prev->io_bitmap_max);
272 }
Kyle Hueyaf8b3cd2017-02-14 00:11:02 -0800273}
274
275void __switch_to_xtra(struct task_struct *prev_p, struct task_struct *next_p,
276 struct tss_struct *tss)
277{
278 struct thread_struct *prev, *next;
279 unsigned long tifp, tifn;
280
281 prev = &prev_p->thread;
282 next = &next_p->thread;
283
284 tifn = READ_ONCE(task_thread_info(next_p)->flags);
285 tifp = READ_ONCE(task_thread_info(prev_p)->flags);
286 switch_to_bitmap(tss, prev, next, tifp, tifn);
287
Avi Kivity7c68af62009-09-19 09:40:22 +0300288 propagate_user_return_notify(prev_p, next_p);
Kyle Hueyaf8b3cd2017-02-14 00:11:02 -0800289
Kyle Hueyb9894a22017-02-14 00:11:03 -0800290 if ((tifp & _TIF_BLOCKSTEP || tifn & _TIF_BLOCKSTEP) &&
291 arch_has_block_step()) {
292 unsigned long debugctl, msk;
Kyle Hueyaf8b3cd2017-02-14 00:11:02 -0800293
Kyle Hueyb9894a22017-02-14 00:11:03 -0800294 rdmsrl(MSR_IA32_DEBUGCTLMSR, debugctl);
Kyle Hueyaf8b3cd2017-02-14 00:11:02 -0800295 debugctl &= ~DEBUGCTLMSR_BTF;
Kyle Hueyb9894a22017-02-14 00:11:03 -0800296 msk = tifn & _TIF_BLOCKSTEP;
297 debugctl |= (msk >> TIF_BLOCKSTEP) << DEBUGCTLMSR_BTF_SHIFT;
298 wrmsrl(MSR_IA32_DEBUGCTLMSR, debugctl);
Kyle Hueyaf8b3cd2017-02-14 00:11:02 -0800299 }
300
Thomas Gleixner5a920152017-02-14 00:11:04 -0800301 if ((tifp ^ tifn) & _TIF_NOTSC)
Nadav Amit9d0b6232017-11-24 19:29:07 -0800302 cr4_toggle_bits_irqsoff(X86_CR4_TSD);
Kyle Hueye9ea1e72017-03-20 01:16:26 -0700303
304 if ((tifp ^ tifn) & _TIF_NOCPUID)
305 set_cpuid_faulting(!!(tifn & _TIF_NOCPUID));
Jeremy Fitzhardinge389d1fb2009-02-27 13:25:28 -0800306}
307
Brian Gerstdf59e7b2009-12-09 12:34:44 -0500308/*
Thomas Gleixner00dba562008-06-09 18:35:28 +0200309 * Idle related variables and functions
310 */
Thomas Renningerd1896042010-11-03 17:06:14 +0100311unsigned long boot_option_idle_override = IDLE_NO_OVERRIDE;
Thomas Gleixner00dba562008-06-09 18:35:28 +0200312EXPORT_SYMBOL(boot_option_idle_override);
313
Len Browna476bda2013-02-09 21:45:03 -0500314static void (*x86_idle)(void);
Thomas Gleixner00dba562008-06-09 18:35:28 +0200315
Richard Weinberger90e24012012-03-25 23:00:04 +0200316#ifndef CONFIG_SMP
317static inline void play_dead(void)
318{
319 BUG();
320}
321#endif
322
Thomas Gleixner7d1a9412013-03-21 22:50:03 +0100323void arch_cpu_idle_enter(void)
324{
Thomas Gleixner6a369582016-12-13 13:14:17 +0000325 tsc_verify_tsc_adjust(false);
Thomas Gleixner7d1a9412013-03-21 22:50:03 +0100326 local_touch_nmi();
Thomas Gleixner7d1a9412013-03-21 22:50:03 +0100327}
Richard Weinberger90e24012012-03-25 23:00:04 +0200328
Thomas Gleixner7d1a9412013-03-21 22:50:03 +0100329void arch_cpu_idle_dead(void)
330{
331 play_dead();
Richard Weinberger90e24012012-03-25 23:00:04 +0200332}
333
Thomas Gleixner00dba562008-06-09 18:35:28 +0200334/*
Thomas Gleixner7d1a9412013-03-21 22:50:03 +0100335 * Called from the generic idle code.
336 */
337void arch_cpu_idle(void)
338{
Nicolas Pitre16f8b052014-01-29 12:45:12 -0500339 x86_idle();
Thomas Gleixner7d1a9412013-03-21 22:50:03 +0100340}
341
342/*
343 * We use this if we don't have any better idle routine..
Thomas Gleixner00dba562008-06-09 18:35:28 +0200344 */
Chris Metcalf6727ad92016-10-07 17:02:55 -0700345void __cpuidle default_idle(void)
Thomas Gleixner00dba562008-06-09 18:35:28 +0200346{
Daniel Lezcano4d0e42c2012-10-25 18:13:11 +0200347 trace_cpu_idle_rcuidle(1, smp_processor_id());
Thomas Gleixner7d1a9412013-03-21 22:50:03 +0100348 safe_halt();
Daniel Lezcano4d0e42c2012-10-25 18:13:11 +0200349 trace_cpu_idle_rcuidle(PWR_EVENT_EXIT, smp_processor_id());
Thomas Gleixner00dba562008-06-09 18:35:28 +0200350}
Andy Whitcroft60b8b1d2011-06-14 12:45:10 -0700351#ifdef CONFIG_APM_MODULE
Thomas Gleixner00dba562008-06-09 18:35:28 +0200352EXPORT_SYMBOL(default_idle);
353#endif
354
Len Brown6a377dd2013-02-09 23:08:07 -0500355#ifdef CONFIG_XEN
356bool xen_set_default_idle(void)
Konrad Rzeszutek Wilke5fd47b2011-11-21 18:02:02 -0500357{
Len Browna476bda2013-02-09 21:45:03 -0500358 bool ret = !!x86_idle;
Konrad Rzeszutek Wilke5fd47b2011-11-21 18:02:02 -0500359
Len Browna476bda2013-02-09 21:45:03 -0500360 x86_idle = default_idle;
Konrad Rzeszutek Wilke5fd47b2011-11-21 18:02:02 -0500361
362 return ret;
363}
Len Brown6a377dd2013-02-09 23:08:07 -0500364#endif
Tom Lendackybba4ed02017-07-17 16:10:28 -0500365
Ivan Vecerad3ec5ca2008-11-11 14:33:44 +0100366void stop_this_cpu(void *dummy)
367{
368 local_irq_disable();
369 /*
370 * Remove this CPU:
371 */
Rusty Russell4f062892009-03-13 14:49:54 +1030372 set_cpu_online(smp_processor_id(), false);
Ivan Vecerad3ec5ca2008-11-11 14:33:44 +0100373 disable_local_APIC();
Ashok Raj8838eb62015-08-12 18:29:40 +0200374 mcheck_cpu_clear(this_cpu_ptr(&cpu_info));
Ivan Vecerad3ec5ca2008-11-11 14:33:44 +0100375
Tom Lendackybba4ed02017-07-17 16:10:28 -0500376 for (;;) {
377 /*
378 * Use wbinvd followed by hlt to stop the processor. This
379 * provides support for kexec on a processor that supports
380 * SME. With kexec, going from SME inactive to SME active
381 * requires clearing cache entries so that addresses without
382 * the encryption bit set don't corrupt the same physical
383 * address that has the encryption bit set when caches are
384 * flushed. To achieve this a wbinvd is performed followed by
385 * a hlt. Even if the processor is not in the kexec/SME
386 * scenario this only adds a wbinvd to a halting processor.
387 */
388 asm volatile("wbinvd; hlt" : : : "memory");
389 }
Peter Zijlstra7f424a82008-04-25 17:39:01 +0200390}
391
Thomas Gleixneraa276e12008-06-09 19:15:00 +0200392/*
Borislav Petkov07c94a32016-12-09 19:29:11 +0100393 * AMD Erratum 400 aware idle routine. We handle it the same way as C3 power
394 * states (local apic timer and TSC stop).
Thomas Gleixneraa276e12008-06-09 19:15:00 +0200395 */
Len Brown02c68a02011-04-01 16:59:53 -0400396static void amd_e400_idle(void)
Thomas Gleixneraa276e12008-06-09 19:15:00 +0200397{
Borislav Petkov07c94a32016-12-09 19:29:11 +0100398 /*
399 * We cannot use static_cpu_has_bug() here because X86_BUG_AMD_APIC_C1E
400 * gets set after static_cpu_has() places have been converted via
401 * alternatives.
402 */
403 if (!boot_cpu_has_bug(X86_BUG_AMD_APIC_C1E)) {
404 default_idle();
405 return;
Thomas Gleixneraa276e12008-06-09 19:15:00 +0200406 }
407
Borislav Petkov07c94a32016-12-09 19:29:11 +0100408 tick_broadcast_enter();
Thomas Gleixneraa276e12008-06-09 19:15:00 +0200409
Borislav Petkov07c94a32016-12-09 19:29:11 +0100410 default_idle();
Thomas Gleixner0beefa22008-06-17 09:12:03 +0200411
Borislav Petkov07c94a32016-12-09 19:29:11 +0100412 /*
413 * The switch back from broadcast mode needs to be called with
414 * interrupts disabled.
415 */
416 local_irq_disable();
417 tick_broadcast_exit();
418 local_irq_enable();
Thomas Gleixneraa276e12008-06-09 19:15:00 +0200419}
420
Len Brownb2531492014-01-15 00:37:34 -0500421/*
422 * Intel Core2 and older machines prefer MWAIT over HALT for C1.
423 * We can't rely on cpuidle installing MWAIT, because it will not load
424 * on systems that support only C1 -- so the boot default must be MWAIT.
425 *
426 * Some AMD machines are the opposite, they depend on using HALT.
427 *
428 * So for default C1, which is used during boot until cpuidle loads,
429 * use MWAIT-C1 on Intel HW that has it, else use HALT.
430 */
431static int prefer_mwait_c1_over_halt(const struct cpuinfo_x86 *c)
432{
433 if (c->x86_vendor != X86_VENDOR_INTEL)
434 return 0;
435
Peter Zijlstra08e237f2016-07-18 11:41:10 -0700436 if (!cpu_has(c, X86_FEATURE_MWAIT) || static_cpu_has_bug(X86_BUG_MONITOR))
Len Brownb2531492014-01-15 00:37:34 -0500437 return 0;
438
439 return 1;
440}
441
442/*
Huang Rui0fb03282015-05-26 10:28:09 +0200443 * MONITOR/MWAIT with no hints, used for default C1 state. This invokes MWAIT
444 * with interrupts enabled and no flags, which is backwards compatible with the
445 * original MWAIT implementation.
Len Brownb2531492014-01-15 00:37:34 -0500446 */
Chris Metcalf6727ad92016-10-07 17:02:55 -0700447static __cpuidle void mwait_idle(void)
Len Brownb2531492014-01-15 00:37:34 -0500448{
Mike Galbraithf8e617f2014-01-18 17:14:44 +0100449 if (!current_set_polling_and_test()) {
Jisheng Zhange43d0182015-08-20 12:54:39 +0800450 trace_cpu_idle_rcuidle(1, smp_processor_id());
Mike Galbraithf8e617f2014-01-18 17:14:44 +0100451 if (this_cpu_has(X86_BUG_CLFLUSH_MONITOR)) {
Michael S. Tsirkinca598092016-01-28 19:02:51 +0200452 mb(); /* quirk */
Len Brownb2531492014-01-15 00:37:34 -0500453 clflush((void *)&current_thread_info()->flags);
Michael S. Tsirkinca598092016-01-28 19:02:51 +0200454 mb(); /* quirk */
Mike Galbraithf8e617f2014-01-18 17:14:44 +0100455 }
Len Brownb2531492014-01-15 00:37:34 -0500456
457 __monitor((void *)&current_thread_info()->flags, 0, 0);
Len Brownb2531492014-01-15 00:37:34 -0500458 if (!need_resched())
459 __sti_mwait(0, 0);
460 else
461 local_irq_enable();
Jisheng Zhange43d0182015-08-20 12:54:39 +0800462 trace_cpu_idle_rcuidle(PWR_EVENT_EXIT, smp_processor_id());
Mike Galbraithf8e617f2014-01-18 17:14:44 +0100463 } else {
Len Brownb2531492014-01-15 00:37:34 -0500464 local_irq_enable();
Mike Galbraithf8e617f2014-01-18 17:14:44 +0100465 }
466 __current_clr_polling();
Len Brownb2531492014-01-15 00:37:34 -0500467}
468
Paul Gortmaker148f9bb2013-06-18 18:23:59 -0400469void select_idle_routine(const struct cpuinfo_x86 *c)
Peter Zijlstra7f424a82008-04-25 17:39:01 +0200470{
Ingo Molnar3e5095d2009-01-27 17:07:08 +0100471#ifdef CONFIG_SMP
Thomas Gleixner7d1a9412013-03-21 22:50:03 +0100472 if (boot_option_idle_override == IDLE_POLL && smp_num_siblings > 1)
Joe Perchesc767a542012-05-21 19:50:07 -0700473 pr_warn_once("WARNING: polling idle and HT enabled, performance may degrade\n");
Peter Zijlstra7f424a82008-04-25 17:39:01 +0200474#endif
Thomas Gleixner7d1a9412013-03-21 22:50:03 +0100475 if (x86_idle || boot_option_idle_override == IDLE_POLL)
Thomas Gleixner6ddd2a22008-06-09 16:59:53 +0200476 return;
477
Thomas Gleixner3344ed32016-12-09 19:29:09 +0100478 if (boot_cpu_has_bug(X86_BUG_AMD_E400)) {
Joe Perchesc767a542012-05-21 19:50:07 -0700479 pr_info("using AMD E400 aware idle routine\n");
Len Browna476bda2013-02-09 21:45:03 -0500480 x86_idle = amd_e400_idle;
Len Brownb2531492014-01-15 00:37:34 -0500481 } else if (prefer_mwait_c1_over_halt(c)) {
482 pr_info("using mwait in idle threads\n");
483 x86_idle = mwait_idle;
Thomas Gleixner6ddd2a22008-06-09 16:59:53 +0200484 } else
Len Browna476bda2013-02-09 21:45:03 -0500485 x86_idle = default_idle;
Peter Zijlstra7f424a82008-04-25 17:39:01 +0200486}
487
Borislav Petkov07c94a32016-12-09 19:29:11 +0100488void amd_e400_c1e_apic_setup(void)
Rusty Russell30e1e6d2009-03-17 14:50:34 +1030489{
Borislav Petkov07c94a32016-12-09 19:29:11 +0100490 if (boot_cpu_has_bug(X86_BUG_AMD_APIC_C1E)) {
491 pr_info("Switch to broadcast mode on CPU%d\n", smp_processor_id());
492 local_irq_disable();
493 tick_broadcast_force();
494 local_irq_enable();
495 }
Rusty Russell30e1e6d2009-03-17 14:50:34 +1030496}
497
Thomas Gleixnere7ff3a42016-12-09 19:29:10 +0100498void __init arch_post_acpi_subsys_init(void)
499{
500 u32 lo, hi;
501
502 if (!boot_cpu_has_bug(X86_BUG_AMD_E400))
503 return;
504
505 /*
506 * AMD E400 detection needs to happen after ACPI has been enabled. If
507 * the machine is affected K8_INTP_C1E_ACTIVE_MASK bits are set in
508 * MSR_K8_INT_PENDING_MSG.
509 */
510 rdmsr(MSR_K8_INT_PENDING_MSG, lo, hi);
511 if (!(lo & K8_INTP_C1E_ACTIVE_MASK))
512 return;
513
514 boot_cpu_set_bug(X86_BUG_AMD_APIC_C1E);
515
516 if (!boot_cpu_has(X86_FEATURE_NONSTOP_TSC))
517 mark_tsc_unstable("TSC halt in AMD C1E");
518 pr_info("System has AMD C1E enabled\n");
519}
520
Peter Zijlstra7f424a82008-04-25 17:39:01 +0200521static int __init idle_setup(char *str)
522{
Cyrill Gorcunovab6bc3e2008-07-05 15:53:36 +0400523 if (!str)
524 return -EINVAL;
525
Peter Zijlstra7f424a82008-04-25 17:39:01 +0200526 if (!strcmp(str, "poll")) {
Joe Perchesc767a542012-05-21 19:50:07 -0700527 pr_info("using polling idle threads\n");
Thomas Renningerd1896042010-11-03 17:06:14 +0100528 boot_option_idle_override = IDLE_POLL;
Thomas Gleixner7d1a9412013-03-21 22:50:03 +0100529 cpu_idle_poll_ctrl(true);
Thomas Renningerd1896042010-11-03 17:06:14 +0100530 } else if (!strcmp(str, "halt")) {
Zhao Yakuic1e3b372008-06-24 17:58:53 +0800531 /*
532 * When the boot option of idle=halt is added, halt is
533 * forced to be used for CPU idle. In such case CPU C2/C3
534 * won't be used again.
535 * To continue to load the CPU idle driver, don't touch
536 * the boot_option_idle_override.
537 */
Len Browna476bda2013-02-09 21:45:03 -0500538 x86_idle = default_idle;
Thomas Renningerd1896042010-11-03 17:06:14 +0100539 boot_option_idle_override = IDLE_HALT;
Zhao Yakuida5e09a2008-06-24 18:01:09 +0800540 } else if (!strcmp(str, "nomwait")) {
541 /*
542 * If the boot option of "idle=nomwait" is added,
543 * it means that mwait will be disabled for CPU C2/C3
544 * states. In such case it won't touch the variable
545 * of boot_option_idle_override.
546 */
Thomas Renningerd1896042010-11-03 17:06:14 +0100547 boot_option_idle_override = IDLE_NOMWAIT;
Zhao Yakuic1e3b372008-06-24 17:58:53 +0800548 } else
Peter Zijlstra7f424a82008-04-25 17:39:01 +0200549 return -1;
550
Peter Zijlstra7f424a82008-04-25 17:39:01 +0200551 return 0;
552}
553early_param("idle", idle_setup);
554
Amerigo Wang9d62dcd2009-05-11 22:05:28 -0400555unsigned long arch_align_stack(unsigned long sp)
556{
557 if (!(current->personality & ADDR_NO_RANDOMIZE) && randomize_va_space)
558 sp -= get_random_int() % 8192;
559 return sp & ~0xf;
560}
561
562unsigned long arch_randomize_brk(struct mm_struct *mm)
563{
Jason Cooper9c6f0902016-10-11 13:53:56 -0700564 return randomize_page(mm->brk, 0x02000000);
Amerigo Wang9d62dcd2009-05-11 22:05:28 -0400565}
566
Thomas Gleixner7ba78052015-09-30 08:38:23 +0000567/*
568 * Called from fs/proc with a reference on @p to find the function
569 * which called into schedule(). This needs to be done carefully
570 * because the task might wake up and we might look at a stack
571 * changing under us.
572 */
573unsigned long get_wchan(struct task_struct *p)
574{
Andy Lutomirski74327a32016-09-15 22:45:46 -0700575 unsigned long start, bottom, top, sp, fp, ip, ret = 0;
Thomas Gleixner7ba78052015-09-30 08:38:23 +0000576 int count = 0;
577
578 if (!p || p == current || p->state == TASK_RUNNING)
579 return 0;
580
Andy Lutomirski74327a32016-09-15 22:45:46 -0700581 if (!try_get_task_stack(p))
582 return 0;
583
Thomas Gleixner7ba78052015-09-30 08:38:23 +0000584 start = (unsigned long)task_stack_page(p);
585 if (!start)
Andy Lutomirski74327a32016-09-15 22:45:46 -0700586 goto out;
Thomas Gleixner7ba78052015-09-30 08:38:23 +0000587
588 /*
589 * Layout of the stack page:
590 *
591 * ----------- topmax = start + THREAD_SIZE - sizeof(unsigned long)
592 * PADDING
593 * ----------- top = topmax - TOP_OF_KERNEL_STACK_PADDING
594 * stack
Andy Lutomirski15f4eae2016-09-13 14:29:25 -0700595 * ----------- bottom = start
Thomas Gleixner7ba78052015-09-30 08:38:23 +0000596 *
597 * The tasks stack pointer points at the location where the
598 * framepointer is stored. The data on the stack is:
599 * ... IP FP ... IP FP
600 *
601 * We need to read FP and IP, so we need to adjust the upper
602 * bound by another unsigned long.
603 */
604 top = start + THREAD_SIZE - TOP_OF_KERNEL_STACK_PADDING;
605 top -= 2 * sizeof(unsigned long);
Andy Lutomirski15f4eae2016-09-13 14:29:25 -0700606 bottom = start;
Thomas Gleixner7ba78052015-09-30 08:38:23 +0000607
608 sp = READ_ONCE(p->thread.sp);
609 if (sp < bottom || sp > top)
Andy Lutomirski74327a32016-09-15 22:45:46 -0700610 goto out;
Thomas Gleixner7ba78052015-09-30 08:38:23 +0000611
Brian Gerst7b32aea2016-08-13 12:38:18 -0400612 fp = READ_ONCE_NOCHECK(((struct inactive_task_frame *)sp)->bp);
Thomas Gleixner7ba78052015-09-30 08:38:23 +0000613 do {
614 if (fp < bottom || fp > top)
Andy Lutomirski74327a32016-09-15 22:45:46 -0700615 goto out;
Andrey Ryabininf7d27c32015-10-19 11:37:18 +0300616 ip = READ_ONCE_NOCHECK(*(unsigned long *)(fp + sizeof(unsigned long)));
Andy Lutomirski74327a32016-09-15 22:45:46 -0700617 if (!in_sched_functions(ip)) {
618 ret = ip;
619 goto out;
620 }
Andrey Ryabininf7d27c32015-10-19 11:37:18 +0300621 fp = READ_ONCE_NOCHECK(*(unsigned long *)fp);
Thomas Gleixner7ba78052015-09-30 08:38:23 +0000622 } while (count++ < 16 && p->state != TASK_RUNNING);
Andy Lutomirski74327a32016-09-15 22:45:46 -0700623
624out:
625 put_task_stack(p);
626 return ret;
Thomas Gleixner7ba78052015-09-30 08:38:23 +0000627}
Kyle Hueyb0b9b012017-03-20 01:16:23 -0700628
629long do_arch_prctl_common(struct task_struct *task, int option,
630 unsigned long cpuid_enabled)
631{
Kyle Hueye9ea1e72017-03-20 01:16:26 -0700632 switch (option) {
633 case ARCH_GET_CPUID:
634 return get_cpuid_mode();
635 case ARCH_SET_CPUID:
636 return set_cpuid_mode(task, cpuid_enabled);
637 }
638
Kyle Hueyb0b9b012017-03-20 01:16:23 -0700639 return -EINVAL;
640}