x86, atomic64: In selftest, distinguish x86-64 from 586+
[deliverable/linux.git] / arch / x86 / include / asm / alternative.h
CommitLineData
1965aae3
PA
1#ifndef _ASM_X86_ALTERNATIVE_H
2#define _ASM_X86_ALTERNATIVE_H
6b592570
PA
3
4#include <linux/types.h>
5#include <linux/stddef.h>
edc953fa 6#include <linux/stringify.h>
6b592570
PA
7#include <asm/asm.h>
8
9/*
10 * Alternative inline assembly for SMP.
11 *
12 * The LOCK_PREFIX macro defined here replaces the LOCK and
13 * LOCK_PREFIX macros used everywhere in the source tree.
14 *
15 * SMP alternatives use the same data structures as the other
16 * alternatives and the X86_FEATURE_UP flag to indicate the case of a
17 * UP system running a SMP kernel. The existing apply_alternatives()
18 * works fine for patching a SMP kernel for UP.
19 *
20 * The SMP alternative tables can be kept after boot and contain both
21 * UP and SMP versions of the instructions to allow switching back to
22 * SMP at runtime, when hotplugging in a new CPU, which is especially
23 * useful in virtualized environments.
24 *
25 * The very common lock prefix is handled as special case in a
26 * separate table which is a pure address list without replacement ptr
27 * and size information. That keeps the table sizes small.
28 */
29
30#ifdef CONFIG_SMP
b3ac891b 31#define LOCK_PREFIX_HERE \
6b592570
PA
32 ".section .smp_locks,\"a\"\n" \
33 _ASM_ALIGN "\n" \
b3ac891b 34 _ASM_PTR "671f\n" /* address */ \
6b592570 35 ".previous\n" \
b3ac891b
LB
36 "671:"
37
38#define LOCK_PREFIX LOCK_PREFIX_HERE "\n\tlock; "
6b592570
PA
39
40#else /* ! CONFIG_SMP */
41#define LOCK_PREFIX ""
42#endif
43
44/* This must be included *after* the definition of LOCK_PREFIX */
45#include <asm/cpufeature.h>
46
47struct alt_instr {
48 u8 *instr; /* original instruction */
49 u8 *replacement;
50 u8 cpuid; /* cpuid bit set for replacement */
51 u8 instrlen; /* length of original instruction */
52 u8 replacementlen; /* length of new instruction, <= instrlen */
53 u8 pad1;
54#ifdef CONFIG_X86_64
55 u32 pad2;
56#endif
57};
58
59extern void alternative_instructions(void);
60extern void apply_alternatives(struct alt_instr *start, struct alt_instr *end);
61
62struct module;
63
64#ifdef CONFIG_SMP
65extern void alternatives_smp_module_add(struct module *mod, char *name,
66 void *locks, void *locks_end,
67 void *text, void *text_end);
68extern void alternatives_smp_module_del(struct module *mod);
69extern void alternatives_smp_switch(int smp);
70#else
71static inline void alternatives_smp_module_add(struct module *mod, char *name,
2ac1ea7c
JP
72 void *locks, void *locks_end,
73 void *text, void *text_end) {}
6b592570
PA
74static inline void alternatives_smp_module_del(struct module *mod) {}
75static inline void alternatives_smp_switch(int smp) {}
76#endif /* CONFIG_SMP */
77
edc953fa
MD
78/* alternative assembly primitive: */
79#define ALTERNATIVE(oldinstr, newinstr, feature) \
80 \
81 "661:\n\t" oldinstr "\n662:\n" \
82 ".section .altinstructions,\"a\"\n" \
83 _ASM_ALIGN "\n" \
84 _ASM_PTR "661b\n" /* label */ \
85 _ASM_PTR "663f\n" /* new instruction */ \
86 " .byte " __stringify(feature) "\n" /* feature bit */ \
87 " .byte 662b-661b\n" /* sourcelen */ \
88 " .byte 664f-663f\n" /* replacementlen */ \
01be50a3 89 " .byte 0xff + (664f-663f) - (662b-661b)\n" /* rlen <= slen */ \
edc953fa
MD
90 ".previous\n" \
91 ".section .altinstr_replacement, \"ax\"\n" \
92 "663:\n\t" newinstr "\n664:\n" /* replacement */ \
93 ".previous"
94
6b592570
PA
95/*
96 * Alternative instructions for different CPU types or capabilities.
97 *
98 * This allows to use optimized instructions even on generic binary
99 * kernels.
100 *
101 * length of oldinstr must be longer or equal the length of newinstr
102 * It can be padded with nops as needed.
103 *
104 * For non barrier like inlines please define new variants
105 * without volatile and memory clobber.
106 */
107#define alternative(oldinstr, newinstr, feature) \
edc953fa 108 asm volatile (ALTERNATIVE(oldinstr, newinstr, feature) : : : "memory")
6b592570
PA
109
110/*
111 * Alternative inline assembly with input.
112 *
113 * Pecularities:
114 * No memory clobber here.
115 * Argument numbers start with 1.
116 * Best is to use constraints that are fixed size (like (%1) ... "r")
117 * If you use variable sized constraints like "m" or "g" in the
118 * replacement make sure to pad to the worst case length.
edc953fa 119 * Leaving an unused argument 0 to keep API compatibility.
6b592570
PA
120 */
121#define alternative_input(oldinstr, newinstr, feature, input...) \
edc953fa
MD
122 asm volatile (ALTERNATIVE(oldinstr, newinstr, feature) \
123 : : "i" (0), ## input)
6b592570
PA
124
125/* Like alternative_input, but with a single output argument */
126#define alternative_io(oldinstr, newinstr, feature, output, input...) \
edc953fa
MD
127 asm volatile (ALTERNATIVE(oldinstr, newinstr, feature) \
128 : output : "i" (0), ## input)
6b592570 129
1b1d9258
JB
130/* Like alternative_io, but for replacing a direct call with another one. */
131#define alternative_call(oldfunc, newfunc, feature, output, input...) \
132 asm volatile (ALTERNATIVE("call %P[old]", "call %P[new]", feature) \
133 : output : [old] "i" (oldfunc), [new] "i" (newfunc), ## input)
134
6b592570
PA
135/*
136 * use this macro(s) if you need more than one output parameter
137 * in alternative_io
138 */
1b1d9258 139#define ASM_OUTPUT2(a...) a
6b592570
PA
140
141struct paravirt_patch_site;
142#ifdef CONFIG_PARAVIRT
143void apply_paravirt(struct paravirt_patch_site *start,
144 struct paravirt_patch_site *end);
96a388de 145#else
2ac1ea7c
JP
146static inline void apply_paravirt(struct paravirt_patch_site *start,
147 struct paravirt_patch_site *end)
6b592570
PA
148{}
149#define __parainstructions NULL
150#define __parainstructions_end NULL
96a388de 151#endif
6b592570 152
e587cadd
MD
153/*
154 * Clear and restore the kernel write-protection flag on the local CPU.
155 * Allows the kernel to edit read-only pages.
156 * Side-effect: any interrupt handler running between save and restore will have
157 * the ability to write to read-only pages.
158 *
159 * Warning:
160 * Code patching in the UP case is safe if NMIs and MCE handlers are stopped and
161 * no thread can be preempted in the instructions being modified (no iret to an
162 * invalid instruction possible) or if the instructions are changed from a
163 * consistent state to another consistent state atomically.
164 * More care must be taken when modifying code in the SMP case because of
165 * Intel's errata.
166 * On the local CPU you need to be protected again NMI or MCE handlers seeing an
167 * inconsistent instruction while you patch.
e587cadd 168 */
e587cadd 169extern void *text_poke(void *addr, const void *opcode, size_t len);
6b592570 170
1965aae3 171#endif /* _ASM_X86_ALTERNATIVE_H */
This page took 0.209215 seconds and 5 git commands to generate.