]> git.proxmox.com Git - mirror_ubuntu-bionic-kernel.git/blame - arch/x86/include/asm/thread_info.h
x86/msr-index: Cleanup bit defines
[mirror_ubuntu-bionic-kernel.git] / arch / x86 / include / asm / thread_info.h
CommitLineData
b2441318 1/* SPDX-License-Identifier: GPL-2.0 */
2052e8d4
CL
2/* thread_info.h: low-level thread information
3 *
4 * Copyright (C) 2002 David Howells (dhowells@redhat.com)
5 * - Incorporating suggestions made by Linus Torvalds and Dave Miller
6 */
7
1965aae3
PA
8#ifndef _ASM_X86_THREAD_INFO_H
9#define _ASM_X86_THREAD_INFO_H
2052e8d4 10
2052e8d4
CL
11#include <linux/compiler.h>
12#include <asm/page.h>
198d208d 13#include <asm/percpu.h>
12a638e1
CL
14#include <asm/types.h>
15
3ee4298f
AL
16/*
17 * TOP_OF_KERNEL_STACK_PADDING is a number of unused bytes that we
18 * reserve at the top of the kernel stack. We do it because of a nasty
19 * 32-bit corner case. On x86_32, the hardware stack frame is
20 * variable-length. Except for vm86 mode, struct pt_regs assumes a
21 * maximum-length frame. If we enter from CPL 0, the top 8 bytes of
22 * pt_regs don't actually exist. Ordinarily this doesn't matter, but it
23 * does in at least one case:
24 *
25 * If we take an NMI early enough in SYSENTER, then we can end up with
26 * pt_regs that extends above sp0. On the way out, in the espfix code,
27 * we can read the saved SS value, but that value will be above sp0.
28 * Without this offset, that can result in a page fault. (We are
29 * careful that, in this case, the value we read doesn't matter.)
30 *
5ed92a8a
BG
31 * In vm86 mode, the hardware frame is much longer still, so add 16
32 * bytes to make room for the real-mode segments.
3ee4298f
AL
33 *
34 * x86_64 has a fixed-length stack frame.
35 */
36#ifdef CONFIG_X86_32
5ed92a8a
BG
37# ifdef CONFIG_VM86
38# define TOP_OF_KERNEL_STACK_PADDING 16
39# else
40# define TOP_OF_KERNEL_STACK_PADDING 8
41# endif
3ee4298f
AL
42#else
43# define TOP_OF_KERNEL_STACK_PADDING 0
44#endif
45
2052e8d4
CL
46/*
47 * low level task data that entry.S needs immediate access to
48 * - this struct should fit entirely inside of one cache line
49 * - this struct shares the supervisor stack pages
2052e8d4
CL
50 */
51#ifndef __ASSEMBLY__
006c484b 52struct task_struct;
cd4d09ec 53#include <asm/cpufeature.h>
60063497 54#include <linux/atomic.h>
2052e8d4 55
c8061485
HC
56struct thread_info {
57 unsigned long flags; /* low level flags */
6c46cb88 58 u32 status; /* thread synchronous flags */
c8061485
HC
59};
60
61#define INIT_THREAD_INFO(tsk) \
62{ \
63 .flags = 0, \
64}
65
3351cc03
CL
66#define init_stack (init_thread_union.stack)
67
2052e8d4
CL
68#else /* !__ASSEMBLY__ */
69
70#include <asm/asm-offsets.h>
71
72#endif
73
e57549b0
CL
74/*
75 * thread information flags
76 * - these are process state flags that various assembly files
77 * may need to access
e57549b0
CL
78 */
79#define TIF_SYSCALL_TRACE 0 /* syscall trace active */
59e52130 80#define TIF_NOTIFY_RESUME 1 /* callback before returning to user */
e57549b0
CL
81#define TIF_SIGPENDING 2 /* signal pending */
82#define TIF_NEED_RESCHED 3 /* rescheduling necessary */
83#define TIF_SINGLESTEP 4 /* reenable singlestep on user return*/
1f780d78 84#define TIF_SSBD 5 /* Speculative store bypass disable */
e57549b0 85#define TIF_SYSCALL_EMU 6 /* syscall emulation active */
e57549b0
CL
86#define TIF_SYSCALL_AUDIT 7 /* syscall auditing active */
87#define TIF_SECCOMP 8 /* secure computing */
e0b04783 88#define TIF_SPEC_IB 9 /* Indirect branch speculation mitigation */
801d6893 89#define TIF_SPEC_FORCE_UPDATE 10 /* Force speculation MSR update in context switch */
7c68af6e 90#define TIF_USER_RETURN_NOTIFY 11 /* notify kernel of userspace return */
0326f5a9 91#define TIF_UPROBE 12 /* breakpointed or singlestepping */
afb94c9e 92#define TIF_PATCH_PENDING 13 /* pending live patching update */
e9ea1e7f 93#define TIF_NOCPUID 15 /* CPUID is not accessible in userland */
e57549b0 94#define TIF_NOTSC 16 /* TSC is not accessible in userland */
6bd33008 95#define TIF_IA32 17 /* IA32 compatibility process */
bf5a3c13 96#define TIF_NOHZ 19 /* in adaptive nohz mode */
0ddc9324 97#define TIF_MEMDIE 20 /* is terminating due to OOM killer */
f80c5b39 98#define TIF_POLLING_NRFLAG 21 /* idle is polling for TIF_NEED_RESCHED */
e57549b0 99#define TIF_IO_BITMAP 22 /* uses I/O bitmap */
e57549b0 100#define TIF_FORCED_TF 24 /* true if TF in eflags artificially */
ea8e61b7 101#define TIF_BLOCKSTEP 25 /* set when we want DEBUGCTLMSR_BTF */
b407fc57 102#define TIF_LAZY_MMU_UPDATES 27 /* task is updating the mmu lazily */
66700001 103#define TIF_SYSCALL_TRACEPOINT 28 /* syscall tracepoint instrumentation */
6bd33008 104#define TIF_ADDR32 29 /* 32-bit address space on 64 bits */
bb212724 105#define TIF_X32 30 /* 32-bit native x86-64 binary */
5ea0727b 106#define TIF_FSCHECK 31 /* Check FS is USER_DS on return */
e57549b0
CL
107
108#define _TIF_SYSCALL_TRACE (1 << TIF_SYSCALL_TRACE)
59e52130 109#define _TIF_NOTIFY_RESUME (1 << TIF_NOTIFY_RESUME)
e57549b0 110#define _TIF_SIGPENDING (1 << TIF_SIGPENDING)
e57549b0 111#define _TIF_NEED_RESCHED (1 << TIF_NEED_RESCHED)
3a404842 112#define _TIF_SINGLESTEP (1 << TIF_SINGLESTEP)
8fe36c9d 113#define _TIF_SSBD (1 << TIF_SSBD)
e57549b0 114#define _TIF_SYSCALL_EMU (1 << TIF_SYSCALL_EMU)
e57549b0
CL
115#define _TIF_SYSCALL_AUDIT (1 << TIF_SYSCALL_AUDIT)
116#define _TIF_SECCOMP (1 << TIF_SECCOMP)
e0b04783 117#define _TIF_SPEC_IB (1 << TIF_SPEC_IB)
801d6893 118#define _TIF_SPEC_FORCE_UPDATE (1 << TIF_SPEC_FORCE_UPDATE)
7c68af6e 119#define _TIF_USER_RETURN_NOTIFY (1 << TIF_USER_RETURN_NOTIFY)
0326f5a9 120#define _TIF_UPROBE (1 << TIF_UPROBE)
afb94c9e 121#define _TIF_PATCH_PENDING (1 << TIF_PATCH_PENDING)
e9ea1e7f 122#define _TIF_NOCPUID (1 << TIF_NOCPUID)
e57549b0
CL
123#define _TIF_NOTSC (1 << TIF_NOTSC)
124#define _TIF_IA32 (1 << TIF_IA32)
bf5a3c13 125#define _TIF_NOHZ (1 << TIF_NOHZ)
f80c5b39 126#define _TIF_POLLING_NRFLAG (1 << TIF_POLLING_NRFLAG)
e57549b0 127#define _TIF_IO_BITMAP (1 << TIF_IO_BITMAP)
e57549b0 128#define _TIF_FORCED_TF (1 << TIF_FORCED_TF)
ea8e61b7 129#define _TIF_BLOCKSTEP (1 << TIF_BLOCKSTEP)
b407fc57 130#define _TIF_LAZY_MMU_UPDATES (1 << TIF_LAZY_MMU_UPDATES)
66700001 131#define _TIF_SYSCALL_TRACEPOINT (1 << TIF_SYSCALL_TRACEPOINT)
6bd33008 132#define _TIF_ADDR32 (1 << TIF_ADDR32)
bb212724 133#define _TIF_X32 (1 << TIF_X32)
5ea0727b 134#define _TIF_FSCHECK (1 << TIF_FSCHECK)
e57549b0 135
9999c8c0
AL
136/*
137 * work to do in syscall_trace_enter(). Also includes TIF_NOHZ for
138 * enter_from_user_mode()
139 */
d4d67150 140#define _TIF_WORK_SYSCALL_ENTRY \
66700001 141 (_TIF_SYSCALL_TRACE | _TIF_SYSCALL_EMU | _TIF_SYSCALL_AUDIT | \
392a6254 142 _TIF_SECCOMP | _TIF_SYSCALL_TRACEPOINT | \
bf5a3c13 143 _TIF_NOHZ)
d4d67150 144
00c1bb13 145/* work to do on any return to user space */
66700001 146#define _TIF_ALLWORK_MASK \
3a404842
JP
147 (_TIF_SYSCALL_TRACE | _TIF_NOTIFY_RESUME | _TIF_SIGPENDING | \
148 _TIF_NEED_RESCHED | _TIF_SINGLESTEP | _TIF_SYSCALL_EMU | \
149 _TIF_SYSCALL_AUDIT | _TIF_USER_RETURN_NOTIFY | _TIF_UPROBE | \
5ea0727b
TG
150 _TIF_PATCH_PENDING | _TIF_NOHZ | _TIF_SYSCALL_TRACEPOINT | \
151 _TIF_FSCHECK)
00c1bb13 152
00c1bb13 153/* flags to check in __switch_to() */
cc953083 154#define _TIF_WORK_CTXSW_BASE \
e0b04783 155 (_TIF_IO_BITMAP|_TIF_NOCPUID|_TIF_NOTSC|_TIF_BLOCKSTEP| \
801d6893 156 _TIF_SSBD | _TIF_SPEC_FORCE_UPDATE)
cc953083
TG
157
158/*
159 * Avoid calls to __switch_to_xtra() on UP as STIBP is not evaluated.
160 */
161#ifdef CONFIG_SMP
162# define _TIF_WORK_CTXSW (_TIF_WORK_CTXSW_BASE | _TIF_SPEC_IB)
163#else
164# define _TIF_WORK_CTXSW (_TIF_WORK_CTXSW_BASE)
165#endif
00c1bb13 166
7c68af6e 167#define _TIF_WORK_CTXSW_PREV (_TIF_WORK_CTXSW|_TIF_USER_RETURN_NOTIFY)
37f07655 168#define _TIF_WORK_CTXSW_NEXT (_TIF_WORK_CTXSW)
00c1bb13 169
198d208d 170#define STACK_WARN (THREAD_SIZE/8)
b84200b3 171
2052e8d4
CL
172/*
173 * macros/functions for gaining access to the thread information structure
174 *
175 * preempt_count needs to be 1 initially, until the scheduler is functional.
176 */
177#ifndef __ASSEMBLY__
178
0f60a8ef
KC
179/*
180 * Walks up the stack frames to make sure that the specified object is
181 * entirely contained by a single stack frame.
182 *
183 * Returns:
96dc4f9f
S
184 * GOOD_FRAME if within a frame
185 * BAD_STACK if placed across a frame boundary (or outside stack)
186 * NOT_STACK unable to determine (no frame pointers, etc)
0f60a8ef
KC
187 */
188static inline int arch_within_stack_frames(const void * const stack,
189 const void * const stackend,
190 const void *obj, unsigned long len)
191{
192#if defined(CONFIG_FRAME_POINTER)
193 const void *frame = NULL;
194 const void *oldframe;
195
196 oldframe = __builtin_frame_address(1);
197 if (oldframe)
198 frame = __builtin_frame_address(2);
199 /*
200 * low ----------------------------------------------> high
201 * [saved bp][saved ip][args][local vars][saved bp][saved ip]
202 * ^----------------^
203 * allow copies only within here
204 */
205 while (stack <= frame && frame < stackend) {
206 /*
207 * If obj + len extends past the last frame, this
208 * check won't pass and the next frame will be 0,
209 * causing us to bail out and correctly report
210 * the copy as invalid.
211 */
212 if (obj + len <= frame)
96dc4f9f
S
213 return obj >= oldframe + 2 * sizeof(void *) ?
214 GOOD_FRAME : BAD_STACK;
0f60a8ef
KC
215 oldframe = frame;
216 frame = *(const void * const *)frame;
217 }
96dc4f9f 218 return BAD_STACK;
0f60a8ef 219#else
96dc4f9f 220 return NOT_STACK;
0f60a8ef
KC
221#endif
222}
223
2052e8d4
CL
224#else /* !__ASSEMBLY__ */
225
3a23208e 226#ifdef CONFIG_X86_64
c482feef 227# define cpu_current_top_of_stack (cpu_tss_rw + TSS_sp1)
3a23208e
DV
228#endif
229
2052e8d4
CL
230#endif
231
609c19a3
AL
232#ifdef CONFIG_COMPAT
233#define TS_I386_REGS_POKED 0x0004 /* regs poked by 32-bit ptracer */
234#endif
8a6c160a 235#ifndef __ASSEMBLY__
ef334a20 236
ef334a20 237#ifdef CONFIG_X86_32
b9d989c7
AL
238#define in_ia32_syscall() true
239#else
240#define in_ia32_syscall() (IS_ENABLED(CONFIG_IA32_EMULATION) && \
6c46cb88 241 current_thread_info()->status & TS_COMPAT)
ef334a20 242#endif
1daeaa31
BG
243
244/*
245 * Force syscall return via IRET by making it look as if there was
246 * some work pending. IRET is our most capable (but slowest) syscall
247 * return path, which is able to restore modified SS, CS and certain
248 * EFLAGS values that other (fast) syscall return instructions
249 * are not able to restore properly.
250 */
251#define force_iret() set_thread_flag(TIF_NOTIFY_RESUME)
252
61c4628b 253extern void arch_task_cache_init(void);
61c4628b 254extern int arch_dup_task_struct(struct task_struct *dst, struct task_struct *src);
38e7c572 255extern void arch_release_task_struct(struct task_struct *tsk);
e9ea1e7f
KH
256extern void arch_setup_new_exec(void);
257#define arch_setup_new_exec arch_setup_new_exec
5f870a3f
BP
258#endif /* !__ASSEMBLY__ */
259
1965aae3 260#endif /* _ASM_X86_THREAD_INFO_H */