]>
Commit | Line | Data |
---|---|---|
2052e8d4 CL |
1 | /* thread_info.h: low-level thread information |
2 | * | |
3 | * Copyright (C) 2002 David Howells (dhowells@redhat.com) | |
4 | * - Incorporating suggestions made by Linus Torvalds and Dave Miller | |
5 | */ | |
6 | ||
1965aae3 PA |
7 | #ifndef _ASM_X86_THREAD_INFO_H |
8 | #define _ASM_X86_THREAD_INFO_H | |
2052e8d4 | 9 | |
2052e8d4 CL |
10 | #include <linux/compiler.h> |
11 | #include <asm/page.h> | |
198d208d | 12 | #include <asm/percpu.h> |
12a638e1 CL |
13 | #include <asm/types.h> |
14 | ||
3ee4298f AL |
15 | /* |
16 | * TOP_OF_KERNEL_STACK_PADDING is a number of unused bytes that we | |
17 | * reserve at the top of the kernel stack. We do it because of a nasty | |
18 | * 32-bit corner case. On x86_32, the hardware stack frame is | |
19 | * variable-length. Except for vm86 mode, struct pt_regs assumes a | |
20 | * maximum-length frame. If we enter from CPL 0, the top 8 bytes of | |
21 | * pt_regs don't actually exist. Ordinarily this doesn't matter, but it | |
22 | * does in at least one case: | |
23 | * | |
24 | * If we take an NMI early enough in SYSENTER, then we can end up with | |
25 | * pt_regs that extends above sp0. On the way out, in the espfix code, | |
26 | * we can read the saved SS value, but that value will be above sp0. | |
27 | * Without this offset, that can result in a page fault. (We are | |
28 | * careful that, in this case, the value we read doesn't matter.) | |
29 | * | |
5ed92a8a BG |
30 | * In vm86 mode, the hardware frame is much longer still, so add 16 |
31 | * bytes to make room for the real-mode segments. | |
3ee4298f AL |
32 | * |
33 | * x86_64 has a fixed-length stack frame. | |
34 | */ | |
35 | #ifdef CONFIG_X86_32 | |
5ed92a8a BG |
36 | # ifdef CONFIG_VM86 |
37 | # define TOP_OF_KERNEL_STACK_PADDING 16 | |
38 | # else | |
39 | # define TOP_OF_KERNEL_STACK_PADDING 8 | |
40 | # endif | |
3ee4298f AL |
41 | #else |
42 | # define TOP_OF_KERNEL_STACK_PADDING 0 | |
43 | #endif | |
44 | ||
2052e8d4 CL |
45 | /* |
46 | * low level task data that entry.S needs immediate access to | |
47 | * - this struct should fit entirely inside of one cache line | |
48 | * - this struct shares the supervisor stack pages | |
2052e8d4 CL |
49 | */ |
50 | #ifndef __ASSEMBLY__ | |
243de7bd AL |
51 | static inline unsigned long current_stack_pointer(void) |
52 | { | |
53 | unsigned long sp; | |
54 | #ifdef CONFIG_X86_64 | |
55 | asm("mov %%rsp,%0" : "=g" (sp)); | |
56 | #else | |
57 | asm("mov %%esp,%0" : "=g" (sp)); | |
58 | #endif | |
59 | return sp; | |
60 | } | |
61 | ||
006c484b | 62 | struct task_struct; |
cd4d09ec | 63 | #include <asm/cpufeature.h> |
60063497 | 64 | #include <linux/atomic.h> |
2052e8d4 | 65 | |
c8061485 HC |
66 | struct thread_info { |
67 | unsigned long flags; /* low level flags */ | |
68 | }; | |
69 | ||
70 | #define INIT_THREAD_INFO(tsk) \ | |
71 | { \ | |
72 | .flags = 0, \ | |
73 | } | |
74 | ||
3351cc03 CL |
75 | #define init_stack (init_thread_union.stack) |
76 | ||
2052e8d4 CL |
77 | #else /* !__ASSEMBLY__ */ |
78 | ||
79 | #include <asm/asm-offsets.h> | |
80 | ||
81 | #endif | |
82 | ||
e57549b0 CL |
83 | /* |
84 | * thread information flags | |
85 | * - these are process state flags that various assembly files | |
86 | * may need to access | |
e57549b0 CL |
87 | */ |
88 | #define TIF_SYSCALL_TRACE 0 /* syscall trace active */ | |
59e52130 | 89 | #define TIF_NOTIFY_RESUME 1 /* callback before returning to user */ |
e57549b0 CL |
90 | #define TIF_SIGPENDING 2 /* signal pending */ |
91 | #define TIF_NEED_RESCHED 3 /* rescheduling necessary */ | |
92 | #define TIF_SINGLESTEP 4 /* reenable singlestep on user return*/ | |
0c0f6741 | 93 | #define TIF_SSBD 5 /* Reduced data speculation */ |
e57549b0 | 94 | #define TIF_SYSCALL_EMU 6 /* syscall emulation active */ |
e57549b0 CL |
95 | #define TIF_SYSCALL_AUDIT 7 /* syscall auditing active */ |
96 | #define TIF_SECCOMP 8 /* secure computing */ | |
7c68af6e | 97 | #define TIF_USER_RETURN_NOTIFY 11 /* notify kernel of userspace return */ |
0326f5a9 | 98 | #define TIF_UPROBE 12 /* breakpointed or singlestepping */ |
afb94c9e | 99 | #define TIF_PATCH_PENDING 13 /* pending live patching update */ |
e9ea1e7f | 100 | #define TIF_NOCPUID 15 /* CPUID is not accessible in userland */ |
e57549b0 | 101 | #define TIF_NOTSC 16 /* TSC is not accessible in userland */ |
6bd33008 | 102 | #define TIF_IA32 17 /* IA32 compatibility process */ |
bf5a3c13 | 103 | #define TIF_NOHZ 19 /* in adaptive nohz mode */ |
0ddc9324 | 104 | #define TIF_MEMDIE 20 /* is terminating due to OOM killer */ |
f80c5b39 | 105 | #define TIF_POLLING_NRFLAG 21 /* idle is polling for TIF_NEED_RESCHED */ |
e57549b0 | 106 | #define TIF_IO_BITMAP 22 /* uses I/O bitmap */ |
e57549b0 | 107 | #define TIF_FORCED_TF 24 /* true if TF in eflags artificially */ |
ea8e61b7 | 108 | #define TIF_BLOCKSTEP 25 /* set when we want DEBUGCTLMSR_BTF */ |
b407fc57 | 109 | #define TIF_LAZY_MMU_UPDATES 27 /* task is updating the mmu lazily */ |
66700001 | 110 | #define TIF_SYSCALL_TRACEPOINT 28 /* syscall tracepoint instrumentation */ |
6bd33008 | 111 | #define TIF_ADDR32 29 /* 32-bit address space on 64 bits */ |
bb212724 | 112 | #define TIF_X32 30 /* 32-bit native x86-64 binary */ |
db7aed17 | 113 | #define TIF_FSCHECK 31 /* Check FS is USER_DS on return */ |
e57549b0 CL |
114 | |
115 | #define _TIF_SYSCALL_TRACE (1 << TIF_SYSCALL_TRACE) | |
59e52130 | 116 | #define _TIF_NOTIFY_RESUME (1 << TIF_NOTIFY_RESUME) |
e57549b0 | 117 | #define _TIF_SIGPENDING (1 << TIF_SIGPENDING) |
e57549b0 | 118 | #define _TIF_NEED_RESCHED (1 << TIF_NEED_RESCHED) |
3a404842 | 119 | #define _TIF_SINGLESTEP (1 << TIF_SINGLESTEP) |
0c0f6741 | 120 | #define _TIF_SSBD (1 << TIF_SSBD) |
e57549b0 | 121 | #define _TIF_SYSCALL_EMU (1 << TIF_SYSCALL_EMU) |
e57549b0 CL |
122 | #define _TIF_SYSCALL_AUDIT (1 << TIF_SYSCALL_AUDIT) |
123 | #define _TIF_SECCOMP (1 << TIF_SECCOMP) | |
7c68af6e | 124 | #define _TIF_USER_RETURN_NOTIFY (1 << TIF_USER_RETURN_NOTIFY) |
0326f5a9 | 125 | #define _TIF_UPROBE (1 << TIF_UPROBE) |
afb94c9e | 126 | #define _TIF_PATCH_PENDING (1 << TIF_PATCH_PENDING) |
e9ea1e7f | 127 | #define _TIF_NOCPUID (1 << TIF_NOCPUID) |
e57549b0 CL |
128 | #define _TIF_NOTSC (1 << TIF_NOTSC) |
129 | #define _TIF_IA32 (1 << TIF_IA32) | |
bf5a3c13 | 130 | #define _TIF_NOHZ (1 << TIF_NOHZ) |
f80c5b39 | 131 | #define _TIF_POLLING_NRFLAG (1 << TIF_POLLING_NRFLAG) |
e57549b0 | 132 | #define _TIF_IO_BITMAP (1 << TIF_IO_BITMAP) |
e57549b0 | 133 | #define _TIF_FORCED_TF (1 << TIF_FORCED_TF) |
ea8e61b7 | 134 | #define _TIF_BLOCKSTEP (1 << TIF_BLOCKSTEP) |
b407fc57 | 135 | #define _TIF_LAZY_MMU_UPDATES (1 << TIF_LAZY_MMU_UPDATES) |
66700001 | 136 | #define _TIF_SYSCALL_TRACEPOINT (1 << TIF_SYSCALL_TRACEPOINT) |
6bd33008 | 137 | #define _TIF_ADDR32 (1 << TIF_ADDR32) |
bb212724 | 138 | #define _TIF_X32 (1 << TIF_X32) |
db7aed17 | 139 | #define _TIF_FSCHECK (1 << TIF_FSCHECK) |
e57549b0 | 140 | |
9999c8c0 AL |
141 | /* |
142 | * work to do in syscall_trace_enter(). Also includes TIF_NOHZ for | |
143 | * enter_from_user_mode() | |
144 | */ | |
d4d67150 | 145 | #define _TIF_WORK_SYSCALL_ENTRY \ |
66700001 | 146 | (_TIF_SYSCALL_TRACE | _TIF_SYSCALL_EMU | _TIF_SYSCALL_AUDIT | \ |
392a6254 | 147 | _TIF_SECCOMP | _TIF_SYSCALL_TRACEPOINT | \ |
bf5a3c13 | 148 | _TIF_NOHZ) |
d4d67150 | 149 | |
00c1bb13 | 150 | /* work to do on any return to user space */ |
66700001 | 151 | #define _TIF_ALLWORK_MASK \ |
3a404842 JP |
152 | (_TIF_SYSCALL_TRACE | _TIF_NOTIFY_RESUME | _TIF_SIGPENDING | \ |
153 | _TIF_NEED_RESCHED | _TIF_SINGLESTEP | _TIF_SYSCALL_EMU | \ | |
154 | _TIF_SYSCALL_AUDIT | _TIF_USER_RETURN_NOTIFY | _TIF_UPROBE | \ | |
db7aed17 TG |
155 | _TIF_PATCH_PENDING | _TIF_NOHZ | _TIF_SYSCALL_TRACEPOINT | \ |
156 | _TIF_FSCHECK) | |
00c1bb13 | 157 | |
00c1bb13 CL |
158 | /* flags to check in __switch_to() */ |
159 | #define _TIF_WORK_CTXSW \ | |
0c0f6741 | 160 | (_TIF_IO_BITMAP|_TIF_NOCPUID|_TIF_NOTSC|_TIF_BLOCKSTEP|_TIF_SSBD) |
00c1bb13 | 161 | |
7c68af6e | 162 | #define _TIF_WORK_CTXSW_PREV (_TIF_WORK_CTXSW|_TIF_USER_RETURN_NOTIFY) |
37f07655 | 163 | #define _TIF_WORK_CTXSW_NEXT (_TIF_WORK_CTXSW) |
00c1bb13 | 164 | |
198d208d | 165 | #define STACK_WARN (THREAD_SIZE/8) |
b84200b3 | 166 | |
2052e8d4 CL |
167 | /* |
168 | * macros/functions for gaining access to the thread information structure | |
169 | * | |
170 | * preempt_count needs to be 1 initially, until the scheduler is functional. | |
171 | */ | |
172 | #ifndef __ASSEMBLY__ | |
173 | ||
0f60a8ef KC |
174 | /* |
175 | * Walks up the stack frames to make sure that the specified object is | |
176 | * entirely contained by a single stack frame. | |
177 | * | |
178 | * Returns: | |
96dc4f9f S |
179 | * GOOD_FRAME if within a frame |
180 | * BAD_STACK if placed across a frame boundary (or outside stack) | |
181 | * NOT_STACK unable to determine (no frame pointers, etc) | |
0f60a8ef KC |
182 | */ |
183 | static inline int arch_within_stack_frames(const void * const stack, | |
184 | const void * const stackend, | |
185 | const void *obj, unsigned long len) | |
186 | { | |
187 | #if defined(CONFIG_FRAME_POINTER) | |
188 | const void *frame = NULL; | |
189 | const void *oldframe; | |
190 | ||
191 | oldframe = __builtin_frame_address(1); | |
192 | if (oldframe) | |
193 | frame = __builtin_frame_address(2); | |
194 | /* | |
195 | * low ----------------------------------------------> high | |
196 | * [saved bp][saved ip][args][local vars][saved bp][saved ip] | |
197 | * ^----------------^ | |
198 | * allow copies only within here | |
199 | */ | |
200 | while (stack <= frame && frame < stackend) { | |
201 | /* | |
202 | * If obj + len extends past the last frame, this | |
203 | * check won't pass and the next frame will be 0, | |
204 | * causing us to bail out and correctly report | |
205 | * the copy as invalid. | |
206 | */ | |
207 | if (obj + len <= frame) | |
96dc4f9f S |
208 | return obj >= oldframe + 2 * sizeof(void *) ? |
209 | GOOD_FRAME : BAD_STACK; | |
0f60a8ef KC |
210 | oldframe = frame; |
211 | frame = *(const void * const *)frame; | |
212 | } | |
96dc4f9f | 213 | return BAD_STACK; |
0f60a8ef | 214 | #else |
96dc4f9f | 215 | return NOT_STACK; |
0f60a8ef KC |
216 | #endif |
217 | } | |
218 | ||
2052e8d4 CL |
219 | #else /* !__ASSEMBLY__ */ |
220 | ||
3a23208e | 221 | #ifdef CONFIG_X86_64 |
785be108 | 222 | # define cpu_current_top_of_stack (cpu_tss_rw + TSS_sp1) |
3a23208e DV |
223 | #endif |
224 | ||
2052e8d4 CL |
225 | #endif |
226 | ||
609c19a3 AL |
227 | #ifdef CONFIG_COMPAT |
228 | #define TS_I386_REGS_POKED 0x0004 /* regs poked by 32-bit ptracer */ | |
229 | #endif | |
8a6c160a | 230 | #ifndef __ASSEMBLY__ |
ef334a20 | 231 | |
ef334a20 | 232 | #ifdef CONFIG_X86_32 |
b9d989c7 AL |
233 | #define in_ia32_syscall() true |
234 | #else | |
235 | #define in_ia32_syscall() (IS_ENABLED(CONFIG_IA32_EMULATION) && \ | |
236 | current->thread.status & TS_COMPAT) | |
ef334a20 | 237 | #endif |
1daeaa31 BG |
238 | |
239 | /* | |
240 | * Force syscall return via IRET by making it look as if there was | |
241 | * some work pending. IRET is our most capable (but slowest) syscall | |
242 | * return path, which is able to restore modified SS, CS and certain | |
243 | * EFLAGS values that other (fast) syscall return instructions | |
244 | * are not able to restore properly. | |
245 | */ | |
246 | #define force_iret() set_thread_flag(TIF_NOTIFY_RESUME) | |
247 | ||
61c4628b | 248 | extern void arch_task_cache_init(void); |
61c4628b | 249 | extern int arch_dup_task_struct(struct task_struct *dst, struct task_struct *src); |
38e7c572 | 250 | extern void arch_release_task_struct(struct task_struct *tsk); |
e9ea1e7f KH |
251 | extern void arch_setup_new_exec(void); |
252 | #define arch_setup_new_exec arch_setup_new_exec | |
5f870a3f BP |
253 | #endif /* !__ASSEMBLY__ */ |
254 | ||
1965aae3 | 255 | #endif /* _ASM_X86_THREAD_INFO_H */ |