]> git.proxmox.com Git - mirror_ubuntu-artful-kernel.git/blame - arch/x86/include/asm/thread_info.h
x86/bugs: Rename _RDS to _SSBD
[mirror_ubuntu-artful-kernel.git] / arch / x86 / include / asm / thread_info.h
CommitLineData
2052e8d4
CL
1/* thread_info.h: low-level thread information
2 *
3 * Copyright (C) 2002 David Howells (dhowells@redhat.com)
4 * - Incorporating suggestions made by Linus Torvalds and Dave Miller
5 */
6
1965aae3
PA
7#ifndef _ASM_X86_THREAD_INFO_H
8#define _ASM_X86_THREAD_INFO_H
2052e8d4 9
2052e8d4
CL
10#include <linux/compiler.h>
11#include <asm/page.h>
198d208d 12#include <asm/percpu.h>
12a638e1
CL
13#include <asm/types.h>
14
3ee4298f
AL
15/*
16 * TOP_OF_KERNEL_STACK_PADDING is a number of unused bytes that we
17 * reserve at the top of the kernel stack. We do it because of a nasty
18 * 32-bit corner case. On x86_32, the hardware stack frame is
19 * variable-length. Except for vm86 mode, struct pt_regs assumes a
20 * maximum-length frame. If we enter from CPL 0, the top 8 bytes of
21 * pt_regs don't actually exist. Ordinarily this doesn't matter, but it
22 * does in at least one case:
23 *
24 * If we take an NMI early enough in SYSENTER, then we can end up with
25 * pt_regs that extends above sp0. On the way out, in the espfix code,
26 * we can read the saved SS value, but that value will be above sp0.
27 * Without this offset, that can result in a page fault. (We are
28 * careful that, in this case, the value we read doesn't matter.)
29 *
5ed92a8a
BG
30 * In vm86 mode, the hardware frame is much longer still, so add 16
31 * bytes to make room for the real-mode segments.
3ee4298f
AL
32 *
33 * x86_64 has a fixed-length stack frame.
34 */
35#ifdef CONFIG_X86_32
5ed92a8a
BG
36# ifdef CONFIG_VM86
37# define TOP_OF_KERNEL_STACK_PADDING 16
38# else
39# define TOP_OF_KERNEL_STACK_PADDING 8
40# endif
3ee4298f
AL
41#else
42# define TOP_OF_KERNEL_STACK_PADDING 0
43#endif
44
2052e8d4
CL
45/*
46 * low level task data that entry.S needs immediate access to
47 * - this struct should fit entirely inside of one cache line
48 * - this struct shares the supervisor stack pages
2052e8d4
CL
49 */
50#ifndef __ASSEMBLY__
243de7bd
AL
51static inline unsigned long current_stack_pointer(void)
52{
53 unsigned long sp;
54#ifdef CONFIG_X86_64
55 asm("mov %%rsp,%0" : "=g" (sp));
56#else
57 asm("mov %%esp,%0" : "=g" (sp));
58#endif
59 return sp;
60}
61
006c484b 62struct task_struct;
cd4d09ec 63#include <asm/cpufeature.h>
60063497 64#include <linux/atomic.h>
2052e8d4 65
c8061485
HC
66struct thread_info {
67 unsigned long flags; /* low level flags */
68};
69
70#define INIT_THREAD_INFO(tsk) \
71{ \
72 .flags = 0, \
73}
74
3351cc03
CL
75#define init_stack (init_thread_union.stack)
76
2052e8d4
CL
77#else /* !__ASSEMBLY__ */
78
79#include <asm/asm-offsets.h>
80
81#endif
82
e57549b0
CL
83/*
84 * thread information flags
85 * - these are process state flags that various assembly files
86 * may need to access
e57549b0
CL
87 */
88#define TIF_SYSCALL_TRACE 0 /* syscall trace active */
59e52130 89#define TIF_NOTIFY_RESUME 1 /* callback before returning to user */
e57549b0
CL
90#define TIF_SIGPENDING 2 /* signal pending */
91#define TIF_NEED_RESCHED 3 /* rescheduling necessary */
92#define TIF_SINGLESTEP 4 /* reenable singlestep on user return*/
0c0f6741 93#define TIF_SSBD 5 /* Reduced data speculation */
e57549b0 94#define TIF_SYSCALL_EMU 6 /* syscall emulation active */
e57549b0
CL
95#define TIF_SYSCALL_AUDIT 7 /* syscall auditing active */
96#define TIF_SECCOMP 8 /* secure computing */
7c68af6e 97#define TIF_USER_RETURN_NOTIFY 11 /* notify kernel of userspace return */
0326f5a9 98#define TIF_UPROBE 12 /* breakpointed or singlestepping */
afb94c9e 99#define TIF_PATCH_PENDING 13 /* pending live patching update */
e9ea1e7f 100#define TIF_NOCPUID 15 /* CPUID is not accessible in userland */
e57549b0 101#define TIF_NOTSC 16 /* TSC is not accessible in userland */
6bd33008 102#define TIF_IA32 17 /* IA32 compatibility process */
bf5a3c13 103#define TIF_NOHZ 19 /* in adaptive nohz mode */
0ddc9324 104#define TIF_MEMDIE 20 /* is terminating due to OOM killer */
f80c5b39 105#define TIF_POLLING_NRFLAG 21 /* idle is polling for TIF_NEED_RESCHED */
e57549b0 106#define TIF_IO_BITMAP 22 /* uses I/O bitmap */
e57549b0 107#define TIF_FORCED_TF 24 /* true if TF in eflags artificially */
ea8e61b7 108#define TIF_BLOCKSTEP 25 /* set when we want DEBUGCTLMSR_BTF */
b407fc57 109#define TIF_LAZY_MMU_UPDATES 27 /* task is updating the mmu lazily */
66700001 110#define TIF_SYSCALL_TRACEPOINT 28 /* syscall tracepoint instrumentation */
6bd33008 111#define TIF_ADDR32 29 /* 32-bit address space on 64 bits */
bb212724 112#define TIF_X32 30 /* 32-bit native x86-64 binary */
db7aed17 113#define TIF_FSCHECK 31 /* Check FS is USER_DS on return */
e57549b0
CL
114
115#define _TIF_SYSCALL_TRACE (1 << TIF_SYSCALL_TRACE)
59e52130 116#define _TIF_NOTIFY_RESUME (1 << TIF_NOTIFY_RESUME)
e57549b0 117#define _TIF_SIGPENDING (1 << TIF_SIGPENDING)
e57549b0 118#define _TIF_NEED_RESCHED (1 << TIF_NEED_RESCHED)
3a404842 119#define _TIF_SINGLESTEP (1 << TIF_SINGLESTEP)
0c0f6741 120#define _TIF_SSBD (1 << TIF_SSBD)
e57549b0 121#define _TIF_SYSCALL_EMU (1 << TIF_SYSCALL_EMU)
e57549b0
CL
122#define _TIF_SYSCALL_AUDIT (1 << TIF_SYSCALL_AUDIT)
123#define _TIF_SECCOMP (1 << TIF_SECCOMP)
7c68af6e 124#define _TIF_USER_RETURN_NOTIFY (1 << TIF_USER_RETURN_NOTIFY)
0326f5a9 125#define _TIF_UPROBE (1 << TIF_UPROBE)
afb94c9e 126#define _TIF_PATCH_PENDING (1 << TIF_PATCH_PENDING)
e9ea1e7f 127#define _TIF_NOCPUID (1 << TIF_NOCPUID)
e57549b0
CL
128#define _TIF_NOTSC (1 << TIF_NOTSC)
129#define _TIF_IA32 (1 << TIF_IA32)
bf5a3c13 130#define _TIF_NOHZ (1 << TIF_NOHZ)
f80c5b39 131#define _TIF_POLLING_NRFLAG (1 << TIF_POLLING_NRFLAG)
e57549b0 132#define _TIF_IO_BITMAP (1 << TIF_IO_BITMAP)
e57549b0 133#define _TIF_FORCED_TF (1 << TIF_FORCED_TF)
ea8e61b7 134#define _TIF_BLOCKSTEP (1 << TIF_BLOCKSTEP)
b407fc57 135#define _TIF_LAZY_MMU_UPDATES (1 << TIF_LAZY_MMU_UPDATES)
66700001 136#define _TIF_SYSCALL_TRACEPOINT (1 << TIF_SYSCALL_TRACEPOINT)
6bd33008 137#define _TIF_ADDR32 (1 << TIF_ADDR32)
bb212724 138#define _TIF_X32 (1 << TIF_X32)
db7aed17 139#define _TIF_FSCHECK (1 << TIF_FSCHECK)
e57549b0 140
9999c8c0
AL
141/*
142 * work to do in syscall_trace_enter(). Also includes TIF_NOHZ for
143 * enter_from_user_mode()
144 */
d4d67150 145#define _TIF_WORK_SYSCALL_ENTRY \
66700001 146 (_TIF_SYSCALL_TRACE | _TIF_SYSCALL_EMU | _TIF_SYSCALL_AUDIT | \
392a6254 147 _TIF_SECCOMP | _TIF_SYSCALL_TRACEPOINT | \
bf5a3c13 148 _TIF_NOHZ)
d4d67150 149
00c1bb13 150/* work to do on any return to user space */
66700001 151#define _TIF_ALLWORK_MASK \
3a404842
JP
152 (_TIF_SYSCALL_TRACE | _TIF_NOTIFY_RESUME | _TIF_SIGPENDING | \
153 _TIF_NEED_RESCHED | _TIF_SINGLESTEP | _TIF_SYSCALL_EMU | \
154 _TIF_SYSCALL_AUDIT | _TIF_USER_RETURN_NOTIFY | _TIF_UPROBE | \
db7aed17
TG
155 _TIF_PATCH_PENDING | _TIF_NOHZ | _TIF_SYSCALL_TRACEPOINT | \
156 _TIF_FSCHECK)
00c1bb13 157
00c1bb13
CL
158/* flags to check in __switch_to() */
159#define _TIF_WORK_CTXSW \
0c0f6741 160 (_TIF_IO_BITMAP|_TIF_NOCPUID|_TIF_NOTSC|_TIF_BLOCKSTEP|_TIF_SSBD)
00c1bb13 161
7c68af6e 162#define _TIF_WORK_CTXSW_PREV (_TIF_WORK_CTXSW|_TIF_USER_RETURN_NOTIFY)
37f07655 163#define _TIF_WORK_CTXSW_NEXT (_TIF_WORK_CTXSW)
00c1bb13 164
198d208d 165#define STACK_WARN (THREAD_SIZE/8)
b84200b3 166
2052e8d4
CL
167/*
168 * macros/functions for gaining access to the thread information structure
169 *
170 * preempt_count needs to be 1 initially, until the scheduler is functional.
171 */
172#ifndef __ASSEMBLY__
173
0f60a8ef
KC
174/*
175 * Walks up the stack frames to make sure that the specified object is
176 * entirely contained by a single stack frame.
177 *
178 * Returns:
96dc4f9f
S
179 * GOOD_FRAME if within a frame
180 * BAD_STACK if placed across a frame boundary (or outside stack)
181 * NOT_STACK unable to determine (no frame pointers, etc)
0f60a8ef
KC
182 */
183static inline int arch_within_stack_frames(const void * const stack,
184 const void * const stackend,
185 const void *obj, unsigned long len)
186{
187#if defined(CONFIG_FRAME_POINTER)
188 const void *frame = NULL;
189 const void *oldframe;
190
191 oldframe = __builtin_frame_address(1);
192 if (oldframe)
193 frame = __builtin_frame_address(2);
194 /*
195 * low ----------------------------------------------> high
196 * [saved bp][saved ip][args][local vars][saved bp][saved ip]
197 * ^----------------^
198 * allow copies only within here
199 */
200 while (stack <= frame && frame < stackend) {
201 /*
202 * If obj + len extends past the last frame, this
203 * check won't pass and the next frame will be 0,
204 * causing us to bail out and correctly report
205 * the copy as invalid.
206 */
207 if (obj + len <= frame)
96dc4f9f
S
208 return obj >= oldframe + 2 * sizeof(void *) ?
209 GOOD_FRAME : BAD_STACK;
0f60a8ef
KC
210 oldframe = frame;
211 frame = *(const void * const *)frame;
212 }
96dc4f9f 213 return BAD_STACK;
0f60a8ef 214#else
96dc4f9f 215 return NOT_STACK;
0f60a8ef
KC
216#endif
217}
218
2052e8d4
CL
219#else /* !__ASSEMBLY__ */
220
3a23208e 221#ifdef CONFIG_X86_64
785be108 222# define cpu_current_top_of_stack (cpu_tss_rw + TSS_sp1)
3a23208e
DV
223#endif
224
2052e8d4
CL
225#endif
226
609c19a3
AL
227#ifdef CONFIG_COMPAT
228#define TS_I386_REGS_POKED 0x0004 /* regs poked by 32-bit ptracer */
229#endif
8a6c160a 230#ifndef __ASSEMBLY__
ef334a20 231
ef334a20 232#ifdef CONFIG_X86_32
b9d989c7
AL
233#define in_ia32_syscall() true
234#else
235#define in_ia32_syscall() (IS_ENABLED(CONFIG_IA32_EMULATION) && \
236 current->thread.status & TS_COMPAT)
ef334a20 237#endif
1daeaa31
BG
238
239/*
240 * Force syscall return via IRET by making it look as if there was
241 * some work pending. IRET is our most capable (but slowest) syscall
242 * return path, which is able to restore modified SS, CS and certain
243 * EFLAGS values that other (fast) syscall return instructions
244 * are not able to restore properly.
245 */
246#define force_iret() set_thread_flag(TIF_NOTIFY_RESUME)
247
61c4628b 248extern void arch_task_cache_init(void);
61c4628b 249extern int arch_dup_task_struct(struct task_struct *dst, struct task_struct *src);
38e7c572 250extern void arch_release_task_struct(struct task_struct *tsk);
e9ea1e7f
KH
251extern void arch_setup_new_exec(void);
252#define arch_setup_new_exec arch_setup_new_exec
5f870a3f
BP
253#endif /* !__ASSEMBLY__ */
254
1965aae3 255#endif /* _ASM_X86_THREAD_INFO_H */