Christoph Lameter | 2052e8d | 2008-05-12 15:43:41 +0200 | [diff] [blame] | 1 | /* thread_info.h: low-level thread information |
| 2 | * |
| 3 | * Copyright (C) 2002 David Howells (dhowells@redhat.com) |
| 4 | * - Incorporating suggestions made by Linus Torvalds and Dave Miller |
| 5 | */ |
| 6 | |
H. Peter Anvin | 1965aae | 2008-10-22 22:26:29 -0700 | [diff] [blame] | 7 | #ifndef _ASM_X86_THREAD_INFO_H |
| 8 | #define _ASM_X86_THREAD_INFO_H |
Christoph Lameter | 2052e8d | 2008-05-12 15:43:41 +0200 | [diff] [blame] | 9 | |
Christoph Lameter | 2052e8d | 2008-05-12 15:43:41 +0200 | [diff] [blame] | 10 | #include <linux/compiler.h> |
| 11 | #include <asm/page.h> |
Steven Rostedt | 198d208 | 2014-02-06 09:41:31 -0500 | [diff] [blame] | 12 | #include <asm/percpu.h> |
Christoph Lameter | 12a638e | 2008-04-28 18:52:33 -0700 | [diff] [blame] | 13 | #include <asm/types.h> |
| 14 | |
Christoph Lameter | 2052e8d | 2008-05-12 15:43:41 +0200 | [diff] [blame] | 15 | /* |
Andy Lutomirski | 3ee4298 | 2015-03-10 11:05:58 -0700 | [diff] [blame] | 16 | * TOP_OF_KERNEL_STACK_PADDING is a number of unused bytes that we |
| 17 | * reserve at the top of the kernel stack. We do it because of a nasty |
| 18 | * 32-bit corner case. On x86_32, the hardware stack frame is |
| 19 | * variable-length. Except for vm86 mode, struct pt_regs assumes a |
| 20 | * maximum-length frame. If we enter from CPL 0, the top 8 bytes of |
| 21 | * pt_regs don't actually exist. Ordinarily this doesn't matter, but it |
| 22 | * does in at least one case: |
| 23 | * |
| 24 | * If we take an NMI early enough in SYSENTER, then we can end up with |
| 25 | * pt_regs that extends above sp0. On the way out, in the espfix code, |
| 26 | * we can read the saved SS value, but that value will be above sp0. |
| 27 | * Without this offset, that can result in a page fault. (We are |
| 28 | * careful that, in this case, the value we read doesn't matter.) |
| 29 | * |
Brian Gerst | 5ed92a8 | 2015-07-29 01:41:19 -0400 | [diff] [blame] | 30 | * In vm86 mode, the hardware frame is much longer still, so add 16 |
| 31 | * bytes to make room for the real-mode segments. |
Andy Lutomirski | 3ee4298 | 2015-03-10 11:05:58 -0700 | [diff] [blame] | 32 | * |
| 33 | * x86_64 has a fixed-length stack frame. |
| 34 | */ |
| 35 | #ifdef CONFIG_X86_32 |
Brian Gerst | 5ed92a8 | 2015-07-29 01:41:19 -0400 | [diff] [blame] | 36 | # ifdef CONFIG_VM86 |
| 37 | # define TOP_OF_KERNEL_STACK_PADDING 16 |
| 38 | # else |
| 39 | # define TOP_OF_KERNEL_STACK_PADDING 8 |
| 40 | # endif |
Andy Lutomirski | 3ee4298 | 2015-03-10 11:05:58 -0700 | [diff] [blame] | 41 | #else |
| 42 | # define TOP_OF_KERNEL_STACK_PADDING 0 |
| 43 | #endif |
| 44 | |
| 45 | /* |
Christoph Lameter | 2052e8d | 2008-05-12 15:43:41 +0200 | [diff] [blame] | 46 | * low level task data that entry.S needs immediate access to |
| 47 | * - this struct should fit entirely inside of one cache line |
| 48 | * - this struct shares the supervisor stack pages |
Christoph Lameter | 2052e8d | 2008-05-12 15:43:41 +0200 | [diff] [blame] | 49 | */ |
| 50 | #ifndef __ASSEMBLY__ |
Christoph Lameter | 006c484 | 2008-04-28 18:52:35 -0700 | [diff] [blame] | 51 | struct task_struct; |
Borislav Petkov | cd4d09e | 2016-01-26 22:12:04 +0100 | [diff] [blame] | 52 | #include <asm/cpufeature.h> |
Arun Sharma | 60063497 | 2011-07-26 16:09:06 -0700 | [diff] [blame] | 53 | #include <linux/atomic.h> |
Christoph Lameter | 2052e8d | 2008-05-12 15:43:41 +0200 | [diff] [blame] | 54 | |
| 55 | struct thread_info { |
| 56 | struct task_struct *task; /* main task structure */ |
Joe Korty | affa219 | 2008-12-03 18:58:19 -0500 | [diff] [blame] | 57 | __u32 flags; /* low level flags */ |
Christoph Lameter | 2052e8d | 2008-05-12 15:43:41 +0200 | [diff] [blame] | 58 | __u32 cpu; /* current CPU */ |
Christoph Lameter | 2052e8d | 2008-05-12 15:43:41 +0200 | [diff] [blame] | 59 | }; |
Christoph Lameter | 3351cc0 | 2008-04-28 18:52:36 -0700 | [diff] [blame] | 60 | |
| 61 | #define INIT_THREAD_INFO(tsk) \ |
| 62 | { \ |
| 63 | .task = &tsk, \ |
Christoph Lameter | 3351cc0 | 2008-04-28 18:52:36 -0700 | [diff] [blame] | 64 | .flags = 0, \ |
| 65 | .cpu = 0, \ |
Christoph Lameter | 3351cc0 | 2008-04-28 18:52:36 -0700 | [diff] [blame] | 66 | } |
| 67 | |
| 68 | #define init_thread_info (init_thread_union.thread_info) |
| 69 | #define init_stack (init_thread_union.stack) |
| 70 | |
Christoph Lameter | 2052e8d | 2008-05-12 15:43:41 +0200 | [diff] [blame] | 71 | #else /* !__ASSEMBLY__ */ |
| 72 | |
| 73 | #include <asm/asm-offsets.h> |
| 74 | |
| 75 | #endif |
| 76 | |
Christoph Lameter | e57549b | 2008-04-28 18:52:38 -0700 | [diff] [blame] | 77 | /* |
| 78 | * thread information flags |
| 79 | * - these are process state flags that various assembly files |
| 80 | * may need to access |
| 81 | * - pending work-to-be-done flags are in LSW |
| 82 | * - other flags in MSW |
| 83 | * Warning: layout of LSW is hardcoded in entry.S |
| 84 | */ |
| 85 | #define TIF_SYSCALL_TRACE 0 /* syscall trace active */ |
Roland McGrath | 59e5213 | 2008-04-19 19:10:57 -0700 | [diff] [blame] | 86 | #define TIF_NOTIFY_RESUME 1 /* callback before returning to user */ |
Christoph Lameter | e57549b | 2008-04-28 18:52:38 -0700 | [diff] [blame] | 87 | #define TIF_SIGPENDING 2 /* signal pending */ |
| 88 | #define TIF_NEED_RESCHED 3 /* rescheduling necessary */ |
| 89 | #define TIF_SINGLESTEP 4 /* reenable singlestep on user return*/ |
Christoph Lameter | e57549b | 2008-04-28 18:52:38 -0700 | [diff] [blame] | 90 | #define TIF_SYSCALL_EMU 6 /* syscall emulation active */ |
Christoph Lameter | e57549b | 2008-04-28 18:52:38 -0700 | [diff] [blame] | 91 | #define TIF_SYSCALL_AUDIT 7 /* syscall auditing active */ |
| 92 | #define TIF_SECCOMP 8 /* secure computing */ |
Avi Kivity | 7c68af6 | 2009-09-19 09:40:22 +0300 | [diff] [blame] | 93 | #define TIF_USER_RETURN_NOTIFY 11 /* notify kernel of userspace return */ |
Srikar Dronamraju | 0326f5a | 2012-03-13 23:30:11 +0530 | [diff] [blame] | 94 | #define TIF_UPROBE 12 /* breakpointed or singlestepping */ |
Christoph Lameter | e57549b | 2008-04-28 18:52:38 -0700 | [diff] [blame] | 95 | #define TIF_NOTSC 16 /* TSC is not accessible in userland */ |
H. Peter Anvin | 6bd3300 | 2012-02-06 13:03:09 -0800 | [diff] [blame] | 96 | #define TIF_IA32 17 /* IA32 compatibility process */ |
Frederic Weisbecker | bf5a3c1 | 2012-07-11 20:26:34 +0200 | [diff] [blame] | 97 | #define TIF_NOHZ 19 /* in adaptive nohz mode */ |
Andreas Dilger | 0ddc932 | 2010-05-14 11:13:27 +0200 | [diff] [blame] | 98 | #define TIF_MEMDIE 20 /* is terminating due to OOM killer */ |
Peter Zijlstra | f80c5b3 | 2014-04-11 09:59:05 +0200 | [diff] [blame] | 99 | #define TIF_POLLING_NRFLAG 21 /* idle is polling for TIF_NEED_RESCHED */ |
Christoph Lameter | e57549b | 2008-04-28 18:52:38 -0700 | [diff] [blame] | 100 | #define TIF_IO_BITMAP 22 /* uses I/O bitmap */ |
Christoph Lameter | e57549b | 2008-04-28 18:52:38 -0700 | [diff] [blame] | 101 | #define TIF_FORCED_TF 24 /* true if TF in eflags artificially */ |
Peter Zijlstra | ea8e61b | 2010-03-25 14:51:51 +0100 | [diff] [blame] | 102 | #define TIF_BLOCKSTEP 25 /* set when we want DEBUGCTLMSR_BTF */ |
Jeremy Fitzhardinge | b407fc5 | 2009-02-17 23:46:21 -0800 | [diff] [blame] | 103 | #define TIF_LAZY_MMU_UPDATES 27 /* task is updating the mmu lazily */ |
Josh Stone | 6670000 | 2009-08-24 14:43:11 -0700 | [diff] [blame] | 104 | #define TIF_SYSCALL_TRACEPOINT 28 /* syscall tracepoint instrumentation */ |
H. Peter Anvin | 6bd3300 | 2012-02-06 13:03:09 -0800 | [diff] [blame] | 105 | #define TIF_ADDR32 29 /* 32-bit address space on 64 bits */ |
H. Peter Anvin | bb21272 | 2012-02-14 13:56:49 -0800 | [diff] [blame] | 106 | #define TIF_X32 30 /* 32-bit native x86-64 binary */ |
Christoph Lameter | e57549b | 2008-04-28 18:52:38 -0700 | [diff] [blame] | 107 | |
| 108 | #define _TIF_SYSCALL_TRACE (1 << TIF_SYSCALL_TRACE) |
Roland McGrath | 59e5213 | 2008-04-19 19:10:57 -0700 | [diff] [blame] | 109 | #define _TIF_NOTIFY_RESUME (1 << TIF_NOTIFY_RESUME) |
Christoph Lameter | e57549b | 2008-04-28 18:52:38 -0700 | [diff] [blame] | 110 | #define _TIF_SIGPENDING (1 << TIF_SIGPENDING) |
| 111 | #define _TIF_SINGLESTEP (1 << TIF_SINGLESTEP) |
| 112 | #define _TIF_NEED_RESCHED (1 << TIF_NEED_RESCHED) |
Christoph Lameter | e57549b | 2008-04-28 18:52:38 -0700 | [diff] [blame] | 113 | #define _TIF_SYSCALL_EMU (1 << TIF_SYSCALL_EMU) |
Christoph Lameter | e57549b | 2008-04-28 18:52:38 -0700 | [diff] [blame] | 114 | #define _TIF_SYSCALL_AUDIT (1 << TIF_SYSCALL_AUDIT) |
| 115 | #define _TIF_SECCOMP (1 << TIF_SECCOMP) |
Avi Kivity | 7c68af6 | 2009-09-19 09:40:22 +0300 | [diff] [blame] | 116 | #define _TIF_USER_RETURN_NOTIFY (1 << TIF_USER_RETURN_NOTIFY) |
Srikar Dronamraju | 0326f5a | 2012-03-13 23:30:11 +0530 | [diff] [blame] | 117 | #define _TIF_UPROBE (1 << TIF_UPROBE) |
Christoph Lameter | e57549b | 2008-04-28 18:52:38 -0700 | [diff] [blame] | 118 | #define _TIF_NOTSC (1 << TIF_NOTSC) |
| 119 | #define _TIF_IA32 (1 << TIF_IA32) |
Frederic Weisbecker | bf5a3c1 | 2012-07-11 20:26:34 +0200 | [diff] [blame] | 120 | #define _TIF_NOHZ (1 << TIF_NOHZ) |
Peter Zijlstra | f80c5b3 | 2014-04-11 09:59:05 +0200 | [diff] [blame] | 121 | #define _TIF_POLLING_NRFLAG (1 << TIF_POLLING_NRFLAG) |
Christoph Lameter | e57549b | 2008-04-28 18:52:38 -0700 | [diff] [blame] | 122 | #define _TIF_IO_BITMAP (1 << TIF_IO_BITMAP) |
Christoph Lameter | e57549b | 2008-04-28 18:52:38 -0700 | [diff] [blame] | 123 | #define _TIF_FORCED_TF (1 << TIF_FORCED_TF) |
Peter Zijlstra | ea8e61b | 2010-03-25 14:51:51 +0100 | [diff] [blame] | 124 | #define _TIF_BLOCKSTEP (1 << TIF_BLOCKSTEP) |
Jeremy Fitzhardinge | b407fc5 | 2009-02-17 23:46:21 -0800 | [diff] [blame] | 125 | #define _TIF_LAZY_MMU_UPDATES (1 << TIF_LAZY_MMU_UPDATES) |
Josh Stone | 6670000 | 2009-08-24 14:43:11 -0700 | [diff] [blame] | 126 | #define _TIF_SYSCALL_TRACEPOINT (1 << TIF_SYSCALL_TRACEPOINT) |
H. Peter Anvin | 6bd3300 | 2012-02-06 13:03:09 -0800 | [diff] [blame] | 127 | #define _TIF_ADDR32 (1 << TIF_ADDR32) |
H. Peter Anvin | bb21272 | 2012-02-14 13:56:49 -0800 | [diff] [blame] | 128 | #define _TIF_X32 (1 << TIF_X32) |
Christoph Lameter | e57549b | 2008-04-28 18:52:38 -0700 | [diff] [blame] | 129 | |
Andy Lutomirski | 9999c8c | 2016-03-09 13:24:33 -0800 | [diff] [blame] | 130 | /* |
| 131 | * work to do in syscall_trace_enter(). Also includes TIF_NOHZ for |
| 132 | * enter_from_user_mode() |
| 133 | */ |
Roland McGrath | d4d6715 | 2008-07-09 02:38:07 -0700 | [diff] [blame] | 134 | #define _TIF_WORK_SYSCALL_ENTRY \ |
Josh Stone | 6670000 | 2009-08-24 14:43:11 -0700 | [diff] [blame] | 135 | (_TIF_SYSCALL_TRACE | _TIF_SYSCALL_EMU | _TIF_SYSCALL_AUDIT | \ |
Andy Lutomirski | 392a625 | 2016-03-09 19:00:34 -0800 | [diff] [blame] | 136 | _TIF_SECCOMP | _TIF_SYSCALL_TRACEPOINT | \ |
Frederic Weisbecker | bf5a3c1 | 2012-07-11 20:26:34 +0200 | [diff] [blame] | 137 | _TIF_NOHZ) |
Roland McGrath | d4d6715 | 2008-07-09 02:38:07 -0700 | [diff] [blame] | 138 | |
Christoph Lameter | 00c1bb1 | 2008-04-28 18:52:39 -0700 | [diff] [blame] | 139 | /* work to do on any return to user space */ |
Josh Stone | 6670000 | 2009-08-24 14:43:11 -0700 | [diff] [blame] | 140 | #define _TIF_ALLWORK_MASK \ |
Frederic Weisbecker | bf5a3c1 | 2012-07-11 20:26:34 +0200 | [diff] [blame] | 141 | ((0x0000FFFF & ~_TIF_SECCOMP) | _TIF_SYSCALL_TRACEPOINT | \ |
| 142 | _TIF_NOHZ) |
Christoph Lameter | 00c1bb1 | 2008-04-28 18:52:39 -0700 | [diff] [blame] | 143 | |
Christoph Lameter | 00c1bb1 | 2008-04-28 18:52:39 -0700 | [diff] [blame] | 144 | /* flags to check in __switch_to() */ |
| 145 | #define _TIF_WORK_CTXSW \ |
Peter Zijlstra | ea8e61b | 2010-03-25 14:51:51 +0100 | [diff] [blame] | 146 | (_TIF_IO_BITMAP|_TIF_NOTSC|_TIF_BLOCKSTEP) |
Christoph Lameter | 00c1bb1 | 2008-04-28 18:52:39 -0700 | [diff] [blame] | 147 | |
Avi Kivity | 7c68af6 | 2009-09-19 09:40:22 +0300 | [diff] [blame] | 148 | #define _TIF_WORK_CTXSW_PREV (_TIF_WORK_CTXSW|_TIF_USER_RETURN_NOTIFY) |
Oleg Nesterov | 37f0765 | 2013-07-03 15:08:11 -0700 | [diff] [blame] | 149 | #define _TIF_WORK_CTXSW_NEXT (_TIF_WORK_CTXSW) |
Christoph Lameter | 00c1bb1 | 2008-04-28 18:52:39 -0700 | [diff] [blame] | 150 | |
Steven Rostedt | 198d208 | 2014-02-06 09:41:31 -0500 | [diff] [blame] | 151 | #define STACK_WARN (THREAD_SIZE/8) |
Christoph Lameter | 006c484 | 2008-04-28 18:52:35 -0700 | [diff] [blame] | 152 | |
Christoph Lameter | 2052e8d | 2008-05-12 15:43:41 +0200 | [diff] [blame] | 153 | /* |
| 154 | * macros/functions for gaining access to the thread information structure |
| 155 | * |
| 156 | * preempt_count needs to be 1 initially, until the scheduler is functional. |
| 157 | */ |
| 158 | #ifndef __ASSEMBLY__ |
| 159 | |
Christoph Lameter | 2052e8d | 2008-05-12 15:43:41 +0200 | [diff] [blame] | 160 | static inline struct thread_info *current_thread_info(void) |
| 161 | { |
Andy Lutomirski | a7fcf28 | 2015-03-06 17:50:19 -0800 | [diff] [blame] | 162 | return (struct thread_info *)(current_top_of_stack() - THREAD_SIZE); |
Christoph Lameter | 2052e8d | 2008-05-12 15:43:41 +0200 | [diff] [blame] | 163 | } |
| 164 | |
Andy Lutomirski | 83653c1 | 2014-11-13 15:57:07 -0800 | [diff] [blame] | 165 | static inline unsigned long current_stack_pointer(void) |
| 166 | { |
| 167 | unsigned long sp; |
| 168 | #ifdef CONFIG_X86_64 |
| 169 | asm("mov %%rsp,%0" : "=g" (sp)); |
| 170 | #else |
| 171 | asm("mov %%esp,%0" : "=g" (sp)); |
| 172 | #endif |
| 173 | return sp; |
| 174 | } |
| 175 | |
Kees Cook | 0f60a8e | 2016-07-12 16:19:48 -0700 | [diff] [blame] | 176 | /* |
| 177 | * Walks up the stack frames to make sure that the specified object is |
| 178 | * entirely contained by a single stack frame. |
| 179 | * |
| 180 | * Returns: |
| 181 | * 1 if within a frame |
| 182 | * -1 if placed across a frame boundary (or outside stack) |
| 183 | * 0 unable to determine (no frame pointers, etc) |
| 184 | */ |
| 185 | static inline int arch_within_stack_frames(const void * const stack, |
| 186 | const void * const stackend, |
| 187 | const void *obj, unsigned long len) |
| 188 | { |
| 189 | #if defined(CONFIG_FRAME_POINTER) |
| 190 | const void *frame = NULL; |
| 191 | const void *oldframe; |
| 192 | |
| 193 | oldframe = __builtin_frame_address(1); |
| 194 | if (oldframe) |
| 195 | frame = __builtin_frame_address(2); |
| 196 | /* |
| 197 | * low ----------------------------------------------> high |
| 198 | * [saved bp][saved ip][args][local vars][saved bp][saved ip] |
| 199 | * ^----------------^ |
| 200 | * allow copies only within here |
| 201 | */ |
| 202 | while (stack <= frame && frame < stackend) { |
| 203 | /* |
| 204 | * If obj + len extends past the last frame, this |
| 205 | * check won't pass and the next frame will be 0, |
| 206 | * causing us to bail out and correctly report |
| 207 | * the copy as invalid. |
| 208 | */ |
| 209 | if (obj + len <= frame) |
| 210 | return obj >= oldframe + 2 * sizeof(void *) ? 1 : -1; |
| 211 | oldframe = frame; |
| 212 | frame = *(const void * const *)frame; |
| 213 | } |
| 214 | return -1; |
| 215 | #else |
| 216 | return 0; |
| 217 | #endif |
| 218 | } |
| 219 | |
Christoph Lameter | 2052e8d | 2008-05-12 15:43:41 +0200 | [diff] [blame] | 220 | #else /* !__ASSEMBLY__ */ |
| 221 | |
Denys Vlasenko | 3a23208 | 2015-04-24 17:31:35 +0200 | [diff] [blame] | 222 | #ifdef CONFIG_X86_64 |
| 223 | # define cpu_current_top_of_stack (cpu_tss + TSS_sp0) |
| 224 | #endif |
| 225 | |
Jan Beulich | 46db09d | 2011-11-29 11:17:45 +0000 | [diff] [blame] | 226 | /* |
Ingo Molnar | 1ddc6f3 | 2015-03-24 19:43:11 +0100 | [diff] [blame] | 227 | * ASM operand which evaluates to a 'thread_info' address of |
| 228 | * the current task, if it is known that "reg" is exactly "off" |
| 229 | * bytes below the top of the stack currently. |
| 230 | * |
| 231 | * ( The kernel stack's size is known at build time, it is usually |
| 232 | * 2 or 4 pages, and the bottom of the kernel stack contains |
| 233 | * the thread_info structure. So to access the thread_info very |
| 234 | * quickly from assembly code we can calculate down from the |
| 235 | * top of the kernel stack to the bottom, using constant, |
| 236 | * build-time calculations only. ) |
| 237 | * |
| 238 | * For example, to fetch the current thread_info->flags value into %eax |
| 239 | * on x86-64 defconfig kernels, in syscall entry code where RSP is |
| 240 | * currently at exactly SIZEOF_PTREGS bytes away from the top of the |
| 241 | * stack: |
| 242 | * |
Ingo Molnar | dca5b52 | 2015-03-24 19:44:42 +0100 | [diff] [blame] | 243 | * mov ASM_THREAD_INFO(TI_flags, %rsp, SIZEOF_PTREGS), %eax |
Ingo Molnar | 1ddc6f3 | 2015-03-24 19:43:11 +0100 | [diff] [blame] | 244 | * |
| 245 | * will translate to: |
| 246 | * |
| 247 | * 8b 84 24 b8 c0 ff ff mov -0x3f48(%rsp), %eax |
| 248 | * |
| 249 | * which is below the current RSP by almost 16K. |
Jan Beulich | 46db09d | 2011-11-29 11:17:45 +0000 | [diff] [blame] | 250 | */ |
Ingo Molnar | dca5b52 | 2015-03-24 19:44:42 +0100 | [diff] [blame] | 251 | #define ASM_THREAD_INFO(field, reg, off) ((field)+(off)-THREAD_SIZE)(reg) |
Jan Beulich | 46db09d | 2011-11-29 11:17:45 +0000 | [diff] [blame] | 252 | |
Christoph Lameter | 2052e8d | 2008-05-12 15:43:41 +0200 | [diff] [blame] | 253 | #endif |
| 254 | |
Andy Lutomirski | 609c19a | 2016-07-26 23:12:22 -0700 | [diff] [blame] | 255 | #ifdef CONFIG_COMPAT |
| 256 | #define TS_I386_REGS_POKED 0x0004 /* regs poked by 32-bit ptracer */ |
| 257 | #endif |
Suresh Siddha | 61c4628 | 2008-03-10 15:28:04 -0700 | [diff] [blame] | 258 | #ifndef __ASSEMBLY__ |
Srikar Dronamraju | ef334a2 | 2012-03-13 19:33:03 +0530 | [diff] [blame] | 259 | |
Srikar Dronamraju | ef334a2 | 2012-03-13 19:33:03 +0530 | [diff] [blame] | 260 | #ifdef CONFIG_X86_32 |
Andy Lutomirski | b9d989c | 2016-09-13 14:29:21 -0700 | [diff] [blame^] | 261 | #define in_ia32_syscall() true |
| 262 | #else |
| 263 | #define in_ia32_syscall() (IS_ENABLED(CONFIG_IA32_EMULATION) && \ |
| 264 | current->thread.status & TS_COMPAT) |
Srikar Dronamraju | ef334a2 | 2012-03-13 19:33:03 +0530 | [diff] [blame] | 265 | #endif |
Brian Gerst | 1daeaa3 | 2015-03-21 18:54:21 -0400 | [diff] [blame] | 266 | |
| 267 | /* |
| 268 | * Force syscall return via IRET by making it look as if there was |
| 269 | * some work pending. IRET is our most capable (but slowest) syscall |
| 270 | * return path, which is able to restore modified SS, CS and certain |
| 271 | * EFLAGS values that other (fast) syscall return instructions |
| 272 | * are not able to restore properly. |
| 273 | */ |
| 274 | #define force_iret() set_thread_flag(TIF_NOTIFY_RESUME) |
| 275 | |
Suresh Siddha | 61c4628 | 2008-03-10 15:28:04 -0700 | [diff] [blame] | 276 | extern void arch_task_cache_init(void); |
Suresh Siddha | 61c4628 | 2008-03-10 15:28:04 -0700 | [diff] [blame] | 277 | extern int arch_dup_task_struct(struct task_struct *dst, struct task_struct *src); |
Thomas Gleixner | 38e7c57 | 2012-05-05 15:05:42 +0000 | [diff] [blame] | 278 | extern void arch_release_task_struct(struct task_struct *tsk); |
Borislav Petkov | 5f870a3 | 2016-03-28 20:20:17 +0200 | [diff] [blame] | 279 | #endif /* !__ASSEMBLY__ */ |
| 280 | |
H. Peter Anvin | 1965aae | 2008-10-22 22:26:29 -0700 | [diff] [blame] | 281 | #endif /* _ASM_X86_THREAD_INFO_H */ |