2008-05-12 20:43:41 +07:00
|
|
|
/* thread_info.h: low-level thread information
|
|
|
|
*
|
|
|
|
* Copyright (C) 2002 David Howells (dhowells@redhat.com)
|
|
|
|
* - Incorporating suggestions made by Linus Torvalds and Dave Miller
|
|
|
|
*/
|
|
|
|
|
2008-10-23 12:26:29 +07:00
|
|
|
#ifndef _ASM_X86_THREAD_INFO_H
|
|
|
|
#define _ASM_X86_THREAD_INFO_H
|
2008-05-12 20:43:41 +07:00
|
|
|
|
|
|
|
#include <linux/compiler.h>
|
|
|
|
#include <asm/page.h>
|
2014-02-06 21:41:31 +07:00
|
|
|
#include <asm/percpu.h>
|
2008-04-29 08:52:33 +07:00
|
|
|
#include <asm/types.h>
|
|
|
|
|
2015-03-11 01:05:58 +07:00
|
|
|
/*
|
|
|
|
* TOP_OF_KERNEL_STACK_PADDING is a number of unused bytes that we
|
|
|
|
* reserve at the top of the kernel stack. We do it because of a nasty
|
|
|
|
* 32-bit corner case. On x86_32, the hardware stack frame is
|
|
|
|
* variable-length. Except for vm86 mode, struct pt_regs assumes a
|
|
|
|
* maximum-length frame. If we enter from CPL 0, the top 8 bytes of
|
|
|
|
* pt_regs don't actually exist. Ordinarily this doesn't matter, but it
|
|
|
|
* does in at least one case:
|
|
|
|
*
|
|
|
|
* If we take an NMI early enough in SYSENTER, then we can end up with
|
|
|
|
* pt_regs that extends above sp0. On the way out, in the espfix code,
|
|
|
|
* we can read the saved SS value, but that value will be above sp0.
|
|
|
|
* Without this offset, that can result in a page fault. (We are
|
|
|
|
* careful that, in this case, the value we read doesn't matter.)
|
|
|
|
*
|
2015-07-29 12:41:19 +07:00
|
|
|
* In vm86 mode, the hardware frame is much longer still, so add 16
|
|
|
|
* bytes to make room for the real-mode segments.
|
2015-03-11 01:05:58 +07:00
|
|
|
*
|
|
|
|
* x86_64 has a fixed-length stack frame.
|
|
|
|
*/
|
|
|
|
#ifdef CONFIG_X86_32
|
2015-07-29 12:41:19 +07:00
|
|
|
# ifdef CONFIG_VM86
|
|
|
|
# define TOP_OF_KERNEL_STACK_PADDING 16
|
|
|
|
# else
|
|
|
|
# define TOP_OF_KERNEL_STACK_PADDING 8
|
|
|
|
# endif
|
2015-03-11 01:05:58 +07:00
|
|
|
#else
|
|
|
|
# define TOP_OF_KERNEL_STACK_PADDING 0
|
|
|
|
#endif
|
|
|
|
|
2008-05-12 20:43:41 +07:00
|
|
|
/*
|
|
|
|
* low level task data that entry.S needs immediate access to
|
|
|
|
* - this struct should fit entirely inside of one cache line
|
|
|
|
* - this struct shares the supervisor stack pages
|
|
|
|
*/
|
|
|
|
#ifndef __ASSEMBLY__
|
2008-04-29 08:52:35 +07:00
|
|
|
struct task_struct;
|
2016-01-27 04:12:04 +07:00
|
|
|
#include <asm/cpufeature.h>
|
2011-07-27 06:09:06 +07:00
|
|
|
#include <linux/atomic.h>
|
2008-05-12 20:43:41 +07:00
|
|
|
|
|
|
|
struct thread_info {
|
|
|
|
struct task_struct *task; /* main task structure */
|
2008-12-04 06:58:19 +07:00
|
|
|
__u32 flags; /* low level flags */
|
2008-05-12 20:43:41 +07:00
|
|
|
__u32 cpu; /* current CPU */
|
|
|
|
};
|
2008-04-29 08:52:36 +07:00
|
|
|
|
|
|
|
#define INIT_THREAD_INFO(tsk) \
|
|
|
|
{ \
|
|
|
|
.task = &tsk, \
|
|
|
|
.flags = 0, \
|
|
|
|
.cpu = 0, \
|
|
|
|
}
|
|
|
|
|
|
|
|
#define init_thread_info (init_thread_union.thread_info)
|
|
|
|
#define init_stack (init_thread_union.stack)
|
|
|
|
|
2008-05-12 20:43:41 +07:00
|
|
|
#else /* !__ASSEMBLY__ */
|
|
|
|
|
|
|
|
#include <asm/asm-offsets.h>
|
|
|
|
|
|
|
|
#endif
|
|
|
|
|
2008-04-29 08:52:38 +07:00
|
|
|
/*
|
|
|
|
* thread information flags
|
|
|
|
* - these are process state flags that various assembly files
|
|
|
|
* may need to access
|
|
|
|
* - pending work-to-be-done flags are in LSW
|
|
|
|
* - other flags in MSW
|
|
|
|
* Warning: layout of LSW is hardcoded in entry.S
|
|
|
|
*/
|
|
|
|
#define TIF_SYSCALL_TRACE 0 /* syscall trace active */
|
2008-04-20 09:10:57 +07:00
|
|
|
#define TIF_NOTIFY_RESUME 1 /* callback before returning to user */
|
2008-04-29 08:52:38 +07:00
|
|
|
#define TIF_SIGPENDING 2 /* signal pending */
|
|
|
|
#define TIF_NEED_RESCHED 3 /* rescheduling necessary */
|
|
|
|
#define TIF_SINGLESTEP 4 /* reenable singlestep on user return*/
|
|
|
|
#define TIF_SYSCALL_EMU 6 /* syscall emulation active */
|
|
|
|
#define TIF_SYSCALL_AUDIT 7 /* syscall auditing active */
|
|
|
|
#define TIF_SECCOMP 8 /* secure computing */
|
2009-09-19 13:40:22 +07:00
|
|
|
#define TIF_USER_RETURN_NOTIFY 11 /* notify kernel of userspace return */
|
uprobes/core: Handle breakpoint and singlestep exceptions
Uprobes uses exception notifiers to get to know if a thread hit
a breakpoint or a singlestep exception.
When a thread hits a uprobe or is singlestepping post a uprobe
hit, the uprobe exception notifier sets its TIF_UPROBE bit,
which will then be checked on its return to userspace path
(do_notify_resume() ->uprobe_notify_resume()), where the
consumers handlers are run (in task context) based on the
defined filters.
Uprobe hits are thread specific and hence we need to maintain
information about if a task hit a uprobe, what uprobe was hit,
the slot where the original instruction was copied for xol so
that it can be singlestepped with appropriate fixups.
In some cases, special care is needed for instructions that are
executed out of line (xol). These are architecture specific
artefacts, such as handling RIP relative instructions on x86_64.
Since the instruction at which the uprobe was inserted is
executed out of line, architecture specific fixups are added so
that the thread continues normal execution in the presence of a
uprobe.
Postpone the signals until we execute the probed insn.
post_xol() path does a recalc_sigpending() before return to
user-mode, this ensures the signal can't be lost.
Uprobes relies on DIE_DEBUG notification to notify if a
singlestep is complete.
Adds x86 specific uprobe exception notifiers and appropriate
hooks needed to determine a uprobe hit and subsequent post
processing.
Add requisite x86 fixups for xol for uprobes. Specific cases
needing fixups include relative jumps (x86_64), calls, etc.
Where possible, we check and skip singlestepping the
breakpointed instructions. For now we skip single byte as well
as few multibyte nop instructions. However this can be extended
to other instructions too.
Credits to Oleg Nesterov for suggestions/patches related to
signal, breakpoint, singlestep handling code.
Signed-off-by: Srikar Dronamraju <srikar@linux.vnet.ibm.com>
Cc: Linus Torvalds <torvalds@linux-foundation.org>
Cc: Ananth N Mavinakayanahalli <ananth@in.ibm.com>
Cc: Jim Keniston <jkenisto@linux.vnet.ibm.com>
Cc: Linux-mm <linux-mm@kvack.org>
Cc: Oleg Nesterov <oleg@redhat.com>
Cc: Andi Kleen <andi@firstfloor.org>
Cc: Christoph Hellwig <hch@infradead.org>
Cc: Steven Rostedt <rostedt@goodmis.org>
Cc: Arnaldo Carvalho de Melo <acme@infradead.org>
Cc: Masami Hiramatsu <masami.hiramatsu.pt@hitachi.com>
Cc: Peter Zijlstra <peterz@infradead.org>
Link: http://lkml.kernel.org/r/20120313180011.29771.89027.sendpatchset@srdronam.in.ibm.com
[ Performed various cleanliness edits ]
Signed-off-by: Ingo Molnar <mingo@elte.hu>
2012-03-14 01:00:11 +07:00
|
|
|
#define TIF_UPROBE 12 /* breakpointed or singlestepping */
|
2008-04-29 08:52:38 +07:00
|
|
|
#define TIF_NOTSC 16 /* TSC is not accessible in userland */
|
2012-02-07 04:03:09 +07:00
|
|
|
#define TIF_IA32 17 /* IA32 compatibility process */
|
2012-07-12 01:26:34 +07:00
|
|
|
#define TIF_NOHZ 19 /* in adaptive nohz mode */
|
2010-05-14 16:13:27 +07:00
|
|
|
#define TIF_MEMDIE 20 /* is terminating due to OOM killer */
|
2014-04-11 14:59:05 +07:00
|
|
|
#define TIF_POLLING_NRFLAG 21 /* idle is polling for TIF_NEED_RESCHED */
|
2008-04-29 08:52:38 +07:00
|
|
|
#define TIF_IO_BITMAP 22 /* uses I/O bitmap */
|
|
|
|
#define TIF_FORCED_TF 24 /* true if TF in eflags artificially */
|
2010-03-25 20:51:51 +07:00
|
|
|
#define TIF_BLOCKSTEP 25 /* set when we want DEBUGCTLMSR_BTF */
|
2009-02-18 14:46:21 +07:00
|
|
|
#define TIF_LAZY_MMU_UPDATES 27 /* task is updating the mmu lazily */
|
2009-08-25 04:43:11 +07:00
|
|
|
#define TIF_SYSCALL_TRACEPOINT 28 /* syscall tracepoint instrumentation */
|
2012-02-07 04:03:09 +07:00
|
|
|
#define TIF_ADDR32 29 /* 32-bit address space on 64 bits */
|
2012-02-15 04:56:49 +07:00
|
|
|
#define TIF_X32 30 /* 32-bit native x86-64 binary */
|
2008-04-29 08:52:38 +07:00
|
|
|
|
|
|
|
#define _TIF_SYSCALL_TRACE (1 << TIF_SYSCALL_TRACE)
|
2008-04-20 09:10:57 +07:00
|
|
|
#define _TIF_NOTIFY_RESUME (1 << TIF_NOTIFY_RESUME)
|
2008-04-29 08:52:38 +07:00
|
|
|
#define _TIF_SIGPENDING (1 << TIF_SIGPENDING)
|
|
|
|
#define _TIF_SINGLESTEP (1 << TIF_SINGLESTEP)
|
|
|
|
#define _TIF_NEED_RESCHED (1 << TIF_NEED_RESCHED)
|
|
|
|
#define _TIF_SYSCALL_EMU (1 << TIF_SYSCALL_EMU)
|
|
|
|
#define _TIF_SYSCALL_AUDIT (1 << TIF_SYSCALL_AUDIT)
|
|
|
|
#define _TIF_SECCOMP (1 << TIF_SECCOMP)
|
2009-09-19 13:40:22 +07:00
|
|
|
#define _TIF_USER_RETURN_NOTIFY (1 << TIF_USER_RETURN_NOTIFY)
|
uprobes/core: Handle breakpoint and singlestep exceptions
Uprobes uses exception notifiers to get to know if a thread hit
a breakpoint or a singlestep exception.
When a thread hits a uprobe or is singlestepping post a uprobe
hit, the uprobe exception notifier sets its TIF_UPROBE bit,
which will then be checked on its return to userspace path
(do_notify_resume() ->uprobe_notify_resume()), where the
consumers handlers are run (in task context) based on the
defined filters.
Uprobe hits are thread specific and hence we need to maintain
information about if a task hit a uprobe, what uprobe was hit,
the slot where the original instruction was copied for xol so
that it can be singlestepped with appropriate fixups.
In some cases, special care is needed for instructions that are
executed out of line (xol). These are architecture specific
artefacts, such as handling RIP relative instructions on x86_64.
Since the instruction at which the uprobe was inserted is
executed out of line, architecture specific fixups are added so
that the thread continues normal execution in the presence of a
uprobe.
Postpone the signals until we execute the probed insn.
post_xol() path does a recalc_sigpending() before return to
user-mode, this ensures the signal can't be lost.
Uprobes relies on DIE_DEBUG notification to notify if a
singlestep is complete.
Adds x86 specific uprobe exception notifiers and appropriate
hooks needed to determine a uprobe hit and subsequent post
processing.
Add requisite x86 fixups for xol for uprobes. Specific cases
needing fixups include relative jumps (x86_64), calls, etc.
Where possible, we check and skip singlestepping the
breakpointed instructions. For now we skip single byte as well
as few multibyte nop instructions. However this can be extended
to other instructions too.
Credits to Oleg Nesterov for suggestions/patches related to
signal, breakpoint, singlestep handling code.
Signed-off-by: Srikar Dronamraju <srikar@linux.vnet.ibm.com>
Cc: Linus Torvalds <torvalds@linux-foundation.org>
Cc: Ananth N Mavinakayanahalli <ananth@in.ibm.com>
Cc: Jim Keniston <jkenisto@linux.vnet.ibm.com>
Cc: Linux-mm <linux-mm@kvack.org>
Cc: Oleg Nesterov <oleg@redhat.com>
Cc: Andi Kleen <andi@firstfloor.org>
Cc: Christoph Hellwig <hch@infradead.org>
Cc: Steven Rostedt <rostedt@goodmis.org>
Cc: Arnaldo Carvalho de Melo <acme@infradead.org>
Cc: Masami Hiramatsu <masami.hiramatsu.pt@hitachi.com>
Cc: Peter Zijlstra <peterz@infradead.org>
Link: http://lkml.kernel.org/r/20120313180011.29771.89027.sendpatchset@srdronam.in.ibm.com
[ Performed various cleanliness edits ]
Signed-off-by: Ingo Molnar <mingo@elte.hu>
2012-03-14 01:00:11 +07:00
|
|
|
#define _TIF_UPROBE (1 << TIF_UPROBE)
|
2008-04-29 08:52:38 +07:00
|
|
|
#define _TIF_NOTSC (1 << TIF_NOTSC)
|
|
|
|
#define _TIF_IA32 (1 << TIF_IA32)
|
2012-07-12 01:26:34 +07:00
|
|
|
#define _TIF_NOHZ (1 << TIF_NOHZ)
|
2014-04-11 14:59:05 +07:00
|
|
|
#define _TIF_POLLING_NRFLAG (1 << TIF_POLLING_NRFLAG)
|
2008-04-29 08:52:38 +07:00
|
|
|
#define _TIF_IO_BITMAP (1 << TIF_IO_BITMAP)
|
|
|
|
#define _TIF_FORCED_TF (1 << TIF_FORCED_TF)
|
2010-03-25 20:51:51 +07:00
|
|
|
#define _TIF_BLOCKSTEP (1 << TIF_BLOCKSTEP)
|
2009-02-18 14:46:21 +07:00
|
|
|
#define _TIF_LAZY_MMU_UPDATES (1 << TIF_LAZY_MMU_UPDATES)
|
2009-08-25 04:43:11 +07:00
|
|
|
#define _TIF_SYSCALL_TRACEPOINT (1 << TIF_SYSCALL_TRACEPOINT)
|
2012-02-07 04:03:09 +07:00
|
|
|
#define _TIF_ADDR32 (1 << TIF_ADDR32)
|
2012-02-15 04:56:49 +07:00
|
|
|
#define _TIF_X32 (1 << TIF_X32)
|
2008-04-29 08:52:38 +07:00
|
|
|
|
2016-03-10 04:24:33 +07:00
|
|
|
/*
|
|
|
|
* work to do in syscall_trace_enter(). Also includes TIF_NOHZ for
|
|
|
|
* enter_from_user_mode()
|
|
|
|
*/
|
2008-07-09 16:38:07 +07:00
|
|
|
#define _TIF_WORK_SYSCALL_ENTRY \
|
2009-08-25 04:43:11 +07:00
|
|
|
(_TIF_SYSCALL_TRACE | _TIF_SYSCALL_EMU | _TIF_SYSCALL_AUDIT | \
|
2016-03-10 10:00:34 +07:00
|
|
|
_TIF_SECCOMP | _TIF_SYSCALL_TRACEPOINT | \
|
2012-07-12 01:26:34 +07:00
|
|
|
_TIF_NOHZ)
|
2008-07-09 16:38:07 +07:00
|
|
|
|
2008-04-29 08:52:39 +07:00
|
|
|
/* work to do on any return to user space */
|
2009-08-25 04:43:11 +07:00
|
|
|
#define _TIF_ALLWORK_MASK \
|
2012-07-12 01:26:34 +07:00
|
|
|
((0x0000FFFF & ~_TIF_SECCOMP) | _TIF_SYSCALL_TRACEPOINT | \
|
|
|
|
_TIF_NOHZ)
|
2008-04-29 08:52:39 +07:00
|
|
|
|
|
|
|
/* flags to check in __switch_to() */
|
|
|
|
#define _TIF_WORK_CTXSW \
|
2010-03-25 20:51:51 +07:00
|
|
|
(_TIF_IO_BITMAP|_TIF_NOTSC|_TIF_BLOCKSTEP)
|
2008-04-29 08:52:39 +07:00
|
|
|
|
2009-09-19 13:40:22 +07:00
|
|
|
#define _TIF_WORK_CTXSW_PREV (_TIF_WORK_CTXSW|_TIF_USER_RETURN_NOTIFY)
|
2013-07-04 05:08:11 +07:00
|
|
|
#define _TIF_WORK_CTXSW_NEXT (_TIF_WORK_CTXSW)
|
2008-04-29 08:52:39 +07:00
|
|
|
|
2014-02-06 21:41:31 +07:00
|
|
|
#define STACK_WARN (THREAD_SIZE/8)
|
2008-04-29 08:52:40 +07:00
|
|
|
|
2008-05-12 20:43:41 +07:00
|
|
|
/*
|
|
|
|
* macros/functions for gaining access to the thread information structure
|
|
|
|
*
|
|
|
|
* preempt_count needs to be 1 initially, until the scheduler is functional.
|
|
|
|
*/
|
|
|
|
#ifndef __ASSEMBLY__
|
|
|
|
|
2009-01-18 22:38:58 +07:00
|
|
|
static inline struct thread_info *current_thread_info(void)
|
2008-05-12 20:43:41 +07:00
|
|
|
{
|
2015-03-07 08:50:19 +07:00
|
|
|
return (struct thread_info *)(current_top_of_stack() - THREAD_SIZE);
|
2008-05-12 20:43:41 +07:00
|
|
|
}
|
|
|
|
|
2014-11-14 06:57:07 +07:00
|
|
|
static inline unsigned long current_stack_pointer(void)
|
|
|
|
{
|
|
|
|
unsigned long sp;
|
|
|
|
#ifdef CONFIG_X86_64
|
|
|
|
asm("mov %%rsp,%0" : "=g" (sp));
|
|
|
|
#else
|
|
|
|
asm("mov %%esp,%0" : "=g" (sp));
|
|
|
|
#endif
|
|
|
|
return sp;
|
|
|
|
}
|
|
|
|
|
2016-07-13 06:19:48 +07:00
|
|
|
/*
|
|
|
|
* Walks up the stack frames to make sure that the specified object is
|
|
|
|
* entirely contained by a single stack frame.
|
|
|
|
*
|
|
|
|
* Returns:
|
|
|
|
* 1 if within a frame
|
|
|
|
* -1 if placed across a frame boundary (or outside stack)
|
|
|
|
* 0 unable to determine (no frame pointers, etc)
|
|
|
|
*/
|
|
|
|
static inline int arch_within_stack_frames(const void * const stack,
|
|
|
|
const void * const stackend,
|
|
|
|
const void *obj, unsigned long len)
|
|
|
|
{
|
|
|
|
#if defined(CONFIG_FRAME_POINTER)
|
|
|
|
const void *frame = NULL;
|
|
|
|
const void *oldframe;
|
|
|
|
|
|
|
|
oldframe = __builtin_frame_address(1);
|
|
|
|
if (oldframe)
|
|
|
|
frame = __builtin_frame_address(2);
|
|
|
|
/*
|
|
|
|
* low ----------------------------------------------> high
|
|
|
|
* [saved bp][saved ip][args][local vars][saved bp][saved ip]
|
|
|
|
* ^----------------^
|
|
|
|
* allow copies only within here
|
|
|
|
*/
|
|
|
|
while (stack <= frame && frame < stackend) {
|
|
|
|
/*
|
|
|
|
* If obj + len extends past the last frame, this
|
|
|
|
* check won't pass and the next frame will be 0,
|
|
|
|
* causing us to bail out and correctly report
|
|
|
|
* the copy as invalid.
|
|
|
|
*/
|
|
|
|
if (obj + len <= frame)
|
|
|
|
return obj >= oldframe + 2 * sizeof(void *) ? 1 : -1;
|
|
|
|
oldframe = frame;
|
|
|
|
frame = *(const void * const *)frame;
|
|
|
|
}
|
|
|
|
return -1;
|
|
|
|
#else
|
|
|
|
return 0;
|
|
|
|
#endif
|
|
|
|
}
|
|
|
|
|
2008-05-12 20:43:41 +07:00
|
|
|
#else /* !__ASSEMBLY__ */
|
|
|
|
|
2015-04-24 22:31:35 +07:00
|
|
|
#ifdef CONFIG_X86_64
|
|
|
|
# define cpu_current_top_of_stack (cpu_tss + TSS_sp0)
|
|
|
|
#endif
|
|
|
|
|
2011-11-29 18:17:45 +07:00
|
|
|
/*
|
2015-03-25 01:43:11 +07:00
|
|
|
* ASM operand which evaluates to a 'thread_info' address of
|
|
|
|
* the current task, if it is known that "reg" is exactly "off"
|
|
|
|
* bytes below the top of the stack currently.
|
|
|
|
*
|
|
|
|
* ( The kernel stack's size is known at build time, it is usually
|
|
|
|
* 2 or 4 pages, and the bottom of the kernel stack contains
|
|
|
|
* the thread_info structure. So to access the thread_info very
|
|
|
|
* quickly from assembly code we can calculate down from the
|
|
|
|
* top of the kernel stack to the bottom, using constant,
|
|
|
|
* build-time calculations only. )
|
|
|
|
*
|
|
|
|
* For example, to fetch the current thread_info->flags value into %eax
|
|
|
|
* on x86-64 defconfig kernels, in syscall entry code where RSP is
|
|
|
|
* currently at exactly SIZEOF_PTREGS bytes away from the top of the
|
|
|
|
* stack:
|
|
|
|
*
|
2015-03-25 01:44:42 +07:00
|
|
|
* mov ASM_THREAD_INFO(TI_flags, %rsp, SIZEOF_PTREGS), %eax
|
2015-03-25 01:43:11 +07:00
|
|
|
*
|
|
|
|
* will translate to:
|
|
|
|
*
|
|
|
|
* 8b 84 24 b8 c0 ff ff mov -0x3f48(%rsp), %eax
|
|
|
|
*
|
|
|
|
* which is below the current RSP by almost 16K.
|
2011-11-29 18:17:45 +07:00
|
|
|
*/
|
2015-03-25 01:44:42 +07:00
|
|
|
#define ASM_THREAD_INFO(field, reg, off) ((field)+(off)-THREAD_SIZE)(reg)
|
2011-11-29 18:17:45 +07:00
|
|
|
|
2008-05-12 20:43:41 +07:00
|
|
|
#endif
|
|
|
|
|
2016-07-27 13:12:22 +07:00
|
|
|
#ifdef CONFIG_COMPAT
|
|
|
|
#define TS_I386_REGS_POKED 0x0004 /* regs poked by 32-bit ptracer */
|
|
|
|
#endif
|
2008-05-01 03:13:44 +07:00
|
|
|
#ifndef __ASSEMBLY__
|
2012-03-13 21:03:03 +07:00
|
|
|
|
|
|
|
#ifdef CONFIG_X86_32
|
2016-09-14 04:29:21 +07:00
|
|
|
#define in_ia32_syscall() true
|
|
|
|
#else
|
|
|
|
#define in_ia32_syscall() (IS_ENABLED(CONFIG_IA32_EMULATION) && \
|
|
|
|
current->thread.status & TS_COMPAT)
|
2012-03-13 21:03:03 +07:00
|
|
|
#endif
|
2015-03-22 05:54:21 +07:00
|
|
|
|
|
|
|
/*
|
|
|
|
* Force syscall return via IRET by making it look as if there was
|
|
|
|
* some work pending. IRET is our most capable (but slowest) syscall
|
|
|
|
* return path, which is able to restore modified SS, CS and certain
|
|
|
|
* EFLAGS values that other (fast) syscall return instructions
|
|
|
|
* are not able to restore properly.
|
|
|
|
*/
|
|
|
|
#define force_iret() set_thread_flag(TIF_NOTIFY_RESUME)
|
|
|
|
|
2008-03-11 05:28:04 +07:00
|
|
|
extern void arch_task_cache_init(void);
|
|
|
|
extern int arch_dup_task_struct(struct task_struct *dst, struct task_struct *src);
|
2012-05-05 22:05:42 +07:00
|
|
|
extern void arch_release_task_struct(struct task_struct *tsk);
|
2016-03-29 01:20:17 +07:00
|
|
|
#endif /* !__ASSEMBLY__ */
|
|
|
|
|
2008-10-23 12:26:29 +07:00
|
|
|
#endif /* _ASM_X86_THREAD_INFO_H */
|