1 /* SPDX-License-Identifier: GPL-2.0-only */
2 #ifndef _ASM_X86_ENTRY_COMMON_H
3 #define _ASM_X86_ENTRY_COMMON_H
5 #include <linux/randomize_kstack.h>
6 #include <linux/user-return-notifier.h>
8 #include <asm/nospec-branch.h>
9 #include <asm/io_bitmap.h>
10 #include <asm/fpu/api.h>
13 /* Check that the stack and regs on entry from user mode are sane. */
14 static __always_inline
void arch_enter_from_user_mode(struct pt_regs
*regs
)
16 if (IS_ENABLED(CONFIG_DEBUG_ENTRY
)) {
18 * Make sure that the entry code gave us a sensible EFLAGS
19 * register. Native because we want to check the actual CPU
20 * state, not the interrupt state as imagined by Xen.
22 unsigned long flags
= native_save_fl();
23 unsigned long mask
= X86_EFLAGS_DF
| X86_EFLAGS_NT
;
26 * For !SMAP hardware we patch out CLAC on entry.
28 if (cpu_feature_enabled(X86_FEATURE_SMAP
) ||
29 cpu_feature_enabled(X86_FEATURE_XENPV
))
30 mask
|= X86_EFLAGS_AC
;
32 WARN_ON_ONCE(flags
& mask
);
34 /* We think we came from user mode. Make sure pt_regs agrees. */
35 WARN_ON_ONCE(!user_mode(regs
));
38 * All entries from user mode (except #DF) should be on the
39 * normal thread stack and should have user pt_regs in the
42 WARN_ON_ONCE(!on_thread_stack());
43 WARN_ON_ONCE(regs
!= task_pt_regs(current
));
46 #define arch_enter_from_user_mode arch_enter_from_user_mode
48 static inline void arch_exit_work(unsigned long ti_work
)
50 if (ti_work
& _TIF_USER_RETURN_NOTIFY
)
51 fire_user_return_notifiers();
53 if (unlikely(ti_work
& _TIF_IO_BITMAP
))
54 tss_update_io_bitmap();
56 fpregs_assert_state_consistent();
57 if (unlikely(ti_work
& _TIF_NEED_FPU_LOAD
))
61 static inline void arch_exit_to_user_mode_prepare(struct pt_regs
*regs
,
62 unsigned long ti_work
)
64 if (IS_ENABLED(CONFIG_X86_DEBUG_FPU
) || unlikely(ti_work
))
65 arch_exit_work(ti_work
);
71 * Compat syscalls set TS_COMPAT. Make sure we clear it before
72 * returning to user mode. We need to clear it *after* signal
73 * handling, because syscall restart has a fixup for compat
74 * syscalls. The fixup is exercised by the ptrace_syscall_32
77 * We also need to clear TS_REGS_POKED_I386: the 32-bit tracer
78 * special case only applies after poking regs and before the
79 * very next return to user mode.
81 current_thread_info()->status
&= ~(TS_COMPAT
| TS_I386_REGS_POKED
);
85 * This value will get limited by KSTACK_OFFSET_MAX(), which is 10
86 * bits. The actual entropy will be further reduced by the compiler
87 * when applying stack alignment constraints (see cc_stack_align4/8 in
88 * arch/x86/Makefile), which will remove the 3 (x86_64) or 2 (ia32)
89 * low bits from any entropy chosen here.
91 * Therefore, final stack offset entropy will be 7 (x86_64) or
94 choose_random_kstack_offset(rdtsc());
96 #define arch_exit_to_user_mode_prepare arch_exit_to_user_mode_prepare
98 static __always_inline
void arch_exit_to_user_mode(void)
102 #define arch_exit_to_user_mode arch_exit_to_user_mode