1b2441318SGreg Kroah-Hartman /* SPDX-License-Identifier: GPL-2.0 */ 21965aae3SH. Peter Anvin #ifndef _ASM_X86_ELF_H 31965aae3SH. Peter Anvin #define _ASM_X86_ELF_H 4bb898558SAl Viro 5bb898558SAl Viro /* 6bb898558SAl Viro * ELF register definitions.. 7bb898558SAl Viro */ 8dfb09f9bSBorislav Petkov #include <linux/thread_info.h> 9bb898558SAl Viro 10bb898558SAl Viro #include <asm/ptrace.h> 11bb898558SAl Viro #include <asm/user.h> 12bb898558SAl Viro #include <asm/auxvec.h> 13824eea38SChang S. Bae #include <asm/fsgsbase.h> 14bb898558SAl Viro 15bb898558SAl Viro typedef unsigned long elf_greg_t; 16bb898558SAl Viro 17bb898558SAl Viro #define ELF_NGREG (sizeof(struct user_regs_struct) / sizeof(elf_greg_t)) 18bb898558SAl Viro typedef elf_greg_t elf_gregset_t[ELF_NGREG]; 19bb898558SAl Viro 20bb898558SAl Viro typedef struct user_i387_struct elf_fpregset_t; 21bb898558SAl Viro 22bb898558SAl Viro #ifdef __i386__ 23bb898558SAl Viro 24bb898558SAl Viro typedef struct user_fxsr_struct elf_fpxregset_t; 25bb898558SAl Viro 26bb898558SAl Viro #define R_386_NONE 0 27bb898558SAl Viro #define R_386_32 1 28bb898558SAl Viro #define R_386_PC32 2 29bb898558SAl Viro #define R_386_GOT32 3 30bb898558SAl Viro #define R_386_PLT32 4 31bb898558SAl Viro #define R_386_COPY 5 32bb898558SAl Viro #define R_386_GLOB_DAT 6 33bb898558SAl Viro #define R_386_JMP_SLOT 7 34bb898558SAl Viro #define R_386_RELATIVE 8 35bb898558SAl Viro #define R_386_GOTOFF 9 36bb898558SAl Viro #define R_386_GOTPC 10 37bb898558SAl Viro #define R_386_NUM 11 38bb898558SAl Viro 39bb898558SAl Viro /* 40bb898558SAl Viro * These are used to set parameters in the core dumps. 41bb898558SAl Viro */ 42bb898558SAl Viro #define ELF_CLASS ELFCLASS32 43bb898558SAl Viro #define ELF_DATA ELFDATA2LSB 44bb898558SAl Viro #define ELF_ARCH EM_386 45bb898558SAl Viro 46bb898558SAl Viro #else 47bb898558SAl Viro 48bb898558SAl Viro /* x86-64 relocation types */ 49bb898558SAl Viro #define R_X86_64_NONE 0 /* No reloc */ 50bb898558SAl Viro #define R_X86_64_64 1 /* Direct 64 bit */ 51bb898558SAl Viro #define R_X86_64_PC32 2 /* PC relative 32 bit signed */ 52bb898558SAl Viro #define R_X86_64_GOT32 3 /* 32 bit GOT entry */ 53bb898558SAl Viro #define R_X86_64_PLT32 4 /* 32 bit PLT address */ 54bb898558SAl Viro #define R_X86_64_COPY 5 /* Copy symbol at runtime */ 55bb898558SAl Viro #define R_X86_64_GLOB_DAT 6 /* Create GOT entry */ 56bb898558SAl Viro #define R_X86_64_JUMP_SLOT 7 /* Create PLT entry */ 57bb898558SAl Viro #define R_X86_64_RELATIVE 8 /* Adjust by program base */ 58bb898558SAl Viro #define R_X86_64_GOTPCREL 9 /* 32 bit signed pc relative 59bb898558SAl Viro offset to GOT */ 60bb898558SAl Viro #define R_X86_64_32 10 /* Direct 32 bit zero extended */ 61bb898558SAl Viro #define R_X86_64_32S 11 /* Direct 32 bit sign extended */ 62bb898558SAl Viro #define R_X86_64_16 12 /* Direct 16 bit zero extended */ 63bb898558SAl Viro #define R_X86_64_PC16 13 /* 16 bit sign extended pc relative */ 64bb898558SAl Viro #define R_X86_64_8 14 /* Direct 8 bit sign extended */ 65bb898558SAl Viro #define R_X86_64_PC8 15 /* 8 bit sign extended pc relative */ 66bb898558SAl Viro 67bb898558SAl Viro #define R_X86_64_NUM 16 68bb898558SAl Viro 69bb898558SAl Viro /* 70bb898558SAl Viro * These are used to set parameters in the core dumps. 71bb898558SAl Viro */ 72bb898558SAl Viro #define ELF_CLASS ELFCLASS64 73bb898558SAl Viro #define ELF_DATA ELFDATA2LSB 74bb898558SAl Viro #define ELF_ARCH EM_X86_64 75bb898558SAl Viro 76bb898558SAl Viro #endif 77bb898558SAl Viro 78bb898558SAl Viro #include <asm/vdso.h> 79bb898558SAl Viro 803d7ee969SAndy Lutomirski #ifdef CONFIG_X86_64 813d7ee969SAndy Lutomirski extern unsigned int vdso64_enabled; 823d7ee969SAndy Lutomirski #endif 83ab8b82eeSBrian Gerst #if defined(CONFIG_X86_32) || defined(CONFIG_IA32_EMULATION) 843d7ee969SAndy Lutomirski extern unsigned int vdso32_enabled; 853d7ee969SAndy Lutomirski #endif 86bb898558SAl Viro 87bb898558SAl Viro /* 88bb898558SAl Viro * This is used to ensure we don't load something for the wrong architecture. 89bb898558SAl Viro */ 90bb898558SAl Viro #define elf_check_arch_ia32(x) \ 91bb898558SAl Viro (((x)->e_machine == EM_386) || ((x)->e_machine == EM_486)) 92bb898558SAl Viro 93bb898558SAl Viro #include <asm/processor.h> 94bb898558SAl Viro 95bb898558SAl Viro #ifdef CONFIG_X86_32 96bb898558SAl Viro #include <asm/desc.h> 97bb898558SAl Viro 98bb898558SAl Viro #define elf_check_arch(x) elf_check_arch_ia32(x) 99bb898558SAl Viro 100bb898558SAl Viro /* SVR4/i386 ABI (pages 3-31, 3-32) says that when the program starts %edx 101bb898558SAl Viro contains a pointer to a function which might be registered using `atexit'. 102bb898558SAl Viro This provides a mean for the dynamic linker to call DT_FINI functions for 103bb898558SAl Viro shared libraries that have been loaded before the code runs. 104bb898558SAl Viro 105bb898558SAl Viro A value of 0 tells we have no such handler. 106bb898558SAl Viro 107bb898558SAl Viro We might as well make sure everything else is cleared too (except for %esp), 108bb898558SAl Viro just to make things more deterministic. 109bb898558SAl Viro */ 110bb898558SAl Viro #define ELF_PLAT_INIT(_r, load_addr) \ 111bb898558SAl Viro do { \ 112bb898558SAl Viro _r->bx = 0; _r->cx = 0; _r->dx = 0; \ 113bb898558SAl Viro _r->si = 0; _r->di = 0; _r->bp = 0; \ 114bb898558SAl Viro _r->ax = 0; \ 115bb898558SAl Viro } while (0) 116bb898558SAl Viro 117bb898558SAl Viro /* 118bb898558SAl Viro * regs is struct pt_regs, pr_reg is elf_gregset_t (which is 119bb898558SAl Viro * now struct_user_regs, they are different) 120bb898558SAl Viro */ 121bb898558SAl Viro 122ccbeed3aSTejun Heo #define ELF_CORE_COPY_REGS_COMMON(pr_reg, regs) \ 123bb898558SAl Viro do { \ 124bb898558SAl Viro pr_reg[0] = regs->bx; \ 125bb898558SAl Viro pr_reg[1] = regs->cx; \ 126bb898558SAl Viro pr_reg[2] = regs->dx; \ 127bb898558SAl Viro pr_reg[3] = regs->si; \ 128bb898558SAl Viro pr_reg[4] = regs->di; \ 129bb898558SAl Viro pr_reg[5] = regs->bp; \ 130bb898558SAl Viro pr_reg[6] = regs->ax; \ 13199504819SAndy Lutomirski pr_reg[7] = regs->ds; \ 13299504819SAndy Lutomirski pr_reg[8] = regs->es; \ 13399504819SAndy Lutomirski pr_reg[9] = regs->fs; \ 134bb898558SAl Viro pr_reg[11] = regs->orig_ax; \ 135bb898558SAl Viro pr_reg[12] = regs->ip; \ 13699504819SAndy Lutomirski pr_reg[13] = regs->cs; \ 137bb898558SAl Viro pr_reg[14] = regs->flags; \ 138bb898558SAl Viro pr_reg[15] = regs->sp; \ 13999504819SAndy Lutomirski pr_reg[16] = regs->ss; \ 140bb898558SAl Viro } while (0); 141bb898558SAl Viro 142ccbeed3aSTejun Heo #define ELF_CORE_COPY_REGS(pr_reg, regs) \ 143ccbeed3aSTejun Heo do { \ 144ccbeed3aSTejun Heo ELF_CORE_COPY_REGS_COMMON(pr_reg, regs);\ 145ccbeed3aSTejun Heo pr_reg[10] = get_user_gs(regs); \ 146ccbeed3aSTejun Heo } while (0); 147ccbeed3aSTejun Heo 148ccbeed3aSTejun Heo #define ELF_CORE_COPY_KERNEL_REGS(pr_reg, regs) \ 149ccbeed3aSTejun Heo do { \ 150ccbeed3aSTejun Heo ELF_CORE_COPY_REGS_COMMON(pr_reg, regs);\ 151ccbeed3aSTejun Heo savesegment(gs, pr_reg[10]); \ 152ccbeed3aSTejun Heo } while (0); 153ccbeed3aSTejun Heo 154bb898558SAl Viro #define ELF_PLATFORM (utsname()->machine) 155bb898558SAl Viro #define set_personality_64bit() do { } while (0) 156bb898558SAl Viro 157bb898558SAl Viro #else /* CONFIG_X86_32 */ 158bb898558SAl Viro 159bb898558SAl Viro /* 160bb898558SAl Viro * This is used to ensure we don't load something for the wrong architecture. 161bb898558SAl Viro */ 162bb898558SAl Viro #define elf_check_arch(x) \ 163bb898558SAl Viro ((x)->e_machine == EM_X86_64) 164bb898558SAl Viro 165d1a797f3SH. Peter Anvin #define compat_elf_check_arch(x) \ 1660e6d3112SBen Hutchings (elf_check_arch_ia32(x) || \ 1670e6d3112SBen Hutchings (IS_ENABLED(CONFIG_X86_X32_ABI) && (x)->e_machine == EM_X86_64)) 168d1a797f3SH. Peter Anvin 169d1a797f3SH. Peter Anvin #if __USER32_DS != __USER_DS 170d1a797f3SH. Peter Anvin # error "The following code assumes __USER32_DS == __USER_DS" 171d1a797f3SH. Peter Anvin #endif 172bb898558SAl Viro 173bb898558SAl Viro static inline void elf_common_init(struct thread_struct *t, 174bb898558SAl Viro struct pt_regs *regs, const u16 ds) 175bb898558SAl Viro { 1767bcdea4dSAndy Lutomirski /* ax gets execve's return value. */ 1777bcdea4dSAndy Lutomirski /*regs->ax = */ regs->bx = regs->cx = regs->dx = 0; 1787bcdea4dSAndy Lutomirski regs->si = regs->di = regs->bp = 0; 179bb898558SAl Viro regs->r8 = regs->r9 = regs->r10 = regs->r11 = 0; 1807bcdea4dSAndy Lutomirski regs->r12 = regs->r13 = regs->r14 = regs->r15 = 0; 181296f781aSAndy Lutomirski t->fsbase = t->gsbase = 0; 182bb898558SAl Viro t->fsindex = t->gsindex = 0; 183bb898558SAl Viro t->ds = t->es = ds; 184bb898558SAl Viro } 185bb898558SAl Viro 186bb898558SAl Viro #define ELF_PLAT_INIT(_r, load_addr) \ 18711557b24SOleg Nesterov elf_common_init(¤t->thread, _r, 0) 188bb898558SAl Viro 189bb898558SAl Viro #define COMPAT_ELF_PLAT_INIT(regs, load_addr) \ 190bb898558SAl Viro elf_common_init(¤t->thread, regs, __USER_DS) 191bb898558SAl Viro 1927da77078SBrian Gerst void compat_start_thread(struct pt_regs *regs, u32 new_ip, u32 new_sp); 1937da77078SBrian Gerst #define compat_start_thread compat_start_thread 194bb898558SAl Viro 195d1a797f3SH. Peter Anvin void set_personality_ia32(bool); 196d1a797f3SH. Peter Anvin #define COMPAT_SET_PERSONALITY(ex) \ 197d1a797f3SH. Peter Anvin set_personality_ia32((ex).e_machine == EM_X86_64) 198bb898558SAl Viro 199bb898558SAl Viro #define COMPAT_ELF_PLATFORM ("i686") 200bb898558SAl Viro 201bb898558SAl Viro /* 202bb898558SAl Viro * regs is struct pt_regs, pr_reg is elf_gregset_t (which is 203bb898558SAl Viro * now struct_user_regs, they are different). Assumes current is the process 204bb898558SAl Viro * getting dumped. 205bb898558SAl Viro */ 206bb898558SAl Viro 207bb898558SAl Viro #define ELF_CORE_COPY_REGS(pr_reg, regs) \ 208bb898558SAl Viro do { \ 209bb898558SAl Viro unsigned v; \ 210bb898558SAl Viro (pr_reg)[0] = (regs)->r15; \ 211bb898558SAl Viro (pr_reg)[1] = (regs)->r14; \ 212bb898558SAl Viro (pr_reg)[2] = (regs)->r13; \ 213bb898558SAl Viro (pr_reg)[3] = (regs)->r12; \ 214bb898558SAl Viro (pr_reg)[4] = (regs)->bp; \ 215bb898558SAl Viro (pr_reg)[5] = (regs)->bx; \ 216bb898558SAl Viro (pr_reg)[6] = (regs)->r11; \ 217bb898558SAl Viro (pr_reg)[7] = (regs)->r10; \ 218bb898558SAl Viro (pr_reg)[8] = (regs)->r9; \ 219bb898558SAl Viro (pr_reg)[9] = (regs)->r8; \ 220bb898558SAl Viro (pr_reg)[10] = (regs)->ax; \ 221bb898558SAl Viro (pr_reg)[11] = (regs)->cx; \ 222bb898558SAl Viro (pr_reg)[12] = (regs)->dx; \ 223bb898558SAl Viro (pr_reg)[13] = (regs)->si; \ 224bb898558SAl Viro (pr_reg)[14] = (regs)->di; \ 225bb898558SAl Viro (pr_reg)[15] = (regs)->orig_ax; \ 226bb898558SAl Viro (pr_reg)[16] = (regs)->ip; \ 227bb898558SAl Viro (pr_reg)[17] = (regs)->cs; \ 228bb898558SAl Viro (pr_reg)[18] = (regs)->flags; \ 229bb898558SAl Viro (pr_reg)[19] = (regs)->sp; \ 230bb898558SAl Viro (pr_reg)[20] = (regs)->ss; \ 231824eea38SChang S. Bae (pr_reg)[21] = x86_fsbase_read_cpu(); \ 232824eea38SChang S. Bae (pr_reg)[22] = x86_gsbase_read_cpu_inactive(); \ 233bb898558SAl Viro asm("movl %%ds,%0" : "=r" (v)); (pr_reg)[23] = v; \ 234bb898558SAl Viro asm("movl %%es,%0" : "=r" (v)); (pr_reg)[24] = v; \ 235bb898558SAl Viro asm("movl %%fs,%0" : "=r" (v)); (pr_reg)[25] = v; \ 236bb898558SAl Viro asm("movl %%gs,%0" : "=r" (v)); (pr_reg)[26] = v; \ 237bb898558SAl Viro } while (0); 238bb898558SAl Viro 239bb898558SAl Viro /* I'm not sure if we can use '-' here */ 240bb898558SAl Viro #define ELF_PLATFORM ("x86_64") 241bb898558SAl Viro extern void set_personality_64bit(void); 242bb898558SAl Viro extern unsigned int sysctl_vsyscall32; 243bb898558SAl Viro extern int force_personality32; 244bb898558SAl Viro 245bb898558SAl Viro #endif /* !CONFIG_X86_32 */ 246bb898558SAl Viro 247bb898558SAl Viro #define CORE_DUMP_USE_REGSET 248bb898558SAl Viro #define ELF_EXEC_PAGESIZE 4096 249bb898558SAl Viro 250eab09532SKees Cook /* 251eab09532SKees Cook * This is the base location for PIE (ET_DYN with INTERP) loads. On 252c715b72cSKees Cook * 64-bit, this is above 4GB to leave the entire 32-bit address 253eab09532SKees Cook * space open for things that want to use the area for 32-bit pointers. 254eab09532SKees Cook */ 255eab09532SKees Cook #define ELF_ET_DYN_BASE (mmap_is_ia32() ? 0x000400000UL : \ 256be739f4bSKirill A. Shutemov (DEFAULT_MAP_WINDOW / 3 * 2)) 257bb898558SAl Viro 258bb898558SAl Viro /* This yields a mask that user programs can use to figure out what 259bb898558SAl Viro instruction set this CPU supports. This could be done in user space, 260bb898558SAl Viro but it's not easy, and we've already done it here. */ 261bb898558SAl Viro 26216aaa537SHuaitong Han #define ELF_HWCAP (boot_cpu_data.x86_capability[CPUID_1_EDX]) 263bb898558SAl Viro 2640274f955SGrzegorz Andrejczuk extern u32 elf_hwcap2; 2650274f955SGrzegorz Andrejczuk 2660274f955SGrzegorz Andrejczuk /* 2670274f955SGrzegorz Andrejczuk * HWCAP2 supplies mask with kernel enabled CPU features, so that 2680274f955SGrzegorz Andrejczuk * the application can discover that it can safely use them. 2690274f955SGrzegorz Andrejczuk * The bits are defined in uapi/asm/hwcap2.h. 2700274f955SGrzegorz Andrejczuk */ 2710274f955SGrzegorz Andrejczuk #define ELF_HWCAP2 (elf_hwcap2) 2720274f955SGrzegorz Andrejczuk 273bb898558SAl Viro /* This yields a string that ld.so will use to load implementation 274bb898558SAl Viro specific libraries for optimization. This is more specific in 275bb898558SAl Viro intent than poking at uname or /proc/cpuinfo. 276bb898558SAl Viro 277bb898558SAl Viro For the moment, we have only optimizations for the Intel generations, 278bb898558SAl Viro but that could change... */ 279bb898558SAl Viro 280bb898558SAl Viro #define SET_PERSONALITY(ex) set_personality_64bit() 281bb898558SAl Viro 282bb898558SAl Viro /* 283bb898558SAl Viro * An executable for which elf_read_implies_exec() returns TRUE will 284bb898558SAl Viro * have the READ_IMPLIES_EXEC personality flag set automatically. 285bb898558SAl Viro */ 286bb898558SAl Viro #define elf_read_implies_exec(ex, executable_stack) \ 287bb898558SAl Viro (executable_stack != EXSTACK_DISABLE_X) 288bb898558SAl Viro 289bb898558SAl Viro struct task_struct; 290bb898558SAl Viro 2913d7ee969SAndy Lutomirski #define ARCH_DLINFO_IA32 \ 292bb898558SAl Viro do { \ 2936fdc6dd9SThomas Gleixner if (VDSO_CURRENT_BASE) { \ 294bb898558SAl Viro NEW_AUX_ENT(AT_SYSINFO, VDSO_ENTRY); \ 295bb898558SAl Viro NEW_AUX_ENT(AT_SYSINFO_EHDR, VDSO_CURRENT_BASE); \ 296bb898558SAl Viro } \ 297bb898558SAl Viro } while (0) 298bb898558SAl Viro 2998f3e474fSDmitry Safonov /* 3008f3e474fSDmitry Safonov * True on X86_32 or when emulating IA32 on X86_64 3018f3e474fSDmitry Safonov */ 3028f3e474fSDmitry Safonov static inline int mmap_is_ia32(void) 3038f3e474fSDmitry Safonov { 3048f3e474fSDmitry Safonov return IS_ENABLED(CONFIG_X86_32) || 3058f3e474fSDmitry Safonov (IS_ENABLED(CONFIG_COMPAT) && 3068f3e474fSDmitry Safonov test_thread_flag(TIF_ADDR32)); 3078f3e474fSDmitry Safonov } 3088f3e474fSDmitry Safonov 309e8f01a8dSKirill A. Shutemov extern unsigned long task_size_32bit(void); 310b569bab7SKirill A. Shutemov extern unsigned long task_size_64bit(int full_addr_space); 311e13b73ddSDmitry Safonov extern unsigned long get_mmap_base(int is_legacy); 3121e0f25dbSKirill A. Shutemov extern bool mmap_address_hint_valid(unsigned long addr, unsigned long len); 3131b028f78SDmitry Safonov 314bb898558SAl Viro #ifdef CONFIG_X86_32 315bb898558SAl Viro 3168f3e474fSDmitry Safonov #define __STACK_RND_MASK(is32bit) (0x7ff) 31780938332SMichal Hocko #define STACK_RND_MASK (0x7ff) 31880938332SMichal Hocko 3193d7ee969SAndy Lutomirski #define ARCH_DLINFO ARCH_DLINFO_IA32 320bb898558SAl Viro 321bb898558SAl Viro /* update AT_VECTOR_SIZE_ARCH if the number of NEW_AUX_ENT entries changes */ 322bb898558SAl Viro 323bb898558SAl Viro #else /* CONFIG_X86_32 */ 324bb898558SAl Viro 325bb898558SAl Viro /* 1GB for 64bit, 8MB for 32bit */ 3268f3e474fSDmitry Safonov #define __STACK_RND_MASK(is32bit) ((is32bit) ? 0x7ff : 0x3fffff) 3278f3e474fSDmitry Safonov #define STACK_RND_MASK __STACK_RND_MASK(mmap_is_ia32()) 328bb898558SAl Viro 329bb898558SAl Viro #define ARCH_DLINFO \ 330bb898558SAl Viro do { \ 3313d7ee969SAndy Lutomirski if (vdso64_enabled) \ 332bb898558SAl Viro NEW_AUX_ENT(AT_SYSINFO_EHDR, \ 3336f121e54SAndy Lutomirski (unsigned long __force)current->mm->context.vdso); \ 334bb898558SAl Viro } while (0) 335bb898558SAl Viro 3363d7ee969SAndy Lutomirski /* As a historical oddity, the x32 and x86_64 vDSOs are controlled together. */ 337d1a797f3SH. Peter Anvin #define ARCH_DLINFO_X32 \ 338d1a797f3SH. Peter Anvin do { \ 3393d7ee969SAndy Lutomirski if (vdso64_enabled) \ 340d1a797f3SH. Peter Anvin NEW_AUX_ENT(AT_SYSINFO_EHDR, \ 3416f121e54SAndy Lutomirski (unsigned long __force)current->mm->context.vdso); \ 342d1a797f3SH. Peter Anvin } while (0) 343d1a797f3SH. Peter Anvin 344bb898558SAl Viro #define AT_SYSINFO 32 345bb898558SAl Viro 346d1a797f3SH. Peter Anvin #define COMPAT_ARCH_DLINFO \ 347d1a797f3SH. Peter Anvin if (test_thread_flag(TIF_X32)) \ 348d1a797f3SH. Peter Anvin ARCH_DLINFO_X32; \ 349d1a797f3SH. Peter Anvin else \ 3503d7ee969SAndy Lutomirski ARCH_DLINFO_IA32 351bb898558SAl Viro 352bb898558SAl Viro #define COMPAT_ELF_ET_DYN_BASE (TASK_UNMAPPED_BASE + 0x1000000) 353bb898558SAl Viro 354bb898558SAl Viro #endif /* !CONFIG_X86_32 */ 355bb898558SAl Viro 356bb898558SAl Viro #define VDSO_CURRENT_BASE ((unsigned long)current->mm->context.vdso) 357bb898558SAl Viro 358bb898558SAl Viro #define VDSO_ENTRY \ 3596f121e54SAndy Lutomirski ((unsigned long)current->mm->context.vdso + \ 3600a6d1fa0SAndy Lutomirski vdso_image_32.sym___kernel_vsyscall) 361bb898558SAl Viro 362bb898558SAl Viro struct linux_binprm; 363bb898558SAl Viro 364bb898558SAl Viro #define ARCH_HAS_SETUP_ADDITIONAL_PAGES 1 365bb898558SAl Viro extern int arch_setup_additional_pages(struct linux_binprm *bprm, 366fc5243d9SMartin Schwidefsky int uses_interp); 36718d0a6fdSAndy Lutomirski extern int compat_arch_setup_additional_pages(struct linux_binprm *bprm, 36822e842d4SH. Peter Anvin int uses_interp); 36918d0a6fdSAndy Lutomirski #define compat_arch_setup_additional_pages compat_arch_setup_additional_pages 370bb898558SAl Viro 371f9902472SMichel Lespinasse /* Do not change the values. See get_align_mask() */ 372dfb09f9bSBorislav Petkov enum align_flags { 373dfb09f9bSBorislav Petkov ALIGN_VA_32 = BIT(0), 374dfb09f9bSBorislav Petkov ALIGN_VA_64 = BIT(1), 375dfb09f9bSBorislav Petkov }; 376dfb09f9bSBorislav Petkov 377dfb09f9bSBorislav Petkov struct va_alignment { 378dfb09f9bSBorislav Petkov int flags; 379dfb09f9bSBorislav Petkov unsigned long mask; 3804e26d11fSHector Marco-Gisbert unsigned long bits; 381dfb09f9bSBorislav Petkov } ____cacheline_aligned; 382dfb09f9bSBorislav Petkov 383dfb09f9bSBorislav Petkov extern struct va_alignment va_align; 384f9902472SMichel Lespinasse extern unsigned long align_vdso_addr(unsigned long); 3851965aae3SH. Peter Anvin #endif /* _ASM_X86_ELF_H */ 386