xref: /openbmc/linux/arch/x86/include/asm/elf.h (revision d1a797f3)
11965aae3SH. Peter Anvin #ifndef _ASM_X86_ELF_H
21965aae3SH. Peter Anvin #define _ASM_X86_ELF_H
3bb898558SAl Viro 
4bb898558SAl Viro /*
5bb898558SAl Viro  * ELF register definitions..
6bb898558SAl Viro  */
7dfb09f9bSBorislav Petkov #include <linux/thread_info.h>
8bb898558SAl Viro 
9bb898558SAl Viro #include <asm/ptrace.h>
10bb898558SAl Viro #include <asm/user.h>
11bb898558SAl Viro #include <asm/auxvec.h>
12bb898558SAl Viro 
13bb898558SAl Viro typedef unsigned long elf_greg_t;
14bb898558SAl Viro 
15bb898558SAl Viro #define ELF_NGREG (sizeof(struct user_regs_struct) / sizeof(elf_greg_t))
16bb898558SAl Viro typedef elf_greg_t elf_gregset_t[ELF_NGREG];
17bb898558SAl Viro 
18bb898558SAl Viro typedef struct user_i387_struct elf_fpregset_t;
19bb898558SAl Viro 
20bb898558SAl Viro #ifdef __i386__
21bb898558SAl Viro 
22bb898558SAl Viro typedef struct user_fxsr_struct elf_fpxregset_t;
23bb898558SAl Viro 
24bb898558SAl Viro #define R_386_NONE	0
25bb898558SAl Viro #define R_386_32	1
26bb898558SAl Viro #define R_386_PC32	2
27bb898558SAl Viro #define R_386_GOT32	3
28bb898558SAl Viro #define R_386_PLT32	4
29bb898558SAl Viro #define R_386_COPY	5
30bb898558SAl Viro #define R_386_GLOB_DAT	6
31bb898558SAl Viro #define R_386_JMP_SLOT	7
32bb898558SAl Viro #define R_386_RELATIVE	8
33bb898558SAl Viro #define R_386_GOTOFF	9
34bb898558SAl Viro #define R_386_GOTPC	10
35bb898558SAl Viro #define R_386_NUM	11
36bb898558SAl Viro 
37bb898558SAl Viro /*
38bb898558SAl Viro  * These are used to set parameters in the core dumps.
39bb898558SAl Viro  */
40bb898558SAl Viro #define ELF_CLASS	ELFCLASS32
41bb898558SAl Viro #define ELF_DATA	ELFDATA2LSB
42bb898558SAl Viro #define ELF_ARCH	EM_386
43bb898558SAl Viro 
44bb898558SAl Viro #else
45bb898558SAl Viro 
46bb898558SAl Viro /* x86-64 relocation types */
47bb898558SAl Viro #define R_X86_64_NONE		0	/* No reloc */
48bb898558SAl Viro #define R_X86_64_64		1	/* Direct 64 bit  */
49bb898558SAl Viro #define R_X86_64_PC32		2	/* PC relative 32 bit signed */
50bb898558SAl Viro #define R_X86_64_GOT32		3	/* 32 bit GOT entry */
51bb898558SAl Viro #define R_X86_64_PLT32		4	/* 32 bit PLT address */
52bb898558SAl Viro #define R_X86_64_COPY		5	/* Copy symbol at runtime */
53bb898558SAl Viro #define R_X86_64_GLOB_DAT	6	/* Create GOT entry */
54bb898558SAl Viro #define R_X86_64_JUMP_SLOT	7	/* Create PLT entry */
55bb898558SAl Viro #define R_X86_64_RELATIVE	8	/* Adjust by program base */
56bb898558SAl Viro #define R_X86_64_GOTPCREL	9	/* 32 bit signed pc relative
57bb898558SAl Viro 					   offset to GOT */
58bb898558SAl Viro #define R_X86_64_32		10	/* Direct 32 bit zero extended */
59bb898558SAl Viro #define R_X86_64_32S		11	/* Direct 32 bit sign extended */
60bb898558SAl Viro #define R_X86_64_16		12	/* Direct 16 bit zero extended */
61bb898558SAl Viro #define R_X86_64_PC16		13	/* 16 bit sign extended pc relative */
62bb898558SAl Viro #define R_X86_64_8		14	/* Direct 8 bit sign extended  */
63bb898558SAl Viro #define R_X86_64_PC8		15	/* 8 bit sign extended pc relative */
64bb898558SAl Viro 
65bb898558SAl Viro #define R_X86_64_NUM		16
66bb898558SAl Viro 
67bb898558SAl Viro /*
68bb898558SAl Viro  * These are used to set parameters in the core dumps.
69bb898558SAl Viro  */
70bb898558SAl Viro #define ELF_CLASS	ELFCLASS64
71bb898558SAl Viro #define ELF_DATA	ELFDATA2LSB
72bb898558SAl Viro #define ELF_ARCH	EM_X86_64
73bb898558SAl Viro 
74bb898558SAl Viro #endif
75bb898558SAl Viro 
76bb898558SAl Viro #include <asm/vdso.h>
77bb898558SAl Viro 
78bb898558SAl Viro extern unsigned int vdso_enabled;
79bb898558SAl Viro 
80bb898558SAl Viro /*
81bb898558SAl Viro  * This is used to ensure we don't load something for the wrong architecture.
82bb898558SAl Viro  */
83bb898558SAl Viro #define elf_check_arch_ia32(x) \
84bb898558SAl Viro 	(((x)->e_machine == EM_386) || ((x)->e_machine == EM_486))
85bb898558SAl Viro 
86bb898558SAl Viro #include <asm/processor.h>
87bb898558SAl Viro #include <asm/system.h>
88bb898558SAl Viro 
89bb898558SAl Viro #ifdef CONFIG_X86_32
90bb898558SAl Viro #include <asm/desc.h>
91bb898558SAl Viro 
92bb898558SAl Viro #define elf_check_arch(x)	elf_check_arch_ia32(x)
93bb898558SAl Viro 
94bb898558SAl Viro /* SVR4/i386 ABI (pages 3-31, 3-32) says that when the program starts %edx
95bb898558SAl Viro    contains a pointer to a function which might be registered using `atexit'.
96bb898558SAl Viro    This provides a mean for the dynamic linker to call DT_FINI functions for
97bb898558SAl Viro    shared libraries that have been loaded before the code runs.
98bb898558SAl Viro 
99bb898558SAl Viro    A value of 0 tells we have no such handler.
100bb898558SAl Viro 
101bb898558SAl Viro    We might as well make sure everything else is cleared too (except for %esp),
102bb898558SAl Viro    just to make things more deterministic.
103bb898558SAl Viro  */
104bb898558SAl Viro #define ELF_PLAT_INIT(_r, load_addr)		\
105bb898558SAl Viro 	do {					\
106bb898558SAl Viro 	_r->bx = 0; _r->cx = 0; _r->dx = 0;	\
107bb898558SAl Viro 	_r->si = 0; _r->di = 0; _r->bp = 0;	\
108bb898558SAl Viro 	_r->ax = 0;				\
109bb898558SAl Viro } while (0)
110bb898558SAl Viro 
111bb898558SAl Viro /*
112bb898558SAl Viro  * regs is struct pt_regs, pr_reg is elf_gregset_t (which is
113bb898558SAl Viro  * now struct_user_regs, they are different)
114bb898558SAl Viro  */
115bb898558SAl Viro 
116ccbeed3aSTejun Heo #define ELF_CORE_COPY_REGS_COMMON(pr_reg, regs)	\
117bb898558SAl Viro do {						\
118bb898558SAl Viro 	pr_reg[0] = regs->bx;			\
119bb898558SAl Viro 	pr_reg[1] = regs->cx;			\
120bb898558SAl Viro 	pr_reg[2] = regs->dx;			\
121bb898558SAl Viro 	pr_reg[3] = regs->si;			\
122bb898558SAl Viro 	pr_reg[4] = regs->di;			\
123bb898558SAl Viro 	pr_reg[5] = regs->bp;			\
124bb898558SAl Viro 	pr_reg[6] = regs->ax;			\
125bb898558SAl Viro 	pr_reg[7] = regs->ds & 0xffff;		\
126bb898558SAl Viro 	pr_reg[8] = regs->es & 0xffff;		\
127bb898558SAl Viro 	pr_reg[9] = regs->fs & 0xffff;		\
128bb898558SAl Viro 	pr_reg[11] = regs->orig_ax;		\
129bb898558SAl Viro 	pr_reg[12] = regs->ip;			\
130bb898558SAl Viro 	pr_reg[13] = regs->cs & 0xffff;		\
131bb898558SAl Viro 	pr_reg[14] = regs->flags;		\
132bb898558SAl Viro 	pr_reg[15] = regs->sp;			\
133bb898558SAl Viro 	pr_reg[16] = regs->ss & 0xffff;		\
134bb898558SAl Viro } while (0);
135bb898558SAl Viro 
136ccbeed3aSTejun Heo #define ELF_CORE_COPY_REGS(pr_reg, regs)	\
137ccbeed3aSTejun Heo do {						\
138ccbeed3aSTejun Heo 	ELF_CORE_COPY_REGS_COMMON(pr_reg, regs);\
139ccbeed3aSTejun Heo 	pr_reg[10] = get_user_gs(regs);		\
140ccbeed3aSTejun Heo } while (0);
141ccbeed3aSTejun Heo 
142ccbeed3aSTejun Heo #define ELF_CORE_COPY_KERNEL_REGS(pr_reg, regs)	\
143ccbeed3aSTejun Heo do {						\
144ccbeed3aSTejun Heo 	ELF_CORE_COPY_REGS_COMMON(pr_reg, regs);\
145ccbeed3aSTejun Heo 	savesegment(gs, pr_reg[10]);		\
146ccbeed3aSTejun Heo } while (0);
147ccbeed3aSTejun Heo 
148bb898558SAl Viro #define ELF_PLATFORM	(utsname()->machine)
149bb898558SAl Viro #define set_personality_64bit()	do { } while (0)
150bb898558SAl Viro 
151bb898558SAl Viro #else /* CONFIG_X86_32 */
152bb898558SAl Viro 
153bb898558SAl Viro /*
154bb898558SAl Viro  * This is used to ensure we don't load something for the wrong architecture.
155bb898558SAl Viro  */
156bb898558SAl Viro #define elf_check_arch(x)			\
157bb898558SAl Viro 	((x)->e_machine == EM_X86_64)
158bb898558SAl Viro 
159d1a797f3SH. Peter Anvin #define compat_elf_check_arch(x)		\
160d1a797f3SH. Peter Anvin 	(elf_check_arch_ia32(x) || (x)->e_machine == EM_X86_64)
161d1a797f3SH. Peter Anvin 
162d1a797f3SH. Peter Anvin #if __USER32_DS != __USER_DS
163d1a797f3SH. Peter Anvin # error "The following code assumes __USER32_DS == __USER_DS"
164d1a797f3SH. Peter Anvin #endif
165bb898558SAl Viro 
166bb898558SAl Viro static inline void elf_common_init(struct thread_struct *t,
167bb898558SAl Viro 				   struct pt_regs *regs, const u16 ds)
168bb898558SAl Viro {
169bb898558SAl Viro 	regs->ax = regs->bx = regs->cx = regs->dx = 0;
170bb898558SAl Viro 	regs->si = regs->di = regs->bp = 0;
171bb898558SAl Viro 	regs->r8 = regs->r9 = regs->r10 = regs->r11 = 0;
172bb898558SAl Viro 	regs->r12 = regs->r13 = regs->r14 = regs->r15 = 0;
173bb898558SAl Viro 	t->fs = t->gs = 0;
174bb898558SAl Viro 	t->fsindex = t->gsindex = 0;
175bb898558SAl Viro 	t->ds = t->es = ds;
176bb898558SAl Viro }
177bb898558SAl Viro 
178bb898558SAl Viro #define ELF_PLAT_INIT(_r, load_addr)			\
17911557b24SOleg Nesterov 	elf_common_init(&current->thread, _r, 0)
180bb898558SAl Viro 
181bb898558SAl Viro #define	COMPAT_ELF_PLAT_INIT(regs, load_addr)		\
182bb898558SAl Viro 	elf_common_init(&current->thread, regs, __USER_DS)
183bb898558SAl Viro 
184a6f05a6aSH. Peter Anvin void start_thread_ia32(struct pt_regs *regs, u32 new_ip, u32 new_sp);
185a6f05a6aSH. Peter Anvin #define compat_start_thread start_thread_ia32
186bb898558SAl Viro 
187d1a797f3SH. Peter Anvin void set_personality_ia32(bool);
188d1a797f3SH. Peter Anvin #define COMPAT_SET_PERSONALITY(ex)			\
189d1a797f3SH. Peter Anvin 	set_personality_ia32((ex).e_machine == EM_X86_64)
190bb898558SAl Viro 
191bb898558SAl Viro #define COMPAT_ELF_PLATFORM			("i686")
192bb898558SAl Viro 
193bb898558SAl Viro /*
194bb898558SAl Viro  * regs is struct pt_regs, pr_reg is elf_gregset_t (which is
195bb898558SAl Viro  * now struct_user_regs, they are different). Assumes current is the process
196bb898558SAl Viro  * getting dumped.
197bb898558SAl Viro  */
198bb898558SAl Viro 
199bb898558SAl Viro #define ELF_CORE_COPY_REGS(pr_reg, regs)			\
200bb898558SAl Viro do {								\
201bb898558SAl Viro 	unsigned v;						\
202bb898558SAl Viro 	(pr_reg)[0] = (regs)->r15;				\
203bb898558SAl Viro 	(pr_reg)[1] = (regs)->r14;				\
204bb898558SAl Viro 	(pr_reg)[2] = (regs)->r13;				\
205bb898558SAl Viro 	(pr_reg)[3] = (regs)->r12;				\
206bb898558SAl Viro 	(pr_reg)[4] = (regs)->bp;				\
207bb898558SAl Viro 	(pr_reg)[5] = (regs)->bx;				\
208bb898558SAl Viro 	(pr_reg)[6] = (regs)->r11;				\
209bb898558SAl Viro 	(pr_reg)[7] = (regs)->r10;				\
210bb898558SAl Viro 	(pr_reg)[8] = (regs)->r9;				\
211bb898558SAl Viro 	(pr_reg)[9] = (regs)->r8;				\
212bb898558SAl Viro 	(pr_reg)[10] = (regs)->ax;				\
213bb898558SAl Viro 	(pr_reg)[11] = (regs)->cx;				\
214bb898558SAl Viro 	(pr_reg)[12] = (regs)->dx;				\
215bb898558SAl Viro 	(pr_reg)[13] = (regs)->si;				\
216bb898558SAl Viro 	(pr_reg)[14] = (regs)->di;				\
217bb898558SAl Viro 	(pr_reg)[15] = (regs)->orig_ax;				\
218bb898558SAl Viro 	(pr_reg)[16] = (regs)->ip;				\
219bb898558SAl Viro 	(pr_reg)[17] = (regs)->cs;				\
220bb898558SAl Viro 	(pr_reg)[18] = (regs)->flags;				\
221bb898558SAl Viro 	(pr_reg)[19] = (regs)->sp;				\
222bb898558SAl Viro 	(pr_reg)[20] = (regs)->ss;				\
223bb898558SAl Viro 	(pr_reg)[21] = current->thread.fs;			\
224bb898558SAl Viro 	(pr_reg)[22] = current->thread.gs;			\
225bb898558SAl Viro 	asm("movl %%ds,%0" : "=r" (v)); (pr_reg)[23] = v;	\
226bb898558SAl Viro 	asm("movl %%es,%0" : "=r" (v)); (pr_reg)[24] = v;	\
227bb898558SAl Viro 	asm("movl %%fs,%0" : "=r" (v)); (pr_reg)[25] = v;	\
228bb898558SAl Viro 	asm("movl %%gs,%0" : "=r" (v)); (pr_reg)[26] = v;	\
229bb898558SAl Viro } while (0);
230bb898558SAl Viro 
231bb898558SAl Viro /* I'm not sure if we can use '-' here */
232bb898558SAl Viro #define ELF_PLATFORM       ("x86_64")
233bb898558SAl Viro extern void set_personality_64bit(void);
234bb898558SAl Viro extern unsigned int sysctl_vsyscall32;
235bb898558SAl Viro extern int force_personality32;
236bb898558SAl Viro 
237bb898558SAl Viro #endif /* !CONFIG_X86_32 */
238bb898558SAl Viro 
239bb898558SAl Viro #define CORE_DUMP_USE_REGSET
240bb898558SAl Viro #define ELF_EXEC_PAGESIZE	4096
241bb898558SAl Viro 
242bb898558SAl Viro /* This is the location that an ET_DYN program is loaded if exec'ed.  Typical
243bb898558SAl Viro    use of this is to invoke "./ld.so someprog" to test out a new version of
244bb898558SAl Viro    the loader.  We need to make sure that it is out of the way of the program
245bb898558SAl Viro    that it will "exec", and that there is sufficient room for the brk.  */
246bb898558SAl Viro 
247bb898558SAl Viro #define ELF_ET_DYN_BASE		(TASK_SIZE / 3 * 2)
248bb898558SAl Viro 
249bb898558SAl Viro /* This yields a mask that user programs can use to figure out what
250bb898558SAl Viro    instruction set this CPU supports.  This could be done in user space,
251bb898558SAl Viro    but it's not easy, and we've already done it here.  */
252bb898558SAl Viro 
253bb898558SAl Viro #define ELF_HWCAP		(boot_cpu_data.x86_capability[0])
254bb898558SAl Viro 
255bb898558SAl Viro /* This yields a string that ld.so will use to load implementation
256bb898558SAl Viro    specific libraries for optimization.  This is more specific in
257bb898558SAl Viro    intent than poking at uname or /proc/cpuinfo.
258bb898558SAl Viro 
259bb898558SAl Viro    For the moment, we have only optimizations for the Intel generations,
260bb898558SAl Viro    but that could change... */
261bb898558SAl Viro 
262bb898558SAl Viro #define SET_PERSONALITY(ex) set_personality_64bit()
263bb898558SAl Viro 
264bb898558SAl Viro /*
265bb898558SAl Viro  * An executable for which elf_read_implies_exec() returns TRUE will
266bb898558SAl Viro  * have the READ_IMPLIES_EXEC personality flag set automatically.
267bb898558SAl Viro  */
268bb898558SAl Viro #define elf_read_implies_exec(ex, executable_stack)	\
269bb898558SAl Viro 	(executable_stack != EXSTACK_DISABLE_X)
270bb898558SAl Viro 
271bb898558SAl Viro struct task_struct;
272bb898558SAl Viro 
273bb898558SAl Viro #define	ARCH_DLINFO_IA32(vdso_enabled)					\
274bb898558SAl Viro do {									\
275bb898558SAl Viro 	if (vdso_enabled) {						\
276bb898558SAl Viro 		NEW_AUX_ENT(AT_SYSINFO,	VDSO_ENTRY);			\
277bb898558SAl Viro 		NEW_AUX_ENT(AT_SYSINFO_EHDR, VDSO_CURRENT_BASE);	\
278bb898558SAl Viro 	}								\
279bb898558SAl Viro } while (0)
280bb898558SAl Viro 
281bb898558SAl Viro #ifdef CONFIG_X86_32
282bb898558SAl Viro 
28380938332SMichal Hocko #define STACK_RND_MASK (0x7ff)
28480938332SMichal Hocko 
285bb898558SAl Viro #define VDSO_HIGH_BASE		(__fix_to_virt(FIX_VDSO))
286bb898558SAl Viro 
287bb898558SAl Viro #define ARCH_DLINFO		ARCH_DLINFO_IA32(vdso_enabled)
288bb898558SAl Viro 
289bb898558SAl Viro /* update AT_VECTOR_SIZE_ARCH if the number of NEW_AUX_ENT entries changes */
290bb898558SAl Viro 
291bb898558SAl Viro #else /* CONFIG_X86_32 */
292bb898558SAl Viro 
293bb898558SAl Viro #define VDSO_HIGH_BASE		0xffffe000U /* CONFIG_COMPAT_VDSO address */
294bb898558SAl Viro 
295bb898558SAl Viro /* 1GB for 64bit, 8MB for 32bit */
2966bd33008SH. Peter Anvin #define STACK_RND_MASK (test_thread_flag(TIF_ADDR32) ? 0x7ff : 0x3fffff)
297bb898558SAl Viro 
298bb898558SAl Viro #define ARCH_DLINFO							\
299bb898558SAl Viro do {									\
300bb898558SAl Viro 	if (vdso_enabled)						\
301bb898558SAl Viro 		NEW_AUX_ENT(AT_SYSINFO_EHDR,				\
302bb898558SAl Viro 			    (unsigned long)current->mm->context.vdso);	\
303bb898558SAl Viro } while (0)
304bb898558SAl Viro 
305d1a797f3SH. Peter Anvin #define ARCH_DLINFO_X32							\
306d1a797f3SH. Peter Anvin do {									\
307d1a797f3SH. Peter Anvin 	if (vdso_enabled)						\
308d1a797f3SH. Peter Anvin 		NEW_AUX_ENT(AT_SYSINFO_EHDR,				\
309d1a797f3SH. Peter Anvin 			    (unsigned long)current->mm->context.vdso);	\
310d1a797f3SH. Peter Anvin } while (0)
311d1a797f3SH. Peter Anvin 
312bb898558SAl Viro #define AT_SYSINFO		32
313bb898558SAl Viro 
314d1a797f3SH. Peter Anvin #define COMPAT_ARCH_DLINFO						\
315d1a797f3SH. Peter Anvin if (test_thread_flag(TIF_X32))						\
316d1a797f3SH. Peter Anvin 	ARCH_DLINFO_X32;						\
317d1a797f3SH. Peter Anvin else									\
318d1a797f3SH. Peter Anvin 	ARCH_DLINFO_IA32(sysctl_vsyscall32)
319bb898558SAl Viro 
320bb898558SAl Viro #define COMPAT_ELF_ET_DYN_BASE	(TASK_UNMAPPED_BASE + 0x1000000)
321bb898558SAl Viro 
322bb898558SAl Viro #endif /* !CONFIG_X86_32 */
323bb898558SAl Viro 
324bb898558SAl Viro #define VDSO_CURRENT_BASE	((unsigned long)current->mm->context.vdso)
325bb898558SAl Viro 
326bb898558SAl Viro #define VDSO_ENTRY							\
327bb898558SAl Viro 	((unsigned long)VDSO32_SYMBOL(VDSO_CURRENT_BASE, vsyscall))
328bb898558SAl Viro 
329bb898558SAl Viro struct linux_binprm;
330bb898558SAl Viro 
331bb898558SAl Viro #define ARCH_HAS_SETUP_ADDITIONAL_PAGES 1
332bb898558SAl Viro extern int arch_setup_additional_pages(struct linux_binprm *bprm,
333fc5243d9SMartin Schwidefsky 				       int uses_interp);
334bb898558SAl Viro 
335bb898558SAl Viro extern int syscall32_setup_pages(struct linux_binprm *, int exstack);
336bb898558SAl Viro #define compat_arch_setup_additional_pages	syscall32_setup_pages
337bb898558SAl Viro 
338bb898558SAl Viro extern unsigned long arch_randomize_brk(struct mm_struct *mm);
339bb898558SAl Viro #define arch_randomize_brk arch_randomize_brk
340bb898558SAl Viro 
341dfb09f9bSBorislav Petkov /*
342dfb09f9bSBorislav Petkov  * True on X86_32 or when emulating IA32 on X86_64
343dfb09f9bSBorislav Petkov  */
344dfb09f9bSBorislav Petkov static inline int mmap_is_ia32(void)
345dfb09f9bSBorislav Petkov {
346dfb09f9bSBorislav Petkov #ifdef CONFIG_X86_32
347dfb09f9bSBorislav Petkov 	return 1;
348dfb09f9bSBorislav Petkov #endif
349dfb09f9bSBorislav Petkov #ifdef CONFIG_IA32_EMULATION
3506bd33008SH. Peter Anvin 	if (test_thread_flag(TIF_ADDR32))
351dfb09f9bSBorislav Petkov 		return 1;
352dfb09f9bSBorislav Petkov #endif
353dfb09f9bSBorislav Petkov 	return 0;
354dfb09f9bSBorislav Petkov }
355dfb09f9bSBorislav Petkov 
356dfb09f9bSBorislav Petkov /* The first two values are special, do not change. See align_addr() */
357dfb09f9bSBorislav Petkov enum align_flags {
358dfb09f9bSBorislav Petkov 	ALIGN_VA_32	= BIT(0),
359dfb09f9bSBorislav Petkov 	ALIGN_VA_64	= BIT(1),
360dfb09f9bSBorislav Petkov 	ALIGN_VDSO	= BIT(2),
361dfb09f9bSBorislav Petkov 	ALIGN_TOPDOWN	= BIT(3),
362dfb09f9bSBorislav Petkov };
363dfb09f9bSBorislav Petkov 
364dfb09f9bSBorislav Petkov struct va_alignment {
365dfb09f9bSBorislav Petkov 	int flags;
366dfb09f9bSBorislav Petkov 	unsigned long mask;
367dfb09f9bSBorislav Petkov } ____cacheline_aligned;
368dfb09f9bSBorislav Petkov 
369dfb09f9bSBorislav Petkov extern struct va_alignment va_align;
370dfb09f9bSBorislav Petkov extern unsigned long align_addr(unsigned long, struct file *, enum align_flags);
3711965aae3SH. Peter Anvin #endif /* _ASM_X86_ELF_H */
372