11965aae3SH. Peter Anvin #ifndef _ASM_X86_ELF_H 21965aae3SH. Peter Anvin #define _ASM_X86_ELF_H 3bb898558SAl Viro 4bb898558SAl Viro /* 5bb898558SAl Viro * ELF register definitions.. 6bb898558SAl Viro */ 7dfb09f9bSBorislav Petkov #include <linux/thread_info.h> 8bb898558SAl Viro 9bb898558SAl Viro #include <asm/ptrace.h> 10bb898558SAl Viro #include <asm/user.h> 11bb898558SAl Viro #include <asm/auxvec.h> 12bb898558SAl Viro 13bb898558SAl Viro typedef unsigned long elf_greg_t; 14bb898558SAl Viro 15bb898558SAl Viro #define ELF_NGREG (sizeof(struct user_regs_struct) / sizeof(elf_greg_t)) 16bb898558SAl Viro typedef elf_greg_t elf_gregset_t[ELF_NGREG]; 17bb898558SAl Viro 18bb898558SAl Viro typedef struct user_i387_struct elf_fpregset_t; 19bb898558SAl Viro 20bb898558SAl Viro #ifdef __i386__ 21bb898558SAl Viro 22bb898558SAl Viro typedef struct user_fxsr_struct elf_fpxregset_t; 23bb898558SAl Viro 24bb898558SAl Viro #define R_386_NONE 0 25bb898558SAl Viro #define R_386_32 1 26bb898558SAl Viro #define R_386_PC32 2 27bb898558SAl Viro #define R_386_GOT32 3 28bb898558SAl Viro #define R_386_PLT32 4 29bb898558SAl Viro #define R_386_COPY 5 30bb898558SAl Viro #define R_386_GLOB_DAT 6 31bb898558SAl Viro #define R_386_JMP_SLOT 7 32bb898558SAl Viro #define R_386_RELATIVE 8 33bb898558SAl Viro #define R_386_GOTOFF 9 34bb898558SAl Viro #define R_386_GOTPC 10 35bb898558SAl Viro #define R_386_NUM 11 36bb898558SAl Viro 37bb898558SAl Viro /* 38bb898558SAl Viro * These are used to set parameters in the core dumps. 39bb898558SAl Viro */ 40bb898558SAl Viro #define ELF_CLASS ELFCLASS32 41bb898558SAl Viro #define ELF_DATA ELFDATA2LSB 42bb898558SAl Viro #define ELF_ARCH EM_386 43bb898558SAl Viro 44bb898558SAl Viro #else 45bb898558SAl Viro 46bb898558SAl Viro /* x86-64 relocation types */ 47bb898558SAl Viro #define R_X86_64_NONE 0 /* No reloc */ 48bb898558SAl Viro #define R_X86_64_64 1 /* Direct 64 bit */ 49bb898558SAl Viro #define R_X86_64_PC32 2 /* PC relative 32 bit signed */ 50bb898558SAl Viro #define R_X86_64_GOT32 3 /* 32 bit GOT entry */ 51bb898558SAl Viro #define R_X86_64_PLT32 4 /* 32 bit PLT address */ 52bb898558SAl Viro #define R_X86_64_COPY 5 /* Copy symbol at runtime */ 53bb898558SAl Viro #define R_X86_64_GLOB_DAT 6 /* Create GOT entry */ 54bb898558SAl Viro #define R_X86_64_JUMP_SLOT 7 /* Create PLT entry */ 55bb898558SAl Viro #define R_X86_64_RELATIVE 8 /* Adjust by program base */ 56bb898558SAl Viro #define R_X86_64_GOTPCREL 9 /* 32 bit signed pc relative 57bb898558SAl Viro offset to GOT */ 58bb898558SAl Viro #define R_X86_64_32 10 /* Direct 32 bit zero extended */ 59bb898558SAl Viro #define R_X86_64_32S 11 /* Direct 32 bit sign extended */ 60bb898558SAl Viro #define R_X86_64_16 12 /* Direct 16 bit zero extended */ 61bb898558SAl Viro #define R_X86_64_PC16 13 /* 16 bit sign extended pc relative */ 62bb898558SAl Viro #define R_X86_64_8 14 /* Direct 8 bit sign extended */ 63bb898558SAl Viro #define R_X86_64_PC8 15 /* 8 bit sign extended pc relative */ 64bb898558SAl Viro 65bb898558SAl Viro #define R_X86_64_NUM 16 66bb898558SAl Viro 67bb898558SAl Viro /* 68bb898558SAl Viro * These are used to set parameters in the core dumps. 69bb898558SAl Viro */ 70bb898558SAl Viro #define ELF_CLASS ELFCLASS64 71bb898558SAl Viro #define ELF_DATA ELFDATA2LSB 72bb898558SAl Viro #define ELF_ARCH EM_X86_64 73bb898558SAl Viro 74bb898558SAl Viro #endif 75bb898558SAl Viro 76bb898558SAl Viro #include <asm/vdso.h> 77bb898558SAl Viro 78*3d7ee969SAndy Lutomirski #ifdef CONFIG_X86_64 79*3d7ee969SAndy Lutomirski extern unsigned int vdso64_enabled; 80*3d7ee969SAndy Lutomirski #endif 81*3d7ee969SAndy Lutomirski #if defined(CONFIG_X86_32) || defined(CONFIG_COMPAT) 82*3d7ee969SAndy Lutomirski extern unsigned int vdso32_enabled; 83*3d7ee969SAndy Lutomirski #endif 84bb898558SAl Viro 85bb898558SAl Viro /* 86bb898558SAl Viro * This is used to ensure we don't load something for the wrong architecture. 87bb898558SAl Viro */ 88bb898558SAl Viro #define elf_check_arch_ia32(x) \ 89bb898558SAl Viro (((x)->e_machine == EM_386) || ((x)->e_machine == EM_486)) 90bb898558SAl Viro 91bb898558SAl Viro #include <asm/processor.h> 92bb898558SAl Viro 93bb898558SAl Viro #ifdef CONFIG_X86_32 94bb898558SAl Viro #include <asm/desc.h> 95bb898558SAl Viro 96bb898558SAl Viro #define elf_check_arch(x) elf_check_arch_ia32(x) 97bb898558SAl Viro 98bb898558SAl Viro /* SVR4/i386 ABI (pages 3-31, 3-32) says that when the program starts %edx 99bb898558SAl Viro contains a pointer to a function which might be registered using `atexit'. 100bb898558SAl Viro This provides a mean for the dynamic linker to call DT_FINI functions for 101bb898558SAl Viro shared libraries that have been loaded before the code runs. 102bb898558SAl Viro 103bb898558SAl Viro A value of 0 tells we have no such handler. 104bb898558SAl Viro 105bb898558SAl Viro We might as well make sure everything else is cleared too (except for %esp), 106bb898558SAl Viro just to make things more deterministic. 107bb898558SAl Viro */ 108bb898558SAl Viro #define ELF_PLAT_INIT(_r, load_addr) \ 109bb898558SAl Viro do { \ 110bb898558SAl Viro _r->bx = 0; _r->cx = 0; _r->dx = 0; \ 111bb898558SAl Viro _r->si = 0; _r->di = 0; _r->bp = 0; \ 112bb898558SAl Viro _r->ax = 0; \ 113bb898558SAl Viro } while (0) 114bb898558SAl Viro 115bb898558SAl Viro /* 116bb898558SAl Viro * regs is struct pt_regs, pr_reg is elf_gregset_t (which is 117bb898558SAl Viro * now struct_user_regs, they are different) 118bb898558SAl Viro */ 119bb898558SAl Viro 120ccbeed3aSTejun Heo #define ELF_CORE_COPY_REGS_COMMON(pr_reg, regs) \ 121bb898558SAl Viro do { \ 122bb898558SAl Viro pr_reg[0] = regs->bx; \ 123bb898558SAl Viro pr_reg[1] = regs->cx; \ 124bb898558SAl Viro pr_reg[2] = regs->dx; \ 125bb898558SAl Viro pr_reg[3] = regs->si; \ 126bb898558SAl Viro pr_reg[4] = regs->di; \ 127bb898558SAl Viro pr_reg[5] = regs->bp; \ 128bb898558SAl Viro pr_reg[6] = regs->ax; \ 129bb898558SAl Viro pr_reg[7] = regs->ds & 0xffff; \ 130bb898558SAl Viro pr_reg[8] = regs->es & 0xffff; \ 131bb898558SAl Viro pr_reg[9] = regs->fs & 0xffff; \ 132bb898558SAl Viro pr_reg[11] = regs->orig_ax; \ 133bb898558SAl Viro pr_reg[12] = regs->ip; \ 134bb898558SAl Viro pr_reg[13] = regs->cs & 0xffff; \ 135bb898558SAl Viro pr_reg[14] = regs->flags; \ 136bb898558SAl Viro pr_reg[15] = regs->sp; \ 137bb898558SAl Viro pr_reg[16] = regs->ss & 0xffff; \ 138bb898558SAl Viro } while (0); 139bb898558SAl Viro 140ccbeed3aSTejun Heo #define ELF_CORE_COPY_REGS(pr_reg, regs) \ 141ccbeed3aSTejun Heo do { \ 142ccbeed3aSTejun Heo ELF_CORE_COPY_REGS_COMMON(pr_reg, regs);\ 143ccbeed3aSTejun Heo pr_reg[10] = get_user_gs(regs); \ 144ccbeed3aSTejun Heo } while (0); 145ccbeed3aSTejun Heo 146ccbeed3aSTejun Heo #define ELF_CORE_COPY_KERNEL_REGS(pr_reg, regs) \ 147ccbeed3aSTejun Heo do { \ 148ccbeed3aSTejun Heo ELF_CORE_COPY_REGS_COMMON(pr_reg, regs);\ 149ccbeed3aSTejun Heo savesegment(gs, pr_reg[10]); \ 150ccbeed3aSTejun Heo } while (0); 151ccbeed3aSTejun Heo 152bb898558SAl Viro #define ELF_PLATFORM (utsname()->machine) 153bb898558SAl Viro #define set_personality_64bit() do { } while (0) 154bb898558SAl Viro 155bb898558SAl Viro #else /* CONFIG_X86_32 */ 156bb898558SAl Viro 157bb898558SAl Viro /* 158bb898558SAl Viro * This is used to ensure we don't load something for the wrong architecture. 159bb898558SAl Viro */ 160bb898558SAl Viro #define elf_check_arch(x) \ 161bb898558SAl Viro ((x)->e_machine == EM_X86_64) 162bb898558SAl Viro 163d1a797f3SH. Peter Anvin #define compat_elf_check_arch(x) \ 164d1a797f3SH. Peter Anvin (elf_check_arch_ia32(x) || (x)->e_machine == EM_X86_64) 165d1a797f3SH. Peter Anvin 166d1a797f3SH. Peter Anvin #if __USER32_DS != __USER_DS 167d1a797f3SH. Peter Anvin # error "The following code assumes __USER32_DS == __USER_DS" 168d1a797f3SH. Peter Anvin #endif 169bb898558SAl Viro 170bb898558SAl Viro static inline void elf_common_init(struct thread_struct *t, 171bb898558SAl Viro struct pt_regs *regs, const u16 ds) 172bb898558SAl Viro { 173bb898558SAl Viro regs->ax = regs->bx = regs->cx = regs->dx = 0; 174bb898558SAl Viro regs->si = regs->di = regs->bp = 0; 175bb898558SAl Viro regs->r8 = regs->r9 = regs->r10 = regs->r11 = 0; 176bb898558SAl Viro regs->r12 = regs->r13 = regs->r14 = regs->r15 = 0; 177bb898558SAl Viro t->fs = t->gs = 0; 178bb898558SAl Viro t->fsindex = t->gsindex = 0; 179bb898558SAl Viro t->ds = t->es = ds; 180bb898558SAl Viro } 181bb898558SAl Viro 182bb898558SAl Viro #define ELF_PLAT_INIT(_r, load_addr) \ 18311557b24SOleg Nesterov elf_common_init(¤t->thread, _r, 0) 184bb898558SAl Viro 185bb898558SAl Viro #define COMPAT_ELF_PLAT_INIT(regs, load_addr) \ 186bb898558SAl Viro elf_common_init(¤t->thread, regs, __USER_DS) 187bb898558SAl Viro 188a6f05a6aSH. Peter Anvin void start_thread_ia32(struct pt_regs *regs, u32 new_ip, u32 new_sp); 189a6f05a6aSH. Peter Anvin #define compat_start_thread start_thread_ia32 190bb898558SAl Viro 191d1a797f3SH. Peter Anvin void set_personality_ia32(bool); 192d1a797f3SH. Peter Anvin #define COMPAT_SET_PERSONALITY(ex) \ 193d1a797f3SH. Peter Anvin set_personality_ia32((ex).e_machine == EM_X86_64) 194bb898558SAl Viro 195bb898558SAl Viro #define COMPAT_ELF_PLATFORM ("i686") 196bb898558SAl Viro 197bb898558SAl Viro /* 198bb898558SAl Viro * regs is struct pt_regs, pr_reg is elf_gregset_t (which is 199bb898558SAl Viro * now struct_user_regs, they are different). Assumes current is the process 200bb898558SAl Viro * getting dumped. 201bb898558SAl Viro */ 202bb898558SAl Viro 203bb898558SAl Viro #define ELF_CORE_COPY_REGS(pr_reg, regs) \ 204bb898558SAl Viro do { \ 205bb898558SAl Viro unsigned v; \ 206bb898558SAl Viro (pr_reg)[0] = (regs)->r15; \ 207bb898558SAl Viro (pr_reg)[1] = (regs)->r14; \ 208bb898558SAl Viro (pr_reg)[2] = (regs)->r13; \ 209bb898558SAl Viro (pr_reg)[3] = (regs)->r12; \ 210bb898558SAl Viro (pr_reg)[4] = (regs)->bp; \ 211bb898558SAl Viro (pr_reg)[5] = (regs)->bx; \ 212bb898558SAl Viro (pr_reg)[6] = (regs)->r11; \ 213bb898558SAl Viro (pr_reg)[7] = (regs)->r10; \ 214bb898558SAl Viro (pr_reg)[8] = (regs)->r9; \ 215bb898558SAl Viro (pr_reg)[9] = (regs)->r8; \ 216bb898558SAl Viro (pr_reg)[10] = (regs)->ax; \ 217bb898558SAl Viro (pr_reg)[11] = (regs)->cx; \ 218bb898558SAl Viro (pr_reg)[12] = (regs)->dx; \ 219bb898558SAl Viro (pr_reg)[13] = (regs)->si; \ 220bb898558SAl Viro (pr_reg)[14] = (regs)->di; \ 221bb898558SAl Viro (pr_reg)[15] = (regs)->orig_ax; \ 222bb898558SAl Viro (pr_reg)[16] = (regs)->ip; \ 223bb898558SAl Viro (pr_reg)[17] = (regs)->cs; \ 224bb898558SAl Viro (pr_reg)[18] = (regs)->flags; \ 225bb898558SAl Viro (pr_reg)[19] = (regs)->sp; \ 226bb898558SAl Viro (pr_reg)[20] = (regs)->ss; \ 227bb898558SAl Viro (pr_reg)[21] = current->thread.fs; \ 228bb898558SAl Viro (pr_reg)[22] = current->thread.gs; \ 229bb898558SAl Viro asm("movl %%ds,%0" : "=r" (v)); (pr_reg)[23] = v; \ 230bb898558SAl Viro asm("movl %%es,%0" : "=r" (v)); (pr_reg)[24] = v; \ 231bb898558SAl Viro asm("movl %%fs,%0" : "=r" (v)); (pr_reg)[25] = v; \ 232bb898558SAl Viro asm("movl %%gs,%0" : "=r" (v)); (pr_reg)[26] = v; \ 233bb898558SAl Viro } while (0); 234bb898558SAl Viro 235bb898558SAl Viro /* I'm not sure if we can use '-' here */ 236bb898558SAl Viro #define ELF_PLATFORM ("x86_64") 237bb898558SAl Viro extern void set_personality_64bit(void); 238bb898558SAl Viro extern unsigned int sysctl_vsyscall32; 239bb898558SAl Viro extern int force_personality32; 240bb898558SAl Viro 241bb898558SAl Viro #endif /* !CONFIG_X86_32 */ 242bb898558SAl Viro 243bb898558SAl Viro #define CORE_DUMP_USE_REGSET 244bb898558SAl Viro #define ELF_EXEC_PAGESIZE 4096 245bb898558SAl Viro 246bb898558SAl Viro /* This is the location that an ET_DYN program is loaded if exec'ed. Typical 247bb898558SAl Viro use of this is to invoke "./ld.so someprog" to test out a new version of 248bb898558SAl Viro the loader. We need to make sure that it is out of the way of the program 249bb898558SAl Viro that it will "exec", and that there is sufficient room for the brk. */ 250bb898558SAl Viro 251bb898558SAl Viro #define ELF_ET_DYN_BASE (TASK_SIZE / 3 * 2) 252bb898558SAl Viro 253bb898558SAl Viro /* This yields a mask that user programs can use to figure out what 254bb898558SAl Viro instruction set this CPU supports. This could be done in user space, 255bb898558SAl Viro but it's not easy, and we've already done it here. */ 256bb898558SAl Viro 257bb898558SAl Viro #define ELF_HWCAP (boot_cpu_data.x86_capability[0]) 258bb898558SAl Viro 259bb898558SAl Viro /* This yields a string that ld.so will use to load implementation 260bb898558SAl Viro specific libraries for optimization. This is more specific in 261bb898558SAl Viro intent than poking at uname or /proc/cpuinfo. 262bb898558SAl Viro 263bb898558SAl Viro For the moment, we have only optimizations for the Intel generations, 264bb898558SAl Viro but that could change... */ 265bb898558SAl Viro 266bb898558SAl Viro #define SET_PERSONALITY(ex) set_personality_64bit() 267bb898558SAl Viro 268bb898558SAl Viro /* 269bb898558SAl Viro * An executable for which elf_read_implies_exec() returns TRUE will 270bb898558SAl Viro * have the READ_IMPLIES_EXEC personality flag set automatically. 271bb898558SAl Viro */ 272bb898558SAl Viro #define elf_read_implies_exec(ex, executable_stack) \ 273bb898558SAl Viro (executable_stack != EXSTACK_DISABLE_X) 274bb898558SAl Viro 275bb898558SAl Viro struct task_struct; 276bb898558SAl Viro 277*3d7ee969SAndy Lutomirski #define ARCH_DLINFO_IA32 \ 278bb898558SAl Viro do { \ 279*3d7ee969SAndy Lutomirski if (vdso32_enabled) { \ 280bb898558SAl Viro NEW_AUX_ENT(AT_SYSINFO, VDSO_ENTRY); \ 281bb898558SAl Viro NEW_AUX_ENT(AT_SYSINFO_EHDR, VDSO_CURRENT_BASE); \ 282bb898558SAl Viro } \ 283bb898558SAl Viro } while (0) 284bb898558SAl Viro 285bb898558SAl Viro #ifdef CONFIG_X86_32 286bb898558SAl Viro 28780938332SMichal Hocko #define STACK_RND_MASK (0x7ff) 28880938332SMichal Hocko 289*3d7ee969SAndy Lutomirski #define ARCH_DLINFO ARCH_DLINFO_IA32 290bb898558SAl Viro 291bb898558SAl Viro /* update AT_VECTOR_SIZE_ARCH if the number of NEW_AUX_ENT entries changes */ 292bb898558SAl Viro 293bb898558SAl Viro #else /* CONFIG_X86_32 */ 294bb898558SAl Viro 295bb898558SAl Viro /* 1GB for 64bit, 8MB for 32bit */ 2966bd33008SH. Peter Anvin #define STACK_RND_MASK (test_thread_flag(TIF_ADDR32) ? 0x7ff : 0x3fffff) 297bb898558SAl Viro 298bb898558SAl Viro #define ARCH_DLINFO \ 299bb898558SAl Viro do { \ 300*3d7ee969SAndy Lutomirski if (vdso64_enabled) \ 301bb898558SAl Viro NEW_AUX_ENT(AT_SYSINFO_EHDR, \ 302bb898558SAl Viro (unsigned long)current->mm->context.vdso); \ 303bb898558SAl Viro } while (0) 304bb898558SAl Viro 305*3d7ee969SAndy Lutomirski /* As a historical oddity, the x32 and x86_64 vDSOs are controlled together. */ 306d1a797f3SH. Peter Anvin #define ARCH_DLINFO_X32 \ 307d1a797f3SH. Peter Anvin do { \ 308*3d7ee969SAndy Lutomirski if (vdso64_enabled) \ 309d1a797f3SH. Peter Anvin NEW_AUX_ENT(AT_SYSINFO_EHDR, \ 310d1a797f3SH. Peter Anvin (unsigned long)current->mm->context.vdso); \ 311d1a797f3SH. Peter Anvin } while (0) 312d1a797f3SH. Peter Anvin 313bb898558SAl Viro #define AT_SYSINFO 32 314bb898558SAl Viro 315d1a797f3SH. Peter Anvin #define COMPAT_ARCH_DLINFO \ 316d1a797f3SH. Peter Anvin if (test_thread_flag(TIF_X32)) \ 317d1a797f3SH. Peter Anvin ARCH_DLINFO_X32; \ 318d1a797f3SH. Peter Anvin else \ 319*3d7ee969SAndy Lutomirski ARCH_DLINFO_IA32 320bb898558SAl Viro 321bb898558SAl Viro #define COMPAT_ELF_ET_DYN_BASE (TASK_UNMAPPED_BASE + 0x1000000) 322bb898558SAl Viro 323bb898558SAl Viro #endif /* !CONFIG_X86_32 */ 324bb898558SAl Viro 325bb898558SAl Viro #define VDSO_CURRENT_BASE ((unsigned long)current->mm->context.vdso) 326bb898558SAl Viro 327bb898558SAl Viro #define VDSO_ENTRY \ 328bb898558SAl Viro ((unsigned long)VDSO32_SYMBOL(VDSO_CURRENT_BASE, vsyscall)) 329bb898558SAl Viro 330bb898558SAl Viro struct linux_binprm; 331bb898558SAl Viro 332bb898558SAl Viro #define ARCH_HAS_SETUP_ADDITIONAL_PAGES 1 333bb898558SAl Viro extern int arch_setup_additional_pages(struct linux_binprm *bprm, 334fc5243d9SMartin Schwidefsky int uses_interp); 33522e842d4SH. Peter Anvin extern int x32_setup_additional_pages(struct linux_binprm *bprm, 33622e842d4SH. Peter Anvin int uses_interp); 337bb898558SAl Viro 338bb898558SAl Viro extern int syscall32_setup_pages(struct linux_binprm *, int exstack); 339bb898558SAl Viro #define compat_arch_setup_additional_pages syscall32_setup_pages 340bb898558SAl Viro 341bb898558SAl Viro extern unsigned long arch_randomize_brk(struct mm_struct *mm); 342bb898558SAl Viro #define arch_randomize_brk arch_randomize_brk 343bb898558SAl Viro 344dfb09f9bSBorislav Petkov /* 345dfb09f9bSBorislav Petkov * True on X86_32 or when emulating IA32 on X86_64 346dfb09f9bSBorislav Petkov */ 347dfb09f9bSBorislav Petkov static inline int mmap_is_ia32(void) 348dfb09f9bSBorislav Petkov { 349dfb09f9bSBorislav Petkov #ifdef CONFIG_X86_32 350dfb09f9bSBorislav Petkov return 1; 351dfb09f9bSBorislav Petkov #endif 352dfb09f9bSBorislav Petkov #ifdef CONFIG_IA32_EMULATION 3536bd33008SH. Peter Anvin if (test_thread_flag(TIF_ADDR32)) 354dfb09f9bSBorislav Petkov return 1; 355dfb09f9bSBorislav Petkov #endif 356dfb09f9bSBorislav Petkov return 0; 357dfb09f9bSBorislav Petkov } 358dfb09f9bSBorislav Petkov 359f9902472SMichel Lespinasse /* Do not change the values. See get_align_mask() */ 360dfb09f9bSBorislav Petkov enum align_flags { 361dfb09f9bSBorislav Petkov ALIGN_VA_32 = BIT(0), 362dfb09f9bSBorislav Petkov ALIGN_VA_64 = BIT(1), 363dfb09f9bSBorislav Petkov }; 364dfb09f9bSBorislav Petkov 365dfb09f9bSBorislav Petkov struct va_alignment { 366dfb09f9bSBorislav Petkov int flags; 367dfb09f9bSBorislav Petkov unsigned long mask; 368dfb09f9bSBorislav Petkov } ____cacheline_aligned; 369dfb09f9bSBorislav Petkov 370dfb09f9bSBorislav Petkov extern struct va_alignment va_align; 371f9902472SMichel Lespinasse extern unsigned long align_vdso_addr(unsigned long); 3721965aae3SH. Peter Anvin #endif /* _ASM_X86_ELF_H */ 373