]> git.proxmox.com Git - mirror_ubuntu-zesty-kernel.git/blame - arch/x86/kernel/process_64.c
Merge branch 'printk-cleanups'
[mirror_ubuntu-zesty-kernel.git] / arch / x86 / kernel / process_64.c
CommitLineData
1da177e4 1/*
1da177e4
LT
2 * Copyright (C) 1995 Linus Torvalds
3 *
4 * Pentium III FXSR, SSE support
5 * Gareth Hughes <gareth@valinux.com>, May 2000
6612538c 6 *
1da177e4
LT
7 * X86-64 port
8 * Andi Kleen.
76e4f660
AR
9 *
10 * CPU hotplug support - ashok.raj@intel.com
1da177e4
LT
11 */
12
13/*
14 * This file handles the architecture-dependent parts of process handling..
15 */
16
76e4f660 17#include <linux/cpu.h>
1da177e4
LT
18#include <linux/errno.h>
19#include <linux/sched.h>
6612538c 20#include <linux/fs.h>
1da177e4
LT
21#include <linux/kernel.h>
22#include <linux/mm.h>
23#include <linux/elfcore.h>
24#include <linux/smp.h>
25#include <linux/slab.h>
26#include <linux/user.h>
1da177e4
LT
27#include <linux/interrupt.h>
28#include <linux/delay.h>
186f4360 29#include <linux/export.h>
1da177e4 30#include <linux/ptrace.h>
95833c83 31#include <linux/notifier.h>
c6fd91f0 32#include <linux/kprobes.h>
1eeb66a1 33#include <linux/kdebug.h>
529e25f6 34#include <linux/prctl.h>
7de08b4e
GP
35#include <linux/uaccess.h>
36#include <linux/io.h>
8b96f011 37#include <linux/ftrace.h>
1da177e4 38
1da177e4 39#include <asm/pgtable.h>
1da177e4 40#include <asm/processor.h>
78f7f1e5 41#include <asm/fpu/internal.h>
1da177e4 42#include <asm/mmu_context.h>
1da177e4 43#include <asm/prctl.h>
1da177e4
LT
44#include <asm/desc.h>
45#include <asm/proto.h>
46#include <asm/ia32.h>
95833c83 47#include <asm/idle.h>
bbc1f698 48#include <asm/syscalls.h>
66cb5917 49#include <asm/debugreg.h>
f05e798a 50#include <asm/switch_to.h>
b7a58459 51#include <asm/xen/hypervisor.h>
2eefd878 52#include <asm/vdso.h>
1da177e4 53
c38e5038 54__visible DEFINE_PER_CPU(unsigned long, rsp_scratch);
1da177e4 55
6612538c 56/* Prints also some state that isn't saved in the pt_regs */
e2ce07c8 57void __show_regs(struct pt_regs *regs, int all)
1da177e4
LT
58{
59 unsigned long cr0 = 0L, cr2 = 0L, cr3 = 0L, cr4 = 0L, fs, gs, shadowgs;
bb1995d5 60 unsigned long d0, d1, d2, d3, d6, d7;
6612538c
HS
61 unsigned int fsindex, gsindex;
62 unsigned int ds, cs, es;
814e2c84 63
d015a092 64 printk(KERN_DEFAULT "RIP: %04lx:[<%016lx>] ", regs->cs & 0xffff, regs->ip);
5f01c988 65 printk_address(regs->ip);
d015a092 66 printk(KERN_DEFAULT "RSP: %04lx:%016lx EFLAGS: %08lx\n", regs->ss,
8092c654 67 regs->sp, regs->flags);
d015a092 68 printk(KERN_DEFAULT "RAX: %016lx RBX: %016lx RCX: %016lx\n",
65ea5b03 69 regs->ax, regs->bx, regs->cx);
d015a092 70 printk(KERN_DEFAULT "RDX: %016lx RSI: %016lx RDI: %016lx\n",
65ea5b03 71 regs->dx, regs->si, regs->di);
d015a092 72 printk(KERN_DEFAULT "RBP: %016lx R08: %016lx R09: %016lx\n",
65ea5b03 73 regs->bp, regs->r8, regs->r9);
d015a092 74 printk(KERN_DEFAULT "R10: %016lx R11: %016lx R12: %016lx\n",
7de08b4e 75 regs->r10, regs->r11, regs->r12);
d015a092 76 printk(KERN_DEFAULT "R13: %016lx R14: %016lx R15: %016lx\n",
7de08b4e 77 regs->r13, regs->r14, regs->r15);
1da177e4 78
7de08b4e
GP
79 asm("movl %%ds,%0" : "=r" (ds));
80 asm("movl %%cs,%0" : "=r" (cs));
81 asm("movl %%es,%0" : "=r" (es));
1da177e4
LT
82 asm("movl %%fs,%0" : "=r" (fsindex));
83 asm("movl %%gs,%0" : "=r" (gsindex));
84
85 rdmsrl(MSR_FS_BASE, fs);
7de08b4e
GP
86 rdmsrl(MSR_GS_BASE, gs);
87 rdmsrl(MSR_KERNEL_GS_BASE, shadowgs);
1da177e4 88
e2ce07c8
PE
89 if (!all)
90 return;
1da177e4 91
f51c9452
GOC
92 cr0 = read_cr0();
93 cr2 = read_cr2();
94 cr3 = read_cr3();
1e02ce4c 95 cr4 = __read_cr4();
1da177e4 96
d015a092 97 printk(KERN_DEFAULT "FS: %016lx(%04x) GS:%016lx(%04x) knlGS:%016lx\n",
7de08b4e 98 fs, fsindex, gs, gsindex, shadowgs);
d015a092 99 printk(KERN_DEFAULT "CS: %04x DS: %04x ES: %04x CR0: %016lx\n", cs, ds,
8092c654 100 es, cr0);
d015a092 101 printk(KERN_DEFAULT "CR2: %016lx CR3: %016lx CR4: %016lx\n", cr2, cr3,
8092c654 102 cr4);
bb1995d5
AS
103
104 get_debugreg(d0, 0);
105 get_debugreg(d1, 1);
106 get_debugreg(d2, 2);
bb1995d5
AS
107 get_debugreg(d3, 3);
108 get_debugreg(d6, 6);
109 get_debugreg(d7, 7);
4338774c
DJ
110
111 /* Only print out debug registers if they are in their non-default state. */
112 if ((d0 == 0) && (d1 == 0) && (d2 == 0) && (d3 == 0) &&
113 (d6 == DR6_RESERVED) && (d7 == 0x400))
114 return;
115
116 printk(KERN_DEFAULT "DR0: %016lx DR1: %016lx DR2: %016lx\n", d0, d1, d2);
d015a092 117 printk(KERN_DEFAULT "DR3: %016lx DR6: %016lx DR7: %016lx\n", d3, d6, d7);
4338774c 118
c0b17b5b
DH
119 if (boot_cpu_has(X86_FEATURE_OSPKE))
120 printk(KERN_DEFAULT "PKRU: %08x\n", read_pkru());
1da177e4
LT
121}
122
1da177e4
LT
123void release_thread(struct task_struct *dead_task)
124{
125 if (dead_task->mm) {
a5b9e5a2 126#ifdef CONFIG_MODIFY_LDT_SYSCALL
37868fe1 127 if (dead_task->mm->context.ldt) {
349eab6e 128 pr_warn("WARNING: dead process %s still has LDT? <%p/%d>\n",
c767a54b 129 dead_task->comm,
0d430e3f 130 dead_task->mm->context.ldt->entries,
37868fe1 131 dead_task->mm->context.ldt->size);
1da177e4
LT
132 BUG();
133 }
a5b9e5a2 134#endif
1da177e4
LT
135 }
136}
137
c1bd55f9
JT
138int copy_thread_tls(unsigned long clone_flags, unsigned long sp,
139 unsigned long arg, struct task_struct *p, unsigned long tls)
1da177e4
LT
140{
141 int err;
7de08b4e 142 struct pt_regs *childregs;
0100301b
BG
143 struct fork_frame *fork_frame;
144 struct inactive_task_frame *frame;
1da177e4
LT
145 struct task_struct *me = current;
146
7076aada
AV
147 p->thread.sp0 = (unsigned long)task_stack_page(p) + THREAD_SIZE;
148 childregs = task_pt_regs(p);
0100301b
BG
149 fork_frame = container_of(childregs, struct fork_frame, regs);
150 frame = &fork_frame->frame;
151 frame->bp = 0;
152 frame->ret_addr = (unsigned long) ret_from_fork;
153 p->thread.sp = (unsigned long) fork_frame;
66cb5917 154 p->thread.io_bitmap_ptr = NULL;
1da177e4 155
ada85708 156 savesegment(gs, p->thread.gsindex);
296f781a 157 p->thread.gsbase = p->thread.gsindex ? 0 : me->thread.gsbase;
ada85708 158 savesegment(fs, p->thread.fsindex);
296f781a 159 p->thread.fsbase = p->thread.fsindex ? 0 : me->thread.fsbase;
ada85708
JF
160 savesegment(es, p->thread.es);
161 savesegment(ds, p->thread.ds);
7076aada
AV
162 memset(p->thread.ptrace_bps, 0, sizeof(p->thread.ptrace_bps));
163
1d4b4b29 164 if (unlikely(p->flags & PF_KTHREAD)) {
7076aada
AV
165 /* kernel thread */
166 memset(childregs, 0, sizeof(struct pt_regs));
616d2483
BG
167 frame->bx = sp; /* function */
168 frame->r12 = arg;
7076aada
AV
169 return 0;
170 }
616d2483 171 frame->bx = 0;
1d4b4b29 172 *childregs = *current_pt_regs();
7076aada
AV
173
174 childregs->ax = 0;
1d4b4b29
AV
175 if (sp)
176 childregs->sp = sp;
1da177e4 177
66cb5917 178 err = -ENOMEM;
d3a4f48d 179 if (unlikely(test_tsk_thread_flag(me, TIF_IO_BITMAP))) {
cced4022
TM
180 p->thread.io_bitmap_ptr = kmemdup(me->thread.io_bitmap_ptr,
181 IO_BITMAP_BYTES, GFP_KERNEL);
1da177e4
LT
182 if (!p->thread.io_bitmap_ptr) {
183 p->thread.io_bitmap_max = 0;
184 return -ENOMEM;
185 }
d3a4f48d 186 set_tsk_thread_flag(p, TIF_IO_BITMAP);
6612538c 187 }
1da177e4
LT
188
189 /*
190 * Set a new TLS for the child thread?
191 */
192 if (clone_flags & CLONE_SETTLS) {
193#ifdef CONFIG_IA32_EMULATION
abfb9498 194 if (in_ia32_syscall())
efd1ca52 195 err = do_set_thread_area(p, -1,
c1bd55f9 196 (struct user_desc __user *)tls, 0);
7de08b4e
GP
197 else
198#endif
c1bd55f9 199 err = do_arch_prctl(p, ARCH_SET_FS, tls);
7de08b4e 200 if (err)
1da177e4
LT
201 goto out;
202 }
203 err = 0;
204out:
205 if (err && p->thread.io_bitmap_ptr) {
206 kfree(p->thread.io_bitmap_ptr);
207 p->thread.io_bitmap_max = 0;
208 }
66cb5917 209
1da177e4
LT
210 return err;
211}
212
e634d8fc
PA
213static void
214start_thread_common(struct pt_regs *regs, unsigned long new_ip,
215 unsigned long new_sp,
216 unsigned int _cs, unsigned int _ss, unsigned int _ds)
513ad84b 217{
ada85708 218 loadsegment(fs, 0);
e634d8fc
PA
219 loadsegment(es, _ds);
220 loadsegment(ds, _ds);
513ad84b
IM
221 load_gs_index(0);
222 regs->ip = new_ip;
223 regs->sp = new_sp;
e634d8fc
PA
224 regs->cs = _cs;
225 regs->ss = _ss;
a6f05a6a 226 regs->flags = X86_EFLAGS_IF;
1daeaa31 227 force_iret();
513ad84b 228}
e634d8fc
PA
229
230void
231start_thread(struct pt_regs *regs, unsigned long new_ip, unsigned long new_sp)
232{
233 start_thread_common(regs, new_ip, new_sp,
234 __USER_CS, __USER_DS, 0);
235}
513ad84b 236
7da77078
BG
237#ifdef CONFIG_COMPAT
238void compat_start_thread(struct pt_regs *regs, u32 new_ip, u32 new_sp)
a6f05a6a 239{
e634d8fc 240 start_thread_common(regs, new_ip, new_sp,
d1a797f3
PA
241 test_thread_flag(TIF_X32)
242 ? __USER_CS : __USER32_CS,
243 __USER_DS, __USER_DS);
a6f05a6a
PA
244}
245#endif
513ad84b 246
1da177e4
LT
247/*
248 * switch_to(x,y) should switch tasks from x to y.
249 *
6612538c 250 * This could still be optimized:
1da177e4
LT
251 * - fold all the options into a flag word and test it with a single test.
252 * - could test fs/gs bitsliced
099f318b
AK
253 *
254 * Kprobes not supported here. Set the probe on schedule instead.
8b96f011 255 * Function graph tracer not supported too.
1da177e4 256 */
35ea7903 257__visible __notrace_funcgraph struct task_struct *
a88cde13 258__switch_to(struct task_struct *prev_p, struct task_struct *next_p)
1da177e4 259{
87b935a0
JF
260 struct thread_struct *prev = &prev_p->thread;
261 struct thread_struct *next = &next_p->thread;
384a23f9
IM
262 struct fpu *prev_fpu = &prev->fpu;
263 struct fpu *next_fpu = &next->fpu;
6612538c 264 int cpu = smp_processor_id();
24933b82 265 struct tss_struct *tss = &per_cpu(cpu_tss, cpu);
3e2b68d7 266 unsigned prev_fsindex, prev_gsindex;
384a23f9 267 fpu_switch_t fpu_switch;
e07e23e1 268
384a23f9 269 fpu_switch = switch_fpu_prepare(prev_fpu, next_fpu, cpu);
4903062b 270
478de5a9
JF
271 /* We must save %fs and %gs before load_TLS() because
272 * %fs and %gs may be cleared by load_TLS().
273 *
274 * (e.g. xen_load_tls())
275 */
3e2b68d7
AL
276 savesegment(fs, prev_fsindex);
277 savesegment(gs, prev_gsindex);
478de5a9 278
f647d7c1
AL
279 /*
280 * Load TLS before restoring any segments so that segment loads
281 * reference the correct GDT entries.
282 */
1da177e4
LT
283 load_TLS(next, cpu);
284
3fe0a63e 285 /*
f647d7c1
AL
286 * Leave lazy mode, flushing any hypercalls made here. This
287 * must be done after loading TLS entries in the GDT but before
288 * loading segments that might reference them, and and it must
3a0aee48 289 * be done before fpu__restore(), so the TS bit is up to
f647d7c1 290 * date.
3fe0a63e 291 */
224101ed 292 arch_end_context_switch(next_p);
3fe0a63e 293
f647d7c1
AL
294 /* Switch DS and ES.
295 *
296 * Reading them only returns the selectors, but writing them (if
297 * nonzero) loads the full descriptor from the GDT or LDT. The
298 * LDT for next is loaded in switch_mm, and the GDT is loaded
299 * above.
300 *
301 * We therefore need to write new values to the segment
302 * registers on every context switch unless both the new and old
303 * values are zero.
304 *
305 * Note that we don't need to do anything for CS and SS, as
306 * those are saved and restored as part of pt_regs.
307 */
308 savesegment(es, prev->es);
309 if (unlikely(next->es | prev->es))
310 loadsegment(es, next->es);
311
312 savesegment(ds, prev->ds);
313 if (unlikely(next->ds | prev->ds))
314 loadsegment(ds, next->ds);
315
7de08b4e 316 /*
1da177e4 317 * Switch FS and GS.
87b935a0 318 *
558a65bc 319 * These are even more complicated than DS and ES: they have
3e2b68d7
AL
320 * 64-bit bases are that controlled by arch_prctl. The bases
321 * don't necessarily match the selectors, as user code can do
322 * any number of things to cause them to be inconsistent.
f647d7c1 323 *
3e2b68d7
AL
324 * We don't promise to preserve the bases if the selectors are
325 * nonzero. We also don't promise to preserve the base if the
326 * selector is zero and the base doesn't match whatever was
327 * most recently passed to ARCH_SET_FS/GS. (If/when the
328 * FSGSBASE instructions are enabled, we'll need to offer
329 * stronger guarantees.)
f647d7c1 330 *
3e2b68d7 331 * As an invariant,
296f781a 332 * (fsbase != 0 && fsindex != 0) || (gsbase != 0 && gsindex != 0) is
3e2b68d7 333 * impossible.
1da177e4 334 */
3e2b68d7
AL
335 if (next->fsindex) {
336 /* Loading a nonzero value into FS sets the index and base. */
87b935a0 337 loadsegment(fs, next->fsindex);
3e2b68d7 338 } else {
296f781a 339 if (next->fsbase) {
3e2b68d7
AL
340 /* Next index is zero but next base is nonzero. */
341 if (prev_fsindex)
342 loadsegment(fs, 0);
296f781a 343 wrmsrl(MSR_FS_BASE, next->fsbase);
3e2b68d7
AL
344 } else {
345 /* Next base and index are both zero. */
346 if (static_cpu_has_bug(X86_BUG_NULL_SEG)) {
347 /*
348 * We don't know the previous base and can't
349 * find out without RDMSR. Forcibly clear it.
350 */
351 loadsegment(fs, __USER_DS);
352 loadsegment(fs, 0);
353 } else {
354 /*
355 * If the previous index is zero and ARCH_SET_FS
356 * didn't change the base, then the base is
357 * also zero and we don't need to do anything.
358 */
296f781a 359 if (prev->fsbase || prev_fsindex)
3e2b68d7
AL
360 loadsegment(fs, 0);
361 }
362 }
1da177e4 363 }
3e2b68d7
AL
364 /*
365 * Save the old state and preserve the invariant.
366 * NB: if prev_fsindex == 0, then we can't reliably learn the base
367 * without RDMSR because Intel user code can zero it without telling
368 * us and AMD user code can program any 32-bit value without telling
369 * us.
370 */
371 if (prev_fsindex)
296f781a 372 prev->fsbase = 0;
3e2b68d7 373 prev->fsindex = prev_fsindex;
87b935a0 374
3e2b68d7
AL
375 if (next->gsindex) {
376 /* Loading a nonzero value into GS sets the index and base. */
87b935a0 377 load_gs_index(next->gsindex);
3e2b68d7 378 } else {
296f781a 379 if (next->gsbase) {
3e2b68d7
AL
380 /* Next index is zero but next base is nonzero. */
381 if (prev_gsindex)
382 load_gs_index(0);
296f781a 383 wrmsrl(MSR_KERNEL_GS_BASE, next->gsbase);
3e2b68d7
AL
384 } else {
385 /* Next base and index are both zero. */
386 if (static_cpu_has_bug(X86_BUG_NULL_SEG)) {
387 /*
388 * We don't know the previous base and can't
389 * find out without RDMSR. Forcibly clear it.
390 *
391 * This contains a pointless SWAPGS pair.
392 * Fixing it would involve an explicit check
393 * for Xen or a new pvop.
394 */
395 load_gs_index(__USER_DS);
396 load_gs_index(0);
397 } else {
398 /*
399 * If the previous index is zero and ARCH_SET_GS
400 * didn't change the base, then the base is
401 * also zero and we don't need to do anything.
402 */
296f781a 403 if (prev->gsbase || prev_gsindex)
3e2b68d7
AL
404 load_gs_index(0);
405 }
406 }
1da177e4 407 }
3e2b68d7
AL
408 /*
409 * Save the old state and preserve the invariant.
410 * NB: if prev_gsindex == 0, then we can't reliably learn the base
411 * without RDMSR because Intel user code can zero it without telling
412 * us and AMD user code can program any 32-bit value without telling
413 * us.
414 */
415 if (prev_gsindex)
296f781a 416 prev->gsbase = 0;
3e2b68d7 417 prev->gsindex = prev_gsindex;
1da177e4 418
384a23f9 419 switch_fpu_finish(next_fpu, fpu_switch);
34ddc81a 420
7de08b4e 421 /*
45948d77 422 * Switch the PDA and FPU contexts.
1da177e4 423 */
c6ae41e7 424 this_cpu_write(current_task, next_p);
18bd057b 425
b27559a4
AL
426 /* Reload esp0 and ss1. This changes current_thread_info(). */
427 load_sp0(tss, next);
428
1da177e4 429 /*
d3a4f48d 430 * Now maybe reload the debug registers and handle I/O bitmaps
1da177e4 431 */
eee3af4a
MM
432 if (unlikely(task_thread_info(next_p)->flags & _TIF_WORK_CTXSW_NEXT ||
433 task_thread_info(prev_p)->flags & _TIF_WORK_CTXSW_PREV))
d3a4f48d 434 __switch_to_xtra(prev_p, next_p, tss);
1da177e4 435
b7a58459
AL
436#ifdef CONFIG_XEN
437 /*
438 * On Xen PV, IOPL bits in pt_regs->flags have no effect, and
439 * current_pt_regs()->flags may not match the current task's
440 * intended IOPL. We need to switch it manually.
441 */
442 if (unlikely(static_cpu_has(X86_FEATURE_XENPV) &&
443 prev->iopl != next->iopl))
444 xen_set_iopl_mask(next->iopl);
445#endif
446
61f01dd9
AL
447 if (static_cpu_has_bug(X86_BUG_SYSRET_SS_ATTRS)) {
448 /*
449 * AMD CPUs have a misfeature: SYSRET sets the SS selector but
450 * does not update the cached descriptor. As a result, if we
451 * do SYSRET while SS is NULL, we'll end up in user mode with
452 * SS apparently equal to __USER_DS but actually unusable.
453 *
454 * The straightforward workaround would be to fix it up just
455 * before SYSRET, but that would slow down the system call
456 * fast paths. Instead, we ensure that SS is never NULL in
457 * system call context. We do this by replacing NULL SS
458 * selectors at every context switch. SYSCALL sets up a valid
459 * SS, so the only way to get NULL is to re-enter the kernel
460 * from CPL 3 through an interrupt. Since that can't happen
461 * in the same task as a running syscall, we are guaranteed to
462 * context switch between every interrupt vector entry and a
463 * subsequent SYSRET.
464 *
465 * We read SS first because SS reads are much faster than
466 * writes. Out of caution, we force SS to __KERNEL_DS even if
467 * it previously had a different non-NULL value.
468 */
469 unsigned short ss_sel;
470 savesegment(ss, ss_sel);
471 if (ss_sel != __KERNEL_DS)
472 loadsegment(ss, __KERNEL_DS);
473 }
474
1da177e4
LT
475 return prev_p;
476}
477
1da177e4
LT
478void set_personality_64bit(void)
479{
480 /* inherit personality from parent */
481
482 /* Make sure to be in 64bit mode */
6612538c 483 clear_thread_flag(TIF_IA32);
6bd33008 484 clear_thread_flag(TIF_ADDR32);
bb212724 485 clear_thread_flag(TIF_X32);
1da177e4 486
375906f8
SW
487 /* Ensure the corresponding mm is not marked. */
488 if (current->mm)
489 current->mm->context.ia32_compat = 0;
490
1da177e4
LT
491 /* TBD: overwrites user setup. Should have two bits.
492 But 64bit processes have always behaved this way,
493 so it's not too bad. The main problem is just that
6612538c 494 32bit childs are affected again. */
1da177e4
LT
495 current->personality &= ~READ_IMPLIES_EXEC;
496}
497
d1a797f3 498void set_personality_ia32(bool x32)
05d43ed8
PA
499{
500 /* inherit personality from parent */
501
502 /* Make sure to be in 32bit mode */
6bd33008 503 set_thread_flag(TIF_ADDR32);
05d43ed8 504
375906f8 505 /* Mark the associated mm as containing 32-bit tasks. */
d1a797f3
PA
506 if (x32) {
507 clear_thread_flag(TIF_IA32);
508 set_thread_flag(TIF_X32);
b24dc8da
ON
509 if (current->mm)
510 current->mm->context.ia32_compat = TIF_X32;
d1a797f3 511 current->personality &= ~READ_IMPLIES_EXEC;
f970165b 512 /* in_compat_syscall() uses the presence of the x32
ce5f7a99 513 syscall bit flag to determine compat status */
b9d989c7 514 current->thread.status &= ~TS_COMPAT;
d1a797f3
PA
515 } else {
516 set_thread_flag(TIF_IA32);
517 clear_thread_flag(TIF_X32);
b24dc8da
ON
518 if (current->mm)
519 current->mm->context.ia32_compat = TIF_IA32;
d1a797f3
PA
520 current->personality |= force_personality32;
521 /* Prepare the first "return" to user space */
b9d989c7 522 current->thread.status |= TS_COMPAT;
d1a797f3 523 }
05d43ed8 524}
febb72a6 525EXPORT_SYMBOL_GPL(set_personality_ia32);
05d43ed8 526
91b7bd39 527#ifdef CONFIG_CHECKPOINT_RESTORE
2eefd878
DS
528static long prctl_map_vdso(const struct vdso_image *image, unsigned long addr)
529{
530 int ret;
531
532 ret = map_vdso_once(image, addr);
533 if (ret)
534 return ret;
535
536 return (long)image->size;
537}
91b7bd39 538#endif
2eefd878 539
1da177e4 540long do_arch_prctl(struct task_struct *task, int code, unsigned long addr)
7de08b4e
GP
541{
542 int ret = 0;
1da177e4
LT
543 int doit = task == current;
544 int cpu;
545
7de08b4e 546 switch (code) {
1da177e4 547 case ARCH_SET_GS:
d696ca01 548 if (addr >= TASK_SIZE_MAX)
7de08b4e 549 return -EPERM;
1da177e4 550 cpu = get_cpu();
731e33e3 551 task->thread.gsindex = 0;
296f781a 552 task->thread.gsbase = addr;
731e33e3
AL
553 if (doit) {
554 load_gs_index(0);
555 ret = wrmsrl_safe(MSR_KERNEL_GS_BASE, addr);
1da177e4 556 }
4afd0565 557 put_cpu();
1da177e4
LT
558 break;
559 case ARCH_SET_FS:
560 /* Not strictly needed for fs, but do it for symmetry
561 with gs */
d696ca01 562 if (addr >= TASK_SIZE_MAX)
6612538c 563 return -EPERM;
1da177e4 564 cpu = get_cpu();
731e33e3 565 task->thread.fsindex = 0;
296f781a 566 task->thread.fsbase = addr;
731e33e3
AL
567 if (doit) {
568 /* set the selector to 0 to not confuse __switch_to */
569 loadsegment(fs, 0);
570 ret = wrmsrl_safe(MSR_FS_BASE, addr);
1da177e4
LT
571 }
572 put_cpu();
573 break;
6612538c
HS
574 case ARCH_GET_FS: {
575 unsigned long base;
d47b50e7 576 if (doit)
1da177e4 577 rdmsrl(MSR_FS_BASE, base);
a88cde13 578 else
296f781a 579 base = task->thread.fsbase;
6612538c
HS
580 ret = put_user(base, (unsigned long __user *)addr);
581 break;
1da177e4 582 }
6612538c 583 case ARCH_GET_GS: {
1da177e4 584 unsigned long base;
d47b50e7
AL
585 if (doit)
586 rdmsrl(MSR_KERNEL_GS_BASE, base);
d47b50e7 587 else
296f781a 588 base = task->thread.gsbase;
6612538c 589 ret = put_user(base, (unsigned long __user *)addr);
1da177e4
LT
590 break;
591 }
592
2eefd878 593#ifdef CONFIG_CHECKPOINT_RESTORE
6e68b087 594# ifdef CONFIG_X86_X32_ABI
2eefd878
DS
595 case ARCH_MAP_VDSO_X32:
596 return prctl_map_vdso(&vdso_image_x32, addr);
91b7bd39
IM
597# endif
598# if defined CONFIG_X86_32 || defined CONFIG_IA32_EMULATION
2eefd878
DS
599 case ARCH_MAP_VDSO_32:
600 return prctl_map_vdso(&vdso_image_32, addr);
91b7bd39 601# endif
2eefd878
DS
602 case ARCH_MAP_VDSO_64:
603 return prctl_map_vdso(&vdso_image_64, addr);
604#endif
605
1da177e4
LT
606 default:
607 ret = -EINVAL;
608 break;
6612538c 609 }
1da177e4 610
6612538c
HS
611 return ret;
612}
1da177e4
LT
613
614long sys_arch_prctl(int code, unsigned long addr)
615{
616 return do_arch_prctl(current, code, addr);
1da177e4
LT
617}
618
89240ba0
SS
619unsigned long KSTK_ESP(struct task_struct *task)
620{
263042e4 621 return task_pt_regs(task)->sp;
89240ba0 622}