]> git.proxmox.com Git - mirror_ubuntu-artful-kernel.git/blame - arch/x86/kernel/process_64.c
x86/unwinder/orc: Dont bail on stack overflow
[mirror_ubuntu-artful-kernel.git] / arch / x86 / kernel / process_64.c
CommitLineData
1da177e4 1/*
1da177e4
LT
2 * Copyright (C) 1995 Linus Torvalds
3 *
4 * Pentium III FXSR, SSE support
5 * Gareth Hughes <gareth@valinux.com>, May 2000
6612538c 6 *
1da177e4
LT
7 * X86-64 port
8 * Andi Kleen.
76e4f660
AR
9 *
10 * CPU hotplug support - ashok.raj@intel.com
1da177e4
LT
11 */
12
13/*
14 * This file handles the architecture-dependent parts of process handling..
15 */
16
76e4f660 17#include <linux/cpu.h>
1da177e4
LT
18#include <linux/errno.h>
19#include <linux/sched.h>
29930025 20#include <linux/sched/task.h>
68db0cf1 21#include <linux/sched/task_stack.h>
6612538c 22#include <linux/fs.h>
1da177e4
LT
23#include <linux/kernel.h>
24#include <linux/mm.h>
25#include <linux/elfcore.h>
26#include <linux/smp.h>
27#include <linux/slab.h>
28#include <linux/user.h>
1da177e4
LT
29#include <linux/interrupt.h>
30#include <linux/delay.h>
186f4360 31#include <linux/export.h>
1da177e4 32#include <linux/ptrace.h>
95833c83 33#include <linux/notifier.h>
c6fd91f0 34#include <linux/kprobes.h>
1eeb66a1 35#include <linux/kdebug.h>
529e25f6 36#include <linux/prctl.h>
7de08b4e
GP
37#include <linux/uaccess.h>
38#include <linux/io.h>
8b96f011 39#include <linux/ftrace.h>
ff3f097e 40#include <linux/syscalls.h>
1da177e4 41
1da177e4 42#include <asm/pgtable.h>
1da177e4 43#include <asm/processor.h>
78f7f1e5 44#include <asm/fpu/internal.h>
1da177e4 45#include <asm/mmu_context.h>
1da177e4 46#include <asm/prctl.h>
1da177e4
LT
47#include <asm/desc.h>
48#include <asm/proto.h>
49#include <asm/ia32.h>
bbc1f698 50#include <asm/syscalls.h>
66cb5917 51#include <asm/debugreg.h>
f05e798a 52#include <asm/switch_to.h>
b7a58459 53#include <asm/xen/hypervisor.h>
2eefd878 54#include <asm/vdso.h>
7db9d979 55#include <asm/intel_rdt_sched.h>
ada26481
DS
56#include <asm/unistd.h>
57#ifdef CONFIG_IA32_EMULATION
58/* Not included via unistd.h */
59#include <asm/unistd_32_ia32.h>
60#endif
1da177e4 61
c38e5038 62__visible DEFINE_PER_CPU(unsigned long, rsp_scratch);
1da177e4 63
6612538c 64/* Prints also some state that isn't saved in the pt_regs */
e2ce07c8 65void __show_regs(struct pt_regs *regs, int all)
1da177e4
LT
66{
67 unsigned long cr0 = 0L, cr2 = 0L, cr3 = 0L, cr4 = 0L, fs, gs, shadowgs;
bb1995d5 68 unsigned long d0, d1, d2, d3, d6, d7;
6612538c
HS
69 unsigned int fsindex, gsindex;
70 unsigned int ds, cs, es;
814e2c84 71
bb5e5ce5
JP
72 printk(KERN_DEFAULT "RIP: %04lx:%pS\n", regs->cs & 0xffff,
73 (void *)regs->ip);
6fa81a12 74 printk(KERN_DEFAULT "RSP: %04lx:%016lx EFLAGS: %08lx", regs->ss,
bb5e5ce5 75 regs->sp, regs->flags);
6fa81a12
JP
76 if (regs->orig_ax != -1)
77 pr_cont(" ORIG_RAX: %016lx\n", regs->orig_ax);
78 else
79 pr_cont("\n");
80
d015a092 81 printk(KERN_DEFAULT "RAX: %016lx RBX: %016lx RCX: %016lx\n",
65ea5b03 82 regs->ax, regs->bx, regs->cx);
d015a092 83 printk(KERN_DEFAULT "RDX: %016lx RSI: %016lx RDI: %016lx\n",
65ea5b03 84 regs->dx, regs->si, regs->di);
d015a092 85 printk(KERN_DEFAULT "RBP: %016lx R08: %016lx R09: %016lx\n",
65ea5b03 86 regs->bp, regs->r8, regs->r9);
d015a092 87 printk(KERN_DEFAULT "R10: %016lx R11: %016lx R12: %016lx\n",
7de08b4e 88 regs->r10, regs->r11, regs->r12);
d015a092 89 printk(KERN_DEFAULT "R13: %016lx R14: %016lx R15: %016lx\n",
7de08b4e 90 regs->r13, regs->r14, regs->r15);
1da177e4 91
7de08b4e
GP
92 asm("movl %%ds,%0" : "=r" (ds));
93 asm("movl %%cs,%0" : "=r" (cs));
94 asm("movl %%es,%0" : "=r" (es));
1da177e4
LT
95 asm("movl %%fs,%0" : "=r" (fsindex));
96 asm("movl %%gs,%0" : "=r" (gsindex));
97
98 rdmsrl(MSR_FS_BASE, fs);
7de08b4e
GP
99 rdmsrl(MSR_GS_BASE, gs);
100 rdmsrl(MSR_KERNEL_GS_BASE, shadowgs);
1da177e4 101
e2ce07c8
PE
102 if (!all)
103 return;
1da177e4 104
f51c9452
GOC
105 cr0 = read_cr0();
106 cr2 = read_cr2();
6c690ee1 107 cr3 = __read_cr3();
1e02ce4c 108 cr4 = __read_cr4();
1da177e4 109
d015a092 110 printk(KERN_DEFAULT "FS: %016lx(%04x) GS:%016lx(%04x) knlGS:%016lx\n",
7de08b4e 111 fs, fsindex, gs, gsindex, shadowgs);
d015a092 112 printk(KERN_DEFAULT "CS: %04x DS: %04x ES: %04x CR0: %016lx\n", cs, ds,
8092c654 113 es, cr0);
d015a092 114 printk(KERN_DEFAULT "CR2: %016lx CR3: %016lx CR4: %016lx\n", cr2, cr3,
8092c654 115 cr4);
bb1995d5
AS
116
117 get_debugreg(d0, 0);
118 get_debugreg(d1, 1);
119 get_debugreg(d2, 2);
bb1995d5
AS
120 get_debugreg(d3, 3);
121 get_debugreg(d6, 6);
122 get_debugreg(d7, 7);
4338774c
DJ
123
124 /* Only print out debug registers if they are in their non-default state. */
ba6d018e
NI
125 if (!((d0 == 0) && (d1 == 0) && (d2 == 0) && (d3 == 0) &&
126 (d6 == DR6_RESERVED) && (d7 == 0x400))) {
127 printk(KERN_DEFAULT "DR0: %016lx DR1: %016lx DR2: %016lx\n",
128 d0, d1, d2);
129 printk(KERN_DEFAULT "DR3: %016lx DR6: %016lx DR7: %016lx\n",
130 d3, d6, d7);
131 }
4338774c 132
c0b17b5b
DH
133 if (boot_cpu_has(X86_FEATURE_OSPKE))
134 printk(KERN_DEFAULT "PKRU: %08x\n", read_pkru());
1da177e4
LT
135}
136
1da177e4
LT
137void release_thread(struct task_struct *dead_task)
138{
139 if (dead_task->mm) {
a5b9e5a2 140#ifdef CONFIG_MODIFY_LDT_SYSCALL
37868fe1 141 if (dead_task->mm->context.ldt) {
349eab6e 142 pr_warn("WARNING: dead process %s still has LDT? <%p/%d>\n",
c767a54b 143 dead_task->comm,
0d430e3f 144 dead_task->mm->context.ldt->entries,
bbf79d21 145 dead_task->mm->context.ldt->nr_entries);
1da177e4
LT
146 BUG();
147 }
a5b9e5a2 148#endif
1da177e4
LT
149 }
150}
151
de373eee
AL
152enum which_selector {
153 FS,
154 GS
155};
156
157/*
158 * Saves the FS or GS base for an outgoing thread if FSGSBASE extensions are
159 * not available. The goal is to be reasonably fast on non-FSGSBASE systems.
160 * It's forcibly inlined because it'll generate better code and this function
161 * is hot.
162 */
163static __always_inline void save_base_legacy(struct task_struct *prev_p,
164 unsigned short selector,
165 enum which_selector which)
166{
167 if (likely(selector == 0)) {
168 /*
169 * On Intel (without X86_BUG_NULL_SEG), the segment base could
170 * be the pre-existing saved base or it could be zero. On AMD
171 * (with X86_BUG_NULL_SEG), the segment base could be almost
172 * anything.
173 *
174 * This branch is very hot (it's hit twice on almost every
175 * context switch between 64-bit programs), and avoiding
176 * the RDMSR helps a lot, so we just assume that whatever
177 * value is already saved is correct. This matches historical
178 * Linux behavior, so it won't break existing applications.
179 *
180 * To avoid leaking state, on non-X86_BUG_NULL_SEG CPUs, if we
181 * report that the base is zero, it needs to actually be zero:
182 * see the corresponding logic in load_seg_legacy.
183 */
184 } else {
185 /*
186 * If the selector is 1, 2, or 3, then the base is zero on
187 * !X86_BUG_NULL_SEG CPUs and could be anything on
188 * X86_BUG_NULL_SEG CPUs. In the latter case, Linux
189 * has never attempted to preserve the base across context
190 * switches.
191 *
192 * If selector > 3, then it refers to a real segment, and
193 * saving the base isn't necessary.
194 */
195 if (which == FS)
196 prev_p->thread.fsbase = 0;
197 else
198 prev_p->thread.gsbase = 0;
199 }
200}
201
202static __always_inline void save_fsgs(struct task_struct *task)
203{
204 savesegment(fs, task->thread.fsindex);
205 savesegment(gs, task->thread.gsindex);
206 save_base_legacy(task, task->thread.fsindex, FS);
207 save_base_legacy(task, task->thread.gsindex, GS);
208}
209
210static __always_inline void loadseg(enum which_selector which,
211 unsigned short sel)
212{
213 if (which == FS)
214 loadsegment(fs, sel);
215 else
216 load_gs_index(sel);
217}
218
219static __always_inline void load_seg_legacy(unsigned short prev_index,
220 unsigned long prev_base,
221 unsigned short next_index,
222 unsigned long next_base,
223 enum which_selector which)
224{
225 if (likely(next_index <= 3)) {
226 /*
227 * The next task is using 64-bit TLS, is not using this
228 * segment at all, or is having fun with arcane CPU features.
229 */
230 if (next_base == 0) {
231 /*
232 * Nasty case: on AMD CPUs, we need to forcibly zero
233 * the base.
234 */
235 if (static_cpu_has_bug(X86_BUG_NULL_SEG)) {
236 loadseg(which, __USER_DS);
237 loadseg(which, next_index);
238 } else {
239 /*
240 * We could try to exhaustively detect cases
241 * under which we can skip the segment load,
242 * but there's really only one case that matters
243 * for performance: if both the previous and
244 * next states are fully zeroed, we can skip
245 * the load.
246 *
247 * (This assumes that prev_base == 0 has no
248 * false positives. This is the case on
249 * Intel-style CPUs.)
250 */
251 if (likely(prev_index | next_index | prev_base))
252 loadseg(which, next_index);
253 }
254 } else {
255 if (prev_index != next_index)
256 loadseg(which, next_index);
257 wrmsrl(which == FS ? MSR_FS_BASE : MSR_KERNEL_GS_BASE,
258 next_base);
259 }
260 } else {
261 /*
262 * The next task is using a real segment. Loading the selector
263 * is sufficient.
264 */
265 loadseg(which, next_index);
266 }
267}
268
c1bd55f9
JT
269int copy_thread_tls(unsigned long clone_flags, unsigned long sp,
270 unsigned long arg, struct task_struct *p, unsigned long tls)
1da177e4
LT
271{
272 int err;
7de08b4e 273 struct pt_regs *childregs;
0100301b
BG
274 struct fork_frame *fork_frame;
275 struct inactive_task_frame *frame;
1da177e4
LT
276 struct task_struct *me = current;
277
7076aada 278 childregs = task_pt_regs(p);
0100301b
BG
279 fork_frame = container_of(childregs, struct fork_frame, regs);
280 frame = &fork_frame->frame;
281 frame->bp = 0;
282 frame->ret_addr = (unsigned long) ret_from_fork;
283 p->thread.sp = (unsigned long) fork_frame;
66cb5917 284 p->thread.io_bitmap_ptr = NULL;
1da177e4 285
ada85708 286 savesegment(gs, p->thread.gsindex);
296f781a 287 p->thread.gsbase = p->thread.gsindex ? 0 : me->thread.gsbase;
ada85708 288 savesegment(fs, p->thread.fsindex);
296f781a 289 p->thread.fsbase = p->thread.fsindex ? 0 : me->thread.fsbase;
ada85708
JF
290 savesegment(es, p->thread.es);
291 savesegment(ds, p->thread.ds);
7076aada
AV
292 memset(p->thread.ptrace_bps, 0, sizeof(p->thread.ptrace_bps));
293
1d4b4b29 294 if (unlikely(p->flags & PF_KTHREAD)) {
7076aada
AV
295 /* kernel thread */
296 memset(childregs, 0, sizeof(struct pt_regs));
616d2483
BG
297 frame->bx = sp; /* function */
298 frame->r12 = arg;
7076aada
AV
299 return 0;
300 }
616d2483 301 frame->bx = 0;
1d4b4b29 302 *childregs = *current_pt_regs();
7076aada
AV
303
304 childregs->ax = 0;
1d4b4b29
AV
305 if (sp)
306 childregs->sp = sp;
1da177e4 307
66cb5917 308 err = -ENOMEM;
d3a4f48d 309 if (unlikely(test_tsk_thread_flag(me, TIF_IO_BITMAP))) {
cced4022
TM
310 p->thread.io_bitmap_ptr = kmemdup(me->thread.io_bitmap_ptr,
311 IO_BITMAP_BYTES, GFP_KERNEL);
1da177e4
LT
312 if (!p->thread.io_bitmap_ptr) {
313 p->thread.io_bitmap_max = 0;
314 return -ENOMEM;
315 }
d3a4f48d 316 set_tsk_thread_flag(p, TIF_IO_BITMAP);
6612538c 317 }
1da177e4
LT
318
319 /*
320 * Set a new TLS for the child thread?
321 */
322 if (clone_flags & CLONE_SETTLS) {
323#ifdef CONFIG_IA32_EMULATION
abfb9498 324 if (in_ia32_syscall())
efd1ca52 325 err = do_set_thread_area(p, -1,
c1bd55f9 326 (struct user_desc __user *)tls, 0);
7de08b4e
GP
327 else
328#endif
17a6e1b8 329 err = do_arch_prctl_64(p, ARCH_SET_FS, tls);
7de08b4e 330 if (err)
1da177e4
LT
331 goto out;
332 }
333 err = 0;
334out:
335 if (err && p->thread.io_bitmap_ptr) {
336 kfree(p->thread.io_bitmap_ptr);
337 p->thread.io_bitmap_max = 0;
338 }
66cb5917 339
1da177e4
LT
340 return err;
341}
342
e634d8fc
PA
343static void
344start_thread_common(struct pt_regs *regs, unsigned long new_ip,
345 unsigned long new_sp,
346 unsigned int _cs, unsigned int _ss, unsigned int _ds)
513ad84b 347{
24dedc48
AL
348 WARN_ON_ONCE(regs != current_pt_regs());
349
350 if (static_cpu_has(X86_BUG_NULL_SEG)) {
351 /* Loading zero below won't clear the base. */
352 loadsegment(fs, __USER_DS);
353 load_gs_index(__USER_DS);
354 }
355
ada85708 356 loadsegment(fs, 0);
e634d8fc
PA
357 loadsegment(es, _ds);
358 loadsegment(ds, _ds);
513ad84b 359 load_gs_index(0);
24dedc48 360
513ad84b
IM
361 regs->ip = new_ip;
362 regs->sp = new_sp;
e634d8fc
PA
363 regs->cs = _cs;
364 regs->ss = _ss;
a6f05a6a 365 regs->flags = X86_EFLAGS_IF;
1daeaa31 366 force_iret();
513ad84b 367}
e634d8fc
PA
368
369void
370start_thread(struct pt_regs *regs, unsigned long new_ip, unsigned long new_sp)
371{
372 start_thread_common(regs, new_ip, new_sp,
373 __USER_CS, __USER_DS, 0);
374}
513ad84b 375
7da77078
BG
376#ifdef CONFIG_COMPAT
377void compat_start_thread(struct pt_regs *regs, u32 new_ip, u32 new_sp)
a6f05a6a 378{
e634d8fc 379 start_thread_common(regs, new_ip, new_sp,
d1a797f3
PA
380 test_thread_flag(TIF_X32)
381 ? __USER_CS : __USER32_CS,
382 __USER_DS, __USER_DS);
a6f05a6a
PA
383}
384#endif
513ad84b 385
1da177e4
LT
386/*
387 * switch_to(x,y) should switch tasks from x to y.
388 *
6612538c 389 * This could still be optimized:
1da177e4
LT
390 * - fold all the options into a flag word and test it with a single test.
391 * - could test fs/gs bitsliced
099f318b
AK
392 *
393 * Kprobes not supported here. Set the probe on schedule instead.
8b96f011 394 * Function graph tracer not supported too.
1da177e4 395 */
35ea7903 396__visible __notrace_funcgraph struct task_struct *
a88cde13 397__switch_to(struct task_struct *prev_p, struct task_struct *next_p)
1da177e4 398{
87b935a0
JF
399 struct thread_struct *prev = &prev_p->thread;
400 struct thread_struct *next = &next_p->thread;
384a23f9
IM
401 struct fpu *prev_fpu = &prev->fpu;
402 struct fpu *next_fpu = &next->fpu;
6612538c 403 int cpu = smp_processor_id();
24933b82 404 struct tss_struct *tss = &per_cpu(cpu_tss, cpu);
e07e23e1 405
be58b042
AL
406 WARN_ON_ONCE(IS_ENABLED(CONFIG_DEBUG_ENTRY) &&
407 this_cpu_read(irq_count) != -1);
408
c474e507 409 switch_fpu_prepare(prev_fpu, cpu);
4903062b 410
478de5a9
JF
411 /* We must save %fs and %gs before load_TLS() because
412 * %fs and %gs may be cleared by load_TLS().
413 *
414 * (e.g. xen_load_tls())
415 */
de373eee 416 save_fsgs(prev_p);
478de5a9 417
f647d7c1
AL
418 /*
419 * Load TLS before restoring any segments so that segment loads
420 * reference the correct GDT entries.
421 */
1da177e4
LT
422 load_TLS(next, cpu);
423
3fe0a63e 424 /*
f647d7c1
AL
425 * Leave lazy mode, flushing any hypercalls made here. This
426 * must be done after loading TLS entries in the GDT but before
427 * loading segments that might reference them, and and it must
3a0aee48 428 * be done before fpu__restore(), so the TS bit is up to
f647d7c1 429 * date.
3fe0a63e 430 */
224101ed 431 arch_end_context_switch(next_p);
3fe0a63e 432
f647d7c1
AL
433 /* Switch DS and ES.
434 *
435 * Reading them only returns the selectors, but writing them (if
436 * nonzero) loads the full descriptor from the GDT or LDT. The
437 * LDT for next is loaded in switch_mm, and the GDT is loaded
438 * above.
439 *
440 * We therefore need to write new values to the segment
441 * registers on every context switch unless both the new and old
442 * values are zero.
443 *
444 * Note that we don't need to do anything for CS and SS, as
445 * those are saved and restored as part of pt_regs.
446 */
447 savesegment(es, prev->es);
448 if (unlikely(next->es | prev->es))
449 loadsegment(es, next->es);
450
451 savesegment(ds, prev->ds);
452 if (unlikely(next->ds | prev->ds))
453 loadsegment(ds, next->ds);
454
de373eee
AL
455 load_seg_legacy(prev->fsindex, prev->fsbase,
456 next->fsindex, next->fsbase, FS);
457 load_seg_legacy(prev->gsindex, prev->gsbase,
458 next->gsindex, next->gsbase, GS);
1da177e4 459
c474e507 460 switch_fpu_finish(next_fpu, cpu);
34ddc81a 461
7de08b4e 462 /*
45948d77 463 * Switch the PDA and FPU contexts.
1da177e4 464 */
c6ae41e7 465 this_cpu_write(current_task, next_p);
18bd057b 466
779e32d0 467 /* Reload sp0. */
cc87284c 468 update_sp0(next_p);
b27559a4 469
1da177e4 470 /*
d3a4f48d 471 * Now maybe reload the debug registers and handle I/O bitmaps
1da177e4 472 */
eee3af4a
MM
473 if (unlikely(task_thread_info(next_p)->flags & _TIF_WORK_CTXSW_NEXT ||
474 task_thread_info(prev_p)->flags & _TIF_WORK_CTXSW_PREV))
d3a4f48d 475 __switch_to_xtra(prev_p, next_p, tss);
1da177e4 476
5e57f1d6 477#ifdef CONFIG_XEN_PV
b7a58459
AL
478 /*
479 * On Xen PV, IOPL bits in pt_regs->flags have no effect, and
480 * current_pt_regs()->flags may not match the current task's
481 * intended IOPL. We need to switch it manually.
482 */
483 if (unlikely(static_cpu_has(X86_FEATURE_XENPV) &&
484 prev->iopl != next->iopl))
485 xen_set_iopl_mask(next->iopl);
486#endif
487
61f01dd9
AL
488 if (static_cpu_has_bug(X86_BUG_SYSRET_SS_ATTRS)) {
489 /*
490 * AMD CPUs have a misfeature: SYSRET sets the SS selector but
491 * does not update the cached descriptor. As a result, if we
492 * do SYSRET while SS is NULL, we'll end up in user mode with
493 * SS apparently equal to __USER_DS but actually unusable.
494 *
495 * The straightforward workaround would be to fix it up just
496 * before SYSRET, but that would slow down the system call
497 * fast paths. Instead, we ensure that SS is never NULL in
498 * system call context. We do this by replacing NULL SS
499 * selectors at every context switch. SYSCALL sets up a valid
500 * SS, so the only way to get NULL is to re-enter the kernel
501 * from CPL 3 through an interrupt. Since that can't happen
502 * in the same task as a running syscall, we are guaranteed to
503 * context switch between every interrupt vector entry and a
504 * subsequent SYSRET.
505 *
506 * We read SS first because SS reads are much faster than
507 * writes. Out of caution, we force SS to __KERNEL_DS even if
508 * it previously had a different non-NULL value.
509 */
510 unsigned short ss_sel;
511 savesegment(ss, ss_sel);
512 if (ss_sel != __KERNEL_DS)
513 loadsegment(ss, __KERNEL_DS);
514 }
515
4f341a5e
FY
516 /* Load the Intel cache allocation PQR MSR. */
517 intel_rdt_sched_in();
518
1da177e4
LT
519 return prev_p;
520}
521
1da177e4
LT
522void set_personality_64bit(void)
523{
524 /* inherit personality from parent */
525
526 /* Make sure to be in 64bit mode */
6612538c 527 clear_thread_flag(TIF_IA32);
6bd33008 528 clear_thread_flag(TIF_ADDR32);
bb212724 529 clear_thread_flag(TIF_X32);
ada26481
DS
530 /* Pretend that this comes from a 64bit execve */
531 task_pt_regs(current)->orig_ax = __NR_execve;
1da177e4 532
375906f8
SW
533 /* Ensure the corresponding mm is not marked. */
534 if (current->mm)
535 current->mm->context.ia32_compat = 0;
536
1da177e4
LT
537 /* TBD: overwrites user setup. Should have two bits.
538 But 64bit processes have always behaved this way,
539 so it's not too bad. The main problem is just that
6612538c 540 32bit childs are affected again. */
1da177e4
LT
541 current->personality &= ~READ_IMPLIES_EXEC;
542}
543
ada26481 544static void __set_personality_x32(void)
05d43ed8 545{
ada26481
DS
546#ifdef CONFIG_X86_X32
547 clear_thread_flag(TIF_IA32);
548 set_thread_flag(TIF_X32);
549 if (current->mm)
550 current->mm->context.ia32_compat = TIF_X32;
551 current->personality &= ~READ_IMPLIES_EXEC;
552 /*
553 * in_compat_syscall() uses the presence of the x32 syscall bit
554 * flag to determine compat status. The x86 mmap() code relies on
555 * the syscall bitness so set x32 syscall bit right here to make
556 * in_compat_syscall() work during exec().
557 *
558 * Pretend to come from a x32 execve.
559 */
560 task_pt_regs(current)->orig_ax = __NR_x32_execve | __X32_SYSCALL_BIT;
561 current->thread.status &= ~TS_COMPAT;
562#endif
563}
05d43ed8 564
ada26481
DS
565static void __set_personality_ia32(void)
566{
567#ifdef CONFIG_IA32_EMULATION
568 set_thread_flag(TIF_IA32);
569 clear_thread_flag(TIF_X32);
570 if (current->mm)
571 current->mm->context.ia32_compat = TIF_IA32;
572 current->personality |= force_personality32;
573 /* Prepare the first "return" to user space */
574 task_pt_regs(current)->orig_ax = __NR_ia32_execve;
575 current->thread.status |= TS_COMPAT;
576#endif
577}
578
579void set_personality_ia32(bool x32)
580{
05d43ed8 581 /* Make sure to be in 32bit mode */
6bd33008 582 set_thread_flag(TIF_ADDR32);
05d43ed8 583
ada26481
DS
584 if (x32)
585 __set_personality_x32();
586 else
587 __set_personality_ia32();
05d43ed8 588}
febb72a6 589EXPORT_SYMBOL_GPL(set_personality_ia32);
05d43ed8 590
91b7bd39 591#ifdef CONFIG_CHECKPOINT_RESTORE
2eefd878
DS
592static long prctl_map_vdso(const struct vdso_image *image, unsigned long addr)
593{
594 int ret;
595
596 ret = map_vdso_once(image, addr);
597 if (ret)
598 return ret;
599
600 return (long)image->size;
601}
91b7bd39 602#endif
2eefd878 603
17a6e1b8 604long do_arch_prctl_64(struct task_struct *task, int option, unsigned long arg2)
7de08b4e
GP
605{
606 int ret = 0;
1da177e4
LT
607 int doit = task == current;
608 int cpu;
609
dd93938a 610 switch (option) {
1da177e4 611 case ARCH_SET_GS:
17a6e1b8 612 if (arg2 >= TASK_SIZE_MAX)
7de08b4e 613 return -EPERM;
1da177e4 614 cpu = get_cpu();
731e33e3 615 task->thread.gsindex = 0;
17a6e1b8 616 task->thread.gsbase = arg2;
731e33e3
AL
617 if (doit) {
618 load_gs_index(0);
17a6e1b8 619 ret = wrmsrl_safe(MSR_KERNEL_GS_BASE, arg2);
1da177e4 620 }
4afd0565 621 put_cpu();
1da177e4
LT
622 break;
623 case ARCH_SET_FS:
624 /* Not strictly needed for fs, but do it for symmetry
625 with gs */
17a6e1b8 626 if (arg2 >= TASK_SIZE_MAX)
6612538c 627 return -EPERM;
1da177e4 628 cpu = get_cpu();
731e33e3 629 task->thread.fsindex = 0;
17a6e1b8 630 task->thread.fsbase = arg2;
731e33e3
AL
631 if (doit) {
632 /* set the selector to 0 to not confuse __switch_to */
633 loadsegment(fs, 0);
17a6e1b8 634 ret = wrmsrl_safe(MSR_FS_BASE, arg2);
1da177e4
LT
635 }
636 put_cpu();
637 break;
6612538c
HS
638 case ARCH_GET_FS: {
639 unsigned long base;
17a6e1b8 640
d47b50e7 641 if (doit)
1da177e4 642 rdmsrl(MSR_FS_BASE, base);
a88cde13 643 else
296f781a 644 base = task->thread.fsbase;
17a6e1b8 645 ret = put_user(base, (unsigned long __user *)arg2);
6612538c 646 break;
1da177e4 647 }
6612538c 648 case ARCH_GET_GS: {
1da177e4 649 unsigned long base;
17a6e1b8 650
d47b50e7
AL
651 if (doit)
652 rdmsrl(MSR_KERNEL_GS_BASE, base);
d47b50e7 653 else
296f781a 654 base = task->thread.gsbase;
17a6e1b8 655 ret = put_user(base, (unsigned long __user *)arg2);
1da177e4
LT
656 break;
657 }
658
2eefd878 659#ifdef CONFIG_CHECKPOINT_RESTORE
6e68b087 660# ifdef CONFIG_X86_X32_ABI
2eefd878 661 case ARCH_MAP_VDSO_X32:
17a6e1b8 662 return prctl_map_vdso(&vdso_image_x32, arg2);
91b7bd39
IM
663# endif
664# if defined CONFIG_X86_32 || defined CONFIG_IA32_EMULATION
2eefd878 665 case ARCH_MAP_VDSO_32:
17a6e1b8 666 return prctl_map_vdso(&vdso_image_32, arg2);
91b7bd39 667# endif
2eefd878 668 case ARCH_MAP_VDSO_64:
17a6e1b8 669 return prctl_map_vdso(&vdso_image_64, arg2);
2eefd878
DS
670#endif
671
1da177e4
LT
672 default:
673 ret = -EINVAL;
674 break;
6612538c 675 }
1da177e4 676
6612538c
HS
677 return ret;
678}
1da177e4 679
17a6e1b8 680SYSCALL_DEFINE2(arch_prctl, int, option, unsigned long, arg2)
1da177e4 681{
b0b9b014
KH
682 long ret;
683
684 ret = do_arch_prctl_64(current, option, arg2);
685 if (ret == -EINVAL)
686 ret = do_arch_prctl_common(current, option, arg2);
687
688 return ret;
1da177e4
LT
689}
690
79170fda
KH
691#ifdef CONFIG_IA32_EMULATION
692COMPAT_SYSCALL_DEFINE2(arch_prctl, int, option, unsigned long, arg2)
693{
694 return do_arch_prctl_common(current, option, arg2);
695}
696#endif
697
89240ba0
SS
698unsigned long KSTK_ESP(struct task_struct *task)
699{
263042e4 700 return task_pt_regs(task)->sp;
89240ba0 701}