x86/mm/pkeys: Dump PKRU with other kernel registers
[deliverable/linux.git] / arch / x86 / kernel / process_64.c
CommitLineData
1da177e4 1/*
1da177e4
LT
2 * Copyright (C) 1995 Linus Torvalds
3 *
4 * Pentium III FXSR, SSE support
5 * Gareth Hughes <gareth@valinux.com>, May 2000
6612538c 6 *
1da177e4
LT
7 * X86-64 port
8 * Andi Kleen.
76e4f660
AR
9 *
10 * CPU hotplug support - ashok.raj@intel.com
1da177e4
LT
11 */
12
13/*
14 * This file handles the architecture-dependent parts of process handling..
15 */
16
76e4f660 17#include <linux/cpu.h>
1da177e4
LT
18#include <linux/errno.h>
19#include <linux/sched.h>
6612538c 20#include <linux/fs.h>
1da177e4
LT
21#include <linux/kernel.h>
22#include <linux/mm.h>
23#include <linux/elfcore.h>
24#include <linux/smp.h>
25#include <linux/slab.h>
26#include <linux/user.h>
1da177e4
LT
27#include <linux/interrupt.h>
28#include <linux/delay.h>
6612538c 29#include <linux/module.h>
1da177e4 30#include <linux/ptrace.h>
95833c83 31#include <linux/notifier.h>
c6fd91f0 32#include <linux/kprobes.h>
1eeb66a1 33#include <linux/kdebug.h>
529e25f6 34#include <linux/prctl.h>
7de08b4e
GP
35#include <linux/uaccess.h>
36#include <linux/io.h>
8b96f011 37#include <linux/ftrace.h>
1da177e4 38
1da177e4 39#include <asm/pgtable.h>
1da177e4 40#include <asm/processor.h>
78f7f1e5 41#include <asm/fpu/internal.h>
1da177e4 42#include <asm/mmu_context.h>
1da177e4 43#include <asm/prctl.h>
1da177e4
LT
44#include <asm/desc.h>
45#include <asm/proto.h>
46#include <asm/ia32.h>
95833c83 47#include <asm/idle.h>
bbc1f698 48#include <asm/syscalls.h>
66cb5917 49#include <asm/debugreg.h>
f05e798a 50#include <asm/switch_to.h>
1da177e4
LT
51
52asmlinkage extern void ret_from_fork(void);
53
c38e5038 54__visible DEFINE_PER_CPU(unsigned long, rsp_scratch);
1da177e4 55
6612538c 56/* Prints also some state that isn't saved in the pt_regs */
e2ce07c8 57void __show_regs(struct pt_regs *regs, int all)
1da177e4
LT
58{
59 unsigned long cr0 = 0L, cr2 = 0L, cr3 = 0L, cr4 = 0L, fs, gs, shadowgs;
bb1995d5 60 unsigned long d0, d1, d2, d3, d6, d7;
6612538c
HS
61 unsigned int fsindex, gsindex;
62 unsigned int ds, cs, es;
814e2c84 63
d015a092 64 printk(KERN_DEFAULT "RIP: %04lx:[<%016lx>] ", regs->cs & 0xffff, regs->ip);
5f01c988 65 printk_address(regs->ip);
d015a092 66 printk(KERN_DEFAULT "RSP: %04lx:%016lx EFLAGS: %08lx\n", regs->ss,
8092c654 67 regs->sp, regs->flags);
d015a092 68 printk(KERN_DEFAULT "RAX: %016lx RBX: %016lx RCX: %016lx\n",
65ea5b03 69 regs->ax, regs->bx, regs->cx);
d015a092 70 printk(KERN_DEFAULT "RDX: %016lx RSI: %016lx RDI: %016lx\n",
65ea5b03 71 regs->dx, regs->si, regs->di);
d015a092 72 printk(KERN_DEFAULT "RBP: %016lx R08: %016lx R09: %016lx\n",
65ea5b03 73 regs->bp, regs->r8, regs->r9);
d015a092 74 printk(KERN_DEFAULT "R10: %016lx R11: %016lx R12: %016lx\n",
7de08b4e 75 regs->r10, regs->r11, regs->r12);
d015a092 76 printk(KERN_DEFAULT "R13: %016lx R14: %016lx R15: %016lx\n",
7de08b4e 77 regs->r13, regs->r14, regs->r15);
1da177e4 78
7de08b4e
GP
79 asm("movl %%ds,%0" : "=r" (ds));
80 asm("movl %%cs,%0" : "=r" (cs));
81 asm("movl %%es,%0" : "=r" (es));
1da177e4
LT
82 asm("movl %%fs,%0" : "=r" (fsindex));
83 asm("movl %%gs,%0" : "=r" (gsindex));
84
85 rdmsrl(MSR_FS_BASE, fs);
7de08b4e
GP
86 rdmsrl(MSR_GS_BASE, gs);
87 rdmsrl(MSR_KERNEL_GS_BASE, shadowgs);
1da177e4 88
e2ce07c8
PE
89 if (!all)
90 return;
1da177e4 91
f51c9452
GOC
92 cr0 = read_cr0();
93 cr2 = read_cr2();
94 cr3 = read_cr3();
1e02ce4c 95 cr4 = __read_cr4();
1da177e4 96
d015a092 97 printk(KERN_DEFAULT "FS: %016lx(%04x) GS:%016lx(%04x) knlGS:%016lx\n",
7de08b4e 98 fs, fsindex, gs, gsindex, shadowgs);
d015a092 99 printk(KERN_DEFAULT "CS: %04x DS: %04x ES: %04x CR0: %016lx\n", cs, ds,
8092c654 100 es, cr0);
d015a092 101 printk(KERN_DEFAULT "CR2: %016lx CR3: %016lx CR4: %016lx\n", cr2, cr3,
8092c654 102 cr4);
bb1995d5
AS
103
104 get_debugreg(d0, 0);
105 get_debugreg(d1, 1);
106 get_debugreg(d2, 2);
bb1995d5
AS
107 get_debugreg(d3, 3);
108 get_debugreg(d6, 6);
109 get_debugreg(d7, 7);
4338774c
DJ
110
111 /* Only print out debug registers if they are in their non-default state. */
112 if ((d0 == 0) && (d1 == 0) && (d2 == 0) && (d3 == 0) &&
113 (d6 == DR6_RESERVED) && (d7 == 0x400))
114 return;
115
116 printk(KERN_DEFAULT "DR0: %016lx DR1: %016lx DR2: %016lx\n", d0, d1, d2);
d015a092 117 printk(KERN_DEFAULT "DR3: %016lx DR6: %016lx DR7: %016lx\n", d3, d6, d7);
4338774c 118
c0b17b5b
DH
119 if (boot_cpu_has(X86_FEATURE_OSPKE))
120 printk(KERN_DEFAULT "PKRU: %08x\n", read_pkru());
1da177e4
LT
121}
122
1da177e4
LT
123void release_thread(struct task_struct *dead_task)
124{
125 if (dead_task->mm) {
a5b9e5a2 126#ifdef CONFIG_MODIFY_LDT_SYSCALL
37868fe1 127 if (dead_task->mm->context.ldt) {
349eab6e 128 pr_warn("WARNING: dead process %s still has LDT? <%p/%d>\n",
c767a54b 129 dead_task->comm,
0d430e3f 130 dead_task->mm->context.ldt->entries,
37868fe1 131 dead_task->mm->context.ldt->size);
1da177e4
LT
132 BUG();
133 }
a5b9e5a2 134#endif
1da177e4
LT
135 }
136}
137
138static inline void set_32bit_tls(struct task_struct *t, int tls, u32 addr)
139{
6612538c 140 struct user_desc ud = {
1da177e4
LT
141 .base_addr = addr,
142 .limit = 0xfffff,
143 .seg_32bit = 1,
144 .limit_in_pages = 1,
145 .useable = 1,
146 };
ade1af77 147 struct desc_struct *desc = t->thread.tls_array;
1da177e4 148 desc += tls;
80fbb69a 149 fill_ldt(desc, &ud);
1da177e4
LT
150}
151
152static inline u32 read_32bit_tls(struct task_struct *t, int tls)
153{
91394eb0 154 return get_desc_base(&t->thread.tls_array[tls]);
1da177e4
LT
155}
156
c1bd55f9
JT
157int copy_thread_tls(unsigned long clone_flags, unsigned long sp,
158 unsigned long arg, struct task_struct *p, unsigned long tls)
1da177e4
LT
159{
160 int err;
7de08b4e 161 struct pt_regs *childregs;
1da177e4
LT
162 struct task_struct *me = current;
163
7076aada
AV
164 p->thread.sp0 = (unsigned long)task_stack_page(p) + THREAD_SIZE;
165 childregs = task_pt_regs(p);
faca6227 166 p->thread.sp = (unsigned long) childregs;
e4f17c43 167 set_tsk_thread_flag(p, TIF_FORK);
66cb5917 168 p->thread.io_bitmap_ptr = NULL;
1da177e4 169
ada85708 170 savesegment(gs, p->thread.gsindex);
7ce5a2b9 171 p->thread.gs = p->thread.gsindex ? 0 : me->thread.gs;
ada85708 172 savesegment(fs, p->thread.fsindex);
7ce5a2b9 173 p->thread.fs = p->thread.fsindex ? 0 : me->thread.fs;
ada85708
JF
174 savesegment(es, p->thread.es);
175 savesegment(ds, p->thread.ds);
7076aada
AV
176 memset(p->thread.ptrace_bps, 0, sizeof(p->thread.ptrace_bps));
177
1d4b4b29 178 if (unlikely(p->flags & PF_KTHREAD)) {
7076aada
AV
179 /* kernel thread */
180 memset(childregs, 0, sizeof(struct pt_regs));
181 childregs->sp = (unsigned long)childregs;
182 childregs->ss = __KERNEL_DS;
183 childregs->bx = sp; /* function */
184 childregs->bp = arg;
185 childregs->orig_ax = -1;
186 childregs->cs = __KERNEL_CS | get_kernel_rpl();
1adfa76a 187 childregs->flags = X86_EFLAGS_IF | X86_EFLAGS_FIXED;
7076aada
AV
188 return 0;
189 }
1d4b4b29 190 *childregs = *current_pt_regs();
7076aada
AV
191
192 childregs->ax = 0;
1d4b4b29
AV
193 if (sp)
194 childregs->sp = sp;
1da177e4 195
66cb5917 196 err = -ENOMEM;
d3a4f48d 197 if (unlikely(test_tsk_thread_flag(me, TIF_IO_BITMAP))) {
cced4022
TM
198 p->thread.io_bitmap_ptr = kmemdup(me->thread.io_bitmap_ptr,
199 IO_BITMAP_BYTES, GFP_KERNEL);
1da177e4
LT
200 if (!p->thread.io_bitmap_ptr) {
201 p->thread.io_bitmap_max = 0;
202 return -ENOMEM;
203 }
d3a4f48d 204 set_tsk_thread_flag(p, TIF_IO_BITMAP);
6612538c 205 }
1da177e4
LT
206
207 /*
208 * Set a new TLS for the child thread?
209 */
210 if (clone_flags & CLONE_SETTLS) {
211#ifdef CONFIG_IA32_EMULATION
72c6fb4f 212 if (is_ia32_task())
efd1ca52 213 err = do_set_thread_area(p, -1,
c1bd55f9 214 (struct user_desc __user *)tls, 0);
7de08b4e
GP
215 else
216#endif
c1bd55f9 217 err = do_arch_prctl(p, ARCH_SET_FS, tls);
7de08b4e 218 if (err)
1da177e4
LT
219 goto out;
220 }
221 err = 0;
222out:
223 if (err && p->thread.io_bitmap_ptr) {
224 kfree(p->thread.io_bitmap_ptr);
225 p->thread.io_bitmap_max = 0;
226 }
66cb5917 227
1da177e4
LT
228 return err;
229}
230
e634d8fc
PA
231static void
232start_thread_common(struct pt_regs *regs, unsigned long new_ip,
233 unsigned long new_sp,
234 unsigned int _cs, unsigned int _ss, unsigned int _ds)
513ad84b 235{
ada85708 236 loadsegment(fs, 0);
e634d8fc
PA
237 loadsegment(es, _ds);
238 loadsegment(ds, _ds);
513ad84b
IM
239 load_gs_index(0);
240 regs->ip = new_ip;
241 regs->sp = new_sp;
e634d8fc
PA
242 regs->cs = _cs;
243 regs->ss = _ss;
a6f05a6a 244 regs->flags = X86_EFLAGS_IF;
1daeaa31 245 force_iret();
513ad84b 246}
e634d8fc
PA
247
248void
249start_thread(struct pt_regs *regs, unsigned long new_ip, unsigned long new_sp)
250{
251 start_thread_common(regs, new_ip, new_sp,
252 __USER_CS, __USER_DS, 0);
253}
513ad84b 254
7da77078
BG
255#ifdef CONFIG_COMPAT
256void compat_start_thread(struct pt_regs *regs, u32 new_ip, u32 new_sp)
a6f05a6a 257{
e634d8fc 258 start_thread_common(regs, new_ip, new_sp,
d1a797f3
PA
259 test_thread_flag(TIF_X32)
260 ? __USER_CS : __USER32_CS,
261 __USER_DS, __USER_DS);
a6f05a6a
PA
262}
263#endif
513ad84b 264
1da177e4
LT
265/*
266 * switch_to(x,y) should switch tasks from x to y.
267 *
6612538c 268 * This could still be optimized:
1da177e4
LT
269 * - fold all the options into a flag word and test it with a single test.
270 * - could test fs/gs bitsliced
099f318b
AK
271 *
272 * Kprobes not supported here. Set the probe on schedule instead.
8b96f011 273 * Function graph tracer not supported too.
1da177e4 274 */
35ea7903 275__visible __notrace_funcgraph struct task_struct *
a88cde13 276__switch_to(struct task_struct *prev_p, struct task_struct *next_p)
1da177e4 277{
87b935a0
JF
278 struct thread_struct *prev = &prev_p->thread;
279 struct thread_struct *next = &next_p->thread;
384a23f9
IM
280 struct fpu *prev_fpu = &prev->fpu;
281 struct fpu *next_fpu = &next->fpu;
6612538c 282 int cpu = smp_processor_id();
24933b82 283 struct tss_struct *tss = &per_cpu(cpu_tss, cpu);
478de5a9 284 unsigned fsindex, gsindex;
384a23f9 285 fpu_switch_t fpu_switch;
e07e23e1 286
384a23f9 287 fpu_switch = switch_fpu_prepare(prev_fpu, next_fpu, cpu);
4903062b 288
478de5a9
JF
289 /* We must save %fs and %gs before load_TLS() because
290 * %fs and %gs may be cleared by load_TLS().
291 *
292 * (e.g. xen_load_tls())
293 */
294 savesegment(fs, fsindex);
295 savesegment(gs, gsindex);
296
f647d7c1
AL
297 /*
298 * Load TLS before restoring any segments so that segment loads
299 * reference the correct GDT entries.
300 */
1da177e4
LT
301 load_TLS(next, cpu);
302
3fe0a63e 303 /*
f647d7c1
AL
304 * Leave lazy mode, flushing any hypercalls made here. This
305 * must be done after loading TLS entries in the GDT but before
306 * loading segments that might reference them, and and it must
3a0aee48 307 * be done before fpu__restore(), so the TS bit is up to
f647d7c1 308 * date.
3fe0a63e 309 */
224101ed 310 arch_end_context_switch(next_p);
3fe0a63e 311
f647d7c1
AL
312 /* Switch DS and ES.
313 *
314 * Reading them only returns the selectors, but writing them (if
315 * nonzero) loads the full descriptor from the GDT or LDT. The
316 * LDT for next is loaded in switch_mm, and the GDT is loaded
317 * above.
318 *
319 * We therefore need to write new values to the segment
320 * registers on every context switch unless both the new and old
321 * values are zero.
322 *
323 * Note that we don't need to do anything for CS and SS, as
324 * those are saved and restored as part of pt_regs.
325 */
326 savesegment(es, prev->es);
327 if (unlikely(next->es | prev->es))
328 loadsegment(es, next->es);
329
330 savesegment(ds, prev->ds);
331 if (unlikely(next->ds | prev->ds))
332 loadsegment(ds, next->ds);
333
7de08b4e 334 /*
1da177e4 335 * Switch FS and GS.
87b935a0 336 *
558a65bc 337 * These are even more complicated than DS and ES: they have
f647d7c1
AL
338 * 64-bit bases are that controlled by arch_prctl. Those bases
339 * only differ from the values in the GDT or LDT if the selector
340 * is 0.
341 *
342 * Loading the segment register resets the hidden base part of
343 * the register to 0 or the value from the GDT / LDT. If the
344 * next base address zero, writing 0 to the segment register is
345 * much faster than using wrmsr to explicitly zero the base.
346 *
347 * The thread_struct.fs and thread_struct.gs values are 0
348 * if the fs and gs bases respectively are not overridden
349 * from the values implied by fsindex and gsindex. They
350 * are nonzero, and store the nonzero base addresses, if
351 * the bases are overridden.
352 *
353 * (fs != 0 && fsindex != 0) || (gs != 0 && gsindex != 0) should
354 * be impossible.
355 *
356 * Therefore we need to reload the segment registers if either
357 * the old or new selector is nonzero, and we need to override
358 * the base address if next thread expects it to be overridden.
359 *
360 * This code is unnecessarily slow in the case where the old and
361 * new indexes are zero and the new base is nonzero -- it will
362 * unnecessarily write 0 to the selector before writing the new
363 * base address.
364 *
365 * Note: This all depends on arch_prctl being the only way that
366 * user code can override the segment base. Once wrfsbase and
367 * wrgsbase are enabled, most of this code will need to change.
1da177e4 368 */
87b935a0
JF
369 if (unlikely(fsindex | next->fsindex | prev->fs)) {
370 loadsegment(fs, next->fsindex);
f647d7c1 371
7de08b4e 372 /*
f647d7c1
AL
373 * If user code wrote a nonzero value to FS, then it also
374 * cleared the overridden base address.
375 *
376 * XXX: if user code wrote 0 to FS and cleared the base
377 * address itself, we won't notice and we'll incorrectly
378 * restore the prior base address next time we reschdule
379 * the process.
87b935a0
JF
380 */
381 if (fsindex)
7de08b4e 382 prev->fs = 0;
1da177e4 383 }
87b935a0
JF
384 if (next->fs)
385 wrmsrl(MSR_FS_BASE, next->fs);
386 prev->fsindex = fsindex;
387
388 if (unlikely(gsindex | next->gsindex | prev->gs)) {
389 load_gs_index(next->gsindex);
f647d7c1
AL
390
391 /* This works (and fails) the same way as fsindex above. */
87b935a0 392 if (gsindex)
7de08b4e 393 prev->gs = 0;
1da177e4 394 }
87b935a0
JF
395 if (next->gs)
396 wrmsrl(MSR_KERNEL_GS_BASE, next->gs);
397 prev->gsindex = gsindex;
1da177e4 398
384a23f9 399 switch_fpu_finish(next_fpu, fpu_switch);
34ddc81a 400
7de08b4e 401 /*
45948d77 402 * Switch the PDA and FPU contexts.
1da177e4 403 */
c6ae41e7 404 this_cpu_write(current_task, next_p);
18bd057b 405
b27559a4
AL
406 /* Reload esp0 and ss1. This changes current_thread_info(). */
407 load_sp0(tss, next);
408
1da177e4 409 /*
d3a4f48d 410 * Now maybe reload the debug registers and handle I/O bitmaps
1da177e4 411 */
eee3af4a
MM
412 if (unlikely(task_thread_info(next_p)->flags & _TIF_WORK_CTXSW_NEXT ||
413 task_thread_info(prev_p)->flags & _TIF_WORK_CTXSW_PREV))
d3a4f48d 414 __switch_to_xtra(prev_p, next_p, tss);
1da177e4 415
61f01dd9
AL
416 if (static_cpu_has_bug(X86_BUG_SYSRET_SS_ATTRS)) {
417 /*
418 * AMD CPUs have a misfeature: SYSRET sets the SS selector but
419 * does not update the cached descriptor. As a result, if we
420 * do SYSRET while SS is NULL, we'll end up in user mode with
421 * SS apparently equal to __USER_DS but actually unusable.
422 *
423 * The straightforward workaround would be to fix it up just
424 * before SYSRET, but that would slow down the system call
425 * fast paths. Instead, we ensure that SS is never NULL in
426 * system call context. We do this by replacing NULL SS
427 * selectors at every context switch. SYSCALL sets up a valid
428 * SS, so the only way to get NULL is to re-enter the kernel
429 * from CPL 3 through an interrupt. Since that can't happen
430 * in the same task as a running syscall, we are guaranteed to
431 * context switch between every interrupt vector entry and a
432 * subsequent SYSRET.
433 *
434 * We read SS first because SS reads are much faster than
435 * writes. Out of caution, we force SS to __KERNEL_DS even if
436 * it previously had a different non-NULL value.
437 */
438 unsigned short ss_sel;
439 savesegment(ss, ss_sel);
440 if (ss_sel != __KERNEL_DS)
441 loadsegment(ss, __KERNEL_DS);
442 }
443
1da177e4
LT
444 return prev_p;
445}
446
1da177e4
LT
447void set_personality_64bit(void)
448{
449 /* inherit personality from parent */
450
451 /* Make sure to be in 64bit mode */
6612538c 452 clear_thread_flag(TIF_IA32);
6bd33008 453 clear_thread_flag(TIF_ADDR32);
bb212724 454 clear_thread_flag(TIF_X32);
1da177e4 455
375906f8
SW
456 /* Ensure the corresponding mm is not marked. */
457 if (current->mm)
458 current->mm->context.ia32_compat = 0;
459
1da177e4
LT
460 /* TBD: overwrites user setup. Should have two bits.
461 But 64bit processes have always behaved this way,
462 so it's not too bad. The main problem is just that
6612538c 463 32bit childs are affected again. */
1da177e4
LT
464 current->personality &= ~READ_IMPLIES_EXEC;
465}
466
d1a797f3 467void set_personality_ia32(bool x32)
05d43ed8
PA
468{
469 /* inherit personality from parent */
470
471 /* Make sure to be in 32bit mode */
6bd33008 472 set_thread_flag(TIF_ADDR32);
05d43ed8 473
375906f8 474 /* Mark the associated mm as containing 32-bit tasks. */
d1a797f3
PA
475 if (x32) {
476 clear_thread_flag(TIF_IA32);
477 set_thread_flag(TIF_X32);
b24dc8da
ON
478 if (current->mm)
479 current->mm->context.ia32_compat = TIF_X32;
d1a797f3 480 current->personality &= ~READ_IMPLIES_EXEC;
ce5f7a99
BP
481 /* is_compat_task() uses the presence of the x32
482 syscall bit flag to determine compat status */
483 current_thread_info()->status &= ~TS_COMPAT;
d1a797f3
PA
484 } else {
485 set_thread_flag(TIF_IA32);
486 clear_thread_flag(TIF_X32);
b24dc8da
ON
487 if (current->mm)
488 current->mm->context.ia32_compat = TIF_IA32;
d1a797f3
PA
489 current->personality |= force_personality32;
490 /* Prepare the first "return" to user space */
491 current_thread_info()->status |= TS_COMPAT;
492 }
05d43ed8 493}
febb72a6 494EXPORT_SYMBOL_GPL(set_personality_ia32);
05d43ed8 495
1da177e4 496long do_arch_prctl(struct task_struct *task, int code, unsigned long addr)
7de08b4e
GP
497{
498 int ret = 0;
1da177e4
LT
499 int doit = task == current;
500 int cpu;
501
7de08b4e 502 switch (code) {
1da177e4 503 case ARCH_SET_GS:
84929801 504 if (addr >= TASK_SIZE_OF(task))
7de08b4e 505 return -EPERM;
1da177e4 506 cpu = get_cpu();
7de08b4e 507 /* handle small bases via the GDT because that's faster to
1da177e4 508 switch. */
7de08b4e
GP
509 if (addr <= 0xffffffff) {
510 set_32bit_tls(task, GS_TLS, addr);
511 if (doit) {
1da177e4 512 load_TLS(&task->thread, cpu);
7de08b4e 513 load_gs_index(GS_TLS_SEL);
1da177e4 514 }
7de08b4e 515 task->thread.gsindex = GS_TLS_SEL;
1da177e4 516 task->thread.gs = 0;
7de08b4e 517 } else {
1da177e4
LT
518 task->thread.gsindex = 0;
519 task->thread.gs = addr;
520 if (doit) {
a88cde13 521 load_gs_index(0);
715c85b1 522 ret = wrmsrl_safe(MSR_KERNEL_GS_BASE, addr);
7de08b4e 523 }
1da177e4
LT
524 }
525 put_cpu();
526 break;
527 case ARCH_SET_FS:
528 /* Not strictly needed for fs, but do it for symmetry
529 with gs */
84929801 530 if (addr >= TASK_SIZE_OF(task))
6612538c 531 return -EPERM;
1da177e4 532 cpu = get_cpu();
6612538c 533 /* handle small bases via the GDT because that's faster to
1da177e4 534 switch. */
6612538c 535 if (addr <= 0xffffffff) {
1da177e4 536 set_32bit_tls(task, FS_TLS, addr);
6612538c
HS
537 if (doit) {
538 load_TLS(&task->thread, cpu);
ada85708 539 loadsegment(fs, FS_TLS_SEL);
1da177e4
LT
540 }
541 task->thread.fsindex = FS_TLS_SEL;
542 task->thread.fs = 0;
6612538c 543 } else {
1da177e4
LT
544 task->thread.fsindex = 0;
545 task->thread.fs = addr;
546 if (doit) {
547 /* set the selector to 0 to not confuse
548 __switch_to */
ada85708 549 loadsegment(fs, 0);
715c85b1 550 ret = wrmsrl_safe(MSR_FS_BASE, addr);
1da177e4
LT
551 }
552 }
553 put_cpu();
554 break;
6612538c
HS
555 case ARCH_GET_FS: {
556 unsigned long base;
1da177e4
LT
557 if (task->thread.fsindex == FS_TLS_SEL)
558 base = read_32bit_tls(task, FS_TLS);
a88cde13 559 else if (doit)
1da177e4 560 rdmsrl(MSR_FS_BASE, base);
a88cde13 561 else
1da177e4 562 base = task->thread.fs;
6612538c
HS
563 ret = put_user(base, (unsigned long __user *)addr);
564 break;
1da177e4 565 }
6612538c 566 case ARCH_GET_GS: {
1da177e4 567 unsigned long base;
97c2803c 568 unsigned gsindex;
1da177e4
LT
569 if (task->thread.gsindex == GS_TLS_SEL)
570 base = read_32bit_tls(task, GS_TLS);
97c2803c 571 else if (doit) {
ada85708 572 savesegment(gs, gsindex);
97c2803c
JB
573 if (gsindex)
574 rdmsrl(MSR_KERNEL_GS_BASE, base);
575 else
576 base = task->thread.gs;
7de08b4e 577 } else
1da177e4 578 base = task->thread.gs;
6612538c 579 ret = put_user(base, (unsigned long __user *)addr);
1da177e4
LT
580 break;
581 }
582
583 default:
584 ret = -EINVAL;
585 break;
6612538c 586 }
1da177e4 587
6612538c
HS
588 return ret;
589}
1da177e4
LT
590
591long sys_arch_prctl(int code, unsigned long addr)
592{
593 return do_arch_prctl(current, code, addr);
1da177e4
LT
594}
595
89240ba0
SS
596unsigned long KSTK_ESP(struct task_struct *task)
597{
263042e4 598 return task_pt_regs(task)->sp;
89240ba0 599}
This page took 0.912889 seconds and 5 git commands to generate.