]> git.ipfire.org Git - thirdparty/kernel/stable.git/blame - arch/x86/kernel/process_64.c
x86/fpu: Use 'struct fpu' in switch_fpu_prepare()
[thirdparty/kernel/stable.git] / arch / x86 / kernel / process_64.c
CommitLineData
1da177e4 1/*
1da177e4
LT
2 * Copyright (C) 1995 Linus Torvalds
3 *
4 * Pentium III FXSR, SSE support
5 * Gareth Hughes <gareth@valinux.com>, May 2000
6612538c 6 *
1da177e4
LT
7 * X86-64 port
8 * Andi Kleen.
76e4f660
AR
9 *
10 * CPU hotplug support - ashok.raj@intel.com
1da177e4
LT
11 */
12
13/*
14 * This file handles the architecture-dependent parts of process handling..
15 */
16
76e4f660 17#include <linux/cpu.h>
1da177e4
LT
18#include <linux/errno.h>
19#include <linux/sched.h>
6612538c 20#include <linux/fs.h>
1da177e4
LT
21#include <linux/kernel.h>
22#include <linux/mm.h>
23#include <linux/elfcore.h>
24#include <linux/smp.h>
25#include <linux/slab.h>
26#include <linux/user.h>
1da177e4
LT
27#include <linux/interrupt.h>
28#include <linux/delay.h>
6612538c 29#include <linux/module.h>
1da177e4 30#include <linux/ptrace.h>
95833c83 31#include <linux/notifier.h>
c6fd91f0 32#include <linux/kprobes.h>
1eeb66a1 33#include <linux/kdebug.h>
529e25f6 34#include <linux/prctl.h>
7de08b4e
GP
35#include <linux/uaccess.h>
36#include <linux/io.h>
8b96f011 37#include <linux/ftrace.h>
1da177e4 38
1da177e4 39#include <asm/pgtable.h>
1da177e4 40#include <asm/processor.h>
1361b83a 41#include <asm/fpu-internal.h>
1da177e4 42#include <asm/mmu_context.h>
1da177e4 43#include <asm/prctl.h>
1da177e4
LT
44#include <asm/desc.h>
45#include <asm/proto.h>
46#include <asm/ia32.h>
95833c83 47#include <asm/idle.h>
bbc1f698 48#include <asm/syscalls.h>
66cb5917 49#include <asm/debugreg.h>
f05e798a 50#include <asm/switch_to.h>
1da177e4
LT
51
52asmlinkage extern void ret_from_fork(void);
53
c38e5038 54__visible DEFINE_PER_CPU(unsigned long, rsp_scratch);
1da177e4 55
6612538c 56/* Prints also some state that isn't saved in the pt_regs */
e2ce07c8 57void __show_regs(struct pt_regs *regs, int all)
1da177e4
LT
58{
59 unsigned long cr0 = 0L, cr2 = 0L, cr3 = 0L, cr4 = 0L, fs, gs, shadowgs;
bb1995d5 60 unsigned long d0, d1, d2, d3, d6, d7;
6612538c
HS
61 unsigned int fsindex, gsindex;
62 unsigned int ds, cs, es;
814e2c84 63
d015a092 64 printk(KERN_DEFAULT "RIP: %04lx:[<%016lx>] ", regs->cs & 0xffff, regs->ip);
5f01c988 65 printk_address(regs->ip);
d015a092 66 printk(KERN_DEFAULT "RSP: %04lx:%016lx EFLAGS: %08lx\n", regs->ss,
8092c654 67 regs->sp, regs->flags);
d015a092 68 printk(KERN_DEFAULT "RAX: %016lx RBX: %016lx RCX: %016lx\n",
65ea5b03 69 regs->ax, regs->bx, regs->cx);
d015a092 70 printk(KERN_DEFAULT "RDX: %016lx RSI: %016lx RDI: %016lx\n",
65ea5b03 71 regs->dx, regs->si, regs->di);
d015a092 72 printk(KERN_DEFAULT "RBP: %016lx R08: %016lx R09: %016lx\n",
65ea5b03 73 regs->bp, regs->r8, regs->r9);
d015a092 74 printk(KERN_DEFAULT "R10: %016lx R11: %016lx R12: %016lx\n",
7de08b4e 75 regs->r10, regs->r11, regs->r12);
d015a092 76 printk(KERN_DEFAULT "R13: %016lx R14: %016lx R15: %016lx\n",
7de08b4e 77 regs->r13, regs->r14, regs->r15);
1da177e4 78
7de08b4e
GP
79 asm("movl %%ds,%0" : "=r" (ds));
80 asm("movl %%cs,%0" : "=r" (cs));
81 asm("movl %%es,%0" : "=r" (es));
1da177e4
LT
82 asm("movl %%fs,%0" : "=r" (fsindex));
83 asm("movl %%gs,%0" : "=r" (gsindex));
84
85 rdmsrl(MSR_FS_BASE, fs);
7de08b4e
GP
86 rdmsrl(MSR_GS_BASE, gs);
87 rdmsrl(MSR_KERNEL_GS_BASE, shadowgs);
1da177e4 88
e2ce07c8
PE
89 if (!all)
90 return;
1da177e4 91
f51c9452
GOC
92 cr0 = read_cr0();
93 cr2 = read_cr2();
94 cr3 = read_cr3();
1e02ce4c 95 cr4 = __read_cr4();
1da177e4 96
d015a092 97 printk(KERN_DEFAULT "FS: %016lx(%04x) GS:%016lx(%04x) knlGS:%016lx\n",
7de08b4e 98 fs, fsindex, gs, gsindex, shadowgs);
d015a092 99 printk(KERN_DEFAULT "CS: %04x DS: %04x ES: %04x CR0: %016lx\n", cs, ds,
8092c654 100 es, cr0);
d015a092 101 printk(KERN_DEFAULT "CR2: %016lx CR3: %016lx CR4: %016lx\n", cr2, cr3,
8092c654 102 cr4);
bb1995d5
AS
103
104 get_debugreg(d0, 0);
105 get_debugreg(d1, 1);
106 get_debugreg(d2, 2);
bb1995d5
AS
107 get_debugreg(d3, 3);
108 get_debugreg(d6, 6);
109 get_debugreg(d7, 7);
4338774c
DJ
110
111 /* Only print out debug registers if they are in their non-default state. */
112 if ((d0 == 0) && (d1 == 0) && (d2 == 0) && (d3 == 0) &&
113 (d6 == DR6_RESERVED) && (d7 == 0x400))
114 return;
115
116 printk(KERN_DEFAULT "DR0: %016lx DR1: %016lx DR2: %016lx\n", d0, d1, d2);
d015a092 117 printk(KERN_DEFAULT "DR3: %016lx DR6: %016lx DR7: %016lx\n", d3, d6, d7);
4338774c 118
1da177e4
LT
119}
120
1da177e4
LT
121void release_thread(struct task_struct *dead_task)
122{
123 if (dead_task->mm) {
124 if (dead_task->mm->context.size) {
349eab6e 125 pr_warn("WARNING: dead process %s still has LDT? <%p/%d>\n",
c767a54b
JP
126 dead_task->comm,
127 dead_task->mm->context.ldt,
128 dead_task->mm->context.size);
1da177e4
LT
129 BUG();
130 }
131 }
132}
133
134static inline void set_32bit_tls(struct task_struct *t, int tls, u32 addr)
135{
6612538c 136 struct user_desc ud = {
1da177e4
LT
137 .base_addr = addr,
138 .limit = 0xfffff,
139 .seg_32bit = 1,
140 .limit_in_pages = 1,
141 .useable = 1,
142 };
ade1af77 143 struct desc_struct *desc = t->thread.tls_array;
1da177e4 144 desc += tls;
80fbb69a 145 fill_ldt(desc, &ud);
1da177e4
LT
146}
147
148static inline u32 read_32bit_tls(struct task_struct *t, int tls)
149{
91394eb0 150 return get_desc_base(&t->thread.tls_array[tls]);
1da177e4
LT
151}
152
6f2c55b8 153int copy_thread(unsigned long clone_flags, unsigned long sp,
afa86fc4 154 unsigned long arg, struct task_struct *p)
1da177e4
LT
155{
156 int err;
7de08b4e 157 struct pt_regs *childregs;
1da177e4
LT
158 struct task_struct *me = current;
159
7076aada
AV
160 p->thread.sp0 = (unsigned long)task_stack_page(p) + THREAD_SIZE;
161 childregs = task_pt_regs(p);
faca6227 162 p->thread.sp = (unsigned long) childregs;
e4f17c43 163 set_tsk_thread_flag(p, TIF_FORK);
66cb5917 164 p->thread.io_bitmap_ptr = NULL;
1da177e4 165
ada85708 166 savesegment(gs, p->thread.gsindex);
7ce5a2b9 167 p->thread.gs = p->thread.gsindex ? 0 : me->thread.gs;
ada85708 168 savesegment(fs, p->thread.fsindex);
7ce5a2b9 169 p->thread.fs = p->thread.fsindex ? 0 : me->thread.fs;
ada85708
JF
170 savesegment(es, p->thread.es);
171 savesegment(ds, p->thread.ds);
7076aada
AV
172 memset(p->thread.ptrace_bps, 0, sizeof(p->thread.ptrace_bps));
173
1d4b4b29 174 if (unlikely(p->flags & PF_KTHREAD)) {
7076aada
AV
175 /* kernel thread */
176 memset(childregs, 0, sizeof(struct pt_regs));
177 childregs->sp = (unsigned long)childregs;
178 childregs->ss = __KERNEL_DS;
179 childregs->bx = sp; /* function */
180 childregs->bp = arg;
181 childregs->orig_ax = -1;
182 childregs->cs = __KERNEL_CS | get_kernel_rpl();
1adfa76a 183 childregs->flags = X86_EFLAGS_IF | X86_EFLAGS_FIXED;
7076aada
AV
184 return 0;
185 }
1d4b4b29 186 *childregs = *current_pt_regs();
7076aada
AV
187
188 childregs->ax = 0;
1d4b4b29
AV
189 if (sp)
190 childregs->sp = sp;
1da177e4 191
66cb5917 192 err = -ENOMEM;
d3a4f48d 193 if (unlikely(test_tsk_thread_flag(me, TIF_IO_BITMAP))) {
cced4022
TM
194 p->thread.io_bitmap_ptr = kmemdup(me->thread.io_bitmap_ptr,
195 IO_BITMAP_BYTES, GFP_KERNEL);
1da177e4
LT
196 if (!p->thread.io_bitmap_ptr) {
197 p->thread.io_bitmap_max = 0;
198 return -ENOMEM;
199 }
d3a4f48d 200 set_tsk_thread_flag(p, TIF_IO_BITMAP);
6612538c 201 }
1da177e4
LT
202
203 /*
204 * Set a new TLS for the child thread?
205 */
206 if (clone_flags & CLONE_SETTLS) {
207#ifdef CONFIG_IA32_EMULATION
72c6fb4f 208 if (is_ia32_task())
efd1ca52 209 err = do_set_thread_area(p, -1,
65ea5b03 210 (struct user_desc __user *)childregs->si, 0);
7de08b4e
GP
211 else
212#endif
213 err = do_arch_prctl(p, ARCH_SET_FS, childregs->r8);
214 if (err)
1da177e4
LT
215 goto out;
216 }
217 err = 0;
218out:
219 if (err && p->thread.io_bitmap_ptr) {
220 kfree(p->thread.io_bitmap_ptr);
221 p->thread.io_bitmap_max = 0;
222 }
66cb5917 223
1da177e4
LT
224 return err;
225}
226
e634d8fc
PA
227static void
228start_thread_common(struct pt_regs *regs, unsigned long new_ip,
229 unsigned long new_sp,
230 unsigned int _cs, unsigned int _ss, unsigned int _ds)
513ad84b 231{
ada85708 232 loadsegment(fs, 0);
e634d8fc
PA
233 loadsegment(es, _ds);
234 loadsegment(ds, _ds);
513ad84b
IM
235 load_gs_index(0);
236 regs->ip = new_ip;
237 regs->sp = new_sp;
e634d8fc
PA
238 regs->cs = _cs;
239 regs->ss = _ss;
a6f05a6a 240 regs->flags = X86_EFLAGS_IF;
1daeaa31 241 force_iret();
513ad84b 242}
e634d8fc
PA
243
244void
245start_thread(struct pt_regs *regs, unsigned long new_ip, unsigned long new_sp)
246{
247 start_thread_common(regs, new_ip, new_sp,
248 __USER_CS, __USER_DS, 0);
249}
513ad84b 250
a6f05a6a
PA
251#ifdef CONFIG_IA32_EMULATION
252void start_thread_ia32(struct pt_regs *regs, u32 new_ip, u32 new_sp)
253{
e634d8fc 254 start_thread_common(regs, new_ip, new_sp,
d1a797f3
PA
255 test_thread_flag(TIF_X32)
256 ? __USER_CS : __USER32_CS,
257 __USER_DS, __USER_DS);
a6f05a6a
PA
258}
259#endif
513ad84b 260
1da177e4
LT
261/*
262 * switch_to(x,y) should switch tasks from x to y.
263 *
6612538c 264 * This could still be optimized:
1da177e4
LT
265 * - fold all the options into a flag word and test it with a single test.
266 * - could test fs/gs bitsliced
099f318b
AK
267 *
268 * Kprobes not supported here. Set the probe on schedule instead.
8b96f011 269 * Function graph tracer not supported too.
1da177e4 270 */
35ea7903 271__visible __notrace_funcgraph struct task_struct *
a88cde13 272__switch_to(struct task_struct *prev_p, struct task_struct *next_p)
1da177e4 273{
87b935a0
JF
274 struct thread_struct *prev = &prev_p->thread;
275 struct thread_struct *next = &next_p->thread;
6612538c 276 int cpu = smp_processor_id();
24933b82 277 struct tss_struct *tss = &per_cpu(cpu_tss, cpu);
478de5a9 278 unsigned fsindex, gsindex;
34ddc81a 279 fpu_switch_t fpu;
e07e23e1 280
cb8818b6 281 fpu = switch_fpu_prepare(&prev_p->thread.fpu, &next_p->thread.fpu, cpu);
4903062b 282
478de5a9
JF
283 /* We must save %fs and %gs before load_TLS() because
284 * %fs and %gs may be cleared by load_TLS().
285 *
286 * (e.g. xen_load_tls())
287 */
288 savesegment(fs, fsindex);
289 savesegment(gs, gsindex);
290
f647d7c1
AL
291 /*
292 * Load TLS before restoring any segments so that segment loads
293 * reference the correct GDT entries.
294 */
1da177e4
LT
295 load_TLS(next, cpu);
296
3fe0a63e 297 /*
f647d7c1
AL
298 * Leave lazy mode, flushing any hypercalls made here. This
299 * must be done after loading TLS entries in the GDT but before
300 * loading segments that might reference them, and and it must
3a0aee48 301 * be done before fpu__restore(), so the TS bit is up to
f647d7c1 302 * date.
3fe0a63e 303 */
224101ed 304 arch_end_context_switch(next_p);
3fe0a63e 305
f647d7c1
AL
306 /* Switch DS and ES.
307 *
308 * Reading them only returns the selectors, but writing them (if
309 * nonzero) loads the full descriptor from the GDT or LDT. The
310 * LDT for next is loaded in switch_mm, and the GDT is loaded
311 * above.
312 *
313 * We therefore need to write new values to the segment
314 * registers on every context switch unless both the new and old
315 * values are zero.
316 *
317 * Note that we don't need to do anything for CS and SS, as
318 * those are saved and restored as part of pt_regs.
319 */
320 savesegment(es, prev->es);
321 if (unlikely(next->es | prev->es))
322 loadsegment(es, next->es);
323
324 savesegment(ds, prev->ds);
325 if (unlikely(next->ds | prev->ds))
326 loadsegment(ds, next->ds);
327
7de08b4e 328 /*
1da177e4 329 * Switch FS and GS.
87b935a0 330 *
f647d7c1
AL
331 * These are even more complicated than FS and GS: they have
332 * 64-bit bases are that controlled by arch_prctl. Those bases
333 * only differ from the values in the GDT or LDT if the selector
334 * is 0.
335 *
336 * Loading the segment register resets the hidden base part of
337 * the register to 0 or the value from the GDT / LDT. If the
338 * next base address zero, writing 0 to the segment register is
339 * much faster than using wrmsr to explicitly zero the base.
340 *
341 * The thread_struct.fs and thread_struct.gs values are 0
342 * if the fs and gs bases respectively are not overridden
343 * from the values implied by fsindex and gsindex. They
344 * are nonzero, and store the nonzero base addresses, if
345 * the bases are overridden.
346 *
347 * (fs != 0 && fsindex != 0) || (gs != 0 && gsindex != 0) should
348 * be impossible.
349 *
350 * Therefore we need to reload the segment registers if either
351 * the old or new selector is nonzero, and we need to override
352 * the base address if next thread expects it to be overridden.
353 *
354 * This code is unnecessarily slow in the case where the old and
355 * new indexes are zero and the new base is nonzero -- it will
356 * unnecessarily write 0 to the selector before writing the new
357 * base address.
358 *
359 * Note: This all depends on arch_prctl being the only way that
360 * user code can override the segment base. Once wrfsbase and
361 * wrgsbase are enabled, most of this code will need to change.
1da177e4 362 */
87b935a0
JF
363 if (unlikely(fsindex | next->fsindex | prev->fs)) {
364 loadsegment(fs, next->fsindex);
f647d7c1 365
7de08b4e 366 /*
f647d7c1
AL
367 * If user code wrote a nonzero value to FS, then it also
368 * cleared the overridden base address.
369 *
370 * XXX: if user code wrote 0 to FS and cleared the base
371 * address itself, we won't notice and we'll incorrectly
372 * restore the prior base address next time we reschdule
373 * the process.
87b935a0
JF
374 */
375 if (fsindex)
7de08b4e 376 prev->fs = 0;
1da177e4 377 }
87b935a0
JF
378 if (next->fs)
379 wrmsrl(MSR_FS_BASE, next->fs);
380 prev->fsindex = fsindex;
381
382 if (unlikely(gsindex | next->gsindex | prev->gs)) {
383 load_gs_index(next->gsindex);
f647d7c1
AL
384
385 /* This works (and fails) the same way as fsindex above. */
87b935a0 386 if (gsindex)
7de08b4e 387 prev->gs = 0;
1da177e4 388 }
87b935a0
JF
389 if (next->gs)
390 wrmsrl(MSR_KERNEL_GS_BASE, next->gs);
391 prev->gsindex = gsindex;
1da177e4 392
34ddc81a
LT
393 switch_fpu_finish(next_p, fpu);
394
7de08b4e 395 /*
45948d77 396 * Switch the PDA and FPU contexts.
1da177e4 397 */
c6ae41e7 398 this_cpu_write(current_task, next_p);
18bd057b 399
c2daa3be
PZ
400 /*
401 * If it were not for PREEMPT_ACTIVE we could guarantee that the
402 * preempt_count of all tasks was equal here and this would not be
403 * needed.
404 */
405 task_thread_info(prev_p)->saved_preempt_count = this_cpu_read(__preempt_count);
406 this_cpu_write(__preempt_count, task_thread_info(next_p)->saved_preempt_count);
407
b27559a4
AL
408 /* Reload esp0 and ss1. This changes current_thread_info(). */
409 load_sp0(tss, next);
410
c6ae41e7 411 this_cpu_write(kernel_stack,
ef593260 412 (unsigned long)task_stack_page(next_p) + THREAD_SIZE);
1da177e4
LT
413
414 /*
d3a4f48d 415 * Now maybe reload the debug registers and handle I/O bitmaps
1da177e4 416 */
eee3af4a
MM
417 if (unlikely(task_thread_info(next_p)->flags & _TIF_WORK_CTXSW_NEXT ||
418 task_thread_info(prev_p)->flags & _TIF_WORK_CTXSW_PREV))
d3a4f48d 419 __switch_to_xtra(prev_p, next_p, tss);
1da177e4 420
61f01dd9
AL
421 if (static_cpu_has_bug(X86_BUG_SYSRET_SS_ATTRS)) {
422 /*
423 * AMD CPUs have a misfeature: SYSRET sets the SS selector but
424 * does not update the cached descriptor. As a result, if we
425 * do SYSRET while SS is NULL, we'll end up in user mode with
426 * SS apparently equal to __USER_DS but actually unusable.
427 *
428 * The straightforward workaround would be to fix it up just
429 * before SYSRET, but that would slow down the system call
430 * fast paths. Instead, we ensure that SS is never NULL in
431 * system call context. We do this by replacing NULL SS
432 * selectors at every context switch. SYSCALL sets up a valid
433 * SS, so the only way to get NULL is to re-enter the kernel
434 * from CPL 3 through an interrupt. Since that can't happen
435 * in the same task as a running syscall, we are guaranteed to
436 * context switch between every interrupt vector entry and a
437 * subsequent SYSRET.
438 *
439 * We read SS first because SS reads are much faster than
440 * writes. Out of caution, we force SS to __KERNEL_DS even if
441 * it previously had a different non-NULL value.
442 */
443 unsigned short ss_sel;
444 savesegment(ss, ss_sel);
445 if (ss_sel != __KERNEL_DS)
446 loadsegment(ss, __KERNEL_DS);
447 }
448
1da177e4
LT
449 return prev_p;
450}
451
1da177e4
LT
452void set_personality_64bit(void)
453{
454 /* inherit personality from parent */
455
456 /* Make sure to be in 64bit mode */
6612538c 457 clear_thread_flag(TIF_IA32);
6bd33008 458 clear_thread_flag(TIF_ADDR32);
bb212724 459 clear_thread_flag(TIF_X32);
1da177e4 460
375906f8
SW
461 /* Ensure the corresponding mm is not marked. */
462 if (current->mm)
463 current->mm->context.ia32_compat = 0;
464
1da177e4
LT
465 /* TBD: overwrites user setup. Should have two bits.
466 But 64bit processes have always behaved this way,
467 so it's not too bad. The main problem is just that
6612538c 468 32bit childs are affected again. */
1da177e4
LT
469 current->personality &= ~READ_IMPLIES_EXEC;
470}
471
d1a797f3 472void set_personality_ia32(bool x32)
05d43ed8
PA
473{
474 /* inherit personality from parent */
475
476 /* Make sure to be in 32bit mode */
6bd33008 477 set_thread_flag(TIF_ADDR32);
05d43ed8 478
375906f8 479 /* Mark the associated mm as containing 32-bit tasks. */
d1a797f3
PA
480 if (x32) {
481 clear_thread_flag(TIF_IA32);
482 set_thread_flag(TIF_X32);
b24dc8da
ON
483 if (current->mm)
484 current->mm->context.ia32_compat = TIF_X32;
d1a797f3 485 current->personality &= ~READ_IMPLIES_EXEC;
ce5f7a99
BP
486 /* is_compat_task() uses the presence of the x32
487 syscall bit flag to determine compat status */
488 current_thread_info()->status &= ~TS_COMPAT;
d1a797f3
PA
489 } else {
490 set_thread_flag(TIF_IA32);
491 clear_thread_flag(TIF_X32);
b24dc8da
ON
492 if (current->mm)
493 current->mm->context.ia32_compat = TIF_IA32;
d1a797f3
PA
494 current->personality |= force_personality32;
495 /* Prepare the first "return" to user space */
496 current_thread_info()->status |= TS_COMPAT;
497 }
05d43ed8 498}
febb72a6 499EXPORT_SYMBOL_GPL(set_personality_ia32);
05d43ed8 500
1da177e4
LT
501unsigned long get_wchan(struct task_struct *p)
502{
503 unsigned long stack;
7de08b4e 504 u64 fp, ip;
1da177e4
LT
505 int count = 0;
506
7de08b4e
GP
507 if (!p || p == current || p->state == TASK_RUNNING)
508 return 0;
57eafdc2 509 stack = (unsigned long)task_stack_page(p);
e1e23bb0 510 if (p->thread.sp < stack || p->thread.sp >= stack+THREAD_SIZE)
1da177e4 511 return 0;
faca6227 512 fp = *(u64 *)(p->thread.sp);
7de08b4e 513 do {
a88cde13 514 if (fp < (unsigned long)stack ||
e1e23bb0 515 fp >= (unsigned long)stack+THREAD_SIZE)
7de08b4e 516 return 0;
65ea5b03
PA
517 ip = *(u64 *)(fp+8);
518 if (!in_sched_functions(ip))
519 return ip;
7de08b4e
GP
520 fp = *(u64 *)fp;
521 } while (count++ < 16);
1da177e4
LT
522 return 0;
523}
524
525long do_arch_prctl(struct task_struct *task, int code, unsigned long addr)
7de08b4e
GP
526{
527 int ret = 0;
1da177e4
LT
528 int doit = task == current;
529 int cpu;
530
7de08b4e 531 switch (code) {
1da177e4 532 case ARCH_SET_GS:
84929801 533 if (addr >= TASK_SIZE_OF(task))
7de08b4e 534 return -EPERM;
1da177e4 535 cpu = get_cpu();
7de08b4e 536 /* handle small bases via the GDT because that's faster to
1da177e4 537 switch. */
7de08b4e
GP
538 if (addr <= 0xffffffff) {
539 set_32bit_tls(task, GS_TLS, addr);
540 if (doit) {
1da177e4 541 load_TLS(&task->thread, cpu);
7de08b4e 542 load_gs_index(GS_TLS_SEL);
1da177e4 543 }
7de08b4e 544 task->thread.gsindex = GS_TLS_SEL;
1da177e4 545 task->thread.gs = 0;
7de08b4e 546 } else {
1da177e4
LT
547 task->thread.gsindex = 0;
548 task->thread.gs = addr;
549 if (doit) {
a88cde13 550 load_gs_index(0);
715c85b1 551 ret = wrmsrl_safe(MSR_KERNEL_GS_BASE, addr);
7de08b4e 552 }
1da177e4
LT
553 }
554 put_cpu();
555 break;
556 case ARCH_SET_FS:
557 /* Not strictly needed for fs, but do it for symmetry
558 with gs */
84929801 559 if (addr >= TASK_SIZE_OF(task))
6612538c 560 return -EPERM;
1da177e4 561 cpu = get_cpu();
6612538c 562 /* handle small bases via the GDT because that's faster to
1da177e4 563 switch. */
6612538c 564 if (addr <= 0xffffffff) {
1da177e4 565 set_32bit_tls(task, FS_TLS, addr);
6612538c
HS
566 if (doit) {
567 load_TLS(&task->thread, cpu);
ada85708 568 loadsegment(fs, FS_TLS_SEL);
1da177e4
LT
569 }
570 task->thread.fsindex = FS_TLS_SEL;
571 task->thread.fs = 0;
6612538c 572 } else {
1da177e4
LT
573 task->thread.fsindex = 0;
574 task->thread.fs = addr;
575 if (doit) {
576 /* set the selector to 0 to not confuse
577 __switch_to */
ada85708 578 loadsegment(fs, 0);
715c85b1 579 ret = wrmsrl_safe(MSR_FS_BASE, addr);
1da177e4
LT
580 }
581 }
582 put_cpu();
583 break;
6612538c
HS
584 case ARCH_GET_FS: {
585 unsigned long base;
1da177e4
LT
586 if (task->thread.fsindex == FS_TLS_SEL)
587 base = read_32bit_tls(task, FS_TLS);
a88cde13 588 else if (doit)
1da177e4 589 rdmsrl(MSR_FS_BASE, base);
a88cde13 590 else
1da177e4 591 base = task->thread.fs;
6612538c
HS
592 ret = put_user(base, (unsigned long __user *)addr);
593 break;
1da177e4 594 }
6612538c 595 case ARCH_GET_GS: {
1da177e4 596 unsigned long base;
97c2803c 597 unsigned gsindex;
1da177e4
LT
598 if (task->thread.gsindex == GS_TLS_SEL)
599 base = read_32bit_tls(task, GS_TLS);
97c2803c 600 else if (doit) {
ada85708 601 savesegment(gs, gsindex);
97c2803c
JB
602 if (gsindex)
603 rdmsrl(MSR_KERNEL_GS_BASE, base);
604 else
605 base = task->thread.gs;
7de08b4e 606 } else
1da177e4 607 base = task->thread.gs;
6612538c 608 ret = put_user(base, (unsigned long __user *)addr);
1da177e4
LT
609 break;
610 }
611
612 default:
613 ret = -EINVAL;
614 break;
6612538c 615 }
1da177e4 616
6612538c
HS
617 return ret;
618}
1da177e4
LT
619
620long sys_arch_prctl(int code, unsigned long addr)
621{
622 return do_arch_prctl(current, code, addr);
1da177e4
LT
623}
624
89240ba0
SS
625unsigned long KSTK_ESP(struct task_struct *task)
626{
263042e4 627 return task_pt_regs(task)->sp;
89240ba0 628}