blob: 6e789ca1f8412546a183460d65d304b10b1c8bef [file] [log] [blame]
Linus Torvalds1da177e2005-04-16 15:20:36 -07001/*
Linus Torvalds1da177e2005-04-16 15:20:36 -07002 * Copyright (C) 1995 Linus Torvalds
3 *
4 * Pentium III FXSR, SSE support
5 * Gareth Hughes <gareth@valinux.com>, May 2000
Hiroshi Shimamoto66125382008-01-30 13:31:03 +01006 *
Linus Torvalds1da177e2005-04-16 15:20:36 -07007 * X86-64 port
8 * Andi Kleen.
Ashok Raj76e4f662005-06-25 14:55:00 -07009 *
10 * CPU hotplug support - ashok.raj@intel.com
Linus Torvalds1da177e2005-04-16 15:20:36 -070011 */
12
13/*
14 * This file handles the architecture-dependent parts of process handling..
15 */
16
Ashok Raj76e4f662005-06-25 14:55:00 -070017#include <linux/cpu.h>
Linus Torvalds1da177e2005-04-16 15:20:36 -070018#include <linux/errno.h>
19#include <linux/sched.h>
Hiroshi Shimamoto66125382008-01-30 13:31:03 +010020#include <linux/fs.h>
Linus Torvalds1da177e2005-04-16 15:20:36 -070021#include <linux/kernel.h>
22#include <linux/mm.h>
23#include <linux/elfcore.h>
24#include <linux/smp.h>
25#include <linux/slab.h>
26#include <linux/user.h>
Linus Torvalds1da177e2005-04-16 15:20:36 -070027#include <linux/interrupt.h>
Hiroshi Shimamoto66125382008-01-30 13:31:03 +010028#include <linux/delay.h>
29#include <linux/module.h>
30#include <linux/ptrace.h>
Andi Kleen95833c82006-01-11 22:44:36 +010031#include <linux/notifier.h>
bibo maoc6fd91f2006-03-26 01:38:20 -080032#include <linux/kprobes.h>
Christoph Hellwig1eeb66a2007-05-08 00:27:03 -070033#include <linux/kdebug.h>
Erik Bosman529e25f2008-04-14 00:24:18 +020034#include <linux/prctl.h>
Gustavo F. Padovan7de08b42008-07-29 02:48:51 -030035#include <linux/uaccess.h>
36#include <linux/io.h>
Frederic Weisbecker8b96f012008-12-06 03:40:00 +010037#include <linux/ftrace.h>
Linus Torvalds1da177e2005-04-16 15:20:36 -070038
Linus Torvalds1da177e2005-04-16 15:20:36 -070039#include <asm/pgtable.h>
Linus Torvalds1da177e2005-04-16 15:20:36 -070040#include <asm/processor.h>
Ingo Molnar78f7f1e2015-04-24 02:54:44 +020041#include <asm/fpu/internal.h>
Linus Torvalds1da177e2005-04-16 15:20:36 -070042#include <asm/mmu_context.h>
Linus Torvalds1da177e2005-04-16 15:20:36 -070043#include <asm/prctl.h>
Linus Torvalds1da177e2005-04-16 15:20:36 -070044#include <asm/desc.h>
45#include <asm/proto.h>
46#include <asm/ia32.h>
Andi Kleen95833c82006-01-11 22:44:36 +010047#include <asm/idle.h>
Jaswinder Singhbbc1f692008-07-21 21:34:13 +053048#include <asm/syscalls.h>
K.Prasad66cb5912009-06-01 23:44:55 +053049#include <asm/debugreg.h>
David Howellsf05e7982012-03-28 18:11:12 +010050#include <asm/switch_to.h>
Andy Lutomirskib7a584592016-03-16 14:14:21 -070051#include <asm/xen/hypervisor.h>
Linus Torvalds1da177e2005-04-16 15:20:36 -070052
53asmlinkage extern void ret_from_fork(void);
54
Ingo Molnarc38e5032015-03-17 14:42:59 +010055__visible DEFINE_PER_CPU(unsigned long, rsp_scratch);
Linus Torvalds1da177e2005-04-16 15:20:36 -070056
Hiroshi Shimamoto66125382008-01-30 13:31:03 +010057/* Prints also some state that isn't saved in the pt_regs */
Pekka Enberge2ce07c2008-04-03 16:40:48 +030058void __show_regs(struct pt_regs *regs, int all)
Linus Torvalds1da177e2005-04-16 15:20:36 -070059{
60 unsigned long cr0 = 0L, cr2 = 0L, cr3 = 0L, cr4 = 0L, fs, gs, shadowgs;
Alan Sternbb1995d2007-07-21 17:10:42 +020061 unsigned long d0, d1, d2, d3, d6, d7;
Hiroshi Shimamoto66125382008-01-30 13:31:03 +010062 unsigned int fsindex, gsindex;
63 unsigned int ds, cs, es;
Linus Torvalds1da177e2005-04-16 15:20:36 -070064
Pekka Enbergd015a092009-12-28 10:26:59 +020065 printk(KERN_DEFAULT "RIP: %04lx:[<%016lx>] ", regs->cs & 0xffff, regs->ip);
Jiri Slaby5f01c982013-10-25 15:06:58 +020066 printk_address(regs->ip);
Pekka Enbergd015a092009-12-28 10:26:59 +020067 printk(KERN_DEFAULT "RSP: %04lx:%016lx EFLAGS: %08lx\n", regs->ss,
Gustavo F. Padovan8092c652008-07-29 02:48:52 -030068 regs->sp, regs->flags);
Pekka Enbergd015a092009-12-28 10:26:59 +020069 printk(KERN_DEFAULT "RAX: %016lx RBX: %016lx RCX: %016lx\n",
H. Peter Anvin65ea5b02008-01-30 13:30:56 +010070 regs->ax, regs->bx, regs->cx);
Pekka Enbergd015a092009-12-28 10:26:59 +020071 printk(KERN_DEFAULT "RDX: %016lx RSI: %016lx RDI: %016lx\n",
H. Peter Anvin65ea5b02008-01-30 13:30:56 +010072 regs->dx, regs->si, regs->di);
Pekka Enbergd015a092009-12-28 10:26:59 +020073 printk(KERN_DEFAULT "RBP: %016lx R08: %016lx R09: %016lx\n",
H. Peter Anvin65ea5b02008-01-30 13:30:56 +010074 regs->bp, regs->r8, regs->r9);
Pekka Enbergd015a092009-12-28 10:26:59 +020075 printk(KERN_DEFAULT "R10: %016lx R11: %016lx R12: %016lx\n",
Gustavo F. Padovan7de08b42008-07-29 02:48:51 -030076 regs->r10, regs->r11, regs->r12);
Pekka Enbergd015a092009-12-28 10:26:59 +020077 printk(KERN_DEFAULT "R13: %016lx R14: %016lx R15: %016lx\n",
Gustavo F. Padovan7de08b42008-07-29 02:48:51 -030078 regs->r13, regs->r14, regs->r15);
Linus Torvalds1da177e2005-04-16 15:20:36 -070079
Gustavo F. Padovan7de08b42008-07-29 02:48:51 -030080 asm("movl %%ds,%0" : "=r" (ds));
81 asm("movl %%cs,%0" : "=r" (cs));
82 asm("movl %%es,%0" : "=r" (es));
Linus Torvalds1da177e2005-04-16 15:20:36 -070083 asm("movl %%fs,%0" : "=r" (fsindex));
84 asm("movl %%gs,%0" : "=r" (gsindex));
85
86 rdmsrl(MSR_FS_BASE, fs);
Gustavo F. Padovan7de08b42008-07-29 02:48:51 -030087 rdmsrl(MSR_GS_BASE, gs);
88 rdmsrl(MSR_KERNEL_GS_BASE, shadowgs);
Linus Torvalds1da177e2005-04-16 15:20:36 -070089
Pekka Enberge2ce07c2008-04-03 16:40:48 +030090 if (!all)
91 return;
Linus Torvalds1da177e2005-04-16 15:20:36 -070092
Glauber de Oliveira Costaf51c9452007-07-22 11:12:29 +020093 cr0 = read_cr0();
94 cr2 = read_cr2();
95 cr3 = read_cr3();
Andy Lutomirski1e02ce42014-10-24 15:58:08 -070096 cr4 = __read_cr4();
Linus Torvalds1da177e2005-04-16 15:20:36 -070097
Pekka Enbergd015a092009-12-28 10:26:59 +020098 printk(KERN_DEFAULT "FS: %016lx(%04x) GS:%016lx(%04x) knlGS:%016lx\n",
Gustavo F. Padovan7de08b42008-07-29 02:48:51 -030099 fs, fsindex, gs, gsindex, shadowgs);
Pekka Enbergd015a092009-12-28 10:26:59 +0200100 printk(KERN_DEFAULT "CS: %04x DS: %04x ES: %04x CR0: %016lx\n", cs, ds,
Gustavo F. Padovan8092c652008-07-29 02:48:52 -0300101 es, cr0);
Pekka Enbergd015a092009-12-28 10:26:59 +0200102 printk(KERN_DEFAULT "CR2: %016lx CR3: %016lx CR4: %016lx\n", cr2, cr3,
Gustavo F. Padovan8092c652008-07-29 02:48:52 -0300103 cr4);
Alan Sternbb1995d2007-07-21 17:10:42 +0200104
105 get_debugreg(d0, 0);
106 get_debugreg(d1, 1);
107 get_debugreg(d2, 2);
Alan Sternbb1995d2007-07-21 17:10:42 +0200108 get_debugreg(d3, 3);
109 get_debugreg(d6, 6);
110 get_debugreg(d7, 7);
Dave Jones43387742013-06-18 12:09:11 -0400111
112 /* Only print out debug registers if they are in their non-default state. */
113 if ((d0 == 0) && (d1 == 0) && (d2 == 0) && (d3 == 0) &&
114 (d6 == DR6_RESERVED) && (d7 == 0x400))
115 return;
116
117 printk(KERN_DEFAULT "DR0: %016lx DR1: %016lx DR2: %016lx\n", d0, d1, d2);
Pekka Enbergd015a092009-12-28 10:26:59 +0200118 printk(KERN_DEFAULT "DR3: %016lx DR6: %016lx DR7: %016lx\n", d3, d6, d7);
Dave Jones43387742013-06-18 12:09:11 -0400119
Dave Hansenc0b17b52016-02-12 13:02:25 -0800120 if (boot_cpu_has(X86_FEATURE_OSPKE))
121 printk(KERN_DEFAULT "PKRU: %08x\n", read_pkru());
Linus Torvalds1da177e2005-04-16 15:20:36 -0700122}
123
Linus Torvalds1da177e2005-04-16 15:20:36 -0700124void release_thread(struct task_struct *dead_task)
125{
126 if (dead_task->mm) {
Andy Lutomirskia5b9e5a2015-07-30 14:31:34 -0700127#ifdef CONFIG_MODIFY_LDT_SYSCALL
Andy Lutomirski37868fe2015-07-30 14:31:32 -0700128 if (dead_task->mm->context.ldt) {
Chen Gang349eab62012-11-06 14:45:46 +0800129 pr_warn("WARNING: dead process %s still has LDT? <%p/%d>\n",
Joe Perchesc767a542012-05-21 19:50:07 -0700130 dead_task->comm,
Jan Beulich0d430e32015-12-22 08:42:44 -0700131 dead_task->mm->context.ldt->entries,
Andy Lutomirski37868fe2015-07-30 14:31:32 -0700132 dead_task->mm->context.ldt->size);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700133 BUG();
134 }
Andy Lutomirskia5b9e5a2015-07-30 14:31:34 -0700135#endif
Linus Torvalds1da177e2005-04-16 15:20:36 -0700136 }
137}
138
Josh Triplettc1bd55f2015-06-30 15:00:00 -0700139int copy_thread_tls(unsigned long clone_flags, unsigned long sp,
140 unsigned long arg, struct task_struct *p, unsigned long tls)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700141{
142 int err;
Gustavo F. Padovan7de08b42008-07-29 02:48:51 -0300143 struct pt_regs *childregs;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700144 struct task_struct *me = current;
145
Al Viro7076aad2012-09-10 16:44:54 -0400146 p->thread.sp0 = (unsigned long)task_stack_page(p) + THREAD_SIZE;
147 childregs = task_pt_regs(p);
H. Peter Anvinfaca6222008-01-30 13:31:02 +0100148 p->thread.sp = (unsigned long) childregs;
Al Viroe4f17c42006-01-12 01:05:38 -0800149 set_tsk_thread_flag(p, TIF_FORK);
K.Prasad66cb5912009-06-01 23:44:55 +0530150 p->thread.io_bitmap_ptr = NULL;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700151
Jeremy Fitzhardingeada85702008-06-25 00:19:00 -0400152 savesegment(gs, p->thread.gsindex);
Andy Lutomirski296f7812016-04-26 12:23:29 -0700153 p->thread.gsbase = p->thread.gsindex ? 0 : me->thread.gsbase;
Jeremy Fitzhardingeada85702008-06-25 00:19:00 -0400154 savesegment(fs, p->thread.fsindex);
Andy Lutomirski296f7812016-04-26 12:23:29 -0700155 p->thread.fsbase = p->thread.fsindex ? 0 : me->thread.fsbase;
Jeremy Fitzhardingeada85702008-06-25 00:19:00 -0400156 savesegment(es, p->thread.es);
157 savesegment(ds, p->thread.ds);
Al Viro7076aad2012-09-10 16:44:54 -0400158 memset(p->thread.ptrace_bps, 0, sizeof(p->thread.ptrace_bps));
159
Al Viro1d4b4b22012-10-22 22:34:11 -0400160 if (unlikely(p->flags & PF_KTHREAD)) {
Al Viro7076aad2012-09-10 16:44:54 -0400161 /* kernel thread */
162 memset(childregs, 0, sizeof(struct pt_regs));
163 childregs->sp = (unsigned long)childregs;
164 childregs->ss = __KERNEL_DS;
165 childregs->bx = sp; /* function */
166 childregs->bp = arg;
167 childregs->orig_ax = -1;
168 childregs->cs = __KERNEL_CS | get_kernel_rpl();
H. Peter Anvin1adfa762013-04-27 16:10:11 -0700169 childregs->flags = X86_EFLAGS_IF | X86_EFLAGS_FIXED;
Al Viro7076aad2012-09-10 16:44:54 -0400170 return 0;
171 }
Al Viro1d4b4b22012-10-22 22:34:11 -0400172 *childregs = *current_pt_regs();
Al Viro7076aad2012-09-10 16:44:54 -0400173
174 childregs->ax = 0;
Al Viro1d4b4b22012-10-22 22:34:11 -0400175 if (sp)
176 childregs->sp = sp;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700177
K.Prasad66cb5912009-06-01 23:44:55 +0530178 err = -ENOMEM;
Stephane Eraniand3a4f482006-09-26 10:52:28 +0200179 if (unlikely(test_tsk_thread_flag(me, TIF_IO_BITMAP))) {
Thomas Meyercced4022011-11-17 23:43:40 +0100180 p->thread.io_bitmap_ptr = kmemdup(me->thread.io_bitmap_ptr,
181 IO_BITMAP_BYTES, GFP_KERNEL);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700182 if (!p->thread.io_bitmap_ptr) {
183 p->thread.io_bitmap_max = 0;
184 return -ENOMEM;
185 }
Stephane Eraniand3a4f482006-09-26 10:52:28 +0200186 set_tsk_thread_flag(p, TIF_IO_BITMAP);
Hiroshi Shimamoto66125382008-01-30 13:31:03 +0100187 }
Linus Torvalds1da177e2005-04-16 15:20:36 -0700188
189 /*
190 * Set a new TLS for the child thread?
191 */
192 if (clone_flags & CLONE_SETTLS) {
193#ifdef CONFIG_IA32_EMULATION
Dmitry Safonovabfb9492016-04-18 16:43:43 +0300194 if (in_ia32_syscall())
Roland McGrathefd1ca52008-01-30 13:30:46 +0100195 err = do_set_thread_area(p, -1,
Josh Triplettc1bd55f2015-06-30 15:00:00 -0700196 (struct user_desc __user *)tls, 0);
Gustavo F. Padovan7de08b42008-07-29 02:48:51 -0300197 else
198#endif
Josh Triplettc1bd55f2015-06-30 15:00:00 -0700199 err = do_arch_prctl(p, ARCH_SET_FS, tls);
Gustavo F. Padovan7de08b42008-07-29 02:48:51 -0300200 if (err)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700201 goto out;
202 }
203 err = 0;
204out:
205 if (err && p->thread.io_bitmap_ptr) {
206 kfree(p->thread.io_bitmap_ptr);
207 p->thread.io_bitmap_max = 0;
208 }
K.Prasad66cb5912009-06-01 23:44:55 +0530209
Linus Torvalds1da177e2005-04-16 15:20:36 -0700210 return err;
211}
212
H. Peter Anvine634d8f2009-10-09 15:56:53 -0700213static void
214start_thread_common(struct pt_regs *regs, unsigned long new_ip,
215 unsigned long new_sp,
216 unsigned int _cs, unsigned int _ss, unsigned int _ds)
Ingo Molnar513ad842008-02-21 05:18:40 +0100217{
Jeremy Fitzhardingeada85702008-06-25 00:19:00 -0400218 loadsegment(fs, 0);
H. Peter Anvine634d8f2009-10-09 15:56:53 -0700219 loadsegment(es, _ds);
220 loadsegment(ds, _ds);
Ingo Molnar513ad842008-02-21 05:18:40 +0100221 load_gs_index(0);
222 regs->ip = new_ip;
223 regs->sp = new_sp;
H. Peter Anvine634d8f2009-10-09 15:56:53 -0700224 regs->cs = _cs;
225 regs->ss = _ss;
H. Peter Anvina6f05a62009-10-08 18:02:54 -0700226 regs->flags = X86_EFLAGS_IF;
Brian Gerst1daeaa32015-03-21 18:54:21 -0400227 force_iret();
Ingo Molnar513ad842008-02-21 05:18:40 +0100228}
H. Peter Anvine634d8f2009-10-09 15:56:53 -0700229
230void
231start_thread(struct pt_regs *regs, unsigned long new_ip, unsigned long new_sp)
232{
233 start_thread_common(regs, new_ip, new_sp,
234 __USER_CS, __USER_DS, 0);
235}
Ingo Molnar513ad842008-02-21 05:18:40 +0100236
Brian Gerst7da77072015-06-22 07:55:13 -0400237#ifdef CONFIG_COMPAT
238void compat_start_thread(struct pt_regs *regs, u32 new_ip, u32 new_sp)
H. Peter Anvina6f05a62009-10-08 18:02:54 -0700239{
H. Peter Anvine634d8f2009-10-09 15:56:53 -0700240 start_thread_common(regs, new_ip, new_sp,
H. Peter Anvind1a797f2012-02-19 10:06:34 -0800241 test_thread_flag(TIF_X32)
242 ? __USER_CS : __USER32_CS,
243 __USER_DS, __USER_DS);
H. Peter Anvina6f05a62009-10-08 18:02:54 -0700244}
245#endif
Stephane Eraniand3a4f482006-09-26 10:52:28 +0200246
Linus Torvalds1da177e2005-04-16 15:20:36 -0700247/*
248 * switch_to(x,y) should switch tasks from x to y.
249 *
Hiroshi Shimamoto66125382008-01-30 13:31:03 +0100250 * This could still be optimized:
Linus Torvalds1da177e2005-04-16 15:20:36 -0700251 * - fold all the options into a flag word and test it with a single test.
252 * - could test fs/gs bitsliced
Andi Kleen099f3182006-02-03 21:51:38 +0100253 *
254 * Kprobes not supported here. Set the probe on schedule instead.
Frederic Weisbecker8b96f012008-12-06 03:40:00 +0100255 * Function graph tracer not supported too.
Linus Torvalds1da177e2005-04-16 15:20:36 -0700256 */
Andi Kleen35ea79032013-08-05 15:02:39 -0700257__visible __notrace_funcgraph struct task_struct *
Andi Kleena88cde12005-11-05 17:25:54 +0100258__switch_to(struct task_struct *prev_p, struct task_struct *next_p)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700259{
Jeremy Fitzhardinge87b935a2008-07-08 15:06:26 -0700260 struct thread_struct *prev = &prev_p->thread;
261 struct thread_struct *next = &next_p->thread;
Ingo Molnar384a23f2015-04-23 17:43:27 +0200262 struct fpu *prev_fpu = &prev->fpu;
263 struct fpu *next_fpu = &next->fpu;
Hiroshi Shimamoto66125382008-01-30 13:31:03 +0100264 int cpu = smp_processor_id();
Andy Lutomirski24933b82015-03-05 19:19:05 -0800265 struct tss_struct *tss = &per_cpu(cpu_tss, cpu);
Andy Lutomirski3e2b68d2016-04-07 17:31:47 -0700266 unsigned prev_fsindex, prev_gsindex;
Ingo Molnar384a23f2015-04-23 17:43:27 +0200267 fpu_switch_t fpu_switch;
Arjan van de Vene07e23e2006-09-26 10:52:36 +0200268
Ingo Molnar384a23f2015-04-23 17:43:27 +0200269 fpu_switch = switch_fpu_prepare(prev_fpu, next_fpu, cpu);
Linus Torvalds49030622012-02-16 19:11:15 -0800270
Jeremy Fitzhardinge478de5a2008-06-25 00:19:24 -0400271 /* We must save %fs and %gs before load_TLS() because
272 * %fs and %gs may be cleared by load_TLS().
273 *
274 * (e.g. xen_load_tls())
275 */
Andy Lutomirski3e2b68d2016-04-07 17:31:47 -0700276 savesegment(fs, prev_fsindex);
277 savesegment(gs, prev_gsindex);
Jeremy Fitzhardinge478de5a2008-06-25 00:19:24 -0400278
Andy Lutomirskif647d7c2014-12-08 13:55:20 -0800279 /*
280 * Load TLS before restoring any segments so that segment loads
281 * reference the correct GDT entries.
282 */
Linus Torvalds1da177e2005-04-16 15:20:36 -0700283 load_TLS(next, cpu);
284
Jeremy Fitzhardinge3fe0a632008-06-25 00:19:23 -0400285 /*
Andy Lutomirskif647d7c2014-12-08 13:55:20 -0800286 * Leave lazy mode, flushing any hypercalls made here. This
287 * must be done after loading TLS entries in the GDT but before
288 * loading segments that might reference them, and and it must
Ingo Molnar3a0aee42015-04-22 13:16:47 +0200289 * be done before fpu__restore(), so the TS bit is up to
Andy Lutomirskif647d7c2014-12-08 13:55:20 -0800290 * date.
Linus Torvalds1da177e2005-04-16 15:20:36 -0700291 */
Jeremy Fitzhardinge224101e2009-02-18 11:18:57 -0800292 arch_end_context_switch(next_p);
Jeremy Fitzhardinge3fe0a632008-06-25 00:19:23 -0400293
Andy Lutomirskif647d7c2014-12-08 13:55:20 -0800294 /* Switch DS and ES.
295 *
296 * Reading them only returns the selectors, but writing them (if
297 * nonzero) loads the full descriptor from the GDT or LDT. The
298 * LDT for next is loaded in switch_mm, and the GDT is loaded
299 * above.
300 *
301 * We therefore need to write new values to the segment
302 * registers on every context switch unless both the new and old
303 * values are zero.
304 *
305 * Note that we don't need to do anything for CS and SS, as
306 * those are saved and restored as part of pt_regs.
307 */
308 savesegment(es, prev->es);
309 if (unlikely(next->es | prev->es))
310 loadsegment(es, next->es);
311
312 savesegment(ds, prev->ds);
313 if (unlikely(next->ds | prev->ds))
314 loadsegment(ds, next->ds);
315
Gustavo F. Padovan7de08b42008-07-29 02:48:51 -0300316 /*
Linus Torvalds1da177e2005-04-16 15:20:36 -0700317 * Switch FS and GS.
Jeremy Fitzhardinge87b935a2008-07-08 15:06:26 -0700318 *
Chuck Ebbert558a65b2015-10-14 14:31:19 -0400319 * These are even more complicated than DS and ES: they have
Andy Lutomirski3e2b68d2016-04-07 17:31:47 -0700320 * 64-bit bases are that controlled by arch_prctl. The bases
321 * don't necessarily match the selectors, as user code can do
322 * any number of things to cause them to be inconsistent.
Andy Lutomirskif647d7c2014-12-08 13:55:20 -0800323 *
Andy Lutomirski3e2b68d2016-04-07 17:31:47 -0700324 * We don't promise to preserve the bases if the selectors are
325 * nonzero. We also don't promise to preserve the base if the
326 * selector is zero and the base doesn't match whatever was
327 * most recently passed to ARCH_SET_FS/GS. (If/when the
328 * FSGSBASE instructions are enabled, we'll need to offer
329 * stronger guarantees.)
Andy Lutomirskif647d7c2014-12-08 13:55:20 -0800330 *
Andy Lutomirski3e2b68d2016-04-07 17:31:47 -0700331 * As an invariant,
Andy Lutomirski296f7812016-04-26 12:23:29 -0700332 * (fsbase != 0 && fsindex != 0) || (gsbase != 0 && gsindex != 0) is
Andy Lutomirski3e2b68d2016-04-07 17:31:47 -0700333 * impossible.
Linus Torvalds1da177e2005-04-16 15:20:36 -0700334 */
Andy Lutomirski3e2b68d2016-04-07 17:31:47 -0700335 if (next->fsindex) {
336 /* Loading a nonzero value into FS sets the index and base. */
Jeremy Fitzhardinge87b935a2008-07-08 15:06:26 -0700337 loadsegment(fs, next->fsindex);
Andy Lutomirski3e2b68d2016-04-07 17:31:47 -0700338 } else {
Andy Lutomirski296f7812016-04-26 12:23:29 -0700339 if (next->fsbase) {
Andy Lutomirski3e2b68d2016-04-07 17:31:47 -0700340 /* Next index is zero but next base is nonzero. */
341 if (prev_fsindex)
342 loadsegment(fs, 0);
Andy Lutomirski296f7812016-04-26 12:23:29 -0700343 wrmsrl(MSR_FS_BASE, next->fsbase);
Andy Lutomirski3e2b68d2016-04-07 17:31:47 -0700344 } else {
345 /* Next base and index are both zero. */
346 if (static_cpu_has_bug(X86_BUG_NULL_SEG)) {
347 /*
348 * We don't know the previous base and can't
349 * find out without RDMSR. Forcibly clear it.
350 */
351 loadsegment(fs, __USER_DS);
352 loadsegment(fs, 0);
353 } else {
354 /*
355 * If the previous index is zero and ARCH_SET_FS
356 * didn't change the base, then the base is
357 * also zero and we don't need to do anything.
358 */
Andy Lutomirski296f7812016-04-26 12:23:29 -0700359 if (prev->fsbase || prev_fsindex)
Andy Lutomirski3e2b68d2016-04-07 17:31:47 -0700360 loadsegment(fs, 0);
361 }
362 }
Linus Torvalds1da177e2005-04-16 15:20:36 -0700363 }
Andy Lutomirski3e2b68d2016-04-07 17:31:47 -0700364 /*
365 * Save the old state and preserve the invariant.
366 * NB: if prev_fsindex == 0, then we can't reliably learn the base
367 * without RDMSR because Intel user code can zero it without telling
368 * us and AMD user code can program any 32-bit value without telling
369 * us.
370 */
371 if (prev_fsindex)
Andy Lutomirski296f7812016-04-26 12:23:29 -0700372 prev->fsbase = 0;
Andy Lutomirski3e2b68d2016-04-07 17:31:47 -0700373 prev->fsindex = prev_fsindex;
Jeremy Fitzhardinge87b935a2008-07-08 15:06:26 -0700374
Andy Lutomirski3e2b68d2016-04-07 17:31:47 -0700375 if (next->gsindex) {
376 /* Loading a nonzero value into GS sets the index and base. */
Jeremy Fitzhardinge87b935a2008-07-08 15:06:26 -0700377 load_gs_index(next->gsindex);
Andy Lutomirski3e2b68d2016-04-07 17:31:47 -0700378 } else {
Andy Lutomirski296f7812016-04-26 12:23:29 -0700379 if (next->gsbase) {
Andy Lutomirski3e2b68d2016-04-07 17:31:47 -0700380 /* Next index is zero but next base is nonzero. */
381 if (prev_gsindex)
382 load_gs_index(0);
Andy Lutomirski296f7812016-04-26 12:23:29 -0700383 wrmsrl(MSR_KERNEL_GS_BASE, next->gsbase);
Andy Lutomirski3e2b68d2016-04-07 17:31:47 -0700384 } else {
385 /* Next base and index are both zero. */
386 if (static_cpu_has_bug(X86_BUG_NULL_SEG)) {
387 /*
388 * We don't know the previous base and can't
389 * find out without RDMSR. Forcibly clear it.
390 *
391 * This contains a pointless SWAPGS pair.
392 * Fixing it would involve an explicit check
393 * for Xen or a new pvop.
394 */
395 load_gs_index(__USER_DS);
396 load_gs_index(0);
397 } else {
398 /*
399 * If the previous index is zero and ARCH_SET_GS
400 * didn't change the base, then the base is
401 * also zero and we don't need to do anything.
402 */
Andy Lutomirski296f7812016-04-26 12:23:29 -0700403 if (prev->gsbase || prev_gsindex)
Andy Lutomirski3e2b68d2016-04-07 17:31:47 -0700404 load_gs_index(0);
405 }
406 }
Linus Torvalds1da177e2005-04-16 15:20:36 -0700407 }
Andy Lutomirski3e2b68d2016-04-07 17:31:47 -0700408 /*
409 * Save the old state and preserve the invariant.
410 * NB: if prev_gsindex == 0, then we can't reliably learn the base
411 * without RDMSR because Intel user code can zero it without telling
412 * us and AMD user code can program any 32-bit value without telling
413 * us.
414 */
415 if (prev_gsindex)
Andy Lutomirski296f7812016-04-26 12:23:29 -0700416 prev->gsbase = 0;
Andy Lutomirski3e2b68d2016-04-07 17:31:47 -0700417 prev->gsindex = prev_gsindex;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700418
Ingo Molnar384a23f2015-04-23 17:43:27 +0200419 switch_fpu_finish(next_fpu, fpu_switch);
Linus Torvalds34ddc812012-02-18 12:56:35 -0800420
Gustavo F. Padovan7de08b42008-07-29 02:48:51 -0300421 /*
Jan Beulich45948d72006-03-25 16:29:25 +0100422 * Switch the PDA and FPU contexts.
Linus Torvalds1da177e2005-04-16 15:20:36 -0700423 */
Alex Shic6ae41e2012-05-11 15:35:27 +0800424 this_cpu_write(current_task, next_p);
Andi Kleen18bd0572006-04-20 02:36:45 +0200425
Andy Lutomirskib27559a2015-03-06 17:50:18 -0800426 /* Reload esp0 and ss1. This changes current_thread_info(). */
427 load_sp0(tss, next);
428
Linus Torvalds1da177e2005-04-16 15:20:36 -0700429 /*
Stephane Eraniand3a4f482006-09-26 10:52:28 +0200430 * Now maybe reload the debug registers and handle I/O bitmaps
Linus Torvalds1da177e2005-04-16 15:20:36 -0700431 */
Markus Metzgereee3af42008-01-30 13:31:09 +0100432 if (unlikely(task_thread_info(next_p)->flags & _TIF_WORK_CTXSW_NEXT ||
433 task_thread_info(prev_p)->flags & _TIF_WORK_CTXSW_PREV))
Stephane Eraniand3a4f482006-09-26 10:52:28 +0200434 __switch_to_xtra(prev_p, next_p, tss);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700435
Andy Lutomirskib7a584592016-03-16 14:14:21 -0700436#ifdef CONFIG_XEN
437 /*
438 * On Xen PV, IOPL bits in pt_regs->flags have no effect, and
439 * current_pt_regs()->flags may not match the current task's
440 * intended IOPL. We need to switch it manually.
441 */
442 if (unlikely(static_cpu_has(X86_FEATURE_XENPV) &&
443 prev->iopl != next->iopl))
444 xen_set_iopl_mask(next->iopl);
445#endif
446
Andy Lutomirski61f01dd2015-04-26 16:47:59 -0700447 if (static_cpu_has_bug(X86_BUG_SYSRET_SS_ATTRS)) {
448 /*
449 * AMD CPUs have a misfeature: SYSRET sets the SS selector but
450 * does not update the cached descriptor. As a result, if we
451 * do SYSRET while SS is NULL, we'll end up in user mode with
452 * SS apparently equal to __USER_DS but actually unusable.
453 *
454 * The straightforward workaround would be to fix it up just
455 * before SYSRET, but that would slow down the system call
456 * fast paths. Instead, we ensure that SS is never NULL in
457 * system call context. We do this by replacing NULL SS
458 * selectors at every context switch. SYSCALL sets up a valid
459 * SS, so the only way to get NULL is to re-enter the kernel
460 * from CPL 3 through an interrupt. Since that can't happen
461 * in the same task as a running syscall, we are guaranteed to
462 * context switch between every interrupt vector entry and a
463 * subsequent SYSRET.
464 *
465 * We read SS first because SS reads are much faster than
466 * writes. Out of caution, we force SS to __KERNEL_DS even if
467 * it previously had a different non-NULL value.
468 */
469 unsigned short ss_sel;
470 savesegment(ss, ss_sel);
471 if (ss_sel != __KERNEL_DS)
472 loadsegment(ss, __KERNEL_DS);
473 }
474
Linus Torvalds1da177e2005-04-16 15:20:36 -0700475 return prev_p;
476}
477
Linus Torvalds1da177e2005-04-16 15:20:36 -0700478void set_personality_64bit(void)
479{
480 /* inherit personality from parent */
481
482 /* Make sure to be in 64bit mode */
Hiroshi Shimamoto66125382008-01-30 13:31:03 +0100483 clear_thread_flag(TIF_IA32);
H. Peter Anvin6bd33002012-02-06 13:03:09 -0800484 clear_thread_flag(TIF_ADDR32);
H. Peter Anvinbb212722012-02-14 13:56:49 -0800485 clear_thread_flag(TIF_X32);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700486
Stephen Wilson375906f2011-03-13 15:49:14 -0400487 /* Ensure the corresponding mm is not marked. */
488 if (current->mm)
489 current->mm->context.ia32_compat = 0;
490
Linus Torvalds1da177e2005-04-16 15:20:36 -0700491 /* TBD: overwrites user setup. Should have two bits.
492 But 64bit processes have always behaved this way,
493 so it's not too bad. The main problem is just that
Hiroshi Shimamoto66125382008-01-30 13:31:03 +0100494 32bit childs are affected again. */
Linus Torvalds1da177e2005-04-16 15:20:36 -0700495 current->personality &= ~READ_IMPLIES_EXEC;
496}
497
H. Peter Anvind1a797f2012-02-19 10:06:34 -0800498void set_personality_ia32(bool x32)
H. Peter Anvin05d43ed2010-01-28 22:14:43 -0800499{
500 /* inherit personality from parent */
501
502 /* Make sure to be in 32bit mode */
H. Peter Anvin6bd33002012-02-06 13:03:09 -0800503 set_thread_flag(TIF_ADDR32);
H. Peter Anvin05d43ed2010-01-28 22:14:43 -0800504
Stephen Wilson375906f2011-03-13 15:49:14 -0400505 /* Mark the associated mm as containing 32-bit tasks. */
H. Peter Anvind1a797f2012-02-19 10:06:34 -0800506 if (x32) {
507 clear_thread_flag(TIF_IA32);
508 set_thread_flag(TIF_X32);
Oleg Nesterovb24dc8d2014-04-19 18:10:09 +0200509 if (current->mm)
510 current->mm->context.ia32_compat = TIF_X32;
H. Peter Anvind1a797f2012-02-19 10:06:34 -0800511 current->personality &= ~READ_IMPLIES_EXEC;
Andy Lutomirskif9701652016-03-22 14:25:27 -0700512 /* in_compat_syscall() uses the presence of the x32
Bobby Powersce5f7a92012-02-25 23:25:38 -0500513 syscall bit flag to determine compat status */
514 current_thread_info()->status &= ~TS_COMPAT;
H. Peter Anvind1a797f2012-02-19 10:06:34 -0800515 } else {
516 set_thread_flag(TIF_IA32);
517 clear_thread_flag(TIF_X32);
Oleg Nesterovb24dc8d2014-04-19 18:10:09 +0200518 if (current->mm)
519 current->mm->context.ia32_compat = TIF_IA32;
H. Peter Anvind1a797f2012-02-19 10:06:34 -0800520 current->personality |= force_personality32;
521 /* Prepare the first "return" to user space */
522 current_thread_info()->status |= TS_COMPAT;
523 }
H. Peter Anvin05d43ed2010-01-28 22:14:43 -0800524}
Larry Fingerfebb72a2012-05-06 19:40:03 -0500525EXPORT_SYMBOL_GPL(set_personality_ia32);
H. Peter Anvin05d43ed2010-01-28 22:14:43 -0800526
Linus Torvalds1da177e2005-04-16 15:20:36 -0700527long do_arch_prctl(struct task_struct *task, int code, unsigned long addr)
Gustavo F. Padovan7de08b42008-07-29 02:48:51 -0300528{
529 int ret = 0;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700530 int doit = task == current;
531 int cpu;
532
Gustavo F. Padovan7de08b42008-07-29 02:48:51 -0300533 switch (code) {
Linus Torvalds1da177e2005-04-16 15:20:36 -0700534 case ARCH_SET_GS:
Andy Lutomirskid696ca02016-05-10 09:18:46 -0700535 if (addr >= TASK_SIZE_MAX)
Gustavo F. Padovan7de08b42008-07-29 02:48:51 -0300536 return -EPERM;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700537 cpu = get_cpu();
Andy Lutomirski731e33e2016-04-26 12:23:28 -0700538 task->thread.gsindex = 0;
Andy Lutomirski296f7812016-04-26 12:23:29 -0700539 task->thread.gsbase = addr;
Andy Lutomirski731e33e2016-04-26 12:23:28 -0700540 if (doit) {
541 load_gs_index(0);
542 ret = wrmsrl_safe(MSR_KERNEL_GS_BASE, addr);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700543 }
Mateusz Guzik4afd0562016-05-10 22:56:43 +0200544 put_cpu();
Linus Torvalds1da177e2005-04-16 15:20:36 -0700545 break;
546 case ARCH_SET_FS:
547 /* Not strictly needed for fs, but do it for symmetry
548 with gs */
Andy Lutomirskid696ca02016-05-10 09:18:46 -0700549 if (addr >= TASK_SIZE_MAX)
Hiroshi Shimamoto66125382008-01-30 13:31:03 +0100550 return -EPERM;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700551 cpu = get_cpu();
Andy Lutomirski731e33e2016-04-26 12:23:28 -0700552 task->thread.fsindex = 0;
Andy Lutomirski296f7812016-04-26 12:23:29 -0700553 task->thread.fsbase = addr;
Andy Lutomirski731e33e2016-04-26 12:23:28 -0700554 if (doit) {
555 /* set the selector to 0 to not confuse __switch_to */
556 loadsegment(fs, 0);
557 ret = wrmsrl_safe(MSR_FS_BASE, addr);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700558 }
559 put_cpu();
560 break;
Hiroshi Shimamoto66125382008-01-30 13:31:03 +0100561 case ARCH_GET_FS: {
562 unsigned long base;
Andy Lutomirskid47b50e2016-04-07 17:31:45 -0700563 if (doit)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700564 rdmsrl(MSR_FS_BASE, base);
Andi Kleena88cde12005-11-05 17:25:54 +0100565 else
Andy Lutomirski296f7812016-04-26 12:23:29 -0700566 base = task->thread.fsbase;
Hiroshi Shimamoto66125382008-01-30 13:31:03 +0100567 ret = put_user(base, (unsigned long __user *)addr);
568 break;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700569 }
Hiroshi Shimamoto66125382008-01-30 13:31:03 +0100570 case ARCH_GET_GS: {
Linus Torvalds1da177e2005-04-16 15:20:36 -0700571 unsigned long base;
Andy Lutomirskid47b50e2016-04-07 17:31:45 -0700572 if (doit)
573 rdmsrl(MSR_KERNEL_GS_BASE, base);
Andy Lutomirskid47b50e2016-04-07 17:31:45 -0700574 else
Andy Lutomirski296f7812016-04-26 12:23:29 -0700575 base = task->thread.gsbase;
Hiroshi Shimamoto66125382008-01-30 13:31:03 +0100576 ret = put_user(base, (unsigned long __user *)addr);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700577 break;
578 }
579
580 default:
581 ret = -EINVAL;
582 break;
Hiroshi Shimamoto66125382008-01-30 13:31:03 +0100583 }
Linus Torvalds1da177e2005-04-16 15:20:36 -0700584
Hiroshi Shimamoto66125382008-01-30 13:31:03 +0100585 return ret;
586}
Linus Torvalds1da177e2005-04-16 15:20:36 -0700587
588long sys_arch_prctl(int code, unsigned long addr)
589{
590 return do_arch_prctl(current, code, addr);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700591}
592
Stefani Seibold89240ba2009-11-03 10:22:40 +0100593unsigned long KSTK_ESP(struct task_struct *task)
594{
Denys Vlasenko263042e2015-03-09 19:39:23 +0100595 return task_pt_regs(task)->sp;
Stefani Seibold89240ba2009-11-03 10:22:40 +0100596}