blob: 250e4c4ac6d93ae7c1d6b5e07ffacf8363306883 [file] [log] [blame]
Thomas Gleixner457c8992019-05-19 13:08:55 +01001// SPDX-License-Identifier: GPL-2.0-only
Linus Torvalds1da177e2005-04-16 15:20:36 -07002/*
Linus Torvalds1da177e2005-04-16 15:20:36 -07003 * Copyright (C) 1995 Linus Torvalds
4 *
5 * Pentium III FXSR, SSE support
6 * Gareth Hughes <gareth@valinux.com>, May 2000
Hiroshi Shimamoto66125382008-01-30 13:31:03 +01007 *
Linus Torvalds1da177e2005-04-16 15:20:36 -07008 * X86-64 port
9 * Andi Kleen.
Ashok Raj76e4f662005-06-25 14:55:00 -070010 *
11 * CPU hotplug support - ashok.raj@intel.com
Linus Torvalds1da177e2005-04-16 15:20:36 -070012 */
13
14/*
15 * This file handles the architecture-dependent parts of process handling..
16 */
17
Ashok Raj76e4f662005-06-25 14:55:00 -070018#include <linux/cpu.h>
Linus Torvalds1da177e2005-04-16 15:20:36 -070019#include <linux/errno.h>
20#include <linux/sched.h>
Ingo Molnar29930022017-02-08 18:51:36 +010021#include <linux/sched/task.h>
Ingo Molnar68db0cf2017-02-08 18:51:37 +010022#include <linux/sched/task_stack.h>
Hiroshi Shimamoto66125382008-01-30 13:31:03 +010023#include <linux/fs.h>
Linus Torvalds1da177e2005-04-16 15:20:36 -070024#include <linux/kernel.h>
25#include <linux/mm.h>
26#include <linux/elfcore.h>
27#include <linux/smp.h>
28#include <linux/slab.h>
29#include <linux/user.h>
Linus Torvalds1da177e2005-04-16 15:20:36 -070030#include <linux/interrupt.h>
Hiroshi Shimamoto66125382008-01-30 13:31:03 +010031#include <linux/delay.h>
Paul Gortmaker186f4362016-07-13 20:18:56 -040032#include <linux/export.h>
Hiroshi Shimamoto66125382008-01-30 13:31:03 +010033#include <linux/ptrace.h>
Andi Kleen95833c82006-01-11 22:44:36 +010034#include <linux/notifier.h>
bibo maoc6fd91f2006-03-26 01:38:20 -080035#include <linux/kprobes.h>
Christoph Hellwig1eeb66a2007-05-08 00:27:03 -070036#include <linux/kdebug.h>
Erik Bosman529e25f2008-04-14 00:24:18 +020037#include <linux/prctl.h>
Gustavo F. Padovan7de08b42008-07-29 02:48:51 -030038#include <linux/uaccess.h>
39#include <linux/io.h>
Frederic Weisbecker8b96f012008-12-06 03:40:00 +010040#include <linux/ftrace.h>
Kyle Hueyff3f0972017-03-20 01:16:21 -070041#include <linux/syscalls.h>
Linus Torvalds1da177e2005-04-16 15:20:36 -070042
Linus Torvalds1da177e2005-04-16 15:20:36 -070043#include <asm/pgtable.h>
Linus Torvalds1da177e2005-04-16 15:20:36 -070044#include <asm/processor.h>
Ingo Molnar78f7f1e2015-04-24 02:54:44 +020045#include <asm/fpu/internal.h>
Linus Torvalds1da177e2005-04-16 15:20:36 -070046#include <asm/mmu_context.h>
Linus Torvalds1da177e2005-04-16 15:20:36 -070047#include <asm/prctl.h>
Linus Torvalds1da177e2005-04-16 15:20:36 -070048#include <asm/desc.h>
49#include <asm/proto.h>
50#include <asm/ia32.h>
Jaswinder Singhbbc1f692008-07-21 21:34:13 +053051#include <asm/syscalls.h>
K.Prasad66cb5912009-06-01 23:44:55 +053052#include <asm/debugreg.h>
David Howellsf05e7982012-03-28 18:11:12 +010053#include <asm/switch_to.h>
Andy Lutomirskib7a584592016-03-16 14:14:21 -070054#include <asm/xen/hypervisor.h>
Dmitry Safonov2eefd872016-09-05 16:33:05 +030055#include <asm/vdso.h>
Babu Mogerfa7d9492018-11-21 20:28:25 +000056#include <asm/resctrl_sched.h>
Dmitry Safonovada26482017-03-31 14:11:37 +030057#include <asm/unistd.h>
Chang S. Baeb1378a52018-09-18 16:08:53 -070058#include <asm/fsgsbase.h>
Dmitry Safonovada26482017-03-31 14:11:37 +030059#ifdef CONFIG_IA32_EMULATION
60/* Not included via unistd.h */
61#include <asm/unistd_32_ia32.h>
62#endif
Linus Torvalds1da177e2005-04-16 15:20:36 -070063
Thomas Gleixnerff167012018-11-25 19:33:47 +010064#include "process.h"
65
Hiroshi Shimamoto66125382008-01-30 13:31:03 +010066/* Prints also some state that isn't saved in the pt_regs */
Jann Horn9fe62992018-08-31 21:41:51 +020067void __show_regs(struct pt_regs *regs, enum show_regs_mode mode)
Linus Torvalds1da177e2005-04-16 15:20:36 -070068{
69 unsigned long cr0 = 0L, cr2 = 0L, cr3 = 0L, cr4 = 0L, fs, gs, shadowgs;
Alan Sternbb1995d2007-07-21 17:10:42 +020070 unsigned long d0, d1, d2, d3, d6, d7;
Hiroshi Shimamoto66125382008-01-30 13:31:03 +010071 unsigned int fsindex, gsindex;
Andy Lutomirskid38bc892018-11-21 15:11:24 -080072 unsigned int ds, es;
Linus Torvalds1da177e2005-04-16 15:20:36 -070073
Josh Poimboeufb02fcf92017-12-04 15:07:09 +010074 show_iret_regs(regs);
75
Josh Poimboeuf6fa81a122016-10-20 11:34:45 -050076 if (regs->orig_ax != -1)
77 pr_cont(" ORIG_RAX: %016lx\n", regs->orig_ax);
78 else
79 pr_cont("\n");
80
Pekka Enbergd015a092009-12-28 10:26:59 +020081 printk(KERN_DEFAULT "RAX: %016lx RBX: %016lx RCX: %016lx\n",
H. Peter Anvin65ea5b02008-01-30 13:30:56 +010082 regs->ax, regs->bx, regs->cx);
Pekka Enbergd015a092009-12-28 10:26:59 +020083 printk(KERN_DEFAULT "RDX: %016lx RSI: %016lx RDI: %016lx\n",
H. Peter Anvin65ea5b02008-01-30 13:30:56 +010084 regs->dx, regs->si, regs->di);
Pekka Enbergd015a092009-12-28 10:26:59 +020085 printk(KERN_DEFAULT "RBP: %016lx R08: %016lx R09: %016lx\n",
H. Peter Anvin65ea5b02008-01-30 13:30:56 +010086 regs->bp, regs->r8, regs->r9);
Pekka Enbergd015a092009-12-28 10:26:59 +020087 printk(KERN_DEFAULT "R10: %016lx R11: %016lx R12: %016lx\n",
Gustavo F. Padovan7de08b42008-07-29 02:48:51 -030088 regs->r10, regs->r11, regs->r12);
Pekka Enbergd015a092009-12-28 10:26:59 +020089 printk(KERN_DEFAULT "R13: %016lx R14: %016lx R15: %016lx\n",
Gustavo F. Padovan7de08b42008-07-29 02:48:51 -030090 regs->r13, regs->r14, regs->r15);
Linus Torvalds1da177e2005-04-16 15:20:36 -070091
Jann Horn9fe62992018-08-31 21:41:51 +020092 if (mode == SHOW_REGS_SHORT)
Josh Poimboeufb02fcf92017-12-04 15:07:09 +010093 return;
94
Jann Horn9fe62992018-08-31 21:41:51 +020095 if (mode == SHOW_REGS_USER) {
96 rdmsrl(MSR_FS_BASE, fs);
97 rdmsrl(MSR_KERNEL_GS_BASE, shadowgs);
98 printk(KERN_DEFAULT "FS: %016lx GS: %016lx\n",
99 fs, shadowgs);
100 return;
101 }
102
Gustavo F. Padovan7de08b42008-07-29 02:48:51 -0300103 asm("movl %%ds,%0" : "=r" (ds));
Gustavo F. Padovan7de08b42008-07-29 02:48:51 -0300104 asm("movl %%es,%0" : "=r" (es));
Linus Torvalds1da177e2005-04-16 15:20:36 -0700105 asm("movl %%fs,%0" : "=r" (fsindex));
106 asm("movl %%gs,%0" : "=r" (gsindex));
107
108 rdmsrl(MSR_FS_BASE, fs);
Gustavo F. Padovan7de08b42008-07-29 02:48:51 -0300109 rdmsrl(MSR_GS_BASE, gs);
110 rdmsrl(MSR_KERNEL_GS_BASE, shadowgs);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700111
Glauber de Oliveira Costaf51c9452007-07-22 11:12:29 +0200112 cr0 = read_cr0();
113 cr2 = read_cr2();
Andy Lutomirski6c690ee2017-06-12 10:26:14 -0700114 cr3 = __read_cr3();
Andy Lutomirski1e02ce42014-10-24 15:58:08 -0700115 cr4 = __read_cr4();
Linus Torvalds1da177e2005-04-16 15:20:36 -0700116
Pekka Enbergd015a092009-12-28 10:26:59 +0200117 printk(KERN_DEFAULT "FS: %016lx(%04x) GS:%016lx(%04x) knlGS:%016lx\n",
Gustavo F. Padovan7de08b42008-07-29 02:48:51 -0300118 fs, fsindex, gs, gsindex, shadowgs);
Andy Lutomirskid38bc892018-11-21 15:11:24 -0800119 printk(KERN_DEFAULT "CS: %04lx DS: %04x ES: %04x CR0: %016lx\n", regs->cs, ds,
Gustavo F. Padovan8092c652008-07-29 02:48:52 -0300120 es, cr0);
Pekka Enbergd015a092009-12-28 10:26:59 +0200121 printk(KERN_DEFAULT "CR2: %016lx CR3: %016lx CR4: %016lx\n", cr2, cr3,
Gustavo F. Padovan8092c652008-07-29 02:48:52 -0300122 cr4);
Alan Sternbb1995d2007-07-21 17:10:42 +0200123
124 get_debugreg(d0, 0);
125 get_debugreg(d1, 1);
126 get_debugreg(d2, 2);
Alan Sternbb1995d2007-07-21 17:10:42 +0200127 get_debugreg(d3, 3);
128 get_debugreg(d6, 6);
129 get_debugreg(d7, 7);
Dave Jones43387742013-06-18 12:09:11 -0400130
131 /* Only print out debug registers if they are in their non-default state. */
Nicolas Ioossba6d0182016-09-10 20:30:45 +0200132 if (!((d0 == 0) && (d1 == 0) && (d2 == 0) && (d3 == 0) &&
133 (d6 == DR6_RESERVED) && (d7 == 0x400))) {
134 printk(KERN_DEFAULT "DR0: %016lx DR1: %016lx DR2: %016lx\n",
135 d0, d1, d2);
136 printk(KERN_DEFAULT "DR3: %016lx DR6: %016lx DR7: %016lx\n",
137 d3, d6, d7);
138 }
Dave Jones43387742013-06-18 12:09:11 -0400139
Dave Hansenc0b17b52016-02-12 13:02:25 -0800140 if (boot_cpu_has(X86_FEATURE_OSPKE))
141 printk(KERN_DEFAULT "PKRU: %08x\n", read_pkru());
Linus Torvalds1da177e2005-04-16 15:20:36 -0700142}
143
Linus Torvalds1da177e2005-04-16 15:20:36 -0700144void release_thread(struct task_struct *dead_task)
145{
146 if (dead_task->mm) {
Andy Lutomirskia5b9e5a2015-07-30 14:31:34 -0700147#ifdef CONFIG_MODIFY_LDT_SYSCALL
Andy Lutomirski37868fe2015-07-30 14:31:32 -0700148 if (dead_task->mm->context.ldt) {
Chen Gang349eab62012-11-06 14:45:46 +0800149 pr_warn("WARNING: dead process %s still has LDT? <%p/%d>\n",
Joe Perchesc767a542012-05-21 19:50:07 -0700150 dead_task->comm,
Jan Beulich0d430e32015-12-22 08:42:44 -0700151 dead_task->mm->context.ldt->entries,
Borislav Petkovbbf79d22017-06-06 19:31:16 +0200152 dead_task->mm->context.ldt->nr_entries);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700153 BUG();
154 }
Andy Lutomirskia5b9e5a2015-07-30 14:31:34 -0700155#endif
Linus Torvalds1da177e2005-04-16 15:20:36 -0700156 }
157}
158
Andy Lutomirskie137a4d2017-08-01 07:11:37 -0700159enum which_selector {
160 FS,
161 GS
162};
163
164/*
165 * Saves the FS or GS base for an outgoing thread if FSGSBASE extensions are
166 * not available. The goal is to be reasonably fast on non-FSGSBASE systems.
167 * It's forcibly inlined because it'll generate better code and this function
168 * is hot.
169 */
170static __always_inline void save_base_legacy(struct task_struct *prev_p,
171 unsigned short selector,
172 enum which_selector which)
173{
174 if (likely(selector == 0)) {
175 /*
176 * On Intel (without X86_BUG_NULL_SEG), the segment base could
177 * be the pre-existing saved base or it could be zero. On AMD
178 * (with X86_BUG_NULL_SEG), the segment base could be almost
179 * anything.
180 *
181 * This branch is very hot (it's hit twice on almost every
182 * context switch between 64-bit programs), and avoiding
183 * the RDMSR helps a lot, so we just assume that whatever
184 * value is already saved is correct. This matches historical
185 * Linux behavior, so it won't break existing applications.
186 *
187 * To avoid leaking state, on non-X86_BUG_NULL_SEG CPUs, if we
188 * report that the base is zero, it needs to actually be zero:
189 * see the corresponding logic in load_seg_legacy.
190 */
191 } else {
192 /*
193 * If the selector is 1, 2, or 3, then the base is zero on
194 * !X86_BUG_NULL_SEG CPUs and could be anything on
195 * X86_BUG_NULL_SEG CPUs. In the latter case, Linux
196 * has never attempted to preserve the base across context
197 * switches.
198 *
199 * If selector > 3, then it refers to a real segment, and
200 * saving the base isn't necessary.
201 */
202 if (which == FS)
203 prev_p->thread.fsbase = 0;
204 else
205 prev_p->thread.gsbase = 0;
206 }
207}
208
209static __always_inline void save_fsgs(struct task_struct *task)
210{
211 savesegment(fs, task->thread.fsindex);
212 savesegment(gs, task->thread.gsindex);
213 save_base_legacy(task, task->thread.fsindex, FS);
214 save_base_legacy(task, task->thread.gsindex, GS);
215}
216
Vitaly Kuznetsov42b933b2018-03-13 18:48:04 +0100217#if IS_ENABLED(CONFIG_KVM)
218/*
219 * While a process is running,current->thread.fsbase and current->thread.gsbase
220 * may not match the corresponding CPU registers (see save_base_legacy()). KVM
221 * wants an efficient way to save and restore FSBASE and GSBASE.
222 * When FSGSBASE extensions are enabled, this will have to use RD{FS,GS}BASE.
223 */
224void save_fsgs_for_kvm(void)
225{
226 save_fsgs(current);
227}
228EXPORT_SYMBOL_GPL(save_fsgs_for_kvm);
229#endif
230
Andy Lutomirskie137a4d2017-08-01 07:11:37 -0700231static __always_inline void loadseg(enum which_selector which,
232 unsigned short sel)
233{
234 if (which == FS)
235 loadsegment(fs, sel);
236 else
237 load_gs_index(sel);
238}
239
240static __always_inline void load_seg_legacy(unsigned short prev_index,
241 unsigned long prev_base,
242 unsigned short next_index,
243 unsigned long next_base,
244 enum which_selector which)
245{
246 if (likely(next_index <= 3)) {
247 /*
248 * The next task is using 64-bit TLS, is not using this
249 * segment at all, or is having fun with arcane CPU features.
250 */
251 if (next_base == 0) {
252 /*
253 * Nasty case: on AMD CPUs, we need to forcibly zero
254 * the base.
255 */
256 if (static_cpu_has_bug(X86_BUG_NULL_SEG)) {
257 loadseg(which, __USER_DS);
258 loadseg(which, next_index);
259 } else {
260 /*
261 * We could try to exhaustively detect cases
262 * under which we can skip the segment load,
263 * but there's really only one case that matters
264 * for performance: if both the previous and
265 * next states are fully zeroed, we can skip
266 * the load.
267 *
268 * (This assumes that prev_base == 0 has no
269 * false positives. This is the case on
270 * Intel-style CPUs.)
271 */
272 if (likely(prev_index | next_index | prev_base))
273 loadseg(which, next_index);
274 }
275 } else {
276 if (prev_index != next_index)
277 loadseg(which, next_index);
278 wrmsrl(which == FS ? MSR_FS_BASE : MSR_KERNEL_GS_BASE,
279 next_base);
280 }
281 } else {
282 /*
283 * The next task is using a real segment. Loading the selector
284 * is sufficient.
285 */
286 loadseg(which, next_index);
287 }
288}
289
Chang S. Baef4550b52018-09-18 16:08:56 -0700290static __always_inline void x86_fsgsbase_load(struct thread_struct *prev,
291 struct thread_struct *next)
292{
293 load_seg_legacy(prev->fsindex, prev->fsbase,
294 next->fsindex, next->fsbase, FS);
295 load_seg_legacy(prev->gsindex, prev->gsbase,
296 next->gsindex, next->gsbase, GS);
297}
298
Chang S. Baee696c232018-09-18 16:08:54 -0700299static unsigned long x86_fsgsbase_read_task(struct task_struct *task,
300 unsigned short selector)
Chang S. Baeb1378a52018-09-18 16:08:53 -0700301{
302 unsigned short idx = selector >> 3;
303 unsigned long base;
304
305 if (likely((selector & SEGMENT_TI_MASK) == 0)) {
306 if (unlikely(idx >= GDT_ENTRIES))
307 return 0;
308
309 /*
310 * There are no user segments in the GDT with nonzero bases
311 * other than the TLS segments.
312 */
313 if (idx < GDT_ENTRY_TLS_MIN || idx > GDT_ENTRY_TLS_MAX)
314 return 0;
315
316 idx -= GDT_ENTRY_TLS_MIN;
317 base = get_desc_base(&task->thread.tls_array[idx]);
318 } else {
319#ifdef CONFIG_MODIFY_LDT_SYSCALL
320 struct ldt_struct *ldt;
321
322 /*
323 * If performance here mattered, we could protect the LDT
324 * with RCU. This is a slow path, though, so we can just
325 * take the mutex.
326 */
327 mutex_lock(&task->mm->context.lock);
328 ldt = task->mm->context.ldt;
329 if (unlikely(idx >= ldt->nr_entries))
330 base = 0;
331 else
332 base = get_desc_base(ldt->entries + idx);
333 mutex_unlock(&task->mm->context.lock);
334#else
335 base = 0;
336#endif
337 }
338
339 return base;
340}
341
Chang S. Baeb1378a52018-09-18 16:08:53 -0700342unsigned long x86_fsbase_read_task(struct task_struct *task)
343{
344 unsigned long fsbase;
345
346 if (task == current)
347 fsbase = x86_fsbase_read_cpu();
348 else if (task->thread.fsindex == 0)
349 fsbase = task->thread.fsbase;
350 else
351 fsbase = x86_fsgsbase_read_task(task, task->thread.fsindex);
352
353 return fsbase;
354}
355
356unsigned long x86_gsbase_read_task(struct task_struct *task)
357{
358 unsigned long gsbase;
359
360 if (task == current)
361 gsbase = x86_gsbase_read_cpu_inactive();
362 else if (task->thread.gsindex == 0)
363 gsbase = task->thread.gsbase;
364 else
365 gsbase = x86_fsgsbase_read_task(task, task->thread.gsindex);
366
367 return gsbase;
368}
369
Chang S. Bae87ab4682018-11-26 11:55:24 -0800370void x86_fsbase_write_task(struct task_struct *task, unsigned long fsbase)
Chang S. Baeb1378a52018-09-18 16:08:53 -0700371{
Chang S. Bae87ab4682018-11-26 11:55:24 -0800372 WARN_ON_ONCE(task == current);
Chang S. Baeb1378a52018-09-18 16:08:53 -0700373
Chang S. Baeb1378a52018-09-18 16:08:53 -0700374 task->thread.fsbase = fsbase;
Chang S. Baeb1378a52018-09-18 16:08:53 -0700375}
376
Chang S. Bae87ab4682018-11-26 11:55:24 -0800377void x86_gsbase_write_task(struct task_struct *task, unsigned long gsbase)
Chang S. Baeb1378a52018-09-18 16:08:53 -0700378{
Chang S. Bae87ab4682018-11-26 11:55:24 -0800379 WARN_ON_ONCE(task == current);
Chang S. Baeb1378a52018-09-18 16:08:53 -0700380
Chang S. Baeb1378a52018-09-18 16:08:53 -0700381 task->thread.gsbase = gsbase;
Chang S. Baeb1378a52018-09-18 16:08:53 -0700382}
383
Josh Triplettc1bd55f2015-06-30 15:00:00 -0700384int copy_thread_tls(unsigned long clone_flags, unsigned long sp,
385 unsigned long arg, struct task_struct *p, unsigned long tls)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700386{
387 int err;
Gustavo F. Padovan7de08b42008-07-29 02:48:51 -0300388 struct pt_regs *childregs;
Brian Gerst01003012016-08-13 12:38:19 -0400389 struct fork_frame *fork_frame;
390 struct inactive_task_frame *frame;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700391 struct task_struct *me = current;
392
Al Viro7076aad2012-09-10 16:44:54 -0400393 childregs = task_pt_regs(p);
Brian Gerst01003012016-08-13 12:38:19 -0400394 fork_frame = container_of(childregs, struct fork_frame, regs);
395 frame = &fork_frame->frame;
Peter Zijlstra6690e862019-02-14 10:30:52 +0100396
Brian Gerst01003012016-08-13 12:38:19 -0400397 frame->bp = 0;
398 frame->ret_addr = (unsigned long) ret_from_fork;
399 p->thread.sp = (unsigned long) fork_frame;
K.Prasad66cb5912009-06-01 23:44:55 +0530400 p->thread.io_bitmap_ptr = NULL;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700401
Jeremy Fitzhardingeada85702008-06-25 00:19:00 -0400402 savesegment(gs, p->thread.gsindex);
Andy Lutomirski296f7812016-04-26 12:23:29 -0700403 p->thread.gsbase = p->thread.gsindex ? 0 : me->thread.gsbase;
Jeremy Fitzhardingeada85702008-06-25 00:19:00 -0400404 savesegment(fs, p->thread.fsindex);
Andy Lutomirski296f7812016-04-26 12:23:29 -0700405 p->thread.fsbase = p->thread.fsindex ? 0 : me->thread.fsbase;
Jeremy Fitzhardingeada85702008-06-25 00:19:00 -0400406 savesegment(es, p->thread.es);
407 savesegment(ds, p->thread.ds);
Al Viro7076aad2012-09-10 16:44:54 -0400408 memset(p->thread.ptrace_bps, 0, sizeof(p->thread.ptrace_bps));
409
Al Viro1d4b4b22012-10-22 22:34:11 -0400410 if (unlikely(p->flags & PF_KTHREAD)) {
Al Viro7076aad2012-09-10 16:44:54 -0400411 /* kernel thread */
412 memset(childregs, 0, sizeof(struct pt_regs));
Brian Gerst616d2482016-08-13 12:38:20 -0400413 frame->bx = sp; /* function */
414 frame->r12 = arg;
Al Viro7076aad2012-09-10 16:44:54 -0400415 return 0;
416 }
Brian Gerst616d2482016-08-13 12:38:20 -0400417 frame->bx = 0;
Al Viro1d4b4b22012-10-22 22:34:11 -0400418 *childregs = *current_pt_regs();
Al Viro7076aad2012-09-10 16:44:54 -0400419
420 childregs->ax = 0;
Al Viro1d4b4b22012-10-22 22:34:11 -0400421 if (sp)
422 childregs->sp = sp;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700423
K.Prasad66cb5912009-06-01 23:44:55 +0530424 err = -ENOMEM;
Stephane Eraniand3a4f482006-09-26 10:52:28 +0200425 if (unlikely(test_tsk_thread_flag(me, TIF_IO_BITMAP))) {
Thomas Meyercced4022011-11-17 23:43:40 +0100426 p->thread.io_bitmap_ptr = kmemdup(me->thread.io_bitmap_ptr,
427 IO_BITMAP_BYTES, GFP_KERNEL);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700428 if (!p->thread.io_bitmap_ptr) {
429 p->thread.io_bitmap_max = 0;
430 return -ENOMEM;
431 }
Stephane Eraniand3a4f482006-09-26 10:52:28 +0200432 set_tsk_thread_flag(p, TIF_IO_BITMAP);
Hiroshi Shimamoto66125382008-01-30 13:31:03 +0100433 }
Linus Torvalds1da177e2005-04-16 15:20:36 -0700434
435 /*
436 * Set a new TLS for the child thread?
437 */
438 if (clone_flags & CLONE_SETTLS) {
439#ifdef CONFIG_IA32_EMULATION
Dmitry Safonovabfb9492016-04-18 16:43:43 +0300440 if (in_ia32_syscall())
Roland McGrathefd1ca52008-01-30 13:30:46 +0100441 err = do_set_thread_area(p, -1,
Josh Triplettc1bd55f2015-06-30 15:00:00 -0700442 (struct user_desc __user *)tls, 0);
Gustavo F. Padovan7de08b42008-07-29 02:48:51 -0300443 else
444#endif
Kyle Huey17a6e1b2017-03-20 01:16:22 -0700445 err = do_arch_prctl_64(p, ARCH_SET_FS, tls);
Gustavo F. Padovan7de08b42008-07-29 02:48:51 -0300446 if (err)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700447 goto out;
448 }
449 err = 0;
450out:
451 if (err && p->thread.io_bitmap_ptr) {
452 kfree(p->thread.io_bitmap_ptr);
453 p->thread.io_bitmap_max = 0;
454 }
K.Prasad66cb5912009-06-01 23:44:55 +0530455
Linus Torvalds1da177e2005-04-16 15:20:36 -0700456 return err;
457}
458
H. Peter Anvine634d8f2009-10-09 15:56:53 -0700459static void
460start_thread_common(struct pt_regs *regs, unsigned long new_ip,
461 unsigned long new_sp,
462 unsigned int _cs, unsigned int _ss, unsigned int _ds)
Ingo Molnar513ad842008-02-21 05:18:40 +0100463{
Andy Lutomirski767d0352017-08-01 07:11:34 -0700464 WARN_ON_ONCE(regs != current_pt_regs());
465
466 if (static_cpu_has(X86_BUG_NULL_SEG)) {
467 /* Loading zero below won't clear the base. */
468 loadsegment(fs, __USER_DS);
469 load_gs_index(__USER_DS);
470 }
471
Jeremy Fitzhardingeada85702008-06-25 00:19:00 -0400472 loadsegment(fs, 0);
H. Peter Anvine634d8f2009-10-09 15:56:53 -0700473 loadsegment(es, _ds);
474 loadsegment(ds, _ds);
Ingo Molnar513ad842008-02-21 05:18:40 +0100475 load_gs_index(0);
Andy Lutomirski767d0352017-08-01 07:11:34 -0700476
Ingo Molnar513ad842008-02-21 05:18:40 +0100477 regs->ip = new_ip;
478 regs->sp = new_sp;
H. Peter Anvine634d8f2009-10-09 15:56:53 -0700479 regs->cs = _cs;
480 regs->ss = _ss;
H. Peter Anvina6f05a62009-10-08 18:02:54 -0700481 regs->flags = X86_EFLAGS_IF;
Brian Gerst1daeaa32015-03-21 18:54:21 -0400482 force_iret();
Ingo Molnar513ad842008-02-21 05:18:40 +0100483}
H. Peter Anvine634d8f2009-10-09 15:56:53 -0700484
485void
486start_thread(struct pt_regs *regs, unsigned long new_ip, unsigned long new_sp)
487{
488 start_thread_common(regs, new_ip, new_sp,
489 __USER_CS, __USER_DS, 0);
490}
Rian Hunterdc768032018-08-19 16:08:53 -0700491EXPORT_SYMBOL_GPL(start_thread);
Ingo Molnar513ad842008-02-21 05:18:40 +0100492
Brian Gerst7da77072015-06-22 07:55:13 -0400493#ifdef CONFIG_COMPAT
494void compat_start_thread(struct pt_regs *regs, u32 new_ip, u32 new_sp)
H. Peter Anvina6f05a62009-10-08 18:02:54 -0700495{
H. Peter Anvine634d8f2009-10-09 15:56:53 -0700496 start_thread_common(regs, new_ip, new_sp,
H. Peter Anvind1a797f2012-02-19 10:06:34 -0800497 test_thread_flag(TIF_X32)
498 ? __USER_CS : __USER32_CS,
499 __USER_DS, __USER_DS);
H. Peter Anvina6f05a62009-10-08 18:02:54 -0700500}
501#endif
Stephane Eraniand3a4f482006-09-26 10:52:28 +0200502
Linus Torvalds1da177e2005-04-16 15:20:36 -0700503/*
504 * switch_to(x,y) should switch tasks from x to y.
505 *
Hiroshi Shimamoto66125382008-01-30 13:31:03 +0100506 * This could still be optimized:
Linus Torvalds1da177e2005-04-16 15:20:36 -0700507 * - fold all the options into a flag word and test it with a single test.
508 * - could test fs/gs bitsliced
Andi Kleen099f3182006-02-03 21:51:38 +0100509 *
510 * Kprobes not supported here. Set the probe on schedule instead.
Frederic Weisbecker8b96f012008-12-06 03:40:00 +0100511 * Function graph tracer not supported too.
Linus Torvalds1da177e2005-04-16 15:20:36 -0700512 */
Andi Kleen35ea79032013-08-05 15:02:39 -0700513__visible __notrace_funcgraph struct task_struct *
Andi Kleena88cde12005-11-05 17:25:54 +0100514__switch_to(struct task_struct *prev_p, struct task_struct *next_p)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700515{
Jeremy Fitzhardinge87b935a2008-07-08 15:06:26 -0700516 struct thread_struct *prev = &prev_p->thread;
517 struct thread_struct *next = &next_p->thread;
Ingo Molnar384a23f2015-04-23 17:43:27 +0200518 struct fpu *prev_fpu = &prev->fpu;
519 struct fpu *next_fpu = &next->fpu;
Hiroshi Shimamoto66125382008-01-30 13:31:03 +0100520 int cpu = smp_processor_id();
Arjan van de Vene07e23e2006-09-26 10:52:36 +0200521
Andy Lutomirski1d3e53e2017-07-11 10:33:38 -0500522 WARN_ON_ONCE(IS_ENABLED(CONFIG_DEBUG_ENTRY) &&
523 this_cpu_read(irq_count) != -1);
524
Rik van Riel5f409e22019-04-03 18:41:52 +0200525 if (!test_thread_flag(TIF_NEED_FPU_LOAD))
526 switch_fpu_prepare(prev_fpu, cpu);
Linus Torvalds49030622012-02-16 19:11:15 -0800527
Jeremy Fitzhardinge478de5a2008-06-25 00:19:24 -0400528 /* We must save %fs and %gs before load_TLS() because
529 * %fs and %gs may be cleared by load_TLS().
530 *
531 * (e.g. xen_load_tls())
532 */
Andy Lutomirskie137a4d2017-08-01 07:11:37 -0700533 save_fsgs(prev_p);
Jeremy Fitzhardinge478de5a2008-06-25 00:19:24 -0400534
Andy Lutomirskif647d7c2014-12-08 13:55:20 -0800535 /*
536 * Load TLS before restoring any segments so that segment loads
537 * reference the correct GDT entries.
538 */
Linus Torvalds1da177e2005-04-16 15:20:36 -0700539 load_TLS(next, cpu);
540
Jeremy Fitzhardinge3fe0a632008-06-25 00:19:23 -0400541 /*
Andy Lutomirskif647d7c2014-12-08 13:55:20 -0800542 * Leave lazy mode, flushing any hypercalls made here. This
543 * must be done after loading TLS entries in the GDT but before
Sebastian Andrzej Siewior6dd677a2019-04-03 18:41:31 +0200544 * loading segments that might reference them.
Linus Torvalds1da177e2005-04-16 15:20:36 -0700545 */
Jeremy Fitzhardinge224101e2009-02-18 11:18:57 -0800546 arch_end_context_switch(next_p);
Jeremy Fitzhardinge3fe0a632008-06-25 00:19:23 -0400547
Andy Lutomirskif647d7c2014-12-08 13:55:20 -0800548 /* Switch DS and ES.
549 *
550 * Reading them only returns the selectors, but writing them (if
551 * nonzero) loads the full descriptor from the GDT or LDT. The
552 * LDT for next is loaded in switch_mm, and the GDT is loaded
553 * above.
554 *
555 * We therefore need to write new values to the segment
556 * registers on every context switch unless both the new and old
557 * values are zero.
558 *
559 * Note that we don't need to do anything for CS and SS, as
560 * those are saved and restored as part of pt_regs.
561 */
562 savesegment(es, prev->es);
563 if (unlikely(next->es | prev->es))
564 loadsegment(es, next->es);
565
566 savesegment(ds, prev->ds);
567 if (unlikely(next->ds | prev->ds))
568 loadsegment(ds, next->ds);
569
Chang S. Baef4550b52018-09-18 16:08:56 -0700570 x86_fsgsbase_load(prev, next);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700571
Gustavo F. Padovan7de08b42008-07-29 02:48:51 -0300572 /*
Jan Beulich45948d72006-03-25 16:29:25 +0100573 * Switch the PDA and FPU contexts.
Linus Torvalds1da177e2005-04-16 15:20:36 -0700574 */
Alex Shic6ae41e2012-05-11 15:35:27 +0800575 this_cpu_write(current_task, next_p);
Andy Lutomirski9aaefe72017-12-04 15:07:21 +0100576 this_cpu_write(cpu_current_top_of_stack, task_top_of_stack(next_p));
Andi Kleen18bd0572006-04-20 02:36:45 +0200577
Rik van Riel5f409e22019-04-03 18:41:52 +0200578 switch_fpu_finish(next_fpu);
Sebastian Andrzej Siewior27221462019-04-03 18:41:36 +0200579
Andy Lutomirskibd7dc5a2017-11-02 00:59:09 -0700580 /* Reload sp0. */
Joerg Roedel252e1a02018-07-18 11:40:51 +0200581 update_task_stack(next_p);
Andy Lutomirskib27559a2015-03-06 17:50:18 -0800582
Thomas Gleixnerff167012018-11-25 19:33:47 +0100583 switch_to_extra(prev_p, next_p);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700584
Vitaly Kuznetsov5e57f1d2017-03-14 18:35:38 +0100585#ifdef CONFIG_XEN_PV
Andy Lutomirskib7a584592016-03-16 14:14:21 -0700586 /*
587 * On Xen PV, IOPL bits in pt_regs->flags have no effect, and
588 * current_pt_regs()->flags may not match the current task's
589 * intended IOPL. We need to switch it manually.
590 */
591 if (unlikely(static_cpu_has(X86_FEATURE_XENPV) &&
592 prev->iopl != next->iopl))
593 xen_set_iopl_mask(next->iopl);
594#endif
595
Andy Lutomirski61f01dd2015-04-26 16:47:59 -0700596 if (static_cpu_has_bug(X86_BUG_SYSRET_SS_ATTRS)) {
597 /*
598 * AMD CPUs have a misfeature: SYSRET sets the SS selector but
599 * does not update the cached descriptor. As a result, if we
600 * do SYSRET while SS is NULL, we'll end up in user mode with
601 * SS apparently equal to __USER_DS but actually unusable.
602 *
603 * The straightforward workaround would be to fix it up just
604 * before SYSRET, but that would slow down the system call
605 * fast paths. Instead, we ensure that SS is never NULL in
606 * system call context. We do this by replacing NULL SS
607 * selectors at every context switch. SYSCALL sets up a valid
608 * SS, so the only way to get NULL is to re-enter the kernel
609 * from CPL 3 through an interrupt. Since that can't happen
610 * in the same task as a running syscall, we are guaranteed to
611 * context switch between every interrupt vector entry and a
612 * subsequent SYSRET.
613 *
614 * We read SS first because SS reads are much faster than
615 * writes. Out of caution, we force SS to __KERNEL_DS even if
616 * it previously had a different non-NULL value.
617 */
618 unsigned short ss_sel;
619 savesegment(ss, ss_sel);
620 if (ss_sel != __KERNEL_DS)
621 loadsegment(ss, __KERNEL_DS);
622 }
623
Fenghua Yu4f341a52016-10-28 15:04:48 -0700624 /* Load the Intel cache allocation PQR MSR. */
Babu Moger352940e2018-11-21 20:28:27 +0000625 resctrl_sched_in();
Fenghua Yu4f341a52016-10-28 15:04:48 -0700626
Linus Torvalds1da177e2005-04-16 15:20:36 -0700627 return prev_p;
628}
629
Linus Torvalds1da177e2005-04-16 15:20:36 -0700630void set_personality_64bit(void)
631{
632 /* inherit personality from parent */
633
634 /* Make sure to be in 64bit mode */
Hiroshi Shimamoto66125382008-01-30 13:31:03 +0100635 clear_thread_flag(TIF_IA32);
H. Peter Anvin6bd33002012-02-06 13:03:09 -0800636 clear_thread_flag(TIF_ADDR32);
H. Peter Anvinbb212722012-02-14 13:56:49 -0800637 clear_thread_flag(TIF_X32);
Dmitry Safonovada26482017-03-31 14:11:37 +0300638 /* Pretend that this comes from a 64bit execve */
639 task_pt_regs(current)->orig_ax = __NR_execve;
Dmitry Safonovacf46022018-05-18 00:35:10 +0100640 current_thread_info()->status &= ~TS_COMPAT;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700641
Stephen Wilson375906f2011-03-13 15:49:14 -0400642 /* Ensure the corresponding mm is not marked. */
643 if (current->mm)
644 current->mm->context.ia32_compat = 0;
645
Linus Torvalds1da177e2005-04-16 15:20:36 -0700646 /* TBD: overwrites user setup. Should have two bits.
647 But 64bit processes have always behaved this way,
648 so it's not too bad. The main problem is just that
Ingo Molnara97673a2018-12-03 10:47:34 +0100649 32bit children are affected again. */
Linus Torvalds1da177e2005-04-16 15:20:36 -0700650 current->personality &= ~READ_IMPLIES_EXEC;
651}
652
Dmitry Safonovada26482017-03-31 14:11:37 +0300653static void __set_personality_x32(void)
654{
655#ifdef CONFIG_X86_X32
656 clear_thread_flag(TIF_IA32);
657 set_thread_flag(TIF_X32);
658 if (current->mm)
659 current->mm->context.ia32_compat = TIF_X32;
660 current->personality &= ~READ_IMPLIES_EXEC;
661 /*
Dmitry Safonova8464462018-10-12 14:42:52 +0100662 * in_32bit_syscall() uses the presence of the x32 syscall bit
Dmitry Safonovada26482017-03-31 14:11:37 +0300663 * flag to determine compat status. The x86 mmap() code relies on
664 * the syscall bitness so set x32 syscall bit right here to make
Dmitry Safonova8464462018-10-12 14:42:52 +0100665 * in_32bit_syscall() work during exec().
Dmitry Safonovada26482017-03-31 14:11:37 +0300666 *
667 * Pretend to come from a x32 execve.
668 */
669 task_pt_regs(current)->orig_ax = __NR_x32_execve | __X32_SYSCALL_BIT;
Andy Lutomirski37a8f7c2018-01-28 10:38:50 -0800670 current_thread_info()->status &= ~TS_COMPAT;
Dmitry Safonovada26482017-03-31 14:11:37 +0300671#endif
672}
673
674static void __set_personality_ia32(void)
675{
676#ifdef CONFIG_IA32_EMULATION
677 set_thread_flag(TIF_IA32);
678 clear_thread_flag(TIF_X32);
679 if (current->mm)
680 current->mm->context.ia32_compat = TIF_IA32;
681 current->personality |= force_personality32;
682 /* Prepare the first "return" to user space */
683 task_pt_regs(current)->orig_ax = __NR_ia32_execve;
Andy Lutomirski37a8f7c2018-01-28 10:38:50 -0800684 current_thread_info()->status |= TS_COMPAT;
Dmitry Safonovada26482017-03-31 14:11:37 +0300685#endif
686}
687
H. Peter Anvind1a797f2012-02-19 10:06:34 -0800688void set_personality_ia32(bool x32)
H. Peter Anvin05d43ed2010-01-28 22:14:43 -0800689{
H. Peter Anvin05d43ed2010-01-28 22:14:43 -0800690 /* Make sure to be in 32bit mode */
H. Peter Anvin6bd33002012-02-06 13:03:09 -0800691 set_thread_flag(TIF_ADDR32);
H. Peter Anvin05d43ed2010-01-28 22:14:43 -0800692
Dmitry Safonovada26482017-03-31 14:11:37 +0300693 if (x32)
694 __set_personality_x32();
695 else
696 __set_personality_ia32();
H. Peter Anvin05d43ed2010-01-28 22:14:43 -0800697}
Larry Fingerfebb72a2012-05-06 19:40:03 -0500698EXPORT_SYMBOL_GPL(set_personality_ia32);
H. Peter Anvin05d43ed2010-01-28 22:14:43 -0800699
Ingo Molnar91b7bd32016-09-15 08:42:51 +0200700#ifdef CONFIG_CHECKPOINT_RESTORE
Dmitry Safonov2eefd872016-09-05 16:33:05 +0300701static long prctl_map_vdso(const struct vdso_image *image, unsigned long addr)
702{
703 int ret;
704
705 ret = map_vdso_once(image, addr);
706 if (ret)
707 return ret;
708
709 return (long)image->size;
710}
Ingo Molnar91b7bd32016-09-15 08:42:51 +0200711#endif
Dmitry Safonov2eefd872016-09-05 16:33:05 +0300712
Kyle Huey17a6e1b2017-03-20 01:16:22 -0700713long do_arch_prctl_64(struct task_struct *task, int option, unsigned long arg2)
Gustavo F. Padovan7de08b42008-07-29 02:48:51 -0300714{
715 int ret = 0;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700716
Kyle Hueydd939382017-03-20 01:16:20 -0700717 switch (option) {
Chang S. Baee696c232018-09-18 16:08:54 -0700718 case ARCH_SET_GS: {
Chang S. Bae87ab4682018-11-26 11:55:24 -0800719 if (unlikely(arg2 >= TASK_SIZE_MAX))
720 return -EPERM;
721
722 preempt_disable();
723 /*
724 * ARCH_SET_GS has always overwritten the index
725 * and the base. Zero is the most sensible value
726 * to put in the index, and is the only value that
727 * makes any sense if FSGSBASE is unavailable.
728 */
729 if (task == current) {
730 loadseg(GS, 0);
731 x86_gsbase_write_cpu_inactive(arg2);
732
733 /*
734 * On non-FSGSBASE systems, save_base_legacy() expects
735 * that we also fill in thread.gsbase.
736 */
737 task->thread.gsbase = arg2;
738
739 } else {
740 task->thread.gsindex = 0;
741 x86_gsbase_write_task(task, arg2);
742 }
743 preempt_enable();
Linus Torvalds1da177e2005-04-16 15:20:36 -0700744 break;
Chang S. Baee696c232018-09-18 16:08:54 -0700745 }
746 case ARCH_SET_FS: {
Chang S. Bae87ab4682018-11-26 11:55:24 -0800747 /*
748 * Not strictly needed for %fs, but do it for symmetry
749 * with %gs
750 */
751 if (unlikely(arg2 >= TASK_SIZE_MAX))
752 return -EPERM;
753
754 preempt_disable();
755 /*
756 * Set the selector to 0 for the same reason
757 * as %gs above.
758 */
759 if (task == current) {
760 loadseg(FS, 0);
761 x86_fsbase_write_cpu(arg2);
762
763 /*
764 * On non-FSGSBASE systems, save_base_legacy() expects
765 * that we also fill in thread.fsbase.
766 */
767 task->thread.fsbase = arg2;
768 } else {
769 task->thread.fsindex = 0;
770 x86_fsbase_write_task(task, arg2);
771 }
772 preempt_enable();
Linus Torvalds1da177e2005-04-16 15:20:36 -0700773 break;
Chang S. Baee696c232018-09-18 16:08:54 -0700774 }
Hiroshi Shimamoto66125382008-01-30 13:31:03 +0100775 case ARCH_GET_FS: {
Chang S. Baee696c232018-09-18 16:08:54 -0700776 unsigned long base = x86_fsbase_read_task(task);
Kyle Huey17a6e1b2017-03-20 01:16:22 -0700777
Kyle Huey17a6e1b2017-03-20 01:16:22 -0700778 ret = put_user(base, (unsigned long __user *)arg2);
Hiroshi Shimamoto66125382008-01-30 13:31:03 +0100779 break;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700780 }
Hiroshi Shimamoto66125382008-01-30 13:31:03 +0100781 case ARCH_GET_GS: {
Chang S. Baee696c232018-09-18 16:08:54 -0700782 unsigned long base = x86_gsbase_read_task(task);
Kyle Huey17a6e1b2017-03-20 01:16:22 -0700783
Kyle Huey17a6e1b2017-03-20 01:16:22 -0700784 ret = put_user(base, (unsigned long __user *)arg2);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700785 break;
786 }
787
Dmitry Safonov2eefd872016-09-05 16:33:05 +0300788#ifdef CONFIG_CHECKPOINT_RESTORE
Vinson Lee6e68b082016-09-17 00:51:53 +0000789# ifdef CONFIG_X86_X32_ABI
Dmitry Safonov2eefd872016-09-05 16:33:05 +0300790 case ARCH_MAP_VDSO_X32:
Kyle Huey17a6e1b2017-03-20 01:16:22 -0700791 return prctl_map_vdso(&vdso_image_x32, arg2);
Ingo Molnar91b7bd32016-09-15 08:42:51 +0200792# endif
793# if defined CONFIG_X86_32 || defined CONFIG_IA32_EMULATION
Dmitry Safonov2eefd872016-09-05 16:33:05 +0300794 case ARCH_MAP_VDSO_32:
Kyle Huey17a6e1b2017-03-20 01:16:22 -0700795 return prctl_map_vdso(&vdso_image_32, arg2);
Ingo Molnar91b7bd32016-09-15 08:42:51 +0200796# endif
Dmitry Safonov2eefd872016-09-05 16:33:05 +0300797 case ARCH_MAP_VDSO_64:
Kyle Huey17a6e1b2017-03-20 01:16:22 -0700798 return prctl_map_vdso(&vdso_image_64, arg2);
Dmitry Safonov2eefd872016-09-05 16:33:05 +0300799#endif
800
Linus Torvalds1da177e2005-04-16 15:20:36 -0700801 default:
802 ret = -EINVAL;
803 break;
Hiroshi Shimamoto66125382008-01-30 13:31:03 +0100804 }
Linus Torvalds1da177e2005-04-16 15:20:36 -0700805
Hiroshi Shimamoto66125382008-01-30 13:31:03 +0100806 return ret;
807}
Linus Torvalds1da177e2005-04-16 15:20:36 -0700808
Kyle Huey17a6e1b2017-03-20 01:16:22 -0700809SYSCALL_DEFINE2(arch_prctl, int, option, unsigned long, arg2)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700810{
Kyle Hueyb0b9b012017-03-20 01:16:23 -0700811 long ret;
812
813 ret = do_arch_prctl_64(current, option, arg2);
814 if (ret == -EINVAL)
815 ret = do_arch_prctl_common(current, option, arg2);
816
817 return ret;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700818}
819
Kyle Huey79170fd2017-03-20 01:16:24 -0700820#ifdef CONFIG_IA32_EMULATION
821COMPAT_SYSCALL_DEFINE2(arch_prctl, int, option, unsigned long, arg2)
822{
823 return do_arch_prctl_common(current, option, arg2);
824}
825#endif
826
Stefani Seibold89240ba2009-11-03 10:22:40 +0100827unsigned long KSTK_ESP(struct task_struct *task)
828{
Denys Vlasenko263042e2015-03-09 19:39:23 +0100829 return task_pt_regs(task)->sp;
Stefani Seibold89240ba2009-11-03 10:22:40 +0100830}