tls.c 8.5 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383
  1. /*
  2. * Copyright (C) 2005 Paolo 'Blaisorblade' Giarrusso <blaisorblade@yahoo.it>
  3. * Licensed under the GPL
  4. */
  5. #include "linux/percpu.h"
  6. #include "linux/sched.h"
  7. #include "asm/uaccess.h"
  8. #include "os.h"
  9. #include "skas.h"
  10. #include "sysdep/tls.h"
  11. /*
  12. * If needed we can detect when it's uninitialized.
  13. *
  14. * These are initialized in an initcall and unchanged thereafter.
  15. */
  16. static int host_supports_tls = -1;
  17. int host_gdt_entry_tls_min;
  18. int do_set_thread_area(struct user_desc *info)
  19. {
  20. int ret;
  21. u32 cpu;
  22. cpu = get_cpu();
  23. ret = os_set_thread_area(info, userspace_pid[cpu]);
  24. put_cpu();
  25. return ret;
  26. }
  27. int do_get_thread_area(struct user_desc *info)
  28. {
  29. int ret;
  30. u32 cpu;
  31. cpu = get_cpu();
  32. ret = os_get_thread_area(info, userspace_pid[cpu]);
  33. put_cpu();
  34. return ret;
  35. }
  36. /*
  37. * sys_get_thread_area: get a yet unused TLS descriptor index.
  38. * XXX: Consider leaving one free slot for glibc usage at first place. This must
  39. * be done here (and by changing GDT_ENTRY_TLS_* macros) and nowhere else.
  40. *
  41. * Also, this must be tested when compiling in SKAS mode with dynamic linking
  42. * and running against NPTL.
  43. */
  44. static int get_free_idx(struct task_struct* task)
  45. {
  46. struct thread_struct *t = &task->thread;
  47. int idx;
  48. if (!t->arch.tls_array)
  49. return GDT_ENTRY_TLS_MIN;
  50. for (idx = 0; idx < GDT_ENTRY_TLS_ENTRIES; idx++)
  51. if (!t->arch.tls_array[idx].present)
  52. return idx + GDT_ENTRY_TLS_MIN;
  53. return -ESRCH;
  54. }
  55. static inline void clear_user_desc(struct user_desc* info)
  56. {
  57. /* Postcondition: LDT_empty(info) returns true. */
  58. memset(info, 0, sizeof(*info));
  59. /*
  60. * Check the LDT_empty or the i386 sys_get_thread_area code - we obtain
  61. * indeed an empty user_desc.
  62. */
  63. info->read_exec_only = 1;
  64. info->seg_not_present = 1;
  65. }
  66. #define O_FORCE 1
  67. static int load_TLS(int flags, struct task_struct *to)
  68. {
  69. int ret = 0;
  70. int idx;
  71. for (idx = GDT_ENTRY_TLS_MIN; idx < GDT_ENTRY_TLS_MAX; idx++) {
  72. struct uml_tls_struct* curr =
  73. &to->thread.arch.tls_array[idx - GDT_ENTRY_TLS_MIN];
  74. /*
  75. * Actually, now if it wasn't flushed it gets cleared and
  76. * flushed to the host, which will clear it.
  77. */
  78. if (!curr->present) {
  79. if (!curr->flushed) {
  80. clear_user_desc(&curr->tls);
  81. curr->tls.entry_number = idx;
  82. } else {
  83. WARN_ON(!LDT_empty(&curr->tls));
  84. continue;
  85. }
  86. }
  87. if (!(flags & O_FORCE) && curr->flushed)
  88. continue;
  89. ret = do_set_thread_area(&curr->tls);
  90. if (ret)
  91. goto out;
  92. curr->flushed = 1;
  93. }
  94. out:
  95. return ret;
  96. }
  97. /*
  98. * Verify if we need to do a flush for the new process, i.e. if there are any
  99. * present desc's, only if they haven't been flushed.
  100. */
  101. static inline int needs_TLS_update(struct task_struct *task)
  102. {
  103. int i;
  104. int ret = 0;
  105. for (i = GDT_ENTRY_TLS_MIN; i < GDT_ENTRY_TLS_MAX; i++) {
  106. struct uml_tls_struct* curr =
  107. &task->thread.arch.tls_array[i - GDT_ENTRY_TLS_MIN];
  108. /*
  109. * Can't test curr->present, we may need to clear a descriptor
  110. * which had a value.
  111. */
  112. if (curr->flushed)
  113. continue;
  114. ret = 1;
  115. break;
  116. }
  117. return ret;
  118. }
  119. /*
  120. * On a newly forked process, the TLS descriptors haven't yet been flushed. So
  121. * we mark them as such and the first switch_to will do the job.
  122. */
  123. void clear_flushed_tls(struct task_struct *task)
  124. {
  125. int i;
  126. for (i = GDT_ENTRY_TLS_MIN; i < GDT_ENTRY_TLS_MAX; i++) {
  127. struct uml_tls_struct* curr =
  128. &task->thread.arch.tls_array[i - GDT_ENTRY_TLS_MIN];
  129. /*
  130. * Still correct to do this, if it wasn't present on the host it
  131. * will remain as flushed as it was.
  132. */
  133. if (!curr->present)
  134. continue;
  135. curr->flushed = 0;
  136. }
  137. }
  138. /*
  139. * In SKAS0 mode, currently, multiple guest threads sharing the same ->mm have a
  140. * common host process. So this is needed in SKAS0 too.
  141. *
  142. * However, if each thread had a different host process (and this was discussed
  143. * for SMP support) this won't be needed.
  144. *
  145. * And this will not need be used when (and if) we'll add support to the host
  146. * SKAS patch.
  147. */
  148. int arch_switch_tls(struct task_struct *from, struct task_struct *to)
  149. {
  150. if (!host_supports_tls)
  151. return 0;
  152. /*
  153. * We have no need whatsoever to switch TLS for kernel threads; beyond
  154. * that, that would also result in us calling os_set_thread_area with
  155. * userspace_pid[cpu] == 0, which gives an error.
  156. */
  157. if (likely(to->mm))
  158. return load_TLS(O_FORCE, to);
  159. return 0;
  160. }
  161. static int set_tls_entry(struct task_struct* task, struct user_desc *info,
  162. int idx, int flushed)
  163. {
  164. struct thread_struct *t = &task->thread;
  165. if (idx < GDT_ENTRY_TLS_MIN || idx > GDT_ENTRY_TLS_MAX)
  166. return -EINVAL;
  167. t->arch.tls_array[idx - GDT_ENTRY_TLS_MIN].tls = *info;
  168. t->arch.tls_array[idx - GDT_ENTRY_TLS_MIN].present = 1;
  169. t->arch.tls_array[idx - GDT_ENTRY_TLS_MIN].flushed = flushed;
  170. return 0;
  171. }
  172. int arch_copy_tls(struct task_struct *new)
  173. {
  174. struct user_desc info;
  175. int idx, ret = -EFAULT;
  176. if (copy_from_user(&info,
  177. (void __user *) UPT_ESI(&new->thread.regs.regs),
  178. sizeof(info)))
  179. goto out;
  180. ret = -EINVAL;
  181. if (LDT_empty(&info))
  182. goto out;
  183. idx = info.entry_number;
  184. ret = set_tls_entry(new, &info, idx, 0);
  185. out:
  186. return ret;
  187. }
  188. /* XXX: use do_get_thread_area to read the host value? I'm not at all sure! */
  189. static int get_tls_entry(struct task_struct* task, struct user_desc *info, int idx)
  190. {
  191. struct thread_struct *t = &task->thread;
  192. if (!t->arch.tls_array)
  193. goto clear;
  194. if (idx < GDT_ENTRY_TLS_MIN || idx > GDT_ENTRY_TLS_MAX)
  195. return -EINVAL;
  196. if (!t->arch.tls_array[idx - GDT_ENTRY_TLS_MIN].present)
  197. goto clear;
  198. *info = t->arch.tls_array[idx - GDT_ENTRY_TLS_MIN].tls;
  199. out:
  200. /*
  201. * Temporary debugging check, to make sure that things have been
  202. * flushed. This could be triggered if load_TLS() failed.
  203. */
  204. if (unlikely(task == current &&
  205. !t->arch.tls_array[idx - GDT_ENTRY_TLS_MIN].flushed)) {
  206. printk(KERN_ERR "get_tls_entry: task with pid %d got here "
  207. "without flushed TLS.", current->pid);
  208. }
  209. return 0;
  210. clear:
  211. /*
  212. * When the TLS entry has not been set, the values read to user in the
  213. * tls_array are 0 (because it's cleared at boot, see
  214. * arch/i386/kernel/head.S:cpu_gdt_table). Emulate that.
  215. */
  216. clear_user_desc(info);
  217. info->entry_number = idx;
  218. goto out;
  219. }
  220. asmlinkage int sys_set_thread_area(struct user_desc __user *user_desc)
  221. {
  222. struct user_desc info;
  223. int idx, ret;
  224. if (!host_supports_tls)
  225. return -ENOSYS;
  226. if (copy_from_user(&info, user_desc, sizeof(info)))
  227. return -EFAULT;
  228. idx = info.entry_number;
  229. if (idx == -1) {
  230. idx = get_free_idx(current);
  231. if (idx < 0)
  232. return idx;
  233. info.entry_number = idx;
  234. /* Tell the user which slot we chose for him.*/
  235. if (put_user(idx, &user_desc->entry_number))
  236. return -EFAULT;
  237. }
  238. ret = do_set_thread_area(&info);
  239. if (ret)
  240. return ret;
  241. return set_tls_entry(current, &info, idx, 1);
  242. }
  243. /*
  244. * Perform set_thread_area on behalf of the traced child.
  245. * Note: error handling is not done on the deferred load, and this differ from
  246. * i386. However the only possible error are caused by bugs.
  247. */
  248. int ptrace_set_thread_area(struct task_struct *child, int idx,
  249. struct user_desc __user *user_desc)
  250. {
  251. struct user_desc info;
  252. if (!host_supports_tls)
  253. return -EIO;
  254. if (copy_from_user(&info, user_desc, sizeof(info)))
  255. return -EFAULT;
  256. return set_tls_entry(child, &info, idx, 0);
  257. }
  258. asmlinkage int sys_get_thread_area(struct user_desc __user *user_desc)
  259. {
  260. struct user_desc info;
  261. int idx, ret;
  262. if (!host_supports_tls)
  263. return -ENOSYS;
  264. if (get_user(idx, &user_desc->entry_number))
  265. return -EFAULT;
  266. ret = get_tls_entry(current, &info, idx);
  267. if (ret < 0)
  268. goto out;
  269. if (copy_to_user(user_desc, &info, sizeof(info)))
  270. ret = -EFAULT;
  271. out:
  272. return ret;
  273. }
  274. /*
  275. * Perform get_thread_area on behalf of the traced child.
  276. */
  277. int ptrace_get_thread_area(struct task_struct *child, int idx,
  278. struct user_desc __user *user_desc)
  279. {
  280. struct user_desc info;
  281. int ret;
  282. if (!host_supports_tls)
  283. return -EIO;
  284. ret = get_tls_entry(child, &info, idx);
  285. if (ret < 0)
  286. goto out;
  287. if (copy_to_user(user_desc, &info, sizeof(info)))
  288. ret = -EFAULT;
  289. out:
  290. return ret;
  291. }
  292. /*
  293. * XXX: This part is probably common to i386 and x86-64. Don't create a common
  294. * file for now, do that when implementing x86-64 support.
  295. */
  296. static int __init __setup_host_supports_tls(void)
  297. {
  298. check_host_supports_tls(&host_supports_tls, &host_gdt_entry_tls_min);
  299. if (host_supports_tls) {
  300. printk(KERN_INFO "Host TLS support detected\n");
  301. printk(KERN_INFO "Detected host type: ");
  302. switch (host_gdt_entry_tls_min) {
  303. case GDT_ENTRY_TLS_MIN_I386:
  304. printk("i386\n");
  305. break;
  306. case GDT_ENTRY_TLS_MIN_X86_64:
  307. printk("x86_64\n");
  308. break;
  309. }
  310. } else
  311. printk(KERN_ERR " Host TLS support NOT detected! "
  312. "TLS support inside UML will not work\n");
  313. return 0;
  314. }
  315. __initcall(__setup_host_supports_tls);