tls.c 9.0 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388
  1. /*
  2. * Copyright (C) 2005 Paolo 'Blaisorblade' Giarrusso <blaisorblade@yahoo.it>
  3. * Licensed under the GPL
  4. */
  5. #include "linux/kernel.h"
  6. #include "linux/sched.h"
  7. #include "linux/slab.h"
  8. #include "linux/types.h"
  9. #include "asm/uaccess.h"
  10. #include "asm/ptrace.h"
  11. #include "asm/segment.h"
  12. #include "asm/smp.h"
  13. #include "asm/desc.h"
  14. #include "choose-mode.h"
  15. #include "kern.h"
  16. #include "kern_util.h"
  17. #include "mode_kern.h"
  18. #include "os.h"
  19. #include "mode.h"
  20. #ifdef CONFIG_MODE_SKAS
  21. #include "skas.h"
  22. #endif
  23. /*
  24. * If needed we can detect when it's uninitialized.
  25. *
  26. * These are initialized in an initcall and unchanged thereafter.
  27. */
  28. static int host_supports_tls = -1;
  29. int host_gdt_entry_tls_min;
  30. #ifdef CONFIG_MODE_SKAS
  31. int do_set_thread_area_skas(struct user_desc *info)
  32. {
  33. int ret;
  34. u32 cpu;
  35. cpu = get_cpu();
  36. ret = os_set_thread_area(info, userspace_pid[cpu]);
  37. put_cpu();
  38. return ret;
  39. }
  40. int do_get_thread_area_skas(struct user_desc *info)
  41. {
  42. int ret;
  43. u32 cpu;
  44. cpu = get_cpu();
  45. ret = os_get_thread_area(info, userspace_pid[cpu]);
  46. put_cpu();
  47. return ret;
  48. }
  49. #endif
  50. /*
  51. * sys_get_thread_area: get a yet unused TLS descriptor index.
  52. * XXX: Consider leaving one free slot for glibc usage at first place. This must
  53. * be done here (and by changing GDT_ENTRY_TLS_* macros) and nowhere else.
  54. *
  55. * Also, this must be tested when compiling in SKAS mode with dinamic linking
  56. * and running against NPTL.
  57. */
  58. static int get_free_idx(struct task_struct* task)
  59. {
  60. struct thread_struct *t = &task->thread;
  61. int idx;
  62. if (!t->arch.tls_array)
  63. return GDT_ENTRY_TLS_MIN;
  64. for (idx = 0; idx < GDT_ENTRY_TLS_ENTRIES; idx++)
  65. if (!t->arch.tls_array[idx].present)
  66. return idx + GDT_ENTRY_TLS_MIN;
  67. return -ESRCH;
  68. }
  69. static inline void clear_user_desc(struct user_desc* info)
  70. {
  71. /* Postcondition: LDT_empty(info) returns true. */
  72. memset(info, 0, sizeof(*info));
  73. /* Check the LDT_empty or the i386 sys_get_thread_area code - we obtain
  74. * indeed an empty user_desc.
  75. */
  76. info->read_exec_only = 1;
  77. info->seg_not_present = 1;
  78. }
  79. #define O_FORCE 1
  80. static int load_TLS(int flags, struct task_struct *to)
  81. {
  82. int ret = 0;
  83. int idx;
  84. for (idx = GDT_ENTRY_TLS_MIN; idx < GDT_ENTRY_TLS_MAX; idx++) {
  85. struct uml_tls_struct* curr = &to->thread.arch.tls_array[idx - GDT_ENTRY_TLS_MIN];
  86. /* Actually, now if it wasn't flushed it gets cleared and
  87. * flushed to the host, which will clear it.*/
  88. if (!curr->present) {
  89. if (!curr->flushed) {
  90. clear_user_desc(&curr->tls);
  91. curr->tls.entry_number = idx;
  92. } else {
  93. WARN_ON(!LDT_empty(&curr->tls));
  94. continue;
  95. }
  96. }
  97. if (!(flags & O_FORCE) && curr->flushed)
  98. continue;
  99. ret = do_set_thread_area(&curr->tls);
  100. if (ret)
  101. goto out;
  102. curr->flushed = 1;
  103. }
  104. out:
  105. return ret;
  106. }
  107. /* Verify if we need to do a flush for the new process, i.e. if there are any
  108. * present desc's, only if they haven't been flushed.
  109. */
  110. static inline int needs_TLS_update(struct task_struct *task)
  111. {
  112. int i;
  113. int ret = 0;
  114. for (i = GDT_ENTRY_TLS_MIN; i < GDT_ENTRY_TLS_MAX; i++) {
  115. struct uml_tls_struct* curr = &task->thread.arch.tls_array[i - GDT_ENTRY_TLS_MIN];
  116. /* Can't test curr->present, we may need to clear a descriptor
  117. * which had a value. */
  118. if (curr->flushed)
  119. continue;
  120. ret = 1;
  121. break;
  122. }
  123. return ret;
  124. }
  125. /* On a newly forked process, the TLS descriptors haven't yet been flushed. So
  126. * we mark them as such and the first switch_to will do the job.
  127. */
  128. void clear_flushed_tls(struct task_struct *task)
  129. {
  130. int i;
  131. for (i = GDT_ENTRY_TLS_MIN; i < GDT_ENTRY_TLS_MAX; i++) {
  132. struct uml_tls_struct* curr = &task->thread.arch.tls_array[i - GDT_ENTRY_TLS_MIN];
  133. /* Still correct to do this, if it wasn't present on the host it
  134. * will remain as flushed as it was. */
  135. if (!curr->present)
  136. continue;
  137. curr->flushed = 0;
  138. }
  139. }
  140. /* In SKAS0 mode, currently, multiple guest threads sharing the same ->mm have a
  141. * common host process. So this is needed in SKAS0 too.
  142. *
  143. * However, if each thread had a different host process (and this was discussed
  144. * for SMP support) this won't be needed.
  145. *
  146. * And this will not need be used when (and if) we'll add support to the host
  147. * SKAS patch. */
  148. int arch_switch_tls_skas(struct task_struct *from, struct task_struct *to)
  149. {
  150. if (!host_supports_tls)
  151. return 0;
  152. /* We have no need whatsoever to switch TLS for kernel threads; beyond
  153. * that, that would also result in us calling os_set_thread_area with
  154. * userspace_pid[cpu] == 0, which gives an error. */
  155. if (likely(to->mm))
  156. return load_TLS(O_FORCE, to);
  157. return 0;
  158. }
  159. int arch_switch_tls_tt(struct task_struct *from, struct task_struct *to)
  160. {
  161. if (!host_supports_tls)
  162. return 0;
  163. if (needs_TLS_update(to))
  164. return load_TLS(0, to);
  165. return 0;
  166. }
  167. static int set_tls_entry(struct task_struct* task, struct user_desc *info,
  168. int idx, int flushed)
  169. {
  170. struct thread_struct *t = &task->thread;
  171. if (idx < GDT_ENTRY_TLS_MIN || idx > GDT_ENTRY_TLS_MAX)
  172. return -EINVAL;
  173. t->arch.tls_array[idx - GDT_ENTRY_TLS_MIN].tls = *info;
  174. t->arch.tls_array[idx - GDT_ENTRY_TLS_MIN].present = 1;
  175. t->arch.tls_array[idx - GDT_ENTRY_TLS_MIN].flushed = flushed;
  176. return 0;
  177. }
  178. int arch_copy_tls(struct task_struct *new)
  179. {
  180. struct user_desc info;
  181. int idx, ret = -EFAULT;
  182. if (copy_from_user(&info,
  183. (void __user *) UPT_ESI(&new->thread.regs.regs),
  184. sizeof(info)))
  185. goto out;
  186. ret = -EINVAL;
  187. if (LDT_empty(&info))
  188. goto out;
  189. idx = info.entry_number;
  190. ret = set_tls_entry(new, &info, idx, 0);
  191. out:
  192. return ret;
  193. }
  194. /* XXX: use do_get_thread_area to read the host value? I'm not at all sure! */
  195. static int get_tls_entry(struct task_struct* task, struct user_desc *info, int idx)
  196. {
  197. struct thread_struct *t = &task->thread;
  198. if (!t->arch.tls_array)
  199. goto clear;
  200. if (idx < GDT_ENTRY_TLS_MIN || idx > GDT_ENTRY_TLS_MAX)
  201. return -EINVAL;
  202. if (!t->arch.tls_array[idx - GDT_ENTRY_TLS_MIN].present)
  203. goto clear;
  204. *info = t->arch.tls_array[idx - GDT_ENTRY_TLS_MIN].tls;
  205. out:
  206. /* Temporary debugging check, to make sure that things have been
  207. * flushed. This could be triggered if load_TLS() failed.
  208. */
  209. if (unlikely(task == current && !t->arch.tls_array[idx - GDT_ENTRY_TLS_MIN].flushed)) {
  210. printk(KERN_ERR "get_tls_entry: task with pid %d got here "
  211. "without flushed TLS.", current->pid);
  212. }
  213. return 0;
  214. clear:
  215. /* When the TLS entry has not been set, the values read to user in the
  216. * tls_array are 0 (because it's cleared at boot, see
  217. * arch/i386/kernel/head.S:cpu_gdt_table). Emulate that.
  218. */
  219. clear_user_desc(info);
  220. info->entry_number = idx;
  221. goto out;
  222. }
  223. asmlinkage int sys_set_thread_area(struct user_desc __user *user_desc)
  224. {
  225. struct user_desc info;
  226. int idx, ret;
  227. if (!host_supports_tls)
  228. return -ENOSYS;
  229. if (copy_from_user(&info, user_desc, sizeof(info)))
  230. return -EFAULT;
  231. idx = info.entry_number;
  232. if (idx == -1) {
  233. idx = get_free_idx(current);
  234. if (idx < 0)
  235. return idx;
  236. info.entry_number = idx;
  237. /* Tell the user which slot we chose for him.*/
  238. if (put_user(idx, &user_desc->entry_number))
  239. return -EFAULT;
  240. }
  241. ret = CHOOSE_MODE_PROC(do_set_thread_area_tt, do_set_thread_area_skas, &info);
  242. if (ret)
  243. return ret;
  244. return set_tls_entry(current, &info, idx, 1);
  245. }
  246. /*
  247. * Perform set_thread_area on behalf of the traced child.
  248. * Note: error handling is not done on the deferred load, and this differ from
  249. * i386. However the only possible error are caused by bugs.
  250. */
  251. int ptrace_set_thread_area(struct task_struct *child, int idx,
  252. struct user_desc __user *user_desc)
  253. {
  254. struct user_desc info;
  255. if (!host_supports_tls)
  256. return -EIO;
  257. if (copy_from_user(&info, user_desc, sizeof(info)))
  258. return -EFAULT;
  259. return set_tls_entry(child, &info, idx, 0);
  260. }
  261. asmlinkage int sys_get_thread_area(struct user_desc __user *user_desc)
  262. {
  263. struct user_desc info;
  264. int idx, ret;
  265. if (!host_supports_tls)
  266. return -ENOSYS;
  267. if (get_user(idx, &user_desc->entry_number))
  268. return -EFAULT;
  269. ret = get_tls_entry(current, &info, idx);
  270. if (ret < 0)
  271. goto out;
  272. if (copy_to_user(user_desc, &info, sizeof(info)))
  273. ret = -EFAULT;
  274. out:
  275. return ret;
  276. }
  277. /*
  278. * Perform get_thread_area on behalf of the traced child.
  279. */
  280. int ptrace_get_thread_area(struct task_struct *child, int idx,
  281. struct user_desc __user *user_desc)
  282. {
  283. struct user_desc info;
  284. int ret;
  285. if (!host_supports_tls)
  286. return -EIO;
  287. ret = get_tls_entry(child, &info, idx);
  288. if (ret < 0)
  289. goto out;
  290. if (copy_to_user(user_desc, &info, sizeof(info)))
  291. ret = -EFAULT;
  292. out:
  293. return ret;
  294. }
  295. /* XXX: This part is probably common to i386 and x86-64. Don't create a common
  296. * file for now, do that when implementing x86-64 support.*/
  297. static int __init __setup_host_supports_tls(void)
  298. {
  299. check_host_supports_tls(&host_supports_tls, &host_gdt_entry_tls_min);
  300. if (host_supports_tls) {
  301. printk(KERN_INFO "Host TLS support detected\n");
  302. printk(KERN_INFO "Detected host type: ");
  303. switch (host_gdt_entry_tls_min) {
  304. case GDT_ENTRY_TLS_MIN_I386:
  305. printk("i386\n");
  306. break;
  307. case GDT_ENTRY_TLS_MIN_X86_64:
  308. printk("x86_64\n");
  309. break;
  310. }
  311. } else
  312. printk(KERN_ERR " Host TLS support NOT detected! "
  313. "TLS support inside UML will not work\n");
  314. return 0;
  315. }
  316. __initcall(__setup_host_supports_tls);