tls.c 8.9 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397
  1. /*
  2. * Copyright (C) 2005 Paolo 'Blaisorblade' Giarrusso <blaisorblade@yahoo.it>
  3. * Licensed under the GPL
  4. */
  5. #include "linux/percpu.h"
  6. #include "linux/sched.h"
  7. #include "asm/uaccess.h"
  8. #include "os.h"
  9. #include "skas.h"
  10. #include "sysdep/tls.h"
  11. /*
  12. * If needed we can detect when it's uninitialized.
  13. *
  14. * These are initialized in an initcall and unchanged thereafter.
  15. */
  16. static int host_supports_tls = -1;
  17. int host_gdt_entry_tls_min;
  18. int do_set_thread_area(struct user_desc *info)
  19. {
  20. int ret;
  21. u32 cpu;
  22. cpu = get_cpu();
  23. ret = os_set_thread_area(info, userspace_pid[cpu]);
  24. put_cpu();
  25. if (ret)
  26. printk(KERN_ERR "PTRACE_SET_THREAD_AREA failed, err = %d, "
  27. "index = %d\n", ret, info->entry_number);
  28. return ret;
  29. }
  30. int do_get_thread_area(struct user_desc *info)
  31. {
  32. int ret;
  33. u32 cpu;
  34. cpu = get_cpu();
  35. ret = os_get_thread_area(info, userspace_pid[cpu]);
  36. put_cpu();
  37. if (ret)
  38. printk(KERN_ERR "PTRACE_GET_THREAD_AREA failed, err = %d, "
  39. "index = %d\n", ret, info->entry_number);
  40. return ret;
  41. }
  42. /*
  43. * sys_get_thread_area: get a yet unused TLS descriptor index.
  44. * XXX: Consider leaving one free slot for glibc usage at first place. This must
  45. * be done here (and by changing GDT_ENTRY_TLS_* macros) and nowhere else.
  46. *
  47. * Also, this must be tested when compiling in SKAS mode with dynamic linking
  48. * and running against NPTL.
  49. */
  50. static int get_free_idx(struct task_struct* task)
  51. {
  52. struct thread_struct *t = &task->thread;
  53. int idx;
  54. if (!t->arch.tls_array)
  55. return GDT_ENTRY_TLS_MIN;
  56. for (idx = 0; idx < GDT_ENTRY_TLS_ENTRIES; idx++)
  57. if (!t->arch.tls_array[idx].present)
  58. return idx + GDT_ENTRY_TLS_MIN;
  59. return -ESRCH;
  60. }
  61. static inline void clear_user_desc(struct user_desc* info)
  62. {
  63. /* Postcondition: LDT_empty(info) returns true. */
  64. memset(info, 0, sizeof(*info));
  65. /*
  66. * Check the LDT_empty or the i386 sys_get_thread_area code - we obtain
  67. * indeed an empty user_desc.
  68. */
  69. info->read_exec_only = 1;
  70. info->seg_not_present = 1;
  71. }
  72. #define O_FORCE 1
  73. static int load_TLS(int flags, struct task_struct *to)
  74. {
  75. int ret = 0;
  76. int idx;
  77. for (idx = GDT_ENTRY_TLS_MIN; idx < GDT_ENTRY_TLS_MAX; idx++) {
  78. struct uml_tls_struct* curr =
  79. &to->thread.arch.tls_array[idx - GDT_ENTRY_TLS_MIN];
  80. /*
  81. * Actually, now if it wasn't flushed it gets cleared and
  82. * flushed to the host, which will clear it.
  83. */
  84. if (!curr->present) {
  85. if (!curr->flushed) {
  86. clear_user_desc(&curr->tls);
  87. curr->tls.entry_number = idx;
  88. } else {
  89. WARN_ON(!LDT_empty(&curr->tls));
  90. continue;
  91. }
  92. }
  93. if (!(flags & O_FORCE) && curr->flushed)
  94. continue;
  95. ret = do_set_thread_area(&curr->tls);
  96. if (ret)
  97. goto out;
  98. curr->flushed = 1;
  99. }
  100. out:
  101. return ret;
  102. }
  103. /*
  104. * Verify if we need to do a flush for the new process, i.e. if there are any
  105. * present desc's, only if they haven't been flushed.
  106. */
  107. static inline int needs_TLS_update(struct task_struct *task)
  108. {
  109. int i;
  110. int ret = 0;
  111. for (i = GDT_ENTRY_TLS_MIN; i < GDT_ENTRY_TLS_MAX; i++) {
  112. struct uml_tls_struct* curr =
  113. &task->thread.arch.tls_array[i - GDT_ENTRY_TLS_MIN];
  114. /*
  115. * Can't test curr->present, we may need to clear a descriptor
  116. * which had a value.
  117. */
  118. if (curr->flushed)
  119. continue;
  120. ret = 1;
  121. break;
  122. }
  123. return ret;
  124. }
  125. /*
  126. * On a newly forked process, the TLS descriptors haven't yet been flushed. So
  127. * we mark them as such and the first switch_to will do the job.
  128. */
  129. void clear_flushed_tls(struct task_struct *task)
  130. {
  131. int i;
  132. for (i = GDT_ENTRY_TLS_MIN; i < GDT_ENTRY_TLS_MAX; i++) {
  133. struct uml_tls_struct* curr =
  134. &task->thread.arch.tls_array[i - GDT_ENTRY_TLS_MIN];
  135. /*
  136. * Still correct to do this, if it wasn't present on the host it
  137. * will remain as flushed as it was.
  138. */
  139. if (!curr->present)
  140. continue;
  141. curr->flushed = 0;
  142. }
  143. }
  144. /*
  145. * In SKAS0 mode, currently, multiple guest threads sharing the same ->mm have a
  146. * common host process. So this is needed in SKAS0 too.
  147. *
  148. * However, if each thread had a different host process (and this was discussed
  149. * for SMP support) this won't be needed.
  150. *
  151. * And this will not need be used when (and if) we'll add support to the host
  152. * SKAS patch.
  153. */
  154. int arch_switch_tls(struct task_struct *to)
  155. {
  156. if (!host_supports_tls)
  157. return 0;
  158. /*
  159. * We have no need whatsoever to switch TLS for kernel threads; beyond
  160. * that, that would also result in us calling os_set_thread_area with
  161. * userspace_pid[cpu] == 0, which gives an error.
  162. */
  163. if (likely(to->mm))
  164. return load_TLS(O_FORCE, to);
  165. return 0;
  166. }
  167. static int set_tls_entry(struct task_struct* task, struct user_desc *info,
  168. int idx, int flushed)
  169. {
  170. struct thread_struct *t = &task->thread;
  171. if (idx < GDT_ENTRY_TLS_MIN || idx > GDT_ENTRY_TLS_MAX)
  172. return -EINVAL;
  173. t->arch.tls_array[idx - GDT_ENTRY_TLS_MIN].tls = *info;
  174. t->arch.tls_array[idx - GDT_ENTRY_TLS_MIN].present = 1;
  175. t->arch.tls_array[idx - GDT_ENTRY_TLS_MIN].flushed = flushed;
  176. return 0;
  177. }
  178. int arch_copy_tls(struct task_struct *new)
  179. {
  180. struct user_desc info;
  181. int idx, ret = -EFAULT;
  182. if (copy_from_user(&info,
  183. (void __user *) UPT_ESI(&new->thread.regs.regs),
  184. sizeof(info)))
  185. goto out;
  186. ret = -EINVAL;
  187. if (LDT_empty(&info))
  188. goto out;
  189. idx = info.entry_number;
  190. ret = set_tls_entry(new, &info, idx, 0);
  191. out:
  192. return ret;
  193. }
  194. /* XXX: use do_get_thread_area to read the host value? I'm not at all sure! */
  195. static int get_tls_entry(struct task_struct *task, struct user_desc *info,
  196. int idx)
  197. {
  198. struct thread_struct *t = &task->thread;
  199. if (!t->arch.tls_array)
  200. goto clear;
  201. if (idx < GDT_ENTRY_TLS_MIN || idx > GDT_ENTRY_TLS_MAX)
  202. return -EINVAL;
  203. if (!t->arch.tls_array[idx - GDT_ENTRY_TLS_MIN].present)
  204. goto clear;
  205. *info = t->arch.tls_array[idx - GDT_ENTRY_TLS_MIN].tls;
  206. out:
  207. /*
  208. * Temporary debugging check, to make sure that things have been
  209. * flushed. This could be triggered if load_TLS() failed.
  210. */
  211. if (unlikely(task == current &&
  212. !t->arch.tls_array[idx - GDT_ENTRY_TLS_MIN].flushed)) {
  213. printk(KERN_ERR "get_tls_entry: task with pid %d got here "
  214. "without flushed TLS.", current->pid);
  215. }
  216. return 0;
  217. clear:
  218. /*
  219. * When the TLS entry has not been set, the values read to user in the
  220. * tls_array are 0 (because it's cleared at boot, see
  221. * arch/i386/kernel/head.S:cpu_gdt_table). Emulate that.
  222. */
  223. clear_user_desc(info);
  224. info->entry_number = idx;
  225. goto out;
  226. }
  227. int sys_set_thread_area(struct user_desc __user *user_desc)
  228. {
  229. struct user_desc info;
  230. int idx, ret;
  231. if (!host_supports_tls)
  232. return -ENOSYS;
  233. if (copy_from_user(&info, user_desc, sizeof(info)))
  234. return -EFAULT;
  235. idx = info.entry_number;
  236. if (idx == -1) {
  237. idx = get_free_idx(current);
  238. if (idx < 0)
  239. return idx;
  240. info.entry_number = idx;
  241. /* Tell the user which slot we chose for him.*/
  242. if (put_user(idx, &user_desc->entry_number))
  243. return -EFAULT;
  244. }
  245. ret = do_set_thread_area(&info);
  246. if (ret)
  247. return ret;
  248. return set_tls_entry(current, &info, idx, 1);
  249. }
  250. /*
  251. * Perform set_thread_area on behalf of the traced child.
  252. * Note: error handling is not done on the deferred load, and this differ from
  253. * i386. However the only possible error are caused by bugs.
  254. */
  255. int ptrace_set_thread_area(struct task_struct *child, int idx,
  256. struct user_desc __user *user_desc)
  257. {
  258. struct user_desc info;
  259. if (!host_supports_tls)
  260. return -EIO;
  261. if (copy_from_user(&info, user_desc, sizeof(info)))
  262. return -EFAULT;
  263. return set_tls_entry(child, &info, idx, 0);
  264. }
  265. int sys_get_thread_area(struct user_desc __user *user_desc)
  266. {
  267. struct user_desc info;
  268. int idx, ret;
  269. if (!host_supports_tls)
  270. return -ENOSYS;
  271. if (get_user(idx, &user_desc->entry_number))
  272. return -EFAULT;
  273. ret = get_tls_entry(current, &info, idx);
  274. if (ret < 0)
  275. goto out;
  276. if (copy_to_user(user_desc, &info, sizeof(info)))
  277. ret = -EFAULT;
  278. out:
  279. return ret;
  280. }
  281. /*
  282. * Perform get_thread_area on behalf of the traced child.
  283. */
  284. int ptrace_get_thread_area(struct task_struct *child, int idx,
  285. struct user_desc __user *user_desc)
  286. {
  287. struct user_desc info;
  288. int ret;
  289. if (!host_supports_tls)
  290. return -EIO;
  291. ret = get_tls_entry(child, &info, idx);
  292. if (ret < 0)
  293. goto out;
  294. if (copy_to_user(user_desc, &info, sizeof(info)))
  295. ret = -EFAULT;
  296. out:
  297. return ret;
  298. }
  299. /*
  300. * This code is really i386-only, but it detects and logs x86_64 GDT indexes
  301. * if a 32-bit UML is running on a 64-bit host.
  302. */
  303. static int __init __setup_host_supports_tls(void)
  304. {
  305. check_host_supports_tls(&host_supports_tls, &host_gdt_entry_tls_min);
  306. if (host_supports_tls) {
  307. printk(KERN_INFO "Host TLS support detected\n");
  308. printk(KERN_INFO "Detected host type: ");
  309. switch (host_gdt_entry_tls_min) {
  310. case GDT_ENTRY_TLS_MIN_I386:
  311. printk(KERN_CONT "i386");
  312. break;
  313. case GDT_ENTRY_TLS_MIN_X86_64:
  314. printk(KERN_CONT "x86_64");
  315. break;
  316. }
  317. printk(KERN_CONT " (GDT indexes %d to %d)\n",
  318. host_gdt_entry_tls_min,
  319. host_gdt_entry_tls_min + GDT_ENTRY_TLS_ENTRIES);
  320. } else
  321. printk(KERN_ERR " Host TLS support NOT detected! "
  322. "TLS support inside UML will not work\n");
  323. return 0;
  324. }
  325. __initcall(__setup_host_supports_tls);