Fix virtual 8086 mode to properly account for TLS.

* The vm86 code or the code running in virtual 8086 mode may clobber the
  %fs register that we use for the CPU dependent thread local storage
  (TLS). Previously the vm86 code would simply restore %fs on exit, but
  this doesn't always work. If the thread got unscheduled while running
  in virtual 8086 mode and was then rescheduled on a different CPU, the
  vm86 exit code would restore the %fs register with the TLS value of
  the old CPU, causing anything using TLS in userland to crash later on.
  Instead we skip the %fs register restore on exit (as do the other
  interrupt return functions) and explicitly update the potentially
  clobbered %fs by calling x86_set_tls_context(). This will repopulate
  the %fs register with the TLS value for the right CPU. Fixes #8068.

* Made the static set_tls_context() into x86_set_tls_context() and made
  it available to others to faciliate the above.

* Sync the vm86 specific interrupt code with the changes from hrev23370,
  using the iframe pop macro to properly return. Previously what was
  pushed in int_bottom wasn't poped on return.

* Account for the time update macro resetting the in_kernel flag and
  reset it to 1, as we aren't actually returning to userland. This
  didn't cause any harm though as only the time tracking is using that
  flag so far.

* Some minor cleanup.
This commit is contained in:
Michael Lotz 2011-11-25 15:51:13 +01:00
parent 653ce5db53
commit 79f0056002
4 changed files with 35 additions and 22 deletions

View File

@ -22,7 +22,9 @@ struct iframe *i386_get_thread_user_iframe(Thread *thread);
uint32 x86_next_page_directory(Thread *from, Thread *to);
void x86_restart_syscall(struct iframe* frame);
void x86_restart_syscall(struct iframe *frame);
void x86_set_tls_context(Thread *thread);
// override empty macro
#undef arch_syscall_64_bit_return_value

View File

@ -601,13 +601,15 @@ STATIC_FUNCTION(int_bottom_vm86):
movl IFRAME_vector(%ebp), %eax
call *gInterruptHandlerTable(, %eax, 4)
cli // disable interrupts
// update the thread's kernel time and return
cli
UPDATE_THREAD_KERNEL_TIME()
lea 20(%ebp), %esp;
popa;
addl $16,%esp;
iret
// the above will reset the in_kernel flag to 0, but we actually stay
movb $1, THREAD_in_kernel(%edi);
POP_IFRAME_AND_RETURN()
FUNCTION_END(int_bottom_vm86)
@ -869,7 +871,7 @@ FUNCTION(x86_vm86_enter):
// get pointers
movl 32(%esp), %esi // vm86 iframe
push %esi // ... store iframe addr for x86_vm86_return
pushl %esi // ... store iframe addr for x86_vm86_return
movl %dr3, %edi // Thread*
// make sure eflags are in right shape
@ -913,13 +915,16 @@ FUNCTION(x86_vm86_return):
// adjust kernel_stack_top and tss.esp0
movl %dr3, %edi
movl %eax, THREAD_kernel_stack_top(%edi)
push %eax
pushl %eax
call i386_set_tss_and_kstack
addl $4, %esp
// restore registers
movl %ebx, %eax
pop %fs
// we skip %fs, as this contains the CPU dependent TLS segment
addl $4, %esp;
pop %gs
popl %ebx
popl %ebp

View File

@ -144,16 +144,6 @@ set_fs_register(uint32 segment)
}
static void
set_tls_context(Thread *thread)
{
int entry = smp_get_current_cpu() + TLS_BASE_SEGMENT;
set_segment_descriptor_base(&gGDT[entry], thread->user_local_storage);
set_fs_register((entry << 3) | DPL_USER);
}
/*! Returns to the userland environment given by \a frame for a thread not
having been userland before.
@ -171,7 +161,7 @@ initial_return_to_userland(Thread* thread, iframe* frame)
disable_interrupts();
i386_set_tss_and_kstack(thread->kernel_stack_top);
set_tls_context(thread);
x86_set_tls_context(thread);
x86_set_syscall_stack(thread->kernel_stack_top);
// return to userland
@ -268,6 +258,16 @@ x86_restart_syscall(struct iframe* frame)
}
void
x86_set_tls_context(Thread *thread)
{
int entry = smp_get_current_cpu() + TLS_BASE_SEGMENT;
set_segment_descriptor_base(&gGDT[entry], thread->user_local_storage);
set_fs_register((entry << 3) | DPL_USER);
}
static uint8*
get_signal_stack(Thread* thread, struct iframe* frame, struct sigaction* action)
{
@ -373,7 +373,7 @@ arch_thread_context_switch(Thread *from, Thread *to)
// set TLS GDT entry to the current thread - since this action is
// dependent on the current CPU, we have to do it here
if (to->user_local_storage != 0)
set_tls_context(to);
x86_set_tls_context(to);
struct cpu_ent* cpuData = to->cpu;
X86PagingStructures* activePagingStructures
@ -453,7 +453,7 @@ arch_thread_enter_userspace(Thread* thread, addr_t entry, void* args1,
iframe frame = {};
frame.type = IFRAME_TYPE_SYSCALL;
frame.gs = USER_DATA_SEG;
// frame.fs not used -- we call set_tls_context() below
// frame.fs not used, we call x86_set_tls_context() on context switch
frame.es = USER_DATA_SEG;
frame.ds = USER_DATA_SEG;
frame.eip = entry;

View File

@ -657,6 +657,12 @@ vm86_do_int(struct vm86_state *state, uint8 vec)
} while (emuState == 0);
thread->fault_callback = NULL;
// We might have clobbered %fs, so we need to restore the CPU dependent
// TLS context that we may have overwritten. Note that we can't simply
// restore %fs to its previous value as we might not run on the same CPU
// anymore.
x86_set_tls_context(thread);
return emuState < 0 ? B_BAD_DATA : ret;
}