diff options
author | Joerg Roedel <jroedel@suse.de> | 2018-07-18 05:40:40 -0400 |
---|---|---|
committer | Thomas Gleixner <tglx@linutronix.de> | 2018-07-19 19:11:36 -0400 |
commit | a6b744f3ce9d017dd86b28355de2d8e0d36496d4 (patch) | |
tree | e2fcd05628125b68ba6da8d71958fa69839f6064 | |
parent | ae2e565bc6aaee3f3db420fec5fdd39755c9813e (diff) |
x86/entry/32: Load task stack from x86_tss.sp1 in SYSENTER handler
x86_tss.sp0 will be used to point to the entry stack later to use it as a
trampoline stack for other kernel entry points besides SYSENTER.
So store the real task stack pointer in x86_tss.sp1, which is otherwise
unused by the hardware, as Linux doesn't make use of Ring 1.
Signed-off-by: Joerg Roedel <jroedel@suse.de>
Signed-off-by: Thomas Gleixner <tglx@linutronix.de>
Tested-by: Pavel Machek <pavel@ucw.cz>
Cc: "H . Peter Anvin" <hpa@zytor.com>
Cc: linux-mm@kvack.org
Cc: Linus Torvalds <torvalds@linux-foundation.org>
Cc: Andy Lutomirski <luto@kernel.org>
Cc: Dave Hansen <dave.hansen@intel.com>
Cc: Josh Poimboeuf <jpoimboe@redhat.com>
Cc: Juergen Gross <jgross@suse.com>
Cc: Peter Zijlstra <peterz@infradead.org>
Cc: Borislav Petkov <bp@alien8.de>
Cc: Jiri Kosina <jkosina@suse.cz>
Cc: Boris Ostrovsky <boris.ostrovsky@oracle.com>
Cc: Brian Gerst <brgerst@gmail.com>
Cc: David Laight <David.Laight@aculab.com>
Cc: Denys Vlasenko <dvlasenk@redhat.com>
Cc: Eduardo Valentin <eduval@amazon.com>
Cc: Greg KH <gregkh@linuxfoundation.org>
Cc: Will Deacon <will.deacon@arm.com>
Cc: aliguori@amazon.com
Cc: daniel.gruss@iaik.tugraz.at
Cc: hughd@google.com
Cc: keescook@google.com
Cc: Andrea Arcangeli <aarcange@redhat.com>
Cc: Waiman Long <llong@redhat.com>
Cc: "David H . Gutteridge" <dhgutteridge@sympatico.ca>
Cc: joro@8bytes.org
Link: https://lkml.kernel.org/r/1531906876-13451-4-git-send-email-joro@8bytes.org
-rw-r--r-- | arch/x86/kernel/asm-offsets_32.c | 9 | ||||
-rw-r--r-- | arch/x86/kernel/process_32.c | 2 |
2 files changed, 9 insertions, 2 deletions
diff --git a/arch/x86/kernel/asm-offsets_32.c b/arch/x86/kernel/asm-offsets_32.c index 15b3f45b69cd..82826f2275cc 100644 --- a/arch/x86/kernel/asm-offsets_32.c +++ b/arch/x86/kernel/asm-offsets_32.c | |||
@@ -46,9 +46,14 @@ void foo(void) | |||
46 | OFFSET(saved_context_gdt_desc, saved_context, gdt_desc); | 46 | OFFSET(saved_context_gdt_desc, saved_context, gdt_desc); |
47 | BLANK(); | 47 | BLANK(); |
48 | 48 | ||
49 | /* Offset from the entry stack to task stack stored in TSS */ | 49 | /* |
50 | * Offset from the entry stack to task stack stored in TSS. Kernel entry | ||
51 | * happens on the per-cpu entry-stack, and the asm code switches to the | ||
52 | * task-stack pointer stored in x86_tss.sp1, which is a copy of | ||
53 | * task->thread.sp0 where entry code can find it. | ||
54 | */ | ||
50 | DEFINE(TSS_entry2task_stack, | 55 | DEFINE(TSS_entry2task_stack, |
51 | offsetof(struct cpu_entry_area, tss.x86_tss.sp0) - | 56 | offsetof(struct cpu_entry_area, tss.x86_tss.sp1) - |
52 | offsetofend(struct cpu_entry_area, entry_stack_page.stack)); | 57 | offsetofend(struct cpu_entry_area, entry_stack_page.stack)); |
53 | 58 | ||
54 | #ifdef CONFIG_STACKPROTECTOR | 59 | #ifdef CONFIG_STACKPROTECTOR |
diff --git a/arch/x86/kernel/process_32.c b/arch/x86/kernel/process_32.c index 0ae659de21eb..ec62cc77388d 100644 --- a/arch/x86/kernel/process_32.c +++ b/arch/x86/kernel/process_32.c | |||
@@ -290,6 +290,8 @@ __switch_to(struct task_struct *prev_p, struct task_struct *next_p) | |||
290 | this_cpu_write(cpu_current_top_of_stack, | 290 | this_cpu_write(cpu_current_top_of_stack, |
291 | (unsigned long)task_stack_page(next_p) + | 291 | (unsigned long)task_stack_page(next_p) + |
292 | THREAD_SIZE); | 292 | THREAD_SIZE); |
293 | /* SYSENTER reads the task-stack from tss.sp1 */ | ||
294 | this_cpu_write(cpu_tss_rw.x86_tss.sp1, next_p->thread.sp0); | ||
293 | 295 | ||
294 | /* | 296 | /* |
295 | * Restore %gs if needed (which is common) | 297 | * Restore %gs if needed (which is common) |