fbpx
Wikipedia

Task state segment

The task state segment (TSS) is a structure on x86-based computers which holds information about a task. It is used by the operating system kernel for task management. Specifically, the following information is stored in the TSS:

  • Processor register state
  • I/O port permissions
  • Inner-level stack pointers
  • Previous TSS link

All this information should be stored at specific locations within the TSS as specified in the IA-32 manuals.

Location of the TSS edit

The TSS may reside anywhere in memory. A segment register called the task register (TR) holds a segment selector that points to a valid TSS segment descriptor which resides in the GDT (a TSS descriptor may not reside in the LDT). Therefore, to use a TSS the following must be done by the operating system kernel:

  1. Create a TSS descriptor entry in the GDT
  2. Load the TR with the segment selector for that segment
  3. Add information to the TSS in memory as needed

For security purposes, the TSS should be placed in memory that is accessible only to the kernel.

Task register edit

The TR register is a 16-bit register which holds a segment selector for the TSS. It may be loaded through the LTR instruction. LTR is a privileged instruction and acts in a manner similar to other segment register loads. The task register has two parts: a portion visible and accessible by the programmer and an invisible one that is automatically loaded from the TSS descriptor.

Register states edit

The TSS may contain saved values of all the x86 registers. This is used for task switching. The operating system may load the TSS with the values of the registers that the new task needs and after executing a hardware task switch (such as with an IRET instruction) the x86 CPU will load the saved values from the TSS into the appropriate registers. Note that some modern operating systems such as Windows and Linux[1] do not use these fields in the TSS as they implement software task switching.

Note that during a hardware task switch, certain fields of the old TSS are updated with the CPU's current register contents before the values from the new TSS are read. Thus some TSS fields are read/write, while others are read-only:

  • Read/Write fields: read and written during a hardware task switch.
    • All general-purpose registers (EAX, EBX, ECX, EDX, ESI, EDI, EBP, ESP);
    • All segment registers (CS, DS, ES, FS, GS, SS);
    • Current execution state (EIP, EFlags);
    • The Link field in the new TSS, if the task switch was due to a CALL or INT rather than a JMP.
  • Read-only fields: read only when required, as indicated.
    • Control Register 3 (CR3), also known as the Page Directory Base Register (PDBR).
      Read during a hardware task switch.
    • The Local Descriptor Table register (LDTR);
      Read during a hardware task switch.
    • The three privilege-level stack pairs (SS0:ESP0, SS1:ESP1, SS2:ESP2);
      Read during an inter-level CALL or INT to establish a new stack.
    • The IO Port Bitmap pointer (IOPB) and the I/O Port Bitmap itself;
      Read during an IN, OUT, INS or OUTS instruction if CPL > IOPL to confirm the instruction is legal (see I/O port permissions below).

The PDBR field is in fact the very first one read out of the new TSS: since a hardware task switch can also switch to a completely different page table mapping, all the other fields (especially the LDTR) are relative to the new mapping.

I/O port permissions edit

The TSS contains a 16-bit pointer to I/O port permissions bitmap for the current task. This bitmap, usually set up by the operating system when a task is started, specifies individual ports to which the program should have access. The I/O bitmap is a bit array of port access permissions; if the program has permission to access a port, a "0" is stored at the corresponding bit index, and if the program does not have permission, a "1" is stored there. If the TSS’ segment limit is less than the full bitmap, all missing bits are assumed to be "1".

The feature operates as follows: when a program issues an x86 I/O port instruction such as IN or OUT (see x86 instruction listings - and note that there are byte-, word- and dword-length versions), the hardware will do an I/O privilege level (IOPL) check to see if the program has access to all I/O ports. If the Current Privilege Level (CPL) of the program is numerically greater than the I/O Privilege level (IOPL) (the program is less-privileged than what the IOPL specifies), the program does not have I/O port access to all ports. The hardware will then check the I/O permissions bitmap in the TSS to see if that program can access the specific port(s) in the IN or OUT instruction. If (all the) relevant bit(s) in the I/O port permissions bitmap is/are clear, the program is allowed access to the port(s), and the instruction is allowed to execute. If (any of) the relevant bit(s) is/are set - or if (any of) the bit(s) is/are past the TSS’ segment limit - the program does not have access and the processor generates a general protection fault. This feature allows operating systems to grant selective port access to user programs.

Inner-level stack pointers edit

The TSS contains 6 fields for specifying the new stack pointer when a privilege level change happens. The field SS0 contains the stack segment selector for CPL=0, and the field ESP0/RSP0 contains the new ESP/RSP value for CPL=0. When an interrupt happens in protected (32-bit) mode, the x86 CPU will look in the TSS for SS0 and ESP0 and load their values into SS and ESP respectively. This allows for the kernel to use a different stack than the user program, and also have this stack be unique for each user program.

A new feature introduced in the AMD64 extensions is called the Interrupt Stack Table (IST), which also resides in the TSS and contains logical (segment+offset) stack pointers. If an interrupt descriptor table specifies an IST entry to use (there are 7), the processor will load the new stack from the IST instead. This allows known-good stacks to be used in case of serious errors (NMI or Double fault for example). Previously, the entry for the exception or interrupt in the IDT pointed to a task gate, causing the processor to switch to the task that is pointed by the task gate. The original register values were saved in the TSS current at the time the interrupt or exception occurred. The processor then set the registers, including SS:ESP, to a known value specified in the TSS and saved the selector to the previous TSS. The problem here is that hardware task switching is not supported on AMD64.

Previous TSS link edit

This is a 16-bit selector which allows linking this TSS with the previous one. This is only used for hardware task switching. See the IA-32 manuals for details.

Use of TSS in Linux edit

Although a TSS could be created for each task running on the computer, Linux kernel only creates one TSS for each CPU and uses them for all tasks. This approach was selected as it provides easier portability to other architectures (for example, the AMD64 architecture does not support hardware task switches), and improved performance and flexibility. Linux only uses the I/O port permission bitmap and inner stack features of the TSS; the other features are only needed for hardware task switches, which the Linux kernel does not use.[2]

Exceptions related to the TSS edit

The x86 exception vector 10 is called the Invalid TSS exception (#TS). It is issued by the processor whenever something goes wrong with the TSS access. For example, if an interrupt happens in CPL=3 and is transferring control to CPL=0, the TSS is used to extract SS0 and ESP0/RSP0 for the stack switch. If the task register holds a bad TSS selector, a #TS fault will be generated. The Invalid TSS exception should never happen during normal operating system operation and is always related to kernel bugs or hardware failure.

For more details on TSS exceptions, see Volume 3a, Chapter 6 of the IA-32 manual.[3]

TSS in x86-64 mode edit

The x86-64 architecture does not support hardware task switches. However the TSS can still be used in a machine running in the 64 bit extended modes. In these modes the TSS is still useful as it stores:

  1. The stack pointer addresses for each privilege level.
  2. Pointer Addresses for the Interrupt Stack Table (The inner-level stack pointer section above, discusses the need for this).
  3. Offset Address of the IO permission bitmap.

Also, the task register is expanded in these modes to be able to hold a 64-bit base address.

References edit

  1. ^ Bovet, Daniel Pierre; Cesatí, Marco (2006). Understanding the Linux Kernel, Third Edition. O'Reilly Media. p. 104. ISBN 978-0-596-00565-8. Retrieved 2009-11-23.
  2. ^ Daniel P. Bovet; Marco Cesati (2006). Understanding the Linux Kernel. O'Reilly. p. 104. ISBN 9780596554910. Retrieved 2014-02-25.
  3. ^ "Intel 64 and IA-32 Architectures Software Developer's Manual Volume 3a". Retrieved 21 May 2012.

External links edit

  • Demonstration program using TSSes

task, state, segment, task, state, segment, structure, based, computers, which, holds, information, about, task, used, operating, system, kernel, task, management, specifically, following, information, stored, processor, register, state, port, permissions, inn. The task state segment TSS is a structure on x86 based computers which holds information about a task It is used by the operating system kernel for task management Specifically the following information is stored in the TSS Processor register state I O port permissions Inner level stack pointers Previous TSS link All this information should be stored at specific locations within the TSS as specified in the IA 32 manuals Contents 1 Location of the TSS 2 Task register 3 Register states 4 I O port permissions 5 Inner level stack pointers 6 Previous TSS link 7 Use of TSS in Linux 8 Exceptions related to the TSS 9 TSS in x86 64 mode 10 References 11 External linksLocation of the TSS editThe TSS may reside anywhere in memory A segment register called the task register TR holds a segment selector that points to a valid TSS segment descriptor which resides in the GDT a TSS descriptor may not reside in the LDT Therefore to use a TSS the following must be done by the operating system kernel Create a TSS descriptor entry in the GDT Load the TR with the segment selector for that segment Add information to the TSS in memory as needed For security purposes the TSS should be placed in memory that is accessible only to the kernel Task register editThe TR register is a 16 bit register which holds a segment selector for the TSS It may be loaded through the LTR instruction LTR is a privileged instruction and acts in a manner similar to other segment register loads The task register has two parts a portion visible and accessible by the programmer and an invisible one that is automatically loaded from the TSS descriptor Register states editThe TSS may contain saved values of all the x86 registers This is used for task switching The operating system may load the TSS with the values of the registers that the new task needs and after executing a hardware task switch such as with an IRET instruction the x86 CPU will load the saved values from the TSS into the appropriate registers Note that some modern operating systems such as Windows and Linux 1 do not use these fields in the TSS as they implement software task switching Note that during a hardware task switch certain fields of the old TSS are updated with the CPU s current register contents before the values from the new TSS are read Thus some TSS fields are read write while others are read only Read Write fields read and written during a hardware task switch All general purpose registers EAX EBX ECX EDX ESI EDI EBP ESP All segment registers CS DS ES FS GS SS Current execution state EIP EFlags The Link field in the new TSS if the task switch was due to a CALL or INT rather than a JMP Read only fields read only when required as indicated Control Register 3 CR3 also known as the Page Directory Base Register PDBR Read during a hardware task switch The Local Descriptor Table register LDTR Read during a hardware task switch The three privilege level stack pairs SS0 ESP0 SS1 ESP1 SS2 ESP2 Read during an inter level CALL or INT to establish a new stack The IO Port Bitmap pointer IOPB and the I O Port Bitmap itself Read during an IN OUT INS or OUTS instruction if CPL gt IOPL to confirm the instruction is legal see I O port permissions below The PDBR field is in fact the very first one read out of the new TSS since a hardware task switch can also switch to a completely different page table mapping all the other fields especially the LDTR are relative to the new mapping I O port permissions editThe TSS contains a 16 bit pointer to I O port permissions bitmap for the current task This bitmap usually set up by the operating system when a task is started specifies individual ports to which the program should have access The I O bitmap is a bit array of port access permissions if the program has permission to access a port a 0 is stored at the corresponding bit index and if the program does not have permission a 1 is stored there If the TSS segment limit is less than the full bitmap all missing bits are assumed to be 1 The feature operates as follows when a program issues an x86 I O port instruction such as IN or OUT see x86 instruction listings and note that there are byte word and dword length versions the hardware will do an I O privilege level IOPL check to see if the program has access to all I O ports If the Current Privilege Level CPL of the program is numerically greater than the I O Privilege level IOPL the program is less privileged than what the IOPL specifies the program does not have I O port access to all ports The hardware will then check the I O permissions bitmap in the TSS to see if that program can access the specific port s in the IN or OUT instruction If all the relevant bit s in the I O port permissions bitmap is are clear the program is allowed access to the port s and the instruction is allowed to execute If any of the relevant bit s is are set or if any of the bit s is are past the TSS segment limit the program does not have access and the processor generates a general protection fault This feature allows operating systems to grant selective port access to user programs Inner level stack pointers editThe TSS contains 6 fields for specifying the new stack pointer when a privilege level change happens The field SS0 contains the stack segment selector for CPL 0 and the field ESP0 RSP0 contains the new ESP RSP value for CPL 0 When an interrupt happens in protected 32 bit mode the x86 CPU will look in the TSS for SS0 and ESP0 and load their values into SS and ESP respectively This allows for the kernel to use a different stack than the user program and also have this stack be unique for each user program A new feature introduced in the AMD64 extensions is called the Interrupt Stack Table IST which also resides in the TSS and contains logical segment offset stack pointers If an interrupt descriptor table specifies an IST entry to use there are 7 the processor will load the new stack from the IST instead This allows known good stacks to be used in case of serious errors NMI or Double fault for example Previously the entry for the exception or interrupt in the IDT pointed to a task gate causing the processor to switch to the task that is pointed by the task gate The original register values were saved in the TSS current at the time the interrupt or exception occurred The processor then set the registers including SS ESP to a known value specified in the TSS and saved the selector to the previous TSS The problem here is that hardware task switching is not supported on AMD64 Previous TSS link editThis is a 16 bit selector which allows linking this TSS with the previous one This is only used for hardware task switching See the IA 32 manuals for details Use of TSS in Linux editAlthough a TSS could be created for each task running on the computer Linux kernel only creates one TSS for each CPU and uses them for all tasks This approach was selected as it provides easier portability to other architectures for example the AMD64 architecture does not support hardware task switches and improved performance and flexibility Linux only uses the I O port permission bitmap and inner stack features of the TSS the other features are only needed for hardware task switches which the Linux kernel does not use 2 Exceptions related to the TSS editThe x86 exception vector 10 is called the Invalid TSS exception TS It is issued by the processor whenever something goes wrong with the TSS access For example if an interrupt happens in CPL 3 and is transferring control to CPL 0 the TSS is used to extract SS0 and ESP0 RSP0 for the stack switch If the task register holds a bad TSS selector a TS fault will be generated The Invalid TSS exception should never happen during normal operating system operation and is always related to kernel bugs or hardware failure For more details on TSS exceptions see Volume 3a Chapter 6 of the IA 32 manual 3 TSS in x86 64 mode editThe x86 64 architecture does not support hardware task switches However the TSS can still be used in a machine running in the 64 bit extended modes In these modes the TSS is still useful as it stores The stack pointer addresses for each privilege level Pointer Addresses for the Interrupt Stack Table The inner level stack pointer section above discusses the need for this Offset Address of the IO permission bitmap Also the task register is expanded in these modes to be able to hold a 64 bit base address References edit Bovet Daniel Pierre Cesati Marco 2006 Understanding the Linux Kernel Third Edition O Reilly Media p 104 ISBN 978 0 596 00565 8 Retrieved 2009 11 23 Daniel P Bovet Marco Cesati 2006 Understanding the Linux Kernel O Reilly p 104 ISBN 9780596554910 Retrieved 2014 02 25 Intel 64 and IA 32 Architectures Software Developer s Manual Volume 3a Retrieved 21 May 2012 External links editDemonstration program using TSSes Retrieved from https en wikipedia org w index php title Task state segment amp oldid 1172588473, wikipedia, wiki, book, books, library,

article

, read, download, free, free download, mp3, video, mp4, 3gp, jpg, jpeg, gif, png, picture, music, song, movie, book, game, games.