1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18#include <linux/kernel.h>
19#include <linux/module.h>
20#include <linux/sched.h>
21#include <linux/unistd.h>
22#include <linux/file.h>
23#include <linux/fdtable.h>
24#include <linux/fs.h>
25#include <linux/syscalls.h>
26#include <linux/workqueue.h>
27#include <linux/errno.h>
28#include <linux/list.h>
29
30#include <asm/vpe.h>
31#include <asm/rtlx.h>
32#include <asm/kspd.h>
33
34static struct workqueue_struct *workqueue;
35static struct work_struct work;
36
37extern unsigned long cpu_khz;
38
39struct mtsp_syscall {
40 int cmd;
41 unsigned char abi;
42 unsigned char size;
43};
44
45struct mtsp_syscall_ret {
46 int retval;
47 int errno;
48};
49
50struct mtsp_syscall_generic {
51 int arg0;
52 int arg1;
53 int arg2;
54 int arg3;
55 int arg4;
56 int arg5;
57 int arg6;
58};
59
60static struct list_head kspd_notifylist;
61static int sp_stopping;
62
63
64#define MTSP_SYSCALL_BASE 0
65#define MTSP_SYSCALL_EXIT (MTSP_SYSCALL_BASE + 0)
66#define MTSP_SYSCALL_OPEN (MTSP_SYSCALL_BASE + 1)
67#define MTSP_SYSCALL_READ (MTSP_SYSCALL_BASE + 2)
68#define MTSP_SYSCALL_WRITE (MTSP_SYSCALL_BASE + 3)
69#define MTSP_SYSCALL_CLOSE (MTSP_SYSCALL_BASE + 4)
70#define MTSP_SYSCALL_LSEEK32 (MTSP_SYSCALL_BASE + 5)
71#define MTSP_SYSCALL_ISATTY (MTSP_SYSCALL_BASE + 6)
72#define MTSP_SYSCALL_GETTIME (MTSP_SYSCALL_BASE + 7)
73#define MTSP_SYSCALL_PIPEFREQ (MTSP_SYSCALL_BASE + 8)
74#define MTSP_SYSCALL_GETTOD (MTSP_SYSCALL_BASE + 9)
75#define MTSP_SYSCALL_IOCTL (MTSP_SYSCALL_BASE + 10)
76
77#define MTSP_O_RDONLY 0x0000
78#define MTSP_O_WRONLY 0x0001
79#define MTSP_O_RDWR 0x0002
80#define MTSP_O_NONBLOCK 0x0004
81#define MTSP_O_APPEND 0x0008
82#define MTSP_O_SHLOCK 0x0010
83#define MTSP_O_EXLOCK 0x0020
84#define MTSP_O_ASYNC 0x0040
85#define MTSP_O_FSYNC O_SYNC
86#define MTSP_O_NOFOLLOW 0x0100
87#define MTSP_O_SYNC 0x0080
88#define MTSP_O_CREAT 0x0200
89#define MTSP_O_TRUNC 0x0400
90#define MTSP_O_EXCL 0x0800
91#define MTSP_O_BINARY 0x8000
92
93extern int tclimit;
94
95struct apsp_table {
96 int sp;
97 int ap;
98};
99
100
101struct apsp_table open_flags_table[] = {
102 { MTSP_O_RDWR, O_RDWR },
103 { MTSP_O_WRONLY, O_WRONLY },
104 { MTSP_O_CREAT, O_CREAT },
105 { MTSP_O_TRUNC, O_TRUNC },
106 { MTSP_O_NONBLOCK, O_NONBLOCK },
107 { MTSP_O_APPEND, O_APPEND },
108 { MTSP_O_NOFOLLOW, O_NOFOLLOW }
109};
110
111struct apsp_table syscall_command_table[] = {
112 { MTSP_SYSCALL_OPEN, __NR_open },
113 { MTSP_SYSCALL_CLOSE, __NR_close },
114 { MTSP_SYSCALL_READ, __NR_read },
115 { MTSP_SYSCALL_WRITE, __NR_write },
116 { MTSP_SYSCALL_LSEEK32, __NR_lseek },
117 { MTSP_SYSCALL_IOCTL, __NR_ioctl }
118};
119
120static int sp_syscall(int num, int arg0, int arg1, int arg2, int arg3)
121{
122 register long int _num __asm__("$2") = num;
123 register long int _arg0 __asm__("$4") = arg0;
124 register long int _arg1 __asm__("$5") = arg1;
125 register long int _arg2 __asm__("$6") = arg2;
126 register long int _arg3 __asm__("$7") = arg3;
127
128 mm_segment_t old_fs;
129
130 old_fs = get_fs();
131 set_fs(KERNEL_DS);
132
133 __asm__ __volatile__ (
134 " syscall \n"
135 : "=r" (_num), "=r" (_arg3)
136 : "r" (_num), "r" (_arg0), "r" (_arg1), "r" (_arg2), "r" (_arg3));
137
138 set_fs(old_fs);
139
140
141 if (_arg3)
142 return -_num;
143
144 return _num;
145}
146
147static int translate_syscall_command(int cmd)
148{
149 int i;
150 int ret = -1;
151
152 for (i = 0; i < ARRAY_SIZE(syscall_command_table); i++) {
153 if ((cmd == syscall_command_table[i].sp))
154 return syscall_command_table[i].ap;
155 }
156
157 return ret;
158}
159
160static unsigned int translate_open_flags(int flags)
161{
162 int i;
163 unsigned int ret = 0;
164
165 for (i = 0; i < ARRAY_SIZE(open_flags_table); i++) {
166 if( (flags & open_flags_table[i].sp) ) {
167 ret |= open_flags_table[i].ap;
168 }
169 }
170
171 return ret;
172}
173
174
175static int sp_setfsuidgid(uid_t uid, gid_t gid)
176{
177 struct cred *new;
178
179 new = prepare_creds();
180 if (!new)
181 return -ENOMEM;
182
183 new->fsuid = uid;
184 new->fsgid = gid;
185
186 commit_creds(new);
187
188 return 0;
189}
190
191
192
193
194
195
196void sp_work_handle_request(void)
197{
198 struct mtsp_syscall sc;
199 struct mtsp_syscall_generic generic;
200 struct mtsp_syscall_ret ret;
201 struct kspd_notifications *n;
202 unsigned long written;
203 mm_segment_t old_fs;
204 struct timeval tv;
205 struct timezone tz;
206 int err, cmd;
207
208 char *vcwd;
209 int size;
210
211 ret.retval = -1;
212
213 old_fs = get_fs();
214 set_fs(KERNEL_DS);
215
216 if (!rtlx_read(RTLX_CHANNEL_SYSIO, &sc, sizeof(struct mtsp_syscall))) {
217 set_fs(old_fs);
218 printk(KERN_ERR "Expected request but nothing to read\n");
219 return;
220 }
221
222 size = sc.size;
223
224 if (size) {
225 if (!rtlx_read(RTLX_CHANNEL_SYSIO, &generic, size)) {
226 set_fs(old_fs);
227 printk(KERN_ERR "Expected request but nothing to read\n");
228 return;
229 }
230 }
231
232
233
234
235 if (vpe_getuid(tclimit)) {
236 err = sp_setfsuidgid(vpe_getuid(tclimit), vpe_getgid(tclimit));
237 if (!err)
238 pr_err("Change of creds failed\n");
239 }
240
241 switch (sc.cmd) {
242
243
244 case MTSP_SYSCALL_PIPEFREQ:
245 ret.retval = cpu_khz * 1000;
246 ret.errno = 0;
247 break;
248
249 case MTSP_SYSCALL_GETTOD:
250 memset(&tz, 0, sizeof(tz));
251 if ((ret.retval = sp_syscall(__NR_gettimeofday, (int)&tv,
252 (int)&tz, 0, 0)) == 0)
253 ret.retval = tv.tv_sec;
254 break;
255
256 case MTSP_SYSCALL_EXIT:
257 list_for_each_entry(n, &kspd_notifylist, list)
258 n->kspd_sp_exit(tclimit);
259 sp_stopping = 1;
260
261 printk(KERN_DEBUG "KSPD got exit syscall from SP exitcode %d\n",
262 generic.arg0);
263 break;
264
265 case MTSP_SYSCALL_OPEN:
266 generic.arg1 = translate_open_flags(generic.arg1);
267
268 vcwd = vpe_getcwd(tclimit);
269
270
271 old_fs = get_fs();
272 set_fs(KERNEL_DS);
273 sys_chdir(vcwd);
274 set_fs(old_fs);
275
276 sc.cmd = __NR_open;
277
278
279
280 default:
281 if ((sc.cmd >= __NR_Linux) &&
282 (sc.cmd <= (__NR_Linux + __NR_Linux_syscalls)) )
283 cmd = sc.cmd;
284 else
285 cmd = translate_syscall_command(sc.cmd);
286
287 if (cmd >= 0) {
288 ret.retval = sp_syscall(cmd, generic.arg0, generic.arg1,
289 generic.arg2, generic.arg3);
290 } else
291 printk(KERN_WARNING
292 "KSPD: Unknown SP syscall number %d\n", sc.cmd);
293 break;
294 }
295
296 if (vpe_getuid(tclimit)) {
297 err = sp_setfsuidgid(0, 0);
298 if (!err)
299 pr_err("restoring old creds failed\n");
300 }
301
302 old_fs = get_fs();
303 set_fs(KERNEL_DS);
304 written = rtlx_write(RTLX_CHANNEL_SYSIO, &ret, sizeof(ret));
305 set_fs(old_fs);
306 if (written < sizeof(ret))
307 printk("KSPD: sp_work_handle_request failed to send to SP\n");
308}
309
310static void sp_cleanup(void)
311{
312 struct files_struct *files = current->files;
313 int i, j;
314 struct fdtable *fdt;
315
316 j = 0;
317
318
319
320
321
322 fdt = files_fdtable(files);
323 for (;;) {
324 unsigned long set;
325 i = j * __NFDBITS;
326 if (i >= fdt->max_fds)
327 break;
328 set = fdt->open_fds->fds_bits[j++];
329 while (set) {
330 if (set & 1) {
331 struct file * file = xchg(&fdt->fd[i], NULL);
332 if (file)
333 filp_close(file, files);
334 }
335 i++;
336 set >>= 1;
337 }
338 }
339
340
341 sys_chdir("/");
342}
343
344static int channel_open;
345
346
347static void sp_work(struct work_struct *unused)
348{
349 if (!channel_open) {
350 if( rtlx_open(RTLX_CHANNEL_SYSIO, 1) != 0) {
351 printk("KSPD: unable to open sp channel\n");
352 sp_stopping = 1;
353 } else {
354 channel_open++;
355 printk(KERN_DEBUG "KSPD: SP channel opened\n");
356 }
357 } else {
358
359 rtlx_read_poll(RTLX_CHANNEL_SYSIO, 1);
360
361
362 if (!sp_stopping)
363 sp_work_handle_request();
364 }
365
366 if (!sp_stopping)
367 queue_work(workqueue, &work);
368 else
369 sp_cleanup();
370}
371
372static void startwork(int vpe)
373{
374 sp_stopping = channel_open = 0;
375
376 if (workqueue == NULL) {
377 if ((workqueue = create_singlethread_workqueue("kspd")) == NULL) {
378 printk(KERN_ERR "unable to start kspd\n");
379 return;
380 }
381
382 INIT_WORK(&work, sp_work);
383 }
384
385 queue_work(workqueue, &work);
386}
387
388static void stopwork(int vpe)
389{
390 sp_stopping = 1;
391
392 printk(KERN_DEBUG "KSPD: SP stopping\n");
393}
394
395void kspd_notify(struct kspd_notifications *notify)
396{
397 list_add(¬ify->list, &kspd_notifylist);
398}
399
400static struct vpe_notifications notify;
401static int kspd_module_init(void)
402{
403 INIT_LIST_HEAD(&kspd_notifylist);
404
405 notify.start = startwork;
406 notify.stop = stopwork;
407 vpe_notify(tclimit, ¬ify);
408
409 return 0;
410}
411
412static void kspd_module_exit(void)
413{
414
415}
416
417module_init(kspd_module_init);
418module_exit(kspd_module_exit);
419
420MODULE_DESCRIPTION("MIPS KSPD");
421MODULE_AUTHOR("Elizabeth Oldham, MIPS Technologies, Inc.");
422MODULE_LICENSE("GPL");
423