Index: kern/tty_pts.c =================================================================== RCS file: kern/tty_pts.c diff -N kern/tty_pts.c --- /dev/null 1 Jan 1970 00:00:00 -0000 +++ kern/tty_pts.c 6 Oct 2004 01:17:00 -0000 @@ -0,0 +1,975 @@ +/* + * Copyright (c) 2003 Networks Associates Technology, Inc. + * All rights reserved. + * + * This software was developed for the FreeBSD Project in part by Network + * Associates Laboratories, the Security Research Division of Network + * Associates, Inc. under DARPA/SPAWAR contract N66001-01-C-8035 ("CBOSS"), + * as part of the DARPA CHATS research program. + * + * Copyright (c) 1982, 1986, 1989, 1993 + * The Regents of the University of California. All rights reserved. + * + * Redistribution and use in source and binary forms, with or without + * modification, are permitted provided that the following conditions + * are met: + * 1. Redistributions of source code must retain the above copyright + * notice, this list of conditions and the following disclaimer. + * 2. Redistributions in binary form must reproduce the above copyright + * notice, this list of conditions and the following disclaimer in the + * documentation and/or other materials provided with the distribution. + * 3. All advertising materials mentioning features or use of this software + * must display the following acknowledgement: + * This product includes software developed by the University of + * California, Berkeley and its contributors. + * 4. Neither the name of the University nor the names of its contributors + * may be used to endorse or promote products derived from this software + * without specific prior written permission. + * + * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND + * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE + * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE + * ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE + * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL + * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS + * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) + * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT + * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY + * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF + * SUCH DAMAGE. + * + * @(#)tty_pty.c 8.4 (Berkeley) 2/20/95 + */ + +#include +__FBSDID("$FreeBSD$"); + +/* + * Pseudo-teletype Driver + * (Actually two drivers, requiring two entries in 'cdevsw') + */ +#include "opt_compat.h" +#include "opt_tty.h" +#include +#include +#include +#include +#include +#if defined(COMPAT_43) || defined(COMPAT_SUNOS) +#include +#endif +#include +#include +#include +#include +#include +#include +#include +#include +#include +#include + +static MALLOC_DEFINE(M_PTY, "ptys", "pty data structures"); + +static void ptsstart(struct tty *tp); +static void ptsstop(struct tty *tp, int rw); +static void ptcwakeup(struct tty *tp, int flag); + +static d_open_t ptsopen; +static d_close_t ptsclose; +static d_read_t ptsread; +static d_write_t ptswrite; +static d_ioctl_t ptsioctl; +static d_ioctl_t ptcioctl; +static d_open_t ptcopen; +static d_close_t ptcclose; +static d_read_t ptcread; +static d_write_t ptcwrite; +static d_poll_t ptcpoll; + +static struct cdevsw pts_cdevsw = { + .d_version = D_VERSION, + .d_open = ptsopen, + .d_close = ptsclose, + .d_read = ptsread, + .d_write = ptswrite, + .d_ioctl = ptsioctl, + .d_poll = ttypoll, + .d_name = "pts", + .d_flags = D_TTY, + .d_kqfilter = ttykqfilter, +}; + +static struct cdevsw ptc_cdevsw = { + .d_version = D_VERSION, + .d_open = ptcopen, + .d_close = ptcclose, + .d_read = ptcread, + .d_write = ptcwrite, + .d_ioctl = ptcioctl, + .d_poll = ptcpoll, + .d_name = "ptc", + .d_flags = D_TTY, + .d_kqfilter = ttykqfilter, +}; + +#define BUFSIZ 100 /* Chunk size iomoved to/from user */ + +#define TSA_PTC_READ(tp) ((void *)&(tp)->t_outq.c_cf) +#define TSA_PTC_WRITE(tp) ((void *)&(tp)->t_rawq.c_cl) +#define TSA_PTS_READ(tp) ((void *)&(tp)->t_canq) + +/*- + * Once a tty is allocated, it cannot (currently) be freed. As such, + * we keep a global list of ptys that have been used so we can recycle + * them. At pt_inuse flag indicates whether or not a pty descriptor + * is currently allocated, permitting reuse. pt_flags holds state + * associated with a particular session, so isn't overloaded for this. + * When a pty descriptor is unused, its number is set to -1 giving + * more consistent and traditional allocation orders to pty numbers. + * + * Locking: (p) indicates that the field is locked by the global pt_mtx. + * (c) indicates the value is constant after allocation. Other fields + * await tty locking generally, and are protected by Giant. + */ +struct pt_desc { + int pt_inuse; /* (p) in use flag */ + int pt_num; /* (c) pty number */ + LIST_ENTRY(pt_desc) pt_list; /* (p) global pty list */ + + int pt_flags; + struct selinfo pt_selr, pt_selw; + u_char pt_send; + u_char pt_ucntl; + struct tty *pt_tty; + struct cdev *pt_devs, *pt_devc; + int pt_pts_open, pt_ptc_open; + struct prison *pt_prison; +}; + +/* + * Maximum # of ptys is limited by the maximum number of minor device + * numbers. We maintain a global linked list of in-use ptys so that + * we allocate new ttys with unique pty numbers. pt_free is a count + * of "free" entries in the list. pt_inuse is the number of currently + * "in use" ptys with numbers allocated. All variables are protected + * by pt_mtx. + */ +static struct mtx pt_mtx; +static LIST_HEAD(,pt_desc) pt_list; + +#define PTY_MAX 256 + +#define PF_PKT 0x008 /* packet mode */ +#define PF_STOPPED 0x010 /* user told stopped */ +#define PF_REMOTE 0x020 /* remote and flow controlled input */ +#define PF_NOSTOP 0x040 +#define PF_UCNTL 0x080 /* user control mode */ +#define PF_COPEN 0x100 /* control half open */ +#define PF_SOPEN 0x200 /* slave half open */ + +/* + * Given a pty descriptor, search for an available pty number, set it up, + * and return it. If no pty number is available, return -1 and don't + * update pt->pt_num. For locking reasons, the returned pt_desc should + * be immediately added to the pty list on return without first dropping + * the lock, or a collision may arise. + */ +static int +pty_getnumber(struct pt_desc *pt) +{ + struct pt_desc *pt_test; + int i, collision; + + mtx_assert(&pt_mtx, MA_OWNED); + KASSERT(pt->pt_num == -1, ("pty_getnumber: pt_num != -1 at start")); + for (i = 0; i < PTY_MAX; i++) { + collision = 0; + LIST_FOREACH(pt_test, &pt_list, pt_list) { + if (pt_test->pt_num == i) { + collision = 1; + break; + } + } + if (!collision) { + pt->pt_num = i; + return (i); + } + } + return (-1); +} + +/* + * If there's a free pty descriptor in the pty descriptor list, retrieve it. + * Otherwise, allocate a new one, initialize it, and hook it up. If there's + * not a tty number, reject. + */ +static struct pt_desc * +pty_new(void) +{ + struct pt_desc *pt; + + mtx_lock(&pt_mtx); + LIST_FOREACH(pt, &pt_list, pt_list) { + if (!pt->pt_inuse) + break; + } + if (pt == NULL) { + mtx_unlock(&pt_mtx); + pt = malloc(sizeof(*pt), M_PTY, M_WAITOK | M_ZERO); + mtx_lock(&pt_mtx); + if (pty_getnumber(pt) == -1) { + mtx_unlock(&pt_mtx); + free(pt, M_PTY); + return (NULL); + } + pt->pt_inuse = 1; + LIST_INSERT_HEAD(&pt_list, pt, pt_list); + mtx_unlock(&pt_mtx); + pt->pt_tty = ttymalloc(pt->pt_tty); + } else { + pt->pt_inuse = 1; + mtx_unlock(&pt_mtx); + } + return (pt); +} + +/* + * Release a pty descriptor back to the pool for reuse. The pty number + * remains allocated. + */ +static void +pty_release(struct pt_desc *pt) +{ + + KASSERT(pt->pt_ptc_open == 0 && pt->pt_pts_open == 0, + ("pty_release: pts/%d freed while open\n", pt->pt_num)); + KASSERT(pt->pt_devs == NULL && pt->pt_devc == NULL, + ("pty_release: pts/%d freed whith non-null struct cdev\n", pt->pt_num)); + mtx_assert(&pt_mtx, MA_OWNED); + pt->pt_inuse = 0; +} + +/* + * Given a pty descriptor, if both endpoints are closed, release all + * resources and destroy the device nodes to flush file system level + * state for the tty (owner, avoid races, etc). + */ +static void +pty_maybecleanup(struct pt_desc *pt) +{ + + if (pt->pt_ptc_open || pt->pt_pts_open) + return; + + printf("destroying pty %d\n", pt->pt_num); + + destroy_dev(pt->pt_devs); + destroy_dev(pt->pt_devc); + pt->pt_devs = pt->pt_devc = NULL; + pt->pt_tty->t_dev = NULL; + + mtx_lock(&pt_mtx); + pty_release(pt); + mtx_unlock(&pt_mtx); +} + +/*ARGSUSED*/ +static int +ptsopen(struct cdev *dev, int flag, int devtype, struct thread *td) +{ + struct tty *tp; + int error; + struct pt_desc *pt; + + pt = dev->si_drv1; + tp = dev->si_tty; + if ((tp->t_state & TS_ISOPEN) == 0) { + ttychars(tp); /* Set up default chars */ + tp->t_iflag = TTYDEF_IFLAG; + tp->t_oflag = TTYDEF_OFLAG; + tp->t_lflag = TTYDEF_LFLAG; + tp->t_cflag = TTYDEF_CFLAG; + tp->t_ispeed = tp->t_ospeed = TTYDEF_SPEED; + } else if (tp->t_state & TS_XCLUDE && suser(td)) { + return (EBUSY); + } else if (pt->pt_prison != td->td_ucred->cr_prison) { + return (EBUSY); + } + if (tp->t_oproc) /* Ctrlr still around. */ + ttyld_modem(tp, 1); + while ((tp->t_state & TS_CARR_ON) == 0) { + if (flag&FNONBLOCK) + break; + error = ttysleep(tp, TSA_CARR_ON(tp), TTIPRI | PCATCH, + "ptsopn", 0); + if (error) + return (error); + } + error = ttyld_open(tp, dev); + if (error == 0) { + ptcwakeup(tp, FREAD|FWRITE); + pt->pt_pts_open++; + } + return (error); +} + +static int +ptsclose(struct cdev *dev, int flag, int mode, struct thread *td) +{ + struct pt_desc *pt = dev->si_drv1; + struct tty *tp; + int err; + + tp = dev->si_tty; + err = ttyld_close(tp, flag); + ptsstop(tp, FREAD|FWRITE); + (void) tty_close(tp); + pt->pt_pts_open--; + pty_maybecleanup(pt); + return (err); +} + +static int +ptsread(struct cdev *dev, struct uio *uio, int flag) +{ + struct thread *td = curthread; + struct proc *p = td->td_proc; + struct tty *tp = dev->si_tty; + struct pt_desc *pt = dev->si_drv1; + struct pgrp *pg; + int error = 0; + +again: + if (pt->pt_flags & PF_REMOTE) { + while (isbackground(p, tp)) { + sx_slock(&proctree_lock); + PROC_LOCK(p); + if (SIGISMEMBER(p->p_sigacts->ps_sigignore, SIGTTIN) || + SIGISMEMBER(td->td_sigmask, SIGTTIN) || + p->p_pgrp->pg_jobc == 0 || p->p_flag & P_PPWAIT) { + PROC_UNLOCK(p); + sx_sunlock(&proctree_lock); + return (EIO); + } + pg = p->p_pgrp; + PROC_UNLOCK(p); + PGRP_LOCK(pg); + sx_sunlock(&proctree_lock); + pgsignal(pg, SIGTTIN, 1); + PGRP_UNLOCK(pg); + error = ttysleep(tp, &lbolt, TTIPRI | PCATCH, "ptsbg", + 0); + if (error) + return (error); + } + if (tp->t_canq.c_cc == 0) { + if (flag & IO_NDELAY) + return (EWOULDBLOCK); + error = ttysleep(tp, TSA_PTS_READ(tp), TTIPRI | PCATCH, + "ptsin", 0); + if (error) + return (error); + goto again; + } + while (tp->t_canq.c_cc > 1 && uio->uio_resid > 0) + if (ureadc(getc(&tp->t_canq), uio) < 0) { + error = EFAULT; + break; + } + if (tp->t_canq.c_cc == 1) + (void) getc(&tp->t_canq); + if (tp->t_canq.c_cc) + return (error); + } else + if (tp->t_oproc) + ttyld_read(tp, uio, flag); + ptcwakeup(tp, FWRITE); + return (error); +} + +/* + * Write to pseudo-tty. + * Wakeups of controlling tty will happen + * indirectly, when tty driver calls ptsstart. + */ +static int +ptswrite(struct cdev *dev, struct uio *uio, int flag) +{ + struct tty *tp; + + tp = dev->si_tty; + if (tp->t_oproc == 0) + return (EIO); + return (ttyld_write(tp, uio, flag)); +} + +/* + * Start output on pseudo-tty. + * Wake up process selecting or sleeping for input from controlling tty. + */ +static void +ptsstart(struct tty *tp) +{ + struct pt_desc *pt = tp->t_dev->si_drv1; + + if (tp->t_state & TS_TTSTOP) + return; + if (pt->pt_flags & PF_STOPPED) { + pt->pt_flags &= ~PF_STOPPED; + pt->pt_send = TIOCPKT_START; + } + ptcwakeup(tp, FREAD); +} + +static void +ptcwakeup(struct tty *tp, int flag) +{ + struct pt_desc *pt = tp->t_dev->si_drv1; + + if (flag & FREAD) { + selwakeup(&pt->pt_selr); + wakeup(TSA_PTC_READ(tp)); + } + if (flag & FWRITE) { + selwakeup(&pt->pt_selw); + wakeup(TSA_PTC_WRITE(tp)); + } +} + +/* + * ptcopen implementes exclusive access to the master/control device + * as well as creating the slave device based on the credential of the + * process opening the master. By creating the slave here, we avoid + * a race to access the master in terms of having a process with access + * to an incorrectly owned slave, but it does create the possibility + * that a racing process can cause a ptmx user to get EIO if it gets + * there first. Consumers of ptmx must look for EIO and retry if it + * happens. VFS locking may actually prevent this from occurring due + * to the lookup into devfs holding the vnode lock through open, but + * it's better to be careful. + */ +static int +ptcopen(struct cdev *dev, int flag, int devtype, struct thread *td) +{ + struct pt_desc *pt = dev->si_drv1; + struct ucred *cred = td->td_ucred; + struct tty *tp; + struct cdev *devs; + + tp = dev->si_tty; + if (tp->t_oproc) + return (EIO); + + /* + * XXX: Might want to make the ownership/permissions here more + * configurable. + */ + pt->pt_devs = devs = make_dev(&pts_cdevsw, pt->pt_num, cred->cr_ruid, + GID_WHEEL, 0620, "pts/%d", pt->pt_num); + devs->si_drv1 = pt; + devs->si_tty = pt->pt_tty; + pt->pt_tty->t_dev = devs; + + tp->t_timeout = -1; + tp->t_oproc = ptsstart; + tp->t_stop = ptsstop; + ttyld_modem(tp, 1); + tp->t_lflag &= ~EXTPROC; + pt = dev->si_drv1; + pt->pt_prison = td->td_ucred->cr_prison; + pt->pt_flags = 0; + pt->pt_send = 0; + pt->pt_ucntl = 0; + pt->pt_ptc_open++; + return (0); +} + +static int +ptcclose(struct cdev *dev, int flags, int fmt, struct thread *td) +{ + struct pt_desc *pt = dev->si_drv1; + struct tty *tp; + + tp = dev->si_tty; + ttyld_modem(tp, 0); + + /* + * XXX MDMBUF makes no sense for ptys but would inhibit the above + * l_modem(). CLOCAL makes sense but isn't supported. Special + * l_modem()s that ignore carrier drop make no sense for ptys but + * may be in use because other parts of the line discipline make + * sense for ptys. Recover by doing everything that a normal + * ttymodem() would have done except for sending a SIGHUP. + */ + if (tp->t_state & TS_ISOPEN) { + tp->t_state &= ~(TS_CARR_ON | TS_CONNECTED); + tp->t_state |= TS_ZOMBIE; + ttyflush(tp, FREAD | FWRITE); + } + + tp->t_oproc = 0; /* mark closed */ + pt->pt_ptc_open--; + pty_maybecleanup(pt); + return (0); +} + +static int +ptcread(struct cdev *dev, struct uio *uio, int flag) +{ + struct tty *tp = dev->si_tty; + struct pt_desc *pt = dev->si_drv1; + char buf[BUFSIZ]; + int error = 0, cc; + + /* + * We want to block until the slave + * is open, and there's something to read; + * but if we lost the slave or we're NBIO, + * then return the appropriate error instead. + */ + for (;;) { + if (tp->t_state&TS_ISOPEN) { + if (pt->pt_flags&PF_PKT && pt->pt_send) { + error = ureadc((int)pt->pt_send, uio); + if (error) + return (error); + if (pt->pt_send & TIOCPKT_IOCTL) { + cc = min(uio->uio_resid, + sizeof(tp->t_termios)); + uiomove(&tp->t_termios, cc, uio); + } + pt->pt_send = 0; + return (0); + } + if (pt->pt_flags&PF_UCNTL && pt->pt_ucntl) { + error = ureadc((int)pt->pt_ucntl, uio); + if (error) + return (error); + pt->pt_ucntl = 0; + return (0); + } + if (tp->t_outq.c_cc && (tp->t_state&TS_TTSTOP) == 0) + break; + } + if ((tp->t_state & TS_CONNECTED) == 0) + return (0); /* EOF */ + if (flag & IO_NDELAY) + return (EWOULDBLOCK); + error = tsleep(TSA_PTC_READ(tp), TTIPRI | PCATCH, "ptcin", 0); + if (error) + return (error); + } + if (pt->pt_flags & (PF_PKT|PF_UCNTL)) + error = ureadc(0, uio); + while (uio->uio_resid > 0 && error == 0) { + cc = q_to_b(&tp->t_outq, buf, min(uio->uio_resid, BUFSIZ)); + if (cc <= 0) + break; + error = uiomove(buf, cc, uio); + } + ttwwakeup(tp); + return (error); +} + +static void +ptsstop(struct tty *tp, int flush) +{ + struct pt_desc *pt = tp->t_dev->si_drv1; + int flag; + + /* note: FLUSHREAD and FLUSHWRITE already ok */ + if (flush == 0) { + flush = TIOCPKT_STOP; + pt->pt_flags |= PF_STOPPED; + } else + pt->pt_flags &= ~PF_STOPPED; + pt->pt_send |= flush; + /* change of perspective */ + flag = 0; + if (flush & FREAD) + flag |= FWRITE; + if (flush & FWRITE) + flag |= FREAD; + ptcwakeup(tp, flag); +} + +static int +ptcpoll(struct cdev *dev, int events, struct thread *td) +{ + struct tty *tp = dev->si_tty; + struct pt_desc *pt = dev->si_drv1; + int revents = 0; + int s; + + if ((tp->t_state & TS_CONNECTED) == 0) + return (events & + (POLLHUP | POLLIN | POLLRDNORM | POLLOUT | POLLWRNORM)); + + /* + * Need to block timeouts (ttrstart). + */ + s = spltty(); + + if (events & (POLLIN | POLLRDNORM)) + if ((tp->t_state & TS_ISOPEN) && + ((tp->t_outq.c_cc && (tp->t_state & TS_TTSTOP) == 0) || + ((pt->pt_flags & PF_PKT) && pt->pt_send) || + ((pt->pt_flags & PF_UCNTL) && pt->pt_ucntl))) + revents |= events & (POLLIN | POLLRDNORM); + + if (events & (POLLOUT | POLLWRNORM)) + if (tp->t_state & TS_ISOPEN && + ((pt->pt_flags & PF_REMOTE) ? + (tp->t_canq.c_cc == 0) : + ((tp->t_rawq.c_cc + tp->t_canq.c_cc < TTYHOG - 2) || + (tp->t_canq.c_cc == 0 && (tp->t_lflag & ICANON))))) + revents |= events & (POLLOUT | POLLWRNORM); + + if (events & POLLHUP) + if ((tp->t_state & TS_CARR_ON) == 0) + revents |= POLLHUP; + + if (revents == 0) { + if (events & (POLLIN | POLLRDNORM)) + selrecord(td, &pt->pt_selr); + + if (events & (POLLOUT | POLLWRNORM)) + selrecord(td, &pt->pt_selw); + } + splx(s); + + return (revents); +} + +static int +ptcwrite(struct cdev *dev, struct uio *uio, int flag) +{ + struct tty *tp = dev->si_tty; + u_char *cp = 0; + int cc = 0; + u_char locbuf[BUFSIZ]; + int cnt = 0; + struct pt_desc *pt = dev->si_drv1; + int error = 0; + +again: + if ((tp->t_state&TS_ISOPEN) == 0) + goto block; + if (pt->pt_flags & PF_REMOTE) { + if (tp->t_canq.c_cc) + goto block; + while ((uio->uio_resid > 0 || cc > 0) && + tp->t_canq.c_cc < TTYHOG - 1) { + if (cc == 0) { + cc = min(uio->uio_resid, BUFSIZ); + cc = min(cc, TTYHOG - 1 - tp->t_canq.c_cc); + cp = locbuf; + error = uiomove(cp, cc, uio); + if (error) + return (error); + /* check again for safety */ + if ((tp->t_state & TS_ISOPEN) == 0) { + /* adjust as usual */ + uio->uio_resid += cc; + return (EIO); + } + } + if (cc > 0) { + cc = b_to_q((char *)cp, cc, &tp->t_canq); + /* + * XXX we don't guarantee that the canq size + * is >= TTYHOG, so the above b_to_q() may + * leave some bytes uncopied. However, space + * is guaranteed for the null terminator if + * we don't fail here since (TTYHOG - 1) is + * not a multiple of CBSIZE. + */ + if (cc > 0) + break; + } + } + /* adjust for data copied in but not written */ + uio->uio_resid += cc; + (void) putc(0, &tp->t_canq); + ttwakeup(tp); + wakeup(TSA_PTS_READ(tp)); + return (0); + } + while (uio->uio_resid > 0 || cc > 0) { + if (cc == 0) { + cc = min(uio->uio_resid, BUFSIZ); + cp = locbuf; + error = uiomove(cp, cc, uio); + if (error) + return (error); + /* check again for safety */ + if ((tp->t_state & TS_ISOPEN) == 0) { + /* adjust for data copied in but not written */ + uio->uio_resid += cc; + return (EIO); + } + } + while (cc > 0) { + if ((tp->t_rawq.c_cc + tp->t_canq.c_cc) >= TTYHOG - 2 && + (tp->t_canq.c_cc > 0 || !(tp->t_lflag&ICANON))) { + wakeup(TSA_HUP_OR_INPUT(tp)); + goto block; + } + ttyld_rint(tp, *cp++); + cnt++; + cc--; + } + cc = 0; + } + return (0); +block: + /* + * Come here to wait for slave to open, for space + * in outq, or space in rawq, or an empty canq. + */ + if ((tp->t_state & TS_CONNECTED) == 0) { + /* adjust for data copied in but not written */ + uio->uio_resid += cc; + return (EIO); + } + if (flag & IO_NDELAY) { + /* adjust for data copied in but not written */ + uio->uio_resid += cc; + if (cnt == 0) + return (EWOULDBLOCK); + return (0); + } + error = tsleep(TSA_PTC_WRITE(tp), TTOPRI | PCATCH, "ptcout", 0); + if (error) { + /* adjust for data copied in but not written */ + uio->uio_resid += cc; + return (error); + } + goto again; +} + +static int +ptcioctl(struct cdev *dev, u_long cmd, caddr_t data, int flag, struct thread *td) +{ + struct tty *tp = dev->si_tty; + struct pt_desc *pt = dev->si_drv1; + + switch (cmd) { + + case TIOCGPGRP: + /* + * We avoid calling ttioctl on the controller since, + * in that case, tp must be the controlling terminal. + */ + *(int *)data = tp->t_pgrp ? tp->t_pgrp->pg_id : 0; + return (0); + + case TIOCPKT: + if (*(int *)data) { + if (pt->pt_flags & PF_UCNTL) + return (EINVAL); + pt->pt_flags |= PF_PKT; + } else + pt->pt_flags &= ~PF_PKT; + return (0); + + case TIOCUCNTL: + if (*(int *)data) { + if (pt->pt_flags & PF_PKT) + return (EINVAL); + pt->pt_flags |= PF_UCNTL; + } else + pt->pt_flags &= ~PF_UCNTL; + return (0); + } + + /* + * The rest of the ioctls shouldn't be called until + * the slave is open. + */ + if ((tp->t_state & TS_ISOPEN) == 0) + return (EAGAIN); + + switch (cmd) { +#ifdef COMPAT_43 + case TIOCSETP: + case TIOCSETN: +#endif + case TIOCSETD: + case TIOCSETA: + case TIOCSETAW: + case TIOCSETAF: + /* + * IF CONTROLLER STTY THEN MUST FLUSH TO PREVENT A HANG. + * ttywflush(tp) will hang if there are characters in + * the outq. + */ + ndflush(&tp->t_outq, tp->t_outq.c_cc); + break; + + case TIOCSIG: + if (*(unsigned int *)data >= NSIG || + *(unsigned int *)data == 0) + return(EINVAL); + if ((tp->t_lflag&NOFLSH) == 0) + ttyflush(tp, FREAD|FWRITE); + if (tp->t_pgrp != NULL) { + PGRP_LOCK(tp->t_pgrp); + pgsignal(tp->t_pgrp, *(unsigned int *)data, 1); + PGRP_UNLOCK(tp->t_pgrp); + } + if ((*(unsigned int *)data == SIGINFO) && + ((tp->t_lflag&NOKERNINFO) == 0)) + ttyinfo(tp); + return(0); + } + return (ptsioctl(dev, cmd, data, flag, td)); +} +/*ARGSUSED*/ +static int +ptsioctl(struct cdev *dev, u_long cmd, caddr_t data, int flag, struct thread *td) +{ + struct tty *tp = dev->si_tty; + struct pt_desc *pt = dev->si_drv1; + u_char *cc = tp->t_cc; + int stop, error; + + if (cmd == TIOCEXT) { + /* + * When the EXTPROC bit is being toggled, we need + * to send an TIOCPKT_IOCTL if the packet driver + * is turned on. + */ + if (*(int *)data) { + if (pt->pt_flags & PF_PKT) { + pt->pt_send |= TIOCPKT_IOCTL; + ptcwakeup(tp, FREAD); + } + tp->t_lflag |= EXTPROC; + } else { + if ((tp->t_lflag & EXTPROC) && + (pt->pt_flags & PF_PKT)) { + pt->pt_send |= TIOCPKT_IOCTL; + ptcwakeup(tp, FREAD); + } + tp->t_lflag &= ~EXTPROC; + } + return(0); + } + error = ttioctl(tp, cmd, data, flag); + if (error == ENOTTY) { + if (pt->pt_flags & PF_UCNTL && + (cmd & ~0xff) == UIOCCMD(0)) { + if (cmd & 0xff) { + pt->pt_ucntl = (u_char)cmd; + ptcwakeup(tp, FREAD); + } + return (0); + } + error = ENOTTY; + } + /* + * If external processing and packet mode send ioctl packet. + */ + if ((tp->t_lflag&EXTPROC) && (pt->pt_flags & PF_PKT)) { + switch(cmd) { + case TIOCSETA: + case TIOCSETAW: + case TIOCSETAF: +#ifdef COMPAT_43 + case TIOCSETP: + case TIOCSETN: +#endif +#if defined(COMPAT_43) || defined(COMPAT_SUNOS) + case TIOCSETC: + case TIOCSLTC: + case TIOCLBIS: + case TIOCLBIC: + case TIOCLSET: +#endif + pt->pt_send |= TIOCPKT_IOCTL; + ptcwakeup(tp, FREAD); + break; + default: + break; + } + } + stop = (tp->t_iflag & IXON) && CCEQ(cc[VSTOP], CTRL('s')) + && CCEQ(cc[VSTART], CTRL('q')); + if (pt->pt_flags & PF_NOSTOP) { + if (stop) { + pt->pt_send &= ~TIOCPKT_NOSTOP; + pt->pt_send |= TIOCPKT_DOSTOP; + pt->pt_flags &= ~PF_NOSTOP; + ptcwakeup(tp, FREAD); + } + } else { + if (!stop) { + pt->pt_send &= ~TIOCPKT_DOSTOP; + pt->pt_send |= TIOCPKT_NOSTOP; + pt->pt_flags |= PF_NOSTOP; + ptcwakeup(tp, FREAD); + } + } + return (error); +} + +/* + * Match lookups on /dev/ptmx, find the next free pty (if any), set up + * the pty descriptor, register it, and return a reference to the master. + * + * pts == /dev/pts/xxx (oldstyle: ttyp...) + * ptc == /dev/pty/xxx (oldstyle: ptyp...) + */ +static void +pty_clone(void *arg, char *name, int namelen, struct cdev **dev) +{ + struct ucred *cred = curthread->td_ucred; /* XXX */ + struct pt_desc *pt; + struct cdev *devc; + + if (*dev != NULL) + return; + + if (strcmp(name, "ptmx") != 0) + return; + + pt = pty_new(); + if (pt == NULL) + return; + + /* + * XXX: Lack of locking here considered worrying. We expose the + * pts/pty device nodes before they are fully initialized, although + * Giant likely protects us (unless make_dev blocks...?). + * + * XXX: If a process performs a lookup on /dev/ptmx but never an + * open, we won't GC the device node. We should have a callout + * sometime later that GC's device instances that were never + * opened, or some way to tell devfs that "this had better be for + * an open() or we won't create a device". + */ + pt->pt_devc = devc = make_dev(&ptc_cdevsw, pt->pt_num, UID_ROOT, + GID_WHEEL, 0666, "pty%d", pt->pt_num); + + devc->si_drv1 = pt; + devc->si_tty = pt->pt_tty; + *dev = devc; + + printf("pty_clone: allocated pty %d to uid %d\n", pt->pt_num, + cred->cr_ruid); + + return; +} + +static void +pty_drvinit(void *unused) +{ + + mtx_init(&pt_mtx, "pt_mtx", NULL, MTX_DEF); + LIST_INIT(&pt_list); + EVENTHANDLER_REGISTER(dev_clone, pty_clone, 0, 1000); +} + +SYSINIT(ptydev,SI_SUB_DRIVERS,SI_ORDER_MIDDLE,pty_drvinit,NULL) Index: conf/files =================================================================== RCS file: /home/ncvs/src/sys/conf/files,v retrieving revision 1.956 diff -u -p -r1.956 files --- conf/files 8 Oct 2004 00:24:30 -0000 1.956 +++ conf/files 11 Oct 2004 14:35:27 -0000 @@ -1158,6 +1158,7 @@ kern/tty.c standard kern/tty_compat.c standard kern/tty_conf.c standard kern/tty_cons.c standard +kern/tty_pts.c optional pts kern/tty_pty.c optional pty kern/tty_subr.c standard kern/tty_tty.c standard