summaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authorcognet <cognet@FreeBSD.org>2006-01-26 01:30:34 +0000
committercognet <cognet@FreeBSD.org>2006-01-26 01:30:34 +0000
commitaff5d6bf80c7cee1d2a2e3b664554663ba72ae78 (patch)
tree781a0e3abe81e06061d092e0f9ce65e0421206c0
parentc912f7e052a7a4f90c0e7de657678a40d3d13619 (diff)
downloadFreeBSD-src-aff5d6bf80c7cee1d2a2e3b664554663ba72ae78.zip
FreeBSD-src-aff5d6bf80c7cee1d2a2e3b664554663ba72ae78.tar.gz
Bring in a sysv-style pts implementation, as found in the rwatson_pts perforce branch. It works the same as its SysV/linux counterpart : You obtain a fd to the master pseudo terminal by opening /dev/ptmx, which craetes a node for the master as /dev/pty[num] and a node for the slave as /dev/pts/[num].
It should play nicely with the existing BSD ptys. By default, the system will use the BSD ptys, one can set the sysctl kern.pts.enable to 1 to make it use the new pts system. The max number of pty that can be allocated on a system can be changed with the sysctl kern.pts.max. It defaults to 1000, and can be increased, but it is not recommanded, as any pty with a number > 999 won't be handled by whatever uses utmp(5).
-rw-r--r--sys/conf/files1
-rw-r--r--sys/kern/tty_pts.c970
-rw-r--r--sys/kern/tty_pty.c61
-rw-r--r--sys/sys/ttycom.h2
4 files changed, 1026 insertions, 8 deletions
diff --git a/sys/conf/files b/sys/conf/files
index 773b690..80cc86f 100644
--- a/sys/conf/files
+++ b/sys/conf/files
@@ -1336,6 +1336,7 @@ kern/tty_compat.c optional compat_43tty
kern/tty_conf.c standard
kern/tty_cons.c standard
kern/tty_pty.c optional pty
+kern/tty_pts.c optional pty
kern/tty_subr.c standard
kern/tty_tty.c standard
kern/uipc_accf.c optional inet
diff --git a/sys/kern/tty_pts.c b/sys/kern/tty_pts.c
new file mode 100644
index 0000000..2f409b7
--- /dev/null
+++ b/sys/kern/tty_pts.c
@@ -0,0 +1,970 @@
+/*
+ * Copyright (c) 2006 Robert N. M. Watson
+ * Copyright (c) 2006 Olivier Houchard
+ * Copyright (c) 2003 Networks Associates Technology, Inc.
+ * All rights reserved.
+ *
+ * This software was developed for the FreeBSD Project in part by Network
+ * Associates Laboratories, the Security Research Division of Network
+ * Associates, Inc. under DARPA/SPAWAR contract N66001-01-C-8035 ("CBOSS"),
+ * as part of the DARPA CHATS research program.
+ *
+ * Copyright (c) 1982, 1986, 1989, 1993
+ * The Regents of the University of California. All rights reserved.
+ *
+ * Redistribution and use in source and binary forms, with or without
+ * modification, are permitted provided that the following conditions
+ * are met:
+ * 1. Redistributions of source code must retain the above copyright
+ * notice, this list of conditions and the following disclaimer.
+ * 2. Redistributions in binary form must reproduce the above copyright
+ * notice, this list of conditions and the following disclaimer in the
+ * documentation and/or other materials provided with the distribution.
+ * 4. Neither the name of the University nor the names of its contributors
+ * may be used to endorse or promote products derived from this software
+ * without specific prior written permission.
+ *
+ * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
+ * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
+ * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
+ * ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
+ * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
+ * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
+ * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
+ * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
+ * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
+ * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
+ * SUCH DAMAGE.
+ *
+ * @(#)tty_pty.c 8.4 (Berkeley) 2/20/95
+ */
+
+#include <sys/cdefs.h>
+__FBSDID("$FreeBSD$");
+
+/*
+ * Pseudo-teletype Driver
+ * (Actually two drivers, requiring two entries in 'cdevsw')
+ */
+#include "opt_compat.h"
+#include "opt_tty.h"
+#include <sys/param.h>
+#include <sys/systm.h>
+#include <sys/lock.h>
+#include <sys/mutex.h>
+#include <sys/sx.h>
+#if defined(COMPAT_43TTY)
+#include <sys/ioctl_compat.h>
+#endif
+#include <sys/proc.h>
+#include <sys/queue.h>
+#include <sys/tty.h>
+#include <sys/fcntl.h>
+#include <sys/poll.h>
+#include <sys/kernel.h>
+#include <sys/vnode.h>
+#include <sys/signalvar.h>
+#include <sys/malloc.h>
+#include <sys/conf.h>
+#include <sys/sysctl.h>
+#include <sys/filio.h>
+
+static MALLOC_DEFINE(M_PTY, "ptys", "pty data structures");
+
+static void ptsstart(struct tty *tp);
+static void ptsstop(struct tty *tp, int rw);
+static void ptcwakeup(struct tty *tp, int flag);
+
+static d_open_t ptsopen;
+static d_close_t ptsclose;
+static d_read_t ptsread;
+static d_write_t ptswrite;
+static d_ioctl_t ptsioctl;
+static d_ioctl_t ptcioctl;
+static d_open_t ptcopen;
+static d_close_t ptcclose;
+static d_read_t ptcread;
+static d_write_t ptcwrite;
+static d_poll_t ptcpoll;
+
+static struct cdevsw pts_cdevsw = {
+ .d_version = D_VERSION,
+ .d_open = ptsopen,
+ .d_close = ptsclose,
+ .d_read = ptsread,
+ .d_write = ptswrite,
+ .d_ioctl = ptsioctl,
+ .d_poll = ttypoll,
+ .d_name = "pts",
+ .d_flags = D_TTY | D_NEEDGIANT,
+ .d_kqfilter = ttykqfilter,
+};
+
+static struct cdevsw ptc_cdevsw = {
+ .d_version = D_VERSION,
+ .d_open = ptcopen,
+ .d_close = ptcclose,
+ .d_read = ptcread,
+ .d_write = ptcwrite,
+ .d_ioctl = ptcioctl,
+ .d_poll = ptcpoll,
+ .d_name = "ptc",
+ .d_flags = D_TTY | D_NEEDGIANT,
+ .d_kqfilter = ttykqfilter,
+};
+
+#define BUFSIZ 100 /* Chunk size iomoved to/from user */
+
+#define TSA_PTC_READ(tp) ((void *)&(tp)->t_outq.c_cf)
+#define TSA_PTC_WRITE(tp) ((void *)&(tp)->t_rawq.c_cl)
+#define TSA_PTS_READ(tp) ((void *)&(tp)->t_canq)
+
+/*-
+ * Once a tty is allocated, it cannot (currently) be freed. As such,
+ * we keep a global list of ptys that have been used so we can recycle
+ * them. An another list is provided for released pts, whiiich are
+ * not currently allocated, permitting reuse. pt_flags holds state
+ * associated with a particular session, so isn't overloaded for this.
+ * When a pty descriptor is unused, its number is set to -1 giving
+ * more consistent and traditional allocation orders to pty numbers.
+ *
+ * Locking: (p) indicates that the field is locked by the global pt_mtx.
+ * (c) indicates the value is constant after allocation. Other fields
+ * await tty locking generally, and are protected by Giant.
+ */
+struct pt_desc {
+ int pt_num; /* (c) pty number */
+ LIST_ENTRY(pt_desc) pt_list; /* (p) global pty list */
+
+ int pt_flags;
+ struct selinfo pt_selr, pt_selw;
+ u_char pt_send;
+ u_char pt_ucntl;
+ struct tty *pt_tty;
+ struct cdev *pt_devs, *pt_devc;
+ int pt_pts_open, pt_ptc_open;
+ struct prison *pt_prison;
+};
+
+static struct mtx pt_mtx;
+static LIST_HEAD(,pt_desc) pt_list;
+static LIST_HEAD(,pt_desc) pt_free_list;
+
+#define PF_PKT 0x008 /* packet mode */
+#define PF_STOPPED 0x010 /* user told stopped */
+#define PF_REMOTE 0x020 /* remote and flow controlled input */
+#define PF_NOSTOP 0x040
+#define PF_UCNTL 0x080 /* user control mode */
+#define PF_COPEN 0x100 /* control half open */
+#define PF_SOPEN 0x200 /* slave half open */
+
+static unsigned int next_avail_nb;
+
+static int use_old_pty = 0;
+
+static unsigned int max_pts = 1000;
+
+static unsigned int nb_allocated;
+
+TUNABLE_INT("kern.pts.enable", &use_old_pty);
+
+SYSCTL_NODE(_kern, OID_AUTO, pts, CTLFLAG_RD, 0, "pts");
+
+SYSCTL_INT(_kern_pts, OID_AUTO, enable, CTLFLAG_RW, &use_old_pty, 0,
+ "enable pts");
+
+SYSCTL_INT(_kern_pts, OID_AUTO, max, CTLFLAG_RW, &max_pts, 0,
+ "max pts");
+
+/*
+ * If there's a free pty descriptor in the pty descriptor list, retrieve it.
+ * Otherwise, allocate a new one, initialize it, and hook it up. If there's
+ * not a tty number, reject.
+ */
+static struct pt_desc *
+pty_new(void)
+{
+ struct pt_desc *pt;
+ int nb;
+
+ mtx_lock(&pt_mtx);
+ if (nb_allocated >= max_pts) {
+ mtx_unlock(&pt_mtx);
+ return (NULL);
+ }
+ pt = LIST_FIRST(&pt_free_list);
+ if (pt) {
+ LIST_REMOVE(pt, pt_list);
+ LIST_INSERT_HEAD(&pt_list, pt, pt_list);
+ mtx_unlock(&pt_mtx);
+ } else {
+ nb = next_avail_nb++;
+ mtx_unlock(&pt_mtx);
+ pt = malloc(sizeof(*pt), M_PTY, M_WAITOK | M_ZERO);
+ mtx_lock(&pt_mtx);
+ pt->pt_num = nb;
+ LIST_INSERT_HEAD(&pt_list, pt, pt_list);
+ mtx_unlock(&pt_mtx);
+ pt->pt_tty = ttyalloc();
+ }
+ nb_allocated++;
+ return (pt);
+}
+
+/*
+ * Release a pty descriptor back to the pool for reuse. The pty number
+ * remains allocated.
+ */
+static void
+pty_release(struct pt_desc *pt)
+{
+
+ KASSERT(pt->pt_ptc_open == 0 && pt->pt_pts_open == 0,
+ ("pty_release: pts/%d freed while open\n", pt->pt_num));
+ KASSERT(pt->pt_devs == NULL && pt->pt_devc == NULL,
+ ("pty_release: pts/%d freed whith non-null struct cdev\n", pt->pt_num));
+ mtx_assert(&pt_mtx, MA_OWNED);
+ nb_allocated--;
+ LIST_REMOVE(pt, pt_list);
+ LIST_INSERT_HEAD(&pt_free_list, pt, pt_list);
+}
+
+/*
+ * Given a pty descriptor, if both endpoints are closed, release all
+ * resources and destroy the device nodes to flush file system level
+ * state for the tty (owner, avoid races, etc).
+ */
+static void
+pty_maybecleanup(struct pt_desc *pt)
+{
+
+ if (pt->pt_ptc_open || pt->pt_pts_open)
+ return;
+
+ if (bootverbose)
+ printf("destroying pty %d\n", pt->pt_num);
+
+ destroy_dev(pt->pt_devs);
+ destroy_dev(pt->pt_devc);
+ pt->pt_devs = pt->pt_devc = NULL;
+ pt->pt_tty->t_dev = NULL;
+
+ mtx_lock(&pt_mtx);
+ pty_release(pt);
+ mtx_unlock(&pt_mtx);
+}
+
+/*ARGSUSED*/
+static int
+ptsopen(struct cdev *dev, int flag, int devtype, struct thread *td)
+{
+ struct tty *tp;
+ int error;
+ struct pt_desc *pt;
+
+ pt = dev->si_drv1;
+ tp = dev->si_tty;
+ if ((tp->t_state & TS_ISOPEN) == 0) {
+ ttychars(tp); /* Set up default chars */
+ tp->t_iflag = TTYDEF_IFLAG;
+ tp->t_oflag = TTYDEF_OFLAG;
+ tp->t_lflag = TTYDEF_LFLAG;
+ tp->t_cflag = TTYDEF_CFLAG;
+ tp->t_ispeed = tp->t_ospeed = TTYDEF_SPEED;
+ } else if (tp->t_state & TS_XCLUDE && suser(td)) {
+ return (EBUSY);
+ } else if (pt->pt_prison != td->td_ucred->cr_prison) {
+ return (EBUSY);
+ }
+ if (tp->t_oproc) /* Ctrlr still around. */
+ ttyld_modem(tp, 1);
+ while ((tp->t_state & TS_CARR_ON) == 0) {
+ if (flag&FNONBLOCK)
+ break;
+ error = ttysleep(tp, TSA_CARR_ON(tp), TTIPRI | PCATCH,
+ "ptsopn", 0);
+ if (error)
+ return (error);
+ }
+ error = ttyld_open(tp, dev);
+ if (error == 0) {
+ ptcwakeup(tp, FREAD|FWRITE);
+ pt->pt_pts_open = 1;
+ }
+ return (error);
+}
+
+static int
+ptsclose(struct cdev *dev, int flag, int mode, struct thread *td)
+{
+ struct pt_desc *pt = dev->si_drv1;
+ struct tty *tp;
+ int err;
+
+ tp = dev->si_tty;
+ err = ttyld_close(tp, flag);
+ ptsstop(tp, FREAD|FWRITE);
+ (void) tty_close(tp);
+ pt->pt_pts_open = 0;
+ pty_maybecleanup(pt);
+ return (err);
+}
+
+static int
+ptsread(struct cdev *dev, struct uio *uio, int flag)
+{
+ struct thread *td = curthread;
+ struct proc *p = td->td_proc;
+ struct tty *tp = dev->si_tty;
+ struct pt_desc *pt = dev->si_drv1;
+ struct pgrp *pg;
+ int error = 0;
+
+again:
+ if (pt->pt_flags & PF_REMOTE) {
+ while (isbackground(p, tp)) {
+ sx_slock(&proctree_lock);
+ PROC_LOCK(p);
+ if (SIGISMEMBER(p->p_sigacts->ps_sigignore, SIGTTIN) ||
+ SIGISMEMBER(td->td_sigmask, SIGTTIN) ||
+ p->p_pgrp->pg_jobc == 0 || p->p_flag & P_PPWAIT) {
+ PROC_UNLOCK(p);
+ sx_sunlock(&proctree_lock);
+ return (EIO);
+ }
+ pg = p->p_pgrp;
+ PROC_UNLOCK(p);
+ PGRP_LOCK(pg);
+ sx_sunlock(&proctree_lock);
+ pgsignal(pg, SIGTTIN, 1);
+ PGRP_UNLOCK(pg);
+ error = ttysleep(tp, &lbolt, TTIPRI | PCATCH, "ptsbg",
+ 0);
+ if (error)
+ return (error);
+ }
+ if (tp->t_canq.c_cc == 0) {
+ if (flag & IO_NDELAY)
+ return (EWOULDBLOCK);
+ error = ttysleep(tp, TSA_PTS_READ(tp), TTIPRI | PCATCH,
+ "ptsin", 0);
+ if (error)
+ return (error);
+ goto again;
+ }
+ while (tp->t_canq.c_cc > 1 && uio->uio_resid > 0)
+ if (ureadc(getc(&tp->t_canq), uio) < 0) {
+ error = EFAULT;
+ break;
+ }
+ if (tp->t_canq.c_cc == 1)
+ (void) getc(&tp->t_canq);
+ if (tp->t_canq.c_cc)
+ return (error);
+ } else
+ if (tp->t_oproc)
+ ttyld_read(tp, uio, flag);
+ ptcwakeup(tp, FWRITE);
+ return (error);
+}
+
+/*
+ * Write to pseudo-tty.
+ * Wakeups of controlling tty will happen
+ * indirectly, when tty driver calls ptsstart.
+ */
+static int
+ptswrite(struct cdev *dev, struct uio *uio, int flag)
+{
+ struct tty *tp;
+
+ tp = dev->si_tty;
+ if (tp->t_oproc == 0)
+ return (EIO);
+ return (ttyld_write(tp, uio, flag));
+}
+
+/*
+ * Start output on pseudo-tty.
+ * Wake up process selecting or sleeping for input from controlling tty.
+ */
+static void
+ptsstart(struct tty *tp)
+{
+ struct pt_desc *pt = tp->t_dev->si_drv1;
+
+ if (tp->t_state & TS_TTSTOP)
+ return;
+ if (pt->pt_flags & PF_STOPPED) {
+ pt->pt_flags &= ~PF_STOPPED;
+ pt->pt_send = TIOCPKT_START;
+ }
+ ptcwakeup(tp, FREAD);
+}
+
+static void
+ptcwakeup(struct tty *tp, int flag)
+{
+ struct pt_desc *pt = tp->t_dev->si_drv1;
+
+ if (flag & FREAD) {
+ selwakeup(&pt->pt_selr);
+ wakeup(TSA_PTC_READ(tp));
+ }
+ if (flag & FWRITE) {
+ selwakeup(&pt->pt_selw);
+ wakeup(TSA_PTC_WRITE(tp));
+ }
+}
+
+/*
+ * ptcopen implementes exclusive access to the master/control device
+ * as well as creating the slave device based on the credential of the
+ * process opening the master. By creating the slave here, we avoid
+ * a race to access the master in terms of having a process with access
+ * to an incorrectly owned slave, but it does create the possibility
+ * that a racing process can cause a ptmx user to get EIO if it gets
+ * there first. Consumers of ptmx must look for EIO and retry if it
+ * happens. VFS locking may actually prevent this from occurring due
+ * to the lookup into devfs holding the vnode lock through open, but
+ * it's better to be careful.
+ */
+static int
+ptcopen(struct cdev *dev, int flag, int devtype, struct thread *td)
+{
+ struct pt_desc *pt = dev->si_drv1;
+ struct tty *tp;
+ struct cdev *devs;
+
+ tp = dev->si_tty;
+ if (tp->t_oproc)
+ return (EIO);
+
+ /*
+ * XXX: Might want to make the ownership/permissions here more
+ * configurable.
+ */
+ pt->pt_devs = devs = make_dev_cred(&pts_cdevsw, pt->pt_num,
+ td->td_ucred, UID_ROOT, GID_WHEEL, 0666, "pts/%d", pt->pt_num);
+ devs->si_drv1 = pt;
+ devs->si_tty = pt->pt_tty;
+ pt->pt_tty->t_dev = devs;
+
+ tp->t_timeout = -1;
+ tp->t_oproc = ptsstart;
+ tp->t_stop = ptsstop;
+ ttyld_modem(tp, 1);
+ tp->t_lflag &= ~EXTPROC;
+ pt = dev->si_drv1;
+ pt->pt_prison = td->td_ucred->cr_prison;
+ pt->pt_flags = 0;
+ pt->pt_send = 0;
+ pt->pt_ucntl = 0;
+ pt->pt_ptc_open = 1;
+ return (0);
+}
+
+static int
+ptcclose(struct cdev *dev, int flags, int fmt, struct thread *td)
+{
+ struct pt_desc *pt = dev->si_drv1;
+ struct tty *tp;
+
+ tp = dev->si_tty;
+ ttyld_modem(tp, 0);
+
+ /*
+ * XXX MDMBUF makes no sense for ptys but would inhibit the above
+ * l_modem(). CLOCAL makes sense but isn't supported. Special
+ * l_modem()s that ignore carrier drop make no sense for ptys but
+ * may be in use because other parts of the line discipline make
+ * sense for ptys. Recover by doing everything that a normal
+ * ttymodem() would have done except for sending a SIGHUP.
+ */
+ if (tp->t_state & TS_ISOPEN) {
+ tp->t_state &= ~(TS_CARR_ON | TS_CONNECTED);
+ tp->t_state |= TS_ZOMBIE;
+ ttyflush(tp, FREAD | FWRITE);
+ }
+
+ tp->t_oproc = 0; /* mark closed */
+ pt->pt_ptc_open = 0;
+ pty_maybecleanup(pt);
+ return (0);
+}
+
+static int
+ptcread(struct cdev *dev, struct uio *uio, int flag)
+{
+ struct tty *tp = dev->si_tty;
+ struct pt_desc *pt = dev->si_drv1;
+ char buf[BUFSIZ];
+ int error = 0, cc;
+
+ /*
+ * We want to block until the slave
+ * is open, and there's something to read;
+ * but if we lost the slave or we're NBIO,
+ * then return the appropriate error instead.
+ */
+ for (;;) {
+ if (tp->t_state&TS_ISOPEN) {
+ if (pt->pt_flags&PF_PKT && pt->pt_send) {
+ error = ureadc((int)pt->pt_send, uio);
+ if (error)
+ return (error);
+ if (pt->pt_send & TIOCPKT_IOCTL) {
+ cc = min(uio->uio_resid,
+ sizeof(tp->t_termios));
+ uiomove(&tp->t_termios, cc, uio);
+ }
+ pt->pt_send = 0;
+ return (0);
+ }
+ if (pt->pt_flags&PF_UCNTL && pt->pt_ucntl) {
+ error = ureadc((int)pt->pt_ucntl, uio);
+ if (error)
+ return (error);
+ pt->pt_ucntl = 0;
+ return (0);
+ }
+ if (tp->t_outq.c_cc && (tp->t_state&TS_TTSTOP) == 0)
+ break;
+ }
+ if ((tp->t_state & TS_CONNECTED) == 0)
+ return (0); /* EOF */
+ if (flag & IO_NDELAY)
+ return (EWOULDBLOCK);
+ error = tsleep(TSA_PTC_READ(tp), TTIPRI | PCATCH, "ptcin", 0);
+ if (error)
+ return (error);
+ }
+ if (pt->pt_flags & (PF_PKT|PF_UCNTL))
+ error = ureadc(0, uio);
+ while (uio->uio_resid > 0 && error == 0) {
+ cc = q_to_b(&tp->t_outq, buf, min(uio->uio_resid, BUFSIZ));
+ if (cc <= 0)
+ break;
+ error = uiomove(buf, cc, uio);
+ }
+ ttwwakeup(tp);
+ return (error);
+}
+
+static void
+ptsstop(struct tty *tp, int flush)
+{
+ struct pt_desc *pt = tp->t_dev->si_drv1;
+ int flag;
+
+ /* note: FLUSHREAD and FLUSHWRITE already ok */
+ if (flush == 0) {
+ flush = TIOCPKT_STOP;
+ pt->pt_flags |= PF_STOPPED;
+ } else
+ pt->pt_flags &= ~PF_STOPPED;
+ pt->pt_send |= flush;
+ /* change of perspective */
+ flag = 0;
+ if (flush & FREAD)
+ flag |= FWRITE;
+ if (flush & FWRITE)
+ flag |= FREAD;
+ ptcwakeup(tp, flag);
+}
+
+static int
+ptcpoll(struct cdev *dev, int events, struct thread *td)
+{
+ struct tty *tp = dev->si_tty;
+ struct pt_desc *pt = dev->si_drv1;
+ int revents = 0;
+ int s;
+
+ if ((tp->t_state & TS_CONNECTED) == 0)
+ return (events &
+ (POLLHUP | POLLIN | POLLRDNORM | POLLOUT | POLLWRNORM));
+
+ /*
+ * Need to block timeouts (ttrstart).
+ */
+ s = spltty();
+
+ if (events & (POLLIN | POLLRDNORM))
+ if ((tp->t_state & TS_ISOPEN) &&
+ ((tp->t_outq.c_cc && (tp->t_state & TS_TTSTOP) == 0) ||
+ ((pt->pt_flags & PF_PKT) && pt->pt_send) ||
+ ((pt->pt_flags & PF_UCNTL) && pt->pt_ucntl)))
+ revents |= events & (POLLIN | POLLRDNORM);
+
+ if (events & (POLLOUT | POLLWRNORM))
+ if (tp->t_state & TS_ISOPEN &&
+ ((pt->pt_flags & PF_REMOTE) ?
+ (tp->t_canq.c_cc == 0) :
+ ((tp->t_rawq.c_cc + tp->t_canq.c_cc < TTYHOG - 2) ||
+ (tp->t_canq.c_cc == 0 && (tp->t_lflag & ICANON)))))
+ revents |= events & (POLLOUT | POLLWRNORM);
+
+ if (events & POLLHUP)
+ if ((tp->t_state & TS_CARR_ON) == 0)
+ revents |= POLLHUP;
+
+ if (revents == 0) {
+ if (events & (POLLIN | POLLRDNORM))
+ selrecord(td, &pt->pt_selr);
+
+ if (events & (POLLOUT | POLLWRNORM))
+ selrecord(td, &pt->pt_selw);
+ }
+ splx(s);
+
+ return (revents);
+}
+
+static int
+ptcwrite(struct cdev *dev, struct uio *uio, int flag)
+{
+ struct tty *tp = dev->si_tty;
+ u_char *cp = 0;
+ int cc = 0;
+ u_char locbuf[BUFSIZ];
+ int cnt = 0;
+ struct pt_desc *pt = dev->si_drv1;
+ int error = 0;
+
+again:
+ if ((tp->t_state&TS_ISOPEN) == 0)
+ goto block;
+ if (pt->pt_flags & PF_REMOTE) {
+ if (tp->t_canq.c_cc)
+ goto block;
+ while ((uio->uio_resid > 0 || cc > 0) &&
+ tp->t_canq.c_cc < TTYHOG - 1) {
+ if (cc == 0) {
+ cc = min(uio->uio_resid, BUFSIZ);
+ cc = min(cc, TTYHOG - 1 - tp->t_canq.c_cc);
+ cp = locbuf;
+ error = uiomove(cp, cc, uio);
+ if (error)
+ return (error);
+ /* check again for safety */
+ if ((tp->t_state & TS_ISOPEN) == 0) {
+ /* adjust as usual */
+ uio->uio_resid += cc;
+ return (EIO);
+ }
+ }
+ if (cc > 0) {
+ cc = b_to_q((char *)cp, cc, &tp->t_canq);
+ /*
+ * XXX we don't guarantee that the canq size
+ * is >= TTYHOG, so the above b_to_q() may
+ * leave some bytes uncopied. However, space
+ * is guaranteed for the null terminator if
+ * we don't fail here since (TTYHOG - 1) is
+ * not a multiple of CBSIZE.
+ */
+ if (cc > 0)
+ break;
+ }
+ }
+ /* adjust for data copied in but not written */
+ uio->uio_resid += cc;
+ (void) putc(0, &tp->t_canq);
+ ttwakeup(tp);
+ wakeup(TSA_PTS_READ(tp));
+ return (0);
+ }
+ while (uio->uio_resid > 0 || cc > 0) {
+ if (cc == 0) {
+ cc = min(uio->uio_resid, BUFSIZ);
+ cp = locbuf;
+ error = uiomove(cp, cc, uio);
+ if (error)
+ return (error);
+ /* check again for safety */
+ if ((tp->t_state & TS_ISOPEN) == 0) {
+ /* adjust for data copied in but not written */
+ uio->uio_resid += cc;
+ return (EIO);
+ }
+ }
+ while (cc > 0) {
+ if ((tp->t_rawq.c_cc + tp->t_canq.c_cc) >= TTYHOG - 2 &&
+ (tp->t_canq.c_cc > 0 || !(tp->t_lflag&ICANON))) {
+ wakeup(TSA_HUP_OR_INPUT(tp));
+ goto block;
+ }
+ ttyld_rint(tp, *cp++);
+ cnt++;
+ cc--;
+ }
+ cc = 0;
+ }
+ return (0);
+block:
+ /*
+ * Come here to wait for slave to open, for space
+ * in outq, or space in rawq, or an empty canq.
+ */
+ if ((tp->t_state & TS_CONNECTED) == 0) {
+ /* adjust for data copied in but not written */
+ uio->uio_resid += cc;
+ return (EIO);
+ }
+ if (flag & IO_NDELAY) {
+ /* adjust for data copied in but not written */
+ uio->uio_resid += cc;
+ if (cnt == 0)
+ return (EWOULDBLOCK);
+ return (0);
+ }
+ error = tsleep(TSA_PTC_WRITE(tp), TTOPRI | PCATCH, "ptcout", 0);
+ if (error) {
+ /* adjust for data copied in but not written */
+ uio->uio_resid += cc;
+ return (error);
+ }
+ goto again;
+}
+
+static int
+ptcioctl(struct cdev *dev, u_long cmd, caddr_t data, int flag, struct thread *td)
+{
+ struct tty *tp = dev->si_tty;
+ struct pt_desc *pt = dev->si_drv1;
+
+ switch (cmd) {
+
+ case TIOCGPGRP:
+ /*
+ * We avoid calling ttioctl on the controller since,
+ * in that case, tp must be the controlling terminal.
+ */
+ *(int *)data = tp->t_pgrp ? tp->t_pgrp->pg_id : 0;
+ return (0);
+
+ case TIOCPKT:
+ if (*(int *)data) {
+ if (pt->pt_flags & PF_UCNTL)
+ return (EINVAL);
+ pt->pt_flags |= PF_PKT;
+ } else
+ pt->pt_flags &= ~PF_PKT;
+ return (0);
+
+ case TIOCUCNTL:
+ if (*(int *)data) {
+ if (pt->pt_flags & PF_PKT)
+ return (EINVAL);
+ pt->pt_flags |= PF_UCNTL;
+ } else
+ pt->pt_flags &= ~PF_UCNTL;
+ return (0);
+ case TIOCGPTN:
+ *(unsigned int *)data = pt->pt_num;
+ return (0);
+ }
+
+ /*
+ * The rest of the ioctls shouldn't be called until
+ * the slave is open.
+ */
+ if ((tp->t_state & TS_ISOPEN) == 0) {
+ if (cmd == TIOCGETA) {
+ /*
+ * TIOCGETA is used by isatty() to make sure it's
+ * a tty. Linux openpty() calls isatty() very early,
+ * before the slave is opened, so don't actually
+ * fill the struct termios, but just let isatty()
+ * know it's a tty.
+ */
+ return (0);
+ }
+ if (cmd != FIONBIO && cmd != FIOASYNC)
+ return (EAGAIN);
+ }
+
+ switch (cmd) {
+#ifdef COMPAT_43TTY
+ case TIOCSETP:
+ case TIOCSETN:
+#endif
+ case TIOCSETD:
+ case TIOCSETA:
+ case TIOCSETAW:
+ case TIOCSETAF:
+ /*
+ * IF CONTROLLER STTY THEN MUST FLUSH TO PREVENT A HANG.
+ * ttywflush(tp) will hang if there are characters in
+ * the outq.
+ */
+ ndflush(&tp->t_outq, tp->t_outq.c_cc);
+ break;
+
+ case TIOCSIG:
+ if (*(unsigned int *)data >= NSIG ||
+ *(unsigned int *)data == 0)
+ return(EINVAL);
+ if ((tp->t_lflag&NOFLSH) == 0)
+ ttyflush(tp, FREAD|FWRITE);
+ if (tp->t_pgrp != NULL) {
+ PGRP_LOCK(tp->t_pgrp);
+ pgsignal(tp->t_pgrp, *(unsigned int *)data, 1);
+ PGRP_UNLOCK(tp->t_pgrp);
+ }
+ if ((*(unsigned int *)data == SIGINFO) &&
+ ((tp->t_lflag&NOKERNINFO) == 0))
+ ttyinfo(tp);
+ return(0);
+ }
+ return (ptsioctl(dev, cmd, data, flag, td));
+}
+/*ARGSUSED*/
+static int
+ptsioctl(struct cdev *dev, u_long cmd, caddr_t data, int flag, struct thread *td)
+{
+ struct tty *tp = dev->si_tty;
+ struct pt_desc *pt = dev->si_drv1;
+ u_char *cc = tp->t_cc;
+ int stop, error;
+
+ if (cmd == TIOCEXT) {
+ /*
+ * When the EXTPROC bit is being toggled, we need
+ * to send an TIOCPKT_IOCTL if the packet driver
+ * is turned on.
+ */
+ if (*(int *)data) {
+ if (pt->pt_flags & PF_PKT) {
+ pt->pt_send |= TIOCPKT_IOCTL;
+ ptcwakeup(tp, FREAD);
+ }
+ tp->t_lflag |= EXTPROC;
+ } else {
+ if ((tp->t_lflag & EXTPROC) &&
+ (pt->pt_flags & PF_PKT)) {
+ pt->pt_send |= TIOCPKT_IOCTL;
+ ptcwakeup(tp, FREAD);
+ }
+ tp->t_lflag &= ~EXTPROC;
+ }
+ return(0);
+ }
+ error = ttioctl(tp, cmd, data, flag);
+ if (error == ENOTTY) {
+ if (pt->pt_flags & PF_UCNTL &&
+ (cmd & ~0xff) == UIOCCMD(0)) {
+ if (cmd & 0xff) {
+ pt->pt_ucntl = (u_char)cmd;
+ ptcwakeup(tp, FREAD);
+ }
+ return (0);
+ }
+ error = ENOTTY;
+ }
+ /*
+ * If external processing and packet mode send ioctl packet.
+ */
+ if ((tp->t_lflag&EXTPROC) && (pt->pt_flags & PF_PKT)) {
+ switch(cmd) {
+ case TIOCSETA:
+ case TIOCSETAW:
+ case TIOCSETAF:
+#ifdef COMPAT_43TTY
+ case TIOCSETP:
+ case TIOCSETN:
+ case TIOCSETC:
+ case TIOCSLTC:
+ case TIOCLBIS:
+ case TIOCLBIC:
+ case TIOCLSET:
+#endif
+ pt->pt_send |= TIOCPKT_IOCTL;
+ ptcwakeup(tp, FREAD);
+ break;
+ default:
+ break;
+ }
+ }
+ stop = (tp->t_iflag & IXON) && CCEQ(cc[VSTOP], CTRL('s'))
+ && CCEQ(cc[VSTART], CTRL('q'));
+ if (pt->pt_flags & PF_NOSTOP) {
+ if (stop) {
+ pt->pt_send &= ~TIOCPKT_NOSTOP;
+ pt->pt_send |= TIOCPKT_DOSTOP;
+ pt->pt_flags &= ~PF_NOSTOP;
+ ptcwakeup(tp, FREAD);
+ }
+ } else {
+ if (!stop) {
+ pt->pt_send &= ~TIOCPKT_DOSTOP;
+ pt->pt_send |= TIOCPKT_NOSTOP;
+ pt->pt_flags |= PF_NOSTOP;
+ ptcwakeup(tp, FREAD);
+ }
+ }
+ return (error);
+}
+
+/*
+ * Match lookups on /dev/ptmx, find the next free pty (if any), set up
+ * the pty descriptor, register it, and return a reference to the master.
+ *
+ * pts == /dev/pts/xxx (oldstyle: ttyp...)
+ * ptc == /dev/pty/xxx (oldstyle: ptyp...)
+ */
+static void
+pty_clone(void *arg, struct ucred *cred, char *name, int namelen,
+ struct cdev **dev)
+{
+ struct pt_desc *pt;
+ struct cdev *devc;
+
+ if (*dev != NULL)
+ return;
+
+ if (strcmp(name, "ptmx") != 0)
+ return;
+
+ pt = pty_new();
+ if (pt == NULL)
+ return;
+
+ /*
+ * XXX: Lack of locking here considered worrying. We expose the
+ * pts/pty device nodes before they are fully initialized, although
+ * Giant likely protects us (unless make_dev blocks...?).
+ *
+ * XXX: If a process performs a lookup on /dev/ptmx but never an
+ * open, we won't GC the device node. We should have a callout
+ * sometime later that GC's device instances that were never
+ * opened, or some way to tell devfs that "this had better be for
+ * an open() or we won't create a device".
+ */
+ pt->pt_devc = devc = make_dev_cred(&ptc_cdevsw, pt->pt_num, cred,
+ UID_ROOT, GID_WHEEL, 0666, "pty%d", pt->pt_num);
+
+ dev_ref(devc);
+ devc->si_drv1 = pt;
+ devc->si_tty = pt->pt_tty;
+ *dev = devc;
+
+ if (bootverbose)
+ printf("pty_clone: allocated pty %d to uid %d\n", pt->pt_num,
+ cred->cr_ruid);
+
+ return;
+}
+
+static void
+pty_drvinit(void *unused)
+{
+
+ mtx_init(&pt_mtx, "pt_mtx", NULL, MTX_DEF);
+ LIST_INIT(&pt_list);
+ LIST_INIT(&pt_free_list);
+ EVENTHANDLER_REGISTER(dev_clone, pty_clone, 0, 1000);
+}
+
+SYSINIT(ptydev,SI_SUB_DRIVERS,SI_ORDER_MIDDLE,pty_drvinit,NULL)
diff --git a/sys/kern/tty_pty.c b/sys/kern/tty_pty.c
index 2fdab73..643f0c4 100644
--- a/sys/kern/tty_pty.c
+++ b/sys/kern/tty_pty.c
@@ -107,6 +107,7 @@ struct ptsc {
u_char pt_ucntl;
struct tty *pt_tty;
struct cdev *devs, *devc;
+ int pt_devs_open, pt_devc_open;
struct prison *pt_prison;
};
@@ -132,7 +133,6 @@ static char *names = "pqrsPQRS";
static struct cdev *
ptyinit(struct cdev *devc, struct thread *td)
{
- struct cdev *devs;
struct ptsc *pt;
int n;
@@ -143,19 +143,47 @@ ptyinit(struct cdev *devc, struct thread *td)
devc->si_flags &= ~SI_CHEAPCLONE;
+ /*
+ * Initially do not create a slave endpoint.
+ */
pt = malloc(sizeof(*pt), M_PTY, M_WAITOK | M_ZERO);
- pt->devs = devs = make_dev_cred(&pts_cdevsw, n, td->td_ucred,
- UID_ROOT, GID_WHEEL, 0666, "tty%c%r", names[n / 32], n % 32);
pt->devc = devc;
pt->pt_tty = ttyalloc();
pt->pt_tty->t_sc = pt;
- devs->si_drv1 = devc->si_drv1 = pt;
- devs->si_tty = devc->si_tty = pt->pt_tty;
- pt->pt_tty->t_dev = devs;
+ devc->si_drv1 = pt;
+ devc->si_tty = pt->pt_tty;
return (devc);
}
+static void
+pty_create_slave(struct ucred *cred, struct ptsc *pt, int n)
+{
+
+ pt->devs = make_dev_cred(&pts_cdevsw, n, cred, UID_ROOT, GID_WHEEL,
+ 0666, "tty%c%r", names[n / 32], n % 32);
+ pt->devs->si_drv1 = pt;
+ pt->devs->si_tty = pt->pt_tty;
+ pt->pt_tty->t_dev = pt->devs;
+}
+
+static void
+pty_destroy_slave(struct ptsc *pt)
+{
+
+ pt->pt_tty->t_dev = NULL;
+ destroy_dev(pt->devs);
+ pt->devs = NULL;
+}
+
+static void
+pty_maybe_destroy_slave(struct ptsc *pt)
+{
+
+ if (pt->pt_devc_open == 0 && pt->pt_devs_open == 0)
+ pty_destroy_slave(pt);
+}
+
/*ARGSUSED*/
static int
ptsopen(struct cdev *dev, int flag, int devtype, struct thread *td)
@@ -185,20 +213,32 @@ ptsopen(struct cdev *dev, int flag, int devtype, struct thread *td)
return (error);
}
error = ttyld_open(tp, dev);
- if (error == 0)
+ if (error == 0) {
ptcwakeup(tp, FREAD|FWRITE);
+ pt->pt_devs_open = 1;
+ } else
+ pty_maybe_destroy_slave(pt);
return (error);
}
static int
ptsclose(struct cdev *dev, int flag, int mode, struct thread *td)
{
+ struct ptsc *pti;
struct tty *tp;
int err;
tp = dev->si_tty;
+ pti = dev->si_drv1;
+
+ KASSERT(dev == pti->devs, ("ptsclose: dev != pti->devs"));
+
err = ttyld_close(tp, flag);
(void) tty_close(tp);
+
+ pti->pt_devs_open = 0;
+ pty_maybe_destroy_slave(pti);
+
return (err);
}
@@ -286,12 +326,17 @@ ptcopen(struct cdev *dev, int flag, int devtype, struct thread *td)
pt->pt_flags = 0;
pt->pt_send = 0;
pt->pt_ucntl = 0;
+
+ pty_create_slave(td->td_ucred, pt, minor(dev));
+ pt->pt_devc_open = 1;
+
return (0);
}
static int
ptcclose(struct cdev *dev, int flags, int fmt, struct thread *td)
{
+ struct ptsc *pti = dev->si_drv1;
struct tty *tp;
tp = dev->si_tty;
@@ -312,6 +357,8 @@ ptcclose(struct cdev *dev, int flags, int fmt, struct thread *td)
}
tp->t_oproc = 0; /* mark closed */
+ pti->pt_devc_open = 0;
+ pty_maybe_destroy_slave(pti);
return (0);
}
diff --git a/sys/sys/ttycom.h b/sys/sys/ttycom.h
index 07db4ec..4545d84 100644
--- a/sys/sys/ttycom.h
+++ b/sys/sys/ttycom.h
@@ -63,7 +63,7 @@ struct winsize {
/* 11-12 obsolete or unused */
#define TIOCEXCL _IO('t', 13) /* set exclusive use of tty */
#define TIOCNXCL _IO('t', 14) /* reset exclusive use of tty */
- /* 15 unused */
+#define TIOCGPTN _IOR('t', 15, int) /* Get pts number. */
#define TIOCFLUSH _IOW('t', 16, int) /* flush buffers */
/* 17-18 compat */
#define TIOCGETA _IOR('t', 19, struct termios) /* get termios struct */
OpenPOWER on IntegriCloud