/* Copyright (C) 1995 Free Software Foundation, Inc. Written by Michael I. Bushnell, p/BSG. This file is part of the GNU Hurd. The GNU Hurd is free software; you can redistribute it and/or modify it under the terms of the GNU General Public License as published by the Free Software Foundation; either version 2, or (at your option) any later version. The GNU Hurd is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for more details. You should have received a copy of the GNU General Public License along with this program; if not, write to the Free Software Foundation, Inc., 59 Temple Place - Suite 330, Boston, MA 02111, USA. */ #include "term.h" #include #include #include #include #include #include #include #include #include "ourmsg_U.h" #undef ECHO #undef MDMBUF #undef TOSTOP #undef FLUSHO #undef PENDIN #undef NOFLSH #include "term_S.h" #include "tioctl_S.h" #include #define TTYDEFCHARS #include /* Count of active opens */ int nperopens; /* io_async requests */ struct async_req { mach_port_t notify; struct async_req *next; }; struct async_req *async_requests; mach_port_t async_icky_id; mach_port_t async_id; struct port_info *cttyid; int foreground_id; struct winsize window_size; static void call_asyncs (void); static int sigs_in_progress; static struct condition input_sig_wait = CONDITION_INITIALIZER; static int input_sig_wakeup; /* Attach this on the hook of any protid that is a ctty. */ struct protid_hook { int refcnt; pid_t pid, pgrp; }; void init_users () { cttyid = ports_allocate_port (term_bucket, sizeof (struct port_info), cttyid_class); mach_port_allocate (mach_task_self (), MACH_PORT_RIGHT_RECEIVE, &async_icky_id); mach_port_allocate (mach_task_self (), MACH_PORT_RIGHT_RECEIVE, &async_id); } static error_t open_hook (struct trivfs_control *cntl, uid_t *uids, u_int nuids, uid_t *gids, u_int ngids, int flags) { int cancel = 0; error_t err; if ((flags & (O_READ|O_WRITE)) == 0) return 0; if (cntl == ptyctl) return pty_open_hook (cntl, uids, nuids, gids, ngids, flags); mutex_lock (&global_lock); if (!(termflags & TTY_OPEN)) { bzero (&termstate, sizeof termstate); /* This is different from BSD: we don't turn on ISTRIP, and we use CS8 rather than CS7|PARENB. */ termstate.c_iflag |= BRKINT | ICRNL | IMAXBEL | IXON | IXANY; termstate.c_oflag |= OPOST | ONLCR | OXTABS; termstate.c_lflag |= (ECHO | ICANON | ISIG | IEXTEN | ECHOE|ECHOKE|ECHOCTL); termstate.c_cflag |= CREAD | CS8 | HUPCL; bcopy (ttydefchars, termstate.c_cc, NCCS); termflags |= NO_OWNER; } else if (termflags & EXCL_USE) { mutex_unlock (&global_lock); return EBUSY; } /* Wait for carrier to turn on. */ while (((termflags & NO_CARRIER) && !(termstate.c_cflag & CLOCAL)) && !(flags & O_NONBLOCK) && !cancel) { err = (*bottom->assert_dtr) (); if (err) { mutex_unlock (&global_lock); return err; } cancel = hurd_condition_wait (&carrier_alert, &global_lock); } if ((termflags & NO_CARRIER) && !(termstate.c_cflag & CLOCAL)) { mutex_unlock (&global_lock); return EWOULDBLOCK; } if (cancel) { mutex_unlock (&global_lock); return EINTR; } termflags |= TTY_OPEN; if (!(termstate.c_cflag & CIGNORE)) (*bottom->set_bits) (); mutex_unlock (&global_lock); return 0; } error_t (*trivfs_check_open_hook) (struct trivfs_control *, uid_t *, u_int, uid_t *, u_int, int) = open_hook; static error_t pi_create_hook (struct trivfs_protid *cred) { if (cred->pi.class == pty_class) return 0; mutex_lock (&global_lock); if (cred->hook) ((struct protid_hook *)cred->hook)->refcnt++; mutex_unlock (&global_lock); return 0; } error_t (*trivfs_protid_create_hook) (struct trivfs_protid *) = pi_create_hook; static void pi_destroy_hook (struct trivfs_protid *cred) { if (cred->pi.class == pty_class) return; mutex_lock (&global_lock); if (cred->hook && !--((struct protid_hook *)cred->hook)->refcnt) free (cred->hook); mutex_unlock (&global_lock); } void (*trivfs_protid_destroy_hook) (struct trivfs_protid *) = pi_destroy_hook; static error_t po_create_hook (struct trivfs_peropen *po) { if (po->cntl == ptyctl) return pty_po_create_hook (po); mutex_lock (&global_lock); nperopens++; if (po->openmodes & O_ASYNC) termflags |= ICKY_ASYNC; mutex_unlock (&global_lock); return 0; } error_t (*trivfs_peropen_create_hook) (struct trivfs_peropen *) = po_create_hook; static void po_destroy_hook (struct trivfs_peropen *po) { if (po->cntl == ptyctl) { pty_po_destroy_hook (po); return; } mutex_lock (&global_lock); nperopens--; if (!nperopens) { /* Empty queues */ clear_queue (inputq); clear_queue (rawq); (*bottom->notice_input_flushed) (); drain_output (); /* Possibly drop carrier */ if ((termstate.c_cflag & HUPCL) || (termflags & NO_CARRIER)) (*bottom->desert_dtr) (); termflags &= ~TTY_OPEN; } mutex_unlock (&global_lock); } void (*trivfs_peropen_destroy_hook) (struct trivfs_peropen *) = po_destroy_hook; /* Tell if CRED can do foreground terminal operations */ static inline int fg_p (struct trivfs_protid *cred) { struct protid_hook *hook = cred->hook; if (!hook || (termflags & NO_OWNER)) return 1; if (hook->pid == foreground_id || hook->pgrp == -foreground_id) return 1; return 0; } void trivfs_modify_stat (struct trivfs_protid *cred, struct stat *st) { st->st_blksize = 512; st->st_fstype = FSTYPE_TERM; st->st_fsid = getpid (); st->st_ino = 0; st->st_mode &= ~S_IFMT; st->st_mode |= S_IFCHR; } /* Implement term_getctty as described in . */ kern_return_t S_term_getctty (mach_port_t arg, mach_port_t *id, mach_msg_type_name_t *idtype) { struct trivfs_protid *cred = ports_lookup_port (term_bucket, arg, tty_class); error_t err; if (!cred) return EOPNOTSUPP; mutex_lock (&global_lock); if (!(cred->po->openmodes & (O_READ|O_WRITE))) err = EBADF; else { *id = ports_get_right (cttyid); *idtype = MACH_MSG_TYPE_MAKE_SEND; err = 0; } ports_port_deref (cred); mutex_unlock (&global_lock); return err; } /* Implement termctty_open_terminal as described in . */ kern_return_t S_termctty_open_terminal (mach_port_t arg, int flags, mach_port_t *result, mach_msg_type_name_t *resulttype) { error_t err; mach_port_t new_realnode; struct trivfs_protid *newcred; struct port_info *pi = ports_lookup_port (term_bucket, arg, cttyid_class); if (!pi) return EOPNOTSUPP; assert (pi == cttyid); err = io_restrict_auth (termctl->underlying, &new_realnode, 0, 0, 0, 0); if (!err) { err = trivfs_open (termctl, 0, 0, 0, 0, flags, new_realnode, &newcred); if (!err) { *result = ports_get_right (newcred); *resulttype = MACH_MSG_TYPE_MAKE_SEND; ports_port_deref (newcred); } } ports_port_deref (pi); return err; } /* Implement term_become_ctty as described in . */ kern_return_t S_term_open_ctty (mach_port_t arg, pid_t pid, pid_t pgrp, mach_port_t *newpt, mach_msg_type_name_t *newpttype) { error_t err; struct trivfs_protid *newcred; struct trivfs_protid *cred = ports_lookup_port (term_bucket, arg, tty_class); if (!cred) return EOPNOTSUPP; mutex_lock (&global_lock); if (!cred->po->openmodes & (O_READ|O_WRITE)) { mutex_unlock (&global_lock); err = EBADF; } else { mutex_unlock (&global_lock); err = trivfs_protid_dup (cred, &newcred); if (!err) { struct protid_hook *hook = malloc (sizeof (struct protid_hook)); hook->pid = pid; hook->pgrp = pgrp; hook->refcnt = 1; if (newcred->hook) /* We inherited CRED's hook, get rid of our ref to it. */ pi_destroy_hook (newcred); newcred->hook = hook; *newpt = ports_get_right (newcred); *newpttype = MACH_MSG_TYPE_MAKE_SEND; ports_port_deref (newcred); } } ports_port_deref (cred); return err; } /* Called for user writes to the terminal as described in . */ error_t trivfs_S_io_write (struct trivfs_protid *cred, mach_port_t reply, mach_msg_type_name_t replytype, char *data, u_int datalen, off_t offset, int *amt) { int i; int cancel; if (!cred) return EOPNOTSUPP; if (cred->pi.class == pty_class) return pty_io_write (cred, data, datalen, amt); mutex_lock (&global_lock); /* Check for errors first. */ if ((cred->po->openmodes & O_WRITE) == 0) { mutex_unlock (&global_lock); return EBADF; } if ((termstate.c_lflag & TOSTOP) && !fg_p (cred)) { mutex_unlock (&global_lock); return EBACKGROUND; } if ((termflags & NO_CARRIER) && !(termstate.c_cflag & CLOCAL)) { mutex_unlock (&global_lock); return EIO; } cancel = 0; for (i = 0; i < datalen; i++) { while (!qavail (outputq) && !cancel) { (*bottom->start_output) (); if (!qavail (outputq)) cancel = hurd_condition_wait (outputq->wait, &global_lock); } if (cancel) break; write_character (data[i]); } *amt = i; (*bottom->start_output) (); trivfs_set_mtime (termctl); call_asyncs (); mutex_unlock (&global_lock); return ((cancel && datalen && !*amt) ? EINTR : 0); } /* Called for user reads from the terminal. */ error_t trivfs_S_io_read (struct trivfs_protid *cred, mach_port_t reply, mach_msg_type_name_t replytype, char **data, u_int *datalen, off_t offset, int amount) { int cancel; int i, max; char *cp; int avail; if (!cred) return EOPNOTSUPP; if (cred->pi.class == pty_class) return pty_io_read (cred, data, datalen, amount); mutex_lock (&global_lock); if ((cred->po->openmodes & O_READ) == 0) { mutex_unlock (&global_lock); return EBADF; } if (!fg_p (cred)) { mutex_unlock (&global_lock); return EBACKGROUND; } while (!qsize (inputq)) { if ((termflags & NO_CARRIER) && !(termstate.c_cflag & CLOCAL)) { /* Return EOF, Posix.1 7.1.1.10. */ mutex_unlock (&global_lock); *datalen = 0; return 0; } if (cred->po->openmodes & O_NONBLOCK) { mutex_unlock (&global_lock); return EWOULDBLOCK; } if (hurd_condition_wait (inputq->wait, &global_lock)) { mutex_unlock (&global_lock); return EINTR; } /* If a signal is being delivered, and we got woken up by arriving input, then there's a possible race; we have to not read from the queue as long as the signal is in progress. Now, you might think that we should not read from the queue when a signal is in progress even if we didn't block, but that's not so. It's specifically that we have to get *interrupted* by signals in progress (when the signallee is this thread and wants to interrupt is) that is the race we are avoiding. A reader who gets in after the signal begins, while the signal is in progress, is harmless, because this case is indiscernable from one where the reader gets in after the signal has completed. */ if (sigs_in_progress) { input_sig_wakeup++; if (hurd_condition_wait (&input_sig_wait, &global_lock)) { mutex_unlock (&global_lock); return EINTR; } } } avail = qsize (inputq); if (remote_input_mode) avail--; max = (amount < avail) ? amount : avail; if (max > *datalen) vm_allocate (mach_task_self (), (vm_address_t *)data, max, 1); cancel = 0; cp = *data; for (i = 0; i < max; i++) { char c = dequeue (inputq); if (remote_input_mode) *cp++ = c; else { /* Unless this is EOF, add it to the response. */ if (!(termstate.c_lflag & ICANON) || !CCEQ (termstate.c_cc[VEOF], c)) *cp++ = c; /* If this is a break character, then finish now. */ if ((termstate.c_lflag & ICANON) && (c == '\n' || CCEQ (termstate.c_cc[VEOF], c) || CCEQ (termstate.c_cc[VEOL], c) || CCEQ (termstate.c_cc[VEOL2], c))) break; /* If this is the delayed suspend character, then signal now. */ if ((termstate.c_lflag & ISIG) && CCEQ (termstate.c_cc[VDSUSP], c)) { /* The CANCEL flag is being used here to tell the return below to make sure we don't signal EOF on a VDUSP that happens at the front of a line. */ send_signal (SIGTSTP); cancel = 1; break; } } } if (remote_input_mode && qsize (inputq) == 1) dequeue (inputq); *datalen = cp - *data; mutex_unlock (&global_lock); call_asyncs (); return !*datalen && cancel ? EINTR : 0; } error_t trivfs_S_io_readable (struct trivfs_protid *cred, mach_port_t reply, mach_msg_type_name_t replytype, int *amt) { if (!cred) return EOPNOTSUPP; if (cred->pi.class == pty_class) return pty_io_readable (amt); mutex_lock (&global_lock); if ((cred->po->openmodes & O_READ) == 0) return EBADF; *amt = qsize (inputq); if (remote_input_mode && *amt) --*amt; mutex_unlock (&global_lock); return 0; } /* TIOCMODG ioctl -- Get modem state */ kern_return_t S_tioctl_tiocmodg (io_t port, int *state) { struct trivfs_protid *cred = ports_lookup_port (term_bucket, port, 0); if (!cred) return EOPNOTSUPP; if (cred->pi.class != pty_class && cred->pi.class != tty_class) { ports_port_deref (cred); return EOPNOTSUPP; } mutex_lock (&global_lock); *state = (*bottom->mdmstate) (); mutex_unlock (&global_lock); ports_port_deref (cred); return 0; } /* TIOCMODS ioctl -- Set modem state */ kern_return_t S_tioctl_tiocmods (io_t port, int state) { struct trivfs_protid *cred = ports_lookup_port (term_bucket, port, 0); error_t err; if (!cred) return EOPNOTSUPP; if (cred->pi.class != pty_class && cred->pi.class != tty_class) { ports_port_deref (cred); return EOPNOTSUPP; } mutex_lock (&global_lock); if (!(cred->po->openmodes & (O_READ|O_WRITE))) err = EBADF; else { (*bottom->mdmctl) (MDMCTL_SET, state); err = 0; } mutex_unlock (&global_lock); ports_port_deref (cred); return err; } /* TIOCEXCL ioctl -- Set exclusive use */ kern_return_t S_tioctl_tiocexcl (io_t port) { struct trivfs_protid *cred = ports_lookup_port (term_bucket, port, 0); error_t err; if (!cred) return EOPNOTSUPP; if (cred->pi.class != pty_class && cred->pi.class != tty_class) { ports_port_deref (cred); return EOPNOTSUPP; } mutex_lock (&global_lock); if (!(cred->po->openmodes & (O_READ|O_WRITE))) err = EBADF; else { termflags |= EXCL_USE; err = 0; } mutex_unlock (&global_lock); ports_port_deref (cred); return err; } /* TIOCNXCL ioctl -- Clear exclusive use */ kern_return_t S_tioctl_tiocnxcl (io_t port) { struct trivfs_protid *cred = ports_lookup_port (term_bucket, port, 0); error_t err; if (!cred) return EOPNOTSUPP; if (cred->pi.class != pty_class && cred->pi.class != tty_class) { ports_port_deref (cred); return EOPNOTSUPP; } mutex_lock (&global_lock); if (!(cred->po->openmodes & (O_READ|O_WRITE))) err = EBADF; else { termflags &= ~EXCL_USE; err = 0; } mutex_unlock (&global_lock); ports_port_deref (cred); return err; } /* TIOCFLUSH ioctl -- Flush input, output, or both */ kern_return_t S_tioctl_tiocflush (io_t port, int flags) { struct trivfs_protid *cred = ports_lookup_port (term_bucket, port, 0); error_t err; if (!cred) return EOPNOTSUPP; if (cred->pi.class != pty_class && cred->pi.class != tty_class) { ports_port_deref (cred); return EOPNOTSUPP; } mutex_lock (&global_lock); if (!(cred->po->openmodes & (O_READ|O_WRITE))) err = EBADF; else { if (flags == 0) flags = O_READ|O_WRITE; if (flags & O_READ) { clear_queue (inputq); (*bottom->notice_input_flushed) (); } if (flags & O_WRITE) drop_output (); err = 0; } mutex_unlock (&global_lock); ports_port_deref (cred); return err; } /* TIOCGETA ioctl -- Get termios state */ kern_return_t S_tioctl_tiocgeta (io_t port, tcflag_t *modes, cc_t *ccs, speed_t *speeds) { struct trivfs_protid *cred = ports_lookup_port (term_bucket, port, 0); if (!cred) return EOPNOTSUPP; if (cred->pi.class != pty_class && cred->pi.class != tty_class) { ports_port_deref (cred); return EOPNOTSUPP; } mutex_lock (&global_lock); modes[0] = termstate.c_iflag; modes[1] = termstate.c_oflag; modes[2] = termstate.c_cflag; modes[3] = termstate.c_lflag; bcopy (termstate.c_cc, ccs, NCCS); speeds[0] = termstate.__ispeed; speeds[1] = termstate.__ospeed; mutex_unlock (&global_lock); ports_port_deref (cred); return 0; } /* Common code for the varios TIOCSET* commands. */ static error_t set_state (io_t port, tcflag_t *modes, cc_t *ccs, speed_t *speeds, int draino, int flushi) { struct trivfs_protid *cred = ports_lookup_port (term_bucket, port, 0); error_t err; int oldlflag; if (!cred) return EOPNOTSUPP; if (cred->pi.class != pty_class && cred->pi.class != tty_class) { ports_port_deref (cred); return EOPNOTSUPP; } mutex_lock (&global_lock); if (!(cred->po->openmodes & (O_READ|O_WRITE))) err = EBADF; else if (!fg_p (cred)) err = EBACKGROUND; else { if (cred->pi.class == pty_class) { clear_queue (outputq); (*bottom->abandon_physical_output) (); } if (draino) { err = drain_output (); if (err) { mutex_unlock (&global_lock); ports_port_deref (cred); return err; } } if (flushi) { clear_queue (inputq); (*bottom->notice_input_flushed) (); } oldlflag = termstate.c_lflag; termstate.c_iflag = modes[0]; termstate.c_oflag = modes[1]; termstate.c_cflag = modes[2]; termstate.c_lflag = modes[3]; bcopy (ccs, termstate.c_cc, NCCS); termstate.__ispeed = speeds[0]; termstate.__ospeed = speeds[1]; if (external_processing) termstate.c_lflag |= EXTPROC; else termstate.c_lflag &= ~EXTPROC; if (external_processing || !(termstate.c_cflag & CIGNORE)) (*bottom->set_bits) (); if (oldlflag & ICANON) { if (!(termstate.c_lflag & ICANON)) copy_rawq (); } else { if (termstate.c_lflag & ICANON) rescan_inputq (); } err = 0; } mutex_unlock (&global_lock); ports_port_deref (cred); return err; } /* TIOCSETA -- Set termios state */ kern_return_t S_tioctl_tiocseta (io_t port, tcflag_t *modes, cc_t *ccs, speed_t *speeds) { return set_state (port, modes, ccs, speeds, 0, 0); } /* Drain output, then set term state. */ kern_return_t S_tioctl_tiocsetaw (io_t port, tcflag_t *modes, cc_t *ccs, speed_t *speeds) { return set_state (port, modes, ccs, speeds, 1, 0); } /* Flush input, drain output, then set term state. */ kern_return_t S_tioctl_tiocsetaf (io_t port, tcflag_t *modes, cc_t *ccs, speed_t *speeds) { return set_state (port, modes, ccs, speeds, 1, 1); } /* TIOCGETD -- Return line discipline */ kern_return_t S_tioctl_tiocgetd (io_t port, int *disc) { struct trivfs_protid *cred = ports_lookup_port (term_bucket, port, 0); if (!cred) return EOPNOTSUPP; if (cred->pi.class != pty_class && cred->pi.class != tty_class) { ports_port_deref (cred); return EOPNOTSUPP; } *disc = 0; ports_port_deref (cred); return 0; } /* TIOCSETD -- Set line discipline */ kern_return_t S_tioctl_tiocsetd (io_t port, int disc) { struct trivfs_protid *cred = ports_lookup_port (term_bucket, port, 0); error_t err; if (!cred) return EOPNOTSUPP; if (cred->pi.class != pty_class && cred->pi.class != tty_class) { ports_port_deref (cred); return EOPNOTSUPP; } mutex_lock (&global_lock); if (!(cred->po->openmodes & (O_READ|O_WRITE))) err = EBADF; mutex_unlock (&global_lock); if (disc != 0) err = ENXIO; else err = 0; ports_port_deref (cred); return 0; } /* TIOCDRAIN -- Wait for output to drain */ kern_return_t S_tioctl_tiocdrain (io_t port) { struct trivfs_protid *cred = ports_lookup_port (term_bucket, port, 0); error_t err; if (!cred) return EOPNOTSUPP; if (cred->pi.class != pty_class && cred->pi.class != tty_class) { ports_port_deref (cred); return EOPNOTSUPP; } mutex_lock (&global_lock); if (!(cred->po->openmodes & O_WRITE)) { mutex_unlock (&global_lock); ports_port_deref (cred); return EBADF; } err = drain_output (); mutex_unlock (&global_lock); ports_port_deref (cred); return err; } /* TIOCSWINSZ -- Set window size */ kern_return_t S_tioctl_tiocswinsz (io_t port, struct winsize size) { struct trivfs_protid *cred = ports_lookup_port (term_bucket, port, 0); error_t err; if (!cred) return EOPNOTSUPP; if (cred->pi.class != pty_class && cred->pi.class != tty_class) { ports_port_deref (cred); return EOPNOTSUPP; } mutex_lock (&global_lock); if (!(cred->po->openmodes & (O_READ|O_WRITE))) err = EBADF; else err = 0; ports_port_deref (cred); if (!err && (size.ws_row - window_size.ws_row + size.ws_col - window_size.ws_col + size.ws_xpixel - window_size.ws_xpixel + size.ws_ypixel - window_size.ws_ypixel) != 0) { /* The size is actually changing. Record the new size and notify the process group. */ window_size = size; send_signal (SIGWINCH); } mutex_unlock (&global_lock); return err; } /* TIOCGWINSZ -- Fetch window size */ kern_return_t S_tioctl_tiocgwinsz (io_t port, struct winsize *size) { struct trivfs_protid *cred = ports_lookup_port (term_bucket, port, 0); if (!cred) return EOPNOTSUPP; if (cred->pi.class != pty_class && cred->pi.class != tty_class) { ports_port_deref (cred); return EOPNOTSUPP; } mutex_lock (&global_lock); *size = window_size; mutex_unlock (&global_lock); ports_port_deref (cred); return 0; } /* TIOCMGET -- Fetch all modem bits */ kern_return_t S_tioctl_tiocmget (io_t port, int *bits) { struct trivfs_protid *cred = ports_lookup_port (term_bucket, port, 0); if (!cred) return EOPNOTSUPP; if (cred->pi.class != pty_class && cred->pi.class != tty_class) { ports_port_deref (cred); return EOPNOTSUPP; } mutex_lock (&global_lock); *bits = (*bottom->mdmstate) (); mutex_unlock (&global_lock); ports_port_deref (cred); return 0; } /* TIOCMSET -- Set all modem bits */ kern_return_t S_tioctl_tiocmset (io_t port, int bits) { struct trivfs_protid *cred = ports_lookup_port (term_bucket, port, 0); error_t err; if (!cred) return EOPNOTSUPP; if (cred->pi.class != pty_class && cred->pi.class != tty_class) { ports_port_deref (cred); return EOPNOTSUPP; } mutex_lock (&global_lock); if (!(cred->po->openmodes & (O_READ|O_WRITE))) err = EBADF; else { (*bottom->mdmctl) (MDMCTL_SET, bits); err = 0; } mutex_unlock (&global_lock); ports_port_deref (cred); return err; } /* TIOCMBIC -- Clear some modem bits */ kern_return_t S_tioctl_tiocmbic (io_t port, int bits) { struct trivfs_protid *cred = ports_lookup_port (term_bucket, port, 0); error_t err; if (!cred) return EOPNOTSUPP; if (cred->pi.class != pty_class && cred->pi.class != tty_class) { ports_port_deref (cred); return EOPNOTSUPP; } mutex_lock (&global_lock); if (!(cred->po->openmodes & (O_READ|O_WRITE))) err = EBADF; else { (*bottom->mdmctl) (MDMCTL_BIC, bits); err = 0; } mutex_unlock (&global_lock); ports_port_deref (cred); return err; } /* TIOCMBIS -- Set some modem bits */ kern_return_t S_tioctl_tiocmbis (io_t port, int bits) { struct trivfs_protid *cred = ports_lookup_port (term_bucket, port, 0); error_t err; if (!cred) return EOPNOTSUPP; if (cred->pi.class != pty_class && cred->pi.class != tty_class) { ports_port_deref (cred); return EOPNOTSUPP; } mutex_lock (&global_lock); if (!(cred->po->openmodes & (O_READ|O_WRITE))) err = EBADF; else { (*bottom->mdmctl) (MDMCTL_BIS, bits); err = 0; } mutex_unlock (&global_lock); ports_port_deref (cred); return err; } /* TIOCSTART -- start output as if VSTART were typed */ kern_return_t S_tioctl_tiocstart (io_t port) { struct trivfs_protid *cred = ports_lookup_port (term_bucket, port, 0); error_t err; if (!cred) return EOPNOTSUPP; if (cred->pi.class != pty_class && cred->pi.class != tty_class) { ports_port_deref (cred); return EOPNOTSUPP; } mutex_lock (&global_lock); if (!(cred->po->openmodes & (O_READ|O_WRITE))) err = EBADF; else { termflags &= ~USER_OUTPUT_SUSP; (*bottom->start_output) (); err = 0; } mutex_unlock (&global_lock); ports_port_deref (cred); return err; } /* TIOCSTOP -- stop output as if VSTOP were typed */ kern_return_t S_tioctl_tiocstop (io_t port) { struct trivfs_protid *cred = ports_lookup_port (term_bucket, port, 0); error_t err; if (!cred) return EOPNOTSUPP; if (cred->pi.class != pty_class && cred->pi.class != tty_class) { ports_port_deref (cred); return EOPNOTSUPP; } mutex_lock (&global_lock); if (!(cred->po->openmodes & (O_READ|O_WRITE))) err = EBADF; else { termflags |= USER_OUTPUT_SUSP; (*bottom->suspend_physical_output) (); err = 0; } mutex_unlock (&global_lock); ports_port_deref (cred); return err; } /* TIOCSTI -- Simulate terminal input */ kern_return_t S_tioctl_tiocsti (io_t port, char c) { struct trivfs_protid *cred = ports_lookup_port (term_bucket, port, 0); error_t err; if (!cred) return EOPNOTSUPP; if (cred->pi.class != pty_class && cred->pi.class != tty_class) { ports_port_deref (cred); return EOPNOTSUPP; } mutex_lock (&global_lock); /* BSD returns EACCES if this is not our controlling terminal, but we have no way to do that. (And I don't think it actually provides any security there, either.) */ if (!(cred->po->openmodes & O_READ)) err = EPERM; else { input_character (c); err = 0; } mutex_unlock (&global_lock); ports_port_deref (cred); return err; } /* TIOCOUTQ -- return output queue size */ kern_return_t S_tioctl_tiocoutq (io_t port, int *queue_size) { struct trivfs_protid *cred = ports_lookup_port (term_bucket, port, 0); error_t err; if (!cred) return EOPNOTSUPP; if (cred->pi.class != pty_class && cred->pi.class != tty_class) { ports_port_deref (cred); return EOPNOTSUPP; } mutex_lock (&global_lock); if (!(cred->po->openmodes & (O_READ|O_WRITE))) err = EBADF; else { *queue_size = qsize (outputq) + (*bottom->pending_output_size) (); err = 0; } mutex_unlock (&global_lock); ports_port_deref (cred); return err; } /* TIOCSPGRP -- set pgrp of terminal */ kern_return_t S_tioctl_tiocspgrp (io_t port, int pgrp) { struct trivfs_protid *cred = ports_lookup_port (term_bucket, port, 0); error_t err; if (!cred) return EOPNOTSUPP; if (cred->pi.class != pty_class && cred->pi.class != tty_class) { ports_port_deref (cred); return EOPNOTSUPP; } mutex_lock (&global_lock); if (!(cred->po->openmodes & (O_READ|O_WRITE))) err = EBADF; else { termflags &= ~NO_OWNER; foreground_id = -pgrp; err = 0; } mutex_unlock (&global_lock); ports_port_deref (cred); return err; } /* TIOCGPGRP --- fetch pgrp of terminal */ kern_return_t S_tioctl_tiocgpgrp (io_t port, int *pgrp) { struct trivfs_protid *cred = ports_lookup_port (term_bucket, port, 0); error_t ret; if (!cred) return EOPNOTSUPP; if (cred->pi.class != pty_class && cred->pi.class != tty_class) { ports_port_deref (cred); return EOPNOTSUPP; } mutex_lock (&global_lock); if (termflags & NO_OWNER) ret = ENOTTY; /* that's what BSD says... */ else { *pgrp = - foreground_id; ret = 0; } mutex_unlock (&global_lock); ports_port_deref (cred); return ret; } /* TIOCCDTR -- clear DTR */ kern_return_t S_tioctl_tioccdtr (io_t port) { struct trivfs_protid *cred = ports_lookup_port (term_bucket, port, 0); error_t err; if (!cred) return EOPNOTSUPP; if (cred->pi.class != pty_class && cred->pi.class != tty_class) { ports_port_deref (cred); return EOPNOTSUPP; } mutex_lock (&global_lock); if (!(cred->po->openmodes & (O_READ|O_WRITE))) err = EBADF; else { (*bottom->mdmctl) (MDMCTL_BIC, TIOCM_DTR); err = 0; } mutex_unlock (&global_lock); ports_port_deref (cred); return err; } /* TIOCSDTR -- set DTR */ kern_return_t S_tioctl_tiocsdtr (io_t port) { struct trivfs_protid *cred = ports_lookup_port (term_bucket, port, 0); error_t err; if (!cred) return EOPNOTSUPP; if (cred->pi.class != pty_class && cred->pi.class != tty_class) { ports_port_deref (cred); return EOPNOTSUPP; } mutex_lock (&global_lock); if (!(cred->po->openmodes & (O_READ|O_WRITE))) err = EBADF; else { (*bottom->mdmctl) (MDMCTL_BIS, TIOCM_DTR); err = 0; } mutex_unlock (&global_lock); ports_port_deref (cred); return err; } /* TIOCCBRK -- Clear break condition */ kern_return_t S_tioctl_tioccbrk (io_t port) { struct trivfs_protid *cred = ports_lookup_port (term_bucket, port, 0); error_t err; if (!cred) return EOPNOTSUPP; if (cred->pi.class != pty_class && cred->pi.class != tty_class) { ports_port_deref (cred); return EOPNOTSUPP; } mutex_lock (&global_lock); if (!(cred->po->openmodes & (O_READ|O_WRITE))) err = EBADF; else { (*bottom->clear_break) (); err = 0; } mutex_unlock (&global_lock); ports_port_deref (cred); return err; } /* TIOCSBRK -- Set break condition */ kern_return_t S_tioctl_tiocsbrk (io_t port) { struct trivfs_protid *cred = ports_lookup_port (term_bucket, port, 0); error_t err; if (!cred) return EOPNOTSUPP; if (cred->pi.class != pty_class && cred->pi.class != tty_class) { ports_port_deref (cred); return EOPNOTSUPP; } mutex_lock (&global_lock); if (!(cred->po->openmodes & (O_READ|O_WRITE))) err = EBADF; else { (*bottom->set_break) (); err = 0; } mutex_unlock (&global_lock); ports_port_deref (cred); return err; } error_t trivfs_S_file_set_size (struct trivfs_protid *cred, off_t size) { if (!cred) return EOPNOTSUPP; mutex_lock (&global_lock); if ((cred->po->openmodes & O_WRITE) == 0) { mutex_unlock (&global_lock); return EBADF; } mutex_unlock (&global_lock); return 0; } error_t trivfs_S_io_seek (struct trivfs_protid *cred, off_t off, int whence, off_t *newp) { return ESPIPE; } error_t trivfs_S_io_get_openmodes (struct trivfs_protid *cred, mach_port_t reply, mach_msg_type_name_t replytype, int *bits) { if (!cred) return EOPNOTSUPP; mutex_lock (&global_lock); *bits = cred->po->openmodes; mutex_unlock (&global_lock); return 0; } #define HONORED_STATE_MODES (O_APPEND|O_ASYNC|O_FSYNC|O_NONBLOCK|O_NOATIME) error_t trivfs_S_io_set_all_openmodes (struct trivfs_protid *cred, mach_port_t reply, mach_msg_type_name_t replytype, int bits) { if (!cred) return EOPNOTSUPP; mutex_lock (&global_lock); cred->po->openmodes &= ~HONORED_STATE_MODES; cred->po->openmodes |= (bits & HONORED_STATE_MODES); mutex_unlock (&global_lock); return 0; } error_t trivfs_S_io_set_some_openmodes (struct trivfs_protid *cred, mach_port_t reply, mach_msg_type_name_t reply_type, int bits) { if (!cred) return EOPNOTSUPP; mutex_lock (&global_lock); cred->po->openmodes |= (bits & HONORED_STATE_MODES); mutex_unlock (&global_lock); return 0; } error_t trivfs_S_io_clear_some_openmodes (struct trivfs_protid *cred, mach_port_t reply, mach_msg_type_name_t reply_type, int bits) { if (!cred) return EOPNOTSUPP; mutex_lock (&global_lock); cred->po->openmodes &= ~(bits & HONORED_STATE_MODES); mutex_unlock (&global_lock); return 0; } error_t trivfs_S_io_mod_owner (struct trivfs_protid *cred, mach_port_t reply, mach_msg_type_name_t reply_type, pid_t owner) { if (!cred) return EOPNOTSUPP; mutex_lock (&global_lock); termflags &= ~NO_OWNER; foreground_id = owner; mutex_unlock (&global_lock); return 0; } error_t trivfs_S_io_get_owner (struct trivfs_protid *cred, mach_port_t erply, mach_msg_type_name_t reply_type, pid_t *owner) { if (!cred) return EOPNOTSUPP; mutex_lock (&global_lock); if (termflags & NO_OWNER) { mutex_unlock (&global_lock); return ENOTTY; } *owner = foreground_id; mutex_unlock (&global_lock); return 0; } error_t trivfs_S_io_get_async_icky (struct trivfs_protid *cred, mach_port_t *id, mach_msg_type_name_t *idtype) { if (!cred) return EOPNOTSUPP; mutex_lock (&global_lock); if (!(cred->po->openmodes & (O_READ|O_WRITE))) { mutex_unlock (&global_lock); return EBADF; } *id = async_icky_id; *idtype = MACH_MSG_TYPE_MAKE_SEND; mutex_unlock (&global_lock); return 0; } error_t trivfs_S_io_async (struct trivfs_protid *cred, mach_port_t notify, mach_port_t *id, mach_msg_type_name_t *idtype) { struct async_req *ar; if (!cred) return EOPNOTSUPP; mutex_lock (&global_lock); if (!(cred->po->openmodes & (O_READ|O_WRITE))) { mutex_unlock (&global_lock); return EBADF; } ar = malloc (sizeof (struct async_req)); ar->notify = notify; ar->next = async_requests; async_requests = ar; *id = async_id; *idtype = MACH_MSG_TYPE_MAKE_SEND; mutex_unlock (&global_lock); return 0; } error_t trivfs_S_io_select (struct trivfs_protid *cred, mach_port_t reply, mach_msg_type_name_t reply_type, int *type, int *idtag) { int available; if (!cred) return EOPNOTSUPP; if (cred->pi.class == pty_class) return pty_io_select (cred, type, idtag); /* We don't deal with SELECT_URG here. */ if (*type & ~(SELECT_READ | SELECT_WRITE)) return EINVAL; available = 0; if (*type == 0) return 0; mutex_lock (&global_lock); while (1) { if ((*type & SELECT_READ) && qsize (inputq)) available |= SELECT_READ; if ((*type & SELECT_WRITE) && qavail (outputq)) available |= SELECT_WRITE; if (available) { *type = available; mutex_unlock (&global_lock); return 0; } if (hurd_condition_wait (&select_alert, &global_lock)) { *type = 0; mutex_unlock (&global_lock); return EINTR; } } } kern_return_t trivfs_S_io_map (struct trivfs_protid *cred, mach_port_t *rdobj, mach_msg_type_name_t *rdtype, mach_port_t *wrobj, mach_msg_type_name_t *wrtype) { return EOPNOTSUPP; } static void report_sig_start () { sigs_in_progress++; } static void report_sig_end () { sigs_in_progress--; if ((sigs_in_progress == 0) && input_sig_wakeup) { input_sig_wakeup = 0; condition_broadcast (&input_sig_wait); } } /* Call all the scheduled async I/O handlers */ static void call_asyncs () { struct async_req *ar, *nxt, **prevp; mach_port_t err; /* If no I/O is possible or nobody wants async messages, don't bother further. */ if ((!(termflags & ICKY_ASYNC) && !async_requests) || (!qsize (inputq) && !qavail (outputq))) return; if ((termflags & ICKY_ASYNC) && !(termflags & NO_OWNER)) { report_sig_start (); mutex_unlock (&global_lock); hurd_sig_post (foreground_id, SIGIO, async_icky_id); mutex_lock (&global_lock); report_sig_end (); } for (ar = async_requests, prevp = &async_requests; ar; ar = nxt) { nxt = ar->next; err = nowait_msg_sig_post (ar->notify, SIGIO, async_id); if (err == MACH_SEND_INVALID_DEST) { /* Receiver died; remove the notification request. */ *prevp = ar->next; mach_port_deallocate (mach_task_self (), ar->notify); free (ar); } else prevp = &ar->next; } } /* Send a signal to the current process (group) of the terminal. */ void send_signal (int signo) { mach_port_t right; if (!(termflags & NO_OWNER)) { right = ports_get_right (cttyid); mach_port_insert_right (mach_task_self (), right, right, MACH_MSG_TYPE_MAKE_SEND); report_sig_start (); mutex_unlock (&global_lock); hurd_sig_post (foreground_id, signo, right); mutex_lock (&global_lock); report_sig_end (); mach_port_deallocate (mach_task_self (), right); } } void report_carrier_off () { termflags |= NO_CARRIER; if (!(termstate.c_cflag & CLOCAL)) send_signal (SIGHUP); } void report_carrier_on () { termflags &= ~NO_CARRIER; condition_broadcast (&carrier_alert); } kern_return_t S_term_get_nodename (io_t arg, char *name) { struct trivfs_protid *cred = ports_lookup_port (term_bucket, arg, tty_class); if (!cred) return EOPNOTSUPP; strcpy (name, nodename); ports_port_deref (cred); return 0; } kern_return_t S_term_set_nodename (io_t arg, char *name) { struct trivfs_protid *cred = ports_lookup_port (term_bucket, arg, tty_class); if (!cred) return EOPNOTSUPP; ports_port_deref (cred); if (strcmp (name, nodename)) return EINVAL; return 0; } kern_return_t S_term_set_filenode (io_t arg, file_t filenode) { struct trivfs_protid *cred = ports_lookup_port (term_bucket, arg, tty_class); if (!cred) return EOPNOTSUPP; ports_port_deref (cred); return EINVAL; } kern_return_t S_term_get_bottom_type (io_t arg, int *ttype) { struct trivfs_protid *cred = ports_lookup_port (term_bucket, arg, tty_class); if (!cred) return EOPNOTSUPP; ports_port_deref (cred); if (bottom == &devio_bottom) *ttype = TERM_ON_MACHDEV; else *ttype = TERM_ON_MASTERPTY; return 0; } kern_return_t S_term_on_machdev (io_t arg, device_t machdev) { struct trivfs_protid *cred = ports_lookup_port (term_bucket, arg, tty_class); if (!cred) return EOPNOTSUPP; ports_port_deref (cred); return EINVAL; } kern_return_t S_term_on_hurddev (io_t arg, io_t hurddev) { return EOPNOTSUPP; } kern_return_t S_term_on_pty (io_t arg, mach_port_t *master) { return EOPNOTSUPP; } error_t trivfs_goaway (struct trivfs_control *cntl, int flags) { return EBUSY; }