xref: /freebsd/sys/kern/tty.c (revision ef9ffb8594eee294334ced627755bf5b46b48f9f)
1 /*-
2  * SPDX-License-Identifier: BSD-2-Clause
3  *
4  * Copyright (c) 2008 Ed Schouten <ed@FreeBSD.org>
5  * All rights reserved.
6  *
7  * Portions of this software were developed under sponsorship from Snow
8  * B.V., the Netherlands.
9  *
10  * Redistribution and use in source and binary forms, with or without
11  * modification, are permitted provided that the following conditions
12  * are met:
13  * 1. Redistributions of source code must retain the above copyright
14  *    notice, this list of conditions and the following disclaimer.
15  * 2. Redistributions in binary form must reproduce the above copyright
16  *    notice, this list of conditions and the following disclaimer in the
17  *    documentation and/or other materials provided with the distribution.
18  *
19  * THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS'' AND
20  * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
21  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
22  * ARE DISCLAIMED.  IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
23  * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
24  * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
25  * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
26  * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
27  * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
28  * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
29  * SUCH DAMAGE.
30  */
31 
32 #include <sys/cdefs.h>
33 #include "opt_capsicum.h"
34 #include "opt_printf.h"
35 
36 #include <sys/param.h>
37 #include <sys/capsicum.h>
38 #include <sys/conf.h>
39 #include <sys/cons.h>
40 #include <sys/fcntl.h>
41 #include <sys/file.h>
42 #include <sys/filedesc.h>
43 #include <sys/filio.h>
44 #ifdef COMPAT_43TTY
45 #include <sys/ioctl_compat.h>
46 #endif /* COMPAT_43TTY */
47 #include <sys/jail.h>
48 #include <sys/kernel.h>
49 #include <sys/limits.h>
50 #include <sys/malloc.h>
51 #include <sys/mount.h>
52 #include <sys/poll.h>
53 #include <sys/priv.h>
54 #include <sys/proc.h>
55 #include <sys/serial.h>
56 #include <sys/signal.h>
57 #include <sys/stat.h>
58 #include <sys/sx.h>
59 #include <sys/sysctl.h>
60 #include <sys/systm.h>
61 #include <sys/tty.h>
62 #include <sys/ttycom.h>
63 #define TTYDEFCHARS
64 #include <sys/ttydefaults.h>
65 #undef TTYDEFCHARS
66 #include <sys/ucred.h>
67 #include <sys/vnode.h>
68 
69 #include <fs/devfs/devfs.h>
70 
71 #include <machine/stdarg.h>
72 
73 static MALLOC_DEFINE(M_TTY, "tty", "tty device");
74 
75 static void tty_rel_free(struct tty *tp);
76 
77 static TAILQ_HEAD(, tty) tty_list = TAILQ_HEAD_INITIALIZER(tty_list);
78 static struct sx tty_list_sx;
79 SX_SYSINIT(tty_list, &tty_list_sx, "tty list");
80 static unsigned int tty_list_count = 0;
81 
82 /* Character device of /dev/console. */
83 static struct cdev	*dev_console;
84 static const char	*dev_console_filename;
85 
86 /*
87  * Flags that are supported and stored by this implementation.
88  */
89 #define TTYSUP_IFLAG	(IGNBRK|BRKINT|IGNPAR|PARMRK|INPCK|ISTRIP|INLCR|\
90 			IGNCR|ICRNL|IXON|IXOFF|IXANY|IMAXBEL|IUTF8)
91 #define TTYSUP_OFLAG	(OPOST|ONLCR|TAB3|ONOEOT|OCRNL|ONOCR|ONLRET)
92 #define TTYSUP_LFLAG	(ECHOKE|ECHOE|ECHOK|ECHO|ECHONL|ECHOPRT|\
93 			ECHOCTL|ISIG|ICANON|ALTWERASE|IEXTEN|TOSTOP|\
94 			FLUSHO|NOKERNINFO|NOFLSH)
95 #define TTYSUP_CFLAG	(CIGNORE|CSIZE|CSTOPB|CREAD|PARENB|PARODD|\
96 			HUPCL|CLOCAL|CCTS_OFLOW|CRTS_IFLOW|CDTR_IFLOW|\
97 			CDSR_OFLOW|CCAR_OFLOW|CNO_RTSDTR)
98 
99 #define	TTY_CALLOUT(tp,d) (dev2unit(d) & TTYUNIT_CALLOUT)
100 
101 static int  tty_drainwait = 5 * 60;
102 SYSCTL_INT(_kern, OID_AUTO, tty_drainwait, CTLFLAG_RWTUN,
103     &tty_drainwait, 0, "Default output drain timeout in seconds");
104 
105 /*
106  * Set TTY buffer sizes.
107  */
108 
109 #define	TTYBUF_MAX	65536
110 
111 #ifdef PRINTF_BUFR_SIZE
112 #define	TTY_PRBUF_SIZE	PRINTF_BUFR_SIZE
113 #else
114 #define	TTY_PRBUF_SIZE	256
115 #endif
116 
117 /*
118  * Allocate buffer space if necessary, and set low watermarks, based on speed.
119  * Note that the ttyxxxq_setsize() functions may drop and then reacquire the tty
120  * lock during memory allocation.  They will return ENXIO if the tty disappears
121  * while unlocked.
122  */
123 static int
tty_watermarks(struct tty * tp)124 tty_watermarks(struct tty *tp)
125 {
126 	size_t bs = 0;
127 	int error;
128 
129 	/* Provide an input buffer for 2 seconds of data. */
130 	if (tp->t_termios.c_cflag & CREAD)
131 		bs = MIN(tp->t_termios.c_ispeed / 5, TTYBUF_MAX);
132 	error = ttyinq_setsize(&tp->t_inq, tp, bs);
133 	if (error != 0)
134 		return (error);
135 
136 	/* Set low watermark at 10% (when 90% is available). */
137 	tp->t_inlow = (ttyinq_getallocatedsize(&tp->t_inq) * 9) / 10;
138 
139 	/* Provide an output buffer for 2 seconds of data. */
140 	bs = MIN(tp->t_termios.c_ospeed / 5, TTYBUF_MAX);
141 	error = ttyoutq_setsize(&tp->t_outq, tp, bs);
142 	if (error != 0)
143 		return (error);
144 
145 	/* Set low watermark at 10% (when 90% is available). */
146 	tp->t_outlow = (ttyoutq_getallocatedsize(&tp->t_outq) * 9) / 10;
147 
148 	return (0);
149 }
150 
151 static int
tty_drain(struct tty * tp,int leaving)152 tty_drain(struct tty *tp, int leaving)
153 {
154 	sbintime_t timeout_at;
155 	size_t bytes;
156 	int error;
157 
158 	if (ttyhook_hashook(tp, getc_inject))
159 		/* buffer is inaccessible */
160 		return (0);
161 
162 	/*
163 	 * For close(), use the recent historic timeout of "1 second without
164 	 * making progress".  For tcdrain(), use t_drainwait as the timeout,
165 	 * with zero meaning "no timeout" which gives POSIX behavior.
166 	 */
167 	if (leaving)
168 		timeout_at = getsbinuptime() + SBT_1S;
169 	else if (tp->t_drainwait != 0)
170 		timeout_at = getsbinuptime() + SBT_1S * tp->t_drainwait;
171 	else
172 		timeout_at = 0;
173 
174 	/*
175 	 * Poll the output buffer and the hardware for completion, at 10 Hz.
176 	 * Polling is required for devices which are not able to signal an
177 	 * interrupt when the transmitter becomes idle (most USB serial devs).
178 	 * The unusual structure of this loop ensures we check for busy one more
179 	 * time after tty_timedwait() returns EWOULDBLOCK, so that success has
180 	 * higher priority than timeout if the IO completed in the last 100mS.
181 	 */
182 	error = 0;
183 	bytes = ttyoutq_bytesused(&tp->t_outq);
184 	for (;;) {
185 		if (ttyoutq_bytesused(&tp->t_outq) == 0 && !ttydevsw_busy(tp))
186 			return (0);
187 		if (error != 0)
188 			return (error);
189 		ttydevsw_outwakeup(tp);
190 		error = tty_timedwait(tp, &tp->t_outwait, hz / 10);
191 		if (error != 0 && error != EWOULDBLOCK)
192 			return (error);
193 		else if (timeout_at == 0 || getsbinuptime() < timeout_at)
194 			error = 0;
195 		else if (leaving && ttyoutq_bytesused(&tp->t_outq) < bytes) {
196 			/* In close, making progress, grant an extra second. */
197 			error = 0;
198 			timeout_at += SBT_1S;
199 			bytes = ttyoutq_bytesused(&tp->t_outq);
200 		}
201 	}
202 }
203 
204 /*
205  * Though ttydev_enter() and ttydev_leave() seem to be related, they
206  * don't have to be used together. ttydev_enter() is used by the cdev
207  * operations to prevent an actual operation from being processed when
208  * the TTY has been abandoned. ttydev_leave() is used by ttydev_open()
209  * and ttydev_close() to determine whether per-TTY data should be
210  * deallocated.
211  */
212 
213 static __inline int
ttydev_enter(struct tty * tp)214 ttydev_enter(struct tty *tp)
215 {
216 
217 	tty_lock(tp);
218 
219 	if (tty_gone(tp) || !tty_opened(tp)) {
220 		/* Device is already gone. */
221 		tty_unlock(tp);
222 		return (ENXIO);
223 	}
224 
225 	return (0);
226 }
227 
228 static void
ttydev_leave(struct tty * tp)229 ttydev_leave(struct tty *tp)
230 {
231 
232 	tty_assert_locked(tp);
233 
234 	if (tty_opened(tp) || tp->t_flags & TF_OPENCLOSE) {
235 		/* Device is still opened somewhere. */
236 		tty_unlock(tp);
237 		return;
238 	}
239 
240 	tp->t_flags |= TF_OPENCLOSE;
241 
242 	/* Remove console TTY. */
243 	constty_clear(tp);
244 
245 	/* Drain any output. */
246 	if (!tty_gone(tp))
247 		tty_drain(tp, 1);
248 
249 	ttydisc_close(tp);
250 
251 	/* Free i/o queues now since they might be large. */
252 	ttyinq_free(&tp->t_inq);
253 	tp->t_inlow = 0;
254 	ttyoutq_free(&tp->t_outq);
255 	tp->t_outlow = 0;
256 
257 	if (!tty_gone(tp))
258 		ttydevsw_close(tp);
259 
260 	tp->t_flags &= ~TF_OPENCLOSE;
261 	cv_broadcast(&tp->t_dcdwait);
262 	tty_rel_free(tp);
263 }
264 
265 /*
266  * Operations that are exposed through the character device in /dev.
267  */
268 static int
ttydev_open(struct cdev * dev,int oflags,int devtype __unused,struct thread * td)269 ttydev_open(struct cdev *dev, int oflags, int devtype __unused,
270     struct thread *td)
271 {
272 	struct tty *tp;
273 	int error;
274 
275 	tp = dev->si_drv1;
276 	error = 0;
277 	tty_lock(tp);
278 	if (tty_gone(tp)) {
279 		/* Device is already gone. */
280 		tty_unlock(tp);
281 		return (ENXIO);
282 	}
283 
284 	/*
285 	 * Block when other processes are currently opening or closing
286 	 * the TTY.
287 	 */
288 	while (tp->t_flags & TF_OPENCLOSE) {
289 		error = tty_wait(tp, &tp->t_dcdwait);
290 		if (error != 0) {
291 			tty_unlock(tp);
292 			return (error);
293 		}
294 	}
295 	tp->t_flags |= TF_OPENCLOSE;
296 
297 	/*
298 	 * Make sure the "tty" and "cua" device cannot be opened at the
299 	 * same time.  The console is a "tty" device.
300 	 */
301 	if (TTY_CALLOUT(tp, dev)) {
302 		if (tp->t_flags & (TF_OPENED_CONS | TF_OPENED_IN)) {
303 			error = EBUSY;
304 			goto done;
305 		}
306 	} else {
307 		if (tp->t_flags & TF_OPENED_OUT) {
308 			error = EBUSY;
309 			goto done;
310 		}
311 	}
312 
313 	if (tp->t_flags & TF_EXCLUDE && priv_check(td, PRIV_TTY_EXCLUSIVE)) {
314 		error = EBUSY;
315 		goto done;
316 	}
317 
318 	if (!tty_opened(tp)) {
319 		/* Set proper termios flags. */
320 		if (TTY_CALLOUT(tp, dev))
321 			tp->t_termios = tp->t_termios_init_out;
322 		else
323 			tp->t_termios = tp->t_termios_init_in;
324 		ttydevsw_param(tp, &tp->t_termios);
325 		/* Prevent modem control on callout devices and /dev/console. */
326 		if (TTY_CALLOUT(tp, dev) || dev == dev_console)
327 			tp->t_termios.c_cflag |= CLOCAL;
328 
329 		if ((tp->t_termios.c_cflag & CNO_RTSDTR) == 0)
330 			ttydevsw_modem(tp, SER_DTR|SER_RTS, 0);
331 
332 		error = ttydevsw_open(tp);
333 		if (error != 0)
334 			goto done;
335 
336 		ttydisc_open(tp);
337 		error = tty_watermarks(tp);
338 		if (error != 0)
339 			goto done;
340 	}
341 
342 	/* Wait for Carrier Detect. */
343 	if ((oflags & O_NONBLOCK) == 0 &&
344 	    (tp->t_termios.c_cflag & CLOCAL) == 0) {
345 		while ((ttydevsw_modem(tp, 0, 0) & SER_DCD) == 0) {
346 			error = tty_wait(tp, &tp->t_dcdwait);
347 			if (error != 0)
348 				goto done;
349 		}
350 	}
351 
352 	if (dev == dev_console)
353 		tp->t_flags |= TF_OPENED_CONS;
354 	else if (TTY_CALLOUT(tp, dev))
355 		tp->t_flags |= TF_OPENED_OUT;
356 	else
357 		tp->t_flags |= TF_OPENED_IN;
358 	MPASS((tp->t_flags & (TF_OPENED_CONS | TF_OPENED_IN)) == 0 ||
359 	    (tp->t_flags & TF_OPENED_OUT) == 0);
360 
361 done:	tp->t_flags &= ~TF_OPENCLOSE;
362 	cv_broadcast(&tp->t_dcdwait);
363 	ttydev_leave(tp);
364 
365 	return (error);
366 }
367 
368 static int
ttydev_close(struct cdev * dev,int fflag,int devtype __unused,struct thread * td)369 ttydev_close(struct cdev *dev, int fflag, int devtype __unused,
370     struct thread *td)
371 {
372 	struct tty *tp = dev->si_drv1;
373 
374 	tty_lock(tp);
375 
376 	/*
377 	 * Don't actually close the device if it is being used as the
378 	 * console.
379 	 */
380 	MPASS((tp->t_flags & (TF_OPENED_CONS | TF_OPENED_IN)) == 0 ||
381 	    (tp->t_flags & TF_OPENED_OUT) == 0);
382 	if (dev == dev_console)
383 		tp->t_flags &= ~TF_OPENED_CONS;
384 	else
385 		tp->t_flags &= ~(TF_OPENED_IN|TF_OPENED_OUT);
386 
387 	if (tp->t_flags & TF_OPENED) {
388 		tty_unlock(tp);
389 		return (0);
390 	}
391 
392 	/* If revoking, flush output now to avoid draining it later. */
393 	if ((fflag & FREVOKE) != 0) {
394 		tty_flush(tp, FWRITE);
395 		knlist_delete(&tp->t_inpoll.si_note, td, 1);
396 		knlist_delete(&tp->t_outpoll.si_note, td, 1);
397 	}
398 
399 	tp->t_flags &= ~TF_EXCLUDE;
400 
401 	/* Properly wake up threads that are stuck - revoke(). */
402 	tp->t_revokecnt++;
403 	tty_wakeup(tp, FREAD|FWRITE);
404 	cv_broadcast(&tp->t_bgwait);
405 	cv_broadcast(&tp->t_dcdwait);
406 
407 	ttydev_leave(tp);
408 
409 	return (0);
410 }
411 
412 static __inline int
tty_is_ctty(struct tty * tp,struct proc * p)413 tty_is_ctty(struct tty *tp, struct proc *p)
414 {
415 
416 	tty_assert_locked(tp);
417 
418 	return (p->p_session == tp->t_session && p->p_flag & P_CONTROLT);
419 }
420 
421 int
tty_wait_background(struct tty * tp,struct thread * td,int sig)422 tty_wait_background(struct tty *tp, struct thread *td, int sig)
423 {
424 	struct proc *p;
425 	struct pgrp *pg;
426 	ksiginfo_t ksi;
427 	int error;
428 
429 	MPASS(sig == SIGTTIN || sig == SIGTTOU);
430 	tty_assert_locked(tp);
431 
432 	p = td->td_proc;
433 	for (;;) {
434 		pg = p->p_pgrp;
435 		PGRP_LOCK(pg);
436 		PROC_LOCK(p);
437 
438 		/*
439 		 * pg may no longer be our process group.
440 		 * Re-check after locking.
441 		 */
442 		if (p->p_pgrp != pg) {
443 			PROC_UNLOCK(p);
444 			PGRP_UNLOCK(pg);
445 			continue;
446 		}
447 
448 		/*
449 		 * The process should only sleep, when:
450 		 * - This terminal is the controlling terminal
451 		 * - Its process group is not the foreground process
452 		 *   group
453 		 * - The parent process isn't waiting for the child to
454 		 *   exit
455 		 * - the signal to send to the process isn't masked
456 		 */
457 		if (!tty_is_ctty(tp, p) || p->p_pgrp == tp->t_pgrp) {
458 			/* Allow the action to happen. */
459 			PROC_UNLOCK(p);
460 			PGRP_UNLOCK(pg);
461 			return (0);
462 		}
463 
464 		if (SIGISMEMBER(p->p_sigacts->ps_sigignore, sig) ||
465 		    SIGISMEMBER(td->td_sigmask, sig)) {
466 			/* Only allow them in write()/ioctl(). */
467 			PROC_UNLOCK(p);
468 			PGRP_UNLOCK(pg);
469 			return (sig == SIGTTOU ? 0 : EIO);
470 		}
471 
472 		if ((p->p_flag & P_PPWAIT) != 0 ||
473 		    (pg->pg_flags & PGRP_ORPHANED) != 0) {
474 			/* Don't allow the action to happen. */
475 			PROC_UNLOCK(p);
476 			PGRP_UNLOCK(pg);
477 			return (EIO);
478 		}
479 		PROC_UNLOCK(p);
480 
481 		/*
482 		 * Send the signal and sleep until we're the new
483 		 * foreground process group.
484 		 */
485 		if (sig != 0) {
486 			ksiginfo_init(&ksi);
487 			ksi.ksi_code = SI_KERNEL;
488 			ksi.ksi_signo = sig;
489 			sig = 0;
490 		}
491 
492 		pgsignal(pg, ksi.ksi_signo, 1, &ksi);
493 		PGRP_UNLOCK(pg);
494 
495 		error = tty_wait(tp, &tp->t_bgwait);
496 		if (error)
497 			return (error);
498 	}
499 }
500 
501 static int
ttydev_read(struct cdev * dev,struct uio * uio,int ioflag)502 ttydev_read(struct cdev *dev, struct uio *uio, int ioflag)
503 {
504 	struct tty *tp = dev->si_drv1;
505 	int error;
506 
507 	error = ttydev_enter(tp);
508 	if (error)
509 		goto done;
510 	error = ttydisc_read(tp, uio, ioflag);
511 	tty_unlock(tp);
512 
513 	/*
514 	 * The read() call should not throw an error when the device is
515 	 * being destroyed. Silently convert it to an EOF.
516 	 */
517 done:	if (error == ENXIO)
518 		error = 0;
519 	return (error);
520 }
521 
522 static int
ttydev_write(struct cdev * dev,struct uio * uio,int ioflag)523 ttydev_write(struct cdev *dev, struct uio *uio, int ioflag)
524 {
525 	struct tty *tp = dev->si_drv1;
526 	int defer, error;
527 
528 	error = ttydev_enter(tp);
529 	if (error)
530 		return (error);
531 
532 	if (tp->t_termios.c_lflag & TOSTOP) {
533 		error = tty_wait_background(tp, curthread, SIGTTOU);
534 		if (error)
535 			goto done;
536 	}
537 
538 	if (ioflag & IO_NDELAY && tp->t_flags & TF_BUSY_OUT) {
539 		/* Allow non-blocking writes to bypass serialization. */
540 		error = ttydisc_write(tp, uio, ioflag);
541 	} else {
542 		/* Serialize write() calls. */
543 		while (tp->t_flags & TF_BUSY_OUT) {
544 			error = tty_wait(tp, &tp->t_outserwait);
545 			if (error)
546 				goto done;
547 		}
548 
549 		tp->t_flags |= TF_BUSY_OUT;
550 		defer = sigdeferstop(SIGDEFERSTOP_ERESTART);
551 		error = ttydisc_write(tp, uio, ioflag);
552 		sigallowstop(defer);
553 		tp->t_flags &= ~TF_BUSY_OUT;
554 		cv_signal(&tp->t_outserwait);
555 	}
556 
557 done:	tty_unlock(tp);
558 	return (error);
559 }
560 
561 static int
ttydev_ioctl(struct cdev * dev,u_long cmd,caddr_t data,int fflag,struct thread * td)562 ttydev_ioctl(struct cdev *dev, u_long cmd, caddr_t data, int fflag,
563     struct thread *td)
564 {
565 	struct tty *tp = dev->si_drv1;
566 	int error;
567 
568 	error = ttydev_enter(tp);
569 	if (error)
570 		return (error);
571 
572 	switch (cmd) {
573 	case TIOCCBRK:
574 	case TIOCCONS:
575 	case TIOCDRAIN:
576 	case TIOCEXCL:
577 	case TIOCFLUSH:
578 	case TIOCNXCL:
579 	case TIOCSBRK:
580 	case TIOCSCTTY:
581 	case TIOCSETA:
582 	case TIOCSETAF:
583 	case TIOCSETAW:
584 	case TIOCSPGRP:
585 	case TIOCSTART:
586 	case TIOCSTAT:
587 	case TIOCSTI:
588 	case TIOCSTOP:
589 	case TIOCSWINSZ:
590 #if 0
591 	case TIOCSDRAINWAIT:
592 	case TIOCSETD:
593 #endif
594 #ifdef COMPAT_43TTY
595 	case  TIOCLBIC:
596 	case  TIOCLBIS:
597 	case  TIOCLSET:
598 	case  TIOCSETC:
599 	case OTIOCSETD:
600 	case  TIOCSETN:
601 	case  TIOCSETP:
602 	case  TIOCSLTC:
603 #endif /* COMPAT_43TTY */
604 		/*
605 		 * If the ioctl() causes the TTY to be modified, let it
606 		 * wait in the background.
607 		 */
608 		error = tty_wait_background(tp, curthread, SIGTTOU);
609 		if (error)
610 			goto done;
611 	}
612 
613 	if (cmd == TIOCSETA || cmd == TIOCSETAW || cmd == TIOCSETAF) {
614 		struct termios *old = &tp->t_termios;
615 		struct termios *new = (struct termios *)data;
616 		struct termios *lock = TTY_CALLOUT(tp, dev) ?
617 		    &tp->t_termios_lock_out : &tp->t_termios_lock_in;
618 		int cc;
619 
620 		/*
621 		 * Lock state devices.  Just overwrite the values of the
622 		 * commands that are currently in use.
623 		 */
624 		new->c_iflag = (old->c_iflag & lock->c_iflag) |
625 		    (new->c_iflag & ~lock->c_iflag);
626 		new->c_oflag = (old->c_oflag & lock->c_oflag) |
627 		    (new->c_oflag & ~lock->c_oflag);
628 		new->c_cflag = (old->c_cflag & lock->c_cflag) |
629 		    (new->c_cflag & ~lock->c_cflag);
630 		new->c_lflag = (old->c_lflag & lock->c_lflag) |
631 		    (new->c_lflag & ~lock->c_lflag);
632 		for (cc = 0; cc < NCCS; ++cc)
633 			if (lock->c_cc[cc])
634 				new->c_cc[cc] = old->c_cc[cc];
635 		if (lock->c_ispeed)
636 			new->c_ispeed = old->c_ispeed;
637 		if (lock->c_ospeed)
638 			new->c_ospeed = old->c_ospeed;
639 	}
640 
641 	error = tty_ioctl(tp, cmd, data, fflag, td);
642 done:	tty_unlock(tp);
643 
644 	return (error);
645 }
646 
647 static int
ttydev_poll(struct cdev * dev,int events,struct thread * td)648 ttydev_poll(struct cdev *dev, int events, struct thread *td)
649 {
650 	struct tty *tp = dev->si_drv1;
651 	int error, revents = 0;
652 
653 	error = ttydev_enter(tp);
654 	if (error)
655 		return ((events & (POLLIN|POLLRDNORM)) | POLLHUP);
656 
657 	if (events & (POLLIN|POLLRDNORM)) {
658 		/* See if we can read something. */
659 		if (ttydisc_read_poll(tp) > 0)
660 			revents |= events & (POLLIN|POLLRDNORM);
661 	}
662 
663 	if (tp->t_flags & TF_ZOMBIE) {
664 		/* Hangup flag on zombie state. */
665 		revents |= POLLHUP;
666 	} else if (events & (POLLOUT|POLLWRNORM)) {
667 		/* See if we can write something. */
668 		if (ttydisc_write_poll(tp) > 0)
669 			revents |= events & (POLLOUT|POLLWRNORM);
670 	}
671 
672 	if (revents == 0) {
673 		if (events & (POLLIN|POLLRDNORM))
674 			selrecord(td, &tp->t_inpoll);
675 		if (events & (POLLOUT|POLLWRNORM))
676 			selrecord(td, &tp->t_outpoll);
677 	}
678 
679 	tty_unlock(tp);
680 
681 	return (revents);
682 }
683 
684 static int
ttydev_mmap(struct cdev * dev,vm_ooffset_t offset,vm_paddr_t * paddr,int nprot,vm_memattr_t * memattr)685 ttydev_mmap(struct cdev *dev, vm_ooffset_t offset, vm_paddr_t *paddr,
686     int nprot, vm_memattr_t *memattr)
687 {
688 	struct tty *tp = dev->si_drv1;
689 	int error;
690 
691 	/* Handle mmap() through the driver. */
692 
693 	error = ttydev_enter(tp);
694 	if (error)
695 		return (-1);
696 	error = ttydevsw_mmap(tp, offset, paddr, nprot, memattr);
697 	tty_unlock(tp);
698 
699 	return (error);
700 }
701 
702 /*
703  * kqueue support.
704  */
705 
706 static void
tty_kqops_read_detach(struct knote * kn)707 tty_kqops_read_detach(struct knote *kn)
708 {
709 	struct tty *tp = kn->kn_hook;
710 
711 	knlist_remove(&tp->t_inpoll.si_note, kn, 0);
712 }
713 
714 static int
tty_kqops_read_event(struct knote * kn,long hint __unused)715 tty_kqops_read_event(struct knote *kn, long hint __unused)
716 {
717 	struct tty *tp = kn->kn_hook;
718 
719 	tty_assert_locked(tp);
720 
721 	if (tty_gone(tp) || tp->t_flags & TF_ZOMBIE) {
722 		kn->kn_flags |= EV_EOF;
723 		return (1);
724 	} else {
725 		kn->kn_data = ttydisc_read_poll(tp);
726 		return (kn->kn_data > 0);
727 	}
728 }
729 
730 static void
tty_kqops_write_detach(struct knote * kn)731 tty_kqops_write_detach(struct knote *kn)
732 {
733 	struct tty *tp = kn->kn_hook;
734 
735 	knlist_remove(&tp->t_outpoll.si_note, kn, 0);
736 }
737 
738 static int
tty_kqops_write_event(struct knote * kn,long hint __unused)739 tty_kqops_write_event(struct knote *kn, long hint __unused)
740 {
741 	struct tty *tp = kn->kn_hook;
742 
743 	tty_assert_locked(tp);
744 
745 	if (tty_gone(tp)) {
746 		kn->kn_flags |= EV_EOF;
747 		return (1);
748 	} else {
749 		kn->kn_data = ttydisc_write_poll(tp);
750 		return (kn->kn_data > 0);
751 	}
752 }
753 
754 static const struct filterops tty_kqops_read = {
755 	.f_isfd = 1,
756 	.f_detach = tty_kqops_read_detach,
757 	.f_event = tty_kqops_read_event,
758 };
759 
760 static const struct filterops tty_kqops_write = {
761 	.f_isfd = 1,
762 	.f_detach = tty_kqops_write_detach,
763 	.f_event = tty_kqops_write_event,
764 };
765 
766 static int
ttydev_kqfilter(struct cdev * dev,struct knote * kn)767 ttydev_kqfilter(struct cdev *dev, struct knote *kn)
768 {
769 	struct tty *tp = dev->si_drv1;
770 	int error;
771 
772 	error = ttydev_enter(tp);
773 	if (error)
774 		return (error);
775 
776 	switch (kn->kn_filter) {
777 	case EVFILT_READ:
778 		kn->kn_hook = tp;
779 		kn->kn_fop = &tty_kqops_read;
780 		knlist_add(&tp->t_inpoll.si_note, kn, 1);
781 		break;
782 	case EVFILT_WRITE:
783 		kn->kn_hook = tp;
784 		kn->kn_fop = &tty_kqops_write;
785 		knlist_add(&tp->t_outpoll.si_note, kn, 1);
786 		break;
787 	default:
788 		error = EINVAL;
789 		break;
790 	}
791 
792 	tty_unlock(tp);
793 	return (error);
794 }
795 
796 static struct cdevsw ttydev_cdevsw = {
797 	.d_version	= D_VERSION,
798 	.d_open		= ttydev_open,
799 	.d_close	= ttydev_close,
800 	.d_read		= ttydev_read,
801 	.d_write	= ttydev_write,
802 	.d_ioctl	= ttydev_ioctl,
803 	.d_kqfilter	= ttydev_kqfilter,
804 	.d_poll		= ttydev_poll,
805 	.d_mmap		= ttydev_mmap,
806 	.d_name		= "ttydev",
807 	.d_flags	= D_TTY,
808 };
809 
810 /*
811  * Init/lock-state devices
812  */
813 
814 static int
ttyil_open(struct cdev * dev,int oflags __unused,int devtype __unused,struct thread * td)815 ttyil_open(struct cdev *dev, int oflags __unused, int devtype __unused,
816     struct thread *td)
817 {
818 	struct tty *tp;
819 	int error;
820 
821 	tp = dev->si_drv1;
822 	error = 0;
823 	tty_lock(tp);
824 	if (tty_gone(tp))
825 		error = ENODEV;
826 	tty_unlock(tp);
827 
828 	return (error);
829 }
830 
831 static int
ttyil_close(struct cdev * dev __unused,int flag __unused,int mode __unused,struct thread * td __unused)832 ttyil_close(struct cdev *dev __unused, int flag __unused, int mode __unused,
833     struct thread *td __unused)
834 {
835 
836 	return (0);
837 }
838 
839 static int
ttyil_rdwr(struct cdev * dev __unused,struct uio * uio __unused,int ioflag __unused)840 ttyil_rdwr(struct cdev *dev __unused, struct uio *uio __unused,
841     int ioflag __unused)
842 {
843 
844 	return (ENODEV);
845 }
846 
847 static int
ttyil_ioctl(struct cdev * dev,u_long cmd,caddr_t data,int fflag,struct thread * td)848 ttyil_ioctl(struct cdev *dev, u_long cmd, caddr_t data, int fflag,
849     struct thread *td)
850 {
851 	struct tty *tp = dev->si_drv1;
852 	int error;
853 
854 	tty_lock(tp);
855 	if (tty_gone(tp)) {
856 		error = ENODEV;
857 		goto done;
858 	}
859 
860 	error = ttydevsw_cioctl(tp, dev2unit(dev), cmd, data, td);
861 	if (error != ENOIOCTL)
862 		goto done;
863 	error = 0;
864 
865 	switch (cmd) {
866 	case TIOCGETA:
867 		/* Obtain terminal flags through tcgetattr(). */
868 		*(struct termios*)data = *(struct termios*)dev->si_drv2;
869 		break;
870 	case TIOCSETA:
871 		/* Set terminal flags through tcsetattr(). */
872 		error = priv_check(td, PRIV_TTY_SETA);
873 		if (error)
874 			break;
875 		*(struct termios*)dev->si_drv2 = *(struct termios*)data;
876 		break;
877 	case TIOCGETD:
878 		*(int *)data = TTYDISC;
879 		break;
880 	case TIOCGWINSZ:
881 		bzero(data, sizeof(struct winsize));
882 		break;
883 	default:
884 		error = ENOTTY;
885 	}
886 
887 done:	tty_unlock(tp);
888 	return (error);
889 }
890 
891 static struct cdevsw ttyil_cdevsw = {
892 	.d_version	= D_VERSION,
893 	.d_open		= ttyil_open,
894 	.d_close	= ttyil_close,
895 	.d_read		= ttyil_rdwr,
896 	.d_write	= ttyil_rdwr,
897 	.d_ioctl	= ttyil_ioctl,
898 	.d_name		= "ttyil",
899 	.d_flags	= D_TTY,
900 };
901 
902 static void
tty_init_termios(struct tty * tp)903 tty_init_termios(struct tty *tp)
904 {
905 	struct termios *t = &tp->t_termios_init_in;
906 
907 	t->c_cflag = TTYDEF_CFLAG;
908 	t->c_iflag = TTYDEF_IFLAG;
909 	t->c_lflag = TTYDEF_LFLAG;
910 	t->c_oflag = TTYDEF_OFLAG;
911 	t->c_ispeed = TTYDEF_SPEED;
912 	t->c_ospeed = TTYDEF_SPEED;
913 	memcpy(&t->c_cc, ttydefchars, sizeof ttydefchars);
914 
915 	tp->t_termios_init_out = *t;
916 }
917 
918 void
tty_init_console(struct tty * tp,speed_t s)919 tty_init_console(struct tty *tp, speed_t s)
920 {
921 	struct termios *ti = &tp->t_termios_init_in;
922 	struct termios *to = &tp->t_termios_init_out;
923 
924 	if (s != 0) {
925 		ti->c_ispeed = ti->c_ospeed = s;
926 		to->c_ispeed = to->c_ospeed = s;
927 	}
928 
929 	ti->c_cflag |= CLOCAL;
930 	to->c_cflag |= CLOCAL;
931 }
932 
933 /*
934  * Standard device routine implementations, mostly meant for
935  * pseudo-terminal device drivers. When a driver creates a new terminal
936  * device class, missing routines are patched.
937  */
938 
939 static int
ttydevsw_defopen(struct tty * tp __unused)940 ttydevsw_defopen(struct tty *tp __unused)
941 {
942 
943 	return (0);
944 }
945 
946 static void
ttydevsw_defclose(struct tty * tp __unused)947 ttydevsw_defclose(struct tty *tp __unused)
948 {
949 
950 }
951 
952 static void
ttydevsw_defoutwakeup(struct tty * tp __unused)953 ttydevsw_defoutwakeup(struct tty *tp __unused)
954 {
955 
956 	panic("Terminal device has output, while not implemented");
957 }
958 
959 static void
ttydevsw_definwakeup(struct tty * tp __unused)960 ttydevsw_definwakeup(struct tty *tp __unused)
961 {
962 
963 }
964 
965 static int
ttydevsw_defioctl(struct tty * tp __unused,u_long cmd __unused,caddr_t data __unused,struct thread * td __unused)966 ttydevsw_defioctl(struct tty *tp __unused, u_long cmd __unused,
967     caddr_t data __unused, struct thread *td __unused)
968 {
969 
970 	return (ENOIOCTL);
971 }
972 
973 static int
ttydevsw_defcioctl(struct tty * tp __unused,int unit __unused,u_long cmd __unused,caddr_t data __unused,struct thread * td __unused)974 ttydevsw_defcioctl(struct tty *tp __unused, int unit __unused,
975     u_long cmd __unused, caddr_t data __unused, struct thread *td __unused)
976 {
977 
978 	return (ENOIOCTL);
979 }
980 
981 static int
ttydevsw_defparam(struct tty * tp __unused,struct termios * t)982 ttydevsw_defparam(struct tty *tp __unused, struct termios *t)
983 {
984 
985 	/*
986 	 * Allow the baud rate to be adjusted for pseudo-devices, but at
987 	 * least restrict it to 115200 to prevent excessive buffer
988 	 * usage.  Also disallow 0, to prevent foot shooting.
989 	 */
990 	if (t->c_ispeed < B50)
991 		t->c_ispeed = B50;
992 	else if (t->c_ispeed > B115200)
993 		t->c_ispeed = B115200;
994 	if (t->c_ospeed < B50)
995 		t->c_ospeed = B50;
996 	else if (t->c_ospeed > B115200)
997 		t->c_ospeed = B115200;
998 	t->c_cflag |= CREAD;
999 
1000 	return (0);
1001 }
1002 
1003 static int
ttydevsw_defmodem(struct tty * tp __unused,int sigon __unused,int sigoff __unused)1004 ttydevsw_defmodem(struct tty *tp __unused, int sigon __unused,
1005     int sigoff __unused)
1006 {
1007 
1008 	/* Simulate a carrier to make the TTY layer happy. */
1009 	return (SER_DCD);
1010 }
1011 
1012 static int
ttydevsw_defmmap(struct tty * tp __unused,vm_ooffset_t offset __unused,vm_paddr_t * paddr __unused,int nprot __unused,vm_memattr_t * memattr __unused)1013 ttydevsw_defmmap(struct tty *tp __unused, vm_ooffset_t offset __unused,
1014     vm_paddr_t *paddr __unused, int nprot __unused,
1015     vm_memattr_t *memattr __unused)
1016 {
1017 
1018 	return (-1);
1019 }
1020 
1021 static void
ttydevsw_defpktnotify(struct tty * tp __unused,char event __unused)1022 ttydevsw_defpktnotify(struct tty *tp __unused, char event __unused)
1023 {
1024 
1025 }
1026 
1027 static void
ttydevsw_deffree(void * softc __unused)1028 ttydevsw_deffree(void *softc __unused)
1029 {
1030 
1031 	panic("Terminal device freed without a free-handler");
1032 }
1033 
1034 static bool
ttydevsw_defbusy(struct tty * tp __unused)1035 ttydevsw_defbusy(struct tty *tp __unused)
1036 {
1037 
1038 	return (FALSE);
1039 }
1040 
1041 /*
1042  * TTY allocation and deallocation. TTY devices can be deallocated when
1043  * the driver doesn't use it anymore, when the TTY isn't a session's
1044  * controlling TTY and when the device node isn't opened through devfs.
1045  */
1046 
1047 struct tty *
tty_alloc(struct ttydevsw * tsw,void * sc)1048 tty_alloc(struct ttydevsw *tsw, void *sc)
1049 {
1050 
1051 	return (tty_alloc_mutex(tsw, sc, NULL));
1052 }
1053 
1054 struct tty *
tty_alloc_mutex(struct ttydevsw * tsw,void * sc,struct mtx * mutex)1055 tty_alloc_mutex(struct ttydevsw *tsw, void *sc, struct mtx *mutex)
1056 {
1057 	struct tty *tp;
1058 
1059 	/* Make sure the driver defines all routines. */
1060 #define PATCH_FUNC(x) do {				\
1061 	if (tsw->tsw_ ## x == NULL)			\
1062 		tsw->tsw_ ## x = ttydevsw_def ## x;	\
1063 } while (0)
1064 	PATCH_FUNC(open);
1065 	PATCH_FUNC(close);
1066 	PATCH_FUNC(outwakeup);
1067 	PATCH_FUNC(inwakeup);
1068 	PATCH_FUNC(ioctl);
1069 	PATCH_FUNC(cioctl);
1070 	PATCH_FUNC(param);
1071 	PATCH_FUNC(modem);
1072 	PATCH_FUNC(mmap);
1073 	PATCH_FUNC(pktnotify);
1074 	PATCH_FUNC(free);
1075 	PATCH_FUNC(busy);
1076 #undef PATCH_FUNC
1077 
1078 	tp = malloc(sizeof(struct tty) + TTY_PRBUF_SIZE, M_TTY,
1079 	    M_WAITOK | M_ZERO);
1080 	tp->t_prbufsz = TTY_PRBUF_SIZE;
1081 	tp->t_devsw = tsw;
1082 	tp->t_devswsoftc = sc;
1083 	tp->t_flags = tsw->tsw_flags;
1084 	tp->t_drainwait = tty_drainwait;
1085 
1086 	tty_init_termios(tp);
1087 
1088 	cv_init(&tp->t_inwait, "ttyin");
1089 	cv_init(&tp->t_outwait, "ttyout");
1090 	cv_init(&tp->t_outserwait, "ttyosr");
1091 	cv_init(&tp->t_bgwait, "ttybg");
1092 	cv_init(&tp->t_dcdwait, "ttydcd");
1093 
1094 	/* Allow drivers to use a custom mutex to lock the TTY. */
1095 	if (mutex != NULL) {
1096 		tp->t_mtx = mutex;
1097 	} else {
1098 		tp->t_mtx = &tp->t_mtxobj;
1099 		mtx_init(&tp->t_mtxobj, "ttymtx", NULL, MTX_DEF);
1100 	}
1101 
1102 	knlist_init_mtx(&tp->t_inpoll.si_note, tp->t_mtx);
1103 	knlist_init_mtx(&tp->t_outpoll.si_note, tp->t_mtx);
1104 
1105 	return (tp);
1106 }
1107 
1108 static void
tty_dealloc(void * arg)1109 tty_dealloc(void *arg)
1110 {
1111 	struct tty *tp = arg;
1112 
1113 	/*
1114 	 * ttyydev_leave() usually frees the i/o queues earlier, but it is
1115 	 * not always called between queue allocation and here.  The queues
1116 	 * may be allocated by ioctls on a pty control device without the
1117 	 * corresponding pty slave device ever being open, or after it is
1118 	 * closed.
1119 	 */
1120 	ttyinq_free(&tp->t_inq);
1121 	ttyoutq_free(&tp->t_outq);
1122 	seldrain(&tp->t_inpoll);
1123 	seldrain(&tp->t_outpoll);
1124 	knlist_clear(&tp->t_inpoll.si_note, 0);
1125 	knlist_clear(&tp->t_outpoll.si_note, 0);
1126 	knlist_destroy(&tp->t_inpoll.si_note);
1127 	knlist_destroy(&tp->t_outpoll.si_note);
1128 
1129 	cv_destroy(&tp->t_inwait);
1130 	cv_destroy(&tp->t_outwait);
1131 	cv_destroy(&tp->t_bgwait);
1132 	cv_destroy(&tp->t_dcdwait);
1133 	cv_destroy(&tp->t_outserwait);
1134 
1135 	if (tp->t_mtx == &tp->t_mtxobj)
1136 		mtx_destroy(&tp->t_mtxobj);
1137 	ttydevsw_free(tp);
1138 	free(tp, M_TTY);
1139 }
1140 
1141 static void
tty_rel_free(struct tty * tp)1142 tty_rel_free(struct tty *tp)
1143 {
1144 	struct cdev *dev;
1145 
1146 	tty_assert_locked(tp);
1147 
1148 #define	TF_ACTIVITY	(TF_GONE|TF_OPENED|TF_HOOK|TF_OPENCLOSE)
1149 	if (tp->t_sessioncnt != 0 || (tp->t_flags & TF_ACTIVITY) != TF_GONE) {
1150 		/* TTY is still in use. */
1151 		tty_unlock(tp);
1152 		return;
1153 	}
1154 
1155 	/* Stop asynchronous I/O. */
1156 	funsetown(&tp->t_sigio);
1157 
1158 	/* TTY can be deallocated. */
1159 	dev = tp->t_dev;
1160 	tp->t_dev = NULL;
1161 	tty_unlock(tp);
1162 
1163 	if (dev != NULL) {
1164 		sx_xlock(&tty_list_sx);
1165 		TAILQ_REMOVE(&tty_list, tp, t_list);
1166 		tty_list_count--;
1167 		sx_xunlock(&tty_list_sx);
1168 		destroy_dev_sched_cb(dev, tty_dealloc, tp);
1169 	}
1170 }
1171 
1172 void
tty_rel_pgrp(struct tty * tp,struct pgrp * pg)1173 tty_rel_pgrp(struct tty *tp, struct pgrp *pg)
1174 {
1175 
1176 	MPASS(tp->t_sessioncnt > 0);
1177 	tty_assert_locked(tp);
1178 
1179 	if (tp->t_pgrp == pg)
1180 		tp->t_pgrp = NULL;
1181 
1182 	tty_unlock(tp);
1183 }
1184 
1185 void
tty_rel_sess(struct tty * tp,struct session * sess)1186 tty_rel_sess(struct tty *tp, struct session *sess)
1187 {
1188 
1189 	MPASS(tp->t_sessioncnt > 0);
1190 
1191 	/* Current session has left. */
1192 	if (tp->t_session == sess) {
1193 		tp->t_session = NULL;
1194 		MPASS(tp->t_pgrp == NULL);
1195 	}
1196 	tp->t_sessioncnt--;
1197 	tty_rel_free(tp);
1198 }
1199 
1200 void
tty_rel_gone(struct tty * tp)1201 tty_rel_gone(struct tty *tp)
1202 {
1203 
1204 	tty_assert_locked(tp);
1205 	MPASS(!tty_gone(tp));
1206 
1207 	/* Simulate carrier removal. */
1208 	ttydisc_modem(tp, 0);
1209 
1210 	/* Wake up all blocked threads. */
1211 	tty_wakeup(tp, FREAD|FWRITE);
1212 	cv_broadcast(&tp->t_bgwait);
1213 	cv_broadcast(&tp->t_dcdwait);
1214 
1215 	tp->t_flags |= TF_GONE;
1216 	tty_rel_free(tp);
1217 }
1218 
1219 static int
tty_drop_ctty(struct tty * tp,struct proc * p)1220 tty_drop_ctty(struct tty *tp, struct proc *p)
1221 {
1222 	struct session *session;
1223 	struct vnode *vp;
1224 
1225 	/*
1226 	 * This looks terrible, but it's generally safe as long as the tty
1227 	 * hasn't gone away while we had the lock dropped.  All of our sanity
1228 	 * checking that this operation is OK happens after we've picked it back
1229 	 * up, so other state changes are generally not fatal and the potential
1230 	 * for this particular operation to happen out-of-order in a
1231 	 * multithreaded scenario is likely a non-issue.
1232 	 */
1233 	tty_unlock(tp);
1234 	sx_xlock(&proctree_lock);
1235 	tty_lock(tp);
1236 	if (tty_gone(tp)) {
1237 		sx_xunlock(&proctree_lock);
1238 		return (ENODEV);
1239 	}
1240 
1241 	/*
1242 	 * If the session doesn't have a controlling TTY, or if we weren't
1243 	 * invoked on the controlling TTY, we'll return ENOIOCTL as we've
1244 	 * historically done.
1245 	 */
1246 	session = p->p_session;
1247 	if (session->s_ttyp == NULL || session->s_ttyp != tp) {
1248 		sx_xunlock(&proctree_lock);
1249 		return (ENOTTY);
1250 	}
1251 
1252 	if (!SESS_LEADER(p)) {
1253 		sx_xunlock(&proctree_lock);
1254 		return (EPERM);
1255 	}
1256 
1257 	PROC_LOCK(p);
1258 	SESS_LOCK(session);
1259 	vp = session->s_ttyvp;
1260 	session->s_ttyp = NULL;
1261 	session->s_ttyvp = NULL;
1262 	session->s_ttydp = NULL;
1263 	SESS_UNLOCK(session);
1264 
1265 	tp->t_sessioncnt--;
1266 	p->p_flag &= ~P_CONTROLT;
1267 	PROC_UNLOCK(p);
1268 	sx_xunlock(&proctree_lock);
1269 
1270 	/*
1271 	 * If we did have a vnode, release our reference.  Ordinarily we manage
1272 	 * these at the devfs layer, but we can't necessarily know that we were
1273 	 * invoked on the vnode referenced in the session (i.e. the vnode we
1274 	 * hold a reference to).  We explicitly don't check VBAD/VIRF_DOOMED here
1275 	 * to avoid a vnode leak -- in circumstances elsewhere where we'd hit a
1276 	 * VIRF_DOOMED vnode, release has been deferred until the controlling TTY
1277 	 * is either changed or released.
1278 	 */
1279 	if (vp != NULL)
1280 		devfs_ctty_unref(vp);
1281 	return (0);
1282 }
1283 
1284 /*
1285  * Exposing information about current TTY's through sysctl
1286  */
1287 
1288 static void
tty_to_xtty(struct tty * tp,struct xtty * xt)1289 tty_to_xtty(struct tty *tp, struct xtty *xt)
1290 {
1291 
1292 	tty_assert_locked(tp);
1293 
1294 	memset(xt, 0, sizeof(*xt));
1295 	xt->xt_size = sizeof(struct xtty);
1296 	xt->xt_insize = ttyinq_getsize(&tp->t_inq);
1297 	xt->xt_incc = ttyinq_bytescanonicalized(&tp->t_inq);
1298 	xt->xt_inlc = ttyinq_bytesline(&tp->t_inq);
1299 	xt->xt_inlow = tp->t_inlow;
1300 	xt->xt_outsize = ttyoutq_getsize(&tp->t_outq);
1301 	xt->xt_outcc = ttyoutq_bytesused(&tp->t_outq);
1302 	xt->xt_outlow = tp->t_outlow;
1303 	xt->xt_column = tp->t_column;
1304 	xt->xt_pgid = tp->t_pgrp ? tp->t_pgrp->pg_id : 0;
1305 	xt->xt_sid = tp->t_session ? tp->t_session->s_sid : 0;
1306 	xt->xt_flags = tp->t_flags;
1307 	xt->xt_dev = tp->t_dev ? dev2udev(tp->t_dev) : (uint32_t)NODEV;
1308 }
1309 
1310 static int
sysctl_kern_ttys(SYSCTL_HANDLER_ARGS)1311 sysctl_kern_ttys(SYSCTL_HANDLER_ARGS)
1312 {
1313 	unsigned long lsize;
1314 	struct thread *td = curthread;
1315 	struct xtty *xtlist, *xt;
1316 	struct tty *tp;
1317 	struct proc *p;
1318 	int error;
1319 	bool cansee;
1320 
1321 	sx_slock(&tty_list_sx);
1322 	lsize = tty_list_count * sizeof(struct xtty);
1323 	if (lsize == 0) {
1324 		sx_sunlock(&tty_list_sx);
1325 		return (0);
1326 	}
1327 
1328 	xtlist = xt = malloc(lsize, M_TTY, M_WAITOK);
1329 
1330 	TAILQ_FOREACH(tp, &tty_list, t_list) {
1331 		tty_lock(tp);
1332 		if (tp->t_session != NULL &&
1333 		    (p = atomic_load_ptr(&tp->t_session->s_leader)) != NULL) {
1334 			PROC_LOCK(p);
1335 			cansee = (p_cansee(td, p) == 0);
1336 			PROC_UNLOCK(p);
1337 		} else {
1338 			cansee = !jailed(td->td_ucred);
1339 		}
1340 		if (cansee) {
1341 			tty_to_xtty(tp, xt);
1342 			xt++;
1343 		}
1344 		tty_unlock(tp);
1345 	}
1346 	sx_sunlock(&tty_list_sx);
1347 
1348 	lsize = (xt - xtlist) * sizeof(struct xtty);
1349 	if (lsize > 0) {
1350 		error = SYSCTL_OUT(req, xtlist, lsize);
1351 	} else {
1352 		error = 0;
1353 	}
1354 	free(xtlist, M_TTY);
1355 	return (error);
1356 }
1357 
1358 SYSCTL_PROC(_kern, OID_AUTO, ttys, CTLTYPE_OPAQUE|CTLFLAG_RD|CTLFLAG_MPSAFE,
1359 	0, 0, sysctl_kern_ttys, "S,xtty", "List of TTYs");
1360 
1361 /*
1362  * Device node creation. Device has been set up, now we can expose it to
1363  * the user.
1364  */
1365 
1366 int
tty_makedevf(struct tty * tp,struct ucred * cred,int flags,const char * fmt,...)1367 tty_makedevf(struct tty *tp, struct ucred *cred, int flags,
1368     const char *fmt, ...)
1369 {
1370 	va_list ap;
1371 	struct make_dev_args args;
1372 	struct cdev *dev, *init, *lock, *cua, *cinit, *clock;
1373 	const char *prefix = "tty";
1374 	char name[SPECNAMELEN - 3]; /* for "tty" and "cua". */
1375 	uid_t uid;
1376 	gid_t gid;
1377 	mode_t mode;
1378 	int error;
1379 
1380 	/* Remove "tty" prefix from devices like PTY's. */
1381 	if (tp->t_flags & TF_NOPREFIX)
1382 		prefix = "";
1383 
1384 	va_start(ap, fmt);
1385 	vsnrprintf(name, sizeof name, 32, fmt, ap);
1386 	va_end(ap);
1387 
1388 	if (cred == NULL) {
1389 		/* System device. */
1390 		uid = UID_ROOT;
1391 		gid = GID_WHEEL;
1392 		mode = S_IRUSR|S_IWUSR;
1393 	} else {
1394 		/* User device. */
1395 		uid = cred->cr_ruid;
1396 		gid = GID_TTY;
1397 		mode = S_IRUSR|S_IWUSR|S_IWGRP;
1398 	}
1399 
1400 	flags = flags & TTYMK_CLONING ? MAKEDEV_REF : 0;
1401 	flags |= MAKEDEV_CHECKNAME;
1402 
1403 	/* Master call-in device. */
1404 	make_dev_args_init(&args);
1405 	args.mda_flags = flags;
1406 	args.mda_devsw = &ttydev_cdevsw;
1407 	args.mda_cr = cred;
1408 	args.mda_uid = uid;
1409 	args.mda_gid = gid;
1410 	args.mda_mode = mode;
1411 	args.mda_si_drv1 = tp;
1412 	error = make_dev_s(&args, &dev, "%s%s", prefix, name);
1413 	if (error != 0)
1414 		return (error);
1415 	tp->t_dev = dev;
1416 
1417 	init = lock = cua = cinit = clock = NULL;
1418 
1419 	/* Slave call-in devices. */
1420 	if (tp->t_flags & TF_INITLOCK) {
1421 		args.mda_devsw = &ttyil_cdevsw;
1422 		args.mda_unit = TTYUNIT_INIT;
1423 		args.mda_si_drv1 = tp;
1424 		args.mda_si_drv2 = &tp->t_termios_init_in;
1425 		error = make_dev_s(&args, &init, "%s%s.init", prefix, name);
1426 		if (error != 0)
1427 			goto fail;
1428 		dev_depends(dev, init);
1429 
1430 		args.mda_unit = TTYUNIT_LOCK;
1431 		args.mda_si_drv2 = &tp->t_termios_lock_in;
1432 		error = make_dev_s(&args, &lock, "%s%s.lock", prefix, name);
1433 		if (error != 0)
1434 			goto fail;
1435 		dev_depends(dev, lock);
1436 	}
1437 
1438 	/* Call-out devices. */
1439 	if (tp->t_flags & TF_CALLOUT) {
1440 		make_dev_args_init(&args);
1441 		args.mda_flags = flags;
1442 		args.mda_devsw = &ttydev_cdevsw;
1443 		args.mda_cr = cred;
1444 		args.mda_uid = UID_UUCP;
1445 		args.mda_gid = GID_DIALER;
1446 		args.mda_mode = 0660;
1447 		args.mda_unit = TTYUNIT_CALLOUT;
1448 		args.mda_si_drv1 = tp;
1449 		error = make_dev_s(&args, &cua, "cua%s", name);
1450 		if (error != 0)
1451 			goto fail;
1452 		dev_depends(dev, cua);
1453 
1454 		/* Slave call-out devices. */
1455 		if (tp->t_flags & TF_INITLOCK) {
1456 			args.mda_devsw = &ttyil_cdevsw;
1457 			args.mda_unit = TTYUNIT_CALLOUT | TTYUNIT_INIT;
1458 			args.mda_si_drv2 = &tp->t_termios_init_out;
1459 			error = make_dev_s(&args, &cinit, "cua%s.init", name);
1460 			if (error != 0)
1461 				goto fail;
1462 			dev_depends(dev, cinit);
1463 
1464 			args.mda_unit = TTYUNIT_CALLOUT | TTYUNIT_LOCK;
1465 			args.mda_si_drv2 = &tp->t_termios_lock_out;
1466 			error = make_dev_s(&args, &clock, "cua%s.lock", name);
1467 			if (error != 0)
1468 				goto fail;
1469 			dev_depends(dev, clock);
1470 		}
1471 	}
1472 
1473 	sx_xlock(&tty_list_sx);
1474 	TAILQ_INSERT_TAIL(&tty_list, tp, t_list);
1475 	tty_list_count++;
1476 	sx_xunlock(&tty_list_sx);
1477 
1478 	return (0);
1479 
1480 fail:
1481 	destroy_dev(dev);
1482 	if (init)
1483 		destroy_dev(init);
1484 	if (lock)
1485 		destroy_dev(lock);
1486 	if (cinit)
1487 		destroy_dev(cinit);
1488 	if (clock)
1489 		destroy_dev(clock);
1490 
1491 	return (error);
1492 }
1493 
1494 /*
1495  * Signalling processes.
1496  */
1497 
1498 void
tty_signal_sessleader(struct tty * tp,int sig)1499 tty_signal_sessleader(struct tty *tp, int sig)
1500 {
1501 	struct proc *p;
1502 	struct session *s;
1503 
1504 	tty_assert_locked(tp);
1505 	MPASS(sig >= 1 && sig < NSIG);
1506 
1507 	/* Make signals start output again. */
1508 	tp->t_flags &= ~TF_STOPPED;
1509 	tp->t_termios.c_lflag &= ~FLUSHO;
1510 
1511 	/*
1512 	 * Load s_leader exactly once to avoid race where s_leader is
1513 	 * set to NULL by a concurrent invocation of killjobc() by the
1514 	 * session leader.  Note that we are not holding t_session's
1515 	 * lock for the read.
1516 	 */
1517 	if ((s = tp->t_session) != NULL &&
1518 	    (p = atomic_load_ptr(&s->s_leader)) != NULL) {
1519 		PROC_LOCK(p);
1520 		kern_psignal(p, sig);
1521 		PROC_UNLOCK(p);
1522 	}
1523 }
1524 
1525 void
tty_signal_pgrp(struct tty * tp,int sig)1526 tty_signal_pgrp(struct tty *tp, int sig)
1527 {
1528 	ksiginfo_t ksi;
1529 
1530 	tty_assert_locked(tp);
1531 	MPASS(sig >= 1 && sig < NSIG);
1532 
1533 	/* Make signals start output again. */
1534 	tp->t_flags &= ~TF_STOPPED;
1535 	tp->t_termios.c_lflag &= ~FLUSHO;
1536 
1537 	if (sig == SIGINFO && !(tp->t_termios.c_lflag & NOKERNINFO))
1538 		tty_info(tp);
1539 	if (tp->t_pgrp != NULL) {
1540 		ksiginfo_init(&ksi);
1541 		ksi.ksi_signo = sig;
1542 		ksi.ksi_code = SI_KERNEL;
1543 		PGRP_LOCK(tp->t_pgrp);
1544 		pgsignal(tp->t_pgrp, sig, 1, &ksi);
1545 		PGRP_UNLOCK(tp->t_pgrp);
1546 	}
1547 }
1548 
1549 void
tty_wakeup(struct tty * tp,int flags)1550 tty_wakeup(struct tty *tp, int flags)
1551 {
1552 
1553 	if (tp->t_flags & TF_ASYNC && tp->t_sigio != NULL)
1554 		pgsigio(&tp->t_sigio, SIGIO, (tp->t_session != NULL));
1555 
1556 	if (flags & FWRITE) {
1557 		cv_broadcast(&tp->t_outwait);
1558 		selwakeup(&tp->t_outpoll);
1559 		KNOTE_LOCKED(&tp->t_outpoll.si_note, 0);
1560 	}
1561 	if (flags & FREAD) {
1562 		cv_broadcast(&tp->t_inwait);
1563 		selwakeup(&tp->t_inpoll);
1564 		KNOTE_LOCKED(&tp->t_inpoll.si_note, 0);
1565 	}
1566 }
1567 
1568 int
tty_wait(struct tty * tp,struct cv * cv)1569 tty_wait(struct tty *tp, struct cv *cv)
1570 {
1571 	int error;
1572 	int revokecnt = tp->t_revokecnt;
1573 
1574 	tty_lock_assert(tp, MA_OWNED|MA_NOTRECURSED);
1575 	MPASS(!tty_gone(tp));
1576 
1577 	error = cv_wait_sig(cv, tp->t_mtx);
1578 
1579 	/* Bail out when the device slipped away. */
1580 	if (tty_gone(tp))
1581 		return (ENXIO);
1582 
1583 	/* Restart the system call when we may have been revoked. */
1584 	if (tp->t_revokecnt != revokecnt)
1585 		return (ERESTART);
1586 
1587 	return (error);
1588 }
1589 
1590 int
tty_timedwait(struct tty * tp,struct cv * cv,int hz)1591 tty_timedwait(struct tty *tp, struct cv *cv, int hz)
1592 {
1593 	int error;
1594 	int revokecnt = tp->t_revokecnt;
1595 
1596 	tty_lock_assert(tp, MA_OWNED|MA_NOTRECURSED);
1597 	MPASS(!tty_gone(tp));
1598 
1599 	error = cv_timedwait_sig(cv, tp->t_mtx, hz);
1600 
1601 	/* Bail out when the device slipped away. */
1602 	if (tty_gone(tp))
1603 		return (ENXIO);
1604 
1605 	/* Restart the system call when we may have been revoked. */
1606 	if (tp->t_revokecnt != revokecnt)
1607 		return (ERESTART);
1608 
1609 	return (error);
1610 }
1611 
1612 void
tty_flush(struct tty * tp,int flags)1613 tty_flush(struct tty *tp, int flags)
1614 {
1615 
1616 	if (flags & FWRITE) {
1617 		tp->t_flags &= ~TF_HIWAT_OUT;
1618 		ttyoutq_flush(&tp->t_outq);
1619 		tty_wakeup(tp, FWRITE);
1620 		if (!tty_gone(tp)) {
1621 			ttydevsw_outwakeup(tp);
1622 			ttydevsw_pktnotify(tp, TIOCPKT_FLUSHWRITE);
1623 		}
1624 	}
1625 	if (flags & FREAD) {
1626 		tty_hiwat_in_unblock(tp);
1627 		ttyinq_flush(&tp->t_inq);
1628 		tty_wakeup(tp, FREAD);
1629 		if (!tty_gone(tp)) {
1630 			ttydevsw_inwakeup(tp);
1631 			ttydevsw_pktnotify(tp, TIOCPKT_FLUSHREAD);
1632 		}
1633 	}
1634 }
1635 
1636 void
tty_set_winsize(struct tty * tp,const struct winsize * wsz)1637 tty_set_winsize(struct tty *tp, const struct winsize *wsz)
1638 {
1639 
1640 	if (memcmp(&tp->t_winsize, wsz, sizeof(*wsz)) == 0)
1641 		return;
1642 	tp->t_winsize = *wsz;
1643 	tty_signal_pgrp(tp, SIGWINCH);
1644 }
1645 
1646 static int
tty_generic_ioctl(struct tty * tp,u_long cmd,void * data,int fflag,struct thread * td)1647 tty_generic_ioctl(struct tty *tp, u_long cmd, void *data, int fflag,
1648     struct thread *td)
1649 {
1650 	int error;
1651 
1652 	switch (cmd) {
1653 	/*
1654 	 * Modem commands.
1655 	 * The SER_* and TIOCM_* flags are the same, but one bit
1656 	 * shifted. I don't know why.
1657 	 */
1658 	case TIOCSDTR:
1659 		ttydevsw_modem(tp, SER_DTR, 0);
1660 		return (0);
1661 	case TIOCCDTR:
1662 		ttydevsw_modem(tp, 0, SER_DTR);
1663 		return (0);
1664 	case TIOCMSET: {
1665 		int bits = *(int *)data;
1666 		ttydevsw_modem(tp,
1667 		    (bits & (TIOCM_DTR | TIOCM_RTS)) >> 1,
1668 		    ((~bits) & (TIOCM_DTR | TIOCM_RTS)) >> 1);
1669 		return (0);
1670 	}
1671 	case TIOCMBIS: {
1672 		int bits = *(int *)data;
1673 		ttydevsw_modem(tp, (bits & (TIOCM_DTR | TIOCM_RTS)) >> 1, 0);
1674 		return (0);
1675 	}
1676 	case TIOCMBIC: {
1677 		int bits = *(int *)data;
1678 		ttydevsw_modem(tp, 0, (bits & (TIOCM_DTR | TIOCM_RTS)) >> 1);
1679 		return (0);
1680 	}
1681 	case TIOCMGET:
1682 		*(int *)data = TIOCM_LE + (ttydevsw_modem(tp, 0, 0) << 1);
1683 		return (0);
1684 
1685 	case FIOASYNC:
1686 		if (*(int *)data)
1687 			tp->t_flags |= TF_ASYNC;
1688 		else
1689 			tp->t_flags &= ~TF_ASYNC;
1690 		return (0);
1691 	case FIONBIO:
1692 		/* This device supports non-blocking operation. */
1693 		return (0);
1694 	case FIONREAD:
1695 		*(int *)data = ttydisc_bytesavail(tp);
1696 		return (0);
1697 	case FIONWRITE:
1698 	case TIOCOUTQ:
1699 		*(int *)data = ttyoutq_bytesused(&tp->t_outq);
1700 		return (0);
1701 	case FIOSETOWN:
1702 		if (tp->t_session != NULL && !tty_is_ctty(tp, td->td_proc))
1703 			/* Not allowed to set ownership. */
1704 			return (ENOTTY);
1705 
1706 		/* Temporarily unlock the TTY to set ownership. */
1707 		tty_unlock(tp);
1708 		error = fsetown(*(int *)data, &tp->t_sigio);
1709 		tty_lock(tp);
1710 		return (error);
1711 	case FIOGETOWN:
1712 		if (tp->t_session != NULL && !tty_is_ctty(tp, td->td_proc))
1713 			/* Not allowed to set ownership. */
1714 			return (ENOTTY);
1715 
1716 		/* Get ownership. */
1717 		*(int *)data = fgetown(&tp->t_sigio);
1718 		return (0);
1719 	case TIOCGETA:
1720 		/* Obtain terminal flags through tcgetattr(). */
1721 		*(struct termios*)data = tp->t_termios;
1722 		return (0);
1723 	case TIOCSETA:
1724 	case TIOCSETAW:
1725 	case TIOCSETAF: {
1726 		struct termios *t = data;
1727 		bool canonicalize = false;
1728 
1729 		/*
1730 		 * Who makes up these funny rules? According to POSIX,
1731 		 * input baud rate is set equal to the output baud rate
1732 		 * when zero.
1733 		 */
1734 		if (t->c_ispeed == 0)
1735 			t->c_ispeed = t->c_ospeed;
1736 
1737 		/* Discard any unsupported bits. */
1738 		t->c_iflag &= TTYSUP_IFLAG;
1739 		t->c_oflag &= TTYSUP_OFLAG;
1740 		t->c_lflag &= TTYSUP_LFLAG;
1741 		t->c_cflag &= TTYSUP_CFLAG;
1742 
1743 		/* Set terminal flags through tcsetattr(). */
1744 		if (cmd == TIOCSETAW || cmd == TIOCSETAF) {
1745 			error = tty_drain(tp, 0);
1746 			if (error)
1747 				return (error);
1748 			if (cmd == TIOCSETAF)
1749 				tty_flush(tp, FREAD);
1750 		}
1751 
1752 		/*
1753 		 * Only call param() when the flags really change.
1754 		 */
1755 		if ((t->c_cflag & CIGNORE) == 0 &&
1756 		    (tp->t_termios.c_cflag != t->c_cflag ||
1757 		    ((tp->t_termios.c_iflag ^ t->c_iflag) &
1758 		    (IXON|IXOFF|IXANY)) ||
1759 		    tp->t_termios.c_ispeed != t->c_ispeed ||
1760 		    tp->t_termios.c_ospeed != t->c_ospeed)) {
1761 			error = ttydevsw_param(tp, t);
1762 			if (error)
1763 				return (error);
1764 
1765 			/* XXX: CLOCAL? */
1766 
1767 			tp->t_termios.c_cflag = t->c_cflag & ~CIGNORE;
1768 			tp->t_termios.c_ispeed = t->c_ispeed;
1769 			tp->t_termios.c_ospeed = t->c_ospeed;
1770 
1771 			/* Baud rate has changed - update watermarks. */
1772 			error = tty_watermarks(tp);
1773 			if (error)
1774 				return (error);
1775 		}
1776 
1777 		/*
1778 		 * We'll canonicalize any partial input if we're transitioning
1779 		 * ICANON one way or the other.  If we're going from -ICANON ->
1780 		 * ICANON, then in the worst case scenario we're in the middle
1781 		 * of a line but both ttydisc_read() and FIONREAD will search
1782 		 * for one of our line terminals.
1783 		 */
1784 		if ((t->c_lflag & ICANON) != (tp->t_termios.c_lflag & ICANON))
1785 			canonicalize = true;
1786 		else if (tp->t_termios.c_cc[VEOF] != t->c_cc[VEOF] ||
1787 		    tp->t_termios.c_cc[VEOL] != t->c_cc[VEOL])
1788 			canonicalize = true;
1789 
1790 		/* Copy new non-device driver parameters. */
1791 		tp->t_termios.c_iflag = t->c_iflag;
1792 		tp->t_termios.c_oflag = t->c_oflag;
1793 		tp->t_termios.c_lflag = t->c_lflag;
1794 		memcpy(&tp->t_termios.c_cc, t->c_cc, sizeof t->c_cc);
1795 
1796 		ttydisc_optimize(tp);
1797 
1798 		if (canonicalize)
1799 			ttydisc_canonicalize(tp);
1800 		if ((t->c_lflag & ICANON) == 0) {
1801 			/*
1802 			 * When in non-canonical mode, wake up all
1803 			 * readers. Any partial input has already been
1804 			 * canonicalized above if we were in canonical mode.
1805 			 * VMIN and VTIME could also be adjusted.
1806 			 */
1807 			tty_wakeup(tp, FREAD);
1808 		}
1809 
1810 		/*
1811 		 * For packet mode: notify the PTY consumer that VSTOP
1812 		 * and VSTART may have been changed.
1813 		 */
1814 		if (tp->t_termios.c_iflag & IXON &&
1815 		    tp->t_termios.c_cc[VSTOP] == CTRL('S') &&
1816 		    tp->t_termios.c_cc[VSTART] == CTRL('Q'))
1817 			ttydevsw_pktnotify(tp, TIOCPKT_DOSTOP);
1818 		else
1819 			ttydevsw_pktnotify(tp, TIOCPKT_NOSTOP);
1820 		return (0);
1821 	}
1822 	case TIOCGETD:
1823 		/* For compatibility - we only support TTYDISC. */
1824 		*(int *)data = TTYDISC;
1825 		return (0);
1826 	case TIOCGPGRP:
1827 		if (!tty_is_ctty(tp, td->td_proc))
1828 			return (ENOTTY);
1829 
1830 		if (tp->t_pgrp != NULL)
1831 			*(int *)data = tp->t_pgrp->pg_id;
1832 		else
1833 			*(int *)data = NO_PID;
1834 		return (0);
1835 	case TIOCGSID:
1836 		if (!tty_is_ctty(tp, td->td_proc))
1837 			return (ENOTTY);
1838 
1839 		MPASS(tp->t_session);
1840 		*(int *)data = tp->t_session->s_sid;
1841 		return (0);
1842 	case TIOCNOTTY:
1843 		return (tty_drop_ctty(tp, td->td_proc));
1844 	case TIOCSCTTY: {
1845 		struct proc *p = td->td_proc;
1846 
1847 		/* XXX: This looks awful. */
1848 		tty_unlock(tp);
1849 		sx_xlock(&proctree_lock);
1850 		tty_lock(tp);
1851 
1852 		if (!SESS_LEADER(p)) {
1853 			/* Only the session leader may do this. */
1854 			sx_xunlock(&proctree_lock);
1855 			return (EPERM);
1856 		}
1857 
1858 		if (tp->t_session != NULL && tp->t_session == p->p_session) {
1859 			/* This is already our controlling TTY. */
1860 			sx_xunlock(&proctree_lock);
1861 			return (0);
1862 		}
1863 
1864 		if (p->p_session->s_ttyp != NULL ||
1865 		    (tp->t_session != NULL && tp->t_session->s_ttyvp != NULL &&
1866 		    tp->t_session->s_ttyvp->v_type != VBAD)) {
1867 			/*
1868 			 * There is already a relation between a TTY and
1869 			 * a session, or the caller is not the session
1870 			 * leader.
1871 			 *
1872 			 * Allow the TTY to be stolen when the vnode is
1873 			 * invalid, but the reference to the TTY is
1874 			 * still active.  This allows immediate reuse of
1875 			 * TTYs of which the session leader has been
1876 			 * killed or the TTY revoked.
1877 			 */
1878 			sx_xunlock(&proctree_lock);
1879 			return (EPERM);
1880 		}
1881 
1882 		/* Connect the session to the TTY. */
1883 		tp->t_session = p->p_session;
1884 		tp->t_session->s_ttyp = tp;
1885 		tp->t_sessioncnt++;
1886 
1887 		/* Assign foreground process group. */
1888 		tp->t_pgrp = p->p_pgrp;
1889 		PROC_LOCK(p);
1890 		p->p_flag |= P_CONTROLT;
1891 		PROC_UNLOCK(p);
1892 
1893 		sx_xunlock(&proctree_lock);
1894 		return (0);
1895 	}
1896 	case TIOCSPGRP: {
1897 		struct pgrp *pg;
1898 
1899 		/*
1900 		 * XXX: Temporarily unlock the TTY to locate the process
1901 		 * group. This code would be lot nicer if we would ever
1902 		 * decompose proctree_lock.
1903 		 */
1904 		tty_unlock(tp);
1905 		sx_slock(&proctree_lock);
1906 		pg = pgfind(*(int *)data);
1907 		if (pg != NULL)
1908 			PGRP_UNLOCK(pg);
1909 		if (pg == NULL || pg->pg_session != td->td_proc->p_session) {
1910 			sx_sunlock(&proctree_lock);
1911 			tty_lock(tp);
1912 			return (EPERM);
1913 		}
1914 		tty_lock(tp);
1915 
1916 		/*
1917 		 * Determine if this TTY is the controlling TTY after
1918 		 * relocking the TTY.
1919 		 */
1920 		if (!tty_is_ctty(tp, td->td_proc)) {
1921 			sx_sunlock(&proctree_lock);
1922 			return (ENOTTY);
1923 		}
1924 		tp->t_pgrp = pg;
1925 		sx_sunlock(&proctree_lock);
1926 
1927 		/* Wake up the background process groups. */
1928 		cv_broadcast(&tp->t_bgwait);
1929 		return (0);
1930 	}
1931 	case TIOCFLUSH: {
1932 		int flags = *(int *)data;
1933 
1934 		if (flags == 0)
1935 			flags = (FREAD|FWRITE);
1936 		else
1937 			flags &= (FREAD|FWRITE);
1938 		tty_flush(tp, flags);
1939 		return (0);
1940 	}
1941 	case TIOCDRAIN:
1942 		/* Drain TTY output. */
1943 		return tty_drain(tp, 0);
1944 	case TIOCGDRAINWAIT:
1945 		*(int *)data = tp->t_drainwait;
1946 		return (0);
1947 	case TIOCSDRAINWAIT:
1948 		error = priv_check(td, PRIV_TTY_DRAINWAIT);
1949 		if (error == 0)
1950 			tp->t_drainwait = *(int *)data;
1951 		return (error);
1952 	case TIOCCONS:
1953 		/* Set terminal as console TTY. */
1954 		if (*(int *)data) {
1955 			error = priv_check(td, PRIV_TTY_CONSOLE);
1956 			if (error)
1957 				return (error);
1958 			error = constty_set(tp);
1959 		} else {
1960 			error = constty_clear(tp);
1961 		}
1962 		return (error);
1963 	case TIOCGWINSZ:
1964 		/* Obtain window size. */
1965 		*(struct winsize*)data = tp->t_winsize;
1966 		return (0);
1967 	case TIOCSWINSZ:
1968 		/* Set window size. */
1969 		tty_set_winsize(tp, data);
1970 		return (0);
1971 	case TIOCEXCL:
1972 		tp->t_flags |= TF_EXCLUDE;
1973 		return (0);
1974 	case TIOCNXCL:
1975 		tp->t_flags &= ~TF_EXCLUDE;
1976 		return (0);
1977 	case TIOCSTOP:
1978 		tp->t_flags |= TF_STOPPED;
1979 		ttydevsw_pktnotify(tp, TIOCPKT_STOP);
1980 		return (0);
1981 	case TIOCSTART:
1982 		tp->t_flags &= ~TF_STOPPED;
1983 		tp->t_termios.c_lflag &= ~FLUSHO;
1984 		ttydevsw_outwakeup(tp);
1985 		ttydevsw_pktnotify(tp, TIOCPKT_START);
1986 		return (0);
1987 	case TIOCSTAT:
1988 		tty_info(tp);
1989 		return (0);
1990 	case TIOCSTI:
1991 		if ((fflag & FREAD) == 0 && priv_check(td, PRIV_TTY_STI))
1992 			return (EPERM);
1993 		if (!tty_is_ctty(tp, td->td_proc) &&
1994 		    priv_check(td, PRIV_TTY_STI))
1995 			return (EACCES);
1996 		ttydisc_rint(tp, *(char *)data, 0);
1997 		ttydisc_rint_done(tp);
1998 		return (0);
1999 	}
2000 
2001 #ifdef COMPAT_43TTY
2002 	return tty_ioctl_compat(tp, cmd, data, fflag, td);
2003 #else /* !COMPAT_43TTY */
2004 	return (ENOIOCTL);
2005 #endif /* COMPAT_43TTY */
2006 }
2007 
2008 int
tty_ioctl(struct tty * tp,u_long cmd,void * data,int fflag,struct thread * td)2009 tty_ioctl(struct tty *tp, u_long cmd, void *data, int fflag, struct thread *td)
2010 {
2011 	int error;
2012 
2013 	tty_assert_locked(tp);
2014 
2015 	if (tty_gone(tp))
2016 		return (ENXIO);
2017 
2018 	error = ttydevsw_ioctl(tp, cmd, data, td);
2019 	if (error == ENOIOCTL)
2020 		error = tty_generic_ioctl(tp, cmd, data, fflag, td);
2021 
2022 	return (error);
2023 }
2024 
2025 dev_t
tty_udev(struct tty * tp)2026 tty_udev(struct tty *tp)
2027 {
2028 
2029 	if (tp->t_dev)
2030 		return (dev2udev(tp->t_dev));
2031 	else
2032 		return (NODEV);
2033 }
2034 
2035 int
tty_checkoutq(struct tty * tp)2036 tty_checkoutq(struct tty *tp)
2037 {
2038 
2039 	/* 256 bytes should be enough to print a log message. */
2040 	return (ttyoutq_bytesleft(&tp->t_outq) >= 256);
2041 }
2042 
2043 void
tty_hiwat_in_block(struct tty * tp)2044 tty_hiwat_in_block(struct tty *tp)
2045 {
2046 
2047 	if ((tp->t_flags & TF_HIWAT_IN) == 0 &&
2048 	    tp->t_termios.c_iflag & IXOFF &&
2049 	    tp->t_termios.c_cc[VSTOP] != _POSIX_VDISABLE) {
2050 		/*
2051 		 * Input flow control. Only enter the high watermark when we
2052 		 * can successfully store the VSTOP character.
2053 		 */
2054 		if (ttyoutq_write_nofrag(&tp->t_outq,
2055 		    &tp->t_termios.c_cc[VSTOP], 1) == 0)
2056 			tp->t_flags |= TF_HIWAT_IN;
2057 	} else {
2058 		/* No input flow control. */
2059 		tp->t_flags |= TF_HIWAT_IN;
2060 	}
2061 }
2062 
2063 void
tty_hiwat_in_unblock(struct tty * tp)2064 tty_hiwat_in_unblock(struct tty *tp)
2065 {
2066 
2067 	if (tp->t_flags & TF_HIWAT_IN &&
2068 	    tp->t_termios.c_iflag & IXOFF &&
2069 	    tp->t_termios.c_cc[VSTART] != _POSIX_VDISABLE) {
2070 		/*
2071 		 * Input flow control. Only leave the high watermark when we
2072 		 * can successfully store the VSTART character.
2073 		 */
2074 		if (ttyoutq_write_nofrag(&tp->t_outq,
2075 		    &tp->t_termios.c_cc[VSTART], 1) == 0)
2076 			tp->t_flags &= ~TF_HIWAT_IN;
2077 	} else {
2078 		/* No input flow control. */
2079 		tp->t_flags &= ~TF_HIWAT_IN;
2080 	}
2081 
2082 	if (!tty_gone(tp))
2083 		ttydevsw_inwakeup(tp);
2084 }
2085 
2086 /*
2087  * TTY hooks interface.
2088  */
2089 
2090 static int
ttyhook_defrint(struct tty * tp,char c,int flags)2091 ttyhook_defrint(struct tty *tp, char c, int flags)
2092 {
2093 
2094 	if (ttyhook_rint_bypass(tp, &c, 1) != 1)
2095 		return (-1);
2096 
2097 	return (0);
2098 }
2099 
2100 int
ttyhook_register(struct tty ** rtp,struct proc * p,int fd,struct ttyhook * th,void * softc)2101 ttyhook_register(struct tty **rtp, struct proc *p, int fd, struct ttyhook *th,
2102     void *softc)
2103 {
2104 	struct tty *tp;
2105 	struct file *fp;
2106 	struct cdev *dev;
2107 	struct cdevsw *cdp;
2108 	struct filedesc *fdp;
2109 	cap_rights_t rights;
2110 	int error, ref;
2111 
2112 	/* Validate the file descriptor. */
2113 	/*
2114 	 * XXX this code inspects a file descriptor from a different process,
2115 	 * but there is no dedicated routine to do it in fd code, making the
2116 	 * ordeal highly questionable.
2117 	 */
2118 	fdp = p->p_fd;
2119 	FILEDESC_SLOCK(fdp);
2120 	error = fget_cap_noref(fdp, fd, cap_rights_init_one(&rights, CAP_TTYHOOK),
2121 	    &fp, NULL);
2122 	if (error == 0 && !fhold(fp))
2123 		error = EBADF;
2124 	FILEDESC_SUNLOCK(fdp);
2125 	if (error != 0)
2126 		return (error);
2127 	if (fp->f_ops == &badfileops) {
2128 		error = EBADF;
2129 		goto done1;
2130 	}
2131 
2132 	/*
2133 	 * Make sure the vnode is bound to a character device.
2134 	 * Unlocked check for the vnode type is ok there, because we
2135 	 * only shall prevent calling devvn_refthread on the file that
2136 	 * never has been opened over a character device.
2137 	 */
2138 	if (fp->f_type != DTYPE_VNODE || fp->f_vnode->v_type != VCHR) {
2139 		error = EINVAL;
2140 		goto done1;
2141 	}
2142 
2143 	/* Make sure it is a TTY. */
2144 	cdp = devvn_refthread(fp->f_vnode, &dev, &ref);
2145 	if (cdp == NULL) {
2146 		error = ENXIO;
2147 		goto done1;
2148 	}
2149 	if (dev != fp->f_data) {
2150 		error = ENXIO;
2151 		goto done2;
2152 	}
2153 	if (cdp != &ttydev_cdevsw) {
2154 		error = ENOTTY;
2155 		goto done2;
2156 	}
2157 	tp = dev->si_drv1;
2158 
2159 	/* Try to attach the hook to the TTY. */
2160 	error = EBUSY;
2161 	tty_lock(tp);
2162 	MPASS((tp->t_hook == NULL) == ((tp->t_flags & TF_HOOK) == 0));
2163 	if (tp->t_flags & TF_HOOK)
2164 		goto done3;
2165 
2166 	tp->t_flags |= TF_HOOK;
2167 	tp->t_hook = th;
2168 	tp->t_hooksoftc = softc;
2169 	*rtp = tp;
2170 	error = 0;
2171 
2172 	/* Maybe we can switch into bypass mode now. */
2173 	ttydisc_optimize(tp);
2174 
2175 	/* Silently convert rint() calls to rint_bypass() when possible. */
2176 	if (!ttyhook_hashook(tp, rint) && ttyhook_hashook(tp, rint_bypass))
2177 		th->th_rint = ttyhook_defrint;
2178 
2179 done3:	tty_unlock(tp);
2180 done2:	dev_relthread(dev, ref);
2181 done1:	fdrop(fp, curthread);
2182 	return (error);
2183 }
2184 
2185 void
ttyhook_unregister(struct tty * tp)2186 ttyhook_unregister(struct tty *tp)
2187 {
2188 
2189 	tty_assert_locked(tp);
2190 	MPASS(tp->t_flags & TF_HOOK);
2191 
2192 	/* Disconnect the hook. */
2193 	tp->t_flags &= ~TF_HOOK;
2194 	tp->t_hook = NULL;
2195 
2196 	/* Maybe we need to leave bypass mode. */
2197 	ttydisc_optimize(tp);
2198 
2199 	/* Maybe deallocate the TTY as well. */
2200 	tty_rel_free(tp);
2201 }
2202 
2203 /*
2204  * /dev/console handling.
2205  */
2206 
2207 static int
ttyconsdev_open(struct cdev * dev,int oflags,int devtype,struct thread * td)2208 ttyconsdev_open(struct cdev *dev, int oflags, int devtype, struct thread *td)
2209 {
2210 	struct tty *tp;
2211 
2212 	/* System has no console device. */
2213 	if (dev_console_filename == NULL)
2214 		return (ENXIO);
2215 
2216 	/* Look up corresponding TTY by device name. */
2217 	sx_slock(&tty_list_sx);
2218 	TAILQ_FOREACH(tp, &tty_list, t_list) {
2219 		if (strcmp(dev_console_filename, tty_devname(tp)) == 0) {
2220 			dev_console->si_drv1 = tp;
2221 			break;
2222 		}
2223 	}
2224 	sx_sunlock(&tty_list_sx);
2225 
2226 	/* System console has no TTY associated. */
2227 	if (dev_console->si_drv1 == NULL)
2228 		return (ENXIO);
2229 
2230 	return (ttydev_open(dev, oflags, devtype, td));
2231 }
2232 
2233 static int
ttyconsdev_write(struct cdev * dev,struct uio * uio,int ioflag)2234 ttyconsdev_write(struct cdev *dev, struct uio *uio, int ioflag)
2235 {
2236 
2237 	log_console(uio);
2238 
2239 	return (ttydev_write(dev, uio, ioflag));
2240 }
2241 
2242 /*
2243  * /dev/console is a little different than normal TTY's.  When opened,
2244  * it determines which TTY to use.  When data gets written to it, it
2245  * will be logged in the kernel message buffer.
2246  */
2247 static struct cdevsw ttyconsdev_cdevsw = {
2248 	.d_version	= D_VERSION,
2249 	.d_open		= ttyconsdev_open,
2250 	.d_close	= ttydev_close,
2251 	.d_read		= ttydev_read,
2252 	.d_write	= ttyconsdev_write,
2253 	.d_ioctl	= ttydev_ioctl,
2254 	.d_kqfilter	= ttydev_kqfilter,
2255 	.d_poll		= ttydev_poll,
2256 	.d_mmap		= ttydev_mmap,
2257 	.d_name		= "ttyconsdev",
2258 	.d_flags	= D_TTY,
2259 };
2260 
2261 static void
ttyconsdev_init(void * unused __unused)2262 ttyconsdev_init(void *unused __unused)
2263 {
2264 
2265 	dev_console = make_dev_credf(MAKEDEV_ETERNAL, &ttyconsdev_cdevsw, 0,
2266 	    NULL, UID_ROOT, GID_WHEEL, 0600, "console");
2267 }
2268 
2269 SYSINIT(tty, SI_SUB_DRIVERS, SI_ORDER_FIRST, ttyconsdev_init, NULL);
2270 
2271 void
ttyconsdev_select(const char * name)2272 ttyconsdev_select(const char *name)
2273 {
2274 
2275 	dev_console_filename = name;
2276 }
2277 
2278 /*
2279  * Debugging routines.
2280  */
2281 
2282 #include "opt_ddb.h"
2283 #ifdef DDB
2284 #include <ddb/ddb.h>
2285 #include <ddb/db_sym.h>
2286 
2287 static const struct {
2288 	int flag;
2289 	char val;
2290 } ttystates[] = {
2291 #if 0
2292 	{ TF_NOPREFIX,		'N' },
2293 #endif
2294 	{ TF_INITLOCK,		'I' },
2295 	{ TF_CALLOUT,		'C' },
2296 
2297 	/* Keep these together -> 'Oi' and 'Oo'. */
2298 	{ TF_OPENED,		'O' },
2299 	{ TF_OPENED_IN,		'i' },
2300 	{ TF_OPENED_OUT,	'o' },
2301 	{ TF_OPENED_CONS,	'c' },
2302 
2303 	{ TF_GONE,		'G' },
2304 	{ TF_OPENCLOSE,		'B' },
2305 	{ TF_ASYNC,		'Y' },
2306 	{ TF_LITERAL,		'L' },
2307 
2308 	/* Keep these together -> 'Hi' and 'Ho'. */
2309 	{ TF_HIWAT,		'H' },
2310 	{ TF_HIWAT_IN,		'i' },
2311 	{ TF_HIWAT_OUT,		'o' },
2312 
2313 	{ TF_STOPPED,		'S' },
2314 	{ TF_EXCLUDE,		'X' },
2315 	{ TF_BYPASS,		'l' },
2316 	{ TF_ZOMBIE,		'Z' },
2317 	{ TF_HOOK,		's' },
2318 
2319 	/* Keep these together -> 'bi' and 'bo'. */
2320 	{ TF_BUSY,		'b' },
2321 	{ TF_BUSY_IN,		'i' },
2322 	{ TF_BUSY_OUT,		'o' },
2323 
2324 	{ 0,			'\0'},
2325 };
2326 
2327 #define	TTY_FLAG_BITS \
2328 	"\20\1NOPREFIX\2INITLOCK\3CALLOUT\4OPENED_IN" \
2329 	"\5OPENED_OUT\6OPENED_CONS\7GONE\10OPENCLOSE" \
2330 	"\11ASYNC\12LITERAL\13HIWAT_IN\14HIWAT_OUT" \
2331 	"\15STOPPED\16EXCLUDE\17BYPASS\20ZOMBIE" \
2332 	"\21HOOK\22BUSY_IN\23BUSY_OUT"
2333 
2334 #define DB_PRINTSYM(name, addr) \
2335 	db_printf("%s  " #name ": ", sep); \
2336 	db_printsym((db_addr_t) addr, DB_STGY_ANY); \
2337 	db_printf("\n");
2338 
2339 static void
_db_show_devsw(const char * sep,const struct ttydevsw * tsw)2340 _db_show_devsw(const char *sep, const struct ttydevsw *tsw)
2341 {
2342 
2343 	db_printf("%sdevsw: ", sep);
2344 	db_printsym((db_addr_t)tsw, DB_STGY_ANY);
2345 	db_printf(" (%p)\n", tsw);
2346 	DB_PRINTSYM(open, tsw->tsw_open);
2347 	DB_PRINTSYM(close, tsw->tsw_close);
2348 	DB_PRINTSYM(outwakeup, tsw->tsw_outwakeup);
2349 	DB_PRINTSYM(inwakeup, tsw->tsw_inwakeup);
2350 	DB_PRINTSYM(ioctl, tsw->tsw_ioctl);
2351 	DB_PRINTSYM(param, tsw->tsw_param);
2352 	DB_PRINTSYM(modem, tsw->tsw_modem);
2353 	DB_PRINTSYM(mmap, tsw->tsw_mmap);
2354 	DB_PRINTSYM(pktnotify, tsw->tsw_pktnotify);
2355 	DB_PRINTSYM(free, tsw->tsw_free);
2356 }
2357 
2358 static void
_db_show_hooks(const char * sep,const struct ttyhook * th)2359 _db_show_hooks(const char *sep, const struct ttyhook *th)
2360 {
2361 
2362 	db_printf("%shook: ", sep);
2363 	db_printsym((db_addr_t)th, DB_STGY_ANY);
2364 	db_printf(" (%p)\n", th);
2365 	if (th == NULL)
2366 		return;
2367 	DB_PRINTSYM(rint, th->th_rint);
2368 	DB_PRINTSYM(rint_bypass, th->th_rint_bypass);
2369 	DB_PRINTSYM(rint_done, th->th_rint_done);
2370 	DB_PRINTSYM(rint_poll, th->th_rint_poll);
2371 	DB_PRINTSYM(getc_inject, th->th_getc_inject);
2372 	DB_PRINTSYM(getc_capture, th->th_getc_capture);
2373 	DB_PRINTSYM(getc_poll, th->th_getc_poll);
2374 	DB_PRINTSYM(close, th->th_close);
2375 }
2376 
2377 static void
_db_show_termios(const char * name,const struct termios * t)2378 _db_show_termios(const char *name, const struct termios *t)
2379 {
2380 
2381 	db_printf("%s: iflag 0x%x oflag 0x%x cflag 0x%x "
2382 	    "lflag 0x%x ispeed %u ospeed %u\n", name,
2383 	    t->c_iflag, t->c_oflag, t->c_cflag, t->c_lflag,
2384 	    t->c_ispeed, t->c_ospeed);
2385 }
2386 
2387 /* DDB command to show TTY statistics. */
DB_SHOW_COMMAND(tty,db_show_tty)2388 DB_SHOW_COMMAND(tty, db_show_tty)
2389 {
2390 	struct tty *tp;
2391 
2392 	if (!have_addr) {
2393 		db_printf("usage: show tty <addr>\n");
2394 		return;
2395 	}
2396 	tp = (struct tty *)addr;
2397 
2398 	db_printf("%p: %s\n", tp, tty_devname(tp));
2399 	db_printf("\tmtx: %p\n", tp->t_mtx);
2400 	db_printf("\tflags: 0x%b\n", tp->t_flags, TTY_FLAG_BITS);
2401 	db_printf("\trevokecnt: %u\n", tp->t_revokecnt);
2402 
2403 	/* Buffering mechanisms. */
2404 	db_printf("\tinq: %p begin %u linestart %u reprint %u end %u "
2405 	    "nblocks %u quota %u\n", &tp->t_inq, tp->t_inq.ti_begin,
2406 	    tp->t_inq.ti_linestart, tp->t_inq.ti_reprint, tp->t_inq.ti_end,
2407 	    tp->t_inq.ti_nblocks, tp->t_inq.ti_quota);
2408 	db_printf("\toutq: %p begin %u end %u nblocks %u quota %u\n",
2409 	    &tp->t_outq, tp->t_outq.to_begin, tp->t_outq.to_end,
2410 	    tp->t_outq.to_nblocks, tp->t_outq.to_quota);
2411 	db_printf("\tinlow: %zu\n", tp->t_inlow);
2412 	db_printf("\toutlow: %zu\n", tp->t_outlow);
2413 	_db_show_termios("\ttermios", &tp->t_termios);
2414 	db_printf("\twinsize: row %u col %u xpixel %u ypixel %u\n",
2415 	    tp->t_winsize.ws_row, tp->t_winsize.ws_col,
2416 	    tp->t_winsize.ws_xpixel, tp->t_winsize.ws_ypixel);
2417 	db_printf("\tcolumn: %u\n", tp->t_column);
2418 	db_printf("\twritepos: %u\n", tp->t_writepos);
2419 	db_printf("\tcompatflags: 0x%x\n", tp->t_compatflags);
2420 
2421 	/* Init/lock-state devices. */
2422 	_db_show_termios("\ttermios_init_in", &tp->t_termios_init_in);
2423 	_db_show_termios("\ttermios_init_out", &tp->t_termios_init_out);
2424 	_db_show_termios("\ttermios_lock_in", &tp->t_termios_lock_in);
2425 	_db_show_termios("\ttermios_lock_out", &tp->t_termios_lock_out);
2426 
2427 	/* Hooks */
2428 	_db_show_devsw("\t", tp->t_devsw);
2429 	_db_show_hooks("\t", tp->t_hook);
2430 
2431 	/* Process info. */
2432 	db_printf("\tpgrp: %p gid %d\n", tp->t_pgrp,
2433 	    tp->t_pgrp ? tp->t_pgrp->pg_id : 0);
2434 	db_printf("\tsession: %p", tp->t_session);
2435 	if (tp->t_session != NULL)
2436 	    db_printf(" count %u leader %p tty %p sid %d login %s",
2437 		tp->t_session->s_count, tp->t_session->s_leader,
2438 		tp->t_session->s_ttyp, tp->t_session->s_sid,
2439 		tp->t_session->s_login);
2440 	db_printf("\n");
2441 	db_printf("\tsessioncnt: %u\n", tp->t_sessioncnt);
2442 	db_printf("\tdevswsoftc: %p\n", tp->t_devswsoftc);
2443 	db_printf("\thooksoftc: %p\n", tp->t_hooksoftc);
2444 	db_printf("\tdev: %p\n", tp->t_dev);
2445 }
2446 
2447 /* DDB command to list TTYs. */
DB_SHOW_ALL_COMMAND(ttys,db_show_all_ttys)2448 DB_SHOW_ALL_COMMAND(ttys, db_show_all_ttys)
2449 {
2450 	struct tty *tp;
2451 	size_t isiz, osiz;
2452 	int i, j;
2453 
2454 	/* Make the output look like `pstat -t'. */
2455 	db_printf("PTR        ");
2456 #if defined(__LP64__)
2457 	db_printf("        ");
2458 #endif
2459 	db_printf("      LINE   INQ  CAN  LIN  LOW  OUTQ  USE  LOW   "
2460 	    "COL  SESS  PGID STATE\n");
2461 
2462 	TAILQ_FOREACH(tp, &tty_list, t_list) {
2463 		isiz = tp->t_inq.ti_nblocks * TTYINQ_DATASIZE;
2464 		osiz = tp->t_outq.to_nblocks * TTYOUTQ_DATASIZE;
2465 
2466 		db_printf("%p %10s %5zu %4u %4u %4zu %5zu %4u %4zu %5u %5d "
2467 		    "%5d ", tp, tty_devname(tp), isiz,
2468 		    tp->t_inq.ti_linestart - tp->t_inq.ti_begin,
2469 		    tp->t_inq.ti_end - tp->t_inq.ti_linestart,
2470 		    isiz - tp->t_inlow, osiz,
2471 		    tp->t_outq.to_end - tp->t_outq.to_begin,
2472 		    osiz - tp->t_outlow, MIN(tp->t_column, 99999),
2473 		    tp->t_session ? tp->t_session->s_sid : 0,
2474 		    tp->t_pgrp ? tp->t_pgrp->pg_id : 0);
2475 
2476 		/* Flag bits. */
2477 		for (i = j = 0; ttystates[i].flag; i++)
2478 			if (tp->t_flags & ttystates[i].flag) {
2479 				db_printf("%c", ttystates[i].val);
2480 				j++;
2481 			}
2482 		if (j == 0)
2483 			db_printf("-");
2484 		db_printf("\n");
2485 	}
2486 }
2487 #endif /* DDB */
2488