xref: /illumos-gate/usr/src/uts/common/io/vcons.c (revision 93a18d6d401e844455263f926578e9d2aa6b47ec)
1 /*
2  * CDDL HEADER START
3  *
4  * The contents of this file are subject to the terms of the
5  * Common Development and Distribution License (the "License").
6  * You may not use this file except in compliance with the License.
7  *
8  * You can obtain a copy of the license at usr/src/OPENSOLARIS.LICENSE
9  * or http://www.opensolaris.org/os/licensing.
10  * See the License for the specific language governing permissions
11  * and limitations under the License.
12  *
13  * When distributing Covered Code, include this CDDL HEADER in each
14  * file and include the License file at usr/src/OPENSOLARIS.LICENSE.
15  * If applicable, add the following below this CDDL HEADER, with the
16  * fields enclosed by brackets "[]" replaced with your own identifying
17  * information: Portions Copyright [yyyy] [name of copyright owner]
18  *
19  * CDDL HEADER END
20  */
21 
22 /*
23  * Copyright 2009 Sun Microsystems, Inc.  All rights reserved.
24  * Use is subject to license terms.
25  */
26 
27 #include <sys/types.h>
28 #include <sys/param.h>
29 #include <sys/signal.h>
30 #include <sys/cred.h>
31 #include <sys/vnode.h>
32 #include <sys/termios.h>
33 #include <sys/termio.h>
34 #include <sys/ttold.h>
35 #include <sys/stropts.h>
36 #include <sys/stream.h>
37 #include <sys/strsun.h>
38 #include <sys/tty.h>
39 #include <sys/buf.h>
40 #include <sys/uio.h>
41 #include <sys/stat.h>
42 #include <sys/sysmacros.h>
43 #include <sys/errno.h>
44 #include <sys/proc.h>
45 #include <sys/procset.h>
46 #include <sys/fault.h>
47 #include <sys/siginfo.h>
48 #include <sys/debug.h>
49 #include <sys/kd.h>
50 #include <sys/vt.h>
51 #include <sys/vtdaemon.h>
52 #include <sys/session.h>
53 #include <sys/door.h>
54 #include <sys/kmem.h>
55 #include <sys/cpuvar.h>
56 #include <sys/kbio.h>
57 #include <sys/strredir.h>
58 #include <sys/fs/snode.h>
59 #include <sys/consdev.h>
60 #include <sys/conf.h>
61 #include <sys/cmn_err.h>
62 #include <sys/console.h>
63 #include <sys/promif.h>
64 #include <sys/note.h>
65 #include <sys/polled_io.h>
66 #include <sys/systm.h>
67 #include <sys/ddi.h>
68 #include <sys/sunddi.h>
69 #include <sys/sunndi.h>
70 #include <sys/esunddi.h>
71 #include <sys/sunldi.h>
72 #include <sys/debug.h>
73 #include <sys/console.h>
74 #include <sys/ddi_impldefs.h>
75 #include <sys/policy.h>
76 #include <sys/tem.h>
77 #include <sys/wscons.h>
78 #include <sys/systm.h>
79 #include <sys/modctl.h>
80 #include <sys/vt_impl.h>
81 #include <sys/consconfig_dacf.h>
82 
83 /*
84  * This file belongs to wc STREAMS module which has a D_MTPERMODE
85  * inner perimeter. See "Locking Policy" comment in wscons.c for
86  * more information.
87  */
88 
89 /*
90  * Minor	name		device file		Hotkeys
91  *
92  * 0	the system console	/dev/console		Alt + F1
93  * 0:	virtual console #1	/dev/vt/0		Alt + F1
94  *
95  * 2:   virtual console #2	/dev/vt/2		Alt + F2
96  * 3:	virtual console #3	/dev/vt/3		Alt + F3
97  * ......
98  * n:	virtual console #n	/dev/vt/n		Alt + Fn
99  *
100  * Note that vtdaemon is running on /dev/vt/1 (minor=1),
101  * which is not available to end users.
102  *
103  */
104 
105 #define	VT_DAEMON_MINOR	1
106 #define	VT_IS_DAEMON(minor)	((minor) == VT_DAEMON_MINOR)
107 
108 extern void	wc_get_size(vc_state_t *pvc);
109 extern boolean_t consconfig_console_is_tipline(void);
110 
111 
112 minor_t vc_last_console = VT_MINOR_INVALID;	/* the last used console */
113 volatile uint_t	vc_target_console;		/* arg (1..n) */
114 
115 static volatile minor_t vc_inuse_max_minor = 0;
116 static list_t vc_waitactive_list;
117 _NOTE(SCHEME_PROTECTS_DATA("D_MTPERMOD protected data", vc_target_console))
118 _NOTE(SCHEME_PROTECTS_DATA("D_MTPERMOD protected data", vc_last_console))
119 _NOTE(SCHEME_PROTECTS_DATA("D_MTPERMOD protected data", vc_inuse_max_minor))
120 _NOTE(SCHEME_PROTECTS_DATA("D_MTPERMOD protected data", vc_waitactive_list))
121 
122 static int vt_pending_vtno = -1;
123 kmutex_t vt_pending_vtno_lock;
124 _NOTE(MUTEX_PROTECTS_DATA(vt_pending_vtno_lock, vt_pending_vtno))
125 
126 static int vt_activate(uint_t vt_no, cred_t *credp);
127 static void vt_copyout(queue_t *qp, mblk_t *mp, mblk_t *tmp, uint_t size);
128 static void vt_copyin(queue_t *qp, mblk_t *mp, uint_t size);
129 static void vt_iocnak(queue_t *qp, mblk_t *mp, int error);
130 static void vt_iocack(queue_t *qp, mblk_t *mp);
131 
132 static uint_t vt_minor2arg(minor_t minor);
133 static minor_t vt_arg2minor(uint_t arg);
134 
135 /*
136  * If the system console is directed to tipline, consider /dev/vt/0 as
137  * not being used.
138  * For other VT, if it is opened and tty is initialized, consider it
139  * as being used.
140  */
141 #define	VT_IS_INUSE(id)						\
142 	(((vt_minor2vc(id))->vc_flags & WCS_ISOPEN) &&		\
143 	((vt_minor2vc(id))->vc_flags & WCS_INIT) &&		\
144 	(id != 0 || !consconfig_console_is_tipline()))
145 
146 /*
147  * the vt switching message is encoded as:
148  *
149  *   -------------------------------------------------------------
150  *   |  \033  |  'Q'  |  vtno + 'A'  |  opcode  |  'z'  |  '\0'  |
151  *   -------------------------------------------------------------
152  */
153 #define	VT_MSG_SWITCH(mp)					\
154 	((int)((mp)->b_wptr - (mp)->b_rptr) >= 5 &&		\
155 	*((mp)->b_rptr) == '\033' &&				\
156 	*((mp)->b_rptr + 1) == 'Q' &&				\
157 	*((mp)->b_rptr + 4) == 'z')
158 
159 #define	VT_MSG_VTNO(mp)		(*((mp)->b_rptr + 2) - 'A')
160 #define	VT_MSG_OPCODE(mp)	(*((mp)->b_rptr + 3))
161 
162 #define	VT_DOORCALL_MAX_RETRY	3
163 
164 static void
165 vt_init_ttycommon(tty_common_t *pcommon)
166 {
167 	struct termios *termiosp;
168 	int len;
169 
170 	mutex_init(&pcommon->t_excl, NULL, MUTEX_DEFAULT, NULL);
171 	pcommon->t_iflag = 0;
172 
173 	/*
174 	 * Get the default termios settings (cflag).
175 	 * These are stored as a property in the
176 	 * "options" node.
177 	 */
178 	if (ddi_getlongprop(DDI_DEV_T_ANY,
179 	    ddi_root_node(), 0, "ttymodes",
180 	    (caddr_t)&termiosp, &len) == DDI_PROP_SUCCESS) {
181 
182 		if (len == sizeof (struct termios))
183 			pcommon->t_cflag = termiosp->c_cflag;
184 		else
185 			cmn_err(CE_WARN,
186 			    "wc: Couldn't get ttymodes property!");
187 
188 		kmem_free(termiosp, len);
189 	} else {
190 		/*
191 		 * Gack!  Whine about it.
192 		 */
193 		cmn_err(CE_WARN,
194 		    "wc: Couldn't get ttymodes property!");
195 	}
196 
197 	pcommon->t_iocpending = NULL;
198 }
199 
200 static int
201 vt_config(uint_t count)
202 {
203 	if (consmode != CONS_KFB)
204 		return (ENOTSUP);
205 
206 	/* one for system console, one for vtdaemon */
207 	if (count < 2)
208 		return (ENXIO);
209 
210 	/*
211 	 * Shouldn't allow to shrink the max vt minor to be smaller than
212 	 * the max in used minor.
213 	 */
214 	if (count <= vc_inuse_max_minor)
215 		return (EBUSY);
216 
217 	mutex_enter(&vc_lock);
218 	vt_resize(count);
219 	mutex_exit(&vc_lock);
220 
221 	return (0);
222 }
223 
224 void
225 vt_clean(queue_t *q, vc_state_t *pvc)
226 {
227 	ASSERT(MUTEX_HELD(&pvc->vc_state_lock));
228 
229 	if (pvc->vc_bufcallid != 0) {
230 		qunbufcall(q, pvc->vc_bufcallid);
231 		pvc->vc_bufcallid = 0;
232 	}
233 	if (pvc->vc_timeoutid != 0) {
234 		(void) quntimeout(q, pvc->vc_timeoutid);
235 		pvc->vc_timeoutid = 0;
236 	}
237 	ttycommon_close(&pvc->vc_ttycommon);
238 
239 	pvc->vc_flags &= ~WCS_INIT;
240 }
241 
242 /*
243  * Reply the VT_WAITACTIVE ioctl.
244  * Argument 'close' usage:
245  * B_TRUE:  the vt designated by argument 'minor' is being closed.
246  * B_FALSE: the vt designated by argument 'minor' has been activated just now.
247  */
248 static void
249 vc_waitactive_reply(int minor, boolean_t close)
250 {
251 	vc_waitactive_msg_t *index, *tmp;
252 	vc_state_t *pvc;
253 
254 	index = list_head(&vc_waitactive_list);
255 
256 	while (index != NULL) {
257 		tmp = index;
258 		index = list_next(&vc_waitactive_list, index);
259 
260 		if ((close && tmp->wa_msg_minor == minor) ||
261 		    (!close && tmp->wa_wait_minor == minor)) {
262 			list_remove(&vc_waitactive_list, tmp);
263 			pvc = vt_minor2vc(tmp->wa_msg_minor);
264 
265 			if (close)
266 				vt_iocnak(pvc->vc_wq, tmp->wa_mp, ENXIO);
267 			else
268 				vt_iocack(pvc->vc_wq, tmp->wa_mp);
269 
270 			kmem_free(tmp, sizeof (vc_waitactive_msg_t));
271 		}
272 	}
273 }
274 
275 void
276 vt_close(queue_t *q, vc_state_t *pvc, cred_t *credp)
277 {
278 	minor_t index;
279 
280 	mutex_enter(&pvc->vc_state_lock);
281 	vt_clean(q, pvc);
282 	pvc->vc_flags &= ~WCS_ISOPEN;
283 	mutex_exit(&pvc->vc_state_lock);
284 
285 	tem_destroy(pvc->vc_tem, credp);
286 	pvc->vc_tem = NULL;
287 
288 	index = pvc->vc_minor;
289 	if (index == vc_inuse_max_minor) {
290 		while ((--index > 0) && !VT_IS_INUSE(index))
291 			;
292 		vc_inuse_max_minor = index;
293 	}
294 
295 	vc_waitactive_reply(pvc->vc_minor, B_TRUE);
296 }
297 
298 static void
299 vt_init_tty(vc_state_t *pvc)
300 {
301 	ASSERT(MUTEX_HELD(&pvc->vc_state_lock));
302 
303 	pvc->vc_flags |= WCS_INIT;
304 	vt_init_ttycommon(&pvc->vc_ttycommon);
305 	wc_get_size(pvc);
306 }
307 
308 /*
309  * minor 0:	/dev/vt/0	(index = 0, indicating the system console)
310  * minor 1:	/dev/vt/1	(index = 1, vtdaemon special console)
311  * minor 2:	/dev/vt/2	(index = 2, virtual consoles)
312  * ......
313  * minor n:	/dev/vt/n	(index = n)
314  *
315  *
316  * The system console (minor 0), is opened firstly and used during console
317  * configuration.  It also acts as the system hard console even when all
318  * virtual consoles go off.
319  *
320  * In tipline case, minor 0 (/dev/vt/0) is reserved, and cannot be switched to.
321  * And the system console is redirected to the tipline. During normal cases,
322  * we can switch from virtual consoles to it by pressing 'Alt + F1'.
323  *
324  * minor 1 (/dev/vt/1) is reserved for vtdaemon special console, and it's
325  * not available to end users.
326  *
327  * During early console configuration, consconfig_dacf opens wscons and then
328  * issue a WC_OPEN_FB ioctl to kick off terminal init process. So during
329  * consconfig_dacf first opening of wscons, tems (of type tem_state_t) is
330  * not initialized. We do not initialize the tem_vt_state_t instance returned
331  * by tem_init() for this open, since we do not have enough info to handle
332  * normal terminal operation at this moment. This tem_vt_state_t instance
333  * will get initialized when handling WC_OPEN_FB.
334  */
335 int
336 vt_open(minor_t minor, queue_t *rq, cred_t *crp)
337 {
338 	vc_state_t *pvc;
339 
340 	if (!vt_minor_valid(minor))
341 		return (ENXIO);
342 
343 	pvc = vt_minor2vc(minor);
344 	if (pvc == NULL)
345 		return (ENXIO);
346 
347 	mutex_enter(&vc_lock);
348 	mutex_enter(&pvc->vc_state_lock);
349 
350 	if (!(pvc->vc_flags & WCS_ISOPEN)) {
351 		/*
352 		 * vc_tem might not be intialized if !tems.ts_initialized,
353 		 * and this only happens during console configuration.
354 		 */
355 		pvc->vc_tem = tem_init(crp);
356 	}
357 
358 	if (!(pvc->vc_flags & WCS_INIT))
359 		vt_init_tty(pvc);
360 
361 	/*
362 	 * In normal case, the first screen is the system console;
363 	 * In tipline case, the first screen is the first VT that gets started.
364 	 */
365 	if (vc_active_console == VT_MINOR_INVALID && minor != VT_DAEMON_MINOR)
366 		if (minor == 0 || consmode == CONS_KFB) {
367 			boolean_t unblank = B_FALSE;
368 
369 			vc_active_console = minor;
370 			vc_last_console = minor;
371 			if (minor != 0) {
372 				/*
373 				 * If we are not opening the system console
374 				 * as the first console, clear the phyical
375 				 * screen.
376 				 */
377 				unblank = B_TRUE;
378 			}
379 
380 			tem_activate(pvc->vc_tem, unblank, crp);
381 		}
382 
383 	if ((pvc->vc_ttycommon.t_flags & TS_XCLUDE) &&
384 	    (secpolicy_excl_open(crp) != 0)) {
385 		mutex_exit(&pvc->vc_state_lock);
386 		mutex_exit(&vc_lock);
387 		return (EBUSY);
388 	}
389 
390 	if (minor > vc_inuse_max_minor)
391 		vc_inuse_max_minor = minor;
392 
393 	pvc->vc_flags |= WCS_ISOPEN;
394 	pvc->vc_ttycommon.t_readq = rq;
395 	pvc->vc_ttycommon.t_writeq = WR(rq);
396 
397 	mutex_exit(&pvc->vc_state_lock);
398 	mutex_exit(&vc_lock);
399 
400 	rq->q_ptr = pvc;
401 	WR(rq)->q_ptr = pvc;
402 	pvc->vc_wq = WR(rq);
403 
404 	qprocson(rq);
405 	return (0);
406 }
407 
408 static minor_t
409 vt_find_prev(minor_t cur)
410 {
411 	minor_t i, t, max;
412 
413 	ASSERT(vc_active_console != VT_MINOR_INVALID);
414 
415 	max = VC_INSTANCES_COUNT;
416 
417 	for (i = cur - 1; (t = (i + max) % max) != cur; i--)
418 		if (!VT_IS_DAEMON(t) && VT_IS_INUSE(t))
419 			return (t);
420 
421 	return (VT_MINOR_INVALID);
422 }
423 
424 static minor_t
425 vt_find_next(minor_t cur)
426 {
427 	minor_t i, t, max;
428 
429 	ASSERT(vc_active_console != VT_MINOR_INVALID);
430 
431 	max = VC_INSTANCES_COUNT;
432 
433 	for (i = cur + 1; (t = (i + max) % max) != cur; i++)
434 		if (!VT_IS_DAEMON(t) && VT_IS_INUSE(t))
435 			return (t);
436 
437 	return (VT_MINOR_INVALID);
438 }
439 
440 /* ARGSUSED */
441 void
442 vt_send_hotkeys(void *timeout_arg)
443 {
444 	door_handle_t door;
445 	vt_cmd_arg_t arg;
446 	int error = 0;
447 	int retries = 0;
448 	door_arg_t door_arg;
449 
450 	arg.vt_ev = VT_EV_HOTKEYS;
451 
452 	mutex_enter(&vt_pending_vtno_lock);
453 	arg.vt_num = vt_pending_vtno;
454 	mutex_exit(&vt_pending_vtno_lock);
455 
456 	/* only available in kernel context or user context */
457 	if (door_ki_open(VT_DAEMON_DOOR_FILE, &door) != 0) {
458 		mutex_enter(&vt_pending_vtno_lock);
459 		vt_pending_vtno = -1;
460 		mutex_exit(&vt_pending_vtno_lock);
461 		return;
462 	}
463 
464 	door_arg.rbuf = NULL;
465 	door_arg.rsize = 0;
466 	door_arg.data_ptr = (void *)&arg;
467 	door_arg.data_size = sizeof (arg);
468 	door_arg.desc_ptr = NULL;
469 	door_arg.desc_num = 0;
470 
471 	/*
472 	 * Make door upcall
473 	 */
474 	while ((error = door_ki_upcall(door, &door_arg)) != 0 &&
475 	    retries < VT_DOORCALL_MAX_RETRY)
476 		if (error == EAGAIN || error == EINTR)
477 			retries++;
478 		else
479 			break;
480 
481 	door_ki_rele(door);
482 
483 	mutex_enter(&vt_pending_vtno_lock);
484 	vt_pending_vtno = -1;
485 	mutex_exit(&vt_pending_vtno_lock);
486 }
487 
488 static boolean_t
489 vt_validate_hotkeys(int minor)
490 {
491 	/*
492 	 * minor should not succeed the existing minor numbers range.
493 	 */
494 	if (!vt_minor_valid(minor))
495 		return (B_FALSE);
496 
497 	/*
498 	 * Shouldn't switch to /dev/vt/1 or an unused vt.
499 	 */
500 	if (!VT_IS_DAEMON(minor) && VT_IS_INUSE(minor))
501 		return (B_TRUE);
502 
503 	return (B_FALSE);
504 }
505 
506 static void
507 vt_trigger_hotkeys(int vtno)
508 {
509 	mutex_enter(&vt_pending_vtno_lock);
510 
511 	if (vt_pending_vtno != -1) {
512 		mutex_exit(&vt_pending_vtno_lock);
513 		return;
514 	}
515 
516 	vt_pending_vtno = vtno;
517 	mutex_exit(&vt_pending_vtno_lock);
518 	(void) timeout(vt_send_hotkeys, NULL, 1);
519 }
520 
521 /*
522  * return value:
523  *    0:    non msg of vt hotkeys
524  *    1:    msg of vt hotkeys
525  */
526 int
527 vt_check_hotkeys(mblk_t *mp)
528 {
529 	int vtno = 0;
530 	minor_t minor = 0;
531 
532 	/* LINTED E_PTRDIFF_OVERFLOW */
533 	if (!VT_MSG_SWITCH(mp))
534 		return (0);
535 
536 	switch (VT_MSG_OPCODE(mp)) {
537 	case 'B':
538 		/* find out the previous vt */
539 		if (vc_active_console == VT_MINOR_INVALID)
540 			return (1);
541 
542 		if (VT_IS_DAEMON(vc_active_console)) {
543 			minor = vt_find_prev(vt_arg2minor(vc_target_console));
544 			break;
545 		}
546 
547 		minor = vt_find_prev(vc_active_console);
548 		break;
549 	case 'F':
550 		/* find out the next vt */
551 		if (vc_active_console == VT_MINOR_INVALID)
552 			return (1);
553 
554 		if (VT_IS_DAEMON(vc_active_console)) {
555 			minor = vt_find_next(vt_arg2minor(vc_target_console));
556 			break;
557 		}
558 
559 		minor = vt_find_next(vc_active_console);
560 		break;
561 	case 'H':
562 		/* find out the specified vt */
563 		minor = VT_MSG_VTNO(mp);
564 
565 		/* check for system console, Alt + F1 */
566 		if (minor == 1)
567 			minor = 0;
568 		break;
569 	case 'L':
570 		/* find out the last vt */
571 		if ((minor = vc_last_console) == VT_MINOR_INVALID)
572 			return (1);
573 		break;
574 	default:
575 		return (1);
576 	}
577 
578 	if (!vt_validate_hotkeys(minor))
579 		return (1);
580 
581 	/*
582 	 * for system console, the argument of vtno for
583 	 * vt_activate is 1, though its minor is 0
584 	 */
585 	if (minor == 0)
586 		vtno = 1;	/* for system console */
587 	else
588 		vtno = minor;
589 
590 	vt_trigger_hotkeys(vtno);
591 	return (1);
592 }
593 
594 static void
595 vt_proc_sendsig(pid_t pid, int sig)
596 {
597 	register proc_t *p;
598 
599 	if (pid <= 0)
600 		return;
601 
602 	mutex_enter(&pidlock);
603 	if ((p = prfind(pid)) == NULL || p->p_stat == SIDL) {
604 		mutex_exit(&pidlock);
605 		return;
606 	}
607 
608 	psignal(p, sig);
609 	mutex_exit(&pidlock);
610 }
611 
612 static int
613 vt_proc_exists(pid_t pid)
614 {
615 	register proc_t *p;
616 
617 	if (pid <= 0)
618 		return (EINVAL);
619 
620 	mutex_enter(&pidlock);
621 	if ((p = prfind(pid)) == NULL || p->p_stat == SIDL) {
622 		mutex_exit(&pidlock);
623 		return (ESRCH);
624 	}
625 	mutex_exit(&pidlock);
626 
627 	return (0);
628 }
629 
630 #define	SIG_VALID(x)	(((x) > 0) && ((x) < _SIGRTMAX) && \
631 			((x) != SIGKILL) && ((x) != SIGSTOP))
632 
633 static int
634 vt_setmode(vc_state_t *pvc, struct vt_mode *pmode)
635 {
636 	if ((pmode->mode != VT_PROCESS) && (pmode->mode != VT_AUTO))
637 		return (EINVAL);
638 
639 	if (!SIG_VALID(pmode->relsig) || !SIG_VALID(pmode->acqsig))
640 		return (EINVAL);
641 
642 	if (pmode->mode == VT_PROCESS) {
643 		pvc->vc_pid = curproc->p_pid;
644 	} else {
645 		pvc->vc_dispnum = 0;
646 		pvc->vc_login = 0;
647 	}
648 
649 	pvc->vc_switch_mode = pmode->mode;
650 	pvc->vc_waitv = pmode->waitv;
651 	pvc->vc_relsig = pmode->relsig;
652 	pvc->vc_acqsig = pmode->acqsig;
653 
654 	return (0);
655 }
656 
657 static void
658 vt_reset(vc_state_t *pvc)
659 {
660 	pvc->vc_switch_mode = VT_AUTO;
661 	pvc->vc_pid = -1;
662 	pvc->vc_dispnum = 0;
663 	pvc->vc_login = 0;
664 	pvc->vc_switchto = VT_MINOR_INVALID;
665 }
666 
667 /*
668  * switch to vt_no from vc_active_console
669  */
670 static int
671 vt_switch(uint_t vt_no, cred_t *credp)
672 {
673 	vc_state_t *pvc_active = vt_minor2vc(vc_active_console);
674 	vc_state_t *pvc = vt_minor2vc(vt_no);
675 	minor_t index;
676 
677 	ASSERT(pvc_active && pvc);
678 
679 	/* sanity test for the target VT and the active VT */
680 	if (!((pvc->vc_flags & WCS_ISOPEN) && (pvc->vc_flags & WCS_INIT)))
681 		return (EINVAL);
682 
683 	if (!((pvc_active->vc_flags & WCS_ISOPEN) &&
684 	    (pvc_active->vc_flags & WCS_INIT)))
685 		return (EINVAL);
686 
687 	mutex_enter(&vc_lock);
688 
689 	tem_switch(pvc_active->vc_tem, pvc->vc_tem, credp);
690 
691 	if (!VT_IS_DAEMON(vc_active_console))
692 		vc_last_console = vc_active_console;
693 	else
694 		vc_last_console = vt_arg2minor(vc_target_console);
695 
696 	vc_active_console = pvc->vc_minor;
697 
698 	if (pvc->vc_switch_mode == VT_PROCESS) {
699 		pvc->vc_switchto = pvc->vc_minor;
700 
701 		/* send it an acquired signal */
702 		vt_proc_sendsig(pvc->vc_pid, pvc->vc_acqsig);
703 	}
704 
705 	vc_waitactive_reply(vc_active_console, B_FALSE);
706 
707 	mutex_exit(&vc_lock);
708 
709 	if (!VT_IS_DAEMON(vt_no)) {
710 		/*
711 		 * Applications that open the virtual console device may request
712 		 * asynchronous notification of VT switching from a previous VT
713 		 * to another one by setting the S_MSG flag in an I_SETSIG
714 		 * STREAMS ioctl. Such processes receive a SIGPOLL signal when
715 		 * a VT switching succeeds.
716 		 */
717 		for (index = 0; index < VC_INSTANCES_COUNT; index++) {
718 			vc_state_t *tmp_pvc = vt_minor2vc(index);
719 			mblk_t *mp;
720 
721 			if ((tmp_pvc->vc_flags & WCS_ISOPEN) &&
722 			    (tmp_pvc->vc_flags & WCS_INIT) &&
723 			    (mp = allocb(sizeof (unsigned char), BPRI_HI))) {
724 				mp->b_datap->db_type = M_PCSIG;
725 				*mp->b_wptr = SIGPOLL;
726 				mp->b_wptr += sizeof (unsigned char);
727 				putnext(RD(tmp_pvc->vc_wq), mp);
728 			}
729 		}
730 	}
731 
732 	return (0);
733 
734 }
735 
736 /*
737  * vt_no	from 0 to n
738  *
739  * 0	for the vtdaemon sepcial console (only vtdaemon will use it)
740  * 1    for the system console (Alt + F1, or Alt + Ctrl + F1),
741  *      aka Virtual Console #1
742  *
743  * 2    for Virtual Console #2
744  * n    for Virtual Console #n
745  */
746 static minor_t
747 vt_arg2minor(uint_t arg)
748 {
749 	if (arg == 0)
750 		return (1);
751 
752 	if (arg == 1)
753 		return (0);
754 
755 	return (arg);
756 }
757 
758 static uint_t
759 vt_minor2arg(minor_t minor)
760 {
761 	if (minor == 0)
762 		return (1);
763 
764 	if (VT_IS_DAEMON(minor)) {
765 		/* here it should be the real console */
766 		return (vc_target_console);
767 	}
768 
769 	return (minor);
770 }
771 
772 static int
773 vt_activate(uint_t vt_no, cred_t *credp)
774 {
775 	vc_state_t *pvc;
776 	minor_t minor;
777 
778 	minor = vt_arg2minor(vt_no);
779 	if (!vt_minor_valid(minor))
780 		return (ENXIO);
781 	if (minor == vc_active_console) {
782 		if (VT_IS_DAEMON(minor)) {
783 			/*
784 			 * vtdaemon is reactivating itself to do locking
785 			 * on behalf of another console, so record current
786 			 * target console as the last console.
787 			 */
788 			vc_last_console = vt_arg2minor(vc_target_console);
789 		}
790 
791 		return (0);
792 	}
793 
794 	/*
795 	 * In tipline case, the system console is redirected to tipline
796 	 * and thus is always available.
797 	 */
798 	if (minor == 0 && consconfig_console_is_tipline())
799 		return (0);
800 
801 	if (!VT_IS_INUSE(minor))
802 		return (ENXIO);
803 
804 	pvc = vt_minor2vc(minor);
805 	if (pvc == NULL)
806 		return (ENXIO);
807 	if (pvc->vc_tem == NULL)
808 		return (ENXIO);
809 
810 	pvc = vt_minor2vc(vc_active_console);
811 	if (pvc == NULL)
812 		return (ENXIO);
813 	if (pvc->vc_switch_mode != VT_PROCESS)
814 		return (vt_switch(minor, credp));
815 
816 	/*
817 	 * Validate the process, reset the
818 	 * vt to auto mode if failed.
819 	 */
820 	if (pvc->vc_pid == -1 || vt_proc_exists(pvc->vc_pid) != 0) {
821 		/*
822 		 * Xserver has not started up yet,
823 		 * or it dose not exist.
824 		 */
825 		vt_reset(pvc);
826 		return (0);
827 	}
828 
829 	/*
830 	 * Send the release signal to the process,
831 	 * and wait VT_RELDISP ioctl from Xserver
832 	 * after its leaving VT.
833 	 */
834 	vt_proc_sendsig(pvc->vc_pid, pvc->vc_relsig);
835 	pvc->vc_switchto = minor;
836 
837 	/*
838 	 * We don't need a timeout here, for if Xserver refuses
839 	 * or fails to respond to release signal using VT_RELDISP,
840 	 * we cannot successfully switch to our text mode. Actually
841 	 * users can try again. At present we don't support force
842 	 * switch.
843 	 */
844 	return (0);
845 }
846 
847 static int
848 vt_reldisp(vc_state_t *pvc, int arg, cred_t *credp)
849 {
850 	minor_t target_vtno = pvc->vc_switchto;
851 
852 	if ((pvc->vc_switch_mode != VT_PROCESS) ||
853 	    (pvc->vc_minor != vc_active_console))
854 		return (EACCES);
855 
856 	if (target_vtno == VT_MINOR_INVALID)
857 		return (EINVAL);
858 
859 	pvc->vc_switchto = VT_MINOR_INVALID;
860 
861 	if (arg == VT_ACKACQ)
862 		return (0);
863 
864 	if (arg == 0)
865 		return (0); /* refuse to release */
866 
867 	/* Xserver has left VT */
868 	return (vt_switch(target_vtno, credp));
869 }
870 
871 void
872 vt_ioctl(queue_t *q, mblk_t *mp)
873 {
874 	vc_state_t *pvc = (vc_state_t *)q->q_ptr;
875 	struct iocblk	*iocp;
876 	struct vt_mode vtmode;
877 	struct vt_stat vtinfo;
878 	struct vt_dispinfo vtdisp;
879 	mblk_t *tmp;
880 	int minor;
881 	int arg;
882 	int error = 0;
883 	vc_waitactive_msg_t *wait_msg;
884 
885 	iocp = (struct iocblk *)(void *)mp->b_rptr;
886 	if (consmode != CONS_KFB && iocp->ioc_cmd != VT_ENABLED) {
887 		vt_iocnak(q, mp, EINVAL);
888 		return;
889 	}
890 
891 	switch (iocp->ioc_cmd) {
892 	case VT_ENABLED:
893 		if (!(tmp = allocb(sizeof (int), BPRI_MED))) {
894 			error = ENOMEM;
895 			break;
896 		}
897 		*(int *)(void *)tmp->b_rptr = consmode;
898 		tmp->b_wptr += sizeof (int);
899 		vt_copyout(q, mp, tmp, sizeof (int));
900 		return;
901 
902 	case KDSETMODE:
903 		arg = *(intptr_t *)(void *)mp->b_cont->b_rptr;
904 		if (arg != KD_TEXT && arg != KD_GRAPHICS) {
905 			error = EINVAL;
906 			break;
907 		}
908 		if (tem_get_fbmode(pvc->vc_tem) == arg)
909 			break;
910 
911 		tem_set_fbmode(pvc->vc_tem, (uchar_t)arg, iocp->ioc_cr);
912 
913 		break;
914 
915 	case KDGETMODE:
916 		if (!(tmp = allocb(sizeof (int), BPRI_MED))) {
917 			error = ENOMEM;
918 			break;
919 		}
920 		*(int *)(void *)tmp->b_rptr = tem_get_fbmode(pvc->vc_tem);
921 		tmp->b_wptr += sizeof (int);
922 		vt_copyout(q, mp, tmp, sizeof (int));
923 		return;
924 
925 	case VT_OPENQRY: /* return number of first free VT */
926 		if (!(tmp = allocb(sizeof (int), BPRI_MED))) {
927 			error = ENOMEM;
928 			break;
929 		}
930 
931 		/* minors of 0 and 1 are not available to end users */
932 		for (minor = 2; vt_minor_valid(minor); minor++)
933 			if (!VT_IS_INUSE(minor))
934 				break;
935 
936 		if (!vt_minor_valid(minor))
937 			minor = -1;
938 		*(int *)(void *)tmp->b_rptr = minor; /* /dev/vt/minor */
939 		tmp->b_wptr += sizeof (int);
940 		vt_copyout(q, mp, tmp, sizeof (int));
941 		return;
942 
943 	case VT_GETMODE:
944 		vtmode.mode = pvc->vc_switch_mode;
945 		vtmode.waitv = pvc->vc_waitv;
946 		vtmode.relsig = pvc->vc_relsig;
947 		vtmode.acqsig = pvc->vc_acqsig;
948 		vtmode.frsig = 0;
949 		if (!(tmp = allocb(sizeof (struct vt_mode), BPRI_MED))) {
950 			error = ENOMEM;
951 			break;
952 		}
953 		*(struct vt_mode *)(void *)tmp->b_rptr = vtmode;
954 		tmp->b_wptr += sizeof (struct vt_mode);
955 		vt_copyout(q, mp, tmp, sizeof (struct vt_mode));
956 		return;
957 
958 	case VT_SETMODE:
959 		vt_copyin(q, mp, sizeof (struct vt_mode));
960 		return;
961 
962 	case VT_SETDISPINFO:
963 		/* always enforce sys_devices privilege for setdispinfo */
964 		if ((error = secpolicy_console(iocp->ioc_cr)) != 0)
965 			break;
966 
967 		pvc->vc_dispnum = *(intptr_t *)(void *)mp->b_cont->b_rptr;
968 		break;
969 
970 	case VT_SETDISPLOGIN:
971 		pvc->vc_login = *(intptr_t *)(void *)mp->b_cont->b_rptr;
972 		break;
973 
974 	case VT_GETDISPINFO:
975 		vtdisp.v_pid = pvc->vc_pid;
976 		vtdisp.v_dispnum = pvc->vc_dispnum;
977 		vtdisp.v_login = pvc->vc_login;
978 		if (!(tmp = allocb(sizeof (struct vt_dispinfo), BPRI_MED))) {
979 			error = ENOMEM;
980 			break;
981 		}
982 		*(struct vt_dispinfo *)(void *)tmp->b_rptr = vtdisp;
983 		tmp->b_wptr += sizeof (struct vt_dispinfo);
984 		vt_copyout(q, mp, tmp, sizeof (struct vt_dispinfo));
985 		return;
986 
987 	case VT_RELDISP:
988 		arg = *(intptr_t *)(void *)mp->b_cont->b_rptr;
989 		error = vt_reldisp(pvc, arg, iocp->ioc_cr);
990 		break;
991 
992 	case VT_CONFIG:
993 		/* always enforce sys_devices privilege for config */
994 		if ((error = secpolicy_console(iocp->ioc_cr)) != 0)
995 			break;
996 
997 		arg = *(intptr_t *)(void *)mp->b_cont->b_rptr;
998 		error = vt_config(arg);
999 		break;
1000 
1001 	case VT_ACTIVATE:
1002 		/* always enforce sys_devices privilege for secure switch */
1003 		if ((error = secpolicy_console(iocp->ioc_cr)) != 0)
1004 			break;
1005 
1006 		arg = *(intptr_t *)(void *)mp->b_cont->b_rptr;
1007 		error = vt_activate(arg, iocp->ioc_cr);
1008 		break;
1009 
1010 	case VT_WAITACTIVE:
1011 		arg = *(intptr_t *)(void *)mp->b_cont->b_rptr;
1012 		arg = vt_arg2minor(arg);
1013 		if (!vt_minor_valid(arg)) {
1014 			error = ENXIO;
1015 			break;
1016 		}
1017 		if (arg == vc_active_console)
1018 			break;
1019 
1020 		wait_msg = kmem_zalloc(sizeof (vc_waitactive_msg_t),
1021 		    KM_NOSLEEP);
1022 		if (wait_msg == NULL) {
1023 			error = ENXIO;
1024 			break;
1025 		}
1026 
1027 		wait_msg->wa_mp = mp;
1028 		wait_msg->wa_msg_minor = pvc->vc_minor;
1029 		wait_msg->wa_wait_minor = arg;
1030 		list_insert_head(&vc_waitactive_list, wait_msg);
1031 
1032 		return;
1033 
1034 	case VT_GETSTATE:
1035 		/*
1036 		 * Here v_active is the argument for vt_activate,
1037 		 * not minor.
1038 		 */
1039 		vtinfo.v_active = vt_minor2arg(vc_active_console);
1040 		vtinfo.v_state = 3;	/* system console and vtdaemon */
1041 
1042 		/* we only support 16 vt states since the v_state is short */
1043 		for (minor = 2; minor < 16; minor++) {
1044 			pvc = vt_minor2vc(minor);
1045 			if (pvc == NULL)
1046 				break;
1047 			if (VT_IS_INUSE(minor))
1048 				vtinfo.v_state |= (1 << pvc->vc_minor);
1049 		}
1050 
1051 		if (!(tmp = allocb(sizeof (struct vt_stat), BPRI_MED))) {
1052 			error = ENOMEM;
1053 			break;
1054 		}
1055 		*(struct vt_stat *)(void *)tmp->b_rptr = vtinfo;
1056 		tmp->b_wptr += sizeof (struct vt_stat);
1057 		vt_copyout(q, mp, tmp, sizeof (struct vt_stat));
1058 		return;
1059 
1060 	case VT_SET_TARGET:
1061 		/* always enforce sys_devices privilege */
1062 		if ((error = secpolicy_console(iocp->ioc_cr)) != 0)
1063 			break;
1064 
1065 		arg = *(intptr_t *)(void *)mp->b_cont->b_rptr;
1066 
1067 		/* vtdaemon is doing authentication for this target console */
1068 		vc_target_console = arg;
1069 		break;
1070 
1071 	case VT_GETACTIVE:	/* get real active console (minor) */
1072 		if (!(tmp = allocb(sizeof (int), BPRI_MED))) {
1073 			error = ENOMEM;
1074 			break;
1075 		}
1076 		*(int *)(void *)tmp->b_rptr = vc_active_console;
1077 		tmp->b_wptr += sizeof (int);
1078 		vt_copyout(q, mp, tmp, sizeof (int));
1079 		return;
1080 
1081 	default:
1082 		error = ENXIO;
1083 		break;
1084 	}
1085 
1086 	if (error != 0)
1087 		vt_iocnak(q, mp, error);
1088 	else
1089 		vt_iocack(q, mp);
1090 }
1091 
1092 void
1093 vt_miocdata(queue_t *qp, mblk_t *mp)
1094 {
1095 	vc_state_t *pvc = (vc_state_t *)qp->q_ptr;
1096 	struct copyresp *copyresp;
1097 	struct vt_mode *pmode;
1098 	int error = 0;
1099 
1100 	copyresp = (struct copyresp *)(void *)mp->b_rptr;
1101 	if (copyresp->cp_rval) {
1102 		vt_iocnak(qp, mp, EAGAIN);
1103 		return;
1104 	}
1105 
1106 	switch (copyresp->cp_cmd) {
1107 	case VT_SETMODE:
1108 		pmode = (struct vt_mode *)(void *)mp->b_cont->b_rptr;
1109 		error = vt_setmode(pvc, pmode);
1110 		break;
1111 
1112 	case KDGETMODE:
1113 	case VT_OPENQRY:
1114 	case VT_GETMODE:
1115 	case VT_GETDISPINFO:
1116 	case VT_GETSTATE:
1117 	case VT_ENABLED:
1118 	case VT_GETACTIVE:
1119 		break;
1120 
1121 	default:
1122 		error = ENXIO;
1123 		break;
1124 	}
1125 
1126 	if (error != 0)
1127 		vt_iocnak(qp, mp, error);
1128 	else
1129 		vt_iocack(qp, mp);
1130 }
1131 
1132 static void
1133 vt_iocack(queue_t *qp, mblk_t *mp)
1134 {
1135 	struct iocblk	*iocbp = (struct iocblk *)(void *)mp->b_rptr;
1136 
1137 	mp->b_datap->db_type = M_IOCACK;
1138 	mp->b_wptr = mp->b_rptr + sizeof (struct iocblk);
1139 	iocbp->ioc_error = 0;
1140 	iocbp->ioc_count = 0;
1141 	iocbp->ioc_rval = 0;
1142 	if (mp->b_cont != NULL) {
1143 		freemsg(mp->b_cont);
1144 		mp->b_cont = NULL;
1145 	}
1146 	qreply(qp, mp);
1147 }
1148 
1149 static void
1150 vt_iocnak(queue_t *qp, mblk_t *mp, int error)
1151 {
1152 	struct iocblk *iocp = (struct iocblk *)(void *)mp->b_rptr;
1153 
1154 	mp->b_datap->db_type = M_IOCNAK;
1155 	iocp->ioc_rval = 0;
1156 	iocp->ioc_count = 0;
1157 	iocp->ioc_error = error;
1158 	if (mp->b_cont != NULL) {
1159 		freemsg(mp->b_cont);
1160 		mp->b_cont = NULL;
1161 	}
1162 	qreply(qp, mp);
1163 }
1164 
1165 static void
1166 vt_copyin(queue_t *qp, mblk_t *mp, uint_t size)
1167 {
1168 	struct copyreq  *cqp;
1169 
1170 	cqp = (struct copyreq *)(void *)mp->b_rptr;
1171 	cqp->cq_addr = *((caddr_t *)(void *)mp->b_cont->b_rptr);
1172 	cqp->cq_size = size;
1173 	cqp->cq_flag = 0;
1174 	cqp->cq_private = (mblk_t *)NULL;
1175 	mp->b_wptr = mp->b_rptr + sizeof (struct copyreq);
1176 	mp->b_datap->db_type = M_COPYIN;
1177 	if (mp->b_cont)
1178 		freemsg(mp->b_cont);
1179 	mp->b_cont = (mblk_t *)NULL;
1180 	qreply(qp, mp);
1181 }
1182 
1183 static void
1184 vt_copyout(queue_t *qp, mblk_t *mp, mblk_t *tmp, uint_t size)
1185 {
1186 	struct copyreq  *cqp;
1187 
1188 	cqp = (struct copyreq *)(void *)mp->b_rptr;
1189 	cqp->cq_size = size;
1190 	cqp->cq_addr = *((caddr_t *)(void *)mp->b_cont->b_rptr);
1191 	cqp->cq_flag = 0;
1192 	cqp->cq_private = (mblk_t *)NULL;
1193 	mp->b_wptr = mp->b_rptr + sizeof (struct copyreq);
1194 	mp->b_datap->db_type = M_COPYOUT;
1195 	if (mp->b_cont)
1196 		freemsg(mp->b_cont);
1197 	mp->b_cont = tmp;
1198 	qreply(qp, mp);
1199 }
1200 
1201 /*
1202  * Get vc state from minor.
1203  * Once a caller gets a vc_state_t from this function,
1204  * the vc_state_t is guaranteed not being freed before
1205  * the caller leaves this STREAMS module by the D_MTPERMOD
1206  * perimeter.
1207  */
1208 vc_state_t *
1209 vt_minor2vc(minor_t minor)
1210 {
1211 	avl_index_t where;
1212 	vc_state_t target;
1213 
1214 	if (minor != VT_ACTIVE) {
1215 		target.vc_minor = minor;
1216 		return (avl_find(&vc_avl_root, &target, &where));
1217 	}
1218 
1219 	if (vc_active_console == VT_MINOR_INVALID)
1220 		target.vc_minor = 0;
1221 	else
1222 		target.vc_minor = vc_active_console;
1223 
1224 	return (avl_find(&vc_avl_root, &target, &where));
1225 }
1226 
1227 static void
1228 vt_state_init(vc_state_t *vcptr, minor_t minor)
1229 {
1230 	mutex_init(&vcptr->vc_state_lock, NULL, MUTEX_DRIVER, NULL);
1231 
1232 	mutex_enter(&vcptr->vc_state_lock);
1233 	vcptr->vc_flags = 0;
1234 	mutex_exit(&vcptr->vc_state_lock);
1235 
1236 	vcptr->vc_pid = -1;
1237 	vcptr->vc_dispnum = 0;
1238 	vcptr->vc_login = 0;
1239 	vcptr->vc_switchto = VT_MINOR_INVALID;
1240 	vcptr->vc_switch_mode = VT_AUTO;
1241 	vcptr->vc_relsig = SIGUSR1;
1242 	vcptr->vc_acqsig = SIGUSR1;
1243 	vcptr->vc_tem = NULL;
1244 	vcptr->vc_bufcallid = 0;
1245 	vcptr->vc_timeoutid = 0;
1246 	vcptr->vc_wq = NULL;
1247 	vcptr->vc_minor = minor;
1248 }
1249 
1250 void
1251 vt_resize(uint_t count)
1252 {
1253 	uint_t vc_num, i;
1254 
1255 	ASSERT(MUTEX_HELD(&vc_lock));
1256 
1257 	vc_num = VC_INSTANCES_COUNT;
1258 
1259 	if (count == vc_num)
1260 		return;
1261 
1262 	if (count > vc_num) {
1263 		for (i = vc_num; i < count; i++) {
1264 			vc_state_t *vcptr = kmem_zalloc(sizeof (vc_state_t),
1265 			    KM_SLEEP);
1266 			vt_state_init(vcptr, i);
1267 			avl_add(&vc_avl_root, vcptr);
1268 		}
1269 		return;
1270 	}
1271 
1272 	for (i = vc_num; i > count; i--) {
1273 		avl_index_t where;
1274 		vc_state_t target, *found;
1275 
1276 		target.vc_minor = i - 1;
1277 		found = avl_find(&vc_avl_root, &target, &where);
1278 		ASSERT(found != NULL && found->vc_flags == 0);
1279 		avl_remove(&vc_avl_root, found);
1280 		kmem_free(found, sizeof (vc_state_t));
1281 	}
1282 }
1283 
1284 static int
1285 vc_avl_compare(const void *first, const void *second)
1286 {
1287 	const vc_state_t *vcptr1 = first;
1288 	const vc_state_t *vcptr2 = second;
1289 
1290 	if (vcptr1->vc_minor < vcptr2->vc_minor)
1291 		return (-1);
1292 
1293 	if (vcptr1->vc_minor == vcptr2->vc_minor)
1294 		return (0);
1295 
1296 	return (1);
1297 }
1298 
1299 /*
1300  * Only called from wc init().
1301  */
1302 void
1303 vt_init(void)
1304 {
1305 #ifdef	__lock_lint
1306 	ASSERT(NO_COMPETING_THREADS);
1307 #endif
1308 
1309 	avl_create(&vc_avl_root, vc_avl_compare, sizeof (vc_state_t),
1310 	    offsetof(vc_state_t, vc_avl_node));
1311 
1312 	list_create(&vc_waitactive_list, sizeof (vc_waitactive_msg_t),
1313 	    offsetof(vc_waitactive_msg_t, wa_list_node));
1314 
1315 	mutex_init(&vc_lock, NULL, MUTEX_DRIVER, NULL);
1316 	mutex_init(&vt_pending_vtno_lock, NULL, MUTEX_DRIVER, NULL);
1317 }
1318