2005-01-06 23:35:40 +00:00
|
|
|
/*-
|
1994-05-24 10:09:53 +00:00
|
|
|
* Copyright (c) 1982, 1986, 1989, 1993
|
|
|
|
* The Regents of the University of California. All rights reserved.
|
|
|
|
*
|
|
|
|
* Redistribution and use in source and binary forms, with or without
|
|
|
|
* modification, are permitted provided that the following conditions
|
|
|
|
* are met:
|
|
|
|
* 1. Redistributions of source code must retain the above copyright
|
|
|
|
* notice, this list of conditions and the following disclaimer.
|
|
|
|
* 2. Redistributions in binary form must reproduce the above copyright
|
|
|
|
* notice, this list of conditions and the following disclaimer in the
|
|
|
|
* documentation and/or other materials provided with the distribution.
|
|
|
|
* 4. Neither the name of the University nor the names of its contributors
|
|
|
|
* may be used to endorse or promote products derived from this software
|
|
|
|
* without specific prior written permission.
|
|
|
|
*
|
|
|
|
* THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
|
|
|
|
* ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
|
|
|
|
* IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
|
|
|
|
* ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
|
|
|
|
* FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
|
|
|
|
* DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
|
|
|
|
* OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
|
|
|
|
* HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
|
|
|
|
* LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
|
|
|
|
* OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
|
|
|
|
* SUCH DAMAGE.
|
|
|
|
*
|
1996-03-11 02:24:39 +00:00
|
|
|
* @(#)tty_pty.c 8.4 (Berkeley) 2/20/95
|
1994-05-24 10:09:53 +00:00
|
|
|
*/
|
|
|
|
|
2003-06-11 00:56:59 +00:00
|
|
|
#include <sys/cdefs.h>
|
|
|
|
__FBSDID("$FreeBSD$");
|
|
|
|
|
1994-05-24 10:09:53 +00:00
|
|
|
/*
|
|
|
|
* Pseudo-teletype Driver
|
|
|
|
* (Actually two drivers, requiring two entries in 'cdevsw')
|
|
|
|
*/
|
1997-12-16 17:40:42 +00:00
|
|
|
#include "opt_compat.h"
|
2003-03-05 08:16:29 +00:00
|
|
|
#include "opt_tty.h"
|
1994-05-24 10:09:53 +00:00
|
|
|
#include <sys/param.h>
|
|
|
|
#include <sys/systm.h>
|
2002-02-23 11:12:57 +00:00
|
|
|
#include <sys/lock.h>
|
|
|
|
#include <sys/mutex.h>
|
|
|
|
#include <sys/sx.h>
|
2004-06-21 22:57:16 +00:00
|
|
|
#ifndef BURN_BRIDGES
|
2004-06-11 11:16:26 +00:00
|
|
|
#if defined(COMPAT_43)
|
1997-03-24 12:03:06 +00:00
|
|
|
#include <sys/ioctl_compat.h>
|
|
|
|
#endif
|
2004-06-21 22:57:16 +00:00
|
|
|
#endif
|
1994-05-24 10:09:53 +00:00
|
|
|
#include <sys/proc.h>
|
|
|
|
#include <sys/tty.h>
|
|
|
|
#include <sys/conf.h>
|
1997-03-23 03:37:54 +00:00
|
|
|
#include <sys/fcntl.h>
|
1997-09-14 02:40:46 +00:00
|
|
|
#include <sys/poll.h>
|
1994-05-24 10:09:53 +00:00
|
|
|
#include <sys/kernel.h>
|
2004-12-22 17:37:14 +00:00
|
|
|
#include <sys/uio.h>
|
1994-10-02 17:35:40 +00:00
|
|
|
#include <sys/signalvar.h>
|
1999-08-08 19:28:59 +00:00
|
|
|
#include <sys/malloc.h>
|
1994-05-24 10:09:53 +00:00
|
|
|
|
2000-12-08 20:09:00 +00:00
|
|
|
static MALLOC_DEFINE(M_PTY, "ptys", "pty data structures");
|
1995-11-29 10:49:16 +00:00
|
|
|
|
2002-03-19 21:25:46 +00:00
|
|
|
static void ptsstart(struct tty *tp);
|
|
|
|
static void ptsstop(struct tty *tp, int rw);
|
|
|
|
static void ptcwakeup(struct tty *tp, int flag);
|
When devfs cloning takes place, provide access to the credential of the
process that caused the clone event to take place for the device driver
creating the device. This allows cloned device drivers to adapt the
device node based on security aspects of the process, such as the uid,
gid, and MAC label.
- Add a cred reference to struct cdev, so that when a device node is
instantiated as a vnode, the cloning credential can be exposed to
MAC.
- Add make_dev_cred(), a version of make_dev() that additionally
accepts the credential to stick in the struct cdev. Implement it and
make_dev() in terms of a back-end make_dev_credv().
- Add a new event handler, dev_clone_cred, which can be registered to
receive the credential instead of dev_clone, if desired.
- Modify the MAC entry point mac_create_devfs_device() to accept an
optional credential pointer (may be NULL), so that MAC policies can
inspect and act on the label or other elements of the credential
when initializing the skeleton device protections.
- Modify tty_pty.c to register clone_dev_cred and invoke make_dev_cred(),
so that the pty clone credential is exposed to the MAC Framework.
While currently primarily focussed on MAC policies, this change is also
a prerequisite for changes to allow ptys to be instantiated with the UID
of the process looking up the pty. This requires further changes to the
pty driver -- in particular, to immediately recycle pty nodes on last
close so that the credential-related state can be recreated on next
lookup.
Submitted by: Andrew Reisse <andrew.reisse@sparta.com>
Obtained from: TrustedBSD Project
Sponsored by: SPAWAR, SPARTA
MFC after: 1 week
MFC note: Merge to 6.x, but not 5.x for ABI reasons
2005-07-14 10:22:09 +00:00
|
|
|
static struct cdev *ptyinit(struct cdev *cdev, struct thread *td);
|
1995-10-25 18:23:58 +00:00
|
|
|
|
1995-12-08 11:19:42 +00:00
|
|
|
static d_open_t ptsopen;
|
|
|
|
static d_close_t ptsclose;
|
|
|
|
static d_read_t ptsread;
|
|
|
|
static d_write_t ptswrite;
|
2004-09-23 16:13:46 +00:00
|
|
|
static d_ioctl_t ptsioctl;
|
1995-12-08 11:19:42 +00:00
|
|
|
static d_open_t ptcopen;
|
|
|
|
static d_close_t ptcclose;
|
|
|
|
static d_read_t ptcread;
|
2004-09-23 16:13:46 +00:00
|
|
|
static d_ioctl_t ptcioctl;
|
1995-12-08 11:19:42 +00:00
|
|
|
static d_write_t ptcwrite;
|
1997-09-14 02:40:46 +00:00
|
|
|
static d_poll_t ptcpoll;
|
1995-12-08 11:19:42 +00:00
|
|
|
|
1999-05-30 16:53:49 +00:00
|
|
|
static struct cdevsw pts_cdevsw = {
|
2004-02-21 21:10:55 +00:00
|
|
|
.d_version = D_VERSION,
|
2003-03-03 12:15:54 +00:00
|
|
|
.d_open = ptsopen,
|
|
|
|
.d_close = ptsclose,
|
|
|
|
.d_read = ptsread,
|
|
|
|
.d_write = ptswrite,
|
2004-09-23 16:13:46 +00:00
|
|
|
.d_ioctl = ptsioctl,
|
2003-03-03 12:15:54 +00:00
|
|
|
.d_name = "pts",
|
2004-02-21 21:10:55 +00:00
|
|
|
.d_flags = D_TTY | D_NEEDGIANT,
|
1998-08-23 08:26:42 +00:00
|
|
|
};
|
|
|
|
|
1999-05-30 16:53:49 +00:00
|
|
|
static struct cdevsw ptc_cdevsw = {
|
2004-02-21 21:10:55 +00:00
|
|
|
.d_version = D_VERSION,
|
2003-03-03 12:15:54 +00:00
|
|
|
.d_open = ptcopen,
|
|
|
|
.d_close = ptcclose,
|
|
|
|
.d_read = ptcread,
|
|
|
|
.d_write = ptcwrite,
|
2004-09-23 16:13:46 +00:00
|
|
|
.d_ioctl = ptcioctl,
|
2003-03-03 12:15:54 +00:00
|
|
|
.d_poll = ptcpoll,
|
|
|
|
.d_name = "ptc",
|
2004-02-21 21:10:55 +00:00
|
|
|
.d_flags = D_TTY | D_NEEDGIANT,
|
1998-08-23 08:26:42 +00:00
|
|
|
};
|
1995-12-08 11:19:42 +00:00
|
|
|
|
1994-05-24 10:09:53 +00:00
|
|
|
#define BUFSIZ 100 /* Chunk size iomoved to/from user */
|
|
|
|
|
2004-06-09 10:21:53 +00:00
|
|
|
struct ptsc {
|
1994-05-24 10:09:53 +00:00
|
|
|
int pt_flags;
|
|
|
|
struct selinfo pt_selr, pt_selw;
|
|
|
|
u_char pt_send;
|
|
|
|
u_char pt_ucntl;
|
2004-06-04 06:50:35 +00:00
|
|
|
struct tty *pt_tty;
|
2004-06-16 09:47:26 +00:00
|
|
|
struct cdev *devs, *devc;
|
2000-02-09 03:32:11 +00:00
|
|
|
struct prison *pt_prison;
|
1999-08-08 19:28:59 +00:00
|
|
|
};
|
1994-05-24 10:09:53 +00:00
|
|
|
|
|
|
|
#define PF_PKT 0x08 /* packet mode */
|
|
|
|
#define PF_STOPPED 0x10 /* user told stopped */
|
|
|
|
#define PF_NOSTOP 0x40
|
|
|
|
#define PF_UCNTL 0x80 /* user control mode */
|
|
|
|
|
2004-06-09 09:09:54 +00:00
|
|
|
#define TSA_PTC_READ(tp) ((void *)&(tp)->t_outq.c_cf)
|
|
|
|
#define TSA_PTC_WRITE(tp) ((void *)&(tp)->t_rawq.c_cl)
|
|
|
|
#define TSA_PTS_READ(tp) ((void *)&(tp)->t_canq)
|
|
|
|
|
2001-05-25 13:23:42 +00:00
|
|
|
static char *names = "pqrsPQRS";
|
1994-05-24 10:09:53 +00:00
|
|
|
/*
|
1999-08-08 19:28:59 +00:00
|
|
|
* This function creates and initializes a pts/ptc pair
|
|
|
|
*
|
|
|
|
* pts == /dev/tty[pqrsPQRS][0123456789abcdefghijklmnopqrstuv]
|
|
|
|
* ptc == /dev/pty[pqrsPQRS][0123456789abcdefghijklmnopqrstuv]
|
1994-05-24 10:09:53 +00:00
|
|
|
*
|
2003-03-02 15:56:49 +00:00
|
|
|
* XXX: define and add mapping of upper minor bits to allow more
|
1999-08-08 19:28:59 +00:00
|
|
|
* than 256 ptys.
|
1994-05-24 10:09:53 +00:00
|
|
|
*/
|
2004-06-16 09:47:26 +00:00
|
|
|
static struct cdev *
|
When devfs cloning takes place, provide access to the credential of the
process that caused the clone event to take place for the device driver
creating the device. This allows cloned device drivers to adapt the
device node based on security aspects of the process, such as the uid,
gid, and MAC label.
- Add a cred reference to struct cdev, so that when a device node is
instantiated as a vnode, the cloning credential can be exposed to
MAC.
- Add make_dev_cred(), a version of make_dev() that additionally
accepts the credential to stick in the struct cdev. Implement it and
make_dev() in terms of a back-end make_dev_credv().
- Add a new event handler, dev_clone_cred, which can be registered to
receive the credential instead of dev_clone, if desired.
- Modify the MAC entry point mac_create_devfs_device() to accept an
optional credential pointer (may be NULL), so that MAC policies can
inspect and act on the label or other elements of the credential
when initializing the skeleton device protections.
- Modify tty_pty.c to register clone_dev_cred and invoke make_dev_cred(),
so that the pty clone credential is exposed to the MAC Framework.
While currently primarily focussed on MAC policies, this change is also
a prerequisite for changes to allow ptys to be instantiated with the UID
of the process looking up the pty. This requires further changes to the
pty driver -- in particular, to immediately recycle pty nodes on last
close so that the credential-related state can be recreated on next
lookup.
Submitted by: Andrew Reisse <andrew.reisse@sparta.com>
Obtained from: TrustedBSD Project
Sponsored by: SPAWAR, SPARTA
MFC after: 1 week
MFC note: Merge to 6.x, but not 5.x for ABI reasons
2005-07-14 10:22:09 +00:00
|
|
|
ptyinit(struct cdev *devc, struct thread *td)
|
1994-05-24 10:09:53 +00:00
|
|
|
{
|
2004-06-16 09:47:26 +00:00
|
|
|
struct cdev *devs;
|
2004-06-09 10:21:53 +00:00
|
|
|
struct ptsc *pt;
|
2001-05-25 13:23:42 +00:00
|
|
|
int n;
|
1999-08-08 19:28:59 +00:00
|
|
|
|
2001-05-25 13:23:42 +00:00
|
|
|
n = minor(devc);
|
1999-08-08 19:28:59 +00:00
|
|
|
/* For now we only map the lower 8 bits of the minor */
|
|
|
|
if (n & ~0xff)
|
2004-06-17 17:16:53 +00:00
|
|
|
return (NULL);
|
1999-08-08 19:28:59 +00:00
|
|
|
|
2001-06-18 09:22:30 +00:00
|
|
|
devc->si_flags &= ~SI_CHEAPCLONE;
|
|
|
|
|
2003-02-19 05:47:46 +00:00
|
|
|
pt = malloc(sizeof(*pt), M_PTY, M_WAITOK | M_ZERO);
|
When devfs cloning takes place, provide access to the credential of the
process that caused the clone event to take place for the device driver
creating the device. This allows cloned device drivers to adapt the
device node based on security aspects of the process, such as the uid,
gid, and MAC label.
- Add a cred reference to struct cdev, so that when a device node is
instantiated as a vnode, the cloning credential can be exposed to
MAC.
- Add make_dev_cred(), a version of make_dev() that additionally
accepts the credential to stick in the struct cdev. Implement it and
make_dev() in terms of a back-end make_dev_credv().
- Add a new event handler, dev_clone_cred, which can be registered to
receive the credential instead of dev_clone, if desired.
- Modify the MAC entry point mac_create_devfs_device() to accept an
optional credential pointer (may be NULL), so that MAC policies can
inspect and act on the label or other elements of the credential
when initializing the skeleton device protections.
- Modify tty_pty.c to register clone_dev_cred and invoke make_dev_cred(),
so that the pty clone credential is exposed to the MAC Framework.
While currently primarily focussed on MAC policies, this change is also
a prerequisite for changes to allow ptys to be instantiated with the UID
of the process looking up the pty. This requires further changes to the
pty driver -- in particular, to immediately recycle pty nodes on last
close so that the credential-related state can be recreated on next
lookup.
Submitted by: Andrew Reisse <andrew.reisse@sparta.com>
Obtained from: TrustedBSD Project
Sponsored by: SPAWAR, SPARTA
MFC after: 1 week
MFC note: Merge to 6.x, but not 5.x for ABI reasons
2005-07-14 10:22:09 +00:00
|
|
|
pt->devs = devs = make_dev_cred(&pts_cdevsw, n, td->td_ucred,
|
2000-09-19 10:28:44 +00:00
|
|
|
UID_ROOT, GID_WHEEL, 0666, "tty%c%r", names[n / 32], n % 32);
|
2001-05-25 13:23:42 +00:00
|
|
|
pt->devc = devc;
|
1999-08-08 19:28:59 +00:00
|
|
|
|
2004-06-04 06:50:35 +00:00
|
|
|
pt->pt_tty = ttymalloc(pt->pt_tty);
|
2004-09-16 12:07:25 +00:00
|
|
|
pt->pt_tty->t_sc = pt;
|
1999-08-08 19:28:59 +00:00
|
|
|
devs->si_drv1 = devc->si_drv1 = pt;
|
2004-06-04 06:50:35 +00:00
|
|
|
devs->si_tty = devc->si_tty = pt->pt_tty;
|
|
|
|
pt->pt_tty->t_dev = devs;
|
2000-08-20 21:34:39 +00:00
|
|
|
return (devc);
|
1994-05-24 10:09:53 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
/*ARGSUSED*/
|
1995-12-08 11:19:42 +00:00
|
|
|
static int
|
2004-06-16 09:47:26 +00:00
|
|
|
ptsopen(struct cdev *dev, int flag, int devtype, struct thread *td)
|
1994-05-24 10:09:53 +00:00
|
|
|
{
|
2003-03-02 15:56:49 +00:00
|
|
|
struct tty *tp;
|
1994-05-24 10:09:53 +00:00
|
|
|
int error;
|
2004-06-09 10:21:53 +00:00
|
|
|
struct ptsc *pt;
|
1994-05-24 10:09:53 +00:00
|
|
|
|
1999-08-08 19:28:59 +00:00
|
|
|
if (!dev->si_drv1)
|
2003-03-02 15:56:49 +00:00
|
|
|
return(ENXIO);
|
2004-06-09 10:21:53 +00:00
|
|
|
pt = dev->si_drv1;
|
1999-08-30 10:35:37 +00:00
|
|
|
tp = dev->si_tty;
|
1994-05-24 10:09:53 +00:00
|
|
|
if ((tp->t_state & TS_ISOPEN) == 0) {
|
2004-10-18 21:51:27 +00:00
|
|
|
ttyinitmode(tp, 1, 0);
|
2004-02-15 00:43:22 +00:00
|
|
|
} else if (tp->t_state & TS_XCLUDE && suser(td))
|
1994-05-24 10:09:53 +00:00
|
|
|
return (EBUSY);
|
2004-06-09 10:21:53 +00:00
|
|
|
else if (pt->pt_prison != td->td_ucred->cr_prison)
|
2000-02-09 03:32:11 +00:00
|
|
|
return (EBUSY);
|
1994-05-24 10:09:53 +00:00
|
|
|
if (tp->t_oproc) /* Ctrlr still around. */
|
2004-06-04 16:02:56 +00:00
|
|
|
(void)ttyld_modem(tp, 1);
|
1994-05-24 10:09:53 +00:00
|
|
|
while ((tp->t_state & TS_CARR_ON) == 0) {
|
|
|
|
if (flag&FNONBLOCK)
|
|
|
|
break;
|
1995-07-22 16:45:22 +00:00
|
|
|
error = ttysleep(tp, TSA_CARR_ON(tp), TTIPRI | PCATCH,
|
1995-07-21 20:57:15 +00:00
|
|
|
"ptsopn", 0);
|
1994-10-02 17:35:40 +00:00
|
|
|
if (error)
|
1994-05-24 10:09:53 +00:00
|
|
|
return (error);
|
|
|
|
}
|
2004-06-04 16:02:56 +00:00
|
|
|
error = ttyld_open(tp, dev);
|
1995-04-09 22:28:24 +00:00
|
|
|
if (error == 0)
|
|
|
|
ptcwakeup(tp, FREAD|FWRITE);
|
1994-05-24 10:09:53 +00:00
|
|
|
return (error);
|
|
|
|
}
|
|
|
|
|
1995-12-08 11:19:42 +00:00
|
|
|
static int
|
2004-06-16 09:47:26 +00:00
|
|
|
ptsclose(struct cdev *dev, int flag, int mode, struct thread *td)
|
1994-05-24 10:09:53 +00:00
|
|
|
{
|
2003-03-02 15:56:49 +00:00
|
|
|
struct tty *tp;
|
1994-05-24 10:09:53 +00:00
|
|
|
int err;
|
|
|
|
|
1999-08-30 10:35:37 +00:00
|
|
|
tp = dev->si_tty;
|
2004-06-04 16:02:56 +00:00
|
|
|
err = ttyld_close(tp, flag);
|
2004-07-15 20:47:41 +00:00
|
|
|
(void) tty_close(tp);
|
1994-05-24 10:09:53 +00:00
|
|
|
return (err);
|
|
|
|
}
|
|
|
|
|
1995-12-08 11:19:42 +00:00
|
|
|
static int
|
2004-06-16 09:47:26 +00:00
|
|
|
ptsread(struct cdev *dev, struct uio *uio, int flag)
|
1994-05-24 10:09:53 +00:00
|
|
|
{
|
2003-03-02 15:56:49 +00:00
|
|
|
struct tty *tp = dev->si_tty;
|
1994-05-24 10:09:53 +00:00
|
|
|
int error = 0;
|
|
|
|
|
2004-06-25 21:54:49 +00:00
|
|
|
if (tp->t_oproc)
|
|
|
|
error = ttyld_read(tp, uio, flag);
|
1994-05-24 10:09:53 +00:00
|
|
|
ptcwakeup(tp, FWRITE);
|
|
|
|
return (error);
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Write to pseudo-tty.
|
|
|
|
* Wakeups of controlling tty will happen
|
|
|
|
* indirectly, when tty driver calls ptsstart.
|
|
|
|
*/
|
1995-12-08 11:19:42 +00:00
|
|
|
static int
|
2004-06-16 09:47:26 +00:00
|
|
|
ptswrite(struct cdev *dev, struct uio *uio, int flag)
|
1994-05-24 10:09:53 +00:00
|
|
|
{
|
2003-03-02 15:56:49 +00:00
|
|
|
struct tty *tp;
|
1994-05-24 10:09:53 +00:00
|
|
|
|
1999-08-30 10:35:37 +00:00
|
|
|
tp = dev->si_tty;
|
1994-05-24 10:09:53 +00:00
|
|
|
if (tp->t_oproc == 0)
|
|
|
|
return (EIO);
|
2004-06-04 16:02:56 +00:00
|
|
|
return (ttyld_write(tp, uio, flag));
|
1994-05-24 10:09:53 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Start output on pseudo-tty.
|
|
|
|
* Wake up process selecting or sleeping for input from controlling tty.
|
|
|
|
*/
|
1995-12-14 08:32:45 +00:00
|
|
|
static void
|
2004-06-09 10:16:14 +00:00
|
|
|
ptsstart(struct tty *tp)
|
1994-05-24 10:09:53 +00:00
|
|
|
{
|
2004-09-16 12:07:25 +00:00
|
|
|
struct ptsc *pt = tp->t_sc;
|
1994-05-24 10:09:53 +00:00
|
|
|
|
|
|
|
if (tp->t_state & TS_TTSTOP)
|
|
|
|
return;
|
2004-06-09 10:21:53 +00:00
|
|
|
if (pt->pt_flags & PF_STOPPED) {
|
|
|
|
pt->pt_flags &= ~PF_STOPPED;
|
|
|
|
pt->pt_send = TIOCPKT_START;
|
1994-05-24 10:09:53 +00:00
|
|
|
}
|
|
|
|
ptcwakeup(tp, FREAD);
|
|
|
|
}
|
|
|
|
|
1995-12-14 08:32:45 +00:00
|
|
|
static void
|
2004-06-09 10:16:14 +00:00
|
|
|
ptcwakeup(struct tty *tp, int flag)
|
1994-05-24 10:09:53 +00:00
|
|
|
{
|
2004-09-16 12:07:25 +00:00
|
|
|
struct ptsc *pt = tp->t_sc;
|
1994-05-24 10:09:53 +00:00
|
|
|
|
|
|
|
if (flag & FREAD) {
|
2004-06-09 10:21:53 +00:00
|
|
|
selwakeuppri(&pt->pt_selr, TTIPRI);
|
1995-07-22 16:45:22 +00:00
|
|
|
wakeup(TSA_PTC_READ(tp));
|
1994-05-24 10:09:53 +00:00
|
|
|
}
|
|
|
|
if (flag & FWRITE) {
|
2004-06-09 10:21:53 +00:00
|
|
|
selwakeuppri(&pt->pt_selw, TTOPRI);
|
1995-07-22 16:45:22 +00:00
|
|
|
wakeup(TSA_PTC_WRITE(tp));
|
1994-05-24 10:09:53 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
1995-12-08 11:19:42 +00:00
|
|
|
static int
|
2004-06-16 09:47:26 +00:00
|
|
|
ptcopen(struct cdev *dev, int flag, int devtype, struct thread *td)
|
1994-05-24 10:09:53 +00:00
|
|
|
{
|
2003-03-02 15:56:49 +00:00
|
|
|
struct tty *tp;
|
2004-06-09 10:21:53 +00:00
|
|
|
struct ptsc *pt;
|
1994-05-24 10:09:53 +00:00
|
|
|
|
1999-08-08 19:28:59 +00:00
|
|
|
if (!dev->si_drv1)
|
When devfs cloning takes place, provide access to the credential of the
process that caused the clone event to take place for the device driver
creating the device. This allows cloned device drivers to adapt the
device node based on security aspects of the process, such as the uid,
gid, and MAC label.
- Add a cred reference to struct cdev, so that when a device node is
instantiated as a vnode, the cloning credential can be exposed to
MAC.
- Add make_dev_cred(), a version of make_dev() that additionally
accepts the credential to stick in the struct cdev. Implement it and
make_dev() in terms of a back-end make_dev_credv().
- Add a new event handler, dev_clone_cred, which can be registered to
receive the credential instead of dev_clone, if desired.
- Modify the MAC entry point mac_create_devfs_device() to accept an
optional credential pointer (may be NULL), so that MAC policies can
inspect and act on the label or other elements of the credential
when initializing the skeleton device protections.
- Modify tty_pty.c to register clone_dev_cred and invoke make_dev_cred(),
so that the pty clone credential is exposed to the MAC Framework.
While currently primarily focussed on MAC policies, this change is also
a prerequisite for changes to allow ptys to be instantiated with the UID
of the process looking up the pty. This requires further changes to the
pty driver -- in particular, to immediately recycle pty nodes on last
close so that the credential-related state can be recreated on next
lookup.
Submitted by: Andrew Reisse <andrew.reisse@sparta.com>
Obtained from: TrustedBSD Project
Sponsored by: SPAWAR, SPARTA
MFC after: 1 week
MFC note: Merge to 6.x, but not 5.x for ABI reasons
2005-07-14 10:22:09 +00:00
|
|
|
ptyinit(dev, td);
|
1999-08-08 19:28:59 +00:00
|
|
|
if (!dev->si_drv1)
|
2003-03-02 15:56:49 +00:00
|
|
|
return(ENXIO);
|
1999-08-30 10:35:37 +00:00
|
|
|
tp = dev->si_tty;
|
1994-05-24 10:09:53 +00:00
|
|
|
if (tp->t_oproc)
|
|
|
|
return (EIO);
|
2000-05-01 10:24:21 +00:00
|
|
|
tp->t_timeout = -1;
|
1994-05-24 10:09:53 +00:00
|
|
|
tp->t_oproc = ptsstart;
|
1999-09-25 16:21:39 +00:00
|
|
|
tp->t_stop = ptsstop;
|
2004-06-04 16:02:56 +00:00
|
|
|
(void)ttyld_modem(tp, 1);
|
1994-05-24 10:09:53 +00:00
|
|
|
tp->t_lflag &= ~EXTPROC;
|
2004-06-09 10:21:53 +00:00
|
|
|
pt = dev->si_drv1;
|
|
|
|
pt->pt_prison = td->td_ucred->cr_prison;
|
|
|
|
pt->pt_flags = 0;
|
|
|
|
pt->pt_send = 0;
|
|
|
|
pt->pt_ucntl = 0;
|
1994-05-24 10:09:53 +00:00
|
|
|
return (0);
|
|
|
|
}
|
|
|
|
|
1995-12-08 11:19:42 +00:00
|
|
|
static int
|
2004-06-16 09:47:26 +00:00
|
|
|
ptcclose(struct cdev *dev, int flags, int fmt, struct thread *td)
|
1994-05-24 10:09:53 +00:00
|
|
|
{
|
2003-03-02 15:56:49 +00:00
|
|
|
struct tty *tp;
|
1994-05-24 10:09:53 +00:00
|
|
|
|
1999-08-30 10:35:37 +00:00
|
|
|
tp = dev->si_tty;
|
2004-06-04 16:02:56 +00:00
|
|
|
(void)ttyld_modem(tp, 0);
|
1995-07-31 21:02:00 +00:00
|
|
|
|
|
|
|
/*
|
|
|
|
* XXX MDMBUF makes no sense for ptys but would inhibit the above
|
|
|
|
* l_modem(). CLOCAL makes sense but isn't supported. Special
|
|
|
|
* l_modem()s that ignore carrier drop make no sense for ptys but
|
|
|
|
* may be in use because other parts of the line discipline make
|
|
|
|
* sense for ptys. Recover by doing everything that a normal
|
|
|
|
* ttymodem() would have done except for sending a SIGHUP.
|
|
|
|
*/
|
1995-08-02 02:55:47 +00:00
|
|
|
if (tp->t_state & TS_ISOPEN) {
|
|
|
|
tp->t_state &= ~(TS_CARR_ON | TS_CONNECTED);
|
|
|
|
tp->t_state |= TS_ZOMBIE;
|
|
|
|
ttyflush(tp, FREAD | FWRITE);
|
|
|
|
}
|
1995-07-31 21:02:00 +00:00
|
|
|
|
1994-05-24 10:09:53 +00:00
|
|
|
tp->t_oproc = 0; /* mark closed */
|
|
|
|
return (0);
|
|
|
|
}
|
|
|
|
|
1995-12-08 11:19:42 +00:00
|
|
|
static int
|
2004-06-16 09:47:26 +00:00
|
|
|
ptcread(struct cdev *dev, struct uio *uio, int flag)
|
1994-05-24 10:09:53 +00:00
|
|
|
{
|
2003-03-02 15:56:49 +00:00
|
|
|
struct tty *tp = dev->si_tty;
|
2004-06-09 10:21:53 +00:00
|
|
|
struct ptsc *pt = dev->si_drv1;
|
1994-05-24 10:09:53 +00:00
|
|
|
char buf[BUFSIZ];
|
|
|
|
int error = 0, cc;
|
|
|
|
|
|
|
|
/*
|
|
|
|
* We want to block until the slave
|
|
|
|
* is open, and there's something to read;
|
|
|
|
* but if we lost the slave or we're NBIO,
|
|
|
|
* then return the appropriate error instead.
|
|
|
|
*/
|
|
|
|
for (;;) {
|
|
|
|
if (tp->t_state&TS_ISOPEN) {
|
2004-06-09 10:21:53 +00:00
|
|
|
if (pt->pt_flags&PF_PKT && pt->pt_send) {
|
|
|
|
error = ureadc((int)pt->pt_send, uio);
|
1994-05-24 10:09:53 +00:00
|
|
|
if (error)
|
|
|
|
return (error);
|
2004-06-09 10:21:53 +00:00
|
|
|
if (pt->pt_send & TIOCPKT_IOCTL) {
|
1994-05-24 10:09:53 +00:00
|
|
|
cc = min(uio->uio_resid,
|
|
|
|
sizeof(tp->t_termios));
|
2003-03-02 15:50:23 +00:00
|
|
|
uiomove(&tp->t_termios, cc, uio);
|
1994-05-24 10:09:53 +00:00
|
|
|
}
|
2004-06-09 10:21:53 +00:00
|
|
|
pt->pt_send = 0;
|
1994-05-24 10:09:53 +00:00
|
|
|
return (0);
|
|
|
|
}
|
2004-06-09 10:21:53 +00:00
|
|
|
if (pt->pt_flags&PF_UCNTL && pt->pt_ucntl) {
|
|
|
|
error = ureadc((int)pt->pt_ucntl, uio);
|
1994-05-24 10:09:53 +00:00
|
|
|
if (error)
|
|
|
|
return (error);
|
2004-06-09 10:21:53 +00:00
|
|
|
pt->pt_ucntl = 0;
|
1994-05-24 10:09:53 +00:00
|
|
|
return (0);
|
|
|
|
}
|
|
|
|
if (tp->t_outq.c_cc && (tp->t_state&TS_TTSTOP) == 0)
|
|
|
|
break;
|
|
|
|
}
|
1995-07-31 21:02:00 +00:00
|
|
|
if ((tp->t_state & TS_CONNECTED) == 0)
|
1994-05-24 10:09:53 +00:00
|
|
|
return (0); /* EOF */
|
2004-12-22 17:37:14 +00:00
|
|
|
if (flag & O_NONBLOCK)
|
1994-05-24 10:09:53 +00:00
|
|
|
return (EWOULDBLOCK);
|
1995-07-22 16:45:22 +00:00
|
|
|
error = tsleep(TSA_PTC_READ(tp), TTIPRI | PCATCH, "ptcin", 0);
|
1994-10-02 17:35:40 +00:00
|
|
|
if (error)
|
1994-05-24 10:09:53 +00:00
|
|
|
return (error);
|
|
|
|
}
|
2004-06-09 10:21:53 +00:00
|
|
|
if (pt->pt_flags & (PF_PKT|PF_UCNTL))
|
1994-05-24 10:09:53 +00:00
|
|
|
error = ureadc(0, uio);
|
|
|
|
while (uio->uio_resid > 0 && error == 0) {
|
|
|
|
cc = q_to_b(&tp->t_outq, buf, min(uio->uio_resid, BUFSIZ));
|
|
|
|
if (cc <= 0)
|
|
|
|
break;
|
|
|
|
error = uiomove(buf, cc, uio);
|
|
|
|
}
|
1995-07-22 01:30:45 +00:00
|
|
|
ttwwakeup(tp);
|
1994-05-24 10:09:53 +00:00
|
|
|
return (error);
|
|
|
|
}
|
|
|
|
|
1995-12-08 11:19:42 +00:00
|
|
|
static void
|
2004-06-09 10:16:14 +00:00
|
|
|
ptsstop(struct tty *tp, int flush)
|
1994-05-24 10:09:53 +00:00
|
|
|
{
|
2004-09-16 12:07:25 +00:00
|
|
|
struct ptsc *pt = tp->t_sc;
|
1994-05-24 10:09:53 +00:00
|
|
|
int flag;
|
|
|
|
|
|
|
|
/* note: FLUSHREAD and FLUSHWRITE already ok */
|
|
|
|
if (flush == 0) {
|
|
|
|
flush = TIOCPKT_STOP;
|
2004-06-09 10:21:53 +00:00
|
|
|
pt->pt_flags |= PF_STOPPED;
|
1994-05-24 10:09:53 +00:00
|
|
|
} else
|
2004-06-09 10:21:53 +00:00
|
|
|
pt->pt_flags &= ~PF_STOPPED;
|
|
|
|
pt->pt_send |= flush;
|
1994-05-24 10:09:53 +00:00
|
|
|
/* change of perspective */
|
|
|
|
flag = 0;
|
|
|
|
if (flush & FREAD)
|
|
|
|
flag |= FWRITE;
|
|
|
|
if (flush & FWRITE)
|
|
|
|
flag |= FREAD;
|
|
|
|
ptcwakeup(tp, flag);
|
|
|
|
}
|
|
|
|
|
1995-12-08 11:19:42 +00:00
|
|
|
static int
|
2004-06-16 09:47:26 +00:00
|
|
|
ptcpoll(struct cdev *dev, int events, struct thread *td)
|
1994-05-24 10:09:53 +00:00
|
|
|
{
|
2003-03-02 15:56:49 +00:00
|
|
|
struct tty *tp = dev->si_tty;
|
2004-06-09 10:21:53 +00:00
|
|
|
struct ptsc *pt = dev->si_drv1;
|
1997-09-14 02:40:46 +00:00
|
|
|
int revents = 0;
|
1994-05-24 10:09:53 +00:00
|
|
|
int s;
|
|
|
|
|
1995-07-31 21:02:00 +00:00
|
|
|
if ((tp->t_state & TS_CONNECTED) == 0)
|
2003-09-27 12:44:06 +00:00
|
|
|
return (events &
|
|
|
|
(POLLHUP | POLLIN | POLLRDNORM | POLLOUT | POLLWRNORM));
|
1994-05-24 10:09:53 +00:00
|
|
|
|
1997-09-14 02:40:46 +00:00
|
|
|
/*
|
|
|
|
* Need to block timeouts (ttrstart).
|
|
|
|
*/
|
|
|
|
s = spltty();
|
|
|
|
|
|
|
|
if (events & (POLLIN | POLLRDNORM))
|
|
|
|
if ((tp->t_state & TS_ISOPEN) &&
|
|
|
|
((tp->t_outq.c_cc && (tp->t_state & TS_TTSTOP) == 0) ||
|
2004-06-09 10:21:53 +00:00
|
|
|
((pt->pt_flags & PF_PKT) && pt->pt_send) ||
|
|
|
|
((pt->pt_flags & PF_UCNTL) && pt->pt_ucntl)))
|
1997-09-14 02:40:46 +00:00
|
|
|
revents |= events & (POLLIN | POLLRDNORM);
|
|
|
|
|
|
|
|
if (events & (POLLOUT | POLLWRNORM))
|
|
|
|
if (tp->t_state & TS_ISOPEN &&
|
2004-06-25 21:54:49 +00:00
|
|
|
(((tp->t_rawq.c_cc + tp->t_canq.c_cc < TTYHOG - 2) ||
|
2002-02-18 06:07:11 +00:00
|
|
|
(tp->t_canq.c_cc == 0 && (tp->t_lflag & ICANON)))))
|
1997-09-14 02:40:46 +00:00
|
|
|
revents |= events & (POLLOUT | POLLWRNORM);
|
|
|
|
|
|
|
|
if (events & POLLHUP)
|
|
|
|
if ((tp->t_state & TS_CARR_ON) == 0)
|
|
|
|
revents |= POLLHUP;
|
|
|
|
|
|
|
|
if (revents == 0) {
|
|
|
|
if (events & (POLLIN | POLLRDNORM))
|
2004-06-09 10:21:53 +00:00
|
|
|
selrecord(td, &pt->pt_selr);
|
1997-09-14 02:40:46 +00:00
|
|
|
|
2003-03-02 15:56:49 +00:00
|
|
|
if (events & (POLLOUT | POLLWRNORM))
|
2004-06-09 10:21:53 +00:00
|
|
|
selrecord(td, &pt->pt_selw);
|
1994-05-24 10:09:53 +00:00
|
|
|
}
|
1997-09-14 02:40:46 +00:00
|
|
|
splx(s);
|
|
|
|
|
|
|
|
return (revents);
|
1994-05-24 10:09:53 +00:00
|
|
|
}
|
|
|
|
|
1995-12-08 11:19:42 +00:00
|
|
|
static int
|
2004-06-16 09:47:26 +00:00
|
|
|
ptcwrite(struct cdev *dev, struct uio *uio, int flag)
|
1994-05-24 10:09:53 +00:00
|
|
|
{
|
2003-03-02 15:56:49 +00:00
|
|
|
struct tty *tp = dev->si_tty;
|
|
|
|
u_char *cp = 0;
|
|
|
|
int cc = 0;
|
1994-05-24 10:09:53 +00:00
|
|
|
u_char locbuf[BUFSIZ];
|
|
|
|
int cnt = 0;
|
|
|
|
int error = 0;
|
|
|
|
|
|
|
|
again:
|
|
|
|
if ((tp->t_state&TS_ISOPEN) == 0)
|
|
|
|
goto block;
|
1995-10-25 18:23:58 +00:00
|
|
|
while (uio->uio_resid > 0 || cc > 0) {
|
1994-05-24 10:09:53 +00:00
|
|
|
if (cc == 0) {
|
|
|
|
cc = min(uio->uio_resid, BUFSIZ);
|
|
|
|
cp = locbuf;
|
2003-03-02 15:50:23 +00:00
|
|
|
error = uiomove(cp, cc, uio);
|
1994-05-24 10:09:53 +00:00
|
|
|
if (error)
|
|
|
|
return (error);
|
|
|
|
/* check again for safety */
|
1995-10-25 18:23:58 +00:00
|
|
|
if ((tp->t_state & TS_ISOPEN) == 0) {
|
|
|
|
/* adjust for data copied in but not written */
|
|
|
|
uio->uio_resid += cc;
|
1994-05-24 10:09:53 +00:00
|
|
|
return (EIO);
|
1995-10-25 18:23:58 +00:00
|
|
|
}
|
1994-05-24 10:09:53 +00:00
|
|
|
}
|
|
|
|
while (cc > 0) {
|
|
|
|
if ((tp->t_rawq.c_cc + tp->t_canq.c_cc) >= TTYHOG - 2 &&
|
2002-02-18 06:07:11 +00:00
|
|
|
(tp->t_canq.c_cc > 0 || !(tp->t_lflag&ICANON))) {
|
1995-07-31 21:02:00 +00:00
|
|
|
wakeup(TSA_HUP_OR_INPUT(tp));
|
1994-05-24 10:09:53 +00:00
|
|
|
goto block;
|
|
|
|
}
|
2004-06-04 16:02:56 +00:00
|
|
|
ttyld_rint(tp, *cp++);
|
1994-05-24 10:09:53 +00:00
|
|
|
cnt++;
|
|
|
|
cc--;
|
|
|
|
}
|
|
|
|
cc = 0;
|
|
|
|
}
|
|
|
|
return (0);
|
|
|
|
block:
|
|
|
|
/*
|
|
|
|
* Come here to wait for slave to open, for space
|
1996-04-11 18:43:37 +00:00
|
|
|
* in outq, or space in rawq, or an empty canq.
|
1994-05-24 10:09:53 +00:00
|
|
|
*/
|
1995-10-25 18:23:58 +00:00
|
|
|
if ((tp->t_state & TS_CONNECTED) == 0) {
|
|
|
|
/* adjust for data copied in but not written */
|
|
|
|
uio->uio_resid += cc;
|
1994-05-24 10:09:53 +00:00
|
|
|
return (EIO);
|
1995-10-25 18:23:58 +00:00
|
|
|
}
|
2004-12-22 17:37:14 +00:00
|
|
|
if (flag & O_NONBLOCK) {
|
1994-05-24 10:09:53 +00:00
|
|
|
/* adjust for data copied in but not written */
|
|
|
|
uio->uio_resid += cc;
|
|
|
|
if (cnt == 0)
|
|
|
|
return (EWOULDBLOCK);
|
|
|
|
return (0);
|
|
|
|
}
|
1995-07-22 16:45:22 +00:00
|
|
|
error = tsleep(TSA_PTC_WRITE(tp), TTOPRI | PCATCH, "ptcout", 0);
|
1994-10-02 17:35:40 +00:00
|
|
|
if (error) {
|
1994-05-24 10:09:53 +00:00
|
|
|
/* adjust for data copied in but not written */
|
|
|
|
uio->uio_resid += cc;
|
|
|
|
return (error);
|
|
|
|
}
|
|
|
|
goto again;
|
|
|
|
}
|
|
|
|
|
|
|
|
/*ARGSUSED*/
|
1995-12-08 11:19:42 +00:00
|
|
|
static int
|
2004-09-23 16:13:46 +00:00
|
|
|
ptcioctl(struct cdev *dev, u_long cmd, caddr_t data, int flag, struct thread *td)
|
1994-05-24 10:09:53 +00:00
|
|
|
{
|
2003-03-02 15:56:49 +00:00
|
|
|
struct tty *tp = dev->si_tty;
|
2004-06-09 10:21:53 +00:00
|
|
|
struct ptsc *pt = dev->si_drv1;
|
1994-05-24 10:09:53 +00:00
|
|
|
|
2004-09-23 16:13:46 +00:00
|
|
|
switch (cmd) {
|
1999-05-14 20:44:20 +00:00
|
|
|
|
2004-09-23 16:13:46 +00:00
|
|
|
case TIOCGPGRP:
|
1999-05-14 20:44:20 +00:00
|
|
|
/*
|
2004-09-23 16:13:46 +00:00
|
|
|
* We avoid calling ttioctl on the controller since,
|
|
|
|
* in that case, tp must be the controlling terminal.
|
1999-05-14 20:44:20 +00:00
|
|
|
*/
|
2004-09-23 16:13:46 +00:00
|
|
|
*(int *)data = tp->t_pgrp ? tp->t_pgrp->pg_id : 0;
|
|
|
|
return (0);
|
|
|
|
|
|
|
|
case TIOCPKT:
|
|
|
|
if (*(int *)data) {
|
|
|
|
if (pt->pt_flags & PF_UCNTL)
|
|
|
|
return (EINVAL);
|
|
|
|
pt->pt_flags |= PF_PKT;
|
|
|
|
} else
|
|
|
|
pt->pt_flags &= ~PF_PKT;
|
|
|
|
return (0);
|
|
|
|
|
|
|
|
case TIOCUCNTL:
|
|
|
|
if (*(int *)data) {
|
|
|
|
if (pt->pt_flags & PF_PKT)
|
|
|
|
return (EINVAL);
|
|
|
|
pt->pt_flags |= PF_UCNTL;
|
|
|
|
} else
|
|
|
|
pt->pt_flags &= ~PF_UCNTL;
|
|
|
|
return (0);
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* The rest of the ioctls shouldn't be called until
|
|
|
|
* the slave is open.
|
|
|
|
*/
|
|
|
|
if ((tp->t_state & TS_ISOPEN) == 0)
|
|
|
|
return (EAGAIN);
|
1994-05-24 10:09:53 +00:00
|
|
|
|
2004-09-23 16:13:46 +00:00
|
|
|
switch (cmd) {
|
2004-06-21 22:57:16 +00:00
|
|
|
#ifndef BURN_BRIDGES
|
1994-05-24 10:09:53 +00:00
|
|
|
#ifdef COMPAT_43
|
2004-09-23 16:13:46 +00:00
|
|
|
case TIOCSETP:
|
|
|
|
case TIOCSETN:
|
2004-06-21 22:57:16 +00:00
|
|
|
#endif
|
1994-05-24 10:09:53 +00:00
|
|
|
#endif
|
2004-09-23 16:13:46 +00:00
|
|
|
case TIOCSETD:
|
|
|
|
case TIOCSETA:
|
|
|
|
case TIOCSETAW:
|
|
|
|
case TIOCSETAF:
|
|
|
|
/*
|
|
|
|
* IF CONTROLLER STTY THEN MUST FLUSH TO PREVENT A HANG.
|
|
|
|
* ttywflush(tp) will hang if there are characters in
|
|
|
|
* the outq.
|
|
|
|
*/
|
|
|
|
ndflush(&tp->t_outq, tp->t_outq.c_cc);
|
|
|
|
break;
|
|
|
|
|
|
|
|
case TIOCSIG:
|
|
|
|
if (*(unsigned int *)data >= NSIG ||
|
|
|
|
*(unsigned int *)data == 0)
|
|
|
|
return(EINVAL);
|
|
|
|
if ((tp->t_lflag&NOFLSH) == 0)
|
|
|
|
ttyflush(tp, FREAD|FWRITE);
|
|
|
|
if (tp->t_pgrp != NULL) {
|
|
|
|
PGRP_LOCK(tp->t_pgrp);
|
|
|
|
pgsignal(tp->t_pgrp, *(unsigned int *)data, 1);
|
|
|
|
PGRP_UNLOCK(tp->t_pgrp);
|
1994-05-24 10:09:53 +00:00
|
|
|
}
|
2004-09-23 16:13:46 +00:00
|
|
|
if ((*(unsigned int *)data == SIGINFO) &&
|
|
|
|
((tp->t_lflag&NOKERNINFO) == 0))
|
|
|
|
ttyinfo(tp);
|
|
|
|
return(0);
|
1999-05-14 20:44:20 +00:00
|
|
|
}
|
2004-09-23 16:13:46 +00:00
|
|
|
|
|
|
|
return (ptsioctl(dev, cmd, data, flag, td));
|
|
|
|
}
|
|
|
|
|
|
|
|
/*ARGSUSED*/
|
|
|
|
static int
|
|
|
|
ptsioctl(struct cdev *dev, u_long cmd, caddr_t data, int flag, struct thread *td)
|
|
|
|
{
|
|
|
|
struct tty *tp = dev->si_tty;
|
|
|
|
struct ptsc *pt = dev->si_drv1;
|
|
|
|
u_char *cc = tp->t_cc;
|
|
|
|
int stop, error;
|
|
|
|
|
1999-05-18 14:53:52 +00:00
|
|
|
if (cmd == TIOCEXT) {
|
|
|
|
/*
|
|
|
|
* When the EXTPROC bit is being toggled, we need
|
|
|
|
* to send an TIOCPKT_IOCTL if the packet driver
|
|
|
|
* is turned on.
|
|
|
|
*/
|
|
|
|
if (*(int *)data) {
|
2004-06-09 10:21:53 +00:00
|
|
|
if (pt->pt_flags & PF_PKT) {
|
|
|
|
pt->pt_send |= TIOCPKT_IOCTL;
|
1999-05-18 14:53:52 +00:00
|
|
|
ptcwakeup(tp, FREAD);
|
|
|
|
}
|
|
|
|
tp->t_lflag |= EXTPROC;
|
|
|
|
} else {
|
|
|
|
if ((tp->t_lflag & EXTPROC) &&
|
2004-06-09 10:21:53 +00:00
|
|
|
(pt->pt_flags & PF_PKT)) {
|
|
|
|
pt->pt_send |= TIOCPKT_IOCTL;
|
1999-05-18 14:53:52 +00:00
|
|
|
ptcwakeup(tp, FREAD);
|
|
|
|
}
|
|
|
|
tp->t_lflag &= ~EXTPROC;
|
|
|
|
}
|
|
|
|
return(0);
|
|
|
|
}
|
2004-06-04 06:50:35 +00:00
|
|
|
error = ttyioctl(dev, cmd, data, flag, td);
|
|
|
|
if (error == ENOTTY) {
|
2004-06-09 10:21:53 +00:00
|
|
|
if (pt->pt_flags & PF_UCNTL &&
|
1994-05-24 10:09:53 +00:00
|
|
|
(cmd & ~0xff) == UIOCCMD(0)) {
|
|
|
|
if (cmd & 0xff) {
|
2004-06-09 10:21:53 +00:00
|
|
|
pt->pt_ucntl = (u_char)cmd;
|
1994-05-24 10:09:53 +00:00
|
|
|
ptcwakeup(tp, FREAD);
|
|
|
|
}
|
|
|
|
return (0);
|
|
|
|
}
|
|
|
|
error = ENOTTY;
|
|
|
|
}
|
|
|
|
/*
|
|
|
|
* If external processing and packet mode send ioctl packet.
|
|
|
|
*/
|
2004-06-09 10:21:53 +00:00
|
|
|
if ((tp->t_lflag&EXTPROC) && (pt->pt_flags & PF_PKT)) {
|
1994-05-24 10:09:53 +00:00
|
|
|
switch(cmd) {
|
|
|
|
case TIOCSETA:
|
|
|
|
case TIOCSETAW:
|
|
|
|
case TIOCSETAF:
|
2004-06-21 22:57:16 +00:00
|
|
|
#ifndef BURN_BRIDGES
|
1994-05-24 10:09:53 +00:00
|
|
|
#ifdef COMPAT_43
|
|
|
|
case TIOCSETP:
|
|
|
|
case TIOCSETN:
|
|
|
|
case TIOCSETC:
|
|
|
|
case TIOCSLTC:
|
|
|
|
case TIOCLBIS:
|
|
|
|
case TIOCLBIC:
|
|
|
|
case TIOCLSET:
|
2004-06-21 22:57:16 +00:00
|
|
|
#endif
|
1994-05-24 10:09:53 +00:00
|
|
|
#endif
|
2004-06-09 10:21:53 +00:00
|
|
|
pt->pt_send |= TIOCPKT_IOCTL;
|
1994-05-24 10:09:53 +00:00
|
|
|
ptcwakeup(tp, FREAD);
|
2003-05-31 16:53:16 +00:00
|
|
|
break;
|
1994-05-24 10:09:53 +00:00
|
|
|
default:
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
1995-05-30 08:16:23 +00:00
|
|
|
stop = (tp->t_iflag & IXON) && CCEQ(cc[VSTOP], CTRL('s'))
|
1994-05-24 10:09:53 +00:00
|
|
|
&& CCEQ(cc[VSTART], CTRL('q'));
|
2004-06-09 10:21:53 +00:00
|
|
|
if (pt->pt_flags & PF_NOSTOP) {
|
1994-05-24 10:09:53 +00:00
|
|
|
if (stop) {
|
2004-06-09 10:21:53 +00:00
|
|
|
pt->pt_send &= ~TIOCPKT_NOSTOP;
|
|
|
|
pt->pt_send |= TIOCPKT_DOSTOP;
|
|
|
|
pt->pt_flags &= ~PF_NOSTOP;
|
1994-05-24 10:09:53 +00:00
|
|
|
ptcwakeup(tp, FREAD);
|
|
|
|
}
|
|
|
|
} else {
|
|
|
|
if (!stop) {
|
2004-06-09 10:21:53 +00:00
|
|
|
pt->pt_send &= ~TIOCPKT_DOSTOP;
|
|
|
|
pt->pt_send |= TIOCPKT_NOSTOP;
|
|
|
|
pt->pt_flags |= PF_NOSTOP;
|
1994-05-24 10:09:53 +00:00
|
|
|
ptcwakeup(tp, FREAD);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return (error);
|
|
|
|
}
|
1995-11-29 10:49:16 +00:00
|
|
|
|
2000-08-20 21:34:39 +00:00
|
|
|
static void
|
When devfs cloning takes place, provide access to the credential of the
process that caused the clone event to take place for the device driver
creating the device. This allows cloned device drivers to adapt the
device node based on security aspects of the process, such as the uid,
gid, and MAC label.
- Add a cred reference to struct cdev, so that when a device node is
instantiated as a vnode, the cloning credential can be exposed to
MAC.
- Add make_dev_cred(), a version of make_dev() that additionally
accepts the credential to stick in the struct cdev. Implement it and
make_dev() in terms of a back-end make_dev_credv().
- Add a new event handler, dev_clone_cred, which can be registered to
receive the credential instead of dev_clone, if desired.
- Modify the MAC entry point mac_create_devfs_device() to accept an
optional credential pointer (may be NULL), so that MAC policies can
inspect and act on the label or other elements of the credential
when initializing the skeleton device protections.
- Modify tty_pty.c to register clone_dev_cred and invoke make_dev_cred(),
so that the pty clone credential is exposed to the MAC Framework.
While currently primarily focussed on MAC policies, this change is also
a prerequisite for changes to allow ptys to be instantiated with the UID
of the process looking up the pty. This requires further changes to the
pty driver -- in particular, to immediately recycle pty nodes on last
close so that the credential-related state can be recreated on next
lookup.
Submitted by: Andrew Reisse <andrew.reisse@sparta.com>
Obtained from: TrustedBSD Project
Sponsored by: SPAWAR, SPARTA
MFC after: 1 week
MFC note: Merge to 6.x, but not 5.x for ABI reasons
2005-07-14 10:22:09 +00:00
|
|
|
pty_clone(void *arg, struct ucred *cr, char *name, int namelen,
|
|
|
|
struct cdev **dev)
|
2000-08-20 21:34:39 +00:00
|
|
|
{
|
|
|
|
int u;
|
|
|
|
|
2004-06-17 17:16:53 +00:00
|
|
|
if (*dev != NULL)
|
2000-08-20 21:34:39 +00:00
|
|
|
return;
|
|
|
|
if (bcmp(name, "pty", 3) != 0)
|
|
|
|
return;
|
|
|
|
if (name[5] != '\0')
|
|
|
|
return;
|
|
|
|
switch (name[3]) {
|
|
|
|
case 'p': u = 0; break;
|
|
|
|
case 'q': u = 32; break;
|
|
|
|
case 'r': u = 64; break;
|
|
|
|
case 's': u = 96; break;
|
|
|
|
case 'P': u = 128; break;
|
|
|
|
case 'Q': u = 160; break;
|
|
|
|
case 'R': u = 192; break;
|
|
|
|
case 'S': u = 224; break;
|
|
|
|
default: return;
|
|
|
|
}
|
|
|
|
if (name[4] >= '0' && name[4] <= '9')
|
|
|
|
u += name[4] - '0';
|
|
|
|
else if (name[4] >= 'a' && name[4] <= 'v')
|
|
|
|
u += name[4] - 'a' + 10;
|
|
|
|
else
|
|
|
|
return;
|
When devfs cloning takes place, provide access to the credential of the
process that caused the clone event to take place for the device driver
creating the device. This allows cloned device drivers to adapt the
device node based on security aspects of the process, such as the uid,
gid, and MAC label.
- Add a cred reference to struct cdev, so that when a device node is
instantiated as a vnode, the cloning credential can be exposed to
MAC.
- Add make_dev_cred(), a version of make_dev() that additionally
accepts the credential to stick in the struct cdev. Implement it and
make_dev() in terms of a back-end make_dev_credv().
- Add a new event handler, dev_clone_cred, which can be registered to
receive the credential instead of dev_clone, if desired.
- Modify the MAC entry point mac_create_devfs_device() to accept an
optional credential pointer (may be NULL), so that MAC policies can
inspect and act on the label or other elements of the credential
when initializing the skeleton device protections.
- Modify tty_pty.c to register clone_dev_cred and invoke make_dev_cred(),
so that the pty clone credential is exposed to the MAC Framework.
While currently primarily focussed on MAC policies, this change is also
a prerequisite for changes to allow ptys to be instantiated with the UID
of the process looking up the pty. This requires further changes to the
pty driver -- in particular, to immediately recycle pty nodes on last
close so that the credential-related state can be recreated on next
lookup.
Submitted by: Andrew Reisse <andrew.reisse@sparta.com>
Obtained from: TrustedBSD Project
Sponsored by: SPAWAR, SPARTA
MFC after: 1 week
MFC note: Merge to 6.x, but not 5.x for ABI reasons
2005-07-14 10:22:09 +00:00
|
|
|
*dev = make_dev_cred(&ptc_cdevsw, u, cr,
|
2001-05-25 13:23:42 +00:00
|
|
|
UID_ROOT, GID_WHEEL, 0666, "pty%c%r", names[u / 32], u % 32);
|
2005-03-31 12:19:44 +00:00
|
|
|
dev_ref(*dev);
|
2001-05-25 13:23:42 +00:00
|
|
|
(*dev)->si_flags |= SI_CHEAPCLONE;
|
2000-08-20 21:34:39 +00:00
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
1995-12-08 11:19:42 +00:00
|
|
|
static void
|
2004-06-09 10:16:14 +00:00
|
|
|
ptc_drvinit(void *unused)
|
1995-11-29 10:49:16 +00:00
|
|
|
{
|
2002-12-28 21:39:46 +00:00
|
|
|
|
2005-08-08 19:55:32 +00:00
|
|
|
EVENTHANDLER_REGISTER(dev_clone, pty_clone, 0, 1000);
|
1995-11-29 10:49:16 +00:00
|
|
|
}
|
|
|
|
|
2005-02-27 22:02:03 +00:00
|
|
|
SYSINIT(ptcdev,SI_SUB_DRIVERS,SI_ORDER_MIDDLE,ptc_drvinit,NULL)
|