This source file includes following definitions.
- kd_nosound
- kd_mksound
- vt_ioctl
1
2
3
4
5
6
7
8
9
10 #include <linux/types.h>
11 #include <linux/errno.h>
12 #include <linux/sched.h>
13 #include <linux/tty.h>
14 #include <linux/timer.h>
15 #include <linux/kernel.h>
16 #include <linux/kd.h>
17 #include <linux/vt.h>
18 #include <linux/string.h>
19 #include <linux/malloc.h>
20
21 #include <asm/io.h>
22 #include <asm/segment.h>
23
24 #include "kbd_kern.h"
25 #include "vt_kern.h"
26 #include "diacr.h"
27
28 extern struct tty_driver console_driver;
29
30 #define VT_IS_IN_USE(i) (console_driver.table[i] && console_driver.table[i]->count)
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45 struct vt_struct *vt_cons[MAX_NR_CONSOLES];
46
47 asmlinkage int sys_ioperm(unsigned long from, unsigned long num, int on);
48
49 extern int getkeycode(unsigned int scancode);
50 extern int setkeycode(unsigned int scancode, unsigned int keycode);
51 extern void compute_shiftstate(void);
52 extern void change_console(unsigned int new_console);
53 extern void complete_change_console(unsigned int new_console);
54 extern int vt_waitactive(void);
55 extern void do_blank_screen(int nopowersave);
56 extern void do_unblank_screen(void);
57
58 extern unsigned int keymap_count;
59
60
61
62
63 extern int con_set_trans(char * table);
64 extern int con_get_trans(char * table);
65 extern int con_set_font(char * fontmap);
66 extern int con_get_font(char * fontmap);
67
68
69
70
71
72 #define GPFIRST 0x3b4
73 #define GPLAST 0x3df
74 #define GPNUM (GPLAST - GPFIRST + 1)
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91 static void
92 kd_nosound(unsigned long ignored)
93 {
94
95 outb(inb_p(0x61)&0xFC, 0x61);
96 return;
97 }
98
99 void
100 kd_mksound(unsigned int count, unsigned int ticks)
101 {
102 static struct timer_list sound_timer = { NULL, NULL, 0, 0, kd_nosound };
103
104 cli();
105 del_timer(&sound_timer);
106 if (count) {
107
108 outb_p(inb_p(0x61)|3, 0x61);
109
110 outb_p(0xB6, 0x43);
111
112 outb_p(count & 0xff, 0x42);
113 outb((count >> 8) & 0xff, 0x42);
114
115 if (ticks) {
116 sound_timer.expires = ticks;
117 add_timer(&sound_timer);
118 }
119 } else
120 kd_nosound(0);
121 sti();
122 return;
123 }
124
125
126
127
128
129 int vt_ioctl(struct tty_struct *tty, struct file * file,
130 unsigned int cmd, unsigned long arg)
131 {
132 int i, perm;
133 unsigned int console;
134 unsigned char ucval;
135 struct kbd_struct * kbd;
136 struct vt_struct *vt = (struct vt_struct *)tty->driver_data;
137
138 console = vt->vc_num;
139
140 if (!vc_cons_allocated(console))
141 return -ENOIOCTLCMD;
142
143
144
145
146
147 perm = 0;
148 if (current->tty == tty || suser())
149 perm = 1;
150
151 kbd = kbd_table + console;
152 switch (cmd) {
153 case KIOCSOUND:
154 if (!perm)
155 return -EPERM;
156 kd_mksound((unsigned int)arg, 0);
157 return 0;
158
159 case KDMKTONE:
160 if (!perm)
161 return -EPERM;
162 {
163 unsigned int ticks = HZ * ((arg >> 16) & 0xffff) / 1000;
164
165
166
167
168
169 kd_mksound(arg & 0xffff, ticks);
170 if (ticks == 0)
171 kd_nosound(0);
172 return 0;
173 }
174
175 case KDGKBTYPE:
176
177
178
179 i = verify_area(VERIFY_WRITE, (void *) arg, sizeof(unsigned char));
180 if (!i)
181 put_fs_byte(KB_101, (char *) arg);
182 return i;
183
184 case KDADDIO:
185 case KDDELIO:
186
187
188
189
190 if (arg < GPFIRST || arg > GPLAST)
191 return -EINVAL;
192 return sys_ioperm(arg, 1, (cmd == KDADDIO)) ? -ENXIO : 0;
193
194 case KDENABIO:
195 case KDDISABIO:
196 return sys_ioperm(GPFIRST, GPNUM,
197 (cmd == KDENABIO)) ? -ENXIO : 0;
198
199 case KDSETMODE:
200
201
202
203
204
205 if (!perm)
206 return -EPERM;
207 switch (arg) {
208 case KD_GRAPHICS:
209 break;
210 case KD_TEXT0:
211 case KD_TEXT1:
212 arg = KD_TEXT;
213 case KD_TEXT:
214 break;
215 default:
216 return -EINVAL;
217 }
218 if (vt_cons[console]->vc_mode == (unsigned char) arg)
219 return 0;
220 vt_cons[console]->vc_mode = (unsigned char) arg;
221 if (console != fg_console)
222 return 0;
223
224
225
226 if (arg == KD_TEXT)
227 do_unblank_screen();
228 else
229 do_blank_screen(1);
230 return 0;
231
232 case KDGETMODE:
233 i = verify_area(VERIFY_WRITE, (void *) arg, sizeof(unsigned long));
234 if (!i)
235 put_fs_long(vt_cons[console]->vc_mode, (unsigned long *) arg);
236 return i;
237
238 case KDMAPDISP:
239 case KDUNMAPDISP:
240
241
242
243
244 return -EINVAL;
245
246 case KDSKBMODE:
247 if (!perm)
248 return -EPERM;
249 switch(arg) {
250 case K_RAW:
251 kbd->kbdmode = VC_RAW;
252 break;
253 case K_MEDIUMRAW:
254 kbd->kbdmode = VC_MEDIUMRAW;
255 break;
256 case K_XLATE:
257 kbd->kbdmode = VC_XLATE;
258 compute_shiftstate();
259 break;
260 case K_UNICODE:
261 kbd->kbdmode = VC_UNICODE;
262 compute_shiftstate();
263 break;
264 default:
265 return -EINVAL;
266 }
267 if (tty->ldisc.flush_buffer)
268 tty->ldisc.flush_buffer(tty);
269 return 0;
270
271 case KDGKBMODE:
272 i = verify_area(VERIFY_WRITE, (void *) arg, sizeof(unsigned long));
273 if (!i) {
274 ucval = ((kbd->kbdmode == VC_RAW) ? K_RAW :
275 (kbd->kbdmode == VC_MEDIUMRAW) ? K_MEDIUMRAW :
276 (kbd->kbdmode == VC_UNICODE) ? K_UNICODE :
277 K_XLATE);
278 put_fs_long(ucval, (unsigned long *) arg);
279 }
280 return i;
281
282
283
284 case KDSKBMETA:
285 switch(arg) {
286 case K_METABIT:
287 clr_vc_kbd_mode(kbd, VC_META);
288 break;
289 case K_ESCPREFIX:
290 set_vc_kbd_mode(kbd, VC_META);
291 break;
292 default:
293 return -EINVAL;
294 }
295 return 0;
296
297 case KDGKBMETA:
298 i = verify_area(VERIFY_WRITE, (void *) arg, sizeof(unsigned long));
299 if (!i) {
300 ucval = (vc_kbd_mode(kbd, VC_META) ? K_ESCPREFIX :
301 K_METABIT);
302 put_fs_long(ucval, (unsigned long *) arg);
303 }
304 return i;
305
306 case KDGETKEYCODE:
307 {
308 struct kbkeycode * const a = (struct kbkeycode *)arg;
309 unsigned int sc;
310 int kc;
311
312 i = verify_area(VERIFY_WRITE, (void *)a, sizeof(struct kbkeycode));
313 if (i)
314 return i;
315 sc = get_fs_long((int *) &a->scancode);
316 kc = getkeycode(sc);
317 if (kc < 0)
318 return kc;
319 put_fs_long(kc, (int *) &a->keycode);
320 return 0;
321 }
322
323 case KDSETKEYCODE:
324 {
325 struct kbkeycode * const a = (struct kbkeycode *)arg;
326 unsigned int sc, kc;
327
328 if (!perm)
329 return -EPERM;
330 i = verify_area(VERIFY_READ, (void *)a, sizeof(struct kbkeycode));
331 if (i)
332 return i;
333 sc = get_fs_long((int *) &a->scancode);
334 kc = get_fs_long((int *) &a->keycode);
335 return setkeycode(sc, kc);
336 }
337
338 case KDGKBENT:
339 {
340 struct kbentry * const a = (struct kbentry *)arg;
341 ushort *key_map, val;
342 u_char s;
343
344 i = verify_area(VERIFY_WRITE, (void *)a, sizeof(struct kbentry));
345 if (i)
346 return i;
347 if ((i = get_fs_byte((char *) &a->kb_index)) >= NR_KEYS)
348 return -EINVAL;
349 if ((s = get_fs_byte((char *) &a->kb_table)) >= MAX_NR_KEYMAPS)
350 return -EINVAL;
351 key_map = key_maps[s];
352 if (key_map) {
353 val = U(key_map[i]);
354 if (kbd->kbdmode != VC_UNICODE && KTYP(val) >= NR_TYPES)
355 val = K_HOLE;
356 } else
357 val = (i ? K_HOLE : K_NOSUCHMAP);
358 put_fs_word(val, (short *) &a->kb_value);
359 return 0;
360 }
361
362 case KDSKBENT:
363 {
364 const struct kbentry * a = (struct kbentry *)arg;
365 ushort *key_map;
366 u_char s;
367 u_short v;
368
369 if (!perm)
370 return -EPERM;
371 i = verify_area(VERIFY_READ, (void *)a, sizeof(struct kbentry));
372 if (i)
373 return i;
374 if ((i = get_fs_byte((char *) &a->kb_index)) >= NR_KEYS)
375 return -EINVAL;
376 if ((s = get_fs_byte((char *) &a->kb_table)) >= MAX_NR_KEYMAPS)
377 return -EINVAL;
378 v = get_fs_word(&a->kb_value);
379 if (!i && v == K_NOSUCHMAP) {
380
381 key_map = key_maps[s];
382 if (key_map) {
383 key_maps[s] = 0;
384 if (key_map[0] == U(K_ALLOCATED)) {
385 kfree_s(key_map, sizeof(plain_map));
386 keymap_count--;
387 }
388 }
389 return 0;
390 }
391
392 if (KTYP(v) < NR_TYPES) {
393 if (KVAL(v) > max_vals[KTYP(v)])
394 return -EINVAL;
395 } else
396 if (kbd->kbdmode != VC_UNICODE)
397 return -EINVAL;
398
399
400 if (!i)
401 return 0;
402
403 if (!(key_map = key_maps[s])) {
404 if (keymap_count >= MAX_NR_OF_USER_KEYMAPS && !suser())
405 return -EPERM;
406
407 key_map = (ushort *) kmalloc(sizeof(plain_map),
408 GFP_KERNEL);
409 if (!key_map)
410 return -ENOMEM;
411 key_maps[s] = key_map;
412 key_map[0] = U(K_ALLOCATED);
413 for (s = 1; s < NR_KEYS; s++)
414 key_map[s] = U(K_HOLE);
415 keymap_count++;
416 }
417
418
419
420
421 if (((key_map[i] == U(K_SAK)) || (v == K_SAK)) &&
422 !suser())
423 return -EPERM;
424 key_map[i] = U(v);
425 return 0;
426 }
427
428 case KDGKBSENT:
429 {
430 struct kbsentry *a = (struct kbsentry *)arg;
431 char *p;
432 u_char *q;
433 int sz;
434
435 i = verify_area(VERIFY_WRITE, (void *)a, sizeof(struct kbsentry));
436 if (i)
437 return i;
438 if ((i = get_fs_byte(&a->kb_func)) >= MAX_NR_FUNC || i < 0)
439 return -EINVAL;
440 sz = sizeof(a->kb_string) - 1;
441
442 q = a->kb_string;
443 p = func_table[i];
444 if(p)
445 for ( ; *p && sz; p++, sz--)
446 put_fs_byte(*p, q++);
447 put_fs_byte(0, q);
448 return ((p && *p) ? -EOVERFLOW : 0);
449 }
450
451 case KDSKBSENT:
452 {
453 struct kbsentry * const a = (struct kbsentry *)arg;
454 int delta;
455 char *first_free, *fj, *fnw;
456 int j, k, sz;
457 u_char *p;
458 char *q;
459
460 if (!perm)
461 return -EPERM;
462 i = verify_area(VERIFY_READ, (void *)a, sizeof(struct kbsentry));
463 if (i)
464 return i;
465 if ((i = get_fs_byte(&a->kb_func)) >= MAX_NR_FUNC)
466 return -EINVAL;
467 q = func_table[i];
468
469 first_free = funcbufptr + (funcbufsize - funcbufleft);
470 for (j = i+1; j < MAX_NR_FUNC && !func_table[j]; j++) ;
471 if (j < MAX_NR_FUNC)
472 fj = func_table[j];
473 else
474 fj = first_free;
475
476 delta = (q ? -strlen(q) : 1);
477 sz = sizeof(a->kb_string);
478
479 for (p = a->kb_string; get_fs_byte(p) && sz; p++,sz--)
480 delta++;
481 if (!sz)
482 return -EOVERFLOW;
483 if (delta <= funcbufleft) {
484 if (j < MAX_NR_FUNC) {
485 memmove(fj + delta, fj, first_free - fj);
486 for (k = j; k < MAX_NR_FUNC; k++)
487 if (func_table[k])
488 func_table[k] += delta;
489 }
490 if (!q)
491 func_table[i] = fj;
492 funcbufleft -= delta;
493 } else {
494 sz = 256;
495 while (sz < funcbufsize - funcbufleft + delta)
496 sz <<= 1;
497 fnw = (char *) kmalloc(sz, GFP_KERNEL);
498 if(!fnw)
499 return -ENOMEM;
500
501 if (!q)
502 func_table[i] = fj;
503 if (fj > funcbufptr)
504 memmove(fnw, funcbufptr, fj - funcbufptr);
505 for (k = 0; k < j; k++)
506 if (func_table[k])
507 func_table[k] = fnw + (func_table[k] - funcbufptr);
508
509 if (first_free > fj) {
510 memmove(fnw + (fj - funcbufptr) + delta, fj, first_free - fj);
511 for (k = j; k < MAX_NR_FUNC; k++)
512 if (func_table[k])
513 func_table[k] = fnw + (func_table[k] - funcbufptr) + delta;
514 }
515 if (funcbufptr != func_buf)
516 kfree_s(funcbufptr, funcbufsize);
517 funcbufptr = fnw;
518 funcbufleft = funcbufleft - delta + sz - funcbufsize;
519 funcbufsize = sz;
520 }
521 for (p = a->kb_string, q = func_table[i]; ; p++, q++)
522 if (!(*q = get_fs_byte(p)))
523 break;
524 return 0;
525 }
526
527 case KDGKBDIACR:
528 {
529 struct kbdiacrs *a = (struct kbdiacrs *)arg;
530
531 i = verify_area(VERIFY_WRITE, (void *) a, sizeof(struct kbdiacrs));
532 if (i)
533 return i;
534 put_fs_long(accent_table_size, &a->kb_cnt);
535 memcpy_tofs(a->kbdiacr, accent_table,
536 accent_table_size*sizeof(struct kbdiacr));
537 return 0;
538 }
539
540 case KDSKBDIACR:
541 {
542 struct kbdiacrs *a = (struct kbdiacrs *)arg;
543 unsigned int ct;
544
545 if (!perm)
546 return -EPERM;
547 i = verify_area(VERIFY_READ, (void *) a, sizeof(struct kbdiacrs));
548 if (i)
549 return i;
550 ct = get_fs_long(&a->kb_cnt);
551 if (ct >= MAX_DIACR)
552 return -EINVAL;
553 accent_table_size = ct;
554 memcpy_fromfs(accent_table, a->kbdiacr, ct*sizeof(struct kbdiacr));
555 return 0;
556 }
557
558
559
560 case KDGKBLED:
561 i = verify_area(VERIFY_WRITE, (void *) arg, sizeof(unsigned char));
562 if (i)
563 return i;
564 put_fs_byte(kbd->ledflagstate |
565 (kbd->default_ledflagstate << 4), (char *) arg);
566 return 0;
567
568 case KDSKBLED:
569 if (!perm)
570 return -EPERM;
571 if (arg & ~0x77)
572 return -EINVAL;
573 kbd->ledflagstate = (arg & 7);
574 kbd->default_ledflagstate = ((arg >> 4) & 7);
575 set_leds();
576 return 0;
577
578
579
580 case KDGETLED:
581 i = verify_area(VERIFY_WRITE, (void *) arg, sizeof(unsigned char));
582 if (i)
583 return i;
584 put_fs_byte(getledstate(), (char *) arg);
585 return 0;
586
587 case KDSETLED:
588
589 setledstate(kbd, arg);
590 return 0;
591
592 case VT_SETMODE:
593 {
594 struct vt_mode *vtmode = (struct vt_mode *)arg;
595 char mode;
596
597 if (!perm)
598 return -EPERM;
599 i = verify_area(VERIFY_WRITE, (void *)vtmode, sizeof(struct vt_mode));
600 if (i)
601 return i;
602 mode = get_fs_byte(&vtmode->mode);
603 if (mode != VT_AUTO && mode != VT_PROCESS)
604 return -EINVAL;
605 vt_cons[console]->vt_mode.mode = mode;
606 vt_cons[console]->vt_mode.waitv = get_fs_byte(&vtmode->waitv);
607 vt_cons[console]->vt_mode.relsig = get_fs_word(&vtmode->relsig);
608 vt_cons[console]->vt_mode.acqsig = get_fs_word(&vtmode->acqsig);
609
610 vt_cons[console]->vt_mode.frsig = 0;
611 vt_cons[console]->vt_pid = current->pid;
612 vt_cons[console]->vt_newvt = 0;
613 return 0;
614 }
615
616 case VT_GETMODE:
617 {
618 struct vt_mode *vtmode = (struct vt_mode *)arg;
619
620 i = verify_area(VERIFY_WRITE, (void *)arg, sizeof(struct vt_mode));
621 if (i)
622 return i;
623 put_fs_byte(vt_cons[console]->vt_mode.mode, &vtmode->mode);
624 put_fs_byte(vt_cons[console]->vt_mode.waitv, &vtmode->waitv);
625 put_fs_word(vt_cons[console]->vt_mode.relsig, &vtmode->relsig);
626 put_fs_word(vt_cons[console]->vt_mode.acqsig, &vtmode->acqsig);
627 put_fs_word(vt_cons[console]->vt_mode.frsig, &vtmode->frsig);
628 return 0;
629 }
630
631
632
633
634
635
636 case VT_GETSTATE:
637 {
638 struct vt_stat *vtstat = (struct vt_stat *)arg;
639 unsigned short state, mask;
640
641 i = verify_area(VERIFY_WRITE,(void *)vtstat, sizeof(struct vt_stat));
642 if (i)
643 return i;
644 put_fs_word(fg_console + 1, &vtstat->v_active);
645 state = 1;
646 for (i = 0, mask = 2; i < MAX_NR_CONSOLES && mask; ++i, mask <<= 1)
647 if (console_driver.table[i] &&
648 console_driver.table[i]->count > 0)
649 state |= mask;
650 put_fs_word(state, &vtstat->v_state);
651 return 0;
652 }
653
654
655
656
657 case VT_OPENQRY:
658 i = verify_area(VERIFY_WRITE, (void *) arg, sizeof(long));
659 if (i)
660 return i;
661 for (i = 0; i < MAX_NR_CONSOLES; ++i)
662 if (! VT_IS_IN_USE(i))
663 break;
664 put_fs_long(i < MAX_NR_CONSOLES ? (i+1) : -1,
665 (unsigned long *)arg);
666 return 0;
667
668
669
670
671
672
673 case VT_ACTIVATE:
674 if (!perm)
675 return -EPERM;
676 if (arg == 0 || arg > MAX_NR_CONSOLES)
677 return -ENXIO;
678 arg--;
679 i = vc_allocate(arg);
680 if (i)
681 return i;
682 change_console(arg);
683 return 0;
684
685
686
687
688 case VT_WAITACTIVE:
689 if (!perm)
690 return -EPERM;
691 if (arg == 0 || arg > MAX_NR_CONSOLES)
692 return -ENXIO;
693 arg--;
694 while (fg_console != arg)
695 {
696 if (vt_waitactive() < 0)
697 return -EINTR;
698 }
699 return 0;
700
701
702
703
704
705
706
707
708
709
710
711 case VT_RELDISP:
712 if (!perm)
713 return -EPERM;
714 if (vt_cons[console]->vt_mode.mode != VT_PROCESS)
715 return -EINVAL;
716
717
718
719
720 if (vt_cons[console]->vt_newvt >= 0)
721 {
722 if (arg == 0)
723
724
725
726
727 vt_cons[console]->vt_newvt = -1;
728
729 else
730 {
731
732
733
734
735 int newvt = vt_cons[console]->vt_newvt;
736 vt_cons[console]->vt_newvt = -1;
737 i = vc_allocate(newvt);
738 if (i)
739 return i;
740 complete_change_console(newvt);
741 }
742 }
743
744
745
746
747 else
748 {
749
750
751
752 if (arg != VT_ACKACQ)
753 return -EINVAL;
754 }
755
756 return 0;
757
758
759
760
761 case VT_DISALLOCATE:
762 if (!perm)
763 return -EPERM;
764 if (arg > MAX_NR_CONSOLES)
765 return -ENXIO;
766 if (arg == 0) {
767
768 for (i=1; i<MAX_NR_CONSOLES; i++)
769 if (! VT_IS_IN_USE(i)) {
770 if (i == fg_console)
771 change_console(0);
772 vc_disallocate(i);
773 }
774 } else {
775
776 arg--;
777 if (VT_IS_IN_USE(arg))
778 return -EBUSY;
779 if (arg) {
780 if (arg == fg_console)
781 change_console(0);
782 vc_disallocate(arg);
783 }
784 }
785 return 0;
786
787 case VT_RESIZE:
788 {
789 struct vt_sizes *vtsizes = (struct vt_sizes *) arg;
790 ushort ll,cc;
791 if (!perm)
792 return -EPERM;
793 i = verify_area(VERIFY_READ, (void *)vtsizes, sizeof(struct vt_sizes));
794 if (i)
795 return i;
796 ll = get_fs_word(&vtsizes->v_rows);
797 cc = get_fs_word(&vtsizes->v_cols);
798 return vc_resize(ll, cc);
799 }
800
801 case PIO_FONT:
802 if (!perm)
803 return -EPERM;
804 return con_set_font((char *)arg);
805
806
807 case GIO_FONT:
808 return con_get_font((char *)arg);
809
810
811 case PIO_SCRNMAP:
812 if (!perm)
813 return -EPERM;
814 return con_set_trans((char *)arg);
815
816
817 case GIO_SCRNMAP:
818 return con_get_trans((char *)arg);
819
820
821 default:
822 return -ENOIOCTLCMD;
823 }
824 }