Merge branch 'linux-next' of git://git.infradead.org/~dedekind/ubifs-2.6
[linux-2.6-block.git] / drivers / char / tty_io.c
CommitLineData
1da177e4
LT
1/*
2 * linux/drivers/char/tty_io.c
3 *
4 * Copyright (C) 1991, 1992 Linus Torvalds
5 */
6
7/*
8 * 'tty_io.c' gives an orthogonal feeling to tty's, be they consoles
9 * or rs-channels. It also implements echoing, cooked mode etc.
10 *
11 * Kill-line thanks to John T Kohl, who also corrected VMIN = VTIME = 0.
12 *
13 * Modified by Theodore Ts'o, 9/14/92, to dynamically allocate the
14 * tty_struct and tty_queue structures. Previously there was an array
15 * of 256 tty_struct's which was statically allocated, and the
16 * tty_queue structures were allocated at boot time. Both are now
17 * dynamically allocated only when the tty is open.
18 *
19 * Also restructured routines so that there is more of a separation
20 * between the high-level tty routines (tty_io.c and tty_ioctl.c) and
21 * the low-level tty routines (serial.c, pty.c, console.c). This
37bdfb07 22 * makes for cleaner and more compact code. -TYT, 9/17/92
1da177e4
LT
23 *
24 * Modified by Fred N. van Kempen, 01/29/93, to add line disciplines
25 * which can be dynamically activated and de-activated by the line
26 * discipline handling modules (like SLIP).
27 *
28 * NOTE: pay no attention to the line discipline code (yet); its
29 * interface is still subject to change in this version...
30 * -- TYT, 1/31/92
31 *
32 * Added functionality to the OPOST tty handling. No delays, but all
33 * other bits should be there.
34 * -- Nick Holloway <alfie@dcs.warwick.ac.uk>, 27th May 1993.
35 *
36 * Rewrote canonical mode and added more termios flags.
37 * -- julian@uhunix.uhcc.hawaii.edu (J. Cowley), 13Jan94
38 *
39 * Reorganized FASYNC support so mouse code can share it.
40 * -- ctm@ardi.com, 9Sep95
41 *
42 * New TIOCLINUX variants added.
43 * -- mj@k332.feld.cvut.cz, 19-Nov-95
37bdfb07 44 *
1da177e4
LT
45 * Restrict vt switching via ioctl()
46 * -- grif@cs.ucr.edu, 5-Dec-95
47 *
48 * Move console and virtual terminal code to more appropriate files,
49 * implement CONFIG_VT and generalize console device interface.
50 * -- Marko Kohtala <Marko.Kohtala@hut.fi>, March 97
51 *
52 * Rewrote init_dev and release_dev to eliminate races.
53 * -- Bill Hawes <whawes@star.net>, June 97
54 *
55 * Added devfs support.
56 * -- C. Scott Ananian <cananian@alumni.princeton.edu>, 13-Jan-1998
57 *
58 * Added support for a Unix98-style ptmx device.
59 * -- C. Scott Ananian <cananian@alumni.princeton.edu>, 14-Jan-1998
60 *
61 * Reduced memory usage for older ARM systems
62 * -- Russell King <rmk@arm.linux.org.uk>
63 *
64 * Move do_SAK() into process context. Less stack use in devfs functions.
37bdfb07
AC
65 * alloc_tty_struct() always uses kmalloc()
66 * -- Andrew Morton <andrewm@uow.edu.eu> 17Mar01
1da177e4
LT
67 */
68
1da177e4
LT
69#include <linux/types.h>
70#include <linux/major.h>
71#include <linux/errno.h>
72#include <linux/signal.h>
73#include <linux/fcntl.h>
74#include <linux/sched.h>
75#include <linux/interrupt.h>
76#include <linux/tty.h>
77#include <linux/tty_driver.h>
78#include <linux/tty_flip.h>
79#include <linux/devpts_fs.h>
80#include <linux/file.h>
9f3acc31 81#include <linux/fdtable.h>
1da177e4
LT
82#include <linux/console.h>
83#include <linux/timer.h>
84#include <linux/ctype.h>
85#include <linux/kd.h>
86#include <linux/mm.h>
87#include <linux/string.h>
88#include <linux/slab.h>
89#include <linux/poll.h>
90#include <linux/proc_fs.h>
91#include <linux/init.h>
92#include <linux/module.h>
93#include <linux/smp_lock.h>
94#include <linux/device.h>
1da177e4
LT
95#include <linux/wait.h>
96#include <linux/bitops.h>
b20f3ae5 97#include <linux/delay.h>
a352def2 98#include <linux/seq_file.h>
1da177e4 99
a352def2 100#include <linux/uaccess.h>
1da177e4
LT
101#include <asm/system.h>
102
103#include <linux/kbd_kern.h>
104#include <linux/vt_kern.h>
105#include <linux/selection.h>
1da177e4
LT
106
107#include <linux/kmod.h>
b488893a 108#include <linux/nsproxy.h>
1da177e4
LT
109
110#undef TTY_DEBUG_HANGUP
111
112#define TTY_PARANOIA_CHECK 1
113#define CHECK_TTY_COUNT 1
114
edc6afc5 115struct ktermios tty_std_termios = { /* for the benefit of tty drivers */
1da177e4
LT
116 .c_iflag = ICRNL | IXON,
117 .c_oflag = OPOST | ONLCR,
118 .c_cflag = B38400 | CS8 | CREAD | HUPCL,
119 .c_lflag = ISIG | ICANON | ECHO | ECHOE | ECHOK |
120 ECHOCTL | ECHOKE | IEXTEN,
edc6afc5
AC
121 .c_cc = INIT_C_CC,
122 .c_ispeed = 38400,
123 .c_ospeed = 38400
1da177e4
LT
124};
125
126EXPORT_SYMBOL(tty_std_termios);
127
128/* This list gets poked at by procfs and various bits of boot up code. This
129 could do with some rationalisation such as pulling the tty proc function
130 into this file */
37bdfb07 131
1da177e4
LT
132LIST_HEAD(tty_drivers); /* linked list of tty drivers */
133
24ec839c 134/* Mutex to protect creating and releasing a tty. This is shared with
1da177e4 135 vt.c for deeply disgusting hack reasons */
70522e12 136DEFINE_MUTEX(tty_mutex);
de2a84f2 137EXPORT_SYMBOL(tty_mutex);
1da177e4
LT
138
139#ifdef CONFIG_UNIX98_PTYS
140extern struct tty_driver *ptm_driver; /* Unix98 pty masters; for /dev/ptmx */
1da177e4
LT
141static int ptmx_open(struct inode *, struct file *);
142#endif
143
1da177e4
LT
144static void initialize_tty_struct(struct tty_struct *tty);
145
146static ssize_t tty_read(struct file *, char __user *, size_t, loff_t *);
147static ssize_t tty_write(struct file *, const char __user *, size_t, loff_t *);
37bdfb07
AC
148ssize_t redirected_tty_write(struct file *, const char __user *,
149 size_t, loff_t *);
1da177e4
LT
150static unsigned int tty_poll(struct file *, poll_table *);
151static int tty_open(struct inode *, struct file *);
152static int tty_release(struct inode *, struct file *);
04f378b1 153long tty_ioctl(struct file *file, unsigned int cmd, unsigned long arg);
e10cc1df 154#ifdef CONFIG_COMPAT
37bdfb07 155static long tty_compat_ioctl(struct file *file, unsigned int cmd,
e10cc1df
PF
156 unsigned long arg);
157#else
158#define tty_compat_ioctl NULL
159#endif
37bdfb07 160static int tty_fasync(int fd, struct file *filp, int on);
d5698c28 161static void release_tty(struct tty_struct *tty, int idx);
2a65f1d9 162static void __proc_set_tty(struct task_struct *tsk, struct tty_struct *tty);
98a27ba4 163static void proc_set_tty(struct task_struct *tsk, struct tty_struct *tty);
1da177e4 164
af9b897e
AC
165/**
166 * alloc_tty_struct - allocate a tty object
167 *
168 * Return a new empty tty structure. The data fields have not
169 * been initialized in any way but has been zeroed
170 *
171 * Locking: none
af9b897e 172 */
1da177e4
LT
173
174static struct tty_struct *alloc_tty_struct(void)
175{
1266b1e1 176 return kzalloc(sizeof(struct tty_struct), GFP_KERNEL);
1da177e4
LT
177}
178
33f0f88f
AC
179static void tty_buffer_free_all(struct tty_struct *);
180
af9b897e
AC
181/**
182 * free_tty_struct - free a disused tty
183 * @tty: tty struct to free
184 *
185 * Free the write buffers, tty queue and tty memory itself.
186 *
187 * Locking: none. Must be called after tty is definitely unused
188 */
189
1da177e4
LT
190static inline void free_tty_struct(struct tty_struct *tty)
191{
192 kfree(tty->write_buf);
33f0f88f 193 tty_buffer_free_all(tty);
1da177e4
LT
194 kfree(tty);
195}
196
197#define TTY_NUMBER(tty) ((tty)->index + (tty)->driver->name_base)
198
af9b897e
AC
199/**
200 * tty_name - return tty naming
201 * @tty: tty structure
202 * @buf: buffer for output
203 *
204 * Convert a tty structure into a name. The name reflects the kernel
205 * naming policy and if udev is in use may not reflect user space
206 *
207 * Locking: none
208 */
209
1da177e4
LT
210char *tty_name(struct tty_struct *tty, char *buf)
211{
212 if (!tty) /* Hmm. NULL pointer. That's fun. */
213 strcpy(buf, "NULL tty");
214 else
215 strcpy(buf, tty->name);
216 return buf;
217}
218
219EXPORT_SYMBOL(tty_name);
220
d769a669 221int tty_paranoia_check(struct tty_struct *tty, struct inode *inode,
1da177e4
LT
222 const char *routine)
223{
224#ifdef TTY_PARANOIA_CHECK
225 if (!tty) {
226 printk(KERN_WARNING
227 "null TTY for (%d:%d) in %s\n",
228 imajor(inode), iminor(inode), routine);
229 return 1;
230 }
231 if (tty->magic != TTY_MAGIC) {
232 printk(KERN_WARNING
233 "bad magic number for tty struct (%d:%d) in %s\n",
234 imajor(inode), iminor(inode), routine);
235 return 1;
236 }
237#endif
238 return 0;
239}
240
241static int check_tty_count(struct tty_struct *tty, const char *routine)
242{
243#ifdef CHECK_TTY_COUNT
244 struct list_head *p;
245 int count = 0;
37bdfb07 246
1da177e4
LT
247 file_list_lock();
248 list_for_each(p, &tty->tty_files) {
249 count++;
250 }
251 file_list_unlock();
252 if (tty->driver->type == TTY_DRIVER_TYPE_PTY &&
253 tty->driver->subtype == PTY_TYPE_SLAVE &&
254 tty->link && tty->link->count)
255 count++;
256 if (tty->count != count) {
257 printk(KERN_WARNING "Warning: dev (%s) tty->count(%d) "
258 "!= #fd's(%d) in %s\n",
259 tty->name, tty->count, count, routine);
260 return count;
24ec839c 261 }
1da177e4
LT
262#endif
263 return 0;
264}
265
33f0f88f
AC
266/*
267 * Tty buffer allocation management
268 */
269
af9b897e
AC
270/**
271 * tty_buffer_free_all - free buffers used by a tty
272 * @tty: tty to free from
273 *
274 * Remove all the buffers pending on a tty whether queued with data
275 * or in the free ring. Must be called when the tty is no longer in use
276 *
277 * Locking: none
278 */
279
33f0f88f
AC
280static void tty_buffer_free_all(struct tty_struct *tty)
281{
282 struct tty_buffer *thead;
37bdfb07 283 while ((thead = tty->buf.head) != NULL) {
33f0f88f
AC
284 tty->buf.head = thead->next;
285 kfree(thead);
286 }
37bdfb07 287 while ((thead = tty->buf.free) != NULL) {
33f0f88f
AC
288 tty->buf.free = thead->next;
289 kfree(thead);
290 }
291 tty->buf.tail = NULL;
01da5fd8 292 tty->buf.memory_used = 0;
33f0f88f
AC
293}
294
01da5fd8
AC
295/**
296 * tty_buffer_init - prepare a tty buffer structure
297 * @tty: tty to initialise
298 *
299 * Set up the initial state of the buffer management for a tty device.
300 * Must be called before the other tty buffer functions are used.
301 *
302 * Locking: none
303 */
304
33f0f88f
AC
305static void tty_buffer_init(struct tty_struct *tty)
306{
808249ce 307 spin_lock_init(&tty->buf.lock);
33f0f88f
AC
308 tty->buf.head = NULL;
309 tty->buf.tail = NULL;
310 tty->buf.free = NULL;
01da5fd8 311 tty->buf.memory_used = 0;
33f0f88f
AC
312}
313
01da5fd8
AC
314/**
315 * tty_buffer_alloc - allocate a tty buffer
316 * @tty: tty device
317 * @size: desired size (characters)
318 *
319 * Allocate a new tty buffer to hold the desired number of characters.
320 * Return NULL if out of memory or the allocation would exceed the
321 * per device queue
322 *
323 * Locking: Caller must hold tty->buf.lock
324 */
325
326static struct tty_buffer *tty_buffer_alloc(struct tty_struct *tty, size_t size)
33f0f88f 327{
01da5fd8
AC
328 struct tty_buffer *p;
329
330 if (tty->buf.memory_used + size > 65536)
331 return NULL;
332 p = kmalloc(sizeof(struct tty_buffer) + 2 * size, GFP_ATOMIC);
37bdfb07 333 if (p == NULL)
33f0f88f
AC
334 return NULL;
335 p->used = 0;
336 p->size = size;
337 p->next = NULL;
8977d929
PF
338 p->commit = 0;
339 p->read = 0;
33f0f88f
AC
340 p->char_buf_ptr = (char *)(p->data);
341 p->flag_buf_ptr = (unsigned char *)p->char_buf_ptr + size;
01da5fd8 342 tty->buf.memory_used += size;
33f0f88f
AC
343 return p;
344}
345
01da5fd8
AC
346/**
347 * tty_buffer_free - free a tty buffer
348 * @tty: tty owning the buffer
349 * @b: the buffer to free
350 *
351 * Free a tty buffer, or add it to the free list according to our
352 * internal strategy
353 *
354 * Locking: Caller must hold tty->buf.lock
355 */
33f0f88f
AC
356
357static void tty_buffer_free(struct tty_struct *tty, struct tty_buffer *b)
358{
359 /* Dumb strategy for now - should keep some stats */
01da5fd8
AC
360 tty->buf.memory_used -= b->size;
361 WARN_ON(tty->buf.memory_used < 0);
362
37bdfb07 363 if (b->size >= 512)
33f0f88f
AC
364 kfree(b);
365 else {
366 b->next = tty->buf.free;
367 tty->buf.free = b;
368 }
369}
370
c5c34d48 371/**
42fd552e 372 * __tty_buffer_flush - flush full tty buffers
c5c34d48
PF
373 * @tty: tty to flush
374 *
42fd552e
AC
375 * flush all the buffers containing receive data. Caller must
376 * hold the buffer lock and must have ensured no parallel flush to
377 * ldisc is running.
c5c34d48 378 *
42fd552e 379 * Locking: Caller must hold tty->buf.lock
c5c34d48
PF
380 */
381
42fd552e 382static void __tty_buffer_flush(struct tty_struct *tty)
c5c34d48
PF
383{
384 struct tty_buffer *thead;
c5c34d48 385
37bdfb07 386 while ((thead = tty->buf.head) != NULL) {
c5c34d48
PF
387 tty->buf.head = thead->next;
388 tty_buffer_free(tty, thead);
389 }
390 tty->buf.tail = NULL;
42fd552e
AC
391}
392
393/**
394 * tty_buffer_flush - flush full tty buffers
395 * @tty: tty to flush
396 *
397 * flush all the buffers containing receive data. If the buffer is
398 * being processed by flush_to_ldisc then we defer the processing
399 * to that function
400 *
401 * Locking: none
402 */
403
404static void tty_buffer_flush(struct tty_struct *tty)
405{
406 unsigned long flags;
407 spin_lock_irqsave(&tty->buf.lock, flags);
408
409 /* If the data is being pushed to the tty layer then we can't
410 process it here. Instead set a flag and the flush_to_ldisc
411 path will process the flush request before it exits */
412 if (test_bit(TTY_FLUSHING, &tty->flags)) {
413 set_bit(TTY_FLUSHPENDING, &tty->flags);
414 spin_unlock_irqrestore(&tty->buf.lock, flags);
415 wait_event(tty->read_wait,
416 test_bit(TTY_FLUSHPENDING, &tty->flags) == 0);
417 return;
418 } else
419 __tty_buffer_flush(tty);
c5c34d48
PF
420 spin_unlock_irqrestore(&tty->buf.lock, flags);
421}
422
01da5fd8
AC
423/**
424 * tty_buffer_find - find a free tty buffer
425 * @tty: tty owning the buffer
426 * @size: characters wanted
427 *
428 * Locate an existing suitable tty buffer or if we are lacking one then
429 * allocate a new one. We round our buffers off in 256 character chunks
430 * to get better allocation behaviour.
431 *
432 * Locking: Caller must hold tty->buf.lock
433 */
434
33f0f88f
AC
435static struct tty_buffer *tty_buffer_find(struct tty_struct *tty, size_t size)
436{
437 struct tty_buffer **tbh = &tty->buf.free;
37bdfb07 438 while ((*tbh) != NULL) {
33f0f88f 439 struct tty_buffer *t = *tbh;
37bdfb07 440 if (t->size >= size) {
33f0f88f
AC
441 *tbh = t->next;
442 t->next = NULL;
443 t->used = 0;
8977d929
PF
444 t->commit = 0;
445 t->read = 0;
01da5fd8 446 tty->buf.memory_used += t->size;
33f0f88f
AC
447 return t;
448 }
449 tbh = &((*tbh)->next);
450 }
451 /* Round the buffer size out */
37bdfb07 452 size = (size + 0xFF) & ~0xFF;
01da5fd8 453 return tty_buffer_alloc(tty, size);
33f0f88f
AC
454 /* Should possibly check if this fails for the largest buffer we
455 have queued and recycle that ? */
456}
457
01da5fd8
AC
458/**
459 * tty_buffer_request_room - grow tty buffer if needed
460 * @tty: tty structure
461 * @size: size desired
462 *
463 * Make at least size bytes of linear space available for the tty
464 * buffer. If we fail return the size we managed to find.
465 *
466 * Locking: Takes tty->buf.lock
467 */
33f0f88f
AC
468int tty_buffer_request_room(struct tty_struct *tty, size_t size)
469{
808249ce
PF
470 struct tty_buffer *b, *n;
471 int left;
472 unsigned long flags;
473
474 spin_lock_irqsave(&tty->buf.lock, flags);
33f0f88f
AC
475
476 /* OPTIMISATION: We could keep a per tty "zero" sized buffer to
477 remove this conditional if its worth it. This would be invisible
478 to the callers */
33b37a33 479 if ((b = tty->buf.tail) != NULL)
33f0f88f 480 left = b->size - b->used;
33b37a33 481 else
808249ce
PF
482 left = 0;
483
484 if (left < size) {
485 /* This is the slow path - looking for new buffers to use */
486 if ((n = tty_buffer_find(tty, size)) != NULL) {
487 if (b != NULL) {
488 b->next = n;
8977d929 489 b->commit = b->used;
808249ce
PF
490 } else
491 tty->buf.head = n;
492 tty->buf.tail = n;
808249ce
PF
493 } else
494 size = left;
495 }
496
497 spin_unlock_irqrestore(&tty->buf.lock, flags);
33f0f88f
AC
498 return size;
499}
33f0f88f
AC
500EXPORT_SYMBOL_GPL(tty_buffer_request_room);
501
af9b897e
AC
502/**
503 * tty_insert_flip_string - Add characters to the tty buffer
504 * @tty: tty structure
505 * @chars: characters
506 * @size: size
507 *
508 * Queue a series of bytes to the tty buffering. All the characters
509 * passed are marked as without error. Returns the number added.
510 *
511 * Locking: Called functions may take tty->buf.lock
512 */
513
e1a25090
AM
514int tty_insert_flip_string(struct tty_struct *tty, const unsigned char *chars,
515 size_t size)
33f0f88f
AC
516{
517 int copied = 0;
518 do {
519 int space = tty_buffer_request_room(tty, size - copied);
520 struct tty_buffer *tb = tty->buf.tail;
521 /* If there is no space then tb may be NULL */
37bdfb07 522 if (unlikely(space == 0))
33f0f88f
AC
523 break;
524 memcpy(tb->char_buf_ptr + tb->used, chars, space);
525 memset(tb->flag_buf_ptr + tb->used, TTY_NORMAL, space);
526 tb->used += space;
527 copied += space;
528 chars += space;
527063ba
AD
529 /* There is a small chance that we need to split the data over
530 several buffers. If this is the case we must loop */
531 } while (unlikely(size > copied));
33f0f88f
AC
532 return copied;
533}
ee37df78 534EXPORT_SYMBOL(tty_insert_flip_string);
33f0f88f 535
af9b897e
AC
536/**
537 * tty_insert_flip_string_flags - Add characters to the tty buffer
538 * @tty: tty structure
539 * @chars: characters
540 * @flags: flag bytes
541 * @size: size
542 *
543 * Queue a series of bytes to the tty buffering. For each character
544 * the flags array indicates the status of the character. Returns the
545 * number added.
546 *
547 * Locking: Called functions may take tty->buf.lock
548 */
549
e1a25090
AM
550int tty_insert_flip_string_flags(struct tty_struct *tty,
551 const unsigned char *chars, const char *flags, size_t size)
33f0f88f
AC
552{
553 int copied = 0;
554 do {
555 int space = tty_buffer_request_room(tty, size - copied);
556 struct tty_buffer *tb = tty->buf.tail;
557 /* If there is no space then tb may be NULL */
37bdfb07 558 if (unlikely(space == 0))
33f0f88f
AC
559 break;
560 memcpy(tb->char_buf_ptr + tb->used, chars, space);
561 memcpy(tb->flag_buf_ptr + tb->used, flags, space);
562 tb->used += space;
563 copied += space;
564 chars += space;
565 flags += space;
527063ba
AD
566 /* There is a small chance that we need to split the data over
567 several buffers. If this is the case we must loop */
568 } while (unlikely(size > copied));
33f0f88f
AC
569 return copied;
570}
ff4547f4 571EXPORT_SYMBOL(tty_insert_flip_string_flags);
33f0f88f 572
af9b897e
AC
573/**
574 * tty_schedule_flip - push characters to ldisc
575 * @tty: tty to push from
576 *
577 * Takes any pending buffers and transfers their ownership to the
578 * ldisc side of the queue. It then schedules those characters for
579 * processing by the line discipline.
580 *
581 * Locking: Takes tty->buf.lock
582 */
583
e1a25090
AM
584void tty_schedule_flip(struct tty_struct *tty)
585{
586 unsigned long flags;
587 spin_lock_irqsave(&tty->buf.lock, flags);
33b37a33 588 if (tty->buf.tail != NULL)
e1a25090 589 tty->buf.tail->commit = tty->buf.tail->used;
e1a25090
AM
590 spin_unlock_irqrestore(&tty->buf.lock, flags);
591 schedule_delayed_work(&tty->buf.work, 1);
592}
593EXPORT_SYMBOL(tty_schedule_flip);
33f0f88f 594
af9b897e
AC
595/**
596 * tty_prepare_flip_string - make room for characters
597 * @tty: tty
598 * @chars: return pointer for character write area
599 * @size: desired size
600 *
33f0f88f
AC
601 * Prepare a block of space in the buffer for data. Returns the length
602 * available and buffer pointer to the space which is now allocated and
603 * accounted for as ready for normal characters. This is used for drivers
604 * that need their own block copy routines into the buffer. There is no
605 * guarantee the buffer is a DMA target!
af9b897e
AC
606 *
607 * Locking: May call functions taking tty->buf.lock
33f0f88f
AC
608 */
609
37bdfb07
AC
610int tty_prepare_flip_string(struct tty_struct *tty, unsigned char **chars,
611 size_t size)
33f0f88f
AC
612{
613 int space = tty_buffer_request_room(tty, size);
808249ce
PF
614 if (likely(space)) {
615 struct tty_buffer *tb = tty->buf.tail;
616 *chars = tb->char_buf_ptr + tb->used;
617 memset(tb->flag_buf_ptr + tb->used, TTY_NORMAL, space);
618 tb->used += space;
619 }
33f0f88f
AC
620 return space;
621}
622
623EXPORT_SYMBOL_GPL(tty_prepare_flip_string);
624
af9b897e
AC
625/**
626 * tty_prepare_flip_string_flags - make room for characters
627 * @tty: tty
628 * @chars: return pointer for character write area
629 * @flags: return pointer for status flag write area
630 * @size: desired size
631 *
33f0f88f
AC
632 * Prepare a block of space in the buffer for data. Returns the length
633 * available and buffer pointer to the space which is now allocated and
634 * accounted for as ready for characters. This is used for drivers
635 * that need their own block copy routines into the buffer. There is no
636 * guarantee the buffer is a DMA target!
af9b897e
AC
637 *
638 * Locking: May call functions taking tty->buf.lock
33f0f88f
AC
639 */
640
37bdfb07
AC
641int tty_prepare_flip_string_flags(struct tty_struct *tty,
642 unsigned char **chars, char **flags, size_t size)
33f0f88f
AC
643{
644 int space = tty_buffer_request_room(tty, size);
808249ce
PF
645 if (likely(space)) {
646 struct tty_buffer *tb = tty->buf.tail;
647 *chars = tb->char_buf_ptr + tb->used;
648 *flags = tb->flag_buf_ptr + tb->used;
649 tb->used += space;
650 }
33f0f88f
AC
651 return space;
652}
653
654EXPORT_SYMBOL_GPL(tty_prepare_flip_string_flags);
655
656
657
af9b897e
AC
658/**
659 * get_tty_driver - find device of a tty
660 * @dev_t: device identifier
661 * @index: returns the index of the tty
662 *
663 * This routine returns a tty driver structure, given a device number
664 * and also passes back the index number.
665 *
666 * Locking: caller must hold tty_mutex
1da177e4 667 */
af9b897e 668
1da177e4
LT
669static struct tty_driver *get_tty_driver(dev_t device, int *index)
670{
671 struct tty_driver *p;
672
673 list_for_each_entry(p, &tty_drivers, tty_drivers) {
674 dev_t base = MKDEV(p->major, p->minor_start);
675 if (device < base || device >= base + p->num)
676 continue;
677 *index = device - base;
678 return p;
679 }
680 return NULL;
681}
682
f2d937f3
JW
683#ifdef CONFIG_CONSOLE_POLL
684
685/**
686 * tty_find_polling_driver - find device of a polled tty
687 * @name: name string to match
688 * @line: pointer to resulting tty line nr
689 *
690 * This routine returns a tty driver structure, given a name
691 * and the condition that the tty driver is capable of polled
692 * operation.
693 */
694struct tty_driver *tty_find_polling_driver(char *name, int *line)
695{
696 struct tty_driver *p, *res = NULL;
697 int tty_line = 0;
698 char *str;
699
700 mutex_lock(&tty_mutex);
701 /* Search through the tty devices to look for a match */
702 list_for_each_entry(p, &tty_drivers, tty_drivers) {
703 str = name + strlen(p->name);
704 tty_line = simple_strtoul(str, &str, 10);
705 if (*str == ',')
706 str++;
707 if (*str == '\0')
8da56309 708 str = NULL;
f2d937f3 709
f34d7a5b
AC
710 if (tty_line >= 0 && tty_line <= p->num && p->ops &&
711 p->ops->poll_init && !p->ops->poll_init(p, tty_line, str)) {
f2d937f3
JW
712 res = p;
713 *line = tty_line;
714 break;
715 }
716 }
717 mutex_unlock(&tty_mutex);
718
719 return res;
720}
721EXPORT_SYMBOL_GPL(tty_find_polling_driver);
722#endif
723
af9b897e
AC
724/**
725 * tty_check_change - check for POSIX terminal changes
726 * @tty: tty to check
727 *
728 * If we try to write to, or set the state of, a terminal and we're
729 * not in the foreground, send a SIGTTOU. If the signal is blocked or
730 * ignored, go ahead and perform the operation. (POSIX 7.2)
731 *
978e595f 732 * Locking: ctrl_lock
1da177e4 733 */
af9b897e 734
37bdfb07 735int tty_check_change(struct tty_struct *tty)
1da177e4 736{
47f86834
AC
737 unsigned long flags;
738 int ret = 0;
739
1da177e4
LT
740 if (current->signal->tty != tty)
741 return 0;
47f86834
AC
742
743 spin_lock_irqsave(&tty->ctrl_lock, flags);
744
ab521dc0
EB
745 if (!tty->pgrp) {
746 printk(KERN_WARNING "tty_check_change: tty->pgrp == NULL!\n");
9ffee4cb 747 goto out_unlock;
1da177e4 748 }
ab521dc0 749 if (task_pgrp(current) == tty->pgrp)
9ffee4cb
AM
750 goto out_unlock;
751 spin_unlock_irqrestore(&tty->ctrl_lock, flags);
1da177e4 752 if (is_ignored(SIGTTOU))
47f86834
AC
753 goto out;
754 if (is_current_pgrp_orphaned()) {
755 ret = -EIO;
756 goto out;
757 }
040b6362
ON
758 kill_pgrp(task_pgrp(current), SIGTTOU, 1);
759 set_thread_flag(TIF_SIGPENDING);
47f86834
AC
760 ret = -ERESTARTSYS;
761out:
9ffee4cb
AM
762 return ret;
763out_unlock:
47f86834
AC
764 spin_unlock_irqrestore(&tty->ctrl_lock, flags);
765 return ret;
1da177e4
LT
766}
767
768EXPORT_SYMBOL(tty_check_change);
769
37bdfb07 770static ssize_t hung_up_tty_read(struct file *file, char __user *buf,
1da177e4
LT
771 size_t count, loff_t *ppos)
772{
773 return 0;
774}
775
37bdfb07 776static ssize_t hung_up_tty_write(struct file *file, const char __user *buf,
1da177e4
LT
777 size_t count, loff_t *ppos)
778{
779 return -EIO;
780}
781
782/* No kernel lock held - none needed ;) */
37bdfb07 783static unsigned int hung_up_tty_poll(struct file *filp, poll_table *wait)
1da177e4
LT
784{
785 return POLLIN | POLLOUT | POLLERR | POLLHUP | POLLRDNORM | POLLWRNORM;
786}
787
04f378b1
AC
788static long hung_up_tty_ioctl(struct file *file, unsigned int cmd,
789 unsigned long arg)
38ad2ed0
PF
790{
791 return cmd == TIOCSPGRP ? -ENOTTY : -EIO;
792}
793
37bdfb07 794static long hung_up_tty_compat_ioctl(struct file *file,
38ad2ed0 795 unsigned int cmd, unsigned long arg)
1da177e4
LT
796{
797 return cmd == TIOCSPGRP ? -ENOTTY : -EIO;
798}
799
62322d25 800static const struct file_operations tty_fops = {
1da177e4
LT
801 .llseek = no_llseek,
802 .read = tty_read,
803 .write = tty_write,
804 .poll = tty_poll,
04f378b1 805 .unlocked_ioctl = tty_ioctl,
e10cc1df 806 .compat_ioctl = tty_compat_ioctl,
1da177e4
LT
807 .open = tty_open,
808 .release = tty_release,
809 .fasync = tty_fasync,
810};
811
812#ifdef CONFIG_UNIX98_PTYS
62322d25 813static const struct file_operations ptmx_fops = {
1da177e4
LT
814 .llseek = no_llseek,
815 .read = tty_read,
816 .write = tty_write,
817 .poll = tty_poll,
04f378b1 818 .unlocked_ioctl = tty_ioctl,
e10cc1df 819 .compat_ioctl = tty_compat_ioctl,
1da177e4
LT
820 .open = ptmx_open,
821 .release = tty_release,
822 .fasync = tty_fasync,
823};
824#endif
825
62322d25 826static const struct file_operations console_fops = {
1da177e4
LT
827 .llseek = no_llseek,
828 .read = tty_read,
829 .write = redirected_tty_write,
830 .poll = tty_poll,
04f378b1 831 .unlocked_ioctl = tty_ioctl,
e10cc1df 832 .compat_ioctl = tty_compat_ioctl,
1da177e4
LT
833 .open = tty_open,
834 .release = tty_release,
835 .fasync = tty_fasync,
836};
837
62322d25 838static const struct file_operations hung_up_tty_fops = {
1da177e4
LT
839 .llseek = no_llseek,
840 .read = hung_up_tty_read,
841 .write = hung_up_tty_write,
842 .poll = hung_up_tty_poll,
04f378b1 843 .unlocked_ioctl = hung_up_tty_ioctl,
38ad2ed0 844 .compat_ioctl = hung_up_tty_compat_ioctl,
1da177e4
LT
845 .release = tty_release,
846};
847
848static DEFINE_SPINLOCK(redirect_lock);
849static struct file *redirect;
850
851/**
852 * tty_wakeup - request more data
853 * @tty: terminal
854 *
855 * Internal and external helper for wakeups of tty. This function
856 * informs the line discipline if present that the driver is ready
857 * to receive more output data.
858 */
37bdfb07 859
1da177e4
LT
860void tty_wakeup(struct tty_struct *tty)
861{
862 struct tty_ldisc *ld;
37bdfb07 863
1da177e4
LT
864 if (test_bit(TTY_DO_WRITE_WAKEUP, &tty->flags)) {
865 ld = tty_ldisc_ref(tty);
37bdfb07 866 if (ld) {
a352def2
AC
867 if (ld->ops->write_wakeup)
868 ld->ops->write_wakeup(tty);
1da177e4
LT
869 tty_ldisc_deref(ld);
870 }
871 }
872 wake_up_interruptible(&tty->write_wait);
873}
874
875EXPORT_SYMBOL_GPL(tty_wakeup);
876
877/**
878 * tty_ldisc_flush - flush line discipline queue
879 * @tty: tty
880 *
881 * Flush the line discipline queue (if any) for this tty. If there
882 * is no line discipline active this is a no-op.
883 */
37bdfb07 884
1da177e4
LT
885void tty_ldisc_flush(struct tty_struct *tty)
886{
887 struct tty_ldisc *ld = tty_ldisc_ref(tty);
37bdfb07 888 if (ld) {
a352def2
AC
889 if (ld->ops->flush_buffer)
890 ld->ops->flush_buffer(tty);
1da177e4
LT
891 tty_ldisc_deref(ld);
892 }
c5c34d48 893 tty_buffer_flush(tty);
1da177e4
LT
894}
895
896EXPORT_SYMBOL_GPL(tty_ldisc_flush);
edc6afc5
AC
897
898/**
899 * tty_reset_termios - reset terminal state
900 * @tty: tty to reset
901 *
902 * Restore a terminal to the driver default state
903 */
904
905static void tty_reset_termios(struct tty_struct *tty)
906{
907 mutex_lock(&tty->termios_mutex);
908 *tty->termios = tty->driver->init_termios;
909 tty->termios->c_ispeed = tty_termios_input_baud_rate(tty->termios);
910 tty->termios->c_ospeed = tty_termios_baud_rate(tty->termios);
911 mutex_unlock(&tty->termios_mutex);
912}
37bdfb07 913
af9b897e
AC
914/**
915 * do_tty_hangup - actual handler for hangup events
65f27f38 916 * @work: tty device
af9b897e 917 *
1bad879a 918 * This can be called by the "eventd" kernel thread. That is process
af9b897e
AC
919 * synchronous but doesn't hold any locks, so we need to make sure we
920 * have the appropriate locks for what we're doing.
921 *
922 * The hangup event clears any pending redirections onto the hung up
923 * device. It ensures future writes will error and it does the needed
924 * line discipline hangup and signal delivery. The tty object itself
925 * remains intact.
926 *
927 * Locking:
928 * BKL
24ec839c
PZ
929 * redirect lock for undoing redirection
930 * file list lock for manipulating list of ttys
931 * tty_ldisc_lock from called functions
932 * termios_mutex resetting termios data
933 * tasklist_lock to walk task list for hangup event
934 * ->siglock to protect ->signal/->sighand
1da177e4 935 */
65f27f38 936static void do_tty_hangup(struct work_struct *work)
1da177e4 937{
65f27f38
DH
938 struct tty_struct *tty =
939 container_of(work, struct tty_struct, hangup_work);
37bdfb07 940 struct file *cons_filp = NULL;
1da177e4
LT
941 struct file *filp, *f = NULL;
942 struct task_struct *p;
943 struct tty_ldisc *ld;
944 int closecount = 0, n;
47f86834 945 unsigned long flags;
1da177e4
LT
946
947 if (!tty)
948 return;
949
950 /* inuse_filps is protected by the single kernel lock */
951 lock_kernel();
952
953 spin_lock(&redirect_lock);
954 if (redirect && redirect->private_data == tty) {
955 f = redirect;
956 redirect = NULL;
957 }
958 spin_unlock(&redirect_lock);
37bdfb07 959
1da177e4
LT
960 check_tty_count(tty, "do_tty_hangup");
961 file_list_lock();
962 /* This breaks for file handles being sent over AF_UNIX sockets ? */
2f512016 963 list_for_each_entry(filp, &tty->tty_files, f_u.fu_list) {
1da177e4
LT
964 if (filp->f_op->write == redirected_tty_write)
965 cons_filp = filp;
966 if (filp->f_op->write != tty_write)
967 continue;
968 closecount++;
969 tty_fasync(-1, filp, 0); /* can't block */
970 filp->f_op = &hung_up_tty_fops;
971 }
972 file_list_unlock();
37bdfb07
AC
973 /*
974 * FIXME! What are the locking issues here? This may me overdoing
975 * things... This question is especially important now that we've
976 * removed the irqlock.
977 */
1da177e4 978 ld = tty_ldisc_ref(tty);
37bdfb07
AC
979 if (ld != NULL) {
980 /* We may have no line discipline at this point */
a352def2
AC
981 if (ld->ops->flush_buffer)
982 ld->ops->flush_buffer(tty);
f34d7a5b 983 tty_driver_flush_buffer(tty);
1da177e4 984 if ((test_bit(TTY_DO_WRITE_WAKEUP, &tty->flags)) &&
a352def2
AC
985 ld->ops->write_wakeup)
986 ld->ops->write_wakeup(tty);
987 if (ld->ops->hangup)
988 ld->ops->hangup(tty);
1da177e4 989 }
37bdfb07
AC
990 /*
991 * FIXME: Once we trust the LDISC code better we can wait here for
992 * ldisc completion and fix the driver call race
993 */
1da177e4
LT
994 wake_up_interruptible(&tty->write_wait);
995 wake_up_interruptible(&tty->read_wait);
1da177e4
LT
996 /*
997 * Shutdown the current line discipline, and reset it to
998 * N_TTY.
999 */
1000 if (tty->driver->flags & TTY_DRIVER_RESET_TERMIOS)
edc6afc5 1001 tty_reset_termios(tty);
1da177e4
LT
1002 /* Defer ldisc switch */
1003 /* tty_deferred_ldisc_switch(N_TTY);
37bdfb07 1004
1da177e4
LT
1005 This should get done automatically when the port closes and
1006 tty_release is called */
37bdfb07 1007
1da177e4 1008 read_lock(&tasklist_lock);
ab521dc0
EB
1009 if (tty->session) {
1010 do_each_pid_task(tty->session, PIDTYPE_SID, p) {
24ec839c 1011 spin_lock_irq(&p->sighand->siglock);
1da177e4
LT
1012 if (p->signal->tty == tty)
1013 p->signal->tty = NULL;
24ec839c
PZ
1014 if (!p->signal->leader) {
1015 spin_unlock_irq(&p->sighand->siglock);
1da177e4 1016 continue;
24ec839c
PZ
1017 }
1018 __group_send_sig_info(SIGHUP, SEND_SIG_PRIV, p);
1019 __group_send_sig_info(SIGCONT, SEND_SIG_PRIV, p);
ab521dc0 1020 put_pid(p->signal->tty_old_pgrp); /* A noop */
47f86834 1021 spin_lock_irqsave(&tty->ctrl_lock, flags);
ab521dc0
EB
1022 if (tty->pgrp)
1023 p->signal->tty_old_pgrp = get_pid(tty->pgrp);
47f86834 1024 spin_unlock_irqrestore(&tty->ctrl_lock, flags);
24ec839c 1025 spin_unlock_irq(&p->sighand->siglock);
ab521dc0 1026 } while_each_pid_task(tty->session, PIDTYPE_SID, p);
1da177e4
LT
1027 }
1028 read_unlock(&tasklist_lock);
1029
47f86834 1030 spin_lock_irqsave(&tty->ctrl_lock, flags);
1da177e4 1031 tty->flags = 0;
d9c1e9a8
EB
1032 put_pid(tty->session);
1033 put_pid(tty->pgrp);
ab521dc0
EB
1034 tty->session = NULL;
1035 tty->pgrp = NULL;
1da177e4 1036 tty->ctrl_status = 0;
47f86834
AC
1037 spin_unlock_irqrestore(&tty->ctrl_lock, flags);
1038
1da177e4 1039 /*
37bdfb07
AC
1040 * If one of the devices matches a console pointer, we
1041 * cannot just call hangup() because that will cause
1042 * tty->count and state->count to go out of sync.
1043 * So we just call close() the right number of times.
1da177e4
LT
1044 */
1045 if (cons_filp) {
f34d7a5b 1046 if (tty->ops->close)
1da177e4 1047 for (n = 0; n < closecount; n++)
f34d7a5b
AC
1048 tty->ops->close(tty, cons_filp);
1049 } else if (tty->ops->hangup)
1050 (tty->ops->hangup)(tty);
37bdfb07
AC
1051 /*
1052 * We don't want to have driver/ldisc interactions beyond
1053 * the ones we did here. The driver layer expects no
1054 * calls after ->hangup() from the ldisc side. However we
1055 * can't yet guarantee all that.
1056 */
1da177e4
LT
1057 set_bit(TTY_HUPPED, &tty->flags);
1058 if (ld) {
1059 tty_ldisc_enable(tty);
1060 tty_ldisc_deref(ld);
1061 }
1062 unlock_kernel();
1063 if (f)
1064 fput(f);
1065}
1066
af9b897e
AC
1067/**
1068 * tty_hangup - trigger a hangup event
1069 * @tty: tty to hangup
1070 *
1071 * A carrier loss (virtual or otherwise) has occurred on this like
1072 * schedule a hangup sequence to run after this event.
1073 */
1074
37bdfb07 1075void tty_hangup(struct tty_struct *tty)
1da177e4
LT
1076{
1077#ifdef TTY_DEBUG_HANGUP
1078 char buf[64];
1da177e4
LT
1079 printk(KERN_DEBUG "%s hangup...\n", tty_name(tty, buf));
1080#endif
1081 schedule_work(&tty->hangup_work);
1082}
1083
1084EXPORT_SYMBOL(tty_hangup);
1085
af9b897e
AC
1086/**
1087 * tty_vhangup - process vhangup
1088 * @tty: tty to hangup
1089 *
1090 * The user has asked via system call for the terminal to be hung up.
1091 * We do this synchronously so that when the syscall returns the process
3a4fa0a2 1092 * is complete. That guarantee is necessary for security reasons.
af9b897e
AC
1093 */
1094
37bdfb07 1095void tty_vhangup(struct tty_struct *tty)
1da177e4
LT
1096{
1097#ifdef TTY_DEBUG_HANGUP
1098 char buf[64];
1099
1100 printk(KERN_DEBUG "%s vhangup...\n", tty_name(tty, buf));
1101#endif
65f27f38 1102 do_tty_hangup(&tty->hangup_work);
1da177e4 1103}
37bdfb07 1104
1da177e4
LT
1105EXPORT_SYMBOL(tty_vhangup);
1106
af9b897e
AC
1107/**
1108 * tty_hung_up_p - was tty hung up
1109 * @filp: file pointer of tty
1110 *
1111 * Return true if the tty has been subject to a vhangup or a carrier
1112 * loss
1113 */
1114
37bdfb07 1115int tty_hung_up_p(struct file *filp)
1da177e4
LT
1116{
1117 return (filp->f_op == &hung_up_tty_fops);
1118}
1119
1120EXPORT_SYMBOL(tty_hung_up_p);
1121
ab521dc0 1122static void session_clear_tty(struct pid *session)
24ec839c
PZ
1123{
1124 struct task_struct *p;
ab521dc0 1125 do_each_pid_task(session, PIDTYPE_SID, p) {
24ec839c 1126 proc_clear_tty(p);
ab521dc0 1127 } while_each_pid_task(session, PIDTYPE_SID, p);
24ec839c
PZ
1128}
1129
af9b897e
AC
1130/**
1131 * disassociate_ctty - disconnect controlling tty
1132 * @on_exit: true if exiting so need to "hang up" the session
1da177e4 1133 *
af9b897e
AC
1134 * This function is typically called only by the session leader, when
1135 * it wants to disassociate itself from its controlling tty.
1136 *
1137 * It performs the following functions:
1da177e4
LT
1138 * (1) Sends a SIGHUP and SIGCONT to the foreground process group
1139 * (2) Clears the tty from being controlling the session
1140 * (3) Clears the controlling tty for all processes in the
1141 * session group.
1142 *
af9b897e
AC
1143 * The argument on_exit is set to 1 if called when a process is
1144 * exiting; it is 0 if called by the ioctl TIOCNOTTY.
1145 *
24ec839c 1146 * Locking:
af9b897e 1147 * BKL is taken for hysterical raisins
24ec839c
PZ
1148 * tty_mutex is taken to protect tty
1149 * ->siglock is taken to protect ->signal/->sighand
1150 * tasklist_lock is taken to walk process list for sessions
1151 * ->siglock is taken to protect ->signal/->sighand
1da177e4 1152 */
af9b897e 1153
1da177e4
LT
1154void disassociate_ctty(int on_exit)
1155{
1156 struct tty_struct *tty;
ab521dc0 1157 struct pid *tty_pgrp = NULL;
1da177e4 1158
1da177e4 1159
70522e12 1160 mutex_lock(&tty_mutex);
24ec839c 1161 tty = get_current_tty();
1da177e4 1162 if (tty) {
ab521dc0 1163 tty_pgrp = get_pid(tty->pgrp);
04f378b1 1164 lock_kernel();
000b9151 1165 mutex_unlock(&tty_mutex);
24ec839c 1166 /* XXX: here we race, there is nothing protecting tty */
1da177e4
LT
1167 if (on_exit && tty->driver->type != TTY_DRIVER_TYPE_PTY)
1168 tty_vhangup(tty);
04f378b1 1169 unlock_kernel();
680a9671 1170 } else if (on_exit) {
ab521dc0 1171 struct pid *old_pgrp;
680a9671
EB
1172 spin_lock_irq(&current->sighand->siglock);
1173 old_pgrp = current->signal->tty_old_pgrp;
ab521dc0 1174 current->signal->tty_old_pgrp = NULL;
680a9671 1175 spin_unlock_irq(&current->sighand->siglock);
24ec839c 1176 if (old_pgrp) {
ab521dc0
EB
1177 kill_pgrp(old_pgrp, SIGHUP, on_exit);
1178 kill_pgrp(old_pgrp, SIGCONT, on_exit);
1179 put_pid(old_pgrp);
1da177e4 1180 }
70522e12 1181 mutex_unlock(&tty_mutex);
1da177e4
LT
1182 return;
1183 }
ab521dc0
EB
1184 if (tty_pgrp) {
1185 kill_pgrp(tty_pgrp, SIGHUP, on_exit);
1da177e4 1186 if (!on_exit)
ab521dc0
EB
1187 kill_pgrp(tty_pgrp, SIGCONT, on_exit);
1188 put_pid(tty_pgrp);
1da177e4
LT
1189 }
1190
24ec839c 1191 spin_lock_irq(&current->sighand->siglock);
2a65f1d9 1192 put_pid(current->signal->tty_old_pgrp);
23cac8de 1193 current->signal->tty_old_pgrp = NULL;
24ec839c
PZ
1194 spin_unlock_irq(&current->sighand->siglock);
1195
1196 mutex_lock(&tty_mutex);
1197 /* It is possible that do_tty_hangup has free'd this tty */
1198 tty = get_current_tty();
1199 if (tty) {
47f86834
AC
1200 unsigned long flags;
1201 spin_lock_irqsave(&tty->ctrl_lock, flags);
ab521dc0
EB
1202 put_pid(tty->session);
1203 put_pid(tty->pgrp);
1204 tty->session = NULL;
1205 tty->pgrp = NULL;
47f86834 1206 spin_unlock_irqrestore(&tty->ctrl_lock, flags);
24ec839c
PZ
1207 } else {
1208#ifdef TTY_DEBUG_HANGUP
1209 printk(KERN_DEBUG "error attempted to write to tty [0x%p]"
1210 " = NULL", tty);
1211#endif
1212 }
1213 mutex_unlock(&tty_mutex);
1da177e4
LT
1214
1215 /* Now clear signal->tty under the lock */
1216 read_lock(&tasklist_lock);
ab521dc0 1217 session_clear_tty(task_session(current));
1da177e4 1218 read_unlock(&tasklist_lock);
1da177e4
LT
1219}
1220
98a27ba4
EB
1221/**
1222 *
1223 * no_tty - Ensure the current process does not have a controlling tty
1224 */
1225void no_tty(void)
1226{
1227 struct task_struct *tsk = current;
04f378b1 1228 lock_kernel();
98a27ba4
EB
1229 if (tsk->signal->leader)
1230 disassociate_ctty(0);
04f378b1 1231 unlock_kernel();
98a27ba4
EB
1232 proc_clear_tty(tsk);
1233}
1234
af9b897e
AC
1235
1236/**
beb7dd86 1237 * stop_tty - propagate flow control
af9b897e
AC
1238 * @tty: tty to stop
1239 *
1240 * Perform flow control to the driver. For PTY/TTY pairs we
beb7dd86 1241 * must also propagate the TIOCKPKT status. May be called
af9b897e
AC
1242 * on an already stopped device and will not re-call the driver
1243 * method.
1244 *
1245 * This functionality is used by both the line disciplines for
1246 * halting incoming flow and by the driver. It may therefore be
1247 * called from any context, may be under the tty atomic_write_lock
1248 * but not always.
1249 *
1250 * Locking:
04f378b1 1251 * Uses the tty control lock internally
af9b897e
AC
1252 */
1253
1da177e4
LT
1254void stop_tty(struct tty_struct *tty)
1255{
04f378b1
AC
1256 unsigned long flags;
1257 spin_lock_irqsave(&tty->ctrl_lock, flags);
1258 if (tty->stopped) {
1259 spin_unlock_irqrestore(&tty->ctrl_lock, flags);
1da177e4 1260 return;
04f378b1 1261 }
1da177e4
LT
1262 tty->stopped = 1;
1263 if (tty->link && tty->link->packet) {
1264 tty->ctrl_status &= ~TIOCPKT_START;
1265 tty->ctrl_status |= TIOCPKT_STOP;
1266 wake_up_interruptible(&tty->link->read_wait);
1267 }
04f378b1 1268 spin_unlock_irqrestore(&tty->ctrl_lock, flags);
f34d7a5b
AC
1269 if (tty->ops->stop)
1270 (tty->ops->stop)(tty);
1da177e4
LT
1271}
1272
1273EXPORT_SYMBOL(stop_tty);
1274
af9b897e 1275/**
beb7dd86 1276 * start_tty - propagate flow control
af9b897e
AC
1277 * @tty: tty to start
1278 *
1279 * Start a tty that has been stopped if at all possible. Perform
3a4fa0a2 1280 * any necessary wakeups and propagate the TIOCPKT status. If this
af9b897e
AC
1281 * is the tty was previous stopped and is being started then the
1282 * driver start method is invoked and the line discipline woken.
1283 *
1284 * Locking:
04f378b1 1285 * ctrl_lock
af9b897e
AC
1286 */
1287
1da177e4
LT
1288void start_tty(struct tty_struct *tty)
1289{
04f378b1
AC
1290 unsigned long flags;
1291 spin_lock_irqsave(&tty->ctrl_lock, flags);
1292 if (!tty->stopped || tty->flow_stopped) {
1293 spin_unlock_irqrestore(&tty->ctrl_lock, flags);
1da177e4 1294 return;
04f378b1 1295 }
1da177e4
LT
1296 tty->stopped = 0;
1297 if (tty->link && tty->link->packet) {
1298 tty->ctrl_status &= ~TIOCPKT_STOP;
1299 tty->ctrl_status |= TIOCPKT_START;
1300 wake_up_interruptible(&tty->link->read_wait);
1301 }
04f378b1 1302 spin_unlock_irqrestore(&tty->ctrl_lock, flags);
f34d7a5b
AC
1303 if (tty->ops->start)
1304 (tty->ops->start)(tty);
1da177e4
LT
1305 /* If we have a running line discipline it may need kicking */
1306 tty_wakeup(tty);
1da177e4
LT
1307}
1308
1309EXPORT_SYMBOL(start_tty);
1310
af9b897e
AC
1311/**
1312 * tty_read - read method for tty device files
1313 * @file: pointer to tty file
1314 * @buf: user buffer
1315 * @count: size of user buffer
1316 * @ppos: unused
1317 *
1318 * Perform the read system call function on this terminal device. Checks
1319 * for hung up devices before calling the line discipline method.
1320 *
1321 * Locking:
47f86834
AC
1322 * Locks the line discipline internally while needed. Multiple
1323 * read calls may be outstanding in parallel.
af9b897e
AC
1324 */
1325
37bdfb07 1326static ssize_t tty_read(struct file *file, char __user *buf, size_t count,
1da177e4
LT
1327 loff_t *ppos)
1328{
1329 int i;
37bdfb07 1330 struct tty_struct *tty;
1da177e4
LT
1331 struct inode *inode;
1332 struct tty_ldisc *ld;
1333
1334 tty = (struct tty_struct *)file->private_data;
a7113a96 1335 inode = file->f_path.dentry->d_inode;
1da177e4
LT
1336 if (tty_paranoia_check(tty, inode, "tty_read"))
1337 return -EIO;
1338 if (!tty || (test_bit(TTY_IO_ERROR, &tty->flags)))
1339 return -EIO;
1340
1341 /* We want to wait for the line discipline to sort out in this
1342 situation */
1343 ld = tty_ldisc_ref_wait(tty);
a352def2
AC
1344 if (ld->ops->read)
1345 i = (ld->ops->read)(tty, file, buf, count);
1da177e4
LT
1346 else
1347 i = -EIO;
1348 tty_ldisc_deref(ld);
1da177e4
LT
1349 if (i > 0)
1350 inode->i_atime = current_fs_time(inode->i_sb);
1351 return i;
1352}
1353
9c1729db
AC
1354void tty_write_unlock(struct tty_struct *tty)
1355{
1356 mutex_unlock(&tty->atomic_write_lock);
1357 wake_up_interruptible(&tty->write_wait);
1358}
1359
1360int tty_write_lock(struct tty_struct *tty, int ndelay)
1361{
1362 if (!mutex_trylock(&tty->atomic_write_lock)) {
1363 if (ndelay)
1364 return -EAGAIN;
1365 if (mutex_lock_interruptible(&tty->atomic_write_lock))
1366 return -ERESTARTSYS;
1367 }
1368 return 0;
1369}
1370
1da177e4
LT
1371/*
1372 * Split writes up in sane blocksizes to avoid
1373 * denial-of-service type attacks
1374 */
1375static inline ssize_t do_tty_write(
1376 ssize_t (*write)(struct tty_struct *, struct file *, const unsigned char *, size_t),
1377 struct tty_struct *tty,
1378 struct file *file,
1379 const char __user *buf,
1380 size_t count)
1381{
9c1729db 1382 ssize_t ret, written = 0;
1da177e4 1383 unsigned int chunk;
37bdfb07 1384
9c1729db
AC
1385 ret = tty_write_lock(tty, file->f_flags & O_NDELAY);
1386 if (ret < 0)
1387 return ret;
1da177e4
LT
1388
1389 /*
1390 * We chunk up writes into a temporary buffer. This
1391 * simplifies low-level drivers immensely, since they
1392 * don't have locking issues and user mode accesses.
1393 *
1394 * But if TTY_NO_WRITE_SPLIT is set, we should use a
1395 * big chunk-size..
1396 *
1397 * The default chunk-size is 2kB, because the NTTY
1398 * layer has problems with bigger chunks. It will
1399 * claim to be able to handle more characters than
1400 * it actually does.
af9b897e
AC
1401 *
1402 * FIXME: This can probably go away now except that 64K chunks
1403 * are too likely to fail unless switched to vmalloc...
1da177e4
LT
1404 */
1405 chunk = 2048;
1406 if (test_bit(TTY_NO_WRITE_SPLIT, &tty->flags))
1407 chunk = 65536;
1408 if (count < chunk)
1409 chunk = count;
1410
70522e12 1411 /* write_buf/write_cnt is protected by the atomic_write_lock mutex */
1da177e4
LT
1412 if (tty->write_cnt < chunk) {
1413 unsigned char *buf;
1414
1415 if (chunk < 1024)
1416 chunk = 1024;
1417
1418 buf = kmalloc(chunk, GFP_KERNEL);
1419 if (!buf) {
9c1729db
AC
1420 ret = -ENOMEM;
1421 goto out;
1da177e4
LT
1422 }
1423 kfree(tty->write_buf);
1424 tty->write_cnt = chunk;
1425 tty->write_buf = buf;
1426 }
1427
1428 /* Do the write .. */
1429 for (;;) {
1430 size_t size = count;
1431 if (size > chunk)
1432 size = chunk;
1433 ret = -EFAULT;
1434 if (copy_from_user(tty->write_buf, buf, size))
1435 break;
1da177e4 1436 ret = write(tty, file, tty->write_buf, size);
1da177e4
LT
1437 if (ret <= 0)
1438 break;
1439 written += ret;
1440 buf += ret;
1441 count -= ret;
1442 if (!count)
1443 break;
1444 ret = -ERESTARTSYS;
1445 if (signal_pending(current))
1446 break;
1447 cond_resched();
1448 }
1449 if (written) {
a7113a96 1450 struct inode *inode = file->f_path.dentry->d_inode;
1da177e4
LT
1451 inode->i_mtime = current_fs_time(inode->i_sb);
1452 ret = written;
1453 }
9c1729db
AC
1454out:
1455 tty_write_unlock(tty);
1da177e4
LT
1456 return ret;
1457}
1458
1459
af9b897e
AC
1460/**
1461 * tty_write - write method for tty device file
1462 * @file: tty file pointer
1463 * @buf: user data to write
1464 * @count: bytes to write
1465 * @ppos: unused
1466 *
1467 * Write data to a tty device via the line discipline.
1468 *
1469 * Locking:
1470 * Locks the line discipline as required
1471 * Writes to the tty driver are serialized by the atomic_write_lock
1472 * and are then processed in chunks to the device. The line discipline
1473 * write method will not be involked in parallel for each device
1474 * The line discipline write method is called under the big
1475 * kernel lock for historical reasons. New code should not rely on this.
1476 */
1477
37bdfb07
AC
1478static ssize_t tty_write(struct file *file, const char __user *buf,
1479 size_t count, loff_t *ppos)
1da177e4 1480{
37bdfb07 1481 struct tty_struct *tty;
a7113a96 1482 struct inode *inode = file->f_path.dentry->d_inode;
1da177e4
LT
1483 ssize_t ret;
1484 struct tty_ldisc *ld;
37bdfb07 1485
1da177e4
LT
1486 tty = (struct tty_struct *)file->private_data;
1487 if (tty_paranoia_check(tty, inode, "tty_write"))
1488 return -EIO;
f34d7a5b 1489 if (!tty || !tty->ops->write ||
37bdfb07
AC
1490 (test_bit(TTY_IO_ERROR, &tty->flags)))
1491 return -EIO;
f34d7a5b
AC
1492 /* Short term debug to catch buggy drivers */
1493 if (tty->ops->write_room == NULL)
1494 printk(KERN_ERR "tty driver %s lacks a write_room method.\n",
1495 tty->driver->name);
37bdfb07 1496 ld = tty_ldisc_ref_wait(tty);
a352def2 1497 if (!ld->ops->write)
1da177e4
LT
1498 ret = -EIO;
1499 else
a352def2 1500 ret = do_tty_write(ld->ops->write, tty, file, buf, count);
1da177e4
LT
1501 tty_ldisc_deref(ld);
1502 return ret;
1503}
1504
37bdfb07
AC
1505ssize_t redirected_tty_write(struct file *file, const char __user *buf,
1506 size_t count, loff_t *ppos)
1da177e4
LT
1507{
1508 struct file *p = NULL;
1509
1510 spin_lock(&redirect_lock);
1511 if (redirect) {
1512 get_file(redirect);
1513 p = redirect;
1514 }
1515 spin_unlock(&redirect_lock);
1516
1517 if (p) {
1518 ssize_t res;
1519 res = vfs_write(p, buf, count, &p->f_pos);
1520 fput(p);
1521 return res;
1522 }
1da177e4
LT
1523 return tty_write(file, buf, count, ppos);
1524}
1525
6f67048c
AC
1526void tty_port_init(struct tty_port *port)
1527{
1528 memset(port, 0, sizeof(*port));
1529 init_waitqueue_head(&port->open_wait);
1530 init_waitqueue_head(&port->close_wait);
1531 mutex_init(&port->mutex);
44b7d1b3
AC
1532 port->close_delay = (50 * HZ) / 100;
1533 port->closing_wait = (3000 * HZ) / 100;
6f67048c
AC
1534}
1535EXPORT_SYMBOL(tty_port_init);
1536
1537int tty_port_alloc_xmit_buf(struct tty_port *port)
1538{
1539 /* We may sleep in get_zeroed_page() */
1540 mutex_lock(&port->mutex);
1541 if (port->xmit_buf == NULL)
1542 port->xmit_buf = (unsigned char *)get_zeroed_page(GFP_KERNEL);
1543 mutex_unlock(&port->mutex);
1544 if (port->xmit_buf == NULL)
1545 return -ENOMEM;
1546 return 0;
1547}
1548EXPORT_SYMBOL(tty_port_alloc_xmit_buf);
1549
1550void tty_port_free_xmit_buf(struct tty_port *port)
1551{
1552 mutex_lock(&port->mutex);
1553 if (port->xmit_buf != NULL) {
1554 free_page((unsigned long)port->xmit_buf);
1555 port->xmit_buf = NULL;
1556 }
1557 mutex_unlock(&port->mutex);
1558}
1559EXPORT_SYMBOL(tty_port_free_xmit_buf);
1560
1561
1da177e4
LT
1562static char ptychar[] = "pqrstuvwxyzabcde";
1563
af9b897e
AC
1564/**
1565 * pty_line_name - generate name for a pty
1566 * @driver: the tty driver in use
1567 * @index: the minor number
1568 * @p: output buffer of at least 6 bytes
1569 *
1570 * Generate a name from a driver reference and write it to the output
1571 * buffer.
1572 *
1573 * Locking: None
1574 */
1575static void pty_line_name(struct tty_driver *driver, int index, char *p)
1da177e4
LT
1576{
1577 int i = index + driver->name_base;
1578 /* ->name is initialized to "ttyp", but "tty" is expected */
1579 sprintf(p, "%s%c%x",
37bdfb07
AC
1580 driver->subtype == PTY_TYPE_SLAVE ? "tty" : driver->name,
1581 ptychar[i >> 4 & 0xf], i & 0xf);
1da177e4
LT
1582}
1583
af9b897e
AC
1584/**
1585 * pty_line_name - generate name for a tty
1586 * @driver: the tty driver in use
1587 * @index: the minor number
1588 * @p: output buffer of at least 7 bytes
1589 *
1590 * Generate a name from a driver reference and write it to the output
1591 * buffer.
1592 *
1593 * Locking: None
1594 */
1595static void tty_line_name(struct tty_driver *driver, int index, char *p)
1da177e4
LT
1596{
1597 sprintf(p, "%s%d", driver->name, index + driver->name_base);
1598}
1599
af9b897e
AC
1600/**
1601 * init_dev - initialise a tty device
1602 * @driver: tty driver we are opening a device on
1603 * @idx: device index
1604 * @tty: returned tty structure
1605 *
1606 * Prepare a tty device. This may not be a "new" clean device but
1607 * could also be an active device. The pty drivers require special
1608 * handling because of this.
1609 *
1610 * Locking:
1611 * The function is called under the tty_mutex, which
1612 * protects us from the tty struct or driver itself going away.
1613 *
1614 * On exit the tty device has the line discipline attached and
1615 * a reference count of 1. If a pair was created for pty/tty use
1616 * and the other was a pty master then it too has a reference count of 1.
1617 *
1da177e4 1618 * WSH 06/09/97: Rewritten to remove races and properly clean up after a
70522e12
IM
1619 * failed open. The new code protects the open with a mutex, so it's
1620 * really quite straightforward. The mutex locking can probably be
1da177e4
LT
1621 * relaxed for the (most common) case of reopening a tty.
1622 */
af9b897e 1623
1da177e4
LT
1624static int init_dev(struct tty_driver *driver, int idx,
1625 struct tty_struct **ret_tty)
1626{
1627 struct tty_struct *tty, *o_tty;
edc6afc5
AC
1628 struct ktermios *tp, **tp_loc, *o_tp, **o_tp_loc;
1629 struct ktermios *ltp, **ltp_loc, *o_ltp, **o_ltp_loc;
af9b897e 1630 int retval = 0;
1da177e4
LT
1631
1632 /* check whether we're reopening an existing tty */
1633 if (driver->flags & TTY_DRIVER_DEVPTS_MEM) {
1634 tty = devpts_get_tty(idx);
5a39e8c6
ASRF
1635 /*
1636 * If we don't have a tty here on a slave open, it's because
1637 * the master already started the close process and there's
1638 * no relation between devpts file and tty anymore.
1639 */
1640 if (!tty && driver->subtype == PTY_TYPE_SLAVE) {
1641 retval = -EIO;
1642 goto end_init;
1643 }
1644 /*
1645 * It's safe from now on because init_dev() is called with
1646 * tty_mutex held and release_dev() won't change tty->count
1647 * or tty->flags without having to grab tty_mutex
1648 */
1da177e4
LT
1649 if (tty && driver->subtype == PTY_TYPE_MASTER)
1650 tty = tty->link;
1651 } else {
1652 tty = driver->ttys[idx];
1653 }
1654 if (tty) goto fast_track;
1655
1656 /*
1657 * First time open is complex, especially for PTY devices.
1658 * This code guarantees that either everything succeeds and the
1659 * TTY is ready for operation, or else the table slots are vacated
37bdfb07 1660 * and the allocated memory released. (Except that the termios
1da177e4
LT
1661 * and locked termios may be retained.)
1662 */
1663
1664 if (!try_module_get(driver->owner)) {
1665 retval = -ENODEV;
1666 goto end_init;
1667 }
1668
1669 o_tty = NULL;
1670 tp = o_tp = NULL;
1671 ltp = o_ltp = NULL;
1672
1673 tty = alloc_tty_struct();
37bdfb07 1674 if (!tty)
1da177e4
LT
1675 goto fail_no_mem;
1676 initialize_tty_struct(tty);
1677 tty->driver = driver;
f34d7a5b 1678 tty->ops = driver->ops;
1da177e4
LT
1679 tty->index = idx;
1680 tty_line_name(driver, idx, tty->name);
1681
1682 if (driver->flags & TTY_DRIVER_DEVPTS_MEM) {
1683 tp_loc = &tty->termios;
1684 ltp_loc = &tty->termios_locked;
1685 } else {
1686 tp_loc = &driver->termios[idx];
1687 ltp_loc = &driver->termios_locked[idx];
1688 }
1689
1690 if (!*tp_loc) {
abcb1ff3 1691 tp = kmalloc(sizeof(struct ktermios), GFP_KERNEL);
1da177e4
LT
1692 if (!tp)
1693 goto free_mem_out;
1694 *tp = driver->init_termios;
1695 }
1696
1697 if (!*ltp_loc) {
506eb99a 1698 ltp = kzalloc(sizeof(struct ktermios), GFP_KERNEL);
1da177e4
LT
1699 if (!ltp)
1700 goto free_mem_out;
1da177e4
LT
1701 }
1702
1703 if (driver->type == TTY_DRIVER_TYPE_PTY) {
1704 o_tty = alloc_tty_struct();
1705 if (!o_tty)
1706 goto free_mem_out;
1707 initialize_tty_struct(o_tty);
1708 o_tty->driver = driver->other;
f34d7a5b 1709 o_tty->ops = driver->ops;
1da177e4
LT
1710 o_tty->index = idx;
1711 tty_line_name(driver->other, idx, o_tty->name);
1712
1713 if (driver->flags & TTY_DRIVER_DEVPTS_MEM) {
1714 o_tp_loc = &o_tty->termios;
1715 o_ltp_loc = &o_tty->termios_locked;
1716 } else {
1717 o_tp_loc = &driver->other->termios[idx];
1718 o_ltp_loc = &driver->other->termios_locked[idx];
1719 }
1720
1721 if (!*o_tp_loc) {
abcb1ff3 1722 o_tp = kmalloc(sizeof(struct ktermios), GFP_KERNEL);
1da177e4
LT
1723 if (!o_tp)
1724 goto free_mem_out;
1725 *o_tp = driver->other->init_termios;
1726 }
1727
1728 if (!*o_ltp_loc) {
506eb99a 1729 o_ltp = kzalloc(sizeof(struct ktermios), GFP_KERNEL);
1da177e4
LT
1730 if (!o_ltp)
1731 goto free_mem_out;
1da177e4
LT
1732 }
1733
1734 /*
1735 * Everything allocated ... set up the o_tty structure.
1736 */
37bdfb07 1737 if (!(driver->other->flags & TTY_DRIVER_DEVPTS_MEM))
1da177e4 1738 driver->other->ttys[idx] = o_tty;
1da177e4
LT
1739 if (!*o_tp_loc)
1740 *o_tp_loc = o_tp;
1741 if (!*o_ltp_loc)
1742 *o_ltp_loc = o_ltp;
1743 o_tty->termios = *o_tp_loc;
1744 o_tty->termios_locked = *o_ltp_loc;
1745 driver->other->refcount++;
1746 if (driver->subtype == PTY_TYPE_MASTER)
1747 o_tty->count++;
1748
1749 /* Establish the links in both directions */
1750 tty->link = o_tty;
1751 o_tty->link = tty;
1752 }
1753
37bdfb07 1754 /*
1da177e4 1755 * All structures have been allocated, so now we install them.
d5698c28 1756 * Failures after this point use release_tty to clean up, so
1da177e4
LT
1757 * there's no need to null out the local pointers.
1758 */
37bdfb07 1759 if (!(driver->flags & TTY_DRIVER_DEVPTS_MEM))
1da177e4 1760 driver->ttys[idx] = tty;
37bdfb07 1761
1da177e4
LT
1762 if (!*tp_loc)
1763 *tp_loc = tp;
1764 if (!*ltp_loc)
1765 *ltp_loc = ltp;
1766 tty->termios = *tp_loc;
1767 tty->termios_locked = *ltp_loc;
edc6afc5
AC
1768 /* Compatibility until drivers always set this */
1769 tty->termios->c_ispeed = tty_termios_input_baud_rate(tty->termios);
1770 tty->termios->c_ospeed = tty_termios_baud_rate(tty->termios);
1da177e4
LT
1771 driver->refcount++;
1772 tty->count++;
1773
37bdfb07 1774 /*
1da177e4 1775 * Structures all installed ... call the ldisc open routines.
d5698c28
CH
1776 * If we fail here just call release_tty to clean up. No need
1777 * to decrement the use counts, as release_tty doesn't care.
1da177e4
LT
1778 */
1779
01e1abb2
AC
1780 retval = tty_ldisc_setup(tty, o_tty);
1781
1782 if (retval)
1783 goto release_mem_out;
1784 goto success;
1da177e4
LT
1785
1786 /*
1787 * This fast open can be used if the tty is already open.
1788 * No memory is allocated, and the only failures are from
1789 * attempting to open a closing tty or attempting multiple
1790 * opens on a pty master.
1791 */
1792fast_track:
1793 if (test_bit(TTY_CLOSING, &tty->flags)) {
1794 retval = -EIO;
1795 goto end_init;
1796 }
1797 if (driver->type == TTY_DRIVER_TYPE_PTY &&
1798 driver->subtype == PTY_TYPE_MASTER) {
1799 /*
37bdfb07 1800 * special case for PTY masters: only one open permitted,
1da177e4
LT
1801 * and the slave side open count is incremented as well.
1802 */
1803 if (tty->count) {
1804 retval = -EIO;
1805 goto end_init;
1806 }
1807 tty->link->count++;
1808 }
1809 tty->count++;
1810 tty->driver = driver; /* N.B. why do this every time?? */
1811
1812 /* FIXME */
37bdfb07 1813 if (!test_bit(TTY_LDISC, &tty->flags))
1da177e4
LT
1814 printk(KERN_ERR "init_dev but no ldisc\n");
1815success:
1816 *ret_tty = tty;
37bdfb07 1817
70522e12 1818 /* All paths come through here to release the mutex */
1da177e4
LT
1819end_init:
1820 return retval;
1821
1822 /* Release locally allocated memory ... nothing placed in slots */
1823free_mem_out:
735d5661 1824 kfree(o_tp);
1da177e4
LT
1825 if (o_tty)
1826 free_tty_struct(o_tty);
735d5661
JJ
1827 kfree(ltp);
1828 kfree(tp);
1da177e4
LT
1829 free_tty_struct(tty);
1830
1831fail_no_mem:
1832 module_put(driver->owner);
1833 retval = -ENOMEM;
1834 goto end_init;
1835
d5698c28 1836 /* call the tty release_tty routine to clean out this slot */
1da177e4 1837release_mem_out:
4050914f
AM
1838 if (printk_ratelimit())
1839 printk(KERN_INFO "init_dev: ldisc open failed, "
1840 "clearing slot %d\n", idx);
d5698c28 1841 release_tty(tty, idx);
1da177e4
LT
1842 goto end_init;
1843}
1844
af9b897e 1845/**
d5698c28 1846 * release_one_tty - release tty structure memory
af9b897e
AC
1847 *
1848 * Releases memory associated with a tty structure, and clears out the
1849 * driver table slots. This function is called when a device is no longer
1850 * in use. It also gets called when setup of a device fails.
1851 *
1852 * Locking:
1853 * tty_mutex - sometimes only
1854 * takes the file list lock internally when working on the list
1855 * of ttys that the driver keeps.
1856 * FIXME: should we require tty_mutex is held here ??
1da177e4 1857 */
d5698c28 1858static void release_one_tty(struct tty_struct *tty, int idx)
1da177e4 1859{
1da177e4 1860 int devpts = tty->driver->flags & TTY_DRIVER_DEVPTS_MEM;
d5698c28 1861 struct ktermios *tp;
1da177e4
LT
1862
1863 if (!devpts)
1864 tty->driver->ttys[idx] = NULL;
d5698c28 1865
1da177e4
LT
1866 if (tty->driver->flags & TTY_DRIVER_RESET_TERMIOS) {
1867 tp = tty->termios;
1868 if (!devpts)
1869 tty->driver->termios[idx] = NULL;
1870 kfree(tp);
1871
1872 tp = tty->termios_locked;
1873 if (!devpts)
1874 tty->driver->termios_locked[idx] = NULL;
1875 kfree(tp);
1876 }
1877
d5698c28 1878
1da177e4
LT
1879 tty->magic = 0;
1880 tty->driver->refcount--;
d5698c28 1881
1da177e4
LT
1882 file_list_lock();
1883 list_del_init(&tty->tty_files);
1884 file_list_unlock();
d5698c28 1885
1da177e4
LT
1886 free_tty_struct(tty);
1887}
1888
d5698c28
CH
1889/**
1890 * release_tty - release tty structure memory
1891 *
1892 * Release both @tty and a possible linked partner (think pty pair),
1893 * and decrement the refcount of the backing module.
1894 *
1895 * Locking:
1896 * tty_mutex - sometimes only
1897 * takes the file list lock internally when working on the list
1898 * of ttys that the driver keeps.
1899 * FIXME: should we require tty_mutex is held here ??
1900 */
1901static void release_tty(struct tty_struct *tty, int idx)
1902{
1903 struct tty_driver *driver = tty->driver;
1904
1905 if (tty->link)
1906 release_one_tty(tty->link, idx);
1907 release_one_tty(tty, idx);
1908 module_put(driver->owner);
1909}
1910
1da177e4
LT
1911/*
1912 * Even releasing the tty structures is a tricky business.. We have
1913 * to be very careful that the structures are all released at the
1914 * same time, as interrupts might otherwise get the wrong pointers.
1915 *
1916 * WSH 09/09/97: rewritten to avoid some nasty race conditions that could
1917 * lead to double frees or releasing memory still in use.
1918 */
37bdfb07 1919static void release_dev(struct file *filp)
1da177e4
LT
1920{
1921 struct tty_struct *tty, *o_tty;
1922 int pty_master, tty_closing, o_tty_closing, do_sleep;
14a6283e 1923 int devpts;
1da177e4
LT
1924 int idx;
1925 char buf[64];
37bdfb07 1926
1da177e4 1927 tty = (struct tty_struct *)filp->private_data;
37bdfb07
AC
1928 if (tty_paranoia_check(tty, filp->f_path.dentry->d_inode,
1929 "release_dev"))
1da177e4
LT
1930 return;
1931
1932 check_tty_count(tty, "release_dev");
1933
1934 tty_fasync(-1, filp, 0);
1935
1936 idx = tty->index;
1937 pty_master = (tty->driver->type == TTY_DRIVER_TYPE_PTY &&
1938 tty->driver->subtype == PTY_TYPE_MASTER);
1939 devpts = (tty->driver->flags & TTY_DRIVER_DEVPTS_MEM) != 0;
1da177e4
LT
1940 o_tty = tty->link;
1941
1942#ifdef TTY_PARANOIA_CHECK
1943 if (idx < 0 || idx >= tty->driver->num) {
1944 printk(KERN_DEBUG "release_dev: bad idx when trying to "
1945 "free (%s)\n", tty->name);
1946 return;
1947 }
1948 if (!(tty->driver->flags & TTY_DRIVER_DEVPTS_MEM)) {
1949 if (tty != tty->driver->ttys[idx]) {
1950 printk(KERN_DEBUG "release_dev: driver.table[%d] not tty "
1951 "for (%s)\n", idx, tty->name);
1952 return;
1953 }
1954 if (tty->termios != tty->driver->termios[idx]) {
1955 printk(KERN_DEBUG "release_dev: driver.termios[%d] not termios "
1956 "for (%s)\n",
1957 idx, tty->name);
1958 return;
1959 }
1960 if (tty->termios_locked != tty->driver->termios_locked[idx]) {
1961 printk(KERN_DEBUG "release_dev: driver.termios_locked[%d] not "
1962 "termios_locked for (%s)\n",
1963 idx, tty->name);
1964 return;
1965 }
1966 }
1967#endif
1968
1969#ifdef TTY_DEBUG_HANGUP
1970 printk(KERN_DEBUG "release_dev of %s (tty count=%d)...",
1971 tty_name(tty, buf), tty->count);
1972#endif
1973
1974#ifdef TTY_PARANOIA_CHECK
1975 if (tty->driver->other &&
1976 !(tty->driver->flags & TTY_DRIVER_DEVPTS_MEM)) {
1977 if (o_tty != tty->driver->other->ttys[idx]) {
1978 printk(KERN_DEBUG "release_dev: other->table[%d] "
1979 "not o_tty for (%s)\n",
1980 idx, tty->name);
1981 return;
1982 }
1983 if (o_tty->termios != tty->driver->other->termios[idx]) {
1984 printk(KERN_DEBUG "release_dev: other->termios[%d] "
1985 "not o_termios for (%s)\n",
1986 idx, tty->name);
1987 return;
1988 }
37bdfb07 1989 if (o_tty->termios_locked !=
1da177e4
LT
1990 tty->driver->other->termios_locked[idx]) {
1991 printk(KERN_DEBUG "release_dev: other->termios_locked["
1992 "%d] not o_termios_locked for (%s)\n",
1993 idx, tty->name);
1994 return;
1995 }
1996 if (o_tty->link != tty) {
1997 printk(KERN_DEBUG "release_dev: bad pty pointers\n");
1998 return;
1999 }
2000 }
2001#endif
f34d7a5b
AC
2002 if (tty->ops->close)
2003 tty->ops->close(tty, filp);
1da177e4
LT
2004
2005 /*
2006 * Sanity check: if tty->count is going to zero, there shouldn't be
2007 * any waiters on tty->read_wait or tty->write_wait. We test the
2008 * wait queues and kick everyone out _before_ actually starting to
2009 * close. This ensures that we won't block while releasing the tty
2010 * structure.
2011 *
2012 * The test for the o_tty closing is necessary, since the master and
2013 * slave sides may close in any order. If the slave side closes out
2014 * first, its count will be one, since the master side holds an open.
2015 * Thus this test wouldn't be triggered at the time the slave closes,
2016 * so we do it now.
2017 *
2018 * Note that it's possible for the tty to be opened again while we're
2019 * flushing out waiters. By recalculating the closing flags before
2020 * each iteration we avoid any problems.
2021 */
2022 while (1) {
2023 /* Guard against races with tty->count changes elsewhere and
2024 opens on /dev/tty */
37bdfb07 2025
70522e12 2026 mutex_lock(&tty_mutex);
1da177e4
LT
2027 tty_closing = tty->count <= 1;
2028 o_tty_closing = o_tty &&
2029 (o_tty->count <= (pty_master ? 1 : 0));
1da177e4
LT
2030 do_sleep = 0;
2031
2032 if (tty_closing) {
2033 if (waitqueue_active(&tty->read_wait)) {
2034 wake_up(&tty->read_wait);
2035 do_sleep++;
2036 }
2037 if (waitqueue_active(&tty->write_wait)) {
2038 wake_up(&tty->write_wait);
2039 do_sleep++;
2040 }
2041 }
2042 if (o_tty_closing) {
2043 if (waitqueue_active(&o_tty->read_wait)) {
2044 wake_up(&o_tty->read_wait);
2045 do_sleep++;
2046 }
2047 if (waitqueue_active(&o_tty->write_wait)) {
2048 wake_up(&o_tty->write_wait);
2049 do_sleep++;
2050 }
2051 }
2052 if (!do_sleep)
2053 break;
2054
2055 printk(KERN_WARNING "release_dev: %s: read/write wait queue "
2056 "active!\n", tty_name(tty, buf));
70522e12 2057 mutex_unlock(&tty_mutex);
1da177e4 2058 schedule();
37bdfb07 2059 }
1da177e4
LT
2060
2061 /*
37bdfb07
AC
2062 * The closing flags are now consistent with the open counts on
2063 * both sides, and we've completed the last operation that could
1da177e4
LT
2064 * block, so it's safe to proceed with closing.
2065 */
1da177e4
LT
2066 if (pty_master) {
2067 if (--o_tty->count < 0) {
2068 printk(KERN_WARNING "release_dev: bad pty slave count "
2069 "(%d) for %s\n",
2070 o_tty->count, tty_name(o_tty, buf));
2071 o_tty->count = 0;
2072 }
2073 }
2074 if (--tty->count < 0) {
2075 printk(KERN_WARNING "release_dev: bad tty->count (%d) for %s\n",
2076 tty->count, tty_name(tty, buf));
2077 tty->count = 0;
2078 }
37bdfb07 2079
1da177e4
LT
2080 /*
2081 * We've decremented tty->count, so we need to remove this file
2082 * descriptor off the tty->tty_files list; this serves two
2083 * purposes:
2084 * - check_tty_count sees the correct number of file descriptors
2085 * associated with this tty.
2086 * - do_tty_hangup no longer sees this file descriptor as
2087 * something that needs to be handled for hangups.
2088 */
2089 file_kill(filp);
2090 filp->private_data = NULL;
2091
2092 /*
2093 * Perform some housekeeping before deciding whether to return.
2094 *
2095 * Set the TTY_CLOSING flag if this was the last open. In the
2096 * case of a pty we may have to wait around for the other side
2097 * to close, and TTY_CLOSING makes sure we can't be reopened.
2098 */
37bdfb07 2099 if (tty_closing)
1da177e4 2100 set_bit(TTY_CLOSING, &tty->flags);
37bdfb07 2101 if (o_tty_closing)
1da177e4
LT
2102 set_bit(TTY_CLOSING, &o_tty->flags);
2103
2104 /*
2105 * If _either_ side is closing, make sure there aren't any
2106 * processes that still think tty or o_tty is their controlling
2107 * tty.
2108 */
2109 if (tty_closing || o_tty_closing) {
1da177e4 2110 read_lock(&tasklist_lock);
24ec839c 2111 session_clear_tty(tty->session);
1da177e4 2112 if (o_tty)
24ec839c 2113 session_clear_tty(o_tty->session);
1da177e4
LT
2114 read_unlock(&tasklist_lock);
2115 }
2116
70522e12 2117 mutex_unlock(&tty_mutex);
da965822 2118
1da177e4
LT
2119 /* check whether both sides are closing ... */
2120 if (!tty_closing || (o_tty && !o_tty_closing))
2121 return;
37bdfb07 2122
1da177e4
LT
2123#ifdef TTY_DEBUG_HANGUP
2124 printk(KERN_DEBUG "freeing tty structure...");
2125#endif
2126 /*
01e1abb2 2127 * Ask the line discipline code to release its structures
1da177e4 2128 */
01e1abb2 2129 tty_ldisc_release(tty, o_tty);
1da177e4 2130 /*
d5698c28 2131 * The release_tty function takes care of the details of clearing
1da177e4
LT
2132 * the slots and preserving the termios structure.
2133 */
d5698c28 2134 release_tty(tty, idx);
1da177e4 2135
1da177e4 2136 /* Make this pty number available for reallocation */
718a9163
SB
2137 if (devpts)
2138 devpts_kill_index(idx);
1da177e4
LT
2139}
2140
af9b897e
AC
2141/**
2142 * tty_open - open a tty device
2143 * @inode: inode of device file
2144 * @filp: file pointer to tty
1da177e4 2145 *
af9b897e
AC
2146 * tty_open and tty_release keep up the tty count that contains the
2147 * number of opens done on a tty. We cannot use the inode-count, as
2148 * different inodes might point to the same tty.
1da177e4 2149 *
af9b897e
AC
2150 * Open-counting is needed for pty masters, as well as for keeping
2151 * track of serial lines: DTR is dropped when the last close happens.
2152 * (This is not done solely through tty->count, now. - Ted 1/27/92)
2153 *
2154 * The termios state of a pty is reset on first open so that
2155 * settings don't persist across reuse.
2156 *
24ec839c
PZ
2157 * Locking: tty_mutex protects tty, get_tty_driver and init_dev work.
2158 * tty->count should protect the rest.
2159 * ->siglock protects ->signal/->sighand
1da177e4 2160 */
af9b897e 2161
39d95b9d 2162static int __tty_open(struct inode *inode, struct file *filp)
1da177e4
LT
2163{
2164 struct tty_struct *tty;
2165 int noctty, retval;
2166 struct tty_driver *driver;
2167 int index;
2168 dev_t device = inode->i_rdev;
2169 unsigned short saved_flags = filp->f_flags;
2170
2171 nonseekable_open(inode, filp);
37bdfb07 2172
1da177e4
LT
2173retry_open:
2174 noctty = filp->f_flags & O_NOCTTY;
2175 index = -1;
2176 retval = 0;
37bdfb07 2177
70522e12 2178 mutex_lock(&tty_mutex);
1da177e4 2179
37bdfb07 2180 if (device == MKDEV(TTYAUX_MAJOR, 0)) {
24ec839c
PZ
2181 tty = get_current_tty();
2182 if (!tty) {
70522e12 2183 mutex_unlock(&tty_mutex);
1da177e4
LT
2184 return -ENXIO;
2185 }
24ec839c
PZ
2186 driver = tty->driver;
2187 index = tty->index;
1da177e4
LT
2188 filp->f_flags |= O_NONBLOCK; /* Don't let /dev/tty block */
2189 /* noctty = 1; */
2190 goto got_driver;
2191 }
2192#ifdef CONFIG_VT
37bdfb07 2193 if (device == MKDEV(TTY_MAJOR, 0)) {
1da177e4
LT
2194 extern struct tty_driver *console_driver;
2195 driver = console_driver;
2196 index = fg_console;
2197 noctty = 1;
2198 goto got_driver;
2199 }
2200#endif
37bdfb07 2201 if (device == MKDEV(TTYAUX_MAJOR, 1)) {
1da177e4
LT
2202 driver = console_device(&index);
2203 if (driver) {
2204 /* Don't let /dev/console block */
2205 filp->f_flags |= O_NONBLOCK;
2206 noctty = 1;
2207 goto got_driver;
2208 }
70522e12 2209 mutex_unlock(&tty_mutex);
1da177e4
LT
2210 return -ENODEV;
2211 }
2212
2213 driver = get_tty_driver(device, &index);
2214 if (!driver) {
70522e12 2215 mutex_unlock(&tty_mutex);
1da177e4
LT
2216 return -ENODEV;
2217 }
2218got_driver:
2219 retval = init_dev(driver, index, &tty);
70522e12 2220 mutex_unlock(&tty_mutex);
1da177e4
LT
2221 if (retval)
2222 return retval;
2223
2224 filp->private_data = tty;
2225 file_move(filp, &tty->tty_files);
2226 check_tty_count(tty, "tty_open");
2227 if (tty->driver->type == TTY_DRIVER_TYPE_PTY &&
2228 tty->driver->subtype == PTY_TYPE_MASTER)
2229 noctty = 1;
2230#ifdef TTY_DEBUG_HANGUP
2231 printk(KERN_DEBUG "opening %s...", tty->name);
2232#endif
2233 if (!retval) {
f34d7a5b
AC
2234 if (tty->ops->open)
2235 retval = tty->ops->open(tty, filp);
1da177e4
LT
2236 else
2237 retval = -ENODEV;
2238 }
2239 filp->f_flags = saved_flags;
2240
37bdfb07
AC
2241 if (!retval && test_bit(TTY_EXCLUSIVE, &tty->flags) &&
2242 !capable(CAP_SYS_ADMIN))
1da177e4
LT
2243 retval = -EBUSY;
2244
2245 if (retval) {
2246#ifdef TTY_DEBUG_HANGUP
2247 printk(KERN_DEBUG "error %d in opening %s...", retval,
2248 tty->name);
2249#endif
2250 release_dev(filp);
2251 if (retval != -ERESTARTSYS)
2252 return retval;
2253 if (signal_pending(current))
2254 return retval;
2255 schedule();
2256 /*
2257 * Need to reset f_op in case a hangup happened.
2258 */
2259 if (filp->f_op == &hung_up_tty_fops)
2260 filp->f_op = &tty_fops;
2261 goto retry_open;
2262 }
24ec839c
PZ
2263
2264 mutex_lock(&tty_mutex);
2265 spin_lock_irq(&current->sighand->siglock);
1da177e4
LT
2266 if (!noctty &&
2267 current->signal->leader &&
2268 !current->signal->tty &&
ab521dc0 2269 tty->session == NULL)
2a65f1d9 2270 __proc_set_tty(current, tty);
24ec839c
PZ
2271 spin_unlock_irq(&current->sighand->siglock);
2272 mutex_unlock(&tty_mutex);
1da177e4
LT
2273 return 0;
2274}
2275
39d95b9d
JC
2276/* BKL pushdown: scary code avoidance wrapper */
2277static int tty_open(struct inode *inode, struct file *filp)
2278{
2279 int ret;
2280
2281 lock_kernel();
2282 ret = __tty_open(inode, filp);
2283 unlock_kernel();
2284 return ret;
2285}
2286
2287
2288
1da177e4 2289#ifdef CONFIG_UNIX98_PTYS
af9b897e
AC
2290/**
2291 * ptmx_open - open a unix 98 pty master
2292 * @inode: inode of device file
2293 * @filp: file pointer to tty
2294 *
2295 * Allocate a unix98 pty master device from the ptmx driver.
2296 *
2297 * Locking: tty_mutex protects theinit_dev work. tty->count should
37bdfb07 2298 * protect the rest.
af9b897e
AC
2299 * allocated_ptys_lock handles the list of free pty numbers
2300 */
2301
39d95b9d 2302static int __ptmx_open(struct inode *inode, struct file *filp)
1da177e4
LT
2303{
2304 struct tty_struct *tty;
2305 int retval;
2306 int index;
1da177e4
LT
2307
2308 nonseekable_open(inode, filp);
2309
2310 /* find a device that is not in use. */
718a9163
SB
2311 index = devpts_new_index();
2312 if (index < 0)
2313 return index;
1da177e4 2314
70522e12 2315 mutex_lock(&tty_mutex);
1da177e4 2316 retval = init_dev(ptm_driver, index, &tty);
70522e12 2317 mutex_unlock(&tty_mutex);
37bdfb07 2318
1da177e4
LT
2319 if (retval)
2320 goto out;
2321
2322 set_bit(TTY_PTY_LOCK, &tty->flags); /* LOCK THE SLAVE */
2323 filp->private_data = tty;
2324 file_move(filp, &tty->tty_files);
2325
4f8f9d66
SB
2326 retval = devpts_pty_new(tty->link);
2327 if (retval)
1da177e4
LT
2328 goto out1;
2329
86a96538 2330 check_tty_count(tty, "ptmx_open");
f34d7a5b 2331 retval = ptm_driver->ops->open(tty, filp);
41126226 2332 if (!retval)
1da177e4
LT
2333 return 0;
2334out1:
2335 release_dev(filp);
9453a5ad 2336 return retval;
1da177e4 2337out:
718a9163 2338 devpts_kill_index(index);
1da177e4
LT
2339 return retval;
2340}
39d95b9d
JC
2341
2342static int ptmx_open(struct inode *inode, struct file *filp)
2343{
2344 int ret;
2345
2346 lock_kernel();
2347 ret = __ptmx_open(inode, filp);
2348 unlock_kernel();
2349 return ret;
2350}
1da177e4
LT
2351#endif
2352
af9b897e
AC
2353/**
2354 * tty_release - vfs callback for close
2355 * @inode: inode of tty
2356 * @filp: file pointer for handle to tty
2357 *
2358 * Called the last time each file handle is closed that references
2359 * this tty. There may however be several such references.
2360 *
2361 * Locking:
2362 * Takes bkl. See release_dev
2363 */
2364
37bdfb07 2365static int tty_release(struct inode *inode, struct file *filp)
1da177e4
LT
2366{
2367 lock_kernel();
2368 release_dev(filp);
2369 unlock_kernel();
2370 return 0;
2371}
2372
af9b897e
AC
2373/**
2374 * tty_poll - check tty status
2375 * @filp: file being polled
2376 * @wait: poll wait structures to update
2377 *
2378 * Call the line discipline polling method to obtain the poll
2379 * status of the device.
2380 *
2381 * Locking: locks called line discipline but ldisc poll method
2382 * may be re-entered freely by other callers.
2383 */
2384
37bdfb07 2385static unsigned int tty_poll(struct file *filp, poll_table *wait)
1da177e4 2386{
37bdfb07 2387 struct tty_struct *tty;
1da177e4
LT
2388 struct tty_ldisc *ld;
2389 int ret = 0;
2390
2391 tty = (struct tty_struct *)filp->private_data;
a7113a96 2392 if (tty_paranoia_check(tty, filp->f_path.dentry->d_inode, "tty_poll"))
1da177e4 2393 return 0;
37bdfb07 2394
1da177e4 2395 ld = tty_ldisc_ref_wait(tty);
a352def2
AC
2396 if (ld->ops->poll)
2397 ret = (ld->ops->poll)(tty, filp, wait);
1da177e4
LT
2398 tty_ldisc_deref(ld);
2399 return ret;
2400}
2401
37bdfb07 2402static int tty_fasync(int fd, struct file *filp, int on)
1da177e4 2403{
37bdfb07 2404 struct tty_struct *tty;
47f86834 2405 unsigned long flags;
5d1e3230 2406 int retval = 0;
1da177e4 2407
5d1e3230 2408 lock_kernel();
1da177e4 2409 tty = (struct tty_struct *)filp->private_data;
a7113a96 2410 if (tty_paranoia_check(tty, filp->f_path.dentry->d_inode, "tty_fasync"))
5d1e3230 2411 goto out;
37bdfb07 2412
1da177e4
LT
2413 retval = fasync_helper(fd, filp, on, &tty->fasync);
2414 if (retval <= 0)
5d1e3230 2415 goto out;
1da177e4
LT
2416
2417 if (on) {
ab521dc0
EB
2418 enum pid_type type;
2419 struct pid *pid;
1da177e4
LT
2420 if (!waitqueue_active(&tty->read_wait))
2421 tty->minimum_to_wake = 1;
47f86834 2422 spin_lock_irqsave(&tty->ctrl_lock, flags);
ab521dc0
EB
2423 if (tty->pgrp) {
2424 pid = tty->pgrp;
2425 type = PIDTYPE_PGID;
2426 } else {
2427 pid = task_pid(current);
2428 type = PIDTYPE_PID;
2429 }
47f86834 2430 spin_unlock_irqrestore(&tty->ctrl_lock, flags);
ab521dc0 2431 retval = __f_setown(filp, pid, type, 0);
1da177e4 2432 if (retval)
5d1e3230 2433 goto out;
1da177e4
LT
2434 } else {
2435 if (!tty->fasync && !waitqueue_active(&tty->read_wait))
2436 tty->minimum_to_wake = N_TTY_BUF_SIZE;
2437 }
5d1e3230
JC
2438 retval = 0;
2439out:
2440 unlock_kernel();
2441 return retval;
1da177e4
LT
2442}
2443
af9b897e
AC
2444/**
2445 * tiocsti - fake input character
2446 * @tty: tty to fake input into
2447 * @p: pointer to character
2448 *
3a4fa0a2 2449 * Fake input to a tty device. Does the necessary locking and
af9b897e
AC
2450 * input management.
2451 *
2452 * FIXME: does not honour flow control ??
2453 *
2454 * Locking:
2455 * Called functions take tty_ldisc_lock
2456 * current->signal->tty check is safe without locks
28298232
AC
2457 *
2458 * FIXME: may race normal receive processing
af9b897e
AC
2459 */
2460
1da177e4
LT
2461static int tiocsti(struct tty_struct *tty, char __user *p)
2462{
2463 char ch, mbz = 0;
2464 struct tty_ldisc *ld;
37bdfb07 2465
1da177e4
LT
2466 if ((current->signal->tty != tty) && !capable(CAP_SYS_ADMIN))
2467 return -EPERM;
2468 if (get_user(ch, p))
2469 return -EFAULT;
2470 ld = tty_ldisc_ref_wait(tty);
a352def2 2471 ld->ops->receive_buf(tty, &ch, &mbz, 1);
1da177e4
LT
2472 tty_ldisc_deref(ld);
2473 return 0;
2474}
2475
af9b897e
AC
2476/**
2477 * tiocgwinsz - implement window query ioctl
2478 * @tty; tty
2479 * @arg: user buffer for result
2480 *
808a0d38 2481 * Copies the kernel idea of the window size into the user buffer.
af9b897e 2482 *
24ec839c 2483 * Locking: tty->termios_mutex is taken to ensure the winsize data
808a0d38 2484 * is consistent.
af9b897e
AC
2485 */
2486
37bdfb07 2487static int tiocgwinsz(struct tty_struct *tty, struct winsize __user *arg)
1da177e4 2488{
808a0d38
AC
2489 int err;
2490
5785c95b 2491 mutex_lock(&tty->termios_mutex);
808a0d38 2492 err = copy_to_user(arg, &tty->winsize, sizeof(*arg));
5785c95b 2493 mutex_unlock(&tty->termios_mutex);
808a0d38
AC
2494
2495 return err ? -EFAULT: 0;
1da177e4
LT
2496}
2497
af9b897e
AC
2498/**
2499 * tiocswinsz - implement window size set ioctl
2500 * @tty; tty
2501 * @arg: user buffer for result
2502 *
2503 * Copies the user idea of the window size to the kernel. Traditionally
2504 * this is just advisory information but for the Linux console it
2505 * actually has driver level meaning and triggers a VC resize.
2506 *
2507 * Locking:
ca9bda00
AC
2508 * Called function use the console_sem is used to ensure we do
2509 * not try and resize the console twice at once.
24ec839c
PZ
2510 * The tty->termios_mutex is used to ensure we don't double
2511 * resize and get confused. Lock order - tty->termios_mutex before
ca9bda00 2512 * console sem
af9b897e
AC
2513 */
2514
1da177e4 2515static int tiocswinsz(struct tty_struct *tty, struct tty_struct *real_tty,
37bdfb07 2516 struct winsize __user *arg)
1da177e4
LT
2517{
2518 struct winsize tmp_ws;
47f86834
AC
2519 struct pid *pgrp, *rpgrp;
2520 unsigned long flags;
1da177e4
LT
2521
2522 if (copy_from_user(&tmp_ws, arg, sizeof(*arg)))
2523 return -EFAULT;
ca9bda00 2524
5785c95b 2525 mutex_lock(&tty->termios_mutex);
1da177e4 2526 if (!memcmp(&tmp_ws, &tty->winsize, sizeof(*arg)))
ca9bda00
AC
2527 goto done;
2528
1da177e4
LT
2529#ifdef CONFIG_VT
2530 if (tty->driver->type == TTY_DRIVER_TYPE_CONSOLE) {
5785c95b
AV
2531 if (vc_lock_resize(tty->driver_data, tmp_ws.ws_col,
2532 tmp_ws.ws_row)) {
2533 mutex_unlock(&tty->termios_mutex);
37bdfb07 2534 return -ENXIO;
ca9bda00 2535 }
1da177e4
LT
2536 }
2537#endif
47f86834
AC
2538 /* Get the PID values and reference them so we can
2539 avoid holding the tty ctrl lock while sending signals */
2540 spin_lock_irqsave(&tty->ctrl_lock, flags);
2541 pgrp = get_pid(tty->pgrp);
2542 rpgrp = get_pid(real_tty->pgrp);
2543 spin_unlock_irqrestore(&tty->ctrl_lock, flags);
2544
2545 if (pgrp)
2546 kill_pgrp(pgrp, SIGWINCH, 1);
2547 if (rpgrp != pgrp && rpgrp)
2548 kill_pgrp(rpgrp, SIGWINCH, 1);
2549
2550 put_pid(pgrp);
2551 put_pid(rpgrp);
2552
1da177e4
LT
2553 tty->winsize = tmp_ws;
2554 real_tty->winsize = tmp_ws;
ca9bda00 2555done:
5785c95b 2556 mutex_unlock(&tty->termios_mutex);
1da177e4
LT
2557 return 0;
2558}
2559
af9b897e
AC
2560/**
2561 * tioccons - allow admin to move logical console
2562 * @file: the file to become console
2563 *
2564 * Allow the adminstrator to move the redirected console device
2565 *
2566 * Locking: uses redirect_lock to guard the redirect information
2567 */
2568
1da177e4
LT
2569static int tioccons(struct file *file)
2570{
2571 if (!capable(CAP_SYS_ADMIN))
2572 return -EPERM;
2573 if (file->f_op->write == redirected_tty_write) {
2574 struct file *f;
2575 spin_lock(&redirect_lock);
2576 f = redirect;
2577 redirect = NULL;
2578 spin_unlock(&redirect_lock);
2579 if (f)
2580 fput(f);
2581 return 0;
2582 }
2583 spin_lock(&redirect_lock);
2584 if (redirect) {
2585 spin_unlock(&redirect_lock);
2586 return -EBUSY;
2587 }
2588 get_file(file);
2589 redirect = file;
2590 spin_unlock(&redirect_lock);
2591 return 0;
2592}
2593
af9b897e
AC
2594/**
2595 * fionbio - non blocking ioctl
2596 * @file: file to set blocking value
2597 * @p: user parameter
2598 *
2599 * Historical tty interfaces had a blocking control ioctl before
2600 * the generic functionality existed. This piece of history is preserved
2601 * in the expected tty API of posix OS's.
2602 *
2603 * Locking: none, the open fle handle ensures it won't go away.
2604 */
1da177e4
LT
2605
2606static int fionbio(struct file *file, int __user *p)
2607{
2608 int nonblock;
2609
2610 if (get_user(nonblock, p))
2611 return -EFAULT;
2612
04f378b1
AC
2613 /* file->f_flags is still BKL protected in the fs layer - vomit */
2614 lock_kernel();
1da177e4
LT
2615 if (nonblock)
2616 file->f_flags |= O_NONBLOCK;
2617 else
2618 file->f_flags &= ~O_NONBLOCK;
04f378b1 2619 unlock_kernel();
1da177e4
LT
2620 return 0;
2621}
2622
af9b897e
AC
2623/**
2624 * tiocsctty - set controlling tty
2625 * @tty: tty structure
2626 * @arg: user argument
2627 *
2628 * This ioctl is used to manage job control. It permits a session
2629 * leader to set this tty as the controlling tty for the session.
2630 *
2631 * Locking:
28298232 2632 * Takes tty_mutex() to protect tty instance
24ec839c
PZ
2633 * Takes tasklist_lock internally to walk sessions
2634 * Takes ->siglock() when updating signal->tty
af9b897e
AC
2635 */
2636
1da177e4
LT
2637static int tiocsctty(struct tty_struct *tty, int arg)
2638{
24ec839c 2639 int ret = 0;
ab521dc0 2640 if (current->signal->leader && (task_session(current) == tty->session))
24ec839c
PZ
2641 return ret;
2642
2643 mutex_lock(&tty_mutex);
1da177e4
LT
2644 /*
2645 * The process must be a session leader and
2646 * not have a controlling tty already.
2647 */
24ec839c
PZ
2648 if (!current->signal->leader || current->signal->tty) {
2649 ret = -EPERM;
2650 goto unlock;
2651 }
2652
ab521dc0 2653 if (tty->session) {
1da177e4
LT
2654 /*
2655 * This tty is already the controlling
2656 * tty for another session group!
2657 */
37bdfb07 2658 if (arg == 1 && capable(CAP_SYS_ADMIN)) {
1da177e4
LT
2659 /*
2660 * Steal it away
2661 */
1da177e4 2662 read_lock(&tasklist_lock);
24ec839c 2663 session_clear_tty(tty->session);
1da177e4 2664 read_unlock(&tasklist_lock);
24ec839c
PZ
2665 } else {
2666 ret = -EPERM;
2667 goto unlock;
2668 }
1da177e4 2669 }
24ec839c
PZ
2670 proc_set_tty(current, tty);
2671unlock:
28298232 2672 mutex_unlock(&tty_mutex);
24ec839c 2673 return ret;
1da177e4
LT
2674}
2675
5d0fdf1e
AC
2676/**
2677 * tty_get_pgrp - return a ref counted pgrp pid
2678 * @tty: tty to read
2679 *
2680 * Returns a refcounted instance of the pid struct for the process
2681 * group controlling the tty.
2682 */
2683
2684struct pid *tty_get_pgrp(struct tty_struct *tty)
2685{
2686 unsigned long flags;
2687 struct pid *pgrp;
2688
2689 spin_lock_irqsave(&tty->ctrl_lock, flags);
2690 pgrp = get_pid(tty->pgrp);
2691 spin_unlock_irqrestore(&tty->ctrl_lock, flags);
2692
2693 return pgrp;
2694}
2695EXPORT_SYMBOL_GPL(tty_get_pgrp);
2696
af9b897e
AC
2697/**
2698 * tiocgpgrp - get process group
2699 * @tty: tty passed by user
2700 * @real_tty: tty side of the tty pased by the user if a pty else the tty
2701 * @p: returned pid
2702 *
2703 * Obtain the process group of the tty. If there is no process group
2704 * return an error.
2705 *
24ec839c 2706 * Locking: none. Reference to current->signal->tty is safe.
af9b897e
AC
2707 */
2708
1da177e4
LT
2709static int tiocgpgrp(struct tty_struct *tty, struct tty_struct *real_tty, pid_t __user *p)
2710{
5d0fdf1e
AC
2711 struct pid *pid;
2712 int ret;
1da177e4
LT
2713 /*
2714 * (tty == real_tty) is a cheap way of
2715 * testing if the tty is NOT a master pty.
2716 */
2717 if (tty == real_tty && current->signal->tty != real_tty)
2718 return -ENOTTY;
5d0fdf1e
AC
2719 pid = tty_get_pgrp(real_tty);
2720 ret = put_user(pid_vnr(pid), p);
2721 put_pid(pid);
2722 return ret;
1da177e4
LT
2723}
2724
af9b897e
AC
2725/**
2726 * tiocspgrp - attempt to set process group
2727 * @tty: tty passed by user
2728 * @real_tty: tty side device matching tty passed by user
2729 * @p: pid pointer
2730 *
2731 * Set the process group of the tty to the session passed. Only
2732 * permitted where the tty session is our session.
2733 *
47f86834 2734 * Locking: RCU, ctrl lock
af9b897e
AC
2735 */
2736
1da177e4
LT
2737static int tiocspgrp(struct tty_struct *tty, struct tty_struct *real_tty, pid_t __user *p)
2738{
04a2e6a5
EB
2739 struct pid *pgrp;
2740 pid_t pgrp_nr;
1da177e4 2741 int retval = tty_check_change(real_tty);
47f86834 2742 unsigned long flags;
1da177e4
LT
2743
2744 if (retval == -EIO)
2745 return -ENOTTY;
2746 if (retval)
2747 return retval;
2748 if (!current->signal->tty ||
2749 (current->signal->tty != real_tty) ||
ab521dc0 2750 (real_tty->session != task_session(current)))
1da177e4 2751 return -ENOTTY;
04a2e6a5 2752 if (get_user(pgrp_nr, p))
1da177e4 2753 return -EFAULT;
04a2e6a5 2754 if (pgrp_nr < 0)
1da177e4 2755 return -EINVAL;
04a2e6a5 2756 rcu_read_lock();
b488893a 2757 pgrp = find_vpid(pgrp_nr);
04a2e6a5
EB
2758 retval = -ESRCH;
2759 if (!pgrp)
2760 goto out_unlock;
2761 retval = -EPERM;
2762 if (session_of_pgrp(pgrp) != task_session(current))
2763 goto out_unlock;
2764 retval = 0;
47f86834 2765 spin_lock_irqsave(&tty->ctrl_lock, flags);
ab521dc0
EB
2766 put_pid(real_tty->pgrp);
2767 real_tty->pgrp = get_pid(pgrp);
47f86834 2768 spin_unlock_irqrestore(&tty->ctrl_lock, flags);
04a2e6a5
EB
2769out_unlock:
2770 rcu_read_unlock();
2771 return retval;
1da177e4
LT
2772}
2773
af9b897e
AC
2774/**
2775 * tiocgsid - get session id
2776 * @tty: tty passed by user
2777 * @real_tty: tty side of the tty pased by the user if a pty else the tty
2778 * @p: pointer to returned session id
2779 *
2780 * Obtain the session id of the tty. If there is no session
2781 * return an error.
2782 *
24ec839c 2783 * Locking: none. Reference to current->signal->tty is safe.
af9b897e
AC
2784 */
2785
1da177e4
LT
2786static int tiocgsid(struct tty_struct *tty, struct tty_struct *real_tty, pid_t __user *p)
2787{
2788 /*
2789 * (tty == real_tty) is a cheap way of
2790 * testing if the tty is NOT a master pty.
2791 */
2792 if (tty == real_tty && current->signal->tty != real_tty)
2793 return -ENOTTY;
ab521dc0 2794 if (!real_tty->session)
1da177e4 2795 return -ENOTTY;
b488893a 2796 return put_user(pid_vnr(real_tty->session), p);
1da177e4
LT
2797}
2798
af9b897e
AC
2799/**
2800 * tiocsetd - set line discipline
2801 * @tty: tty device
2802 * @p: pointer to user data
2803 *
2804 * Set the line discipline according to user request.
2805 *
2806 * Locking: see tty_set_ldisc, this function is just a helper
2807 */
2808
1da177e4
LT
2809static int tiocsetd(struct tty_struct *tty, int __user *p)
2810{
2811 int ldisc;
04f378b1 2812 int ret;
1da177e4
LT
2813
2814 if (get_user(ldisc, p))
2815 return -EFAULT;
04f378b1
AC
2816
2817 lock_kernel();
2818 ret = tty_set_ldisc(tty, ldisc);
2819 unlock_kernel();
2820
2821 return ret;
1da177e4
LT
2822}
2823
af9b897e
AC
2824/**
2825 * send_break - performed time break
2826 * @tty: device to break on
2827 * @duration: timeout in mS
2828 *
2829 * Perform a timed break on hardware that lacks its own driver level
2830 * timed break functionality.
2831 *
2832 * Locking:
28298232 2833 * atomic_write_lock serializes
af9b897e 2834 *
af9b897e
AC
2835 */
2836
b20f3ae5 2837static int send_break(struct tty_struct *tty, unsigned int duration)
1da177e4 2838{
9e98966c
AC
2839 int retval;
2840
2841 if (tty->ops->break_ctl == NULL)
2842 return 0;
2843
2844 if (tty->driver->flags & TTY_DRIVER_HARDWARE_BREAK)
2845 retval = tty->ops->break_ctl(tty, duration);
2846 else {
2847 /* Do the work ourselves */
2848 if (tty_write_lock(tty, 0) < 0)
2849 return -EINTR;
2850 retval = tty->ops->break_ctl(tty, -1);
2851 if (retval)
2852 goto out;
2853 if (!signal_pending(current))
2854 msleep_interruptible(duration);
2855 retval = tty->ops->break_ctl(tty, 0);
2856out:
2857 tty_write_unlock(tty);
2858 if (signal_pending(current))
2859 retval = -EINTR;
2860 }
2861 return retval;
1da177e4
LT
2862}
2863
af9b897e 2864/**
f34d7a5b 2865 * tty_tiocmget - get modem status
af9b897e
AC
2866 * @tty: tty device
2867 * @file: user file pointer
2868 * @p: pointer to result
2869 *
2870 * Obtain the modem status bits from the tty driver if the feature
2871 * is supported. Return -EINVAL if it is not available.
2872 *
2873 * Locking: none (up to the driver)
2874 */
2875
2876static int tty_tiocmget(struct tty_struct *tty, struct file *file, int __user *p)
1da177e4
LT
2877{
2878 int retval = -EINVAL;
2879
f34d7a5b
AC
2880 if (tty->ops->tiocmget) {
2881 retval = tty->ops->tiocmget(tty, file);
1da177e4
LT
2882
2883 if (retval >= 0)
2884 retval = put_user(retval, p);
2885 }
2886 return retval;
2887}
2888
af9b897e 2889/**
f34d7a5b 2890 * tty_tiocmset - set modem status
af9b897e
AC
2891 * @tty: tty device
2892 * @file: user file pointer
2893 * @cmd: command - clear bits, set bits or set all
2894 * @p: pointer to desired bits
2895 *
2896 * Set the modem status bits from the tty driver if the feature
2897 * is supported. Return -EINVAL if it is not available.
2898 *
2899 * Locking: none (up to the driver)
2900 */
2901
2902static int tty_tiocmset(struct tty_struct *tty, struct file *file, unsigned int cmd,
1da177e4
LT
2903 unsigned __user *p)
2904{
ae677517
AC
2905 int retval;
2906 unsigned int set, clear, val;
1da177e4 2907
ae677517
AC
2908 if (tty->ops->tiocmset == NULL)
2909 return -EINVAL;
1da177e4 2910
ae677517
AC
2911 retval = get_user(val, p);
2912 if (retval)
2913 return retval;
2914 set = clear = 0;
2915 switch (cmd) {
2916 case TIOCMBIS:
2917 set = val;
2918 break;
2919 case TIOCMBIC:
2920 clear = val;
2921 break;
2922 case TIOCMSET:
2923 set = val;
2924 clear = ~val;
2925 break;
2926 }
2927 set &= TIOCM_DTR|TIOCM_RTS|TIOCM_OUT1|TIOCM_OUT2|TIOCM_LOOP;
2928 clear &= TIOCM_DTR|TIOCM_RTS|TIOCM_OUT1|TIOCM_OUT2|TIOCM_LOOP;
2929 return tty->ops->tiocmset(tty, file, set, clear);
1da177e4
LT
2930}
2931
2932/*
2933 * Split this up, as gcc can choke on it otherwise..
2934 */
04f378b1 2935long tty_ioctl(struct file *file, unsigned int cmd, unsigned long arg)
1da177e4
LT
2936{
2937 struct tty_struct *tty, *real_tty;
2938 void __user *p = (void __user *)arg;
2939 int retval;
2940 struct tty_ldisc *ld;
04f378b1 2941 struct inode *inode = file->f_dentry->d_inode;
37bdfb07 2942
1da177e4
LT
2943 tty = (struct tty_struct *)file->private_data;
2944 if (tty_paranoia_check(tty, inode, "tty_ioctl"))
2945 return -EINVAL;
2946
2947 real_tty = tty;
2948 if (tty->driver->type == TTY_DRIVER_TYPE_PTY &&
2949 tty->driver->subtype == PTY_TYPE_MASTER)
2950 real_tty = tty->link;
2951
1da177e4
LT
2952
2953 /*
2954 * Factor out some common prep work
2955 */
2956 switch (cmd) {
2957 case TIOCSETD:
2958 case TIOCSBRK:
2959 case TIOCCBRK:
2960 case TCSBRK:
37bdfb07 2961 case TCSBRKP:
1da177e4
LT
2962 retval = tty_check_change(tty);
2963 if (retval)
2964 return retval;
2965 if (cmd != TIOCCBRK) {
2966 tty_wait_until_sent(tty, 0);
2967 if (signal_pending(current))
2968 return -EINTR;
2969 }
2970 break;
2971 }
2972
9e98966c
AC
2973 /*
2974 * Now do the stuff.
2975 */
1da177e4 2976 switch (cmd) {
37bdfb07
AC
2977 case TIOCSTI:
2978 return tiocsti(tty, p);
2979 case TIOCGWINSZ:
2980 return tiocgwinsz(tty, p);
2981 case TIOCSWINSZ:
2982 return tiocswinsz(tty, real_tty, p);
2983 case TIOCCONS:
2984 return real_tty != tty ? -EINVAL : tioccons(file);
2985 case FIONBIO:
2986 return fionbio(file, p);
2987 case TIOCEXCL:
2988 set_bit(TTY_EXCLUSIVE, &tty->flags);
2989 return 0;
2990 case TIOCNXCL:
2991 clear_bit(TTY_EXCLUSIVE, &tty->flags);
2992 return 0;
2993 case TIOCNOTTY:
2994 if (current->signal->tty != tty)
2995 return -ENOTTY;
2996 no_tty();
2997 return 0;
2998 case TIOCSCTTY:
2999 return tiocsctty(tty, arg);
3000 case TIOCGPGRP:
3001 return tiocgpgrp(tty, real_tty, p);
3002 case TIOCSPGRP:
3003 return tiocspgrp(tty, real_tty, p);
3004 case TIOCGSID:
3005 return tiocgsid(tty, real_tty, p);
3006 case TIOCGETD:
a352def2 3007 return put_user(tty->ldisc.ops->num, (int __user *)p);
37bdfb07
AC
3008 case TIOCSETD:
3009 return tiocsetd(tty, p);
1da177e4 3010#ifdef CONFIG_VT
37bdfb07
AC
3011 case TIOCLINUX:
3012 return tioclinux(tty, arg);
1da177e4 3013#endif
37bdfb07
AC
3014 /*
3015 * Break handling
3016 */
3017 case TIOCSBRK: /* Turn break on, unconditionally */
f34d7a5b 3018 if (tty->ops->break_ctl)
9e98966c 3019 return tty->ops->break_ctl(tty, -1);
37bdfb07 3020 return 0;
37bdfb07 3021 case TIOCCBRK: /* Turn break off, unconditionally */
f34d7a5b 3022 if (tty->ops->break_ctl)
9e98966c 3023 return tty->ops->break_ctl(tty, 0);
37bdfb07
AC
3024 return 0;
3025 case TCSBRK: /* SVID version: non-zero arg --> no break */
3026 /* non-zero arg means wait for all output data
3027 * to be sent (performed above) but don't send break.
3028 * This is used by the tcdrain() termios function.
3029 */
3030 if (!arg)
3031 return send_break(tty, 250);
3032 return 0;
3033 case TCSBRKP: /* support for POSIX tcsendbreak() */
3034 return send_break(tty, arg ? arg*100 : 250);
3035
3036 case TIOCMGET:
3037 return tty_tiocmget(tty, file, p);
3038 case TIOCMSET:
3039 case TIOCMBIC:
3040 case TIOCMBIS:
3041 return tty_tiocmset(tty, file, cmd, p);
3042 case TCFLSH:
3043 switch (arg) {
3044 case TCIFLUSH:
3045 case TCIOFLUSH:
3046 /* flush tty buffer and allow ldisc to process ioctl */
3047 tty_buffer_flush(tty);
c5c34d48 3048 break;
37bdfb07
AC
3049 }
3050 break;
1da177e4 3051 }
f34d7a5b
AC
3052 if (tty->ops->ioctl) {
3053 retval = (tty->ops->ioctl)(tty, file, cmd, arg);
1da177e4
LT
3054 if (retval != -ENOIOCTLCMD)
3055 return retval;
3056 }
3057 ld = tty_ldisc_ref_wait(tty);
3058 retval = -EINVAL;
a352def2
AC
3059 if (ld->ops->ioctl) {
3060 retval = ld->ops->ioctl(tty, file, cmd, arg);
1da177e4
LT
3061 if (retval == -ENOIOCTLCMD)
3062 retval = -EINVAL;
3063 }
3064 tty_ldisc_deref(ld);
3065 return retval;
3066}
3067
e10cc1df 3068#ifdef CONFIG_COMPAT
37bdfb07 3069static long tty_compat_ioctl(struct file *file, unsigned int cmd,
e10cc1df
PF
3070 unsigned long arg)
3071{
3072 struct inode *inode = file->f_dentry->d_inode;
3073 struct tty_struct *tty = file->private_data;
3074 struct tty_ldisc *ld;
3075 int retval = -ENOIOCTLCMD;
3076
3077 if (tty_paranoia_check(tty, inode, "tty_ioctl"))
3078 return -EINVAL;
3079
f34d7a5b
AC
3080 if (tty->ops->compat_ioctl) {
3081 retval = (tty->ops->compat_ioctl)(tty, file, cmd, arg);
e10cc1df
PF
3082 if (retval != -ENOIOCTLCMD)
3083 return retval;
3084 }
3085
3086 ld = tty_ldisc_ref_wait(tty);
a352def2
AC
3087 if (ld->ops->compat_ioctl)
3088 retval = ld->ops->compat_ioctl(tty, file, cmd, arg);
e10cc1df
PF
3089 tty_ldisc_deref(ld);
3090
3091 return retval;
3092}
3093#endif
1da177e4
LT
3094
3095/*
3096 * This implements the "Secure Attention Key" --- the idea is to
3097 * prevent trojan horses by killing all processes associated with this
3098 * tty when the user hits the "Secure Attention Key". Required for
3099 * super-paranoid applications --- see the Orange Book for more details.
37bdfb07 3100 *
1da177e4
LT
3101 * This code could be nicer; ideally it should send a HUP, wait a few
3102 * seconds, then send a INT, and then a KILL signal. But you then
3103 * have to coordinate with the init process, since all processes associated
3104 * with the current tty must be dead before the new getty is allowed
3105 * to spawn.
3106 *
3107 * Now, if it would be correct ;-/ The current code has a nasty hole -
3108 * it doesn't catch files in flight. We may send the descriptor to ourselves
3109 * via AF_UNIX socket, close it and later fetch from socket. FIXME.
3110 *
3111 * Nasty bug: do_SAK is being called in interrupt context. This can
3112 * deadlock. We punt it up to process context. AKPM - 16Mar2001
3113 */
8b6312f4 3114void __do_SAK(struct tty_struct *tty)
1da177e4
LT
3115{
3116#ifdef TTY_SOFT_SAK
3117 tty_hangup(tty);
3118#else
652486fb 3119 struct task_struct *g, *p;
ab521dc0 3120 struct pid *session;
1da177e4
LT
3121 int i;
3122 struct file *filp;
badf1662 3123 struct fdtable *fdt;
37bdfb07 3124
1da177e4
LT
3125 if (!tty)
3126 return;
24ec839c 3127 session = tty->session;
37bdfb07 3128
b3f13deb 3129 tty_ldisc_flush(tty);
1da177e4 3130
f34d7a5b 3131 tty_driver_flush_buffer(tty);
37bdfb07 3132
1da177e4 3133 read_lock(&tasklist_lock);
652486fb 3134 /* Kill the entire session */
ab521dc0 3135 do_each_pid_task(session, PIDTYPE_SID, p) {
652486fb 3136 printk(KERN_NOTICE "SAK: killed process %d"
a47afb0f 3137 " (%s): task_session_nr(p)==tty->session\n",
ba25f9dc 3138 task_pid_nr(p), p->comm);
652486fb 3139 send_sig(SIGKILL, p, 1);
ab521dc0 3140 } while_each_pid_task(session, PIDTYPE_SID, p);
652486fb
EB
3141 /* Now kill any processes that happen to have the
3142 * tty open.
3143 */
3144 do_each_thread(g, p) {
3145 if (p->signal->tty == tty) {
1da177e4 3146 printk(KERN_NOTICE "SAK: killed process %d"
a47afb0f 3147 " (%s): task_session_nr(p)==tty->session\n",
ba25f9dc 3148 task_pid_nr(p), p->comm);
1da177e4
LT
3149 send_sig(SIGKILL, p, 1);
3150 continue;
3151 }
3152 task_lock(p);
3153 if (p->files) {
ca99c1da
DS
3154 /*
3155 * We don't take a ref to the file, so we must
3156 * hold ->file_lock instead.
3157 */
3158 spin_lock(&p->files->file_lock);
badf1662 3159 fdt = files_fdtable(p->files);
37bdfb07 3160 for (i = 0; i < fdt->max_fds; i++) {
1da177e4
LT
3161 filp = fcheck_files(p->files, i);
3162 if (!filp)
3163 continue;
3164 if (filp->f_op->read == tty_read &&
3165 filp->private_data == tty) {
3166 printk(KERN_NOTICE "SAK: killed process %d"
3167 " (%s): fd#%d opened to the tty\n",
ba25f9dc 3168 task_pid_nr(p), p->comm, i);
20ac9437 3169 force_sig(SIGKILL, p);
1da177e4
LT
3170 break;
3171 }
3172 }
ca99c1da 3173 spin_unlock(&p->files->file_lock);
1da177e4
LT
3174 }
3175 task_unlock(p);
652486fb 3176 } while_each_thread(g, p);
1da177e4
LT
3177 read_unlock(&tasklist_lock);
3178#endif
3179}
3180
8b6312f4
EB
3181static void do_SAK_work(struct work_struct *work)
3182{
3183 struct tty_struct *tty =
3184 container_of(work, struct tty_struct, SAK_work);
3185 __do_SAK(tty);
3186}
3187
1da177e4
LT
3188/*
3189 * The tq handling here is a little racy - tty->SAK_work may already be queued.
3190 * Fortunately we don't need to worry, because if ->SAK_work is already queued,
3191 * the values which we write to it will be identical to the values which it
3192 * already has. --akpm
3193 */
3194void do_SAK(struct tty_struct *tty)
3195{
3196 if (!tty)
3197 return;
1da177e4
LT
3198 schedule_work(&tty->SAK_work);
3199}
3200
3201EXPORT_SYMBOL(do_SAK);
3202
af9b897e
AC
3203/**
3204 * flush_to_ldisc
65f27f38 3205 * @work: tty structure passed from work queue.
af9b897e
AC
3206 *
3207 * This routine is called out of the software interrupt to flush data
3208 * from the buffer chain to the line discipline.
3209 *
3210 * Locking: holds tty->buf.lock to guard buffer list. Drops the lock
3211 * while invoking the line discipline receive_buf method. The
3212 * receive_buf method is single threaded for each tty instance.
1da177e4 3213 */
37bdfb07 3214
65f27f38 3215static void flush_to_ldisc(struct work_struct *work)
1da177e4 3216{
65f27f38
DH
3217 struct tty_struct *tty =
3218 container_of(work, struct tty_struct, buf.work.work);
1da177e4
LT
3219 unsigned long flags;
3220 struct tty_ldisc *disc;
2c3bb20f 3221 struct tty_buffer *tbuf, *head;
8977d929
PF
3222 char *char_buf;
3223 unsigned char *flag_buf;
1da177e4
LT
3224
3225 disc = tty_ldisc_ref(tty);
3226 if (disc == NULL) /* !TTY_LDISC */
3227 return;
3228
808249ce 3229 spin_lock_irqsave(&tty->buf.lock, flags);
37bdfb07
AC
3230 /* So we know a flush is running */
3231 set_bit(TTY_FLUSHING, &tty->flags);
2c3bb20f
PF
3232 head = tty->buf.head;
3233 if (head != NULL) {
3234 tty->buf.head = NULL;
3235 for (;;) {
3236 int count = head->commit - head->read;
3237 if (!count) {
3238 if (head->next == NULL)
3239 break;
3240 tbuf = head;
3241 head = head->next;
3242 tty_buffer_free(tty, tbuf);
3243 continue;
3244 }
42fd552e
AC
3245 /* Ldisc or user is trying to flush the buffers
3246 we are feeding to the ldisc, stop feeding the
3247 line discipline as we want to empty the queue */
3248 if (test_bit(TTY_FLUSHPENDING, &tty->flags))
3249 break;
2c3bb20f
PF
3250 if (!tty->receive_room) {
3251 schedule_delayed_work(&tty->buf.work, 1);
3252 break;
3253 }
3254 if (count > tty->receive_room)
3255 count = tty->receive_room;
3256 char_buf = head->char_buf_ptr + head->read;
3257 flag_buf = head->flag_buf_ptr + head->read;
3258 head->read += count;
8977d929 3259 spin_unlock_irqrestore(&tty->buf.lock, flags);
a352def2
AC
3260 disc->ops->receive_buf(tty, char_buf,
3261 flag_buf, count);
8977d929
PF
3262 spin_lock_irqsave(&tty->buf.lock, flags);
3263 }
42fd552e 3264 /* Restore the queue head */
2c3bb20f 3265 tty->buf.head = head;
33f0f88f 3266 }
42fd552e
AC
3267 /* We may have a deferred request to flush the input buffer,
3268 if so pull the chain under the lock and empty the queue */
3269 if (test_bit(TTY_FLUSHPENDING, &tty->flags)) {
3270 __tty_buffer_flush(tty);
3271 clear_bit(TTY_FLUSHPENDING, &tty->flags);
3272 wake_up(&tty->read_wait);
3273 }
3274 clear_bit(TTY_FLUSHING, &tty->flags);
808249ce 3275 spin_unlock_irqrestore(&tty->buf.lock, flags);
817d6d3b 3276
1da177e4
LT
3277 tty_ldisc_deref(disc);
3278}
3279
1da177e4
LT
3280/**
3281 * tty_flip_buffer_push - terminal
3282 * @tty: tty to push
3283 *
3284 * Queue a push of the terminal flip buffers to the line discipline. This
3285 * function must not be called from IRQ context if tty->low_latency is set.
3286 *
3287 * In the event of the queue being busy for flipping the work will be
3288 * held off and retried later.
af9b897e
AC
3289 *
3290 * Locking: tty buffer lock. Driver locks in low latency mode.
1da177e4
LT
3291 */
3292
3293void tty_flip_buffer_push(struct tty_struct *tty)
3294{
808249ce
PF
3295 unsigned long flags;
3296 spin_lock_irqsave(&tty->buf.lock, flags);
33b37a33 3297 if (tty->buf.tail != NULL)
8977d929 3298 tty->buf.tail->commit = tty->buf.tail->used;
808249ce
PF
3299 spin_unlock_irqrestore(&tty->buf.lock, flags);
3300
1da177e4 3301 if (tty->low_latency)
65f27f38 3302 flush_to_ldisc(&tty->buf.work.work);
1da177e4 3303 else
33f0f88f 3304 schedule_delayed_work(&tty->buf.work, 1);
1da177e4
LT
3305}
3306
3307EXPORT_SYMBOL(tty_flip_buffer_push);
3308
33f0f88f 3309
af9b897e
AC
3310/**
3311 * initialize_tty_struct
3312 * @tty: tty to initialize
3313 *
3314 * This subroutine initializes a tty structure that has been newly
3315 * allocated.
3316 *
3317 * Locking: none - tty in question must not be exposed at this point
1da177e4 3318 */
af9b897e 3319
1da177e4
LT
3320static void initialize_tty_struct(struct tty_struct *tty)
3321{
3322 memset(tty, 0, sizeof(struct tty_struct));
3323 tty->magic = TTY_MAGIC;
01e1abb2 3324 tty_ldisc_init(tty);
ab521dc0
EB
3325 tty->session = NULL;
3326 tty->pgrp = NULL;
1da177e4 3327 tty->overrun_time = jiffies;
33f0f88f
AC
3328 tty->buf.head = tty->buf.tail = NULL;
3329 tty_buffer_init(tty);
65f27f38 3330 INIT_DELAYED_WORK(&tty->buf.work, flush_to_ldisc);
5785c95b 3331 mutex_init(&tty->termios_mutex);
1da177e4
LT
3332 init_waitqueue_head(&tty->write_wait);
3333 init_waitqueue_head(&tty->read_wait);
65f27f38 3334 INIT_WORK(&tty->hangup_work, do_tty_hangup);
70522e12
IM
3335 mutex_init(&tty->atomic_read_lock);
3336 mutex_init(&tty->atomic_write_lock);
1da177e4 3337 spin_lock_init(&tty->read_lock);
04f378b1 3338 spin_lock_init(&tty->ctrl_lock);
1da177e4 3339 INIT_LIST_HEAD(&tty->tty_files);
7f1f86a0 3340 INIT_WORK(&tty->SAK_work, do_SAK_work);
1da177e4
LT
3341}
3342
f34d7a5b
AC
3343/**
3344 * tty_put_char - write one character to a tty
3345 * @tty: tty
3346 * @ch: character
3347 *
3348 * Write one byte to the tty using the provided put_char method
3349 * if present. Returns the number of characters successfully output.
3350 *
3351 * Note: the specific put_char operation in the driver layer may go
3352 * away soon. Don't call it directly, use this method
1da177e4 3353 */
af9b897e 3354
f34d7a5b 3355int tty_put_char(struct tty_struct *tty, unsigned char ch)
1da177e4 3356{
f34d7a5b
AC
3357 if (tty->ops->put_char)
3358 return tty->ops->put_char(tty, ch);
3359 return tty->ops->write(tty, &ch, 1);
1da177e4
LT
3360}
3361
f34d7a5b
AC
3362EXPORT_SYMBOL_GPL(tty_put_char);
3363
7fe845d1 3364static struct class *tty_class;
1da177e4
LT
3365
3366/**
af9b897e
AC
3367 * tty_register_device - register a tty device
3368 * @driver: the tty driver that describes the tty device
3369 * @index: the index in the tty driver for this tty device
3370 * @device: a struct device that is associated with this tty device.
3371 * This field is optional, if there is no known struct device
3372 * for this tty device it can be set to NULL safely.
1da177e4 3373 *
01107d34
GKH
3374 * Returns a pointer to the struct device for this tty device
3375 * (or ERR_PTR(-EFOO) on error).
1cdcb6b4 3376 *
af9b897e
AC
3377 * This call is required to be made to register an individual tty device
3378 * if the tty driver's flags have the TTY_DRIVER_DYNAMIC_DEV bit set. If
3379 * that bit is not set, this function should not be called by a tty
3380 * driver.
3381 *
3382 * Locking: ??
1da177e4 3383 */
af9b897e 3384
01107d34
GKH
3385struct device *tty_register_device(struct tty_driver *driver, unsigned index,
3386 struct device *device)
1da177e4
LT
3387{
3388 char name[64];
3389 dev_t dev = MKDEV(driver->major, driver->minor_start) + index;
3390
3391 if (index >= driver->num) {
3392 printk(KERN_ERR "Attempt to register invalid tty line number "
3393 " (%d).\n", index);
1cdcb6b4 3394 return ERR_PTR(-EINVAL);
1da177e4
LT
3395 }
3396
1da177e4
LT
3397 if (driver->type == TTY_DRIVER_TYPE_PTY)
3398 pty_line_name(driver, index, name);
3399 else
3400 tty_line_name(driver, index, name);
1cdcb6b4 3401
47aa5793 3402 return device_create_drvdata(tty_class, device, dev, NULL, name);
1da177e4
LT
3403}
3404
3405/**
af9b897e
AC
3406 * tty_unregister_device - unregister a tty device
3407 * @driver: the tty driver that describes the tty device
3408 * @index: the index in the tty driver for this tty device
1da177e4 3409 *
af9b897e
AC
3410 * If a tty device is registered with a call to tty_register_device() then
3411 * this function must be called when the tty device is gone.
3412 *
3413 * Locking: ??
1da177e4 3414 */
af9b897e 3415
1da177e4
LT
3416void tty_unregister_device(struct tty_driver *driver, unsigned index)
3417{
37bdfb07
AC
3418 device_destroy(tty_class,
3419 MKDEV(driver->major, driver->minor_start) + index);
1da177e4
LT
3420}
3421
3422EXPORT_SYMBOL(tty_register_device);
3423EXPORT_SYMBOL(tty_unregister_device);
3424
3425struct tty_driver *alloc_tty_driver(int lines)
3426{
3427 struct tty_driver *driver;
3428
506eb99a 3429 driver = kzalloc(sizeof(struct tty_driver), GFP_KERNEL);
1da177e4 3430 if (driver) {
1da177e4
LT
3431 driver->magic = TTY_DRIVER_MAGIC;
3432 driver->num = lines;
3433 /* later we'll move allocation of tables here */
3434 }
3435 return driver;
3436}
3437
3438void put_tty_driver(struct tty_driver *driver)
3439{
3440 kfree(driver);
3441}
3442
b68e31d0
JD
3443void tty_set_operations(struct tty_driver *driver,
3444 const struct tty_operations *op)
1da177e4 3445{
f34d7a5b
AC
3446 driver->ops = op;
3447};
1da177e4
LT
3448
3449EXPORT_SYMBOL(alloc_tty_driver);
3450EXPORT_SYMBOL(put_tty_driver);
3451EXPORT_SYMBOL(tty_set_operations);
3452
3453/*
3454 * Called by a tty driver to register itself.
3455 */
3456int tty_register_driver(struct tty_driver *driver)
3457{
3458 int error;
37bdfb07 3459 int i;
1da177e4
LT
3460 dev_t dev;
3461 void **p = NULL;
3462
3463 if (driver->flags & TTY_DRIVER_INSTALLED)
3464 return 0;
3465
543691a6
AW
3466 if (!(driver->flags & TTY_DRIVER_DEVPTS_MEM) && driver->num) {
3467 p = kzalloc(driver->num * 3 * sizeof(void *), GFP_KERNEL);
1da177e4
LT
3468 if (!p)
3469 return -ENOMEM;
1da177e4
LT
3470 }
3471
3472 if (!driver->major) {
37bdfb07
AC
3473 error = alloc_chrdev_region(&dev, driver->minor_start,
3474 driver->num, driver->name);
1da177e4
LT
3475 if (!error) {
3476 driver->major = MAJOR(dev);
3477 driver->minor_start = MINOR(dev);
3478 }
3479 } else {
3480 dev = MKDEV(driver->major, driver->minor_start);
e5717c48 3481 error = register_chrdev_region(dev, driver->num, driver->name);
1da177e4
LT
3482 }
3483 if (error < 0) {
3484 kfree(p);
3485 return error;
3486 }
3487
3488 if (p) {
3489 driver->ttys = (struct tty_struct **)p;
edc6afc5 3490 driver->termios = (struct ktermios **)(p + driver->num);
37bdfb07
AC
3491 driver->termios_locked = (struct ktermios **)
3492 (p + driver->num * 2);
1da177e4
LT
3493 } else {
3494 driver->ttys = NULL;
3495 driver->termios = NULL;
3496 driver->termios_locked = NULL;
3497 }
3498
3499 cdev_init(&driver->cdev, &tty_fops);
3500 driver->cdev.owner = driver->owner;
3501 error = cdev_add(&driver->cdev, dev, driver->num);
3502 if (error) {
1da177e4
LT
3503 unregister_chrdev_region(dev, driver->num);
3504 driver->ttys = NULL;
3505 driver->termios = driver->termios_locked = NULL;
3506 kfree(p);
3507 return error;
3508 }
3509
ca509f69 3510 mutex_lock(&tty_mutex);
1da177e4 3511 list_add(&driver->tty_drivers, &tty_drivers);
ca509f69 3512 mutex_unlock(&tty_mutex);
37bdfb07
AC
3513
3514 if (!(driver->flags & TTY_DRIVER_DYNAMIC_DEV)) {
3515 for (i = 0; i < driver->num; i++)
1da177e4
LT
3516 tty_register_device(driver, i, NULL);
3517 }
3518 proc_tty_register_driver(driver);
3519 return 0;
3520}
3521
3522EXPORT_SYMBOL(tty_register_driver);
3523
3524/*
3525 * Called by a tty driver to unregister itself.
3526 */
3527int tty_unregister_driver(struct tty_driver *driver)
3528{
3529 int i;
edc6afc5 3530 struct ktermios *tp;
1da177e4
LT
3531 void *p;
3532
3533 if (driver->refcount)
3534 return -EBUSY;
3535
3536 unregister_chrdev_region(MKDEV(driver->major, driver->minor_start),
3537 driver->num);
ca509f69 3538 mutex_lock(&tty_mutex);
1da177e4 3539 list_del(&driver->tty_drivers);
ca509f69 3540 mutex_unlock(&tty_mutex);
1da177e4
LT
3541
3542 /*
3543 * Free the termios and termios_locked structures because
3544 * we don't want to get memory leaks when modular tty
3545 * drivers are removed from the kernel.
3546 */
3547 for (i = 0; i < driver->num; i++) {
3548 tp = driver->termios[i];
3549 if (tp) {
3550 driver->termios[i] = NULL;
3551 kfree(tp);
3552 }
3553 tp = driver->termios_locked[i];
3554 if (tp) {
3555 driver->termios_locked[i] = NULL;
3556 kfree(tp);
3557 }
331b8319 3558 if (!(driver->flags & TTY_DRIVER_DYNAMIC_DEV))
1da177e4
LT
3559 tty_unregister_device(driver, i);
3560 }
3561 p = driver->ttys;
3562 proc_tty_unregister_driver(driver);
3563 driver->ttys = NULL;
3564 driver->termios = driver->termios_locked = NULL;
3565 kfree(p);
3566 cdev_del(&driver->cdev);
3567 return 0;
3568}
1da177e4
LT
3569EXPORT_SYMBOL(tty_unregister_driver);
3570
24ec839c
PZ
3571dev_t tty_devnum(struct tty_struct *tty)
3572{
3573 return MKDEV(tty->driver->major, tty->driver->minor_start) + tty->index;
3574}
3575EXPORT_SYMBOL(tty_devnum);
3576
3577void proc_clear_tty(struct task_struct *p)
3578{
3579 spin_lock_irq(&p->sighand->siglock);
3580 p->signal->tty = NULL;
3581 spin_unlock_irq(&p->sighand->siglock);
3582}
24ec839c 3583
47f86834
AC
3584/* Called under the sighand lock */
3585
2a65f1d9 3586static void __proc_set_tty(struct task_struct *tsk, struct tty_struct *tty)
24ec839c
PZ
3587{
3588 if (tty) {
47f86834
AC
3589 unsigned long flags;
3590 /* We should not have a session or pgrp to put here but.... */
3591 spin_lock_irqsave(&tty->ctrl_lock, flags);
d9c1e9a8
EB
3592 put_pid(tty->session);
3593 put_pid(tty->pgrp);
ab521dc0 3594 tty->pgrp = get_pid(task_pgrp(tsk));
47f86834
AC
3595 spin_unlock_irqrestore(&tty->ctrl_lock, flags);
3596 tty->session = get_pid(task_session(tsk));
24ec839c 3597 }
2a65f1d9 3598 put_pid(tsk->signal->tty_old_pgrp);
24ec839c 3599 tsk->signal->tty = tty;
ab521dc0 3600 tsk->signal->tty_old_pgrp = NULL;
24ec839c
PZ
3601}
3602
98a27ba4 3603static void proc_set_tty(struct task_struct *tsk, struct tty_struct *tty)
24ec839c
PZ
3604{
3605 spin_lock_irq(&tsk->sighand->siglock);
2a65f1d9 3606 __proc_set_tty(tsk, tty);
24ec839c
PZ
3607 spin_unlock_irq(&tsk->sighand->siglock);
3608}
3609
3610struct tty_struct *get_current_tty(void)
3611{
3612 struct tty_struct *tty;
3613 WARN_ON_ONCE(!mutex_is_locked(&tty_mutex));
3614 tty = current->signal->tty;
3615 /*
3616 * session->tty can be changed/cleared from under us, make sure we
3617 * issue the load. The obtained pointer, when not NULL, is valid as
3618 * long as we hold tty_mutex.
3619 */
3620 barrier();
3621 return tty;
3622}
a311f743 3623EXPORT_SYMBOL_GPL(get_current_tty);
1da177e4
LT
3624
3625/*
3626 * Initialize the console device. This is called *early*, so
3627 * we can't necessarily depend on lots of kernel help here.
3628 * Just do some early initializations, and do the complex setup
3629 * later.
3630 */
3631void __init console_init(void)
3632{
3633 initcall_t *call;
3634
3635 /* Setup the default TTY line discipline. */
01e1abb2 3636 tty_ldisc_begin();
1da177e4
LT
3637
3638 /*
37bdfb07 3639 * set up the console device so that later boot sequences can
1da177e4
LT
3640 * inform about problems etc..
3641 */
1da177e4
LT
3642 call = __con_initcall_start;
3643 while (call < __con_initcall_end) {
3644 (*call)();
3645 call++;
3646 }
3647}
3648
1da177e4
LT
3649static int __init tty_class_init(void)
3650{
7fe845d1 3651 tty_class = class_create(THIS_MODULE, "tty");
1da177e4
LT
3652 if (IS_ERR(tty_class))
3653 return PTR_ERR(tty_class);
3654 return 0;
3655}
3656
3657postcore_initcall(tty_class_init);
3658
3659/* 3/2004 jmc: why do these devices exist? */
3660
3661static struct cdev tty_cdev, console_cdev;
3662#ifdef CONFIG_UNIX98_PTYS
3663static struct cdev ptmx_cdev;
3664#endif
3665#ifdef CONFIG_VT
3666static struct cdev vc0_cdev;
3667#endif
3668
3669/*
3670 * Ok, now we can initialize the rest of the tty devices and can count
3671 * on memory allocations, interrupts etc..
3672 */
3673static int __init tty_init(void)
3674{
3675 cdev_init(&tty_cdev, &tty_fops);
3676 if (cdev_add(&tty_cdev, MKDEV(TTYAUX_MAJOR, 0), 1) ||
3677 register_chrdev_region(MKDEV(TTYAUX_MAJOR, 0), 1, "/dev/tty") < 0)
3678 panic("Couldn't register /dev/tty driver\n");
47aa5793
GKH
3679 device_create_drvdata(tty_class, NULL, MKDEV(TTYAUX_MAJOR, 0), NULL,
3680 "tty");
1da177e4
LT
3681
3682 cdev_init(&console_cdev, &console_fops);
3683 if (cdev_add(&console_cdev, MKDEV(TTYAUX_MAJOR, 1), 1) ||
3684 register_chrdev_region(MKDEV(TTYAUX_MAJOR, 1), 1, "/dev/console") < 0)
3685 panic("Couldn't register /dev/console driver\n");
47aa5793
GKH
3686 device_create_drvdata(tty_class, NULL, MKDEV(TTYAUX_MAJOR, 1), NULL,
3687 "console");
1da177e4
LT
3688
3689#ifdef CONFIG_UNIX98_PTYS
3690 cdev_init(&ptmx_cdev, &ptmx_fops);
3691 if (cdev_add(&ptmx_cdev, MKDEV(TTYAUX_MAJOR, 2), 1) ||
3692 register_chrdev_region(MKDEV(TTYAUX_MAJOR, 2), 1, "/dev/ptmx") < 0)
3693 panic("Couldn't register /dev/ptmx driver\n");
47aa5793 3694 device_create_drvdata(tty_class, NULL, MKDEV(TTYAUX_MAJOR, 2), NULL, "ptmx");
1da177e4
LT
3695#endif
3696
3697#ifdef CONFIG_VT
3698 cdev_init(&vc0_cdev, &console_fops);
3699 if (cdev_add(&vc0_cdev, MKDEV(TTY_MAJOR, 0), 1) ||
3700 register_chrdev_region(MKDEV(TTY_MAJOR, 0), 1, "/dev/vc/0") < 0)
3701 panic("Couldn't register /dev/tty0 driver\n");
47aa5793 3702 device_create_drvdata(tty_class, NULL, MKDEV(TTY_MAJOR, 0), NULL, "tty0");
1da177e4
LT
3703
3704 vty_init();
3705#endif
3706 return 0;
3707}
3708module_init(tty_init);