Char: mxser, call pci_disable_device from probe/remove
[linux-2.6-block.git] / drivers / char / tty_io.c
CommitLineData
1da177e4
LT
1/*
2 * linux/drivers/char/tty_io.c
3 *
4 * Copyright (C) 1991, 1992 Linus Torvalds
5 */
6
7/*
8 * 'tty_io.c' gives an orthogonal feeling to tty's, be they consoles
9 * or rs-channels. It also implements echoing, cooked mode etc.
10 *
11 * Kill-line thanks to John T Kohl, who also corrected VMIN = VTIME = 0.
12 *
13 * Modified by Theodore Ts'o, 9/14/92, to dynamically allocate the
14 * tty_struct and tty_queue structures. Previously there was an array
15 * of 256 tty_struct's which was statically allocated, and the
16 * tty_queue structures were allocated at boot time. Both are now
17 * dynamically allocated only when the tty is open.
18 *
19 * Also restructured routines so that there is more of a separation
20 * between the high-level tty routines (tty_io.c and tty_ioctl.c) and
21 * the low-level tty routines (serial.c, pty.c, console.c). This
37bdfb07 22 * makes for cleaner and more compact code. -TYT, 9/17/92
1da177e4
LT
23 *
24 * Modified by Fred N. van Kempen, 01/29/93, to add line disciplines
25 * which can be dynamically activated and de-activated by the line
26 * discipline handling modules (like SLIP).
27 *
28 * NOTE: pay no attention to the line discipline code (yet); its
29 * interface is still subject to change in this version...
30 * -- TYT, 1/31/92
31 *
32 * Added functionality to the OPOST tty handling. No delays, but all
33 * other bits should be there.
34 * -- Nick Holloway <alfie@dcs.warwick.ac.uk>, 27th May 1993.
35 *
36 * Rewrote canonical mode and added more termios flags.
37 * -- julian@uhunix.uhcc.hawaii.edu (J. Cowley), 13Jan94
38 *
39 * Reorganized FASYNC support so mouse code can share it.
40 * -- ctm@ardi.com, 9Sep95
41 *
42 * New TIOCLINUX variants added.
43 * -- mj@k332.feld.cvut.cz, 19-Nov-95
37bdfb07 44 *
1da177e4
LT
45 * Restrict vt switching via ioctl()
46 * -- grif@cs.ucr.edu, 5-Dec-95
47 *
48 * Move console and virtual terminal code to more appropriate files,
49 * implement CONFIG_VT and generalize console device interface.
50 * -- Marko Kohtala <Marko.Kohtala@hut.fi>, March 97
51 *
d81ed103 52 * Rewrote tty_init_dev and tty_release_dev to eliminate races.
1da177e4
LT
53 * -- Bill Hawes <whawes@star.net>, June 97
54 *
55 * Added devfs support.
56 * -- C. Scott Ananian <cananian@alumni.princeton.edu>, 13-Jan-1998
57 *
58 * Added support for a Unix98-style ptmx device.
59 * -- C. Scott Ananian <cananian@alumni.princeton.edu>, 14-Jan-1998
60 *
61 * Reduced memory usage for older ARM systems
62 * -- Russell King <rmk@arm.linux.org.uk>
63 *
64 * Move do_SAK() into process context. Less stack use in devfs functions.
37bdfb07
AC
65 * alloc_tty_struct() always uses kmalloc()
66 * -- Andrew Morton <andrewm@uow.edu.eu> 17Mar01
1da177e4
LT
67 */
68
1da177e4
LT
69#include <linux/types.h>
70#include <linux/major.h>
71#include <linux/errno.h>
72#include <linux/signal.h>
73#include <linux/fcntl.h>
74#include <linux/sched.h>
75#include <linux/interrupt.h>
76#include <linux/tty.h>
77#include <linux/tty_driver.h>
78#include <linux/tty_flip.h>
79#include <linux/devpts_fs.h>
80#include <linux/file.h>
9f3acc31 81#include <linux/fdtable.h>
1da177e4
LT
82#include <linux/console.h>
83#include <linux/timer.h>
84#include <linux/ctype.h>
85#include <linux/kd.h>
86#include <linux/mm.h>
87#include <linux/string.h>
88#include <linux/slab.h>
89#include <linux/poll.h>
90#include <linux/proc_fs.h>
91#include <linux/init.h>
92#include <linux/module.h>
93#include <linux/smp_lock.h>
94#include <linux/device.h>
1da177e4
LT
95#include <linux/wait.h>
96#include <linux/bitops.h>
b20f3ae5 97#include <linux/delay.h>
a352def2 98#include <linux/seq_file.h>
1da177e4 99
a352def2 100#include <linux/uaccess.h>
1da177e4
LT
101#include <asm/system.h>
102
103#include <linux/kbd_kern.h>
104#include <linux/vt_kern.h>
105#include <linux/selection.h>
1da177e4
LT
106
107#include <linux/kmod.h>
b488893a 108#include <linux/nsproxy.h>
1da177e4
LT
109
110#undef TTY_DEBUG_HANGUP
111
112#define TTY_PARANOIA_CHECK 1
113#define CHECK_TTY_COUNT 1
114
edc6afc5 115struct ktermios tty_std_termios = { /* for the benefit of tty drivers */
1da177e4
LT
116 .c_iflag = ICRNL | IXON,
117 .c_oflag = OPOST | ONLCR,
118 .c_cflag = B38400 | CS8 | CREAD | HUPCL,
119 .c_lflag = ISIG | ICANON | ECHO | ECHOE | ECHOK |
120 ECHOCTL | ECHOKE | IEXTEN,
edc6afc5
AC
121 .c_cc = INIT_C_CC,
122 .c_ispeed = 38400,
123 .c_ospeed = 38400
1da177e4
LT
124};
125
126EXPORT_SYMBOL(tty_std_termios);
127
128/* This list gets poked at by procfs and various bits of boot up code. This
129 could do with some rationalisation such as pulling the tty proc function
130 into this file */
37bdfb07 131
1da177e4
LT
132LIST_HEAD(tty_drivers); /* linked list of tty drivers */
133
24ec839c 134/* Mutex to protect creating and releasing a tty. This is shared with
1da177e4 135 vt.c for deeply disgusting hack reasons */
70522e12 136DEFINE_MUTEX(tty_mutex);
de2a84f2 137EXPORT_SYMBOL(tty_mutex);
1da177e4 138
ee2ffa0d
NP
139/* Spinlock to protect the tty->tty_files list */
140DEFINE_SPINLOCK(tty_files_lock);
141
1da177e4
LT
142static ssize_t tty_read(struct file *, char __user *, size_t, loff_t *);
143static ssize_t tty_write(struct file *, const char __user *, size_t, loff_t *);
37bdfb07
AC
144ssize_t redirected_tty_write(struct file *, const char __user *,
145 size_t, loff_t *);
1da177e4
LT
146static unsigned int tty_poll(struct file *, poll_table *);
147static int tty_open(struct inode *, struct file *);
04f378b1 148long tty_ioctl(struct file *file, unsigned int cmd, unsigned long arg);
e10cc1df 149#ifdef CONFIG_COMPAT
37bdfb07 150static long tty_compat_ioctl(struct file *file, unsigned int cmd,
e10cc1df
PF
151 unsigned long arg);
152#else
153#define tty_compat_ioctl NULL
154#endif
ec79d605 155static int __tty_fasync(int fd, struct file *filp, int on);
37bdfb07 156static int tty_fasync(int fd, struct file *filp, int on);
d5698c28 157static void release_tty(struct tty_struct *tty, int idx);
2a65f1d9 158static void __proc_set_tty(struct task_struct *tsk, struct tty_struct *tty);
98a27ba4 159static void proc_set_tty(struct task_struct *tsk, struct tty_struct *tty);
1da177e4 160
af9b897e
AC
161/**
162 * alloc_tty_struct - allocate a tty object
163 *
164 * Return a new empty tty structure. The data fields have not
165 * been initialized in any way but has been zeroed
166 *
167 * Locking: none
af9b897e 168 */
1da177e4 169
bf970ee4 170struct tty_struct *alloc_tty_struct(void)
1da177e4 171{
1266b1e1 172 return kzalloc(sizeof(struct tty_struct), GFP_KERNEL);
1da177e4
LT
173}
174
af9b897e
AC
175/**
176 * free_tty_struct - free a disused tty
177 * @tty: tty struct to free
178 *
179 * Free the write buffers, tty queue and tty memory itself.
180 *
181 * Locking: none. Must be called after tty is definitely unused
182 */
183
bf970ee4 184void free_tty_struct(struct tty_struct *tty)
1da177e4 185{
30004ac9
DES
186 if (tty->dev)
187 put_device(tty->dev);
1da177e4 188 kfree(tty->write_buf);
33f0f88f 189 tty_buffer_free_all(tty);
1da177e4
LT
190 kfree(tty);
191}
192
d996b62a
NP
193static inline struct tty_struct *file_tty(struct file *file)
194{
195 return ((struct tty_file_private *)file->private_data)->tty;
196}
197
198/* Associate a new file with the tty structure */
f573bd17 199int tty_add_file(struct tty_struct *tty, struct file *file)
d996b62a
NP
200{
201 struct tty_file_private *priv;
202
f573bd17
PE
203 priv = kmalloc(sizeof(*priv), GFP_KERNEL);
204 if (!priv)
205 return -ENOMEM;
d996b62a
NP
206
207 priv->tty = tty;
208 priv->file = file;
209 file->private_data = priv;
210
211 spin_lock(&tty_files_lock);
212 list_add(&priv->list, &tty->tty_files);
213 spin_unlock(&tty_files_lock);
f573bd17
PE
214
215 return 0;
d996b62a
NP
216}
217
218/* Delete file from its tty */
219void tty_del_file(struct file *file)
220{
221 struct tty_file_private *priv = file->private_data;
222
223 spin_lock(&tty_files_lock);
224 list_del(&priv->list);
225 spin_unlock(&tty_files_lock);
226 file->private_data = NULL;
227 kfree(priv);
228}
229
230
1da177e4
LT
231#define TTY_NUMBER(tty) ((tty)->index + (tty)->driver->name_base)
232
af9b897e
AC
233/**
234 * tty_name - return tty naming
235 * @tty: tty structure
236 * @buf: buffer for output
237 *
238 * Convert a tty structure into a name. The name reflects the kernel
239 * naming policy and if udev is in use may not reflect user space
240 *
241 * Locking: none
242 */
243
1da177e4
LT
244char *tty_name(struct tty_struct *tty, char *buf)
245{
246 if (!tty) /* Hmm. NULL pointer. That's fun. */
247 strcpy(buf, "NULL tty");
248 else
249 strcpy(buf, tty->name);
250 return buf;
251}
252
253EXPORT_SYMBOL(tty_name);
254
d769a669 255int tty_paranoia_check(struct tty_struct *tty, struct inode *inode,
1da177e4
LT
256 const char *routine)
257{
258#ifdef TTY_PARANOIA_CHECK
259 if (!tty) {
260 printk(KERN_WARNING
261 "null TTY for (%d:%d) in %s\n",
262 imajor(inode), iminor(inode), routine);
263 return 1;
264 }
265 if (tty->magic != TTY_MAGIC) {
266 printk(KERN_WARNING
267 "bad magic number for tty struct (%d:%d) in %s\n",
268 imajor(inode), iminor(inode), routine);
269 return 1;
270 }
271#endif
272 return 0;
273}
274
275static int check_tty_count(struct tty_struct *tty, const char *routine)
276{
277#ifdef CHECK_TTY_COUNT
278 struct list_head *p;
279 int count = 0;
37bdfb07 280
ee2ffa0d 281 spin_lock(&tty_files_lock);
1da177e4
LT
282 list_for_each(p, &tty->tty_files) {
283 count++;
284 }
ee2ffa0d 285 spin_unlock(&tty_files_lock);
1da177e4
LT
286 if (tty->driver->type == TTY_DRIVER_TYPE_PTY &&
287 tty->driver->subtype == PTY_TYPE_SLAVE &&
288 tty->link && tty->link->count)
289 count++;
290 if (tty->count != count) {
291 printk(KERN_WARNING "Warning: dev (%s) tty->count(%d) "
292 "!= #fd's(%d) in %s\n",
293 tty->name, tty->count, count, routine);
294 return count;
24ec839c 295 }
1da177e4
LT
296#endif
297 return 0;
298}
299
af9b897e
AC
300/**
301 * get_tty_driver - find device of a tty
302 * @dev_t: device identifier
303 * @index: returns the index of the tty
304 *
305 * This routine returns a tty driver structure, given a device number
306 * and also passes back the index number.
307 *
308 * Locking: caller must hold tty_mutex
1da177e4 309 */
af9b897e 310
1da177e4
LT
311static struct tty_driver *get_tty_driver(dev_t device, int *index)
312{
313 struct tty_driver *p;
314
315 list_for_each_entry(p, &tty_drivers, tty_drivers) {
316 dev_t base = MKDEV(p->major, p->minor_start);
317 if (device < base || device >= base + p->num)
318 continue;
319 *index = device - base;
7d7b93c1 320 return tty_driver_kref_get(p);
1da177e4
LT
321 }
322 return NULL;
323}
324
f2d937f3
JW
325#ifdef CONFIG_CONSOLE_POLL
326
327/**
328 * tty_find_polling_driver - find device of a polled tty
329 * @name: name string to match
330 * @line: pointer to resulting tty line nr
331 *
332 * This routine returns a tty driver structure, given a name
333 * and the condition that the tty driver is capable of polled
334 * operation.
335 */
336struct tty_driver *tty_find_polling_driver(char *name, int *line)
337{
338 struct tty_driver *p, *res = NULL;
339 int tty_line = 0;
0dca0fd2 340 int len;
5f0878ac 341 char *str, *stp;
f2d937f3 342
0dca0fd2
JW
343 for (str = name; *str; str++)
344 if ((*str >= '0' && *str <= '9') || *str == ',')
345 break;
346 if (!*str)
347 return NULL;
348
349 len = str - name;
350 tty_line = simple_strtoul(str, &str, 10);
351
f2d937f3
JW
352 mutex_lock(&tty_mutex);
353 /* Search through the tty devices to look for a match */
354 list_for_each_entry(p, &tty_drivers, tty_drivers) {
0dca0fd2
JW
355 if (strncmp(name, p->name, len) != 0)
356 continue;
5f0878ac
AC
357 stp = str;
358 if (*stp == ',')
359 stp++;
360 if (*stp == '\0')
361 stp = NULL;
f2d937f3 362
6eb68d6f 363 if (tty_line >= 0 && tty_line < p->num && p->ops &&
5f0878ac 364 p->ops->poll_init && !p->ops->poll_init(p, tty_line, stp)) {
7d7b93c1 365 res = tty_driver_kref_get(p);
f2d937f3
JW
366 *line = tty_line;
367 break;
368 }
369 }
370 mutex_unlock(&tty_mutex);
371
372 return res;
373}
374EXPORT_SYMBOL_GPL(tty_find_polling_driver);
375#endif
376
af9b897e
AC
377/**
378 * tty_check_change - check for POSIX terminal changes
379 * @tty: tty to check
380 *
381 * If we try to write to, or set the state of, a terminal and we're
382 * not in the foreground, send a SIGTTOU. If the signal is blocked or
383 * ignored, go ahead and perform the operation. (POSIX 7.2)
384 *
978e595f 385 * Locking: ctrl_lock
1da177e4 386 */
af9b897e 387
37bdfb07 388int tty_check_change(struct tty_struct *tty)
1da177e4 389{
47f86834
AC
390 unsigned long flags;
391 int ret = 0;
392
1da177e4
LT
393 if (current->signal->tty != tty)
394 return 0;
47f86834
AC
395
396 spin_lock_irqsave(&tty->ctrl_lock, flags);
397
ab521dc0
EB
398 if (!tty->pgrp) {
399 printk(KERN_WARNING "tty_check_change: tty->pgrp == NULL!\n");
9ffee4cb 400 goto out_unlock;
1da177e4 401 }
ab521dc0 402 if (task_pgrp(current) == tty->pgrp)
9ffee4cb
AM
403 goto out_unlock;
404 spin_unlock_irqrestore(&tty->ctrl_lock, flags);
1da177e4 405 if (is_ignored(SIGTTOU))
47f86834
AC
406 goto out;
407 if (is_current_pgrp_orphaned()) {
408 ret = -EIO;
409 goto out;
410 }
040b6362
ON
411 kill_pgrp(task_pgrp(current), SIGTTOU, 1);
412 set_thread_flag(TIF_SIGPENDING);
47f86834
AC
413 ret = -ERESTARTSYS;
414out:
9ffee4cb
AM
415 return ret;
416out_unlock:
47f86834
AC
417 spin_unlock_irqrestore(&tty->ctrl_lock, flags);
418 return ret;
1da177e4
LT
419}
420
421EXPORT_SYMBOL(tty_check_change);
422
37bdfb07 423static ssize_t hung_up_tty_read(struct file *file, char __user *buf,
1da177e4
LT
424 size_t count, loff_t *ppos)
425{
426 return 0;
427}
428
37bdfb07 429static ssize_t hung_up_tty_write(struct file *file, const char __user *buf,
1da177e4
LT
430 size_t count, loff_t *ppos)
431{
432 return -EIO;
433}
434
435/* No kernel lock held - none needed ;) */
37bdfb07 436static unsigned int hung_up_tty_poll(struct file *filp, poll_table *wait)
1da177e4
LT
437{
438 return POLLIN | POLLOUT | POLLERR | POLLHUP | POLLRDNORM | POLLWRNORM;
439}
440
04f378b1
AC
441static long hung_up_tty_ioctl(struct file *file, unsigned int cmd,
442 unsigned long arg)
38ad2ed0
PF
443{
444 return cmd == TIOCSPGRP ? -ENOTTY : -EIO;
445}
446
37bdfb07 447static long hung_up_tty_compat_ioctl(struct file *file,
38ad2ed0 448 unsigned int cmd, unsigned long arg)
1da177e4
LT
449{
450 return cmd == TIOCSPGRP ? -ENOTTY : -EIO;
451}
452
62322d25 453static const struct file_operations tty_fops = {
1da177e4
LT
454 .llseek = no_llseek,
455 .read = tty_read,
456 .write = tty_write,
457 .poll = tty_poll,
04f378b1 458 .unlocked_ioctl = tty_ioctl,
e10cc1df 459 .compat_ioctl = tty_compat_ioctl,
1da177e4
LT
460 .open = tty_open,
461 .release = tty_release,
462 .fasync = tty_fasync,
463};
464
62322d25 465static const struct file_operations console_fops = {
1da177e4
LT
466 .llseek = no_llseek,
467 .read = tty_read,
468 .write = redirected_tty_write,
469 .poll = tty_poll,
04f378b1 470 .unlocked_ioctl = tty_ioctl,
e10cc1df 471 .compat_ioctl = tty_compat_ioctl,
1da177e4
LT
472 .open = tty_open,
473 .release = tty_release,
474 .fasync = tty_fasync,
475};
476
62322d25 477static const struct file_operations hung_up_tty_fops = {
1da177e4
LT
478 .llseek = no_llseek,
479 .read = hung_up_tty_read,
480 .write = hung_up_tty_write,
481 .poll = hung_up_tty_poll,
04f378b1 482 .unlocked_ioctl = hung_up_tty_ioctl,
38ad2ed0 483 .compat_ioctl = hung_up_tty_compat_ioctl,
1da177e4
LT
484 .release = tty_release,
485};
486
487static DEFINE_SPINLOCK(redirect_lock);
488static struct file *redirect;
489
490/**
491 * tty_wakeup - request more data
492 * @tty: terminal
493 *
494 * Internal and external helper for wakeups of tty. This function
495 * informs the line discipline if present that the driver is ready
496 * to receive more output data.
497 */
37bdfb07 498
1da177e4
LT
499void tty_wakeup(struct tty_struct *tty)
500{
501 struct tty_ldisc *ld;
37bdfb07 502
1da177e4
LT
503 if (test_bit(TTY_DO_WRITE_WAKEUP, &tty->flags)) {
504 ld = tty_ldisc_ref(tty);
37bdfb07 505 if (ld) {
a352def2
AC
506 if (ld->ops->write_wakeup)
507 ld->ops->write_wakeup(tty);
1da177e4
LT
508 tty_ldisc_deref(ld);
509 }
510 }
4b19449d 511 wake_up_interruptible_poll(&tty->write_wait, POLLOUT);
1da177e4
LT
512}
513
514EXPORT_SYMBOL_GPL(tty_wakeup);
515
af9b897e 516/**
11dbf203 517 * __tty_hangup - actual handler for hangup events
65f27f38 518 * @work: tty device
af9b897e 519 *
1bad879a 520 * This can be called by the "eventd" kernel thread. That is process
af9b897e
AC
521 * synchronous but doesn't hold any locks, so we need to make sure we
522 * have the appropriate locks for what we're doing.
523 *
524 * The hangup event clears any pending redirections onto the hung up
525 * device. It ensures future writes will error and it does the needed
526 * line discipline hangup and signal delivery. The tty object itself
527 * remains intact.
528 *
529 * Locking:
ec79d605 530 * BTM
24ec839c
PZ
531 * redirect lock for undoing redirection
532 * file list lock for manipulating list of ttys
533 * tty_ldisc_lock from called functions
534 * termios_mutex resetting termios data
535 * tasklist_lock to walk task list for hangup event
536 * ->siglock to protect ->signal/->sighand
1da177e4 537 */
11dbf203 538void __tty_hangup(struct tty_struct *tty)
1da177e4 539{
37bdfb07 540 struct file *cons_filp = NULL;
1da177e4
LT
541 struct file *filp, *f = NULL;
542 struct task_struct *p;
d996b62a 543 struct tty_file_private *priv;
1da177e4 544 int closecount = 0, n;
47f86834 545 unsigned long flags;
9c9f4ded 546 int refs = 0;
1da177e4
LT
547
548 if (!tty)
549 return;
550
1da177e4
LT
551
552 spin_lock(&redirect_lock);
d996b62a 553 if (redirect && file_tty(redirect) == tty) {
1da177e4
LT
554 f = redirect;
555 redirect = NULL;
556 }
557 spin_unlock(&redirect_lock);
37bdfb07 558
11dbf203
AB
559 tty_lock();
560
ec79d605
AB
561 /* inuse_filps is protected by the single tty lock,
562 this really needs to change if we want to flush the
563 workqueue with the lock held */
11dbf203 564 check_tty_count(tty, "tty_hangup");
36ba782e 565
ee2ffa0d 566 spin_lock(&tty_files_lock);
1da177e4 567 /* This breaks for file handles being sent over AF_UNIX sockets ? */
d996b62a
NP
568 list_for_each_entry(priv, &tty->tty_files, list) {
569 filp = priv->file;
1da177e4
LT
570 if (filp->f_op->write == redirected_tty_write)
571 cons_filp = filp;
572 if (filp->f_op->write != tty_write)
573 continue;
574 closecount++;
ec79d605 575 __tty_fasync(-1, filp, 0); /* can't block */
1da177e4
LT
576 filp->f_op = &hung_up_tty_fops;
577 }
ee2ffa0d 578 spin_unlock(&tty_files_lock);
37bdfb07 579
c65c9bc3 580 tty_ldisc_hangup(tty);
37bdfb07 581
1da177e4 582 read_lock(&tasklist_lock);
ab521dc0
EB
583 if (tty->session) {
584 do_each_pid_task(tty->session, PIDTYPE_SID, p) {
24ec839c 585 spin_lock_irq(&p->sighand->siglock);
9c9f4ded 586 if (p->signal->tty == tty) {
1da177e4 587 p->signal->tty = NULL;
9c9f4ded
AC
588 /* We defer the dereferences outside fo
589 the tasklist lock */
590 refs++;
591 }
24ec839c
PZ
592 if (!p->signal->leader) {
593 spin_unlock_irq(&p->sighand->siglock);
1da177e4 594 continue;
24ec839c
PZ
595 }
596 __group_send_sig_info(SIGHUP, SEND_SIG_PRIV, p);
597 __group_send_sig_info(SIGCONT, SEND_SIG_PRIV, p);
ab521dc0 598 put_pid(p->signal->tty_old_pgrp); /* A noop */
47f86834 599 spin_lock_irqsave(&tty->ctrl_lock, flags);
ab521dc0
EB
600 if (tty->pgrp)
601 p->signal->tty_old_pgrp = get_pid(tty->pgrp);
47f86834 602 spin_unlock_irqrestore(&tty->ctrl_lock, flags);
24ec839c 603 spin_unlock_irq(&p->sighand->siglock);
ab521dc0 604 } while_each_pid_task(tty->session, PIDTYPE_SID, p);
1da177e4
LT
605 }
606 read_unlock(&tasklist_lock);
607
47f86834 608 spin_lock_irqsave(&tty->ctrl_lock, flags);
c65c9bc3
AC
609 clear_bit(TTY_THROTTLED, &tty->flags);
610 clear_bit(TTY_PUSH, &tty->flags);
611 clear_bit(TTY_DO_WRITE_WAKEUP, &tty->flags);
d9c1e9a8
EB
612 put_pid(tty->session);
613 put_pid(tty->pgrp);
ab521dc0
EB
614 tty->session = NULL;
615 tty->pgrp = NULL;
1da177e4 616 tty->ctrl_status = 0;
c65c9bc3 617 set_bit(TTY_HUPPED, &tty->flags);
47f86834
AC
618 spin_unlock_irqrestore(&tty->ctrl_lock, flags);
619
9c9f4ded
AC
620 /* Account for the p->signal references we killed */
621 while (refs--)
622 tty_kref_put(tty);
623
1da177e4 624 /*
37bdfb07
AC
625 * If one of the devices matches a console pointer, we
626 * cannot just call hangup() because that will cause
627 * tty->count and state->count to go out of sync.
628 * So we just call close() the right number of times.
1da177e4
LT
629 */
630 if (cons_filp) {
f34d7a5b 631 if (tty->ops->close)
1da177e4 632 for (n = 0; n < closecount; n++)
f34d7a5b
AC
633 tty->ops->close(tty, cons_filp);
634 } else if (tty->ops->hangup)
635 (tty->ops->hangup)(tty);
37bdfb07
AC
636 /*
637 * We don't want to have driver/ldisc interactions beyond
638 * the ones we did here. The driver layer expects no
639 * calls after ->hangup() from the ldisc side. However we
640 * can't yet guarantee all that.
641 */
1da177e4 642 set_bit(TTY_HUPPED, &tty->flags);
c65c9bc3 643 tty_ldisc_enable(tty);
11dbf203
AB
644
645 tty_unlock();
646
1da177e4
LT
647 if (f)
648 fput(f);
649}
650
ddcd9fb6
AB
651static void do_tty_hangup(struct work_struct *work)
652{
653 struct tty_struct *tty =
654 container_of(work, struct tty_struct, hangup_work);
655
11dbf203 656 __tty_hangup(tty);
ddcd9fb6
AB
657}
658
af9b897e
AC
659/**
660 * tty_hangup - trigger a hangup event
661 * @tty: tty to hangup
662 *
663 * A carrier loss (virtual or otherwise) has occurred on this like
664 * schedule a hangup sequence to run after this event.
665 */
666
37bdfb07 667void tty_hangup(struct tty_struct *tty)
1da177e4
LT
668{
669#ifdef TTY_DEBUG_HANGUP
670 char buf[64];
1da177e4
LT
671 printk(KERN_DEBUG "%s hangup...\n", tty_name(tty, buf));
672#endif
673 schedule_work(&tty->hangup_work);
674}
675
676EXPORT_SYMBOL(tty_hangup);
677
af9b897e
AC
678/**
679 * tty_vhangup - process vhangup
680 * @tty: tty to hangup
681 *
682 * The user has asked via system call for the terminal to be hung up.
683 * We do this synchronously so that when the syscall returns the process
3a4fa0a2 684 * is complete. That guarantee is necessary for security reasons.
af9b897e
AC
685 */
686
37bdfb07 687void tty_vhangup(struct tty_struct *tty)
1da177e4
LT
688{
689#ifdef TTY_DEBUG_HANGUP
690 char buf[64];
691
692 printk(KERN_DEBUG "%s vhangup...\n", tty_name(tty, buf));
693#endif
11dbf203 694 __tty_hangup(tty);
1da177e4 695}
37bdfb07 696
1da177e4
LT
697EXPORT_SYMBOL(tty_vhangup);
698
11dbf203 699
2cb5998b
AC
700/**
701 * tty_vhangup_self - process vhangup for own ctty
702 *
703 * Perform a vhangup on the current controlling tty
704 */
705
706void tty_vhangup_self(void)
707{
708 struct tty_struct *tty;
709
2cb5998b
AC
710 tty = get_current_tty();
711 if (tty) {
712 tty_vhangup(tty);
713 tty_kref_put(tty);
714 }
2cb5998b
AC
715}
716
af9b897e
AC
717/**
718 * tty_hung_up_p - was tty hung up
719 * @filp: file pointer of tty
720 *
721 * Return true if the tty has been subject to a vhangup or a carrier
722 * loss
723 */
724
37bdfb07 725int tty_hung_up_p(struct file *filp)
1da177e4
LT
726{
727 return (filp->f_op == &hung_up_tty_fops);
728}
729
730EXPORT_SYMBOL(tty_hung_up_p);
731
ab521dc0 732static void session_clear_tty(struct pid *session)
24ec839c
PZ
733{
734 struct task_struct *p;
ab521dc0 735 do_each_pid_task(session, PIDTYPE_SID, p) {
24ec839c 736 proc_clear_tty(p);
ab521dc0 737 } while_each_pid_task(session, PIDTYPE_SID, p);
24ec839c
PZ
738}
739
af9b897e
AC
740/**
741 * disassociate_ctty - disconnect controlling tty
742 * @on_exit: true if exiting so need to "hang up" the session
1da177e4 743 *
af9b897e
AC
744 * This function is typically called only by the session leader, when
745 * it wants to disassociate itself from its controlling tty.
746 *
747 * It performs the following functions:
1da177e4
LT
748 * (1) Sends a SIGHUP and SIGCONT to the foreground process group
749 * (2) Clears the tty from being controlling the session
750 * (3) Clears the controlling tty for all processes in the
751 * session group.
752 *
af9b897e
AC
753 * The argument on_exit is set to 1 if called when a process is
754 * exiting; it is 0 if called by the ioctl TIOCNOTTY.
755 *
24ec839c 756 * Locking:
ec79d605
AB
757 * BTM is taken for hysterical raisins, and held when
758 * called from no_tty().
24ec839c
PZ
759 * tty_mutex is taken to protect tty
760 * ->siglock is taken to protect ->signal/->sighand
761 * tasklist_lock is taken to walk process list for sessions
762 * ->siglock is taken to protect ->signal/->sighand
1da177e4 763 */
af9b897e 764
1da177e4
LT
765void disassociate_ctty(int on_exit)
766{
767 struct tty_struct *tty;
ab521dc0 768 struct pid *tty_pgrp = NULL;
1da177e4 769
5ec93d11
AC
770 if (!current->signal->leader)
771 return;
1da177e4 772
24ec839c 773 tty = get_current_tty();
1da177e4 774 if (tty) {
ab521dc0 775 tty_pgrp = get_pid(tty->pgrp);
ddcd9fb6 776 if (on_exit) {
ddcd9fb6 777 if (tty->driver->type != TTY_DRIVER_TYPE_PTY)
11dbf203 778 tty_vhangup(tty);
ddcd9fb6 779 }
452a00d2 780 tty_kref_put(tty);
680a9671 781 } else if (on_exit) {
ab521dc0 782 struct pid *old_pgrp;
680a9671
EB
783 spin_lock_irq(&current->sighand->siglock);
784 old_pgrp = current->signal->tty_old_pgrp;
ab521dc0 785 current->signal->tty_old_pgrp = NULL;
680a9671 786 spin_unlock_irq(&current->sighand->siglock);
24ec839c 787 if (old_pgrp) {
ab521dc0
EB
788 kill_pgrp(old_pgrp, SIGHUP, on_exit);
789 kill_pgrp(old_pgrp, SIGCONT, on_exit);
790 put_pid(old_pgrp);
1da177e4 791 }
1da177e4
LT
792 return;
793 }
ab521dc0
EB
794 if (tty_pgrp) {
795 kill_pgrp(tty_pgrp, SIGHUP, on_exit);
1da177e4 796 if (!on_exit)
ab521dc0
EB
797 kill_pgrp(tty_pgrp, SIGCONT, on_exit);
798 put_pid(tty_pgrp);
1da177e4
LT
799 }
800
24ec839c 801 spin_lock_irq(&current->sighand->siglock);
2a65f1d9 802 put_pid(current->signal->tty_old_pgrp);
23cac8de 803 current->signal->tty_old_pgrp = NULL;
24ec839c
PZ
804 spin_unlock_irq(&current->sighand->siglock);
805
24ec839c
PZ
806 tty = get_current_tty();
807 if (tty) {
47f86834
AC
808 unsigned long flags;
809 spin_lock_irqsave(&tty->ctrl_lock, flags);
ab521dc0
EB
810 put_pid(tty->session);
811 put_pid(tty->pgrp);
812 tty->session = NULL;
813 tty->pgrp = NULL;
47f86834 814 spin_unlock_irqrestore(&tty->ctrl_lock, flags);
452a00d2 815 tty_kref_put(tty);
24ec839c
PZ
816 } else {
817#ifdef TTY_DEBUG_HANGUP
818 printk(KERN_DEBUG "error attempted to write to tty [0x%p]"
819 " = NULL", tty);
820#endif
821 }
1da177e4
LT
822
823 /* Now clear signal->tty under the lock */
824 read_lock(&tasklist_lock);
ab521dc0 825 session_clear_tty(task_session(current));
1da177e4 826 read_unlock(&tasklist_lock);
1da177e4
LT
827}
828
98a27ba4
EB
829/**
830 *
831 * no_tty - Ensure the current process does not have a controlling tty
832 */
833void no_tty(void)
834{
835 struct task_struct *tsk = current;
ec79d605 836 tty_lock();
5ec93d11 837 disassociate_ctty(0);
ec79d605 838 tty_unlock();
98a27ba4
EB
839 proc_clear_tty(tsk);
840}
841
af9b897e
AC
842
843/**
beb7dd86 844 * stop_tty - propagate flow control
af9b897e
AC
845 * @tty: tty to stop
846 *
847 * Perform flow control to the driver. For PTY/TTY pairs we
beb7dd86 848 * must also propagate the TIOCKPKT status. May be called
af9b897e
AC
849 * on an already stopped device and will not re-call the driver
850 * method.
851 *
852 * This functionality is used by both the line disciplines for
853 * halting incoming flow and by the driver. It may therefore be
854 * called from any context, may be under the tty atomic_write_lock
855 * but not always.
856 *
857 * Locking:
04f378b1 858 * Uses the tty control lock internally
af9b897e
AC
859 */
860
1da177e4
LT
861void stop_tty(struct tty_struct *tty)
862{
04f378b1
AC
863 unsigned long flags;
864 spin_lock_irqsave(&tty->ctrl_lock, flags);
865 if (tty->stopped) {
866 spin_unlock_irqrestore(&tty->ctrl_lock, flags);
1da177e4 867 return;
04f378b1 868 }
1da177e4
LT
869 tty->stopped = 1;
870 if (tty->link && tty->link->packet) {
871 tty->ctrl_status &= ~TIOCPKT_START;
872 tty->ctrl_status |= TIOCPKT_STOP;
4b19449d 873 wake_up_interruptible_poll(&tty->link->read_wait, POLLIN);
1da177e4 874 }
04f378b1 875 spin_unlock_irqrestore(&tty->ctrl_lock, flags);
f34d7a5b
AC
876 if (tty->ops->stop)
877 (tty->ops->stop)(tty);
1da177e4
LT
878}
879
880EXPORT_SYMBOL(stop_tty);
881
af9b897e 882/**
beb7dd86 883 * start_tty - propagate flow control
af9b897e
AC
884 * @tty: tty to start
885 *
886 * Start a tty that has been stopped if at all possible. Perform
3a4fa0a2 887 * any necessary wakeups and propagate the TIOCPKT status. If this
af9b897e
AC
888 * is the tty was previous stopped and is being started then the
889 * driver start method is invoked and the line discipline woken.
890 *
891 * Locking:
04f378b1 892 * ctrl_lock
af9b897e
AC
893 */
894
1da177e4
LT
895void start_tty(struct tty_struct *tty)
896{
04f378b1
AC
897 unsigned long flags;
898 spin_lock_irqsave(&tty->ctrl_lock, flags);
899 if (!tty->stopped || tty->flow_stopped) {
900 spin_unlock_irqrestore(&tty->ctrl_lock, flags);
1da177e4 901 return;
04f378b1 902 }
1da177e4
LT
903 tty->stopped = 0;
904 if (tty->link && tty->link->packet) {
905 tty->ctrl_status &= ~TIOCPKT_STOP;
906 tty->ctrl_status |= TIOCPKT_START;
4b19449d 907 wake_up_interruptible_poll(&tty->link->read_wait, POLLIN);
1da177e4 908 }
04f378b1 909 spin_unlock_irqrestore(&tty->ctrl_lock, flags);
f34d7a5b
AC
910 if (tty->ops->start)
911 (tty->ops->start)(tty);
1da177e4
LT
912 /* If we have a running line discipline it may need kicking */
913 tty_wakeup(tty);
1da177e4
LT
914}
915
916EXPORT_SYMBOL(start_tty);
917
af9b897e
AC
918/**
919 * tty_read - read method for tty device files
920 * @file: pointer to tty file
921 * @buf: user buffer
922 * @count: size of user buffer
923 * @ppos: unused
924 *
925 * Perform the read system call function on this terminal device. Checks
926 * for hung up devices before calling the line discipline method.
927 *
928 * Locking:
47f86834
AC
929 * Locks the line discipline internally while needed. Multiple
930 * read calls may be outstanding in parallel.
af9b897e
AC
931 */
932
37bdfb07 933static ssize_t tty_read(struct file *file, char __user *buf, size_t count,
1da177e4
LT
934 loff_t *ppos)
935{
936 int i;
d996b62a
NP
937 struct inode *inode = file->f_path.dentry->d_inode;
938 struct tty_struct *tty = file_tty(file);
1da177e4
LT
939 struct tty_ldisc *ld;
940
1da177e4
LT
941 if (tty_paranoia_check(tty, inode, "tty_read"))
942 return -EIO;
943 if (!tty || (test_bit(TTY_IO_ERROR, &tty->flags)))
944 return -EIO;
945
946 /* We want to wait for the line discipline to sort out in this
947 situation */
948 ld = tty_ldisc_ref_wait(tty);
a352def2
AC
949 if (ld->ops->read)
950 i = (ld->ops->read)(tty, file, buf, count);
1da177e4
LT
951 else
952 i = -EIO;
953 tty_ldisc_deref(ld);
1da177e4
LT
954 if (i > 0)
955 inode->i_atime = current_fs_time(inode->i_sb);
956 return i;
957}
958
9c1729db
AC
959void tty_write_unlock(struct tty_struct *tty)
960{
961 mutex_unlock(&tty->atomic_write_lock);
4b19449d 962 wake_up_interruptible_poll(&tty->write_wait, POLLOUT);
9c1729db
AC
963}
964
965int tty_write_lock(struct tty_struct *tty, int ndelay)
966{
967 if (!mutex_trylock(&tty->atomic_write_lock)) {
968 if (ndelay)
969 return -EAGAIN;
970 if (mutex_lock_interruptible(&tty->atomic_write_lock))
971 return -ERESTARTSYS;
972 }
973 return 0;
974}
975
1da177e4
LT
976/*
977 * Split writes up in sane blocksizes to avoid
978 * denial-of-service type attacks
979 */
980static inline ssize_t do_tty_write(
981 ssize_t (*write)(struct tty_struct *, struct file *, const unsigned char *, size_t),
982 struct tty_struct *tty,
983 struct file *file,
984 const char __user *buf,
985 size_t count)
986{
9c1729db 987 ssize_t ret, written = 0;
1da177e4 988 unsigned int chunk;
37bdfb07 989
9c1729db
AC
990 ret = tty_write_lock(tty, file->f_flags & O_NDELAY);
991 if (ret < 0)
992 return ret;
1da177e4
LT
993
994 /*
995 * We chunk up writes into a temporary buffer. This
996 * simplifies low-level drivers immensely, since they
997 * don't have locking issues and user mode accesses.
998 *
999 * But if TTY_NO_WRITE_SPLIT is set, we should use a
1000 * big chunk-size..
1001 *
1002 * The default chunk-size is 2kB, because the NTTY
1003 * layer has problems with bigger chunks. It will
1004 * claim to be able to handle more characters than
1005 * it actually does.
af9b897e
AC
1006 *
1007 * FIXME: This can probably go away now except that 64K chunks
1008 * are too likely to fail unless switched to vmalloc...
1da177e4
LT
1009 */
1010 chunk = 2048;
1011 if (test_bit(TTY_NO_WRITE_SPLIT, &tty->flags))
1012 chunk = 65536;
1013 if (count < chunk)
1014 chunk = count;
1015
70522e12 1016 /* write_buf/write_cnt is protected by the atomic_write_lock mutex */
1da177e4 1017 if (tty->write_cnt < chunk) {
402fda92 1018 unsigned char *buf_chunk;
1da177e4
LT
1019
1020 if (chunk < 1024)
1021 chunk = 1024;
1022
402fda92
JW
1023 buf_chunk = kmalloc(chunk, GFP_KERNEL);
1024 if (!buf_chunk) {
9c1729db
AC
1025 ret = -ENOMEM;
1026 goto out;
1da177e4
LT
1027 }
1028 kfree(tty->write_buf);
1029 tty->write_cnt = chunk;
402fda92 1030 tty->write_buf = buf_chunk;
1da177e4
LT
1031 }
1032
1033 /* Do the write .. */
1034 for (;;) {
1035 size_t size = count;
1036 if (size > chunk)
1037 size = chunk;
1038 ret = -EFAULT;
1039 if (copy_from_user(tty->write_buf, buf, size))
1040 break;
1da177e4 1041 ret = write(tty, file, tty->write_buf, size);
1da177e4
LT
1042 if (ret <= 0)
1043 break;
1044 written += ret;
1045 buf += ret;
1046 count -= ret;
1047 if (!count)
1048 break;
1049 ret = -ERESTARTSYS;
1050 if (signal_pending(current))
1051 break;
1052 cond_resched();
1053 }
1054 if (written) {
a7113a96 1055 struct inode *inode = file->f_path.dentry->d_inode;
1da177e4
LT
1056 inode->i_mtime = current_fs_time(inode->i_sb);
1057 ret = written;
1058 }
9c1729db
AC
1059out:
1060 tty_write_unlock(tty);
1da177e4
LT
1061 return ret;
1062}
1063
95f9bfc6
AC
1064/**
1065 * tty_write_message - write a message to a certain tty, not just the console.
1066 * @tty: the destination tty_struct
1067 * @msg: the message to write
1068 *
1069 * This is used for messages that need to be redirected to a specific tty.
1070 * We don't put it into the syslog queue right now maybe in the future if
1071 * really needed.
1072 *
ec79d605 1073 * We must still hold the BTM and test the CLOSING flag for the moment.
95f9bfc6
AC
1074 */
1075
1076void tty_write_message(struct tty_struct *tty, char *msg)
1077{
95f9bfc6
AC
1078 if (tty) {
1079 mutex_lock(&tty->atomic_write_lock);
ec79d605 1080 tty_lock();
eeb89d91 1081 if (tty->ops->write && !test_bit(TTY_CLOSING, &tty->flags)) {
ec79d605 1082 tty_unlock();
95f9bfc6 1083 tty->ops->write(tty, msg, strlen(msg));
eeb89d91 1084 } else
ec79d605 1085 tty_unlock();
95f9bfc6
AC
1086 tty_write_unlock(tty);
1087 }
95f9bfc6
AC
1088 return;
1089}
1090
1da177e4 1091
af9b897e
AC
1092/**
1093 * tty_write - write method for tty device file
1094 * @file: tty file pointer
1095 * @buf: user data to write
1096 * @count: bytes to write
1097 * @ppos: unused
1098 *
1099 * Write data to a tty device via the line discipline.
1100 *
1101 * Locking:
1102 * Locks the line discipline as required
1103 * Writes to the tty driver are serialized by the atomic_write_lock
1104 * and are then processed in chunks to the device. The line discipline
a88a69c9 1105 * write method will not be invoked in parallel for each device.
af9b897e
AC
1106 */
1107
37bdfb07
AC
1108static ssize_t tty_write(struct file *file, const char __user *buf,
1109 size_t count, loff_t *ppos)
1da177e4 1110{
a7113a96 1111 struct inode *inode = file->f_path.dentry->d_inode;
d996b62a
NP
1112 struct tty_struct *tty = file_tty(file);
1113 struct tty_ldisc *ld;
1da177e4 1114 ssize_t ret;
37bdfb07 1115
1da177e4
LT
1116 if (tty_paranoia_check(tty, inode, "tty_write"))
1117 return -EIO;
f34d7a5b 1118 if (!tty || !tty->ops->write ||
37bdfb07
AC
1119 (test_bit(TTY_IO_ERROR, &tty->flags)))
1120 return -EIO;
f34d7a5b
AC
1121 /* Short term debug to catch buggy drivers */
1122 if (tty->ops->write_room == NULL)
1123 printk(KERN_ERR "tty driver %s lacks a write_room method.\n",
1124 tty->driver->name);
37bdfb07 1125 ld = tty_ldisc_ref_wait(tty);
a352def2 1126 if (!ld->ops->write)
1da177e4
LT
1127 ret = -EIO;
1128 else
a352def2 1129 ret = do_tty_write(ld->ops->write, tty, file, buf, count);
1da177e4
LT
1130 tty_ldisc_deref(ld);
1131 return ret;
1132}
1133
37bdfb07
AC
1134ssize_t redirected_tty_write(struct file *file, const char __user *buf,
1135 size_t count, loff_t *ppos)
1da177e4
LT
1136{
1137 struct file *p = NULL;
1138
1139 spin_lock(&redirect_lock);
1140 if (redirect) {
1141 get_file(redirect);
1142 p = redirect;
1143 }
1144 spin_unlock(&redirect_lock);
1145
1146 if (p) {
1147 ssize_t res;
1148 res = vfs_write(p, buf, count, &p->f_pos);
1149 fput(p);
1150 return res;
1151 }
1da177e4
LT
1152 return tty_write(file, buf, count, ppos);
1153}
1154
1155static char ptychar[] = "pqrstuvwxyzabcde";
1156
af9b897e
AC
1157/**
1158 * pty_line_name - generate name for a pty
1159 * @driver: the tty driver in use
1160 * @index: the minor number
1161 * @p: output buffer of at least 6 bytes
1162 *
1163 * Generate a name from a driver reference and write it to the output
1164 * buffer.
1165 *
1166 * Locking: None
1167 */
1168static void pty_line_name(struct tty_driver *driver, int index, char *p)
1da177e4
LT
1169{
1170 int i = index + driver->name_base;
1171 /* ->name is initialized to "ttyp", but "tty" is expected */
1172 sprintf(p, "%s%c%x",
37bdfb07
AC
1173 driver->subtype == PTY_TYPE_SLAVE ? "tty" : driver->name,
1174 ptychar[i >> 4 & 0xf], i & 0xf);
1da177e4
LT
1175}
1176
af9b897e 1177/**
8b0a88d5 1178 * tty_line_name - generate name for a tty
af9b897e
AC
1179 * @driver: the tty driver in use
1180 * @index: the minor number
1181 * @p: output buffer of at least 7 bytes
1182 *
1183 * Generate a name from a driver reference and write it to the output
1184 * buffer.
1185 *
1186 * Locking: None
1187 */
1188static void tty_line_name(struct tty_driver *driver, int index, char *p)
1da177e4
LT
1189{
1190 sprintf(p, "%s%d", driver->name, index + driver->name_base);
1191}
1192
99f1fe18
AC
1193/**
1194 * tty_driver_lookup_tty() - find an existing tty, if any
1195 * @driver: the driver for the tty
1196 * @idx: the minor number
23499705 1197 *
99f1fe18 1198 * Return the tty, if found or ERR_PTR() otherwise.
23499705 1199 *
99f1fe18
AC
1200 * Locking: tty_mutex must be held. If tty is found, the mutex must
1201 * be held until the 'fast-open' is also done. Will change once we
1202 * have refcounting in the driver and per driver locking
23499705 1203 */
a47d545f 1204static struct tty_struct *tty_driver_lookup_tty(struct tty_driver *driver,
15f1a633 1205 struct inode *inode, int idx)
23499705
SB
1206{
1207 struct tty_struct *tty;
1208
99f1fe18 1209 if (driver->ops->lookup)
15f1a633 1210 return driver->ops->lookup(driver, inode, idx);
23499705 1211
8b0a88d5 1212 tty = driver->ttys[idx];
23499705
SB
1213 return tty;
1214}
1215
bf970ee4
AC
1216/**
1217 * tty_init_termios - helper for termios setup
1218 * @tty: the tty to set up
1219 *
1220 * Initialise the termios structures for this tty. Thus runs under
1221 * the tty_mutex currently so we can be relaxed about ordering.
1222 */
1223
1224int tty_init_termios(struct tty_struct *tty)
1225{
fe6e29fd 1226 struct ktermios *tp;
bf970ee4
AC
1227 int idx = tty->index;
1228
1229 tp = tty->driver->termios[idx];
bf970ee4 1230 if (tp == NULL) {
fe6e29fd
AC
1231 tp = kzalloc(sizeof(struct ktermios[2]), GFP_KERNEL);
1232 if (tp == NULL)
bf970ee4 1233 return -ENOMEM;
bf970ee4
AC
1234 memcpy(tp, &tty->driver->init_termios,
1235 sizeof(struct ktermios));
1236 tty->driver->termios[idx] = tp;
bf970ee4
AC
1237 }
1238 tty->termios = tp;
fe6e29fd 1239 tty->termios_locked = tp + 1;
bf970ee4
AC
1240
1241 /* Compatibility until drivers always set this */
1242 tty->termios->c_ispeed = tty_termios_input_baud_rate(tty->termios);
1243 tty->termios->c_ospeed = tty_termios_baud_rate(tty->termios);
1244 return 0;
1245}
fe1ae7fd 1246EXPORT_SYMBOL_GPL(tty_init_termios);
bf970ee4 1247
99f1fe18 1248/**
8b0a88d5
AC
1249 * tty_driver_install_tty() - install a tty entry in the driver
1250 * @driver: the driver for the tty
1251 * @tty: the tty
1252 *
1253 * Install a tty object into the driver tables. The tty->index field
bf970ee4
AC
1254 * will be set by the time this is called. This method is responsible
1255 * for ensuring any need additional structures are allocated and
1256 * configured.
8b0a88d5
AC
1257 *
1258 * Locking: tty_mutex for now
1259 */
1260static int tty_driver_install_tty(struct tty_driver *driver,
1261 struct tty_struct *tty)
1262{
bf970ee4 1263 int idx = tty->index;
eeb89d91 1264 int ret;
bf970ee4 1265
eeb89d91 1266 if (driver->ops->install) {
eeb89d91 1267 ret = driver->ops->install(driver, tty);
eeb89d91
AC
1268 return ret;
1269 }
bf970ee4
AC
1270
1271 if (tty_init_termios(tty) == 0) {
1272 tty_driver_kref_get(driver);
1273 tty->count++;
1274 driver->ttys[idx] = tty;
1275 return 0;
1276 }
1277 return -ENOMEM;
8b0a88d5
AC
1278}
1279
1280/**
1281 * tty_driver_remove_tty() - remove a tty from the driver tables
1282 * @driver: the driver for the tty
1283 * @idx: the minor number
1284 *
1285 * Remvoe a tty object from the driver tables. The tty->index field
1286 * will be set by the time this is called.
1287 *
1288 * Locking: tty_mutex for now
1289 */
1290static void tty_driver_remove_tty(struct tty_driver *driver,
1291 struct tty_struct *tty)
1292{
1293 if (driver->ops->remove)
1294 driver->ops->remove(driver, tty);
1295 else
1296 driver->ttys[tty->index] = NULL;
1297}
1298
1299/*
1300 * tty_reopen() - fast re-open of an open tty
1301 * @tty - the tty to open
23499705 1302 *
99f1fe18 1303 * Return 0 on success, -errno on error.
23499705 1304 *
99f1fe18
AC
1305 * Locking: tty_mutex must be held from the time the tty was found
1306 * till this open completes.
23499705 1307 */
99f1fe18 1308static int tty_reopen(struct tty_struct *tty)
23499705
SB
1309{
1310 struct tty_driver *driver = tty->driver;
1311
1312 if (test_bit(TTY_CLOSING, &tty->flags))
1313 return -EIO;
1314
1315 if (driver->type == TTY_DRIVER_TYPE_PTY &&
1316 driver->subtype == PTY_TYPE_MASTER) {
1317 /*
1318 * special case for PTY masters: only one open permitted,
1319 * and the slave side open count is incremented as well.
1320 */
1321 if (tty->count)
1322 return -EIO;
1323
1324 tty->link->count++;
1325 }
1326 tty->count++;
1327 tty->driver = driver; /* N.B. why do this every time?? */
1328
1aa4bed8 1329 mutex_lock(&tty->ldisc_mutex);
99f1fe18 1330 WARN_ON(!test_bit(TTY_LDISC, &tty->flags));
1aa4bed8 1331 mutex_unlock(&tty->ldisc_mutex);
23499705
SB
1332
1333 return 0;
1334}
1335
af9b897e 1336/**
d81ed103 1337 * tty_init_dev - initialise a tty device
af9b897e
AC
1338 * @driver: tty driver we are opening a device on
1339 * @idx: device index
15582d36
AC
1340 * @ret_tty: returned tty structure
1341 * @first_ok: ok to open a new device (used by ptmx)
af9b897e
AC
1342 *
1343 * Prepare a tty device. This may not be a "new" clean device but
1344 * could also be an active device. The pty drivers require special
1345 * handling because of this.
1346 *
1347 * Locking:
1348 * The function is called under the tty_mutex, which
1349 * protects us from the tty struct or driver itself going away.
1350 *
1351 * On exit the tty device has the line discipline attached and
1352 * a reference count of 1. If a pair was created for pty/tty use
1353 * and the other was a pty master then it too has a reference count of 1.
1354 *
1da177e4 1355 * WSH 06/09/97: Rewritten to remove races and properly clean up after a
70522e12
IM
1356 * failed open. The new code protects the open with a mutex, so it's
1357 * really quite straightforward. The mutex locking can probably be
1da177e4
LT
1358 * relaxed for the (most common) case of reopening a tty.
1359 */
af9b897e 1360
73ec06fc
AC
1361struct tty_struct *tty_init_dev(struct tty_driver *driver, int idx,
1362 int first_ok)
1da177e4 1363{
bf970ee4 1364 struct tty_struct *tty;
73ec06fc 1365 int retval;
1da177e4 1366
23499705 1367 /* Check if pty master is being opened multiple times */
15582d36 1368 if (driver->subtype == PTY_TYPE_MASTER &&
eeb89d91 1369 (driver->flags & TTY_DRIVER_DEVPTS_MEM) && !first_ok) {
73ec06fc 1370 return ERR_PTR(-EIO);
eeb89d91 1371 }
73ec06fc 1372
1da177e4
LT
1373 /*
1374 * First time open is complex, especially for PTY devices.
1375 * This code guarantees that either everything succeeds and the
1376 * TTY is ready for operation, or else the table slots are vacated
37bdfb07 1377 * and the allocated memory released. (Except that the termios
1da177e4
LT
1378 * and locked termios may be retained.)
1379 */
1380
73ec06fc
AC
1381 if (!try_module_get(driver->owner))
1382 return ERR_PTR(-ENODEV);
1da177e4 1383
1da177e4 1384 tty = alloc_tty_struct();
37bdfb07 1385 if (!tty)
1da177e4 1386 goto fail_no_mem;
bf970ee4 1387 initialize_tty_struct(tty, driver, idx);
1da177e4 1388
73ec06fc 1389 retval = tty_driver_install_tty(driver, tty);
bf970ee4
AC
1390 if (retval < 0) {
1391 free_tty_struct(tty);
1392 module_put(driver->owner);
1393 return ERR_PTR(retval);
1394 }
8b0a88d5 1395
37bdfb07 1396 /*
1da177e4 1397 * Structures all installed ... call the ldisc open routines.
d5698c28
CH
1398 * If we fail here just call release_tty to clean up. No need
1399 * to decrement the use counts, as release_tty doesn't care.
1da177e4 1400 */
bf970ee4 1401 retval = tty_ldisc_setup(tty, tty->link);
01e1abb2
AC
1402 if (retval)
1403 goto release_mem_out;
73ec06fc 1404 return tty;
1da177e4 1405
1da177e4
LT
1406fail_no_mem:
1407 module_put(driver->owner);
73ec06fc 1408 return ERR_PTR(-ENOMEM);
1da177e4 1409
d5698c28 1410 /* call the tty release_tty routine to clean out this slot */
1da177e4 1411release_mem_out:
4050914f 1412 if (printk_ratelimit())
d81ed103 1413 printk(KERN_INFO "tty_init_dev: ldisc open failed, "
4050914f 1414 "clearing slot %d\n", idx);
d5698c28 1415 release_tty(tty, idx);
73ec06fc 1416 return ERR_PTR(retval);
1da177e4
LT
1417}
1418
feebed65
AC
1419void tty_free_termios(struct tty_struct *tty)
1420{
1421 struct ktermios *tp;
1422 int idx = tty->index;
1423 /* Kill this flag and push into drivers for locking etc */
1424 if (tty->driver->flags & TTY_DRIVER_RESET_TERMIOS) {
1425 /* FIXME: Locking on ->termios array */
1426 tp = tty->termios;
1427 tty->driver->termios[idx] = NULL;
1428 kfree(tp);
feebed65
AC
1429 }
1430}
1431EXPORT_SYMBOL(tty_free_termios);
1432
1433void tty_shutdown(struct tty_struct *tty)
1434{
8b0a88d5 1435 tty_driver_remove_tty(tty->driver, tty);
feebed65
AC
1436 tty_free_termios(tty);
1437}
1438EXPORT_SYMBOL(tty_shutdown);
1439
af9b897e 1440/**
d5698c28 1441 * release_one_tty - release tty structure memory
9c9f4ded 1442 * @kref: kref of tty we are obliterating
af9b897e
AC
1443 *
1444 * Releases memory associated with a tty structure, and clears out the
1445 * driver table slots. This function is called when a device is no longer
1446 * in use. It also gets called when setup of a device fails.
1447 *
1448 * Locking:
1449 * tty_mutex - sometimes only
1450 * takes the file list lock internally when working on the list
1451 * of ttys that the driver keeps.
b50989dc
AC
1452 *
1453 * This method gets called from a work queue so that the driver private
f278a2f7 1454 * cleanup ops can sleep (needed for USB at least)
1da177e4 1455 */
b50989dc 1456static void release_one_tty(struct work_struct *work)
1da177e4 1457{
b50989dc
AC
1458 struct tty_struct *tty =
1459 container_of(work, struct tty_struct, hangup_work);
6f967f78 1460 struct tty_driver *driver = tty->driver;
d5698c28 1461
f278a2f7
DY
1462 if (tty->ops->cleanup)
1463 tty->ops->cleanup(tty);
1464
1da177e4 1465 tty->magic = 0;
7d7b93c1 1466 tty_driver_kref_put(driver);
6f967f78 1467 module_put(driver->owner);
d5698c28 1468
ee2ffa0d 1469 spin_lock(&tty_files_lock);
1da177e4 1470 list_del_init(&tty->tty_files);
ee2ffa0d 1471 spin_unlock(&tty_files_lock);
d5698c28 1472
6da8d866
ON
1473 put_pid(tty->pgrp);
1474 put_pid(tty->session);
1da177e4
LT
1475 free_tty_struct(tty);
1476}
1477
b50989dc
AC
1478static void queue_release_one_tty(struct kref *kref)
1479{
1480 struct tty_struct *tty = container_of(kref, struct tty_struct, kref);
f278a2f7
DY
1481
1482 if (tty->ops->shutdown)
1483 tty->ops->shutdown(tty);
1484 else
1485 tty_shutdown(tty);
1486
b50989dc
AC
1487 /* The hangup queue is now free so we can reuse it rather than
1488 waste a chunk of memory for each port */
1489 INIT_WORK(&tty->hangup_work, release_one_tty);
1490 schedule_work(&tty->hangup_work);
1491}
1492
9c9f4ded
AC
1493/**
1494 * tty_kref_put - release a tty kref
1495 * @tty: tty device
1496 *
1497 * Release a reference to a tty device and if need be let the kref
1498 * layer destruct the object for us
1499 */
1500
1501void tty_kref_put(struct tty_struct *tty)
1502{
1503 if (tty)
b50989dc 1504 kref_put(&tty->kref, queue_release_one_tty);
9c9f4ded
AC
1505}
1506EXPORT_SYMBOL(tty_kref_put);
1507
d5698c28
CH
1508/**
1509 * release_tty - release tty structure memory
1510 *
1511 * Release both @tty and a possible linked partner (think pty pair),
1512 * and decrement the refcount of the backing module.
1513 *
1514 * Locking:
1515 * tty_mutex - sometimes only
1516 * takes the file list lock internally when working on the list
1517 * of ttys that the driver keeps.
1518 * FIXME: should we require tty_mutex is held here ??
9c9f4ded 1519 *
d5698c28
CH
1520 */
1521static void release_tty(struct tty_struct *tty, int idx)
1522{
9c9f4ded
AC
1523 /* This should always be true but check for the moment */
1524 WARN_ON(tty->index != idx);
1525
d5698c28 1526 if (tty->link)
9c9f4ded
AC
1527 tty_kref_put(tty->link);
1528 tty_kref_put(tty);
d5698c28
CH
1529}
1530
eeb89d91
AC
1531/**
1532 * tty_release - vfs callback for close
1533 * @inode: inode of tty
1534 * @filp: file pointer for handle to tty
1535 *
1536 * Called the last time each file handle is closed that references
1537 * this tty. There may however be several such references.
1538 *
1539 * Locking:
1540 * Takes bkl. See tty_release_dev
1541 *
1da177e4
LT
1542 * Even releasing the tty structures is a tricky business.. We have
1543 * to be very careful that the structures are all released at the
1544 * same time, as interrupts might otherwise get the wrong pointers.
1545 *
1546 * WSH 09/09/97: rewritten to avoid some nasty race conditions that could
1547 * lead to double frees or releasing memory still in use.
1548 */
eeb89d91
AC
1549
1550int tty_release(struct inode *inode, struct file *filp)
1da177e4 1551{
d996b62a
NP
1552 struct tty_struct *tty = file_tty(filp);
1553 struct tty_struct *o_tty;
1da177e4 1554 int pty_master, tty_closing, o_tty_closing, do_sleep;
14a6283e 1555 int devpts;
1da177e4
LT
1556 int idx;
1557 char buf[64];
37bdfb07 1558
15f1a633 1559 if (tty_paranoia_check(tty, inode, "tty_release_dev"))
eeb89d91 1560 return 0;
1da177e4 1561
ec79d605 1562 tty_lock();
d81ed103 1563 check_tty_count(tty, "tty_release_dev");
1da177e4 1564
ec79d605 1565 __tty_fasync(-1, filp, 0);
1da177e4
LT
1566
1567 idx = tty->index;
1568 pty_master = (tty->driver->type == TTY_DRIVER_TYPE_PTY &&
1569 tty->driver->subtype == PTY_TYPE_MASTER);
1570 devpts = (tty->driver->flags & TTY_DRIVER_DEVPTS_MEM) != 0;
1da177e4
LT
1571 o_tty = tty->link;
1572
1573#ifdef TTY_PARANOIA_CHECK
1574 if (idx < 0 || idx >= tty->driver->num) {
d81ed103 1575 printk(KERN_DEBUG "tty_release_dev: bad idx when trying to "
1da177e4 1576 "free (%s)\n", tty->name);
ec79d605 1577 tty_unlock();
eeb89d91 1578 return 0;
1da177e4 1579 }
8b0a88d5 1580 if (!devpts) {
1da177e4 1581 if (tty != tty->driver->ttys[idx]) {
ec79d605 1582 tty_unlock();
d81ed103 1583 printk(KERN_DEBUG "tty_release_dev: driver.table[%d] not tty "
1da177e4 1584 "for (%s)\n", idx, tty->name);
eeb89d91 1585 return 0;
1da177e4
LT
1586 }
1587 if (tty->termios != tty->driver->termios[idx]) {
ec79d605 1588 tty_unlock();
d81ed103 1589 printk(KERN_DEBUG "tty_release_dev: driver.termios[%d] not termios "
1da177e4
LT
1590 "for (%s)\n",
1591 idx, tty->name);
eeb89d91 1592 return 0;
1da177e4 1593 }
1da177e4
LT
1594 }
1595#endif
1596
1597#ifdef TTY_DEBUG_HANGUP
d81ed103 1598 printk(KERN_DEBUG "tty_release_dev of %s (tty count=%d)...",
1da177e4
LT
1599 tty_name(tty, buf), tty->count);
1600#endif
1601
1602#ifdef TTY_PARANOIA_CHECK
1603 if (tty->driver->other &&
1604 !(tty->driver->flags & TTY_DRIVER_DEVPTS_MEM)) {
1605 if (o_tty != tty->driver->other->ttys[idx]) {
ec79d605 1606 tty_unlock();
d81ed103 1607 printk(KERN_DEBUG "tty_release_dev: other->table[%d] "
1da177e4
LT
1608 "not o_tty for (%s)\n",
1609 idx, tty->name);
eeb89d91 1610 return 0 ;
1da177e4
LT
1611 }
1612 if (o_tty->termios != tty->driver->other->termios[idx]) {
ec79d605 1613 tty_unlock();
d81ed103 1614 printk(KERN_DEBUG "tty_release_dev: other->termios[%d] "
1da177e4
LT
1615 "not o_termios for (%s)\n",
1616 idx, tty->name);
eeb89d91 1617 return 0;
1da177e4 1618 }
1da177e4 1619 if (o_tty->link != tty) {
ec79d605 1620 tty_unlock();
d81ed103 1621 printk(KERN_DEBUG "tty_release_dev: bad pty pointers\n");
eeb89d91 1622 return 0;
1da177e4
LT
1623 }
1624 }
1625#endif
f34d7a5b
AC
1626 if (tty->ops->close)
1627 tty->ops->close(tty, filp);
1da177e4 1628
ec79d605 1629 tty_unlock();
1da177e4
LT
1630 /*
1631 * Sanity check: if tty->count is going to zero, there shouldn't be
1632 * any waiters on tty->read_wait or tty->write_wait. We test the
1633 * wait queues and kick everyone out _before_ actually starting to
1634 * close. This ensures that we won't block while releasing the tty
1635 * structure.
1636 *
1637 * The test for the o_tty closing is necessary, since the master and
1638 * slave sides may close in any order. If the slave side closes out
1639 * first, its count will be one, since the master side holds an open.
1640 * Thus this test wouldn't be triggered at the time the slave closes,
1641 * so we do it now.
1642 *
1643 * Note that it's possible for the tty to be opened again while we're
1644 * flushing out waiters. By recalculating the closing flags before
1645 * each iteration we avoid any problems.
1646 */
1647 while (1) {
1648 /* Guard against races with tty->count changes elsewhere and
1649 opens on /dev/tty */
37bdfb07 1650
70522e12 1651 mutex_lock(&tty_mutex);
ec79d605 1652 tty_lock();
1da177e4
LT
1653 tty_closing = tty->count <= 1;
1654 o_tty_closing = o_tty &&
1655 (o_tty->count <= (pty_master ? 1 : 0));
1da177e4
LT
1656 do_sleep = 0;
1657
1658 if (tty_closing) {
1659 if (waitqueue_active(&tty->read_wait)) {
4b19449d 1660 wake_up_poll(&tty->read_wait, POLLIN);
1da177e4
LT
1661 do_sleep++;
1662 }
1663 if (waitqueue_active(&tty->write_wait)) {
4b19449d 1664 wake_up_poll(&tty->write_wait, POLLOUT);
1da177e4
LT
1665 do_sleep++;
1666 }
1667 }
1668 if (o_tty_closing) {
1669 if (waitqueue_active(&o_tty->read_wait)) {
4b19449d 1670 wake_up_poll(&o_tty->read_wait, POLLIN);
1da177e4
LT
1671 do_sleep++;
1672 }
1673 if (waitqueue_active(&o_tty->write_wait)) {
4b19449d 1674 wake_up_poll(&o_tty->write_wait, POLLOUT);
1da177e4
LT
1675 do_sleep++;
1676 }
1677 }
1678 if (!do_sleep)
1679 break;
1680
d81ed103 1681 printk(KERN_WARNING "tty_release_dev: %s: read/write wait queue "
1da177e4 1682 "active!\n", tty_name(tty, buf));
ec79d605 1683 tty_unlock();
70522e12 1684 mutex_unlock(&tty_mutex);
1da177e4 1685 schedule();
37bdfb07 1686 }
1da177e4
LT
1687
1688 /*
37bdfb07
AC
1689 * The closing flags are now consistent with the open counts on
1690 * both sides, and we've completed the last operation that could
1da177e4
LT
1691 * block, so it's safe to proceed with closing.
1692 */
1da177e4
LT
1693 if (pty_master) {
1694 if (--o_tty->count < 0) {
d81ed103 1695 printk(KERN_WARNING "tty_release_dev: bad pty slave count "
1da177e4
LT
1696 "(%d) for %s\n",
1697 o_tty->count, tty_name(o_tty, buf));
1698 o_tty->count = 0;
1699 }
1700 }
1701 if (--tty->count < 0) {
d81ed103 1702 printk(KERN_WARNING "tty_release_dev: bad tty->count (%d) for %s\n",
1da177e4
LT
1703 tty->count, tty_name(tty, buf));
1704 tty->count = 0;
1705 }
37bdfb07 1706
1da177e4
LT
1707 /*
1708 * We've decremented tty->count, so we need to remove this file
1709 * descriptor off the tty->tty_files list; this serves two
1710 * purposes:
1711 * - check_tty_count sees the correct number of file descriptors
1712 * associated with this tty.
1713 * - do_tty_hangup no longer sees this file descriptor as
1714 * something that needs to be handled for hangups.
1715 */
d996b62a 1716 tty_del_file(filp);
1da177e4
LT
1717
1718 /*
1719 * Perform some housekeeping before deciding whether to return.
1720 *
1721 * Set the TTY_CLOSING flag if this was the last open. In the
1722 * case of a pty we may have to wait around for the other side
1723 * to close, and TTY_CLOSING makes sure we can't be reopened.
1724 */
37bdfb07 1725 if (tty_closing)
1da177e4 1726 set_bit(TTY_CLOSING, &tty->flags);
37bdfb07 1727 if (o_tty_closing)
1da177e4
LT
1728 set_bit(TTY_CLOSING, &o_tty->flags);
1729
1730 /*
1731 * If _either_ side is closing, make sure there aren't any
1732 * processes that still think tty or o_tty is their controlling
1733 * tty.
1734 */
1735 if (tty_closing || o_tty_closing) {
1da177e4 1736 read_lock(&tasklist_lock);
24ec839c 1737 session_clear_tty(tty->session);
1da177e4 1738 if (o_tty)
24ec839c 1739 session_clear_tty(o_tty->session);
1da177e4
LT
1740 read_unlock(&tasklist_lock);
1741 }
1742
70522e12 1743 mutex_unlock(&tty_mutex);
da965822 1744
1da177e4 1745 /* check whether both sides are closing ... */
eeb89d91 1746 if (!tty_closing || (o_tty && !o_tty_closing)) {
ec79d605 1747 tty_unlock();
eeb89d91
AC
1748 return 0;
1749 }
37bdfb07 1750
1da177e4
LT
1751#ifdef TTY_DEBUG_HANGUP
1752 printk(KERN_DEBUG "freeing tty structure...");
1753#endif
1754 /*
01e1abb2 1755 * Ask the line discipline code to release its structures
1da177e4 1756 */
01e1abb2 1757 tty_ldisc_release(tty, o_tty);
1da177e4 1758 /*
d5698c28 1759 * The release_tty function takes care of the details of clearing
1da177e4
LT
1760 * the slots and preserving the termios structure.
1761 */
d5698c28 1762 release_tty(tty, idx);
1da177e4 1763
1da177e4 1764 /* Make this pty number available for reallocation */
718a9163 1765 if (devpts)
15f1a633 1766 devpts_kill_index(inode, idx);
ec79d605 1767 tty_unlock();
eeb89d91 1768 return 0;
1da177e4
LT
1769}
1770
af9b897e 1771/**
eeb89d91 1772 * tty_open - open a tty device
af9b897e
AC
1773 * @inode: inode of device file
1774 * @filp: file pointer to tty
1da177e4 1775 *
af9b897e
AC
1776 * tty_open and tty_release keep up the tty count that contains the
1777 * number of opens done on a tty. We cannot use the inode-count, as
1778 * different inodes might point to the same tty.
1da177e4 1779 *
af9b897e
AC
1780 * Open-counting is needed for pty masters, as well as for keeping
1781 * track of serial lines: DTR is dropped when the last close happens.
1782 * (This is not done solely through tty->count, now. - Ted 1/27/92)
1783 *
1784 * The termios state of a pty is reset on first open so that
1785 * settings don't persist across reuse.
1786 *
d81ed103 1787 * Locking: tty_mutex protects tty, get_tty_driver and tty_init_dev work.
24ec839c
PZ
1788 * tty->count should protect the rest.
1789 * ->siglock protects ->signal/->sighand
1da177e4 1790 */
af9b897e 1791
eeb89d91 1792static int tty_open(struct inode *inode, struct file *filp)
1da177e4 1793{
4a2b5fdd 1794 struct tty_struct *tty = NULL;
1da177e4
LT
1795 int noctty, retval;
1796 struct tty_driver *driver;
1797 int index;
1798 dev_t device = inode->i_rdev;
846c151a 1799 unsigned saved_flags = filp->f_flags;
1da177e4
LT
1800
1801 nonseekable_open(inode, filp);
37bdfb07 1802
1da177e4
LT
1803retry_open:
1804 noctty = filp->f_flags & O_NOCTTY;
1805 index = -1;
1806 retval = 0;
37bdfb07 1807
70522e12 1808 mutex_lock(&tty_mutex);
ec79d605 1809 tty_lock();
1da177e4 1810
37bdfb07 1811 if (device == MKDEV(TTYAUX_MAJOR, 0)) {
24ec839c
PZ
1812 tty = get_current_tty();
1813 if (!tty) {
ec79d605 1814 tty_unlock();
70522e12 1815 mutex_unlock(&tty_mutex);
1da177e4
LT
1816 return -ENXIO;
1817 }
7d7b93c1 1818 driver = tty_driver_kref_get(tty->driver);
24ec839c 1819 index = tty->index;
1da177e4
LT
1820 filp->f_flags |= O_NONBLOCK; /* Don't let /dev/tty block */
1821 /* noctty = 1; */
452a00d2
AC
1822 /* FIXME: Should we take a driver reference ? */
1823 tty_kref_put(tty);
1da177e4
LT
1824 goto got_driver;
1825 }
1826#ifdef CONFIG_VT
37bdfb07 1827 if (device == MKDEV(TTY_MAJOR, 0)) {
1da177e4 1828 extern struct tty_driver *console_driver;
7d7b93c1 1829 driver = tty_driver_kref_get(console_driver);
1da177e4
LT
1830 index = fg_console;
1831 noctty = 1;
1832 goto got_driver;
1833 }
1834#endif
37bdfb07 1835 if (device == MKDEV(TTYAUX_MAJOR, 1)) {
296fa7f6
WN
1836 struct tty_driver *console_driver = console_device(&index);
1837 if (console_driver) {
1838 driver = tty_driver_kref_get(console_driver);
1839 if (driver) {
1840 /* Don't let /dev/console block */
1841 filp->f_flags |= O_NONBLOCK;
1842 noctty = 1;
1843 goto got_driver;
1844 }
1da177e4 1845 }
ec79d605 1846 tty_unlock();
70522e12 1847 mutex_unlock(&tty_mutex);
1da177e4
LT
1848 return -ENODEV;
1849 }
1850
1851 driver = get_tty_driver(device, &index);
1852 if (!driver) {
ec79d605 1853 tty_unlock();
70522e12 1854 mutex_unlock(&tty_mutex);
1da177e4
LT
1855 return -ENODEV;
1856 }
1857got_driver:
4a2b5fdd
SB
1858 if (!tty) {
1859 /* check whether we're reopening an existing tty */
15f1a633 1860 tty = tty_driver_lookup_tty(driver, inode, index);
4a2b5fdd 1861
808ffa3d 1862 if (IS_ERR(tty)) {
ec79d605 1863 tty_unlock();
808ffa3d 1864 mutex_unlock(&tty_mutex);
4a2b5fdd 1865 return PTR_ERR(tty);
808ffa3d 1866 }
4a2b5fdd
SB
1867 }
1868
1869 if (tty) {
1870 retval = tty_reopen(tty);
1871 if (retval)
1872 tty = ERR_PTR(retval);
1873 } else
1874 tty = tty_init_dev(driver, index, 0);
1875
70522e12 1876 mutex_unlock(&tty_mutex);
7d7b93c1 1877 tty_driver_kref_put(driver);
eeb89d91 1878 if (IS_ERR(tty)) {
ec79d605 1879 tty_unlock();
73ec06fc 1880 return PTR_ERR(tty);
eeb89d91 1881 }
1da177e4 1882
f573bd17
PE
1883 retval = tty_add_file(tty, filp);
1884 if (retval) {
1885 tty_unlock();
1886 return retval;
1887 }
d996b62a 1888
1da177e4
LT
1889 check_tty_count(tty, "tty_open");
1890 if (tty->driver->type == TTY_DRIVER_TYPE_PTY &&
1891 tty->driver->subtype == PTY_TYPE_MASTER)
1892 noctty = 1;
1893#ifdef TTY_DEBUG_HANGUP
1894 printk(KERN_DEBUG "opening %s...", tty->name);
1895#endif
1896 if (!retval) {
f34d7a5b
AC
1897 if (tty->ops->open)
1898 retval = tty->ops->open(tty, filp);
1da177e4
LT
1899 else
1900 retval = -ENODEV;
1901 }
1902 filp->f_flags = saved_flags;
1903
37bdfb07
AC
1904 if (!retval && test_bit(TTY_EXCLUSIVE, &tty->flags) &&
1905 !capable(CAP_SYS_ADMIN))
1da177e4
LT
1906 retval = -EBUSY;
1907
1908 if (retval) {
1909#ifdef TTY_DEBUG_HANGUP
1910 printk(KERN_DEBUG "error %d in opening %s...", retval,
1911 tty->name);
1912#endif
64ba3dc3 1913 tty_unlock(); /* need to call tty_release without BTM */
eeb89d91 1914 tty_release(inode, filp);
64ba3dc3 1915 if (retval != -ERESTARTSYS)
1da177e4 1916 return retval;
64ba3dc3
AB
1917
1918 if (signal_pending(current))
1da177e4 1919 return retval;
64ba3dc3 1920
1da177e4
LT
1921 schedule();
1922 /*
1923 * Need to reset f_op in case a hangup happened.
1924 */
64ba3dc3 1925 tty_lock();
1da177e4
LT
1926 if (filp->f_op == &hung_up_tty_fops)
1927 filp->f_op = &tty_fops;
ec79d605 1928 tty_unlock();
1da177e4
LT
1929 goto retry_open;
1930 }
ec79d605 1931 tty_unlock();
eeb89d91 1932
24ec839c
PZ
1933
1934 mutex_lock(&tty_mutex);
ec79d605 1935 tty_lock();
24ec839c 1936 spin_lock_irq(&current->sighand->siglock);
1da177e4
LT
1937 if (!noctty &&
1938 current->signal->leader &&
1939 !current->signal->tty &&
ab521dc0 1940 tty->session == NULL)
2a65f1d9 1941 __proc_set_tty(current, tty);
24ec839c 1942 spin_unlock_irq(&current->sighand->siglock);
ec79d605 1943 tty_unlock();
24ec839c 1944 mutex_unlock(&tty_mutex);
1da177e4
LT
1945 return 0;
1946}
1947
39d95b9d
JC
1948
1949
af9b897e
AC
1950/**
1951 * tty_poll - check tty status
1952 * @filp: file being polled
1953 * @wait: poll wait structures to update
1954 *
1955 * Call the line discipline polling method to obtain the poll
1956 * status of the device.
1957 *
1958 * Locking: locks called line discipline but ldisc poll method
1959 * may be re-entered freely by other callers.
1960 */
1961
37bdfb07 1962static unsigned int tty_poll(struct file *filp, poll_table *wait)
1da177e4 1963{
d996b62a 1964 struct tty_struct *tty = file_tty(filp);
1da177e4
LT
1965 struct tty_ldisc *ld;
1966 int ret = 0;
1967
a7113a96 1968 if (tty_paranoia_check(tty, filp->f_path.dentry->d_inode, "tty_poll"))
1da177e4 1969 return 0;
37bdfb07 1970
1da177e4 1971 ld = tty_ldisc_ref_wait(tty);
a352def2
AC
1972 if (ld->ops->poll)
1973 ret = (ld->ops->poll)(tty, filp, wait);
1da177e4
LT
1974 tty_ldisc_deref(ld);
1975 return ret;
1976}
1977
ec79d605 1978static int __tty_fasync(int fd, struct file *filp, int on)
1da177e4 1979{
d996b62a 1980 struct tty_struct *tty = file_tty(filp);
47f86834 1981 unsigned long flags;
5d1e3230 1982 int retval = 0;
1da177e4 1983
a7113a96 1984 if (tty_paranoia_check(tty, filp->f_path.dentry->d_inode, "tty_fasync"))
5d1e3230 1985 goto out;
37bdfb07 1986
1da177e4
LT
1987 retval = fasync_helper(fd, filp, on, &tty->fasync);
1988 if (retval <= 0)
5d1e3230 1989 goto out;
1da177e4
LT
1990
1991 if (on) {
ab521dc0
EB
1992 enum pid_type type;
1993 struct pid *pid;
1da177e4
LT
1994 if (!waitqueue_active(&tty->read_wait))
1995 tty->minimum_to_wake = 1;
47f86834 1996 spin_lock_irqsave(&tty->ctrl_lock, flags);
ab521dc0
EB
1997 if (tty->pgrp) {
1998 pid = tty->pgrp;
1999 type = PIDTYPE_PGID;
2000 } else {
2001 pid = task_pid(current);
2002 type = PIDTYPE_PID;
2003 }
80e1e823 2004 get_pid(pid);
70362511 2005 spin_unlock_irqrestore(&tty->ctrl_lock, flags);
80e1e823
LT
2006 retval = __f_setown(filp, pid, type, 0);
2007 put_pid(pid);
1da177e4 2008 if (retval)
5d1e3230 2009 goto out;
1da177e4
LT
2010 } else {
2011 if (!tty->fasync && !waitqueue_active(&tty->read_wait))
2012 tty->minimum_to_wake = N_TTY_BUF_SIZE;
2013 }
5d1e3230
JC
2014 retval = 0;
2015out:
ec79d605
AB
2016 return retval;
2017}
2018
2019static int tty_fasync(int fd, struct file *filp, int on)
2020{
2021 int retval;
2022 tty_lock();
2023 retval = __tty_fasync(fd, filp, on);
2024 tty_unlock();
5d1e3230 2025 return retval;
1da177e4
LT
2026}
2027
af9b897e
AC
2028/**
2029 * tiocsti - fake input character
2030 * @tty: tty to fake input into
2031 * @p: pointer to character
2032 *
3a4fa0a2 2033 * Fake input to a tty device. Does the necessary locking and
af9b897e
AC
2034 * input management.
2035 *
2036 * FIXME: does not honour flow control ??
2037 *
2038 * Locking:
2039 * Called functions take tty_ldisc_lock
2040 * current->signal->tty check is safe without locks
28298232
AC
2041 *
2042 * FIXME: may race normal receive processing
af9b897e
AC
2043 */
2044
1da177e4
LT
2045static int tiocsti(struct tty_struct *tty, char __user *p)
2046{
2047 char ch, mbz = 0;
2048 struct tty_ldisc *ld;
37bdfb07 2049
1da177e4
LT
2050 if ((current->signal->tty != tty) && !capable(CAP_SYS_ADMIN))
2051 return -EPERM;
2052 if (get_user(ch, p))
2053 return -EFAULT;
1e641743 2054 tty_audit_tiocsti(tty, ch);
1da177e4 2055 ld = tty_ldisc_ref_wait(tty);
a352def2 2056 ld->ops->receive_buf(tty, &ch, &mbz, 1);
1da177e4
LT
2057 tty_ldisc_deref(ld);
2058 return 0;
2059}
2060
af9b897e
AC
2061/**
2062 * tiocgwinsz - implement window query ioctl
2063 * @tty; tty
2064 * @arg: user buffer for result
2065 *
808a0d38 2066 * Copies the kernel idea of the window size into the user buffer.
af9b897e 2067 *
24ec839c 2068 * Locking: tty->termios_mutex is taken to ensure the winsize data
808a0d38 2069 * is consistent.
af9b897e
AC
2070 */
2071
37bdfb07 2072static int tiocgwinsz(struct tty_struct *tty, struct winsize __user *arg)
1da177e4 2073{
808a0d38
AC
2074 int err;
2075
5785c95b 2076 mutex_lock(&tty->termios_mutex);
808a0d38 2077 err = copy_to_user(arg, &tty->winsize, sizeof(*arg));
5785c95b 2078 mutex_unlock(&tty->termios_mutex);
808a0d38
AC
2079
2080 return err ? -EFAULT: 0;
1da177e4
LT
2081}
2082
af9b897e 2083/**
8c9a9dd0
AC
2084 * tty_do_resize - resize event
2085 * @tty: tty being resized
8c9a9dd0
AC
2086 * @rows: rows (character)
2087 * @cols: cols (character)
2088 *
3ad2f3fb 2089 * Update the termios variables and send the necessary signals to
8c9a9dd0 2090 * peform a terminal resize correctly
af9b897e
AC
2091 */
2092
fc6f6238 2093int tty_do_resize(struct tty_struct *tty, struct winsize *ws)
1da177e4 2094{
fc6f6238 2095 struct pid *pgrp;
47f86834 2096 unsigned long flags;
1da177e4 2097
fc6f6238
AC
2098 /* Lock the tty */
2099 mutex_lock(&tty->termios_mutex);
2100 if (!memcmp(ws, &tty->winsize, sizeof(*ws)))
ca9bda00 2101 goto done;
47f86834
AC
2102 /* Get the PID values and reference them so we can
2103 avoid holding the tty ctrl lock while sending signals */
2104 spin_lock_irqsave(&tty->ctrl_lock, flags);
2105 pgrp = get_pid(tty->pgrp);
47f86834
AC
2106 spin_unlock_irqrestore(&tty->ctrl_lock, flags);
2107
2108 if (pgrp)
2109 kill_pgrp(pgrp, SIGWINCH, 1);
47f86834 2110 put_pid(pgrp);
47f86834 2111
8c9a9dd0 2112 tty->winsize = *ws;
ca9bda00 2113done:
fc6f6238 2114 mutex_unlock(&tty->termios_mutex);
1da177e4
LT
2115 return 0;
2116}
2117
8c9a9dd0
AC
2118/**
2119 * tiocswinsz - implement window size set ioctl
fc6f6238 2120 * @tty; tty side of tty
8c9a9dd0
AC
2121 * @arg: user buffer for result
2122 *
2123 * Copies the user idea of the window size to the kernel. Traditionally
2124 * this is just advisory information but for the Linux console it
2125 * actually has driver level meaning and triggers a VC resize.
2126 *
2127 * Locking:
2128 * Driver dependant. The default do_resize method takes the
2129 * tty termios mutex and ctrl_lock. The console takes its own lock
2130 * then calls into the default method.
2131 */
2132
fc6f6238 2133static int tiocswinsz(struct tty_struct *tty, struct winsize __user *arg)
8c9a9dd0
AC
2134{
2135 struct winsize tmp_ws;
2136 if (copy_from_user(&tmp_ws, arg, sizeof(*arg)))
2137 return -EFAULT;
2138
2139 if (tty->ops->resize)
fc6f6238 2140 return tty->ops->resize(tty, &tmp_ws);
8c9a9dd0 2141 else
fc6f6238 2142 return tty_do_resize(tty, &tmp_ws);
8c9a9dd0
AC
2143}
2144
af9b897e
AC
2145/**
2146 * tioccons - allow admin to move logical console
2147 * @file: the file to become console
2148 *
2149 * Allow the adminstrator to move the redirected console device
2150 *
2151 * Locking: uses redirect_lock to guard the redirect information
2152 */
2153
1da177e4
LT
2154static int tioccons(struct file *file)
2155{
2156 if (!capable(CAP_SYS_ADMIN))
2157 return -EPERM;
2158 if (file->f_op->write == redirected_tty_write) {
2159 struct file *f;
2160 spin_lock(&redirect_lock);
2161 f = redirect;
2162 redirect = NULL;
2163 spin_unlock(&redirect_lock);
2164 if (f)
2165 fput(f);
2166 return 0;
2167 }
2168 spin_lock(&redirect_lock);
2169 if (redirect) {
2170 spin_unlock(&redirect_lock);
2171 return -EBUSY;
2172 }
2173 get_file(file);
2174 redirect = file;
2175 spin_unlock(&redirect_lock);
2176 return 0;
2177}
2178
af9b897e
AC
2179/**
2180 * fionbio - non blocking ioctl
2181 * @file: file to set blocking value
2182 * @p: user parameter
2183 *
2184 * Historical tty interfaces had a blocking control ioctl before
2185 * the generic functionality existed. This piece of history is preserved
2186 * in the expected tty API of posix OS's.
2187 *
6146b9af 2188 * Locking: none, the open file handle ensures it won't go away.
af9b897e 2189 */
1da177e4
LT
2190
2191static int fionbio(struct file *file, int __user *p)
2192{
2193 int nonblock;
2194
2195 if (get_user(nonblock, p))
2196 return -EFAULT;
2197
db1dd4d3 2198 spin_lock(&file->f_lock);
1da177e4
LT
2199 if (nonblock)
2200 file->f_flags |= O_NONBLOCK;
2201 else
2202 file->f_flags &= ~O_NONBLOCK;
db1dd4d3 2203 spin_unlock(&file->f_lock);
1da177e4
LT
2204 return 0;
2205}
2206
af9b897e
AC
2207/**
2208 * tiocsctty - set controlling tty
2209 * @tty: tty structure
2210 * @arg: user argument
2211 *
2212 * This ioctl is used to manage job control. It permits a session
2213 * leader to set this tty as the controlling tty for the session.
2214 *
2215 * Locking:
28298232 2216 * Takes tty_mutex() to protect tty instance
24ec839c
PZ
2217 * Takes tasklist_lock internally to walk sessions
2218 * Takes ->siglock() when updating signal->tty
af9b897e
AC
2219 */
2220
1da177e4
LT
2221static int tiocsctty(struct tty_struct *tty, int arg)
2222{
24ec839c 2223 int ret = 0;
ab521dc0 2224 if (current->signal->leader && (task_session(current) == tty->session))
24ec839c
PZ
2225 return ret;
2226
2227 mutex_lock(&tty_mutex);
1da177e4
LT
2228 /*
2229 * The process must be a session leader and
2230 * not have a controlling tty already.
2231 */
24ec839c
PZ
2232 if (!current->signal->leader || current->signal->tty) {
2233 ret = -EPERM;
2234 goto unlock;
2235 }
2236
ab521dc0 2237 if (tty->session) {
1da177e4
LT
2238 /*
2239 * This tty is already the controlling
2240 * tty for another session group!
2241 */
37bdfb07 2242 if (arg == 1 && capable(CAP_SYS_ADMIN)) {
1da177e4
LT
2243 /*
2244 * Steal it away
2245 */
1da177e4 2246 read_lock(&tasklist_lock);
24ec839c 2247 session_clear_tty(tty->session);
1da177e4 2248 read_unlock(&tasklist_lock);
24ec839c
PZ
2249 } else {
2250 ret = -EPERM;
2251 goto unlock;
2252 }
1da177e4 2253 }
24ec839c
PZ
2254 proc_set_tty(current, tty);
2255unlock:
28298232 2256 mutex_unlock(&tty_mutex);
24ec839c 2257 return ret;
1da177e4
LT
2258}
2259
5d0fdf1e
AC
2260/**
2261 * tty_get_pgrp - return a ref counted pgrp pid
2262 * @tty: tty to read
2263 *
2264 * Returns a refcounted instance of the pid struct for the process
2265 * group controlling the tty.
2266 */
2267
2268struct pid *tty_get_pgrp(struct tty_struct *tty)
2269{
2270 unsigned long flags;
2271 struct pid *pgrp;
2272
2273 spin_lock_irqsave(&tty->ctrl_lock, flags);
2274 pgrp = get_pid(tty->pgrp);
2275 spin_unlock_irqrestore(&tty->ctrl_lock, flags);
2276
2277 return pgrp;
2278}
2279EXPORT_SYMBOL_GPL(tty_get_pgrp);
2280
af9b897e
AC
2281/**
2282 * tiocgpgrp - get process group
2283 * @tty: tty passed by user
2284 * @real_tty: tty side of the tty pased by the user if a pty else the tty
2285 * @p: returned pid
2286 *
2287 * Obtain the process group of the tty. If there is no process group
2288 * return an error.
2289 *
24ec839c 2290 * Locking: none. Reference to current->signal->tty is safe.
af9b897e
AC
2291 */
2292
1da177e4
LT
2293static int tiocgpgrp(struct tty_struct *tty, struct tty_struct *real_tty, pid_t __user *p)
2294{
5d0fdf1e
AC
2295 struct pid *pid;
2296 int ret;
1da177e4
LT
2297 /*
2298 * (tty == real_tty) is a cheap way of
2299 * testing if the tty is NOT a master pty.
2300 */
2301 if (tty == real_tty && current->signal->tty != real_tty)
2302 return -ENOTTY;
5d0fdf1e
AC
2303 pid = tty_get_pgrp(real_tty);
2304 ret = put_user(pid_vnr(pid), p);
2305 put_pid(pid);
2306 return ret;
1da177e4
LT
2307}
2308
af9b897e
AC
2309/**
2310 * tiocspgrp - attempt to set process group
2311 * @tty: tty passed by user
2312 * @real_tty: tty side device matching tty passed by user
2313 * @p: pid pointer
2314 *
2315 * Set the process group of the tty to the session passed. Only
2316 * permitted where the tty session is our session.
2317 *
47f86834 2318 * Locking: RCU, ctrl lock
af9b897e
AC
2319 */
2320
1da177e4
LT
2321static int tiocspgrp(struct tty_struct *tty, struct tty_struct *real_tty, pid_t __user *p)
2322{
04a2e6a5
EB
2323 struct pid *pgrp;
2324 pid_t pgrp_nr;
1da177e4 2325 int retval = tty_check_change(real_tty);
47f86834 2326 unsigned long flags;
1da177e4
LT
2327
2328 if (retval == -EIO)
2329 return -ENOTTY;
2330 if (retval)
2331 return retval;
2332 if (!current->signal->tty ||
2333 (current->signal->tty != real_tty) ||
ab521dc0 2334 (real_tty->session != task_session(current)))
1da177e4 2335 return -ENOTTY;
04a2e6a5 2336 if (get_user(pgrp_nr, p))
1da177e4 2337 return -EFAULT;
04a2e6a5 2338 if (pgrp_nr < 0)
1da177e4 2339 return -EINVAL;
04a2e6a5 2340 rcu_read_lock();
b488893a 2341 pgrp = find_vpid(pgrp_nr);
04a2e6a5
EB
2342 retval = -ESRCH;
2343 if (!pgrp)
2344 goto out_unlock;
2345 retval = -EPERM;
2346 if (session_of_pgrp(pgrp) != task_session(current))
2347 goto out_unlock;
2348 retval = 0;
47f86834 2349 spin_lock_irqsave(&tty->ctrl_lock, flags);
ab521dc0
EB
2350 put_pid(real_tty->pgrp);
2351 real_tty->pgrp = get_pid(pgrp);
47f86834 2352 spin_unlock_irqrestore(&tty->ctrl_lock, flags);
04a2e6a5
EB
2353out_unlock:
2354 rcu_read_unlock();
2355 return retval;
1da177e4
LT
2356}
2357
af9b897e
AC
2358/**
2359 * tiocgsid - get session id
2360 * @tty: tty passed by user
2361 * @real_tty: tty side of the tty pased by the user if a pty else the tty
2362 * @p: pointer to returned session id
2363 *
2364 * Obtain the session id of the tty. If there is no session
2365 * return an error.
2366 *
24ec839c 2367 * Locking: none. Reference to current->signal->tty is safe.
af9b897e
AC
2368 */
2369
1da177e4
LT
2370static int tiocgsid(struct tty_struct *tty, struct tty_struct *real_tty, pid_t __user *p)
2371{
2372 /*
2373 * (tty == real_tty) is a cheap way of
2374 * testing if the tty is NOT a master pty.
2375 */
2376 if (tty == real_tty && current->signal->tty != real_tty)
2377 return -ENOTTY;
ab521dc0 2378 if (!real_tty->session)
1da177e4 2379 return -ENOTTY;
b488893a 2380 return put_user(pid_vnr(real_tty->session), p);
1da177e4
LT
2381}
2382
af9b897e
AC
2383/**
2384 * tiocsetd - set line discipline
2385 * @tty: tty device
2386 * @p: pointer to user data
2387 *
2388 * Set the line discipline according to user request.
2389 *
2390 * Locking: see tty_set_ldisc, this function is just a helper
2391 */
2392
1da177e4
LT
2393static int tiocsetd(struct tty_struct *tty, int __user *p)
2394{
2395 int ldisc;
04f378b1 2396 int ret;
1da177e4
LT
2397
2398 if (get_user(ldisc, p))
2399 return -EFAULT;
04f378b1 2400
04f378b1 2401 ret = tty_set_ldisc(tty, ldisc);
04f378b1
AC
2402
2403 return ret;
1da177e4
LT
2404}
2405
af9b897e
AC
2406/**
2407 * send_break - performed time break
2408 * @tty: device to break on
2409 * @duration: timeout in mS
2410 *
2411 * Perform a timed break on hardware that lacks its own driver level
2412 * timed break functionality.
2413 *
2414 * Locking:
28298232 2415 * atomic_write_lock serializes
af9b897e 2416 *
af9b897e
AC
2417 */
2418
b20f3ae5 2419static int send_break(struct tty_struct *tty, unsigned int duration)
1da177e4 2420{
9e98966c
AC
2421 int retval;
2422
2423 if (tty->ops->break_ctl == NULL)
2424 return 0;
2425
2426 if (tty->driver->flags & TTY_DRIVER_HARDWARE_BREAK)
2427 retval = tty->ops->break_ctl(tty, duration);
2428 else {
2429 /* Do the work ourselves */
2430 if (tty_write_lock(tty, 0) < 0)
2431 return -EINTR;
2432 retval = tty->ops->break_ctl(tty, -1);
2433 if (retval)
2434 goto out;
2435 if (!signal_pending(current))
2436 msleep_interruptible(duration);
2437 retval = tty->ops->break_ctl(tty, 0);
2438out:
2439 tty_write_unlock(tty);
2440 if (signal_pending(current))
2441 retval = -EINTR;
2442 }
2443 return retval;
1da177e4
LT
2444}
2445
af9b897e 2446/**
f34d7a5b 2447 * tty_tiocmget - get modem status
af9b897e
AC
2448 * @tty: tty device
2449 * @file: user file pointer
2450 * @p: pointer to result
2451 *
2452 * Obtain the modem status bits from the tty driver if the feature
2453 * is supported. Return -EINVAL if it is not available.
2454 *
2455 * Locking: none (up to the driver)
2456 */
2457
2458static int tty_tiocmget(struct tty_struct *tty, struct file *file, int __user *p)
1da177e4
LT
2459{
2460 int retval = -EINVAL;
2461
f34d7a5b
AC
2462 if (tty->ops->tiocmget) {
2463 retval = tty->ops->tiocmget(tty, file);
1da177e4
LT
2464
2465 if (retval >= 0)
2466 retval = put_user(retval, p);
2467 }
2468 return retval;
2469}
2470
af9b897e 2471/**
f34d7a5b 2472 * tty_tiocmset - set modem status
af9b897e
AC
2473 * @tty: tty device
2474 * @file: user file pointer
2475 * @cmd: command - clear bits, set bits or set all
2476 * @p: pointer to desired bits
2477 *
2478 * Set the modem status bits from the tty driver if the feature
2479 * is supported. Return -EINVAL if it is not available.
2480 *
2481 * Locking: none (up to the driver)
2482 */
2483
2484static int tty_tiocmset(struct tty_struct *tty, struct file *file, unsigned int cmd,
1da177e4
LT
2485 unsigned __user *p)
2486{
ae677517
AC
2487 int retval;
2488 unsigned int set, clear, val;
1da177e4 2489
ae677517
AC
2490 if (tty->ops->tiocmset == NULL)
2491 return -EINVAL;
1da177e4 2492
ae677517
AC
2493 retval = get_user(val, p);
2494 if (retval)
2495 return retval;
2496 set = clear = 0;
2497 switch (cmd) {
2498 case TIOCMBIS:
2499 set = val;
2500 break;
2501 case TIOCMBIC:
2502 clear = val;
2503 break;
2504 case TIOCMSET:
2505 set = val;
2506 clear = ~val;
2507 break;
2508 }
2509 set &= TIOCM_DTR|TIOCM_RTS|TIOCM_OUT1|TIOCM_OUT2|TIOCM_LOOP;
2510 clear &= TIOCM_DTR|TIOCM_RTS|TIOCM_OUT1|TIOCM_OUT2|TIOCM_LOOP;
2511 return tty->ops->tiocmset(tty, file, set, clear);
1da177e4
LT
2512}
2513
e8b70e7d
AC
2514struct tty_struct *tty_pair_get_tty(struct tty_struct *tty)
2515{
2516 if (tty->driver->type == TTY_DRIVER_TYPE_PTY &&
2517 tty->driver->subtype == PTY_TYPE_MASTER)
2518 tty = tty->link;
2519 return tty;
2520}
2521EXPORT_SYMBOL(tty_pair_get_tty);
2522
2523struct tty_struct *tty_pair_get_pty(struct tty_struct *tty)
2524{
2525 if (tty->driver->type == TTY_DRIVER_TYPE_PTY &&
2526 tty->driver->subtype == PTY_TYPE_MASTER)
2527 return tty;
2528 return tty->link;
2529}
2530EXPORT_SYMBOL(tty_pair_get_pty);
2531
1da177e4
LT
2532/*
2533 * Split this up, as gcc can choke on it otherwise..
2534 */
04f378b1 2535long tty_ioctl(struct file *file, unsigned int cmd, unsigned long arg)
1da177e4 2536{
d996b62a
NP
2537 struct tty_struct *tty = file_tty(file);
2538 struct tty_struct *real_tty;
1da177e4
LT
2539 void __user *p = (void __user *)arg;
2540 int retval;
2541 struct tty_ldisc *ld;
04f378b1 2542 struct inode *inode = file->f_dentry->d_inode;
37bdfb07 2543
1da177e4
LT
2544 if (tty_paranoia_check(tty, inode, "tty_ioctl"))
2545 return -EINVAL;
2546
e8b70e7d 2547 real_tty = tty_pair_get_tty(tty);
1da177e4
LT
2548
2549 /*
2550 * Factor out some common prep work
2551 */
2552 switch (cmd) {
2553 case TIOCSETD:
2554 case TIOCSBRK:
2555 case TIOCCBRK:
2556 case TCSBRK:
37bdfb07 2557 case TCSBRKP:
1da177e4
LT
2558 retval = tty_check_change(tty);
2559 if (retval)
2560 return retval;
2561 if (cmd != TIOCCBRK) {
2562 tty_wait_until_sent(tty, 0);
2563 if (signal_pending(current))
2564 return -EINTR;
2565 }
2566 break;
2567 }
2568
9e98966c
AC
2569 /*
2570 * Now do the stuff.
2571 */
1da177e4 2572 switch (cmd) {
37bdfb07
AC
2573 case TIOCSTI:
2574 return tiocsti(tty, p);
2575 case TIOCGWINSZ:
8f520021 2576 return tiocgwinsz(real_tty, p);
37bdfb07 2577 case TIOCSWINSZ:
fc6f6238 2578 return tiocswinsz(real_tty, p);
37bdfb07
AC
2579 case TIOCCONS:
2580 return real_tty != tty ? -EINVAL : tioccons(file);
2581 case FIONBIO:
2582 return fionbio(file, p);
2583 case TIOCEXCL:
2584 set_bit(TTY_EXCLUSIVE, &tty->flags);
2585 return 0;
2586 case TIOCNXCL:
2587 clear_bit(TTY_EXCLUSIVE, &tty->flags);
2588 return 0;
2589 case TIOCNOTTY:
2590 if (current->signal->tty != tty)
2591 return -ENOTTY;
2592 no_tty();
2593 return 0;
2594 case TIOCSCTTY:
2595 return tiocsctty(tty, arg);
2596 case TIOCGPGRP:
2597 return tiocgpgrp(tty, real_tty, p);
2598 case TIOCSPGRP:
2599 return tiocspgrp(tty, real_tty, p);
2600 case TIOCGSID:
2601 return tiocgsid(tty, real_tty, p);
2602 case TIOCGETD:
c65c9bc3 2603 return put_user(tty->ldisc->ops->num, (int __user *)p);
37bdfb07
AC
2604 case TIOCSETD:
2605 return tiocsetd(tty, p);
37bdfb07
AC
2606 /*
2607 * Break handling
2608 */
2609 case TIOCSBRK: /* Turn break on, unconditionally */
f34d7a5b 2610 if (tty->ops->break_ctl)
9e98966c 2611 return tty->ops->break_ctl(tty, -1);
37bdfb07 2612 return 0;
37bdfb07 2613 case TIOCCBRK: /* Turn break off, unconditionally */
f34d7a5b 2614 if (tty->ops->break_ctl)
9e98966c 2615 return tty->ops->break_ctl(tty, 0);
37bdfb07
AC
2616 return 0;
2617 case TCSBRK: /* SVID version: non-zero arg --> no break */
2618 /* non-zero arg means wait for all output data
2619 * to be sent (performed above) but don't send break.
2620 * This is used by the tcdrain() termios function.
2621 */
2622 if (!arg)
2623 return send_break(tty, 250);
2624 return 0;
2625 case TCSBRKP: /* support for POSIX tcsendbreak() */
2626 return send_break(tty, arg ? arg*100 : 250);
2627
2628 case TIOCMGET:
2629 return tty_tiocmget(tty, file, p);
2630 case TIOCMSET:
2631 case TIOCMBIC:
2632 case TIOCMBIS:
2633 return tty_tiocmset(tty, file, cmd, p);
2634 case TCFLSH:
2635 switch (arg) {
2636 case TCIFLUSH:
2637 case TCIOFLUSH:
2638 /* flush tty buffer and allow ldisc to process ioctl */
2639 tty_buffer_flush(tty);
c5c34d48 2640 break;
37bdfb07
AC
2641 }
2642 break;
1da177e4 2643 }
f34d7a5b
AC
2644 if (tty->ops->ioctl) {
2645 retval = (tty->ops->ioctl)(tty, file, cmd, arg);
1da177e4
LT
2646 if (retval != -ENOIOCTLCMD)
2647 return retval;
2648 }
2649 ld = tty_ldisc_ref_wait(tty);
2650 retval = -EINVAL;
a352def2
AC
2651 if (ld->ops->ioctl) {
2652 retval = ld->ops->ioctl(tty, file, cmd, arg);
1da177e4
LT
2653 if (retval == -ENOIOCTLCMD)
2654 retval = -EINVAL;
2655 }
2656 tty_ldisc_deref(ld);
2657 return retval;
2658}
2659
e10cc1df 2660#ifdef CONFIG_COMPAT
37bdfb07 2661static long tty_compat_ioctl(struct file *file, unsigned int cmd,
e10cc1df
PF
2662 unsigned long arg)
2663{
2664 struct inode *inode = file->f_dentry->d_inode;
d996b62a 2665 struct tty_struct *tty = file_tty(file);
e10cc1df
PF
2666 struct tty_ldisc *ld;
2667 int retval = -ENOIOCTLCMD;
2668
2669 if (tty_paranoia_check(tty, inode, "tty_ioctl"))
2670 return -EINVAL;
2671
f34d7a5b
AC
2672 if (tty->ops->compat_ioctl) {
2673 retval = (tty->ops->compat_ioctl)(tty, file, cmd, arg);
e10cc1df
PF
2674 if (retval != -ENOIOCTLCMD)
2675 return retval;
2676 }
2677
2678 ld = tty_ldisc_ref_wait(tty);
a352def2
AC
2679 if (ld->ops->compat_ioctl)
2680 retval = ld->ops->compat_ioctl(tty, file, cmd, arg);
e10cc1df
PF
2681 tty_ldisc_deref(ld);
2682
2683 return retval;
2684}
2685#endif
1da177e4
LT
2686
2687/*
2688 * This implements the "Secure Attention Key" --- the idea is to
2689 * prevent trojan horses by killing all processes associated with this
2690 * tty when the user hits the "Secure Attention Key". Required for
2691 * super-paranoid applications --- see the Orange Book for more details.
37bdfb07 2692 *
1da177e4
LT
2693 * This code could be nicer; ideally it should send a HUP, wait a few
2694 * seconds, then send a INT, and then a KILL signal. But you then
2695 * have to coordinate with the init process, since all processes associated
2696 * with the current tty must be dead before the new getty is allowed
2697 * to spawn.
2698 *
2699 * Now, if it would be correct ;-/ The current code has a nasty hole -
2700 * it doesn't catch files in flight. We may send the descriptor to ourselves
2701 * via AF_UNIX socket, close it and later fetch from socket. FIXME.
2702 *
2703 * Nasty bug: do_SAK is being called in interrupt context. This can
2704 * deadlock. We punt it up to process context. AKPM - 16Mar2001
2705 */
8b6312f4 2706void __do_SAK(struct tty_struct *tty)
1da177e4
LT
2707{
2708#ifdef TTY_SOFT_SAK
2709 tty_hangup(tty);
2710#else
652486fb 2711 struct task_struct *g, *p;
ab521dc0 2712 struct pid *session;
1da177e4
LT
2713 int i;
2714 struct file *filp;
badf1662 2715 struct fdtable *fdt;
37bdfb07 2716
1da177e4
LT
2717 if (!tty)
2718 return;
24ec839c 2719 session = tty->session;
37bdfb07 2720
b3f13deb 2721 tty_ldisc_flush(tty);
1da177e4 2722
f34d7a5b 2723 tty_driver_flush_buffer(tty);
37bdfb07 2724
1da177e4 2725 read_lock(&tasklist_lock);
652486fb 2726 /* Kill the entire session */
ab521dc0 2727 do_each_pid_task(session, PIDTYPE_SID, p) {
652486fb 2728 printk(KERN_NOTICE "SAK: killed process %d"
1b0f7ffd 2729 " (%s): task_session(p)==tty->session\n",
ba25f9dc 2730 task_pid_nr(p), p->comm);
652486fb 2731 send_sig(SIGKILL, p, 1);
ab521dc0 2732 } while_each_pid_task(session, PIDTYPE_SID, p);
652486fb
EB
2733 /* Now kill any processes that happen to have the
2734 * tty open.
2735 */
2736 do_each_thread(g, p) {
2737 if (p->signal->tty == tty) {
1da177e4 2738 printk(KERN_NOTICE "SAK: killed process %d"
1b0f7ffd 2739 " (%s): task_session(p)==tty->session\n",
ba25f9dc 2740 task_pid_nr(p), p->comm);
1da177e4
LT
2741 send_sig(SIGKILL, p, 1);
2742 continue;
2743 }
2744 task_lock(p);
2745 if (p->files) {
ca99c1da
DS
2746 /*
2747 * We don't take a ref to the file, so we must
2748 * hold ->file_lock instead.
2749 */
2750 spin_lock(&p->files->file_lock);
badf1662 2751 fdt = files_fdtable(p->files);
37bdfb07 2752 for (i = 0; i < fdt->max_fds; i++) {
1da177e4
LT
2753 filp = fcheck_files(p->files, i);
2754 if (!filp)
2755 continue;
2756 if (filp->f_op->read == tty_read &&
d996b62a 2757 file_tty(filp) == tty) {
1da177e4
LT
2758 printk(KERN_NOTICE "SAK: killed process %d"
2759 " (%s): fd#%d opened to the tty\n",
ba25f9dc 2760 task_pid_nr(p), p->comm, i);
20ac9437 2761 force_sig(SIGKILL, p);
1da177e4
LT
2762 break;
2763 }
2764 }
ca99c1da 2765 spin_unlock(&p->files->file_lock);
1da177e4
LT
2766 }
2767 task_unlock(p);
652486fb 2768 } while_each_thread(g, p);
1da177e4
LT
2769 read_unlock(&tasklist_lock);
2770#endif
2771}
2772
8b6312f4
EB
2773static void do_SAK_work(struct work_struct *work)
2774{
2775 struct tty_struct *tty =
2776 container_of(work, struct tty_struct, SAK_work);
2777 __do_SAK(tty);
2778}
2779
1da177e4
LT
2780/*
2781 * The tq handling here is a little racy - tty->SAK_work may already be queued.
2782 * Fortunately we don't need to worry, because if ->SAK_work is already queued,
2783 * the values which we write to it will be identical to the values which it
2784 * already has. --akpm
2785 */
2786void do_SAK(struct tty_struct *tty)
2787{
2788 if (!tty)
2789 return;
1da177e4
LT
2790 schedule_work(&tty->SAK_work);
2791}
2792
2793EXPORT_SYMBOL(do_SAK);
2794
30004ac9
DES
2795static int dev_match_devt(struct device *dev, void *data)
2796{
2797 dev_t *devt = data;
2798 return dev->devt == *devt;
2799}
2800
2801/* Must put_device() after it's unused! */
2802static struct device *tty_get_device(struct tty_struct *tty)
2803{
2804 dev_t devt = tty_devnum(tty);
2805 return class_find_device(tty_class, NULL, &devt, dev_match_devt);
2806}
2807
2808
af9b897e
AC
2809/**
2810 * initialize_tty_struct
2811 * @tty: tty to initialize
2812 *
2813 * This subroutine initializes a tty structure that has been newly
2814 * allocated.
2815 *
2816 * Locking: none - tty in question must not be exposed at this point
1da177e4 2817 */
af9b897e 2818
bf970ee4
AC
2819void initialize_tty_struct(struct tty_struct *tty,
2820 struct tty_driver *driver, int idx)
1da177e4
LT
2821{
2822 memset(tty, 0, sizeof(struct tty_struct));
9c9f4ded 2823 kref_init(&tty->kref);
1da177e4 2824 tty->magic = TTY_MAGIC;
01e1abb2 2825 tty_ldisc_init(tty);
ab521dc0
EB
2826 tty->session = NULL;
2827 tty->pgrp = NULL;
1da177e4 2828 tty->overrun_time = jiffies;
33f0f88f
AC
2829 tty->buf.head = tty->buf.tail = NULL;
2830 tty_buffer_init(tty);
5785c95b 2831 mutex_init(&tty->termios_mutex);
c65c9bc3 2832 mutex_init(&tty->ldisc_mutex);
1da177e4
LT
2833 init_waitqueue_head(&tty->write_wait);
2834 init_waitqueue_head(&tty->read_wait);
65f27f38 2835 INIT_WORK(&tty->hangup_work, do_tty_hangup);
70522e12
IM
2836 mutex_init(&tty->atomic_read_lock);
2837 mutex_init(&tty->atomic_write_lock);
a88a69c9
JP
2838 mutex_init(&tty->output_lock);
2839 mutex_init(&tty->echo_lock);
1da177e4 2840 spin_lock_init(&tty->read_lock);
04f378b1 2841 spin_lock_init(&tty->ctrl_lock);
1da177e4 2842 INIT_LIST_HEAD(&tty->tty_files);
7f1f86a0 2843 INIT_WORK(&tty->SAK_work, do_SAK_work);
bf970ee4
AC
2844
2845 tty->driver = driver;
2846 tty->ops = driver->ops;
2847 tty->index = idx;
2848 tty_line_name(driver, idx, tty->name);
30004ac9 2849 tty->dev = tty_get_device(tty);
1da177e4
LT
2850}
2851
f34d7a5b
AC
2852/**
2853 * tty_put_char - write one character to a tty
2854 * @tty: tty
2855 * @ch: character
2856 *
2857 * Write one byte to the tty using the provided put_char method
2858 * if present. Returns the number of characters successfully output.
2859 *
2860 * Note: the specific put_char operation in the driver layer may go
2861 * away soon. Don't call it directly, use this method
1da177e4 2862 */
af9b897e 2863
f34d7a5b 2864int tty_put_char(struct tty_struct *tty, unsigned char ch)
1da177e4 2865{
f34d7a5b
AC
2866 if (tty->ops->put_char)
2867 return tty->ops->put_char(tty, ch);
2868 return tty->ops->write(tty, &ch, 1);
1da177e4 2869}
f34d7a5b
AC
2870EXPORT_SYMBOL_GPL(tty_put_char);
2871
d81ed103 2872struct class *tty_class;
1da177e4
LT
2873
2874/**
af9b897e
AC
2875 * tty_register_device - register a tty device
2876 * @driver: the tty driver that describes the tty device
2877 * @index: the index in the tty driver for this tty device
2878 * @device: a struct device that is associated with this tty device.
2879 * This field is optional, if there is no known struct device
2880 * for this tty device it can be set to NULL safely.
1da177e4 2881 *
01107d34
GKH
2882 * Returns a pointer to the struct device for this tty device
2883 * (or ERR_PTR(-EFOO) on error).
1cdcb6b4 2884 *
af9b897e
AC
2885 * This call is required to be made to register an individual tty device
2886 * if the tty driver's flags have the TTY_DRIVER_DYNAMIC_DEV bit set. If
2887 * that bit is not set, this function should not be called by a tty
2888 * driver.
2889 *
2890 * Locking: ??
1da177e4 2891 */
af9b897e 2892
01107d34
GKH
2893struct device *tty_register_device(struct tty_driver *driver, unsigned index,
2894 struct device *device)
1da177e4
LT
2895{
2896 char name[64];
2897 dev_t dev = MKDEV(driver->major, driver->minor_start) + index;
2898
2899 if (index >= driver->num) {
2900 printk(KERN_ERR "Attempt to register invalid tty line number "
2901 " (%d).\n", index);
1cdcb6b4 2902 return ERR_PTR(-EINVAL);
1da177e4
LT
2903 }
2904
1da177e4
LT
2905 if (driver->type == TTY_DRIVER_TYPE_PTY)
2906 pty_line_name(driver, index, name);
2907 else
2908 tty_line_name(driver, index, name);
1cdcb6b4 2909
03457cd4 2910 return device_create(tty_class, device, dev, NULL, name);
1da177e4 2911}
7d7b93c1 2912EXPORT_SYMBOL(tty_register_device);
1da177e4
LT
2913
2914/**
af9b897e
AC
2915 * tty_unregister_device - unregister a tty device
2916 * @driver: the tty driver that describes the tty device
2917 * @index: the index in the tty driver for this tty device
1da177e4 2918 *
af9b897e
AC
2919 * If a tty device is registered with a call to tty_register_device() then
2920 * this function must be called when the tty device is gone.
2921 *
2922 * Locking: ??
1da177e4 2923 */
af9b897e 2924
1da177e4
LT
2925void tty_unregister_device(struct tty_driver *driver, unsigned index)
2926{
37bdfb07
AC
2927 device_destroy(tty_class,
2928 MKDEV(driver->major, driver->minor_start) + index);
1da177e4 2929}
1da177e4
LT
2930EXPORT_SYMBOL(tty_unregister_device);
2931
2932struct tty_driver *alloc_tty_driver(int lines)
2933{
2934 struct tty_driver *driver;
2935
506eb99a 2936 driver = kzalloc(sizeof(struct tty_driver), GFP_KERNEL);
1da177e4 2937 if (driver) {
7d7b93c1 2938 kref_init(&driver->kref);
1da177e4
LT
2939 driver->magic = TTY_DRIVER_MAGIC;
2940 driver->num = lines;
2941 /* later we'll move allocation of tables here */
2942 }
2943 return driver;
2944}
7d7b93c1 2945EXPORT_SYMBOL(alloc_tty_driver);
1da177e4 2946
7d7b93c1 2947static void destruct_tty_driver(struct kref *kref)
1da177e4 2948{
7d7b93c1
AC
2949 struct tty_driver *driver = container_of(kref, struct tty_driver, kref);
2950 int i;
2951 struct ktermios *tp;
2952 void *p;
2953
2954 if (driver->flags & TTY_DRIVER_INSTALLED) {
2955 /*
2956 * Free the termios and termios_locked structures because
2957 * we don't want to get memory leaks when modular tty
2958 * drivers are removed from the kernel.
2959 */
2960 for (i = 0; i < driver->num; i++) {
2961 tp = driver->termios[i];
2962 if (tp) {
2963 driver->termios[i] = NULL;
2964 kfree(tp);
2965 }
7d7b93c1
AC
2966 if (!(driver->flags & TTY_DRIVER_DYNAMIC_DEV))
2967 tty_unregister_device(driver, i);
2968 }
2969 p = driver->ttys;
2970 proc_tty_unregister_driver(driver);
2971 driver->ttys = NULL;
fe6e29fd 2972 driver->termios = NULL;
7d7b93c1
AC
2973 kfree(p);
2974 cdev_del(&driver->cdev);
2975 }
1da177e4
LT
2976 kfree(driver);
2977}
2978
7d7b93c1
AC
2979void tty_driver_kref_put(struct tty_driver *driver)
2980{
2981 kref_put(&driver->kref, destruct_tty_driver);
2982}
2983EXPORT_SYMBOL(tty_driver_kref_put);
2984
b68e31d0
JD
2985void tty_set_operations(struct tty_driver *driver,
2986 const struct tty_operations *op)
1da177e4 2987{
f34d7a5b
AC
2988 driver->ops = op;
2989};
7d7b93c1 2990EXPORT_SYMBOL(tty_set_operations);
1da177e4 2991
7d7b93c1
AC
2992void put_tty_driver(struct tty_driver *d)
2993{
2994 tty_driver_kref_put(d);
2995}
1da177e4 2996EXPORT_SYMBOL(put_tty_driver);
1da177e4
LT
2997
2998/*
2999 * Called by a tty driver to register itself.
3000 */
3001int tty_register_driver(struct tty_driver *driver)
3002{
3003 int error;
37bdfb07 3004 int i;
1da177e4
LT
3005 dev_t dev;
3006 void **p = NULL;
3007
543691a6 3008 if (!(driver->flags & TTY_DRIVER_DEVPTS_MEM) && driver->num) {
fe6e29fd 3009 p = kzalloc(driver->num * 2 * sizeof(void *), GFP_KERNEL);
1da177e4
LT
3010 if (!p)
3011 return -ENOMEM;
1da177e4
LT
3012 }
3013
3014 if (!driver->major) {
37bdfb07
AC
3015 error = alloc_chrdev_region(&dev, driver->minor_start,
3016 driver->num, driver->name);
1da177e4
LT
3017 if (!error) {
3018 driver->major = MAJOR(dev);
3019 driver->minor_start = MINOR(dev);
3020 }
3021 } else {
3022 dev = MKDEV(driver->major, driver->minor_start);
e5717c48 3023 error = register_chrdev_region(dev, driver->num, driver->name);
1da177e4
LT
3024 }
3025 if (error < 0) {
3026 kfree(p);
3027 return error;
3028 }
3029
3030 if (p) {
3031 driver->ttys = (struct tty_struct **)p;
edc6afc5 3032 driver->termios = (struct ktermios **)(p + driver->num);
1da177e4
LT
3033 } else {
3034 driver->ttys = NULL;
3035 driver->termios = NULL;
1da177e4
LT
3036 }
3037
3038 cdev_init(&driver->cdev, &tty_fops);
3039 driver->cdev.owner = driver->owner;
3040 error = cdev_add(&driver->cdev, dev, driver->num);
3041 if (error) {
1da177e4
LT
3042 unregister_chrdev_region(dev, driver->num);
3043 driver->ttys = NULL;
fe6e29fd 3044 driver->termios = NULL;
1da177e4
LT
3045 kfree(p);
3046 return error;
3047 }
3048
ca509f69 3049 mutex_lock(&tty_mutex);
1da177e4 3050 list_add(&driver->tty_drivers, &tty_drivers);
ca509f69 3051 mutex_unlock(&tty_mutex);
37bdfb07
AC
3052
3053 if (!(driver->flags & TTY_DRIVER_DYNAMIC_DEV)) {
3054 for (i = 0; i < driver->num; i++)
1da177e4
LT
3055 tty_register_device(driver, i, NULL);
3056 }
3057 proc_tty_register_driver(driver);
7d7b93c1 3058 driver->flags |= TTY_DRIVER_INSTALLED;
1da177e4
LT
3059 return 0;
3060}
3061
3062EXPORT_SYMBOL(tty_register_driver);
3063
3064/*
3065 * Called by a tty driver to unregister itself.
3066 */
3067int tty_unregister_driver(struct tty_driver *driver)
3068{
7d7b93c1
AC
3069#if 0
3070 /* FIXME */
1da177e4
LT
3071 if (driver->refcount)
3072 return -EBUSY;
7d7b93c1 3073#endif
1da177e4
LT
3074 unregister_chrdev_region(MKDEV(driver->major, driver->minor_start),
3075 driver->num);
ca509f69 3076 mutex_lock(&tty_mutex);
1da177e4 3077 list_del(&driver->tty_drivers);
ca509f69 3078 mutex_unlock(&tty_mutex);
1da177e4
LT
3079 return 0;
3080}
7d7b93c1 3081
1da177e4
LT
3082EXPORT_SYMBOL(tty_unregister_driver);
3083
24ec839c
PZ
3084dev_t tty_devnum(struct tty_struct *tty)
3085{
3086 return MKDEV(tty->driver->major, tty->driver->minor_start) + tty->index;
3087}
3088EXPORT_SYMBOL(tty_devnum);
3089
3090void proc_clear_tty(struct task_struct *p)
3091{
7c3b1dcf 3092 unsigned long flags;
9c9f4ded 3093 struct tty_struct *tty;
7c3b1dcf 3094 spin_lock_irqsave(&p->sighand->siglock, flags);
9c9f4ded 3095 tty = p->signal->tty;
24ec839c 3096 p->signal->tty = NULL;
7c3b1dcf 3097 spin_unlock_irqrestore(&p->sighand->siglock, flags);
9c9f4ded 3098 tty_kref_put(tty);
24ec839c 3099}
24ec839c 3100
47f86834
AC
3101/* Called under the sighand lock */
3102
2a65f1d9 3103static void __proc_set_tty(struct task_struct *tsk, struct tty_struct *tty)
24ec839c
PZ
3104{
3105 if (tty) {
47f86834
AC
3106 unsigned long flags;
3107 /* We should not have a session or pgrp to put here but.... */
3108 spin_lock_irqsave(&tty->ctrl_lock, flags);
d9c1e9a8
EB
3109 put_pid(tty->session);
3110 put_pid(tty->pgrp);
ab521dc0 3111 tty->pgrp = get_pid(task_pgrp(tsk));
47f86834
AC
3112 spin_unlock_irqrestore(&tty->ctrl_lock, flags);
3113 tty->session = get_pid(task_session(tsk));
9c9f4ded
AC
3114 if (tsk->signal->tty) {
3115 printk(KERN_DEBUG "tty not NULL!!\n");
3116 tty_kref_put(tsk->signal->tty);
3117 }
24ec839c 3118 }
2a65f1d9 3119 put_pid(tsk->signal->tty_old_pgrp);
9c9f4ded 3120 tsk->signal->tty = tty_kref_get(tty);
ab521dc0 3121 tsk->signal->tty_old_pgrp = NULL;
24ec839c
PZ
3122}
3123
98a27ba4 3124static void proc_set_tty(struct task_struct *tsk, struct tty_struct *tty)
24ec839c
PZ
3125{
3126 spin_lock_irq(&tsk->sighand->siglock);
2a65f1d9 3127 __proc_set_tty(tsk, tty);
24ec839c
PZ
3128 spin_unlock_irq(&tsk->sighand->siglock);
3129}
3130
3131struct tty_struct *get_current_tty(void)
3132{
3133 struct tty_struct *tty;
934e6ebf
AC
3134 unsigned long flags;
3135
3136 spin_lock_irqsave(&current->sighand->siglock, flags);
452a00d2 3137 tty = tty_kref_get(current->signal->tty);
934e6ebf 3138 spin_unlock_irqrestore(&current->sighand->siglock, flags);
24ec839c
PZ
3139 return tty;
3140}
a311f743 3141EXPORT_SYMBOL_GPL(get_current_tty);
1da177e4 3142
d81ed103
AC
3143void tty_default_fops(struct file_operations *fops)
3144{
3145 *fops = tty_fops;
3146}
3147
1da177e4
LT
3148/*
3149 * Initialize the console device. This is called *early*, so
3150 * we can't necessarily depend on lots of kernel help here.
3151 * Just do some early initializations, and do the complex setup
3152 * later.
3153 */
3154void __init console_init(void)
3155{
3156 initcall_t *call;
3157
3158 /* Setup the default TTY line discipline. */
01e1abb2 3159 tty_ldisc_begin();
1da177e4
LT
3160
3161 /*
37bdfb07 3162 * set up the console device so that later boot sequences can
1da177e4
LT
3163 * inform about problems etc..
3164 */
1da177e4
LT
3165 call = __con_initcall_start;
3166 while (call < __con_initcall_end) {
3167 (*call)();
3168 call++;
3169 }
3170}
3171
e454cea2
KS
3172static char *tty_devnode(struct device *dev, mode_t *mode)
3173{
3174 if (!mode)
3175 return NULL;
3176 if (dev->devt == MKDEV(TTYAUX_MAJOR, 0) ||
3177 dev->devt == MKDEV(TTYAUX_MAJOR, 2))
3178 *mode = 0666;
3179 return NULL;
3180}
3181
1da177e4
LT
3182static int __init tty_class_init(void)
3183{
7fe845d1 3184 tty_class = class_create(THIS_MODULE, "tty");
1da177e4
LT
3185 if (IS_ERR(tty_class))
3186 return PTR_ERR(tty_class);
e454cea2 3187 tty_class->devnode = tty_devnode;
1da177e4
LT
3188 return 0;
3189}
3190
3191postcore_initcall(tty_class_init);
3192
3193/* 3/2004 jmc: why do these devices exist? */
3194
3195static struct cdev tty_cdev, console_cdev;
1da177e4
LT
3196
3197/*
3198 * Ok, now we can initialize the rest of the tty devices and can count
3199 * on memory allocations, interrupts etc..
3200 */
31d1d48e 3201int __init tty_init(void)
1da177e4
LT
3202{
3203 cdev_init(&tty_cdev, &tty_fops);
3204 if (cdev_add(&tty_cdev, MKDEV(TTYAUX_MAJOR, 0), 1) ||
3205 register_chrdev_region(MKDEV(TTYAUX_MAJOR, 0), 1, "/dev/tty") < 0)
3206 panic("Couldn't register /dev/tty driver\n");
d81ed103 3207 device_create(tty_class, NULL, MKDEV(TTYAUX_MAJOR, 0), NULL,
47aa5793 3208 "tty");
1da177e4
LT
3209
3210 cdev_init(&console_cdev, &console_fops);
3211 if (cdev_add(&console_cdev, MKDEV(TTYAUX_MAJOR, 1), 1) ||
3212 register_chrdev_region(MKDEV(TTYAUX_MAJOR, 1), 1, "/dev/console") < 0)
3213 panic("Couldn't register /dev/console driver\n");
d81ed103 3214 device_create(tty_class, NULL, MKDEV(TTYAUX_MAJOR, 1), NULL,
47aa5793 3215 "console");
1da177e4 3216
1da177e4 3217#ifdef CONFIG_VT
d81ed103 3218 vty_init(&console_fops);
1da177e4
LT
3219#endif
3220 return 0;
3221}
31d1d48e 3222