tty: moxa: split open lock
[linux-2.6-block.git] / drivers / char / tty_io.c
CommitLineData
1da177e4
LT
1/*
2 * linux/drivers/char/tty_io.c
3 *
4 * Copyright (C) 1991, 1992 Linus Torvalds
5 */
6
7/*
8 * 'tty_io.c' gives an orthogonal feeling to tty's, be they consoles
9 * or rs-channels. It also implements echoing, cooked mode etc.
10 *
11 * Kill-line thanks to John T Kohl, who also corrected VMIN = VTIME = 0.
12 *
13 * Modified by Theodore Ts'o, 9/14/92, to dynamically allocate the
14 * tty_struct and tty_queue structures. Previously there was an array
15 * of 256 tty_struct's which was statically allocated, and the
16 * tty_queue structures were allocated at boot time. Both are now
17 * dynamically allocated only when the tty is open.
18 *
19 * Also restructured routines so that there is more of a separation
20 * between the high-level tty routines (tty_io.c and tty_ioctl.c) and
21 * the low-level tty routines (serial.c, pty.c, console.c). This
37bdfb07 22 * makes for cleaner and more compact code. -TYT, 9/17/92
1da177e4
LT
23 *
24 * Modified by Fred N. van Kempen, 01/29/93, to add line disciplines
25 * which can be dynamically activated and de-activated by the line
26 * discipline handling modules (like SLIP).
27 *
28 * NOTE: pay no attention to the line discipline code (yet); its
29 * interface is still subject to change in this version...
30 * -- TYT, 1/31/92
31 *
32 * Added functionality to the OPOST tty handling. No delays, but all
33 * other bits should be there.
34 * -- Nick Holloway <alfie@dcs.warwick.ac.uk>, 27th May 1993.
35 *
36 * Rewrote canonical mode and added more termios flags.
37 * -- julian@uhunix.uhcc.hawaii.edu (J. Cowley), 13Jan94
38 *
39 * Reorganized FASYNC support so mouse code can share it.
40 * -- ctm@ardi.com, 9Sep95
41 *
42 * New TIOCLINUX variants added.
43 * -- mj@k332.feld.cvut.cz, 19-Nov-95
37bdfb07 44 *
1da177e4
LT
45 * Restrict vt switching via ioctl()
46 * -- grif@cs.ucr.edu, 5-Dec-95
47 *
48 * Move console and virtual terminal code to more appropriate files,
49 * implement CONFIG_VT and generalize console device interface.
50 * -- Marko Kohtala <Marko.Kohtala@hut.fi>, March 97
51 *
d81ed103 52 * Rewrote tty_init_dev and tty_release_dev to eliminate races.
1da177e4
LT
53 * -- Bill Hawes <whawes@star.net>, June 97
54 *
55 * Added devfs support.
56 * -- C. Scott Ananian <cananian@alumni.princeton.edu>, 13-Jan-1998
57 *
58 * Added support for a Unix98-style ptmx device.
59 * -- C. Scott Ananian <cananian@alumni.princeton.edu>, 14-Jan-1998
60 *
61 * Reduced memory usage for older ARM systems
62 * -- Russell King <rmk@arm.linux.org.uk>
63 *
64 * Move do_SAK() into process context. Less stack use in devfs functions.
37bdfb07
AC
65 * alloc_tty_struct() always uses kmalloc()
66 * -- Andrew Morton <andrewm@uow.edu.eu> 17Mar01
1da177e4
LT
67 */
68
1da177e4
LT
69#include <linux/types.h>
70#include <linux/major.h>
71#include <linux/errno.h>
72#include <linux/signal.h>
73#include <linux/fcntl.h>
74#include <linux/sched.h>
75#include <linux/interrupt.h>
76#include <linux/tty.h>
77#include <linux/tty_driver.h>
78#include <linux/tty_flip.h>
79#include <linux/devpts_fs.h>
80#include <linux/file.h>
9f3acc31 81#include <linux/fdtable.h>
1da177e4
LT
82#include <linux/console.h>
83#include <linux/timer.h>
84#include <linux/ctype.h>
85#include <linux/kd.h>
86#include <linux/mm.h>
87#include <linux/string.h>
88#include <linux/slab.h>
89#include <linux/poll.h>
90#include <linux/proc_fs.h>
91#include <linux/init.h>
92#include <linux/module.h>
93#include <linux/smp_lock.h>
94#include <linux/device.h>
1da177e4
LT
95#include <linux/wait.h>
96#include <linux/bitops.h>
b20f3ae5 97#include <linux/delay.h>
a352def2 98#include <linux/seq_file.h>
1da177e4 99
a352def2 100#include <linux/uaccess.h>
1da177e4
LT
101#include <asm/system.h>
102
103#include <linux/kbd_kern.h>
104#include <linux/vt_kern.h>
105#include <linux/selection.h>
1da177e4
LT
106
107#include <linux/kmod.h>
b488893a 108#include <linux/nsproxy.h>
1da177e4
LT
109
110#undef TTY_DEBUG_HANGUP
111
112#define TTY_PARANOIA_CHECK 1
113#define CHECK_TTY_COUNT 1
114
edc6afc5 115struct ktermios tty_std_termios = { /* for the benefit of tty drivers */
1da177e4
LT
116 .c_iflag = ICRNL | IXON,
117 .c_oflag = OPOST | ONLCR,
118 .c_cflag = B38400 | CS8 | CREAD | HUPCL,
119 .c_lflag = ISIG | ICANON | ECHO | ECHOE | ECHOK |
120 ECHOCTL | ECHOKE | IEXTEN,
edc6afc5
AC
121 .c_cc = INIT_C_CC,
122 .c_ispeed = 38400,
123 .c_ospeed = 38400
1da177e4
LT
124};
125
126EXPORT_SYMBOL(tty_std_termios);
127
128/* This list gets poked at by procfs and various bits of boot up code. This
129 could do with some rationalisation such as pulling the tty proc function
130 into this file */
37bdfb07 131
1da177e4
LT
132LIST_HEAD(tty_drivers); /* linked list of tty drivers */
133
24ec839c 134/* Mutex to protect creating and releasing a tty. This is shared with
1da177e4 135 vt.c for deeply disgusting hack reasons */
70522e12 136DEFINE_MUTEX(tty_mutex);
de2a84f2 137EXPORT_SYMBOL(tty_mutex);
1da177e4 138
1da177e4
LT
139static ssize_t tty_read(struct file *, char __user *, size_t, loff_t *);
140static ssize_t tty_write(struct file *, const char __user *, size_t, loff_t *);
37bdfb07
AC
141ssize_t redirected_tty_write(struct file *, const char __user *,
142 size_t, loff_t *);
1da177e4
LT
143static unsigned int tty_poll(struct file *, poll_table *);
144static int tty_open(struct inode *, struct file *);
145static int tty_release(struct inode *, struct file *);
04f378b1 146long tty_ioctl(struct file *file, unsigned int cmd, unsigned long arg);
e10cc1df 147#ifdef CONFIG_COMPAT
37bdfb07 148static long tty_compat_ioctl(struct file *file, unsigned int cmd,
e10cc1df
PF
149 unsigned long arg);
150#else
151#define tty_compat_ioctl NULL
152#endif
37bdfb07 153static int tty_fasync(int fd, struct file *filp, int on);
d5698c28 154static void release_tty(struct tty_struct *tty, int idx);
2a65f1d9 155static void __proc_set_tty(struct task_struct *tsk, struct tty_struct *tty);
98a27ba4 156static void proc_set_tty(struct task_struct *tsk, struct tty_struct *tty);
1da177e4 157
af9b897e
AC
158/**
159 * alloc_tty_struct - allocate a tty object
160 *
161 * Return a new empty tty structure. The data fields have not
162 * been initialized in any way but has been zeroed
163 *
164 * Locking: none
af9b897e 165 */
1da177e4 166
bf970ee4 167struct tty_struct *alloc_tty_struct(void)
1da177e4 168{
1266b1e1 169 return kzalloc(sizeof(struct tty_struct), GFP_KERNEL);
1da177e4
LT
170}
171
af9b897e
AC
172/**
173 * free_tty_struct - free a disused tty
174 * @tty: tty struct to free
175 *
176 * Free the write buffers, tty queue and tty memory itself.
177 *
178 * Locking: none. Must be called after tty is definitely unused
179 */
180
bf970ee4 181void free_tty_struct(struct tty_struct *tty)
1da177e4
LT
182{
183 kfree(tty->write_buf);
33f0f88f 184 tty_buffer_free_all(tty);
1da177e4
LT
185 kfree(tty);
186}
187
188#define TTY_NUMBER(tty) ((tty)->index + (tty)->driver->name_base)
189
af9b897e
AC
190/**
191 * tty_name - return tty naming
192 * @tty: tty structure
193 * @buf: buffer for output
194 *
195 * Convert a tty structure into a name. The name reflects the kernel
196 * naming policy and if udev is in use may not reflect user space
197 *
198 * Locking: none
199 */
200
1da177e4
LT
201char *tty_name(struct tty_struct *tty, char *buf)
202{
203 if (!tty) /* Hmm. NULL pointer. That's fun. */
204 strcpy(buf, "NULL tty");
205 else
206 strcpy(buf, tty->name);
207 return buf;
208}
209
210EXPORT_SYMBOL(tty_name);
211
d769a669 212int tty_paranoia_check(struct tty_struct *tty, struct inode *inode,
1da177e4
LT
213 const char *routine)
214{
215#ifdef TTY_PARANOIA_CHECK
216 if (!tty) {
217 printk(KERN_WARNING
218 "null TTY for (%d:%d) in %s\n",
219 imajor(inode), iminor(inode), routine);
220 return 1;
221 }
222 if (tty->magic != TTY_MAGIC) {
223 printk(KERN_WARNING
224 "bad magic number for tty struct (%d:%d) in %s\n",
225 imajor(inode), iminor(inode), routine);
226 return 1;
227 }
228#endif
229 return 0;
230}
231
232static int check_tty_count(struct tty_struct *tty, const char *routine)
233{
234#ifdef CHECK_TTY_COUNT
235 struct list_head *p;
236 int count = 0;
37bdfb07 237
1da177e4
LT
238 file_list_lock();
239 list_for_each(p, &tty->tty_files) {
240 count++;
241 }
242 file_list_unlock();
243 if (tty->driver->type == TTY_DRIVER_TYPE_PTY &&
244 tty->driver->subtype == PTY_TYPE_SLAVE &&
245 tty->link && tty->link->count)
246 count++;
247 if (tty->count != count) {
248 printk(KERN_WARNING "Warning: dev (%s) tty->count(%d) "
249 "!= #fd's(%d) in %s\n",
250 tty->name, tty->count, count, routine);
251 return count;
24ec839c 252 }
1da177e4
LT
253#endif
254 return 0;
255}
256
af9b897e
AC
257/**
258 * get_tty_driver - find device of a tty
259 * @dev_t: device identifier
260 * @index: returns the index of the tty
261 *
262 * This routine returns a tty driver structure, given a device number
263 * and also passes back the index number.
264 *
265 * Locking: caller must hold tty_mutex
1da177e4 266 */
af9b897e 267
1da177e4
LT
268static struct tty_driver *get_tty_driver(dev_t device, int *index)
269{
270 struct tty_driver *p;
271
272 list_for_each_entry(p, &tty_drivers, tty_drivers) {
273 dev_t base = MKDEV(p->major, p->minor_start);
274 if (device < base || device >= base + p->num)
275 continue;
276 *index = device - base;
7d7b93c1 277 return tty_driver_kref_get(p);
1da177e4
LT
278 }
279 return NULL;
280}
281
f2d937f3
JW
282#ifdef CONFIG_CONSOLE_POLL
283
284/**
285 * tty_find_polling_driver - find device of a polled tty
286 * @name: name string to match
287 * @line: pointer to resulting tty line nr
288 *
289 * This routine returns a tty driver structure, given a name
290 * and the condition that the tty driver is capable of polled
291 * operation.
292 */
293struct tty_driver *tty_find_polling_driver(char *name, int *line)
294{
295 struct tty_driver *p, *res = NULL;
296 int tty_line = 0;
0dca0fd2 297 int len;
5f0878ac 298 char *str, *stp;
f2d937f3 299
0dca0fd2
JW
300 for (str = name; *str; str++)
301 if ((*str >= '0' && *str <= '9') || *str == ',')
302 break;
303 if (!*str)
304 return NULL;
305
306 len = str - name;
307 tty_line = simple_strtoul(str, &str, 10);
308
f2d937f3
JW
309 mutex_lock(&tty_mutex);
310 /* Search through the tty devices to look for a match */
311 list_for_each_entry(p, &tty_drivers, tty_drivers) {
0dca0fd2
JW
312 if (strncmp(name, p->name, len) != 0)
313 continue;
5f0878ac
AC
314 stp = str;
315 if (*stp == ',')
316 stp++;
317 if (*stp == '\0')
318 stp = NULL;
f2d937f3 319
f34d7a5b 320 if (tty_line >= 0 && tty_line <= p->num && p->ops &&
5f0878ac 321 p->ops->poll_init && !p->ops->poll_init(p, tty_line, stp)) {
7d7b93c1 322 res = tty_driver_kref_get(p);
f2d937f3
JW
323 *line = tty_line;
324 break;
325 }
326 }
327 mutex_unlock(&tty_mutex);
328
329 return res;
330}
331EXPORT_SYMBOL_GPL(tty_find_polling_driver);
332#endif
333
af9b897e
AC
334/**
335 * tty_check_change - check for POSIX terminal changes
336 * @tty: tty to check
337 *
338 * If we try to write to, or set the state of, a terminal and we're
339 * not in the foreground, send a SIGTTOU. If the signal is blocked or
340 * ignored, go ahead and perform the operation. (POSIX 7.2)
341 *
978e595f 342 * Locking: ctrl_lock
1da177e4 343 */
af9b897e 344
37bdfb07 345int tty_check_change(struct tty_struct *tty)
1da177e4 346{
47f86834
AC
347 unsigned long flags;
348 int ret = 0;
349
1da177e4
LT
350 if (current->signal->tty != tty)
351 return 0;
47f86834
AC
352
353 spin_lock_irqsave(&tty->ctrl_lock, flags);
354
ab521dc0
EB
355 if (!tty->pgrp) {
356 printk(KERN_WARNING "tty_check_change: tty->pgrp == NULL!\n");
9ffee4cb 357 goto out_unlock;
1da177e4 358 }
ab521dc0 359 if (task_pgrp(current) == tty->pgrp)
9ffee4cb
AM
360 goto out_unlock;
361 spin_unlock_irqrestore(&tty->ctrl_lock, flags);
1da177e4 362 if (is_ignored(SIGTTOU))
47f86834
AC
363 goto out;
364 if (is_current_pgrp_orphaned()) {
365 ret = -EIO;
366 goto out;
367 }
040b6362
ON
368 kill_pgrp(task_pgrp(current), SIGTTOU, 1);
369 set_thread_flag(TIF_SIGPENDING);
47f86834
AC
370 ret = -ERESTARTSYS;
371out:
9ffee4cb
AM
372 return ret;
373out_unlock:
47f86834
AC
374 spin_unlock_irqrestore(&tty->ctrl_lock, flags);
375 return ret;
1da177e4
LT
376}
377
378EXPORT_SYMBOL(tty_check_change);
379
37bdfb07 380static ssize_t hung_up_tty_read(struct file *file, char __user *buf,
1da177e4
LT
381 size_t count, loff_t *ppos)
382{
383 return 0;
384}
385
37bdfb07 386static ssize_t hung_up_tty_write(struct file *file, const char __user *buf,
1da177e4
LT
387 size_t count, loff_t *ppos)
388{
389 return -EIO;
390}
391
392/* No kernel lock held - none needed ;) */
37bdfb07 393static unsigned int hung_up_tty_poll(struct file *filp, poll_table *wait)
1da177e4
LT
394{
395 return POLLIN | POLLOUT | POLLERR | POLLHUP | POLLRDNORM | POLLWRNORM;
396}
397
04f378b1
AC
398static long hung_up_tty_ioctl(struct file *file, unsigned int cmd,
399 unsigned long arg)
38ad2ed0
PF
400{
401 return cmd == TIOCSPGRP ? -ENOTTY : -EIO;
402}
403
37bdfb07 404static long hung_up_tty_compat_ioctl(struct file *file,
38ad2ed0 405 unsigned int cmd, unsigned long arg)
1da177e4
LT
406{
407 return cmd == TIOCSPGRP ? -ENOTTY : -EIO;
408}
409
62322d25 410static const struct file_operations tty_fops = {
1da177e4
LT
411 .llseek = no_llseek,
412 .read = tty_read,
413 .write = tty_write,
414 .poll = tty_poll,
04f378b1 415 .unlocked_ioctl = tty_ioctl,
e10cc1df 416 .compat_ioctl = tty_compat_ioctl,
1da177e4
LT
417 .open = tty_open,
418 .release = tty_release,
419 .fasync = tty_fasync,
420};
421
62322d25 422static const struct file_operations console_fops = {
1da177e4
LT
423 .llseek = no_llseek,
424 .read = tty_read,
425 .write = redirected_tty_write,
426 .poll = tty_poll,
04f378b1 427 .unlocked_ioctl = tty_ioctl,
e10cc1df 428 .compat_ioctl = tty_compat_ioctl,
1da177e4
LT
429 .open = tty_open,
430 .release = tty_release,
431 .fasync = tty_fasync,
432};
433
62322d25 434static const struct file_operations hung_up_tty_fops = {
1da177e4
LT
435 .llseek = no_llseek,
436 .read = hung_up_tty_read,
437 .write = hung_up_tty_write,
438 .poll = hung_up_tty_poll,
04f378b1 439 .unlocked_ioctl = hung_up_tty_ioctl,
38ad2ed0 440 .compat_ioctl = hung_up_tty_compat_ioctl,
1da177e4
LT
441 .release = tty_release,
442};
443
444static DEFINE_SPINLOCK(redirect_lock);
445static struct file *redirect;
446
447/**
448 * tty_wakeup - request more data
449 * @tty: terminal
450 *
451 * Internal and external helper for wakeups of tty. This function
452 * informs the line discipline if present that the driver is ready
453 * to receive more output data.
454 */
37bdfb07 455
1da177e4
LT
456void tty_wakeup(struct tty_struct *tty)
457{
458 struct tty_ldisc *ld;
37bdfb07 459
1da177e4
LT
460 if (test_bit(TTY_DO_WRITE_WAKEUP, &tty->flags)) {
461 ld = tty_ldisc_ref(tty);
37bdfb07 462 if (ld) {
a352def2
AC
463 if (ld->ops->write_wakeup)
464 ld->ops->write_wakeup(tty);
1da177e4
LT
465 tty_ldisc_deref(ld);
466 }
467 }
4b19449d 468 wake_up_interruptible_poll(&tty->write_wait, POLLOUT);
1da177e4
LT
469}
470
471EXPORT_SYMBOL_GPL(tty_wakeup);
472
af9b897e
AC
473/**
474 * do_tty_hangup - actual handler for hangup events
65f27f38 475 * @work: tty device
af9b897e 476 *
1bad879a 477 * This can be called by the "eventd" kernel thread. That is process
af9b897e
AC
478 * synchronous but doesn't hold any locks, so we need to make sure we
479 * have the appropriate locks for what we're doing.
480 *
481 * The hangup event clears any pending redirections onto the hung up
482 * device. It ensures future writes will error and it does the needed
483 * line discipline hangup and signal delivery. The tty object itself
484 * remains intact.
485 *
486 * Locking:
487 * BKL
24ec839c
PZ
488 * redirect lock for undoing redirection
489 * file list lock for manipulating list of ttys
490 * tty_ldisc_lock from called functions
491 * termios_mutex resetting termios data
492 * tasklist_lock to walk task list for hangup event
493 * ->siglock to protect ->signal/->sighand
1da177e4 494 */
65f27f38 495static void do_tty_hangup(struct work_struct *work)
1da177e4 496{
65f27f38
DH
497 struct tty_struct *tty =
498 container_of(work, struct tty_struct, hangup_work);
37bdfb07 499 struct file *cons_filp = NULL;
1da177e4
LT
500 struct file *filp, *f = NULL;
501 struct task_struct *p;
1da177e4 502 int closecount = 0, n;
47f86834 503 unsigned long flags;
9c9f4ded 504 int refs = 0;
1da177e4
LT
505
506 if (!tty)
507 return;
508
509 /* inuse_filps is protected by the single kernel lock */
510 lock_kernel();
511
512 spin_lock(&redirect_lock);
513 if (redirect && redirect->private_data == tty) {
514 f = redirect;
515 redirect = NULL;
516 }
517 spin_unlock(&redirect_lock);
37bdfb07 518
1da177e4
LT
519 check_tty_count(tty, "do_tty_hangup");
520 file_list_lock();
521 /* This breaks for file handles being sent over AF_UNIX sockets ? */
2f512016 522 list_for_each_entry(filp, &tty->tty_files, f_u.fu_list) {
1da177e4
LT
523 if (filp->f_op->write == redirected_tty_write)
524 cons_filp = filp;
525 if (filp->f_op->write != tty_write)
526 continue;
527 closecount++;
528 tty_fasync(-1, filp, 0); /* can't block */
529 filp->f_op = &hung_up_tty_fops;
530 }
531 file_list_unlock();
37bdfb07 532
c65c9bc3 533 tty_ldisc_hangup(tty);
37bdfb07 534
1da177e4 535 read_lock(&tasklist_lock);
ab521dc0
EB
536 if (tty->session) {
537 do_each_pid_task(tty->session, PIDTYPE_SID, p) {
24ec839c 538 spin_lock_irq(&p->sighand->siglock);
9c9f4ded 539 if (p->signal->tty == tty) {
1da177e4 540 p->signal->tty = NULL;
9c9f4ded
AC
541 /* We defer the dereferences outside fo
542 the tasklist lock */
543 refs++;
544 }
24ec839c
PZ
545 if (!p->signal->leader) {
546 spin_unlock_irq(&p->sighand->siglock);
1da177e4 547 continue;
24ec839c
PZ
548 }
549 __group_send_sig_info(SIGHUP, SEND_SIG_PRIV, p);
550 __group_send_sig_info(SIGCONT, SEND_SIG_PRIV, p);
ab521dc0 551 put_pid(p->signal->tty_old_pgrp); /* A noop */
47f86834 552 spin_lock_irqsave(&tty->ctrl_lock, flags);
ab521dc0
EB
553 if (tty->pgrp)
554 p->signal->tty_old_pgrp = get_pid(tty->pgrp);
47f86834 555 spin_unlock_irqrestore(&tty->ctrl_lock, flags);
24ec839c 556 spin_unlock_irq(&p->sighand->siglock);
ab521dc0 557 } while_each_pid_task(tty->session, PIDTYPE_SID, p);
1da177e4
LT
558 }
559 read_unlock(&tasklist_lock);
560
47f86834 561 spin_lock_irqsave(&tty->ctrl_lock, flags);
c65c9bc3
AC
562 clear_bit(TTY_THROTTLED, &tty->flags);
563 clear_bit(TTY_PUSH, &tty->flags);
564 clear_bit(TTY_DO_WRITE_WAKEUP, &tty->flags);
d9c1e9a8
EB
565 put_pid(tty->session);
566 put_pid(tty->pgrp);
ab521dc0
EB
567 tty->session = NULL;
568 tty->pgrp = NULL;
1da177e4 569 tty->ctrl_status = 0;
c65c9bc3 570 set_bit(TTY_HUPPED, &tty->flags);
47f86834
AC
571 spin_unlock_irqrestore(&tty->ctrl_lock, flags);
572
9c9f4ded
AC
573 /* Account for the p->signal references we killed */
574 while (refs--)
575 tty_kref_put(tty);
576
1da177e4 577 /*
37bdfb07
AC
578 * If one of the devices matches a console pointer, we
579 * cannot just call hangup() because that will cause
580 * tty->count and state->count to go out of sync.
581 * So we just call close() the right number of times.
1da177e4
LT
582 */
583 if (cons_filp) {
f34d7a5b 584 if (tty->ops->close)
1da177e4 585 for (n = 0; n < closecount; n++)
f34d7a5b
AC
586 tty->ops->close(tty, cons_filp);
587 } else if (tty->ops->hangup)
588 (tty->ops->hangup)(tty);
37bdfb07
AC
589 /*
590 * We don't want to have driver/ldisc interactions beyond
591 * the ones we did here. The driver layer expects no
592 * calls after ->hangup() from the ldisc side. However we
593 * can't yet guarantee all that.
594 */
1da177e4 595 set_bit(TTY_HUPPED, &tty->flags);
c65c9bc3 596 tty_ldisc_enable(tty);
1da177e4
LT
597 unlock_kernel();
598 if (f)
599 fput(f);
600}
601
af9b897e
AC
602/**
603 * tty_hangup - trigger a hangup event
604 * @tty: tty to hangup
605 *
606 * A carrier loss (virtual or otherwise) has occurred on this like
607 * schedule a hangup sequence to run after this event.
608 */
609
37bdfb07 610void tty_hangup(struct tty_struct *tty)
1da177e4
LT
611{
612#ifdef TTY_DEBUG_HANGUP
613 char buf[64];
1da177e4
LT
614 printk(KERN_DEBUG "%s hangup...\n", tty_name(tty, buf));
615#endif
616 schedule_work(&tty->hangup_work);
617}
618
619EXPORT_SYMBOL(tty_hangup);
620
af9b897e
AC
621/**
622 * tty_vhangup - process vhangup
623 * @tty: tty to hangup
624 *
625 * The user has asked via system call for the terminal to be hung up.
626 * We do this synchronously so that when the syscall returns the process
3a4fa0a2 627 * is complete. That guarantee is necessary for security reasons.
af9b897e
AC
628 */
629
37bdfb07 630void tty_vhangup(struct tty_struct *tty)
1da177e4
LT
631{
632#ifdef TTY_DEBUG_HANGUP
633 char buf[64];
634
635 printk(KERN_DEBUG "%s vhangup...\n", tty_name(tty, buf));
636#endif
65f27f38 637 do_tty_hangup(&tty->hangup_work);
1da177e4 638}
37bdfb07 639
1da177e4
LT
640EXPORT_SYMBOL(tty_vhangup);
641
2cb5998b
AC
642/**
643 * tty_vhangup_self - process vhangup for own ctty
644 *
645 * Perform a vhangup on the current controlling tty
646 */
647
648void tty_vhangup_self(void)
649{
650 struct tty_struct *tty;
651
2cb5998b
AC
652 tty = get_current_tty();
653 if (tty) {
654 tty_vhangup(tty);
655 tty_kref_put(tty);
656 }
2cb5998b
AC
657}
658
af9b897e
AC
659/**
660 * tty_hung_up_p - was tty hung up
661 * @filp: file pointer of tty
662 *
663 * Return true if the tty has been subject to a vhangup or a carrier
664 * loss
665 */
666
37bdfb07 667int tty_hung_up_p(struct file *filp)
1da177e4
LT
668{
669 return (filp->f_op == &hung_up_tty_fops);
670}
671
672EXPORT_SYMBOL(tty_hung_up_p);
673
ab521dc0 674static void session_clear_tty(struct pid *session)
24ec839c
PZ
675{
676 struct task_struct *p;
ab521dc0 677 do_each_pid_task(session, PIDTYPE_SID, p) {
24ec839c 678 proc_clear_tty(p);
ab521dc0 679 } while_each_pid_task(session, PIDTYPE_SID, p);
24ec839c
PZ
680}
681
af9b897e
AC
682/**
683 * disassociate_ctty - disconnect controlling tty
684 * @on_exit: true if exiting so need to "hang up" the session
1da177e4 685 *
af9b897e
AC
686 * This function is typically called only by the session leader, when
687 * it wants to disassociate itself from its controlling tty.
688 *
689 * It performs the following functions:
1da177e4
LT
690 * (1) Sends a SIGHUP and SIGCONT to the foreground process group
691 * (2) Clears the tty from being controlling the session
692 * (3) Clears the controlling tty for all processes in the
693 * session group.
694 *
af9b897e
AC
695 * The argument on_exit is set to 1 if called when a process is
696 * exiting; it is 0 if called by the ioctl TIOCNOTTY.
697 *
24ec839c 698 * Locking:
af9b897e 699 * BKL is taken for hysterical raisins
24ec839c
PZ
700 * tty_mutex is taken to protect tty
701 * ->siglock is taken to protect ->signal/->sighand
702 * tasklist_lock is taken to walk process list for sessions
703 * ->siglock is taken to protect ->signal/->sighand
1da177e4 704 */
af9b897e 705
1da177e4
LT
706void disassociate_ctty(int on_exit)
707{
708 struct tty_struct *tty;
ab521dc0 709 struct pid *tty_pgrp = NULL;
1da177e4 710
1da177e4 711
24ec839c 712 tty = get_current_tty();
1da177e4 713 if (tty) {
ab521dc0 714 tty_pgrp = get_pid(tty->pgrp);
452a00d2 715 lock_kernel();
1da177e4
LT
716 if (on_exit && tty->driver->type != TTY_DRIVER_TYPE_PTY)
717 tty_vhangup(tty);
04f378b1 718 unlock_kernel();
452a00d2 719 tty_kref_put(tty);
680a9671 720 } else if (on_exit) {
ab521dc0 721 struct pid *old_pgrp;
680a9671
EB
722 spin_lock_irq(&current->sighand->siglock);
723 old_pgrp = current->signal->tty_old_pgrp;
ab521dc0 724 current->signal->tty_old_pgrp = NULL;
680a9671 725 spin_unlock_irq(&current->sighand->siglock);
24ec839c 726 if (old_pgrp) {
ab521dc0
EB
727 kill_pgrp(old_pgrp, SIGHUP, on_exit);
728 kill_pgrp(old_pgrp, SIGCONT, on_exit);
729 put_pid(old_pgrp);
1da177e4 730 }
1da177e4
LT
731 return;
732 }
ab521dc0
EB
733 if (tty_pgrp) {
734 kill_pgrp(tty_pgrp, SIGHUP, on_exit);
1da177e4 735 if (!on_exit)
ab521dc0
EB
736 kill_pgrp(tty_pgrp, SIGCONT, on_exit);
737 put_pid(tty_pgrp);
1da177e4
LT
738 }
739
24ec839c 740 spin_lock_irq(&current->sighand->siglock);
2a65f1d9 741 put_pid(current->signal->tty_old_pgrp);
23cac8de 742 current->signal->tty_old_pgrp = NULL;
24ec839c
PZ
743 spin_unlock_irq(&current->sighand->siglock);
744
24ec839c
PZ
745 tty = get_current_tty();
746 if (tty) {
47f86834
AC
747 unsigned long flags;
748 spin_lock_irqsave(&tty->ctrl_lock, flags);
ab521dc0
EB
749 put_pid(tty->session);
750 put_pid(tty->pgrp);
751 tty->session = NULL;
752 tty->pgrp = NULL;
47f86834 753 spin_unlock_irqrestore(&tty->ctrl_lock, flags);
452a00d2 754 tty_kref_put(tty);
24ec839c
PZ
755 } else {
756#ifdef TTY_DEBUG_HANGUP
757 printk(KERN_DEBUG "error attempted to write to tty [0x%p]"
758 " = NULL", tty);
759#endif
760 }
1da177e4
LT
761
762 /* Now clear signal->tty under the lock */
763 read_lock(&tasklist_lock);
ab521dc0 764 session_clear_tty(task_session(current));
1da177e4 765 read_unlock(&tasklist_lock);
1da177e4
LT
766}
767
98a27ba4
EB
768/**
769 *
770 * no_tty - Ensure the current process does not have a controlling tty
771 */
772void no_tty(void)
773{
774 struct task_struct *tsk = current;
04f378b1 775 lock_kernel();
98a27ba4
EB
776 if (tsk->signal->leader)
777 disassociate_ctty(0);
04f378b1 778 unlock_kernel();
98a27ba4
EB
779 proc_clear_tty(tsk);
780}
781
af9b897e
AC
782
783/**
beb7dd86 784 * stop_tty - propagate flow control
af9b897e
AC
785 * @tty: tty to stop
786 *
787 * Perform flow control to the driver. For PTY/TTY pairs we
beb7dd86 788 * must also propagate the TIOCKPKT status. May be called
af9b897e
AC
789 * on an already stopped device and will not re-call the driver
790 * method.
791 *
792 * This functionality is used by both the line disciplines for
793 * halting incoming flow and by the driver. It may therefore be
794 * called from any context, may be under the tty atomic_write_lock
795 * but not always.
796 *
797 * Locking:
04f378b1 798 * Uses the tty control lock internally
af9b897e
AC
799 */
800
1da177e4
LT
801void stop_tty(struct tty_struct *tty)
802{
04f378b1
AC
803 unsigned long flags;
804 spin_lock_irqsave(&tty->ctrl_lock, flags);
805 if (tty->stopped) {
806 spin_unlock_irqrestore(&tty->ctrl_lock, flags);
1da177e4 807 return;
04f378b1 808 }
1da177e4
LT
809 tty->stopped = 1;
810 if (tty->link && tty->link->packet) {
811 tty->ctrl_status &= ~TIOCPKT_START;
812 tty->ctrl_status |= TIOCPKT_STOP;
4b19449d 813 wake_up_interruptible_poll(&tty->link->read_wait, POLLIN);
1da177e4 814 }
04f378b1 815 spin_unlock_irqrestore(&tty->ctrl_lock, flags);
f34d7a5b
AC
816 if (tty->ops->stop)
817 (tty->ops->stop)(tty);
1da177e4
LT
818}
819
820EXPORT_SYMBOL(stop_tty);
821
af9b897e 822/**
beb7dd86 823 * start_tty - propagate flow control
af9b897e
AC
824 * @tty: tty to start
825 *
826 * Start a tty that has been stopped if at all possible. Perform
3a4fa0a2 827 * any necessary wakeups and propagate the TIOCPKT status. If this
af9b897e
AC
828 * is the tty was previous stopped and is being started then the
829 * driver start method is invoked and the line discipline woken.
830 *
831 * Locking:
04f378b1 832 * ctrl_lock
af9b897e
AC
833 */
834
1da177e4
LT
835void start_tty(struct tty_struct *tty)
836{
04f378b1
AC
837 unsigned long flags;
838 spin_lock_irqsave(&tty->ctrl_lock, flags);
839 if (!tty->stopped || tty->flow_stopped) {
840 spin_unlock_irqrestore(&tty->ctrl_lock, flags);
1da177e4 841 return;
04f378b1 842 }
1da177e4
LT
843 tty->stopped = 0;
844 if (tty->link && tty->link->packet) {
845 tty->ctrl_status &= ~TIOCPKT_STOP;
846 tty->ctrl_status |= TIOCPKT_START;
4b19449d 847 wake_up_interruptible_poll(&tty->link->read_wait, POLLIN);
1da177e4 848 }
04f378b1 849 spin_unlock_irqrestore(&tty->ctrl_lock, flags);
f34d7a5b
AC
850 if (tty->ops->start)
851 (tty->ops->start)(tty);
1da177e4
LT
852 /* If we have a running line discipline it may need kicking */
853 tty_wakeup(tty);
1da177e4
LT
854}
855
856EXPORT_SYMBOL(start_tty);
857
af9b897e
AC
858/**
859 * tty_read - read method for tty device files
860 * @file: pointer to tty file
861 * @buf: user buffer
862 * @count: size of user buffer
863 * @ppos: unused
864 *
865 * Perform the read system call function on this terminal device. Checks
866 * for hung up devices before calling the line discipline method.
867 *
868 * Locking:
47f86834
AC
869 * Locks the line discipline internally while needed. Multiple
870 * read calls may be outstanding in parallel.
af9b897e
AC
871 */
872
37bdfb07 873static ssize_t tty_read(struct file *file, char __user *buf, size_t count,
1da177e4
LT
874 loff_t *ppos)
875{
876 int i;
37bdfb07 877 struct tty_struct *tty;
1da177e4
LT
878 struct inode *inode;
879 struct tty_ldisc *ld;
880
881 tty = (struct tty_struct *)file->private_data;
a7113a96 882 inode = file->f_path.dentry->d_inode;
1da177e4
LT
883 if (tty_paranoia_check(tty, inode, "tty_read"))
884 return -EIO;
885 if (!tty || (test_bit(TTY_IO_ERROR, &tty->flags)))
886 return -EIO;
887
888 /* We want to wait for the line discipline to sort out in this
889 situation */
890 ld = tty_ldisc_ref_wait(tty);
a352def2
AC
891 if (ld->ops->read)
892 i = (ld->ops->read)(tty, file, buf, count);
1da177e4
LT
893 else
894 i = -EIO;
895 tty_ldisc_deref(ld);
1da177e4
LT
896 if (i > 0)
897 inode->i_atime = current_fs_time(inode->i_sb);
898 return i;
899}
900
9c1729db
AC
901void tty_write_unlock(struct tty_struct *tty)
902{
903 mutex_unlock(&tty->atomic_write_lock);
4b19449d 904 wake_up_interruptible_poll(&tty->write_wait, POLLOUT);
9c1729db
AC
905}
906
907int tty_write_lock(struct tty_struct *tty, int ndelay)
908{
909 if (!mutex_trylock(&tty->atomic_write_lock)) {
910 if (ndelay)
911 return -EAGAIN;
912 if (mutex_lock_interruptible(&tty->atomic_write_lock))
913 return -ERESTARTSYS;
914 }
915 return 0;
916}
917
1da177e4
LT
918/*
919 * Split writes up in sane blocksizes to avoid
920 * denial-of-service type attacks
921 */
922static inline ssize_t do_tty_write(
923 ssize_t (*write)(struct tty_struct *, struct file *, const unsigned char *, size_t),
924 struct tty_struct *tty,
925 struct file *file,
926 const char __user *buf,
927 size_t count)
928{
9c1729db 929 ssize_t ret, written = 0;
1da177e4 930 unsigned int chunk;
37bdfb07 931
9c1729db
AC
932 ret = tty_write_lock(tty, file->f_flags & O_NDELAY);
933 if (ret < 0)
934 return ret;
1da177e4
LT
935
936 /*
937 * We chunk up writes into a temporary buffer. This
938 * simplifies low-level drivers immensely, since they
939 * don't have locking issues and user mode accesses.
940 *
941 * But if TTY_NO_WRITE_SPLIT is set, we should use a
942 * big chunk-size..
943 *
944 * The default chunk-size is 2kB, because the NTTY
945 * layer has problems with bigger chunks. It will
946 * claim to be able to handle more characters than
947 * it actually does.
af9b897e
AC
948 *
949 * FIXME: This can probably go away now except that 64K chunks
950 * are too likely to fail unless switched to vmalloc...
1da177e4
LT
951 */
952 chunk = 2048;
953 if (test_bit(TTY_NO_WRITE_SPLIT, &tty->flags))
954 chunk = 65536;
955 if (count < chunk)
956 chunk = count;
957
70522e12 958 /* write_buf/write_cnt is protected by the atomic_write_lock mutex */
1da177e4 959 if (tty->write_cnt < chunk) {
402fda92 960 unsigned char *buf_chunk;
1da177e4
LT
961
962 if (chunk < 1024)
963 chunk = 1024;
964
402fda92
JW
965 buf_chunk = kmalloc(chunk, GFP_KERNEL);
966 if (!buf_chunk) {
9c1729db
AC
967 ret = -ENOMEM;
968 goto out;
1da177e4
LT
969 }
970 kfree(tty->write_buf);
971 tty->write_cnt = chunk;
402fda92 972 tty->write_buf = buf_chunk;
1da177e4
LT
973 }
974
975 /* Do the write .. */
976 for (;;) {
977 size_t size = count;
978 if (size > chunk)
979 size = chunk;
980 ret = -EFAULT;
981 if (copy_from_user(tty->write_buf, buf, size))
982 break;
1da177e4 983 ret = write(tty, file, tty->write_buf, size);
1da177e4
LT
984 if (ret <= 0)
985 break;
986 written += ret;
987 buf += ret;
988 count -= ret;
989 if (!count)
990 break;
991 ret = -ERESTARTSYS;
992 if (signal_pending(current))
993 break;
994 cond_resched();
995 }
996 if (written) {
a7113a96 997 struct inode *inode = file->f_path.dentry->d_inode;
1da177e4
LT
998 inode->i_mtime = current_fs_time(inode->i_sb);
999 ret = written;
1000 }
9c1729db
AC
1001out:
1002 tty_write_unlock(tty);
1da177e4
LT
1003 return ret;
1004}
1005
95f9bfc6
AC
1006/**
1007 * tty_write_message - write a message to a certain tty, not just the console.
1008 * @tty: the destination tty_struct
1009 * @msg: the message to write
1010 *
1011 * This is used for messages that need to be redirected to a specific tty.
1012 * We don't put it into the syslog queue right now maybe in the future if
1013 * really needed.
1014 *
1015 * We must still hold the BKL and test the CLOSING flag for the moment.
1016 */
1017
1018void tty_write_message(struct tty_struct *tty, char *msg)
1019{
1020 lock_kernel();
1021 if (tty) {
1022 mutex_lock(&tty->atomic_write_lock);
1023 if (tty->ops->write && !test_bit(TTY_CLOSING, &tty->flags))
1024 tty->ops->write(tty, msg, strlen(msg));
1025 tty_write_unlock(tty);
1026 }
1027 unlock_kernel();
1028 return;
1029}
1030
1da177e4 1031
af9b897e
AC
1032/**
1033 * tty_write - write method for tty device file
1034 * @file: tty file pointer
1035 * @buf: user data to write
1036 * @count: bytes to write
1037 * @ppos: unused
1038 *
1039 * Write data to a tty device via the line discipline.
1040 *
1041 * Locking:
1042 * Locks the line discipline as required
1043 * Writes to the tty driver are serialized by the atomic_write_lock
1044 * and are then processed in chunks to the device. The line discipline
a88a69c9 1045 * write method will not be invoked in parallel for each device.
af9b897e
AC
1046 */
1047
37bdfb07
AC
1048static ssize_t tty_write(struct file *file, const char __user *buf,
1049 size_t count, loff_t *ppos)
1da177e4 1050{
37bdfb07 1051 struct tty_struct *tty;
a7113a96 1052 struct inode *inode = file->f_path.dentry->d_inode;
1da177e4
LT
1053 ssize_t ret;
1054 struct tty_ldisc *ld;
37bdfb07 1055
1da177e4
LT
1056 tty = (struct tty_struct *)file->private_data;
1057 if (tty_paranoia_check(tty, inode, "tty_write"))
1058 return -EIO;
f34d7a5b 1059 if (!tty || !tty->ops->write ||
37bdfb07
AC
1060 (test_bit(TTY_IO_ERROR, &tty->flags)))
1061 return -EIO;
f34d7a5b
AC
1062 /* Short term debug to catch buggy drivers */
1063 if (tty->ops->write_room == NULL)
1064 printk(KERN_ERR "tty driver %s lacks a write_room method.\n",
1065 tty->driver->name);
37bdfb07 1066 ld = tty_ldisc_ref_wait(tty);
a352def2 1067 if (!ld->ops->write)
1da177e4
LT
1068 ret = -EIO;
1069 else
a352def2 1070 ret = do_tty_write(ld->ops->write, tty, file, buf, count);
1da177e4
LT
1071 tty_ldisc_deref(ld);
1072 return ret;
1073}
1074
37bdfb07
AC
1075ssize_t redirected_tty_write(struct file *file, const char __user *buf,
1076 size_t count, loff_t *ppos)
1da177e4
LT
1077{
1078 struct file *p = NULL;
1079
1080 spin_lock(&redirect_lock);
1081 if (redirect) {
1082 get_file(redirect);
1083 p = redirect;
1084 }
1085 spin_unlock(&redirect_lock);
1086
1087 if (p) {
1088 ssize_t res;
1089 res = vfs_write(p, buf, count, &p->f_pos);
1090 fput(p);
1091 return res;
1092 }
1da177e4
LT
1093 return tty_write(file, buf, count, ppos);
1094}
1095
1096static char ptychar[] = "pqrstuvwxyzabcde";
1097
af9b897e
AC
1098/**
1099 * pty_line_name - generate name for a pty
1100 * @driver: the tty driver in use
1101 * @index: the minor number
1102 * @p: output buffer of at least 6 bytes
1103 *
1104 * Generate a name from a driver reference and write it to the output
1105 * buffer.
1106 *
1107 * Locking: None
1108 */
1109static void pty_line_name(struct tty_driver *driver, int index, char *p)
1da177e4
LT
1110{
1111 int i = index + driver->name_base;
1112 /* ->name is initialized to "ttyp", but "tty" is expected */
1113 sprintf(p, "%s%c%x",
37bdfb07
AC
1114 driver->subtype == PTY_TYPE_SLAVE ? "tty" : driver->name,
1115 ptychar[i >> 4 & 0xf], i & 0xf);
1da177e4
LT
1116}
1117
af9b897e 1118/**
8b0a88d5 1119 * tty_line_name - generate name for a tty
af9b897e
AC
1120 * @driver: the tty driver in use
1121 * @index: the minor number
1122 * @p: output buffer of at least 7 bytes
1123 *
1124 * Generate a name from a driver reference and write it to the output
1125 * buffer.
1126 *
1127 * Locking: None
1128 */
1129static void tty_line_name(struct tty_driver *driver, int index, char *p)
1da177e4
LT
1130{
1131 sprintf(p, "%s%d", driver->name, index + driver->name_base);
1132}
1133
99f1fe18
AC
1134/**
1135 * tty_driver_lookup_tty() - find an existing tty, if any
1136 * @driver: the driver for the tty
1137 * @idx: the minor number
23499705 1138 *
99f1fe18 1139 * Return the tty, if found or ERR_PTR() otherwise.
23499705 1140 *
99f1fe18
AC
1141 * Locking: tty_mutex must be held. If tty is found, the mutex must
1142 * be held until the 'fast-open' is also done. Will change once we
1143 * have refcounting in the driver and per driver locking
23499705 1144 */
a47d545f 1145static struct tty_struct *tty_driver_lookup_tty(struct tty_driver *driver,
15f1a633 1146 struct inode *inode, int idx)
23499705
SB
1147{
1148 struct tty_struct *tty;
1149
99f1fe18 1150 if (driver->ops->lookup)
15f1a633 1151 return driver->ops->lookup(driver, inode, idx);
23499705 1152
8b0a88d5 1153 tty = driver->ttys[idx];
23499705
SB
1154 return tty;
1155}
1156
bf970ee4
AC
1157/**
1158 * tty_init_termios - helper for termios setup
1159 * @tty: the tty to set up
1160 *
1161 * Initialise the termios structures for this tty. Thus runs under
1162 * the tty_mutex currently so we can be relaxed about ordering.
1163 */
1164
1165int tty_init_termios(struct tty_struct *tty)
1166{
fe6e29fd 1167 struct ktermios *tp;
bf970ee4
AC
1168 int idx = tty->index;
1169
1170 tp = tty->driver->termios[idx];
bf970ee4 1171 if (tp == NULL) {
fe6e29fd
AC
1172 tp = kzalloc(sizeof(struct ktermios[2]), GFP_KERNEL);
1173 if (tp == NULL)
bf970ee4 1174 return -ENOMEM;
bf970ee4
AC
1175 memcpy(tp, &tty->driver->init_termios,
1176 sizeof(struct ktermios));
1177 tty->driver->termios[idx] = tp;
bf970ee4
AC
1178 }
1179 tty->termios = tp;
fe6e29fd 1180 tty->termios_locked = tp + 1;
bf970ee4
AC
1181
1182 /* Compatibility until drivers always set this */
1183 tty->termios->c_ispeed = tty_termios_input_baud_rate(tty->termios);
1184 tty->termios->c_ospeed = tty_termios_baud_rate(tty->termios);
1185 return 0;
1186}
fe1ae7fd 1187EXPORT_SYMBOL_GPL(tty_init_termios);
bf970ee4 1188
99f1fe18 1189/**
8b0a88d5
AC
1190 * tty_driver_install_tty() - install a tty entry in the driver
1191 * @driver: the driver for the tty
1192 * @tty: the tty
1193 *
1194 * Install a tty object into the driver tables. The tty->index field
bf970ee4
AC
1195 * will be set by the time this is called. This method is responsible
1196 * for ensuring any need additional structures are allocated and
1197 * configured.
8b0a88d5
AC
1198 *
1199 * Locking: tty_mutex for now
1200 */
1201static int tty_driver_install_tty(struct tty_driver *driver,
1202 struct tty_struct *tty)
1203{
bf970ee4
AC
1204 int idx = tty->index;
1205
8b0a88d5
AC
1206 if (driver->ops->install)
1207 return driver->ops->install(driver, tty);
bf970ee4
AC
1208
1209 if (tty_init_termios(tty) == 0) {
1210 tty_driver_kref_get(driver);
1211 tty->count++;
1212 driver->ttys[idx] = tty;
1213 return 0;
1214 }
1215 return -ENOMEM;
8b0a88d5
AC
1216}
1217
1218/**
1219 * tty_driver_remove_tty() - remove a tty from the driver tables
1220 * @driver: the driver for the tty
1221 * @idx: the minor number
1222 *
1223 * Remvoe a tty object from the driver tables. The tty->index field
1224 * will be set by the time this is called.
1225 *
1226 * Locking: tty_mutex for now
1227 */
1228static void tty_driver_remove_tty(struct tty_driver *driver,
1229 struct tty_struct *tty)
1230{
1231 if (driver->ops->remove)
1232 driver->ops->remove(driver, tty);
1233 else
1234 driver->ttys[tty->index] = NULL;
1235}
1236
1237/*
1238 * tty_reopen() - fast re-open of an open tty
1239 * @tty - the tty to open
23499705 1240 *
99f1fe18 1241 * Return 0 on success, -errno on error.
23499705 1242 *
99f1fe18
AC
1243 * Locking: tty_mutex must be held from the time the tty was found
1244 * till this open completes.
23499705 1245 */
99f1fe18 1246static int tty_reopen(struct tty_struct *tty)
23499705
SB
1247{
1248 struct tty_driver *driver = tty->driver;
1249
1250 if (test_bit(TTY_CLOSING, &tty->flags))
1251 return -EIO;
1252
1253 if (driver->type == TTY_DRIVER_TYPE_PTY &&
1254 driver->subtype == PTY_TYPE_MASTER) {
1255 /*
1256 * special case for PTY masters: only one open permitted,
1257 * and the slave side open count is incremented as well.
1258 */
1259 if (tty->count)
1260 return -EIO;
1261
1262 tty->link->count++;
1263 }
1264 tty->count++;
1265 tty->driver = driver; /* N.B. why do this every time?? */
1266
1aa4bed8 1267 mutex_lock(&tty->ldisc_mutex);
99f1fe18 1268 WARN_ON(!test_bit(TTY_LDISC, &tty->flags));
1aa4bed8 1269 mutex_unlock(&tty->ldisc_mutex);
23499705
SB
1270
1271 return 0;
1272}
1273
af9b897e 1274/**
d81ed103 1275 * tty_init_dev - initialise a tty device
af9b897e
AC
1276 * @driver: tty driver we are opening a device on
1277 * @idx: device index
15582d36
AC
1278 * @ret_tty: returned tty structure
1279 * @first_ok: ok to open a new device (used by ptmx)
af9b897e
AC
1280 *
1281 * Prepare a tty device. This may not be a "new" clean device but
1282 * could also be an active device. The pty drivers require special
1283 * handling because of this.
1284 *
1285 * Locking:
1286 * The function is called under the tty_mutex, which
1287 * protects us from the tty struct or driver itself going away.
1288 *
1289 * On exit the tty device has the line discipline attached and
1290 * a reference count of 1. If a pair was created for pty/tty use
1291 * and the other was a pty master then it too has a reference count of 1.
1292 *
1da177e4 1293 * WSH 06/09/97: Rewritten to remove races and properly clean up after a
70522e12
IM
1294 * failed open. The new code protects the open with a mutex, so it's
1295 * really quite straightforward. The mutex locking can probably be
1da177e4
LT
1296 * relaxed for the (most common) case of reopening a tty.
1297 */
af9b897e 1298
73ec06fc
AC
1299struct tty_struct *tty_init_dev(struct tty_driver *driver, int idx,
1300 int first_ok)
1da177e4 1301{
bf970ee4 1302 struct tty_struct *tty;
73ec06fc 1303 int retval;
1da177e4 1304
23499705 1305 /* Check if pty master is being opened multiple times */
15582d36 1306 if (driver->subtype == PTY_TYPE_MASTER &&
73ec06fc
AC
1307 (driver->flags & TTY_DRIVER_DEVPTS_MEM) && !first_ok)
1308 return ERR_PTR(-EIO);
1309
1da177e4
LT
1310 /*
1311 * First time open is complex, especially for PTY devices.
1312 * This code guarantees that either everything succeeds and the
1313 * TTY is ready for operation, or else the table slots are vacated
37bdfb07 1314 * and the allocated memory released. (Except that the termios
1da177e4
LT
1315 * and locked termios may be retained.)
1316 */
1317
73ec06fc
AC
1318 if (!try_module_get(driver->owner))
1319 return ERR_PTR(-ENODEV);
1da177e4 1320
1da177e4 1321 tty = alloc_tty_struct();
37bdfb07 1322 if (!tty)
1da177e4 1323 goto fail_no_mem;
bf970ee4 1324 initialize_tty_struct(tty, driver, idx);
1da177e4 1325
73ec06fc 1326 retval = tty_driver_install_tty(driver, tty);
bf970ee4
AC
1327 if (retval < 0) {
1328 free_tty_struct(tty);
1329 module_put(driver->owner);
1330 return ERR_PTR(retval);
1331 }
8b0a88d5 1332
37bdfb07 1333 /*
1da177e4 1334 * Structures all installed ... call the ldisc open routines.
d5698c28
CH
1335 * If we fail here just call release_tty to clean up. No need
1336 * to decrement the use counts, as release_tty doesn't care.
1da177e4
LT
1337 */
1338
bf970ee4 1339 retval = tty_ldisc_setup(tty, tty->link);
01e1abb2
AC
1340 if (retval)
1341 goto release_mem_out;
73ec06fc 1342 return tty;
1da177e4 1343
1da177e4
LT
1344fail_no_mem:
1345 module_put(driver->owner);
73ec06fc 1346 return ERR_PTR(-ENOMEM);
1da177e4 1347
d5698c28 1348 /* call the tty release_tty routine to clean out this slot */
1da177e4 1349release_mem_out:
4050914f 1350 if (printk_ratelimit())
d81ed103 1351 printk(KERN_INFO "tty_init_dev: ldisc open failed, "
4050914f 1352 "clearing slot %d\n", idx);
d5698c28 1353 release_tty(tty, idx);
73ec06fc 1354 return ERR_PTR(retval);
1da177e4
LT
1355}
1356
feebed65
AC
1357void tty_free_termios(struct tty_struct *tty)
1358{
1359 struct ktermios *tp;
1360 int idx = tty->index;
1361 /* Kill this flag and push into drivers for locking etc */
1362 if (tty->driver->flags & TTY_DRIVER_RESET_TERMIOS) {
1363 /* FIXME: Locking on ->termios array */
1364 tp = tty->termios;
1365 tty->driver->termios[idx] = NULL;
1366 kfree(tp);
feebed65
AC
1367 }
1368}
1369EXPORT_SYMBOL(tty_free_termios);
1370
1371void tty_shutdown(struct tty_struct *tty)
1372{
8b0a88d5 1373 tty_driver_remove_tty(tty->driver, tty);
feebed65
AC
1374 tty_free_termios(tty);
1375}
1376EXPORT_SYMBOL(tty_shutdown);
1377
af9b897e 1378/**
d5698c28 1379 * release_one_tty - release tty structure memory
9c9f4ded 1380 * @kref: kref of tty we are obliterating
af9b897e
AC
1381 *
1382 * Releases memory associated with a tty structure, and clears out the
1383 * driver table slots. This function is called when a device is no longer
1384 * in use. It also gets called when setup of a device fails.
1385 *
1386 * Locking:
1387 * tty_mutex - sometimes only
1388 * takes the file list lock internally when working on the list
1389 * of ttys that the driver keeps.
b50989dc
AC
1390 *
1391 * This method gets called from a work queue so that the driver private
f278a2f7 1392 * cleanup ops can sleep (needed for USB at least)
1da177e4 1393 */
b50989dc 1394static void release_one_tty(struct work_struct *work)
1da177e4 1395{
b50989dc
AC
1396 struct tty_struct *tty =
1397 container_of(work, struct tty_struct, hangup_work);
6f967f78 1398 struct tty_driver *driver = tty->driver;
d5698c28 1399
f278a2f7
DY
1400 if (tty->ops->cleanup)
1401 tty->ops->cleanup(tty);
1402
1da177e4 1403 tty->magic = 0;
7d7b93c1 1404 tty_driver_kref_put(driver);
6f967f78 1405 module_put(driver->owner);
d5698c28 1406
1da177e4
LT
1407 file_list_lock();
1408 list_del_init(&tty->tty_files);
1409 file_list_unlock();
d5698c28 1410
1da177e4
LT
1411 free_tty_struct(tty);
1412}
1413
b50989dc
AC
1414static void queue_release_one_tty(struct kref *kref)
1415{
1416 struct tty_struct *tty = container_of(kref, struct tty_struct, kref);
f278a2f7
DY
1417
1418 if (tty->ops->shutdown)
1419 tty->ops->shutdown(tty);
1420 else
1421 tty_shutdown(tty);
1422
b50989dc
AC
1423 /* The hangup queue is now free so we can reuse it rather than
1424 waste a chunk of memory for each port */
1425 INIT_WORK(&tty->hangup_work, release_one_tty);
1426 schedule_work(&tty->hangup_work);
1427}
1428
9c9f4ded
AC
1429/**
1430 * tty_kref_put - release a tty kref
1431 * @tty: tty device
1432 *
1433 * Release a reference to a tty device and if need be let the kref
1434 * layer destruct the object for us
1435 */
1436
1437void tty_kref_put(struct tty_struct *tty)
1438{
1439 if (tty)
b50989dc 1440 kref_put(&tty->kref, queue_release_one_tty);
9c9f4ded
AC
1441}
1442EXPORT_SYMBOL(tty_kref_put);
1443
d5698c28
CH
1444/**
1445 * release_tty - release tty structure memory
1446 *
1447 * Release both @tty and a possible linked partner (think pty pair),
1448 * and decrement the refcount of the backing module.
1449 *
1450 * Locking:
1451 * tty_mutex - sometimes only
1452 * takes the file list lock internally when working on the list
1453 * of ttys that the driver keeps.
1454 * FIXME: should we require tty_mutex is held here ??
9c9f4ded 1455 *
d5698c28
CH
1456 */
1457static void release_tty(struct tty_struct *tty, int idx)
1458{
9c9f4ded
AC
1459 /* This should always be true but check for the moment */
1460 WARN_ON(tty->index != idx);
1461
d5698c28 1462 if (tty->link)
9c9f4ded
AC
1463 tty_kref_put(tty->link);
1464 tty_kref_put(tty);
d5698c28
CH
1465}
1466
1da177e4
LT
1467/*
1468 * Even releasing the tty structures is a tricky business.. We have
1469 * to be very careful that the structures are all released at the
1470 * same time, as interrupts might otherwise get the wrong pointers.
1471 *
1472 * WSH 09/09/97: rewritten to avoid some nasty race conditions that could
1473 * lead to double frees or releasing memory still in use.
1474 */
d81ed103 1475void tty_release_dev(struct file *filp)
1da177e4
LT
1476{
1477 struct tty_struct *tty, *o_tty;
1478 int pty_master, tty_closing, o_tty_closing, do_sleep;
14a6283e 1479 int devpts;
1da177e4
LT
1480 int idx;
1481 char buf[64];
15f1a633 1482 struct inode *inode;
37bdfb07 1483
15f1a633 1484 inode = filp->f_path.dentry->d_inode;
1da177e4 1485 tty = (struct tty_struct *)filp->private_data;
15f1a633 1486 if (tty_paranoia_check(tty, inode, "tty_release_dev"))
1da177e4
LT
1487 return;
1488
d81ed103 1489 check_tty_count(tty, "tty_release_dev");
1da177e4
LT
1490
1491 tty_fasync(-1, filp, 0);
1492
1493 idx = tty->index;
1494 pty_master = (tty->driver->type == TTY_DRIVER_TYPE_PTY &&
1495 tty->driver->subtype == PTY_TYPE_MASTER);
1496 devpts = (tty->driver->flags & TTY_DRIVER_DEVPTS_MEM) != 0;
1da177e4
LT
1497 o_tty = tty->link;
1498
1499#ifdef TTY_PARANOIA_CHECK
1500 if (idx < 0 || idx >= tty->driver->num) {
d81ed103 1501 printk(KERN_DEBUG "tty_release_dev: bad idx when trying to "
1da177e4
LT
1502 "free (%s)\n", tty->name);
1503 return;
1504 }
8b0a88d5 1505 if (!devpts) {
1da177e4 1506 if (tty != tty->driver->ttys[idx]) {
d81ed103 1507 printk(KERN_DEBUG "tty_release_dev: driver.table[%d] not tty "
1da177e4
LT
1508 "for (%s)\n", idx, tty->name);
1509 return;
1510 }
1511 if (tty->termios != tty->driver->termios[idx]) {
d81ed103 1512 printk(KERN_DEBUG "tty_release_dev: driver.termios[%d] not termios "
1da177e4
LT
1513 "for (%s)\n",
1514 idx, tty->name);
1515 return;
1516 }
1da177e4
LT
1517 }
1518#endif
1519
1520#ifdef TTY_DEBUG_HANGUP
d81ed103 1521 printk(KERN_DEBUG "tty_release_dev of %s (tty count=%d)...",
1da177e4
LT
1522 tty_name(tty, buf), tty->count);
1523#endif
1524
1525#ifdef TTY_PARANOIA_CHECK
1526 if (tty->driver->other &&
1527 !(tty->driver->flags & TTY_DRIVER_DEVPTS_MEM)) {
1528 if (o_tty != tty->driver->other->ttys[idx]) {
d81ed103 1529 printk(KERN_DEBUG "tty_release_dev: other->table[%d] "
1da177e4
LT
1530 "not o_tty for (%s)\n",
1531 idx, tty->name);
1532 return;
1533 }
1534 if (o_tty->termios != tty->driver->other->termios[idx]) {
d81ed103 1535 printk(KERN_DEBUG "tty_release_dev: other->termios[%d] "
1da177e4
LT
1536 "not o_termios for (%s)\n",
1537 idx, tty->name);
1538 return;
1539 }
1da177e4 1540 if (o_tty->link != tty) {
d81ed103 1541 printk(KERN_DEBUG "tty_release_dev: bad pty pointers\n");
1da177e4
LT
1542 return;
1543 }
1544 }
1545#endif
f34d7a5b
AC
1546 if (tty->ops->close)
1547 tty->ops->close(tty, filp);
1da177e4
LT
1548
1549 /*
1550 * Sanity check: if tty->count is going to zero, there shouldn't be
1551 * any waiters on tty->read_wait or tty->write_wait. We test the
1552 * wait queues and kick everyone out _before_ actually starting to
1553 * close. This ensures that we won't block while releasing the tty
1554 * structure.
1555 *
1556 * The test for the o_tty closing is necessary, since the master and
1557 * slave sides may close in any order. If the slave side closes out
1558 * first, its count will be one, since the master side holds an open.
1559 * Thus this test wouldn't be triggered at the time the slave closes,
1560 * so we do it now.
1561 *
1562 * Note that it's possible for the tty to be opened again while we're
1563 * flushing out waiters. By recalculating the closing flags before
1564 * each iteration we avoid any problems.
1565 */
1566 while (1) {
1567 /* Guard against races with tty->count changes elsewhere and
1568 opens on /dev/tty */
37bdfb07 1569
70522e12 1570 mutex_lock(&tty_mutex);
1da177e4
LT
1571 tty_closing = tty->count <= 1;
1572 o_tty_closing = o_tty &&
1573 (o_tty->count <= (pty_master ? 1 : 0));
1da177e4
LT
1574 do_sleep = 0;
1575
1576 if (tty_closing) {
1577 if (waitqueue_active(&tty->read_wait)) {
4b19449d 1578 wake_up_poll(&tty->read_wait, POLLIN);
1da177e4
LT
1579 do_sleep++;
1580 }
1581 if (waitqueue_active(&tty->write_wait)) {
4b19449d 1582 wake_up_poll(&tty->write_wait, POLLOUT);
1da177e4
LT
1583 do_sleep++;
1584 }
1585 }
1586 if (o_tty_closing) {
1587 if (waitqueue_active(&o_tty->read_wait)) {
4b19449d 1588 wake_up_poll(&o_tty->read_wait, POLLIN);
1da177e4
LT
1589 do_sleep++;
1590 }
1591 if (waitqueue_active(&o_tty->write_wait)) {
4b19449d 1592 wake_up_poll(&o_tty->write_wait, POLLOUT);
1da177e4
LT
1593 do_sleep++;
1594 }
1595 }
1596 if (!do_sleep)
1597 break;
1598
d81ed103 1599 printk(KERN_WARNING "tty_release_dev: %s: read/write wait queue "
1da177e4 1600 "active!\n", tty_name(tty, buf));
70522e12 1601 mutex_unlock(&tty_mutex);
1da177e4 1602 schedule();
37bdfb07 1603 }
1da177e4
LT
1604
1605 /*
37bdfb07
AC
1606 * The closing flags are now consistent with the open counts on
1607 * both sides, and we've completed the last operation that could
1da177e4
LT
1608 * block, so it's safe to proceed with closing.
1609 */
1da177e4
LT
1610 if (pty_master) {
1611 if (--o_tty->count < 0) {
d81ed103 1612 printk(KERN_WARNING "tty_release_dev: bad pty slave count "
1da177e4
LT
1613 "(%d) for %s\n",
1614 o_tty->count, tty_name(o_tty, buf));
1615 o_tty->count = 0;
1616 }
1617 }
1618 if (--tty->count < 0) {
d81ed103 1619 printk(KERN_WARNING "tty_release_dev: bad tty->count (%d) for %s\n",
1da177e4
LT
1620 tty->count, tty_name(tty, buf));
1621 tty->count = 0;
1622 }
37bdfb07 1623
1da177e4
LT
1624 /*
1625 * We've decremented tty->count, so we need to remove this file
1626 * descriptor off the tty->tty_files list; this serves two
1627 * purposes:
1628 * - check_tty_count sees the correct number of file descriptors
1629 * associated with this tty.
1630 * - do_tty_hangup no longer sees this file descriptor as
1631 * something that needs to be handled for hangups.
1632 */
1633 file_kill(filp);
1634 filp->private_data = NULL;
1635
1636 /*
1637 * Perform some housekeeping before deciding whether to return.
1638 *
1639 * Set the TTY_CLOSING flag if this was the last open. In the
1640 * case of a pty we may have to wait around for the other side
1641 * to close, and TTY_CLOSING makes sure we can't be reopened.
1642 */
37bdfb07 1643 if (tty_closing)
1da177e4 1644 set_bit(TTY_CLOSING, &tty->flags);
37bdfb07 1645 if (o_tty_closing)
1da177e4
LT
1646 set_bit(TTY_CLOSING, &o_tty->flags);
1647
1648 /*
1649 * If _either_ side is closing, make sure there aren't any
1650 * processes that still think tty or o_tty is their controlling
1651 * tty.
1652 */
1653 if (tty_closing || o_tty_closing) {
1da177e4 1654 read_lock(&tasklist_lock);
24ec839c 1655 session_clear_tty(tty->session);
1da177e4 1656 if (o_tty)
24ec839c 1657 session_clear_tty(o_tty->session);
1da177e4
LT
1658 read_unlock(&tasklist_lock);
1659 }
1660
70522e12 1661 mutex_unlock(&tty_mutex);
da965822 1662
1da177e4
LT
1663 /* check whether both sides are closing ... */
1664 if (!tty_closing || (o_tty && !o_tty_closing))
1665 return;
37bdfb07 1666
1da177e4
LT
1667#ifdef TTY_DEBUG_HANGUP
1668 printk(KERN_DEBUG "freeing tty structure...");
1669#endif
1670 /*
01e1abb2 1671 * Ask the line discipline code to release its structures
1da177e4 1672 */
01e1abb2 1673 tty_ldisc_release(tty, o_tty);
1da177e4 1674 /*
d5698c28 1675 * The release_tty function takes care of the details of clearing
1da177e4
LT
1676 * the slots and preserving the termios structure.
1677 */
d5698c28 1678 release_tty(tty, idx);
1da177e4 1679
1da177e4 1680 /* Make this pty number available for reallocation */
718a9163 1681 if (devpts)
15f1a633 1682 devpts_kill_index(inode, idx);
1da177e4
LT
1683}
1684
af9b897e 1685/**
15582d36 1686 * __tty_open - open a tty device
af9b897e
AC
1687 * @inode: inode of device file
1688 * @filp: file pointer to tty
1da177e4 1689 *
af9b897e
AC
1690 * tty_open and tty_release keep up the tty count that contains the
1691 * number of opens done on a tty. We cannot use the inode-count, as
1692 * different inodes might point to the same tty.
1da177e4 1693 *
af9b897e
AC
1694 * Open-counting is needed for pty masters, as well as for keeping
1695 * track of serial lines: DTR is dropped when the last close happens.
1696 * (This is not done solely through tty->count, now. - Ted 1/27/92)
1697 *
1698 * The termios state of a pty is reset on first open so that
1699 * settings don't persist across reuse.
1700 *
d81ed103 1701 * Locking: tty_mutex protects tty, get_tty_driver and tty_init_dev work.
24ec839c
PZ
1702 * tty->count should protect the rest.
1703 * ->siglock protects ->signal/->sighand
1da177e4 1704 */
af9b897e 1705
39d95b9d 1706static int __tty_open(struct inode *inode, struct file *filp)
1da177e4 1707{
4a2b5fdd 1708 struct tty_struct *tty = NULL;
1da177e4
LT
1709 int noctty, retval;
1710 struct tty_driver *driver;
1711 int index;
1712 dev_t device = inode->i_rdev;
846c151a 1713 unsigned saved_flags = filp->f_flags;
1da177e4
LT
1714
1715 nonseekable_open(inode, filp);
37bdfb07 1716
1da177e4
LT
1717retry_open:
1718 noctty = filp->f_flags & O_NOCTTY;
1719 index = -1;
1720 retval = 0;
37bdfb07 1721
70522e12 1722 mutex_lock(&tty_mutex);
1da177e4 1723
37bdfb07 1724 if (device == MKDEV(TTYAUX_MAJOR, 0)) {
24ec839c
PZ
1725 tty = get_current_tty();
1726 if (!tty) {
70522e12 1727 mutex_unlock(&tty_mutex);
1da177e4
LT
1728 return -ENXIO;
1729 }
7d7b93c1 1730 driver = tty_driver_kref_get(tty->driver);
24ec839c 1731 index = tty->index;
1da177e4
LT
1732 filp->f_flags |= O_NONBLOCK; /* Don't let /dev/tty block */
1733 /* noctty = 1; */
452a00d2
AC
1734 /* FIXME: Should we take a driver reference ? */
1735 tty_kref_put(tty);
1da177e4
LT
1736 goto got_driver;
1737 }
1738#ifdef CONFIG_VT
37bdfb07 1739 if (device == MKDEV(TTY_MAJOR, 0)) {
1da177e4 1740 extern struct tty_driver *console_driver;
7d7b93c1 1741 driver = tty_driver_kref_get(console_driver);
1da177e4
LT
1742 index = fg_console;
1743 noctty = 1;
1744 goto got_driver;
1745 }
1746#endif
37bdfb07 1747 if (device == MKDEV(TTYAUX_MAJOR, 1)) {
296fa7f6
WN
1748 struct tty_driver *console_driver = console_device(&index);
1749 if (console_driver) {
1750 driver = tty_driver_kref_get(console_driver);
1751 if (driver) {
1752 /* Don't let /dev/console block */
1753 filp->f_flags |= O_NONBLOCK;
1754 noctty = 1;
1755 goto got_driver;
1756 }
1da177e4 1757 }
70522e12 1758 mutex_unlock(&tty_mutex);
1da177e4
LT
1759 return -ENODEV;
1760 }
1761
1762 driver = get_tty_driver(device, &index);
1763 if (!driver) {
70522e12 1764 mutex_unlock(&tty_mutex);
1da177e4
LT
1765 return -ENODEV;
1766 }
1767got_driver:
4a2b5fdd
SB
1768 if (!tty) {
1769 /* check whether we're reopening an existing tty */
15f1a633 1770 tty = tty_driver_lookup_tty(driver, inode, index);
4a2b5fdd 1771
808ffa3d
EP
1772 if (IS_ERR(tty)) {
1773 mutex_unlock(&tty_mutex);
4a2b5fdd 1774 return PTR_ERR(tty);
808ffa3d 1775 }
4a2b5fdd
SB
1776 }
1777
1778 if (tty) {
1779 retval = tty_reopen(tty);
1780 if (retval)
1781 tty = ERR_PTR(retval);
1782 } else
1783 tty = tty_init_dev(driver, index, 0);
1784
70522e12 1785 mutex_unlock(&tty_mutex);
7d7b93c1 1786 tty_driver_kref_put(driver);
73ec06fc
AC
1787 if (IS_ERR(tty))
1788 return PTR_ERR(tty);
1da177e4
LT
1789
1790 filp->private_data = tty;
1791 file_move(filp, &tty->tty_files);
1792 check_tty_count(tty, "tty_open");
1793 if (tty->driver->type == TTY_DRIVER_TYPE_PTY &&
1794 tty->driver->subtype == PTY_TYPE_MASTER)
1795 noctty = 1;
1796#ifdef TTY_DEBUG_HANGUP
1797 printk(KERN_DEBUG "opening %s...", tty->name);
1798#endif
1799 if (!retval) {
f34d7a5b
AC
1800 if (tty->ops->open)
1801 retval = tty->ops->open(tty, filp);
1da177e4
LT
1802 else
1803 retval = -ENODEV;
1804 }
1805 filp->f_flags = saved_flags;
1806
37bdfb07
AC
1807 if (!retval && test_bit(TTY_EXCLUSIVE, &tty->flags) &&
1808 !capable(CAP_SYS_ADMIN))
1da177e4
LT
1809 retval = -EBUSY;
1810
1811 if (retval) {
1812#ifdef TTY_DEBUG_HANGUP
1813 printk(KERN_DEBUG "error %d in opening %s...", retval,
1814 tty->name);
1815#endif
d81ed103 1816 tty_release_dev(filp);
1da177e4
LT
1817 if (retval != -ERESTARTSYS)
1818 return retval;
1819 if (signal_pending(current))
1820 return retval;
1821 schedule();
1822 /*
1823 * Need to reset f_op in case a hangup happened.
1824 */
1825 if (filp->f_op == &hung_up_tty_fops)
1826 filp->f_op = &tty_fops;
1827 goto retry_open;
1828 }
24ec839c
PZ
1829
1830 mutex_lock(&tty_mutex);
1831 spin_lock_irq(&current->sighand->siglock);
1da177e4
LT
1832 if (!noctty &&
1833 current->signal->leader &&
1834 !current->signal->tty &&
ab521dc0 1835 tty->session == NULL)
2a65f1d9 1836 __proc_set_tty(current, tty);
24ec839c
PZ
1837 spin_unlock_irq(&current->sighand->siglock);
1838 mutex_unlock(&tty_mutex);
1da177e4
LT
1839 return 0;
1840}
1841
39d95b9d
JC
1842/* BKL pushdown: scary code avoidance wrapper */
1843static int tty_open(struct inode *inode, struct file *filp)
1844{
1845 int ret;
1846
1847 lock_kernel();
1848 ret = __tty_open(inode, filp);
1849 unlock_kernel();
1850 return ret;
1851}
1852
1853
1854
1da177e4 1855
af9b897e
AC
1856/**
1857 * tty_release - vfs callback for close
1858 * @inode: inode of tty
1859 * @filp: file pointer for handle to tty
1860 *
1861 * Called the last time each file handle is closed that references
1862 * this tty. There may however be several such references.
1863 *
1864 * Locking:
d81ed103 1865 * Takes bkl. See tty_release_dev
af9b897e
AC
1866 */
1867
37bdfb07 1868static int tty_release(struct inode *inode, struct file *filp)
1da177e4
LT
1869{
1870 lock_kernel();
d81ed103 1871 tty_release_dev(filp);
1da177e4
LT
1872 unlock_kernel();
1873 return 0;
1874}
1875
af9b897e
AC
1876/**
1877 * tty_poll - check tty status
1878 * @filp: file being polled
1879 * @wait: poll wait structures to update
1880 *
1881 * Call the line discipline polling method to obtain the poll
1882 * status of the device.
1883 *
1884 * Locking: locks called line discipline but ldisc poll method
1885 * may be re-entered freely by other callers.
1886 */
1887
37bdfb07 1888static unsigned int tty_poll(struct file *filp, poll_table *wait)
1da177e4 1889{
37bdfb07 1890 struct tty_struct *tty;
1da177e4
LT
1891 struct tty_ldisc *ld;
1892 int ret = 0;
1893
1894 tty = (struct tty_struct *)filp->private_data;
a7113a96 1895 if (tty_paranoia_check(tty, filp->f_path.dentry->d_inode, "tty_poll"))
1da177e4 1896 return 0;
37bdfb07 1897
1da177e4 1898 ld = tty_ldisc_ref_wait(tty);
a352def2
AC
1899 if (ld->ops->poll)
1900 ret = (ld->ops->poll)(tty, filp, wait);
1da177e4
LT
1901 tty_ldisc_deref(ld);
1902 return ret;
1903}
1904
37bdfb07 1905static int tty_fasync(int fd, struct file *filp, int on)
1da177e4 1906{
37bdfb07 1907 struct tty_struct *tty;
47f86834 1908 unsigned long flags;
5d1e3230 1909 int retval = 0;
1da177e4 1910
5d1e3230 1911 lock_kernel();
1da177e4 1912 tty = (struct tty_struct *)filp->private_data;
a7113a96 1913 if (tty_paranoia_check(tty, filp->f_path.dentry->d_inode, "tty_fasync"))
5d1e3230 1914 goto out;
37bdfb07 1915
1da177e4
LT
1916 retval = fasync_helper(fd, filp, on, &tty->fasync);
1917 if (retval <= 0)
5d1e3230 1918 goto out;
1da177e4
LT
1919
1920 if (on) {
ab521dc0
EB
1921 enum pid_type type;
1922 struct pid *pid;
1da177e4
LT
1923 if (!waitqueue_active(&tty->read_wait))
1924 tty->minimum_to_wake = 1;
47f86834 1925 spin_lock_irqsave(&tty->ctrl_lock, flags);
ab521dc0
EB
1926 if (tty->pgrp) {
1927 pid = tty->pgrp;
1928 type = PIDTYPE_PGID;
1929 } else {
1930 pid = task_pid(current);
1931 type = PIDTYPE_PID;
1932 }
47f86834 1933 spin_unlock_irqrestore(&tty->ctrl_lock, flags);
ab521dc0 1934 retval = __f_setown(filp, pid, type, 0);
1da177e4 1935 if (retval)
5d1e3230 1936 goto out;
1da177e4
LT
1937 } else {
1938 if (!tty->fasync && !waitqueue_active(&tty->read_wait))
1939 tty->minimum_to_wake = N_TTY_BUF_SIZE;
1940 }
5d1e3230
JC
1941 retval = 0;
1942out:
1943 unlock_kernel();
1944 return retval;
1da177e4
LT
1945}
1946
af9b897e
AC
1947/**
1948 * tiocsti - fake input character
1949 * @tty: tty to fake input into
1950 * @p: pointer to character
1951 *
3a4fa0a2 1952 * Fake input to a tty device. Does the necessary locking and
af9b897e
AC
1953 * input management.
1954 *
1955 * FIXME: does not honour flow control ??
1956 *
1957 * Locking:
1958 * Called functions take tty_ldisc_lock
1959 * current->signal->tty check is safe without locks
28298232
AC
1960 *
1961 * FIXME: may race normal receive processing
af9b897e
AC
1962 */
1963
1da177e4
LT
1964static int tiocsti(struct tty_struct *tty, char __user *p)
1965{
1966 char ch, mbz = 0;
1967 struct tty_ldisc *ld;
37bdfb07 1968
1da177e4
LT
1969 if ((current->signal->tty != tty) && !capable(CAP_SYS_ADMIN))
1970 return -EPERM;
1971 if (get_user(ch, p))
1972 return -EFAULT;
1e641743 1973 tty_audit_tiocsti(tty, ch);
1da177e4 1974 ld = tty_ldisc_ref_wait(tty);
a352def2 1975 ld->ops->receive_buf(tty, &ch, &mbz, 1);
1da177e4
LT
1976 tty_ldisc_deref(ld);
1977 return 0;
1978}
1979
af9b897e
AC
1980/**
1981 * tiocgwinsz - implement window query ioctl
1982 * @tty; tty
1983 * @arg: user buffer for result
1984 *
808a0d38 1985 * Copies the kernel idea of the window size into the user buffer.
af9b897e 1986 *
24ec839c 1987 * Locking: tty->termios_mutex is taken to ensure the winsize data
808a0d38 1988 * is consistent.
af9b897e
AC
1989 */
1990
37bdfb07 1991static int tiocgwinsz(struct tty_struct *tty, struct winsize __user *arg)
1da177e4 1992{
808a0d38
AC
1993 int err;
1994
5785c95b 1995 mutex_lock(&tty->termios_mutex);
808a0d38 1996 err = copy_to_user(arg, &tty->winsize, sizeof(*arg));
5785c95b 1997 mutex_unlock(&tty->termios_mutex);
808a0d38
AC
1998
1999 return err ? -EFAULT: 0;
1da177e4
LT
2000}
2001
af9b897e 2002/**
8c9a9dd0
AC
2003 * tty_do_resize - resize event
2004 * @tty: tty being resized
8c9a9dd0
AC
2005 * @rows: rows (character)
2006 * @cols: cols (character)
2007 *
2008 * Update the termios variables and send the neccessary signals to
2009 * peform a terminal resize correctly
af9b897e
AC
2010 */
2011
fc6f6238 2012int tty_do_resize(struct tty_struct *tty, struct winsize *ws)
1da177e4 2013{
fc6f6238 2014 struct pid *pgrp;
47f86834 2015 unsigned long flags;
1da177e4 2016
fc6f6238
AC
2017 /* Lock the tty */
2018 mutex_lock(&tty->termios_mutex);
2019 if (!memcmp(ws, &tty->winsize, sizeof(*ws)))
ca9bda00 2020 goto done;
47f86834
AC
2021 /* Get the PID values and reference them so we can
2022 avoid holding the tty ctrl lock while sending signals */
2023 spin_lock_irqsave(&tty->ctrl_lock, flags);
2024 pgrp = get_pid(tty->pgrp);
47f86834
AC
2025 spin_unlock_irqrestore(&tty->ctrl_lock, flags);
2026
2027 if (pgrp)
2028 kill_pgrp(pgrp, SIGWINCH, 1);
47f86834 2029 put_pid(pgrp);
47f86834 2030
8c9a9dd0 2031 tty->winsize = *ws;
ca9bda00 2032done:
fc6f6238 2033 mutex_unlock(&tty->termios_mutex);
1da177e4
LT
2034 return 0;
2035}
2036
8c9a9dd0
AC
2037/**
2038 * tiocswinsz - implement window size set ioctl
fc6f6238 2039 * @tty; tty side of tty
8c9a9dd0
AC
2040 * @arg: user buffer for result
2041 *
2042 * Copies the user idea of the window size to the kernel. Traditionally
2043 * this is just advisory information but for the Linux console it
2044 * actually has driver level meaning and triggers a VC resize.
2045 *
2046 * Locking:
2047 * Driver dependant. The default do_resize method takes the
2048 * tty termios mutex and ctrl_lock. The console takes its own lock
2049 * then calls into the default method.
2050 */
2051
fc6f6238 2052static int tiocswinsz(struct tty_struct *tty, struct winsize __user *arg)
8c9a9dd0
AC
2053{
2054 struct winsize tmp_ws;
2055 if (copy_from_user(&tmp_ws, arg, sizeof(*arg)))
2056 return -EFAULT;
2057
2058 if (tty->ops->resize)
fc6f6238 2059 return tty->ops->resize(tty, &tmp_ws);
8c9a9dd0 2060 else
fc6f6238 2061 return tty_do_resize(tty, &tmp_ws);
8c9a9dd0
AC
2062}
2063
af9b897e
AC
2064/**
2065 * tioccons - allow admin to move logical console
2066 * @file: the file to become console
2067 *
2068 * Allow the adminstrator to move the redirected console device
2069 *
2070 * Locking: uses redirect_lock to guard the redirect information
2071 */
2072
1da177e4
LT
2073static int tioccons(struct file *file)
2074{
2075 if (!capable(CAP_SYS_ADMIN))
2076 return -EPERM;
2077 if (file->f_op->write == redirected_tty_write) {
2078 struct file *f;
2079 spin_lock(&redirect_lock);
2080 f = redirect;
2081 redirect = NULL;
2082 spin_unlock(&redirect_lock);
2083 if (f)
2084 fput(f);
2085 return 0;
2086 }
2087 spin_lock(&redirect_lock);
2088 if (redirect) {
2089 spin_unlock(&redirect_lock);
2090 return -EBUSY;
2091 }
2092 get_file(file);
2093 redirect = file;
2094 spin_unlock(&redirect_lock);
2095 return 0;
2096}
2097
af9b897e
AC
2098/**
2099 * fionbio - non blocking ioctl
2100 * @file: file to set blocking value
2101 * @p: user parameter
2102 *
2103 * Historical tty interfaces had a blocking control ioctl before
2104 * the generic functionality existed. This piece of history is preserved
2105 * in the expected tty API of posix OS's.
2106 *
6146b9af 2107 * Locking: none, the open file handle ensures it won't go away.
af9b897e 2108 */
1da177e4
LT
2109
2110static int fionbio(struct file *file, int __user *p)
2111{
2112 int nonblock;
2113
2114 if (get_user(nonblock, p))
2115 return -EFAULT;
2116
db1dd4d3 2117 spin_lock(&file->f_lock);
1da177e4
LT
2118 if (nonblock)
2119 file->f_flags |= O_NONBLOCK;
2120 else
2121 file->f_flags &= ~O_NONBLOCK;
db1dd4d3 2122 spin_unlock(&file->f_lock);
1da177e4
LT
2123 return 0;
2124}
2125
af9b897e
AC
2126/**
2127 * tiocsctty - set controlling tty
2128 * @tty: tty structure
2129 * @arg: user argument
2130 *
2131 * This ioctl is used to manage job control. It permits a session
2132 * leader to set this tty as the controlling tty for the session.
2133 *
2134 * Locking:
28298232 2135 * Takes tty_mutex() to protect tty instance
24ec839c
PZ
2136 * Takes tasklist_lock internally to walk sessions
2137 * Takes ->siglock() when updating signal->tty
af9b897e
AC
2138 */
2139
1da177e4
LT
2140static int tiocsctty(struct tty_struct *tty, int arg)
2141{
24ec839c 2142 int ret = 0;
ab521dc0 2143 if (current->signal->leader && (task_session(current) == tty->session))
24ec839c
PZ
2144 return ret;
2145
2146 mutex_lock(&tty_mutex);
1da177e4
LT
2147 /*
2148 * The process must be a session leader and
2149 * not have a controlling tty already.
2150 */
24ec839c
PZ
2151 if (!current->signal->leader || current->signal->tty) {
2152 ret = -EPERM;
2153 goto unlock;
2154 }
2155
ab521dc0 2156 if (tty->session) {
1da177e4
LT
2157 /*
2158 * This tty is already the controlling
2159 * tty for another session group!
2160 */
37bdfb07 2161 if (arg == 1 && capable(CAP_SYS_ADMIN)) {
1da177e4
LT
2162 /*
2163 * Steal it away
2164 */
1da177e4 2165 read_lock(&tasklist_lock);
24ec839c 2166 session_clear_tty(tty->session);
1da177e4 2167 read_unlock(&tasklist_lock);
24ec839c
PZ
2168 } else {
2169 ret = -EPERM;
2170 goto unlock;
2171 }
1da177e4 2172 }
24ec839c
PZ
2173 proc_set_tty(current, tty);
2174unlock:
28298232 2175 mutex_unlock(&tty_mutex);
24ec839c 2176 return ret;
1da177e4
LT
2177}
2178
5d0fdf1e
AC
2179/**
2180 * tty_get_pgrp - return a ref counted pgrp pid
2181 * @tty: tty to read
2182 *
2183 * Returns a refcounted instance of the pid struct for the process
2184 * group controlling the tty.
2185 */
2186
2187struct pid *tty_get_pgrp(struct tty_struct *tty)
2188{
2189 unsigned long flags;
2190 struct pid *pgrp;
2191
2192 spin_lock_irqsave(&tty->ctrl_lock, flags);
2193 pgrp = get_pid(tty->pgrp);
2194 spin_unlock_irqrestore(&tty->ctrl_lock, flags);
2195
2196 return pgrp;
2197}
2198EXPORT_SYMBOL_GPL(tty_get_pgrp);
2199
af9b897e
AC
2200/**
2201 * tiocgpgrp - get process group
2202 * @tty: tty passed by user
2203 * @real_tty: tty side of the tty pased by the user if a pty else the tty
2204 * @p: returned pid
2205 *
2206 * Obtain the process group of the tty. If there is no process group
2207 * return an error.
2208 *
24ec839c 2209 * Locking: none. Reference to current->signal->tty is safe.
af9b897e
AC
2210 */
2211
1da177e4
LT
2212static int tiocgpgrp(struct tty_struct *tty, struct tty_struct *real_tty, pid_t __user *p)
2213{
5d0fdf1e
AC
2214 struct pid *pid;
2215 int ret;
1da177e4
LT
2216 /*
2217 * (tty == real_tty) is a cheap way of
2218 * testing if the tty is NOT a master pty.
2219 */
2220 if (tty == real_tty && current->signal->tty != real_tty)
2221 return -ENOTTY;
5d0fdf1e
AC
2222 pid = tty_get_pgrp(real_tty);
2223 ret = put_user(pid_vnr(pid), p);
2224 put_pid(pid);
2225 return ret;
1da177e4
LT
2226}
2227
af9b897e
AC
2228/**
2229 * tiocspgrp - attempt to set process group
2230 * @tty: tty passed by user
2231 * @real_tty: tty side device matching tty passed by user
2232 * @p: pid pointer
2233 *
2234 * Set the process group of the tty to the session passed. Only
2235 * permitted where the tty session is our session.
2236 *
47f86834 2237 * Locking: RCU, ctrl lock
af9b897e
AC
2238 */
2239
1da177e4
LT
2240static int tiocspgrp(struct tty_struct *tty, struct tty_struct *real_tty, pid_t __user *p)
2241{
04a2e6a5
EB
2242 struct pid *pgrp;
2243 pid_t pgrp_nr;
1da177e4 2244 int retval = tty_check_change(real_tty);
47f86834 2245 unsigned long flags;
1da177e4
LT
2246
2247 if (retval == -EIO)
2248 return -ENOTTY;
2249 if (retval)
2250 return retval;
2251 if (!current->signal->tty ||
2252 (current->signal->tty != real_tty) ||
ab521dc0 2253 (real_tty->session != task_session(current)))
1da177e4 2254 return -ENOTTY;
04a2e6a5 2255 if (get_user(pgrp_nr, p))
1da177e4 2256 return -EFAULT;
04a2e6a5 2257 if (pgrp_nr < 0)
1da177e4 2258 return -EINVAL;
04a2e6a5 2259 rcu_read_lock();
b488893a 2260 pgrp = find_vpid(pgrp_nr);
04a2e6a5
EB
2261 retval = -ESRCH;
2262 if (!pgrp)
2263 goto out_unlock;
2264 retval = -EPERM;
2265 if (session_of_pgrp(pgrp) != task_session(current))
2266 goto out_unlock;
2267 retval = 0;
47f86834 2268 spin_lock_irqsave(&tty->ctrl_lock, flags);
ab521dc0
EB
2269 put_pid(real_tty->pgrp);
2270 real_tty->pgrp = get_pid(pgrp);
47f86834 2271 spin_unlock_irqrestore(&tty->ctrl_lock, flags);
04a2e6a5
EB
2272out_unlock:
2273 rcu_read_unlock();
2274 return retval;
1da177e4
LT
2275}
2276
af9b897e
AC
2277/**
2278 * tiocgsid - get session id
2279 * @tty: tty passed by user
2280 * @real_tty: tty side of the tty pased by the user if a pty else the tty
2281 * @p: pointer to returned session id
2282 *
2283 * Obtain the session id of the tty. If there is no session
2284 * return an error.
2285 *
24ec839c 2286 * Locking: none. Reference to current->signal->tty is safe.
af9b897e
AC
2287 */
2288
1da177e4
LT
2289static int tiocgsid(struct tty_struct *tty, struct tty_struct *real_tty, pid_t __user *p)
2290{
2291 /*
2292 * (tty == real_tty) is a cheap way of
2293 * testing if the tty is NOT a master pty.
2294 */
2295 if (tty == real_tty && current->signal->tty != real_tty)
2296 return -ENOTTY;
ab521dc0 2297 if (!real_tty->session)
1da177e4 2298 return -ENOTTY;
b488893a 2299 return put_user(pid_vnr(real_tty->session), p);
1da177e4
LT
2300}
2301
af9b897e
AC
2302/**
2303 * tiocsetd - set line discipline
2304 * @tty: tty device
2305 * @p: pointer to user data
2306 *
2307 * Set the line discipline according to user request.
2308 *
2309 * Locking: see tty_set_ldisc, this function is just a helper
2310 */
2311
1da177e4
LT
2312static int tiocsetd(struct tty_struct *tty, int __user *p)
2313{
2314 int ldisc;
04f378b1 2315 int ret;
1da177e4
LT
2316
2317 if (get_user(ldisc, p))
2318 return -EFAULT;
04f378b1
AC
2319
2320 lock_kernel();
2321 ret = tty_set_ldisc(tty, ldisc);
2322 unlock_kernel();
2323
2324 return ret;
1da177e4
LT
2325}
2326
af9b897e
AC
2327/**
2328 * send_break - performed time break
2329 * @tty: device to break on
2330 * @duration: timeout in mS
2331 *
2332 * Perform a timed break on hardware that lacks its own driver level
2333 * timed break functionality.
2334 *
2335 * Locking:
28298232 2336 * atomic_write_lock serializes
af9b897e 2337 *
af9b897e
AC
2338 */
2339
b20f3ae5 2340static int send_break(struct tty_struct *tty, unsigned int duration)
1da177e4 2341{
9e98966c
AC
2342 int retval;
2343
2344 if (tty->ops->break_ctl == NULL)
2345 return 0;
2346
2347 if (tty->driver->flags & TTY_DRIVER_HARDWARE_BREAK)
2348 retval = tty->ops->break_ctl(tty, duration);
2349 else {
2350 /* Do the work ourselves */
2351 if (tty_write_lock(tty, 0) < 0)
2352 return -EINTR;
2353 retval = tty->ops->break_ctl(tty, -1);
2354 if (retval)
2355 goto out;
2356 if (!signal_pending(current))
2357 msleep_interruptible(duration);
2358 retval = tty->ops->break_ctl(tty, 0);
2359out:
2360 tty_write_unlock(tty);
2361 if (signal_pending(current))
2362 retval = -EINTR;
2363 }
2364 return retval;
1da177e4
LT
2365}
2366
af9b897e 2367/**
f34d7a5b 2368 * tty_tiocmget - get modem status
af9b897e
AC
2369 * @tty: tty device
2370 * @file: user file pointer
2371 * @p: pointer to result
2372 *
2373 * Obtain the modem status bits from the tty driver if the feature
2374 * is supported. Return -EINVAL if it is not available.
2375 *
2376 * Locking: none (up to the driver)
2377 */
2378
2379static int tty_tiocmget(struct tty_struct *tty, struct file *file, int __user *p)
1da177e4
LT
2380{
2381 int retval = -EINVAL;
2382
f34d7a5b
AC
2383 if (tty->ops->tiocmget) {
2384 retval = tty->ops->tiocmget(tty, file);
1da177e4
LT
2385
2386 if (retval >= 0)
2387 retval = put_user(retval, p);
2388 }
2389 return retval;
2390}
2391
af9b897e 2392/**
f34d7a5b 2393 * tty_tiocmset - set modem status
af9b897e
AC
2394 * @tty: tty device
2395 * @file: user file pointer
2396 * @cmd: command - clear bits, set bits or set all
2397 * @p: pointer to desired bits
2398 *
2399 * Set the modem status bits from the tty driver if the feature
2400 * is supported. Return -EINVAL if it is not available.
2401 *
2402 * Locking: none (up to the driver)
2403 */
2404
2405static int tty_tiocmset(struct tty_struct *tty, struct file *file, unsigned int cmd,
1da177e4
LT
2406 unsigned __user *p)
2407{
ae677517
AC
2408 int retval;
2409 unsigned int set, clear, val;
1da177e4 2410
ae677517
AC
2411 if (tty->ops->tiocmset == NULL)
2412 return -EINVAL;
1da177e4 2413
ae677517
AC
2414 retval = get_user(val, p);
2415 if (retval)
2416 return retval;
2417 set = clear = 0;
2418 switch (cmd) {
2419 case TIOCMBIS:
2420 set = val;
2421 break;
2422 case TIOCMBIC:
2423 clear = val;
2424 break;
2425 case TIOCMSET:
2426 set = val;
2427 clear = ~val;
2428 break;
2429 }
2430 set &= TIOCM_DTR|TIOCM_RTS|TIOCM_OUT1|TIOCM_OUT2|TIOCM_LOOP;
2431 clear &= TIOCM_DTR|TIOCM_RTS|TIOCM_OUT1|TIOCM_OUT2|TIOCM_LOOP;
2432 return tty->ops->tiocmset(tty, file, set, clear);
1da177e4
LT
2433}
2434
e8b70e7d
AC
2435struct tty_struct *tty_pair_get_tty(struct tty_struct *tty)
2436{
2437 if (tty->driver->type == TTY_DRIVER_TYPE_PTY &&
2438 tty->driver->subtype == PTY_TYPE_MASTER)
2439 tty = tty->link;
2440 return tty;
2441}
2442EXPORT_SYMBOL(tty_pair_get_tty);
2443
2444struct tty_struct *tty_pair_get_pty(struct tty_struct *tty)
2445{
2446 if (tty->driver->type == TTY_DRIVER_TYPE_PTY &&
2447 tty->driver->subtype == PTY_TYPE_MASTER)
2448 return tty;
2449 return tty->link;
2450}
2451EXPORT_SYMBOL(tty_pair_get_pty);
2452
1da177e4
LT
2453/*
2454 * Split this up, as gcc can choke on it otherwise..
2455 */
04f378b1 2456long tty_ioctl(struct file *file, unsigned int cmd, unsigned long arg)
1da177e4
LT
2457{
2458 struct tty_struct *tty, *real_tty;
2459 void __user *p = (void __user *)arg;
2460 int retval;
2461 struct tty_ldisc *ld;
04f378b1 2462 struct inode *inode = file->f_dentry->d_inode;
37bdfb07 2463
1da177e4
LT
2464 tty = (struct tty_struct *)file->private_data;
2465 if (tty_paranoia_check(tty, inode, "tty_ioctl"))
2466 return -EINVAL;
2467
e8b70e7d 2468 real_tty = tty_pair_get_tty(tty);
1da177e4
LT
2469
2470 /*
2471 * Factor out some common prep work
2472 */
2473 switch (cmd) {
2474 case TIOCSETD:
2475 case TIOCSBRK:
2476 case TIOCCBRK:
2477 case TCSBRK:
37bdfb07 2478 case TCSBRKP:
1da177e4
LT
2479 retval = tty_check_change(tty);
2480 if (retval)
2481 return retval;
2482 if (cmd != TIOCCBRK) {
2483 tty_wait_until_sent(tty, 0);
2484 if (signal_pending(current))
2485 return -EINTR;
2486 }
2487 break;
2488 }
2489
9e98966c
AC
2490 /*
2491 * Now do the stuff.
2492 */
1da177e4 2493 switch (cmd) {
37bdfb07
AC
2494 case TIOCSTI:
2495 return tiocsti(tty, p);
2496 case TIOCGWINSZ:
8f520021 2497 return tiocgwinsz(real_tty, p);
37bdfb07 2498 case TIOCSWINSZ:
fc6f6238 2499 return tiocswinsz(real_tty, p);
37bdfb07
AC
2500 case TIOCCONS:
2501 return real_tty != tty ? -EINVAL : tioccons(file);
2502 case FIONBIO:
2503 return fionbio(file, p);
2504 case TIOCEXCL:
2505 set_bit(TTY_EXCLUSIVE, &tty->flags);
2506 return 0;
2507 case TIOCNXCL:
2508 clear_bit(TTY_EXCLUSIVE, &tty->flags);
2509 return 0;
2510 case TIOCNOTTY:
2511 if (current->signal->tty != tty)
2512 return -ENOTTY;
2513 no_tty();
2514 return 0;
2515 case TIOCSCTTY:
2516 return tiocsctty(tty, arg);
2517 case TIOCGPGRP:
2518 return tiocgpgrp(tty, real_tty, p);
2519 case TIOCSPGRP:
2520 return tiocspgrp(tty, real_tty, p);
2521 case TIOCGSID:
2522 return tiocgsid(tty, real_tty, p);
2523 case TIOCGETD:
c65c9bc3 2524 return put_user(tty->ldisc->ops->num, (int __user *)p);
37bdfb07
AC
2525 case TIOCSETD:
2526 return tiocsetd(tty, p);
37bdfb07
AC
2527 /*
2528 * Break handling
2529 */
2530 case TIOCSBRK: /* Turn break on, unconditionally */
f34d7a5b 2531 if (tty->ops->break_ctl)
9e98966c 2532 return tty->ops->break_ctl(tty, -1);
37bdfb07 2533 return 0;
37bdfb07 2534 case TIOCCBRK: /* Turn break off, unconditionally */
f34d7a5b 2535 if (tty->ops->break_ctl)
9e98966c 2536 return tty->ops->break_ctl(tty, 0);
37bdfb07
AC
2537 return 0;
2538 case TCSBRK: /* SVID version: non-zero arg --> no break */
2539 /* non-zero arg means wait for all output data
2540 * to be sent (performed above) but don't send break.
2541 * This is used by the tcdrain() termios function.
2542 */
2543 if (!arg)
2544 return send_break(tty, 250);
2545 return 0;
2546 case TCSBRKP: /* support for POSIX tcsendbreak() */
2547 return send_break(tty, arg ? arg*100 : 250);
2548
2549 case TIOCMGET:
2550 return tty_tiocmget(tty, file, p);
2551 case TIOCMSET:
2552 case TIOCMBIC:
2553 case TIOCMBIS:
2554 return tty_tiocmset(tty, file, cmd, p);
2555 case TCFLSH:
2556 switch (arg) {
2557 case TCIFLUSH:
2558 case TCIOFLUSH:
2559 /* flush tty buffer and allow ldisc to process ioctl */
2560 tty_buffer_flush(tty);
c5c34d48 2561 break;
37bdfb07
AC
2562 }
2563 break;
1da177e4 2564 }
f34d7a5b
AC
2565 if (tty->ops->ioctl) {
2566 retval = (tty->ops->ioctl)(tty, file, cmd, arg);
1da177e4
LT
2567 if (retval != -ENOIOCTLCMD)
2568 return retval;
2569 }
2570 ld = tty_ldisc_ref_wait(tty);
2571 retval = -EINVAL;
a352def2
AC
2572 if (ld->ops->ioctl) {
2573 retval = ld->ops->ioctl(tty, file, cmd, arg);
1da177e4
LT
2574 if (retval == -ENOIOCTLCMD)
2575 retval = -EINVAL;
2576 }
2577 tty_ldisc_deref(ld);
2578 return retval;
2579}
2580
e10cc1df 2581#ifdef CONFIG_COMPAT
37bdfb07 2582static long tty_compat_ioctl(struct file *file, unsigned int cmd,
e10cc1df
PF
2583 unsigned long arg)
2584{
2585 struct inode *inode = file->f_dentry->d_inode;
2586 struct tty_struct *tty = file->private_data;
2587 struct tty_ldisc *ld;
2588 int retval = -ENOIOCTLCMD;
2589
2590 if (tty_paranoia_check(tty, inode, "tty_ioctl"))
2591 return -EINVAL;
2592
f34d7a5b
AC
2593 if (tty->ops->compat_ioctl) {
2594 retval = (tty->ops->compat_ioctl)(tty, file, cmd, arg);
e10cc1df
PF
2595 if (retval != -ENOIOCTLCMD)
2596 return retval;
2597 }
2598
2599 ld = tty_ldisc_ref_wait(tty);
a352def2
AC
2600 if (ld->ops->compat_ioctl)
2601 retval = ld->ops->compat_ioctl(tty, file, cmd, arg);
e10cc1df
PF
2602 tty_ldisc_deref(ld);
2603
2604 return retval;
2605}
2606#endif
1da177e4
LT
2607
2608/*
2609 * This implements the "Secure Attention Key" --- the idea is to
2610 * prevent trojan horses by killing all processes associated with this
2611 * tty when the user hits the "Secure Attention Key". Required for
2612 * super-paranoid applications --- see the Orange Book for more details.
37bdfb07 2613 *
1da177e4
LT
2614 * This code could be nicer; ideally it should send a HUP, wait a few
2615 * seconds, then send a INT, and then a KILL signal. But you then
2616 * have to coordinate with the init process, since all processes associated
2617 * with the current tty must be dead before the new getty is allowed
2618 * to spawn.
2619 *
2620 * Now, if it would be correct ;-/ The current code has a nasty hole -
2621 * it doesn't catch files in flight. We may send the descriptor to ourselves
2622 * via AF_UNIX socket, close it and later fetch from socket. FIXME.
2623 *
2624 * Nasty bug: do_SAK is being called in interrupt context. This can
2625 * deadlock. We punt it up to process context. AKPM - 16Mar2001
2626 */
8b6312f4 2627void __do_SAK(struct tty_struct *tty)
1da177e4
LT
2628{
2629#ifdef TTY_SOFT_SAK
2630 tty_hangup(tty);
2631#else
652486fb 2632 struct task_struct *g, *p;
ab521dc0 2633 struct pid *session;
1da177e4
LT
2634 int i;
2635 struct file *filp;
badf1662 2636 struct fdtable *fdt;
37bdfb07 2637
1da177e4
LT
2638 if (!tty)
2639 return;
24ec839c 2640 session = tty->session;
37bdfb07 2641
b3f13deb 2642 tty_ldisc_flush(tty);
1da177e4 2643
f34d7a5b 2644 tty_driver_flush_buffer(tty);
37bdfb07 2645
1da177e4 2646 read_lock(&tasklist_lock);
652486fb 2647 /* Kill the entire session */
ab521dc0 2648 do_each_pid_task(session, PIDTYPE_SID, p) {
652486fb 2649 printk(KERN_NOTICE "SAK: killed process %d"
1b0f7ffd 2650 " (%s): task_session(p)==tty->session\n",
ba25f9dc 2651 task_pid_nr(p), p->comm);
652486fb 2652 send_sig(SIGKILL, p, 1);
ab521dc0 2653 } while_each_pid_task(session, PIDTYPE_SID, p);
652486fb
EB
2654 /* Now kill any processes that happen to have the
2655 * tty open.
2656 */
2657 do_each_thread(g, p) {
2658 if (p->signal->tty == tty) {
1da177e4 2659 printk(KERN_NOTICE "SAK: killed process %d"
1b0f7ffd 2660 " (%s): task_session(p)==tty->session\n",
ba25f9dc 2661 task_pid_nr(p), p->comm);
1da177e4
LT
2662 send_sig(SIGKILL, p, 1);
2663 continue;
2664 }
2665 task_lock(p);
2666 if (p->files) {
ca99c1da
DS
2667 /*
2668 * We don't take a ref to the file, so we must
2669 * hold ->file_lock instead.
2670 */
2671 spin_lock(&p->files->file_lock);
badf1662 2672 fdt = files_fdtable(p->files);
37bdfb07 2673 for (i = 0; i < fdt->max_fds; i++) {
1da177e4
LT
2674 filp = fcheck_files(p->files, i);
2675 if (!filp)
2676 continue;
2677 if (filp->f_op->read == tty_read &&
2678 filp->private_data == tty) {
2679 printk(KERN_NOTICE "SAK: killed process %d"
2680 " (%s): fd#%d opened to the tty\n",
ba25f9dc 2681 task_pid_nr(p), p->comm, i);
20ac9437 2682 force_sig(SIGKILL, p);
1da177e4
LT
2683 break;
2684 }
2685 }
ca99c1da 2686 spin_unlock(&p->files->file_lock);
1da177e4
LT
2687 }
2688 task_unlock(p);
652486fb 2689 } while_each_thread(g, p);
1da177e4
LT
2690 read_unlock(&tasklist_lock);
2691#endif
2692}
2693
8b6312f4
EB
2694static void do_SAK_work(struct work_struct *work)
2695{
2696 struct tty_struct *tty =
2697 container_of(work, struct tty_struct, SAK_work);
2698 __do_SAK(tty);
2699}
2700
1da177e4
LT
2701/*
2702 * The tq handling here is a little racy - tty->SAK_work may already be queued.
2703 * Fortunately we don't need to worry, because if ->SAK_work is already queued,
2704 * the values which we write to it will be identical to the values which it
2705 * already has. --akpm
2706 */
2707void do_SAK(struct tty_struct *tty)
2708{
2709 if (!tty)
2710 return;
1da177e4
LT
2711 schedule_work(&tty->SAK_work);
2712}
2713
2714EXPORT_SYMBOL(do_SAK);
2715
af9b897e
AC
2716/**
2717 * initialize_tty_struct
2718 * @tty: tty to initialize
2719 *
2720 * This subroutine initializes a tty structure that has been newly
2721 * allocated.
2722 *
2723 * Locking: none - tty in question must not be exposed at this point
1da177e4 2724 */
af9b897e 2725
bf970ee4
AC
2726void initialize_tty_struct(struct tty_struct *tty,
2727 struct tty_driver *driver, int idx)
1da177e4
LT
2728{
2729 memset(tty, 0, sizeof(struct tty_struct));
9c9f4ded 2730 kref_init(&tty->kref);
1da177e4 2731 tty->magic = TTY_MAGIC;
01e1abb2 2732 tty_ldisc_init(tty);
ab521dc0
EB
2733 tty->session = NULL;
2734 tty->pgrp = NULL;
1da177e4 2735 tty->overrun_time = jiffies;
33f0f88f
AC
2736 tty->buf.head = tty->buf.tail = NULL;
2737 tty_buffer_init(tty);
5785c95b 2738 mutex_init(&tty->termios_mutex);
c65c9bc3 2739 mutex_init(&tty->ldisc_mutex);
1da177e4
LT
2740 init_waitqueue_head(&tty->write_wait);
2741 init_waitqueue_head(&tty->read_wait);
65f27f38 2742 INIT_WORK(&tty->hangup_work, do_tty_hangup);
70522e12
IM
2743 mutex_init(&tty->atomic_read_lock);
2744 mutex_init(&tty->atomic_write_lock);
a88a69c9
JP
2745 mutex_init(&tty->output_lock);
2746 mutex_init(&tty->echo_lock);
1da177e4 2747 spin_lock_init(&tty->read_lock);
04f378b1 2748 spin_lock_init(&tty->ctrl_lock);
1da177e4 2749 INIT_LIST_HEAD(&tty->tty_files);
7f1f86a0 2750 INIT_WORK(&tty->SAK_work, do_SAK_work);
bf970ee4
AC
2751
2752 tty->driver = driver;
2753 tty->ops = driver->ops;
2754 tty->index = idx;
2755 tty_line_name(driver, idx, tty->name);
1da177e4
LT
2756}
2757
f34d7a5b
AC
2758/**
2759 * tty_put_char - write one character to a tty
2760 * @tty: tty
2761 * @ch: character
2762 *
2763 * Write one byte to the tty using the provided put_char method
2764 * if present. Returns the number of characters successfully output.
2765 *
2766 * Note: the specific put_char operation in the driver layer may go
2767 * away soon. Don't call it directly, use this method
1da177e4 2768 */
af9b897e 2769
f34d7a5b 2770int tty_put_char(struct tty_struct *tty, unsigned char ch)
1da177e4 2771{
f34d7a5b
AC
2772 if (tty->ops->put_char)
2773 return tty->ops->put_char(tty, ch);
2774 return tty->ops->write(tty, &ch, 1);
1da177e4 2775}
f34d7a5b
AC
2776EXPORT_SYMBOL_GPL(tty_put_char);
2777
d81ed103 2778struct class *tty_class;
1da177e4
LT
2779
2780/**
af9b897e
AC
2781 * tty_register_device - register a tty device
2782 * @driver: the tty driver that describes the tty device
2783 * @index: the index in the tty driver for this tty device
2784 * @device: a struct device that is associated with this tty device.
2785 * This field is optional, if there is no known struct device
2786 * for this tty device it can be set to NULL safely.
1da177e4 2787 *
01107d34
GKH
2788 * Returns a pointer to the struct device for this tty device
2789 * (or ERR_PTR(-EFOO) on error).
1cdcb6b4 2790 *
af9b897e
AC
2791 * This call is required to be made to register an individual tty device
2792 * if the tty driver's flags have the TTY_DRIVER_DYNAMIC_DEV bit set. If
2793 * that bit is not set, this function should not be called by a tty
2794 * driver.
2795 *
2796 * Locking: ??
1da177e4 2797 */
af9b897e 2798
01107d34
GKH
2799struct device *tty_register_device(struct tty_driver *driver, unsigned index,
2800 struct device *device)
1da177e4
LT
2801{
2802 char name[64];
2803 dev_t dev = MKDEV(driver->major, driver->minor_start) + index;
2804
2805 if (index >= driver->num) {
2806 printk(KERN_ERR "Attempt to register invalid tty line number "
2807 " (%d).\n", index);
1cdcb6b4 2808 return ERR_PTR(-EINVAL);
1da177e4
LT
2809 }
2810
1da177e4
LT
2811 if (driver->type == TTY_DRIVER_TYPE_PTY)
2812 pty_line_name(driver, index, name);
2813 else
2814 tty_line_name(driver, index, name);
1cdcb6b4 2815
03457cd4 2816 return device_create(tty_class, device, dev, NULL, name);
1da177e4 2817}
7d7b93c1 2818EXPORT_SYMBOL(tty_register_device);
1da177e4
LT
2819
2820/**
af9b897e
AC
2821 * tty_unregister_device - unregister a tty device
2822 * @driver: the tty driver that describes the tty device
2823 * @index: the index in the tty driver for this tty device
1da177e4 2824 *
af9b897e
AC
2825 * If a tty device is registered with a call to tty_register_device() then
2826 * this function must be called when the tty device is gone.
2827 *
2828 * Locking: ??
1da177e4 2829 */
af9b897e 2830
1da177e4
LT
2831void tty_unregister_device(struct tty_driver *driver, unsigned index)
2832{
37bdfb07
AC
2833 device_destroy(tty_class,
2834 MKDEV(driver->major, driver->minor_start) + index);
1da177e4 2835}
1da177e4
LT
2836EXPORT_SYMBOL(tty_unregister_device);
2837
2838struct tty_driver *alloc_tty_driver(int lines)
2839{
2840 struct tty_driver *driver;
2841
506eb99a 2842 driver = kzalloc(sizeof(struct tty_driver), GFP_KERNEL);
1da177e4 2843 if (driver) {
7d7b93c1 2844 kref_init(&driver->kref);
1da177e4
LT
2845 driver->magic = TTY_DRIVER_MAGIC;
2846 driver->num = lines;
2847 /* later we'll move allocation of tables here */
2848 }
2849 return driver;
2850}
7d7b93c1 2851EXPORT_SYMBOL(alloc_tty_driver);
1da177e4 2852
7d7b93c1 2853static void destruct_tty_driver(struct kref *kref)
1da177e4 2854{
7d7b93c1
AC
2855 struct tty_driver *driver = container_of(kref, struct tty_driver, kref);
2856 int i;
2857 struct ktermios *tp;
2858 void *p;
2859
2860 if (driver->flags & TTY_DRIVER_INSTALLED) {
2861 /*
2862 * Free the termios and termios_locked structures because
2863 * we don't want to get memory leaks when modular tty
2864 * drivers are removed from the kernel.
2865 */
2866 for (i = 0; i < driver->num; i++) {
2867 tp = driver->termios[i];
2868 if (tp) {
2869 driver->termios[i] = NULL;
2870 kfree(tp);
2871 }
7d7b93c1
AC
2872 if (!(driver->flags & TTY_DRIVER_DYNAMIC_DEV))
2873 tty_unregister_device(driver, i);
2874 }
2875 p = driver->ttys;
2876 proc_tty_unregister_driver(driver);
2877 driver->ttys = NULL;
fe6e29fd 2878 driver->termios = NULL;
7d7b93c1
AC
2879 kfree(p);
2880 cdev_del(&driver->cdev);
2881 }
1da177e4
LT
2882 kfree(driver);
2883}
2884
7d7b93c1
AC
2885void tty_driver_kref_put(struct tty_driver *driver)
2886{
2887 kref_put(&driver->kref, destruct_tty_driver);
2888}
2889EXPORT_SYMBOL(tty_driver_kref_put);
2890
b68e31d0
JD
2891void tty_set_operations(struct tty_driver *driver,
2892 const struct tty_operations *op)
1da177e4 2893{
f34d7a5b
AC
2894 driver->ops = op;
2895};
7d7b93c1 2896EXPORT_SYMBOL(tty_set_operations);
1da177e4 2897
7d7b93c1
AC
2898void put_tty_driver(struct tty_driver *d)
2899{
2900 tty_driver_kref_put(d);
2901}
1da177e4 2902EXPORT_SYMBOL(put_tty_driver);
1da177e4
LT
2903
2904/*
2905 * Called by a tty driver to register itself.
2906 */
2907int tty_register_driver(struct tty_driver *driver)
2908{
2909 int error;
37bdfb07 2910 int i;
1da177e4
LT
2911 dev_t dev;
2912 void **p = NULL;
2913
543691a6 2914 if (!(driver->flags & TTY_DRIVER_DEVPTS_MEM) && driver->num) {
fe6e29fd 2915 p = kzalloc(driver->num * 2 * sizeof(void *), GFP_KERNEL);
1da177e4
LT
2916 if (!p)
2917 return -ENOMEM;
1da177e4
LT
2918 }
2919
2920 if (!driver->major) {
37bdfb07
AC
2921 error = alloc_chrdev_region(&dev, driver->minor_start,
2922 driver->num, driver->name);
1da177e4
LT
2923 if (!error) {
2924 driver->major = MAJOR(dev);
2925 driver->minor_start = MINOR(dev);
2926 }
2927 } else {
2928 dev = MKDEV(driver->major, driver->minor_start);
e5717c48 2929 error = register_chrdev_region(dev, driver->num, driver->name);
1da177e4
LT
2930 }
2931 if (error < 0) {
2932 kfree(p);
2933 return error;
2934 }
2935
2936 if (p) {
2937 driver->ttys = (struct tty_struct **)p;
edc6afc5 2938 driver->termios = (struct ktermios **)(p + driver->num);
1da177e4
LT
2939 } else {
2940 driver->ttys = NULL;
2941 driver->termios = NULL;
1da177e4
LT
2942 }
2943
2944 cdev_init(&driver->cdev, &tty_fops);
2945 driver->cdev.owner = driver->owner;
2946 error = cdev_add(&driver->cdev, dev, driver->num);
2947 if (error) {
1da177e4
LT
2948 unregister_chrdev_region(dev, driver->num);
2949 driver->ttys = NULL;
fe6e29fd 2950 driver->termios = NULL;
1da177e4
LT
2951 kfree(p);
2952 return error;
2953 }
2954
ca509f69 2955 mutex_lock(&tty_mutex);
1da177e4 2956 list_add(&driver->tty_drivers, &tty_drivers);
ca509f69 2957 mutex_unlock(&tty_mutex);
37bdfb07
AC
2958
2959 if (!(driver->flags & TTY_DRIVER_DYNAMIC_DEV)) {
2960 for (i = 0; i < driver->num; i++)
1da177e4
LT
2961 tty_register_device(driver, i, NULL);
2962 }
2963 proc_tty_register_driver(driver);
7d7b93c1 2964 driver->flags |= TTY_DRIVER_INSTALLED;
1da177e4
LT
2965 return 0;
2966}
2967
2968EXPORT_SYMBOL(tty_register_driver);
2969
2970/*
2971 * Called by a tty driver to unregister itself.
2972 */
2973int tty_unregister_driver(struct tty_driver *driver)
2974{
7d7b93c1
AC
2975#if 0
2976 /* FIXME */
1da177e4
LT
2977 if (driver->refcount)
2978 return -EBUSY;
7d7b93c1 2979#endif
1da177e4
LT
2980 unregister_chrdev_region(MKDEV(driver->major, driver->minor_start),
2981 driver->num);
ca509f69 2982 mutex_lock(&tty_mutex);
1da177e4 2983 list_del(&driver->tty_drivers);
ca509f69 2984 mutex_unlock(&tty_mutex);
1da177e4
LT
2985 return 0;
2986}
7d7b93c1 2987
1da177e4
LT
2988EXPORT_SYMBOL(tty_unregister_driver);
2989
24ec839c
PZ
2990dev_t tty_devnum(struct tty_struct *tty)
2991{
2992 return MKDEV(tty->driver->major, tty->driver->minor_start) + tty->index;
2993}
2994EXPORT_SYMBOL(tty_devnum);
2995
2996void proc_clear_tty(struct task_struct *p)
2997{
7c3b1dcf 2998 unsigned long flags;
9c9f4ded 2999 struct tty_struct *tty;
7c3b1dcf 3000 spin_lock_irqsave(&p->sighand->siglock, flags);
9c9f4ded 3001 tty = p->signal->tty;
24ec839c 3002 p->signal->tty = NULL;
7c3b1dcf 3003 spin_unlock_irqrestore(&p->sighand->siglock, flags);
9c9f4ded 3004 tty_kref_put(tty);
24ec839c 3005}
24ec839c 3006
47f86834
AC
3007/* Called under the sighand lock */
3008
2a65f1d9 3009static void __proc_set_tty(struct task_struct *tsk, struct tty_struct *tty)
24ec839c
PZ
3010{
3011 if (tty) {
47f86834
AC
3012 unsigned long flags;
3013 /* We should not have a session or pgrp to put here but.... */
3014 spin_lock_irqsave(&tty->ctrl_lock, flags);
d9c1e9a8
EB
3015 put_pid(tty->session);
3016 put_pid(tty->pgrp);
ab521dc0 3017 tty->pgrp = get_pid(task_pgrp(tsk));
47f86834
AC
3018 spin_unlock_irqrestore(&tty->ctrl_lock, flags);
3019 tty->session = get_pid(task_session(tsk));
9c9f4ded
AC
3020 if (tsk->signal->tty) {
3021 printk(KERN_DEBUG "tty not NULL!!\n");
3022 tty_kref_put(tsk->signal->tty);
3023 }
24ec839c 3024 }
2a65f1d9 3025 put_pid(tsk->signal->tty_old_pgrp);
9c9f4ded 3026 tsk->signal->tty = tty_kref_get(tty);
ab521dc0 3027 tsk->signal->tty_old_pgrp = NULL;
24ec839c
PZ
3028}
3029
98a27ba4 3030static void proc_set_tty(struct task_struct *tsk, struct tty_struct *tty)
24ec839c
PZ
3031{
3032 spin_lock_irq(&tsk->sighand->siglock);
2a65f1d9 3033 __proc_set_tty(tsk, tty);
24ec839c
PZ
3034 spin_unlock_irq(&tsk->sighand->siglock);
3035}
3036
3037struct tty_struct *get_current_tty(void)
3038{
3039 struct tty_struct *tty;
934e6ebf
AC
3040 unsigned long flags;
3041
3042 spin_lock_irqsave(&current->sighand->siglock, flags);
452a00d2 3043 tty = tty_kref_get(current->signal->tty);
934e6ebf 3044 spin_unlock_irqrestore(&current->sighand->siglock, flags);
24ec839c
PZ
3045 return tty;
3046}
a311f743 3047EXPORT_SYMBOL_GPL(get_current_tty);
1da177e4 3048
d81ed103
AC
3049void tty_default_fops(struct file_operations *fops)
3050{
3051 *fops = tty_fops;
3052}
3053
1da177e4
LT
3054/*
3055 * Initialize the console device. This is called *early*, so
3056 * we can't necessarily depend on lots of kernel help here.
3057 * Just do some early initializations, and do the complex setup
3058 * later.
3059 */
3060void __init console_init(void)
3061{
3062 initcall_t *call;
3063
3064 /* Setup the default TTY line discipline. */
01e1abb2 3065 tty_ldisc_begin();
1da177e4
LT
3066
3067 /*
37bdfb07 3068 * set up the console device so that later boot sequences can
1da177e4
LT
3069 * inform about problems etc..
3070 */
1da177e4
LT
3071 call = __con_initcall_start;
3072 while (call < __con_initcall_end) {
3073 (*call)();
3074 call++;
3075 }
3076}
3077
e454cea2
KS
3078static char *tty_devnode(struct device *dev, mode_t *mode)
3079{
3080 if (!mode)
3081 return NULL;
3082 if (dev->devt == MKDEV(TTYAUX_MAJOR, 0) ||
3083 dev->devt == MKDEV(TTYAUX_MAJOR, 2))
3084 *mode = 0666;
3085 return NULL;
3086}
3087
1da177e4
LT
3088static int __init tty_class_init(void)
3089{
7fe845d1 3090 tty_class = class_create(THIS_MODULE, "tty");
1da177e4
LT
3091 if (IS_ERR(tty_class))
3092 return PTR_ERR(tty_class);
e454cea2 3093 tty_class->devnode = tty_devnode;
1da177e4
LT
3094 return 0;
3095}
3096
3097postcore_initcall(tty_class_init);
3098
3099/* 3/2004 jmc: why do these devices exist? */
3100
3101static struct cdev tty_cdev, console_cdev;
1da177e4
LT
3102
3103/*
3104 * Ok, now we can initialize the rest of the tty devices and can count
3105 * on memory allocations, interrupts etc..
3106 */
3107static int __init tty_init(void)
3108{
3109 cdev_init(&tty_cdev, &tty_fops);
3110 if (cdev_add(&tty_cdev, MKDEV(TTYAUX_MAJOR, 0), 1) ||
3111 register_chrdev_region(MKDEV(TTYAUX_MAJOR, 0), 1, "/dev/tty") < 0)
3112 panic("Couldn't register /dev/tty driver\n");
d81ed103 3113 device_create(tty_class, NULL, MKDEV(TTYAUX_MAJOR, 0), NULL,
47aa5793 3114 "tty");
1da177e4
LT
3115
3116 cdev_init(&console_cdev, &console_fops);
3117 if (cdev_add(&console_cdev, MKDEV(TTYAUX_MAJOR, 1), 1) ||
3118 register_chrdev_region(MKDEV(TTYAUX_MAJOR, 1), 1, "/dev/console") < 0)
3119 panic("Couldn't register /dev/console driver\n");
d81ed103 3120 device_create(tty_class, NULL, MKDEV(TTYAUX_MAJOR, 1), NULL,
47aa5793 3121 "console");
1da177e4 3122
1da177e4 3123#ifdef CONFIG_VT
d81ed103 3124 vty_init(&console_fops);
1da177e4
LT
3125#endif
3126 return 0;
3127}
3128module_init(tty_init);