cyclades: use the full port_close function
[linux-2.6-block.git] / drivers / char / tty_io.c
CommitLineData
1da177e4
LT
1/*
2 * linux/drivers/char/tty_io.c
3 *
4 * Copyright (C) 1991, 1992 Linus Torvalds
5 */
6
7/*
8 * 'tty_io.c' gives an orthogonal feeling to tty's, be they consoles
9 * or rs-channels. It also implements echoing, cooked mode etc.
10 *
11 * Kill-line thanks to John T Kohl, who also corrected VMIN = VTIME = 0.
12 *
13 * Modified by Theodore Ts'o, 9/14/92, to dynamically allocate the
14 * tty_struct and tty_queue structures. Previously there was an array
15 * of 256 tty_struct's which was statically allocated, and the
16 * tty_queue structures were allocated at boot time. Both are now
17 * dynamically allocated only when the tty is open.
18 *
19 * Also restructured routines so that there is more of a separation
20 * between the high-level tty routines (tty_io.c and tty_ioctl.c) and
21 * the low-level tty routines (serial.c, pty.c, console.c). This
37bdfb07 22 * makes for cleaner and more compact code. -TYT, 9/17/92
1da177e4
LT
23 *
24 * Modified by Fred N. van Kempen, 01/29/93, to add line disciplines
25 * which can be dynamically activated and de-activated by the line
26 * discipline handling modules (like SLIP).
27 *
28 * NOTE: pay no attention to the line discipline code (yet); its
29 * interface is still subject to change in this version...
30 * -- TYT, 1/31/92
31 *
32 * Added functionality to the OPOST tty handling. No delays, but all
33 * other bits should be there.
34 * -- Nick Holloway <alfie@dcs.warwick.ac.uk>, 27th May 1993.
35 *
36 * Rewrote canonical mode and added more termios flags.
37 * -- julian@uhunix.uhcc.hawaii.edu (J. Cowley), 13Jan94
38 *
39 * Reorganized FASYNC support so mouse code can share it.
40 * -- ctm@ardi.com, 9Sep95
41 *
42 * New TIOCLINUX variants added.
43 * -- mj@k332.feld.cvut.cz, 19-Nov-95
37bdfb07 44 *
1da177e4
LT
45 * Restrict vt switching via ioctl()
46 * -- grif@cs.ucr.edu, 5-Dec-95
47 *
48 * Move console and virtual terminal code to more appropriate files,
49 * implement CONFIG_VT and generalize console device interface.
50 * -- Marko Kohtala <Marko.Kohtala@hut.fi>, March 97
51 *
d81ed103 52 * Rewrote tty_init_dev and tty_release_dev to eliminate races.
1da177e4
LT
53 * -- Bill Hawes <whawes@star.net>, June 97
54 *
55 * Added devfs support.
56 * -- C. Scott Ananian <cananian@alumni.princeton.edu>, 13-Jan-1998
57 *
58 * Added support for a Unix98-style ptmx device.
59 * -- C. Scott Ananian <cananian@alumni.princeton.edu>, 14-Jan-1998
60 *
61 * Reduced memory usage for older ARM systems
62 * -- Russell King <rmk@arm.linux.org.uk>
63 *
64 * Move do_SAK() into process context. Less stack use in devfs functions.
37bdfb07
AC
65 * alloc_tty_struct() always uses kmalloc()
66 * -- Andrew Morton <andrewm@uow.edu.eu> 17Mar01
1da177e4
LT
67 */
68
1da177e4
LT
69#include <linux/types.h>
70#include <linux/major.h>
71#include <linux/errno.h>
72#include <linux/signal.h>
73#include <linux/fcntl.h>
74#include <linux/sched.h>
75#include <linux/interrupt.h>
76#include <linux/tty.h>
77#include <linux/tty_driver.h>
78#include <linux/tty_flip.h>
79#include <linux/devpts_fs.h>
80#include <linux/file.h>
9f3acc31 81#include <linux/fdtable.h>
1da177e4
LT
82#include <linux/console.h>
83#include <linux/timer.h>
84#include <linux/ctype.h>
85#include <linux/kd.h>
86#include <linux/mm.h>
87#include <linux/string.h>
88#include <linux/slab.h>
89#include <linux/poll.h>
90#include <linux/proc_fs.h>
91#include <linux/init.h>
92#include <linux/module.h>
93#include <linux/smp_lock.h>
94#include <linux/device.h>
1da177e4
LT
95#include <linux/wait.h>
96#include <linux/bitops.h>
b20f3ae5 97#include <linux/delay.h>
a352def2 98#include <linux/seq_file.h>
1da177e4 99
a352def2 100#include <linux/uaccess.h>
1da177e4
LT
101#include <asm/system.h>
102
103#include <linux/kbd_kern.h>
104#include <linux/vt_kern.h>
105#include <linux/selection.h>
1da177e4
LT
106
107#include <linux/kmod.h>
b488893a 108#include <linux/nsproxy.h>
1da177e4
LT
109
110#undef TTY_DEBUG_HANGUP
111
112#define TTY_PARANOIA_CHECK 1
113#define CHECK_TTY_COUNT 1
114
edc6afc5 115struct ktermios tty_std_termios = { /* for the benefit of tty drivers */
1da177e4
LT
116 .c_iflag = ICRNL | IXON,
117 .c_oflag = OPOST | ONLCR,
118 .c_cflag = B38400 | CS8 | CREAD | HUPCL,
119 .c_lflag = ISIG | ICANON | ECHO | ECHOE | ECHOK |
120 ECHOCTL | ECHOKE | IEXTEN,
edc6afc5
AC
121 .c_cc = INIT_C_CC,
122 .c_ispeed = 38400,
123 .c_ospeed = 38400
1da177e4
LT
124};
125
126EXPORT_SYMBOL(tty_std_termios);
127
128/* This list gets poked at by procfs and various bits of boot up code. This
129 could do with some rationalisation such as pulling the tty proc function
130 into this file */
37bdfb07 131
1da177e4
LT
132LIST_HEAD(tty_drivers); /* linked list of tty drivers */
133
24ec839c 134/* Mutex to protect creating and releasing a tty. This is shared with
1da177e4 135 vt.c for deeply disgusting hack reasons */
70522e12 136DEFINE_MUTEX(tty_mutex);
de2a84f2 137EXPORT_SYMBOL(tty_mutex);
1da177e4 138
1da177e4
LT
139static ssize_t tty_read(struct file *, char __user *, size_t, loff_t *);
140static ssize_t tty_write(struct file *, const char __user *, size_t, loff_t *);
37bdfb07
AC
141ssize_t redirected_tty_write(struct file *, const char __user *,
142 size_t, loff_t *);
1da177e4
LT
143static unsigned int tty_poll(struct file *, poll_table *);
144static int tty_open(struct inode *, struct file *);
145static int tty_release(struct inode *, struct file *);
04f378b1 146long tty_ioctl(struct file *file, unsigned int cmd, unsigned long arg);
e10cc1df 147#ifdef CONFIG_COMPAT
37bdfb07 148static long tty_compat_ioctl(struct file *file, unsigned int cmd,
e10cc1df
PF
149 unsigned long arg);
150#else
151#define tty_compat_ioctl NULL
152#endif
37bdfb07 153static int tty_fasync(int fd, struct file *filp, int on);
d5698c28 154static void release_tty(struct tty_struct *tty, int idx);
2a65f1d9 155static void __proc_set_tty(struct task_struct *tsk, struct tty_struct *tty);
98a27ba4 156static void proc_set_tty(struct task_struct *tsk, struct tty_struct *tty);
1da177e4 157
af9b897e
AC
158/**
159 * alloc_tty_struct - allocate a tty object
160 *
161 * Return a new empty tty structure. The data fields have not
162 * been initialized in any way but has been zeroed
163 *
164 * Locking: none
af9b897e 165 */
1da177e4 166
bf970ee4 167struct tty_struct *alloc_tty_struct(void)
1da177e4 168{
1266b1e1 169 return kzalloc(sizeof(struct tty_struct), GFP_KERNEL);
1da177e4
LT
170}
171
af9b897e
AC
172/**
173 * free_tty_struct - free a disused tty
174 * @tty: tty struct to free
175 *
176 * Free the write buffers, tty queue and tty memory itself.
177 *
178 * Locking: none. Must be called after tty is definitely unused
179 */
180
bf970ee4 181void free_tty_struct(struct tty_struct *tty)
1da177e4
LT
182{
183 kfree(tty->write_buf);
33f0f88f 184 tty_buffer_free_all(tty);
1da177e4
LT
185 kfree(tty);
186}
187
188#define TTY_NUMBER(tty) ((tty)->index + (tty)->driver->name_base)
189
af9b897e
AC
190/**
191 * tty_name - return tty naming
192 * @tty: tty structure
193 * @buf: buffer for output
194 *
195 * Convert a tty structure into a name. The name reflects the kernel
196 * naming policy and if udev is in use may not reflect user space
197 *
198 * Locking: none
199 */
200
1da177e4
LT
201char *tty_name(struct tty_struct *tty, char *buf)
202{
203 if (!tty) /* Hmm. NULL pointer. That's fun. */
204 strcpy(buf, "NULL tty");
205 else
206 strcpy(buf, tty->name);
207 return buf;
208}
209
210EXPORT_SYMBOL(tty_name);
211
d769a669 212int tty_paranoia_check(struct tty_struct *tty, struct inode *inode,
1da177e4
LT
213 const char *routine)
214{
215#ifdef TTY_PARANOIA_CHECK
216 if (!tty) {
217 printk(KERN_WARNING
218 "null TTY for (%d:%d) in %s\n",
219 imajor(inode), iminor(inode), routine);
220 return 1;
221 }
222 if (tty->magic != TTY_MAGIC) {
223 printk(KERN_WARNING
224 "bad magic number for tty struct (%d:%d) in %s\n",
225 imajor(inode), iminor(inode), routine);
226 return 1;
227 }
228#endif
229 return 0;
230}
231
232static int check_tty_count(struct tty_struct *tty, const char *routine)
233{
234#ifdef CHECK_TTY_COUNT
235 struct list_head *p;
236 int count = 0;
37bdfb07 237
1da177e4
LT
238 file_list_lock();
239 list_for_each(p, &tty->tty_files) {
240 count++;
241 }
242 file_list_unlock();
243 if (tty->driver->type == TTY_DRIVER_TYPE_PTY &&
244 tty->driver->subtype == PTY_TYPE_SLAVE &&
245 tty->link && tty->link->count)
246 count++;
247 if (tty->count != count) {
248 printk(KERN_WARNING "Warning: dev (%s) tty->count(%d) "
249 "!= #fd's(%d) in %s\n",
250 tty->name, tty->count, count, routine);
251 return count;
24ec839c 252 }
1da177e4
LT
253#endif
254 return 0;
255}
256
af9b897e
AC
257/**
258 * get_tty_driver - find device of a tty
259 * @dev_t: device identifier
260 * @index: returns the index of the tty
261 *
262 * This routine returns a tty driver structure, given a device number
263 * and also passes back the index number.
264 *
265 * Locking: caller must hold tty_mutex
1da177e4 266 */
af9b897e 267
1da177e4
LT
268static struct tty_driver *get_tty_driver(dev_t device, int *index)
269{
270 struct tty_driver *p;
271
272 list_for_each_entry(p, &tty_drivers, tty_drivers) {
273 dev_t base = MKDEV(p->major, p->minor_start);
274 if (device < base || device >= base + p->num)
275 continue;
276 *index = device - base;
7d7b93c1 277 return tty_driver_kref_get(p);
1da177e4
LT
278 }
279 return NULL;
280}
281
f2d937f3
JW
282#ifdef CONFIG_CONSOLE_POLL
283
284/**
285 * tty_find_polling_driver - find device of a polled tty
286 * @name: name string to match
287 * @line: pointer to resulting tty line nr
288 *
289 * This routine returns a tty driver structure, given a name
290 * and the condition that the tty driver is capable of polled
291 * operation.
292 */
293struct tty_driver *tty_find_polling_driver(char *name, int *line)
294{
295 struct tty_driver *p, *res = NULL;
296 int tty_line = 0;
0dca0fd2 297 int len;
5f0878ac 298 char *str, *stp;
f2d937f3 299
0dca0fd2
JW
300 for (str = name; *str; str++)
301 if ((*str >= '0' && *str <= '9') || *str == ',')
302 break;
303 if (!*str)
304 return NULL;
305
306 len = str - name;
307 tty_line = simple_strtoul(str, &str, 10);
308
f2d937f3
JW
309 mutex_lock(&tty_mutex);
310 /* Search through the tty devices to look for a match */
311 list_for_each_entry(p, &tty_drivers, tty_drivers) {
0dca0fd2
JW
312 if (strncmp(name, p->name, len) != 0)
313 continue;
5f0878ac
AC
314 stp = str;
315 if (*stp == ',')
316 stp++;
317 if (*stp == '\0')
318 stp = NULL;
f2d937f3 319
f34d7a5b 320 if (tty_line >= 0 && tty_line <= p->num && p->ops &&
5f0878ac 321 p->ops->poll_init && !p->ops->poll_init(p, tty_line, stp)) {
7d7b93c1 322 res = tty_driver_kref_get(p);
f2d937f3
JW
323 *line = tty_line;
324 break;
325 }
326 }
327 mutex_unlock(&tty_mutex);
328
329 return res;
330}
331EXPORT_SYMBOL_GPL(tty_find_polling_driver);
332#endif
333
af9b897e
AC
334/**
335 * tty_check_change - check for POSIX terminal changes
336 * @tty: tty to check
337 *
338 * If we try to write to, or set the state of, a terminal and we're
339 * not in the foreground, send a SIGTTOU. If the signal is blocked or
340 * ignored, go ahead and perform the operation. (POSIX 7.2)
341 *
978e595f 342 * Locking: ctrl_lock
1da177e4 343 */
af9b897e 344
37bdfb07 345int tty_check_change(struct tty_struct *tty)
1da177e4 346{
47f86834
AC
347 unsigned long flags;
348 int ret = 0;
349
1da177e4
LT
350 if (current->signal->tty != tty)
351 return 0;
47f86834
AC
352
353 spin_lock_irqsave(&tty->ctrl_lock, flags);
354
ab521dc0
EB
355 if (!tty->pgrp) {
356 printk(KERN_WARNING "tty_check_change: tty->pgrp == NULL!\n");
9ffee4cb 357 goto out_unlock;
1da177e4 358 }
ab521dc0 359 if (task_pgrp(current) == tty->pgrp)
9ffee4cb
AM
360 goto out_unlock;
361 spin_unlock_irqrestore(&tty->ctrl_lock, flags);
1da177e4 362 if (is_ignored(SIGTTOU))
47f86834
AC
363 goto out;
364 if (is_current_pgrp_orphaned()) {
365 ret = -EIO;
366 goto out;
367 }
040b6362
ON
368 kill_pgrp(task_pgrp(current), SIGTTOU, 1);
369 set_thread_flag(TIF_SIGPENDING);
47f86834
AC
370 ret = -ERESTARTSYS;
371out:
9ffee4cb
AM
372 return ret;
373out_unlock:
47f86834
AC
374 spin_unlock_irqrestore(&tty->ctrl_lock, flags);
375 return ret;
1da177e4
LT
376}
377
378EXPORT_SYMBOL(tty_check_change);
379
37bdfb07 380static ssize_t hung_up_tty_read(struct file *file, char __user *buf,
1da177e4
LT
381 size_t count, loff_t *ppos)
382{
383 return 0;
384}
385
37bdfb07 386static ssize_t hung_up_tty_write(struct file *file, const char __user *buf,
1da177e4
LT
387 size_t count, loff_t *ppos)
388{
389 return -EIO;
390}
391
392/* No kernel lock held - none needed ;) */
37bdfb07 393static unsigned int hung_up_tty_poll(struct file *filp, poll_table *wait)
1da177e4
LT
394{
395 return POLLIN | POLLOUT | POLLERR | POLLHUP | POLLRDNORM | POLLWRNORM;
396}
397
04f378b1
AC
398static long hung_up_tty_ioctl(struct file *file, unsigned int cmd,
399 unsigned long arg)
38ad2ed0
PF
400{
401 return cmd == TIOCSPGRP ? -ENOTTY : -EIO;
402}
403
37bdfb07 404static long hung_up_tty_compat_ioctl(struct file *file,
38ad2ed0 405 unsigned int cmd, unsigned long arg)
1da177e4
LT
406{
407 return cmd == TIOCSPGRP ? -ENOTTY : -EIO;
408}
409
62322d25 410static const struct file_operations tty_fops = {
1da177e4
LT
411 .llseek = no_llseek,
412 .read = tty_read,
413 .write = tty_write,
414 .poll = tty_poll,
04f378b1 415 .unlocked_ioctl = tty_ioctl,
e10cc1df 416 .compat_ioctl = tty_compat_ioctl,
1da177e4
LT
417 .open = tty_open,
418 .release = tty_release,
419 .fasync = tty_fasync,
420};
421
62322d25 422static const struct file_operations console_fops = {
1da177e4
LT
423 .llseek = no_llseek,
424 .read = tty_read,
425 .write = redirected_tty_write,
426 .poll = tty_poll,
04f378b1 427 .unlocked_ioctl = tty_ioctl,
e10cc1df 428 .compat_ioctl = tty_compat_ioctl,
1da177e4
LT
429 .open = tty_open,
430 .release = tty_release,
431 .fasync = tty_fasync,
432};
433
62322d25 434static const struct file_operations hung_up_tty_fops = {
1da177e4
LT
435 .llseek = no_llseek,
436 .read = hung_up_tty_read,
437 .write = hung_up_tty_write,
438 .poll = hung_up_tty_poll,
04f378b1 439 .unlocked_ioctl = hung_up_tty_ioctl,
38ad2ed0 440 .compat_ioctl = hung_up_tty_compat_ioctl,
1da177e4
LT
441 .release = tty_release,
442};
443
444static DEFINE_SPINLOCK(redirect_lock);
445static struct file *redirect;
446
447/**
448 * tty_wakeup - request more data
449 * @tty: terminal
450 *
451 * Internal and external helper for wakeups of tty. This function
452 * informs the line discipline if present that the driver is ready
453 * to receive more output data.
454 */
37bdfb07 455
1da177e4
LT
456void tty_wakeup(struct tty_struct *tty)
457{
458 struct tty_ldisc *ld;
37bdfb07 459
1da177e4
LT
460 if (test_bit(TTY_DO_WRITE_WAKEUP, &tty->flags)) {
461 ld = tty_ldisc_ref(tty);
37bdfb07 462 if (ld) {
a352def2
AC
463 if (ld->ops->write_wakeup)
464 ld->ops->write_wakeup(tty);
1da177e4
LT
465 tty_ldisc_deref(ld);
466 }
467 }
4b19449d 468 wake_up_interruptible_poll(&tty->write_wait, POLLOUT);
1da177e4
LT
469}
470
471EXPORT_SYMBOL_GPL(tty_wakeup);
472
af9b897e
AC
473/**
474 * do_tty_hangup - actual handler for hangup events
65f27f38 475 * @work: tty device
af9b897e 476 *
1bad879a 477 * This can be called by the "eventd" kernel thread. That is process
af9b897e
AC
478 * synchronous but doesn't hold any locks, so we need to make sure we
479 * have the appropriate locks for what we're doing.
480 *
481 * The hangup event clears any pending redirections onto the hung up
482 * device. It ensures future writes will error and it does the needed
483 * line discipline hangup and signal delivery. The tty object itself
484 * remains intact.
485 *
486 * Locking:
487 * BKL
24ec839c
PZ
488 * redirect lock for undoing redirection
489 * file list lock for manipulating list of ttys
490 * tty_ldisc_lock from called functions
491 * termios_mutex resetting termios data
492 * tasklist_lock to walk task list for hangup event
493 * ->siglock to protect ->signal/->sighand
1da177e4 494 */
65f27f38 495static void do_tty_hangup(struct work_struct *work)
1da177e4 496{
65f27f38
DH
497 struct tty_struct *tty =
498 container_of(work, struct tty_struct, hangup_work);
37bdfb07 499 struct file *cons_filp = NULL;
1da177e4
LT
500 struct file *filp, *f = NULL;
501 struct task_struct *p;
1da177e4 502 int closecount = 0, n;
47f86834 503 unsigned long flags;
9c9f4ded 504 int refs = 0;
1da177e4
LT
505
506 if (!tty)
507 return;
508
509 /* inuse_filps is protected by the single kernel lock */
510 lock_kernel();
511
512 spin_lock(&redirect_lock);
513 if (redirect && redirect->private_data == tty) {
514 f = redirect;
515 redirect = NULL;
516 }
517 spin_unlock(&redirect_lock);
37bdfb07 518
1da177e4
LT
519 check_tty_count(tty, "do_tty_hangup");
520 file_list_lock();
521 /* This breaks for file handles being sent over AF_UNIX sockets ? */
2f512016 522 list_for_each_entry(filp, &tty->tty_files, f_u.fu_list) {
1da177e4
LT
523 if (filp->f_op->write == redirected_tty_write)
524 cons_filp = filp;
525 if (filp->f_op->write != tty_write)
526 continue;
527 closecount++;
528 tty_fasync(-1, filp, 0); /* can't block */
529 filp->f_op = &hung_up_tty_fops;
530 }
531 file_list_unlock();
37bdfb07 532
c65c9bc3 533 tty_ldisc_hangup(tty);
37bdfb07 534
1da177e4 535 read_lock(&tasklist_lock);
ab521dc0
EB
536 if (tty->session) {
537 do_each_pid_task(tty->session, PIDTYPE_SID, p) {
24ec839c 538 spin_lock_irq(&p->sighand->siglock);
9c9f4ded 539 if (p->signal->tty == tty) {
1da177e4 540 p->signal->tty = NULL;
9c9f4ded
AC
541 /* We defer the dereferences outside fo
542 the tasklist lock */
543 refs++;
544 }
24ec839c
PZ
545 if (!p->signal->leader) {
546 spin_unlock_irq(&p->sighand->siglock);
1da177e4 547 continue;
24ec839c
PZ
548 }
549 __group_send_sig_info(SIGHUP, SEND_SIG_PRIV, p);
550 __group_send_sig_info(SIGCONT, SEND_SIG_PRIV, p);
ab521dc0 551 put_pid(p->signal->tty_old_pgrp); /* A noop */
47f86834 552 spin_lock_irqsave(&tty->ctrl_lock, flags);
ab521dc0
EB
553 if (tty->pgrp)
554 p->signal->tty_old_pgrp = get_pid(tty->pgrp);
47f86834 555 spin_unlock_irqrestore(&tty->ctrl_lock, flags);
24ec839c 556 spin_unlock_irq(&p->sighand->siglock);
ab521dc0 557 } while_each_pid_task(tty->session, PIDTYPE_SID, p);
1da177e4
LT
558 }
559 read_unlock(&tasklist_lock);
560
47f86834 561 spin_lock_irqsave(&tty->ctrl_lock, flags);
c65c9bc3
AC
562 clear_bit(TTY_THROTTLED, &tty->flags);
563 clear_bit(TTY_PUSH, &tty->flags);
564 clear_bit(TTY_DO_WRITE_WAKEUP, &tty->flags);
d9c1e9a8
EB
565 put_pid(tty->session);
566 put_pid(tty->pgrp);
ab521dc0
EB
567 tty->session = NULL;
568 tty->pgrp = NULL;
1da177e4 569 tty->ctrl_status = 0;
c65c9bc3 570 set_bit(TTY_HUPPED, &tty->flags);
47f86834
AC
571 spin_unlock_irqrestore(&tty->ctrl_lock, flags);
572
9c9f4ded
AC
573 /* Account for the p->signal references we killed */
574 while (refs--)
575 tty_kref_put(tty);
576
1da177e4 577 /*
37bdfb07
AC
578 * If one of the devices matches a console pointer, we
579 * cannot just call hangup() because that will cause
580 * tty->count and state->count to go out of sync.
581 * So we just call close() the right number of times.
1da177e4
LT
582 */
583 if (cons_filp) {
f34d7a5b 584 if (tty->ops->close)
1da177e4 585 for (n = 0; n < closecount; n++)
f34d7a5b
AC
586 tty->ops->close(tty, cons_filp);
587 } else if (tty->ops->hangup)
588 (tty->ops->hangup)(tty);
37bdfb07
AC
589 /*
590 * We don't want to have driver/ldisc interactions beyond
591 * the ones we did here. The driver layer expects no
592 * calls after ->hangup() from the ldisc side. However we
593 * can't yet guarantee all that.
594 */
1da177e4 595 set_bit(TTY_HUPPED, &tty->flags);
c65c9bc3 596 tty_ldisc_enable(tty);
1da177e4
LT
597 unlock_kernel();
598 if (f)
599 fput(f);
600}
601
af9b897e
AC
602/**
603 * tty_hangup - trigger a hangup event
604 * @tty: tty to hangup
605 *
606 * A carrier loss (virtual or otherwise) has occurred on this like
607 * schedule a hangup sequence to run after this event.
608 */
609
37bdfb07 610void tty_hangup(struct tty_struct *tty)
1da177e4
LT
611{
612#ifdef TTY_DEBUG_HANGUP
613 char buf[64];
1da177e4
LT
614 printk(KERN_DEBUG "%s hangup...\n", tty_name(tty, buf));
615#endif
616 schedule_work(&tty->hangup_work);
617}
618
619EXPORT_SYMBOL(tty_hangup);
620
af9b897e
AC
621/**
622 * tty_vhangup - process vhangup
623 * @tty: tty to hangup
624 *
625 * The user has asked via system call for the terminal to be hung up.
626 * We do this synchronously so that when the syscall returns the process
3a4fa0a2 627 * is complete. That guarantee is necessary for security reasons.
af9b897e
AC
628 */
629
37bdfb07 630void tty_vhangup(struct tty_struct *tty)
1da177e4
LT
631{
632#ifdef TTY_DEBUG_HANGUP
633 char buf[64];
634
635 printk(KERN_DEBUG "%s vhangup...\n", tty_name(tty, buf));
636#endif
65f27f38 637 do_tty_hangup(&tty->hangup_work);
1da177e4 638}
37bdfb07 639
1da177e4
LT
640EXPORT_SYMBOL(tty_vhangup);
641
2cb5998b
AC
642/**
643 * tty_vhangup_self - process vhangup for own ctty
644 *
645 * Perform a vhangup on the current controlling tty
646 */
647
648void tty_vhangup_self(void)
649{
650 struct tty_struct *tty;
651
2cb5998b
AC
652 tty = get_current_tty();
653 if (tty) {
654 tty_vhangup(tty);
655 tty_kref_put(tty);
656 }
2cb5998b
AC
657}
658
af9b897e
AC
659/**
660 * tty_hung_up_p - was tty hung up
661 * @filp: file pointer of tty
662 *
663 * Return true if the tty has been subject to a vhangup or a carrier
664 * loss
665 */
666
37bdfb07 667int tty_hung_up_p(struct file *filp)
1da177e4
LT
668{
669 return (filp->f_op == &hung_up_tty_fops);
670}
671
672EXPORT_SYMBOL(tty_hung_up_p);
673
ab521dc0 674static void session_clear_tty(struct pid *session)
24ec839c
PZ
675{
676 struct task_struct *p;
ab521dc0 677 do_each_pid_task(session, PIDTYPE_SID, p) {
24ec839c 678 proc_clear_tty(p);
ab521dc0 679 } while_each_pid_task(session, PIDTYPE_SID, p);
24ec839c
PZ
680}
681
af9b897e
AC
682/**
683 * disassociate_ctty - disconnect controlling tty
684 * @on_exit: true if exiting so need to "hang up" the session
1da177e4 685 *
af9b897e
AC
686 * This function is typically called only by the session leader, when
687 * it wants to disassociate itself from its controlling tty.
688 *
689 * It performs the following functions:
1da177e4
LT
690 * (1) Sends a SIGHUP and SIGCONT to the foreground process group
691 * (2) Clears the tty from being controlling the session
692 * (3) Clears the controlling tty for all processes in the
693 * session group.
694 *
af9b897e
AC
695 * The argument on_exit is set to 1 if called when a process is
696 * exiting; it is 0 if called by the ioctl TIOCNOTTY.
697 *
24ec839c 698 * Locking:
af9b897e 699 * BKL is taken for hysterical raisins
24ec839c
PZ
700 * tty_mutex is taken to protect tty
701 * ->siglock is taken to protect ->signal/->sighand
702 * tasklist_lock is taken to walk process list for sessions
703 * ->siglock is taken to protect ->signal/->sighand
1da177e4 704 */
af9b897e 705
1da177e4
LT
706void disassociate_ctty(int on_exit)
707{
708 struct tty_struct *tty;
ab521dc0 709 struct pid *tty_pgrp = NULL;
1da177e4 710
1da177e4 711
24ec839c 712 tty = get_current_tty();
1da177e4 713 if (tty) {
ab521dc0 714 tty_pgrp = get_pid(tty->pgrp);
452a00d2 715 lock_kernel();
1da177e4
LT
716 if (on_exit && tty->driver->type != TTY_DRIVER_TYPE_PTY)
717 tty_vhangup(tty);
04f378b1 718 unlock_kernel();
452a00d2 719 tty_kref_put(tty);
680a9671 720 } else if (on_exit) {
ab521dc0 721 struct pid *old_pgrp;
680a9671
EB
722 spin_lock_irq(&current->sighand->siglock);
723 old_pgrp = current->signal->tty_old_pgrp;
ab521dc0 724 current->signal->tty_old_pgrp = NULL;
680a9671 725 spin_unlock_irq(&current->sighand->siglock);
24ec839c 726 if (old_pgrp) {
ab521dc0
EB
727 kill_pgrp(old_pgrp, SIGHUP, on_exit);
728 kill_pgrp(old_pgrp, SIGCONT, on_exit);
729 put_pid(old_pgrp);
1da177e4 730 }
1da177e4
LT
731 return;
732 }
ab521dc0
EB
733 if (tty_pgrp) {
734 kill_pgrp(tty_pgrp, SIGHUP, on_exit);
1da177e4 735 if (!on_exit)
ab521dc0
EB
736 kill_pgrp(tty_pgrp, SIGCONT, on_exit);
737 put_pid(tty_pgrp);
1da177e4
LT
738 }
739
24ec839c 740 spin_lock_irq(&current->sighand->siglock);
2a65f1d9 741 put_pid(current->signal->tty_old_pgrp);
23cac8de 742 current->signal->tty_old_pgrp = NULL;
24ec839c
PZ
743 spin_unlock_irq(&current->sighand->siglock);
744
24ec839c
PZ
745 tty = get_current_tty();
746 if (tty) {
47f86834
AC
747 unsigned long flags;
748 spin_lock_irqsave(&tty->ctrl_lock, flags);
ab521dc0
EB
749 put_pid(tty->session);
750 put_pid(tty->pgrp);
751 tty->session = NULL;
752 tty->pgrp = NULL;
47f86834 753 spin_unlock_irqrestore(&tty->ctrl_lock, flags);
452a00d2 754 tty_kref_put(tty);
24ec839c
PZ
755 } else {
756#ifdef TTY_DEBUG_HANGUP
757 printk(KERN_DEBUG "error attempted to write to tty [0x%p]"
758 " = NULL", tty);
759#endif
760 }
1da177e4
LT
761
762 /* Now clear signal->tty under the lock */
763 read_lock(&tasklist_lock);
ab521dc0 764 session_clear_tty(task_session(current));
1da177e4 765 read_unlock(&tasklist_lock);
1da177e4
LT
766}
767
98a27ba4
EB
768/**
769 *
770 * no_tty - Ensure the current process does not have a controlling tty
771 */
772void no_tty(void)
773{
774 struct task_struct *tsk = current;
04f378b1 775 lock_kernel();
98a27ba4
EB
776 if (tsk->signal->leader)
777 disassociate_ctty(0);
04f378b1 778 unlock_kernel();
98a27ba4
EB
779 proc_clear_tty(tsk);
780}
781
af9b897e
AC
782
783/**
beb7dd86 784 * stop_tty - propagate flow control
af9b897e
AC
785 * @tty: tty to stop
786 *
787 * Perform flow control to the driver. For PTY/TTY pairs we
beb7dd86 788 * must also propagate the TIOCKPKT status. May be called
af9b897e
AC
789 * on an already stopped device and will not re-call the driver
790 * method.
791 *
792 * This functionality is used by both the line disciplines for
793 * halting incoming flow and by the driver. It may therefore be
794 * called from any context, may be under the tty atomic_write_lock
795 * but not always.
796 *
797 * Locking:
04f378b1 798 * Uses the tty control lock internally
af9b897e
AC
799 */
800
1da177e4
LT
801void stop_tty(struct tty_struct *tty)
802{
04f378b1
AC
803 unsigned long flags;
804 spin_lock_irqsave(&tty->ctrl_lock, flags);
805 if (tty->stopped) {
806 spin_unlock_irqrestore(&tty->ctrl_lock, flags);
1da177e4 807 return;
04f378b1 808 }
1da177e4
LT
809 tty->stopped = 1;
810 if (tty->link && tty->link->packet) {
811 tty->ctrl_status &= ~TIOCPKT_START;
812 tty->ctrl_status |= TIOCPKT_STOP;
4b19449d 813 wake_up_interruptible_poll(&tty->link->read_wait, POLLIN);
1da177e4 814 }
04f378b1 815 spin_unlock_irqrestore(&tty->ctrl_lock, flags);
f34d7a5b
AC
816 if (tty->ops->stop)
817 (tty->ops->stop)(tty);
1da177e4
LT
818}
819
820EXPORT_SYMBOL(stop_tty);
821
af9b897e 822/**
beb7dd86 823 * start_tty - propagate flow control
af9b897e
AC
824 * @tty: tty to start
825 *
826 * Start a tty that has been stopped if at all possible. Perform
3a4fa0a2 827 * any necessary wakeups and propagate the TIOCPKT status. If this
af9b897e
AC
828 * is the tty was previous stopped and is being started then the
829 * driver start method is invoked and the line discipline woken.
830 *
831 * Locking:
04f378b1 832 * ctrl_lock
af9b897e
AC
833 */
834
1da177e4
LT
835void start_tty(struct tty_struct *tty)
836{
04f378b1
AC
837 unsigned long flags;
838 spin_lock_irqsave(&tty->ctrl_lock, flags);
839 if (!tty->stopped || tty->flow_stopped) {
840 spin_unlock_irqrestore(&tty->ctrl_lock, flags);
1da177e4 841 return;
04f378b1 842 }
1da177e4
LT
843 tty->stopped = 0;
844 if (tty->link && tty->link->packet) {
845 tty->ctrl_status &= ~TIOCPKT_STOP;
846 tty->ctrl_status |= TIOCPKT_START;
4b19449d 847 wake_up_interruptible_poll(&tty->link->read_wait, POLLIN);
1da177e4 848 }
04f378b1 849 spin_unlock_irqrestore(&tty->ctrl_lock, flags);
f34d7a5b
AC
850 if (tty->ops->start)
851 (tty->ops->start)(tty);
1da177e4
LT
852 /* If we have a running line discipline it may need kicking */
853 tty_wakeup(tty);
1da177e4
LT
854}
855
856EXPORT_SYMBOL(start_tty);
857
af9b897e
AC
858/**
859 * tty_read - read method for tty device files
860 * @file: pointer to tty file
861 * @buf: user buffer
862 * @count: size of user buffer
863 * @ppos: unused
864 *
865 * Perform the read system call function on this terminal device. Checks
866 * for hung up devices before calling the line discipline method.
867 *
868 * Locking:
47f86834
AC
869 * Locks the line discipline internally while needed. Multiple
870 * read calls may be outstanding in parallel.
af9b897e
AC
871 */
872
37bdfb07 873static ssize_t tty_read(struct file *file, char __user *buf, size_t count,
1da177e4
LT
874 loff_t *ppos)
875{
876 int i;
37bdfb07 877 struct tty_struct *tty;
1da177e4
LT
878 struct inode *inode;
879 struct tty_ldisc *ld;
880
881 tty = (struct tty_struct *)file->private_data;
a7113a96 882 inode = file->f_path.dentry->d_inode;
1da177e4
LT
883 if (tty_paranoia_check(tty, inode, "tty_read"))
884 return -EIO;
885 if (!tty || (test_bit(TTY_IO_ERROR, &tty->flags)))
886 return -EIO;
887
888 /* We want to wait for the line discipline to sort out in this
889 situation */
890 ld = tty_ldisc_ref_wait(tty);
a352def2
AC
891 if (ld->ops->read)
892 i = (ld->ops->read)(tty, file, buf, count);
1da177e4
LT
893 else
894 i = -EIO;
895 tty_ldisc_deref(ld);
1da177e4
LT
896 if (i > 0)
897 inode->i_atime = current_fs_time(inode->i_sb);
898 return i;
899}
900
9c1729db
AC
901void tty_write_unlock(struct tty_struct *tty)
902{
903 mutex_unlock(&tty->atomic_write_lock);
4b19449d 904 wake_up_interruptible_poll(&tty->write_wait, POLLOUT);
9c1729db
AC
905}
906
907int tty_write_lock(struct tty_struct *tty, int ndelay)
908{
909 if (!mutex_trylock(&tty->atomic_write_lock)) {
910 if (ndelay)
911 return -EAGAIN;
912 if (mutex_lock_interruptible(&tty->atomic_write_lock))
913 return -ERESTARTSYS;
914 }
915 return 0;
916}
917
1da177e4
LT
918/*
919 * Split writes up in sane blocksizes to avoid
920 * denial-of-service type attacks
921 */
922static inline ssize_t do_tty_write(
923 ssize_t (*write)(struct tty_struct *, struct file *, const unsigned char *, size_t),
924 struct tty_struct *tty,
925 struct file *file,
926 const char __user *buf,
927 size_t count)
928{
9c1729db 929 ssize_t ret, written = 0;
1da177e4 930 unsigned int chunk;
37bdfb07 931
9c1729db
AC
932 ret = tty_write_lock(tty, file->f_flags & O_NDELAY);
933 if (ret < 0)
934 return ret;
1da177e4
LT
935
936 /*
937 * We chunk up writes into a temporary buffer. This
938 * simplifies low-level drivers immensely, since they
939 * don't have locking issues and user mode accesses.
940 *
941 * But if TTY_NO_WRITE_SPLIT is set, we should use a
942 * big chunk-size..
943 *
944 * The default chunk-size is 2kB, because the NTTY
945 * layer has problems with bigger chunks. It will
946 * claim to be able to handle more characters than
947 * it actually does.
af9b897e
AC
948 *
949 * FIXME: This can probably go away now except that 64K chunks
950 * are too likely to fail unless switched to vmalloc...
1da177e4
LT
951 */
952 chunk = 2048;
953 if (test_bit(TTY_NO_WRITE_SPLIT, &tty->flags))
954 chunk = 65536;
955 if (count < chunk)
956 chunk = count;
957
70522e12 958 /* write_buf/write_cnt is protected by the atomic_write_lock mutex */
1da177e4 959 if (tty->write_cnt < chunk) {
402fda92 960 unsigned char *buf_chunk;
1da177e4
LT
961
962 if (chunk < 1024)
963 chunk = 1024;
964
402fda92
JW
965 buf_chunk = kmalloc(chunk, GFP_KERNEL);
966 if (!buf_chunk) {
9c1729db
AC
967 ret = -ENOMEM;
968 goto out;
1da177e4
LT
969 }
970 kfree(tty->write_buf);
971 tty->write_cnt = chunk;
402fda92 972 tty->write_buf = buf_chunk;
1da177e4
LT
973 }
974
975 /* Do the write .. */
976 for (;;) {
977 size_t size = count;
978 if (size > chunk)
979 size = chunk;
980 ret = -EFAULT;
981 if (copy_from_user(tty->write_buf, buf, size))
982 break;
1da177e4 983 ret = write(tty, file, tty->write_buf, size);
1da177e4
LT
984 if (ret <= 0)
985 break;
986 written += ret;
987 buf += ret;
988 count -= ret;
989 if (!count)
990 break;
991 ret = -ERESTARTSYS;
992 if (signal_pending(current))
993 break;
994 cond_resched();
995 }
996 if (written) {
a7113a96 997 struct inode *inode = file->f_path.dentry->d_inode;
1da177e4
LT
998 inode->i_mtime = current_fs_time(inode->i_sb);
999 ret = written;
1000 }
9c1729db
AC
1001out:
1002 tty_write_unlock(tty);
1da177e4
LT
1003 return ret;
1004}
1005
95f9bfc6
AC
1006/**
1007 * tty_write_message - write a message to a certain tty, not just the console.
1008 * @tty: the destination tty_struct
1009 * @msg: the message to write
1010 *
1011 * This is used for messages that need to be redirected to a specific tty.
1012 * We don't put it into the syslog queue right now maybe in the future if
1013 * really needed.
1014 *
1015 * We must still hold the BKL and test the CLOSING flag for the moment.
1016 */
1017
1018void tty_write_message(struct tty_struct *tty, char *msg)
1019{
1020 lock_kernel();
1021 if (tty) {
1022 mutex_lock(&tty->atomic_write_lock);
1023 if (tty->ops->write && !test_bit(TTY_CLOSING, &tty->flags))
1024 tty->ops->write(tty, msg, strlen(msg));
1025 tty_write_unlock(tty);
1026 }
1027 unlock_kernel();
1028 return;
1029}
1030
1da177e4 1031
af9b897e
AC
1032/**
1033 * tty_write - write method for tty device file
1034 * @file: tty file pointer
1035 * @buf: user data to write
1036 * @count: bytes to write
1037 * @ppos: unused
1038 *
1039 * Write data to a tty device via the line discipline.
1040 *
1041 * Locking:
1042 * Locks the line discipline as required
1043 * Writes to the tty driver are serialized by the atomic_write_lock
1044 * and are then processed in chunks to the device. The line discipline
a88a69c9 1045 * write method will not be invoked in parallel for each device.
af9b897e
AC
1046 */
1047
37bdfb07
AC
1048static ssize_t tty_write(struct file *file, const char __user *buf,
1049 size_t count, loff_t *ppos)
1da177e4 1050{
37bdfb07 1051 struct tty_struct *tty;
a7113a96 1052 struct inode *inode = file->f_path.dentry->d_inode;
1da177e4
LT
1053 ssize_t ret;
1054 struct tty_ldisc *ld;
37bdfb07 1055
1da177e4
LT
1056 tty = (struct tty_struct *)file->private_data;
1057 if (tty_paranoia_check(tty, inode, "tty_write"))
1058 return -EIO;
f34d7a5b 1059 if (!tty || !tty->ops->write ||
37bdfb07
AC
1060 (test_bit(TTY_IO_ERROR, &tty->flags)))
1061 return -EIO;
f34d7a5b
AC
1062 /* Short term debug to catch buggy drivers */
1063 if (tty->ops->write_room == NULL)
1064 printk(KERN_ERR "tty driver %s lacks a write_room method.\n",
1065 tty->driver->name);
37bdfb07 1066 ld = tty_ldisc_ref_wait(tty);
a352def2 1067 if (!ld->ops->write)
1da177e4
LT
1068 ret = -EIO;
1069 else
a352def2 1070 ret = do_tty_write(ld->ops->write, tty, file, buf, count);
1da177e4
LT
1071 tty_ldisc_deref(ld);
1072 return ret;
1073}
1074
37bdfb07
AC
1075ssize_t redirected_tty_write(struct file *file, const char __user *buf,
1076 size_t count, loff_t *ppos)
1da177e4
LT
1077{
1078 struct file *p = NULL;
1079
1080 spin_lock(&redirect_lock);
1081 if (redirect) {
1082 get_file(redirect);
1083 p = redirect;
1084 }
1085 spin_unlock(&redirect_lock);
1086
1087 if (p) {
1088 ssize_t res;
1089 res = vfs_write(p, buf, count, &p->f_pos);
1090 fput(p);
1091 return res;
1092 }
1da177e4
LT
1093 return tty_write(file, buf, count, ppos);
1094}
1095
1096static char ptychar[] = "pqrstuvwxyzabcde";
1097
af9b897e
AC
1098/**
1099 * pty_line_name - generate name for a pty
1100 * @driver: the tty driver in use
1101 * @index: the minor number
1102 * @p: output buffer of at least 6 bytes
1103 *
1104 * Generate a name from a driver reference and write it to the output
1105 * buffer.
1106 *
1107 * Locking: None
1108 */
1109static void pty_line_name(struct tty_driver *driver, int index, char *p)
1da177e4
LT
1110{
1111 int i = index + driver->name_base;
1112 /* ->name is initialized to "ttyp", but "tty" is expected */
1113 sprintf(p, "%s%c%x",
37bdfb07
AC
1114 driver->subtype == PTY_TYPE_SLAVE ? "tty" : driver->name,
1115 ptychar[i >> 4 & 0xf], i & 0xf);
1da177e4
LT
1116}
1117
af9b897e 1118/**
8b0a88d5 1119 * tty_line_name - generate name for a tty
af9b897e
AC
1120 * @driver: the tty driver in use
1121 * @index: the minor number
1122 * @p: output buffer of at least 7 bytes
1123 *
1124 * Generate a name from a driver reference and write it to the output
1125 * buffer.
1126 *
1127 * Locking: None
1128 */
1129static void tty_line_name(struct tty_driver *driver, int index, char *p)
1da177e4
LT
1130{
1131 sprintf(p, "%s%d", driver->name, index + driver->name_base);
1132}
1133
99f1fe18
AC
1134/**
1135 * tty_driver_lookup_tty() - find an existing tty, if any
1136 * @driver: the driver for the tty
1137 * @idx: the minor number
23499705 1138 *
99f1fe18 1139 * Return the tty, if found or ERR_PTR() otherwise.
23499705 1140 *
99f1fe18
AC
1141 * Locking: tty_mutex must be held. If tty is found, the mutex must
1142 * be held until the 'fast-open' is also done. Will change once we
1143 * have refcounting in the driver and per driver locking
23499705 1144 */
a47d545f 1145static struct tty_struct *tty_driver_lookup_tty(struct tty_driver *driver,
15f1a633 1146 struct inode *inode, int idx)
23499705
SB
1147{
1148 struct tty_struct *tty;
1149
99f1fe18 1150 if (driver->ops->lookup)
15f1a633 1151 return driver->ops->lookup(driver, inode, idx);
23499705 1152
8b0a88d5 1153 tty = driver->ttys[idx];
23499705
SB
1154 return tty;
1155}
1156
bf970ee4
AC
1157/**
1158 * tty_init_termios - helper for termios setup
1159 * @tty: the tty to set up
1160 *
1161 * Initialise the termios structures for this tty. Thus runs under
1162 * the tty_mutex currently so we can be relaxed about ordering.
1163 */
1164
1165int tty_init_termios(struct tty_struct *tty)
1166{
fe6e29fd 1167 struct ktermios *tp;
bf970ee4
AC
1168 int idx = tty->index;
1169
1170 tp = tty->driver->termios[idx];
bf970ee4 1171 if (tp == NULL) {
fe6e29fd
AC
1172 tp = kzalloc(sizeof(struct ktermios[2]), GFP_KERNEL);
1173 if (tp == NULL)
bf970ee4 1174 return -ENOMEM;
bf970ee4
AC
1175 memcpy(tp, &tty->driver->init_termios,
1176 sizeof(struct ktermios));
1177 tty->driver->termios[idx] = tp;
bf970ee4
AC
1178 }
1179 tty->termios = tp;
fe6e29fd 1180 tty->termios_locked = tp + 1;
bf970ee4
AC
1181
1182 /* Compatibility until drivers always set this */
1183 tty->termios->c_ispeed = tty_termios_input_baud_rate(tty->termios);
1184 tty->termios->c_ospeed = tty_termios_baud_rate(tty->termios);
1185 return 0;
1186}
1187
99f1fe18 1188/**
8b0a88d5
AC
1189 * tty_driver_install_tty() - install a tty entry in the driver
1190 * @driver: the driver for the tty
1191 * @tty: the tty
1192 *
1193 * Install a tty object into the driver tables. The tty->index field
bf970ee4
AC
1194 * will be set by the time this is called. This method is responsible
1195 * for ensuring any need additional structures are allocated and
1196 * configured.
8b0a88d5
AC
1197 *
1198 * Locking: tty_mutex for now
1199 */
1200static int tty_driver_install_tty(struct tty_driver *driver,
1201 struct tty_struct *tty)
1202{
bf970ee4
AC
1203 int idx = tty->index;
1204
8b0a88d5
AC
1205 if (driver->ops->install)
1206 return driver->ops->install(driver, tty);
bf970ee4
AC
1207
1208 if (tty_init_termios(tty) == 0) {
1209 tty_driver_kref_get(driver);
1210 tty->count++;
1211 driver->ttys[idx] = tty;
1212 return 0;
1213 }
1214 return -ENOMEM;
8b0a88d5
AC
1215}
1216
1217/**
1218 * tty_driver_remove_tty() - remove a tty from the driver tables
1219 * @driver: the driver for the tty
1220 * @idx: the minor number
1221 *
1222 * Remvoe a tty object from the driver tables. The tty->index field
1223 * will be set by the time this is called.
1224 *
1225 * Locking: tty_mutex for now
1226 */
1227static void tty_driver_remove_tty(struct tty_driver *driver,
1228 struct tty_struct *tty)
1229{
1230 if (driver->ops->remove)
1231 driver->ops->remove(driver, tty);
1232 else
1233 driver->ttys[tty->index] = NULL;
1234}
1235
1236/*
1237 * tty_reopen() - fast re-open of an open tty
1238 * @tty - the tty to open
23499705 1239 *
99f1fe18 1240 * Return 0 on success, -errno on error.
23499705 1241 *
99f1fe18
AC
1242 * Locking: tty_mutex must be held from the time the tty was found
1243 * till this open completes.
23499705 1244 */
99f1fe18 1245static int tty_reopen(struct tty_struct *tty)
23499705
SB
1246{
1247 struct tty_driver *driver = tty->driver;
1248
1249 if (test_bit(TTY_CLOSING, &tty->flags))
1250 return -EIO;
1251
1252 if (driver->type == TTY_DRIVER_TYPE_PTY &&
1253 driver->subtype == PTY_TYPE_MASTER) {
1254 /*
1255 * special case for PTY masters: only one open permitted,
1256 * and the slave side open count is incremented as well.
1257 */
1258 if (tty->count)
1259 return -EIO;
1260
1261 tty->link->count++;
1262 }
1263 tty->count++;
1264 tty->driver = driver; /* N.B. why do this every time?? */
1265
1aa4bed8 1266 mutex_lock(&tty->ldisc_mutex);
99f1fe18 1267 WARN_ON(!test_bit(TTY_LDISC, &tty->flags));
1aa4bed8 1268 mutex_unlock(&tty->ldisc_mutex);
23499705
SB
1269
1270 return 0;
1271}
1272
af9b897e 1273/**
d81ed103 1274 * tty_init_dev - initialise a tty device
af9b897e
AC
1275 * @driver: tty driver we are opening a device on
1276 * @idx: device index
15582d36
AC
1277 * @ret_tty: returned tty structure
1278 * @first_ok: ok to open a new device (used by ptmx)
af9b897e
AC
1279 *
1280 * Prepare a tty device. This may not be a "new" clean device but
1281 * could also be an active device. The pty drivers require special
1282 * handling because of this.
1283 *
1284 * Locking:
1285 * The function is called under the tty_mutex, which
1286 * protects us from the tty struct or driver itself going away.
1287 *
1288 * On exit the tty device has the line discipline attached and
1289 * a reference count of 1. If a pair was created for pty/tty use
1290 * and the other was a pty master then it too has a reference count of 1.
1291 *
1da177e4 1292 * WSH 06/09/97: Rewritten to remove races and properly clean up after a
70522e12
IM
1293 * failed open. The new code protects the open with a mutex, so it's
1294 * really quite straightforward. The mutex locking can probably be
1da177e4
LT
1295 * relaxed for the (most common) case of reopening a tty.
1296 */
af9b897e 1297
73ec06fc
AC
1298struct tty_struct *tty_init_dev(struct tty_driver *driver, int idx,
1299 int first_ok)
1da177e4 1300{
bf970ee4 1301 struct tty_struct *tty;
73ec06fc 1302 int retval;
1da177e4 1303
23499705 1304 /* Check if pty master is being opened multiple times */
15582d36 1305 if (driver->subtype == PTY_TYPE_MASTER &&
73ec06fc
AC
1306 (driver->flags & TTY_DRIVER_DEVPTS_MEM) && !first_ok)
1307 return ERR_PTR(-EIO);
1308
1da177e4
LT
1309 /*
1310 * First time open is complex, especially for PTY devices.
1311 * This code guarantees that either everything succeeds and the
1312 * TTY is ready for operation, or else the table slots are vacated
37bdfb07 1313 * and the allocated memory released. (Except that the termios
1da177e4
LT
1314 * and locked termios may be retained.)
1315 */
1316
73ec06fc
AC
1317 if (!try_module_get(driver->owner))
1318 return ERR_PTR(-ENODEV);
1da177e4 1319
1da177e4 1320 tty = alloc_tty_struct();
37bdfb07 1321 if (!tty)
1da177e4 1322 goto fail_no_mem;
bf970ee4 1323 initialize_tty_struct(tty, driver, idx);
1da177e4 1324
73ec06fc 1325 retval = tty_driver_install_tty(driver, tty);
bf970ee4
AC
1326 if (retval < 0) {
1327 free_tty_struct(tty);
1328 module_put(driver->owner);
1329 return ERR_PTR(retval);
1330 }
8b0a88d5 1331
37bdfb07 1332 /*
1da177e4 1333 * Structures all installed ... call the ldisc open routines.
d5698c28
CH
1334 * If we fail here just call release_tty to clean up. No need
1335 * to decrement the use counts, as release_tty doesn't care.
1da177e4
LT
1336 */
1337
bf970ee4 1338 retval = tty_ldisc_setup(tty, tty->link);
01e1abb2
AC
1339 if (retval)
1340 goto release_mem_out;
73ec06fc 1341 return tty;
1da177e4 1342
1da177e4
LT
1343fail_no_mem:
1344 module_put(driver->owner);
73ec06fc 1345 return ERR_PTR(-ENOMEM);
1da177e4 1346
d5698c28 1347 /* call the tty release_tty routine to clean out this slot */
1da177e4 1348release_mem_out:
4050914f 1349 if (printk_ratelimit())
d81ed103 1350 printk(KERN_INFO "tty_init_dev: ldisc open failed, "
4050914f 1351 "clearing slot %d\n", idx);
d5698c28 1352 release_tty(tty, idx);
73ec06fc 1353 return ERR_PTR(retval);
1da177e4
LT
1354}
1355
feebed65
AC
1356void tty_free_termios(struct tty_struct *tty)
1357{
1358 struct ktermios *tp;
1359 int idx = tty->index;
1360 /* Kill this flag and push into drivers for locking etc */
1361 if (tty->driver->flags & TTY_DRIVER_RESET_TERMIOS) {
1362 /* FIXME: Locking on ->termios array */
1363 tp = tty->termios;
1364 tty->driver->termios[idx] = NULL;
1365 kfree(tp);
feebed65
AC
1366 }
1367}
1368EXPORT_SYMBOL(tty_free_termios);
1369
1370void tty_shutdown(struct tty_struct *tty)
1371{
8b0a88d5 1372 tty_driver_remove_tty(tty->driver, tty);
feebed65
AC
1373 tty_free_termios(tty);
1374}
1375EXPORT_SYMBOL(tty_shutdown);
1376
af9b897e 1377/**
d5698c28 1378 * release_one_tty - release tty structure memory
9c9f4ded 1379 * @kref: kref of tty we are obliterating
af9b897e
AC
1380 *
1381 * Releases memory associated with a tty structure, and clears out the
1382 * driver table slots. This function is called when a device is no longer
1383 * in use. It also gets called when setup of a device fails.
1384 *
1385 * Locking:
1386 * tty_mutex - sometimes only
1387 * takes the file list lock internally when working on the list
1388 * of ttys that the driver keeps.
1da177e4 1389 */
9c9f4ded 1390static void release_one_tty(struct kref *kref)
1da177e4 1391{
9c9f4ded 1392 struct tty_struct *tty = container_of(kref, struct tty_struct, kref);
6f967f78 1393 struct tty_driver *driver = tty->driver;
d5698c28 1394
feebed65
AC
1395 if (tty->ops->shutdown)
1396 tty->ops->shutdown(tty);
1397 else
1398 tty_shutdown(tty);
1da177e4 1399 tty->magic = 0;
7d7b93c1 1400 tty_driver_kref_put(driver);
6f967f78 1401 module_put(driver->owner);
d5698c28 1402
1da177e4
LT
1403 file_list_lock();
1404 list_del_init(&tty->tty_files);
1405 file_list_unlock();
d5698c28 1406
1da177e4
LT
1407 free_tty_struct(tty);
1408}
1409
9c9f4ded
AC
1410/**
1411 * tty_kref_put - release a tty kref
1412 * @tty: tty device
1413 *
1414 * Release a reference to a tty device and if need be let the kref
1415 * layer destruct the object for us
1416 */
1417
1418void tty_kref_put(struct tty_struct *tty)
1419{
1420 if (tty)
1421 kref_put(&tty->kref, release_one_tty);
1422}
1423EXPORT_SYMBOL(tty_kref_put);
1424
d5698c28
CH
1425/**
1426 * release_tty - release tty structure memory
1427 *
1428 * Release both @tty and a possible linked partner (think pty pair),
1429 * and decrement the refcount of the backing module.
1430 *
1431 * Locking:
1432 * tty_mutex - sometimes only
1433 * takes the file list lock internally when working on the list
1434 * of ttys that the driver keeps.
1435 * FIXME: should we require tty_mutex is held here ??
9c9f4ded 1436 *
d5698c28
CH
1437 */
1438static void release_tty(struct tty_struct *tty, int idx)
1439{
9c9f4ded
AC
1440 /* This should always be true but check for the moment */
1441 WARN_ON(tty->index != idx);
1442
d5698c28 1443 if (tty->link)
9c9f4ded
AC
1444 tty_kref_put(tty->link);
1445 tty_kref_put(tty);
d5698c28
CH
1446}
1447
1da177e4
LT
1448/*
1449 * Even releasing the tty structures is a tricky business.. We have
1450 * to be very careful that the structures are all released at the
1451 * same time, as interrupts might otherwise get the wrong pointers.
1452 *
1453 * WSH 09/09/97: rewritten to avoid some nasty race conditions that could
1454 * lead to double frees or releasing memory still in use.
1455 */
d81ed103 1456void tty_release_dev(struct file *filp)
1da177e4
LT
1457{
1458 struct tty_struct *tty, *o_tty;
1459 int pty_master, tty_closing, o_tty_closing, do_sleep;
14a6283e 1460 int devpts;
1da177e4
LT
1461 int idx;
1462 char buf[64];
15f1a633 1463 struct inode *inode;
37bdfb07 1464
15f1a633 1465 inode = filp->f_path.dentry->d_inode;
1da177e4 1466 tty = (struct tty_struct *)filp->private_data;
15f1a633 1467 if (tty_paranoia_check(tty, inode, "tty_release_dev"))
1da177e4
LT
1468 return;
1469
d81ed103 1470 check_tty_count(tty, "tty_release_dev");
1da177e4
LT
1471
1472 tty_fasync(-1, filp, 0);
1473
1474 idx = tty->index;
1475 pty_master = (tty->driver->type == TTY_DRIVER_TYPE_PTY &&
1476 tty->driver->subtype == PTY_TYPE_MASTER);
1477 devpts = (tty->driver->flags & TTY_DRIVER_DEVPTS_MEM) != 0;
1da177e4
LT
1478 o_tty = tty->link;
1479
1480#ifdef TTY_PARANOIA_CHECK
1481 if (idx < 0 || idx >= tty->driver->num) {
d81ed103 1482 printk(KERN_DEBUG "tty_release_dev: bad idx when trying to "
1da177e4
LT
1483 "free (%s)\n", tty->name);
1484 return;
1485 }
8b0a88d5 1486 if (!devpts) {
1da177e4 1487 if (tty != tty->driver->ttys[idx]) {
d81ed103 1488 printk(KERN_DEBUG "tty_release_dev: driver.table[%d] not tty "
1da177e4
LT
1489 "for (%s)\n", idx, tty->name);
1490 return;
1491 }
1492 if (tty->termios != tty->driver->termios[idx]) {
d81ed103 1493 printk(KERN_DEBUG "tty_release_dev: driver.termios[%d] not termios "
1da177e4
LT
1494 "for (%s)\n",
1495 idx, tty->name);
1496 return;
1497 }
1da177e4
LT
1498 }
1499#endif
1500
1501#ifdef TTY_DEBUG_HANGUP
d81ed103 1502 printk(KERN_DEBUG "tty_release_dev of %s (tty count=%d)...",
1da177e4
LT
1503 tty_name(tty, buf), tty->count);
1504#endif
1505
1506#ifdef TTY_PARANOIA_CHECK
1507 if (tty->driver->other &&
1508 !(tty->driver->flags & TTY_DRIVER_DEVPTS_MEM)) {
1509 if (o_tty != tty->driver->other->ttys[idx]) {
d81ed103 1510 printk(KERN_DEBUG "tty_release_dev: other->table[%d] "
1da177e4
LT
1511 "not o_tty for (%s)\n",
1512 idx, tty->name);
1513 return;
1514 }
1515 if (o_tty->termios != tty->driver->other->termios[idx]) {
d81ed103 1516 printk(KERN_DEBUG "tty_release_dev: other->termios[%d] "
1da177e4
LT
1517 "not o_termios for (%s)\n",
1518 idx, tty->name);
1519 return;
1520 }
1da177e4 1521 if (o_tty->link != tty) {
d81ed103 1522 printk(KERN_DEBUG "tty_release_dev: bad pty pointers\n");
1da177e4
LT
1523 return;
1524 }
1525 }
1526#endif
f34d7a5b
AC
1527 if (tty->ops->close)
1528 tty->ops->close(tty, filp);
1da177e4
LT
1529
1530 /*
1531 * Sanity check: if tty->count is going to zero, there shouldn't be
1532 * any waiters on tty->read_wait or tty->write_wait. We test the
1533 * wait queues and kick everyone out _before_ actually starting to
1534 * close. This ensures that we won't block while releasing the tty
1535 * structure.
1536 *
1537 * The test for the o_tty closing is necessary, since the master and
1538 * slave sides may close in any order. If the slave side closes out
1539 * first, its count will be one, since the master side holds an open.
1540 * Thus this test wouldn't be triggered at the time the slave closes,
1541 * so we do it now.
1542 *
1543 * Note that it's possible for the tty to be opened again while we're
1544 * flushing out waiters. By recalculating the closing flags before
1545 * each iteration we avoid any problems.
1546 */
1547 while (1) {
1548 /* Guard against races with tty->count changes elsewhere and
1549 opens on /dev/tty */
37bdfb07 1550
70522e12 1551 mutex_lock(&tty_mutex);
1da177e4
LT
1552 tty_closing = tty->count <= 1;
1553 o_tty_closing = o_tty &&
1554 (o_tty->count <= (pty_master ? 1 : 0));
1da177e4
LT
1555 do_sleep = 0;
1556
1557 if (tty_closing) {
1558 if (waitqueue_active(&tty->read_wait)) {
4b19449d 1559 wake_up_poll(&tty->read_wait, POLLIN);
1da177e4
LT
1560 do_sleep++;
1561 }
1562 if (waitqueue_active(&tty->write_wait)) {
4b19449d 1563 wake_up_poll(&tty->write_wait, POLLOUT);
1da177e4
LT
1564 do_sleep++;
1565 }
1566 }
1567 if (o_tty_closing) {
1568 if (waitqueue_active(&o_tty->read_wait)) {
4b19449d 1569 wake_up_poll(&o_tty->read_wait, POLLIN);
1da177e4
LT
1570 do_sleep++;
1571 }
1572 if (waitqueue_active(&o_tty->write_wait)) {
4b19449d 1573 wake_up_poll(&o_tty->write_wait, POLLOUT);
1da177e4
LT
1574 do_sleep++;
1575 }
1576 }
1577 if (!do_sleep)
1578 break;
1579
d81ed103 1580 printk(KERN_WARNING "tty_release_dev: %s: read/write wait queue "
1da177e4 1581 "active!\n", tty_name(tty, buf));
70522e12 1582 mutex_unlock(&tty_mutex);
1da177e4 1583 schedule();
37bdfb07 1584 }
1da177e4
LT
1585
1586 /*
37bdfb07
AC
1587 * The closing flags are now consistent with the open counts on
1588 * both sides, and we've completed the last operation that could
1da177e4
LT
1589 * block, so it's safe to proceed with closing.
1590 */
1da177e4
LT
1591 if (pty_master) {
1592 if (--o_tty->count < 0) {
d81ed103 1593 printk(KERN_WARNING "tty_release_dev: bad pty slave count "
1da177e4
LT
1594 "(%d) for %s\n",
1595 o_tty->count, tty_name(o_tty, buf));
1596 o_tty->count = 0;
1597 }
1598 }
1599 if (--tty->count < 0) {
d81ed103 1600 printk(KERN_WARNING "tty_release_dev: bad tty->count (%d) for %s\n",
1da177e4
LT
1601 tty->count, tty_name(tty, buf));
1602 tty->count = 0;
1603 }
37bdfb07 1604
1da177e4
LT
1605 /*
1606 * We've decremented tty->count, so we need to remove this file
1607 * descriptor off the tty->tty_files list; this serves two
1608 * purposes:
1609 * - check_tty_count sees the correct number of file descriptors
1610 * associated with this tty.
1611 * - do_tty_hangup no longer sees this file descriptor as
1612 * something that needs to be handled for hangups.
1613 */
1614 file_kill(filp);
1615 filp->private_data = NULL;
1616
1617 /*
1618 * Perform some housekeeping before deciding whether to return.
1619 *
1620 * Set the TTY_CLOSING flag if this was the last open. In the
1621 * case of a pty we may have to wait around for the other side
1622 * to close, and TTY_CLOSING makes sure we can't be reopened.
1623 */
37bdfb07 1624 if (tty_closing)
1da177e4 1625 set_bit(TTY_CLOSING, &tty->flags);
37bdfb07 1626 if (o_tty_closing)
1da177e4
LT
1627 set_bit(TTY_CLOSING, &o_tty->flags);
1628
1629 /*
1630 * If _either_ side is closing, make sure there aren't any
1631 * processes that still think tty or o_tty is their controlling
1632 * tty.
1633 */
1634 if (tty_closing || o_tty_closing) {
1da177e4 1635 read_lock(&tasklist_lock);
24ec839c 1636 session_clear_tty(tty->session);
1da177e4 1637 if (o_tty)
24ec839c 1638 session_clear_tty(o_tty->session);
1da177e4
LT
1639 read_unlock(&tasklist_lock);
1640 }
1641
70522e12 1642 mutex_unlock(&tty_mutex);
da965822 1643
1da177e4
LT
1644 /* check whether both sides are closing ... */
1645 if (!tty_closing || (o_tty && !o_tty_closing))
1646 return;
37bdfb07 1647
1da177e4
LT
1648#ifdef TTY_DEBUG_HANGUP
1649 printk(KERN_DEBUG "freeing tty structure...");
1650#endif
1651 /*
01e1abb2 1652 * Ask the line discipline code to release its structures
1da177e4 1653 */
01e1abb2 1654 tty_ldisc_release(tty, o_tty);
1da177e4 1655 /*
d5698c28 1656 * The release_tty function takes care of the details of clearing
1da177e4
LT
1657 * the slots and preserving the termios structure.
1658 */
d5698c28 1659 release_tty(tty, idx);
1da177e4 1660
1da177e4 1661 /* Make this pty number available for reallocation */
718a9163 1662 if (devpts)
15f1a633 1663 devpts_kill_index(inode, idx);
1da177e4
LT
1664}
1665
af9b897e 1666/**
15582d36 1667 * __tty_open - open a tty device
af9b897e
AC
1668 * @inode: inode of device file
1669 * @filp: file pointer to tty
1da177e4 1670 *
af9b897e
AC
1671 * tty_open and tty_release keep up the tty count that contains the
1672 * number of opens done on a tty. We cannot use the inode-count, as
1673 * different inodes might point to the same tty.
1da177e4 1674 *
af9b897e
AC
1675 * Open-counting is needed for pty masters, as well as for keeping
1676 * track of serial lines: DTR is dropped when the last close happens.
1677 * (This is not done solely through tty->count, now. - Ted 1/27/92)
1678 *
1679 * The termios state of a pty is reset on first open so that
1680 * settings don't persist across reuse.
1681 *
d81ed103 1682 * Locking: tty_mutex protects tty, get_tty_driver and tty_init_dev work.
24ec839c
PZ
1683 * tty->count should protect the rest.
1684 * ->siglock protects ->signal/->sighand
1da177e4 1685 */
af9b897e 1686
39d95b9d 1687static int __tty_open(struct inode *inode, struct file *filp)
1da177e4 1688{
4a2b5fdd 1689 struct tty_struct *tty = NULL;
1da177e4
LT
1690 int noctty, retval;
1691 struct tty_driver *driver;
1692 int index;
1693 dev_t device = inode->i_rdev;
846c151a 1694 unsigned saved_flags = filp->f_flags;
1da177e4
LT
1695
1696 nonseekable_open(inode, filp);
37bdfb07 1697
1da177e4
LT
1698retry_open:
1699 noctty = filp->f_flags & O_NOCTTY;
1700 index = -1;
1701 retval = 0;
37bdfb07 1702
70522e12 1703 mutex_lock(&tty_mutex);
1da177e4 1704
37bdfb07 1705 if (device == MKDEV(TTYAUX_MAJOR, 0)) {
24ec839c
PZ
1706 tty = get_current_tty();
1707 if (!tty) {
70522e12 1708 mutex_unlock(&tty_mutex);
1da177e4
LT
1709 return -ENXIO;
1710 }
7d7b93c1 1711 driver = tty_driver_kref_get(tty->driver);
24ec839c 1712 index = tty->index;
1da177e4
LT
1713 filp->f_flags |= O_NONBLOCK; /* Don't let /dev/tty block */
1714 /* noctty = 1; */
452a00d2
AC
1715 /* FIXME: Should we take a driver reference ? */
1716 tty_kref_put(tty);
1da177e4
LT
1717 goto got_driver;
1718 }
1719#ifdef CONFIG_VT
37bdfb07 1720 if (device == MKDEV(TTY_MAJOR, 0)) {
1da177e4 1721 extern struct tty_driver *console_driver;
7d7b93c1 1722 driver = tty_driver_kref_get(console_driver);
1da177e4
LT
1723 index = fg_console;
1724 noctty = 1;
1725 goto got_driver;
1726 }
1727#endif
37bdfb07 1728 if (device == MKDEV(TTYAUX_MAJOR, 1)) {
296fa7f6
WN
1729 struct tty_driver *console_driver = console_device(&index);
1730 if (console_driver) {
1731 driver = tty_driver_kref_get(console_driver);
1732 if (driver) {
1733 /* Don't let /dev/console block */
1734 filp->f_flags |= O_NONBLOCK;
1735 noctty = 1;
1736 goto got_driver;
1737 }
1da177e4 1738 }
70522e12 1739 mutex_unlock(&tty_mutex);
1da177e4
LT
1740 return -ENODEV;
1741 }
1742
1743 driver = get_tty_driver(device, &index);
1744 if (!driver) {
70522e12 1745 mutex_unlock(&tty_mutex);
1da177e4
LT
1746 return -ENODEV;
1747 }
1748got_driver:
4a2b5fdd
SB
1749 if (!tty) {
1750 /* check whether we're reopening an existing tty */
15f1a633 1751 tty = tty_driver_lookup_tty(driver, inode, index);
4a2b5fdd 1752
808ffa3d
EP
1753 if (IS_ERR(tty)) {
1754 mutex_unlock(&tty_mutex);
4a2b5fdd 1755 return PTR_ERR(tty);
808ffa3d 1756 }
4a2b5fdd
SB
1757 }
1758
1759 if (tty) {
1760 retval = tty_reopen(tty);
1761 if (retval)
1762 tty = ERR_PTR(retval);
1763 } else
1764 tty = tty_init_dev(driver, index, 0);
1765
70522e12 1766 mutex_unlock(&tty_mutex);
7d7b93c1 1767 tty_driver_kref_put(driver);
73ec06fc
AC
1768 if (IS_ERR(tty))
1769 return PTR_ERR(tty);
1da177e4
LT
1770
1771 filp->private_data = tty;
1772 file_move(filp, &tty->tty_files);
1773 check_tty_count(tty, "tty_open");
1774 if (tty->driver->type == TTY_DRIVER_TYPE_PTY &&
1775 tty->driver->subtype == PTY_TYPE_MASTER)
1776 noctty = 1;
1777#ifdef TTY_DEBUG_HANGUP
1778 printk(KERN_DEBUG "opening %s...", tty->name);
1779#endif
1780 if (!retval) {
f34d7a5b
AC
1781 if (tty->ops->open)
1782 retval = tty->ops->open(tty, filp);
1da177e4
LT
1783 else
1784 retval = -ENODEV;
1785 }
1786 filp->f_flags = saved_flags;
1787
37bdfb07
AC
1788 if (!retval && test_bit(TTY_EXCLUSIVE, &tty->flags) &&
1789 !capable(CAP_SYS_ADMIN))
1da177e4
LT
1790 retval = -EBUSY;
1791
1792 if (retval) {
1793#ifdef TTY_DEBUG_HANGUP
1794 printk(KERN_DEBUG "error %d in opening %s...", retval,
1795 tty->name);
1796#endif
d81ed103 1797 tty_release_dev(filp);
1da177e4
LT
1798 if (retval != -ERESTARTSYS)
1799 return retval;
1800 if (signal_pending(current))
1801 return retval;
1802 schedule();
1803 /*
1804 * Need to reset f_op in case a hangup happened.
1805 */
1806 if (filp->f_op == &hung_up_tty_fops)
1807 filp->f_op = &tty_fops;
1808 goto retry_open;
1809 }
24ec839c
PZ
1810
1811 mutex_lock(&tty_mutex);
1812 spin_lock_irq(&current->sighand->siglock);
1da177e4
LT
1813 if (!noctty &&
1814 current->signal->leader &&
1815 !current->signal->tty &&
ab521dc0 1816 tty->session == NULL)
2a65f1d9 1817 __proc_set_tty(current, tty);
24ec839c
PZ
1818 spin_unlock_irq(&current->sighand->siglock);
1819 mutex_unlock(&tty_mutex);
1da177e4
LT
1820 return 0;
1821}
1822
39d95b9d
JC
1823/* BKL pushdown: scary code avoidance wrapper */
1824static int tty_open(struct inode *inode, struct file *filp)
1825{
1826 int ret;
1827
1828 lock_kernel();
1829 ret = __tty_open(inode, filp);
1830 unlock_kernel();
1831 return ret;
1832}
1833
1834
1835
1da177e4 1836
af9b897e
AC
1837/**
1838 * tty_release - vfs callback for close
1839 * @inode: inode of tty
1840 * @filp: file pointer for handle to tty
1841 *
1842 * Called the last time each file handle is closed that references
1843 * this tty. There may however be several such references.
1844 *
1845 * Locking:
d81ed103 1846 * Takes bkl. See tty_release_dev
af9b897e
AC
1847 */
1848
37bdfb07 1849static int tty_release(struct inode *inode, struct file *filp)
1da177e4
LT
1850{
1851 lock_kernel();
d81ed103 1852 tty_release_dev(filp);
1da177e4
LT
1853 unlock_kernel();
1854 return 0;
1855}
1856
af9b897e
AC
1857/**
1858 * tty_poll - check tty status
1859 * @filp: file being polled
1860 * @wait: poll wait structures to update
1861 *
1862 * Call the line discipline polling method to obtain the poll
1863 * status of the device.
1864 *
1865 * Locking: locks called line discipline but ldisc poll method
1866 * may be re-entered freely by other callers.
1867 */
1868
37bdfb07 1869static unsigned int tty_poll(struct file *filp, poll_table *wait)
1da177e4 1870{
37bdfb07 1871 struct tty_struct *tty;
1da177e4
LT
1872 struct tty_ldisc *ld;
1873 int ret = 0;
1874
1875 tty = (struct tty_struct *)filp->private_data;
a7113a96 1876 if (tty_paranoia_check(tty, filp->f_path.dentry->d_inode, "tty_poll"))
1da177e4 1877 return 0;
37bdfb07 1878
1da177e4 1879 ld = tty_ldisc_ref_wait(tty);
a352def2
AC
1880 if (ld->ops->poll)
1881 ret = (ld->ops->poll)(tty, filp, wait);
1da177e4
LT
1882 tty_ldisc_deref(ld);
1883 return ret;
1884}
1885
37bdfb07 1886static int tty_fasync(int fd, struct file *filp, int on)
1da177e4 1887{
37bdfb07 1888 struct tty_struct *tty;
47f86834 1889 unsigned long flags;
5d1e3230 1890 int retval = 0;
1da177e4 1891
5d1e3230 1892 lock_kernel();
1da177e4 1893 tty = (struct tty_struct *)filp->private_data;
a7113a96 1894 if (tty_paranoia_check(tty, filp->f_path.dentry->d_inode, "tty_fasync"))
5d1e3230 1895 goto out;
37bdfb07 1896
1da177e4
LT
1897 retval = fasync_helper(fd, filp, on, &tty->fasync);
1898 if (retval <= 0)
5d1e3230 1899 goto out;
1da177e4
LT
1900
1901 if (on) {
ab521dc0
EB
1902 enum pid_type type;
1903 struct pid *pid;
1da177e4
LT
1904 if (!waitqueue_active(&tty->read_wait))
1905 tty->minimum_to_wake = 1;
47f86834 1906 spin_lock_irqsave(&tty->ctrl_lock, flags);
ab521dc0
EB
1907 if (tty->pgrp) {
1908 pid = tty->pgrp;
1909 type = PIDTYPE_PGID;
1910 } else {
1911 pid = task_pid(current);
1912 type = PIDTYPE_PID;
1913 }
47f86834 1914 spin_unlock_irqrestore(&tty->ctrl_lock, flags);
ab521dc0 1915 retval = __f_setown(filp, pid, type, 0);
1da177e4 1916 if (retval)
5d1e3230 1917 goto out;
1da177e4
LT
1918 } else {
1919 if (!tty->fasync && !waitqueue_active(&tty->read_wait))
1920 tty->minimum_to_wake = N_TTY_BUF_SIZE;
1921 }
5d1e3230
JC
1922 retval = 0;
1923out:
1924 unlock_kernel();
1925 return retval;
1da177e4
LT
1926}
1927
af9b897e
AC
1928/**
1929 * tiocsti - fake input character
1930 * @tty: tty to fake input into
1931 * @p: pointer to character
1932 *
3a4fa0a2 1933 * Fake input to a tty device. Does the necessary locking and
af9b897e
AC
1934 * input management.
1935 *
1936 * FIXME: does not honour flow control ??
1937 *
1938 * Locking:
1939 * Called functions take tty_ldisc_lock
1940 * current->signal->tty check is safe without locks
28298232
AC
1941 *
1942 * FIXME: may race normal receive processing
af9b897e
AC
1943 */
1944
1da177e4
LT
1945static int tiocsti(struct tty_struct *tty, char __user *p)
1946{
1947 char ch, mbz = 0;
1948 struct tty_ldisc *ld;
37bdfb07 1949
1da177e4
LT
1950 if ((current->signal->tty != tty) && !capable(CAP_SYS_ADMIN))
1951 return -EPERM;
1952 if (get_user(ch, p))
1953 return -EFAULT;
1e641743 1954 tty_audit_tiocsti(tty, ch);
1da177e4 1955 ld = tty_ldisc_ref_wait(tty);
a352def2 1956 ld->ops->receive_buf(tty, &ch, &mbz, 1);
1da177e4
LT
1957 tty_ldisc_deref(ld);
1958 return 0;
1959}
1960
af9b897e
AC
1961/**
1962 * tiocgwinsz - implement window query ioctl
1963 * @tty; tty
1964 * @arg: user buffer for result
1965 *
808a0d38 1966 * Copies the kernel idea of the window size into the user buffer.
af9b897e 1967 *
24ec839c 1968 * Locking: tty->termios_mutex is taken to ensure the winsize data
808a0d38 1969 * is consistent.
af9b897e
AC
1970 */
1971
37bdfb07 1972static int tiocgwinsz(struct tty_struct *tty, struct winsize __user *arg)
1da177e4 1973{
808a0d38
AC
1974 int err;
1975
5785c95b 1976 mutex_lock(&tty->termios_mutex);
808a0d38 1977 err = copy_to_user(arg, &tty->winsize, sizeof(*arg));
5785c95b 1978 mutex_unlock(&tty->termios_mutex);
808a0d38
AC
1979
1980 return err ? -EFAULT: 0;
1da177e4
LT
1981}
1982
af9b897e 1983/**
8c9a9dd0
AC
1984 * tty_do_resize - resize event
1985 * @tty: tty being resized
8c9a9dd0
AC
1986 * @rows: rows (character)
1987 * @cols: cols (character)
1988 *
1989 * Update the termios variables and send the neccessary signals to
1990 * peform a terminal resize correctly
af9b897e
AC
1991 */
1992
fc6f6238 1993int tty_do_resize(struct tty_struct *tty, struct winsize *ws)
1da177e4 1994{
fc6f6238 1995 struct pid *pgrp;
47f86834 1996 unsigned long flags;
1da177e4 1997
fc6f6238
AC
1998 /* Lock the tty */
1999 mutex_lock(&tty->termios_mutex);
2000 if (!memcmp(ws, &tty->winsize, sizeof(*ws)))
ca9bda00 2001 goto done;
47f86834
AC
2002 /* Get the PID values and reference them so we can
2003 avoid holding the tty ctrl lock while sending signals */
2004 spin_lock_irqsave(&tty->ctrl_lock, flags);
2005 pgrp = get_pid(tty->pgrp);
47f86834
AC
2006 spin_unlock_irqrestore(&tty->ctrl_lock, flags);
2007
2008 if (pgrp)
2009 kill_pgrp(pgrp, SIGWINCH, 1);
47f86834 2010 put_pid(pgrp);
47f86834 2011
8c9a9dd0 2012 tty->winsize = *ws;
ca9bda00 2013done:
fc6f6238 2014 mutex_unlock(&tty->termios_mutex);
1da177e4
LT
2015 return 0;
2016}
2017
8c9a9dd0
AC
2018/**
2019 * tiocswinsz - implement window size set ioctl
fc6f6238 2020 * @tty; tty side of tty
8c9a9dd0
AC
2021 * @arg: user buffer for result
2022 *
2023 * Copies the user idea of the window size to the kernel. Traditionally
2024 * this is just advisory information but for the Linux console it
2025 * actually has driver level meaning and triggers a VC resize.
2026 *
2027 * Locking:
2028 * Driver dependant. The default do_resize method takes the
2029 * tty termios mutex and ctrl_lock. The console takes its own lock
2030 * then calls into the default method.
2031 */
2032
fc6f6238 2033static int tiocswinsz(struct tty_struct *tty, struct winsize __user *arg)
8c9a9dd0
AC
2034{
2035 struct winsize tmp_ws;
2036 if (copy_from_user(&tmp_ws, arg, sizeof(*arg)))
2037 return -EFAULT;
2038
2039 if (tty->ops->resize)
fc6f6238 2040 return tty->ops->resize(tty, &tmp_ws);
8c9a9dd0 2041 else
fc6f6238 2042 return tty_do_resize(tty, &tmp_ws);
8c9a9dd0
AC
2043}
2044
af9b897e
AC
2045/**
2046 * tioccons - allow admin to move logical console
2047 * @file: the file to become console
2048 *
2049 * Allow the adminstrator to move the redirected console device
2050 *
2051 * Locking: uses redirect_lock to guard the redirect information
2052 */
2053
1da177e4
LT
2054static int tioccons(struct file *file)
2055{
2056 if (!capable(CAP_SYS_ADMIN))
2057 return -EPERM;
2058 if (file->f_op->write == redirected_tty_write) {
2059 struct file *f;
2060 spin_lock(&redirect_lock);
2061 f = redirect;
2062 redirect = NULL;
2063 spin_unlock(&redirect_lock);
2064 if (f)
2065 fput(f);
2066 return 0;
2067 }
2068 spin_lock(&redirect_lock);
2069 if (redirect) {
2070 spin_unlock(&redirect_lock);
2071 return -EBUSY;
2072 }
2073 get_file(file);
2074 redirect = file;
2075 spin_unlock(&redirect_lock);
2076 return 0;
2077}
2078
af9b897e
AC
2079/**
2080 * fionbio - non blocking ioctl
2081 * @file: file to set blocking value
2082 * @p: user parameter
2083 *
2084 * Historical tty interfaces had a blocking control ioctl before
2085 * the generic functionality existed. This piece of history is preserved
2086 * in the expected tty API of posix OS's.
2087 *
6146b9af 2088 * Locking: none, the open file handle ensures it won't go away.
af9b897e 2089 */
1da177e4
LT
2090
2091static int fionbio(struct file *file, int __user *p)
2092{
2093 int nonblock;
2094
2095 if (get_user(nonblock, p))
2096 return -EFAULT;
2097
db1dd4d3 2098 spin_lock(&file->f_lock);
1da177e4
LT
2099 if (nonblock)
2100 file->f_flags |= O_NONBLOCK;
2101 else
2102 file->f_flags &= ~O_NONBLOCK;
db1dd4d3 2103 spin_unlock(&file->f_lock);
1da177e4
LT
2104 return 0;
2105}
2106
af9b897e
AC
2107/**
2108 * tiocsctty - set controlling tty
2109 * @tty: tty structure
2110 * @arg: user argument
2111 *
2112 * This ioctl is used to manage job control. It permits a session
2113 * leader to set this tty as the controlling tty for the session.
2114 *
2115 * Locking:
28298232 2116 * Takes tty_mutex() to protect tty instance
24ec839c
PZ
2117 * Takes tasklist_lock internally to walk sessions
2118 * Takes ->siglock() when updating signal->tty
af9b897e
AC
2119 */
2120
1da177e4
LT
2121static int tiocsctty(struct tty_struct *tty, int arg)
2122{
24ec839c 2123 int ret = 0;
ab521dc0 2124 if (current->signal->leader && (task_session(current) == tty->session))
24ec839c
PZ
2125 return ret;
2126
2127 mutex_lock(&tty_mutex);
1da177e4
LT
2128 /*
2129 * The process must be a session leader and
2130 * not have a controlling tty already.
2131 */
24ec839c
PZ
2132 if (!current->signal->leader || current->signal->tty) {
2133 ret = -EPERM;
2134 goto unlock;
2135 }
2136
ab521dc0 2137 if (tty->session) {
1da177e4
LT
2138 /*
2139 * This tty is already the controlling
2140 * tty for another session group!
2141 */
37bdfb07 2142 if (arg == 1 && capable(CAP_SYS_ADMIN)) {
1da177e4
LT
2143 /*
2144 * Steal it away
2145 */
1da177e4 2146 read_lock(&tasklist_lock);
24ec839c 2147 session_clear_tty(tty->session);
1da177e4 2148 read_unlock(&tasklist_lock);
24ec839c
PZ
2149 } else {
2150 ret = -EPERM;
2151 goto unlock;
2152 }
1da177e4 2153 }
24ec839c
PZ
2154 proc_set_tty(current, tty);
2155unlock:
28298232 2156 mutex_unlock(&tty_mutex);
24ec839c 2157 return ret;
1da177e4
LT
2158}
2159
5d0fdf1e
AC
2160/**
2161 * tty_get_pgrp - return a ref counted pgrp pid
2162 * @tty: tty to read
2163 *
2164 * Returns a refcounted instance of the pid struct for the process
2165 * group controlling the tty.
2166 */
2167
2168struct pid *tty_get_pgrp(struct tty_struct *tty)
2169{
2170 unsigned long flags;
2171 struct pid *pgrp;
2172
2173 spin_lock_irqsave(&tty->ctrl_lock, flags);
2174 pgrp = get_pid(tty->pgrp);
2175 spin_unlock_irqrestore(&tty->ctrl_lock, flags);
2176
2177 return pgrp;
2178}
2179EXPORT_SYMBOL_GPL(tty_get_pgrp);
2180
af9b897e
AC
2181/**
2182 * tiocgpgrp - get process group
2183 * @tty: tty passed by user
2184 * @real_tty: tty side of the tty pased by the user if a pty else the tty
2185 * @p: returned pid
2186 *
2187 * Obtain the process group of the tty. If there is no process group
2188 * return an error.
2189 *
24ec839c 2190 * Locking: none. Reference to current->signal->tty is safe.
af9b897e
AC
2191 */
2192
1da177e4
LT
2193static int tiocgpgrp(struct tty_struct *tty, struct tty_struct *real_tty, pid_t __user *p)
2194{
5d0fdf1e
AC
2195 struct pid *pid;
2196 int ret;
1da177e4
LT
2197 /*
2198 * (tty == real_tty) is a cheap way of
2199 * testing if the tty is NOT a master pty.
2200 */
2201 if (tty == real_tty && current->signal->tty != real_tty)
2202 return -ENOTTY;
5d0fdf1e
AC
2203 pid = tty_get_pgrp(real_tty);
2204 ret = put_user(pid_vnr(pid), p);
2205 put_pid(pid);
2206 return ret;
1da177e4
LT
2207}
2208
af9b897e
AC
2209/**
2210 * tiocspgrp - attempt to set process group
2211 * @tty: tty passed by user
2212 * @real_tty: tty side device matching tty passed by user
2213 * @p: pid pointer
2214 *
2215 * Set the process group of the tty to the session passed. Only
2216 * permitted where the tty session is our session.
2217 *
47f86834 2218 * Locking: RCU, ctrl lock
af9b897e
AC
2219 */
2220
1da177e4
LT
2221static int tiocspgrp(struct tty_struct *tty, struct tty_struct *real_tty, pid_t __user *p)
2222{
04a2e6a5
EB
2223 struct pid *pgrp;
2224 pid_t pgrp_nr;
1da177e4 2225 int retval = tty_check_change(real_tty);
47f86834 2226 unsigned long flags;
1da177e4
LT
2227
2228 if (retval == -EIO)
2229 return -ENOTTY;
2230 if (retval)
2231 return retval;
2232 if (!current->signal->tty ||
2233 (current->signal->tty != real_tty) ||
ab521dc0 2234 (real_tty->session != task_session(current)))
1da177e4 2235 return -ENOTTY;
04a2e6a5 2236 if (get_user(pgrp_nr, p))
1da177e4 2237 return -EFAULT;
04a2e6a5 2238 if (pgrp_nr < 0)
1da177e4 2239 return -EINVAL;
04a2e6a5 2240 rcu_read_lock();
b488893a 2241 pgrp = find_vpid(pgrp_nr);
04a2e6a5
EB
2242 retval = -ESRCH;
2243 if (!pgrp)
2244 goto out_unlock;
2245 retval = -EPERM;
2246 if (session_of_pgrp(pgrp) != task_session(current))
2247 goto out_unlock;
2248 retval = 0;
47f86834 2249 spin_lock_irqsave(&tty->ctrl_lock, flags);
ab521dc0
EB
2250 put_pid(real_tty->pgrp);
2251 real_tty->pgrp = get_pid(pgrp);
47f86834 2252 spin_unlock_irqrestore(&tty->ctrl_lock, flags);
04a2e6a5
EB
2253out_unlock:
2254 rcu_read_unlock();
2255 return retval;
1da177e4
LT
2256}
2257
af9b897e
AC
2258/**
2259 * tiocgsid - get session id
2260 * @tty: tty passed by user
2261 * @real_tty: tty side of the tty pased by the user if a pty else the tty
2262 * @p: pointer to returned session id
2263 *
2264 * Obtain the session id of the tty. If there is no session
2265 * return an error.
2266 *
24ec839c 2267 * Locking: none. Reference to current->signal->tty is safe.
af9b897e
AC
2268 */
2269
1da177e4
LT
2270static int tiocgsid(struct tty_struct *tty, struct tty_struct *real_tty, pid_t __user *p)
2271{
2272 /*
2273 * (tty == real_tty) is a cheap way of
2274 * testing if the tty is NOT a master pty.
2275 */
2276 if (tty == real_tty && current->signal->tty != real_tty)
2277 return -ENOTTY;
ab521dc0 2278 if (!real_tty->session)
1da177e4 2279 return -ENOTTY;
b488893a 2280 return put_user(pid_vnr(real_tty->session), p);
1da177e4
LT
2281}
2282
af9b897e
AC
2283/**
2284 * tiocsetd - set line discipline
2285 * @tty: tty device
2286 * @p: pointer to user data
2287 *
2288 * Set the line discipline according to user request.
2289 *
2290 * Locking: see tty_set_ldisc, this function is just a helper
2291 */
2292
1da177e4
LT
2293static int tiocsetd(struct tty_struct *tty, int __user *p)
2294{
2295 int ldisc;
04f378b1 2296 int ret;
1da177e4
LT
2297
2298 if (get_user(ldisc, p))
2299 return -EFAULT;
04f378b1
AC
2300
2301 lock_kernel();
2302 ret = tty_set_ldisc(tty, ldisc);
2303 unlock_kernel();
2304
2305 return ret;
1da177e4
LT
2306}
2307
af9b897e
AC
2308/**
2309 * send_break - performed time break
2310 * @tty: device to break on
2311 * @duration: timeout in mS
2312 *
2313 * Perform a timed break on hardware that lacks its own driver level
2314 * timed break functionality.
2315 *
2316 * Locking:
28298232 2317 * atomic_write_lock serializes
af9b897e 2318 *
af9b897e
AC
2319 */
2320
b20f3ae5 2321static int send_break(struct tty_struct *tty, unsigned int duration)
1da177e4 2322{
9e98966c
AC
2323 int retval;
2324
2325 if (tty->ops->break_ctl == NULL)
2326 return 0;
2327
2328 if (tty->driver->flags & TTY_DRIVER_HARDWARE_BREAK)
2329 retval = tty->ops->break_ctl(tty, duration);
2330 else {
2331 /* Do the work ourselves */
2332 if (tty_write_lock(tty, 0) < 0)
2333 return -EINTR;
2334 retval = tty->ops->break_ctl(tty, -1);
2335 if (retval)
2336 goto out;
2337 if (!signal_pending(current))
2338 msleep_interruptible(duration);
2339 retval = tty->ops->break_ctl(tty, 0);
2340out:
2341 tty_write_unlock(tty);
2342 if (signal_pending(current))
2343 retval = -EINTR;
2344 }
2345 return retval;
1da177e4
LT
2346}
2347
af9b897e 2348/**
f34d7a5b 2349 * tty_tiocmget - get modem status
af9b897e
AC
2350 * @tty: tty device
2351 * @file: user file pointer
2352 * @p: pointer to result
2353 *
2354 * Obtain the modem status bits from the tty driver if the feature
2355 * is supported. Return -EINVAL if it is not available.
2356 *
2357 * Locking: none (up to the driver)
2358 */
2359
2360static int tty_tiocmget(struct tty_struct *tty, struct file *file, int __user *p)
1da177e4
LT
2361{
2362 int retval = -EINVAL;
2363
f34d7a5b
AC
2364 if (tty->ops->tiocmget) {
2365 retval = tty->ops->tiocmget(tty, file);
1da177e4
LT
2366
2367 if (retval >= 0)
2368 retval = put_user(retval, p);
2369 }
2370 return retval;
2371}
2372
af9b897e 2373/**
f34d7a5b 2374 * tty_tiocmset - set modem status
af9b897e
AC
2375 * @tty: tty device
2376 * @file: user file pointer
2377 * @cmd: command - clear bits, set bits or set all
2378 * @p: pointer to desired bits
2379 *
2380 * Set the modem status bits from the tty driver if the feature
2381 * is supported. Return -EINVAL if it is not available.
2382 *
2383 * Locking: none (up to the driver)
2384 */
2385
2386static int tty_tiocmset(struct tty_struct *tty, struct file *file, unsigned int cmd,
1da177e4
LT
2387 unsigned __user *p)
2388{
ae677517
AC
2389 int retval;
2390 unsigned int set, clear, val;
1da177e4 2391
ae677517
AC
2392 if (tty->ops->tiocmset == NULL)
2393 return -EINVAL;
1da177e4 2394
ae677517
AC
2395 retval = get_user(val, p);
2396 if (retval)
2397 return retval;
2398 set = clear = 0;
2399 switch (cmd) {
2400 case TIOCMBIS:
2401 set = val;
2402 break;
2403 case TIOCMBIC:
2404 clear = val;
2405 break;
2406 case TIOCMSET:
2407 set = val;
2408 clear = ~val;
2409 break;
2410 }
2411 set &= TIOCM_DTR|TIOCM_RTS|TIOCM_OUT1|TIOCM_OUT2|TIOCM_LOOP;
2412 clear &= TIOCM_DTR|TIOCM_RTS|TIOCM_OUT1|TIOCM_OUT2|TIOCM_LOOP;
2413 return tty->ops->tiocmset(tty, file, set, clear);
1da177e4
LT
2414}
2415
e8b70e7d
AC
2416struct tty_struct *tty_pair_get_tty(struct tty_struct *tty)
2417{
2418 if (tty->driver->type == TTY_DRIVER_TYPE_PTY &&
2419 tty->driver->subtype == PTY_TYPE_MASTER)
2420 tty = tty->link;
2421 return tty;
2422}
2423EXPORT_SYMBOL(tty_pair_get_tty);
2424
2425struct tty_struct *tty_pair_get_pty(struct tty_struct *tty)
2426{
2427 if (tty->driver->type == TTY_DRIVER_TYPE_PTY &&
2428 tty->driver->subtype == PTY_TYPE_MASTER)
2429 return tty;
2430 return tty->link;
2431}
2432EXPORT_SYMBOL(tty_pair_get_pty);
2433
1da177e4
LT
2434/*
2435 * Split this up, as gcc can choke on it otherwise..
2436 */
04f378b1 2437long tty_ioctl(struct file *file, unsigned int cmd, unsigned long arg)
1da177e4
LT
2438{
2439 struct tty_struct *tty, *real_tty;
2440 void __user *p = (void __user *)arg;
2441 int retval;
2442 struct tty_ldisc *ld;
04f378b1 2443 struct inode *inode = file->f_dentry->d_inode;
37bdfb07 2444
1da177e4
LT
2445 tty = (struct tty_struct *)file->private_data;
2446 if (tty_paranoia_check(tty, inode, "tty_ioctl"))
2447 return -EINVAL;
2448
e8b70e7d 2449 real_tty = tty_pair_get_tty(tty);
1da177e4
LT
2450
2451 /*
2452 * Factor out some common prep work
2453 */
2454 switch (cmd) {
2455 case TIOCSETD:
2456 case TIOCSBRK:
2457 case TIOCCBRK:
2458 case TCSBRK:
37bdfb07 2459 case TCSBRKP:
1da177e4
LT
2460 retval = tty_check_change(tty);
2461 if (retval)
2462 return retval;
2463 if (cmd != TIOCCBRK) {
2464 tty_wait_until_sent(tty, 0);
2465 if (signal_pending(current))
2466 return -EINTR;
2467 }
2468 break;
2469 }
2470
9e98966c
AC
2471 /*
2472 * Now do the stuff.
2473 */
1da177e4 2474 switch (cmd) {
37bdfb07
AC
2475 case TIOCSTI:
2476 return tiocsti(tty, p);
2477 case TIOCGWINSZ:
8f520021 2478 return tiocgwinsz(real_tty, p);
37bdfb07 2479 case TIOCSWINSZ:
fc6f6238 2480 return tiocswinsz(real_tty, p);
37bdfb07
AC
2481 case TIOCCONS:
2482 return real_tty != tty ? -EINVAL : tioccons(file);
2483 case FIONBIO:
2484 return fionbio(file, p);
2485 case TIOCEXCL:
2486 set_bit(TTY_EXCLUSIVE, &tty->flags);
2487 return 0;
2488 case TIOCNXCL:
2489 clear_bit(TTY_EXCLUSIVE, &tty->flags);
2490 return 0;
2491 case TIOCNOTTY:
2492 if (current->signal->tty != tty)
2493 return -ENOTTY;
2494 no_tty();
2495 return 0;
2496 case TIOCSCTTY:
2497 return tiocsctty(tty, arg);
2498 case TIOCGPGRP:
2499 return tiocgpgrp(tty, real_tty, p);
2500 case TIOCSPGRP:
2501 return tiocspgrp(tty, real_tty, p);
2502 case TIOCGSID:
2503 return tiocgsid(tty, real_tty, p);
2504 case TIOCGETD:
c65c9bc3 2505 return put_user(tty->ldisc->ops->num, (int __user *)p);
37bdfb07
AC
2506 case TIOCSETD:
2507 return tiocsetd(tty, p);
37bdfb07
AC
2508 /*
2509 * Break handling
2510 */
2511 case TIOCSBRK: /* Turn break on, unconditionally */
f34d7a5b 2512 if (tty->ops->break_ctl)
9e98966c 2513 return tty->ops->break_ctl(tty, -1);
37bdfb07 2514 return 0;
37bdfb07 2515 case TIOCCBRK: /* Turn break off, unconditionally */
f34d7a5b 2516 if (tty->ops->break_ctl)
9e98966c 2517 return tty->ops->break_ctl(tty, 0);
37bdfb07
AC
2518 return 0;
2519 case TCSBRK: /* SVID version: non-zero arg --> no break */
2520 /* non-zero arg means wait for all output data
2521 * to be sent (performed above) but don't send break.
2522 * This is used by the tcdrain() termios function.
2523 */
2524 if (!arg)
2525 return send_break(tty, 250);
2526 return 0;
2527 case TCSBRKP: /* support for POSIX tcsendbreak() */
2528 return send_break(tty, arg ? arg*100 : 250);
2529
2530 case TIOCMGET:
2531 return tty_tiocmget(tty, file, p);
2532 case TIOCMSET:
2533 case TIOCMBIC:
2534 case TIOCMBIS:
2535 return tty_tiocmset(tty, file, cmd, p);
2536 case TCFLSH:
2537 switch (arg) {
2538 case TCIFLUSH:
2539 case TCIOFLUSH:
2540 /* flush tty buffer and allow ldisc to process ioctl */
2541 tty_buffer_flush(tty);
c5c34d48 2542 break;
37bdfb07
AC
2543 }
2544 break;
1da177e4 2545 }
f34d7a5b
AC
2546 if (tty->ops->ioctl) {
2547 retval = (tty->ops->ioctl)(tty, file, cmd, arg);
1da177e4
LT
2548 if (retval != -ENOIOCTLCMD)
2549 return retval;
2550 }
2551 ld = tty_ldisc_ref_wait(tty);
2552 retval = -EINVAL;
a352def2
AC
2553 if (ld->ops->ioctl) {
2554 retval = ld->ops->ioctl(tty, file, cmd, arg);
1da177e4
LT
2555 if (retval == -ENOIOCTLCMD)
2556 retval = -EINVAL;
2557 }
2558 tty_ldisc_deref(ld);
2559 return retval;
2560}
2561
e10cc1df 2562#ifdef CONFIG_COMPAT
37bdfb07 2563static long tty_compat_ioctl(struct file *file, unsigned int cmd,
e10cc1df
PF
2564 unsigned long arg)
2565{
2566 struct inode *inode = file->f_dentry->d_inode;
2567 struct tty_struct *tty = file->private_data;
2568 struct tty_ldisc *ld;
2569 int retval = -ENOIOCTLCMD;
2570
2571 if (tty_paranoia_check(tty, inode, "tty_ioctl"))
2572 return -EINVAL;
2573
f34d7a5b
AC
2574 if (tty->ops->compat_ioctl) {
2575 retval = (tty->ops->compat_ioctl)(tty, file, cmd, arg);
e10cc1df
PF
2576 if (retval != -ENOIOCTLCMD)
2577 return retval;
2578 }
2579
2580 ld = tty_ldisc_ref_wait(tty);
a352def2
AC
2581 if (ld->ops->compat_ioctl)
2582 retval = ld->ops->compat_ioctl(tty, file, cmd, arg);
e10cc1df
PF
2583 tty_ldisc_deref(ld);
2584
2585 return retval;
2586}
2587#endif
1da177e4
LT
2588
2589/*
2590 * This implements the "Secure Attention Key" --- the idea is to
2591 * prevent trojan horses by killing all processes associated with this
2592 * tty when the user hits the "Secure Attention Key". Required for
2593 * super-paranoid applications --- see the Orange Book for more details.
37bdfb07 2594 *
1da177e4
LT
2595 * This code could be nicer; ideally it should send a HUP, wait a few
2596 * seconds, then send a INT, and then a KILL signal. But you then
2597 * have to coordinate with the init process, since all processes associated
2598 * with the current tty must be dead before the new getty is allowed
2599 * to spawn.
2600 *
2601 * Now, if it would be correct ;-/ The current code has a nasty hole -
2602 * it doesn't catch files in flight. We may send the descriptor to ourselves
2603 * via AF_UNIX socket, close it and later fetch from socket. FIXME.
2604 *
2605 * Nasty bug: do_SAK is being called in interrupt context. This can
2606 * deadlock. We punt it up to process context. AKPM - 16Mar2001
2607 */
8b6312f4 2608void __do_SAK(struct tty_struct *tty)
1da177e4
LT
2609{
2610#ifdef TTY_SOFT_SAK
2611 tty_hangup(tty);
2612#else
652486fb 2613 struct task_struct *g, *p;
ab521dc0 2614 struct pid *session;
1da177e4
LT
2615 int i;
2616 struct file *filp;
badf1662 2617 struct fdtable *fdt;
37bdfb07 2618
1da177e4
LT
2619 if (!tty)
2620 return;
24ec839c 2621 session = tty->session;
37bdfb07 2622
b3f13deb 2623 tty_ldisc_flush(tty);
1da177e4 2624
f34d7a5b 2625 tty_driver_flush_buffer(tty);
37bdfb07 2626
1da177e4 2627 read_lock(&tasklist_lock);
652486fb 2628 /* Kill the entire session */
ab521dc0 2629 do_each_pid_task(session, PIDTYPE_SID, p) {
652486fb 2630 printk(KERN_NOTICE "SAK: killed process %d"
1b0f7ffd 2631 " (%s): task_session(p)==tty->session\n",
ba25f9dc 2632 task_pid_nr(p), p->comm);
652486fb 2633 send_sig(SIGKILL, p, 1);
ab521dc0 2634 } while_each_pid_task(session, PIDTYPE_SID, p);
652486fb
EB
2635 /* Now kill any processes that happen to have the
2636 * tty open.
2637 */
2638 do_each_thread(g, p) {
2639 if (p->signal->tty == tty) {
1da177e4 2640 printk(KERN_NOTICE "SAK: killed process %d"
1b0f7ffd 2641 " (%s): task_session(p)==tty->session\n",
ba25f9dc 2642 task_pid_nr(p), p->comm);
1da177e4
LT
2643 send_sig(SIGKILL, p, 1);
2644 continue;
2645 }
2646 task_lock(p);
2647 if (p->files) {
ca99c1da
DS
2648 /*
2649 * We don't take a ref to the file, so we must
2650 * hold ->file_lock instead.
2651 */
2652 spin_lock(&p->files->file_lock);
badf1662 2653 fdt = files_fdtable(p->files);
37bdfb07 2654 for (i = 0; i < fdt->max_fds; i++) {
1da177e4
LT
2655 filp = fcheck_files(p->files, i);
2656 if (!filp)
2657 continue;
2658 if (filp->f_op->read == tty_read &&
2659 filp->private_data == tty) {
2660 printk(KERN_NOTICE "SAK: killed process %d"
2661 " (%s): fd#%d opened to the tty\n",
ba25f9dc 2662 task_pid_nr(p), p->comm, i);
20ac9437 2663 force_sig(SIGKILL, p);
1da177e4
LT
2664 break;
2665 }
2666 }
ca99c1da 2667 spin_unlock(&p->files->file_lock);
1da177e4
LT
2668 }
2669 task_unlock(p);
652486fb 2670 } while_each_thread(g, p);
1da177e4
LT
2671 read_unlock(&tasklist_lock);
2672#endif
2673}
2674
8b6312f4
EB
2675static void do_SAK_work(struct work_struct *work)
2676{
2677 struct tty_struct *tty =
2678 container_of(work, struct tty_struct, SAK_work);
2679 __do_SAK(tty);
2680}
2681
1da177e4
LT
2682/*
2683 * The tq handling here is a little racy - tty->SAK_work may already be queued.
2684 * Fortunately we don't need to worry, because if ->SAK_work is already queued,
2685 * the values which we write to it will be identical to the values which it
2686 * already has. --akpm
2687 */
2688void do_SAK(struct tty_struct *tty)
2689{
2690 if (!tty)
2691 return;
1da177e4
LT
2692 schedule_work(&tty->SAK_work);
2693}
2694
2695EXPORT_SYMBOL(do_SAK);
2696
af9b897e
AC
2697/**
2698 * initialize_tty_struct
2699 * @tty: tty to initialize
2700 *
2701 * This subroutine initializes a tty structure that has been newly
2702 * allocated.
2703 *
2704 * Locking: none - tty in question must not be exposed at this point
1da177e4 2705 */
af9b897e 2706
bf970ee4
AC
2707void initialize_tty_struct(struct tty_struct *tty,
2708 struct tty_driver *driver, int idx)
1da177e4
LT
2709{
2710 memset(tty, 0, sizeof(struct tty_struct));
9c9f4ded 2711 kref_init(&tty->kref);
1da177e4 2712 tty->magic = TTY_MAGIC;
01e1abb2 2713 tty_ldisc_init(tty);
ab521dc0
EB
2714 tty->session = NULL;
2715 tty->pgrp = NULL;
1da177e4 2716 tty->overrun_time = jiffies;
33f0f88f
AC
2717 tty->buf.head = tty->buf.tail = NULL;
2718 tty_buffer_init(tty);
5785c95b 2719 mutex_init(&tty->termios_mutex);
c65c9bc3 2720 mutex_init(&tty->ldisc_mutex);
1da177e4
LT
2721 init_waitqueue_head(&tty->write_wait);
2722 init_waitqueue_head(&tty->read_wait);
65f27f38 2723 INIT_WORK(&tty->hangup_work, do_tty_hangup);
70522e12
IM
2724 mutex_init(&tty->atomic_read_lock);
2725 mutex_init(&tty->atomic_write_lock);
a88a69c9
JP
2726 mutex_init(&tty->output_lock);
2727 mutex_init(&tty->echo_lock);
1da177e4 2728 spin_lock_init(&tty->read_lock);
04f378b1 2729 spin_lock_init(&tty->ctrl_lock);
1da177e4 2730 INIT_LIST_HEAD(&tty->tty_files);
7f1f86a0 2731 INIT_WORK(&tty->SAK_work, do_SAK_work);
bf970ee4
AC
2732
2733 tty->driver = driver;
2734 tty->ops = driver->ops;
2735 tty->index = idx;
2736 tty_line_name(driver, idx, tty->name);
1da177e4
LT
2737}
2738
f34d7a5b
AC
2739/**
2740 * tty_put_char - write one character to a tty
2741 * @tty: tty
2742 * @ch: character
2743 *
2744 * Write one byte to the tty using the provided put_char method
2745 * if present. Returns the number of characters successfully output.
2746 *
2747 * Note: the specific put_char operation in the driver layer may go
2748 * away soon. Don't call it directly, use this method
1da177e4 2749 */
af9b897e 2750
f34d7a5b 2751int tty_put_char(struct tty_struct *tty, unsigned char ch)
1da177e4 2752{
f34d7a5b
AC
2753 if (tty->ops->put_char)
2754 return tty->ops->put_char(tty, ch);
2755 return tty->ops->write(tty, &ch, 1);
1da177e4 2756}
f34d7a5b
AC
2757EXPORT_SYMBOL_GPL(tty_put_char);
2758
d81ed103 2759struct class *tty_class;
1da177e4
LT
2760
2761/**
af9b897e
AC
2762 * tty_register_device - register a tty device
2763 * @driver: the tty driver that describes the tty device
2764 * @index: the index in the tty driver for this tty device
2765 * @device: a struct device that is associated with this tty device.
2766 * This field is optional, if there is no known struct device
2767 * for this tty device it can be set to NULL safely.
1da177e4 2768 *
01107d34
GKH
2769 * Returns a pointer to the struct device for this tty device
2770 * (or ERR_PTR(-EFOO) on error).
1cdcb6b4 2771 *
af9b897e
AC
2772 * This call is required to be made to register an individual tty device
2773 * if the tty driver's flags have the TTY_DRIVER_DYNAMIC_DEV bit set. If
2774 * that bit is not set, this function should not be called by a tty
2775 * driver.
2776 *
2777 * Locking: ??
1da177e4 2778 */
af9b897e 2779
01107d34
GKH
2780struct device *tty_register_device(struct tty_driver *driver, unsigned index,
2781 struct device *device)
1da177e4
LT
2782{
2783 char name[64];
2784 dev_t dev = MKDEV(driver->major, driver->minor_start) + index;
2785
2786 if (index >= driver->num) {
2787 printk(KERN_ERR "Attempt to register invalid tty line number "
2788 " (%d).\n", index);
1cdcb6b4 2789 return ERR_PTR(-EINVAL);
1da177e4
LT
2790 }
2791
1da177e4
LT
2792 if (driver->type == TTY_DRIVER_TYPE_PTY)
2793 pty_line_name(driver, index, name);
2794 else
2795 tty_line_name(driver, index, name);
1cdcb6b4 2796
03457cd4 2797 return device_create(tty_class, device, dev, NULL, name);
1da177e4 2798}
7d7b93c1 2799EXPORT_SYMBOL(tty_register_device);
1da177e4
LT
2800
2801/**
af9b897e
AC
2802 * tty_unregister_device - unregister a tty device
2803 * @driver: the tty driver that describes the tty device
2804 * @index: the index in the tty driver for this tty device
1da177e4 2805 *
af9b897e
AC
2806 * If a tty device is registered with a call to tty_register_device() then
2807 * this function must be called when the tty device is gone.
2808 *
2809 * Locking: ??
1da177e4 2810 */
af9b897e 2811
1da177e4
LT
2812void tty_unregister_device(struct tty_driver *driver, unsigned index)
2813{
37bdfb07
AC
2814 device_destroy(tty_class,
2815 MKDEV(driver->major, driver->minor_start) + index);
1da177e4 2816}
1da177e4
LT
2817EXPORT_SYMBOL(tty_unregister_device);
2818
2819struct tty_driver *alloc_tty_driver(int lines)
2820{
2821 struct tty_driver *driver;
2822
506eb99a 2823 driver = kzalloc(sizeof(struct tty_driver), GFP_KERNEL);
1da177e4 2824 if (driver) {
7d7b93c1 2825 kref_init(&driver->kref);
1da177e4
LT
2826 driver->magic = TTY_DRIVER_MAGIC;
2827 driver->num = lines;
2828 /* later we'll move allocation of tables here */
2829 }
2830 return driver;
2831}
7d7b93c1 2832EXPORT_SYMBOL(alloc_tty_driver);
1da177e4 2833
7d7b93c1 2834static void destruct_tty_driver(struct kref *kref)
1da177e4 2835{
7d7b93c1
AC
2836 struct tty_driver *driver = container_of(kref, struct tty_driver, kref);
2837 int i;
2838 struct ktermios *tp;
2839 void *p;
2840
2841 if (driver->flags & TTY_DRIVER_INSTALLED) {
2842 /*
2843 * Free the termios and termios_locked structures because
2844 * we don't want to get memory leaks when modular tty
2845 * drivers are removed from the kernel.
2846 */
2847 for (i = 0; i < driver->num; i++) {
2848 tp = driver->termios[i];
2849 if (tp) {
2850 driver->termios[i] = NULL;
2851 kfree(tp);
2852 }
7d7b93c1
AC
2853 if (!(driver->flags & TTY_DRIVER_DYNAMIC_DEV))
2854 tty_unregister_device(driver, i);
2855 }
2856 p = driver->ttys;
2857 proc_tty_unregister_driver(driver);
2858 driver->ttys = NULL;
fe6e29fd 2859 driver->termios = NULL;
7d7b93c1
AC
2860 kfree(p);
2861 cdev_del(&driver->cdev);
2862 }
1da177e4
LT
2863 kfree(driver);
2864}
2865
7d7b93c1
AC
2866void tty_driver_kref_put(struct tty_driver *driver)
2867{
2868 kref_put(&driver->kref, destruct_tty_driver);
2869}
2870EXPORT_SYMBOL(tty_driver_kref_put);
2871
b68e31d0
JD
2872void tty_set_operations(struct tty_driver *driver,
2873 const struct tty_operations *op)
1da177e4 2874{
f34d7a5b
AC
2875 driver->ops = op;
2876};
7d7b93c1 2877EXPORT_SYMBOL(tty_set_operations);
1da177e4 2878
7d7b93c1
AC
2879void put_tty_driver(struct tty_driver *d)
2880{
2881 tty_driver_kref_put(d);
2882}
1da177e4 2883EXPORT_SYMBOL(put_tty_driver);
1da177e4
LT
2884
2885/*
2886 * Called by a tty driver to register itself.
2887 */
2888int tty_register_driver(struct tty_driver *driver)
2889{
2890 int error;
37bdfb07 2891 int i;
1da177e4
LT
2892 dev_t dev;
2893 void **p = NULL;
2894
543691a6 2895 if (!(driver->flags & TTY_DRIVER_DEVPTS_MEM) && driver->num) {
fe6e29fd 2896 p = kzalloc(driver->num * 2 * sizeof(void *), GFP_KERNEL);
1da177e4
LT
2897 if (!p)
2898 return -ENOMEM;
1da177e4
LT
2899 }
2900
2901 if (!driver->major) {
37bdfb07
AC
2902 error = alloc_chrdev_region(&dev, driver->minor_start,
2903 driver->num, driver->name);
1da177e4
LT
2904 if (!error) {
2905 driver->major = MAJOR(dev);
2906 driver->minor_start = MINOR(dev);
2907 }
2908 } else {
2909 dev = MKDEV(driver->major, driver->minor_start);
e5717c48 2910 error = register_chrdev_region(dev, driver->num, driver->name);
1da177e4
LT
2911 }
2912 if (error < 0) {
2913 kfree(p);
2914 return error;
2915 }
2916
2917 if (p) {
2918 driver->ttys = (struct tty_struct **)p;
edc6afc5 2919 driver->termios = (struct ktermios **)(p + driver->num);
1da177e4
LT
2920 } else {
2921 driver->ttys = NULL;
2922 driver->termios = NULL;
1da177e4
LT
2923 }
2924
2925 cdev_init(&driver->cdev, &tty_fops);
2926 driver->cdev.owner = driver->owner;
2927 error = cdev_add(&driver->cdev, dev, driver->num);
2928 if (error) {
1da177e4
LT
2929 unregister_chrdev_region(dev, driver->num);
2930 driver->ttys = NULL;
fe6e29fd 2931 driver->termios = NULL;
1da177e4
LT
2932 kfree(p);
2933 return error;
2934 }
2935
ca509f69 2936 mutex_lock(&tty_mutex);
1da177e4 2937 list_add(&driver->tty_drivers, &tty_drivers);
ca509f69 2938 mutex_unlock(&tty_mutex);
37bdfb07
AC
2939
2940 if (!(driver->flags & TTY_DRIVER_DYNAMIC_DEV)) {
2941 for (i = 0; i < driver->num; i++)
1da177e4
LT
2942 tty_register_device(driver, i, NULL);
2943 }
2944 proc_tty_register_driver(driver);
7d7b93c1 2945 driver->flags |= TTY_DRIVER_INSTALLED;
1da177e4
LT
2946 return 0;
2947}
2948
2949EXPORT_SYMBOL(tty_register_driver);
2950
2951/*
2952 * Called by a tty driver to unregister itself.
2953 */
2954int tty_unregister_driver(struct tty_driver *driver)
2955{
7d7b93c1
AC
2956#if 0
2957 /* FIXME */
1da177e4
LT
2958 if (driver->refcount)
2959 return -EBUSY;
7d7b93c1 2960#endif
1da177e4
LT
2961 unregister_chrdev_region(MKDEV(driver->major, driver->minor_start),
2962 driver->num);
ca509f69 2963 mutex_lock(&tty_mutex);
1da177e4 2964 list_del(&driver->tty_drivers);
ca509f69 2965 mutex_unlock(&tty_mutex);
1da177e4
LT
2966 return 0;
2967}
7d7b93c1 2968
1da177e4
LT
2969EXPORT_SYMBOL(tty_unregister_driver);
2970
24ec839c
PZ
2971dev_t tty_devnum(struct tty_struct *tty)
2972{
2973 return MKDEV(tty->driver->major, tty->driver->minor_start) + tty->index;
2974}
2975EXPORT_SYMBOL(tty_devnum);
2976
2977void proc_clear_tty(struct task_struct *p)
2978{
7c3b1dcf 2979 unsigned long flags;
9c9f4ded 2980 struct tty_struct *tty;
7c3b1dcf 2981 spin_lock_irqsave(&p->sighand->siglock, flags);
9c9f4ded 2982 tty = p->signal->tty;
24ec839c 2983 p->signal->tty = NULL;
7c3b1dcf 2984 spin_unlock_irqrestore(&p->sighand->siglock, flags);
9c9f4ded 2985 tty_kref_put(tty);
24ec839c 2986}
24ec839c 2987
47f86834
AC
2988/* Called under the sighand lock */
2989
2a65f1d9 2990static void __proc_set_tty(struct task_struct *tsk, struct tty_struct *tty)
24ec839c
PZ
2991{
2992 if (tty) {
47f86834
AC
2993 unsigned long flags;
2994 /* We should not have a session or pgrp to put here but.... */
2995 spin_lock_irqsave(&tty->ctrl_lock, flags);
d9c1e9a8
EB
2996 put_pid(tty->session);
2997 put_pid(tty->pgrp);
ab521dc0 2998 tty->pgrp = get_pid(task_pgrp(tsk));
47f86834
AC
2999 spin_unlock_irqrestore(&tty->ctrl_lock, flags);
3000 tty->session = get_pid(task_session(tsk));
9c9f4ded
AC
3001 if (tsk->signal->tty) {
3002 printk(KERN_DEBUG "tty not NULL!!\n");
3003 tty_kref_put(tsk->signal->tty);
3004 }
24ec839c 3005 }
2a65f1d9 3006 put_pid(tsk->signal->tty_old_pgrp);
9c9f4ded 3007 tsk->signal->tty = tty_kref_get(tty);
ab521dc0 3008 tsk->signal->tty_old_pgrp = NULL;
24ec839c
PZ
3009}
3010
98a27ba4 3011static void proc_set_tty(struct task_struct *tsk, struct tty_struct *tty)
24ec839c
PZ
3012{
3013 spin_lock_irq(&tsk->sighand->siglock);
2a65f1d9 3014 __proc_set_tty(tsk, tty);
24ec839c
PZ
3015 spin_unlock_irq(&tsk->sighand->siglock);
3016}
3017
3018struct tty_struct *get_current_tty(void)
3019{
3020 struct tty_struct *tty;
934e6ebf
AC
3021 unsigned long flags;
3022
3023 spin_lock_irqsave(&current->sighand->siglock, flags);
452a00d2 3024 tty = tty_kref_get(current->signal->tty);
934e6ebf 3025 spin_unlock_irqrestore(&current->sighand->siglock, flags);
24ec839c
PZ
3026 return tty;
3027}
a311f743 3028EXPORT_SYMBOL_GPL(get_current_tty);
1da177e4 3029
d81ed103
AC
3030void tty_default_fops(struct file_operations *fops)
3031{
3032 *fops = tty_fops;
3033}
3034
1da177e4
LT
3035/*
3036 * Initialize the console device. This is called *early*, so
3037 * we can't necessarily depend on lots of kernel help here.
3038 * Just do some early initializations, and do the complex setup
3039 * later.
3040 */
3041void __init console_init(void)
3042{
3043 initcall_t *call;
3044
3045 /* Setup the default TTY line discipline. */
01e1abb2 3046 tty_ldisc_begin();
1da177e4
LT
3047
3048 /*
37bdfb07 3049 * set up the console device so that later boot sequences can
1da177e4
LT
3050 * inform about problems etc..
3051 */
1da177e4
LT
3052 call = __con_initcall_start;
3053 while (call < __con_initcall_end) {
3054 (*call)();
3055 call++;
3056 }
3057}
3058
1da177e4
LT
3059static int __init tty_class_init(void)
3060{
7fe845d1 3061 tty_class = class_create(THIS_MODULE, "tty");
1da177e4
LT
3062 if (IS_ERR(tty_class))
3063 return PTR_ERR(tty_class);
3064 return 0;
3065}
3066
3067postcore_initcall(tty_class_init);
3068
3069/* 3/2004 jmc: why do these devices exist? */
3070
3071static struct cdev tty_cdev, console_cdev;
1da177e4
LT
3072
3073/*
3074 * Ok, now we can initialize the rest of the tty devices and can count
3075 * on memory allocations, interrupts etc..
3076 */
3077static int __init tty_init(void)
3078{
3079 cdev_init(&tty_cdev, &tty_fops);
3080 if (cdev_add(&tty_cdev, MKDEV(TTYAUX_MAJOR, 0), 1) ||
3081 register_chrdev_region(MKDEV(TTYAUX_MAJOR, 0), 1, "/dev/tty") < 0)
3082 panic("Couldn't register /dev/tty driver\n");
d81ed103 3083 device_create(tty_class, NULL, MKDEV(TTYAUX_MAJOR, 0), NULL,
47aa5793 3084 "tty");
1da177e4
LT
3085
3086 cdev_init(&console_cdev, &console_fops);
3087 if (cdev_add(&console_cdev, MKDEV(TTYAUX_MAJOR, 1), 1) ||
3088 register_chrdev_region(MKDEV(TTYAUX_MAJOR, 1), 1, "/dev/console") < 0)
3089 panic("Couldn't register /dev/console driver\n");
d81ed103 3090 device_create(tty_class, NULL, MKDEV(TTYAUX_MAJOR, 1), NULL,
47aa5793 3091 "console");
1da177e4 3092
1da177e4 3093#ifdef CONFIG_VT
d81ed103 3094 vty_init(&console_fops);
1da177e4
LT
3095#endif
3096 return 0;
3097}
3098module_init(tty_init);