tty: n_gsm: Added refcount usage to gsm_mux and gsm_dlci structs
[linux-2.6-block.git] / drivers / tty / tty_io.c
CommitLineData
1da177e4 1/*
1da177e4
LT
2 * Copyright (C) 1991, 1992 Linus Torvalds
3 */
4
5/*
6 * 'tty_io.c' gives an orthogonal feeling to tty's, be they consoles
7 * or rs-channels. It also implements echoing, cooked mode etc.
8 *
9 * Kill-line thanks to John T Kohl, who also corrected VMIN = VTIME = 0.
10 *
11 * Modified by Theodore Ts'o, 9/14/92, to dynamically allocate the
12 * tty_struct and tty_queue structures. Previously there was an array
13 * of 256 tty_struct's which was statically allocated, and the
14 * tty_queue structures were allocated at boot time. Both are now
15 * dynamically allocated only when the tty is open.
16 *
17 * Also restructured routines so that there is more of a separation
18 * between the high-level tty routines (tty_io.c and tty_ioctl.c) and
19 * the low-level tty routines (serial.c, pty.c, console.c). This
37bdfb07 20 * makes for cleaner and more compact code. -TYT, 9/17/92
1da177e4
LT
21 *
22 * Modified by Fred N. van Kempen, 01/29/93, to add line disciplines
23 * which can be dynamically activated and de-activated by the line
24 * discipline handling modules (like SLIP).
25 *
26 * NOTE: pay no attention to the line discipline code (yet); its
27 * interface is still subject to change in this version...
28 * -- TYT, 1/31/92
29 *
30 * Added functionality to the OPOST tty handling. No delays, but all
31 * other bits should be there.
32 * -- Nick Holloway <alfie@dcs.warwick.ac.uk>, 27th May 1993.
33 *
34 * Rewrote canonical mode and added more termios flags.
35 * -- julian@uhunix.uhcc.hawaii.edu (J. Cowley), 13Jan94
36 *
37 * Reorganized FASYNC support so mouse code can share it.
38 * -- ctm@ardi.com, 9Sep95
39 *
40 * New TIOCLINUX variants added.
41 * -- mj@k332.feld.cvut.cz, 19-Nov-95
37bdfb07 42 *
1da177e4
LT
43 * Restrict vt switching via ioctl()
44 * -- grif@cs.ucr.edu, 5-Dec-95
45 *
46 * Move console and virtual terminal code to more appropriate files,
47 * implement CONFIG_VT and generalize console device interface.
48 * -- Marko Kohtala <Marko.Kohtala@hut.fi>, March 97
49 *
d81ed103 50 * Rewrote tty_init_dev and tty_release_dev to eliminate races.
1da177e4
LT
51 * -- Bill Hawes <whawes@star.net>, June 97
52 *
53 * Added devfs support.
54 * -- C. Scott Ananian <cananian@alumni.princeton.edu>, 13-Jan-1998
55 *
56 * Added support for a Unix98-style ptmx device.
57 * -- C. Scott Ananian <cananian@alumni.princeton.edu>, 14-Jan-1998
58 *
59 * Reduced memory usage for older ARM systems
60 * -- Russell King <rmk@arm.linux.org.uk>
61 *
62 * Move do_SAK() into process context. Less stack use in devfs functions.
37bdfb07
AC
63 * alloc_tty_struct() always uses kmalloc()
64 * -- Andrew Morton <andrewm@uow.edu.eu> 17Mar01
1da177e4
LT
65 */
66
1da177e4
LT
67#include <linux/types.h>
68#include <linux/major.h>
69#include <linux/errno.h>
70#include <linux/signal.h>
71#include <linux/fcntl.h>
72#include <linux/sched.h>
73#include <linux/interrupt.h>
74#include <linux/tty.h>
75#include <linux/tty_driver.h>
76#include <linux/tty_flip.h>
77#include <linux/devpts_fs.h>
78#include <linux/file.h>
9f3acc31 79#include <linux/fdtable.h>
1da177e4
LT
80#include <linux/console.h>
81#include <linux/timer.h>
82#include <linux/ctype.h>
83#include <linux/kd.h>
84#include <linux/mm.h>
85#include <linux/string.h>
86#include <linux/slab.h>
87#include <linux/poll.h>
88#include <linux/proc_fs.h>
89#include <linux/init.h>
90#include <linux/module.h>
1da177e4 91#include <linux/device.h>
1da177e4
LT
92#include <linux/wait.h>
93#include <linux/bitops.h>
b20f3ae5 94#include <linux/delay.h>
a352def2 95#include <linux/seq_file.h>
d281da7f 96#include <linux/serial.h>
1da177e4 97
a352def2 98#include <linux/uaccess.h>
1da177e4
LT
99#include <asm/system.h>
100
101#include <linux/kbd_kern.h>
102#include <linux/vt_kern.h>
103#include <linux/selection.h>
1da177e4
LT
104
105#include <linux/kmod.h>
b488893a 106#include <linux/nsproxy.h>
1da177e4
LT
107
108#undef TTY_DEBUG_HANGUP
109
110#define TTY_PARANOIA_CHECK 1
111#define CHECK_TTY_COUNT 1
112
edc6afc5 113struct ktermios tty_std_termios = { /* for the benefit of tty drivers */
1da177e4
LT
114 .c_iflag = ICRNL | IXON,
115 .c_oflag = OPOST | ONLCR,
116 .c_cflag = B38400 | CS8 | CREAD | HUPCL,
117 .c_lflag = ISIG | ICANON | ECHO | ECHOE | ECHOK |
118 ECHOCTL | ECHOKE | IEXTEN,
edc6afc5
AC
119 .c_cc = INIT_C_CC,
120 .c_ispeed = 38400,
121 .c_ospeed = 38400
1da177e4
LT
122};
123
124EXPORT_SYMBOL(tty_std_termios);
125
126/* This list gets poked at by procfs and various bits of boot up code. This
127 could do with some rationalisation such as pulling the tty proc function
128 into this file */
37bdfb07 129
1da177e4
LT
130LIST_HEAD(tty_drivers); /* linked list of tty drivers */
131
24ec839c 132/* Mutex to protect creating and releasing a tty. This is shared with
1da177e4 133 vt.c for deeply disgusting hack reasons */
70522e12 134DEFINE_MUTEX(tty_mutex);
de2a84f2 135EXPORT_SYMBOL(tty_mutex);
1da177e4 136
ee2ffa0d
NP
137/* Spinlock to protect the tty->tty_files list */
138DEFINE_SPINLOCK(tty_files_lock);
139
1da177e4
LT
140static ssize_t tty_read(struct file *, char __user *, size_t, loff_t *);
141static ssize_t tty_write(struct file *, const char __user *, size_t, loff_t *);
37bdfb07
AC
142ssize_t redirected_tty_write(struct file *, const char __user *,
143 size_t, loff_t *);
1da177e4
LT
144static unsigned int tty_poll(struct file *, poll_table *);
145static int tty_open(struct inode *, struct file *);
04f378b1 146long tty_ioctl(struct file *file, unsigned int cmd, unsigned long arg);
e10cc1df 147#ifdef CONFIG_COMPAT
37bdfb07 148static long tty_compat_ioctl(struct file *file, unsigned int cmd,
e10cc1df
PF
149 unsigned long arg);
150#else
151#define tty_compat_ioctl NULL
152#endif
ec79d605 153static int __tty_fasync(int fd, struct file *filp, int on);
37bdfb07 154static int tty_fasync(int fd, struct file *filp, int on);
d5698c28 155static void release_tty(struct tty_struct *tty, int idx);
2a65f1d9 156static void __proc_set_tty(struct task_struct *tsk, struct tty_struct *tty);
98a27ba4 157static void proc_set_tty(struct task_struct *tsk, struct tty_struct *tty);
1da177e4 158
af9b897e
AC
159/**
160 * alloc_tty_struct - allocate a tty object
161 *
162 * Return a new empty tty structure. The data fields have not
163 * been initialized in any way but has been zeroed
164 *
165 * Locking: none
af9b897e 166 */
1da177e4 167
bf970ee4 168struct tty_struct *alloc_tty_struct(void)
1da177e4 169{
1266b1e1 170 return kzalloc(sizeof(struct tty_struct), GFP_KERNEL);
1da177e4
LT
171}
172
af9b897e
AC
173/**
174 * free_tty_struct - free a disused tty
175 * @tty: tty struct to free
176 *
177 * Free the write buffers, tty queue and tty memory itself.
178 *
179 * Locking: none. Must be called after tty is definitely unused
180 */
181
bf970ee4 182void free_tty_struct(struct tty_struct *tty)
1da177e4 183{
30004ac9
DES
184 if (tty->dev)
185 put_device(tty->dev);
1da177e4 186 kfree(tty->write_buf);
33f0f88f 187 tty_buffer_free_all(tty);
1da177e4
LT
188 kfree(tty);
189}
190
d996b62a
NP
191static inline struct tty_struct *file_tty(struct file *file)
192{
193 return ((struct tty_file_private *)file->private_data)->tty;
194}
195
196/* Associate a new file with the tty structure */
f573bd17 197int tty_add_file(struct tty_struct *tty, struct file *file)
d996b62a
NP
198{
199 struct tty_file_private *priv;
200
f573bd17
PE
201 priv = kmalloc(sizeof(*priv), GFP_KERNEL);
202 if (!priv)
203 return -ENOMEM;
d996b62a
NP
204
205 priv->tty = tty;
206 priv->file = file;
207 file->private_data = priv;
208
209 spin_lock(&tty_files_lock);
210 list_add(&priv->list, &tty->tty_files);
211 spin_unlock(&tty_files_lock);
f573bd17
PE
212
213 return 0;
d996b62a
NP
214}
215
216/* Delete file from its tty */
217void tty_del_file(struct file *file)
218{
219 struct tty_file_private *priv = file->private_data;
220
221 spin_lock(&tty_files_lock);
222 list_del(&priv->list);
223 spin_unlock(&tty_files_lock);
224 file->private_data = NULL;
225 kfree(priv);
226}
227
228
1da177e4
LT
229#define TTY_NUMBER(tty) ((tty)->index + (tty)->driver->name_base)
230
af9b897e
AC
231/**
232 * tty_name - return tty naming
233 * @tty: tty structure
234 * @buf: buffer for output
235 *
236 * Convert a tty structure into a name. The name reflects the kernel
237 * naming policy and if udev is in use may not reflect user space
238 *
239 * Locking: none
240 */
241
1da177e4
LT
242char *tty_name(struct tty_struct *tty, char *buf)
243{
244 if (!tty) /* Hmm. NULL pointer. That's fun. */
245 strcpy(buf, "NULL tty");
246 else
247 strcpy(buf, tty->name);
248 return buf;
249}
250
251EXPORT_SYMBOL(tty_name);
252
d769a669 253int tty_paranoia_check(struct tty_struct *tty, struct inode *inode,
1da177e4
LT
254 const char *routine)
255{
256#ifdef TTY_PARANOIA_CHECK
257 if (!tty) {
258 printk(KERN_WARNING
259 "null TTY for (%d:%d) in %s\n",
260 imajor(inode), iminor(inode), routine);
261 return 1;
262 }
263 if (tty->magic != TTY_MAGIC) {
264 printk(KERN_WARNING
265 "bad magic number for tty struct (%d:%d) in %s\n",
266 imajor(inode), iminor(inode), routine);
267 return 1;
268 }
269#endif
270 return 0;
271}
272
273static int check_tty_count(struct tty_struct *tty, const char *routine)
274{
275#ifdef CHECK_TTY_COUNT
276 struct list_head *p;
277 int count = 0;
37bdfb07 278
ee2ffa0d 279 spin_lock(&tty_files_lock);
1da177e4
LT
280 list_for_each(p, &tty->tty_files) {
281 count++;
282 }
ee2ffa0d 283 spin_unlock(&tty_files_lock);
1da177e4
LT
284 if (tty->driver->type == TTY_DRIVER_TYPE_PTY &&
285 tty->driver->subtype == PTY_TYPE_SLAVE &&
286 tty->link && tty->link->count)
287 count++;
288 if (tty->count != count) {
289 printk(KERN_WARNING "Warning: dev (%s) tty->count(%d) "
290 "!= #fd's(%d) in %s\n",
291 tty->name, tty->count, count, routine);
292 return count;
24ec839c 293 }
1da177e4
LT
294#endif
295 return 0;
296}
297
af9b897e
AC
298/**
299 * get_tty_driver - find device of a tty
300 * @dev_t: device identifier
301 * @index: returns the index of the tty
302 *
303 * This routine returns a tty driver structure, given a device number
304 * and also passes back the index number.
305 *
306 * Locking: caller must hold tty_mutex
1da177e4 307 */
af9b897e 308
1da177e4
LT
309static struct tty_driver *get_tty_driver(dev_t device, int *index)
310{
311 struct tty_driver *p;
312
313 list_for_each_entry(p, &tty_drivers, tty_drivers) {
314 dev_t base = MKDEV(p->major, p->minor_start);
315 if (device < base || device >= base + p->num)
316 continue;
317 *index = device - base;
7d7b93c1 318 return tty_driver_kref_get(p);
1da177e4
LT
319 }
320 return NULL;
321}
322
f2d937f3
JW
323#ifdef CONFIG_CONSOLE_POLL
324
325/**
326 * tty_find_polling_driver - find device of a polled tty
327 * @name: name string to match
328 * @line: pointer to resulting tty line nr
329 *
330 * This routine returns a tty driver structure, given a name
331 * and the condition that the tty driver is capable of polled
332 * operation.
333 */
334struct tty_driver *tty_find_polling_driver(char *name, int *line)
335{
336 struct tty_driver *p, *res = NULL;
337 int tty_line = 0;
0dca0fd2 338 int len;
5f0878ac 339 char *str, *stp;
f2d937f3 340
0dca0fd2
JW
341 for (str = name; *str; str++)
342 if ((*str >= '0' && *str <= '9') || *str == ',')
343 break;
344 if (!*str)
345 return NULL;
346
347 len = str - name;
348 tty_line = simple_strtoul(str, &str, 10);
349
f2d937f3
JW
350 mutex_lock(&tty_mutex);
351 /* Search through the tty devices to look for a match */
352 list_for_each_entry(p, &tty_drivers, tty_drivers) {
0dca0fd2
JW
353 if (strncmp(name, p->name, len) != 0)
354 continue;
5f0878ac
AC
355 stp = str;
356 if (*stp == ',')
357 stp++;
358 if (*stp == '\0')
359 stp = NULL;
f2d937f3 360
6eb68d6f 361 if (tty_line >= 0 && tty_line < p->num && p->ops &&
5f0878ac 362 p->ops->poll_init && !p->ops->poll_init(p, tty_line, stp)) {
7d7b93c1 363 res = tty_driver_kref_get(p);
f2d937f3
JW
364 *line = tty_line;
365 break;
366 }
367 }
368 mutex_unlock(&tty_mutex);
369
370 return res;
371}
372EXPORT_SYMBOL_GPL(tty_find_polling_driver);
373#endif
374
af9b897e
AC
375/**
376 * tty_check_change - check for POSIX terminal changes
377 * @tty: tty to check
378 *
379 * If we try to write to, or set the state of, a terminal and we're
380 * not in the foreground, send a SIGTTOU. If the signal is blocked or
381 * ignored, go ahead and perform the operation. (POSIX 7.2)
382 *
978e595f 383 * Locking: ctrl_lock
1da177e4 384 */
af9b897e 385
37bdfb07 386int tty_check_change(struct tty_struct *tty)
1da177e4 387{
47f86834
AC
388 unsigned long flags;
389 int ret = 0;
390
1da177e4
LT
391 if (current->signal->tty != tty)
392 return 0;
47f86834
AC
393
394 spin_lock_irqsave(&tty->ctrl_lock, flags);
395
ab521dc0
EB
396 if (!tty->pgrp) {
397 printk(KERN_WARNING "tty_check_change: tty->pgrp == NULL!\n");
9ffee4cb 398 goto out_unlock;
1da177e4 399 }
ab521dc0 400 if (task_pgrp(current) == tty->pgrp)
9ffee4cb
AM
401 goto out_unlock;
402 spin_unlock_irqrestore(&tty->ctrl_lock, flags);
1da177e4 403 if (is_ignored(SIGTTOU))
47f86834
AC
404 goto out;
405 if (is_current_pgrp_orphaned()) {
406 ret = -EIO;
407 goto out;
408 }
040b6362
ON
409 kill_pgrp(task_pgrp(current), SIGTTOU, 1);
410 set_thread_flag(TIF_SIGPENDING);
47f86834
AC
411 ret = -ERESTARTSYS;
412out:
9ffee4cb
AM
413 return ret;
414out_unlock:
47f86834
AC
415 spin_unlock_irqrestore(&tty->ctrl_lock, flags);
416 return ret;
1da177e4
LT
417}
418
419EXPORT_SYMBOL(tty_check_change);
420
37bdfb07 421static ssize_t hung_up_tty_read(struct file *file, char __user *buf,
1da177e4
LT
422 size_t count, loff_t *ppos)
423{
424 return 0;
425}
426
37bdfb07 427static ssize_t hung_up_tty_write(struct file *file, const char __user *buf,
1da177e4
LT
428 size_t count, loff_t *ppos)
429{
430 return -EIO;
431}
432
433/* No kernel lock held - none needed ;) */
37bdfb07 434static unsigned int hung_up_tty_poll(struct file *filp, poll_table *wait)
1da177e4
LT
435{
436 return POLLIN | POLLOUT | POLLERR | POLLHUP | POLLRDNORM | POLLWRNORM;
437}
438
04f378b1
AC
439static long hung_up_tty_ioctl(struct file *file, unsigned int cmd,
440 unsigned long arg)
38ad2ed0
PF
441{
442 return cmd == TIOCSPGRP ? -ENOTTY : -EIO;
443}
444
37bdfb07 445static long hung_up_tty_compat_ioctl(struct file *file,
38ad2ed0 446 unsigned int cmd, unsigned long arg)
1da177e4
LT
447{
448 return cmd == TIOCSPGRP ? -ENOTTY : -EIO;
449}
450
62322d25 451static const struct file_operations tty_fops = {
1da177e4
LT
452 .llseek = no_llseek,
453 .read = tty_read,
454 .write = tty_write,
455 .poll = tty_poll,
04f378b1 456 .unlocked_ioctl = tty_ioctl,
e10cc1df 457 .compat_ioctl = tty_compat_ioctl,
1da177e4
LT
458 .open = tty_open,
459 .release = tty_release,
460 .fasync = tty_fasync,
461};
462
62322d25 463static const struct file_operations console_fops = {
1da177e4
LT
464 .llseek = no_llseek,
465 .read = tty_read,
466 .write = redirected_tty_write,
467 .poll = tty_poll,
04f378b1 468 .unlocked_ioctl = tty_ioctl,
e10cc1df 469 .compat_ioctl = tty_compat_ioctl,
1da177e4
LT
470 .open = tty_open,
471 .release = tty_release,
472 .fasync = tty_fasync,
473};
474
62322d25 475static const struct file_operations hung_up_tty_fops = {
1da177e4
LT
476 .llseek = no_llseek,
477 .read = hung_up_tty_read,
478 .write = hung_up_tty_write,
479 .poll = hung_up_tty_poll,
04f378b1 480 .unlocked_ioctl = hung_up_tty_ioctl,
38ad2ed0 481 .compat_ioctl = hung_up_tty_compat_ioctl,
1da177e4
LT
482 .release = tty_release,
483};
484
485static DEFINE_SPINLOCK(redirect_lock);
486static struct file *redirect;
487
488/**
489 * tty_wakeup - request more data
490 * @tty: terminal
491 *
492 * Internal and external helper for wakeups of tty. This function
493 * informs the line discipline if present that the driver is ready
494 * to receive more output data.
495 */
37bdfb07 496
1da177e4
LT
497void tty_wakeup(struct tty_struct *tty)
498{
499 struct tty_ldisc *ld;
37bdfb07 500
1da177e4
LT
501 if (test_bit(TTY_DO_WRITE_WAKEUP, &tty->flags)) {
502 ld = tty_ldisc_ref(tty);
37bdfb07 503 if (ld) {
a352def2
AC
504 if (ld->ops->write_wakeup)
505 ld->ops->write_wakeup(tty);
1da177e4
LT
506 tty_ldisc_deref(ld);
507 }
508 }
4b19449d 509 wake_up_interruptible_poll(&tty->write_wait, POLLOUT);
1da177e4
LT
510}
511
512EXPORT_SYMBOL_GPL(tty_wakeup);
513
af9b897e 514/**
11dbf203 515 * __tty_hangup - actual handler for hangup events
65f27f38 516 * @work: tty device
af9b897e 517 *
1bad879a 518 * This can be called by the "eventd" kernel thread. That is process
af9b897e
AC
519 * synchronous but doesn't hold any locks, so we need to make sure we
520 * have the appropriate locks for what we're doing.
521 *
522 * The hangup event clears any pending redirections onto the hung up
523 * device. It ensures future writes will error and it does the needed
524 * line discipline hangup and signal delivery. The tty object itself
525 * remains intact.
526 *
527 * Locking:
ec79d605 528 * BTM
24ec839c
PZ
529 * redirect lock for undoing redirection
530 * file list lock for manipulating list of ttys
531 * tty_ldisc_lock from called functions
532 * termios_mutex resetting termios data
533 * tasklist_lock to walk task list for hangup event
534 * ->siglock to protect ->signal/->sighand
1da177e4 535 */
11dbf203 536void __tty_hangup(struct tty_struct *tty)
1da177e4 537{
37bdfb07 538 struct file *cons_filp = NULL;
1da177e4
LT
539 struct file *filp, *f = NULL;
540 struct task_struct *p;
d996b62a 541 struct tty_file_private *priv;
1da177e4 542 int closecount = 0, n;
47f86834 543 unsigned long flags;
9c9f4ded 544 int refs = 0;
1da177e4
LT
545
546 if (!tty)
547 return;
548
1da177e4
LT
549
550 spin_lock(&redirect_lock);
d996b62a 551 if (redirect && file_tty(redirect) == tty) {
1da177e4
LT
552 f = redirect;
553 redirect = NULL;
554 }
555 spin_unlock(&redirect_lock);
37bdfb07 556
11dbf203
AB
557 tty_lock();
558
acfa747b
JS
559 /* some functions below drop BTM, so we need this bit */
560 set_bit(TTY_HUPPING, &tty->flags);
561
ec79d605
AB
562 /* inuse_filps is protected by the single tty lock,
563 this really needs to change if we want to flush the
564 workqueue with the lock held */
11dbf203 565 check_tty_count(tty, "tty_hangup");
36ba782e 566
ee2ffa0d 567 spin_lock(&tty_files_lock);
1da177e4 568 /* This breaks for file handles being sent over AF_UNIX sockets ? */
d996b62a
NP
569 list_for_each_entry(priv, &tty->tty_files, list) {
570 filp = priv->file;
1da177e4
LT
571 if (filp->f_op->write == redirected_tty_write)
572 cons_filp = filp;
573 if (filp->f_op->write != tty_write)
574 continue;
575 closecount++;
ec79d605 576 __tty_fasync(-1, filp, 0); /* can't block */
1da177e4
LT
577 filp->f_op = &hung_up_tty_fops;
578 }
ee2ffa0d 579 spin_unlock(&tty_files_lock);
37bdfb07 580
acfa747b
JS
581 /*
582 * it drops BTM and thus races with reopen
583 * we protect the race by TTY_HUPPING
584 */
c65c9bc3 585 tty_ldisc_hangup(tty);
37bdfb07 586
1da177e4 587 read_lock(&tasklist_lock);
ab521dc0
EB
588 if (tty->session) {
589 do_each_pid_task(tty->session, PIDTYPE_SID, p) {
24ec839c 590 spin_lock_irq(&p->sighand->siglock);
9c9f4ded 591 if (p->signal->tty == tty) {
1da177e4 592 p->signal->tty = NULL;
9c9f4ded
AC
593 /* We defer the dereferences outside fo
594 the tasklist lock */
595 refs++;
596 }
24ec839c
PZ
597 if (!p->signal->leader) {
598 spin_unlock_irq(&p->sighand->siglock);
1da177e4 599 continue;
24ec839c
PZ
600 }
601 __group_send_sig_info(SIGHUP, SEND_SIG_PRIV, p);
602 __group_send_sig_info(SIGCONT, SEND_SIG_PRIV, p);
ab521dc0 603 put_pid(p->signal->tty_old_pgrp); /* A noop */
47f86834 604 spin_lock_irqsave(&tty->ctrl_lock, flags);
ab521dc0
EB
605 if (tty->pgrp)
606 p->signal->tty_old_pgrp = get_pid(tty->pgrp);
47f86834 607 spin_unlock_irqrestore(&tty->ctrl_lock, flags);
24ec839c 608 spin_unlock_irq(&p->sighand->siglock);
ab521dc0 609 } while_each_pid_task(tty->session, PIDTYPE_SID, p);
1da177e4
LT
610 }
611 read_unlock(&tasklist_lock);
612
47f86834 613 spin_lock_irqsave(&tty->ctrl_lock, flags);
c65c9bc3
AC
614 clear_bit(TTY_THROTTLED, &tty->flags);
615 clear_bit(TTY_PUSH, &tty->flags);
616 clear_bit(TTY_DO_WRITE_WAKEUP, &tty->flags);
d9c1e9a8
EB
617 put_pid(tty->session);
618 put_pid(tty->pgrp);
ab521dc0
EB
619 tty->session = NULL;
620 tty->pgrp = NULL;
1da177e4 621 tty->ctrl_status = 0;
47f86834
AC
622 spin_unlock_irqrestore(&tty->ctrl_lock, flags);
623
9c9f4ded
AC
624 /* Account for the p->signal references we killed */
625 while (refs--)
626 tty_kref_put(tty);
627
1da177e4 628 /*
37bdfb07
AC
629 * If one of the devices matches a console pointer, we
630 * cannot just call hangup() because that will cause
631 * tty->count and state->count to go out of sync.
632 * So we just call close() the right number of times.
1da177e4
LT
633 */
634 if (cons_filp) {
f34d7a5b 635 if (tty->ops->close)
1da177e4 636 for (n = 0; n < closecount; n++)
f34d7a5b
AC
637 tty->ops->close(tty, cons_filp);
638 } else if (tty->ops->hangup)
639 (tty->ops->hangup)(tty);
37bdfb07
AC
640 /*
641 * We don't want to have driver/ldisc interactions beyond
642 * the ones we did here. The driver layer expects no
643 * calls after ->hangup() from the ldisc side. However we
644 * can't yet guarantee all that.
645 */
1da177e4 646 set_bit(TTY_HUPPED, &tty->flags);
acfa747b 647 clear_bit(TTY_HUPPING, &tty->flags);
c65c9bc3 648 tty_ldisc_enable(tty);
11dbf203
AB
649
650 tty_unlock();
651
1da177e4
LT
652 if (f)
653 fput(f);
654}
655
ddcd9fb6
AB
656static void do_tty_hangup(struct work_struct *work)
657{
658 struct tty_struct *tty =
659 container_of(work, struct tty_struct, hangup_work);
660
11dbf203 661 __tty_hangup(tty);
ddcd9fb6
AB
662}
663
af9b897e
AC
664/**
665 * tty_hangup - trigger a hangup event
666 * @tty: tty to hangup
667 *
668 * A carrier loss (virtual or otherwise) has occurred on this like
669 * schedule a hangup sequence to run after this event.
670 */
671
37bdfb07 672void tty_hangup(struct tty_struct *tty)
1da177e4
LT
673{
674#ifdef TTY_DEBUG_HANGUP
675 char buf[64];
1da177e4
LT
676 printk(KERN_DEBUG "%s hangup...\n", tty_name(tty, buf));
677#endif
678 schedule_work(&tty->hangup_work);
679}
680
681EXPORT_SYMBOL(tty_hangup);
682
af9b897e
AC
683/**
684 * tty_vhangup - process vhangup
685 * @tty: tty to hangup
686 *
687 * The user has asked via system call for the terminal to be hung up.
688 * We do this synchronously so that when the syscall returns the process
3a4fa0a2 689 * is complete. That guarantee is necessary for security reasons.
af9b897e
AC
690 */
691
37bdfb07 692void tty_vhangup(struct tty_struct *tty)
1da177e4
LT
693{
694#ifdef TTY_DEBUG_HANGUP
695 char buf[64];
696
697 printk(KERN_DEBUG "%s vhangup...\n", tty_name(tty, buf));
698#endif
11dbf203 699 __tty_hangup(tty);
1da177e4 700}
37bdfb07 701
1da177e4
LT
702EXPORT_SYMBOL(tty_vhangup);
703
11dbf203 704
2cb5998b
AC
705/**
706 * tty_vhangup_self - process vhangup for own ctty
707 *
708 * Perform a vhangup on the current controlling tty
709 */
710
711void tty_vhangup_self(void)
712{
713 struct tty_struct *tty;
714
2cb5998b
AC
715 tty = get_current_tty();
716 if (tty) {
717 tty_vhangup(tty);
718 tty_kref_put(tty);
719 }
2cb5998b
AC
720}
721
af9b897e
AC
722/**
723 * tty_hung_up_p - was tty hung up
724 * @filp: file pointer of tty
725 *
726 * Return true if the tty has been subject to a vhangup or a carrier
727 * loss
728 */
729
37bdfb07 730int tty_hung_up_p(struct file *filp)
1da177e4
LT
731{
732 return (filp->f_op == &hung_up_tty_fops);
733}
734
735EXPORT_SYMBOL(tty_hung_up_p);
736
ab521dc0 737static void session_clear_tty(struct pid *session)
24ec839c
PZ
738{
739 struct task_struct *p;
ab521dc0 740 do_each_pid_task(session, PIDTYPE_SID, p) {
24ec839c 741 proc_clear_tty(p);
ab521dc0 742 } while_each_pid_task(session, PIDTYPE_SID, p);
24ec839c
PZ
743}
744
af9b897e
AC
745/**
746 * disassociate_ctty - disconnect controlling tty
747 * @on_exit: true if exiting so need to "hang up" the session
1da177e4 748 *
af9b897e
AC
749 * This function is typically called only by the session leader, when
750 * it wants to disassociate itself from its controlling tty.
751 *
752 * It performs the following functions:
1da177e4
LT
753 * (1) Sends a SIGHUP and SIGCONT to the foreground process group
754 * (2) Clears the tty from being controlling the session
755 * (3) Clears the controlling tty for all processes in the
756 * session group.
757 *
af9b897e
AC
758 * The argument on_exit is set to 1 if called when a process is
759 * exiting; it is 0 if called by the ioctl TIOCNOTTY.
760 *
24ec839c 761 * Locking:
ec79d605
AB
762 * BTM is taken for hysterical raisins, and held when
763 * called from no_tty().
24ec839c
PZ
764 * tty_mutex is taken to protect tty
765 * ->siglock is taken to protect ->signal/->sighand
766 * tasklist_lock is taken to walk process list for sessions
767 * ->siglock is taken to protect ->signal/->sighand
1da177e4 768 */
af9b897e 769
1da177e4
LT
770void disassociate_ctty(int on_exit)
771{
772 struct tty_struct *tty;
ab521dc0 773 struct pid *tty_pgrp = NULL;
1da177e4 774
5ec93d11
AC
775 if (!current->signal->leader)
776 return;
1da177e4 777
24ec839c 778 tty = get_current_tty();
1da177e4 779 if (tty) {
ab521dc0 780 tty_pgrp = get_pid(tty->pgrp);
ddcd9fb6 781 if (on_exit) {
ddcd9fb6 782 if (tty->driver->type != TTY_DRIVER_TYPE_PTY)
11dbf203 783 tty_vhangup(tty);
ddcd9fb6 784 }
452a00d2 785 tty_kref_put(tty);
680a9671 786 } else if (on_exit) {
ab521dc0 787 struct pid *old_pgrp;
680a9671
EB
788 spin_lock_irq(&current->sighand->siglock);
789 old_pgrp = current->signal->tty_old_pgrp;
ab521dc0 790 current->signal->tty_old_pgrp = NULL;
680a9671 791 spin_unlock_irq(&current->sighand->siglock);
24ec839c 792 if (old_pgrp) {
ab521dc0
EB
793 kill_pgrp(old_pgrp, SIGHUP, on_exit);
794 kill_pgrp(old_pgrp, SIGCONT, on_exit);
795 put_pid(old_pgrp);
1da177e4 796 }
1da177e4
LT
797 return;
798 }
ab521dc0
EB
799 if (tty_pgrp) {
800 kill_pgrp(tty_pgrp, SIGHUP, on_exit);
1da177e4 801 if (!on_exit)
ab521dc0
EB
802 kill_pgrp(tty_pgrp, SIGCONT, on_exit);
803 put_pid(tty_pgrp);
1da177e4
LT
804 }
805
24ec839c 806 spin_lock_irq(&current->sighand->siglock);
2a65f1d9 807 put_pid(current->signal->tty_old_pgrp);
23cac8de 808 current->signal->tty_old_pgrp = NULL;
24ec839c
PZ
809 spin_unlock_irq(&current->sighand->siglock);
810
24ec839c
PZ
811 tty = get_current_tty();
812 if (tty) {
47f86834
AC
813 unsigned long flags;
814 spin_lock_irqsave(&tty->ctrl_lock, flags);
ab521dc0
EB
815 put_pid(tty->session);
816 put_pid(tty->pgrp);
817 tty->session = NULL;
818 tty->pgrp = NULL;
47f86834 819 spin_unlock_irqrestore(&tty->ctrl_lock, flags);
452a00d2 820 tty_kref_put(tty);
24ec839c
PZ
821 } else {
822#ifdef TTY_DEBUG_HANGUP
823 printk(KERN_DEBUG "error attempted to write to tty [0x%p]"
824 " = NULL", tty);
825#endif
826 }
1da177e4
LT
827
828 /* Now clear signal->tty under the lock */
829 read_lock(&tasklist_lock);
ab521dc0 830 session_clear_tty(task_session(current));
1da177e4 831 read_unlock(&tasklist_lock);
1da177e4
LT
832}
833
98a27ba4
EB
834/**
835 *
836 * no_tty - Ensure the current process does not have a controlling tty
837 */
838void no_tty(void)
839{
840 struct task_struct *tsk = current;
ec79d605 841 tty_lock();
5ec93d11 842 disassociate_ctty(0);
ec79d605 843 tty_unlock();
98a27ba4
EB
844 proc_clear_tty(tsk);
845}
846
af9b897e
AC
847
848/**
beb7dd86 849 * stop_tty - propagate flow control
af9b897e
AC
850 * @tty: tty to stop
851 *
852 * Perform flow control to the driver. For PTY/TTY pairs we
beb7dd86 853 * must also propagate the TIOCKPKT status. May be called
af9b897e
AC
854 * on an already stopped device and will not re-call the driver
855 * method.
856 *
857 * This functionality is used by both the line disciplines for
858 * halting incoming flow and by the driver. It may therefore be
859 * called from any context, may be under the tty atomic_write_lock
860 * but not always.
861 *
862 * Locking:
04f378b1 863 * Uses the tty control lock internally
af9b897e
AC
864 */
865
1da177e4
LT
866void stop_tty(struct tty_struct *tty)
867{
04f378b1
AC
868 unsigned long flags;
869 spin_lock_irqsave(&tty->ctrl_lock, flags);
870 if (tty->stopped) {
871 spin_unlock_irqrestore(&tty->ctrl_lock, flags);
1da177e4 872 return;
04f378b1 873 }
1da177e4
LT
874 tty->stopped = 1;
875 if (tty->link && tty->link->packet) {
876 tty->ctrl_status &= ~TIOCPKT_START;
877 tty->ctrl_status |= TIOCPKT_STOP;
4b19449d 878 wake_up_interruptible_poll(&tty->link->read_wait, POLLIN);
1da177e4 879 }
04f378b1 880 spin_unlock_irqrestore(&tty->ctrl_lock, flags);
f34d7a5b
AC
881 if (tty->ops->stop)
882 (tty->ops->stop)(tty);
1da177e4
LT
883}
884
885EXPORT_SYMBOL(stop_tty);
886
af9b897e 887/**
beb7dd86 888 * start_tty - propagate flow control
af9b897e
AC
889 * @tty: tty to start
890 *
891 * Start a tty that has been stopped if at all possible. Perform
3a4fa0a2 892 * any necessary wakeups and propagate the TIOCPKT status. If this
af9b897e
AC
893 * is the tty was previous stopped and is being started then the
894 * driver start method is invoked and the line discipline woken.
895 *
896 * Locking:
04f378b1 897 * ctrl_lock
af9b897e
AC
898 */
899
1da177e4
LT
900void start_tty(struct tty_struct *tty)
901{
04f378b1
AC
902 unsigned long flags;
903 spin_lock_irqsave(&tty->ctrl_lock, flags);
904 if (!tty->stopped || tty->flow_stopped) {
905 spin_unlock_irqrestore(&tty->ctrl_lock, flags);
1da177e4 906 return;
04f378b1 907 }
1da177e4
LT
908 tty->stopped = 0;
909 if (tty->link && tty->link->packet) {
910 tty->ctrl_status &= ~TIOCPKT_STOP;
911 tty->ctrl_status |= TIOCPKT_START;
4b19449d 912 wake_up_interruptible_poll(&tty->link->read_wait, POLLIN);
1da177e4 913 }
04f378b1 914 spin_unlock_irqrestore(&tty->ctrl_lock, flags);
f34d7a5b
AC
915 if (tty->ops->start)
916 (tty->ops->start)(tty);
1da177e4
LT
917 /* If we have a running line discipline it may need kicking */
918 tty_wakeup(tty);
1da177e4
LT
919}
920
921EXPORT_SYMBOL(start_tty);
922
af9b897e
AC
923/**
924 * tty_read - read method for tty device files
925 * @file: pointer to tty file
926 * @buf: user buffer
927 * @count: size of user buffer
928 * @ppos: unused
929 *
930 * Perform the read system call function on this terminal device. Checks
931 * for hung up devices before calling the line discipline method.
932 *
933 * Locking:
47f86834
AC
934 * Locks the line discipline internally while needed. Multiple
935 * read calls may be outstanding in parallel.
af9b897e
AC
936 */
937
37bdfb07 938static ssize_t tty_read(struct file *file, char __user *buf, size_t count,
1da177e4
LT
939 loff_t *ppos)
940{
941 int i;
d996b62a
NP
942 struct inode *inode = file->f_path.dentry->d_inode;
943 struct tty_struct *tty = file_tty(file);
1da177e4
LT
944 struct tty_ldisc *ld;
945
1da177e4
LT
946 if (tty_paranoia_check(tty, inode, "tty_read"))
947 return -EIO;
948 if (!tty || (test_bit(TTY_IO_ERROR, &tty->flags)))
949 return -EIO;
950
951 /* We want to wait for the line discipline to sort out in this
952 situation */
953 ld = tty_ldisc_ref_wait(tty);
a352def2
AC
954 if (ld->ops->read)
955 i = (ld->ops->read)(tty, file, buf, count);
1da177e4
LT
956 else
957 i = -EIO;
958 tty_ldisc_deref(ld);
1da177e4
LT
959 if (i > 0)
960 inode->i_atime = current_fs_time(inode->i_sb);
961 return i;
962}
963
9c1729db 964void tty_write_unlock(struct tty_struct *tty)
83c67571 965 __releases(&tty->atomic_write_lock)
9c1729db
AC
966{
967 mutex_unlock(&tty->atomic_write_lock);
4b19449d 968 wake_up_interruptible_poll(&tty->write_wait, POLLOUT);
9c1729db
AC
969}
970
971int tty_write_lock(struct tty_struct *tty, int ndelay)
83c67571 972 __acquires(&tty->atomic_write_lock)
9c1729db
AC
973{
974 if (!mutex_trylock(&tty->atomic_write_lock)) {
975 if (ndelay)
976 return -EAGAIN;
977 if (mutex_lock_interruptible(&tty->atomic_write_lock))
978 return -ERESTARTSYS;
979 }
980 return 0;
981}
982
1da177e4
LT
983/*
984 * Split writes up in sane blocksizes to avoid
985 * denial-of-service type attacks
986 */
987static inline ssize_t do_tty_write(
988 ssize_t (*write)(struct tty_struct *, struct file *, const unsigned char *, size_t),
989 struct tty_struct *tty,
990 struct file *file,
991 const char __user *buf,
992 size_t count)
993{
9c1729db 994 ssize_t ret, written = 0;
1da177e4 995 unsigned int chunk;
37bdfb07 996
9c1729db
AC
997 ret = tty_write_lock(tty, file->f_flags & O_NDELAY);
998 if (ret < 0)
999 return ret;
1da177e4
LT
1000
1001 /*
1002 * We chunk up writes into a temporary buffer. This
1003 * simplifies low-level drivers immensely, since they
1004 * don't have locking issues and user mode accesses.
1005 *
1006 * But if TTY_NO_WRITE_SPLIT is set, we should use a
1007 * big chunk-size..
1008 *
1009 * The default chunk-size is 2kB, because the NTTY
1010 * layer has problems with bigger chunks. It will
1011 * claim to be able to handle more characters than
1012 * it actually does.
af9b897e
AC
1013 *
1014 * FIXME: This can probably go away now except that 64K chunks
1015 * are too likely to fail unless switched to vmalloc...
1da177e4
LT
1016 */
1017 chunk = 2048;
1018 if (test_bit(TTY_NO_WRITE_SPLIT, &tty->flags))
1019 chunk = 65536;
1020 if (count < chunk)
1021 chunk = count;
1022
70522e12 1023 /* write_buf/write_cnt is protected by the atomic_write_lock mutex */
1da177e4 1024 if (tty->write_cnt < chunk) {
402fda92 1025 unsigned char *buf_chunk;
1da177e4
LT
1026
1027 if (chunk < 1024)
1028 chunk = 1024;
1029
402fda92
JW
1030 buf_chunk = kmalloc(chunk, GFP_KERNEL);
1031 if (!buf_chunk) {
9c1729db
AC
1032 ret = -ENOMEM;
1033 goto out;
1da177e4
LT
1034 }
1035 kfree(tty->write_buf);
1036 tty->write_cnt = chunk;
402fda92 1037 tty->write_buf = buf_chunk;
1da177e4
LT
1038 }
1039
1040 /* Do the write .. */
1041 for (;;) {
1042 size_t size = count;
1043 if (size > chunk)
1044 size = chunk;
1045 ret = -EFAULT;
1046 if (copy_from_user(tty->write_buf, buf, size))
1047 break;
1da177e4 1048 ret = write(tty, file, tty->write_buf, size);
1da177e4
LT
1049 if (ret <= 0)
1050 break;
1051 written += ret;
1052 buf += ret;
1053 count -= ret;
1054 if (!count)
1055 break;
1056 ret = -ERESTARTSYS;
1057 if (signal_pending(current))
1058 break;
1059 cond_resched();
1060 }
1061 if (written) {
a7113a96 1062 struct inode *inode = file->f_path.dentry->d_inode;
1da177e4
LT
1063 inode->i_mtime = current_fs_time(inode->i_sb);
1064 ret = written;
1065 }
9c1729db
AC
1066out:
1067 tty_write_unlock(tty);
1da177e4
LT
1068 return ret;
1069}
1070
95f9bfc6
AC
1071/**
1072 * tty_write_message - write a message to a certain tty, not just the console.
1073 * @tty: the destination tty_struct
1074 * @msg: the message to write
1075 *
1076 * This is used for messages that need to be redirected to a specific tty.
1077 * We don't put it into the syslog queue right now maybe in the future if
1078 * really needed.
1079 *
ec79d605 1080 * We must still hold the BTM and test the CLOSING flag for the moment.
95f9bfc6
AC
1081 */
1082
1083void tty_write_message(struct tty_struct *tty, char *msg)
1084{
95f9bfc6
AC
1085 if (tty) {
1086 mutex_lock(&tty->atomic_write_lock);
ec79d605 1087 tty_lock();
eeb89d91 1088 if (tty->ops->write && !test_bit(TTY_CLOSING, &tty->flags)) {
ec79d605 1089 tty_unlock();
95f9bfc6 1090 tty->ops->write(tty, msg, strlen(msg));
eeb89d91 1091 } else
ec79d605 1092 tty_unlock();
95f9bfc6
AC
1093 tty_write_unlock(tty);
1094 }
95f9bfc6
AC
1095 return;
1096}
1097
1da177e4 1098
af9b897e
AC
1099/**
1100 * tty_write - write method for tty device file
1101 * @file: tty file pointer
1102 * @buf: user data to write
1103 * @count: bytes to write
1104 * @ppos: unused
1105 *
1106 * Write data to a tty device via the line discipline.
1107 *
1108 * Locking:
1109 * Locks the line discipline as required
1110 * Writes to the tty driver are serialized by the atomic_write_lock
1111 * and are then processed in chunks to the device. The line discipline
a88a69c9 1112 * write method will not be invoked in parallel for each device.
af9b897e
AC
1113 */
1114
37bdfb07
AC
1115static ssize_t tty_write(struct file *file, const char __user *buf,
1116 size_t count, loff_t *ppos)
1da177e4 1117{
a7113a96 1118 struct inode *inode = file->f_path.dentry->d_inode;
d996b62a
NP
1119 struct tty_struct *tty = file_tty(file);
1120 struct tty_ldisc *ld;
1da177e4 1121 ssize_t ret;
37bdfb07 1122
1da177e4
LT
1123 if (tty_paranoia_check(tty, inode, "tty_write"))
1124 return -EIO;
f34d7a5b 1125 if (!tty || !tty->ops->write ||
37bdfb07
AC
1126 (test_bit(TTY_IO_ERROR, &tty->flags)))
1127 return -EIO;
f34d7a5b
AC
1128 /* Short term debug to catch buggy drivers */
1129 if (tty->ops->write_room == NULL)
1130 printk(KERN_ERR "tty driver %s lacks a write_room method.\n",
1131 tty->driver->name);
37bdfb07 1132 ld = tty_ldisc_ref_wait(tty);
a352def2 1133 if (!ld->ops->write)
1da177e4
LT
1134 ret = -EIO;
1135 else
a352def2 1136 ret = do_tty_write(ld->ops->write, tty, file, buf, count);
1da177e4
LT
1137 tty_ldisc_deref(ld);
1138 return ret;
1139}
1140
37bdfb07
AC
1141ssize_t redirected_tty_write(struct file *file, const char __user *buf,
1142 size_t count, loff_t *ppos)
1da177e4
LT
1143{
1144 struct file *p = NULL;
1145
1146 spin_lock(&redirect_lock);
1147 if (redirect) {
1148 get_file(redirect);
1149 p = redirect;
1150 }
1151 spin_unlock(&redirect_lock);
1152
1153 if (p) {
1154 ssize_t res;
1155 res = vfs_write(p, buf, count, &p->f_pos);
1156 fput(p);
1157 return res;
1158 }
1da177e4
LT
1159 return tty_write(file, buf, count, ppos);
1160}
1161
1162static char ptychar[] = "pqrstuvwxyzabcde";
1163
af9b897e
AC
1164/**
1165 * pty_line_name - generate name for a pty
1166 * @driver: the tty driver in use
1167 * @index: the minor number
1168 * @p: output buffer of at least 6 bytes
1169 *
1170 * Generate a name from a driver reference and write it to the output
1171 * buffer.
1172 *
1173 * Locking: None
1174 */
1175static void pty_line_name(struct tty_driver *driver, int index, char *p)
1da177e4
LT
1176{
1177 int i = index + driver->name_base;
1178 /* ->name is initialized to "ttyp", but "tty" is expected */
1179 sprintf(p, "%s%c%x",
37bdfb07
AC
1180 driver->subtype == PTY_TYPE_SLAVE ? "tty" : driver->name,
1181 ptychar[i >> 4 & 0xf], i & 0xf);
1da177e4
LT
1182}
1183
af9b897e 1184/**
8b0a88d5 1185 * tty_line_name - generate name for a tty
af9b897e
AC
1186 * @driver: the tty driver in use
1187 * @index: the minor number
1188 * @p: output buffer of at least 7 bytes
1189 *
1190 * Generate a name from a driver reference and write it to the output
1191 * buffer.
1192 *
1193 * Locking: None
1194 */
1195static void tty_line_name(struct tty_driver *driver, int index, char *p)
1da177e4
LT
1196{
1197 sprintf(p, "%s%d", driver->name, index + driver->name_base);
1198}
1199
99f1fe18
AC
1200/**
1201 * tty_driver_lookup_tty() - find an existing tty, if any
1202 * @driver: the driver for the tty
1203 * @idx: the minor number
23499705 1204 *
99f1fe18 1205 * Return the tty, if found or ERR_PTR() otherwise.
23499705 1206 *
99f1fe18
AC
1207 * Locking: tty_mutex must be held. If tty is found, the mutex must
1208 * be held until the 'fast-open' is also done. Will change once we
1209 * have refcounting in the driver and per driver locking
23499705 1210 */
a47d545f 1211static struct tty_struct *tty_driver_lookup_tty(struct tty_driver *driver,
15f1a633 1212 struct inode *inode, int idx)
23499705
SB
1213{
1214 struct tty_struct *tty;
1215
99f1fe18 1216 if (driver->ops->lookup)
15f1a633 1217 return driver->ops->lookup(driver, inode, idx);
23499705 1218
8b0a88d5 1219 tty = driver->ttys[idx];
23499705
SB
1220 return tty;
1221}
1222
bf970ee4
AC
1223/**
1224 * tty_init_termios - helper for termios setup
1225 * @tty: the tty to set up
1226 *
1227 * Initialise the termios structures for this tty. Thus runs under
1228 * the tty_mutex currently so we can be relaxed about ordering.
1229 */
1230
1231int tty_init_termios(struct tty_struct *tty)
1232{
fe6e29fd 1233 struct ktermios *tp;
bf970ee4
AC
1234 int idx = tty->index;
1235
1236 tp = tty->driver->termios[idx];
bf970ee4 1237 if (tp == NULL) {
fe6e29fd
AC
1238 tp = kzalloc(sizeof(struct ktermios[2]), GFP_KERNEL);
1239 if (tp == NULL)
bf970ee4 1240 return -ENOMEM;
bf970ee4
AC
1241 memcpy(tp, &tty->driver->init_termios,
1242 sizeof(struct ktermios));
1243 tty->driver->termios[idx] = tp;
bf970ee4
AC
1244 }
1245 tty->termios = tp;
fe6e29fd 1246 tty->termios_locked = tp + 1;
bf970ee4
AC
1247
1248 /* Compatibility until drivers always set this */
1249 tty->termios->c_ispeed = tty_termios_input_baud_rate(tty->termios);
1250 tty->termios->c_ospeed = tty_termios_baud_rate(tty->termios);
1251 return 0;
1252}
fe1ae7fd 1253EXPORT_SYMBOL_GPL(tty_init_termios);
bf970ee4 1254
99f1fe18 1255/**
8b0a88d5
AC
1256 * tty_driver_install_tty() - install a tty entry in the driver
1257 * @driver: the driver for the tty
1258 * @tty: the tty
1259 *
1260 * Install a tty object into the driver tables. The tty->index field
bf970ee4
AC
1261 * will be set by the time this is called. This method is responsible
1262 * for ensuring any need additional structures are allocated and
1263 * configured.
8b0a88d5
AC
1264 *
1265 * Locking: tty_mutex for now
1266 */
1267static int tty_driver_install_tty(struct tty_driver *driver,
1268 struct tty_struct *tty)
1269{
bf970ee4 1270 int idx = tty->index;
eeb89d91 1271 int ret;
bf970ee4 1272
eeb89d91 1273 if (driver->ops->install) {
eeb89d91 1274 ret = driver->ops->install(driver, tty);
eeb89d91
AC
1275 return ret;
1276 }
bf970ee4
AC
1277
1278 if (tty_init_termios(tty) == 0) {
1279 tty_driver_kref_get(driver);
1280 tty->count++;
1281 driver->ttys[idx] = tty;
1282 return 0;
1283 }
1284 return -ENOMEM;
8b0a88d5
AC
1285}
1286
1287/**
1288 * tty_driver_remove_tty() - remove a tty from the driver tables
1289 * @driver: the driver for the tty
1290 * @idx: the minor number
1291 *
1292 * Remvoe a tty object from the driver tables. The tty->index field
1293 * will be set by the time this is called.
1294 *
1295 * Locking: tty_mutex for now
1296 */
1297static void tty_driver_remove_tty(struct tty_driver *driver,
1298 struct tty_struct *tty)
1299{
1300 if (driver->ops->remove)
1301 driver->ops->remove(driver, tty);
1302 else
1303 driver->ttys[tty->index] = NULL;
1304}
1305
1306/*
1307 * tty_reopen() - fast re-open of an open tty
1308 * @tty - the tty to open
23499705 1309 *
99f1fe18 1310 * Return 0 on success, -errno on error.
23499705 1311 *
99f1fe18
AC
1312 * Locking: tty_mutex must be held from the time the tty was found
1313 * till this open completes.
23499705 1314 */
99f1fe18 1315static int tty_reopen(struct tty_struct *tty)
23499705
SB
1316{
1317 struct tty_driver *driver = tty->driver;
1318
e2efafbf 1319 if (test_bit(TTY_CLOSING, &tty->flags) ||
acfa747b 1320 test_bit(TTY_HUPPING, &tty->flags) ||
e2efafbf 1321 test_bit(TTY_LDISC_CHANGING, &tty->flags))
23499705
SB
1322 return -EIO;
1323
1324 if (driver->type == TTY_DRIVER_TYPE_PTY &&
1325 driver->subtype == PTY_TYPE_MASTER) {
1326 /*
1327 * special case for PTY masters: only one open permitted,
1328 * and the slave side open count is incremented as well.
1329 */
1330 if (tty->count)
1331 return -EIO;
1332
1333 tty->link->count++;
1334 }
1335 tty->count++;
1336 tty->driver = driver; /* N.B. why do this every time?? */
1337
1aa4bed8 1338 mutex_lock(&tty->ldisc_mutex);
99f1fe18 1339 WARN_ON(!test_bit(TTY_LDISC, &tty->flags));
1aa4bed8 1340 mutex_unlock(&tty->ldisc_mutex);
23499705
SB
1341
1342 return 0;
1343}
1344
af9b897e 1345/**
d81ed103 1346 * tty_init_dev - initialise a tty device
af9b897e
AC
1347 * @driver: tty driver we are opening a device on
1348 * @idx: device index
15582d36
AC
1349 * @ret_tty: returned tty structure
1350 * @first_ok: ok to open a new device (used by ptmx)
af9b897e
AC
1351 *
1352 * Prepare a tty device. This may not be a "new" clean device but
1353 * could also be an active device. The pty drivers require special
1354 * handling because of this.
1355 *
1356 * Locking:
1357 * The function is called under the tty_mutex, which
1358 * protects us from the tty struct or driver itself going away.
1359 *
1360 * On exit the tty device has the line discipline attached and
1361 * a reference count of 1. If a pair was created for pty/tty use
1362 * and the other was a pty master then it too has a reference count of 1.
1363 *
1da177e4 1364 * WSH 06/09/97: Rewritten to remove races and properly clean up after a
70522e12
IM
1365 * failed open. The new code protects the open with a mutex, so it's
1366 * really quite straightforward. The mutex locking can probably be
1da177e4
LT
1367 * relaxed for the (most common) case of reopening a tty.
1368 */
af9b897e 1369
73ec06fc
AC
1370struct tty_struct *tty_init_dev(struct tty_driver *driver, int idx,
1371 int first_ok)
1da177e4 1372{
bf970ee4 1373 struct tty_struct *tty;
73ec06fc 1374 int retval;
1da177e4 1375
23499705 1376 /* Check if pty master is being opened multiple times */
15582d36 1377 if (driver->subtype == PTY_TYPE_MASTER &&
eeb89d91 1378 (driver->flags & TTY_DRIVER_DEVPTS_MEM) && !first_ok) {
73ec06fc 1379 return ERR_PTR(-EIO);
eeb89d91 1380 }
73ec06fc 1381
1da177e4
LT
1382 /*
1383 * First time open is complex, especially for PTY devices.
1384 * This code guarantees that either everything succeeds and the
1385 * TTY is ready for operation, or else the table slots are vacated
37bdfb07 1386 * and the allocated memory released. (Except that the termios
1da177e4
LT
1387 * and locked termios may be retained.)
1388 */
1389
73ec06fc
AC
1390 if (!try_module_get(driver->owner))
1391 return ERR_PTR(-ENODEV);
1da177e4 1392
1da177e4 1393 tty = alloc_tty_struct();
d5543503
JS
1394 if (!tty) {
1395 retval = -ENOMEM;
1396 goto err_module_put;
1397 }
bf970ee4 1398 initialize_tty_struct(tty, driver, idx);
1da177e4 1399
73ec06fc 1400 retval = tty_driver_install_tty(driver, tty);
d5543503 1401 if (retval < 0)
a9dccddb 1402 goto err_deinit_tty;
8b0a88d5 1403
37bdfb07 1404 /*
1da177e4 1405 * Structures all installed ... call the ldisc open routines.
d5698c28
CH
1406 * If we fail here just call release_tty to clean up. No need
1407 * to decrement the use counts, as release_tty doesn't care.
1da177e4 1408 */
bf970ee4 1409 retval = tty_ldisc_setup(tty, tty->link);
01e1abb2 1410 if (retval)
d5543503 1411 goto err_release_tty;
73ec06fc 1412 return tty;
1da177e4 1413
a9dccddb
JS
1414err_deinit_tty:
1415 deinitialize_tty_struct(tty);
d5543503
JS
1416 free_tty_struct(tty);
1417err_module_put:
1da177e4 1418 module_put(driver->owner);
d5543503 1419 return ERR_PTR(retval);
1da177e4 1420
d5698c28 1421 /* call the tty release_tty routine to clean out this slot */
d5543503 1422err_release_tty:
4050914f 1423 if (printk_ratelimit())
d81ed103 1424 printk(KERN_INFO "tty_init_dev: ldisc open failed, "
4050914f 1425 "clearing slot %d\n", idx);
d5698c28 1426 release_tty(tty, idx);
73ec06fc 1427 return ERR_PTR(retval);
1da177e4
LT
1428}
1429
feebed65
AC
1430void tty_free_termios(struct tty_struct *tty)
1431{
1432 struct ktermios *tp;
1433 int idx = tty->index;
1434 /* Kill this flag and push into drivers for locking etc */
1435 if (tty->driver->flags & TTY_DRIVER_RESET_TERMIOS) {
1436 /* FIXME: Locking on ->termios array */
1437 tp = tty->termios;
1438 tty->driver->termios[idx] = NULL;
1439 kfree(tp);
feebed65
AC
1440 }
1441}
1442EXPORT_SYMBOL(tty_free_termios);
1443
1444void tty_shutdown(struct tty_struct *tty)
1445{
8b0a88d5 1446 tty_driver_remove_tty(tty->driver, tty);
feebed65
AC
1447 tty_free_termios(tty);
1448}
1449EXPORT_SYMBOL(tty_shutdown);
1450
af9b897e 1451/**
d5698c28 1452 * release_one_tty - release tty structure memory
9c9f4ded 1453 * @kref: kref of tty we are obliterating
af9b897e
AC
1454 *
1455 * Releases memory associated with a tty structure, and clears out the
1456 * driver table slots. This function is called when a device is no longer
1457 * in use. It also gets called when setup of a device fails.
1458 *
1459 * Locking:
1460 * tty_mutex - sometimes only
1461 * takes the file list lock internally when working on the list
1462 * of ttys that the driver keeps.
b50989dc
AC
1463 *
1464 * This method gets called from a work queue so that the driver private
f278a2f7 1465 * cleanup ops can sleep (needed for USB at least)
1da177e4 1466 */
b50989dc 1467static void release_one_tty(struct work_struct *work)
1da177e4 1468{
b50989dc
AC
1469 struct tty_struct *tty =
1470 container_of(work, struct tty_struct, hangup_work);
6f967f78 1471 struct tty_driver *driver = tty->driver;
d5698c28 1472
f278a2f7
DY
1473 if (tty->ops->cleanup)
1474 tty->ops->cleanup(tty);
1475
1da177e4 1476 tty->magic = 0;
7d7b93c1 1477 tty_driver_kref_put(driver);
6f967f78 1478 module_put(driver->owner);
d5698c28 1479
ee2ffa0d 1480 spin_lock(&tty_files_lock);
1da177e4 1481 list_del_init(&tty->tty_files);
ee2ffa0d 1482 spin_unlock(&tty_files_lock);
d5698c28 1483
6da8d866
ON
1484 put_pid(tty->pgrp);
1485 put_pid(tty->session);
1da177e4
LT
1486 free_tty_struct(tty);
1487}
1488
b50989dc
AC
1489static void queue_release_one_tty(struct kref *kref)
1490{
1491 struct tty_struct *tty = container_of(kref, struct tty_struct, kref);
f278a2f7
DY
1492
1493 if (tty->ops->shutdown)
1494 tty->ops->shutdown(tty);
1495 else
1496 tty_shutdown(tty);
1497
b50989dc
AC
1498 /* The hangup queue is now free so we can reuse it rather than
1499 waste a chunk of memory for each port */
1500 INIT_WORK(&tty->hangup_work, release_one_tty);
1501 schedule_work(&tty->hangup_work);
1502}
1503
9c9f4ded
AC
1504/**
1505 * tty_kref_put - release a tty kref
1506 * @tty: tty device
1507 *
1508 * Release a reference to a tty device and if need be let the kref
1509 * layer destruct the object for us
1510 */
1511
1512void tty_kref_put(struct tty_struct *tty)
1513{
1514 if (tty)
b50989dc 1515 kref_put(&tty->kref, queue_release_one_tty);
9c9f4ded
AC
1516}
1517EXPORT_SYMBOL(tty_kref_put);
1518
d5698c28
CH
1519/**
1520 * release_tty - release tty structure memory
1521 *
1522 * Release both @tty and a possible linked partner (think pty pair),
1523 * and decrement the refcount of the backing module.
1524 *
1525 * Locking:
1526 * tty_mutex - sometimes only
1527 * takes the file list lock internally when working on the list
1528 * of ttys that the driver keeps.
1529 * FIXME: should we require tty_mutex is held here ??
9c9f4ded 1530 *
d5698c28
CH
1531 */
1532static void release_tty(struct tty_struct *tty, int idx)
1533{
9c9f4ded
AC
1534 /* This should always be true but check for the moment */
1535 WARN_ON(tty->index != idx);
1536
d5698c28 1537 if (tty->link)
9c9f4ded
AC
1538 tty_kref_put(tty->link);
1539 tty_kref_put(tty);
d5698c28
CH
1540}
1541
eeb89d91
AC
1542/**
1543 * tty_release - vfs callback for close
1544 * @inode: inode of tty
1545 * @filp: file pointer for handle to tty
1546 *
1547 * Called the last time each file handle is closed that references
1548 * this tty. There may however be several such references.
1549 *
1550 * Locking:
1551 * Takes bkl. See tty_release_dev
1552 *
1da177e4
LT
1553 * Even releasing the tty structures is a tricky business.. We have
1554 * to be very careful that the structures are all released at the
1555 * same time, as interrupts might otherwise get the wrong pointers.
1556 *
1557 * WSH 09/09/97: rewritten to avoid some nasty race conditions that could
1558 * lead to double frees or releasing memory still in use.
1559 */
eeb89d91
AC
1560
1561int tty_release(struct inode *inode, struct file *filp)
1da177e4 1562{
d996b62a
NP
1563 struct tty_struct *tty = file_tty(filp);
1564 struct tty_struct *o_tty;
1da177e4 1565 int pty_master, tty_closing, o_tty_closing, do_sleep;
14a6283e 1566 int devpts;
1da177e4
LT
1567 int idx;
1568 char buf[64];
37bdfb07 1569
15f1a633 1570 if (tty_paranoia_check(tty, inode, "tty_release_dev"))
eeb89d91 1571 return 0;
1da177e4 1572
ec79d605 1573 tty_lock();
d81ed103 1574 check_tty_count(tty, "tty_release_dev");
1da177e4 1575
ec79d605 1576 __tty_fasync(-1, filp, 0);
1da177e4
LT
1577
1578 idx = tty->index;
1579 pty_master = (tty->driver->type == TTY_DRIVER_TYPE_PTY &&
1580 tty->driver->subtype == PTY_TYPE_MASTER);
1581 devpts = (tty->driver->flags & TTY_DRIVER_DEVPTS_MEM) != 0;
1da177e4
LT
1582 o_tty = tty->link;
1583
1584#ifdef TTY_PARANOIA_CHECK
1585 if (idx < 0 || idx >= tty->driver->num) {
d81ed103 1586 printk(KERN_DEBUG "tty_release_dev: bad idx when trying to "
1da177e4 1587 "free (%s)\n", tty->name);
ec79d605 1588 tty_unlock();
eeb89d91 1589 return 0;
1da177e4 1590 }
8b0a88d5 1591 if (!devpts) {
1da177e4 1592 if (tty != tty->driver->ttys[idx]) {
ec79d605 1593 tty_unlock();
d81ed103 1594 printk(KERN_DEBUG "tty_release_dev: driver.table[%d] not tty "
1da177e4 1595 "for (%s)\n", idx, tty->name);
eeb89d91 1596 return 0;
1da177e4
LT
1597 }
1598 if (tty->termios != tty->driver->termios[idx]) {
ec79d605 1599 tty_unlock();
d81ed103 1600 printk(KERN_DEBUG "tty_release_dev: driver.termios[%d] not termios "
1da177e4
LT
1601 "for (%s)\n",
1602 idx, tty->name);
eeb89d91 1603 return 0;
1da177e4 1604 }
1da177e4
LT
1605 }
1606#endif
1607
1608#ifdef TTY_DEBUG_HANGUP
d81ed103 1609 printk(KERN_DEBUG "tty_release_dev of %s (tty count=%d)...",
1da177e4
LT
1610 tty_name(tty, buf), tty->count);
1611#endif
1612
1613#ifdef TTY_PARANOIA_CHECK
1614 if (tty->driver->other &&
1615 !(tty->driver->flags & TTY_DRIVER_DEVPTS_MEM)) {
1616 if (o_tty != tty->driver->other->ttys[idx]) {
ec79d605 1617 tty_unlock();
d81ed103 1618 printk(KERN_DEBUG "tty_release_dev: other->table[%d] "
1da177e4
LT
1619 "not o_tty for (%s)\n",
1620 idx, tty->name);
eeb89d91 1621 return 0 ;
1da177e4
LT
1622 }
1623 if (o_tty->termios != tty->driver->other->termios[idx]) {
ec79d605 1624 tty_unlock();
d81ed103 1625 printk(KERN_DEBUG "tty_release_dev: other->termios[%d] "
1da177e4
LT
1626 "not o_termios for (%s)\n",
1627 idx, tty->name);
eeb89d91 1628 return 0;
1da177e4 1629 }
1da177e4 1630 if (o_tty->link != tty) {
ec79d605 1631 tty_unlock();
d81ed103 1632 printk(KERN_DEBUG "tty_release_dev: bad pty pointers\n");
eeb89d91 1633 return 0;
1da177e4
LT
1634 }
1635 }
1636#endif
f34d7a5b
AC
1637 if (tty->ops->close)
1638 tty->ops->close(tty, filp);
1da177e4 1639
ec79d605 1640 tty_unlock();
1da177e4
LT
1641 /*
1642 * Sanity check: if tty->count is going to zero, there shouldn't be
1643 * any waiters on tty->read_wait or tty->write_wait. We test the
1644 * wait queues and kick everyone out _before_ actually starting to
1645 * close. This ensures that we won't block while releasing the tty
1646 * structure.
1647 *
1648 * The test for the o_tty closing is necessary, since the master and
1649 * slave sides may close in any order. If the slave side closes out
1650 * first, its count will be one, since the master side holds an open.
1651 * Thus this test wouldn't be triggered at the time the slave closes,
1652 * so we do it now.
1653 *
1654 * Note that it's possible for the tty to be opened again while we're
1655 * flushing out waiters. By recalculating the closing flags before
1656 * each iteration we avoid any problems.
1657 */
1658 while (1) {
1659 /* Guard against races with tty->count changes elsewhere and
1660 opens on /dev/tty */
37bdfb07 1661
70522e12 1662 mutex_lock(&tty_mutex);
ec79d605 1663 tty_lock();
1da177e4
LT
1664 tty_closing = tty->count <= 1;
1665 o_tty_closing = o_tty &&
1666 (o_tty->count <= (pty_master ? 1 : 0));
1da177e4
LT
1667 do_sleep = 0;
1668
1669 if (tty_closing) {
1670 if (waitqueue_active(&tty->read_wait)) {
4b19449d 1671 wake_up_poll(&tty->read_wait, POLLIN);
1da177e4
LT
1672 do_sleep++;
1673 }
1674 if (waitqueue_active(&tty->write_wait)) {
4b19449d 1675 wake_up_poll(&tty->write_wait, POLLOUT);
1da177e4
LT
1676 do_sleep++;
1677 }
1678 }
1679 if (o_tty_closing) {
1680 if (waitqueue_active(&o_tty->read_wait)) {
4b19449d 1681 wake_up_poll(&o_tty->read_wait, POLLIN);
1da177e4
LT
1682 do_sleep++;
1683 }
1684 if (waitqueue_active(&o_tty->write_wait)) {
4b19449d 1685 wake_up_poll(&o_tty->write_wait, POLLOUT);
1da177e4
LT
1686 do_sleep++;
1687 }
1688 }
1689 if (!do_sleep)
1690 break;
1691
d81ed103 1692 printk(KERN_WARNING "tty_release_dev: %s: read/write wait queue "
1da177e4 1693 "active!\n", tty_name(tty, buf));
ec79d605 1694 tty_unlock();
70522e12 1695 mutex_unlock(&tty_mutex);
1da177e4 1696 schedule();
37bdfb07 1697 }
1da177e4
LT
1698
1699 /*
37bdfb07
AC
1700 * The closing flags are now consistent with the open counts on
1701 * both sides, and we've completed the last operation that could
1da177e4
LT
1702 * block, so it's safe to proceed with closing.
1703 */
1da177e4
LT
1704 if (pty_master) {
1705 if (--o_tty->count < 0) {
d81ed103 1706 printk(KERN_WARNING "tty_release_dev: bad pty slave count "
1da177e4
LT
1707 "(%d) for %s\n",
1708 o_tty->count, tty_name(o_tty, buf));
1709 o_tty->count = 0;
1710 }
1711 }
1712 if (--tty->count < 0) {
d81ed103 1713 printk(KERN_WARNING "tty_release_dev: bad tty->count (%d) for %s\n",
1da177e4
LT
1714 tty->count, tty_name(tty, buf));
1715 tty->count = 0;
1716 }
37bdfb07 1717
1da177e4
LT
1718 /*
1719 * We've decremented tty->count, so we need to remove this file
1720 * descriptor off the tty->tty_files list; this serves two
1721 * purposes:
1722 * - check_tty_count sees the correct number of file descriptors
1723 * associated with this tty.
1724 * - do_tty_hangup no longer sees this file descriptor as
1725 * something that needs to be handled for hangups.
1726 */
d996b62a 1727 tty_del_file(filp);
1da177e4
LT
1728
1729 /*
1730 * Perform some housekeeping before deciding whether to return.
1731 *
1732 * Set the TTY_CLOSING flag if this was the last open. In the
1733 * case of a pty we may have to wait around for the other side
1734 * to close, and TTY_CLOSING makes sure we can't be reopened.
1735 */
37bdfb07 1736 if (tty_closing)
1da177e4 1737 set_bit(TTY_CLOSING, &tty->flags);
37bdfb07 1738 if (o_tty_closing)
1da177e4
LT
1739 set_bit(TTY_CLOSING, &o_tty->flags);
1740
1741 /*
1742 * If _either_ side is closing, make sure there aren't any
1743 * processes that still think tty or o_tty is their controlling
1744 * tty.
1745 */
1746 if (tty_closing || o_tty_closing) {
1da177e4 1747 read_lock(&tasklist_lock);
24ec839c 1748 session_clear_tty(tty->session);
1da177e4 1749 if (o_tty)
24ec839c 1750 session_clear_tty(o_tty->session);
1da177e4
LT
1751 read_unlock(&tasklist_lock);
1752 }
1753
70522e12 1754 mutex_unlock(&tty_mutex);
da965822 1755
1da177e4 1756 /* check whether both sides are closing ... */
eeb89d91 1757 if (!tty_closing || (o_tty && !o_tty_closing)) {
ec79d605 1758 tty_unlock();
eeb89d91
AC
1759 return 0;
1760 }
37bdfb07 1761
1da177e4
LT
1762#ifdef TTY_DEBUG_HANGUP
1763 printk(KERN_DEBUG "freeing tty structure...");
1764#endif
1765 /*
01e1abb2 1766 * Ask the line discipline code to release its structures
1da177e4 1767 */
01e1abb2 1768 tty_ldisc_release(tty, o_tty);
1da177e4 1769 /*
d5698c28 1770 * The release_tty function takes care of the details of clearing
1da177e4
LT
1771 * the slots and preserving the termios structure.
1772 */
d5698c28 1773 release_tty(tty, idx);
1da177e4 1774
1da177e4 1775 /* Make this pty number available for reallocation */
718a9163 1776 if (devpts)
15f1a633 1777 devpts_kill_index(inode, idx);
ec79d605 1778 tty_unlock();
eeb89d91 1779 return 0;
1da177e4
LT
1780}
1781
af9b897e 1782/**
eeb89d91 1783 * tty_open - open a tty device
af9b897e
AC
1784 * @inode: inode of device file
1785 * @filp: file pointer to tty
1da177e4 1786 *
af9b897e
AC
1787 * tty_open and tty_release keep up the tty count that contains the
1788 * number of opens done on a tty. We cannot use the inode-count, as
1789 * different inodes might point to the same tty.
1da177e4 1790 *
af9b897e
AC
1791 * Open-counting is needed for pty masters, as well as for keeping
1792 * track of serial lines: DTR is dropped when the last close happens.
1793 * (This is not done solely through tty->count, now. - Ted 1/27/92)
1794 *
1795 * The termios state of a pty is reset on first open so that
1796 * settings don't persist across reuse.
1797 *
d81ed103 1798 * Locking: tty_mutex protects tty, get_tty_driver and tty_init_dev work.
24ec839c
PZ
1799 * tty->count should protect the rest.
1800 * ->siglock protects ->signal/->sighand
1da177e4 1801 */
af9b897e 1802
eeb89d91 1803static int tty_open(struct inode *inode, struct file *filp)
1da177e4 1804{
4a2b5fdd 1805 struct tty_struct *tty = NULL;
1da177e4
LT
1806 int noctty, retval;
1807 struct tty_driver *driver;
1808 int index;
1809 dev_t device = inode->i_rdev;
846c151a 1810 unsigned saved_flags = filp->f_flags;
1da177e4
LT
1811
1812 nonseekable_open(inode, filp);
37bdfb07 1813
1da177e4
LT
1814retry_open:
1815 noctty = filp->f_flags & O_NOCTTY;
1816 index = -1;
1817 retval = 0;
37bdfb07 1818
70522e12 1819 mutex_lock(&tty_mutex);
ec79d605 1820 tty_lock();
1da177e4 1821
37bdfb07 1822 if (device == MKDEV(TTYAUX_MAJOR, 0)) {
24ec839c
PZ
1823 tty = get_current_tty();
1824 if (!tty) {
ec79d605 1825 tty_unlock();
70522e12 1826 mutex_unlock(&tty_mutex);
1da177e4
LT
1827 return -ENXIO;
1828 }
7d7b93c1 1829 driver = tty_driver_kref_get(tty->driver);
24ec839c 1830 index = tty->index;
1da177e4
LT
1831 filp->f_flags |= O_NONBLOCK; /* Don't let /dev/tty block */
1832 /* noctty = 1; */
452a00d2
AC
1833 /* FIXME: Should we take a driver reference ? */
1834 tty_kref_put(tty);
1da177e4
LT
1835 goto got_driver;
1836 }
1837#ifdef CONFIG_VT
37bdfb07 1838 if (device == MKDEV(TTY_MAJOR, 0)) {
1da177e4 1839 extern struct tty_driver *console_driver;
7d7b93c1 1840 driver = tty_driver_kref_get(console_driver);
1da177e4
LT
1841 index = fg_console;
1842 noctty = 1;
1843 goto got_driver;
1844 }
1845#endif
37bdfb07 1846 if (device == MKDEV(TTYAUX_MAJOR, 1)) {
296fa7f6
WN
1847 struct tty_driver *console_driver = console_device(&index);
1848 if (console_driver) {
1849 driver = tty_driver_kref_get(console_driver);
1850 if (driver) {
1851 /* Don't let /dev/console block */
1852 filp->f_flags |= O_NONBLOCK;
1853 noctty = 1;
1854 goto got_driver;
1855 }
1da177e4 1856 }
ec79d605 1857 tty_unlock();
70522e12 1858 mutex_unlock(&tty_mutex);
1da177e4
LT
1859 return -ENODEV;
1860 }
1861
1862 driver = get_tty_driver(device, &index);
1863 if (!driver) {
ec79d605 1864 tty_unlock();
70522e12 1865 mutex_unlock(&tty_mutex);
1da177e4
LT
1866 return -ENODEV;
1867 }
1868got_driver:
4a2b5fdd
SB
1869 if (!tty) {
1870 /* check whether we're reopening an existing tty */
15f1a633 1871 tty = tty_driver_lookup_tty(driver, inode, index);
4a2b5fdd 1872
808ffa3d 1873 if (IS_ERR(tty)) {
ec79d605 1874 tty_unlock();
808ffa3d 1875 mutex_unlock(&tty_mutex);
4a2b5fdd 1876 return PTR_ERR(tty);
808ffa3d 1877 }
4a2b5fdd
SB
1878 }
1879
1880 if (tty) {
1881 retval = tty_reopen(tty);
1882 if (retval)
1883 tty = ERR_PTR(retval);
1884 } else
1885 tty = tty_init_dev(driver, index, 0);
1886
70522e12 1887 mutex_unlock(&tty_mutex);
7d7b93c1 1888 tty_driver_kref_put(driver);
eeb89d91 1889 if (IS_ERR(tty)) {
ec79d605 1890 tty_unlock();
73ec06fc 1891 return PTR_ERR(tty);
eeb89d91 1892 }
1da177e4 1893
f573bd17
PE
1894 retval = tty_add_file(tty, filp);
1895 if (retval) {
1896 tty_unlock();
0259894c 1897 tty_release(inode, filp);
f573bd17
PE
1898 return retval;
1899 }
d996b62a 1900
1da177e4
LT
1901 check_tty_count(tty, "tty_open");
1902 if (tty->driver->type == TTY_DRIVER_TYPE_PTY &&
1903 tty->driver->subtype == PTY_TYPE_MASTER)
1904 noctty = 1;
1905#ifdef TTY_DEBUG_HANGUP
1906 printk(KERN_DEBUG "opening %s...", tty->name);
1907#endif
909bc774
HRK
1908 if (tty->ops->open)
1909 retval = tty->ops->open(tty, filp);
1910 else
1911 retval = -ENODEV;
1da177e4
LT
1912 filp->f_flags = saved_flags;
1913
37bdfb07
AC
1914 if (!retval && test_bit(TTY_EXCLUSIVE, &tty->flags) &&
1915 !capable(CAP_SYS_ADMIN))
1da177e4
LT
1916 retval = -EBUSY;
1917
1918 if (retval) {
1919#ifdef TTY_DEBUG_HANGUP
1920 printk(KERN_DEBUG "error %d in opening %s...", retval,
1921 tty->name);
1922#endif
64ba3dc3 1923 tty_unlock(); /* need to call tty_release without BTM */
eeb89d91 1924 tty_release(inode, filp);
64ba3dc3 1925 if (retval != -ERESTARTSYS)
1da177e4 1926 return retval;
64ba3dc3
AB
1927
1928 if (signal_pending(current))
1da177e4 1929 return retval;
64ba3dc3 1930
1da177e4
LT
1931 schedule();
1932 /*
1933 * Need to reset f_op in case a hangup happened.
1934 */
64ba3dc3 1935 tty_lock();
1da177e4
LT
1936 if (filp->f_op == &hung_up_tty_fops)
1937 filp->f_op = &tty_fops;
ec79d605 1938 tty_unlock();
1da177e4
LT
1939 goto retry_open;
1940 }
ec79d605 1941 tty_unlock();
eeb89d91 1942
24ec839c
PZ
1943
1944 mutex_lock(&tty_mutex);
ec79d605 1945 tty_lock();
24ec839c 1946 spin_lock_irq(&current->sighand->siglock);
1da177e4
LT
1947 if (!noctty &&
1948 current->signal->leader &&
1949 !current->signal->tty &&
ab521dc0 1950 tty->session == NULL)
2a65f1d9 1951 __proc_set_tty(current, tty);
24ec839c 1952 spin_unlock_irq(&current->sighand->siglock);
ec79d605 1953 tty_unlock();
24ec839c 1954 mutex_unlock(&tty_mutex);
1da177e4
LT
1955 return 0;
1956}
1957
39d95b9d
JC
1958
1959
af9b897e
AC
1960/**
1961 * tty_poll - check tty status
1962 * @filp: file being polled
1963 * @wait: poll wait structures to update
1964 *
1965 * Call the line discipline polling method to obtain the poll
1966 * status of the device.
1967 *
1968 * Locking: locks called line discipline but ldisc poll method
1969 * may be re-entered freely by other callers.
1970 */
1971
37bdfb07 1972static unsigned int tty_poll(struct file *filp, poll_table *wait)
1da177e4 1973{
d996b62a 1974 struct tty_struct *tty = file_tty(filp);
1da177e4
LT
1975 struct tty_ldisc *ld;
1976 int ret = 0;
1977
a7113a96 1978 if (tty_paranoia_check(tty, filp->f_path.dentry->d_inode, "tty_poll"))
1da177e4 1979 return 0;
37bdfb07 1980
1da177e4 1981 ld = tty_ldisc_ref_wait(tty);
a352def2
AC
1982 if (ld->ops->poll)
1983 ret = (ld->ops->poll)(tty, filp, wait);
1da177e4
LT
1984 tty_ldisc_deref(ld);
1985 return ret;
1986}
1987
ec79d605 1988static int __tty_fasync(int fd, struct file *filp, int on)
1da177e4 1989{
d996b62a 1990 struct tty_struct *tty = file_tty(filp);
47f86834 1991 unsigned long flags;
5d1e3230 1992 int retval = 0;
1da177e4 1993
a7113a96 1994 if (tty_paranoia_check(tty, filp->f_path.dentry->d_inode, "tty_fasync"))
5d1e3230 1995 goto out;
37bdfb07 1996
1da177e4
LT
1997 retval = fasync_helper(fd, filp, on, &tty->fasync);
1998 if (retval <= 0)
5d1e3230 1999 goto out;
1da177e4
LT
2000
2001 if (on) {
ab521dc0
EB
2002 enum pid_type type;
2003 struct pid *pid;
1da177e4
LT
2004 if (!waitqueue_active(&tty->read_wait))
2005 tty->minimum_to_wake = 1;
47f86834 2006 spin_lock_irqsave(&tty->ctrl_lock, flags);
ab521dc0
EB
2007 if (tty->pgrp) {
2008 pid = tty->pgrp;
2009 type = PIDTYPE_PGID;
2010 } else {
2011 pid = task_pid(current);
2012 type = PIDTYPE_PID;
2013 }
80e1e823 2014 get_pid(pid);
70362511 2015 spin_unlock_irqrestore(&tty->ctrl_lock, flags);
80e1e823
LT
2016 retval = __f_setown(filp, pid, type, 0);
2017 put_pid(pid);
1da177e4 2018 if (retval)
5d1e3230 2019 goto out;
1da177e4
LT
2020 } else {
2021 if (!tty->fasync && !waitqueue_active(&tty->read_wait))
2022 tty->minimum_to_wake = N_TTY_BUF_SIZE;
2023 }
5d1e3230
JC
2024 retval = 0;
2025out:
ec79d605
AB
2026 return retval;
2027}
2028
2029static int tty_fasync(int fd, struct file *filp, int on)
2030{
2031 int retval;
2032 tty_lock();
2033 retval = __tty_fasync(fd, filp, on);
2034 tty_unlock();
5d1e3230 2035 return retval;
1da177e4
LT
2036}
2037
af9b897e
AC
2038/**
2039 * tiocsti - fake input character
2040 * @tty: tty to fake input into
2041 * @p: pointer to character
2042 *
3a4fa0a2 2043 * Fake input to a tty device. Does the necessary locking and
af9b897e
AC
2044 * input management.
2045 *
2046 * FIXME: does not honour flow control ??
2047 *
2048 * Locking:
2049 * Called functions take tty_ldisc_lock
2050 * current->signal->tty check is safe without locks
28298232
AC
2051 *
2052 * FIXME: may race normal receive processing
af9b897e
AC
2053 */
2054
1da177e4
LT
2055static int tiocsti(struct tty_struct *tty, char __user *p)
2056{
2057 char ch, mbz = 0;
2058 struct tty_ldisc *ld;
37bdfb07 2059
1da177e4
LT
2060 if ((current->signal->tty != tty) && !capable(CAP_SYS_ADMIN))
2061 return -EPERM;
2062 if (get_user(ch, p))
2063 return -EFAULT;
1e641743 2064 tty_audit_tiocsti(tty, ch);
1da177e4 2065 ld = tty_ldisc_ref_wait(tty);
a352def2 2066 ld->ops->receive_buf(tty, &ch, &mbz, 1);
1da177e4
LT
2067 tty_ldisc_deref(ld);
2068 return 0;
2069}
2070
af9b897e
AC
2071/**
2072 * tiocgwinsz - implement window query ioctl
2073 * @tty; tty
2074 * @arg: user buffer for result
2075 *
808a0d38 2076 * Copies the kernel idea of the window size into the user buffer.
af9b897e 2077 *
24ec839c 2078 * Locking: tty->termios_mutex is taken to ensure the winsize data
808a0d38 2079 * is consistent.
af9b897e
AC
2080 */
2081
37bdfb07 2082static int tiocgwinsz(struct tty_struct *tty, struct winsize __user *arg)
1da177e4 2083{
808a0d38
AC
2084 int err;
2085
5785c95b 2086 mutex_lock(&tty->termios_mutex);
808a0d38 2087 err = copy_to_user(arg, &tty->winsize, sizeof(*arg));
5785c95b 2088 mutex_unlock(&tty->termios_mutex);
808a0d38
AC
2089
2090 return err ? -EFAULT: 0;
1da177e4
LT
2091}
2092
af9b897e 2093/**
8c9a9dd0
AC
2094 * tty_do_resize - resize event
2095 * @tty: tty being resized
8c9a9dd0
AC
2096 * @rows: rows (character)
2097 * @cols: cols (character)
2098 *
3ad2f3fb 2099 * Update the termios variables and send the necessary signals to
8c9a9dd0 2100 * peform a terminal resize correctly
af9b897e
AC
2101 */
2102
fc6f6238 2103int tty_do_resize(struct tty_struct *tty, struct winsize *ws)
1da177e4 2104{
fc6f6238 2105 struct pid *pgrp;
47f86834 2106 unsigned long flags;
1da177e4 2107
fc6f6238
AC
2108 /* Lock the tty */
2109 mutex_lock(&tty->termios_mutex);
2110 if (!memcmp(ws, &tty->winsize, sizeof(*ws)))
ca9bda00 2111 goto done;
47f86834
AC
2112 /* Get the PID values and reference them so we can
2113 avoid holding the tty ctrl lock while sending signals */
2114 spin_lock_irqsave(&tty->ctrl_lock, flags);
2115 pgrp = get_pid(tty->pgrp);
47f86834
AC
2116 spin_unlock_irqrestore(&tty->ctrl_lock, flags);
2117
2118 if (pgrp)
2119 kill_pgrp(pgrp, SIGWINCH, 1);
47f86834 2120 put_pid(pgrp);
47f86834 2121
8c9a9dd0 2122 tty->winsize = *ws;
ca9bda00 2123done:
fc6f6238 2124 mutex_unlock(&tty->termios_mutex);
1da177e4
LT
2125 return 0;
2126}
2127
8c9a9dd0
AC
2128/**
2129 * tiocswinsz - implement window size set ioctl
fc6f6238 2130 * @tty; tty side of tty
8c9a9dd0
AC
2131 * @arg: user buffer for result
2132 *
2133 * Copies the user idea of the window size to the kernel. Traditionally
2134 * this is just advisory information but for the Linux console it
2135 * actually has driver level meaning and triggers a VC resize.
2136 *
2137 * Locking:
25985edc 2138 * Driver dependent. The default do_resize method takes the
8c9a9dd0
AC
2139 * tty termios mutex and ctrl_lock. The console takes its own lock
2140 * then calls into the default method.
2141 */
2142
fc6f6238 2143static int tiocswinsz(struct tty_struct *tty, struct winsize __user *arg)
8c9a9dd0
AC
2144{
2145 struct winsize tmp_ws;
2146 if (copy_from_user(&tmp_ws, arg, sizeof(*arg)))
2147 return -EFAULT;
2148
2149 if (tty->ops->resize)
fc6f6238 2150 return tty->ops->resize(tty, &tmp_ws);
8c9a9dd0 2151 else
fc6f6238 2152 return tty_do_resize(tty, &tmp_ws);
8c9a9dd0
AC
2153}
2154
af9b897e
AC
2155/**
2156 * tioccons - allow admin to move logical console
2157 * @file: the file to become console
2158 *
25985edc 2159 * Allow the administrator to move the redirected console device
af9b897e
AC
2160 *
2161 * Locking: uses redirect_lock to guard the redirect information
2162 */
2163
1da177e4
LT
2164static int tioccons(struct file *file)
2165{
2166 if (!capable(CAP_SYS_ADMIN))
2167 return -EPERM;
2168 if (file->f_op->write == redirected_tty_write) {
2169 struct file *f;
2170 spin_lock(&redirect_lock);
2171 f = redirect;
2172 redirect = NULL;
2173 spin_unlock(&redirect_lock);
2174 if (f)
2175 fput(f);
2176 return 0;
2177 }
2178 spin_lock(&redirect_lock);
2179 if (redirect) {
2180 spin_unlock(&redirect_lock);
2181 return -EBUSY;
2182 }
2183 get_file(file);
2184 redirect = file;
2185 spin_unlock(&redirect_lock);
2186 return 0;
2187}
2188
af9b897e
AC
2189/**
2190 * fionbio - non blocking ioctl
2191 * @file: file to set blocking value
2192 * @p: user parameter
2193 *
2194 * Historical tty interfaces had a blocking control ioctl before
2195 * the generic functionality existed. This piece of history is preserved
2196 * in the expected tty API of posix OS's.
2197 *
6146b9af 2198 * Locking: none, the open file handle ensures it won't go away.
af9b897e 2199 */
1da177e4
LT
2200
2201static int fionbio(struct file *file, int __user *p)
2202{
2203 int nonblock;
2204
2205 if (get_user(nonblock, p))
2206 return -EFAULT;
2207
db1dd4d3 2208 spin_lock(&file->f_lock);
1da177e4
LT
2209 if (nonblock)
2210 file->f_flags |= O_NONBLOCK;
2211 else
2212 file->f_flags &= ~O_NONBLOCK;
db1dd4d3 2213 spin_unlock(&file->f_lock);
1da177e4
LT
2214 return 0;
2215}
2216
af9b897e
AC
2217/**
2218 * tiocsctty - set controlling tty
2219 * @tty: tty structure
2220 * @arg: user argument
2221 *
2222 * This ioctl is used to manage job control. It permits a session
2223 * leader to set this tty as the controlling tty for the session.
2224 *
2225 * Locking:
28298232 2226 * Takes tty_mutex() to protect tty instance
24ec839c
PZ
2227 * Takes tasklist_lock internally to walk sessions
2228 * Takes ->siglock() when updating signal->tty
af9b897e
AC
2229 */
2230
1da177e4
LT
2231static int tiocsctty(struct tty_struct *tty, int arg)
2232{
24ec839c 2233 int ret = 0;
ab521dc0 2234 if (current->signal->leader && (task_session(current) == tty->session))
24ec839c
PZ
2235 return ret;
2236
2237 mutex_lock(&tty_mutex);
1da177e4
LT
2238 /*
2239 * The process must be a session leader and
2240 * not have a controlling tty already.
2241 */
24ec839c
PZ
2242 if (!current->signal->leader || current->signal->tty) {
2243 ret = -EPERM;
2244 goto unlock;
2245 }
2246
ab521dc0 2247 if (tty->session) {
1da177e4
LT
2248 /*
2249 * This tty is already the controlling
2250 * tty for another session group!
2251 */
37bdfb07 2252 if (arg == 1 && capable(CAP_SYS_ADMIN)) {
1da177e4
LT
2253 /*
2254 * Steal it away
2255 */
1da177e4 2256 read_lock(&tasklist_lock);
24ec839c 2257 session_clear_tty(tty->session);
1da177e4 2258 read_unlock(&tasklist_lock);
24ec839c
PZ
2259 } else {
2260 ret = -EPERM;
2261 goto unlock;
2262 }
1da177e4 2263 }
24ec839c
PZ
2264 proc_set_tty(current, tty);
2265unlock:
28298232 2266 mutex_unlock(&tty_mutex);
24ec839c 2267 return ret;
1da177e4
LT
2268}
2269
5d0fdf1e
AC
2270/**
2271 * tty_get_pgrp - return a ref counted pgrp pid
2272 * @tty: tty to read
2273 *
2274 * Returns a refcounted instance of the pid struct for the process
2275 * group controlling the tty.
2276 */
2277
2278struct pid *tty_get_pgrp(struct tty_struct *tty)
2279{
2280 unsigned long flags;
2281 struct pid *pgrp;
2282
2283 spin_lock_irqsave(&tty->ctrl_lock, flags);
2284 pgrp = get_pid(tty->pgrp);
2285 spin_unlock_irqrestore(&tty->ctrl_lock, flags);
2286
2287 return pgrp;
2288}
2289EXPORT_SYMBOL_GPL(tty_get_pgrp);
2290
af9b897e
AC
2291/**
2292 * tiocgpgrp - get process group
2293 * @tty: tty passed by user
25985edc 2294 * @real_tty: tty side of the tty passed by the user if a pty else the tty
af9b897e
AC
2295 * @p: returned pid
2296 *
2297 * Obtain the process group of the tty. If there is no process group
2298 * return an error.
2299 *
24ec839c 2300 * Locking: none. Reference to current->signal->tty is safe.
af9b897e
AC
2301 */
2302
1da177e4
LT
2303static int tiocgpgrp(struct tty_struct *tty, struct tty_struct *real_tty, pid_t __user *p)
2304{
5d0fdf1e
AC
2305 struct pid *pid;
2306 int ret;
1da177e4
LT
2307 /*
2308 * (tty == real_tty) is a cheap way of
2309 * testing if the tty is NOT a master pty.
2310 */
2311 if (tty == real_tty && current->signal->tty != real_tty)
2312 return -ENOTTY;
5d0fdf1e
AC
2313 pid = tty_get_pgrp(real_tty);
2314 ret = put_user(pid_vnr(pid), p);
2315 put_pid(pid);
2316 return ret;
1da177e4
LT
2317}
2318
af9b897e
AC
2319/**
2320 * tiocspgrp - attempt to set process group
2321 * @tty: tty passed by user
2322 * @real_tty: tty side device matching tty passed by user
2323 * @p: pid pointer
2324 *
2325 * Set the process group of the tty to the session passed. Only
2326 * permitted where the tty session is our session.
2327 *
47f86834 2328 * Locking: RCU, ctrl lock
af9b897e
AC
2329 */
2330
1da177e4
LT
2331static int tiocspgrp(struct tty_struct *tty, struct tty_struct *real_tty, pid_t __user *p)
2332{
04a2e6a5
EB
2333 struct pid *pgrp;
2334 pid_t pgrp_nr;
1da177e4 2335 int retval = tty_check_change(real_tty);
47f86834 2336 unsigned long flags;
1da177e4
LT
2337
2338 if (retval == -EIO)
2339 return -ENOTTY;
2340 if (retval)
2341 return retval;
2342 if (!current->signal->tty ||
2343 (current->signal->tty != real_tty) ||
ab521dc0 2344 (real_tty->session != task_session(current)))
1da177e4 2345 return -ENOTTY;
04a2e6a5 2346 if (get_user(pgrp_nr, p))
1da177e4 2347 return -EFAULT;
04a2e6a5 2348 if (pgrp_nr < 0)
1da177e4 2349 return -EINVAL;
04a2e6a5 2350 rcu_read_lock();
b488893a 2351 pgrp = find_vpid(pgrp_nr);
04a2e6a5
EB
2352 retval = -ESRCH;
2353 if (!pgrp)
2354 goto out_unlock;
2355 retval = -EPERM;
2356 if (session_of_pgrp(pgrp) != task_session(current))
2357 goto out_unlock;
2358 retval = 0;
47f86834 2359 spin_lock_irqsave(&tty->ctrl_lock, flags);
ab521dc0
EB
2360 put_pid(real_tty->pgrp);
2361 real_tty->pgrp = get_pid(pgrp);
47f86834 2362 spin_unlock_irqrestore(&tty->ctrl_lock, flags);
04a2e6a5
EB
2363out_unlock:
2364 rcu_read_unlock();
2365 return retval;
1da177e4
LT
2366}
2367
af9b897e
AC
2368/**
2369 * tiocgsid - get session id
2370 * @tty: tty passed by user
25985edc 2371 * @real_tty: tty side of the tty passed by the user if a pty else the tty
af9b897e
AC
2372 * @p: pointer to returned session id
2373 *
2374 * Obtain the session id of the tty. If there is no session
2375 * return an error.
2376 *
24ec839c 2377 * Locking: none. Reference to current->signal->tty is safe.
af9b897e
AC
2378 */
2379
1da177e4
LT
2380static int tiocgsid(struct tty_struct *tty, struct tty_struct *real_tty, pid_t __user *p)
2381{
2382 /*
2383 * (tty == real_tty) is a cheap way of
2384 * testing if the tty is NOT a master pty.
2385 */
2386 if (tty == real_tty && current->signal->tty != real_tty)
2387 return -ENOTTY;
ab521dc0 2388 if (!real_tty->session)
1da177e4 2389 return -ENOTTY;
b488893a 2390 return put_user(pid_vnr(real_tty->session), p);
1da177e4
LT
2391}
2392
af9b897e
AC
2393/**
2394 * tiocsetd - set line discipline
2395 * @tty: tty device
2396 * @p: pointer to user data
2397 *
2398 * Set the line discipline according to user request.
2399 *
2400 * Locking: see tty_set_ldisc, this function is just a helper
2401 */
2402
1da177e4
LT
2403static int tiocsetd(struct tty_struct *tty, int __user *p)
2404{
2405 int ldisc;
04f378b1 2406 int ret;
1da177e4
LT
2407
2408 if (get_user(ldisc, p))
2409 return -EFAULT;
04f378b1 2410
04f378b1 2411 ret = tty_set_ldisc(tty, ldisc);
04f378b1
AC
2412
2413 return ret;
1da177e4
LT
2414}
2415
af9b897e
AC
2416/**
2417 * send_break - performed time break
2418 * @tty: device to break on
2419 * @duration: timeout in mS
2420 *
2421 * Perform a timed break on hardware that lacks its own driver level
2422 * timed break functionality.
2423 *
2424 * Locking:
28298232 2425 * atomic_write_lock serializes
af9b897e 2426 *
af9b897e
AC
2427 */
2428
b20f3ae5 2429static int send_break(struct tty_struct *tty, unsigned int duration)
1da177e4 2430{
9e98966c
AC
2431 int retval;
2432
2433 if (tty->ops->break_ctl == NULL)
2434 return 0;
2435
2436 if (tty->driver->flags & TTY_DRIVER_HARDWARE_BREAK)
2437 retval = tty->ops->break_ctl(tty, duration);
2438 else {
2439 /* Do the work ourselves */
2440 if (tty_write_lock(tty, 0) < 0)
2441 return -EINTR;
2442 retval = tty->ops->break_ctl(tty, -1);
2443 if (retval)
2444 goto out;
2445 if (!signal_pending(current))
2446 msleep_interruptible(duration);
2447 retval = tty->ops->break_ctl(tty, 0);
2448out:
2449 tty_write_unlock(tty);
2450 if (signal_pending(current))
2451 retval = -EINTR;
2452 }
2453 return retval;
1da177e4
LT
2454}
2455
af9b897e 2456/**
f34d7a5b 2457 * tty_tiocmget - get modem status
af9b897e
AC
2458 * @tty: tty device
2459 * @file: user file pointer
2460 * @p: pointer to result
2461 *
2462 * Obtain the modem status bits from the tty driver if the feature
2463 * is supported. Return -EINVAL if it is not available.
2464 *
2465 * Locking: none (up to the driver)
2466 */
2467
60b33c13 2468static int tty_tiocmget(struct tty_struct *tty, int __user *p)
1da177e4
LT
2469{
2470 int retval = -EINVAL;
2471
f34d7a5b 2472 if (tty->ops->tiocmget) {
60b33c13 2473 retval = tty->ops->tiocmget(tty);
1da177e4
LT
2474
2475 if (retval >= 0)
2476 retval = put_user(retval, p);
2477 }
2478 return retval;
2479}
2480
af9b897e 2481/**
f34d7a5b 2482 * tty_tiocmset - set modem status
af9b897e 2483 * @tty: tty device
af9b897e
AC
2484 * @cmd: command - clear bits, set bits or set all
2485 * @p: pointer to desired bits
2486 *
2487 * Set the modem status bits from the tty driver if the feature
2488 * is supported. Return -EINVAL if it is not available.
2489 *
2490 * Locking: none (up to the driver)
2491 */
2492
20b9d177 2493static int tty_tiocmset(struct tty_struct *tty, unsigned int cmd,
1da177e4
LT
2494 unsigned __user *p)
2495{
ae677517
AC
2496 int retval;
2497 unsigned int set, clear, val;
1da177e4 2498
ae677517
AC
2499 if (tty->ops->tiocmset == NULL)
2500 return -EINVAL;
1da177e4 2501
ae677517
AC
2502 retval = get_user(val, p);
2503 if (retval)
2504 return retval;
2505 set = clear = 0;
2506 switch (cmd) {
2507 case TIOCMBIS:
2508 set = val;
2509 break;
2510 case TIOCMBIC:
2511 clear = val;
2512 break;
2513 case TIOCMSET:
2514 set = val;
2515 clear = ~val;
2516 break;
2517 }
2518 set &= TIOCM_DTR|TIOCM_RTS|TIOCM_OUT1|TIOCM_OUT2|TIOCM_LOOP;
2519 clear &= TIOCM_DTR|TIOCM_RTS|TIOCM_OUT1|TIOCM_OUT2|TIOCM_LOOP;
20b9d177 2520 return tty->ops->tiocmset(tty, set, clear);
1da177e4
LT
2521}
2522
d281da7f
AC
2523static int tty_tiocgicount(struct tty_struct *tty, void __user *arg)
2524{
2525 int retval = -EINVAL;
2526 struct serial_icounter_struct icount;
2527 memset(&icount, 0, sizeof(icount));
2528 if (tty->ops->get_icount)
2529 retval = tty->ops->get_icount(tty, &icount);
2530 if (retval != 0)
2531 return retval;
2532 if (copy_to_user(arg, &icount, sizeof(icount)))
2533 return -EFAULT;
2534 return 0;
2535}
2536
e8b70e7d
AC
2537struct tty_struct *tty_pair_get_tty(struct tty_struct *tty)
2538{
2539 if (tty->driver->type == TTY_DRIVER_TYPE_PTY &&
2540 tty->driver->subtype == PTY_TYPE_MASTER)
2541 tty = tty->link;
2542 return tty;
2543}
2544EXPORT_SYMBOL(tty_pair_get_tty);
2545
2546struct tty_struct *tty_pair_get_pty(struct tty_struct *tty)
2547{
2548 if (tty->driver->type == TTY_DRIVER_TYPE_PTY &&
2549 tty->driver->subtype == PTY_TYPE_MASTER)
2550 return tty;
2551 return tty->link;
2552}
2553EXPORT_SYMBOL(tty_pair_get_pty);
2554
1da177e4
LT
2555/*
2556 * Split this up, as gcc can choke on it otherwise..
2557 */
04f378b1 2558long tty_ioctl(struct file *file, unsigned int cmd, unsigned long arg)
1da177e4 2559{
d996b62a
NP
2560 struct tty_struct *tty = file_tty(file);
2561 struct tty_struct *real_tty;
1da177e4
LT
2562 void __user *p = (void __user *)arg;
2563 int retval;
2564 struct tty_ldisc *ld;
04f378b1 2565 struct inode *inode = file->f_dentry->d_inode;
37bdfb07 2566
1da177e4
LT
2567 if (tty_paranoia_check(tty, inode, "tty_ioctl"))
2568 return -EINVAL;
2569
e8b70e7d 2570 real_tty = tty_pair_get_tty(tty);
1da177e4
LT
2571
2572 /*
2573 * Factor out some common prep work
2574 */
2575 switch (cmd) {
2576 case TIOCSETD:
2577 case TIOCSBRK:
2578 case TIOCCBRK:
2579 case TCSBRK:
37bdfb07 2580 case TCSBRKP:
1da177e4
LT
2581 retval = tty_check_change(tty);
2582 if (retval)
2583 return retval;
2584 if (cmd != TIOCCBRK) {
2585 tty_wait_until_sent(tty, 0);
2586 if (signal_pending(current))
2587 return -EINTR;
2588 }
2589 break;
2590 }
2591
9e98966c
AC
2592 /*
2593 * Now do the stuff.
2594 */
1da177e4 2595 switch (cmd) {
37bdfb07
AC
2596 case TIOCSTI:
2597 return tiocsti(tty, p);
2598 case TIOCGWINSZ:
8f520021 2599 return tiocgwinsz(real_tty, p);
37bdfb07 2600 case TIOCSWINSZ:
fc6f6238 2601 return tiocswinsz(real_tty, p);
37bdfb07
AC
2602 case TIOCCONS:
2603 return real_tty != tty ? -EINVAL : tioccons(file);
2604 case FIONBIO:
2605 return fionbio(file, p);
2606 case TIOCEXCL:
2607 set_bit(TTY_EXCLUSIVE, &tty->flags);
2608 return 0;
2609 case TIOCNXCL:
2610 clear_bit(TTY_EXCLUSIVE, &tty->flags);
2611 return 0;
2612 case TIOCNOTTY:
2613 if (current->signal->tty != tty)
2614 return -ENOTTY;
2615 no_tty();
2616 return 0;
2617 case TIOCSCTTY:
2618 return tiocsctty(tty, arg);
2619 case TIOCGPGRP:
2620 return tiocgpgrp(tty, real_tty, p);
2621 case TIOCSPGRP:
2622 return tiocspgrp(tty, real_tty, p);
2623 case TIOCGSID:
2624 return tiocgsid(tty, real_tty, p);
2625 case TIOCGETD:
c65c9bc3 2626 return put_user(tty->ldisc->ops->num, (int __user *)p);
37bdfb07
AC
2627 case TIOCSETD:
2628 return tiocsetd(tty, p);
3c95c985
KS
2629 case TIOCVHANGUP:
2630 if (!capable(CAP_SYS_ADMIN))
2631 return -EPERM;
2632 tty_vhangup(tty);
2633 return 0;
b7b8de08
WF
2634 case TIOCGDEV:
2635 {
2636 unsigned int ret = new_encode_dev(tty_devnum(real_tty));
2637 return put_user(ret, (unsigned int __user *)p);
2638 }
37bdfb07
AC
2639 /*
2640 * Break handling
2641 */
2642 case TIOCSBRK: /* Turn break on, unconditionally */
f34d7a5b 2643 if (tty->ops->break_ctl)
9e98966c 2644 return tty->ops->break_ctl(tty, -1);
37bdfb07 2645 return 0;
37bdfb07 2646 case TIOCCBRK: /* Turn break off, unconditionally */
f34d7a5b 2647 if (tty->ops->break_ctl)
9e98966c 2648 return tty->ops->break_ctl(tty, 0);
37bdfb07
AC
2649 return 0;
2650 case TCSBRK: /* SVID version: non-zero arg --> no break */
2651 /* non-zero arg means wait for all output data
2652 * to be sent (performed above) but don't send break.
2653 * This is used by the tcdrain() termios function.
2654 */
2655 if (!arg)
2656 return send_break(tty, 250);
2657 return 0;
2658 case TCSBRKP: /* support for POSIX tcsendbreak() */
2659 return send_break(tty, arg ? arg*100 : 250);
2660
2661 case TIOCMGET:
60b33c13 2662 return tty_tiocmget(tty, p);
37bdfb07
AC
2663 case TIOCMSET:
2664 case TIOCMBIC:
2665 case TIOCMBIS:
20b9d177 2666 return tty_tiocmset(tty, cmd, p);
d281da7f
AC
2667 case TIOCGICOUNT:
2668 retval = tty_tiocgicount(tty, p);
2669 /* For the moment allow fall through to the old method */
2670 if (retval != -EINVAL)
2671 return retval;
2672 break;
37bdfb07
AC
2673 case TCFLSH:
2674 switch (arg) {
2675 case TCIFLUSH:
2676 case TCIOFLUSH:
2677 /* flush tty buffer and allow ldisc to process ioctl */
2678 tty_buffer_flush(tty);
c5c34d48 2679 break;
37bdfb07
AC
2680 }
2681 break;
1da177e4 2682 }
f34d7a5b 2683 if (tty->ops->ioctl) {
6caa76b7 2684 retval = (tty->ops->ioctl)(tty, cmd, arg);
1da177e4
LT
2685 if (retval != -ENOIOCTLCMD)
2686 return retval;
2687 }
2688 ld = tty_ldisc_ref_wait(tty);
2689 retval = -EINVAL;
a352def2
AC
2690 if (ld->ops->ioctl) {
2691 retval = ld->ops->ioctl(tty, file, cmd, arg);
1da177e4
LT
2692 if (retval == -ENOIOCTLCMD)
2693 retval = -EINVAL;
2694 }
2695 tty_ldisc_deref(ld);
2696 return retval;
2697}
2698
e10cc1df 2699#ifdef CONFIG_COMPAT
37bdfb07 2700static long tty_compat_ioctl(struct file *file, unsigned int cmd,
e10cc1df
PF
2701 unsigned long arg)
2702{
2703 struct inode *inode = file->f_dentry->d_inode;
d996b62a 2704 struct tty_struct *tty = file_tty(file);
e10cc1df
PF
2705 struct tty_ldisc *ld;
2706 int retval = -ENOIOCTLCMD;
2707
2708 if (tty_paranoia_check(tty, inode, "tty_ioctl"))
2709 return -EINVAL;
2710
f34d7a5b 2711 if (tty->ops->compat_ioctl) {
6caa76b7 2712 retval = (tty->ops->compat_ioctl)(tty, cmd, arg);
e10cc1df
PF
2713 if (retval != -ENOIOCTLCMD)
2714 return retval;
2715 }
2716
2717 ld = tty_ldisc_ref_wait(tty);
a352def2
AC
2718 if (ld->ops->compat_ioctl)
2719 retval = ld->ops->compat_ioctl(tty, file, cmd, arg);
e10cc1df
PF
2720 tty_ldisc_deref(ld);
2721
2722 return retval;
2723}
2724#endif
1da177e4
LT
2725
2726/*
2727 * This implements the "Secure Attention Key" --- the idea is to
2728 * prevent trojan horses by killing all processes associated with this
2729 * tty when the user hits the "Secure Attention Key". Required for
2730 * super-paranoid applications --- see the Orange Book for more details.
37bdfb07 2731 *
1da177e4
LT
2732 * This code could be nicer; ideally it should send a HUP, wait a few
2733 * seconds, then send a INT, and then a KILL signal. But you then
2734 * have to coordinate with the init process, since all processes associated
2735 * with the current tty must be dead before the new getty is allowed
2736 * to spawn.
2737 *
2738 * Now, if it would be correct ;-/ The current code has a nasty hole -
2739 * it doesn't catch files in flight. We may send the descriptor to ourselves
2740 * via AF_UNIX socket, close it and later fetch from socket. FIXME.
2741 *
2742 * Nasty bug: do_SAK is being called in interrupt context. This can
2743 * deadlock. We punt it up to process context. AKPM - 16Mar2001
2744 */
8b6312f4 2745void __do_SAK(struct tty_struct *tty)
1da177e4
LT
2746{
2747#ifdef TTY_SOFT_SAK
2748 tty_hangup(tty);
2749#else
652486fb 2750 struct task_struct *g, *p;
ab521dc0 2751 struct pid *session;
1da177e4
LT
2752 int i;
2753 struct file *filp;
badf1662 2754 struct fdtable *fdt;
37bdfb07 2755
1da177e4
LT
2756 if (!tty)
2757 return;
24ec839c 2758 session = tty->session;
37bdfb07 2759
b3f13deb 2760 tty_ldisc_flush(tty);
1da177e4 2761
f34d7a5b 2762 tty_driver_flush_buffer(tty);
37bdfb07 2763
1da177e4 2764 read_lock(&tasklist_lock);
652486fb 2765 /* Kill the entire session */
ab521dc0 2766 do_each_pid_task(session, PIDTYPE_SID, p) {
652486fb 2767 printk(KERN_NOTICE "SAK: killed process %d"
1b0f7ffd 2768 " (%s): task_session(p)==tty->session\n",
ba25f9dc 2769 task_pid_nr(p), p->comm);
652486fb 2770 send_sig(SIGKILL, p, 1);
ab521dc0 2771 } while_each_pid_task(session, PIDTYPE_SID, p);
652486fb
EB
2772 /* Now kill any processes that happen to have the
2773 * tty open.
2774 */
2775 do_each_thread(g, p) {
2776 if (p->signal->tty == tty) {
1da177e4 2777 printk(KERN_NOTICE "SAK: killed process %d"
1b0f7ffd 2778 " (%s): task_session(p)==tty->session\n",
ba25f9dc 2779 task_pid_nr(p), p->comm);
1da177e4
LT
2780 send_sig(SIGKILL, p, 1);
2781 continue;
2782 }
2783 task_lock(p);
2784 if (p->files) {
ca99c1da
DS
2785 /*
2786 * We don't take a ref to the file, so we must
2787 * hold ->file_lock instead.
2788 */
2789 spin_lock(&p->files->file_lock);
badf1662 2790 fdt = files_fdtable(p->files);
37bdfb07 2791 for (i = 0; i < fdt->max_fds; i++) {
1da177e4
LT
2792 filp = fcheck_files(p->files, i);
2793 if (!filp)
2794 continue;
2795 if (filp->f_op->read == tty_read &&
d996b62a 2796 file_tty(filp) == tty) {
1da177e4
LT
2797 printk(KERN_NOTICE "SAK: killed process %d"
2798 " (%s): fd#%d opened to the tty\n",
ba25f9dc 2799 task_pid_nr(p), p->comm, i);
20ac9437 2800 force_sig(SIGKILL, p);
1da177e4
LT
2801 break;
2802 }
2803 }
ca99c1da 2804 spin_unlock(&p->files->file_lock);
1da177e4
LT
2805 }
2806 task_unlock(p);
652486fb 2807 } while_each_thread(g, p);
1da177e4
LT
2808 read_unlock(&tasklist_lock);
2809#endif
2810}
2811
8b6312f4
EB
2812static void do_SAK_work(struct work_struct *work)
2813{
2814 struct tty_struct *tty =
2815 container_of(work, struct tty_struct, SAK_work);
2816 __do_SAK(tty);
2817}
2818
1da177e4
LT
2819/*
2820 * The tq handling here is a little racy - tty->SAK_work may already be queued.
2821 * Fortunately we don't need to worry, because if ->SAK_work is already queued,
2822 * the values which we write to it will be identical to the values which it
2823 * already has. --akpm
2824 */
2825void do_SAK(struct tty_struct *tty)
2826{
2827 if (!tty)
2828 return;
1da177e4
LT
2829 schedule_work(&tty->SAK_work);
2830}
2831
2832EXPORT_SYMBOL(do_SAK);
2833
30004ac9
DES
2834static int dev_match_devt(struct device *dev, void *data)
2835{
2836 dev_t *devt = data;
2837 return dev->devt == *devt;
2838}
2839
2840/* Must put_device() after it's unused! */
2841static struct device *tty_get_device(struct tty_struct *tty)
2842{
2843 dev_t devt = tty_devnum(tty);
2844 return class_find_device(tty_class, NULL, &devt, dev_match_devt);
2845}
2846
2847
af9b897e
AC
2848/**
2849 * initialize_tty_struct
2850 * @tty: tty to initialize
2851 *
2852 * This subroutine initializes a tty structure that has been newly
2853 * allocated.
2854 *
2855 * Locking: none - tty in question must not be exposed at this point
1da177e4 2856 */
af9b897e 2857
bf970ee4
AC
2858void initialize_tty_struct(struct tty_struct *tty,
2859 struct tty_driver *driver, int idx)
1da177e4
LT
2860{
2861 memset(tty, 0, sizeof(struct tty_struct));
9c9f4ded 2862 kref_init(&tty->kref);
1da177e4 2863 tty->magic = TTY_MAGIC;
01e1abb2 2864 tty_ldisc_init(tty);
ab521dc0
EB
2865 tty->session = NULL;
2866 tty->pgrp = NULL;
1da177e4 2867 tty->overrun_time = jiffies;
33f0f88f
AC
2868 tty->buf.head = tty->buf.tail = NULL;
2869 tty_buffer_init(tty);
5785c95b 2870 mutex_init(&tty->termios_mutex);
c65c9bc3 2871 mutex_init(&tty->ldisc_mutex);
1da177e4
LT
2872 init_waitqueue_head(&tty->write_wait);
2873 init_waitqueue_head(&tty->read_wait);
65f27f38 2874 INIT_WORK(&tty->hangup_work, do_tty_hangup);
70522e12
IM
2875 mutex_init(&tty->atomic_read_lock);
2876 mutex_init(&tty->atomic_write_lock);
a88a69c9
JP
2877 mutex_init(&tty->output_lock);
2878 mutex_init(&tty->echo_lock);
1da177e4 2879 spin_lock_init(&tty->read_lock);
04f378b1 2880 spin_lock_init(&tty->ctrl_lock);
1da177e4 2881 INIT_LIST_HEAD(&tty->tty_files);
7f1f86a0 2882 INIT_WORK(&tty->SAK_work, do_SAK_work);
bf970ee4
AC
2883
2884 tty->driver = driver;
2885 tty->ops = driver->ops;
2886 tty->index = idx;
2887 tty_line_name(driver, idx, tty->name);
30004ac9 2888 tty->dev = tty_get_device(tty);
1da177e4
LT
2889}
2890
6716671d
JS
2891/**
2892 * deinitialize_tty_struct
2893 * @tty: tty to deinitialize
2894 *
2895 * This subroutine deinitializes a tty structure that has been newly
2896 * allocated but tty_release cannot be called on that yet.
2897 *
2898 * Locking: none - tty in question must not be exposed at this point
2899 */
2900void deinitialize_tty_struct(struct tty_struct *tty)
2901{
2902 tty_ldisc_deinit(tty);
2903}
2904
f34d7a5b
AC
2905/**
2906 * tty_put_char - write one character to a tty
2907 * @tty: tty
2908 * @ch: character
2909 *
2910 * Write one byte to the tty using the provided put_char method
2911 * if present. Returns the number of characters successfully output.
2912 *
2913 * Note: the specific put_char operation in the driver layer may go
2914 * away soon. Don't call it directly, use this method
1da177e4 2915 */
af9b897e 2916
f34d7a5b 2917int tty_put_char(struct tty_struct *tty, unsigned char ch)
1da177e4 2918{
f34d7a5b
AC
2919 if (tty->ops->put_char)
2920 return tty->ops->put_char(tty, ch);
2921 return tty->ops->write(tty, &ch, 1);
1da177e4 2922}
f34d7a5b
AC
2923EXPORT_SYMBOL_GPL(tty_put_char);
2924
d81ed103 2925struct class *tty_class;
1da177e4
LT
2926
2927/**
af9b897e
AC
2928 * tty_register_device - register a tty device
2929 * @driver: the tty driver that describes the tty device
2930 * @index: the index in the tty driver for this tty device
2931 * @device: a struct device that is associated with this tty device.
2932 * This field is optional, if there is no known struct device
2933 * for this tty device it can be set to NULL safely.
1da177e4 2934 *
01107d34
GKH
2935 * Returns a pointer to the struct device for this tty device
2936 * (or ERR_PTR(-EFOO) on error).
1cdcb6b4 2937 *
af9b897e
AC
2938 * This call is required to be made to register an individual tty device
2939 * if the tty driver's flags have the TTY_DRIVER_DYNAMIC_DEV bit set. If
2940 * that bit is not set, this function should not be called by a tty
2941 * driver.
2942 *
2943 * Locking: ??
1da177e4 2944 */
af9b897e 2945
01107d34
GKH
2946struct device *tty_register_device(struct tty_driver *driver, unsigned index,
2947 struct device *device)
1da177e4
LT
2948{
2949 char name[64];
2950 dev_t dev = MKDEV(driver->major, driver->minor_start) + index;
2951
2952 if (index >= driver->num) {
2953 printk(KERN_ERR "Attempt to register invalid tty line number "
2954 " (%d).\n", index);
1cdcb6b4 2955 return ERR_PTR(-EINVAL);
1da177e4
LT
2956 }
2957
1da177e4
LT
2958 if (driver->type == TTY_DRIVER_TYPE_PTY)
2959 pty_line_name(driver, index, name);
2960 else
2961 tty_line_name(driver, index, name);
1cdcb6b4 2962
03457cd4 2963 return device_create(tty_class, device, dev, NULL, name);
1da177e4 2964}
7d7b93c1 2965EXPORT_SYMBOL(tty_register_device);
1da177e4
LT
2966
2967/**
af9b897e
AC
2968 * tty_unregister_device - unregister a tty device
2969 * @driver: the tty driver that describes the tty device
2970 * @index: the index in the tty driver for this tty device
1da177e4 2971 *
af9b897e
AC
2972 * If a tty device is registered with a call to tty_register_device() then
2973 * this function must be called when the tty device is gone.
2974 *
2975 * Locking: ??
1da177e4 2976 */
af9b897e 2977
1da177e4
LT
2978void tty_unregister_device(struct tty_driver *driver, unsigned index)
2979{
37bdfb07
AC
2980 device_destroy(tty_class,
2981 MKDEV(driver->major, driver->minor_start) + index);
1da177e4 2982}
1da177e4
LT
2983EXPORT_SYMBOL(tty_unregister_device);
2984
2985struct tty_driver *alloc_tty_driver(int lines)
2986{
2987 struct tty_driver *driver;
2988
506eb99a 2989 driver = kzalloc(sizeof(struct tty_driver), GFP_KERNEL);
1da177e4 2990 if (driver) {
7d7b93c1 2991 kref_init(&driver->kref);
1da177e4
LT
2992 driver->magic = TTY_DRIVER_MAGIC;
2993 driver->num = lines;
2994 /* later we'll move allocation of tables here */
2995 }
2996 return driver;
2997}
7d7b93c1 2998EXPORT_SYMBOL(alloc_tty_driver);
1da177e4 2999
7d7b93c1 3000static void destruct_tty_driver(struct kref *kref)
1da177e4 3001{
7d7b93c1
AC
3002 struct tty_driver *driver = container_of(kref, struct tty_driver, kref);
3003 int i;
3004 struct ktermios *tp;
3005 void *p;
3006
3007 if (driver->flags & TTY_DRIVER_INSTALLED) {
3008 /*
3009 * Free the termios and termios_locked structures because
3010 * we don't want to get memory leaks when modular tty
3011 * drivers are removed from the kernel.
3012 */
3013 for (i = 0; i < driver->num; i++) {
3014 tp = driver->termios[i];
3015 if (tp) {
3016 driver->termios[i] = NULL;
3017 kfree(tp);
3018 }
7d7b93c1
AC
3019 if (!(driver->flags & TTY_DRIVER_DYNAMIC_DEV))
3020 tty_unregister_device(driver, i);
3021 }
3022 p = driver->ttys;
3023 proc_tty_unregister_driver(driver);
3024 driver->ttys = NULL;
fe6e29fd 3025 driver->termios = NULL;
7d7b93c1
AC
3026 kfree(p);
3027 cdev_del(&driver->cdev);
3028 }
1da177e4
LT
3029 kfree(driver);
3030}
3031
7d7b93c1
AC
3032void tty_driver_kref_put(struct tty_driver *driver)
3033{
3034 kref_put(&driver->kref, destruct_tty_driver);
3035}
3036EXPORT_SYMBOL(tty_driver_kref_put);
3037
b68e31d0
JD
3038void tty_set_operations(struct tty_driver *driver,
3039 const struct tty_operations *op)
1da177e4 3040{
f34d7a5b
AC
3041 driver->ops = op;
3042};
7d7b93c1 3043EXPORT_SYMBOL(tty_set_operations);
1da177e4 3044
7d7b93c1
AC
3045void put_tty_driver(struct tty_driver *d)
3046{
3047 tty_driver_kref_put(d);
3048}
1da177e4 3049EXPORT_SYMBOL(put_tty_driver);
1da177e4
LT
3050
3051/*
3052 * Called by a tty driver to register itself.
3053 */
3054int tty_register_driver(struct tty_driver *driver)
3055{
3056 int error;
37bdfb07 3057 int i;
1da177e4
LT
3058 dev_t dev;
3059 void **p = NULL;
b670bde0 3060 struct device *d;
1da177e4 3061
543691a6 3062 if (!(driver->flags & TTY_DRIVER_DEVPTS_MEM) && driver->num) {
fe6e29fd 3063 p = kzalloc(driver->num * 2 * sizeof(void *), GFP_KERNEL);
1da177e4
LT
3064 if (!p)
3065 return -ENOMEM;
1da177e4
LT
3066 }
3067
3068 if (!driver->major) {
37bdfb07
AC
3069 error = alloc_chrdev_region(&dev, driver->minor_start,
3070 driver->num, driver->name);
1da177e4
LT
3071 if (!error) {
3072 driver->major = MAJOR(dev);
3073 driver->minor_start = MINOR(dev);
3074 }
3075 } else {
3076 dev = MKDEV(driver->major, driver->minor_start);
e5717c48 3077 error = register_chrdev_region(dev, driver->num, driver->name);
1da177e4
LT
3078 }
3079 if (error < 0) {
3080 kfree(p);
3081 return error;
3082 }
3083
3084 if (p) {
3085 driver->ttys = (struct tty_struct **)p;
edc6afc5 3086 driver->termios = (struct ktermios **)(p + driver->num);
1da177e4
LT
3087 } else {
3088 driver->ttys = NULL;
3089 driver->termios = NULL;
1da177e4
LT
3090 }
3091
3092 cdev_init(&driver->cdev, &tty_fops);
3093 driver->cdev.owner = driver->owner;
3094 error = cdev_add(&driver->cdev, dev, driver->num);
3095 if (error) {
1da177e4
LT
3096 unregister_chrdev_region(dev, driver->num);
3097 driver->ttys = NULL;
fe6e29fd 3098 driver->termios = NULL;
1da177e4
LT
3099 kfree(p);
3100 return error;
3101 }
3102
ca509f69 3103 mutex_lock(&tty_mutex);
1da177e4 3104 list_add(&driver->tty_drivers, &tty_drivers);
ca509f69 3105 mutex_unlock(&tty_mutex);
37bdfb07
AC
3106
3107 if (!(driver->flags & TTY_DRIVER_DYNAMIC_DEV)) {
b670bde0
VK
3108 for (i = 0; i < driver->num; i++) {
3109 d = tty_register_device(driver, i, NULL);
3110 if (IS_ERR(d)) {
3111 error = PTR_ERR(d);
3112 goto err;
3113 }
3114 }
1da177e4
LT
3115 }
3116 proc_tty_register_driver(driver);
7d7b93c1 3117 driver->flags |= TTY_DRIVER_INSTALLED;
1da177e4 3118 return 0;
b670bde0
VK
3119
3120err:
3121 for (i--; i >= 0; i--)
3122 tty_unregister_device(driver, i);
3123
3124 mutex_lock(&tty_mutex);
3125 list_del(&driver->tty_drivers);
3126 mutex_unlock(&tty_mutex);
3127
3128 unregister_chrdev_region(dev, driver->num);
3129 driver->ttys = NULL;
3130 driver->termios = NULL;
3131 kfree(p);
3132 return error;
1da177e4
LT
3133}
3134
3135EXPORT_SYMBOL(tty_register_driver);
3136
3137/*
3138 * Called by a tty driver to unregister itself.
3139 */
3140int tty_unregister_driver(struct tty_driver *driver)
3141{
7d7b93c1
AC
3142#if 0
3143 /* FIXME */
1da177e4
LT
3144 if (driver->refcount)
3145 return -EBUSY;
7d7b93c1 3146#endif
1da177e4
LT
3147 unregister_chrdev_region(MKDEV(driver->major, driver->minor_start),
3148 driver->num);
ca509f69 3149 mutex_lock(&tty_mutex);
1da177e4 3150 list_del(&driver->tty_drivers);
ca509f69 3151 mutex_unlock(&tty_mutex);
1da177e4
LT
3152 return 0;
3153}
7d7b93c1 3154
1da177e4
LT
3155EXPORT_SYMBOL(tty_unregister_driver);
3156
24ec839c
PZ
3157dev_t tty_devnum(struct tty_struct *tty)
3158{
3159 return MKDEV(tty->driver->major, tty->driver->minor_start) + tty->index;
3160}
3161EXPORT_SYMBOL(tty_devnum);
3162
3163void proc_clear_tty(struct task_struct *p)
3164{
7c3b1dcf 3165 unsigned long flags;
9c9f4ded 3166 struct tty_struct *tty;
7c3b1dcf 3167 spin_lock_irqsave(&p->sighand->siglock, flags);
9c9f4ded 3168 tty = p->signal->tty;
24ec839c 3169 p->signal->tty = NULL;
7c3b1dcf 3170 spin_unlock_irqrestore(&p->sighand->siglock, flags);
9c9f4ded 3171 tty_kref_put(tty);
24ec839c 3172}
24ec839c 3173
47f86834
AC
3174/* Called under the sighand lock */
3175
2a65f1d9 3176static void __proc_set_tty(struct task_struct *tsk, struct tty_struct *tty)
24ec839c
PZ
3177{
3178 if (tty) {
47f86834
AC
3179 unsigned long flags;
3180 /* We should not have a session or pgrp to put here but.... */
3181 spin_lock_irqsave(&tty->ctrl_lock, flags);
d9c1e9a8
EB
3182 put_pid(tty->session);
3183 put_pid(tty->pgrp);
ab521dc0 3184 tty->pgrp = get_pid(task_pgrp(tsk));
47f86834
AC
3185 spin_unlock_irqrestore(&tty->ctrl_lock, flags);
3186 tty->session = get_pid(task_session(tsk));
9c9f4ded
AC
3187 if (tsk->signal->tty) {
3188 printk(KERN_DEBUG "tty not NULL!!\n");
3189 tty_kref_put(tsk->signal->tty);
3190 }
24ec839c 3191 }
2a65f1d9 3192 put_pid(tsk->signal->tty_old_pgrp);
9c9f4ded 3193 tsk->signal->tty = tty_kref_get(tty);
ab521dc0 3194 tsk->signal->tty_old_pgrp = NULL;
24ec839c
PZ
3195}
3196
98a27ba4 3197static void proc_set_tty(struct task_struct *tsk, struct tty_struct *tty)
24ec839c
PZ
3198{
3199 spin_lock_irq(&tsk->sighand->siglock);
2a65f1d9 3200 __proc_set_tty(tsk, tty);
24ec839c
PZ
3201 spin_unlock_irq(&tsk->sighand->siglock);
3202}
3203
3204struct tty_struct *get_current_tty(void)
3205{
3206 struct tty_struct *tty;
934e6ebf
AC
3207 unsigned long flags;
3208
3209 spin_lock_irqsave(&current->sighand->siglock, flags);
452a00d2 3210 tty = tty_kref_get(current->signal->tty);
934e6ebf 3211 spin_unlock_irqrestore(&current->sighand->siglock, flags);
24ec839c
PZ
3212 return tty;
3213}
a311f743 3214EXPORT_SYMBOL_GPL(get_current_tty);
1da177e4 3215
d81ed103
AC
3216void tty_default_fops(struct file_operations *fops)
3217{
3218 *fops = tty_fops;
3219}
3220
1da177e4
LT
3221/*
3222 * Initialize the console device. This is called *early*, so
3223 * we can't necessarily depend on lots of kernel help here.
3224 * Just do some early initializations, and do the complex setup
3225 * later.
3226 */
3227void __init console_init(void)
3228{
3229 initcall_t *call;
3230
3231 /* Setup the default TTY line discipline. */
01e1abb2 3232 tty_ldisc_begin();
1da177e4
LT
3233
3234 /*
37bdfb07 3235 * set up the console device so that later boot sequences can
1da177e4
LT
3236 * inform about problems etc..
3237 */
1da177e4
LT
3238 call = __con_initcall_start;
3239 while (call < __con_initcall_end) {
3240 (*call)();
3241 call++;
3242 }
3243}
3244
e454cea2
KS
3245static char *tty_devnode(struct device *dev, mode_t *mode)
3246{
3247 if (!mode)
3248 return NULL;
3249 if (dev->devt == MKDEV(TTYAUX_MAJOR, 0) ||
3250 dev->devt == MKDEV(TTYAUX_MAJOR, 2))
3251 *mode = 0666;
3252 return NULL;
3253}
3254
1da177e4
LT
3255static int __init tty_class_init(void)
3256{
7fe845d1 3257 tty_class = class_create(THIS_MODULE, "tty");
1da177e4
LT
3258 if (IS_ERR(tty_class))
3259 return PTR_ERR(tty_class);
e454cea2 3260 tty_class->devnode = tty_devnode;
1da177e4
LT
3261 return 0;
3262}
3263
3264postcore_initcall(tty_class_init);
3265
3266/* 3/2004 jmc: why do these devices exist? */
1da177e4 3267static struct cdev tty_cdev, console_cdev;
1da177e4 3268
fbc92a34
KS
3269static ssize_t show_cons_active(struct device *dev,
3270 struct device_attribute *attr, char *buf)
3271{
3272 struct console *cs[16];
3273 int i = 0;
3274 struct console *c;
3275 ssize_t count = 0;
3276
ac751efa 3277 console_lock();
a2a6a822 3278 for_each_console(c) {
fbc92a34
KS
3279 if (!c->device)
3280 continue;
3281 if (!c->write)
3282 continue;
3283 if ((c->flags & CON_ENABLED) == 0)
3284 continue;
3285 cs[i++] = c;
3286 if (i >= ARRAY_SIZE(cs))
3287 break;
3288 }
3289 while (i--)
3290 count += sprintf(buf + count, "%s%d%c",
3291 cs[i]->name, cs[i]->index, i ? ' ':'\n');
ac751efa 3292 console_unlock();
fbc92a34
KS
3293
3294 return count;
3295}
3296static DEVICE_ATTR(active, S_IRUGO, show_cons_active, NULL);
3297
3298static struct device *consdev;
3299
3300void console_sysfs_notify(void)
3301{
3302 if (consdev)
3303 sysfs_notify(&consdev->kobj, NULL, "active");
3304}
3305
1da177e4
LT
3306/*
3307 * Ok, now we can initialize the rest of the tty devices and can count
3308 * on memory allocations, interrupts etc..
3309 */
31d1d48e 3310int __init tty_init(void)
1da177e4
LT
3311{
3312 cdev_init(&tty_cdev, &tty_fops);
3313 if (cdev_add(&tty_cdev, MKDEV(TTYAUX_MAJOR, 0), 1) ||
3314 register_chrdev_region(MKDEV(TTYAUX_MAJOR, 0), 1, "/dev/tty") < 0)
3315 panic("Couldn't register /dev/tty driver\n");
fbc92a34 3316 device_create(tty_class, NULL, MKDEV(TTYAUX_MAJOR, 0), NULL, "tty");
1da177e4
LT
3317
3318 cdev_init(&console_cdev, &console_fops);
3319 if (cdev_add(&console_cdev, MKDEV(TTYAUX_MAJOR, 1), 1) ||
3320 register_chrdev_region(MKDEV(TTYAUX_MAJOR, 1), 1, "/dev/console") < 0)
3321 panic("Couldn't register /dev/console driver\n");
fbc92a34 3322 consdev = device_create(tty_class, NULL, MKDEV(TTYAUX_MAJOR, 1), NULL,
47aa5793 3323 "console");
fbc92a34
KS
3324 if (IS_ERR(consdev))
3325 consdev = NULL;
3326 else
a2a6a822 3327 WARN_ON(device_create_file(consdev, &dev_attr_active) < 0);
1da177e4 3328
1da177e4 3329#ifdef CONFIG_VT
d81ed103 3330 vty_init(&console_fops);
1da177e4
LT
3331#endif
3332 return 0;
3333}
31d1d48e 3334