TTY: drop driver reference in tty_open fail path
[linux-2.6-block.git] / drivers / tty / tty_io.c
CommitLineData
1da177e4 1/*
1da177e4
LT
2 * Copyright (C) 1991, 1992 Linus Torvalds
3 */
4
5/*
6 * 'tty_io.c' gives an orthogonal feeling to tty's, be they consoles
7 * or rs-channels. It also implements echoing, cooked mode etc.
8 *
9 * Kill-line thanks to John T Kohl, who also corrected VMIN = VTIME = 0.
10 *
11 * Modified by Theodore Ts'o, 9/14/92, to dynamically allocate the
12 * tty_struct and tty_queue structures. Previously there was an array
13 * of 256 tty_struct's which was statically allocated, and the
14 * tty_queue structures were allocated at boot time. Both are now
15 * dynamically allocated only when the tty is open.
16 *
17 * Also restructured routines so that there is more of a separation
18 * between the high-level tty routines (tty_io.c and tty_ioctl.c) and
19 * the low-level tty routines (serial.c, pty.c, console.c). This
37bdfb07 20 * makes for cleaner and more compact code. -TYT, 9/17/92
1da177e4
LT
21 *
22 * Modified by Fred N. van Kempen, 01/29/93, to add line disciplines
23 * which can be dynamically activated and de-activated by the line
24 * discipline handling modules (like SLIP).
25 *
26 * NOTE: pay no attention to the line discipline code (yet); its
27 * interface is still subject to change in this version...
28 * -- TYT, 1/31/92
29 *
30 * Added functionality to the OPOST tty handling. No delays, but all
31 * other bits should be there.
32 * -- Nick Holloway <alfie@dcs.warwick.ac.uk>, 27th May 1993.
33 *
34 * Rewrote canonical mode and added more termios flags.
35 * -- julian@uhunix.uhcc.hawaii.edu (J. Cowley), 13Jan94
36 *
37 * Reorganized FASYNC support so mouse code can share it.
38 * -- ctm@ardi.com, 9Sep95
39 *
40 * New TIOCLINUX variants added.
41 * -- mj@k332.feld.cvut.cz, 19-Nov-95
37bdfb07 42 *
1da177e4
LT
43 * Restrict vt switching via ioctl()
44 * -- grif@cs.ucr.edu, 5-Dec-95
45 *
46 * Move console and virtual terminal code to more appropriate files,
47 * implement CONFIG_VT and generalize console device interface.
48 * -- Marko Kohtala <Marko.Kohtala@hut.fi>, March 97
49 *
d81ed103 50 * Rewrote tty_init_dev and tty_release_dev to eliminate races.
1da177e4
LT
51 * -- Bill Hawes <whawes@star.net>, June 97
52 *
53 * Added devfs support.
54 * -- C. Scott Ananian <cananian@alumni.princeton.edu>, 13-Jan-1998
55 *
56 * Added support for a Unix98-style ptmx device.
57 * -- C. Scott Ananian <cananian@alumni.princeton.edu>, 14-Jan-1998
58 *
59 * Reduced memory usage for older ARM systems
60 * -- Russell King <rmk@arm.linux.org.uk>
61 *
62 * Move do_SAK() into process context. Less stack use in devfs functions.
37bdfb07
AC
63 * alloc_tty_struct() always uses kmalloc()
64 * -- Andrew Morton <andrewm@uow.edu.eu> 17Mar01
1da177e4
LT
65 */
66
1da177e4
LT
67#include <linux/types.h>
68#include <linux/major.h>
69#include <linux/errno.h>
70#include <linux/signal.h>
71#include <linux/fcntl.h>
72#include <linux/sched.h>
73#include <linux/interrupt.h>
74#include <linux/tty.h>
75#include <linux/tty_driver.h>
76#include <linux/tty_flip.h>
77#include <linux/devpts_fs.h>
78#include <linux/file.h>
9f3acc31 79#include <linux/fdtable.h>
1da177e4
LT
80#include <linux/console.h>
81#include <linux/timer.h>
82#include <linux/ctype.h>
83#include <linux/kd.h>
84#include <linux/mm.h>
85#include <linux/string.h>
86#include <linux/slab.h>
87#include <linux/poll.h>
88#include <linux/proc_fs.h>
89#include <linux/init.h>
90#include <linux/module.h>
1da177e4 91#include <linux/device.h>
1da177e4
LT
92#include <linux/wait.h>
93#include <linux/bitops.h>
b20f3ae5 94#include <linux/delay.h>
a352def2 95#include <linux/seq_file.h>
d281da7f 96#include <linux/serial.h>
5a3c6b25 97#include <linux/ratelimit.h>
1da177e4 98
a352def2 99#include <linux/uaccess.h>
1da177e4
LT
100#include <asm/system.h>
101
102#include <linux/kbd_kern.h>
103#include <linux/vt_kern.h>
104#include <linux/selection.h>
1da177e4
LT
105
106#include <linux/kmod.h>
b488893a 107#include <linux/nsproxy.h>
1da177e4
LT
108
109#undef TTY_DEBUG_HANGUP
110
111#define TTY_PARANOIA_CHECK 1
112#define CHECK_TTY_COUNT 1
113
edc6afc5 114struct ktermios tty_std_termios = { /* for the benefit of tty drivers */
1da177e4
LT
115 .c_iflag = ICRNL | IXON,
116 .c_oflag = OPOST | ONLCR,
117 .c_cflag = B38400 | CS8 | CREAD | HUPCL,
118 .c_lflag = ISIG | ICANON | ECHO | ECHOE | ECHOK |
119 ECHOCTL | ECHOKE | IEXTEN,
edc6afc5
AC
120 .c_cc = INIT_C_CC,
121 .c_ispeed = 38400,
122 .c_ospeed = 38400
1da177e4
LT
123};
124
125EXPORT_SYMBOL(tty_std_termios);
126
127/* This list gets poked at by procfs and various bits of boot up code. This
128 could do with some rationalisation such as pulling the tty proc function
129 into this file */
37bdfb07 130
1da177e4
LT
131LIST_HEAD(tty_drivers); /* linked list of tty drivers */
132
24ec839c 133/* Mutex to protect creating and releasing a tty. This is shared with
1da177e4 134 vt.c for deeply disgusting hack reasons */
70522e12 135DEFINE_MUTEX(tty_mutex);
de2a84f2 136EXPORT_SYMBOL(tty_mutex);
1da177e4 137
ee2ffa0d
NP
138/* Spinlock to protect the tty->tty_files list */
139DEFINE_SPINLOCK(tty_files_lock);
140
1da177e4
LT
141static ssize_t tty_read(struct file *, char __user *, size_t, loff_t *);
142static ssize_t tty_write(struct file *, const char __user *, size_t, loff_t *);
37bdfb07
AC
143ssize_t redirected_tty_write(struct file *, const char __user *,
144 size_t, loff_t *);
1da177e4
LT
145static unsigned int tty_poll(struct file *, poll_table *);
146static int tty_open(struct inode *, struct file *);
04f378b1 147long tty_ioctl(struct file *file, unsigned int cmd, unsigned long arg);
e10cc1df 148#ifdef CONFIG_COMPAT
37bdfb07 149static long tty_compat_ioctl(struct file *file, unsigned int cmd,
e10cc1df
PF
150 unsigned long arg);
151#else
152#define tty_compat_ioctl NULL
153#endif
ec79d605 154static int __tty_fasync(int fd, struct file *filp, int on);
37bdfb07 155static int tty_fasync(int fd, struct file *filp, int on);
d5698c28 156static void release_tty(struct tty_struct *tty, int idx);
2a65f1d9 157static void __proc_set_tty(struct task_struct *tsk, struct tty_struct *tty);
98a27ba4 158static void proc_set_tty(struct task_struct *tsk, struct tty_struct *tty);
1da177e4 159
af9b897e
AC
160/**
161 * alloc_tty_struct - allocate a tty object
162 *
163 * Return a new empty tty structure. The data fields have not
164 * been initialized in any way but has been zeroed
165 *
166 * Locking: none
af9b897e 167 */
1da177e4 168
bf970ee4 169struct tty_struct *alloc_tty_struct(void)
1da177e4 170{
1266b1e1 171 return kzalloc(sizeof(struct tty_struct), GFP_KERNEL);
1da177e4
LT
172}
173
af9b897e
AC
174/**
175 * free_tty_struct - free a disused tty
176 * @tty: tty struct to free
177 *
178 * Free the write buffers, tty queue and tty memory itself.
179 *
180 * Locking: none. Must be called after tty is definitely unused
181 */
182
bf970ee4 183void free_tty_struct(struct tty_struct *tty)
1da177e4 184{
30004ac9
DES
185 if (tty->dev)
186 put_device(tty->dev);
1da177e4 187 kfree(tty->write_buf);
33f0f88f 188 tty_buffer_free_all(tty);
1da177e4
LT
189 kfree(tty);
190}
191
d996b62a
NP
192static inline struct tty_struct *file_tty(struct file *file)
193{
194 return ((struct tty_file_private *)file->private_data)->tty;
195}
196
197/* Associate a new file with the tty structure */
f573bd17 198int tty_add_file(struct tty_struct *tty, struct file *file)
d996b62a
NP
199{
200 struct tty_file_private *priv;
201
f573bd17
PE
202 priv = kmalloc(sizeof(*priv), GFP_KERNEL);
203 if (!priv)
204 return -ENOMEM;
d996b62a
NP
205
206 priv->tty = tty;
207 priv->file = file;
208 file->private_data = priv;
209
210 spin_lock(&tty_files_lock);
211 list_add(&priv->list, &tty->tty_files);
212 spin_unlock(&tty_files_lock);
f573bd17
PE
213
214 return 0;
d996b62a
NP
215}
216
217/* Delete file from its tty */
218void tty_del_file(struct file *file)
219{
220 struct tty_file_private *priv = file->private_data;
221
222 spin_lock(&tty_files_lock);
223 list_del(&priv->list);
224 spin_unlock(&tty_files_lock);
225 file->private_data = NULL;
226 kfree(priv);
227}
228
229
1da177e4
LT
230#define TTY_NUMBER(tty) ((tty)->index + (tty)->driver->name_base)
231
af9b897e
AC
232/**
233 * tty_name - return tty naming
234 * @tty: tty structure
235 * @buf: buffer for output
236 *
237 * Convert a tty structure into a name. The name reflects the kernel
238 * naming policy and if udev is in use may not reflect user space
239 *
240 * Locking: none
241 */
242
1da177e4
LT
243char *tty_name(struct tty_struct *tty, char *buf)
244{
245 if (!tty) /* Hmm. NULL pointer. That's fun. */
246 strcpy(buf, "NULL tty");
247 else
248 strcpy(buf, tty->name);
249 return buf;
250}
251
252EXPORT_SYMBOL(tty_name);
253
d769a669 254int tty_paranoia_check(struct tty_struct *tty, struct inode *inode,
1da177e4
LT
255 const char *routine)
256{
257#ifdef TTY_PARANOIA_CHECK
258 if (!tty) {
259 printk(KERN_WARNING
260 "null TTY for (%d:%d) in %s\n",
261 imajor(inode), iminor(inode), routine);
262 return 1;
263 }
264 if (tty->magic != TTY_MAGIC) {
265 printk(KERN_WARNING
266 "bad magic number for tty struct (%d:%d) in %s\n",
267 imajor(inode), iminor(inode), routine);
268 return 1;
269 }
270#endif
271 return 0;
272}
273
274static int check_tty_count(struct tty_struct *tty, const char *routine)
275{
276#ifdef CHECK_TTY_COUNT
277 struct list_head *p;
278 int count = 0;
37bdfb07 279
ee2ffa0d 280 spin_lock(&tty_files_lock);
1da177e4
LT
281 list_for_each(p, &tty->tty_files) {
282 count++;
283 }
ee2ffa0d 284 spin_unlock(&tty_files_lock);
1da177e4
LT
285 if (tty->driver->type == TTY_DRIVER_TYPE_PTY &&
286 tty->driver->subtype == PTY_TYPE_SLAVE &&
287 tty->link && tty->link->count)
288 count++;
289 if (tty->count != count) {
290 printk(KERN_WARNING "Warning: dev (%s) tty->count(%d) "
291 "!= #fd's(%d) in %s\n",
292 tty->name, tty->count, count, routine);
293 return count;
24ec839c 294 }
1da177e4
LT
295#endif
296 return 0;
297}
298
af9b897e
AC
299/**
300 * get_tty_driver - find device of a tty
301 * @dev_t: device identifier
302 * @index: returns the index of the tty
303 *
304 * This routine returns a tty driver structure, given a device number
305 * and also passes back the index number.
306 *
307 * Locking: caller must hold tty_mutex
1da177e4 308 */
af9b897e 309
1da177e4
LT
310static struct tty_driver *get_tty_driver(dev_t device, int *index)
311{
312 struct tty_driver *p;
313
314 list_for_each_entry(p, &tty_drivers, tty_drivers) {
315 dev_t base = MKDEV(p->major, p->minor_start);
316 if (device < base || device >= base + p->num)
317 continue;
318 *index = device - base;
7d7b93c1 319 return tty_driver_kref_get(p);
1da177e4
LT
320 }
321 return NULL;
322}
323
f2d937f3
JW
324#ifdef CONFIG_CONSOLE_POLL
325
326/**
327 * tty_find_polling_driver - find device of a polled tty
328 * @name: name string to match
329 * @line: pointer to resulting tty line nr
330 *
331 * This routine returns a tty driver structure, given a name
332 * and the condition that the tty driver is capable of polled
333 * operation.
334 */
335struct tty_driver *tty_find_polling_driver(char *name, int *line)
336{
337 struct tty_driver *p, *res = NULL;
338 int tty_line = 0;
0dca0fd2 339 int len;
5f0878ac 340 char *str, *stp;
f2d937f3 341
0dca0fd2
JW
342 for (str = name; *str; str++)
343 if ((*str >= '0' && *str <= '9') || *str == ',')
344 break;
345 if (!*str)
346 return NULL;
347
348 len = str - name;
349 tty_line = simple_strtoul(str, &str, 10);
350
f2d937f3
JW
351 mutex_lock(&tty_mutex);
352 /* Search through the tty devices to look for a match */
353 list_for_each_entry(p, &tty_drivers, tty_drivers) {
0dca0fd2
JW
354 if (strncmp(name, p->name, len) != 0)
355 continue;
5f0878ac
AC
356 stp = str;
357 if (*stp == ',')
358 stp++;
359 if (*stp == '\0')
360 stp = NULL;
f2d937f3 361
6eb68d6f 362 if (tty_line >= 0 && tty_line < p->num && p->ops &&
5f0878ac 363 p->ops->poll_init && !p->ops->poll_init(p, tty_line, stp)) {
7d7b93c1 364 res = tty_driver_kref_get(p);
f2d937f3
JW
365 *line = tty_line;
366 break;
367 }
368 }
369 mutex_unlock(&tty_mutex);
370
371 return res;
372}
373EXPORT_SYMBOL_GPL(tty_find_polling_driver);
374#endif
375
af9b897e
AC
376/**
377 * tty_check_change - check for POSIX terminal changes
378 * @tty: tty to check
379 *
380 * If we try to write to, or set the state of, a terminal and we're
381 * not in the foreground, send a SIGTTOU. If the signal is blocked or
382 * ignored, go ahead and perform the operation. (POSIX 7.2)
383 *
978e595f 384 * Locking: ctrl_lock
1da177e4 385 */
af9b897e 386
37bdfb07 387int tty_check_change(struct tty_struct *tty)
1da177e4 388{
47f86834
AC
389 unsigned long flags;
390 int ret = 0;
391
1da177e4
LT
392 if (current->signal->tty != tty)
393 return 0;
47f86834
AC
394
395 spin_lock_irqsave(&tty->ctrl_lock, flags);
396
ab521dc0
EB
397 if (!tty->pgrp) {
398 printk(KERN_WARNING "tty_check_change: tty->pgrp == NULL!\n");
9ffee4cb 399 goto out_unlock;
1da177e4 400 }
ab521dc0 401 if (task_pgrp(current) == tty->pgrp)
9ffee4cb
AM
402 goto out_unlock;
403 spin_unlock_irqrestore(&tty->ctrl_lock, flags);
1da177e4 404 if (is_ignored(SIGTTOU))
47f86834
AC
405 goto out;
406 if (is_current_pgrp_orphaned()) {
407 ret = -EIO;
408 goto out;
409 }
040b6362
ON
410 kill_pgrp(task_pgrp(current), SIGTTOU, 1);
411 set_thread_flag(TIF_SIGPENDING);
47f86834
AC
412 ret = -ERESTARTSYS;
413out:
9ffee4cb
AM
414 return ret;
415out_unlock:
47f86834
AC
416 spin_unlock_irqrestore(&tty->ctrl_lock, flags);
417 return ret;
1da177e4
LT
418}
419
420EXPORT_SYMBOL(tty_check_change);
421
37bdfb07 422static ssize_t hung_up_tty_read(struct file *file, char __user *buf,
1da177e4
LT
423 size_t count, loff_t *ppos)
424{
425 return 0;
426}
427
37bdfb07 428static ssize_t hung_up_tty_write(struct file *file, const char __user *buf,
1da177e4
LT
429 size_t count, loff_t *ppos)
430{
431 return -EIO;
432}
433
434/* No kernel lock held - none needed ;) */
37bdfb07 435static unsigned int hung_up_tty_poll(struct file *filp, poll_table *wait)
1da177e4
LT
436{
437 return POLLIN | POLLOUT | POLLERR | POLLHUP | POLLRDNORM | POLLWRNORM;
438}
439
04f378b1
AC
440static long hung_up_tty_ioctl(struct file *file, unsigned int cmd,
441 unsigned long arg)
38ad2ed0
PF
442{
443 return cmd == TIOCSPGRP ? -ENOTTY : -EIO;
444}
445
37bdfb07 446static long hung_up_tty_compat_ioctl(struct file *file,
38ad2ed0 447 unsigned int cmd, unsigned long arg)
1da177e4
LT
448{
449 return cmd == TIOCSPGRP ? -ENOTTY : -EIO;
450}
451
62322d25 452static const struct file_operations tty_fops = {
1da177e4
LT
453 .llseek = no_llseek,
454 .read = tty_read,
455 .write = tty_write,
456 .poll = tty_poll,
04f378b1 457 .unlocked_ioctl = tty_ioctl,
e10cc1df 458 .compat_ioctl = tty_compat_ioctl,
1da177e4
LT
459 .open = tty_open,
460 .release = tty_release,
461 .fasync = tty_fasync,
462};
463
62322d25 464static const struct file_operations console_fops = {
1da177e4
LT
465 .llseek = no_llseek,
466 .read = tty_read,
467 .write = redirected_tty_write,
468 .poll = tty_poll,
04f378b1 469 .unlocked_ioctl = tty_ioctl,
e10cc1df 470 .compat_ioctl = tty_compat_ioctl,
1da177e4
LT
471 .open = tty_open,
472 .release = tty_release,
473 .fasync = tty_fasync,
474};
475
62322d25 476static const struct file_operations hung_up_tty_fops = {
1da177e4
LT
477 .llseek = no_llseek,
478 .read = hung_up_tty_read,
479 .write = hung_up_tty_write,
480 .poll = hung_up_tty_poll,
04f378b1 481 .unlocked_ioctl = hung_up_tty_ioctl,
38ad2ed0 482 .compat_ioctl = hung_up_tty_compat_ioctl,
1da177e4
LT
483 .release = tty_release,
484};
485
486static DEFINE_SPINLOCK(redirect_lock);
487static struct file *redirect;
488
489/**
490 * tty_wakeup - request more data
491 * @tty: terminal
492 *
493 * Internal and external helper for wakeups of tty. This function
494 * informs the line discipline if present that the driver is ready
495 * to receive more output data.
496 */
37bdfb07 497
1da177e4
LT
498void tty_wakeup(struct tty_struct *tty)
499{
500 struct tty_ldisc *ld;
37bdfb07 501
1da177e4
LT
502 if (test_bit(TTY_DO_WRITE_WAKEUP, &tty->flags)) {
503 ld = tty_ldisc_ref(tty);
37bdfb07 504 if (ld) {
a352def2
AC
505 if (ld->ops->write_wakeup)
506 ld->ops->write_wakeup(tty);
1da177e4
LT
507 tty_ldisc_deref(ld);
508 }
509 }
4b19449d 510 wake_up_interruptible_poll(&tty->write_wait, POLLOUT);
1da177e4
LT
511}
512
513EXPORT_SYMBOL_GPL(tty_wakeup);
514
af9b897e 515/**
11dbf203 516 * __tty_hangup - actual handler for hangup events
65f27f38 517 * @work: tty device
af9b897e 518 *
1bad879a 519 * This can be called by the "eventd" kernel thread. That is process
af9b897e
AC
520 * synchronous but doesn't hold any locks, so we need to make sure we
521 * have the appropriate locks for what we're doing.
522 *
523 * The hangup event clears any pending redirections onto the hung up
524 * device. It ensures future writes will error and it does the needed
525 * line discipline hangup and signal delivery. The tty object itself
526 * remains intact.
527 *
528 * Locking:
ec79d605 529 * BTM
24ec839c
PZ
530 * redirect lock for undoing redirection
531 * file list lock for manipulating list of ttys
532 * tty_ldisc_lock from called functions
533 * termios_mutex resetting termios data
534 * tasklist_lock to walk task list for hangup event
535 * ->siglock to protect ->signal/->sighand
1da177e4 536 */
11dbf203 537void __tty_hangup(struct tty_struct *tty)
1da177e4 538{
37bdfb07 539 struct file *cons_filp = NULL;
1da177e4
LT
540 struct file *filp, *f = NULL;
541 struct task_struct *p;
d996b62a 542 struct tty_file_private *priv;
1da177e4 543 int closecount = 0, n;
47f86834 544 unsigned long flags;
9c9f4ded 545 int refs = 0;
1da177e4
LT
546
547 if (!tty)
548 return;
549
1da177e4
LT
550
551 spin_lock(&redirect_lock);
d996b62a 552 if (redirect && file_tty(redirect) == tty) {
1da177e4
LT
553 f = redirect;
554 redirect = NULL;
555 }
556 spin_unlock(&redirect_lock);
37bdfb07 557
11dbf203
AB
558 tty_lock();
559
acfa747b
JS
560 /* some functions below drop BTM, so we need this bit */
561 set_bit(TTY_HUPPING, &tty->flags);
562
ec79d605
AB
563 /* inuse_filps is protected by the single tty lock,
564 this really needs to change if we want to flush the
565 workqueue with the lock held */
11dbf203 566 check_tty_count(tty, "tty_hangup");
36ba782e 567
ee2ffa0d 568 spin_lock(&tty_files_lock);
1da177e4 569 /* This breaks for file handles being sent over AF_UNIX sockets ? */
d996b62a
NP
570 list_for_each_entry(priv, &tty->tty_files, list) {
571 filp = priv->file;
1da177e4
LT
572 if (filp->f_op->write == redirected_tty_write)
573 cons_filp = filp;
574 if (filp->f_op->write != tty_write)
575 continue;
576 closecount++;
ec79d605 577 __tty_fasync(-1, filp, 0); /* can't block */
1da177e4
LT
578 filp->f_op = &hung_up_tty_fops;
579 }
ee2ffa0d 580 spin_unlock(&tty_files_lock);
37bdfb07 581
acfa747b
JS
582 /*
583 * it drops BTM and thus races with reopen
584 * we protect the race by TTY_HUPPING
585 */
c65c9bc3 586 tty_ldisc_hangup(tty);
37bdfb07 587
1da177e4 588 read_lock(&tasklist_lock);
ab521dc0
EB
589 if (tty->session) {
590 do_each_pid_task(tty->session, PIDTYPE_SID, p) {
24ec839c 591 spin_lock_irq(&p->sighand->siglock);
9c9f4ded 592 if (p->signal->tty == tty) {
1da177e4 593 p->signal->tty = NULL;
9c9f4ded
AC
594 /* We defer the dereferences outside fo
595 the tasklist lock */
596 refs++;
597 }
24ec839c
PZ
598 if (!p->signal->leader) {
599 spin_unlock_irq(&p->sighand->siglock);
1da177e4 600 continue;
24ec839c
PZ
601 }
602 __group_send_sig_info(SIGHUP, SEND_SIG_PRIV, p);
603 __group_send_sig_info(SIGCONT, SEND_SIG_PRIV, p);
ab521dc0 604 put_pid(p->signal->tty_old_pgrp); /* A noop */
47f86834 605 spin_lock_irqsave(&tty->ctrl_lock, flags);
ab521dc0
EB
606 if (tty->pgrp)
607 p->signal->tty_old_pgrp = get_pid(tty->pgrp);
47f86834 608 spin_unlock_irqrestore(&tty->ctrl_lock, flags);
24ec839c 609 spin_unlock_irq(&p->sighand->siglock);
ab521dc0 610 } while_each_pid_task(tty->session, PIDTYPE_SID, p);
1da177e4
LT
611 }
612 read_unlock(&tasklist_lock);
613
47f86834 614 spin_lock_irqsave(&tty->ctrl_lock, flags);
c65c9bc3
AC
615 clear_bit(TTY_THROTTLED, &tty->flags);
616 clear_bit(TTY_PUSH, &tty->flags);
617 clear_bit(TTY_DO_WRITE_WAKEUP, &tty->flags);
d9c1e9a8
EB
618 put_pid(tty->session);
619 put_pid(tty->pgrp);
ab521dc0
EB
620 tty->session = NULL;
621 tty->pgrp = NULL;
1da177e4 622 tty->ctrl_status = 0;
47f86834
AC
623 spin_unlock_irqrestore(&tty->ctrl_lock, flags);
624
9c9f4ded
AC
625 /* Account for the p->signal references we killed */
626 while (refs--)
627 tty_kref_put(tty);
628
1da177e4 629 /*
37bdfb07
AC
630 * If one of the devices matches a console pointer, we
631 * cannot just call hangup() because that will cause
632 * tty->count and state->count to go out of sync.
633 * So we just call close() the right number of times.
1da177e4
LT
634 */
635 if (cons_filp) {
f34d7a5b 636 if (tty->ops->close)
1da177e4 637 for (n = 0; n < closecount; n++)
f34d7a5b
AC
638 tty->ops->close(tty, cons_filp);
639 } else if (tty->ops->hangup)
640 (tty->ops->hangup)(tty);
37bdfb07
AC
641 /*
642 * We don't want to have driver/ldisc interactions beyond
643 * the ones we did here. The driver layer expects no
644 * calls after ->hangup() from the ldisc side. However we
645 * can't yet guarantee all that.
646 */
1da177e4 647 set_bit(TTY_HUPPED, &tty->flags);
acfa747b 648 clear_bit(TTY_HUPPING, &tty->flags);
c65c9bc3 649 tty_ldisc_enable(tty);
11dbf203
AB
650
651 tty_unlock();
652
1da177e4
LT
653 if (f)
654 fput(f);
655}
656
ddcd9fb6
AB
657static void do_tty_hangup(struct work_struct *work)
658{
659 struct tty_struct *tty =
660 container_of(work, struct tty_struct, hangup_work);
661
11dbf203 662 __tty_hangup(tty);
ddcd9fb6
AB
663}
664
af9b897e
AC
665/**
666 * tty_hangup - trigger a hangup event
667 * @tty: tty to hangup
668 *
669 * A carrier loss (virtual or otherwise) has occurred on this like
670 * schedule a hangup sequence to run after this event.
671 */
672
37bdfb07 673void tty_hangup(struct tty_struct *tty)
1da177e4
LT
674{
675#ifdef TTY_DEBUG_HANGUP
676 char buf[64];
1da177e4
LT
677 printk(KERN_DEBUG "%s hangup...\n", tty_name(tty, buf));
678#endif
679 schedule_work(&tty->hangup_work);
680}
681
682EXPORT_SYMBOL(tty_hangup);
683
af9b897e
AC
684/**
685 * tty_vhangup - process vhangup
686 * @tty: tty to hangup
687 *
688 * The user has asked via system call for the terminal to be hung up.
689 * We do this synchronously so that when the syscall returns the process
3a4fa0a2 690 * is complete. That guarantee is necessary for security reasons.
af9b897e
AC
691 */
692
37bdfb07 693void tty_vhangup(struct tty_struct *tty)
1da177e4
LT
694{
695#ifdef TTY_DEBUG_HANGUP
696 char buf[64];
697
698 printk(KERN_DEBUG "%s vhangup...\n", tty_name(tty, buf));
699#endif
11dbf203 700 __tty_hangup(tty);
1da177e4 701}
37bdfb07 702
1da177e4
LT
703EXPORT_SYMBOL(tty_vhangup);
704
11dbf203 705
2cb5998b
AC
706/**
707 * tty_vhangup_self - process vhangup for own ctty
708 *
709 * Perform a vhangup on the current controlling tty
710 */
711
712void tty_vhangup_self(void)
713{
714 struct tty_struct *tty;
715
2cb5998b
AC
716 tty = get_current_tty();
717 if (tty) {
718 tty_vhangup(tty);
719 tty_kref_put(tty);
720 }
2cb5998b
AC
721}
722
af9b897e
AC
723/**
724 * tty_hung_up_p - was tty hung up
725 * @filp: file pointer of tty
726 *
727 * Return true if the tty has been subject to a vhangup or a carrier
728 * loss
729 */
730
37bdfb07 731int tty_hung_up_p(struct file *filp)
1da177e4
LT
732{
733 return (filp->f_op == &hung_up_tty_fops);
734}
735
736EXPORT_SYMBOL(tty_hung_up_p);
737
ab521dc0 738static void session_clear_tty(struct pid *session)
24ec839c
PZ
739{
740 struct task_struct *p;
ab521dc0 741 do_each_pid_task(session, PIDTYPE_SID, p) {
24ec839c 742 proc_clear_tty(p);
ab521dc0 743 } while_each_pid_task(session, PIDTYPE_SID, p);
24ec839c
PZ
744}
745
af9b897e
AC
746/**
747 * disassociate_ctty - disconnect controlling tty
748 * @on_exit: true if exiting so need to "hang up" the session
1da177e4 749 *
af9b897e
AC
750 * This function is typically called only by the session leader, when
751 * it wants to disassociate itself from its controlling tty.
752 *
753 * It performs the following functions:
1da177e4
LT
754 * (1) Sends a SIGHUP and SIGCONT to the foreground process group
755 * (2) Clears the tty from being controlling the session
756 * (3) Clears the controlling tty for all processes in the
757 * session group.
758 *
af9b897e
AC
759 * The argument on_exit is set to 1 if called when a process is
760 * exiting; it is 0 if called by the ioctl TIOCNOTTY.
761 *
24ec839c 762 * Locking:
ec79d605
AB
763 * BTM is taken for hysterical raisins, and held when
764 * called from no_tty().
24ec839c
PZ
765 * tty_mutex is taken to protect tty
766 * ->siglock is taken to protect ->signal/->sighand
767 * tasklist_lock is taken to walk process list for sessions
768 * ->siglock is taken to protect ->signal/->sighand
1da177e4 769 */
af9b897e 770
1da177e4
LT
771void disassociate_ctty(int on_exit)
772{
773 struct tty_struct *tty;
ab521dc0 774 struct pid *tty_pgrp = NULL;
1da177e4 775
5ec93d11
AC
776 if (!current->signal->leader)
777 return;
1da177e4 778
24ec839c 779 tty = get_current_tty();
1da177e4 780 if (tty) {
ab521dc0 781 tty_pgrp = get_pid(tty->pgrp);
ddcd9fb6 782 if (on_exit) {
ddcd9fb6 783 if (tty->driver->type != TTY_DRIVER_TYPE_PTY)
11dbf203 784 tty_vhangup(tty);
ddcd9fb6 785 }
452a00d2 786 tty_kref_put(tty);
680a9671 787 } else if (on_exit) {
ab521dc0 788 struct pid *old_pgrp;
680a9671
EB
789 spin_lock_irq(&current->sighand->siglock);
790 old_pgrp = current->signal->tty_old_pgrp;
ab521dc0 791 current->signal->tty_old_pgrp = NULL;
680a9671 792 spin_unlock_irq(&current->sighand->siglock);
24ec839c 793 if (old_pgrp) {
ab521dc0
EB
794 kill_pgrp(old_pgrp, SIGHUP, on_exit);
795 kill_pgrp(old_pgrp, SIGCONT, on_exit);
796 put_pid(old_pgrp);
1da177e4 797 }
1da177e4
LT
798 return;
799 }
ab521dc0
EB
800 if (tty_pgrp) {
801 kill_pgrp(tty_pgrp, SIGHUP, on_exit);
1da177e4 802 if (!on_exit)
ab521dc0
EB
803 kill_pgrp(tty_pgrp, SIGCONT, on_exit);
804 put_pid(tty_pgrp);
1da177e4
LT
805 }
806
24ec839c 807 spin_lock_irq(&current->sighand->siglock);
2a65f1d9 808 put_pid(current->signal->tty_old_pgrp);
23cac8de 809 current->signal->tty_old_pgrp = NULL;
24ec839c
PZ
810 spin_unlock_irq(&current->sighand->siglock);
811
24ec839c
PZ
812 tty = get_current_tty();
813 if (tty) {
47f86834
AC
814 unsigned long flags;
815 spin_lock_irqsave(&tty->ctrl_lock, flags);
ab521dc0
EB
816 put_pid(tty->session);
817 put_pid(tty->pgrp);
818 tty->session = NULL;
819 tty->pgrp = NULL;
47f86834 820 spin_unlock_irqrestore(&tty->ctrl_lock, flags);
452a00d2 821 tty_kref_put(tty);
24ec839c
PZ
822 } else {
823#ifdef TTY_DEBUG_HANGUP
824 printk(KERN_DEBUG "error attempted to write to tty [0x%p]"
825 " = NULL", tty);
826#endif
827 }
1da177e4
LT
828
829 /* Now clear signal->tty under the lock */
830 read_lock(&tasklist_lock);
ab521dc0 831 session_clear_tty(task_session(current));
1da177e4 832 read_unlock(&tasklist_lock);
1da177e4
LT
833}
834
98a27ba4
EB
835/**
836 *
837 * no_tty - Ensure the current process does not have a controlling tty
838 */
839void no_tty(void)
840{
841 struct task_struct *tsk = current;
ec79d605 842 tty_lock();
5ec93d11 843 disassociate_ctty(0);
ec79d605 844 tty_unlock();
98a27ba4
EB
845 proc_clear_tty(tsk);
846}
847
af9b897e
AC
848
849/**
beb7dd86 850 * stop_tty - propagate flow control
af9b897e
AC
851 * @tty: tty to stop
852 *
853 * Perform flow control to the driver. For PTY/TTY pairs we
beb7dd86 854 * must also propagate the TIOCKPKT status. May be called
af9b897e
AC
855 * on an already stopped device and will not re-call the driver
856 * method.
857 *
858 * This functionality is used by both the line disciplines for
859 * halting incoming flow and by the driver. It may therefore be
860 * called from any context, may be under the tty atomic_write_lock
861 * but not always.
862 *
863 * Locking:
04f378b1 864 * Uses the tty control lock internally
af9b897e
AC
865 */
866
1da177e4
LT
867void stop_tty(struct tty_struct *tty)
868{
04f378b1
AC
869 unsigned long flags;
870 spin_lock_irqsave(&tty->ctrl_lock, flags);
871 if (tty->stopped) {
872 spin_unlock_irqrestore(&tty->ctrl_lock, flags);
1da177e4 873 return;
04f378b1 874 }
1da177e4
LT
875 tty->stopped = 1;
876 if (tty->link && tty->link->packet) {
877 tty->ctrl_status &= ~TIOCPKT_START;
878 tty->ctrl_status |= TIOCPKT_STOP;
4b19449d 879 wake_up_interruptible_poll(&tty->link->read_wait, POLLIN);
1da177e4 880 }
04f378b1 881 spin_unlock_irqrestore(&tty->ctrl_lock, flags);
f34d7a5b
AC
882 if (tty->ops->stop)
883 (tty->ops->stop)(tty);
1da177e4
LT
884}
885
886EXPORT_SYMBOL(stop_tty);
887
af9b897e 888/**
beb7dd86 889 * start_tty - propagate flow control
af9b897e
AC
890 * @tty: tty to start
891 *
892 * Start a tty that has been stopped if at all possible. Perform
3a4fa0a2 893 * any necessary wakeups and propagate the TIOCPKT status. If this
af9b897e
AC
894 * is the tty was previous stopped and is being started then the
895 * driver start method is invoked and the line discipline woken.
896 *
897 * Locking:
04f378b1 898 * ctrl_lock
af9b897e
AC
899 */
900
1da177e4
LT
901void start_tty(struct tty_struct *tty)
902{
04f378b1
AC
903 unsigned long flags;
904 spin_lock_irqsave(&tty->ctrl_lock, flags);
905 if (!tty->stopped || tty->flow_stopped) {
906 spin_unlock_irqrestore(&tty->ctrl_lock, flags);
1da177e4 907 return;
04f378b1 908 }
1da177e4
LT
909 tty->stopped = 0;
910 if (tty->link && tty->link->packet) {
911 tty->ctrl_status &= ~TIOCPKT_STOP;
912 tty->ctrl_status |= TIOCPKT_START;
4b19449d 913 wake_up_interruptible_poll(&tty->link->read_wait, POLLIN);
1da177e4 914 }
04f378b1 915 spin_unlock_irqrestore(&tty->ctrl_lock, flags);
f34d7a5b
AC
916 if (tty->ops->start)
917 (tty->ops->start)(tty);
1da177e4
LT
918 /* If we have a running line discipline it may need kicking */
919 tty_wakeup(tty);
1da177e4
LT
920}
921
922EXPORT_SYMBOL(start_tty);
923
af9b897e
AC
924/**
925 * tty_read - read method for tty device files
926 * @file: pointer to tty file
927 * @buf: user buffer
928 * @count: size of user buffer
929 * @ppos: unused
930 *
931 * Perform the read system call function on this terminal device. Checks
932 * for hung up devices before calling the line discipline method.
933 *
934 * Locking:
47f86834
AC
935 * Locks the line discipline internally while needed. Multiple
936 * read calls may be outstanding in parallel.
af9b897e
AC
937 */
938
37bdfb07 939static ssize_t tty_read(struct file *file, char __user *buf, size_t count,
1da177e4
LT
940 loff_t *ppos)
941{
942 int i;
d996b62a
NP
943 struct inode *inode = file->f_path.dentry->d_inode;
944 struct tty_struct *tty = file_tty(file);
1da177e4
LT
945 struct tty_ldisc *ld;
946
1da177e4
LT
947 if (tty_paranoia_check(tty, inode, "tty_read"))
948 return -EIO;
949 if (!tty || (test_bit(TTY_IO_ERROR, &tty->flags)))
950 return -EIO;
951
952 /* We want to wait for the line discipline to sort out in this
953 situation */
954 ld = tty_ldisc_ref_wait(tty);
a352def2
AC
955 if (ld->ops->read)
956 i = (ld->ops->read)(tty, file, buf, count);
1da177e4
LT
957 else
958 i = -EIO;
959 tty_ldisc_deref(ld);
1da177e4
LT
960 if (i > 0)
961 inode->i_atime = current_fs_time(inode->i_sb);
962 return i;
963}
964
9c1729db 965void tty_write_unlock(struct tty_struct *tty)
83c67571 966 __releases(&tty->atomic_write_lock)
9c1729db
AC
967{
968 mutex_unlock(&tty->atomic_write_lock);
4b19449d 969 wake_up_interruptible_poll(&tty->write_wait, POLLOUT);
9c1729db
AC
970}
971
972int tty_write_lock(struct tty_struct *tty, int ndelay)
83c67571 973 __acquires(&tty->atomic_write_lock)
9c1729db
AC
974{
975 if (!mutex_trylock(&tty->atomic_write_lock)) {
976 if (ndelay)
977 return -EAGAIN;
978 if (mutex_lock_interruptible(&tty->atomic_write_lock))
979 return -ERESTARTSYS;
980 }
981 return 0;
982}
983
1da177e4
LT
984/*
985 * Split writes up in sane blocksizes to avoid
986 * denial-of-service type attacks
987 */
988static inline ssize_t do_tty_write(
989 ssize_t (*write)(struct tty_struct *, struct file *, const unsigned char *, size_t),
990 struct tty_struct *tty,
991 struct file *file,
992 const char __user *buf,
993 size_t count)
994{
9c1729db 995 ssize_t ret, written = 0;
1da177e4 996 unsigned int chunk;
37bdfb07 997
9c1729db
AC
998 ret = tty_write_lock(tty, file->f_flags & O_NDELAY);
999 if (ret < 0)
1000 return ret;
1da177e4
LT
1001
1002 /*
1003 * We chunk up writes into a temporary buffer. This
1004 * simplifies low-level drivers immensely, since they
1005 * don't have locking issues and user mode accesses.
1006 *
1007 * But if TTY_NO_WRITE_SPLIT is set, we should use a
1008 * big chunk-size..
1009 *
1010 * The default chunk-size is 2kB, because the NTTY
1011 * layer has problems with bigger chunks. It will
1012 * claim to be able to handle more characters than
1013 * it actually does.
af9b897e
AC
1014 *
1015 * FIXME: This can probably go away now except that 64K chunks
1016 * are too likely to fail unless switched to vmalloc...
1da177e4
LT
1017 */
1018 chunk = 2048;
1019 if (test_bit(TTY_NO_WRITE_SPLIT, &tty->flags))
1020 chunk = 65536;
1021 if (count < chunk)
1022 chunk = count;
1023
70522e12 1024 /* write_buf/write_cnt is protected by the atomic_write_lock mutex */
1da177e4 1025 if (tty->write_cnt < chunk) {
402fda92 1026 unsigned char *buf_chunk;
1da177e4
LT
1027
1028 if (chunk < 1024)
1029 chunk = 1024;
1030
402fda92
JW
1031 buf_chunk = kmalloc(chunk, GFP_KERNEL);
1032 if (!buf_chunk) {
9c1729db
AC
1033 ret = -ENOMEM;
1034 goto out;
1da177e4
LT
1035 }
1036 kfree(tty->write_buf);
1037 tty->write_cnt = chunk;
402fda92 1038 tty->write_buf = buf_chunk;
1da177e4
LT
1039 }
1040
1041 /* Do the write .. */
1042 for (;;) {
1043 size_t size = count;
1044 if (size > chunk)
1045 size = chunk;
1046 ret = -EFAULT;
1047 if (copy_from_user(tty->write_buf, buf, size))
1048 break;
1da177e4 1049 ret = write(tty, file, tty->write_buf, size);
1da177e4
LT
1050 if (ret <= 0)
1051 break;
1052 written += ret;
1053 buf += ret;
1054 count -= ret;
1055 if (!count)
1056 break;
1057 ret = -ERESTARTSYS;
1058 if (signal_pending(current))
1059 break;
1060 cond_resched();
1061 }
1062 if (written) {
a7113a96 1063 struct inode *inode = file->f_path.dentry->d_inode;
1da177e4
LT
1064 inode->i_mtime = current_fs_time(inode->i_sb);
1065 ret = written;
1066 }
9c1729db
AC
1067out:
1068 tty_write_unlock(tty);
1da177e4
LT
1069 return ret;
1070}
1071
95f9bfc6
AC
1072/**
1073 * tty_write_message - write a message to a certain tty, not just the console.
1074 * @tty: the destination tty_struct
1075 * @msg: the message to write
1076 *
1077 * This is used for messages that need to be redirected to a specific tty.
1078 * We don't put it into the syslog queue right now maybe in the future if
1079 * really needed.
1080 *
ec79d605 1081 * We must still hold the BTM and test the CLOSING flag for the moment.
95f9bfc6
AC
1082 */
1083
1084void tty_write_message(struct tty_struct *tty, char *msg)
1085{
95f9bfc6
AC
1086 if (tty) {
1087 mutex_lock(&tty->atomic_write_lock);
ec79d605 1088 tty_lock();
eeb89d91 1089 if (tty->ops->write && !test_bit(TTY_CLOSING, &tty->flags)) {
ec79d605 1090 tty_unlock();
95f9bfc6 1091 tty->ops->write(tty, msg, strlen(msg));
eeb89d91 1092 } else
ec79d605 1093 tty_unlock();
95f9bfc6
AC
1094 tty_write_unlock(tty);
1095 }
95f9bfc6
AC
1096 return;
1097}
1098
1da177e4 1099
af9b897e
AC
1100/**
1101 * tty_write - write method for tty device file
1102 * @file: tty file pointer
1103 * @buf: user data to write
1104 * @count: bytes to write
1105 * @ppos: unused
1106 *
1107 * Write data to a tty device via the line discipline.
1108 *
1109 * Locking:
1110 * Locks the line discipline as required
1111 * Writes to the tty driver are serialized by the atomic_write_lock
1112 * and are then processed in chunks to the device. The line discipline
a88a69c9 1113 * write method will not be invoked in parallel for each device.
af9b897e
AC
1114 */
1115
37bdfb07
AC
1116static ssize_t tty_write(struct file *file, const char __user *buf,
1117 size_t count, loff_t *ppos)
1da177e4 1118{
a7113a96 1119 struct inode *inode = file->f_path.dentry->d_inode;
d996b62a
NP
1120 struct tty_struct *tty = file_tty(file);
1121 struct tty_ldisc *ld;
1da177e4 1122 ssize_t ret;
37bdfb07 1123
1da177e4
LT
1124 if (tty_paranoia_check(tty, inode, "tty_write"))
1125 return -EIO;
f34d7a5b 1126 if (!tty || !tty->ops->write ||
37bdfb07
AC
1127 (test_bit(TTY_IO_ERROR, &tty->flags)))
1128 return -EIO;
f34d7a5b
AC
1129 /* Short term debug to catch buggy drivers */
1130 if (tty->ops->write_room == NULL)
1131 printk(KERN_ERR "tty driver %s lacks a write_room method.\n",
1132 tty->driver->name);
37bdfb07 1133 ld = tty_ldisc_ref_wait(tty);
a352def2 1134 if (!ld->ops->write)
1da177e4
LT
1135 ret = -EIO;
1136 else
a352def2 1137 ret = do_tty_write(ld->ops->write, tty, file, buf, count);
1da177e4
LT
1138 tty_ldisc_deref(ld);
1139 return ret;
1140}
1141
37bdfb07
AC
1142ssize_t redirected_tty_write(struct file *file, const char __user *buf,
1143 size_t count, loff_t *ppos)
1da177e4
LT
1144{
1145 struct file *p = NULL;
1146
1147 spin_lock(&redirect_lock);
1148 if (redirect) {
1149 get_file(redirect);
1150 p = redirect;
1151 }
1152 spin_unlock(&redirect_lock);
1153
1154 if (p) {
1155 ssize_t res;
1156 res = vfs_write(p, buf, count, &p->f_pos);
1157 fput(p);
1158 return res;
1159 }
1da177e4
LT
1160 return tty_write(file, buf, count, ppos);
1161}
1162
1163static char ptychar[] = "pqrstuvwxyzabcde";
1164
af9b897e
AC
1165/**
1166 * pty_line_name - generate name for a pty
1167 * @driver: the tty driver in use
1168 * @index: the minor number
1169 * @p: output buffer of at least 6 bytes
1170 *
1171 * Generate a name from a driver reference and write it to the output
1172 * buffer.
1173 *
1174 * Locking: None
1175 */
1176static void pty_line_name(struct tty_driver *driver, int index, char *p)
1da177e4
LT
1177{
1178 int i = index + driver->name_base;
1179 /* ->name is initialized to "ttyp", but "tty" is expected */
1180 sprintf(p, "%s%c%x",
37bdfb07
AC
1181 driver->subtype == PTY_TYPE_SLAVE ? "tty" : driver->name,
1182 ptychar[i >> 4 & 0xf], i & 0xf);
1da177e4
LT
1183}
1184
af9b897e 1185/**
8b0a88d5 1186 * tty_line_name - generate name for a tty
af9b897e
AC
1187 * @driver: the tty driver in use
1188 * @index: the minor number
1189 * @p: output buffer of at least 7 bytes
1190 *
1191 * Generate a name from a driver reference and write it to the output
1192 * buffer.
1193 *
1194 * Locking: None
1195 */
1196static void tty_line_name(struct tty_driver *driver, int index, char *p)
1da177e4
LT
1197{
1198 sprintf(p, "%s%d", driver->name, index + driver->name_base);
1199}
1200
99f1fe18
AC
1201/**
1202 * tty_driver_lookup_tty() - find an existing tty, if any
1203 * @driver: the driver for the tty
1204 * @idx: the minor number
23499705 1205 *
99f1fe18 1206 * Return the tty, if found or ERR_PTR() otherwise.
23499705 1207 *
99f1fe18
AC
1208 * Locking: tty_mutex must be held. If tty is found, the mutex must
1209 * be held until the 'fast-open' is also done. Will change once we
1210 * have refcounting in the driver and per driver locking
23499705 1211 */
a47d545f 1212static struct tty_struct *tty_driver_lookup_tty(struct tty_driver *driver,
15f1a633 1213 struct inode *inode, int idx)
23499705
SB
1214{
1215 struct tty_struct *tty;
1216
99f1fe18 1217 if (driver->ops->lookup)
15f1a633 1218 return driver->ops->lookup(driver, inode, idx);
23499705 1219
8b0a88d5 1220 tty = driver->ttys[idx];
23499705
SB
1221 return tty;
1222}
1223
bf970ee4
AC
1224/**
1225 * tty_init_termios - helper for termios setup
1226 * @tty: the tty to set up
1227 *
1228 * Initialise the termios structures for this tty. Thus runs under
1229 * the tty_mutex currently so we can be relaxed about ordering.
1230 */
1231
1232int tty_init_termios(struct tty_struct *tty)
1233{
fe6e29fd 1234 struct ktermios *tp;
bf970ee4
AC
1235 int idx = tty->index;
1236
1237 tp = tty->driver->termios[idx];
bf970ee4 1238 if (tp == NULL) {
fe6e29fd
AC
1239 tp = kzalloc(sizeof(struct ktermios[2]), GFP_KERNEL);
1240 if (tp == NULL)
bf970ee4 1241 return -ENOMEM;
bf970ee4
AC
1242 memcpy(tp, &tty->driver->init_termios,
1243 sizeof(struct ktermios));
1244 tty->driver->termios[idx] = tp;
bf970ee4
AC
1245 }
1246 tty->termios = tp;
fe6e29fd 1247 tty->termios_locked = tp + 1;
bf970ee4
AC
1248
1249 /* Compatibility until drivers always set this */
1250 tty->termios->c_ispeed = tty_termios_input_baud_rate(tty->termios);
1251 tty->termios->c_ospeed = tty_termios_baud_rate(tty->termios);
1252 return 0;
1253}
fe1ae7fd 1254EXPORT_SYMBOL_GPL(tty_init_termios);
bf970ee4 1255
99f1fe18 1256/**
8b0a88d5
AC
1257 * tty_driver_install_tty() - install a tty entry in the driver
1258 * @driver: the driver for the tty
1259 * @tty: the tty
1260 *
1261 * Install a tty object into the driver tables. The tty->index field
bf970ee4
AC
1262 * will be set by the time this is called. This method is responsible
1263 * for ensuring any need additional structures are allocated and
1264 * configured.
8b0a88d5
AC
1265 *
1266 * Locking: tty_mutex for now
1267 */
1268static int tty_driver_install_tty(struct tty_driver *driver,
1269 struct tty_struct *tty)
1270{
bf970ee4 1271 int idx = tty->index;
eeb89d91 1272 int ret;
bf970ee4 1273
eeb89d91 1274 if (driver->ops->install) {
eeb89d91 1275 ret = driver->ops->install(driver, tty);
eeb89d91
AC
1276 return ret;
1277 }
bf970ee4
AC
1278
1279 if (tty_init_termios(tty) == 0) {
1280 tty_driver_kref_get(driver);
1281 tty->count++;
1282 driver->ttys[idx] = tty;
1283 return 0;
1284 }
1285 return -ENOMEM;
8b0a88d5
AC
1286}
1287
1288/**
1289 * tty_driver_remove_tty() - remove a tty from the driver tables
1290 * @driver: the driver for the tty
1291 * @idx: the minor number
1292 *
1293 * Remvoe a tty object from the driver tables. The tty->index field
1294 * will be set by the time this is called.
1295 *
1296 * Locking: tty_mutex for now
1297 */
1298static void tty_driver_remove_tty(struct tty_driver *driver,
1299 struct tty_struct *tty)
1300{
1301 if (driver->ops->remove)
1302 driver->ops->remove(driver, tty);
1303 else
1304 driver->ttys[tty->index] = NULL;
1305}
1306
1307/*
1308 * tty_reopen() - fast re-open of an open tty
1309 * @tty - the tty to open
23499705 1310 *
99f1fe18 1311 * Return 0 on success, -errno on error.
23499705 1312 *
99f1fe18
AC
1313 * Locking: tty_mutex must be held from the time the tty was found
1314 * till this open completes.
23499705 1315 */
99f1fe18 1316static int tty_reopen(struct tty_struct *tty)
23499705
SB
1317{
1318 struct tty_driver *driver = tty->driver;
1319
e2efafbf 1320 if (test_bit(TTY_CLOSING, &tty->flags) ||
acfa747b 1321 test_bit(TTY_HUPPING, &tty->flags) ||
e2efafbf 1322 test_bit(TTY_LDISC_CHANGING, &tty->flags))
23499705
SB
1323 return -EIO;
1324
1325 if (driver->type == TTY_DRIVER_TYPE_PTY &&
1326 driver->subtype == PTY_TYPE_MASTER) {
1327 /*
1328 * special case for PTY masters: only one open permitted,
1329 * and the slave side open count is incremented as well.
1330 */
1331 if (tty->count)
1332 return -EIO;
1333
1334 tty->link->count++;
1335 }
1336 tty->count++;
1337 tty->driver = driver; /* N.B. why do this every time?? */
1338
1aa4bed8 1339 mutex_lock(&tty->ldisc_mutex);
99f1fe18 1340 WARN_ON(!test_bit(TTY_LDISC, &tty->flags));
1aa4bed8 1341 mutex_unlock(&tty->ldisc_mutex);
23499705
SB
1342
1343 return 0;
1344}
1345
af9b897e 1346/**
d81ed103 1347 * tty_init_dev - initialise a tty device
af9b897e
AC
1348 * @driver: tty driver we are opening a device on
1349 * @idx: device index
15582d36
AC
1350 * @ret_tty: returned tty structure
1351 * @first_ok: ok to open a new device (used by ptmx)
af9b897e
AC
1352 *
1353 * Prepare a tty device. This may not be a "new" clean device but
1354 * could also be an active device. The pty drivers require special
1355 * handling because of this.
1356 *
1357 * Locking:
1358 * The function is called under the tty_mutex, which
1359 * protects us from the tty struct or driver itself going away.
1360 *
1361 * On exit the tty device has the line discipline attached and
1362 * a reference count of 1. If a pair was created for pty/tty use
1363 * and the other was a pty master then it too has a reference count of 1.
1364 *
1da177e4 1365 * WSH 06/09/97: Rewritten to remove races and properly clean up after a
70522e12
IM
1366 * failed open. The new code protects the open with a mutex, so it's
1367 * really quite straightforward. The mutex locking can probably be
1da177e4
LT
1368 * relaxed for the (most common) case of reopening a tty.
1369 */
af9b897e 1370
73ec06fc
AC
1371struct tty_struct *tty_init_dev(struct tty_driver *driver, int idx,
1372 int first_ok)
1da177e4 1373{
bf970ee4 1374 struct tty_struct *tty;
73ec06fc 1375 int retval;
1da177e4 1376
23499705 1377 /* Check if pty master is being opened multiple times */
15582d36 1378 if (driver->subtype == PTY_TYPE_MASTER &&
eeb89d91 1379 (driver->flags & TTY_DRIVER_DEVPTS_MEM) && !first_ok) {
73ec06fc 1380 return ERR_PTR(-EIO);
eeb89d91 1381 }
73ec06fc 1382
1da177e4
LT
1383 /*
1384 * First time open is complex, especially for PTY devices.
1385 * This code guarantees that either everything succeeds and the
1386 * TTY is ready for operation, or else the table slots are vacated
37bdfb07 1387 * and the allocated memory released. (Except that the termios
1da177e4
LT
1388 * and locked termios may be retained.)
1389 */
1390
73ec06fc
AC
1391 if (!try_module_get(driver->owner))
1392 return ERR_PTR(-ENODEV);
1da177e4 1393
1da177e4 1394 tty = alloc_tty_struct();
d5543503
JS
1395 if (!tty) {
1396 retval = -ENOMEM;
1397 goto err_module_put;
1398 }
bf970ee4 1399 initialize_tty_struct(tty, driver, idx);
1da177e4 1400
73ec06fc 1401 retval = tty_driver_install_tty(driver, tty);
d5543503 1402 if (retval < 0)
a9dccddb 1403 goto err_deinit_tty;
8b0a88d5 1404
37bdfb07 1405 /*
1da177e4 1406 * Structures all installed ... call the ldisc open routines.
d5698c28
CH
1407 * If we fail here just call release_tty to clean up. No need
1408 * to decrement the use counts, as release_tty doesn't care.
1da177e4 1409 */
bf970ee4 1410 retval = tty_ldisc_setup(tty, tty->link);
01e1abb2 1411 if (retval)
d5543503 1412 goto err_release_tty;
73ec06fc 1413 return tty;
1da177e4 1414
a9dccddb
JS
1415err_deinit_tty:
1416 deinitialize_tty_struct(tty);
d5543503
JS
1417 free_tty_struct(tty);
1418err_module_put:
1da177e4 1419 module_put(driver->owner);
d5543503 1420 return ERR_PTR(retval);
1da177e4 1421
d5698c28 1422 /* call the tty release_tty routine to clean out this slot */
d5543503 1423err_release_tty:
5a3c6b25 1424 printk_ratelimited(KERN_INFO "tty_init_dev: ldisc open failed, "
4050914f 1425 "clearing slot %d\n", idx);
d5698c28 1426 release_tty(tty, idx);
73ec06fc 1427 return ERR_PTR(retval);
1da177e4
LT
1428}
1429
feebed65
AC
1430void tty_free_termios(struct tty_struct *tty)
1431{
1432 struct ktermios *tp;
1433 int idx = tty->index;
1434 /* Kill this flag and push into drivers for locking etc */
1435 if (tty->driver->flags & TTY_DRIVER_RESET_TERMIOS) {
1436 /* FIXME: Locking on ->termios array */
1437 tp = tty->termios;
1438 tty->driver->termios[idx] = NULL;
1439 kfree(tp);
feebed65
AC
1440 }
1441}
1442EXPORT_SYMBOL(tty_free_termios);
1443
1444void tty_shutdown(struct tty_struct *tty)
1445{
8b0a88d5 1446 tty_driver_remove_tty(tty->driver, tty);
feebed65
AC
1447 tty_free_termios(tty);
1448}
1449EXPORT_SYMBOL(tty_shutdown);
1450
af9b897e 1451/**
d5698c28 1452 * release_one_tty - release tty structure memory
9c9f4ded 1453 * @kref: kref of tty we are obliterating
af9b897e
AC
1454 *
1455 * Releases memory associated with a tty structure, and clears out the
1456 * driver table slots. This function is called when a device is no longer
1457 * in use. It also gets called when setup of a device fails.
1458 *
1459 * Locking:
1460 * tty_mutex - sometimes only
1461 * takes the file list lock internally when working on the list
1462 * of ttys that the driver keeps.
b50989dc
AC
1463 *
1464 * This method gets called from a work queue so that the driver private
f278a2f7 1465 * cleanup ops can sleep (needed for USB at least)
1da177e4 1466 */
b50989dc 1467static void release_one_tty(struct work_struct *work)
1da177e4 1468{
b50989dc
AC
1469 struct tty_struct *tty =
1470 container_of(work, struct tty_struct, hangup_work);
6f967f78 1471 struct tty_driver *driver = tty->driver;
d5698c28 1472
f278a2f7
DY
1473 if (tty->ops->cleanup)
1474 tty->ops->cleanup(tty);
1475
1da177e4 1476 tty->magic = 0;
7d7b93c1 1477 tty_driver_kref_put(driver);
6f967f78 1478 module_put(driver->owner);
d5698c28 1479
ee2ffa0d 1480 spin_lock(&tty_files_lock);
1da177e4 1481 list_del_init(&tty->tty_files);
ee2ffa0d 1482 spin_unlock(&tty_files_lock);
d5698c28 1483
6da8d866
ON
1484 put_pid(tty->pgrp);
1485 put_pid(tty->session);
1da177e4
LT
1486 free_tty_struct(tty);
1487}
1488
b50989dc
AC
1489static void queue_release_one_tty(struct kref *kref)
1490{
1491 struct tty_struct *tty = container_of(kref, struct tty_struct, kref);
f278a2f7
DY
1492
1493 if (tty->ops->shutdown)
1494 tty->ops->shutdown(tty);
1495 else
1496 tty_shutdown(tty);
1497
b50989dc
AC
1498 /* The hangup queue is now free so we can reuse it rather than
1499 waste a chunk of memory for each port */
1500 INIT_WORK(&tty->hangup_work, release_one_tty);
1501 schedule_work(&tty->hangup_work);
1502}
1503
9c9f4ded
AC
1504/**
1505 * tty_kref_put - release a tty kref
1506 * @tty: tty device
1507 *
1508 * Release a reference to a tty device and if need be let the kref
1509 * layer destruct the object for us
1510 */
1511
1512void tty_kref_put(struct tty_struct *tty)
1513{
1514 if (tty)
b50989dc 1515 kref_put(&tty->kref, queue_release_one_tty);
9c9f4ded
AC
1516}
1517EXPORT_SYMBOL(tty_kref_put);
1518
d5698c28
CH
1519/**
1520 * release_tty - release tty structure memory
1521 *
1522 * Release both @tty and a possible linked partner (think pty pair),
1523 * and decrement the refcount of the backing module.
1524 *
1525 * Locking:
1526 * tty_mutex - sometimes only
1527 * takes the file list lock internally when working on the list
1528 * of ttys that the driver keeps.
1529 * FIXME: should we require tty_mutex is held here ??
9c9f4ded 1530 *
d5698c28
CH
1531 */
1532static void release_tty(struct tty_struct *tty, int idx)
1533{
9c9f4ded
AC
1534 /* This should always be true but check for the moment */
1535 WARN_ON(tty->index != idx);
1536
d5698c28 1537 if (tty->link)
9c9f4ded
AC
1538 tty_kref_put(tty->link);
1539 tty_kref_put(tty);
d5698c28
CH
1540}
1541
eeb89d91
AC
1542/**
1543 * tty_release - vfs callback for close
1544 * @inode: inode of tty
1545 * @filp: file pointer for handle to tty
1546 *
1547 * Called the last time each file handle is closed that references
1548 * this tty. There may however be several such references.
1549 *
1550 * Locking:
1551 * Takes bkl. See tty_release_dev
1552 *
1da177e4
LT
1553 * Even releasing the tty structures is a tricky business.. We have
1554 * to be very careful that the structures are all released at the
1555 * same time, as interrupts might otherwise get the wrong pointers.
1556 *
1557 * WSH 09/09/97: rewritten to avoid some nasty race conditions that could
1558 * lead to double frees or releasing memory still in use.
1559 */
eeb89d91
AC
1560
1561int tty_release(struct inode *inode, struct file *filp)
1da177e4 1562{
d996b62a
NP
1563 struct tty_struct *tty = file_tty(filp);
1564 struct tty_struct *o_tty;
1da177e4 1565 int pty_master, tty_closing, o_tty_closing, do_sleep;
14a6283e 1566 int devpts;
1da177e4
LT
1567 int idx;
1568 char buf[64];
37bdfb07 1569
15f1a633 1570 if (tty_paranoia_check(tty, inode, "tty_release_dev"))
eeb89d91 1571 return 0;
1da177e4 1572
ec79d605 1573 tty_lock();
d81ed103 1574 check_tty_count(tty, "tty_release_dev");
1da177e4 1575
ec79d605 1576 __tty_fasync(-1, filp, 0);
1da177e4
LT
1577
1578 idx = tty->index;
1579 pty_master = (tty->driver->type == TTY_DRIVER_TYPE_PTY &&
1580 tty->driver->subtype == PTY_TYPE_MASTER);
1581 devpts = (tty->driver->flags & TTY_DRIVER_DEVPTS_MEM) != 0;
1da177e4
LT
1582 o_tty = tty->link;
1583
1584#ifdef TTY_PARANOIA_CHECK
1585 if (idx < 0 || idx >= tty->driver->num) {
d81ed103 1586 printk(KERN_DEBUG "tty_release_dev: bad idx when trying to "
1da177e4 1587 "free (%s)\n", tty->name);
ec79d605 1588 tty_unlock();
eeb89d91 1589 return 0;
1da177e4 1590 }
8b0a88d5 1591 if (!devpts) {
1da177e4 1592 if (tty != tty->driver->ttys[idx]) {
ec79d605 1593 tty_unlock();
d81ed103 1594 printk(KERN_DEBUG "tty_release_dev: driver.table[%d] not tty "
1da177e4 1595 "for (%s)\n", idx, tty->name);
eeb89d91 1596 return 0;
1da177e4
LT
1597 }
1598 if (tty->termios != tty->driver->termios[idx]) {
ec79d605 1599 tty_unlock();
d81ed103 1600 printk(KERN_DEBUG "tty_release_dev: driver.termios[%d] not termios "
1da177e4
LT
1601 "for (%s)\n",
1602 idx, tty->name);
eeb89d91 1603 return 0;
1da177e4 1604 }
1da177e4
LT
1605 }
1606#endif
1607
1608#ifdef TTY_DEBUG_HANGUP
d81ed103 1609 printk(KERN_DEBUG "tty_release_dev of %s (tty count=%d)...",
1da177e4
LT
1610 tty_name(tty, buf), tty->count);
1611#endif
1612
1613#ifdef TTY_PARANOIA_CHECK
1614 if (tty->driver->other &&
1615 !(tty->driver->flags & TTY_DRIVER_DEVPTS_MEM)) {
1616 if (o_tty != tty->driver->other->ttys[idx]) {
ec79d605 1617 tty_unlock();
d81ed103 1618 printk(KERN_DEBUG "tty_release_dev: other->table[%d] "
1da177e4
LT
1619 "not o_tty for (%s)\n",
1620 idx, tty->name);
eeb89d91 1621 return 0 ;
1da177e4
LT
1622 }
1623 if (o_tty->termios != tty->driver->other->termios[idx]) {
ec79d605 1624 tty_unlock();
d81ed103 1625 printk(KERN_DEBUG "tty_release_dev: other->termios[%d] "
1da177e4
LT
1626 "not o_termios for (%s)\n",
1627 idx, tty->name);
eeb89d91 1628 return 0;
1da177e4 1629 }
1da177e4 1630 if (o_tty->link != tty) {
ec79d605 1631 tty_unlock();
d81ed103 1632 printk(KERN_DEBUG "tty_release_dev: bad pty pointers\n");
eeb89d91 1633 return 0;
1da177e4
LT
1634 }
1635 }
1636#endif
f34d7a5b
AC
1637 if (tty->ops->close)
1638 tty->ops->close(tty, filp);
1da177e4 1639
ec79d605 1640 tty_unlock();
1da177e4
LT
1641 /*
1642 * Sanity check: if tty->count is going to zero, there shouldn't be
1643 * any waiters on tty->read_wait or tty->write_wait. We test the
1644 * wait queues and kick everyone out _before_ actually starting to
1645 * close. This ensures that we won't block while releasing the tty
1646 * structure.
1647 *
1648 * The test for the o_tty closing is necessary, since the master and
1649 * slave sides may close in any order. If the slave side closes out
1650 * first, its count will be one, since the master side holds an open.
1651 * Thus this test wouldn't be triggered at the time the slave closes,
1652 * so we do it now.
1653 *
1654 * Note that it's possible for the tty to be opened again while we're
1655 * flushing out waiters. By recalculating the closing flags before
1656 * each iteration we avoid any problems.
1657 */
1658 while (1) {
1659 /* Guard against races with tty->count changes elsewhere and
1660 opens on /dev/tty */
37bdfb07 1661
70522e12 1662 mutex_lock(&tty_mutex);
ec79d605 1663 tty_lock();
1da177e4
LT
1664 tty_closing = tty->count <= 1;
1665 o_tty_closing = o_tty &&
1666 (o_tty->count <= (pty_master ? 1 : 0));
1da177e4
LT
1667 do_sleep = 0;
1668
1669 if (tty_closing) {
1670 if (waitqueue_active(&tty->read_wait)) {
4b19449d 1671 wake_up_poll(&tty->read_wait, POLLIN);
1da177e4
LT
1672 do_sleep++;
1673 }
1674 if (waitqueue_active(&tty->write_wait)) {
4b19449d 1675 wake_up_poll(&tty->write_wait, POLLOUT);
1da177e4
LT
1676 do_sleep++;
1677 }
1678 }
1679 if (o_tty_closing) {
1680 if (waitqueue_active(&o_tty->read_wait)) {
4b19449d 1681 wake_up_poll(&o_tty->read_wait, POLLIN);
1da177e4
LT
1682 do_sleep++;
1683 }
1684 if (waitqueue_active(&o_tty->write_wait)) {
4b19449d 1685 wake_up_poll(&o_tty->write_wait, POLLOUT);
1da177e4
LT
1686 do_sleep++;
1687 }
1688 }
1689 if (!do_sleep)
1690 break;
1691
d81ed103 1692 printk(KERN_WARNING "tty_release_dev: %s: read/write wait queue "
1da177e4 1693 "active!\n", tty_name(tty, buf));
ec79d605 1694 tty_unlock();
70522e12 1695 mutex_unlock(&tty_mutex);
1da177e4 1696 schedule();
37bdfb07 1697 }
1da177e4
LT
1698
1699 /*
37bdfb07
AC
1700 * The closing flags are now consistent with the open counts on
1701 * both sides, and we've completed the last operation that could
1da177e4
LT
1702 * block, so it's safe to proceed with closing.
1703 */
1da177e4
LT
1704 if (pty_master) {
1705 if (--o_tty->count < 0) {
d81ed103 1706 printk(KERN_WARNING "tty_release_dev: bad pty slave count "
1da177e4
LT
1707 "(%d) for %s\n",
1708 o_tty->count, tty_name(o_tty, buf));
1709 o_tty->count = 0;
1710 }
1711 }
1712 if (--tty->count < 0) {
d81ed103 1713 printk(KERN_WARNING "tty_release_dev: bad tty->count (%d) for %s\n",
1da177e4
LT
1714 tty->count, tty_name(tty, buf));
1715 tty->count = 0;
1716 }
37bdfb07 1717
1da177e4
LT
1718 /*
1719 * We've decremented tty->count, so we need to remove this file
1720 * descriptor off the tty->tty_files list; this serves two
1721 * purposes:
1722 * - check_tty_count sees the correct number of file descriptors
1723 * associated with this tty.
1724 * - do_tty_hangup no longer sees this file descriptor as
1725 * something that needs to be handled for hangups.
1726 */
d996b62a 1727 tty_del_file(filp);
1da177e4
LT
1728
1729 /*
1730 * Perform some housekeeping before deciding whether to return.
1731 *
1732 * Set the TTY_CLOSING flag if this was the last open. In the
1733 * case of a pty we may have to wait around for the other side
1734 * to close, and TTY_CLOSING makes sure we can't be reopened.
1735 */
37bdfb07 1736 if (tty_closing)
1da177e4 1737 set_bit(TTY_CLOSING, &tty->flags);
37bdfb07 1738 if (o_tty_closing)
1da177e4
LT
1739 set_bit(TTY_CLOSING, &o_tty->flags);
1740
1741 /*
1742 * If _either_ side is closing, make sure there aren't any
1743 * processes that still think tty or o_tty is their controlling
1744 * tty.
1745 */
1746 if (tty_closing || o_tty_closing) {
1da177e4 1747 read_lock(&tasklist_lock);
24ec839c 1748 session_clear_tty(tty->session);
1da177e4 1749 if (o_tty)
24ec839c 1750 session_clear_tty(o_tty->session);
1da177e4
LT
1751 read_unlock(&tasklist_lock);
1752 }
1753
70522e12 1754 mutex_unlock(&tty_mutex);
da965822 1755
1da177e4 1756 /* check whether both sides are closing ... */
eeb89d91 1757 if (!tty_closing || (o_tty && !o_tty_closing)) {
ec79d605 1758 tty_unlock();
eeb89d91
AC
1759 return 0;
1760 }
37bdfb07 1761
1da177e4
LT
1762#ifdef TTY_DEBUG_HANGUP
1763 printk(KERN_DEBUG "freeing tty structure...");
1764#endif
1765 /*
01e1abb2 1766 * Ask the line discipline code to release its structures
1da177e4 1767 */
01e1abb2 1768 tty_ldisc_release(tty, o_tty);
1da177e4 1769 /*
d5698c28 1770 * The release_tty function takes care of the details of clearing
1da177e4
LT
1771 * the slots and preserving the termios structure.
1772 */
d5698c28 1773 release_tty(tty, idx);
1da177e4 1774
1da177e4 1775 /* Make this pty number available for reallocation */
718a9163 1776 if (devpts)
15f1a633 1777 devpts_kill_index(inode, idx);
ec79d605 1778 tty_unlock();
eeb89d91 1779 return 0;
1da177e4
LT
1780}
1781
af9b897e 1782/**
eeb89d91 1783 * tty_open - open a tty device
af9b897e
AC
1784 * @inode: inode of device file
1785 * @filp: file pointer to tty
1da177e4 1786 *
af9b897e
AC
1787 * tty_open and tty_release keep up the tty count that contains the
1788 * number of opens done on a tty. We cannot use the inode-count, as
1789 * different inodes might point to the same tty.
1da177e4 1790 *
af9b897e
AC
1791 * Open-counting is needed for pty masters, as well as for keeping
1792 * track of serial lines: DTR is dropped when the last close happens.
1793 * (This is not done solely through tty->count, now. - Ted 1/27/92)
1794 *
1795 * The termios state of a pty is reset on first open so that
1796 * settings don't persist across reuse.
1797 *
d81ed103 1798 * Locking: tty_mutex protects tty, get_tty_driver and tty_init_dev work.
24ec839c
PZ
1799 * tty->count should protect the rest.
1800 * ->siglock protects ->signal/->sighand
1da177e4 1801 */
af9b897e 1802
eeb89d91 1803static int tty_open(struct inode *inode, struct file *filp)
1da177e4 1804{
4a2b5fdd 1805 struct tty_struct *tty = NULL;
1da177e4
LT
1806 int noctty, retval;
1807 struct tty_driver *driver;
1808 int index;
1809 dev_t device = inode->i_rdev;
846c151a 1810 unsigned saved_flags = filp->f_flags;
1da177e4
LT
1811
1812 nonseekable_open(inode, filp);
37bdfb07 1813
1da177e4
LT
1814retry_open:
1815 noctty = filp->f_flags & O_NOCTTY;
1816 index = -1;
1817 retval = 0;
37bdfb07 1818
70522e12 1819 mutex_lock(&tty_mutex);
ec79d605 1820 tty_lock();
1da177e4 1821
37bdfb07 1822 if (device == MKDEV(TTYAUX_MAJOR, 0)) {
24ec839c
PZ
1823 tty = get_current_tty();
1824 if (!tty) {
ec79d605 1825 tty_unlock();
70522e12 1826 mutex_unlock(&tty_mutex);
1da177e4
LT
1827 return -ENXIO;
1828 }
7d7b93c1 1829 driver = tty_driver_kref_get(tty->driver);
24ec839c 1830 index = tty->index;
1da177e4
LT
1831 filp->f_flags |= O_NONBLOCK; /* Don't let /dev/tty block */
1832 /* noctty = 1; */
452a00d2
AC
1833 /* FIXME: Should we take a driver reference ? */
1834 tty_kref_put(tty);
1da177e4
LT
1835 goto got_driver;
1836 }
1837#ifdef CONFIG_VT
37bdfb07 1838 if (device == MKDEV(TTY_MAJOR, 0)) {
1da177e4 1839 extern struct tty_driver *console_driver;
7d7b93c1 1840 driver = tty_driver_kref_get(console_driver);
1da177e4
LT
1841 index = fg_console;
1842 noctty = 1;
1843 goto got_driver;
1844 }
1845#endif
37bdfb07 1846 if (device == MKDEV(TTYAUX_MAJOR, 1)) {
296fa7f6
WN
1847 struct tty_driver *console_driver = console_device(&index);
1848 if (console_driver) {
1849 driver = tty_driver_kref_get(console_driver);
1850 if (driver) {
1851 /* Don't let /dev/console block */
1852 filp->f_flags |= O_NONBLOCK;
1853 noctty = 1;
1854 goto got_driver;
1855 }
1da177e4 1856 }
ec79d605 1857 tty_unlock();
70522e12 1858 mutex_unlock(&tty_mutex);
1da177e4
LT
1859 return -ENODEV;
1860 }
1861
1862 driver = get_tty_driver(device, &index);
1863 if (!driver) {
ec79d605 1864 tty_unlock();
70522e12 1865 mutex_unlock(&tty_mutex);
1da177e4
LT
1866 return -ENODEV;
1867 }
1868got_driver:
4a2b5fdd
SB
1869 if (!tty) {
1870 /* check whether we're reopening an existing tty */
15f1a633 1871 tty = tty_driver_lookup_tty(driver, inode, index);
4a2b5fdd 1872
808ffa3d 1873 if (IS_ERR(tty)) {
ec79d605 1874 tty_unlock();
808ffa3d 1875 mutex_unlock(&tty_mutex);
c290f835 1876 tty_driver_kref_put(driver);
4a2b5fdd 1877 return PTR_ERR(tty);
808ffa3d 1878 }
4a2b5fdd
SB
1879 }
1880
1881 if (tty) {
1882 retval = tty_reopen(tty);
1883 if (retval)
1884 tty = ERR_PTR(retval);
1885 } else
1886 tty = tty_init_dev(driver, index, 0);
1887
70522e12 1888 mutex_unlock(&tty_mutex);
7d7b93c1 1889 tty_driver_kref_put(driver);
eeb89d91 1890 if (IS_ERR(tty)) {
ec79d605 1891 tty_unlock();
73ec06fc 1892 return PTR_ERR(tty);
eeb89d91 1893 }
1da177e4 1894
f573bd17
PE
1895 retval = tty_add_file(tty, filp);
1896 if (retval) {
1897 tty_unlock();
0259894c 1898 tty_release(inode, filp);
f573bd17
PE
1899 return retval;
1900 }
d996b62a 1901
1da177e4
LT
1902 check_tty_count(tty, "tty_open");
1903 if (tty->driver->type == TTY_DRIVER_TYPE_PTY &&
1904 tty->driver->subtype == PTY_TYPE_MASTER)
1905 noctty = 1;
1906#ifdef TTY_DEBUG_HANGUP
1907 printk(KERN_DEBUG "opening %s...", tty->name);
1908#endif
909bc774
HRK
1909 if (tty->ops->open)
1910 retval = tty->ops->open(tty, filp);
1911 else
1912 retval = -ENODEV;
1da177e4
LT
1913 filp->f_flags = saved_flags;
1914
37bdfb07
AC
1915 if (!retval && test_bit(TTY_EXCLUSIVE, &tty->flags) &&
1916 !capable(CAP_SYS_ADMIN))
1da177e4
LT
1917 retval = -EBUSY;
1918
1919 if (retval) {
1920#ifdef TTY_DEBUG_HANGUP
1921 printk(KERN_DEBUG "error %d in opening %s...", retval,
1922 tty->name);
1923#endif
64ba3dc3 1924 tty_unlock(); /* need to call tty_release without BTM */
eeb89d91 1925 tty_release(inode, filp);
64ba3dc3 1926 if (retval != -ERESTARTSYS)
1da177e4 1927 return retval;
64ba3dc3
AB
1928
1929 if (signal_pending(current))
1da177e4 1930 return retval;
64ba3dc3 1931
1da177e4
LT
1932 schedule();
1933 /*
1934 * Need to reset f_op in case a hangup happened.
1935 */
64ba3dc3 1936 tty_lock();
1da177e4
LT
1937 if (filp->f_op == &hung_up_tty_fops)
1938 filp->f_op = &tty_fops;
ec79d605 1939 tty_unlock();
1da177e4
LT
1940 goto retry_open;
1941 }
ec79d605 1942 tty_unlock();
eeb89d91 1943
24ec839c
PZ
1944
1945 mutex_lock(&tty_mutex);
ec79d605 1946 tty_lock();
24ec839c 1947 spin_lock_irq(&current->sighand->siglock);
1da177e4
LT
1948 if (!noctty &&
1949 current->signal->leader &&
1950 !current->signal->tty &&
ab521dc0 1951 tty->session == NULL)
2a65f1d9 1952 __proc_set_tty(current, tty);
24ec839c 1953 spin_unlock_irq(&current->sighand->siglock);
ec79d605 1954 tty_unlock();
24ec839c 1955 mutex_unlock(&tty_mutex);
1da177e4
LT
1956 return 0;
1957}
1958
39d95b9d
JC
1959
1960
af9b897e
AC
1961/**
1962 * tty_poll - check tty status
1963 * @filp: file being polled
1964 * @wait: poll wait structures to update
1965 *
1966 * Call the line discipline polling method to obtain the poll
1967 * status of the device.
1968 *
1969 * Locking: locks called line discipline but ldisc poll method
1970 * may be re-entered freely by other callers.
1971 */
1972
37bdfb07 1973static unsigned int tty_poll(struct file *filp, poll_table *wait)
1da177e4 1974{
d996b62a 1975 struct tty_struct *tty = file_tty(filp);
1da177e4
LT
1976 struct tty_ldisc *ld;
1977 int ret = 0;
1978
a7113a96 1979 if (tty_paranoia_check(tty, filp->f_path.dentry->d_inode, "tty_poll"))
1da177e4 1980 return 0;
37bdfb07 1981
1da177e4 1982 ld = tty_ldisc_ref_wait(tty);
a352def2
AC
1983 if (ld->ops->poll)
1984 ret = (ld->ops->poll)(tty, filp, wait);
1da177e4
LT
1985 tty_ldisc_deref(ld);
1986 return ret;
1987}
1988
ec79d605 1989static int __tty_fasync(int fd, struct file *filp, int on)
1da177e4 1990{
d996b62a 1991 struct tty_struct *tty = file_tty(filp);
47f86834 1992 unsigned long flags;
5d1e3230 1993 int retval = 0;
1da177e4 1994
a7113a96 1995 if (tty_paranoia_check(tty, filp->f_path.dentry->d_inode, "tty_fasync"))
5d1e3230 1996 goto out;
37bdfb07 1997
1da177e4
LT
1998 retval = fasync_helper(fd, filp, on, &tty->fasync);
1999 if (retval <= 0)
5d1e3230 2000 goto out;
1da177e4
LT
2001
2002 if (on) {
ab521dc0
EB
2003 enum pid_type type;
2004 struct pid *pid;
1da177e4
LT
2005 if (!waitqueue_active(&tty->read_wait))
2006 tty->minimum_to_wake = 1;
47f86834 2007 spin_lock_irqsave(&tty->ctrl_lock, flags);
ab521dc0
EB
2008 if (tty->pgrp) {
2009 pid = tty->pgrp;
2010 type = PIDTYPE_PGID;
2011 } else {
2012 pid = task_pid(current);
2013 type = PIDTYPE_PID;
2014 }
80e1e823 2015 get_pid(pid);
70362511 2016 spin_unlock_irqrestore(&tty->ctrl_lock, flags);
80e1e823
LT
2017 retval = __f_setown(filp, pid, type, 0);
2018 put_pid(pid);
1da177e4 2019 if (retval)
5d1e3230 2020 goto out;
1da177e4
LT
2021 } else {
2022 if (!tty->fasync && !waitqueue_active(&tty->read_wait))
2023 tty->minimum_to_wake = N_TTY_BUF_SIZE;
2024 }
5d1e3230
JC
2025 retval = 0;
2026out:
ec79d605
AB
2027 return retval;
2028}
2029
2030static int tty_fasync(int fd, struct file *filp, int on)
2031{
2032 int retval;
2033 tty_lock();
2034 retval = __tty_fasync(fd, filp, on);
2035 tty_unlock();
5d1e3230 2036 return retval;
1da177e4
LT
2037}
2038
af9b897e
AC
2039/**
2040 * tiocsti - fake input character
2041 * @tty: tty to fake input into
2042 * @p: pointer to character
2043 *
3a4fa0a2 2044 * Fake input to a tty device. Does the necessary locking and
af9b897e
AC
2045 * input management.
2046 *
2047 * FIXME: does not honour flow control ??
2048 *
2049 * Locking:
2050 * Called functions take tty_ldisc_lock
2051 * current->signal->tty check is safe without locks
28298232
AC
2052 *
2053 * FIXME: may race normal receive processing
af9b897e
AC
2054 */
2055
1da177e4
LT
2056static int tiocsti(struct tty_struct *tty, char __user *p)
2057{
2058 char ch, mbz = 0;
2059 struct tty_ldisc *ld;
37bdfb07 2060
1da177e4
LT
2061 if ((current->signal->tty != tty) && !capable(CAP_SYS_ADMIN))
2062 return -EPERM;
2063 if (get_user(ch, p))
2064 return -EFAULT;
1e641743 2065 tty_audit_tiocsti(tty, ch);
1da177e4 2066 ld = tty_ldisc_ref_wait(tty);
a352def2 2067 ld->ops->receive_buf(tty, &ch, &mbz, 1);
1da177e4
LT
2068 tty_ldisc_deref(ld);
2069 return 0;
2070}
2071
af9b897e
AC
2072/**
2073 * tiocgwinsz - implement window query ioctl
2074 * @tty; tty
2075 * @arg: user buffer for result
2076 *
808a0d38 2077 * Copies the kernel idea of the window size into the user buffer.
af9b897e 2078 *
24ec839c 2079 * Locking: tty->termios_mutex is taken to ensure the winsize data
808a0d38 2080 * is consistent.
af9b897e
AC
2081 */
2082
37bdfb07 2083static int tiocgwinsz(struct tty_struct *tty, struct winsize __user *arg)
1da177e4 2084{
808a0d38
AC
2085 int err;
2086
5785c95b 2087 mutex_lock(&tty->termios_mutex);
808a0d38 2088 err = copy_to_user(arg, &tty->winsize, sizeof(*arg));
5785c95b 2089 mutex_unlock(&tty->termios_mutex);
808a0d38
AC
2090
2091 return err ? -EFAULT: 0;
1da177e4
LT
2092}
2093
af9b897e 2094/**
8c9a9dd0
AC
2095 * tty_do_resize - resize event
2096 * @tty: tty being resized
8c9a9dd0
AC
2097 * @rows: rows (character)
2098 * @cols: cols (character)
2099 *
3ad2f3fb 2100 * Update the termios variables and send the necessary signals to
8c9a9dd0 2101 * peform a terminal resize correctly
af9b897e
AC
2102 */
2103
fc6f6238 2104int tty_do_resize(struct tty_struct *tty, struct winsize *ws)
1da177e4 2105{
fc6f6238 2106 struct pid *pgrp;
47f86834 2107 unsigned long flags;
1da177e4 2108
fc6f6238
AC
2109 /* Lock the tty */
2110 mutex_lock(&tty->termios_mutex);
2111 if (!memcmp(ws, &tty->winsize, sizeof(*ws)))
ca9bda00 2112 goto done;
47f86834
AC
2113 /* Get the PID values and reference them so we can
2114 avoid holding the tty ctrl lock while sending signals */
2115 spin_lock_irqsave(&tty->ctrl_lock, flags);
2116 pgrp = get_pid(tty->pgrp);
47f86834
AC
2117 spin_unlock_irqrestore(&tty->ctrl_lock, flags);
2118
2119 if (pgrp)
2120 kill_pgrp(pgrp, SIGWINCH, 1);
47f86834 2121 put_pid(pgrp);
47f86834 2122
8c9a9dd0 2123 tty->winsize = *ws;
ca9bda00 2124done:
fc6f6238 2125 mutex_unlock(&tty->termios_mutex);
1da177e4
LT
2126 return 0;
2127}
2128
8c9a9dd0
AC
2129/**
2130 * tiocswinsz - implement window size set ioctl
fc6f6238 2131 * @tty; tty side of tty
8c9a9dd0
AC
2132 * @arg: user buffer for result
2133 *
2134 * Copies the user idea of the window size to the kernel. Traditionally
2135 * this is just advisory information but for the Linux console it
2136 * actually has driver level meaning and triggers a VC resize.
2137 *
2138 * Locking:
25985edc 2139 * Driver dependent. The default do_resize method takes the
8c9a9dd0
AC
2140 * tty termios mutex and ctrl_lock. The console takes its own lock
2141 * then calls into the default method.
2142 */
2143
fc6f6238 2144static int tiocswinsz(struct tty_struct *tty, struct winsize __user *arg)
8c9a9dd0
AC
2145{
2146 struct winsize tmp_ws;
2147 if (copy_from_user(&tmp_ws, arg, sizeof(*arg)))
2148 return -EFAULT;
2149
2150 if (tty->ops->resize)
fc6f6238 2151 return tty->ops->resize(tty, &tmp_ws);
8c9a9dd0 2152 else
fc6f6238 2153 return tty_do_resize(tty, &tmp_ws);
8c9a9dd0
AC
2154}
2155
af9b897e
AC
2156/**
2157 * tioccons - allow admin to move logical console
2158 * @file: the file to become console
2159 *
25985edc 2160 * Allow the administrator to move the redirected console device
af9b897e
AC
2161 *
2162 * Locking: uses redirect_lock to guard the redirect information
2163 */
2164
1da177e4
LT
2165static int tioccons(struct file *file)
2166{
2167 if (!capable(CAP_SYS_ADMIN))
2168 return -EPERM;
2169 if (file->f_op->write == redirected_tty_write) {
2170 struct file *f;
2171 spin_lock(&redirect_lock);
2172 f = redirect;
2173 redirect = NULL;
2174 spin_unlock(&redirect_lock);
2175 if (f)
2176 fput(f);
2177 return 0;
2178 }
2179 spin_lock(&redirect_lock);
2180 if (redirect) {
2181 spin_unlock(&redirect_lock);
2182 return -EBUSY;
2183 }
2184 get_file(file);
2185 redirect = file;
2186 spin_unlock(&redirect_lock);
2187 return 0;
2188}
2189
af9b897e
AC
2190/**
2191 * fionbio - non blocking ioctl
2192 * @file: file to set blocking value
2193 * @p: user parameter
2194 *
2195 * Historical tty interfaces had a blocking control ioctl before
2196 * the generic functionality existed. This piece of history is preserved
2197 * in the expected tty API of posix OS's.
2198 *
6146b9af 2199 * Locking: none, the open file handle ensures it won't go away.
af9b897e 2200 */
1da177e4
LT
2201
2202static int fionbio(struct file *file, int __user *p)
2203{
2204 int nonblock;
2205
2206 if (get_user(nonblock, p))
2207 return -EFAULT;
2208
db1dd4d3 2209 spin_lock(&file->f_lock);
1da177e4
LT
2210 if (nonblock)
2211 file->f_flags |= O_NONBLOCK;
2212 else
2213 file->f_flags &= ~O_NONBLOCK;
db1dd4d3 2214 spin_unlock(&file->f_lock);
1da177e4
LT
2215 return 0;
2216}
2217
af9b897e
AC
2218/**
2219 * tiocsctty - set controlling tty
2220 * @tty: tty structure
2221 * @arg: user argument
2222 *
2223 * This ioctl is used to manage job control. It permits a session
2224 * leader to set this tty as the controlling tty for the session.
2225 *
2226 * Locking:
28298232 2227 * Takes tty_mutex() to protect tty instance
24ec839c
PZ
2228 * Takes tasklist_lock internally to walk sessions
2229 * Takes ->siglock() when updating signal->tty
af9b897e
AC
2230 */
2231
1da177e4
LT
2232static int tiocsctty(struct tty_struct *tty, int arg)
2233{
24ec839c 2234 int ret = 0;
ab521dc0 2235 if (current->signal->leader && (task_session(current) == tty->session))
24ec839c
PZ
2236 return ret;
2237
2238 mutex_lock(&tty_mutex);
1da177e4
LT
2239 /*
2240 * The process must be a session leader and
2241 * not have a controlling tty already.
2242 */
24ec839c
PZ
2243 if (!current->signal->leader || current->signal->tty) {
2244 ret = -EPERM;
2245 goto unlock;
2246 }
2247
ab521dc0 2248 if (tty->session) {
1da177e4
LT
2249 /*
2250 * This tty is already the controlling
2251 * tty for another session group!
2252 */
37bdfb07 2253 if (arg == 1 && capable(CAP_SYS_ADMIN)) {
1da177e4
LT
2254 /*
2255 * Steal it away
2256 */
1da177e4 2257 read_lock(&tasklist_lock);
24ec839c 2258 session_clear_tty(tty->session);
1da177e4 2259 read_unlock(&tasklist_lock);
24ec839c
PZ
2260 } else {
2261 ret = -EPERM;
2262 goto unlock;
2263 }
1da177e4 2264 }
24ec839c
PZ
2265 proc_set_tty(current, tty);
2266unlock:
28298232 2267 mutex_unlock(&tty_mutex);
24ec839c 2268 return ret;
1da177e4
LT
2269}
2270
5d0fdf1e
AC
2271/**
2272 * tty_get_pgrp - return a ref counted pgrp pid
2273 * @tty: tty to read
2274 *
2275 * Returns a refcounted instance of the pid struct for the process
2276 * group controlling the tty.
2277 */
2278
2279struct pid *tty_get_pgrp(struct tty_struct *tty)
2280{
2281 unsigned long flags;
2282 struct pid *pgrp;
2283
2284 spin_lock_irqsave(&tty->ctrl_lock, flags);
2285 pgrp = get_pid(tty->pgrp);
2286 spin_unlock_irqrestore(&tty->ctrl_lock, flags);
2287
2288 return pgrp;
2289}
2290EXPORT_SYMBOL_GPL(tty_get_pgrp);
2291
af9b897e
AC
2292/**
2293 * tiocgpgrp - get process group
2294 * @tty: tty passed by user
25985edc 2295 * @real_tty: tty side of the tty passed by the user if a pty else the tty
af9b897e
AC
2296 * @p: returned pid
2297 *
2298 * Obtain the process group of the tty. If there is no process group
2299 * return an error.
2300 *
24ec839c 2301 * Locking: none. Reference to current->signal->tty is safe.
af9b897e
AC
2302 */
2303
1da177e4
LT
2304static int tiocgpgrp(struct tty_struct *tty, struct tty_struct *real_tty, pid_t __user *p)
2305{
5d0fdf1e
AC
2306 struct pid *pid;
2307 int ret;
1da177e4
LT
2308 /*
2309 * (tty == real_tty) is a cheap way of
2310 * testing if the tty is NOT a master pty.
2311 */
2312 if (tty == real_tty && current->signal->tty != real_tty)
2313 return -ENOTTY;
5d0fdf1e
AC
2314 pid = tty_get_pgrp(real_tty);
2315 ret = put_user(pid_vnr(pid), p);
2316 put_pid(pid);
2317 return ret;
1da177e4
LT
2318}
2319
af9b897e
AC
2320/**
2321 * tiocspgrp - attempt to set process group
2322 * @tty: tty passed by user
2323 * @real_tty: tty side device matching tty passed by user
2324 * @p: pid pointer
2325 *
2326 * Set the process group of the tty to the session passed. Only
2327 * permitted where the tty session is our session.
2328 *
47f86834 2329 * Locking: RCU, ctrl lock
af9b897e
AC
2330 */
2331
1da177e4
LT
2332static int tiocspgrp(struct tty_struct *tty, struct tty_struct *real_tty, pid_t __user *p)
2333{
04a2e6a5
EB
2334 struct pid *pgrp;
2335 pid_t pgrp_nr;
1da177e4 2336 int retval = tty_check_change(real_tty);
47f86834 2337 unsigned long flags;
1da177e4
LT
2338
2339 if (retval == -EIO)
2340 return -ENOTTY;
2341 if (retval)
2342 return retval;
2343 if (!current->signal->tty ||
2344 (current->signal->tty != real_tty) ||
ab521dc0 2345 (real_tty->session != task_session(current)))
1da177e4 2346 return -ENOTTY;
04a2e6a5 2347 if (get_user(pgrp_nr, p))
1da177e4 2348 return -EFAULT;
04a2e6a5 2349 if (pgrp_nr < 0)
1da177e4 2350 return -EINVAL;
04a2e6a5 2351 rcu_read_lock();
b488893a 2352 pgrp = find_vpid(pgrp_nr);
04a2e6a5
EB
2353 retval = -ESRCH;
2354 if (!pgrp)
2355 goto out_unlock;
2356 retval = -EPERM;
2357 if (session_of_pgrp(pgrp) != task_session(current))
2358 goto out_unlock;
2359 retval = 0;
47f86834 2360 spin_lock_irqsave(&tty->ctrl_lock, flags);
ab521dc0
EB
2361 put_pid(real_tty->pgrp);
2362 real_tty->pgrp = get_pid(pgrp);
47f86834 2363 spin_unlock_irqrestore(&tty->ctrl_lock, flags);
04a2e6a5
EB
2364out_unlock:
2365 rcu_read_unlock();
2366 return retval;
1da177e4
LT
2367}
2368
af9b897e
AC
2369/**
2370 * tiocgsid - get session id
2371 * @tty: tty passed by user
25985edc 2372 * @real_tty: tty side of the tty passed by the user if a pty else the tty
af9b897e
AC
2373 * @p: pointer to returned session id
2374 *
2375 * Obtain the session id of the tty. If there is no session
2376 * return an error.
2377 *
24ec839c 2378 * Locking: none. Reference to current->signal->tty is safe.
af9b897e
AC
2379 */
2380
1da177e4
LT
2381static int tiocgsid(struct tty_struct *tty, struct tty_struct *real_tty, pid_t __user *p)
2382{
2383 /*
2384 * (tty == real_tty) is a cheap way of
2385 * testing if the tty is NOT a master pty.
2386 */
2387 if (tty == real_tty && current->signal->tty != real_tty)
2388 return -ENOTTY;
ab521dc0 2389 if (!real_tty->session)
1da177e4 2390 return -ENOTTY;
b488893a 2391 return put_user(pid_vnr(real_tty->session), p);
1da177e4
LT
2392}
2393
af9b897e
AC
2394/**
2395 * tiocsetd - set line discipline
2396 * @tty: tty device
2397 * @p: pointer to user data
2398 *
2399 * Set the line discipline according to user request.
2400 *
2401 * Locking: see tty_set_ldisc, this function is just a helper
2402 */
2403
1da177e4
LT
2404static int tiocsetd(struct tty_struct *tty, int __user *p)
2405{
2406 int ldisc;
04f378b1 2407 int ret;
1da177e4
LT
2408
2409 if (get_user(ldisc, p))
2410 return -EFAULT;
04f378b1 2411
04f378b1 2412 ret = tty_set_ldisc(tty, ldisc);
04f378b1
AC
2413
2414 return ret;
1da177e4
LT
2415}
2416
af9b897e
AC
2417/**
2418 * send_break - performed time break
2419 * @tty: device to break on
2420 * @duration: timeout in mS
2421 *
2422 * Perform a timed break on hardware that lacks its own driver level
2423 * timed break functionality.
2424 *
2425 * Locking:
28298232 2426 * atomic_write_lock serializes
af9b897e 2427 *
af9b897e
AC
2428 */
2429
b20f3ae5 2430static int send_break(struct tty_struct *tty, unsigned int duration)
1da177e4 2431{
9e98966c
AC
2432 int retval;
2433
2434 if (tty->ops->break_ctl == NULL)
2435 return 0;
2436
2437 if (tty->driver->flags & TTY_DRIVER_HARDWARE_BREAK)
2438 retval = tty->ops->break_ctl(tty, duration);
2439 else {
2440 /* Do the work ourselves */
2441 if (tty_write_lock(tty, 0) < 0)
2442 return -EINTR;
2443 retval = tty->ops->break_ctl(tty, -1);
2444 if (retval)
2445 goto out;
2446 if (!signal_pending(current))
2447 msleep_interruptible(duration);
2448 retval = tty->ops->break_ctl(tty, 0);
2449out:
2450 tty_write_unlock(tty);
2451 if (signal_pending(current))
2452 retval = -EINTR;
2453 }
2454 return retval;
1da177e4
LT
2455}
2456
af9b897e 2457/**
f34d7a5b 2458 * tty_tiocmget - get modem status
af9b897e
AC
2459 * @tty: tty device
2460 * @file: user file pointer
2461 * @p: pointer to result
2462 *
2463 * Obtain the modem status bits from the tty driver if the feature
2464 * is supported. Return -EINVAL if it is not available.
2465 *
2466 * Locking: none (up to the driver)
2467 */
2468
60b33c13 2469static int tty_tiocmget(struct tty_struct *tty, int __user *p)
1da177e4
LT
2470{
2471 int retval = -EINVAL;
2472
f34d7a5b 2473 if (tty->ops->tiocmget) {
60b33c13 2474 retval = tty->ops->tiocmget(tty);
1da177e4
LT
2475
2476 if (retval >= 0)
2477 retval = put_user(retval, p);
2478 }
2479 return retval;
2480}
2481
af9b897e 2482/**
f34d7a5b 2483 * tty_tiocmset - set modem status
af9b897e 2484 * @tty: tty device
af9b897e
AC
2485 * @cmd: command - clear bits, set bits or set all
2486 * @p: pointer to desired bits
2487 *
2488 * Set the modem status bits from the tty driver if the feature
2489 * is supported. Return -EINVAL if it is not available.
2490 *
2491 * Locking: none (up to the driver)
2492 */
2493
20b9d177 2494static int tty_tiocmset(struct tty_struct *tty, unsigned int cmd,
1da177e4
LT
2495 unsigned __user *p)
2496{
ae677517
AC
2497 int retval;
2498 unsigned int set, clear, val;
1da177e4 2499
ae677517
AC
2500 if (tty->ops->tiocmset == NULL)
2501 return -EINVAL;
1da177e4 2502
ae677517
AC
2503 retval = get_user(val, p);
2504 if (retval)
2505 return retval;
2506 set = clear = 0;
2507 switch (cmd) {
2508 case TIOCMBIS:
2509 set = val;
2510 break;
2511 case TIOCMBIC:
2512 clear = val;
2513 break;
2514 case TIOCMSET:
2515 set = val;
2516 clear = ~val;
2517 break;
2518 }
2519 set &= TIOCM_DTR|TIOCM_RTS|TIOCM_OUT1|TIOCM_OUT2|TIOCM_LOOP;
2520 clear &= TIOCM_DTR|TIOCM_RTS|TIOCM_OUT1|TIOCM_OUT2|TIOCM_LOOP;
20b9d177 2521 return tty->ops->tiocmset(tty, set, clear);
1da177e4
LT
2522}
2523
d281da7f
AC
2524static int tty_tiocgicount(struct tty_struct *tty, void __user *arg)
2525{
2526 int retval = -EINVAL;
2527 struct serial_icounter_struct icount;
2528 memset(&icount, 0, sizeof(icount));
2529 if (tty->ops->get_icount)
2530 retval = tty->ops->get_icount(tty, &icount);
2531 if (retval != 0)
2532 return retval;
2533 if (copy_to_user(arg, &icount, sizeof(icount)))
2534 return -EFAULT;
2535 return 0;
2536}
2537
e8b70e7d
AC
2538struct tty_struct *tty_pair_get_tty(struct tty_struct *tty)
2539{
2540 if (tty->driver->type == TTY_DRIVER_TYPE_PTY &&
2541 tty->driver->subtype == PTY_TYPE_MASTER)
2542 tty = tty->link;
2543 return tty;
2544}
2545EXPORT_SYMBOL(tty_pair_get_tty);
2546
2547struct tty_struct *tty_pair_get_pty(struct tty_struct *tty)
2548{
2549 if (tty->driver->type == TTY_DRIVER_TYPE_PTY &&
2550 tty->driver->subtype == PTY_TYPE_MASTER)
2551 return tty;
2552 return tty->link;
2553}
2554EXPORT_SYMBOL(tty_pair_get_pty);
2555
1da177e4
LT
2556/*
2557 * Split this up, as gcc can choke on it otherwise..
2558 */
04f378b1 2559long tty_ioctl(struct file *file, unsigned int cmd, unsigned long arg)
1da177e4 2560{
d996b62a
NP
2561 struct tty_struct *tty = file_tty(file);
2562 struct tty_struct *real_tty;
1da177e4
LT
2563 void __user *p = (void __user *)arg;
2564 int retval;
2565 struct tty_ldisc *ld;
04f378b1 2566 struct inode *inode = file->f_dentry->d_inode;
37bdfb07 2567
1da177e4
LT
2568 if (tty_paranoia_check(tty, inode, "tty_ioctl"))
2569 return -EINVAL;
2570
e8b70e7d 2571 real_tty = tty_pair_get_tty(tty);
1da177e4
LT
2572
2573 /*
2574 * Factor out some common prep work
2575 */
2576 switch (cmd) {
2577 case TIOCSETD:
2578 case TIOCSBRK:
2579 case TIOCCBRK:
2580 case TCSBRK:
37bdfb07 2581 case TCSBRKP:
1da177e4
LT
2582 retval = tty_check_change(tty);
2583 if (retval)
2584 return retval;
2585 if (cmd != TIOCCBRK) {
2586 tty_wait_until_sent(tty, 0);
2587 if (signal_pending(current))
2588 return -EINTR;
2589 }
2590 break;
2591 }
2592
9e98966c
AC
2593 /*
2594 * Now do the stuff.
2595 */
1da177e4 2596 switch (cmd) {
37bdfb07
AC
2597 case TIOCSTI:
2598 return tiocsti(tty, p);
2599 case TIOCGWINSZ:
8f520021 2600 return tiocgwinsz(real_tty, p);
37bdfb07 2601 case TIOCSWINSZ:
fc6f6238 2602 return tiocswinsz(real_tty, p);
37bdfb07
AC
2603 case TIOCCONS:
2604 return real_tty != tty ? -EINVAL : tioccons(file);
2605 case FIONBIO:
2606 return fionbio(file, p);
2607 case TIOCEXCL:
2608 set_bit(TTY_EXCLUSIVE, &tty->flags);
2609 return 0;
2610 case TIOCNXCL:
2611 clear_bit(TTY_EXCLUSIVE, &tty->flags);
2612 return 0;
2613 case TIOCNOTTY:
2614 if (current->signal->tty != tty)
2615 return -ENOTTY;
2616 no_tty();
2617 return 0;
2618 case TIOCSCTTY:
2619 return tiocsctty(tty, arg);
2620 case TIOCGPGRP:
2621 return tiocgpgrp(tty, real_tty, p);
2622 case TIOCSPGRP:
2623 return tiocspgrp(tty, real_tty, p);
2624 case TIOCGSID:
2625 return tiocgsid(tty, real_tty, p);
2626 case TIOCGETD:
c65c9bc3 2627 return put_user(tty->ldisc->ops->num, (int __user *)p);
37bdfb07
AC
2628 case TIOCSETD:
2629 return tiocsetd(tty, p);
3c95c985
KS
2630 case TIOCVHANGUP:
2631 if (!capable(CAP_SYS_ADMIN))
2632 return -EPERM;
2633 tty_vhangup(tty);
2634 return 0;
b7b8de08
WF
2635 case TIOCGDEV:
2636 {
2637 unsigned int ret = new_encode_dev(tty_devnum(real_tty));
2638 return put_user(ret, (unsigned int __user *)p);
2639 }
37bdfb07
AC
2640 /*
2641 * Break handling
2642 */
2643 case TIOCSBRK: /* Turn break on, unconditionally */
f34d7a5b 2644 if (tty->ops->break_ctl)
9e98966c 2645 return tty->ops->break_ctl(tty, -1);
37bdfb07 2646 return 0;
37bdfb07 2647 case TIOCCBRK: /* Turn break off, unconditionally */
f34d7a5b 2648 if (tty->ops->break_ctl)
9e98966c 2649 return tty->ops->break_ctl(tty, 0);
37bdfb07
AC
2650 return 0;
2651 case TCSBRK: /* SVID version: non-zero arg --> no break */
2652 /* non-zero arg means wait for all output data
2653 * to be sent (performed above) but don't send break.
2654 * This is used by the tcdrain() termios function.
2655 */
2656 if (!arg)
2657 return send_break(tty, 250);
2658 return 0;
2659 case TCSBRKP: /* support for POSIX tcsendbreak() */
2660 return send_break(tty, arg ? arg*100 : 250);
2661
2662 case TIOCMGET:
60b33c13 2663 return tty_tiocmget(tty, p);
37bdfb07
AC
2664 case TIOCMSET:
2665 case TIOCMBIC:
2666 case TIOCMBIS:
20b9d177 2667 return tty_tiocmset(tty, cmd, p);
d281da7f
AC
2668 case TIOCGICOUNT:
2669 retval = tty_tiocgicount(tty, p);
2670 /* For the moment allow fall through to the old method */
2671 if (retval != -EINVAL)
2672 return retval;
2673 break;
37bdfb07
AC
2674 case TCFLSH:
2675 switch (arg) {
2676 case TCIFLUSH:
2677 case TCIOFLUSH:
2678 /* flush tty buffer and allow ldisc to process ioctl */
2679 tty_buffer_flush(tty);
c5c34d48 2680 break;
37bdfb07
AC
2681 }
2682 break;
1da177e4 2683 }
f34d7a5b 2684 if (tty->ops->ioctl) {
6caa76b7 2685 retval = (tty->ops->ioctl)(tty, cmd, arg);
1da177e4
LT
2686 if (retval != -ENOIOCTLCMD)
2687 return retval;
2688 }
2689 ld = tty_ldisc_ref_wait(tty);
2690 retval = -EINVAL;
a352def2
AC
2691 if (ld->ops->ioctl) {
2692 retval = ld->ops->ioctl(tty, file, cmd, arg);
1da177e4
LT
2693 if (retval == -ENOIOCTLCMD)
2694 retval = -EINVAL;
2695 }
2696 tty_ldisc_deref(ld);
2697 return retval;
2698}
2699
e10cc1df 2700#ifdef CONFIG_COMPAT
37bdfb07 2701static long tty_compat_ioctl(struct file *file, unsigned int cmd,
e10cc1df
PF
2702 unsigned long arg)
2703{
2704 struct inode *inode = file->f_dentry->d_inode;
d996b62a 2705 struct tty_struct *tty = file_tty(file);
e10cc1df
PF
2706 struct tty_ldisc *ld;
2707 int retval = -ENOIOCTLCMD;
2708
2709 if (tty_paranoia_check(tty, inode, "tty_ioctl"))
2710 return -EINVAL;
2711
f34d7a5b 2712 if (tty->ops->compat_ioctl) {
6caa76b7 2713 retval = (tty->ops->compat_ioctl)(tty, cmd, arg);
e10cc1df
PF
2714 if (retval != -ENOIOCTLCMD)
2715 return retval;
2716 }
2717
2718 ld = tty_ldisc_ref_wait(tty);
a352def2
AC
2719 if (ld->ops->compat_ioctl)
2720 retval = ld->ops->compat_ioctl(tty, file, cmd, arg);
8193c429
TM
2721 else
2722 retval = n_tty_compat_ioctl_helper(tty, file, cmd, arg);
e10cc1df
PF
2723 tty_ldisc_deref(ld);
2724
2725 return retval;
2726}
2727#endif
1da177e4
LT
2728
2729/*
2730 * This implements the "Secure Attention Key" --- the idea is to
2731 * prevent trojan horses by killing all processes associated with this
2732 * tty when the user hits the "Secure Attention Key". Required for
2733 * super-paranoid applications --- see the Orange Book for more details.
37bdfb07 2734 *
1da177e4
LT
2735 * This code could be nicer; ideally it should send a HUP, wait a few
2736 * seconds, then send a INT, and then a KILL signal. But you then
2737 * have to coordinate with the init process, since all processes associated
2738 * with the current tty must be dead before the new getty is allowed
2739 * to spawn.
2740 *
2741 * Now, if it would be correct ;-/ The current code has a nasty hole -
2742 * it doesn't catch files in flight. We may send the descriptor to ourselves
2743 * via AF_UNIX socket, close it and later fetch from socket. FIXME.
2744 *
2745 * Nasty bug: do_SAK is being called in interrupt context. This can
2746 * deadlock. We punt it up to process context. AKPM - 16Mar2001
2747 */
8b6312f4 2748void __do_SAK(struct tty_struct *tty)
1da177e4
LT
2749{
2750#ifdef TTY_SOFT_SAK
2751 tty_hangup(tty);
2752#else
652486fb 2753 struct task_struct *g, *p;
ab521dc0 2754 struct pid *session;
1da177e4
LT
2755 int i;
2756 struct file *filp;
badf1662 2757 struct fdtable *fdt;
37bdfb07 2758
1da177e4
LT
2759 if (!tty)
2760 return;
24ec839c 2761 session = tty->session;
37bdfb07 2762
b3f13deb 2763 tty_ldisc_flush(tty);
1da177e4 2764
f34d7a5b 2765 tty_driver_flush_buffer(tty);
37bdfb07 2766
1da177e4 2767 read_lock(&tasklist_lock);
652486fb 2768 /* Kill the entire session */
ab521dc0 2769 do_each_pid_task(session, PIDTYPE_SID, p) {
652486fb 2770 printk(KERN_NOTICE "SAK: killed process %d"
1b0f7ffd 2771 " (%s): task_session(p)==tty->session\n",
ba25f9dc 2772 task_pid_nr(p), p->comm);
652486fb 2773 send_sig(SIGKILL, p, 1);
ab521dc0 2774 } while_each_pid_task(session, PIDTYPE_SID, p);
652486fb
EB
2775 /* Now kill any processes that happen to have the
2776 * tty open.
2777 */
2778 do_each_thread(g, p) {
2779 if (p->signal->tty == tty) {
1da177e4 2780 printk(KERN_NOTICE "SAK: killed process %d"
1b0f7ffd 2781 " (%s): task_session(p)==tty->session\n",
ba25f9dc 2782 task_pid_nr(p), p->comm);
1da177e4
LT
2783 send_sig(SIGKILL, p, 1);
2784 continue;
2785 }
2786 task_lock(p);
2787 if (p->files) {
ca99c1da
DS
2788 /*
2789 * We don't take a ref to the file, so we must
2790 * hold ->file_lock instead.
2791 */
2792 spin_lock(&p->files->file_lock);
badf1662 2793 fdt = files_fdtable(p->files);
37bdfb07 2794 for (i = 0; i < fdt->max_fds; i++) {
1da177e4
LT
2795 filp = fcheck_files(p->files, i);
2796 if (!filp)
2797 continue;
2798 if (filp->f_op->read == tty_read &&
d996b62a 2799 file_tty(filp) == tty) {
1da177e4
LT
2800 printk(KERN_NOTICE "SAK: killed process %d"
2801 " (%s): fd#%d opened to the tty\n",
ba25f9dc 2802 task_pid_nr(p), p->comm, i);
20ac9437 2803 force_sig(SIGKILL, p);
1da177e4
LT
2804 break;
2805 }
2806 }
ca99c1da 2807 spin_unlock(&p->files->file_lock);
1da177e4
LT
2808 }
2809 task_unlock(p);
652486fb 2810 } while_each_thread(g, p);
1da177e4
LT
2811 read_unlock(&tasklist_lock);
2812#endif
2813}
2814
8b6312f4
EB
2815static void do_SAK_work(struct work_struct *work)
2816{
2817 struct tty_struct *tty =
2818 container_of(work, struct tty_struct, SAK_work);
2819 __do_SAK(tty);
2820}
2821
1da177e4
LT
2822/*
2823 * The tq handling here is a little racy - tty->SAK_work may already be queued.
2824 * Fortunately we don't need to worry, because if ->SAK_work is already queued,
2825 * the values which we write to it will be identical to the values which it
2826 * already has. --akpm
2827 */
2828void do_SAK(struct tty_struct *tty)
2829{
2830 if (!tty)
2831 return;
1da177e4
LT
2832 schedule_work(&tty->SAK_work);
2833}
2834
2835EXPORT_SYMBOL(do_SAK);
2836
30004ac9
DES
2837static int dev_match_devt(struct device *dev, void *data)
2838{
2839 dev_t *devt = data;
2840 return dev->devt == *devt;
2841}
2842
2843/* Must put_device() after it's unused! */
2844static struct device *tty_get_device(struct tty_struct *tty)
2845{
2846 dev_t devt = tty_devnum(tty);
2847 return class_find_device(tty_class, NULL, &devt, dev_match_devt);
2848}
2849
2850
af9b897e
AC
2851/**
2852 * initialize_tty_struct
2853 * @tty: tty to initialize
2854 *
2855 * This subroutine initializes a tty structure that has been newly
2856 * allocated.
2857 *
2858 * Locking: none - tty in question must not be exposed at this point
1da177e4 2859 */
af9b897e 2860
bf970ee4
AC
2861void initialize_tty_struct(struct tty_struct *tty,
2862 struct tty_driver *driver, int idx)
1da177e4
LT
2863{
2864 memset(tty, 0, sizeof(struct tty_struct));
9c9f4ded 2865 kref_init(&tty->kref);
1da177e4 2866 tty->magic = TTY_MAGIC;
01e1abb2 2867 tty_ldisc_init(tty);
ab521dc0
EB
2868 tty->session = NULL;
2869 tty->pgrp = NULL;
1da177e4 2870 tty->overrun_time = jiffies;
33f0f88f
AC
2871 tty->buf.head = tty->buf.tail = NULL;
2872 tty_buffer_init(tty);
5785c95b 2873 mutex_init(&tty->termios_mutex);
c65c9bc3 2874 mutex_init(&tty->ldisc_mutex);
1da177e4
LT
2875 init_waitqueue_head(&tty->write_wait);
2876 init_waitqueue_head(&tty->read_wait);
65f27f38 2877 INIT_WORK(&tty->hangup_work, do_tty_hangup);
70522e12
IM
2878 mutex_init(&tty->atomic_read_lock);
2879 mutex_init(&tty->atomic_write_lock);
a88a69c9
JP
2880 mutex_init(&tty->output_lock);
2881 mutex_init(&tty->echo_lock);
1da177e4 2882 spin_lock_init(&tty->read_lock);
04f378b1 2883 spin_lock_init(&tty->ctrl_lock);
1da177e4 2884 INIT_LIST_HEAD(&tty->tty_files);
7f1f86a0 2885 INIT_WORK(&tty->SAK_work, do_SAK_work);
bf970ee4
AC
2886
2887 tty->driver = driver;
2888 tty->ops = driver->ops;
2889 tty->index = idx;
2890 tty_line_name(driver, idx, tty->name);
30004ac9 2891 tty->dev = tty_get_device(tty);
1da177e4
LT
2892}
2893
6716671d
JS
2894/**
2895 * deinitialize_tty_struct
2896 * @tty: tty to deinitialize
2897 *
2898 * This subroutine deinitializes a tty structure that has been newly
2899 * allocated but tty_release cannot be called on that yet.
2900 *
2901 * Locking: none - tty in question must not be exposed at this point
2902 */
2903void deinitialize_tty_struct(struct tty_struct *tty)
2904{
2905 tty_ldisc_deinit(tty);
2906}
2907
f34d7a5b
AC
2908/**
2909 * tty_put_char - write one character to a tty
2910 * @tty: tty
2911 * @ch: character
2912 *
2913 * Write one byte to the tty using the provided put_char method
2914 * if present. Returns the number of characters successfully output.
2915 *
2916 * Note: the specific put_char operation in the driver layer may go
2917 * away soon. Don't call it directly, use this method
1da177e4 2918 */
af9b897e 2919
f34d7a5b 2920int tty_put_char(struct tty_struct *tty, unsigned char ch)
1da177e4 2921{
f34d7a5b
AC
2922 if (tty->ops->put_char)
2923 return tty->ops->put_char(tty, ch);
2924 return tty->ops->write(tty, &ch, 1);
1da177e4 2925}
f34d7a5b
AC
2926EXPORT_SYMBOL_GPL(tty_put_char);
2927
d81ed103 2928struct class *tty_class;
1da177e4
LT
2929
2930/**
af9b897e
AC
2931 * tty_register_device - register a tty device
2932 * @driver: the tty driver that describes the tty device
2933 * @index: the index in the tty driver for this tty device
2934 * @device: a struct device that is associated with this tty device.
2935 * This field is optional, if there is no known struct device
2936 * for this tty device it can be set to NULL safely.
1da177e4 2937 *
01107d34
GKH
2938 * Returns a pointer to the struct device for this tty device
2939 * (or ERR_PTR(-EFOO) on error).
1cdcb6b4 2940 *
af9b897e
AC
2941 * This call is required to be made to register an individual tty device
2942 * if the tty driver's flags have the TTY_DRIVER_DYNAMIC_DEV bit set. If
2943 * that bit is not set, this function should not be called by a tty
2944 * driver.
2945 *
2946 * Locking: ??
1da177e4 2947 */
af9b897e 2948
01107d34
GKH
2949struct device *tty_register_device(struct tty_driver *driver, unsigned index,
2950 struct device *device)
1da177e4
LT
2951{
2952 char name[64];
2953 dev_t dev = MKDEV(driver->major, driver->minor_start) + index;
2954
2955 if (index >= driver->num) {
2956 printk(KERN_ERR "Attempt to register invalid tty line number "
2957 " (%d).\n", index);
1cdcb6b4 2958 return ERR_PTR(-EINVAL);
1da177e4
LT
2959 }
2960
1da177e4
LT
2961 if (driver->type == TTY_DRIVER_TYPE_PTY)
2962 pty_line_name(driver, index, name);
2963 else
2964 tty_line_name(driver, index, name);
1cdcb6b4 2965
03457cd4 2966 return device_create(tty_class, device, dev, NULL, name);
1da177e4 2967}
7d7b93c1 2968EXPORT_SYMBOL(tty_register_device);
1da177e4
LT
2969
2970/**
af9b897e
AC
2971 * tty_unregister_device - unregister a tty device
2972 * @driver: the tty driver that describes the tty device
2973 * @index: the index in the tty driver for this tty device
1da177e4 2974 *
af9b897e
AC
2975 * If a tty device is registered with a call to tty_register_device() then
2976 * this function must be called when the tty device is gone.
2977 *
2978 * Locking: ??
1da177e4 2979 */
af9b897e 2980
1da177e4
LT
2981void tty_unregister_device(struct tty_driver *driver, unsigned index)
2982{
37bdfb07
AC
2983 device_destroy(tty_class,
2984 MKDEV(driver->major, driver->minor_start) + index);
1da177e4 2985}
1da177e4
LT
2986EXPORT_SYMBOL(tty_unregister_device);
2987
2988struct tty_driver *alloc_tty_driver(int lines)
2989{
2990 struct tty_driver *driver;
2991
506eb99a 2992 driver = kzalloc(sizeof(struct tty_driver), GFP_KERNEL);
1da177e4 2993 if (driver) {
7d7b93c1 2994 kref_init(&driver->kref);
1da177e4
LT
2995 driver->magic = TTY_DRIVER_MAGIC;
2996 driver->num = lines;
2997 /* later we'll move allocation of tables here */
2998 }
2999 return driver;
3000}
7d7b93c1 3001EXPORT_SYMBOL(alloc_tty_driver);
1da177e4 3002
7d7b93c1 3003static void destruct_tty_driver(struct kref *kref)
1da177e4 3004{
7d7b93c1
AC
3005 struct tty_driver *driver = container_of(kref, struct tty_driver, kref);
3006 int i;
3007 struct ktermios *tp;
3008 void *p;
3009
3010 if (driver->flags & TTY_DRIVER_INSTALLED) {
3011 /*
3012 * Free the termios and termios_locked structures because
3013 * we don't want to get memory leaks when modular tty
3014 * drivers are removed from the kernel.
3015 */
3016 for (i = 0; i < driver->num; i++) {
3017 tp = driver->termios[i];
3018 if (tp) {
3019 driver->termios[i] = NULL;
3020 kfree(tp);
3021 }
7d7b93c1
AC
3022 if (!(driver->flags & TTY_DRIVER_DYNAMIC_DEV))
3023 tty_unregister_device(driver, i);
3024 }
3025 p = driver->ttys;
3026 proc_tty_unregister_driver(driver);
3027 driver->ttys = NULL;
fe6e29fd 3028 driver->termios = NULL;
7d7b93c1
AC
3029 kfree(p);
3030 cdev_del(&driver->cdev);
3031 }
1da177e4
LT
3032 kfree(driver);
3033}
3034
7d7b93c1
AC
3035void tty_driver_kref_put(struct tty_driver *driver)
3036{
3037 kref_put(&driver->kref, destruct_tty_driver);
3038}
3039EXPORT_SYMBOL(tty_driver_kref_put);
3040
b68e31d0
JD
3041void tty_set_operations(struct tty_driver *driver,
3042 const struct tty_operations *op)
1da177e4 3043{
f34d7a5b
AC
3044 driver->ops = op;
3045};
7d7b93c1 3046EXPORT_SYMBOL(tty_set_operations);
1da177e4 3047
7d7b93c1
AC
3048void put_tty_driver(struct tty_driver *d)
3049{
3050 tty_driver_kref_put(d);
3051}
1da177e4 3052EXPORT_SYMBOL(put_tty_driver);
1da177e4
LT
3053
3054/*
3055 * Called by a tty driver to register itself.
3056 */
3057int tty_register_driver(struct tty_driver *driver)
3058{
3059 int error;
37bdfb07 3060 int i;
1da177e4
LT
3061 dev_t dev;
3062 void **p = NULL;
b670bde0 3063 struct device *d;
1da177e4 3064
543691a6 3065 if (!(driver->flags & TTY_DRIVER_DEVPTS_MEM) && driver->num) {
fe6e29fd 3066 p = kzalloc(driver->num * 2 * sizeof(void *), GFP_KERNEL);
1da177e4
LT
3067 if (!p)
3068 return -ENOMEM;
1da177e4
LT
3069 }
3070
3071 if (!driver->major) {
37bdfb07
AC
3072 error = alloc_chrdev_region(&dev, driver->minor_start,
3073 driver->num, driver->name);
1da177e4
LT
3074 if (!error) {
3075 driver->major = MAJOR(dev);
3076 driver->minor_start = MINOR(dev);
3077 }
3078 } else {
3079 dev = MKDEV(driver->major, driver->minor_start);
e5717c48 3080 error = register_chrdev_region(dev, driver->num, driver->name);
1da177e4
LT
3081 }
3082 if (error < 0) {
3083 kfree(p);
3084 return error;
3085 }
3086
3087 if (p) {
3088 driver->ttys = (struct tty_struct **)p;
edc6afc5 3089 driver->termios = (struct ktermios **)(p + driver->num);
1da177e4
LT
3090 } else {
3091 driver->ttys = NULL;
3092 driver->termios = NULL;
1da177e4
LT
3093 }
3094
3095 cdev_init(&driver->cdev, &tty_fops);
3096 driver->cdev.owner = driver->owner;
3097 error = cdev_add(&driver->cdev, dev, driver->num);
3098 if (error) {
1da177e4
LT
3099 unregister_chrdev_region(dev, driver->num);
3100 driver->ttys = NULL;
fe6e29fd 3101 driver->termios = NULL;
1da177e4
LT
3102 kfree(p);
3103 return error;
3104 }
3105
ca509f69 3106 mutex_lock(&tty_mutex);
1da177e4 3107 list_add(&driver->tty_drivers, &tty_drivers);
ca509f69 3108 mutex_unlock(&tty_mutex);
37bdfb07
AC
3109
3110 if (!(driver->flags & TTY_DRIVER_DYNAMIC_DEV)) {
b670bde0
VK
3111 for (i = 0; i < driver->num; i++) {
3112 d = tty_register_device(driver, i, NULL);
3113 if (IS_ERR(d)) {
3114 error = PTR_ERR(d);
3115 goto err;
3116 }
3117 }
1da177e4
LT
3118 }
3119 proc_tty_register_driver(driver);
7d7b93c1 3120 driver->flags |= TTY_DRIVER_INSTALLED;
1da177e4 3121 return 0;
b670bde0
VK
3122
3123err:
3124 for (i--; i >= 0; i--)
3125 tty_unregister_device(driver, i);
3126
3127 mutex_lock(&tty_mutex);
3128 list_del(&driver->tty_drivers);
3129 mutex_unlock(&tty_mutex);
3130
3131 unregister_chrdev_region(dev, driver->num);
3132 driver->ttys = NULL;
3133 driver->termios = NULL;
3134 kfree(p);
3135 return error;
1da177e4
LT
3136}
3137
3138EXPORT_SYMBOL(tty_register_driver);
3139
3140/*
3141 * Called by a tty driver to unregister itself.
3142 */
3143int tty_unregister_driver(struct tty_driver *driver)
3144{
7d7b93c1
AC
3145#if 0
3146 /* FIXME */
1da177e4
LT
3147 if (driver->refcount)
3148 return -EBUSY;
7d7b93c1 3149#endif
1da177e4
LT
3150 unregister_chrdev_region(MKDEV(driver->major, driver->minor_start),
3151 driver->num);
ca509f69 3152 mutex_lock(&tty_mutex);
1da177e4 3153 list_del(&driver->tty_drivers);
ca509f69 3154 mutex_unlock(&tty_mutex);
1da177e4
LT
3155 return 0;
3156}
7d7b93c1 3157
1da177e4
LT
3158EXPORT_SYMBOL(tty_unregister_driver);
3159
24ec839c
PZ
3160dev_t tty_devnum(struct tty_struct *tty)
3161{
3162 return MKDEV(tty->driver->major, tty->driver->minor_start) + tty->index;
3163}
3164EXPORT_SYMBOL(tty_devnum);
3165
3166void proc_clear_tty(struct task_struct *p)
3167{
7c3b1dcf 3168 unsigned long flags;
9c9f4ded 3169 struct tty_struct *tty;
7c3b1dcf 3170 spin_lock_irqsave(&p->sighand->siglock, flags);
9c9f4ded 3171 tty = p->signal->tty;
24ec839c 3172 p->signal->tty = NULL;
7c3b1dcf 3173 spin_unlock_irqrestore(&p->sighand->siglock, flags);
9c9f4ded 3174 tty_kref_put(tty);
24ec839c 3175}
24ec839c 3176
47f86834
AC
3177/* Called under the sighand lock */
3178
2a65f1d9 3179static void __proc_set_tty(struct task_struct *tsk, struct tty_struct *tty)
24ec839c
PZ
3180{
3181 if (tty) {
47f86834
AC
3182 unsigned long flags;
3183 /* We should not have a session or pgrp to put here but.... */
3184 spin_lock_irqsave(&tty->ctrl_lock, flags);
d9c1e9a8
EB
3185 put_pid(tty->session);
3186 put_pid(tty->pgrp);
ab521dc0 3187 tty->pgrp = get_pid(task_pgrp(tsk));
47f86834
AC
3188 spin_unlock_irqrestore(&tty->ctrl_lock, flags);
3189 tty->session = get_pid(task_session(tsk));
9c9f4ded
AC
3190 if (tsk->signal->tty) {
3191 printk(KERN_DEBUG "tty not NULL!!\n");
3192 tty_kref_put(tsk->signal->tty);
3193 }
24ec839c 3194 }
2a65f1d9 3195 put_pid(tsk->signal->tty_old_pgrp);
9c9f4ded 3196 tsk->signal->tty = tty_kref_get(tty);
ab521dc0 3197 tsk->signal->tty_old_pgrp = NULL;
24ec839c
PZ
3198}
3199
98a27ba4 3200static void proc_set_tty(struct task_struct *tsk, struct tty_struct *tty)
24ec839c
PZ
3201{
3202 spin_lock_irq(&tsk->sighand->siglock);
2a65f1d9 3203 __proc_set_tty(tsk, tty);
24ec839c
PZ
3204 spin_unlock_irq(&tsk->sighand->siglock);
3205}
3206
3207struct tty_struct *get_current_tty(void)
3208{
3209 struct tty_struct *tty;
934e6ebf
AC
3210 unsigned long flags;
3211
3212 spin_lock_irqsave(&current->sighand->siglock, flags);
452a00d2 3213 tty = tty_kref_get(current->signal->tty);
934e6ebf 3214 spin_unlock_irqrestore(&current->sighand->siglock, flags);
24ec839c
PZ
3215 return tty;
3216}
a311f743 3217EXPORT_SYMBOL_GPL(get_current_tty);
1da177e4 3218
d81ed103
AC
3219void tty_default_fops(struct file_operations *fops)
3220{
3221 *fops = tty_fops;
3222}
3223
1da177e4
LT
3224/*
3225 * Initialize the console device. This is called *early*, so
3226 * we can't necessarily depend on lots of kernel help here.
3227 * Just do some early initializations, and do the complex setup
3228 * later.
3229 */
3230void __init console_init(void)
3231{
3232 initcall_t *call;
3233
3234 /* Setup the default TTY line discipline. */
01e1abb2 3235 tty_ldisc_begin();
1da177e4
LT
3236
3237 /*
37bdfb07 3238 * set up the console device so that later boot sequences can
1da177e4
LT
3239 * inform about problems etc..
3240 */
1da177e4
LT
3241 call = __con_initcall_start;
3242 while (call < __con_initcall_end) {
3243 (*call)();
3244 call++;
3245 }
3246}
3247
e454cea2
KS
3248static char *tty_devnode(struct device *dev, mode_t *mode)
3249{
3250 if (!mode)
3251 return NULL;
3252 if (dev->devt == MKDEV(TTYAUX_MAJOR, 0) ||
3253 dev->devt == MKDEV(TTYAUX_MAJOR, 2))
3254 *mode = 0666;
3255 return NULL;
3256}
3257
1da177e4
LT
3258static int __init tty_class_init(void)
3259{
7fe845d1 3260 tty_class = class_create(THIS_MODULE, "tty");
1da177e4
LT
3261 if (IS_ERR(tty_class))
3262 return PTR_ERR(tty_class);
e454cea2 3263 tty_class->devnode = tty_devnode;
1da177e4
LT
3264 return 0;
3265}
3266
3267postcore_initcall(tty_class_init);
3268
3269/* 3/2004 jmc: why do these devices exist? */
1da177e4 3270static struct cdev tty_cdev, console_cdev;
1da177e4 3271
fbc92a34
KS
3272static ssize_t show_cons_active(struct device *dev,
3273 struct device_attribute *attr, char *buf)
3274{
3275 struct console *cs[16];
3276 int i = 0;
3277 struct console *c;
3278 ssize_t count = 0;
3279
ac751efa 3280 console_lock();
a2a6a822 3281 for_each_console(c) {
fbc92a34
KS
3282 if (!c->device)
3283 continue;
3284 if (!c->write)
3285 continue;
3286 if ((c->flags & CON_ENABLED) == 0)
3287 continue;
3288 cs[i++] = c;
3289 if (i >= ARRAY_SIZE(cs))
3290 break;
3291 }
3292 while (i--)
3293 count += sprintf(buf + count, "%s%d%c",
3294 cs[i]->name, cs[i]->index, i ? ' ':'\n');
ac751efa 3295 console_unlock();
fbc92a34
KS
3296
3297 return count;
3298}
3299static DEVICE_ATTR(active, S_IRUGO, show_cons_active, NULL);
3300
3301static struct device *consdev;
3302
3303void console_sysfs_notify(void)
3304{
3305 if (consdev)
3306 sysfs_notify(&consdev->kobj, NULL, "active");
3307}
3308
1da177e4
LT
3309/*
3310 * Ok, now we can initialize the rest of the tty devices and can count
3311 * on memory allocations, interrupts etc..
3312 */
31d1d48e 3313int __init tty_init(void)
1da177e4
LT
3314{
3315 cdev_init(&tty_cdev, &tty_fops);
3316 if (cdev_add(&tty_cdev, MKDEV(TTYAUX_MAJOR, 0), 1) ||
3317 register_chrdev_region(MKDEV(TTYAUX_MAJOR, 0), 1, "/dev/tty") < 0)
3318 panic("Couldn't register /dev/tty driver\n");
fbc92a34 3319 device_create(tty_class, NULL, MKDEV(TTYAUX_MAJOR, 0), NULL, "tty");
1da177e4
LT
3320
3321 cdev_init(&console_cdev, &console_fops);
3322 if (cdev_add(&console_cdev, MKDEV(TTYAUX_MAJOR, 1), 1) ||
3323 register_chrdev_region(MKDEV(TTYAUX_MAJOR, 1), 1, "/dev/console") < 0)
3324 panic("Couldn't register /dev/console driver\n");
fbc92a34 3325 consdev = device_create(tty_class, NULL, MKDEV(TTYAUX_MAJOR, 1), NULL,
47aa5793 3326 "console");
fbc92a34
KS
3327 if (IS_ERR(consdev))
3328 consdev = NULL;
3329 else
a2a6a822 3330 WARN_ON(device_create_file(consdev, &dev_attr_active) < 0);
1da177e4 3331
1da177e4 3332#ifdef CONFIG_VT
d81ed103 3333 vty_init(&console_fops);
1da177e4
LT
3334#endif
3335 return 0;
3336}
31d1d48e 3337