tty: Convert SAK messages to tty_notice()
[deliverable/linux.git] / drivers / tty / tty_io.c
CommitLineData
1da177e4 1/*
1da177e4
LT
2 * Copyright (C) 1991, 1992 Linus Torvalds
3 */
4
5/*
6 * 'tty_io.c' gives an orthogonal feeling to tty's, be they consoles
7 * or rs-channels. It also implements echoing, cooked mode etc.
8 *
9 * Kill-line thanks to John T Kohl, who also corrected VMIN = VTIME = 0.
10 *
11 * Modified by Theodore Ts'o, 9/14/92, to dynamically allocate the
12 * tty_struct and tty_queue structures. Previously there was an array
13 * of 256 tty_struct's which was statically allocated, and the
14 * tty_queue structures were allocated at boot time. Both are now
15 * dynamically allocated only when the tty is open.
16 *
17 * Also restructured routines so that there is more of a separation
18 * between the high-level tty routines (tty_io.c and tty_ioctl.c) and
19 * the low-level tty routines (serial.c, pty.c, console.c). This
37bdfb07 20 * makes for cleaner and more compact code. -TYT, 9/17/92
1da177e4
LT
21 *
22 * Modified by Fred N. van Kempen, 01/29/93, to add line disciplines
23 * which can be dynamically activated and de-activated by the line
24 * discipline handling modules (like SLIP).
25 *
26 * NOTE: pay no attention to the line discipline code (yet); its
27 * interface is still subject to change in this version...
28 * -- TYT, 1/31/92
29 *
30 * Added functionality to the OPOST tty handling. No delays, but all
31 * other bits should be there.
32 * -- Nick Holloway <alfie@dcs.warwick.ac.uk>, 27th May 1993.
33 *
34 * Rewrote canonical mode and added more termios flags.
35 * -- julian@uhunix.uhcc.hawaii.edu (J. Cowley), 13Jan94
36 *
37 * Reorganized FASYNC support so mouse code can share it.
38 * -- ctm@ardi.com, 9Sep95
39 *
40 * New TIOCLINUX variants added.
41 * -- mj@k332.feld.cvut.cz, 19-Nov-95
37bdfb07 42 *
1da177e4
LT
43 * Restrict vt switching via ioctl()
44 * -- grif@cs.ucr.edu, 5-Dec-95
45 *
46 * Move console and virtual terminal code to more appropriate files,
47 * implement CONFIG_VT and generalize console device interface.
48 * -- Marko Kohtala <Marko.Kohtala@hut.fi>, March 97
49 *
d81ed103 50 * Rewrote tty_init_dev and tty_release_dev to eliminate races.
1da177e4
LT
51 * -- Bill Hawes <whawes@star.net>, June 97
52 *
53 * Added devfs support.
54 * -- C. Scott Ananian <cananian@alumni.princeton.edu>, 13-Jan-1998
55 *
56 * Added support for a Unix98-style ptmx device.
57 * -- C. Scott Ananian <cananian@alumni.princeton.edu>, 14-Jan-1998
58 *
59 * Reduced memory usage for older ARM systems
60 * -- Russell King <rmk@arm.linux.org.uk>
61 *
62 * Move do_SAK() into process context. Less stack use in devfs functions.
37bdfb07
AC
63 * alloc_tty_struct() always uses kmalloc()
64 * -- Andrew Morton <andrewm@uow.edu.eu> 17Mar01
1da177e4
LT
65 */
66
1da177e4
LT
67#include <linux/types.h>
68#include <linux/major.h>
69#include <linux/errno.h>
70#include <linux/signal.h>
71#include <linux/fcntl.h>
72#include <linux/sched.h>
73#include <linux/interrupt.h>
74#include <linux/tty.h>
75#include <linux/tty_driver.h>
76#include <linux/tty_flip.h>
77#include <linux/devpts_fs.h>
78#include <linux/file.h>
9f3acc31 79#include <linux/fdtable.h>
1da177e4
LT
80#include <linux/console.h>
81#include <linux/timer.h>
82#include <linux/ctype.h>
83#include <linux/kd.h>
84#include <linux/mm.h>
85#include <linux/string.h>
86#include <linux/slab.h>
87#include <linux/poll.h>
88#include <linux/proc_fs.h>
89#include <linux/init.h>
90#include <linux/module.h>
1da177e4 91#include <linux/device.h>
1da177e4
LT
92#include <linux/wait.h>
93#include <linux/bitops.h>
b20f3ae5 94#include <linux/delay.h>
a352def2 95#include <linux/seq_file.h>
d281da7f 96#include <linux/serial.h>
5a3c6b25 97#include <linux/ratelimit.h>
1da177e4 98
a352def2 99#include <linux/uaccess.h>
1da177e4
LT
100
101#include <linux/kbd_kern.h>
102#include <linux/vt_kern.h>
103#include <linux/selection.h>
1da177e4
LT
104
105#include <linux/kmod.h>
b488893a 106#include <linux/nsproxy.h>
1da177e4
LT
107
108#undef TTY_DEBUG_HANGUP
accff793
PH
109#ifdef TTY_DEBUG_HANGUP
110# define tty_debug_hangup(tty, f, args...) tty_debug(tty, f, ##args)
111#else
112# define tty_debug_hangup(tty, f, args...) do { } while (0)
113#endif
1da177e4
LT
114
115#define TTY_PARANOIA_CHECK 1
116#define CHECK_TTY_COUNT 1
117
edc6afc5 118struct ktermios tty_std_termios = { /* for the benefit of tty drivers */
1da177e4
LT
119 .c_iflag = ICRNL | IXON,
120 .c_oflag = OPOST | ONLCR,
121 .c_cflag = B38400 | CS8 | CREAD | HUPCL,
122 .c_lflag = ISIG | ICANON | ECHO | ECHOE | ECHOK |
123 ECHOCTL | ECHOKE | IEXTEN,
edc6afc5
AC
124 .c_cc = INIT_C_CC,
125 .c_ispeed = 38400,
126 .c_ospeed = 38400
1da177e4
LT
127};
128
129EXPORT_SYMBOL(tty_std_termios);
130
131/* This list gets poked at by procfs and various bits of boot up code. This
132 could do with some rationalisation such as pulling the tty proc function
133 into this file */
37bdfb07 134
1da177e4
LT
135LIST_HEAD(tty_drivers); /* linked list of tty drivers */
136
24ec839c 137/* Mutex to protect creating and releasing a tty. This is shared with
1da177e4 138 vt.c for deeply disgusting hack reasons */
70522e12 139DEFINE_MUTEX(tty_mutex);
de2a84f2 140EXPORT_SYMBOL(tty_mutex);
1da177e4 141
ee2ffa0d
NP
142/* Spinlock to protect the tty->tty_files list */
143DEFINE_SPINLOCK(tty_files_lock);
144
1da177e4
LT
145static ssize_t tty_read(struct file *, char __user *, size_t, loff_t *);
146static ssize_t tty_write(struct file *, const char __user *, size_t, loff_t *);
37bdfb07
AC
147ssize_t redirected_tty_write(struct file *, const char __user *,
148 size_t, loff_t *);
1da177e4
LT
149static unsigned int tty_poll(struct file *, poll_table *);
150static int tty_open(struct inode *, struct file *);
04f378b1 151long tty_ioctl(struct file *file, unsigned int cmd, unsigned long arg);
e10cc1df 152#ifdef CONFIG_COMPAT
37bdfb07 153static long tty_compat_ioctl(struct file *file, unsigned int cmd,
e10cc1df
PF
154 unsigned long arg);
155#else
156#define tty_compat_ioctl NULL
157#endif
ec79d605 158static int __tty_fasync(int fd, struct file *filp, int on);
37bdfb07 159static int tty_fasync(int fd, struct file *filp, int on);
d5698c28 160static void release_tty(struct tty_struct *tty, int idx);
1da177e4 161
af9b897e
AC
162/**
163 * free_tty_struct - free a disused tty
164 * @tty: tty struct to free
165 *
166 * Free the write buffers, tty queue and tty memory itself.
167 *
168 * Locking: none. Must be called after tty is definitely unused
169 */
170
bf970ee4 171void free_tty_struct(struct tty_struct *tty)
1da177e4 172{
dc6802a7
DC
173 if (!tty)
174 return;
a211b1af 175 put_device(tty->dev);
1da177e4 176 kfree(tty->write_buf);
89c8d91e 177 tty->magic = 0xDEADDEAD;
1da177e4
LT
178 kfree(tty);
179}
180
d996b62a
NP
181static inline struct tty_struct *file_tty(struct file *file)
182{
183 return ((struct tty_file_private *)file->private_data)->tty;
184}
185
fa90e1c9 186int tty_alloc_file(struct file *file)
d996b62a
NP
187{
188 struct tty_file_private *priv;
189
f573bd17
PE
190 priv = kmalloc(sizeof(*priv), GFP_KERNEL);
191 if (!priv)
192 return -ENOMEM;
d996b62a 193
fa90e1c9
JS
194 file->private_data = priv;
195
196 return 0;
197}
198
199/* Associate a new file with the tty structure */
200void tty_add_file(struct tty_struct *tty, struct file *file)
201{
202 struct tty_file_private *priv = file->private_data;
203
d996b62a
NP
204 priv->tty = tty;
205 priv->file = file;
d996b62a
NP
206
207 spin_lock(&tty_files_lock);
208 list_add(&priv->list, &tty->tty_files);
209 spin_unlock(&tty_files_lock);
fa90e1c9 210}
f573bd17 211
fa90e1c9
JS
212/**
213 * tty_free_file - free file->private_data
214 *
215 * This shall be used only for fail path handling when tty_add_file was not
216 * called yet.
217 */
218void tty_free_file(struct file *file)
219{
220 struct tty_file_private *priv = file->private_data;
221
222 file->private_data = NULL;
223 kfree(priv);
d996b62a
NP
224}
225
226/* Delete file from its tty */
2520e274 227static void tty_del_file(struct file *file)
d996b62a
NP
228{
229 struct tty_file_private *priv = file->private_data;
230
231 spin_lock(&tty_files_lock);
232 list_del(&priv->list);
233 spin_unlock(&tty_files_lock);
fa90e1c9 234 tty_free_file(file);
d996b62a
NP
235}
236
237
1da177e4
LT
238#define TTY_NUMBER(tty) ((tty)->index + (tty)->driver->name_base)
239
af9b897e
AC
240/**
241 * tty_name - return tty naming
242 * @tty: tty structure
af9b897e
AC
243 *
244 * Convert a tty structure into a name. The name reflects the kernel
245 * naming policy and if udev is in use may not reflect user space
246 *
247 * Locking: none
248 */
249
429b4749 250const char *tty_name(const struct tty_struct *tty)
1da177e4
LT
251{
252 if (!tty) /* Hmm. NULL pointer. That's fun. */
917162c9
RV
253 return "NULL tty";
254 return tty->name;
1da177e4
LT
255}
256
257EXPORT_SYMBOL(tty_name);
258
0a083edd
PH
259const char *tty_driver_name(const struct tty_struct *tty)
260{
261 if (!tty || !tty->driver)
262 return "";
263 return tty->driver->name;
264}
265
82b8f888 266static int tty_paranoia_check(struct tty_struct *tty, struct inode *inode,
1da177e4
LT
267 const char *routine)
268{
269#ifdef TTY_PARANOIA_CHECK
270 if (!tty) {
271 printk(KERN_WARNING
272 "null TTY for (%d:%d) in %s\n",
273 imajor(inode), iminor(inode), routine);
274 return 1;
275 }
276 if (tty->magic != TTY_MAGIC) {
277 printk(KERN_WARNING
278 "bad magic number for tty struct (%d:%d) in %s\n",
279 imajor(inode), iminor(inode), routine);
280 return 1;
281 }
282#endif
283 return 0;
284}
285
deb287e7 286/* Caller must hold tty_lock */
1da177e4
LT
287static int check_tty_count(struct tty_struct *tty, const char *routine)
288{
289#ifdef CHECK_TTY_COUNT
290 struct list_head *p;
291 int count = 0;
37bdfb07 292
ee2ffa0d 293 spin_lock(&tty_files_lock);
1da177e4
LT
294 list_for_each(p, &tty->tty_files) {
295 count++;
296 }
ee2ffa0d 297 spin_unlock(&tty_files_lock);
1da177e4
LT
298 if (tty->driver->type == TTY_DRIVER_TYPE_PTY &&
299 tty->driver->subtype == PTY_TYPE_SLAVE &&
300 tty->link && tty->link->count)
301 count++;
302 if (tty->count != count) {
339f36ba
PH
303 tty_warn(tty, "%s: tty->count(%d) != #fd's(%d)\n",
304 routine, tty->count, count);
1da177e4 305 return count;
24ec839c 306 }
1da177e4
LT
307#endif
308 return 0;
309}
310
af9b897e
AC
311/**
312 * get_tty_driver - find device of a tty
313 * @dev_t: device identifier
314 * @index: returns the index of the tty
315 *
316 * This routine returns a tty driver structure, given a device number
317 * and also passes back the index number.
318 *
319 * Locking: caller must hold tty_mutex
1da177e4 320 */
af9b897e 321
1da177e4
LT
322static struct tty_driver *get_tty_driver(dev_t device, int *index)
323{
324 struct tty_driver *p;
325
326 list_for_each_entry(p, &tty_drivers, tty_drivers) {
327 dev_t base = MKDEV(p->major, p->minor_start);
328 if (device < base || device >= base + p->num)
329 continue;
330 *index = device - base;
7d7b93c1 331 return tty_driver_kref_get(p);
1da177e4
LT
332 }
333 return NULL;
334}
335
f2d937f3
JW
336#ifdef CONFIG_CONSOLE_POLL
337
338/**
339 * tty_find_polling_driver - find device of a polled tty
340 * @name: name string to match
341 * @line: pointer to resulting tty line nr
342 *
343 * This routine returns a tty driver structure, given a name
344 * and the condition that the tty driver is capable of polled
345 * operation.
346 */
347struct tty_driver *tty_find_polling_driver(char *name, int *line)
348{
349 struct tty_driver *p, *res = NULL;
350 int tty_line = 0;
0dca0fd2 351 int len;
5f0878ac 352 char *str, *stp;
f2d937f3 353
0dca0fd2
JW
354 for (str = name; *str; str++)
355 if ((*str >= '0' && *str <= '9') || *str == ',')
356 break;
357 if (!*str)
358 return NULL;
359
360 len = str - name;
361 tty_line = simple_strtoul(str, &str, 10);
362
f2d937f3
JW
363 mutex_lock(&tty_mutex);
364 /* Search through the tty devices to look for a match */
365 list_for_each_entry(p, &tty_drivers, tty_drivers) {
0dca0fd2
JW
366 if (strncmp(name, p->name, len) != 0)
367 continue;
5f0878ac
AC
368 stp = str;
369 if (*stp == ',')
370 stp++;
371 if (*stp == '\0')
372 stp = NULL;
f2d937f3 373
6eb68d6f 374 if (tty_line >= 0 && tty_line < p->num && p->ops &&
5f0878ac 375 p->ops->poll_init && !p->ops->poll_init(p, tty_line, stp)) {
7d7b93c1 376 res = tty_driver_kref_get(p);
f2d937f3
JW
377 *line = tty_line;
378 break;
379 }
380 }
381 mutex_unlock(&tty_mutex);
382
383 return res;
384}
385EXPORT_SYMBOL_GPL(tty_find_polling_driver);
386#endif
387
af9b897e
AC
388/**
389 * tty_check_change - check for POSIX terminal changes
390 * @tty: tty to check
391 *
392 * If we try to write to, or set the state of, a terminal and we're
393 * not in the foreground, send a SIGTTOU. If the signal is blocked or
394 * ignored, go ahead and perform the operation. (POSIX 7.2)
395 *
978e595f 396 * Locking: ctrl_lock
1da177e4 397 */
af9b897e 398
2812d9e9 399int __tty_check_change(struct tty_struct *tty, int sig)
1da177e4 400{
47f86834 401 unsigned long flags;
2812d9e9 402 struct pid *pgrp, *tty_pgrp;
47f86834
AC
403 int ret = 0;
404
1da177e4
LT
405 if (current->signal->tty != tty)
406 return 0;
47f86834 407
6719693c
PD
408 rcu_read_lock();
409 pgrp = task_pgrp(current);
410
47f86834 411 spin_lock_irqsave(&tty->ctrl_lock, flags);
2812d9e9 412 tty_pgrp = tty->pgrp;
9ffee4cb 413 spin_unlock_irqrestore(&tty->ctrl_lock, flags);
6719693c 414
2812d9e9
PH
415 if (tty_pgrp && pgrp != tty->pgrp) {
416 if (is_ignored(sig)) {
417 if (sig == SIGTTIN)
418 ret = -EIO;
419 } else if (is_current_pgrp_orphaned())
420 ret = -EIO;
421 else {
422 kill_pgrp(pgrp, sig, 1);
423 set_thread_flag(TIF_SIGPENDING);
424 ret = -ERESTARTSYS;
425 }
47f86834 426 }
6719693c 427 rcu_read_unlock();
2812d9e9 428
339f36ba
PH
429 if (!tty_pgrp)
430 tty_warn(tty, "sig=%d, tty->pgrp == NULL!\n", sig);
2812d9e9 431
47f86834 432 return ret;
1da177e4
LT
433}
434
2812d9e9
PH
435int tty_check_change(struct tty_struct *tty)
436{
437 return __tty_check_change(tty, SIGTTOU);
438}
1da177e4
LT
439EXPORT_SYMBOL(tty_check_change);
440
37bdfb07 441static ssize_t hung_up_tty_read(struct file *file, char __user *buf,
1da177e4
LT
442 size_t count, loff_t *ppos)
443{
444 return 0;
445}
446
37bdfb07 447static ssize_t hung_up_tty_write(struct file *file, const char __user *buf,
1da177e4
LT
448 size_t count, loff_t *ppos)
449{
450 return -EIO;
451}
452
453/* No kernel lock held - none needed ;) */
37bdfb07 454static unsigned int hung_up_tty_poll(struct file *filp, poll_table *wait)
1da177e4
LT
455{
456 return POLLIN | POLLOUT | POLLERR | POLLHUP | POLLRDNORM | POLLWRNORM;
457}
458
04f378b1
AC
459static long hung_up_tty_ioctl(struct file *file, unsigned int cmd,
460 unsigned long arg)
38ad2ed0
PF
461{
462 return cmd == TIOCSPGRP ? -ENOTTY : -EIO;
463}
464
37bdfb07 465static long hung_up_tty_compat_ioctl(struct file *file,
38ad2ed0 466 unsigned int cmd, unsigned long arg)
1da177e4
LT
467{
468 return cmd == TIOCSPGRP ? -ENOTTY : -EIO;
469}
470
62322d25 471static const struct file_operations tty_fops = {
1da177e4
LT
472 .llseek = no_llseek,
473 .read = tty_read,
474 .write = tty_write,
475 .poll = tty_poll,
04f378b1 476 .unlocked_ioctl = tty_ioctl,
e10cc1df 477 .compat_ioctl = tty_compat_ioctl,
1da177e4
LT
478 .open = tty_open,
479 .release = tty_release,
480 .fasync = tty_fasync,
481};
482
62322d25 483static const struct file_operations console_fops = {
1da177e4
LT
484 .llseek = no_llseek,
485 .read = tty_read,
486 .write = redirected_tty_write,
487 .poll = tty_poll,
04f378b1 488 .unlocked_ioctl = tty_ioctl,
e10cc1df 489 .compat_ioctl = tty_compat_ioctl,
1da177e4
LT
490 .open = tty_open,
491 .release = tty_release,
492 .fasync = tty_fasync,
493};
494
62322d25 495static const struct file_operations hung_up_tty_fops = {
1da177e4
LT
496 .llseek = no_llseek,
497 .read = hung_up_tty_read,
498 .write = hung_up_tty_write,
499 .poll = hung_up_tty_poll,
04f378b1 500 .unlocked_ioctl = hung_up_tty_ioctl,
38ad2ed0 501 .compat_ioctl = hung_up_tty_compat_ioctl,
1da177e4
LT
502 .release = tty_release,
503};
504
505static DEFINE_SPINLOCK(redirect_lock);
506static struct file *redirect;
507
11d9befd
PH
508
509void proc_clear_tty(struct task_struct *p)
510{
511 unsigned long flags;
512 struct tty_struct *tty;
513 spin_lock_irqsave(&p->sighand->siglock, flags);
514 tty = p->signal->tty;
515 p->signal->tty = NULL;
516 spin_unlock_irqrestore(&p->sighand->siglock, flags);
517 tty_kref_put(tty);
518}
519
2c411c11
PH
520/**
521 * proc_set_tty - set the controlling terminal
522 *
523 * Only callable by the session leader and only if it does not already have
524 * a controlling terminal.
525 *
e218eb32
PH
526 * Caller must hold: tty_lock()
527 * a readlock on tasklist_lock
2c411c11
PH
528 * sighand lock
529 */
bce65f18 530static void __proc_set_tty(struct tty_struct *tty)
11d9befd 531{
ae28fa72
PH
532 unsigned long flags;
533
ae28fa72 534 spin_lock_irqsave(&tty->ctrl_lock, flags);
a361858d
PH
535 /*
536 * The session and fg pgrp references will be non-NULL if
537 * tiocsctty() is stealing the controlling tty
538 */
ae28fa72
PH
539 put_pid(tty->session);
540 put_pid(tty->pgrp);
541 tty->pgrp = get_pid(task_pgrp(current));
542 spin_unlock_irqrestore(&tty->ctrl_lock, flags);
543 tty->session = get_pid(task_session(current));
544 if (current->signal->tty) {
e2dfa3d3
PH
545 tty_debug(tty, "current tty %s not NULL!!\n",
546 current->signal->tty->name);
ae28fa72 547 tty_kref_put(current->signal->tty);
11d9befd 548 }
bce65f18
PH
549 put_pid(current->signal->tty_old_pgrp);
550 current->signal->tty = tty_kref_get(tty);
551 current->signal->tty_old_pgrp = NULL;
11d9befd
PH
552}
553
bce65f18 554static void proc_set_tty(struct tty_struct *tty)
11d9befd 555{
bce65f18
PH
556 spin_lock_irq(&current->sighand->siglock);
557 __proc_set_tty(tty);
558 spin_unlock_irq(&current->sighand->siglock);
11d9befd
PH
559}
560
561struct tty_struct *get_current_tty(void)
562{
563 struct tty_struct *tty;
564 unsigned long flags;
565
566 spin_lock_irqsave(&current->sighand->siglock, flags);
567 tty = tty_kref_get(current->signal->tty);
568 spin_unlock_irqrestore(&current->sighand->siglock, flags);
569 return tty;
570}
571EXPORT_SYMBOL_GPL(get_current_tty);
572
573static void session_clear_tty(struct pid *session)
574{
575 struct task_struct *p;
576 do_each_pid_task(session, PIDTYPE_SID, p) {
577 proc_clear_tty(p);
578 } while_each_pid_task(session, PIDTYPE_SID, p);
579}
580
1da177e4
LT
581/**
582 * tty_wakeup - request more data
583 * @tty: terminal
584 *
585 * Internal and external helper for wakeups of tty. This function
586 * informs the line discipline if present that the driver is ready
587 * to receive more output data.
588 */
37bdfb07 589
1da177e4
LT
590void tty_wakeup(struct tty_struct *tty)
591{
592 struct tty_ldisc *ld;
37bdfb07 593
1da177e4
LT
594 if (test_bit(TTY_DO_WRITE_WAKEUP, &tty->flags)) {
595 ld = tty_ldisc_ref(tty);
37bdfb07 596 if (ld) {
a352def2
AC
597 if (ld->ops->write_wakeup)
598 ld->ops->write_wakeup(tty);
1da177e4
LT
599 tty_ldisc_deref(ld);
600 }
601 }
4b19449d 602 wake_up_interruptible_poll(&tty->write_wait, POLLOUT);
1da177e4
LT
603}
604
605EXPORT_SYMBOL_GPL(tty_wakeup);
606
ea648a47
PH
607/**
608 * tty_signal_session_leader - sends SIGHUP to session leader
f91e2590
PH
609 * @tty controlling tty
610 * @exit_session if non-zero, signal all foreground group processes
ea648a47 611 *
f91e2590
PH
612 * Send SIGHUP and SIGCONT to the session leader and its process group.
613 * Optionally, signal all processes in the foreground process group.
ea648a47
PH
614 *
615 * Returns the number of processes in the session with this tty
616 * as their controlling terminal. This value is used to drop
617 * tty references for those processes.
618 */
f91e2590 619static int tty_signal_session_leader(struct tty_struct *tty, int exit_session)
ea648a47
PH
620{
621 struct task_struct *p;
ea648a47 622 int refs = 0;
f91e2590 623 struct pid *tty_pgrp = NULL;
ea648a47
PH
624
625 read_lock(&tasklist_lock);
626 if (tty->session) {
627 do_each_pid_task(tty->session, PIDTYPE_SID, p) {
628 spin_lock_irq(&p->sighand->siglock);
629 if (p->signal->tty == tty) {
630 p->signal->tty = NULL;
631 /* We defer the dereferences outside fo
632 the tasklist lock */
633 refs++;
634 }
635 if (!p->signal->leader) {
636 spin_unlock_irq(&p->sighand->siglock);
637 continue;
638 }
639 __group_send_sig_info(SIGHUP, SEND_SIG_PRIV, p);
640 __group_send_sig_info(SIGCONT, SEND_SIG_PRIV, p);
641 put_pid(p->signal->tty_old_pgrp); /* A noop */
bc30c3b2 642 spin_lock(&tty->ctrl_lock);
f91e2590 643 tty_pgrp = get_pid(tty->pgrp);
ea648a47
PH
644 if (tty->pgrp)
645 p->signal->tty_old_pgrp = get_pid(tty->pgrp);
bc30c3b2 646 spin_unlock(&tty->ctrl_lock);
ea648a47
PH
647 spin_unlock_irq(&p->sighand->siglock);
648 } while_each_pid_task(tty->session, PIDTYPE_SID, p);
649 }
650 read_unlock(&tasklist_lock);
651
f91e2590
PH
652 if (tty_pgrp) {
653 if (exit_session)
654 kill_pgrp(tty_pgrp, SIGHUP, exit_session);
655 put_pid(tty_pgrp);
656 }
657
ea648a47
PH
658 return refs;
659}
660
af9b897e 661/**
11dbf203 662 * __tty_hangup - actual handler for hangup events
65f27f38 663 * @work: tty device
af9b897e 664 *
ef4f527c 665 * This can be called by a "kworker" kernel thread. That is process
af9b897e
AC
666 * synchronous but doesn't hold any locks, so we need to make sure we
667 * have the appropriate locks for what we're doing.
668 *
669 * The hangup event clears any pending redirections onto the hung up
670 * device. It ensures future writes will error and it does the needed
671 * line discipline hangup and signal delivery. The tty object itself
672 * remains intact.
673 *
674 * Locking:
ec79d605 675 * BTM
24ec839c
PZ
676 * redirect lock for undoing redirection
677 * file list lock for manipulating list of ttys
137084bb 678 * tty_ldiscs_lock from called functions
6a1c0680 679 * termios_rwsem resetting termios data
24ec839c
PZ
680 * tasklist_lock to walk task list for hangup event
681 * ->siglock to protect ->signal/->sighand
1da177e4 682 */
f91e2590 683static void __tty_hangup(struct tty_struct *tty, int exit_session)
1da177e4 684{
37bdfb07 685 struct file *cons_filp = NULL;
1da177e4 686 struct file *filp, *f = NULL;
d996b62a 687 struct tty_file_private *priv;
1da177e4 688 int closecount = 0, n;
ea648a47 689 int refs;
1da177e4
LT
690
691 if (!tty)
692 return;
693
1da177e4
LT
694
695 spin_lock(&redirect_lock);
d996b62a 696 if (redirect && file_tty(redirect) == tty) {
1da177e4
LT
697 f = redirect;
698 redirect = NULL;
699 }
700 spin_unlock(&redirect_lock);
37bdfb07 701
89c8d91e 702 tty_lock(tty);
11dbf203 703
cb50e523
PH
704 if (test_bit(TTY_HUPPED, &tty->flags)) {
705 tty_unlock(tty);
706 return;
707 }
708
ec79d605
AB
709 /* inuse_filps is protected by the single tty lock,
710 this really needs to change if we want to flush the
711 workqueue with the lock held */
11dbf203 712 check_tty_count(tty, "tty_hangup");
36ba782e 713
ee2ffa0d 714 spin_lock(&tty_files_lock);
1da177e4 715 /* This breaks for file handles being sent over AF_UNIX sockets ? */
d996b62a
NP
716 list_for_each_entry(priv, &tty->tty_files, list) {
717 filp = priv->file;
1da177e4
LT
718 if (filp->f_op->write == redirected_tty_write)
719 cons_filp = filp;
720 if (filp->f_op->write != tty_write)
721 continue;
722 closecount++;
ec79d605 723 __tty_fasync(-1, filp, 0); /* can't block */
1da177e4
LT
724 filp->f_op = &hung_up_tty_fops;
725 }
ee2ffa0d 726 spin_unlock(&tty_files_lock);
37bdfb07 727
25fdf243
PH
728 refs = tty_signal_session_leader(tty, exit_session);
729 /* Account for the p->signal references we killed */
730 while (refs--)
731 tty_kref_put(tty);
732
c65c9bc3 733 tty_ldisc_hangup(tty);
37bdfb07 734
20cc225b 735 spin_lock_irq(&tty->ctrl_lock);
c65c9bc3 736 clear_bit(TTY_THROTTLED, &tty->flags);
c65c9bc3 737 clear_bit(TTY_DO_WRITE_WAKEUP, &tty->flags);
d9c1e9a8
EB
738 put_pid(tty->session);
739 put_pid(tty->pgrp);
ab521dc0
EB
740 tty->session = NULL;
741 tty->pgrp = NULL;
1da177e4 742 tty->ctrl_status = 0;
20cc225b 743 spin_unlock_irq(&tty->ctrl_lock);
9c9f4ded 744
1da177e4 745 /*
37bdfb07
AC
746 * If one of the devices matches a console pointer, we
747 * cannot just call hangup() because that will cause
748 * tty->count and state->count to go out of sync.
749 * So we just call close() the right number of times.
1da177e4
LT
750 */
751 if (cons_filp) {
f34d7a5b 752 if (tty->ops->close)
1da177e4 753 for (n = 0; n < closecount; n++)
f34d7a5b
AC
754 tty->ops->close(tty, cons_filp);
755 } else if (tty->ops->hangup)
7c6d340f 756 tty->ops->hangup(tty);
37bdfb07
AC
757 /*
758 * We don't want to have driver/ldisc interactions beyond
759 * the ones we did here. The driver layer expects no
760 * calls after ->hangup() from the ldisc side. However we
761 * can't yet guarantee all that.
762 */
1da177e4 763 set_bit(TTY_HUPPED, &tty->flags);
89c8d91e 764 tty_unlock(tty);
11dbf203 765
1da177e4
LT
766 if (f)
767 fput(f);
768}
769
ddcd9fb6
AB
770static void do_tty_hangup(struct work_struct *work)
771{
772 struct tty_struct *tty =
773 container_of(work, struct tty_struct, hangup_work);
774
f91e2590 775 __tty_hangup(tty, 0);
ddcd9fb6
AB
776}
777
af9b897e
AC
778/**
779 * tty_hangup - trigger a hangup event
780 * @tty: tty to hangup
781 *
782 * A carrier loss (virtual or otherwise) has occurred on this like
783 * schedule a hangup sequence to run after this event.
784 */
785
37bdfb07 786void tty_hangup(struct tty_struct *tty)
1da177e4 787{
accff793 788 tty_debug_hangup(tty, "\n");
1da177e4
LT
789 schedule_work(&tty->hangup_work);
790}
791
792EXPORT_SYMBOL(tty_hangup);
793
af9b897e
AC
794/**
795 * tty_vhangup - process vhangup
796 * @tty: tty to hangup
797 *
798 * The user has asked via system call for the terminal to be hung up.
799 * We do this synchronously so that when the syscall returns the process
3a4fa0a2 800 * is complete. That guarantee is necessary for security reasons.
af9b897e
AC
801 */
802
37bdfb07 803void tty_vhangup(struct tty_struct *tty)
1da177e4 804{
accff793 805 tty_debug_hangup(tty, "\n");
f91e2590 806 __tty_hangup(tty, 0);
1da177e4 807}
37bdfb07 808
1da177e4
LT
809EXPORT_SYMBOL(tty_vhangup);
810
11dbf203 811
2cb5998b
AC
812/**
813 * tty_vhangup_self - process vhangup for own ctty
814 *
815 * Perform a vhangup on the current controlling tty
816 */
817
818void tty_vhangup_self(void)
819{
820 struct tty_struct *tty;
821
2cb5998b
AC
822 tty = get_current_tty();
823 if (tty) {
824 tty_vhangup(tty);
825 tty_kref_put(tty);
826 }
2cb5998b
AC
827}
828
f91e2590
PH
829/**
830 * tty_vhangup_session - hangup session leader exit
831 * @tty: tty to hangup
832 *
833 * The session leader is exiting and hanging up its controlling terminal.
834 * Every process in the foreground process group is signalled SIGHUP.
835 *
836 * We do this synchronously so that when the syscall returns the process
837 * is complete. That guarantee is necessary for security reasons.
838 */
839
44a459fd 840static void tty_vhangup_session(struct tty_struct *tty)
f91e2590 841{
accff793 842 tty_debug_hangup(tty, "\n");
f91e2590
PH
843 __tty_hangup(tty, 1);
844}
845
af9b897e
AC
846/**
847 * tty_hung_up_p - was tty hung up
848 * @filp: file pointer of tty
849 *
850 * Return true if the tty has been subject to a vhangup or a carrier
851 * loss
852 */
853
37bdfb07 854int tty_hung_up_p(struct file *filp)
1da177e4
LT
855{
856 return (filp->f_op == &hung_up_tty_fops);
857}
858
859EXPORT_SYMBOL(tty_hung_up_p);
860
af9b897e
AC
861/**
862 * disassociate_ctty - disconnect controlling tty
863 * @on_exit: true if exiting so need to "hang up" the session
1da177e4 864 *
af9b897e
AC
865 * This function is typically called only by the session leader, when
866 * it wants to disassociate itself from its controlling tty.
867 *
868 * It performs the following functions:
1da177e4
LT
869 * (1) Sends a SIGHUP and SIGCONT to the foreground process group
870 * (2) Clears the tty from being controlling the session
871 * (3) Clears the controlling tty for all processes in the
872 * session group.
873 *
af9b897e
AC
874 * The argument on_exit is set to 1 if called when a process is
875 * exiting; it is 0 if called by the ioctl TIOCNOTTY.
876 *
24ec839c 877 * Locking:
ec79d605
AB
878 * BTM is taken for hysterical raisins, and held when
879 * called from no_tty().
24ec839c
PZ
880 * tty_mutex is taken to protect tty
881 * ->siglock is taken to protect ->signal/->sighand
882 * tasklist_lock is taken to walk process list for sessions
883 * ->siglock is taken to protect ->signal/->sighand
1da177e4 884 */
af9b897e 885
1da177e4
LT
886void disassociate_ctty(int on_exit)
887{
888 struct tty_struct *tty;
1da177e4 889
5ec93d11
AC
890 if (!current->signal->leader)
891 return;
1da177e4 892
24ec839c 893 tty = get_current_tty();
1da177e4 894 if (tty) {
f91e2590
PH
895 if (on_exit && tty->driver->type != TTY_DRIVER_TYPE_PTY) {
896 tty_vhangup_session(tty);
897 } else {
898 struct pid *tty_pgrp = tty_get_pgrp(tty);
899 if (tty_pgrp) {
900 kill_pgrp(tty_pgrp, SIGHUP, on_exit);
03e12617
ON
901 if (!on_exit)
902 kill_pgrp(tty_pgrp, SIGCONT, on_exit);
f91e2590
PH
903 put_pid(tty_pgrp);
904 }
1411dc4a 905 }
f91e2590
PH
906 tty_kref_put(tty);
907
680a9671 908 } else if (on_exit) {
ab521dc0 909 struct pid *old_pgrp;
680a9671
EB
910 spin_lock_irq(&current->sighand->siglock);
911 old_pgrp = current->signal->tty_old_pgrp;
ab521dc0 912 current->signal->tty_old_pgrp = NULL;
680a9671 913 spin_unlock_irq(&current->sighand->siglock);
24ec839c 914 if (old_pgrp) {
ab521dc0
EB
915 kill_pgrp(old_pgrp, SIGHUP, on_exit);
916 kill_pgrp(old_pgrp, SIGCONT, on_exit);
917 put_pid(old_pgrp);
1da177e4 918 }
1da177e4
LT
919 return;
920 }
1da177e4 921
24ec839c 922 spin_lock_irq(&current->sighand->siglock);
2a65f1d9 923 put_pid(current->signal->tty_old_pgrp);
23cac8de 924 current->signal->tty_old_pgrp = NULL;
24ec839c 925
c70dbb1e 926 tty = tty_kref_get(current->signal->tty);
24ec839c 927 if (tty) {
47f86834
AC
928 unsigned long flags;
929 spin_lock_irqsave(&tty->ctrl_lock, flags);
ab521dc0
EB
930 put_pid(tty->session);
931 put_pid(tty->pgrp);
932 tty->session = NULL;
933 tty->pgrp = NULL;
47f86834 934 spin_unlock_irqrestore(&tty->ctrl_lock, flags);
452a00d2 935 tty_kref_put(tty);
accff793
PH
936 } else
937 tty_debug_hangup(tty, "no current tty\n");
1da177e4 938
c70dbb1e 939 spin_unlock_irq(&current->sighand->siglock);
1da177e4
LT
940 /* Now clear signal->tty under the lock */
941 read_lock(&tasklist_lock);
ab521dc0 942 session_clear_tty(task_session(current));
1da177e4 943 read_unlock(&tasklist_lock);
1da177e4
LT
944}
945
98a27ba4
EB
946/**
947 *
948 * no_tty - Ensure the current process does not have a controlling tty
949 */
950void no_tty(void)
951{
3af502b9
AC
952 /* FIXME: Review locking here. The tty_lock never covered any race
953 between a new association and proc_clear_tty but possible we need
954 to protect against this anyway */
98a27ba4 955 struct task_struct *tsk = current;
5ec93d11 956 disassociate_ctty(0);
98a27ba4
EB
957 proc_clear_tty(tsk);
958}
959
af9b897e
AC
960
961/**
beb7dd86 962 * stop_tty - propagate flow control
af9b897e
AC
963 * @tty: tty to stop
964 *
01adc807 965 * Perform flow control to the driver. May be called
af9b897e
AC
966 * on an already stopped device and will not re-call the driver
967 * method.
968 *
969 * This functionality is used by both the line disciplines for
970 * halting incoming flow and by the driver. It may therefore be
971 * called from any context, may be under the tty atomic_write_lock
972 * but not always.
973 *
974 * Locking:
f9e053dc 975 * flow_lock
af9b897e
AC
976 */
977
f9e053dc 978void __stop_tty(struct tty_struct *tty)
1da177e4 979{
f9e053dc 980 if (tty->stopped)
1da177e4
LT
981 return;
982 tty->stopped = 1;
f34d7a5b 983 if (tty->ops->stop)
c961bfb1 984 tty->ops->stop(tty);
1da177e4
LT
985}
986
f9e053dc
PH
987void stop_tty(struct tty_struct *tty)
988{
989 unsigned long flags;
990
991 spin_lock_irqsave(&tty->flow_lock, flags);
992 __stop_tty(tty);
993 spin_unlock_irqrestore(&tty->flow_lock, flags);
994}
1da177e4
LT
995EXPORT_SYMBOL(stop_tty);
996
af9b897e 997/**
beb7dd86 998 * start_tty - propagate flow control
af9b897e
AC
999 * @tty: tty to start
1000 *
01adc807
PH
1001 * Start a tty that has been stopped if at all possible. If this
1002 * tty was previous stopped and is now being started, the driver
1003 * start method is invoked and the line discipline woken.
af9b897e
AC
1004 *
1005 * Locking:
f9e053dc 1006 * flow_lock
af9b897e
AC
1007 */
1008
f9e053dc 1009void __start_tty(struct tty_struct *tty)
1da177e4 1010{
f9e053dc 1011 if (!tty->stopped || tty->flow_stopped)
1da177e4
LT
1012 return;
1013 tty->stopped = 0;
f34d7a5b 1014 if (tty->ops->start)
c961bfb1 1015 tty->ops->start(tty);
1da177e4 1016 tty_wakeup(tty);
1da177e4
LT
1017}
1018
f9e053dc
PH
1019void start_tty(struct tty_struct *tty)
1020{
1021 unsigned long flags;
1022
1023 spin_lock_irqsave(&tty->flow_lock, flags);
1024 __start_tty(tty);
1025 spin_unlock_irqrestore(&tty->flow_lock, flags);
1026}
1da177e4
LT
1027EXPORT_SYMBOL(start_tty);
1028
37b7f3c7
JS
1029static void tty_update_time(struct timespec *time)
1030{
f0bf0bd0 1031 unsigned long sec = get_seconds();
fbf47635
GKH
1032
1033 /*
1034 * We only care if the two values differ in anything other than the
1035 * lower three bits (i.e every 8 seconds). If so, then we can update
1036 * the time of the tty device, otherwise it could be construded as a
1037 * security leak to let userspace know the exact timing of the tty.
1038 */
1039 if ((sec ^ time->tv_sec) & ~7)
37b7f3c7
JS
1040 time->tv_sec = sec;
1041}
1042
af9b897e
AC
1043/**
1044 * tty_read - read method for tty device files
1045 * @file: pointer to tty file
1046 * @buf: user buffer
1047 * @count: size of user buffer
1048 * @ppos: unused
1049 *
1050 * Perform the read system call function on this terminal device. Checks
1051 * for hung up devices before calling the line discipline method.
1052 *
1053 * Locking:
47f86834
AC
1054 * Locks the line discipline internally while needed. Multiple
1055 * read calls may be outstanding in parallel.
af9b897e
AC
1056 */
1057
37bdfb07 1058static ssize_t tty_read(struct file *file, char __user *buf, size_t count,
1da177e4
LT
1059 loff_t *ppos)
1060{
1061 int i;
37b7f3c7 1062 struct inode *inode = file_inode(file);
d996b62a 1063 struct tty_struct *tty = file_tty(file);
1da177e4
LT
1064 struct tty_ldisc *ld;
1065
37b7f3c7 1066 if (tty_paranoia_check(tty, inode, "tty_read"))
1da177e4
LT
1067 return -EIO;
1068 if (!tty || (test_bit(TTY_IO_ERROR, &tty->flags)))
1069 return -EIO;
1070
1071 /* We want to wait for the line discipline to sort out in this
1072 situation */
1073 ld = tty_ldisc_ref_wait(tty);
a352def2 1074 if (ld->ops->read)
c961bfb1 1075 i = ld->ops->read(tty, file, buf, count);
1da177e4
LT
1076 else
1077 i = -EIO;
1078 tty_ldisc_deref(ld);
b0de59b5 1079
37b7f3c7
JS
1080 if (i > 0)
1081 tty_update_time(&inode->i_atime);
1082
1da177e4
LT
1083 return i;
1084}
1085
136d5258 1086static void tty_write_unlock(struct tty_struct *tty)
9c1729db
AC
1087{
1088 mutex_unlock(&tty->atomic_write_lock);
4b19449d 1089 wake_up_interruptible_poll(&tty->write_wait, POLLOUT);
9c1729db
AC
1090}
1091
136d5258 1092static int tty_write_lock(struct tty_struct *tty, int ndelay)
9c1729db
AC
1093{
1094 if (!mutex_trylock(&tty->atomic_write_lock)) {
1095 if (ndelay)
1096 return -EAGAIN;
1097 if (mutex_lock_interruptible(&tty->atomic_write_lock))
1098 return -ERESTARTSYS;
1099 }
1100 return 0;
1101}
1102
1da177e4
LT
1103/*
1104 * Split writes up in sane blocksizes to avoid
1105 * denial-of-service type attacks
1106 */
1107static inline ssize_t do_tty_write(
1108 ssize_t (*write)(struct tty_struct *, struct file *, const unsigned char *, size_t),
1109 struct tty_struct *tty,
1110 struct file *file,
1111 const char __user *buf,
1112 size_t count)
1113{
9c1729db 1114 ssize_t ret, written = 0;
1da177e4 1115 unsigned int chunk;
37bdfb07 1116
9c1729db
AC
1117 ret = tty_write_lock(tty, file->f_flags & O_NDELAY);
1118 if (ret < 0)
1119 return ret;
1da177e4
LT
1120
1121 /*
1122 * We chunk up writes into a temporary buffer. This
1123 * simplifies low-level drivers immensely, since they
1124 * don't have locking issues and user mode accesses.
1125 *
1126 * But if TTY_NO_WRITE_SPLIT is set, we should use a
1127 * big chunk-size..
1128 *
1129 * The default chunk-size is 2kB, because the NTTY
1130 * layer has problems with bigger chunks. It will
1131 * claim to be able to handle more characters than
1132 * it actually does.
af9b897e
AC
1133 *
1134 * FIXME: This can probably go away now except that 64K chunks
1135 * are too likely to fail unless switched to vmalloc...
1da177e4
LT
1136 */
1137 chunk = 2048;
1138 if (test_bit(TTY_NO_WRITE_SPLIT, &tty->flags))
1139 chunk = 65536;
1140 if (count < chunk)
1141 chunk = count;
1142
70522e12 1143 /* write_buf/write_cnt is protected by the atomic_write_lock mutex */
1da177e4 1144 if (tty->write_cnt < chunk) {
402fda92 1145 unsigned char *buf_chunk;
1da177e4
LT
1146
1147 if (chunk < 1024)
1148 chunk = 1024;
1149
402fda92
JW
1150 buf_chunk = kmalloc(chunk, GFP_KERNEL);
1151 if (!buf_chunk) {
9c1729db
AC
1152 ret = -ENOMEM;
1153 goto out;
1da177e4
LT
1154 }
1155 kfree(tty->write_buf);
1156 tty->write_cnt = chunk;
402fda92 1157 tty->write_buf = buf_chunk;
1da177e4
LT
1158 }
1159
1160 /* Do the write .. */
1161 for (;;) {
1162 size_t size = count;
1163 if (size > chunk)
1164 size = chunk;
1165 ret = -EFAULT;
1166 if (copy_from_user(tty->write_buf, buf, size))
1167 break;
1da177e4 1168 ret = write(tty, file, tty->write_buf, size);
1da177e4
LT
1169 if (ret <= 0)
1170 break;
1171 written += ret;
1172 buf += ret;
1173 count -= ret;
1174 if (!count)
1175 break;
1176 ret = -ERESTARTSYS;
1177 if (signal_pending(current))
1178 break;
1179 cond_resched();
1180 }
37b7f3c7
JS
1181 if (written) {
1182 tty_update_time(&file_inode(file)->i_mtime);
1da177e4 1183 ret = written;
37b7f3c7 1184 }
9c1729db
AC
1185out:
1186 tty_write_unlock(tty);
1da177e4
LT
1187 return ret;
1188}
1189
95f9bfc6
AC
1190/**
1191 * tty_write_message - write a message to a certain tty, not just the console.
1192 * @tty: the destination tty_struct
1193 * @msg: the message to write
1194 *
1195 * This is used for messages that need to be redirected to a specific tty.
1196 * We don't put it into the syslog queue right now maybe in the future if
1197 * really needed.
1198 *
ec79d605 1199 * We must still hold the BTM and test the CLOSING flag for the moment.
95f9bfc6
AC
1200 */
1201
1202void tty_write_message(struct tty_struct *tty, char *msg)
1203{
95f9bfc6
AC
1204 if (tty) {
1205 mutex_lock(&tty->atomic_write_lock);
89c8d91e 1206 tty_lock(tty);
4b41b953 1207 if (tty->ops->write && tty->count > 0)
95f9bfc6 1208 tty->ops->write(tty, msg, strlen(msg));
4b41b953 1209 tty_unlock(tty);
95f9bfc6
AC
1210 tty_write_unlock(tty);
1211 }
95f9bfc6
AC
1212 return;
1213}
1214
1da177e4 1215
af9b897e
AC
1216/**
1217 * tty_write - write method for tty device file
1218 * @file: tty file pointer
1219 * @buf: user data to write
1220 * @count: bytes to write
1221 * @ppos: unused
1222 *
1223 * Write data to a tty device via the line discipline.
1224 *
1225 * Locking:
1226 * Locks the line discipline as required
1227 * Writes to the tty driver are serialized by the atomic_write_lock
1228 * and are then processed in chunks to the device. The line discipline
a88a69c9 1229 * write method will not be invoked in parallel for each device.
af9b897e
AC
1230 */
1231
37bdfb07
AC
1232static ssize_t tty_write(struct file *file, const char __user *buf,
1233 size_t count, loff_t *ppos)
1da177e4 1234{
d996b62a
NP
1235 struct tty_struct *tty = file_tty(file);
1236 struct tty_ldisc *ld;
1da177e4 1237 ssize_t ret;
37bdfb07 1238
6131ffaa 1239 if (tty_paranoia_check(tty, file_inode(file), "tty_write"))
1da177e4 1240 return -EIO;
f34d7a5b 1241 if (!tty || !tty->ops->write ||
37bdfb07
AC
1242 (test_bit(TTY_IO_ERROR, &tty->flags)))
1243 return -EIO;
f34d7a5b
AC
1244 /* Short term debug to catch buggy drivers */
1245 if (tty->ops->write_room == NULL)
339f36ba 1246 tty_err(tty, "missing write_room method\n");
37bdfb07 1247 ld = tty_ldisc_ref_wait(tty);
a352def2 1248 if (!ld->ops->write)
1da177e4
LT
1249 ret = -EIO;
1250 else
a352def2 1251 ret = do_tty_write(ld->ops->write, tty, file, buf, count);
1da177e4
LT
1252 tty_ldisc_deref(ld);
1253 return ret;
1254}
1255
37bdfb07
AC
1256ssize_t redirected_tty_write(struct file *file, const char __user *buf,
1257 size_t count, loff_t *ppos)
1da177e4
LT
1258{
1259 struct file *p = NULL;
1260
1261 spin_lock(&redirect_lock);
cb0942b8
AV
1262 if (redirect)
1263 p = get_file(redirect);
1da177e4
LT
1264 spin_unlock(&redirect_lock);
1265
1266 if (p) {
1267 ssize_t res;
1268 res = vfs_write(p, buf, count, &p->f_pos);
1269 fput(p);
1270 return res;
1271 }
1da177e4
LT
1272 return tty_write(file, buf, count, ppos);
1273}
1274
136d5258
PH
1275/**
1276 * tty_send_xchar - send priority character
1277 *
1278 * Send a high priority character to the tty even if stopped
1279 *
1280 * Locking: none for xchar method, write ordering for write method.
1281 */
1282
1283int tty_send_xchar(struct tty_struct *tty, char ch)
1284{
1285 int was_stopped = tty->stopped;
1286
1287 if (tty->ops->send_xchar) {
ee0c1a65 1288 down_read(&tty->termios_rwsem);
136d5258 1289 tty->ops->send_xchar(tty, ch);
ee0c1a65 1290 up_read(&tty->termios_rwsem);
136d5258
PH
1291 return 0;
1292 }
1293
1294 if (tty_write_lock(tty, 0) < 0)
1295 return -ERESTARTSYS;
1296
ee0c1a65 1297 down_read(&tty->termios_rwsem);
136d5258
PH
1298 if (was_stopped)
1299 start_tty(tty);
1300 tty->ops->write(tty, &ch, 1);
1301 if (was_stopped)
1302 stop_tty(tty);
ee0c1a65 1303 up_read(&tty->termios_rwsem);
136d5258
PH
1304 tty_write_unlock(tty);
1305 return 0;
1306}
1307
1da177e4
LT
1308static char ptychar[] = "pqrstuvwxyzabcde";
1309
af9b897e
AC
1310/**
1311 * pty_line_name - generate name for a pty
1312 * @driver: the tty driver in use
1313 * @index: the minor number
1314 * @p: output buffer of at least 6 bytes
1315 *
1316 * Generate a name from a driver reference and write it to the output
1317 * buffer.
1318 *
1319 * Locking: None
1320 */
1321static void pty_line_name(struct tty_driver *driver, int index, char *p)
1da177e4
LT
1322{
1323 int i = index + driver->name_base;
1324 /* ->name is initialized to "ttyp", but "tty" is expected */
1325 sprintf(p, "%s%c%x",
37bdfb07
AC
1326 driver->subtype == PTY_TYPE_SLAVE ? "tty" : driver->name,
1327 ptychar[i >> 4 & 0xf], i & 0xf);
1da177e4
LT
1328}
1329
af9b897e 1330/**
8b0a88d5 1331 * tty_line_name - generate name for a tty
af9b897e
AC
1332 * @driver: the tty driver in use
1333 * @index: the minor number
1334 * @p: output buffer of at least 7 bytes
1335 *
1336 * Generate a name from a driver reference and write it to the output
5c0a2450 1337 * buffer.
af9b897e
AC
1338 *
1339 * Locking: None
1340 */
723abd87 1341static ssize_t tty_line_name(struct tty_driver *driver, int index, char *p)
1da177e4 1342{
0019b408 1343 if (driver->flags & TTY_DRIVER_UNNUMBERED_NODE)
723abd87 1344 return sprintf(p, "%s", driver->name);
0019b408 1345 else
723abd87
HR
1346 return sprintf(p, "%s%d", driver->name,
1347 index + driver->name_base);
1da177e4
LT
1348}
1349
99f1fe18
AC
1350/**
1351 * tty_driver_lookup_tty() - find an existing tty, if any
1352 * @driver: the driver for the tty
1353 * @idx: the minor number
23499705 1354 *
aa3cb814
PH
1355 * Return the tty, if found. If not found, return NULL or ERR_PTR() if the
1356 * driver lookup() method returns an error.
23499705 1357 *
aa3cb814 1358 * Locking: tty_mutex must be held. If the tty is found, bump the tty kref.
23499705 1359 */
a47d545f 1360static struct tty_struct *tty_driver_lookup_tty(struct tty_driver *driver,
15f1a633 1361 struct inode *inode, int idx)
23499705 1362{
aa3cb814
PH
1363 struct tty_struct *tty;
1364
99f1fe18 1365 if (driver->ops->lookup)
aa3cb814
PH
1366 tty = driver->ops->lookup(driver, inode, idx);
1367 else
1368 tty = driver->ttys[idx];
23499705 1369
aa3cb814
PH
1370 if (!IS_ERR(tty))
1371 tty_kref_get(tty);
1372 return tty;
23499705
SB
1373}
1374
bf970ee4
AC
1375/**
1376 * tty_init_termios - helper for termios setup
1377 * @tty: the tty to set up
1378 *
1379 * Initialise the termios structures for this tty. Thus runs under
1380 * the tty_mutex currently so we can be relaxed about ordering.
1381 */
1382
1383int tty_init_termios(struct tty_struct *tty)
1384{
fe6e29fd 1385 struct ktermios *tp;
bf970ee4
AC
1386 int idx = tty->index;
1387
36b3c070
AC
1388 if (tty->driver->flags & TTY_DRIVER_RESET_TERMIOS)
1389 tty->termios = tty->driver->init_termios;
1390 else {
1391 /* Check for lazy saved data */
1392 tp = tty->driver->termios[idx];
1393 if (tp != NULL)
1394 tty->termios = *tp;
1395 else
1396 tty->termios = tty->driver->init_termios;
bf970ee4 1397 }
bf970ee4 1398 /* Compatibility until drivers always set this */
adc8d746
AC
1399 tty->termios.c_ispeed = tty_termios_input_baud_rate(&tty->termios);
1400 tty->termios.c_ospeed = tty_termios_baud_rate(&tty->termios);
bf970ee4
AC
1401 return 0;
1402}
fe1ae7fd 1403EXPORT_SYMBOL_GPL(tty_init_termios);
bf970ee4 1404
66d450e8
JS
1405int tty_standard_install(struct tty_driver *driver, struct tty_struct *tty)
1406{
1407 int ret = tty_init_termios(tty);
1408 if (ret)
1409 return ret;
1410
1411 tty_driver_kref_get(driver);
1412 tty->count++;
1413 driver->ttys[tty->index] = tty;
1414 return 0;
1415}
1416EXPORT_SYMBOL_GPL(tty_standard_install);
1417
99f1fe18 1418/**
8b0a88d5
AC
1419 * tty_driver_install_tty() - install a tty entry in the driver
1420 * @driver: the driver for the tty
1421 * @tty: the tty
1422 *
1423 * Install a tty object into the driver tables. The tty->index field
bf970ee4
AC
1424 * will be set by the time this is called. This method is responsible
1425 * for ensuring any need additional structures are allocated and
1426 * configured.
8b0a88d5
AC
1427 *
1428 * Locking: tty_mutex for now
1429 */
1430static int tty_driver_install_tty(struct tty_driver *driver,
1431 struct tty_struct *tty)
1432{
66d450e8
JS
1433 return driver->ops->install ? driver->ops->install(driver, tty) :
1434 tty_standard_install(driver, tty);
8b0a88d5
AC
1435}
1436
1437/**
1438 * tty_driver_remove_tty() - remove a tty from the driver tables
1439 * @driver: the driver for the tty
1440 * @idx: the minor number
1441 *
1442 * Remvoe a tty object from the driver tables. The tty->index field
1443 * will be set by the time this is called.
1444 *
1445 * Locking: tty_mutex for now
1446 */
24d406a6 1447void tty_driver_remove_tty(struct tty_driver *driver, struct tty_struct *tty)
8b0a88d5
AC
1448{
1449 if (driver->ops->remove)
1450 driver->ops->remove(driver, tty);
1451 else
1452 driver->ttys[tty->index] = NULL;
1453}
1454
1455/*
1456 * tty_reopen() - fast re-open of an open tty
1457 * @tty - the tty to open
23499705 1458 *
99f1fe18 1459 * Return 0 on success, -errno on error.
5d93e748 1460 * Re-opens on master ptys are not allowed and return -EIO.
23499705 1461 *
5d93e748 1462 * Locking: Caller must hold tty_lock
23499705 1463 */
99f1fe18 1464static int tty_reopen(struct tty_struct *tty)
23499705
SB
1465{
1466 struct tty_driver *driver = tty->driver;
1467
216030ec 1468 if (!tty->count)
23499705
SB
1469 return -EIO;
1470
1471 if (driver->type == TTY_DRIVER_TYPE_PTY &&
5d93e748
PH
1472 driver->subtype == PTY_TYPE_MASTER)
1473 return -EIO;
23499705 1474
86f2c00f
PH
1475 if (test_bit(TTY_EXCLUSIVE, &tty->flags) && !capable(CAP_SYS_ADMIN))
1476 return -EBUSY;
1477
23499705 1478 tty->count++;
23499705 1479
36697529 1480 WARN_ON(!tty->ldisc);
23499705
SB
1481
1482 return 0;
1483}
1484
af9b897e 1485/**
d81ed103 1486 * tty_init_dev - initialise a tty device
af9b897e
AC
1487 * @driver: tty driver we are opening a device on
1488 * @idx: device index
15582d36 1489 * @ret_tty: returned tty structure
af9b897e
AC
1490 *
1491 * Prepare a tty device. This may not be a "new" clean device but
1492 * could also be an active device. The pty drivers require special
1493 * handling because of this.
1494 *
1495 * Locking:
1496 * The function is called under the tty_mutex, which
1497 * protects us from the tty struct or driver itself going away.
1498 *
1499 * On exit the tty device has the line discipline attached and
1500 * a reference count of 1. If a pair was created for pty/tty use
1501 * and the other was a pty master then it too has a reference count of 1.
1502 *
1da177e4 1503 * WSH 06/09/97: Rewritten to remove races and properly clean up after a
70522e12
IM
1504 * failed open. The new code protects the open with a mutex, so it's
1505 * really quite straightforward. The mutex locking can probably be
1da177e4
LT
1506 * relaxed for the (most common) case of reopening a tty.
1507 */
af9b897e 1508
593a27c4 1509struct tty_struct *tty_init_dev(struct tty_driver *driver, int idx)
1da177e4 1510{
bf970ee4 1511 struct tty_struct *tty;
73ec06fc 1512 int retval;
1da177e4 1513
1da177e4
LT
1514 /*
1515 * First time open is complex, especially for PTY devices.
1516 * This code guarantees that either everything succeeds and the
1517 * TTY is ready for operation, or else the table slots are vacated
37bdfb07 1518 * and the allocated memory released. (Except that the termios
1da177e4
LT
1519 * and locked termios may be retained.)
1520 */
1521
73ec06fc
AC
1522 if (!try_module_get(driver->owner))
1523 return ERR_PTR(-ENODEV);
1da177e4 1524
2c964a2f 1525 tty = alloc_tty_struct(driver, idx);
d5543503
JS
1526 if (!tty) {
1527 retval = -ENOMEM;
1528 goto err_module_put;
1529 }
1da177e4 1530
89c8d91e 1531 tty_lock(tty);
73ec06fc 1532 retval = tty_driver_install_tty(driver, tty);
d5543503 1533 if (retval < 0)
a9dccddb 1534 goto err_deinit_tty;
8b0a88d5 1535
04831dc1
JS
1536 if (!tty->port)
1537 tty->port = driver->ports[idx];
1538
5d4121c0
JS
1539 WARN_RATELIMIT(!tty->port,
1540 "%s: %s driver does not set tty->port. This will crash the kernel later. Fix the driver!\n",
1541 __func__, tty->driver->name);
1542
967fab69
JS
1543 tty->port->itty = tty;
1544
37bdfb07 1545 /*
1da177e4 1546 * Structures all installed ... call the ldisc open routines.
d5698c28
CH
1547 * If we fail here just call release_tty to clean up. No need
1548 * to decrement the use counts, as release_tty doesn't care.
1da177e4 1549 */
bf970ee4 1550 retval = tty_ldisc_setup(tty, tty->link);
01e1abb2 1551 if (retval)
d5543503 1552 goto err_release_tty;
89c8d91e 1553 /* Return the tty locked so that it cannot vanish under the caller */
73ec06fc 1554 return tty;
1da177e4 1555
a9dccddb 1556err_deinit_tty:
89c8d91e 1557 tty_unlock(tty);
a9dccddb 1558 deinitialize_tty_struct(tty);
d5543503
JS
1559 free_tty_struct(tty);
1560err_module_put:
1da177e4 1561 module_put(driver->owner);
d5543503 1562 return ERR_PTR(retval);
1da177e4 1563
d5698c28 1564 /* call the tty release_tty routine to clean out this slot */
d5543503 1565err_release_tty:
89c8d91e 1566 tty_unlock(tty);
339f36ba
PH
1567 tty_info_ratelimited(tty, "ldisc open failed (%d), clearing slot %d\n",
1568 retval, idx);
d5698c28 1569 release_tty(tty, idx);
73ec06fc 1570 return ERR_PTR(retval);
1da177e4
LT
1571}
1572
feebed65
AC
1573void tty_free_termios(struct tty_struct *tty)
1574{
1575 struct ktermios *tp;
1576 int idx = tty->index;
36b3c070
AC
1577
1578 /* If the port is going to reset then it has no termios to save */
1579 if (tty->driver->flags & TTY_DRIVER_RESET_TERMIOS)
1580 return;
1581
1582 /* Stash the termios data */
1583 tp = tty->driver->termios[idx];
1584 if (tp == NULL) {
1585 tp = kmalloc(sizeof(struct ktermios), GFP_KERNEL);
25080652 1586 if (tp == NULL)
36b3c070 1587 return;
4ac5d705 1588 tty->driver->termios[idx] = tp;
feebed65 1589 }
36b3c070 1590 *tp = tty->termios;
feebed65
AC
1591}
1592EXPORT_SYMBOL(tty_free_termios);
1593
a2965b7b 1594/**
949aa64f
PH
1595 * tty_flush_works - flush all works of a tty/pty pair
1596 * @tty: tty device to flush works for (or either end of a pty pair)
a2965b7b 1597 *
949aa64f 1598 * Sync flush all works belonging to @tty (and the 'other' tty).
a2965b7b
PH
1599 */
1600static void tty_flush_works(struct tty_struct *tty)
1601{
1602 flush_work(&tty->SAK_work);
1603 flush_work(&tty->hangup_work);
949aa64f
PH
1604 if (tty->link) {
1605 flush_work(&tty->link->SAK_work);
1606 flush_work(&tty->link->hangup_work);
1607 }
a2965b7b 1608}
feebed65 1609
af9b897e 1610/**
d5698c28 1611 * release_one_tty - release tty structure memory
9c9f4ded 1612 * @kref: kref of tty we are obliterating
af9b897e
AC
1613 *
1614 * Releases memory associated with a tty structure, and clears out the
1615 * driver table slots. This function is called when a device is no longer
1616 * in use. It also gets called when setup of a device fails.
1617 *
1618 * Locking:
af9b897e
AC
1619 * takes the file list lock internally when working on the list
1620 * of ttys that the driver keeps.
b50989dc
AC
1621 *
1622 * This method gets called from a work queue so that the driver private
f278a2f7 1623 * cleanup ops can sleep (needed for USB at least)
1da177e4 1624 */
b50989dc 1625static void release_one_tty(struct work_struct *work)
1da177e4 1626{
b50989dc
AC
1627 struct tty_struct *tty =
1628 container_of(work, struct tty_struct, hangup_work);
6f967f78 1629 struct tty_driver *driver = tty->driver;
b216df53 1630 struct module *owner = driver->owner;
d5698c28 1631
f278a2f7
DY
1632 if (tty->ops->cleanup)
1633 tty->ops->cleanup(tty);
1634
1da177e4 1635 tty->magic = 0;
7d7b93c1 1636 tty_driver_kref_put(driver);
b216df53 1637 module_put(owner);
d5698c28 1638
ee2ffa0d 1639 spin_lock(&tty_files_lock);
1da177e4 1640 list_del_init(&tty->tty_files);
ee2ffa0d 1641 spin_unlock(&tty_files_lock);
d5698c28 1642
6da8d866
ON
1643 put_pid(tty->pgrp);
1644 put_pid(tty->session);
1da177e4
LT
1645 free_tty_struct(tty);
1646}
1647
b50989dc
AC
1648static void queue_release_one_tty(struct kref *kref)
1649{
1650 struct tty_struct *tty = container_of(kref, struct tty_struct, kref);
f278a2f7 1651
b50989dc
AC
1652 /* The hangup queue is now free so we can reuse it rather than
1653 waste a chunk of memory for each port */
1654 INIT_WORK(&tty->hangup_work, release_one_tty);
1655 schedule_work(&tty->hangup_work);
1656}
1657
9c9f4ded
AC
1658/**
1659 * tty_kref_put - release a tty kref
1660 * @tty: tty device
1661 *
1662 * Release a reference to a tty device and if need be let the kref
1663 * layer destruct the object for us
1664 */
1665
1666void tty_kref_put(struct tty_struct *tty)
1667{
1668 if (tty)
b50989dc 1669 kref_put(&tty->kref, queue_release_one_tty);
9c9f4ded
AC
1670}
1671EXPORT_SYMBOL(tty_kref_put);
1672
d5698c28
CH
1673/**
1674 * release_tty - release tty structure memory
1675 *
1676 * Release both @tty and a possible linked partner (think pty pair),
1677 * and decrement the refcount of the backing module.
1678 *
1679 * Locking:
d155255a 1680 * tty_mutex
d5698c28
CH
1681 * takes the file list lock internally when working on the list
1682 * of ttys that the driver keeps.
9c9f4ded 1683 *
d5698c28
CH
1684 */
1685static void release_tty(struct tty_struct *tty, int idx)
1686{
9c9f4ded
AC
1687 /* This should always be true but check for the moment */
1688 WARN_ON(tty->index != idx);
d155255a 1689 WARN_ON(!mutex_is_locked(&tty_mutex));
36b3c070
AC
1690 if (tty->ops->shutdown)
1691 tty->ops->shutdown(tty);
1692 tty_free_termios(tty);
1693 tty_driver_remove_tty(tty->driver, tty);
967fab69 1694 tty->port->itty = NULL;
64e377dc
PH
1695 if (tty->link)
1696 tty->link->port->itty = NULL;
e176058f 1697 tty_buffer_cancel_work(tty->port);
36b3c070 1698
a211b1af 1699 tty_kref_put(tty->link);
9c9f4ded 1700 tty_kref_put(tty);
d5698c28
CH
1701}
1702
955787ca
JS
1703/**
1704 * tty_release_checks - check a tty before real release
1705 * @tty: tty to check
1706 * @o_tty: link of @tty (if any)
1707 * @idx: index of the tty
1708 *
1709 * Performs some paranoid checking before true release of the @tty.
1710 * This is a no-op unless TTY_PARANOIA_CHECK is defined.
1711 */
359b9fb5 1712static int tty_release_checks(struct tty_struct *tty, int idx)
955787ca
JS
1713{
1714#ifdef TTY_PARANOIA_CHECK
1715 if (idx < 0 || idx >= tty->driver->num) {
e2dfa3d3 1716 tty_debug(tty, "bad idx %d\n", idx);
955787ca
JS
1717 return -1;
1718 }
1719
1720 /* not much to check for devpts */
1721 if (tty->driver->flags & TTY_DRIVER_DEVPTS_MEM)
1722 return 0;
1723
1724 if (tty != tty->driver->ttys[idx]) {
e2dfa3d3
PH
1725 tty_debug(tty, "bad driver table[%d] = %p\n",
1726 idx, tty->driver->ttys[idx]);
955787ca
JS
1727 return -1;
1728 }
955787ca 1729 if (tty->driver->other) {
359b9fb5
PH
1730 struct tty_struct *o_tty = tty->link;
1731
955787ca 1732 if (o_tty != tty->driver->other->ttys[idx]) {
e2dfa3d3
PH
1733 tty_debug(tty, "bad other table[%d] = %p\n",
1734 idx, tty->driver->other->ttys[idx]);
955787ca
JS
1735 return -1;
1736 }
955787ca 1737 if (o_tty->link != tty) {
e2dfa3d3 1738 tty_debug(tty, "bad link = %p\n", o_tty->link);
955787ca
JS
1739 return -1;
1740 }
1741 }
1742#endif
1743 return 0;
1744}
1745
eeb89d91
AC
1746/**
1747 * tty_release - vfs callback for close
1748 * @inode: inode of tty
1749 * @filp: file pointer for handle to tty
1750 *
1751 * Called the last time each file handle is closed that references
1752 * this tty. There may however be several such references.
1753 *
1754 * Locking:
1755 * Takes bkl. See tty_release_dev
1756 *
1da177e4
LT
1757 * Even releasing the tty structures is a tricky business.. We have
1758 * to be very careful that the structures are all released at the
1759 * same time, as interrupts might otherwise get the wrong pointers.
1760 *
1761 * WSH 09/09/97: rewritten to avoid some nasty race conditions that could
1762 * lead to double frees or releasing memory still in use.
1763 */
eeb89d91
AC
1764
1765int tty_release(struct inode *inode, struct file *filp)
1da177e4 1766{
d996b62a 1767 struct tty_struct *tty = file_tty(filp);
7ffb6da9
PH
1768 struct tty_struct *o_tty = NULL;
1769 int do_sleep, final;
1da177e4 1770 int idx;
37b16457 1771 long timeout = 0;
494c1eac 1772 int once = 1;
37bdfb07 1773
9de44bd6 1774 if (tty_paranoia_check(tty, inode, __func__))
eeb89d91 1775 return 0;
1da177e4 1776
89c8d91e 1777 tty_lock(tty);
9de44bd6 1778 check_tty_count(tty, __func__);
1da177e4 1779
ec79d605 1780 __tty_fasync(-1, filp, 0);
1da177e4
LT
1781
1782 idx = tty->index;
7ffb6da9
PH
1783 if (tty->driver->type == TTY_DRIVER_TYPE_PTY &&
1784 tty->driver->subtype == PTY_TYPE_MASTER)
1785 o_tty = tty->link;
1da177e4 1786
359b9fb5 1787 if (tty_release_checks(tty, idx)) {
89c8d91e 1788 tty_unlock(tty);
eeb89d91 1789 return 0;
1da177e4 1790 }
1da177e4 1791
accff793 1792 tty_debug_hangup(tty, "(tty count=%d)...\n", tty->count);
1da177e4 1793
f34d7a5b
AC
1794 if (tty->ops->close)
1795 tty->ops->close(tty, filp);
1da177e4 1796
2aff5e2b
PH
1797 /* If tty is pty master, lock the slave pty (stable lock order) */
1798 tty_lock_slave(o_tty);
1799
1da177e4
LT
1800 /*
1801 * Sanity check: if tty->count is going to zero, there shouldn't be
1802 * any waiters on tty->read_wait or tty->write_wait. We test the
1803 * wait queues and kick everyone out _before_ actually starting to
1804 * close. This ensures that we won't block while releasing the tty
1805 * structure.
1806 *
1807 * The test for the o_tty closing is necessary, since the master and
1808 * slave sides may close in any order. If the slave side closes out
1809 * first, its count will be one, since the master side holds an open.
324c1650 1810 * Thus this test wouldn't be triggered at the time the slave closed,
1da177e4 1811 * so we do it now.
1da177e4
LT
1812 */
1813 while (1) {
1da177e4
LT
1814 do_sleep = 0;
1815
324c1650 1816 if (tty->count <= 1) {
1da177e4 1817 if (waitqueue_active(&tty->read_wait)) {
4b19449d 1818 wake_up_poll(&tty->read_wait, POLLIN);
1da177e4
LT
1819 do_sleep++;
1820 }
1821 if (waitqueue_active(&tty->write_wait)) {
4b19449d 1822 wake_up_poll(&tty->write_wait, POLLOUT);
1da177e4
LT
1823 do_sleep++;
1824 }
1825 }
7ffb6da9 1826 if (o_tty && o_tty->count <= 1) {
1da177e4 1827 if (waitqueue_active(&o_tty->read_wait)) {
4b19449d 1828 wake_up_poll(&o_tty->read_wait, POLLIN);
1da177e4
LT
1829 do_sleep++;
1830 }
1831 if (waitqueue_active(&o_tty->write_wait)) {
4b19449d 1832 wake_up_poll(&o_tty->write_wait, POLLOUT);
1da177e4
LT
1833 do_sleep++;
1834 }
1835 }
1836 if (!do_sleep)
1837 break;
1838
494c1eac
PH
1839 if (once) {
1840 once = 0;
339f36ba 1841 tty_warn(tty, "read/write wait queue active!\n");
494c1eac 1842 }
37b16457
PH
1843 schedule_timeout_killable(timeout);
1844 if (timeout < 120 * HZ)
1845 timeout = 2 * timeout + 1;
1846 else
1847 timeout = MAX_SCHEDULE_TIMEOUT;
37bdfb07 1848 }
1da177e4 1849
7ffb6da9 1850 if (o_tty) {
1da177e4 1851 if (--o_tty->count < 0) {
339f36ba 1852 tty_warn(tty, "bad slave count (%d)\n", o_tty->count);
1da177e4
LT
1853 o_tty->count = 0;
1854 }
1855 }
1856 if (--tty->count < 0) {
339f36ba 1857 tty_warn(tty, "bad tty->count (%d)\n", tty->count);
1da177e4
LT
1858 tty->count = 0;
1859 }
37bdfb07 1860
1da177e4
LT
1861 /*
1862 * We've decremented tty->count, so we need to remove this file
1863 * descriptor off the tty->tty_files list; this serves two
1864 * purposes:
1865 * - check_tty_count sees the correct number of file descriptors
1866 * associated with this tty.
1867 * - do_tty_hangup no longer sees this file descriptor as
1868 * something that needs to be handled for hangups.
1869 */
d996b62a 1870 tty_del_file(filp);
1da177e4
LT
1871
1872 /*
1873 * Perform some housekeeping before deciding whether to return.
1874 *
1da177e4
LT
1875 * If _either_ side is closing, make sure there aren't any
1876 * processes that still think tty or o_tty is their controlling
1877 * tty.
1878 */
324c1650 1879 if (!tty->count) {
1da177e4 1880 read_lock(&tasklist_lock);
24ec839c 1881 session_clear_tty(tty->session);
7ffb6da9 1882 if (o_tty)
24ec839c 1883 session_clear_tty(o_tty->session);
1da177e4
LT
1884 read_unlock(&tasklist_lock);
1885 }
1886
324c1650 1887 /* check whether both sides are closing ... */
7ffb6da9 1888 final = !tty->count && !(o_tty && o_tty->count);
324c1650 1889
2aff5e2b
PH
1890 tty_unlock_slave(o_tty);
1891 tty_unlock(tty);
1892
04980706 1893 /* At this point, the tty->count == 0 should ensure a dead tty
d155255a 1894 cannot be re-opened by a racing opener */
da965822 1895
324c1650 1896 if (!final)
eeb89d91 1897 return 0;
37bdfb07 1898
accff793 1899 tty_debug_hangup(tty, "final close\n");
1da177e4 1900 /*
01e1abb2 1901 * Ask the line discipline code to release its structures
1da177e4 1902 */
62462aef 1903 tty_ldisc_release(tty);
a2965b7b
PH
1904
1905 /* Wait for pending work before tty destruction commmences */
1906 tty_flush_works(tty);
a2965b7b 1907
accff793 1908 tty_debug_hangup(tty, "freeing structure...\n");
1da177e4 1909 /*
d5698c28 1910 * The release_tty function takes care of the details of clearing
89c8d91e
AC
1911 * the slots and preserving the termios structure. The tty_unlock_pair
1912 * should be safe as we keep a kref while the tty is locked (so the
1913 * unlock never unlocks a freed tty).
1da177e4 1914 */
d155255a 1915 mutex_lock(&tty_mutex);
d5698c28 1916 release_tty(tty, idx);
d155255a 1917 mutex_unlock(&tty_mutex);
1da177e4 1918
eeb89d91 1919 return 0;
1da177e4
LT
1920}
1921
b82154ac 1922/**
52494eeb 1923 * tty_open_current_tty - get locked tty of current task
b82154ac
JS
1924 * @device: device number
1925 * @filp: file pointer to tty
52494eeb
PH
1926 * @return: locked tty of the current task iff @device is /dev/tty
1927 *
1928 * Performs a re-open of the current task's controlling tty.
b82154ac
JS
1929 *
1930 * We cannot return driver and index like for the other nodes because
1931 * devpts will not work then. It expects inodes to be from devpts FS.
1932 */
1933static struct tty_struct *tty_open_current_tty(dev_t device, struct file *filp)
1934{
1935 struct tty_struct *tty;
52494eeb 1936 int retval;
b82154ac
JS
1937
1938 if (device != MKDEV(TTYAUX_MAJOR, 0))
1939 return NULL;
1940
1941 tty = get_current_tty();
1942 if (!tty)
1943 return ERR_PTR(-ENXIO);
1944
1945 filp->f_flags |= O_NONBLOCK; /* Don't let /dev/tty block */
1946 /* noctty = 1; */
52494eeb
PH
1947 tty_lock(tty);
1948 tty_kref_put(tty); /* safe to drop the kref now */
1949
1950 retval = tty_reopen(tty);
1951 if (retval < 0) {
1952 tty_unlock(tty);
1953 tty = ERR_PTR(retval);
1954 }
b82154ac
JS
1955 return tty;
1956}
1957
5b5e7040
JS
1958/**
1959 * tty_lookup_driver - lookup a tty driver for a given device file
1960 * @device: device number
1961 * @filp: file pointer to tty
1962 * @noctty: set if the device should not become a controlling tty
1963 * @index: index for the device in the @return driver
1964 * @return: driver for this inode (with increased refcount)
1965 *
1966 * If @return is not erroneous, the caller is responsible to decrement the
1967 * refcount by tty_driver_kref_put.
1968 *
1969 * Locking: tty_mutex protects get_tty_driver
1970 */
1971static struct tty_driver *tty_lookup_driver(dev_t device, struct file *filp,
1972 int *noctty, int *index)
1973{
1974 struct tty_driver *driver;
1975
2cd0050c 1976 switch (device) {
5b5e7040 1977#ifdef CONFIG_VT
2cd0050c 1978 case MKDEV(TTY_MAJOR, 0): {
5b5e7040
JS
1979 extern struct tty_driver *console_driver;
1980 driver = tty_driver_kref_get(console_driver);
1981 *index = fg_console;
1982 *noctty = 1;
2cd0050c 1983 break;
5b5e7040
JS
1984 }
1985#endif
2cd0050c 1986 case MKDEV(TTYAUX_MAJOR, 1): {
5b5e7040
JS
1987 struct tty_driver *console_driver = console_device(index);
1988 if (console_driver) {
1989 driver = tty_driver_kref_get(console_driver);
1990 if (driver) {
1991 /* Don't let /dev/console block */
1992 filp->f_flags |= O_NONBLOCK;
1993 *noctty = 1;
2cd0050c 1994 break;
5b5e7040
JS
1995 }
1996 }
1997 return ERR_PTR(-ENODEV);
1998 }
2cd0050c
JS
1999 default:
2000 driver = get_tty_driver(device, index);
2001 if (!driver)
2002 return ERR_PTR(-ENODEV);
2003 break;
2004 }
5b5e7040
JS
2005 return driver;
2006}
2007
af9b897e 2008/**
eeb89d91 2009 * tty_open - open a tty device
af9b897e
AC
2010 * @inode: inode of device file
2011 * @filp: file pointer to tty
1da177e4 2012 *
af9b897e
AC
2013 * tty_open and tty_release keep up the tty count that contains the
2014 * number of opens done on a tty. We cannot use the inode-count, as
2015 * different inodes might point to the same tty.
1da177e4 2016 *
af9b897e
AC
2017 * Open-counting is needed for pty masters, as well as for keeping
2018 * track of serial lines: DTR is dropped when the last close happens.
2019 * (This is not done solely through tty->count, now. - Ted 1/27/92)
2020 *
2021 * The termios state of a pty is reset on first open so that
2022 * settings don't persist across reuse.
2023 *
5b5e7040 2024 * Locking: tty_mutex protects tty, tty_lookup_driver and tty_init_dev.
24ec839c
PZ
2025 * tty->count should protect the rest.
2026 * ->siglock protects ->signal/->sighand
89c8d91e
AC
2027 *
2028 * Note: the tty_unlock/lock cases without a ref are only safe due to
2029 * tty_mutex
1da177e4 2030 */
af9b897e 2031
eeb89d91 2032static int tty_open(struct inode *inode, struct file *filp)
1da177e4 2033{
b82154ac 2034 struct tty_struct *tty;
1da177e4 2035 int noctty, retval;
b82154ac 2036 struct tty_driver *driver = NULL;
1da177e4
LT
2037 int index;
2038 dev_t device = inode->i_rdev;
846c151a 2039 unsigned saved_flags = filp->f_flags;
1da177e4
LT
2040
2041 nonseekable_open(inode, filp);
37bdfb07 2042
1da177e4 2043retry_open:
fa90e1c9
JS
2044 retval = tty_alloc_file(filp);
2045 if (retval)
2046 return -ENOMEM;
2047
1da177e4
LT
2048 noctty = filp->f_flags & O_NOCTTY;
2049 index = -1;
2050 retval = 0;
37bdfb07 2051
b82154ac 2052 tty = tty_open_current_tty(device, filp);
52494eeb
PH
2053 if (!tty) {
2054 mutex_lock(&tty_mutex);
5b5e7040
JS
2055 driver = tty_lookup_driver(device, filp, &noctty, &index);
2056 if (IS_ERR(driver)) {
ba5db448
JS
2057 retval = PTR_ERR(driver);
2058 goto err_unlock;
1da177e4 2059 }
1da177e4 2060
4a2b5fdd 2061 /* check whether we're reopening an existing tty */
15f1a633 2062 tty = tty_driver_lookup_tty(driver, inode, index);
808ffa3d 2063 if (IS_ERR(tty)) {
ba5db448
JS
2064 retval = PTR_ERR(tty);
2065 goto err_unlock;
808ffa3d 2066 }
4a2b5fdd 2067
52494eeb 2068 if (tty) {
aa3cb814 2069 mutex_unlock(&tty_mutex);
52494eeb 2070 tty_lock(tty);
aa3cb814
PH
2071 /* safe to drop the kref from tty_driver_lookup_tty() */
2072 tty_kref_put(tty);
52494eeb
PH
2073 retval = tty_reopen(tty);
2074 if (retval < 0) {
2075 tty_unlock(tty);
2076 tty = ERR_PTR(retval);
2077 }
aa3cb814 2078 } else { /* Returns with the tty_lock held for now */
52494eeb 2079 tty = tty_init_dev(driver, index);
aa3cb814
PH
2080 mutex_unlock(&tty_mutex);
2081 }
4a2b5fdd 2082
b82154ac 2083 tty_driver_kref_put(driver);
52494eeb
PH
2084 }
2085
eeb89d91 2086 if (IS_ERR(tty)) {
ba5db448
JS
2087 retval = PTR_ERR(tty);
2088 goto err_file;
eeb89d91 2089 }
1da177e4 2090
fa90e1c9 2091 tty_add_file(tty, filp);
d996b62a 2092
9de44bd6 2093 check_tty_count(tty, __func__);
1da177e4
LT
2094 if (tty->driver->type == TTY_DRIVER_TYPE_PTY &&
2095 tty->driver->subtype == PTY_TYPE_MASTER)
2096 noctty = 1;
accff793
PH
2097
2098 tty_debug_hangup(tty, "(tty count=%d)\n", tty->count);
2099
909bc774
HRK
2100 if (tty->ops->open)
2101 retval = tty->ops->open(tty, filp);
2102 else
2103 retval = -ENODEV;
1da177e4
LT
2104 filp->f_flags = saved_flags;
2105
1da177e4 2106 if (retval) {
accff793
PH
2107 tty_debug_hangup(tty, "error %d, releasing...\n", retval);
2108
89c8d91e 2109 tty_unlock(tty); /* need to call tty_release without BTM */
eeb89d91 2110 tty_release(inode, filp);
64ba3dc3 2111 if (retval != -ERESTARTSYS)
1da177e4 2112 return retval;
64ba3dc3
AB
2113
2114 if (signal_pending(current))
1da177e4 2115 return retval;
64ba3dc3 2116
1da177e4
LT
2117 schedule();
2118 /*
2119 * Need to reset f_op in case a hangup happened.
2120 */
1256937f 2121 if (tty_hung_up_p(filp))
1da177e4
LT
2122 filp->f_op = &tty_fops;
2123 goto retry_open;
2124 }
d4855e1f 2125 clear_bit(TTY_HUPPED, &tty->flags);
eeb89d91 2126
24ec839c 2127
2c411c11 2128 read_lock(&tasklist_lock);
24ec839c 2129 spin_lock_irq(&current->sighand->siglock);
1da177e4
LT
2130 if (!noctty &&
2131 current->signal->leader &&
2132 !current->signal->tty &&
0c556271
JH
2133 tty->session == NULL) {
2134 /*
2135 * Don't let a process that only has write access to the tty
2136 * obtain the privileges associated with having a tty as
2137 * controlling terminal (being able to reopen it with full
2138 * access through /dev/tty, being able to perform pushback).
2139 * Many distributions set the group of all ttys to "tty" and
2140 * grant write-only access to all terminals for setgid tty
2141 * binaries, which should not imply full privileges on all ttys.
2142 *
2143 * This could theoretically break old code that performs open()
2144 * on a write-only file descriptor. In that case, it might be
2145 * necessary to also permit this if
2146 * inode_permission(inode, MAY_READ) == 0.
2147 */
2148 if (filp->f_mode & FMODE_READ)
2149 __proc_set_tty(tty);
2150 }
24ec839c 2151 spin_unlock_irq(&current->sighand->siglock);
2c411c11 2152 read_unlock(&tasklist_lock);
89c8d91e 2153 tty_unlock(tty);
1da177e4 2154 return 0;
ba5db448 2155err_unlock:
ba5db448
JS
2156 mutex_unlock(&tty_mutex);
2157 /* after locks to avoid deadlock */
2158 if (!IS_ERR_OR_NULL(driver))
2159 tty_driver_kref_put(driver);
2160err_file:
2161 tty_free_file(filp);
2162 return retval;
1da177e4
LT
2163}
2164
39d95b9d
JC
2165
2166
af9b897e
AC
2167/**
2168 * tty_poll - check tty status
2169 * @filp: file being polled
2170 * @wait: poll wait structures to update
2171 *
2172 * Call the line discipline polling method to obtain the poll
2173 * status of the device.
2174 *
2175 * Locking: locks called line discipline but ldisc poll method
2176 * may be re-entered freely by other callers.
2177 */
2178
37bdfb07 2179static unsigned int tty_poll(struct file *filp, poll_table *wait)
1da177e4 2180{
d996b62a 2181 struct tty_struct *tty = file_tty(filp);
1da177e4
LT
2182 struct tty_ldisc *ld;
2183 int ret = 0;
2184
6131ffaa 2185 if (tty_paranoia_check(tty, file_inode(filp), "tty_poll"))
1da177e4 2186 return 0;
37bdfb07 2187
1da177e4 2188 ld = tty_ldisc_ref_wait(tty);
a352def2 2189 if (ld->ops->poll)
c961bfb1 2190 ret = ld->ops->poll(tty, filp, wait);
1da177e4
LT
2191 tty_ldisc_deref(ld);
2192 return ret;
2193}
2194
ec79d605 2195static int __tty_fasync(int fd, struct file *filp, int on)
1da177e4 2196{
d996b62a 2197 struct tty_struct *tty = file_tty(filp);
f6c8dbe6 2198 struct tty_ldisc *ldisc;
47f86834 2199 unsigned long flags;
5d1e3230 2200 int retval = 0;
1da177e4 2201
6131ffaa 2202 if (tty_paranoia_check(tty, file_inode(filp), "tty_fasync"))
5d1e3230 2203 goto out;
37bdfb07 2204
1da177e4
LT
2205 retval = fasync_helper(fd, filp, on, &tty->fasync);
2206 if (retval <= 0)
5d1e3230 2207 goto out;
1da177e4 2208
f6c8dbe6
PH
2209 ldisc = tty_ldisc_ref(tty);
2210 if (ldisc) {
2211 if (ldisc->ops->fasync)
2212 ldisc->ops->fasync(tty, on);
2213 tty_ldisc_deref(ldisc);
2214 }
2215
1da177e4 2216 if (on) {
ab521dc0
EB
2217 enum pid_type type;
2218 struct pid *pid;
f6c8dbe6 2219
47f86834 2220 spin_lock_irqsave(&tty->ctrl_lock, flags);
ab521dc0
EB
2221 if (tty->pgrp) {
2222 pid = tty->pgrp;
2223 type = PIDTYPE_PGID;
2224 } else {
2225 pid = task_pid(current);
2226 type = PIDTYPE_PID;
2227 }
80e1e823 2228 get_pid(pid);
70362511 2229 spin_unlock_irqrestore(&tty->ctrl_lock, flags);
e0b93edd 2230 __f_setown(filp, pid, type, 0);
80e1e823 2231 put_pid(pid);
e0b93edd 2232 retval = 0;
1da177e4 2233 }
5d1e3230 2234out:
ec79d605
AB
2235 return retval;
2236}
2237
2238static int tty_fasync(int fd, struct file *filp, int on)
2239{
89c8d91e 2240 struct tty_struct *tty = file_tty(filp);
ec79d605 2241 int retval;
89c8d91e
AC
2242
2243 tty_lock(tty);
ec79d605 2244 retval = __tty_fasync(fd, filp, on);
89c8d91e
AC
2245 tty_unlock(tty);
2246
5d1e3230 2247 return retval;
1da177e4
LT
2248}
2249
af9b897e
AC
2250/**
2251 * tiocsti - fake input character
2252 * @tty: tty to fake input into
2253 * @p: pointer to character
2254 *
3a4fa0a2 2255 * Fake input to a tty device. Does the necessary locking and
af9b897e
AC
2256 * input management.
2257 *
2258 * FIXME: does not honour flow control ??
2259 *
2260 * Locking:
137084bb 2261 * Called functions take tty_ldiscs_lock
af9b897e 2262 * current->signal->tty check is safe without locks
28298232
AC
2263 *
2264 * FIXME: may race normal receive processing
af9b897e
AC
2265 */
2266
1da177e4
LT
2267static int tiocsti(struct tty_struct *tty, char __user *p)
2268{
2269 char ch, mbz = 0;
2270 struct tty_ldisc *ld;
37bdfb07 2271
1da177e4
LT
2272 if ((current->signal->tty != tty) && !capable(CAP_SYS_ADMIN))
2273 return -EPERM;
2274 if (get_user(ch, p))
2275 return -EFAULT;
1e641743 2276 tty_audit_tiocsti(tty, ch);
1da177e4 2277 ld = tty_ldisc_ref_wait(tty);
a352def2 2278 ld->ops->receive_buf(tty, &ch, &mbz, 1);
1da177e4
LT
2279 tty_ldisc_deref(ld);
2280 return 0;
2281}
2282
af9b897e
AC
2283/**
2284 * tiocgwinsz - implement window query ioctl
2285 * @tty; tty
2286 * @arg: user buffer for result
2287 *
808a0d38 2288 * Copies the kernel idea of the window size into the user buffer.
af9b897e 2289 *
dee4a0be 2290 * Locking: tty->winsize_mutex is taken to ensure the winsize data
808a0d38 2291 * is consistent.
af9b897e
AC
2292 */
2293
37bdfb07 2294static int tiocgwinsz(struct tty_struct *tty, struct winsize __user *arg)
1da177e4 2295{
808a0d38
AC
2296 int err;
2297
dee4a0be 2298 mutex_lock(&tty->winsize_mutex);
808a0d38 2299 err = copy_to_user(arg, &tty->winsize, sizeof(*arg));
dee4a0be 2300 mutex_unlock(&tty->winsize_mutex);
808a0d38
AC
2301
2302 return err ? -EFAULT: 0;
1da177e4
LT
2303}
2304
af9b897e 2305/**
8c9a9dd0
AC
2306 * tty_do_resize - resize event
2307 * @tty: tty being resized
8c9a9dd0
AC
2308 * @rows: rows (character)
2309 * @cols: cols (character)
2310 *
3ad2f3fb 2311 * Update the termios variables and send the necessary signals to
8c9a9dd0 2312 * peform a terminal resize correctly
af9b897e
AC
2313 */
2314
fc6f6238 2315int tty_do_resize(struct tty_struct *tty, struct winsize *ws)
1da177e4 2316{
fc6f6238 2317 struct pid *pgrp;
1da177e4 2318
fc6f6238 2319 /* Lock the tty */
dee4a0be 2320 mutex_lock(&tty->winsize_mutex);
fc6f6238 2321 if (!memcmp(ws, &tty->winsize, sizeof(*ws)))
ca9bda00 2322 goto done;
47f86834 2323
5b239542
PH
2324 /* Signal the foreground process group */
2325 pgrp = tty_get_pgrp(tty);
47f86834
AC
2326 if (pgrp)
2327 kill_pgrp(pgrp, SIGWINCH, 1);
47f86834 2328 put_pid(pgrp);
47f86834 2329
8c9a9dd0 2330 tty->winsize = *ws;
ca9bda00 2331done:
dee4a0be 2332 mutex_unlock(&tty->winsize_mutex);
1da177e4
LT
2333 return 0;
2334}
4d334fd1 2335EXPORT_SYMBOL(tty_do_resize);
1da177e4 2336
8c9a9dd0
AC
2337/**
2338 * tiocswinsz - implement window size set ioctl
fc6f6238 2339 * @tty; tty side of tty
8c9a9dd0
AC
2340 * @arg: user buffer for result
2341 *
2342 * Copies the user idea of the window size to the kernel. Traditionally
2343 * this is just advisory information but for the Linux console it
2344 * actually has driver level meaning and triggers a VC resize.
2345 *
2346 * Locking:
25985edc 2347 * Driver dependent. The default do_resize method takes the
8c9a9dd0
AC
2348 * tty termios mutex and ctrl_lock. The console takes its own lock
2349 * then calls into the default method.
2350 */
2351
fc6f6238 2352static int tiocswinsz(struct tty_struct *tty, struct winsize __user *arg)
8c9a9dd0
AC
2353{
2354 struct winsize tmp_ws;
2355 if (copy_from_user(&tmp_ws, arg, sizeof(*arg)))
2356 return -EFAULT;
2357
2358 if (tty->ops->resize)
fc6f6238 2359 return tty->ops->resize(tty, &tmp_ws);
8c9a9dd0 2360 else
fc6f6238 2361 return tty_do_resize(tty, &tmp_ws);
8c9a9dd0
AC
2362}
2363
af9b897e
AC
2364/**
2365 * tioccons - allow admin to move logical console
2366 * @file: the file to become console
2367 *
25985edc 2368 * Allow the administrator to move the redirected console device
af9b897e
AC
2369 *
2370 * Locking: uses redirect_lock to guard the redirect information
2371 */
2372
1da177e4
LT
2373static int tioccons(struct file *file)
2374{
2375 if (!capable(CAP_SYS_ADMIN))
2376 return -EPERM;
2377 if (file->f_op->write == redirected_tty_write) {
2378 struct file *f;
2379 spin_lock(&redirect_lock);
2380 f = redirect;
2381 redirect = NULL;
2382 spin_unlock(&redirect_lock);
2383 if (f)
2384 fput(f);
2385 return 0;
2386 }
2387 spin_lock(&redirect_lock);
2388 if (redirect) {
2389 spin_unlock(&redirect_lock);
2390 return -EBUSY;
2391 }
cb0942b8 2392 redirect = get_file(file);
1da177e4
LT
2393 spin_unlock(&redirect_lock);
2394 return 0;
2395}
2396
af9b897e
AC
2397/**
2398 * fionbio - non blocking ioctl
2399 * @file: file to set blocking value
2400 * @p: user parameter
2401 *
2402 * Historical tty interfaces had a blocking control ioctl before
2403 * the generic functionality existed. This piece of history is preserved
2404 * in the expected tty API of posix OS's.
2405 *
6146b9af 2406 * Locking: none, the open file handle ensures it won't go away.
af9b897e 2407 */
1da177e4
LT
2408
2409static int fionbio(struct file *file, int __user *p)
2410{
2411 int nonblock;
2412
2413 if (get_user(nonblock, p))
2414 return -EFAULT;
2415
db1dd4d3 2416 spin_lock(&file->f_lock);
1da177e4
LT
2417 if (nonblock)
2418 file->f_flags |= O_NONBLOCK;
2419 else
2420 file->f_flags &= ~O_NONBLOCK;
db1dd4d3 2421 spin_unlock(&file->f_lock);
1da177e4
LT
2422 return 0;
2423}
2424
af9b897e
AC
2425/**
2426 * tiocsctty - set controlling tty
2427 * @tty: tty structure
2428 * @arg: user argument
2429 *
2430 * This ioctl is used to manage job control. It permits a session
2431 * leader to set this tty as the controlling tty for the session.
2432 *
2433 * Locking:
e218eb32 2434 * Takes tty_lock() to serialize proc_set_tty() for this tty
24ec839c
PZ
2435 * Takes tasklist_lock internally to walk sessions
2436 * Takes ->siglock() when updating signal->tty
af9b897e
AC
2437 */
2438
0c556271 2439static int tiocsctty(struct tty_struct *tty, struct file *file, int arg)
1da177e4 2440{
24ec839c 2441 int ret = 0;
24ec839c 2442
e218eb32 2443 tty_lock(tty);
2c411c11
PH
2444 read_lock(&tasklist_lock);
2445
2446 if (current->signal->leader && (task_session(current) == tty->session))
2447 goto unlock;
2448
1da177e4
LT
2449 /*
2450 * The process must be a session leader and
2451 * not have a controlling tty already.
2452 */
24ec839c
PZ
2453 if (!current->signal->leader || current->signal->tty) {
2454 ret = -EPERM;
2455 goto unlock;
2456 }
2457
ab521dc0 2458 if (tty->session) {
1da177e4
LT
2459 /*
2460 * This tty is already the controlling
2461 * tty for another session group!
2462 */
37bdfb07 2463 if (arg == 1 && capable(CAP_SYS_ADMIN)) {
1da177e4
LT
2464 /*
2465 * Steal it away
2466 */
24ec839c 2467 session_clear_tty(tty->session);
24ec839c
PZ
2468 } else {
2469 ret = -EPERM;
2470 goto unlock;
2471 }
1da177e4 2472 }
0c556271
JH
2473
2474 /* See the comment in tty_open(). */
2475 if ((file->f_mode & FMODE_READ) == 0 && !capable(CAP_SYS_ADMIN)) {
2476 ret = -EPERM;
2477 goto unlock;
2478 }
2479
bce65f18 2480 proc_set_tty(tty);
24ec839c 2481unlock:
2c411c11 2482 read_unlock(&tasklist_lock);
e218eb32 2483 tty_unlock(tty);
24ec839c 2484 return ret;
1da177e4
LT
2485}
2486
5d0fdf1e
AC
2487/**
2488 * tty_get_pgrp - return a ref counted pgrp pid
2489 * @tty: tty to read
2490 *
2491 * Returns a refcounted instance of the pid struct for the process
2492 * group controlling the tty.
2493 */
2494
2495struct pid *tty_get_pgrp(struct tty_struct *tty)
2496{
2497 unsigned long flags;
2498 struct pid *pgrp;
2499
2500 spin_lock_irqsave(&tty->ctrl_lock, flags);
2501 pgrp = get_pid(tty->pgrp);
2502 spin_unlock_irqrestore(&tty->ctrl_lock, flags);
2503
2504 return pgrp;
2505}
2506EXPORT_SYMBOL_GPL(tty_get_pgrp);
2507
e1c2296c
PH
2508/*
2509 * This checks not only the pgrp, but falls back on the pid if no
2510 * satisfactory pgrp is found. I dunno - gdb doesn't work correctly
2511 * without this...
2512 *
2513 * The caller must hold rcu lock or the tasklist lock.
2514 */
2515static struct pid *session_of_pgrp(struct pid *pgrp)
2516{
2517 struct task_struct *p;
2518 struct pid *sid = NULL;
2519
2520 p = pid_task(pgrp, PIDTYPE_PGID);
2521 if (p == NULL)
2522 p = pid_task(pgrp, PIDTYPE_PID);
2523 if (p != NULL)
2524 sid = task_session(p);
2525
2526 return sid;
2527}
2528
af9b897e
AC
2529/**
2530 * tiocgpgrp - get process group
2531 * @tty: tty passed by user
25985edc 2532 * @real_tty: tty side of the tty passed by the user if a pty else the tty
af9b897e
AC
2533 * @p: returned pid
2534 *
2535 * Obtain the process group of the tty. If there is no process group
2536 * return an error.
2537 *
24ec839c 2538 * Locking: none. Reference to current->signal->tty is safe.
af9b897e
AC
2539 */
2540
1da177e4
LT
2541static int tiocgpgrp(struct tty_struct *tty, struct tty_struct *real_tty, pid_t __user *p)
2542{
5d0fdf1e
AC
2543 struct pid *pid;
2544 int ret;
1da177e4
LT
2545 /*
2546 * (tty == real_tty) is a cheap way of
2547 * testing if the tty is NOT a master pty.
2548 */
2549 if (tty == real_tty && current->signal->tty != real_tty)
2550 return -ENOTTY;
5d0fdf1e
AC
2551 pid = tty_get_pgrp(real_tty);
2552 ret = put_user(pid_vnr(pid), p);
2553 put_pid(pid);
2554 return ret;
1da177e4
LT
2555}
2556
af9b897e
AC
2557/**
2558 * tiocspgrp - attempt to set process group
2559 * @tty: tty passed by user
2560 * @real_tty: tty side device matching tty passed by user
2561 * @p: pid pointer
2562 *
2563 * Set the process group of the tty to the session passed. Only
2564 * permitted where the tty session is our session.
2565 *
47f86834 2566 * Locking: RCU, ctrl lock
af9b897e
AC
2567 */
2568
1da177e4
LT
2569static int tiocspgrp(struct tty_struct *tty, struct tty_struct *real_tty, pid_t __user *p)
2570{
04a2e6a5
EB
2571 struct pid *pgrp;
2572 pid_t pgrp_nr;
1da177e4
LT
2573 int retval = tty_check_change(real_tty);
2574
2575 if (retval == -EIO)
2576 return -ENOTTY;
2577 if (retval)
2578 return retval;
2579 if (!current->signal->tty ||
2580 (current->signal->tty != real_tty) ||
ab521dc0 2581 (real_tty->session != task_session(current)))
1da177e4 2582 return -ENOTTY;
04a2e6a5 2583 if (get_user(pgrp_nr, p))
1da177e4 2584 return -EFAULT;
04a2e6a5 2585 if (pgrp_nr < 0)
1da177e4 2586 return -EINVAL;
04a2e6a5 2587 rcu_read_lock();
b488893a 2588 pgrp = find_vpid(pgrp_nr);
04a2e6a5
EB
2589 retval = -ESRCH;
2590 if (!pgrp)
2591 goto out_unlock;
2592 retval = -EPERM;
2593 if (session_of_pgrp(pgrp) != task_session(current))
2594 goto out_unlock;
2595 retval = 0;
1e86b5bf 2596 spin_lock_irq(&tty->ctrl_lock);
ab521dc0
EB
2597 put_pid(real_tty->pgrp);
2598 real_tty->pgrp = get_pid(pgrp);
1e86b5bf 2599 spin_unlock_irq(&tty->ctrl_lock);
04a2e6a5
EB
2600out_unlock:
2601 rcu_read_unlock();
2602 return retval;
1da177e4
LT
2603}
2604
af9b897e
AC
2605/**
2606 * tiocgsid - get session id
2607 * @tty: tty passed by user
25985edc 2608 * @real_tty: tty side of the tty passed by the user if a pty else the tty
af9b897e
AC
2609 * @p: pointer to returned session id
2610 *
2611 * Obtain the session id of the tty. If there is no session
2612 * return an error.
2613 *
24ec839c 2614 * Locking: none. Reference to current->signal->tty is safe.
af9b897e
AC
2615 */
2616
1da177e4
LT
2617static int tiocgsid(struct tty_struct *tty, struct tty_struct *real_tty, pid_t __user *p)
2618{
2619 /*
2620 * (tty == real_tty) is a cheap way of
2621 * testing if the tty is NOT a master pty.
2622 */
2623 if (tty == real_tty && current->signal->tty != real_tty)
2624 return -ENOTTY;
ab521dc0 2625 if (!real_tty->session)
1da177e4 2626 return -ENOTTY;
b488893a 2627 return put_user(pid_vnr(real_tty->session), p);
1da177e4
LT
2628}
2629
af9b897e
AC
2630/**
2631 * tiocsetd - set line discipline
2632 * @tty: tty device
2633 * @p: pointer to user data
2634 *
2635 * Set the line discipline according to user request.
2636 *
2637 * Locking: see tty_set_ldisc, this function is just a helper
2638 */
2639
1da177e4
LT
2640static int tiocsetd(struct tty_struct *tty, int __user *p)
2641{
2642 int ldisc;
04f378b1 2643 int ret;
1da177e4
LT
2644
2645 if (get_user(ldisc, p))
2646 return -EFAULT;
04f378b1 2647
04f378b1 2648 ret = tty_set_ldisc(tty, ldisc);
04f378b1
AC
2649
2650 return ret;
1da177e4
LT
2651}
2652
af9b897e
AC
2653/**
2654 * send_break - performed time break
2655 * @tty: device to break on
2656 * @duration: timeout in mS
2657 *
2658 * Perform a timed break on hardware that lacks its own driver level
2659 * timed break functionality.
2660 *
2661 * Locking:
28298232 2662 * atomic_write_lock serializes
af9b897e 2663 *
af9b897e
AC
2664 */
2665
b20f3ae5 2666static int send_break(struct tty_struct *tty, unsigned int duration)
1da177e4 2667{
9e98966c
AC
2668 int retval;
2669
2670 if (tty->ops->break_ctl == NULL)
2671 return 0;
2672
2673 if (tty->driver->flags & TTY_DRIVER_HARDWARE_BREAK)
2674 retval = tty->ops->break_ctl(tty, duration);
2675 else {
2676 /* Do the work ourselves */
2677 if (tty_write_lock(tty, 0) < 0)
2678 return -EINTR;
2679 retval = tty->ops->break_ctl(tty, -1);
2680 if (retval)
2681 goto out;
2682 if (!signal_pending(current))
2683 msleep_interruptible(duration);
2684 retval = tty->ops->break_ctl(tty, 0);
2685out:
2686 tty_write_unlock(tty);
2687 if (signal_pending(current))
2688 retval = -EINTR;
2689 }
2690 return retval;
1da177e4
LT
2691}
2692
af9b897e 2693/**
f34d7a5b 2694 * tty_tiocmget - get modem status
af9b897e
AC
2695 * @tty: tty device
2696 * @file: user file pointer
2697 * @p: pointer to result
2698 *
2699 * Obtain the modem status bits from the tty driver if the feature
2700 * is supported. Return -EINVAL if it is not available.
2701 *
2702 * Locking: none (up to the driver)
2703 */
2704
60b33c13 2705static int tty_tiocmget(struct tty_struct *tty, int __user *p)
1da177e4
LT
2706{
2707 int retval = -EINVAL;
2708
f34d7a5b 2709 if (tty->ops->tiocmget) {
60b33c13 2710 retval = tty->ops->tiocmget(tty);
1da177e4
LT
2711
2712 if (retval >= 0)
2713 retval = put_user(retval, p);
2714 }
2715 return retval;
2716}
2717
af9b897e 2718/**
f34d7a5b 2719 * tty_tiocmset - set modem status
af9b897e 2720 * @tty: tty device
af9b897e
AC
2721 * @cmd: command - clear bits, set bits or set all
2722 * @p: pointer to desired bits
2723 *
2724 * Set the modem status bits from the tty driver if the feature
2725 * is supported. Return -EINVAL if it is not available.
2726 *
2727 * Locking: none (up to the driver)
2728 */
2729
20b9d177 2730static int tty_tiocmset(struct tty_struct *tty, unsigned int cmd,
1da177e4
LT
2731 unsigned __user *p)
2732{
ae677517
AC
2733 int retval;
2734 unsigned int set, clear, val;
1da177e4 2735
ae677517
AC
2736 if (tty->ops->tiocmset == NULL)
2737 return -EINVAL;
1da177e4 2738
ae677517
AC
2739 retval = get_user(val, p);
2740 if (retval)
2741 return retval;
2742 set = clear = 0;
2743 switch (cmd) {
2744 case TIOCMBIS:
2745 set = val;
2746 break;
2747 case TIOCMBIC:
2748 clear = val;
2749 break;
2750 case TIOCMSET:
2751 set = val;
2752 clear = ~val;
2753 break;
2754 }
2755 set &= TIOCM_DTR|TIOCM_RTS|TIOCM_OUT1|TIOCM_OUT2|TIOCM_LOOP;
2756 clear &= TIOCM_DTR|TIOCM_RTS|TIOCM_OUT1|TIOCM_OUT2|TIOCM_LOOP;
20b9d177 2757 return tty->ops->tiocmset(tty, set, clear);
1da177e4
LT
2758}
2759
d281da7f
AC
2760static int tty_tiocgicount(struct tty_struct *tty, void __user *arg)
2761{
2762 int retval = -EINVAL;
2763 struct serial_icounter_struct icount;
2764 memset(&icount, 0, sizeof(icount));
2765 if (tty->ops->get_icount)
2766 retval = tty->ops->get_icount(tty, &icount);
2767 if (retval != 0)
2768 return retval;
2769 if (copy_to_user(arg, &icount, sizeof(icount)))
2770 return -EFAULT;
2771 return 0;
2772}
2773
8a8ae62f
JS
2774static void tty_warn_deprecated_flags(struct serial_struct __user *ss)
2775{
2776 static DEFINE_RATELIMIT_STATE(depr_flags,
2777 DEFAULT_RATELIMIT_INTERVAL,
2778 DEFAULT_RATELIMIT_BURST);
2779 char comm[TASK_COMM_LEN];
2780 int flags;
2781
2782 if (get_user(flags, &ss->flags))
2783 return;
2784
2785 flags &= ASYNC_DEPRECATED;
2786
2787 if (flags && __ratelimit(&depr_flags))
2788 pr_warning("%s: '%s' is using deprecated serial flags (with no effect): %.8x\n",
2789 __func__, get_task_comm(comm, current), flags);
2790}
2791
8f166e00
PH
2792/*
2793 * if pty, return the slave side (real_tty)
2794 * otherwise, return self
2795 */
2796static struct tty_struct *tty_pair_get_tty(struct tty_struct *tty)
e8b70e7d
AC
2797{
2798 if (tty->driver->type == TTY_DRIVER_TYPE_PTY &&
2799 tty->driver->subtype == PTY_TYPE_MASTER)
2800 tty = tty->link;
2801 return tty;
2802}
e8b70e7d 2803
1da177e4
LT
2804/*
2805 * Split this up, as gcc can choke on it otherwise..
2806 */
04f378b1 2807long tty_ioctl(struct file *file, unsigned int cmd, unsigned long arg)
1da177e4 2808{
d996b62a
NP
2809 struct tty_struct *tty = file_tty(file);
2810 struct tty_struct *real_tty;
1da177e4
LT
2811 void __user *p = (void __user *)arg;
2812 int retval;
2813 struct tty_ldisc *ld;
37bdfb07 2814
6131ffaa 2815 if (tty_paranoia_check(tty, file_inode(file), "tty_ioctl"))
1da177e4
LT
2816 return -EINVAL;
2817
e8b70e7d 2818 real_tty = tty_pair_get_tty(tty);
1da177e4
LT
2819
2820 /*
2821 * Factor out some common prep work
2822 */
2823 switch (cmd) {
2824 case TIOCSETD:
2825 case TIOCSBRK:
2826 case TIOCCBRK:
2827 case TCSBRK:
37bdfb07 2828 case TCSBRKP:
1da177e4
LT
2829 retval = tty_check_change(tty);
2830 if (retval)
2831 return retval;
2832 if (cmd != TIOCCBRK) {
2833 tty_wait_until_sent(tty, 0);
2834 if (signal_pending(current))
2835 return -EINTR;
2836 }
2837 break;
2838 }
2839
9e98966c
AC
2840 /*
2841 * Now do the stuff.
2842 */
1da177e4 2843 switch (cmd) {
37bdfb07
AC
2844 case TIOCSTI:
2845 return tiocsti(tty, p);
2846 case TIOCGWINSZ:
8f520021 2847 return tiocgwinsz(real_tty, p);
37bdfb07 2848 case TIOCSWINSZ:
fc6f6238 2849 return tiocswinsz(real_tty, p);
37bdfb07
AC
2850 case TIOCCONS:
2851 return real_tty != tty ? -EINVAL : tioccons(file);
2852 case FIONBIO:
2853 return fionbio(file, p);
2854 case TIOCEXCL:
2855 set_bit(TTY_EXCLUSIVE, &tty->flags);
2856 return 0;
2857 case TIOCNXCL:
2858 clear_bit(TTY_EXCLUSIVE, &tty->flags);
2859 return 0;
84fd7bdf
CG
2860 case TIOCGEXCL:
2861 {
2862 int excl = test_bit(TTY_EXCLUSIVE, &tty->flags);
2863 return put_user(excl, (int __user *)p);
2864 }
37bdfb07
AC
2865 case TIOCNOTTY:
2866 if (current->signal->tty != tty)
2867 return -ENOTTY;
2868 no_tty();
2869 return 0;
2870 case TIOCSCTTY:
0c556271 2871 return tiocsctty(tty, file, arg);
37bdfb07
AC
2872 case TIOCGPGRP:
2873 return tiocgpgrp(tty, real_tty, p);
2874 case TIOCSPGRP:
2875 return tiocspgrp(tty, real_tty, p);
2876 case TIOCGSID:
2877 return tiocgsid(tty, real_tty, p);
2878 case TIOCGETD:
c65c9bc3 2879 return put_user(tty->ldisc->ops->num, (int __user *)p);
37bdfb07
AC
2880 case TIOCSETD:
2881 return tiocsetd(tty, p);
3c95c985
KS
2882 case TIOCVHANGUP:
2883 if (!capable(CAP_SYS_ADMIN))
2884 return -EPERM;
2885 tty_vhangup(tty);
2886 return 0;
b7b8de08
WF
2887 case TIOCGDEV:
2888 {
2889 unsigned int ret = new_encode_dev(tty_devnum(real_tty));
2890 return put_user(ret, (unsigned int __user *)p);
2891 }
37bdfb07
AC
2892 /*
2893 * Break handling
2894 */
2895 case TIOCSBRK: /* Turn break on, unconditionally */
f34d7a5b 2896 if (tty->ops->break_ctl)
9e98966c 2897 return tty->ops->break_ctl(tty, -1);
37bdfb07 2898 return 0;
37bdfb07 2899 case TIOCCBRK: /* Turn break off, unconditionally */
f34d7a5b 2900 if (tty->ops->break_ctl)
9e98966c 2901 return tty->ops->break_ctl(tty, 0);
37bdfb07
AC
2902 return 0;
2903 case TCSBRK: /* SVID version: non-zero arg --> no break */
2904 /* non-zero arg means wait for all output data
2905 * to be sent (performed above) but don't send break.
2906 * This is used by the tcdrain() termios function.
2907 */
2908 if (!arg)
2909 return send_break(tty, 250);
2910 return 0;
2911 case TCSBRKP: /* support for POSIX tcsendbreak() */
2912 return send_break(tty, arg ? arg*100 : 250);
2913
2914 case TIOCMGET:
60b33c13 2915 return tty_tiocmget(tty, p);
37bdfb07
AC
2916 case TIOCMSET:
2917 case TIOCMBIC:
2918 case TIOCMBIS:
20b9d177 2919 return tty_tiocmset(tty, cmd, p);
d281da7f
AC
2920 case TIOCGICOUNT:
2921 retval = tty_tiocgicount(tty, p);
2922 /* For the moment allow fall through to the old method */
2923 if (retval != -EINVAL)
2924 return retval;
2925 break;
37bdfb07
AC
2926 case TCFLSH:
2927 switch (arg) {
2928 case TCIFLUSH:
2929 case TCIOFLUSH:
2930 /* flush tty buffer and allow ldisc to process ioctl */
86c80a8e 2931 tty_buffer_flush(tty, NULL);
c5c34d48 2932 break;
37bdfb07
AC
2933 }
2934 break;
8a8ae62f
JS
2935 case TIOCSSERIAL:
2936 tty_warn_deprecated_flags(p);
2937 break;
1da177e4 2938 }
f34d7a5b 2939 if (tty->ops->ioctl) {
c961bfb1 2940 retval = tty->ops->ioctl(tty, cmd, arg);
1da177e4
LT
2941 if (retval != -ENOIOCTLCMD)
2942 return retval;
2943 }
2944 ld = tty_ldisc_ref_wait(tty);
2945 retval = -EINVAL;
a352def2
AC
2946 if (ld->ops->ioctl) {
2947 retval = ld->ops->ioctl(tty, file, cmd, arg);
1da177e4 2948 if (retval == -ENOIOCTLCMD)
bbb63c51 2949 retval = -ENOTTY;
1da177e4
LT
2950 }
2951 tty_ldisc_deref(ld);
2952 return retval;
2953}
2954
e10cc1df 2955#ifdef CONFIG_COMPAT
37bdfb07 2956static long tty_compat_ioctl(struct file *file, unsigned int cmd,
e10cc1df
PF
2957 unsigned long arg)
2958{
d996b62a 2959 struct tty_struct *tty = file_tty(file);
e10cc1df
PF
2960 struct tty_ldisc *ld;
2961 int retval = -ENOIOCTLCMD;
2962
6131ffaa 2963 if (tty_paranoia_check(tty, file_inode(file), "tty_ioctl"))
e10cc1df
PF
2964 return -EINVAL;
2965
f34d7a5b 2966 if (tty->ops->compat_ioctl) {
c961bfb1 2967 retval = tty->ops->compat_ioctl(tty, cmd, arg);
e10cc1df
PF
2968 if (retval != -ENOIOCTLCMD)
2969 return retval;
2970 }
2971
2972 ld = tty_ldisc_ref_wait(tty);
a352def2
AC
2973 if (ld->ops->compat_ioctl)
2974 retval = ld->ops->compat_ioctl(tty, file, cmd, arg);
8193c429
TM
2975 else
2976 retval = n_tty_compat_ioctl_helper(tty, file, cmd, arg);
e10cc1df
PF
2977 tty_ldisc_deref(ld);
2978
2979 return retval;
2980}
2981#endif
1da177e4 2982
c3c073f8
AV
2983static int this_tty(const void *t, struct file *file, unsigned fd)
2984{
2985 if (likely(file->f_op->read != tty_read))
2986 return 0;
2987 return file_tty(file) != t ? 0 : fd + 1;
2988}
2989
1da177e4
LT
2990/*
2991 * This implements the "Secure Attention Key" --- the idea is to
2992 * prevent trojan horses by killing all processes associated with this
2993 * tty when the user hits the "Secure Attention Key". Required for
2994 * super-paranoid applications --- see the Orange Book for more details.
37bdfb07 2995 *
1da177e4
LT
2996 * This code could be nicer; ideally it should send a HUP, wait a few
2997 * seconds, then send a INT, and then a KILL signal. But you then
2998 * have to coordinate with the init process, since all processes associated
2999 * with the current tty must be dead before the new getty is allowed
3000 * to spawn.
3001 *
3002 * Now, if it would be correct ;-/ The current code has a nasty hole -
3003 * it doesn't catch files in flight. We may send the descriptor to ourselves
3004 * via AF_UNIX socket, close it and later fetch from socket. FIXME.
3005 *
3006 * Nasty bug: do_SAK is being called in interrupt context. This can
3007 * deadlock. We punt it up to process context. AKPM - 16Mar2001
3008 */
8b6312f4 3009void __do_SAK(struct tty_struct *tty)
1da177e4
LT
3010{
3011#ifdef TTY_SOFT_SAK
3012 tty_hangup(tty);
3013#else
652486fb 3014 struct task_struct *g, *p;
ab521dc0 3015 struct pid *session;
1da177e4 3016 int i;
37bdfb07 3017
1da177e4
LT
3018 if (!tty)
3019 return;
24ec839c 3020 session = tty->session;
37bdfb07 3021
b3f13deb 3022 tty_ldisc_flush(tty);
1da177e4 3023
f34d7a5b 3024 tty_driver_flush_buffer(tty);
37bdfb07 3025
1da177e4 3026 read_lock(&tasklist_lock);
652486fb 3027 /* Kill the entire session */
ab521dc0 3028 do_each_pid_task(session, PIDTYPE_SID, p) {
9b42bb75
PH
3029 tty_notice(tty, "SAK: killed process %d (%s): by session\n",
3030 task_pid_nr(p), p->comm);
652486fb 3031 send_sig(SIGKILL, p, 1);
ab521dc0 3032 } while_each_pid_task(session, PIDTYPE_SID, p);
9b42bb75
PH
3033
3034 /* Now kill any processes that happen to have the tty open */
652486fb
EB
3035 do_each_thread(g, p) {
3036 if (p->signal->tty == tty) {
9b42bb75
PH
3037 tty_notice(tty, "SAK: killed process %d (%s): by controlling tty\n",
3038 task_pid_nr(p), p->comm);
1da177e4
LT
3039 send_sig(SIGKILL, p, 1);
3040 continue;
3041 }
3042 task_lock(p);
c3c073f8
AV
3043 i = iterate_fd(p->files, 0, this_tty, tty);
3044 if (i != 0) {
9b42bb75
PH
3045 tty_notice(tty, "SAK: killed process %d (%s): by fd#%d\n",
3046 task_pid_nr(p), p->comm, i - 1);
c3c073f8 3047 force_sig(SIGKILL, p);
1da177e4
LT
3048 }
3049 task_unlock(p);
652486fb 3050 } while_each_thread(g, p);
1da177e4
LT
3051 read_unlock(&tasklist_lock);
3052#endif
3053}
3054
8b6312f4
EB
3055static void do_SAK_work(struct work_struct *work)
3056{
3057 struct tty_struct *tty =
3058 container_of(work, struct tty_struct, SAK_work);
3059 __do_SAK(tty);
3060}
3061
1da177e4
LT
3062/*
3063 * The tq handling here is a little racy - tty->SAK_work may already be queued.
3064 * Fortunately we don't need to worry, because if ->SAK_work is already queued,
3065 * the values which we write to it will be identical to the values which it
3066 * already has. --akpm
3067 */
3068void do_SAK(struct tty_struct *tty)
3069{
3070 if (!tty)
3071 return;
1da177e4
LT
3072 schedule_work(&tty->SAK_work);
3073}
3074
3075EXPORT_SYMBOL(do_SAK);
3076
6e9430ac 3077static int dev_match_devt(struct device *dev, const void *data)
30004ac9 3078{
6e9430ac 3079 const dev_t *devt = data;
30004ac9
DES
3080 return dev->devt == *devt;
3081}
3082
3083/* Must put_device() after it's unused! */
3084static struct device *tty_get_device(struct tty_struct *tty)
3085{
3086 dev_t devt = tty_devnum(tty);
3087 return class_find_device(tty_class, NULL, &devt, dev_match_devt);
3088}
3089
3090
af9b897e 3091/**
2c964a2f 3092 * alloc_tty_struct
af9b897e 3093 *
2c964a2f 3094 * This subroutine allocates and initializes a tty structure.
af9b897e 3095 *
2c964a2f 3096 * Locking: none - tty in question is not exposed at this point
1da177e4 3097 */
af9b897e 3098
2c964a2f 3099struct tty_struct *alloc_tty_struct(struct tty_driver *driver, int idx)
1da177e4 3100{
2c964a2f
RV
3101 struct tty_struct *tty;
3102
3103 tty = kzalloc(sizeof(*tty), GFP_KERNEL);
3104 if (!tty)
3105 return NULL;
3106
9c9f4ded 3107 kref_init(&tty->kref);
1da177e4 3108 tty->magic = TTY_MAGIC;
01e1abb2 3109 tty_ldisc_init(tty);
ab521dc0
EB
3110 tty->session = NULL;
3111 tty->pgrp = NULL;
89c8d91e 3112 mutex_init(&tty->legacy_mutex);
d8c1f929 3113 mutex_init(&tty->throttle_mutex);
6a1c0680 3114 init_rwsem(&tty->termios_rwsem);
dee4a0be 3115 mutex_init(&tty->winsize_mutex);
36697529 3116 init_ldsem(&tty->ldisc_sem);
1da177e4
LT
3117 init_waitqueue_head(&tty->write_wait);
3118 init_waitqueue_head(&tty->read_wait);
65f27f38 3119 INIT_WORK(&tty->hangup_work, do_tty_hangup);
70522e12 3120 mutex_init(&tty->atomic_write_lock);
04f378b1 3121 spin_lock_init(&tty->ctrl_lock);
f9e053dc 3122 spin_lock_init(&tty->flow_lock);
1da177e4 3123 INIT_LIST_HEAD(&tty->tty_files);
7f1f86a0 3124 INIT_WORK(&tty->SAK_work, do_SAK_work);
bf970ee4
AC
3125
3126 tty->driver = driver;
3127 tty->ops = driver->ops;
3128 tty->index = idx;
3129 tty_line_name(driver, idx, tty->name);
30004ac9 3130 tty->dev = tty_get_device(tty);
2c964a2f
RV
3131
3132 return tty;
1da177e4
LT
3133}
3134
6716671d
JS
3135/**
3136 * deinitialize_tty_struct
3137 * @tty: tty to deinitialize
3138 *
3139 * This subroutine deinitializes a tty structure that has been newly
3140 * allocated but tty_release cannot be called on that yet.
3141 *
3142 * Locking: none - tty in question must not be exposed at this point
3143 */
3144void deinitialize_tty_struct(struct tty_struct *tty)
3145{
3146 tty_ldisc_deinit(tty);
3147}
3148
f34d7a5b
AC
3149/**
3150 * tty_put_char - write one character to a tty
3151 * @tty: tty
3152 * @ch: character
3153 *
3154 * Write one byte to the tty using the provided put_char method
3155 * if present. Returns the number of characters successfully output.
3156 *
3157 * Note: the specific put_char operation in the driver layer may go
3158 * away soon. Don't call it directly, use this method
1da177e4 3159 */
af9b897e 3160
f34d7a5b 3161int tty_put_char(struct tty_struct *tty, unsigned char ch)
1da177e4 3162{
f34d7a5b
AC
3163 if (tty->ops->put_char)
3164 return tty->ops->put_char(tty, ch);
3165 return tty->ops->write(tty, &ch, 1);
1da177e4 3166}
f34d7a5b
AC
3167EXPORT_SYMBOL_GPL(tty_put_char);
3168
d81ed103 3169struct class *tty_class;
1da177e4 3170
7e73eca6
JS
3171static int tty_cdev_add(struct tty_driver *driver, dev_t dev,
3172 unsigned int index, unsigned int count)
3173{
c1a752ba
LY
3174 int err;
3175
7e73eca6 3176 /* init here, since reused cdevs cause crashes */
a3a10ce3
RW
3177 driver->cdevs[index] = cdev_alloc();
3178 if (!driver->cdevs[index])
3179 return -ENOMEM;
c1a752ba 3180 driver->cdevs[index]->ops = &tty_fops;
a3a10ce3 3181 driver->cdevs[index]->owner = driver->owner;
c1a752ba
LY
3182 err = cdev_add(driver->cdevs[index], dev, count);
3183 if (err)
3184 kobject_put(&driver->cdevs[index]->kobj);
3185 return err;
7e73eca6
JS
3186}
3187
1da177e4 3188/**
af9b897e
AC
3189 * tty_register_device - register a tty device
3190 * @driver: the tty driver that describes the tty device
3191 * @index: the index in the tty driver for this tty device
3192 * @device: a struct device that is associated with this tty device.
3193 * This field is optional, if there is no known struct device
3194 * for this tty device it can be set to NULL safely.
1da177e4 3195 *
01107d34
GKH
3196 * Returns a pointer to the struct device for this tty device
3197 * (or ERR_PTR(-EFOO) on error).
1cdcb6b4 3198 *
af9b897e
AC
3199 * This call is required to be made to register an individual tty device
3200 * if the tty driver's flags have the TTY_DRIVER_DYNAMIC_DEV bit set. If
3201 * that bit is not set, this function should not be called by a tty
3202 * driver.
3203 *
3204 * Locking: ??
1da177e4 3205 */
af9b897e 3206
01107d34
GKH
3207struct device *tty_register_device(struct tty_driver *driver, unsigned index,
3208 struct device *device)
1da177e4 3209{
6915c0e4
TH
3210 return tty_register_device_attr(driver, index, device, NULL, NULL);
3211}
3212EXPORT_SYMBOL(tty_register_device);
3213
b1b79916
TH
3214static void tty_device_create_release(struct device *dev)
3215{
3216 pr_debug("device: '%s': %s\n", dev_name(dev), __func__);
3217 kfree(dev);
3218}
3219
6915c0e4
TH
3220/**
3221 * tty_register_device_attr - register a tty device
3222 * @driver: the tty driver that describes the tty device
3223 * @index: the index in the tty driver for this tty device
3224 * @device: a struct device that is associated with this tty device.
3225 * This field is optional, if there is no known struct device
3226 * for this tty device it can be set to NULL safely.
3227 * @drvdata: Driver data to be set to device.
3228 * @attr_grp: Attribute group to be set on device.
3229 *
3230 * Returns a pointer to the struct device for this tty device
3231 * (or ERR_PTR(-EFOO) on error).
3232 *
3233 * This call is required to be made to register an individual tty device
3234 * if the tty driver's flags have the TTY_DRIVER_DYNAMIC_DEV bit set. If
3235 * that bit is not set, this function should not be called by a tty
3236 * driver.
3237 *
3238 * Locking: ??
3239 */
3240struct device *tty_register_device_attr(struct tty_driver *driver,
3241 unsigned index, struct device *device,
3242 void *drvdata,
3243 const struct attribute_group **attr_grp)
3244{
1da177e4 3245 char name[64];
6915c0e4
TH
3246 dev_t devt = MKDEV(driver->major, driver->minor_start) + index;
3247 struct device *dev = NULL;
3248 int retval = -ENODEV;
7e73eca6 3249 bool cdev = false;
1da177e4
LT
3250
3251 if (index >= driver->num) {
3252 printk(KERN_ERR "Attempt to register invalid tty line number "
3253 " (%d).\n", index);
1cdcb6b4 3254 return ERR_PTR(-EINVAL);
1da177e4
LT
3255 }
3256
1da177e4
LT
3257 if (driver->type == TTY_DRIVER_TYPE_PTY)
3258 pty_line_name(driver, index, name);
3259 else
3260 tty_line_name(driver, index, name);
1cdcb6b4 3261
7e73eca6 3262 if (!(driver->flags & TTY_DRIVER_DYNAMIC_ALLOC)) {
6915c0e4
TH
3263 retval = tty_cdev_add(driver, devt, index, 1);
3264 if (retval)
3265 goto error;
7e73eca6
JS
3266 cdev = true;
3267 }
3268
6915c0e4
TH
3269 dev = kzalloc(sizeof(*dev), GFP_KERNEL);
3270 if (!dev) {
3271 retval = -ENOMEM;
3272 goto error;
3273 }
7e73eca6 3274
6915c0e4
TH
3275 dev->devt = devt;
3276 dev->class = tty_class;
3277 dev->parent = device;
b1b79916 3278 dev->release = tty_device_create_release;
6915c0e4
TH
3279 dev_set_name(dev, "%s", name);
3280 dev->groups = attr_grp;
3281 dev_set_drvdata(dev, drvdata);
3282
3283 retval = device_register(dev);
3284 if (retval)
3285 goto error;
3286
3287 return dev;
3288
3289error:
3290 put_device(dev);
a3a10ce3
RW
3291 if (cdev) {
3292 cdev_del(driver->cdevs[index]);
3293 driver->cdevs[index] = NULL;
3294 }
6915c0e4 3295 return ERR_PTR(retval);
1da177e4 3296}
6915c0e4 3297EXPORT_SYMBOL_GPL(tty_register_device_attr);
1da177e4
LT
3298
3299/**
af9b897e
AC
3300 * tty_unregister_device - unregister a tty device
3301 * @driver: the tty driver that describes the tty device
3302 * @index: the index in the tty driver for this tty device
1da177e4 3303 *
af9b897e
AC
3304 * If a tty device is registered with a call to tty_register_device() then
3305 * this function must be called when the tty device is gone.
3306 *
3307 * Locking: ??
1da177e4 3308 */
af9b897e 3309
1da177e4
LT
3310void tty_unregister_device(struct tty_driver *driver, unsigned index)
3311{
37bdfb07
AC
3312 device_destroy(tty_class,
3313 MKDEV(driver->major, driver->minor_start) + index);
a3a10ce3
RW
3314 if (!(driver->flags & TTY_DRIVER_DYNAMIC_ALLOC)) {
3315 cdev_del(driver->cdevs[index]);
3316 driver->cdevs[index] = NULL;
3317 }
1da177e4 3318}
1da177e4
LT
3319EXPORT_SYMBOL(tty_unregister_device);
3320
7f0bc6a6
JS
3321/**
3322 * __tty_alloc_driver -- allocate tty driver
3323 * @lines: count of lines this driver can handle at most
3324 * @owner: module which is repsonsible for this driver
3325 * @flags: some of TTY_DRIVER_* flags, will be set in driver->flags
3326 *
3327 * This should not be called directly, some of the provided macros should be
3328 * used instead. Use IS_ERR and friends on @retval.
3329 */
3330struct tty_driver *__tty_alloc_driver(unsigned int lines, struct module *owner,
3331 unsigned long flags)
1da177e4
LT
3332{
3333 struct tty_driver *driver;
7e73eca6 3334 unsigned int cdevs = 1;
16a02081 3335 int err;
1da177e4 3336
0019b408 3337 if (!lines || (flags & TTY_DRIVER_UNNUMBERED_NODE && lines > 1))
7f0bc6a6
JS
3338 return ERR_PTR(-EINVAL);
3339
506eb99a 3340 driver = kzalloc(sizeof(struct tty_driver), GFP_KERNEL);
7f0bc6a6
JS
3341 if (!driver)
3342 return ERR_PTR(-ENOMEM);
3343
3344 kref_init(&driver->kref);
3345 driver->magic = TTY_DRIVER_MAGIC;
3346 driver->num = lines;
3347 driver->owner = owner;
3348 driver->flags = flags;
16a02081
JS
3349
3350 if (!(flags & TTY_DRIVER_DEVPTS_MEM)) {
3351 driver->ttys = kcalloc(lines, sizeof(*driver->ttys),
3352 GFP_KERNEL);
3353 driver->termios = kcalloc(lines, sizeof(*driver->termios),
3354 GFP_KERNEL);
3355 if (!driver->ttys || !driver->termios) {
3356 err = -ENOMEM;
3357 goto err_free_all;
3358 }
3359 }
3360
3361 if (!(flags & TTY_DRIVER_DYNAMIC_ALLOC)) {
3362 driver->ports = kcalloc(lines, sizeof(*driver->ports),
3363 GFP_KERNEL);
3364 if (!driver->ports) {
3365 err = -ENOMEM;
3366 goto err_free_all;
3367 }
7e73eca6
JS
3368 cdevs = lines;
3369 }
3370
3371 driver->cdevs = kcalloc(cdevs, sizeof(*driver->cdevs), GFP_KERNEL);
3372 if (!driver->cdevs) {
3373 err = -ENOMEM;
3374 goto err_free_all;
16a02081 3375 }
7f0bc6a6 3376
1da177e4 3377 return driver;
16a02081
JS
3378err_free_all:
3379 kfree(driver->ports);
3380 kfree(driver->ttys);
3381 kfree(driver->termios);
a3a10ce3 3382 kfree(driver->cdevs);
16a02081
JS
3383 kfree(driver);
3384 return ERR_PTR(err);
1da177e4 3385}
7f0bc6a6 3386EXPORT_SYMBOL(__tty_alloc_driver);
1da177e4 3387
7d7b93c1 3388static void destruct_tty_driver(struct kref *kref)
1da177e4 3389{
7d7b93c1
AC
3390 struct tty_driver *driver = container_of(kref, struct tty_driver, kref);
3391 int i;
3392 struct ktermios *tp;
7d7b93c1
AC
3393
3394 if (driver->flags & TTY_DRIVER_INSTALLED) {
3395 /*
3396 * Free the termios and termios_locked structures because
3397 * we don't want to get memory leaks when modular tty
3398 * drivers are removed from the kernel.
3399 */
3400 for (i = 0; i < driver->num; i++) {
3401 tp = driver->termios[i];
3402 if (tp) {
3403 driver->termios[i] = NULL;
3404 kfree(tp);
3405 }
7d7b93c1
AC
3406 if (!(driver->flags & TTY_DRIVER_DYNAMIC_DEV))
3407 tty_unregister_device(driver, i);
3408 }
7d7b93c1 3409 proc_tty_unregister_driver(driver);
7e73eca6 3410 if (driver->flags & TTY_DRIVER_DYNAMIC_ALLOC)
a3a10ce3 3411 cdev_del(driver->cdevs[0]);
7d7b93c1 3412 }
7e73eca6 3413 kfree(driver->cdevs);
04831dc1 3414 kfree(driver->ports);
16a02081
JS
3415 kfree(driver->termios);
3416 kfree(driver->ttys);
1da177e4
LT
3417 kfree(driver);
3418}
3419
7d7b93c1
AC
3420void tty_driver_kref_put(struct tty_driver *driver)
3421{
3422 kref_put(&driver->kref, destruct_tty_driver);
3423}
3424EXPORT_SYMBOL(tty_driver_kref_put);
3425
b68e31d0
JD
3426void tty_set_operations(struct tty_driver *driver,
3427 const struct tty_operations *op)
1da177e4 3428{
f34d7a5b
AC
3429 driver->ops = op;
3430};
7d7b93c1 3431EXPORT_SYMBOL(tty_set_operations);
1da177e4 3432
7d7b93c1
AC
3433void put_tty_driver(struct tty_driver *d)
3434{
3435 tty_driver_kref_put(d);
3436}
1da177e4 3437EXPORT_SYMBOL(put_tty_driver);
1da177e4
LT
3438
3439/*
3440 * Called by a tty driver to register itself.
3441 */
3442int tty_register_driver(struct tty_driver *driver)
3443{
3444 int error;
37bdfb07 3445 int i;
1da177e4 3446 dev_t dev;
b670bde0 3447 struct device *d;
1da177e4 3448
1da177e4 3449 if (!driver->major) {
37bdfb07
AC
3450 error = alloc_chrdev_region(&dev, driver->minor_start,
3451 driver->num, driver->name);
1da177e4
LT
3452 if (!error) {
3453 driver->major = MAJOR(dev);
3454 driver->minor_start = MINOR(dev);
3455 }
3456 } else {
3457 dev = MKDEV(driver->major, driver->minor_start);
e5717c48 3458 error = register_chrdev_region(dev, driver->num, driver->name);
1da177e4 3459 }
9bb8a3d4 3460 if (error < 0)
16a02081 3461 goto err;
1da177e4 3462
7e73eca6
JS
3463 if (driver->flags & TTY_DRIVER_DYNAMIC_ALLOC) {
3464 error = tty_cdev_add(driver, dev, 0, driver->num);
3465 if (error)
3466 goto err_unreg_char;
3467 }
1da177e4 3468
ca509f69 3469 mutex_lock(&tty_mutex);
1da177e4 3470 list_add(&driver->tty_drivers, &tty_drivers);
ca509f69 3471 mutex_unlock(&tty_mutex);
37bdfb07
AC
3472
3473 if (!(driver->flags & TTY_DRIVER_DYNAMIC_DEV)) {
b670bde0
VK
3474 for (i = 0; i < driver->num; i++) {
3475 d = tty_register_device(driver, i, NULL);
3476 if (IS_ERR(d)) {
3477 error = PTR_ERR(d);
16a02081 3478 goto err_unreg_devs;
b670bde0
VK
3479 }
3480 }
1da177e4
LT
3481 }
3482 proc_tty_register_driver(driver);
7d7b93c1 3483 driver->flags |= TTY_DRIVER_INSTALLED;
1da177e4 3484 return 0;
b670bde0 3485
16a02081 3486err_unreg_devs:
b670bde0
VK
3487 for (i--; i >= 0; i--)
3488 tty_unregister_device(driver, i);
3489
3490 mutex_lock(&tty_mutex);
3491 list_del(&driver->tty_drivers);
3492 mutex_unlock(&tty_mutex);
3493
9bb8a3d4 3494err_unreg_char:
b670bde0 3495 unregister_chrdev_region(dev, driver->num);
16a02081 3496err:
b670bde0 3497 return error;
1da177e4 3498}
1da177e4
LT
3499EXPORT_SYMBOL(tty_register_driver);
3500
3501/*
3502 * Called by a tty driver to unregister itself.
3503 */
3504int tty_unregister_driver(struct tty_driver *driver)
3505{
7d7b93c1
AC
3506#if 0
3507 /* FIXME */
1da177e4
LT
3508 if (driver->refcount)
3509 return -EBUSY;
7d7b93c1 3510#endif
1da177e4
LT
3511 unregister_chrdev_region(MKDEV(driver->major, driver->minor_start),
3512 driver->num);
ca509f69 3513 mutex_lock(&tty_mutex);
1da177e4 3514 list_del(&driver->tty_drivers);
ca509f69 3515 mutex_unlock(&tty_mutex);
1da177e4
LT
3516 return 0;
3517}
7d7b93c1 3518
1da177e4
LT
3519EXPORT_SYMBOL(tty_unregister_driver);
3520
24ec839c
PZ
3521dev_t tty_devnum(struct tty_struct *tty)
3522{
3523 return MKDEV(tty->driver->major, tty->driver->minor_start) + tty->index;
3524}
3525EXPORT_SYMBOL(tty_devnum);
1da177e4 3526
d81ed103
AC
3527void tty_default_fops(struct file_operations *fops)
3528{
3529 *fops = tty_fops;
3530}
3531
1da177e4
LT
3532/*
3533 * Initialize the console device. This is called *early*, so
3534 * we can't necessarily depend on lots of kernel help here.
3535 * Just do some early initializations, and do the complex setup
3536 * later.
3537 */
3538void __init console_init(void)
3539{
3540 initcall_t *call;
3541
3542 /* Setup the default TTY line discipline. */
01e1abb2 3543 tty_ldisc_begin();
1da177e4
LT
3544
3545 /*
37bdfb07 3546 * set up the console device so that later boot sequences can
1da177e4
LT
3547 * inform about problems etc..
3548 */
1da177e4
LT
3549 call = __con_initcall_start;
3550 while (call < __con_initcall_end) {
3551 (*call)();
3552 call++;
3553 }
3554}
3555
2c9ede55 3556static char *tty_devnode(struct device *dev, umode_t *mode)
e454cea2
KS
3557{
3558 if (!mode)
3559 return NULL;
3560 if (dev->devt == MKDEV(TTYAUX_MAJOR, 0) ||
3561 dev->devt == MKDEV(TTYAUX_MAJOR, 2))
3562 *mode = 0666;
3563 return NULL;
3564}
3565
1da177e4
LT
3566static int __init tty_class_init(void)
3567{
7fe845d1 3568 tty_class = class_create(THIS_MODULE, "tty");
1da177e4
LT
3569 if (IS_ERR(tty_class))
3570 return PTR_ERR(tty_class);
e454cea2 3571 tty_class->devnode = tty_devnode;
1da177e4
LT
3572 return 0;
3573}
3574
3575postcore_initcall(tty_class_init);
3576
3577/* 3/2004 jmc: why do these devices exist? */
1da177e4 3578static struct cdev tty_cdev, console_cdev;
1da177e4 3579
fbc92a34
KS
3580static ssize_t show_cons_active(struct device *dev,
3581 struct device_attribute *attr, char *buf)
3582{
3583 struct console *cs[16];
3584 int i = 0;
3585 struct console *c;
3586 ssize_t count = 0;
3587
ac751efa 3588 console_lock();
a2a6a822 3589 for_each_console(c) {
fbc92a34
KS
3590 if (!c->device)
3591 continue;
3592 if (!c->write)
3593 continue;
3594 if ((c->flags & CON_ENABLED) == 0)
3595 continue;
3596 cs[i++] = c;
3597 if (i >= ARRAY_SIZE(cs))
3598 break;
3599 }
723abd87
HR
3600 while (i--) {
3601 int index = cs[i]->index;
3602 struct tty_driver *drv = cs[i]->device(cs[i], &index);
3603
3604 /* don't resolve tty0 as some programs depend on it */
3605 if (drv && (cs[i]->index > 0 || drv->major != TTY_MAJOR))
3606 count += tty_line_name(drv, index, buf + count);
3607 else
3608 count += sprintf(buf + count, "%s%d",
3609 cs[i]->name, cs[i]->index);
3610
3611 count += sprintf(buf + count, "%c", i ? ' ':'\n');
3612 }
ac751efa 3613 console_unlock();
fbc92a34
KS
3614
3615 return count;
3616}
3617static DEVICE_ATTR(active, S_IRUGO, show_cons_active, NULL);
3618
1083a7be
TI
3619static struct attribute *cons_dev_attrs[] = {
3620 &dev_attr_active.attr,
3621 NULL
3622};
3623
3624ATTRIBUTE_GROUPS(cons_dev);
3625
fbc92a34
KS
3626static struct device *consdev;
3627
3628void console_sysfs_notify(void)
3629{
3630 if (consdev)
3631 sysfs_notify(&consdev->kobj, NULL, "active");
3632}
3633
1da177e4
LT
3634/*
3635 * Ok, now we can initialize the rest of the tty devices and can count
3636 * on memory allocations, interrupts etc..
3637 */
31d1d48e 3638int __init tty_init(void)
1da177e4
LT
3639{
3640 cdev_init(&tty_cdev, &tty_fops);
3641 if (cdev_add(&tty_cdev, MKDEV(TTYAUX_MAJOR, 0), 1) ||
3642 register_chrdev_region(MKDEV(TTYAUX_MAJOR, 0), 1, "/dev/tty") < 0)
3643 panic("Couldn't register /dev/tty driver\n");
fbc92a34 3644 device_create(tty_class, NULL, MKDEV(TTYAUX_MAJOR, 0), NULL, "tty");
1da177e4
LT
3645
3646 cdev_init(&console_cdev, &console_fops);
3647 if (cdev_add(&console_cdev, MKDEV(TTYAUX_MAJOR, 1), 1) ||
3648 register_chrdev_region(MKDEV(TTYAUX_MAJOR, 1), 1, "/dev/console") < 0)
3649 panic("Couldn't register /dev/console driver\n");
1083a7be
TI
3650 consdev = device_create_with_groups(tty_class, NULL,
3651 MKDEV(TTYAUX_MAJOR, 1), NULL,
3652 cons_dev_groups, "console");
fbc92a34
KS
3653 if (IS_ERR(consdev))
3654 consdev = NULL;
1da177e4 3655
1da177e4 3656#ifdef CONFIG_VT
d81ed103 3657 vty_init(&console_fops);
1da177e4
LT
3658#endif
3659 return 0;
3660}
31d1d48e 3661
This page took 1.417215 seconds and 5 git commands to generate.