|
@@ -188,6 +188,41 @@ void free_tty_struct(struct tty_struct *tty)
|
|
kfree(tty);
|
|
kfree(tty);
|
|
}
|
|
}
|
|
|
|
|
|
|
|
+static inline struct tty_struct *file_tty(struct file *file)
|
|
|
|
+{
|
|
|
|
+ return ((struct tty_file_private *)file->private_data)->tty;
|
|
|
|
+}
|
|
|
|
+
|
|
|
|
+/* Associate a new file with the tty structure */
|
|
|
|
+void tty_add_file(struct tty_struct *tty, struct file *file)
|
|
|
|
+{
|
|
|
|
+ struct tty_file_private *priv;
|
|
|
|
+
|
|
|
|
+ /* XXX: must implement proper error handling in callers */
|
|
|
|
+ priv = kmalloc(sizeof(*priv), GFP_KERNEL|__GFP_NOFAIL);
|
|
|
|
+
|
|
|
|
+ priv->tty = tty;
|
|
|
|
+ priv->file = file;
|
|
|
|
+ file->private_data = priv;
|
|
|
|
+
|
|
|
|
+ spin_lock(&tty_files_lock);
|
|
|
|
+ list_add(&priv->list, &tty->tty_files);
|
|
|
|
+ spin_unlock(&tty_files_lock);
|
|
|
|
+}
|
|
|
|
+
|
|
|
|
+/* Delete file from its tty */
|
|
|
|
+void tty_del_file(struct file *file)
|
|
|
|
+{
|
|
|
|
+ struct tty_file_private *priv = file->private_data;
|
|
|
|
+
|
|
|
|
+ spin_lock(&tty_files_lock);
|
|
|
|
+ list_del(&priv->list);
|
|
|
|
+ spin_unlock(&tty_files_lock);
|
|
|
|
+ file->private_data = NULL;
|
|
|
|
+ kfree(priv);
|
|
|
|
+}
|
|
|
|
+
|
|
|
|
+
|
|
#define TTY_NUMBER(tty) ((tty)->index + (tty)->driver->name_base)
|
|
#define TTY_NUMBER(tty) ((tty)->index + (tty)->driver->name_base)
|
|
|
|
|
|
/**
|
|
/**
|
|
@@ -500,6 +535,7 @@ void __tty_hangup(struct tty_struct *tty)
|
|
struct file *cons_filp = NULL;
|
|
struct file *cons_filp = NULL;
|
|
struct file *filp, *f = NULL;
|
|
struct file *filp, *f = NULL;
|
|
struct task_struct *p;
|
|
struct task_struct *p;
|
|
|
|
+ struct tty_file_private *priv;
|
|
int closecount = 0, n;
|
|
int closecount = 0, n;
|
|
unsigned long flags;
|
|
unsigned long flags;
|
|
int refs = 0;
|
|
int refs = 0;
|
|
@@ -509,7 +545,7 @@ void __tty_hangup(struct tty_struct *tty)
|
|
|
|
|
|
|
|
|
|
spin_lock(&redirect_lock);
|
|
spin_lock(&redirect_lock);
|
|
- if (redirect && redirect->private_data == tty) {
|
|
|
|
|
|
+ if (redirect && file_tty(redirect) == tty) {
|
|
f = redirect;
|
|
f = redirect;
|
|
redirect = NULL;
|
|
redirect = NULL;
|
|
}
|
|
}
|
|
@@ -524,7 +560,8 @@ void __tty_hangup(struct tty_struct *tty)
|
|
|
|
|
|
spin_lock(&tty_files_lock);
|
|
spin_lock(&tty_files_lock);
|
|
/* This breaks for file handles being sent over AF_UNIX sockets ? */
|
|
/* This breaks for file handles being sent over AF_UNIX sockets ? */
|
|
- list_for_each_entry(filp, &tty->tty_files, f_u.fu_list) {
|
|
|
|
|
|
+ list_for_each_entry(priv, &tty->tty_files, list) {
|
|
|
|
+ filp = priv->file;
|
|
if (filp->f_op->write == redirected_tty_write)
|
|
if (filp->f_op->write == redirected_tty_write)
|
|
cons_filp = filp;
|
|
cons_filp = filp;
|
|
if (filp->f_op->write != tty_write)
|
|
if (filp->f_op->write != tty_write)
|
|
@@ -892,12 +929,10 @@ static ssize_t tty_read(struct file *file, char __user *buf, size_t count,
|
|
loff_t *ppos)
|
|
loff_t *ppos)
|
|
{
|
|
{
|
|
int i;
|
|
int i;
|
|
- struct tty_struct *tty;
|
|
|
|
- struct inode *inode;
|
|
|
|
|
|
+ struct inode *inode = file->f_path.dentry->d_inode;
|
|
|
|
+ struct tty_struct *tty = file_tty(file);
|
|
struct tty_ldisc *ld;
|
|
struct tty_ldisc *ld;
|
|
|
|
|
|
- tty = file->private_data;
|
|
|
|
- inode = file->f_path.dentry->d_inode;
|
|
|
|
if (tty_paranoia_check(tty, inode, "tty_read"))
|
|
if (tty_paranoia_check(tty, inode, "tty_read"))
|
|
return -EIO;
|
|
return -EIO;
|
|
if (!tty || (test_bit(TTY_IO_ERROR, &tty->flags)))
|
|
if (!tty || (test_bit(TTY_IO_ERROR, &tty->flags)))
|
|
@@ -1068,12 +1103,11 @@ void tty_write_message(struct tty_struct *tty, char *msg)
|
|
static ssize_t tty_write(struct file *file, const char __user *buf,
|
|
static ssize_t tty_write(struct file *file, const char __user *buf,
|
|
size_t count, loff_t *ppos)
|
|
size_t count, loff_t *ppos)
|
|
{
|
|
{
|
|
- struct tty_struct *tty;
|
|
|
|
struct inode *inode = file->f_path.dentry->d_inode;
|
|
struct inode *inode = file->f_path.dentry->d_inode;
|
|
|
|
+ struct tty_struct *tty = file_tty(file);
|
|
|
|
+ struct tty_ldisc *ld;
|
|
ssize_t ret;
|
|
ssize_t ret;
|
|
- struct tty_ldisc *ld;
|
|
|
|
|
|
|
|
- tty = file->private_data;
|
|
|
|
if (tty_paranoia_check(tty, inode, "tty_write"))
|
|
if (tty_paranoia_check(tty, inode, "tty_write"))
|
|
return -EIO;
|
|
return -EIO;
|
|
if (!tty || !tty->ops->write ||
|
|
if (!tty || !tty->ops->write ||
|
|
@@ -1510,13 +1544,13 @@ static void release_tty(struct tty_struct *tty, int idx)
|
|
|
|
|
|
int tty_release(struct inode *inode, struct file *filp)
|
|
int tty_release(struct inode *inode, struct file *filp)
|
|
{
|
|
{
|
|
- struct tty_struct *tty, *o_tty;
|
|
|
|
|
|
+ struct tty_struct *tty = file_tty(filp);
|
|
|
|
+ struct tty_struct *o_tty;
|
|
int pty_master, tty_closing, o_tty_closing, do_sleep;
|
|
int pty_master, tty_closing, o_tty_closing, do_sleep;
|
|
int devpts;
|
|
int devpts;
|
|
int idx;
|
|
int idx;
|
|
char buf[64];
|
|
char buf[64];
|
|
|
|
|
|
- tty = filp->private_data;
|
|
|
|
if (tty_paranoia_check(tty, inode, "tty_release_dev"))
|
|
if (tty_paranoia_check(tty, inode, "tty_release_dev"))
|
|
return 0;
|
|
return 0;
|
|
|
|
|
|
@@ -1674,11 +1708,7 @@ int tty_release(struct inode *inode, struct file *filp)
|
|
* - do_tty_hangup no longer sees this file descriptor as
|
|
* - do_tty_hangup no longer sees this file descriptor as
|
|
* something that needs to be handled for hangups.
|
|
* something that needs to be handled for hangups.
|
|
*/
|
|
*/
|
|
- spin_lock(&tty_files_lock);
|
|
|
|
- BUG_ON(list_empty(&filp->f_u.fu_list));
|
|
|
|
- list_del_init(&filp->f_u.fu_list);
|
|
|
|
- spin_unlock(&tty_files_lock);
|
|
|
|
- filp->private_data = NULL;
|
|
|
|
|
|
+ tty_del_file(filp);
|
|
|
|
|
|
/*
|
|
/*
|
|
* Perform some housekeeping before deciding whether to return.
|
|
* Perform some housekeeping before deciding whether to return.
|
|
@@ -1845,12 +1875,8 @@ got_driver:
|
|
return PTR_ERR(tty);
|
|
return PTR_ERR(tty);
|
|
}
|
|
}
|
|
|
|
|
|
- filp->private_data = tty;
|
|
|
|
- BUG_ON(list_empty(&filp->f_u.fu_list));
|
|
|
|
- file_sb_list_del(filp); /* __dentry_open has put it on the sb list */
|
|
|
|
- spin_lock(&tty_files_lock);
|
|
|
|
- list_add(&filp->f_u.fu_list, &tty->tty_files);
|
|
|
|
- spin_unlock(&tty_files_lock);
|
|
|
|
|
|
+ tty_add_file(tty, filp);
|
|
|
|
+
|
|
check_tty_count(tty, "tty_open");
|
|
check_tty_count(tty, "tty_open");
|
|
if (tty->driver->type == TTY_DRIVER_TYPE_PTY &&
|
|
if (tty->driver->type == TTY_DRIVER_TYPE_PTY &&
|
|
tty->driver->subtype == PTY_TYPE_MASTER)
|
|
tty->driver->subtype == PTY_TYPE_MASTER)
|
|
@@ -1926,11 +1952,10 @@ got_driver:
|
|
|
|
|
|
static unsigned int tty_poll(struct file *filp, poll_table *wait)
|
|
static unsigned int tty_poll(struct file *filp, poll_table *wait)
|
|
{
|
|
{
|
|
- struct tty_struct *tty;
|
|
|
|
|
|
+ struct tty_struct *tty = file_tty(filp);
|
|
struct tty_ldisc *ld;
|
|
struct tty_ldisc *ld;
|
|
int ret = 0;
|
|
int ret = 0;
|
|
|
|
|
|
- tty = filp->private_data;
|
|
|
|
if (tty_paranoia_check(tty, filp->f_path.dentry->d_inode, "tty_poll"))
|
|
if (tty_paranoia_check(tty, filp->f_path.dentry->d_inode, "tty_poll"))
|
|
return 0;
|
|
return 0;
|
|
|
|
|
|
@@ -1943,11 +1968,10 @@ static unsigned int tty_poll(struct file *filp, poll_table *wait)
|
|
|
|
|
|
static int __tty_fasync(int fd, struct file *filp, int on)
|
|
static int __tty_fasync(int fd, struct file *filp, int on)
|
|
{
|
|
{
|
|
- struct tty_struct *tty;
|
|
|
|
|
|
+ struct tty_struct *tty = file_tty(filp);
|
|
unsigned long flags;
|
|
unsigned long flags;
|
|
int retval = 0;
|
|
int retval = 0;
|
|
|
|
|
|
- tty = filp->private_data;
|
|
|
|
if (tty_paranoia_check(tty, filp->f_path.dentry->d_inode, "tty_fasync"))
|
|
if (tty_paranoia_check(tty, filp->f_path.dentry->d_inode, "tty_fasync"))
|
|
goto out;
|
|
goto out;
|
|
|
|
|
|
@@ -2501,13 +2525,13 @@ EXPORT_SYMBOL(tty_pair_get_pty);
|
|
*/
|
|
*/
|
|
long tty_ioctl(struct file *file, unsigned int cmd, unsigned long arg)
|
|
long tty_ioctl(struct file *file, unsigned int cmd, unsigned long arg)
|
|
{
|
|
{
|
|
- struct tty_struct *tty, *real_tty;
|
|
|
|
|
|
+ struct tty_struct *tty = file_tty(file);
|
|
|
|
+ struct tty_struct *real_tty;
|
|
void __user *p = (void __user *)arg;
|
|
void __user *p = (void __user *)arg;
|
|
int retval;
|
|
int retval;
|
|
struct tty_ldisc *ld;
|
|
struct tty_ldisc *ld;
|
|
struct inode *inode = file->f_dentry->d_inode;
|
|
struct inode *inode = file->f_dentry->d_inode;
|
|
|
|
|
|
- tty = file->private_data;
|
|
|
|
if (tty_paranoia_check(tty, inode, "tty_ioctl"))
|
|
if (tty_paranoia_check(tty, inode, "tty_ioctl"))
|
|
return -EINVAL;
|
|
return -EINVAL;
|
|
|
|
|
|
@@ -2629,7 +2653,7 @@ static long tty_compat_ioctl(struct file *file, unsigned int cmd,
|
|
unsigned long arg)
|
|
unsigned long arg)
|
|
{
|
|
{
|
|
struct inode *inode = file->f_dentry->d_inode;
|
|
struct inode *inode = file->f_dentry->d_inode;
|
|
- struct tty_struct *tty = file->private_data;
|
|
|
|
|
|
+ struct tty_struct *tty = file_tty(file);
|
|
struct tty_ldisc *ld;
|
|
struct tty_ldisc *ld;
|
|
int retval = -ENOIOCTLCMD;
|
|
int retval = -ENOIOCTLCMD;
|
|
|
|
|
|
@@ -2721,7 +2745,7 @@ void __do_SAK(struct tty_struct *tty)
|
|
if (!filp)
|
|
if (!filp)
|
|
continue;
|
|
continue;
|
|
if (filp->f_op->read == tty_read &&
|
|
if (filp->f_op->read == tty_read &&
|
|
- filp->private_data == tty) {
|
|
|
|
|
|
+ file_tty(filp) == tty) {
|
|
printk(KERN_NOTICE "SAK: killed process %d"
|
|
printk(KERN_NOTICE "SAK: killed process %d"
|
|
" (%s): fd#%d opened to the tty\n",
|
|
" (%s): fd#%d opened to the tty\n",
|
|
task_pid_nr(p), p->comm, i);
|
|
task_pid_nr(p), p->comm, i);
|