USB: usb-storage: added missing MODULE_LICENSE("GPL") for usb-storage ums-* modules
[deliverable/linux.git] / drivers / usb / core / devio.c
CommitLineData
1da177e4
LT
1/*****************************************************************************/
2
3/*
4 * devio.c -- User space communication with USB devices.
5 *
6 * Copyright (C) 1999-2000 Thomas Sailer (sailer@ife.ee.ethz.ch)
7 *
8 * This program is free software; you can redistribute it and/or modify
9 * it under the terms of the GNU General Public License as published by
10 * the Free Software Foundation; either version 2 of the License, or
11 * (at your option) any later version.
12 *
13 * This program is distributed in the hope that it will be useful,
14 * but WITHOUT ANY WARRANTY; without even the implied warranty of
15 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
16 * GNU General Public License for more details.
17 *
18 * You should have received a copy of the GNU General Public License
19 * along with this program; if not, write to the Free Software
20 * Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA.
21 *
1da177e4
LT
22 * This file implements the usbfs/x/y files, where
23 * x is the bus number and y the device number.
24 *
25 * It allows user space programs/"drivers" to communicate directly
26 * with USB devices without intervening kernel driver.
27 *
28 * Revision history
29 * 22.12.1999 0.1 Initial release (split from proc_usb.c)
30 * 04.01.2000 0.2 Turned into its own filesystem
46113830
HW
31 * 30.09.2005 0.3 Fix user-triggerable oops in async URB delivery
32 * (CAN-2005-3055)
1da177e4
LT
33 */
34
35/*****************************************************************************/
36
37#include <linux/fs.h>
38#include <linux/mm.h>
39#include <linux/slab.h>
40#include <linux/smp_lock.h>
41#include <linux/signal.h>
42#include <linux/poll.h>
43#include <linux/module.h>
44#include <linux/usb.h>
45#include <linux/usbdevice_fs.h>
fbf82fd2 46#include <linux/cdev.h>
a7b986b3 47#include <linux/notifier.h>
7a01955f 48#include <linux/security.h>
1da177e4
LT
49#include <asm/uaccess.h>
50#include <asm/byteorder.h>
51#include <linux/moduleparam.h>
52
53#include "hcd.h" /* for usbcore internals */
54#include "usb.h"
55
fbf82fd2
KS
56#define USB_MAXBUS 64
57#define USB_DEVICE_MAX USB_MAXBUS * 128
fbf82fd2 58
4a2a8a2c
AS
59/* Mutual exclusion for removal, open, and release */
60DEFINE_MUTEX(usbfs_mutex);
61
cd9f0375
AS
62struct dev_state {
63 struct list_head list; /* state list */
64 struct usb_device *dev;
65 struct file *file;
66 spinlock_t lock; /* protects the async urb lists */
67 struct list_head async_pending;
68 struct list_head async_completed;
69 wait_queue_head_t wait; /* wake up if a request completed */
70 unsigned int discsignr;
71 struct pid *disc_pid;
72 uid_t disc_uid, disc_euid;
73 void __user *disccontext;
74 unsigned long ifclaimed;
75 u32 secid;
76};
77
1da177e4
LT
78struct async {
79 struct list_head asynclist;
80 struct dev_state *ps;
2425c08b 81 struct pid *pid;
46113830 82 uid_t uid, euid;
1da177e4
LT
83 unsigned int signr;
84 unsigned int ifnum;
85 void __user *userbuffer;
86 void __user *userurb;
87 struct urb *urb;
e015268d 88 int status;
7a01955f 89 u32 secid;
1da177e4
LT
90};
91
04e482ff
GKH
92static int usbfs_snoop;
93module_param(usbfs_snoop, bool, S_IRUGO | S_IWUSR);
94MODULE_PARM_DESC(usbfs_snoop, "true to log all usbfs traffic");
1da177e4
LT
95
96#define snoop(dev, format, arg...) \
97 do { \
98 if (usbfs_snoop) \
04e482ff 99 dev_info(dev , format , ## arg); \
1da177e4
LT
100 } while (0)
101
fad21bdf
AS
102#define USB_DEVICE_DEV MKDEV(USB_DEVICE_MAJOR, 0)
103
1da177e4
LT
104
105#define MAX_USBFS_BUFFER_SIZE 16384
106
04e482ff 107static inline int connected(struct dev_state *ps)
1da177e4 108{
349710c3
AS
109 return (!list_empty(&ps->list) &&
110 ps->dev->state != USB_STATE_NOTATTACHED);
1da177e4
LT
111}
112
113static loff_t usbdev_lseek(struct file *file, loff_t offset, int orig)
114{
115 loff_t ret;
116
117 lock_kernel();
118
119 switch (orig) {
120 case 0:
121 file->f_pos = offset;
122 ret = file->f_pos;
123 break;
124 case 1:
125 file->f_pos += offset;
126 ret = file->f_pos;
127 break;
128 case 2:
129 default:
130 ret = -EINVAL;
131 }
132
133 unlock_kernel();
134 return ret;
135}
136
04e482ff
GKH
137static ssize_t usbdev_read(struct file *file, char __user *buf, size_t nbytes,
138 loff_t *ppos)
1da177e4 139{
ec17cf1c 140 struct dev_state *ps = file->private_data;
1da177e4
LT
141 struct usb_device *dev = ps->dev;
142 ssize_t ret = 0;
143 unsigned len;
144 loff_t pos;
145 int i;
146
147 pos = *ppos;
148 usb_lock_device(dev);
349710c3 149 if (!connected(ps)) {
1da177e4
LT
150 ret = -ENODEV;
151 goto err;
152 } else if (pos < 0) {
153 ret = -EINVAL;
154 goto err;
155 }
156
157 if (pos < sizeof(struct usb_device_descriptor)) {
04e482ff
GKH
158 /* 18 bytes - fits on the stack */
159 struct usb_device_descriptor temp_desc;
8781ba0a
ON
160
161 memcpy(&temp_desc, &dev->descriptor, sizeof(dev->descriptor));
9fcd5c32
AM
162 le16_to_cpus(&temp_desc.bcdUSB);
163 le16_to_cpus(&temp_desc.idVendor);
164 le16_to_cpus(&temp_desc.idProduct);
165 le16_to_cpus(&temp_desc.bcdDevice);
1da177e4
LT
166
167 len = sizeof(struct usb_device_descriptor) - pos;
168 if (len > nbytes)
169 len = nbytes;
8781ba0a 170 if (copy_to_user(buf, ((char *)&temp_desc) + pos, len)) {
1da177e4
LT
171 ret = -EFAULT;
172 goto err;
173 }
1da177e4
LT
174
175 *ppos += len;
176 buf += len;
177 nbytes -= len;
178 ret += len;
179 }
180
181 pos = sizeof(struct usb_device_descriptor);
182 for (i = 0; nbytes && i < dev->descriptor.bNumConfigurations; i++) {
183 struct usb_config_descriptor *config =
184 (struct usb_config_descriptor *)dev->rawdescriptors[i];
185 unsigned int length = le16_to_cpu(config->wTotalLength);
186
187 if (*ppos < pos + length) {
188
189 /* The descriptor may claim to be longer than it
190 * really is. Here is the actual allocated length. */
191 unsigned alloclen =
192 le16_to_cpu(dev->config[i].desc.wTotalLength);
193
194 len = length - (*ppos - pos);
195 if (len > nbytes)
196 len = nbytes;
197
198 /* Simply don't write (skip over) unallocated parts */
199 if (alloclen > (*ppos - pos)) {
200 alloclen -= (*ppos - pos);
201 if (copy_to_user(buf,
202 dev->rawdescriptors[i] + (*ppos - pos),
203 min(len, alloclen))) {
204 ret = -EFAULT;
205 goto err;
206 }
207 }
208
209 *ppos += len;
210 buf += len;
211 nbytes -= len;
212 ret += len;
213 }
214
215 pos += length;
216 }
217
218err:
219 usb_unlock_device(dev);
220 return ret;
221}
222
223/*
224 * async list handling
225 */
226
227static struct async *alloc_async(unsigned int numisoframes)
228{
dd95b814 229 struct async *as;
0a1ef3b5 230
dd95b814 231 as = kzalloc(sizeof(struct async), GFP_KERNEL);
04e482ff
GKH
232 if (!as)
233 return NULL;
1da177e4
LT
234 as->urb = usb_alloc_urb(numisoframes, GFP_KERNEL);
235 if (!as->urb) {
236 kfree(as);
237 return NULL;
238 }
04e482ff 239 return as;
1da177e4
LT
240}
241
242static void free_async(struct async *as)
243{
2425c08b 244 put_pid(as->pid);
6fd19f4b
JJ
245 kfree(as->urb->transfer_buffer);
246 kfree(as->urb->setup_packet);
1da177e4 247 usb_free_urb(as->urb);
6fd19f4b 248 kfree(as);
1da177e4
LT
249}
250
251static inline void async_newpending(struct async *as)
252{
04e482ff
GKH
253 struct dev_state *ps = as->ps;
254 unsigned long flags;
255
256 spin_lock_irqsave(&ps->lock, flags);
257 list_add_tail(&as->asynclist, &ps->async_pending);
258 spin_unlock_irqrestore(&ps->lock, flags);
1da177e4
LT
259}
260
261static inline void async_removepending(struct async *as)
262{
04e482ff
GKH
263 struct dev_state *ps = as->ps;
264 unsigned long flags;
265
266 spin_lock_irqsave(&ps->lock, flags);
267 list_del_init(&as->asynclist);
268 spin_unlock_irqrestore(&ps->lock, flags);
1da177e4
LT
269}
270
271static inline struct async *async_getcompleted(struct dev_state *ps)
272{
04e482ff
GKH
273 unsigned long flags;
274 struct async *as = NULL;
275
276 spin_lock_irqsave(&ps->lock, flags);
277 if (!list_empty(&ps->async_completed)) {
278 as = list_entry(ps->async_completed.next, struct async,
279 asynclist);
280 list_del_init(&as->asynclist);
281 }
282 spin_unlock_irqrestore(&ps->lock, flags);
283 return as;
1da177e4
LT
284}
285
04e482ff
GKH
286static inline struct async *async_getpending(struct dev_state *ps,
287 void __user *userurb)
1da177e4 288{
04e482ff
GKH
289 unsigned long flags;
290 struct async *as;
1da177e4 291
04e482ff 292 spin_lock_irqsave(&ps->lock, flags);
1da177e4
LT
293 list_for_each_entry(as, &ps->async_pending, asynclist)
294 if (as->userurb == userurb) {
295 list_del_init(&as->asynclist);
296 spin_unlock_irqrestore(&ps->lock, flags);
297 return as;
298 }
04e482ff
GKH
299 spin_unlock_irqrestore(&ps->lock, flags);
300 return NULL;
1da177e4
LT
301}
302
e639dd3f
GKH
303static void snoop_urb(struct urb *urb, void __user *userurb)
304{
305 int j;
306 unsigned char *data = urb->transfer_buffer;
307
308 if (!usbfs_snoop)
309 return;
310
93cf9b90
AS
311 dev_info(&urb->dev->dev, "direction=%s\n",
312 usb_urb_dir_in(urb) ? "IN" : "OUT");
e639dd3f
GKH
313 dev_info(&urb->dev->dev, "userurb=%p\n", userurb);
314 dev_info(&urb->dev->dev, "transfer_buffer_length=%d\n",
315 urb->transfer_buffer_length);
316 dev_info(&urb->dev->dev, "actual_length=%d\n", urb->actual_length);
317 dev_info(&urb->dev->dev, "data: ");
318 for (j = 0; j < urb->transfer_buffer_length; ++j)
04e482ff 319 printk("%02x ", data[j]);
e639dd3f
GKH
320 printk("\n");
321}
322
7d12e780 323static void async_completed(struct urb *urb)
1da177e4 324{
04e482ff
GKH
325 struct async *as = urb->context;
326 struct dev_state *ps = as->ps;
1da177e4
LT
327 struct siginfo sinfo;
328
04e482ff
GKH
329 spin_lock(&ps->lock);
330 list_move_tail(&as->asynclist, &ps->async_completed);
331 spin_unlock(&ps->lock);
e015268d 332 as->status = urb->status;
1da177e4
LT
333 if (as->signr) {
334 sinfo.si_signo = as->signr;
e015268d 335 sinfo.si_errno = as->status;
1da177e4
LT
336 sinfo.si_code = SI_ASYNCIO;
337 sinfo.si_addr = as->userurb;
2425c08b 338 kill_pid_info_as_uid(as->signr, &sinfo, as->pid, as->uid,
7a01955f 339 as->euid, as->secid);
1da177e4 340 }
e639dd3f
GKH
341 snoop(&urb->dev->dev, "urb complete\n");
342 snoop_urb(urb, as->userurb);
343 wake_up(&ps->wait);
1da177e4
LT
344}
345
04e482ff 346static void destroy_async(struct dev_state *ps, struct list_head *list)
1da177e4
LT
347{
348 struct async *as;
349 unsigned long flags;
350
351 spin_lock_irqsave(&ps->lock, flags);
352 while (!list_empty(list)) {
353 as = list_entry(list->next, struct async, asynclist);
354 list_del_init(&as->asynclist);
355
356 /* drop the spinlock so the completion handler can run */
357 spin_unlock_irqrestore(&ps->lock, flags);
358 usb_kill_urb(as->urb);
359 spin_lock_irqsave(&ps->lock, flags);
360 }
361 spin_unlock_irqrestore(&ps->lock, flags);
1da177e4
LT
362}
363
04e482ff
GKH
364static void destroy_async_on_interface(struct dev_state *ps,
365 unsigned int ifnum)
1da177e4
LT
366{
367 struct list_head *p, *q, hitlist;
368 unsigned long flags;
369
370 INIT_LIST_HEAD(&hitlist);
371 spin_lock_irqsave(&ps->lock, flags);
372 list_for_each_safe(p, q, &ps->async_pending)
373 if (ifnum == list_entry(p, struct async, asynclist)->ifnum)
374 list_move_tail(p, &hitlist);
375 spin_unlock_irqrestore(&ps->lock, flags);
376 destroy_async(ps, &hitlist);
377}
378
379static inline void destroy_all_async(struct dev_state *ps)
380{
04e482ff 381 destroy_async(ps, &ps->async_pending);
1da177e4
LT
382}
383
384/*
385 * interface claims are made only at the request of user level code,
386 * which can also release them (explicitly or by closing files).
387 * they're also undone when devices disconnect.
388 */
389
04e482ff
GKH
390static int driver_probe(struct usb_interface *intf,
391 const struct usb_device_id *id)
1da177e4
LT
392{
393 return -ENODEV;
394}
395
396static void driver_disconnect(struct usb_interface *intf)
397{
04e482ff 398 struct dev_state *ps = usb_get_intfdata(intf);
1da177e4
LT
399 unsigned int ifnum = intf->altsetting->desc.bInterfaceNumber;
400
401 if (!ps)
402 return;
403
404 /* NOTE: this relies on usbcore having canceled and completed
405 * all pending I/O requests; 2.6 does that.
406 */
407
408 if (likely(ifnum < 8*sizeof(ps->ifclaimed)))
409 clear_bit(ifnum, &ps->ifclaimed);
410 else
3b6004f3
GKH
411 dev_warn(&intf->dev, "interface number %u out of range\n",
412 ifnum);
1da177e4 413
04e482ff 414 usb_set_intfdata(intf, NULL);
1da177e4
LT
415
416 /* force async requests to complete */
417 destroy_async_on_interface(ps, ifnum);
418}
419
2e2eb83f
AS
420/* The following routines are merely placeholders. There is no way
421 * to inform a user task about suspend or resumes.
422 */
423static int driver_suspend(struct usb_interface *intf, pm_message_t msg)
424{
425 return 0;
426}
427
428static int driver_resume(struct usb_interface *intf)
429{
430 return 0;
431}
432
1da177e4 433struct usb_driver usbfs_driver = {
1da177e4
LT
434 .name = "usbfs",
435 .probe = driver_probe,
436 .disconnect = driver_disconnect,
2e2eb83f
AS
437 .suspend = driver_suspend,
438 .resume = driver_resume,
1da177e4
LT
439};
440
441static int claimintf(struct dev_state *ps, unsigned int ifnum)
442{
443 struct usb_device *dev = ps->dev;
444 struct usb_interface *intf;
445 int err;
446
447 if (ifnum >= 8*sizeof(ps->ifclaimed))
448 return -EINVAL;
449 /* already claimed */
450 if (test_bit(ifnum, &ps->ifclaimed))
451 return 0;
452
1da177e4
LT
453 intf = usb_ifnum_to_if(dev, ifnum);
454 if (!intf)
455 err = -ENOENT;
456 else
457 err = usb_driver_claim_interface(&usbfs_driver, intf, ps);
1da177e4
LT
458 if (err == 0)
459 set_bit(ifnum, &ps->ifclaimed);
460 return err;
461}
462
463static int releaseintf(struct dev_state *ps, unsigned int ifnum)
464{
465 struct usb_device *dev;
466 struct usb_interface *intf;
467 int err;
468
469 err = -EINVAL;
470 if (ifnum >= 8*sizeof(ps->ifclaimed))
471 return err;
472 dev = ps->dev;
1da177e4
LT
473 intf = usb_ifnum_to_if(dev, ifnum);
474 if (!intf)
475 err = -ENOENT;
476 else if (test_and_clear_bit(ifnum, &ps->ifclaimed)) {
477 usb_driver_release_interface(&usbfs_driver, intf);
478 err = 0;
479 }
1da177e4
LT
480 return err;
481}
482
483static int checkintf(struct dev_state *ps, unsigned int ifnum)
484{
485 if (ps->dev->state != USB_STATE_CONFIGURED)
486 return -EHOSTUNREACH;
487 if (ifnum >= 8*sizeof(ps->ifclaimed))
488 return -EINVAL;
489 if (test_bit(ifnum, &ps->ifclaimed))
490 return 0;
491 /* if not yet claimed, claim it for the driver */
04e482ff
GKH
492 dev_warn(&ps->dev->dev, "usbfs: process %d (%s) did not claim "
493 "interface %u before use\n", task_pid_nr(current),
494 current->comm, ifnum);
1da177e4
LT
495 return claimintf(ps, ifnum);
496}
497
498static int findintfep(struct usb_device *dev, unsigned int ep)
499{
500 unsigned int i, j, e;
04e482ff 501 struct usb_interface *intf;
1da177e4
LT
502 struct usb_host_interface *alts;
503 struct usb_endpoint_descriptor *endpt;
504
505 if (ep & ~(USB_DIR_IN|0xf))
506 return -EINVAL;
507 if (!dev->actconfig)
508 return -ESRCH;
509 for (i = 0; i < dev->actconfig->desc.bNumInterfaces; i++) {
510 intf = dev->actconfig->interface[i];
511 for (j = 0; j < intf->num_altsetting; j++) {
04e482ff 512 alts = &intf->altsetting[j];
1da177e4
LT
513 for (e = 0; e < alts->desc.bNumEndpoints; e++) {
514 endpt = &alts->endpoint[e].desc;
515 if (endpt->bEndpointAddress == ep)
516 return alts->desc.bInterfaceNumber;
517 }
518 }
519 }
04e482ff 520 return -ENOENT;
1da177e4
LT
521}
522
04e482ff
GKH
523static int check_ctrlrecip(struct dev_state *ps, unsigned int requesttype,
524 unsigned int index)
1da177e4
LT
525{
526 int ret = 0;
527
24f8b116
HS
528 if (ps->dev->state != USB_STATE_ADDRESS
529 && ps->dev->state != USB_STATE_CONFIGURED)
1da177e4
LT
530 return -EHOSTUNREACH;
531 if (USB_TYPE_VENDOR == (USB_TYPE_MASK & requesttype))
532 return 0;
533
534 index &= 0xff;
535 switch (requesttype & USB_RECIP_MASK) {
536 case USB_RECIP_ENDPOINT:
04e482ff
GKH
537 ret = findintfep(ps->dev, index);
538 if (ret >= 0)
1da177e4
LT
539 ret = checkintf(ps, ret);
540 break;
541
542 case USB_RECIP_INTERFACE:
543 ret = checkintf(ps, index);
544 break;
545 }
546 return ret;
547}
548
61ad04a8 549static int match_devt(struct device *dev, void *data)
4592bf5a 550{
a80d5ff0 551 return dev->devt == (dev_t) (unsigned long) data;
9f8b17e6 552}
4592bf5a 553
61ad04a8 554static struct usb_device *usbdev_lookup_by_devt(dev_t devt)
9f8b17e6
KS
555{
556 struct device *dev;
557
a80d5ff0
DH
558 dev = bus_find_device(&usb_bus_type, NULL,
559 (void *) (unsigned long) devt, match_devt);
9f8b17e6
KS
560 if (!dev)
561 return NULL;
9f8b17e6
KS
562 return container_of(dev, struct usb_device, dev);
563}
4592bf5a 564
1da177e4
LT
565/*
566 * file operations
567 */
568static int usbdev_open(struct inode *inode, struct file *file)
569{
fbf82fd2 570 struct usb_device *dev = NULL;
1da177e4 571 struct dev_state *ps;
86a264ab 572 const struct cred *cred = current_cred();
1da177e4
LT
573 int ret;
574
b5b4aa67 575 lock_kernel();
4a2a8a2c
AS
576 /* Protect against simultaneous removal or release */
577 mutex_lock(&usbfs_mutex);
578
1da177e4 579 ret = -ENOMEM;
04e482ff
GKH
580 ps = kmalloc(sizeof(struct dev_state), GFP_KERNEL);
581 if (!ps)
4a2a8a2c 582 goto out;
1da177e4 583
1da177e4 584 ret = -ENOENT;
61ad04a8 585
9f8b17e6 586 /* usbdev device-node */
fbf82fd2 587 if (imajor(inode) == USB_DEVICE_MAJOR)
61ad04a8 588 dev = usbdev_lookup_by_devt(inode->i_rdev);
9f8b17e6
KS
589#ifdef CONFIG_USB_DEVICEFS
590 /* procfs file */
d64aac36 591 if (!dev) {
8e18e294 592 dev = inode->i_private;
d64aac36
AS
593 if (dev && dev->usbfs_dentry &&
594 dev->usbfs_dentry->d_inode == inode)
595 usb_get_dev(dev);
596 else
597 dev = NULL;
598 }
9f8b17e6 599#endif
d64aac36 600 if (!dev || dev->state == USB_STATE_NOTATTACHED)
1da177e4 601 goto out;
94fcda1f 602 ret = usb_autoresume_device(dev);
01d883d4
AS
603 if (ret)
604 goto out;
605
1da177e4
LT
606 ret = 0;
607 ps->dev = dev;
608 ps->file = file;
609 spin_lock_init(&ps->lock);
316547fd 610 INIT_LIST_HEAD(&ps->list);
1da177e4
LT
611 INIT_LIST_HEAD(&ps->async_pending);
612 INIT_LIST_HEAD(&ps->async_completed);
613 init_waitqueue_head(&ps->wait);
614 ps->discsignr = 0;
2425c08b 615 ps->disc_pid = get_pid(task_pid(current));
86a264ab
DH
616 ps->disc_uid = cred->uid;
617 ps->disc_euid = cred->euid;
1da177e4
LT
618 ps->disccontext = NULL;
619 ps->ifclaimed = 0;
7a01955f 620 security_task_getsecid(current, &ps->secid);
527660a8 621 smp_wmb();
1da177e4
LT
622 list_add_tail(&ps->list, &dev->filelist);
623 file->private_data = ps;
2da41d5f
AS
624 snoop(&dev->dev, "opened by process %d: %s\n", task_pid_nr(current),
625 current->comm);
1da177e4 626 out:
d64aac36 627 if (ret) {
01d883d4 628 kfree(ps);
d64aac36
AS
629 usb_put_dev(dev);
630 }
4a2a8a2c 631 mutex_unlock(&usbfs_mutex);
b5b4aa67 632 unlock_kernel();
4a2a8a2c 633 return ret;
1da177e4
LT
634}
635
636static int usbdev_release(struct inode *inode, struct file *file)
637{
ec17cf1c 638 struct dev_state *ps = file->private_data;
1da177e4
LT
639 struct usb_device *dev = ps->dev;
640 unsigned int ifnum;
6ff10464 641 struct async *as;
1da177e4
LT
642
643 usb_lock_device(dev);
4a2a8a2c
AS
644
645 /* Protect against simultaneous open */
646 mutex_lock(&usbfs_mutex);
1da177e4 647 list_del_init(&ps->list);
4a2a8a2c
AS
648 mutex_unlock(&usbfs_mutex);
649
1da177e4
LT
650 for (ifnum = 0; ps->ifclaimed && ifnum < 8*sizeof(ps->ifclaimed);
651 ifnum++) {
652 if (test_bit(ifnum, &ps->ifclaimed))
653 releaseintf(ps, ifnum);
654 }
655 destroy_all_async(ps);
94fcda1f 656 usb_autosuspend_device(dev);
1da177e4
LT
657 usb_unlock_device(dev);
658 usb_put_dev(dev);
2425c08b 659 put_pid(ps->disc_pid);
6ff10464
AS
660
661 as = async_getcompleted(ps);
662 while (as) {
663 free_async(as);
664 as = async_getcompleted(ps);
665 }
1da177e4 666 kfree(ps);
4a2a8a2c 667 return 0;
1da177e4
LT
668}
669
670static int proc_control(struct dev_state *ps, void __user *arg)
671{
672 struct usb_device *dev = ps->dev;
673 struct usbdevfs_ctrltransfer ctrl;
674 unsigned int tmo;
675 unsigned char *tbuf;
ff66e3ce 676 unsigned wLength;
1da177e4
LT
677 int i, j, ret;
678
679 if (copy_from_user(&ctrl, arg, sizeof(ctrl)))
680 return -EFAULT;
04e482ff
GKH
681 ret = check_ctrlrecip(ps, ctrl.bRequestType, ctrl.wIndex);
682 if (ret)
1da177e4 683 return ret;
ff66e3ce
AM
684 wLength = ctrl.wLength; /* To suppress 64k PAGE_SIZE warning */
685 if (wLength > PAGE_SIZE)
1da177e4 686 return -EINVAL;
04e482ff
GKH
687 tbuf = (unsigned char *)__get_free_page(GFP_KERNEL);
688 if (!tbuf)
1da177e4
LT
689 return -ENOMEM;
690 tmo = ctrl.timeout;
691 if (ctrl.bRequestType & 0x80) {
04e482ff
GKH
692 if (ctrl.wLength && !access_ok(VERIFY_WRITE, ctrl.data,
693 ctrl.wLength)) {
1da177e4
LT
694 free_page((unsigned long)tbuf);
695 return -EINVAL;
696 }
fe0410c7
AS
697 snoop(&dev->dev, "control read: bRequest=%02x "
698 "bRrequestType=%02x wValue=%04x "
699 "wIndex=%04x wLength=%04x\n",
700 ctrl.bRequest, ctrl.bRequestType, ctrl.wValue,
701 ctrl.wIndex, ctrl.wLength);
1da177e4
LT
702
703 usb_unlock_device(dev);
04e482ff
GKH
704 i = usb_control_msg(dev, usb_rcvctrlpipe(dev, 0), ctrl.bRequest,
705 ctrl.bRequestType, ctrl.wValue, ctrl.wIndex,
706 tbuf, ctrl.wLength, tmo);
1da177e4
LT
707 usb_lock_device(dev);
708 if ((i > 0) && ctrl.wLength) {
709 if (usbfs_snoop) {
710 dev_info(&dev->dev, "control read: data ");
fe0410c7 711 for (j = 0; j < i; ++j)
04e482ff 712 printk("%02x ", (u8)(tbuf)[j]);
1da177e4
LT
713 printk("\n");
714 }
fe0410c7 715 if (copy_to_user(ctrl.data, tbuf, i)) {
1da177e4
LT
716 free_page((unsigned long)tbuf);
717 return -EFAULT;
718 }
719 }
720 } else {
721 if (ctrl.wLength) {
722 if (copy_from_user(tbuf, ctrl.data, ctrl.wLength)) {
723 free_page((unsigned long)tbuf);
724 return -EFAULT;
725 }
726 }
fe0410c7
AS
727 snoop(&dev->dev, "control write: bRequest=%02x "
728 "bRrequestType=%02x wValue=%04x "
729 "wIndex=%04x wLength=%04x\n",
730 ctrl.bRequest, ctrl.bRequestType, ctrl.wValue,
731 ctrl.wIndex, ctrl.wLength);
1da177e4
LT
732 if (usbfs_snoop) {
733 dev_info(&dev->dev, "control write: data: ");
734 for (j = 0; j < ctrl.wLength; ++j)
e639dd3f 735 printk("%02x ", (unsigned char)(tbuf)[j]);
1da177e4
LT
736 printk("\n");
737 }
738 usb_unlock_device(dev);
04e482ff
GKH
739 i = usb_control_msg(dev, usb_sndctrlpipe(dev, 0), ctrl.bRequest,
740 ctrl.bRequestType, ctrl.wValue, ctrl.wIndex,
741 tbuf, ctrl.wLength, tmo);
1da177e4
LT
742 usb_lock_device(dev);
743 }
744 free_page((unsigned long)tbuf);
04e482ff 745 if (i < 0 && i != -EPIPE) {
1da177e4
LT
746 dev_printk(KERN_DEBUG, &dev->dev, "usbfs: USBDEVFS_CONTROL "
747 "failed cmd %s rqt %u rq %u len %u ret %d\n",
748 current->comm, ctrl.bRequestType, ctrl.bRequest,
749 ctrl.wLength, i);
750 }
751 return i;
752}
753
754static int proc_bulk(struct dev_state *ps, void __user *arg)
755{
756 struct usb_device *dev = ps->dev;
757 struct usbdevfs_bulktransfer bulk;
758 unsigned int tmo, len1, pipe;
759 int len2;
760 unsigned char *tbuf;
e639dd3f 761 int i, j, ret;
1da177e4
LT
762
763 if (copy_from_user(&bulk, arg, sizeof(bulk)))
764 return -EFAULT;
04e482ff
GKH
765 ret = findintfep(ps->dev, bulk.ep);
766 if (ret < 0)
1da177e4 767 return ret;
04e482ff
GKH
768 ret = checkintf(ps, ret);
769 if (ret)
1da177e4
LT
770 return ret;
771 if (bulk.ep & USB_DIR_IN)
772 pipe = usb_rcvbulkpipe(dev, bulk.ep & 0x7f);
773 else
774 pipe = usb_sndbulkpipe(dev, bulk.ep & 0x7f);
775 if (!usb_maxpacket(dev, pipe, !(bulk.ep & USB_DIR_IN)))
776 return -EINVAL;
777 len1 = bulk.len;
778 if (len1 > MAX_USBFS_BUFFER_SIZE)
779 return -EINVAL;
780 if (!(tbuf = kmalloc(len1, GFP_KERNEL)))
781 return -ENOMEM;
782 tmo = bulk.timeout;
783 if (bulk.ep & 0x80) {
784 if (len1 && !access_ok(VERIFY_WRITE, bulk.data, len1)) {
785 kfree(tbuf);
786 return -EINVAL;
787 }
e639dd3f
GKH
788 snoop(&dev->dev, "bulk read: len=0x%02x timeout=%04d\n",
789 bulk.len, bulk.timeout);
1da177e4
LT
790 usb_unlock_device(dev);
791 i = usb_bulk_msg(dev, pipe, tbuf, len1, &len2, tmo);
792 usb_lock_device(dev);
793 if (!i && len2) {
e639dd3f
GKH
794 if (usbfs_snoop) {
795 dev_info(&dev->dev, "bulk read: data ");
796 for (j = 0; j < len2; ++j)
04e482ff 797 printk("%02x ", (u8)(tbuf)[j]);
e639dd3f
GKH
798 printk("\n");
799 }
1da177e4
LT
800 if (copy_to_user(bulk.data, tbuf, len2)) {
801 kfree(tbuf);
802 return -EFAULT;
803 }
804 }
805 } else {
806 if (len1) {
807 if (copy_from_user(tbuf, bulk.data, len1)) {
808 kfree(tbuf);
809 return -EFAULT;
810 }
811 }
e639dd3f
GKH
812 snoop(&dev->dev, "bulk write: len=0x%02x timeout=%04d\n",
813 bulk.len, bulk.timeout);
814 if (usbfs_snoop) {
815 dev_info(&dev->dev, "bulk write: data: ");
816 for (j = 0; j < len1; ++j)
817 printk("%02x ", (unsigned char)(tbuf)[j]);
818 printk("\n");
819 }
1da177e4
LT
820 usb_unlock_device(dev);
821 i = usb_bulk_msg(dev, pipe, tbuf, len1, &len2, tmo);
822 usb_lock_device(dev);
823 }
824 kfree(tbuf);
825 if (i < 0)
826 return i;
827 return len2;
828}
829
830static int proc_resetep(struct dev_state *ps, void __user *arg)
831{
832 unsigned int ep;
833 int ret;
834
835 if (get_user(ep, (unsigned int __user *)arg))
836 return -EFAULT;
04e482ff
GKH
837 ret = findintfep(ps->dev, ep);
838 if (ret < 0)
1da177e4 839 return ret;
04e482ff
GKH
840 ret = checkintf(ps, ret);
841 if (ret)
1da177e4
LT
842 return ret;
843 usb_settoggle(ps->dev, ep & 0xf, !(ep & USB_DIR_IN), 0);
844 return 0;
845}
846
847static int proc_clearhalt(struct dev_state *ps, void __user *arg)
848{
849 unsigned int ep;
850 int pipe;
851 int ret;
852
853 if (get_user(ep, (unsigned int __user *)arg))
854 return -EFAULT;
04e482ff
GKH
855 ret = findintfep(ps->dev, ep);
856 if (ret < 0)
1da177e4 857 return ret;
04e482ff
GKH
858 ret = checkintf(ps, ret);
859 if (ret)
1da177e4
LT
860 return ret;
861 if (ep & USB_DIR_IN)
04e482ff
GKH
862 pipe = usb_rcvbulkpipe(ps->dev, ep & 0x7f);
863 else
864 pipe = usb_sndbulkpipe(ps->dev, ep & 0x7f);
1da177e4
LT
865
866 return usb_clear_halt(ps->dev, pipe);
867}
1da177e4
LT
868
869static int proc_getdriver(struct dev_state *ps, void __user *arg)
870{
871 struct usbdevfs_getdriver gd;
872 struct usb_interface *intf;
873 int ret;
874
875 if (copy_from_user(&gd, arg, sizeof(gd)))
876 return -EFAULT;
1da177e4
LT
877 intf = usb_ifnum_to_if(ps->dev, gd.interface);
878 if (!intf || !intf->dev.driver)
879 ret = -ENODATA;
880 else {
881 strncpy(gd.driver, intf->dev.driver->name,
882 sizeof(gd.driver));
883 ret = (copy_to_user(arg, &gd, sizeof(gd)) ? -EFAULT : 0);
884 }
1da177e4
LT
885 return ret;
886}
887
888static int proc_connectinfo(struct dev_state *ps, void __user *arg)
889{
890 struct usbdevfs_connectinfo ci;
891
892 ci.devnum = ps->dev->devnum;
893 ci.slow = ps->dev->speed == USB_SPEED_LOW;
894 if (copy_to_user(arg, &ci, sizeof(ci)))
895 return -EFAULT;
896 return 0;
897}
898
899static int proc_resetdevice(struct dev_state *ps)
900{
742120c6 901 return usb_reset_device(ps->dev);
1da177e4
LT
902}
903
904static int proc_setintf(struct dev_state *ps, void __user *arg)
905{
906 struct usbdevfs_setinterface setintf;
907 int ret;
908
909 if (copy_from_user(&setintf, arg, sizeof(setintf)))
910 return -EFAULT;
911 if ((ret = checkintf(ps, setintf.interface)))
912 return ret;
913 return usb_set_interface(ps->dev, setintf.interface,
914 setintf.altsetting);
915}
916
917static int proc_setconfig(struct dev_state *ps, void __user *arg)
918{
3f141e2a 919 int u;
1da177e4 920 int status = 0;
04e482ff 921 struct usb_host_config *actconfig;
1da177e4 922
3f141e2a 923 if (get_user(u, (int __user *)arg))
1da177e4
LT
924 return -EFAULT;
925
04e482ff
GKH
926 actconfig = ps->dev->actconfig;
927
928 /* Don't touch the device if any interfaces are claimed.
929 * It could interfere with other drivers' operations, and if
1da177e4
LT
930 * an interface is claimed by usbfs it could easily deadlock.
931 */
04e482ff
GKH
932 if (actconfig) {
933 int i;
934
935 for (i = 0; i < actconfig->desc.bNumInterfaces; ++i) {
936 if (usb_interface_claimed(actconfig->interface[i])) {
937 dev_warn(&ps->dev->dev,
72ebddb5 938 "usbfs: interface %d claimed by %s "
1da177e4
LT
939 "while '%s' sets config #%d\n",
940 actconfig->interface[i]
941 ->cur_altsetting
942 ->desc.bInterfaceNumber,
72ebddb5
DB
943 actconfig->interface[i]
944 ->dev.driver->name,
1da177e4 945 current->comm, u);
04e482ff 946 status = -EBUSY;
1da177e4 947 break;
1da177e4 948 }
04e482ff
GKH
949 }
950 }
1da177e4
LT
951
952 /* SET_CONFIGURATION is often abused as a "cheap" driver reset,
953 * so avoid usb_set_configuration()'s kick to sysfs
954 */
955 if (status == 0) {
956 if (actconfig && actconfig->desc.bConfigurationValue == u)
957 status = usb_reset_configuration(ps->dev);
958 else
959 status = usb_set_configuration(ps->dev, u);
960 }
961
962 return status;
963}
964
1da177e4 965static int proc_do_submiturb(struct dev_state *ps, struct usbdevfs_urb *uurb,
04e482ff
GKH
966 struct usbdevfs_iso_packet_desc __user *iso_frame_desc,
967 void __user *arg)
1da177e4
LT
968{
969 struct usbdevfs_iso_packet_desc *isopkt = NULL;
970 struct usb_host_endpoint *ep;
971 struct async *as;
972 struct usb_ctrlrequest *dr = NULL;
86a264ab 973 const struct cred *cred = current_cred();
1da177e4 974 unsigned int u, totlen, isofrmlen;
97b9eb91 975 int ret, ifnum = -1;
93cf9b90 976 int is_in;
1da177e4 977
14722ef4
AS
978 if (uurb->flags & ~(USBDEVFS_URB_ISO_ASAP |
979 USBDEVFS_URB_SHORT_NOT_OK |
980 USBDEVFS_URB_NO_FSBR |
981 USBDEVFS_URB_ZERO_PACKET |
982 USBDEVFS_URB_NO_INTERRUPT))
1da177e4
LT
983 return -EINVAL;
984 if (!uurb->buffer)
985 return -EINVAL;
04e482ff
GKH
986 if (!(uurb->type == USBDEVFS_URB_TYPE_CONTROL &&
987 (uurb->endpoint & ~USB_ENDPOINT_DIR_MASK) == 0)) {
988 ifnum = findintfep(ps->dev, uurb->endpoint);
989 if (ifnum < 0)
1da177e4 990 return ifnum;
04e482ff
GKH
991 ret = checkintf(ps, ifnum);
992 if (ret)
1da177e4
LT
993 return ret;
994 }
93cf9b90
AS
995 if ((uurb->endpoint & USB_ENDPOINT_DIR_MASK) != 0) {
996 is_in = 1;
997 ep = ps->dev->ep_in[uurb->endpoint & USB_ENDPOINT_NUMBER_MASK];
998 } else {
999 is_in = 0;
1000 ep = ps->dev->ep_out[uurb->endpoint & USB_ENDPOINT_NUMBER_MASK];
1001 }
1da177e4
LT
1002 if (!ep)
1003 return -ENOENT;
1004 switch(uurb->type) {
1005 case USBDEVFS_URB_TYPE_CONTROL:
93cf9b90 1006 if (!usb_endpoint_xfer_control(&ep->desc))
1da177e4 1007 return -EINVAL;
04e482ff
GKH
1008 /* min 8 byte setup packet,
1009 * max 8 byte setup plus an arbitrary data stage */
1010 if (uurb->buffer_length < 8 ||
1011 uurb->buffer_length > (8 + MAX_USBFS_BUFFER_SIZE))
1da177e4 1012 return -EINVAL;
04e482ff
GKH
1013 dr = kmalloc(sizeof(struct usb_ctrlrequest), GFP_KERNEL);
1014 if (!dr)
1da177e4
LT
1015 return -ENOMEM;
1016 if (copy_from_user(dr, uurb->buffer, 8)) {
1017 kfree(dr);
1018 return -EFAULT;
1019 }
1020 if (uurb->buffer_length < (le16_to_cpup(&dr->wLength) + 8)) {
1021 kfree(dr);
1022 return -EINVAL;
1023 }
04e482ff
GKH
1024 ret = check_ctrlrecip(ps, dr->bRequestType,
1025 le16_to_cpup(&dr->wIndex));
1026 if (ret) {
1da177e4
LT
1027 kfree(dr);
1028 return ret;
1029 }
1da177e4
LT
1030 uurb->number_of_packets = 0;
1031 uurb->buffer_length = le16_to_cpup(&dr->wLength);
1032 uurb->buffer += 8;
93cf9b90
AS
1033 if ((dr->bRequestType & USB_DIR_IN) && uurb->buffer_length) {
1034 is_in = 1;
1035 uurb->endpoint |= USB_DIR_IN;
1036 } else {
1037 is_in = 0;
1038 uurb->endpoint &= ~USB_DIR_IN;
1039 }
1040 if (!access_ok(is_in ? VERIFY_WRITE : VERIFY_READ,
1041 uurb->buffer, uurb->buffer_length)) {
1da177e4
LT
1042 kfree(dr);
1043 return -EFAULT;
1044 }
df251b8b
CF
1045 snoop(&ps->dev->dev, "control urb: bRequest=%02x "
1046 "bRrequestType=%02x wValue=%04x "
1047 "wIndex=%04x wLength=%04x\n",
93cf9b90
AS
1048 dr->bRequest, dr->bRequestType,
1049 __le16_to_cpup(&dr->wValue),
1050 __le16_to_cpup(&dr->wIndex),
1051 __le16_to_cpup(&dr->wLength));
1da177e4
LT
1052 break;
1053
1054 case USBDEVFS_URB_TYPE_BULK:
93cf9b90 1055 switch (usb_endpoint_type(&ep->desc)) {
1da177e4
LT
1056 case USB_ENDPOINT_XFER_CONTROL:
1057 case USB_ENDPOINT_XFER_ISOC:
1058 return -EINVAL;
1059 /* allow single-shot interrupt transfers, at bogus rates */
1060 }
1061 uurb->number_of_packets = 0;
1062 if (uurb->buffer_length > MAX_USBFS_BUFFER_SIZE)
1063 return -EINVAL;
93cf9b90
AS
1064 if (!access_ok(is_in ? VERIFY_WRITE : VERIFY_READ,
1065 uurb->buffer, uurb->buffer_length))
1da177e4 1066 return -EFAULT;
e639dd3f 1067 snoop(&ps->dev->dev, "bulk urb\n");
1da177e4
LT
1068 break;
1069
1070 case USBDEVFS_URB_TYPE_ISO:
1071 /* arbitrary limit */
04e482ff
GKH
1072 if (uurb->number_of_packets < 1 ||
1073 uurb->number_of_packets > 128)
1da177e4 1074 return -EINVAL;
93cf9b90 1075 if (!usb_endpoint_xfer_isoc(&ep->desc))
1da177e4 1076 return -EINVAL;
04e482ff
GKH
1077 isofrmlen = sizeof(struct usbdevfs_iso_packet_desc) *
1078 uurb->number_of_packets;
1da177e4
LT
1079 if (!(isopkt = kmalloc(isofrmlen, GFP_KERNEL)))
1080 return -ENOMEM;
1081 if (copy_from_user(isopkt, iso_frame_desc, isofrmlen)) {
1082 kfree(isopkt);
1083 return -EFAULT;
1084 }
1085 for (totlen = u = 0; u < uurb->number_of_packets; u++) {
04e482ff
GKH
1086 /* arbitrary limit,
1087 * sufficient for USB 2.0 high-bandwidth iso */
3612242e 1088 if (isopkt[u].length > 8192) {
1da177e4
LT
1089 kfree(isopkt);
1090 return -EINVAL;
1091 }
1092 totlen += isopkt[u].length;
1093 }
1094 if (totlen > 32768) {
1095 kfree(isopkt);
1096 return -EINVAL;
1097 }
1098 uurb->buffer_length = totlen;
e639dd3f 1099 snoop(&ps->dev->dev, "iso urb\n");
1da177e4
LT
1100 break;
1101
1102 case USBDEVFS_URB_TYPE_INTERRUPT:
1103 uurb->number_of_packets = 0;
93cf9b90 1104 if (!usb_endpoint_xfer_int(&ep->desc))
1da177e4 1105 return -EINVAL;
1da177e4
LT
1106 if (uurb->buffer_length > MAX_USBFS_BUFFER_SIZE)
1107 return -EINVAL;
93cf9b90
AS
1108 if (!access_ok(is_in ? VERIFY_WRITE : VERIFY_READ,
1109 uurb->buffer, uurb->buffer_length))
1da177e4 1110 return -EFAULT;
e639dd3f 1111 snoop(&ps->dev->dev, "interrupt urb\n");
1da177e4
LT
1112 break;
1113
1114 default:
1115 return -EINVAL;
1116 }
04e482ff
GKH
1117 as = alloc_async(uurb->number_of_packets);
1118 if (!as) {
6fd19f4b
JJ
1119 kfree(isopkt);
1120 kfree(dr);
1da177e4
LT
1121 return -ENOMEM;
1122 }
04e482ff
GKH
1123 as->urb->transfer_buffer = kmalloc(uurb->buffer_length, GFP_KERNEL);
1124 if (!as->urb->transfer_buffer) {
6fd19f4b
JJ
1125 kfree(isopkt);
1126 kfree(dr);
1da177e4
LT
1127 free_async(as);
1128 return -ENOMEM;
1129 }
04e482ff
GKH
1130 as->urb->dev = ps->dev;
1131 as->urb->pipe = (uurb->type << 30) |
93cf9b90
AS
1132 __create_pipe(ps->dev, uurb->endpoint & 0xf) |
1133 (uurb->endpoint & USB_DIR_IN);
14722ef4
AS
1134
1135 /* This tedious sequence is necessary because the URB_* flags
1136 * are internal to the kernel and subject to change, whereas
1137 * the USBDEVFS_URB_* flags are a user API and must not be changed.
1138 */
1139 u = (is_in ? URB_DIR_IN : URB_DIR_OUT);
1140 if (uurb->flags & USBDEVFS_URB_ISO_ASAP)
1141 u |= URB_ISO_ASAP;
1142 if (uurb->flags & USBDEVFS_URB_SHORT_NOT_OK)
1143 u |= URB_SHORT_NOT_OK;
1144 if (uurb->flags & USBDEVFS_URB_NO_FSBR)
1145 u |= URB_NO_FSBR;
1146 if (uurb->flags & USBDEVFS_URB_ZERO_PACKET)
1147 u |= URB_ZERO_PACKET;
1148 if (uurb->flags & USBDEVFS_URB_NO_INTERRUPT)
1149 u |= URB_NO_INTERRUPT;
1150 as->urb->transfer_flags = u;
1151
1da177e4 1152 as->urb->transfer_buffer_length = uurb->buffer_length;
04e482ff 1153 as->urb->setup_packet = (unsigned char *)dr;
1da177e4
LT
1154 as->urb->start_frame = uurb->start_frame;
1155 as->urb->number_of_packets = uurb->number_of_packets;
97b9eb91
AS
1156 if (uurb->type == USBDEVFS_URB_TYPE_ISO ||
1157 ps->dev->speed == USB_SPEED_HIGH)
1158 as->urb->interval = 1 << min(15, ep->desc.bInterval - 1);
1159 else
1160 as->urb->interval = ep->desc.bInterval;
04e482ff
GKH
1161 as->urb->context = as;
1162 as->urb->complete = async_completed;
1da177e4
LT
1163 for (totlen = u = 0; u < uurb->number_of_packets; u++) {
1164 as->urb->iso_frame_desc[u].offset = totlen;
1165 as->urb->iso_frame_desc[u].length = isopkt[u].length;
1166 totlen += isopkt[u].length;
1167 }
6fd19f4b 1168 kfree(isopkt);
1da177e4 1169 as->ps = ps;
04e482ff 1170 as->userurb = arg;
1da177e4
LT
1171 if (uurb->endpoint & USB_DIR_IN)
1172 as->userbuffer = uurb->buffer;
1173 else
1174 as->userbuffer = NULL;
1175 as->signr = uurb->signr;
1176 as->ifnum = ifnum;
2425c08b 1177 as->pid = get_pid(task_pid(current));
86a264ab
DH
1178 as->uid = cred->uid;
1179 as->euid = cred->euid;
7a01955f 1180 security_task_getsecid(current, &as->secid);
93cf9b90
AS
1181 if (!is_in) {
1182 if (copy_from_user(as->urb->transfer_buffer, uurb->buffer,
1183 as->urb->transfer_buffer_length)) {
1da177e4
LT
1184 free_async(as);
1185 return -EFAULT;
1186 }
1187 }
e639dd3f 1188 snoop_urb(as->urb, as->userurb);
04e482ff
GKH
1189 async_newpending(as);
1190 if ((ret = usb_submit_urb(as->urb, GFP_KERNEL))) {
1191 dev_printk(KERN_DEBUG, &ps->dev->dev,
1192 "usbfs: usb_submit_urb returned %d\n", ret);
1193 async_removepending(as);
1194 free_async(as);
1195 return ret;
1196 }
1197 return 0;
1da177e4
LT
1198}
1199
1200static int proc_submiturb(struct dev_state *ps, void __user *arg)
1201{
1202 struct usbdevfs_urb uurb;
1203
1204 if (copy_from_user(&uurb, arg, sizeof(uurb)))
1205 return -EFAULT;
1206
04e482ff
GKH
1207 return proc_do_submiturb(ps, &uurb,
1208 (((struct usbdevfs_urb __user *)arg)->iso_frame_desc),
1209 arg);
1da177e4
LT
1210}
1211
1212static int proc_unlinkurb(struct dev_state *ps, void __user *arg)
1213{
1214 struct async *as;
1215
1216 as = async_getpending(ps, arg);
1217 if (!as)
1218 return -EINVAL;
1219 usb_kill_urb(as->urb);
1220 return 0;
1221}
1222
1223static int processcompl(struct async *as, void __user * __user *arg)
1224{
1225 struct urb *urb = as->urb;
1226 struct usbdevfs_urb __user *userurb = as->userurb;
1227 void __user *addr = as->userurb;
1228 unsigned int i;
1229
1230 if (as->userbuffer)
04e482ff
GKH
1231 if (copy_to_user(as->userbuffer, urb->transfer_buffer,
1232 urb->transfer_buffer_length))
1da177e4 1233 return -EFAULT;
e015268d 1234 if (put_user(as->status, &userurb->status))
1da177e4
LT
1235 return -EFAULT;
1236 if (put_user(urb->actual_length, &userurb->actual_length))
1237 return -EFAULT;
1238 if (put_user(urb->error_count, &userurb->error_count))
1239 return -EFAULT;
1240
93cf9b90 1241 if (usb_endpoint_xfer_isoc(&urb->ep->desc)) {
668a9541
CL
1242 for (i = 0; i < urb->number_of_packets; i++) {
1243 if (put_user(urb->iso_frame_desc[i].actual_length,
1244 &userurb->iso_frame_desc[i].actual_length))
1245 return -EFAULT;
1246 if (put_user(urb->iso_frame_desc[i].status,
1247 &userurb->iso_frame_desc[i].status))
1248 return -EFAULT;
1249 }
1da177e4
LT
1250 }
1251
1252 free_async(as);
1253
1254 if (put_user(addr, (void __user * __user *)arg))
1255 return -EFAULT;
1256 return 0;
1257}
1258
04e482ff 1259static struct async *reap_as(struct dev_state *ps)
1da177e4 1260{
04e482ff 1261 DECLARE_WAITQUEUE(wait, current);
1da177e4
LT
1262 struct async *as = NULL;
1263 struct usb_device *dev = ps->dev;
1264
1265 add_wait_queue(&ps->wait, &wait);
1266 for (;;) {
1267 __set_current_state(TASK_INTERRUPTIBLE);
04e482ff
GKH
1268 as = async_getcompleted(ps);
1269 if (as)
1da177e4
LT
1270 break;
1271 if (signal_pending(current))
1272 break;
1273 usb_unlock_device(dev);
1274 schedule();
1275 usb_lock_device(dev);
1276 }
1277 remove_wait_queue(&ps->wait, &wait);
1278 set_current_state(TASK_RUNNING);
1279 return as;
1280}
1281
1282static int proc_reapurb(struct dev_state *ps, void __user *arg)
1283{
1284 struct async *as = reap_as(ps);
1285 if (as)
1286 return processcompl(as, (void __user * __user *)arg);
1287 if (signal_pending(current))
1288 return -EINTR;
1289 return -EIO;
1290}
1291
1292static int proc_reapurbnonblock(struct dev_state *ps, void __user *arg)
1293{
1294 struct async *as;
1295
1296 if (!(as = async_getcompleted(ps)))
1297 return -EAGAIN;
1298 return processcompl(as, (void __user * __user *)arg);
1299}
1300
1301#ifdef CONFIG_COMPAT
1302
1303static int get_urb32(struct usbdevfs_urb *kurb,
1304 struct usbdevfs_urb32 __user *uurb)
1305{
1306 __u32 uptr;
1307 if (get_user(kurb->type, &uurb->type) ||
1308 __get_user(kurb->endpoint, &uurb->endpoint) ||
1309 __get_user(kurb->status, &uurb->status) ||
1310 __get_user(kurb->flags, &uurb->flags) ||
1311 __get_user(kurb->buffer_length, &uurb->buffer_length) ||
1312 __get_user(kurb->actual_length, &uurb->actual_length) ||
1313 __get_user(kurb->start_frame, &uurb->start_frame) ||
1314 __get_user(kurb->number_of_packets, &uurb->number_of_packets) ||
1315 __get_user(kurb->error_count, &uurb->error_count) ||
1316 __get_user(kurb->signr, &uurb->signr))
1317 return -EFAULT;
1318
1319 if (__get_user(uptr, &uurb->buffer))
1320 return -EFAULT;
1321 kurb->buffer = compat_ptr(uptr);
ed0c7720 1322 if (__get_user(uptr, &uurb->usercontext))
1da177e4
LT
1323 return -EFAULT;
1324 kurb->usercontext = compat_ptr(uptr);
1325
1326 return 0;
1327}
1328
1329static int proc_submiturb_compat(struct dev_state *ps, void __user *arg)
1330{
1331 struct usbdevfs_urb uurb;
1332
04e482ff 1333 if (get_urb32(&uurb, (struct usbdevfs_urb32 __user *)arg))
1da177e4
LT
1334 return -EFAULT;
1335
04e482ff
GKH
1336 return proc_do_submiturb(ps, &uurb,
1337 ((struct usbdevfs_urb32 __user *)arg)->iso_frame_desc,
1338 arg);
1da177e4
LT
1339}
1340
1341static int processcompl_compat(struct async *as, void __user * __user *arg)
1342{
1343 struct urb *urb = as->urb;
1344 struct usbdevfs_urb32 __user *userurb = as->userurb;
1345 void __user *addr = as->userurb;
1346 unsigned int i;
1347
1348 if (as->userbuffer)
04e482ff
GKH
1349 if (copy_to_user(as->userbuffer, urb->transfer_buffer,
1350 urb->transfer_buffer_length))
1da177e4 1351 return -EFAULT;
e015268d 1352 if (put_user(as->status, &userurb->status))
1da177e4
LT
1353 return -EFAULT;
1354 if (put_user(urb->actual_length, &userurb->actual_length))
1355 return -EFAULT;
1356 if (put_user(urb->error_count, &userurb->error_count))
1357 return -EFAULT;
1358
93cf9b90 1359 if (usb_endpoint_xfer_isoc(&urb->ep->desc)) {
668a9541
CL
1360 for (i = 0; i < urb->number_of_packets; i++) {
1361 if (put_user(urb->iso_frame_desc[i].actual_length,
1362 &userurb->iso_frame_desc[i].actual_length))
1363 return -EFAULT;
1364 if (put_user(urb->iso_frame_desc[i].status,
1365 &userurb->iso_frame_desc[i].status))
1366 return -EFAULT;
1367 }
1da177e4
LT
1368 }
1369
1370 free_async(as);
c714de5d 1371 if (put_user(ptr_to_compat(addr), (u32 __user *)arg))
1da177e4
LT
1372 return -EFAULT;
1373 return 0;
1374}
1375
1376static int proc_reapurb_compat(struct dev_state *ps, void __user *arg)
1377{
1378 struct async *as = reap_as(ps);
1379 if (as)
1380 return processcompl_compat(as, (void __user * __user *)arg);
1381 if (signal_pending(current))
1382 return -EINTR;
1383 return -EIO;
1384}
1385
1386static int proc_reapurbnonblock_compat(struct dev_state *ps, void __user *arg)
1387{
1388 struct async *as;
1389
1da177e4
LT
1390 if (!(as = async_getcompleted(ps)))
1391 return -EAGAIN;
1da177e4
LT
1392 return processcompl_compat(as, (void __user * __user *)arg);
1393}
1394
1395#endif
1396
1397static int proc_disconnectsignal(struct dev_state *ps, void __user *arg)
1398{
1399 struct usbdevfs_disconnectsignal ds;
1400
1401 if (copy_from_user(&ds, arg, sizeof(ds)))
1402 return -EFAULT;
1da177e4
LT
1403 ps->discsignr = ds.signr;
1404 ps->disccontext = ds.context;
1405 return 0;
1406}
1407
1408static int proc_claiminterface(struct dev_state *ps, void __user *arg)
1409{
1410 unsigned int ifnum;
1411
1412 if (get_user(ifnum, (unsigned int __user *)arg))
1413 return -EFAULT;
1414 return claimintf(ps, ifnum);
1415}
1416
1417static int proc_releaseinterface(struct dev_state *ps, void __user *arg)
1418{
1419 unsigned int ifnum;
1420 int ret;
1421
1422 if (get_user(ifnum, (unsigned int __user *)arg))
1423 return -EFAULT;
1424 if ((ret = releaseintf(ps, ifnum)) < 0)
1425 return ret;
1426 destroy_async_on_interface (ps, ifnum);
1427 return 0;
1428}
1429
c36fc889 1430static int proc_ioctl(struct dev_state *ps, struct usbdevfs_ioctl *ctl)
1da177e4 1431{
1da177e4
LT
1432 int size;
1433 void *buf = NULL;
1434 int retval = 0;
1435 struct usb_interface *intf = NULL;
1436 struct usb_driver *driver = NULL;
1da177e4 1437
c36fc889 1438 /* alloc buffer */
04e482ff
GKH
1439 if ((size = _IOC_SIZE(ctl->ioctl_code)) > 0) {
1440 if ((buf = kmalloc(size, GFP_KERNEL)) == NULL)
1da177e4 1441 return -ENOMEM;
c36fc889 1442 if ((_IOC_DIR(ctl->ioctl_code) & _IOC_WRITE)) {
04e482ff 1443 if (copy_from_user(buf, ctl->data, size)) {
6fd19f4b 1444 kfree(buf);
1da177e4
LT
1445 return -EFAULT;
1446 }
1447 } else {
04e482ff 1448 memset(buf, 0, size);
1da177e4
LT
1449 }
1450 }
1451
349710c3 1452 if (!connected(ps)) {
6fd19f4b 1453 kfree(buf);
1da177e4
LT
1454 return -ENODEV;
1455 }
1456
1457 if (ps->dev->state != USB_STATE_CONFIGURED)
1458 retval = -EHOSTUNREACH;
04e482ff
GKH
1459 else if (!(intf = usb_ifnum_to_if(ps->dev, ctl->ifno)))
1460 retval = -EINVAL;
c36fc889 1461 else switch (ctl->ioctl_code) {
1da177e4
LT
1462
1463 /* disconnect kernel driver from interface */
1464 case USBDEVFS_DISCONNECT:
1da177e4
LT
1465 if (intf->dev.driver) {
1466 driver = to_usb_driver(intf->dev.driver);
04e482ff 1467 dev_dbg(&intf->dev, "disconnect by usbfs\n");
1da177e4
LT
1468 usb_driver_release_interface(driver, intf);
1469 } else
1470 retval = -ENODATA;
1da177e4
LT
1471 break;
1472
1473 /* let kernel drivers try to (re)bind to the interface */
1474 case USBDEVFS_CONNECT:
885e9747
AS
1475 if (!intf->dev.driver)
1476 retval = device_attach(&intf->dev);
1477 else
1478 retval = -EBUSY;
1da177e4
LT
1479 break;
1480
1481 /* talk directly to the interface's driver */
1482 default:
1da177e4
LT
1483 if (intf->dev.driver)
1484 driver = to_usb_driver(intf->dev.driver);
1485 if (driver == NULL || driver->ioctl == NULL) {
1486 retval = -ENOTTY;
1487 } else {
04e482ff 1488 retval = driver->ioctl(intf, ctl->ioctl_code, buf);
1da177e4
LT
1489 if (retval == -ENOIOCTLCMD)
1490 retval = -ENOTTY;
1491 }
1da177e4
LT
1492 }
1493
1494 /* cleanup and return */
1495 if (retval >= 0
04e482ff 1496 && (_IOC_DIR(ctl->ioctl_code) & _IOC_READ) != 0
1da177e4 1497 && size > 0
04e482ff 1498 && copy_to_user(ctl->data, buf, size) != 0)
1da177e4 1499 retval = -EFAULT;
6fd19f4b
JJ
1500
1501 kfree(buf);
1da177e4
LT
1502 return retval;
1503}
1504
c36fc889
PZ
1505static int proc_ioctl_default(struct dev_state *ps, void __user *arg)
1506{
1507 struct usbdevfs_ioctl ctrl;
1508
04e482ff 1509 if (copy_from_user(&ctrl, arg, sizeof(ctrl)))
c36fc889
PZ
1510 return -EFAULT;
1511 return proc_ioctl(ps, &ctrl);
1512}
1513
1514#ifdef CONFIG_COMPAT
777da590 1515static int proc_ioctl_compat(struct dev_state *ps, compat_uptr_t arg)
c36fc889
PZ
1516{
1517 struct usbdevfs_ioctl32 __user *uioc;
1518 struct usbdevfs_ioctl ctrl;
1519 u32 udata;
1520
058120d7 1521 uioc = compat_ptr((long)arg);
c36fc889
PZ
1522 if (get_user(ctrl.ifno, &uioc->ifno) ||
1523 get_user(ctrl.ioctl_code, &uioc->ioctl_code) ||
1524 __get_user(udata, &uioc->data))
1525 return -EFAULT;
1526 ctrl.data = compat_ptr(udata);
1527
1528 return proc_ioctl(ps, &ctrl);
1529}
1530#endif
1531
1da177e4
LT
1532/*
1533 * NOTE: All requests here that have interface numbers as parameters
1534 * are assuming that somehow the configuration has been prevented from
1535 * changing. But there's no mechanism to ensure that...
1536 */
04e482ff
GKH
1537static int usbdev_ioctl(struct inode *inode, struct file *file,
1538 unsigned int cmd, unsigned long arg)
1da177e4 1539{
ec17cf1c 1540 struct dev_state *ps = file->private_data;
1da177e4
LT
1541 struct usb_device *dev = ps->dev;
1542 void __user *p = (void __user *)arg;
1543 int ret = -ENOTTY;
1544
1545 if (!(file->f_mode & FMODE_WRITE))
1546 return -EPERM;
1547 usb_lock_device(dev);
349710c3 1548 if (!connected(ps)) {
1da177e4
LT
1549 usb_unlock_device(dev);
1550 return -ENODEV;
1551 }
1552
1553 switch (cmd) {
1554 case USBDEVFS_CONTROL:
441b62c1 1555 snoop(&dev->dev, "%s: CONTROL\n", __func__);
1da177e4
LT
1556 ret = proc_control(ps, p);
1557 if (ret >= 0)
1558 inode->i_mtime = CURRENT_TIME;
1559 break;
1560
1561 case USBDEVFS_BULK:
441b62c1 1562 snoop(&dev->dev, "%s: BULK\n", __func__);
1da177e4
LT
1563 ret = proc_bulk(ps, p);
1564 if (ret >= 0)
1565 inode->i_mtime = CURRENT_TIME;
1566 break;
1567
1568 case USBDEVFS_RESETEP:
441b62c1 1569 snoop(&dev->dev, "%s: RESETEP\n", __func__);
1da177e4
LT
1570 ret = proc_resetep(ps, p);
1571 if (ret >= 0)
1572 inode->i_mtime = CURRENT_TIME;
1573 break;
1574
1575 case USBDEVFS_RESET:
441b62c1 1576 snoop(&dev->dev, "%s: RESET\n", __func__);
1da177e4
LT
1577 ret = proc_resetdevice(ps);
1578 break;
1579
1580 case USBDEVFS_CLEAR_HALT:
441b62c1 1581 snoop(&dev->dev, "%s: CLEAR_HALT\n", __func__);
1da177e4
LT
1582 ret = proc_clearhalt(ps, p);
1583 if (ret >= 0)
1584 inode->i_mtime = CURRENT_TIME;
1585 break;
1586
1587 case USBDEVFS_GETDRIVER:
441b62c1 1588 snoop(&dev->dev, "%s: GETDRIVER\n", __func__);
1da177e4
LT
1589 ret = proc_getdriver(ps, p);
1590 break;
1591
1592 case USBDEVFS_CONNECTINFO:
441b62c1 1593 snoop(&dev->dev, "%s: CONNECTINFO\n", __func__);
1da177e4
LT
1594 ret = proc_connectinfo(ps, p);
1595 break;
1596
1597 case USBDEVFS_SETINTERFACE:
441b62c1 1598 snoop(&dev->dev, "%s: SETINTERFACE\n", __func__);
1da177e4
LT
1599 ret = proc_setintf(ps, p);
1600 break;
1601
1602 case USBDEVFS_SETCONFIGURATION:
441b62c1 1603 snoop(&dev->dev, "%s: SETCONFIGURATION\n", __func__);
1da177e4
LT
1604 ret = proc_setconfig(ps, p);
1605 break;
1606
1607 case USBDEVFS_SUBMITURB:
441b62c1 1608 snoop(&dev->dev, "%s: SUBMITURB\n", __func__);
1da177e4
LT
1609 ret = proc_submiturb(ps, p);
1610 if (ret >= 0)
1611 inode->i_mtime = CURRENT_TIME;
1612 break;
1613
1614#ifdef CONFIG_COMPAT
1615
1616 case USBDEVFS_SUBMITURB32:
441b62c1 1617 snoop(&dev->dev, "%s: SUBMITURB32\n", __func__);
1da177e4
LT
1618 ret = proc_submiturb_compat(ps, p);
1619 if (ret >= 0)
1620 inode->i_mtime = CURRENT_TIME;
1621 break;
1622
1623 case USBDEVFS_REAPURB32:
441b62c1 1624 snoop(&dev->dev, "%s: REAPURB32\n", __func__);
1da177e4
LT
1625 ret = proc_reapurb_compat(ps, p);
1626 break;
1627
1628 case USBDEVFS_REAPURBNDELAY32:
441b62c1 1629 snoop(&dev->dev, "%s: REAPURBDELAY32\n", __func__);
1da177e4
LT
1630 ret = proc_reapurbnonblock_compat(ps, p);
1631 break;
1632
c36fc889 1633 case USBDEVFS_IOCTL32:
441b62c1 1634 snoop(&dev->dev, "%s: IOCTL\n", __func__);
c714de5d 1635 ret = proc_ioctl_compat(ps, ptr_to_compat(p));
c36fc889 1636 break;
1da177e4
LT
1637#endif
1638
1639 case USBDEVFS_DISCARDURB:
441b62c1 1640 snoop(&dev->dev, "%s: DISCARDURB\n", __func__);
1da177e4
LT
1641 ret = proc_unlinkurb(ps, p);
1642 break;
1643
1644 case USBDEVFS_REAPURB:
441b62c1 1645 snoop(&dev->dev, "%s: REAPURB\n", __func__);
1da177e4
LT
1646 ret = proc_reapurb(ps, p);
1647 break;
1648
1649 case USBDEVFS_REAPURBNDELAY:
441b62c1 1650 snoop(&dev->dev, "%s: REAPURBDELAY\n", __func__);
1da177e4
LT
1651 ret = proc_reapurbnonblock(ps, p);
1652 break;
1653
1654 case USBDEVFS_DISCSIGNAL:
441b62c1 1655 snoop(&dev->dev, "%s: DISCSIGNAL\n", __func__);
1da177e4
LT
1656 ret = proc_disconnectsignal(ps, p);
1657 break;
1658
1659 case USBDEVFS_CLAIMINTERFACE:
441b62c1 1660 snoop(&dev->dev, "%s: CLAIMINTERFACE\n", __func__);
1da177e4
LT
1661 ret = proc_claiminterface(ps, p);
1662 break;
1663
1664 case USBDEVFS_RELEASEINTERFACE:
441b62c1 1665 snoop(&dev->dev, "%s: RELEASEINTERFACE\n", __func__);
1da177e4
LT
1666 ret = proc_releaseinterface(ps, p);
1667 break;
1668
1669 case USBDEVFS_IOCTL:
441b62c1 1670 snoop(&dev->dev, "%s: IOCTL\n", __func__);
c36fc889 1671 ret = proc_ioctl_default(ps, p);
1da177e4
LT
1672 break;
1673 }
1674 usb_unlock_device(dev);
1675 if (ret >= 0)
1676 inode->i_atime = CURRENT_TIME;
1677 return ret;
1678}
1679
1680/* No kernel lock - fine */
04e482ff
GKH
1681static unsigned int usbdev_poll(struct file *file,
1682 struct poll_table_struct *wait)
1da177e4 1683{
ec17cf1c
TK
1684 struct dev_state *ps = file->private_data;
1685 unsigned int mask = 0;
1da177e4
LT
1686
1687 poll_wait(file, &ps->wait, wait);
1688 if (file->f_mode & FMODE_WRITE && !list_empty(&ps->async_completed))
1689 mask |= POLLOUT | POLLWRNORM;
349710c3 1690 if (!connected(ps))
1da177e4
LT
1691 mask |= POLLERR | POLLHUP;
1692 return mask;
1693}
1694
9f8b17e6 1695const struct file_operations usbdev_file_operations = {
7e7654a9 1696 .owner = THIS_MODULE,
1da177e4
LT
1697 .llseek = usbdev_lseek,
1698 .read = usbdev_read,
1699 .poll = usbdev_poll,
1700 .ioctl = usbdev_ioctl,
1701 .open = usbdev_open,
1702 .release = usbdev_release,
1703};
fbf82fd2 1704
501950d8 1705static void usbdev_remove(struct usb_device *udev)
cd9f0375
AS
1706{
1707 struct dev_state *ps;
1708 struct siginfo sinfo;
1709
1710 while (!list_empty(&udev->filelist)) {
1711 ps = list_entry(udev->filelist.next, struct dev_state, list);
1712 destroy_all_async(ps);
1713 wake_up_all(&ps->wait);
1714 list_del_init(&ps->list);
1715 if (ps->discsignr) {
1716 sinfo.si_signo = ps->discsignr;
1717 sinfo.si_errno = EPIPE;
1718 sinfo.si_code = SI_ASYNCIO;
1719 sinfo.si_addr = ps->disccontext;
1720 kill_pid_info_as_uid(ps->discsignr, &sinfo,
1721 ps->disc_pid, ps->disc_uid,
1722 ps->disc_euid, ps->secid);
1723 }
1724 }
1725}
1726
9f8b17e6
KS
1727#ifdef CONFIG_USB_DEVICE_CLASS
1728static struct class *usb_classdev_class;
1729
1730static int usb_classdev_add(struct usb_device *dev)
fbf82fd2 1731{
e04199b2
AS
1732 struct device *cldev;
1733
b0b090e5
GKH
1734 cldev = device_create(usb_classdev_class, &dev->dev, dev->dev.devt,
1735 NULL, "usbdev%d.%d", dev->bus->busnum,
1736 dev->devnum);
e04199b2
AS
1737 if (IS_ERR(cldev))
1738 return PTR_ERR(cldev);
1739 dev->usb_classdev = cldev;
27d39e26 1740 return 0;
fbf82fd2
KS
1741}
1742
9f8b17e6 1743static void usb_classdev_remove(struct usb_device *dev)
fbf82fd2 1744{
e04199b2
AS
1745 if (dev->usb_classdev)
1746 device_unregister(dev->usb_classdev);
fbf82fd2
KS
1747}
1748
501950d8
AS
1749#else
1750#define usb_classdev_add(dev) 0
1751#define usb_classdev_remove(dev) do {} while (0)
1752
1753#endif
1754
1755static int usbdev_notify(struct notifier_block *self,
9f8b17e6 1756 unsigned long action, void *dev)
a7b986b3
GKH
1757{
1758 switch (action) {
1759 case USB_DEVICE_ADD:
9f8b17e6 1760 if (usb_classdev_add(dev))
27d39e26 1761 return NOTIFY_BAD;
a7b986b3
GKH
1762 break;
1763 case USB_DEVICE_REMOVE:
9f8b17e6 1764 usb_classdev_remove(dev);
501950d8 1765 usbdev_remove(dev);
a7b986b3
GKH
1766 break;
1767 }
1768 return NOTIFY_OK;
1769}
1770
1771static struct notifier_block usbdev_nb = {
501950d8 1772 .notifier_call = usbdev_notify,
a7b986b3
GKH
1773};
1774
7e7654a9 1775static struct cdev usb_device_cdev;
fbf82fd2 1776
9f8b17e6 1777int __init usb_devio_init(void)
fbf82fd2
KS
1778{
1779 int retval;
1780
fad21bdf 1781 retval = register_chrdev_region(USB_DEVICE_DEV, USB_DEVICE_MAX,
04e482ff 1782 "usb_device");
fbf82fd2 1783 if (retval) {
69a85942 1784 printk(KERN_ERR "Unable to register minors for usb_device\n");
fbf82fd2
KS
1785 goto out;
1786 }
9f8b17e6 1787 cdev_init(&usb_device_cdev, &usbdev_file_operations);
fad21bdf 1788 retval = cdev_add(&usb_device_cdev, USB_DEVICE_DEV, USB_DEVICE_MAX);
fbf82fd2 1789 if (retval) {
69a85942
GKH
1790 printk(KERN_ERR "Unable to get usb_device major %d\n",
1791 USB_DEVICE_MAJOR);
a7b986b3 1792 goto error_cdev;
fbf82fd2 1793 }
9f8b17e6
KS
1794#ifdef CONFIG_USB_DEVICE_CLASS
1795 usb_classdev_class = class_create(THIS_MODULE, "usb_device");
1796 if (IS_ERR(usb_classdev_class)) {
69a85942 1797 printk(KERN_ERR "Unable to register usb_device class\n");
9f8b17e6
KS
1798 retval = PTR_ERR(usb_classdev_class);
1799 cdev_del(&usb_device_cdev);
1800 usb_classdev_class = NULL;
1801 goto out;
fbf82fd2 1802 }
e105b8bf
DW
1803 /* devices of this class shadow the major:minor of their parent
1804 * device, so clear ->dev_kobj to prevent adding duplicate entries
1805 * to /sys/dev
1806 */
1807 usb_classdev_class->dev_kobj = NULL;
9f8b17e6 1808#endif
501950d8 1809 usb_register_notify(&usbdev_nb);
fbf82fd2
KS
1810out:
1811 return retval;
a7b986b3 1812
a7b986b3
GKH
1813error_cdev:
1814 unregister_chrdev_region(USB_DEVICE_DEV, USB_DEVICE_MAX);
1815 goto out;
fbf82fd2
KS
1816}
1817
9f8b17e6 1818void usb_devio_cleanup(void)
fbf82fd2 1819{
a7b986b3 1820 usb_unregister_notify(&usbdev_nb);
501950d8 1821#ifdef CONFIG_USB_DEVICE_CLASS
9f8b17e6
KS
1822 class_destroy(usb_classdev_class);
1823#endif
fbf82fd2 1824 cdev_del(&usb_device_cdev);
fad21bdf 1825 unregister_chrdev_region(USB_DEVICE_DEV, USB_DEVICE_MAX);
fbf82fd2 1826}
This page took 0.582079 seconds and 5 git commands to generate.