USB: message: cleanup min_t() cast in usb_sg_init()
[deliverable/linux.git] / drivers / usb / core / devio.c
CommitLineData
1da177e4
LT
1/*****************************************************************************/
2
3/*
4 * devio.c -- User space communication with USB devices.
5 *
6 * Copyright (C) 1999-2000 Thomas Sailer (sailer@ife.ee.ethz.ch)
7 *
8 * This program is free software; you can redistribute it and/or modify
9 * it under the terms of the GNU General Public License as published by
10 * the Free Software Foundation; either version 2 of the License, or
11 * (at your option) any later version.
12 *
13 * This program is distributed in the hope that it will be useful,
14 * but WITHOUT ANY WARRANTY; without even the implied warranty of
15 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
16 * GNU General Public License for more details.
17 *
18 * You should have received a copy of the GNU General Public License
19 * along with this program; if not, write to the Free Software
20 * Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA.
21 *
1da177e4
LT
22 * This file implements the usbfs/x/y files, where
23 * x is the bus number and y the device number.
24 *
25 * It allows user space programs/"drivers" to communicate directly
26 * with USB devices without intervening kernel driver.
27 *
28 * Revision history
29 * 22.12.1999 0.1 Initial release (split from proc_usb.c)
30 * 04.01.2000 0.2 Turned into its own filesystem
46113830
HW
31 * 30.09.2005 0.3 Fix user-triggerable oops in async URB delivery
32 * (CAN-2005-3055)
1da177e4
LT
33 */
34
35/*****************************************************************************/
36
37#include <linux/fs.h>
38#include <linux/mm.h>
39#include <linux/slab.h>
1da177e4
LT
40#include <linux/signal.h>
41#include <linux/poll.h>
42#include <linux/module.h>
43#include <linux/usb.h>
44#include <linux/usbdevice_fs.h>
27729aad 45#include <linux/usb/hcd.h> /* for usbcore internals */
fbf82fd2 46#include <linux/cdev.h>
a7b986b3 47#include <linux/notifier.h>
7a01955f 48#include <linux/security.h>
1da177e4
LT
49#include <asm/uaccess.h>
50#include <asm/byteorder.h>
51#include <linux/moduleparam.h>
52
1da177e4
LT
53#include "usb.h"
54
fbf82fd2
KS
55#define USB_MAXBUS 64
56#define USB_DEVICE_MAX USB_MAXBUS * 128
fbf82fd2 57
4a2a8a2c
AS
58/* Mutual exclusion for removal, open, and release */
59DEFINE_MUTEX(usbfs_mutex);
60
cd9f0375
AS
61struct dev_state {
62 struct list_head list; /* state list */
63 struct usb_device *dev;
64 struct file *file;
65 spinlock_t lock; /* protects the async urb lists */
66 struct list_head async_pending;
67 struct list_head async_completed;
68 wait_queue_head_t wait; /* wake up if a request completed */
69 unsigned int discsignr;
70 struct pid *disc_pid;
71 uid_t disc_uid, disc_euid;
72 void __user *disccontext;
73 unsigned long ifclaimed;
74 u32 secid;
01c6460f 75 u32 disabled_bulk_eps;
cd9f0375
AS
76};
77
1da177e4
LT
78struct async {
79 struct list_head asynclist;
80 struct dev_state *ps;
2425c08b 81 struct pid *pid;
46113830 82 uid_t uid, euid;
1da177e4
LT
83 unsigned int signr;
84 unsigned int ifnum;
85 void __user *userbuffer;
86 void __user *userurb;
87 struct urb *urb;
e015268d 88 int status;
7a01955f 89 u32 secid;
01c6460f
AS
90 u8 bulk_addr;
91 u8 bulk_status;
1da177e4
LT
92};
93
04e482ff
GKH
94static int usbfs_snoop;
95module_param(usbfs_snoop, bool, S_IRUGO | S_IWUSR);
96MODULE_PARM_DESC(usbfs_snoop, "true to log all usbfs traffic");
1da177e4
LT
97
98#define snoop(dev, format, arg...) \
99 do { \
100 if (usbfs_snoop) \
04e482ff 101 dev_info(dev , format , ## arg); \
1da177e4
LT
102 } while (0)
103
4c6e8971
AS
104enum snoop_when {
105 SUBMIT, COMPLETE
106};
fad21bdf 107
4c6e8971 108#define USB_DEVICE_DEV MKDEV(USB_DEVICE_MAJOR, 0)
1da177e4
LT
109
110#define MAX_USBFS_BUFFER_SIZE 16384
111
4c6e8971 112
d34d9721 113static int connected(struct dev_state *ps)
1da177e4 114{
349710c3
AS
115 return (!list_empty(&ps->list) &&
116 ps->dev->state != USB_STATE_NOTATTACHED);
1da177e4
LT
117}
118
119static loff_t usbdev_lseek(struct file *file, loff_t offset, int orig)
120{
121 loff_t ret;
122
f9de332e 123 mutex_lock(&file->f_dentry->d_inode->i_mutex);
1da177e4
LT
124
125 switch (orig) {
126 case 0:
127 file->f_pos = offset;
128 ret = file->f_pos;
129 break;
130 case 1:
131 file->f_pos += offset;
132 ret = file->f_pos;
133 break;
134 case 2:
135 default:
136 ret = -EINVAL;
137 }
138
f9de332e 139 mutex_unlock(&file->f_dentry->d_inode->i_mutex);
1da177e4
LT
140 return ret;
141}
142
04e482ff
GKH
143static ssize_t usbdev_read(struct file *file, char __user *buf, size_t nbytes,
144 loff_t *ppos)
1da177e4 145{
ec17cf1c 146 struct dev_state *ps = file->private_data;
1da177e4
LT
147 struct usb_device *dev = ps->dev;
148 ssize_t ret = 0;
149 unsigned len;
150 loff_t pos;
151 int i;
152
153 pos = *ppos;
154 usb_lock_device(dev);
349710c3 155 if (!connected(ps)) {
1da177e4
LT
156 ret = -ENODEV;
157 goto err;
158 } else if (pos < 0) {
159 ret = -EINVAL;
160 goto err;
161 }
162
163 if (pos < sizeof(struct usb_device_descriptor)) {
04e482ff
GKH
164 /* 18 bytes - fits on the stack */
165 struct usb_device_descriptor temp_desc;
8781ba0a
ON
166
167 memcpy(&temp_desc, &dev->descriptor, sizeof(dev->descriptor));
9fcd5c32
AM
168 le16_to_cpus(&temp_desc.bcdUSB);
169 le16_to_cpus(&temp_desc.idVendor);
170 le16_to_cpus(&temp_desc.idProduct);
171 le16_to_cpus(&temp_desc.bcdDevice);
1da177e4
LT
172
173 len = sizeof(struct usb_device_descriptor) - pos;
174 if (len > nbytes)
175 len = nbytes;
8781ba0a 176 if (copy_to_user(buf, ((char *)&temp_desc) + pos, len)) {
1da177e4
LT
177 ret = -EFAULT;
178 goto err;
179 }
1da177e4
LT
180
181 *ppos += len;
182 buf += len;
183 nbytes -= len;
184 ret += len;
185 }
186
187 pos = sizeof(struct usb_device_descriptor);
188 for (i = 0; nbytes && i < dev->descriptor.bNumConfigurations; i++) {
189 struct usb_config_descriptor *config =
190 (struct usb_config_descriptor *)dev->rawdescriptors[i];
191 unsigned int length = le16_to_cpu(config->wTotalLength);
192
193 if (*ppos < pos + length) {
194
195 /* The descriptor may claim to be longer than it
196 * really is. Here is the actual allocated length. */
197 unsigned alloclen =
198 le16_to_cpu(dev->config[i].desc.wTotalLength);
199
200 len = length - (*ppos - pos);
201 if (len > nbytes)
202 len = nbytes;
203
204 /* Simply don't write (skip over) unallocated parts */
205 if (alloclen > (*ppos - pos)) {
206 alloclen -= (*ppos - pos);
207 if (copy_to_user(buf,
208 dev->rawdescriptors[i] + (*ppos - pos),
209 min(len, alloclen))) {
210 ret = -EFAULT;
211 goto err;
212 }
213 }
214
215 *ppos += len;
216 buf += len;
217 nbytes -= len;
218 ret += len;
219 }
220
221 pos += length;
222 }
223
224err:
225 usb_unlock_device(dev);
226 return ret;
227}
228
229/*
230 * async list handling
231 */
232
233static struct async *alloc_async(unsigned int numisoframes)
234{
dd95b814 235 struct async *as;
0a1ef3b5 236
dd95b814 237 as = kzalloc(sizeof(struct async), GFP_KERNEL);
04e482ff
GKH
238 if (!as)
239 return NULL;
1da177e4
LT
240 as->urb = usb_alloc_urb(numisoframes, GFP_KERNEL);
241 if (!as->urb) {
242 kfree(as);
243 return NULL;
244 }
04e482ff 245 return as;
1da177e4
LT
246}
247
248static void free_async(struct async *as)
249{
2425c08b 250 put_pid(as->pid);
6fd19f4b
JJ
251 kfree(as->urb->transfer_buffer);
252 kfree(as->urb->setup_packet);
1da177e4 253 usb_free_urb(as->urb);
6fd19f4b 254 kfree(as);
1da177e4
LT
255}
256
d34d9721 257static void async_newpending(struct async *as)
1da177e4 258{
04e482ff
GKH
259 struct dev_state *ps = as->ps;
260 unsigned long flags;
261
262 spin_lock_irqsave(&ps->lock, flags);
263 list_add_tail(&as->asynclist, &ps->async_pending);
264 spin_unlock_irqrestore(&ps->lock, flags);
1da177e4
LT
265}
266
d34d9721 267static void async_removepending(struct async *as)
1da177e4 268{
04e482ff
GKH
269 struct dev_state *ps = as->ps;
270 unsigned long flags;
271
272 spin_lock_irqsave(&ps->lock, flags);
273 list_del_init(&as->asynclist);
274 spin_unlock_irqrestore(&ps->lock, flags);
1da177e4
LT
275}
276
d34d9721 277static struct async *async_getcompleted(struct dev_state *ps)
1da177e4 278{
04e482ff
GKH
279 unsigned long flags;
280 struct async *as = NULL;
281
282 spin_lock_irqsave(&ps->lock, flags);
283 if (!list_empty(&ps->async_completed)) {
284 as = list_entry(ps->async_completed.next, struct async,
285 asynclist);
286 list_del_init(&as->asynclist);
287 }
288 spin_unlock_irqrestore(&ps->lock, flags);
289 return as;
1da177e4
LT
290}
291
d34d9721 292static struct async *async_getpending(struct dev_state *ps,
04e482ff 293 void __user *userurb)
1da177e4 294{
04e482ff
GKH
295 unsigned long flags;
296 struct async *as;
1da177e4 297
04e482ff 298 spin_lock_irqsave(&ps->lock, flags);
1da177e4
LT
299 list_for_each_entry(as, &ps->async_pending, asynclist)
300 if (as->userurb == userurb) {
301 list_del_init(&as->asynclist);
302 spin_unlock_irqrestore(&ps->lock, flags);
303 return as;
304 }
04e482ff
GKH
305 spin_unlock_irqrestore(&ps->lock, flags);
306 return NULL;
1da177e4
LT
307}
308
4c6e8971
AS
309static void snoop_urb(struct usb_device *udev,
310 void __user *userurb, int pipe, unsigned length,
0880aef4
CF
311 int timeout_or_status, enum snoop_when when,
312 unsigned char *data, unsigned data_len)
e639dd3f 313{
4c6e8971
AS
314 static const char *types[] = {"isoc", "int", "ctrl", "bulk"};
315 static const char *dirs[] = {"out", "in"};
316 int ep;
317 const char *t, *d;
e639dd3f
GKH
318
319 if (!usbfs_snoop)
320 return;
321
4c6e8971
AS
322 ep = usb_pipeendpoint(pipe);
323 t = types[usb_pipetype(pipe)];
324 d = dirs[!!usb_pipein(pipe)];
325
326 if (userurb) { /* Async */
327 if (when == SUBMIT)
328 dev_info(&udev->dev, "userurb %p, ep%d %s-%s, "
329 "length %u\n",
330 userurb, ep, t, d, length);
331 else
332 dev_info(&udev->dev, "userurb %p, ep%d %s-%s, "
333 "actual_length %u status %d\n",
334 userurb, ep, t, d, length,
335 timeout_or_status);
336 } else {
337 if (when == SUBMIT)
338 dev_info(&udev->dev, "ep%d %s-%s, length %u, "
339 "timeout %d\n",
340 ep, t, d, length, timeout_or_status);
341 else
342 dev_info(&udev->dev, "ep%d %s-%s, actual_length %u, "
343 "status %d\n",
344 ep, t, d, length, timeout_or_status);
345 }
0880aef4
CF
346
347 if (data && data_len > 0) {
348 print_hex_dump(KERN_DEBUG, "data: ", DUMP_PREFIX_NONE, 32, 1,
349 data, data_len, 1);
350 }
e639dd3f
GKH
351}
352
01c6460f
AS
353#define AS_CONTINUATION 1
354#define AS_UNLINK 2
355
356static void cancel_bulk_urbs(struct dev_state *ps, unsigned bulk_addr)
357__releases(ps->lock)
358__acquires(ps->lock)
359{
360 struct async *as;
361
362 /* Mark all the pending URBs that match bulk_addr, up to but not
363 * including the first one without AS_CONTINUATION. If such an
364 * URB is encountered then a new transfer has already started so
365 * the endpoint doesn't need to be disabled; otherwise it does.
366 */
367 list_for_each_entry(as, &ps->async_pending, asynclist) {
368 if (as->bulk_addr == bulk_addr) {
369 if (as->bulk_status != AS_CONTINUATION)
370 goto rescan;
371 as->bulk_status = AS_UNLINK;
372 as->bulk_addr = 0;
373 }
374 }
375 ps->disabled_bulk_eps |= (1 << bulk_addr);
376
377 /* Now carefully unlink all the marked pending URBs */
378 rescan:
379 list_for_each_entry(as, &ps->async_pending, asynclist) {
380 if (as->bulk_status == AS_UNLINK) {
381 as->bulk_status = 0; /* Only once */
382 spin_unlock(&ps->lock); /* Allow completions */
383 usb_unlink_urb(as->urb);
384 spin_lock(&ps->lock);
385 goto rescan;
386 }
387 }
388}
389
7d12e780 390static void async_completed(struct urb *urb)
1da177e4 391{
04e482ff
GKH
392 struct async *as = urb->context;
393 struct dev_state *ps = as->ps;
1da177e4 394 struct siginfo sinfo;
516a1a07
ON
395 struct pid *pid = NULL;
396 uid_t uid = 0;
397 uid_t euid = 0;
398 u32 secid = 0;
399 int signr;
1da177e4 400
04e482ff
GKH
401 spin_lock(&ps->lock);
402 list_move_tail(&as->asynclist, &ps->async_completed);
e015268d 403 as->status = urb->status;
516a1a07
ON
404 signr = as->signr;
405 if (signr) {
1da177e4 406 sinfo.si_signo = as->signr;
e015268d 407 sinfo.si_errno = as->status;
1da177e4
LT
408 sinfo.si_code = SI_ASYNCIO;
409 sinfo.si_addr = as->userurb;
aec01c58 410 pid = get_pid(as->pid);
516a1a07
ON
411 uid = as->uid;
412 euid = as->euid;
413 secid = as->secid;
1da177e4 414 }
e639dd3f 415 snoop(&urb->dev->dev, "urb complete\n");
4c6e8971 416 snoop_urb(urb->dev, as->userurb, urb->pipe, urb->actual_length,
0880aef4
CF
417 as->status, COMPLETE,
418 ((urb->transfer_flags & URB_DIR_MASK) == USB_DIR_OUT) ?
419 NULL : urb->transfer_buffer, urb->actual_length);
01c6460f
AS
420 if (as->status < 0 && as->bulk_addr && as->status != -ECONNRESET &&
421 as->status != -ENOENT)
422 cancel_bulk_urbs(ps, as->bulk_addr);
516a1a07
ON
423 spin_unlock(&ps->lock);
424
aec01c58 425 if (signr) {
516a1a07
ON
426 kill_pid_info_as_uid(sinfo.si_signo, &sinfo, pid, uid,
427 euid, secid);
aec01c58
SH
428 put_pid(pid);
429 }
516a1a07 430
e639dd3f 431 wake_up(&ps->wait);
1da177e4
LT
432}
433
04e482ff 434static void destroy_async(struct dev_state *ps, struct list_head *list)
1da177e4
LT
435{
436 struct async *as;
437 unsigned long flags;
438
439 spin_lock_irqsave(&ps->lock, flags);
440 while (!list_empty(list)) {
441 as = list_entry(list->next, struct async, asynclist);
442 list_del_init(&as->asynclist);
443
444 /* drop the spinlock so the completion handler can run */
445 spin_unlock_irqrestore(&ps->lock, flags);
446 usb_kill_urb(as->urb);
447 spin_lock_irqsave(&ps->lock, flags);
448 }
449 spin_unlock_irqrestore(&ps->lock, flags);
1da177e4
LT
450}
451
04e482ff
GKH
452static void destroy_async_on_interface(struct dev_state *ps,
453 unsigned int ifnum)
1da177e4
LT
454{
455 struct list_head *p, *q, hitlist;
456 unsigned long flags;
457
458 INIT_LIST_HEAD(&hitlist);
459 spin_lock_irqsave(&ps->lock, flags);
460 list_for_each_safe(p, q, &ps->async_pending)
461 if (ifnum == list_entry(p, struct async, asynclist)->ifnum)
462 list_move_tail(p, &hitlist);
463 spin_unlock_irqrestore(&ps->lock, flags);
464 destroy_async(ps, &hitlist);
465}
466
d34d9721 467static void destroy_all_async(struct dev_state *ps)
1da177e4 468{
04e482ff 469 destroy_async(ps, &ps->async_pending);
1da177e4
LT
470}
471
472/*
473 * interface claims are made only at the request of user level code,
474 * which can also release them (explicitly or by closing files).
475 * they're also undone when devices disconnect.
476 */
477
04e482ff
GKH
478static int driver_probe(struct usb_interface *intf,
479 const struct usb_device_id *id)
1da177e4
LT
480{
481 return -ENODEV;
482}
483
484static void driver_disconnect(struct usb_interface *intf)
485{
04e482ff 486 struct dev_state *ps = usb_get_intfdata(intf);
1da177e4
LT
487 unsigned int ifnum = intf->altsetting->desc.bInterfaceNumber;
488
489 if (!ps)
490 return;
491
492 /* NOTE: this relies on usbcore having canceled and completed
493 * all pending I/O requests; 2.6 does that.
494 */
495
496 if (likely(ifnum < 8*sizeof(ps->ifclaimed)))
497 clear_bit(ifnum, &ps->ifclaimed);
498 else
3b6004f3
GKH
499 dev_warn(&intf->dev, "interface number %u out of range\n",
500 ifnum);
1da177e4 501
04e482ff 502 usb_set_intfdata(intf, NULL);
1da177e4
LT
503
504 /* force async requests to complete */
505 destroy_async_on_interface(ps, ifnum);
506}
507
2e2eb83f
AS
508/* The following routines are merely placeholders. There is no way
509 * to inform a user task about suspend or resumes.
510 */
511static int driver_suspend(struct usb_interface *intf, pm_message_t msg)
512{
513 return 0;
514}
515
516static int driver_resume(struct usb_interface *intf)
517{
518 return 0;
519}
520
1da177e4 521struct usb_driver usbfs_driver = {
1da177e4
LT
522 .name = "usbfs",
523 .probe = driver_probe,
524 .disconnect = driver_disconnect,
2e2eb83f
AS
525 .suspend = driver_suspend,
526 .resume = driver_resume,
1da177e4
LT
527};
528
529static int claimintf(struct dev_state *ps, unsigned int ifnum)
530{
531 struct usb_device *dev = ps->dev;
532 struct usb_interface *intf;
533 int err;
534
535 if (ifnum >= 8*sizeof(ps->ifclaimed))
536 return -EINVAL;
537 /* already claimed */
538 if (test_bit(ifnum, &ps->ifclaimed))
539 return 0;
540
1da177e4
LT
541 intf = usb_ifnum_to_if(dev, ifnum);
542 if (!intf)
543 err = -ENOENT;
544 else
545 err = usb_driver_claim_interface(&usbfs_driver, intf, ps);
1da177e4
LT
546 if (err == 0)
547 set_bit(ifnum, &ps->ifclaimed);
548 return err;
549}
550
551static int releaseintf(struct dev_state *ps, unsigned int ifnum)
552{
553 struct usb_device *dev;
554 struct usb_interface *intf;
555 int err;
556
557 err = -EINVAL;
558 if (ifnum >= 8*sizeof(ps->ifclaimed))
559 return err;
560 dev = ps->dev;
1da177e4
LT
561 intf = usb_ifnum_to_if(dev, ifnum);
562 if (!intf)
563 err = -ENOENT;
564 else if (test_and_clear_bit(ifnum, &ps->ifclaimed)) {
565 usb_driver_release_interface(&usbfs_driver, intf);
566 err = 0;
567 }
1da177e4
LT
568 return err;
569}
570
571static int checkintf(struct dev_state *ps, unsigned int ifnum)
572{
573 if (ps->dev->state != USB_STATE_CONFIGURED)
574 return -EHOSTUNREACH;
575 if (ifnum >= 8*sizeof(ps->ifclaimed))
576 return -EINVAL;
577 if (test_bit(ifnum, &ps->ifclaimed))
578 return 0;
579 /* if not yet claimed, claim it for the driver */
04e482ff
GKH
580 dev_warn(&ps->dev->dev, "usbfs: process %d (%s) did not claim "
581 "interface %u before use\n", task_pid_nr(current),
582 current->comm, ifnum);
1da177e4
LT
583 return claimintf(ps, ifnum);
584}
585
586static int findintfep(struct usb_device *dev, unsigned int ep)
587{
588 unsigned int i, j, e;
04e482ff 589 struct usb_interface *intf;
1da177e4
LT
590 struct usb_host_interface *alts;
591 struct usb_endpoint_descriptor *endpt;
592
593 if (ep & ~(USB_DIR_IN|0xf))
594 return -EINVAL;
595 if (!dev->actconfig)
596 return -ESRCH;
597 for (i = 0; i < dev->actconfig->desc.bNumInterfaces; i++) {
598 intf = dev->actconfig->interface[i];
599 for (j = 0; j < intf->num_altsetting; j++) {
04e482ff 600 alts = &intf->altsetting[j];
1da177e4
LT
601 for (e = 0; e < alts->desc.bNumEndpoints; e++) {
602 endpt = &alts->endpoint[e].desc;
603 if (endpt->bEndpointAddress == ep)
604 return alts->desc.bInterfaceNumber;
605 }
606 }
607 }
04e482ff 608 return -ENOENT;
1da177e4
LT
609}
610
04e482ff 611static int check_ctrlrecip(struct dev_state *ps, unsigned int requesttype,
393cbb51 612 unsigned int request, unsigned int index)
1da177e4
LT
613{
614 int ret = 0;
393cbb51 615 struct usb_host_interface *alt_setting;
1da177e4 616
6da9c990
DV
617 if (ps->dev->state != USB_STATE_UNAUTHENTICATED
618 && ps->dev->state != USB_STATE_ADDRESS
24f8b116 619 && ps->dev->state != USB_STATE_CONFIGURED)
1da177e4
LT
620 return -EHOSTUNREACH;
621 if (USB_TYPE_VENDOR == (USB_TYPE_MASK & requesttype))
622 return 0;
623
393cbb51
MD
624 /*
625 * check for the special corner case 'get_device_id' in the printer
626 * class specification, where wIndex is (interface << 8 | altsetting)
627 * instead of just interface
628 */
629 if (requesttype == 0xa1 && request == 0) {
630 alt_setting = usb_find_alt_setting(ps->dev->actconfig,
631 index >> 8, index & 0xff);
632 if (alt_setting
633 && alt_setting->desc.bInterfaceClass == USB_CLASS_PRINTER)
634 index >>= 8;
635 }
636
1da177e4
LT
637 index &= 0xff;
638 switch (requesttype & USB_RECIP_MASK) {
639 case USB_RECIP_ENDPOINT:
04e482ff
GKH
640 ret = findintfep(ps->dev, index);
641 if (ret >= 0)
1da177e4
LT
642 ret = checkintf(ps, ret);
643 break;
644
645 case USB_RECIP_INTERFACE:
646 ret = checkintf(ps, index);
647 break;
648 }
649 return ret;
650}
651
61ad04a8 652static int match_devt(struct device *dev, void *data)
4592bf5a 653{
a80d5ff0 654 return dev->devt == (dev_t) (unsigned long) data;
9f8b17e6 655}
4592bf5a 656
61ad04a8 657static struct usb_device *usbdev_lookup_by_devt(dev_t devt)
9f8b17e6
KS
658{
659 struct device *dev;
660
a80d5ff0
DH
661 dev = bus_find_device(&usb_bus_type, NULL,
662 (void *) (unsigned long) devt, match_devt);
9f8b17e6
KS
663 if (!dev)
664 return NULL;
9f8b17e6
KS
665 return container_of(dev, struct usb_device, dev);
666}
4592bf5a 667
1da177e4
LT
668/*
669 * file operations
670 */
671static int usbdev_open(struct inode *inode, struct file *file)
672{
fbf82fd2 673 struct usb_device *dev = NULL;
1da177e4 674 struct dev_state *ps;
86a264ab 675 const struct cred *cred = current_cred();
1da177e4
LT
676 int ret;
677
1da177e4 678 ret = -ENOMEM;
04e482ff
GKH
679 ps = kmalloc(sizeof(struct dev_state), GFP_KERNEL);
680 if (!ps)
62e299e6 681 goto out_free_ps;
1da177e4 682
01105a24 683 ret = -ENODEV;
61ad04a8 684
62e299e6
AS
685 /* Protect against simultaneous removal or release */
686 mutex_lock(&usbfs_mutex);
687
9f8b17e6 688 /* usbdev device-node */
fbf82fd2 689 if (imajor(inode) == USB_DEVICE_MAJOR)
61ad04a8 690 dev = usbdev_lookup_by_devt(inode->i_rdev);
62e299e6 691
9f8b17e6
KS
692#ifdef CONFIG_USB_DEVICEFS
693 /* procfs file */
d64aac36 694 if (!dev) {
8e18e294 695 dev = inode->i_private;
d64aac36
AS
696 if (dev && dev->usbfs_dentry &&
697 dev->usbfs_dentry->d_inode == inode)
698 usb_get_dev(dev);
699 else
700 dev = NULL;
701 }
9f8b17e6 702#endif
62e299e6
AS
703 mutex_unlock(&usbfs_mutex);
704
705 if (!dev)
706 goto out_free_ps;
707
708 usb_lock_device(dev);
709 if (dev->state == USB_STATE_NOTATTACHED)
710 goto out_unlock_device;
711
94fcda1f 712 ret = usb_autoresume_device(dev);
01d883d4 713 if (ret)
62e299e6 714 goto out_unlock_device;
01d883d4 715
1da177e4
LT
716 ps->dev = dev;
717 ps->file = file;
718 spin_lock_init(&ps->lock);
316547fd 719 INIT_LIST_HEAD(&ps->list);
1da177e4
LT
720 INIT_LIST_HEAD(&ps->async_pending);
721 INIT_LIST_HEAD(&ps->async_completed);
722 init_waitqueue_head(&ps->wait);
723 ps->discsignr = 0;
2425c08b 724 ps->disc_pid = get_pid(task_pid(current));
86a264ab
DH
725 ps->disc_uid = cred->uid;
726 ps->disc_euid = cred->euid;
1da177e4
LT
727 ps->disccontext = NULL;
728 ps->ifclaimed = 0;
7a01955f 729 security_task_getsecid(current, &ps->secid);
527660a8 730 smp_wmb();
1da177e4
LT
731 list_add_tail(&ps->list, &dev->filelist);
732 file->private_data = ps;
62e299e6 733 usb_unlock_device(dev);
2da41d5f
AS
734 snoop(&dev->dev, "opened by process %d: %s\n", task_pid_nr(current),
735 current->comm);
62e299e6
AS
736 return ret;
737
738 out_unlock_device:
739 usb_unlock_device(dev);
740 usb_put_dev(dev);
741 out_free_ps:
742 kfree(ps);
4a2a8a2c 743 return ret;
1da177e4
LT
744}
745
746static int usbdev_release(struct inode *inode, struct file *file)
747{
ec17cf1c 748 struct dev_state *ps = file->private_data;
1da177e4
LT
749 struct usb_device *dev = ps->dev;
750 unsigned int ifnum;
6ff10464 751 struct async *as;
1da177e4
LT
752
753 usb_lock_device(dev);
7cbe5dca 754 usb_hub_release_all_ports(dev, ps);
4a2a8a2c 755
1da177e4 756 list_del_init(&ps->list);
4a2a8a2c 757
1da177e4
LT
758 for (ifnum = 0; ps->ifclaimed && ifnum < 8*sizeof(ps->ifclaimed);
759 ifnum++) {
760 if (test_bit(ifnum, &ps->ifclaimed))
761 releaseintf(ps, ifnum);
762 }
763 destroy_all_async(ps);
94fcda1f 764 usb_autosuspend_device(dev);
1da177e4
LT
765 usb_unlock_device(dev);
766 usb_put_dev(dev);
2425c08b 767 put_pid(ps->disc_pid);
6ff10464
AS
768
769 as = async_getcompleted(ps);
770 while (as) {
771 free_async(as);
772 as = async_getcompleted(ps);
773 }
1da177e4 774 kfree(ps);
4a2a8a2c 775 return 0;
1da177e4
LT
776}
777
778static int proc_control(struct dev_state *ps, void __user *arg)
779{
780 struct usb_device *dev = ps->dev;
781 struct usbdevfs_ctrltransfer ctrl;
782 unsigned int tmo;
783 unsigned char *tbuf;
ff66e3ce 784 unsigned wLength;
4c6e8971 785 int i, pipe, ret;
1da177e4
LT
786
787 if (copy_from_user(&ctrl, arg, sizeof(ctrl)))
788 return -EFAULT;
393cbb51
MD
789 ret = check_ctrlrecip(ps, ctrl.bRequestType, ctrl.bRequest,
790 ctrl.wIndex);
04e482ff 791 if (ret)
1da177e4 792 return ret;
ff66e3ce
AM
793 wLength = ctrl.wLength; /* To suppress 64k PAGE_SIZE warning */
794 if (wLength > PAGE_SIZE)
1da177e4 795 return -EINVAL;
04e482ff
GKH
796 tbuf = (unsigned char *)__get_free_page(GFP_KERNEL);
797 if (!tbuf)
1da177e4
LT
798 return -ENOMEM;
799 tmo = ctrl.timeout;
0880aef4
CF
800 snoop(&dev->dev, "control urb: bRequestType=%02x "
801 "bRequest=%02x wValue=%04x "
802 "wIndex=%04x wLength=%04x\n",
803 ctrl.bRequestType, ctrl.bRequest,
804 __le16_to_cpup(&ctrl.wValue),
805 __le16_to_cpup(&ctrl.wIndex),
806 __le16_to_cpup(&ctrl.wLength));
1da177e4 807 if (ctrl.bRequestType & 0x80) {
04e482ff
GKH
808 if (ctrl.wLength && !access_ok(VERIFY_WRITE, ctrl.data,
809 ctrl.wLength)) {
1da177e4
LT
810 free_page((unsigned long)tbuf);
811 return -EINVAL;
812 }
4c6e8971 813 pipe = usb_rcvctrlpipe(dev, 0);
0880aef4 814 snoop_urb(dev, NULL, pipe, ctrl.wLength, tmo, SUBMIT, NULL, 0);
1da177e4
LT
815
816 usb_unlock_device(dev);
4c6e8971 817 i = usb_control_msg(dev, pipe, ctrl.bRequest,
04e482ff
GKH
818 ctrl.bRequestType, ctrl.wValue, ctrl.wIndex,
819 tbuf, ctrl.wLength, tmo);
1da177e4 820 usb_lock_device(dev);
0880aef4 821 snoop_urb(dev, NULL, pipe, max(i, 0), min(i, 0), COMPLETE,
9d02b426 822 tbuf, max(i, 0));
1da177e4 823 if ((i > 0) && ctrl.wLength) {
fe0410c7 824 if (copy_to_user(ctrl.data, tbuf, i)) {
1da177e4
LT
825 free_page((unsigned long)tbuf);
826 return -EFAULT;
827 }
828 }
829 } else {
830 if (ctrl.wLength) {
831 if (copy_from_user(tbuf, ctrl.data, ctrl.wLength)) {
832 free_page((unsigned long)tbuf);
833 return -EFAULT;
834 }
835 }
4c6e8971 836 pipe = usb_sndctrlpipe(dev, 0);
0880aef4
CF
837 snoop_urb(dev, NULL, pipe, ctrl.wLength, tmo, SUBMIT,
838 tbuf, ctrl.wLength);
4c6e8971 839
1da177e4 840 usb_unlock_device(dev);
04e482ff
GKH
841 i = usb_control_msg(dev, usb_sndctrlpipe(dev, 0), ctrl.bRequest,
842 ctrl.bRequestType, ctrl.wValue, ctrl.wIndex,
843 tbuf, ctrl.wLength, tmo);
1da177e4 844 usb_lock_device(dev);
0880aef4 845 snoop_urb(dev, NULL, pipe, max(i, 0), min(i, 0), COMPLETE, NULL, 0);
1da177e4
LT
846 }
847 free_page((unsigned long)tbuf);
04e482ff 848 if (i < 0 && i != -EPIPE) {
1da177e4
LT
849 dev_printk(KERN_DEBUG, &dev->dev, "usbfs: USBDEVFS_CONTROL "
850 "failed cmd %s rqt %u rq %u len %u ret %d\n",
851 current->comm, ctrl.bRequestType, ctrl.bRequest,
852 ctrl.wLength, i);
853 }
854 return i;
855}
856
857static int proc_bulk(struct dev_state *ps, void __user *arg)
858{
859 struct usb_device *dev = ps->dev;
860 struct usbdevfs_bulktransfer bulk;
861 unsigned int tmo, len1, pipe;
862 int len2;
863 unsigned char *tbuf;
4c6e8971 864 int i, ret;
1da177e4
LT
865
866 if (copy_from_user(&bulk, arg, sizeof(bulk)))
867 return -EFAULT;
04e482ff
GKH
868 ret = findintfep(ps->dev, bulk.ep);
869 if (ret < 0)
1da177e4 870 return ret;
04e482ff
GKH
871 ret = checkintf(ps, ret);
872 if (ret)
1da177e4
LT
873 return ret;
874 if (bulk.ep & USB_DIR_IN)
875 pipe = usb_rcvbulkpipe(dev, bulk.ep & 0x7f);
876 else
877 pipe = usb_sndbulkpipe(dev, bulk.ep & 0x7f);
878 if (!usb_maxpacket(dev, pipe, !(bulk.ep & USB_DIR_IN)))
879 return -EINVAL;
880 len1 = bulk.len;
881 if (len1 > MAX_USBFS_BUFFER_SIZE)
882 return -EINVAL;
883 if (!(tbuf = kmalloc(len1, GFP_KERNEL)))
884 return -ENOMEM;
885 tmo = bulk.timeout;
886 if (bulk.ep & 0x80) {
887 if (len1 && !access_ok(VERIFY_WRITE, bulk.data, len1)) {
888 kfree(tbuf);
889 return -EINVAL;
890 }
0880aef4 891 snoop_urb(dev, NULL, pipe, len1, tmo, SUBMIT, NULL, 0);
4c6e8971 892
1da177e4
LT
893 usb_unlock_device(dev);
894 i = usb_bulk_msg(dev, pipe, tbuf, len1, &len2, tmo);
895 usb_lock_device(dev);
0880aef4 896 snoop_urb(dev, NULL, pipe, len2, i, COMPLETE, tbuf, len2);
4c6e8971 897
1da177e4
LT
898 if (!i && len2) {
899 if (copy_to_user(bulk.data, tbuf, len2)) {
900 kfree(tbuf);
901 return -EFAULT;
902 }
903 }
904 } else {
905 if (len1) {
906 if (copy_from_user(tbuf, bulk.data, len1)) {
907 kfree(tbuf);
908 return -EFAULT;
909 }
910 }
0880aef4 911 snoop_urb(dev, NULL, pipe, len1, tmo, SUBMIT, tbuf, len1);
4c6e8971 912
1da177e4
LT
913 usb_unlock_device(dev);
914 i = usb_bulk_msg(dev, pipe, tbuf, len1, &len2, tmo);
915 usb_lock_device(dev);
0880aef4 916 snoop_urb(dev, NULL, pipe, len2, i, COMPLETE, NULL, 0);
1da177e4
LT
917 }
918 kfree(tbuf);
919 if (i < 0)
920 return i;
921 return len2;
922}
923
924static int proc_resetep(struct dev_state *ps, void __user *arg)
925{
926 unsigned int ep;
927 int ret;
928
929 if (get_user(ep, (unsigned int __user *)arg))
930 return -EFAULT;
04e482ff
GKH
931 ret = findintfep(ps->dev, ep);
932 if (ret < 0)
1da177e4 933 return ret;
04e482ff
GKH
934 ret = checkintf(ps, ret);
935 if (ret)
1da177e4 936 return ret;
3444b26a 937 usb_reset_endpoint(ps->dev, ep);
1da177e4
LT
938 return 0;
939}
940
941static int proc_clearhalt(struct dev_state *ps, void __user *arg)
942{
943 unsigned int ep;
944 int pipe;
945 int ret;
946
947 if (get_user(ep, (unsigned int __user *)arg))
948 return -EFAULT;
04e482ff
GKH
949 ret = findintfep(ps->dev, ep);
950 if (ret < 0)
1da177e4 951 return ret;
04e482ff
GKH
952 ret = checkintf(ps, ret);
953 if (ret)
1da177e4
LT
954 return ret;
955 if (ep & USB_DIR_IN)
04e482ff
GKH
956 pipe = usb_rcvbulkpipe(ps->dev, ep & 0x7f);
957 else
958 pipe = usb_sndbulkpipe(ps->dev, ep & 0x7f);
1da177e4
LT
959
960 return usb_clear_halt(ps->dev, pipe);
961}
1da177e4
LT
962
963static int proc_getdriver(struct dev_state *ps, void __user *arg)
964{
965 struct usbdevfs_getdriver gd;
966 struct usb_interface *intf;
967 int ret;
968
969 if (copy_from_user(&gd, arg, sizeof(gd)))
970 return -EFAULT;
1da177e4
LT
971 intf = usb_ifnum_to_if(ps->dev, gd.interface);
972 if (!intf || !intf->dev.driver)
973 ret = -ENODATA;
974 else {
975 strncpy(gd.driver, intf->dev.driver->name,
976 sizeof(gd.driver));
977 ret = (copy_to_user(arg, &gd, sizeof(gd)) ? -EFAULT : 0);
978 }
1da177e4
LT
979 return ret;
980}
981
982static int proc_connectinfo(struct dev_state *ps, void __user *arg)
983{
886ccd45
VK
984 struct usbdevfs_connectinfo ci = {
985 .devnum = ps->dev->devnum,
986 .slow = ps->dev->speed == USB_SPEED_LOW
987 };
1da177e4 988
1da177e4
LT
989 if (copy_to_user(arg, &ci, sizeof(ci)))
990 return -EFAULT;
991 return 0;
992}
993
994static int proc_resetdevice(struct dev_state *ps)
995{
742120c6 996 return usb_reset_device(ps->dev);
1da177e4
LT
997}
998
999static int proc_setintf(struct dev_state *ps, void __user *arg)
1000{
1001 struct usbdevfs_setinterface setintf;
1002 int ret;
1003
1004 if (copy_from_user(&setintf, arg, sizeof(setintf)))
1005 return -EFAULT;
1006 if ((ret = checkintf(ps, setintf.interface)))
1007 return ret;
1008 return usb_set_interface(ps->dev, setintf.interface,
1009 setintf.altsetting);
1010}
1011
1012static int proc_setconfig(struct dev_state *ps, void __user *arg)
1013{
3f141e2a 1014 int u;
1da177e4 1015 int status = 0;
04e482ff 1016 struct usb_host_config *actconfig;
1da177e4 1017
3f141e2a 1018 if (get_user(u, (int __user *)arg))
1da177e4
LT
1019 return -EFAULT;
1020
04e482ff
GKH
1021 actconfig = ps->dev->actconfig;
1022
1023 /* Don't touch the device if any interfaces are claimed.
1024 * It could interfere with other drivers' operations, and if
1da177e4
LT
1025 * an interface is claimed by usbfs it could easily deadlock.
1026 */
04e482ff
GKH
1027 if (actconfig) {
1028 int i;
1029
1030 for (i = 0; i < actconfig->desc.bNumInterfaces; ++i) {
1031 if (usb_interface_claimed(actconfig->interface[i])) {
1032 dev_warn(&ps->dev->dev,
72ebddb5 1033 "usbfs: interface %d claimed by %s "
1da177e4
LT
1034 "while '%s' sets config #%d\n",
1035 actconfig->interface[i]
1036 ->cur_altsetting
1037 ->desc.bInterfaceNumber,
72ebddb5
DB
1038 actconfig->interface[i]
1039 ->dev.driver->name,
1da177e4 1040 current->comm, u);
04e482ff 1041 status = -EBUSY;
1da177e4 1042 break;
1da177e4 1043 }
04e482ff
GKH
1044 }
1045 }
1da177e4
LT
1046
1047 /* SET_CONFIGURATION is often abused as a "cheap" driver reset,
1048 * so avoid usb_set_configuration()'s kick to sysfs
1049 */
1050 if (status == 0) {
1051 if (actconfig && actconfig->desc.bConfigurationValue == u)
1052 status = usb_reset_configuration(ps->dev);
1053 else
1054 status = usb_set_configuration(ps->dev, u);
1055 }
1056
1057 return status;
1058}
1059
1da177e4 1060static int proc_do_submiturb(struct dev_state *ps, struct usbdevfs_urb *uurb,
04e482ff
GKH
1061 struct usbdevfs_iso_packet_desc __user *iso_frame_desc,
1062 void __user *arg)
1da177e4
LT
1063{
1064 struct usbdevfs_iso_packet_desc *isopkt = NULL;
1065 struct usb_host_endpoint *ep;
1066 struct async *as;
1067 struct usb_ctrlrequest *dr = NULL;
86a264ab 1068 const struct cred *cred = current_cred();
1da177e4 1069 unsigned int u, totlen, isofrmlen;
97b9eb91 1070 int ret, ifnum = -1;
93cf9b90 1071 int is_in;
1da177e4 1072
14722ef4
AS
1073 if (uurb->flags & ~(USBDEVFS_URB_ISO_ASAP |
1074 USBDEVFS_URB_SHORT_NOT_OK |
01c6460f 1075 USBDEVFS_URB_BULK_CONTINUATION |
14722ef4
AS
1076 USBDEVFS_URB_NO_FSBR |
1077 USBDEVFS_URB_ZERO_PACKET |
1078 USBDEVFS_URB_NO_INTERRUPT))
1da177e4 1079 return -EINVAL;
9180135b 1080 if (uurb->buffer_length > 0 && !uurb->buffer)
1da177e4 1081 return -EINVAL;
04e482ff
GKH
1082 if (!(uurb->type == USBDEVFS_URB_TYPE_CONTROL &&
1083 (uurb->endpoint & ~USB_ENDPOINT_DIR_MASK) == 0)) {
1084 ifnum = findintfep(ps->dev, uurb->endpoint);
1085 if (ifnum < 0)
1da177e4 1086 return ifnum;
04e482ff
GKH
1087 ret = checkintf(ps, ifnum);
1088 if (ret)
1da177e4
LT
1089 return ret;
1090 }
93cf9b90
AS
1091 if ((uurb->endpoint & USB_ENDPOINT_DIR_MASK) != 0) {
1092 is_in = 1;
1093 ep = ps->dev->ep_in[uurb->endpoint & USB_ENDPOINT_NUMBER_MASK];
1094 } else {
1095 is_in = 0;
1096 ep = ps->dev->ep_out[uurb->endpoint & USB_ENDPOINT_NUMBER_MASK];
1097 }
1da177e4
LT
1098 if (!ep)
1099 return -ENOENT;
1100 switch(uurb->type) {
1101 case USBDEVFS_URB_TYPE_CONTROL:
93cf9b90 1102 if (!usb_endpoint_xfer_control(&ep->desc))
1da177e4 1103 return -EINVAL;
04e482ff
GKH
1104 /* min 8 byte setup packet,
1105 * max 8 byte setup plus an arbitrary data stage */
1106 if (uurb->buffer_length < 8 ||
1107 uurb->buffer_length > (8 + MAX_USBFS_BUFFER_SIZE))
1da177e4 1108 return -EINVAL;
04e482ff
GKH
1109 dr = kmalloc(sizeof(struct usb_ctrlrequest), GFP_KERNEL);
1110 if (!dr)
1da177e4
LT
1111 return -ENOMEM;
1112 if (copy_from_user(dr, uurb->buffer, 8)) {
1113 kfree(dr);
1114 return -EFAULT;
1115 }
1116 if (uurb->buffer_length < (le16_to_cpup(&dr->wLength) + 8)) {
1117 kfree(dr);
1118 return -EINVAL;
1119 }
393cbb51 1120 ret = check_ctrlrecip(ps, dr->bRequestType, dr->bRequest,
04e482ff
GKH
1121 le16_to_cpup(&dr->wIndex));
1122 if (ret) {
1da177e4
LT
1123 kfree(dr);
1124 return ret;
1125 }
1da177e4
LT
1126 uurb->number_of_packets = 0;
1127 uurb->buffer_length = le16_to_cpup(&dr->wLength);
1128 uurb->buffer += 8;
93cf9b90
AS
1129 if ((dr->bRequestType & USB_DIR_IN) && uurb->buffer_length) {
1130 is_in = 1;
1131 uurb->endpoint |= USB_DIR_IN;
1132 } else {
1133 is_in = 0;
1134 uurb->endpoint &= ~USB_DIR_IN;
1135 }
0880aef4
CF
1136 snoop(&ps->dev->dev, "control urb: bRequestType=%02x "
1137 "bRequest=%02x wValue=%04x "
1138 "wIndex=%04x wLength=%04x\n",
1139 dr->bRequestType, dr->bRequest,
1140 __le16_to_cpup(&dr->wValue),
1141 __le16_to_cpup(&dr->wIndex),
1142 __le16_to_cpup(&dr->wLength));
1da177e4
LT
1143 break;
1144
1145 case USBDEVFS_URB_TYPE_BULK:
93cf9b90 1146 switch (usb_endpoint_type(&ep->desc)) {
1da177e4
LT
1147 case USB_ENDPOINT_XFER_CONTROL:
1148 case USB_ENDPOINT_XFER_ISOC:
1149 return -EINVAL;
f661c6f8
AS
1150 case USB_ENDPOINT_XFER_INT:
1151 /* allow single-shot interrupt transfers */
1152 uurb->type = USBDEVFS_URB_TYPE_INTERRUPT;
1153 goto interrupt_urb;
1da177e4
LT
1154 }
1155 uurb->number_of_packets = 0;
1156 if (uurb->buffer_length > MAX_USBFS_BUFFER_SIZE)
1157 return -EINVAL;
1da177e4
LT
1158 break;
1159
f661c6f8
AS
1160 case USBDEVFS_URB_TYPE_INTERRUPT:
1161 if (!usb_endpoint_xfer_int(&ep->desc))
1162 return -EINVAL;
1163 interrupt_urb:
1164 uurb->number_of_packets = 0;
1165 if (uurb->buffer_length > MAX_USBFS_BUFFER_SIZE)
1166 return -EINVAL;
1167 break;
1168
1da177e4
LT
1169 case USBDEVFS_URB_TYPE_ISO:
1170 /* arbitrary limit */
04e482ff
GKH
1171 if (uurb->number_of_packets < 1 ||
1172 uurb->number_of_packets > 128)
1da177e4 1173 return -EINVAL;
93cf9b90 1174 if (!usb_endpoint_xfer_isoc(&ep->desc))
1da177e4 1175 return -EINVAL;
04e482ff
GKH
1176 isofrmlen = sizeof(struct usbdevfs_iso_packet_desc) *
1177 uurb->number_of_packets;
1da177e4
LT
1178 if (!(isopkt = kmalloc(isofrmlen, GFP_KERNEL)))
1179 return -ENOMEM;
1180 if (copy_from_user(isopkt, iso_frame_desc, isofrmlen)) {
1181 kfree(isopkt);
1182 return -EFAULT;
1183 }
1184 for (totlen = u = 0; u < uurb->number_of_packets; u++) {
04e482ff
GKH
1185 /* arbitrary limit,
1186 * sufficient for USB 2.0 high-bandwidth iso */
3612242e 1187 if (isopkt[u].length > 8192) {
1da177e4
LT
1188 kfree(isopkt);
1189 return -EINVAL;
1190 }
1191 totlen += isopkt[u].length;
1192 }
5971897f
MR
1193 /* 3072 * 64 microframes */
1194 if (totlen > 196608) {
1da177e4
LT
1195 kfree(isopkt);
1196 return -EINVAL;
1197 }
1198 uurb->buffer_length = totlen;
1199 break;
1200
1da177e4
LT
1201 default:
1202 return -EINVAL;
1203 }
9180135b
AS
1204 if (uurb->buffer_length > 0 &&
1205 !access_ok(is_in ? VERIFY_WRITE : VERIFY_READ,
1206 uurb->buffer, uurb->buffer_length)) {
6fd19f4b
JJ
1207 kfree(isopkt);
1208 kfree(dr);
9180135b 1209 return -EFAULT;
1da177e4 1210 }
9180135b
AS
1211 as = alloc_async(uurb->number_of_packets);
1212 if (!as) {
6fd19f4b
JJ
1213 kfree(isopkt);
1214 kfree(dr);
1da177e4
LT
1215 return -ENOMEM;
1216 }
9180135b
AS
1217 if (uurb->buffer_length > 0) {
1218 as->urb->transfer_buffer = kmalloc(uurb->buffer_length,
1219 GFP_KERNEL);
1220 if (!as->urb->transfer_buffer) {
1221 kfree(isopkt);
1222 kfree(dr);
1223 free_async(as);
1224 return -ENOMEM;
1225 }
7152b592
AS
1226 /* Isochronous input data may end up being discontiguous
1227 * if some of the packets are short. Clear the buffer so
1228 * that the gaps don't leak kernel data to userspace.
1229 */
1230 if (is_in && uurb->type == USBDEVFS_URB_TYPE_ISO)
1231 memset(as->urb->transfer_buffer, 0,
1232 uurb->buffer_length);
9180135b 1233 }
04e482ff
GKH
1234 as->urb->dev = ps->dev;
1235 as->urb->pipe = (uurb->type << 30) |
93cf9b90
AS
1236 __create_pipe(ps->dev, uurb->endpoint & 0xf) |
1237 (uurb->endpoint & USB_DIR_IN);
14722ef4
AS
1238
1239 /* This tedious sequence is necessary because the URB_* flags
1240 * are internal to the kernel and subject to change, whereas
1241 * the USBDEVFS_URB_* flags are a user API and must not be changed.
1242 */
1243 u = (is_in ? URB_DIR_IN : URB_DIR_OUT);
1244 if (uurb->flags & USBDEVFS_URB_ISO_ASAP)
1245 u |= URB_ISO_ASAP;
1246 if (uurb->flags & USBDEVFS_URB_SHORT_NOT_OK)
1247 u |= URB_SHORT_NOT_OK;
1248 if (uurb->flags & USBDEVFS_URB_NO_FSBR)
1249 u |= URB_NO_FSBR;
1250 if (uurb->flags & USBDEVFS_URB_ZERO_PACKET)
1251 u |= URB_ZERO_PACKET;
1252 if (uurb->flags & USBDEVFS_URB_NO_INTERRUPT)
1253 u |= URB_NO_INTERRUPT;
1254 as->urb->transfer_flags = u;
1255
1da177e4 1256 as->urb->transfer_buffer_length = uurb->buffer_length;
04e482ff 1257 as->urb->setup_packet = (unsigned char *)dr;
1da177e4
LT
1258 as->urb->start_frame = uurb->start_frame;
1259 as->urb->number_of_packets = uurb->number_of_packets;
97b9eb91
AS
1260 if (uurb->type == USBDEVFS_URB_TYPE_ISO ||
1261 ps->dev->speed == USB_SPEED_HIGH)
1262 as->urb->interval = 1 << min(15, ep->desc.bInterval - 1);
1263 else
1264 as->urb->interval = ep->desc.bInterval;
04e482ff
GKH
1265 as->urb->context = as;
1266 as->urb->complete = async_completed;
1da177e4
LT
1267 for (totlen = u = 0; u < uurb->number_of_packets; u++) {
1268 as->urb->iso_frame_desc[u].offset = totlen;
1269 as->urb->iso_frame_desc[u].length = isopkt[u].length;
1270 totlen += isopkt[u].length;
1271 }
6fd19f4b 1272 kfree(isopkt);
1da177e4 1273 as->ps = ps;
04e482ff 1274 as->userurb = arg;
9180135b 1275 if (is_in && uurb->buffer_length > 0)
1da177e4
LT
1276 as->userbuffer = uurb->buffer;
1277 else
1278 as->userbuffer = NULL;
1279 as->signr = uurb->signr;
1280 as->ifnum = ifnum;
2425c08b 1281 as->pid = get_pid(task_pid(current));
86a264ab
DH
1282 as->uid = cred->uid;
1283 as->euid = cred->euid;
7a01955f 1284 security_task_getsecid(current, &as->secid);
9180135b 1285 if (!is_in && uurb->buffer_length > 0) {
93cf9b90 1286 if (copy_from_user(as->urb->transfer_buffer, uurb->buffer,
9180135b 1287 uurb->buffer_length)) {
1da177e4
LT
1288 free_async(as);
1289 return -EFAULT;
1290 }
1291 }
4c6e8971 1292 snoop_urb(ps->dev, as->userurb, as->urb->pipe,
0880aef4
CF
1293 as->urb->transfer_buffer_length, 0, SUBMIT,
1294 is_in ? NULL : as->urb->transfer_buffer,
1295 uurb->buffer_length);
04e482ff 1296 async_newpending(as);
01c6460f
AS
1297
1298 if (usb_endpoint_xfer_bulk(&ep->desc)) {
1299 spin_lock_irq(&ps->lock);
1300
1301 /* Not exactly the endpoint address; the direction bit is
1302 * shifted to the 0x10 position so that the value will be
1303 * between 0 and 31.
1304 */
1305 as->bulk_addr = usb_endpoint_num(&ep->desc) |
1306 ((ep->desc.bEndpointAddress & USB_ENDPOINT_DIR_MASK)
1307 >> 3);
1308
1309 /* If this bulk URB is the start of a new transfer, re-enable
1310 * the endpoint. Otherwise mark it as a continuation URB.
1311 */
1312 if (uurb->flags & USBDEVFS_URB_BULK_CONTINUATION)
1313 as->bulk_status = AS_CONTINUATION;
1314 else
1315 ps->disabled_bulk_eps &= ~(1 << as->bulk_addr);
1316
1317 /* Don't accept continuation URBs if the endpoint is
1318 * disabled because of an earlier error.
1319 */
1320 if (ps->disabled_bulk_eps & (1 << as->bulk_addr))
1321 ret = -EREMOTEIO;
1322 else
1323 ret = usb_submit_urb(as->urb, GFP_ATOMIC);
1324 spin_unlock_irq(&ps->lock);
1325 } else {
1326 ret = usb_submit_urb(as->urb, GFP_KERNEL);
1327 }
1328
1329 if (ret) {
04e482ff
GKH
1330 dev_printk(KERN_DEBUG, &ps->dev->dev,
1331 "usbfs: usb_submit_urb returned %d\n", ret);
4c6e8971 1332 snoop_urb(ps->dev, as->userurb, as->urb->pipe,
0880aef4 1333 0, ret, COMPLETE, NULL, 0);
04e482ff
GKH
1334 async_removepending(as);
1335 free_async(as);
1336 return ret;
1337 }
1338 return 0;
1da177e4
LT
1339}
1340
1341static int proc_submiturb(struct dev_state *ps, void __user *arg)
1342{
1343 struct usbdevfs_urb uurb;
1344
1345 if (copy_from_user(&uurb, arg, sizeof(uurb)))
1346 return -EFAULT;
1347
04e482ff
GKH
1348 return proc_do_submiturb(ps, &uurb,
1349 (((struct usbdevfs_urb __user *)arg)->iso_frame_desc),
1350 arg);
1da177e4
LT
1351}
1352
1353static int proc_unlinkurb(struct dev_state *ps, void __user *arg)
1354{
1355 struct async *as;
1356
1357 as = async_getpending(ps, arg);
1358 if (!as)
1359 return -EINVAL;
1360 usb_kill_urb(as->urb);
1361 return 0;
1362}
1363
1364static int processcompl(struct async *as, void __user * __user *arg)
1365{
1366 struct urb *urb = as->urb;
1367 struct usbdevfs_urb __user *userurb = as->userurb;
1368 void __user *addr = as->userurb;
1369 unsigned int i;
1370
7152b592
AS
1371 if (as->userbuffer && urb->actual_length) {
1372 if (urb->number_of_packets > 0) /* Isochronous */
1373 i = urb->transfer_buffer_length;
1374 else /* Non-Isoc */
1375 i = urb->actual_length;
1376 if (copy_to_user(as->userbuffer, urb->transfer_buffer, i))
d794a021 1377 goto err_out;
7152b592 1378 }
e015268d 1379 if (put_user(as->status, &userurb->status))
d794a021 1380 goto err_out;
1da177e4 1381 if (put_user(urb->actual_length, &userurb->actual_length))
d794a021 1382 goto err_out;
1da177e4 1383 if (put_user(urb->error_count, &userurb->error_count))
d794a021 1384 goto err_out;
1da177e4 1385
93cf9b90 1386 if (usb_endpoint_xfer_isoc(&urb->ep->desc)) {
668a9541
CL
1387 for (i = 0; i < urb->number_of_packets; i++) {
1388 if (put_user(urb->iso_frame_desc[i].actual_length,
1389 &userurb->iso_frame_desc[i].actual_length))
d794a021 1390 goto err_out;
668a9541
CL
1391 if (put_user(urb->iso_frame_desc[i].status,
1392 &userurb->iso_frame_desc[i].status))
d794a021 1393 goto err_out;
668a9541 1394 }
1da177e4
LT
1395 }
1396
1da177e4
LT
1397 if (put_user(addr, (void __user * __user *)arg))
1398 return -EFAULT;
1399 return 0;
d794a021
ON
1400
1401err_out:
d794a021 1402 return -EFAULT;
1da177e4
LT
1403}
1404
04e482ff 1405static struct async *reap_as(struct dev_state *ps)
1da177e4 1406{
04e482ff 1407 DECLARE_WAITQUEUE(wait, current);
1da177e4
LT
1408 struct async *as = NULL;
1409 struct usb_device *dev = ps->dev;
1410
1411 add_wait_queue(&ps->wait, &wait);
1412 for (;;) {
1413 __set_current_state(TASK_INTERRUPTIBLE);
04e482ff
GKH
1414 as = async_getcompleted(ps);
1415 if (as)
1da177e4
LT
1416 break;
1417 if (signal_pending(current))
1418 break;
1419 usb_unlock_device(dev);
1420 schedule();
1421 usb_lock_device(dev);
1422 }
1423 remove_wait_queue(&ps->wait, &wait);
1424 set_current_state(TASK_RUNNING);
1425 return as;
1426}
1427
1428static int proc_reapurb(struct dev_state *ps, void __user *arg)
1429{
1430 struct async *as = reap_as(ps);
ddeee0b2
LT
1431 if (as) {
1432 int retval = processcompl(as, (void __user * __user *)arg);
1433 free_async(as);
1434 return retval;
1435 }
1da177e4
LT
1436 if (signal_pending(current))
1437 return -EINTR;
1438 return -EIO;
1439}
1440
1441static int proc_reapurbnonblock(struct dev_state *ps, void __user *arg)
1442{
ddeee0b2 1443 int retval;
1da177e4
LT
1444 struct async *as;
1445
ddeee0b2
LT
1446 as = async_getcompleted(ps);
1447 retval = -EAGAIN;
1448 if (as) {
1449 retval = processcompl(as, (void __user * __user *)arg);
1450 free_async(as);
1451 }
1452 return retval;
1da177e4
LT
1453}
1454
1455#ifdef CONFIG_COMPAT
637e8a60
AB
1456static int proc_control_compat(struct dev_state *ps,
1457 struct usbdevfs_ctrltransfer32 __user *p32)
1458{
1459 struct usbdevfs_ctrltransfer __user *p;
1460 __u32 udata;
1461 p = compat_alloc_user_space(sizeof(*p));
1462 if (copy_in_user(p, p32, (sizeof(*p32) - sizeof(compat_caddr_t))) ||
1463 get_user(udata, &p32->data) ||
1464 put_user(compat_ptr(udata), &p->data))
1465 return -EFAULT;
1466 return proc_control(ps, p);
1467}
1468
1469static int proc_bulk_compat(struct dev_state *ps,
1470 struct usbdevfs_bulktransfer32 __user *p32)
1471{
1472 struct usbdevfs_bulktransfer __user *p;
1473 compat_uint_t n;
1474 compat_caddr_t addr;
1475
1476 p = compat_alloc_user_space(sizeof(*p));
1477
1478 if (get_user(n, &p32->ep) || put_user(n, &p->ep) ||
1479 get_user(n, &p32->len) || put_user(n, &p->len) ||
1480 get_user(n, &p32->timeout) || put_user(n, &p->timeout) ||
1481 get_user(addr, &p32->data) || put_user(compat_ptr(addr), &p->data))
1482 return -EFAULT;
1483
1484 return proc_bulk(ps, p);
1485}
1486static int proc_disconnectsignal_compat(struct dev_state *ps, void __user *arg)
1487{
1488 struct usbdevfs_disconnectsignal32 ds;
1489
1490 if (copy_from_user(&ds, arg, sizeof(ds)))
1491 return -EFAULT;
1492 ps->discsignr = ds.signr;
1493 ps->disccontext = compat_ptr(ds.context);
1494 return 0;
1495}
1da177e4
LT
1496
1497static int get_urb32(struct usbdevfs_urb *kurb,
1498 struct usbdevfs_urb32 __user *uurb)
1499{
1500 __u32 uptr;
18753ebc
MB
1501 if (!access_ok(VERIFY_READ, uurb, sizeof(*uurb)) ||
1502 __get_user(kurb->type, &uurb->type) ||
1da177e4
LT
1503 __get_user(kurb->endpoint, &uurb->endpoint) ||
1504 __get_user(kurb->status, &uurb->status) ||
1505 __get_user(kurb->flags, &uurb->flags) ||
1506 __get_user(kurb->buffer_length, &uurb->buffer_length) ||
1507 __get_user(kurb->actual_length, &uurb->actual_length) ||
1508 __get_user(kurb->start_frame, &uurb->start_frame) ||
1509 __get_user(kurb->number_of_packets, &uurb->number_of_packets) ||
1510 __get_user(kurb->error_count, &uurb->error_count) ||
1511 __get_user(kurb->signr, &uurb->signr))
1512 return -EFAULT;
1513
1514 if (__get_user(uptr, &uurb->buffer))
1515 return -EFAULT;
1516 kurb->buffer = compat_ptr(uptr);
ed0c7720 1517 if (__get_user(uptr, &uurb->usercontext))
1da177e4
LT
1518 return -EFAULT;
1519 kurb->usercontext = compat_ptr(uptr);
1520
1521 return 0;
1522}
1523
1524static int proc_submiturb_compat(struct dev_state *ps, void __user *arg)
1525{
1526 struct usbdevfs_urb uurb;
1527
04e482ff 1528 if (get_urb32(&uurb, (struct usbdevfs_urb32 __user *)arg))
1da177e4
LT
1529 return -EFAULT;
1530
04e482ff
GKH
1531 return proc_do_submiturb(ps, &uurb,
1532 ((struct usbdevfs_urb32 __user *)arg)->iso_frame_desc,
1533 arg);
1da177e4
LT
1534}
1535
1536static int processcompl_compat(struct async *as, void __user * __user *arg)
1537{
1538 struct urb *urb = as->urb;
1539 struct usbdevfs_urb32 __user *userurb = as->userurb;
1540 void __user *addr = as->userurb;
1541 unsigned int i;
1542
d4a4683c 1543 if (as->userbuffer && urb->actual_length)
04e482ff 1544 if (copy_to_user(as->userbuffer, urb->transfer_buffer,
d4a4683c 1545 urb->actual_length))
1da177e4 1546 return -EFAULT;
e015268d 1547 if (put_user(as->status, &userurb->status))
1da177e4
LT
1548 return -EFAULT;
1549 if (put_user(urb->actual_length, &userurb->actual_length))
1550 return -EFAULT;
1551 if (put_user(urb->error_count, &userurb->error_count))
1552 return -EFAULT;
1553
93cf9b90 1554 if (usb_endpoint_xfer_isoc(&urb->ep->desc)) {
668a9541
CL
1555 for (i = 0; i < urb->number_of_packets; i++) {
1556 if (put_user(urb->iso_frame_desc[i].actual_length,
1557 &userurb->iso_frame_desc[i].actual_length))
1558 return -EFAULT;
1559 if (put_user(urb->iso_frame_desc[i].status,
1560 &userurb->iso_frame_desc[i].status))
1561 return -EFAULT;
1562 }
1da177e4
LT
1563 }
1564
c714de5d 1565 if (put_user(ptr_to_compat(addr), (u32 __user *)arg))
1da177e4
LT
1566 return -EFAULT;
1567 return 0;
1568}
1569
1570static int proc_reapurb_compat(struct dev_state *ps, void __user *arg)
1571{
1572 struct async *as = reap_as(ps);
ddeee0b2
LT
1573 if (as) {
1574 int retval = processcompl_compat(as, (void __user * __user *)arg);
1575 free_async(as);
1576 return retval;
1577 }
1da177e4
LT
1578 if (signal_pending(current))
1579 return -EINTR;
1580 return -EIO;
1581}
1582
1583static int proc_reapurbnonblock_compat(struct dev_state *ps, void __user *arg)
1584{
ddeee0b2 1585 int retval;
1da177e4
LT
1586 struct async *as;
1587
ddeee0b2
LT
1588 retval = -EAGAIN;
1589 as = async_getcompleted(ps);
1590 if (as) {
1591 retval = processcompl_compat(as, (void __user * __user *)arg);
1592 free_async(as);
1593 }
1594 return retval;
1da177e4
LT
1595}
1596
637e8a60 1597
1da177e4
LT
1598#endif
1599
1600static int proc_disconnectsignal(struct dev_state *ps, void __user *arg)
1601{
1602 struct usbdevfs_disconnectsignal ds;
1603
1604 if (copy_from_user(&ds, arg, sizeof(ds)))
1605 return -EFAULT;
1da177e4
LT
1606 ps->discsignr = ds.signr;
1607 ps->disccontext = ds.context;
1608 return 0;
1609}
1610
1611static int proc_claiminterface(struct dev_state *ps, void __user *arg)
1612{
1613 unsigned int ifnum;
1614
1615 if (get_user(ifnum, (unsigned int __user *)arg))
1616 return -EFAULT;
1617 return claimintf(ps, ifnum);
1618}
1619
1620static int proc_releaseinterface(struct dev_state *ps, void __user *arg)
1621{
1622 unsigned int ifnum;
1623 int ret;
1624
1625 if (get_user(ifnum, (unsigned int __user *)arg))
1626 return -EFAULT;
1627 if ((ret = releaseintf(ps, ifnum)) < 0)
1628 return ret;
1629 destroy_async_on_interface (ps, ifnum);
1630 return 0;
1631}
1632
c36fc889 1633static int proc_ioctl(struct dev_state *ps, struct usbdevfs_ioctl *ctl)
1da177e4 1634{
1da177e4
LT
1635 int size;
1636 void *buf = NULL;
1637 int retval = 0;
1638 struct usb_interface *intf = NULL;
1639 struct usb_driver *driver = NULL;
1da177e4 1640
c36fc889 1641 /* alloc buffer */
04e482ff
GKH
1642 if ((size = _IOC_SIZE(ctl->ioctl_code)) > 0) {
1643 if ((buf = kmalloc(size, GFP_KERNEL)) == NULL)
1da177e4 1644 return -ENOMEM;
c36fc889 1645 if ((_IOC_DIR(ctl->ioctl_code) & _IOC_WRITE)) {
04e482ff 1646 if (copy_from_user(buf, ctl->data, size)) {
6fd19f4b 1647 kfree(buf);
1da177e4
LT
1648 return -EFAULT;
1649 }
1650 } else {
04e482ff 1651 memset(buf, 0, size);
1da177e4
LT
1652 }
1653 }
1654
349710c3 1655 if (!connected(ps)) {
6fd19f4b 1656 kfree(buf);
1da177e4
LT
1657 return -ENODEV;
1658 }
1659
1660 if (ps->dev->state != USB_STATE_CONFIGURED)
1661 retval = -EHOSTUNREACH;
04e482ff
GKH
1662 else if (!(intf = usb_ifnum_to_if(ps->dev, ctl->ifno)))
1663 retval = -EINVAL;
c36fc889 1664 else switch (ctl->ioctl_code) {
1da177e4
LT
1665
1666 /* disconnect kernel driver from interface */
1667 case USBDEVFS_DISCONNECT:
1da177e4
LT
1668 if (intf->dev.driver) {
1669 driver = to_usb_driver(intf->dev.driver);
04e482ff 1670 dev_dbg(&intf->dev, "disconnect by usbfs\n");
1da177e4
LT
1671 usb_driver_release_interface(driver, intf);
1672 } else
1673 retval = -ENODATA;
1da177e4
LT
1674 break;
1675
1676 /* let kernel drivers try to (re)bind to the interface */
1677 case USBDEVFS_CONNECT:
885e9747
AS
1678 if (!intf->dev.driver)
1679 retval = device_attach(&intf->dev);
1680 else
1681 retval = -EBUSY;
1da177e4
LT
1682 break;
1683
1684 /* talk directly to the interface's driver */
1685 default:
1da177e4
LT
1686 if (intf->dev.driver)
1687 driver = to_usb_driver(intf->dev.driver);
c532b29a 1688 if (driver == NULL || driver->unlocked_ioctl == NULL) {
1da177e4
LT
1689 retval = -ENOTTY;
1690 } else {
c532b29a 1691 retval = driver->unlocked_ioctl(intf, ctl->ioctl_code, buf);
1da177e4
LT
1692 if (retval == -ENOIOCTLCMD)
1693 retval = -ENOTTY;
1694 }
1da177e4
LT
1695 }
1696
1697 /* cleanup and return */
1698 if (retval >= 0
04e482ff 1699 && (_IOC_DIR(ctl->ioctl_code) & _IOC_READ) != 0
1da177e4 1700 && size > 0
04e482ff 1701 && copy_to_user(ctl->data, buf, size) != 0)
1da177e4 1702 retval = -EFAULT;
6fd19f4b
JJ
1703
1704 kfree(buf);
1da177e4
LT
1705 return retval;
1706}
1707
c36fc889
PZ
1708static int proc_ioctl_default(struct dev_state *ps, void __user *arg)
1709{
1710 struct usbdevfs_ioctl ctrl;
1711
04e482ff 1712 if (copy_from_user(&ctrl, arg, sizeof(ctrl)))
c36fc889
PZ
1713 return -EFAULT;
1714 return proc_ioctl(ps, &ctrl);
1715}
1716
1717#ifdef CONFIG_COMPAT
777da590 1718static int proc_ioctl_compat(struct dev_state *ps, compat_uptr_t arg)
c36fc889
PZ
1719{
1720 struct usbdevfs_ioctl32 __user *uioc;
1721 struct usbdevfs_ioctl ctrl;
1722 u32 udata;
1723
058120d7 1724 uioc = compat_ptr((long)arg);
18753ebc
MB
1725 if (!access_ok(VERIFY_READ, uioc, sizeof(*uioc)) ||
1726 __get_user(ctrl.ifno, &uioc->ifno) ||
1727 __get_user(ctrl.ioctl_code, &uioc->ioctl_code) ||
c36fc889
PZ
1728 __get_user(udata, &uioc->data))
1729 return -EFAULT;
1730 ctrl.data = compat_ptr(udata);
1731
1732 return proc_ioctl(ps, &ctrl);
1733}
1734#endif
1735
7cbe5dca
AS
1736static int proc_claim_port(struct dev_state *ps, void __user *arg)
1737{
1738 unsigned portnum;
1739 int rc;
1740
1741 if (get_user(portnum, (unsigned __user *) arg))
1742 return -EFAULT;
1743 rc = usb_hub_claim_port(ps->dev, portnum, ps);
1744 if (rc == 0)
1745 snoop(&ps->dev->dev, "port %d claimed by process %d: %s\n",
1746 portnum, task_pid_nr(current), current->comm);
1747 return rc;
1748}
1749
1750static int proc_release_port(struct dev_state *ps, void __user *arg)
1751{
1752 unsigned portnum;
1753
1754 if (get_user(portnum, (unsigned __user *) arg))
1755 return -EFAULT;
1756 return usb_hub_release_port(ps->dev, portnum, ps);
1757}
1758
1da177e4
LT
1759/*
1760 * NOTE: All requests here that have interface numbers as parameters
1761 * are assuming that somehow the configuration has been prevented from
1762 * changing. But there's no mechanism to ensure that...
1763 */
637e8a60
AB
1764static long usbdev_do_ioctl(struct file *file, unsigned int cmd,
1765 void __user *p)
1da177e4 1766{
ec17cf1c 1767 struct dev_state *ps = file->private_data;
637e8a60 1768 struct inode *inode = file->f_path.dentry->d_inode;
1da177e4 1769 struct usb_device *dev = ps->dev;
1da177e4
LT
1770 int ret = -ENOTTY;
1771
1772 if (!(file->f_mode & FMODE_WRITE))
1773 return -EPERM;
01412a21 1774
1da177e4 1775 usb_lock_device(dev);
349710c3 1776 if (!connected(ps)) {
1da177e4
LT
1777 usb_unlock_device(dev);
1778 return -ENODEV;
1779 }
1780
1781 switch (cmd) {
1782 case USBDEVFS_CONTROL:
441b62c1 1783 snoop(&dev->dev, "%s: CONTROL\n", __func__);
1da177e4
LT
1784 ret = proc_control(ps, p);
1785 if (ret >= 0)
1786 inode->i_mtime = CURRENT_TIME;
1787 break;
1788
1789 case USBDEVFS_BULK:
441b62c1 1790 snoop(&dev->dev, "%s: BULK\n", __func__);
1da177e4
LT
1791 ret = proc_bulk(ps, p);
1792 if (ret >= 0)
1793 inode->i_mtime = CURRENT_TIME;
1794 break;
1795
1796 case USBDEVFS_RESETEP:
441b62c1 1797 snoop(&dev->dev, "%s: RESETEP\n", __func__);
1da177e4
LT
1798 ret = proc_resetep(ps, p);
1799 if (ret >= 0)
1800 inode->i_mtime = CURRENT_TIME;
1801 break;
1802
1803 case USBDEVFS_RESET:
441b62c1 1804 snoop(&dev->dev, "%s: RESET\n", __func__);
1da177e4
LT
1805 ret = proc_resetdevice(ps);
1806 break;
1807
1808 case USBDEVFS_CLEAR_HALT:
441b62c1 1809 snoop(&dev->dev, "%s: CLEAR_HALT\n", __func__);
1da177e4
LT
1810 ret = proc_clearhalt(ps, p);
1811 if (ret >= 0)
1812 inode->i_mtime = CURRENT_TIME;
1813 break;
1814
1815 case USBDEVFS_GETDRIVER:
441b62c1 1816 snoop(&dev->dev, "%s: GETDRIVER\n", __func__);
1da177e4
LT
1817 ret = proc_getdriver(ps, p);
1818 break;
1819
1820 case USBDEVFS_CONNECTINFO:
441b62c1 1821 snoop(&dev->dev, "%s: CONNECTINFO\n", __func__);
1da177e4
LT
1822 ret = proc_connectinfo(ps, p);
1823 break;
1824
1825 case USBDEVFS_SETINTERFACE:
441b62c1 1826 snoop(&dev->dev, "%s: SETINTERFACE\n", __func__);
1da177e4
LT
1827 ret = proc_setintf(ps, p);
1828 break;
1829
1830 case USBDEVFS_SETCONFIGURATION:
441b62c1 1831 snoop(&dev->dev, "%s: SETCONFIGURATION\n", __func__);
1da177e4
LT
1832 ret = proc_setconfig(ps, p);
1833 break;
1834
1835 case USBDEVFS_SUBMITURB:
441b62c1 1836 snoop(&dev->dev, "%s: SUBMITURB\n", __func__);
1da177e4
LT
1837 ret = proc_submiturb(ps, p);
1838 if (ret >= 0)
1839 inode->i_mtime = CURRENT_TIME;
1840 break;
1841
1842#ifdef CONFIG_COMPAT
637e8a60
AB
1843 case USBDEVFS_CONTROL32:
1844 snoop(&dev->dev, "%s: CONTROL32\n", __func__);
1845 ret = proc_control_compat(ps, p);
1846 if (ret >= 0)
1847 inode->i_mtime = CURRENT_TIME;
1848 break;
1849
1850 case USBDEVFS_BULK32:
1851 snoop(&dev->dev, "%s: BULK32\n", __func__);
1852 ret = proc_bulk_compat(ps, p);
1853 if (ret >= 0)
1854 inode->i_mtime = CURRENT_TIME;
1855 break;
1856
1857 case USBDEVFS_DISCSIGNAL32:
1858 snoop(&dev->dev, "%s: DISCSIGNAL32\n", __func__);
1859 ret = proc_disconnectsignal_compat(ps, p);
1860 break;
1da177e4
LT
1861
1862 case USBDEVFS_SUBMITURB32:
441b62c1 1863 snoop(&dev->dev, "%s: SUBMITURB32\n", __func__);
1da177e4
LT
1864 ret = proc_submiturb_compat(ps, p);
1865 if (ret >= 0)
1866 inode->i_mtime = CURRENT_TIME;
1867 break;
1868
1869 case USBDEVFS_REAPURB32:
441b62c1 1870 snoop(&dev->dev, "%s: REAPURB32\n", __func__);
1da177e4
LT
1871 ret = proc_reapurb_compat(ps, p);
1872 break;
1873
1874 case USBDEVFS_REAPURBNDELAY32:
4c6e8971 1875 snoop(&dev->dev, "%s: REAPURBNDELAY32\n", __func__);
1da177e4
LT
1876 ret = proc_reapurbnonblock_compat(ps, p);
1877 break;
1878
c36fc889 1879 case USBDEVFS_IOCTL32:
637e8a60 1880 snoop(&dev->dev, "%s: IOCTL32\n", __func__);
c714de5d 1881 ret = proc_ioctl_compat(ps, ptr_to_compat(p));
c36fc889 1882 break;
1da177e4
LT
1883#endif
1884
1885 case USBDEVFS_DISCARDURB:
441b62c1 1886 snoop(&dev->dev, "%s: DISCARDURB\n", __func__);
1da177e4
LT
1887 ret = proc_unlinkurb(ps, p);
1888 break;
1889
1890 case USBDEVFS_REAPURB:
441b62c1 1891 snoop(&dev->dev, "%s: REAPURB\n", __func__);
1da177e4
LT
1892 ret = proc_reapurb(ps, p);
1893 break;
1894
1895 case USBDEVFS_REAPURBNDELAY:
4c6e8971 1896 snoop(&dev->dev, "%s: REAPURBNDELAY\n", __func__);
1da177e4
LT
1897 ret = proc_reapurbnonblock(ps, p);
1898 break;
1899
1900 case USBDEVFS_DISCSIGNAL:
441b62c1 1901 snoop(&dev->dev, "%s: DISCSIGNAL\n", __func__);
1da177e4
LT
1902 ret = proc_disconnectsignal(ps, p);
1903 break;
1904
1905 case USBDEVFS_CLAIMINTERFACE:
441b62c1 1906 snoop(&dev->dev, "%s: CLAIMINTERFACE\n", __func__);
1da177e4
LT
1907 ret = proc_claiminterface(ps, p);
1908 break;
1909
1910 case USBDEVFS_RELEASEINTERFACE:
441b62c1 1911 snoop(&dev->dev, "%s: RELEASEINTERFACE\n", __func__);
1da177e4
LT
1912 ret = proc_releaseinterface(ps, p);
1913 break;
1914
1915 case USBDEVFS_IOCTL:
441b62c1 1916 snoop(&dev->dev, "%s: IOCTL\n", __func__);
c36fc889 1917 ret = proc_ioctl_default(ps, p);
1da177e4 1918 break;
7cbe5dca
AS
1919
1920 case USBDEVFS_CLAIM_PORT:
1921 snoop(&dev->dev, "%s: CLAIM_PORT\n", __func__);
1922 ret = proc_claim_port(ps, p);
1923 break;
1924
1925 case USBDEVFS_RELEASE_PORT:
1926 snoop(&dev->dev, "%s: RELEASE_PORT\n", __func__);
1927 ret = proc_release_port(ps, p);
1928 break;
1da177e4
LT
1929 }
1930 usb_unlock_device(dev);
1931 if (ret >= 0)
1932 inode->i_atime = CURRENT_TIME;
1933 return ret;
1934}
1935
637e8a60
AB
1936static long usbdev_ioctl(struct file *file, unsigned int cmd,
1937 unsigned long arg)
1938{
1939 int ret;
1940
637e8a60 1941 ret = usbdev_do_ioctl(file, cmd, (void __user *)arg);
637e8a60
AB
1942
1943 return ret;
1944}
1945
1946#ifdef CONFIG_COMPAT
1947static long usbdev_compat_ioctl(struct file *file, unsigned int cmd,
1948 unsigned long arg)
1949{
1950 int ret;
1951
637e8a60 1952 ret = usbdev_do_ioctl(file, cmd, compat_ptr(arg));
637e8a60
AB
1953
1954 return ret;
1955}
1956#endif
1957
1da177e4 1958/* No kernel lock - fine */
04e482ff
GKH
1959static unsigned int usbdev_poll(struct file *file,
1960 struct poll_table_struct *wait)
1da177e4 1961{
ec17cf1c
TK
1962 struct dev_state *ps = file->private_data;
1963 unsigned int mask = 0;
1da177e4
LT
1964
1965 poll_wait(file, &ps->wait, wait);
1966 if (file->f_mode & FMODE_WRITE && !list_empty(&ps->async_completed))
1967 mask |= POLLOUT | POLLWRNORM;
349710c3 1968 if (!connected(ps))
1da177e4
LT
1969 mask |= POLLERR | POLLHUP;
1970 return mask;
1971}
1972
9f8b17e6 1973const struct file_operations usbdev_file_operations = {
637e8a60
AB
1974 .owner = THIS_MODULE,
1975 .llseek = usbdev_lseek,
1976 .read = usbdev_read,
1977 .poll = usbdev_poll,
1978 .unlocked_ioctl = usbdev_ioctl,
1979#ifdef CONFIG_COMPAT
1980 .compat_ioctl = usbdev_compat_ioctl,
1981#endif
1982 .open = usbdev_open,
1983 .release = usbdev_release,
1da177e4 1984};
fbf82fd2 1985
501950d8 1986static void usbdev_remove(struct usb_device *udev)
cd9f0375
AS
1987{
1988 struct dev_state *ps;
1989 struct siginfo sinfo;
1990
1991 while (!list_empty(&udev->filelist)) {
1992 ps = list_entry(udev->filelist.next, struct dev_state, list);
1993 destroy_all_async(ps);
1994 wake_up_all(&ps->wait);
1995 list_del_init(&ps->list);
1996 if (ps->discsignr) {
1997 sinfo.si_signo = ps->discsignr;
1998 sinfo.si_errno = EPIPE;
1999 sinfo.si_code = SI_ASYNCIO;
2000 sinfo.si_addr = ps->disccontext;
2001 kill_pid_info_as_uid(ps->discsignr, &sinfo,
2002 ps->disc_pid, ps->disc_uid,
2003 ps->disc_euid, ps->secid);
2004 }
2005 }
2006}
2007
9f8b17e6
KS
2008#ifdef CONFIG_USB_DEVICE_CLASS
2009static struct class *usb_classdev_class;
2010
2011static int usb_classdev_add(struct usb_device *dev)
fbf82fd2 2012{
e04199b2
AS
2013 struct device *cldev;
2014
b0b090e5
GKH
2015 cldev = device_create(usb_classdev_class, &dev->dev, dev->dev.devt,
2016 NULL, "usbdev%d.%d", dev->bus->busnum,
2017 dev->devnum);
e04199b2
AS
2018 if (IS_ERR(cldev))
2019 return PTR_ERR(cldev);
2020 dev->usb_classdev = cldev;
27d39e26 2021 return 0;
fbf82fd2
KS
2022}
2023
9f8b17e6 2024static void usb_classdev_remove(struct usb_device *dev)
fbf82fd2 2025{
e04199b2
AS
2026 if (dev->usb_classdev)
2027 device_unregister(dev->usb_classdev);
fbf82fd2
KS
2028}
2029
501950d8
AS
2030#else
2031#define usb_classdev_add(dev) 0
2032#define usb_classdev_remove(dev) do {} while (0)
2033
2034#endif
2035
2036static int usbdev_notify(struct notifier_block *self,
9f8b17e6 2037 unsigned long action, void *dev)
a7b986b3
GKH
2038{
2039 switch (action) {
2040 case USB_DEVICE_ADD:
9f8b17e6 2041 if (usb_classdev_add(dev))
27d39e26 2042 return NOTIFY_BAD;
a7b986b3
GKH
2043 break;
2044 case USB_DEVICE_REMOVE:
9f8b17e6 2045 usb_classdev_remove(dev);
501950d8 2046 usbdev_remove(dev);
a7b986b3
GKH
2047 break;
2048 }
2049 return NOTIFY_OK;
2050}
2051
2052static struct notifier_block usbdev_nb = {
501950d8 2053 .notifier_call = usbdev_notify,
a7b986b3
GKH
2054};
2055
7e7654a9 2056static struct cdev usb_device_cdev;
fbf82fd2 2057
9f8b17e6 2058int __init usb_devio_init(void)
fbf82fd2
KS
2059{
2060 int retval;
2061
fad21bdf 2062 retval = register_chrdev_region(USB_DEVICE_DEV, USB_DEVICE_MAX,
04e482ff 2063 "usb_device");
fbf82fd2 2064 if (retval) {
69a85942 2065 printk(KERN_ERR "Unable to register minors for usb_device\n");
fbf82fd2
KS
2066 goto out;
2067 }
9f8b17e6 2068 cdev_init(&usb_device_cdev, &usbdev_file_operations);
fad21bdf 2069 retval = cdev_add(&usb_device_cdev, USB_DEVICE_DEV, USB_DEVICE_MAX);
fbf82fd2 2070 if (retval) {
69a85942
GKH
2071 printk(KERN_ERR "Unable to get usb_device major %d\n",
2072 USB_DEVICE_MAJOR);
a7b986b3 2073 goto error_cdev;
fbf82fd2 2074 }
9f8b17e6
KS
2075#ifdef CONFIG_USB_DEVICE_CLASS
2076 usb_classdev_class = class_create(THIS_MODULE, "usb_device");
2077 if (IS_ERR(usb_classdev_class)) {
69a85942 2078 printk(KERN_ERR "Unable to register usb_device class\n");
9f8b17e6
KS
2079 retval = PTR_ERR(usb_classdev_class);
2080 cdev_del(&usb_device_cdev);
2081 usb_classdev_class = NULL;
2082 goto out;
fbf82fd2 2083 }
e105b8bf
DW
2084 /* devices of this class shadow the major:minor of their parent
2085 * device, so clear ->dev_kobj to prevent adding duplicate entries
2086 * to /sys/dev
2087 */
2088 usb_classdev_class->dev_kobj = NULL;
9f8b17e6 2089#endif
501950d8 2090 usb_register_notify(&usbdev_nb);
fbf82fd2
KS
2091out:
2092 return retval;
a7b986b3 2093
a7b986b3
GKH
2094error_cdev:
2095 unregister_chrdev_region(USB_DEVICE_DEV, USB_DEVICE_MAX);
2096 goto out;
fbf82fd2
KS
2097}
2098
9f8b17e6 2099void usb_devio_cleanup(void)
fbf82fd2 2100{
a7b986b3 2101 usb_unregister_notify(&usbdev_nb);
501950d8 2102#ifdef CONFIG_USB_DEVICE_CLASS
9f8b17e6
KS
2103 class_destroy(usb_classdev_class);
2104#endif
fbf82fd2 2105 cdev_del(&usb_device_cdev);
fad21bdf 2106 unregister_chrdev_region(USB_DEVICE_DEV, USB_DEVICE_MAX);
fbf82fd2 2107}
This page took 0.941637 seconds and 5 git commands to generate.