[PATCH] USB: vicam.c: fix a NULL pointer dereference
[deliverable/linux.git] / drivers / usb / core / devio.c
CommitLineData
1da177e4
LT
1/*****************************************************************************/
2
3/*
4 * devio.c -- User space communication with USB devices.
5 *
6 * Copyright (C) 1999-2000 Thomas Sailer (sailer@ife.ee.ethz.ch)
7 *
8 * This program is free software; you can redistribute it and/or modify
9 * it under the terms of the GNU General Public License as published by
10 * the Free Software Foundation; either version 2 of the License, or
11 * (at your option) any later version.
12 *
13 * This program is distributed in the hope that it will be useful,
14 * but WITHOUT ANY WARRANTY; without even the implied warranty of
15 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
16 * GNU General Public License for more details.
17 *
18 * You should have received a copy of the GNU General Public License
19 * along with this program; if not, write to the Free Software
20 * Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA.
21 *
22 * $Id: devio.c,v 1.7 2000/02/01 17:28:48 fliegl Exp $
23 *
24 * This file implements the usbfs/x/y files, where
25 * x is the bus number and y the device number.
26 *
27 * It allows user space programs/"drivers" to communicate directly
28 * with USB devices without intervening kernel driver.
29 *
30 * Revision history
31 * 22.12.1999 0.1 Initial release (split from proc_usb.c)
32 * 04.01.2000 0.2 Turned into its own filesystem
46113830
HW
33 * 30.09.2005 0.3 Fix user-triggerable oops in async URB delivery
34 * (CAN-2005-3055)
1da177e4
LT
35 */
36
37/*****************************************************************************/
38
39#include <linux/fs.h>
40#include <linux/mm.h>
41#include <linux/slab.h>
42#include <linux/smp_lock.h>
43#include <linux/signal.h>
44#include <linux/poll.h>
45#include <linux/module.h>
46#include <linux/usb.h>
47#include <linux/usbdevice_fs.h>
fbf82fd2 48#include <linux/cdev.h>
a7b986b3 49#include <linux/notifier.h>
1da177e4
LT
50#include <asm/uaccess.h>
51#include <asm/byteorder.h>
52#include <linux/moduleparam.h>
53
54#include "hcd.h" /* for usbcore internals */
55#include "usb.h"
56
fbf82fd2
KS
57#define USB_MAXBUS 64
58#define USB_DEVICE_MAX USB_MAXBUS * 128
59static struct class *usb_device_class;
60
1da177e4
LT
61struct async {
62 struct list_head asynclist;
63 struct dev_state *ps;
46113830
HW
64 pid_t pid;
65 uid_t uid, euid;
1da177e4
LT
66 unsigned int signr;
67 unsigned int ifnum;
68 void __user *userbuffer;
69 void __user *userurb;
70 struct urb *urb;
71};
72
73static int usbfs_snoop = 0;
74module_param (usbfs_snoop, bool, S_IRUGO | S_IWUSR);
75MODULE_PARM_DESC (usbfs_snoop, "true to log all usbfs traffic");
76
77#define snoop(dev, format, arg...) \
78 do { \
79 if (usbfs_snoop) \
80 dev_info( dev , format , ## arg); \
81 } while (0)
82
fad21bdf
AS
83#define USB_DEVICE_DEV MKDEV(USB_DEVICE_MAJOR, 0)
84
1da177e4
LT
85
86#define MAX_USBFS_BUFFER_SIZE 16384
87
88static inline int connected (struct usb_device *dev)
89{
90 return dev->state != USB_STATE_NOTATTACHED;
91}
92
93static loff_t usbdev_lseek(struct file *file, loff_t offset, int orig)
94{
95 loff_t ret;
96
97 lock_kernel();
98
99 switch (orig) {
100 case 0:
101 file->f_pos = offset;
102 ret = file->f_pos;
103 break;
104 case 1:
105 file->f_pos += offset;
106 ret = file->f_pos;
107 break;
108 case 2:
109 default:
110 ret = -EINVAL;
111 }
112
113 unlock_kernel();
114 return ret;
115}
116
117static ssize_t usbdev_read(struct file *file, char __user *buf, size_t nbytes, loff_t *ppos)
118{
119 struct dev_state *ps = (struct dev_state *)file->private_data;
120 struct usb_device *dev = ps->dev;
121 ssize_t ret = 0;
122 unsigned len;
123 loff_t pos;
124 int i;
125
126 pos = *ppos;
127 usb_lock_device(dev);
128 if (!connected(dev)) {
129 ret = -ENODEV;
130 goto err;
131 } else if (pos < 0) {
132 ret = -EINVAL;
133 goto err;
134 }
135
136 if (pos < sizeof(struct usb_device_descriptor)) {
8781ba0a
ON
137 struct usb_device_descriptor temp_desc ; /* 18 bytes - fits on the stack */
138
139 memcpy(&temp_desc, &dev->descriptor, sizeof(dev->descriptor));
9fcd5c32
AM
140 le16_to_cpus(&temp_desc.bcdUSB);
141 le16_to_cpus(&temp_desc.idVendor);
142 le16_to_cpus(&temp_desc.idProduct);
143 le16_to_cpus(&temp_desc.bcdDevice);
1da177e4
LT
144
145 len = sizeof(struct usb_device_descriptor) - pos;
146 if (len > nbytes)
147 len = nbytes;
8781ba0a 148 if (copy_to_user(buf, ((char *)&temp_desc) + pos, len)) {
1da177e4
LT
149 ret = -EFAULT;
150 goto err;
151 }
1da177e4
LT
152
153 *ppos += len;
154 buf += len;
155 nbytes -= len;
156 ret += len;
157 }
158
159 pos = sizeof(struct usb_device_descriptor);
160 for (i = 0; nbytes && i < dev->descriptor.bNumConfigurations; i++) {
161 struct usb_config_descriptor *config =
162 (struct usb_config_descriptor *)dev->rawdescriptors[i];
163 unsigned int length = le16_to_cpu(config->wTotalLength);
164
165 if (*ppos < pos + length) {
166
167 /* The descriptor may claim to be longer than it
168 * really is. Here is the actual allocated length. */
169 unsigned alloclen =
170 le16_to_cpu(dev->config[i].desc.wTotalLength);
171
172 len = length - (*ppos - pos);
173 if (len > nbytes)
174 len = nbytes;
175
176 /* Simply don't write (skip over) unallocated parts */
177 if (alloclen > (*ppos - pos)) {
178 alloclen -= (*ppos - pos);
179 if (copy_to_user(buf,
180 dev->rawdescriptors[i] + (*ppos - pos),
181 min(len, alloclen))) {
182 ret = -EFAULT;
183 goto err;
184 }
185 }
186
187 *ppos += len;
188 buf += len;
189 nbytes -= len;
190 ret += len;
191 }
192
193 pos += length;
194 }
195
196err:
197 usb_unlock_device(dev);
198 return ret;
199}
200
201/*
202 * async list handling
203 */
204
205static struct async *alloc_async(unsigned int numisoframes)
206{
207 unsigned int assize = sizeof(struct async) + numisoframes * sizeof(struct usb_iso_packet_descriptor);
0a1ef3b5
AS
208 struct async *as = kzalloc(assize, GFP_KERNEL);
209
1da177e4
LT
210 if (!as)
211 return NULL;
1da177e4
LT
212 as->urb = usb_alloc_urb(numisoframes, GFP_KERNEL);
213 if (!as->urb) {
214 kfree(as);
215 return NULL;
216 }
217 return as;
218}
219
220static void free_async(struct async *as)
221{
6fd19f4b
JJ
222 kfree(as->urb->transfer_buffer);
223 kfree(as->urb->setup_packet);
1da177e4 224 usb_free_urb(as->urb);
6fd19f4b 225 kfree(as);
1da177e4
LT
226}
227
228static inline void async_newpending(struct async *as)
229{
230 struct dev_state *ps = as->ps;
231 unsigned long flags;
232
233 spin_lock_irqsave(&ps->lock, flags);
234 list_add_tail(&as->asynclist, &ps->async_pending);
235 spin_unlock_irqrestore(&ps->lock, flags);
236}
237
238static inline void async_removepending(struct async *as)
239{
240 struct dev_state *ps = as->ps;
241 unsigned long flags;
242
243 spin_lock_irqsave(&ps->lock, flags);
244 list_del_init(&as->asynclist);
245 spin_unlock_irqrestore(&ps->lock, flags);
246}
247
248static inline struct async *async_getcompleted(struct dev_state *ps)
249{
250 unsigned long flags;
251 struct async *as = NULL;
252
253 spin_lock_irqsave(&ps->lock, flags);
254 if (!list_empty(&ps->async_completed)) {
255 as = list_entry(ps->async_completed.next, struct async, asynclist);
256 list_del_init(&as->asynclist);
257 }
258 spin_unlock_irqrestore(&ps->lock, flags);
259 return as;
260}
261
262static inline struct async *async_getpending(struct dev_state *ps, void __user *userurb)
263{
264 unsigned long flags;
265 struct async *as;
266
267 spin_lock_irqsave(&ps->lock, flags);
268 list_for_each_entry(as, &ps->async_pending, asynclist)
269 if (as->userurb == userurb) {
270 list_del_init(&as->asynclist);
271 spin_unlock_irqrestore(&ps->lock, flags);
272 return as;
273 }
274 spin_unlock_irqrestore(&ps->lock, flags);
275 return NULL;
276}
277
e639dd3f
GKH
278static void snoop_urb(struct urb *urb, void __user *userurb)
279{
280 int j;
281 unsigned char *data = urb->transfer_buffer;
282
283 if (!usbfs_snoop)
284 return;
285
286 if (urb->pipe & USB_DIR_IN)
287 dev_info(&urb->dev->dev, "direction=IN\n");
288 else
289 dev_info(&urb->dev->dev, "direction=OUT\n");
290 dev_info(&urb->dev->dev, "userurb=%p\n", userurb);
291 dev_info(&urb->dev->dev, "transfer_buffer_length=%d\n",
292 urb->transfer_buffer_length);
293 dev_info(&urb->dev->dev, "actual_length=%d\n", urb->actual_length);
294 dev_info(&urb->dev->dev, "data: ");
295 for (j = 0; j < urb->transfer_buffer_length; ++j)
296 printk ("%02x ", data[j]);
297 printk("\n");
298}
299
1da177e4
LT
300static void async_completed(struct urb *urb, struct pt_regs *regs)
301{
302 struct async *as = (struct async *)urb->context;
303 struct dev_state *ps = as->ps;
304 struct siginfo sinfo;
305
306 spin_lock(&ps->lock);
307 list_move_tail(&as->asynclist, &ps->async_completed);
308 spin_unlock(&ps->lock);
309 if (as->signr) {
310 sinfo.si_signo = as->signr;
311 sinfo.si_errno = as->urb->status;
312 sinfo.si_code = SI_ASYNCIO;
313 sinfo.si_addr = as->userurb;
46113830
HW
314 kill_proc_info_as_uid(as->signr, &sinfo, as->pid, as->uid,
315 as->euid);
1da177e4 316 }
e639dd3f
GKH
317 snoop(&urb->dev->dev, "urb complete\n");
318 snoop_urb(urb, as->userurb);
319 wake_up(&ps->wait);
1da177e4
LT
320}
321
322static void destroy_async (struct dev_state *ps, struct list_head *list)
323{
324 struct async *as;
325 unsigned long flags;
326
327 spin_lock_irqsave(&ps->lock, flags);
328 while (!list_empty(list)) {
329 as = list_entry(list->next, struct async, asynclist);
330 list_del_init(&as->asynclist);
331
332 /* drop the spinlock so the completion handler can run */
333 spin_unlock_irqrestore(&ps->lock, flags);
334 usb_kill_urb(as->urb);
335 spin_lock_irqsave(&ps->lock, flags);
336 }
337 spin_unlock_irqrestore(&ps->lock, flags);
338 as = async_getcompleted(ps);
339 while (as) {
340 free_async(as);
341 as = async_getcompleted(ps);
342 }
343}
344
345static void destroy_async_on_interface (struct dev_state *ps, unsigned int ifnum)
346{
347 struct list_head *p, *q, hitlist;
348 unsigned long flags;
349
350 INIT_LIST_HEAD(&hitlist);
351 spin_lock_irqsave(&ps->lock, flags);
352 list_for_each_safe(p, q, &ps->async_pending)
353 if (ifnum == list_entry(p, struct async, asynclist)->ifnum)
354 list_move_tail(p, &hitlist);
355 spin_unlock_irqrestore(&ps->lock, flags);
356 destroy_async(ps, &hitlist);
357}
358
359static inline void destroy_all_async(struct dev_state *ps)
360{
361 destroy_async(ps, &ps->async_pending);
362}
363
364/*
365 * interface claims are made only at the request of user level code,
366 * which can also release them (explicitly or by closing files).
367 * they're also undone when devices disconnect.
368 */
369
370static int driver_probe (struct usb_interface *intf,
371 const struct usb_device_id *id)
372{
373 return -ENODEV;
374}
375
376static void driver_disconnect(struct usb_interface *intf)
377{
378 struct dev_state *ps = usb_get_intfdata (intf);
379 unsigned int ifnum = intf->altsetting->desc.bInterfaceNumber;
380
381 if (!ps)
382 return;
383
384 /* NOTE: this relies on usbcore having canceled and completed
385 * all pending I/O requests; 2.6 does that.
386 */
387
388 if (likely(ifnum < 8*sizeof(ps->ifclaimed)))
389 clear_bit(ifnum, &ps->ifclaimed);
390 else
391 warn("interface number %u out of range", ifnum);
392
393 usb_set_intfdata (intf, NULL);
394
395 /* force async requests to complete */
396 destroy_async_on_interface(ps, ifnum);
397}
398
399struct usb_driver usbfs_driver = {
1da177e4
LT
400 .name = "usbfs",
401 .probe = driver_probe,
402 .disconnect = driver_disconnect,
403};
404
405static int claimintf(struct dev_state *ps, unsigned int ifnum)
406{
407 struct usb_device *dev = ps->dev;
408 struct usb_interface *intf;
409 int err;
410
411 if (ifnum >= 8*sizeof(ps->ifclaimed))
412 return -EINVAL;
413 /* already claimed */
414 if (test_bit(ifnum, &ps->ifclaimed))
415 return 0;
416
417 /* lock against other changes to driver bindings */
418 down_write(&usb_bus_type.subsys.rwsem);
419 intf = usb_ifnum_to_if(dev, ifnum);
420 if (!intf)
421 err = -ENOENT;
422 else
423 err = usb_driver_claim_interface(&usbfs_driver, intf, ps);
424 up_write(&usb_bus_type.subsys.rwsem);
425 if (err == 0)
426 set_bit(ifnum, &ps->ifclaimed);
427 return err;
428}
429
430static int releaseintf(struct dev_state *ps, unsigned int ifnum)
431{
432 struct usb_device *dev;
433 struct usb_interface *intf;
434 int err;
435
436 err = -EINVAL;
437 if (ifnum >= 8*sizeof(ps->ifclaimed))
438 return err;
439 dev = ps->dev;
440 /* lock against other changes to driver bindings */
441 down_write(&usb_bus_type.subsys.rwsem);
442 intf = usb_ifnum_to_if(dev, ifnum);
443 if (!intf)
444 err = -ENOENT;
445 else if (test_and_clear_bit(ifnum, &ps->ifclaimed)) {
446 usb_driver_release_interface(&usbfs_driver, intf);
447 err = 0;
448 }
449 up_write(&usb_bus_type.subsys.rwsem);
450 return err;
451}
452
453static int checkintf(struct dev_state *ps, unsigned int ifnum)
454{
455 if (ps->dev->state != USB_STATE_CONFIGURED)
456 return -EHOSTUNREACH;
457 if (ifnum >= 8*sizeof(ps->ifclaimed))
458 return -EINVAL;
459 if (test_bit(ifnum, &ps->ifclaimed))
460 return 0;
461 /* if not yet claimed, claim it for the driver */
462 dev_warn(&ps->dev->dev, "usbfs: process %d (%s) did not claim interface %u before use\n",
463 current->pid, current->comm, ifnum);
464 return claimintf(ps, ifnum);
465}
466
467static int findintfep(struct usb_device *dev, unsigned int ep)
468{
469 unsigned int i, j, e;
470 struct usb_interface *intf;
471 struct usb_host_interface *alts;
472 struct usb_endpoint_descriptor *endpt;
473
474 if (ep & ~(USB_DIR_IN|0xf))
475 return -EINVAL;
476 if (!dev->actconfig)
477 return -ESRCH;
478 for (i = 0; i < dev->actconfig->desc.bNumInterfaces; i++) {
479 intf = dev->actconfig->interface[i];
480 for (j = 0; j < intf->num_altsetting; j++) {
481 alts = &intf->altsetting[j];
482 for (e = 0; e < alts->desc.bNumEndpoints; e++) {
483 endpt = &alts->endpoint[e].desc;
484 if (endpt->bEndpointAddress == ep)
485 return alts->desc.bInterfaceNumber;
486 }
487 }
488 }
489 return -ENOENT;
490}
491
492static int check_ctrlrecip(struct dev_state *ps, unsigned int requesttype, unsigned int index)
493{
494 int ret = 0;
495
496 if (ps->dev->state != USB_STATE_CONFIGURED)
497 return -EHOSTUNREACH;
498 if (USB_TYPE_VENDOR == (USB_TYPE_MASK & requesttype))
499 return 0;
500
501 index &= 0xff;
502 switch (requesttype & USB_RECIP_MASK) {
503 case USB_RECIP_ENDPOINT:
504 if ((ret = findintfep(ps->dev, index)) >= 0)
505 ret = checkintf(ps, ret);
506 break;
507
508 case USB_RECIP_INTERFACE:
509 ret = checkintf(ps, index);
510 break;
511 }
512 return ret;
513}
514
4592bf5a
GKH
515static struct usb_device *usbdev_lookup_minor(int minor)
516{
517 struct class_device *class_dev;
518 struct usb_device *dev = NULL;
519
520 down(&usb_device_class->sem);
521 list_for_each_entry(class_dev, &usb_device_class->children, node) {
522 if (class_dev->devt == MKDEV(USB_DEVICE_MAJOR, minor)) {
523 dev = class_dev->class_data;
524 break;
525 }
526 }
527 up(&usb_device_class->sem);
528
529 return dev;
530};
531
1da177e4
LT
532/*
533 * file operations
534 */
535static int usbdev_open(struct inode *inode, struct file *file)
536{
fbf82fd2 537 struct usb_device *dev = NULL;
1da177e4
LT
538 struct dev_state *ps;
539 int ret;
540
541 /*
542 * no locking necessary here, as chrdev_open has the kernel lock
543 * (still acquire the kernel lock for safety)
544 */
545 ret = -ENOMEM;
546 if (!(ps = kmalloc(sizeof(struct dev_state), GFP_KERNEL)))
547 goto out_nolock;
548
549 lock_kernel();
550 ret = -ENOENT;
fbf82fd2
KS
551 /* check if we are called from a real node or usbfs */
552 if (imajor(inode) == USB_DEVICE_MAJOR)
553 dev = usbdev_lookup_minor(iminor(inode));
554 if (!dev)
555 dev = inode->u.generic_ip;
1da177e4
LT
556 if (!dev) {
557 kfree(ps);
558 goto out;
559 }
fbf82fd2 560 usb_get_dev(dev);
1da177e4
LT
561 ret = 0;
562 ps->dev = dev;
563 ps->file = file;
564 spin_lock_init(&ps->lock);
565 INIT_LIST_HEAD(&ps->async_pending);
566 INIT_LIST_HEAD(&ps->async_completed);
567 init_waitqueue_head(&ps->wait);
568 ps->discsignr = 0;
d7dd8a72
LT
569 ps->disc_pid = current->pid;
570 ps->disc_uid = current->uid;
571 ps->disc_euid = current->euid;
1da177e4
LT
572 ps->disccontext = NULL;
573 ps->ifclaimed = 0;
574 wmb();
575 list_add_tail(&ps->list, &dev->filelist);
576 file->private_data = ps;
577 out:
578 unlock_kernel();
579 out_nolock:
580 return ret;
581}
582
583static int usbdev_release(struct inode *inode, struct file *file)
584{
585 struct dev_state *ps = (struct dev_state *)file->private_data;
586 struct usb_device *dev = ps->dev;
587 unsigned int ifnum;
588
589 usb_lock_device(dev);
590 list_del_init(&ps->list);
591 for (ifnum = 0; ps->ifclaimed && ifnum < 8*sizeof(ps->ifclaimed);
592 ifnum++) {
593 if (test_bit(ifnum, &ps->ifclaimed))
594 releaseintf(ps, ifnum);
595 }
596 destroy_all_async(ps);
597 usb_unlock_device(dev);
598 usb_put_dev(dev);
599 ps->dev = NULL;
600 kfree(ps);
601 return 0;
602}
603
604static int proc_control(struct dev_state *ps, void __user *arg)
605{
606 struct usb_device *dev = ps->dev;
607 struct usbdevfs_ctrltransfer ctrl;
608 unsigned int tmo;
609 unsigned char *tbuf;
610 int i, j, ret;
611
612 if (copy_from_user(&ctrl, arg, sizeof(ctrl)))
613 return -EFAULT;
614 if ((ret = check_ctrlrecip(ps, ctrl.bRequestType, ctrl.wIndex)))
615 return ret;
616 if (ctrl.wLength > PAGE_SIZE)
617 return -EINVAL;
618 if (!(tbuf = (unsigned char *)__get_free_page(GFP_KERNEL)))
619 return -ENOMEM;
620 tmo = ctrl.timeout;
621 if (ctrl.bRequestType & 0x80) {
622 if (ctrl.wLength && !access_ok(VERIFY_WRITE, ctrl.data, ctrl.wLength)) {
623 free_page((unsigned long)tbuf);
624 return -EINVAL;
625 }
fe0410c7
AS
626 snoop(&dev->dev, "control read: bRequest=%02x "
627 "bRrequestType=%02x wValue=%04x "
628 "wIndex=%04x wLength=%04x\n",
629 ctrl.bRequest, ctrl.bRequestType, ctrl.wValue,
630 ctrl.wIndex, ctrl.wLength);
1da177e4
LT
631
632 usb_unlock_device(dev);
633 i = usb_control_msg(dev, usb_rcvctrlpipe(dev, 0), ctrl.bRequest, ctrl.bRequestType,
634 ctrl.wValue, ctrl.wIndex, tbuf, ctrl.wLength, tmo);
635 usb_lock_device(dev);
636 if ((i > 0) && ctrl.wLength) {
637 if (usbfs_snoop) {
638 dev_info(&dev->dev, "control read: data ");
fe0410c7 639 for (j = 0; j < i; ++j)
e639dd3f 640 printk("%02x ", (unsigned char)(tbuf)[j]);
1da177e4
LT
641 printk("\n");
642 }
fe0410c7 643 if (copy_to_user(ctrl.data, tbuf, i)) {
1da177e4
LT
644 free_page((unsigned long)tbuf);
645 return -EFAULT;
646 }
647 }
648 } else {
649 if (ctrl.wLength) {
650 if (copy_from_user(tbuf, ctrl.data, ctrl.wLength)) {
651 free_page((unsigned long)tbuf);
652 return -EFAULT;
653 }
654 }
fe0410c7
AS
655 snoop(&dev->dev, "control write: bRequest=%02x "
656 "bRrequestType=%02x wValue=%04x "
657 "wIndex=%04x wLength=%04x\n",
658 ctrl.bRequest, ctrl.bRequestType, ctrl.wValue,
659 ctrl.wIndex, ctrl.wLength);
1da177e4
LT
660 if (usbfs_snoop) {
661 dev_info(&dev->dev, "control write: data: ");
662 for (j = 0; j < ctrl.wLength; ++j)
e639dd3f 663 printk("%02x ", (unsigned char)(tbuf)[j]);
1da177e4
LT
664 printk("\n");
665 }
666 usb_unlock_device(dev);
667 i = usb_control_msg(dev, usb_sndctrlpipe(dev, 0), ctrl.bRequest, ctrl.bRequestType,
668 ctrl.wValue, ctrl.wIndex, tbuf, ctrl.wLength, tmo);
669 usb_lock_device(dev);
670 }
671 free_page((unsigned long)tbuf);
672 if (i<0 && i != -EPIPE) {
673 dev_printk(KERN_DEBUG, &dev->dev, "usbfs: USBDEVFS_CONTROL "
674 "failed cmd %s rqt %u rq %u len %u ret %d\n",
675 current->comm, ctrl.bRequestType, ctrl.bRequest,
676 ctrl.wLength, i);
677 }
678 return i;
679}
680
681static int proc_bulk(struct dev_state *ps, void __user *arg)
682{
683 struct usb_device *dev = ps->dev;
684 struct usbdevfs_bulktransfer bulk;
685 unsigned int tmo, len1, pipe;
686 int len2;
687 unsigned char *tbuf;
e639dd3f 688 int i, j, ret;
1da177e4
LT
689
690 if (copy_from_user(&bulk, arg, sizeof(bulk)))
691 return -EFAULT;
692 if ((ret = findintfep(ps->dev, bulk.ep)) < 0)
693 return ret;
694 if ((ret = checkintf(ps, ret)))
695 return ret;
696 if (bulk.ep & USB_DIR_IN)
697 pipe = usb_rcvbulkpipe(dev, bulk.ep & 0x7f);
698 else
699 pipe = usb_sndbulkpipe(dev, bulk.ep & 0x7f);
700 if (!usb_maxpacket(dev, pipe, !(bulk.ep & USB_DIR_IN)))
701 return -EINVAL;
702 len1 = bulk.len;
703 if (len1 > MAX_USBFS_BUFFER_SIZE)
704 return -EINVAL;
705 if (!(tbuf = kmalloc(len1, GFP_KERNEL)))
706 return -ENOMEM;
707 tmo = bulk.timeout;
708 if (bulk.ep & 0x80) {
709 if (len1 && !access_ok(VERIFY_WRITE, bulk.data, len1)) {
710 kfree(tbuf);
711 return -EINVAL;
712 }
e639dd3f
GKH
713 snoop(&dev->dev, "bulk read: len=0x%02x timeout=%04d\n",
714 bulk.len, bulk.timeout);
1da177e4
LT
715 usb_unlock_device(dev);
716 i = usb_bulk_msg(dev, pipe, tbuf, len1, &len2, tmo);
717 usb_lock_device(dev);
718 if (!i && len2) {
e639dd3f
GKH
719 if (usbfs_snoop) {
720 dev_info(&dev->dev, "bulk read: data ");
721 for (j = 0; j < len2; ++j)
722 printk("%02x ", (unsigned char)(tbuf)[j]);
723 printk("\n");
724 }
1da177e4
LT
725 if (copy_to_user(bulk.data, tbuf, len2)) {
726 kfree(tbuf);
727 return -EFAULT;
728 }
729 }
730 } else {
731 if (len1) {
732 if (copy_from_user(tbuf, bulk.data, len1)) {
733 kfree(tbuf);
734 return -EFAULT;
735 }
736 }
e639dd3f
GKH
737 snoop(&dev->dev, "bulk write: len=0x%02x timeout=%04d\n",
738 bulk.len, bulk.timeout);
739 if (usbfs_snoop) {
740 dev_info(&dev->dev, "bulk write: data: ");
741 for (j = 0; j < len1; ++j)
742 printk("%02x ", (unsigned char)(tbuf)[j]);
743 printk("\n");
744 }
1da177e4
LT
745 usb_unlock_device(dev);
746 i = usb_bulk_msg(dev, pipe, tbuf, len1, &len2, tmo);
747 usb_lock_device(dev);
748 }
749 kfree(tbuf);
750 if (i < 0)
751 return i;
752 return len2;
753}
754
755static int proc_resetep(struct dev_state *ps, void __user *arg)
756{
757 unsigned int ep;
758 int ret;
759
760 if (get_user(ep, (unsigned int __user *)arg))
761 return -EFAULT;
762 if ((ret = findintfep(ps->dev, ep)) < 0)
763 return ret;
764 if ((ret = checkintf(ps, ret)))
765 return ret;
766 usb_settoggle(ps->dev, ep & 0xf, !(ep & USB_DIR_IN), 0);
767 return 0;
768}
769
770static int proc_clearhalt(struct dev_state *ps, void __user *arg)
771{
772 unsigned int ep;
773 int pipe;
774 int ret;
775
776 if (get_user(ep, (unsigned int __user *)arg))
777 return -EFAULT;
778 if ((ret = findintfep(ps->dev, ep)) < 0)
779 return ret;
780 if ((ret = checkintf(ps, ret)))
781 return ret;
782 if (ep & USB_DIR_IN)
783 pipe = usb_rcvbulkpipe(ps->dev, ep & 0x7f);
784 else
785 pipe = usb_sndbulkpipe(ps->dev, ep & 0x7f);
786
787 return usb_clear_halt(ps->dev, pipe);
788}
789
790
791static int proc_getdriver(struct dev_state *ps, void __user *arg)
792{
793 struct usbdevfs_getdriver gd;
794 struct usb_interface *intf;
795 int ret;
796
797 if (copy_from_user(&gd, arg, sizeof(gd)))
798 return -EFAULT;
799 down_read(&usb_bus_type.subsys.rwsem);
800 intf = usb_ifnum_to_if(ps->dev, gd.interface);
801 if (!intf || !intf->dev.driver)
802 ret = -ENODATA;
803 else {
804 strncpy(gd.driver, intf->dev.driver->name,
805 sizeof(gd.driver));
806 ret = (copy_to_user(arg, &gd, sizeof(gd)) ? -EFAULT : 0);
807 }
808 up_read(&usb_bus_type.subsys.rwsem);
809 return ret;
810}
811
812static int proc_connectinfo(struct dev_state *ps, void __user *arg)
813{
814 struct usbdevfs_connectinfo ci;
815
816 ci.devnum = ps->dev->devnum;
817 ci.slow = ps->dev->speed == USB_SPEED_LOW;
818 if (copy_to_user(arg, &ci, sizeof(ci)))
819 return -EFAULT;
820 return 0;
821}
822
823static int proc_resetdevice(struct dev_state *ps)
824{
825 return usb_reset_device(ps->dev);
826
827}
828
829static int proc_setintf(struct dev_state *ps, void __user *arg)
830{
831 struct usbdevfs_setinterface setintf;
832 int ret;
833
834 if (copy_from_user(&setintf, arg, sizeof(setintf)))
835 return -EFAULT;
836 if ((ret = checkintf(ps, setintf.interface)))
837 return ret;
838 return usb_set_interface(ps->dev, setintf.interface,
839 setintf.altsetting);
840}
841
842static int proc_setconfig(struct dev_state *ps, void __user *arg)
843{
844 unsigned int u;
845 int status = 0;
846 struct usb_host_config *actconfig;
847
848 if (get_user(u, (unsigned int __user *)arg))
849 return -EFAULT;
850
851 actconfig = ps->dev->actconfig;
852
853 /* Don't touch the device if any interfaces are claimed.
854 * It could interfere with other drivers' operations, and if
855 * an interface is claimed by usbfs it could easily deadlock.
856 */
857 if (actconfig) {
858 int i;
859
860 for (i = 0; i < actconfig->desc.bNumInterfaces; ++i) {
861 if (usb_interface_claimed(actconfig->interface[i])) {
862 dev_warn (&ps->dev->dev,
72ebddb5 863 "usbfs: interface %d claimed by %s "
1da177e4
LT
864 "while '%s' sets config #%d\n",
865 actconfig->interface[i]
866 ->cur_altsetting
867 ->desc.bInterfaceNumber,
72ebddb5
DB
868 actconfig->interface[i]
869 ->dev.driver->name,
1da177e4 870 current->comm, u);
1da177e4
LT
871 status = -EBUSY;
872 break;
1da177e4
LT
873 }
874 }
875 }
876
877 /* SET_CONFIGURATION is often abused as a "cheap" driver reset,
878 * so avoid usb_set_configuration()'s kick to sysfs
879 */
880 if (status == 0) {
881 if (actconfig && actconfig->desc.bConfigurationValue == u)
882 status = usb_reset_configuration(ps->dev);
883 else
884 status = usb_set_configuration(ps->dev, u);
885 }
886
887 return status;
888}
889
1da177e4
LT
890static int proc_do_submiturb(struct dev_state *ps, struct usbdevfs_urb *uurb,
891 struct usbdevfs_iso_packet_desc __user *iso_frame_desc,
892 void __user *arg)
893{
894 struct usbdevfs_iso_packet_desc *isopkt = NULL;
895 struct usb_host_endpoint *ep;
896 struct async *as;
897 struct usb_ctrlrequest *dr = NULL;
898 unsigned int u, totlen, isofrmlen;
899 int ret, interval = 0, ifnum = -1;
900
901 if (uurb->flags & ~(USBDEVFS_URB_ISO_ASAP|USBDEVFS_URB_SHORT_NOT_OK|
902 URB_NO_FSBR|URB_ZERO_PACKET))
903 return -EINVAL;
904 if (!uurb->buffer)
905 return -EINVAL;
906 if (uurb->signr != 0 && (uurb->signr < SIGRTMIN || uurb->signr > SIGRTMAX))
907 return -EINVAL;
908 if (!(uurb->type == USBDEVFS_URB_TYPE_CONTROL && (uurb->endpoint & ~USB_ENDPOINT_DIR_MASK) == 0)) {
909 if ((ifnum = findintfep(ps->dev, uurb->endpoint)) < 0)
910 return ifnum;
911 if ((ret = checkintf(ps, ifnum)))
912 return ret;
913 }
914 if ((uurb->endpoint & USB_ENDPOINT_DIR_MASK) != 0)
915 ep = ps->dev->ep_in [uurb->endpoint & USB_ENDPOINT_NUMBER_MASK];
916 else
917 ep = ps->dev->ep_out [uurb->endpoint & USB_ENDPOINT_NUMBER_MASK];
918 if (!ep)
919 return -ENOENT;
920 switch(uurb->type) {
921 case USBDEVFS_URB_TYPE_CONTROL:
922 if ((ep->desc.bmAttributes & USB_ENDPOINT_XFERTYPE_MASK)
923 != USB_ENDPOINT_XFER_CONTROL)
924 return -EINVAL;
925 /* min 8 byte setup packet, max arbitrary */
926 if (uurb->buffer_length < 8 || uurb->buffer_length > PAGE_SIZE)
927 return -EINVAL;
928 if (!(dr = kmalloc(sizeof(struct usb_ctrlrequest), GFP_KERNEL)))
929 return -ENOMEM;
930 if (copy_from_user(dr, uurb->buffer, 8)) {
931 kfree(dr);
932 return -EFAULT;
933 }
934 if (uurb->buffer_length < (le16_to_cpup(&dr->wLength) + 8)) {
935 kfree(dr);
936 return -EINVAL;
937 }
938 if ((ret = check_ctrlrecip(ps, dr->bRequestType, le16_to_cpup(&dr->wIndex)))) {
939 kfree(dr);
940 return ret;
941 }
942 uurb->endpoint = (uurb->endpoint & ~USB_ENDPOINT_DIR_MASK) | (dr->bRequestType & USB_ENDPOINT_DIR_MASK);
943 uurb->number_of_packets = 0;
944 uurb->buffer_length = le16_to_cpup(&dr->wLength);
945 uurb->buffer += 8;
946 if (!access_ok((uurb->endpoint & USB_DIR_IN) ? VERIFY_WRITE : VERIFY_READ, uurb->buffer, uurb->buffer_length)) {
947 kfree(dr);
948 return -EFAULT;
949 }
e639dd3f 950 snoop(&ps->dev->dev, "control urb\n");
1da177e4
LT
951 break;
952
953 case USBDEVFS_URB_TYPE_BULK:
954 switch (ep->desc.bmAttributes & USB_ENDPOINT_XFERTYPE_MASK) {
955 case USB_ENDPOINT_XFER_CONTROL:
956 case USB_ENDPOINT_XFER_ISOC:
957 return -EINVAL;
958 /* allow single-shot interrupt transfers, at bogus rates */
959 }
960 uurb->number_of_packets = 0;
961 if (uurb->buffer_length > MAX_USBFS_BUFFER_SIZE)
962 return -EINVAL;
963 if (!access_ok((uurb->endpoint & USB_DIR_IN) ? VERIFY_WRITE : VERIFY_READ, uurb->buffer, uurb->buffer_length))
964 return -EFAULT;
e639dd3f 965 snoop(&ps->dev->dev, "bulk urb\n");
1da177e4
LT
966 break;
967
968 case USBDEVFS_URB_TYPE_ISO:
969 /* arbitrary limit */
970 if (uurb->number_of_packets < 1 || uurb->number_of_packets > 128)
971 return -EINVAL;
972 if ((ep->desc.bmAttributes & USB_ENDPOINT_XFERTYPE_MASK)
973 != USB_ENDPOINT_XFER_ISOC)
974 return -EINVAL;
975 interval = 1 << min (15, ep->desc.bInterval - 1);
976 isofrmlen = sizeof(struct usbdevfs_iso_packet_desc) * uurb->number_of_packets;
977 if (!(isopkt = kmalloc(isofrmlen, GFP_KERNEL)))
978 return -ENOMEM;
979 if (copy_from_user(isopkt, iso_frame_desc, isofrmlen)) {
980 kfree(isopkt);
981 return -EFAULT;
982 }
983 for (totlen = u = 0; u < uurb->number_of_packets; u++) {
984 if (isopkt[u].length > 1023) {
985 kfree(isopkt);
986 return -EINVAL;
987 }
988 totlen += isopkt[u].length;
989 }
990 if (totlen > 32768) {
991 kfree(isopkt);
992 return -EINVAL;
993 }
994 uurb->buffer_length = totlen;
e639dd3f 995 snoop(&ps->dev->dev, "iso urb\n");
1da177e4
LT
996 break;
997
998 case USBDEVFS_URB_TYPE_INTERRUPT:
999 uurb->number_of_packets = 0;
1000 if ((ep->desc.bmAttributes & USB_ENDPOINT_XFERTYPE_MASK)
1001 != USB_ENDPOINT_XFER_INT)
1002 return -EINVAL;
1003 if (ps->dev->speed == USB_SPEED_HIGH)
1004 interval = 1 << min (15, ep->desc.bInterval - 1);
1005 else
1006 interval = ep->desc.bInterval;
1007 if (uurb->buffer_length > MAX_USBFS_BUFFER_SIZE)
1008 return -EINVAL;
1009 if (!access_ok((uurb->endpoint & USB_DIR_IN) ? VERIFY_WRITE : VERIFY_READ, uurb->buffer, uurb->buffer_length))
1010 return -EFAULT;
e639dd3f 1011 snoop(&ps->dev->dev, "interrupt urb\n");
1da177e4
LT
1012 break;
1013
1014 default:
1015 return -EINVAL;
1016 }
1017 if (!(as = alloc_async(uurb->number_of_packets))) {
6fd19f4b
JJ
1018 kfree(isopkt);
1019 kfree(dr);
1da177e4
LT
1020 return -ENOMEM;
1021 }
1022 if (!(as->urb->transfer_buffer = kmalloc(uurb->buffer_length, GFP_KERNEL))) {
6fd19f4b
JJ
1023 kfree(isopkt);
1024 kfree(dr);
1da177e4
LT
1025 free_async(as);
1026 return -ENOMEM;
1027 }
1028 as->urb->dev = ps->dev;
1029 as->urb->pipe = (uurb->type << 30) | __create_pipe(ps->dev, uurb->endpoint & 0xf) | (uurb->endpoint & USB_DIR_IN);
1030 as->urb->transfer_flags = uurb->flags;
1031 as->urb->transfer_buffer_length = uurb->buffer_length;
1032 as->urb->setup_packet = (unsigned char*)dr;
1033 as->urb->start_frame = uurb->start_frame;
1034 as->urb->number_of_packets = uurb->number_of_packets;
1035 as->urb->interval = interval;
1036 as->urb->context = as;
1037 as->urb->complete = async_completed;
1038 for (totlen = u = 0; u < uurb->number_of_packets; u++) {
1039 as->urb->iso_frame_desc[u].offset = totlen;
1040 as->urb->iso_frame_desc[u].length = isopkt[u].length;
1041 totlen += isopkt[u].length;
1042 }
6fd19f4b 1043 kfree(isopkt);
1da177e4
LT
1044 as->ps = ps;
1045 as->userurb = arg;
1046 if (uurb->endpoint & USB_DIR_IN)
1047 as->userbuffer = uurb->buffer;
1048 else
1049 as->userbuffer = NULL;
1050 as->signr = uurb->signr;
1051 as->ifnum = ifnum;
46113830
HW
1052 as->pid = current->pid;
1053 as->uid = current->uid;
1054 as->euid = current->euid;
1da177e4
LT
1055 if (!(uurb->endpoint & USB_DIR_IN)) {
1056 if (copy_from_user(as->urb->transfer_buffer, uurb->buffer, as->urb->transfer_buffer_length)) {
1057 free_async(as);
1058 return -EFAULT;
1059 }
1060 }
e639dd3f
GKH
1061 snoop(&as->urb->dev->dev, "submit urb\n");
1062 snoop_urb(as->urb, as->userurb);
1da177e4
LT
1063 async_newpending(as);
1064 if ((ret = usb_submit_urb(as->urb, GFP_KERNEL))) {
1065 dev_printk(KERN_DEBUG, &ps->dev->dev, "usbfs: usb_submit_urb returned %d\n", ret);
1066 async_removepending(as);
1067 free_async(as);
1068 return ret;
1069 }
1070 return 0;
1071}
1072
1073static int proc_submiturb(struct dev_state *ps, void __user *arg)
1074{
1075 struct usbdevfs_urb uurb;
1076
1077 if (copy_from_user(&uurb, arg, sizeof(uurb)))
1078 return -EFAULT;
1079
1080 return proc_do_submiturb(ps, &uurb, (((struct usbdevfs_urb __user *)arg)->iso_frame_desc), arg);
1081}
1082
1083static int proc_unlinkurb(struct dev_state *ps, void __user *arg)
1084{
1085 struct async *as;
1086
1087 as = async_getpending(ps, arg);
1088 if (!as)
1089 return -EINVAL;
1090 usb_kill_urb(as->urb);
1091 return 0;
1092}
1093
1094static int processcompl(struct async *as, void __user * __user *arg)
1095{
1096 struct urb *urb = as->urb;
1097 struct usbdevfs_urb __user *userurb = as->userurb;
1098 void __user *addr = as->userurb;
1099 unsigned int i;
1100
1101 if (as->userbuffer)
1102 if (copy_to_user(as->userbuffer, urb->transfer_buffer, urb->transfer_buffer_length))
1103 return -EFAULT;
1104 if (put_user(urb->status, &userurb->status))
1105 return -EFAULT;
1106 if (put_user(urb->actual_length, &userurb->actual_length))
1107 return -EFAULT;
1108 if (put_user(urb->error_count, &userurb->error_count))
1109 return -EFAULT;
1110
668a9541
CL
1111 if (usb_pipeisoc(urb->pipe)) {
1112 for (i = 0; i < urb->number_of_packets; i++) {
1113 if (put_user(urb->iso_frame_desc[i].actual_length,
1114 &userurb->iso_frame_desc[i].actual_length))
1115 return -EFAULT;
1116 if (put_user(urb->iso_frame_desc[i].status,
1117 &userurb->iso_frame_desc[i].status))
1118 return -EFAULT;
1119 }
1da177e4
LT
1120 }
1121
1122 free_async(as);
1123
1124 if (put_user(addr, (void __user * __user *)arg))
1125 return -EFAULT;
1126 return 0;
1127}
1128
1129static struct async* reap_as(struct dev_state *ps)
1130{
1131 DECLARE_WAITQUEUE(wait, current);
1132 struct async *as = NULL;
1133 struct usb_device *dev = ps->dev;
1134
1135 add_wait_queue(&ps->wait, &wait);
1136 for (;;) {
1137 __set_current_state(TASK_INTERRUPTIBLE);
1138 if ((as = async_getcompleted(ps)))
1139 break;
1140 if (signal_pending(current))
1141 break;
1142 usb_unlock_device(dev);
1143 schedule();
1144 usb_lock_device(dev);
1145 }
1146 remove_wait_queue(&ps->wait, &wait);
1147 set_current_state(TASK_RUNNING);
1148 return as;
1149}
1150
1151static int proc_reapurb(struct dev_state *ps, void __user *arg)
1152{
1153 struct async *as = reap_as(ps);
1154 if (as)
1155 return processcompl(as, (void __user * __user *)arg);
1156 if (signal_pending(current))
1157 return -EINTR;
1158 return -EIO;
1159}
1160
1161static int proc_reapurbnonblock(struct dev_state *ps, void __user *arg)
1162{
1163 struct async *as;
1164
1165 if (!(as = async_getcompleted(ps)))
1166 return -EAGAIN;
1167 return processcompl(as, (void __user * __user *)arg);
1168}
1169
1170#ifdef CONFIG_COMPAT
1171
1172static int get_urb32(struct usbdevfs_urb *kurb,
1173 struct usbdevfs_urb32 __user *uurb)
1174{
1175 __u32 uptr;
1176 if (get_user(kurb->type, &uurb->type) ||
1177 __get_user(kurb->endpoint, &uurb->endpoint) ||
1178 __get_user(kurb->status, &uurb->status) ||
1179 __get_user(kurb->flags, &uurb->flags) ||
1180 __get_user(kurb->buffer_length, &uurb->buffer_length) ||
1181 __get_user(kurb->actual_length, &uurb->actual_length) ||
1182 __get_user(kurb->start_frame, &uurb->start_frame) ||
1183 __get_user(kurb->number_of_packets, &uurb->number_of_packets) ||
1184 __get_user(kurb->error_count, &uurb->error_count) ||
1185 __get_user(kurb->signr, &uurb->signr))
1186 return -EFAULT;
1187
1188 if (__get_user(uptr, &uurb->buffer))
1189 return -EFAULT;
1190 kurb->buffer = compat_ptr(uptr);
1191 if (__get_user(uptr, &uurb->buffer))
1192 return -EFAULT;
1193 kurb->usercontext = compat_ptr(uptr);
1194
1195 return 0;
1196}
1197
1198static int proc_submiturb_compat(struct dev_state *ps, void __user *arg)
1199{
1200 struct usbdevfs_urb uurb;
1201
1202 if (get_urb32(&uurb,(struct usbdevfs_urb32 *)arg))
1203 return -EFAULT;
1204
668a9541 1205 return proc_do_submiturb(ps, &uurb, ((struct usbdevfs_urb32 __user *)arg)->iso_frame_desc, arg);
1da177e4
LT
1206}
1207
1208static int processcompl_compat(struct async *as, void __user * __user *arg)
1209{
1210 struct urb *urb = as->urb;
1211 struct usbdevfs_urb32 __user *userurb = as->userurb;
1212 void __user *addr = as->userurb;
1213 unsigned int i;
1214
1215 if (as->userbuffer)
1216 if (copy_to_user(as->userbuffer, urb->transfer_buffer, urb->transfer_buffer_length))
1217 return -EFAULT;
1218 if (put_user(urb->status, &userurb->status))
1219 return -EFAULT;
1220 if (put_user(urb->actual_length, &userurb->actual_length))
1221 return -EFAULT;
1222 if (put_user(urb->error_count, &userurb->error_count))
1223 return -EFAULT;
1224
668a9541
CL
1225 if (usb_pipeisoc(urb->pipe)) {
1226 for (i = 0; i < urb->number_of_packets; i++) {
1227 if (put_user(urb->iso_frame_desc[i].actual_length,
1228 &userurb->iso_frame_desc[i].actual_length))
1229 return -EFAULT;
1230 if (put_user(urb->iso_frame_desc[i].status,
1231 &userurb->iso_frame_desc[i].status))
1232 return -EFAULT;
1233 }
1da177e4
LT
1234 }
1235
1236 free_async(as);
1237 if (put_user((u32)(u64)addr, (u32 __user *)arg))
1238 return -EFAULT;
1239 return 0;
1240}
1241
1242static int proc_reapurb_compat(struct dev_state *ps, void __user *arg)
1243{
1244 struct async *as = reap_as(ps);
1245 if (as)
1246 return processcompl_compat(as, (void __user * __user *)arg);
1247 if (signal_pending(current))
1248 return -EINTR;
1249 return -EIO;
1250}
1251
1252static int proc_reapurbnonblock_compat(struct dev_state *ps, void __user *arg)
1253{
1254 struct async *as;
1255
1da177e4
LT
1256 if (!(as = async_getcompleted(ps)))
1257 return -EAGAIN;
1da177e4
LT
1258 return processcompl_compat(as, (void __user * __user *)arg);
1259}
1260
1261#endif
1262
1263static int proc_disconnectsignal(struct dev_state *ps, void __user *arg)
1264{
1265 struct usbdevfs_disconnectsignal ds;
1266
1267 if (copy_from_user(&ds, arg, sizeof(ds)))
1268 return -EFAULT;
1269 if (ds.signr != 0 && (ds.signr < SIGRTMIN || ds.signr > SIGRTMAX))
1270 return -EINVAL;
1271 ps->discsignr = ds.signr;
1272 ps->disccontext = ds.context;
1273 return 0;
1274}
1275
1276static int proc_claiminterface(struct dev_state *ps, void __user *arg)
1277{
1278 unsigned int ifnum;
1279
1280 if (get_user(ifnum, (unsigned int __user *)arg))
1281 return -EFAULT;
1282 return claimintf(ps, ifnum);
1283}
1284
1285static int proc_releaseinterface(struct dev_state *ps, void __user *arg)
1286{
1287 unsigned int ifnum;
1288 int ret;
1289
1290 if (get_user(ifnum, (unsigned int __user *)arg))
1291 return -EFAULT;
1292 if ((ret = releaseintf(ps, ifnum)) < 0)
1293 return ret;
1294 destroy_async_on_interface (ps, ifnum);
1295 return 0;
1296}
1297
c36fc889 1298static int proc_ioctl(struct dev_state *ps, struct usbdevfs_ioctl *ctl)
1da177e4 1299{
1da177e4
LT
1300 int size;
1301 void *buf = NULL;
1302 int retval = 0;
1303 struct usb_interface *intf = NULL;
1304 struct usb_driver *driver = NULL;
1da177e4 1305
c36fc889
PZ
1306 /* alloc buffer */
1307 if ((size = _IOC_SIZE (ctl->ioctl_code)) > 0) {
1da177e4
LT
1308 if ((buf = kmalloc (size, GFP_KERNEL)) == NULL)
1309 return -ENOMEM;
c36fc889
PZ
1310 if ((_IOC_DIR(ctl->ioctl_code) & _IOC_WRITE)) {
1311 if (copy_from_user (buf, ctl->data, size)) {
6fd19f4b 1312 kfree(buf);
1da177e4
LT
1313 return -EFAULT;
1314 }
1315 } else {
1316 memset (buf, 0, size);
1317 }
1318 }
1319
1320 if (!connected(ps->dev)) {
6fd19f4b 1321 kfree(buf);
1da177e4
LT
1322 return -ENODEV;
1323 }
1324
1325 if (ps->dev->state != USB_STATE_CONFIGURED)
1326 retval = -EHOSTUNREACH;
c36fc889 1327 else if (!(intf = usb_ifnum_to_if (ps->dev, ctl->ifno)))
1da177e4 1328 retval = -EINVAL;
c36fc889 1329 else switch (ctl->ioctl_code) {
1da177e4
LT
1330
1331 /* disconnect kernel driver from interface */
1332 case USBDEVFS_DISCONNECT:
1333
1da177e4
LT
1334 down_write(&usb_bus_type.subsys.rwsem);
1335 if (intf->dev.driver) {
1336 driver = to_usb_driver(intf->dev.driver);
1337 dev_dbg (&intf->dev, "disconnect by usbfs\n");
1338 usb_driver_release_interface(driver, intf);
1339 } else
1340 retval = -ENODATA;
1341 up_write(&usb_bus_type.subsys.rwsem);
1342 break;
1343
1344 /* let kernel drivers try to (re)bind to the interface */
1345 case USBDEVFS_CONNECT:
1346 usb_unlock_device(ps->dev);
1da177e4 1347 bus_rescan_devices(intf->dev.bus);
1da177e4
LT
1348 usb_lock_device(ps->dev);
1349 break;
1350
1351 /* talk directly to the interface's driver */
1352 default:
1353 down_read(&usb_bus_type.subsys.rwsem);
1354 if (intf->dev.driver)
1355 driver = to_usb_driver(intf->dev.driver);
1356 if (driver == NULL || driver->ioctl == NULL) {
1357 retval = -ENOTTY;
1358 } else {
c36fc889 1359 retval = driver->ioctl (intf, ctl->ioctl_code, buf);
1da177e4
LT
1360 if (retval == -ENOIOCTLCMD)
1361 retval = -ENOTTY;
1362 }
1363 up_read(&usb_bus_type.subsys.rwsem);
1364 }
1365
1366 /* cleanup and return */
1367 if (retval >= 0
c36fc889 1368 && (_IOC_DIR (ctl->ioctl_code) & _IOC_READ) != 0
1da177e4 1369 && size > 0
c36fc889 1370 && copy_to_user (ctl->data, buf, size) != 0)
1da177e4 1371 retval = -EFAULT;
6fd19f4b
JJ
1372
1373 kfree(buf);
1da177e4
LT
1374 return retval;
1375}
1376
c36fc889
PZ
1377static int proc_ioctl_default(struct dev_state *ps, void __user *arg)
1378{
1379 struct usbdevfs_ioctl ctrl;
1380
1381 if (copy_from_user(&ctrl, arg, sizeof (ctrl)))
1382 return -EFAULT;
1383 return proc_ioctl(ps, &ctrl);
1384}
1385
1386#ifdef CONFIG_COMPAT
777da590 1387static int proc_ioctl_compat(struct dev_state *ps, compat_uptr_t arg)
c36fc889
PZ
1388{
1389 struct usbdevfs_ioctl32 __user *uioc;
1390 struct usbdevfs_ioctl ctrl;
1391 u32 udata;
1392
058120d7 1393 uioc = compat_ptr((long)arg);
c36fc889
PZ
1394 if (get_user(ctrl.ifno, &uioc->ifno) ||
1395 get_user(ctrl.ioctl_code, &uioc->ioctl_code) ||
1396 __get_user(udata, &uioc->data))
1397 return -EFAULT;
1398 ctrl.data = compat_ptr(udata);
1399
1400 return proc_ioctl(ps, &ctrl);
1401}
1402#endif
1403
1da177e4
LT
1404/*
1405 * NOTE: All requests here that have interface numbers as parameters
1406 * are assuming that somehow the configuration has been prevented from
1407 * changing. But there's no mechanism to ensure that...
1408 */
1409static int usbdev_ioctl(struct inode *inode, struct file *file, unsigned int cmd, unsigned long arg)
1410{
1411 struct dev_state *ps = (struct dev_state *)file->private_data;
1412 struct usb_device *dev = ps->dev;
1413 void __user *p = (void __user *)arg;
1414 int ret = -ENOTTY;
1415
1416 if (!(file->f_mode & FMODE_WRITE))
1417 return -EPERM;
1418 usb_lock_device(dev);
1419 if (!connected(dev)) {
1420 usb_unlock_device(dev);
1421 return -ENODEV;
1422 }
1423
1424 switch (cmd) {
1425 case USBDEVFS_CONTROL:
1426 snoop(&dev->dev, "%s: CONTROL\n", __FUNCTION__);
1427 ret = proc_control(ps, p);
1428 if (ret >= 0)
1429 inode->i_mtime = CURRENT_TIME;
1430 break;
1431
1432 case USBDEVFS_BULK:
1433 snoop(&dev->dev, "%s: BULK\n", __FUNCTION__);
1434 ret = proc_bulk(ps, p);
1435 if (ret >= 0)
1436 inode->i_mtime = CURRENT_TIME;
1437 break;
1438
1439 case USBDEVFS_RESETEP:
1440 snoop(&dev->dev, "%s: RESETEP\n", __FUNCTION__);
1441 ret = proc_resetep(ps, p);
1442 if (ret >= 0)
1443 inode->i_mtime = CURRENT_TIME;
1444 break;
1445
1446 case USBDEVFS_RESET:
1447 snoop(&dev->dev, "%s: RESET\n", __FUNCTION__);
1448 ret = proc_resetdevice(ps);
1449 break;
1450
1451 case USBDEVFS_CLEAR_HALT:
1452 snoop(&dev->dev, "%s: CLEAR_HALT\n", __FUNCTION__);
1453 ret = proc_clearhalt(ps, p);
1454 if (ret >= 0)
1455 inode->i_mtime = CURRENT_TIME;
1456 break;
1457
1458 case USBDEVFS_GETDRIVER:
1459 snoop(&dev->dev, "%s: GETDRIVER\n", __FUNCTION__);
1460 ret = proc_getdriver(ps, p);
1461 break;
1462
1463 case USBDEVFS_CONNECTINFO:
1464 snoop(&dev->dev, "%s: CONNECTINFO\n", __FUNCTION__);
1465 ret = proc_connectinfo(ps, p);
1466 break;
1467
1468 case USBDEVFS_SETINTERFACE:
1469 snoop(&dev->dev, "%s: SETINTERFACE\n", __FUNCTION__);
1470 ret = proc_setintf(ps, p);
1471 break;
1472
1473 case USBDEVFS_SETCONFIGURATION:
1474 snoop(&dev->dev, "%s: SETCONFIGURATION\n", __FUNCTION__);
1475 ret = proc_setconfig(ps, p);
1476 break;
1477
1478 case USBDEVFS_SUBMITURB:
1479 snoop(&dev->dev, "%s: SUBMITURB\n", __FUNCTION__);
1480 ret = proc_submiturb(ps, p);
1481 if (ret >= 0)
1482 inode->i_mtime = CURRENT_TIME;
1483 break;
1484
1485#ifdef CONFIG_COMPAT
1486
1487 case USBDEVFS_SUBMITURB32:
1488 snoop(&dev->dev, "%s: SUBMITURB32\n", __FUNCTION__);
1489 ret = proc_submiturb_compat(ps, p);
1490 if (ret >= 0)
1491 inode->i_mtime = CURRENT_TIME;
1492 break;
1493
1494 case USBDEVFS_REAPURB32:
1495 snoop(&dev->dev, "%s: REAPURB32\n", __FUNCTION__);
1496 ret = proc_reapurb_compat(ps, p);
1497 break;
1498
1499 case USBDEVFS_REAPURBNDELAY32:
1500 snoop(&dev->dev, "%s: REAPURBDELAY32\n", __FUNCTION__);
1501 ret = proc_reapurbnonblock_compat(ps, p);
1502 break;
1503
c36fc889
PZ
1504 case USBDEVFS_IOCTL32:
1505 snoop(&dev->dev, "%s: IOCTL\n", __FUNCTION__);
777da590 1506 ret = proc_ioctl_compat(ps, (compat_uptr_t)(long)p);
c36fc889 1507 break;
1da177e4
LT
1508#endif
1509
1510 case USBDEVFS_DISCARDURB:
1511 snoop(&dev->dev, "%s: DISCARDURB\n", __FUNCTION__);
1512 ret = proc_unlinkurb(ps, p);
1513 break;
1514
1515 case USBDEVFS_REAPURB:
1516 snoop(&dev->dev, "%s: REAPURB\n", __FUNCTION__);
1517 ret = proc_reapurb(ps, p);
1518 break;
1519
1520 case USBDEVFS_REAPURBNDELAY:
1521 snoop(&dev->dev, "%s: REAPURBDELAY\n", __FUNCTION__);
1522 ret = proc_reapurbnonblock(ps, p);
1523 break;
1524
1525 case USBDEVFS_DISCSIGNAL:
1526 snoop(&dev->dev, "%s: DISCSIGNAL\n", __FUNCTION__);
1527 ret = proc_disconnectsignal(ps, p);
1528 break;
1529
1530 case USBDEVFS_CLAIMINTERFACE:
1531 snoop(&dev->dev, "%s: CLAIMINTERFACE\n", __FUNCTION__);
1532 ret = proc_claiminterface(ps, p);
1533 break;
1534
1535 case USBDEVFS_RELEASEINTERFACE:
1536 snoop(&dev->dev, "%s: RELEASEINTERFACE\n", __FUNCTION__);
1537 ret = proc_releaseinterface(ps, p);
1538 break;
1539
1540 case USBDEVFS_IOCTL:
1541 snoop(&dev->dev, "%s: IOCTL\n", __FUNCTION__);
c36fc889 1542 ret = proc_ioctl_default(ps, p);
1da177e4
LT
1543 break;
1544 }
1545 usb_unlock_device(dev);
1546 if (ret >= 0)
1547 inode->i_atime = CURRENT_TIME;
1548 return ret;
1549}
1550
1551/* No kernel lock - fine */
1552static unsigned int usbdev_poll(struct file *file, struct poll_table_struct *wait)
1553{
1554 struct dev_state *ps = (struct dev_state *)file->private_data;
1555 unsigned int mask = 0;
1556
1557 poll_wait(file, &ps->wait, wait);
1558 if (file->f_mode & FMODE_WRITE && !list_empty(&ps->async_completed))
1559 mask |= POLLOUT | POLLWRNORM;
1560 if (!connected(ps->dev))
1561 mask |= POLLERR | POLLHUP;
1562 return mask;
1563}
1564
1565struct file_operations usbfs_device_file_operations = {
1566 .llseek = usbdev_lseek,
1567 .read = usbdev_read,
1568 .poll = usbdev_poll,
1569 .ioctl = usbdev_ioctl,
1570 .open = usbdev_open,
1571 .release = usbdev_release,
1572};
fbf82fd2 1573
a7b986b3 1574static void usbdev_add(struct usb_device *dev)
fbf82fd2
KS
1575{
1576 int minor = ((dev->bus->busnum-1) * 128) + (dev->devnum-1);
1577
53f46542 1578 dev->class_dev = class_device_create(usb_device_class, NULL,
fbf82fd2
KS
1579 MKDEV(USB_DEVICE_MAJOR, minor), &dev->dev,
1580 "usbdev%d.%d", dev->bus->busnum, dev->devnum);
1581
1582 dev->class_dev->class_data = dev;
1583}
1584
a7b986b3 1585static void usbdev_remove(struct usb_device *dev)
fbf82fd2
KS
1586{
1587 class_device_unregister(dev->class_dev);
1588}
1589
a7b986b3
GKH
1590static int usbdev_notify(struct notifier_block *self, unsigned long action,
1591 void *dev)
1592{
1593 switch (action) {
1594 case USB_DEVICE_ADD:
1595 usbdev_add(dev);
1596 break;
1597 case USB_DEVICE_REMOVE:
1598 usbdev_remove(dev);
1599 break;
1600 }
1601 return NOTIFY_OK;
1602}
1603
1604static struct notifier_block usbdev_nb = {
1605 .notifier_call = usbdev_notify,
1606};
1607
fbf82fd2
KS
1608static struct cdev usb_device_cdev = {
1609 .kobj = {.name = "usb_device", },
1610 .owner = THIS_MODULE,
1611};
1612
1613int __init usbdev_init(void)
1614{
1615 int retval;
1616
fad21bdf
AS
1617 retval = register_chrdev_region(USB_DEVICE_DEV, USB_DEVICE_MAX,
1618 "usb_device");
fbf82fd2
KS
1619 if (retval) {
1620 err("unable to register minors for usb_device");
1621 goto out;
1622 }
1623 cdev_init(&usb_device_cdev, &usbfs_device_file_operations);
fad21bdf 1624 retval = cdev_add(&usb_device_cdev, USB_DEVICE_DEV, USB_DEVICE_MAX);
fbf82fd2
KS
1625 if (retval) {
1626 err("unable to get usb_device major %d", USB_DEVICE_MAJOR);
a7b986b3 1627 goto error_cdev;
fbf82fd2
KS
1628 }
1629 usb_device_class = class_create(THIS_MODULE, "usb_device");
1630 if (IS_ERR(usb_device_class)) {
1631 err("unable to register usb_device class");
1632 retval = PTR_ERR(usb_device_class);
a7b986b3 1633 goto error_class;
fbf82fd2
KS
1634 }
1635
a7b986b3
GKH
1636 usb_register_notify(&usbdev_nb);
1637
fbf82fd2
KS
1638out:
1639 return retval;
a7b986b3
GKH
1640
1641error_class:
1642 usb_device_class = NULL;
1643 cdev_del(&usb_device_cdev);
1644
1645error_cdev:
1646 unregister_chrdev_region(USB_DEVICE_DEV, USB_DEVICE_MAX);
1647 goto out;
fbf82fd2
KS
1648}
1649
1650void usbdev_cleanup(void)
1651{
a7b986b3 1652 usb_unregister_notify(&usbdev_nb);
fbf82fd2
KS
1653 class_destroy(usb_device_class);
1654 cdev_del(&usb_device_cdev);
fad21bdf 1655 unregister_chrdev_region(USB_DEVICE_DEV, USB_DEVICE_MAX);
fbf82fd2
KS
1656}
1657
This page took 0.187924 seconds and 5 git commands to generate.