]> git.proxmox.com Git - mirror_ubuntu-bionic-kernel.git/blame - drivers/hid/usbhid/hiddev.c
HID: use hid_hw_request() instead of direct call to usbhid
[mirror_ubuntu-bionic-kernel.git] / drivers / hid / usbhid / hiddev.c
CommitLineData
1da177e4
LT
1/*
2 * Copyright (c) 2001 Paul Stewart
3 * Copyright (c) 2001 Vojtech Pavlik
4 *
5 * HID char devices, giving access to raw HID device events.
6 *
7 */
8
9/*
10 * This program is free software; you can redistribute it and/or modify
11 * it under the terms of the GNU General Public License as published by
12 * the Free Software Foundation; either version 2 of the License, or
13 * (at your option) any later version.
14 *
15 * This program is distributed in the hope that it will be useful,
16 * but WITHOUT ANY WARRANTY; without even the implied warranty of
17 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
18 * GNU General Public License for more details.
19 *
20 * You should have received a copy of the GNU General Public License
21 * along with this program; if not, write to the Free Software
22 * Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA
23 *
24 * Should you need to contact me, the author, you can do so either by
25 * e-mail - mail your message to Paul Stewart <stewart@wetlogic.net>
26 */
27
1da177e4
LT
28#include <linux/poll.h>
29#include <linux/slab.h>
30#include <linux/module.h>
31#include <linux/init.h>
1da177e4
LT
32#include <linux/input.h>
33#include <linux/usb.h>
dde5845a 34#include <linux/hid.h>
1da177e4 35#include <linux/hiddev.h>
bb6c8d8f 36#include <linux/compat.h>
d4f0e4da 37#include <linux/vmalloc.h>
dde5845a 38#include "usbhid.h"
1da177e4
LT
39
40#ifdef CONFIG_USB_DYNAMIC_MINORS
41#define HIDDEV_MINOR_BASE 0
42#define HIDDEV_MINORS 256
43#else
44#define HIDDEV_MINOR_BASE 96
45#define HIDDEV_MINORS 16
46#endif
affbb8c6 47#define HIDDEV_BUFFER_SIZE 2048
1da177e4
LT
48
49struct hiddev {
50 int exist;
51 int open;
07903407 52 struct mutex existancelock;
1da177e4
LT
53 wait_queue_head_t wait;
54 struct hid_device *hid;
826d5982 55 struct list_head list;
cdcb44e8 56 spinlock_t list_lock;
1da177e4
LT
57};
58
59struct hiddev_list {
60 struct hiddev_usage_ref buffer[HIDDEV_BUFFER_SIZE];
61 int head;
62 int tail;
63 unsigned flags;
64 struct fasync_struct *fasync;
65 struct hiddev *hiddev;
826d5982 66 struct list_head node;
07903407 67 struct mutex thread_lock;
1da177e4
LT
68};
69
1da177e4
LT
70/*
71 * Find a report, given the report's type and ID. The ID can be specified
72 * indirectly by REPORT_ID_FIRST (which returns the first report of the given
73 * type) or by (REPORT_ID_NEXT | old_id), which returns the next report of the
74 * given type which follows old_id.
75 */
76static struct hid_report *
77hiddev_lookup_report(struct hid_device *hid, struct hiddev_report_info *rinfo)
78{
826d5982
DT
79 unsigned int flags = rinfo->report_id & ~HID_REPORT_ID_MASK;
80 unsigned int rid = rinfo->report_id & HID_REPORT_ID_MASK;
1da177e4 81 struct hid_report_enum *report_enum;
826d5982 82 struct hid_report *report;
1da177e4
LT
83 struct list_head *list;
84
85 if (rinfo->report_type < HID_REPORT_TYPE_MIN ||
826d5982
DT
86 rinfo->report_type > HID_REPORT_TYPE_MAX)
87 return NULL;
1da177e4
LT
88
89 report_enum = hid->report_enum +
90 (rinfo->report_type - HID_REPORT_TYPE_MIN);
91
92 switch (flags) {
93 case 0: /* Nothing to do -- report_id is already set correctly */
94 break;
95
96 case HID_REPORT_ID_FIRST:
826d5982 97 if (list_empty(&report_enum->report_list))
1da177e4 98 return NULL;
826d5982
DT
99
100 list = report_enum->report_list.next;
101 report = list_entry(list, struct hid_report, list);
102 rinfo->report_id = report->id;
1da177e4 103 break;
05f091ab 104
1da177e4 105 case HID_REPORT_ID_NEXT:
826d5982
DT
106 report = report_enum->report_id_hash[rid];
107 if (!report)
1da177e4 108 return NULL;
826d5982
DT
109
110 list = report->list.next;
1da177e4
LT
111 if (list == &report_enum->report_list)
112 return NULL;
826d5982
DT
113
114 report = list_entry(list, struct hid_report, list);
115 rinfo->report_id = report->id;
1da177e4 116 break;
05f091ab 117
1da177e4
LT
118 default:
119 return NULL;
120 }
121
122 return report_enum->report_id_hash[rinfo->report_id];
123}
124
125/*
126 * Perform an exhaustive search of the report table for a usage, given its
127 * type and usage id.
128 */
129static struct hid_field *
130hiddev_lookup_usage(struct hid_device *hid, struct hiddev_usage_ref *uref)
131{
132 int i, j;
133 struct hid_report *report;
134 struct hid_report_enum *report_enum;
135 struct hid_field *field;
136
137 if (uref->report_type < HID_REPORT_TYPE_MIN ||
826d5982
DT
138 uref->report_type > HID_REPORT_TYPE_MAX)
139 return NULL;
1da177e4
LT
140
141 report_enum = hid->report_enum +
142 (uref->report_type - HID_REPORT_TYPE_MIN);
143
826d5982 144 list_for_each_entry(report, &report_enum->report_list, list) {
1da177e4
LT
145 for (i = 0; i < report->maxfield; i++) {
146 field = report->field[i];
147 for (j = 0; j < field->maxusage; j++) {
148 if (field->usage[j].hid == uref->usage_code) {
149 uref->report_id = report->id;
150 uref->field_index = i;
151 uref->usage_index = j;
152 return field;
153 }
154 }
155 }
826d5982 156 }
1da177e4
LT
157
158 return NULL;
159}
160
161static void hiddev_send_event(struct hid_device *hid,
162 struct hiddev_usage_ref *uref)
163{
164 struct hiddev *hiddev = hid->hiddev;
826d5982 165 struct hiddev_list *list;
cdcb44e8 166 unsigned long flags;
1da177e4 167
cdcb44e8 168 spin_lock_irqsave(&hiddev->list_lock, flags);
826d5982 169 list_for_each_entry(list, &hiddev->list, node) {
1da177e4
LT
170 if (uref->field_index != HID_FIELD_INDEX_NONE ||
171 (list->flags & HIDDEV_FLAG_REPORT) != 0) {
172 list->buffer[list->head] = *uref;
05f091ab 173 list->head = (list->head + 1) &
1da177e4
LT
174 (HIDDEV_BUFFER_SIZE - 1);
175 kill_fasync(&list->fasync, SIGIO, POLL_IN);
176 }
1da177e4 177 }
cdcb44e8 178 spin_unlock_irqrestore(&hiddev->list_lock, flags);
1da177e4
LT
179
180 wake_up_interruptible(&hiddev->wait);
181}
182
183/*
184 * This is where hid.c calls into hiddev to pass an event that occurred over
185 * the interrupt pipe
186 */
187void hiddev_hid_event(struct hid_device *hid, struct hid_field *field,
7d12e780 188 struct hid_usage *usage, __s32 value)
1da177e4
LT
189{
190 unsigned type = field->report_type;
191 struct hiddev_usage_ref uref;
192
05f091ab 193 uref.report_type =
1da177e4 194 (type == HID_INPUT_REPORT) ? HID_REPORT_TYPE_INPUT :
05f091ab 195 ((type == HID_OUTPUT_REPORT) ? HID_REPORT_TYPE_OUTPUT :
826d5982 196 ((type == HID_FEATURE_REPORT) ? HID_REPORT_TYPE_FEATURE : 0));
1da177e4
LT
197 uref.report_id = field->report->id;
198 uref.field_index = field->index;
199 uref.usage_index = (usage - field->usage);
200 uref.usage_code = usage->hid;
201 uref.value = value;
202
203 hiddev_send_event(hid, &uref);
204}
229695e5 205EXPORT_SYMBOL_GPL(hiddev_hid_event);
1da177e4
LT
206
207void hiddev_report_event(struct hid_device *hid, struct hid_report *report)
208{
209 unsigned type = report->type;
210 struct hiddev_usage_ref uref;
211
212 memset(&uref, 0, sizeof(uref));
05f091ab 213 uref.report_type =
1da177e4 214 (type == HID_INPUT_REPORT) ? HID_REPORT_TYPE_INPUT :
05f091ab 215 ((type == HID_OUTPUT_REPORT) ? HID_REPORT_TYPE_OUTPUT :
826d5982 216 ((type == HID_FEATURE_REPORT) ? HID_REPORT_TYPE_FEATURE : 0));
1da177e4
LT
217 uref.report_id = report->id;
218 uref.field_index = HID_FIELD_INDEX_NONE;
219
220 hiddev_send_event(hid, &uref);
221}
aa8de2f0 222
1da177e4
LT
223/*
224 * fasync file op
225 */
226static int hiddev_fasync(int fd, struct file *file, int on)
227{
1da177e4 228 struct hiddev_list *list = file->private_data;
826d5982 229
60aa4924 230 return fasync_helper(fd, file, on, &list->fasync);
1da177e4
LT
231}
232
233
234/*
235 * release file op
236 */
237static int hiddev_release(struct inode * inode, struct file * file)
238{
239 struct hiddev_list *list = file->private_data;
cdcb44e8 240 unsigned long flags;
1da177e4 241
cdcb44e8 242 spin_lock_irqsave(&list->hiddev->list_lock, flags);
826d5982 243 list_del(&list->node);
cdcb44e8 244 spin_unlock_irqrestore(&list->hiddev->list_lock, flags);
1da177e4 245
6cb4b040 246 mutex_lock(&list->hiddev->existancelock);
1da177e4 247 if (!--list->hiddev->open) {
0361a28d 248 if (list->hiddev->exist) {
4916b3a5 249 usbhid_close(list->hiddev->hid);
0361a28d
ON
250 usbhid_put_power(list->hiddev->hid);
251 } else {
5c699d7d 252 mutex_unlock(&list->hiddev->existancelock);
1da177e4 253 kfree(list->hiddev);
d4f0e4da 254 vfree(list);
5c699d7d 255 return 0;
0361a28d 256 }
1da177e4
LT
257 }
258
6cb4b040 259 mutex_unlock(&list->hiddev->existancelock);
d4f0e4da 260 vfree(list);
1da177e4
LT
261
262 return 0;
263}
264
265/*
266 * open file op
267 */
826d5982
DT
268static int hiddev_open(struct inode *inode, struct file *file)
269{
1da177e4 270 struct hiddev_list *list;
bd25f4dd 271 struct usb_interface *intf;
9c9e54a8 272 struct hid_device *hid;
bd25f4dd
AB
273 struct hiddev *hiddev;
274 int res;
1da177e4 275
8fe294ca 276 intf = usbhid_find_interface(iminor(inode));
bd25f4dd 277 if (!intf)
1da177e4 278 return -ENODEV;
9c9e54a8
JK
279 hid = usb_get_intfdata(intf);
280 hiddev = hid->hiddev;
1da177e4 281
d4f0e4da 282 if (!(list = vzalloc(sizeof(struct hiddev_list))))
1da177e4 283 return -ENOMEM;
07903407 284 mutex_init(&list->thread_lock);
bd25f4dd 285 list->hiddev = hiddev;
1da177e4
LT
286 file->private_data = list;
287
07903407
ON
288 /*
289 * no need for locking because the USB major number
290 * is shared which usbcore guards against disconnect
291 */
292 if (list->hiddev->exist) {
293 if (!list->hiddev->open++) {
bd25f4dd 294 res = usbhid_open(hiddev->hid);
07903407
ON
295 if (res < 0) {
296 res = -EIO;
297 goto bail;
298 }
299 }
300 } else {
301 res = -ENODEV;
302 goto bail;
303 }
304
305 spin_lock_irq(&list->hiddev->list_lock);
bd25f4dd 306 list_add_tail(&list->node, &hiddev->list);
07903407 307 spin_unlock_irq(&list->hiddev->list_lock);
1da177e4 308
6cb4b040 309 mutex_lock(&hiddev->existancelock);
0361a28d
ON
310 if (!list->hiddev->open++)
311 if (list->hiddev->exist) {
bd25f4dd 312 struct hid_device *hid = hiddev->hid;
0361a28d
ON
313 res = usbhid_get_power(hid);
314 if (res < 0) {
315 res = -EIO;
6cb4b040 316 goto bail_unlock;
0361a28d
ON
317 }
318 usbhid_open(hid);
319 }
6cb4b040 320 mutex_unlock(&hiddev->existancelock);
1da177e4 321 return 0;
6cb4b040
JK
322bail_unlock:
323 mutex_unlock(&hiddev->existancelock);
07903407
ON
324bail:
325 file->private_data = NULL;
d4f0e4da 326 vfree(list);
07903407 327 return res;
1da177e4
LT
328}
329
330/*
331 * "write" file op
332 */
333static ssize_t hiddev_write(struct file * file, const char __user * buffer, size_t count, loff_t *ppos)
334{
335 return -EINVAL;
336}
337
338/*
339 * "read" file op
340 */
341static ssize_t hiddev_read(struct file * file, char __user * buffer, size_t count, loff_t *ppos)
342{
96fe2ab8 343 DEFINE_WAIT(wait);
1da177e4
LT
344 struct hiddev_list *list = file->private_data;
345 int event_size;
07903407 346 int retval;
1da177e4
LT
347
348 event_size = ((list->flags & HIDDEV_FLAG_UREF) != 0) ?
349 sizeof(struct hiddev_usage_ref) : sizeof(struct hiddev_event);
350
351 if (count < event_size)
352 return 0;
353
07903407
ON
354 /* lock against other threads */
355 retval = mutex_lock_interruptible(&list->thread_lock);
356 if (retval)
357 return -ERESTARTSYS;
358
1da177e4
LT
359 while (retval == 0) {
360 if (list->head == list->tail) {
07903407 361 prepare_to_wait(&list->hiddev->wait, &wait, TASK_INTERRUPTIBLE);
05f091ab 362
1da177e4 363 while (list->head == list->tail) {
1da177e4
LT
364 if (signal_pending(current)) {
365 retval = -ERESTARTSYS;
366 break;
367 }
368 if (!list->hiddev->exist) {
369 retval = -EIO;
370 break;
371 }
13f19624
JK
372 if (file->f_flags & O_NONBLOCK) {
373 retval = -EAGAIN;
374 break;
375 }
05f091ab 376
07903407
ON
377 /* let O_NONBLOCK tasks run */
378 mutex_unlock(&list->thread_lock);
1da177e4 379 schedule();
06268b2a
PW
380 if (mutex_lock_interruptible(&list->thread_lock)) {
381 finish_wait(&list->hiddev->wait, &wait);
07903407 382 return -EINTR;
06268b2a 383 }
48d70552 384 set_current_state(TASK_INTERRUPTIBLE);
1da177e4 385 }
07903407 386 finish_wait(&list->hiddev->wait, &wait);
1da177e4 387
1da177e4
LT
388 }
389
07903407
ON
390 if (retval) {
391 mutex_unlock(&list->thread_lock);
1da177e4 392 return retval;
07903407 393 }
1da177e4
LT
394
395
05f091ab 396 while (list->head != list->tail &&
1da177e4
LT
397 retval + event_size <= count) {
398 if ((list->flags & HIDDEV_FLAG_UREF) == 0) {
07903407 399 if (list->buffer[list->tail].field_index != HID_FIELD_INDEX_NONE) {
1da177e4 400 struct hiddev_event event;
07903407 401
1da177e4
LT
402 event.hid = list->buffer[list->tail].usage_code;
403 event.value = list->buffer[list->tail].value;
07903407
ON
404 if (copy_to_user(buffer + retval, &event, sizeof(struct hiddev_event))) {
405 mutex_unlock(&list->thread_lock);
1da177e4 406 return -EFAULT;
07903407 407 }
1da177e4
LT
408 retval += sizeof(struct hiddev_event);
409 }
410 } else {
411 if (list->buffer[list->tail].field_index != HID_FIELD_INDEX_NONE ||
412 (list->flags & HIDDEV_FLAG_REPORT) != 0) {
07903407
ON
413
414 if (copy_to_user(buffer + retval, list->buffer + list->tail, sizeof(struct hiddev_usage_ref))) {
415 mutex_unlock(&list->thread_lock);
1da177e4 416 return -EFAULT;
07903407 417 }
1da177e4
LT
418 retval += sizeof(struct hiddev_usage_ref);
419 }
420 }
421 list->tail = (list->tail + 1) & (HIDDEV_BUFFER_SIZE - 1);
422 }
423
424 }
07903407 425 mutex_unlock(&list->thread_lock);
1da177e4
LT
426
427 return retval;
428}
429
430/*
431 * "poll" file op
432 * No kernel lock - fine
433 */
434static unsigned int hiddev_poll(struct file *file, poll_table *wait)
435{
436 struct hiddev_list *list = file->private_data;
826d5982 437
1da177e4
LT
438 poll_wait(file, &list->hiddev->wait, wait);
439 if (list->head != list->tail)
440 return POLLIN | POLLRDNORM;
441 if (!list->hiddev->exist)
442 return POLLERR | POLLHUP;
443 return 0;
444}
445
446/*
447 * "ioctl" file op
448 */
cf2a299e
JD
449static noinline int hiddev_ioctl_usage(struct hiddev *hiddev, unsigned int cmd, void __user *user_arg)
450{
451 struct hid_device *hid = hiddev->hid;
452 struct hiddev_report_info rinfo;
453 struct hiddev_usage_ref_multi *uref_multi = NULL;
454 struct hiddev_usage_ref *uref;
455 struct hid_report *report;
456 struct hid_field *field;
457 int i;
458
459 uref_multi = kmalloc(sizeof(struct hiddev_usage_ref_multi), GFP_KERNEL);
460 if (!uref_multi)
461 return -ENOMEM;
462 uref = &uref_multi->uref;
463 if (cmd == HIDIOCGUSAGES || cmd == HIDIOCSUSAGES) {
464 if (copy_from_user(uref_multi, user_arg,
465 sizeof(*uref_multi)))
466 goto fault;
467 } else {
468 if (copy_from_user(uref, user_arg, sizeof(*uref)))
469 goto fault;
470 }
471
472 switch (cmd) {
473 case HIDIOCGUCODE:
474 rinfo.report_type = uref->report_type;
475 rinfo.report_id = uref->report_id;
476 if ((report = hiddev_lookup_report(hid, &rinfo)) == NULL)
477 goto inval;
478
479 if (uref->field_index >= report->maxfield)
480 goto inval;
481
482 field = report->field[uref->field_index];
483 if (uref->usage_index >= field->maxusage)
484 goto inval;
485
486 uref->usage_code = field->usage[uref->usage_index].hid;
487
488 if (copy_to_user(user_arg, uref, sizeof(*uref)))
489 goto fault;
490
eb991089 491 goto goodreturn;
cf2a299e
JD
492
493 default:
494 if (cmd != HIDIOCGUSAGE &&
495 cmd != HIDIOCGUSAGES &&
496 uref->report_type == HID_REPORT_TYPE_INPUT)
497 goto inval;
498
499 if (uref->report_id == HID_REPORT_ID_UNKNOWN) {
500 field = hiddev_lookup_usage(hid, uref);
501 if (field == NULL)
502 goto inval;
503 } else {
504 rinfo.report_type = uref->report_type;
505 rinfo.report_id = uref->report_id;
506 if ((report = hiddev_lookup_report(hid, &rinfo)) == NULL)
507 goto inval;
508
509 if (uref->field_index >= report->maxfield)
510 goto inval;
511
512 field = report->field[uref->field_index];
513
514 if (cmd == HIDIOCGCOLLECTIONINDEX) {
515 if (uref->usage_index >= field->maxusage)
516 goto inval;
517 } else if (uref->usage_index >= field->report_count)
518 goto inval;
519
520 else if ((cmd == HIDIOCGUSAGES || cmd == HIDIOCSUSAGES) &&
521 (uref_multi->num_values > HID_MAX_MULTI_USAGES ||
522 uref->usage_index + uref_multi->num_values > field->report_count))
523 goto inval;
ac065bf2 524 }
cf2a299e
JD
525
526 switch (cmd) {
527 case HIDIOCGUSAGE:
528 uref->value = field->value[uref->usage_index];
529 if (copy_to_user(user_arg, uref, sizeof(*uref)))
530 goto fault;
531 goto goodreturn;
532
533 case HIDIOCSUSAGE:
534 field->value[uref->usage_index] = uref->value;
535 goto goodreturn;
536
537 case HIDIOCGCOLLECTIONINDEX:
4859484b 538 i = field->usage[uref->usage_index].collection_index;
cf2a299e 539 kfree(uref_multi);
4859484b 540 return i;
cf2a299e
JD
541 case HIDIOCGUSAGES:
542 for (i = 0; i < uref_multi->num_values; i++)
543 uref_multi->values[i] =
544 field->value[uref->usage_index + i];
545 if (copy_to_user(user_arg, uref_multi,
546 sizeof(*uref_multi)))
547 goto fault;
548 goto goodreturn;
549 case HIDIOCSUSAGES:
550 for (i = 0; i < uref_multi->num_values; i++)
551 field->value[uref->usage_index + i] =
552 uref_multi->values[i];
553 goto goodreturn;
554 }
555
556goodreturn:
557 kfree(uref_multi);
558 return 0;
559fault:
560 kfree(uref_multi);
561 return -EFAULT;
562inval:
563 kfree(uref_multi);
564 return -EINVAL;
565 }
566}
567
568static noinline int hiddev_ioctl_string(struct hiddev *hiddev, unsigned int cmd, void __user *user_arg)
569{
570 struct hid_device *hid = hiddev->hid;
571 struct usb_device *dev = hid_to_usb_dev(hid);
572 int idx, len;
573 char *buf;
574
575 if (get_user(idx, (int __user *)user_arg))
576 return -EFAULT;
577
578 if ((buf = kmalloc(HID_STRING_SIZE, GFP_KERNEL)) == NULL)
579 return -ENOMEM;
580
581 if ((len = usb_string(dev, idx, buf, HID_STRING_SIZE-1)) < 0) {
582 kfree(buf);
583 return -EINVAL;
584 }
585
586 if (copy_to_user(user_arg+sizeof(int), buf, len+1)) {
587 kfree(buf);
588 return -EFAULT;
589 }
590
591 kfree(buf);
592
593 return len;
594}
595
7961df16 596static long hiddev_ioctl(struct file *file, unsigned int cmd, unsigned long arg)
1da177e4
LT
597{
598 struct hiddev_list *list = file->private_data;
599 struct hiddev *hiddev = list->hiddev;
1a8e8fab 600 struct hid_device *hid;
1da177e4
LT
601 struct hiddev_collection_info cinfo;
602 struct hiddev_report_info rinfo;
603 struct hiddev_field_info finfo;
1da177e4
LT
604 struct hiddev_devinfo dinfo;
605 struct hid_report *report;
606 struct hid_field *field;
607 void __user *user_arg = (void __user *)arg;
33d6eb57 608 int i, r = -EINVAL;
1a8e8fab 609
7961df16 610 /* Called without BKL by compat methods so no BKL taken */
1da177e4 611
33d6eb57
VB
612 mutex_lock(&hiddev->existancelock);
613 if (!hiddev->exist) {
614 r = -ENODEV;
615 goto ret_unlock;
616 }
617
618 hid = hiddev->hid;
1da177e4
LT
619
620 switch (cmd) {
621
622 case HIDIOCGVERSION:
33d6eb57
VB
623 r = put_user(HID_VERSION, (int __user *)arg) ?
624 -EFAULT : 0;
625 break;
1da177e4
LT
626
627 case HIDIOCAPPLICATION:
d339f61d 628 if (arg >= hid->maxapplication)
33d6eb57 629 break;
1da177e4
LT
630
631 for (i = 0; i < hid->maxcollection; i++)
05f091ab 632 if (hid->collection[i].type ==
1da177e4
LT
633 HID_COLLECTION_APPLICATION && arg-- == 0)
634 break;
05f091ab 635
33d6eb57 636 if (i < hid->maxcollection)
1a8e8fab 637 r = hid->collection[i].usage;
33d6eb57 638 break;
1da177e4
LT
639
640 case HIDIOCGDEVINFO:
33d6eb57
VB
641 {
642 struct usb_device *dev = hid_to_usb_dev(hid);
643 struct usbhid_device *usbhid = hid->driver_data;
644
9561f7fa
DC
645 memset(&dinfo, 0, sizeof(dinfo));
646
33d6eb57
VB
647 dinfo.bustype = BUS_USB;
648 dinfo.busnum = dev->bus->busnum;
649 dinfo.devnum = dev->devnum;
650 dinfo.ifnum = usbhid->ifnum;
651 dinfo.vendor = le16_to_cpu(dev->descriptor.idVendor);
652 dinfo.product = le16_to_cpu(dev->descriptor.idProduct);
653 dinfo.version = le16_to_cpu(dev->descriptor.bcdDevice);
654 dinfo.num_applications = hid->maxapplication;
655
656 r = copy_to_user(user_arg, &dinfo, sizeof(dinfo)) ?
657 -EFAULT : 0;
658 break;
1a8e8fab
VB
659 }
660
1da177e4 661 case HIDIOCGFLAG:
33d6eb57
VB
662 r = put_user(list->flags, (int __user *)arg) ?
663 -EFAULT : 0;
664 break;
1da177e4
LT
665
666 case HIDIOCSFLAG:
667 {
668 int newflags;
33d6eb57
VB
669
670 if (get_user(newflags, (int __user *)arg)) {
671 r = -EFAULT;
672 break;
673 }
1da177e4
LT
674
675 if ((newflags & ~HIDDEV_FLAGS) != 0 ||
676 ((newflags & HIDDEV_FLAG_REPORT) != 0 &&
677 (newflags & HIDDEV_FLAG_UREF) == 0))
33d6eb57 678 break;
1da177e4
LT
679
680 list->flags = newflags;
681
33d6eb57
VB
682 r = 0;
683 break;
1da177e4
LT
684 }
685
686 case HIDIOCGSTRING:
33d6eb57
VB
687 r = hiddev_ioctl_string(hiddev, cmd, user_arg);
688 break;
1da177e4
LT
689
690 case HIDIOCINITREPORT:
4916b3a5 691 usbhid_init_reports(hid);
33d6eb57
VB
692 r = 0;
693 break;
1da177e4
LT
694
695 case HIDIOCGREPORT:
33d6eb57
VB
696 if (copy_from_user(&rinfo, user_arg, sizeof(rinfo))) {
697 r = -EFAULT;
698 break;
699 }
1da177e4
LT
700
701 if (rinfo.report_type == HID_REPORT_TYPE_OUTPUT)
33d6eb57 702 break;
1a8e8fab 703
1a8e8fab 704 report = hiddev_lookup_report(hid, &rinfo);
33d6eb57
VB
705 if (report == NULL)
706 break;
1a8e8fab 707
d8814272 708 hid_hw_request(hid, report, HID_REQ_GET_REPORT);
1a8e8fab 709 usbhid_wait_io(hid);
1da177e4 710
33d6eb57
VB
711 r = 0;
712 break;
1da177e4
LT
713
714 case HIDIOCSREPORT:
33d6eb57
VB
715 if (copy_from_user(&rinfo, user_arg, sizeof(rinfo))) {
716 r = -EFAULT;
717 break;
718 }
1da177e4
LT
719
720 if (rinfo.report_type == HID_REPORT_TYPE_INPUT)
33d6eb57 721 break;
1a8e8fab 722
1a8e8fab 723 report = hiddev_lookup_report(hid, &rinfo);
33d6eb57
VB
724 if (report == NULL)
725 break;
1a8e8fab 726
d8814272 727 hid_hw_request(hid, report, HID_REQ_SET_REPORT);
1a8e8fab 728 usbhid_wait_io(hid);
1da177e4 729
33d6eb57
VB
730 r = 0;
731 break;
1da177e4
LT
732
733 case HIDIOCGREPORTINFO:
33d6eb57
VB
734 if (copy_from_user(&rinfo, user_arg, sizeof(rinfo))) {
735 r = -EFAULT;
736 break;
1a8e8fab
VB
737 }
738
1a8e8fab 739 report = hiddev_lookup_report(hid, &rinfo);
33d6eb57
VB
740 if (report == NULL)
741 break;
1da177e4
LT
742
743 rinfo.num_fields = report->maxfield;
1da177e4 744
33d6eb57
VB
745 r = copy_to_user(user_arg, &rinfo, sizeof(rinfo)) ?
746 -EFAULT : 0;
747 break;
1da177e4
LT
748
749 case HIDIOCGFIELDINFO:
33d6eb57
VB
750 if (copy_from_user(&finfo, user_arg, sizeof(finfo))) {
751 r = -EFAULT;
752 break;
753 }
754
1da177e4
LT
755 rinfo.report_type = finfo.report_type;
756 rinfo.report_id = finfo.report_id;
1da177e4 757
1a8e8fab 758 report = hiddev_lookup_report(hid, &rinfo);
33d6eb57
VB
759 if (report == NULL)
760 break;
1a8e8fab 761
33d6eb57
VB
762 if (finfo.field_index >= report->maxfield)
763 break;
1da177e4
LT
764
765 field = report->field[finfo.field_index];
766 memset(&finfo, 0, sizeof(finfo));
767 finfo.report_type = rinfo.report_type;
768 finfo.report_id = rinfo.report_id;
769 finfo.field_index = field->report_count - 1;
770 finfo.maxusage = field->maxusage;
771 finfo.flags = field->flags;
772 finfo.physical = field->physical;
773 finfo.logical = field->logical;
774 finfo.application = field->application;
775 finfo.logical_minimum = field->logical_minimum;
776 finfo.logical_maximum = field->logical_maximum;
777 finfo.physical_minimum = field->physical_minimum;
778 finfo.physical_maximum = field->physical_maximum;
779 finfo.unit_exponent = field->unit_exponent;
780 finfo.unit = field->unit;
1da177e4 781
33d6eb57
VB
782 r = copy_to_user(user_arg, &finfo, sizeof(finfo)) ?
783 -EFAULT : 0;
784 break;
1da177e4
LT
785
786 case HIDIOCGUCODE:
cf2a299e 787 /* fall through */
1da177e4
LT
788 case HIDIOCGUSAGE:
789 case HIDIOCSUSAGE:
790 case HIDIOCGUSAGES:
791 case HIDIOCSUSAGES:
792 case HIDIOCGCOLLECTIONINDEX:
33d6eb57
VB
793 r = hiddev_ioctl_usage(hiddev, cmd, user_arg);
794 break;
1da177e4
LT
795
796 case HIDIOCGCOLLECTIONINFO:
33d6eb57
VB
797 if (copy_from_user(&cinfo, user_arg, sizeof(cinfo))) {
798 r = -EFAULT;
799 break;
1a8e8fab
VB
800 }
801
33d6eb57
VB
802 if (cinfo.index >= hid->maxcollection)
803 break;
1da177e4
LT
804
805 cinfo.type = hid->collection[cinfo.index].type;
806 cinfo.usage = hid->collection[cinfo.index].usage;
807 cinfo.level = hid->collection[cinfo.index].level;
808
33d6eb57
VB
809 r = copy_to_user(user_arg, &cinfo, sizeof(cinfo)) ?
810 -EFAULT : 0;
811 break;
1da177e4
LT
812
813 default:
1da177e4 814 if (_IOC_TYPE(cmd) != 'H' || _IOC_DIR(cmd) != _IOC_READ)
33d6eb57 815 break;
1da177e4
LT
816
817 if (_IOC_NR(cmd) == _IOC_NR(HIDIOCGNAME(0))) {
dd2ed487 818 int len = strlen(hid->name) + 1;
1da177e4
LT
819 if (len > _IOC_SIZE(cmd))
820 len = _IOC_SIZE(cmd);
1a8e8fab 821 r = copy_to_user(user_arg, hid->name, len) ?
1da177e4 822 -EFAULT : len;
33d6eb57 823 break;
1da177e4
LT
824 }
825
826 if (_IOC_NR(cmd) == _IOC_NR(HIDIOCGPHYS(0))) {
dd2ed487 827 int len = strlen(hid->phys) + 1;
1da177e4
LT
828 if (len > _IOC_SIZE(cmd))
829 len = _IOC_SIZE(cmd);
1a8e8fab 830 r = copy_to_user(user_arg, hid->phys, len) ?
1da177e4 831 -EFAULT : len;
33d6eb57 832 break;
1da177e4
LT
833 }
834 }
33d6eb57
VB
835
836ret_unlock:
837 mutex_unlock(&hiddev->existancelock);
838 return r;
1da177e4
LT
839}
840
bb6c8d8f
PL
841#ifdef CONFIG_COMPAT
842static long hiddev_compat_ioctl(struct file *file, unsigned int cmd, unsigned long arg)
843{
88af45ba 844 return hiddev_ioctl(file, cmd, (unsigned long)compat_ptr(arg));
bb6c8d8f
PL
845}
846#endif
847
066202dd 848static const struct file_operations hiddev_fops = {
1da177e4
LT
849 .owner = THIS_MODULE,
850 .read = hiddev_read,
851 .write = hiddev_write,
852 .poll = hiddev_poll,
853 .open = hiddev_open,
854 .release = hiddev_release,
7961df16 855 .unlocked_ioctl = hiddev_ioctl,
1da177e4 856 .fasync = hiddev_fasync,
bb6c8d8f
PL
857#ifdef CONFIG_COMPAT
858 .compat_ioctl = hiddev_compat_ioctl,
859#endif
6038f373 860 .llseek = noop_llseek,
1da177e4
LT
861};
862
2c9ede55 863static char *hiddev_devnode(struct device *dev, umode_t *mode)
f7a386c5
KS
864{
865 return kasprintf(GFP_KERNEL, "usb/%s", dev_name(dev));
866}
867
1da177e4 868static struct usb_class_driver hiddev_class = {
d6e5bcf4 869 .name = "hiddev%d",
e454cea2 870 .devnode = hiddev_devnode,
1da177e4 871 .fops = &hiddev_fops,
05f091ab 872 .minor_base = HIDDEV_MINOR_BASE,
1da177e4
LT
873};
874
875/*
876 * This is where hid.c calls us to connect a hid device to the hiddev driver
877 */
93c10132 878int hiddev_connect(struct hid_device *hid, unsigned int force)
1da177e4
LT
879{
880 struct hiddev *hiddev;
4916b3a5 881 struct usbhid_device *usbhid = hid->driver_data;
1da177e4
LT
882 int retval;
883
93c10132
JS
884 if (!force) {
885 unsigned int i;
886 for (i = 0; i < hid->maxcollection; i++)
887 if (hid->collection[i].type ==
888 HID_COLLECTION_APPLICATION &&
889 !IS_INPUT_APPLICATION(hid->collection[i].usage))
890 break;
1da177e4 891
93c10132
JS
892 if (i == hid->maxcollection)
893 return -1;
894 }
1da177e4 895
bbdb7daf 896 if (!(hiddev = kzalloc(sizeof(struct hiddev), GFP_KERNEL)))
1da177e4 897 return -1;
1da177e4 898
1da177e4 899 init_waitqueue_head(&hiddev->wait);
826d5982 900 INIT_LIST_HEAD(&hiddev->list);
cdcb44e8 901 spin_lock_init(&hiddev->list_lock);
07903407 902 mutex_init(&hiddev->existancelock);
76052749 903 hid->hiddev = hiddev;
1da177e4
LT
904 hiddev->hid = hid;
905 hiddev->exist = 1;
07903407
ON
906 retval = usb_register_dev(usbhid->intf, &hiddev_class);
907 if (retval) {
4291ee30 908 hid_err(hid, "Not able to get a minor for this device\n");
76052749 909 hid->hiddev = NULL;
07903407
ON
910 kfree(hiddev);
911 return -1;
07903407 912 }
1da177e4
LT
913 return 0;
914}
915
916/*
917 * This is where hid.c calls us to disconnect a hiddev device from the
918 * corresponding hid device (usually because the usb device has disconnected)
919 */
920static struct usb_class_driver hiddev_class;
921void hiddev_disconnect(struct hid_device *hid)
922{
923 struct hiddev *hiddev = hid->hiddev;
4916b3a5 924 struct usbhid_device *usbhid = hid->driver_data;
1da177e4 925
ba18311d
ML
926 usb_deregister_dev(usbhid->intf, &hiddev_class);
927
07903407 928 mutex_lock(&hiddev->existancelock);
1da177e4
LT
929 hiddev->exist = 0;
930
1da177e4 931 if (hiddev->open) {
7f77897e 932 mutex_unlock(&hiddev->existancelock);
4916b3a5 933 usbhid_close(hiddev->hid);
1da177e4
LT
934 wake_up_interruptible(&hiddev->wait);
935 } else {
7f77897e 936 mutex_unlock(&hiddev->existancelock);
1da177e4
LT
937 kfree(hiddev);
938 }
939}