]> git.proxmox.com Git - mirror_ubuntu-disco-kernel.git/blame - drivers/usb/core/devio.c
Merge tag 'for-linus-20190118' of git://git.kernel.dk/linux-block
[mirror_ubuntu-disco-kernel.git] / drivers / usb / core / devio.c
CommitLineData
5fd54ace 1// SPDX-License-Identifier: GPL-2.0+
1da177e4
LT
2/*****************************************************************************/
3
4/*
5 * devio.c -- User space communication with USB devices.
6 *
7 * Copyright (C) 1999-2000 Thomas Sailer (sailer@ife.ee.ethz.ch)
8 *
1da177e4
LT
9 * This file implements the usbfs/x/y files, where
10 * x is the bus number and y the device number.
11 *
12 * It allows user space programs/"drivers" to communicate directly
13 * with USB devices without intervening kernel driver.
14 *
15 * Revision history
16 * 22.12.1999 0.1 Initial release (split from proc_usb.c)
17 * 04.01.2000 0.2 Turned into its own filesystem
46113830
HW
18 * 30.09.2005 0.3 Fix user-triggerable oops in async URB delivery
19 * (CAN-2005-3055)
1da177e4
LT
20 */
21
22/*****************************************************************************/
23
24#include <linux/fs.h>
25#include <linux/mm.h>
3f07c014 26#include <linux/sched/signal.h>
1da177e4 27#include <linux/slab.h>
1da177e4
LT
28#include <linux/signal.h>
29#include <linux/poll.h>
30#include <linux/module.h>
b11b2e1b 31#include <linux/string.h>
1da177e4
LT
32#include <linux/usb.h>
33#include <linux/usbdevice_fs.h>
27729aad 34#include <linux/usb/hcd.h> /* for usbcore internals */
fbf82fd2 35#include <linux/cdev.h>
a7b986b3 36#include <linux/notifier.h>
7a01955f 37#include <linux/security.h>
d178bc3a 38#include <linux/user_namespace.h>
3d97ff63 39#include <linux/scatterlist.h>
e6889b31 40#include <linux/uaccess.h>
f7d34b44 41#include <linux/dma-mapping.h>
1da177e4
LT
42#include <asm/byteorder.h>
43#include <linux/moduleparam.h>
44
1da177e4
LT
45#include "usb.h"
46
fbf82fd2 47#define USB_MAXBUS 64
fa86ad0b 48#define USB_DEVICE_MAX (USB_MAXBUS * 128)
3d97ff63 49#define USB_SG_SIZE 16384 /* split-size for large txs */
fbf82fd2 50
4a2a8a2c
AS
51/* Mutual exclusion for removal, open, and release */
52DEFINE_MUTEX(usbfs_mutex);
53
9b6f0c4b 54struct usb_dev_state {
cd9f0375
AS
55 struct list_head list; /* state list */
56 struct usb_device *dev;
57 struct file *file;
58 spinlock_t lock; /* protects the async urb lists */
59 struct list_head async_pending;
60 struct list_head async_completed;
f7d34b44 61 struct list_head memory_list;
cd9f0375
AS
62 wait_queue_head_t wait; /* wake up if a request completed */
63 unsigned int discsignr;
64 struct pid *disc_pid;
d178bc3a 65 const struct cred *cred;
cd9f0375
AS
66 void __user *disccontext;
67 unsigned long ifclaimed;
01c6460f 68 u32 disabled_bulk_eps;
d883f52e
RG
69 bool privileges_dropped;
70 unsigned long interface_allowed_mask;
cd9f0375
AS
71};
72
f7d34b44
SG
73struct usb_memory {
74 struct list_head memlist;
75 int vma_use_count;
76 int urb_use_count;
77 u32 size;
78 void *mem;
79 dma_addr_t dma_handle;
80 unsigned long vm_start;
81 struct usb_dev_state *ps;
82};
83
1da177e4
LT
84struct async {
85 struct list_head asynclist;
9b6f0c4b 86 struct usb_dev_state *ps;
2425c08b 87 struct pid *pid;
d178bc3a 88 const struct cred *cred;
1da177e4
LT
89 unsigned int signr;
90 unsigned int ifnum;
91 void __user *userbuffer;
92 void __user *userurb;
93 struct urb *urb;
f7d34b44 94 struct usb_memory *usbm;
add1aaea 95 unsigned int mem_usage;
e015268d 96 int status;
01c6460f
AS
97 u8 bulk_addr;
98 u8 bulk_status;
1da177e4
LT
99};
100
90ab5ee9 101static bool usbfs_snoop;
04e482ff
GKH
102module_param(usbfs_snoop, bool, S_IRUGO | S_IWUSR);
103MODULE_PARM_DESC(usbfs_snoop, "true to log all usbfs traffic");
1da177e4 104
0290cc9f
AS
105static unsigned usbfs_snoop_max = 65536;
106module_param(usbfs_snoop_max, uint, S_IRUGO | S_IWUSR);
107MODULE_PARM_DESC(usbfs_snoop_max,
108 "maximum number of bytes to print while snooping");
109
1da177e4
LT
110#define snoop(dev, format, arg...) \
111 do { \
112 if (usbfs_snoop) \
f355e830 113 dev_info(dev, format, ## arg); \
1da177e4
LT
114 } while (0)
115
4c6e8971
AS
116enum snoop_when {
117 SUBMIT, COMPLETE
118};
fad21bdf 119
4c6e8971 120#define USB_DEVICE_DEV MKDEV(USB_DEVICE_MAJOR, 0)
1da177e4 121
add1aaea 122/* Limit on the total amount of memory we can allocate for transfers */
1129d270 123static u32 usbfs_memory_mb = 16;
3f5eb8d5
AS
124module_param(usbfs_memory_mb, uint, 0644);
125MODULE_PARM_DESC(usbfs_memory_mb,
126 "maximum MB allowed for usbfs buffers (0 = no limit)");
127
57999d11
DC
128/* Hard limit, necessary to avoid arithmetic overflow */
129#define USBFS_XFER_MAX (UINT_MAX / 2 - 1000000)
130
1129d270 131static atomic64_t usbfs_memory_usage; /* Total memory currently allocated */
add1aaea
AS
132
133/* Check whether it's okay to allocate more memory for a transfer */
1129d270 134static int usbfs_increase_memory_usage(u64 amount)
add1aaea 135{
1129d270 136 u64 lim;
3f5eb8d5 137
6aa7de05 138 lim = READ_ONCE(usbfs_memory_mb);
1129d270 139 lim <<= 20;
3f5eb8d5 140
1129d270
MB
141 atomic64_add(amount, &usbfs_memory_usage);
142
143 if (lim > 0 && atomic64_read(&usbfs_memory_usage) > lim) {
144 atomic64_sub(amount, &usbfs_memory_usage);
145 return -ENOMEM;
146 }
147
148 return 0;
add1aaea
AS
149}
150
151/* Memory for a transfer is being deallocated */
1129d270 152static void usbfs_decrease_memory_usage(u64 amount)
add1aaea 153{
1129d270 154 atomic64_sub(amount, &usbfs_memory_usage);
add1aaea 155}
4c6e8971 156
9b6f0c4b 157static int connected(struct usb_dev_state *ps)
1da177e4 158{
349710c3
AS
159 return (!list_empty(&ps->list) &&
160 ps->dev->state != USB_STATE_NOTATTACHED);
1da177e4
LT
161}
162
f7d34b44
SG
163static void dec_usb_memory_use_count(struct usb_memory *usbm, int *count)
164{
165 struct usb_dev_state *ps = usbm->ps;
166 unsigned long flags;
167
168 spin_lock_irqsave(&ps->lock, flags);
169 --*count;
170 if (usbm->urb_use_count == 0 && usbm->vma_use_count == 0) {
171 list_del(&usbm->memlist);
172 spin_unlock_irqrestore(&ps->lock, flags);
173
174 usb_free_coherent(ps->dev, usbm->size, usbm->mem,
175 usbm->dma_handle);
176 usbfs_decrease_memory_usage(
177 usbm->size + sizeof(struct usb_memory));
178 kfree(usbm);
179 } else {
180 spin_unlock_irqrestore(&ps->lock, flags);
181 }
182}
183
184static void usbdev_vm_open(struct vm_area_struct *vma)
185{
186 struct usb_memory *usbm = vma->vm_private_data;
187 unsigned long flags;
188
189 spin_lock_irqsave(&usbm->ps->lock, flags);
190 ++usbm->vma_use_count;
191 spin_unlock_irqrestore(&usbm->ps->lock, flags);
192}
193
194static void usbdev_vm_close(struct vm_area_struct *vma)
195{
196 struct usb_memory *usbm = vma->vm_private_data;
197
198 dec_usb_memory_use_count(usbm, &usbm->vma_use_count);
199}
200
b64d47ae 201static const struct vm_operations_struct usbdev_vm_ops = {
f7d34b44
SG
202 .open = usbdev_vm_open,
203 .close = usbdev_vm_close
204};
205
206static int usbdev_mmap(struct file *file, struct vm_area_struct *vma)
207{
208 struct usb_memory *usbm = NULL;
209 struct usb_dev_state *ps = file->private_data;
210 size_t size = vma->vm_end - vma->vm_start;
211 void *mem;
212 unsigned long flags;
213 dma_addr_t dma_handle;
214 int ret;
215
216 ret = usbfs_increase_memory_usage(size + sizeof(struct usb_memory));
217 if (ret)
218 goto error;
219
220 usbm = kzalloc(sizeof(struct usb_memory), GFP_KERNEL);
221 if (!usbm) {
222 ret = -ENOMEM;
223 goto error_decrease_mem;
224 }
225
70f7ca9a
JS
226 mem = usb_alloc_coherent(ps->dev, size, GFP_USER | __GFP_NOWARN,
227 &dma_handle);
f7d34b44
SG
228 if (!mem) {
229 ret = -ENOMEM;
230 goto error_free_usbm;
231 }
232
233 memset(mem, 0, size);
234
235 usbm->mem = mem;
236 usbm->dma_handle = dma_handle;
237 usbm->size = size;
238 usbm->ps = ps;
239 usbm->vm_start = vma->vm_start;
240 usbm->vma_use_count = 1;
241 INIT_LIST_HEAD(&usbm->memlist);
242
243 if (remap_pfn_range(vma, vma->vm_start,
244 virt_to_phys(usbm->mem) >> PAGE_SHIFT,
245 size, vma->vm_page_prot) < 0) {
246 dec_usb_memory_use_count(usbm, &usbm->vma_use_count);
247 return -EAGAIN;
248 }
249
250 vma->vm_flags |= VM_IO;
251 vma->vm_flags |= (VM_DONTEXPAND | VM_DONTDUMP);
252 vma->vm_ops = &usbdev_vm_ops;
253 vma->vm_private_data = usbm;
254
255 spin_lock_irqsave(&ps->lock, flags);
256 list_add_tail(&usbm->memlist, &ps->memory_list);
257 spin_unlock_irqrestore(&ps->lock, flags);
258
259 return 0;
260
261error_free_usbm:
262 kfree(usbm);
263error_decrease_mem:
264 usbfs_decrease_memory_usage(size + sizeof(struct usb_memory));
265error:
266 return ret;
267}
268
04e482ff
GKH
269static ssize_t usbdev_read(struct file *file, char __user *buf, size_t nbytes,
270 loff_t *ppos)
1da177e4 271{
9b6f0c4b 272 struct usb_dev_state *ps = file->private_data;
1da177e4
LT
273 struct usb_device *dev = ps->dev;
274 ssize_t ret = 0;
275 unsigned len;
276 loff_t pos;
277 int i;
278
279 pos = *ppos;
280 usb_lock_device(dev);
349710c3 281 if (!connected(ps)) {
1da177e4
LT
282 ret = -ENODEV;
283 goto err;
284 } else if (pos < 0) {
285 ret = -EINVAL;
286 goto err;
287 }
288
289 if (pos < sizeof(struct usb_device_descriptor)) {
04e482ff
GKH
290 /* 18 bytes - fits on the stack */
291 struct usb_device_descriptor temp_desc;
8781ba0a
ON
292
293 memcpy(&temp_desc, &dev->descriptor, sizeof(dev->descriptor));
9fcd5c32
AM
294 le16_to_cpus(&temp_desc.bcdUSB);
295 le16_to_cpus(&temp_desc.idVendor);
296 le16_to_cpus(&temp_desc.idProduct);
297 le16_to_cpus(&temp_desc.bcdDevice);
1da177e4
LT
298
299 len = sizeof(struct usb_device_descriptor) - pos;
300 if (len > nbytes)
301 len = nbytes;
8781ba0a 302 if (copy_to_user(buf, ((char *)&temp_desc) + pos, len)) {
1da177e4
LT
303 ret = -EFAULT;
304 goto err;
305 }
1da177e4
LT
306
307 *ppos += len;
308 buf += len;
309 nbytes -= len;
310 ret += len;
311 }
312
313 pos = sizeof(struct usb_device_descriptor);
314 for (i = 0; nbytes && i < dev->descriptor.bNumConfigurations; i++) {
315 struct usb_config_descriptor *config =
316 (struct usb_config_descriptor *)dev->rawdescriptors[i];
317 unsigned int length = le16_to_cpu(config->wTotalLength);
318
319 if (*ppos < pos + length) {
320
321 /* The descriptor may claim to be longer than it
322 * really is. Here is the actual allocated length. */
323 unsigned alloclen =
324 le16_to_cpu(dev->config[i].desc.wTotalLength);
325
326 len = length - (*ppos - pos);
327 if (len > nbytes)
328 len = nbytes;
329
330 /* Simply don't write (skip over) unallocated parts */
331 if (alloclen > (*ppos - pos)) {
332 alloclen -= (*ppos - pos);
333 if (copy_to_user(buf,
334 dev->rawdescriptors[i] + (*ppos - pos),
335 min(len, alloclen))) {
336 ret = -EFAULT;
337 goto err;
338 }
339 }
340
341 *ppos += len;
342 buf += len;
343 nbytes -= len;
344 ret += len;
345 }
346
347 pos += length;
348 }
349
350err:
351 usb_unlock_device(dev);
352 return ret;
353}
354
355/*
356 * async list handling
357 */
358
359static struct async *alloc_async(unsigned int numisoframes)
360{
dd95b814 361 struct async *as;
0a1ef3b5 362
dd95b814 363 as = kzalloc(sizeof(struct async), GFP_KERNEL);
04e482ff
GKH
364 if (!as)
365 return NULL;
1da177e4
LT
366 as->urb = usb_alloc_urb(numisoframes, GFP_KERNEL);
367 if (!as->urb) {
368 kfree(as);
369 return NULL;
370 }
04e482ff 371 return as;
1da177e4
LT
372}
373
374static void free_async(struct async *as)
375{
3d97ff63
HG
376 int i;
377
2425c08b 378 put_pid(as->pid);
1b41c832
SS
379 if (as->cred)
380 put_cred(as->cred);
3d97ff63
HG
381 for (i = 0; i < as->urb->num_sgs; i++) {
382 if (sg_page(&as->urb->sg[i]))
383 kfree(sg_virt(&as->urb->sg[i]));
384 }
f7d34b44 385
3d97ff63 386 kfree(as->urb->sg);
f7d34b44
SG
387 if (as->usbm == NULL)
388 kfree(as->urb->transfer_buffer);
389 else
390 dec_usb_memory_use_count(as->usbm, &as->usbm->urb_use_count);
391
6fd19f4b 392 kfree(as->urb->setup_packet);
1da177e4 393 usb_free_urb(as->urb);
add1aaea 394 usbfs_decrease_memory_usage(as->mem_usage);
6fd19f4b 395 kfree(as);
1da177e4
LT
396}
397
d34d9721 398static void async_newpending(struct async *as)
1da177e4 399{
9b6f0c4b 400 struct usb_dev_state *ps = as->ps;
04e482ff
GKH
401 unsigned long flags;
402
403 spin_lock_irqsave(&ps->lock, flags);
404 list_add_tail(&as->asynclist, &ps->async_pending);
405 spin_unlock_irqrestore(&ps->lock, flags);
1da177e4
LT
406}
407
d34d9721 408static void async_removepending(struct async *as)
1da177e4 409{
9b6f0c4b 410 struct usb_dev_state *ps = as->ps;
04e482ff
GKH
411 unsigned long flags;
412
413 spin_lock_irqsave(&ps->lock, flags);
414 list_del_init(&as->asynclist);
415 spin_unlock_irqrestore(&ps->lock, flags);
1da177e4
LT
416}
417
9b6f0c4b 418static struct async *async_getcompleted(struct usb_dev_state *ps)
1da177e4 419{
04e482ff
GKH
420 unsigned long flags;
421 struct async *as = NULL;
422
423 spin_lock_irqsave(&ps->lock, flags);
424 if (!list_empty(&ps->async_completed)) {
425 as = list_entry(ps->async_completed.next, struct async,
426 asynclist);
427 list_del_init(&as->asynclist);
428 }
429 spin_unlock_irqrestore(&ps->lock, flags);
430 return as;
1da177e4
LT
431}
432
9b6f0c4b 433static struct async *async_getpending(struct usb_dev_state *ps,
04e482ff 434 void __user *userurb)
1da177e4 435{
04e482ff 436 struct async *as;
1da177e4 437
1da177e4
LT
438 list_for_each_entry(as, &ps->async_pending, asynclist)
439 if (as->userurb == userurb) {
440 list_del_init(&as->asynclist);
1da177e4
LT
441 return as;
442 }
4e09dcf2 443
04e482ff 444 return NULL;
1da177e4
LT
445}
446
4c6e8971
AS
447static void snoop_urb(struct usb_device *udev,
448 void __user *userurb, int pipe, unsigned length,
0880aef4
CF
449 int timeout_or_status, enum snoop_when when,
450 unsigned char *data, unsigned data_len)
e639dd3f 451{
4c6e8971
AS
452 static const char *types[] = {"isoc", "int", "ctrl", "bulk"};
453 static const char *dirs[] = {"out", "in"};
454 int ep;
455 const char *t, *d;
e639dd3f
GKH
456
457 if (!usbfs_snoop)
458 return;
459
4c6e8971
AS
460 ep = usb_pipeendpoint(pipe);
461 t = types[usb_pipetype(pipe)];
462 d = dirs[!!usb_pipein(pipe)];
463
464 if (userurb) { /* Async */
465 if (when == SUBMIT)
2f964780 466 dev_info(&udev->dev, "userurb %pK, ep%d %s-%s, "
4c6e8971
AS
467 "length %u\n",
468 userurb, ep, t, d, length);
469 else
2f964780 470 dev_info(&udev->dev, "userurb %pK, ep%d %s-%s, "
4c6e8971
AS
471 "actual_length %u status %d\n",
472 userurb, ep, t, d, length,
473 timeout_or_status);
474 } else {
475 if (when == SUBMIT)
476 dev_info(&udev->dev, "ep%d %s-%s, length %u, "
477 "timeout %d\n",
478 ep, t, d, length, timeout_or_status);
479 else
480 dev_info(&udev->dev, "ep%d %s-%s, actual_length %u, "
481 "status %d\n",
482 ep, t, d, length, timeout_or_status);
483 }
0880aef4 484
0290cc9f 485 data_len = min(data_len, usbfs_snoop_max);
0880aef4
CF
486 if (data && data_len > 0) {
487 print_hex_dump(KERN_DEBUG, "data: ", DUMP_PREFIX_NONE, 32, 1,
488 data, data_len, 1);
489 }
e639dd3f
GKH
490}
491
3d97ff63
HG
492static void snoop_urb_data(struct urb *urb, unsigned len)
493{
494 int i, size;
495
0290cc9f
AS
496 len = min(len, usbfs_snoop_max);
497 if (!usbfs_snoop || len == 0)
3d97ff63
HG
498 return;
499
500 if (urb->num_sgs == 0) {
501 print_hex_dump(KERN_DEBUG, "data: ", DUMP_PREFIX_NONE, 32, 1,
502 urb->transfer_buffer, len, 1);
503 return;
504 }
505
506 for (i = 0; i < urb->num_sgs && len; i++) {
507 size = (len > USB_SG_SIZE) ? USB_SG_SIZE : len;
508 print_hex_dump(KERN_DEBUG, "data: ", DUMP_PREFIX_NONE, 32, 1,
509 sg_virt(&urb->sg[i]), size, 1);
510 len -= size;
511 }
512}
513
514static int copy_urb_data_to_user(u8 __user *userbuffer, struct urb *urb)
515{
516 unsigned i, len, size;
517
518 if (urb->number_of_packets > 0) /* Isochronous */
519 len = urb->transfer_buffer_length;
520 else /* Non-Isoc */
521 len = urb->actual_length;
522
523 if (urb->num_sgs == 0) {
524 if (copy_to_user(userbuffer, urb->transfer_buffer, len))
525 return -EFAULT;
526 return 0;
527 }
528
529 for (i = 0; i < urb->num_sgs && len; i++) {
530 size = (len > USB_SG_SIZE) ? USB_SG_SIZE : len;
531 if (copy_to_user(userbuffer, sg_virt(&urb->sg[i]), size))
532 return -EFAULT;
533 userbuffer += size;
534 len -= size;
535 }
536
537 return 0;
538}
539
01c6460f
AS
540#define AS_CONTINUATION 1
541#define AS_UNLINK 2
542
9b6f0c4b 543static void cancel_bulk_urbs(struct usb_dev_state *ps, unsigned bulk_addr)
01c6460f
AS
544__releases(ps->lock)
545__acquires(ps->lock)
546{
4e09dcf2 547 struct urb *urb;
01c6460f
AS
548 struct async *as;
549
550 /* Mark all the pending URBs that match bulk_addr, up to but not
551 * including the first one without AS_CONTINUATION. If such an
552 * URB is encountered then a new transfer has already started so
553 * the endpoint doesn't need to be disabled; otherwise it does.
554 */
555 list_for_each_entry(as, &ps->async_pending, asynclist) {
556 if (as->bulk_addr == bulk_addr) {
557 if (as->bulk_status != AS_CONTINUATION)
558 goto rescan;
559 as->bulk_status = AS_UNLINK;
560 as->bulk_addr = 0;
561 }
562 }
563 ps->disabled_bulk_eps |= (1 << bulk_addr);
564
565 /* Now carefully unlink all the marked pending URBs */
566 rescan:
567 list_for_each_entry(as, &ps->async_pending, asynclist) {
568 if (as->bulk_status == AS_UNLINK) {
569 as->bulk_status = 0; /* Only once */
4e09dcf2
HL
570 urb = as->urb;
571 usb_get_urb(urb);
01c6460f 572 spin_unlock(&ps->lock); /* Allow completions */
4e09dcf2
HL
573 usb_unlink_urb(urb);
574 usb_put_urb(urb);
01c6460f
AS
575 spin_lock(&ps->lock);
576 goto rescan;
577 }
578 }
579}
580
7d12e780 581static void async_completed(struct urb *urb)
1da177e4 582{
04e482ff 583 struct async *as = urb->context;
9b6f0c4b 584 struct usb_dev_state *ps = as->ps;
ae7795bc 585 struct kernel_siginfo sinfo;
516a1a07 586 struct pid *pid = NULL;
d178bc3a 587 const struct cred *cred = NULL;
3f38dace 588 unsigned long flags;
516a1a07 589 int signr;
1da177e4 590
3f38dace 591 spin_lock_irqsave(&ps->lock, flags);
04e482ff 592 list_move_tail(&as->asynclist, &ps->async_completed);
e015268d 593 as->status = urb->status;
516a1a07
ON
594 signr = as->signr;
595 if (signr) {
3b10db2b 596 clear_siginfo(&sinfo);
1da177e4 597 sinfo.si_signo = as->signr;
e015268d 598 sinfo.si_errno = as->status;
1da177e4
LT
599 sinfo.si_code = SI_ASYNCIO;
600 sinfo.si_addr = as->userurb;
aec01c58 601 pid = get_pid(as->pid);
d178bc3a 602 cred = get_cred(as->cred);
1da177e4 603 }
e639dd3f 604 snoop(&urb->dev->dev, "urb complete\n");
4c6e8971 605 snoop_urb(urb->dev, as->userurb, urb->pipe, urb->actual_length,
3d97ff63 606 as->status, COMPLETE, NULL, 0);
83ed07c5 607 if ((urb->transfer_flags & URB_DIR_MASK) == URB_DIR_IN)
3d97ff63
HG
608 snoop_urb_data(urb, urb->actual_length);
609
01c6460f
AS
610 if (as->status < 0 && as->bulk_addr && as->status != -ECONNRESET &&
611 as->status != -ENOENT)
612 cancel_bulk_urbs(ps, as->bulk_addr);
ed62ca2f
DA
613
614 wake_up(&ps->wait);
3f38dace 615 spin_unlock_irqrestore(&ps->lock, flags);
516a1a07 616
aec01c58 617 if (signr) {
6b4f3d01 618 kill_pid_info_as_cred(sinfo.si_signo, &sinfo, pid, cred);
aec01c58 619 put_pid(pid);
d178bc3a 620 put_cred(cred);
aec01c58 621 }
1da177e4
LT
622}
623
9b6f0c4b 624static void destroy_async(struct usb_dev_state *ps, struct list_head *list)
1da177e4 625{
4e09dcf2 626 struct urb *urb;
1da177e4
LT
627 struct async *as;
628 unsigned long flags;
629
630 spin_lock_irqsave(&ps->lock, flags);
631 while (!list_empty(list)) {
632 as = list_entry(list->next, struct async, asynclist);
633 list_del_init(&as->asynclist);
4e09dcf2
HL
634 urb = as->urb;
635 usb_get_urb(urb);
1da177e4
LT
636
637 /* drop the spinlock so the completion handler can run */
638 spin_unlock_irqrestore(&ps->lock, flags);
4e09dcf2
HL
639 usb_kill_urb(urb);
640 usb_put_urb(urb);
1da177e4
LT
641 spin_lock_irqsave(&ps->lock, flags);
642 }
643 spin_unlock_irqrestore(&ps->lock, flags);
1da177e4
LT
644}
645
9b6f0c4b 646static void destroy_async_on_interface(struct usb_dev_state *ps,
04e482ff 647 unsigned int ifnum)
1da177e4
LT
648{
649 struct list_head *p, *q, hitlist;
650 unsigned long flags;
651
652 INIT_LIST_HEAD(&hitlist);
653 spin_lock_irqsave(&ps->lock, flags);
654 list_for_each_safe(p, q, &ps->async_pending)
655 if (ifnum == list_entry(p, struct async, asynclist)->ifnum)
656 list_move_tail(p, &hitlist);
657 spin_unlock_irqrestore(&ps->lock, flags);
658 destroy_async(ps, &hitlist);
659}
660
9b6f0c4b 661static void destroy_all_async(struct usb_dev_state *ps)
1da177e4 662{
04e482ff 663 destroy_async(ps, &ps->async_pending);
1da177e4
LT
664}
665
666/*
667 * interface claims are made only at the request of user level code,
668 * which can also release them (explicitly or by closing files).
669 * they're also undone when devices disconnect.
670 */
671
04e482ff
GKH
672static int driver_probe(struct usb_interface *intf,
673 const struct usb_device_id *id)
1da177e4
LT
674{
675 return -ENODEV;
676}
677
678static void driver_disconnect(struct usb_interface *intf)
679{
9b6f0c4b 680 struct usb_dev_state *ps = usb_get_intfdata(intf);
1da177e4
LT
681 unsigned int ifnum = intf->altsetting->desc.bInterfaceNumber;
682
683 if (!ps)
684 return;
685
686 /* NOTE: this relies on usbcore having canceled and completed
687 * all pending I/O requests; 2.6 does that.
688 */
689
690 if (likely(ifnum < 8*sizeof(ps->ifclaimed)))
691 clear_bit(ifnum, &ps->ifclaimed);
692 else
3b6004f3
GKH
693 dev_warn(&intf->dev, "interface number %u out of range\n",
694 ifnum);
1da177e4 695
04e482ff 696 usb_set_intfdata(intf, NULL);
1da177e4
LT
697
698 /* force async requests to complete */
699 destroy_async_on_interface(ps, ifnum);
700}
701
2e2eb83f
AS
702/* The following routines are merely placeholders. There is no way
703 * to inform a user task about suspend or resumes.
704 */
705static int driver_suspend(struct usb_interface *intf, pm_message_t msg)
706{
707 return 0;
708}
709
710static int driver_resume(struct usb_interface *intf)
711{
712 return 0;
713}
714
1da177e4 715struct usb_driver usbfs_driver = {
1da177e4
LT
716 .name = "usbfs",
717 .probe = driver_probe,
718 .disconnect = driver_disconnect,
2e2eb83f
AS
719 .suspend = driver_suspend,
720 .resume = driver_resume,
1da177e4
LT
721};
722
9b6f0c4b 723static int claimintf(struct usb_dev_state *ps, unsigned int ifnum)
1da177e4
LT
724{
725 struct usb_device *dev = ps->dev;
726 struct usb_interface *intf;
727 int err;
728
729 if (ifnum >= 8*sizeof(ps->ifclaimed))
730 return -EINVAL;
731 /* already claimed */
732 if (test_bit(ifnum, &ps->ifclaimed))
733 return 0;
734
d883f52e
RG
735 if (ps->privileges_dropped &&
736 !test_bit(ifnum, &ps->interface_allowed_mask))
737 return -EACCES;
738
1da177e4
LT
739 intf = usb_ifnum_to_if(dev, ifnum);
740 if (!intf)
741 err = -ENOENT;
742 else
743 err = usb_driver_claim_interface(&usbfs_driver, intf, ps);
1da177e4
LT
744 if (err == 0)
745 set_bit(ifnum, &ps->ifclaimed);
746 return err;
747}
748
9b6f0c4b 749static int releaseintf(struct usb_dev_state *ps, unsigned int ifnum)
1da177e4
LT
750{
751 struct usb_device *dev;
752 struct usb_interface *intf;
753 int err;
754
755 err = -EINVAL;
756 if (ifnum >= 8*sizeof(ps->ifclaimed))
757 return err;
758 dev = ps->dev;
1da177e4
LT
759 intf = usb_ifnum_to_if(dev, ifnum);
760 if (!intf)
761 err = -ENOENT;
762 else if (test_and_clear_bit(ifnum, &ps->ifclaimed)) {
763 usb_driver_release_interface(&usbfs_driver, intf);
764 err = 0;
765 }
1da177e4
LT
766 return err;
767}
768
9b6f0c4b 769static int checkintf(struct usb_dev_state *ps, unsigned int ifnum)
1da177e4
LT
770{
771 if (ps->dev->state != USB_STATE_CONFIGURED)
772 return -EHOSTUNREACH;
773 if (ifnum >= 8*sizeof(ps->ifclaimed))
774 return -EINVAL;
775 if (test_bit(ifnum, &ps->ifclaimed))
776 return 0;
777 /* if not yet claimed, claim it for the driver */
04e482ff
GKH
778 dev_warn(&ps->dev->dev, "usbfs: process %d (%s) did not claim "
779 "interface %u before use\n", task_pid_nr(current),
780 current->comm, ifnum);
1da177e4
LT
781 return claimintf(ps, ifnum);
782}
783
784static int findintfep(struct usb_device *dev, unsigned int ep)
785{
786 unsigned int i, j, e;
04e482ff 787 struct usb_interface *intf;
1da177e4
LT
788 struct usb_host_interface *alts;
789 struct usb_endpoint_descriptor *endpt;
790
791 if (ep & ~(USB_DIR_IN|0xf))
792 return -EINVAL;
793 if (!dev->actconfig)
794 return -ESRCH;
795 for (i = 0; i < dev->actconfig->desc.bNumInterfaces; i++) {
796 intf = dev->actconfig->interface[i];
797 for (j = 0; j < intf->num_altsetting; j++) {
04e482ff 798 alts = &intf->altsetting[j];
1da177e4
LT
799 for (e = 0; e < alts->desc.bNumEndpoints; e++) {
800 endpt = &alts->endpoint[e].desc;
801 if (endpt->bEndpointAddress == ep)
802 return alts->desc.bInterfaceNumber;
803 }
804 }
805 }
04e482ff 806 return -ENOENT;
1da177e4
LT
807}
808
9b6f0c4b 809static int check_ctrlrecip(struct usb_dev_state *ps, unsigned int requesttype,
393cbb51 810 unsigned int request, unsigned int index)
1da177e4
LT
811{
812 int ret = 0;
393cbb51 813 struct usb_host_interface *alt_setting;
1da177e4 814
6da9c990
DV
815 if (ps->dev->state != USB_STATE_UNAUTHENTICATED
816 && ps->dev->state != USB_STATE_ADDRESS
24f8b116 817 && ps->dev->state != USB_STATE_CONFIGURED)
1da177e4
LT
818 return -EHOSTUNREACH;
819 if (USB_TYPE_VENDOR == (USB_TYPE_MASK & requesttype))
820 return 0;
821
393cbb51
MD
822 /*
823 * check for the special corner case 'get_device_id' in the printer
5dc50c35
HG
824 * class specification, which we always want to allow as it is used
825 * to query things like ink level, etc.
393cbb51
MD
826 */
827 if (requesttype == 0xa1 && request == 0) {
828 alt_setting = usb_find_alt_setting(ps->dev->actconfig,
829 index >> 8, index & 0xff);
830 if (alt_setting
831 && alt_setting->desc.bInterfaceClass == USB_CLASS_PRINTER)
5dc50c35 832 return 0;
393cbb51
MD
833 }
834
1da177e4
LT
835 index &= 0xff;
836 switch (requesttype & USB_RECIP_MASK) {
837 case USB_RECIP_ENDPOINT:
1361bf4b
HG
838 if ((index & ~USB_DIR_IN) == 0)
839 return 0;
04e482ff 840 ret = findintfep(ps->dev, index);
831abf76
KG
841 if (ret < 0) {
842 /*
843 * Some not fully compliant Win apps seem to get
844 * index wrong and have the endpoint number here
845 * rather than the endpoint address (with the
846 * correct direction). Win does let this through,
847 * so we'll not reject it here but leave it to
848 * the device to not break KVM. But we warn.
849 */
850 ret = findintfep(ps->dev, index ^ 0x80);
851 if (ret >= 0)
852 dev_info(&ps->dev->dev,
853 "%s: process %i (%s) requesting ep %02x but needs %02x\n",
854 __func__, task_pid_nr(current),
855 current->comm, index, index ^ 0x80);
856 }
04e482ff 857 if (ret >= 0)
1da177e4
LT
858 ret = checkintf(ps, ret);
859 break;
860
861 case USB_RECIP_INTERFACE:
862 ret = checkintf(ps, index);
863 break;
864 }
865 return ret;
866}
867
2fec32b0
HG
868static struct usb_host_endpoint *ep_to_host_endpoint(struct usb_device *dev,
869 unsigned char ep)
870{
871 if (ep & USB_ENDPOINT_DIR_MASK)
872 return dev->ep_in[ep & USB_ENDPOINT_NUMBER_MASK];
873 else
874 return dev->ep_out[ep & USB_ENDPOINT_NUMBER_MASK];
875}
876
3e75c6de 877static int parse_usbdevfs_streams(struct usb_dev_state *ps,
bcf7f6e3
HG
878 struct usbdevfs_streams __user *streams,
879 unsigned int *num_streams_ret,
880 unsigned int *num_eps_ret,
881 struct usb_host_endpoint ***eps_ret,
882 struct usb_interface **intf_ret)
883{
884 unsigned int i, num_streams, num_eps;
885 struct usb_host_endpoint **eps;
886 struct usb_interface *intf = NULL;
887 unsigned char ep;
888 int ifnum, ret;
889
890 if (get_user(num_streams, &streams->num_streams) ||
891 get_user(num_eps, &streams->num_eps))
892 return -EFAULT;
893
894 if (num_eps < 1 || num_eps > USB_MAXENDPOINTS)
895 return -EINVAL;
896
897 /* The XHCI controller allows max 2 ^ 16 streams */
898 if (num_streams_ret && (num_streams < 2 || num_streams > 65536))
899 return -EINVAL;
900
6da2ec56 901 eps = kmalloc_array(num_eps, sizeof(*eps), GFP_KERNEL);
bcf7f6e3
HG
902 if (!eps)
903 return -ENOMEM;
904
905 for (i = 0; i < num_eps; i++) {
906 if (get_user(ep, &streams->eps[i])) {
907 ret = -EFAULT;
908 goto error;
909 }
910 eps[i] = ep_to_host_endpoint(ps->dev, ep);
911 if (!eps[i]) {
912 ret = -EINVAL;
913 goto error;
914 }
915
916 /* usb_alloc/free_streams operate on an usb_interface */
917 ifnum = findintfep(ps->dev, ep);
918 if (ifnum < 0) {
919 ret = ifnum;
920 goto error;
921 }
922
923 if (i == 0) {
924 ret = checkintf(ps, ifnum);
925 if (ret < 0)
926 goto error;
927 intf = usb_ifnum_to_if(ps->dev, ifnum);
928 } else {
929 /* Verify all eps belong to the same interface */
930 if (ifnum != intf->altsetting->desc.bInterfaceNumber) {
931 ret = -EINVAL;
932 goto error;
933 }
934 }
935 }
936
937 if (num_streams_ret)
938 *num_streams_ret = num_streams;
939 *num_eps_ret = num_eps;
940 *eps_ret = eps;
941 *intf_ret = intf;
942
943 return 0;
944
945error:
946 kfree(eps);
947 return ret;
948}
949
61ad04a8 950static int match_devt(struct device *dev, void *data)
4592bf5a 951{
a80d5ff0 952 return dev->devt == (dev_t) (unsigned long) data;
9f8b17e6 953}
4592bf5a 954
61ad04a8 955static struct usb_device *usbdev_lookup_by_devt(dev_t devt)
9f8b17e6
KS
956{
957 struct device *dev;
958
a80d5ff0
DH
959 dev = bus_find_device(&usb_bus_type, NULL,
960 (void *) (unsigned long) devt, match_devt);
9f8b17e6
KS
961 if (!dev)
962 return NULL;
69ab55d7 963 return to_usb_device(dev);
9f8b17e6 964}
4592bf5a 965
1da177e4
LT
966/*
967 * file operations
968 */
969static int usbdev_open(struct inode *inode, struct file *file)
970{
fbf82fd2 971 struct usb_device *dev = NULL;
9b6f0c4b 972 struct usb_dev_state *ps;
1da177e4
LT
973 int ret;
974
1da177e4 975 ret = -ENOMEM;
d883f52e 976 ps = kzalloc(sizeof(struct usb_dev_state), GFP_KERNEL);
04e482ff 977 if (!ps)
62e299e6 978 goto out_free_ps;
1da177e4 979
01105a24 980 ret = -ENODEV;
61ad04a8 981
62e299e6
AS
982 /* Protect against simultaneous removal or release */
983 mutex_lock(&usbfs_mutex);
984
9f8b17e6 985 /* usbdev device-node */
fbf82fd2 986 if (imajor(inode) == USB_DEVICE_MAJOR)
61ad04a8 987 dev = usbdev_lookup_by_devt(inode->i_rdev);
62e299e6 988
62e299e6
AS
989 mutex_unlock(&usbfs_mutex);
990
991 if (!dev)
992 goto out_free_ps;
993
994 usb_lock_device(dev);
995 if (dev->state == USB_STATE_NOTATTACHED)
996 goto out_unlock_device;
997
94fcda1f 998 ret = usb_autoresume_device(dev);
01d883d4 999 if (ret)
62e299e6 1000 goto out_unlock_device;
01d883d4 1001
1da177e4
LT
1002 ps->dev = dev;
1003 ps->file = file;
d883f52e 1004 ps->interface_allowed_mask = 0xFFFFFFFF; /* 32 bits */
1da177e4 1005 spin_lock_init(&ps->lock);
316547fd 1006 INIT_LIST_HEAD(&ps->list);
1da177e4
LT
1007 INIT_LIST_HEAD(&ps->async_pending);
1008 INIT_LIST_HEAD(&ps->async_completed);
f7d34b44 1009 INIT_LIST_HEAD(&ps->memory_list);
1da177e4 1010 init_waitqueue_head(&ps->wait);
2425c08b 1011 ps->disc_pid = get_pid(task_pid(current));
d178bc3a 1012 ps->cred = get_current_cred();
527660a8 1013 smp_wmb();
1da177e4
LT
1014 list_add_tail(&ps->list, &dev->filelist);
1015 file->private_data = ps;
62e299e6 1016 usb_unlock_device(dev);
2da41d5f
AS
1017 snoop(&dev->dev, "opened by process %d: %s\n", task_pid_nr(current),
1018 current->comm);
62e299e6
AS
1019 return ret;
1020
1021 out_unlock_device:
1022 usb_unlock_device(dev);
1023 usb_put_dev(dev);
1024 out_free_ps:
1025 kfree(ps);
4a2a8a2c 1026 return ret;
1da177e4
LT
1027}
1028
1029static int usbdev_release(struct inode *inode, struct file *file)
1030{
9b6f0c4b 1031 struct usb_dev_state *ps = file->private_data;
1da177e4
LT
1032 struct usb_device *dev = ps->dev;
1033 unsigned int ifnum;
6ff10464 1034 struct async *as;
1da177e4
LT
1035
1036 usb_lock_device(dev);
7cbe5dca 1037 usb_hub_release_all_ports(dev, ps);
4a2a8a2c 1038
1da177e4 1039 list_del_init(&ps->list);
4a2a8a2c 1040
1da177e4
LT
1041 for (ifnum = 0; ps->ifclaimed && ifnum < 8*sizeof(ps->ifclaimed);
1042 ifnum++) {
1043 if (test_bit(ifnum, &ps->ifclaimed))
1044 releaseintf(ps, ifnum);
1045 }
1046 destroy_all_async(ps);
94fcda1f 1047 usb_autosuspend_device(dev);
1da177e4
LT
1048 usb_unlock_device(dev);
1049 usb_put_dev(dev);
2425c08b 1050 put_pid(ps->disc_pid);
d178bc3a 1051 put_cred(ps->cred);
6ff10464
AS
1052
1053 as = async_getcompleted(ps);
1054 while (as) {
1055 free_async(as);
1056 as = async_getcompleted(ps);
1057 }
f7d34b44 1058
1da177e4 1059 kfree(ps);
4a2a8a2c 1060 return 0;
1da177e4
LT
1061}
1062
9b6f0c4b 1063static int proc_control(struct usb_dev_state *ps, void __user *arg)
1da177e4
LT
1064{
1065 struct usb_device *dev = ps->dev;
1066 struct usbdevfs_ctrltransfer ctrl;
1067 unsigned int tmo;
1068 unsigned char *tbuf;
ff66e3ce 1069 unsigned wLength;
4c6e8971 1070 int i, pipe, ret;
1da177e4
LT
1071
1072 if (copy_from_user(&ctrl, arg, sizeof(ctrl)))
1073 return -EFAULT;
393cbb51
MD
1074 ret = check_ctrlrecip(ps, ctrl.bRequestType, ctrl.bRequest,
1075 ctrl.wIndex);
04e482ff 1076 if (ret)
1da177e4 1077 return ret;
ff66e3ce
AM
1078 wLength = ctrl.wLength; /* To suppress 64k PAGE_SIZE warning */
1079 if (wLength > PAGE_SIZE)
1da177e4 1080 return -EINVAL;
add1aaea
AS
1081 ret = usbfs_increase_memory_usage(PAGE_SIZE + sizeof(struct urb) +
1082 sizeof(struct usb_ctrlrequest));
1083 if (ret)
1084 return ret;
04e482ff 1085 tbuf = (unsigned char *)__get_free_page(GFP_KERNEL);
add1aaea
AS
1086 if (!tbuf) {
1087 ret = -ENOMEM;
1088 goto done;
1089 }
1da177e4 1090 tmo = ctrl.timeout;
0880aef4
CF
1091 snoop(&dev->dev, "control urb: bRequestType=%02x "
1092 "bRequest=%02x wValue=%04x "
1093 "wIndex=%04x wLength=%04x\n",
c8f2efc8
XR
1094 ctrl.bRequestType, ctrl.bRequest, ctrl.wValue,
1095 ctrl.wIndex, ctrl.wLength);
1da177e4 1096 if (ctrl.bRequestType & 0x80) {
96d4f267 1097 if (ctrl.wLength && !access_ok(ctrl.data,
04e482ff 1098 ctrl.wLength)) {
52fb743d
AS
1099 ret = -EINVAL;
1100 goto done;
1da177e4 1101 }
4c6e8971 1102 pipe = usb_rcvctrlpipe(dev, 0);
0880aef4 1103 snoop_urb(dev, NULL, pipe, ctrl.wLength, tmo, SUBMIT, NULL, 0);
1da177e4
LT
1104
1105 usb_unlock_device(dev);
4c6e8971 1106 i = usb_control_msg(dev, pipe, ctrl.bRequest,
04e482ff
GKH
1107 ctrl.bRequestType, ctrl.wValue, ctrl.wIndex,
1108 tbuf, ctrl.wLength, tmo);
1da177e4 1109 usb_lock_device(dev);
0880aef4 1110 snoop_urb(dev, NULL, pipe, max(i, 0), min(i, 0), COMPLETE,
9d02b426 1111 tbuf, max(i, 0));
1da177e4 1112 if ((i > 0) && ctrl.wLength) {
fe0410c7 1113 if (copy_to_user(ctrl.data, tbuf, i)) {
52fb743d
AS
1114 ret = -EFAULT;
1115 goto done;
1da177e4
LT
1116 }
1117 }
1118 } else {
1119 if (ctrl.wLength) {
1120 if (copy_from_user(tbuf, ctrl.data, ctrl.wLength)) {
52fb743d
AS
1121 ret = -EFAULT;
1122 goto done;
1da177e4
LT
1123 }
1124 }
4c6e8971 1125 pipe = usb_sndctrlpipe(dev, 0);
0880aef4
CF
1126 snoop_urb(dev, NULL, pipe, ctrl.wLength, tmo, SUBMIT,
1127 tbuf, ctrl.wLength);
4c6e8971 1128
1da177e4 1129 usb_unlock_device(dev);
04e482ff
GKH
1130 i = usb_control_msg(dev, usb_sndctrlpipe(dev, 0), ctrl.bRequest,
1131 ctrl.bRequestType, ctrl.wValue, ctrl.wIndex,
1132 tbuf, ctrl.wLength, tmo);
1da177e4 1133 usb_lock_device(dev);
0880aef4 1134 snoop_urb(dev, NULL, pipe, max(i, 0), min(i, 0), COMPLETE, NULL, 0);
1da177e4 1135 }
04e482ff 1136 if (i < 0 && i != -EPIPE) {
1da177e4
LT
1137 dev_printk(KERN_DEBUG, &dev->dev, "usbfs: USBDEVFS_CONTROL "
1138 "failed cmd %s rqt %u rq %u len %u ret %d\n",
1139 current->comm, ctrl.bRequestType, ctrl.bRequest,
1140 ctrl.wLength, i);
1141 }
52fb743d
AS
1142 ret = i;
1143 done:
1144 free_page((unsigned long) tbuf);
add1aaea
AS
1145 usbfs_decrease_memory_usage(PAGE_SIZE + sizeof(struct urb) +
1146 sizeof(struct usb_ctrlrequest));
52fb743d 1147 return ret;
1da177e4
LT
1148}
1149
9b6f0c4b 1150static int proc_bulk(struct usb_dev_state *ps, void __user *arg)
1da177e4
LT
1151{
1152 struct usb_device *dev = ps->dev;
1153 struct usbdevfs_bulktransfer bulk;
1154 unsigned int tmo, len1, pipe;
1155 int len2;
1156 unsigned char *tbuf;
4c6e8971 1157 int i, ret;
1da177e4
LT
1158
1159 if (copy_from_user(&bulk, arg, sizeof(bulk)))
1160 return -EFAULT;
04e482ff
GKH
1161 ret = findintfep(ps->dev, bulk.ep);
1162 if (ret < 0)
1da177e4 1163 return ret;
04e482ff
GKH
1164 ret = checkintf(ps, ret);
1165 if (ret)
1da177e4
LT
1166 return ret;
1167 if (bulk.ep & USB_DIR_IN)
1168 pipe = usb_rcvbulkpipe(dev, bulk.ep & 0x7f);
1169 else
1170 pipe = usb_sndbulkpipe(dev, bulk.ep & 0x7f);
1171 if (!usb_maxpacket(dev, pipe, !(bulk.ep & USB_DIR_IN)))
1172 return -EINVAL;
1173 len1 = bulk.len;
1129d270 1174 if (len1 >= (INT_MAX - sizeof(struct urb)))
1da177e4 1175 return -EINVAL;
add1aaea
AS
1176 ret = usbfs_increase_memory_usage(len1 + sizeof(struct urb));
1177 if (ret)
1178 return ret;
135551ea
KB
1179 tbuf = kmalloc(len1, GFP_KERNEL);
1180 if (!tbuf) {
add1aaea
AS
1181 ret = -ENOMEM;
1182 goto done;
1183 }
1da177e4
LT
1184 tmo = bulk.timeout;
1185 if (bulk.ep & 0x80) {
96d4f267 1186 if (len1 && !access_ok(bulk.data, len1)) {
52fb743d
AS
1187 ret = -EINVAL;
1188 goto done;
1da177e4 1189 }
0880aef4 1190 snoop_urb(dev, NULL, pipe, len1, tmo, SUBMIT, NULL, 0);
4c6e8971 1191
1da177e4
LT
1192 usb_unlock_device(dev);
1193 i = usb_bulk_msg(dev, pipe, tbuf, len1, &len2, tmo);
1194 usb_lock_device(dev);
0880aef4 1195 snoop_urb(dev, NULL, pipe, len2, i, COMPLETE, tbuf, len2);
4c6e8971 1196
1da177e4
LT
1197 if (!i && len2) {
1198 if (copy_to_user(bulk.data, tbuf, len2)) {
52fb743d
AS
1199 ret = -EFAULT;
1200 goto done;
1da177e4
LT
1201 }
1202 }
1203 } else {
1204 if (len1) {
1205 if (copy_from_user(tbuf, bulk.data, len1)) {
52fb743d
AS
1206 ret = -EFAULT;
1207 goto done;
1da177e4
LT
1208 }
1209 }
0880aef4 1210 snoop_urb(dev, NULL, pipe, len1, tmo, SUBMIT, tbuf, len1);
4c6e8971 1211
1da177e4
LT
1212 usb_unlock_device(dev);
1213 i = usb_bulk_msg(dev, pipe, tbuf, len1, &len2, tmo);
1214 usb_lock_device(dev);
0880aef4 1215 snoop_urb(dev, NULL, pipe, len2, i, COMPLETE, NULL, 0);
1da177e4 1216 }
52fb743d
AS
1217 ret = (i < 0 ? i : len2);
1218 done:
1da177e4 1219 kfree(tbuf);
add1aaea 1220 usbfs_decrease_memory_usage(len1 + sizeof(struct urb));
52fb743d 1221 return ret;
1da177e4
LT
1222}
1223
f080a51b
AS
1224static void check_reset_of_active_ep(struct usb_device *udev,
1225 unsigned int epnum, char *ioctl_name)
1226{
1227 struct usb_host_endpoint **eps;
1228 struct usb_host_endpoint *ep;
1229
1230 eps = (epnum & USB_DIR_IN) ? udev->ep_in : udev->ep_out;
1231 ep = eps[epnum & 0x0f];
1232 if (ep && !list_empty(&ep->urb_list))
1233 dev_warn(&udev->dev, "Process %d (%s) called USBDEVFS_%s for active endpoint 0x%02x\n",
1234 task_pid_nr(current), current->comm,
1235 ioctl_name, epnum);
1236}
1237
9b6f0c4b 1238static int proc_resetep(struct usb_dev_state *ps, void __user *arg)
1da177e4
LT
1239{
1240 unsigned int ep;
1241 int ret;
1242
1243 if (get_user(ep, (unsigned int __user *)arg))
1244 return -EFAULT;
04e482ff
GKH
1245 ret = findintfep(ps->dev, ep);
1246 if (ret < 0)
1da177e4 1247 return ret;
04e482ff
GKH
1248 ret = checkintf(ps, ret);
1249 if (ret)
1da177e4 1250 return ret;
f080a51b 1251 check_reset_of_active_ep(ps->dev, ep, "RESETEP");
3444b26a 1252 usb_reset_endpoint(ps->dev, ep);
1da177e4
LT
1253 return 0;
1254}
1255
9b6f0c4b 1256static int proc_clearhalt(struct usb_dev_state *ps, void __user *arg)
1da177e4
LT
1257{
1258 unsigned int ep;
1259 int pipe;
1260 int ret;
1261
1262 if (get_user(ep, (unsigned int __user *)arg))
1263 return -EFAULT;
04e482ff
GKH
1264 ret = findintfep(ps->dev, ep);
1265 if (ret < 0)
1da177e4 1266 return ret;
04e482ff
GKH
1267 ret = checkintf(ps, ret);
1268 if (ret)
1da177e4 1269 return ret;
f080a51b 1270 check_reset_of_active_ep(ps->dev, ep, "CLEAR_HALT");
1da177e4 1271 if (ep & USB_DIR_IN)
04e482ff
GKH
1272 pipe = usb_rcvbulkpipe(ps->dev, ep & 0x7f);
1273 else
1274 pipe = usb_sndbulkpipe(ps->dev, ep & 0x7f);
1da177e4
LT
1275
1276 return usb_clear_halt(ps->dev, pipe);
1277}
1da177e4 1278
9b6f0c4b 1279static int proc_getdriver(struct usb_dev_state *ps, void __user *arg)
1da177e4
LT
1280{
1281 struct usbdevfs_getdriver gd;
1282 struct usb_interface *intf;
1283 int ret;
1284
1285 if (copy_from_user(&gd, arg, sizeof(gd)))
1286 return -EFAULT;
1da177e4
LT
1287 intf = usb_ifnum_to_if(ps->dev, gd.interface);
1288 if (!intf || !intf->dev.driver)
1289 ret = -ENODATA;
1290 else {
b11b2e1b 1291 strlcpy(gd.driver, intf->dev.driver->name,
1da177e4
LT
1292 sizeof(gd.driver));
1293 ret = (copy_to_user(arg, &gd, sizeof(gd)) ? -EFAULT : 0);
1294 }
1da177e4
LT
1295 return ret;
1296}
1297
9b6f0c4b 1298static int proc_connectinfo(struct usb_dev_state *ps, void __user *arg)
1da177e4 1299{
681fef83
KL
1300 struct usbdevfs_connectinfo ci;
1301
1302 memset(&ci, 0, sizeof(ci));
1303 ci.devnum = ps->dev->devnum;
1304 ci.slow = ps->dev->speed == USB_SPEED_LOW;
1da177e4 1305
1da177e4
LT
1306 if (copy_to_user(arg, &ci, sizeof(ci)))
1307 return -EFAULT;
1308 return 0;
1309}
1310
9b6f0c4b 1311static int proc_resetdevice(struct usb_dev_state *ps)
1da177e4 1312{
d883f52e
RG
1313 struct usb_host_config *actconfig = ps->dev->actconfig;
1314 struct usb_interface *interface;
1315 int i, number;
1316
1317 /* Don't allow a device reset if the process has dropped the
1318 * privilege to do such things and any of the interfaces are
1319 * currently claimed.
1320 */
1321 if (ps->privileges_dropped && actconfig) {
1322 for (i = 0; i < actconfig->desc.bNumInterfaces; ++i) {
1323 interface = actconfig->interface[i];
1324 number = interface->cur_altsetting->desc.bInterfaceNumber;
1325 if (usb_interface_claimed(interface) &&
1326 !test_bit(number, &ps->ifclaimed)) {
1327 dev_warn(&ps->dev->dev,
1328 "usbfs: interface %d claimed by %s while '%s' resets device\n",
1329 number, interface->dev.driver->name, current->comm);
1330 return -EACCES;
1331 }
1332 }
1333 }
1334
742120c6 1335 return usb_reset_device(ps->dev);
1da177e4
LT
1336}
1337
9b6f0c4b 1338static int proc_setintf(struct usb_dev_state *ps, void __user *arg)
1da177e4
LT
1339{
1340 struct usbdevfs_setinterface setintf;
1341 int ret;
1342
1343 if (copy_from_user(&setintf, arg, sizeof(setintf)))
1344 return -EFAULT;
135551ea
KB
1345 ret = checkintf(ps, setintf.interface);
1346 if (ret)
1da177e4 1347 return ret;
5ec9c177
HG
1348
1349 destroy_async_on_interface(ps, setintf.interface);
1350
1da177e4
LT
1351 return usb_set_interface(ps->dev, setintf.interface,
1352 setintf.altsetting);
1353}
1354
9b6f0c4b 1355static int proc_setconfig(struct usb_dev_state *ps, void __user *arg)
1da177e4 1356{
3f141e2a 1357 int u;
1da177e4 1358 int status = 0;
04e482ff 1359 struct usb_host_config *actconfig;
1da177e4 1360
3f141e2a 1361 if (get_user(u, (int __user *)arg))
1da177e4
LT
1362 return -EFAULT;
1363
04e482ff
GKH
1364 actconfig = ps->dev->actconfig;
1365
1366 /* Don't touch the device if any interfaces are claimed.
1367 * It could interfere with other drivers' operations, and if
1da177e4
LT
1368 * an interface is claimed by usbfs it could easily deadlock.
1369 */
04e482ff
GKH
1370 if (actconfig) {
1371 int i;
1372
1373 for (i = 0; i < actconfig->desc.bNumInterfaces; ++i) {
1374 if (usb_interface_claimed(actconfig->interface[i])) {
1375 dev_warn(&ps->dev->dev,
72ebddb5 1376 "usbfs: interface %d claimed by %s "
1da177e4
LT
1377 "while '%s' sets config #%d\n",
1378 actconfig->interface[i]
1379 ->cur_altsetting
1380 ->desc.bInterfaceNumber,
72ebddb5
DB
1381 actconfig->interface[i]
1382 ->dev.driver->name,
1da177e4 1383 current->comm, u);
04e482ff 1384 status = -EBUSY;
1da177e4 1385 break;
1da177e4 1386 }
04e482ff
GKH
1387 }
1388 }
1da177e4
LT
1389
1390 /* SET_CONFIGURATION is often abused as a "cheap" driver reset,
1391 * so avoid usb_set_configuration()'s kick to sysfs
1392 */
1393 if (status == 0) {
1394 if (actconfig && actconfig->desc.bConfigurationValue == u)
1395 status = usb_reset_configuration(ps->dev);
1396 else
1397 status = usb_set_configuration(ps->dev, u);
1398 }
1399
1400 return status;
1401}
1402
f7d34b44
SG
1403static struct usb_memory *
1404find_memory_area(struct usb_dev_state *ps, const struct usbdevfs_urb *uurb)
1405{
1406 struct usb_memory *usbm = NULL, *iter;
1407 unsigned long flags;
1408 unsigned long uurb_start = (unsigned long)uurb->buffer;
1409
1410 spin_lock_irqsave(&ps->lock, flags);
1411 list_for_each_entry(iter, &ps->memory_list, memlist) {
1412 if (uurb_start >= iter->vm_start &&
1413 uurb_start < iter->vm_start + iter->size) {
1414 if (uurb->buffer_length > iter->vm_start + iter->size -
1415 uurb_start) {
1416 usbm = ERR_PTR(-EINVAL);
1417 } else {
1418 usbm = iter;
1419 usbm->urb_use_count++;
1420 }
1421 break;
1422 }
1423 }
1424 spin_unlock_irqrestore(&ps->lock, flags);
1425 return usbm;
1426}
1427
9b6f0c4b 1428static int proc_do_submiturb(struct usb_dev_state *ps, struct usbdevfs_urb *uurb,
04e482ff
GKH
1429 struct usbdevfs_iso_packet_desc __user *iso_frame_desc,
1430 void __user *arg)
1da177e4
LT
1431{
1432 struct usbdevfs_iso_packet_desc *isopkt = NULL;
1433 struct usb_host_endpoint *ep;
52fb743d 1434 struct async *as = NULL;
1da177e4
LT
1435 struct usb_ctrlrequest *dr = NULL;
1436 unsigned int u, totlen, isofrmlen;
7a68d9fb 1437 int i, ret, num_sgs = 0, ifnum = -1;
b2d03eb5 1438 int number_of_packets = 0;
948cd8c1 1439 unsigned int stream_id = 0;
3d97ff63 1440 void *buf;
7a68d9fb
ON
1441 bool is_in;
1442 bool allow_short = false;
1443 bool allow_zero = false;
446f666d 1444 unsigned long mask = USBDEVFS_URB_SHORT_NOT_OK |
01c6460f 1445 USBDEVFS_URB_BULK_CONTINUATION |
14722ef4
AS
1446 USBDEVFS_URB_NO_FSBR |
1447 USBDEVFS_URB_ZERO_PACKET |
446f666d
ON
1448 USBDEVFS_URB_NO_INTERRUPT;
1449 /* USBDEVFS_URB_ISO_ASAP is a special case */
1450 if (uurb->type == USBDEVFS_URB_TYPE_ISO)
1451 mask |= USBDEVFS_URB_ISO_ASAP;
1452
1453 if (uurb->flags & ~mask)
1454 return -EINVAL;
1455
57999d11
DC
1456 if ((unsigned int)uurb->buffer_length >= USBFS_XFER_MAX)
1457 return -EINVAL;
9180135b 1458 if (uurb->buffer_length > 0 && !uurb->buffer)
1da177e4 1459 return -EINVAL;
04e482ff
GKH
1460 if (!(uurb->type == USBDEVFS_URB_TYPE_CONTROL &&
1461 (uurb->endpoint & ~USB_ENDPOINT_DIR_MASK) == 0)) {
1462 ifnum = findintfep(ps->dev, uurb->endpoint);
1463 if (ifnum < 0)
1da177e4 1464 return ifnum;
04e482ff
GKH
1465 ret = checkintf(ps, ifnum);
1466 if (ret)
1da177e4
LT
1467 return ret;
1468 }
2fec32b0 1469 ep = ep_to_host_endpoint(ps->dev, uurb->endpoint);
1da177e4
LT
1470 if (!ep)
1471 return -ENOENT;
2fec32b0 1472 is_in = (uurb->endpoint & USB_ENDPOINT_DIR_MASK) != 0;
add1aaea
AS
1473
1474 u = 0;
f355e830 1475 switch (uurb->type) {
1da177e4 1476 case USBDEVFS_URB_TYPE_CONTROL:
93cf9b90 1477 if (!usb_endpoint_xfer_control(&ep->desc))
1da177e4 1478 return -EINVAL;
add1aaea
AS
1479 /* min 8 byte setup packet */
1480 if (uurb->buffer_length < 8)
1da177e4 1481 return -EINVAL;
04e482ff
GKH
1482 dr = kmalloc(sizeof(struct usb_ctrlrequest), GFP_KERNEL);
1483 if (!dr)
1da177e4
LT
1484 return -ENOMEM;
1485 if (copy_from_user(dr, uurb->buffer, 8)) {
52fb743d
AS
1486 ret = -EFAULT;
1487 goto error;
1da177e4
LT
1488 }
1489 if (uurb->buffer_length < (le16_to_cpup(&dr->wLength) + 8)) {
52fb743d
AS
1490 ret = -EINVAL;
1491 goto error;
1da177e4 1492 }
393cbb51 1493 ret = check_ctrlrecip(ps, dr->bRequestType, dr->bRequest,
04e482ff 1494 le16_to_cpup(&dr->wIndex));
52fb743d
AS
1495 if (ret)
1496 goto error;
1da177e4
LT
1497 uurb->buffer_length = le16_to_cpup(&dr->wLength);
1498 uurb->buffer += 8;
93cf9b90
AS
1499 if ((dr->bRequestType & USB_DIR_IN) && uurb->buffer_length) {
1500 is_in = 1;
1501 uurb->endpoint |= USB_DIR_IN;
1502 } else {
1503 is_in = 0;
1504 uurb->endpoint &= ~USB_DIR_IN;
1505 }
665c365a
AS
1506 if (is_in)
1507 allow_short = true;
0880aef4
CF
1508 snoop(&ps->dev->dev, "control urb: bRequestType=%02x "
1509 "bRequest=%02x wValue=%04x "
1510 "wIndex=%04x wLength=%04x\n",
1511 dr->bRequestType, dr->bRequest,
1512 __le16_to_cpup(&dr->wValue),
1513 __le16_to_cpup(&dr->wIndex),
1514 __le16_to_cpup(&dr->wLength));
add1aaea 1515 u = sizeof(struct usb_ctrlrequest);
1da177e4
LT
1516 break;
1517
1518 case USBDEVFS_URB_TYPE_BULK:
7a68d9fb
ON
1519 if (!is_in)
1520 allow_zero = true;
1521 else
1522 allow_short = true;
93cf9b90 1523 switch (usb_endpoint_type(&ep->desc)) {
1da177e4
LT
1524 case USB_ENDPOINT_XFER_CONTROL:
1525 case USB_ENDPOINT_XFER_ISOC:
1526 return -EINVAL;
f661c6f8
AS
1527 case USB_ENDPOINT_XFER_INT:
1528 /* allow single-shot interrupt transfers */
1529 uurb->type = USBDEVFS_URB_TYPE_INTERRUPT;
1530 goto interrupt_urb;
1da177e4 1531 }
3d97ff63
HG
1532 num_sgs = DIV_ROUND_UP(uurb->buffer_length, USB_SG_SIZE);
1533 if (num_sgs == 1 || num_sgs > ps->dev->bus->sg_tablesize)
1534 num_sgs = 0;
948cd8c1
HG
1535 if (ep->streams)
1536 stream_id = uurb->stream_id;
1da177e4
LT
1537 break;
1538
f661c6f8
AS
1539 case USBDEVFS_URB_TYPE_INTERRUPT:
1540 if (!usb_endpoint_xfer_int(&ep->desc))
1541 return -EINVAL;
1542 interrupt_urb:
7a68d9fb
ON
1543 if (!is_in)
1544 allow_zero = true;
1545 else
1546 allow_short = true;
f661c6f8
AS
1547 break;
1548
1da177e4
LT
1549 case USBDEVFS_URB_TYPE_ISO:
1550 /* arbitrary limit */
04e482ff
GKH
1551 if (uurb->number_of_packets < 1 ||
1552 uurb->number_of_packets > 128)
1da177e4 1553 return -EINVAL;
93cf9b90 1554 if (!usb_endpoint_xfer_isoc(&ep->desc))
1da177e4 1555 return -EINVAL;
b2d03eb5 1556 number_of_packets = uurb->number_of_packets;
04e482ff 1557 isofrmlen = sizeof(struct usbdevfs_iso_packet_desc) *
b2d03eb5 1558 number_of_packets;
73a02d32
RP
1559 isopkt = memdup_user(iso_frame_desc, isofrmlen);
1560 if (IS_ERR(isopkt)) {
1561 ret = PTR_ERR(isopkt);
1562 isopkt = NULL;
52fb743d 1563 goto error;
1da177e4 1564 }
b2d03eb5 1565 for (totlen = u = 0; u < number_of_packets; u++) {
e2e2f0ea
FM
1566 /*
1567 * arbitrary limit need for USB 3.0
1568 * bMaxBurst (0~15 allowed, 1~16 packets)
1569 * bmAttributes (bit 1:0, mult 0~2, 1~3 packets)
1570 * sizemax: 1024 * 16 * 3 = 49152
1571 */
1572 if (isopkt[u].length > 49152) {
52fb743d
AS
1573 ret = -EINVAL;
1574 goto error;
1da177e4
LT
1575 }
1576 totlen += isopkt[u].length;
1577 }
add1aaea 1578 u *= sizeof(struct usb_iso_packet_descriptor);
845d584f 1579 uurb->buffer_length = totlen;
1da177e4
LT
1580 break;
1581
1da177e4
LT
1582 default:
1583 return -EINVAL;
1584 }
add1aaea 1585
9180135b 1586 if (uurb->buffer_length > 0 &&
96d4f267 1587 !access_ok(uurb->buffer, uurb->buffer_length)) {
52fb743d
AS
1588 ret = -EFAULT;
1589 goto error;
1da177e4 1590 }
b2d03eb5 1591 as = alloc_async(number_of_packets);
9180135b 1592 if (!as) {
52fb743d
AS
1593 ret = -ENOMEM;
1594 goto error;
1da177e4 1595 }
3d97ff63 1596
f7d34b44
SG
1597 as->usbm = find_memory_area(ps, uurb);
1598 if (IS_ERR(as->usbm)) {
1599 ret = PTR_ERR(as->usbm);
1600 as->usbm = NULL;
1601 goto error;
1602 }
1603
1604 /* do not use SG buffers when memory mapped segments
1605 * are in use
1606 */
1607 if (as->usbm)
1608 num_sgs = 0;
1609
3d97ff63
HG
1610 u += sizeof(struct async) + sizeof(struct urb) + uurb->buffer_length +
1611 num_sgs * sizeof(struct scatterlist);
add1aaea
AS
1612 ret = usbfs_increase_memory_usage(u);
1613 if (ret)
1614 goto error;
1615 as->mem_usage = u;
1616
3d97ff63 1617 if (num_sgs) {
6da2ec56
KC
1618 as->urb->sg = kmalloc_array(num_sgs,
1619 sizeof(struct scatterlist),
1620 GFP_KERNEL);
3d97ff63
HG
1621 if (!as->urb->sg) {
1622 ret = -ENOMEM;
1623 goto error;
1624 }
1625 as->urb->num_sgs = num_sgs;
1626 sg_init_table(as->urb->sg, as->urb->num_sgs);
1627
1628 totlen = uurb->buffer_length;
1629 for (i = 0; i < as->urb->num_sgs; i++) {
1630 u = (totlen > USB_SG_SIZE) ? USB_SG_SIZE : totlen;
1631 buf = kmalloc(u, GFP_KERNEL);
1632 if (!buf) {
1633 ret = -ENOMEM;
1634 goto error;
1635 }
1636 sg_set_buf(&as->urb->sg[i], buf, u);
1637
1638 if (!is_in) {
1639 if (copy_from_user(buf, uurb->buffer, u)) {
1640 ret = -EFAULT;
1641 goto error;
1642 }
01463900 1643 uurb->buffer += u;
3d97ff63
HG
1644 }
1645 totlen -= u;
1646 }
1647 } else if (uurb->buffer_length > 0) {
f7d34b44
SG
1648 if (as->usbm) {
1649 unsigned long uurb_start = (unsigned long)uurb->buffer;
3d97ff63 1650
f7d34b44
SG
1651 as->urb->transfer_buffer = as->usbm->mem +
1652 (uurb_start - as->usbm->vm_start);
1653 } else {
1654 as->urb->transfer_buffer = kmalloc(uurb->buffer_length,
1655 GFP_KERNEL);
1656 if (!as->urb->transfer_buffer) {
1657 ret = -ENOMEM;
3d97ff63
HG
1658 goto error;
1659 }
f7d34b44
SG
1660 if (!is_in) {
1661 if (copy_from_user(as->urb->transfer_buffer,
1662 uurb->buffer,
1663 uurb->buffer_length)) {
1664 ret = -EFAULT;
1665 goto error;
1666 }
1667 } else if (uurb->type == USBDEVFS_URB_TYPE_ISO) {
1668 /*
1669 * Isochronous input data may end up being
1670 * discontiguous if some of the packets are
1671 * short. Clear the buffer so that the gaps
1672 * don't leak kernel data to userspace.
1673 */
1674 memset(as->urb->transfer_buffer, 0,
1675 uurb->buffer_length);
1676 }
3d97ff63 1677 }
9180135b 1678 }
04e482ff
GKH
1679 as->urb->dev = ps->dev;
1680 as->urb->pipe = (uurb->type << 30) |
93cf9b90
AS
1681 __create_pipe(ps->dev, uurb->endpoint & 0xf) |
1682 (uurb->endpoint & USB_DIR_IN);
14722ef4
AS
1683
1684 /* This tedious sequence is necessary because the URB_* flags
1685 * are internal to the kernel and subject to change, whereas
1686 * the USBDEVFS_URB_* flags are a user API and must not be changed.
1687 */
1688 u = (is_in ? URB_DIR_IN : URB_DIR_OUT);
1689 if (uurb->flags & USBDEVFS_URB_ISO_ASAP)
1690 u |= URB_ISO_ASAP;
7a68d9fb 1691 if (allow_short && uurb->flags & USBDEVFS_URB_SHORT_NOT_OK)
14722ef4 1692 u |= URB_SHORT_NOT_OK;
7a68d9fb 1693 if (allow_zero && uurb->flags & USBDEVFS_URB_ZERO_PACKET)
14722ef4
AS
1694 u |= URB_ZERO_PACKET;
1695 if (uurb->flags & USBDEVFS_URB_NO_INTERRUPT)
1696 u |= URB_NO_INTERRUPT;
1697 as->urb->transfer_flags = u;
1698
81e0403b
ON
1699 if (!allow_short && uurb->flags & USBDEVFS_URB_SHORT_NOT_OK)
1700 dev_warn(&ps->dev->dev, "Requested nonsensical USBDEVFS_URB_SHORT_NOT_OK.\n");
1701 if (!allow_zero && uurb->flags & USBDEVFS_URB_ZERO_PACKET)
1702 dev_warn(&ps->dev->dev, "Requested nonsensical USBDEVFS_URB_ZERO_PACKET.\n");
1703
1da177e4 1704 as->urb->transfer_buffer_length = uurb->buffer_length;
04e482ff 1705 as->urb->setup_packet = (unsigned char *)dr;
52fb743d 1706 dr = NULL;
1da177e4 1707 as->urb->start_frame = uurb->start_frame;
b2d03eb5 1708 as->urb->number_of_packets = number_of_packets;
948cd8c1 1709 as->urb->stream_id = stream_id;
53e5f36f
AS
1710
1711 if (ep->desc.bInterval) {
1712 if (uurb->type == USBDEVFS_URB_TYPE_ISO ||
1713 ps->dev->speed == USB_SPEED_HIGH ||
1714 ps->dev->speed >= USB_SPEED_SUPER)
1715 as->urb->interval = 1 <<
1716 min(15, ep->desc.bInterval - 1);
1717 else
1718 as->urb->interval = ep->desc.bInterval;
1719 }
1720
04e482ff
GKH
1721 as->urb->context = as;
1722 as->urb->complete = async_completed;
b2d03eb5 1723 for (totlen = u = 0; u < number_of_packets; u++) {
1da177e4
LT
1724 as->urb->iso_frame_desc[u].offset = totlen;
1725 as->urb->iso_frame_desc[u].length = isopkt[u].length;
1726 totlen += isopkt[u].length;
1727 }
6fd19f4b 1728 kfree(isopkt);
52fb743d 1729 isopkt = NULL;
1da177e4 1730 as->ps = ps;
04e482ff 1731 as->userurb = arg;
f7d34b44
SG
1732 if (as->usbm) {
1733 unsigned long uurb_start = (unsigned long)uurb->buffer;
1734
1735 as->urb->transfer_flags |= URB_NO_TRANSFER_DMA_MAP;
1736 as->urb->transfer_dma = as->usbm->dma_handle +
1737 (uurb_start - as->usbm->vm_start);
1738 } else if (is_in && uurb->buffer_length > 0)
1da177e4 1739 as->userbuffer = uurb->buffer;
1da177e4
LT
1740 as->signr = uurb->signr;
1741 as->ifnum = ifnum;
2425c08b 1742 as->pid = get_pid(task_pid(current));
d178bc3a 1743 as->cred = get_current_cred();
4c6e8971 1744 snoop_urb(ps->dev, as->userurb, as->urb->pipe,
0880aef4 1745 as->urb->transfer_buffer_length, 0, SUBMIT,
3d97ff63
HG
1746 NULL, 0);
1747 if (!is_in)
1748 snoop_urb_data(as->urb, as->urb->transfer_buffer_length);
1749
04e482ff 1750 async_newpending(as);
01c6460f
AS
1751
1752 if (usb_endpoint_xfer_bulk(&ep->desc)) {
1753 spin_lock_irq(&ps->lock);
1754
1755 /* Not exactly the endpoint address; the direction bit is
1756 * shifted to the 0x10 position so that the value will be
1757 * between 0 and 31.
1758 */
1759 as->bulk_addr = usb_endpoint_num(&ep->desc) |
1760 ((ep->desc.bEndpointAddress & USB_ENDPOINT_DIR_MASK)
1761 >> 3);
1762
1763 /* If this bulk URB is the start of a new transfer, re-enable
1764 * the endpoint. Otherwise mark it as a continuation URB.
1765 */
1766 if (uurb->flags & USBDEVFS_URB_BULK_CONTINUATION)
1767 as->bulk_status = AS_CONTINUATION;
1768 else
1769 ps->disabled_bulk_eps &= ~(1 << as->bulk_addr);
1770
1771 /* Don't accept continuation URBs if the endpoint is
1772 * disabled because of an earlier error.
1773 */
1774 if (ps->disabled_bulk_eps & (1 << as->bulk_addr))
1775 ret = -EREMOTEIO;
1776 else
1777 ret = usb_submit_urb(as->urb, GFP_ATOMIC);
1778 spin_unlock_irq(&ps->lock);
1779 } else {
1780 ret = usb_submit_urb(as->urb, GFP_KERNEL);
1781 }
1782
1783 if (ret) {
04e482ff
GKH
1784 dev_printk(KERN_DEBUG, &ps->dev->dev,
1785 "usbfs: usb_submit_urb returned %d\n", ret);
4c6e8971 1786 snoop_urb(ps->dev, as->userurb, as->urb->pipe,
0880aef4 1787 0, ret, COMPLETE, NULL, 0);
04e482ff 1788 async_removepending(as);
52fb743d 1789 goto error;
04e482ff
GKH
1790 }
1791 return 0;
52fb743d
AS
1792
1793 error:
f7d34b44
SG
1794 if (as && as->usbm)
1795 dec_usb_memory_use_count(as->usbm, &as->usbm->urb_use_count);
52fb743d
AS
1796 kfree(isopkt);
1797 kfree(dr);
1798 if (as)
1799 free_async(as);
1800 return ret;
1da177e4
LT
1801}
1802
9b6f0c4b 1803static int proc_submiturb(struct usb_dev_state *ps, void __user *arg)
1da177e4
LT
1804{
1805 struct usbdevfs_urb uurb;
1806
1807 if (copy_from_user(&uurb, arg, sizeof(uurb)))
1808 return -EFAULT;
1809
04e482ff
GKH
1810 return proc_do_submiturb(ps, &uurb,
1811 (((struct usbdevfs_urb __user *)arg)->iso_frame_desc),
1812 arg);
1da177e4
LT
1813}
1814
9b6f0c4b 1815static int proc_unlinkurb(struct usb_dev_state *ps, void __user *arg)
1da177e4 1816{
4e09dcf2 1817 struct urb *urb;
1da177e4 1818 struct async *as;
4e09dcf2 1819 unsigned long flags;
1da177e4 1820
4e09dcf2 1821 spin_lock_irqsave(&ps->lock, flags);
1da177e4 1822 as = async_getpending(ps, arg);
4e09dcf2
HL
1823 if (!as) {
1824 spin_unlock_irqrestore(&ps->lock, flags);
1da177e4 1825 return -EINVAL;
4e09dcf2
HL
1826 }
1827
1828 urb = as->urb;
1829 usb_get_urb(urb);
1830 spin_unlock_irqrestore(&ps->lock, flags);
1831
1832 usb_kill_urb(urb);
1833 usb_put_urb(urb);
1834
1da177e4
LT
1835 return 0;
1836}
1837
2ef47001
AS
1838static void compute_isochronous_actual_length(struct urb *urb)
1839{
1840 unsigned int i;
1841
1842 if (urb->number_of_packets > 0) {
1843 urb->actual_length = 0;
1844 for (i = 0; i < urb->number_of_packets; i++)
1845 urb->actual_length +=
1846 urb->iso_frame_desc[i].actual_length;
1847 }
1848}
1849
1da177e4
LT
1850static int processcompl(struct async *as, void __user * __user *arg)
1851{
1852 struct urb *urb = as->urb;
1853 struct usbdevfs_urb __user *userurb = as->userurb;
1854 void __user *addr = as->userurb;
1855 unsigned int i;
1856
2ef47001 1857 compute_isochronous_actual_length(urb);
7152b592 1858 if (as->userbuffer && urb->actual_length) {
3d97ff63 1859 if (copy_urb_data_to_user(as->userbuffer, urb))
d794a021 1860 goto err_out;
7152b592 1861 }
e015268d 1862 if (put_user(as->status, &userurb->status))
d794a021 1863 goto err_out;
1da177e4 1864 if (put_user(urb->actual_length, &userurb->actual_length))
d794a021 1865 goto err_out;
1da177e4 1866 if (put_user(urb->error_count, &userurb->error_count))
d794a021 1867 goto err_out;
1da177e4 1868
93cf9b90 1869 if (usb_endpoint_xfer_isoc(&urb->ep->desc)) {
668a9541
CL
1870 for (i = 0; i < urb->number_of_packets; i++) {
1871 if (put_user(urb->iso_frame_desc[i].actual_length,
1872 &userurb->iso_frame_desc[i].actual_length))
d794a021 1873 goto err_out;
668a9541
CL
1874 if (put_user(urb->iso_frame_desc[i].status,
1875 &userurb->iso_frame_desc[i].status))
d794a021 1876 goto err_out;
668a9541 1877 }
1da177e4
LT
1878 }
1879
1da177e4
LT
1880 if (put_user(addr, (void __user * __user *)arg))
1881 return -EFAULT;
1882 return 0;
d794a021
ON
1883
1884err_out:
d794a021 1885 return -EFAULT;
1da177e4
LT
1886}
1887
9b6f0c4b 1888static struct async *reap_as(struct usb_dev_state *ps)
1da177e4 1889{
04e482ff 1890 DECLARE_WAITQUEUE(wait, current);
1da177e4
LT
1891 struct async *as = NULL;
1892 struct usb_device *dev = ps->dev;
1893
1894 add_wait_queue(&ps->wait, &wait);
1895 for (;;) {
1896 __set_current_state(TASK_INTERRUPTIBLE);
04e482ff 1897 as = async_getcompleted(ps);
3f2cee73 1898 if (as || !connected(ps))
1da177e4
LT
1899 break;
1900 if (signal_pending(current))
1901 break;
1902 usb_unlock_device(dev);
1903 schedule();
1904 usb_lock_device(dev);
1905 }
1906 remove_wait_queue(&ps->wait, &wait);
1907 set_current_state(TASK_RUNNING);
1908 return as;
1909}
1910
9b6f0c4b 1911static int proc_reapurb(struct usb_dev_state *ps, void __user *arg)
1da177e4
LT
1912{
1913 struct async *as = reap_as(ps);
a016a816 1914
ddeee0b2 1915 if (as) {
a016a816
AS
1916 int retval;
1917
2f964780 1918 snoop(&ps->dev->dev, "reap %pK\n", as->userurb);
a016a816 1919 retval = processcompl(as, (void __user * __user *)arg);
ddeee0b2
LT
1920 free_async(as);
1921 return retval;
1922 }
1da177e4
LT
1923 if (signal_pending(current))
1924 return -EINTR;
3f2cee73 1925 return -ENODEV;
1da177e4
LT
1926}
1927
9b6f0c4b 1928static int proc_reapurbnonblock(struct usb_dev_state *ps, void __user *arg)
1da177e4 1929{
ddeee0b2 1930 int retval;
1da177e4
LT
1931 struct async *as;
1932
ddeee0b2 1933 as = async_getcompleted(ps);
ddeee0b2 1934 if (as) {
2f964780 1935 snoop(&ps->dev->dev, "reap %pK\n", as->userurb);
ddeee0b2
LT
1936 retval = processcompl(as, (void __user * __user *)arg);
1937 free_async(as);
3f2cee73
AS
1938 } else {
1939 retval = (connected(ps) ? -EAGAIN : -ENODEV);
ddeee0b2
LT
1940 }
1941 return retval;
1da177e4
LT
1942}
1943
1944#ifdef CONFIG_COMPAT
9b6f0c4b 1945static int proc_control_compat(struct usb_dev_state *ps,
637e8a60
AB
1946 struct usbdevfs_ctrltransfer32 __user *p32)
1947{
5b32c385
MB
1948 struct usbdevfs_ctrltransfer __user *p;
1949 __u32 udata;
1950 p = compat_alloc_user_space(sizeof(*p));
1951 if (copy_in_user(p, p32, (sizeof(*p32) - sizeof(compat_caddr_t))) ||
1952 get_user(udata, &p32->data) ||
637e8a60
AB
1953 put_user(compat_ptr(udata), &p->data))
1954 return -EFAULT;
5b32c385 1955 return proc_control(ps, p);
637e8a60
AB
1956}
1957
9b6f0c4b 1958static int proc_bulk_compat(struct usb_dev_state *ps,
637e8a60
AB
1959 struct usbdevfs_bulktransfer32 __user *p32)
1960{
06793f2d
MB
1961 struct usbdevfs_bulktransfer __user *p;
1962 compat_uint_t n;
1963 compat_caddr_t addr;
637e8a60 1964
06793f2d 1965 p = compat_alloc_user_space(sizeof(*p));
637e8a60 1966
06793f2d
MB
1967 if (get_user(n, &p32->ep) || put_user(n, &p->ep) ||
1968 get_user(n, &p32->len) || put_user(n, &p->len) ||
1969 get_user(n, &p32->timeout) || put_user(n, &p->timeout) ||
1970 get_user(addr, &p32->data) || put_user(compat_ptr(addr), &p->data))
1971 return -EFAULT;
637e8a60 1972
06793f2d 1973 return proc_bulk(ps, p);
637e8a60 1974}
9b6f0c4b 1975static int proc_disconnectsignal_compat(struct usb_dev_state *ps, void __user *arg)
637e8a60
AB
1976{
1977 struct usbdevfs_disconnectsignal32 ds;
1978
1979 if (copy_from_user(&ds, arg, sizeof(ds)))
1980 return -EFAULT;
1981 ps->discsignr = ds.signr;
1982 ps->disccontext = compat_ptr(ds.context);
1983 return 0;
1984}
1da177e4
LT
1985
1986static int get_urb32(struct usbdevfs_urb *kurb,
1987 struct usbdevfs_urb32 __user *uurb)
1988{
cc1a7c4b
AV
1989 struct usbdevfs_urb32 urb32;
1990 if (copy_from_user(&urb32, uurb, sizeof(*uurb)))
1da177e4 1991 return -EFAULT;
cc1a7c4b
AV
1992 kurb->type = urb32.type;
1993 kurb->endpoint = urb32.endpoint;
1994 kurb->status = urb32.status;
1995 kurb->flags = urb32.flags;
1996 kurb->buffer = compat_ptr(urb32.buffer);
1997 kurb->buffer_length = urb32.buffer_length;
1998 kurb->actual_length = urb32.actual_length;
1999 kurb->start_frame = urb32.start_frame;
2000 kurb->number_of_packets = urb32.number_of_packets;
2001 kurb->error_count = urb32.error_count;
2002 kurb->signr = urb32.signr;
2003 kurb->usercontext = compat_ptr(urb32.usercontext);
1da177e4
LT
2004 return 0;
2005}
2006
9b6f0c4b 2007static int proc_submiturb_compat(struct usb_dev_state *ps, void __user *arg)
1da177e4
LT
2008{
2009 struct usbdevfs_urb uurb;
2010
04e482ff 2011 if (get_urb32(&uurb, (struct usbdevfs_urb32 __user *)arg))
1da177e4
LT
2012 return -EFAULT;
2013
04e482ff
GKH
2014 return proc_do_submiturb(ps, &uurb,
2015 ((struct usbdevfs_urb32 __user *)arg)->iso_frame_desc,
2016 arg);
1da177e4
LT
2017}
2018
2019static int processcompl_compat(struct async *as, void __user * __user *arg)
2020{
2021 struct urb *urb = as->urb;
2022 struct usbdevfs_urb32 __user *userurb = as->userurb;
2023 void __user *addr = as->userurb;
2024 unsigned int i;
2025
2ef47001 2026 compute_isochronous_actual_length(urb);
2102e06a 2027 if (as->userbuffer && urb->actual_length) {
3d97ff63 2028 if (copy_urb_data_to_user(as->userbuffer, urb))
1da177e4 2029 return -EFAULT;
2102e06a 2030 }
e015268d 2031 if (put_user(as->status, &userurb->status))
1da177e4
LT
2032 return -EFAULT;
2033 if (put_user(urb->actual_length, &userurb->actual_length))
2034 return -EFAULT;
2035 if (put_user(urb->error_count, &userurb->error_count))
2036 return -EFAULT;
2037
93cf9b90 2038 if (usb_endpoint_xfer_isoc(&urb->ep->desc)) {
668a9541
CL
2039 for (i = 0; i < urb->number_of_packets; i++) {
2040 if (put_user(urb->iso_frame_desc[i].actual_length,
2041 &userurb->iso_frame_desc[i].actual_length))
2042 return -EFAULT;
2043 if (put_user(urb->iso_frame_desc[i].status,
2044 &userurb->iso_frame_desc[i].status))
2045 return -EFAULT;
2046 }
1da177e4
LT
2047 }
2048
c714de5d 2049 if (put_user(ptr_to_compat(addr), (u32 __user *)arg))
1da177e4
LT
2050 return -EFAULT;
2051 return 0;
2052}
2053
9b6f0c4b 2054static int proc_reapurb_compat(struct usb_dev_state *ps, void __user *arg)
1da177e4
LT
2055{
2056 struct async *as = reap_as(ps);
a016a816 2057
ddeee0b2 2058 if (as) {
a016a816
AS
2059 int retval;
2060
2f964780 2061 snoop(&ps->dev->dev, "reap %pK\n", as->userurb);
a016a816 2062 retval = processcompl_compat(as, (void __user * __user *)arg);
ddeee0b2
LT
2063 free_async(as);
2064 return retval;
2065 }
1da177e4
LT
2066 if (signal_pending(current))
2067 return -EINTR;
3f2cee73 2068 return -ENODEV;
1da177e4
LT
2069}
2070
9b6f0c4b 2071static int proc_reapurbnonblock_compat(struct usb_dev_state *ps, void __user *arg)
1da177e4 2072{
ddeee0b2 2073 int retval;
1da177e4
LT
2074 struct async *as;
2075
ddeee0b2
LT
2076 as = async_getcompleted(ps);
2077 if (as) {
2f964780 2078 snoop(&ps->dev->dev, "reap %pK\n", as->userurb);
ddeee0b2
LT
2079 retval = processcompl_compat(as, (void __user * __user *)arg);
2080 free_async(as);
3f2cee73
AS
2081 } else {
2082 retval = (connected(ps) ? -EAGAIN : -ENODEV);
ddeee0b2
LT
2083 }
2084 return retval;
1da177e4
LT
2085}
2086
637e8a60 2087
1da177e4
LT
2088#endif
2089
9b6f0c4b 2090static int proc_disconnectsignal(struct usb_dev_state *ps, void __user *arg)
1da177e4
LT
2091{
2092 struct usbdevfs_disconnectsignal ds;
2093
2094 if (copy_from_user(&ds, arg, sizeof(ds)))
2095 return -EFAULT;
1da177e4
LT
2096 ps->discsignr = ds.signr;
2097 ps->disccontext = ds.context;
2098 return 0;
2099}
2100
9b6f0c4b 2101static int proc_claiminterface(struct usb_dev_state *ps, void __user *arg)
1da177e4
LT
2102{
2103 unsigned int ifnum;
2104
2105 if (get_user(ifnum, (unsigned int __user *)arg))
2106 return -EFAULT;
2107 return claimintf(ps, ifnum);
2108}
2109
9b6f0c4b 2110static int proc_releaseinterface(struct usb_dev_state *ps, void __user *arg)
1da177e4
LT
2111{
2112 unsigned int ifnum;
2113 int ret;
2114
2115 if (get_user(ifnum, (unsigned int __user *)arg))
2116 return -EFAULT;
135551ea
KB
2117 ret = releaseintf(ps, ifnum);
2118 if (ret < 0)
1da177e4 2119 return ret;
64f10edf 2120 destroy_async_on_interface(ps, ifnum);
1da177e4
LT
2121 return 0;
2122}
2123
9b6f0c4b 2124static int proc_ioctl(struct usb_dev_state *ps, struct usbdevfs_ioctl *ctl)
1da177e4 2125{
1da177e4
LT
2126 int size;
2127 void *buf = NULL;
2128 int retval = 0;
2129 struct usb_interface *intf = NULL;
2130 struct usb_driver *driver = NULL;
1da177e4 2131
d883f52e
RG
2132 if (ps->privileges_dropped)
2133 return -EACCES;
2134
c36fc889 2135 /* alloc buffer */
135551ea
KB
2136 size = _IOC_SIZE(ctl->ioctl_code);
2137 if (size > 0) {
4baf0df7
2138 buf = kmalloc(size, GFP_KERNEL);
2139 if (buf == NULL)
1da177e4 2140 return -ENOMEM;
c36fc889 2141 if ((_IOC_DIR(ctl->ioctl_code) & _IOC_WRITE)) {
04e482ff 2142 if (copy_from_user(buf, ctl->data, size)) {
6fd19f4b 2143 kfree(buf);
1da177e4
LT
2144 return -EFAULT;
2145 }
2146 } else {
04e482ff 2147 memset(buf, 0, size);
1da177e4
LT
2148 }
2149 }
2150
349710c3 2151 if (!connected(ps)) {
6fd19f4b 2152 kfree(buf);
1da177e4
LT
2153 return -ENODEV;
2154 }
2155
2156 if (ps->dev->state != USB_STATE_CONFIGURED)
2157 retval = -EHOSTUNREACH;
04e482ff
GKH
2158 else if (!(intf = usb_ifnum_to_if(ps->dev, ctl->ifno)))
2159 retval = -EINVAL;
c36fc889 2160 else switch (ctl->ioctl_code) {
1da177e4
LT
2161
2162 /* disconnect kernel driver from interface */
2163 case USBDEVFS_DISCONNECT:
1da177e4
LT
2164 if (intf->dev.driver) {
2165 driver = to_usb_driver(intf->dev.driver);
04e482ff 2166 dev_dbg(&intf->dev, "disconnect by usbfs\n");
1da177e4
LT
2167 usb_driver_release_interface(driver, intf);
2168 } else
2169 retval = -ENODATA;
1da177e4
LT
2170 break;
2171
2172 /* let kernel drivers try to (re)bind to the interface */
2173 case USBDEVFS_CONNECT:
885e9747
AS
2174 if (!intf->dev.driver)
2175 retval = device_attach(&intf->dev);
2176 else
2177 retval = -EBUSY;
1da177e4
LT
2178 break;
2179
2180 /* talk directly to the interface's driver */
2181 default:
1da177e4
LT
2182 if (intf->dev.driver)
2183 driver = to_usb_driver(intf->dev.driver);
c532b29a 2184 if (driver == NULL || driver->unlocked_ioctl == NULL) {
1da177e4
LT
2185 retval = -ENOTTY;
2186 } else {
c532b29a 2187 retval = driver->unlocked_ioctl(intf, ctl->ioctl_code, buf);
1da177e4
LT
2188 if (retval == -ENOIOCTLCMD)
2189 retval = -ENOTTY;
2190 }
1da177e4
LT
2191 }
2192
2193 /* cleanup and return */
2194 if (retval >= 0
04e482ff 2195 && (_IOC_DIR(ctl->ioctl_code) & _IOC_READ) != 0
1da177e4 2196 && size > 0
04e482ff 2197 && copy_to_user(ctl->data, buf, size) != 0)
1da177e4 2198 retval = -EFAULT;
6fd19f4b
JJ
2199
2200 kfree(buf);
1da177e4
LT
2201 return retval;
2202}
2203
9b6f0c4b 2204static int proc_ioctl_default(struct usb_dev_state *ps, void __user *arg)
c36fc889
PZ
2205{
2206 struct usbdevfs_ioctl ctrl;
2207
04e482ff 2208 if (copy_from_user(&ctrl, arg, sizeof(ctrl)))
c36fc889
PZ
2209 return -EFAULT;
2210 return proc_ioctl(ps, &ctrl);
2211}
2212
2213#ifdef CONFIG_COMPAT
9b6f0c4b 2214static int proc_ioctl_compat(struct usb_dev_state *ps, compat_uptr_t arg)
c36fc889 2215{
cc1a7c4b 2216 struct usbdevfs_ioctl32 ioc32;
c36fc889 2217 struct usbdevfs_ioctl ctrl;
c36fc889 2218
cc1a7c4b 2219 if (copy_from_user(&ioc32, compat_ptr(arg), sizeof(ioc32)))
c36fc889 2220 return -EFAULT;
cc1a7c4b
AV
2221 ctrl.ifno = ioc32.ifno;
2222 ctrl.ioctl_code = ioc32.ioctl_code;
2223 ctrl.data = compat_ptr(ioc32.data);
c36fc889
PZ
2224 return proc_ioctl(ps, &ctrl);
2225}
2226#endif
2227
9b6f0c4b 2228static int proc_claim_port(struct usb_dev_state *ps, void __user *arg)
7cbe5dca
AS
2229{
2230 unsigned portnum;
2231 int rc;
2232
2233 if (get_user(portnum, (unsigned __user *) arg))
2234 return -EFAULT;
2235 rc = usb_hub_claim_port(ps->dev, portnum, ps);
2236 if (rc == 0)
2237 snoop(&ps->dev->dev, "port %d claimed by process %d: %s\n",
2238 portnum, task_pid_nr(current), current->comm);
2239 return rc;
2240}
2241
9b6f0c4b 2242static int proc_release_port(struct usb_dev_state *ps, void __user *arg)
7cbe5dca
AS
2243{
2244 unsigned portnum;
2245
2246 if (get_user(portnum, (unsigned __user *) arg))
2247 return -EFAULT;
2248 return usb_hub_release_port(ps->dev, portnum, ps);
2249}
2250
9b6f0c4b 2251static int proc_get_capabilities(struct usb_dev_state *ps, void __user *arg)
19181bc5
HG
2252{
2253 __u32 caps;
2254
3f2cee73 2255 caps = USBDEVFS_CAP_ZERO_PACKET | USBDEVFS_CAP_NO_PACKET_SIZE_LIM |
d883f52e
RG
2256 USBDEVFS_CAP_REAP_AFTER_DISCONNECT | USBDEVFS_CAP_MMAP |
2257 USBDEVFS_CAP_DROP_PRIVILEGES;
19181bc5
HG
2258 if (!ps->dev->bus->no_stop_on_short)
2259 caps |= USBDEVFS_CAP_BULK_CONTINUATION;
3d97ff63
HG
2260 if (ps->dev->bus->sg_tablesize)
2261 caps |= USBDEVFS_CAP_BULK_SCATTER_GATHER;
19181bc5
HG
2262
2263 if (put_user(caps, (__u32 __user *)arg))
2264 return -EFAULT;
2265
2266 return 0;
2267}
2268
9b6f0c4b 2269static int proc_disconnect_claim(struct usb_dev_state *ps, void __user *arg)
0837e7e5
HG
2270{
2271 struct usbdevfs_disconnect_claim dc;
2272 struct usb_interface *intf;
2273
2274 if (copy_from_user(&dc, arg, sizeof(dc)))
2275 return -EFAULT;
2276
2277 intf = usb_ifnum_to_if(ps->dev, dc.interface);
2278 if (!intf)
2279 return -EINVAL;
2280
2281 if (intf->dev.driver) {
2282 struct usb_driver *driver = to_usb_driver(intf->dev.driver);
2283
d883f52e
RG
2284 if (ps->privileges_dropped)
2285 return -EACCES;
2286
0837e7e5
HG
2287 if ((dc.flags & USBDEVFS_DISCONNECT_CLAIM_IF_DRIVER) &&
2288 strncmp(dc.driver, intf->dev.driver->name,
2289 sizeof(dc.driver)) != 0)
2290 return -EBUSY;
2291
2292 if ((dc.flags & USBDEVFS_DISCONNECT_CLAIM_EXCEPT_DRIVER) &&
2293 strncmp(dc.driver, intf->dev.driver->name,
2294 sizeof(dc.driver)) == 0)
2295 return -EBUSY;
2296
2297 dev_dbg(&intf->dev, "disconnect by usbfs\n");
2298 usb_driver_release_interface(driver, intf);
2299 }
2300
2301 return claimintf(ps, dc.interface);
2302}
2303
3e75c6de 2304static int proc_alloc_streams(struct usb_dev_state *ps, void __user *arg)
bcf7f6e3
HG
2305{
2306 unsigned num_streams, num_eps;
2307 struct usb_host_endpoint **eps;
2308 struct usb_interface *intf;
2309 int r;
2310
2311 r = parse_usbdevfs_streams(ps, arg, &num_streams, &num_eps,
2312 &eps, &intf);
2313 if (r)
2314 return r;
2315
2316 destroy_async_on_interface(ps,
2317 intf->altsetting[0].desc.bInterfaceNumber);
2318
2319 r = usb_alloc_streams(intf, eps, num_eps, num_streams, GFP_KERNEL);
2320 kfree(eps);
2321 return r;
2322}
2323
3e75c6de 2324static int proc_free_streams(struct usb_dev_state *ps, void __user *arg)
bcf7f6e3
HG
2325{
2326 unsigned num_eps;
2327 struct usb_host_endpoint **eps;
2328 struct usb_interface *intf;
2329 int r;
2330
2331 r = parse_usbdevfs_streams(ps, arg, NULL, &num_eps, &eps, &intf);
2332 if (r)
2333 return r;
2334
2335 destroy_async_on_interface(ps,
2336 intf->altsetting[0].desc.bInterfaceNumber);
2337
2338 r = usb_free_streams(intf, eps, num_eps, GFP_KERNEL);
2339 kfree(eps);
2340 return r;
2341}
2342
d883f52e
RG
2343static int proc_drop_privileges(struct usb_dev_state *ps, void __user *arg)
2344{
2345 u32 data;
2346
2347 if (copy_from_user(&data, arg, sizeof(data)))
2348 return -EFAULT;
2349
0f5e1558 2350 /* This is a one way operation. Once privileges are
d883f52e
RG
2351 * dropped, you cannot regain them. You may however reissue
2352 * this ioctl to shrink the allowed interfaces mask.
2353 */
2354 ps->interface_allowed_mask &= data;
2355 ps->privileges_dropped = true;
2356
2357 return 0;
2358}
2359
1da177e4
LT
2360/*
2361 * NOTE: All requests here that have interface numbers as parameters
2362 * are assuming that somehow the configuration has been prevented from
2363 * changing. But there's no mechanism to ensure that...
2364 */
637e8a60
AB
2365static long usbdev_do_ioctl(struct file *file, unsigned int cmd,
2366 void __user *p)
1da177e4 2367{
9b6f0c4b 2368 struct usb_dev_state *ps = file->private_data;
496ad9aa 2369 struct inode *inode = file_inode(file);
1da177e4 2370 struct usb_device *dev = ps->dev;
1da177e4
LT
2371 int ret = -ENOTTY;
2372
2373 if (!(file->f_mode & FMODE_WRITE))
2374 return -EPERM;
01412a21 2375
1da177e4 2376 usb_lock_device(dev);
3f2cee73
AS
2377
2378 /* Reap operations are allowed even after disconnection */
2379 switch (cmd) {
2380 case USBDEVFS_REAPURB:
2381 snoop(&dev->dev, "%s: REAPURB\n", __func__);
2382 ret = proc_reapurb(ps, p);
2383 goto done;
2384
2385 case USBDEVFS_REAPURBNDELAY:
2386 snoop(&dev->dev, "%s: REAPURBNDELAY\n", __func__);
2387 ret = proc_reapurbnonblock(ps, p);
2388 goto done;
2389
2390#ifdef CONFIG_COMPAT
2391 case USBDEVFS_REAPURB32:
2392 snoop(&dev->dev, "%s: REAPURB32\n", __func__);
2393 ret = proc_reapurb_compat(ps, p);
2394 goto done;
2395
2396 case USBDEVFS_REAPURBNDELAY32:
2397 snoop(&dev->dev, "%s: REAPURBNDELAY32\n", __func__);
2398 ret = proc_reapurbnonblock_compat(ps, p);
2399 goto done;
2400#endif
2401 }
2402
349710c3 2403 if (!connected(ps)) {
1da177e4
LT
2404 usb_unlock_device(dev);
2405 return -ENODEV;
2406 }
2407
2408 switch (cmd) {
2409 case USBDEVFS_CONTROL:
441b62c1 2410 snoop(&dev->dev, "%s: CONTROL\n", __func__);
1da177e4
LT
2411 ret = proc_control(ps, p);
2412 if (ret >= 0)
078cd827 2413 inode->i_mtime = current_time(inode);
1da177e4
LT
2414 break;
2415
2416 case USBDEVFS_BULK:
441b62c1 2417 snoop(&dev->dev, "%s: BULK\n", __func__);
1da177e4
LT
2418 ret = proc_bulk(ps, p);
2419 if (ret >= 0)
078cd827 2420 inode->i_mtime = current_time(inode);
1da177e4
LT
2421 break;
2422
2423 case USBDEVFS_RESETEP:
441b62c1 2424 snoop(&dev->dev, "%s: RESETEP\n", __func__);
1da177e4
LT
2425 ret = proc_resetep(ps, p);
2426 if (ret >= 0)
078cd827 2427 inode->i_mtime = current_time(inode);
1da177e4
LT
2428 break;
2429
2430 case USBDEVFS_RESET:
441b62c1 2431 snoop(&dev->dev, "%s: RESET\n", __func__);
1da177e4
LT
2432 ret = proc_resetdevice(ps);
2433 break;
2434
2435 case USBDEVFS_CLEAR_HALT:
441b62c1 2436 snoop(&dev->dev, "%s: CLEAR_HALT\n", __func__);
1da177e4
LT
2437 ret = proc_clearhalt(ps, p);
2438 if (ret >= 0)
078cd827 2439 inode->i_mtime = current_time(inode);
1da177e4
LT
2440 break;
2441
2442 case USBDEVFS_GETDRIVER:
441b62c1 2443 snoop(&dev->dev, "%s: GETDRIVER\n", __func__);
1da177e4
LT
2444 ret = proc_getdriver(ps, p);
2445 break;
2446
2447 case USBDEVFS_CONNECTINFO:
441b62c1 2448 snoop(&dev->dev, "%s: CONNECTINFO\n", __func__);
1da177e4
LT
2449 ret = proc_connectinfo(ps, p);
2450 break;
2451
2452 case USBDEVFS_SETINTERFACE:
441b62c1 2453 snoop(&dev->dev, "%s: SETINTERFACE\n", __func__);
1da177e4
LT
2454 ret = proc_setintf(ps, p);
2455 break;
2456
2457 case USBDEVFS_SETCONFIGURATION:
441b62c1 2458 snoop(&dev->dev, "%s: SETCONFIGURATION\n", __func__);
1da177e4
LT
2459 ret = proc_setconfig(ps, p);
2460 break;
2461
2462 case USBDEVFS_SUBMITURB:
441b62c1 2463 snoop(&dev->dev, "%s: SUBMITURB\n", __func__);
1da177e4
LT
2464 ret = proc_submiturb(ps, p);
2465 if (ret >= 0)
078cd827 2466 inode->i_mtime = current_time(inode);
1da177e4
LT
2467 break;
2468
2469#ifdef CONFIG_COMPAT
637e8a60
AB
2470 case USBDEVFS_CONTROL32:
2471 snoop(&dev->dev, "%s: CONTROL32\n", __func__);
2472 ret = proc_control_compat(ps, p);
2473 if (ret >= 0)
078cd827 2474 inode->i_mtime = current_time(inode);
637e8a60
AB
2475 break;
2476
2477 case USBDEVFS_BULK32:
2478 snoop(&dev->dev, "%s: BULK32\n", __func__);
2479 ret = proc_bulk_compat(ps, p);
2480 if (ret >= 0)
078cd827 2481 inode->i_mtime = current_time(inode);
637e8a60
AB
2482 break;
2483
2484 case USBDEVFS_DISCSIGNAL32:
2485 snoop(&dev->dev, "%s: DISCSIGNAL32\n", __func__);
2486 ret = proc_disconnectsignal_compat(ps, p);
2487 break;
1da177e4
LT
2488
2489 case USBDEVFS_SUBMITURB32:
441b62c1 2490 snoop(&dev->dev, "%s: SUBMITURB32\n", __func__);
1da177e4
LT
2491 ret = proc_submiturb_compat(ps, p);
2492 if (ret >= 0)
078cd827 2493 inode->i_mtime = current_time(inode);
1da177e4
LT
2494 break;
2495
c36fc889 2496 case USBDEVFS_IOCTL32:
637e8a60 2497 snoop(&dev->dev, "%s: IOCTL32\n", __func__);
c714de5d 2498 ret = proc_ioctl_compat(ps, ptr_to_compat(p));
c36fc889 2499 break;
1da177e4
LT
2500#endif
2501
2502 case USBDEVFS_DISCARDURB:
2f964780 2503 snoop(&dev->dev, "%s: DISCARDURB %pK\n", __func__, p);
1da177e4
LT
2504 ret = proc_unlinkurb(ps, p);
2505 break;
2506
1da177e4 2507 case USBDEVFS_DISCSIGNAL:
441b62c1 2508 snoop(&dev->dev, "%s: DISCSIGNAL\n", __func__);
1da177e4
LT
2509 ret = proc_disconnectsignal(ps, p);
2510 break;
2511
2512 case USBDEVFS_CLAIMINTERFACE:
441b62c1 2513 snoop(&dev->dev, "%s: CLAIMINTERFACE\n", __func__);
1da177e4
LT
2514 ret = proc_claiminterface(ps, p);
2515 break;
2516
2517 case USBDEVFS_RELEASEINTERFACE:
441b62c1 2518 snoop(&dev->dev, "%s: RELEASEINTERFACE\n", __func__);
1da177e4
LT
2519 ret = proc_releaseinterface(ps, p);
2520 break;
2521
2522 case USBDEVFS_IOCTL:
441b62c1 2523 snoop(&dev->dev, "%s: IOCTL\n", __func__);
c36fc889 2524 ret = proc_ioctl_default(ps, p);
1da177e4 2525 break;
7cbe5dca
AS
2526
2527 case USBDEVFS_CLAIM_PORT:
2528 snoop(&dev->dev, "%s: CLAIM_PORT\n", __func__);
2529 ret = proc_claim_port(ps, p);
2530 break;
2531
2532 case USBDEVFS_RELEASE_PORT:
2533 snoop(&dev->dev, "%s: RELEASE_PORT\n", __func__);
2534 ret = proc_release_port(ps, p);
2535 break;
19181bc5
HG
2536 case USBDEVFS_GET_CAPABILITIES:
2537 ret = proc_get_capabilities(ps, p);
2538 break;
0837e7e5
HG
2539 case USBDEVFS_DISCONNECT_CLAIM:
2540 ret = proc_disconnect_claim(ps, p);
2541 break;
bcf7f6e3
HG
2542 case USBDEVFS_ALLOC_STREAMS:
2543 ret = proc_alloc_streams(ps, p);
2544 break;
2545 case USBDEVFS_FREE_STREAMS:
2546 ret = proc_free_streams(ps, p);
2547 break;
d883f52e
RG
2548 case USBDEVFS_DROP_PRIVILEGES:
2549 ret = proc_drop_privileges(ps, p);
2550 break;
c01b244a
AS
2551 case USBDEVFS_GET_SPEED:
2552 ret = ps->dev->speed;
2553 break;
1da177e4 2554 }
3f2cee73
AS
2555
2556 done:
1da177e4
LT
2557 usb_unlock_device(dev);
2558 if (ret >= 0)
078cd827 2559 inode->i_atime = current_time(inode);
1da177e4
LT
2560 return ret;
2561}
2562
637e8a60
AB
2563static long usbdev_ioctl(struct file *file, unsigned int cmd,
2564 unsigned long arg)
2565{
2566 int ret;
2567
637e8a60 2568 ret = usbdev_do_ioctl(file, cmd, (void __user *)arg);
637e8a60
AB
2569
2570 return ret;
2571}
2572
2573#ifdef CONFIG_COMPAT
2574static long usbdev_compat_ioctl(struct file *file, unsigned int cmd,
2575 unsigned long arg)
2576{
2577 int ret;
2578
637e8a60 2579 ret = usbdev_do_ioctl(file, cmd, compat_ptr(arg));
637e8a60
AB
2580
2581 return ret;
2582}
2583#endif
2584
1da177e4 2585/* No kernel lock - fine */
afc9a42b 2586static __poll_t usbdev_poll(struct file *file,
04e482ff 2587 struct poll_table_struct *wait)
1da177e4 2588{
9b6f0c4b 2589 struct usb_dev_state *ps = file->private_data;
afc9a42b 2590 __poll_t mask = 0;
1da177e4
LT
2591
2592 poll_wait(file, &ps->wait, wait);
2593 if (file->f_mode & FMODE_WRITE && !list_empty(&ps->async_completed))
a9a08845 2594 mask |= EPOLLOUT | EPOLLWRNORM;
349710c3 2595 if (!connected(ps))
a9a08845 2596 mask |= EPOLLHUP;
5cce4382 2597 if (list_empty(&ps->list))
a9a08845 2598 mask |= EPOLLERR;
1da177e4
LT
2599 return mask;
2600}
2601
9f8b17e6 2602const struct file_operations usbdev_file_operations = {
637e8a60 2603 .owner = THIS_MODULE,
b25472f9 2604 .llseek = no_seek_end_llseek,
637e8a60
AB
2605 .read = usbdev_read,
2606 .poll = usbdev_poll,
2607 .unlocked_ioctl = usbdev_ioctl,
2608#ifdef CONFIG_COMPAT
2609 .compat_ioctl = usbdev_compat_ioctl,
2610#endif
f7d34b44 2611 .mmap = usbdev_mmap,
637e8a60
AB
2612 .open = usbdev_open,
2613 .release = usbdev_release,
1da177e4 2614};
fbf82fd2 2615
501950d8 2616static void usbdev_remove(struct usb_device *udev)
cd9f0375 2617{
9b6f0c4b 2618 struct usb_dev_state *ps;
ae7795bc 2619 struct kernel_siginfo sinfo;
cd9f0375
AS
2620
2621 while (!list_empty(&udev->filelist)) {
9b6f0c4b 2622 ps = list_entry(udev->filelist.next, struct usb_dev_state, list);
cd9f0375
AS
2623 destroy_all_async(ps);
2624 wake_up_all(&ps->wait);
2625 list_del_init(&ps->list);
2626 if (ps->discsignr) {
3b10db2b 2627 clear_siginfo(&sinfo);
cd9f0375
AS
2628 sinfo.si_signo = ps->discsignr;
2629 sinfo.si_errno = EPIPE;
2630 sinfo.si_code = SI_ASYNCIO;
2631 sinfo.si_addr = ps->disccontext;
d178bc3a 2632 kill_pid_info_as_cred(ps->discsignr, &sinfo,
6b4f3d01 2633 ps->disc_pid, ps->cred);
cd9f0375
AS
2634 }
2635 }
2636}
2637
501950d8 2638static int usbdev_notify(struct notifier_block *self,
9f8b17e6 2639 unsigned long action, void *dev)
a7b986b3
GKH
2640{
2641 switch (action) {
2642 case USB_DEVICE_ADD:
a7b986b3
GKH
2643 break;
2644 case USB_DEVICE_REMOVE:
501950d8 2645 usbdev_remove(dev);
a7b986b3
GKH
2646 break;
2647 }
2648 return NOTIFY_OK;
2649}
2650
2651static struct notifier_block usbdev_nb = {
00fe52de 2652 .notifier_call = usbdev_notify,
a7b986b3
GKH
2653};
2654
7e7654a9 2655static struct cdev usb_device_cdev;
fbf82fd2 2656
9f8b17e6 2657int __init usb_devio_init(void)
fbf82fd2
KS
2658{
2659 int retval;
2660
fad21bdf 2661 retval = register_chrdev_region(USB_DEVICE_DEV, USB_DEVICE_MAX,
04e482ff 2662 "usb_device");
fbf82fd2 2663 if (retval) {
69a85942 2664 printk(KERN_ERR "Unable to register minors for usb_device\n");
fbf82fd2
KS
2665 goto out;
2666 }
9f8b17e6 2667 cdev_init(&usb_device_cdev, &usbdev_file_operations);
fad21bdf 2668 retval = cdev_add(&usb_device_cdev, USB_DEVICE_DEV, USB_DEVICE_MAX);
fbf82fd2 2669 if (retval) {
69a85942
GKH
2670 printk(KERN_ERR "Unable to get usb_device major %d\n",
2671 USB_DEVICE_MAJOR);
a7b986b3 2672 goto error_cdev;
fbf82fd2 2673 }
501950d8 2674 usb_register_notify(&usbdev_nb);
fbf82fd2
KS
2675out:
2676 return retval;
a7b986b3 2677
a7b986b3
GKH
2678error_cdev:
2679 unregister_chrdev_region(USB_DEVICE_DEV, USB_DEVICE_MAX);
2680 goto out;
fbf82fd2
KS
2681}
2682
9f8b17e6 2683void usb_devio_cleanup(void)
fbf82fd2 2684{
a7b986b3 2685 usb_unregister_notify(&usbdev_nb);
fbf82fd2 2686 cdev_del(&usb_device_cdev);
fad21bdf 2687 unregister_chrdev_region(USB_DEVICE_DEV, USB_DEVICE_MAX);
fbf82fd2 2688}