]> git.proxmox.com Git - mirror_ubuntu-zesty-kernel.git/blame - drivers/usb/core/devio.c
USB: get rid of urb->lock
[mirror_ubuntu-zesty-kernel.git] / drivers / usb / core / devio.c
CommitLineData
1da177e4
LT
1/*****************************************************************************/
2
3/*
4 * devio.c -- User space communication with USB devices.
5 *
6 * Copyright (C) 1999-2000 Thomas Sailer (sailer@ife.ee.ethz.ch)
7 *
8 * This program is free software; you can redistribute it and/or modify
9 * it under the terms of the GNU General Public License as published by
10 * the Free Software Foundation; either version 2 of the License, or
11 * (at your option) any later version.
12 *
13 * This program is distributed in the hope that it will be useful,
14 * but WITHOUT ANY WARRANTY; without even the implied warranty of
15 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
16 * GNU General Public License for more details.
17 *
18 * You should have received a copy of the GNU General Public License
19 * along with this program; if not, write to the Free Software
20 * Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA.
21 *
22 * $Id: devio.c,v 1.7 2000/02/01 17:28:48 fliegl Exp $
23 *
24 * This file implements the usbfs/x/y files, where
25 * x is the bus number and y the device number.
26 *
27 * It allows user space programs/"drivers" to communicate directly
28 * with USB devices without intervening kernel driver.
29 *
30 * Revision history
31 * 22.12.1999 0.1 Initial release (split from proc_usb.c)
32 * 04.01.2000 0.2 Turned into its own filesystem
46113830
HW
33 * 30.09.2005 0.3 Fix user-triggerable oops in async URB delivery
34 * (CAN-2005-3055)
1da177e4
LT
35 */
36
37/*****************************************************************************/
38
39#include <linux/fs.h>
40#include <linux/mm.h>
41#include <linux/slab.h>
42#include <linux/smp_lock.h>
43#include <linux/signal.h>
44#include <linux/poll.h>
45#include <linux/module.h>
46#include <linux/usb.h>
47#include <linux/usbdevice_fs.h>
fbf82fd2 48#include <linux/cdev.h>
a7b986b3 49#include <linux/notifier.h>
7a01955f 50#include <linux/security.h>
1da177e4
LT
51#include <asm/uaccess.h>
52#include <asm/byteorder.h>
53#include <linux/moduleparam.h>
54
55#include "hcd.h" /* for usbcore internals */
56#include "usb.h"
57
fbf82fd2
KS
58#define USB_MAXBUS 64
59#define USB_DEVICE_MAX USB_MAXBUS * 128
fbf82fd2 60
4a2a8a2c
AS
61/* Mutual exclusion for removal, open, and release */
62DEFINE_MUTEX(usbfs_mutex);
63
1da177e4
LT
64struct async {
65 struct list_head asynclist;
66 struct dev_state *ps;
2425c08b 67 struct pid *pid;
46113830 68 uid_t uid, euid;
1da177e4
LT
69 unsigned int signr;
70 unsigned int ifnum;
71 void __user *userbuffer;
72 void __user *userurb;
73 struct urb *urb;
7a01955f 74 u32 secid;
1da177e4
LT
75};
76
77static int usbfs_snoop = 0;
78module_param (usbfs_snoop, bool, S_IRUGO | S_IWUSR);
79MODULE_PARM_DESC (usbfs_snoop, "true to log all usbfs traffic");
80
81#define snoop(dev, format, arg...) \
82 do { \
83 if (usbfs_snoop) \
84 dev_info( dev , format , ## arg); \
85 } while (0)
86
fad21bdf
AS
87#define USB_DEVICE_DEV MKDEV(USB_DEVICE_MAJOR, 0)
88
1da177e4
LT
89
90#define MAX_USBFS_BUFFER_SIZE 16384
91
349710c3 92static inline int connected (struct dev_state *ps)
1da177e4 93{
349710c3
AS
94 return (!list_empty(&ps->list) &&
95 ps->dev->state != USB_STATE_NOTATTACHED);
1da177e4
LT
96}
97
98static loff_t usbdev_lseek(struct file *file, loff_t offset, int orig)
99{
100 loff_t ret;
101
102 lock_kernel();
103
104 switch (orig) {
105 case 0:
106 file->f_pos = offset;
107 ret = file->f_pos;
108 break;
109 case 1:
110 file->f_pos += offset;
111 ret = file->f_pos;
112 break;
113 case 2:
114 default:
115 ret = -EINVAL;
116 }
117
118 unlock_kernel();
119 return ret;
120}
121
122static ssize_t usbdev_read(struct file *file, char __user *buf, size_t nbytes, loff_t *ppos)
123{
ec17cf1c 124 struct dev_state *ps = file->private_data;
1da177e4
LT
125 struct usb_device *dev = ps->dev;
126 ssize_t ret = 0;
127 unsigned len;
128 loff_t pos;
129 int i;
130
131 pos = *ppos;
132 usb_lock_device(dev);
349710c3 133 if (!connected(ps)) {
1da177e4
LT
134 ret = -ENODEV;
135 goto err;
136 } else if (pos < 0) {
137 ret = -EINVAL;
138 goto err;
139 }
140
141 if (pos < sizeof(struct usb_device_descriptor)) {
8781ba0a
ON
142 struct usb_device_descriptor temp_desc ; /* 18 bytes - fits on the stack */
143
144 memcpy(&temp_desc, &dev->descriptor, sizeof(dev->descriptor));
9fcd5c32
AM
145 le16_to_cpus(&temp_desc.bcdUSB);
146 le16_to_cpus(&temp_desc.idVendor);
147 le16_to_cpus(&temp_desc.idProduct);
148 le16_to_cpus(&temp_desc.bcdDevice);
1da177e4
LT
149
150 len = sizeof(struct usb_device_descriptor) - pos;
151 if (len > nbytes)
152 len = nbytes;
8781ba0a 153 if (copy_to_user(buf, ((char *)&temp_desc) + pos, len)) {
1da177e4
LT
154 ret = -EFAULT;
155 goto err;
156 }
1da177e4
LT
157
158 *ppos += len;
159 buf += len;
160 nbytes -= len;
161 ret += len;
162 }
163
164 pos = sizeof(struct usb_device_descriptor);
165 for (i = 0; nbytes && i < dev->descriptor.bNumConfigurations; i++) {
166 struct usb_config_descriptor *config =
167 (struct usb_config_descriptor *)dev->rawdescriptors[i];
168 unsigned int length = le16_to_cpu(config->wTotalLength);
169
170 if (*ppos < pos + length) {
171
172 /* The descriptor may claim to be longer than it
173 * really is. Here is the actual allocated length. */
174 unsigned alloclen =
175 le16_to_cpu(dev->config[i].desc.wTotalLength);
176
177 len = length - (*ppos - pos);
178 if (len > nbytes)
179 len = nbytes;
180
181 /* Simply don't write (skip over) unallocated parts */
182 if (alloclen > (*ppos - pos)) {
183 alloclen -= (*ppos - pos);
184 if (copy_to_user(buf,
185 dev->rawdescriptors[i] + (*ppos - pos),
186 min(len, alloclen))) {
187 ret = -EFAULT;
188 goto err;
189 }
190 }
191
192 *ppos += len;
193 buf += len;
194 nbytes -= len;
195 ret += len;
196 }
197
198 pos += length;
199 }
200
201err:
202 usb_unlock_device(dev);
203 return ret;
204}
205
206/*
207 * async list handling
208 */
209
210static struct async *alloc_async(unsigned int numisoframes)
211{
212 unsigned int assize = sizeof(struct async) + numisoframes * sizeof(struct usb_iso_packet_descriptor);
0a1ef3b5
AS
213 struct async *as = kzalloc(assize, GFP_KERNEL);
214
1da177e4
LT
215 if (!as)
216 return NULL;
1da177e4
LT
217 as->urb = usb_alloc_urb(numisoframes, GFP_KERNEL);
218 if (!as->urb) {
219 kfree(as);
220 return NULL;
221 }
222 return as;
223}
224
225static void free_async(struct async *as)
226{
2425c08b 227 put_pid(as->pid);
6fd19f4b
JJ
228 kfree(as->urb->transfer_buffer);
229 kfree(as->urb->setup_packet);
1da177e4 230 usb_free_urb(as->urb);
6fd19f4b 231 kfree(as);
1da177e4
LT
232}
233
234static inline void async_newpending(struct async *as)
235{
236 struct dev_state *ps = as->ps;
237 unsigned long flags;
238
239 spin_lock_irqsave(&ps->lock, flags);
240 list_add_tail(&as->asynclist, &ps->async_pending);
241 spin_unlock_irqrestore(&ps->lock, flags);
242}
243
244static inline void async_removepending(struct async *as)
245{
246 struct dev_state *ps = as->ps;
247 unsigned long flags;
248
249 spin_lock_irqsave(&ps->lock, flags);
250 list_del_init(&as->asynclist);
251 spin_unlock_irqrestore(&ps->lock, flags);
252}
253
254static inline struct async *async_getcompleted(struct dev_state *ps)
255{
256 unsigned long flags;
257 struct async *as = NULL;
258
259 spin_lock_irqsave(&ps->lock, flags);
260 if (!list_empty(&ps->async_completed)) {
261 as = list_entry(ps->async_completed.next, struct async, asynclist);
262 list_del_init(&as->asynclist);
263 }
264 spin_unlock_irqrestore(&ps->lock, flags);
265 return as;
266}
267
268static inline struct async *async_getpending(struct dev_state *ps, void __user *userurb)
269{
270 unsigned long flags;
271 struct async *as;
272
273 spin_lock_irqsave(&ps->lock, flags);
274 list_for_each_entry(as, &ps->async_pending, asynclist)
275 if (as->userurb == userurb) {
276 list_del_init(&as->asynclist);
277 spin_unlock_irqrestore(&ps->lock, flags);
278 return as;
279 }
280 spin_unlock_irqrestore(&ps->lock, flags);
281 return NULL;
282}
283
e639dd3f
GKH
284static void snoop_urb(struct urb *urb, void __user *userurb)
285{
286 int j;
287 unsigned char *data = urb->transfer_buffer;
288
289 if (!usbfs_snoop)
290 return;
291
93cf9b90
AS
292 dev_info(&urb->dev->dev, "direction=%s\n",
293 usb_urb_dir_in(urb) ? "IN" : "OUT");
e639dd3f
GKH
294 dev_info(&urb->dev->dev, "userurb=%p\n", userurb);
295 dev_info(&urb->dev->dev, "transfer_buffer_length=%d\n",
296 urb->transfer_buffer_length);
297 dev_info(&urb->dev->dev, "actual_length=%d\n", urb->actual_length);
298 dev_info(&urb->dev->dev, "data: ");
299 for (j = 0; j < urb->transfer_buffer_length; ++j)
300 printk ("%02x ", data[j]);
301 printk("\n");
302}
303
7d12e780 304static void async_completed(struct urb *urb)
1da177e4 305{
ec17cf1c 306 struct async *as = urb->context;
1da177e4
LT
307 struct dev_state *ps = as->ps;
308 struct siginfo sinfo;
309
310 spin_lock(&ps->lock);
311 list_move_tail(&as->asynclist, &ps->async_completed);
312 spin_unlock(&ps->lock);
313 if (as->signr) {
314 sinfo.si_signo = as->signr;
315 sinfo.si_errno = as->urb->status;
316 sinfo.si_code = SI_ASYNCIO;
317 sinfo.si_addr = as->userurb;
2425c08b 318 kill_pid_info_as_uid(as->signr, &sinfo, as->pid, as->uid,
7a01955f 319 as->euid, as->secid);
1da177e4 320 }
e639dd3f
GKH
321 snoop(&urb->dev->dev, "urb complete\n");
322 snoop_urb(urb, as->userurb);
323 wake_up(&ps->wait);
1da177e4
LT
324}
325
326static void destroy_async (struct dev_state *ps, struct list_head *list)
327{
328 struct async *as;
329 unsigned long flags;
330
331 spin_lock_irqsave(&ps->lock, flags);
332 while (!list_empty(list)) {
333 as = list_entry(list->next, struct async, asynclist);
334 list_del_init(&as->asynclist);
335
336 /* drop the spinlock so the completion handler can run */
337 spin_unlock_irqrestore(&ps->lock, flags);
338 usb_kill_urb(as->urb);
339 spin_lock_irqsave(&ps->lock, flags);
340 }
341 spin_unlock_irqrestore(&ps->lock, flags);
342 as = async_getcompleted(ps);
343 while (as) {
344 free_async(as);
345 as = async_getcompleted(ps);
346 }
347}
348
349static void destroy_async_on_interface (struct dev_state *ps, unsigned int ifnum)
350{
351 struct list_head *p, *q, hitlist;
352 unsigned long flags;
353
354 INIT_LIST_HEAD(&hitlist);
355 spin_lock_irqsave(&ps->lock, flags);
356 list_for_each_safe(p, q, &ps->async_pending)
357 if (ifnum == list_entry(p, struct async, asynclist)->ifnum)
358 list_move_tail(p, &hitlist);
359 spin_unlock_irqrestore(&ps->lock, flags);
360 destroy_async(ps, &hitlist);
361}
362
363static inline void destroy_all_async(struct dev_state *ps)
364{
365 destroy_async(ps, &ps->async_pending);
366}
367
368/*
369 * interface claims are made only at the request of user level code,
370 * which can also release them (explicitly or by closing files).
371 * they're also undone when devices disconnect.
372 */
373
374static int driver_probe (struct usb_interface *intf,
375 const struct usb_device_id *id)
376{
377 return -ENODEV;
378}
379
380static void driver_disconnect(struct usb_interface *intf)
381{
382 struct dev_state *ps = usb_get_intfdata (intf);
383 unsigned int ifnum = intf->altsetting->desc.bInterfaceNumber;
384
385 if (!ps)
386 return;
387
388 /* NOTE: this relies on usbcore having canceled and completed
389 * all pending I/O requests; 2.6 does that.
390 */
391
392 if (likely(ifnum < 8*sizeof(ps->ifclaimed)))
393 clear_bit(ifnum, &ps->ifclaimed);
394 else
395 warn("interface number %u out of range", ifnum);
396
397 usb_set_intfdata (intf, NULL);
398
399 /* force async requests to complete */
400 destroy_async_on_interface(ps, ifnum);
401}
402
403struct usb_driver usbfs_driver = {
1da177e4
LT
404 .name = "usbfs",
405 .probe = driver_probe,
406 .disconnect = driver_disconnect,
407};
408
409static int claimintf(struct dev_state *ps, unsigned int ifnum)
410{
411 struct usb_device *dev = ps->dev;
412 struct usb_interface *intf;
413 int err;
414
415 if (ifnum >= 8*sizeof(ps->ifclaimed))
416 return -EINVAL;
417 /* already claimed */
418 if (test_bit(ifnum, &ps->ifclaimed))
419 return 0;
420
1da177e4
LT
421 intf = usb_ifnum_to_if(dev, ifnum);
422 if (!intf)
423 err = -ENOENT;
424 else
425 err = usb_driver_claim_interface(&usbfs_driver, intf, ps);
1da177e4
LT
426 if (err == 0)
427 set_bit(ifnum, &ps->ifclaimed);
428 return err;
429}
430
431static int releaseintf(struct dev_state *ps, unsigned int ifnum)
432{
433 struct usb_device *dev;
434 struct usb_interface *intf;
435 int err;
436
437 err = -EINVAL;
438 if (ifnum >= 8*sizeof(ps->ifclaimed))
439 return err;
440 dev = ps->dev;
1da177e4
LT
441 intf = usb_ifnum_to_if(dev, ifnum);
442 if (!intf)
443 err = -ENOENT;
444 else if (test_and_clear_bit(ifnum, &ps->ifclaimed)) {
445 usb_driver_release_interface(&usbfs_driver, intf);
446 err = 0;
447 }
1da177e4
LT
448 return err;
449}
450
451static int checkintf(struct dev_state *ps, unsigned int ifnum)
452{
453 if (ps->dev->state != USB_STATE_CONFIGURED)
454 return -EHOSTUNREACH;
455 if (ifnum >= 8*sizeof(ps->ifclaimed))
456 return -EINVAL;
457 if (test_bit(ifnum, &ps->ifclaimed))
458 return 0;
459 /* if not yet claimed, claim it for the driver */
460 dev_warn(&ps->dev->dev, "usbfs: process %d (%s) did not claim interface %u before use\n",
461 current->pid, current->comm, ifnum);
462 return claimintf(ps, ifnum);
463}
464
465static int findintfep(struct usb_device *dev, unsigned int ep)
466{
467 unsigned int i, j, e;
468 struct usb_interface *intf;
469 struct usb_host_interface *alts;
470 struct usb_endpoint_descriptor *endpt;
471
472 if (ep & ~(USB_DIR_IN|0xf))
473 return -EINVAL;
474 if (!dev->actconfig)
475 return -ESRCH;
476 for (i = 0; i < dev->actconfig->desc.bNumInterfaces; i++) {
477 intf = dev->actconfig->interface[i];
478 for (j = 0; j < intf->num_altsetting; j++) {
479 alts = &intf->altsetting[j];
480 for (e = 0; e < alts->desc.bNumEndpoints; e++) {
481 endpt = &alts->endpoint[e].desc;
482 if (endpt->bEndpointAddress == ep)
483 return alts->desc.bInterfaceNumber;
484 }
485 }
486 }
487 return -ENOENT;
488}
489
490static int check_ctrlrecip(struct dev_state *ps, unsigned int requesttype, unsigned int index)
491{
492 int ret = 0;
493
24f8b116
HS
494 if (ps->dev->state != USB_STATE_ADDRESS
495 && ps->dev->state != USB_STATE_CONFIGURED)
1da177e4
LT
496 return -EHOSTUNREACH;
497 if (USB_TYPE_VENDOR == (USB_TYPE_MASK & requesttype))
498 return 0;
499
500 index &= 0xff;
501 switch (requesttype & USB_RECIP_MASK) {
502 case USB_RECIP_ENDPOINT:
503 if ((ret = findintfep(ps->dev, index)) >= 0)
504 ret = checkintf(ps, ret);
505 break;
506
507 case USB_RECIP_INTERFACE:
508 ret = checkintf(ps, index);
509 break;
510 }
511 return ret;
512}
513
9f8b17e6 514static int __match_minor(struct device *dev, void *data)
4592bf5a 515{
9f8b17e6 516 int minor = *((int *)data);
4592bf5a 517
9f8b17e6
KS
518 if (dev->devt == MKDEV(USB_DEVICE_MAJOR, minor))
519 return 1;
520 return 0;
521}
4592bf5a 522
9f8b17e6
KS
523static struct usb_device *usbdev_lookup_by_minor(int minor)
524{
525 struct device *dev;
526
527 dev = bus_find_device(&usb_bus_type, NULL, &minor, __match_minor);
528 if (!dev)
529 return NULL;
530 put_device(dev);
531 return container_of(dev, struct usb_device, dev);
532}
4592bf5a 533
1da177e4
LT
534/*
535 * file operations
536 */
537static int usbdev_open(struct inode *inode, struct file *file)
538{
fbf82fd2 539 struct usb_device *dev = NULL;
1da177e4
LT
540 struct dev_state *ps;
541 int ret;
542
4a2a8a2c
AS
543 /* Protect against simultaneous removal or release */
544 mutex_lock(&usbfs_mutex);
545
1da177e4
LT
546 ret = -ENOMEM;
547 if (!(ps = kmalloc(sizeof(struct dev_state), GFP_KERNEL)))
4a2a8a2c 548 goto out;
1da177e4 549
1da177e4 550 ret = -ENOENT;
9f8b17e6 551 /* usbdev device-node */
fbf82fd2 552 if (imajor(inode) == USB_DEVICE_MAJOR)
9f8b17e6
KS
553 dev = usbdev_lookup_by_minor(iminor(inode));
554#ifdef CONFIG_USB_DEVICEFS
555 /* procfs file */
fbf82fd2 556 if (!dev)
8e18e294 557 dev = inode->i_private;
9f8b17e6 558#endif
01d883d4 559 if (!dev)
1da177e4 560 goto out;
94fcda1f 561 ret = usb_autoresume_device(dev);
01d883d4
AS
562 if (ret)
563 goto out;
564
fbf82fd2 565 usb_get_dev(dev);
1da177e4
LT
566 ret = 0;
567 ps->dev = dev;
568 ps->file = file;
569 spin_lock_init(&ps->lock);
316547fd 570 INIT_LIST_HEAD(&ps->list);
1da177e4
LT
571 INIT_LIST_HEAD(&ps->async_pending);
572 INIT_LIST_HEAD(&ps->async_completed);
573 init_waitqueue_head(&ps->wait);
574 ps->discsignr = 0;
2425c08b 575 ps->disc_pid = get_pid(task_pid(current));
d7dd8a72
LT
576 ps->disc_uid = current->uid;
577 ps->disc_euid = current->euid;
1da177e4
LT
578 ps->disccontext = NULL;
579 ps->ifclaimed = 0;
7a01955f 580 security_task_getsecid(current, &ps->secid);
527660a8 581 smp_wmb();
1da177e4
LT
582 list_add_tail(&ps->list, &dev->filelist);
583 file->private_data = ps;
584 out:
01d883d4
AS
585 if (ret)
586 kfree(ps);
4a2a8a2c
AS
587 mutex_unlock(&usbfs_mutex);
588 return ret;
1da177e4
LT
589}
590
591static int usbdev_release(struct inode *inode, struct file *file)
592{
ec17cf1c 593 struct dev_state *ps = file->private_data;
1da177e4
LT
594 struct usb_device *dev = ps->dev;
595 unsigned int ifnum;
596
597 usb_lock_device(dev);
4a2a8a2c
AS
598
599 /* Protect against simultaneous open */
600 mutex_lock(&usbfs_mutex);
1da177e4 601 list_del_init(&ps->list);
4a2a8a2c
AS
602 mutex_unlock(&usbfs_mutex);
603
1da177e4
LT
604 for (ifnum = 0; ps->ifclaimed && ifnum < 8*sizeof(ps->ifclaimed);
605 ifnum++) {
606 if (test_bit(ifnum, &ps->ifclaimed))
607 releaseintf(ps, ifnum);
608 }
609 destroy_all_async(ps);
94fcda1f 610 usb_autosuspend_device(dev);
1da177e4
LT
611 usb_unlock_device(dev);
612 usb_put_dev(dev);
2425c08b 613 put_pid(ps->disc_pid);
1da177e4 614 kfree(ps);
4a2a8a2c 615 return 0;
1da177e4
LT
616}
617
618static int proc_control(struct dev_state *ps, void __user *arg)
619{
620 struct usb_device *dev = ps->dev;
621 struct usbdevfs_ctrltransfer ctrl;
622 unsigned int tmo;
623 unsigned char *tbuf;
624 int i, j, ret;
625
626 if (copy_from_user(&ctrl, arg, sizeof(ctrl)))
627 return -EFAULT;
628 if ((ret = check_ctrlrecip(ps, ctrl.bRequestType, ctrl.wIndex)))
629 return ret;
630 if (ctrl.wLength > PAGE_SIZE)
631 return -EINVAL;
632 if (!(tbuf = (unsigned char *)__get_free_page(GFP_KERNEL)))
633 return -ENOMEM;
634 tmo = ctrl.timeout;
635 if (ctrl.bRequestType & 0x80) {
636 if (ctrl.wLength && !access_ok(VERIFY_WRITE, ctrl.data, ctrl.wLength)) {
637 free_page((unsigned long)tbuf);
638 return -EINVAL;
639 }
fe0410c7
AS
640 snoop(&dev->dev, "control read: bRequest=%02x "
641 "bRrequestType=%02x wValue=%04x "
642 "wIndex=%04x wLength=%04x\n",
643 ctrl.bRequest, ctrl.bRequestType, ctrl.wValue,
644 ctrl.wIndex, ctrl.wLength);
1da177e4
LT
645
646 usb_unlock_device(dev);
647 i = usb_control_msg(dev, usb_rcvctrlpipe(dev, 0), ctrl.bRequest, ctrl.bRequestType,
648 ctrl.wValue, ctrl.wIndex, tbuf, ctrl.wLength, tmo);
649 usb_lock_device(dev);
650 if ((i > 0) && ctrl.wLength) {
651 if (usbfs_snoop) {
652 dev_info(&dev->dev, "control read: data ");
fe0410c7 653 for (j = 0; j < i; ++j)
e639dd3f 654 printk("%02x ", (unsigned char)(tbuf)[j]);
1da177e4
LT
655 printk("\n");
656 }
fe0410c7 657 if (copy_to_user(ctrl.data, tbuf, i)) {
1da177e4
LT
658 free_page((unsigned long)tbuf);
659 return -EFAULT;
660 }
661 }
662 } else {
663 if (ctrl.wLength) {
664 if (copy_from_user(tbuf, ctrl.data, ctrl.wLength)) {
665 free_page((unsigned long)tbuf);
666 return -EFAULT;
667 }
668 }
fe0410c7
AS
669 snoop(&dev->dev, "control write: bRequest=%02x "
670 "bRrequestType=%02x wValue=%04x "
671 "wIndex=%04x wLength=%04x\n",
672 ctrl.bRequest, ctrl.bRequestType, ctrl.wValue,
673 ctrl.wIndex, ctrl.wLength);
1da177e4
LT
674 if (usbfs_snoop) {
675 dev_info(&dev->dev, "control write: data: ");
676 for (j = 0; j < ctrl.wLength; ++j)
e639dd3f 677 printk("%02x ", (unsigned char)(tbuf)[j]);
1da177e4
LT
678 printk("\n");
679 }
680 usb_unlock_device(dev);
681 i = usb_control_msg(dev, usb_sndctrlpipe(dev, 0), ctrl.bRequest, ctrl.bRequestType,
682 ctrl.wValue, ctrl.wIndex, tbuf, ctrl.wLength, tmo);
683 usb_lock_device(dev);
684 }
685 free_page((unsigned long)tbuf);
686 if (i<0 && i != -EPIPE) {
687 dev_printk(KERN_DEBUG, &dev->dev, "usbfs: USBDEVFS_CONTROL "
688 "failed cmd %s rqt %u rq %u len %u ret %d\n",
689 current->comm, ctrl.bRequestType, ctrl.bRequest,
690 ctrl.wLength, i);
691 }
692 return i;
693}
694
695static int proc_bulk(struct dev_state *ps, void __user *arg)
696{
697 struct usb_device *dev = ps->dev;
698 struct usbdevfs_bulktransfer bulk;
699 unsigned int tmo, len1, pipe;
700 int len2;
701 unsigned char *tbuf;
e639dd3f 702 int i, j, ret;
1da177e4
LT
703
704 if (copy_from_user(&bulk, arg, sizeof(bulk)))
705 return -EFAULT;
706 if ((ret = findintfep(ps->dev, bulk.ep)) < 0)
707 return ret;
708 if ((ret = checkintf(ps, ret)))
709 return ret;
710 if (bulk.ep & USB_DIR_IN)
711 pipe = usb_rcvbulkpipe(dev, bulk.ep & 0x7f);
712 else
713 pipe = usb_sndbulkpipe(dev, bulk.ep & 0x7f);
714 if (!usb_maxpacket(dev, pipe, !(bulk.ep & USB_DIR_IN)))
715 return -EINVAL;
716 len1 = bulk.len;
717 if (len1 > MAX_USBFS_BUFFER_SIZE)
718 return -EINVAL;
719 if (!(tbuf = kmalloc(len1, GFP_KERNEL)))
720 return -ENOMEM;
721 tmo = bulk.timeout;
722 if (bulk.ep & 0x80) {
723 if (len1 && !access_ok(VERIFY_WRITE, bulk.data, len1)) {
724 kfree(tbuf);
725 return -EINVAL;
726 }
e639dd3f
GKH
727 snoop(&dev->dev, "bulk read: len=0x%02x timeout=%04d\n",
728 bulk.len, bulk.timeout);
1da177e4
LT
729 usb_unlock_device(dev);
730 i = usb_bulk_msg(dev, pipe, tbuf, len1, &len2, tmo);
731 usb_lock_device(dev);
732 if (!i && len2) {
e639dd3f
GKH
733 if (usbfs_snoop) {
734 dev_info(&dev->dev, "bulk read: data ");
735 for (j = 0; j < len2; ++j)
736 printk("%02x ", (unsigned char)(tbuf)[j]);
737 printk("\n");
738 }
1da177e4
LT
739 if (copy_to_user(bulk.data, tbuf, len2)) {
740 kfree(tbuf);
741 return -EFAULT;
742 }
743 }
744 } else {
745 if (len1) {
746 if (copy_from_user(tbuf, bulk.data, len1)) {
747 kfree(tbuf);
748 return -EFAULT;
749 }
750 }
e639dd3f
GKH
751 snoop(&dev->dev, "bulk write: len=0x%02x timeout=%04d\n",
752 bulk.len, bulk.timeout);
753 if (usbfs_snoop) {
754 dev_info(&dev->dev, "bulk write: data: ");
755 for (j = 0; j < len1; ++j)
756 printk("%02x ", (unsigned char)(tbuf)[j]);
757 printk("\n");
758 }
1da177e4
LT
759 usb_unlock_device(dev);
760 i = usb_bulk_msg(dev, pipe, tbuf, len1, &len2, tmo);
761 usb_lock_device(dev);
762 }
763 kfree(tbuf);
764 if (i < 0)
765 return i;
766 return len2;
767}
768
769static int proc_resetep(struct dev_state *ps, void __user *arg)
770{
771 unsigned int ep;
772 int ret;
773
774 if (get_user(ep, (unsigned int __user *)arg))
775 return -EFAULT;
776 if ((ret = findintfep(ps->dev, ep)) < 0)
777 return ret;
778 if ((ret = checkintf(ps, ret)))
779 return ret;
780 usb_settoggle(ps->dev, ep & 0xf, !(ep & USB_DIR_IN), 0);
781 return 0;
782}
783
784static int proc_clearhalt(struct dev_state *ps, void __user *arg)
785{
786 unsigned int ep;
787 int pipe;
788 int ret;
789
790 if (get_user(ep, (unsigned int __user *)arg))
791 return -EFAULT;
792 if ((ret = findintfep(ps->dev, ep)) < 0)
793 return ret;
794 if ((ret = checkintf(ps, ret)))
795 return ret;
796 if (ep & USB_DIR_IN)
797 pipe = usb_rcvbulkpipe(ps->dev, ep & 0x7f);
798 else
799 pipe = usb_sndbulkpipe(ps->dev, ep & 0x7f);
800
801 return usb_clear_halt(ps->dev, pipe);
802}
803
804
805static int proc_getdriver(struct dev_state *ps, void __user *arg)
806{
807 struct usbdevfs_getdriver gd;
808 struct usb_interface *intf;
809 int ret;
810
811 if (copy_from_user(&gd, arg, sizeof(gd)))
812 return -EFAULT;
1da177e4
LT
813 intf = usb_ifnum_to_if(ps->dev, gd.interface);
814 if (!intf || !intf->dev.driver)
815 ret = -ENODATA;
816 else {
817 strncpy(gd.driver, intf->dev.driver->name,
818 sizeof(gd.driver));
819 ret = (copy_to_user(arg, &gd, sizeof(gd)) ? -EFAULT : 0);
820 }
1da177e4
LT
821 return ret;
822}
823
824static int proc_connectinfo(struct dev_state *ps, void __user *arg)
825{
826 struct usbdevfs_connectinfo ci;
827
828 ci.devnum = ps->dev->devnum;
829 ci.slow = ps->dev->speed == USB_SPEED_LOW;
830 if (copy_to_user(arg, &ci, sizeof(ci)))
831 return -EFAULT;
832 return 0;
833}
834
835static int proc_resetdevice(struct dev_state *ps)
836{
79efa097 837 return usb_reset_composite_device(ps->dev, NULL);
1da177e4
LT
838}
839
840static int proc_setintf(struct dev_state *ps, void __user *arg)
841{
842 struct usbdevfs_setinterface setintf;
843 int ret;
844
845 if (copy_from_user(&setintf, arg, sizeof(setintf)))
846 return -EFAULT;
847 if ((ret = checkintf(ps, setintf.interface)))
848 return ret;
849 return usb_set_interface(ps->dev, setintf.interface,
850 setintf.altsetting);
851}
852
853static int proc_setconfig(struct dev_state *ps, void __user *arg)
854{
3f141e2a 855 int u;
1da177e4
LT
856 int status = 0;
857 struct usb_host_config *actconfig;
858
3f141e2a 859 if (get_user(u, (int __user *)arg))
1da177e4
LT
860 return -EFAULT;
861
862 actconfig = ps->dev->actconfig;
863
864 /* Don't touch the device if any interfaces are claimed.
865 * It could interfere with other drivers' operations, and if
866 * an interface is claimed by usbfs it could easily deadlock.
867 */
868 if (actconfig) {
869 int i;
870
871 for (i = 0; i < actconfig->desc.bNumInterfaces; ++i) {
872 if (usb_interface_claimed(actconfig->interface[i])) {
873 dev_warn (&ps->dev->dev,
72ebddb5 874 "usbfs: interface %d claimed by %s "
1da177e4
LT
875 "while '%s' sets config #%d\n",
876 actconfig->interface[i]
877 ->cur_altsetting
878 ->desc.bInterfaceNumber,
72ebddb5
DB
879 actconfig->interface[i]
880 ->dev.driver->name,
1da177e4 881 current->comm, u);
1da177e4
LT
882 status = -EBUSY;
883 break;
1da177e4
LT
884 }
885 }
886 }
887
888 /* SET_CONFIGURATION is often abused as a "cheap" driver reset,
889 * so avoid usb_set_configuration()'s kick to sysfs
890 */
891 if (status == 0) {
892 if (actconfig && actconfig->desc.bConfigurationValue == u)
893 status = usb_reset_configuration(ps->dev);
894 else
895 status = usb_set_configuration(ps->dev, u);
896 }
897
898 return status;
899}
900
1da177e4
LT
901static int proc_do_submiturb(struct dev_state *ps, struct usbdevfs_urb *uurb,
902 struct usbdevfs_iso_packet_desc __user *iso_frame_desc,
903 void __user *arg)
904{
905 struct usbdevfs_iso_packet_desc *isopkt = NULL;
906 struct usb_host_endpoint *ep;
907 struct async *as;
908 struct usb_ctrlrequest *dr = NULL;
909 unsigned int u, totlen, isofrmlen;
97b9eb91 910 int ret, ifnum = -1;
93cf9b90 911 int is_in;
1da177e4
LT
912
913 if (uurb->flags & ~(USBDEVFS_URB_ISO_ASAP|USBDEVFS_URB_SHORT_NOT_OK|
914 URB_NO_FSBR|URB_ZERO_PACKET))
915 return -EINVAL;
916 if (!uurb->buffer)
917 return -EINVAL;
918 if (uurb->signr != 0 && (uurb->signr < SIGRTMIN || uurb->signr > SIGRTMAX))
919 return -EINVAL;
920 if (!(uurb->type == USBDEVFS_URB_TYPE_CONTROL && (uurb->endpoint & ~USB_ENDPOINT_DIR_MASK) == 0)) {
921 if ((ifnum = findintfep(ps->dev, uurb->endpoint)) < 0)
922 return ifnum;
923 if ((ret = checkintf(ps, ifnum)))
924 return ret;
925 }
93cf9b90
AS
926 if ((uurb->endpoint & USB_ENDPOINT_DIR_MASK) != 0) {
927 is_in = 1;
928 ep = ps->dev->ep_in[uurb->endpoint & USB_ENDPOINT_NUMBER_MASK];
929 } else {
930 is_in = 0;
931 ep = ps->dev->ep_out[uurb->endpoint & USB_ENDPOINT_NUMBER_MASK];
932 }
1da177e4
LT
933 if (!ep)
934 return -ENOENT;
935 switch(uurb->type) {
936 case USBDEVFS_URB_TYPE_CONTROL:
93cf9b90 937 if (!usb_endpoint_xfer_control(&ep->desc))
1da177e4 938 return -EINVAL;
e016683d
MD
939 /* min 8 byte setup packet, max 8 byte setup plus an arbitrary data stage */
940 if (uurb->buffer_length < 8 || uurb->buffer_length > (8 + MAX_USBFS_BUFFER_SIZE))
1da177e4
LT
941 return -EINVAL;
942 if (!(dr = kmalloc(sizeof(struct usb_ctrlrequest), GFP_KERNEL)))
943 return -ENOMEM;
944 if (copy_from_user(dr, uurb->buffer, 8)) {
945 kfree(dr);
946 return -EFAULT;
947 }
948 if (uurb->buffer_length < (le16_to_cpup(&dr->wLength) + 8)) {
949 kfree(dr);
950 return -EINVAL;
951 }
952 if ((ret = check_ctrlrecip(ps, dr->bRequestType, le16_to_cpup(&dr->wIndex)))) {
953 kfree(dr);
954 return ret;
955 }
1da177e4
LT
956 uurb->number_of_packets = 0;
957 uurb->buffer_length = le16_to_cpup(&dr->wLength);
958 uurb->buffer += 8;
93cf9b90
AS
959 if ((dr->bRequestType & USB_DIR_IN) && uurb->buffer_length) {
960 is_in = 1;
961 uurb->endpoint |= USB_DIR_IN;
962 } else {
963 is_in = 0;
964 uurb->endpoint &= ~USB_DIR_IN;
965 }
966 if (!access_ok(is_in ? VERIFY_WRITE : VERIFY_READ,
967 uurb->buffer, uurb->buffer_length)) {
1da177e4
LT
968 kfree(dr);
969 return -EFAULT;
970 }
df251b8b
CF
971 snoop(&ps->dev->dev, "control urb: bRequest=%02x "
972 "bRrequestType=%02x wValue=%04x "
973 "wIndex=%04x wLength=%04x\n",
93cf9b90
AS
974 dr->bRequest, dr->bRequestType,
975 __le16_to_cpup(&dr->wValue),
976 __le16_to_cpup(&dr->wIndex),
977 __le16_to_cpup(&dr->wLength));
1da177e4
LT
978 break;
979
980 case USBDEVFS_URB_TYPE_BULK:
93cf9b90 981 switch (usb_endpoint_type(&ep->desc)) {
1da177e4
LT
982 case USB_ENDPOINT_XFER_CONTROL:
983 case USB_ENDPOINT_XFER_ISOC:
984 return -EINVAL;
985 /* allow single-shot interrupt transfers, at bogus rates */
986 }
987 uurb->number_of_packets = 0;
988 if (uurb->buffer_length > MAX_USBFS_BUFFER_SIZE)
989 return -EINVAL;
93cf9b90
AS
990 if (!access_ok(is_in ? VERIFY_WRITE : VERIFY_READ,
991 uurb->buffer, uurb->buffer_length))
1da177e4 992 return -EFAULT;
e639dd3f 993 snoop(&ps->dev->dev, "bulk urb\n");
1da177e4
LT
994 break;
995
996 case USBDEVFS_URB_TYPE_ISO:
997 /* arbitrary limit */
998 if (uurb->number_of_packets < 1 || uurb->number_of_packets > 128)
999 return -EINVAL;
93cf9b90 1000 if (!usb_endpoint_xfer_isoc(&ep->desc))
1da177e4 1001 return -EINVAL;
1da177e4
LT
1002 isofrmlen = sizeof(struct usbdevfs_iso_packet_desc) * uurb->number_of_packets;
1003 if (!(isopkt = kmalloc(isofrmlen, GFP_KERNEL)))
1004 return -ENOMEM;
1005 if (copy_from_user(isopkt, iso_frame_desc, isofrmlen)) {
1006 kfree(isopkt);
1007 return -EFAULT;
1008 }
1009 for (totlen = u = 0; u < uurb->number_of_packets; u++) {
3612242e
MD
1010 /* arbitrary limit, sufficient for USB 2.0 high-bandwidth iso */
1011 if (isopkt[u].length > 8192) {
1da177e4
LT
1012 kfree(isopkt);
1013 return -EINVAL;
1014 }
1015 totlen += isopkt[u].length;
1016 }
1017 if (totlen > 32768) {
1018 kfree(isopkt);
1019 return -EINVAL;
1020 }
1021 uurb->buffer_length = totlen;
e639dd3f 1022 snoop(&ps->dev->dev, "iso urb\n");
1da177e4
LT
1023 break;
1024
1025 case USBDEVFS_URB_TYPE_INTERRUPT:
1026 uurb->number_of_packets = 0;
93cf9b90 1027 if (!usb_endpoint_xfer_int(&ep->desc))
1da177e4 1028 return -EINVAL;
1da177e4
LT
1029 if (uurb->buffer_length > MAX_USBFS_BUFFER_SIZE)
1030 return -EINVAL;
93cf9b90
AS
1031 if (!access_ok(is_in ? VERIFY_WRITE : VERIFY_READ,
1032 uurb->buffer, uurb->buffer_length))
1da177e4 1033 return -EFAULT;
e639dd3f 1034 snoop(&ps->dev->dev, "interrupt urb\n");
1da177e4
LT
1035 break;
1036
1037 default:
1038 return -EINVAL;
1039 }
1040 if (!(as = alloc_async(uurb->number_of_packets))) {
6fd19f4b
JJ
1041 kfree(isopkt);
1042 kfree(dr);
1da177e4
LT
1043 return -ENOMEM;
1044 }
1045 if (!(as->urb->transfer_buffer = kmalloc(uurb->buffer_length, GFP_KERNEL))) {
6fd19f4b
JJ
1046 kfree(isopkt);
1047 kfree(dr);
1da177e4
LT
1048 free_async(as);
1049 return -ENOMEM;
1050 }
1051 as->urb->dev = ps->dev;
93cf9b90
AS
1052 as->urb->pipe = (uurb->type << 30) |
1053 __create_pipe(ps->dev, uurb->endpoint & 0xf) |
1054 (uurb->endpoint & USB_DIR_IN);
1055 as->urb->transfer_flags = uurb->flags |
1056 (is_in ? URB_DIR_IN : URB_DIR_OUT);
1da177e4
LT
1057 as->urb->transfer_buffer_length = uurb->buffer_length;
1058 as->urb->setup_packet = (unsigned char*)dr;
1059 as->urb->start_frame = uurb->start_frame;
1060 as->urb->number_of_packets = uurb->number_of_packets;
97b9eb91
AS
1061 if (uurb->type == USBDEVFS_URB_TYPE_ISO ||
1062 ps->dev->speed == USB_SPEED_HIGH)
1063 as->urb->interval = 1 << min(15, ep->desc.bInterval - 1);
1064 else
1065 as->urb->interval = ep->desc.bInterval;
1da177e4
LT
1066 as->urb->context = as;
1067 as->urb->complete = async_completed;
1068 for (totlen = u = 0; u < uurb->number_of_packets; u++) {
1069 as->urb->iso_frame_desc[u].offset = totlen;
1070 as->urb->iso_frame_desc[u].length = isopkt[u].length;
1071 totlen += isopkt[u].length;
1072 }
6fd19f4b 1073 kfree(isopkt);
1da177e4
LT
1074 as->ps = ps;
1075 as->userurb = arg;
1076 if (uurb->endpoint & USB_DIR_IN)
1077 as->userbuffer = uurb->buffer;
1078 else
1079 as->userbuffer = NULL;
1080 as->signr = uurb->signr;
1081 as->ifnum = ifnum;
2425c08b 1082 as->pid = get_pid(task_pid(current));
46113830
HW
1083 as->uid = current->uid;
1084 as->euid = current->euid;
7a01955f 1085 security_task_getsecid(current, &as->secid);
93cf9b90
AS
1086 if (!is_in) {
1087 if (copy_from_user(as->urb->transfer_buffer, uurb->buffer,
1088 as->urb->transfer_buffer_length)) {
1da177e4
LT
1089 free_async(as);
1090 return -EFAULT;
1091 }
1092 }
e639dd3f 1093 snoop_urb(as->urb, as->userurb);
1da177e4
LT
1094 async_newpending(as);
1095 if ((ret = usb_submit_urb(as->urb, GFP_KERNEL))) {
1096 dev_printk(KERN_DEBUG, &ps->dev->dev, "usbfs: usb_submit_urb returned %d\n", ret);
1097 async_removepending(as);
1098 free_async(as);
1099 return ret;
1100 }
1101 return 0;
1102}
1103
1104static int proc_submiturb(struct dev_state *ps, void __user *arg)
1105{
1106 struct usbdevfs_urb uurb;
1107
1108 if (copy_from_user(&uurb, arg, sizeof(uurb)))
1109 return -EFAULT;
1110
83626b01 1111 return proc_do_submiturb(ps, &uurb, (((struct usbdevfs_urb __user *)arg)->iso_frame_desc), arg);
1da177e4
LT
1112}
1113
1114static int proc_unlinkurb(struct dev_state *ps, void __user *arg)
1115{
1116 struct async *as;
1117
1118 as = async_getpending(ps, arg);
1119 if (!as)
1120 return -EINVAL;
1121 usb_kill_urb(as->urb);
1122 return 0;
1123}
1124
1125static int processcompl(struct async *as, void __user * __user *arg)
1126{
1127 struct urb *urb = as->urb;
1128 struct usbdevfs_urb __user *userurb = as->userurb;
1129 void __user *addr = as->userurb;
1130 unsigned int i;
1131
1132 if (as->userbuffer)
1133 if (copy_to_user(as->userbuffer, urb->transfer_buffer, urb->transfer_buffer_length))
1134 return -EFAULT;
1135 if (put_user(urb->status, &userurb->status))
1136 return -EFAULT;
1137 if (put_user(urb->actual_length, &userurb->actual_length))
1138 return -EFAULT;
1139 if (put_user(urb->error_count, &userurb->error_count))
1140 return -EFAULT;
1141
93cf9b90 1142 if (usb_endpoint_xfer_isoc(&urb->ep->desc)) {
668a9541
CL
1143 for (i = 0; i < urb->number_of_packets; i++) {
1144 if (put_user(urb->iso_frame_desc[i].actual_length,
1145 &userurb->iso_frame_desc[i].actual_length))
1146 return -EFAULT;
1147 if (put_user(urb->iso_frame_desc[i].status,
1148 &userurb->iso_frame_desc[i].status))
1149 return -EFAULT;
1150 }
1da177e4
LT
1151 }
1152
1153 free_async(as);
1154
1155 if (put_user(addr, (void __user * __user *)arg))
1156 return -EFAULT;
1157 return 0;
1158}
1159
1160static struct async* reap_as(struct dev_state *ps)
1161{
1162 DECLARE_WAITQUEUE(wait, current);
1163 struct async *as = NULL;
1164 struct usb_device *dev = ps->dev;
1165
1166 add_wait_queue(&ps->wait, &wait);
1167 for (;;) {
1168 __set_current_state(TASK_INTERRUPTIBLE);
1169 if ((as = async_getcompleted(ps)))
1170 break;
1171 if (signal_pending(current))
1172 break;
1173 usb_unlock_device(dev);
1174 schedule();
1175 usb_lock_device(dev);
1176 }
1177 remove_wait_queue(&ps->wait, &wait);
1178 set_current_state(TASK_RUNNING);
1179 return as;
1180}
1181
1182static int proc_reapurb(struct dev_state *ps, void __user *arg)
1183{
1184 struct async *as = reap_as(ps);
1185 if (as)
1186 return processcompl(as, (void __user * __user *)arg);
1187 if (signal_pending(current))
1188 return -EINTR;
1189 return -EIO;
1190}
1191
1192static int proc_reapurbnonblock(struct dev_state *ps, void __user *arg)
1193{
1194 struct async *as;
1195
1196 if (!(as = async_getcompleted(ps)))
1197 return -EAGAIN;
1198 return processcompl(as, (void __user * __user *)arg);
1199}
1200
1201#ifdef CONFIG_COMPAT
1202
1203static int get_urb32(struct usbdevfs_urb *kurb,
1204 struct usbdevfs_urb32 __user *uurb)
1205{
1206 __u32 uptr;
1207 if (get_user(kurb->type, &uurb->type) ||
1208 __get_user(kurb->endpoint, &uurb->endpoint) ||
1209 __get_user(kurb->status, &uurb->status) ||
1210 __get_user(kurb->flags, &uurb->flags) ||
1211 __get_user(kurb->buffer_length, &uurb->buffer_length) ||
1212 __get_user(kurb->actual_length, &uurb->actual_length) ||
1213 __get_user(kurb->start_frame, &uurb->start_frame) ||
1214 __get_user(kurb->number_of_packets, &uurb->number_of_packets) ||
1215 __get_user(kurb->error_count, &uurb->error_count) ||
1216 __get_user(kurb->signr, &uurb->signr))
1217 return -EFAULT;
1218
1219 if (__get_user(uptr, &uurb->buffer))
1220 return -EFAULT;
1221 kurb->buffer = compat_ptr(uptr);
1222 if (__get_user(uptr, &uurb->buffer))
1223 return -EFAULT;
1224 kurb->usercontext = compat_ptr(uptr);
1225
1226 return 0;
1227}
1228
1229static int proc_submiturb_compat(struct dev_state *ps, void __user *arg)
1230{
1231 struct usbdevfs_urb uurb;
1232
c714de5d 1233 if (get_urb32(&uurb,(struct usbdevfs_urb32 __user *)arg))
1da177e4
LT
1234 return -EFAULT;
1235
83626b01 1236 return proc_do_submiturb(ps, &uurb, ((struct usbdevfs_urb32 __user *)arg)->iso_frame_desc, arg);
1da177e4
LT
1237}
1238
1239static int processcompl_compat(struct async *as, void __user * __user *arg)
1240{
1241 struct urb *urb = as->urb;
1242 struct usbdevfs_urb32 __user *userurb = as->userurb;
1243 void __user *addr = as->userurb;
1244 unsigned int i;
1245
1246 if (as->userbuffer)
1247 if (copy_to_user(as->userbuffer, urb->transfer_buffer, urb->transfer_buffer_length))
1248 return -EFAULT;
1249 if (put_user(urb->status, &userurb->status))
1250 return -EFAULT;
1251 if (put_user(urb->actual_length, &userurb->actual_length))
1252 return -EFAULT;
1253 if (put_user(urb->error_count, &userurb->error_count))
1254 return -EFAULT;
1255
93cf9b90 1256 if (usb_endpoint_xfer_isoc(&urb->ep->desc)) {
668a9541
CL
1257 for (i = 0; i < urb->number_of_packets; i++) {
1258 if (put_user(urb->iso_frame_desc[i].actual_length,
1259 &userurb->iso_frame_desc[i].actual_length))
1260 return -EFAULT;
1261 if (put_user(urb->iso_frame_desc[i].status,
1262 &userurb->iso_frame_desc[i].status))
1263 return -EFAULT;
1264 }
1da177e4
LT
1265 }
1266
1267 free_async(as);
c714de5d 1268 if (put_user(ptr_to_compat(addr), (u32 __user *)arg))
1da177e4
LT
1269 return -EFAULT;
1270 return 0;
1271}
1272
1273static int proc_reapurb_compat(struct dev_state *ps, void __user *arg)
1274{
1275 struct async *as = reap_as(ps);
1276 if (as)
1277 return processcompl_compat(as, (void __user * __user *)arg);
1278 if (signal_pending(current))
1279 return -EINTR;
1280 return -EIO;
1281}
1282
1283static int proc_reapurbnonblock_compat(struct dev_state *ps, void __user *arg)
1284{
1285 struct async *as;
1286
1da177e4
LT
1287 if (!(as = async_getcompleted(ps)))
1288 return -EAGAIN;
1da177e4
LT
1289 return processcompl_compat(as, (void __user * __user *)arg);
1290}
1291
1292#endif
1293
1294static int proc_disconnectsignal(struct dev_state *ps, void __user *arg)
1295{
1296 struct usbdevfs_disconnectsignal ds;
1297
1298 if (copy_from_user(&ds, arg, sizeof(ds)))
1299 return -EFAULT;
1300 if (ds.signr != 0 && (ds.signr < SIGRTMIN || ds.signr > SIGRTMAX))
1301 return -EINVAL;
1302 ps->discsignr = ds.signr;
1303 ps->disccontext = ds.context;
1304 return 0;
1305}
1306
1307static int proc_claiminterface(struct dev_state *ps, void __user *arg)
1308{
1309 unsigned int ifnum;
1310
1311 if (get_user(ifnum, (unsigned int __user *)arg))
1312 return -EFAULT;
1313 return claimintf(ps, ifnum);
1314}
1315
1316static int proc_releaseinterface(struct dev_state *ps, void __user *arg)
1317{
1318 unsigned int ifnum;
1319 int ret;
1320
1321 if (get_user(ifnum, (unsigned int __user *)arg))
1322 return -EFAULT;
1323 if ((ret = releaseintf(ps, ifnum)) < 0)
1324 return ret;
1325 destroy_async_on_interface (ps, ifnum);
1326 return 0;
1327}
1328
c36fc889 1329static int proc_ioctl(struct dev_state *ps, struct usbdevfs_ioctl *ctl)
1da177e4 1330{
1da177e4
LT
1331 int size;
1332 void *buf = NULL;
1333 int retval = 0;
1334 struct usb_interface *intf = NULL;
1335 struct usb_driver *driver = NULL;
1da177e4 1336
c36fc889
PZ
1337 /* alloc buffer */
1338 if ((size = _IOC_SIZE (ctl->ioctl_code)) > 0) {
1da177e4
LT
1339 if ((buf = kmalloc (size, GFP_KERNEL)) == NULL)
1340 return -ENOMEM;
c36fc889
PZ
1341 if ((_IOC_DIR(ctl->ioctl_code) & _IOC_WRITE)) {
1342 if (copy_from_user (buf, ctl->data, size)) {
6fd19f4b 1343 kfree(buf);
1da177e4
LT
1344 return -EFAULT;
1345 }
1346 } else {
1347 memset (buf, 0, size);
1348 }
1349 }
1350
349710c3 1351 if (!connected(ps)) {
6fd19f4b 1352 kfree(buf);
1da177e4
LT
1353 return -ENODEV;
1354 }
1355
1356 if (ps->dev->state != USB_STATE_CONFIGURED)
1357 retval = -EHOSTUNREACH;
c36fc889 1358 else if (!(intf = usb_ifnum_to_if (ps->dev, ctl->ifno)))
1da177e4 1359 retval = -EINVAL;
c36fc889 1360 else switch (ctl->ioctl_code) {
1da177e4
LT
1361
1362 /* disconnect kernel driver from interface */
1363 case USBDEVFS_DISCONNECT:
1da177e4
LT
1364 if (intf->dev.driver) {
1365 driver = to_usb_driver(intf->dev.driver);
1366 dev_dbg (&intf->dev, "disconnect by usbfs\n");
1367 usb_driver_release_interface(driver, intf);
1368 } else
1369 retval = -ENODATA;
1da177e4
LT
1370 break;
1371
1372 /* let kernel drivers try to (re)bind to the interface */
1373 case USBDEVFS_CONNECT:
1374 usb_unlock_device(ps->dev);
1b21d5e1 1375 retval = bus_rescan_devices(intf->dev.bus);
1da177e4
LT
1376 usb_lock_device(ps->dev);
1377 break;
1378
1379 /* talk directly to the interface's driver */
1380 default:
1da177e4
LT
1381 if (intf->dev.driver)
1382 driver = to_usb_driver(intf->dev.driver);
1383 if (driver == NULL || driver->ioctl == NULL) {
1384 retval = -ENOTTY;
1385 } else {
c36fc889 1386 retval = driver->ioctl (intf, ctl->ioctl_code, buf);
1da177e4
LT
1387 if (retval == -ENOIOCTLCMD)
1388 retval = -ENOTTY;
1389 }
1da177e4
LT
1390 }
1391
1392 /* cleanup and return */
1393 if (retval >= 0
c36fc889 1394 && (_IOC_DIR (ctl->ioctl_code) & _IOC_READ) != 0
1da177e4 1395 && size > 0
c36fc889 1396 && copy_to_user (ctl->data, buf, size) != 0)
1da177e4 1397 retval = -EFAULT;
6fd19f4b
JJ
1398
1399 kfree(buf);
1da177e4
LT
1400 return retval;
1401}
1402
c36fc889
PZ
1403static int proc_ioctl_default(struct dev_state *ps, void __user *arg)
1404{
1405 struct usbdevfs_ioctl ctrl;
1406
1407 if (copy_from_user(&ctrl, arg, sizeof (ctrl)))
1408 return -EFAULT;
1409 return proc_ioctl(ps, &ctrl);
1410}
1411
1412#ifdef CONFIG_COMPAT
777da590 1413static int proc_ioctl_compat(struct dev_state *ps, compat_uptr_t arg)
c36fc889
PZ
1414{
1415 struct usbdevfs_ioctl32 __user *uioc;
1416 struct usbdevfs_ioctl ctrl;
1417 u32 udata;
1418
058120d7 1419 uioc = compat_ptr((long)arg);
c36fc889
PZ
1420 if (get_user(ctrl.ifno, &uioc->ifno) ||
1421 get_user(ctrl.ioctl_code, &uioc->ioctl_code) ||
1422 __get_user(udata, &uioc->data))
1423 return -EFAULT;
1424 ctrl.data = compat_ptr(udata);
1425
1426 return proc_ioctl(ps, &ctrl);
1427}
1428#endif
1429
1da177e4
LT
1430/*
1431 * NOTE: All requests here that have interface numbers as parameters
1432 * are assuming that somehow the configuration has been prevented from
1433 * changing. But there's no mechanism to ensure that...
1434 */
1435static int usbdev_ioctl(struct inode *inode, struct file *file, unsigned int cmd, unsigned long arg)
1436{
ec17cf1c 1437 struct dev_state *ps = file->private_data;
1da177e4
LT
1438 struct usb_device *dev = ps->dev;
1439 void __user *p = (void __user *)arg;
1440 int ret = -ENOTTY;
1441
1442 if (!(file->f_mode & FMODE_WRITE))
1443 return -EPERM;
1444 usb_lock_device(dev);
349710c3 1445 if (!connected(ps)) {
1da177e4
LT
1446 usb_unlock_device(dev);
1447 return -ENODEV;
1448 }
1449
1450 switch (cmd) {
1451 case USBDEVFS_CONTROL:
1452 snoop(&dev->dev, "%s: CONTROL\n", __FUNCTION__);
1453 ret = proc_control(ps, p);
1454 if (ret >= 0)
1455 inode->i_mtime = CURRENT_TIME;
1456 break;
1457
1458 case USBDEVFS_BULK:
1459 snoop(&dev->dev, "%s: BULK\n", __FUNCTION__);
1460 ret = proc_bulk(ps, p);
1461 if (ret >= 0)
1462 inode->i_mtime = CURRENT_TIME;
1463 break;
1464
1465 case USBDEVFS_RESETEP:
1466 snoop(&dev->dev, "%s: RESETEP\n", __FUNCTION__);
1467 ret = proc_resetep(ps, p);
1468 if (ret >= 0)
1469 inode->i_mtime = CURRENT_TIME;
1470 break;
1471
1472 case USBDEVFS_RESET:
1473 snoop(&dev->dev, "%s: RESET\n", __FUNCTION__);
1474 ret = proc_resetdevice(ps);
1475 break;
1476
1477 case USBDEVFS_CLEAR_HALT:
1478 snoop(&dev->dev, "%s: CLEAR_HALT\n", __FUNCTION__);
1479 ret = proc_clearhalt(ps, p);
1480 if (ret >= 0)
1481 inode->i_mtime = CURRENT_TIME;
1482 break;
1483
1484 case USBDEVFS_GETDRIVER:
1485 snoop(&dev->dev, "%s: GETDRIVER\n", __FUNCTION__);
1486 ret = proc_getdriver(ps, p);
1487 break;
1488
1489 case USBDEVFS_CONNECTINFO:
1490 snoop(&dev->dev, "%s: CONNECTINFO\n", __FUNCTION__);
1491 ret = proc_connectinfo(ps, p);
1492 break;
1493
1494 case USBDEVFS_SETINTERFACE:
1495 snoop(&dev->dev, "%s: SETINTERFACE\n", __FUNCTION__);
1496 ret = proc_setintf(ps, p);
1497 break;
1498
1499 case USBDEVFS_SETCONFIGURATION:
1500 snoop(&dev->dev, "%s: SETCONFIGURATION\n", __FUNCTION__);
1501 ret = proc_setconfig(ps, p);
1502 break;
1503
1504 case USBDEVFS_SUBMITURB:
1505 snoop(&dev->dev, "%s: SUBMITURB\n", __FUNCTION__);
1506 ret = proc_submiturb(ps, p);
1507 if (ret >= 0)
1508 inode->i_mtime = CURRENT_TIME;
1509 break;
1510
1511#ifdef CONFIG_COMPAT
1512
1513 case USBDEVFS_SUBMITURB32:
1514 snoop(&dev->dev, "%s: SUBMITURB32\n", __FUNCTION__);
1515 ret = proc_submiturb_compat(ps, p);
1516 if (ret >= 0)
1517 inode->i_mtime = CURRENT_TIME;
1518 break;
1519
1520 case USBDEVFS_REAPURB32:
1521 snoop(&dev->dev, "%s: REAPURB32\n", __FUNCTION__);
1522 ret = proc_reapurb_compat(ps, p);
1523 break;
1524
1525 case USBDEVFS_REAPURBNDELAY32:
1526 snoop(&dev->dev, "%s: REAPURBDELAY32\n", __FUNCTION__);
1527 ret = proc_reapurbnonblock_compat(ps, p);
1528 break;
1529
c36fc889
PZ
1530 case USBDEVFS_IOCTL32:
1531 snoop(&dev->dev, "%s: IOCTL\n", __FUNCTION__);
c714de5d 1532 ret = proc_ioctl_compat(ps, ptr_to_compat(p));
c36fc889 1533 break;
1da177e4
LT
1534#endif
1535
1536 case USBDEVFS_DISCARDURB:
1537 snoop(&dev->dev, "%s: DISCARDURB\n", __FUNCTION__);
1538 ret = proc_unlinkurb(ps, p);
1539 break;
1540
1541 case USBDEVFS_REAPURB:
1542 snoop(&dev->dev, "%s: REAPURB\n", __FUNCTION__);
1543 ret = proc_reapurb(ps, p);
1544 break;
1545
1546 case USBDEVFS_REAPURBNDELAY:
1547 snoop(&dev->dev, "%s: REAPURBDELAY\n", __FUNCTION__);
1548 ret = proc_reapurbnonblock(ps, p);
1549 break;
1550
1551 case USBDEVFS_DISCSIGNAL:
1552 snoop(&dev->dev, "%s: DISCSIGNAL\n", __FUNCTION__);
1553 ret = proc_disconnectsignal(ps, p);
1554 break;
1555
1556 case USBDEVFS_CLAIMINTERFACE:
1557 snoop(&dev->dev, "%s: CLAIMINTERFACE\n", __FUNCTION__);
1558 ret = proc_claiminterface(ps, p);
1559 break;
1560
1561 case USBDEVFS_RELEASEINTERFACE:
1562 snoop(&dev->dev, "%s: RELEASEINTERFACE\n", __FUNCTION__);
1563 ret = proc_releaseinterface(ps, p);
1564 break;
1565
1566 case USBDEVFS_IOCTL:
1567 snoop(&dev->dev, "%s: IOCTL\n", __FUNCTION__);
c36fc889 1568 ret = proc_ioctl_default(ps, p);
1da177e4
LT
1569 break;
1570 }
1571 usb_unlock_device(dev);
1572 if (ret >= 0)
1573 inode->i_atime = CURRENT_TIME;
1574 return ret;
1575}
1576
1577/* No kernel lock - fine */
1578static unsigned int usbdev_poll(struct file *file, struct poll_table_struct *wait)
1579{
ec17cf1c
TK
1580 struct dev_state *ps = file->private_data;
1581 unsigned int mask = 0;
1da177e4
LT
1582
1583 poll_wait(file, &ps->wait, wait);
1584 if (file->f_mode & FMODE_WRITE && !list_empty(&ps->async_completed))
1585 mask |= POLLOUT | POLLWRNORM;
349710c3 1586 if (!connected(ps))
1da177e4
LT
1587 mask |= POLLERR | POLLHUP;
1588 return mask;
1589}
1590
9f8b17e6 1591const struct file_operations usbdev_file_operations = {
1da177e4
LT
1592 .llseek = usbdev_lseek,
1593 .read = usbdev_read,
1594 .poll = usbdev_poll,
1595 .ioctl = usbdev_ioctl,
1596 .open = usbdev_open,
1597 .release = usbdev_release,
1598};
fbf82fd2 1599
9f8b17e6
KS
1600#ifdef CONFIG_USB_DEVICE_CLASS
1601static struct class *usb_classdev_class;
1602
1603static int usb_classdev_add(struct usb_device *dev)
fbf82fd2
KS
1604{
1605 int minor = ((dev->bus->busnum-1) * 128) + (dev->devnum-1);
1606
9f8b17e6 1607 dev->usb_classdev = device_create(usb_classdev_class, &dev->dev,
7bc3d635 1608 MKDEV(USB_DEVICE_MAJOR, minor),
fbf82fd2 1609 "usbdev%d.%d", dev->bus->busnum, dev->devnum);
9f8b17e6
KS
1610 if (IS_ERR(dev->usb_classdev))
1611 return PTR_ERR(dev->usb_classdev);
fbf82fd2 1612
27d39e26 1613 return 0;
fbf82fd2
KS
1614}
1615
9f8b17e6 1616static void usb_classdev_remove(struct usb_device *dev)
fbf82fd2 1617{
9f8b17e6 1618 device_unregister(dev->usb_classdev);
fbf82fd2
KS
1619}
1620
9f8b17e6
KS
1621static int usb_classdev_notify(struct notifier_block *self,
1622 unsigned long action, void *dev)
a7b986b3
GKH
1623{
1624 switch (action) {
1625 case USB_DEVICE_ADD:
9f8b17e6 1626 if (usb_classdev_add(dev))
27d39e26 1627 return NOTIFY_BAD;
a7b986b3
GKH
1628 break;
1629 case USB_DEVICE_REMOVE:
9f8b17e6 1630 usb_classdev_remove(dev);
a7b986b3
GKH
1631 break;
1632 }
1633 return NOTIFY_OK;
1634}
1635
1636static struct notifier_block usbdev_nb = {
9f8b17e6 1637 .notifier_call = usb_classdev_notify,
a7b986b3 1638};
9f8b17e6 1639#endif
a7b986b3 1640
fbf82fd2
KS
1641static struct cdev usb_device_cdev = {
1642 .kobj = {.name = "usb_device", },
1643 .owner = THIS_MODULE,
1644};
1645
9f8b17e6 1646int __init usb_devio_init(void)
fbf82fd2
KS
1647{
1648 int retval;
1649
fad21bdf
AS
1650 retval = register_chrdev_region(USB_DEVICE_DEV, USB_DEVICE_MAX,
1651 "usb_device");
fbf82fd2
KS
1652 if (retval) {
1653 err("unable to register minors for usb_device");
1654 goto out;
1655 }
9f8b17e6 1656 cdev_init(&usb_device_cdev, &usbdev_file_operations);
fad21bdf 1657 retval = cdev_add(&usb_device_cdev, USB_DEVICE_DEV, USB_DEVICE_MAX);
fbf82fd2
KS
1658 if (retval) {
1659 err("unable to get usb_device major %d", USB_DEVICE_MAJOR);
a7b986b3 1660 goto error_cdev;
fbf82fd2 1661 }
9f8b17e6
KS
1662#ifdef CONFIG_USB_DEVICE_CLASS
1663 usb_classdev_class = class_create(THIS_MODULE, "usb_device");
1664 if (IS_ERR(usb_classdev_class)) {
fbf82fd2 1665 err("unable to register usb_device class");
9f8b17e6
KS
1666 retval = PTR_ERR(usb_classdev_class);
1667 cdev_del(&usb_device_cdev);
1668 usb_classdev_class = NULL;
1669 goto out;
fbf82fd2
KS
1670 }
1671
a7b986b3 1672 usb_register_notify(&usbdev_nb);
9f8b17e6 1673#endif
fbf82fd2
KS
1674out:
1675 return retval;
a7b986b3 1676
a7b986b3
GKH
1677error_cdev:
1678 unregister_chrdev_region(USB_DEVICE_DEV, USB_DEVICE_MAX);
1679 goto out;
fbf82fd2
KS
1680}
1681
9f8b17e6 1682void usb_devio_cleanup(void)
fbf82fd2 1683{
9f8b17e6 1684#ifdef CONFIG_USB_DEVICE_CLASS
a7b986b3 1685 usb_unregister_notify(&usbdev_nb);
9f8b17e6
KS
1686 class_destroy(usb_classdev_class);
1687#endif
fbf82fd2 1688 cdev_del(&usb_device_cdev);
fad21bdf 1689 unregister_chrdev_region(USB_DEVICE_DEV, USB_DEVICE_MAX);
fbf82fd2 1690}