]> git.proxmox.com Git - mirror_ubuntu-zesty-kernel.git/blame - drivers/usb/core/devio.c
Merge remote-tracking branches 'asoc/topic/sgtl5000', 'asoc/topic/simple', 'asoc...
[mirror_ubuntu-zesty-kernel.git] / drivers / usb / core / devio.c
CommitLineData
1da177e4
LT
1/*****************************************************************************/
2
3/*
4 * devio.c -- User space communication with USB devices.
5 *
6 * Copyright (C) 1999-2000 Thomas Sailer (sailer@ife.ee.ethz.ch)
7 *
8 * This program is free software; you can redistribute it and/or modify
9 * it under the terms of the GNU General Public License as published by
10 * the Free Software Foundation; either version 2 of the License, or
11 * (at your option) any later version.
12 *
13 * This program is distributed in the hope that it will be useful,
14 * but WITHOUT ANY WARRANTY; without even the implied warranty of
15 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
16 * GNU General Public License for more details.
17 *
18 * You should have received a copy of the GNU General Public License
19 * along with this program; if not, write to the Free Software
20 * Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA.
21 *
1da177e4
LT
22 * This file implements the usbfs/x/y files, where
23 * x is the bus number and y the device number.
24 *
25 * It allows user space programs/"drivers" to communicate directly
26 * with USB devices without intervening kernel driver.
27 *
28 * Revision history
29 * 22.12.1999 0.1 Initial release (split from proc_usb.c)
30 * 04.01.2000 0.2 Turned into its own filesystem
46113830
HW
31 * 30.09.2005 0.3 Fix user-triggerable oops in async URB delivery
32 * (CAN-2005-3055)
1da177e4
LT
33 */
34
35/*****************************************************************************/
36
37#include <linux/fs.h>
38#include <linux/mm.h>
39#include <linux/slab.h>
1da177e4
LT
40#include <linux/signal.h>
41#include <linux/poll.h>
42#include <linux/module.h>
b11b2e1b 43#include <linux/string.h>
1da177e4
LT
44#include <linux/usb.h>
45#include <linux/usbdevice_fs.h>
27729aad 46#include <linux/usb/hcd.h> /* for usbcore internals */
fbf82fd2 47#include <linux/cdev.h>
a7b986b3 48#include <linux/notifier.h>
7a01955f 49#include <linux/security.h>
d178bc3a 50#include <linux/user_namespace.h>
3d97ff63 51#include <linux/scatterlist.h>
e6889b31 52#include <linux/uaccess.h>
f7d34b44 53#include <linux/dma-mapping.h>
1da177e4
LT
54#include <asm/byteorder.h>
55#include <linux/moduleparam.h>
56
1da177e4
LT
57#include "usb.h"
58
fbf82fd2 59#define USB_MAXBUS 64
fa86ad0b 60#define USB_DEVICE_MAX (USB_MAXBUS * 128)
3d97ff63 61#define USB_SG_SIZE 16384 /* split-size for large txs */
fbf82fd2 62
4a2a8a2c
AS
63/* Mutual exclusion for removal, open, and release */
64DEFINE_MUTEX(usbfs_mutex);
65
9b6f0c4b 66struct usb_dev_state {
cd9f0375
AS
67 struct list_head list; /* state list */
68 struct usb_device *dev;
69 struct file *file;
70 spinlock_t lock; /* protects the async urb lists */
71 struct list_head async_pending;
72 struct list_head async_completed;
f7d34b44 73 struct list_head memory_list;
cd9f0375
AS
74 wait_queue_head_t wait; /* wake up if a request completed */
75 unsigned int discsignr;
76 struct pid *disc_pid;
d178bc3a 77 const struct cred *cred;
cd9f0375
AS
78 void __user *disccontext;
79 unsigned long ifclaimed;
80 u32 secid;
01c6460f 81 u32 disabled_bulk_eps;
d883f52e
RG
82 bool privileges_dropped;
83 unsigned long interface_allowed_mask;
cd9f0375
AS
84};
85
f7d34b44
SG
86struct usb_memory {
87 struct list_head memlist;
88 int vma_use_count;
89 int urb_use_count;
90 u32 size;
91 void *mem;
92 dma_addr_t dma_handle;
93 unsigned long vm_start;
94 struct usb_dev_state *ps;
95};
96
1da177e4
LT
97struct async {
98 struct list_head asynclist;
9b6f0c4b 99 struct usb_dev_state *ps;
2425c08b 100 struct pid *pid;
d178bc3a 101 const struct cred *cred;
1da177e4
LT
102 unsigned int signr;
103 unsigned int ifnum;
104 void __user *userbuffer;
105 void __user *userurb;
106 struct urb *urb;
f7d34b44 107 struct usb_memory *usbm;
add1aaea 108 unsigned int mem_usage;
e015268d 109 int status;
7a01955f 110 u32 secid;
01c6460f
AS
111 u8 bulk_addr;
112 u8 bulk_status;
1da177e4
LT
113};
114
90ab5ee9 115static bool usbfs_snoop;
04e482ff
GKH
116module_param(usbfs_snoop, bool, S_IRUGO | S_IWUSR);
117MODULE_PARM_DESC(usbfs_snoop, "true to log all usbfs traffic");
1da177e4 118
0290cc9f
AS
119static unsigned usbfs_snoop_max = 65536;
120module_param(usbfs_snoop_max, uint, S_IRUGO | S_IWUSR);
121MODULE_PARM_DESC(usbfs_snoop_max,
122 "maximum number of bytes to print while snooping");
123
1da177e4
LT
124#define snoop(dev, format, arg...) \
125 do { \
126 if (usbfs_snoop) \
f355e830 127 dev_info(dev, format, ## arg); \
1da177e4
LT
128 } while (0)
129
4c6e8971
AS
130enum snoop_when {
131 SUBMIT, COMPLETE
132};
fad21bdf 133
4c6e8971 134#define USB_DEVICE_DEV MKDEV(USB_DEVICE_MAJOR, 0)
1da177e4 135
add1aaea 136/* Limit on the total amount of memory we can allocate for transfers */
3f5eb8d5
AS
137static unsigned usbfs_memory_mb = 16;
138module_param(usbfs_memory_mb, uint, 0644);
139MODULE_PARM_DESC(usbfs_memory_mb,
140 "maximum MB allowed for usbfs buffers (0 = no limit)");
141
025d4430 142/* Hard limit, necessary to avoid arithmetic overflow */
3f5eb8d5 143#define USBFS_XFER_MAX (UINT_MAX / 2 - 1000000)
1da177e4 144
add1aaea
AS
145static atomic_t usbfs_memory_usage; /* Total memory currently allocated */
146
147/* Check whether it's okay to allocate more memory for a transfer */
148static int usbfs_increase_memory_usage(unsigned amount)
149{
3f5eb8d5
AS
150 unsigned lim;
151
152 /*
153 * Convert usbfs_memory_mb to bytes, avoiding overflows.
154 * 0 means use the hard limit (effectively unlimited).
155 */
156 lim = ACCESS_ONCE(usbfs_memory_mb);
157 if (lim == 0 || lim > (USBFS_XFER_MAX >> 20))
158 lim = USBFS_XFER_MAX;
159 else
160 lim <<= 20;
161
add1aaea 162 atomic_add(amount, &usbfs_memory_usage);
3f5eb8d5 163 if (atomic_read(&usbfs_memory_usage) <= lim)
add1aaea
AS
164 return 0;
165 atomic_sub(amount, &usbfs_memory_usage);
166 return -ENOMEM;
167}
168
169/* Memory for a transfer is being deallocated */
170static void usbfs_decrease_memory_usage(unsigned amount)
171{
172 atomic_sub(amount, &usbfs_memory_usage);
173}
4c6e8971 174
9b6f0c4b 175static int connected(struct usb_dev_state *ps)
1da177e4 176{
349710c3
AS
177 return (!list_empty(&ps->list) &&
178 ps->dev->state != USB_STATE_NOTATTACHED);
1da177e4
LT
179}
180
f7d34b44
SG
181static void dec_usb_memory_use_count(struct usb_memory *usbm, int *count)
182{
183 struct usb_dev_state *ps = usbm->ps;
184 unsigned long flags;
185
186 spin_lock_irqsave(&ps->lock, flags);
187 --*count;
188 if (usbm->urb_use_count == 0 && usbm->vma_use_count == 0) {
189 list_del(&usbm->memlist);
190 spin_unlock_irqrestore(&ps->lock, flags);
191
192 usb_free_coherent(ps->dev, usbm->size, usbm->mem,
193 usbm->dma_handle);
194 usbfs_decrease_memory_usage(
195 usbm->size + sizeof(struct usb_memory));
196 kfree(usbm);
197 } else {
198 spin_unlock_irqrestore(&ps->lock, flags);
199 }
200}
201
202static void usbdev_vm_open(struct vm_area_struct *vma)
203{
204 struct usb_memory *usbm = vma->vm_private_data;
205 unsigned long flags;
206
207 spin_lock_irqsave(&usbm->ps->lock, flags);
208 ++usbm->vma_use_count;
209 spin_unlock_irqrestore(&usbm->ps->lock, flags);
210}
211
212static void usbdev_vm_close(struct vm_area_struct *vma)
213{
214 struct usb_memory *usbm = vma->vm_private_data;
215
216 dec_usb_memory_use_count(usbm, &usbm->vma_use_count);
217}
218
10871c13 219static struct vm_operations_struct usbdev_vm_ops = {
f7d34b44
SG
220 .open = usbdev_vm_open,
221 .close = usbdev_vm_close
222};
223
224static int usbdev_mmap(struct file *file, struct vm_area_struct *vma)
225{
226 struct usb_memory *usbm = NULL;
227 struct usb_dev_state *ps = file->private_data;
228 size_t size = vma->vm_end - vma->vm_start;
229 void *mem;
230 unsigned long flags;
231 dma_addr_t dma_handle;
232 int ret;
233
234 ret = usbfs_increase_memory_usage(size + sizeof(struct usb_memory));
235 if (ret)
236 goto error;
237
238 usbm = kzalloc(sizeof(struct usb_memory), GFP_KERNEL);
239 if (!usbm) {
240 ret = -ENOMEM;
241 goto error_decrease_mem;
242 }
243
70f7ca9a
JS
244 mem = usb_alloc_coherent(ps->dev, size, GFP_USER | __GFP_NOWARN,
245 &dma_handle);
f7d34b44
SG
246 if (!mem) {
247 ret = -ENOMEM;
248 goto error_free_usbm;
249 }
250
251 memset(mem, 0, size);
252
253 usbm->mem = mem;
254 usbm->dma_handle = dma_handle;
255 usbm->size = size;
256 usbm->ps = ps;
257 usbm->vm_start = vma->vm_start;
258 usbm->vma_use_count = 1;
259 INIT_LIST_HEAD(&usbm->memlist);
260
261 if (remap_pfn_range(vma, vma->vm_start,
262 virt_to_phys(usbm->mem) >> PAGE_SHIFT,
263 size, vma->vm_page_prot) < 0) {
264 dec_usb_memory_use_count(usbm, &usbm->vma_use_count);
265 return -EAGAIN;
266 }
267
268 vma->vm_flags |= VM_IO;
269 vma->vm_flags |= (VM_DONTEXPAND | VM_DONTDUMP);
270 vma->vm_ops = &usbdev_vm_ops;
271 vma->vm_private_data = usbm;
272
273 spin_lock_irqsave(&ps->lock, flags);
274 list_add_tail(&usbm->memlist, &ps->memory_list);
275 spin_unlock_irqrestore(&ps->lock, flags);
276
277 return 0;
278
279error_free_usbm:
280 kfree(usbm);
281error_decrease_mem:
282 usbfs_decrease_memory_usage(size + sizeof(struct usb_memory));
283error:
284 return ret;
285}
286
04e482ff
GKH
287static ssize_t usbdev_read(struct file *file, char __user *buf, size_t nbytes,
288 loff_t *ppos)
1da177e4 289{
9b6f0c4b 290 struct usb_dev_state *ps = file->private_data;
1da177e4
LT
291 struct usb_device *dev = ps->dev;
292 ssize_t ret = 0;
293 unsigned len;
294 loff_t pos;
295 int i;
296
297 pos = *ppos;
298 usb_lock_device(dev);
349710c3 299 if (!connected(ps)) {
1da177e4
LT
300 ret = -ENODEV;
301 goto err;
302 } else if (pos < 0) {
303 ret = -EINVAL;
304 goto err;
305 }
306
307 if (pos < sizeof(struct usb_device_descriptor)) {
04e482ff
GKH
308 /* 18 bytes - fits on the stack */
309 struct usb_device_descriptor temp_desc;
8781ba0a
ON
310
311 memcpy(&temp_desc, &dev->descriptor, sizeof(dev->descriptor));
9fcd5c32
AM
312 le16_to_cpus(&temp_desc.bcdUSB);
313 le16_to_cpus(&temp_desc.idVendor);
314 le16_to_cpus(&temp_desc.idProduct);
315 le16_to_cpus(&temp_desc.bcdDevice);
1da177e4
LT
316
317 len = sizeof(struct usb_device_descriptor) - pos;
318 if (len > nbytes)
319 len = nbytes;
8781ba0a 320 if (copy_to_user(buf, ((char *)&temp_desc) + pos, len)) {
1da177e4
LT
321 ret = -EFAULT;
322 goto err;
323 }
1da177e4
LT
324
325 *ppos += len;
326 buf += len;
327 nbytes -= len;
328 ret += len;
329 }
330
331 pos = sizeof(struct usb_device_descriptor);
332 for (i = 0; nbytes && i < dev->descriptor.bNumConfigurations; i++) {
333 struct usb_config_descriptor *config =
334 (struct usb_config_descriptor *)dev->rawdescriptors[i];
335 unsigned int length = le16_to_cpu(config->wTotalLength);
336
337 if (*ppos < pos + length) {
338
339 /* The descriptor may claim to be longer than it
340 * really is. Here is the actual allocated length. */
341 unsigned alloclen =
342 le16_to_cpu(dev->config[i].desc.wTotalLength);
343
344 len = length - (*ppos - pos);
345 if (len > nbytes)
346 len = nbytes;
347
348 /* Simply don't write (skip over) unallocated parts */
349 if (alloclen > (*ppos - pos)) {
350 alloclen -= (*ppos - pos);
351 if (copy_to_user(buf,
352 dev->rawdescriptors[i] + (*ppos - pos),
353 min(len, alloclen))) {
354 ret = -EFAULT;
355 goto err;
356 }
357 }
358
359 *ppos += len;
360 buf += len;
361 nbytes -= len;
362 ret += len;
363 }
364
365 pos += length;
366 }
367
368err:
369 usb_unlock_device(dev);
370 return ret;
371}
372
373/*
374 * async list handling
375 */
376
377static struct async *alloc_async(unsigned int numisoframes)
378{
dd95b814 379 struct async *as;
0a1ef3b5 380
dd95b814 381 as = kzalloc(sizeof(struct async), GFP_KERNEL);
04e482ff
GKH
382 if (!as)
383 return NULL;
1da177e4
LT
384 as->urb = usb_alloc_urb(numisoframes, GFP_KERNEL);
385 if (!as->urb) {
386 kfree(as);
387 return NULL;
388 }
04e482ff 389 return as;
1da177e4
LT
390}
391
392static void free_async(struct async *as)
393{
3d97ff63
HG
394 int i;
395
2425c08b 396 put_pid(as->pid);
1b41c832
SS
397 if (as->cred)
398 put_cred(as->cred);
3d97ff63
HG
399 for (i = 0; i < as->urb->num_sgs; i++) {
400 if (sg_page(&as->urb->sg[i]))
401 kfree(sg_virt(&as->urb->sg[i]));
402 }
f7d34b44 403
3d97ff63 404 kfree(as->urb->sg);
f7d34b44
SG
405 if (as->usbm == NULL)
406 kfree(as->urb->transfer_buffer);
407 else
408 dec_usb_memory_use_count(as->usbm, &as->usbm->urb_use_count);
409
6fd19f4b 410 kfree(as->urb->setup_packet);
1da177e4 411 usb_free_urb(as->urb);
add1aaea 412 usbfs_decrease_memory_usage(as->mem_usage);
6fd19f4b 413 kfree(as);
1da177e4
LT
414}
415
d34d9721 416static void async_newpending(struct async *as)
1da177e4 417{
9b6f0c4b 418 struct usb_dev_state *ps = as->ps;
04e482ff
GKH
419 unsigned long flags;
420
421 spin_lock_irqsave(&ps->lock, flags);
422 list_add_tail(&as->asynclist, &ps->async_pending);
423 spin_unlock_irqrestore(&ps->lock, flags);
1da177e4
LT
424}
425
d34d9721 426static void async_removepending(struct async *as)
1da177e4 427{
9b6f0c4b 428 struct usb_dev_state *ps = as->ps;
04e482ff
GKH
429 unsigned long flags;
430
431 spin_lock_irqsave(&ps->lock, flags);
432 list_del_init(&as->asynclist);
433 spin_unlock_irqrestore(&ps->lock, flags);
1da177e4
LT
434}
435
9b6f0c4b 436static struct async *async_getcompleted(struct usb_dev_state *ps)
1da177e4 437{
04e482ff
GKH
438 unsigned long flags;
439 struct async *as = NULL;
440
441 spin_lock_irqsave(&ps->lock, flags);
442 if (!list_empty(&ps->async_completed)) {
443 as = list_entry(ps->async_completed.next, struct async,
444 asynclist);
445 list_del_init(&as->asynclist);
446 }
447 spin_unlock_irqrestore(&ps->lock, flags);
448 return as;
1da177e4
LT
449}
450
9b6f0c4b 451static struct async *async_getpending(struct usb_dev_state *ps,
04e482ff 452 void __user *userurb)
1da177e4 453{
04e482ff 454 struct async *as;
1da177e4 455
1da177e4
LT
456 list_for_each_entry(as, &ps->async_pending, asynclist)
457 if (as->userurb == userurb) {
458 list_del_init(&as->asynclist);
1da177e4
LT
459 return as;
460 }
4e09dcf2 461
04e482ff 462 return NULL;
1da177e4
LT
463}
464
4c6e8971
AS
465static void snoop_urb(struct usb_device *udev,
466 void __user *userurb, int pipe, unsigned length,
0880aef4
CF
467 int timeout_or_status, enum snoop_when when,
468 unsigned char *data, unsigned data_len)
e639dd3f 469{
4c6e8971
AS
470 static const char *types[] = {"isoc", "int", "ctrl", "bulk"};
471 static const char *dirs[] = {"out", "in"};
472 int ep;
473 const char *t, *d;
e639dd3f
GKH
474
475 if (!usbfs_snoop)
476 return;
477
4c6e8971
AS
478 ep = usb_pipeendpoint(pipe);
479 t = types[usb_pipetype(pipe)];
480 d = dirs[!!usb_pipein(pipe)];
481
482 if (userurb) { /* Async */
483 if (when == SUBMIT)
484 dev_info(&udev->dev, "userurb %p, ep%d %s-%s, "
485 "length %u\n",
486 userurb, ep, t, d, length);
487 else
488 dev_info(&udev->dev, "userurb %p, ep%d %s-%s, "
489 "actual_length %u status %d\n",
490 userurb, ep, t, d, length,
491 timeout_or_status);
492 } else {
493 if (when == SUBMIT)
494 dev_info(&udev->dev, "ep%d %s-%s, length %u, "
495 "timeout %d\n",
496 ep, t, d, length, timeout_or_status);
497 else
498 dev_info(&udev->dev, "ep%d %s-%s, actual_length %u, "
499 "status %d\n",
500 ep, t, d, length, timeout_or_status);
501 }
0880aef4 502
0290cc9f 503 data_len = min(data_len, usbfs_snoop_max);
0880aef4
CF
504 if (data && data_len > 0) {
505 print_hex_dump(KERN_DEBUG, "data: ", DUMP_PREFIX_NONE, 32, 1,
506 data, data_len, 1);
507 }
e639dd3f
GKH
508}
509
3d97ff63
HG
510static void snoop_urb_data(struct urb *urb, unsigned len)
511{
512 int i, size;
513
0290cc9f
AS
514 len = min(len, usbfs_snoop_max);
515 if (!usbfs_snoop || len == 0)
3d97ff63
HG
516 return;
517
518 if (urb->num_sgs == 0) {
519 print_hex_dump(KERN_DEBUG, "data: ", DUMP_PREFIX_NONE, 32, 1,
520 urb->transfer_buffer, len, 1);
521 return;
522 }
523
524 for (i = 0; i < urb->num_sgs && len; i++) {
525 size = (len > USB_SG_SIZE) ? USB_SG_SIZE : len;
526 print_hex_dump(KERN_DEBUG, "data: ", DUMP_PREFIX_NONE, 32, 1,
527 sg_virt(&urb->sg[i]), size, 1);
528 len -= size;
529 }
530}
531
532static int copy_urb_data_to_user(u8 __user *userbuffer, struct urb *urb)
533{
534 unsigned i, len, size;
535
536 if (urb->number_of_packets > 0) /* Isochronous */
537 len = urb->transfer_buffer_length;
538 else /* Non-Isoc */
539 len = urb->actual_length;
540
541 if (urb->num_sgs == 0) {
542 if (copy_to_user(userbuffer, urb->transfer_buffer, len))
543 return -EFAULT;
544 return 0;
545 }
546
547 for (i = 0; i < urb->num_sgs && len; i++) {
548 size = (len > USB_SG_SIZE) ? USB_SG_SIZE : len;
549 if (copy_to_user(userbuffer, sg_virt(&urb->sg[i]), size))
550 return -EFAULT;
551 userbuffer += size;
552 len -= size;
553 }
554
555 return 0;
556}
557
01c6460f
AS
558#define AS_CONTINUATION 1
559#define AS_UNLINK 2
560
9b6f0c4b 561static void cancel_bulk_urbs(struct usb_dev_state *ps, unsigned bulk_addr)
01c6460f
AS
562__releases(ps->lock)
563__acquires(ps->lock)
564{
4e09dcf2 565 struct urb *urb;
01c6460f
AS
566 struct async *as;
567
568 /* Mark all the pending URBs that match bulk_addr, up to but not
569 * including the first one without AS_CONTINUATION. If such an
570 * URB is encountered then a new transfer has already started so
571 * the endpoint doesn't need to be disabled; otherwise it does.
572 */
573 list_for_each_entry(as, &ps->async_pending, asynclist) {
574 if (as->bulk_addr == bulk_addr) {
575 if (as->bulk_status != AS_CONTINUATION)
576 goto rescan;
577 as->bulk_status = AS_UNLINK;
578 as->bulk_addr = 0;
579 }
580 }
581 ps->disabled_bulk_eps |= (1 << bulk_addr);
582
583 /* Now carefully unlink all the marked pending URBs */
584 rescan:
585 list_for_each_entry(as, &ps->async_pending, asynclist) {
586 if (as->bulk_status == AS_UNLINK) {
587 as->bulk_status = 0; /* Only once */
4e09dcf2
HL
588 urb = as->urb;
589 usb_get_urb(urb);
01c6460f 590 spin_unlock(&ps->lock); /* Allow completions */
4e09dcf2
HL
591 usb_unlink_urb(urb);
592 usb_put_urb(urb);
01c6460f
AS
593 spin_lock(&ps->lock);
594 goto rescan;
595 }
596 }
597}
598
7d12e780 599static void async_completed(struct urb *urb)
1da177e4 600{
04e482ff 601 struct async *as = urb->context;
9b6f0c4b 602 struct usb_dev_state *ps = as->ps;
1da177e4 603 struct siginfo sinfo;
516a1a07 604 struct pid *pid = NULL;
516a1a07 605 u32 secid = 0;
d178bc3a 606 const struct cred *cred = NULL;
516a1a07 607 int signr;
1da177e4 608
04e482ff
GKH
609 spin_lock(&ps->lock);
610 list_move_tail(&as->asynclist, &ps->async_completed);
e015268d 611 as->status = urb->status;
516a1a07
ON
612 signr = as->signr;
613 if (signr) {
f0c2b681 614 memset(&sinfo, 0, sizeof(sinfo));
1da177e4 615 sinfo.si_signo = as->signr;
e015268d 616 sinfo.si_errno = as->status;
1da177e4
LT
617 sinfo.si_code = SI_ASYNCIO;
618 sinfo.si_addr = as->userurb;
aec01c58 619 pid = get_pid(as->pid);
d178bc3a 620 cred = get_cred(as->cred);
516a1a07 621 secid = as->secid;
1da177e4 622 }
e639dd3f 623 snoop(&urb->dev->dev, "urb complete\n");
4c6e8971 624 snoop_urb(urb->dev, as->userurb, urb->pipe, urb->actual_length,
3d97ff63 625 as->status, COMPLETE, NULL, 0);
83ed07c5 626 if ((urb->transfer_flags & URB_DIR_MASK) == URB_DIR_IN)
3d97ff63
HG
627 snoop_urb_data(urb, urb->actual_length);
628
01c6460f
AS
629 if (as->status < 0 && as->bulk_addr && as->status != -ECONNRESET &&
630 as->status != -ENOENT)
631 cancel_bulk_urbs(ps, as->bulk_addr);
516a1a07
ON
632 spin_unlock(&ps->lock);
633
aec01c58 634 if (signr) {
d178bc3a 635 kill_pid_info_as_cred(sinfo.si_signo, &sinfo, pid, cred, secid);
aec01c58 636 put_pid(pid);
d178bc3a 637 put_cred(cred);
aec01c58 638 }
516a1a07 639
e639dd3f 640 wake_up(&ps->wait);
1da177e4
LT
641}
642
9b6f0c4b 643static void destroy_async(struct usb_dev_state *ps, struct list_head *list)
1da177e4 644{
4e09dcf2 645 struct urb *urb;
1da177e4
LT
646 struct async *as;
647 unsigned long flags;
648
649 spin_lock_irqsave(&ps->lock, flags);
650 while (!list_empty(list)) {
651 as = list_entry(list->next, struct async, asynclist);
652 list_del_init(&as->asynclist);
4e09dcf2
HL
653 urb = as->urb;
654 usb_get_urb(urb);
1da177e4
LT
655
656 /* drop the spinlock so the completion handler can run */
657 spin_unlock_irqrestore(&ps->lock, flags);
4e09dcf2
HL
658 usb_kill_urb(urb);
659 usb_put_urb(urb);
1da177e4
LT
660 spin_lock_irqsave(&ps->lock, flags);
661 }
662 spin_unlock_irqrestore(&ps->lock, flags);
1da177e4
LT
663}
664
9b6f0c4b 665static void destroy_async_on_interface(struct usb_dev_state *ps,
04e482ff 666 unsigned int ifnum)
1da177e4
LT
667{
668 struct list_head *p, *q, hitlist;
669 unsigned long flags;
670
671 INIT_LIST_HEAD(&hitlist);
672 spin_lock_irqsave(&ps->lock, flags);
673 list_for_each_safe(p, q, &ps->async_pending)
674 if (ifnum == list_entry(p, struct async, asynclist)->ifnum)
675 list_move_tail(p, &hitlist);
676 spin_unlock_irqrestore(&ps->lock, flags);
677 destroy_async(ps, &hitlist);
678}
679
9b6f0c4b 680static void destroy_all_async(struct usb_dev_state *ps)
1da177e4 681{
04e482ff 682 destroy_async(ps, &ps->async_pending);
1da177e4
LT
683}
684
685/*
686 * interface claims are made only at the request of user level code,
687 * which can also release them (explicitly or by closing files).
688 * they're also undone when devices disconnect.
689 */
690
04e482ff
GKH
691static int driver_probe(struct usb_interface *intf,
692 const struct usb_device_id *id)
1da177e4
LT
693{
694 return -ENODEV;
695}
696
697static void driver_disconnect(struct usb_interface *intf)
698{
9b6f0c4b 699 struct usb_dev_state *ps = usb_get_intfdata(intf);
1da177e4
LT
700 unsigned int ifnum = intf->altsetting->desc.bInterfaceNumber;
701
702 if (!ps)
703 return;
704
705 /* NOTE: this relies on usbcore having canceled and completed
706 * all pending I/O requests; 2.6 does that.
707 */
708
709 if (likely(ifnum < 8*sizeof(ps->ifclaimed)))
710 clear_bit(ifnum, &ps->ifclaimed);
711 else
3b6004f3
GKH
712 dev_warn(&intf->dev, "interface number %u out of range\n",
713 ifnum);
1da177e4 714
04e482ff 715 usb_set_intfdata(intf, NULL);
1da177e4
LT
716
717 /* force async requests to complete */
718 destroy_async_on_interface(ps, ifnum);
719}
720
2e2eb83f
AS
721/* The following routines are merely placeholders. There is no way
722 * to inform a user task about suspend or resumes.
723 */
724static int driver_suspend(struct usb_interface *intf, pm_message_t msg)
725{
726 return 0;
727}
728
729static int driver_resume(struct usb_interface *intf)
730{
731 return 0;
732}
733
1da177e4 734struct usb_driver usbfs_driver = {
1da177e4
LT
735 .name = "usbfs",
736 .probe = driver_probe,
737 .disconnect = driver_disconnect,
2e2eb83f
AS
738 .suspend = driver_suspend,
739 .resume = driver_resume,
1da177e4
LT
740};
741
9b6f0c4b 742static int claimintf(struct usb_dev_state *ps, unsigned int ifnum)
1da177e4
LT
743{
744 struct usb_device *dev = ps->dev;
745 struct usb_interface *intf;
746 int err;
747
748 if (ifnum >= 8*sizeof(ps->ifclaimed))
749 return -EINVAL;
750 /* already claimed */
751 if (test_bit(ifnum, &ps->ifclaimed))
752 return 0;
753
d883f52e
RG
754 if (ps->privileges_dropped &&
755 !test_bit(ifnum, &ps->interface_allowed_mask))
756 return -EACCES;
757
1da177e4
LT
758 intf = usb_ifnum_to_if(dev, ifnum);
759 if (!intf)
760 err = -ENOENT;
761 else
762 err = usb_driver_claim_interface(&usbfs_driver, intf, ps);
1da177e4
LT
763 if (err == 0)
764 set_bit(ifnum, &ps->ifclaimed);
765 return err;
766}
767
9b6f0c4b 768static int releaseintf(struct usb_dev_state *ps, unsigned int ifnum)
1da177e4
LT
769{
770 struct usb_device *dev;
771 struct usb_interface *intf;
772 int err;
773
774 err = -EINVAL;
775 if (ifnum >= 8*sizeof(ps->ifclaimed))
776 return err;
777 dev = ps->dev;
1da177e4
LT
778 intf = usb_ifnum_to_if(dev, ifnum);
779 if (!intf)
780 err = -ENOENT;
781 else if (test_and_clear_bit(ifnum, &ps->ifclaimed)) {
782 usb_driver_release_interface(&usbfs_driver, intf);
783 err = 0;
784 }
1da177e4
LT
785 return err;
786}
787
9b6f0c4b 788static int checkintf(struct usb_dev_state *ps, unsigned int ifnum)
1da177e4
LT
789{
790 if (ps->dev->state != USB_STATE_CONFIGURED)
791 return -EHOSTUNREACH;
792 if (ifnum >= 8*sizeof(ps->ifclaimed))
793 return -EINVAL;
794 if (test_bit(ifnum, &ps->ifclaimed))
795 return 0;
796 /* if not yet claimed, claim it for the driver */
04e482ff
GKH
797 dev_warn(&ps->dev->dev, "usbfs: process %d (%s) did not claim "
798 "interface %u before use\n", task_pid_nr(current),
799 current->comm, ifnum);
1da177e4
LT
800 return claimintf(ps, ifnum);
801}
802
803static int findintfep(struct usb_device *dev, unsigned int ep)
804{
805 unsigned int i, j, e;
04e482ff 806 struct usb_interface *intf;
1da177e4
LT
807 struct usb_host_interface *alts;
808 struct usb_endpoint_descriptor *endpt;
809
810 if (ep & ~(USB_DIR_IN|0xf))
811 return -EINVAL;
812 if (!dev->actconfig)
813 return -ESRCH;
814 for (i = 0; i < dev->actconfig->desc.bNumInterfaces; i++) {
815 intf = dev->actconfig->interface[i];
816 for (j = 0; j < intf->num_altsetting; j++) {
04e482ff 817 alts = &intf->altsetting[j];
1da177e4
LT
818 for (e = 0; e < alts->desc.bNumEndpoints; e++) {
819 endpt = &alts->endpoint[e].desc;
820 if (endpt->bEndpointAddress == ep)
821 return alts->desc.bInterfaceNumber;
822 }
823 }
824 }
04e482ff 825 return -ENOENT;
1da177e4
LT
826}
827
9b6f0c4b 828static int check_ctrlrecip(struct usb_dev_state *ps, unsigned int requesttype,
393cbb51 829 unsigned int request, unsigned int index)
1da177e4
LT
830{
831 int ret = 0;
393cbb51 832 struct usb_host_interface *alt_setting;
1da177e4 833
6da9c990
DV
834 if (ps->dev->state != USB_STATE_UNAUTHENTICATED
835 && ps->dev->state != USB_STATE_ADDRESS
24f8b116 836 && ps->dev->state != USB_STATE_CONFIGURED)
1da177e4
LT
837 return -EHOSTUNREACH;
838 if (USB_TYPE_VENDOR == (USB_TYPE_MASK & requesttype))
839 return 0;
840
393cbb51
MD
841 /*
842 * check for the special corner case 'get_device_id' in the printer
5dc50c35
HG
843 * class specification, which we always want to allow as it is used
844 * to query things like ink level, etc.
393cbb51
MD
845 */
846 if (requesttype == 0xa1 && request == 0) {
847 alt_setting = usb_find_alt_setting(ps->dev->actconfig,
848 index >> 8, index & 0xff);
849 if (alt_setting
850 && alt_setting->desc.bInterfaceClass == USB_CLASS_PRINTER)
5dc50c35 851 return 0;
393cbb51
MD
852 }
853
1da177e4
LT
854 index &= 0xff;
855 switch (requesttype & USB_RECIP_MASK) {
856 case USB_RECIP_ENDPOINT:
1361bf4b
HG
857 if ((index & ~USB_DIR_IN) == 0)
858 return 0;
04e482ff 859 ret = findintfep(ps->dev, index);
831abf76
KG
860 if (ret < 0) {
861 /*
862 * Some not fully compliant Win apps seem to get
863 * index wrong and have the endpoint number here
864 * rather than the endpoint address (with the
865 * correct direction). Win does let this through,
866 * so we'll not reject it here but leave it to
867 * the device to not break KVM. But we warn.
868 */
869 ret = findintfep(ps->dev, index ^ 0x80);
870 if (ret >= 0)
871 dev_info(&ps->dev->dev,
872 "%s: process %i (%s) requesting ep %02x but needs %02x\n",
873 __func__, task_pid_nr(current),
874 current->comm, index, index ^ 0x80);
875 }
04e482ff 876 if (ret >= 0)
1da177e4
LT
877 ret = checkintf(ps, ret);
878 break;
879
880 case USB_RECIP_INTERFACE:
881 ret = checkintf(ps, index);
882 break;
883 }
884 return ret;
885}
886
2fec32b0
HG
887static struct usb_host_endpoint *ep_to_host_endpoint(struct usb_device *dev,
888 unsigned char ep)
889{
890 if (ep & USB_ENDPOINT_DIR_MASK)
891 return dev->ep_in[ep & USB_ENDPOINT_NUMBER_MASK];
892 else
893 return dev->ep_out[ep & USB_ENDPOINT_NUMBER_MASK];
894}
895
3e75c6de 896static int parse_usbdevfs_streams(struct usb_dev_state *ps,
bcf7f6e3
HG
897 struct usbdevfs_streams __user *streams,
898 unsigned int *num_streams_ret,
899 unsigned int *num_eps_ret,
900 struct usb_host_endpoint ***eps_ret,
901 struct usb_interface **intf_ret)
902{
903 unsigned int i, num_streams, num_eps;
904 struct usb_host_endpoint **eps;
905 struct usb_interface *intf = NULL;
906 unsigned char ep;
907 int ifnum, ret;
908
909 if (get_user(num_streams, &streams->num_streams) ||
910 get_user(num_eps, &streams->num_eps))
911 return -EFAULT;
912
913 if (num_eps < 1 || num_eps > USB_MAXENDPOINTS)
914 return -EINVAL;
915
916 /* The XHCI controller allows max 2 ^ 16 streams */
917 if (num_streams_ret && (num_streams < 2 || num_streams > 65536))
918 return -EINVAL;
919
920 eps = kmalloc(num_eps * sizeof(*eps), GFP_KERNEL);
921 if (!eps)
922 return -ENOMEM;
923
924 for (i = 0; i < num_eps; i++) {
925 if (get_user(ep, &streams->eps[i])) {
926 ret = -EFAULT;
927 goto error;
928 }
929 eps[i] = ep_to_host_endpoint(ps->dev, ep);
930 if (!eps[i]) {
931 ret = -EINVAL;
932 goto error;
933 }
934
935 /* usb_alloc/free_streams operate on an usb_interface */
936 ifnum = findintfep(ps->dev, ep);
937 if (ifnum < 0) {
938 ret = ifnum;
939 goto error;
940 }
941
942 if (i == 0) {
943 ret = checkintf(ps, ifnum);
944 if (ret < 0)
945 goto error;
946 intf = usb_ifnum_to_if(ps->dev, ifnum);
947 } else {
948 /* Verify all eps belong to the same interface */
949 if (ifnum != intf->altsetting->desc.bInterfaceNumber) {
950 ret = -EINVAL;
951 goto error;
952 }
953 }
954 }
955
956 if (num_streams_ret)
957 *num_streams_ret = num_streams;
958 *num_eps_ret = num_eps;
959 *eps_ret = eps;
960 *intf_ret = intf;
961
962 return 0;
963
964error:
965 kfree(eps);
966 return ret;
967}
968
61ad04a8 969static int match_devt(struct device *dev, void *data)
4592bf5a 970{
a80d5ff0 971 return dev->devt == (dev_t) (unsigned long) data;
9f8b17e6 972}
4592bf5a 973
61ad04a8 974static struct usb_device *usbdev_lookup_by_devt(dev_t devt)
9f8b17e6
KS
975{
976 struct device *dev;
977
a80d5ff0
DH
978 dev = bus_find_device(&usb_bus_type, NULL,
979 (void *) (unsigned long) devt, match_devt);
9f8b17e6
KS
980 if (!dev)
981 return NULL;
69ab55d7 982 return to_usb_device(dev);
9f8b17e6 983}
4592bf5a 984
1da177e4
LT
985/*
986 * file operations
987 */
988static int usbdev_open(struct inode *inode, struct file *file)
989{
fbf82fd2 990 struct usb_device *dev = NULL;
9b6f0c4b 991 struct usb_dev_state *ps;
1da177e4
LT
992 int ret;
993
1da177e4 994 ret = -ENOMEM;
d883f52e 995 ps = kzalloc(sizeof(struct usb_dev_state), GFP_KERNEL);
04e482ff 996 if (!ps)
62e299e6 997 goto out_free_ps;
1da177e4 998
01105a24 999 ret = -ENODEV;
61ad04a8 1000
62e299e6
AS
1001 /* Protect against simultaneous removal or release */
1002 mutex_lock(&usbfs_mutex);
1003
9f8b17e6 1004 /* usbdev device-node */
fbf82fd2 1005 if (imajor(inode) == USB_DEVICE_MAJOR)
61ad04a8 1006 dev = usbdev_lookup_by_devt(inode->i_rdev);
62e299e6 1007
62e299e6
AS
1008 mutex_unlock(&usbfs_mutex);
1009
1010 if (!dev)
1011 goto out_free_ps;
1012
1013 usb_lock_device(dev);
1014 if (dev->state == USB_STATE_NOTATTACHED)
1015 goto out_unlock_device;
1016
94fcda1f 1017 ret = usb_autoresume_device(dev);
01d883d4 1018 if (ret)
62e299e6 1019 goto out_unlock_device;
01d883d4 1020
1da177e4
LT
1021 ps->dev = dev;
1022 ps->file = file;
d883f52e 1023 ps->interface_allowed_mask = 0xFFFFFFFF; /* 32 bits */
1da177e4 1024 spin_lock_init(&ps->lock);
316547fd 1025 INIT_LIST_HEAD(&ps->list);
1da177e4
LT
1026 INIT_LIST_HEAD(&ps->async_pending);
1027 INIT_LIST_HEAD(&ps->async_completed);
f7d34b44 1028 INIT_LIST_HEAD(&ps->memory_list);
1da177e4 1029 init_waitqueue_head(&ps->wait);
2425c08b 1030 ps->disc_pid = get_pid(task_pid(current));
d178bc3a 1031 ps->cred = get_current_cred();
7a01955f 1032 security_task_getsecid(current, &ps->secid);
527660a8 1033 smp_wmb();
1da177e4
LT
1034 list_add_tail(&ps->list, &dev->filelist);
1035 file->private_data = ps;
62e299e6 1036 usb_unlock_device(dev);
2da41d5f
AS
1037 snoop(&dev->dev, "opened by process %d: %s\n", task_pid_nr(current),
1038 current->comm);
62e299e6
AS
1039 return ret;
1040
1041 out_unlock_device:
1042 usb_unlock_device(dev);
1043 usb_put_dev(dev);
1044 out_free_ps:
1045 kfree(ps);
4a2a8a2c 1046 return ret;
1da177e4
LT
1047}
1048
1049static int usbdev_release(struct inode *inode, struct file *file)
1050{
9b6f0c4b 1051 struct usb_dev_state *ps = file->private_data;
1da177e4
LT
1052 struct usb_device *dev = ps->dev;
1053 unsigned int ifnum;
6ff10464 1054 struct async *as;
1da177e4
LT
1055
1056 usb_lock_device(dev);
7cbe5dca 1057 usb_hub_release_all_ports(dev, ps);
4a2a8a2c 1058
1da177e4 1059 list_del_init(&ps->list);
4a2a8a2c 1060
1da177e4
LT
1061 for (ifnum = 0; ps->ifclaimed && ifnum < 8*sizeof(ps->ifclaimed);
1062 ifnum++) {
1063 if (test_bit(ifnum, &ps->ifclaimed))
1064 releaseintf(ps, ifnum);
1065 }
1066 destroy_all_async(ps);
94fcda1f 1067 usb_autosuspend_device(dev);
1da177e4
LT
1068 usb_unlock_device(dev);
1069 usb_put_dev(dev);
2425c08b 1070 put_pid(ps->disc_pid);
d178bc3a 1071 put_cred(ps->cred);
6ff10464
AS
1072
1073 as = async_getcompleted(ps);
1074 while (as) {
1075 free_async(as);
1076 as = async_getcompleted(ps);
1077 }
f7d34b44 1078
1da177e4 1079 kfree(ps);
4a2a8a2c 1080 return 0;
1da177e4
LT
1081}
1082
9b6f0c4b 1083static int proc_control(struct usb_dev_state *ps, void __user *arg)
1da177e4
LT
1084{
1085 struct usb_device *dev = ps->dev;
1086 struct usbdevfs_ctrltransfer ctrl;
1087 unsigned int tmo;
1088 unsigned char *tbuf;
ff66e3ce 1089 unsigned wLength;
4c6e8971 1090 int i, pipe, ret;
1da177e4
LT
1091
1092 if (copy_from_user(&ctrl, arg, sizeof(ctrl)))
1093 return -EFAULT;
393cbb51
MD
1094 ret = check_ctrlrecip(ps, ctrl.bRequestType, ctrl.bRequest,
1095 ctrl.wIndex);
04e482ff 1096 if (ret)
1da177e4 1097 return ret;
ff66e3ce
AM
1098 wLength = ctrl.wLength; /* To suppress 64k PAGE_SIZE warning */
1099 if (wLength > PAGE_SIZE)
1da177e4 1100 return -EINVAL;
add1aaea
AS
1101 ret = usbfs_increase_memory_usage(PAGE_SIZE + sizeof(struct urb) +
1102 sizeof(struct usb_ctrlrequest));
1103 if (ret)
1104 return ret;
04e482ff 1105 tbuf = (unsigned char *)__get_free_page(GFP_KERNEL);
add1aaea
AS
1106 if (!tbuf) {
1107 ret = -ENOMEM;
1108 goto done;
1109 }
1da177e4 1110 tmo = ctrl.timeout;
0880aef4
CF
1111 snoop(&dev->dev, "control urb: bRequestType=%02x "
1112 "bRequest=%02x wValue=%04x "
1113 "wIndex=%04x wLength=%04x\n",
c8f2efc8
XR
1114 ctrl.bRequestType, ctrl.bRequest, ctrl.wValue,
1115 ctrl.wIndex, ctrl.wLength);
1da177e4 1116 if (ctrl.bRequestType & 0x80) {
04e482ff
GKH
1117 if (ctrl.wLength && !access_ok(VERIFY_WRITE, ctrl.data,
1118 ctrl.wLength)) {
52fb743d
AS
1119 ret = -EINVAL;
1120 goto done;
1da177e4 1121 }
4c6e8971 1122 pipe = usb_rcvctrlpipe(dev, 0);
0880aef4 1123 snoop_urb(dev, NULL, pipe, ctrl.wLength, tmo, SUBMIT, NULL, 0);
1da177e4
LT
1124
1125 usb_unlock_device(dev);
4c6e8971 1126 i = usb_control_msg(dev, pipe, ctrl.bRequest,
04e482ff
GKH
1127 ctrl.bRequestType, ctrl.wValue, ctrl.wIndex,
1128 tbuf, ctrl.wLength, tmo);
1da177e4 1129 usb_lock_device(dev);
0880aef4 1130 snoop_urb(dev, NULL, pipe, max(i, 0), min(i, 0), COMPLETE,
9d02b426 1131 tbuf, max(i, 0));
1da177e4 1132 if ((i > 0) && ctrl.wLength) {
fe0410c7 1133 if (copy_to_user(ctrl.data, tbuf, i)) {
52fb743d
AS
1134 ret = -EFAULT;
1135 goto done;
1da177e4
LT
1136 }
1137 }
1138 } else {
1139 if (ctrl.wLength) {
1140 if (copy_from_user(tbuf, ctrl.data, ctrl.wLength)) {
52fb743d
AS
1141 ret = -EFAULT;
1142 goto done;
1da177e4
LT
1143 }
1144 }
4c6e8971 1145 pipe = usb_sndctrlpipe(dev, 0);
0880aef4
CF
1146 snoop_urb(dev, NULL, pipe, ctrl.wLength, tmo, SUBMIT,
1147 tbuf, ctrl.wLength);
4c6e8971 1148
1da177e4 1149 usb_unlock_device(dev);
04e482ff
GKH
1150 i = usb_control_msg(dev, usb_sndctrlpipe(dev, 0), ctrl.bRequest,
1151 ctrl.bRequestType, ctrl.wValue, ctrl.wIndex,
1152 tbuf, ctrl.wLength, tmo);
1da177e4 1153 usb_lock_device(dev);
0880aef4 1154 snoop_urb(dev, NULL, pipe, max(i, 0), min(i, 0), COMPLETE, NULL, 0);
1da177e4 1155 }
04e482ff 1156 if (i < 0 && i != -EPIPE) {
1da177e4
LT
1157 dev_printk(KERN_DEBUG, &dev->dev, "usbfs: USBDEVFS_CONTROL "
1158 "failed cmd %s rqt %u rq %u len %u ret %d\n",
1159 current->comm, ctrl.bRequestType, ctrl.bRequest,
1160 ctrl.wLength, i);
1161 }
52fb743d
AS
1162 ret = i;
1163 done:
1164 free_page((unsigned long) tbuf);
add1aaea
AS
1165 usbfs_decrease_memory_usage(PAGE_SIZE + sizeof(struct urb) +
1166 sizeof(struct usb_ctrlrequest));
52fb743d 1167 return ret;
1da177e4
LT
1168}
1169
9b6f0c4b 1170static int proc_bulk(struct usb_dev_state *ps, void __user *arg)
1da177e4
LT
1171{
1172 struct usb_device *dev = ps->dev;
1173 struct usbdevfs_bulktransfer bulk;
1174 unsigned int tmo, len1, pipe;
1175 int len2;
1176 unsigned char *tbuf;
4c6e8971 1177 int i, ret;
1da177e4
LT
1178
1179 if (copy_from_user(&bulk, arg, sizeof(bulk)))
1180 return -EFAULT;
04e482ff
GKH
1181 ret = findintfep(ps->dev, bulk.ep);
1182 if (ret < 0)
1da177e4 1183 return ret;
04e482ff
GKH
1184 ret = checkintf(ps, ret);
1185 if (ret)
1da177e4
LT
1186 return ret;
1187 if (bulk.ep & USB_DIR_IN)
1188 pipe = usb_rcvbulkpipe(dev, bulk.ep & 0x7f);
1189 else
1190 pipe = usb_sndbulkpipe(dev, bulk.ep & 0x7f);
1191 if (!usb_maxpacket(dev, pipe, !(bulk.ep & USB_DIR_IN)))
1192 return -EINVAL;
1193 len1 = bulk.len;
3f5eb8d5 1194 if (len1 >= USBFS_XFER_MAX)
1da177e4 1195 return -EINVAL;
add1aaea
AS
1196 ret = usbfs_increase_memory_usage(len1 + sizeof(struct urb));
1197 if (ret)
1198 return ret;
135551ea
KB
1199 tbuf = kmalloc(len1, GFP_KERNEL);
1200 if (!tbuf) {
add1aaea
AS
1201 ret = -ENOMEM;
1202 goto done;
1203 }
1da177e4
LT
1204 tmo = bulk.timeout;
1205 if (bulk.ep & 0x80) {
1206 if (len1 && !access_ok(VERIFY_WRITE, bulk.data, len1)) {
52fb743d
AS
1207 ret = -EINVAL;
1208 goto done;
1da177e4 1209 }
0880aef4 1210 snoop_urb(dev, NULL, pipe, len1, tmo, SUBMIT, NULL, 0);
4c6e8971 1211
1da177e4
LT
1212 usb_unlock_device(dev);
1213 i = usb_bulk_msg(dev, pipe, tbuf, len1, &len2, tmo);
1214 usb_lock_device(dev);
0880aef4 1215 snoop_urb(dev, NULL, pipe, len2, i, COMPLETE, tbuf, len2);
4c6e8971 1216
1da177e4
LT
1217 if (!i && len2) {
1218 if (copy_to_user(bulk.data, tbuf, len2)) {
52fb743d
AS
1219 ret = -EFAULT;
1220 goto done;
1da177e4
LT
1221 }
1222 }
1223 } else {
1224 if (len1) {
1225 if (copy_from_user(tbuf, bulk.data, len1)) {
52fb743d
AS
1226 ret = -EFAULT;
1227 goto done;
1da177e4
LT
1228 }
1229 }
0880aef4 1230 snoop_urb(dev, NULL, pipe, len1, tmo, SUBMIT, tbuf, len1);
4c6e8971 1231
1da177e4
LT
1232 usb_unlock_device(dev);
1233 i = usb_bulk_msg(dev, pipe, tbuf, len1, &len2, tmo);
1234 usb_lock_device(dev);
0880aef4 1235 snoop_urb(dev, NULL, pipe, len2, i, COMPLETE, NULL, 0);
1da177e4 1236 }
52fb743d
AS
1237 ret = (i < 0 ? i : len2);
1238 done:
1da177e4 1239 kfree(tbuf);
add1aaea 1240 usbfs_decrease_memory_usage(len1 + sizeof(struct urb));
52fb743d 1241 return ret;
1da177e4
LT
1242}
1243
f080a51b
AS
1244static void check_reset_of_active_ep(struct usb_device *udev,
1245 unsigned int epnum, char *ioctl_name)
1246{
1247 struct usb_host_endpoint **eps;
1248 struct usb_host_endpoint *ep;
1249
1250 eps = (epnum & USB_DIR_IN) ? udev->ep_in : udev->ep_out;
1251 ep = eps[epnum & 0x0f];
1252 if (ep && !list_empty(&ep->urb_list))
1253 dev_warn(&udev->dev, "Process %d (%s) called USBDEVFS_%s for active endpoint 0x%02x\n",
1254 task_pid_nr(current), current->comm,
1255 ioctl_name, epnum);
1256}
1257
9b6f0c4b 1258static int proc_resetep(struct usb_dev_state *ps, void __user *arg)
1da177e4
LT
1259{
1260 unsigned int ep;
1261 int ret;
1262
1263 if (get_user(ep, (unsigned int __user *)arg))
1264 return -EFAULT;
04e482ff
GKH
1265 ret = findintfep(ps->dev, ep);
1266 if (ret < 0)
1da177e4 1267 return ret;
04e482ff
GKH
1268 ret = checkintf(ps, ret);
1269 if (ret)
1da177e4 1270 return ret;
f080a51b 1271 check_reset_of_active_ep(ps->dev, ep, "RESETEP");
3444b26a 1272 usb_reset_endpoint(ps->dev, ep);
1da177e4
LT
1273 return 0;
1274}
1275
9b6f0c4b 1276static int proc_clearhalt(struct usb_dev_state *ps, void __user *arg)
1da177e4
LT
1277{
1278 unsigned int ep;
1279 int pipe;
1280 int ret;
1281
1282 if (get_user(ep, (unsigned int __user *)arg))
1283 return -EFAULT;
04e482ff
GKH
1284 ret = findintfep(ps->dev, ep);
1285 if (ret < 0)
1da177e4 1286 return ret;
04e482ff
GKH
1287 ret = checkintf(ps, ret);
1288 if (ret)
1da177e4 1289 return ret;
f080a51b 1290 check_reset_of_active_ep(ps->dev, ep, "CLEAR_HALT");
1da177e4 1291 if (ep & USB_DIR_IN)
04e482ff
GKH
1292 pipe = usb_rcvbulkpipe(ps->dev, ep & 0x7f);
1293 else
1294 pipe = usb_sndbulkpipe(ps->dev, ep & 0x7f);
1da177e4
LT
1295
1296 return usb_clear_halt(ps->dev, pipe);
1297}
1da177e4 1298
9b6f0c4b 1299static int proc_getdriver(struct usb_dev_state *ps, void __user *arg)
1da177e4
LT
1300{
1301 struct usbdevfs_getdriver gd;
1302 struct usb_interface *intf;
1303 int ret;
1304
1305 if (copy_from_user(&gd, arg, sizeof(gd)))
1306 return -EFAULT;
1da177e4
LT
1307 intf = usb_ifnum_to_if(ps->dev, gd.interface);
1308 if (!intf || !intf->dev.driver)
1309 ret = -ENODATA;
1310 else {
b11b2e1b 1311 strlcpy(gd.driver, intf->dev.driver->name,
1da177e4
LT
1312 sizeof(gd.driver));
1313 ret = (copy_to_user(arg, &gd, sizeof(gd)) ? -EFAULT : 0);
1314 }
1da177e4
LT
1315 return ret;
1316}
1317
9b6f0c4b 1318static int proc_connectinfo(struct usb_dev_state *ps, void __user *arg)
1da177e4 1319{
681fef83
KL
1320 struct usbdevfs_connectinfo ci;
1321
1322 memset(&ci, 0, sizeof(ci));
1323 ci.devnum = ps->dev->devnum;
1324 ci.slow = ps->dev->speed == USB_SPEED_LOW;
1da177e4 1325
1da177e4
LT
1326 if (copy_to_user(arg, &ci, sizeof(ci)))
1327 return -EFAULT;
1328 return 0;
1329}
1330
9b6f0c4b 1331static int proc_resetdevice(struct usb_dev_state *ps)
1da177e4 1332{
d883f52e
RG
1333 struct usb_host_config *actconfig = ps->dev->actconfig;
1334 struct usb_interface *interface;
1335 int i, number;
1336
1337 /* Don't allow a device reset if the process has dropped the
1338 * privilege to do such things and any of the interfaces are
1339 * currently claimed.
1340 */
1341 if (ps->privileges_dropped && actconfig) {
1342 for (i = 0; i < actconfig->desc.bNumInterfaces; ++i) {
1343 interface = actconfig->interface[i];
1344 number = interface->cur_altsetting->desc.bInterfaceNumber;
1345 if (usb_interface_claimed(interface) &&
1346 !test_bit(number, &ps->ifclaimed)) {
1347 dev_warn(&ps->dev->dev,
1348 "usbfs: interface %d claimed by %s while '%s' resets device\n",
1349 number, interface->dev.driver->name, current->comm);
1350 return -EACCES;
1351 }
1352 }
1353 }
1354
742120c6 1355 return usb_reset_device(ps->dev);
1da177e4
LT
1356}
1357
9b6f0c4b 1358static int proc_setintf(struct usb_dev_state *ps, void __user *arg)
1da177e4
LT
1359{
1360 struct usbdevfs_setinterface setintf;
1361 int ret;
1362
1363 if (copy_from_user(&setintf, arg, sizeof(setintf)))
1364 return -EFAULT;
135551ea
KB
1365 ret = checkintf(ps, setintf.interface);
1366 if (ret)
1da177e4 1367 return ret;
5ec9c177
HG
1368
1369 destroy_async_on_interface(ps, setintf.interface);
1370
1da177e4
LT
1371 return usb_set_interface(ps->dev, setintf.interface,
1372 setintf.altsetting);
1373}
1374
9b6f0c4b 1375static int proc_setconfig(struct usb_dev_state *ps, void __user *arg)
1da177e4 1376{
3f141e2a 1377 int u;
1da177e4 1378 int status = 0;
04e482ff 1379 struct usb_host_config *actconfig;
1da177e4 1380
3f141e2a 1381 if (get_user(u, (int __user *)arg))
1da177e4
LT
1382 return -EFAULT;
1383
04e482ff
GKH
1384 actconfig = ps->dev->actconfig;
1385
1386 /* Don't touch the device if any interfaces are claimed.
1387 * It could interfere with other drivers' operations, and if
1da177e4
LT
1388 * an interface is claimed by usbfs it could easily deadlock.
1389 */
04e482ff
GKH
1390 if (actconfig) {
1391 int i;
1392
1393 for (i = 0; i < actconfig->desc.bNumInterfaces; ++i) {
1394 if (usb_interface_claimed(actconfig->interface[i])) {
1395 dev_warn(&ps->dev->dev,
72ebddb5 1396 "usbfs: interface %d claimed by %s "
1da177e4
LT
1397 "while '%s' sets config #%d\n",
1398 actconfig->interface[i]
1399 ->cur_altsetting
1400 ->desc.bInterfaceNumber,
72ebddb5
DB
1401 actconfig->interface[i]
1402 ->dev.driver->name,
1da177e4 1403 current->comm, u);
04e482ff 1404 status = -EBUSY;
1da177e4 1405 break;
1da177e4 1406 }
04e482ff
GKH
1407 }
1408 }
1da177e4
LT
1409
1410 /* SET_CONFIGURATION is often abused as a "cheap" driver reset,
1411 * so avoid usb_set_configuration()'s kick to sysfs
1412 */
1413 if (status == 0) {
1414 if (actconfig && actconfig->desc.bConfigurationValue == u)
1415 status = usb_reset_configuration(ps->dev);
1416 else
1417 status = usb_set_configuration(ps->dev, u);
1418 }
1419
1420 return status;
1421}
1422
f7d34b44
SG
1423static struct usb_memory *
1424find_memory_area(struct usb_dev_state *ps, const struct usbdevfs_urb *uurb)
1425{
1426 struct usb_memory *usbm = NULL, *iter;
1427 unsigned long flags;
1428 unsigned long uurb_start = (unsigned long)uurb->buffer;
1429
1430 spin_lock_irqsave(&ps->lock, flags);
1431 list_for_each_entry(iter, &ps->memory_list, memlist) {
1432 if (uurb_start >= iter->vm_start &&
1433 uurb_start < iter->vm_start + iter->size) {
1434 if (uurb->buffer_length > iter->vm_start + iter->size -
1435 uurb_start) {
1436 usbm = ERR_PTR(-EINVAL);
1437 } else {
1438 usbm = iter;
1439 usbm->urb_use_count++;
1440 }
1441 break;
1442 }
1443 }
1444 spin_unlock_irqrestore(&ps->lock, flags);
1445 return usbm;
1446}
1447
9b6f0c4b 1448static int proc_do_submiturb(struct usb_dev_state *ps, struct usbdevfs_urb *uurb,
04e482ff
GKH
1449 struct usbdevfs_iso_packet_desc __user *iso_frame_desc,
1450 void __user *arg)
1da177e4
LT
1451{
1452 struct usbdevfs_iso_packet_desc *isopkt = NULL;
1453 struct usb_host_endpoint *ep;
52fb743d 1454 struct async *as = NULL;
1da177e4
LT
1455 struct usb_ctrlrequest *dr = NULL;
1456 unsigned int u, totlen, isofrmlen;
3d97ff63 1457 int i, ret, is_in, num_sgs = 0, ifnum = -1;
b2d03eb5 1458 int number_of_packets = 0;
948cd8c1 1459 unsigned int stream_id = 0;
3d97ff63 1460 void *buf;
1da177e4 1461
14722ef4
AS
1462 if (uurb->flags & ~(USBDEVFS_URB_ISO_ASAP |
1463 USBDEVFS_URB_SHORT_NOT_OK |
01c6460f 1464 USBDEVFS_URB_BULK_CONTINUATION |
14722ef4
AS
1465 USBDEVFS_URB_NO_FSBR |
1466 USBDEVFS_URB_ZERO_PACKET |
1467 USBDEVFS_URB_NO_INTERRUPT))
1da177e4 1468 return -EINVAL;
9180135b 1469 if (uurb->buffer_length > 0 && !uurb->buffer)
1da177e4 1470 return -EINVAL;
04e482ff
GKH
1471 if (!(uurb->type == USBDEVFS_URB_TYPE_CONTROL &&
1472 (uurb->endpoint & ~USB_ENDPOINT_DIR_MASK) == 0)) {
1473 ifnum = findintfep(ps->dev, uurb->endpoint);
1474 if (ifnum < 0)
1da177e4 1475 return ifnum;
04e482ff
GKH
1476 ret = checkintf(ps, ifnum);
1477 if (ret)
1da177e4
LT
1478 return ret;
1479 }
2fec32b0 1480 ep = ep_to_host_endpoint(ps->dev, uurb->endpoint);
1da177e4
LT
1481 if (!ep)
1482 return -ENOENT;
2fec32b0 1483 is_in = (uurb->endpoint & USB_ENDPOINT_DIR_MASK) != 0;
add1aaea
AS
1484
1485 u = 0;
f355e830 1486 switch (uurb->type) {
1da177e4 1487 case USBDEVFS_URB_TYPE_CONTROL:
93cf9b90 1488 if (!usb_endpoint_xfer_control(&ep->desc))
1da177e4 1489 return -EINVAL;
add1aaea
AS
1490 /* min 8 byte setup packet */
1491 if (uurb->buffer_length < 8)
1da177e4 1492 return -EINVAL;
04e482ff
GKH
1493 dr = kmalloc(sizeof(struct usb_ctrlrequest), GFP_KERNEL);
1494 if (!dr)
1da177e4
LT
1495 return -ENOMEM;
1496 if (copy_from_user(dr, uurb->buffer, 8)) {
52fb743d
AS
1497 ret = -EFAULT;
1498 goto error;
1da177e4
LT
1499 }
1500 if (uurb->buffer_length < (le16_to_cpup(&dr->wLength) + 8)) {
52fb743d
AS
1501 ret = -EINVAL;
1502 goto error;
1da177e4 1503 }
393cbb51 1504 ret = check_ctrlrecip(ps, dr->bRequestType, dr->bRequest,
04e482ff 1505 le16_to_cpup(&dr->wIndex));
52fb743d
AS
1506 if (ret)
1507 goto error;
1da177e4
LT
1508 uurb->buffer_length = le16_to_cpup(&dr->wLength);
1509 uurb->buffer += 8;
93cf9b90
AS
1510 if ((dr->bRequestType & USB_DIR_IN) && uurb->buffer_length) {
1511 is_in = 1;
1512 uurb->endpoint |= USB_DIR_IN;
1513 } else {
1514 is_in = 0;
1515 uurb->endpoint &= ~USB_DIR_IN;
1516 }
0880aef4
CF
1517 snoop(&ps->dev->dev, "control urb: bRequestType=%02x "
1518 "bRequest=%02x wValue=%04x "
1519 "wIndex=%04x wLength=%04x\n",
1520 dr->bRequestType, dr->bRequest,
1521 __le16_to_cpup(&dr->wValue),
1522 __le16_to_cpup(&dr->wIndex),
1523 __le16_to_cpup(&dr->wLength));
add1aaea 1524 u = sizeof(struct usb_ctrlrequest);
1da177e4
LT
1525 break;
1526
1527 case USBDEVFS_URB_TYPE_BULK:
93cf9b90 1528 switch (usb_endpoint_type(&ep->desc)) {
1da177e4
LT
1529 case USB_ENDPOINT_XFER_CONTROL:
1530 case USB_ENDPOINT_XFER_ISOC:
1531 return -EINVAL;
f661c6f8
AS
1532 case USB_ENDPOINT_XFER_INT:
1533 /* allow single-shot interrupt transfers */
1534 uurb->type = USBDEVFS_URB_TYPE_INTERRUPT;
1535 goto interrupt_urb;
1da177e4 1536 }
3d97ff63
HG
1537 num_sgs = DIV_ROUND_UP(uurb->buffer_length, USB_SG_SIZE);
1538 if (num_sgs == 1 || num_sgs > ps->dev->bus->sg_tablesize)
1539 num_sgs = 0;
948cd8c1
HG
1540 if (ep->streams)
1541 stream_id = uurb->stream_id;
1da177e4
LT
1542 break;
1543
f661c6f8
AS
1544 case USBDEVFS_URB_TYPE_INTERRUPT:
1545 if (!usb_endpoint_xfer_int(&ep->desc))
1546 return -EINVAL;
1547 interrupt_urb:
f661c6f8
AS
1548 break;
1549
1da177e4
LT
1550 case USBDEVFS_URB_TYPE_ISO:
1551 /* arbitrary limit */
04e482ff
GKH
1552 if (uurb->number_of_packets < 1 ||
1553 uurb->number_of_packets > 128)
1da177e4 1554 return -EINVAL;
93cf9b90 1555 if (!usb_endpoint_xfer_isoc(&ep->desc))
1da177e4 1556 return -EINVAL;
b2d03eb5 1557 number_of_packets = uurb->number_of_packets;
04e482ff 1558 isofrmlen = sizeof(struct usbdevfs_iso_packet_desc) *
b2d03eb5 1559 number_of_packets;
73a02d32
RP
1560 isopkt = memdup_user(iso_frame_desc, isofrmlen);
1561 if (IS_ERR(isopkt)) {
1562 ret = PTR_ERR(isopkt);
1563 isopkt = NULL;
52fb743d 1564 goto error;
1da177e4 1565 }
b2d03eb5 1566 for (totlen = u = 0; u < number_of_packets; u++) {
e2e2f0ea
FM
1567 /*
1568 * arbitrary limit need for USB 3.0
1569 * bMaxBurst (0~15 allowed, 1~16 packets)
1570 * bmAttributes (bit 1:0, mult 0~2, 1~3 packets)
1571 * sizemax: 1024 * 16 * 3 = 49152
1572 */
1573 if (isopkt[u].length > 49152) {
52fb743d
AS
1574 ret = -EINVAL;
1575 goto error;
1da177e4
LT
1576 }
1577 totlen += isopkt[u].length;
1578 }
add1aaea 1579 u *= sizeof(struct usb_iso_packet_descriptor);
1da177e4
LT
1580 uurb->buffer_length = totlen;
1581 break;
1582
1da177e4
LT
1583 default:
1584 return -EINVAL;
1585 }
add1aaea 1586
3f5eb8d5 1587 if (uurb->buffer_length >= USBFS_XFER_MAX) {
add1aaea
AS
1588 ret = -EINVAL;
1589 goto error;
1590 }
9180135b
AS
1591 if (uurb->buffer_length > 0 &&
1592 !access_ok(is_in ? VERIFY_WRITE : VERIFY_READ,
1593 uurb->buffer, uurb->buffer_length)) {
52fb743d
AS
1594 ret = -EFAULT;
1595 goto error;
1da177e4 1596 }
b2d03eb5 1597 as = alloc_async(number_of_packets);
9180135b 1598 if (!as) {
52fb743d
AS
1599 ret = -ENOMEM;
1600 goto error;
1da177e4 1601 }
3d97ff63 1602
f7d34b44
SG
1603 as->usbm = find_memory_area(ps, uurb);
1604 if (IS_ERR(as->usbm)) {
1605 ret = PTR_ERR(as->usbm);
1606 as->usbm = NULL;
1607 goto error;
1608 }
1609
1610 /* do not use SG buffers when memory mapped segments
1611 * are in use
1612 */
1613 if (as->usbm)
1614 num_sgs = 0;
1615
3d97ff63
HG
1616 u += sizeof(struct async) + sizeof(struct urb) + uurb->buffer_length +
1617 num_sgs * sizeof(struct scatterlist);
add1aaea
AS
1618 ret = usbfs_increase_memory_usage(u);
1619 if (ret)
1620 goto error;
1621 as->mem_usage = u;
1622
3d97ff63
HG
1623 if (num_sgs) {
1624 as->urb->sg = kmalloc(num_sgs * sizeof(struct scatterlist),
1625 GFP_KERNEL);
1626 if (!as->urb->sg) {
1627 ret = -ENOMEM;
1628 goto error;
1629 }
1630 as->urb->num_sgs = num_sgs;
1631 sg_init_table(as->urb->sg, as->urb->num_sgs);
1632
1633 totlen = uurb->buffer_length;
1634 for (i = 0; i < as->urb->num_sgs; i++) {
1635 u = (totlen > USB_SG_SIZE) ? USB_SG_SIZE : totlen;
1636 buf = kmalloc(u, GFP_KERNEL);
1637 if (!buf) {
1638 ret = -ENOMEM;
1639 goto error;
1640 }
1641 sg_set_buf(&as->urb->sg[i], buf, u);
1642
1643 if (!is_in) {
1644 if (copy_from_user(buf, uurb->buffer, u)) {
1645 ret = -EFAULT;
1646 goto error;
1647 }
01463900 1648 uurb->buffer += u;
3d97ff63
HG
1649 }
1650 totlen -= u;
1651 }
1652 } else if (uurb->buffer_length > 0) {
f7d34b44
SG
1653 if (as->usbm) {
1654 unsigned long uurb_start = (unsigned long)uurb->buffer;
3d97ff63 1655
f7d34b44
SG
1656 as->urb->transfer_buffer = as->usbm->mem +
1657 (uurb_start - as->usbm->vm_start);
1658 } else {
1659 as->urb->transfer_buffer = kmalloc(uurb->buffer_length,
1660 GFP_KERNEL);
1661 if (!as->urb->transfer_buffer) {
1662 ret = -ENOMEM;
3d97ff63
HG
1663 goto error;
1664 }
f7d34b44
SG
1665 if (!is_in) {
1666 if (copy_from_user(as->urb->transfer_buffer,
1667 uurb->buffer,
1668 uurb->buffer_length)) {
1669 ret = -EFAULT;
1670 goto error;
1671 }
1672 } else if (uurb->type == USBDEVFS_URB_TYPE_ISO) {
1673 /*
1674 * Isochronous input data may end up being
1675 * discontiguous if some of the packets are
1676 * short. Clear the buffer so that the gaps
1677 * don't leak kernel data to userspace.
1678 */
1679 memset(as->urb->transfer_buffer, 0,
1680 uurb->buffer_length);
1681 }
3d97ff63 1682 }
9180135b 1683 }
04e482ff
GKH
1684 as->urb->dev = ps->dev;
1685 as->urb->pipe = (uurb->type << 30) |
93cf9b90
AS
1686 __create_pipe(ps->dev, uurb->endpoint & 0xf) |
1687 (uurb->endpoint & USB_DIR_IN);
14722ef4
AS
1688
1689 /* This tedious sequence is necessary because the URB_* flags
1690 * are internal to the kernel and subject to change, whereas
1691 * the USBDEVFS_URB_* flags are a user API and must not be changed.
1692 */
1693 u = (is_in ? URB_DIR_IN : URB_DIR_OUT);
1694 if (uurb->flags & USBDEVFS_URB_ISO_ASAP)
1695 u |= URB_ISO_ASAP;
d310d05f 1696 if (uurb->flags & USBDEVFS_URB_SHORT_NOT_OK && is_in)
14722ef4
AS
1697 u |= URB_SHORT_NOT_OK;
1698 if (uurb->flags & USBDEVFS_URB_NO_FSBR)
1699 u |= URB_NO_FSBR;
1700 if (uurb->flags & USBDEVFS_URB_ZERO_PACKET)
1701 u |= URB_ZERO_PACKET;
1702 if (uurb->flags & USBDEVFS_URB_NO_INTERRUPT)
1703 u |= URB_NO_INTERRUPT;
1704 as->urb->transfer_flags = u;
1705
1da177e4 1706 as->urb->transfer_buffer_length = uurb->buffer_length;
04e482ff 1707 as->urb->setup_packet = (unsigned char *)dr;
52fb743d 1708 dr = NULL;
1da177e4 1709 as->urb->start_frame = uurb->start_frame;
b2d03eb5 1710 as->urb->number_of_packets = number_of_packets;
948cd8c1 1711 as->urb->stream_id = stream_id;
53e5f36f
AS
1712
1713 if (ep->desc.bInterval) {
1714 if (uurb->type == USBDEVFS_URB_TYPE_ISO ||
1715 ps->dev->speed == USB_SPEED_HIGH ||
1716 ps->dev->speed >= USB_SPEED_SUPER)
1717 as->urb->interval = 1 <<
1718 min(15, ep->desc.bInterval - 1);
1719 else
1720 as->urb->interval = ep->desc.bInterval;
1721 }
1722
04e482ff
GKH
1723 as->urb->context = as;
1724 as->urb->complete = async_completed;
b2d03eb5 1725 for (totlen = u = 0; u < number_of_packets; u++) {
1da177e4
LT
1726 as->urb->iso_frame_desc[u].offset = totlen;
1727 as->urb->iso_frame_desc[u].length = isopkt[u].length;
1728 totlen += isopkt[u].length;
1729 }
6fd19f4b 1730 kfree(isopkt);
52fb743d 1731 isopkt = NULL;
1da177e4 1732 as->ps = ps;
04e482ff 1733 as->userurb = arg;
f7d34b44
SG
1734 if (as->usbm) {
1735 unsigned long uurb_start = (unsigned long)uurb->buffer;
1736
1737 as->urb->transfer_flags |= URB_NO_TRANSFER_DMA_MAP;
1738 as->urb->transfer_dma = as->usbm->dma_handle +
1739 (uurb_start - as->usbm->vm_start);
1740 } else if (is_in && uurb->buffer_length > 0)
1da177e4 1741 as->userbuffer = uurb->buffer;
1da177e4
LT
1742 as->signr = uurb->signr;
1743 as->ifnum = ifnum;
2425c08b 1744 as->pid = get_pid(task_pid(current));
d178bc3a 1745 as->cred = get_current_cred();
7a01955f 1746 security_task_getsecid(current, &as->secid);
4c6e8971 1747 snoop_urb(ps->dev, as->userurb, as->urb->pipe,
0880aef4 1748 as->urb->transfer_buffer_length, 0, SUBMIT,
3d97ff63
HG
1749 NULL, 0);
1750 if (!is_in)
1751 snoop_urb_data(as->urb, as->urb->transfer_buffer_length);
1752
04e482ff 1753 async_newpending(as);
01c6460f
AS
1754
1755 if (usb_endpoint_xfer_bulk(&ep->desc)) {
1756 spin_lock_irq(&ps->lock);
1757
1758 /* Not exactly the endpoint address; the direction bit is
1759 * shifted to the 0x10 position so that the value will be
1760 * between 0 and 31.
1761 */
1762 as->bulk_addr = usb_endpoint_num(&ep->desc) |
1763 ((ep->desc.bEndpointAddress & USB_ENDPOINT_DIR_MASK)
1764 >> 3);
1765
1766 /* If this bulk URB is the start of a new transfer, re-enable
1767 * the endpoint. Otherwise mark it as a continuation URB.
1768 */
1769 if (uurb->flags & USBDEVFS_URB_BULK_CONTINUATION)
1770 as->bulk_status = AS_CONTINUATION;
1771 else
1772 ps->disabled_bulk_eps &= ~(1 << as->bulk_addr);
1773
1774 /* Don't accept continuation URBs if the endpoint is
1775 * disabled because of an earlier error.
1776 */
1777 if (ps->disabled_bulk_eps & (1 << as->bulk_addr))
1778 ret = -EREMOTEIO;
1779 else
1780 ret = usb_submit_urb(as->urb, GFP_ATOMIC);
1781 spin_unlock_irq(&ps->lock);
1782 } else {
1783 ret = usb_submit_urb(as->urb, GFP_KERNEL);
1784 }
1785
1786 if (ret) {
04e482ff
GKH
1787 dev_printk(KERN_DEBUG, &ps->dev->dev,
1788 "usbfs: usb_submit_urb returned %d\n", ret);
4c6e8971 1789 snoop_urb(ps->dev, as->userurb, as->urb->pipe,
0880aef4 1790 0, ret, COMPLETE, NULL, 0);
04e482ff 1791 async_removepending(as);
52fb743d 1792 goto error;
04e482ff
GKH
1793 }
1794 return 0;
52fb743d
AS
1795
1796 error:
f7d34b44
SG
1797 if (as && as->usbm)
1798 dec_usb_memory_use_count(as->usbm, &as->usbm->urb_use_count);
52fb743d
AS
1799 kfree(isopkt);
1800 kfree(dr);
1801 if (as)
1802 free_async(as);
1803 return ret;
1da177e4
LT
1804}
1805
9b6f0c4b 1806static int proc_submiturb(struct usb_dev_state *ps, void __user *arg)
1da177e4
LT
1807{
1808 struct usbdevfs_urb uurb;
1809
1810 if (copy_from_user(&uurb, arg, sizeof(uurb)))
1811 return -EFAULT;
1812
04e482ff
GKH
1813 return proc_do_submiturb(ps, &uurb,
1814 (((struct usbdevfs_urb __user *)arg)->iso_frame_desc),
1815 arg);
1da177e4
LT
1816}
1817
9b6f0c4b 1818static int proc_unlinkurb(struct usb_dev_state *ps, void __user *arg)
1da177e4 1819{
4e09dcf2 1820 struct urb *urb;
1da177e4 1821 struct async *as;
4e09dcf2 1822 unsigned long flags;
1da177e4 1823
4e09dcf2 1824 spin_lock_irqsave(&ps->lock, flags);
1da177e4 1825 as = async_getpending(ps, arg);
4e09dcf2
HL
1826 if (!as) {
1827 spin_unlock_irqrestore(&ps->lock, flags);
1da177e4 1828 return -EINVAL;
4e09dcf2
HL
1829 }
1830
1831 urb = as->urb;
1832 usb_get_urb(urb);
1833 spin_unlock_irqrestore(&ps->lock, flags);
1834
1835 usb_kill_urb(urb);
1836 usb_put_urb(urb);
1837
1da177e4
LT
1838 return 0;
1839}
1840
1841static int processcompl(struct async *as, void __user * __user *arg)
1842{
1843 struct urb *urb = as->urb;
1844 struct usbdevfs_urb __user *userurb = as->userurb;
1845 void __user *addr = as->userurb;
1846 unsigned int i;
1847
7152b592 1848 if (as->userbuffer && urb->actual_length) {
3d97ff63 1849 if (copy_urb_data_to_user(as->userbuffer, urb))
d794a021 1850 goto err_out;
7152b592 1851 }
e015268d 1852 if (put_user(as->status, &userurb->status))
d794a021 1853 goto err_out;
1da177e4 1854 if (put_user(urb->actual_length, &userurb->actual_length))
d794a021 1855 goto err_out;
1da177e4 1856 if (put_user(urb->error_count, &userurb->error_count))
d794a021 1857 goto err_out;
1da177e4 1858
93cf9b90 1859 if (usb_endpoint_xfer_isoc(&urb->ep->desc)) {
668a9541
CL
1860 for (i = 0; i < urb->number_of_packets; i++) {
1861 if (put_user(urb->iso_frame_desc[i].actual_length,
1862 &userurb->iso_frame_desc[i].actual_length))
d794a021 1863 goto err_out;
668a9541
CL
1864 if (put_user(urb->iso_frame_desc[i].status,
1865 &userurb->iso_frame_desc[i].status))
d794a021 1866 goto err_out;
668a9541 1867 }
1da177e4
LT
1868 }
1869
1da177e4
LT
1870 if (put_user(addr, (void __user * __user *)arg))
1871 return -EFAULT;
1872 return 0;
d794a021
ON
1873
1874err_out:
d794a021 1875 return -EFAULT;
1da177e4
LT
1876}
1877
9b6f0c4b 1878static struct async *reap_as(struct usb_dev_state *ps)
1da177e4 1879{
04e482ff 1880 DECLARE_WAITQUEUE(wait, current);
1da177e4
LT
1881 struct async *as = NULL;
1882 struct usb_device *dev = ps->dev;
1883
1884 add_wait_queue(&ps->wait, &wait);
1885 for (;;) {
1886 __set_current_state(TASK_INTERRUPTIBLE);
04e482ff 1887 as = async_getcompleted(ps);
3f2cee73 1888 if (as || !connected(ps))
1da177e4
LT
1889 break;
1890 if (signal_pending(current))
1891 break;
1892 usb_unlock_device(dev);
1893 schedule();
1894 usb_lock_device(dev);
1895 }
1896 remove_wait_queue(&ps->wait, &wait);
1897 set_current_state(TASK_RUNNING);
1898 return as;
1899}
1900
9b6f0c4b 1901static int proc_reapurb(struct usb_dev_state *ps, void __user *arg)
1da177e4
LT
1902{
1903 struct async *as = reap_as(ps);
a016a816 1904
ddeee0b2 1905 if (as) {
a016a816
AS
1906 int retval;
1907
1908 snoop(&ps->dev->dev, "reap %p\n", as->userurb);
1909 retval = processcompl(as, (void __user * __user *)arg);
ddeee0b2
LT
1910 free_async(as);
1911 return retval;
1912 }
1da177e4
LT
1913 if (signal_pending(current))
1914 return -EINTR;
3f2cee73 1915 return -ENODEV;
1da177e4
LT
1916}
1917
9b6f0c4b 1918static int proc_reapurbnonblock(struct usb_dev_state *ps, void __user *arg)
1da177e4 1919{
ddeee0b2 1920 int retval;
1da177e4
LT
1921 struct async *as;
1922
ddeee0b2 1923 as = async_getcompleted(ps);
ddeee0b2 1924 if (as) {
a016a816 1925 snoop(&ps->dev->dev, "reap %p\n", as->userurb);
ddeee0b2
LT
1926 retval = processcompl(as, (void __user * __user *)arg);
1927 free_async(as);
3f2cee73
AS
1928 } else {
1929 retval = (connected(ps) ? -EAGAIN : -ENODEV);
ddeee0b2
LT
1930 }
1931 return retval;
1da177e4
LT
1932}
1933
1934#ifdef CONFIG_COMPAT
9b6f0c4b 1935static int proc_control_compat(struct usb_dev_state *ps,
637e8a60
AB
1936 struct usbdevfs_ctrltransfer32 __user *p32)
1937{
5b32c385
MB
1938 struct usbdevfs_ctrltransfer __user *p;
1939 __u32 udata;
1940 p = compat_alloc_user_space(sizeof(*p));
1941 if (copy_in_user(p, p32, (sizeof(*p32) - sizeof(compat_caddr_t))) ||
1942 get_user(udata, &p32->data) ||
637e8a60
AB
1943 put_user(compat_ptr(udata), &p->data))
1944 return -EFAULT;
5b32c385 1945 return proc_control(ps, p);
637e8a60
AB
1946}
1947
9b6f0c4b 1948static int proc_bulk_compat(struct usb_dev_state *ps,
637e8a60
AB
1949 struct usbdevfs_bulktransfer32 __user *p32)
1950{
06793f2d
MB
1951 struct usbdevfs_bulktransfer __user *p;
1952 compat_uint_t n;
1953 compat_caddr_t addr;
637e8a60 1954
06793f2d 1955 p = compat_alloc_user_space(sizeof(*p));
637e8a60 1956
06793f2d
MB
1957 if (get_user(n, &p32->ep) || put_user(n, &p->ep) ||
1958 get_user(n, &p32->len) || put_user(n, &p->len) ||
1959 get_user(n, &p32->timeout) || put_user(n, &p->timeout) ||
1960 get_user(addr, &p32->data) || put_user(compat_ptr(addr), &p->data))
1961 return -EFAULT;
637e8a60 1962
06793f2d 1963 return proc_bulk(ps, p);
637e8a60 1964}
9b6f0c4b 1965static int proc_disconnectsignal_compat(struct usb_dev_state *ps, void __user *arg)
637e8a60
AB
1966{
1967 struct usbdevfs_disconnectsignal32 ds;
1968
1969 if (copy_from_user(&ds, arg, sizeof(ds)))
1970 return -EFAULT;
1971 ps->discsignr = ds.signr;
1972 ps->disccontext = compat_ptr(ds.context);
1973 return 0;
1974}
1da177e4
LT
1975
1976static int get_urb32(struct usbdevfs_urb *kurb,
1977 struct usbdevfs_urb32 __user *uurb)
1978{
1979 __u32 uptr;
18753ebc
MB
1980 if (!access_ok(VERIFY_READ, uurb, sizeof(*uurb)) ||
1981 __get_user(kurb->type, &uurb->type) ||
1da177e4
LT
1982 __get_user(kurb->endpoint, &uurb->endpoint) ||
1983 __get_user(kurb->status, &uurb->status) ||
1984 __get_user(kurb->flags, &uurb->flags) ||
1985 __get_user(kurb->buffer_length, &uurb->buffer_length) ||
1986 __get_user(kurb->actual_length, &uurb->actual_length) ||
1987 __get_user(kurb->start_frame, &uurb->start_frame) ||
1988 __get_user(kurb->number_of_packets, &uurb->number_of_packets) ||
1989 __get_user(kurb->error_count, &uurb->error_count) ||
1990 __get_user(kurb->signr, &uurb->signr))
1991 return -EFAULT;
1992
1993 if (__get_user(uptr, &uurb->buffer))
1994 return -EFAULT;
1995 kurb->buffer = compat_ptr(uptr);
ed0c7720 1996 if (__get_user(uptr, &uurb->usercontext))
1da177e4
LT
1997 return -EFAULT;
1998 kurb->usercontext = compat_ptr(uptr);
1999
2000 return 0;
2001}
2002
9b6f0c4b 2003static int proc_submiturb_compat(struct usb_dev_state *ps, void __user *arg)
1da177e4
LT
2004{
2005 struct usbdevfs_urb uurb;
2006
04e482ff 2007 if (get_urb32(&uurb, (struct usbdevfs_urb32 __user *)arg))
1da177e4
LT
2008 return -EFAULT;
2009
04e482ff
GKH
2010 return proc_do_submiturb(ps, &uurb,
2011 ((struct usbdevfs_urb32 __user *)arg)->iso_frame_desc,
2012 arg);
1da177e4
LT
2013}
2014
2015static int processcompl_compat(struct async *as, void __user * __user *arg)
2016{
2017 struct urb *urb = as->urb;
2018 struct usbdevfs_urb32 __user *userurb = as->userurb;
2019 void __user *addr = as->userurb;
2020 unsigned int i;
2021
2102e06a 2022 if (as->userbuffer && urb->actual_length) {
3d97ff63 2023 if (copy_urb_data_to_user(as->userbuffer, urb))
1da177e4 2024 return -EFAULT;
2102e06a 2025 }
e015268d 2026 if (put_user(as->status, &userurb->status))
1da177e4
LT
2027 return -EFAULT;
2028 if (put_user(urb->actual_length, &userurb->actual_length))
2029 return -EFAULT;
2030 if (put_user(urb->error_count, &userurb->error_count))
2031 return -EFAULT;
2032
93cf9b90 2033 if (usb_endpoint_xfer_isoc(&urb->ep->desc)) {
668a9541
CL
2034 for (i = 0; i < urb->number_of_packets; i++) {
2035 if (put_user(urb->iso_frame_desc[i].actual_length,
2036 &userurb->iso_frame_desc[i].actual_length))
2037 return -EFAULT;
2038 if (put_user(urb->iso_frame_desc[i].status,
2039 &userurb->iso_frame_desc[i].status))
2040 return -EFAULT;
2041 }
1da177e4
LT
2042 }
2043
c714de5d 2044 if (put_user(ptr_to_compat(addr), (u32 __user *)arg))
1da177e4
LT
2045 return -EFAULT;
2046 return 0;
2047}
2048
9b6f0c4b 2049static int proc_reapurb_compat(struct usb_dev_state *ps, void __user *arg)
1da177e4
LT
2050{
2051 struct async *as = reap_as(ps);
a016a816 2052
ddeee0b2 2053 if (as) {
a016a816
AS
2054 int retval;
2055
2056 snoop(&ps->dev->dev, "reap %p\n", as->userurb);
2057 retval = processcompl_compat(as, (void __user * __user *)arg);
ddeee0b2
LT
2058 free_async(as);
2059 return retval;
2060 }
1da177e4
LT
2061 if (signal_pending(current))
2062 return -EINTR;
3f2cee73 2063 return -ENODEV;
1da177e4
LT
2064}
2065
9b6f0c4b 2066static int proc_reapurbnonblock_compat(struct usb_dev_state *ps, void __user *arg)
1da177e4 2067{
ddeee0b2 2068 int retval;
1da177e4
LT
2069 struct async *as;
2070
ddeee0b2
LT
2071 as = async_getcompleted(ps);
2072 if (as) {
a016a816 2073 snoop(&ps->dev->dev, "reap %p\n", as->userurb);
ddeee0b2
LT
2074 retval = processcompl_compat(as, (void __user * __user *)arg);
2075 free_async(as);
3f2cee73
AS
2076 } else {
2077 retval = (connected(ps) ? -EAGAIN : -ENODEV);
ddeee0b2
LT
2078 }
2079 return retval;
1da177e4
LT
2080}
2081
637e8a60 2082
1da177e4
LT
2083#endif
2084
9b6f0c4b 2085static int proc_disconnectsignal(struct usb_dev_state *ps, void __user *arg)
1da177e4
LT
2086{
2087 struct usbdevfs_disconnectsignal ds;
2088
2089 if (copy_from_user(&ds, arg, sizeof(ds)))
2090 return -EFAULT;
1da177e4
LT
2091 ps->discsignr = ds.signr;
2092 ps->disccontext = ds.context;
2093 return 0;
2094}
2095
9b6f0c4b 2096static int proc_claiminterface(struct usb_dev_state *ps, void __user *arg)
1da177e4
LT
2097{
2098 unsigned int ifnum;
2099
2100 if (get_user(ifnum, (unsigned int __user *)arg))
2101 return -EFAULT;
2102 return claimintf(ps, ifnum);
2103}
2104
9b6f0c4b 2105static int proc_releaseinterface(struct usb_dev_state *ps, void __user *arg)
1da177e4
LT
2106{
2107 unsigned int ifnum;
2108 int ret;
2109
2110 if (get_user(ifnum, (unsigned int __user *)arg))
2111 return -EFAULT;
135551ea
KB
2112 ret = releaseintf(ps, ifnum);
2113 if (ret < 0)
1da177e4 2114 return ret;
64f10edf 2115 destroy_async_on_interface(ps, ifnum);
1da177e4
LT
2116 return 0;
2117}
2118
9b6f0c4b 2119static int proc_ioctl(struct usb_dev_state *ps, struct usbdevfs_ioctl *ctl)
1da177e4 2120{
1da177e4
LT
2121 int size;
2122 void *buf = NULL;
2123 int retval = 0;
2124 struct usb_interface *intf = NULL;
2125 struct usb_driver *driver = NULL;
1da177e4 2126
d883f52e
RG
2127 if (ps->privileges_dropped)
2128 return -EACCES;
2129
c36fc889 2130 /* alloc buffer */
135551ea
KB
2131 size = _IOC_SIZE(ctl->ioctl_code);
2132 if (size > 0) {
4baf0df7
2133 buf = kmalloc(size, GFP_KERNEL);
2134 if (buf == NULL)
1da177e4 2135 return -ENOMEM;
c36fc889 2136 if ((_IOC_DIR(ctl->ioctl_code) & _IOC_WRITE)) {
04e482ff 2137 if (copy_from_user(buf, ctl->data, size)) {
6fd19f4b 2138 kfree(buf);
1da177e4
LT
2139 return -EFAULT;
2140 }
2141 } else {
04e482ff 2142 memset(buf, 0, size);
1da177e4
LT
2143 }
2144 }
2145
349710c3 2146 if (!connected(ps)) {
6fd19f4b 2147 kfree(buf);
1da177e4
LT
2148 return -ENODEV;
2149 }
2150
2151 if (ps->dev->state != USB_STATE_CONFIGURED)
2152 retval = -EHOSTUNREACH;
04e482ff
GKH
2153 else if (!(intf = usb_ifnum_to_if(ps->dev, ctl->ifno)))
2154 retval = -EINVAL;
c36fc889 2155 else switch (ctl->ioctl_code) {
1da177e4
LT
2156
2157 /* disconnect kernel driver from interface */
2158 case USBDEVFS_DISCONNECT:
1da177e4
LT
2159 if (intf->dev.driver) {
2160 driver = to_usb_driver(intf->dev.driver);
04e482ff 2161 dev_dbg(&intf->dev, "disconnect by usbfs\n");
1da177e4
LT
2162 usb_driver_release_interface(driver, intf);
2163 } else
2164 retval = -ENODATA;
1da177e4
LT
2165 break;
2166
2167 /* let kernel drivers try to (re)bind to the interface */
2168 case USBDEVFS_CONNECT:
885e9747
AS
2169 if (!intf->dev.driver)
2170 retval = device_attach(&intf->dev);
2171 else
2172 retval = -EBUSY;
1da177e4
LT
2173 break;
2174
2175 /* talk directly to the interface's driver */
2176 default:
1da177e4
LT
2177 if (intf->dev.driver)
2178 driver = to_usb_driver(intf->dev.driver);
c532b29a 2179 if (driver == NULL || driver->unlocked_ioctl == NULL) {
1da177e4
LT
2180 retval = -ENOTTY;
2181 } else {
c532b29a 2182 retval = driver->unlocked_ioctl(intf, ctl->ioctl_code, buf);
1da177e4
LT
2183 if (retval == -ENOIOCTLCMD)
2184 retval = -ENOTTY;
2185 }
1da177e4
LT
2186 }
2187
2188 /* cleanup and return */
2189 if (retval >= 0
04e482ff 2190 && (_IOC_DIR(ctl->ioctl_code) & _IOC_READ) != 0
1da177e4 2191 && size > 0
04e482ff 2192 && copy_to_user(ctl->data, buf, size) != 0)
1da177e4 2193 retval = -EFAULT;
6fd19f4b
JJ
2194
2195 kfree(buf);
1da177e4
LT
2196 return retval;
2197}
2198
9b6f0c4b 2199static int proc_ioctl_default(struct usb_dev_state *ps, void __user *arg)
c36fc889
PZ
2200{
2201 struct usbdevfs_ioctl ctrl;
2202
04e482ff 2203 if (copy_from_user(&ctrl, arg, sizeof(ctrl)))
c36fc889
PZ
2204 return -EFAULT;
2205 return proc_ioctl(ps, &ctrl);
2206}
2207
2208#ifdef CONFIG_COMPAT
9b6f0c4b 2209static int proc_ioctl_compat(struct usb_dev_state *ps, compat_uptr_t arg)
c36fc889
PZ
2210{
2211 struct usbdevfs_ioctl32 __user *uioc;
2212 struct usbdevfs_ioctl ctrl;
2213 u32 udata;
2214
058120d7 2215 uioc = compat_ptr((long)arg);
18753ebc
MB
2216 if (!access_ok(VERIFY_READ, uioc, sizeof(*uioc)) ||
2217 __get_user(ctrl.ifno, &uioc->ifno) ||
2218 __get_user(ctrl.ioctl_code, &uioc->ioctl_code) ||
c36fc889
PZ
2219 __get_user(udata, &uioc->data))
2220 return -EFAULT;
2221 ctrl.data = compat_ptr(udata);
2222
2223 return proc_ioctl(ps, &ctrl);
2224}
2225#endif
2226
9b6f0c4b 2227static int proc_claim_port(struct usb_dev_state *ps, void __user *arg)
7cbe5dca
AS
2228{
2229 unsigned portnum;
2230 int rc;
2231
2232 if (get_user(portnum, (unsigned __user *) arg))
2233 return -EFAULT;
2234 rc = usb_hub_claim_port(ps->dev, portnum, ps);
2235 if (rc == 0)
2236 snoop(&ps->dev->dev, "port %d claimed by process %d: %s\n",
2237 portnum, task_pid_nr(current), current->comm);
2238 return rc;
2239}
2240
9b6f0c4b 2241static int proc_release_port(struct usb_dev_state *ps, void __user *arg)
7cbe5dca
AS
2242{
2243 unsigned portnum;
2244
2245 if (get_user(portnum, (unsigned __user *) arg))
2246 return -EFAULT;
2247 return usb_hub_release_port(ps->dev, portnum, ps);
2248}
2249
9b6f0c4b 2250static int proc_get_capabilities(struct usb_dev_state *ps, void __user *arg)
19181bc5
HG
2251{
2252 __u32 caps;
2253
3f2cee73 2254 caps = USBDEVFS_CAP_ZERO_PACKET | USBDEVFS_CAP_NO_PACKET_SIZE_LIM |
d883f52e
RG
2255 USBDEVFS_CAP_REAP_AFTER_DISCONNECT | USBDEVFS_CAP_MMAP |
2256 USBDEVFS_CAP_DROP_PRIVILEGES;
19181bc5
HG
2257 if (!ps->dev->bus->no_stop_on_short)
2258 caps |= USBDEVFS_CAP_BULK_CONTINUATION;
3d97ff63
HG
2259 if (ps->dev->bus->sg_tablesize)
2260 caps |= USBDEVFS_CAP_BULK_SCATTER_GATHER;
19181bc5
HG
2261
2262 if (put_user(caps, (__u32 __user *)arg))
2263 return -EFAULT;
2264
2265 return 0;
2266}
2267
9b6f0c4b 2268static int proc_disconnect_claim(struct usb_dev_state *ps, void __user *arg)
0837e7e5
HG
2269{
2270 struct usbdevfs_disconnect_claim dc;
2271 struct usb_interface *intf;
2272
2273 if (copy_from_user(&dc, arg, sizeof(dc)))
2274 return -EFAULT;
2275
2276 intf = usb_ifnum_to_if(ps->dev, dc.interface);
2277 if (!intf)
2278 return -EINVAL;
2279
2280 if (intf->dev.driver) {
2281 struct usb_driver *driver = to_usb_driver(intf->dev.driver);
2282
d883f52e
RG
2283 if (ps->privileges_dropped)
2284 return -EACCES;
2285
0837e7e5
HG
2286 if ((dc.flags & USBDEVFS_DISCONNECT_CLAIM_IF_DRIVER) &&
2287 strncmp(dc.driver, intf->dev.driver->name,
2288 sizeof(dc.driver)) != 0)
2289 return -EBUSY;
2290
2291 if ((dc.flags & USBDEVFS_DISCONNECT_CLAIM_EXCEPT_DRIVER) &&
2292 strncmp(dc.driver, intf->dev.driver->name,
2293 sizeof(dc.driver)) == 0)
2294 return -EBUSY;
2295
2296 dev_dbg(&intf->dev, "disconnect by usbfs\n");
2297 usb_driver_release_interface(driver, intf);
2298 }
2299
2300 return claimintf(ps, dc.interface);
2301}
2302
3e75c6de 2303static int proc_alloc_streams(struct usb_dev_state *ps, void __user *arg)
bcf7f6e3
HG
2304{
2305 unsigned num_streams, num_eps;
2306 struct usb_host_endpoint **eps;
2307 struct usb_interface *intf;
2308 int r;
2309
2310 r = parse_usbdevfs_streams(ps, arg, &num_streams, &num_eps,
2311 &eps, &intf);
2312 if (r)
2313 return r;
2314
2315 destroy_async_on_interface(ps,
2316 intf->altsetting[0].desc.bInterfaceNumber);
2317
2318 r = usb_alloc_streams(intf, eps, num_eps, num_streams, GFP_KERNEL);
2319 kfree(eps);
2320 return r;
2321}
2322
3e75c6de 2323static int proc_free_streams(struct usb_dev_state *ps, void __user *arg)
bcf7f6e3
HG
2324{
2325 unsigned num_eps;
2326 struct usb_host_endpoint **eps;
2327 struct usb_interface *intf;
2328 int r;
2329
2330 r = parse_usbdevfs_streams(ps, arg, NULL, &num_eps, &eps, &intf);
2331 if (r)
2332 return r;
2333
2334 destroy_async_on_interface(ps,
2335 intf->altsetting[0].desc.bInterfaceNumber);
2336
2337 r = usb_free_streams(intf, eps, num_eps, GFP_KERNEL);
2338 kfree(eps);
2339 return r;
2340}
2341
d883f52e
RG
2342static int proc_drop_privileges(struct usb_dev_state *ps, void __user *arg)
2343{
2344 u32 data;
2345
2346 if (copy_from_user(&data, arg, sizeof(data)))
2347 return -EFAULT;
2348
2349 /* This is an one way operation. Once privileges are
2350 * dropped, you cannot regain them. You may however reissue
2351 * this ioctl to shrink the allowed interfaces mask.
2352 */
2353 ps->interface_allowed_mask &= data;
2354 ps->privileges_dropped = true;
2355
2356 return 0;
2357}
2358
1da177e4
LT
2359/*
2360 * NOTE: All requests here that have interface numbers as parameters
2361 * are assuming that somehow the configuration has been prevented from
2362 * changing. But there's no mechanism to ensure that...
2363 */
637e8a60
AB
2364static long usbdev_do_ioctl(struct file *file, unsigned int cmd,
2365 void __user *p)
1da177e4 2366{
9b6f0c4b 2367 struct usb_dev_state *ps = file->private_data;
496ad9aa 2368 struct inode *inode = file_inode(file);
1da177e4 2369 struct usb_device *dev = ps->dev;
1da177e4
LT
2370 int ret = -ENOTTY;
2371
2372 if (!(file->f_mode & FMODE_WRITE))
2373 return -EPERM;
01412a21 2374
1da177e4 2375 usb_lock_device(dev);
3f2cee73
AS
2376
2377 /* Reap operations are allowed even after disconnection */
2378 switch (cmd) {
2379 case USBDEVFS_REAPURB:
2380 snoop(&dev->dev, "%s: REAPURB\n", __func__);
2381 ret = proc_reapurb(ps, p);
2382 goto done;
2383
2384 case USBDEVFS_REAPURBNDELAY:
2385 snoop(&dev->dev, "%s: REAPURBNDELAY\n", __func__);
2386 ret = proc_reapurbnonblock(ps, p);
2387 goto done;
2388
2389#ifdef CONFIG_COMPAT
2390 case USBDEVFS_REAPURB32:
2391 snoop(&dev->dev, "%s: REAPURB32\n", __func__);
2392 ret = proc_reapurb_compat(ps, p);
2393 goto done;
2394
2395 case USBDEVFS_REAPURBNDELAY32:
2396 snoop(&dev->dev, "%s: REAPURBNDELAY32\n", __func__);
2397 ret = proc_reapurbnonblock_compat(ps, p);
2398 goto done;
2399#endif
2400 }
2401
349710c3 2402 if (!connected(ps)) {
1da177e4
LT
2403 usb_unlock_device(dev);
2404 return -ENODEV;
2405 }
2406
2407 switch (cmd) {
2408 case USBDEVFS_CONTROL:
441b62c1 2409 snoop(&dev->dev, "%s: CONTROL\n", __func__);
1da177e4
LT
2410 ret = proc_control(ps, p);
2411 if (ret >= 0)
2412 inode->i_mtime = CURRENT_TIME;
2413 break;
2414
2415 case USBDEVFS_BULK:
441b62c1 2416 snoop(&dev->dev, "%s: BULK\n", __func__);
1da177e4
LT
2417 ret = proc_bulk(ps, p);
2418 if (ret >= 0)
2419 inode->i_mtime = CURRENT_TIME;
2420 break;
2421
2422 case USBDEVFS_RESETEP:
441b62c1 2423 snoop(&dev->dev, "%s: RESETEP\n", __func__);
1da177e4
LT
2424 ret = proc_resetep(ps, p);
2425 if (ret >= 0)
2426 inode->i_mtime = CURRENT_TIME;
2427 break;
2428
2429 case USBDEVFS_RESET:
441b62c1 2430 snoop(&dev->dev, "%s: RESET\n", __func__);
1da177e4
LT
2431 ret = proc_resetdevice(ps);
2432 break;
2433
2434 case USBDEVFS_CLEAR_HALT:
441b62c1 2435 snoop(&dev->dev, "%s: CLEAR_HALT\n", __func__);
1da177e4
LT
2436 ret = proc_clearhalt(ps, p);
2437 if (ret >= 0)
2438 inode->i_mtime = CURRENT_TIME;
2439 break;
2440
2441 case USBDEVFS_GETDRIVER:
441b62c1 2442 snoop(&dev->dev, "%s: GETDRIVER\n", __func__);
1da177e4
LT
2443 ret = proc_getdriver(ps, p);
2444 break;
2445
2446 case USBDEVFS_CONNECTINFO:
441b62c1 2447 snoop(&dev->dev, "%s: CONNECTINFO\n", __func__);
1da177e4
LT
2448 ret = proc_connectinfo(ps, p);
2449 break;
2450
2451 case USBDEVFS_SETINTERFACE:
441b62c1 2452 snoop(&dev->dev, "%s: SETINTERFACE\n", __func__);
1da177e4
LT
2453 ret = proc_setintf(ps, p);
2454 break;
2455
2456 case USBDEVFS_SETCONFIGURATION:
441b62c1 2457 snoop(&dev->dev, "%s: SETCONFIGURATION\n", __func__);
1da177e4
LT
2458 ret = proc_setconfig(ps, p);
2459 break;
2460
2461 case USBDEVFS_SUBMITURB:
441b62c1 2462 snoop(&dev->dev, "%s: SUBMITURB\n", __func__);
1da177e4
LT
2463 ret = proc_submiturb(ps, p);
2464 if (ret >= 0)
2465 inode->i_mtime = CURRENT_TIME;
2466 break;
2467
2468#ifdef CONFIG_COMPAT
637e8a60
AB
2469 case USBDEVFS_CONTROL32:
2470 snoop(&dev->dev, "%s: CONTROL32\n", __func__);
2471 ret = proc_control_compat(ps, p);
2472 if (ret >= 0)
2473 inode->i_mtime = CURRENT_TIME;
2474 break;
2475
2476 case USBDEVFS_BULK32:
2477 snoop(&dev->dev, "%s: BULK32\n", __func__);
2478 ret = proc_bulk_compat(ps, p);
2479 if (ret >= 0)
2480 inode->i_mtime = CURRENT_TIME;
2481 break;
2482
2483 case USBDEVFS_DISCSIGNAL32:
2484 snoop(&dev->dev, "%s: DISCSIGNAL32\n", __func__);
2485 ret = proc_disconnectsignal_compat(ps, p);
2486 break;
1da177e4
LT
2487
2488 case USBDEVFS_SUBMITURB32:
441b62c1 2489 snoop(&dev->dev, "%s: SUBMITURB32\n", __func__);
1da177e4
LT
2490 ret = proc_submiturb_compat(ps, p);
2491 if (ret >= 0)
2492 inode->i_mtime = CURRENT_TIME;
2493 break;
2494
c36fc889 2495 case USBDEVFS_IOCTL32:
637e8a60 2496 snoop(&dev->dev, "%s: IOCTL32\n", __func__);
c714de5d 2497 ret = proc_ioctl_compat(ps, ptr_to_compat(p));
c36fc889 2498 break;
1da177e4
LT
2499#endif
2500
2501 case USBDEVFS_DISCARDURB:
a016a816 2502 snoop(&dev->dev, "%s: DISCARDURB %p\n", __func__, p);
1da177e4
LT
2503 ret = proc_unlinkurb(ps, p);
2504 break;
2505
1da177e4 2506 case USBDEVFS_DISCSIGNAL:
441b62c1 2507 snoop(&dev->dev, "%s: DISCSIGNAL\n", __func__);
1da177e4
LT
2508 ret = proc_disconnectsignal(ps, p);
2509 break;
2510
2511 case USBDEVFS_CLAIMINTERFACE:
441b62c1 2512 snoop(&dev->dev, "%s: CLAIMINTERFACE\n", __func__);
1da177e4
LT
2513 ret = proc_claiminterface(ps, p);
2514 break;
2515
2516 case USBDEVFS_RELEASEINTERFACE:
441b62c1 2517 snoop(&dev->dev, "%s: RELEASEINTERFACE\n", __func__);
1da177e4
LT
2518 ret = proc_releaseinterface(ps, p);
2519 break;
2520
2521 case USBDEVFS_IOCTL:
441b62c1 2522 snoop(&dev->dev, "%s: IOCTL\n", __func__);
c36fc889 2523 ret = proc_ioctl_default(ps, p);
1da177e4 2524 break;
7cbe5dca
AS
2525
2526 case USBDEVFS_CLAIM_PORT:
2527 snoop(&dev->dev, "%s: CLAIM_PORT\n", __func__);
2528 ret = proc_claim_port(ps, p);
2529 break;
2530
2531 case USBDEVFS_RELEASE_PORT:
2532 snoop(&dev->dev, "%s: RELEASE_PORT\n", __func__);
2533 ret = proc_release_port(ps, p);
2534 break;
19181bc5
HG
2535 case USBDEVFS_GET_CAPABILITIES:
2536 ret = proc_get_capabilities(ps, p);
2537 break;
0837e7e5
HG
2538 case USBDEVFS_DISCONNECT_CLAIM:
2539 ret = proc_disconnect_claim(ps, p);
2540 break;
bcf7f6e3
HG
2541 case USBDEVFS_ALLOC_STREAMS:
2542 ret = proc_alloc_streams(ps, p);
2543 break;
2544 case USBDEVFS_FREE_STREAMS:
2545 ret = proc_free_streams(ps, p);
2546 break;
d883f52e
RG
2547 case USBDEVFS_DROP_PRIVILEGES:
2548 ret = proc_drop_privileges(ps, p);
2549 break;
1da177e4 2550 }
3f2cee73
AS
2551
2552 done:
1da177e4
LT
2553 usb_unlock_device(dev);
2554 if (ret >= 0)
2555 inode->i_atime = CURRENT_TIME;
2556 return ret;
2557}
2558
637e8a60
AB
2559static long usbdev_ioctl(struct file *file, unsigned int cmd,
2560 unsigned long arg)
2561{
2562 int ret;
2563
637e8a60 2564 ret = usbdev_do_ioctl(file, cmd, (void __user *)arg);
637e8a60
AB
2565
2566 return ret;
2567}
2568
2569#ifdef CONFIG_COMPAT
2570static long usbdev_compat_ioctl(struct file *file, unsigned int cmd,
2571 unsigned long arg)
2572{
2573 int ret;
2574
637e8a60 2575 ret = usbdev_do_ioctl(file, cmd, compat_ptr(arg));
637e8a60
AB
2576
2577 return ret;
2578}
2579#endif
2580
1da177e4 2581/* No kernel lock - fine */
04e482ff
GKH
2582static unsigned int usbdev_poll(struct file *file,
2583 struct poll_table_struct *wait)
1da177e4 2584{
9b6f0c4b 2585 struct usb_dev_state *ps = file->private_data;
ec17cf1c 2586 unsigned int mask = 0;
1da177e4
LT
2587
2588 poll_wait(file, &ps->wait, wait);
2589 if (file->f_mode & FMODE_WRITE && !list_empty(&ps->async_completed))
2590 mask |= POLLOUT | POLLWRNORM;
349710c3 2591 if (!connected(ps))
5cce4382
AS
2592 mask |= POLLHUP;
2593 if (list_empty(&ps->list))
2594 mask |= POLLERR;
1da177e4
LT
2595 return mask;
2596}
2597
9f8b17e6 2598const struct file_operations usbdev_file_operations = {
637e8a60 2599 .owner = THIS_MODULE,
b25472f9 2600 .llseek = no_seek_end_llseek,
637e8a60
AB
2601 .read = usbdev_read,
2602 .poll = usbdev_poll,
2603 .unlocked_ioctl = usbdev_ioctl,
2604#ifdef CONFIG_COMPAT
2605 .compat_ioctl = usbdev_compat_ioctl,
2606#endif
f7d34b44 2607 .mmap = usbdev_mmap,
637e8a60
AB
2608 .open = usbdev_open,
2609 .release = usbdev_release,
1da177e4 2610};
fbf82fd2 2611
501950d8 2612static void usbdev_remove(struct usb_device *udev)
cd9f0375 2613{
9b6f0c4b 2614 struct usb_dev_state *ps;
cd9f0375
AS
2615 struct siginfo sinfo;
2616
2617 while (!list_empty(&udev->filelist)) {
9b6f0c4b 2618 ps = list_entry(udev->filelist.next, struct usb_dev_state, list);
cd9f0375
AS
2619 destroy_all_async(ps);
2620 wake_up_all(&ps->wait);
2621 list_del_init(&ps->list);
2622 if (ps->discsignr) {
f0c2b681 2623 memset(&sinfo, 0, sizeof(sinfo));
cd9f0375
AS
2624 sinfo.si_signo = ps->discsignr;
2625 sinfo.si_errno = EPIPE;
2626 sinfo.si_code = SI_ASYNCIO;
2627 sinfo.si_addr = ps->disccontext;
d178bc3a
SH
2628 kill_pid_info_as_cred(ps->discsignr, &sinfo,
2629 ps->disc_pid, ps->cred, ps->secid);
cd9f0375
AS
2630 }
2631 }
2632}
2633
501950d8 2634static int usbdev_notify(struct notifier_block *self,
9f8b17e6 2635 unsigned long action, void *dev)
a7b986b3
GKH
2636{
2637 switch (action) {
2638 case USB_DEVICE_ADD:
a7b986b3
GKH
2639 break;
2640 case USB_DEVICE_REMOVE:
501950d8 2641 usbdev_remove(dev);
a7b986b3
GKH
2642 break;
2643 }
2644 return NOTIFY_OK;
2645}
2646
2647static struct notifier_block usbdev_nb = {
00fe52de 2648 .notifier_call = usbdev_notify,
a7b986b3
GKH
2649};
2650
7e7654a9 2651static struct cdev usb_device_cdev;
fbf82fd2 2652
9f8b17e6 2653int __init usb_devio_init(void)
fbf82fd2
KS
2654{
2655 int retval;
2656
fad21bdf 2657 retval = register_chrdev_region(USB_DEVICE_DEV, USB_DEVICE_MAX,
04e482ff 2658 "usb_device");
fbf82fd2 2659 if (retval) {
69a85942 2660 printk(KERN_ERR "Unable to register minors for usb_device\n");
fbf82fd2
KS
2661 goto out;
2662 }
9f8b17e6 2663 cdev_init(&usb_device_cdev, &usbdev_file_operations);
fad21bdf 2664 retval = cdev_add(&usb_device_cdev, USB_DEVICE_DEV, USB_DEVICE_MAX);
fbf82fd2 2665 if (retval) {
69a85942
GKH
2666 printk(KERN_ERR "Unable to get usb_device major %d\n",
2667 USB_DEVICE_MAJOR);
a7b986b3 2668 goto error_cdev;
fbf82fd2 2669 }
501950d8 2670 usb_register_notify(&usbdev_nb);
fbf82fd2
KS
2671out:
2672 return retval;
a7b986b3 2673
a7b986b3
GKH
2674error_cdev:
2675 unregister_chrdev_region(USB_DEVICE_DEV, USB_DEVICE_MAX);
2676 goto out;
fbf82fd2
KS
2677}
2678
9f8b17e6 2679void usb_devio_cleanup(void)
fbf82fd2 2680{
a7b986b3 2681 usb_unregister_notify(&usbdev_nb);
fbf82fd2 2682 cdev_del(&usb_device_cdev);
fad21bdf 2683 unregister_chrdev_region(USB_DEVICE_DEV, USB_DEVICE_MAX);
fbf82fd2 2684}