]> git.proxmox.com Git - mirror_ubuntu-eoan-kernel.git/blame - drivers/usb/core/devio.c
treewide: kmalloc() -> kmalloc_array()
[mirror_ubuntu-eoan-kernel.git] / drivers / usb / core / devio.c
CommitLineData
5fd54ace 1// SPDX-License-Identifier: GPL-2.0+
1da177e4
LT
2/*****************************************************************************/
3
4/*
5 * devio.c -- User space communication with USB devices.
6 *
7 * Copyright (C) 1999-2000 Thomas Sailer (sailer@ife.ee.ethz.ch)
8 *
1da177e4
LT
9 * This file implements the usbfs/x/y files, where
10 * x is the bus number and y the device number.
11 *
12 * It allows user space programs/"drivers" to communicate directly
13 * with USB devices without intervening kernel driver.
14 *
15 * Revision history
16 * 22.12.1999 0.1 Initial release (split from proc_usb.c)
17 * 04.01.2000 0.2 Turned into its own filesystem
46113830
HW
18 * 30.09.2005 0.3 Fix user-triggerable oops in async URB delivery
19 * (CAN-2005-3055)
1da177e4
LT
20 */
21
22/*****************************************************************************/
23
24#include <linux/fs.h>
25#include <linux/mm.h>
3f07c014 26#include <linux/sched/signal.h>
1da177e4 27#include <linux/slab.h>
1da177e4
LT
28#include <linux/signal.h>
29#include <linux/poll.h>
30#include <linux/module.h>
b11b2e1b 31#include <linux/string.h>
1da177e4
LT
32#include <linux/usb.h>
33#include <linux/usbdevice_fs.h>
27729aad 34#include <linux/usb/hcd.h> /* for usbcore internals */
fbf82fd2 35#include <linux/cdev.h>
a7b986b3 36#include <linux/notifier.h>
7a01955f 37#include <linux/security.h>
d178bc3a 38#include <linux/user_namespace.h>
3d97ff63 39#include <linux/scatterlist.h>
e6889b31 40#include <linux/uaccess.h>
f7d34b44 41#include <linux/dma-mapping.h>
1da177e4
LT
42#include <asm/byteorder.h>
43#include <linux/moduleparam.h>
44
1da177e4
LT
45#include "usb.h"
46
fbf82fd2 47#define USB_MAXBUS 64
fa86ad0b 48#define USB_DEVICE_MAX (USB_MAXBUS * 128)
3d97ff63 49#define USB_SG_SIZE 16384 /* split-size for large txs */
fbf82fd2 50
4a2a8a2c
AS
51/* Mutual exclusion for removal, open, and release */
52DEFINE_MUTEX(usbfs_mutex);
53
9b6f0c4b 54struct usb_dev_state {
cd9f0375
AS
55 struct list_head list; /* state list */
56 struct usb_device *dev;
57 struct file *file;
58 spinlock_t lock; /* protects the async urb lists */
59 struct list_head async_pending;
60 struct list_head async_completed;
f7d34b44 61 struct list_head memory_list;
cd9f0375
AS
62 wait_queue_head_t wait; /* wake up if a request completed */
63 unsigned int discsignr;
64 struct pid *disc_pid;
d178bc3a 65 const struct cred *cred;
cd9f0375
AS
66 void __user *disccontext;
67 unsigned long ifclaimed;
01c6460f 68 u32 disabled_bulk_eps;
d883f52e
RG
69 bool privileges_dropped;
70 unsigned long interface_allowed_mask;
cd9f0375
AS
71};
72
f7d34b44
SG
73struct usb_memory {
74 struct list_head memlist;
75 int vma_use_count;
76 int urb_use_count;
77 u32 size;
78 void *mem;
79 dma_addr_t dma_handle;
80 unsigned long vm_start;
81 struct usb_dev_state *ps;
82};
83
1da177e4
LT
84struct async {
85 struct list_head asynclist;
9b6f0c4b 86 struct usb_dev_state *ps;
2425c08b 87 struct pid *pid;
d178bc3a 88 const struct cred *cred;
1da177e4
LT
89 unsigned int signr;
90 unsigned int ifnum;
91 void __user *userbuffer;
92 void __user *userurb;
93 struct urb *urb;
f7d34b44 94 struct usb_memory *usbm;
add1aaea 95 unsigned int mem_usage;
e015268d 96 int status;
01c6460f
AS
97 u8 bulk_addr;
98 u8 bulk_status;
1da177e4
LT
99};
100
90ab5ee9 101static bool usbfs_snoop;
04e482ff
GKH
102module_param(usbfs_snoop, bool, S_IRUGO | S_IWUSR);
103MODULE_PARM_DESC(usbfs_snoop, "true to log all usbfs traffic");
1da177e4 104
0290cc9f
AS
105static unsigned usbfs_snoop_max = 65536;
106module_param(usbfs_snoop_max, uint, S_IRUGO | S_IWUSR);
107MODULE_PARM_DESC(usbfs_snoop_max,
108 "maximum number of bytes to print while snooping");
109
1da177e4
LT
110#define snoop(dev, format, arg...) \
111 do { \
112 if (usbfs_snoop) \
f355e830 113 dev_info(dev, format, ## arg); \
1da177e4
LT
114 } while (0)
115
4c6e8971
AS
116enum snoop_when {
117 SUBMIT, COMPLETE
118};
fad21bdf 119
4c6e8971 120#define USB_DEVICE_DEV MKDEV(USB_DEVICE_MAJOR, 0)
1da177e4 121
add1aaea 122/* Limit on the total amount of memory we can allocate for transfers */
1129d270 123static u32 usbfs_memory_mb = 16;
3f5eb8d5
AS
124module_param(usbfs_memory_mb, uint, 0644);
125MODULE_PARM_DESC(usbfs_memory_mb,
126 "maximum MB allowed for usbfs buffers (0 = no limit)");
127
57999d11
DC
128/* Hard limit, necessary to avoid arithmetic overflow */
129#define USBFS_XFER_MAX (UINT_MAX / 2 - 1000000)
130
1129d270 131static atomic64_t usbfs_memory_usage; /* Total memory currently allocated */
add1aaea
AS
132
133/* Check whether it's okay to allocate more memory for a transfer */
1129d270 134static int usbfs_increase_memory_usage(u64 amount)
add1aaea 135{
1129d270 136 u64 lim;
3f5eb8d5 137
6aa7de05 138 lim = READ_ONCE(usbfs_memory_mb);
1129d270 139 lim <<= 20;
3f5eb8d5 140
1129d270
MB
141 atomic64_add(amount, &usbfs_memory_usage);
142
143 if (lim > 0 && atomic64_read(&usbfs_memory_usage) > lim) {
144 atomic64_sub(amount, &usbfs_memory_usage);
145 return -ENOMEM;
146 }
147
148 return 0;
add1aaea
AS
149}
150
151/* Memory for a transfer is being deallocated */
1129d270 152static void usbfs_decrease_memory_usage(u64 amount)
add1aaea 153{
1129d270 154 atomic64_sub(amount, &usbfs_memory_usage);
add1aaea 155}
4c6e8971 156
9b6f0c4b 157static int connected(struct usb_dev_state *ps)
1da177e4 158{
349710c3
AS
159 return (!list_empty(&ps->list) &&
160 ps->dev->state != USB_STATE_NOTATTACHED);
1da177e4
LT
161}
162
f7d34b44
SG
163static void dec_usb_memory_use_count(struct usb_memory *usbm, int *count)
164{
165 struct usb_dev_state *ps = usbm->ps;
166 unsigned long flags;
167
168 spin_lock_irqsave(&ps->lock, flags);
169 --*count;
170 if (usbm->urb_use_count == 0 && usbm->vma_use_count == 0) {
171 list_del(&usbm->memlist);
172 spin_unlock_irqrestore(&ps->lock, flags);
173
174 usb_free_coherent(ps->dev, usbm->size, usbm->mem,
175 usbm->dma_handle);
176 usbfs_decrease_memory_usage(
177 usbm->size + sizeof(struct usb_memory));
178 kfree(usbm);
179 } else {
180 spin_unlock_irqrestore(&ps->lock, flags);
181 }
182}
183
184static void usbdev_vm_open(struct vm_area_struct *vma)
185{
186 struct usb_memory *usbm = vma->vm_private_data;
187 unsigned long flags;
188
189 spin_lock_irqsave(&usbm->ps->lock, flags);
190 ++usbm->vma_use_count;
191 spin_unlock_irqrestore(&usbm->ps->lock, flags);
192}
193
194static void usbdev_vm_close(struct vm_area_struct *vma)
195{
196 struct usb_memory *usbm = vma->vm_private_data;
197
198 dec_usb_memory_use_count(usbm, &usbm->vma_use_count);
199}
200
b64d47ae 201static const struct vm_operations_struct usbdev_vm_ops = {
f7d34b44
SG
202 .open = usbdev_vm_open,
203 .close = usbdev_vm_close
204};
205
206static int usbdev_mmap(struct file *file, struct vm_area_struct *vma)
207{
208 struct usb_memory *usbm = NULL;
209 struct usb_dev_state *ps = file->private_data;
210 size_t size = vma->vm_end - vma->vm_start;
211 void *mem;
212 unsigned long flags;
213 dma_addr_t dma_handle;
214 int ret;
215
216 ret = usbfs_increase_memory_usage(size + sizeof(struct usb_memory));
217 if (ret)
218 goto error;
219
220 usbm = kzalloc(sizeof(struct usb_memory), GFP_KERNEL);
221 if (!usbm) {
222 ret = -ENOMEM;
223 goto error_decrease_mem;
224 }
225
70f7ca9a
JS
226 mem = usb_alloc_coherent(ps->dev, size, GFP_USER | __GFP_NOWARN,
227 &dma_handle);
f7d34b44
SG
228 if (!mem) {
229 ret = -ENOMEM;
230 goto error_free_usbm;
231 }
232
233 memset(mem, 0, size);
234
235 usbm->mem = mem;
236 usbm->dma_handle = dma_handle;
237 usbm->size = size;
238 usbm->ps = ps;
239 usbm->vm_start = vma->vm_start;
240 usbm->vma_use_count = 1;
241 INIT_LIST_HEAD(&usbm->memlist);
242
243 if (remap_pfn_range(vma, vma->vm_start,
244 virt_to_phys(usbm->mem) >> PAGE_SHIFT,
245 size, vma->vm_page_prot) < 0) {
246 dec_usb_memory_use_count(usbm, &usbm->vma_use_count);
247 return -EAGAIN;
248 }
249
250 vma->vm_flags |= VM_IO;
251 vma->vm_flags |= (VM_DONTEXPAND | VM_DONTDUMP);
252 vma->vm_ops = &usbdev_vm_ops;
253 vma->vm_private_data = usbm;
254
255 spin_lock_irqsave(&ps->lock, flags);
256 list_add_tail(&usbm->memlist, &ps->memory_list);
257 spin_unlock_irqrestore(&ps->lock, flags);
258
259 return 0;
260
261error_free_usbm:
262 kfree(usbm);
263error_decrease_mem:
264 usbfs_decrease_memory_usage(size + sizeof(struct usb_memory));
265error:
266 return ret;
267}
268
04e482ff
GKH
269static ssize_t usbdev_read(struct file *file, char __user *buf, size_t nbytes,
270 loff_t *ppos)
1da177e4 271{
9b6f0c4b 272 struct usb_dev_state *ps = file->private_data;
1da177e4
LT
273 struct usb_device *dev = ps->dev;
274 ssize_t ret = 0;
275 unsigned len;
276 loff_t pos;
277 int i;
278
279 pos = *ppos;
280 usb_lock_device(dev);
349710c3 281 if (!connected(ps)) {
1da177e4
LT
282 ret = -ENODEV;
283 goto err;
284 } else if (pos < 0) {
285 ret = -EINVAL;
286 goto err;
287 }
288
289 if (pos < sizeof(struct usb_device_descriptor)) {
04e482ff
GKH
290 /* 18 bytes - fits on the stack */
291 struct usb_device_descriptor temp_desc;
8781ba0a
ON
292
293 memcpy(&temp_desc, &dev->descriptor, sizeof(dev->descriptor));
9fcd5c32
AM
294 le16_to_cpus(&temp_desc.bcdUSB);
295 le16_to_cpus(&temp_desc.idVendor);
296 le16_to_cpus(&temp_desc.idProduct);
297 le16_to_cpus(&temp_desc.bcdDevice);
1da177e4
LT
298
299 len = sizeof(struct usb_device_descriptor) - pos;
300 if (len > nbytes)
301 len = nbytes;
8781ba0a 302 if (copy_to_user(buf, ((char *)&temp_desc) + pos, len)) {
1da177e4
LT
303 ret = -EFAULT;
304 goto err;
305 }
1da177e4
LT
306
307 *ppos += len;
308 buf += len;
309 nbytes -= len;
310 ret += len;
311 }
312
313 pos = sizeof(struct usb_device_descriptor);
314 for (i = 0; nbytes && i < dev->descriptor.bNumConfigurations; i++) {
315 struct usb_config_descriptor *config =
316 (struct usb_config_descriptor *)dev->rawdescriptors[i];
317 unsigned int length = le16_to_cpu(config->wTotalLength);
318
319 if (*ppos < pos + length) {
320
321 /* The descriptor may claim to be longer than it
322 * really is. Here is the actual allocated length. */
323 unsigned alloclen =
324 le16_to_cpu(dev->config[i].desc.wTotalLength);
325
326 len = length - (*ppos - pos);
327 if (len > nbytes)
328 len = nbytes;
329
330 /* Simply don't write (skip over) unallocated parts */
331 if (alloclen > (*ppos - pos)) {
332 alloclen -= (*ppos - pos);
333 if (copy_to_user(buf,
334 dev->rawdescriptors[i] + (*ppos - pos),
335 min(len, alloclen))) {
336 ret = -EFAULT;
337 goto err;
338 }
339 }
340
341 *ppos += len;
342 buf += len;
343 nbytes -= len;
344 ret += len;
345 }
346
347 pos += length;
348 }
349
350err:
351 usb_unlock_device(dev);
352 return ret;
353}
354
355/*
356 * async list handling
357 */
358
359static struct async *alloc_async(unsigned int numisoframes)
360{
dd95b814 361 struct async *as;
0a1ef3b5 362
dd95b814 363 as = kzalloc(sizeof(struct async), GFP_KERNEL);
04e482ff
GKH
364 if (!as)
365 return NULL;
1da177e4
LT
366 as->urb = usb_alloc_urb(numisoframes, GFP_KERNEL);
367 if (!as->urb) {
368 kfree(as);
369 return NULL;
370 }
04e482ff 371 return as;
1da177e4
LT
372}
373
374static void free_async(struct async *as)
375{
3d97ff63
HG
376 int i;
377
2425c08b 378 put_pid(as->pid);
1b41c832
SS
379 if (as->cred)
380 put_cred(as->cred);
3d97ff63
HG
381 for (i = 0; i < as->urb->num_sgs; i++) {
382 if (sg_page(&as->urb->sg[i]))
383 kfree(sg_virt(&as->urb->sg[i]));
384 }
f7d34b44 385
3d97ff63 386 kfree(as->urb->sg);
f7d34b44
SG
387 if (as->usbm == NULL)
388 kfree(as->urb->transfer_buffer);
389 else
390 dec_usb_memory_use_count(as->usbm, &as->usbm->urb_use_count);
391
6fd19f4b 392 kfree(as->urb->setup_packet);
1da177e4 393 usb_free_urb(as->urb);
add1aaea 394 usbfs_decrease_memory_usage(as->mem_usage);
6fd19f4b 395 kfree(as);
1da177e4
LT
396}
397
d34d9721 398static void async_newpending(struct async *as)
1da177e4 399{
9b6f0c4b 400 struct usb_dev_state *ps = as->ps;
04e482ff
GKH
401 unsigned long flags;
402
403 spin_lock_irqsave(&ps->lock, flags);
404 list_add_tail(&as->asynclist, &ps->async_pending);
405 spin_unlock_irqrestore(&ps->lock, flags);
1da177e4
LT
406}
407
d34d9721 408static void async_removepending(struct async *as)
1da177e4 409{
9b6f0c4b 410 struct usb_dev_state *ps = as->ps;
04e482ff
GKH
411 unsigned long flags;
412
413 spin_lock_irqsave(&ps->lock, flags);
414 list_del_init(&as->asynclist);
415 spin_unlock_irqrestore(&ps->lock, flags);
1da177e4
LT
416}
417
9b6f0c4b 418static struct async *async_getcompleted(struct usb_dev_state *ps)
1da177e4 419{
04e482ff
GKH
420 unsigned long flags;
421 struct async *as = NULL;
422
423 spin_lock_irqsave(&ps->lock, flags);
424 if (!list_empty(&ps->async_completed)) {
425 as = list_entry(ps->async_completed.next, struct async,
426 asynclist);
427 list_del_init(&as->asynclist);
428 }
429 spin_unlock_irqrestore(&ps->lock, flags);
430 return as;
1da177e4
LT
431}
432
9b6f0c4b 433static struct async *async_getpending(struct usb_dev_state *ps,
04e482ff 434 void __user *userurb)
1da177e4 435{
04e482ff 436 struct async *as;
1da177e4 437
1da177e4
LT
438 list_for_each_entry(as, &ps->async_pending, asynclist)
439 if (as->userurb == userurb) {
440 list_del_init(&as->asynclist);
1da177e4
LT
441 return as;
442 }
4e09dcf2 443
04e482ff 444 return NULL;
1da177e4
LT
445}
446
4c6e8971
AS
447static void snoop_urb(struct usb_device *udev,
448 void __user *userurb, int pipe, unsigned length,
0880aef4
CF
449 int timeout_or_status, enum snoop_when when,
450 unsigned char *data, unsigned data_len)
e639dd3f 451{
4c6e8971
AS
452 static const char *types[] = {"isoc", "int", "ctrl", "bulk"};
453 static const char *dirs[] = {"out", "in"};
454 int ep;
455 const char *t, *d;
e639dd3f
GKH
456
457 if (!usbfs_snoop)
458 return;
459
4c6e8971
AS
460 ep = usb_pipeendpoint(pipe);
461 t = types[usb_pipetype(pipe)];
462 d = dirs[!!usb_pipein(pipe)];
463
464 if (userurb) { /* Async */
465 if (when == SUBMIT)
2f964780 466 dev_info(&udev->dev, "userurb %pK, ep%d %s-%s, "
4c6e8971
AS
467 "length %u\n",
468 userurb, ep, t, d, length);
469 else
2f964780 470 dev_info(&udev->dev, "userurb %pK, ep%d %s-%s, "
4c6e8971
AS
471 "actual_length %u status %d\n",
472 userurb, ep, t, d, length,
473 timeout_or_status);
474 } else {
475 if (when == SUBMIT)
476 dev_info(&udev->dev, "ep%d %s-%s, length %u, "
477 "timeout %d\n",
478 ep, t, d, length, timeout_or_status);
479 else
480 dev_info(&udev->dev, "ep%d %s-%s, actual_length %u, "
481 "status %d\n",
482 ep, t, d, length, timeout_or_status);
483 }
0880aef4 484
0290cc9f 485 data_len = min(data_len, usbfs_snoop_max);
0880aef4
CF
486 if (data && data_len > 0) {
487 print_hex_dump(KERN_DEBUG, "data: ", DUMP_PREFIX_NONE, 32, 1,
488 data, data_len, 1);
489 }
e639dd3f
GKH
490}
491
3d97ff63
HG
492static void snoop_urb_data(struct urb *urb, unsigned len)
493{
494 int i, size;
495
0290cc9f
AS
496 len = min(len, usbfs_snoop_max);
497 if (!usbfs_snoop || len == 0)
3d97ff63
HG
498 return;
499
500 if (urb->num_sgs == 0) {
501 print_hex_dump(KERN_DEBUG, "data: ", DUMP_PREFIX_NONE, 32, 1,
502 urb->transfer_buffer, len, 1);
503 return;
504 }
505
506 for (i = 0; i < urb->num_sgs && len; i++) {
507 size = (len > USB_SG_SIZE) ? USB_SG_SIZE : len;
508 print_hex_dump(KERN_DEBUG, "data: ", DUMP_PREFIX_NONE, 32, 1,
509 sg_virt(&urb->sg[i]), size, 1);
510 len -= size;
511 }
512}
513
514static int copy_urb_data_to_user(u8 __user *userbuffer, struct urb *urb)
515{
516 unsigned i, len, size;
517
518 if (urb->number_of_packets > 0) /* Isochronous */
519 len = urb->transfer_buffer_length;
520 else /* Non-Isoc */
521 len = urb->actual_length;
522
523 if (urb->num_sgs == 0) {
524 if (copy_to_user(userbuffer, urb->transfer_buffer, len))
525 return -EFAULT;
526 return 0;
527 }
528
529 for (i = 0; i < urb->num_sgs && len; i++) {
530 size = (len > USB_SG_SIZE) ? USB_SG_SIZE : len;
531 if (copy_to_user(userbuffer, sg_virt(&urb->sg[i]), size))
532 return -EFAULT;
533 userbuffer += size;
534 len -= size;
535 }
536
537 return 0;
538}
539
01c6460f
AS
540#define AS_CONTINUATION 1
541#define AS_UNLINK 2
542
9b6f0c4b 543static void cancel_bulk_urbs(struct usb_dev_state *ps, unsigned bulk_addr)
01c6460f
AS
544__releases(ps->lock)
545__acquires(ps->lock)
546{
4e09dcf2 547 struct urb *urb;
01c6460f
AS
548 struct async *as;
549
550 /* Mark all the pending URBs that match bulk_addr, up to but not
551 * including the first one without AS_CONTINUATION. If such an
552 * URB is encountered then a new transfer has already started so
553 * the endpoint doesn't need to be disabled; otherwise it does.
554 */
555 list_for_each_entry(as, &ps->async_pending, asynclist) {
556 if (as->bulk_addr == bulk_addr) {
557 if (as->bulk_status != AS_CONTINUATION)
558 goto rescan;
559 as->bulk_status = AS_UNLINK;
560 as->bulk_addr = 0;
561 }
562 }
563 ps->disabled_bulk_eps |= (1 << bulk_addr);
564
565 /* Now carefully unlink all the marked pending URBs */
566 rescan:
567 list_for_each_entry(as, &ps->async_pending, asynclist) {
568 if (as->bulk_status == AS_UNLINK) {
569 as->bulk_status = 0; /* Only once */
4e09dcf2
HL
570 urb = as->urb;
571 usb_get_urb(urb);
01c6460f 572 spin_unlock(&ps->lock); /* Allow completions */
4e09dcf2
HL
573 usb_unlink_urb(urb);
574 usb_put_urb(urb);
01c6460f
AS
575 spin_lock(&ps->lock);
576 goto rescan;
577 }
578 }
579}
580
7d12e780 581static void async_completed(struct urb *urb)
1da177e4 582{
04e482ff 583 struct async *as = urb->context;
9b6f0c4b 584 struct usb_dev_state *ps = as->ps;
1da177e4 585 struct siginfo sinfo;
516a1a07 586 struct pid *pid = NULL;
d178bc3a 587 const struct cred *cred = NULL;
516a1a07 588 int signr;
1da177e4 589
04e482ff
GKH
590 spin_lock(&ps->lock);
591 list_move_tail(&as->asynclist, &ps->async_completed);
e015268d 592 as->status = urb->status;
516a1a07
ON
593 signr = as->signr;
594 if (signr) {
3b10db2b 595 clear_siginfo(&sinfo);
1da177e4 596 sinfo.si_signo = as->signr;
e015268d 597 sinfo.si_errno = as->status;
1da177e4
LT
598 sinfo.si_code = SI_ASYNCIO;
599 sinfo.si_addr = as->userurb;
aec01c58 600 pid = get_pid(as->pid);
d178bc3a 601 cred = get_cred(as->cred);
1da177e4 602 }
e639dd3f 603 snoop(&urb->dev->dev, "urb complete\n");
4c6e8971 604 snoop_urb(urb->dev, as->userurb, urb->pipe, urb->actual_length,
3d97ff63 605 as->status, COMPLETE, NULL, 0);
83ed07c5 606 if ((urb->transfer_flags & URB_DIR_MASK) == URB_DIR_IN)
3d97ff63
HG
607 snoop_urb_data(urb, urb->actual_length);
608
01c6460f
AS
609 if (as->status < 0 && as->bulk_addr && as->status != -ECONNRESET &&
610 as->status != -ENOENT)
611 cancel_bulk_urbs(ps, as->bulk_addr);
ed62ca2f
DA
612
613 wake_up(&ps->wait);
516a1a07
ON
614 spin_unlock(&ps->lock);
615
aec01c58 616 if (signr) {
6b4f3d01 617 kill_pid_info_as_cred(sinfo.si_signo, &sinfo, pid, cred);
aec01c58 618 put_pid(pid);
d178bc3a 619 put_cred(cred);
aec01c58 620 }
1da177e4
LT
621}
622
9b6f0c4b 623static void destroy_async(struct usb_dev_state *ps, struct list_head *list)
1da177e4 624{
4e09dcf2 625 struct urb *urb;
1da177e4
LT
626 struct async *as;
627 unsigned long flags;
628
629 spin_lock_irqsave(&ps->lock, flags);
630 while (!list_empty(list)) {
631 as = list_entry(list->next, struct async, asynclist);
632 list_del_init(&as->asynclist);
4e09dcf2
HL
633 urb = as->urb;
634 usb_get_urb(urb);
1da177e4
LT
635
636 /* drop the spinlock so the completion handler can run */
637 spin_unlock_irqrestore(&ps->lock, flags);
4e09dcf2
HL
638 usb_kill_urb(urb);
639 usb_put_urb(urb);
1da177e4
LT
640 spin_lock_irqsave(&ps->lock, flags);
641 }
642 spin_unlock_irqrestore(&ps->lock, flags);
1da177e4
LT
643}
644
9b6f0c4b 645static void destroy_async_on_interface(struct usb_dev_state *ps,
04e482ff 646 unsigned int ifnum)
1da177e4
LT
647{
648 struct list_head *p, *q, hitlist;
649 unsigned long flags;
650
651 INIT_LIST_HEAD(&hitlist);
652 spin_lock_irqsave(&ps->lock, flags);
653 list_for_each_safe(p, q, &ps->async_pending)
654 if (ifnum == list_entry(p, struct async, asynclist)->ifnum)
655 list_move_tail(p, &hitlist);
656 spin_unlock_irqrestore(&ps->lock, flags);
657 destroy_async(ps, &hitlist);
658}
659
9b6f0c4b 660static void destroy_all_async(struct usb_dev_state *ps)
1da177e4 661{
04e482ff 662 destroy_async(ps, &ps->async_pending);
1da177e4
LT
663}
664
665/*
666 * interface claims are made only at the request of user level code,
667 * which can also release them (explicitly or by closing files).
668 * they're also undone when devices disconnect.
669 */
670
04e482ff
GKH
671static int driver_probe(struct usb_interface *intf,
672 const struct usb_device_id *id)
1da177e4
LT
673{
674 return -ENODEV;
675}
676
677static void driver_disconnect(struct usb_interface *intf)
678{
9b6f0c4b 679 struct usb_dev_state *ps = usb_get_intfdata(intf);
1da177e4
LT
680 unsigned int ifnum = intf->altsetting->desc.bInterfaceNumber;
681
682 if (!ps)
683 return;
684
685 /* NOTE: this relies on usbcore having canceled and completed
686 * all pending I/O requests; 2.6 does that.
687 */
688
689 if (likely(ifnum < 8*sizeof(ps->ifclaimed)))
690 clear_bit(ifnum, &ps->ifclaimed);
691 else
3b6004f3
GKH
692 dev_warn(&intf->dev, "interface number %u out of range\n",
693 ifnum);
1da177e4 694
04e482ff 695 usb_set_intfdata(intf, NULL);
1da177e4
LT
696
697 /* force async requests to complete */
698 destroy_async_on_interface(ps, ifnum);
699}
700
2e2eb83f
AS
701/* The following routines are merely placeholders. There is no way
702 * to inform a user task about suspend or resumes.
703 */
704static int driver_suspend(struct usb_interface *intf, pm_message_t msg)
705{
706 return 0;
707}
708
709static int driver_resume(struct usb_interface *intf)
710{
711 return 0;
712}
713
1da177e4 714struct usb_driver usbfs_driver = {
1da177e4
LT
715 .name = "usbfs",
716 .probe = driver_probe,
717 .disconnect = driver_disconnect,
2e2eb83f
AS
718 .suspend = driver_suspend,
719 .resume = driver_resume,
1da177e4
LT
720};
721
9b6f0c4b 722static int claimintf(struct usb_dev_state *ps, unsigned int ifnum)
1da177e4
LT
723{
724 struct usb_device *dev = ps->dev;
725 struct usb_interface *intf;
726 int err;
727
728 if (ifnum >= 8*sizeof(ps->ifclaimed))
729 return -EINVAL;
730 /* already claimed */
731 if (test_bit(ifnum, &ps->ifclaimed))
732 return 0;
733
d883f52e
RG
734 if (ps->privileges_dropped &&
735 !test_bit(ifnum, &ps->interface_allowed_mask))
736 return -EACCES;
737
1da177e4
LT
738 intf = usb_ifnum_to_if(dev, ifnum);
739 if (!intf)
740 err = -ENOENT;
741 else
742 err = usb_driver_claim_interface(&usbfs_driver, intf, ps);
1da177e4
LT
743 if (err == 0)
744 set_bit(ifnum, &ps->ifclaimed);
745 return err;
746}
747
9b6f0c4b 748static int releaseintf(struct usb_dev_state *ps, unsigned int ifnum)
1da177e4
LT
749{
750 struct usb_device *dev;
751 struct usb_interface *intf;
752 int err;
753
754 err = -EINVAL;
755 if (ifnum >= 8*sizeof(ps->ifclaimed))
756 return err;
757 dev = ps->dev;
1da177e4
LT
758 intf = usb_ifnum_to_if(dev, ifnum);
759 if (!intf)
760 err = -ENOENT;
761 else if (test_and_clear_bit(ifnum, &ps->ifclaimed)) {
762 usb_driver_release_interface(&usbfs_driver, intf);
763 err = 0;
764 }
1da177e4
LT
765 return err;
766}
767
9b6f0c4b 768static int checkintf(struct usb_dev_state *ps, unsigned int ifnum)
1da177e4
LT
769{
770 if (ps->dev->state != USB_STATE_CONFIGURED)
771 return -EHOSTUNREACH;
772 if (ifnum >= 8*sizeof(ps->ifclaimed))
773 return -EINVAL;
774 if (test_bit(ifnum, &ps->ifclaimed))
775 return 0;
776 /* if not yet claimed, claim it for the driver */
04e482ff
GKH
777 dev_warn(&ps->dev->dev, "usbfs: process %d (%s) did not claim "
778 "interface %u before use\n", task_pid_nr(current),
779 current->comm, ifnum);
1da177e4
LT
780 return claimintf(ps, ifnum);
781}
782
783static int findintfep(struct usb_device *dev, unsigned int ep)
784{
785 unsigned int i, j, e;
04e482ff 786 struct usb_interface *intf;
1da177e4
LT
787 struct usb_host_interface *alts;
788 struct usb_endpoint_descriptor *endpt;
789
790 if (ep & ~(USB_DIR_IN|0xf))
791 return -EINVAL;
792 if (!dev->actconfig)
793 return -ESRCH;
794 for (i = 0; i < dev->actconfig->desc.bNumInterfaces; i++) {
795 intf = dev->actconfig->interface[i];
796 for (j = 0; j < intf->num_altsetting; j++) {
04e482ff 797 alts = &intf->altsetting[j];
1da177e4
LT
798 for (e = 0; e < alts->desc.bNumEndpoints; e++) {
799 endpt = &alts->endpoint[e].desc;
800 if (endpt->bEndpointAddress == ep)
801 return alts->desc.bInterfaceNumber;
802 }
803 }
804 }
04e482ff 805 return -ENOENT;
1da177e4
LT
806}
807
9b6f0c4b 808static int check_ctrlrecip(struct usb_dev_state *ps, unsigned int requesttype,
393cbb51 809 unsigned int request, unsigned int index)
1da177e4
LT
810{
811 int ret = 0;
393cbb51 812 struct usb_host_interface *alt_setting;
1da177e4 813
6da9c990
DV
814 if (ps->dev->state != USB_STATE_UNAUTHENTICATED
815 && ps->dev->state != USB_STATE_ADDRESS
24f8b116 816 && ps->dev->state != USB_STATE_CONFIGURED)
1da177e4
LT
817 return -EHOSTUNREACH;
818 if (USB_TYPE_VENDOR == (USB_TYPE_MASK & requesttype))
819 return 0;
820
393cbb51
MD
821 /*
822 * check for the special corner case 'get_device_id' in the printer
5dc50c35
HG
823 * class specification, which we always want to allow as it is used
824 * to query things like ink level, etc.
393cbb51
MD
825 */
826 if (requesttype == 0xa1 && request == 0) {
827 alt_setting = usb_find_alt_setting(ps->dev->actconfig,
828 index >> 8, index & 0xff);
829 if (alt_setting
830 && alt_setting->desc.bInterfaceClass == USB_CLASS_PRINTER)
5dc50c35 831 return 0;
393cbb51
MD
832 }
833
1da177e4
LT
834 index &= 0xff;
835 switch (requesttype & USB_RECIP_MASK) {
836 case USB_RECIP_ENDPOINT:
1361bf4b
HG
837 if ((index & ~USB_DIR_IN) == 0)
838 return 0;
04e482ff 839 ret = findintfep(ps->dev, index);
831abf76
KG
840 if (ret < 0) {
841 /*
842 * Some not fully compliant Win apps seem to get
843 * index wrong and have the endpoint number here
844 * rather than the endpoint address (with the
845 * correct direction). Win does let this through,
846 * so we'll not reject it here but leave it to
847 * the device to not break KVM. But we warn.
848 */
849 ret = findintfep(ps->dev, index ^ 0x80);
850 if (ret >= 0)
851 dev_info(&ps->dev->dev,
852 "%s: process %i (%s) requesting ep %02x but needs %02x\n",
853 __func__, task_pid_nr(current),
854 current->comm, index, index ^ 0x80);
855 }
04e482ff 856 if (ret >= 0)
1da177e4
LT
857 ret = checkintf(ps, ret);
858 break;
859
860 case USB_RECIP_INTERFACE:
861 ret = checkintf(ps, index);
862 break;
863 }
864 return ret;
865}
866
2fec32b0
HG
867static struct usb_host_endpoint *ep_to_host_endpoint(struct usb_device *dev,
868 unsigned char ep)
869{
870 if (ep & USB_ENDPOINT_DIR_MASK)
871 return dev->ep_in[ep & USB_ENDPOINT_NUMBER_MASK];
872 else
873 return dev->ep_out[ep & USB_ENDPOINT_NUMBER_MASK];
874}
875
3e75c6de 876static int parse_usbdevfs_streams(struct usb_dev_state *ps,
bcf7f6e3
HG
877 struct usbdevfs_streams __user *streams,
878 unsigned int *num_streams_ret,
879 unsigned int *num_eps_ret,
880 struct usb_host_endpoint ***eps_ret,
881 struct usb_interface **intf_ret)
882{
883 unsigned int i, num_streams, num_eps;
884 struct usb_host_endpoint **eps;
885 struct usb_interface *intf = NULL;
886 unsigned char ep;
887 int ifnum, ret;
888
889 if (get_user(num_streams, &streams->num_streams) ||
890 get_user(num_eps, &streams->num_eps))
891 return -EFAULT;
892
893 if (num_eps < 1 || num_eps > USB_MAXENDPOINTS)
894 return -EINVAL;
895
896 /* The XHCI controller allows max 2 ^ 16 streams */
897 if (num_streams_ret && (num_streams < 2 || num_streams > 65536))
898 return -EINVAL;
899
6da2ec56 900 eps = kmalloc_array(num_eps, sizeof(*eps), GFP_KERNEL);
bcf7f6e3
HG
901 if (!eps)
902 return -ENOMEM;
903
904 for (i = 0; i < num_eps; i++) {
905 if (get_user(ep, &streams->eps[i])) {
906 ret = -EFAULT;
907 goto error;
908 }
909 eps[i] = ep_to_host_endpoint(ps->dev, ep);
910 if (!eps[i]) {
911 ret = -EINVAL;
912 goto error;
913 }
914
915 /* usb_alloc/free_streams operate on an usb_interface */
916 ifnum = findintfep(ps->dev, ep);
917 if (ifnum < 0) {
918 ret = ifnum;
919 goto error;
920 }
921
922 if (i == 0) {
923 ret = checkintf(ps, ifnum);
924 if (ret < 0)
925 goto error;
926 intf = usb_ifnum_to_if(ps->dev, ifnum);
927 } else {
928 /* Verify all eps belong to the same interface */
929 if (ifnum != intf->altsetting->desc.bInterfaceNumber) {
930 ret = -EINVAL;
931 goto error;
932 }
933 }
934 }
935
936 if (num_streams_ret)
937 *num_streams_ret = num_streams;
938 *num_eps_ret = num_eps;
939 *eps_ret = eps;
940 *intf_ret = intf;
941
942 return 0;
943
944error:
945 kfree(eps);
946 return ret;
947}
948
61ad04a8 949static int match_devt(struct device *dev, void *data)
4592bf5a 950{
a80d5ff0 951 return dev->devt == (dev_t) (unsigned long) data;
9f8b17e6 952}
4592bf5a 953
61ad04a8 954static struct usb_device *usbdev_lookup_by_devt(dev_t devt)
9f8b17e6
KS
955{
956 struct device *dev;
957
a80d5ff0
DH
958 dev = bus_find_device(&usb_bus_type, NULL,
959 (void *) (unsigned long) devt, match_devt);
9f8b17e6
KS
960 if (!dev)
961 return NULL;
69ab55d7 962 return to_usb_device(dev);
9f8b17e6 963}
4592bf5a 964
1da177e4
LT
965/*
966 * file operations
967 */
968static int usbdev_open(struct inode *inode, struct file *file)
969{
fbf82fd2 970 struct usb_device *dev = NULL;
9b6f0c4b 971 struct usb_dev_state *ps;
1da177e4
LT
972 int ret;
973
1da177e4 974 ret = -ENOMEM;
d883f52e 975 ps = kzalloc(sizeof(struct usb_dev_state), GFP_KERNEL);
04e482ff 976 if (!ps)
62e299e6 977 goto out_free_ps;
1da177e4 978
01105a24 979 ret = -ENODEV;
61ad04a8 980
62e299e6
AS
981 /* Protect against simultaneous removal or release */
982 mutex_lock(&usbfs_mutex);
983
9f8b17e6 984 /* usbdev device-node */
fbf82fd2 985 if (imajor(inode) == USB_DEVICE_MAJOR)
61ad04a8 986 dev = usbdev_lookup_by_devt(inode->i_rdev);
62e299e6 987
62e299e6
AS
988 mutex_unlock(&usbfs_mutex);
989
990 if (!dev)
991 goto out_free_ps;
992
993 usb_lock_device(dev);
994 if (dev->state == USB_STATE_NOTATTACHED)
995 goto out_unlock_device;
996
94fcda1f 997 ret = usb_autoresume_device(dev);
01d883d4 998 if (ret)
62e299e6 999 goto out_unlock_device;
01d883d4 1000
1da177e4
LT
1001 ps->dev = dev;
1002 ps->file = file;
d883f52e 1003 ps->interface_allowed_mask = 0xFFFFFFFF; /* 32 bits */
1da177e4 1004 spin_lock_init(&ps->lock);
316547fd 1005 INIT_LIST_HEAD(&ps->list);
1da177e4
LT
1006 INIT_LIST_HEAD(&ps->async_pending);
1007 INIT_LIST_HEAD(&ps->async_completed);
f7d34b44 1008 INIT_LIST_HEAD(&ps->memory_list);
1da177e4 1009 init_waitqueue_head(&ps->wait);
2425c08b 1010 ps->disc_pid = get_pid(task_pid(current));
d178bc3a 1011 ps->cred = get_current_cred();
527660a8 1012 smp_wmb();
1da177e4
LT
1013 list_add_tail(&ps->list, &dev->filelist);
1014 file->private_data = ps;
62e299e6 1015 usb_unlock_device(dev);
2da41d5f
AS
1016 snoop(&dev->dev, "opened by process %d: %s\n", task_pid_nr(current),
1017 current->comm);
62e299e6
AS
1018 return ret;
1019
1020 out_unlock_device:
1021 usb_unlock_device(dev);
1022 usb_put_dev(dev);
1023 out_free_ps:
1024 kfree(ps);
4a2a8a2c 1025 return ret;
1da177e4
LT
1026}
1027
1028static int usbdev_release(struct inode *inode, struct file *file)
1029{
9b6f0c4b 1030 struct usb_dev_state *ps = file->private_data;
1da177e4
LT
1031 struct usb_device *dev = ps->dev;
1032 unsigned int ifnum;
6ff10464 1033 struct async *as;
1da177e4
LT
1034
1035 usb_lock_device(dev);
7cbe5dca 1036 usb_hub_release_all_ports(dev, ps);
4a2a8a2c 1037
1da177e4 1038 list_del_init(&ps->list);
4a2a8a2c 1039
1da177e4
LT
1040 for (ifnum = 0; ps->ifclaimed && ifnum < 8*sizeof(ps->ifclaimed);
1041 ifnum++) {
1042 if (test_bit(ifnum, &ps->ifclaimed))
1043 releaseintf(ps, ifnum);
1044 }
1045 destroy_all_async(ps);
94fcda1f 1046 usb_autosuspend_device(dev);
1da177e4
LT
1047 usb_unlock_device(dev);
1048 usb_put_dev(dev);
2425c08b 1049 put_pid(ps->disc_pid);
d178bc3a 1050 put_cred(ps->cred);
6ff10464
AS
1051
1052 as = async_getcompleted(ps);
1053 while (as) {
1054 free_async(as);
1055 as = async_getcompleted(ps);
1056 }
f7d34b44 1057
1da177e4 1058 kfree(ps);
4a2a8a2c 1059 return 0;
1da177e4
LT
1060}
1061
9b6f0c4b 1062static int proc_control(struct usb_dev_state *ps, void __user *arg)
1da177e4
LT
1063{
1064 struct usb_device *dev = ps->dev;
1065 struct usbdevfs_ctrltransfer ctrl;
1066 unsigned int tmo;
1067 unsigned char *tbuf;
ff66e3ce 1068 unsigned wLength;
4c6e8971 1069 int i, pipe, ret;
1da177e4
LT
1070
1071 if (copy_from_user(&ctrl, arg, sizeof(ctrl)))
1072 return -EFAULT;
393cbb51
MD
1073 ret = check_ctrlrecip(ps, ctrl.bRequestType, ctrl.bRequest,
1074 ctrl.wIndex);
04e482ff 1075 if (ret)
1da177e4 1076 return ret;
ff66e3ce
AM
1077 wLength = ctrl.wLength; /* To suppress 64k PAGE_SIZE warning */
1078 if (wLength > PAGE_SIZE)
1da177e4 1079 return -EINVAL;
add1aaea
AS
1080 ret = usbfs_increase_memory_usage(PAGE_SIZE + sizeof(struct urb) +
1081 sizeof(struct usb_ctrlrequest));
1082 if (ret)
1083 return ret;
04e482ff 1084 tbuf = (unsigned char *)__get_free_page(GFP_KERNEL);
add1aaea
AS
1085 if (!tbuf) {
1086 ret = -ENOMEM;
1087 goto done;
1088 }
1da177e4 1089 tmo = ctrl.timeout;
0880aef4
CF
1090 snoop(&dev->dev, "control urb: bRequestType=%02x "
1091 "bRequest=%02x wValue=%04x "
1092 "wIndex=%04x wLength=%04x\n",
c8f2efc8
XR
1093 ctrl.bRequestType, ctrl.bRequest, ctrl.wValue,
1094 ctrl.wIndex, ctrl.wLength);
1da177e4 1095 if (ctrl.bRequestType & 0x80) {
04e482ff
GKH
1096 if (ctrl.wLength && !access_ok(VERIFY_WRITE, ctrl.data,
1097 ctrl.wLength)) {
52fb743d
AS
1098 ret = -EINVAL;
1099 goto done;
1da177e4 1100 }
4c6e8971 1101 pipe = usb_rcvctrlpipe(dev, 0);
0880aef4 1102 snoop_urb(dev, NULL, pipe, ctrl.wLength, tmo, SUBMIT, NULL, 0);
1da177e4
LT
1103
1104 usb_unlock_device(dev);
4c6e8971 1105 i = usb_control_msg(dev, pipe, ctrl.bRequest,
04e482ff
GKH
1106 ctrl.bRequestType, ctrl.wValue, ctrl.wIndex,
1107 tbuf, ctrl.wLength, tmo);
1da177e4 1108 usb_lock_device(dev);
0880aef4 1109 snoop_urb(dev, NULL, pipe, max(i, 0), min(i, 0), COMPLETE,
9d02b426 1110 tbuf, max(i, 0));
1da177e4 1111 if ((i > 0) && ctrl.wLength) {
fe0410c7 1112 if (copy_to_user(ctrl.data, tbuf, i)) {
52fb743d
AS
1113 ret = -EFAULT;
1114 goto done;
1da177e4
LT
1115 }
1116 }
1117 } else {
1118 if (ctrl.wLength) {
1119 if (copy_from_user(tbuf, ctrl.data, ctrl.wLength)) {
52fb743d
AS
1120 ret = -EFAULT;
1121 goto done;
1da177e4
LT
1122 }
1123 }
4c6e8971 1124 pipe = usb_sndctrlpipe(dev, 0);
0880aef4
CF
1125 snoop_urb(dev, NULL, pipe, ctrl.wLength, tmo, SUBMIT,
1126 tbuf, ctrl.wLength);
4c6e8971 1127
1da177e4 1128 usb_unlock_device(dev);
04e482ff
GKH
1129 i = usb_control_msg(dev, usb_sndctrlpipe(dev, 0), ctrl.bRequest,
1130 ctrl.bRequestType, ctrl.wValue, ctrl.wIndex,
1131 tbuf, ctrl.wLength, tmo);
1da177e4 1132 usb_lock_device(dev);
0880aef4 1133 snoop_urb(dev, NULL, pipe, max(i, 0), min(i, 0), COMPLETE, NULL, 0);
1da177e4 1134 }
04e482ff 1135 if (i < 0 && i != -EPIPE) {
1da177e4
LT
1136 dev_printk(KERN_DEBUG, &dev->dev, "usbfs: USBDEVFS_CONTROL "
1137 "failed cmd %s rqt %u rq %u len %u ret %d\n",
1138 current->comm, ctrl.bRequestType, ctrl.bRequest,
1139 ctrl.wLength, i);
1140 }
52fb743d
AS
1141 ret = i;
1142 done:
1143 free_page((unsigned long) tbuf);
add1aaea
AS
1144 usbfs_decrease_memory_usage(PAGE_SIZE + sizeof(struct urb) +
1145 sizeof(struct usb_ctrlrequest));
52fb743d 1146 return ret;
1da177e4
LT
1147}
1148
9b6f0c4b 1149static int proc_bulk(struct usb_dev_state *ps, void __user *arg)
1da177e4
LT
1150{
1151 struct usb_device *dev = ps->dev;
1152 struct usbdevfs_bulktransfer bulk;
1153 unsigned int tmo, len1, pipe;
1154 int len2;
1155 unsigned char *tbuf;
4c6e8971 1156 int i, ret;
1da177e4
LT
1157
1158 if (copy_from_user(&bulk, arg, sizeof(bulk)))
1159 return -EFAULT;
04e482ff
GKH
1160 ret = findintfep(ps->dev, bulk.ep);
1161 if (ret < 0)
1da177e4 1162 return ret;
04e482ff
GKH
1163 ret = checkintf(ps, ret);
1164 if (ret)
1da177e4
LT
1165 return ret;
1166 if (bulk.ep & USB_DIR_IN)
1167 pipe = usb_rcvbulkpipe(dev, bulk.ep & 0x7f);
1168 else
1169 pipe = usb_sndbulkpipe(dev, bulk.ep & 0x7f);
1170 if (!usb_maxpacket(dev, pipe, !(bulk.ep & USB_DIR_IN)))
1171 return -EINVAL;
1172 len1 = bulk.len;
1129d270 1173 if (len1 >= (INT_MAX - sizeof(struct urb)))
1da177e4 1174 return -EINVAL;
add1aaea
AS
1175 ret = usbfs_increase_memory_usage(len1 + sizeof(struct urb));
1176 if (ret)
1177 return ret;
135551ea
KB
1178 tbuf = kmalloc(len1, GFP_KERNEL);
1179 if (!tbuf) {
add1aaea
AS
1180 ret = -ENOMEM;
1181 goto done;
1182 }
1da177e4
LT
1183 tmo = bulk.timeout;
1184 if (bulk.ep & 0x80) {
1185 if (len1 && !access_ok(VERIFY_WRITE, bulk.data, len1)) {
52fb743d
AS
1186 ret = -EINVAL;
1187 goto done;
1da177e4 1188 }
0880aef4 1189 snoop_urb(dev, NULL, pipe, len1, tmo, SUBMIT, NULL, 0);
4c6e8971 1190
1da177e4
LT
1191 usb_unlock_device(dev);
1192 i = usb_bulk_msg(dev, pipe, tbuf, len1, &len2, tmo);
1193 usb_lock_device(dev);
0880aef4 1194 snoop_urb(dev, NULL, pipe, len2, i, COMPLETE, tbuf, len2);
4c6e8971 1195
1da177e4
LT
1196 if (!i && len2) {
1197 if (copy_to_user(bulk.data, tbuf, len2)) {
52fb743d
AS
1198 ret = -EFAULT;
1199 goto done;
1da177e4
LT
1200 }
1201 }
1202 } else {
1203 if (len1) {
1204 if (copy_from_user(tbuf, bulk.data, len1)) {
52fb743d
AS
1205 ret = -EFAULT;
1206 goto done;
1da177e4
LT
1207 }
1208 }
0880aef4 1209 snoop_urb(dev, NULL, pipe, len1, tmo, SUBMIT, tbuf, len1);
4c6e8971 1210
1da177e4
LT
1211 usb_unlock_device(dev);
1212 i = usb_bulk_msg(dev, pipe, tbuf, len1, &len2, tmo);
1213 usb_lock_device(dev);
0880aef4 1214 snoop_urb(dev, NULL, pipe, len2, i, COMPLETE, NULL, 0);
1da177e4 1215 }
52fb743d
AS
1216 ret = (i < 0 ? i : len2);
1217 done:
1da177e4 1218 kfree(tbuf);
add1aaea 1219 usbfs_decrease_memory_usage(len1 + sizeof(struct urb));
52fb743d 1220 return ret;
1da177e4
LT
1221}
1222
f080a51b
AS
1223static void check_reset_of_active_ep(struct usb_device *udev,
1224 unsigned int epnum, char *ioctl_name)
1225{
1226 struct usb_host_endpoint **eps;
1227 struct usb_host_endpoint *ep;
1228
1229 eps = (epnum & USB_DIR_IN) ? udev->ep_in : udev->ep_out;
1230 ep = eps[epnum & 0x0f];
1231 if (ep && !list_empty(&ep->urb_list))
1232 dev_warn(&udev->dev, "Process %d (%s) called USBDEVFS_%s for active endpoint 0x%02x\n",
1233 task_pid_nr(current), current->comm,
1234 ioctl_name, epnum);
1235}
1236
9b6f0c4b 1237static int proc_resetep(struct usb_dev_state *ps, void __user *arg)
1da177e4
LT
1238{
1239 unsigned int ep;
1240 int ret;
1241
1242 if (get_user(ep, (unsigned int __user *)arg))
1243 return -EFAULT;
04e482ff
GKH
1244 ret = findintfep(ps->dev, ep);
1245 if (ret < 0)
1da177e4 1246 return ret;
04e482ff
GKH
1247 ret = checkintf(ps, ret);
1248 if (ret)
1da177e4 1249 return ret;
f080a51b 1250 check_reset_of_active_ep(ps->dev, ep, "RESETEP");
3444b26a 1251 usb_reset_endpoint(ps->dev, ep);
1da177e4
LT
1252 return 0;
1253}
1254
9b6f0c4b 1255static int proc_clearhalt(struct usb_dev_state *ps, void __user *arg)
1da177e4
LT
1256{
1257 unsigned int ep;
1258 int pipe;
1259 int ret;
1260
1261 if (get_user(ep, (unsigned int __user *)arg))
1262 return -EFAULT;
04e482ff
GKH
1263 ret = findintfep(ps->dev, ep);
1264 if (ret < 0)
1da177e4 1265 return ret;
04e482ff
GKH
1266 ret = checkintf(ps, ret);
1267 if (ret)
1da177e4 1268 return ret;
f080a51b 1269 check_reset_of_active_ep(ps->dev, ep, "CLEAR_HALT");
1da177e4 1270 if (ep & USB_DIR_IN)
04e482ff
GKH
1271 pipe = usb_rcvbulkpipe(ps->dev, ep & 0x7f);
1272 else
1273 pipe = usb_sndbulkpipe(ps->dev, ep & 0x7f);
1da177e4
LT
1274
1275 return usb_clear_halt(ps->dev, pipe);
1276}
1da177e4 1277
9b6f0c4b 1278static int proc_getdriver(struct usb_dev_state *ps, void __user *arg)
1da177e4
LT
1279{
1280 struct usbdevfs_getdriver gd;
1281 struct usb_interface *intf;
1282 int ret;
1283
1284 if (copy_from_user(&gd, arg, sizeof(gd)))
1285 return -EFAULT;
1da177e4
LT
1286 intf = usb_ifnum_to_if(ps->dev, gd.interface);
1287 if (!intf || !intf->dev.driver)
1288 ret = -ENODATA;
1289 else {
b11b2e1b 1290 strlcpy(gd.driver, intf->dev.driver->name,
1da177e4
LT
1291 sizeof(gd.driver));
1292 ret = (copy_to_user(arg, &gd, sizeof(gd)) ? -EFAULT : 0);
1293 }
1da177e4
LT
1294 return ret;
1295}
1296
9b6f0c4b 1297static int proc_connectinfo(struct usb_dev_state *ps, void __user *arg)
1da177e4 1298{
681fef83
KL
1299 struct usbdevfs_connectinfo ci;
1300
1301 memset(&ci, 0, sizeof(ci));
1302 ci.devnum = ps->dev->devnum;
1303 ci.slow = ps->dev->speed == USB_SPEED_LOW;
1da177e4 1304
1da177e4
LT
1305 if (copy_to_user(arg, &ci, sizeof(ci)))
1306 return -EFAULT;
1307 return 0;
1308}
1309
9b6f0c4b 1310static int proc_resetdevice(struct usb_dev_state *ps)
1da177e4 1311{
d883f52e
RG
1312 struct usb_host_config *actconfig = ps->dev->actconfig;
1313 struct usb_interface *interface;
1314 int i, number;
1315
1316 /* Don't allow a device reset if the process has dropped the
1317 * privilege to do such things and any of the interfaces are
1318 * currently claimed.
1319 */
1320 if (ps->privileges_dropped && actconfig) {
1321 for (i = 0; i < actconfig->desc.bNumInterfaces; ++i) {
1322 interface = actconfig->interface[i];
1323 number = interface->cur_altsetting->desc.bInterfaceNumber;
1324 if (usb_interface_claimed(interface) &&
1325 !test_bit(number, &ps->ifclaimed)) {
1326 dev_warn(&ps->dev->dev,
1327 "usbfs: interface %d claimed by %s while '%s' resets device\n",
1328 number, interface->dev.driver->name, current->comm);
1329 return -EACCES;
1330 }
1331 }
1332 }
1333
742120c6 1334 return usb_reset_device(ps->dev);
1da177e4
LT
1335}
1336
9b6f0c4b 1337static int proc_setintf(struct usb_dev_state *ps, void __user *arg)
1da177e4
LT
1338{
1339 struct usbdevfs_setinterface setintf;
1340 int ret;
1341
1342 if (copy_from_user(&setintf, arg, sizeof(setintf)))
1343 return -EFAULT;
135551ea
KB
1344 ret = checkintf(ps, setintf.interface);
1345 if (ret)
1da177e4 1346 return ret;
5ec9c177
HG
1347
1348 destroy_async_on_interface(ps, setintf.interface);
1349
1da177e4
LT
1350 return usb_set_interface(ps->dev, setintf.interface,
1351 setintf.altsetting);
1352}
1353
9b6f0c4b 1354static int proc_setconfig(struct usb_dev_state *ps, void __user *arg)
1da177e4 1355{
3f141e2a 1356 int u;
1da177e4 1357 int status = 0;
04e482ff 1358 struct usb_host_config *actconfig;
1da177e4 1359
3f141e2a 1360 if (get_user(u, (int __user *)arg))
1da177e4
LT
1361 return -EFAULT;
1362
04e482ff
GKH
1363 actconfig = ps->dev->actconfig;
1364
1365 /* Don't touch the device if any interfaces are claimed.
1366 * It could interfere with other drivers' operations, and if
1da177e4
LT
1367 * an interface is claimed by usbfs it could easily deadlock.
1368 */
04e482ff
GKH
1369 if (actconfig) {
1370 int i;
1371
1372 for (i = 0; i < actconfig->desc.bNumInterfaces; ++i) {
1373 if (usb_interface_claimed(actconfig->interface[i])) {
1374 dev_warn(&ps->dev->dev,
72ebddb5 1375 "usbfs: interface %d claimed by %s "
1da177e4
LT
1376 "while '%s' sets config #%d\n",
1377 actconfig->interface[i]
1378 ->cur_altsetting
1379 ->desc.bInterfaceNumber,
72ebddb5
DB
1380 actconfig->interface[i]
1381 ->dev.driver->name,
1da177e4 1382 current->comm, u);
04e482ff 1383 status = -EBUSY;
1da177e4 1384 break;
1da177e4 1385 }
04e482ff
GKH
1386 }
1387 }
1da177e4
LT
1388
1389 /* SET_CONFIGURATION is often abused as a "cheap" driver reset,
1390 * so avoid usb_set_configuration()'s kick to sysfs
1391 */
1392 if (status == 0) {
1393 if (actconfig && actconfig->desc.bConfigurationValue == u)
1394 status = usb_reset_configuration(ps->dev);
1395 else
1396 status = usb_set_configuration(ps->dev, u);
1397 }
1398
1399 return status;
1400}
1401
f7d34b44
SG
1402static struct usb_memory *
1403find_memory_area(struct usb_dev_state *ps, const struct usbdevfs_urb *uurb)
1404{
1405 struct usb_memory *usbm = NULL, *iter;
1406 unsigned long flags;
1407 unsigned long uurb_start = (unsigned long)uurb->buffer;
1408
1409 spin_lock_irqsave(&ps->lock, flags);
1410 list_for_each_entry(iter, &ps->memory_list, memlist) {
1411 if (uurb_start >= iter->vm_start &&
1412 uurb_start < iter->vm_start + iter->size) {
1413 if (uurb->buffer_length > iter->vm_start + iter->size -
1414 uurb_start) {
1415 usbm = ERR_PTR(-EINVAL);
1416 } else {
1417 usbm = iter;
1418 usbm->urb_use_count++;
1419 }
1420 break;
1421 }
1422 }
1423 spin_unlock_irqrestore(&ps->lock, flags);
1424 return usbm;
1425}
1426
9b6f0c4b 1427static int proc_do_submiturb(struct usb_dev_state *ps, struct usbdevfs_urb *uurb,
04e482ff
GKH
1428 struct usbdevfs_iso_packet_desc __user *iso_frame_desc,
1429 void __user *arg)
1da177e4
LT
1430{
1431 struct usbdevfs_iso_packet_desc *isopkt = NULL;
1432 struct usb_host_endpoint *ep;
52fb743d 1433 struct async *as = NULL;
1da177e4
LT
1434 struct usb_ctrlrequest *dr = NULL;
1435 unsigned int u, totlen, isofrmlen;
3d97ff63 1436 int i, ret, is_in, num_sgs = 0, ifnum = -1;
b2d03eb5 1437 int number_of_packets = 0;
948cd8c1 1438 unsigned int stream_id = 0;
3d97ff63 1439 void *buf;
446f666d 1440 unsigned long mask = USBDEVFS_URB_SHORT_NOT_OK |
01c6460f 1441 USBDEVFS_URB_BULK_CONTINUATION |
14722ef4
AS
1442 USBDEVFS_URB_NO_FSBR |
1443 USBDEVFS_URB_ZERO_PACKET |
446f666d
ON
1444 USBDEVFS_URB_NO_INTERRUPT;
1445 /* USBDEVFS_URB_ISO_ASAP is a special case */
1446 if (uurb->type == USBDEVFS_URB_TYPE_ISO)
1447 mask |= USBDEVFS_URB_ISO_ASAP;
1448
1449 if (uurb->flags & ~mask)
1450 return -EINVAL;
1451
57999d11
DC
1452 if ((unsigned int)uurb->buffer_length >= USBFS_XFER_MAX)
1453 return -EINVAL;
9180135b 1454 if (uurb->buffer_length > 0 && !uurb->buffer)
1da177e4 1455 return -EINVAL;
04e482ff
GKH
1456 if (!(uurb->type == USBDEVFS_URB_TYPE_CONTROL &&
1457 (uurb->endpoint & ~USB_ENDPOINT_DIR_MASK) == 0)) {
1458 ifnum = findintfep(ps->dev, uurb->endpoint);
1459 if (ifnum < 0)
1da177e4 1460 return ifnum;
04e482ff
GKH
1461 ret = checkintf(ps, ifnum);
1462 if (ret)
1da177e4
LT
1463 return ret;
1464 }
2fec32b0 1465 ep = ep_to_host_endpoint(ps->dev, uurb->endpoint);
1da177e4
LT
1466 if (!ep)
1467 return -ENOENT;
2fec32b0 1468 is_in = (uurb->endpoint & USB_ENDPOINT_DIR_MASK) != 0;
add1aaea
AS
1469
1470 u = 0;
f355e830 1471 switch (uurb->type) {
1da177e4 1472 case USBDEVFS_URB_TYPE_CONTROL:
93cf9b90 1473 if (!usb_endpoint_xfer_control(&ep->desc))
1da177e4 1474 return -EINVAL;
add1aaea
AS
1475 /* min 8 byte setup packet */
1476 if (uurb->buffer_length < 8)
1da177e4 1477 return -EINVAL;
04e482ff
GKH
1478 dr = kmalloc(sizeof(struct usb_ctrlrequest), GFP_KERNEL);
1479 if (!dr)
1da177e4
LT
1480 return -ENOMEM;
1481 if (copy_from_user(dr, uurb->buffer, 8)) {
52fb743d
AS
1482 ret = -EFAULT;
1483 goto error;
1da177e4
LT
1484 }
1485 if (uurb->buffer_length < (le16_to_cpup(&dr->wLength) + 8)) {
52fb743d
AS
1486 ret = -EINVAL;
1487 goto error;
1da177e4 1488 }
393cbb51 1489 ret = check_ctrlrecip(ps, dr->bRequestType, dr->bRequest,
04e482ff 1490 le16_to_cpup(&dr->wIndex));
52fb743d
AS
1491 if (ret)
1492 goto error;
1da177e4
LT
1493 uurb->buffer_length = le16_to_cpup(&dr->wLength);
1494 uurb->buffer += 8;
93cf9b90
AS
1495 if ((dr->bRequestType & USB_DIR_IN) && uurb->buffer_length) {
1496 is_in = 1;
1497 uurb->endpoint |= USB_DIR_IN;
1498 } else {
1499 is_in = 0;
1500 uurb->endpoint &= ~USB_DIR_IN;
1501 }
0880aef4
CF
1502 snoop(&ps->dev->dev, "control urb: bRequestType=%02x "
1503 "bRequest=%02x wValue=%04x "
1504 "wIndex=%04x wLength=%04x\n",
1505 dr->bRequestType, dr->bRequest,
1506 __le16_to_cpup(&dr->wValue),
1507 __le16_to_cpup(&dr->wIndex),
1508 __le16_to_cpup(&dr->wLength));
add1aaea 1509 u = sizeof(struct usb_ctrlrequest);
1da177e4
LT
1510 break;
1511
1512 case USBDEVFS_URB_TYPE_BULK:
93cf9b90 1513 switch (usb_endpoint_type(&ep->desc)) {
1da177e4
LT
1514 case USB_ENDPOINT_XFER_CONTROL:
1515 case USB_ENDPOINT_XFER_ISOC:
1516 return -EINVAL;
f661c6f8
AS
1517 case USB_ENDPOINT_XFER_INT:
1518 /* allow single-shot interrupt transfers */
1519 uurb->type = USBDEVFS_URB_TYPE_INTERRUPT;
1520 goto interrupt_urb;
1da177e4 1521 }
3d97ff63
HG
1522 num_sgs = DIV_ROUND_UP(uurb->buffer_length, USB_SG_SIZE);
1523 if (num_sgs == 1 || num_sgs > ps->dev->bus->sg_tablesize)
1524 num_sgs = 0;
948cd8c1
HG
1525 if (ep->streams)
1526 stream_id = uurb->stream_id;
1da177e4
LT
1527 break;
1528
f661c6f8
AS
1529 case USBDEVFS_URB_TYPE_INTERRUPT:
1530 if (!usb_endpoint_xfer_int(&ep->desc))
1531 return -EINVAL;
1532 interrupt_urb:
f661c6f8
AS
1533 break;
1534
1da177e4
LT
1535 case USBDEVFS_URB_TYPE_ISO:
1536 /* arbitrary limit */
04e482ff
GKH
1537 if (uurb->number_of_packets < 1 ||
1538 uurb->number_of_packets > 128)
1da177e4 1539 return -EINVAL;
93cf9b90 1540 if (!usb_endpoint_xfer_isoc(&ep->desc))
1da177e4 1541 return -EINVAL;
b2d03eb5 1542 number_of_packets = uurb->number_of_packets;
04e482ff 1543 isofrmlen = sizeof(struct usbdevfs_iso_packet_desc) *
b2d03eb5 1544 number_of_packets;
73a02d32
RP
1545 isopkt = memdup_user(iso_frame_desc, isofrmlen);
1546 if (IS_ERR(isopkt)) {
1547 ret = PTR_ERR(isopkt);
1548 isopkt = NULL;
52fb743d 1549 goto error;
1da177e4 1550 }
b2d03eb5 1551 for (totlen = u = 0; u < number_of_packets; u++) {
e2e2f0ea
FM
1552 /*
1553 * arbitrary limit need for USB 3.0
1554 * bMaxBurst (0~15 allowed, 1~16 packets)
1555 * bmAttributes (bit 1:0, mult 0~2, 1~3 packets)
1556 * sizemax: 1024 * 16 * 3 = 49152
1557 */
1558 if (isopkt[u].length > 49152) {
52fb743d
AS
1559 ret = -EINVAL;
1560 goto error;
1da177e4
LT
1561 }
1562 totlen += isopkt[u].length;
1563 }
add1aaea 1564 u *= sizeof(struct usb_iso_packet_descriptor);
845d584f 1565 uurb->buffer_length = totlen;
1da177e4
LT
1566 break;
1567
1da177e4
LT
1568 default:
1569 return -EINVAL;
1570 }
add1aaea 1571
9180135b
AS
1572 if (uurb->buffer_length > 0 &&
1573 !access_ok(is_in ? VERIFY_WRITE : VERIFY_READ,
1574 uurb->buffer, uurb->buffer_length)) {
52fb743d
AS
1575 ret = -EFAULT;
1576 goto error;
1da177e4 1577 }
b2d03eb5 1578 as = alloc_async(number_of_packets);
9180135b 1579 if (!as) {
52fb743d
AS
1580 ret = -ENOMEM;
1581 goto error;
1da177e4 1582 }
3d97ff63 1583
f7d34b44
SG
1584 as->usbm = find_memory_area(ps, uurb);
1585 if (IS_ERR(as->usbm)) {
1586 ret = PTR_ERR(as->usbm);
1587 as->usbm = NULL;
1588 goto error;
1589 }
1590
1591 /* do not use SG buffers when memory mapped segments
1592 * are in use
1593 */
1594 if (as->usbm)
1595 num_sgs = 0;
1596
3d97ff63
HG
1597 u += sizeof(struct async) + sizeof(struct urb) + uurb->buffer_length +
1598 num_sgs * sizeof(struct scatterlist);
add1aaea
AS
1599 ret = usbfs_increase_memory_usage(u);
1600 if (ret)
1601 goto error;
1602 as->mem_usage = u;
1603
3d97ff63 1604 if (num_sgs) {
6da2ec56
KC
1605 as->urb->sg = kmalloc_array(num_sgs,
1606 sizeof(struct scatterlist),
1607 GFP_KERNEL);
3d97ff63
HG
1608 if (!as->urb->sg) {
1609 ret = -ENOMEM;
1610 goto error;
1611 }
1612 as->urb->num_sgs = num_sgs;
1613 sg_init_table(as->urb->sg, as->urb->num_sgs);
1614
1615 totlen = uurb->buffer_length;
1616 for (i = 0; i < as->urb->num_sgs; i++) {
1617 u = (totlen > USB_SG_SIZE) ? USB_SG_SIZE : totlen;
1618 buf = kmalloc(u, GFP_KERNEL);
1619 if (!buf) {
1620 ret = -ENOMEM;
1621 goto error;
1622 }
1623 sg_set_buf(&as->urb->sg[i], buf, u);
1624
1625 if (!is_in) {
1626 if (copy_from_user(buf, uurb->buffer, u)) {
1627 ret = -EFAULT;
1628 goto error;
1629 }
01463900 1630 uurb->buffer += u;
3d97ff63
HG
1631 }
1632 totlen -= u;
1633 }
1634 } else if (uurb->buffer_length > 0) {
f7d34b44
SG
1635 if (as->usbm) {
1636 unsigned long uurb_start = (unsigned long)uurb->buffer;
3d97ff63 1637
f7d34b44
SG
1638 as->urb->transfer_buffer = as->usbm->mem +
1639 (uurb_start - as->usbm->vm_start);
1640 } else {
1641 as->urb->transfer_buffer = kmalloc(uurb->buffer_length,
1642 GFP_KERNEL);
1643 if (!as->urb->transfer_buffer) {
1644 ret = -ENOMEM;
3d97ff63
HG
1645 goto error;
1646 }
f7d34b44
SG
1647 if (!is_in) {
1648 if (copy_from_user(as->urb->transfer_buffer,
1649 uurb->buffer,
1650 uurb->buffer_length)) {
1651 ret = -EFAULT;
1652 goto error;
1653 }
1654 } else if (uurb->type == USBDEVFS_URB_TYPE_ISO) {
1655 /*
1656 * Isochronous input data may end up being
1657 * discontiguous if some of the packets are
1658 * short. Clear the buffer so that the gaps
1659 * don't leak kernel data to userspace.
1660 */
1661 memset(as->urb->transfer_buffer, 0,
1662 uurb->buffer_length);
1663 }
3d97ff63 1664 }
9180135b 1665 }
04e482ff
GKH
1666 as->urb->dev = ps->dev;
1667 as->urb->pipe = (uurb->type << 30) |
93cf9b90
AS
1668 __create_pipe(ps->dev, uurb->endpoint & 0xf) |
1669 (uurb->endpoint & USB_DIR_IN);
14722ef4
AS
1670
1671 /* This tedious sequence is necessary because the URB_* flags
1672 * are internal to the kernel and subject to change, whereas
1673 * the USBDEVFS_URB_* flags are a user API and must not be changed.
1674 */
1675 u = (is_in ? URB_DIR_IN : URB_DIR_OUT);
1676 if (uurb->flags & USBDEVFS_URB_ISO_ASAP)
1677 u |= URB_ISO_ASAP;
d310d05f 1678 if (uurb->flags & USBDEVFS_URB_SHORT_NOT_OK && is_in)
14722ef4 1679 u |= URB_SHORT_NOT_OK;
14722ef4
AS
1680 if (uurb->flags & USBDEVFS_URB_ZERO_PACKET)
1681 u |= URB_ZERO_PACKET;
1682 if (uurb->flags & USBDEVFS_URB_NO_INTERRUPT)
1683 u |= URB_NO_INTERRUPT;
1684 as->urb->transfer_flags = u;
1685
1da177e4 1686 as->urb->transfer_buffer_length = uurb->buffer_length;
04e482ff 1687 as->urb->setup_packet = (unsigned char *)dr;
52fb743d 1688 dr = NULL;
1da177e4 1689 as->urb->start_frame = uurb->start_frame;
b2d03eb5 1690 as->urb->number_of_packets = number_of_packets;
948cd8c1 1691 as->urb->stream_id = stream_id;
53e5f36f
AS
1692
1693 if (ep->desc.bInterval) {
1694 if (uurb->type == USBDEVFS_URB_TYPE_ISO ||
1695 ps->dev->speed == USB_SPEED_HIGH ||
1696 ps->dev->speed >= USB_SPEED_SUPER)
1697 as->urb->interval = 1 <<
1698 min(15, ep->desc.bInterval - 1);
1699 else
1700 as->urb->interval = ep->desc.bInterval;
1701 }
1702
04e482ff
GKH
1703 as->urb->context = as;
1704 as->urb->complete = async_completed;
b2d03eb5 1705 for (totlen = u = 0; u < number_of_packets; u++) {
1da177e4
LT
1706 as->urb->iso_frame_desc[u].offset = totlen;
1707 as->urb->iso_frame_desc[u].length = isopkt[u].length;
1708 totlen += isopkt[u].length;
1709 }
6fd19f4b 1710 kfree(isopkt);
52fb743d 1711 isopkt = NULL;
1da177e4 1712 as->ps = ps;
04e482ff 1713 as->userurb = arg;
f7d34b44
SG
1714 if (as->usbm) {
1715 unsigned long uurb_start = (unsigned long)uurb->buffer;
1716
1717 as->urb->transfer_flags |= URB_NO_TRANSFER_DMA_MAP;
1718 as->urb->transfer_dma = as->usbm->dma_handle +
1719 (uurb_start - as->usbm->vm_start);
1720 } else if (is_in && uurb->buffer_length > 0)
1da177e4 1721 as->userbuffer = uurb->buffer;
1da177e4
LT
1722 as->signr = uurb->signr;
1723 as->ifnum = ifnum;
2425c08b 1724 as->pid = get_pid(task_pid(current));
d178bc3a 1725 as->cred = get_current_cred();
4c6e8971 1726 snoop_urb(ps->dev, as->userurb, as->urb->pipe,
0880aef4 1727 as->urb->transfer_buffer_length, 0, SUBMIT,
3d97ff63
HG
1728 NULL, 0);
1729 if (!is_in)
1730 snoop_urb_data(as->urb, as->urb->transfer_buffer_length);
1731
04e482ff 1732 async_newpending(as);
01c6460f
AS
1733
1734 if (usb_endpoint_xfer_bulk(&ep->desc)) {
1735 spin_lock_irq(&ps->lock);
1736
1737 /* Not exactly the endpoint address; the direction bit is
1738 * shifted to the 0x10 position so that the value will be
1739 * between 0 and 31.
1740 */
1741 as->bulk_addr = usb_endpoint_num(&ep->desc) |
1742 ((ep->desc.bEndpointAddress & USB_ENDPOINT_DIR_MASK)
1743 >> 3);
1744
1745 /* If this bulk URB is the start of a new transfer, re-enable
1746 * the endpoint. Otherwise mark it as a continuation URB.
1747 */
1748 if (uurb->flags & USBDEVFS_URB_BULK_CONTINUATION)
1749 as->bulk_status = AS_CONTINUATION;
1750 else
1751 ps->disabled_bulk_eps &= ~(1 << as->bulk_addr);
1752
1753 /* Don't accept continuation URBs if the endpoint is
1754 * disabled because of an earlier error.
1755 */
1756 if (ps->disabled_bulk_eps & (1 << as->bulk_addr))
1757 ret = -EREMOTEIO;
1758 else
1759 ret = usb_submit_urb(as->urb, GFP_ATOMIC);
1760 spin_unlock_irq(&ps->lock);
1761 } else {
1762 ret = usb_submit_urb(as->urb, GFP_KERNEL);
1763 }
1764
1765 if (ret) {
04e482ff
GKH
1766 dev_printk(KERN_DEBUG, &ps->dev->dev,
1767 "usbfs: usb_submit_urb returned %d\n", ret);
4c6e8971 1768 snoop_urb(ps->dev, as->userurb, as->urb->pipe,
0880aef4 1769 0, ret, COMPLETE, NULL, 0);
04e482ff 1770 async_removepending(as);
52fb743d 1771 goto error;
04e482ff
GKH
1772 }
1773 return 0;
52fb743d
AS
1774
1775 error:
f7d34b44
SG
1776 if (as && as->usbm)
1777 dec_usb_memory_use_count(as->usbm, &as->usbm->urb_use_count);
52fb743d
AS
1778 kfree(isopkt);
1779 kfree(dr);
1780 if (as)
1781 free_async(as);
1782 return ret;
1da177e4
LT
1783}
1784
9b6f0c4b 1785static int proc_submiturb(struct usb_dev_state *ps, void __user *arg)
1da177e4
LT
1786{
1787 struct usbdevfs_urb uurb;
1788
1789 if (copy_from_user(&uurb, arg, sizeof(uurb)))
1790 return -EFAULT;
1791
04e482ff
GKH
1792 return proc_do_submiturb(ps, &uurb,
1793 (((struct usbdevfs_urb __user *)arg)->iso_frame_desc),
1794 arg);
1da177e4
LT
1795}
1796
9b6f0c4b 1797static int proc_unlinkurb(struct usb_dev_state *ps, void __user *arg)
1da177e4 1798{
4e09dcf2 1799 struct urb *urb;
1da177e4 1800 struct async *as;
4e09dcf2 1801 unsigned long flags;
1da177e4 1802
4e09dcf2 1803 spin_lock_irqsave(&ps->lock, flags);
1da177e4 1804 as = async_getpending(ps, arg);
4e09dcf2
HL
1805 if (!as) {
1806 spin_unlock_irqrestore(&ps->lock, flags);
1da177e4 1807 return -EINVAL;
4e09dcf2
HL
1808 }
1809
1810 urb = as->urb;
1811 usb_get_urb(urb);
1812 spin_unlock_irqrestore(&ps->lock, flags);
1813
1814 usb_kill_urb(urb);
1815 usb_put_urb(urb);
1816
1da177e4
LT
1817 return 0;
1818}
1819
2ef47001
AS
1820static void compute_isochronous_actual_length(struct urb *urb)
1821{
1822 unsigned int i;
1823
1824 if (urb->number_of_packets > 0) {
1825 urb->actual_length = 0;
1826 for (i = 0; i < urb->number_of_packets; i++)
1827 urb->actual_length +=
1828 urb->iso_frame_desc[i].actual_length;
1829 }
1830}
1831
1da177e4
LT
1832static int processcompl(struct async *as, void __user * __user *arg)
1833{
1834 struct urb *urb = as->urb;
1835 struct usbdevfs_urb __user *userurb = as->userurb;
1836 void __user *addr = as->userurb;
1837 unsigned int i;
1838
2ef47001 1839 compute_isochronous_actual_length(urb);
7152b592 1840 if (as->userbuffer && urb->actual_length) {
3d97ff63 1841 if (copy_urb_data_to_user(as->userbuffer, urb))
d794a021 1842 goto err_out;
7152b592 1843 }
e015268d 1844 if (put_user(as->status, &userurb->status))
d794a021 1845 goto err_out;
1da177e4 1846 if (put_user(urb->actual_length, &userurb->actual_length))
d794a021 1847 goto err_out;
1da177e4 1848 if (put_user(urb->error_count, &userurb->error_count))
d794a021 1849 goto err_out;
1da177e4 1850
93cf9b90 1851 if (usb_endpoint_xfer_isoc(&urb->ep->desc)) {
668a9541
CL
1852 for (i = 0; i < urb->number_of_packets; i++) {
1853 if (put_user(urb->iso_frame_desc[i].actual_length,
1854 &userurb->iso_frame_desc[i].actual_length))
d794a021 1855 goto err_out;
668a9541
CL
1856 if (put_user(urb->iso_frame_desc[i].status,
1857 &userurb->iso_frame_desc[i].status))
d794a021 1858 goto err_out;
668a9541 1859 }
1da177e4
LT
1860 }
1861
1da177e4
LT
1862 if (put_user(addr, (void __user * __user *)arg))
1863 return -EFAULT;
1864 return 0;
d794a021
ON
1865
1866err_out:
d794a021 1867 return -EFAULT;
1da177e4
LT
1868}
1869
9b6f0c4b 1870static struct async *reap_as(struct usb_dev_state *ps)
1da177e4 1871{
04e482ff 1872 DECLARE_WAITQUEUE(wait, current);
1da177e4
LT
1873 struct async *as = NULL;
1874 struct usb_device *dev = ps->dev;
1875
1876 add_wait_queue(&ps->wait, &wait);
1877 for (;;) {
1878 __set_current_state(TASK_INTERRUPTIBLE);
04e482ff 1879 as = async_getcompleted(ps);
3f2cee73 1880 if (as || !connected(ps))
1da177e4
LT
1881 break;
1882 if (signal_pending(current))
1883 break;
1884 usb_unlock_device(dev);
1885 schedule();
1886 usb_lock_device(dev);
1887 }
1888 remove_wait_queue(&ps->wait, &wait);
1889 set_current_state(TASK_RUNNING);
1890 return as;
1891}
1892
9b6f0c4b 1893static int proc_reapurb(struct usb_dev_state *ps, void __user *arg)
1da177e4
LT
1894{
1895 struct async *as = reap_as(ps);
a016a816 1896
ddeee0b2 1897 if (as) {
a016a816
AS
1898 int retval;
1899
2f964780 1900 snoop(&ps->dev->dev, "reap %pK\n", as->userurb);
a016a816 1901 retval = processcompl(as, (void __user * __user *)arg);
ddeee0b2
LT
1902 free_async(as);
1903 return retval;
1904 }
1da177e4
LT
1905 if (signal_pending(current))
1906 return -EINTR;
3f2cee73 1907 return -ENODEV;
1da177e4
LT
1908}
1909
9b6f0c4b 1910static int proc_reapurbnonblock(struct usb_dev_state *ps, void __user *arg)
1da177e4 1911{
ddeee0b2 1912 int retval;
1da177e4
LT
1913 struct async *as;
1914
ddeee0b2 1915 as = async_getcompleted(ps);
ddeee0b2 1916 if (as) {
2f964780 1917 snoop(&ps->dev->dev, "reap %pK\n", as->userurb);
ddeee0b2
LT
1918 retval = processcompl(as, (void __user * __user *)arg);
1919 free_async(as);
3f2cee73
AS
1920 } else {
1921 retval = (connected(ps) ? -EAGAIN : -ENODEV);
ddeee0b2
LT
1922 }
1923 return retval;
1da177e4
LT
1924}
1925
1926#ifdef CONFIG_COMPAT
9b6f0c4b 1927static int proc_control_compat(struct usb_dev_state *ps,
637e8a60
AB
1928 struct usbdevfs_ctrltransfer32 __user *p32)
1929{
5b32c385
MB
1930 struct usbdevfs_ctrltransfer __user *p;
1931 __u32 udata;
1932 p = compat_alloc_user_space(sizeof(*p));
1933 if (copy_in_user(p, p32, (sizeof(*p32) - sizeof(compat_caddr_t))) ||
1934 get_user(udata, &p32->data) ||
637e8a60
AB
1935 put_user(compat_ptr(udata), &p->data))
1936 return -EFAULT;
5b32c385 1937 return proc_control(ps, p);
637e8a60
AB
1938}
1939
9b6f0c4b 1940static int proc_bulk_compat(struct usb_dev_state *ps,
637e8a60
AB
1941 struct usbdevfs_bulktransfer32 __user *p32)
1942{
06793f2d
MB
1943 struct usbdevfs_bulktransfer __user *p;
1944 compat_uint_t n;
1945 compat_caddr_t addr;
637e8a60 1946
06793f2d 1947 p = compat_alloc_user_space(sizeof(*p));
637e8a60 1948
06793f2d
MB
1949 if (get_user(n, &p32->ep) || put_user(n, &p->ep) ||
1950 get_user(n, &p32->len) || put_user(n, &p->len) ||
1951 get_user(n, &p32->timeout) || put_user(n, &p->timeout) ||
1952 get_user(addr, &p32->data) || put_user(compat_ptr(addr), &p->data))
1953 return -EFAULT;
637e8a60 1954
06793f2d 1955 return proc_bulk(ps, p);
637e8a60 1956}
9b6f0c4b 1957static int proc_disconnectsignal_compat(struct usb_dev_state *ps, void __user *arg)
637e8a60
AB
1958{
1959 struct usbdevfs_disconnectsignal32 ds;
1960
1961 if (copy_from_user(&ds, arg, sizeof(ds)))
1962 return -EFAULT;
1963 ps->discsignr = ds.signr;
1964 ps->disccontext = compat_ptr(ds.context);
1965 return 0;
1966}
1da177e4
LT
1967
1968static int get_urb32(struct usbdevfs_urb *kurb,
1969 struct usbdevfs_urb32 __user *uurb)
1970{
cc1a7c4b
AV
1971 struct usbdevfs_urb32 urb32;
1972 if (copy_from_user(&urb32, uurb, sizeof(*uurb)))
1da177e4 1973 return -EFAULT;
cc1a7c4b
AV
1974 kurb->type = urb32.type;
1975 kurb->endpoint = urb32.endpoint;
1976 kurb->status = urb32.status;
1977 kurb->flags = urb32.flags;
1978 kurb->buffer = compat_ptr(urb32.buffer);
1979 kurb->buffer_length = urb32.buffer_length;
1980 kurb->actual_length = urb32.actual_length;
1981 kurb->start_frame = urb32.start_frame;
1982 kurb->number_of_packets = urb32.number_of_packets;
1983 kurb->error_count = urb32.error_count;
1984 kurb->signr = urb32.signr;
1985 kurb->usercontext = compat_ptr(urb32.usercontext);
1da177e4
LT
1986 return 0;
1987}
1988
9b6f0c4b 1989static int proc_submiturb_compat(struct usb_dev_state *ps, void __user *arg)
1da177e4
LT
1990{
1991 struct usbdevfs_urb uurb;
1992
04e482ff 1993 if (get_urb32(&uurb, (struct usbdevfs_urb32 __user *)arg))
1da177e4
LT
1994 return -EFAULT;
1995
04e482ff
GKH
1996 return proc_do_submiturb(ps, &uurb,
1997 ((struct usbdevfs_urb32 __user *)arg)->iso_frame_desc,
1998 arg);
1da177e4
LT
1999}
2000
2001static int processcompl_compat(struct async *as, void __user * __user *arg)
2002{
2003 struct urb *urb = as->urb;
2004 struct usbdevfs_urb32 __user *userurb = as->userurb;
2005 void __user *addr = as->userurb;
2006 unsigned int i;
2007
2ef47001 2008 compute_isochronous_actual_length(urb);
2102e06a 2009 if (as->userbuffer && urb->actual_length) {
3d97ff63 2010 if (copy_urb_data_to_user(as->userbuffer, urb))
1da177e4 2011 return -EFAULT;
2102e06a 2012 }
e015268d 2013 if (put_user(as->status, &userurb->status))
1da177e4
LT
2014 return -EFAULT;
2015 if (put_user(urb->actual_length, &userurb->actual_length))
2016 return -EFAULT;
2017 if (put_user(urb->error_count, &userurb->error_count))
2018 return -EFAULT;
2019
93cf9b90 2020 if (usb_endpoint_xfer_isoc(&urb->ep->desc)) {
668a9541
CL
2021 for (i = 0; i < urb->number_of_packets; i++) {
2022 if (put_user(urb->iso_frame_desc[i].actual_length,
2023 &userurb->iso_frame_desc[i].actual_length))
2024 return -EFAULT;
2025 if (put_user(urb->iso_frame_desc[i].status,
2026 &userurb->iso_frame_desc[i].status))
2027 return -EFAULT;
2028 }
1da177e4
LT
2029 }
2030
c714de5d 2031 if (put_user(ptr_to_compat(addr), (u32 __user *)arg))
1da177e4
LT
2032 return -EFAULT;
2033 return 0;
2034}
2035
9b6f0c4b 2036static int proc_reapurb_compat(struct usb_dev_state *ps, void __user *arg)
1da177e4
LT
2037{
2038 struct async *as = reap_as(ps);
a016a816 2039
ddeee0b2 2040 if (as) {
a016a816
AS
2041 int retval;
2042
2f964780 2043 snoop(&ps->dev->dev, "reap %pK\n", as->userurb);
a016a816 2044 retval = processcompl_compat(as, (void __user * __user *)arg);
ddeee0b2
LT
2045 free_async(as);
2046 return retval;
2047 }
1da177e4
LT
2048 if (signal_pending(current))
2049 return -EINTR;
3f2cee73 2050 return -ENODEV;
1da177e4
LT
2051}
2052
9b6f0c4b 2053static int proc_reapurbnonblock_compat(struct usb_dev_state *ps, void __user *arg)
1da177e4 2054{
ddeee0b2 2055 int retval;
1da177e4
LT
2056 struct async *as;
2057
ddeee0b2
LT
2058 as = async_getcompleted(ps);
2059 if (as) {
2f964780 2060 snoop(&ps->dev->dev, "reap %pK\n", as->userurb);
ddeee0b2
LT
2061 retval = processcompl_compat(as, (void __user * __user *)arg);
2062 free_async(as);
3f2cee73
AS
2063 } else {
2064 retval = (connected(ps) ? -EAGAIN : -ENODEV);
ddeee0b2
LT
2065 }
2066 return retval;
1da177e4
LT
2067}
2068
637e8a60 2069
1da177e4
LT
2070#endif
2071
9b6f0c4b 2072static int proc_disconnectsignal(struct usb_dev_state *ps, void __user *arg)
1da177e4
LT
2073{
2074 struct usbdevfs_disconnectsignal ds;
2075
2076 if (copy_from_user(&ds, arg, sizeof(ds)))
2077 return -EFAULT;
1da177e4
LT
2078 ps->discsignr = ds.signr;
2079 ps->disccontext = ds.context;
2080 return 0;
2081}
2082
9b6f0c4b 2083static int proc_claiminterface(struct usb_dev_state *ps, void __user *arg)
1da177e4
LT
2084{
2085 unsigned int ifnum;
2086
2087 if (get_user(ifnum, (unsigned int __user *)arg))
2088 return -EFAULT;
2089 return claimintf(ps, ifnum);
2090}
2091
9b6f0c4b 2092static int proc_releaseinterface(struct usb_dev_state *ps, void __user *arg)
1da177e4
LT
2093{
2094 unsigned int ifnum;
2095 int ret;
2096
2097 if (get_user(ifnum, (unsigned int __user *)arg))
2098 return -EFAULT;
135551ea
KB
2099 ret = releaseintf(ps, ifnum);
2100 if (ret < 0)
1da177e4 2101 return ret;
64f10edf 2102 destroy_async_on_interface(ps, ifnum);
1da177e4
LT
2103 return 0;
2104}
2105
9b6f0c4b 2106static int proc_ioctl(struct usb_dev_state *ps, struct usbdevfs_ioctl *ctl)
1da177e4 2107{
1da177e4
LT
2108 int size;
2109 void *buf = NULL;
2110 int retval = 0;
2111 struct usb_interface *intf = NULL;
2112 struct usb_driver *driver = NULL;
1da177e4 2113
d883f52e
RG
2114 if (ps->privileges_dropped)
2115 return -EACCES;
2116
c36fc889 2117 /* alloc buffer */
135551ea
KB
2118 size = _IOC_SIZE(ctl->ioctl_code);
2119 if (size > 0) {
4baf0df7
2120 buf = kmalloc(size, GFP_KERNEL);
2121 if (buf == NULL)
1da177e4 2122 return -ENOMEM;
c36fc889 2123 if ((_IOC_DIR(ctl->ioctl_code) & _IOC_WRITE)) {
04e482ff 2124 if (copy_from_user(buf, ctl->data, size)) {
6fd19f4b 2125 kfree(buf);
1da177e4
LT
2126 return -EFAULT;
2127 }
2128 } else {
04e482ff 2129 memset(buf, 0, size);
1da177e4
LT
2130 }
2131 }
2132
349710c3 2133 if (!connected(ps)) {
6fd19f4b 2134 kfree(buf);
1da177e4
LT
2135 return -ENODEV;
2136 }
2137
2138 if (ps->dev->state != USB_STATE_CONFIGURED)
2139 retval = -EHOSTUNREACH;
04e482ff
GKH
2140 else if (!(intf = usb_ifnum_to_if(ps->dev, ctl->ifno)))
2141 retval = -EINVAL;
c36fc889 2142 else switch (ctl->ioctl_code) {
1da177e4
LT
2143
2144 /* disconnect kernel driver from interface */
2145 case USBDEVFS_DISCONNECT:
1da177e4
LT
2146 if (intf->dev.driver) {
2147 driver = to_usb_driver(intf->dev.driver);
04e482ff 2148 dev_dbg(&intf->dev, "disconnect by usbfs\n");
1da177e4
LT
2149 usb_driver_release_interface(driver, intf);
2150 } else
2151 retval = -ENODATA;
1da177e4
LT
2152 break;
2153
2154 /* let kernel drivers try to (re)bind to the interface */
2155 case USBDEVFS_CONNECT:
885e9747
AS
2156 if (!intf->dev.driver)
2157 retval = device_attach(&intf->dev);
2158 else
2159 retval = -EBUSY;
1da177e4
LT
2160 break;
2161
2162 /* talk directly to the interface's driver */
2163 default:
1da177e4
LT
2164 if (intf->dev.driver)
2165 driver = to_usb_driver(intf->dev.driver);
c532b29a 2166 if (driver == NULL || driver->unlocked_ioctl == NULL) {
1da177e4
LT
2167 retval = -ENOTTY;
2168 } else {
c532b29a 2169 retval = driver->unlocked_ioctl(intf, ctl->ioctl_code, buf);
1da177e4
LT
2170 if (retval == -ENOIOCTLCMD)
2171 retval = -ENOTTY;
2172 }
1da177e4
LT
2173 }
2174
2175 /* cleanup and return */
2176 if (retval >= 0
04e482ff 2177 && (_IOC_DIR(ctl->ioctl_code) & _IOC_READ) != 0
1da177e4 2178 && size > 0
04e482ff 2179 && copy_to_user(ctl->data, buf, size) != 0)
1da177e4 2180 retval = -EFAULT;
6fd19f4b
JJ
2181
2182 kfree(buf);
1da177e4
LT
2183 return retval;
2184}
2185
9b6f0c4b 2186static int proc_ioctl_default(struct usb_dev_state *ps, void __user *arg)
c36fc889
PZ
2187{
2188 struct usbdevfs_ioctl ctrl;
2189
04e482ff 2190 if (copy_from_user(&ctrl, arg, sizeof(ctrl)))
c36fc889
PZ
2191 return -EFAULT;
2192 return proc_ioctl(ps, &ctrl);
2193}
2194
2195#ifdef CONFIG_COMPAT
9b6f0c4b 2196static int proc_ioctl_compat(struct usb_dev_state *ps, compat_uptr_t arg)
c36fc889 2197{
cc1a7c4b 2198 struct usbdevfs_ioctl32 ioc32;
c36fc889 2199 struct usbdevfs_ioctl ctrl;
c36fc889 2200
cc1a7c4b 2201 if (copy_from_user(&ioc32, compat_ptr(arg), sizeof(ioc32)))
c36fc889 2202 return -EFAULT;
cc1a7c4b
AV
2203 ctrl.ifno = ioc32.ifno;
2204 ctrl.ioctl_code = ioc32.ioctl_code;
2205 ctrl.data = compat_ptr(ioc32.data);
c36fc889
PZ
2206 return proc_ioctl(ps, &ctrl);
2207}
2208#endif
2209
9b6f0c4b 2210static int proc_claim_port(struct usb_dev_state *ps, void __user *arg)
7cbe5dca
AS
2211{
2212 unsigned portnum;
2213 int rc;
2214
2215 if (get_user(portnum, (unsigned __user *) arg))
2216 return -EFAULT;
2217 rc = usb_hub_claim_port(ps->dev, portnum, ps);
2218 if (rc == 0)
2219 snoop(&ps->dev->dev, "port %d claimed by process %d: %s\n",
2220 portnum, task_pid_nr(current), current->comm);
2221 return rc;
2222}
2223
9b6f0c4b 2224static int proc_release_port(struct usb_dev_state *ps, void __user *arg)
7cbe5dca
AS
2225{
2226 unsigned portnum;
2227
2228 if (get_user(portnum, (unsigned __user *) arg))
2229 return -EFAULT;
2230 return usb_hub_release_port(ps->dev, portnum, ps);
2231}
2232
9b6f0c4b 2233static int proc_get_capabilities(struct usb_dev_state *ps, void __user *arg)
19181bc5
HG
2234{
2235 __u32 caps;
2236
3f2cee73 2237 caps = USBDEVFS_CAP_ZERO_PACKET | USBDEVFS_CAP_NO_PACKET_SIZE_LIM |
d883f52e
RG
2238 USBDEVFS_CAP_REAP_AFTER_DISCONNECT | USBDEVFS_CAP_MMAP |
2239 USBDEVFS_CAP_DROP_PRIVILEGES;
19181bc5
HG
2240 if (!ps->dev->bus->no_stop_on_short)
2241 caps |= USBDEVFS_CAP_BULK_CONTINUATION;
3d97ff63
HG
2242 if (ps->dev->bus->sg_tablesize)
2243 caps |= USBDEVFS_CAP_BULK_SCATTER_GATHER;
19181bc5
HG
2244
2245 if (put_user(caps, (__u32 __user *)arg))
2246 return -EFAULT;
2247
2248 return 0;
2249}
2250
9b6f0c4b 2251static int proc_disconnect_claim(struct usb_dev_state *ps, void __user *arg)
0837e7e5
HG
2252{
2253 struct usbdevfs_disconnect_claim dc;
2254 struct usb_interface *intf;
2255
2256 if (copy_from_user(&dc, arg, sizeof(dc)))
2257 return -EFAULT;
2258
2259 intf = usb_ifnum_to_if(ps->dev, dc.interface);
2260 if (!intf)
2261 return -EINVAL;
2262
2263 if (intf->dev.driver) {
2264 struct usb_driver *driver = to_usb_driver(intf->dev.driver);
2265
d883f52e
RG
2266 if (ps->privileges_dropped)
2267 return -EACCES;
2268
0837e7e5
HG
2269 if ((dc.flags & USBDEVFS_DISCONNECT_CLAIM_IF_DRIVER) &&
2270 strncmp(dc.driver, intf->dev.driver->name,
2271 sizeof(dc.driver)) != 0)
2272 return -EBUSY;
2273
2274 if ((dc.flags & USBDEVFS_DISCONNECT_CLAIM_EXCEPT_DRIVER) &&
2275 strncmp(dc.driver, intf->dev.driver->name,
2276 sizeof(dc.driver)) == 0)
2277 return -EBUSY;
2278
2279 dev_dbg(&intf->dev, "disconnect by usbfs\n");
2280 usb_driver_release_interface(driver, intf);
2281 }
2282
2283 return claimintf(ps, dc.interface);
2284}
2285
3e75c6de 2286static int proc_alloc_streams(struct usb_dev_state *ps, void __user *arg)
bcf7f6e3
HG
2287{
2288 unsigned num_streams, num_eps;
2289 struct usb_host_endpoint **eps;
2290 struct usb_interface *intf;
2291 int r;
2292
2293 r = parse_usbdevfs_streams(ps, arg, &num_streams, &num_eps,
2294 &eps, &intf);
2295 if (r)
2296 return r;
2297
2298 destroy_async_on_interface(ps,
2299 intf->altsetting[0].desc.bInterfaceNumber);
2300
2301 r = usb_alloc_streams(intf, eps, num_eps, num_streams, GFP_KERNEL);
2302 kfree(eps);
2303 return r;
2304}
2305
3e75c6de 2306static int proc_free_streams(struct usb_dev_state *ps, void __user *arg)
bcf7f6e3
HG
2307{
2308 unsigned num_eps;
2309 struct usb_host_endpoint **eps;
2310 struct usb_interface *intf;
2311 int r;
2312
2313 r = parse_usbdevfs_streams(ps, arg, NULL, &num_eps, &eps, &intf);
2314 if (r)
2315 return r;
2316
2317 destroy_async_on_interface(ps,
2318 intf->altsetting[0].desc.bInterfaceNumber);
2319
2320 r = usb_free_streams(intf, eps, num_eps, GFP_KERNEL);
2321 kfree(eps);
2322 return r;
2323}
2324
d883f52e
RG
2325static int proc_drop_privileges(struct usb_dev_state *ps, void __user *arg)
2326{
2327 u32 data;
2328
2329 if (copy_from_user(&data, arg, sizeof(data)))
2330 return -EFAULT;
2331
0f5e1558 2332 /* This is a one way operation. Once privileges are
d883f52e
RG
2333 * dropped, you cannot regain them. You may however reissue
2334 * this ioctl to shrink the allowed interfaces mask.
2335 */
2336 ps->interface_allowed_mask &= data;
2337 ps->privileges_dropped = true;
2338
2339 return 0;
2340}
2341
1da177e4
LT
2342/*
2343 * NOTE: All requests here that have interface numbers as parameters
2344 * are assuming that somehow the configuration has been prevented from
2345 * changing. But there's no mechanism to ensure that...
2346 */
637e8a60
AB
2347static long usbdev_do_ioctl(struct file *file, unsigned int cmd,
2348 void __user *p)
1da177e4 2349{
9b6f0c4b 2350 struct usb_dev_state *ps = file->private_data;
496ad9aa 2351 struct inode *inode = file_inode(file);
1da177e4 2352 struct usb_device *dev = ps->dev;
1da177e4
LT
2353 int ret = -ENOTTY;
2354
2355 if (!(file->f_mode & FMODE_WRITE))
2356 return -EPERM;
01412a21 2357
1da177e4 2358 usb_lock_device(dev);
3f2cee73
AS
2359
2360 /* Reap operations are allowed even after disconnection */
2361 switch (cmd) {
2362 case USBDEVFS_REAPURB:
2363 snoop(&dev->dev, "%s: REAPURB\n", __func__);
2364 ret = proc_reapurb(ps, p);
2365 goto done;
2366
2367 case USBDEVFS_REAPURBNDELAY:
2368 snoop(&dev->dev, "%s: REAPURBNDELAY\n", __func__);
2369 ret = proc_reapurbnonblock(ps, p);
2370 goto done;
2371
2372#ifdef CONFIG_COMPAT
2373 case USBDEVFS_REAPURB32:
2374 snoop(&dev->dev, "%s: REAPURB32\n", __func__);
2375 ret = proc_reapurb_compat(ps, p);
2376 goto done;
2377
2378 case USBDEVFS_REAPURBNDELAY32:
2379 snoop(&dev->dev, "%s: REAPURBNDELAY32\n", __func__);
2380 ret = proc_reapurbnonblock_compat(ps, p);
2381 goto done;
2382#endif
2383 }
2384
349710c3 2385 if (!connected(ps)) {
1da177e4
LT
2386 usb_unlock_device(dev);
2387 return -ENODEV;
2388 }
2389
2390 switch (cmd) {
2391 case USBDEVFS_CONTROL:
441b62c1 2392 snoop(&dev->dev, "%s: CONTROL\n", __func__);
1da177e4
LT
2393 ret = proc_control(ps, p);
2394 if (ret >= 0)
078cd827 2395 inode->i_mtime = current_time(inode);
1da177e4
LT
2396 break;
2397
2398 case USBDEVFS_BULK:
441b62c1 2399 snoop(&dev->dev, "%s: BULK\n", __func__);
1da177e4
LT
2400 ret = proc_bulk(ps, p);
2401 if (ret >= 0)
078cd827 2402 inode->i_mtime = current_time(inode);
1da177e4
LT
2403 break;
2404
2405 case USBDEVFS_RESETEP:
441b62c1 2406 snoop(&dev->dev, "%s: RESETEP\n", __func__);
1da177e4
LT
2407 ret = proc_resetep(ps, p);
2408 if (ret >= 0)
078cd827 2409 inode->i_mtime = current_time(inode);
1da177e4
LT
2410 break;
2411
2412 case USBDEVFS_RESET:
441b62c1 2413 snoop(&dev->dev, "%s: RESET\n", __func__);
1da177e4
LT
2414 ret = proc_resetdevice(ps);
2415 break;
2416
2417 case USBDEVFS_CLEAR_HALT:
441b62c1 2418 snoop(&dev->dev, "%s: CLEAR_HALT\n", __func__);
1da177e4
LT
2419 ret = proc_clearhalt(ps, p);
2420 if (ret >= 0)
078cd827 2421 inode->i_mtime = current_time(inode);
1da177e4
LT
2422 break;
2423
2424 case USBDEVFS_GETDRIVER:
441b62c1 2425 snoop(&dev->dev, "%s: GETDRIVER\n", __func__);
1da177e4
LT
2426 ret = proc_getdriver(ps, p);
2427 break;
2428
2429 case USBDEVFS_CONNECTINFO:
441b62c1 2430 snoop(&dev->dev, "%s: CONNECTINFO\n", __func__);
1da177e4
LT
2431 ret = proc_connectinfo(ps, p);
2432 break;
2433
2434 case USBDEVFS_SETINTERFACE:
441b62c1 2435 snoop(&dev->dev, "%s: SETINTERFACE\n", __func__);
1da177e4
LT
2436 ret = proc_setintf(ps, p);
2437 break;
2438
2439 case USBDEVFS_SETCONFIGURATION:
441b62c1 2440 snoop(&dev->dev, "%s: SETCONFIGURATION\n", __func__);
1da177e4
LT
2441 ret = proc_setconfig(ps, p);
2442 break;
2443
2444 case USBDEVFS_SUBMITURB:
441b62c1 2445 snoop(&dev->dev, "%s: SUBMITURB\n", __func__);
1da177e4
LT
2446 ret = proc_submiturb(ps, p);
2447 if (ret >= 0)
078cd827 2448 inode->i_mtime = current_time(inode);
1da177e4
LT
2449 break;
2450
2451#ifdef CONFIG_COMPAT
637e8a60
AB
2452 case USBDEVFS_CONTROL32:
2453 snoop(&dev->dev, "%s: CONTROL32\n", __func__);
2454 ret = proc_control_compat(ps, p);
2455 if (ret >= 0)
078cd827 2456 inode->i_mtime = current_time(inode);
637e8a60
AB
2457 break;
2458
2459 case USBDEVFS_BULK32:
2460 snoop(&dev->dev, "%s: BULK32\n", __func__);
2461 ret = proc_bulk_compat(ps, p);
2462 if (ret >= 0)
078cd827 2463 inode->i_mtime = current_time(inode);
637e8a60
AB
2464 break;
2465
2466 case USBDEVFS_DISCSIGNAL32:
2467 snoop(&dev->dev, "%s: DISCSIGNAL32\n", __func__);
2468 ret = proc_disconnectsignal_compat(ps, p);
2469 break;
1da177e4
LT
2470
2471 case USBDEVFS_SUBMITURB32:
441b62c1 2472 snoop(&dev->dev, "%s: SUBMITURB32\n", __func__);
1da177e4
LT
2473 ret = proc_submiturb_compat(ps, p);
2474 if (ret >= 0)
078cd827 2475 inode->i_mtime = current_time(inode);
1da177e4
LT
2476 break;
2477
c36fc889 2478 case USBDEVFS_IOCTL32:
637e8a60 2479 snoop(&dev->dev, "%s: IOCTL32\n", __func__);
c714de5d 2480 ret = proc_ioctl_compat(ps, ptr_to_compat(p));
c36fc889 2481 break;
1da177e4
LT
2482#endif
2483
2484 case USBDEVFS_DISCARDURB:
2f964780 2485 snoop(&dev->dev, "%s: DISCARDURB %pK\n", __func__, p);
1da177e4
LT
2486 ret = proc_unlinkurb(ps, p);
2487 break;
2488
1da177e4 2489 case USBDEVFS_DISCSIGNAL:
441b62c1 2490 snoop(&dev->dev, "%s: DISCSIGNAL\n", __func__);
1da177e4
LT
2491 ret = proc_disconnectsignal(ps, p);
2492 break;
2493
2494 case USBDEVFS_CLAIMINTERFACE:
441b62c1 2495 snoop(&dev->dev, "%s: CLAIMINTERFACE\n", __func__);
1da177e4
LT
2496 ret = proc_claiminterface(ps, p);
2497 break;
2498
2499 case USBDEVFS_RELEASEINTERFACE:
441b62c1 2500 snoop(&dev->dev, "%s: RELEASEINTERFACE\n", __func__);
1da177e4
LT
2501 ret = proc_releaseinterface(ps, p);
2502 break;
2503
2504 case USBDEVFS_IOCTL:
441b62c1 2505 snoop(&dev->dev, "%s: IOCTL\n", __func__);
c36fc889 2506 ret = proc_ioctl_default(ps, p);
1da177e4 2507 break;
7cbe5dca
AS
2508
2509 case USBDEVFS_CLAIM_PORT:
2510 snoop(&dev->dev, "%s: CLAIM_PORT\n", __func__);
2511 ret = proc_claim_port(ps, p);
2512 break;
2513
2514 case USBDEVFS_RELEASE_PORT:
2515 snoop(&dev->dev, "%s: RELEASE_PORT\n", __func__);
2516 ret = proc_release_port(ps, p);
2517 break;
19181bc5
HG
2518 case USBDEVFS_GET_CAPABILITIES:
2519 ret = proc_get_capabilities(ps, p);
2520 break;
0837e7e5
HG
2521 case USBDEVFS_DISCONNECT_CLAIM:
2522 ret = proc_disconnect_claim(ps, p);
2523 break;
bcf7f6e3
HG
2524 case USBDEVFS_ALLOC_STREAMS:
2525 ret = proc_alloc_streams(ps, p);
2526 break;
2527 case USBDEVFS_FREE_STREAMS:
2528 ret = proc_free_streams(ps, p);
2529 break;
d883f52e
RG
2530 case USBDEVFS_DROP_PRIVILEGES:
2531 ret = proc_drop_privileges(ps, p);
2532 break;
c01b244a
AS
2533 case USBDEVFS_GET_SPEED:
2534 ret = ps->dev->speed;
2535 break;
1da177e4 2536 }
3f2cee73
AS
2537
2538 done:
1da177e4
LT
2539 usb_unlock_device(dev);
2540 if (ret >= 0)
078cd827 2541 inode->i_atime = current_time(inode);
1da177e4
LT
2542 return ret;
2543}
2544
637e8a60
AB
2545static long usbdev_ioctl(struct file *file, unsigned int cmd,
2546 unsigned long arg)
2547{
2548 int ret;
2549
637e8a60 2550 ret = usbdev_do_ioctl(file, cmd, (void __user *)arg);
637e8a60
AB
2551
2552 return ret;
2553}
2554
2555#ifdef CONFIG_COMPAT
2556static long usbdev_compat_ioctl(struct file *file, unsigned int cmd,
2557 unsigned long arg)
2558{
2559 int ret;
2560
637e8a60 2561 ret = usbdev_do_ioctl(file, cmd, compat_ptr(arg));
637e8a60
AB
2562
2563 return ret;
2564}
2565#endif
2566
1da177e4 2567/* No kernel lock - fine */
afc9a42b 2568static __poll_t usbdev_poll(struct file *file,
04e482ff 2569 struct poll_table_struct *wait)
1da177e4 2570{
9b6f0c4b 2571 struct usb_dev_state *ps = file->private_data;
afc9a42b 2572 __poll_t mask = 0;
1da177e4
LT
2573
2574 poll_wait(file, &ps->wait, wait);
2575 if (file->f_mode & FMODE_WRITE && !list_empty(&ps->async_completed))
a9a08845 2576 mask |= EPOLLOUT | EPOLLWRNORM;
349710c3 2577 if (!connected(ps))
a9a08845 2578 mask |= EPOLLHUP;
5cce4382 2579 if (list_empty(&ps->list))
a9a08845 2580 mask |= EPOLLERR;
1da177e4
LT
2581 return mask;
2582}
2583
9f8b17e6 2584const struct file_operations usbdev_file_operations = {
637e8a60 2585 .owner = THIS_MODULE,
b25472f9 2586 .llseek = no_seek_end_llseek,
637e8a60
AB
2587 .read = usbdev_read,
2588 .poll = usbdev_poll,
2589 .unlocked_ioctl = usbdev_ioctl,
2590#ifdef CONFIG_COMPAT
2591 .compat_ioctl = usbdev_compat_ioctl,
2592#endif
f7d34b44 2593 .mmap = usbdev_mmap,
637e8a60
AB
2594 .open = usbdev_open,
2595 .release = usbdev_release,
1da177e4 2596};
fbf82fd2 2597
501950d8 2598static void usbdev_remove(struct usb_device *udev)
cd9f0375 2599{
9b6f0c4b 2600 struct usb_dev_state *ps;
cd9f0375
AS
2601 struct siginfo sinfo;
2602
2603 while (!list_empty(&udev->filelist)) {
9b6f0c4b 2604 ps = list_entry(udev->filelist.next, struct usb_dev_state, list);
cd9f0375
AS
2605 destroy_all_async(ps);
2606 wake_up_all(&ps->wait);
2607 list_del_init(&ps->list);
2608 if (ps->discsignr) {
3b10db2b 2609 clear_siginfo(&sinfo);
cd9f0375
AS
2610 sinfo.si_signo = ps->discsignr;
2611 sinfo.si_errno = EPIPE;
2612 sinfo.si_code = SI_ASYNCIO;
2613 sinfo.si_addr = ps->disccontext;
d178bc3a 2614 kill_pid_info_as_cred(ps->discsignr, &sinfo,
6b4f3d01 2615 ps->disc_pid, ps->cred);
cd9f0375
AS
2616 }
2617 }
2618}
2619
501950d8 2620static int usbdev_notify(struct notifier_block *self,
9f8b17e6 2621 unsigned long action, void *dev)
a7b986b3
GKH
2622{
2623 switch (action) {
2624 case USB_DEVICE_ADD:
a7b986b3
GKH
2625 break;
2626 case USB_DEVICE_REMOVE:
501950d8 2627 usbdev_remove(dev);
a7b986b3
GKH
2628 break;
2629 }
2630 return NOTIFY_OK;
2631}
2632
2633static struct notifier_block usbdev_nb = {
00fe52de 2634 .notifier_call = usbdev_notify,
a7b986b3
GKH
2635};
2636
7e7654a9 2637static struct cdev usb_device_cdev;
fbf82fd2 2638
9f8b17e6 2639int __init usb_devio_init(void)
fbf82fd2
KS
2640{
2641 int retval;
2642
fad21bdf 2643 retval = register_chrdev_region(USB_DEVICE_DEV, USB_DEVICE_MAX,
04e482ff 2644 "usb_device");
fbf82fd2 2645 if (retval) {
69a85942 2646 printk(KERN_ERR "Unable to register minors for usb_device\n");
fbf82fd2
KS
2647 goto out;
2648 }
9f8b17e6 2649 cdev_init(&usb_device_cdev, &usbdev_file_operations);
fad21bdf 2650 retval = cdev_add(&usb_device_cdev, USB_DEVICE_DEV, USB_DEVICE_MAX);
fbf82fd2 2651 if (retval) {
69a85942
GKH
2652 printk(KERN_ERR "Unable to get usb_device major %d\n",
2653 USB_DEVICE_MAJOR);
a7b986b3 2654 goto error_cdev;
fbf82fd2 2655 }
501950d8 2656 usb_register_notify(&usbdev_nb);
fbf82fd2
KS
2657out:
2658 return retval;
a7b986b3 2659
a7b986b3
GKH
2660error_cdev:
2661 unregister_chrdev_region(USB_DEVICE_DEV, USB_DEVICE_MAX);
2662 goto out;
fbf82fd2
KS
2663}
2664
9f8b17e6 2665void usb_devio_cleanup(void)
fbf82fd2 2666{
a7b986b3 2667 usb_unregister_notify(&usbdev_nb);
fbf82fd2 2668 cdev_del(&usb_device_cdev);
fad21bdf 2669 unregister_chrdev_region(USB_DEVICE_DEV, USB_DEVICE_MAX);
fbf82fd2 2670}