]> git.proxmox.com Git - mirror_ubuntu-artful-kernel.git/blame - drivers/usb/core/devio.c
Merge branch 'for-gadget/next' of git://git.kernel.org/pub/scm/linux/kernel/git/balbi...
[mirror_ubuntu-artful-kernel.git] / drivers / usb / core / devio.c
CommitLineData
1da177e4
LT
1/*****************************************************************************/
2
3/*
4 * devio.c -- User space communication with USB devices.
5 *
6 * Copyright (C) 1999-2000 Thomas Sailer (sailer@ife.ee.ethz.ch)
7 *
8 * This program is free software; you can redistribute it and/or modify
9 * it under the terms of the GNU General Public License as published by
10 * the Free Software Foundation; either version 2 of the License, or
11 * (at your option) any later version.
12 *
13 * This program is distributed in the hope that it will be useful,
14 * but WITHOUT ANY WARRANTY; without even the implied warranty of
15 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
16 * GNU General Public License for more details.
17 *
18 * You should have received a copy of the GNU General Public License
19 * along with this program; if not, write to the Free Software
20 * Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA.
21 *
1da177e4
LT
22 * This file implements the usbfs/x/y files, where
23 * x is the bus number and y the device number.
24 *
25 * It allows user space programs/"drivers" to communicate directly
26 * with USB devices without intervening kernel driver.
27 *
28 * Revision history
29 * 22.12.1999 0.1 Initial release (split from proc_usb.c)
30 * 04.01.2000 0.2 Turned into its own filesystem
46113830
HW
31 * 30.09.2005 0.3 Fix user-triggerable oops in async URB delivery
32 * (CAN-2005-3055)
1da177e4
LT
33 */
34
35/*****************************************************************************/
36
37#include <linux/fs.h>
38#include <linux/mm.h>
39#include <linux/slab.h>
1da177e4
LT
40#include <linux/signal.h>
41#include <linux/poll.h>
42#include <linux/module.h>
43#include <linux/usb.h>
44#include <linux/usbdevice_fs.h>
27729aad 45#include <linux/usb/hcd.h> /* for usbcore internals */
fbf82fd2 46#include <linux/cdev.h>
a7b986b3 47#include <linux/notifier.h>
7a01955f 48#include <linux/security.h>
d178bc3a 49#include <linux/user_namespace.h>
1da177e4
LT
50#include <asm/uaccess.h>
51#include <asm/byteorder.h>
52#include <linux/moduleparam.h>
53
1da177e4
LT
54#include "usb.h"
55
fbf82fd2
KS
56#define USB_MAXBUS 64
57#define USB_DEVICE_MAX USB_MAXBUS * 128
fbf82fd2 58
4a2a8a2c
AS
59/* Mutual exclusion for removal, open, and release */
60DEFINE_MUTEX(usbfs_mutex);
61
cd9f0375
AS
62struct dev_state {
63 struct list_head list; /* state list */
64 struct usb_device *dev;
65 struct file *file;
66 spinlock_t lock; /* protects the async urb lists */
67 struct list_head async_pending;
68 struct list_head async_completed;
69 wait_queue_head_t wait; /* wake up if a request completed */
70 unsigned int discsignr;
71 struct pid *disc_pid;
d178bc3a 72 const struct cred *cred;
cd9f0375
AS
73 void __user *disccontext;
74 unsigned long ifclaimed;
75 u32 secid;
01c6460f 76 u32 disabled_bulk_eps;
cd9f0375
AS
77};
78
1da177e4
LT
79struct async {
80 struct list_head asynclist;
81 struct dev_state *ps;
2425c08b 82 struct pid *pid;
d178bc3a 83 const struct cred *cred;
1da177e4
LT
84 unsigned int signr;
85 unsigned int ifnum;
86 void __user *userbuffer;
87 void __user *userurb;
88 struct urb *urb;
add1aaea 89 unsigned int mem_usage;
e015268d 90 int status;
7a01955f 91 u32 secid;
01c6460f
AS
92 u8 bulk_addr;
93 u8 bulk_status;
1da177e4
LT
94};
95
04e482ff
GKH
96static int usbfs_snoop;
97module_param(usbfs_snoop, bool, S_IRUGO | S_IWUSR);
98MODULE_PARM_DESC(usbfs_snoop, "true to log all usbfs traffic");
1da177e4
LT
99
100#define snoop(dev, format, arg...) \
101 do { \
102 if (usbfs_snoop) \
04e482ff 103 dev_info(dev , format , ## arg); \
1da177e4
LT
104 } while (0)
105
4c6e8971
AS
106enum snoop_when {
107 SUBMIT, COMPLETE
108};
fad21bdf 109
4c6e8971 110#define USB_DEVICE_DEV MKDEV(USB_DEVICE_MAJOR, 0)
1da177e4 111
add1aaea 112/* Limit on the total amount of memory we can allocate for transfers */
3f5eb8d5
AS
113static unsigned usbfs_memory_mb = 16;
114module_param(usbfs_memory_mb, uint, 0644);
115MODULE_PARM_DESC(usbfs_memory_mb,
116 "maximum MB allowed for usbfs buffers (0 = no limit)");
117
118/* Hard limit, necessary to avoid aithmetic overflow */
119#define USBFS_XFER_MAX (UINT_MAX / 2 - 1000000)
1da177e4 120
add1aaea
AS
121static atomic_t usbfs_memory_usage; /* Total memory currently allocated */
122
123/* Check whether it's okay to allocate more memory for a transfer */
124static int usbfs_increase_memory_usage(unsigned amount)
125{
3f5eb8d5
AS
126 unsigned lim;
127
128 /*
129 * Convert usbfs_memory_mb to bytes, avoiding overflows.
130 * 0 means use the hard limit (effectively unlimited).
131 */
132 lim = ACCESS_ONCE(usbfs_memory_mb);
133 if (lim == 0 || lim > (USBFS_XFER_MAX >> 20))
134 lim = USBFS_XFER_MAX;
135 else
136 lim <<= 20;
137
add1aaea 138 atomic_add(amount, &usbfs_memory_usage);
3f5eb8d5 139 if (atomic_read(&usbfs_memory_usage) <= lim)
add1aaea
AS
140 return 0;
141 atomic_sub(amount, &usbfs_memory_usage);
142 return -ENOMEM;
143}
144
145/* Memory for a transfer is being deallocated */
146static void usbfs_decrease_memory_usage(unsigned amount)
147{
148 atomic_sub(amount, &usbfs_memory_usage);
149}
4c6e8971 150
d34d9721 151static int connected(struct dev_state *ps)
1da177e4 152{
349710c3
AS
153 return (!list_empty(&ps->list) &&
154 ps->dev->state != USB_STATE_NOTATTACHED);
1da177e4
LT
155}
156
157static loff_t usbdev_lseek(struct file *file, loff_t offset, int orig)
158{
159 loff_t ret;
160
f9de332e 161 mutex_lock(&file->f_dentry->d_inode->i_mutex);
1da177e4
LT
162
163 switch (orig) {
164 case 0:
165 file->f_pos = offset;
166 ret = file->f_pos;
167 break;
168 case 1:
169 file->f_pos += offset;
170 ret = file->f_pos;
171 break;
172 case 2:
173 default:
174 ret = -EINVAL;
175 }
176
f9de332e 177 mutex_unlock(&file->f_dentry->d_inode->i_mutex);
1da177e4
LT
178 return ret;
179}
180
04e482ff
GKH
181static ssize_t usbdev_read(struct file *file, char __user *buf, size_t nbytes,
182 loff_t *ppos)
1da177e4 183{
ec17cf1c 184 struct dev_state *ps = file->private_data;
1da177e4
LT
185 struct usb_device *dev = ps->dev;
186 ssize_t ret = 0;
187 unsigned len;
188 loff_t pos;
189 int i;
190
191 pos = *ppos;
192 usb_lock_device(dev);
349710c3 193 if (!connected(ps)) {
1da177e4
LT
194 ret = -ENODEV;
195 goto err;
196 } else if (pos < 0) {
197 ret = -EINVAL;
198 goto err;
199 }
200
201 if (pos < sizeof(struct usb_device_descriptor)) {
04e482ff
GKH
202 /* 18 bytes - fits on the stack */
203 struct usb_device_descriptor temp_desc;
8781ba0a
ON
204
205 memcpy(&temp_desc, &dev->descriptor, sizeof(dev->descriptor));
9fcd5c32
AM
206 le16_to_cpus(&temp_desc.bcdUSB);
207 le16_to_cpus(&temp_desc.idVendor);
208 le16_to_cpus(&temp_desc.idProduct);
209 le16_to_cpus(&temp_desc.bcdDevice);
1da177e4
LT
210
211 len = sizeof(struct usb_device_descriptor) - pos;
212 if (len > nbytes)
213 len = nbytes;
8781ba0a 214 if (copy_to_user(buf, ((char *)&temp_desc) + pos, len)) {
1da177e4
LT
215 ret = -EFAULT;
216 goto err;
217 }
1da177e4
LT
218
219 *ppos += len;
220 buf += len;
221 nbytes -= len;
222 ret += len;
223 }
224
225 pos = sizeof(struct usb_device_descriptor);
226 for (i = 0; nbytes && i < dev->descriptor.bNumConfigurations; i++) {
227 struct usb_config_descriptor *config =
228 (struct usb_config_descriptor *)dev->rawdescriptors[i];
229 unsigned int length = le16_to_cpu(config->wTotalLength);
230
231 if (*ppos < pos + length) {
232
233 /* The descriptor may claim to be longer than it
234 * really is. Here is the actual allocated length. */
235 unsigned alloclen =
236 le16_to_cpu(dev->config[i].desc.wTotalLength);
237
238 len = length - (*ppos - pos);
239 if (len > nbytes)
240 len = nbytes;
241
242 /* Simply don't write (skip over) unallocated parts */
243 if (alloclen > (*ppos - pos)) {
244 alloclen -= (*ppos - pos);
245 if (copy_to_user(buf,
246 dev->rawdescriptors[i] + (*ppos - pos),
247 min(len, alloclen))) {
248 ret = -EFAULT;
249 goto err;
250 }
251 }
252
253 *ppos += len;
254 buf += len;
255 nbytes -= len;
256 ret += len;
257 }
258
259 pos += length;
260 }
261
262err:
263 usb_unlock_device(dev);
264 return ret;
265}
266
267/*
268 * async list handling
269 */
270
271static struct async *alloc_async(unsigned int numisoframes)
272{
dd95b814 273 struct async *as;
0a1ef3b5 274
dd95b814 275 as = kzalloc(sizeof(struct async), GFP_KERNEL);
04e482ff
GKH
276 if (!as)
277 return NULL;
1da177e4
LT
278 as->urb = usb_alloc_urb(numisoframes, GFP_KERNEL);
279 if (!as->urb) {
280 kfree(as);
281 return NULL;
282 }
04e482ff 283 return as;
1da177e4
LT
284}
285
286static void free_async(struct async *as)
287{
2425c08b 288 put_pid(as->pid);
d178bc3a 289 put_cred(as->cred);
6fd19f4b
JJ
290 kfree(as->urb->transfer_buffer);
291 kfree(as->urb->setup_packet);
1da177e4 292 usb_free_urb(as->urb);
add1aaea 293 usbfs_decrease_memory_usage(as->mem_usage);
6fd19f4b 294 kfree(as);
1da177e4
LT
295}
296
d34d9721 297static void async_newpending(struct async *as)
1da177e4 298{
04e482ff
GKH
299 struct dev_state *ps = as->ps;
300 unsigned long flags;
301
302 spin_lock_irqsave(&ps->lock, flags);
303 list_add_tail(&as->asynclist, &ps->async_pending);
304 spin_unlock_irqrestore(&ps->lock, flags);
1da177e4
LT
305}
306
d34d9721 307static void async_removepending(struct async *as)
1da177e4 308{
04e482ff
GKH
309 struct dev_state *ps = as->ps;
310 unsigned long flags;
311
312 spin_lock_irqsave(&ps->lock, flags);
313 list_del_init(&as->asynclist);
314 spin_unlock_irqrestore(&ps->lock, flags);
1da177e4
LT
315}
316
d34d9721 317static struct async *async_getcompleted(struct dev_state *ps)
1da177e4 318{
04e482ff
GKH
319 unsigned long flags;
320 struct async *as = NULL;
321
322 spin_lock_irqsave(&ps->lock, flags);
323 if (!list_empty(&ps->async_completed)) {
324 as = list_entry(ps->async_completed.next, struct async,
325 asynclist);
326 list_del_init(&as->asynclist);
327 }
328 spin_unlock_irqrestore(&ps->lock, flags);
329 return as;
1da177e4
LT
330}
331
d34d9721 332static struct async *async_getpending(struct dev_state *ps,
04e482ff 333 void __user *userurb)
1da177e4 334{
04e482ff
GKH
335 unsigned long flags;
336 struct async *as;
1da177e4 337
04e482ff 338 spin_lock_irqsave(&ps->lock, flags);
1da177e4
LT
339 list_for_each_entry(as, &ps->async_pending, asynclist)
340 if (as->userurb == userurb) {
341 list_del_init(&as->asynclist);
342 spin_unlock_irqrestore(&ps->lock, flags);
343 return as;
344 }
04e482ff
GKH
345 spin_unlock_irqrestore(&ps->lock, flags);
346 return NULL;
1da177e4
LT
347}
348
4c6e8971
AS
349static void snoop_urb(struct usb_device *udev,
350 void __user *userurb, int pipe, unsigned length,
0880aef4
CF
351 int timeout_or_status, enum snoop_when when,
352 unsigned char *data, unsigned data_len)
e639dd3f 353{
4c6e8971
AS
354 static const char *types[] = {"isoc", "int", "ctrl", "bulk"};
355 static const char *dirs[] = {"out", "in"};
356 int ep;
357 const char *t, *d;
e639dd3f
GKH
358
359 if (!usbfs_snoop)
360 return;
361
4c6e8971
AS
362 ep = usb_pipeendpoint(pipe);
363 t = types[usb_pipetype(pipe)];
364 d = dirs[!!usb_pipein(pipe)];
365
366 if (userurb) { /* Async */
367 if (when == SUBMIT)
368 dev_info(&udev->dev, "userurb %p, ep%d %s-%s, "
369 "length %u\n",
370 userurb, ep, t, d, length);
371 else
372 dev_info(&udev->dev, "userurb %p, ep%d %s-%s, "
373 "actual_length %u status %d\n",
374 userurb, ep, t, d, length,
375 timeout_or_status);
376 } else {
377 if (when == SUBMIT)
378 dev_info(&udev->dev, "ep%d %s-%s, length %u, "
379 "timeout %d\n",
380 ep, t, d, length, timeout_or_status);
381 else
382 dev_info(&udev->dev, "ep%d %s-%s, actual_length %u, "
383 "status %d\n",
384 ep, t, d, length, timeout_or_status);
385 }
0880aef4
CF
386
387 if (data && data_len > 0) {
388 print_hex_dump(KERN_DEBUG, "data: ", DUMP_PREFIX_NONE, 32, 1,
389 data, data_len, 1);
390 }
e639dd3f
GKH
391}
392
01c6460f
AS
393#define AS_CONTINUATION 1
394#define AS_UNLINK 2
395
396static void cancel_bulk_urbs(struct dev_state *ps, unsigned bulk_addr)
397__releases(ps->lock)
398__acquires(ps->lock)
399{
400 struct async *as;
401
402 /* Mark all the pending URBs that match bulk_addr, up to but not
403 * including the first one without AS_CONTINUATION. If such an
404 * URB is encountered then a new transfer has already started so
405 * the endpoint doesn't need to be disabled; otherwise it does.
406 */
407 list_for_each_entry(as, &ps->async_pending, asynclist) {
408 if (as->bulk_addr == bulk_addr) {
409 if (as->bulk_status != AS_CONTINUATION)
410 goto rescan;
411 as->bulk_status = AS_UNLINK;
412 as->bulk_addr = 0;
413 }
414 }
415 ps->disabled_bulk_eps |= (1 << bulk_addr);
416
417 /* Now carefully unlink all the marked pending URBs */
418 rescan:
419 list_for_each_entry(as, &ps->async_pending, asynclist) {
420 if (as->bulk_status == AS_UNLINK) {
421 as->bulk_status = 0; /* Only once */
422 spin_unlock(&ps->lock); /* Allow completions */
423 usb_unlink_urb(as->urb);
424 spin_lock(&ps->lock);
425 goto rescan;
426 }
427 }
428}
429
7d12e780 430static void async_completed(struct urb *urb)
1da177e4 431{
04e482ff
GKH
432 struct async *as = urb->context;
433 struct dev_state *ps = as->ps;
1da177e4 434 struct siginfo sinfo;
516a1a07 435 struct pid *pid = NULL;
516a1a07 436 u32 secid = 0;
d178bc3a 437 const struct cred *cred = NULL;
516a1a07 438 int signr;
1da177e4 439
04e482ff
GKH
440 spin_lock(&ps->lock);
441 list_move_tail(&as->asynclist, &ps->async_completed);
e015268d 442 as->status = urb->status;
516a1a07
ON
443 signr = as->signr;
444 if (signr) {
1da177e4 445 sinfo.si_signo = as->signr;
e015268d 446 sinfo.si_errno = as->status;
1da177e4
LT
447 sinfo.si_code = SI_ASYNCIO;
448 sinfo.si_addr = as->userurb;
aec01c58 449 pid = get_pid(as->pid);
d178bc3a 450 cred = get_cred(as->cred);
516a1a07 451 secid = as->secid;
1da177e4 452 }
e639dd3f 453 snoop(&urb->dev->dev, "urb complete\n");
4c6e8971 454 snoop_urb(urb->dev, as->userurb, urb->pipe, urb->actual_length,
0880aef4
CF
455 as->status, COMPLETE,
456 ((urb->transfer_flags & URB_DIR_MASK) == USB_DIR_OUT) ?
457 NULL : urb->transfer_buffer, urb->actual_length);
01c6460f
AS
458 if (as->status < 0 && as->bulk_addr && as->status != -ECONNRESET &&
459 as->status != -ENOENT)
460 cancel_bulk_urbs(ps, as->bulk_addr);
516a1a07
ON
461 spin_unlock(&ps->lock);
462
aec01c58 463 if (signr) {
d178bc3a 464 kill_pid_info_as_cred(sinfo.si_signo, &sinfo, pid, cred, secid);
aec01c58 465 put_pid(pid);
d178bc3a 466 put_cred(cred);
aec01c58 467 }
516a1a07 468
e639dd3f 469 wake_up(&ps->wait);
1da177e4
LT
470}
471
04e482ff 472static void destroy_async(struct dev_state *ps, struct list_head *list)
1da177e4
LT
473{
474 struct async *as;
475 unsigned long flags;
476
477 spin_lock_irqsave(&ps->lock, flags);
478 while (!list_empty(list)) {
479 as = list_entry(list->next, struct async, asynclist);
480 list_del_init(&as->asynclist);
481
482 /* drop the spinlock so the completion handler can run */
483 spin_unlock_irqrestore(&ps->lock, flags);
484 usb_kill_urb(as->urb);
485 spin_lock_irqsave(&ps->lock, flags);
486 }
487 spin_unlock_irqrestore(&ps->lock, flags);
1da177e4
LT
488}
489
04e482ff
GKH
490static void destroy_async_on_interface(struct dev_state *ps,
491 unsigned int ifnum)
1da177e4
LT
492{
493 struct list_head *p, *q, hitlist;
494 unsigned long flags;
495
496 INIT_LIST_HEAD(&hitlist);
497 spin_lock_irqsave(&ps->lock, flags);
498 list_for_each_safe(p, q, &ps->async_pending)
499 if (ifnum == list_entry(p, struct async, asynclist)->ifnum)
500 list_move_tail(p, &hitlist);
501 spin_unlock_irqrestore(&ps->lock, flags);
502 destroy_async(ps, &hitlist);
503}
504
d34d9721 505static void destroy_all_async(struct dev_state *ps)
1da177e4 506{
04e482ff 507 destroy_async(ps, &ps->async_pending);
1da177e4
LT
508}
509
510/*
511 * interface claims are made only at the request of user level code,
512 * which can also release them (explicitly or by closing files).
513 * they're also undone when devices disconnect.
514 */
515
04e482ff
GKH
516static int driver_probe(struct usb_interface *intf,
517 const struct usb_device_id *id)
1da177e4
LT
518{
519 return -ENODEV;
520}
521
522static void driver_disconnect(struct usb_interface *intf)
523{
04e482ff 524 struct dev_state *ps = usb_get_intfdata(intf);
1da177e4
LT
525 unsigned int ifnum = intf->altsetting->desc.bInterfaceNumber;
526
527 if (!ps)
528 return;
529
530 /* NOTE: this relies on usbcore having canceled and completed
531 * all pending I/O requests; 2.6 does that.
532 */
533
534 if (likely(ifnum < 8*sizeof(ps->ifclaimed)))
535 clear_bit(ifnum, &ps->ifclaimed);
536 else
3b6004f3
GKH
537 dev_warn(&intf->dev, "interface number %u out of range\n",
538 ifnum);
1da177e4 539
04e482ff 540 usb_set_intfdata(intf, NULL);
1da177e4
LT
541
542 /* force async requests to complete */
543 destroy_async_on_interface(ps, ifnum);
544}
545
2e2eb83f
AS
546/* The following routines are merely placeholders. There is no way
547 * to inform a user task about suspend or resumes.
548 */
549static int driver_suspend(struct usb_interface *intf, pm_message_t msg)
550{
551 return 0;
552}
553
554static int driver_resume(struct usb_interface *intf)
555{
556 return 0;
557}
558
1da177e4 559struct usb_driver usbfs_driver = {
1da177e4
LT
560 .name = "usbfs",
561 .probe = driver_probe,
562 .disconnect = driver_disconnect,
2e2eb83f
AS
563 .suspend = driver_suspend,
564 .resume = driver_resume,
1da177e4
LT
565};
566
567static int claimintf(struct dev_state *ps, unsigned int ifnum)
568{
569 struct usb_device *dev = ps->dev;
570 struct usb_interface *intf;
571 int err;
572
573 if (ifnum >= 8*sizeof(ps->ifclaimed))
574 return -EINVAL;
575 /* already claimed */
576 if (test_bit(ifnum, &ps->ifclaimed))
577 return 0;
578
1da177e4
LT
579 intf = usb_ifnum_to_if(dev, ifnum);
580 if (!intf)
581 err = -ENOENT;
582 else
583 err = usb_driver_claim_interface(&usbfs_driver, intf, ps);
1da177e4
LT
584 if (err == 0)
585 set_bit(ifnum, &ps->ifclaimed);
586 return err;
587}
588
589static int releaseintf(struct dev_state *ps, unsigned int ifnum)
590{
591 struct usb_device *dev;
592 struct usb_interface *intf;
593 int err;
594
595 err = -EINVAL;
596 if (ifnum >= 8*sizeof(ps->ifclaimed))
597 return err;
598 dev = ps->dev;
1da177e4
LT
599 intf = usb_ifnum_to_if(dev, ifnum);
600 if (!intf)
601 err = -ENOENT;
602 else if (test_and_clear_bit(ifnum, &ps->ifclaimed)) {
603 usb_driver_release_interface(&usbfs_driver, intf);
604 err = 0;
605 }
1da177e4
LT
606 return err;
607}
608
609static int checkintf(struct dev_state *ps, unsigned int ifnum)
610{
611 if (ps->dev->state != USB_STATE_CONFIGURED)
612 return -EHOSTUNREACH;
613 if (ifnum >= 8*sizeof(ps->ifclaimed))
614 return -EINVAL;
615 if (test_bit(ifnum, &ps->ifclaimed))
616 return 0;
617 /* if not yet claimed, claim it for the driver */
04e482ff
GKH
618 dev_warn(&ps->dev->dev, "usbfs: process %d (%s) did not claim "
619 "interface %u before use\n", task_pid_nr(current),
620 current->comm, ifnum);
1da177e4
LT
621 return claimintf(ps, ifnum);
622}
623
624static int findintfep(struct usb_device *dev, unsigned int ep)
625{
626 unsigned int i, j, e;
04e482ff 627 struct usb_interface *intf;
1da177e4
LT
628 struct usb_host_interface *alts;
629 struct usb_endpoint_descriptor *endpt;
630
631 if (ep & ~(USB_DIR_IN|0xf))
632 return -EINVAL;
633 if (!dev->actconfig)
634 return -ESRCH;
635 for (i = 0; i < dev->actconfig->desc.bNumInterfaces; i++) {
636 intf = dev->actconfig->interface[i];
637 for (j = 0; j < intf->num_altsetting; j++) {
04e482ff 638 alts = &intf->altsetting[j];
1da177e4
LT
639 for (e = 0; e < alts->desc.bNumEndpoints; e++) {
640 endpt = &alts->endpoint[e].desc;
641 if (endpt->bEndpointAddress == ep)
642 return alts->desc.bInterfaceNumber;
643 }
644 }
645 }
04e482ff 646 return -ENOENT;
1da177e4
LT
647}
648
04e482ff 649static int check_ctrlrecip(struct dev_state *ps, unsigned int requesttype,
393cbb51 650 unsigned int request, unsigned int index)
1da177e4
LT
651{
652 int ret = 0;
393cbb51 653 struct usb_host_interface *alt_setting;
1da177e4 654
6da9c990
DV
655 if (ps->dev->state != USB_STATE_UNAUTHENTICATED
656 && ps->dev->state != USB_STATE_ADDRESS
24f8b116 657 && ps->dev->state != USB_STATE_CONFIGURED)
1da177e4
LT
658 return -EHOSTUNREACH;
659 if (USB_TYPE_VENDOR == (USB_TYPE_MASK & requesttype))
660 return 0;
661
393cbb51
MD
662 /*
663 * check for the special corner case 'get_device_id' in the printer
664 * class specification, where wIndex is (interface << 8 | altsetting)
665 * instead of just interface
666 */
667 if (requesttype == 0xa1 && request == 0) {
668 alt_setting = usb_find_alt_setting(ps->dev->actconfig,
669 index >> 8, index & 0xff);
670 if (alt_setting
671 && alt_setting->desc.bInterfaceClass == USB_CLASS_PRINTER)
672 index >>= 8;
673 }
674
1da177e4
LT
675 index &= 0xff;
676 switch (requesttype & USB_RECIP_MASK) {
677 case USB_RECIP_ENDPOINT:
04e482ff
GKH
678 ret = findintfep(ps->dev, index);
679 if (ret >= 0)
1da177e4
LT
680 ret = checkintf(ps, ret);
681 break;
682
683 case USB_RECIP_INTERFACE:
684 ret = checkintf(ps, index);
685 break;
686 }
687 return ret;
688}
689
61ad04a8 690static int match_devt(struct device *dev, void *data)
4592bf5a 691{
a80d5ff0 692 return dev->devt == (dev_t) (unsigned long) data;
9f8b17e6 693}
4592bf5a 694
61ad04a8 695static struct usb_device *usbdev_lookup_by_devt(dev_t devt)
9f8b17e6
KS
696{
697 struct device *dev;
698
a80d5ff0
DH
699 dev = bus_find_device(&usb_bus_type, NULL,
700 (void *) (unsigned long) devt, match_devt);
9f8b17e6
KS
701 if (!dev)
702 return NULL;
9f8b17e6
KS
703 return container_of(dev, struct usb_device, dev);
704}
4592bf5a 705
1da177e4
LT
706/*
707 * file operations
708 */
709static int usbdev_open(struct inode *inode, struct file *file)
710{
fbf82fd2 711 struct usb_device *dev = NULL;
1da177e4
LT
712 struct dev_state *ps;
713 int ret;
714
1da177e4 715 ret = -ENOMEM;
04e482ff
GKH
716 ps = kmalloc(sizeof(struct dev_state), GFP_KERNEL);
717 if (!ps)
62e299e6 718 goto out_free_ps;
1da177e4 719
01105a24 720 ret = -ENODEV;
61ad04a8 721
62e299e6
AS
722 /* Protect against simultaneous removal or release */
723 mutex_lock(&usbfs_mutex);
724
9f8b17e6 725 /* usbdev device-node */
fbf82fd2 726 if (imajor(inode) == USB_DEVICE_MAJOR)
61ad04a8 727 dev = usbdev_lookup_by_devt(inode->i_rdev);
62e299e6 728
9f8b17e6
KS
729#ifdef CONFIG_USB_DEVICEFS
730 /* procfs file */
d64aac36 731 if (!dev) {
8e18e294 732 dev = inode->i_private;
d64aac36
AS
733 if (dev && dev->usbfs_dentry &&
734 dev->usbfs_dentry->d_inode == inode)
735 usb_get_dev(dev);
736 else
737 dev = NULL;
738 }
9f8b17e6 739#endif
62e299e6
AS
740 mutex_unlock(&usbfs_mutex);
741
742 if (!dev)
743 goto out_free_ps;
744
745 usb_lock_device(dev);
746 if (dev->state == USB_STATE_NOTATTACHED)
747 goto out_unlock_device;
748
94fcda1f 749 ret = usb_autoresume_device(dev);
01d883d4 750 if (ret)
62e299e6 751 goto out_unlock_device;
01d883d4 752
1da177e4
LT
753 ps->dev = dev;
754 ps->file = file;
755 spin_lock_init(&ps->lock);
316547fd 756 INIT_LIST_HEAD(&ps->list);
1da177e4
LT
757 INIT_LIST_HEAD(&ps->async_pending);
758 INIT_LIST_HEAD(&ps->async_completed);
759 init_waitqueue_head(&ps->wait);
760 ps->discsignr = 0;
2425c08b 761 ps->disc_pid = get_pid(task_pid(current));
d178bc3a 762 ps->cred = get_current_cred();
1da177e4
LT
763 ps->disccontext = NULL;
764 ps->ifclaimed = 0;
7a01955f 765 security_task_getsecid(current, &ps->secid);
527660a8 766 smp_wmb();
1da177e4
LT
767 list_add_tail(&ps->list, &dev->filelist);
768 file->private_data = ps;
62e299e6 769 usb_unlock_device(dev);
2da41d5f
AS
770 snoop(&dev->dev, "opened by process %d: %s\n", task_pid_nr(current),
771 current->comm);
62e299e6
AS
772 return ret;
773
774 out_unlock_device:
775 usb_unlock_device(dev);
776 usb_put_dev(dev);
777 out_free_ps:
778 kfree(ps);
4a2a8a2c 779 return ret;
1da177e4
LT
780}
781
782static int usbdev_release(struct inode *inode, struct file *file)
783{
ec17cf1c 784 struct dev_state *ps = file->private_data;
1da177e4
LT
785 struct usb_device *dev = ps->dev;
786 unsigned int ifnum;
6ff10464 787 struct async *as;
1da177e4
LT
788
789 usb_lock_device(dev);
7cbe5dca 790 usb_hub_release_all_ports(dev, ps);
4a2a8a2c 791
1da177e4 792 list_del_init(&ps->list);
4a2a8a2c 793
1da177e4
LT
794 for (ifnum = 0; ps->ifclaimed && ifnum < 8*sizeof(ps->ifclaimed);
795 ifnum++) {
796 if (test_bit(ifnum, &ps->ifclaimed))
797 releaseintf(ps, ifnum);
798 }
799 destroy_all_async(ps);
94fcda1f 800 usb_autosuspend_device(dev);
1da177e4
LT
801 usb_unlock_device(dev);
802 usb_put_dev(dev);
2425c08b 803 put_pid(ps->disc_pid);
d178bc3a 804 put_cred(ps->cred);
6ff10464
AS
805
806 as = async_getcompleted(ps);
807 while (as) {
808 free_async(as);
809 as = async_getcompleted(ps);
810 }
1da177e4 811 kfree(ps);
4a2a8a2c 812 return 0;
1da177e4
LT
813}
814
815static int proc_control(struct dev_state *ps, void __user *arg)
816{
817 struct usb_device *dev = ps->dev;
818 struct usbdevfs_ctrltransfer ctrl;
819 unsigned int tmo;
820 unsigned char *tbuf;
ff66e3ce 821 unsigned wLength;
4c6e8971 822 int i, pipe, ret;
1da177e4
LT
823
824 if (copy_from_user(&ctrl, arg, sizeof(ctrl)))
825 return -EFAULT;
393cbb51
MD
826 ret = check_ctrlrecip(ps, ctrl.bRequestType, ctrl.bRequest,
827 ctrl.wIndex);
04e482ff 828 if (ret)
1da177e4 829 return ret;
ff66e3ce
AM
830 wLength = ctrl.wLength; /* To suppress 64k PAGE_SIZE warning */
831 if (wLength > PAGE_SIZE)
1da177e4 832 return -EINVAL;
add1aaea
AS
833 ret = usbfs_increase_memory_usage(PAGE_SIZE + sizeof(struct urb) +
834 sizeof(struct usb_ctrlrequest));
835 if (ret)
836 return ret;
04e482ff 837 tbuf = (unsigned char *)__get_free_page(GFP_KERNEL);
add1aaea
AS
838 if (!tbuf) {
839 ret = -ENOMEM;
840 goto done;
841 }
1da177e4 842 tmo = ctrl.timeout;
0880aef4
CF
843 snoop(&dev->dev, "control urb: bRequestType=%02x "
844 "bRequest=%02x wValue=%04x "
845 "wIndex=%04x wLength=%04x\n",
846 ctrl.bRequestType, ctrl.bRequest,
847 __le16_to_cpup(&ctrl.wValue),
848 __le16_to_cpup(&ctrl.wIndex),
849 __le16_to_cpup(&ctrl.wLength));
1da177e4 850 if (ctrl.bRequestType & 0x80) {
04e482ff
GKH
851 if (ctrl.wLength && !access_ok(VERIFY_WRITE, ctrl.data,
852 ctrl.wLength)) {
52fb743d
AS
853 ret = -EINVAL;
854 goto done;
1da177e4 855 }
4c6e8971 856 pipe = usb_rcvctrlpipe(dev, 0);
0880aef4 857 snoop_urb(dev, NULL, pipe, ctrl.wLength, tmo, SUBMIT, NULL, 0);
1da177e4
LT
858
859 usb_unlock_device(dev);
4c6e8971 860 i = usb_control_msg(dev, pipe, ctrl.bRequest,
04e482ff
GKH
861 ctrl.bRequestType, ctrl.wValue, ctrl.wIndex,
862 tbuf, ctrl.wLength, tmo);
1da177e4 863 usb_lock_device(dev);
0880aef4 864 snoop_urb(dev, NULL, pipe, max(i, 0), min(i, 0), COMPLETE,
9d02b426 865 tbuf, max(i, 0));
1da177e4 866 if ((i > 0) && ctrl.wLength) {
fe0410c7 867 if (copy_to_user(ctrl.data, tbuf, i)) {
52fb743d
AS
868 ret = -EFAULT;
869 goto done;
1da177e4
LT
870 }
871 }
872 } else {
873 if (ctrl.wLength) {
874 if (copy_from_user(tbuf, ctrl.data, ctrl.wLength)) {
52fb743d
AS
875 ret = -EFAULT;
876 goto done;
1da177e4
LT
877 }
878 }
4c6e8971 879 pipe = usb_sndctrlpipe(dev, 0);
0880aef4
CF
880 snoop_urb(dev, NULL, pipe, ctrl.wLength, tmo, SUBMIT,
881 tbuf, ctrl.wLength);
4c6e8971 882
1da177e4 883 usb_unlock_device(dev);
04e482ff
GKH
884 i = usb_control_msg(dev, usb_sndctrlpipe(dev, 0), ctrl.bRequest,
885 ctrl.bRequestType, ctrl.wValue, ctrl.wIndex,
886 tbuf, ctrl.wLength, tmo);
1da177e4 887 usb_lock_device(dev);
0880aef4 888 snoop_urb(dev, NULL, pipe, max(i, 0), min(i, 0), COMPLETE, NULL, 0);
1da177e4 889 }
04e482ff 890 if (i < 0 && i != -EPIPE) {
1da177e4
LT
891 dev_printk(KERN_DEBUG, &dev->dev, "usbfs: USBDEVFS_CONTROL "
892 "failed cmd %s rqt %u rq %u len %u ret %d\n",
893 current->comm, ctrl.bRequestType, ctrl.bRequest,
894 ctrl.wLength, i);
895 }
52fb743d
AS
896 ret = i;
897 done:
898 free_page((unsigned long) tbuf);
add1aaea
AS
899 usbfs_decrease_memory_usage(PAGE_SIZE + sizeof(struct urb) +
900 sizeof(struct usb_ctrlrequest));
52fb743d 901 return ret;
1da177e4
LT
902}
903
904static int proc_bulk(struct dev_state *ps, void __user *arg)
905{
906 struct usb_device *dev = ps->dev;
907 struct usbdevfs_bulktransfer bulk;
908 unsigned int tmo, len1, pipe;
909 int len2;
910 unsigned char *tbuf;
4c6e8971 911 int i, ret;
1da177e4
LT
912
913 if (copy_from_user(&bulk, arg, sizeof(bulk)))
914 return -EFAULT;
04e482ff
GKH
915 ret = findintfep(ps->dev, bulk.ep);
916 if (ret < 0)
1da177e4 917 return ret;
04e482ff
GKH
918 ret = checkintf(ps, ret);
919 if (ret)
1da177e4
LT
920 return ret;
921 if (bulk.ep & USB_DIR_IN)
922 pipe = usb_rcvbulkpipe(dev, bulk.ep & 0x7f);
923 else
924 pipe = usb_sndbulkpipe(dev, bulk.ep & 0x7f);
925 if (!usb_maxpacket(dev, pipe, !(bulk.ep & USB_DIR_IN)))
926 return -EINVAL;
927 len1 = bulk.len;
3f5eb8d5 928 if (len1 >= USBFS_XFER_MAX)
1da177e4 929 return -EINVAL;
add1aaea
AS
930 ret = usbfs_increase_memory_usage(len1 + sizeof(struct urb));
931 if (ret)
932 return ret;
933 if (!(tbuf = kmalloc(len1, GFP_KERNEL))) {
934 ret = -ENOMEM;
935 goto done;
936 }
1da177e4
LT
937 tmo = bulk.timeout;
938 if (bulk.ep & 0x80) {
939 if (len1 && !access_ok(VERIFY_WRITE, bulk.data, len1)) {
52fb743d
AS
940 ret = -EINVAL;
941 goto done;
1da177e4 942 }
0880aef4 943 snoop_urb(dev, NULL, pipe, len1, tmo, SUBMIT, NULL, 0);
4c6e8971 944
1da177e4
LT
945 usb_unlock_device(dev);
946 i = usb_bulk_msg(dev, pipe, tbuf, len1, &len2, tmo);
947 usb_lock_device(dev);
0880aef4 948 snoop_urb(dev, NULL, pipe, len2, i, COMPLETE, tbuf, len2);
4c6e8971 949
1da177e4
LT
950 if (!i && len2) {
951 if (copy_to_user(bulk.data, tbuf, len2)) {
52fb743d
AS
952 ret = -EFAULT;
953 goto done;
1da177e4
LT
954 }
955 }
956 } else {
957 if (len1) {
958 if (copy_from_user(tbuf, bulk.data, len1)) {
52fb743d
AS
959 ret = -EFAULT;
960 goto done;
1da177e4
LT
961 }
962 }
0880aef4 963 snoop_urb(dev, NULL, pipe, len1, tmo, SUBMIT, tbuf, len1);
4c6e8971 964
1da177e4
LT
965 usb_unlock_device(dev);
966 i = usb_bulk_msg(dev, pipe, tbuf, len1, &len2, tmo);
967 usb_lock_device(dev);
0880aef4 968 snoop_urb(dev, NULL, pipe, len2, i, COMPLETE, NULL, 0);
1da177e4 969 }
52fb743d
AS
970 ret = (i < 0 ? i : len2);
971 done:
1da177e4 972 kfree(tbuf);
add1aaea 973 usbfs_decrease_memory_usage(len1 + sizeof(struct urb));
52fb743d 974 return ret;
1da177e4
LT
975}
976
977static int proc_resetep(struct dev_state *ps, void __user *arg)
978{
979 unsigned int ep;
980 int ret;
981
982 if (get_user(ep, (unsigned int __user *)arg))
983 return -EFAULT;
04e482ff
GKH
984 ret = findintfep(ps->dev, ep);
985 if (ret < 0)
1da177e4 986 return ret;
04e482ff
GKH
987 ret = checkintf(ps, ret);
988 if (ret)
1da177e4 989 return ret;
3444b26a 990 usb_reset_endpoint(ps->dev, ep);
1da177e4
LT
991 return 0;
992}
993
994static int proc_clearhalt(struct dev_state *ps, void __user *arg)
995{
996 unsigned int ep;
997 int pipe;
998 int ret;
999
1000 if (get_user(ep, (unsigned int __user *)arg))
1001 return -EFAULT;
04e482ff
GKH
1002 ret = findintfep(ps->dev, ep);
1003 if (ret < 0)
1da177e4 1004 return ret;
04e482ff
GKH
1005 ret = checkintf(ps, ret);
1006 if (ret)
1da177e4
LT
1007 return ret;
1008 if (ep & USB_DIR_IN)
04e482ff
GKH
1009 pipe = usb_rcvbulkpipe(ps->dev, ep & 0x7f);
1010 else
1011 pipe = usb_sndbulkpipe(ps->dev, ep & 0x7f);
1da177e4
LT
1012
1013 return usb_clear_halt(ps->dev, pipe);
1014}
1da177e4
LT
1015
1016static int proc_getdriver(struct dev_state *ps, void __user *arg)
1017{
1018 struct usbdevfs_getdriver gd;
1019 struct usb_interface *intf;
1020 int ret;
1021
1022 if (copy_from_user(&gd, arg, sizeof(gd)))
1023 return -EFAULT;
1da177e4
LT
1024 intf = usb_ifnum_to_if(ps->dev, gd.interface);
1025 if (!intf || !intf->dev.driver)
1026 ret = -ENODATA;
1027 else {
1028 strncpy(gd.driver, intf->dev.driver->name,
1029 sizeof(gd.driver));
1030 ret = (copy_to_user(arg, &gd, sizeof(gd)) ? -EFAULT : 0);
1031 }
1da177e4
LT
1032 return ret;
1033}
1034
1035static int proc_connectinfo(struct dev_state *ps, void __user *arg)
1036{
886ccd45
VK
1037 struct usbdevfs_connectinfo ci = {
1038 .devnum = ps->dev->devnum,
1039 .slow = ps->dev->speed == USB_SPEED_LOW
1040 };
1da177e4 1041
1da177e4
LT
1042 if (copy_to_user(arg, &ci, sizeof(ci)))
1043 return -EFAULT;
1044 return 0;
1045}
1046
1047static int proc_resetdevice(struct dev_state *ps)
1048{
742120c6 1049 return usb_reset_device(ps->dev);
1da177e4
LT
1050}
1051
1052static int proc_setintf(struct dev_state *ps, void __user *arg)
1053{
1054 struct usbdevfs_setinterface setintf;
1055 int ret;
1056
1057 if (copy_from_user(&setintf, arg, sizeof(setintf)))
1058 return -EFAULT;
1059 if ((ret = checkintf(ps, setintf.interface)))
1060 return ret;
1061 return usb_set_interface(ps->dev, setintf.interface,
1062 setintf.altsetting);
1063}
1064
1065static int proc_setconfig(struct dev_state *ps, void __user *arg)
1066{
3f141e2a 1067 int u;
1da177e4 1068 int status = 0;
04e482ff 1069 struct usb_host_config *actconfig;
1da177e4 1070
3f141e2a 1071 if (get_user(u, (int __user *)arg))
1da177e4
LT
1072 return -EFAULT;
1073
04e482ff
GKH
1074 actconfig = ps->dev->actconfig;
1075
1076 /* Don't touch the device if any interfaces are claimed.
1077 * It could interfere with other drivers' operations, and if
1da177e4
LT
1078 * an interface is claimed by usbfs it could easily deadlock.
1079 */
04e482ff
GKH
1080 if (actconfig) {
1081 int i;
1082
1083 for (i = 0; i < actconfig->desc.bNumInterfaces; ++i) {
1084 if (usb_interface_claimed(actconfig->interface[i])) {
1085 dev_warn(&ps->dev->dev,
72ebddb5 1086 "usbfs: interface %d claimed by %s "
1da177e4
LT
1087 "while '%s' sets config #%d\n",
1088 actconfig->interface[i]
1089 ->cur_altsetting
1090 ->desc.bInterfaceNumber,
72ebddb5
DB
1091 actconfig->interface[i]
1092 ->dev.driver->name,
1da177e4 1093 current->comm, u);
04e482ff 1094 status = -EBUSY;
1da177e4 1095 break;
1da177e4 1096 }
04e482ff
GKH
1097 }
1098 }
1da177e4
LT
1099
1100 /* SET_CONFIGURATION is often abused as a "cheap" driver reset,
1101 * so avoid usb_set_configuration()'s kick to sysfs
1102 */
1103 if (status == 0) {
1104 if (actconfig && actconfig->desc.bConfigurationValue == u)
1105 status = usb_reset_configuration(ps->dev);
1106 else
1107 status = usb_set_configuration(ps->dev, u);
1108 }
1109
1110 return status;
1111}
1112
1da177e4 1113static int proc_do_submiturb(struct dev_state *ps, struct usbdevfs_urb *uurb,
04e482ff
GKH
1114 struct usbdevfs_iso_packet_desc __user *iso_frame_desc,
1115 void __user *arg)
1da177e4
LT
1116{
1117 struct usbdevfs_iso_packet_desc *isopkt = NULL;
1118 struct usb_host_endpoint *ep;
52fb743d 1119 struct async *as = NULL;
1da177e4
LT
1120 struct usb_ctrlrequest *dr = NULL;
1121 unsigned int u, totlen, isofrmlen;
97b9eb91 1122 int ret, ifnum = -1;
93cf9b90 1123 int is_in;
1da177e4 1124
14722ef4
AS
1125 if (uurb->flags & ~(USBDEVFS_URB_ISO_ASAP |
1126 USBDEVFS_URB_SHORT_NOT_OK |
01c6460f 1127 USBDEVFS_URB_BULK_CONTINUATION |
14722ef4
AS
1128 USBDEVFS_URB_NO_FSBR |
1129 USBDEVFS_URB_ZERO_PACKET |
1130 USBDEVFS_URB_NO_INTERRUPT))
1da177e4 1131 return -EINVAL;
9180135b 1132 if (uurb->buffer_length > 0 && !uurb->buffer)
1da177e4 1133 return -EINVAL;
04e482ff
GKH
1134 if (!(uurb->type == USBDEVFS_URB_TYPE_CONTROL &&
1135 (uurb->endpoint & ~USB_ENDPOINT_DIR_MASK) == 0)) {
1136 ifnum = findintfep(ps->dev, uurb->endpoint);
1137 if (ifnum < 0)
1da177e4 1138 return ifnum;
04e482ff
GKH
1139 ret = checkintf(ps, ifnum);
1140 if (ret)
1da177e4
LT
1141 return ret;
1142 }
93cf9b90
AS
1143 if ((uurb->endpoint & USB_ENDPOINT_DIR_MASK) != 0) {
1144 is_in = 1;
1145 ep = ps->dev->ep_in[uurb->endpoint & USB_ENDPOINT_NUMBER_MASK];
1146 } else {
1147 is_in = 0;
1148 ep = ps->dev->ep_out[uurb->endpoint & USB_ENDPOINT_NUMBER_MASK];
1149 }
1da177e4
LT
1150 if (!ep)
1151 return -ENOENT;
add1aaea
AS
1152
1153 u = 0;
1da177e4
LT
1154 switch(uurb->type) {
1155 case USBDEVFS_URB_TYPE_CONTROL:
93cf9b90 1156 if (!usb_endpoint_xfer_control(&ep->desc))
1da177e4 1157 return -EINVAL;
add1aaea
AS
1158 /* min 8 byte setup packet */
1159 if (uurb->buffer_length < 8)
1da177e4 1160 return -EINVAL;
04e482ff
GKH
1161 dr = kmalloc(sizeof(struct usb_ctrlrequest), GFP_KERNEL);
1162 if (!dr)
1da177e4
LT
1163 return -ENOMEM;
1164 if (copy_from_user(dr, uurb->buffer, 8)) {
52fb743d
AS
1165 ret = -EFAULT;
1166 goto error;
1da177e4
LT
1167 }
1168 if (uurb->buffer_length < (le16_to_cpup(&dr->wLength) + 8)) {
52fb743d
AS
1169 ret = -EINVAL;
1170 goto error;
1da177e4 1171 }
393cbb51 1172 ret = check_ctrlrecip(ps, dr->bRequestType, dr->bRequest,
04e482ff 1173 le16_to_cpup(&dr->wIndex));
52fb743d
AS
1174 if (ret)
1175 goto error;
1da177e4
LT
1176 uurb->number_of_packets = 0;
1177 uurb->buffer_length = le16_to_cpup(&dr->wLength);
1178 uurb->buffer += 8;
93cf9b90
AS
1179 if ((dr->bRequestType & USB_DIR_IN) && uurb->buffer_length) {
1180 is_in = 1;
1181 uurb->endpoint |= USB_DIR_IN;
1182 } else {
1183 is_in = 0;
1184 uurb->endpoint &= ~USB_DIR_IN;
1185 }
0880aef4
CF
1186 snoop(&ps->dev->dev, "control urb: bRequestType=%02x "
1187 "bRequest=%02x wValue=%04x "
1188 "wIndex=%04x wLength=%04x\n",
1189 dr->bRequestType, dr->bRequest,
1190 __le16_to_cpup(&dr->wValue),
1191 __le16_to_cpup(&dr->wIndex),
1192 __le16_to_cpup(&dr->wLength));
add1aaea 1193 u = sizeof(struct usb_ctrlrequest);
1da177e4
LT
1194 break;
1195
1196 case USBDEVFS_URB_TYPE_BULK:
93cf9b90 1197 switch (usb_endpoint_type(&ep->desc)) {
1da177e4
LT
1198 case USB_ENDPOINT_XFER_CONTROL:
1199 case USB_ENDPOINT_XFER_ISOC:
1200 return -EINVAL;
f661c6f8
AS
1201 case USB_ENDPOINT_XFER_INT:
1202 /* allow single-shot interrupt transfers */
1203 uurb->type = USBDEVFS_URB_TYPE_INTERRUPT;
1204 goto interrupt_urb;
1da177e4
LT
1205 }
1206 uurb->number_of_packets = 0;
1da177e4
LT
1207 break;
1208
f661c6f8
AS
1209 case USBDEVFS_URB_TYPE_INTERRUPT:
1210 if (!usb_endpoint_xfer_int(&ep->desc))
1211 return -EINVAL;
1212 interrupt_urb:
1213 uurb->number_of_packets = 0;
f661c6f8
AS
1214 break;
1215
1da177e4
LT
1216 case USBDEVFS_URB_TYPE_ISO:
1217 /* arbitrary limit */
04e482ff
GKH
1218 if (uurb->number_of_packets < 1 ||
1219 uurb->number_of_packets > 128)
1da177e4 1220 return -EINVAL;
93cf9b90 1221 if (!usb_endpoint_xfer_isoc(&ep->desc))
1da177e4 1222 return -EINVAL;
04e482ff
GKH
1223 isofrmlen = sizeof(struct usbdevfs_iso_packet_desc) *
1224 uurb->number_of_packets;
1da177e4
LT
1225 if (!(isopkt = kmalloc(isofrmlen, GFP_KERNEL)))
1226 return -ENOMEM;
1227 if (copy_from_user(isopkt, iso_frame_desc, isofrmlen)) {
52fb743d
AS
1228 ret = -EFAULT;
1229 goto error;
1da177e4
LT
1230 }
1231 for (totlen = u = 0; u < uurb->number_of_packets; u++) {
04e482ff
GKH
1232 /* arbitrary limit,
1233 * sufficient for USB 2.0 high-bandwidth iso */
3612242e 1234 if (isopkt[u].length > 8192) {
52fb743d
AS
1235 ret = -EINVAL;
1236 goto error;
1da177e4
LT
1237 }
1238 totlen += isopkt[u].length;
1239 }
add1aaea 1240 u *= sizeof(struct usb_iso_packet_descriptor);
1da177e4
LT
1241 uurb->buffer_length = totlen;
1242 break;
1243
1da177e4
LT
1244 default:
1245 return -EINVAL;
1246 }
add1aaea 1247
3f5eb8d5 1248 if (uurb->buffer_length >= USBFS_XFER_MAX) {
add1aaea
AS
1249 ret = -EINVAL;
1250 goto error;
1251 }
9180135b
AS
1252 if (uurb->buffer_length > 0 &&
1253 !access_ok(is_in ? VERIFY_WRITE : VERIFY_READ,
1254 uurb->buffer, uurb->buffer_length)) {
52fb743d
AS
1255 ret = -EFAULT;
1256 goto error;
1da177e4 1257 }
9180135b
AS
1258 as = alloc_async(uurb->number_of_packets);
1259 if (!as) {
52fb743d
AS
1260 ret = -ENOMEM;
1261 goto error;
1da177e4 1262 }
add1aaea
AS
1263 u += sizeof(struct async) + sizeof(struct urb) + uurb->buffer_length;
1264 ret = usbfs_increase_memory_usage(u);
1265 if (ret)
1266 goto error;
1267 as->mem_usage = u;
1268
9180135b
AS
1269 if (uurb->buffer_length > 0) {
1270 as->urb->transfer_buffer = kmalloc(uurb->buffer_length,
1271 GFP_KERNEL);
1272 if (!as->urb->transfer_buffer) {
52fb743d
AS
1273 ret = -ENOMEM;
1274 goto error;
9180135b 1275 }
7152b592
AS
1276 /* Isochronous input data may end up being discontiguous
1277 * if some of the packets are short. Clear the buffer so
1278 * that the gaps don't leak kernel data to userspace.
1279 */
1280 if (is_in && uurb->type == USBDEVFS_URB_TYPE_ISO)
1281 memset(as->urb->transfer_buffer, 0,
1282 uurb->buffer_length);
9180135b 1283 }
04e482ff
GKH
1284 as->urb->dev = ps->dev;
1285 as->urb->pipe = (uurb->type << 30) |
93cf9b90
AS
1286 __create_pipe(ps->dev, uurb->endpoint & 0xf) |
1287 (uurb->endpoint & USB_DIR_IN);
14722ef4
AS
1288
1289 /* This tedious sequence is necessary because the URB_* flags
1290 * are internal to the kernel and subject to change, whereas
1291 * the USBDEVFS_URB_* flags are a user API and must not be changed.
1292 */
1293 u = (is_in ? URB_DIR_IN : URB_DIR_OUT);
1294 if (uurb->flags & USBDEVFS_URB_ISO_ASAP)
1295 u |= URB_ISO_ASAP;
1296 if (uurb->flags & USBDEVFS_URB_SHORT_NOT_OK)
1297 u |= URB_SHORT_NOT_OK;
1298 if (uurb->flags & USBDEVFS_URB_NO_FSBR)
1299 u |= URB_NO_FSBR;
1300 if (uurb->flags & USBDEVFS_URB_ZERO_PACKET)
1301 u |= URB_ZERO_PACKET;
1302 if (uurb->flags & USBDEVFS_URB_NO_INTERRUPT)
1303 u |= URB_NO_INTERRUPT;
1304 as->urb->transfer_flags = u;
1305
1da177e4 1306 as->urb->transfer_buffer_length = uurb->buffer_length;
04e482ff 1307 as->urb->setup_packet = (unsigned char *)dr;
52fb743d 1308 dr = NULL;
1da177e4
LT
1309 as->urb->start_frame = uurb->start_frame;
1310 as->urb->number_of_packets = uurb->number_of_packets;
97b9eb91
AS
1311 if (uurb->type == USBDEVFS_URB_TYPE_ISO ||
1312 ps->dev->speed == USB_SPEED_HIGH)
1313 as->urb->interval = 1 << min(15, ep->desc.bInterval - 1);
1314 else
1315 as->urb->interval = ep->desc.bInterval;
04e482ff
GKH
1316 as->urb->context = as;
1317 as->urb->complete = async_completed;
1da177e4
LT
1318 for (totlen = u = 0; u < uurb->number_of_packets; u++) {
1319 as->urb->iso_frame_desc[u].offset = totlen;
1320 as->urb->iso_frame_desc[u].length = isopkt[u].length;
1321 totlen += isopkt[u].length;
1322 }
6fd19f4b 1323 kfree(isopkt);
52fb743d 1324 isopkt = NULL;
1da177e4 1325 as->ps = ps;
04e482ff 1326 as->userurb = arg;
9180135b 1327 if (is_in && uurb->buffer_length > 0)
1da177e4
LT
1328 as->userbuffer = uurb->buffer;
1329 else
1330 as->userbuffer = NULL;
1331 as->signr = uurb->signr;
1332 as->ifnum = ifnum;
2425c08b 1333 as->pid = get_pid(task_pid(current));
d178bc3a 1334 as->cred = get_current_cred();
7a01955f 1335 security_task_getsecid(current, &as->secid);
9180135b 1336 if (!is_in && uurb->buffer_length > 0) {
93cf9b90 1337 if (copy_from_user(as->urb->transfer_buffer, uurb->buffer,
9180135b 1338 uurb->buffer_length)) {
52fb743d
AS
1339 ret = -EFAULT;
1340 goto error;
1da177e4
LT
1341 }
1342 }
4c6e8971 1343 snoop_urb(ps->dev, as->userurb, as->urb->pipe,
0880aef4
CF
1344 as->urb->transfer_buffer_length, 0, SUBMIT,
1345 is_in ? NULL : as->urb->transfer_buffer,
1346 uurb->buffer_length);
04e482ff 1347 async_newpending(as);
01c6460f
AS
1348
1349 if (usb_endpoint_xfer_bulk(&ep->desc)) {
1350 spin_lock_irq(&ps->lock);
1351
1352 /* Not exactly the endpoint address; the direction bit is
1353 * shifted to the 0x10 position so that the value will be
1354 * between 0 and 31.
1355 */
1356 as->bulk_addr = usb_endpoint_num(&ep->desc) |
1357 ((ep->desc.bEndpointAddress & USB_ENDPOINT_DIR_MASK)
1358 >> 3);
1359
1360 /* If this bulk URB is the start of a new transfer, re-enable
1361 * the endpoint. Otherwise mark it as a continuation URB.
1362 */
1363 if (uurb->flags & USBDEVFS_URB_BULK_CONTINUATION)
1364 as->bulk_status = AS_CONTINUATION;
1365 else
1366 ps->disabled_bulk_eps &= ~(1 << as->bulk_addr);
1367
1368 /* Don't accept continuation URBs if the endpoint is
1369 * disabled because of an earlier error.
1370 */
1371 if (ps->disabled_bulk_eps & (1 << as->bulk_addr))
1372 ret = -EREMOTEIO;
1373 else
1374 ret = usb_submit_urb(as->urb, GFP_ATOMIC);
1375 spin_unlock_irq(&ps->lock);
1376 } else {
1377 ret = usb_submit_urb(as->urb, GFP_KERNEL);
1378 }
1379
1380 if (ret) {
04e482ff
GKH
1381 dev_printk(KERN_DEBUG, &ps->dev->dev,
1382 "usbfs: usb_submit_urb returned %d\n", ret);
4c6e8971 1383 snoop_urb(ps->dev, as->userurb, as->urb->pipe,
0880aef4 1384 0, ret, COMPLETE, NULL, 0);
04e482ff 1385 async_removepending(as);
52fb743d 1386 goto error;
04e482ff
GKH
1387 }
1388 return 0;
52fb743d
AS
1389
1390 error:
1391 kfree(isopkt);
1392 kfree(dr);
1393 if (as)
1394 free_async(as);
1395 return ret;
1da177e4
LT
1396}
1397
1398static int proc_submiturb(struct dev_state *ps, void __user *arg)
1399{
1400 struct usbdevfs_urb uurb;
1401
1402 if (copy_from_user(&uurb, arg, sizeof(uurb)))
1403 return -EFAULT;
1404
04e482ff
GKH
1405 return proc_do_submiturb(ps, &uurb,
1406 (((struct usbdevfs_urb __user *)arg)->iso_frame_desc),
1407 arg);
1da177e4
LT
1408}
1409
1410static int proc_unlinkurb(struct dev_state *ps, void __user *arg)
1411{
1412 struct async *as;
1413
1414 as = async_getpending(ps, arg);
1415 if (!as)
1416 return -EINVAL;
1417 usb_kill_urb(as->urb);
1418 return 0;
1419}
1420
1421static int processcompl(struct async *as, void __user * __user *arg)
1422{
1423 struct urb *urb = as->urb;
1424 struct usbdevfs_urb __user *userurb = as->userurb;
1425 void __user *addr = as->userurb;
1426 unsigned int i;
1427
7152b592
AS
1428 if (as->userbuffer && urb->actual_length) {
1429 if (urb->number_of_packets > 0) /* Isochronous */
1430 i = urb->transfer_buffer_length;
1431 else /* Non-Isoc */
1432 i = urb->actual_length;
1433 if (copy_to_user(as->userbuffer, urb->transfer_buffer, i))
d794a021 1434 goto err_out;
7152b592 1435 }
e015268d 1436 if (put_user(as->status, &userurb->status))
d794a021 1437 goto err_out;
1da177e4 1438 if (put_user(urb->actual_length, &userurb->actual_length))
d794a021 1439 goto err_out;
1da177e4 1440 if (put_user(urb->error_count, &userurb->error_count))
d794a021 1441 goto err_out;
1da177e4 1442
93cf9b90 1443 if (usb_endpoint_xfer_isoc(&urb->ep->desc)) {
668a9541
CL
1444 for (i = 0; i < urb->number_of_packets; i++) {
1445 if (put_user(urb->iso_frame_desc[i].actual_length,
1446 &userurb->iso_frame_desc[i].actual_length))
d794a021 1447 goto err_out;
668a9541
CL
1448 if (put_user(urb->iso_frame_desc[i].status,
1449 &userurb->iso_frame_desc[i].status))
d794a021 1450 goto err_out;
668a9541 1451 }
1da177e4
LT
1452 }
1453
1da177e4
LT
1454 if (put_user(addr, (void __user * __user *)arg))
1455 return -EFAULT;
1456 return 0;
d794a021
ON
1457
1458err_out:
d794a021 1459 return -EFAULT;
1da177e4
LT
1460}
1461
04e482ff 1462static struct async *reap_as(struct dev_state *ps)
1da177e4 1463{
04e482ff 1464 DECLARE_WAITQUEUE(wait, current);
1da177e4
LT
1465 struct async *as = NULL;
1466 struct usb_device *dev = ps->dev;
1467
1468 add_wait_queue(&ps->wait, &wait);
1469 for (;;) {
1470 __set_current_state(TASK_INTERRUPTIBLE);
04e482ff
GKH
1471 as = async_getcompleted(ps);
1472 if (as)
1da177e4
LT
1473 break;
1474 if (signal_pending(current))
1475 break;
1476 usb_unlock_device(dev);
1477 schedule();
1478 usb_lock_device(dev);
1479 }
1480 remove_wait_queue(&ps->wait, &wait);
1481 set_current_state(TASK_RUNNING);
1482 return as;
1483}
1484
1485static int proc_reapurb(struct dev_state *ps, void __user *arg)
1486{
1487 struct async *as = reap_as(ps);
ddeee0b2
LT
1488 if (as) {
1489 int retval = processcompl(as, (void __user * __user *)arg);
1490 free_async(as);
1491 return retval;
1492 }
1da177e4
LT
1493 if (signal_pending(current))
1494 return -EINTR;
1495 return -EIO;
1496}
1497
1498static int proc_reapurbnonblock(struct dev_state *ps, void __user *arg)
1499{
ddeee0b2 1500 int retval;
1da177e4
LT
1501 struct async *as;
1502
ddeee0b2
LT
1503 as = async_getcompleted(ps);
1504 retval = -EAGAIN;
1505 if (as) {
1506 retval = processcompl(as, (void __user * __user *)arg);
1507 free_async(as);
1508 }
1509 return retval;
1da177e4
LT
1510}
1511
1512#ifdef CONFIG_COMPAT
637e8a60
AB
1513static int proc_control_compat(struct dev_state *ps,
1514 struct usbdevfs_ctrltransfer32 __user *p32)
1515{
1516 struct usbdevfs_ctrltransfer __user *p;
1517 __u32 udata;
1518 p = compat_alloc_user_space(sizeof(*p));
1519 if (copy_in_user(p, p32, (sizeof(*p32) - sizeof(compat_caddr_t))) ||
1520 get_user(udata, &p32->data) ||
1521 put_user(compat_ptr(udata), &p->data))
1522 return -EFAULT;
1523 return proc_control(ps, p);
1524}
1525
1526static int proc_bulk_compat(struct dev_state *ps,
1527 struct usbdevfs_bulktransfer32 __user *p32)
1528{
1529 struct usbdevfs_bulktransfer __user *p;
1530 compat_uint_t n;
1531 compat_caddr_t addr;
1532
1533 p = compat_alloc_user_space(sizeof(*p));
1534
1535 if (get_user(n, &p32->ep) || put_user(n, &p->ep) ||
1536 get_user(n, &p32->len) || put_user(n, &p->len) ||
1537 get_user(n, &p32->timeout) || put_user(n, &p->timeout) ||
1538 get_user(addr, &p32->data) || put_user(compat_ptr(addr), &p->data))
1539 return -EFAULT;
1540
1541 return proc_bulk(ps, p);
1542}
1543static int proc_disconnectsignal_compat(struct dev_state *ps, void __user *arg)
1544{
1545 struct usbdevfs_disconnectsignal32 ds;
1546
1547 if (copy_from_user(&ds, arg, sizeof(ds)))
1548 return -EFAULT;
1549 ps->discsignr = ds.signr;
1550 ps->disccontext = compat_ptr(ds.context);
1551 return 0;
1552}
1da177e4
LT
1553
1554static int get_urb32(struct usbdevfs_urb *kurb,
1555 struct usbdevfs_urb32 __user *uurb)
1556{
1557 __u32 uptr;
18753ebc
MB
1558 if (!access_ok(VERIFY_READ, uurb, sizeof(*uurb)) ||
1559 __get_user(kurb->type, &uurb->type) ||
1da177e4
LT
1560 __get_user(kurb->endpoint, &uurb->endpoint) ||
1561 __get_user(kurb->status, &uurb->status) ||
1562 __get_user(kurb->flags, &uurb->flags) ||
1563 __get_user(kurb->buffer_length, &uurb->buffer_length) ||
1564 __get_user(kurb->actual_length, &uurb->actual_length) ||
1565 __get_user(kurb->start_frame, &uurb->start_frame) ||
1566 __get_user(kurb->number_of_packets, &uurb->number_of_packets) ||
1567 __get_user(kurb->error_count, &uurb->error_count) ||
1568 __get_user(kurb->signr, &uurb->signr))
1569 return -EFAULT;
1570
1571 if (__get_user(uptr, &uurb->buffer))
1572 return -EFAULT;
1573 kurb->buffer = compat_ptr(uptr);
ed0c7720 1574 if (__get_user(uptr, &uurb->usercontext))
1da177e4
LT
1575 return -EFAULT;
1576 kurb->usercontext = compat_ptr(uptr);
1577
1578 return 0;
1579}
1580
1581static int proc_submiturb_compat(struct dev_state *ps, void __user *arg)
1582{
1583 struct usbdevfs_urb uurb;
1584
04e482ff 1585 if (get_urb32(&uurb, (struct usbdevfs_urb32 __user *)arg))
1da177e4
LT
1586 return -EFAULT;
1587
04e482ff
GKH
1588 return proc_do_submiturb(ps, &uurb,
1589 ((struct usbdevfs_urb32 __user *)arg)->iso_frame_desc,
1590 arg);
1da177e4
LT
1591}
1592
1593static int processcompl_compat(struct async *as, void __user * __user *arg)
1594{
1595 struct urb *urb = as->urb;
1596 struct usbdevfs_urb32 __user *userurb = as->userurb;
1597 void __user *addr = as->userurb;
1598 unsigned int i;
1599
d4a4683c 1600 if (as->userbuffer && urb->actual_length)
04e482ff 1601 if (copy_to_user(as->userbuffer, urb->transfer_buffer,
d4a4683c 1602 urb->actual_length))
1da177e4 1603 return -EFAULT;
e015268d 1604 if (put_user(as->status, &userurb->status))
1da177e4
LT
1605 return -EFAULT;
1606 if (put_user(urb->actual_length, &userurb->actual_length))
1607 return -EFAULT;
1608 if (put_user(urb->error_count, &userurb->error_count))
1609 return -EFAULT;
1610
93cf9b90 1611 if (usb_endpoint_xfer_isoc(&urb->ep->desc)) {
668a9541
CL
1612 for (i = 0; i < urb->number_of_packets; i++) {
1613 if (put_user(urb->iso_frame_desc[i].actual_length,
1614 &userurb->iso_frame_desc[i].actual_length))
1615 return -EFAULT;
1616 if (put_user(urb->iso_frame_desc[i].status,
1617 &userurb->iso_frame_desc[i].status))
1618 return -EFAULT;
1619 }
1da177e4
LT
1620 }
1621
c714de5d 1622 if (put_user(ptr_to_compat(addr), (u32 __user *)arg))
1da177e4
LT
1623 return -EFAULT;
1624 return 0;
1625}
1626
1627static int proc_reapurb_compat(struct dev_state *ps, void __user *arg)
1628{
1629 struct async *as = reap_as(ps);
ddeee0b2
LT
1630 if (as) {
1631 int retval = processcompl_compat(as, (void __user * __user *)arg);
1632 free_async(as);
1633 return retval;
1634 }
1da177e4
LT
1635 if (signal_pending(current))
1636 return -EINTR;
1637 return -EIO;
1638}
1639
1640static int proc_reapurbnonblock_compat(struct dev_state *ps, void __user *arg)
1641{
ddeee0b2 1642 int retval;
1da177e4
LT
1643 struct async *as;
1644
ddeee0b2
LT
1645 retval = -EAGAIN;
1646 as = async_getcompleted(ps);
1647 if (as) {
1648 retval = processcompl_compat(as, (void __user * __user *)arg);
1649 free_async(as);
1650 }
1651 return retval;
1da177e4
LT
1652}
1653
637e8a60 1654
1da177e4
LT
1655#endif
1656
1657static int proc_disconnectsignal(struct dev_state *ps, void __user *arg)
1658{
1659 struct usbdevfs_disconnectsignal ds;
1660
1661 if (copy_from_user(&ds, arg, sizeof(ds)))
1662 return -EFAULT;
1da177e4
LT
1663 ps->discsignr = ds.signr;
1664 ps->disccontext = ds.context;
1665 return 0;
1666}
1667
1668static int proc_claiminterface(struct dev_state *ps, void __user *arg)
1669{
1670 unsigned int ifnum;
1671
1672 if (get_user(ifnum, (unsigned int __user *)arg))
1673 return -EFAULT;
1674 return claimintf(ps, ifnum);
1675}
1676
1677static int proc_releaseinterface(struct dev_state *ps, void __user *arg)
1678{
1679 unsigned int ifnum;
1680 int ret;
1681
1682 if (get_user(ifnum, (unsigned int __user *)arg))
1683 return -EFAULT;
1684 if ((ret = releaseintf(ps, ifnum)) < 0)
1685 return ret;
1686 destroy_async_on_interface (ps, ifnum);
1687 return 0;
1688}
1689
c36fc889 1690static int proc_ioctl(struct dev_state *ps, struct usbdevfs_ioctl *ctl)
1da177e4 1691{
1da177e4
LT
1692 int size;
1693 void *buf = NULL;
1694 int retval = 0;
1695 struct usb_interface *intf = NULL;
1696 struct usb_driver *driver = NULL;
1da177e4 1697
c36fc889 1698 /* alloc buffer */
04e482ff
GKH
1699 if ((size = _IOC_SIZE(ctl->ioctl_code)) > 0) {
1700 if ((buf = kmalloc(size, GFP_KERNEL)) == NULL)
1da177e4 1701 return -ENOMEM;
c36fc889 1702 if ((_IOC_DIR(ctl->ioctl_code) & _IOC_WRITE)) {
04e482ff 1703 if (copy_from_user(buf, ctl->data, size)) {
6fd19f4b 1704 kfree(buf);
1da177e4
LT
1705 return -EFAULT;
1706 }
1707 } else {
04e482ff 1708 memset(buf, 0, size);
1da177e4
LT
1709 }
1710 }
1711
349710c3 1712 if (!connected(ps)) {
6fd19f4b 1713 kfree(buf);
1da177e4
LT
1714 return -ENODEV;
1715 }
1716
1717 if (ps->dev->state != USB_STATE_CONFIGURED)
1718 retval = -EHOSTUNREACH;
04e482ff
GKH
1719 else if (!(intf = usb_ifnum_to_if(ps->dev, ctl->ifno)))
1720 retval = -EINVAL;
c36fc889 1721 else switch (ctl->ioctl_code) {
1da177e4
LT
1722
1723 /* disconnect kernel driver from interface */
1724 case USBDEVFS_DISCONNECT:
1da177e4
LT
1725 if (intf->dev.driver) {
1726 driver = to_usb_driver(intf->dev.driver);
04e482ff 1727 dev_dbg(&intf->dev, "disconnect by usbfs\n");
1da177e4
LT
1728 usb_driver_release_interface(driver, intf);
1729 } else
1730 retval = -ENODATA;
1da177e4
LT
1731 break;
1732
1733 /* let kernel drivers try to (re)bind to the interface */
1734 case USBDEVFS_CONNECT:
885e9747
AS
1735 if (!intf->dev.driver)
1736 retval = device_attach(&intf->dev);
1737 else
1738 retval = -EBUSY;
1da177e4
LT
1739 break;
1740
1741 /* talk directly to the interface's driver */
1742 default:
1da177e4
LT
1743 if (intf->dev.driver)
1744 driver = to_usb_driver(intf->dev.driver);
c532b29a 1745 if (driver == NULL || driver->unlocked_ioctl == NULL) {
1da177e4
LT
1746 retval = -ENOTTY;
1747 } else {
c532b29a 1748 retval = driver->unlocked_ioctl(intf, ctl->ioctl_code, buf);
1da177e4
LT
1749 if (retval == -ENOIOCTLCMD)
1750 retval = -ENOTTY;
1751 }
1da177e4
LT
1752 }
1753
1754 /* cleanup and return */
1755 if (retval >= 0
04e482ff 1756 && (_IOC_DIR(ctl->ioctl_code) & _IOC_READ) != 0
1da177e4 1757 && size > 0
04e482ff 1758 && copy_to_user(ctl->data, buf, size) != 0)
1da177e4 1759 retval = -EFAULT;
6fd19f4b
JJ
1760
1761 kfree(buf);
1da177e4
LT
1762 return retval;
1763}
1764
c36fc889
PZ
1765static int proc_ioctl_default(struct dev_state *ps, void __user *arg)
1766{
1767 struct usbdevfs_ioctl ctrl;
1768
04e482ff 1769 if (copy_from_user(&ctrl, arg, sizeof(ctrl)))
c36fc889
PZ
1770 return -EFAULT;
1771 return proc_ioctl(ps, &ctrl);
1772}
1773
1774#ifdef CONFIG_COMPAT
777da590 1775static int proc_ioctl_compat(struct dev_state *ps, compat_uptr_t arg)
c36fc889
PZ
1776{
1777 struct usbdevfs_ioctl32 __user *uioc;
1778 struct usbdevfs_ioctl ctrl;
1779 u32 udata;
1780
058120d7 1781 uioc = compat_ptr((long)arg);
18753ebc
MB
1782 if (!access_ok(VERIFY_READ, uioc, sizeof(*uioc)) ||
1783 __get_user(ctrl.ifno, &uioc->ifno) ||
1784 __get_user(ctrl.ioctl_code, &uioc->ioctl_code) ||
c36fc889
PZ
1785 __get_user(udata, &uioc->data))
1786 return -EFAULT;
1787 ctrl.data = compat_ptr(udata);
1788
1789 return proc_ioctl(ps, &ctrl);
1790}
1791#endif
1792
7cbe5dca
AS
1793static int proc_claim_port(struct dev_state *ps, void __user *arg)
1794{
1795 unsigned portnum;
1796 int rc;
1797
1798 if (get_user(portnum, (unsigned __user *) arg))
1799 return -EFAULT;
1800 rc = usb_hub_claim_port(ps->dev, portnum, ps);
1801 if (rc == 0)
1802 snoop(&ps->dev->dev, "port %d claimed by process %d: %s\n",
1803 portnum, task_pid_nr(current), current->comm);
1804 return rc;
1805}
1806
1807static int proc_release_port(struct dev_state *ps, void __user *arg)
1808{
1809 unsigned portnum;
1810
1811 if (get_user(portnum, (unsigned __user *) arg))
1812 return -EFAULT;
1813 return usb_hub_release_port(ps->dev, portnum, ps);
1814}
1815
1da177e4
LT
1816/*
1817 * NOTE: All requests here that have interface numbers as parameters
1818 * are assuming that somehow the configuration has been prevented from
1819 * changing. But there's no mechanism to ensure that...
1820 */
637e8a60
AB
1821static long usbdev_do_ioctl(struct file *file, unsigned int cmd,
1822 void __user *p)
1da177e4 1823{
ec17cf1c 1824 struct dev_state *ps = file->private_data;
637e8a60 1825 struct inode *inode = file->f_path.dentry->d_inode;
1da177e4 1826 struct usb_device *dev = ps->dev;
1da177e4
LT
1827 int ret = -ENOTTY;
1828
1829 if (!(file->f_mode & FMODE_WRITE))
1830 return -EPERM;
01412a21 1831
1da177e4 1832 usb_lock_device(dev);
349710c3 1833 if (!connected(ps)) {
1da177e4
LT
1834 usb_unlock_device(dev);
1835 return -ENODEV;
1836 }
1837
1838 switch (cmd) {
1839 case USBDEVFS_CONTROL:
441b62c1 1840 snoop(&dev->dev, "%s: CONTROL\n", __func__);
1da177e4
LT
1841 ret = proc_control(ps, p);
1842 if (ret >= 0)
1843 inode->i_mtime = CURRENT_TIME;
1844 break;
1845
1846 case USBDEVFS_BULK:
441b62c1 1847 snoop(&dev->dev, "%s: BULK\n", __func__);
1da177e4
LT
1848 ret = proc_bulk(ps, p);
1849 if (ret >= 0)
1850 inode->i_mtime = CURRENT_TIME;
1851 break;
1852
1853 case USBDEVFS_RESETEP:
441b62c1 1854 snoop(&dev->dev, "%s: RESETEP\n", __func__);
1da177e4
LT
1855 ret = proc_resetep(ps, p);
1856 if (ret >= 0)
1857 inode->i_mtime = CURRENT_TIME;
1858 break;
1859
1860 case USBDEVFS_RESET:
441b62c1 1861 snoop(&dev->dev, "%s: RESET\n", __func__);
1da177e4
LT
1862 ret = proc_resetdevice(ps);
1863 break;
1864
1865 case USBDEVFS_CLEAR_HALT:
441b62c1 1866 snoop(&dev->dev, "%s: CLEAR_HALT\n", __func__);
1da177e4
LT
1867 ret = proc_clearhalt(ps, p);
1868 if (ret >= 0)
1869 inode->i_mtime = CURRENT_TIME;
1870 break;
1871
1872 case USBDEVFS_GETDRIVER:
441b62c1 1873 snoop(&dev->dev, "%s: GETDRIVER\n", __func__);
1da177e4
LT
1874 ret = proc_getdriver(ps, p);
1875 break;
1876
1877 case USBDEVFS_CONNECTINFO:
441b62c1 1878 snoop(&dev->dev, "%s: CONNECTINFO\n", __func__);
1da177e4
LT
1879 ret = proc_connectinfo(ps, p);
1880 break;
1881
1882 case USBDEVFS_SETINTERFACE:
441b62c1 1883 snoop(&dev->dev, "%s: SETINTERFACE\n", __func__);
1da177e4
LT
1884 ret = proc_setintf(ps, p);
1885 break;
1886
1887 case USBDEVFS_SETCONFIGURATION:
441b62c1 1888 snoop(&dev->dev, "%s: SETCONFIGURATION\n", __func__);
1da177e4
LT
1889 ret = proc_setconfig(ps, p);
1890 break;
1891
1892 case USBDEVFS_SUBMITURB:
441b62c1 1893 snoop(&dev->dev, "%s: SUBMITURB\n", __func__);
1da177e4
LT
1894 ret = proc_submiturb(ps, p);
1895 if (ret >= 0)
1896 inode->i_mtime = CURRENT_TIME;
1897 break;
1898
1899#ifdef CONFIG_COMPAT
637e8a60
AB
1900 case USBDEVFS_CONTROL32:
1901 snoop(&dev->dev, "%s: CONTROL32\n", __func__);
1902 ret = proc_control_compat(ps, p);
1903 if (ret >= 0)
1904 inode->i_mtime = CURRENT_TIME;
1905 break;
1906
1907 case USBDEVFS_BULK32:
1908 snoop(&dev->dev, "%s: BULK32\n", __func__);
1909 ret = proc_bulk_compat(ps, p);
1910 if (ret >= 0)
1911 inode->i_mtime = CURRENT_TIME;
1912 break;
1913
1914 case USBDEVFS_DISCSIGNAL32:
1915 snoop(&dev->dev, "%s: DISCSIGNAL32\n", __func__);
1916 ret = proc_disconnectsignal_compat(ps, p);
1917 break;
1da177e4
LT
1918
1919 case USBDEVFS_SUBMITURB32:
441b62c1 1920 snoop(&dev->dev, "%s: SUBMITURB32\n", __func__);
1da177e4
LT
1921 ret = proc_submiturb_compat(ps, p);
1922 if (ret >= 0)
1923 inode->i_mtime = CURRENT_TIME;
1924 break;
1925
1926 case USBDEVFS_REAPURB32:
441b62c1 1927 snoop(&dev->dev, "%s: REAPURB32\n", __func__);
1da177e4
LT
1928 ret = proc_reapurb_compat(ps, p);
1929 break;
1930
1931 case USBDEVFS_REAPURBNDELAY32:
4c6e8971 1932 snoop(&dev->dev, "%s: REAPURBNDELAY32\n", __func__);
1da177e4
LT
1933 ret = proc_reapurbnonblock_compat(ps, p);
1934 break;
1935
c36fc889 1936 case USBDEVFS_IOCTL32:
637e8a60 1937 snoop(&dev->dev, "%s: IOCTL32\n", __func__);
c714de5d 1938 ret = proc_ioctl_compat(ps, ptr_to_compat(p));
c36fc889 1939 break;
1da177e4
LT
1940#endif
1941
1942 case USBDEVFS_DISCARDURB:
441b62c1 1943 snoop(&dev->dev, "%s: DISCARDURB\n", __func__);
1da177e4
LT
1944 ret = proc_unlinkurb(ps, p);
1945 break;
1946
1947 case USBDEVFS_REAPURB:
441b62c1 1948 snoop(&dev->dev, "%s: REAPURB\n", __func__);
1da177e4
LT
1949 ret = proc_reapurb(ps, p);
1950 break;
1951
1952 case USBDEVFS_REAPURBNDELAY:
4c6e8971 1953 snoop(&dev->dev, "%s: REAPURBNDELAY\n", __func__);
1da177e4
LT
1954 ret = proc_reapurbnonblock(ps, p);
1955 break;
1956
1957 case USBDEVFS_DISCSIGNAL:
441b62c1 1958 snoop(&dev->dev, "%s: DISCSIGNAL\n", __func__);
1da177e4
LT
1959 ret = proc_disconnectsignal(ps, p);
1960 break;
1961
1962 case USBDEVFS_CLAIMINTERFACE:
441b62c1 1963 snoop(&dev->dev, "%s: CLAIMINTERFACE\n", __func__);
1da177e4
LT
1964 ret = proc_claiminterface(ps, p);
1965 break;
1966
1967 case USBDEVFS_RELEASEINTERFACE:
441b62c1 1968 snoop(&dev->dev, "%s: RELEASEINTERFACE\n", __func__);
1da177e4
LT
1969 ret = proc_releaseinterface(ps, p);
1970 break;
1971
1972 case USBDEVFS_IOCTL:
441b62c1 1973 snoop(&dev->dev, "%s: IOCTL\n", __func__);
c36fc889 1974 ret = proc_ioctl_default(ps, p);
1da177e4 1975 break;
7cbe5dca
AS
1976
1977 case USBDEVFS_CLAIM_PORT:
1978 snoop(&dev->dev, "%s: CLAIM_PORT\n", __func__);
1979 ret = proc_claim_port(ps, p);
1980 break;
1981
1982 case USBDEVFS_RELEASE_PORT:
1983 snoop(&dev->dev, "%s: RELEASE_PORT\n", __func__);
1984 ret = proc_release_port(ps, p);
1985 break;
1da177e4
LT
1986 }
1987 usb_unlock_device(dev);
1988 if (ret >= 0)
1989 inode->i_atime = CURRENT_TIME;
1990 return ret;
1991}
1992
637e8a60
AB
1993static long usbdev_ioctl(struct file *file, unsigned int cmd,
1994 unsigned long arg)
1995{
1996 int ret;
1997
637e8a60 1998 ret = usbdev_do_ioctl(file, cmd, (void __user *)arg);
637e8a60
AB
1999
2000 return ret;
2001}
2002
2003#ifdef CONFIG_COMPAT
2004static long usbdev_compat_ioctl(struct file *file, unsigned int cmd,
2005 unsigned long arg)
2006{
2007 int ret;
2008
637e8a60 2009 ret = usbdev_do_ioctl(file, cmd, compat_ptr(arg));
637e8a60
AB
2010
2011 return ret;
2012}
2013#endif
2014
1da177e4 2015/* No kernel lock - fine */
04e482ff
GKH
2016static unsigned int usbdev_poll(struct file *file,
2017 struct poll_table_struct *wait)
1da177e4 2018{
ec17cf1c
TK
2019 struct dev_state *ps = file->private_data;
2020 unsigned int mask = 0;
1da177e4
LT
2021
2022 poll_wait(file, &ps->wait, wait);
2023 if (file->f_mode & FMODE_WRITE && !list_empty(&ps->async_completed))
2024 mask |= POLLOUT | POLLWRNORM;
349710c3 2025 if (!connected(ps))
1da177e4
LT
2026 mask |= POLLERR | POLLHUP;
2027 return mask;
2028}
2029
9f8b17e6 2030const struct file_operations usbdev_file_operations = {
637e8a60
AB
2031 .owner = THIS_MODULE,
2032 .llseek = usbdev_lseek,
2033 .read = usbdev_read,
2034 .poll = usbdev_poll,
2035 .unlocked_ioctl = usbdev_ioctl,
2036#ifdef CONFIG_COMPAT
2037 .compat_ioctl = usbdev_compat_ioctl,
2038#endif
2039 .open = usbdev_open,
2040 .release = usbdev_release,
1da177e4 2041};
fbf82fd2 2042
501950d8 2043static void usbdev_remove(struct usb_device *udev)
cd9f0375
AS
2044{
2045 struct dev_state *ps;
2046 struct siginfo sinfo;
2047
2048 while (!list_empty(&udev->filelist)) {
2049 ps = list_entry(udev->filelist.next, struct dev_state, list);
2050 destroy_all_async(ps);
2051 wake_up_all(&ps->wait);
2052 list_del_init(&ps->list);
2053 if (ps->discsignr) {
2054 sinfo.si_signo = ps->discsignr;
2055 sinfo.si_errno = EPIPE;
2056 sinfo.si_code = SI_ASYNCIO;
2057 sinfo.si_addr = ps->disccontext;
d178bc3a
SH
2058 kill_pid_info_as_cred(ps->discsignr, &sinfo,
2059 ps->disc_pid, ps->cred, ps->secid);
cd9f0375
AS
2060 }
2061 }
2062}
2063
9f8b17e6
KS
2064#ifdef CONFIG_USB_DEVICE_CLASS
2065static struct class *usb_classdev_class;
2066
2067static int usb_classdev_add(struct usb_device *dev)
fbf82fd2 2068{
e04199b2
AS
2069 struct device *cldev;
2070
b0b090e5
GKH
2071 cldev = device_create(usb_classdev_class, &dev->dev, dev->dev.devt,
2072 NULL, "usbdev%d.%d", dev->bus->busnum,
2073 dev->devnum);
e04199b2
AS
2074 if (IS_ERR(cldev))
2075 return PTR_ERR(cldev);
2076 dev->usb_classdev = cldev;
27d39e26 2077 return 0;
fbf82fd2
KS
2078}
2079
9f8b17e6 2080static void usb_classdev_remove(struct usb_device *dev)
fbf82fd2 2081{
e04199b2
AS
2082 if (dev->usb_classdev)
2083 device_unregister(dev->usb_classdev);
fbf82fd2
KS
2084}
2085
501950d8
AS
2086#else
2087#define usb_classdev_add(dev) 0
2088#define usb_classdev_remove(dev) do {} while (0)
2089
2090#endif
2091
2092static int usbdev_notify(struct notifier_block *self,
9f8b17e6 2093 unsigned long action, void *dev)
a7b986b3
GKH
2094{
2095 switch (action) {
2096 case USB_DEVICE_ADD:
9f8b17e6 2097 if (usb_classdev_add(dev))
27d39e26 2098 return NOTIFY_BAD;
a7b986b3
GKH
2099 break;
2100 case USB_DEVICE_REMOVE:
9f8b17e6 2101 usb_classdev_remove(dev);
501950d8 2102 usbdev_remove(dev);
a7b986b3
GKH
2103 break;
2104 }
2105 return NOTIFY_OK;
2106}
2107
2108static struct notifier_block usbdev_nb = {
501950d8 2109 .notifier_call = usbdev_notify,
a7b986b3
GKH
2110};
2111
7e7654a9 2112static struct cdev usb_device_cdev;
fbf82fd2 2113
9f8b17e6 2114int __init usb_devio_init(void)
fbf82fd2
KS
2115{
2116 int retval;
2117
fad21bdf 2118 retval = register_chrdev_region(USB_DEVICE_DEV, USB_DEVICE_MAX,
04e482ff 2119 "usb_device");
fbf82fd2 2120 if (retval) {
69a85942 2121 printk(KERN_ERR "Unable to register minors for usb_device\n");
fbf82fd2
KS
2122 goto out;
2123 }
9f8b17e6 2124 cdev_init(&usb_device_cdev, &usbdev_file_operations);
fad21bdf 2125 retval = cdev_add(&usb_device_cdev, USB_DEVICE_DEV, USB_DEVICE_MAX);
fbf82fd2 2126 if (retval) {
69a85942
GKH
2127 printk(KERN_ERR "Unable to get usb_device major %d\n",
2128 USB_DEVICE_MAJOR);
a7b986b3 2129 goto error_cdev;
fbf82fd2 2130 }
9f8b17e6
KS
2131#ifdef CONFIG_USB_DEVICE_CLASS
2132 usb_classdev_class = class_create(THIS_MODULE, "usb_device");
2133 if (IS_ERR(usb_classdev_class)) {
69a85942 2134 printk(KERN_ERR "Unable to register usb_device class\n");
9f8b17e6
KS
2135 retval = PTR_ERR(usb_classdev_class);
2136 cdev_del(&usb_device_cdev);
2137 usb_classdev_class = NULL;
2138 goto out;
fbf82fd2 2139 }
e105b8bf
DW
2140 /* devices of this class shadow the major:minor of their parent
2141 * device, so clear ->dev_kobj to prevent adding duplicate entries
2142 * to /sys/dev
2143 */
2144 usb_classdev_class->dev_kobj = NULL;
9f8b17e6 2145#endif
501950d8 2146 usb_register_notify(&usbdev_nb);
fbf82fd2
KS
2147out:
2148 return retval;
a7b986b3 2149
a7b986b3
GKH
2150error_cdev:
2151 unregister_chrdev_region(USB_DEVICE_DEV, USB_DEVICE_MAX);
2152 goto out;
fbf82fd2
KS
2153}
2154
9f8b17e6 2155void usb_devio_cleanup(void)
fbf82fd2 2156{
a7b986b3 2157 usb_unregister_notify(&usbdev_nb);
501950d8 2158#ifdef CONFIG_USB_DEVICE_CLASS
9f8b17e6
KS
2159 class_destroy(usb_classdev_class);
2160#endif
fbf82fd2 2161 cdev_del(&usb_device_cdev);
fad21bdf 2162 unregister_chrdev_region(USB_DEVICE_DEV, USB_DEVICE_MAX);
fbf82fd2 2163}