]> git.proxmox.com Git - mirror_ubuntu-artful-kernel.git/blame - drivers/usb/core/devio.c
Merge tag 'actions-drivers-for-4.13' of git://git.kernel.org/pub/scm/linux/kernel...
[mirror_ubuntu-artful-kernel.git] / drivers / usb / core / devio.c
CommitLineData
1da177e4
LT
1/*****************************************************************************/
2
3/*
4 * devio.c -- User space communication with USB devices.
5 *
6 * Copyright (C) 1999-2000 Thomas Sailer (sailer@ife.ee.ethz.ch)
7 *
8 * This program is free software; you can redistribute it and/or modify
9 * it under the terms of the GNU General Public License as published by
10 * the Free Software Foundation; either version 2 of the License, or
11 * (at your option) any later version.
12 *
13 * This program is distributed in the hope that it will be useful,
14 * but WITHOUT ANY WARRANTY; without even the implied warranty of
15 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
16 * GNU General Public License for more details.
17 *
18 * You should have received a copy of the GNU General Public License
19 * along with this program; if not, write to the Free Software
20 * Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA.
21 *
1da177e4
LT
22 * This file implements the usbfs/x/y files, where
23 * x is the bus number and y the device number.
24 *
25 * It allows user space programs/"drivers" to communicate directly
26 * with USB devices without intervening kernel driver.
27 *
28 * Revision history
29 * 22.12.1999 0.1 Initial release (split from proc_usb.c)
30 * 04.01.2000 0.2 Turned into its own filesystem
46113830
HW
31 * 30.09.2005 0.3 Fix user-triggerable oops in async URB delivery
32 * (CAN-2005-3055)
1da177e4
LT
33 */
34
35/*****************************************************************************/
36
37#include <linux/fs.h>
38#include <linux/mm.h>
3f07c014 39#include <linux/sched/signal.h>
1da177e4 40#include <linux/slab.h>
1da177e4
LT
41#include <linux/signal.h>
42#include <linux/poll.h>
43#include <linux/module.h>
b11b2e1b 44#include <linux/string.h>
1da177e4
LT
45#include <linux/usb.h>
46#include <linux/usbdevice_fs.h>
27729aad 47#include <linux/usb/hcd.h> /* for usbcore internals */
fbf82fd2 48#include <linux/cdev.h>
a7b986b3 49#include <linux/notifier.h>
7a01955f 50#include <linux/security.h>
d178bc3a 51#include <linux/user_namespace.h>
3d97ff63 52#include <linux/scatterlist.h>
e6889b31 53#include <linux/uaccess.h>
f7d34b44 54#include <linux/dma-mapping.h>
1da177e4
LT
55#include <asm/byteorder.h>
56#include <linux/moduleparam.h>
57
1da177e4
LT
58#include "usb.h"
59
fbf82fd2 60#define USB_MAXBUS 64
fa86ad0b 61#define USB_DEVICE_MAX (USB_MAXBUS * 128)
3d97ff63 62#define USB_SG_SIZE 16384 /* split-size for large txs */
fbf82fd2 63
4a2a8a2c
AS
64/* Mutual exclusion for removal, open, and release */
65DEFINE_MUTEX(usbfs_mutex);
66
9b6f0c4b 67struct usb_dev_state {
cd9f0375
AS
68 struct list_head list; /* state list */
69 struct usb_device *dev;
70 struct file *file;
71 spinlock_t lock; /* protects the async urb lists */
72 struct list_head async_pending;
73 struct list_head async_completed;
f7d34b44 74 struct list_head memory_list;
cd9f0375
AS
75 wait_queue_head_t wait; /* wake up if a request completed */
76 unsigned int discsignr;
77 struct pid *disc_pid;
d178bc3a 78 const struct cred *cred;
cd9f0375
AS
79 void __user *disccontext;
80 unsigned long ifclaimed;
81 u32 secid;
01c6460f 82 u32 disabled_bulk_eps;
d883f52e
RG
83 bool privileges_dropped;
84 unsigned long interface_allowed_mask;
cd9f0375
AS
85};
86
f7d34b44
SG
87struct usb_memory {
88 struct list_head memlist;
89 int vma_use_count;
90 int urb_use_count;
91 u32 size;
92 void *mem;
93 dma_addr_t dma_handle;
94 unsigned long vm_start;
95 struct usb_dev_state *ps;
96};
97
1da177e4
LT
98struct async {
99 struct list_head asynclist;
9b6f0c4b 100 struct usb_dev_state *ps;
2425c08b 101 struct pid *pid;
d178bc3a 102 const struct cred *cred;
1da177e4
LT
103 unsigned int signr;
104 unsigned int ifnum;
105 void __user *userbuffer;
106 void __user *userurb;
107 struct urb *urb;
f7d34b44 108 struct usb_memory *usbm;
add1aaea 109 unsigned int mem_usage;
e015268d 110 int status;
7a01955f 111 u32 secid;
01c6460f
AS
112 u8 bulk_addr;
113 u8 bulk_status;
1da177e4
LT
114};
115
90ab5ee9 116static bool usbfs_snoop;
04e482ff
GKH
117module_param(usbfs_snoop, bool, S_IRUGO | S_IWUSR);
118MODULE_PARM_DESC(usbfs_snoop, "true to log all usbfs traffic");
1da177e4 119
0290cc9f
AS
120static unsigned usbfs_snoop_max = 65536;
121module_param(usbfs_snoop_max, uint, S_IRUGO | S_IWUSR);
122MODULE_PARM_DESC(usbfs_snoop_max,
123 "maximum number of bytes to print while snooping");
124
1da177e4
LT
125#define snoop(dev, format, arg...) \
126 do { \
127 if (usbfs_snoop) \
f355e830 128 dev_info(dev, format, ## arg); \
1da177e4
LT
129 } while (0)
130
4c6e8971
AS
131enum snoop_when {
132 SUBMIT, COMPLETE
133};
fad21bdf 134
4c6e8971 135#define USB_DEVICE_DEV MKDEV(USB_DEVICE_MAJOR, 0)
1da177e4 136
add1aaea 137/* Limit on the total amount of memory we can allocate for transfers */
1129d270 138static u32 usbfs_memory_mb = 16;
3f5eb8d5
AS
139module_param(usbfs_memory_mb, uint, 0644);
140MODULE_PARM_DESC(usbfs_memory_mb,
141 "maximum MB allowed for usbfs buffers (0 = no limit)");
142
1129d270 143static atomic64_t usbfs_memory_usage; /* Total memory currently allocated */
add1aaea
AS
144
145/* Check whether it's okay to allocate more memory for a transfer */
1129d270 146static int usbfs_increase_memory_usage(u64 amount)
add1aaea 147{
1129d270 148 u64 lim;
3f5eb8d5 149
3f5eb8d5 150 lim = ACCESS_ONCE(usbfs_memory_mb);
1129d270 151 lim <<= 20;
3f5eb8d5 152
1129d270
MB
153 atomic64_add(amount, &usbfs_memory_usage);
154
155 if (lim > 0 && atomic64_read(&usbfs_memory_usage) > lim) {
156 atomic64_sub(amount, &usbfs_memory_usage);
157 return -ENOMEM;
158 }
159
160 return 0;
add1aaea
AS
161}
162
163/* Memory for a transfer is being deallocated */
1129d270 164static void usbfs_decrease_memory_usage(u64 amount)
add1aaea 165{
1129d270 166 atomic64_sub(amount, &usbfs_memory_usage);
add1aaea 167}
4c6e8971 168
9b6f0c4b 169static int connected(struct usb_dev_state *ps)
1da177e4 170{
349710c3
AS
171 return (!list_empty(&ps->list) &&
172 ps->dev->state != USB_STATE_NOTATTACHED);
1da177e4
LT
173}
174
f7d34b44
SG
175static void dec_usb_memory_use_count(struct usb_memory *usbm, int *count)
176{
177 struct usb_dev_state *ps = usbm->ps;
178 unsigned long flags;
179
180 spin_lock_irqsave(&ps->lock, flags);
181 --*count;
182 if (usbm->urb_use_count == 0 && usbm->vma_use_count == 0) {
183 list_del(&usbm->memlist);
184 spin_unlock_irqrestore(&ps->lock, flags);
185
186 usb_free_coherent(ps->dev, usbm->size, usbm->mem,
187 usbm->dma_handle);
188 usbfs_decrease_memory_usage(
189 usbm->size + sizeof(struct usb_memory));
190 kfree(usbm);
191 } else {
192 spin_unlock_irqrestore(&ps->lock, flags);
193 }
194}
195
196static void usbdev_vm_open(struct vm_area_struct *vma)
197{
198 struct usb_memory *usbm = vma->vm_private_data;
199 unsigned long flags;
200
201 spin_lock_irqsave(&usbm->ps->lock, flags);
202 ++usbm->vma_use_count;
203 spin_unlock_irqrestore(&usbm->ps->lock, flags);
204}
205
206static void usbdev_vm_close(struct vm_area_struct *vma)
207{
208 struct usb_memory *usbm = vma->vm_private_data;
209
210 dec_usb_memory_use_count(usbm, &usbm->vma_use_count);
211}
212
10871c13 213static struct vm_operations_struct usbdev_vm_ops = {
f7d34b44
SG
214 .open = usbdev_vm_open,
215 .close = usbdev_vm_close
216};
217
218static int usbdev_mmap(struct file *file, struct vm_area_struct *vma)
219{
220 struct usb_memory *usbm = NULL;
221 struct usb_dev_state *ps = file->private_data;
222 size_t size = vma->vm_end - vma->vm_start;
223 void *mem;
224 unsigned long flags;
225 dma_addr_t dma_handle;
226 int ret;
227
228 ret = usbfs_increase_memory_usage(size + sizeof(struct usb_memory));
229 if (ret)
230 goto error;
231
232 usbm = kzalloc(sizeof(struct usb_memory), GFP_KERNEL);
233 if (!usbm) {
234 ret = -ENOMEM;
235 goto error_decrease_mem;
236 }
237
70f7ca9a
JS
238 mem = usb_alloc_coherent(ps->dev, size, GFP_USER | __GFP_NOWARN,
239 &dma_handle);
f7d34b44
SG
240 if (!mem) {
241 ret = -ENOMEM;
242 goto error_free_usbm;
243 }
244
245 memset(mem, 0, size);
246
247 usbm->mem = mem;
248 usbm->dma_handle = dma_handle;
249 usbm->size = size;
250 usbm->ps = ps;
251 usbm->vm_start = vma->vm_start;
252 usbm->vma_use_count = 1;
253 INIT_LIST_HEAD(&usbm->memlist);
254
255 if (remap_pfn_range(vma, vma->vm_start,
256 virt_to_phys(usbm->mem) >> PAGE_SHIFT,
257 size, vma->vm_page_prot) < 0) {
258 dec_usb_memory_use_count(usbm, &usbm->vma_use_count);
259 return -EAGAIN;
260 }
261
262 vma->vm_flags |= VM_IO;
263 vma->vm_flags |= (VM_DONTEXPAND | VM_DONTDUMP);
264 vma->vm_ops = &usbdev_vm_ops;
265 vma->vm_private_data = usbm;
266
267 spin_lock_irqsave(&ps->lock, flags);
268 list_add_tail(&usbm->memlist, &ps->memory_list);
269 spin_unlock_irqrestore(&ps->lock, flags);
270
271 return 0;
272
273error_free_usbm:
274 kfree(usbm);
275error_decrease_mem:
276 usbfs_decrease_memory_usage(size + sizeof(struct usb_memory));
277error:
278 return ret;
279}
280
04e482ff
GKH
281static ssize_t usbdev_read(struct file *file, char __user *buf, size_t nbytes,
282 loff_t *ppos)
1da177e4 283{
9b6f0c4b 284 struct usb_dev_state *ps = file->private_data;
1da177e4
LT
285 struct usb_device *dev = ps->dev;
286 ssize_t ret = 0;
287 unsigned len;
288 loff_t pos;
289 int i;
290
291 pos = *ppos;
292 usb_lock_device(dev);
349710c3 293 if (!connected(ps)) {
1da177e4
LT
294 ret = -ENODEV;
295 goto err;
296 } else if (pos < 0) {
297 ret = -EINVAL;
298 goto err;
299 }
300
301 if (pos < sizeof(struct usb_device_descriptor)) {
04e482ff
GKH
302 /* 18 bytes - fits on the stack */
303 struct usb_device_descriptor temp_desc;
8781ba0a
ON
304
305 memcpy(&temp_desc, &dev->descriptor, sizeof(dev->descriptor));
9fcd5c32
AM
306 le16_to_cpus(&temp_desc.bcdUSB);
307 le16_to_cpus(&temp_desc.idVendor);
308 le16_to_cpus(&temp_desc.idProduct);
309 le16_to_cpus(&temp_desc.bcdDevice);
1da177e4
LT
310
311 len = sizeof(struct usb_device_descriptor) - pos;
312 if (len > nbytes)
313 len = nbytes;
8781ba0a 314 if (copy_to_user(buf, ((char *)&temp_desc) + pos, len)) {
1da177e4
LT
315 ret = -EFAULT;
316 goto err;
317 }
1da177e4
LT
318
319 *ppos += len;
320 buf += len;
321 nbytes -= len;
322 ret += len;
323 }
324
325 pos = sizeof(struct usb_device_descriptor);
326 for (i = 0; nbytes && i < dev->descriptor.bNumConfigurations; i++) {
327 struct usb_config_descriptor *config =
328 (struct usb_config_descriptor *)dev->rawdescriptors[i];
329 unsigned int length = le16_to_cpu(config->wTotalLength);
330
331 if (*ppos < pos + length) {
332
333 /* The descriptor may claim to be longer than it
334 * really is. Here is the actual allocated length. */
335 unsigned alloclen =
336 le16_to_cpu(dev->config[i].desc.wTotalLength);
337
338 len = length - (*ppos - pos);
339 if (len > nbytes)
340 len = nbytes;
341
342 /* Simply don't write (skip over) unallocated parts */
343 if (alloclen > (*ppos - pos)) {
344 alloclen -= (*ppos - pos);
345 if (copy_to_user(buf,
346 dev->rawdescriptors[i] + (*ppos - pos),
347 min(len, alloclen))) {
348 ret = -EFAULT;
349 goto err;
350 }
351 }
352
353 *ppos += len;
354 buf += len;
355 nbytes -= len;
356 ret += len;
357 }
358
359 pos += length;
360 }
361
362err:
363 usb_unlock_device(dev);
364 return ret;
365}
366
367/*
368 * async list handling
369 */
370
371static struct async *alloc_async(unsigned int numisoframes)
372{
dd95b814 373 struct async *as;
0a1ef3b5 374
dd95b814 375 as = kzalloc(sizeof(struct async), GFP_KERNEL);
04e482ff
GKH
376 if (!as)
377 return NULL;
1da177e4
LT
378 as->urb = usb_alloc_urb(numisoframes, GFP_KERNEL);
379 if (!as->urb) {
380 kfree(as);
381 return NULL;
382 }
04e482ff 383 return as;
1da177e4
LT
384}
385
386static void free_async(struct async *as)
387{
3d97ff63
HG
388 int i;
389
2425c08b 390 put_pid(as->pid);
1b41c832
SS
391 if (as->cred)
392 put_cred(as->cred);
3d97ff63
HG
393 for (i = 0; i < as->urb->num_sgs; i++) {
394 if (sg_page(&as->urb->sg[i]))
395 kfree(sg_virt(&as->urb->sg[i]));
396 }
f7d34b44 397
3d97ff63 398 kfree(as->urb->sg);
f7d34b44
SG
399 if (as->usbm == NULL)
400 kfree(as->urb->transfer_buffer);
401 else
402 dec_usb_memory_use_count(as->usbm, &as->usbm->urb_use_count);
403
6fd19f4b 404 kfree(as->urb->setup_packet);
1da177e4 405 usb_free_urb(as->urb);
add1aaea 406 usbfs_decrease_memory_usage(as->mem_usage);
6fd19f4b 407 kfree(as);
1da177e4
LT
408}
409
d34d9721 410static void async_newpending(struct async *as)
1da177e4 411{
9b6f0c4b 412 struct usb_dev_state *ps = as->ps;
04e482ff
GKH
413 unsigned long flags;
414
415 spin_lock_irqsave(&ps->lock, flags);
416 list_add_tail(&as->asynclist, &ps->async_pending);
417 spin_unlock_irqrestore(&ps->lock, flags);
1da177e4
LT
418}
419
d34d9721 420static void async_removepending(struct async *as)
1da177e4 421{
9b6f0c4b 422 struct usb_dev_state *ps = as->ps;
04e482ff
GKH
423 unsigned long flags;
424
425 spin_lock_irqsave(&ps->lock, flags);
426 list_del_init(&as->asynclist);
427 spin_unlock_irqrestore(&ps->lock, flags);
1da177e4
LT
428}
429
9b6f0c4b 430static struct async *async_getcompleted(struct usb_dev_state *ps)
1da177e4 431{
04e482ff
GKH
432 unsigned long flags;
433 struct async *as = NULL;
434
435 spin_lock_irqsave(&ps->lock, flags);
436 if (!list_empty(&ps->async_completed)) {
437 as = list_entry(ps->async_completed.next, struct async,
438 asynclist);
439 list_del_init(&as->asynclist);
440 }
441 spin_unlock_irqrestore(&ps->lock, flags);
442 return as;
1da177e4
LT
443}
444
9b6f0c4b 445static struct async *async_getpending(struct usb_dev_state *ps,
04e482ff 446 void __user *userurb)
1da177e4 447{
04e482ff 448 struct async *as;
1da177e4 449
1da177e4
LT
450 list_for_each_entry(as, &ps->async_pending, asynclist)
451 if (as->userurb == userurb) {
452 list_del_init(&as->asynclist);
1da177e4
LT
453 return as;
454 }
4e09dcf2 455
04e482ff 456 return NULL;
1da177e4
LT
457}
458
4c6e8971
AS
459static void snoop_urb(struct usb_device *udev,
460 void __user *userurb, int pipe, unsigned length,
0880aef4
CF
461 int timeout_or_status, enum snoop_when when,
462 unsigned char *data, unsigned data_len)
e639dd3f 463{
4c6e8971
AS
464 static const char *types[] = {"isoc", "int", "ctrl", "bulk"};
465 static const char *dirs[] = {"out", "in"};
466 int ep;
467 const char *t, *d;
e639dd3f
GKH
468
469 if (!usbfs_snoop)
470 return;
471
4c6e8971
AS
472 ep = usb_pipeendpoint(pipe);
473 t = types[usb_pipetype(pipe)];
474 d = dirs[!!usb_pipein(pipe)];
475
476 if (userurb) { /* Async */
477 if (when == SUBMIT)
2f964780 478 dev_info(&udev->dev, "userurb %pK, ep%d %s-%s, "
4c6e8971
AS
479 "length %u\n",
480 userurb, ep, t, d, length);
481 else
2f964780 482 dev_info(&udev->dev, "userurb %pK, ep%d %s-%s, "
4c6e8971
AS
483 "actual_length %u status %d\n",
484 userurb, ep, t, d, length,
485 timeout_or_status);
486 } else {
487 if (when == SUBMIT)
488 dev_info(&udev->dev, "ep%d %s-%s, length %u, "
489 "timeout %d\n",
490 ep, t, d, length, timeout_or_status);
491 else
492 dev_info(&udev->dev, "ep%d %s-%s, actual_length %u, "
493 "status %d\n",
494 ep, t, d, length, timeout_or_status);
495 }
0880aef4 496
0290cc9f 497 data_len = min(data_len, usbfs_snoop_max);
0880aef4
CF
498 if (data && data_len > 0) {
499 print_hex_dump(KERN_DEBUG, "data: ", DUMP_PREFIX_NONE, 32, 1,
500 data, data_len, 1);
501 }
e639dd3f
GKH
502}
503
3d97ff63
HG
504static void snoop_urb_data(struct urb *urb, unsigned len)
505{
506 int i, size;
507
0290cc9f
AS
508 len = min(len, usbfs_snoop_max);
509 if (!usbfs_snoop || len == 0)
3d97ff63
HG
510 return;
511
512 if (urb->num_sgs == 0) {
513 print_hex_dump(KERN_DEBUG, "data: ", DUMP_PREFIX_NONE, 32, 1,
514 urb->transfer_buffer, len, 1);
515 return;
516 }
517
518 for (i = 0; i < urb->num_sgs && len; i++) {
519 size = (len > USB_SG_SIZE) ? USB_SG_SIZE : len;
520 print_hex_dump(KERN_DEBUG, "data: ", DUMP_PREFIX_NONE, 32, 1,
521 sg_virt(&urb->sg[i]), size, 1);
522 len -= size;
523 }
524}
525
526static int copy_urb_data_to_user(u8 __user *userbuffer, struct urb *urb)
527{
528 unsigned i, len, size;
529
530 if (urb->number_of_packets > 0) /* Isochronous */
531 len = urb->transfer_buffer_length;
532 else /* Non-Isoc */
533 len = urb->actual_length;
534
535 if (urb->num_sgs == 0) {
536 if (copy_to_user(userbuffer, urb->transfer_buffer, len))
537 return -EFAULT;
538 return 0;
539 }
540
541 for (i = 0; i < urb->num_sgs && len; i++) {
542 size = (len > USB_SG_SIZE) ? USB_SG_SIZE : len;
543 if (copy_to_user(userbuffer, sg_virt(&urb->sg[i]), size))
544 return -EFAULT;
545 userbuffer += size;
546 len -= size;
547 }
548
549 return 0;
550}
551
01c6460f
AS
552#define AS_CONTINUATION 1
553#define AS_UNLINK 2
554
9b6f0c4b 555static void cancel_bulk_urbs(struct usb_dev_state *ps, unsigned bulk_addr)
01c6460f
AS
556__releases(ps->lock)
557__acquires(ps->lock)
558{
4e09dcf2 559 struct urb *urb;
01c6460f
AS
560 struct async *as;
561
562 /* Mark all the pending URBs that match bulk_addr, up to but not
563 * including the first one without AS_CONTINUATION. If such an
564 * URB is encountered then a new transfer has already started so
565 * the endpoint doesn't need to be disabled; otherwise it does.
566 */
567 list_for_each_entry(as, &ps->async_pending, asynclist) {
568 if (as->bulk_addr == bulk_addr) {
569 if (as->bulk_status != AS_CONTINUATION)
570 goto rescan;
571 as->bulk_status = AS_UNLINK;
572 as->bulk_addr = 0;
573 }
574 }
575 ps->disabled_bulk_eps |= (1 << bulk_addr);
576
577 /* Now carefully unlink all the marked pending URBs */
578 rescan:
579 list_for_each_entry(as, &ps->async_pending, asynclist) {
580 if (as->bulk_status == AS_UNLINK) {
581 as->bulk_status = 0; /* Only once */
4e09dcf2
HL
582 urb = as->urb;
583 usb_get_urb(urb);
01c6460f 584 spin_unlock(&ps->lock); /* Allow completions */
4e09dcf2
HL
585 usb_unlink_urb(urb);
586 usb_put_urb(urb);
01c6460f
AS
587 spin_lock(&ps->lock);
588 goto rescan;
589 }
590 }
591}
592
7d12e780 593static void async_completed(struct urb *urb)
1da177e4 594{
04e482ff 595 struct async *as = urb->context;
9b6f0c4b 596 struct usb_dev_state *ps = as->ps;
1da177e4 597 struct siginfo sinfo;
516a1a07 598 struct pid *pid = NULL;
516a1a07 599 u32 secid = 0;
d178bc3a 600 const struct cred *cred = NULL;
516a1a07 601 int signr;
1da177e4 602
04e482ff
GKH
603 spin_lock(&ps->lock);
604 list_move_tail(&as->asynclist, &ps->async_completed);
e015268d 605 as->status = urb->status;
516a1a07
ON
606 signr = as->signr;
607 if (signr) {
f0c2b681 608 memset(&sinfo, 0, sizeof(sinfo));
1da177e4 609 sinfo.si_signo = as->signr;
e015268d 610 sinfo.si_errno = as->status;
1da177e4
LT
611 sinfo.si_code = SI_ASYNCIO;
612 sinfo.si_addr = as->userurb;
aec01c58 613 pid = get_pid(as->pid);
d178bc3a 614 cred = get_cred(as->cred);
516a1a07 615 secid = as->secid;
1da177e4 616 }
e639dd3f 617 snoop(&urb->dev->dev, "urb complete\n");
4c6e8971 618 snoop_urb(urb->dev, as->userurb, urb->pipe, urb->actual_length,
3d97ff63 619 as->status, COMPLETE, NULL, 0);
83ed07c5 620 if ((urb->transfer_flags & URB_DIR_MASK) == URB_DIR_IN)
3d97ff63
HG
621 snoop_urb_data(urb, urb->actual_length);
622
01c6460f
AS
623 if (as->status < 0 && as->bulk_addr && as->status != -ECONNRESET &&
624 as->status != -ENOENT)
625 cancel_bulk_urbs(ps, as->bulk_addr);
516a1a07
ON
626 spin_unlock(&ps->lock);
627
aec01c58 628 if (signr) {
d178bc3a 629 kill_pid_info_as_cred(sinfo.si_signo, &sinfo, pid, cred, secid);
aec01c58 630 put_pid(pid);
d178bc3a 631 put_cred(cred);
aec01c58 632 }
516a1a07 633
e639dd3f 634 wake_up(&ps->wait);
1da177e4
LT
635}
636
9b6f0c4b 637static void destroy_async(struct usb_dev_state *ps, struct list_head *list)
1da177e4 638{
4e09dcf2 639 struct urb *urb;
1da177e4
LT
640 struct async *as;
641 unsigned long flags;
642
643 spin_lock_irqsave(&ps->lock, flags);
644 while (!list_empty(list)) {
645 as = list_entry(list->next, struct async, asynclist);
646 list_del_init(&as->asynclist);
4e09dcf2
HL
647 urb = as->urb;
648 usb_get_urb(urb);
1da177e4
LT
649
650 /* drop the spinlock so the completion handler can run */
651 spin_unlock_irqrestore(&ps->lock, flags);
4e09dcf2
HL
652 usb_kill_urb(urb);
653 usb_put_urb(urb);
1da177e4
LT
654 spin_lock_irqsave(&ps->lock, flags);
655 }
656 spin_unlock_irqrestore(&ps->lock, flags);
1da177e4
LT
657}
658
9b6f0c4b 659static void destroy_async_on_interface(struct usb_dev_state *ps,
04e482ff 660 unsigned int ifnum)
1da177e4
LT
661{
662 struct list_head *p, *q, hitlist;
663 unsigned long flags;
664
665 INIT_LIST_HEAD(&hitlist);
666 spin_lock_irqsave(&ps->lock, flags);
667 list_for_each_safe(p, q, &ps->async_pending)
668 if (ifnum == list_entry(p, struct async, asynclist)->ifnum)
669 list_move_tail(p, &hitlist);
670 spin_unlock_irqrestore(&ps->lock, flags);
671 destroy_async(ps, &hitlist);
672}
673
9b6f0c4b 674static void destroy_all_async(struct usb_dev_state *ps)
1da177e4 675{
04e482ff 676 destroy_async(ps, &ps->async_pending);
1da177e4
LT
677}
678
679/*
680 * interface claims are made only at the request of user level code,
681 * which can also release them (explicitly or by closing files).
682 * they're also undone when devices disconnect.
683 */
684
04e482ff
GKH
685static int driver_probe(struct usb_interface *intf,
686 const struct usb_device_id *id)
1da177e4
LT
687{
688 return -ENODEV;
689}
690
691static void driver_disconnect(struct usb_interface *intf)
692{
9b6f0c4b 693 struct usb_dev_state *ps = usb_get_intfdata(intf);
1da177e4
LT
694 unsigned int ifnum = intf->altsetting->desc.bInterfaceNumber;
695
696 if (!ps)
697 return;
698
699 /* NOTE: this relies on usbcore having canceled and completed
700 * all pending I/O requests; 2.6 does that.
701 */
702
703 if (likely(ifnum < 8*sizeof(ps->ifclaimed)))
704 clear_bit(ifnum, &ps->ifclaimed);
705 else
3b6004f3
GKH
706 dev_warn(&intf->dev, "interface number %u out of range\n",
707 ifnum);
1da177e4 708
04e482ff 709 usb_set_intfdata(intf, NULL);
1da177e4
LT
710
711 /* force async requests to complete */
712 destroy_async_on_interface(ps, ifnum);
713}
714
2e2eb83f
AS
715/* The following routines are merely placeholders. There is no way
716 * to inform a user task about suspend or resumes.
717 */
718static int driver_suspend(struct usb_interface *intf, pm_message_t msg)
719{
720 return 0;
721}
722
723static int driver_resume(struct usb_interface *intf)
724{
725 return 0;
726}
727
1da177e4 728struct usb_driver usbfs_driver = {
1da177e4
LT
729 .name = "usbfs",
730 .probe = driver_probe,
731 .disconnect = driver_disconnect,
2e2eb83f
AS
732 .suspend = driver_suspend,
733 .resume = driver_resume,
1da177e4
LT
734};
735
9b6f0c4b 736static int claimintf(struct usb_dev_state *ps, unsigned int ifnum)
1da177e4
LT
737{
738 struct usb_device *dev = ps->dev;
739 struct usb_interface *intf;
740 int err;
741
742 if (ifnum >= 8*sizeof(ps->ifclaimed))
743 return -EINVAL;
744 /* already claimed */
745 if (test_bit(ifnum, &ps->ifclaimed))
746 return 0;
747
d883f52e
RG
748 if (ps->privileges_dropped &&
749 !test_bit(ifnum, &ps->interface_allowed_mask))
750 return -EACCES;
751
1da177e4
LT
752 intf = usb_ifnum_to_if(dev, ifnum);
753 if (!intf)
754 err = -ENOENT;
755 else
756 err = usb_driver_claim_interface(&usbfs_driver, intf, ps);
1da177e4
LT
757 if (err == 0)
758 set_bit(ifnum, &ps->ifclaimed);
759 return err;
760}
761
9b6f0c4b 762static int releaseintf(struct usb_dev_state *ps, unsigned int ifnum)
1da177e4
LT
763{
764 struct usb_device *dev;
765 struct usb_interface *intf;
766 int err;
767
768 err = -EINVAL;
769 if (ifnum >= 8*sizeof(ps->ifclaimed))
770 return err;
771 dev = ps->dev;
1da177e4
LT
772 intf = usb_ifnum_to_if(dev, ifnum);
773 if (!intf)
774 err = -ENOENT;
775 else if (test_and_clear_bit(ifnum, &ps->ifclaimed)) {
776 usb_driver_release_interface(&usbfs_driver, intf);
777 err = 0;
778 }
1da177e4
LT
779 return err;
780}
781
9b6f0c4b 782static int checkintf(struct usb_dev_state *ps, unsigned int ifnum)
1da177e4
LT
783{
784 if (ps->dev->state != USB_STATE_CONFIGURED)
785 return -EHOSTUNREACH;
786 if (ifnum >= 8*sizeof(ps->ifclaimed))
787 return -EINVAL;
788 if (test_bit(ifnum, &ps->ifclaimed))
789 return 0;
790 /* if not yet claimed, claim it for the driver */
04e482ff
GKH
791 dev_warn(&ps->dev->dev, "usbfs: process %d (%s) did not claim "
792 "interface %u before use\n", task_pid_nr(current),
793 current->comm, ifnum);
1da177e4
LT
794 return claimintf(ps, ifnum);
795}
796
797static int findintfep(struct usb_device *dev, unsigned int ep)
798{
799 unsigned int i, j, e;
04e482ff 800 struct usb_interface *intf;
1da177e4
LT
801 struct usb_host_interface *alts;
802 struct usb_endpoint_descriptor *endpt;
803
804 if (ep & ~(USB_DIR_IN|0xf))
805 return -EINVAL;
806 if (!dev->actconfig)
807 return -ESRCH;
808 for (i = 0; i < dev->actconfig->desc.bNumInterfaces; i++) {
809 intf = dev->actconfig->interface[i];
810 for (j = 0; j < intf->num_altsetting; j++) {
04e482ff 811 alts = &intf->altsetting[j];
1da177e4
LT
812 for (e = 0; e < alts->desc.bNumEndpoints; e++) {
813 endpt = &alts->endpoint[e].desc;
814 if (endpt->bEndpointAddress == ep)
815 return alts->desc.bInterfaceNumber;
816 }
817 }
818 }
04e482ff 819 return -ENOENT;
1da177e4
LT
820}
821
9b6f0c4b 822static int check_ctrlrecip(struct usb_dev_state *ps, unsigned int requesttype,
393cbb51 823 unsigned int request, unsigned int index)
1da177e4
LT
824{
825 int ret = 0;
393cbb51 826 struct usb_host_interface *alt_setting;
1da177e4 827
6da9c990
DV
828 if (ps->dev->state != USB_STATE_UNAUTHENTICATED
829 && ps->dev->state != USB_STATE_ADDRESS
24f8b116 830 && ps->dev->state != USB_STATE_CONFIGURED)
1da177e4
LT
831 return -EHOSTUNREACH;
832 if (USB_TYPE_VENDOR == (USB_TYPE_MASK & requesttype))
833 return 0;
834
393cbb51
MD
835 /*
836 * check for the special corner case 'get_device_id' in the printer
5dc50c35
HG
837 * class specification, which we always want to allow as it is used
838 * to query things like ink level, etc.
393cbb51
MD
839 */
840 if (requesttype == 0xa1 && request == 0) {
841 alt_setting = usb_find_alt_setting(ps->dev->actconfig,
842 index >> 8, index & 0xff);
843 if (alt_setting
844 && alt_setting->desc.bInterfaceClass == USB_CLASS_PRINTER)
5dc50c35 845 return 0;
393cbb51
MD
846 }
847
1da177e4
LT
848 index &= 0xff;
849 switch (requesttype & USB_RECIP_MASK) {
850 case USB_RECIP_ENDPOINT:
1361bf4b
HG
851 if ((index & ~USB_DIR_IN) == 0)
852 return 0;
04e482ff 853 ret = findintfep(ps->dev, index);
831abf76
KG
854 if (ret < 0) {
855 /*
856 * Some not fully compliant Win apps seem to get
857 * index wrong and have the endpoint number here
858 * rather than the endpoint address (with the
859 * correct direction). Win does let this through,
860 * so we'll not reject it here but leave it to
861 * the device to not break KVM. But we warn.
862 */
863 ret = findintfep(ps->dev, index ^ 0x80);
864 if (ret >= 0)
865 dev_info(&ps->dev->dev,
866 "%s: process %i (%s) requesting ep %02x but needs %02x\n",
867 __func__, task_pid_nr(current),
868 current->comm, index, index ^ 0x80);
869 }
04e482ff 870 if (ret >= 0)
1da177e4
LT
871 ret = checkintf(ps, ret);
872 break;
873
874 case USB_RECIP_INTERFACE:
875 ret = checkintf(ps, index);
876 break;
877 }
878 return ret;
879}
880
2fec32b0
HG
881static struct usb_host_endpoint *ep_to_host_endpoint(struct usb_device *dev,
882 unsigned char ep)
883{
884 if (ep & USB_ENDPOINT_DIR_MASK)
885 return dev->ep_in[ep & USB_ENDPOINT_NUMBER_MASK];
886 else
887 return dev->ep_out[ep & USB_ENDPOINT_NUMBER_MASK];
888}
889
3e75c6de 890static int parse_usbdevfs_streams(struct usb_dev_state *ps,
bcf7f6e3
HG
891 struct usbdevfs_streams __user *streams,
892 unsigned int *num_streams_ret,
893 unsigned int *num_eps_ret,
894 struct usb_host_endpoint ***eps_ret,
895 struct usb_interface **intf_ret)
896{
897 unsigned int i, num_streams, num_eps;
898 struct usb_host_endpoint **eps;
899 struct usb_interface *intf = NULL;
900 unsigned char ep;
901 int ifnum, ret;
902
903 if (get_user(num_streams, &streams->num_streams) ||
904 get_user(num_eps, &streams->num_eps))
905 return -EFAULT;
906
907 if (num_eps < 1 || num_eps > USB_MAXENDPOINTS)
908 return -EINVAL;
909
910 /* The XHCI controller allows max 2 ^ 16 streams */
911 if (num_streams_ret && (num_streams < 2 || num_streams > 65536))
912 return -EINVAL;
913
914 eps = kmalloc(num_eps * sizeof(*eps), GFP_KERNEL);
915 if (!eps)
916 return -ENOMEM;
917
918 for (i = 0; i < num_eps; i++) {
919 if (get_user(ep, &streams->eps[i])) {
920 ret = -EFAULT;
921 goto error;
922 }
923 eps[i] = ep_to_host_endpoint(ps->dev, ep);
924 if (!eps[i]) {
925 ret = -EINVAL;
926 goto error;
927 }
928
929 /* usb_alloc/free_streams operate on an usb_interface */
930 ifnum = findintfep(ps->dev, ep);
931 if (ifnum < 0) {
932 ret = ifnum;
933 goto error;
934 }
935
936 if (i == 0) {
937 ret = checkintf(ps, ifnum);
938 if (ret < 0)
939 goto error;
940 intf = usb_ifnum_to_if(ps->dev, ifnum);
941 } else {
942 /* Verify all eps belong to the same interface */
943 if (ifnum != intf->altsetting->desc.bInterfaceNumber) {
944 ret = -EINVAL;
945 goto error;
946 }
947 }
948 }
949
950 if (num_streams_ret)
951 *num_streams_ret = num_streams;
952 *num_eps_ret = num_eps;
953 *eps_ret = eps;
954 *intf_ret = intf;
955
956 return 0;
957
958error:
959 kfree(eps);
960 return ret;
961}
962
61ad04a8 963static int match_devt(struct device *dev, void *data)
4592bf5a 964{
a80d5ff0 965 return dev->devt == (dev_t) (unsigned long) data;
9f8b17e6 966}
4592bf5a 967
61ad04a8 968static struct usb_device *usbdev_lookup_by_devt(dev_t devt)
9f8b17e6
KS
969{
970 struct device *dev;
971
a80d5ff0
DH
972 dev = bus_find_device(&usb_bus_type, NULL,
973 (void *) (unsigned long) devt, match_devt);
9f8b17e6
KS
974 if (!dev)
975 return NULL;
69ab55d7 976 return to_usb_device(dev);
9f8b17e6 977}
4592bf5a 978
1da177e4
LT
979/*
980 * file operations
981 */
982static int usbdev_open(struct inode *inode, struct file *file)
983{
fbf82fd2 984 struct usb_device *dev = NULL;
9b6f0c4b 985 struct usb_dev_state *ps;
1da177e4
LT
986 int ret;
987
1da177e4 988 ret = -ENOMEM;
d883f52e 989 ps = kzalloc(sizeof(struct usb_dev_state), GFP_KERNEL);
04e482ff 990 if (!ps)
62e299e6 991 goto out_free_ps;
1da177e4 992
01105a24 993 ret = -ENODEV;
61ad04a8 994
62e299e6
AS
995 /* Protect against simultaneous removal or release */
996 mutex_lock(&usbfs_mutex);
997
9f8b17e6 998 /* usbdev device-node */
fbf82fd2 999 if (imajor(inode) == USB_DEVICE_MAJOR)
61ad04a8 1000 dev = usbdev_lookup_by_devt(inode->i_rdev);
62e299e6 1001
62e299e6
AS
1002 mutex_unlock(&usbfs_mutex);
1003
1004 if (!dev)
1005 goto out_free_ps;
1006
1007 usb_lock_device(dev);
1008 if (dev->state == USB_STATE_NOTATTACHED)
1009 goto out_unlock_device;
1010
94fcda1f 1011 ret = usb_autoresume_device(dev);
01d883d4 1012 if (ret)
62e299e6 1013 goto out_unlock_device;
01d883d4 1014
1da177e4
LT
1015 ps->dev = dev;
1016 ps->file = file;
d883f52e 1017 ps->interface_allowed_mask = 0xFFFFFFFF; /* 32 bits */
1da177e4 1018 spin_lock_init(&ps->lock);
316547fd 1019 INIT_LIST_HEAD(&ps->list);
1da177e4
LT
1020 INIT_LIST_HEAD(&ps->async_pending);
1021 INIT_LIST_HEAD(&ps->async_completed);
f7d34b44 1022 INIT_LIST_HEAD(&ps->memory_list);
1da177e4 1023 init_waitqueue_head(&ps->wait);
2425c08b 1024 ps->disc_pid = get_pid(task_pid(current));
d178bc3a 1025 ps->cred = get_current_cred();
7a01955f 1026 security_task_getsecid(current, &ps->secid);
527660a8 1027 smp_wmb();
1da177e4
LT
1028 list_add_tail(&ps->list, &dev->filelist);
1029 file->private_data = ps;
62e299e6 1030 usb_unlock_device(dev);
2da41d5f
AS
1031 snoop(&dev->dev, "opened by process %d: %s\n", task_pid_nr(current),
1032 current->comm);
62e299e6
AS
1033 return ret;
1034
1035 out_unlock_device:
1036 usb_unlock_device(dev);
1037 usb_put_dev(dev);
1038 out_free_ps:
1039 kfree(ps);
4a2a8a2c 1040 return ret;
1da177e4
LT
1041}
1042
1043static int usbdev_release(struct inode *inode, struct file *file)
1044{
9b6f0c4b 1045 struct usb_dev_state *ps = file->private_data;
1da177e4
LT
1046 struct usb_device *dev = ps->dev;
1047 unsigned int ifnum;
6ff10464 1048 struct async *as;
1da177e4
LT
1049
1050 usb_lock_device(dev);
7cbe5dca 1051 usb_hub_release_all_ports(dev, ps);
4a2a8a2c 1052
1da177e4 1053 list_del_init(&ps->list);
4a2a8a2c 1054
1da177e4
LT
1055 for (ifnum = 0; ps->ifclaimed && ifnum < 8*sizeof(ps->ifclaimed);
1056 ifnum++) {
1057 if (test_bit(ifnum, &ps->ifclaimed))
1058 releaseintf(ps, ifnum);
1059 }
1060 destroy_all_async(ps);
94fcda1f 1061 usb_autosuspend_device(dev);
1da177e4
LT
1062 usb_unlock_device(dev);
1063 usb_put_dev(dev);
2425c08b 1064 put_pid(ps->disc_pid);
d178bc3a 1065 put_cred(ps->cred);
6ff10464
AS
1066
1067 as = async_getcompleted(ps);
1068 while (as) {
1069 free_async(as);
1070 as = async_getcompleted(ps);
1071 }
f7d34b44 1072
1da177e4 1073 kfree(ps);
4a2a8a2c 1074 return 0;
1da177e4
LT
1075}
1076
9b6f0c4b 1077static int proc_control(struct usb_dev_state *ps, void __user *arg)
1da177e4
LT
1078{
1079 struct usb_device *dev = ps->dev;
1080 struct usbdevfs_ctrltransfer ctrl;
1081 unsigned int tmo;
1082 unsigned char *tbuf;
ff66e3ce 1083 unsigned wLength;
4c6e8971 1084 int i, pipe, ret;
1da177e4
LT
1085
1086 if (copy_from_user(&ctrl, arg, sizeof(ctrl)))
1087 return -EFAULT;
393cbb51
MD
1088 ret = check_ctrlrecip(ps, ctrl.bRequestType, ctrl.bRequest,
1089 ctrl.wIndex);
04e482ff 1090 if (ret)
1da177e4 1091 return ret;
ff66e3ce
AM
1092 wLength = ctrl.wLength; /* To suppress 64k PAGE_SIZE warning */
1093 if (wLength > PAGE_SIZE)
1da177e4 1094 return -EINVAL;
add1aaea
AS
1095 ret = usbfs_increase_memory_usage(PAGE_SIZE + sizeof(struct urb) +
1096 sizeof(struct usb_ctrlrequest));
1097 if (ret)
1098 return ret;
04e482ff 1099 tbuf = (unsigned char *)__get_free_page(GFP_KERNEL);
add1aaea
AS
1100 if (!tbuf) {
1101 ret = -ENOMEM;
1102 goto done;
1103 }
1da177e4 1104 tmo = ctrl.timeout;
0880aef4
CF
1105 snoop(&dev->dev, "control urb: bRequestType=%02x "
1106 "bRequest=%02x wValue=%04x "
1107 "wIndex=%04x wLength=%04x\n",
c8f2efc8
XR
1108 ctrl.bRequestType, ctrl.bRequest, ctrl.wValue,
1109 ctrl.wIndex, ctrl.wLength);
1da177e4 1110 if (ctrl.bRequestType & 0x80) {
04e482ff
GKH
1111 if (ctrl.wLength && !access_ok(VERIFY_WRITE, ctrl.data,
1112 ctrl.wLength)) {
52fb743d
AS
1113 ret = -EINVAL;
1114 goto done;
1da177e4 1115 }
4c6e8971 1116 pipe = usb_rcvctrlpipe(dev, 0);
0880aef4 1117 snoop_urb(dev, NULL, pipe, ctrl.wLength, tmo, SUBMIT, NULL, 0);
1da177e4
LT
1118
1119 usb_unlock_device(dev);
4c6e8971 1120 i = usb_control_msg(dev, pipe, ctrl.bRequest,
04e482ff
GKH
1121 ctrl.bRequestType, ctrl.wValue, ctrl.wIndex,
1122 tbuf, ctrl.wLength, tmo);
1da177e4 1123 usb_lock_device(dev);
0880aef4 1124 snoop_urb(dev, NULL, pipe, max(i, 0), min(i, 0), COMPLETE,
9d02b426 1125 tbuf, max(i, 0));
1da177e4 1126 if ((i > 0) && ctrl.wLength) {
fe0410c7 1127 if (copy_to_user(ctrl.data, tbuf, i)) {
52fb743d
AS
1128 ret = -EFAULT;
1129 goto done;
1da177e4
LT
1130 }
1131 }
1132 } else {
1133 if (ctrl.wLength) {
1134 if (copy_from_user(tbuf, ctrl.data, ctrl.wLength)) {
52fb743d
AS
1135 ret = -EFAULT;
1136 goto done;
1da177e4
LT
1137 }
1138 }
4c6e8971 1139 pipe = usb_sndctrlpipe(dev, 0);
0880aef4
CF
1140 snoop_urb(dev, NULL, pipe, ctrl.wLength, tmo, SUBMIT,
1141 tbuf, ctrl.wLength);
4c6e8971 1142
1da177e4 1143 usb_unlock_device(dev);
04e482ff
GKH
1144 i = usb_control_msg(dev, usb_sndctrlpipe(dev, 0), ctrl.bRequest,
1145 ctrl.bRequestType, ctrl.wValue, ctrl.wIndex,
1146 tbuf, ctrl.wLength, tmo);
1da177e4 1147 usb_lock_device(dev);
0880aef4 1148 snoop_urb(dev, NULL, pipe, max(i, 0), min(i, 0), COMPLETE, NULL, 0);
1da177e4 1149 }
04e482ff 1150 if (i < 0 && i != -EPIPE) {
1da177e4
LT
1151 dev_printk(KERN_DEBUG, &dev->dev, "usbfs: USBDEVFS_CONTROL "
1152 "failed cmd %s rqt %u rq %u len %u ret %d\n",
1153 current->comm, ctrl.bRequestType, ctrl.bRequest,
1154 ctrl.wLength, i);
1155 }
52fb743d
AS
1156 ret = i;
1157 done:
1158 free_page((unsigned long) tbuf);
add1aaea
AS
1159 usbfs_decrease_memory_usage(PAGE_SIZE + sizeof(struct urb) +
1160 sizeof(struct usb_ctrlrequest));
52fb743d 1161 return ret;
1da177e4
LT
1162}
1163
9b6f0c4b 1164static int proc_bulk(struct usb_dev_state *ps, void __user *arg)
1da177e4
LT
1165{
1166 struct usb_device *dev = ps->dev;
1167 struct usbdevfs_bulktransfer bulk;
1168 unsigned int tmo, len1, pipe;
1169 int len2;
1170 unsigned char *tbuf;
4c6e8971 1171 int i, ret;
1da177e4
LT
1172
1173 if (copy_from_user(&bulk, arg, sizeof(bulk)))
1174 return -EFAULT;
04e482ff
GKH
1175 ret = findintfep(ps->dev, bulk.ep);
1176 if (ret < 0)
1da177e4 1177 return ret;
04e482ff
GKH
1178 ret = checkintf(ps, ret);
1179 if (ret)
1da177e4
LT
1180 return ret;
1181 if (bulk.ep & USB_DIR_IN)
1182 pipe = usb_rcvbulkpipe(dev, bulk.ep & 0x7f);
1183 else
1184 pipe = usb_sndbulkpipe(dev, bulk.ep & 0x7f);
1185 if (!usb_maxpacket(dev, pipe, !(bulk.ep & USB_DIR_IN)))
1186 return -EINVAL;
1187 len1 = bulk.len;
1129d270 1188 if (len1 >= (INT_MAX - sizeof(struct urb)))
1da177e4 1189 return -EINVAL;
add1aaea
AS
1190 ret = usbfs_increase_memory_usage(len1 + sizeof(struct urb));
1191 if (ret)
1192 return ret;
135551ea
KB
1193 tbuf = kmalloc(len1, GFP_KERNEL);
1194 if (!tbuf) {
add1aaea
AS
1195 ret = -ENOMEM;
1196 goto done;
1197 }
1da177e4
LT
1198 tmo = bulk.timeout;
1199 if (bulk.ep & 0x80) {
1200 if (len1 && !access_ok(VERIFY_WRITE, bulk.data, len1)) {
52fb743d
AS
1201 ret = -EINVAL;
1202 goto done;
1da177e4 1203 }
0880aef4 1204 snoop_urb(dev, NULL, pipe, len1, tmo, SUBMIT, NULL, 0);
4c6e8971 1205
1da177e4
LT
1206 usb_unlock_device(dev);
1207 i = usb_bulk_msg(dev, pipe, tbuf, len1, &len2, tmo);
1208 usb_lock_device(dev);
0880aef4 1209 snoop_urb(dev, NULL, pipe, len2, i, COMPLETE, tbuf, len2);
4c6e8971 1210
1da177e4
LT
1211 if (!i && len2) {
1212 if (copy_to_user(bulk.data, tbuf, len2)) {
52fb743d
AS
1213 ret = -EFAULT;
1214 goto done;
1da177e4
LT
1215 }
1216 }
1217 } else {
1218 if (len1) {
1219 if (copy_from_user(tbuf, bulk.data, len1)) {
52fb743d
AS
1220 ret = -EFAULT;
1221 goto done;
1da177e4
LT
1222 }
1223 }
0880aef4 1224 snoop_urb(dev, NULL, pipe, len1, tmo, SUBMIT, tbuf, len1);
4c6e8971 1225
1da177e4
LT
1226 usb_unlock_device(dev);
1227 i = usb_bulk_msg(dev, pipe, tbuf, len1, &len2, tmo);
1228 usb_lock_device(dev);
0880aef4 1229 snoop_urb(dev, NULL, pipe, len2, i, COMPLETE, NULL, 0);
1da177e4 1230 }
52fb743d
AS
1231 ret = (i < 0 ? i : len2);
1232 done:
1da177e4 1233 kfree(tbuf);
add1aaea 1234 usbfs_decrease_memory_usage(len1 + sizeof(struct urb));
52fb743d 1235 return ret;
1da177e4
LT
1236}
1237
f080a51b
AS
1238static void check_reset_of_active_ep(struct usb_device *udev,
1239 unsigned int epnum, char *ioctl_name)
1240{
1241 struct usb_host_endpoint **eps;
1242 struct usb_host_endpoint *ep;
1243
1244 eps = (epnum & USB_DIR_IN) ? udev->ep_in : udev->ep_out;
1245 ep = eps[epnum & 0x0f];
1246 if (ep && !list_empty(&ep->urb_list))
1247 dev_warn(&udev->dev, "Process %d (%s) called USBDEVFS_%s for active endpoint 0x%02x\n",
1248 task_pid_nr(current), current->comm,
1249 ioctl_name, epnum);
1250}
1251
9b6f0c4b 1252static int proc_resetep(struct usb_dev_state *ps, void __user *arg)
1da177e4
LT
1253{
1254 unsigned int ep;
1255 int ret;
1256
1257 if (get_user(ep, (unsigned int __user *)arg))
1258 return -EFAULT;
04e482ff
GKH
1259 ret = findintfep(ps->dev, ep);
1260 if (ret < 0)
1da177e4 1261 return ret;
04e482ff
GKH
1262 ret = checkintf(ps, ret);
1263 if (ret)
1da177e4 1264 return ret;
f080a51b 1265 check_reset_of_active_ep(ps->dev, ep, "RESETEP");
3444b26a 1266 usb_reset_endpoint(ps->dev, ep);
1da177e4
LT
1267 return 0;
1268}
1269
9b6f0c4b 1270static int proc_clearhalt(struct usb_dev_state *ps, void __user *arg)
1da177e4
LT
1271{
1272 unsigned int ep;
1273 int pipe;
1274 int ret;
1275
1276 if (get_user(ep, (unsigned int __user *)arg))
1277 return -EFAULT;
04e482ff
GKH
1278 ret = findintfep(ps->dev, ep);
1279 if (ret < 0)
1da177e4 1280 return ret;
04e482ff
GKH
1281 ret = checkintf(ps, ret);
1282 if (ret)
1da177e4 1283 return ret;
f080a51b 1284 check_reset_of_active_ep(ps->dev, ep, "CLEAR_HALT");
1da177e4 1285 if (ep & USB_DIR_IN)
04e482ff
GKH
1286 pipe = usb_rcvbulkpipe(ps->dev, ep & 0x7f);
1287 else
1288 pipe = usb_sndbulkpipe(ps->dev, ep & 0x7f);
1da177e4
LT
1289
1290 return usb_clear_halt(ps->dev, pipe);
1291}
1da177e4 1292
9b6f0c4b 1293static int proc_getdriver(struct usb_dev_state *ps, void __user *arg)
1da177e4
LT
1294{
1295 struct usbdevfs_getdriver gd;
1296 struct usb_interface *intf;
1297 int ret;
1298
1299 if (copy_from_user(&gd, arg, sizeof(gd)))
1300 return -EFAULT;
1da177e4
LT
1301 intf = usb_ifnum_to_if(ps->dev, gd.interface);
1302 if (!intf || !intf->dev.driver)
1303 ret = -ENODATA;
1304 else {
b11b2e1b 1305 strlcpy(gd.driver, intf->dev.driver->name,
1da177e4
LT
1306 sizeof(gd.driver));
1307 ret = (copy_to_user(arg, &gd, sizeof(gd)) ? -EFAULT : 0);
1308 }
1da177e4
LT
1309 return ret;
1310}
1311
9b6f0c4b 1312static int proc_connectinfo(struct usb_dev_state *ps, void __user *arg)
1da177e4 1313{
681fef83
KL
1314 struct usbdevfs_connectinfo ci;
1315
1316 memset(&ci, 0, sizeof(ci));
1317 ci.devnum = ps->dev->devnum;
1318 ci.slow = ps->dev->speed == USB_SPEED_LOW;
1da177e4 1319
1da177e4
LT
1320 if (copy_to_user(arg, &ci, sizeof(ci)))
1321 return -EFAULT;
1322 return 0;
1323}
1324
9b6f0c4b 1325static int proc_resetdevice(struct usb_dev_state *ps)
1da177e4 1326{
d883f52e
RG
1327 struct usb_host_config *actconfig = ps->dev->actconfig;
1328 struct usb_interface *interface;
1329 int i, number;
1330
1331 /* Don't allow a device reset if the process has dropped the
1332 * privilege to do such things and any of the interfaces are
1333 * currently claimed.
1334 */
1335 if (ps->privileges_dropped && actconfig) {
1336 for (i = 0; i < actconfig->desc.bNumInterfaces; ++i) {
1337 interface = actconfig->interface[i];
1338 number = interface->cur_altsetting->desc.bInterfaceNumber;
1339 if (usb_interface_claimed(interface) &&
1340 !test_bit(number, &ps->ifclaimed)) {
1341 dev_warn(&ps->dev->dev,
1342 "usbfs: interface %d claimed by %s while '%s' resets device\n",
1343 number, interface->dev.driver->name, current->comm);
1344 return -EACCES;
1345 }
1346 }
1347 }
1348
742120c6 1349 return usb_reset_device(ps->dev);
1da177e4
LT
1350}
1351
9b6f0c4b 1352static int proc_setintf(struct usb_dev_state *ps, void __user *arg)
1da177e4
LT
1353{
1354 struct usbdevfs_setinterface setintf;
1355 int ret;
1356
1357 if (copy_from_user(&setintf, arg, sizeof(setintf)))
1358 return -EFAULT;
135551ea
KB
1359 ret = checkintf(ps, setintf.interface);
1360 if (ret)
1da177e4 1361 return ret;
5ec9c177
HG
1362
1363 destroy_async_on_interface(ps, setintf.interface);
1364
1da177e4
LT
1365 return usb_set_interface(ps->dev, setintf.interface,
1366 setintf.altsetting);
1367}
1368
9b6f0c4b 1369static int proc_setconfig(struct usb_dev_state *ps, void __user *arg)
1da177e4 1370{
3f141e2a 1371 int u;
1da177e4 1372 int status = 0;
04e482ff 1373 struct usb_host_config *actconfig;
1da177e4 1374
3f141e2a 1375 if (get_user(u, (int __user *)arg))
1da177e4
LT
1376 return -EFAULT;
1377
04e482ff
GKH
1378 actconfig = ps->dev->actconfig;
1379
1380 /* Don't touch the device if any interfaces are claimed.
1381 * It could interfere with other drivers' operations, and if
1da177e4
LT
1382 * an interface is claimed by usbfs it could easily deadlock.
1383 */
04e482ff
GKH
1384 if (actconfig) {
1385 int i;
1386
1387 for (i = 0; i < actconfig->desc.bNumInterfaces; ++i) {
1388 if (usb_interface_claimed(actconfig->interface[i])) {
1389 dev_warn(&ps->dev->dev,
72ebddb5 1390 "usbfs: interface %d claimed by %s "
1da177e4
LT
1391 "while '%s' sets config #%d\n",
1392 actconfig->interface[i]
1393 ->cur_altsetting
1394 ->desc.bInterfaceNumber,
72ebddb5
DB
1395 actconfig->interface[i]
1396 ->dev.driver->name,
1da177e4 1397 current->comm, u);
04e482ff 1398 status = -EBUSY;
1da177e4 1399 break;
1da177e4 1400 }
04e482ff
GKH
1401 }
1402 }
1da177e4
LT
1403
1404 /* SET_CONFIGURATION is often abused as a "cheap" driver reset,
1405 * so avoid usb_set_configuration()'s kick to sysfs
1406 */
1407 if (status == 0) {
1408 if (actconfig && actconfig->desc.bConfigurationValue == u)
1409 status = usb_reset_configuration(ps->dev);
1410 else
1411 status = usb_set_configuration(ps->dev, u);
1412 }
1413
1414 return status;
1415}
1416
f7d34b44
SG
1417static struct usb_memory *
1418find_memory_area(struct usb_dev_state *ps, const struct usbdevfs_urb *uurb)
1419{
1420 struct usb_memory *usbm = NULL, *iter;
1421 unsigned long flags;
1422 unsigned long uurb_start = (unsigned long)uurb->buffer;
1423
1424 spin_lock_irqsave(&ps->lock, flags);
1425 list_for_each_entry(iter, &ps->memory_list, memlist) {
1426 if (uurb_start >= iter->vm_start &&
1427 uurb_start < iter->vm_start + iter->size) {
1428 if (uurb->buffer_length > iter->vm_start + iter->size -
1429 uurb_start) {
1430 usbm = ERR_PTR(-EINVAL);
1431 } else {
1432 usbm = iter;
1433 usbm->urb_use_count++;
1434 }
1435 break;
1436 }
1437 }
1438 spin_unlock_irqrestore(&ps->lock, flags);
1439 return usbm;
1440}
1441
9b6f0c4b 1442static int proc_do_submiturb(struct usb_dev_state *ps, struct usbdevfs_urb *uurb,
04e482ff
GKH
1443 struct usbdevfs_iso_packet_desc __user *iso_frame_desc,
1444 void __user *arg)
1da177e4
LT
1445{
1446 struct usbdevfs_iso_packet_desc *isopkt = NULL;
1447 struct usb_host_endpoint *ep;
52fb743d 1448 struct async *as = NULL;
1da177e4
LT
1449 struct usb_ctrlrequest *dr = NULL;
1450 unsigned int u, totlen, isofrmlen;
3d97ff63 1451 int i, ret, is_in, num_sgs = 0, ifnum = -1;
b2d03eb5 1452 int number_of_packets = 0;
948cd8c1 1453 unsigned int stream_id = 0;
3d97ff63 1454 void *buf;
1da177e4 1455
14722ef4
AS
1456 if (uurb->flags & ~(USBDEVFS_URB_ISO_ASAP |
1457 USBDEVFS_URB_SHORT_NOT_OK |
01c6460f 1458 USBDEVFS_URB_BULK_CONTINUATION |
14722ef4
AS
1459 USBDEVFS_URB_NO_FSBR |
1460 USBDEVFS_URB_ZERO_PACKET |
1461 USBDEVFS_URB_NO_INTERRUPT))
1da177e4 1462 return -EINVAL;
9180135b 1463 if (uurb->buffer_length > 0 && !uurb->buffer)
1da177e4 1464 return -EINVAL;
04e482ff
GKH
1465 if (!(uurb->type == USBDEVFS_URB_TYPE_CONTROL &&
1466 (uurb->endpoint & ~USB_ENDPOINT_DIR_MASK) == 0)) {
1467 ifnum = findintfep(ps->dev, uurb->endpoint);
1468 if (ifnum < 0)
1da177e4 1469 return ifnum;
04e482ff
GKH
1470 ret = checkintf(ps, ifnum);
1471 if (ret)
1da177e4
LT
1472 return ret;
1473 }
2fec32b0 1474 ep = ep_to_host_endpoint(ps->dev, uurb->endpoint);
1da177e4
LT
1475 if (!ep)
1476 return -ENOENT;
2fec32b0 1477 is_in = (uurb->endpoint & USB_ENDPOINT_DIR_MASK) != 0;
add1aaea
AS
1478
1479 u = 0;
f355e830 1480 switch (uurb->type) {
1da177e4 1481 case USBDEVFS_URB_TYPE_CONTROL:
93cf9b90 1482 if (!usb_endpoint_xfer_control(&ep->desc))
1da177e4 1483 return -EINVAL;
add1aaea
AS
1484 /* min 8 byte setup packet */
1485 if (uurb->buffer_length < 8)
1da177e4 1486 return -EINVAL;
04e482ff
GKH
1487 dr = kmalloc(sizeof(struct usb_ctrlrequest), GFP_KERNEL);
1488 if (!dr)
1da177e4
LT
1489 return -ENOMEM;
1490 if (copy_from_user(dr, uurb->buffer, 8)) {
52fb743d
AS
1491 ret = -EFAULT;
1492 goto error;
1da177e4
LT
1493 }
1494 if (uurb->buffer_length < (le16_to_cpup(&dr->wLength) + 8)) {
52fb743d
AS
1495 ret = -EINVAL;
1496 goto error;
1da177e4 1497 }
393cbb51 1498 ret = check_ctrlrecip(ps, dr->bRequestType, dr->bRequest,
04e482ff 1499 le16_to_cpup(&dr->wIndex));
52fb743d
AS
1500 if (ret)
1501 goto error;
1da177e4
LT
1502 uurb->buffer_length = le16_to_cpup(&dr->wLength);
1503 uurb->buffer += 8;
93cf9b90
AS
1504 if ((dr->bRequestType & USB_DIR_IN) && uurb->buffer_length) {
1505 is_in = 1;
1506 uurb->endpoint |= USB_DIR_IN;
1507 } else {
1508 is_in = 0;
1509 uurb->endpoint &= ~USB_DIR_IN;
1510 }
0880aef4
CF
1511 snoop(&ps->dev->dev, "control urb: bRequestType=%02x "
1512 "bRequest=%02x wValue=%04x "
1513 "wIndex=%04x wLength=%04x\n",
1514 dr->bRequestType, dr->bRequest,
1515 __le16_to_cpup(&dr->wValue),
1516 __le16_to_cpup(&dr->wIndex),
1517 __le16_to_cpup(&dr->wLength));
add1aaea 1518 u = sizeof(struct usb_ctrlrequest);
1da177e4
LT
1519 break;
1520
1521 case USBDEVFS_URB_TYPE_BULK:
93cf9b90 1522 switch (usb_endpoint_type(&ep->desc)) {
1da177e4
LT
1523 case USB_ENDPOINT_XFER_CONTROL:
1524 case USB_ENDPOINT_XFER_ISOC:
1525 return -EINVAL;
f661c6f8
AS
1526 case USB_ENDPOINT_XFER_INT:
1527 /* allow single-shot interrupt transfers */
1528 uurb->type = USBDEVFS_URB_TYPE_INTERRUPT;
1529 goto interrupt_urb;
1da177e4 1530 }
3d97ff63
HG
1531 num_sgs = DIV_ROUND_UP(uurb->buffer_length, USB_SG_SIZE);
1532 if (num_sgs == 1 || num_sgs > ps->dev->bus->sg_tablesize)
1533 num_sgs = 0;
948cd8c1
HG
1534 if (ep->streams)
1535 stream_id = uurb->stream_id;
1da177e4
LT
1536 break;
1537
f661c6f8
AS
1538 case USBDEVFS_URB_TYPE_INTERRUPT:
1539 if (!usb_endpoint_xfer_int(&ep->desc))
1540 return -EINVAL;
1541 interrupt_urb:
f661c6f8
AS
1542 break;
1543
1da177e4
LT
1544 case USBDEVFS_URB_TYPE_ISO:
1545 /* arbitrary limit */
04e482ff
GKH
1546 if (uurb->number_of_packets < 1 ||
1547 uurb->number_of_packets > 128)
1da177e4 1548 return -EINVAL;
93cf9b90 1549 if (!usb_endpoint_xfer_isoc(&ep->desc))
1da177e4 1550 return -EINVAL;
b2d03eb5 1551 number_of_packets = uurb->number_of_packets;
04e482ff 1552 isofrmlen = sizeof(struct usbdevfs_iso_packet_desc) *
b2d03eb5 1553 number_of_packets;
73a02d32
RP
1554 isopkt = memdup_user(iso_frame_desc, isofrmlen);
1555 if (IS_ERR(isopkt)) {
1556 ret = PTR_ERR(isopkt);
1557 isopkt = NULL;
52fb743d 1558 goto error;
1da177e4 1559 }
b2d03eb5 1560 for (totlen = u = 0; u < number_of_packets; u++) {
e2e2f0ea
FM
1561 /*
1562 * arbitrary limit need for USB 3.0
1563 * bMaxBurst (0~15 allowed, 1~16 packets)
1564 * bmAttributes (bit 1:0, mult 0~2, 1~3 packets)
1565 * sizemax: 1024 * 16 * 3 = 49152
1566 */
1567 if (isopkt[u].length > 49152) {
52fb743d
AS
1568 ret = -EINVAL;
1569 goto error;
1da177e4
LT
1570 }
1571 totlen += isopkt[u].length;
1572 }
add1aaea 1573 u *= sizeof(struct usb_iso_packet_descriptor);
1da177e4
LT
1574 uurb->buffer_length = totlen;
1575 break;
1576
1da177e4
LT
1577 default:
1578 return -EINVAL;
1579 }
add1aaea 1580
9180135b
AS
1581 if (uurb->buffer_length > 0 &&
1582 !access_ok(is_in ? VERIFY_WRITE : VERIFY_READ,
1583 uurb->buffer, uurb->buffer_length)) {
52fb743d
AS
1584 ret = -EFAULT;
1585 goto error;
1da177e4 1586 }
b2d03eb5 1587 as = alloc_async(number_of_packets);
9180135b 1588 if (!as) {
52fb743d
AS
1589 ret = -ENOMEM;
1590 goto error;
1da177e4 1591 }
3d97ff63 1592
f7d34b44
SG
1593 as->usbm = find_memory_area(ps, uurb);
1594 if (IS_ERR(as->usbm)) {
1595 ret = PTR_ERR(as->usbm);
1596 as->usbm = NULL;
1597 goto error;
1598 }
1599
1600 /* do not use SG buffers when memory mapped segments
1601 * are in use
1602 */
1603 if (as->usbm)
1604 num_sgs = 0;
1605
3d97ff63
HG
1606 u += sizeof(struct async) + sizeof(struct urb) + uurb->buffer_length +
1607 num_sgs * sizeof(struct scatterlist);
add1aaea
AS
1608 ret = usbfs_increase_memory_usage(u);
1609 if (ret)
1610 goto error;
1611 as->mem_usage = u;
1612
3d97ff63
HG
1613 if (num_sgs) {
1614 as->urb->sg = kmalloc(num_sgs * sizeof(struct scatterlist),
1615 GFP_KERNEL);
1616 if (!as->urb->sg) {
1617 ret = -ENOMEM;
1618 goto error;
1619 }
1620 as->urb->num_sgs = num_sgs;
1621 sg_init_table(as->urb->sg, as->urb->num_sgs);
1622
1623 totlen = uurb->buffer_length;
1624 for (i = 0; i < as->urb->num_sgs; i++) {
1625 u = (totlen > USB_SG_SIZE) ? USB_SG_SIZE : totlen;
1626 buf = kmalloc(u, GFP_KERNEL);
1627 if (!buf) {
1628 ret = -ENOMEM;
1629 goto error;
1630 }
1631 sg_set_buf(&as->urb->sg[i], buf, u);
1632
1633 if (!is_in) {
1634 if (copy_from_user(buf, uurb->buffer, u)) {
1635 ret = -EFAULT;
1636 goto error;
1637 }
01463900 1638 uurb->buffer += u;
3d97ff63
HG
1639 }
1640 totlen -= u;
1641 }
1642 } else if (uurb->buffer_length > 0) {
f7d34b44
SG
1643 if (as->usbm) {
1644 unsigned long uurb_start = (unsigned long)uurb->buffer;
3d97ff63 1645
f7d34b44
SG
1646 as->urb->transfer_buffer = as->usbm->mem +
1647 (uurb_start - as->usbm->vm_start);
1648 } else {
1649 as->urb->transfer_buffer = kmalloc(uurb->buffer_length,
1650 GFP_KERNEL);
1651 if (!as->urb->transfer_buffer) {
1652 ret = -ENOMEM;
3d97ff63
HG
1653 goto error;
1654 }
f7d34b44
SG
1655 if (!is_in) {
1656 if (copy_from_user(as->urb->transfer_buffer,
1657 uurb->buffer,
1658 uurb->buffer_length)) {
1659 ret = -EFAULT;
1660 goto error;
1661 }
1662 } else if (uurb->type == USBDEVFS_URB_TYPE_ISO) {
1663 /*
1664 * Isochronous input data may end up being
1665 * discontiguous if some of the packets are
1666 * short. Clear the buffer so that the gaps
1667 * don't leak kernel data to userspace.
1668 */
1669 memset(as->urb->transfer_buffer, 0,
1670 uurb->buffer_length);
1671 }
3d97ff63 1672 }
9180135b 1673 }
04e482ff
GKH
1674 as->urb->dev = ps->dev;
1675 as->urb->pipe = (uurb->type << 30) |
93cf9b90
AS
1676 __create_pipe(ps->dev, uurb->endpoint & 0xf) |
1677 (uurb->endpoint & USB_DIR_IN);
14722ef4
AS
1678
1679 /* This tedious sequence is necessary because the URB_* flags
1680 * are internal to the kernel and subject to change, whereas
1681 * the USBDEVFS_URB_* flags are a user API and must not be changed.
1682 */
1683 u = (is_in ? URB_DIR_IN : URB_DIR_OUT);
1684 if (uurb->flags & USBDEVFS_URB_ISO_ASAP)
1685 u |= URB_ISO_ASAP;
d310d05f 1686 if (uurb->flags & USBDEVFS_URB_SHORT_NOT_OK && is_in)
14722ef4
AS
1687 u |= URB_SHORT_NOT_OK;
1688 if (uurb->flags & USBDEVFS_URB_NO_FSBR)
1689 u |= URB_NO_FSBR;
1690 if (uurb->flags & USBDEVFS_URB_ZERO_PACKET)
1691 u |= URB_ZERO_PACKET;
1692 if (uurb->flags & USBDEVFS_URB_NO_INTERRUPT)
1693 u |= URB_NO_INTERRUPT;
1694 as->urb->transfer_flags = u;
1695
1da177e4 1696 as->urb->transfer_buffer_length = uurb->buffer_length;
04e482ff 1697 as->urb->setup_packet = (unsigned char *)dr;
52fb743d 1698 dr = NULL;
1da177e4 1699 as->urb->start_frame = uurb->start_frame;
b2d03eb5 1700 as->urb->number_of_packets = number_of_packets;
948cd8c1 1701 as->urb->stream_id = stream_id;
53e5f36f
AS
1702
1703 if (ep->desc.bInterval) {
1704 if (uurb->type == USBDEVFS_URB_TYPE_ISO ||
1705 ps->dev->speed == USB_SPEED_HIGH ||
1706 ps->dev->speed >= USB_SPEED_SUPER)
1707 as->urb->interval = 1 <<
1708 min(15, ep->desc.bInterval - 1);
1709 else
1710 as->urb->interval = ep->desc.bInterval;
1711 }
1712
04e482ff
GKH
1713 as->urb->context = as;
1714 as->urb->complete = async_completed;
b2d03eb5 1715 for (totlen = u = 0; u < number_of_packets; u++) {
1da177e4
LT
1716 as->urb->iso_frame_desc[u].offset = totlen;
1717 as->urb->iso_frame_desc[u].length = isopkt[u].length;
1718 totlen += isopkt[u].length;
1719 }
6fd19f4b 1720 kfree(isopkt);
52fb743d 1721 isopkt = NULL;
1da177e4 1722 as->ps = ps;
04e482ff 1723 as->userurb = arg;
f7d34b44
SG
1724 if (as->usbm) {
1725 unsigned long uurb_start = (unsigned long)uurb->buffer;
1726
1727 as->urb->transfer_flags |= URB_NO_TRANSFER_DMA_MAP;
1728 as->urb->transfer_dma = as->usbm->dma_handle +
1729 (uurb_start - as->usbm->vm_start);
1730 } else if (is_in && uurb->buffer_length > 0)
1da177e4 1731 as->userbuffer = uurb->buffer;
1da177e4
LT
1732 as->signr = uurb->signr;
1733 as->ifnum = ifnum;
2425c08b 1734 as->pid = get_pid(task_pid(current));
d178bc3a 1735 as->cred = get_current_cred();
7a01955f 1736 security_task_getsecid(current, &as->secid);
4c6e8971 1737 snoop_urb(ps->dev, as->userurb, as->urb->pipe,
0880aef4 1738 as->urb->transfer_buffer_length, 0, SUBMIT,
3d97ff63
HG
1739 NULL, 0);
1740 if (!is_in)
1741 snoop_urb_data(as->urb, as->urb->transfer_buffer_length);
1742
04e482ff 1743 async_newpending(as);
01c6460f
AS
1744
1745 if (usb_endpoint_xfer_bulk(&ep->desc)) {
1746 spin_lock_irq(&ps->lock);
1747
1748 /* Not exactly the endpoint address; the direction bit is
1749 * shifted to the 0x10 position so that the value will be
1750 * between 0 and 31.
1751 */
1752 as->bulk_addr = usb_endpoint_num(&ep->desc) |
1753 ((ep->desc.bEndpointAddress & USB_ENDPOINT_DIR_MASK)
1754 >> 3);
1755
1756 /* If this bulk URB is the start of a new transfer, re-enable
1757 * the endpoint. Otherwise mark it as a continuation URB.
1758 */
1759 if (uurb->flags & USBDEVFS_URB_BULK_CONTINUATION)
1760 as->bulk_status = AS_CONTINUATION;
1761 else
1762 ps->disabled_bulk_eps &= ~(1 << as->bulk_addr);
1763
1764 /* Don't accept continuation URBs if the endpoint is
1765 * disabled because of an earlier error.
1766 */
1767 if (ps->disabled_bulk_eps & (1 << as->bulk_addr))
1768 ret = -EREMOTEIO;
1769 else
1770 ret = usb_submit_urb(as->urb, GFP_ATOMIC);
1771 spin_unlock_irq(&ps->lock);
1772 } else {
1773 ret = usb_submit_urb(as->urb, GFP_KERNEL);
1774 }
1775
1776 if (ret) {
04e482ff
GKH
1777 dev_printk(KERN_DEBUG, &ps->dev->dev,
1778 "usbfs: usb_submit_urb returned %d\n", ret);
4c6e8971 1779 snoop_urb(ps->dev, as->userurb, as->urb->pipe,
0880aef4 1780 0, ret, COMPLETE, NULL, 0);
04e482ff 1781 async_removepending(as);
52fb743d 1782 goto error;
04e482ff
GKH
1783 }
1784 return 0;
52fb743d
AS
1785
1786 error:
f7d34b44
SG
1787 if (as && as->usbm)
1788 dec_usb_memory_use_count(as->usbm, &as->usbm->urb_use_count);
52fb743d
AS
1789 kfree(isopkt);
1790 kfree(dr);
1791 if (as)
1792 free_async(as);
1793 return ret;
1da177e4
LT
1794}
1795
9b6f0c4b 1796static int proc_submiturb(struct usb_dev_state *ps, void __user *arg)
1da177e4
LT
1797{
1798 struct usbdevfs_urb uurb;
1799
1800 if (copy_from_user(&uurb, arg, sizeof(uurb)))
1801 return -EFAULT;
1802
04e482ff
GKH
1803 return proc_do_submiturb(ps, &uurb,
1804 (((struct usbdevfs_urb __user *)arg)->iso_frame_desc),
1805 arg);
1da177e4
LT
1806}
1807
9b6f0c4b 1808static int proc_unlinkurb(struct usb_dev_state *ps, void __user *arg)
1da177e4 1809{
4e09dcf2 1810 struct urb *urb;
1da177e4 1811 struct async *as;
4e09dcf2 1812 unsigned long flags;
1da177e4 1813
4e09dcf2 1814 spin_lock_irqsave(&ps->lock, flags);
1da177e4 1815 as = async_getpending(ps, arg);
4e09dcf2
HL
1816 if (!as) {
1817 spin_unlock_irqrestore(&ps->lock, flags);
1da177e4 1818 return -EINVAL;
4e09dcf2
HL
1819 }
1820
1821 urb = as->urb;
1822 usb_get_urb(urb);
1823 spin_unlock_irqrestore(&ps->lock, flags);
1824
1825 usb_kill_urb(urb);
1826 usb_put_urb(urb);
1827
1da177e4
LT
1828 return 0;
1829}
1830
1831static int processcompl(struct async *as, void __user * __user *arg)
1832{
1833 struct urb *urb = as->urb;
1834 struct usbdevfs_urb __user *userurb = as->userurb;
1835 void __user *addr = as->userurb;
1836 unsigned int i;
1837
7152b592 1838 if (as->userbuffer && urb->actual_length) {
3d97ff63 1839 if (copy_urb_data_to_user(as->userbuffer, urb))
d794a021 1840 goto err_out;
7152b592 1841 }
e015268d 1842 if (put_user(as->status, &userurb->status))
d794a021 1843 goto err_out;
1da177e4 1844 if (put_user(urb->actual_length, &userurb->actual_length))
d794a021 1845 goto err_out;
1da177e4 1846 if (put_user(urb->error_count, &userurb->error_count))
d794a021 1847 goto err_out;
1da177e4 1848
93cf9b90 1849 if (usb_endpoint_xfer_isoc(&urb->ep->desc)) {
668a9541
CL
1850 for (i = 0; i < urb->number_of_packets; i++) {
1851 if (put_user(urb->iso_frame_desc[i].actual_length,
1852 &userurb->iso_frame_desc[i].actual_length))
d794a021 1853 goto err_out;
668a9541
CL
1854 if (put_user(urb->iso_frame_desc[i].status,
1855 &userurb->iso_frame_desc[i].status))
d794a021 1856 goto err_out;
668a9541 1857 }
1da177e4
LT
1858 }
1859
1da177e4
LT
1860 if (put_user(addr, (void __user * __user *)arg))
1861 return -EFAULT;
1862 return 0;
d794a021
ON
1863
1864err_out:
d794a021 1865 return -EFAULT;
1da177e4
LT
1866}
1867
9b6f0c4b 1868static struct async *reap_as(struct usb_dev_state *ps)
1da177e4 1869{
04e482ff 1870 DECLARE_WAITQUEUE(wait, current);
1da177e4
LT
1871 struct async *as = NULL;
1872 struct usb_device *dev = ps->dev;
1873
1874 add_wait_queue(&ps->wait, &wait);
1875 for (;;) {
1876 __set_current_state(TASK_INTERRUPTIBLE);
04e482ff 1877 as = async_getcompleted(ps);
3f2cee73 1878 if (as || !connected(ps))
1da177e4
LT
1879 break;
1880 if (signal_pending(current))
1881 break;
1882 usb_unlock_device(dev);
1883 schedule();
1884 usb_lock_device(dev);
1885 }
1886 remove_wait_queue(&ps->wait, &wait);
1887 set_current_state(TASK_RUNNING);
1888 return as;
1889}
1890
9b6f0c4b 1891static int proc_reapurb(struct usb_dev_state *ps, void __user *arg)
1da177e4
LT
1892{
1893 struct async *as = reap_as(ps);
a016a816 1894
ddeee0b2 1895 if (as) {
a016a816
AS
1896 int retval;
1897
2f964780 1898 snoop(&ps->dev->dev, "reap %pK\n", as->userurb);
a016a816 1899 retval = processcompl(as, (void __user * __user *)arg);
ddeee0b2
LT
1900 free_async(as);
1901 return retval;
1902 }
1da177e4
LT
1903 if (signal_pending(current))
1904 return -EINTR;
3f2cee73 1905 return -ENODEV;
1da177e4
LT
1906}
1907
9b6f0c4b 1908static int proc_reapurbnonblock(struct usb_dev_state *ps, void __user *arg)
1da177e4 1909{
ddeee0b2 1910 int retval;
1da177e4
LT
1911 struct async *as;
1912
ddeee0b2 1913 as = async_getcompleted(ps);
ddeee0b2 1914 if (as) {
2f964780 1915 snoop(&ps->dev->dev, "reap %pK\n", as->userurb);
ddeee0b2
LT
1916 retval = processcompl(as, (void __user * __user *)arg);
1917 free_async(as);
3f2cee73
AS
1918 } else {
1919 retval = (connected(ps) ? -EAGAIN : -ENODEV);
ddeee0b2
LT
1920 }
1921 return retval;
1da177e4
LT
1922}
1923
1924#ifdef CONFIG_COMPAT
9b6f0c4b 1925static int proc_control_compat(struct usb_dev_state *ps,
637e8a60
AB
1926 struct usbdevfs_ctrltransfer32 __user *p32)
1927{
5b32c385
MB
1928 struct usbdevfs_ctrltransfer __user *p;
1929 __u32 udata;
1930 p = compat_alloc_user_space(sizeof(*p));
1931 if (copy_in_user(p, p32, (sizeof(*p32) - sizeof(compat_caddr_t))) ||
1932 get_user(udata, &p32->data) ||
637e8a60
AB
1933 put_user(compat_ptr(udata), &p->data))
1934 return -EFAULT;
5b32c385 1935 return proc_control(ps, p);
637e8a60
AB
1936}
1937
9b6f0c4b 1938static int proc_bulk_compat(struct usb_dev_state *ps,
637e8a60
AB
1939 struct usbdevfs_bulktransfer32 __user *p32)
1940{
06793f2d
MB
1941 struct usbdevfs_bulktransfer __user *p;
1942 compat_uint_t n;
1943 compat_caddr_t addr;
637e8a60 1944
06793f2d 1945 p = compat_alloc_user_space(sizeof(*p));
637e8a60 1946
06793f2d
MB
1947 if (get_user(n, &p32->ep) || put_user(n, &p->ep) ||
1948 get_user(n, &p32->len) || put_user(n, &p->len) ||
1949 get_user(n, &p32->timeout) || put_user(n, &p->timeout) ||
1950 get_user(addr, &p32->data) || put_user(compat_ptr(addr), &p->data))
1951 return -EFAULT;
637e8a60 1952
06793f2d 1953 return proc_bulk(ps, p);
637e8a60 1954}
9b6f0c4b 1955static int proc_disconnectsignal_compat(struct usb_dev_state *ps, void __user *arg)
637e8a60
AB
1956{
1957 struct usbdevfs_disconnectsignal32 ds;
1958
1959 if (copy_from_user(&ds, arg, sizeof(ds)))
1960 return -EFAULT;
1961 ps->discsignr = ds.signr;
1962 ps->disccontext = compat_ptr(ds.context);
1963 return 0;
1964}
1da177e4
LT
1965
1966static int get_urb32(struct usbdevfs_urb *kurb,
1967 struct usbdevfs_urb32 __user *uurb)
1968{
1969 __u32 uptr;
18753ebc
MB
1970 if (!access_ok(VERIFY_READ, uurb, sizeof(*uurb)) ||
1971 __get_user(kurb->type, &uurb->type) ||
1da177e4
LT
1972 __get_user(kurb->endpoint, &uurb->endpoint) ||
1973 __get_user(kurb->status, &uurb->status) ||
1974 __get_user(kurb->flags, &uurb->flags) ||
1975 __get_user(kurb->buffer_length, &uurb->buffer_length) ||
1976 __get_user(kurb->actual_length, &uurb->actual_length) ||
1977 __get_user(kurb->start_frame, &uurb->start_frame) ||
1978 __get_user(kurb->number_of_packets, &uurb->number_of_packets) ||
1979 __get_user(kurb->error_count, &uurb->error_count) ||
1980 __get_user(kurb->signr, &uurb->signr))
1981 return -EFAULT;
1982
1983 if (__get_user(uptr, &uurb->buffer))
1984 return -EFAULT;
1985 kurb->buffer = compat_ptr(uptr);
ed0c7720 1986 if (__get_user(uptr, &uurb->usercontext))
1da177e4
LT
1987 return -EFAULT;
1988 kurb->usercontext = compat_ptr(uptr);
1989
1990 return 0;
1991}
1992
9b6f0c4b 1993static int proc_submiturb_compat(struct usb_dev_state *ps, void __user *arg)
1da177e4
LT
1994{
1995 struct usbdevfs_urb uurb;
1996
04e482ff 1997 if (get_urb32(&uurb, (struct usbdevfs_urb32 __user *)arg))
1da177e4
LT
1998 return -EFAULT;
1999
04e482ff
GKH
2000 return proc_do_submiturb(ps, &uurb,
2001 ((struct usbdevfs_urb32 __user *)arg)->iso_frame_desc,
2002 arg);
1da177e4
LT
2003}
2004
2005static int processcompl_compat(struct async *as, void __user * __user *arg)
2006{
2007 struct urb *urb = as->urb;
2008 struct usbdevfs_urb32 __user *userurb = as->userurb;
2009 void __user *addr = as->userurb;
2010 unsigned int i;
2011
2102e06a 2012 if (as->userbuffer && urb->actual_length) {
3d97ff63 2013 if (copy_urb_data_to_user(as->userbuffer, urb))
1da177e4 2014 return -EFAULT;
2102e06a 2015 }
e015268d 2016 if (put_user(as->status, &userurb->status))
1da177e4
LT
2017 return -EFAULT;
2018 if (put_user(urb->actual_length, &userurb->actual_length))
2019 return -EFAULT;
2020 if (put_user(urb->error_count, &userurb->error_count))
2021 return -EFAULT;
2022
93cf9b90 2023 if (usb_endpoint_xfer_isoc(&urb->ep->desc)) {
668a9541
CL
2024 for (i = 0; i < urb->number_of_packets; i++) {
2025 if (put_user(urb->iso_frame_desc[i].actual_length,
2026 &userurb->iso_frame_desc[i].actual_length))
2027 return -EFAULT;
2028 if (put_user(urb->iso_frame_desc[i].status,
2029 &userurb->iso_frame_desc[i].status))
2030 return -EFAULT;
2031 }
1da177e4
LT
2032 }
2033
c714de5d 2034 if (put_user(ptr_to_compat(addr), (u32 __user *)arg))
1da177e4
LT
2035 return -EFAULT;
2036 return 0;
2037}
2038
9b6f0c4b 2039static int proc_reapurb_compat(struct usb_dev_state *ps, void __user *arg)
1da177e4
LT
2040{
2041 struct async *as = reap_as(ps);
a016a816 2042
ddeee0b2 2043 if (as) {
a016a816
AS
2044 int retval;
2045
2f964780 2046 snoop(&ps->dev->dev, "reap %pK\n", as->userurb);
a016a816 2047 retval = processcompl_compat(as, (void __user * __user *)arg);
ddeee0b2
LT
2048 free_async(as);
2049 return retval;
2050 }
1da177e4
LT
2051 if (signal_pending(current))
2052 return -EINTR;
3f2cee73 2053 return -ENODEV;
1da177e4
LT
2054}
2055
9b6f0c4b 2056static int proc_reapurbnonblock_compat(struct usb_dev_state *ps, void __user *arg)
1da177e4 2057{
ddeee0b2 2058 int retval;
1da177e4
LT
2059 struct async *as;
2060
ddeee0b2
LT
2061 as = async_getcompleted(ps);
2062 if (as) {
2f964780 2063 snoop(&ps->dev->dev, "reap %pK\n", as->userurb);
ddeee0b2
LT
2064 retval = processcompl_compat(as, (void __user * __user *)arg);
2065 free_async(as);
3f2cee73
AS
2066 } else {
2067 retval = (connected(ps) ? -EAGAIN : -ENODEV);
ddeee0b2
LT
2068 }
2069 return retval;
1da177e4
LT
2070}
2071
637e8a60 2072
1da177e4
LT
2073#endif
2074
9b6f0c4b 2075static int proc_disconnectsignal(struct usb_dev_state *ps, void __user *arg)
1da177e4
LT
2076{
2077 struct usbdevfs_disconnectsignal ds;
2078
2079 if (copy_from_user(&ds, arg, sizeof(ds)))
2080 return -EFAULT;
1da177e4
LT
2081 ps->discsignr = ds.signr;
2082 ps->disccontext = ds.context;
2083 return 0;
2084}
2085
9b6f0c4b 2086static int proc_claiminterface(struct usb_dev_state *ps, void __user *arg)
1da177e4
LT
2087{
2088 unsigned int ifnum;
2089
2090 if (get_user(ifnum, (unsigned int __user *)arg))
2091 return -EFAULT;
2092 return claimintf(ps, ifnum);
2093}
2094
9b6f0c4b 2095static int proc_releaseinterface(struct usb_dev_state *ps, void __user *arg)
1da177e4
LT
2096{
2097 unsigned int ifnum;
2098 int ret;
2099
2100 if (get_user(ifnum, (unsigned int __user *)arg))
2101 return -EFAULT;
135551ea
KB
2102 ret = releaseintf(ps, ifnum);
2103 if (ret < 0)
1da177e4 2104 return ret;
64f10edf 2105 destroy_async_on_interface(ps, ifnum);
1da177e4
LT
2106 return 0;
2107}
2108
9b6f0c4b 2109static int proc_ioctl(struct usb_dev_state *ps, struct usbdevfs_ioctl *ctl)
1da177e4 2110{
1da177e4
LT
2111 int size;
2112 void *buf = NULL;
2113 int retval = 0;
2114 struct usb_interface *intf = NULL;
2115 struct usb_driver *driver = NULL;
1da177e4 2116
d883f52e
RG
2117 if (ps->privileges_dropped)
2118 return -EACCES;
2119
c36fc889 2120 /* alloc buffer */
135551ea
KB
2121 size = _IOC_SIZE(ctl->ioctl_code);
2122 if (size > 0) {
4baf0df7
2123 buf = kmalloc(size, GFP_KERNEL);
2124 if (buf == NULL)
1da177e4 2125 return -ENOMEM;
c36fc889 2126 if ((_IOC_DIR(ctl->ioctl_code) & _IOC_WRITE)) {
04e482ff 2127 if (copy_from_user(buf, ctl->data, size)) {
6fd19f4b 2128 kfree(buf);
1da177e4
LT
2129 return -EFAULT;
2130 }
2131 } else {
04e482ff 2132 memset(buf, 0, size);
1da177e4
LT
2133 }
2134 }
2135
349710c3 2136 if (!connected(ps)) {
6fd19f4b 2137 kfree(buf);
1da177e4
LT
2138 return -ENODEV;
2139 }
2140
2141 if (ps->dev->state != USB_STATE_CONFIGURED)
2142 retval = -EHOSTUNREACH;
04e482ff
GKH
2143 else if (!(intf = usb_ifnum_to_if(ps->dev, ctl->ifno)))
2144 retval = -EINVAL;
c36fc889 2145 else switch (ctl->ioctl_code) {
1da177e4
LT
2146
2147 /* disconnect kernel driver from interface */
2148 case USBDEVFS_DISCONNECT:
1da177e4
LT
2149 if (intf->dev.driver) {
2150 driver = to_usb_driver(intf->dev.driver);
04e482ff 2151 dev_dbg(&intf->dev, "disconnect by usbfs\n");
1da177e4
LT
2152 usb_driver_release_interface(driver, intf);
2153 } else
2154 retval = -ENODATA;
1da177e4
LT
2155 break;
2156
2157 /* let kernel drivers try to (re)bind to the interface */
2158 case USBDEVFS_CONNECT:
885e9747
AS
2159 if (!intf->dev.driver)
2160 retval = device_attach(&intf->dev);
2161 else
2162 retval = -EBUSY;
1da177e4
LT
2163 break;
2164
2165 /* talk directly to the interface's driver */
2166 default:
1da177e4
LT
2167 if (intf->dev.driver)
2168 driver = to_usb_driver(intf->dev.driver);
c532b29a 2169 if (driver == NULL || driver->unlocked_ioctl == NULL) {
1da177e4
LT
2170 retval = -ENOTTY;
2171 } else {
c532b29a 2172 retval = driver->unlocked_ioctl(intf, ctl->ioctl_code, buf);
1da177e4
LT
2173 if (retval == -ENOIOCTLCMD)
2174 retval = -ENOTTY;
2175 }
1da177e4
LT
2176 }
2177
2178 /* cleanup and return */
2179 if (retval >= 0
04e482ff 2180 && (_IOC_DIR(ctl->ioctl_code) & _IOC_READ) != 0
1da177e4 2181 && size > 0
04e482ff 2182 && copy_to_user(ctl->data, buf, size) != 0)
1da177e4 2183 retval = -EFAULT;
6fd19f4b
JJ
2184
2185 kfree(buf);
1da177e4
LT
2186 return retval;
2187}
2188
9b6f0c4b 2189static int proc_ioctl_default(struct usb_dev_state *ps, void __user *arg)
c36fc889
PZ
2190{
2191 struct usbdevfs_ioctl ctrl;
2192
04e482ff 2193 if (copy_from_user(&ctrl, arg, sizeof(ctrl)))
c36fc889
PZ
2194 return -EFAULT;
2195 return proc_ioctl(ps, &ctrl);
2196}
2197
2198#ifdef CONFIG_COMPAT
9b6f0c4b 2199static int proc_ioctl_compat(struct usb_dev_state *ps, compat_uptr_t arg)
c36fc889
PZ
2200{
2201 struct usbdevfs_ioctl32 __user *uioc;
2202 struct usbdevfs_ioctl ctrl;
2203 u32 udata;
2204
058120d7 2205 uioc = compat_ptr((long)arg);
18753ebc
MB
2206 if (!access_ok(VERIFY_READ, uioc, sizeof(*uioc)) ||
2207 __get_user(ctrl.ifno, &uioc->ifno) ||
2208 __get_user(ctrl.ioctl_code, &uioc->ioctl_code) ||
c36fc889
PZ
2209 __get_user(udata, &uioc->data))
2210 return -EFAULT;
2211 ctrl.data = compat_ptr(udata);
2212
2213 return proc_ioctl(ps, &ctrl);
2214}
2215#endif
2216
9b6f0c4b 2217static int proc_claim_port(struct usb_dev_state *ps, void __user *arg)
7cbe5dca
AS
2218{
2219 unsigned portnum;
2220 int rc;
2221
2222 if (get_user(portnum, (unsigned __user *) arg))
2223 return -EFAULT;
2224 rc = usb_hub_claim_port(ps->dev, portnum, ps);
2225 if (rc == 0)
2226 snoop(&ps->dev->dev, "port %d claimed by process %d: %s\n",
2227 portnum, task_pid_nr(current), current->comm);
2228 return rc;
2229}
2230
9b6f0c4b 2231static int proc_release_port(struct usb_dev_state *ps, void __user *arg)
7cbe5dca
AS
2232{
2233 unsigned portnum;
2234
2235 if (get_user(portnum, (unsigned __user *) arg))
2236 return -EFAULT;
2237 return usb_hub_release_port(ps->dev, portnum, ps);
2238}
2239
9b6f0c4b 2240static int proc_get_capabilities(struct usb_dev_state *ps, void __user *arg)
19181bc5
HG
2241{
2242 __u32 caps;
2243
3f2cee73 2244 caps = USBDEVFS_CAP_ZERO_PACKET | USBDEVFS_CAP_NO_PACKET_SIZE_LIM |
d883f52e
RG
2245 USBDEVFS_CAP_REAP_AFTER_DISCONNECT | USBDEVFS_CAP_MMAP |
2246 USBDEVFS_CAP_DROP_PRIVILEGES;
19181bc5
HG
2247 if (!ps->dev->bus->no_stop_on_short)
2248 caps |= USBDEVFS_CAP_BULK_CONTINUATION;
3d97ff63
HG
2249 if (ps->dev->bus->sg_tablesize)
2250 caps |= USBDEVFS_CAP_BULK_SCATTER_GATHER;
19181bc5
HG
2251
2252 if (put_user(caps, (__u32 __user *)arg))
2253 return -EFAULT;
2254
2255 return 0;
2256}
2257
9b6f0c4b 2258static int proc_disconnect_claim(struct usb_dev_state *ps, void __user *arg)
0837e7e5
HG
2259{
2260 struct usbdevfs_disconnect_claim dc;
2261 struct usb_interface *intf;
2262
2263 if (copy_from_user(&dc, arg, sizeof(dc)))
2264 return -EFAULT;
2265
2266 intf = usb_ifnum_to_if(ps->dev, dc.interface);
2267 if (!intf)
2268 return -EINVAL;
2269
2270 if (intf->dev.driver) {
2271 struct usb_driver *driver = to_usb_driver(intf->dev.driver);
2272
d883f52e
RG
2273 if (ps->privileges_dropped)
2274 return -EACCES;
2275
0837e7e5
HG
2276 if ((dc.flags & USBDEVFS_DISCONNECT_CLAIM_IF_DRIVER) &&
2277 strncmp(dc.driver, intf->dev.driver->name,
2278 sizeof(dc.driver)) != 0)
2279 return -EBUSY;
2280
2281 if ((dc.flags & USBDEVFS_DISCONNECT_CLAIM_EXCEPT_DRIVER) &&
2282 strncmp(dc.driver, intf->dev.driver->name,
2283 sizeof(dc.driver)) == 0)
2284 return -EBUSY;
2285
2286 dev_dbg(&intf->dev, "disconnect by usbfs\n");
2287 usb_driver_release_interface(driver, intf);
2288 }
2289
2290 return claimintf(ps, dc.interface);
2291}
2292
3e75c6de 2293static int proc_alloc_streams(struct usb_dev_state *ps, void __user *arg)
bcf7f6e3
HG
2294{
2295 unsigned num_streams, num_eps;
2296 struct usb_host_endpoint **eps;
2297 struct usb_interface *intf;
2298 int r;
2299
2300 r = parse_usbdevfs_streams(ps, arg, &num_streams, &num_eps,
2301 &eps, &intf);
2302 if (r)
2303 return r;
2304
2305 destroy_async_on_interface(ps,
2306 intf->altsetting[0].desc.bInterfaceNumber);
2307
2308 r = usb_alloc_streams(intf, eps, num_eps, num_streams, GFP_KERNEL);
2309 kfree(eps);
2310 return r;
2311}
2312
3e75c6de 2313static int proc_free_streams(struct usb_dev_state *ps, void __user *arg)
bcf7f6e3
HG
2314{
2315 unsigned num_eps;
2316 struct usb_host_endpoint **eps;
2317 struct usb_interface *intf;
2318 int r;
2319
2320 r = parse_usbdevfs_streams(ps, arg, NULL, &num_eps, &eps, &intf);
2321 if (r)
2322 return r;
2323
2324 destroy_async_on_interface(ps,
2325 intf->altsetting[0].desc.bInterfaceNumber);
2326
2327 r = usb_free_streams(intf, eps, num_eps, GFP_KERNEL);
2328 kfree(eps);
2329 return r;
2330}
2331
d883f52e
RG
2332static int proc_drop_privileges(struct usb_dev_state *ps, void __user *arg)
2333{
2334 u32 data;
2335
2336 if (copy_from_user(&data, arg, sizeof(data)))
2337 return -EFAULT;
2338
0f5e1558 2339 /* This is a one way operation. Once privileges are
d883f52e
RG
2340 * dropped, you cannot regain them. You may however reissue
2341 * this ioctl to shrink the allowed interfaces mask.
2342 */
2343 ps->interface_allowed_mask &= data;
2344 ps->privileges_dropped = true;
2345
2346 return 0;
2347}
2348
1da177e4
LT
2349/*
2350 * NOTE: All requests here that have interface numbers as parameters
2351 * are assuming that somehow the configuration has been prevented from
2352 * changing. But there's no mechanism to ensure that...
2353 */
637e8a60
AB
2354static long usbdev_do_ioctl(struct file *file, unsigned int cmd,
2355 void __user *p)
1da177e4 2356{
9b6f0c4b 2357 struct usb_dev_state *ps = file->private_data;
496ad9aa 2358 struct inode *inode = file_inode(file);
1da177e4 2359 struct usb_device *dev = ps->dev;
1da177e4
LT
2360 int ret = -ENOTTY;
2361
2362 if (!(file->f_mode & FMODE_WRITE))
2363 return -EPERM;
01412a21 2364
1da177e4 2365 usb_lock_device(dev);
3f2cee73
AS
2366
2367 /* Reap operations are allowed even after disconnection */
2368 switch (cmd) {
2369 case USBDEVFS_REAPURB:
2370 snoop(&dev->dev, "%s: REAPURB\n", __func__);
2371 ret = proc_reapurb(ps, p);
2372 goto done;
2373
2374 case USBDEVFS_REAPURBNDELAY:
2375 snoop(&dev->dev, "%s: REAPURBNDELAY\n", __func__);
2376 ret = proc_reapurbnonblock(ps, p);
2377 goto done;
2378
2379#ifdef CONFIG_COMPAT
2380 case USBDEVFS_REAPURB32:
2381 snoop(&dev->dev, "%s: REAPURB32\n", __func__);
2382 ret = proc_reapurb_compat(ps, p);
2383 goto done;
2384
2385 case USBDEVFS_REAPURBNDELAY32:
2386 snoop(&dev->dev, "%s: REAPURBNDELAY32\n", __func__);
2387 ret = proc_reapurbnonblock_compat(ps, p);
2388 goto done;
2389#endif
2390 }
2391
349710c3 2392 if (!connected(ps)) {
1da177e4
LT
2393 usb_unlock_device(dev);
2394 return -ENODEV;
2395 }
2396
2397 switch (cmd) {
2398 case USBDEVFS_CONTROL:
441b62c1 2399 snoop(&dev->dev, "%s: CONTROL\n", __func__);
1da177e4
LT
2400 ret = proc_control(ps, p);
2401 if (ret >= 0)
078cd827 2402 inode->i_mtime = current_time(inode);
1da177e4
LT
2403 break;
2404
2405 case USBDEVFS_BULK:
441b62c1 2406 snoop(&dev->dev, "%s: BULK\n", __func__);
1da177e4
LT
2407 ret = proc_bulk(ps, p);
2408 if (ret >= 0)
078cd827 2409 inode->i_mtime = current_time(inode);
1da177e4
LT
2410 break;
2411
2412 case USBDEVFS_RESETEP:
441b62c1 2413 snoop(&dev->dev, "%s: RESETEP\n", __func__);
1da177e4
LT
2414 ret = proc_resetep(ps, p);
2415 if (ret >= 0)
078cd827 2416 inode->i_mtime = current_time(inode);
1da177e4
LT
2417 break;
2418
2419 case USBDEVFS_RESET:
441b62c1 2420 snoop(&dev->dev, "%s: RESET\n", __func__);
1da177e4
LT
2421 ret = proc_resetdevice(ps);
2422 break;
2423
2424 case USBDEVFS_CLEAR_HALT:
441b62c1 2425 snoop(&dev->dev, "%s: CLEAR_HALT\n", __func__);
1da177e4
LT
2426 ret = proc_clearhalt(ps, p);
2427 if (ret >= 0)
078cd827 2428 inode->i_mtime = current_time(inode);
1da177e4
LT
2429 break;
2430
2431 case USBDEVFS_GETDRIVER:
441b62c1 2432 snoop(&dev->dev, "%s: GETDRIVER\n", __func__);
1da177e4
LT
2433 ret = proc_getdriver(ps, p);
2434 break;
2435
2436 case USBDEVFS_CONNECTINFO:
441b62c1 2437 snoop(&dev->dev, "%s: CONNECTINFO\n", __func__);
1da177e4
LT
2438 ret = proc_connectinfo(ps, p);
2439 break;
2440
2441 case USBDEVFS_SETINTERFACE:
441b62c1 2442 snoop(&dev->dev, "%s: SETINTERFACE\n", __func__);
1da177e4
LT
2443 ret = proc_setintf(ps, p);
2444 break;
2445
2446 case USBDEVFS_SETCONFIGURATION:
441b62c1 2447 snoop(&dev->dev, "%s: SETCONFIGURATION\n", __func__);
1da177e4
LT
2448 ret = proc_setconfig(ps, p);
2449 break;
2450
2451 case USBDEVFS_SUBMITURB:
441b62c1 2452 snoop(&dev->dev, "%s: SUBMITURB\n", __func__);
1da177e4
LT
2453 ret = proc_submiturb(ps, p);
2454 if (ret >= 0)
078cd827 2455 inode->i_mtime = current_time(inode);
1da177e4
LT
2456 break;
2457
2458#ifdef CONFIG_COMPAT
637e8a60
AB
2459 case USBDEVFS_CONTROL32:
2460 snoop(&dev->dev, "%s: CONTROL32\n", __func__);
2461 ret = proc_control_compat(ps, p);
2462 if (ret >= 0)
078cd827 2463 inode->i_mtime = current_time(inode);
637e8a60
AB
2464 break;
2465
2466 case USBDEVFS_BULK32:
2467 snoop(&dev->dev, "%s: BULK32\n", __func__);
2468 ret = proc_bulk_compat(ps, p);
2469 if (ret >= 0)
078cd827 2470 inode->i_mtime = current_time(inode);
637e8a60
AB
2471 break;
2472
2473 case USBDEVFS_DISCSIGNAL32:
2474 snoop(&dev->dev, "%s: DISCSIGNAL32\n", __func__);
2475 ret = proc_disconnectsignal_compat(ps, p);
2476 break;
1da177e4
LT
2477
2478 case USBDEVFS_SUBMITURB32:
441b62c1 2479 snoop(&dev->dev, "%s: SUBMITURB32\n", __func__);
1da177e4
LT
2480 ret = proc_submiturb_compat(ps, p);
2481 if (ret >= 0)
078cd827 2482 inode->i_mtime = current_time(inode);
1da177e4
LT
2483 break;
2484
c36fc889 2485 case USBDEVFS_IOCTL32:
637e8a60 2486 snoop(&dev->dev, "%s: IOCTL32\n", __func__);
c714de5d 2487 ret = proc_ioctl_compat(ps, ptr_to_compat(p));
c36fc889 2488 break;
1da177e4
LT
2489#endif
2490
2491 case USBDEVFS_DISCARDURB:
2f964780 2492 snoop(&dev->dev, "%s: DISCARDURB %pK\n", __func__, p);
1da177e4
LT
2493 ret = proc_unlinkurb(ps, p);
2494 break;
2495
1da177e4 2496 case USBDEVFS_DISCSIGNAL:
441b62c1 2497 snoop(&dev->dev, "%s: DISCSIGNAL\n", __func__);
1da177e4
LT
2498 ret = proc_disconnectsignal(ps, p);
2499 break;
2500
2501 case USBDEVFS_CLAIMINTERFACE:
441b62c1 2502 snoop(&dev->dev, "%s: CLAIMINTERFACE\n", __func__);
1da177e4
LT
2503 ret = proc_claiminterface(ps, p);
2504 break;
2505
2506 case USBDEVFS_RELEASEINTERFACE:
441b62c1 2507 snoop(&dev->dev, "%s: RELEASEINTERFACE\n", __func__);
1da177e4
LT
2508 ret = proc_releaseinterface(ps, p);
2509 break;
2510
2511 case USBDEVFS_IOCTL:
441b62c1 2512 snoop(&dev->dev, "%s: IOCTL\n", __func__);
c36fc889 2513 ret = proc_ioctl_default(ps, p);
1da177e4 2514 break;
7cbe5dca
AS
2515
2516 case USBDEVFS_CLAIM_PORT:
2517 snoop(&dev->dev, "%s: CLAIM_PORT\n", __func__);
2518 ret = proc_claim_port(ps, p);
2519 break;
2520
2521 case USBDEVFS_RELEASE_PORT:
2522 snoop(&dev->dev, "%s: RELEASE_PORT\n", __func__);
2523 ret = proc_release_port(ps, p);
2524 break;
19181bc5
HG
2525 case USBDEVFS_GET_CAPABILITIES:
2526 ret = proc_get_capabilities(ps, p);
2527 break;
0837e7e5
HG
2528 case USBDEVFS_DISCONNECT_CLAIM:
2529 ret = proc_disconnect_claim(ps, p);
2530 break;
bcf7f6e3
HG
2531 case USBDEVFS_ALLOC_STREAMS:
2532 ret = proc_alloc_streams(ps, p);
2533 break;
2534 case USBDEVFS_FREE_STREAMS:
2535 ret = proc_free_streams(ps, p);
2536 break;
d883f52e
RG
2537 case USBDEVFS_DROP_PRIVILEGES:
2538 ret = proc_drop_privileges(ps, p);
2539 break;
1da177e4 2540 }
3f2cee73
AS
2541
2542 done:
1da177e4
LT
2543 usb_unlock_device(dev);
2544 if (ret >= 0)
078cd827 2545 inode->i_atime = current_time(inode);
1da177e4
LT
2546 return ret;
2547}
2548
637e8a60
AB
2549static long usbdev_ioctl(struct file *file, unsigned int cmd,
2550 unsigned long arg)
2551{
2552 int ret;
2553
637e8a60 2554 ret = usbdev_do_ioctl(file, cmd, (void __user *)arg);
637e8a60
AB
2555
2556 return ret;
2557}
2558
2559#ifdef CONFIG_COMPAT
2560static long usbdev_compat_ioctl(struct file *file, unsigned int cmd,
2561 unsigned long arg)
2562{
2563 int ret;
2564
637e8a60 2565 ret = usbdev_do_ioctl(file, cmd, compat_ptr(arg));
637e8a60
AB
2566
2567 return ret;
2568}
2569#endif
2570
1da177e4 2571/* No kernel lock - fine */
04e482ff
GKH
2572static unsigned int usbdev_poll(struct file *file,
2573 struct poll_table_struct *wait)
1da177e4 2574{
9b6f0c4b 2575 struct usb_dev_state *ps = file->private_data;
ec17cf1c 2576 unsigned int mask = 0;
1da177e4
LT
2577
2578 poll_wait(file, &ps->wait, wait);
2579 if (file->f_mode & FMODE_WRITE && !list_empty(&ps->async_completed))
2580 mask |= POLLOUT | POLLWRNORM;
349710c3 2581 if (!connected(ps))
5cce4382
AS
2582 mask |= POLLHUP;
2583 if (list_empty(&ps->list))
2584 mask |= POLLERR;
1da177e4
LT
2585 return mask;
2586}
2587
9f8b17e6 2588const struct file_operations usbdev_file_operations = {
637e8a60 2589 .owner = THIS_MODULE,
b25472f9 2590 .llseek = no_seek_end_llseek,
637e8a60
AB
2591 .read = usbdev_read,
2592 .poll = usbdev_poll,
2593 .unlocked_ioctl = usbdev_ioctl,
2594#ifdef CONFIG_COMPAT
2595 .compat_ioctl = usbdev_compat_ioctl,
2596#endif
f7d34b44 2597 .mmap = usbdev_mmap,
637e8a60
AB
2598 .open = usbdev_open,
2599 .release = usbdev_release,
1da177e4 2600};
fbf82fd2 2601
501950d8 2602static void usbdev_remove(struct usb_device *udev)
cd9f0375 2603{
9b6f0c4b 2604 struct usb_dev_state *ps;
cd9f0375
AS
2605 struct siginfo sinfo;
2606
2607 while (!list_empty(&udev->filelist)) {
9b6f0c4b 2608 ps = list_entry(udev->filelist.next, struct usb_dev_state, list);
cd9f0375
AS
2609 destroy_all_async(ps);
2610 wake_up_all(&ps->wait);
2611 list_del_init(&ps->list);
2612 if (ps->discsignr) {
f0c2b681 2613 memset(&sinfo, 0, sizeof(sinfo));
cd9f0375
AS
2614 sinfo.si_signo = ps->discsignr;
2615 sinfo.si_errno = EPIPE;
2616 sinfo.si_code = SI_ASYNCIO;
2617 sinfo.si_addr = ps->disccontext;
d178bc3a
SH
2618 kill_pid_info_as_cred(ps->discsignr, &sinfo,
2619 ps->disc_pid, ps->cred, ps->secid);
cd9f0375
AS
2620 }
2621 }
2622}
2623
501950d8 2624static int usbdev_notify(struct notifier_block *self,
9f8b17e6 2625 unsigned long action, void *dev)
a7b986b3
GKH
2626{
2627 switch (action) {
2628 case USB_DEVICE_ADD:
a7b986b3
GKH
2629 break;
2630 case USB_DEVICE_REMOVE:
501950d8 2631 usbdev_remove(dev);
a7b986b3
GKH
2632 break;
2633 }
2634 return NOTIFY_OK;
2635}
2636
2637static struct notifier_block usbdev_nb = {
00fe52de 2638 .notifier_call = usbdev_notify,
a7b986b3
GKH
2639};
2640
7e7654a9 2641static struct cdev usb_device_cdev;
fbf82fd2 2642
9f8b17e6 2643int __init usb_devio_init(void)
fbf82fd2
KS
2644{
2645 int retval;
2646
fad21bdf 2647 retval = register_chrdev_region(USB_DEVICE_DEV, USB_DEVICE_MAX,
04e482ff 2648 "usb_device");
fbf82fd2 2649 if (retval) {
69a85942 2650 printk(KERN_ERR "Unable to register minors for usb_device\n");
fbf82fd2
KS
2651 goto out;
2652 }
9f8b17e6 2653 cdev_init(&usb_device_cdev, &usbdev_file_operations);
fad21bdf 2654 retval = cdev_add(&usb_device_cdev, USB_DEVICE_DEV, USB_DEVICE_MAX);
fbf82fd2 2655 if (retval) {
69a85942
GKH
2656 printk(KERN_ERR "Unable to get usb_device major %d\n",
2657 USB_DEVICE_MAJOR);
a7b986b3 2658 goto error_cdev;
fbf82fd2 2659 }
501950d8 2660 usb_register_notify(&usbdev_nb);
fbf82fd2
KS
2661out:
2662 return retval;
a7b986b3 2663
a7b986b3
GKH
2664error_cdev:
2665 unregister_chrdev_region(USB_DEVICE_DEV, USB_DEVICE_MAX);
2666 goto out;
fbf82fd2
KS
2667}
2668
9f8b17e6 2669void usb_devio_cleanup(void)
fbf82fd2 2670{
a7b986b3 2671 usb_unregister_notify(&usbdev_nb);
fbf82fd2 2672 cdev_del(&usb_device_cdev);
fad21bdf 2673 unregister_chrdev_region(USB_DEVICE_DEV, USB_DEVICE_MAX);
fbf82fd2 2674}