module_param: make bool parameters really bool (drivers & misc)
[GitHub/mt8127/android_kernel_alcatel_ttab.git] / drivers / usb / core / devio.c
CommitLineData
1da177e4
LT
1/*****************************************************************************/
2
3/*
4 * devio.c -- User space communication with USB devices.
5 *
6 * Copyright (C) 1999-2000 Thomas Sailer (sailer@ife.ee.ethz.ch)
7 *
8 * This program is free software; you can redistribute it and/or modify
9 * it under the terms of the GNU General Public License as published by
10 * the Free Software Foundation; either version 2 of the License, or
11 * (at your option) any later version.
12 *
13 * This program is distributed in the hope that it will be useful,
14 * but WITHOUT ANY WARRANTY; without even the implied warranty of
15 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
16 * GNU General Public License for more details.
17 *
18 * You should have received a copy of the GNU General Public License
19 * along with this program; if not, write to the Free Software
20 * Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA.
21 *
1da177e4
LT
22 * This file implements the usbfs/x/y files, where
23 * x is the bus number and y the device number.
24 *
25 * It allows user space programs/"drivers" to communicate directly
26 * with USB devices without intervening kernel driver.
27 *
28 * Revision history
29 * 22.12.1999 0.1 Initial release (split from proc_usb.c)
30 * 04.01.2000 0.2 Turned into its own filesystem
46113830
HW
31 * 30.09.2005 0.3 Fix user-triggerable oops in async URB delivery
32 * (CAN-2005-3055)
1da177e4
LT
33 */
34
35/*****************************************************************************/
36
37#include <linux/fs.h>
38#include <linux/mm.h>
39#include <linux/slab.h>
1da177e4
LT
40#include <linux/signal.h>
41#include <linux/poll.h>
42#include <linux/module.h>
43#include <linux/usb.h>
44#include <linux/usbdevice_fs.h>
27729aad 45#include <linux/usb/hcd.h> /* for usbcore internals */
fbf82fd2 46#include <linux/cdev.h>
a7b986b3 47#include <linux/notifier.h>
7a01955f 48#include <linux/security.h>
d178bc3a 49#include <linux/user_namespace.h>
1da177e4
LT
50#include <asm/uaccess.h>
51#include <asm/byteorder.h>
52#include <linux/moduleparam.h>
53
1da177e4
LT
54#include "usb.h"
55
fbf82fd2
KS
56#define USB_MAXBUS 64
57#define USB_DEVICE_MAX USB_MAXBUS * 128
fbf82fd2 58
4a2a8a2c
AS
59/* Mutual exclusion for removal, open, and release */
60DEFINE_MUTEX(usbfs_mutex);
61
cd9f0375
AS
62struct dev_state {
63 struct list_head list; /* state list */
64 struct usb_device *dev;
65 struct file *file;
66 spinlock_t lock; /* protects the async urb lists */
67 struct list_head async_pending;
68 struct list_head async_completed;
69 wait_queue_head_t wait; /* wake up if a request completed */
70 unsigned int discsignr;
71 struct pid *disc_pid;
d178bc3a 72 const struct cred *cred;
cd9f0375
AS
73 void __user *disccontext;
74 unsigned long ifclaimed;
75 u32 secid;
01c6460f 76 u32 disabled_bulk_eps;
cd9f0375
AS
77};
78
1da177e4
LT
79struct async {
80 struct list_head asynclist;
81 struct dev_state *ps;
2425c08b 82 struct pid *pid;
d178bc3a 83 const struct cred *cred;
1da177e4
LT
84 unsigned int signr;
85 unsigned int ifnum;
86 void __user *userbuffer;
87 void __user *userurb;
88 struct urb *urb;
add1aaea 89 unsigned int mem_usage;
e015268d 90 int status;
7a01955f 91 u32 secid;
01c6460f
AS
92 u8 bulk_addr;
93 u8 bulk_status;
1da177e4
LT
94};
95
90ab5ee9 96static bool usbfs_snoop;
04e482ff
GKH
97module_param(usbfs_snoop, bool, S_IRUGO | S_IWUSR);
98MODULE_PARM_DESC(usbfs_snoop, "true to log all usbfs traffic");
1da177e4
LT
99
100#define snoop(dev, format, arg...) \
101 do { \
102 if (usbfs_snoop) \
04e482ff 103 dev_info(dev , format , ## arg); \
1da177e4
LT
104 } while (0)
105
4c6e8971
AS
106enum snoop_when {
107 SUBMIT, COMPLETE
108};
fad21bdf 109
4c6e8971 110#define USB_DEVICE_DEV MKDEV(USB_DEVICE_MAJOR, 0)
1da177e4 111
add1aaea 112/* Limit on the total amount of memory we can allocate for transfers */
3f5eb8d5
AS
113static unsigned usbfs_memory_mb = 16;
114module_param(usbfs_memory_mb, uint, 0644);
115MODULE_PARM_DESC(usbfs_memory_mb,
116 "maximum MB allowed for usbfs buffers (0 = no limit)");
117
118/* Hard limit, necessary to avoid aithmetic overflow */
119#define USBFS_XFER_MAX (UINT_MAX / 2 - 1000000)
1da177e4 120
add1aaea
AS
121static atomic_t usbfs_memory_usage; /* Total memory currently allocated */
122
123/* Check whether it's okay to allocate more memory for a transfer */
124static int usbfs_increase_memory_usage(unsigned amount)
125{
3f5eb8d5
AS
126 unsigned lim;
127
128 /*
129 * Convert usbfs_memory_mb to bytes, avoiding overflows.
130 * 0 means use the hard limit (effectively unlimited).
131 */
132 lim = ACCESS_ONCE(usbfs_memory_mb);
133 if (lim == 0 || lim > (USBFS_XFER_MAX >> 20))
134 lim = USBFS_XFER_MAX;
135 else
136 lim <<= 20;
137
add1aaea 138 atomic_add(amount, &usbfs_memory_usage);
3f5eb8d5 139 if (atomic_read(&usbfs_memory_usage) <= lim)
add1aaea
AS
140 return 0;
141 atomic_sub(amount, &usbfs_memory_usage);
142 return -ENOMEM;
143}
144
145/* Memory for a transfer is being deallocated */
146static void usbfs_decrease_memory_usage(unsigned amount)
147{
148 atomic_sub(amount, &usbfs_memory_usage);
149}
4c6e8971 150
d34d9721 151static int connected(struct dev_state *ps)
1da177e4 152{
349710c3
AS
153 return (!list_empty(&ps->list) &&
154 ps->dev->state != USB_STATE_NOTATTACHED);
1da177e4
LT
155}
156
157static loff_t usbdev_lseek(struct file *file, loff_t offset, int orig)
158{
159 loff_t ret;
160
f9de332e 161 mutex_lock(&file->f_dentry->d_inode->i_mutex);
1da177e4
LT
162
163 switch (orig) {
164 case 0:
165 file->f_pos = offset;
166 ret = file->f_pos;
167 break;
168 case 1:
169 file->f_pos += offset;
170 ret = file->f_pos;
171 break;
172 case 2:
173 default:
174 ret = -EINVAL;
175 }
176
f9de332e 177 mutex_unlock(&file->f_dentry->d_inode->i_mutex);
1da177e4
LT
178 return ret;
179}
180
04e482ff
GKH
181static ssize_t usbdev_read(struct file *file, char __user *buf, size_t nbytes,
182 loff_t *ppos)
1da177e4 183{
ec17cf1c 184 struct dev_state *ps = file->private_data;
1da177e4
LT
185 struct usb_device *dev = ps->dev;
186 ssize_t ret = 0;
187 unsigned len;
188 loff_t pos;
189 int i;
190
191 pos = *ppos;
192 usb_lock_device(dev);
349710c3 193 if (!connected(ps)) {
1da177e4
LT
194 ret = -ENODEV;
195 goto err;
196 } else if (pos < 0) {
197 ret = -EINVAL;
198 goto err;
199 }
200
201 if (pos < sizeof(struct usb_device_descriptor)) {
04e482ff
GKH
202 /* 18 bytes - fits on the stack */
203 struct usb_device_descriptor temp_desc;
8781ba0a
ON
204
205 memcpy(&temp_desc, &dev->descriptor, sizeof(dev->descriptor));
9fcd5c32
AM
206 le16_to_cpus(&temp_desc.bcdUSB);
207 le16_to_cpus(&temp_desc.idVendor);
208 le16_to_cpus(&temp_desc.idProduct);
209 le16_to_cpus(&temp_desc.bcdDevice);
1da177e4
LT
210
211 len = sizeof(struct usb_device_descriptor) - pos;
212 if (len > nbytes)
213 len = nbytes;
8781ba0a 214 if (copy_to_user(buf, ((char *)&temp_desc) + pos, len)) {
1da177e4
LT
215 ret = -EFAULT;
216 goto err;
217 }
1da177e4
LT
218
219 *ppos += len;
220 buf += len;
221 nbytes -= len;
222 ret += len;
223 }
224
225 pos = sizeof(struct usb_device_descriptor);
226 for (i = 0; nbytes && i < dev->descriptor.bNumConfigurations; i++) {
227 struct usb_config_descriptor *config =
228 (struct usb_config_descriptor *)dev->rawdescriptors[i];
229 unsigned int length = le16_to_cpu(config->wTotalLength);
230
231 if (*ppos < pos + length) {
232
233 /* The descriptor may claim to be longer than it
234 * really is. Here is the actual allocated length. */
235 unsigned alloclen =
236 le16_to_cpu(dev->config[i].desc.wTotalLength);
237
238 len = length - (*ppos - pos);
239 if (len > nbytes)
240 len = nbytes;
241
242 /* Simply don't write (skip over) unallocated parts */
243 if (alloclen > (*ppos - pos)) {
244 alloclen -= (*ppos - pos);
245 if (copy_to_user(buf,
246 dev->rawdescriptors[i] + (*ppos - pos),
247 min(len, alloclen))) {
248 ret = -EFAULT;
249 goto err;
250 }
251 }
252
253 *ppos += len;
254 buf += len;
255 nbytes -= len;
256 ret += len;
257 }
258
259 pos += length;
260 }
261
262err:
263 usb_unlock_device(dev);
264 return ret;
265}
266
267/*
268 * async list handling
269 */
270
271static struct async *alloc_async(unsigned int numisoframes)
272{
dd95b814 273 struct async *as;
0a1ef3b5 274
dd95b814 275 as = kzalloc(sizeof(struct async), GFP_KERNEL);
04e482ff
GKH
276 if (!as)
277 return NULL;
1da177e4
LT
278 as->urb = usb_alloc_urb(numisoframes, GFP_KERNEL);
279 if (!as->urb) {
280 kfree(as);
281 return NULL;
282 }
04e482ff 283 return as;
1da177e4
LT
284}
285
286static void free_async(struct async *as)
287{
2425c08b 288 put_pid(as->pid);
1b41c832
SS
289 if (as->cred)
290 put_cred(as->cred);
6fd19f4b
JJ
291 kfree(as->urb->transfer_buffer);
292 kfree(as->urb->setup_packet);
1da177e4 293 usb_free_urb(as->urb);
add1aaea 294 usbfs_decrease_memory_usage(as->mem_usage);
6fd19f4b 295 kfree(as);
1da177e4
LT
296}
297
d34d9721 298static void async_newpending(struct async *as)
1da177e4 299{
04e482ff
GKH
300 struct dev_state *ps = as->ps;
301 unsigned long flags;
302
303 spin_lock_irqsave(&ps->lock, flags);
304 list_add_tail(&as->asynclist, &ps->async_pending);
305 spin_unlock_irqrestore(&ps->lock, flags);
1da177e4
LT
306}
307
d34d9721 308static void async_removepending(struct async *as)
1da177e4 309{
04e482ff
GKH
310 struct dev_state *ps = as->ps;
311 unsigned long flags;
312
313 spin_lock_irqsave(&ps->lock, flags);
314 list_del_init(&as->asynclist);
315 spin_unlock_irqrestore(&ps->lock, flags);
1da177e4
LT
316}
317
d34d9721 318static struct async *async_getcompleted(struct dev_state *ps)
1da177e4 319{
04e482ff
GKH
320 unsigned long flags;
321 struct async *as = NULL;
322
323 spin_lock_irqsave(&ps->lock, flags);
324 if (!list_empty(&ps->async_completed)) {
325 as = list_entry(ps->async_completed.next, struct async,
326 asynclist);
327 list_del_init(&as->asynclist);
328 }
329 spin_unlock_irqrestore(&ps->lock, flags);
330 return as;
1da177e4
LT
331}
332
d34d9721 333static struct async *async_getpending(struct dev_state *ps,
04e482ff 334 void __user *userurb)
1da177e4 335{
04e482ff
GKH
336 unsigned long flags;
337 struct async *as;
1da177e4 338
04e482ff 339 spin_lock_irqsave(&ps->lock, flags);
1da177e4
LT
340 list_for_each_entry(as, &ps->async_pending, asynclist)
341 if (as->userurb == userurb) {
342 list_del_init(&as->asynclist);
343 spin_unlock_irqrestore(&ps->lock, flags);
344 return as;
345 }
04e482ff
GKH
346 spin_unlock_irqrestore(&ps->lock, flags);
347 return NULL;
1da177e4
LT
348}
349
4c6e8971
AS
350static void snoop_urb(struct usb_device *udev,
351 void __user *userurb, int pipe, unsigned length,
0880aef4
CF
352 int timeout_or_status, enum snoop_when when,
353 unsigned char *data, unsigned data_len)
e639dd3f 354{
4c6e8971
AS
355 static const char *types[] = {"isoc", "int", "ctrl", "bulk"};
356 static const char *dirs[] = {"out", "in"};
357 int ep;
358 const char *t, *d;
e639dd3f
GKH
359
360 if (!usbfs_snoop)
361 return;
362
4c6e8971
AS
363 ep = usb_pipeendpoint(pipe);
364 t = types[usb_pipetype(pipe)];
365 d = dirs[!!usb_pipein(pipe)];
366
367 if (userurb) { /* Async */
368 if (when == SUBMIT)
369 dev_info(&udev->dev, "userurb %p, ep%d %s-%s, "
370 "length %u\n",
371 userurb, ep, t, d, length);
372 else
373 dev_info(&udev->dev, "userurb %p, ep%d %s-%s, "
374 "actual_length %u status %d\n",
375 userurb, ep, t, d, length,
376 timeout_or_status);
377 } else {
378 if (when == SUBMIT)
379 dev_info(&udev->dev, "ep%d %s-%s, length %u, "
380 "timeout %d\n",
381 ep, t, d, length, timeout_or_status);
382 else
383 dev_info(&udev->dev, "ep%d %s-%s, actual_length %u, "
384 "status %d\n",
385 ep, t, d, length, timeout_or_status);
386 }
0880aef4
CF
387
388 if (data && data_len > 0) {
389 print_hex_dump(KERN_DEBUG, "data: ", DUMP_PREFIX_NONE, 32, 1,
390 data, data_len, 1);
391 }
e639dd3f
GKH
392}
393
01c6460f
AS
394#define AS_CONTINUATION 1
395#define AS_UNLINK 2
396
397static void cancel_bulk_urbs(struct dev_state *ps, unsigned bulk_addr)
398__releases(ps->lock)
399__acquires(ps->lock)
400{
401 struct async *as;
402
403 /* Mark all the pending URBs that match bulk_addr, up to but not
404 * including the first one without AS_CONTINUATION. If such an
405 * URB is encountered then a new transfer has already started so
406 * the endpoint doesn't need to be disabled; otherwise it does.
407 */
408 list_for_each_entry(as, &ps->async_pending, asynclist) {
409 if (as->bulk_addr == bulk_addr) {
410 if (as->bulk_status != AS_CONTINUATION)
411 goto rescan;
412 as->bulk_status = AS_UNLINK;
413 as->bulk_addr = 0;
414 }
415 }
416 ps->disabled_bulk_eps |= (1 << bulk_addr);
417
418 /* Now carefully unlink all the marked pending URBs */
419 rescan:
420 list_for_each_entry(as, &ps->async_pending, asynclist) {
421 if (as->bulk_status == AS_UNLINK) {
422 as->bulk_status = 0; /* Only once */
423 spin_unlock(&ps->lock); /* Allow completions */
424 usb_unlink_urb(as->urb);
425 spin_lock(&ps->lock);
426 goto rescan;
427 }
428 }
429}
430
7d12e780 431static void async_completed(struct urb *urb)
1da177e4 432{
04e482ff
GKH
433 struct async *as = urb->context;
434 struct dev_state *ps = as->ps;
1da177e4 435 struct siginfo sinfo;
516a1a07 436 struct pid *pid = NULL;
516a1a07 437 u32 secid = 0;
d178bc3a 438 const struct cred *cred = NULL;
516a1a07 439 int signr;
1da177e4 440
04e482ff
GKH
441 spin_lock(&ps->lock);
442 list_move_tail(&as->asynclist, &ps->async_completed);
e015268d 443 as->status = urb->status;
516a1a07
ON
444 signr = as->signr;
445 if (signr) {
1da177e4 446 sinfo.si_signo = as->signr;
e015268d 447 sinfo.si_errno = as->status;
1da177e4
LT
448 sinfo.si_code = SI_ASYNCIO;
449 sinfo.si_addr = as->userurb;
aec01c58 450 pid = get_pid(as->pid);
d178bc3a 451 cred = get_cred(as->cred);
516a1a07 452 secid = as->secid;
1da177e4 453 }
e639dd3f 454 snoop(&urb->dev->dev, "urb complete\n");
4c6e8971 455 snoop_urb(urb->dev, as->userurb, urb->pipe, urb->actual_length,
0880aef4
CF
456 as->status, COMPLETE,
457 ((urb->transfer_flags & URB_DIR_MASK) == USB_DIR_OUT) ?
458 NULL : urb->transfer_buffer, urb->actual_length);
01c6460f
AS
459 if (as->status < 0 && as->bulk_addr && as->status != -ECONNRESET &&
460 as->status != -ENOENT)
461 cancel_bulk_urbs(ps, as->bulk_addr);
516a1a07
ON
462 spin_unlock(&ps->lock);
463
aec01c58 464 if (signr) {
d178bc3a 465 kill_pid_info_as_cred(sinfo.si_signo, &sinfo, pid, cred, secid);
aec01c58 466 put_pid(pid);
d178bc3a 467 put_cred(cred);
aec01c58 468 }
516a1a07 469
e639dd3f 470 wake_up(&ps->wait);
1da177e4
LT
471}
472
04e482ff 473static void destroy_async(struct dev_state *ps, struct list_head *list)
1da177e4
LT
474{
475 struct async *as;
476 unsigned long flags;
477
478 spin_lock_irqsave(&ps->lock, flags);
479 while (!list_empty(list)) {
480 as = list_entry(list->next, struct async, asynclist);
481 list_del_init(&as->asynclist);
482
483 /* drop the spinlock so the completion handler can run */
484 spin_unlock_irqrestore(&ps->lock, flags);
485 usb_kill_urb(as->urb);
486 spin_lock_irqsave(&ps->lock, flags);
487 }
488 spin_unlock_irqrestore(&ps->lock, flags);
1da177e4
LT
489}
490
04e482ff
GKH
491static void destroy_async_on_interface(struct dev_state *ps,
492 unsigned int ifnum)
1da177e4
LT
493{
494 struct list_head *p, *q, hitlist;
495 unsigned long flags;
496
497 INIT_LIST_HEAD(&hitlist);
498 spin_lock_irqsave(&ps->lock, flags);
499 list_for_each_safe(p, q, &ps->async_pending)
500 if (ifnum == list_entry(p, struct async, asynclist)->ifnum)
501 list_move_tail(p, &hitlist);
502 spin_unlock_irqrestore(&ps->lock, flags);
503 destroy_async(ps, &hitlist);
504}
505
d34d9721 506static void destroy_all_async(struct dev_state *ps)
1da177e4 507{
04e482ff 508 destroy_async(ps, &ps->async_pending);
1da177e4
LT
509}
510
511/*
512 * interface claims are made only at the request of user level code,
513 * which can also release them (explicitly or by closing files).
514 * they're also undone when devices disconnect.
515 */
516
04e482ff
GKH
517static int driver_probe(struct usb_interface *intf,
518 const struct usb_device_id *id)
1da177e4
LT
519{
520 return -ENODEV;
521}
522
523static void driver_disconnect(struct usb_interface *intf)
524{
04e482ff 525 struct dev_state *ps = usb_get_intfdata(intf);
1da177e4
LT
526 unsigned int ifnum = intf->altsetting->desc.bInterfaceNumber;
527
528 if (!ps)
529 return;
530
531 /* NOTE: this relies on usbcore having canceled and completed
532 * all pending I/O requests; 2.6 does that.
533 */
534
535 if (likely(ifnum < 8*sizeof(ps->ifclaimed)))
536 clear_bit(ifnum, &ps->ifclaimed);
537 else
3b6004f3
GKH
538 dev_warn(&intf->dev, "interface number %u out of range\n",
539 ifnum);
1da177e4 540
04e482ff 541 usb_set_intfdata(intf, NULL);
1da177e4
LT
542
543 /* force async requests to complete */
544 destroy_async_on_interface(ps, ifnum);
545}
546
2e2eb83f
AS
547/* The following routines are merely placeholders. There is no way
548 * to inform a user task about suspend or resumes.
549 */
550static int driver_suspend(struct usb_interface *intf, pm_message_t msg)
551{
552 return 0;
553}
554
555static int driver_resume(struct usb_interface *intf)
556{
557 return 0;
558}
559
1da177e4 560struct usb_driver usbfs_driver = {
1da177e4
LT
561 .name = "usbfs",
562 .probe = driver_probe,
563 .disconnect = driver_disconnect,
2e2eb83f
AS
564 .suspend = driver_suspend,
565 .resume = driver_resume,
1da177e4
LT
566};
567
568static int claimintf(struct dev_state *ps, unsigned int ifnum)
569{
570 struct usb_device *dev = ps->dev;
571 struct usb_interface *intf;
572 int err;
573
574 if (ifnum >= 8*sizeof(ps->ifclaimed))
575 return -EINVAL;
576 /* already claimed */
577 if (test_bit(ifnum, &ps->ifclaimed))
578 return 0;
579
1da177e4
LT
580 intf = usb_ifnum_to_if(dev, ifnum);
581 if (!intf)
582 err = -ENOENT;
583 else
584 err = usb_driver_claim_interface(&usbfs_driver, intf, ps);
1da177e4
LT
585 if (err == 0)
586 set_bit(ifnum, &ps->ifclaimed);
587 return err;
588}
589
590static int releaseintf(struct dev_state *ps, unsigned int ifnum)
591{
592 struct usb_device *dev;
593 struct usb_interface *intf;
594 int err;
595
596 err = -EINVAL;
597 if (ifnum >= 8*sizeof(ps->ifclaimed))
598 return err;
599 dev = ps->dev;
1da177e4
LT
600 intf = usb_ifnum_to_if(dev, ifnum);
601 if (!intf)
602 err = -ENOENT;
603 else if (test_and_clear_bit(ifnum, &ps->ifclaimed)) {
604 usb_driver_release_interface(&usbfs_driver, intf);
605 err = 0;
606 }
1da177e4
LT
607 return err;
608}
609
610static int checkintf(struct dev_state *ps, unsigned int ifnum)
611{
612 if (ps->dev->state != USB_STATE_CONFIGURED)
613 return -EHOSTUNREACH;
614 if (ifnum >= 8*sizeof(ps->ifclaimed))
615 return -EINVAL;
616 if (test_bit(ifnum, &ps->ifclaimed))
617 return 0;
618 /* if not yet claimed, claim it for the driver */
04e482ff
GKH
619 dev_warn(&ps->dev->dev, "usbfs: process %d (%s) did not claim "
620 "interface %u before use\n", task_pid_nr(current),
621 current->comm, ifnum);
1da177e4
LT
622 return claimintf(ps, ifnum);
623}
624
625static int findintfep(struct usb_device *dev, unsigned int ep)
626{
627 unsigned int i, j, e;
04e482ff 628 struct usb_interface *intf;
1da177e4
LT
629 struct usb_host_interface *alts;
630 struct usb_endpoint_descriptor *endpt;
631
632 if (ep & ~(USB_DIR_IN|0xf))
633 return -EINVAL;
634 if (!dev->actconfig)
635 return -ESRCH;
636 for (i = 0; i < dev->actconfig->desc.bNumInterfaces; i++) {
637 intf = dev->actconfig->interface[i];
638 for (j = 0; j < intf->num_altsetting; j++) {
04e482ff 639 alts = &intf->altsetting[j];
1da177e4
LT
640 for (e = 0; e < alts->desc.bNumEndpoints; e++) {
641 endpt = &alts->endpoint[e].desc;
642 if (endpt->bEndpointAddress == ep)
643 return alts->desc.bInterfaceNumber;
644 }
645 }
646 }
04e482ff 647 return -ENOENT;
1da177e4
LT
648}
649
04e482ff 650static int check_ctrlrecip(struct dev_state *ps, unsigned int requesttype,
393cbb51 651 unsigned int request, unsigned int index)
1da177e4
LT
652{
653 int ret = 0;
393cbb51 654 struct usb_host_interface *alt_setting;
1da177e4 655
6da9c990
DV
656 if (ps->dev->state != USB_STATE_UNAUTHENTICATED
657 && ps->dev->state != USB_STATE_ADDRESS
24f8b116 658 && ps->dev->state != USB_STATE_CONFIGURED)
1da177e4
LT
659 return -EHOSTUNREACH;
660 if (USB_TYPE_VENDOR == (USB_TYPE_MASK & requesttype))
661 return 0;
662
393cbb51
MD
663 /*
664 * check for the special corner case 'get_device_id' in the printer
665 * class specification, where wIndex is (interface << 8 | altsetting)
666 * instead of just interface
667 */
668 if (requesttype == 0xa1 && request == 0) {
669 alt_setting = usb_find_alt_setting(ps->dev->actconfig,
670 index >> 8, index & 0xff);
671 if (alt_setting
672 && alt_setting->desc.bInterfaceClass == USB_CLASS_PRINTER)
673 index >>= 8;
674 }
675
1da177e4
LT
676 index &= 0xff;
677 switch (requesttype & USB_RECIP_MASK) {
678 case USB_RECIP_ENDPOINT:
04e482ff
GKH
679 ret = findintfep(ps->dev, index);
680 if (ret >= 0)
1da177e4
LT
681 ret = checkintf(ps, ret);
682 break;
683
684 case USB_RECIP_INTERFACE:
685 ret = checkintf(ps, index);
686 break;
687 }
688 return ret;
689}
690
61ad04a8 691static int match_devt(struct device *dev, void *data)
4592bf5a 692{
a80d5ff0 693 return dev->devt == (dev_t) (unsigned long) data;
9f8b17e6 694}
4592bf5a 695
61ad04a8 696static struct usb_device *usbdev_lookup_by_devt(dev_t devt)
9f8b17e6
KS
697{
698 struct device *dev;
699
a80d5ff0
DH
700 dev = bus_find_device(&usb_bus_type, NULL,
701 (void *) (unsigned long) devt, match_devt);
9f8b17e6
KS
702 if (!dev)
703 return NULL;
9f8b17e6
KS
704 return container_of(dev, struct usb_device, dev);
705}
4592bf5a 706
1da177e4
LT
707/*
708 * file operations
709 */
710static int usbdev_open(struct inode *inode, struct file *file)
711{
fbf82fd2 712 struct usb_device *dev = NULL;
1da177e4
LT
713 struct dev_state *ps;
714 int ret;
715
1da177e4 716 ret = -ENOMEM;
04e482ff
GKH
717 ps = kmalloc(sizeof(struct dev_state), GFP_KERNEL);
718 if (!ps)
62e299e6 719 goto out_free_ps;
1da177e4 720
01105a24 721 ret = -ENODEV;
61ad04a8 722
62e299e6
AS
723 /* Protect against simultaneous removal or release */
724 mutex_lock(&usbfs_mutex);
725
9f8b17e6 726 /* usbdev device-node */
fbf82fd2 727 if (imajor(inode) == USB_DEVICE_MAJOR)
61ad04a8 728 dev = usbdev_lookup_by_devt(inode->i_rdev);
62e299e6 729
9f8b17e6
KS
730#ifdef CONFIG_USB_DEVICEFS
731 /* procfs file */
d64aac36 732 if (!dev) {
8e18e294 733 dev = inode->i_private;
d64aac36
AS
734 if (dev && dev->usbfs_dentry &&
735 dev->usbfs_dentry->d_inode == inode)
736 usb_get_dev(dev);
737 else
738 dev = NULL;
739 }
9f8b17e6 740#endif
62e299e6
AS
741 mutex_unlock(&usbfs_mutex);
742
743 if (!dev)
744 goto out_free_ps;
745
746 usb_lock_device(dev);
747 if (dev->state == USB_STATE_NOTATTACHED)
748 goto out_unlock_device;
749
94fcda1f 750 ret = usb_autoresume_device(dev);
01d883d4 751 if (ret)
62e299e6 752 goto out_unlock_device;
01d883d4 753
1da177e4
LT
754 ps->dev = dev;
755 ps->file = file;
756 spin_lock_init(&ps->lock);
316547fd 757 INIT_LIST_HEAD(&ps->list);
1da177e4
LT
758 INIT_LIST_HEAD(&ps->async_pending);
759 INIT_LIST_HEAD(&ps->async_completed);
760 init_waitqueue_head(&ps->wait);
761 ps->discsignr = 0;
2425c08b 762 ps->disc_pid = get_pid(task_pid(current));
d178bc3a 763 ps->cred = get_current_cred();
1da177e4
LT
764 ps->disccontext = NULL;
765 ps->ifclaimed = 0;
7a01955f 766 security_task_getsecid(current, &ps->secid);
527660a8 767 smp_wmb();
1da177e4
LT
768 list_add_tail(&ps->list, &dev->filelist);
769 file->private_data = ps;
62e299e6 770 usb_unlock_device(dev);
2da41d5f
AS
771 snoop(&dev->dev, "opened by process %d: %s\n", task_pid_nr(current),
772 current->comm);
62e299e6
AS
773 return ret;
774
775 out_unlock_device:
776 usb_unlock_device(dev);
777 usb_put_dev(dev);
778 out_free_ps:
779 kfree(ps);
4a2a8a2c 780 return ret;
1da177e4
LT
781}
782
783static int usbdev_release(struct inode *inode, struct file *file)
784{
ec17cf1c 785 struct dev_state *ps = file->private_data;
1da177e4
LT
786 struct usb_device *dev = ps->dev;
787 unsigned int ifnum;
6ff10464 788 struct async *as;
1da177e4
LT
789
790 usb_lock_device(dev);
7cbe5dca 791 usb_hub_release_all_ports(dev, ps);
4a2a8a2c 792
1da177e4 793 list_del_init(&ps->list);
4a2a8a2c 794
1da177e4
LT
795 for (ifnum = 0; ps->ifclaimed && ifnum < 8*sizeof(ps->ifclaimed);
796 ifnum++) {
797 if (test_bit(ifnum, &ps->ifclaimed))
798 releaseintf(ps, ifnum);
799 }
800 destroy_all_async(ps);
94fcda1f 801 usb_autosuspend_device(dev);
1da177e4
LT
802 usb_unlock_device(dev);
803 usb_put_dev(dev);
2425c08b 804 put_pid(ps->disc_pid);
d178bc3a 805 put_cred(ps->cred);
6ff10464
AS
806
807 as = async_getcompleted(ps);
808 while (as) {
809 free_async(as);
810 as = async_getcompleted(ps);
811 }
1da177e4 812 kfree(ps);
4a2a8a2c 813 return 0;
1da177e4
LT
814}
815
816static int proc_control(struct dev_state *ps, void __user *arg)
817{
818 struct usb_device *dev = ps->dev;
819 struct usbdevfs_ctrltransfer ctrl;
820 unsigned int tmo;
821 unsigned char *tbuf;
ff66e3ce 822 unsigned wLength;
4c6e8971 823 int i, pipe, ret;
1da177e4
LT
824
825 if (copy_from_user(&ctrl, arg, sizeof(ctrl)))
826 return -EFAULT;
393cbb51
MD
827 ret = check_ctrlrecip(ps, ctrl.bRequestType, ctrl.bRequest,
828 ctrl.wIndex);
04e482ff 829 if (ret)
1da177e4 830 return ret;
ff66e3ce
AM
831 wLength = ctrl.wLength; /* To suppress 64k PAGE_SIZE warning */
832 if (wLength > PAGE_SIZE)
1da177e4 833 return -EINVAL;
add1aaea
AS
834 ret = usbfs_increase_memory_usage(PAGE_SIZE + sizeof(struct urb) +
835 sizeof(struct usb_ctrlrequest));
836 if (ret)
837 return ret;
04e482ff 838 tbuf = (unsigned char *)__get_free_page(GFP_KERNEL);
add1aaea
AS
839 if (!tbuf) {
840 ret = -ENOMEM;
841 goto done;
842 }
1da177e4 843 tmo = ctrl.timeout;
0880aef4
CF
844 snoop(&dev->dev, "control urb: bRequestType=%02x "
845 "bRequest=%02x wValue=%04x "
846 "wIndex=%04x wLength=%04x\n",
847 ctrl.bRequestType, ctrl.bRequest,
848 __le16_to_cpup(&ctrl.wValue),
849 __le16_to_cpup(&ctrl.wIndex),
850 __le16_to_cpup(&ctrl.wLength));
1da177e4 851 if (ctrl.bRequestType & 0x80) {
04e482ff
GKH
852 if (ctrl.wLength && !access_ok(VERIFY_WRITE, ctrl.data,
853 ctrl.wLength)) {
52fb743d
AS
854 ret = -EINVAL;
855 goto done;
1da177e4 856 }
4c6e8971 857 pipe = usb_rcvctrlpipe(dev, 0);
0880aef4 858 snoop_urb(dev, NULL, pipe, ctrl.wLength, tmo, SUBMIT, NULL, 0);
1da177e4
LT
859
860 usb_unlock_device(dev);
4c6e8971 861 i = usb_control_msg(dev, pipe, ctrl.bRequest,
04e482ff
GKH
862 ctrl.bRequestType, ctrl.wValue, ctrl.wIndex,
863 tbuf, ctrl.wLength, tmo);
1da177e4 864 usb_lock_device(dev);
0880aef4 865 snoop_urb(dev, NULL, pipe, max(i, 0), min(i, 0), COMPLETE,
9d02b426 866 tbuf, max(i, 0));
1da177e4 867 if ((i > 0) && ctrl.wLength) {
fe0410c7 868 if (copy_to_user(ctrl.data, tbuf, i)) {
52fb743d
AS
869 ret = -EFAULT;
870 goto done;
1da177e4
LT
871 }
872 }
873 } else {
874 if (ctrl.wLength) {
875 if (copy_from_user(tbuf, ctrl.data, ctrl.wLength)) {
52fb743d
AS
876 ret = -EFAULT;
877 goto done;
1da177e4
LT
878 }
879 }
4c6e8971 880 pipe = usb_sndctrlpipe(dev, 0);
0880aef4
CF
881 snoop_urb(dev, NULL, pipe, ctrl.wLength, tmo, SUBMIT,
882 tbuf, ctrl.wLength);
4c6e8971 883
1da177e4 884 usb_unlock_device(dev);
04e482ff
GKH
885 i = usb_control_msg(dev, usb_sndctrlpipe(dev, 0), ctrl.bRequest,
886 ctrl.bRequestType, ctrl.wValue, ctrl.wIndex,
887 tbuf, ctrl.wLength, tmo);
1da177e4 888 usb_lock_device(dev);
0880aef4 889 snoop_urb(dev, NULL, pipe, max(i, 0), min(i, 0), COMPLETE, NULL, 0);
1da177e4 890 }
04e482ff 891 if (i < 0 && i != -EPIPE) {
1da177e4
LT
892 dev_printk(KERN_DEBUG, &dev->dev, "usbfs: USBDEVFS_CONTROL "
893 "failed cmd %s rqt %u rq %u len %u ret %d\n",
894 current->comm, ctrl.bRequestType, ctrl.bRequest,
895 ctrl.wLength, i);
896 }
52fb743d
AS
897 ret = i;
898 done:
899 free_page((unsigned long) tbuf);
add1aaea
AS
900 usbfs_decrease_memory_usage(PAGE_SIZE + sizeof(struct urb) +
901 sizeof(struct usb_ctrlrequest));
52fb743d 902 return ret;
1da177e4
LT
903}
904
905static int proc_bulk(struct dev_state *ps, void __user *arg)
906{
907 struct usb_device *dev = ps->dev;
908 struct usbdevfs_bulktransfer bulk;
909 unsigned int tmo, len1, pipe;
910 int len2;
911 unsigned char *tbuf;
4c6e8971 912 int i, ret;
1da177e4
LT
913
914 if (copy_from_user(&bulk, arg, sizeof(bulk)))
915 return -EFAULT;
04e482ff
GKH
916 ret = findintfep(ps->dev, bulk.ep);
917 if (ret < 0)
1da177e4 918 return ret;
04e482ff
GKH
919 ret = checkintf(ps, ret);
920 if (ret)
1da177e4
LT
921 return ret;
922 if (bulk.ep & USB_DIR_IN)
923 pipe = usb_rcvbulkpipe(dev, bulk.ep & 0x7f);
924 else
925 pipe = usb_sndbulkpipe(dev, bulk.ep & 0x7f);
926 if (!usb_maxpacket(dev, pipe, !(bulk.ep & USB_DIR_IN)))
927 return -EINVAL;
928 len1 = bulk.len;
3f5eb8d5 929 if (len1 >= USBFS_XFER_MAX)
1da177e4 930 return -EINVAL;
add1aaea
AS
931 ret = usbfs_increase_memory_usage(len1 + sizeof(struct urb));
932 if (ret)
933 return ret;
934 if (!(tbuf = kmalloc(len1, GFP_KERNEL))) {
935 ret = -ENOMEM;
936 goto done;
937 }
1da177e4
LT
938 tmo = bulk.timeout;
939 if (bulk.ep & 0x80) {
940 if (len1 && !access_ok(VERIFY_WRITE, bulk.data, len1)) {
52fb743d
AS
941 ret = -EINVAL;
942 goto done;
1da177e4 943 }
0880aef4 944 snoop_urb(dev, NULL, pipe, len1, tmo, SUBMIT, NULL, 0);
4c6e8971 945
1da177e4
LT
946 usb_unlock_device(dev);
947 i = usb_bulk_msg(dev, pipe, tbuf, len1, &len2, tmo);
948 usb_lock_device(dev);
0880aef4 949 snoop_urb(dev, NULL, pipe, len2, i, COMPLETE, tbuf, len2);
4c6e8971 950
1da177e4
LT
951 if (!i && len2) {
952 if (copy_to_user(bulk.data, tbuf, len2)) {
52fb743d
AS
953 ret = -EFAULT;
954 goto done;
1da177e4
LT
955 }
956 }
957 } else {
958 if (len1) {
959 if (copy_from_user(tbuf, bulk.data, len1)) {
52fb743d
AS
960 ret = -EFAULT;
961 goto done;
1da177e4
LT
962 }
963 }
0880aef4 964 snoop_urb(dev, NULL, pipe, len1, tmo, SUBMIT, tbuf, len1);
4c6e8971 965
1da177e4
LT
966 usb_unlock_device(dev);
967 i = usb_bulk_msg(dev, pipe, tbuf, len1, &len2, tmo);
968 usb_lock_device(dev);
0880aef4 969 snoop_urb(dev, NULL, pipe, len2, i, COMPLETE, NULL, 0);
1da177e4 970 }
52fb743d
AS
971 ret = (i < 0 ? i : len2);
972 done:
1da177e4 973 kfree(tbuf);
add1aaea 974 usbfs_decrease_memory_usage(len1 + sizeof(struct urb));
52fb743d 975 return ret;
1da177e4
LT
976}
977
978static int proc_resetep(struct dev_state *ps, void __user *arg)
979{
980 unsigned int ep;
981 int ret;
982
983 if (get_user(ep, (unsigned int __user *)arg))
984 return -EFAULT;
04e482ff
GKH
985 ret = findintfep(ps->dev, ep);
986 if (ret < 0)
1da177e4 987 return ret;
04e482ff
GKH
988 ret = checkintf(ps, ret);
989 if (ret)
1da177e4 990 return ret;
3444b26a 991 usb_reset_endpoint(ps->dev, ep);
1da177e4
LT
992 return 0;
993}
994
995static int proc_clearhalt(struct dev_state *ps, void __user *arg)
996{
997 unsigned int ep;
998 int pipe;
999 int ret;
1000
1001 if (get_user(ep, (unsigned int __user *)arg))
1002 return -EFAULT;
04e482ff
GKH
1003 ret = findintfep(ps->dev, ep);
1004 if (ret < 0)
1da177e4 1005 return ret;
04e482ff
GKH
1006 ret = checkintf(ps, ret);
1007 if (ret)
1da177e4
LT
1008 return ret;
1009 if (ep & USB_DIR_IN)
04e482ff
GKH
1010 pipe = usb_rcvbulkpipe(ps->dev, ep & 0x7f);
1011 else
1012 pipe = usb_sndbulkpipe(ps->dev, ep & 0x7f);
1da177e4
LT
1013
1014 return usb_clear_halt(ps->dev, pipe);
1015}
1da177e4
LT
1016
1017static int proc_getdriver(struct dev_state *ps, void __user *arg)
1018{
1019 struct usbdevfs_getdriver gd;
1020 struct usb_interface *intf;
1021 int ret;
1022
1023 if (copy_from_user(&gd, arg, sizeof(gd)))
1024 return -EFAULT;
1da177e4
LT
1025 intf = usb_ifnum_to_if(ps->dev, gd.interface);
1026 if (!intf || !intf->dev.driver)
1027 ret = -ENODATA;
1028 else {
1029 strncpy(gd.driver, intf->dev.driver->name,
1030 sizeof(gd.driver));
1031 ret = (copy_to_user(arg, &gd, sizeof(gd)) ? -EFAULT : 0);
1032 }
1da177e4
LT
1033 return ret;
1034}
1035
1036static int proc_connectinfo(struct dev_state *ps, void __user *arg)
1037{
886ccd45
VK
1038 struct usbdevfs_connectinfo ci = {
1039 .devnum = ps->dev->devnum,
1040 .slow = ps->dev->speed == USB_SPEED_LOW
1041 };
1da177e4 1042
1da177e4
LT
1043 if (copy_to_user(arg, &ci, sizeof(ci)))
1044 return -EFAULT;
1045 return 0;
1046}
1047
1048static int proc_resetdevice(struct dev_state *ps)
1049{
742120c6 1050 return usb_reset_device(ps->dev);
1da177e4
LT
1051}
1052
1053static int proc_setintf(struct dev_state *ps, void __user *arg)
1054{
1055 struct usbdevfs_setinterface setintf;
1056 int ret;
1057
1058 if (copy_from_user(&setintf, arg, sizeof(setintf)))
1059 return -EFAULT;
1060 if ((ret = checkintf(ps, setintf.interface)))
1061 return ret;
1062 return usb_set_interface(ps->dev, setintf.interface,
1063 setintf.altsetting);
1064}
1065
1066static int proc_setconfig(struct dev_state *ps, void __user *arg)
1067{
3f141e2a 1068 int u;
1da177e4 1069 int status = 0;
04e482ff 1070 struct usb_host_config *actconfig;
1da177e4 1071
3f141e2a 1072 if (get_user(u, (int __user *)arg))
1da177e4
LT
1073 return -EFAULT;
1074
04e482ff
GKH
1075 actconfig = ps->dev->actconfig;
1076
1077 /* Don't touch the device if any interfaces are claimed.
1078 * It could interfere with other drivers' operations, and if
1da177e4
LT
1079 * an interface is claimed by usbfs it could easily deadlock.
1080 */
04e482ff
GKH
1081 if (actconfig) {
1082 int i;
1083
1084 for (i = 0; i < actconfig->desc.bNumInterfaces; ++i) {
1085 if (usb_interface_claimed(actconfig->interface[i])) {
1086 dev_warn(&ps->dev->dev,
72ebddb5 1087 "usbfs: interface %d claimed by %s "
1da177e4
LT
1088 "while '%s' sets config #%d\n",
1089 actconfig->interface[i]
1090 ->cur_altsetting
1091 ->desc.bInterfaceNumber,
72ebddb5
DB
1092 actconfig->interface[i]
1093 ->dev.driver->name,
1da177e4 1094 current->comm, u);
04e482ff 1095 status = -EBUSY;
1da177e4 1096 break;
1da177e4 1097 }
04e482ff
GKH
1098 }
1099 }
1da177e4
LT
1100
1101 /* SET_CONFIGURATION is often abused as a "cheap" driver reset,
1102 * so avoid usb_set_configuration()'s kick to sysfs
1103 */
1104 if (status == 0) {
1105 if (actconfig && actconfig->desc.bConfigurationValue == u)
1106 status = usb_reset_configuration(ps->dev);
1107 else
1108 status = usb_set_configuration(ps->dev, u);
1109 }
1110
1111 return status;
1112}
1113
1da177e4 1114static int proc_do_submiturb(struct dev_state *ps, struct usbdevfs_urb *uurb,
04e482ff
GKH
1115 struct usbdevfs_iso_packet_desc __user *iso_frame_desc,
1116 void __user *arg)
1da177e4
LT
1117{
1118 struct usbdevfs_iso_packet_desc *isopkt = NULL;
1119 struct usb_host_endpoint *ep;
52fb743d 1120 struct async *as = NULL;
1da177e4
LT
1121 struct usb_ctrlrequest *dr = NULL;
1122 unsigned int u, totlen, isofrmlen;
97b9eb91 1123 int ret, ifnum = -1;
93cf9b90 1124 int is_in;
1da177e4 1125
14722ef4
AS
1126 if (uurb->flags & ~(USBDEVFS_URB_ISO_ASAP |
1127 USBDEVFS_URB_SHORT_NOT_OK |
01c6460f 1128 USBDEVFS_URB_BULK_CONTINUATION |
14722ef4
AS
1129 USBDEVFS_URB_NO_FSBR |
1130 USBDEVFS_URB_ZERO_PACKET |
1131 USBDEVFS_URB_NO_INTERRUPT))
1da177e4 1132 return -EINVAL;
9180135b 1133 if (uurb->buffer_length > 0 && !uurb->buffer)
1da177e4 1134 return -EINVAL;
04e482ff
GKH
1135 if (!(uurb->type == USBDEVFS_URB_TYPE_CONTROL &&
1136 (uurb->endpoint & ~USB_ENDPOINT_DIR_MASK) == 0)) {
1137 ifnum = findintfep(ps->dev, uurb->endpoint);
1138 if (ifnum < 0)
1da177e4 1139 return ifnum;
04e482ff
GKH
1140 ret = checkintf(ps, ifnum);
1141 if (ret)
1da177e4
LT
1142 return ret;
1143 }
93cf9b90
AS
1144 if ((uurb->endpoint & USB_ENDPOINT_DIR_MASK) != 0) {
1145 is_in = 1;
1146 ep = ps->dev->ep_in[uurb->endpoint & USB_ENDPOINT_NUMBER_MASK];
1147 } else {
1148 is_in = 0;
1149 ep = ps->dev->ep_out[uurb->endpoint & USB_ENDPOINT_NUMBER_MASK];
1150 }
1da177e4
LT
1151 if (!ep)
1152 return -ENOENT;
add1aaea
AS
1153
1154 u = 0;
1da177e4
LT
1155 switch(uurb->type) {
1156 case USBDEVFS_URB_TYPE_CONTROL:
93cf9b90 1157 if (!usb_endpoint_xfer_control(&ep->desc))
1da177e4 1158 return -EINVAL;
add1aaea
AS
1159 /* min 8 byte setup packet */
1160 if (uurb->buffer_length < 8)
1da177e4 1161 return -EINVAL;
04e482ff
GKH
1162 dr = kmalloc(sizeof(struct usb_ctrlrequest), GFP_KERNEL);
1163 if (!dr)
1da177e4
LT
1164 return -ENOMEM;
1165 if (copy_from_user(dr, uurb->buffer, 8)) {
52fb743d
AS
1166 ret = -EFAULT;
1167 goto error;
1da177e4
LT
1168 }
1169 if (uurb->buffer_length < (le16_to_cpup(&dr->wLength) + 8)) {
52fb743d
AS
1170 ret = -EINVAL;
1171 goto error;
1da177e4 1172 }
393cbb51 1173 ret = check_ctrlrecip(ps, dr->bRequestType, dr->bRequest,
04e482ff 1174 le16_to_cpup(&dr->wIndex));
52fb743d
AS
1175 if (ret)
1176 goto error;
1da177e4
LT
1177 uurb->number_of_packets = 0;
1178 uurb->buffer_length = le16_to_cpup(&dr->wLength);
1179 uurb->buffer += 8;
93cf9b90
AS
1180 if ((dr->bRequestType & USB_DIR_IN) && uurb->buffer_length) {
1181 is_in = 1;
1182 uurb->endpoint |= USB_DIR_IN;
1183 } else {
1184 is_in = 0;
1185 uurb->endpoint &= ~USB_DIR_IN;
1186 }
0880aef4
CF
1187 snoop(&ps->dev->dev, "control urb: bRequestType=%02x "
1188 "bRequest=%02x wValue=%04x "
1189 "wIndex=%04x wLength=%04x\n",
1190 dr->bRequestType, dr->bRequest,
1191 __le16_to_cpup(&dr->wValue),
1192 __le16_to_cpup(&dr->wIndex),
1193 __le16_to_cpup(&dr->wLength));
add1aaea 1194 u = sizeof(struct usb_ctrlrequest);
1da177e4
LT
1195 break;
1196
1197 case USBDEVFS_URB_TYPE_BULK:
93cf9b90 1198 switch (usb_endpoint_type(&ep->desc)) {
1da177e4
LT
1199 case USB_ENDPOINT_XFER_CONTROL:
1200 case USB_ENDPOINT_XFER_ISOC:
1201 return -EINVAL;
f661c6f8
AS
1202 case USB_ENDPOINT_XFER_INT:
1203 /* allow single-shot interrupt transfers */
1204 uurb->type = USBDEVFS_URB_TYPE_INTERRUPT;
1205 goto interrupt_urb;
1da177e4
LT
1206 }
1207 uurb->number_of_packets = 0;
1da177e4
LT
1208 break;
1209
f661c6f8
AS
1210 case USBDEVFS_URB_TYPE_INTERRUPT:
1211 if (!usb_endpoint_xfer_int(&ep->desc))
1212 return -EINVAL;
1213 interrupt_urb:
1214 uurb->number_of_packets = 0;
f661c6f8
AS
1215 break;
1216
1da177e4
LT
1217 case USBDEVFS_URB_TYPE_ISO:
1218 /* arbitrary limit */
04e482ff
GKH
1219 if (uurb->number_of_packets < 1 ||
1220 uurb->number_of_packets > 128)
1da177e4 1221 return -EINVAL;
93cf9b90 1222 if (!usb_endpoint_xfer_isoc(&ep->desc))
1da177e4 1223 return -EINVAL;
04e482ff
GKH
1224 isofrmlen = sizeof(struct usbdevfs_iso_packet_desc) *
1225 uurb->number_of_packets;
1da177e4
LT
1226 if (!(isopkt = kmalloc(isofrmlen, GFP_KERNEL)))
1227 return -ENOMEM;
1228 if (copy_from_user(isopkt, iso_frame_desc, isofrmlen)) {
52fb743d
AS
1229 ret = -EFAULT;
1230 goto error;
1da177e4
LT
1231 }
1232 for (totlen = u = 0; u < uurb->number_of_packets; u++) {
04e482ff
GKH
1233 /* arbitrary limit,
1234 * sufficient for USB 2.0 high-bandwidth iso */
3612242e 1235 if (isopkt[u].length > 8192) {
52fb743d
AS
1236 ret = -EINVAL;
1237 goto error;
1da177e4
LT
1238 }
1239 totlen += isopkt[u].length;
1240 }
add1aaea 1241 u *= sizeof(struct usb_iso_packet_descriptor);
1da177e4
LT
1242 uurb->buffer_length = totlen;
1243 break;
1244
1da177e4
LT
1245 default:
1246 return -EINVAL;
1247 }
add1aaea 1248
3f5eb8d5 1249 if (uurb->buffer_length >= USBFS_XFER_MAX) {
add1aaea
AS
1250 ret = -EINVAL;
1251 goto error;
1252 }
9180135b
AS
1253 if (uurb->buffer_length > 0 &&
1254 !access_ok(is_in ? VERIFY_WRITE : VERIFY_READ,
1255 uurb->buffer, uurb->buffer_length)) {
52fb743d
AS
1256 ret = -EFAULT;
1257 goto error;
1da177e4 1258 }
9180135b
AS
1259 as = alloc_async(uurb->number_of_packets);
1260 if (!as) {
52fb743d
AS
1261 ret = -ENOMEM;
1262 goto error;
1da177e4 1263 }
add1aaea
AS
1264 u += sizeof(struct async) + sizeof(struct urb) + uurb->buffer_length;
1265 ret = usbfs_increase_memory_usage(u);
1266 if (ret)
1267 goto error;
1268 as->mem_usage = u;
1269
9180135b
AS
1270 if (uurb->buffer_length > 0) {
1271 as->urb->transfer_buffer = kmalloc(uurb->buffer_length,
1272 GFP_KERNEL);
1273 if (!as->urb->transfer_buffer) {
52fb743d
AS
1274 ret = -ENOMEM;
1275 goto error;
9180135b 1276 }
7152b592
AS
1277 /* Isochronous input data may end up being discontiguous
1278 * if some of the packets are short. Clear the buffer so
1279 * that the gaps don't leak kernel data to userspace.
1280 */
1281 if (is_in && uurb->type == USBDEVFS_URB_TYPE_ISO)
1282 memset(as->urb->transfer_buffer, 0,
1283 uurb->buffer_length);
9180135b 1284 }
04e482ff
GKH
1285 as->urb->dev = ps->dev;
1286 as->urb->pipe = (uurb->type << 30) |
93cf9b90
AS
1287 __create_pipe(ps->dev, uurb->endpoint & 0xf) |
1288 (uurb->endpoint & USB_DIR_IN);
14722ef4
AS
1289
1290 /* This tedious sequence is necessary because the URB_* flags
1291 * are internal to the kernel and subject to change, whereas
1292 * the USBDEVFS_URB_* flags are a user API and must not be changed.
1293 */
1294 u = (is_in ? URB_DIR_IN : URB_DIR_OUT);
1295 if (uurb->flags & USBDEVFS_URB_ISO_ASAP)
1296 u |= URB_ISO_ASAP;
1297 if (uurb->flags & USBDEVFS_URB_SHORT_NOT_OK)
1298 u |= URB_SHORT_NOT_OK;
1299 if (uurb->flags & USBDEVFS_URB_NO_FSBR)
1300 u |= URB_NO_FSBR;
1301 if (uurb->flags & USBDEVFS_URB_ZERO_PACKET)
1302 u |= URB_ZERO_PACKET;
1303 if (uurb->flags & USBDEVFS_URB_NO_INTERRUPT)
1304 u |= URB_NO_INTERRUPT;
1305 as->urb->transfer_flags = u;
1306
1da177e4 1307 as->urb->transfer_buffer_length = uurb->buffer_length;
04e482ff 1308 as->urb->setup_packet = (unsigned char *)dr;
52fb743d 1309 dr = NULL;
1da177e4
LT
1310 as->urb->start_frame = uurb->start_frame;
1311 as->urb->number_of_packets = uurb->number_of_packets;
97b9eb91
AS
1312 if (uurb->type == USBDEVFS_URB_TYPE_ISO ||
1313 ps->dev->speed == USB_SPEED_HIGH)
1314 as->urb->interval = 1 << min(15, ep->desc.bInterval - 1);
1315 else
1316 as->urb->interval = ep->desc.bInterval;
04e482ff
GKH
1317 as->urb->context = as;
1318 as->urb->complete = async_completed;
1da177e4
LT
1319 for (totlen = u = 0; u < uurb->number_of_packets; u++) {
1320 as->urb->iso_frame_desc[u].offset = totlen;
1321 as->urb->iso_frame_desc[u].length = isopkt[u].length;
1322 totlen += isopkt[u].length;
1323 }
6fd19f4b 1324 kfree(isopkt);
52fb743d 1325 isopkt = NULL;
1da177e4 1326 as->ps = ps;
04e482ff 1327 as->userurb = arg;
9180135b 1328 if (is_in && uurb->buffer_length > 0)
1da177e4
LT
1329 as->userbuffer = uurb->buffer;
1330 else
1331 as->userbuffer = NULL;
1332 as->signr = uurb->signr;
1333 as->ifnum = ifnum;
2425c08b 1334 as->pid = get_pid(task_pid(current));
d178bc3a 1335 as->cred = get_current_cred();
7a01955f 1336 security_task_getsecid(current, &as->secid);
9180135b 1337 if (!is_in && uurb->buffer_length > 0) {
93cf9b90 1338 if (copy_from_user(as->urb->transfer_buffer, uurb->buffer,
9180135b 1339 uurb->buffer_length)) {
52fb743d
AS
1340 ret = -EFAULT;
1341 goto error;
1da177e4
LT
1342 }
1343 }
4c6e8971 1344 snoop_urb(ps->dev, as->userurb, as->urb->pipe,
0880aef4
CF
1345 as->urb->transfer_buffer_length, 0, SUBMIT,
1346 is_in ? NULL : as->urb->transfer_buffer,
1347 uurb->buffer_length);
04e482ff 1348 async_newpending(as);
01c6460f
AS
1349
1350 if (usb_endpoint_xfer_bulk(&ep->desc)) {
1351 spin_lock_irq(&ps->lock);
1352
1353 /* Not exactly the endpoint address; the direction bit is
1354 * shifted to the 0x10 position so that the value will be
1355 * between 0 and 31.
1356 */
1357 as->bulk_addr = usb_endpoint_num(&ep->desc) |
1358 ((ep->desc.bEndpointAddress & USB_ENDPOINT_DIR_MASK)
1359 >> 3);
1360
1361 /* If this bulk URB is the start of a new transfer, re-enable
1362 * the endpoint. Otherwise mark it as a continuation URB.
1363 */
1364 if (uurb->flags & USBDEVFS_URB_BULK_CONTINUATION)
1365 as->bulk_status = AS_CONTINUATION;
1366 else
1367 ps->disabled_bulk_eps &= ~(1 << as->bulk_addr);
1368
1369 /* Don't accept continuation URBs if the endpoint is
1370 * disabled because of an earlier error.
1371 */
1372 if (ps->disabled_bulk_eps & (1 << as->bulk_addr))
1373 ret = -EREMOTEIO;
1374 else
1375 ret = usb_submit_urb(as->urb, GFP_ATOMIC);
1376 spin_unlock_irq(&ps->lock);
1377 } else {
1378 ret = usb_submit_urb(as->urb, GFP_KERNEL);
1379 }
1380
1381 if (ret) {
04e482ff
GKH
1382 dev_printk(KERN_DEBUG, &ps->dev->dev,
1383 "usbfs: usb_submit_urb returned %d\n", ret);
4c6e8971 1384 snoop_urb(ps->dev, as->userurb, as->urb->pipe,
0880aef4 1385 0, ret, COMPLETE, NULL, 0);
04e482ff 1386 async_removepending(as);
52fb743d 1387 goto error;
04e482ff
GKH
1388 }
1389 return 0;
52fb743d
AS
1390
1391 error:
1392 kfree(isopkt);
1393 kfree(dr);
1394 if (as)
1395 free_async(as);
1396 return ret;
1da177e4
LT
1397}
1398
1399static int proc_submiturb(struct dev_state *ps, void __user *arg)
1400{
1401 struct usbdevfs_urb uurb;
1402
1403 if (copy_from_user(&uurb, arg, sizeof(uurb)))
1404 return -EFAULT;
1405
04e482ff
GKH
1406 return proc_do_submiturb(ps, &uurb,
1407 (((struct usbdevfs_urb __user *)arg)->iso_frame_desc),
1408 arg);
1da177e4
LT
1409}
1410
1411static int proc_unlinkurb(struct dev_state *ps, void __user *arg)
1412{
1413 struct async *as;
1414
1415 as = async_getpending(ps, arg);
1416 if (!as)
1417 return -EINVAL;
1418 usb_kill_urb(as->urb);
1419 return 0;
1420}
1421
1422static int processcompl(struct async *as, void __user * __user *arg)
1423{
1424 struct urb *urb = as->urb;
1425 struct usbdevfs_urb __user *userurb = as->userurb;
1426 void __user *addr = as->userurb;
1427 unsigned int i;
1428
7152b592
AS
1429 if (as->userbuffer && urb->actual_length) {
1430 if (urb->number_of_packets > 0) /* Isochronous */
1431 i = urb->transfer_buffer_length;
1432 else /* Non-Isoc */
1433 i = urb->actual_length;
1434 if (copy_to_user(as->userbuffer, urb->transfer_buffer, i))
d794a021 1435 goto err_out;
7152b592 1436 }
e015268d 1437 if (put_user(as->status, &userurb->status))
d794a021 1438 goto err_out;
1da177e4 1439 if (put_user(urb->actual_length, &userurb->actual_length))
d794a021 1440 goto err_out;
1da177e4 1441 if (put_user(urb->error_count, &userurb->error_count))
d794a021 1442 goto err_out;
1da177e4 1443
93cf9b90 1444 if (usb_endpoint_xfer_isoc(&urb->ep->desc)) {
668a9541
CL
1445 for (i = 0; i < urb->number_of_packets; i++) {
1446 if (put_user(urb->iso_frame_desc[i].actual_length,
1447 &userurb->iso_frame_desc[i].actual_length))
d794a021 1448 goto err_out;
668a9541
CL
1449 if (put_user(urb->iso_frame_desc[i].status,
1450 &userurb->iso_frame_desc[i].status))
d794a021 1451 goto err_out;
668a9541 1452 }
1da177e4
LT
1453 }
1454
1da177e4
LT
1455 if (put_user(addr, (void __user * __user *)arg))
1456 return -EFAULT;
1457 return 0;
d794a021
ON
1458
1459err_out:
d794a021 1460 return -EFAULT;
1da177e4
LT
1461}
1462
04e482ff 1463static struct async *reap_as(struct dev_state *ps)
1da177e4 1464{
04e482ff 1465 DECLARE_WAITQUEUE(wait, current);
1da177e4
LT
1466 struct async *as = NULL;
1467 struct usb_device *dev = ps->dev;
1468
1469 add_wait_queue(&ps->wait, &wait);
1470 for (;;) {
1471 __set_current_state(TASK_INTERRUPTIBLE);
04e482ff
GKH
1472 as = async_getcompleted(ps);
1473 if (as)
1da177e4
LT
1474 break;
1475 if (signal_pending(current))
1476 break;
1477 usb_unlock_device(dev);
1478 schedule();
1479 usb_lock_device(dev);
1480 }
1481 remove_wait_queue(&ps->wait, &wait);
1482 set_current_state(TASK_RUNNING);
1483 return as;
1484}
1485
1486static int proc_reapurb(struct dev_state *ps, void __user *arg)
1487{
1488 struct async *as = reap_as(ps);
ddeee0b2
LT
1489 if (as) {
1490 int retval = processcompl(as, (void __user * __user *)arg);
1491 free_async(as);
1492 return retval;
1493 }
1da177e4
LT
1494 if (signal_pending(current))
1495 return -EINTR;
1496 return -EIO;
1497}
1498
1499static int proc_reapurbnonblock(struct dev_state *ps, void __user *arg)
1500{
ddeee0b2 1501 int retval;
1da177e4
LT
1502 struct async *as;
1503
ddeee0b2
LT
1504 as = async_getcompleted(ps);
1505 retval = -EAGAIN;
1506 if (as) {
1507 retval = processcompl(as, (void __user * __user *)arg);
1508 free_async(as);
1509 }
1510 return retval;
1da177e4
LT
1511}
1512
1513#ifdef CONFIG_COMPAT
637e8a60
AB
1514static int proc_control_compat(struct dev_state *ps,
1515 struct usbdevfs_ctrltransfer32 __user *p32)
1516{
1517 struct usbdevfs_ctrltransfer __user *p;
1518 __u32 udata;
1519 p = compat_alloc_user_space(sizeof(*p));
1520 if (copy_in_user(p, p32, (sizeof(*p32) - sizeof(compat_caddr_t))) ||
1521 get_user(udata, &p32->data) ||
1522 put_user(compat_ptr(udata), &p->data))
1523 return -EFAULT;
1524 return proc_control(ps, p);
1525}
1526
1527static int proc_bulk_compat(struct dev_state *ps,
1528 struct usbdevfs_bulktransfer32 __user *p32)
1529{
1530 struct usbdevfs_bulktransfer __user *p;
1531 compat_uint_t n;
1532 compat_caddr_t addr;
1533
1534 p = compat_alloc_user_space(sizeof(*p));
1535
1536 if (get_user(n, &p32->ep) || put_user(n, &p->ep) ||
1537 get_user(n, &p32->len) || put_user(n, &p->len) ||
1538 get_user(n, &p32->timeout) || put_user(n, &p->timeout) ||
1539 get_user(addr, &p32->data) || put_user(compat_ptr(addr), &p->data))
1540 return -EFAULT;
1541
1542 return proc_bulk(ps, p);
1543}
1544static int proc_disconnectsignal_compat(struct dev_state *ps, void __user *arg)
1545{
1546 struct usbdevfs_disconnectsignal32 ds;
1547
1548 if (copy_from_user(&ds, arg, sizeof(ds)))
1549 return -EFAULT;
1550 ps->discsignr = ds.signr;
1551 ps->disccontext = compat_ptr(ds.context);
1552 return 0;
1553}
1da177e4
LT
1554
1555static int get_urb32(struct usbdevfs_urb *kurb,
1556 struct usbdevfs_urb32 __user *uurb)
1557{
1558 __u32 uptr;
18753ebc
MB
1559 if (!access_ok(VERIFY_READ, uurb, sizeof(*uurb)) ||
1560 __get_user(kurb->type, &uurb->type) ||
1da177e4
LT
1561 __get_user(kurb->endpoint, &uurb->endpoint) ||
1562 __get_user(kurb->status, &uurb->status) ||
1563 __get_user(kurb->flags, &uurb->flags) ||
1564 __get_user(kurb->buffer_length, &uurb->buffer_length) ||
1565 __get_user(kurb->actual_length, &uurb->actual_length) ||
1566 __get_user(kurb->start_frame, &uurb->start_frame) ||
1567 __get_user(kurb->number_of_packets, &uurb->number_of_packets) ||
1568 __get_user(kurb->error_count, &uurb->error_count) ||
1569 __get_user(kurb->signr, &uurb->signr))
1570 return -EFAULT;
1571
1572 if (__get_user(uptr, &uurb->buffer))
1573 return -EFAULT;
1574 kurb->buffer = compat_ptr(uptr);
ed0c7720 1575 if (__get_user(uptr, &uurb->usercontext))
1da177e4
LT
1576 return -EFAULT;
1577 kurb->usercontext = compat_ptr(uptr);
1578
1579 return 0;
1580}
1581
1582static int proc_submiturb_compat(struct dev_state *ps, void __user *arg)
1583{
1584 struct usbdevfs_urb uurb;
1585
04e482ff 1586 if (get_urb32(&uurb, (struct usbdevfs_urb32 __user *)arg))
1da177e4
LT
1587 return -EFAULT;
1588
04e482ff
GKH
1589 return proc_do_submiturb(ps, &uurb,
1590 ((struct usbdevfs_urb32 __user *)arg)->iso_frame_desc,
1591 arg);
1da177e4
LT
1592}
1593
1594static int processcompl_compat(struct async *as, void __user * __user *arg)
1595{
1596 struct urb *urb = as->urb;
1597 struct usbdevfs_urb32 __user *userurb = as->userurb;
1598 void __user *addr = as->userurb;
1599 unsigned int i;
1600
d4a4683c 1601 if (as->userbuffer && urb->actual_length)
04e482ff 1602 if (copy_to_user(as->userbuffer, urb->transfer_buffer,
d4a4683c 1603 urb->actual_length))
1da177e4 1604 return -EFAULT;
e015268d 1605 if (put_user(as->status, &userurb->status))
1da177e4
LT
1606 return -EFAULT;
1607 if (put_user(urb->actual_length, &userurb->actual_length))
1608 return -EFAULT;
1609 if (put_user(urb->error_count, &userurb->error_count))
1610 return -EFAULT;
1611
93cf9b90 1612 if (usb_endpoint_xfer_isoc(&urb->ep->desc)) {
668a9541
CL
1613 for (i = 0; i < urb->number_of_packets; i++) {
1614 if (put_user(urb->iso_frame_desc[i].actual_length,
1615 &userurb->iso_frame_desc[i].actual_length))
1616 return -EFAULT;
1617 if (put_user(urb->iso_frame_desc[i].status,
1618 &userurb->iso_frame_desc[i].status))
1619 return -EFAULT;
1620 }
1da177e4
LT
1621 }
1622
c714de5d 1623 if (put_user(ptr_to_compat(addr), (u32 __user *)arg))
1da177e4
LT
1624 return -EFAULT;
1625 return 0;
1626}
1627
1628static int proc_reapurb_compat(struct dev_state *ps, void __user *arg)
1629{
1630 struct async *as = reap_as(ps);
ddeee0b2
LT
1631 if (as) {
1632 int retval = processcompl_compat(as, (void __user * __user *)arg);
1633 free_async(as);
1634 return retval;
1635 }
1da177e4
LT
1636 if (signal_pending(current))
1637 return -EINTR;
1638 return -EIO;
1639}
1640
1641static int proc_reapurbnonblock_compat(struct dev_state *ps, void __user *arg)
1642{
ddeee0b2 1643 int retval;
1da177e4
LT
1644 struct async *as;
1645
ddeee0b2
LT
1646 retval = -EAGAIN;
1647 as = async_getcompleted(ps);
1648 if (as) {
1649 retval = processcompl_compat(as, (void __user * __user *)arg);
1650 free_async(as);
1651 }
1652 return retval;
1da177e4
LT
1653}
1654
637e8a60 1655
1da177e4
LT
1656#endif
1657
1658static int proc_disconnectsignal(struct dev_state *ps, void __user *arg)
1659{
1660 struct usbdevfs_disconnectsignal ds;
1661
1662 if (copy_from_user(&ds, arg, sizeof(ds)))
1663 return -EFAULT;
1da177e4
LT
1664 ps->discsignr = ds.signr;
1665 ps->disccontext = ds.context;
1666 return 0;
1667}
1668
1669static int proc_claiminterface(struct dev_state *ps, void __user *arg)
1670{
1671 unsigned int ifnum;
1672
1673 if (get_user(ifnum, (unsigned int __user *)arg))
1674 return -EFAULT;
1675 return claimintf(ps, ifnum);
1676}
1677
1678static int proc_releaseinterface(struct dev_state *ps, void __user *arg)
1679{
1680 unsigned int ifnum;
1681 int ret;
1682
1683 if (get_user(ifnum, (unsigned int __user *)arg))
1684 return -EFAULT;
1685 if ((ret = releaseintf(ps, ifnum)) < 0)
1686 return ret;
1687 destroy_async_on_interface (ps, ifnum);
1688 return 0;
1689}
1690
c36fc889 1691static int proc_ioctl(struct dev_state *ps, struct usbdevfs_ioctl *ctl)
1da177e4 1692{
1da177e4
LT
1693 int size;
1694 void *buf = NULL;
1695 int retval = 0;
1696 struct usb_interface *intf = NULL;
1697 struct usb_driver *driver = NULL;
1da177e4 1698
c36fc889 1699 /* alloc buffer */
04e482ff
GKH
1700 if ((size = _IOC_SIZE(ctl->ioctl_code)) > 0) {
1701 if ((buf = kmalloc(size, GFP_KERNEL)) == NULL)
1da177e4 1702 return -ENOMEM;
c36fc889 1703 if ((_IOC_DIR(ctl->ioctl_code) & _IOC_WRITE)) {
04e482ff 1704 if (copy_from_user(buf, ctl->data, size)) {
6fd19f4b 1705 kfree(buf);
1da177e4
LT
1706 return -EFAULT;
1707 }
1708 } else {
04e482ff 1709 memset(buf, 0, size);
1da177e4
LT
1710 }
1711 }
1712
349710c3 1713 if (!connected(ps)) {
6fd19f4b 1714 kfree(buf);
1da177e4
LT
1715 return -ENODEV;
1716 }
1717
1718 if (ps->dev->state != USB_STATE_CONFIGURED)
1719 retval = -EHOSTUNREACH;
04e482ff
GKH
1720 else if (!(intf = usb_ifnum_to_if(ps->dev, ctl->ifno)))
1721 retval = -EINVAL;
c36fc889 1722 else switch (ctl->ioctl_code) {
1da177e4
LT
1723
1724 /* disconnect kernel driver from interface */
1725 case USBDEVFS_DISCONNECT:
1da177e4
LT
1726 if (intf->dev.driver) {
1727 driver = to_usb_driver(intf->dev.driver);
04e482ff 1728 dev_dbg(&intf->dev, "disconnect by usbfs\n");
1da177e4
LT
1729 usb_driver_release_interface(driver, intf);
1730 } else
1731 retval = -ENODATA;
1da177e4
LT
1732 break;
1733
1734 /* let kernel drivers try to (re)bind to the interface */
1735 case USBDEVFS_CONNECT:
885e9747
AS
1736 if (!intf->dev.driver)
1737 retval = device_attach(&intf->dev);
1738 else
1739 retval = -EBUSY;
1da177e4
LT
1740 break;
1741
1742 /* talk directly to the interface's driver */
1743 default:
1da177e4
LT
1744 if (intf->dev.driver)
1745 driver = to_usb_driver(intf->dev.driver);
c532b29a 1746 if (driver == NULL || driver->unlocked_ioctl == NULL) {
1da177e4
LT
1747 retval = -ENOTTY;
1748 } else {
c532b29a 1749 retval = driver->unlocked_ioctl(intf, ctl->ioctl_code, buf);
1da177e4
LT
1750 if (retval == -ENOIOCTLCMD)
1751 retval = -ENOTTY;
1752 }
1da177e4
LT
1753 }
1754
1755 /* cleanup and return */
1756 if (retval >= 0
04e482ff 1757 && (_IOC_DIR(ctl->ioctl_code) & _IOC_READ) != 0
1da177e4 1758 && size > 0
04e482ff 1759 && copy_to_user(ctl->data, buf, size) != 0)
1da177e4 1760 retval = -EFAULT;
6fd19f4b
JJ
1761
1762 kfree(buf);
1da177e4
LT
1763 return retval;
1764}
1765
c36fc889
PZ
1766static int proc_ioctl_default(struct dev_state *ps, void __user *arg)
1767{
1768 struct usbdevfs_ioctl ctrl;
1769
04e482ff 1770 if (copy_from_user(&ctrl, arg, sizeof(ctrl)))
c36fc889
PZ
1771 return -EFAULT;
1772 return proc_ioctl(ps, &ctrl);
1773}
1774
1775#ifdef CONFIG_COMPAT
777da590 1776static int proc_ioctl_compat(struct dev_state *ps, compat_uptr_t arg)
c36fc889
PZ
1777{
1778 struct usbdevfs_ioctl32 __user *uioc;
1779 struct usbdevfs_ioctl ctrl;
1780 u32 udata;
1781
058120d7 1782 uioc = compat_ptr((long)arg);
18753ebc
MB
1783 if (!access_ok(VERIFY_READ, uioc, sizeof(*uioc)) ||
1784 __get_user(ctrl.ifno, &uioc->ifno) ||
1785 __get_user(ctrl.ioctl_code, &uioc->ioctl_code) ||
c36fc889
PZ
1786 __get_user(udata, &uioc->data))
1787 return -EFAULT;
1788 ctrl.data = compat_ptr(udata);
1789
1790 return proc_ioctl(ps, &ctrl);
1791}
1792#endif
1793
7cbe5dca
AS
1794static int proc_claim_port(struct dev_state *ps, void __user *arg)
1795{
1796 unsigned portnum;
1797 int rc;
1798
1799 if (get_user(portnum, (unsigned __user *) arg))
1800 return -EFAULT;
1801 rc = usb_hub_claim_port(ps->dev, portnum, ps);
1802 if (rc == 0)
1803 snoop(&ps->dev->dev, "port %d claimed by process %d: %s\n",
1804 portnum, task_pid_nr(current), current->comm);
1805 return rc;
1806}
1807
1808static int proc_release_port(struct dev_state *ps, void __user *arg)
1809{
1810 unsigned portnum;
1811
1812 if (get_user(portnum, (unsigned __user *) arg))
1813 return -EFAULT;
1814 return usb_hub_release_port(ps->dev, portnum, ps);
1815}
1816
1da177e4
LT
1817/*
1818 * NOTE: All requests here that have interface numbers as parameters
1819 * are assuming that somehow the configuration has been prevented from
1820 * changing. But there's no mechanism to ensure that...
1821 */
637e8a60
AB
1822static long usbdev_do_ioctl(struct file *file, unsigned int cmd,
1823 void __user *p)
1da177e4 1824{
ec17cf1c 1825 struct dev_state *ps = file->private_data;
637e8a60 1826 struct inode *inode = file->f_path.dentry->d_inode;
1da177e4 1827 struct usb_device *dev = ps->dev;
1da177e4
LT
1828 int ret = -ENOTTY;
1829
1830 if (!(file->f_mode & FMODE_WRITE))
1831 return -EPERM;
01412a21 1832
1da177e4 1833 usb_lock_device(dev);
349710c3 1834 if (!connected(ps)) {
1da177e4
LT
1835 usb_unlock_device(dev);
1836 return -ENODEV;
1837 }
1838
1839 switch (cmd) {
1840 case USBDEVFS_CONTROL:
441b62c1 1841 snoop(&dev->dev, "%s: CONTROL\n", __func__);
1da177e4
LT
1842 ret = proc_control(ps, p);
1843 if (ret >= 0)
1844 inode->i_mtime = CURRENT_TIME;
1845 break;
1846
1847 case USBDEVFS_BULK:
441b62c1 1848 snoop(&dev->dev, "%s: BULK\n", __func__);
1da177e4
LT
1849 ret = proc_bulk(ps, p);
1850 if (ret >= 0)
1851 inode->i_mtime = CURRENT_TIME;
1852 break;
1853
1854 case USBDEVFS_RESETEP:
441b62c1 1855 snoop(&dev->dev, "%s: RESETEP\n", __func__);
1da177e4
LT
1856 ret = proc_resetep(ps, p);
1857 if (ret >= 0)
1858 inode->i_mtime = CURRENT_TIME;
1859 break;
1860
1861 case USBDEVFS_RESET:
441b62c1 1862 snoop(&dev->dev, "%s: RESET\n", __func__);
1da177e4
LT
1863 ret = proc_resetdevice(ps);
1864 break;
1865
1866 case USBDEVFS_CLEAR_HALT:
441b62c1 1867 snoop(&dev->dev, "%s: CLEAR_HALT\n", __func__);
1da177e4
LT
1868 ret = proc_clearhalt(ps, p);
1869 if (ret >= 0)
1870 inode->i_mtime = CURRENT_TIME;
1871 break;
1872
1873 case USBDEVFS_GETDRIVER:
441b62c1 1874 snoop(&dev->dev, "%s: GETDRIVER\n", __func__);
1da177e4
LT
1875 ret = proc_getdriver(ps, p);
1876 break;
1877
1878 case USBDEVFS_CONNECTINFO:
441b62c1 1879 snoop(&dev->dev, "%s: CONNECTINFO\n", __func__);
1da177e4
LT
1880 ret = proc_connectinfo(ps, p);
1881 break;
1882
1883 case USBDEVFS_SETINTERFACE:
441b62c1 1884 snoop(&dev->dev, "%s: SETINTERFACE\n", __func__);
1da177e4
LT
1885 ret = proc_setintf(ps, p);
1886 break;
1887
1888 case USBDEVFS_SETCONFIGURATION:
441b62c1 1889 snoop(&dev->dev, "%s: SETCONFIGURATION\n", __func__);
1da177e4
LT
1890 ret = proc_setconfig(ps, p);
1891 break;
1892
1893 case USBDEVFS_SUBMITURB:
441b62c1 1894 snoop(&dev->dev, "%s: SUBMITURB\n", __func__);
1da177e4
LT
1895 ret = proc_submiturb(ps, p);
1896 if (ret >= 0)
1897 inode->i_mtime = CURRENT_TIME;
1898 break;
1899
1900#ifdef CONFIG_COMPAT
637e8a60
AB
1901 case USBDEVFS_CONTROL32:
1902 snoop(&dev->dev, "%s: CONTROL32\n", __func__);
1903 ret = proc_control_compat(ps, p);
1904 if (ret >= 0)
1905 inode->i_mtime = CURRENT_TIME;
1906 break;
1907
1908 case USBDEVFS_BULK32:
1909 snoop(&dev->dev, "%s: BULK32\n", __func__);
1910 ret = proc_bulk_compat(ps, p);
1911 if (ret >= 0)
1912 inode->i_mtime = CURRENT_TIME;
1913 break;
1914
1915 case USBDEVFS_DISCSIGNAL32:
1916 snoop(&dev->dev, "%s: DISCSIGNAL32\n", __func__);
1917 ret = proc_disconnectsignal_compat(ps, p);
1918 break;
1da177e4
LT
1919
1920 case USBDEVFS_SUBMITURB32:
441b62c1 1921 snoop(&dev->dev, "%s: SUBMITURB32\n", __func__);
1da177e4
LT
1922 ret = proc_submiturb_compat(ps, p);
1923 if (ret >= 0)
1924 inode->i_mtime = CURRENT_TIME;
1925 break;
1926
1927 case USBDEVFS_REAPURB32:
441b62c1 1928 snoop(&dev->dev, "%s: REAPURB32\n", __func__);
1da177e4
LT
1929 ret = proc_reapurb_compat(ps, p);
1930 break;
1931
1932 case USBDEVFS_REAPURBNDELAY32:
4c6e8971 1933 snoop(&dev->dev, "%s: REAPURBNDELAY32\n", __func__);
1da177e4
LT
1934 ret = proc_reapurbnonblock_compat(ps, p);
1935 break;
1936
c36fc889 1937 case USBDEVFS_IOCTL32:
637e8a60 1938 snoop(&dev->dev, "%s: IOCTL32\n", __func__);
c714de5d 1939 ret = proc_ioctl_compat(ps, ptr_to_compat(p));
c36fc889 1940 break;
1da177e4
LT
1941#endif
1942
1943 case USBDEVFS_DISCARDURB:
441b62c1 1944 snoop(&dev->dev, "%s: DISCARDURB\n", __func__);
1da177e4
LT
1945 ret = proc_unlinkurb(ps, p);
1946 break;
1947
1948 case USBDEVFS_REAPURB:
441b62c1 1949 snoop(&dev->dev, "%s: REAPURB\n", __func__);
1da177e4
LT
1950 ret = proc_reapurb(ps, p);
1951 break;
1952
1953 case USBDEVFS_REAPURBNDELAY:
4c6e8971 1954 snoop(&dev->dev, "%s: REAPURBNDELAY\n", __func__);
1da177e4
LT
1955 ret = proc_reapurbnonblock(ps, p);
1956 break;
1957
1958 case USBDEVFS_DISCSIGNAL:
441b62c1 1959 snoop(&dev->dev, "%s: DISCSIGNAL\n", __func__);
1da177e4
LT
1960 ret = proc_disconnectsignal(ps, p);
1961 break;
1962
1963 case USBDEVFS_CLAIMINTERFACE:
441b62c1 1964 snoop(&dev->dev, "%s: CLAIMINTERFACE\n", __func__);
1da177e4
LT
1965 ret = proc_claiminterface(ps, p);
1966 break;
1967
1968 case USBDEVFS_RELEASEINTERFACE:
441b62c1 1969 snoop(&dev->dev, "%s: RELEASEINTERFACE\n", __func__);
1da177e4
LT
1970 ret = proc_releaseinterface(ps, p);
1971 break;
1972
1973 case USBDEVFS_IOCTL:
441b62c1 1974 snoop(&dev->dev, "%s: IOCTL\n", __func__);
c36fc889 1975 ret = proc_ioctl_default(ps, p);
1da177e4 1976 break;
7cbe5dca
AS
1977
1978 case USBDEVFS_CLAIM_PORT:
1979 snoop(&dev->dev, "%s: CLAIM_PORT\n", __func__);
1980 ret = proc_claim_port(ps, p);
1981 break;
1982
1983 case USBDEVFS_RELEASE_PORT:
1984 snoop(&dev->dev, "%s: RELEASE_PORT\n", __func__);
1985 ret = proc_release_port(ps, p);
1986 break;
1da177e4
LT
1987 }
1988 usb_unlock_device(dev);
1989 if (ret >= 0)
1990 inode->i_atime = CURRENT_TIME;
1991 return ret;
1992}
1993
637e8a60
AB
1994static long usbdev_ioctl(struct file *file, unsigned int cmd,
1995 unsigned long arg)
1996{
1997 int ret;
1998
637e8a60 1999 ret = usbdev_do_ioctl(file, cmd, (void __user *)arg);
637e8a60
AB
2000
2001 return ret;
2002}
2003
2004#ifdef CONFIG_COMPAT
2005static long usbdev_compat_ioctl(struct file *file, unsigned int cmd,
2006 unsigned long arg)
2007{
2008 int ret;
2009
637e8a60 2010 ret = usbdev_do_ioctl(file, cmd, compat_ptr(arg));
637e8a60
AB
2011
2012 return ret;
2013}
2014#endif
2015
1da177e4 2016/* No kernel lock - fine */
04e482ff
GKH
2017static unsigned int usbdev_poll(struct file *file,
2018 struct poll_table_struct *wait)
1da177e4 2019{
ec17cf1c
TK
2020 struct dev_state *ps = file->private_data;
2021 unsigned int mask = 0;
1da177e4
LT
2022
2023 poll_wait(file, &ps->wait, wait);
2024 if (file->f_mode & FMODE_WRITE && !list_empty(&ps->async_completed))
2025 mask |= POLLOUT | POLLWRNORM;
349710c3 2026 if (!connected(ps))
1da177e4
LT
2027 mask |= POLLERR | POLLHUP;
2028 return mask;
2029}
2030
9f8b17e6 2031const struct file_operations usbdev_file_operations = {
637e8a60
AB
2032 .owner = THIS_MODULE,
2033 .llseek = usbdev_lseek,
2034 .read = usbdev_read,
2035 .poll = usbdev_poll,
2036 .unlocked_ioctl = usbdev_ioctl,
2037#ifdef CONFIG_COMPAT
2038 .compat_ioctl = usbdev_compat_ioctl,
2039#endif
2040 .open = usbdev_open,
2041 .release = usbdev_release,
1da177e4 2042};
fbf82fd2 2043
501950d8 2044static void usbdev_remove(struct usb_device *udev)
cd9f0375
AS
2045{
2046 struct dev_state *ps;
2047 struct siginfo sinfo;
2048
2049 while (!list_empty(&udev->filelist)) {
2050 ps = list_entry(udev->filelist.next, struct dev_state, list);
2051 destroy_all_async(ps);
2052 wake_up_all(&ps->wait);
2053 list_del_init(&ps->list);
2054 if (ps->discsignr) {
2055 sinfo.si_signo = ps->discsignr;
2056 sinfo.si_errno = EPIPE;
2057 sinfo.si_code = SI_ASYNCIO;
2058 sinfo.si_addr = ps->disccontext;
d178bc3a
SH
2059 kill_pid_info_as_cred(ps->discsignr, &sinfo,
2060 ps->disc_pid, ps->cred, ps->secid);
cd9f0375
AS
2061 }
2062 }
2063}
2064
9f8b17e6
KS
2065#ifdef CONFIG_USB_DEVICE_CLASS
2066static struct class *usb_classdev_class;
2067
2068static int usb_classdev_add(struct usb_device *dev)
fbf82fd2 2069{
e04199b2
AS
2070 struct device *cldev;
2071
b0b090e5
GKH
2072 cldev = device_create(usb_classdev_class, &dev->dev, dev->dev.devt,
2073 NULL, "usbdev%d.%d", dev->bus->busnum,
2074 dev->devnum);
e04199b2
AS
2075 if (IS_ERR(cldev))
2076 return PTR_ERR(cldev);
2077 dev->usb_classdev = cldev;
27d39e26 2078 return 0;
fbf82fd2
KS
2079}
2080
9f8b17e6 2081static void usb_classdev_remove(struct usb_device *dev)
fbf82fd2 2082{
e04199b2
AS
2083 if (dev->usb_classdev)
2084 device_unregister(dev->usb_classdev);
fbf82fd2
KS
2085}
2086
501950d8
AS
2087#else
2088#define usb_classdev_add(dev) 0
2089#define usb_classdev_remove(dev) do {} while (0)
2090
2091#endif
2092
2093static int usbdev_notify(struct notifier_block *self,
9f8b17e6 2094 unsigned long action, void *dev)
a7b986b3
GKH
2095{
2096 switch (action) {
2097 case USB_DEVICE_ADD:
9f8b17e6 2098 if (usb_classdev_add(dev))
27d39e26 2099 return NOTIFY_BAD;
a7b986b3
GKH
2100 break;
2101 case USB_DEVICE_REMOVE:
9f8b17e6 2102 usb_classdev_remove(dev);
501950d8 2103 usbdev_remove(dev);
a7b986b3
GKH
2104 break;
2105 }
2106 return NOTIFY_OK;
2107}
2108
2109static struct notifier_block usbdev_nb = {
501950d8 2110 .notifier_call = usbdev_notify,
a7b986b3
GKH
2111};
2112
7e7654a9 2113static struct cdev usb_device_cdev;
fbf82fd2 2114
9f8b17e6 2115int __init usb_devio_init(void)
fbf82fd2
KS
2116{
2117 int retval;
2118
fad21bdf 2119 retval = register_chrdev_region(USB_DEVICE_DEV, USB_DEVICE_MAX,
04e482ff 2120 "usb_device");
fbf82fd2 2121 if (retval) {
69a85942 2122 printk(KERN_ERR "Unable to register minors for usb_device\n");
fbf82fd2
KS
2123 goto out;
2124 }
9f8b17e6 2125 cdev_init(&usb_device_cdev, &usbdev_file_operations);
fad21bdf 2126 retval = cdev_add(&usb_device_cdev, USB_DEVICE_DEV, USB_DEVICE_MAX);
fbf82fd2 2127 if (retval) {
69a85942
GKH
2128 printk(KERN_ERR "Unable to get usb_device major %d\n",
2129 USB_DEVICE_MAJOR);
a7b986b3 2130 goto error_cdev;
fbf82fd2 2131 }
9f8b17e6
KS
2132#ifdef CONFIG_USB_DEVICE_CLASS
2133 usb_classdev_class = class_create(THIS_MODULE, "usb_device");
2134 if (IS_ERR(usb_classdev_class)) {
69a85942 2135 printk(KERN_ERR "Unable to register usb_device class\n");
9f8b17e6
KS
2136 retval = PTR_ERR(usb_classdev_class);
2137 cdev_del(&usb_device_cdev);
2138 usb_classdev_class = NULL;
2139 goto out;
fbf82fd2 2140 }
e105b8bf
DW
2141 /* devices of this class shadow the major:minor of their parent
2142 * device, so clear ->dev_kobj to prevent adding duplicate entries
2143 * to /sys/dev
2144 */
2145 usb_classdev_class->dev_kobj = NULL;
9f8b17e6 2146#endif
501950d8 2147 usb_register_notify(&usbdev_nb);
fbf82fd2
KS
2148out:
2149 return retval;
a7b986b3 2150
a7b986b3
GKH
2151error_cdev:
2152 unregister_chrdev_region(USB_DEVICE_DEV, USB_DEVICE_MAX);
2153 goto out;
fbf82fd2
KS
2154}
2155
9f8b17e6 2156void usb_devio_cleanup(void)
fbf82fd2 2157{
a7b986b3 2158 usb_unregister_notify(&usbdev_nb);
501950d8 2159#ifdef CONFIG_USB_DEVICE_CLASS
9f8b17e6
KS
2160 class_destroy(usb_classdev_class);
2161#endif
fbf82fd2 2162 cdev_del(&usb_device_cdev);
fad21bdf 2163 unregister_chrdev_region(USB_DEVICE_DEV, USB_DEVICE_MAX);
fbf82fd2 2164}