1 /*****************************************************************************/ 2 3 /* 4 * devio.c -- User space communication with USB devices. 5 * 6 * Copyright (C) 1999-2000 Thomas Sailer (sailer@ife.ee.ethz.ch) 7 * 8 * This program is free software; you can redistribute it and/or modify 9 * it under the terms of the GNU General Public License as published by 10 * the Free Software Foundation; either version 2 of the License, or 11 * (at your option) any later version. 12 * 13 * This program is distributed in the hope that it will be useful, 14 * but WITHOUT ANY WARRANTY; without even the implied warranty of 15 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the 16 * GNU General Public License for more details. 17 * 18 * You should have received a copy of the GNU General Public License 19 * along with this program; if not, write to the Free Software 20 * Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA. 21 * 22 * $Id: devio.c,v 1.7 2000/02/01 17:28:48 fliegl Exp $ 23 * 24 * This file implements the usbfs/x/y files, where 25 * x is the bus number and y the device number. 26 * 27 * It allows user space programs/"drivers" to communicate directly 28 * with USB devices without intervening kernel driver. 29 * 30 * Revision history 31 * 22.12.1999 0.1 Initial release (split from proc_usb.c) 32 * 04.01.2000 0.2 Turned into its own filesystem 33 * 30.09.2005 0.3 Fix user-triggerable oops in async URB delivery 34 * (CAN-2005-3055) 35 */ 36 37 /*****************************************************************************/ 38 39 #include <linux/fs.h> 40 #include <linux/mm.h> 41 #include <linux/slab.h> 42 #include <linux/smp_lock.h> 43 #include <linux/signal.h> 44 #include <linux/poll.h> 45 #include <linux/module.h> 46 #include <linux/usb.h> 47 #include <linux/usbdevice_fs.h> 48 #include <linux/cdev.h> 49 #include <linux/notifier.h> 50 #include <linux/security.h> 51 #include <asm/uaccess.h> 52 #include <asm/byteorder.h> 53 #include <linux/moduleparam.h> 54 55 #include "hcd.h" /* for usbcore internals */ 56 #include "usb.h" 57 58 #define USB_MAXBUS 64 59 #define USB_DEVICE_MAX USB_MAXBUS * 128 60 static struct class *usb_device_class; 61 62 struct async { 63 struct list_head asynclist; 64 struct dev_state *ps; 65 pid_t pid; 66 uid_t uid, euid; 67 unsigned int signr; 68 unsigned int ifnum; 69 void __user *userbuffer; 70 void __user *userurb; 71 struct urb *urb; 72 u32 secid; 73 }; 74 75 static int usbfs_snoop = 0; 76 module_param (usbfs_snoop, bool, S_IRUGO | S_IWUSR); 77 MODULE_PARM_DESC (usbfs_snoop, "true to log all usbfs traffic"); 78 79 #define snoop(dev, format, arg...) \ 80 do { \ 81 if (usbfs_snoop) \ 82 dev_info( dev , format , ## arg); \ 83 } while (0) 84 85 #define USB_DEVICE_DEV MKDEV(USB_DEVICE_MAJOR, 0) 86 87 88 #define MAX_USBFS_BUFFER_SIZE 16384 89 90 static inline int connected (struct usb_device *dev) 91 { 92 return dev->state != USB_STATE_NOTATTACHED; 93 } 94 95 static loff_t usbdev_lseek(struct file *file, loff_t offset, int orig) 96 { 97 loff_t ret; 98 99 lock_kernel(); 100 101 switch (orig) { 102 case 0: 103 file->f_pos = offset; 104 ret = file->f_pos; 105 break; 106 case 1: 107 file->f_pos += offset; 108 ret = file->f_pos; 109 break; 110 case 2: 111 default: 112 ret = -EINVAL; 113 } 114 115 unlock_kernel(); 116 return ret; 117 } 118 119 static ssize_t usbdev_read(struct file *file, char __user *buf, size_t nbytes, loff_t *ppos) 120 { 121 struct dev_state *ps = (struct dev_state *)file->private_data; 122 struct usb_device *dev = ps->dev; 123 ssize_t ret = 0; 124 unsigned len; 125 loff_t pos; 126 int i; 127 128 pos = *ppos; 129 usb_lock_device(dev); 130 if (!connected(dev)) { 131 ret = -ENODEV; 132 goto err; 133 } else if (pos < 0) { 134 ret = -EINVAL; 135 goto err; 136 } 137 138 if (pos < sizeof(struct usb_device_descriptor)) { 139 struct usb_device_descriptor temp_desc ; /* 18 bytes - fits on the stack */ 140 141 memcpy(&temp_desc, &dev->descriptor, sizeof(dev->descriptor)); 142 le16_to_cpus(&temp_desc.bcdUSB); 143 le16_to_cpus(&temp_desc.idVendor); 144 le16_to_cpus(&temp_desc.idProduct); 145 le16_to_cpus(&temp_desc.bcdDevice); 146 147 len = sizeof(struct usb_device_descriptor) - pos; 148 if (len > nbytes) 149 len = nbytes; 150 if (copy_to_user(buf, ((char *)&temp_desc) + pos, len)) { 151 ret = -EFAULT; 152 goto err; 153 } 154 155 *ppos += len; 156 buf += len; 157 nbytes -= len; 158 ret += len; 159 } 160 161 pos = sizeof(struct usb_device_descriptor); 162 for (i = 0; nbytes && i < dev->descriptor.bNumConfigurations; i++) { 163 struct usb_config_descriptor *config = 164 (struct usb_config_descriptor *)dev->rawdescriptors[i]; 165 unsigned int length = le16_to_cpu(config->wTotalLength); 166 167 if (*ppos < pos + length) { 168 169 /* The descriptor may claim to be longer than it 170 * really is. Here is the actual allocated length. */ 171 unsigned alloclen = 172 le16_to_cpu(dev->config[i].desc.wTotalLength); 173 174 len = length - (*ppos - pos); 175 if (len > nbytes) 176 len = nbytes; 177 178 /* Simply don't write (skip over) unallocated parts */ 179 if (alloclen > (*ppos - pos)) { 180 alloclen -= (*ppos - pos); 181 if (copy_to_user(buf, 182 dev->rawdescriptors[i] + (*ppos - pos), 183 min(len, alloclen))) { 184 ret = -EFAULT; 185 goto err; 186 } 187 } 188 189 *ppos += len; 190 buf += len; 191 nbytes -= len; 192 ret += len; 193 } 194 195 pos += length; 196 } 197 198 err: 199 usb_unlock_device(dev); 200 return ret; 201 } 202 203 /* 204 * async list handling 205 */ 206 207 static struct async *alloc_async(unsigned int numisoframes) 208 { 209 unsigned int assize = sizeof(struct async) + numisoframes * sizeof(struct usb_iso_packet_descriptor); 210 struct async *as = kzalloc(assize, GFP_KERNEL); 211 212 if (!as) 213 return NULL; 214 as->urb = usb_alloc_urb(numisoframes, GFP_KERNEL); 215 if (!as->urb) { 216 kfree(as); 217 return NULL; 218 } 219 return as; 220 } 221 222 static void free_async(struct async *as) 223 { 224 kfree(as->urb->transfer_buffer); 225 kfree(as->urb->setup_packet); 226 usb_free_urb(as->urb); 227 kfree(as); 228 } 229 230 static inline void async_newpending(struct async *as) 231 { 232 struct dev_state *ps = as->ps; 233 unsigned long flags; 234 235 spin_lock_irqsave(&ps->lock, flags); 236 list_add_tail(&as->asynclist, &ps->async_pending); 237 spin_unlock_irqrestore(&ps->lock, flags); 238 } 239 240 static inline void async_removepending(struct async *as) 241 { 242 struct dev_state *ps = as->ps; 243 unsigned long flags; 244 245 spin_lock_irqsave(&ps->lock, flags); 246 list_del_init(&as->asynclist); 247 spin_unlock_irqrestore(&ps->lock, flags); 248 } 249 250 static inline struct async *async_getcompleted(struct dev_state *ps) 251 { 252 unsigned long flags; 253 struct async *as = NULL; 254 255 spin_lock_irqsave(&ps->lock, flags); 256 if (!list_empty(&ps->async_completed)) { 257 as = list_entry(ps->async_completed.next, struct async, asynclist); 258 list_del_init(&as->asynclist); 259 } 260 spin_unlock_irqrestore(&ps->lock, flags); 261 return as; 262 } 263 264 static inline struct async *async_getpending(struct dev_state *ps, void __user *userurb) 265 { 266 unsigned long flags; 267 struct async *as; 268 269 spin_lock_irqsave(&ps->lock, flags); 270 list_for_each_entry(as, &ps->async_pending, asynclist) 271 if (as->userurb == userurb) { 272 list_del_init(&as->asynclist); 273 spin_unlock_irqrestore(&ps->lock, flags); 274 return as; 275 } 276 spin_unlock_irqrestore(&ps->lock, flags); 277 return NULL; 278 } 279 280 static void snoop_urb(struct urb *urb, void __user *userurb) 281 { 282 int j; 283 unsigned char *data = urb->transfer_buffer; 284 285 if (!usbfs_snoop) 286 return; 287 288 if (urb->pipe & USB_DIR_IN) 289 dev_info(&urb->dev->dev, "direction=IN\n"); 290 else 291 dev_info(&urb->dev->dev, "direction=OUT\n"); 292 dev_info(&urb->dev->dev, "userurb=%p\n", userurb); 293 dev_info(&urb->dev->dev, "transfer_buffer_length=%d\n", 294 urb->transfer_buffer_length); 295 dev_info(&urb->dev->dev, "actual_length=%d\n", urb->actual_length); 296 dev_info(&urb->dev->dev, "data: "); 297 for (j = 0; j < urb->transfer_buffer_length; ++j) 298 printk ("%02x ", data[j]); 299 printk("\n"); 300 } 301 302 static void async_completed(struct urb *urb, struct pt_regs *regs) 303 { 304 struct async *as = (struct async *)urb->context; 305 struct dev_state *ps = as->ps; 306 struct siginfo sinfo; 307 308 spin_lock(&ps->lock); 309 list_move_tail(&as->asynclist, &ps->async_completed); 310 spin_unlock(&ps->lock); 311 if (as->signr) { 312 sinfo.si_signo = as->signr; 313 sinfo.si_errno = as->urb->status; 314 sinfo.si_code = SI_ASYNCIO; 315 sinfo.si_addr = as->userurb; 316 kill_proc_info_as_uid(as->signr, &sinfo, as->pid, as->uid, 317 as->euid, as->secid); 318 } 319 snoop(&urb->dev->dev, "urb complete\n"); 320 snoop_urb(urb, as->userurb); 321 wake_up(&ps->wait); 322 } 323 324 static void destroy_async (struct dev_state *ps, struct list_head *list) 325 { 326 struct async *as; 327 unsigned long flags; 328 329 spin_lock_irqsave(&ps->lock, flags); 330 while (!list_empty(list)) { 331 as = list_entry(list->next, struct async, asynclist); 332 list_del_init(&as->asynclist); 333 334 /* drop the spinlock so the completion handler can run */ 335 spin_unlock_irqrestore(&ps->lock, flags); 336 usb_kill_urb(as->urb); 337 spin_lock_irqsave(&ps->lock, flags); 338 } 339 spin_unlock_irqrestore(&ps->lock, flags); 340 as = async_getcompleted(ps); 341 while (as) { 342 free_async(as); 343 as = async_getcompleted(ps); 344 } 345 } 346 347 static void destroy_async_on_interface (struct dev_state *ps, unsigned int ifnum) 348 { 349 struct list_head *p, *q, hitlist; 350 unsigned long flags; 351 352 INIT_LIST_HEAD(&hitlist); 353 spin_lock_irqsave(&ps->lock, flags); 354 list_for_each_safe(p, q, &ps->async_pending) 355 if (ifnum == list_entry(p, struct async, asynclist)->ifnum) 356 list_move_tail(p, &hitlist); 357 spin_unlock_irqrestore(&ps->lock, flags); 358 destroy_async(ps, &hitlist); 359 } 360 361 static inline void destroy_all_async(struct dev_state *ps) 362 { 363 destroy_async(ps, &ps->async_pending); 364 } 365 366 /* 367 * interface claims are made only at the request of user level code, 368 * which can also release them (explicitly or by closing files). 369 * they're also undone when devices disconnect. 370 */ 371 372 static int driver_probe (struct usb_interface *intf, 373 const struct usb_device_id *id) 374 { 375 return -ENODEV; 376 } 377 378 static void driver_disconnect(struct usb_interface *intf) 379 { 380 struct dev_state *ps = usb_get_intfdata (intf); 381 unsigned int ifnum = intf->altsetting->desc.bInterfaceNumber; 382 383 if (!ps) 384 return; 385 386 /* NOTE: this relies on usbcore having canceled and completed 387 * all pending I/O requests; 2.6 does that. 388 */ 389 390 if (likely(ifnum < 8*sizeof(ps->ifclaimed))) 391 clear_bit(ifnum, &ps->ifclaimed); 392 else 393 warn("interface number %u out of range", ifnum); 394 395 usb_set_intfdata (intf, NULL); 396 397 /* force async requests to complete */ 398 destroy_async_on_interface(ps, ifnum); 399 } 400 401 struct usb_driver usbfs_driver = { 402 .name = "usbfs", 403 .probe = driver_probe, 404 .disconnect = driver_disconnect, 405 }; 406 407 static int claimintf(struct dev_state *ps, unsigned int ifnum) 408 { 409 struct usb_device *dev = ps->dev; 410 struct usb_interface *intf; 411 int err; 412 413 if (ifnum >= 8*sizeof(ps->ifclaimed)) 414 return -EINVAL; 415 /* already claimed */ 416 if (test_bit(ifnum, &ps->ifclaimed)) 417 return 0; 418 419 /* lock against other changes to driver bindings */ 420 down_write(&usb_bus_type.subsys.rwsem); 421 intf = usb_ifnum_to_if(dev, ifnum); 422 if (!intf) 423 err = -ENOENT; 424 else 425 err = usb_driver_claim_interface(&usbfs_driver, intf, ps); 426 up_write(&usb_bus_type.subsys.rwsem); 427 if (err == 0) 428 set_bit(ifnum, &ps->ifclaimed); 429 return err; 430 } 431 432 static int releaseintf(struct dev_state *ps, unsigned int ifnum) 433 { 434 struct usb_device *dev; 435 struct usb_interface *intf; 436 int err; 437 438 err = -EINVAL; 439 if (ifnum >= 8*sizeof(ps->ifclaimed)) 440 return err; 441 dev = ps->dev; 442 /* lock against other changes to driver bindings */ 443 down_write(&usb_bus_type.subsys.rwsem); 444 intf = usb_ifnum_to_if(dev, ifnum); 445 if (!intf) 446 err = -ENOENT; 447 else if (test_and_clear_bit(ifnum, &ps->ifclaimed)) { 448 usb_driver_release_interface(&usbfs_driver, intf); 449 err = 0; 450 } 451 up_write(&usb_bus_type.subsys.rwsem); 452 return err; 453 } 454 455 static int checkintf(struct dev_state *ps, unsigned int ifnum) 456 { 457 if (ps->dev->state != USB_STATE_CONFIGURED) 458 return -EHOSTUNREACH; 459 if (ifnum >= 8*sizeof(ps->ifclaimed)) 460 return -EINVAL; 461 if (test_bit(ifnum, &ps->ifclaimed)) 462 return 0; 463 /* if not yet claimed, claim it for the driver */ 464 dev_warn(&ps->dev->dev, "usbfs: process %d (%s) did not claim interface %u before use\n", 465 current->pid, current->comm, ifnum); 466 return claimintf(ps, ifnum); 467 } 468 469 static int findintfep(struct usb_device *dev, unsigned int ep) 470 { 471 unsigned int i, j, e; 472 struct usb_interface *intf; 473 struct usb_host_interface *alts; 474 struct usb_endpoint_descriptor *endpt; 475 476 if (ep & ~(USB_DIR_IN|0xf)) 477 return -EINVAL; 478 if (!dev->actconfig) 479 return -ESRCH; 480 for (i = 0; i < dev->actconfig->desc.bNumInterfaces; i++) { 481 intf = dev->actconfig->interface[i]; 482 for (j = 0; j < intf->num_altsetting; j++) { 483 alts = &intf->altsetting[j]; 484 for (e = 0; e < alts->desc.bNumEndpoints; e++) { 485 endpt = &alts->endpoint[e].desc; 486 if (endpt->bEndpointAddress == ep) 487 return alts->desc.bInterfaceNumber; 488 } 489 } 490 } 491 return -ENOENT; 492 } 493 494 static int check_ctrlrecip(struct dev_state *ps, unsigned int requesttype, unsigned int index) 495 { 496 int ret = 0; 497 498 if (ps->dev->state != USB_STATE_ADDRESS 499 && ps->dev->state != USB_STATE_CONFIGURED) 500 return -EHOSTUNREACH; 501 if (USB_TYPE_VENDOR == (USB_TYPE_MASK & requesttype)) 502 return 0; 503 504 index &= 0xff; 505 switch (requesttype & USB_RECIP_MASK) { 506 case USB_RECIP_ENDPOINT: 507 if ((ret = findintfep(ps->dev, index)) >= 0) 508 ret = checkintf(ps, ret); 509 break; 510 511 case USB_RECIP_INTERFACE: 512 ret = checkintf(ps, index); 513 break; 514 } 515 return ret; 516 } 517 518 static struct usb_device *usbdev_lookup_minor(int minor) 519 { 520 struct device *device; 521 struct usb_device *udev = NULL; 522 523 down(&usb_device_class->sem); 524 list_for_each_entry(device, &usb_device_class->devices, node) { 525 if (device->devt == MKDEV(USB_DEVICE_MAJOR, minor)) { 526 udev = device->platform_data; 527 break; 528 } 529 } 530 up(&usb_device_class->sem); 531 532 return udev; 533 }; 534 535 /* 536 * file operations 537 */ 538 static int usbdev_open(struct inode *inode, struct file *file) 539 { 540 struct usb_device *dev = NULL; 541 struct dev_state *ps; 542 int ret; 543 544 /* 545 * no locking necessary here, as chrdev_open has the kernel lock 546 * (still acquire the kernel lock for safety) 547 */ 548 ret = -ENOMEM; 549 if (!(ps = kmalloc(sizeof(struct dev_state), GFP_KERNEL))) 550 goto out_nolock; 551 552 lock_kernel(); 553 ret = -ENOENT; 554 /* check if we are called from a real node or usbfs */ 555 if (imajor(inode) == USB_DEVICE_MAJOR) 556 dev = usbdev_lookup_minor(iminor(inode)); 557 if (!dev) 558 dev = inode->u.generic_ip; 559 if (!dev) { 560 kfree(ps); 561 goto out; 562 } 563 usb_get_dev(dev); 564 ret = 0; 565 ps->dev = dev; 566 ps->file = file; 567 spin_lock_init(&ps->lock); 568 INIT_LIST_HEAD(&ps->async_pending); 569 INIT_LIST_HEAD(&ps->async_completed); 570 init_waitqueue_head(&ps->wait); 571 ps->discsignr = 0; 572 ps->disc_pid = current->pid; 573 ps->disc_uid = current->uid; 574 ps->disc_euid = current->euid; 575 ps->disccontext = NULL; 576 ps->ifclaimed = 0; 577 security_task_getsecid(current, &ps->secid); 578 wmb(); 579 list_add_tail(&ps->list, &dev->filelist); 580 file->private_data = ps; 581 out: 582 unlock_kernel(); 583 out_nolock: 584 return ret; 585 } 586 587 static int usbdev_release(struct inode *inode, struct file *file) 588 { 589 struct dev_state *ps = (struct dev_state *)file->private_data; 590 struct usb_device *dev = ps->dev; 591 unsigned int ifnum; 592 593 usb_lock_device(dev); 594 list_del_init(&ps->list); 595 for (ifnum = 0; ps->ifclaimed && ifnum < 8*sizeof(ps->ifclaimed); 596 ifnum++) { 597 if (test_bit(ifnum, &ps->ifclaimed)) 598 releaseintf(ps, ifnum); 599 } 600 destroy_all_async(ps); 601 usb_unlock_device(dev); 602 usb_put_dev(dev); 603 ps->dev = NULL; 604 kfree(ps); 605 return 0; 606 } 607 608 static int proc_control(struct dev_state *ps, void __user *arg) 609 { 610 struct usb_device *dev = ps->dev; 611 struct usbdevfs_ctrltransfer ctrl; 612 unsigned int tmo; 613 unsigned char *tbuf; 614 int i, j, ret; 615 616 if (copy_from_user(&ctrl, arg, sizeof(ctrl))) 617 return -EFAULT; 618 if ((ret = check_ctrlrecip(ps, ctrl.bRequestType, ctrl.wIndex))) 619 return ret; 620 if (ctrl.wLength > PAGE_SIZE) 621 return -EINVAL; 622 if (!(tbuf = (unsigned char *)__get_free_page(GFP_KERNEL))) 623 return -ENOMEM; 624 tmo = ctrl.timeout; 625 if (ctrl.bRequestType & 0x80) { 626 if (ctrl.wLength && !access_ok(VERIFY_WRITE, ctrl.data, ctrl.wLength)) { 627 free_page((unsigned long)tbuf); 628 return -EINVAL; 629 } 630 snoop(&dev->dev, "control read: bRequest=%02x " 631 "bRrequestType=%02x wValue=%04x " 632 "wIndex=%04x wLength=%04x\n", 633 ctrl.bRequest, ctrl.bRequestType, ctrl.wValue, 634 ctrl.wIndex, ctrl.wLength); 635 636 usb_unlock_device(dev); 637 i = usb_control_msg(dev, usb_rcvctrlpipe(dev, 0), ctrl.bRequest, ctrl.bRequestType, 638 ctrl.wValue, ctrl.wIndex, tbuf, ctrl.wLength, tmo); 639 usb_lock_device(dev); 640 if ((i > 0) && ctrl.wLength) { 641 if (usbfs_snoop) { 642 dev_info(&dev->dev, "control read: data "); 643 for (j = 0; j < i; ++j) 644 printk("%02x ", (unsigned char)(tbuf)[j]); 645 printk("\n"); 646 } 647 if (copy_to_user(ctrl.data, tbuf, i)) { 648 free_page((unsigned long)tbuf); 649 return -EFAULT; 650 } 651 } 652 } else { 653 if (ctrl.wLength) { 654 if (copy_from_user(tbuf, ctrl.data, ctrl.wLength)) { 655 free_page((unsigned long)tbuf); 656 return -EFAULT; 657 } 658 } 659 snoop(&dev->dev, "control write: bRequest=%02x " 660 "bRrequestType=%02x wValue=%04x " 661 "wIndex=%04x wLength=%04x\n", 662 ctrl.bRequest, ctrl.bRequestType, ctrl.wValue, 663 ctrl.wIndex, ctrl.wLength); 664 if (usbfs_snoop) { 665 dev_info(&dev->dev, "control write: data: "); 666 for (j = 0; j < ctrl.wLength; ++j) 667 printk("%02x ", (unsigned char)(tbuf)[j]); 668 printk("\n"); 669 } 670 usb_unlock_device(dev); 671 i = usb_control_msg(dev, usb_sndctrlpipe(dev, 0), ctrl.bRequest, ctrl.bRequestType, 672 ctrl.wValue, ctrl.wIndex, tbuf, ctrl.wLength, tmo); 673 usb_lock_device(dev); 674 } 675 free_page((unsigned long)tbuf); 676 if (i<0 && i != -EPIPE) { 677 dev_printk(KERN_DEBUG, &dev->dev, "usbfs: USBDEVFS_CONTROL " 678 "failed cmd %s rqt %u rq %u len %u ret %d\n", 679 current->comm, ctrl.bRequestType, ctrl.bRequest, 680 ctrl.wLength, i); 681 } 682 return i; 683 } 684 685 static int proc_bulk(struct dev_state *ps, void __user *arg) 686 { 687 struct usb_device *dev = ps->dev; 688 struct usbdevfs_bulktransfer bulk; 689 unsigned int tmo, len1, pipe; 690 int len2; 691 unsigned char *tbuf; 692 int i, j, ret; 693 694 if (copy_from_user(&bulk, arg, sizeof(bulk))) 695 return -EFAULT; 696 if ((ret = findintfep(ps->dev, bulk.ep)) < 0) 697 return ret; 698 if ((ret = checkintf(ps, ret))) 699 return ret; 700 if (bulk.ep & USB_DIR_IN) 701 pipe = usb_rcvbulkpipe(dev, bulk.ep & 0x7f); 702 else 703 pipe = usb_sndbulkpipe(dev, bulk.ep & 0x7f); 704 if (!usb_maxpacket(dev, pipe, !(bulk.ep & USB_DIR_IN))) 705 return -EINVAL; 706 len1 = bulk.len; 707 if (len1 > MAX_USBFS_BUFFER_SIZE) 708 return -EINVAL; 709 if (!(tbuf = kmalloc(len1, GFP_KERNEL))) 710 return -ENOMEM; 711 tmo = bulk.timeout; 712 if (bulk.ep & 0x80) { 713 if (len1 && !access_ok(VERIFY_WRITE, bulk.data, len1)) { 714 kfree(tbuf); 715 return -EINVAL; 716 } 717 snoop(&dev->dev, "bulk read: len=0x%02x timeout=%04d\n", 718 bulk.len, bulk.timeout); 719 usb_unlock_device(dev); 720 i = usb_bulk_msg(dev, pipe, tbuf, len1, &len2, tmo); 721 usb_lock_device(dev); 722 if (!i && len2) { 723 if (usbfs_snoop) { 724 dev_info(&dev->dev, "bulk read: data "); 725 for (j = 0; j < len2; ++j) 726 printk("%02x ", (unsigned char)(tbuf)[j]); 727 printk("\n"); 728 } 729 if (copy_to_user(bulk.data, tbuf, len2)) { 730 kfree(tbuf); 731 return -EFAULT; 732 } 733 } 734 } else { 735 if (len1) { 736 if (copy_from_user(tbuf, bulk.data, len1)) { 737 kfree(tbuf); 738 return -EFAULT; 739 } 740 } 741 snoop(&dev->dev, "bulk write: len=0x%02x timeout=%04d\n", 742 bulk.len, bulk.timeout); 743 if (usbfs_snoop) { 744 dev_info(&dev->dev, "bulk write: data: "); 745 for (j = 0; j < len1; ++j) 746 printk("%02x ", (unsigned char)(tbuf)[j]); 747 printk("\n"); 748 } 749 usb_unlock_device(dev); 750 i = usb_bulk_msg(dev, pipe, tbuf, len1, &len2, tmo); 751 usb_lock_device(dev); 752 } 753 kfree(tbuf); 754 if (i < 0) 755 return i; 756 return len2; 757 } 758 759 static int proc_resetep(struct dev_state *ps, void __user *arg) 760 { 761 unsigned int ep; 762 int ret; 763 764 if (get_user(ep, (unsigned int __user *)arg)) 765 return -EFAULT; 766 if ((ret = findintfep(ps->dev, ep)) < 0) 767 return ret; 768 if ((ret = checkintf(ps, ret))) 769 return ret; 770 usb_settoggle(ps->dev, ep & 0xf, !(ep & USB_DIR_IN), 0); 771 return 0; 772 } 773 774 static int proc_clearhalt(struct dev_state *ps, void __user *arg) 775 { 776 unsigned int ep; 777 int pipe; 778 int ret; 779 780 if (get_user(ep, (unsigned int __user *)arg)) 781 return -EFAULT; 782 if ((ret = findintfep(ps->dev, ep)) < 0) 783 return ret; 784 if ((ret = checkintf(ps, ret))) 785 return ret; 786 if (ep & USB_DIR_IN) 787 pipe = usb_rcvbulkpipe(ps->dev, ep & 0x7f); 788 else 789 pipe = usb_sndbulkpipe(ps->dev, ep & 0x7f); 790 791 return usb_clear_halt(ps->dev, pipe); 792 } 793 794 795 static int proc_getdriver(struct dev_state *ps, void __user *arg) 796 { 797 struct usbdevfs_getdriver gd; 798 struct usb_interface *intf; 799 int ret; 800 801 if (copy_from_user(&gd, arg, sizeof(gd))) 802 return -EFAULT; 803 down_read(&usb_bus_type.subsys.rwsem); 804 intf = usb_ifnum_to_if(ps->dev, gd.interface); 805 if (!intf || !intf->dev.driver) 806 ret = -ENODATA; 807 else { 808 strncpy(gd.driver, intf->dev.driver->name, 809 sizeof(gd.driver)); 810 ret = (copy_to_user(arg, &gd, sizeof(gd)) ? -EFAULT : 0); 811 } 812 up_read(&usb_bus_type.subsys.rwsem); 813 return ret; 814 } 815 816 static int proc_connectinfo(struct dev_state *ps, void __user *arg) 817 { 818 struct usbdevfs_connectinfo ci; 819 820 ci.devnum = ps->dev->devnum; 821 ci.slow = ps->dev->speed == USB_SPEED_LOW; 822 if (copy_to_user(arg, &ci, sizeof(ci))) 823 return -EFAULT; 824 return 0; 825 } 826 827 static int proc_resetdevice(struct dev_state *ps) 828 { 829 return usb_reset_composite_device(ps->dev, NULL); 830 } 831 832 static int proc_setintf(struct dev_state *ps, void __user *arg) 833 { 834 struct usbdevfs_setinterface setintf; 835 int ret; 836 837 if (copy_from_user(&setintf, arg, sizeof(setintf))) 838 return -EFAULT; 839 if ((ret = checkintf(ps, setintf.interface))) 840 return ret; 841 return usb_set_interface(ps->dev, setintf.interface, 842 setintf.altsetting); 843 } 844 845 static int proc_setconfig(struct dev_state *ps, void __user *arg) 846 { 847 unsigned int u; 848 int status = 0; 849 struct usb_host_config *actconfig; 850 851 if (get_user(u, (unsigned int __user *)arg)) 852 return -EFAULT; 853 854 actconfig = ps->dev->actconfig; 855 856 /* Don't touch the device if any interfaces are claimed. 857 * It could interfere with other drivers' operations, and if 858 * an interface is claimed by usbfs it could easily deadlock. 859 */ 860 if (actconfig) { 861 int i; 862 863 for (i = 0; i < actconfig->desc.bNumInterfaces; ++i) { 864 if (usb_interface_claimed(actconfig->interface[i])) { 865 dev_warn (&ps->dev->dev, 866 "usbfs: interface %d claimed by %s " 867 "while '%s' sets config #%d\n", 868 actconfig->interface[i] 869 ->cur_altsetting 870 ->desc.bInterfaceNumber, 871 actconfig->interface[i] 872 ->dev.driver->name, 873 current->comm, u); 874 status = -EBUSY; 875 break; 876 } 877 } 878 } 879 880 /* SET_CONFIGURATION is often abused as a "cheap" driver reset, 881 * so avoid usb_set_configuration()'s kick to sysfs 882 */ 883 if (status == 0) { 884 if (actconfig && actconfig->desc.bConfigurationValue == u) 885 status = usb_reset_configuration(ps->dev); 886 else 887 status = usb_set_configuration(ps->dev, u); 888 } 889 890 return status; 891 } 892 893 static int proc_do_submiturb(struct dev_state *ps, struct usbdevfs_urb *uurb, 894 struct usbdevfs_iso_packet_desc __user *iso_frame_desc, 895 void __user *arg) 896 { 897 struct usbdevfs_iso_packet_desc *isopkt = NULL; 898 struct usb_host_endpoint *ep; 899 struct async *as; 900 struct usb_ctrlrequest *dr = NULL; 901 unsigned int u, totlen, isofrmlen; 902 int ret, interval = 0, ifnum = -1; 903 904 if (uurb->flags & ~(USBDEVFS_URB_ISO_ASAP|USBDEVFS_URB_SHORT_NOT_OK| 905 URB_NO_FSBR|URB_ZERO_PACKET)) 906 return -EINVAL; 907 if (!uurb->buffer) 908 return -EINVAL; 909 if (uurb->signr != 0 && (uurb->signr < SIGRTMIN || uurb->signr > SIGRTMAX)) 910 return -EINVAL; 911 if (!(uurb->type == USBDEVFS_URB_TYPE_CONTROL && (uurb->endpoint & ~USB_ENDPOINT_DIR_MASK) == 0)) { 912 if ((ifnum = findintfep(ps->dev, uurb->endpoint)) < 0) 913 return ifnum; 914 if ((ret = checkintf(ps, ifnum))) 915 return ret; 916 } 917 if ((uurb->endpoint & USB_ENDPOINT_DIR_MASK) != 0) 918 ep = ps->dev->ep_in [uurb->endpoint & USB_ENDPOINT_NUMBER_MASK]; 919 else 920 ep = ps->dev->ep_out [uurb->endpoint & USB_ENDPOINT_NUMBER_MASK]; 921 if (!ep) 922 return -ENOENT; 923 switch(uurb->type) { 924 case USBDEVFS_URB_TYPE_CONTROL: 925 if ((ep->desc.bmAttributes & USB_ENDPOINT_XFERTYPE_MASK) 926 != USB_ENDPOINT_XFER_CONTROL) 927 return -EINVAL; 928 /* min 8 byte setup packet, max 8 byte setup plus an arbitrary data stage */ 929 if (uurb->buffer_length < 8 || uurb->buffer_length > (8 + MAX_USBFS_BUFFER_SIZE)) 930 return -EINVAL; 931 if (!(dr = kmalloc(sizeof(struct usb_ctrlrequest), GFP_KERNEL))) 932 return -ENOMEM; 933 if (copy_from_user(dr, uurb->buffer, 8)) { 934 kfree(dr); 935 return -EFAULT; 936 } 937 if (uurb->buffer_length < (le16_to_cpup(&dr->wLength) + 8)) { 938 kfree(dr); 939 return -EINVAL; 940 } 941 if ((ret = check_ctrlrecip(ps, dr->bRequestType, le16_to_cpup(&dr->wIndex)))) { 942 kfree(dr); 943 return ret; 944 } 945 uurb->endpoint = (uurb->endpoint & ~USB_ENDPOINT_DIR_MASK) | (dr->bRequestType & USB_ENDPOINT_DIR_MASK); 946 uurb->number_of_packets = 0; 947 uurb->buffer_length = le16_to_cpup(&dr->wLength); 948 uurb->buffer += 8; 949 if (!access_ok((uurb->endpoint & USB_DIR_IN) ? VERIFY_WRITE : VERIFY_READ, uurb->buffer, uurb->buffer_length)) { 950 kfree(dr); 951 return -EFAULT; 952 } 953 snoop(&ps->dev->dev, "control urb\n"); 954 break; 955 956 case USBDEVFS_URB_TYPE_BULK: 957 switch (ep->desc.bmAttributes & USB_ENDPOINT_XFERTYPE_MASK) { 958 case USB_ENDPOINT_XFER_CONTROL: 959 case USB_ENDPOINT_XFER_ISOC: 960 return -EINVAL; 961 /* allow single-shot interrupt transfers, at bogus rates */ 962 } 963 uurb->number_of_packets = 0; 964 if (uurb->buffer_length > MAX_USBFS_BUFFER_SIZE) 965 return -EINVAL; 966 if (!access_ok((uurb->endpoint & USB_DIR_IN) ? VERIFY_WRITE : VERIFY_READ, uurb->buffer, uurb->buffer_length)) 967 return -EFAULT; 968 snoop(&ps->dev->dev, "bulk urb\n"); 969 break; 970 971 case USBDEVFS_URB_TYPE_ISO: 972 /* arbitrary limit */ 973 if (uurb->number_of_packets < 1 || uurb->number_of_packets > 128) 974 return -EINVAL; 975 if ((ep->desc.bmAttributes & USB_ENDPOINT_XFERTYPE_MASK) 976 != USB_ENDPOINT_XFER_ISOC) 977 return -EINVAL; 978 interval = 1 << min (15, ep->desc.bInterval - 1); 979 isofrmlen = sizeof(struct usbdevfs_iso_packet_desc) * uurb->number_of_packets; 980 if (!(isopkt = kmalloc(isofrmlen, GFP_KERNEL))) 981 return -ENOMEM; 982 if (copy_from_user(isopkt, iso_frame_desc, isofrmlen)) { 983 kfree(isopkt); 984 return -EFAULT; 985 } 986 for (totlen = u = 0; u < uurb->number_of_packets; u++) { 987 /* arbitrary limit, sufficient for USB 2.0 high-bandwidth iso */ 988 if (isopkt[u].length > 8192) { 989 kfree(isopkt); 990 return -EINVAL; 991 } 992 totlen += isopkt[u].length; 993 } 994 if (totlen > 32768) { 995 kfree(isopkt); 996 return -EINVAL; 997 } 998 uurb->buffer_length = totlen; 999 snoop(&ps->dev->dev, "iso urb\n"); 1000 break; 1001 1002 case USBDEVFS_URB_TYPE_INTERRUPT: 1003 uurb->number_of_packets = 0; 1004 if ((ep->desc.bmAttributes & USB_ENDPOINT_XFERTYPE_MASK) 1005 != USB_ENDPOINT_XFER_INT) 1006 return -EINVAL; 1007 if (ps->dev->speed == USB_SPEED_HIGH) 1008 interval = 1 << min (15, ep->desc.bInterval - 1); 1009 else 1010 interval = ep->desc.bInterval; 1011 if (uurb->buffer_length > MAX_USBFS_BUFFER_SIZE) 1012 return -EINVAL; 1013 if (!access_ok((uurb->endpoint & USB_DIR_IN) ? VERIFY_WRITE : VERIFY_READ, uurb->buffer, uurb->buffer_length)) 1014 return -EFAULT; 1015 snoop(&ps->dev->dev, "interrupt urb\n"); 1016 break; 1017 1018 default: 1019 return -EINVAL; 1020 } 1021 if (!(as = alloc_async(uurb->number_of_packets))) { 1022 kfree(isopkt); 1023 kfree(dr); 1024 return -ENOMEM; 1025 } 1026 if (!(as->urb->transfer_buffer = kmalloc(uurb->buffer_length, GFP_KERNEL))) { 1027 kfree(isopkt); 1028 kfree(dr); 1029 free_async(as); 1030 return -ENOMEM; 1031 } 1032 as->urb->dev = ps->dev; 1033 as->urb->pipe = (uurb->type << 30) | __create_pipe(ps->dev, uurb->endpoint & 0xf) | (uurb->endpoint & USB_DIR_IN); 1034 as->urb->transfer_flags = uurb->flags; 1035 as->urb->transfer_buffer_length = uurb->buffer_length; 1036 as->urb->setup_packet = (unsigned char*)dr; 1037 as->urb->start_frame = uurb->start_frame; 1038 as->urb->number_of_packets = uurb->number_of_packets; 1039 as->urb->interval = interval; 1040 as->urb->context = as; 1041 as->urb->complete = async_completed; 1042 for (totlen = u = 0; u < uurb->number_of_packets; u++) { 1043 as->urb->iso_frame_desc[u].offset = totlen; 1044 as->urb->iso_frame_desc[u].length = isopkt[u].length; 1045 totlen += isopkt[u].length; 1046 } 1047 kfree(isopkt); 1048 as->ps = ps; 1049 as->userurb = arg; 1050 if (uurb->endpoint & USB_DIR_IN) 1051 as->userbuffer = uurb->buffer; 1052 else 1053 as->userbuffer = NULL; 1054 as->signr = uurb->signr; 1055 as->ifnum = ifnum; 1056 as->pid = current->pid; 1057 as->uid = current->uid; 1058 as->euid = current->euid; 1059 security_task_getsecid(current, &as->secid); 1060 if (!(uurb->endpoint & USB_DIR_IN)) { 1061 if (copy_from_user(as->urb->transfer_buffer, uurb->buffer, as->urb->transfer_buffer_length)) { 1062 free_async(as); 1063 return -EFAULT; 1064 } 1065 } 1066 snoop(&as->urb->dev->dev, "submit urb\n"); 1067 snoop_urb(as->urb, as->userurb); 1068 async_newpending(as); 1069 if ((ret = usb_submit_urb(as->urb, GFP_KERNEL))) { 1070 dev_printk(KERN_DEBUG, &ps->dev->dev, "usbfs: usb_submit_urb returned %d\n", ret); 1071 async_removepending(as); 1072 free_async(as); 1073 return ret; 1074 } 1075 return 0; 1076 } 1077 1078 static int proc_submiturb(struct dev_state *ps, void __user *arg) 1079 { 1080 struct usbdevfs_urb uurb; 1081 1082 if (copy_from_user(&uurb, arg, sizeof(uurb))) 1083 return -EFAULT; 1084 1085 return proc_do_submiturb(ps, &uurb, (((struct usbdevfs_urb __user *)arg)->iso_frame_desc), arg); 1086 } 1087 1088 static int proc_unlinkurb(struct dev_state *ps, void __user *arg) 1089 { 1090 struct async *as; 1091 1092 as = async_getpending(ps, arg); 1093 if (!as) 1094 return -EINVAL; 1095 usb_kill_urb(as->urb); 1096 return 0; 1097 } 1098 1099 static int processcompl(struct async *as, void __user * __user *arg) 1100 { 1101 struct urb *urb = as->urb; 1102 struct usbdevfs_urb __user *userurb = as->userurb; 1103 void __user *addr = as->userurb; 1104 unsigned int i; 1105 1106 if (as->userbuffer) 1107 if (copy_to_user(as->userbuffer, urb->transfer_buffer, urb->transfer_buffer_length)) 1108 return -EFAULT; 1109 if (put_user(urb->status, &userurb->status)) 1110 return -EFAULT; 1111 if (put_user(urb->actual_length, &userurb->actual_length)) 1112 return -EFAULT; 1113 if (put_user(urb->error_count, &userurb->error_count)) 1114 return -EFAULT; 1115 1116 if (usb_pipeisoc(urb->pipe)) { 1117 for (i = 0; i < urb->number_of_packets; i++) { 1118 if (put_user(urb->iso_frame_desc[i].actual_length, 1119 &userurb->iso_frame_desc[i].actual_length)) 1120 return -EFAULT; 1121 if (put_user(urb->iso_frame_desc[i].status, 1122 &userurb->iso_frame_desc[i].status)) 1123 return -EFAULT; 1124 } 1125 } 1126 1127 free_async(as); 1128 1129 if (put_user(addr, (void __user * __user *)arg)) 1130 return -EFAULT; 1131 return 0; 1132 } 1133 1134 static struct async* reap_as(struct dev_state *ps) 1135 { 1136 DECLARE_WAITQUEUE(wait, current); 1137 struct async *as = NULL; 1138 struct usb_device *dev = ps->dev; 1139 1140 add_wait_queue(&ps->wait, &wait); 1141 for (;;) { 1142 __set_current_state(TASK_INTERRUPTIBLE); 1143 if ((as = async_getcompleted(ps))) 1144 break; 1145 if (signal_pending(current)) 1146 break; 1147 usb_unlock_device(dev); 1148 schedule(); 1149 usb_lock_device(dev); 1150 } 1151 remove_wait_queue(&ps->wait, &wait); 1152 set_current_state(TASK_RUNNING); 1153 return as; 1154 } 1155 1156 static int proc_reapurb(struct dev_state *ps, void __user *arg) 1157 { 1158 struct async *as = reap_as(ps); 1159 if (as) 1160 return processcompl(as, (void __user * __user *)arg); 1161 if (signal_pending(current)) 1162 return -EINTR; 1163 return -EIO; 1164 } 1165 1166 static int proc_reapurbnonblock(struct dev_state *ps, void __user *arg) 1167 { 1168 struct async *as; 1169 1170 if (!(as = async_getcompleted(ps))) 1171 return -EAGAIN; 1172 return processcompl(as, (void __user * __user *)arg); 1173 } 1174 1175 #ifdef CONFIG_COMPAT 1176 1177 static int get_urb32(struct usbdevfs_urb *kurb, 1178 struct usbdevfs_urb32 __user *uurb) 1179 { 1180 __u32 uptr; 1181 if (get_user(kurb->type, &uurb->type) || 1182 __get_user(kurb->endpoint, &uurb->endpoint) || 1183 __get_user(kurb->status, &uurb->status) || 1184 __get_user(kurb->flags, &uurb->flags) || 1185 __get_user(kurb->buffer_length, &uurb->buffer_length) || 1186 __get_user(kurb->actual_length, &uurb->actual_length) || 1187 __get_user(kurb->start_frame, &uurb->start_frame) || 1188 __get_user(kurb->number_of_packets, &uurb->number_of_packets) || 1189 __get_user(kurb->error_count, &uurb->error_count) || 1190 __get_user(kurb->signr, &uurb->signr)) 1191 return -EFAULT; 1192 1193 if (__get_user(uptr, &uurb->buffer)) 1194 return -EFAULT; 1195 kurb->buffer = compat_ptr(uptr); 1196 if (__get_user(uptr, &uurb->buffer)) 1197 return -EFAULT; 1198 kurb->usercontext = compat_ptr(uptr); 1199 1200 return 0; 1201 } 1202 1203 static int proc_submiturb_compat(struct dev_state *ps, void __user *arg) 1204 { 1205 struct usbdevfs_urb uurb; 1206 1207 if (get_urb32(&uurb,(struct usbdevfs_urb32 *)arg)) 1208 return -EFAULT; 1209 1210 return proc_do_submiturb(ps, &uurb, ((struct usbdevfs_urb32 __user *)arg)->iso_frame_desc, arg); 1211 } 1212 1213 static int processcompl_compat(struct async *as, void __user * __user *arg) 1214 { 1215 struct urb *urb = as->urb; 1216 struct usbdevfs_urb32 __user *userurb = as->userurb; 1217 void __user *addr = as->userurb; 1218 unsigned int i; 1219 1220 if (as->userbuffer) 1221 if (copy_to_user(as->userbuffer, urb->transfer_buffer, urb->transfer_buffer_length)) 1222 return -EFAULT; 1223 if (put_user(urb->status, &userurb->status)) 1224 return -EFAULT; 1225 if (put_user(urb->actual_length, &userurb->actual_length)) 1226 return -EFAULT; 1227 if (put_user(urb->error_count, &userurb->error_count)) 1228 return -EFAULT; 1229 1230 if (usb_pipeisoc(urb->pipe)) { 1231 for (i = 0; i < urb->number_of_packets; i++) { 1232 if (put_user(urb->iso_frame_desc[i].actual_length, 1233 &userurb->iso_frame_desc[i].actual_length)) 1234 return -EFAULT; 1235 if (put_user(urb->iso_frame_desc[i].status, 1236 &userurb->iso_frame_desc[i].status)) 1237 return -EFAULT; 1238 } 1239 } 1240 1241 free_async(as); 1242 if (put_user((u32)(u64)addr, (u32 __user *)arg)) 1243 return -EFAULT; 1244 return 0; 1245 } 1246 1247 static int proc_reapurb_compat(struct dev_state *ps, void __user *arg) 1248 { 1249 struct async *as = reap_as(ps); 1250 if (as) 1251 return processcompl_compat(as, (void __user * __user *)arg); 1252 if (signal_pending(current)) 1253 return -EINTR; 1254 return -EIO; 1255 } 1256 1257 static int proc_reapurbnonblock_compat(struct dev_state *ps, void __user *arg) 1258 { 1259 struct async *as; 1260 1261 if (!(as = async_getcompleted(ps))) 1262 return -EAGAIN; 1263 return processcompl_compat(as, (void __user * __user *)arg); 1264 } 1265 1266 #endif 1267 1268 static int proc_disconnectsignal(struct dev_state *ps, void __user *arg) 1269 { 1270 struct usbdevfs_disconnectsignal ds; 1271 1272 if (copy_from_user(&ds, arg, sizeof(ds))) 1273 return -EFAULT; 1274 if (ds.signr != 0 && (ds.signr < SIGRTMIN || ds.signr > SIGRTMAX)) 1275 return -EINVAL; 1276 ps->discsignr = ds.signr; 1277 ps->disccontext = ds.context; 1278 return 0; 1279 } 1280 1281 static int proc_claiminterface(struct dev_state *ps, void __user *arg) 1282 { 1283 unsigned int ifnum; 1284 1285 if (get_user(ifnum, (unsigned int __user *)arg)) 1286 return -EFAULT; 1287 return claimintf(ps, ifnum); 1288 } 1289 1290 static int proc_releaseinterface(struct dev_state *ps, void __user *arg) 1291 { 1292 unsigned int ifnum; 1293 int ret; 1294 1295 if (get_user(ifnum, (unsigned int __user *)arg)) 1296 return -EFAULT; 1297 if ((ret = releaseintf(ps, ifnum)) < 0) 1298 return ret; 1299 destroy_async_on_interface (ps, ifnum); 1300 return 0; 1301 } 1302 1303 static int proc_ioctl(struct dev_state *ps, struct usbdevfs_ioctl *ctl) 1304 { 1305 int size; 1306 void *buf = NULL; 1307 int retval = 0; 1308 struct usb_interface *intf = NULL; 1309 struct usb_driver *driver = NULL; 1310 1311 /* alloc buffer */ 1312 if ((size = _IOC_SIZE (ctl->ioctl_code)) > 0) { 1313 if ((buf = kmalloc (size, GFP_KERNEL)) == NULL) 1314 return -ENOMEM; 1315 if ((_IOC_DIR(ctl->ioctl_code) & _IOC_WRITE)) { 1316 if (copy_from_user (buf, ctl->data, size)) { 1317 kfree(buf); 1318 return -EFAULT; 1319 } 1320 } else { 1321 memset (buf, 0, size); 1322 } 1323 } 1324 1325 if (!connected(ps->dev)) { 1326 kfree(buf); 1327 return -ENODEV; 1328 } 1329 1330 if (ps->dev->state != USB_STATE_CONFIGURED) 1331 retval = -EHOSTUNREACH; 1332 else if (!(intf = usb_ifnum_to_if (ps->dev, ctl->ifno))) 1333 retval = -EINVAL; 1334 else switch (ctl->ioctl_code) { 1335 1336 /* disconnect kernel driver from interface */ 1337 case USBDEVFS_DISCONNECT: 1338 1339 down_write(&usb_bus_type.subsys.rwsem); 1340 if (intf->dev.driver) { 1341 driver = to_usb_driver(intf->dev.driver); 1342 dev_dbg (&intf->dev, "disconnect by usbfs\n"); 1343 usb_driver_release_interface(driver, intf); 1344 } else 1345 retval = -ENODATA; 1346 up_write(&usb_bus_type.subsys.rwsem); 1347 break; 1348 1349 /* let kernel drivers try to (re)bind to the interface */ 1350 case USBDEVFS_CONNECT: 1351 usb_unlock_device(ps->dev); 1352 bus_rescan_devices(intf->dev.bus); 1353 usb_lock_device(ps->dev); 1354 break; 1355 1356 /* talk directly to the interface's driver */ 1357 default: 1358 down_read(&usb_bus_type.subsys.rwsem); 1359 if (intf->dev.driver) 1360 driver = to_usb_driver(intf->dev.driver); 1361 if (driver == NULL || driver->ioctl == NULL) { 1362 retval = -ENOTTY; 1363 } else { 1364 retval = driver->ioctl (intf, ctl->ioctl_code, buf); 1365 if (retval == -ENOIOCTLCMD) 1366 retval = -ENOTTY; 1367 } 1368 up_read(&usb_bus_type.subsys.rwsem); 1369 } 1370 1371 /* cleanup and return */ 1372 if (retval >= 0 1373 && (_IOC_DIR (ctl->ioctl_code) & _IOC_READ) != 0 1374 && size > 0 1375 && copy_to_user (ctl->data, buf, size) != 0) 1376 retval = -EFAULT; 1377 1378 kfree(buf); 1379 return retval; 1380 } 1381 1382 static int proc_ioctl_default(struct dev_state *ps, void __user *arg) 1383 { 1384 struct usbdevfs_ioctl ctrl; 1385 1386 if (copy_from_user(&ctrl, arg, sizeof (ctrl))) 1387 return -EFAULT; 1388 return proc_ioctl(ps, &ctrl); 1389 } 1390 1391 #ifdef CONFIG_COMPAT 1392 static int proc_ioctl_compat(struct dev_state *ps, compat_uptr_t arg) 1393 { 1394 struct usbdevfs_ioctl32 __user *uioc; 1395 struct usbdevfs_ioctl ctrl; 1396 u32 udata; 1397 1398 uioc = compat_ptr((long)arg); 1399 if (get_user(ctrl.ifno, &uioc->ifno) || 1400 get_user(ctrl.ioctl_code, &uioc->ioctl_code) || 1401 __get_user(udata, &uioc->data)) 1402 return -EFAULT; 1403 ctrl.data = compat_ptr(udata); 1404 1405 return proc_ioctl(ps, &ctrl); 1406 } 1407 #endif 1408 1409 /* 1410 * NOTE: All requests here that have interface numbers as parameters 1411 * are assuming that somehow the configuration has been prevented from 1412 * changing. But there's no mechanism to ensure that... 1413 */ 1414 static int usbdev_ioctl(struct inode *inode, struct file *file, unsigned int cmd, unsigned long arg) 1415 { 1416 struct dev_state *ps = (struct dev_state *)file->private_data; 1417 struct usb_device *dev = ps->dev; 1418 void __user *p = (void __user *)arg; 1419 int ret = -ENOTTY; 1420 1421 if (!(file->f_mode & FMODE_WRITE)) 1422 return -EPERM; 1423 usb_lock_device(dev); 1424 if (!connected(dev)) { 1425 usb_unlock_device(dev); 1426 return -ENODEV; 1427 } 1428 1429 switch (cmd) { 1430 case USBDEVFS_CONTROL: 1431 snoop(&dev->dev, "%s: CONTROL\n", __FUNCTION__); 1432 ret = proc_control(ps, p); 1433 if (ret >= 0) 1434 inode->i_mtime = CURRENT_TIME; 1435 break; 1436 1437 case USBDEVFS_BULK: 1438 snoop(&dev->dev, "%s: BULK\n", __FUNCTION__); 1439 ret = proc_bulk(ps, p); 1440 if (ret >= 0) 1441 inode->i_mtime = CURRENT_TIME; 1442 break; 1443 1444 case USBDEVFS_RESETEP: 1445 snoop(&dev->dev, "%s: RESETEP\n", __FUNCTION__); 1446 ret = proc_resetep(ps, p); 1447 if (ret >= 0) 1448 inode->i_mtime = CURRENT_TIME; 1449 break; 1450 1451 case USBDEVFS_RESET: 1452 snoop(&dev->dev, "%s: RESET\n", __FUNCTION__); 1453 ret = proc_resetdevice(ps); 1454 break; 1455 1456 case USBDEVFS_CLEAR_HALT: 1457 snoop(&dev->dev, "%s: CLEAR_HALT\n", __FUNCTION__); 1458 ret = proc_clearhalt(ps, p); 1459 if (ret >= 0) 1460 inode->i_mtime = CURRENT_TIME; 1461 break; 1462 1463 case USBDEVFS_GETDRIVER: 1464 snoop(&dev->dev, "%s: GETDRIVER\n", __FUNCTION__); 1465 ret = proc_getdriver(ps, p); 1466 break; 1467 1468 case USBDEVFS_CONNECTINFO: 1469 snoop(&dev->dev, "%s: CONNECTINFO\n", __FUNCTION__); 1470 ret = proc_connectinfo(ps, p); 1471 break; 1472 1473 case USBDEVFS_SETINTERFACE: 1474 snoop(&dev->dev, "%s: SETINTERFACE\n", __FUNCTION__); 1475 ret = proc_setintf(ps, p); 1476 break; 1477 1478 case USBDEVFS_SETCONFIGURATION: 1479 snoop(&dev->dev, "%s: SETCONFIGURATION\n", __FUNCTION__); 1480 ret = proc_setconfig(ps, p); 1481 break; 1482 1483 case USBDEVFS_SUBMITURB: 1484 snoop(&dev->dev, "%s: SUBMITURB\n", __FUNCTION__); 1485 ret = proc_submiturb(ps, p); 1486 if (ret >= 0) 1487 inode->i_mtime = CURRENT_TIME; 1488 break; 1489 1490 #ifdef CONFIG_COMPAT 1491 1492 case USBDEVFS_SUBMITURB32: 1493 snoop(&dev->dev, "%s: SUBMITURB32\n", __FUNCTION__); 1494 ret = proc_submiturb_compat(ps, p); 1495 if (ret >= 0) 1496 inode->i_mtime = CURRENT_TIME; 1497 break; 1498 1499 case USBDEVFS_REAPURB32: 1500 snoop(&dev->dev, "%s: REAPURB32\n", __FUNCTION__); 1501 ret = proc_reapurb_compat(ps, p); 1502 break; 1503 1504 case USBDEVFS_REAPURBNDELAY32: 1505 snoop(&dev->dev, "%s: REAPURBDELAY32\n", __FUNCTION__); 1506 ret = proc_reapurbnonblock_compat(ps, p); 1507 break; 1508 1509 case USBDEVFS_IOCTL32: 1510 snoop(&dev->dev, "%s: IOCTL\n", __FUNCTION__); 1511 ret = proc_ioctl_compat(ps, (compat_uptr_t)(long)p); 1512 break; 1513 #endif 1514 1515 case USBDEVFS_DISCARDURB: 1516 snoop(&dev->dev, "%s: DISCARDURB\n", __FUNCTION__); 1517 ret = proc_unlinkurb(ps, p); 1518 break; 1519 1520 case USBDEVFS_REAPURB: 1521 snoop(&dev->dev, "%s: REAPURB\n", __FUNCTION__); 1522 ret = proc_reapurb(ps, p); 1523 break; 1524 1525 case USBDEVFS_REAPURBNDELAY: 1526 snoop(&dev->dev, "%s: REAPURBDELAY\n", __FUNCTION__); 1527 ret = proc_reapurbnonblock(ps, p); 1528 break; 1529 1530 case USBDEVFS_DISCSIGNAL: 1531 snoop(&dev->dev, "%s: DISCSIGNAL\n", __FUNCTION__); 1532 ret = proc_disconnectsignal(ps, p); 1533 break; 1534 1535 case USBDEVFS_CLAIMINTERFACE: 1536 snoop(&dev->dev, "%s: CLAIMINTERFACE\n", __FUNCTION__); 1537 ret = proc_claiminterface(ps, p); 1538 break; 1539 1540 case USBDEVFS_RELEASEINTERFACE: 1541 snoop(&dev->dev, "%s: RELEASEINTERFACE\n", __FUNCTION__); 1542 ret = proc_releaseinterface(ps, p); 1543 break; 1544 1545 case USBDEVFS_IOCTL: 1546 snoop(&dev->dev, "%s: IOCTL\n", __FUNCTION__); 1547 ret = proc_ioctl_default(ps, p); 1548 break; 1549 } 1550 usb_unlock_device(dev); 1551 if (ret >= 0) 1552 inode->i_atime = CURRENT_TIME; 1553 return ret; 1554 } 1555 1556 /* No kernel lock - fine */ 1557 static unsigned int usbdev_poll(struct file *file, struct poll_table_struct *wait) 1558 { 1559 struct dev_state *ps = (struct dev_state *)file->private_data; 1560 unsigned int mask = 0; 1561 1562 poll_wait(file, &ps->wait, wait); 1563 if (file->f_mode & FMODE_WRITE && !list_empty(&ps->async_completed)) 1564 mask |= POLLOUT | POLLWRNORM; 1565 if (!connected(ps->dev)) 1566 mask |= POLLERR | POLLHUP; 1567 return mask; 1568 } 1569 1570 struct file_operations usbfs_device_file_operations = { 1571 .llseek = usbdev_lseek, 1572 .read = usbdev_read, 1573 .poll = usbdev_poll, 1574 .ioctl = usbdev_ioctl, 1575 .open = usbdev_open, 1576 .release = usbdev_release, 1577 }; 1578 1579 static void usbdev_add(struct usb_device *dev) 1580 { 1581 int minor = ((dev->bus->busnum-1) * 128) + (dev->devnum-1); 1582 1583 dev->usbfs_dev = device_create(usb_device_class, &dev->dev, 1584 MKDEV(USB_DEVICE_MAJOR, minor), 1585 "usbdev%d.%d", dev->bus->busnum, dev->devnum); 1586 1587 dev->usbfs_dev->platform_data = dev; 1588 } 1589 1590 static void usbdev_remove(struct usb_device *dev) 1591 { 1592 device_unregister(dev->usbfs_dev); 1593 } 1594 1595 static int usbdev_notify(struct notifier_block *self, unsigned long action, 1596 void *dev) 1597 { 1598 switch (action) { 1599 case USB_DEVICE_ADD: 1600 usbdev_add(dev); 1601 break; 1602 case USB_DEVICE_REMOVE: 1603 usbdev_remove(dev); 1604 break; 1605 } 1606 return NOTIFY_OK; 1607 } 1608 1609 static struct notifier_block usbdev_nb = { 1610 .notifier_call = usbdev_notify, 1611 }; 1612 1613 static struct cdev usb_device_cdev = { 1614 .kobj = {.name = "usb_device", }, 1615 .owner = THIS_MODULE, 1616 }; 1617 1618 int __init usbdev_init(void) 1619 { 1620 int retval; 1621 1622 retval = register_chrdev_region(USB_DEVICE_DEV, USB_DEVICE_MAX, 1623 "usb_device"); 1624 if (retval) { 1625 err("unable to register minors for usb_device"); 1626 goto out; 1627 } 1628 cdev_init(&usb_device_cdev, &usbfs_device_file_operations); 1629 retval = cdev_add(&usb_device_cdev, USB_DEVICE_DEV, USB_DEVICE_MAX); 1630 if (retval) { 1631 err("unable to get usb_device major %d", USB_DEVICE_MAJOR); 1632 goto error_cdev; 1633 } 1634 usb_device_class = class_create(THIS_MODULE, "usb_device"); 1635 if (IS_ERR(usb_device_class)) { 1636 err("unable to register usb_device class"); 1637 retval = PTR_ERR(usb_device_class); 1638 goto error_class; 1639 } 1640 1641 usb_register_notify(&usbdev_nb); 1642 1643 out: 1644 return retval; 1645 1646 error_class: 1647 usb_device_class = NULL; 1648 cdev_del(&usb_device_cdev); 1649 1650 error_cdev: 1651 unregister_chrdev_region(USB_DEVICE_DEV, USB_DEVICE_MAX); 1652 goto out; 1653 } 1654 1655 void usbdev_cleanup(void) 1656 { 1657 usb_unregister_notify(&usbdev_nb); 1658 class_destroy(usb_device_class); 1659 cdev_del(&usb_device_cdev); 1660 unregister_chrdev_region(USB_DEVICE_DEV, USB_DEVICE_MAX); 1661 } 1662 1663