1 /*****************************************************************************/ 2 3 /* 4 * devio.c -- User space communication with USB devices. 5 * 6 * Copyright (C) 1999-2000 Thomas Sailer (sailer@ife.ee.ethz.ch) 7 * 8 * This program is free software; you can redistribute it and/or modify 9 * it under the terms of the GNU General Public License as published by 10 * the Free Software Foundation; either version 2 of the License, or 11 * (at your option) any later version. 12 * 13 * This program is distributed in the hope that it will be useful, 14 * but WITHOUT ANY WARRANTY; without even the implied warranty of 15 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the 16 * GNU General Public License for more details. 17 * 18 * You should have received a copy of the GNU General Public License 19 * along with this program; if not, write to the Free Software 20 * Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA. 21 * 22 * $Id: devio.c,v 1.7 2000/02/01 17:28:48 fliegl Exp $ 23 * 24 * This file implements the usbfs/x/y files, where 25 * x is the bus number and y the device number. 26 * 27 * It allows user space programs/"drivers" to communicate directly 28 * with USB devices without intervening kernel driver. 29 * 30 * Revision history 31 * 22.12.1999 0.1 Initial release (split from proc_usb.c) 32 * 04.01.2000 0.2 Turned into its own filesystem 33 * 30.09.2005 0.3 Fix user-triggerable oops in async URB delivery 34 * (CAN-2005-3055) 35 */ 36 37 /*****************************************************************************/ 38 39 #include <linux/fs.h> 40 #include <linux/mm.h> 41 #include <linux/slab.h> 42 #include <linux/smp_lock.h> 43 #include <linux/signal.h> 44 #include <linux/poll.h> 45 #include <linux/module.h> 46 #include <linux/usb.h> 47 #include <linux/usbdevice_fs.h> 48 #include <linux/cdev.h> 49 #include <linux/notifier.h> 50 #include <linux/security.h> 51 #include <asm/uaccess.h> 52 #include <asm/byteorder.h> 53 #include <linux/moduleparam.h> 54 55 #include "hcd.h" /* for usbcore internals */ 56 #include "usb.h" 57 58 #define USB_MAXBUS 64 59 #define USB_DEVICE_MAX USB_MAXBUS * 128 60 61 /* Mutual exclusion for removal, open, and release */ 62 DEFINE_MUTEX(usbfs_mutex); 63 64 struct async { 65 struct list_head asynclist; 66 struct dev_state *ps; 67 struct pid *pid; 68 uid_t uid, euid; 69 unsigned int signr; 70 unsigned int ifnum; 71 void __user *userbuffer; 72 void __user *userurb; 73 struct urb *urb; 74 int status; 75 u32 secid; 76 }; 77 78 static int usbfs_snoop = 0; 79 module_param (usbfs_snoop, bool, S_IRUGO | S_IWUSR); 80 MODULE_PARM_DESC (usbfs_snoop, "true to log all usbfs traffic"); 81 82 #define snoop(dev, format, arg...) \ 83 do { \ 84 if (usbfs_snoop) \ 85 dev_info( dev , format , ## arg); \ 86 } while (0) 87 88 #define USB_DEVICE_DEV MKDEV(USB_DEVICE_MAJOR, 0) 89 90 91 #define MAX_USBFS_BUFFER_SIZE 16384 92 93 static inline int connected (struct dev_state *ps) 94 { 95 return (!list_empty(&ps->list) && 96 ps->dev->state != USB_STATE_NOTATTACHED); 97 } 98 99 static loff_t usbdev_lseek(struct file *file, loff_t offset, int orig) 100 { 101 loff_t ret; 102 103 lock_kernel(); 104 105 switch (orig) { 106 case 0: 107 file->f_pos = offset; 108 ret = file->f_pos; 109 break; 110 case 1: 111 file->f_pos += offset; 112 ret = file->f_pos; 113 break; 114 case 2: 115 default: 116 ret = -EINVAL; 117 } 118 119 unlock_kernel(); 120 return ret; 121 } 122 123 static ssize_t usbdev_read(struct file *file, char __user *buf, size_t nbytes, loff_t *ppos) 124 { 125 struct dev_state *ps = file->private_data; 126 struct usb_device *dev = ps->dev; 127 ssize_t ret = 0; 128 unsigned len; 129 loff_t pos; 130 int i; 131 132 pos = *ppos; 133 usb_lock_device(dev); 134 if (!connected(ps)) { 135 ret = -ENODEV; 136 goto err; 137 } else if (pos < 0) { 138 ret = -EINVAL; 139 goto err; 140 } 141 142 if (pos < sizeof(struct usb_device_descriptor)) { 143 struct usb_device_descriptor temp_desc ; /* 18 bytes - fits on the stack */ 144 145 memcpy(&temp_desc, &dev->descriptor, sizeof(dev->descriptor)); 146 le16_to_cpus(&temp_desc.bcdUSB); 147 le16_to_cpus(&temp_desc.idVendor); 148 le16_to_cpus(&temp_desc.idProduct); 149 le16_to_cpus(&temp_desc.bcdDevice); 150 151 len = sizeof(struct usb_device_descriptor) - pos; 152 if (len > nbytes) 153 len = nbytes; 154 if (copy_to_user(buf, ((char *)&temp_desc) + pos, len)) { 155 ret = -EFAULT; 156 goto err; 157 } 158 159 *ppos += len; 160 buf += len; 161 nbytes -= len; 162 ret += len; 163 } 164 165 pos = sizeof(struct usb_device_descriptor); 166 for (i = 0; nbytes && i < dev->descriptor.bNumConfigurations; i++) { 167 struct usb_config_descriptor *config = 168 (struct usb_config_descriptor *)dev->rawdescriptors[i]; 169 unsigned int length = le16_to_cpu(config->wTotalLength); 170 171 if (*ppos < pos + length) { 172 173 /* The descriptor may claim to be longer than it 174 * really is. Here is the actual allocated length. */ 175 unsigned alloclen = 176 le16_to_cpu(dev->config[i].desc.wTotalLength); 177 178 len = length - (*ppos - pos); 179 if (len > nbytes) 180 len = nbytes; 181 182 /* Simply don't write (skip over) unallocated parts */ 183 if (alloclen > (*ppos - pos)) { 184 alloclen -= (*ppos - pos); 185 if (copy_to_user(buf, 186 dev->rawdescriptors[i] + (*ppos - pos), 187 min(len, alloclen))) { 188 ret = -EFAULT; 189 goto err; 190 } 191 } 192 193 *ppos += len; 194 buf += len; 195 nbytes -= len; 196 ret += len; 197 } 198 199 pos += length; 200 } 201 202 err: 203 usb_unlock_device(dev); 204 return ret; 205 } 206 207 /* 208 * async list handling 209 */ 210 211 static struct async *alloc_async(unsigned int numisoframes) 212 { 213 unsigned int assize = sizeof(struct async) + numisoframes * sizeof(struct usb_iso_packet_descriptor); 214 struct async *as = kzalloc(assize, GFP_KERNEL); 215 216 if (!as) 217 return NULL; 218 as->urb = usb_alloc_urb(numisoframes, GFP_KERNEL); 219 if (!as->urb) { 220 kfree(as); 221 return NULL; 222 } 223 return as; 224 } 225 226 static void free_async(struct async *as) 227 { 228 put_pid(as->pid); 229 kfree(as->urb->transfer_buffer); 230 kfree(as->urb->setup_packet); 231 usb_free_urb(as->urb); 232 kfree(as); 233 } 234 235 static inline void async_newpending(struct async *as) 236 { 237 struct dev_state *ps = as->ps; 238 unsigned long flags; 239 240 spin_lock_irqsave(&ps->lock, flags); 241 list_add_tail(&as->asynclist, &ps->async_pending); 242 spin_unlock_irqrestore(&ps->lock, flags); 243 } 244 245 static inline void async_removepending(struct async *as) 246 { 247 struct dev_state *ps = as->ps; 248 unsigned long flags; 249 250 spin_lock_irqsave(&ps->lock, flags); 251 list_del_init(&as->asynclist); 252 spin_unlock_irqrestore(&ps->lock, flags); 253 } 254 255 static inline struct async *async_getcompleted(struct dev_state *ps) 256 { 257 unsigned long flags; 258 struct async *as = NULL; 259 260 spin_lock_irqsave(&ps->lock, flags); 261 if (!list_empty(&ps->async_completed)) { 262 as = list_entry(ps->async_completed.next, struct async, asynclist); 263 list_del_init(&as->asynclist); 264 } 265 spin_unlock_irqrestore(&ps->lock, flags); 266 return as; 267 } 268 269 static inline struct async *async_getpending(struct dev_state *ps, void __user *userurb) 270 { 271 unsigned long flags; 272 struct async *as; 273 274 spin_lock_irqsave(&ps->lock, flags); 275 list_for_each_entry(as, &ps->async_pending, asynclist) 276 if (as->userurb == userurb) { 277 list_del_init(&as->asynclist); 278 spin_unlock_irqrestore(&ps->lock, flags); 279 return as; 280 } 281 spin_unlock_irqrestore(&ps->lock, flags); 282 return NULL; 283 } 284 285 static void snoop_urb(struct urb *urb, void __user *userurb) 286 { 287 int j; 288 unsigned char *data = urb->transfer_buffer; 289 290 if (!usbfs_snoop) 291 return; 292 293 dev_info(&urb->dev->dev, "direction=%s\n", 294 usb_urb_dir_in(urb) ? "IN" : "OUT"); 295 dev_info(&urb->dev->dev, "userurb=%p\n", userurb); 296 dev_info(&urb->dev->dev, "transfer_buffer_length=%d\n", 297 urb->transfer_buffer_length); 298 dev_info(&urb->dev->dev, "actual_length=%d\n", urb->actual_length); 299 dev_info(&urb->dev->dev, "data: "); 300 for (j = 0; j < urb->transfer_buffer_length; ++j) 301 printk ("%02x ", data[j]); 302 printk("\n"); 303 } 304 305 static void async_completed(struct urb *urb) 306 { 307 struct async *as = urb->context; 308 struct dev_state *ps = as->ps; 309 struct siginfo sinfo; 310 311 spin_lock(&ps->lock); 312 list_move_tail(&as->asynclist, &ps->async_completed); 313 spin_unlock(&ps->lock); 314 as->status = urb->status; 315 if (as->signr) { 316 sinfo.si_signo = as->signr; 317 sinfo.si_errno = as->status; 318 sinfo.si_code = SI_ASYNCIO; 319 sinfo.si_addr = as->userurb; 320 kill_pid_info_as_uid(as->signr, &sinfo, as->pid, as->uid, 321 as->euid, as->secid); 322 } 323 snoop(&urb->dev->dev, "urb complete\n"); 324 snoop_urb(urb, as->userurb); 325 wake_up(&ps->wait); 326 } 327 328 static void destroy_async (struct dev_state *ps, struct list_head *list) 329 { 330 struct async *as; 331 unsigned long flags; 332 333 spin_lock_irqsave(&ps->lock, flags); 334 while (!list_empty(list)) { 335 as = list_entry(list->next, struct async, asynclist); 336 list_del_init(&as->asynclist); 337 338 /* drop the spinlock so the completion handler can run */ 339 spin_unlock_irqrestore(&ps->lock, flags); 340 usb_kill_urb(as->urb); 341 spin_lock_irqsave(&ps->lock, flags); 342 } 343 spin_unlock_irqrestore(&ps->lock, flags); 344 as = async_getcompleted(ps); 345 while (as) { 346 free_async(as); 347 as = async_getcompleted(ps); 348 } 349 } 350 351 static void destroy_async_on_interface (struct dev_state *ps, unsigned int ifnum) 352 { 353 struct list_head *p, *q, hitlist; 354 unsigned long flags; 355 356 INIT_LIST_HEAD(&hitlist); 357 spin_lock_irqsave(&ps->lock, flags); 358 list_for_each_safe(p, q, &ps->async_pending) 359 if (ifnum == list_entry(p, struct async, asynclist)->ifnum) 360 list_move_tail(p, &hitlist); 361 spin_unlock_irqrestore(&ps->lock, flags); 362 destroy_async(ps, &hitlist); 363 } 364 365 static inline void destroy_all_async(struct dev_state *ps) 366 { 367 destroy_async(ps, &ps->async_pending); 368 } 369 370 /* 371 * interface claims are made only at the request of user level code, 372 * which can also release them (explicitly or by closing files). 373 * they're also undone when devices disconnect. 374 */ 375 376 static int driver_probe (struct usb_interface *intf, 377 const struct usb_device_id *id) 378 { 379 return -ENODEV; 380 } 381 382 static void driver_disconnect(struct usb_interface *intf) 383 { 384 struct dev_state *ps = usb_get_intfdata (intf); 385 unsigned int ifnum = intf->altsetting->desc.bInterfaceNumber; 386 387 if (!ps) 388 return; 389 390 /* NOTE: this relies on usbcore having canceled and completed 391 * all pending I/O requests; 2.6 does that. 392 */ 393 394 if (likely(ifnum < 8*sizeof(ps->ifclaimed))) 395 clear_bit(ifnum, &ps->ifclaimed); 396 else 397 warn("interface number %u out of range", ifnum); 398 399 usb_set_intfdata (intf, NULL); 400 401 /* force async requests to complete */ 402 destroy_async_on_interface(ps, ifnum); 403 } 404 405 struct usb_driver usbfs_driver = { 406 .name = "usbfs", 407 .probe = driver_probe, 408 .disconnect = driver_disconnect, 409 }; 410 411 static int claimintf(struct dev_state *ps, unsigned int ifnum) 412 { 413 struct usb_device *dev = ps->dev; 414 struct usb_interface *intf; 415 int err; 416 417 if (ifnum >= 8*sizeof(ps->ifclaimed)) 418 return -EINVAL; 419 /* already claimed */ 420 if (test_bit(ifnum, &ps->ifclaimed)) 421 return 0; 422 423 intf = usb_ifnum_to_if(dev, ifnum); 424 if (!intf) 425 err = -ENOENT; 426 else 427 err = usb_driver_claim_interface(&usbfs_driver, intf, ps); 428 if (err == 0) 429 set_bit(ifnum, &ps->ifclaimed); 430 return err; 431 } 432 433 static int releaseintf(struct dev_state *ps, unsigned int ifnum) 434 { 435 struct usb_device *dev; 436 struct usb_interface *intf; 437 int err; 438 439 err = -EINVAL; 440 if (ifnum >= 8*sizeof(ps->ifclaimed)) 441 return err; 442 dev = ps->dev; 443 intf = usb_ifnum_to_if(dev, ifnum); 444 if (!intf) 445 err = -ENOENT; 446 else if (test_and_clear_bit(ifnum, &ps->ifclaimed)) { 447 usb_driver_release_interface(&usbfs_driver, intf); 448 err = 0; 449 } 450 return err; 451 } 452 453 static int checkintf(struct dev_state *ps, unsigned int ifnum) 454 { 455 if (ps->dev->state != USB_STATE_CONFIGURED) 456 return -EHOSTUNREACH; 457 if (ifnum >= 8*sizeof(ps->ifclaimed)) 458 return -EINVAL; 459 if (test_bit(ifnum, &ps->ifclaimed)) 460 return 0; 461 /* if not yet claimed, claim it for the driver */ 462 dev_warn(&ps->dev->dev, "usbfs: process %d (%s) did not claim interface %u before use\n", 463 current->pid, current->comm, ifnum); 464 return claimintf(ps, ifnum); 465 } 466 467 static int findintfep(struct usb_device *dev, unsigned int ep) 468 { 469 unsigned int i, j, e; 470 struct usb_interface *intf; 471 struct usb_host_interface *alts; 472 struct usb_endpoint_descriptor *endpt; 473 474 if (ep & ~(USB_DIR_IN|0xf)) 475 return -EINVAL; 476 if (!dev->actconfig) 477 return -ESRCH; 478 for (i = 0; i < dev->actconfig->desc.bNumInterfaces; i++) { 479 intf = dev->actconfig->interface[i]; 480 for (j = 0; j < intf->num_altsetting; j++) { 481 alts = &intf->altsetting[j]; 482 for (e = 0; e < alts->desc.bNumEndpoints; e++) { 483 endpt = &alts->endpoint[e].desc; 484 if (endpt->bEndpointAddress == ep) 485 return alts->desc.bInterfaceNumber; 486 } 487 } 488 } 489 return -ENOENT; 490 } 491 492 static int check_ctrlrecip(struct dev_state *ps, unsigned int requesttype, unsigned int index) 493 { 494 int ret = 0; 495 496 if (ps->dev->state != USB_STATE_ADDRESS 497 && ps->dev->state != USB_STATE_CONFIGURED) 498 return -EHOSTUNREACH; 499 if (USB_TYPE_VENDOR == (USB_TYPE_MASK & requesttype)) 500 return 0; 501 502 index &= 0xff; 503 switch (requesttype & USB_RECIP_MASK) { 504 case USB_RECIP_ENDPOINT: 505 if ((ret = findintfep(ps->dev, index)) >= 0) 506 ret = checkintf(ps, ret); 507 break; 508 509 case USB_RECIP_INTERFACE: 510 ret = checkintf(ps, index); 511 break; 512 } 513 return ret; 514 } 515 516 static int __match_minor(struct device *dev, void *data) 517 { 518 int minor = *((int *)data); 519 520 if (dev->devt == MKDEV(USB_DEVICE_MAJOR, minor)) 521 return 1; 522 return 0; 523 } 524 525 static struct usb_device *usbdev_lookup_by_minor(int minor) 526 { 527 struct device *dev; 528 529 dev = bus_find_device(&usb_bus_type, NULL, &minor, __match_minor); 530 if (!dev) 531 return NULL; 532 put_device(dev); 533 return container_of(dev, struct usb_device, dev); 534 } 535 536 /* 537 * file operations 538 */ 539 static int usbdev_open(struct inode *inode, struct file *file) 540 { 541 struct usb_device *dev = NULL; 542 struct dev_state *ps; 543 int ret; 544 545 /* Protect against simultaneous removal or release */ 546 mutex_lock(&usbfs_mutex); 547 548 ret = -ENOMEM; 549 if (!(ps = kmalloc(sizeof(struct dev_state), GFP_KERNEL))) 550 goto out; 551 552 ret = -ENOENT; 553 /* usbdev device-node */ 554 if (imajor(inode) == USB_DEVICE_MAJOR) 555 dev = usbdev_lookup_by_minor(iminor(inode)); 556 #ifdef CONFIG_USB_DEVICEFS 557 /* procfs file */ 558 if (!dev) 559 dev = inode->i_private; 560 #endif 561 if (!dev) 562 goto out; 563 ret = usb_autoresume_device(dev); 564 if (ret) 565 goto out; 566 567 usb_get_dev(dev); 568 ret = 0; 569 ps->dev = dev; 570 ps->file = file; 571 spin_lock_init(&ps->lock); 572 INIT_LIST_HEAD(&ps->list); 573 INIT_LIST_HEAD(&ps->async_pending); 574 INIT_LIST_HEAD(&ps->async_completed); 575 init_waitqueue_head(&ps->wait); 576 ps->discsignr = 0; 577 ps->disc_pid = get_pid(task_pid(current)); 578 ps->disc_uid = current->uid; 579 ps->disc_euid = current->euid; 580 ps->disccontext = NULL; 581 ps->ifclaimed = 0; 582 security_task_getsecid(current, &ps->secid); 583 smp_wmb(); 584 list_add_tail(&ps->list, &dev->filelist); 585 file->private_data = ps; 586 out: 587 if (ret) 588 kfree(ps); 589 mutex_unlock(&usbfs_mutex); 590 return ret; 591 } 592 593 static int usbdev_release(struct inode *inode, struct file *file) 594 { 595 struct dev_state *ps = file->private_data; 596 struct usb_device *dev = ps->dev; 597 unsigned int ifnum; 598 599 usb_lock_device(dev); 600 601 /* Protect against simultaneous open */ 602 mutex_lock(&usbfs_mutex); 603 list_del_init(&ps->list); 604 mutex_unlock(&usbfs_mutex); 605 606 for (ifnum = 0; ps->ifclaimed && ifnum < 8*sizeof(ps->ifclaimed); 607 ifnum++) { 608 if (test_bit(ifnum, &ps->ifclaimed)) 609 releaseintf(ps, ifnum); 610 } 611 destroy_all_async(ps); 612 usb_autosuspend_device(dev); 613 usb_unlock_device(dev); 614 usb_put_dev(dev); 615 put_pid(ps->disc_pid); 616 kfree(ps); 617 return 0; 618 } 619 620 static int proc_control(struct dev_state *ps, void __user *arg) 621 { 622 struct usb_device *dev = ps->dev; 623 struct usbdevfs_ctrltransfer ctrl; 624 unsigned int tmo; 625 unsigned char *tbuf; 626 int i, j, ret; 627 628 if (copy_from_user(&ctrl, arg, sizeof(ctrl))) 629 return -EFAULT; 630 if ((ret = check_ctrlrecip(ps, ctrl.bRequestType, ctrl.wIndex))) 631 return ret; 632 if (ctrl.wLength > PAGE_SIZE) 633 return -EINVAL; 634 if (!(tbuf = (unsigned char *)__get_free_page(GFP_KERNEL))) 635 return -ENOMEM; 636 tmo = ctrl.timeout; 637 if (ctrl.bRequestType & 0x80) { 638 if (ctrl.wLength && !access_ok(VERIFY_WRITE, ctrl.data, ctrl.wLength)) { 639 free_page((unsigned long)tbuf); 640 return -EINVAL; 641 } 642 snoop(&dev->dev, "control read: bRequest=%02x " 643 "bRrequestType=%02x wValue=%04x " 644 "wIndex=%04x wLength=%04x\n", 645 ctrl.bRequest, ctrl.bRequestType, ctrl.wValue, 646 ctrl.wIndex, ctrl.wLength); 647 648 usb_unlock_device(dev); 649 i = usb_control_msg(dev, usb_rcvctrlpipe(dev, 0), ctrl.bRequest, ctrl.bRequestType, 650 ctrl.wValue, ctrl.wIndex, tbuf, ctrl.wLength, tmo); 651 usb_lock_device(dev); 652 if ((i > 0) && ctrl.wLength) { 653 if (usbfs_snoop) { 654 dev_info(&dev->dev, "control read: data "); 655 for (j = 0; j < i; ++j) 656 printk("%02x ", (unsigned char)(tbuf)[j]); 657 printk("\n"); 658 } 659 if (copy_to_user(ctrl.data, tbuf, i)) { 660 free_page((unsigned long)tbuf); 661 return -EFAULT; 662 } 663 } 664 } else { 665 if (ctrl.wLength) { 666 if (copy_from_user(tbuf, ctrl.data, ctrl.wLength)) { 667 free_page((unsigned long)tbuf); 668 return -EFAULT; 669 } 670 } 671 snoop(&dev->dev, "control write: bRequest=%02x " 672 "bRrequestType=%02x wValue=%04x " 673 "wIndex=%04x wLength=%04x\n", 674 ctrl.bRequest, ctrl.bRequestType, ctrl.wValue, 675 ctrl.wIndex, ctrl.wLength); 676 if (usbfs_snoop) { 677 dev_info(&dev->dev, "control write: data: "); 678 for (j = 0; j < ctrl.wLength; ++j) 679 printk("%02x ", (unsigned char)(tbuf)[j]); 680 printk("\n"); 681 } 682 usb_unlock_device(dev); 683 i = usb_control_msg(dev, usb_sndctrlpipe(dev, 0), ctrl.bRequest, ctrl.bRequestType, 684 ctrl.wValue, ctrl.wIndex, tbuf, ctrl.wLength, tmo); 685 usb_lock_device(dev); 686 } 687 free_page((unsigned long)tbuf); 688 if (i<0 && i != -EPIPE) { 689 dev_printk(KERN_DEBUG, &dev->dev, "usbfs: USBDEVFS_CONTROL " 690 "failed cmd %s rqt %u rq %u len %u ret %d\n", 691 current->comm, ctrl.bRequestType, ctrl.bRequest, 692 ctrl.wLength, i); 693 } 694 return i; 695 } 696 697 static int proc_bulk(struct dev_state *ps, void __user *arg) 698 { 699 struct usb_device *dev = ps->dev; 700 struct usbdevfs_bulktransfer bulk; 701 unsigned int tmo, len1, pipe; 702 int len2; 703 unsigned char *tbuf; 704 int i, j, ret; 705 706 if (copy_from_user(&bulk, arg, sizeof(bulk))) 707 return -EFAULT; 708 if ((ret = findintfep(ps->dev, bulk.ep)) < 0) 709 return ret; 710 if ((ret = checkintf(ps, ret))) 711 return ret; 712 if (bulk.ep & USB_DIR_IN) 713 pipe = usb_rcvbulkpipe(dev, bulk.ep & 0x7f); 714 else 715 pipe = usb_sndbulkpipe(dev, bulk.ep & 0x7f); 716 if (!usb_maxpacket(dev, pipe, !(bulk.ep & USB_DIR_IN))) 717 return -EINVAL; 718 len1 = bulk.len; 719 if (len1 > MAX_USBFS_BUFFER_SIZE) 720 return -EINVAL; 721 if (!(tbuf = kmalloc(len1, GFP_KERNEL))) 722 return -ENOMEM; 723 tmo = bulk.timeout; 724 if (bulk.ep & 0x80) { 725 if (len1 && !access_ok(VERIFY_WRITE, bulk.data, len1)) { 726 kfree(tbuf); 727 return -EINVAL; 728 } 729 snoop(&dev->dev, "bulk read: len=0x%02x timeout=%04d\n", 730 bulk.len, bulk.timeout); 731 usb_unlock_device(dev); 732 i = usb_bulk_msg(dev, pipe, tbuf, len1, &len2, tmo); 733 usb_lock_device(dev); 734 if (!i && len2) { 735 if (usbfs_snoop) { 736 dev_info(&dev->dev, "bulk read: data "); 737 for (j = 0; j < len2; ++j) 738 printk("%02x ", (unsigned char)(tbuf)[j]); 739 printk("\n"); 740 } 741 if (copy_to_user(bulk.data, tbuf, len2)) { 742 kfree(tbuf); 743 return -EFAULT; 744 } 745 } 746 } else { 747 if (len1) { 748 if (copy_from_user(tbuf, bulk.data, len1)) { 749 kfree(tbuf); 750 return -EFAULT; 751 } 752 } 753 snoop(&dev->dev, "bulk write: len=0x%02x timeout=%04d\n", 754 bulk.len, bulk.timeout); 755 if (usbfs_snoop) { 756 dev_info(&dev->dev, "bulk write: data: "); 757 for (j = 0; j < len1; ++j) 758 printk("%02x ", (unsigned char)(tbuf)[j]); 759 printk("\n"); 760 } 761 usb_unlock_device(dev); 762 i = usb_bulk_msg(dev, pipe, tbuf, len1, &len2, tmo); 763 usb_lock_device(dev); 764 } 765 kfree(tbuf); 766 if (i < 0) 767 return i; 768 return len2; 769 } 770 771 static int proc_resetep(struct dev_state *ps, void __user *arg) 772 { 773 unsigned int ep; 774 int ret; 775 776 if (get_user(ep, (unsigned int __user *)arg)) 777 return -EFAULT; 778 if ((ret = findintfep(ps->dev, ep)) < 0) 779 return ret; 780 if ((ret = checkintf(ps, ret))) 781 return ret; 782 usb_settoggle(ps->dev, ep & 0xf, !(ep & USB_DIR_IN), 0); 783 return 0; 784 } 785 786 static int proc_clearhalt(struct dev_state *ps, void __user *arg) 787 { 788 unsigned int ep; 789 int pipe; 790 int ret; 791 792 if (get_user(ep, (unsigned int __user *)arg)) 793 return -EFAULT; 794 if ((ret = findintfep(ps->dev, ep)) < 0) 795 return ret; 796 if ((ret = checkintf(ps, ret))) 797 return ret; 798 if (ep & USB_DIR_IN) 799 pipe = usb_rcvbulkpipe(ps->dev, ep & 0x7f); 800 else 801 pipe = usb_sndbulkpipe(ps->dev, ep & 0x7f); 802 803 return usb_clear_halt(ps->dev, pipe); 804 } 805 806 807 static int proc_getdriver(struct dev_state *ps, void __user *arg) 808 { 809 struct usbdevfs_getdriver gd; 810 struct usb_interface *intf; 811 int ret; 812 813 if (copy_from_user(&gd, arg, sizeof(gd))) 814 return -EFAULT; 815 intf = usb_ifnum_to_if(ps->dev, gd.interface); 816 if (!intf || !intf->dev.driver) 817 ret = -ENODATA; 818 else { 819 strncpy(gd.driver, intf->dev.driver->name, 820 sizeof(gd.driver)); 821 ret = (copy_to_user(arg, &gd, sizeof(gd)) ? -EFAULT : 0); 822 } 823 return ret; 824 } 825 826 static int proc_connectinfo(struct dev_state *ps, void __user *arg) 827 { 828 struct usbdevfs_connectinfo ci; 829 830 ci.devnum = ps->dev->devnum; 831 ci.slow = ps->dev->speed == USB_SPEED_LOW; 832 if (copy_to_user(arg, &ci, sizeof(ci))) 833 return -EFAULT; 834 return 0; 835 } 836 837 static int proc_resetdevice(struct dev_state *ps) 838 { 839 return usb_reset_composite_device(ps->dev, NULL); 840 } 841 842 static int proc_setintf(struct dev_state *ps, void __user *arg) 843 { 844 struct usbdevfs_setinterface setintf; 845 int ret; 846 847 if (copy_from_user(&setintf, arg, sizeof(setintf))) 848 return -EFAULT; 849 if ((ret = checkintf(ps, setintf.interface))) 850 return ret; 851 return usb_set_interface(ps->dev, setintf.interface, 852 setintf.altsetting); 853 } 854 855 static int proc_setconfig(struct dev_state *ps, void __user *arg) 856 { 857 int u; 858 int status = 0; 859 struct usb_host_config *actconfig; 860 861 if (get_user(u, (int __user *)arg)) 862 return -EFAULT; 863 864 actconfig = ps->dev->actconfig; 865 866 /* Don't touch the device if any interfaces are claimed. 867 * It could interfere with other drivers' operations, and if 868 * an interface is claimed by usbfs it could easily deadlock. 869 */ 870 if (actconfig) { 871 int i; 872 873 for (i = 0; i < actconfig->desc.bNumInterfaces; ++i) { 874 if (usb_interface_claimed(actconfig->interface[i])) { 875 dev_warn (&ps->dev->dev, 876 "usbfs: interface %d claimed by %s " 877 "while '%s' sets config #%d\n", 878 actconfig->interface[i] 879 ->cur_altsetting 880 ->desc.bInterfaceNumber, 881 actconfig->interface[i] 882 ->dev.driver->name, 883 current->comm, u); 884 status = -EBUSY; 885 break; 886 } 887 } 888 } 889 890 /* SET_CONFIGURATION is often abused as a "cheap" driver reset, 891 * so avoid usb_set_configuration()'s kick to sysfs 892 */ 893 if (status == 0) { 894 if (actconfig && actconfig->desc.bConfigurationValue == u) 895 status = usb_reset_configuration(ps->dev); 896 else 897 status = usb_set_configuration(ps->dev, u); 898 } 899 900 return status; 901 } 902 903 static int proc_do_submiturb(struct dev_state *ps, struct usbdevfs_urb *uurb, 904 struct usbdevfs_iso_packet_desc __user *iso_frame_desc, 905 void __user *arg) 906 { 907 struct usbdevfs_iso_packet_desc *isopkt = NULL; 908 struct usb_host_endpoint *ep; 909 struct async *as; 910 struct usb_ctrlrequest *dr = NULL; 911 unsigned int u, totlen, isofrmlen; 912 int ret, ifnum = -1; 913 int is_in; 914 915 if (uurb->flags & ~(USBDEVFS_URB_ISO_ASAP|USBDEVFS_URB_SHORT_NOT_OK| 916 URB_NO_FSBR|URB_ZERO_PACKET)) 917 return -EINVAL; 918 if (!uurb->buffer) 919 return -EINVAL; 920 if (uurb->signr != 0 && (uurb->signr < SIGRTMIN || uurb->signr > SIGRTMAX)) 921 return -EINVAL; 922 if (!(uurb->type == USBDEVFS_URB_TYPE_CONTROL && (uurb->endpoint & ~USB_ENDPOINT_DIR_MASK) == 0)) { 923 if ((ifnum = findintfep(ps->dev, uurb->endpoint)) < 0) 924 return ifnum; 925 if ((ret = checkintf(ps, ifnum))) 926 return ret; 927 } 928 if ((uurb->endpoint & USB_ENDPOINT_DIR_MASK) != 0) { 929 is_in = 1; 930 ep = ps->dev->ep_in[uurb->endpoint & USB_ENDPOINT_NUMBER_MASK]; 931 } else { 932 is_in = 0; 933 ep = ps->dev->ep_out[uurb->endpoint & USB_ENDPOINT_NUMBER_MASK]; 934 } 935 if (!ep) 936 return -ENOENT; 937 switch(uurb->type) { 938 case USBDEVFS_URB_TYPE_CONTROL: 939 if (!usb_endpoint_xfer_control(&ep->desc)) 940 return -EINVAL; 941 /* min 8 byte setup packet, max 8 byte setup plus an arbitrary data stage */ 942 if (uurb->buffer_length < 8 || uurb->buffer_length > (8 + MAX_USBFS_BUFFER_SIZE)) 943 return -EINVAL; 944 if (!(dr = kmalloc(sizeof(struct usb_ctrlrequest), GFP_KERNEL))) 945 return -ENOMEM; 946 if (copy_from_user(dr, uurb->buffer, 8)) { 947 kfree(dr); 948 return -EFAULT; 949 } 950 if (uurb->buffer_length < (le16_to_cpup(&dr->wLength) + 8)) { 951 kfree(dr); 952 return -EINVAL; 953 } 954 if ((ret = check_ctrlrecip(ps, dr->bRequestType, le16_to_cpup(&dr->wIndex)))) { 955 kfree(dr); 956 return ret; 957 } 958 uurb->number_of_packets = 0; 959 uurb->buffer_length = le16_to_cpup(&dr->wLength); 960 uurb->buffer += 8; 961 if ((dr->bRequestType & USB_DIR_IN) && uurb->buffer_length) { 962 is_in = 1; 963 uurb->endpoint |= USB_DIR_IN; 964 } else { 965 is_in = 0; 966 uurb->endpoint &= ~USB_DIR_IN; 967 } 968 if (!access_ok(is_in ? VERIFY_WRITE : VERIFY_READ, 969 uurb->buffer, uurb->buffer_length)) { 970 kfree(dr); 971 return -EFAULT; 972 } 973 snoop(&ps->dev->dev, "control urb: bRequest=%02x " 974 "bRrequestType=%02x wValue=%04x " 975 "wIndex=%04x wLength=%04x\n", 976 dr->bRequest, dr->bRequestType, 977 __le16_to_cpup(&dr->wValue), 978 __le16_to_cpup(&dr->wIndex), 979 __le16_to_cpup(&dr->wLength)); 980 break; 981 982 case USBDEVFS_URB_TYPE_BULK: 983 switch (usb_endpoint_type(&ep->desc)) { 984 case USB_ENDPOINT_XFER_CONTROL: 985 case USB_ENDPOINT_XFER_ISOC: 986 return -EINVAL; 987 /* allow single-shot interrupt transfers, at bogus rates */ 988 } 989 uurb->number_of_packets = 0; 990 if (uurb->buffer_length > MAX_USBFS_BUFFER_SIZE) 991 return -EINVAL; 992 if (!access_ok(is_in ? VERIFY_WRITE : VERIFY_READ, 993 uurb->buffer, uurb->buffer_length)) 994 return -EFAULT; 995 snoop(&ps->dev->dev, "bulk urb\n"); 996 break; 997 998 case USBDEVFS_URB_TYPE_ISO: 999 /* arbitrary limit */ 1000 if (uurb->number_of_packets < 1 || uurb->number_of_packets > 128) 1001 return -EINVAL; 1002 if (!usb_endpoint_xfer_isoc(&ep->desc)) 1003 return -EINVAL; 1004 isofrmlen = sizeof(struct usbdevfs_iso_packet_desc) * uurb->number_of_packets; 1005 if (!(isopkt = kmalloc(isofrmlen, GFP_KERNEL))) 1006 return -ENOMEM; 1007 if (copy_from_user(isopkt, iso_frame_desc, isofrmlen)) { 1008 kfree(isopkt); 1009 return -EFAULT; 1010 } 1011 for (totlen = u = 0; u < uurb->number_of_packets; u++) { 1012 /* arbitrary limit, sufficient for USB 2.0 high-bandwidth iso */ 1013 if (isopkt[u].length > 8192) { 1014 kfree(isopkt); 1015 return -EINVAL; 1016 } 1017 totlen += isopkt[u].length; 1018 } 1019 if (totlen > 32768) { 1020 kfree(isopkt); 1021 return -EINVAL; 1022 } 1023 uurb->buffer_length = totlen; 1024 snoop(&ps->dev->dev, "iso urb\n"); 1025 break; 1026 1027 case USBDEVFS_URB_TYPE_INTERRUPT: 1028 uurb->number_of_packets = 0; 1029 if (!usb_endpoint_xfer_int(&ep->desc)) 1030 return -EINVAL; 1031 if (uurb->buffer_length > MAX_USBFS_BUFFER_SIZE) 1032 return -EINVAL; 1033 if (!access_ok(is_in ? VERIFY_WRITE : VERIFY_READ, 1034 uurb->buffer, uurb->buffer_length)) 1035 return -EFAULT; 1036 snoop(&ps->dev->dev, "interrupt urb\n"); 1037 break; 1038 1039 default: 1040 return -EINVAL; 1041 } 1042 if (!(as = alloc_async(uurb->number_of_packets))) { 1043 kfree(isopkt); 1044 kfree(dr); 1045 return -ENOMEM; 1046 } 1047 if (!(as->urb->transfer_buffer = kmalloc(uurb->buffer_length, GFP_KERNEL))) { 1048 kfree(isopkt); 1049 kfree(dr); 1050 free_async(as); 1051 return -ENOMEM; 1052 } 1053 as->urb->dev = ps->dev; 1054 as->urb->pipe = (uurb->type << 30) | 1055 __create_pipe(ps->dev, uurb->endpoint & 0xf) | 1056 (uurb->endpoint & USB_DIR_IN); 1057 as->urb->transfer_flags = uurb->flags | 1058 (is_in ? URB_DIR_IN : URB_DIR_OUT); 1059 as->urb->transfer_buffer_length = uurb->buffer_length; 1060 as->urb->setup_packet = (unsigned char*)dr; 1061 as->urb->start_frame = uurb->start_frame; 1062 as->urb->number_of_packets = uurb->number_of_packets; 1063 if (uurb->type == USBDEVFS_URB_TYPE_ISO || 1064 ps->dev->speed == USB_SPEED_HIGH) 1065 as->urb->interval = 1 << min(15, ep->desc.bInterval - 1); 1066 else 1067 as->urb->interval = ep->desc.bInterval; 1068 as->urb->context = as; 1069 as->urb->complete = async_completed; 1070 for (totlen = u = 0; u < uurb->number_of_packets; u++) { 1071 as->urb->iso_frame_desc[u].offset = totlen; 1072 as->urb->iso_frame_desc[u].length = isopkt[u].length; 1073 totlen += isopkt[u].length; 1074 } 1075 kfree(isopkt); 1076 as->ps = ps; 1077 as->userurb = arg; 1078 if (uurb->endpoint & USB_DIR_IN) 1079 as->userbuffer = uurb->buffer; 1080 else 1081 as->userbuffer = NULL; 1082 as->signr = uurb->signr; 1083 as->ifnum = ifnum; 1084 as->pid = get_pid(task_pid(current)); 1085 as->uid = current->uid; 1086 as->euid = current->euid; 1087 security_task_getsecid(current, &as->secid); 1088 if (!is_in) { 1089 if (copy_from_user(as->urb->transfer_buffer, uurb->buffer, 1090 as->urb->transfer_buffer_length)) { 1091 free_async(as); 1092 return -EFAULT; 1093 } 1094 } 1095 snoop_urb(as->urb, as->userurb); 1096 async_newpending(as); 1097 if ((ret = usb_submit_urb(as->urb, GFP_KERNEL))) { 1098 dev_printk(KERN_DEBUG, &ps->dev->dev, "usbfs: usb_submit_urb returned %d\n", ret); 1099 async_removepending(as); 1100 free_async(as); 1101 return ret; 1102 } 1103 return 0; 1104 } 1105 1106 static int proc_submiturb(struct dev_state *ps, void __user *arg) 1107 { 1108 struct usbdevfs_urb uurb; 1109 1110 if (copy_from_user(&uurb, arg, sizeof(uurb))) 1111 return -EFAULT; 1112 1113 return proc_do_submiturb(ps, &uurb, (((struct usbdevfs_urb __user *)arg)->iso_frame_desc), arg); 1114 } 1115 1116 static int proc_unlinkurb(struct dev_state *ps, void __user *arg) 1117 { 1118 struct async *as; 1119 1120 as = async_getpending(ps, arg); 1121 if (!as) 1122 return -EINVAL; 1123 usb_kill_urb(as->urb); 1124 return 0; 1125 } 1126 1127 static int processcompl(struct async *as, void __user * __user *arg) 1128 { 1129 struct urb *urb = as->urb; 1130 struct usbdevfs_urb __user *userurb = as->userurb; 1131 void __user *addr = as->userurb; 1132 unsigned int i; 1133 1134 if (as->userbuffer) 1135 if (copy_to_user(as->userbuffer, urb->transfer_buffer, urb->transfer_buffer_length)) 1136 return -EFAULT; 1137 if (put_user(as->status, &userurb->status)) 1138 return -EFAULT; 1139 if (put_user(urb->actual_length, &userurb->actual_length)) 1140 return -EFAULT; 1141 if (put_user(urb->error_count, &userurb->error_count)) 1142 return -EFAULT; 1143 1144 if (usb_endpoint_xfer_isoc(&urb->ep->desc)) { 1145 for (i = 0; i < urb->number_of_packets; i++) { 1146 if (put_user(urb->iso_frame_desc[i].actual_length, 1147 &userurb->iso_frame_desc[i].actual_length)) 1148 return -EFAULT; 1149 if (put_user(urb->iso_frame_desc[i].status, 1150 &userurb->iso_frame_desc[i].status)) 1151 return -EFAULT; 1152 } 1153 } 1154 1155 free_async(as); 1156 1157 if (put_user(addr, (void __user * __user *)arg)) 1158 return -EFAULT; 1159 return 0; 1160 } 1161 1162 static struct async* reap_as(struct dev_state *ps) 1163 { 1164 DECLARE_WAITQUEUE(wait, current); 1165 struct async *as = NULL; 1166 struct usb_device *dev = ps->dev; 1167 1168 add_wait_queue(&ps->wait, &wait); 1169 for (;;) { 1170 __set_current_state(TASK_INTERRUPTIBLE); 1171 if ((as = async_getcompleted(ps))) 1172 break; 1173 if (signal_pending(current)) 1174 break; 1175 usb_unlock_device(dev); 1176 schedule(); 1177 usb_lock_device(dev); 1178 } 1179 remove_wait_queue(&ps->wait, &wait); 1180 set_current_state(TASK_RUNNING); 1181 return as; 1182 } 1183 1184 static int proc_reapurb(struct dev_state *ps, void __user *arg) 1185 { 1186 struct async *as = reap_as(ps); 1187 if (as) 1188 return processcompl(as, (void __user * __user *)arg); 1189 if (signal_pending(current)) 1190 return -EINTR; 1191 return -EIO; 1192 } 1193 1194 static int proc_reapurbnonblock(struct dev_state *ps, void __user *arg) 1195 { 1196 struct async *as; 1197 1198 if (!(as = async_getcompleted(ps))) 1199 return -EAGAIN; 1200 return processcompl(as, (void __user * __user *)arg); 1201 } 1202 1203 #ifdef CONFIG_COMPAT 1204 1205 static int get_urb32(struct usbdevfs_urb *kurb, 1206 struct usbdevfs_urb32 __user *uurb) 1207 { 1208 __u32 uptr; 1209 if (get_user(kurb->type, &uurb->type) || 1210 __get_user(kurb->endpoint, &uurb->endpoint) || 1211 __get_user(kurb->status, &uurb->status) || 1212 __get_user(kurb->flags, &uurb->flags) || 1213 __get_user(kurb->buffer_length, &uurb->buffer_length) || 1214 __get_user(kurb->actual_length, &uurb->actual_length) || 1215 __get_user(kurb->start_frame, &uurb->start_frame) || 1216 __get_user(kurb->number_of_packets, &uurb->number_of_packets) || 1217 __get_user(kurb->error_count, &uurb->error_count) || 1218 __get_user(kurb->signr, &uurb->signr)) 1219 return -EFAULT; 1220 1221 if (__get_user(uptr, &uurb->buffer)) 1222 return -EFAULT; 1223 kurb->buffer = compat_ptr(uptr); 1224 if (__get_user(uptr, &uurb->buffer)) 1225 return -EFAULT; 1226 kurb->usercontext = compat_ptr(uptr); 1227 1228 return 0; 1229 } 1230 1231 static int proc_submiturb_compat(struct dev_state *ps, void __user *arg) 1232 { 1233 struct usbdevfs_urb uurb; 1234 1235 if (get_urb32(&uurb,(struct usbdevfs_urb32 __user *)arg)) 1236 return -EFAULT; 1237 1238 return proc_do_submiturb(ps, &uurb, ((struct usbdevfs_urb32 __user *)arg)->iso_frame_desc, arg); 1239 } 1240 1241 static int processcompl_compat(struct async *as, void __user * __user *arg) 1242 { 1243 struct urb *urb = as->urb; 1244 struct usbdevfs_urb32 __user *userurb = as->userurb; 1245 void __user *addr = as->userurb; 1246 unsigned int i; 1247 1248 if (as->userbuffer) 1249 if (copy_to_user(as->userbuffer, urb->transfer_buffer, urb->transfer_buffer_length)) 1250 return -EFAULT; 1251 if (put_user(as->status, &userurb->status)) 1252 return -EFAULT; 1253 if (put_user(urb->actual_length, &userurb->actual_length)) 1254 return -EFAULT; 1255 if (put_user(urb->error_count, &userurb->error_count)) 1256 return -EFAULT; 1257 1258 if (usb_endpoint_xfer_isoc(&urb->ep->desc)) { 1259 for (i = 0; i < urb->number_of_packets; i++) { 1260 if (put_user(urb->iso_frame_desc[i].actual_length, 1261 &userurb->iso_frame_desc[i].actual_length)) 1262 return -EFAULT; 1263 if (put_user(urb->iso_frame_desc[i].status, 1264 &userurb->iso_frame_desc[i].status)) 1265 return -EFAULT; 1266 } 1267 } 1268 1269 free_async(as); 1270 if (put_user(ptr_to_compat(addr), (u32 __user *)arg)) 1271 return -EFAULT; 1272 return 0; 1273 } 1274 1275 static int proc_reapurb_compat(struct dev_state *ps, void __user *arg) 1276 { 1277 struct async *as = reap_as(ps); 1278 if (as) 1279 return processcompl_compat(as, (void __user * __user *)arg); 1280 if (signal_pending(current)) 1281 return -EINTR; 1282 return -EIO; 1283 } 1284 1285 static int proc_reapurbnonblock_compat(struct dev_state *ps, void __user *arg) 1286 { 1287 struct async *as; 1288 1289 if (!(as = async_getcompleted(ps))) 1290 return -EAGAIN; 1291 return processcompl_compat(as, (void __user * __user *)arg); 1292 } 1293 1294 #endif 1295 1296 static int proc_disconnectsignal(struct dev_state *ps, void __user *arg) 1297 { 1298 struct usbdevfs_disconnectsignal ds; 1299 1300 if (copy_from_user(&ds, arg, sizeof(ds))) 1301 return -EFAULT; 1302 if (ds.signr != 0 && (ds.signr < SIGRTMIN || ds.signr > SIGRTMAX)) 1303 return -EINVAL; 1304 ps->discsignr = ds.signr; 1305 ps->disccontext = ds.context; 1306 return 0; 1307 } 1308 1309 static int proc_claiminterface(struct dev_state *ps, void __user *arg) 1310 { 1311 unsigned int ifnum; 1312 1313 if (get_user(ifnum, (unsigned int __user *)arg)) 1314 return -EFAULT; 1315 return claimintf(ps, ifnum); 1316 } 1317 1318 static int proc_releaseinterface(struct dev_state *ps, void __user *arg) 1319 { 1320 unsigned int ifnum; 1321 int ret; 1322 1323 if (get_user(ifnum, (unsigned int __user *)arg)) 1324 return -EFAULT; 1325 if ((ret = releaseintf(ps, ifnum)) < 0) 1326 return ret; 1327 destroy_async_on_interface (ps, ifnum); 1328 return 0; 1329 } 1330 1331 static int proc_ioctl(struct dev_state *ps, struct usbdevfs_ioctl *ctl) 1332 { 1333 int size; 1334 void *buf = NULL; 1335 int retval = 0; 1336 struct usb_interface *intf = NULL; 1337 struct usb_driver *driver = NULL; 1338 1339 /* alloc buffer */ 1340 if ((size = _IOC_SIZE (ctl->ioctl_code)) > 0) { 1341 if ((buf = kmalloc (size, GFP_KERNEL)) == NULL) 1342 return -ENOMEM; 1343 if ((_IOC_DIR(ctl->ioctl_code) & _IOC_WRITE)) { 1344 if (copy_from_user (buf, ctl->data, size)) { 1345 kfree(buf); 1346 return -EFAULT; 1347 } 1348 } else { 1349 memset (buf, 0, size); 1350 } 1351 } 1352 1353 if (!connected(ps)) { 1354 kfree(buf); 1355 return -ENODEV; 1356 } 1357 1358 if (ps->dev->state != USB_STATE_CONFIGURED) 1359 retval = -EHOSTUNREACH; 1360 else if (!(intf = usb_ifnum_to_if (ps->dev, ctl->ifno))) 1361 retval = -EINVAL; 1362 else switch (ctl->ioctl_code) { 1363 1364 /* disconnect kernel driver from interface */ 1365 case USBDEVFS_DISCONNECT: 1366 if (intf->dev.driver) { 1367 driver = to_usb_driver(intf->dev.driver); 1368 dev_dbg (&intf->dev, "disconnect by usbfs\n"); 1369 usb_driver_release_interface(driver, intf); 1370 } else 1371 retval = -ENODATA; 1372 break; 1373 1374 /* let kernel drivers try to (re)bind to the interface */ 1375 case USBDEVFS_CONNECT: 1376 usb_unlock_device(ps->dev); 1377 retval = bus_rescan_devices(intf->dev.bus); 1378 usb_lock_device(ps->dev); 1379 break; 1380 1381 /* talk directly to the interface's driver */ 1382 default: 1383 if (intf->dev.driver) 1384 driver = to_usb_driver(intf->dev.driver); 1385 if (driver == NULL || driver->ioctl == NULL) { 1386 retval = -ENOTTY; 1387 } else { 1388 retval = driver->ioctl (intf, ctl->ioctl_code, buf); 1389 if (retval == -ENOIOCTLCMD) 1390 retval = -ENOTTY; 1391 } 1392 } 1393 1394 /* cleanup and return */ 1395 if (retval >= 0 1396 && (_IOC_DIR (ctl->ioctl_code) & _IOC_READ) != 0 1397 && size > 0 1398 && copy_to_user (ctl->data, buf, size) != 0) 1399 retval = -EFAULT; 1400 1401 kfree(buf); 1402 return retval; 1403 } 1404 1405 static int proc_ioctl_default(struct dev_state *ps, void __user *arg) 1406 { 1407 struct usbdevfs_ioctl ctrl; 1408 1409 if (copy_from_user(&ctrl, arg, sizeof (ctrl))) 1410 return -EFAULT; 1411 return proc_ioctl(ps, &ctrl); 1412 } 1413 1414 #ifdef CONFIG_COMPAT 1415 static int proc_ioctl_compat(struct dev_state *ps, compat_uptr_t arg) 1416 { 1417 struct usbdevfs_ioctl32 __user *uioc; 1418 struct usbdevfs_ioctl ctrl; 1419 u32 udata; 1420 1421 uioc = compat_ptr((long)arg); 1422 if (get_user(ctrl.ifno, &uioc->ifno) || 1423 get_user(ctrl.ioctl_code, &uioc->ioctl_code) || 1424 __get_user(udata, &uioc->data)) 1425 return -EFAULT; 1426 ctrl.data = compat_ptr(udata); 1427 1428 return proc_ioctl(ps, &ctrl); 1429 } 1430 #endif 1431 1432 /* 1433 * NOTE: All requests here that have interface numbers as parameters 1434 * are assuming that somehow the configuration has been prevented from 1435 * changing. But there's no mechanism to ensure that... 1436 */ 1437 static int usbdev_ioctl(struct inode *inode, struct file *file, unsigned int cmd, unsigned long arg) 1438 { 1439 struct dev_state *ps = file->private_data; 1440 struct usb_device *dev = ps->dev; 1441 void __user *p = (void __user *)arg; 1442 int ret = -ENOTTY; 1443 1444 if (!(file->f_mode & FMODE_WRITE)) 1445 return -EPERM; 1446 usb_lock_device(dev); 1447 if (!connected(ps)) { 1448 usb_unlock_device(dev); 1449 return -ENODEV; 1450 } 1451 1452 switch (cmd) { 1453 case USBDEVFS_CONTROL: 1454 snoop(&dev->dev, "%s: CONTROL\n", __FUNCTION__); 1455 ret = proc_control(ps, p); 1456 if (ret >= 0) 1457 inode->i_mtime = CURRENT_TIME; 1458 break; 1459 1460 case USBDEVFS_BULK: 1461 snoop(&dev->dev, "%s: BULK\n", __FUNCTION__); 1462 ret = proc_bulk(ps, p); 1463 if (ret >= 0) 1464 inode->i_mtime = CURRENT_TIME; 1465 break; 1466 1467 case USBDEVFS_RESETEP: 1468 snoop(&dev->dev, "%s: RESETEP\n", __FUNCTION__); 1469 ret = proc_resetep(ps, p); 1470 if (ret >= 0) 1471 inode->i_mtime = CURRENT_TIME; 1472 break; 1473 1474 case USBDEVFS_RESET: 1475 snoop(&dev->dev, "%s: RESET\n", __FUNCTION__); 1476 ret = proc_resetdevice(ps); 1477 break; 1478 1479 case USBDEVFS_CLEAR_HALT: 1480 snoop(&dev->dev, "%s: CLEAR_HALT\n", __FUNCTION__); 1481 ret = proc_clearhalt(ps, p); 1482 if (ret >= 0) 1483 inode->i_mtime = CURRENT_TIME; 1484 break; 1485 1486 case USBDEVFS_GETDRIVER: 1487 snoop(&dev->dev, "%s: GETDRIVER\n", __FUNCTION__); 1488 ret = proc_getdriver(ps, p); 1489 break; 1490 1491 case USBDEVFS_CONNECTINFO: 1492 snoop(&dev->dev, "%s: CONNECTINFO\n", __FUNCTION__); 1493 ret = proc_connectinfo(ps, p); 1494 break; 1495 1496 case USBDEVFS_SETINTERFACE: 1497 snoop(&dev->dev, "%s: SETINTERFACE\n", __FUNCTION__); 1498 ret = proc_setintf(ps, p); 1499 break; 1500 1501 case USBDEVFS_SETCONFIGURATION: 1502 snoop(&dev->dev, "%s: SETCONFIGURATION\n", __FUNCTION__); 1503 ret = proc_setconfig(ps, p); 1504 break; 1505 1506 case USBDEVFS_SUBMITURB: 1507 snoop(&dev->dev, "%s: SUBMITURB\n", __FUNCTION__); 1508 ret = proc_submiturb(ps, p); 1509 if (ret >= 0) 1510 inode->i_mtime = CURRENT_TIME; 1511 break; 1512 1513 #ifdef CONFIG_COMPAT 1514 1515 case USBDEVFS_SUBMITURB32: 1516 snoop(&dev->dev, "%s: SUBMITURB32\n", __FUNCTION__); 1517 ret = proc_submiturb_compat(ps, p); 1518 if (ret >= 0) 1519 inode->i_mtime = CURRENT_TIME; 1520 break; 1521 1522 case USBDEVFS_REAPURB32: 1523 snoop(&dev->dev, "%s: REAPURB32\n", __FUNCTION__); 1524 ret = proc_reapurb_compat(ps, p); 1525 break; 1526 1527 case USBDEVFS_REAPURBNDELAY32: 1528 snoop(&dev->dev, "%s: REAPURBDELAY32\n", __FUNCTION__); 1529 ret = proc_reapurbnonblock_compat(ps, p); 1530 break; 1531 1532 case USBDEVFS_IOCTL32: 1533 snoop(&dev->dev, "%s: IOCTL\n", __FUNCTION__); 1534 ret = proc_ioctl_compat(ps, ptr_to_compat(p)); 1535 break; 1536 #endif 1537 1538 case USBDEVFS_DISCARDURB: 1539 snoop(&dev->dev, "%s: DISCARDURB\n", __FUNCTION__); 1540 ret = proc_unlinkurb(ps, p); 1541 break; 1542 1543 case USBDEVFS_REAPURB: 1544 snoop(&dev->dev, "%s: REAPURB\n", __FUNCTION__); 1545 ret = proc_reapurb(ps, p); 1546 break; 1547 1548 case USBDEVFS_REAPURBNDELAY: 1549 snoop(&dev->dev, "%s: REAPURBDELAY\n", __FUNCTION__); 1550 ret = proc_reapurbnonblock(ps, p); 1551 break; 1552 1553 case USBDEVFS_DISCSIGNAL: 1554 snoop(&dev->dev, "%s: DISCSIGNAL\n", __FUNCTION__); 1555 ret = proc_disconnectsignal(ps, p); 1556 break; 1557 1558 case USBDEVFS_CLAIMINTERFACE: 1559 snoop(&dev->dev, "%s: CLAIMINTERFACE\n", __FUNCTION__); 1560 ret = proc_claiminterface(ps, p); 1561 break; 1562 1563 case USBDEVFS_RELEASEINTERFACE: 1564 snoop(&dev->dev, "%s: RELEASEINTERFACE\n", __FUNCTION__); 1565 ret = proc_releaseinterface(ps, p); 1566 break; 1567 1568 case USBDEVFS_IOCTL: 1569 snoop(&dev->dev, "%s: IOCTL\n", __FUNCTION__); 1570 ret = proc_ioctl_default(ps, p); 1571 break; 1572 } 1573 usb_unlock_device(dev); 1574 if (ret >= 0) 1575 inode->i_atime = CURRENT_TIME; 1576 return ret; 1577 } 1578 1579 /* No kernel lock - fine */ 1580 static unsigned int usbdev_poll(struct file *file, struct poll_table_struct *wait) 1581 { 1582 struct dev_state *ps = file->private_data; 1583 unsigned int mask = 0; 1584 1585 poll_wait(file, &ps->wait, wait); 1586 if (file->f_mode & FMODE_WRITE && !list_empty(&ps->async_completed)) 1587 mask |= POLLOUT | POLLWRNORM; 1588 if (!connected(ps)) 1589 mask |= POLLERR | POLLHUP; 1590 return mask; 1591 } 1592 1593 const struct file_operations usbdev_file_operations = { 1594 .owner = THIS_MODULE, 1595 .llseek = usbdev_lseek, 1596 .read = usbdev_read, 1597 .poll = usbdev_poll, 1598 .ioctl = usbdev_ioctl, 1599 .open = usbdev_open, 1600 .release = usbdev_release, 1601 }; 1602 1603 #ifdef CONFIG_USB_DEVICE_CLASS 1604 static struct class *usb_classdev_class; 1605 1606 static int usb_classdev_add(struct usb_device *dev) 1607 { 1608 int minor = ((dev->bus->busnum-1) * 128) + (dev->devnum-1); 1609 1610 dev->usb_classdev = device_create(usb_classdev_class, &dev->dev, 1611 MKDEV(USB_DEVICE_MAJOR, minor), 1612 "usbdev%d.%d", dev->bus->busnum, dev->devnum); 1613 if (IS_ERR(dev->usb_classdev)) 1614 return PTR_ERR(dev->usb_classdev); 1615 1616 return 0; 1617 } 1618 1619 static void usb_classdev_remove(struct usb_device *dev) 1620 { 1621 device_unregister(dev->usb_classdev); 1622 } 1623 1624 static int usb_classdev_notify(struct notifier_block *self, 1625 unsigned long action, void *dev) 1626 { 1627 switch (action) { 1628 case USB_DEVICE_ADD: 1629 if (usb_classdev_add(dev)) 1630 return NOTIFY_BAD; 1631 break; 1632 case USB_DEVICE_REMOVE: 1633 usb_classdev_remove(dev); 1634 break; 1635 } 1636 return NOTIFY_OK; 1637 } 1638 1639 static struct notifier_block usbdev_nb = { 1640 .notifier_call = usb_classdev_notify, 1641 }; 1642 #endif 1643 1644 static struct cdev usb_device_cdev; 1645 1646 int __init usb_devio_init(void) 1647 { 1648 int retval; 1649 1650 retval = register_chrdev_region(USB_DEVICE_DEV, USB_DEVICE_MAX, 1651 "usb_device"); 1652 if (retval) { 1653 err("unable to register minors for usb_device"); 1654 goto out; 1655 } 1656 cdev_init(&usb_device_cdev, &usbdev_file_operations); 1657 retval = cdev_add(&usb_device_cdev, USB_DEVICE_DEV, USB_DEVICE_MAX); 1658 if (retval) { 1659 err("unable to get usb_device major %d", USB_DEVICE_MAJOR); 1660 goto error_cdev; 1661 } 1662 #ifdef CONFIG_USB_DEVICE_CLASS 1663 usb_classdev_class = class_create(THIS_MODULE, "usb_device"); 1664 if (IS_ERR(usb_classdev_class)) { 1665 err("unable to register usb_device class"); 1666 retval = PTR_ERR(usb_classdev_class); 1667 cdev_del(&usb_device_cdev); 1668 usb_classdev_class = NULL; 1669 goto out; 1670 } 1671 1672 usb_register_notify(&usbdev_nb); 1673 #endif 1674 out: 1675 return retval; 1676 1677 error_cdev: 1678 unregister_chrdev_region(USB_DEVICE_DEV, USB_DEVICE_MAX); 1679 goto out; 1680 } 1681 1682 void usb_devio_cleanup(void) 1683 { 1684 #ifdef CONFIG_USB_DEVICE_CLASS 1685 usb_unregister_notify(&usbdev_nb); 1686 class_destroy(usb_classdev_class); 1687 #endif 1688 cdev_del(&usb_device_cdev); 1689 unregister_chrdev_region(USB_DEVICE_DEV, USB_DEVICE_MAX); 1690 } 1691