1 /*****************************************************************************/ 2 3 /* 4 * devio.c -- User space communication with USB devices. 5 * 6 * Copyright (C) 1999-2000 Thomas Sailer (sailer@ife.ee.ethz.ch) 7 * 8 * This program is free software; you can redistribute it and/or modify 9 * it under the terms of the GNU General Public License as published by 10 * the Free Software Foundation; either version 2 of the License, or 11 * (at your option) any later version. 12 * 13 * This program is distributed in the hope that it will be useful, 14 * but WITHOUT ANY WARRANTY; without even the implied warranty of 15 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the 16 * GNU General Public License for more details. 17 * 18 * You should have received a copy of the GNU General Public License 19 * along with this program; if not, write to the Free Software 20 * Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA. 21 * 22 * $Id: devio.c,v 1.7 2000/02/01 17:28:48 fliegl Exp $ 23 * 24 * This file implements the usbfs/x/y files, where 25 * x is the bus number and y the device number. 26 * 27 * It allows user space programs/"drivers" to communicate directly 28 * with USB devices without intervening kernel driver. 29 * 30 * Revision history 31 * 22.12.1999 0.1 Initial release (split from proc_usb.c) 32 * 04.01.2000 0.2 Turned into its own filesystem 33 * 30.09.2005 0.3 Fix user-triggerable oops in async URB delivery 34 * (CAN-2005-3055) 35 */ 36 37 /*****************************************************************************/ 38 39 #include <linux/fs.h> 40 #include <linux/mm.h> 41 #include <linux/slab.h> 42 #include <linux/smp_lock.h> 43 #include <linux/signal.h> 44 #include <linux/poll.h> 45 #include <linux/module.h> 46 #include <linux/usb.h> 47 #include <linux/usbdevice_fs.h> 48 #include <linux/cdev.h> 49 #include <linux/notifier.h> 50 #include <asm/uaccess.h> 51 #include <asm/byteorder.h> 52 #include <linux/moduleparam.h> 53 54 #include "hcd.h" /* for usbcore internals */ 55 #include "usb.h" 56 57 #define USB_MAXBUS 64 58 #define USB_DEVICE_MAX USB_MAXBUS * 128 59 static struct class *usb_device_class; 60 61 struct async { 62 struct list_head asynclist; 63 struct dev_state *ps; 64 pid_t pid; 65 uid_t uid, euid; 66 unsigned int signr; 67 unsigned int ifnum; 68 void __user *userbuffer; 69 void __user *userurb; 70 struct urb *urb; 71 }; 72 73 static int usbfs_snoop = 0; 74 module_param (usbfs_snoop, bool, S_IRUGO | S_IWUSR); 75 MODULE_PARM_DESC (usbfs_snoop, "true to log all usbfs traffic"); 76 77 #define snoop(dev, format, arg...) \ 78 do { \ 79 if (usbfs_snoop) \ 80 dev_info( dev , format , ## arg); \ 81 } while (0) 82 83 #define USB_DEVICE_DEV MKDEV(USB_DEVICE_MAJOR, 0) 84 85 86 #define MAX_USBFS_BUFFER_SIZE 16384 87 88 static inline int connected (struct usb_device *dev) 89 { 90 return dev->state != USB_STATE_NOTATTACHED; 91 } 92 93 static loff_t usbdev_lseek(struct file *file, loff_t offset, int orig) 94 { 95 loff_t ret; 96 97 lock_kernel(); 98 99 switch (orig) { 100 case 0: 101 file->f_pos = offset; 102 ret = file->f_pos; 103 break; 104 case 1: 105 file->f_pos += offset; 106 ret = file->f_pos; 107 break; 108 case 2: 109 default: 110 ret = -EINVAL; 111 } 112 113 unlock_kernel(); 114 return ret; 115 } 116 117 static ssize_t usbdev_read(struct file *file, char __user *buf, size_t nbytes, loff_t *ppos) 118 { 119 struct dev_state *ps = (struct dev_state *)file->private_data; 120 struct usb_device *dev = ps->dev; 121 ssize_t ret = 0; 122 unsigned len; 123 loff_t pos; 124 int i; 125 126 pos = *ppos; 127 usb_lock_device(dev); 128 if (!connected(dev)) { 129 ret = -ENODEV; 130 goto err; 131 } else if (pos < 0) { 132 ret = -EINVAL; 133 goto err; 134 } 135 136 if (pos < sizeof(struct usb_device_descriptor)) { 137 struct usb_device_descriptor *desc = kmalloc(sizeof(*desc), GFP_KERNEL); 138 if (!desc) { 139 ret = -ENOMEM; 140 goto err; 141 } 142 memcpy(desc, &dev->descriptor, sizeof(dev->descriptor)); 143 le16_to_cpus(&desc->bcdUSB); 144 le16_to_cpus(&desc->idVendor); 145 le16_to_cpus(&desc->idProduct); 146 le16_to_cpus(&desc->bcdDevice); 147 148 len = sizeof(struct usb_device_descriptor) - pos; 149 if (len > nbytes) 150 len = nbytes; 151 if (copy_to_user(buf, ((char *)desc) + pos, len)) { 152 kfree(desc); 153 ret = -EFAULT; 154 goto err; 155 } 156 kfree(desc); 157 158 *ppos += len; 159 buf += len; 160 nbytes -= len; 161 ret += len; 162 } 163 164 pos = sizeof(struct usb_device_descriptor); 165 for (i = 0; nbytes && i < dev->descriptor.bNumConfigurations; i++) { 166 struct usb_config_descriptor *config = 167 (struct usb_config_descriptor *)dev->rawdescriptors[i]; 168 unsigned int length = le16_to_cpu(config->wTotalLength); 169 170 if (*ppos < pos + length) { 171 172 /* The descriptor may claim to be longer than it 173 * really is. Here is the actual allocated length. */ 174 unsigned alloclen = 175 le16_to_cpu(dev->config[i].desc.wTotalLength); 176 177 len = length - (*ppos - pos); 178 if (len > nbytes) 179 len = nbytes; 180 181 /* Simply don't write (skip over) unallocated parts */ 182 if (alloclen > (*ppos - pos)) { 183 alloclen -= (*ppos - pos); 184 if (copy_to_user(buf, 185 dev->rawdescriptors[i] + (*ppos - pos), 186 min(len, alloclen))) { 187 ret = -EFAULT; 188 goto err; 189 } 190 } 191 192 *ppos += len; 193 buf += len; 194 nbytes -= len; 195 ret += len; 196 } 197 198 pos += length; 199 } 200 201 err: 202 usb_unlock_device(dev); 203 return ret; 204 } 205 206 /* 207 * async list handling 208 */ 209 210 static struct async *alloc_async(unsigned int numisoframes) 211 { 212 unsigned int assize = sizeof(struct async) + numisoframes * sizeof(struct usb_iso_packet_descriptor); 213 struct async *as = kzalloc(assize, GFP_KERNEL); 214 215 if (!as) 216 return NULL; 217 as->urb = usb_alloc_urb(numisoframes, GFP_KERNEL); 218 if (!as->urb) { 219 kfree(as); 220 return NULL; 221 } 222 return as; 223 } 224 225 static void free_async(struct async *as) 226 { 227 kfree(as->urb->transfer_buffer); 228 kfree(as->urb->setup_packet); 229 usb_free_urb(as->urb); 230 kfree(as); 231 } 232 233 static inline void async_newpending(struct async *as) 234 { 235 struct dev_state *ps = as->ps; 236 unsigned long flags; 237 238 spin_lock_irqsave(&ps->lock, flags); 239 list_add_tail(&as->asynclist, &ps->async_pending); 240 spin_unlock_irqrestore(&ps->lock, flags); 241 } 242 243 static inline void async_removepending(struct async *as) 244 { 245 struct dev_state *ps = as->ps; 246 unsigned long flags; 247 248 spin_lock_irqsave(&ps->lock, flags); 249 list_del_init(&as->asynclist); 250 spin_unlock_irqrestore(&ps->lock, flags); 251 } 252 253 static inline struct async *async_getcompleted(struct dev_state *ps) 254 { 255 unsigned long flags; 256 struct async *as = NULL; 257 258 spin_lock_irqsave(&ps->lock, flags); 259 if (!list_empty(&ps->async_completed)) { 260 as = list_entry(ps->async_completed.next, struct async, asynclist); 261 list_del_init(&as->asynclist); 262 } 263 spin_unlock_irqrestore(&ps->lock, flags); 264 return as; 265 } 266 267 static inline struct async *async_getpending(struct dev_state *ps, void __user *userurb) 268 { 269 unsigned long flags; 270 struct async *as; 271 272 spin_lock_irqsave(&ps->lock, flags); 273 list_for_each_entry(as, &ps->async_pending, asynclist) 274 if (as->userurb == userurb) { 275 list_del_init(&as->asynclist); 276 spin_unlock_irqrestore(&ps->lock, flags); 277 return as; 278 } 279 spin_unlock_irqrestore(&ps->lock, flags); 280 return NULL; 281 } 282 283 static void snoop_urb(struct urb *urb, void __user *userurb) 284 { 285 int j; 286 unsigned char *data = urb->transfer_buffer; 287 288 if (!usbfs_snoop) 289 return; 290 291 if (urb->pipe & USB_DIR_IN) 292 dev_info(&urb->dev->dev, "direction=IN\n"); 293 else 294 dev_info(&urb->dev->dev, "direction=OUT\n"); 295 dev_info(&urb->dev->dev, "userurb=%p\n", userurb); 296 dev_info(&urb->dev->dev, "transfer_buffer_length=%d\n", 297 urb->transfer_buffer_length); 298 dev_info(&urb->dev->dev, "actual_length=%d\n", urb->actual_length); 299 dev_info(&urb->dev->dev, "data: "); 300 for (j = 0; j < urb->transfer_buffer_length; ++j) 301 printk ("%02x ", data[j]); 302 printk("\n"); 303 } 304 305 static void async_completed(struct urb *urb, struct pt_regs *regs) 306 { 307 struct async *as = (struct async *)urb->context; 308 struct dev_state *ps = as->ps; 309 struct siginfo sinfo; 310 311 spin_lock(&ps->lock); 312 list_move_tail(&as->asynclist, &ps->async_completed); 313 spin_unlock(&ps->lock); 314 if (as->signr) { 315 sinfo.si_signo = as->signr; 316 sinfo.si_errno = as->urb->status; 317 sinfo.si_code = SI_ASYNCIO; 318 sinfo.si_addr = as->userurb; 319 kill_proc_info_as_uid(as->signr, &sinfo, as->pid, as->uid, 320 as->euid); 321 } 322 snoop(&urb->dev->dev, "urb complete\n"); 323 snoop_urb(urb, as->userurb); 324 wake_up(&ps->wait); 325 } 326 327 static void destroy_async (struct dev_state *ps, struct list_head *list) 328 { 329 struct async *as; 330 unsigned long flags; 331 332 spin_lock_irqsave(&ps->lock, flags); 333 while (!list_empty(list)) { 334 as = list_entry(list->next, struct async, asynclist); 335 list_del_init(&as->asynclist); 336 337 /* drop the spinlock so the completion handler can run */ 338 spin_unlock_irqrestore(&ps->lock, flags); 339 usb_kill_urb(as->urb); 340 spin_lock_irqsave(&ps->lock, flags); 341 } 342 spin_unlock_irqrestore(&ps->lock, flags); 343 as = async_getcompleted(ps); 344 while (as) { 345 free_async(as); 346 as = async_getcompleted(ps); 347 } 348 } 349 350 static void destroy_async_on_interface (struct dev_state *ps, unsigned int ifnum) 351 { 352 struct list_head *p, *q, hitlist; 353 unsigned long flags; 354 355 INIT_LIST_HEAD(&hitlist); 356 spin_lock_irqsave(&ps->lock, flags); 357 list_for_each_safe(p, q, &ps->async_pending) 358 if (ifnum == list_entry(p, struct async, asynclist)->ifnum) 359 list_move_tail(p, &hitlist); 360 spin_unlock_irqrestore(&ps->lock, flags); 361 destroy_async(ps, &hitlist); 362 } 363 364 static inline void destroy_all_async(struct dev_state *ps) 365 { 366 destroy_async(ps, &ps->async_pending); 367 } 368 369 /* 370 * interface claims are made only at the request of user level code, 371 * which can also release them (explicitly or by closing files). 372 * they're also undone when devices disconnect. 373 */ 374 375 static int driver_probe (struct usb_interface *intf, 376 const struct usb_device_id *id) 377 { 378 return -ENODEV; 379 } 380 381 static void driver_disconnect(struct usb_interface *intf) 382 { 383 struct dev_state *ps = usb_get_intfdata (intf); 384 unsigned int ifnum = intf->altsetting->desc.bInterfaceNumber; 385 386 if (!ps) 387 return; 388 389 /* NOTE: this relies on usbcore having canceled and completed 390 * all pending I/O requests; 2.6 does that. 391 */ 392 393 if (likely(ifnum < 8*sizeof(ps->ifclaimed))) 394 clear_bit(ifnum, &ps->ifclaimed); 395 else 396 warn("interface number %u out of range", ifnum); 397 398 usb_set_intfdata (intf, NULL); 399 400 /* force async requests to complete */ 401 destroy_async_on_interface(ps, ifnum); 402 } 403 404 struct usb_driver usbfs_driver = { 405 .name = "usbfs", 406 .probe = driver_probe, 407 .disconnect = driver_disconnect, 408 }; 409 410 static int claimintf(struct dev_state *ps, unsigned int ifnum) 411 { 412 struct usb_device *dev = ps->dev; 413 struct usb_interface *intf; 414 int err; 415 416 if (ifnum >= 8*sizeof(ps->ifclaimed)) 417 return -EINVAL; 418 /* already claimed */ 419 if (test_bit(ifnum, &ps->ifclaimed)) 420 return 0; 421 422 /* lock against other changes to driver bindings */ 423 down_write(&usb_bus_type.subsys.rwsem); 424 intf = usb_ifnum_to_if(dev, ifnum); 425 if (!intf) 426 err = -ENOENT; 427 else 428 err = usb_driver_claim_interface(&usbfs_driver, intf, ps); 429 up_write(&usb_bus_type.subsys.rwsem); 430 if (err == 0) 431 set_bit(ifnum, &ps->ifclaimed); 432 return err; 433 } 434 435 static int releaseintf(struct dev_state *ps, unsigned int ifnum) 436 { 437 struct usb_device *dev; 438 struct usb_interface *intf; 439 int err; 440 441 err = -EINVAL; 442 if (ifnum >= 8*sizeof(ps->ifclaimed)) 443 return err; 444 dev = ps->dev; 445 /* lock against other changes to driver bindings */ 446 down_write(&usb_bus_type.subsys.rwsem); 447 intf = usb_ifnum_to_if(dev, ifnum); 448 if (!intf) 449 err = -ENOENT; 450 else if (test_and_clear_bit(ifnum, &ps->ifclaimed)) { 451 usb_driver_release_interface(&usbfs_driver, intf); 452 err = 0; 453 } 454 up_write(&usb_bus_type.subsys.rwsem); 455 return err; 456 } 457 458 static int checkintf(struct dev_state *ps, unsigned int ifnum) 459 { 460 if (ps->dev->state != USB_STATE_CONFIGURED) 461 return -EHOSTUNREACH; 462 if (ifnum >= 8*sizeof(ps->ifclaimed)) 463 return -EINVAL; 464 if (test_bit(ifnum, &ps->ifclaimed)) 465 return 0; 466 /* if not yet claimed, claim it for the driver */ 467 dev_warn(&ps->dev->dev, "usbfs: process %d (%s) did not claim interface %u before use\n", 468 current->pid, current->comm, ifnum); 469 return claimintf(ps, ifnum); 470 } 471 472 static int findintfep(struct usb_device *dev, unsigned int ep) 473 { 474 unsigned int i, j, e; 475 struct usb_interface *intf; 476 struct usb_host_interface *alts; 477 struct usb_endpoint_descriptor *endpt; 478 479 if (ep & ~(USB_DIR_IN|0xf)) 480 return -EINVAL; 481 if (!dev->actconfig) 482 return -ESRCH; 483 for (i = 0; i < dev->actconfig->desc.bNumInterfaces; i++) { 484 intf = dev->actconfig->interface[i]; 485 for (j = 0; j < intf->num_altsetting; j++) { 486 alts = &intf->altsetting[j]; 487 for (e = 0; e < alts->desc.bNumEndpoints; e++) { 488 endpt = &alts->endpoint[e].desc; 489 if (endpt->bEndpointAddress == ep) 490 return alts->desc.bInterfaceNumber; 491 } 492 } 493 } 494 return -ENOENT; 495 } 496 497 static int check_ctrlrecip(struct dev_state *ps, unsigned int requesttype, unsigned int index) 498 { 499 int ret = 0; 500 501 if (ps->dev->state != USB_STATE_CONFIGURED) 502 return -EHOSTUNREACH; 503 if (USB_TYPE_VENDOR == (USB_TYPE_MASK & requesttype)) 504 return 0; 505 506 index &= 0xff; 507 switch (requesttype & USB_RECIP_MASK) { 508 case USB_RECIP_ENDPOINT: 509 if ((ret = findintfep(ps->dev, index)) >= 0) 510 ret = checkintf(ps, ret); 511 break; 512 513 case USB_RECIP_INTERFACE: 514 ret = checkintf(ps, index); 515 break; 516 } 517 return ret; 518 } 519 520 static struct usb_device *usbdev_lookup_minor(int minor) 521 { 522 struct class_device *class_dev; 523 struct usb_device *dev = NULL; 524 525 down(&usb_device_class->sem); 526 list_for_each_entry(class_dev, &usb_device_class->children, node) { 527 if (class_dev->devt == MKDEV(USB_DEVICE_MAJOR, minor)) { 528 dev = class_dev->class_data; 529 break; 530 } 531 } 532 up(&usb_device_class->sem); 533 534 return dev; 535 }; 536 537 /* 538 * file operations 539 */ 540 static int usbdev_open(struct inode *inode, struct file *file) 541 { 542 struct usb_device *dev = NULL; 543 struct dev_state *ps; 544 int ret; 545 546 /* 547 * no locking necessary here, as chrdev_open has the kernel lock 548 * (still acquire the kernel lock for safety) 549 */ 550 ret = -ENOMEM; 551 if (!(ps = kmalloc(sizeof(struct dev_state), GFP_KERNEL))) 552 goto out_nolock; 553 554 lock_kernel(); 555 ret = -ENOENT; 556 /* check if we are called from a real node or usbfs */ 557 if (imajor(inode) == USB_DEVICE_MAJOR) 558 dev = usbdev_lookup_minor(iminor(inode)); 559 if (!dev) 560 dev = inode->u.generic_ip; 561 if (!dev) { 562 kfree(ps); 563 goto out; 564 } 565 usb_get_dev(dev); 566 ret = 0; 567 ps->dev = dev; 568 ps->file = file; 569 spin_lock_init(&ps->lock); 570 INIT_LIST_HEAD(&ps->async_pending); 571 INIT_LIST_HEAD(&ps->async_completed); 572 init_waitqueue_head(&ps->wait); 573 ps->discsignr = 0; 574 ps->disc_pid = current->pid; 575 ps->disc_uid = current->uid; 576 ps->disc_euid = current->euid; 577 ps->disccontext = NULL; 578 ps->ifclaimed = 0; 579 wmb(); 580 list_add_tail(&ps->list, &dev->filelist); 581 file->private_data = ps; 582 out: 583 unlock_kernel(); 584 out_nolock: 585 return ret; 586 } 587 588 static int usbdev_release(struct inode *inode, struct file *file) 589 { 590 struct dev_state *ps = (struct dev_state *)file->private_data; 591 struct usb_device *dev = ps->dev; 592 unsigned int ifnum; 593 594 usb_lock_device(dev); 595 list_del_init(&ps->list); 596 for (ifnum = 0; ps->ifclaimed && ifnum < 8*sizeof(ps->ifclaimed); 597 ifnum++) { 598 if (test_bit(ifnum, &ps->ifclaimed)) 599 releaseintf(ps, ifnum); 600 } 601 destroy_all_async(ps); 602 usb_unlock_device(dev); 603 usb_put_dev(dev); 604 ps->dev = NULL; 605 kfree(ps); 606 return 0; 607 } 608 609 static int proc_control(struct dev_state *ps, void __user *arg) 610 { 611 struct usb_device *dev = ps->dev; 612 struct usbdevfs_ctrltransfer ctrl; 613 unsigned int tmo; 614 unsigned char *tbuf; 615 int i, j, ret; 616 617 if (copy_from_user(&ctrl, arg, sizeof(ctrl))) 618 return -EFAULT; 619 if ((ret = check_ctrlrecip(ps, ctrl.bRequestType, ctrl.wIndex))) 620 return ret; 621 if (ctrl.wLength > PAGE_SIZE) 622 return -EINVAL; 623 if (!(tbuf = (unsigned char *)__get_free_page(GFP_KERNEL))) 624 return -ENOMEM; 625 tmo = ctrl.timeout; 626 if (ctrl.bRequestType & 0x80) { 627 if (ctrl.wLength && !access_ok(VERIFY_WRITE, ctrl.data, ctrl.wLength)) { 628 free_page((unsigned long)tbuf); 629 return -EINVAL; 630 } 631 snoop(&dev->dev, "control read: bRequest=%02x " 632 "bRrequestType=%02x wValue=%04x " 633 "wIndex=%04x wLength=%04x\n", 634 ctrl.bRequest, ctrl.bRequestType, ctrl.wValue, 635 ctrl.wIndex, ctrl.wLength); 636 637 usb_unlock_device(dev); 638 i = usb_control_msg(dev, usb_rcvctrlpipe(dev, 0), ctrl.bRequest, ctrl.bRequestType, 639 ctrl.wValue, ctrl.wIndex, tbuf, ctrl.wLength, tmo); 640 usb_lock_device(dev); 641 if ((i > 0) && ctrl.wLength) { 642 if (usbfs_snoop) { 643 dev_info(&dev->dev, "control read: data "); 644 for (j = 0; j < i; ++j) 645 printk("%02x ", (unsigned char)(tbuf)[j]); 646 printk("\n"); 647 } 648 if (copy_to_user(ctrl.data, tbuf, i)) { 649 free_page((unsigned long)tbuf); 650 return -EFAULT; 651 } 652 } 653 } else { 654 if (ctrl.wLength) { 655 if (copy_from_user(tbuf, ctrl.data, ctrl.wLength)) { 656 free_page((unsigned long)tbuf); 657 return -EFAULT; 658 } 659 } 660 snoop(&dev->dev, "control write: bRequest=%02x " 661 "bRrequestType=%02x wValue=%04x " 662 "wIndex=%04x wLength=%04x\n", 663 ctrl.bRequest, ctrl.bRequestType, ctrl.wValue, 664 ctrl.wIndex, ctrl.wLength); 665 if (usbfs_snoop) { 666 dev_info(&dev->dev, "control write: data: "); 667 for (j = 0; j < ctrl.wLength; ++j) 668 printk("%02x ", (unsigned char)(tbuf)[j]); 669 printk("\n"); 670 } 671 usb_unlock_device(dev); 672 i = usb_control_msg(dev, usb_sndctrlpipe(dev, 0), ctrl.bRequest, ctrl.bRequestType, 673 ctrl.wValue, ctrl.wIndex, tbuf, ctrl.wLength, tmo); 674 usb_lock_device(dev); 675 } 676 free_page((unsigned long)tbuf); 677 if (i<0 && i != -EPIPE) { 678 dev_printk(KERN_DEBUG, &dev->dev, "usbfs: USBDEVFS_CONTROL " 679 "failed cmd %s rqt %u rq %u len %u ret %d\n", 680 current->comm, ctrl.bRequestType, ctrl.bRequest, 681 ctrl.wLength, i); 682 } 683 return i; 684 } 685 686 static int proc_bulk(struct dev_state *ps, void __user *arg) 687 { 688 struct usb_device *dev = ps->dev; 689 struct usbdevfs_bulktransfer bulk; 690 unsigned int tmo, len1, pipe; 691 int len2; 692 unsigned char *tbuf; 693 int i, j, ret; 694 695 if (copy_from_user(&bulk, arg, sizeof(bulk))) 696 return -EFAULT; 697 if ((ret = findintfep(ps->dev, bulk.ep)) < 0) 698 return ret; 699 if ((ret = checkintf(ps, ret))) 700 return ret; 701 if (bulk.ep & USB_DIR_IN) 702 pipe = usb_rcvbulkpipe(dev, bulk.ep & 0x7f); 703 else 704 pipe = usb_sndbulkpipe(dev, bulk.ep & 0x7f); 705 if (!usb_maxpacket(dev, pipe, !(bulk.ep & USB_DIR_IN))) 706 return -EINVAL; 707 len1 = bulk.len; 708 if (len1 > MAX_USBFS_BUFFER_SIZE) 709 return -EINVAL; 710 if (!(tbuf = kmalloc(len1, GFP_KERNEL))) 711 return -ENOMEM; 712 tmo = bulk.timeout; 713 if (bulk.ep & 0x80) { 714 if (len1 && !access_ok(VERIFY_WRITE, bulk.data, len1)) { 715 kfree(tbuf); 716 return -EINVAL; 717 } 718 snoop(&dev->dev, "bulk read: len=0x%02x timeout=%04d\n", 719 bulk.len, bulk.timeout); 720 usb_unlock_device(dev); 721 i = usb_bulk_msg(dev, pipe, tbuf, len1, &len2, tmo); 722 usb_lock_device(dev); 723 if (!i && len2) { 724 if (usbfs_snoop) { 725 dev_info(&dev->dev, "bulk read: data "); 726 for (j = 0; j < len2; ++j) 727 printk("%02x ", (unsigned char)(tbuf)[j]); 728 printk("\n"); 729 } 730 if (copy_to_user(bulk.data, tbuf, len2)) { 731 kfree(tbuf); 732 return -EFAULT; 733 } 734 } 735 } else { 736 if (len1) { 737 if (copy_from_user(tbuf, bulk.data, len1)) { 738 kfree(tbuf); 739 return -EFAULT; 740 } 741 } 742 snoop(&dev->dev, "bulk write: len=0x%02x timeout=%04d\n", 743 bulk.len, bulk.timeout); 744 if (usbfs_snoop) { 745 dev_info(&dev->dev, "bulk write: data: "); 746 for (j = 0; j < len1; ++j) 747 printk("%02x ", (unsigned char)(tbuf)[j]); 748 printk("\n"); 749 } 750 usb_unlock_device(dev); 751 i = usb_bulk_msg(dev, pipe, tbuf, len1, &len2, tmo); 752 usb_lock_device(dev); 753 } 754 kfree(tbuf); 755 if (i < 0) 756 return i; 757 return len2; 758 } 759 760 static int proc_resetep(struct dev_state *ps, void __user *arg) 761 { 762 unsigned int ep; 763 int ret; 764 765 if (get_user(ep, (unsigned int __user *)arg)) 766 return -EFAULT; 767 if ((ret = findintfep(ps->dev, ep)) < 0) 768 return ret; 769 if ((ret = checkintf(ps, ret))) 770 return ret; 771 usb_settoggle(ps->dev, ep & 0xf, !(ep & USB_DIR_IN), 0); 772 return 0; 773 } 774 775 static int proc_clearhalt(struct dev_state *ps, void __user *arg) 776 { 777 unsigned int ep; 778 int pipe; 779 int ret; 780 781 if (get_user(ep, (unsigned int __user *)arg)) 782 return -EFAULT; 783 if ((ret = findintfep(ps->dev, ep)) < 0) 784 return ret; 785 if ((ret = checkintf(ps, ret))) 786 return ret; 787 if (ep & USB_DIR_IN) 788 pipe = usb_rcvbulkpipe(ps->dev, ep & 0x7f); 789 else 790 pipe = usb_sndbulkpipe(ps->dev, ep & 0x7f); 791 792 return usb_clear_halt(ps->dev, pipe); 793 } 794 795 796 static int proc_getdriver(struct dev_state *ps, void __user *arg) 797 { 798 struct usbdevfs_getdriver gd; 799 struct usb_interface *intf; 800 int ret; 801 802 if (copy_from_user(&gd, arg, sizeof(gd))) 803 return -EFAULT; 804 down_read(&usb_bus_type.subsys.rwsem); 805 intf = usb_ifnum_to_if(ps->dev, gd.interface); 806 if (!intf || !intf->dev.driver) 807 ret = -ENODATA; 808 else { 809 strncpy(gd.driver, intf->dev.driver->name, 810 sizeof(gd.driver)); 811 ret = (copy_to_user(arg, &gd, sizeof(gd)) ? -EFAULT : 0); 812 } 813 up_read(&usb_bus_type.subsys.rwsem); 814 return ret; 815 } 816 817 static int proc_connectinfo(struct dev_state *ps, void __user *arg) 818 { 819 struct usbdevfs_connectinfo ci; 820 821 ci.devnum = ps->dev->devnum; 822 ci.slow = ps->dev->speed == USB_SPEED_LOW; 823 if (copy_to_user(arg, &ci, sizeof(ci))) 824 return -EFAULT; 825 return 0; 826 } 827 828 static int proc_resetdevice(struct dev_state *ps) 829 { 830 return usb_reset_device(ps->dev); 831 832 } 833 834 static int proc_setintf(struct dev_state *ps, void __user *arg) 835 { 836 struct usbdevfs_setinterface setintf; 837 int ret; 838 839 if (copy_from_user(&setintf, arg, sizeof(setintf))) 840 return -EFAULT; 841 if ((ret = checkintf(ps, setintf.interface))) 842 return ret; 843 return usb_set_interface(ps->dev, setintf.interface, 844 setintf.altsetting); 845 } 846 847 static int proc_setconfig(struct dev_state *ps, void __user *arg) 848 { 849 unsigned int u; 850 int status = 0; 851 struct usb_host_config *actconfig; 852 853 if (get_user(u, (unsigned int __user *)arg)) 854 return -EFAULT; 855 856 actconfig = ps->dev->actconfig; 857 858 /* Don't touch the device if any interfaces are claimed. 859 * It could interfere with other drivers' operations, and if 860 * an interface is claimed by usbfs it could easily deadlock. 861 */ 862 if (actconfig) { 863 int i; 864 865 for (i = 0; i < actconfig->desc.bNumInterfaces; ++i) { 866 if (usb_interface_claimed(actconfig->interface[i])) { 867 dev_warn (&ps->dev->dev, 868 "usbfs: interface %d claimed by %s " 869 "while '%s' sets config #%d\n", 870 actconfig->interface[i] 871 ->cur_altsetting 872 ->desc.bInterfaceNumber, 873 actconfig->interface[i] 874 ->dev.driver->name, 875 current->comm, u); 876 status = -EBUSY; 877 break; 878 } 879 } 880 } 881 882 /* SET_CONFIGURATION is often abused as a "cheap" driver reset, 883 * so avoid usb_set_configuration()'s kick to sysfs 884 */ 885 if (status == 0) { 886 if (actconfig && actconfig->desc.bConfigurationValue == u) 887 status = usb_reset_configuration(ps->dev); 888 else 889 status = usb_set_configuration(ps->dev, u); 890 } 891 892 return status; 893 } 894 895 static int proc_do_submiturb(struct dev_state *ps, struct usbdevfs_urb *uurb, 896 struct usbdevfs_iso_packet_desc __user *iso_frame_desc, 897 void __user *arg) 898 { 899 struct usbdevfs_iso_packet_desc *isopkt = NULL; 900 struct usb_host_endpoint *ep; 901 struct async *as; 902 struct usb_ctrlrequest *dr = NULL; 903 unsigned int u, totlen, isofrmlen; 904 int ret, interval = 0, ifnum = -1; 905 906 if (uurb->flags & ~(USBDEVFS_URB_ISO_ASAP|USBDEVFS_URB_SHORT_NOT_OK| 907 URB_NO_FSBR|URB_ZERO_PACKET)) 908 return -EINVAL; 909 if (!uurb->buffer) 910 return -EINVAL; 911 if (uurb->signr != 0 && (uurb->signr < SIGRTMIN || uurb->signr > SIGRTMAX)) 912 return -EINVAL; 913 if (!(uurb->type == USBDEVFS_URB_TYPE_CONTROL && (uurb->endpoint & ~USB_ENDPOINT_DIR_MASK) == 0)) { 914 if ((ifnum = findintfep(ps->dev, uurb->endpoint)) < 0) 915 return ifnum; 916 if ((ret = checkintf(ps, ifnum))) 917 return ret; 918 } 919 if ((uurb->endpoint & USB_ENDPOINT_DIR_MASK) != 0) 920 ep = ps->dev->ep_in [uurb->endpoint & USB_ENDPOINT_NUMBER_MASK]; 921 else 922 ep = ps->dev->ep_out [uurb->endpoint & USB_ENDPOINT_NUMBER_MASK]; 923 if (!ep) 924 return -ENOENT; 925 switch(uurb->type) { 926 case USBDEVFS_URB_TYPE_CONTROL: 927 if ((ep->desc.bmAttributes & USB_ENDPOINT_XFERTYPE_MASK) 928 != USB_ENDPOINT_XFER_CONTROL) 929 return -EINVAL; 930 /* min 8 byte setup packet, max arbitrary */ 931 if (uurb->buffer_length < 8 || uurb->buffer_length > PAGE_SIZE) 932 return -EINVAL; 933 if (!(dr = kmalloc(sizeof(struct usb_ctrlrequest), GFP_KERNEL))) 934 return -ENOMEM; 935 if (copy_from_user(dr, uurb->buffer, 8)) { 936 kfree(dr); 937 return -EFAULT; 938 } 939 if (uurb->buffer_length < (le16_to_cpup(&dr->wLength) + 8)) { 940 kfree(dr); 941 return -EINVAL; 942 } 943 if ((ret = check_ctrlrecip(ps, dr->bRequestType, le16_to_cpup(&dr->wIndex)))) { 944 kfree(dr); 945 return ret; 946 } 947 uurb->endpoint = (uurb->endpoint & ~USB_ENDPOINT_DIR_MASK) | (dr->bRequestType & USB_ENDPOINT_DIR_MASK); 948 uurb->number_of_packets = 0; 949 uurb->buffer_length = le16_to_cpup(&dr->wLength); 950 uurb->buffer += 8; 951 if (!access_ok((uurb->endpoint & USB_DIR_IN) ? VERIFY_WRITE : VERIFY_READ, uurb->buffer, uurb->buffer_length)) { 952 kfree(dr); 953 return -EFAULT; 954 } 955 snoop(&ps->dev->dev, "control urb\n"); 956 break; 957 958 case USBDEVFS_URB_TYPE_BULK: 959 switch (ep->desc.bmAttributes & USB_ENDPOINT_XFERTYPE_MASK) { 960 case USB_ENDPOINT_XFER_CONTROL: 961 case USB_ENDPOINT_XFER_ISOC: 962 return -EINVAL; 963 /* allow single-shot interrupt transfers, at bogus rates */ 964 } 965 uurb->number_of_packets = 0; 966 if (uurb->buffer_length > MAX_USBFS_BUFFER_SIZE) 967 return -EINVAL; 968 if (!access_ok((uurb->endpoint & USB_DIR_IN) ? VERIFY_WRITE : VERIFY_READ, uurb->buffer, uurb->buffer_length)) 969 return -EFAULT; 970 snoop(&ps->dev->dev, "bulk urb\n"); 971 break; 972 973 case USBDEVFS_URB_TYPE_ISO: 974 /* arbitrary limit */ 975 if (uurb->number_of_packets < 1 || uurb->number_of_packets > 128) 976 return -EINVAL; 977 if ((ep->desc.bmAttributes & USB_ENDPOINT_XFERTYPE_MASK) 978 != USB_ENDPOINT_XFER_ISOC) 979 return -EINVAL; 980 interval = 1 << min (15, ep->desc.bInterval - 1); 981 isofrmlen = sizeof(struct usbdevfs_iso_packet_desc) * uurb->number_of_packets; 982 if (!(isopkt = kmalloc(isofrmlen, GFP_KERNEL))) 983 return -ENOMEM; 984 if (copy_from_user(isopkt, iso_frame_desc, isofrmlen)) { 985 kfree(isopkt); 986 return -EFAULT; 987 } 988 for (totlen = u = 0; u < uurb->number_of_packets; u++) { 989 if (isopkt[u].length > 1023) { 990 kfree(isopkt); 991 return -EINVAL; 992 } 993 totlen += isopkt[u].length; 994 } 995 if (totlen > 32768) { 996 kfree(isopkt); 997 return -EINVAL; 998 } 999 uurb->buffer_length = totlen; 1000 snoop(&ps->dev->dev, "iso urb\n"); 1001 break; 1002 1003 case USBDEVFS_URB_TYPE_INTERRUPT: 1004 uurb->number_of_packets = 0; 1005 if ((ep->desc.bmAttributes & USB_ENDPOINT_XFERTYPE_MASK) 1006 != USB_ENDPOINT_XFER_INT) 1007 return -EINVAL; 1008 if (ps->dev->speed == USB_SPEED_HIGH) 1009 interval = 1 << min (15, ep->desc.bInterval - 1); 1010 else 1011 interval = ep->desc.bInterval; 1012 if (uurb->buffer_length > MAX_USBFS_BUFFER_SIZE) 1013 return -EINVAL; 1014 if (!access_ok((uurb->endpoint & USB_DIR_IN) ? VERIFY_WRITE : VERIFY_READ, uurb->buffer, uurb->buffer_length)) 1015 return -EFAULT; 1016 snoop(&ps->dev->dev, "interrupt urb\n"); 1017 break; 1018 1019 default: 1020 return -EINVAL; 1021 } 1022 if (!(as = alloc_async(uurb->number_of_packets))) { 1023 kfree(isopkt); 1024 kfree(dr); 1025 return -ENOMEM; 1026 } 1027 if (!(as->urb->transfer_buffer = kmalloc(uurb->buffer_length, GFP_KERNEL))) { 1028 kfree(isopkt); 1029 kfree(dr); 1030 free_async(as); 1031 return -ENOMEM; 1032 } 1033 as->urb->dev = ps->dev; 1034 as->urb->pipe = (uurb->type << 30) | __create_pipe(ps->dev, uurb->endpoint & 0xf) | (uurb->endpoint & USB_DIR_IN); 1035 as->urb->transfer_flags = uurb->flags; 1036 as->urb->transfer_buffer_length = uurb->buffer_length; 1037 as->urb->setup_packet = (unsigned char*)dr; 1038 as->urb->start_frame = uurb->start_frame; 1039 as->urb->number_of_packets = uurb->number_of_packets; 1040 as->urb->interval = interval; 1041 as->urb->context = as; 1042 as->urb->complete = async_completed; 1043 for (totlen = u = 0; u < uurb->number_of_packets; u++) { 1044 as->urb->iso_frame_desc[u].offset = totlen; 1045 as->urb->iso_frame_desc[u].length = isopkt[u].length; 1046 totlen += isopkt[u].length; 1047 } 1048 kfree(isopkt); 1049 as->ps = ps; 1050 as->userurb = arg; 1051 if (uurb->endpoint & USB_DIR_IN) 1052 as->userbuffer = uurb->buffer; 1053 else 1054 as->userbuffer = NULL; 1055 as->signr = uurb->signr; 1056 as->ifnum = ifnum; 1057 as->pid = current->pid; 1058 as->uid = current->uid; 1059 as->euid = current->euid; 1060 if (!(uurb->endpoint & USB_DIR_IN)) { 1061 if (copy_from_user(as->urb->transfer_buffer, uurb->buffer, as->urb->transfer_buffer_length)) { 1062 free_async(as); 1063 return -EFAULT; 1064 } 1065 } 1066 snoop(&as->urb->dev->dev, "submit urb\n"); 1067 snoop_urb(as->urb, as->userurb); 1068 async_newpending(as); 1069 if ((ret = usb_submit_urb(as->urb, GFP_KERNEL))) { 1070 dev_printk(KERN_DEBUG, &ps->dev->dev, "usbfs: usb_submit_urb returned %d\n", ret); 1071 async_removepending(as); 1072 free_async(as); 1073 return ret; 1074 } 1075 return 0; 1076 } 1077 1078 static int proc_submiturb(struct dev_state *ps, void __user *arg) 1079 { 1080 struct usbdevfs_urb uurb; 1081 1082 if (copy_from_user(&uurb, arg, sizeof(uurb))) 1083 return -EFAULT; 1084 1085 return proc_do_submiturb(ps, &uurb, (((struct usbdevfs_urb __user *)arg)->iso_frame_desc), arg); 1086 } 1087 1088 static int proc_unlinkurb(struct dev_state *ps, void __user *arg) 1089 { 1090 struct async *as; 1091 1092 as = async_getpending(ps, arg); 1093 if (!as) 1094 return -EINVAL; 1095 usb_kill_urb(as->urb); 1096 return 0; 1097 } 1098 1099 static int processcompl(struct async *as, void __user * __user *arg) 1100 { 1101 struct urb *urb = as->urb; 1102 struct usbdevfs_urb __user *userurb = as->userurb; 1103 void __user *addr = as->userurb; 1104 unsigned int i; 1105 1106 if (as->userbuffer) 1107 if (copy_to_user(as->userbuffer, urb->transfer_buffer, urb->transfer_buffer_length)) 1108 return -EFAULT; 1109 if (put_user(urb->status, &userurb->status)) 1110 return -EFAULT; 1111 if (put_user(urb->actual_length, &userurb->actual_length)) 1112 return -EFAULT; 1113 if (put_user(urb->error_count, &userurb->error_count)) 1114 return -EFAULT; 1115 1116 if (usb_pipeisoc(urb->pipe)) { 1117 for (i = 0; i < urb->number_of_packets; i++) { 1118 if (put_user(urb->iso_frame_desc[i].actual_length, 1119 &userurb->iso_frame_desc[i].actual_length)) 1120 return -EFAULT; 1121 if (put_user(urb->iso_frame_desc[i].status, 1122 &userurb->iso_frame_desc[i].status)) 1123 return -EFAULT; 1124 } 1125 } 1126 1127 free_async(as); 1128 1129 if (put_user(addr, (void __user * __user *)arg)) 1130 return -EFAULT; 1131 return 0; 1132 } 1133 1134 static struct async* reap_as(struct dev_state *ps) 1135 { 1136 DECLARE_WAITQUEUE(wait, current); 1137 struct async *as = NULL; 1138 struct usb_device *dev = ps->dev; 1139 1140 add_wait_queue(&ps->wait, &wait); 1141 for (;;) { 1142 __set_current_state(TASK_INTERRUPTIBLE); 1143 if ((as = async_getcompleted(ps))) 1144 break; 1145 if (signal_pending(current)) 1146 break; 1147 usb_unlock_device(dev); 1148 schedule(); 1149 usb_lock_device(dev); 1150 } 1151 remove_wait_queue(&ps->wait, &wait); 1152 set_current_state(TASK_RUNNING); 1153 return as; 1154 } 1155 1156 static int proc_reapurb(struct dev_state *ps, void __user *arg) 1157 { 1158 struct async *as = reap_as(ps); 1159 if (as) 1160 return processcompl(as, (void __user * __user *)arg); 1161 if (signal_pending(current)) 1162 return -EINTR; 1163 return -EIO; 1164 } 1165 1166 static int proc_reapurbnonblock(struct dev_state *ps, void __user *arg) 1167 { 1168 struct async *as; 1169 1170 if (!(as = async_getcompleted(ps))) 1171 return -EAGAIN; 1172 return processcompl(as, (void __user * __user *)arg); 1173 } 1174 1175 #ifdef CONFIG_COMPAT 1176 1177 static int get_urb32(struct usbdevfs_urb *kurb, 1178 struct usbdevfs_urb32 __user *uurb) 1179 { 1180 __u32 uptr; 1181 if (get_user(kurb->type, &uurb->type) || 1182 __get_user(kurb->endpoint, &uurb->endpoint) || 1183 __get_user(kurb->status, &uurb->status) || 1184 __get_user(kurb->flags, &uurb->flags) || 1185 __get_user(kurb->buffer_length, &uurb->buffer_length) || 1186 __get_user(kurb->actual_length, &uurb->actual_length) || 1187 __get_user(kurb->start_frame, &uurb->start_frame) || 1188 __get_user(kurb->number_of_packets, &uurb->number_of_packets) || 1189 __get_user(kurb->error_count, &uurb->error_count) || 1190 __get_user(kurb->signr, &uurb->signr)) 1191 return -EFAULT; 1192 1193 if (__get_user(uptr, &uurb->buffer)) 1194 return -EFAULT; 1195 kurb->buffer = compat_ptr(uptr); 1196 if (__get_user(uptr, &uurb->buffer)) 1197 return -EFAULT; 1198 kurb->usercontext = compat_ptr(uptr); 1199 1200 return 0; 1201 } 1202 1203 static int proc_submiturb_compat(struct dev_state *ps, void __user *arg) 1204 { 1205 struct usbdevfs_urb uurb; 1206 1207 if (get_urb32(&uurb,(struct usbdevfs_urb32 *)arg)) 1208 return -EFAULT; 1209 1210 return proc_do_submiturb(ps, &uurb, ((struct usbdevfs_urb32 __user *)arg)->iso_frame_desc, arg); 1211 } 1212 1213 static int processcompl_compat(struct async *as, void __user * __user *arg) 1214 { 1215 struct urb *urb = as->urb; 1216 struct usbdevfs_urb32 __user *userurb = as->userurb; 1217 void __user *addr = as->userurb; 1218 unsigned int i; 1219 1220 if (as->userbuffer) 1221 if (copy_to_user(as->userbuffer, urb->transfer_buffer, urb->transfer_buffer_length)) 1222 return -EFAULT; 1223 if (put_user(urb->status, &userurb->status)) 1224 return -EFAULT; 1225 if (put_user(urb->actual_length, &userurb->actual_length)) 1226 return -EFAULT; 1227 if (put_user(urb->error_count, &userurb->error_count)) 1228 return -EFAULT; 1229 1230 if (usb_pipeisoc(urb->pipe)) { 1231 for (i = 0; i < urb->number_of_packets; i++) { 1232 if (put_user(urb->iso_frame_desc[i].actual_length, 1233 &userurb->iso_frame_desc[i].actual_length)) 1234 return -EFAULT; 1235 if (put_user(urb->iso_frame_desc[i].status, 1236 &userurb->iso_frame_desc[i].status)) 1237 return -EFAULT; 1238 } 1239 } 1240 1241 free_async(as); 1242 if (put_user((u32)(u64)addr, (u32 __user *)arg)) 1243 return -EFAULT; 1244 return 0; 1245 } 1246 1247 static int proc_reapurb_compat(struct dev_state *ps, void __user *arg) 1248 { 1249 struct async *as = reap_as(ps); 1250 if (as) 1251 return processcompl_compat(as, (void __user * __user *)arg); 1252 if (signal_pending(current)) 1253 return -EINTR; 1254 return -EIO; 1255 } 1256 1257 static int proc_reapurbnonblock_compat(struct dev_state *ps, void __user *arg) 1258 { 1259 struct async *as; 1260 1261 if (!(as = async_getcompleted(ps))) 1262 return -EAGAIN; 1263 return processcompl_compat(as, (void __user * __user *)arg); 1264 } 1265 1266 #endif 1267 1268 static int proc_disconnectsignal(struct dev_state *ps, void __user *arg) 1269 { 1270 struct usbdevfs_disconnectsignal ds; 1271 1272 if (copy_from_user(&ds, arg, sizeof(ds))) 1273 return -EFAULT; 1274 if (ds.signr != 0 && (ds.signr < SIGRTMIN || ds.signr > SIGRTMAX)) 1275 return -EINVAL; 1276 ps->discsignr = ds.signr; 1277 ps->disccontext = ds.context; 1278 return 0; 1279 } 1280 1281 static int proc_claiminterface(struct dev_state *ps, void __user *arg) 1282 { 1283 unsigned int ifnum; 1284 1285 if (get_user(ifnum, (unsigned int __user *)arg)) 1286 return -EFAULT; 1287 return claimintf(ps, ifnum); 1288 } 1289 1290 static int proc_releaseinterface(struct dev_state *ps, void __user *arg) 1291 { 1292 unsigned int ifnum; 1293 int ret; 1294 1295 if (get_user(ifnum, (unsigned int __user *)arg)) 1296 return -EFAULT; 1297 if ((ret = releaseintf(ps, ifnum)) < 0) 1298 return ret; 1299 destroy_async_on_interface (ps, ifnum); 1300 return 0; 1301 } 1302 1303 static int proc_ioctl(struct dev_state *ps, struct usbdevfs_ioctl *ctl) 1304 { 1305 int size; 1306 void *buf = NULL; 1307 int retval = 0; 1308 struct usb_interface *intf = NULL; 1309 struct usb_driver *driver = NULL; 1310 1311 /* alloc buffer */ 1312 if ((size = _IOC_SIZE (ctl->ioctl_code)) > 0) { 1313 if ((buf = kmalloc (size, GFP_KERNEL)) == NULL) 1314 return -ENOMEM; 1315 if ((_IOC_DIR(ctl->ioctl_code) & _IOC_WRITE)) { 1316 if (copy_from_user (buf, ctl->data, size)) { 1317 kfree(buf); 1318 return -EFAULT; 1319 } 1320 } else { 1321 memset (buf, 0, size); 1322 } 1323 } 1324 1325 if (!connected(ps->dev)) { 1326 kfree(buf); 1327 return -ENODEV; 1328 } 1329 1330 if (ps->dev->state != USB_STATE_CONFIGURED) 1331 retval = -EHOSTUNREACH; 1332 else if (!(intf = usb_ifnum_to_if (ps->dev, ctl->ifno))) 1333 retval = -EINVAL; 1334 else switch (ctl->ioctl_code) { 1335 1336 /* disconnect kernel driver from interface */ 1337 case USBDEVFS_DISCONNECT: 1338 1339 down_write(&usb_bus_type.subsys.rwsem); 1340 if (intf->dev.driver) { 1341 driver = to_usb_driver(intf->dev.driver); 1342 dev_dbg (&intf->dev, "disconnect by usbfs\n"); 1343 usb_driver_release_interface(driver, intf); 1344 } else 1345 retval = -ENODATA; 1346 up_write(&usb_bus_type.subsys.rwsem); 1347 break; 1348 1349 /* let kernel drivers try to (re)bind to the interface */ 1350 case USBDEVFS_CONNECT: 1351 usb_unlock_device(ps->dev); 1352 bus_rescan_devices(intf->dev.bus); 1353 usb_lock_device(ps->dev); 1354 break; 1355 1356 /* talk directly to the interface's driver */ 1357 default: 1358 down_read(&usb_bus_type.subsys.rwsem); 1359 if (intf->dev.driver) 1360 driver = to_usb_driver(intf->dev.driver); 1361 if (driver == NULL || driver->ioctl == NULL) { 1362 retval = -ENOTTY; 1363 } else { 1364 retval = driver->ioctl (intf, ctl->ioctl_code, buf); 1365 if (retval == -ENOIOCTLCMD) 1366 retval = -ENOTTY; 1367 } 1368 up_read(&usb_bus_type.subsys.rwsem); 1369 } 1370 1371 /* cleanup and return */ 1372 if (retval >= 0 1373 && (_IOC_DIR (ctl->ioctl_code) & _IOC_READ) != 0 1374 && size > 0 1375 && copy_to_user (ctl->data, buf, size) != 0) 1376 retval = -EFAULT; 1377 1378 kfree(buf); 1379 return retval; 1380 } 1381 1382 static int proc_ioctl_default(struct dev_state *ps, void __user *arg) 1383 { 1384 struct usbdevfs_ioctl ctrl; 1385 1386 if (copy_from_user(&ctrl, arg, sizeof (ctrl))) 1387 return -EFAULT; 1388 return proc_ioctl(ps, &ctrl); 1389 } 1390 1391 #ifdef CONFIG_COMPAT 1392 static int proc_ioctl_compat(struct dev_state *ps, compat_uptr_t arg) 1393 { 1394 struct usbdevfs_ioctl32 __user *uioc; 1395 struct usbdevfs_ioctl ctrl; 1396 u32 udata; 1397 1398 uioc = compat_ptr((long)arg); 1399 if (get_user(ctrl.ifno, &uioc->ifno) || 1400 get_user(ctrl.ioctl_code, &uioc->ioctl_code) || 1401 __get_user(udata, &uioc->data)) 1402 return -EFAULT; 1403 ctrl.data = compat_ptr(udata); 1404 1405 return proc_ioctl(ps, &ctrl); 1406 } 1407 #endif 1408 1409 /* 1410 * NOTE: All requests here that have interface numbers as parameters 1411 * are assuming that somehow the configuration has been prevented from 1412 * changing. But there's no mechanism to ensure that... 1413 */ 1414 static int usbdev_ioctl(struct inode *inode, struct file *file, unsigned int cmd, unsigned long arg) 1415 { 1416 struct dev_state *ps = (struct dev_state *)file->private_data; 1417 struct usb_device *dev = ps->dev; 1418 void __user *p = (void __user *)arg; 1419 int ret = -ENOTTY; 1420 1421 if (!(file->f_mode & FMODE_WRITE)) 1422 return -EPERM; 1423 usb_lock_device(dev); 1424 if (!connected(dev)) { 1425 usb_unlock_device(dev); 1426 return -ENODEV; 1427 } 1428 1429 switch (cmd) { 1430 case USBDEVFS_CONTROL: 1431 snoop(&dev->dev, "%s: CONTROL\n", __FUNCTION__); 1432 ret = proc_control(ps, p); 1433 if (ret >= 0) 1434 inode->i_mtime = CURRENT_TIME; 1435 break; 1436 1437 case USBDEVFS_BULK: 1438 snoop(&dev->dev, "%s: BULK\n", __FUNCTION__); 1439 ret = proc_bulk(ps, p); 1440 if (ret >= 0) 1441 inode->i_mtime = CURRENT_TIME; 1442 break; 1443 1444 case USBDEVFS_RESETEP: 1445 snoop(&dev->dev, "%s: RESETEP\n", __FUNCTION__); 1446 ret = proc_resetep(ps, p); 1447 if (ret >= 0) 1448 inode->i_mtime = CURRENT_TIME; 1449 break; 1450 1451 case USBDEVFS_RESET: 1452 snoop(&dev->dev, "%s: RESET\n", __FUNCTION__); 1453 ret = proc_resetdevice(ps); 1454 break; 1455 1456 case USBDEVFS_CLEAR_HALT: 1457 snoop(&dev->dev, "%s: CLEAR_HALT\n", __FUNCTION__); 1458 ret = proc_clearhalt(ps, p); 1459 if (ret >= 0) 1460 inode->i_mtime = CURRENT_TIME; 1461 break; 1462 1463 case USBDEVFS_GETDRIVER: 1464 snoop(&dev->dev, "%s: GETDRIVER\n", __FUNCTION__); 1465 ret = proc_getdriver(ps, p); 1466 break; 1467 1468 case USBDEVFS_CONNECTINFO: 1469 snoop(&dev->dev, "%s: CONNECTINFO\n", __FUNCTION__); 1470 ret = proc_connectinfo(ps, p); 1471 break; 1472 1473 case USBDEVFS_SETINTERFACE: 1474 snoop(&dev->dev, "%s: SETINTERFACE\n", __FUNCTION__); 1475 ret = proc_setintf(ps, p); 1476 break; 1477 1478 case USBDEVFS_SETCONFIGURATION: 1479 snoop(&dev->dev, "%s: SETCONFIGURATION\n", __FUNCTION__); 1480 ret = proc_setconfig(ps, p); 1481 break; 1482 1483 case USBDEVFS_SUBMITURB: 1484 snoop(&dev->dev, "%s: SUBMITURB\n", __FUNCTION__); 1485 ret = proc_submiturb(ps, p); 1486 if (ret >= 0) 1487 inode->i_mtime = CURRENT_TIME; 1488 break; 1489 1490 #ifdef CONFIG_COMPAT 1491 1492 case USBDEVFS_SUBMITURB32: 1493 snoop(&dev->dev, "%s: SUBMITURB32\n", __FUNCTION__); 1494 ret = proc_submiturb_compat(ps, p); 1495 if (ret >= 0) 1496 inode->i_mtime = CURRENT_TIME; 1497 break; 1498 1499 case USBDEVFS_REAPURB32: 1500 snoop(&dev->dev, "%s: REAPURB32\n", __FUNCTION__); 1501 ret = proc_reapurb_compat(ps, p); 1502 break; 1503 1504 case USBDEVFS_REAPURBNDELAY32: 1505 snoop(&dev->dev, "%s: REAPURBDELAY32\n", __FUNCTION__); 1506 ret = proc_reapurbnonblock_compat(ps, p); 1507 break; 1508 1509 case USBDEVFS_IOCTL32: 1510 snoop(&dev->dev, "%s: IOCTL\n", __FUNCTION__); 1511 ret = proc_ioctl_compat(ps, (compat_uptr_t)(long)p); 1512 break; 1513 #endif 1514 1515 case USBDEVFS_DISCARDURB: 1516 snoop(&dev->dev, "%s: DISCARDURB\n", __FUNCTION__); 1517 ret = proc_unlinkurb(ps, p); 1518 break; 1519 1520 case USBDEVFS_REAPURB: 1521 snoop(&dev->dev, "%s: REAPURB\n", __FUNCTION__); 1522 ret = proc_reapurb(ps, p); 1523 break; 1524 1525 case USBDEVFS_REAPURBNDELAY: 1526 snoop(&dev->dev, "%s: REAPURBDELAY\n", __FUNCTION__); 1527 ret = proc_reapurbnonblock(ps, p); 1528 break; 1529 1530 case USBDEVFS_DISCSIGNAL: 1531 snoop(&dev->dev, "%s: DISCSIGNAL\n", __FUNCTION__); 1532 ret = proc_disconnectsignal(ps, p); 1533 break; 1534 1535 case USBDEVFS_CLAIMINTERFACE: 1536 snoop(&dev->dev, "%s: CLAIMINTERFACE\n", __FUNCTION__); 1537 ret = proc_claiminterface(ps, p); 1538 break; 1539 1540 case USBDEVFS_RELEASEINTERFACE: 1541 snoop(&dev->dev, "%s: RELEASEINTERFACE\n", __FUNCTION__); 1542 ret = proc_releaseinterface(ps, p); 1543 break; 1544 1545 case USBDEVFS_IOCTL: 1546 snoop(&dev->dev, "%s: IOCTL\n", __FUNCTION__); 1547 ret = proc_ioctl_default(ps, p); 1548 break; 1549 } 1550 usb_unlock_device(dev); 1551 if (ret >= 0) 1552 inode->i_atime = CURRENT_TIME; 1553 return ret; 1554 } 1555 1556 /* No kernel lock - fine */ 1557 static unsigned int usbdev_poll(struct file *file, struct poll_table_struct *wait) 1558 { 1559 struct dev_state *ps = (struct dev_state *)file->private_data; 1560 unsigned int mask = 0; 1561 1562 poll_wait(file, &ps->wait, wait); 1563 if (file->f_mode & FMODE_WRITE && !list_empty(&ps->async_completed)) 1564 mask |= POLLOUT | POLLWRNORM; 1565 if (!connected(ps->dev)) 1566 mask |= POLLERR | POLLHUP; 1567 return mask; 1568 } 1569 1570 struct file_operations usbfs_device_file_operations = { 1571 .llseek = usbdev_lseek, 1572 .read = usbdev_read, 1573 .poll = usbdev_poll, 1574 .ioctl = usbdev_ioctl, 1575 .open = usbdev_open, 1576 .release = usbdev_release, 1577 }; 1578 1579 static void usbdev_add(struct usb_device *dev) 1580 { 1581 int minor = ((dev->bus->busnum-1) * 128) + (dev->devnum-1); 1582 1583 dev->class_dev = class_device_create(usb_device_class, NULL, 1584 MKDEV(USB_DEVICE_MAJOR, minor), &dev->dev, 1585 "usbdev%d.%d", dev->bus->busnum, dev->devnum); 1586 1587 dev->class_dev->class_data = dev; 1588 } 1589 1590 static void usbdev_remove(struct usb_device *dev) 1591 { 1592 class_device_unregister(dev->class_dev); 1593 } 1594 1595 static int usbdev_notify(struct notifier_block *self, unsigned long action, 1596 void *dev) 1597 { 1598 switch (action) { 1599 case USB_DEVICE_ADD: 1600 usbdev_add(dev); 1601 break; 1602 case USB_DEVICE_REMOVE: 1603 usbdev_remove(dev); 1604 break; 1605 } 1606 return NOTIFY_OK; 1607 } 1608 1609 static struct notifier_block usbdev_nb = { 1610 .notifier_call = usbdev_notify, 1611 }; 1612 1613 static struct cdev usb_device_cdev = { 1614 .kobj = {.name = "usb_device", }, 1615 .owner = THIS_MODULE, 1616 }; 1617 1618 int __init usbdev_init(void) 1619 { 1620 int retval; 1621 1622 retval = register_chrdev_region(USB_DEVICE_DEV, USB_DEVICE_MAX, 1623 "usb_device"); 1624 if (retval) { 1625 err("unable to register minors for usb_device"); 1626 goto out; 1627 } 1628 cdev_init(&usb_device_cdev, &usbfs_device_file_operations); 1629 retval = cdev_add(&usb_device_cdev, USB_DEVICE_DEV, USB_DEVICE_MAX); 1630 if (retval) { 1631 err("unable to get usb_device major %d", USB_DEVICE_MAJOR); 1632 goto error_cdev; 1633 } 1634 usb_device_class = class_create(THIS_MODULE, "usb_device"); 1635 if (IS_ERR(usb_device_class)) { 1636 err("unable to register usb_device class"); 1637 retval = PTR_ERR(usb_device_class); 1638 goto error_class; 1639 } 1640 1641 usb_register_notify(&usbdev_nb); 1642 1643 out: 1644 return retval; 1645 1646 error_class: 1647 usb_device_class = NULL; 1648 cdev_del(&usb_device_cdev); 1649 1650 error_cdev: 1651 unregister_chrdev_region(USB_DEVICE_DEV, USB_DEVICE_MAX); 1652 goto out; 1653 } 1654 1655 void usbdev_cleanup(void) 1656 { 1657 usb_unregister_notify(&usbdev_nb); 1658 class_destroy(usb_device_class); 1659 cdev_del(&usb_device_cdev); 1660 unregister_chrdev_region(USB_DEVICE_DEV, USB_DEVICE_MAX); 1661 } 1662 1663