1 /*****************************************************************************/
4 * devio.c -- User space communication with USB devices.
6 * Copyright (C) 1999-2000 Thomas Sailer (sailer@ife.ee.ethz.ch)
8 * This program is free software; you can redistribute it and/or modify
9 * it under the terms of the GNU General Public License as published by
10 * the Free Software Foundation; either version 2 of the License, or
11 * (at your option) any later version.
13 * This program is distributed in the hope that it will be useful,
14 * but WITHOUT ANY WARRANTY; without even the implied warranty of
15 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
16 * GNU General Public License for more details.
18 * You should have received a copy of the GNU General Public License
19 * along with this program; if not, write to the Free Software
20 * Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA.
22 * $Id: devio.c,v 1.7 2000/02/01 17:28:48 fliegl Exp $
24 * This file implements the usbfs/x/y files, where
25 * x is the bus number and y the device number.
27 * It allows user space programs/"drivers" to communicate directly
28 * with USB devices without intervening kernel driver.
31 * 22.12.1999 0.1 Initial release (split from proc_usb.c)
32 * 04.01.2000 0.2 Turned into its own filesystem
33 * 30.09.2005 0.3 Fix user-triggerable oops in async URB delivery
37 /*****************************************************************************/
41 #include <linux/slab.h>
42 #include <linux/smp_lock.h>
43 #include <linux/signal.h>
44 #include <linux/poll.h>
45 #include <linux/module.h>
46 #include <linux/usb.h>
47 #include <linux/usbdevice_fs.h>
48 #include <linux/cdev.h>
49 #include <linux/notifier.h>
50 #include <linux/security.h>
51 #include <asm/uaccess.h>
52 #include <asm/byteorder.h>
53 #include <linux/moduleparam.h>
55 #include "hcd.h" /* for usbcore internals */
59 #define USB_DEVICE_MAX USB_MAXBUS * 128
61 /* Mutual exclusion for removal, open, and release */
62 DEFINE_MUTEX(usbfs_mutex
);
65 struct list_head asynclist
;
71 void __user
*userbuffer
;
78 static int usbfs_snoop
= 0;
79 module_param (usbfs_snoop
, bool, S_IRUGO
| S_IWUSR
);
80 MODULE_PARM_DESC (usbfs_snoop
, "true to log all usbfs traffic");
82 #define snoop(dev, format, arg...) \
85 dev_info( dev , format , ## arg); \
88 #define USB_DEVICE_DEV MKDEV(USB_DEVICE_MAJOR, 0)
91 #define MAX_USBFS_BUFFER_SIZE 16384
93 static inline int connected (struct dev_state
*ps
)
95 return (!list_empty(&ps
->list
) &&
96 ps
->dev
->state
!= USB_STATE_NOTATTACHED
);
99 static loff_t
usbdev_lseek(struct file
*file
, loff_t offset
, int orig
)
107 file
->f_pos
= offset
;
111 file
->f_pos
+= offset
;
123 static ssize_t
usbdev_read(struct file
*file
, char __user
*buf
, size_t nbytes
, loff_t
*ppos
)
125 struct dev_state
*ps
= file
->private_data
;
126 struct usb_device
*dev
= ps
->dev
;
133 usb_lock_device(dev
);
134 if (!connected(ps
)) {
137 } else if (pos
< 0) {
142 if (pos
< sizeof(struct usb_device_descriptor
)) {
143 struct usb_device_descriptor temp_desc
; /* 18 bytes - fits on the stack */
145 memcpy(&temp_desc
, &dev
->descriptor
, sizeof(dev
->descriptor
));
146 le16_to_cpus(&temp_desc
.bcdUSB
);
147 le16_to_cpus(&temp_desc
.idVendor
);
148 le16_to_cpus(&temp_desc
.idProduct
);
149 le16_to_cpus(&temp_desc
.bcdDevice
);
151 len
= sizeof(struct usb_device_descriptor
) - pos
;
154 if (copy_to_user(buf
, ((char *)&temp_desc
) + pos
, len
)) {
165 pos
= sizeof(struct usb_device_descriptor
);
166 for (i
= 0; nbytes
&& i
< dev
->descriptor
.bNumConfigurations
; i
++) {
167 struct usb_config_descriptor
*config
=
168 (struct usb_config_descriptor
*)dev
->rawdescriptors
[i
];
169 unsigned int length
= le16_to_cpu(config
->wTotalLength
);
171 if (*ppos
< pos
+ length
) {
173 /* The descriptor may claim to be longer than it
174 * really is. Here is the actual allocated length. */
176 le16_to_cpu(dev
->config
[i
].desc
.wTotalLength
);
178 len
= length
- (*ppos
- pos
);
182 /* Simply don't write (skip over) unallocated parts */
183 if (alloclen
> (*ppos
- pos
)) {
184 alloclen
-= (*ppos
- pos
);
185 if (copy_to_user(buf
,
186 dev
->rawdescriptors
[i
] + (*ppos
- pos
),
187 min(len
, alloclen
))) {
203 usb_unlock_device(dev
);
208 * async list handling
211 static struct async
*alloc_async(unsigned int numisoframes
)
213 unsigned int assize
= sizeof(struct async
) + numisoframes
* sizeof(struct usb_iso_packet_descriptor
);
214 struct async
*as
= kzalloc(assize
, GFP_KERNEL
);
218 as
->urb
= usb_alloc_urb(numisoframes
, GFP_KERNEL
);
226 static void free_async(struct async
*as
)
229 kfree(as
->urb
->transfer_buffer
);
230 kfree(as
->urb
->setup_packet
);
231 usb_free_urb(as
->urb
);
235 static inline void async_newpending(struct async
*as
)
237 struct dev_state
*ps
= as
->ps
;
240 spin_lock_irqsave(&ps
->lock
, flags
);
241 list_add_tail(&as
->asynclist
, &ps
->async_pending
);
242 spin_unlock_irqrestore(&ps
->lock
, flags
);
245 static inline void async_removepending(struct async
*as
)
247 struct dev_state
*ps
= as
->ps
;
250 spin_lock_irqsave(&ps
->lock
, flags
);
251 list_del_init(&as
->asynclist
);
252 spin_unlock_irqrestore(&ps
->lock
, flags
);
255 static inline struct async
*async_getcompleted(struct dev_state
*ps
)
258 struct async
*as
= NULL
;
260 spin_lock_irqsave(&ps
->lock
, flags
);
261 if (!list_empty(&ps
->async_completed
)) {
262 as
= list_entry(ps
->async_completed
.next
, struct async
, asynclist
);
263 list_del_init(&as
->asynclist
);
265 spin_unlock_irqrestore(&ps
->lock
, flags
);
269 static inline struct async
*async_getpending(struct dev_state
*ps
, void __user
*userurb
)
274 spin_lock_irqsave(&ps
->lock
, flags
);
275 list_for_each_entry(as
, &ps
->async_pending
, asynclist
)
276 if (as
->userurb
== userurb
) {
277 list_del_init(&as
->asynclist
);
278 spin_unlock_irqrestore(&ps
->lock
, flags
);
281 spin_unlock_irqrestore(&ps
->lock
, flags
);
285 static void snoop_urb(struct urb
*urb
, void __user
*userurb
)
288 unsigned char *data
= urb
->transfer_buffer
;
293 dev_info(&urb
->dev
->dev
, "direction=%s\n",
294 usb_urb_dir_in(urb
) ? "IN" : "OUT");
295 dev_info(&urb
->dev
->dev
, "userurb=%p\n", userurb
);
296 dev_info(&urb
->dev
->dev
, "transfer_buffer_length=%d\n",
297 urb
->transfer_buffer_length
);
298 dev_info(&urb
->dev
->dev
, "actual_length=%d\n", urb
->actual_length
);
299 dev_info(&urb
->dev
->dev
, "data: ");
300 for (j
= 0; j
< urb
->transfer_buffer_length
; ++j
)
301 printk ("%02x ", data
[j
]);
305 static void async_completed(struct urb
*urb
)
307 struct async
*as
= urb
->context
;
308 struct dev_state
*ps
= as
->ps
;
309 struct siginfo sinfo
;
311 spin_lock(&ps
->lock
);
312 list_move_tail(&as
->asynclist
, &ps
->async_completed
);
313 spin_unlock(&ps
->lock
);
314 as
->status
= urb
->status
;
316 sinfo
.si_signo
= as
->signr
;
317 sinfo
.si_errno
= as
->status
;
318 sinfo
.si_code
= SI_ASYNCIO
;
319 sinfo
.si_addr
= as
->userurb
;
320 kill_pid_info_as_uid(as
->signr
, &sinfo
, as
->pid
, as
->uid
,
321 as
->euid
, as
->secid
);
323 snoop(&urb
->dev
->dev
, "urb complete\n");
324 snoop_urb(urb
, as
->userurb
);
328 static void destroy_async (struct dev_state
*ps
, struct list_head
*list
)
333 spin_lock_irqsave(&ps
->lock
, flags
);
334 while (!list_empty(list
)) {
335 as
= list_entry(list
->next
, struct async
, asynclist
);
336 list_del_init(&as
->asynclist
);
338 /* drop the spinlock so the completion handler can run */
339 spin_unlock_irqrestore(&ps
->lock
, flags
);
340 usb_kill_urb(as
->urb
);
341 spin_lock_irqsave(&ps
->lock
, flags
);
343 spin_unlock_irqrestore(&ps
->lock
, flags
);
344 as
= async_getcompleted(ps
);
347 as
= async_getcompleted(ps
);
351 static void destroy_async_on_interface (struct dev_state
*ps
, unsigned int ifnum
)
353 struct list_head
*p
, *q
, hitlist
;
356 INIT_LIST_HEAD(&hitlist
);
357 spin_lock_irqsave(&ps
->lock
, flags
);
358 list_for_each_safe(p
, q
, &ps
->async_pending
)
359 if (ifnum
== list_entry(p
, struct async
, asynclist
)->ifnum
)
360 list_move_tail(p
, &hitlist
);
361 spin_unlock_irqrestore(&ps
->lock
, flags
);
362 destroy_async(ps
, &hitlist
);
365 static inline void destroy_all_async(struct dev_state
*ps
)
367 destroy_async(ps
, &ps
->async_pending
);
371 * interface claims are made only at the request of user level code,
372 * which can also release them (explicitly or by closing files).
373 * they're also undone when devices disconnect.
376 static int driver_probe (struct usb_interface
*intf
,
377 const struct usb_device_id
*id
)
382 static void driver_disconnect(struct usb_interface
*intf
)
384 struct dev_state
*ps
= usb_get_intfdata (intf
);
385 unsigned int ifnum
= intf
->altsetting
->desc
.bInterfaceNumber
;
390 /* NOTE: this relies on usbcore having canceled and completed
391 * all pending I/O requests; 2.6 does that.
394 if (likely(ifnum
< 8*sizeof(ps
->ifclaimed
)))
395 clear_bit(ifnum
, &ps
->ifclaimed
);
397 warn("interface number %u out of range", ifnum
);
399 usb_set_intfdata (intf
, NULL
);
401 /* force async requests to complete */
402 destroy_async_on_interface(ps
, ifnum
);
405 struct usb_driver usbfs_driver
= {
407 .probe
= driver_probe
,
408 .disconnect
= driver_disconnect
,
411 static int claimintf(struct dev_state
*ps
, unsigned int ifnum
)
413 struct usb_device
*dev
= ps
->dev
;
414 struct usb_interface
*intf
;
417 if (ifnum
>= 8*sizeof(ps
->ifclaimed
))
419 /* already claimed */
420 if (test_bit(ifnum
, &ps
->ifclaimed
))
423 intf
= usb_ifnum_to_if(dev
, ifnum
);
427 err
= usb_driver_claim_interface(&usbfs_driver
, intf
, ps
);
429 set_bit(ifnum
, &ps
->ifclaimed
);
433 static int releaseintf(struct dev_state
*ps
, unsigned int ifnum
)
435 struct usb_device
*dev
;
436 struct usb_interface
*intf
;
440 if (ifnum
>= 8*sizeof(ps
->ifclaimed
))
443 intf
= usb_ifnum_to_if(dev
, ifnum
);
446 else if (test_and_clear_bit(ifnum
, &ps
->ifclaimed
)) {
447 usb_driver_release_interface(&usbfs_driver
, intf
);
453 static int checkintf(struct dev_state
*ps
, unsigned int ifnum
)
455 if (ps
->dev
->state
!= USB_STATE_CONFIGURED
)
456 return -EHOSTUNREACH
;
457 if (ifnum
>= 8*sizeof(ps
->ifclaimed
))
459 if (test_bit(ifnum
, &ps
->ifclaimed
))
461 /* if not yet claimed, claim it for the driver */
462 dev_warn(&ps
->dev
->dev
, "usbfs: process %d (%s) did not claim interface %u before use\n",
463 current
->pid
, current
->comm
, ifnum
);
464 return claimintf(ps
, ifnum
);
467 static int findintfep(struct usb_device
*dev
, unsigned int ep
)
469 unsigned int i
, j
, e
;
470 struct usb_interface
*intf
;
471 struct usb_host_interface
*alts
;
472 struct usb_endpoint_descriptor
*endpt
;
474 if (ep
& ~(USB_DIR_IN
|0xf))
478 for (i
= 0; i
< dev
->actconfig
->desc
.bNumInterfaces
; i
++) {
479 intf
= dev
->actconfig
->interface
[i
];
480 for (j
= 0; j
< intf
->num_altsetting
; j
++) {
481 alts
= &intf
->altsetting
[j
];
482 for (e
= 0; e
< alts
->desc
.bNumEndpoints
; e
++) {
483 endpt
= &alts
->endpoint
[e
].desc
;
484 if (endpt
->bEndpointAddress
== ep
)
485 return alts
->desc
.bInterfaceNumber
;
492 static int check_ctrlrecip(struct dev_state
*ps
, unsigned int requesttype
, unsigned int index
)
496 if (ps
->dev
->state
!= USB_STATE_ADDRESS
497 && ps
->dev
->state
!= USB_STATE_CONFIGURED
)
498 return -EHOSTUNREACH
;
499 if (USB_TYPE_VENDOR
== (USB_TYPE_MASK
& requesttype
))
503 switch (requesttype
& USB_RECIP_MASK
) {
504 case USB_RECIP_ENDPOINT
:
505 if ((ret
= findintfep(ps
->dev
, index
)) >= 0)
506 ret
= checkintf(ps
, ret
);
509 case USB_RECIP_INTERFACE
:
510 ret
= checkintf(ps
, index
);
516 static int __match_minor(struct device
*dev
, void *data
)
518 int minor
= *((int *)data
);
520 if (dev
->devt
== MKDEV(USB_DEVICE_MAJOR
, minor
))
525 static struct usb_device
*usbdev_lookup_by_minor(int minor
)
529 dev
= bus_find_device(&usb_bus_type
, NULL
, &minor
, __match_minor
);
533 return container_of(dev
, struct usb_device
, dev
);
539 static int usbdev_open(struct inode
*inode
, struct file
*file
)
541 struct usb_device
*dev
= NULL
;
542 struct dev_state
*ps
;
545 /* Protect against simultaneous removal or release */
546 mutex_lock(&usbfs_mutex
);
549 if (!(ps
= kmalloc(sizeof(struct dev_state
), GFP_KERNEL
)))
553 /* usbdev device-node */
554 if (imajor(inode
) == USB_DEVICE_MAJOR
)
555 dev
= usbdev_lookup_by_minor(iminor(inode
));
556 #ifdef CONFIG_USB_DEVICEFS
559 dev
= inode
->i_private
;
563 ret
= usb_autoresume_device(dev
);
571 spin_lock_init(&ps
->lock
);
572 INIT_LIST_HEAD(&ps
->list
);
573 INIT_LIST_HEAD(&ps
->async_pending
);
574 INIT_LIST_HEAD(&ps
->async_completed
);
575 init_waitqueue_head(&ps
->wait
);
577 ps
->disc_pid
= get_pid(task_pid(current
));
578 ps
->disc_uid
= current
->uid
;
579 ps
->disc_euid
= current
->euid
;
580 ps
->disccontext
= NULL
;
582 security_task_getsecid(current
, &ps
->secid
);
584 list_add_tail(&ps
->list
, &dev
->filelist
);
585 file
->private_data
= ps
;
589 mutex_unlock(&usbfs_mutex
);
593 static int usbdev_release(struct inode
*inode
, struct file
*file
)
595 struct dev_state
*ps
= file
->private_data
;
596 struct usb_device
*dev
= ps
->dev
;
599 usb_lock_device(dev
);
601 /* Protect against simultaneous open */
602 mutex_lock(&usbfs_mutex
);
603 list_del_init(&ps
->list
);
604 mutex_unlock(&usbfs_mutex
);
606 for (ifnum
= 0; ps
->ifclaimed
&& ifnum
< 8*sizeof(ps
->ifclaimed
);
608 if (test_bit(ifnum
, &ps
->ifclaimed
))
609 releaseintf(ps
, ifnum
);
611 destroy_all_async(ps
);
612 usb_autosuspend_device(dev
);
613 usb_unlock_device(dev
);
615 put_pid(ps
->disc_pid
);
620 static int proc_control(struct dev_state
*ps
, void __user
*arg
)
622 struct usb_device
*dev
= ps
->dev
;
623 struct usbdevfs_ctrltransfer ctrl
;
628 if (copy_from_user(&ctrl
, arg
, sizeof(ctrl
)))
630 if ((ret
= check_ctrlrecip(ps
, ctrl
.bRequestType
, ctrl
.wIndex
)))
632 if (ctrl
.wLength
> PAGE_SIZE
)
634 if (!(tbuf
= (unsigned char *)__get_free_page(GFP_KERNEL
)))
637 if (ctrl
.bRequestType
& 0x80) {
638 if (ctrl
.wLength
&& !access_ok(VERIFY_WRITE
, ctrl
.data
, ctrl
.wLength
)) {
639 free_page((unsigned long)tbuf
);
642 snoop(&dev
->dev
, "control read: bRequest=%02x "
643 "bRrequestType=%02x wValue=%04x "
644 "wIndex=%04x wLength=%04x\n",
645 ctrl
.bRequest
, ctrl
.bRequestType
, ctrl
.wValue
,
646 ctrl
.wIndex
, ctrl
.wLength
);
648 usb_unlock_device(dev
);
649 i
= usb_control_msg(dev
, usb_rcvctrlpipe(dev
, 0), ctrl
.bRequest
, ctrl
.bRequestType
,
650 ctrl
.wValue
, ctrl
.wIndex
, tbuf
, ctrl
.wLength
, tmo
);
651 usb_lock_device(dev
);
652 if ((i
> 0) && ctrl
.wLength
) {
654 dev_info(&dev
->dev
, "control read: data ");
655 for (j
= 0; j
< i
; ++j
)
656 printk("%02x ", (unsigned char)(tbuf
)[j
]);
659 if (copy_to_user(ctrl
.data
, tbuf
, i
)) {
660 free_page((unsigned long)tbuf
);
666 if (copy_from_user(tbuf
, ctrl
.data
, ctrl
.wLength
)) {
667 free_page((unsigned long)tbuf
);
671 snoop(&dev
->dev
, "control write: bRequest=%02x "
672 "bRrequestType=%02x wValue=%04x "
673 "wIndex=%04x wLength=%04x\n",
674 ctrl
.bRequest
, ctrl
.bRequestType
, ctrl
.wValue
,
675 ctrl
.wIndex
, ctrl
.wLength
);
677 dev_info(&dev
->dev
, "control write: data: ");
678 for (j
= 0; j
< ctrl
.wLength
; ++j
)
679 printk("%02x ", (unsigned char)(tbuf
)[j
]);
682 usb_unlock_device(dev
);
683 i
= usb_control_msg(dev
, usb_sndctrlpipe(dev
, 0), ctrl
.bRequest
, ctrl
.bRequestType
,
684 ctrl
.wValue
, ctrl
.wIndex
, tbuf
, ctrl
.wLength
, tmo
);
685 usb_lock_device(dev
);
687 free_page((unsigned long)tbuf
);
688 if (i
<0 && i
!= -EPIPE
) {
689 dev_printk(KERN_DEBUG
, &dev
->dev
, "usbfs: USBDEVFS_CONTROL "
690 "failed cmd %s rqt %u rq %u len %u ret %d\n",
691 current
->comm
, ctrl
.bRequestType
, ctrl
.bRequest
,
697 static int proc_bulk(struct dev_state
*ps
, void __user
*arg
)
699 struct usb_device
*dev
= ps
->dev
;
700 struct usbdevfs_bulktransfer bulk
;
701 unsigned int tmo
, len1
, pipe
;
706 if (copy_from_user(&bulk
, arg
, sizeof(bulk
)))
708 if ((ret
= findintfep(ps
->dev
, bulk
.ep
)) < 0)
710 if ((ret
= checkintf(ps
, ret
)))
712 if (bulk
.ep
& USB_DIR_IN
)
713 pipe
= usb_rcvbulkpipe(dev
, bulk
.ep
& 0x7f);
715 pipe
= usb_sndbulkpipe(dev
, bulk
.ep
& 0x7f);
716 if (!usb_maxpacket(dev
, pipe
, !(bulk
.ep
& USB_DIR_IN
)))
719 if (len1
> MAX_USBFS_BUFFER_SIZE
)
721 if (!(tbuf
= kmalloc(len1
, GFP_KERNEL
)))
724 if (bulk
.ep
& 0x80) {
725 if (len1
&& !access_ok(VERIFY_WRITE
, bulk
.data
, len1
)) {
729 snoop(&dev
->dev
, "bulk read: len=0x%02x timeout=%04d\n",
730 bulk
.len
, bulk
.timeout
);
731 usb_unlock_device(dev
);
732 i
= usb_bulk_msg(dev
, pipe
, tbuf
, len1
, &len2
, tmo
);
733 usb_lock_device(dev
);
736 dev_info(&dev
->dev
, "bulk read: data ");
737 for (j
= 0; j
< len2
; ++j
)
738 printk("%02x ", (unsigned char)(tbuf
)[j
]);
741 if (copy_to_user(bulk
.data
, tbuf
, len2
)) {
748 if (copy_from_user(tbuf
, bulk
.data
, len1
)) {
753 snoop(&dev
->dev
, "bulk write: len=0x%02x timeout=%04d\n",
754 bulk
.len
, bulk
.timeout
);
756 dev_info(&dev
->dev
, "bulk write: data: ");
757 for (j
= 0; j
< len1
; ++j
)
758 printk("%02x ", (unsigned char)(tbuf
)[j
]);
761 usb_unlock_device(dev
);
762 i
= usb_bulk_msg(dev
, pipe
, tbuf
, len1
, &len2
, tmo
);
763 usb_lock_device(dev
);
771 static int proc_resetep(struct dev_state
*ps
, void __user
*arg
)
776 if (get_user(ep
, (unsigned int __user
*)arg
))
778 if ((ret
= findintfep(ps
->dev
, ep
)) < 0)
780 if ((ret
= checkintf(ps
, ret
)))
782 usb_settoggle(ps
->dev
, ep
& 0xf, !(ep
& USB_DIR_IN
), 0);
786 static int proc_clearhalt(struct dev_state
*ps
, void __user
*arg
)
792 if (get_user(ep
, (unsigned int __user
*)arg
))
794 if ((ret
= findintfep(ps
->dev
, ep
)) < 0)
796 if ((ret
= checkintf(ps
, ret
)))
799 pipe
= usb_rcvbulkpipe(ps
->dev
, ep
& 0x7f);
801 pipe
= usb_sndbulkpipe(ps
->dev
, ep
& 0x7f);
803 return usb_clear_halt(ps
->dev
, pipe
);
807 static int proc_getdriver(struct dev_state
*ps
, void __user
*arg
)
809 struct usbdevfs_getdriver gd
;
810 struct usb_interface
*intf
;
813 if (copy_from_user(&gd
, arg
, sizeof(gd
)))
815 intf
= usb_ifnum_to_if(ps
->dev
, gd
.interface
);
816 if (!intf
|| !intf
->dev
.driver
)
819 strncpy(gd
.driver
, intf
->dev
.driver
->name
,
821 ret
= (copy_to_user(arg
, &gd
, sizeof(gd
)) ? -EFAULT
: 0);
826 static int proc_connectinfo(struct dev_state
*ps
, void __user
*arg
)
828 struct usbdevfs_connectinfo ci
;
830 ci
.devnum
= ps
->dev
->devnum
;
831 ci
.slow
= ps
->dev
->speed
== USB_SPEED_LOW
;
832 if (copy_to_user(arg
, &ci
, sizeof(ci
)))
837 static int proc_resetdevice(struct dev_state
*ps
)
839 return usb_reset_composite_device(ps
->dev
, NULL
);
842 static int proc_setintf(struct dev_state
*ps
, void __user
*arg
)
844 struct usbdevfs_setinterface setintf
;
847 if (copy_from_user(&setintf
, arg
, sizeof(setintf
)))
849 if ((ret
= checkintf(ps
, setintf
.interface
)))
851 return usb_set_interface(ps
->dev
, setintf
.interface
,
855 static int proc_setconfig(struct dev_state
*ps
, void __user
*arg
)
859 struct usb_host_config
*actconfig
;
861 if (get_user(u
, (int __user
*)arg
))
864 actconfig
= ps
->dev
->actconfig
;
866 /* Don't touch the device if any interfaces are claimed.
867 * It could interfere with other drivers' operations, and if
868 * an interface is claimed by usbfs it could easily deadlock.
873 for (i
= 0; i
< actconfig
->desc
.bNumInterfaces
; ++i
) {
874 if (usb_interface_claimed(actconfig
->interface
[i
])) {
875 dev_warn (&ps
->dev
->dev
,
876 "usbfs: interface %d claimed by %s "
877 "while '%s' sets config #%d\n",
878 actconfig
->interface
[i
]
880 ->desc
.bInterfaceNumber
,
881 actconfig
->interface
[i
]
890 /* SET_CONFIGURATION is often abused as a "cheap" driver reset,
891 * so avoid usb_set_configuration()'s kick to sysfs
894 if (actconfig
&& actconfig
->desc
.bConfigurationValue
== u
)
895 status
= usb_reset_configuration(ps
->dev
);
897 status
= usb_set_configuration(ps
->dev
, u
);
903 static int proc_do_submiturb(struct dev_state
*ps
, struct usbdevfs_urb
*uurb
,
904 struct usbdevfs_iso_packet_desc __user
*iso_frame_desc
,
907 struct usbdevfs_iso_packet_desc
*isopkt
= NULL
;
908 struct usb_host_endpoint
*ep
;
910 struct usb_ctrlrequest
*dr
= NULL
;
911 unsigned int u
, totlen
, isofrmlen
;
915 if (uurb
->flags
& ~(USBDEVFS_URB_ISO_ASAP
|USBDEVFS_URB_SHORT_NOT_OK
|
916 URB_NO_FSBR
|URB_ZERO_PACKET
))
920 if (uurb
->signr
!= 0 && (uurb
->signr
< SIGRTMIN
|| uurb
->signr
> SIGRTMAX
))
922 if (!(uurb
->type
== USBDEVFS_URB_TYPE_CONTROL
&& (uurb
->endpoint
& ~USB_ENDPOINT_DIR_MASK
) == 0)) {
923 if ((ifnum
= findintfep(ps
->dev
, uurb
->endpoint
)) < 0)
925 if ((ret
= checkintf(ps
, ifnum
)))
928 if ((uurb
->endpoint
& USB_ENDPOINT_DIR_MASK
) != 0) {
930 ep
= ps
->dev
->ep_in
[uurb
->endpoint
& USB_ENDPOINT_NUMBER_MASK
];
933 ep
= ps
->dev
->ep_out
[uurb
->endpoint
& USB_ENDPOINT_NUMBER_MASK
];
938 case USBDEVFS_URB_TYPE_CONTROL
:
939 if (!usb_endpoint_xfer_control(&ep
->desc
))
941 /* min 8 byte setup packet, max 8 byte setup plus an arbitrary data stage */
942 if (uurb
->buffer_length
< 8 || uurb
->buffer_length
> (8 + MAX_USBFS_BUFFER_SIZE
))
944 if (!(dr
= kmalloc(sizeof(struct usb_ctrlrequest
), GFP_KERNEL
)))
946 if (copy_from_user(dr
, uurb
->buffer
, 8)) {
950 if (uurb
->buffer_length
< (le16_to_cpup(&dr
->wLength
) + 8)) {
954 if ((ret
= check_ctrlrecip(ps
, dr
->bRequestType
, le16_to_cpup(&dr
->wIndex
)))) {
958 uurb
->number_of_packets
= 0;
959 uurb
->buffer_length
= le16_to_cpup(&dr
->wLength
);
961 if ((dr
->bRequestType
& USB_DIR_IN
) && uurb
->buffer_length
) {
963 uurb
->endpoint
|= USB_DIR_IN
;
966 uurb
->endpoint
&= ~USB_DIR_IN
;
968 if (!access_ok(is_in
? VERIFY_WRITE
: VERIFY_READ
,
969 uurb
->buffer
, uurb
->buffer_length
)) {
973 snoop(&ps
->dev
->dev
, "control urb: bRequest=%02x "
974 "bRrequestType=%02x wValue=%04x "
975 "wIndex=%04x wLength=%04x\n",
976 dr
->bRequest
, dr
->bRequestType
,
977 __le16_to_cpup(&dr
->wValue
),
978 __le16_to_cpup(&dr
->wIndex
),
979 __le16_to_cpup(&dr
->wLength
));
982 case USBDEVFS_URB_TYPE_BULK
:
983 switch (usb_endpoint_type(&ep
->desc
)) {
984 case USB_ENDPOINT_XFER_CONTROL
:
985 case USB_ENDPOINT_XFER_ISOC
:
987 /* allow single-shot interrupt transfers, at bogus rates */
989 uurb
->number_of_packets
= 0;
990 if (uurb
->buffer_length
> MAX_USBFS_BUFFER_SIZE
)
992 if (!access_ok(is_in
? VERIFY_WRITE
: VERIFY_READ
,
993 uurb
->buffer
, uurb
->buffer_length
))
995 snoop(&ps
->dev
->dev
, "bulk urb\n");
998 case USBDEVFS_URB_TYPE_ISO
:
999 /* arbitrary limit */
1000 if (uurb
->number_of_packets
< 1 || uurb
->number_of_packets
> 128)
1002 if (!usb_endpoint_xfer_isoc(&ep
->desc
))
1004 isofrmlen
= sizeof(struct usbdevfs_iso_packet_desc
) * uurb
->number_of_packets
;
1005 if (!(isopkt
= kmalloc(isofrmlen
, GFP_KERNEL
)))
1007 if (copy_from_user(isopkt
, iso_frame_desc
, isofrmlen
)) {
1011 for (totlen
= u
= 0; u
< uurb
->number_of_packets
; u
++) {
1012 /* arbitrary limit, sufficient for USB 2.0 high-bandwidth iso */
1013 if (isopkt
[u
].length
> 8192) {
1017 totlen
+= isopkt
[u
].length
;
1019 if (totlen
> 32768) {
1023 uurb
->buffer_length
= totlen
;
1024 snoop(&ps
->dev
->dev
, "iso urb\n");
1027 case USBDEVFS_URB_TYPE_INTERRUPT
:
1028 uurb
->number_of_packets
= 0;
1029 if (!usb_endpoint_xfer_int(&ep
->desc
))
1031 if (uurb
->buffer_length
> MAX_USBFS_BUFFER_SIZE
)
1033 if (!access_ok(is_in
? VERIFY_WRITE
: VERIFY_READ
,
1034 uurb
->buffer
, uurb
->buffer_length
))
1036 snoop(&ps
->dev
->dev
, "interrupt urb\n");
1042 if (!(as
= alloc_async(uurb
->number_of_packets
))) {
1047 if (!(as
->urb
->transfer_buffer
= kmalloc(uurb
->buffer_length
, GFP_KERNEL
))) {
1053 as
->urb
->dev
= ps
->dev
;
1054 as
->urb
->pipe
= (uurb
->type
<< 30) |
1055 __create_pipe(ps
->dev
, uurb
->endpoint
& 0xf) |
1056 (uurb
->endpoint
& USB_DIR_IN
);
1057 as
->urb
->transfer_flags
= uurb
->flags
|
1058 (is_in
? URB_DIR_IN
: URB_DIR_OUT
);
1059 as
->urb
->transfer_buffer_length
= uurb
->buffer_length
;
1060 as
->urb
->setup_packet
= (unsigned char*)dr
;
1061 as
->urb
->start_frame
= uurb
->start_frame
;
1062 as
->urb
->number_of_packets
= uurb
->number_of_packets
;
1063 if (uurb
->type
== USBDEVFS_URB_TYPE_ISO
||
1064 ps
->dev
->speed
== USB_SPEED_HIGH
)
1065 as
->urb
->interval
= 1 << min(15, ep
->desc
.bInterval
- 1);
1067 as
->urb
->interval
= ep
->desc
.bInterval
;
1068 as
->urb
->context
= as
;
1069 as
->urb
->complete
= async_completed
;
1070 for (totlen
= u
= 0; u
< uurb
->number_of_packets
; u
++) {
1071 as
->urb
->iso_frame_desc
[u
].offset
= totlen
;
1072 as
->urb
->iso_frame_desc
[u
].length
= isopkt
[u
].length
;
1073 totlen
+= isopkt
[u
].length
;
1078 if (uurb
->endpoint
& USB_DIR_IN
)
1079 as
->userbuffer
= uurb
->buffer
;
1081 as
->userbuffer
= NULL
;
1082 as
->signr
= uurb
->signr
;
1084 as
->pid
= get_pid(task_pid(current
));
1085 as
->uid
= current
->uid
;
1086 as
->euid
= current
->euid
;
1087 security_task_getsecid(current
, &as
->secid
);
1089 if (copy_from_user(as
->urb
->transfer_buffer
, uurb
->buffer
,
1090 as
->urb
->transfer_buffer_length
)) {
1095 snoop_urb(as
->urb
, as
->userurb
);
1096 async_newpending(as
);
1097 if ((ret
= usb_submit_urb(as
->urb
, GFP_KERNEL
))) {
1098 dev_printk(KERN_DEBUG
, &ps
->dev
->dev
, "usbfs: usb_submit_urb returned %d\n", ret
);
1099 async_removepending(as
);
1106 static int proc_submiturb(struct dev_state
*ps
, void __user
*arg
)
1108 struct usbdevfs_urb uurb
;
1110 if (copy_from_user(&uurb
, arg
, sizeof(uurb
)))
1113 return proc_do_submiturb(ps
, &uurb
, (((struct usbdevfs_urb __user
*)arg
)->iso_frame_desc
), arg
);
1116 static int proc_unlinkurb(struct dev_state
*ps
, void __user
*arg
)
1120 as
= async_getpending(ps
, arg
);
1123 usb_kill_urb(as
->urb
);
1127 static int processcompl(struct async
*as
, void __user
* __user
*arg
)
1129 struct urb
*urb
= as
->urb
;
1130 struct usbdevfs_urb __user
*userurb
= as
->userurb
;
1131 void __user
*addr
= as
->userurb
;
1135 if (copy_to_user(as
->userbuffer
, urb
->transfer_buffer
, urb
->transfer_buffer_length
))
1137 if (put_user(as
->status
, &userurb
->status
))
1139 if (put_user(urb
->actual_length
, &userurb
->actual_length
))
1141 if (put_user(urb
->error_count
, &userurb
->error_count
))
1144 if (usb_endpoint_xfer_isoc(&urb
->ep
->desc
)) {
1145 for (i
= 0; i
< urb
->number_of_packets
; i
++) {
1146 if (put_user(urb
->iso_frame_desc
[i
].actual_length
,
1147 &userurb
->iso_frame_desc
[i
].actual_length
))
1149 if (put_user(urb
->iso_frame_desc
[i
].status
,
1150 &userurb
->iso_frame_desc
[i
].status
))
1157 if (put_user(addr
, (void __user
* __user
*)arg
))
1162 static struct async
* reap_as(struct dev_state
*ps
)
1164 DECLARE_WAITQUEUE(wait
, current
);
1165 struct async
*as
= NULL
;
1166 struct usb_device
*dev
= ps
->dev
;
1168 add_wait_queue(&ps
->wait
, &wait
);
1170 __set_current_state(TASK_INTERRUPTIBLE
);
1171 if ((as
= async_getcompleted(ps
)))
1173 if (signal_pending(current
))
1175 usb_unlock_device(dev
);
1177 usb_lock_device(dev
);
1179 remove_wait_queue(&ps
->wait
, &wait
);
1180 set_current_state(TASK_RUNNING
);
1184 static int proc_reapurb(struct dev_state
*ps
, void __user
*arg
)
1186 struct async
*as
= reap_as(ps
);
1188 return processcompl(as
, (void __user
* __user
*)arg
);
1189 if (signal_pending(current
))
1194 static int proc_reapurbnonblock(struct dev_state
*ps
, void __user
*arg
)
1198 if (!(as
= async_getcompleted(ps
)))
1200 return processcompl(as
, (void __user
* __user
*)arg
);
1203 #ifdef CONFIG_COMPAT
1205 static int get_urb32(struct usbdevfs_urb
*kurb
,
1206 struct usbdevfs_urb32 __user
*uurb
)
1209 if (get_user(kurb
->type
, &uurb
->type
) ||
1210 __get_user(kurb
->endpoint
, &uurb
->endpoint
) ||
1211 __get_user(kurb
->status
, &uurb
->status
) ||
1212 __get_user(kurb
->flags
, &uurb
->flags
) ||
1213 __get_user(kurb
->buffer_length
, &uurb
->buffer_length
) ||
1214 __get_user(kurb
->actual_length
, &uurb
->actual_length
) ||
1215 __get_user(kurb
->start_frame
, &uurb
->start_frame
) ||
1216 __get_user(kurb
->number_of_packets
, &uurb
->number_of_packets
) ||
1217 __get_user(kurb
->error_count
, &uurb
->error_count
) ||
1218 __get_user(kurb
->signr
, &uurb
->signr
))
1221 if (__get_user(uptr
, &uurb
->buffer
))
1223 kurb
->buffer
= compat_ptr(uptr
);
1224 if (__get_user(uptr
, &uurb
->buffer
))
1226 kurb
->usercontext
= compat_ptr(uptr
);
1231 static int proc_submiturb_compat(struct dev_state
*ps
, void __user
*arg
)
1233 struct usbdevfs_urb uurb
;
1235 if (get_urb32(&uurb
,(struct usbdevfs_urb32 __user
*)arg
))
1238 return proc_do_submiturb(ps
, &uurb
, ((struct usbdevfs_urb32 __user
*)arg
)->iso_frame_desc
, arg
);
1241 static int processcompl_compat(struct async
*as
, void __user
* __user
*arg
)
1243 struct urb
*urb
= as
->urb
;
1244 struct usbdevfs_urb32 __user
*userurb
= as
->userurb
;
1245 void __user
*addr
= as
->userurb
;
1249 if (copy_to_user(as
->userbuffer
, urb
->transfer_buffer
, urb
->transfer_buffer_length
))
1251 if (put_user(as
->status
, &userurb
->status
))
1253 if (put_user(urb
->actual_length
, &userurb
->actual_length
))
1255 if (put_user(urb
->error_count
, &userurb
->error_count
))
1258 if (usb_endpoint_xfer_isoc(&urb
->ep
->desc
)) {
1259 for (i
= 0; i
< urb
->number_of_packets
; i
++) {
1260 if (put_user(urb
->iso_frame_desc
[i
].actual_length
,
1261 &userurb
->iso_frame_desc
[i
].actual_length
))
1263 if (put_user(urb
->iso_frame_desc
[i
].status
,
1264 &userurb
->iso_frame_desc
[i
].status
))
1270 if (put_user(ptr_to_compat(addr
), (u32 __user
*)arg
))
1275 static int proc_reapurb_compat(struct dev_state
*ps
, void __user
*arg
)
1277 struct async
*as
= reap_as(ps
);
1279 return processcompl_compat(as
, (void __user
* __user
*)arg
);
1280 if (signal_pending(current
))
1285 static int proc_reapurbnonblock_compat(struct dev_state
*ps
, void __user
*arg
)
1289 if (!(as
= async_getcompleted(ps
)))
1291 return processcompl_compat(as
, (void __user
* __user
*)arg
);
1296 static int proc_disconnectsignal(struct dev_state
*ps
, void __user
*arg
)
1298 struct usbdevfs_disconnectsignal ds
;
1300 if (copy_from_user(&ds
, arg
, sizeof(ds
)))
1302 if (ds
.signr
!= 0 && (ds
.signr
< SIGRTMIN
|| ds
.signr
> SIGRTMAX
))
1304 ps
->discsignr
= ds
.signr
;
1305 ps
->disccontext
= ds
.context
;
1309 static int proc_claiminterface(struct dev_state
*ps
, void __user
*arg
)
1313 if (get_user(ifnum
, (unsigned int __user
*)arg
))
1315 return claimintf(ps
, ifnum
);
1318 static int proc_releaseinterface(struct dev_state
*ps
, void __user
*arg
)
1323 if (get_user(ifnum
, (unsigned int __user
*)arg
))
1325 if ((ret
= releaseintf(ps
, ifnum
)) < 0)
1327 destroy_async_on_interface (ps
, ifnum
);
1331 static int proc_ioctl(struct dev_state
*ps
, struct usbdevfs_ioctl
*ctl
)
1336 struct usb_interface
*intf
= NULL
;
1337 struct usb_driver
*driver
= NULL
;
1340 if ((size
= _IOC_SIZE (ctl
->ioctl_code
)) > 0) {
1341 if ((buf
= kmalloc (size
, GFP_KERNEL
)) == NULL
)
1343 if ((_IOC_DIR(ctl
->ioctl_code
) & _IOC_WRITE
)) {
1344 if (copy_from_user (buf
, ctl
->data
, size
)) {
1349 memset (buf
, 0, size
);
1353 if (!connected(ps
)) {
1358 if (ps
->dev
->state
!= USB_STATE_CONFIGURED
)
1359 retval
= -EHOSTUNREACH
;
1360 else if (!(intf
= usb_ifnum_to_if (ps
->dev
, ctl
->ifno
)))
1362 else switch (ctl
->ioctl_code
) {
1364 /* disconnect kernel driver from interface */
1365 case USBDEVFS_DISCONNECT
:
1366 if (intf
->dev
.driver
) {
1367 driver
= to_usb_driver(intf
->dev
.driver
);
1368 dev_dbg (&intf
->dev
, "disconnect by usbfs\n");
1369 usb_driver_release_interface(driver
, intf
);
1374 /* let kernel drivers try to (re)bind to the interface */
1375 case USBDEVFS_CONNECT
:
1376 usb_unlock_device(ps
->dev
);
1377 retval
= bus_rescan_devices(intf
->dev
.bus
);
1378 usb_lock_device(ps
->dev
);
1381 /* talk directly to the interface's driver */
1383 if (intf
->dev
.driver
)
1384 driver
= to_usb_driver(intf
->dev
.driver
);
1385 if (driver
== NULL
|| driver
->ioctl
== NULL
) {
1388 retval
= driver
->ioctl (intf
, ctl
->ioctl_code
, buf
);
1389 if (retval
== -ENOIOCTLCMD
)
1394 /* cleanup and return */
1396 && (_IOC_DIR (ctl
->ioctl_code
) & _IOC_READ
) != 0
1398 && copy_to_user (ctl
->data
, buf
, size
) != 0)
1405 static int proc_ioctl_default(struct dev_state
*ps
, void __user
*arg
)
1407 struct usbdevfs_ioctl ctrl
;
1409 if (copy_from_user(&ctrl
, arg
, sizeof (ctrl
)))
1411 return proc_ioctl(ps
, &ctrl
);
1414 #ifdef CONFIG_COMPAT
1415 static int proc_ioctl_compat(struct dev_state
*ps
, compat_uptr_t arg
)
1417 struct usbdevfs_ioctl32 __user
*uioc
;
1418 struct usbdevfs_ioctl ctrl
;
1421 uioc
= compat_ptr((long)arg
);
1422 if (get_user(ctrl
.ifno
, &uioc
->ifno
) ||
1423 get_user(ctrl
.ioctl_code
, &uioc
->ioctl_code
) ||
1424 __get_user(udata
, &uioc
->data
))
1426 ctrl
.data
= compat_ptr(udata
);
1428 return proc_ioctl(ps
, &ctrl
);
1433 * NOTE: All requests here that have interface numbers as parameters
1434 * are assuming that somehow the configuration has been prevented from
1435 * changing. But there's no mechanism to ensure that...
1437 static int usbdev_ioctl(struct inode
*inode
, struct file
*file
, unsigned int cmd
, unsigned long arg
)
1439 struct dev_state
*ps
= file
->private_data
;
1440 struct usb_device
*dev
= ps
->dev
;
1441 void __user
*p
= (void __user
*)arg
;
1444 if (!(file
->f_mode
& FMODE_WRITE
))
1446 usb_lock_device(dev
);
1447 if (!connected(ps
)) {
1448 usb_unlock_device(dev
);
1453 case USBDEVFS_CONTROL
:
1454 snoop(&dev
->dev
, "%s: CONTROL\n", __FUNCTION__
);
1455 ret
= proc_control(ps
, p
);
1457 inode
->i_mtime
= CURRENT_TIME
;
1461 snoop(&dev
->dev
, "%s: BULK\n", __FUNCTION__
);
1462 ret
= proc_bulk(ps
, p
);
1464 inode
->i_mtime
= CURRENT_TIME
;
1467 case USBDEVFS_RESETEP
:
1468 snoop(&dev
->dev
, "%s: RESETEP\n", __FUNCTION__
);
1469 ret
= proc_resetep(ps
, p
);
1471 inode
->i_mtime
= CURRENT_TIME
;
1474 case USBDEVFS_RESET
:
1475 snoop(&dev
->dev
, "%s: RESET\n", __FUNCTION__
);
1476 ret
= proc_resetdevice(ps
);
1479 case USBDEVFS_CLEAR_HALT
:
1480 snoop(&dev
->dev
, "%s: CLEAR_HALT\n", __FUNCTION__
);
1481 ret
= proc_clearhalt(ps
, p
);
1483 inode
->i_mtime
= CURRENT_TIME
;
1486 case USBDEVFS_GETDRIVER
:
1487 snoop(&dev
->dev
, "%s: GETDRIVER\n", __FUNCTION__
);
1488 ret
= proc_getdriver(ps
, p
);
1491 case USBDEVFS_CONNECTINFO
:
1492 snoop(&dev
->dev
, "%s: CONNECTINFO\n", __FUNCTION__
);
1493 ret
= proc_connectinfo(ps
, p
);
1496 case USBDEVFS_SETINTERFACE
:
1497 snoop(&dev
->dev
, "%s: SETINTERFACE\n", __FUNCTION__
);
1498 ret
= proc_setintf(ps
, p
);
1501 case USBDEVFS_SETCONFIGURATION
:
1502 snoop(&dev
->dev
, "%s: SETCONFIGURATION\n", __FUNCTION__
);
1503 ret
= proc_setconfig(ps
, p
);
1506 case USBDEVFS_SUBMITURB
:
1507 snoop(&dev
->dev
, "%s: SUBMITURB\n", __FUNCTION__
);
1508 ret
= proc_submiturb(ps
, p
);
1510 inode
->i_mtime
= CURRENT_TIME
;
1513 #ifdef CONFIG_COMPAT
1515 case USBDEVFS_SUBMITURB32
:
1516 snoop(&dev
->dev
, "%s: SUBMITURB32\n", __FUNCTION__
);
1517 ret
= proc_submiturb_compat(ps
, p
);
1519 inode
->i_mtime
= CURRENT_TIME
;
1522 case USBDEVFS_REAPURB32
:
1523 snoop(&dev
->dev
, "%s: REAPURB32\n", __FUNCTION__
);
1524 ret
= proc_reapurb_compat(ps
, p
);
1527 case USBDEVFS_REAPURBNDELAY32
:
1528 snoop(&dev
->dev
, "%s: REAPURBDELAY32\n", __FUNCTION__
);
1529 ret
= proc_reapurbnonblock_compat(ps
, p
);
1532 case USBDEVFS_IOCTL32
:
1533 snoop(&dev
->dev
, "%s: IOCTL\n", __FUNCTION__
);
1534 ret
= proc_ioctl_compat(ps
, ptr_to_compat(p
));
1538 case USBDEVFS_DISCARDURB
:
1539 snoop(&dev
->dev
, "%s: DISCARDURB\n", __FUNCTION__
);
1540 ret
= proc_unlinkurb(ps
, p
);
1543 case USBDEVFS_REAPURB
:
1544 snoop(&dev
->dev
, "%s: REAPURB\n", __FUNCTION__
);
1545 ret
= proc_reapurb(ps
, p
);
1548 case USBDEVFS_REAPURBNDELAY
:
1549 snoop(&dev
->dev
, "%s: REAPURBDELAY\n", __FUNCTION__
);
1550 ret
= proc_reapurbnonblock(ps
, p
);
1553 case USBDEVFS_DISCSIGNAL
:
1554 snoop(&dev
->dev
, "%s: DISCSIGNAL\n", __FUNCTION__
);
1555 ret
= proc_disconnectsignal(ps
, p
);
1558 case USBDEVFS_CLAIMINTERFACE
:
1559 snoop(&dev
->dev
, "%s: CLAIMINTERFACE\n", __FUNCTION__
);
1560 ret
= proc_claiminterface(ps
, p
);
1563 case USBDEVFS_RELEASEINTERFACE
:
1564 snoop(&dev
->dev
, "%s: RELEASEINTERFACE\n", __FUNCTION__
);
1565 ret
= proc_releaseinterface(ps
, p
);
1568 case USBDEVFS_IOCTL
:
1569 snoop(&dev
->dev
, "%s: IOCTL\n", __FUNCTION__
);
1570 ret
= proc_ioctl_default(ps
, p
);
1573 usb_unlock_device(dev
);
1575 inode
->i_atime
= CURRENT_TIME
;
1579 /* No kernel lock - fine */
1580 static unsigned int usbdev_poll(struct file
*file
, struct poll_table_struct
*wait
)
1582 struct dev_state
*ps
= file
->private_data
;
1583 unsigned int mask
= 0;
1585 poll_wait(file
, &ps
->wait
, wait
);
1586 if (file
->f_mode
& FMODE_WRITE
&& !list_empty(&ps
->async_completed
))
1587 mask
|= POLLOUT
| POLLWRNORM
;
1589 mask
|= POLLERR
| POLLHUP
;
1593 const struct file_operations usbdev_file_operations
= {
1594 .owner
= THIS_MODULE
,
1595 .llseek
= usbdev_lseek
,
1596 .read
= usbdev_read
,
1597 .poll
= usbdev_poll
,
1598 .ioctl
= usbdev_ioctl
,
1599 .open
= usbdev_open
,
1600 .release
= usbdev_release
,
1603 #ifdef CONFIG_USB_DEVICE_CLASS
1604 static struct class *usb_classdev_class
;
1606 static int usb_classdev_add(struct usb_device
*dev
)
1608 int minor
= ((dev
->bus
->busnum
-1) * 128) + (dev
->devnum
-1);
1610 dev
->usb_classdev
= device_create(usb_classdev_class
, &dev
->dev
,
1611 MKDEV(USB_DEVICE_MAJOR
, minor
),
1612 "usbdev%d.%d", dev
->bus
->busnum
, dev
->devnum
);
1613 if (IS_ERR(dev
->usb_classdev
))
1614 return PTR_ERR(dev
->usb_classdev
);
1619 static void usb_classdev_remove(struct usb_device
*dev
)
1621 device_unregister(dev
->usb_classdev
);
1624 static int usb_classdev_notify(struct notifier_block
*self
,
1625 unsigned long action
, void *dev
)
1628 case USB_DEVICE_ADD
:
1629 if (usb_classdev_add(dev
))
1632 case USB_DEVICE_REMOVE
:
1633 usb_classdev_remove(dev
);
1639 static struct notifier_block usbdev_nb
= {
1640 .notifier_call
= usb_classdev_notify
,
1644 static struct cdev usb_device_cdev
;
1646 int __init
usb_devio_init(void)
1650 retval
= register_chrdev_region(USB_DEVICE_DEV
, USB_DEVICE_MAX
,
1653 err("unable to register minors for usb_device");
1656 cdev_init(&usb_device_cdev
, &usbdev_file_operations
);
1657 retval
= cdev_add(&usb_device_cdev
, USB_DEVICE_DEV
, USB_DEVICE_MAX
);
1659 err("unable to get usb_device major %d", USB_DEVICE_MAJOR
);
1662 #ifdef CONFIG_USB_DEVICE_CLASS
1663 usb_classdev_class
= class_create(THIS_MODULE
, "usb_device");
1664 if (IS_ERR(usb_classdev_class
)) {
1665 err("unable to register usb_device class");
1666 retval
= PTR_ERR(usb_classdev_class
);
1667 cdev_del(&usb_device_cdev
);
1668 usb_classdev_class
= NULL
;
1672 usb_register_notify(&usbdev_nb
);
1678 unregister_chrdev_region(USB_DEVICE_DEV
, USB_DEVICE_MAX
);
1682 void usb_devio_cleanup(void)
1684 #ifdef CONFIG_USB_DEVICE_CLASS
1685 usb_unregister_notify(&usbdev_nb
);
1686 class_destroy(usb_classdev_class
);
1688 cdev_del(&usb_device_cdev
);
1689 unregister_chrdev_region(USB_DEVICE_DEV
, USB_DEVICE_MAX
);