blob: 3507f880eb74294c76ddbc43c3aa153528478f53 [file] [log] [blame]
Michal Nazarewiczddf8abd2010-05-05 12:53:14 +02001/*
Michal Nazarewicz5ab54cf2010-11-12 14:29:28 +01002 * f_fs.c -- user mode file system API for USB composite function controllers
Michal Nazarewiczddf8abd2010-05-05 12:53:14 +02003 *
4 * Copyright (C) 2010 Samsung Electronics
Michal Nazarewicz54b83602012-01-13 15:05:16 +01005 * Author: Michal Nazarewicz <mina86@mina86.com>
Michal Nazarewiczddf8abd2010-05-05 12:53:14 +02006 *
Michal Nazarewicz5ab54cf2010-11-12 14:29:28 +01007 * Based on inode.c (GadgetFS) which was:
Michal Nazarewiczddf8abd2010-05-05 12:53:14 +02008 * Copyright (C) 2003-2004 David Brownell
9 * Copyright (C) 2003 Agilent Technologies
10 *
11 * This program is free software; you can redistribute it and/or modify
12 * it under the terms of the GNU General Public License as published by
13 * the Free Software Foundation; either version 2 of the License, or
14 * (at your option) any later version.
Michal Nazarewiczddf8abd2010-05-05 12:53:14 +020015 */
16
17
18/* #define DEBUG */
19/* #define VERBOSE_DEBUG */
20
21#include <linux/blkdev.h>
Randy Dunlapb0608692010-05-10 10:51:36 -070022#include <linux/pagemap.h>
Paul Gortmakerf940fcd2011-05-27 09:56:31 -040023#include <linux/export.h>
Koen Beel560f1182012-05-30 20:43:37 +020024#include <linux/hid.h>
Andrzej Pietrasiewicz5920cda2013-12-03 15:15:33 +010025#include <linux/module.h>
Christoph Hellwige2e40f22015-02-22 08:58:50 -080026#include <linux/uio.h>
Michal Nazarewiczddf8abd2010-05-05 12:53:14 +020027#include <asm/unaligned.h>
Michal Nazarewiczddf8abd2010-05-05 12:53:14 +020028
29#include <linux/usb/composite.h>
30#include <linux/usb/functionfs.h>
31
Robert Baldyga2e4c7552014-02-10 10:42:44 +010032#include <linux/aio.h>
33#include <linux/mmu_context.h>
Robert Baldyga23de91e2014-02-10 10:42:43 +010034#include <linux/poll.h>
Robert Baldyga5e33f6f2015-01-23 13:41:01 +010035#include <linux/eventfd.h>
Robert Baldyga23de91e2014-02-10 10:42:43 +010036
Andrzej Pietrasiewicze72c39c2013-12-03 15:15:31 +010037#include "u_fs.h"
Andrzej Pietrasiewicz74d48462014-05-08 14:06:21 +020038#include "u_f.h"
Andrzej Pietrasiewiczf0175ab2014-07-09 12:20:08 +020039#include "u_os_desc.h"
Andrzej Pietrasiewiczb6584992013-12-03 15:15:36 +010040#include "configfs.h"
Michal Nazarewiczddf8abd2010-05-05 12:53:14 +020041
42#define FUNCTIONFS_MAGIC 0xa647361 /* Chosen by a honest dice roll ;) */
43
Michal Nazarewiczddf8abd2010-05-05 12:53:14 +020044/* Reference counter handling */
45static void ffs_data_get(struct ffs_data *ffs);
46static void ffs_data_put(struct ffs_data *ffs);
47/* Creates new ffs_data object. */
48static struct ffs_data *__must_check ffs_data_new(void) __attribute__((malloc));
49
50/* Opened counter handling. */
51static void ffs_data_opened(struct ffs_data *ffs);
52static void ffs_data_closed(struct ffs_data *ffs);
53
Michal Nazarewicz5ab54cf2010-11-12 14:29:28 +010054/* Called with ffs->mutex held; take over ownership of data. */
Michal Nazarewiczddf8abd2010-05-05 12:53:14 +020055static int __must_check
56__ffs_data_got_descs(struct ffs_data *ffs, char *data, size_t len);
57static int __must_check
58__ffs_data_got_strings(struct ffs_data *ffs, char *data, size_t len);
59
60
61/* The function structure ***************************************************/
62
63struct ffs_ep;
64
65struct ffs_function {
66 struct usb_configuration *conf;
67 struct usb_gadget *gadget;
68 struct ffs_data *ffs;
69
70 struct ffs_ep *eps;
71 u8 eps_revmap[16];
72 short *interfaces_nums;
73
74 struct usb_function function;
75};
76
77
78static struct ffs_function *ffs_func_from_usb(struct usb_function *f)
79{
80 return container_of(f, struct ffs_function, function);
81}
82
Michal Nazarewiczddf8abd2010-05-05 12:53:14 +020083
Michal Nazarewicza7ecf052014-02-10 10:42:41 +010084static inline enum ffs_setup_state
85ffs_setup_state_clear_cancelled(struct ffs_data *ffs)
86{
87 return (enum ffs_setup_state)
88 cmpxchg(&ffs->setup_state, FFS_SETUP_CANCELLED, FFS_NO_SETUP);
89}
90
91
Michal Nazarewiczddf8abd2010-05-05 12:53:14 +020092static void ffs_func_eps_disable(struct ffs_function *func);
93static int __must_check ffs_func_eps_enable(struct ffs_function *func);
94
Michal Nazarewiczddf8abd2010-05-05 12:53:14 +020095static int ffs_func_bind(struct usb_configuration *,
96 struct usb_function *);
Michal Nazarewiczddf8abd2010-05-05 12:53:14 +020097static int ffs_func_set_alt(struct usb_function *, unsigned, unsigned);
98static void ffs_func_disable(struct usb_function *);
99static int ffs_func_setup(struct usb_function *,
100 const struct usb_ctrlrequest *);
101static void ffs_func_suspend(struct usb_function *);
102static void ffs_func_resume(struct usb_function *);
103
104
105static int ffs_func_revmap_ep(struct ffs_function *func, u8 num);
106static int ffs_func_revmap_intf(struct ffs_function *func, u8 intf);
107
108
Michal Nazarewiczddf8abd2010-05-05 12:53:14 +0200109/* The endpoints structures *************************************************/
110
111struct ffs_ep {
112 struct usb_ep *ep; /* P: ffs->eps_lock */
113 struct usb_request *req; /* P: epfile->mutex */
114
Manu Gautam8d4e8972014-02-28 16:50:22 +0530115 /* [0]: full speed, [1]: high speed, [2]: super speed */
116 struct usb_endpoint_descriptor *descs[3];
Michal Nazarewiczddf8abd2010-05-05 12:53:14 +0200117
118 u8 num;
119
120 int status; /* P: epfile->mutex */
121};
122
123struct ffs_epfile {
124 /* Protects ep->ep and ep->req. */
125 struct mutex mutex;
126 wait_queue_head_t wait;
127
128 struct ffs_data *ffs;
129 struct ffs_ep *ep; /* P: ffs->eps_lock */
130
131 struct dentry *dentry;
132
133 char name[5];
134
135 unsigned char in; /* P: ffs->eps_lock */
136 unsigned char isoc; /* P: ffs->eps_lock */
137
138 unsigned char _pad;
139};
140
Robert Baldyga2e4c7552014-02-10 10:42:44 +0100141/* ffs_io_data structure ***************************************************/
142
143struct ffs_io_data {
144 bool aio;
145 bool read;
146
147 struct kiocb *kiocb;
Al Viroc993c392015-01-31 23:23:35 -0500148 struct iov_iter data;
149 const void *to_free;
150 char *buf;
Robert Baldyga2e4c7552014-02-10 10:42:44 +0100151
152 struct mm_struct *mm;
153 struct work_struct work;
154
155 struct usb_ep *ep;
156 struct usb_request *req;
Robert Baldyga5e33f6f2015-01-23 13:41:01 +0100157
158 struct ffs_data *ffs;
Robert Baldyga2e4c7552014-02-10 10:42:44 +0100159};
160
Robert Baldyga6d5c1c72014-08-25 11:16:27 +0200161struct ffs_desc_helper {
162 struct ffs_data *ffs;
163 unsigned interfaces_count;
164 unsigned eps_count;
165};
166
Michal Nazarewiczddf8abd2010-05-05 12:53:14 +0200167static int __must_check ffs_epfiles_create(struct ffs_data *ffs);
168static void ffs_epfiles_destroy(struct ffs_epfile *epfiles, unsigned count);
169
Al Viro1bb27ca2014-09-03 13:32:19 -0400170static struct dentry *
Michal Nazarewiczddf8abd2010-05-05 12:53:14 +0200171ffs_sb_create_file(struct super_block *sb, const char *name, void *data,
Al Viro1bb27ca2014-09-03 13:32:19 -0400172 const struct file_operations *fops);
Michal Nazarewiczddf8abd2010-05-05 12:53:14 +0200173
Andrzej Pietrasiewicz4b187fc2013-12-03 15:15:32 +0100174/* Devices management *******************************************************/
175
176DEFINE_MUTEX(ffs_lock);
Felipe Balbi0700faa2014-04-01 13:19:32 -0500177EXPORT_SYMBOL_GPL(ffs_lock);
Andrzej Pietrasiewicz4b187fc2013-12-03 15:15:32 +0100178
Andrzej Pietrasiewiczda13a772014-01-13 16:49:38 +0100179static struct ffs_dev *_ffs_find_dev(const char *name);
180static struct ffs_dev *_ffs_alloc_dev(void);
Andrzej Pietrasiewiczb6584992013-12-03 15:15:36 +0100181static int _ffs_name_dev(struct ffs_dev *dev, const char *name);
Andrzej Pietrasiewiczda13a772014-01-13 16:49:38 +0100182static void _ffs_free_dev(struct ffs_dev *dev);
Andrzej Pietrasiewicz4b187fc2013-12-03 15:15:32 +0100183static void *ffs_acquire_dev(const char *dev_name);
184static void ffs_release_dev(struct ffs_data *ffs_data);
185static int ffs_ready(struct ffs_data *ffs);
186static void ffs_closed(struct ffs_data *ffs);
Michal Nazarewiczddf8abd2010-05-05 12:53:14 +0200187
188/* Misc helper functions ****************************************************/
189
190static int ffs_mutex_lock(struct mutex *mutex, unsigned nonblock)
191 __attribute__((warn_unused_result, nonnull));
Al Viro260ef312012-09-26 21:43:45 -0400192static char *ffs_prepare_buffer(const char __user *buf, size_t len)
Michal Nazarewiczddf8abd2010-05-05 12:53:14 +0200193 __attribute__((warn_unused_result, nonnull));
194
195
196/* Control file aka ep0 *****************************************************/
197
198static void ffs_ep0_complete(struct usb_ep *ep, struct usb_request *req)
199{
200 struct ffs_data *ffs = req->context;
201
202 complete_all(&ffs->ep0req_completion);
203}
204
Michal Nazarewiczddf8abd2010-05-05 12:53:14 +0200205static int __ffs_ep0_queue_wait(struct ffs_data *ffs, char *data, size_t len)
206{
207 struct usb_request *req = ffs->ep0req;
208 int ret;
209
210 req->zero = len < le16_to_cpu(ffs->ev.setup.wLength);
211
212 spin_unlock_irq(&ffs->ev.waitq.lock);
213
214 req->buf = data;
215 req->length = len;
216
Marek Szyprowskice1fd352011-01-28 13:55:36 +0100217 /*
218 * UDC layer requires to provide a buffer even for ZLP, but should
219 * not use it at all. Let's provide some poisoned pointer to catch
220 * possible bug in the driver.
221 */
222 if (req->buf == NULL)
223 req->buf = (void *)0xDEADBABE;
224
Wolfram Sang16735d02013-11-14 14:32:02 -0800225 reinit_completion(&ffs->ep0req_completion);
Michal Nazarewiczddf8abd2010-05-05 12:53:14 +0200226
227 ret = usb_ep_queue(ffs->gadget->ep0, req, GFP_ATOMIC);
228 if (unlikely(ret < 0))
229 return ret;
230
231 ret = wait_for_completion_interruptible(&ffs->ep0req_completion);
232 if (unlikely(ret)) {
233 usb_ep_dequeue(ffs->gadget->ep0, req);
234 return -EINTR;
235 }
236
237 ffs->setup_state = FFS_NO_SETUP;
Robert Baldyga0a7b1f82014-02-10 10:42:42 +0100238 return req->status ? req->status : req->actual;
Michal Nazarewiczddf8abd2010-05-05 12:53:14 +0200239}
240
241static int __ffs_ep0_stall(struct ffs_data *ffs)
242{
243 if (ffs->ev.can_stall) {
Michal Nazarewiczaa02f172010-11-17 17:09:47 +0100244 pr_vdebug("ep0 stall\n");
Michal Nazarewiczddf8abd2010-05-05 12:53:14 +0200245 usb_ep_set_halt(ffs->gadget->ep0);
246 ffs->setup_state = FFS_NO_SETUP;
247 return -EL2HLT;
248 } else {
Michal Nazarewiczaa02f172010-11-17 17:09:47 +0100249 pr_debug("bogus ep0 stall!\n");
Michal Nazarewiczddf8abd2010-05-05 12:53:14 +0200250 return -ESRCH;
251 }
252}
253
Michal Nazarewiczddf8abd2010-05-05 12:53:14 +0200254static ssize_t ffs_ep0_write(struct file *file, const char __user *buf,
255 size_t len, loff_t *ptr)
256{
257 struct ffs_data *ffs = file->private_data;
258 ssize_t ret;
259 char *data;
260
261 ENTER();
262
263 /* Fast check if setup was canceled */
Michal Nazarewicza7ecf052014-02-10 10:42:41 +0100264 if (ffs_setup_state_clear_cancelled(ffs) == FFS_SETUP_CANCELLED)
Michal Nazarewiczddf8abd2010-05-05 12:53:14 +0200265 return -EIDRM;
266
267 /* Acquire mutex */
268 ret = ffs_mutex_lock(&ffs->mutex, file->f_flags & O_NONBLOCK);
269 if (unlikely(ret < 0))
270 return ret;
271
Michal Nazarewiczddf8abd2010-05-05 12:53:14 +0200272 /* Check state */
273 switch (ffs->state) {
274 case FFS_READ_DESCRIPTORS:
275 case FFS_READ_STRINGS:
276 /* Copy data */
277 if (unlikely(len < 16)) {
278 ret = -EINVAL;
279 break;
280 }
281
282 data = ffs_prepare_buffer(buf, len);
Tobias Klauser537baab2010-12-09 15:52:39 +0100283 if (IS_ERR(data)) {
Michal Nazarewiczddf8abd2010-05-05 12:53:14 +0200284 ret = PTR_ERR(data);
285 break;
286 }
287
288 /* Handle data */
289 if (ffs->state == FFS_READ_DESCRIPTORS) {
Michal Nazarewiczaa02f172010-11-17 17:09:47 +0100290 pr_info("read descriptors\n");
Michal Nazarewiczddf8abd2010-05-05 12:53:14 +0200291 ret = __ffs_data_got_descs(ffs, data, len);
292 if (unlikely(ret < 0))
293 break;
294
295 ffs->state = FFS_READ_STRINGS;
296 ret = len;
297 } else {
Michal Nazarewiczaa02f172010-11-17 17:09:47 +0100298 pr_info("read strings\n");
Michal Nazarewiczddf8abd2010-05-05 12:53:14 +0200299 ret = __ffs_data_got_strings(ffs, data, len);
300 if (unlikely(ret < 0))
301 break;
302
303 ret = ffs_epfiles_create(ffs);
304 if (unlikely(ret)) {
305 ffs->state = FFS_CLOSING;
306 break;
307 }
308
309 ffs->state = FFS_ACTIVE;
310 mutex_unlock(&ffs->mutex);
311
Andrzej Pietrasiewicz4b187fc2013-12-03 15:15:32 +0100312 ret = ffs_ready(ffs);
Michal Nazarewiczddf8abd2010-05-05 12:53:14 +0200313 if (unlikely(ret < 0)) {
314 ffs->state = FFS_CLOSING;
315 return ret;
316 }
317
Michal Nazarewiczddf8abd2010-05-05 12:53:14 +0200318 return len;
319 }
320 break;
321
Michal Nazarewiczddf8abd2010-05-05 12:53:14 +0200322 case FFS_ACTIVE:
323 data = NULL;
Michal Nazarewicz5ab54cf2010-11-12 14:29:28 +0100324 /*
325 * We're called from user space, we can use _irq
326 * rather then _irqsave
327 */
Michal Nazarewiczddf8abd2010-05-05 12:53:14 +0200328 spin_lock_irq(&ffs->ev.waitq.lock);
Michal Nazarewicza7ecf052014-02-10 10:42:41 +0100329 switch (ffs_setup_state_clear_cancelled(ffs)) {
Michal Nazarewicze46318a2014-02-10 10:42:40 +0100330 case FFS_SETUP_CANCELLED:
Michal Nazarewiczddf8abd2010-05-05 12:53:14 +0200331 ret = -EIDRM;
332 goto done_spin;
333
334 case FFS_NO_SETUP:
335 ret = -ESRCH;
336 goto done_spin;
337
338 case FFS_SETUP_PENDING:
339 break;
340 }
341
342 /* FFS_SETUP_PENDING */
343 if (!(ffs->ev.setup.bRequestType & USB_DIR_IN)) {
344 spin_unlock_irq(&ffs->ev.waitq.lock);
345 ret = __ffs_ep0_stall(ffs);
346 break;
347 }
348
349 /* FFS_SETUP_PENDING and not stall */
350 len = min(len, (size_t)le16_to_cpu(ffs->ev.setup.wLength));
351
352 spin_unlock_irq(&ffs->ev.waitq.lock);
353
354 data = ffs_prepare_buffer(buf, len);
Tobias Klauser537baab2010-12-09 15:52:39 +0100355 if (IS_ERR(data)) {
Michal Nazarewiczddf8abd2010-05-05 12:53:14 +0200356 ret = PTR_ERR(data);
357 break;
358 }
359
360 spin_lock_irq(&ffs->ev.waitq.lock);
361
Michal Nazarewicz5ab54cf2010-11-12 14:29:28 +0100362 /*
363 * We are guaranteed to be still in FFS_ACTIVE state
Michal Nazarewiczddf8abd2010-05-05 12:53:14 +0200364 * but the state of setup could have changed from
Michal Nazarewicze46318a2014-02-10 10:42:40 +0100365 * FFS_SETUP_PENDING to FFS_SETUP_CANCELLED so we need
Michal Nazarewiczddf8abd2010-05-05 12:53:14 +0200366 * to check for that. If that happened we copied data
Michal Nazarewicz5ab54cf2010-11-12 14:29:28 +0100367 * from user space in vain but it's unlikely.
368 *
369 * For sure we are not in FFS_NO_SETUP since this is
Michal Nazarewiczddf8abd2010-05-05 12:53:14 +0200370 * the only place FFS_SETUP_PENDING -> FFS_NO_SETUP
371 * transition can be performed and it's protected by
Michal Nazarewicz5ab54cf2010-11-12 14:29:28 +0100372 * mutex.
373 */
Michal Nazarewicza7ecf052014-02-10 10:42:41 +0100374 if (ffs_setup_state_clear_cancelled(ffs) ==
375 FFS_SETUP_CANCELLED) {
Michal Nazarewiczddf8abd2010-05-05 12:53:14 +0200376 ret = -EIDRM;
377done_spin:
378 spin_unlock_irq(&ffs->ev.waitq.lock);
379 } else {
380 /* unlocks spinlock */
381 ret = __ffs_ep0_queue_wait(ffs, data, len);
382 }
383 kfree(data);
384 break;
385
Michal Nazarewiczddf8abd2010-05-05 12:53:14 +0200386 default:
387 ret = -EBADFD;
388 break;
389 }
390
Michal Nazarewiczddf8abd2010-05-05 12:53:14 +0200391 mutex_unlock(&ffs->mutex);
392 return ret;
393}
394
Michal Nazarewicz67913bb2014-09-10 17:50:24 +0200395/* Called with ffs->ev.waitq.lock and ffs->mutex held, both released on exit. */
Michal Nazarewiczddf8abd2010-05-05 12:53:14 +0200396static ssize_t __ffs_ep0_read_events(struct ffs_data *ffs, char __user *buf,
397 size_t n)
398{
Michal Nazarewicz5ab54cf2010-11-12 14:29:28 +0100399 /*
Michal Nazarewicz67913bb2014-09-10 17:50:24 +0200400 * n cannot be bigger than ffs->ev.count, which cannot be bigger than
401 * size of ffs->ev.types array (which is four) so that's how much space
402 * we reserve.
Michal Nazarewicz5ab54cf2010-11-12 14:29:28 +0100403 */
Michal Nazarewicz67913bb2014-09-10 17:50:24 +0200404 struct usb_functionfs_event events[ARRAY_SIZE(ffs->ev.types)];
405 const size_t size = n * sizeof *events;
Michal Nazarewiczddf8abd2010-05-05 12:53:14 +0200406 unsigned i = 0;
407
Michal Nazarewicz67913bb2014-09-10 17:50:24 +0200408 memset(events, 0, size);
Michal Nazarewiczddf8abd2010-05-05 12:53:14 +0200409
410 do {
411 events[i].type = ffs->ev.types[i];
412 if (events[i].type == FUNCTIONFS_SETUP) {
413 events[i].u.setup = ffs->ev.setup;
414 ffs->setup_state = FFS_SETUP_PENDING;
415 }
416 } while (++i < n);
417
Michal Nazarewicz67913bb2014-09-10 17:50:24 +0200418 ffs->ev.count -= n;
419 if (ffs->ev.count)
Michal Nazarewiczddf8abd2010-05-05 12:53:14 +0200420 memmove(ffs->ev.types, ffs->ev.types + n,
421 ffs->ev.count * sizeof *ffs->ev.types);
Michal Nazarewiczddf8abd2010-05-05 12:53:14 +0200422
423 spin_unlock_irq(&ffs->ev.waitq.lock);
424 mutex_unlock(&ffs->mutex);
425
Michal Nazarewicz67913bb2014-09-10 17:50:24 +0200426 return unlikely(__copy_to_user(buf, events, size)) ? -EFAULT : size;
Michal Nazarewiczddf8abd2010-05-05 12:53:14 +0200427}
428
Michal Nazarewiczddf8abd2010-05-05 12:53:14 +0200429static ssize_t ffs_ep0_read(struct file *file, char __user *buf,
430 size_t len, loff_t *ptr)
431{
432 struct ffs_data *ffs = file->private_data;
433 char *data = NULL;
434 size_t n;
435 int ret;
436
437 ENTER();
438
439 /* Fast check if setup was canceled */
Michal Nazarewicza7ecf052014-02-10 10:42:41 +0100440 if (ffs_setup_state_clear_cancelled(ffs) == FFS_SETUP_CANCELLED)
Michal Nazarewiczddf8abd2010-05-05 12:53:14 +0200441 return -EIDRM;
442
443 /* Acquire mutex */
444 ret = ffs_mutex_lock(&ffs->mutex, file->f_flags & O_NONBLOCK);
445 if (unlikely(ret < 0))
446 return ret;
447
Michal Nazarewiczddf8abd2010-05-05 12:53:14 +0200448 /* Check state */
449 if (ffs->state != FFS_ACTIVE) {
450 ret = -EBADFD;
451 goto done_mutex;
452 }
453
Michal Nazarewicz5ab54cf2010-11-12 14:29:28 +0100454 /*
455 * We're called from user space, we can use _irq rather then
456 * _irqsave
457 */
Michal Nazarewiczddf8abd2010-05-05 12:53:14 +0200458 spin_lock_irq(&ffs->ev.waitq.lock);
459
Michal Nazarewicza7ecf052014-02-10 10:42:41 +0100460 switch (ffs_setup_state_clear_cancelled(ffs)) {
Michal Nazarewicze46318a2014-02-10 10:42:40 +0100461 case FFS_SETUP_CANCELLED:
Michal Nazarewiczddf8abd2010-05-05 12:53:14 +0200462 ret = -EIDRM;
463 break;
464
465 case FFS_NO_SETUP:
466 n = len / sizeof(struct usb_functionfs_event);
467 if (unlikely(!n)) {
468 ret = -EINVAL;
469 break;
470 }
471
472 if ((file->f_flags & O_NONBLOCK) && !ffs->ev.count) {
473 ret = -EAGAIN;
474 break;
475 }
476
Michal Nazarewicz5ab54cf2010-11-12 14:29:28 +0100477 if (wait_event_interruptible_exclusive_locked_irq(ffs->ev.waitq,
478 ffs->ev.count)) {
Michal Nazarewiczddf8abd2010-05-05 12:53:14 +0200479 ret = -EINTR;
480 break;
481 }
482
483 return __ffs_ep0_read_events(ffs, buf,
484 min(n, (size_t)ffs->ev.count));
485
Michal Nazarewiczddf8abd2010-05-05 12:53:14 +0200486 case FFS_SETUP_PENDING:
487 if (ffs->ev.setup.bRequestType & USB_DIR_IN) {
488 spin_unlock_irq(&ffs->ev.waitq.lock);
489 ret = __ffs_ep0_stall(ffs);
490 goto done_mutex;
491 }
492
493 len = min(len, (size_t)le16_to_cpu(ffs->ev.setup.wLength));
494
495 spin_unlock_irq(&ffs->ev.waitq.lock);
496
497 if (likely(len)) {
498 data = kmalloc(len, GFP_KERNEL);
499 if (unlikely(!data)) {
500 ret = -ENOMEM;
501 goto done_mutex;
502 }
503 }
504
505 spin_lock_irq(&ffs->ev.waitq.lock);
506
507 /* See ffs_ep0_write() */
Michal Nazarewicza7ecf052014-02-10 10:42:41 +0100508 if (ffs_setup_state_clear_cancelled(ffs) ==
509 FFS_SETUP_CANCELLED) {
Michal Nazarewiczddf8abd2010-05-05 12:53:14 +0200510 ret = -EIDRM;
511 break;
512 }
513
514 /* unlocks spinlock */
515 ret = __ffs_ep0_queue_wait(ffs, data, len);
516 if (likely(ret > 0) && unlikely(__copy_to_user(buf, data, len)))
517 ret = -EFAULT;
518 goto done_mutex;
519
520 default:
521 ret = -EBADFD;
522 break;
523 }
524
525 spin_unlock_irq(&ffs->ev.waitq.lock);
526done_mutex:
527 mutex_unlock(&ffs->mutex);
528 kfree(data);
529 return ret;
530}
531
Michal Nazarewiczddf8abd2010-05-05 12:53:14 +0200532static int ffs_ep0_open(struct inode *inode, struct file *file)
533{
534 struct ffs_data *ffs = inode->i_private;
535
536 ENTER();
537
538 if (unlikely(ffs->state == FFS_CLOSING))
539 return -EBUSY;
540
541 file->private_data = ffs;
542 ffs_data_opened(ffs);
543
544 return 0;
545}
546
Michal Nazarewiczddf8abd2010-05-05 12:53:14 +0200547static int ffs_ep0_release(struct inode *inode, struct file *file)
548{
549 struct ffs_data *ffs = file->private_data;
550
551 ENTER();
552
553 ffs_data_closed(ffs);
554
555 return 0;
556}
557
Michal Nazarewiczddf8abd2010-05-05 12:53:14 +0200558static long ffs_ep0_ioctl(struct file *file, unsigned code, unsigned long value)
559{
560 struct ffs_data *ffs = file->private_data;
561 struct usb_gadget *gadget = ffs->gadget;
562 long ret;
563
564 ENTER();
565
566 if (code == FUNCTIONFS_INTERFACE_REVMAP) {
567 struct ffs_function *func = ffs->func;
568 ret = func ? ffs_func_revmap_intf(func, value) : -ENODEV;
Andrzej Pietrasiewicz92b0abf2012-03-28 09:30:50 +0200569 } else if (gadget && gadget->ops->ioctl) {
Michal Nazarewiczddf8abd2010-05-05 12:53:14 +0200570 ret = gadget->ops->ioctl(gadget, code, value);
Michal Nazarewiczddf8abd2010-05-05 12:53:14 +0200571 } else {
572 ret = -ENOTTY;
573 }
574
575 return ret;
576}
577
Robert Baldyga23de91e2014-02-10 10:42:43 +0100578static unsigned int ffs_ep0_poll(struct file *file, poll_table *wait)
579{
580 struct ffs_data *ffs = file->private_data;
581 unsigned int mask = POLLWRNORM;
582 int ret;
583
584 poll_wait(file, &ffs->ev.waitq, wait);
585
586 ret = ffs_mutex_lock(&ffs->mutex, file->f_flags & O_NONBLOCK);
587 if (unlikely(ret < 0))
588 return mask;
589
590 switch (ffs->state) {
591 case FFS_READ_DESCRIPTORS:
592 case FFS_READ_STRINGS:
593 mask |= POLLOUT;
594 break;
595
596 case FFS_ACTIVE:
597 switch (ffs->setup_state) {
598 case FFS_NO_SETUP:
599 if (ffs->ev.count)
600 mask |= POLLIN;
601 break;
602
603 case FFS_SETUP_PENDING:
604 case FFS_SETUP_CANCELLED:
605 mask |= (POLLIN | POLLOUT);
606 break;
607 }
608 case FFS_CLOSING:
609 break;
Robert Baldyga18d6b32f2014-12-18 09:55:10 +0100610 case FFS_DEACTIVATED:
611 break;
Robert Baldyga23de91e2014-02-10 10:42:43 +0100612 }
613
614 mutex_unlock(&ffs->mutex);
615
616 return mask;
617}
618
Michal Nazarewiczddf8abd2010-05-05 12:53:14 +0200619static const struct file_operations ffs_ep0_operations = {
Michal Nazarewiczddf8abd2010-05-05 12:53:14 +0200620 .llseek = no_llseek,
621
622 .open = ffs_ep0_open,
623 .write = ffs_ep0_write,
624 .read = ffs_ep0_read,
625 .release = ffs_ep0_release,
626 .unlocked_ioctl = ffs_ep0_ioctl,
Robert Baldyga23de91e2014-02-10 10:42:43 +0100627 .poll = ffs_ep0_poll,
Michal Nazarewiczddf8abd2010-05-05 12:53:14 +0200628};
629
630
631/* "Normal" endpoints operations ********************************************/
632
Michal Nazarewiczddf8abd2010-05-05 12:53:14 +0200633static void ffs_epfile_io_complete(struct usb_ep *_ep, struct usb_request *req)
634{
635 ENTER();
636 if (likely(req->context)) {
637 struct ffs_ep *ep = _ep->driver_data;
638 ep->status = req->status ? req->status : req->actual;
639 complete(req->context);
640 }
641}
642
Robert Baldyga2e4c7552014-02-10 10:42:44 +0100643static void ffs_user_copy_worker(struct work_struct *work)
644{
645 struct ffs_io_data *io_data = container_of(work, struct ffs_io_data,
646 work);
647 int ret = io_data->req->status ? io_data->req->status :
648 io_data->req->actual;
649
650 if (io_data->read && ret > 0) {
Robert Baldyga2e4c7552014-02-10 10:42:44 +0100651 use_mm(io_data->mm);
Al Viroc993c392015-01-31 23:23:35 -0500652 ret = copy_to_iter(io_data->buf, ret, &io_data->data);
653 if (iov_iter_count(&io_data->data))
654 ret = -EFAULT;
Robert Baldyga2e4c7552014-02-10 10:42:44 +0100655 unuse_mm(io_data->mm);
656 }
657
Christoph Hellwig04b2fa92015-02-02 14:49:06 +0100658 io_data->kiocb->ki_complete(io_data->kiocb, ret, ret);
Robert Baldyga2e4c7552014-02-10 10:42:44 +0100659
Christoph Hellwig04b2fa92015-02-02 14:49:06 +0100660 if (io_data->ffs->ffs_eventfd &&
661 !(io_data->kiocb->ki_flags & IOCB_EVENTFD))
Robert Baldyga5e33f6f2015-01-23 13:41:01 +0100662 eventfd_signal(io_data->ffs->ffs_eventfd, 1);
663
Robert Baldyga2e4c7552014-02-10 10:42:44 +0100664 usb_ep_free_request(io_data->ep, io_data->req);
665
666 io_data->kiocb->private = NULL;
667 if (io_data->read)
Al Viroc993c392015-01-31 23:23:35 -0500668 kfree(io_data->to_free);
Robert Baldyga2e4c7552014-02-10 10:42:44 +0100669 kfree(io_data->buf);
670 kfree(io_data);
671}
672
673static void ffs_epfile_async_io_complete(struct usb_ep *_ep,
674 struct usb_request *req)
675{
676 struct ffs_io_data *io_data = req->context;
677
678 ENTER();
679
680 INIT_WORK(&io_data->work, ffs_user_copy_worker);
681 schedule_work(&io_data->work);
682}
683
684static ssize_t ffs_epfile_io(struct file *file, struct ffs_io_data *io_data)
Michal Nazarewiczddf8abd2010-05-05 12:53:14 +0200685{
686 struct ffs_epfile *epfile = file->private_data;
687 struct ffs_ep *ep;
688 char *data = NULL;
David Cohenc0d31b32014-10-13 11:15:54 -0700689 ssize_t ret, data_len = -EINVAL;
Michal Nazarewiczddf8abd2010-05-05 12:53:14 +0200690 int halt;
691
Michal Nazarewicz7fa68032013-12-09 15:55:36 -0800692 /* Are we still active? */
693 if (WARN_ON(epfile->ffs->state != FFS_ACTIVE)) {
694 ret = -ENODEV;
695 goto error;
696 }
697
698 /* Wait for endpoint to be enabled */
699 ep = epfile->ep;
700 if (!ep) {
701 if (file->f_flags & O_NONBLOCK) {
702 ret = -EAGAIN;
703 goto error;
704 }
705
706 ret = wait_event_interruptible(epfile->wait, (ep = epfile->ep));
707 if (ret) {
708 ret = -EINTR;
709 goto error;
710 }
711 }
712
713 /* Do we halt? */
Robert Baldyga2e4c7552014-02-10 10:42:44 +0100714 halt = (!io_data->read == !epfile->in);
Michal Nazarewicz7fa68032013-12-09 15:55:36 -0800715 if (halt && epfile->isoc) {
716 ret = -EINVAL;
717 goto error;
718 }
719
720 /* Allocate & copy */
721 if (!halt) {
Michal Nazarewicz219580e2013-12-09 15:55:37 -0800722 /*
Andrzej Pietrasiewiczf0f42202014-01-20 08:33:50 +0100723 * if we _do_ wait above, the epfile->ffs->gadget might be NULL
724 * before the waiting completes, so do not assign to 'gadget' earlier
725 */
726 struct usb_gadget *gadget = epfile->ffs->gadget;
Al Viroc993c392015-01-31 23:23:35 -0500727 size_t copied;
Andrzej Pietrasiewiczf0f42202014-01-20 08:33:50 +0100728
Chao Bi97839ca2014-04-14 11:19:53 +0800729 spin_lock_irq(&epfile->ffs->eps_lock);
730 /* In the meantime, endpoint got disabled or changed. */
731 if (epfile->ep != ep) {
732 spin_unlock_irq(&epfile->ffs->eps_lock);
733 return -ESHUTDOWN;
734 }
Al Viroc993c392015-01-31 23:23:35 -0500735 data_len = iov_iter_count(&io_data->data);
Andrzej Pietrasiewiczf0f42202014-01-20 08:33:50 +0100736 /*
Michal Nazarewicz219580e2013-12-09 15:55:37 -0800737 * Controller may require buffer size to be aligned to
738 * maxpacketsize of an out endpoint.
739 */
Al Viroc993c392015-01-31 23:23:35 -0500740 if (io_data->read)
741 data_len = usb_ep_align_maybe(gadget, ep->ep, data_len);
Chao Bi97839ca2014-04-14 11:19:53 +0800742 spin_unlock_irq(&epfile->ffs->eps_lock);
Michal Nazarewicz219580e2013-12-09 15:55:37 -0800743
744 data = kmalloc(data_len, GFP_KERNEL);
Michal Nazarewicz7fa68032013-12-09 15:55:36 -0800745 if (unlikely(!data))
746 return -ENOMEM;
Al Viroc993c392015-01-31 23:23:35 -0500747 if (!io_data->read) {
748 copied = copy_from_iter(data, data_len, &io_data->data);
749 if (copied != data_len) {
Robert Baldyga2e4c7552014-02-10 10:42:44 +0100750 ret = -EFAULT;
751 goto error;
752 }
Michal Nazarewicz7fa68032013-12-09 15:55:36 -0800753 }
754 }
755
756 /* We will be using request */
757 ret = ffs_mutex_lock(&epfile->mutex, file->f_flags & O_NONBLOCK);
758 if (unlikely(ret))
759 goto error;
760
761 spin_lock_irq(&epfile->ffs->eps_lock);
762
763 if (epfile->ep != ep) {
764 /* In the meantime, endpoint got disabled or changed. */
765 ret = -ESHUTDOWN;
Michal Nazarewiczddf8abd2010-05-05 12:53:14 +0200766 spin_unlock_irq(&epfile->ffs->eps_lock);
Michal Nazarewicz7fa68032013-12-09 15:55:36 -0800767 } else if (halt) {
768 /* Halt */
Michal Nazarewiczddf8abd2010-05-05 12:53:14 +0200769 if (likely(epfile->ep == ep) && !WARN_ON(!ep->ep))
770 usb_ep_set_halt(ep->ep);
771 spin_unlock_irq(&epfile->ffs->eps_lock);
772 ret = -EBADMSG;
773 } else {
774 /* Fire the request */
Robert Baldyga2e4c7552014-02-10 10:42:44 +0100775 struct usb_request *req;
Michal Nazarewiczddf8abd2010-05-05 12:53:14 +0200776
David Cohenc0d31b32014-10-13 11:15:54 -0700777 /*
778 * Sanity Check: even though data_len can't be used
779 * uninitialized at the time I write this comment, some
780 * compilers complain about this situation.
781 * In order to keep the code clean from warnings, data_len is
782 * being initialized to -EINVAL during its declaration, which
783 * means we can't rely on compiler anymore to warn no future
784 * changes won't result in data_len being used uninitialized.
785 * For such reason, we're adding this redundant sanity check
786 * here.
787 */
788 if (unlikely(data_len == -EINVAL)) {
789 WARN(1, "%s: data_len == -EINVAL\n", __func__);
790 ret = -EINVAL;
791 goto error_lock;
792 }
793
Robert Baldyga2e4c7552014-02-10 10:42:44 +0100794 if (io_data->aio) {
795 req = usb_ep_alloc_request(ep->ep, GFP_KERNEL);
796 if (unlikely(!req))
Robert Baldyga48968f82014-03-10 09:33:37 +0100797 goto error_lock;
Michal Nazarewiczddf8abd2010-05-05 12:53:14 +0200798
Robert Baldyga2e4c7552014-02-10 10:42:44 +0100799 req->buf = data;
David Cohenc0d31b32014-10-13 11:15:54 -0700800 req->length = data_len;
Michal Nazarewiczddf8abd2010-05-05 12:53:14 +0200801
Robert Baldyga2e4c7552014-02-10 10:42:44 +0100802 io_data->buf = data;
803 io_data->ep = ep->ep;
804 io_data->req = req;
Robert Baldyga5e33f6f2015-01-23 13:41:01 +0100805 io_data->ffs = epfile->ffs;
Michal Nazarewiczddf8abd2010-05-05 12:53:14 +0200806
Robert Baldyga2e4c7552014-02-10 10:42:44 +0100807 req->context = io_data;
808 req->complete = ffs_epfile_async_io_complete;
809
810 ret = usb_ep_queue(ep->ep, req, GFP_ATOMIC);
811 if (unlikely(ret)) {
812 usb_ep_free_request(ep->ep, req);
Robert Baldyga48968f82014-03-10 09:33:37 +0100813 goto error_lock;
Robert Baldyga2e4c7552014-02-10 10:42:44 +0100814 }
815 ret = -EIOCBQUEUED;
816
817 spin_unlock_irq(&epfile->ffs->eps_lock);
Michal Nazarewiczddf8abd2010-05-05 12:53:14 +0200818 } else {
Robert Baldyga2e4c7552014-02-10 10:42:44 +0100819 DECLARE_COMPLETION_ONSTACK(done);
820
821 req = ep->req;
822 req->buf = data;
David Cohenc0d31b32014-10-13 11:15:54 -0700823 req->length = data_len;
Robert Baldyga2e4c7552014-02-10 10:42:44 +0100824
825 req->context = &done;
826 req->complete = ffs_epfile_io_complete;
827
828 ret = usb_ep_queue(ep->ep, req, GFP_ATOMIC);
829
830 spin_unlock_irq(&epfile->ffs->eps_lock);
831
832 if (unlikely(ret < 0)) {
833 /* nop */
834 } else if (unlikely(
835 wait_for_completion_interruptible(&done))) {
836 ret = -EINTR;
837 usb_ep_dequeue(ep->ep, req);
838 } else {
Chuansheng Liucfe919b2014-03-04 15:34:57 +0800839 /*
840 * XXX We may end up silently droping data
841 * here. Since data_len (i.e. req->length) may
842 * be bigger than len (after being rounded up
843 * to maxpacketsize), we may end up with more
844 * data then user space has space for.
845 */
846 ret = ep->status;
847 if (io_data->read && ret > 0) {
Al Viroc993c392015-01-31 23:23:35 -0500848 ret = copy_to_iter(data, ret, &io_data->data);
Rui Miguel Silva342f39a2015-05-20 14:53:33 +0100849 if (!ret)
Chuansheng Liucfe919b2014-03-04 15:34:57 +0800850 ret = -EFAULT;
851 }
Robert Baldyga2e4c7552014-02-10 10:42:44 +0100852 }
853 kfree(data);
Michal Nazarewiczddf8abd2010-05-05 12:53:14 +0200854 }
855 }
856
857 mutex_unlock(&epfile->mutex);
Robert Baldyga2e4c7552014-02-10 10:42:44 +0100858 return ret;
Robert Baldyga48968f82014-03-10 09:33:37 +0100859
860error_lock:
861 spin_unlock_irq(&epfile->ffs->eps_lock);
862 mutex_unlock(&epfile->mutex);
Michal Nazarewiczddf8abd2010-05-05 12:53:14 +0200863error:
864 kfree(data);
865 return ret;
866}
867
Michal Nazarewiczddf8abd2010-05-05 12:53:14 +0200868static int
869ffs_epfile_open(struct inode *inode, struct file *file)
870{
871 struct ffs_epfile *epfile = inode->i_private;
872
873 ENTER();
874
875 if (WARN_ON(epfile->ffs->state != FFS_ACTIVE))
876 return -ENODEV;
877
878 file->private_data = epfile;
879 ffs_data_opened(epfile->ffs);
880
881 return 0;
882}
883
Robert Baldyga2e4c7552014-02-10 10:42:44 +0100884static int ffs_aio_cancel(struct kiocb *kiocb)
885{
886 struct ffs_io_data *io_data = kiocb->private;
887 struct ffs_epfile *epfile = kiocb->ki_filp->private_data;
888 int value;
889
890 ENTER();
891
892 spin_lock_irq(&epfile->ffs->eps_lock);
893
894 if (likely(io_data && io_data->ep && io_data->req))
895 value = usb_ep_dequeue(io_data->ep, io_data->req);
896 else
897 value = -EINVAL;
898
899 spin_unlock_irq(&epfile->ffs->eps_lock);
900
901 return value;
902}
903
Al Viro70e60d92015-01-31 23:55:39 -0500904static ssize_t ffs_epfile_write_iter(struct kiocb *kiocb, struct iov_iter *from)
Robert Baldyga2e4c7552014-02-10 10:42:44 +0100905{
Al Viro70e60d92015-01-31 23:55:39 -0500906 struct ffs_io_data io_data, *p = &io_data;
Al Virode2080d2015-01-31 23:42:34 -0500907 ssize_t res;
Robert Baldyga2e4c7552014-02-10 10:42:44 +0100908
909 ENTER();
910
Al Viro70e60d92015-01-31 23:55:39 -0500911 if (!is_sync_kiocb(kiocb)) {
912 p = kmalloc(sizeof(io_data), GFP_KERNEL);
913 if (unlikely(!p))
914 return -ENOMEM;
915 p->aio = true;
916 } else {
917 p->aio = false;
918 }
Robert Baldyga2e4c7552014-02-10 10:42:44 +0100919
Al Viro70e60d92015-01-31 23:55:39 -0500920 p->read = false;
921 p->kiocb = kiocb;
922 p->data = *from;
923 p->mm = current->mm;
Robert Baldyga2e4c7552014-02-10 10:42:44 +0100924
Al Viro70e60d92015-01-31 23:55:39 -0500925 kiocb->private = p;
Robert Baldyga2e4c7552014-02-10 10:42:44 +0100926
927 kiocb_set_cancel_fn(kiocb, ffs_aio_cancel);
928
Al Viro70e60d92015-01-31 23:55:39 -0500929 res = ffs_epfile_io(kiocb->ki_filp, p);
930 if (res == -EIOCBQUEUED)
931 return res;
932 if (p->aio)
933 kfree(p);
934 else
935 *from = p->data;
Al Virode2080d2015-01-31 23:42:34 -0500936 return res;
Robert Baldyga2e4c7552014-02-10 10:42:44 +0100937}
938
Al Viro70e60d92015-01-31 23:55:39 -0500939static ssize_t ffs_epfile_read_iter(struct kiocb *kiocb, struct iov_iter *to)
Robert Baldyga2e4c7552014-02-10 10:42:44 +0100940{
Al Viro70e60d92015-01-31 23:55:39 -0500941 struct ffs_io_data io_data, *p = &io_data;
Al Virode2080d2015-01-31 23:42:34 -0500942 ssize_t res;
Robert Baldyga2e4c7552014-02-10 10:42:44 +0100943
944 ENTER();
945
Al Viro70e60d92015-01-31 23:55:39 -0500946 if (!is_sync_kiocb(kiocb)) {
947 p = kmalloc(sizeof(io_data), GFP_KERNEL);
948 if (unlikely(!p))
949 return -ENOMEM;
950 p->aio = true;
951 } else {
952 p->aio = false;
Robert Baldyga2e4c7552014-02-10 10:42:44 +0100953 }
954
Al Viro70e60d92015-01-31 23:55:39 -0500955 p->read = true;
956 p->kiocb = kiocb;
957 if (p->aio) {
958 p->to_free = dup_iter(&p->data, to, GFP_KERNEL);
959 if (!p->to_free) {
960 kfree(p);
961 return -ENOMEM;
962 }
963 } else {
964 p->data = *to;
965 p->to_free = NULL;
966 }
967 p->mm = current->mm;
Robert Baldyga2e4c7552014-02-10 10:42:44 +0100968
Al Viro70e60d92015-01-31 23:55:39 -0500969 kiocb->private = p;
Robert Baldyga2e4c7552014-02-10 10:42:44 +0100970
971 kiocb_set_cancel_fn(kiocb, ffs_aio_cancel);
972
Al Viro70e60d92015-01-31 23:55:39 -0500973 res = ffs_epfile_io(kiocb->ki_filp, p);
974 if (res == -EIOCBQUEUED)
975 return res;
976
977 if (p->aio) {
978 kfree(p->to_free);
979 kfree(p);
980 } else {
981 *to = p->data;
Al Virode2080d2015-01-31 23:42:34 -0500982 }
983 return res;
Robert Baldyga2e4c7552014-02-10 10:42:44 +0100984}
985
Michal Nazarewiczddf8abd2010-05-05 12:53:14 +0200986static int
987ffs_epfile_release(struct inode *inode, struct file *file)
988{
989 struct ffs_epfile *epfile = inode->i_private;
990
991 ENTER();
992
993 ffs_data_closed(epfile->ffs);
994
995 return 0;
996}
997
Michal Nazarewiczddf8abd2010-05-05 12:53:14 +0200998static long ffs_epfile_ioctl(struct file *file, unsigned code,
999 unsigned long value)
1000{
1001 struct ffs_epfile *epfile = file->private_data;
1002 int ret;
1003
1004 ENTER();
1005
1006 if (WARN_ON(epfile->ffs->state != FFS_ACTIVE))
1007 return -ENODEV;
1008
1009 spin_lock_irq(&epfile->ffs->eps_lock);
1010 if (likely(epfile->ep)) {
1011 switch (code) {
1012 case FUNCTIONFS_FIFO_STATUS:
1013 ret = usb_ep_fifo_status(epfile->ep->ep);
1014 break;
1015 case FUNCTIONFS_FIFO_FLUSH:
1016 usb_ep_fifo_flush(epfile->ep->ep);
1017 ret = 0;
1018 break;
1019 case FUNCTIONFS_CLEAR_HALT:
1020 ret = usb_ep_clear_halt(epfile->ep->ep);
1021 break;
1022 case FUNCTIONFS_ENDPOINT_REVMAP:
1023 ret = epfile->ep->num;
1024 break;
Robert Baldygac559a352014-09-09 08:23:16 +02001025 case FUNCTIONFS_ENDPOINT_DESC:
1026 {
1027 int desc_idx;
1028 struct usb_endpoint_descriptor *desc;
1029
1030 switch (epfile->ffs->gadget->speed) {
1031 case USB_SPEED_SUPER:
1032 desc_idx = 2;
1033 break;
1034 case USB_SPEED_HIGH:
1035 desc_idx = 1;
1036 break;
1037 default:
1038 desc_idx = 0;
1039 }
1040 desc = epfile->ep->descs[desc_idx];
1041
1042 spin_unlock_irq(&epfile->ffs->eps_lock);
1043 ret = copy_to_user((void *)value, desc, sizeof(*desc));
1044 if (ret)
1045 ret = -EFAULT;
1046 return ret;
1047 }
Michal Nazarewiczddf8abd2010-05-05 12:53:14 +02001048 default:
1049 ret = -ENOTTY;
1050 }
1051 } else {
1052 ret = -ENODEV;
1053 }
1054 spin_unlock_irq(&epfile->ffs->eps_lock);
1055
1056 return ret;
1057}
1058
Michal Nazarewiczddf8abd2010-05-05 12:53:14 +02001059static const struct file_operations ffs_epfile_operations = {
Michal Nazarewiczddf8abd2010-05-05 12:53:14 +02001060 .llseek = no_llseek,
1061
1062 .open = ffs_epfile_open,
Al Viro70e60d92015-01-31 23:55:39 -05001063 .write_iter = ffs_epfile_write_iter,
1064 .read_iter = ffs_epfile_read_iter,
Michal Nazarewiczddf8abd2010-05-05 12:53:14 +02001065 .release = ffs_epfile_release,
1066 .unlocked_ioctl = ffs_epfile_ioctl,
1067};
1068
1069
Michal Nazarewiczddf8abd2010-05-05 12:53:14 +02001070/* File system and super block operations ***********************************/
1071
1072/*
Michal Nazarewicz5ab54cf2010-11-12 14:29:28 +01001073 * Mounting the file system creates a controller file, used first for
Michal Nazarewiczddf8abd2010-05-05 12:53:14 +02001074 * function configuration then later for event monitoring.
1075 */
1076
Michal Nazarewiczddf8abd2010-05-05 12:53:14 +02001077static struct inode *__must_check
1078ffs_sb_make_inode(struct super_block *sb, void *data,
1079 const struct file_operations *fops,
1080 const struct inode_operations *iops,
1081 struct ffs_file_perms *perms)
1082{
1083 struct inode *inode;
1084
1085 ENTER();
1086
1087 inode = new_inode(sb);
1088
1089 if (likely(inode)) {
1090 struct timespec current_time = CURRENT_TIME;
1091
Al Viro12ba8d12010-10-27 04:19:36 +01001092 inode->i_ino = get_next_ino();
Michal Nazarewiczddf8abd2010-05-05 12:53:14 +02001093 inode->i_mode = perms->mode;
1094 inode->i_uid = perms->uid;
1095 inode->i_gid = perms->gid;
1096 inode->i_atime = current_time;
1097 inode->i_mtime = current_time;
1098 inode->i_ctime = current_time;
1099 inode->i_private = data;
1100 if (fops)
1101 inode->i_fop = fops;
1102 if (iops)
1103 inode->i_op = iops;
1104 }
1105
1106 return inode;
1107}
1108
Michal Nazarewiczddf8abd2010-05-05 12:53:14 +02001109/* Create "regular" file */
Al Viro1bb27ca2014-09-03 13:32:19 -04001110static struct dentry *ffs_sb_create_file(struct super_block *sb,
Michal Nazarewiczddf8abd2010-05-05 12:53:14 +02001111 const char *name, void *data,
Al Viro1bb27ca2014-09-03 13:32:19 -04001112 const struct file_operations *fops)
Michal Nazarewiczddf8abd2010-05-05 12:53:14 +02001113{
1114 struct ffs_data *ffs = sb->s_fs_info;
1115 struct dentry *dentry;
1116 struct inode *inode;
1117
1118 ENTER();
1119
1120 dentry = d_alloc_name(sb->s_root, name);
1121 if (unlikely(!dentry))
1122 return NULL;
1123
1124 inode = ffs_sb_make_inode(sb, data, fops, NULL, &ffs->file_perms);
1125 if (unlikely(!inode)) {
1126 dput(dentry);
1127 return NULL;
1128 }
1129
1130 d_add(dentry, inode);
Al Viro1bb27ca2014-09-03 13:32:19 -04001131 return dentry;
Michal Nazarewiczddf8abd2010-05-05 12:53:14 +02001132}
1133
Michal Nazarewiczddf8abd2010-05-05 12:53:14 +02001134/* Super block */
Michal Nazarewiczddf8abd2010-05-05 12:53:14 +02001135static const struct super_operations ffs_sb_operations = {
1136 .statfs = simple_statfs,
1137 .drop_inode = generic_delete_inode,
1138};
1139
1140struct ffs_sb_fill_data {
1141 struct ffs_file_perms perms;
1142 umode_t root_mode;
1143 const char *dev_name;
Robert Baldyga18d6b32f2014-12-18 09:55:10 +01001144 bool no_disconnect;
Al Viro2606b282013-09-20 17:14:21 +01001145 struct ffs_data *ffs_data;
Michal Nazarewiczddf8abd2010-05-05 12:53:14 +02001146};
1147
1148static int ffs_sb_fill(struct super_block *sb, void *_data, int silent)
1149{
1150 struct ffs_sb_fill_data *data = _data;
1151 struct inode *inode;
Al Viro2606b282013-09-20 17:14:21 +01001152 struct ffs_data *ffs = data->ffs_data;
Michal Nazarewiczddf8abd2010-05-05 12:53:14 +02001153
1154 ENTER();
1155
Michal Nazarewiczddf8abd2010-05-05 12:53:14 +02001156 ffs->sb = sb;
Al Viro2606b282013-09-20 17:14:21 +01001157 data->ffs_data = NULL;
Michal Nazarewiczddf8abd2010-05-05 12:53:14 +02001158 sb->s_fs_info = ffs;
1159 sb->s_blocksize = PAGE_CACHE_SIZE;
1160 sb->s_blocksize_bits = PAGE_CACHE_SHIFT;
1161 sb->s_magic = FUNCTIONFS_MAGIC;
1162 sb->s_op = &ffs_sb_operations;
1163 sb->s_time_gran = 1;
1164
1165 /* Root inode */
1166 data->perms.mode = data->root_mode;
1167 inode = ffs_sb_make_inode(sb, NULL,
1168 &simple_dir_operations,
1169 &simple_dir_inode_operations,
1170 &data->perms);
Al Viro48fde702012-01-08 22:15:13 -05001171 sb->s_root = d_make_root(inode);
1172 if (unlikely(!sb->s_root))
Al Viro2606b282013-09-20 17:14:21 +01001173 return -ENOMEM;
Michal Nazarewiczddf8abd2010-05-05 12:53:14 +02001174
1175 /* EP0 file */
1176 if (unlikely(!ffs_sb_create_file(sb, "ep0", ffs,
Al Viro1bb27ca2014-09-03 13:32:19 -04001177 &ffs_ep0_operations)))
Al Viro2606b282013-09-20 17:14:21 +01001178 return -ENOMEM;
Michal Nazarewiczddf8abd2010-05-05 12:53:14 +02001179
1180 return 0;
Michal Nazarewiczddf8abd2010-05-05 12:53:14 +02001181}
1182
Michal Nazarewiczddf8abd2010-05-05 12:53:14 +02001183static int ffs_fs_parse_opts(struct ffs_sb_fill_data *data, char *opts)
1184{
1185 ENTER();
1186
1187 if (!opts || !*opts)
1188 return 0;
1189
1190 for (;;) {
Michal Nazarewiczddf8abd2010-05-05 12:53:14 +02001191 unsigned long value;
Michal Nazarewiczafd2e182013-01-09 10:17:47 +01001192 char *eq, *comma;
Michal Nazarewiczddf8abd2010-05-05 12:53:14 +02001193
1194 /* Option limit */
1195 comma = strchr(opts, ',');
1196 if (comma)
1197 *comma = 0;
1198
1199 /* Value limit */
1200 eq = strchr(opts, '=');
1201 if (unlikely(!eq)) {
Michal Nazarewiczaa02f172010-11-17 17:09:47 +01001202 pr_err("'=' missing in %s\n", opts);
Michal Nazarewiczddf8abd2010-05-05 12:53:14 +02001203 return -EINVAL;
1204 }
1205 *eq = 0;
1206
1207 /* Parse value */
Michal Nazarewiczafd2e182013-01-09 10:17:47 +01001208 if (kstrtoul(eq + 1, 0, &value)) {
Michal Nazarewiczaa02f172010-11-17 17:09:47 +01001209 pr_err("%s: invalid value: %s\n", opts, eq + 1);
Michal Nazarewiczddf8abd2010-05-05 12:53:14 +02001210 return -EINVAL;
1211 }
1212
1213 /* Interpret option */
1214 switch (eq - opts) {
Robert Baldyga18d6b32f2014-12-18 09:55:10 +01001215 case 13:
1216 if (!memcmp(opts, "no_disconnect", 13))
1217 data->no_disconnect = !!value;
1218 else
1219 goto invalid;
1220 break;
Michal Nazarewiczddf8abd2010-05-05 12:53:14 +02001221 case 5:
1222 if (!memcmp(opts, "rmode", 5))
1223 data->root_mode = (value & 0555) | S_IFDIR;
1224 else if (!memcmp(opts, "fmode", 5))
1225 data->perms.mode = (value & 0666) | S_IFREG;
1226 else
1227 goto invalid;
1228 break;
1229
1230 case 4:
1231 if (!memcmp(opts, "mode", 4)) {
1232 data->root_mode = (value & 0555) | S_IFDIR;
1233 data->perms.mode = (value & 0666) | S_IFREG;
1234 } else {
1235 goto invalid;
1236 }
1237 break;
1238
1239 case 3:
Eric W. Biedermanb9b73f72012-06-14 01:19:23 -07001240 if (!memcmp(opts, "uid", 3)) {
1241 data->perms.uid = make_kuid(current_user_ns(), value);
1242 if (!uid_valid(data->perms.uid)) {
1243 pr_err("%s: unmapped value: %lu\n", opts, value);
1244 return -EINVAL;
1245 }
Benoit Gobyb8100752013-01-08 19:57:09 -08001246 } else if (!memcmp(opts, "gid", 3)) {
Eric W. Biedermanb9b73f72012-06-14 01:19:23 -07001247 data->perms.gid = make_kgid(current_user_ns(), value);
1248 if (!gid_valid(data->perms.gid)) {
1249 pr_err("%s: unmapped value: %lu\n", opts, value);
1250 return -EINVAL;
1251 }
Benoit Gobyb8100752013-01-08 19:57:09 -08001252 } else {
Michal Nazarewiczddf8abd2010-05-05 12:53:14 +02001253 goto invalid;
Benoit Gobyb8100752013-01-08 19:57:09 -08001254 }
Michal Nazarewiczddf8abd2010-05-05 12:53:14 +02001255 break;
1256
1257 default:
1258invalid:
Michal Nazarewiczaa02f172010-11-17 17:09:47 +01001259 pr_err("%s: invalid option\n", opts);
Michal Nazarewiczddf8abd2010-05-05 12:53:14 +02001260 return -EINVAL;
1261 }
1262
1263 /* Next iteration */
1264 if (!comma)
1265 break;
1266 opts = comma + 1;
1267 }
1268
1269 return 0;
1270}
1271
Michal Nazarewiczddf8abd2010-05-05 12:53:14 +02001272/* "mount -t functionfs dev_name /dev/function" ends up here */
1273
Al Virofc14f2f2010-07-25 01:48:30 +04001274static struct dentry *
1275ffs_fs_mount(struct file_system_type *t, int flags,
1276 const char *dev_name, void *opts)
Michal Nazarewiczddf8abd2010-05-05 12:53:14 +02001277{
1278 struct ffs_sb_fill_data data = {
1279 .perms = {
1280 .mode = S_IFREG | 0600,
Eric W. Biedermanb9b73f72012-06-14 01:19:23 -07001281 .uid = GLOBAL_ROOT_UID,
1282 .gid = GLOBAL_ROOT_GID,
Michal Nazarewiczddf8abd2010-05-05 12:53:14 +02001283 },
1284 .root_mode = S_IFDIR | 0500,
Robert Baldyga18d6b32f2014-12-18 09:55:10 +01001285 .no_disconnect = false,
Michal Nazarewiczddf8abd2010-05-05 12:53:14 +02001286 };
Andrzej Pietrasiewicz581791f2012-05-14 15:51:52 +02001287 struct dentry *rv;
Michal Nazarewiczddf8abd2010-05-05 12:53:14 +02001288 int ret;
Andrzej Pietrasiewicz581791f2012-05-14 15:51:52 +02001289 void *ffs_dev;
Al Viro2606b282013-09-20 17:14:21 +01001290 struct ffs_data *ffs;
Michal Nazarewiczddf8abd2010-05-05 12:53:14 +02001291
1292 ENTER();
1293
Michal Nazarewiczddf8abd2010-05-05 12:53:14 +02001294 ret = ffs_fs_parse_opts(&data, opts);
1295 if (unlikely(ret < 0))
Al Virofc14f2f2010-07-25 01:48:30 +04001296 return ERR_PTR(ret);
Michal Nazarewiczddf8abd2010-05-05 12:53:14 +02001297
Al Viro2606b282013-09-20 17:14:21 +01001298 ffs = ffs_data_new();
1299 if (unlikely(!ffs))
1300 return ERR_PTR(-ENOMEM);
1301 ffs->file_perms = data.perms;
Robert Baldyga18d6b32f2014-12-18 09:55:10 +01001302 ffs->no_disconnect = data.no_disconnect;
Al Viro2606b282013-09-20 17:14:21 +01001303
1304 ffs->dev_name = kstrdup(dev_name, GFP_KERNEL);
1305 if (unlikely(!ffs->dev_name)) {
1306 ffs_data_put(ffs);
1307 return ERR_PTR(-ENOMEM);
1308 }
1309
Andrzej Pietrasiewicz4b187fc2013-12-03 15:15:32 +01001310 ffs_dev = ffs_acquire_dev(dev_name);
Al Viro2606b282013-09-20 17:14:21 +01001311 if (IS_ERR(ffs_dev)) {
1312 ffs_data_put(ffs);
1313 return ERR_CAST(ffs_dev);
1314 }
1315 ffs->private_data = ffs_dev;
1316 data.ffs_data = ffs;
Andrzej Pietrasiewicz581791f2012-05-14 15:51:52 +02001317
Andrzej Pietrasiewicz581791f2012-05-14 15:51:52 +02001318 rv = mount_nodev(t, flags, &data, ffs_sb_fill);
Al Viro2606b282013-09-20 17:14:21 +01001319 if (IS_ERR(rv) && data.ffs_data) {
Andrzej Pietrasiewicz4b187fc2013-12-03 15:15:32 +01001320 ffs_release_dev(data.ffs_data);
Al Viro2606b282013-09-20 17:14:21 +01001321 ffs_data_put(data.ffs_data);
1322 }
Andrzej Pietrasiewicz581791f2012-05-14 15:51:52 +02001323 return rv;
Michal Nazarewiczddf8abd2010-05-05 12:53:14 +02001324}
1325
1326static void
1327ffs_fs_kill_sb(struct super_block *sb)
1328{
Michal Nazarewiczddf8abd2010-05-05 12:53:14 +02001329 ENTER();
1330
1331 kill_litter_super(sb);
Andrzej Pietrasiewicz581791f2012-05-14 15:51:52 +02001332 if (sb->s_fs_info) {
Andrzej Pietrasiewicz4b187fc2013-12-03 15:15:32 +01001333 ffs_release_dev(sb->s_fs_info);
Robert Baldyga18d6b32f2014-12-18 09:55:10 +01001334 ffs_data_closed(sb->s_fs_info);
Al Viro5b5f9562012-01-08 15:38:27 -05001335 ffs_data_put(sb->s_fs_info);
Andrzej Pietrasiewicz581791f2012-05-14 15:51:52 +02001336 }
Michal Nazarewiczddf8abd2010-05-05 12:53:14 +02001337}
1338
1339static struct file_system_type ffs_fs_type = {
1340 .owner = THIS_MODULE,
1341 .name = "functionfs",
Al Virofc14f2f2010-07-25 01:48:30 +04001342 .mount = ffs_fs_mount,
Michal Nazarewiczddf8abd2010-05-05 12:53:14 +02001343 .kill_sb = ffs_fs_kill_sb,
1344};
Eric W. Biederman7f78e032013-03-02 19:39:14 -08001345MODULE_ALIAS_FS("functionfs");
Michal Nazarewiczddf8abd2010-05-05 12:53:14 +02001346
1347
Michal Nazarewiczddf8abd2010-05-05 12:53:14 +02001348/* Driver's main init/cleanup functions *************************************/
1349
Michal Nazarewiczddf8abd2010-05-05 12:53:14 +02001350static int functionfs_init(void)
1351{
1352 int ret;
1353
1354 ENTER();
1355
1356 ret = register_filesystem(&ffs_fs_type);
1357 if (likely(!ret))
Michal Nazarewiczaa02f172010-11-17 17:09:47 +01001358 pr_info("file system registered\n");
Michal Nazarewiczddf8abd2010-05-05 12:53:14 +02001359 else
Michal Nazarewiczaa02f172010-11-17 17:09:47 +01001360 pr_err("failed registering file system (%d)\n", ret);
Michal Nazarewiczddf8abd2010-05-05 12:53:14 +02001361
1362 return ret;
1363}
1364
1365static void functionfs_cleanup(void)
1366{
1367 ENTER();
1368
Michal Nazarewiczaa02f172010-11-17 17:09:47 +01001369 pr_info("unloading\n");
Michal Nazarewiczddf8abd2010-05-05 12:53:14 +02001370 unregister_filesystem(&ffs_fs_type);
1371}
1372
1373
Michal Nazarewiczddf8abd2010-05-05 12:53:14 +02001374/* ffs_data and ffs_function construction and destruction code **************/
1375
1376static void ffs_data_clear(struct ffs_data *ffs);
1377static void ffs_data_reset(struct ffs_data *ffs);
1378
Michal Nazarewiczddf8abd2010-05-05 12:53:14 +02001379static void ffs_data_get(struct ffs_data *ffs)
1380{
1381 ENTER();
1382
1383 atomic_inc(&ffs->ref);
1384}
1385
1386static void ffs_data_opened(struct ffs_data *ffs)
1387{
1388 ENTER();
1389
1390 atomic_inc(&ffs->ref);
Robert Baldyga18d6b32f2014-12-18 09:55:10 +01001391 if (atomic_add_return(1, &ffs->opened) == 1 &&
1392 ffs->state == FFS_DEACTIVATED) {
1393 ffs->state = FFS_CLOSING;
1394 ffs_data_reset(ffs);
1395 }
Michal Nazarewiczddf8abd2010-05-05 12:53:14 +02001396}
1397
1398static void ffs_data_put(struct ffs_data *ffs)
1399{
1400 ENTER();
1401
1402 if (unlikely(atomic_dec_and_test(&ffs->ref))) {
Michal Nazarewiczaa02f172010-11-17 17:09:47 +01001403 pr_info("%s(): freeing\n", __func__);
Michal Nazarewiczddf8abd2010-05-05 12:53:14 +02001404 ffs_data_clear(ffs);
Andi Kleen647d5582012-03-16 12:01:02 -07001405 BUG_ON(waitqueue_active(&ffs->ev.waitq) ||
Michal Nazarewiczddf8abd2010-05-05 12:53:14 +02001406 waitqueue_active(&ffs->ep0req_completion.wait));
Andrzej Pietrasiewicz581791f2012-05-14 15:51:52 +02001407 kfree(ffs->dev_name);
Michal Nazarewiczddf8abd2010-05-05 12:53:14 +02001408 kfree(ffs);
1409 }
1410}
1411
Michal Nazarewiczddf8abd2010-05-05 12:53:14 +02001412static void ffs_data_closed(struct ffs_data *ffs)
1413{
1414 ENTER();
1415
1416 if (atomic_dec_and_test(&ffs->opened)) {
Robert Baldyga18d6b32f2014-12-18 09:55:10 +01001417 if (ffs->no_disconnect) {
1418 ffs->state = FFS_DEACTIVATED;
1419 if (ffs->epfiles) {
1420 ffs_epfiles_destroy(ffs->epfiles,
1421 ffs->eps_count);
1422 ffs->epfiles = NULL;
1423 }
1424 if (ffs->setup_state == FFS_SETUP_PENDING)
1425 __ffs_ep0_stall(ffs);
1426 } else {
1427 ffs->state = FFS_CLOSING;
1428 ffs_data_reset(ffs);
1429 }
1430 }
1431 if (atomic_read(&ffs->opened) < 0) {
Michal Nazarewiczddf8abd2010-05-05 12:53:14 +02001432 ffs->state = FFS_CLOSING;
1433 ffs_data_reset(ffs);
1434 }
1435
1436 ffs_data_put(ffs);
1437}
1438
Michal Nazarewiczddf8abd2010-05-05 12:53:14 +02001439static struct ffs_data *ffs_data_new(void)
1440{
1441 struct ffs_data *ffs = kzalloc(sizeof *ffs, GFP_KERNEL);
1442 if (unlikely(!ffs))
Felipe Balbif8800d42013-12-12 12:15:43 -06001443 return NULL;
Michal Nazarewiczddf8abd2010-05-05 12:53:14 +02001444
1445 ENTER();
1446
1447 atomic_set(&ffs->ref, 1);
1448 atomic_set(&ffs->opened, 0);
1449 ffs->state = FFS_READ_DESCRIPTORS;
1450 mutex_init(&ffs->mutex);
1451 spin_lock_init(&ffs->eps_lock);
1452 init_waitqueue_head(&ffs->ev.waitq);
1453 init_completion(&ffs->ep0req_completion);
1454
1455 /* XXX REVISIT need to update it in some places, or do we? */
1456 ffs->ev.can_stall = 1;
1457
1458 return ffs;
1459}
1460
Michal Nazarewiczddf8abd2010-05-05 12:53:14 +02001461static void ffs_data_clear(struct ffs_data *ffs)
1462{
1463 ENTER();
1464
Krzysztof Opasiak49a79d82015-05-22 17:25:18 +02001465 ffs_closed(ffs);
Michal Nazarewiczddf8abd2010-05-05 12:53:14 +02001466
1467 BUG_ON(ffs->gadget);
1468
1469 if (ffs->epfiles)
1470 ffs_epfiles_destroy(ffs->epfiles, ffs->eps_count);
1471
Robert Baldyga5e33f6f2015-01-23 13:41:01 +01001472 if (ffs->ffs_eventfd)
1473 eventfd_ctx_put(ffs->ffs_eventfd);
1474
Michal Nazarewiczac8dde12014-02-28 16:50:23 +05301475 kfree(ffs->raw_descs_data);
Michal Nazarewiczddf8abd2010-05-05 12:53:14 +02001476 kfree(ffs->raw_strings);
1477 kfree(ffs->stringtabs);
1478}
1479
Michal Nazarewiczddf8abd2010-05-05 12:53:14 +02001480static void ffs_data_reset(struct ffs_data *ffs)
1481{
1482 ENTER();
1483
1484 ffs_data_clear(ffs);
1485
1486 ffs->epfiles = NULL;
Michal Nazarewiczac8dde12014-02-28 16:50:23 +05301487 ffs->raw_descs_data = NULL;
Michal Nazarewiczddf8abd2010-05-05 12:53:14 +02001488 ffs->raw_descs = NULL;
1489 ffs->raw_strings = NULL;
1490 ffs->stringtabs = NULL;
1491
1492 ffs->raw_descs_length = 0;
Michal Nazarewiczddf8abd2010-05-05 12:53:14 +02001493 ffs->fs_descs_count = 0;
1494 ffs->hs_descs_count = 0;
Manu Gautam8d4e8972014-02-28 16:50:22 +05301495 ffs->ss_descs_count = 0;
Michal Nazarewiczddf8abd2010-05-05 12:53:14 +02001496
1497 ffs->strings_count = 0;
1498 ffs->interfaces_count = 0;
1499 ffs->eps_count = 0;
1500
1501 ffs->ev.count = 0;
1502
1503 ffs->state = FFS_READ_DESCRIPTORS;
1504 ffs->setup_state = FFS_NO_SETUP;
1505 ffs->flags = 0;
1506}
1507
1508
1509static int functionfs_bind(struct ffs_data *ffs, struct usb_composite_dev *cdev)
1510{
Michal Nazarewiczfd7c9a02010-06-16 12:08:00 +02001511 struct usb_gadget_strings **lang;
1512 int first_id;
Michal Nazarewiczddf8abd2010-05-05 12:53:14 +02001513
1514 ENTER();
1515
1516 if (WARN_ON(ffs->state != FFS_ACTIVE
1517 || test_and_set_bit(FFS_FL_BOUND, &ffs->flags)))
1518 return -EBADFD;
1519
Michal Nazarewiczfd7c9a02010-06-16 12:08:00 +02001520 first_id = usb_string_ids_n(cdev, ffs->strings_count);
1521 if (unlikely(first_id < 0))
1522 return first_id;
Michal Nazarewiczddf8abd2010-05-05 12:53:14 +02001523
1524 ffs->ep0req = usb_ep_alloc_request(cdev->gadget->ep0, GFP_KERNEL);
1525 if (unlikely(!ffs->ep0req))
1526 return -ENOMEM;
1527 ffs->ep0req->complete = ffs_ep0_complete;
1528 ffs->ep0req->context = ffs;
1529
Michal Nazarewiczfd7c9a02010-06-16 12:08:00 +02001530 lang = ffs->stringtabs;
Michal Nazarewiczf0688c82014-06-17 17:47:41 +02001531 if (lang) {
1532 for (; *lang; ++lang) {
1533 struct usb_string *str = (*lang)->strings;
1534 int id = first_id;
1535 for (; str->s; ++id, ++str)
1536 str->id = id;
1537 }
Michal Nazarewiczddf8abd2010-05-05 12:53:14 +02001538 }
1539
1540 ffs->gadget = cdev->gadget;
Michal Nazarewiczfd7c9a02010-06-16 12:08:00 +02001541 ffs_data_get(ffs);
Michal Nazarewiczddf8abd2010-05-05 12:53:14 +02001542 return 0;
1543}
1544
Michal Nazarewiczddf8abd2010-05-05 12:53:14 +02001545static void functionfs_unbind(struct ffs_data *ffs)
1546{
1547 ENTER();
1548
1549 if (!WARN_ON(!ffs->gadget)) {
1550 usb_ep_free_request(ffs->gadget->ep0, ffs->ep0req);
1551 ffs->ep0req = NULL;
1552 ffs->gadget = NULL;
Andrzej Pietrasiewicze2190a92012-03-12 12:55:41 +01001553 clear_bit(FFS_FL_BOUND, &ffs->flags);
Dan Carpenterdf498992013-08-23 11:16:15 +03001554 ffs_data_put(ffs);
Michal Nazarewiczddf8abd2010-05-05 12:53:14 +02001555 }
1556}
1557
Michal Nazarewiczddf8abd2010-05-05 12:53:14 +02001558static int ffs_epfiles_create(struct ffs_data *ffs)
1559{
1560 struct ffs_epfile *epfile, *epfiles;
1561 unsigned i, count;
1562
1563 ENTER();
1564
1565 count = ffs->eps_count;
Thomas Meyer9823a522011-11-29 22:08:00 +01001566 epfiles = kcalloc(count, sizeof(*epfiles), GFP_KERNEL);
Michal Nazarewiczddf8abd2010-05-05 12:53:14 +02001567 if (!epfiles)
1568 return -ENOMEM;
1569
1570 epfile = epfiles;
1571 for (i = 1; i <= count; ++i, ++epfile) {
1572 epfile->ffs = ffs;
1573 mutex_init(&epfile->mutex);
1574 init_waitqueue_head(&epfile->wait);
Robert Baldyga1b0bf882014-09-09 08:23:17 +02001575 if (ffs->user_flags & FUNCTIONFS_VIRTUAL_ADDR)
Mario Schuknechtacba23f2015-01-26 20:40:21 +01001576 sprintf(epfile->name, "ep%02x", ffs->eps_addrmap[i]);
Robert Baldyga1b0bf882014-09-09 08:23:17 +02001577 else
Mario Schuknechtacba23f2015-01-26 20:40:21 +01001578 sprintf(epfile->name, "ep%u", i);
1579 epfile->dentry = ffs_sb_create_file(ffs->sb, epfile->name,
Al Viro1bb27ca2014-09-03 13:32:19 -04001580 epfile,
1581 &ffs_epfile_operations);
1582 if (unlikely(!epfile->dentry)) {
Michal Nazarewiczddf8abd2010-05-05 12:53:14 +02001583 ffs_epfiles_destroy(epfiles, i - 1);
1584 return -ENOMEM;
1585 }
1586 }
1587
1588 ffs->epfiles = epfiles;
1589 return 0;
1590}
1591
Michal Nazarewiczddf8abd2010-05-05 12:53:14 +02001592static void ffs_epfiles_destroy(struct ffs_epfile *epfiles, unsigned count)
1593{
1594 struct ffs_epfile *epfile = epfiles;
1595
1596 ENTER();
1597
1598 for (; count; --count, ++epfile) {
1599 BUG_ON(mutex_is_locked(&epfile->mutex) ||
1600 waitqueue_active(&epfile->wait));
1601 if (epfile->dentry) {
1602 d_delete(epfile->dentry);
1603 dput(epfile->dentry);
1604 epfile->dentry = NULL;
1605 }
1606 }
1607
1608 kfree(epfiles);
1609}
1610
Michal Nazarewiczddf8abd2010-05-05 12:53:14 +02001611static void ffs_func_eps_disable(struct ffs_function *func)
1612{
1613 struct ffs_ep *ep = func->eps;
1614 struct ffs_epfile *epfile = func->ffs->epfiles;
1615 unsigned count = func->ffs->eps_count;
1616 unsigned long flags;
1617
1618 spin_lock_irqsave(&func->ffs->eps_lock, flags);
1619 do {
1620 /* pending requests get nuked */
1621 if (likely(ep->ep))
1622 usb_ep_disable(ep->ep);
Michal Nazarewiczddf8abd2010-05-05 12:53:14 +02001623 ++ep;
Robert Baldyga18d6b32f2014-12-18 09:55:10 +01001624
1625 if (epfile) {
1626 epfile->ep = NULL;
1627 ++epfile;
1628 }
Michal Nazarewiczddf8abd2010-05-05 12:53:14 +02001629 } while (--count);
1630 spin_unlock_irqrestore(&func->ffs->eps_lock, flags);
1631}
1632
1633static int ffs_func_eps_enable(struct ffs_function *func)
1634{
1635 struct ffs_data *ffs = func->ffs;
1636 struct ffs_ep *ep = func->eps;
1637 struct ffs_epfile *epfile = ffs->epfiles;
1638 unsigned count = ffs->eps_count;
1639 unsigned long flags;
1640 int ret = 0;
1641
1642 spin_lock_irqsave(&func->ffs->eps_lock, flags);
1643 do {
1644 struct usb_endpoint_descriptor *ds;
Manu Gautam8d4e8972014-02-28 16:50:22 +05301645 int desc_idx;
1646
1647 if (ffs->gadget->speed == USB_SPEED_SUPER)
1648 desc_idx = 2;
1649 else if (ffs->gadget->speed == USB_SPEED_HIGH)
1650 desc_idx = 1;
1651 else
1652 desc_idx = 0;
1653
1654 /* fall-back to lower speed if desc missing for current speed */
1655 do {
1656 ds = ep->descs[desc_idx];
1657 } while (!ds && --desc_idx >= 0);
1658
1659 if (!ds) {
1660 ret = -EINVAL;
1661 break;
1662 }
Michal Nazarewiczddf8abd2010-05-05 12:53:14 +02001663
1664 ep->ep->driver_data = ep;
Tatyana Brokhman72c973d2011-06-28 16:33:48 +03001665 ep->ep->desc = ds;
1666 ret = usb_ep_enable(ep->ep);
Michal Nazarewiczddf8abd2010-05-05 12:53:14 +02001667 if (likely(!ret)) {
1668 epfile->ep = ep;
1669 epfile->in = usb_endpoint_dir_in(ds);
1670 epfile->isoc = usb_endpoint_xfer_isoc(ds);
1671 } else {
1672 break;
1673 }
1674
1675 wake_up(&epfile->wait);
1676
1677 ++ep;
1678 ++epfile;
1679 } while (--count);
1680 spin_unlock_irqrestore(&func->ffs->eps_lock, flags);
1681
1682 return ret;
1683}
1684
1685
1686/* Parsing and building descriptors and strings *****************************/
1687
Michal Nazarewicz5ab54cf2010-11-12 14:29:28 +01001688/*
1689 * This validates if data pointed by data is a valid USB descriptor as
Michal Nazarewiczddf8abd2010-05-05 12:53:14 +02001690 * well as record how many interfaces, endpoints and strings are
Michal Nazarewicz5ab54cf2010-11-12 14:29:28 +01001691 * required by given configuration. Returns address after the
1692 * descriptor or NULL if data is invalid.
1693 */
Michal Nazarewiczddf8abd2010-05-05 12:53:14 +02001694
1695enum ffs_entity_type {
1696 FFS_DESCRIPTOR, FFS_INTERFACE, FFS_STRING, FFS_ENDPOINT
1697};
1698
Andrzej Pietrasiewiczf0175ab2014-07-09 12:20:08 +02001699enum ffs_os_desc_type {
1700 FFS_OS_DESC, FFS_OS_DESC_EXT_COMPAT, FFS_OS_DESC_EXT_PROP
1701};
1702
Michal Nazarewiczddf8abd2010-05-05 12:53:14 +02001703typedef int (*ffs_entity_callback)(enum ffs_entity_type entity,
1704 u8 *valuep,
1705 struct usb_descriptor_header *desc,
1706 void *priv);
1707
Andrzej Pietrasiewiczf0175ab2014-07-09 12:20:08 +02001708typedef int (*ffs_os_desc_callback)(enum ffs_os_desc_type entity,
1709 struct usb_os_desc_header *h, void *data,
1710 unsigned len, void *priv);
1711
Andrzej Pietrasiewiczf96cbd12014-07-09 12:20:06 +02001712static int __must_check ffs_do_single_desc(char *data, unsigned len,
1713 ffs_entity_callback entity,
1714 void *priv)
Michal Nazarewiczddf8abd2010-05-05 12:53:14 +02001715{
1716 struct usb_descriptor_header *_ds = (void *)data;
1717 u8 length;
1718 int ret;
1719
1720 ENTER();
1721
1722 /* At least two bytes are required: length and type */
1723 if (len < 2) {
Michal Nazarewiczaa02f172010-11-17 17:09:47 +01001724 pr_vdebug("descriptor too short\n");
Michal Nazarewiczddf8abd2010-05-05 12:53:14 +02001725 return -EINVAL;
1726 }
1727
1728 /* If we have at least as many bytes as the descriptor takes? */
1729 length = _ds->bLength;
1730 if (len < length) {
Michal Nazarewiczaa02f172010-11-17 17:09:47 +01001731 pr_vdebug("descriptor longer then available data\n");
Michal Nazarewiczddf8abd2010-05-05 12:53:14 +02001732 return -EINVAL;
1733 }
1734
1735#define __entity_check_INTERFACE(val) 1
1736#define __entity_check_STRING(val) (val)
1737#define __entity_check_ENDPOINT(val) ((val) & USB_ENDPOINT_NUMBER_MASK)
1738#define __entity(type, val) do { \
Michal Nazarewiczaa02f172010-11-17 17:09:47 +01001739 pr_vdebug("entity " #type "(%02x)\n", (val)); \
Michal Nazarewiczddf8abd2010-05-05 12:53:14 +02001740 if (unlikely(!__entity_check_ ##type(val))) { \
Michal Nazarewiczaa02f172010-11-17 17:09:47 +01001741 pr_vdebug("invalid entity's value\n"); \
Michal Nazarewiczddf8abd2010-05-05 12:53:14 +02001742 return -EINVAL; \
1743 } \
1744 ret = entity(FFS_ ##type, &val, _ds, priv); \
1745 if (unlikely(ret < 0)) { \
Michal Nazarewiczaa02f172010-11-17 17:09:47 +01001746 pr_debug("entity " #type "(%02x); ret = %d\n", \
Michal Nazarewiczd8df0b62010-11-12 14:29:29 +01001747 (val), ret); \
Michal Nazarewiczddf8abd2010-05-05 12:53:14 +02001748 return ret; \
1749 } \
1750 } while (0)
1751
1752 /* Parse descriptor depending on type. */
1753 switch (_ds->bDescriptorType) {
1754 case USB_DT_DEVICE:
1755 case USB_DT_CONFIG:
1756 case USB_DT_STRING:
1757 case USB_DT_DEVICE_QUALIFIER:
1758 /* function can't have any of those */
Michal Nazarewiczaa02f172010-11-17 17:09:47 +01001759 pr_vdebug("descriptor reserved for gadget: %d\n",
Michal Nazarewicz5ab54cf2010-11-12 14:29:28 +01001760 _ds->bDescriptorType);
Michal Nazarewiczddf8abd2010-05-05 12:53:14 +02001761 return -EINVAL;
1762
1763 case USB_DT_INTERFACE: {
1764 struct usb_interface_descriptor *ds = (void *)_ds;
Michal Nazarewiczaa02f172010-11-17 17:09:47 +01001765 pr_vdebug("interface descriptor\n");
Michal Nazarewiczddf8abd2010-05-05 12:53:14 +02001766 if (length != sizeof *ds)
1767 goto inv_length;
1768
1769 __entity(INTERFACE, ds->bInterfaceNumber);
1770 if (ds->iInterface)
1771 __entity(STRING, ds->iInterface);
1772 }
1773 break;
1774
1775 case USB_DT_ENDPOINT: {
1776 struct usb_endpoint_descriptor *ds = (void *)_ds;
Michal Nazarewiczaa02f172010-11-17 17:09:47 +01001777 pr_vdebug("endpoint descriptor\n");
Michal Nazarewiczddf8abd2010-05-05 12:53:14 +02001778 if (length != USB_DT_ENDPOINT_SIZE &&
1779 length != USB_DT_ENDPOINT_AUDIO_SIZE)
1780 goto inv_length;
1781 __entity(ENDPOINT, ds->bEndpointAddress);
1782 }
1783 break;
1784
Koen Beel560f1182012-05-30 20:43:37 +02001785 case HID_DT_HID:
1786 pr_vdebug("hid descriptor\n");
1787 if (length != sizeof(struct hid_descriptor))
1788 goto inv_length;
1789 break;
1790
Michal Nazarewiczddf8abd2010-05-05 12:53:14 +02001791 case USB_DT_OTG:
1792 if (length != sizeof(struct usb_otg_descriptor))
1793 goto inv_length;
1794 break;
1795
1796 case USB_DT_INTERFACE_ASSOCIATION: {
1797 struct usb_interface_assoc_descriptor *ds = (void *)_ds;
Michal Nazarewiczaa02f172010-11-17 17:09:47 +01001798 pr_vdebug("interface association descriptor\n");
Michal Nazarewiczddf8abd2010-05-05 12:53:14 +02001799 if (length != sizeof *ds)
1800 goto inv_length;
1801 if (ds->iFunction)
1802 __entity(STRING, ds->iFunction);
1803 }
1804 break;
1805
Manu Gautam8d4e8972014-02-28 16:50:22 +05301806 case USB_DT_SS_ENDPOINT_COMP:
1807 pr_vdebug("EP SS companion descriptor\n");
1808 if (length != sizeof(struct usb_ss_ep_comp_descriptor))
1809 goto inv_length;
1810 break;
1811
Michal Nazarewiczddf8abd2010-05-05 12:53:14 +02001812 case USB_DT_OTHER_SPEED_CONFIG:
1813 case USB_DT_INTERFACE_POWER:
1814 case USB_DT_DEBUG:
1815 case USB_DT_SECURITY:
1816 case USB_DT_CS_RADIO_CONTROL:
1817 /* TODO */
Michal Nazarewiczaa02f172010-11-17 17:09:47 +01001818 pr_vdebug("unimplemented descriptor: %d\n", _ds->bDescriptorType);
Michal Nazarewiczddf8abd2010-05-05 12:53:14 +02001819 return -EINVAL;
1820
1821 default:
1822 /* We should never be here */
Michal Nazarewiczaa02f172010-11-17 17:09:47 +01001823 pr_vdebug("unknown descriptor: %d\n", _ds->bDescriptorType);
Michal Nazarewiczddf8abd2010-05-05 12:53:14 +02001824 return -EINVAL;
1825
Michal Nazarewicz5ab54cf2010-11-12 14:29:28 +01001826inv_length:
Michal Nazarewiczaa02f172010-11-17 17:09:47 +01001827 pr_vdebug("invalid length: %d (descriptor %d)\n",
Michal Nazarewiczd8df0b62010-11-12 14:29:29 +01001828 _ds->bLength, _ds->bDescriptorType);
Michal Nazarewiczddf8abd2010-05-05 12:53:14 +02001829 return -EINVAL;
1830 }
1831
1832#undef __entity
1833#undef __entity_check_DESCRIPTOR
1834#undef __entity_check_INTERFACE
1835#undef __entity_check_STRING
1836#undef __entity_check_ENDPOINT
1837
1838 return length;
1839}
1840
Michal Nazarewiczddf8abd2010-05-05 12:53:14 +02001841static int __must_check ffs_do_descs(unsigned count, char *data, unsigned len,
1842 ffs_entity_callback entity, void *priv)
1843{
1844 const unsigned _len = len;
1845 unsigned long num = 0;
1846
1847 ENTER();
1848
1849 for (;;) {
1850 int ret;
1851
1852 if (num == count)
1853 data = NULL;
1854
Michal Nazarewicz5ab54cf2010-11-12 14:29:28 +01001855 /* Record "descriptor" entity */
Michal Nazarewiczddf8abd2010-05-05 12:53:14 +02001856 ret = entity(FFS_DESCRIPTOR, (u8 *)num, (void *)data, priv);
1857 if (unlikely(ret < 0)) {
Michal Nazarewiczaa02f172010-11-17 17:09:47 +01001858 pr_debug("entity DESCRIPTOR(%02lx); ret = %d\n",
Michal Nazarewiczd8df0b62010-11-12 14:29:29 +01001859 num, ret);
Michal Nazarewiczddf8abd2010-05-05 12:53:14 +02001860 return ret;
1861 }
1862
1863 if (!data)
1864 return _len - len;
1865
Andrzej Pietrasiewiczf96cbd12014-07-09 12:20:06 +02001866 ret = ffs_do_single_desc(data, len, entity, priv);
Michal Nazarewiczddf8abd2010-05-05 12:53:14 +02001867 if (unlikely(ret < 0)) {
Michal Nazarewiczaa02f172010-11-17 17:09:47 +01001868 pr_debug("%s returns %d\n", __func__, ret);
Michal Nazarewiczddf8abd2010-05-05 12:53:14 +02001869 return ret;
1870 }
1871
1872 len -= ret;
1873 data += ret;
1874 ++num;
1875 }
1876}
1877
Michal Nazarewiczddf8abd2010-05-05 12:53:14 +02001878static int __ffs_data_do_entity(enum ffs_entity_type type,
1879 u8 *valuep, struct usb_descriptor_header *desc,
1880 void *priv)
1881{
Robert Baldyga6d5c1c72014-08-25 11:16:27 +02001882 struct ffs_desc_helper *helper = priv;
1883 struct usb_endpoint_descriptor *d;
Michal Nazarewiczddf8abd2010-05-05 12:53:14 +02001884
1885 ENTER();
1886
1887 switch (type) {
1888 case FFS_DESCRIPTOR:
1889 break;
1890
1891 case FFS_INTERFACE:
Michal Nazarewicz5ab54cf2010-11-12 14:29:28 +01001892 /*
1893 * Interfaces are indexed from zero so if we
Michal Nazarewiczddf8abd2010-05-05 12:53:14 +02001894 * encountered interface "n" then there are at least
Michal Nazarewicz5ab54cf2010-11-12 14:29:28 +01001895 * "n+1" interfaces.
1896 */
Robert Baldyga6d5c1c72014-08-25 11:16:27 +02001897 if (*valuep >= helper->interfaces_count)
1898 helper->interfaces_count = *valuep + 1;
Michal Nazarewiczddf8abd2010-05-05 12:53:14 +02001899 break;
1900
1901 case FFS_STRING:
Michal Nazarewicz5ab54cf2010-11-12 14:29:28 +01001902 /*
1903 * Strings are indexed from 1 (0 is magic ;) reserved
1904 * for languages list or some such)
1905 */
Robert Baldyga6d5c1c72014-08-25 11:16:27 +02001906 if (*valuep > helper->ffs->strings_count)
1907 helper->ffs->strings_count = *valuep;
Michal Nazarewiczddf8abd2010-05-05 12:53:14 +02001908 break;
1909
1910 case FFS_ENDPOINT:
Robert Baldyga6d5c1c72014-08-25 11:16:27 +02001911 d = (void *)desc;
1912 helper->eps_count++;
1913 if (helper->eps_count >= 15)
1914 return -EINVAL;
1915 /* Check if descriptors for any speed were already parsed */
1916 if (!helper->ffs->eps_count && !helper->ffs->interfaces_count)
1917 helper->ffs->eps_addrmap[helper->eps_count] =
1918 d->bEndpointAddress;
1919 else if (helper->ffs->eps_addrmap[helper->eps_count] !=
1920 d->bEndpointAddress)
1921 return -EINVAL;
Michal Nazarewiczddf8abd2010-05-05 12:53:14 +02001922 break;
1923 }
1924
1925 return 0;
1926}
1927
Andrzej Pietrasiewiczf0175ab2014-07-09 12:20:08 +02001928static int __ffs_do_os_desc_header(enum ffs_os_desc_type *next_type,
1929 struct usb_os_desc_header *desc)
1930{
1931 u16 bcd_version = le16_to_cpu(desc->bcdVersion);
1932 u16 w_index = le16_to_cpu(desc->wIndex);
1933
1934 if (bcd_version != 1) {
1935 pr_vdebug("unsupported os descriptors version: %d",
1936 bcd_version);
1937 return -EINVAL;
1938 }
1939 switch (w_index) {
1940 case 0x4:
1941 *next_type = FFS_OS_DESC_EXT_COMPAT;
1942 break;
1943 case 0x5:
1944 *next_type = FFS_OS_DESC_EXT_PROP;
1945 break;
1946 default:
1947 pr_vdebug("unsupported os descriptor type: %d", w_index);
1948 return -EINVAL;
1949 }
1950
1951 return sizeof(*desc);
1952}
1953
1954/*
1955 * Process all extended compatibility/extended property descriptors
1956 * of a feature descriptor
1957 */
1958static int __must_check ffs_do_single_os_desc(char *data, unsigned len,
1959 enum ffs_os_desc_type type,
1960 u16 feature_count,
1961 ffs_os_desc_callback entity,
1962 void *priv,
1963 struct usb_os_desc_header *h)
1964{
1965 int ret;
1966 const unsigned _len = len;
1967
1968 ENTER();
1969
1970 /* loop over all ext compat/ext prop descriptors */
1971 while (feature_count--) {
1972 ret = entity(type, h, data, len, priv);
1973 if (unlikely(ret < 0)) {
1974 pr_debug("bad OS descriptor, type: %d\n", type);
1975 return ret;
1976 }
1977 data += ret;
1978 len -= ret;
1979 }
1980 return _len - len;
1981}
1982
1983/* Process a number of complete Feature Descriptors (Ext Compat or Ext Prop) */
1984static int __must_check ffs_do_os_descs(unsigned count,
1985 char *data, unsigned len,
1986 ffs_os_desc_callback entity, void *priv)
1987{
1988 const unsigned _len = len;
1989 unsigned long num = 0;
1990
1991 ENTER();
1992
1993 for (num = 0; num < count; ++num) {
1994 int ret;
1995 enum ffs_os_desc_type type;
1996 u16 feature_count;
1997 struct usb_os_desc_header *desc = (void *)data;
1998
1999 if (len < sizeof(*desc))
2000 return -EINVAL;
2001
2002 /*
2003 * Record "descriptor" entity.
2004 * Process dwLength, bcdVersion, wIndex, get b/wCount.
2005 * Move the data pointer to the beginning of extended
2006 * compatibilities proper or extended properties proper
2007 * portions of the data
2008 */
2009 if (le32_to_cpu(desc->dwLength) > len)
2010 return -EINVAL;
2011
2012 ret = __ffs_do_os_desc_header(&type, desc);
2013 if (unlikely(ret < 0)) {
2014 pr_debug("entity OS_DESCRIPTOR(%02lx); ret = %d\n",
2015 num, ret);
2016 return ret;
2017 }
2018 /*
2019 * 16-bit hex "?? 00" Little Endian looks like 8-bit hex "??"
2020 */
2021 feature_count = le16_to_cpu(desc->wCount);
2022 if (type == FFS_OS_DESC_EXT_COMPAT &&
2023 (feature_count > 255 || desc->Reserved))
2024 return -EINVAL;
2025 len -= ret;
2026 data += ret;
2027
2028 /*
2029 * Process all function/property descriptors
2030 * of this Feature Descriptor
2031 */
2032 ret = ffs_do_single_os_desc(data, len, type,
2033 feature_count, entity, priv, desc);
2034 if (unlikely(ret < 0)) {
2035 pr_debug("%s returns %d\n", __func__, ret);
2036 return ret;
2037 }
2038
2039 len -= ret;
2040 data += ret;
2041 }
2042 return _len - len;
2043}
2044
2045/**
2046 * Validate contents of the buffer from userspace related to OS descriptors.
2047 */
2048static int __ffs_data_do_os_desc(enum ffs_os_desc_type type,
2049 struct usb_os_desc_header *h, void *data,
2050 unsigned len, void *priv)
2051{
2052 struct ffs_data *ffs = priv;
2053 u8 length;
2054
2055 ENTER();
2056
2057 switch (type) {
2058 case FFS_OS_DESC_EXT_COMPAT: {
2059 struct usb_ext_compat_desc *d = data;
2060 int i;
2061
2062 if (len < sizeof(*d) ||
2063 d->bFirstInterfaceNumber >= ffs->interfaces_count ||
2064 d->Reserved1)
2065 return -EINVAL;
2066 for (i = 0; i < ARRAY_SIZE(d->Reserved2); ++i)
2067 if (d->Reserved2[i])
2068 return -EINVAL;
2069
2070 length = sizeof(struct usb_ext_compat_desc);
2071 }
2072 break;
2073 case FFS_OS_DESC_EXT_PROP: {
2074 struct usb_ext_prop_desc *d = data;
2075 u32 type, pdl;
2076 u16 pnl;
2077
2078 if (len < sizeof(*d) || h->interface >= ffs->interfaces_count)
2079 return -EINVAL;
2080 length = le32_to_cpu(d->dwSize);
2081 type = le32_to_cpu(d->dwPropertyDataType);
2082 if (type < USB_EXT_PROP_UNICODE ||
2083 type > USB_EXT_PROP_UNICODE_MULTI) {
2084 pr_vdebug("unsupported os descriptor property type: %d",
2085 type);
2086 return -EINVAL;
2087 }
2088 pnl = le16_to_cpu(d->wPropertyNameLength);
2089 pdl = le32_to_cpu(*(u32 *)((u8 *)data + 10 + pnl));
2090 if (length != 14 + pnl + pdl) {
2091 pr_vdebug("invalid os descriptor length: %d pnl:%d pdl:%d (descriptor %d)\n",
2092 length, pnl, pdl, type);
2093 return -EINVAL;
2094 }
2095 ++ffs->ms_os_descs_ext_prop_count;
2096 /* property name reported to the host as "WCHAR"s */
2097 ffs->ms_os_descs_ext_prop_name_len += pnl * 2;
2098 ffs->ms_os_descs_ext_prop_data_len += pdl;
2099 }
2100 break;
2101 default:
2102 pr_vdebug("unknown descriptor: %d\n", type);
2103 return -EINVAL;
2104 }
2105 return length;
2106}
2107
Michal Nazarewiczddf8abd2010-05-05 12:53:14 +02002108static int __ffs_data_got_descs(struct ffs_data *ffs,
2109 char *const _data, size_t len)
2110{
Michal Nazarewiczac8dde12014-02-28 16:50:23 +05302111 char *data = _data, *raw_descs;
Andrzej Pietrasiewiczf0175ab2014-07-09 12:20:08 +02002112 unsigned os_descs_count = 0, counts[3], flags;
Michal Nazarewiczac8dde12014-02-28 16:50:23 +05302113 int ret = -EINVAL, i;
Robert Baldyga6d5c1c72014-08-25 11:16:27 +02002114 struct ffs_desc_helper helper;
Michal Nazarewiczddf8abd2010-05-05 12:53:14 +02002115
2116 ENTER();
2117
Michal Nazarewiczac8dde12014-02-28 16:50:23 +05302118 if (get_unaligned_le32(data + 4) != len)
Michal Nazarewiczddf8abd2010-05-05 12:53:14 +02002119 goto error;
Michal Nazarewiczddf8abd2010-05-05 12:53:14 +02002120
Michal Nazarewiczac8dde12014-02-28 16:50:23 +05302121 switch (get_unaligned_le32(data)) {
2122 case FUNCTIONFS_DESCRIPTORS_MAGIC:
2123 flags = FUNCTIONFS_HAS_FS_DESC | FUNCTIONFS_HAS_HS_DESC;
Manu Gautam8d4e8972014-02-28 16:50:22 +05302124 data += 8;
2125 len -= 8;
Michal Nazarewiczac8dde12014-02-28 16:50:23 +05302126 break;
2127 case FUNCTIONFS_DESCRIPTORS_MAGIC_V2:
2128 flags = get_unaligned_le32(data + 8);
Robert Baldyga1b0bf882014-09-09 08:23:17 +02002129 ffs->user_flags = flags;
Michal Nazarewiczac8dde12014-02-28 16:50:23 +05302130 if (flags & ~(FUNCTIONFS_HAS_FS_DESC |
2131 FUNCTIONFS_HAS_HS_DESC |
Andrzej Pietrasiewiczf0175ab2014-07-09 12:20:08 +02002132 FUNCTIONFS_HAS_SS_DESC |
Robert Baldyga1b0bf882014-09-09 08:23:17 +02002133 FUNCTIONFS_HAS_MS_OS_DESC |
Robert Baldyga5e33f6f2015-01-23 13:41:01 +01002134 FUNCTIONFS_VIRTUAL_ADDR |
2135 FUNCTIONFS_EVENTFD)) {
Michal Nazarewiczac8dde12014-02-28 16:50:23 +05302136 ret = -ENOSYS;
Michal Nazarewiczddf8abd2010-05-05 12:53:14 +02002137 goto error;
2138 }
Michal Nazarewiczac8dde12014-02-28 16:50:23 +05302139 data += 12;
2140 len -= 12;
2141 break;
2142 default:
2143 goto error;
Michal Nazarewiczddf8abd2010-05-05 12:53:14 +02002144 }
2145
Robert Baldyga5e33f6f2015-01-23 13:41:01 +01002146 if (flags & FUNCTIONFS_EVENTFD) {
2147 if (len < 4)
2148 goto error;
2149 ffs->ffs_eventfd =
2150 eventfd_ctx_fdget((int)get_unaligned_le32(data));
2151 if (IS_ERR(ffs->ffs_eventfd)) {
2152 ret = PTR_ERR(ffs->ffs_eventfd);
2153 ffs->ffs_eventfd = NULL;
2154 goto error;
2155 }
2156 data += 4;
2157 len -= 4;
2158 }
2159
Michal Nazarewiczac8dde12014-02-28 16:50:23 +05302160 /* Read fs_count, hs_count and ss_count (if present) */
2161 for (i = 0; i < 3; ++i) {
2162 if (!(flags & (1 << i))) {
2163 counts[i] = 0;
2164 } else if (len < 4) {
Michal Nazarewiczddf8abd2010-05-05 12:53:14 +02002165 goto error;
Michal Nazarewiczac8dde12014-02-28 16:50:23 +05302166 } else {
2167 counts[i] = get_unaligned_le32(data);
2168 data += 4;
2169 len -= 4;
2170 }
Michal Nazarewiczddf8abd2010-05-05 12:53:14 +02002171 }
Andrzej Pietrasiewiczf0175ab2014-07-09 12:20:08 +02002172 if (flags & (1 << i)) {
2173 os_descs_count = get_unaligned_le32(data);
2174 data += 4;
2175 len -= 4;
2176 };
Michal Nazarewiczddf8abd2010-05-05 12:53:14 +02002177
Michal Nazarewiczac8dde12014-02-28 16:50:23 +05302178 /* Read descriptors */
2179 raw_descs = data;
Robert Baldyga6d5c1c72014-08-25 11:16:27 +02002180 helper.ffs = ffs;
Michal Nazarewiczac8dde12014-02-28 16:50:23 +05302181 for (i = 0; i < 3; ++i) {
2182 if (!counts[i])
2183 continue;
Robert Baldyga6d5c1c72014-08-25 11:16:27 +02002184 helper.interfaces_count = 0;
2185 helper.eps_count = 0;
Michal Nazarewiczac8dde12014-02-28 16:50:23 +05302186 ret = ffs_do_descs(counts[i], data, len,
Robert Baldyga6d5c1c72014-08-25 11:16:27 +02002187 __ffs_data_do_entity, &helper);
Michal Nazarewiczac8dde12014-02-28 16:50:23 +05302188 if (ret < 0)
2189 goto error;
Robert Baldyga6d5c1c72014-08-25 11:16:27 +02002190 if (!ffs->eps_count && !ffs->interfaces_count) {
2191 ffs->eps_count = helper.eps_count;
2192 ffs->interfaces_count = helper.interfaces_count;
2193 } else {
2194 if (ffs->eps_count != helper.eps_count) {
2195 ret = -EINVAL;
2196 goto error;
2197 }
2198 if (ffs->interfaces_count != helper.interfaces_count) {
2199 ret = -EINVAL;
2200 goto error;
2201 }
2202 }
Michal Nazarewiczac8dde12014-02-28 16:50:23 +05302203 data += ret;
2204 len -= ret;
2205 }
Andrzej Pietrasiewiczf0175ab2014-07-09 12:20:08 +02002206 if (os_descs_count) {
2207 ret = ffs_do_os_descs(os_descs_count, data, len,
2208 __ffs_data_do_os_desc, ffs);
2209 if (ret < 0)
2210 goto error;
2211 data += ret;
2212 len -= ret;
2213 }
Michal Nazarewiczddf8abd2010-05-05 12:53:14 +02002214
Michal Nazarewiczac8dde12014-02-28 16:50:23 +05302215 if (raw_descs == data || len) {
2216 ret = -EINVAL;
2217 goto error;
2218 }
2219
2220 ffs->raw_descs_data = _data;
2221 ffs->raw_descs = raw_descs;
2222 ffs->raw_descs_length = data - raw_descs;
2223 ffs->fs_descs_count = counts[0];
2224 ffs->hs_descs_count = counts[1];
2225 ffs->ss_descs_count = counts[2];
Andrzej Pietrasiewiczf0175ab2014-07-09 12:20:08 +02002226 ffs->ms_os_descs_count = os_descs_count;
Michal Nazarewiczddf8abd2010-05-05 12:53:14 +02002227
2228 return 0;
2229
Michal Nazarewiczddf8abd2010-05-05 12:53:14 +02002230error:
2231 kfree(_data);
2232 return ret;
2233}
2234
Michal Nazarewiczddf8abd2010-05-05 12:53:14 +02002235static int __ffs_data_got_strings(struct ffs_data *ffs,
2236 char *const _data, size_t len)
2237{
2238 u32 str_count, needed_count, lang_count;
2239 struct usb_gadget_strings **stringtabs, *t;
2240 struct usb_string *strings, *s;
2241 const char *data = _data;
2242
2243 ENTER();
2244
2245 if (unlikely(get_unaligned_le32(data) != FUNCTIONFS_STRINGS_MAGIC ||
2246 get_unaligned_le32(data + 4) != len))
2247 goto error;
2248 str_count = get_unaligned_le32(data + 8);
2249 lang_count = get_unaligned_le32(data + 12);
2250
2251 /* if one is zero the other must be zero */
2252 if (unlikely(!str_count != !lang_count))
2253 goto error;
2254
2255 /* Do we have at least as many strings as descriptors need? */
2256 needed_count = ffs->strings_count;
2257 if (unlikely(str_count < needed_count))
2258 goto error;
2259
Michal Nazarewicz5ab54cf2010-11-12 14:29:28 +01002260 /*
2261 * If we don't need any strings just return and free all
2262 * memory.
2263 */
Michal Nazarewiczddf8abd2010-05-05 12:53:14 +02002264 if (!needed_count) {
2265 kfree(_data);
2266 return 0;
2267 }
2268
Michal Nazarewicz5ab54cf2010-11-12 14:29:28 +01002269 /* Allocate everything in one chunk so there's less maintenance. */
Michal Nazarewiczddf8abd2010-05-05 12:53:14 +02002270 {
Michal Nazarewiczddf8abd2010-05-05 12:53:14 +02002271 unsigned i = 0;
Andrzej Pietrasiewicze6f38622013-12-03 15:15:30 +01002272 vla_group(d);
2273 vla_item(d, struct usb_gadget_strings *, stringtabs,
2274 lang_count + 1);
2275 vla_item(d, struct usb_gadget_strings, stringtab, lang_count);
2276 vla_item(d, struct usb_string, strings,
2277 lang_count*(needed_count+1));
Michal Nazarewiczddf8abd2010-05-05 12:53:14 +02002278
Andrzej Pietrasiewicze6f38622013-12-03 15:15:30 +01002279 char *vlabuf = kmalloc(vla_group_size(d), GFP_KERNEL);
2280
2281 if (unlikely(!vlabuf)) {
Michal Nazarewiczddf8abd2010-05-05 12:53:14 +02002282 kfree(_data);
2283 return -ENOMEM;
2284 }
2285
Andrzej Pietrasiewicze6f38622013-12-03 15:15:30 +01002286 /* Initialize the VLA pointers */
2287 stringtabs = vla_ptr(vlabuf, d, stringtabs);
2288 t = vla_ptr(vlabuf, d, stringtab);
Michal Nazarewiczddf8abd2010-05-05 12:53:14 +02002289 i = lang_count;
2290 do {
2291 *stringtabs++ = t++;
2292 } while (--i);
2293 *stringtabs = NULL;
2294
Andrzej Pietrasiewicze6f38622013-12-03 15:15:30 +01002295 /* stringtabs = vlabuf = d_stringtabs for later kfree */
2296 stringtabs = vla_ptr(vlabuf, d, stringtabs);
2297 t = vla_ptr(vlabuf, d, stringtab);
2298 s = vla_ptr(vlabuf, d, strings);
Michal Nazarewiczddf8abd2010-05-05 12:53:14 +02002299 strings = s;
2300 }
2301
2302 /* For each language */
2303 data += 16;
2304 len -= 16;
2305
2306 do { /* lang_count > 0 so we can use do-while */
2307 unsigned needed = needed_count;
2308
2309 if (unlikely(len < 3))
2310 goto error_free;
2311 t->language = get_unaligned_le16(data);
2312 t->strings = s;
2313 ++t;
2314
2315 data += 2;
2316 len -= 2;
2317
2318 /* For each string */
2319 do { /* str_count > 0 so we can use do-while */
2320 size_t length = strnlen(data, len);
2321
2322 if (unlikely(length == len))
2323 goto error_free;
2324
Michal Nazarewicz5ab54cf2010-11-12 14:29:28 +01002325 /*
2326 * User may provide more strings then we need,
2327 * if that's the case we simply ignore the
2328 * rest
2329 */
Michal Nazarewiczddf8abd2010-05-05 12:53:14 +02002330 if (likely(needed)) {
Michal Nazarewicz5ab54cf2010-11-12 14:29:28 +01002331 /*
2332 * s->id will be set while adding
Michal Nazarewiczddf8abd2010-05-05 12:53:14 +02002333 * function to configuration so for
Michal Nazarewicz5ab54cf2010-11-12 14:29:28 +01002334 * now just leave garbage here.
2335 */
Michal Nazarewiczddf8abd2010-05-05 12:53:14 +02002336 s->s = data;
2337 --needed;
2338 ++s;
2339 }
2340
2341 data += length + 1;
2342 len -= length + 1;
2343 } while (--str_count);
2344
2345 s->id = 0; /* terminator */
2346 s->s = NULL;
2347 ++s;
2348
2349 } while (--lang_count);
2350
2351 /* Some garbage left? */
2352 if (unlikely(len))
2353 goto error_free;
2354
2355 /* Done! */
2356 ffs->stringtabs = stringtabs;
2357 ffs->raw_strings = _data;
2358
2359 return 0;
2360
2361error_free:
2362 kfree(stringtabs);
2363error:
2364 kfree(_data);
2365 return -EINVAL;
2366}
2367
2368
Michal Nazarewiczddf8abd2010-05-05 12:53:14 +02002369/* Events handling and management *******************************************/
2370
2371static void __ffs_event_add(struct ffs_data *ffs,
2372 enum usb_functionfs_event_type type)
2373{
2374 enum usb_functionfs_event_type rem_type1, rem_type2 = type;
2375 int neg = 0;
2376
Michal Nazarewicz5ab54cf2010-11-12 14:29:28 +01002377 /*
2378 * Abort any unhandled setup
2379 *
2380 * We do not need to worry about some cmpxchg() changing value
Michal Nazarewiczddf8abd2010-05-05 12:53:14 +02002381 * of ffs->setup_state without holding the lock because when
2382 * state is FFS_SETUP_PENDING cmpxchg() in several places in
Michal Nazarewicz5ab54cf2010-11-12 14:29:28 +01002383 * the source does nothing.
2384 */
Michal Nazarewiczddf8abd2010-05-05 12:53:14 +02002385 if (ffs->setup_state == FFS_SETUP_PENDING)
Michal Nazarewicze46318a2014-02-10 10:42:40 +01002386 ffs->setup_state = FFS_SETUP_CANCELLED;
Michal Nazarewiczddf8abd2010-05-05 12:53:14 +02002387
Michal Nazarewicz67913bb2014-09-10 17:50:24 +02002388 /*
2389 * Logic of this function guarantees that there are at most four pending
2390 * evens on ffs->ev.types queue. This is important because the queue
2391 * has space for four elements only and __ffs_ep0_read_events function
2392 * depends on that limit as well. If more event types are added, those
2393 * limits have to be revisited or guaranteed to still hold.
2394 */
Michal Nazarewiczddf8abd2010-05-05 12:53:14 +02002395 switch (type) {
2396 case FUNCTIONFS_RESUME:
2397 rem_type2 = FUNCTIONFS_SUSPEND;
Michal Nazarewicz5ab54cf2010-11-12 14:29:28 +01002398 /* FALL THROUGH */
Michal Nazarewiczddf8abd2010-05-05 12:53:14 +02002399 case FUNCTIONFS_SUSPEND:
2400 case FUNCTIONFS_SETUP:
2401 rem_type1 = type;
Michal Nazarewicz5ab54cf2010-11-12 14:29:28 +01002402 /* Discard all similar events */
Michal Nazarewiczddf8abd2010-05-05 12:53:14 +02002403 break;
2404
2405 case FUNCTIONFS_BIND:
2406 case FUNCTIONFS_UNBIND:
2407 case FUNCTIONFS_DISABLE:
2408 case FUNCTIONFS_ENABLE:
Michal Nazarewicz5ab54cf2010-11-12 14:29:28 +01002409 /* Discard everything other then power management. */
Michal Nazarewiczddf8abd2010-05-05 12:53:14 +02002410 rem_type1 = FUNCTIONFS_SUSPEND;
2411 rem_type2 = FUNCTIONFS_RESUME;
2412 neg = 1;
2413 break;
2414
2415 default:
Michal Nazarewiczfe00bcb2014-09-11 18:52:49 +02002416 WARN(1, "%d: unknown event, this should not happen\n", type);
2417 return;
Michal Nazarewiczddf8abd2010-05-05 12:53:14 +02002418 }
2419
2420 {
2421 u8 *ev = ffs->ev.types, *out = ev;
2422 unsigned n = ffs->ev.count;
2423 for (; n; --n, ++ev)
2424 if ((*ev == rem_type1 || *ev == rem_type2) == neg)
2425 *out++ = *ev;
2426 else
Michal Nazarewiczaa02f172010-11-17 17:09:47 +01002427 pr_vdebug("purging event %d\n", *ev);
Michal Nazarewiczddf8abd2010-05-05 12:53:14 +02002428 ffs->ev.count = out - ffs->ev.types;
2429 }
2430
Michal Nazarewiczaa02f172010-11-17 17:09:47 +01002431 pr_vdebug("adding event %d\n", type);
Michal Nazarewiczddf8abd2010-05-05 12:53:14 +02002432 ffs->ev.types[ffs->ev.count++] = type;
2433 wake_up_locked(&ffs->ev.waitq);
Robert Baldyga5e33f6f2015-01-23 13:41:01 +01002434 if (ffs->ffs_eventfd)
2435 eventfd_signal(ffs->ffs_eventfd, 1);
Michal Nazarewiczddf8abd2010-05-05 12:53:14 +02002436}
2437
2438static void ffs_event_add(struct ffs_data *ffs,
2439 enum usb_functionfs_event_type type)
2440{
2441 unsigned long flags;
2442 spin_lock_irqsave(&ffs->ev.waitq.lock, flags);
2443 __ffs_event_add(ffs, type);
2444 spin_unlock_irqrestore(&ffs->ev.waitq.lock, flags);
2445}
2446
Michal Nazarewiczddf8abd2010-05-05 12:53:14 +02002447/* Bind/unbind USB function hooks *******************************************/
2448
Robert Baldyga6d5c1c72014-08-25 11:16:27 +02002449static int ffs_ep_addr2idx(struct ffs_data *ffs, u8 endpoint_address)
2450{
2451 int i;
2452
2453 for (i = 1; i < ARRAY_SIZE(ffs->eps_addrmap); ++i)
2454 if (ffs->eps_addrmap[i] == endpoint_address)
2455 return i;
2456 return -ENOENT;
2457}
2458
Michal Nazarewiczddf8abd2010-05-05 12:53:14 +02002459static int __ffs_func_bind_do_descs(enum ffs_entity_type type, u8 *valuep,
2460 struct usb_descriptor_header *desc,
2461 void *priv)
2462{
2463 struct usb_endpoint_descriptor *ds = (void *)desc;
2464 struct ffs_function *func = priv;
2465 struct ffs_ep *ffs_ep;
Dan Carpenter85b06f52014-09-09 15:06:09 +03002466 unsigned ep_desc_id;
2467 int idx;
Manu Gautam8d4e8972014-02-28 16:50:22 +05302468 static const char *speed_names[] = { "full", "high", "super" };
Michal Nazarewiczddf8abd2010-05-05 12:53:14 +02002469
2470 if (type != FFS_DESCRIPTOR)
2471 return 0;
2472
Manu Gautam8d4e8972014-02-28 16:50:22 +05302473 /*
2474 * If ss_descriptors is not NULL, we are reading super speed
2475 * descriptors; if hs_descriptors is not NULL, we are reading high
2476 * speed descriptors; otherwise, we are reading full speed
2477 * descriptors.
2478 */
2479 if (func->function.ss_descriptors) {
2480 ep_desc_id = 2;
2481 func->function.ss_descriptors[(long)valuep] = desc;
2482 } else if (func->function.hs_descriptors) {
2483 ep_desc_id = 1;
Michal Nazarewiczddf8abd2010-05-05 12:53:14 +02002484 func->function.hs_descriptors[(long)valuep] = desc;
Manu Gautam8d4e8972014-02-28 16:50:22 +05302485 } else {
2486 ep_desc_id = 0;
Sebastian Andrzej Siewior10287ba2012-10-22 22:15:06 +02002487 func->function.fs_descriptors[(long)valuep] = desc;
Manu Gautam8d4e8972014-02-28 16:50:22 +05302488 }
Michal Nazarewiczddf8abd2010-05-05 12:53:14 +02002489
2490 if (!desc || desc->bDescriptorType != USB_DT_ENDPOINT)
2491 return 0;
2492
Robert Baldyga6d5c1c72014-08-25 11:16:27 +02002493 idx = ffs_ep_addr2idx(func->ffs, ds->bEndpointAddress) - 1;
2494 if (idx < 0)
2495 return idx;
2496
Michal Nazarewiczddf8abd2010-05-05 12:53:14 +02002497 ffs_ep = func->eps + idx;
2498
Manu Gautam8d4e8972014-02-28 16:50:22 +05302499 if (unlikely(ffs_ep->descs[ep_desc_id])) {
2500 pr_err("two %sspeed descriptors for EP %d\n",
2501 speed_names[ep_desc_id],
Michal Nazarewiczd8df0b62010-11-12 14:29:29 +01002502 ds->bEndpointAddress & USB_ENDPOINT_NUMBER_MASK);
Michal Nazarewiczddf8abd2010-05-05 12:53:14 +02002503 return -EINVAL;
2504 }
Manu Gautam8d4e8972014-02-28 16:50:22 +05302505 ffs_ep->descs[ep_desc_id] = ds;
Michal Nazarewiczddf8abd2010-05-05 12:53:14 +02002506
2507 ffs_dump_mem(": Original ep desc", ds, ds->bLength);
2508 if (ffs_ep->ep) {
2509 ds->bEndpointAddress = ffs_ep->descs[0]->bEndpointAddress;
2510 if (!ds->wMaxPacketSize)
2511 ds->wMaxPacketSize = ffs_ep->descs[0]->wMaxPacketSize;
2512 } else {
2513 struct usb_request *req;
2514 struct usb_ep *ep;
Robert Baldyga1b0bf882014-09-09 08:23:17 +02002515 u8 bEndpointAddress;
Michal Nazarewiczddf8abd2010-05-05 12:53:14 +02002516
Robert Baldyga1b0bf882014-09-09 08:23:17 +02002517 /*
2518 * We back up bEndpointAddress because autoconfig overwrites
2519 * it with physical endpoint address.
2520 */
2521 bEndpointAddress = ds->bEndpointAddress;
Michal Nazarewiczaa02f172010-11-17 17:09:47 +01002522 pr_vdebug("autoconfig\n");
Michal Nazarewiczddf8abd2010-05-05 12:53:14 +02002523 ep = usb_ep_autoconfig(func->gadget, ds);
2524 if (unlikely(!ep))
2525 return -ENOTSUPP;
Joe Perchescc7e6052010-11-14 19:04:49 -08002526 ep->driver_data = func->eps + idx;
Michal Nazarewiczddf8abd2010-05-05 12:53:14 +02002527
2528 req = usb_ep_alloc_request(ep, GFP_KERNEL);
2529 if (unlikely(!req))
2530 return -ENOMEM;
2531
2532 ffs_ep->ep = ep;
2533 ffs_ep->req = req;
2534 func->eps_revmap[ds->bEndpointAddress &
2535 USB_ENDPOINT_NUMBER_MASK] = idx + 1;
Robert Baldyga1b0bf882014-09-09 08:23:17 +02002536 /*
2537 * If we use virtual address mapping, we restore
2538 * original bEndpointAddress value.
2539 */
2540 if (func->ffs->user_flags & FUNCTIONFS_VIRTUAL_ADDR)
2541 ds->bEndpointAddress = bEndpointAddress;
Michal Nazarewiczddf8abd2010-05-05 12:53:14 +02002542 }
2543 ffs_dump_mem(": Rewritten ep desc", ds, ds->bLength);
2544
2545 return 0;
2546}
2547
Michal Nazarewiczddf8abd2010-05-05 12:53:14 +02002548static int __ffs_func_bind_do_nums(enum ffs_entity_type type, u8 *valuep,
2549 struct usb_descriptor_header *desc,
2550 void *priv)
2551{
2552 struct ffs_function *func = priv;
2553 unsigned idx;
2554 u8 newValue;
2555
2556 switch (type) {
2557 default:
2558 case FFS_DESCRIPTOR:
2559 /* Handled in previous pass by __ffs_func_bind_do_descs() */
2560 return 0;
2561
2562 case FFS_INTERFACE:
2563 idx = *valuep;
2564 if (func->interfaces_nums[idx] < 0) {
2565 int id = usb_interface_id(func->conf, &func->function);
2566 if (unlikely(id < 0))
2567 return id;
2568 func->interfaces_nums[idx] = id;
2569 }
2570 newValue = func->interfaces_nums[idx];
2571 break;
2572
2573 case FFS_STRING:
2574 /* String' IDs are allocated when fsf_data is bound to cdev */
2575 newValue = func->ffs->stringtabs[0]->strings[*valuep - 1].id;
2576 break;
2577
2578 case FFS_ENDPOINT:
Michal Nazarewicz5ab54cf2010-11-12 14:29:28 +01002579 /*
2580 * USB_DT_ENDPOINT are handled in
2581 * __ffs_func_bind_do_descs().
2582 */
Michal Nazarewiczddf8abd2010-05-05 12:53:14 +02002583 if (desc->bDescriptorType == USB_DT_ENDPOINT)
2584 return 0;
2585
2586 idx = (*valuep & USB_ENDPOINT_NUMBER_MASK) - 1;
2587 if (unlikely(!func->eps[idx].ep))
2588 return -EINVAL;
2589
2590 {
2591 struct usb_endpoint_descriptor **descs;
2592 descs = func->eps[idx].descs;
2593 newValue = descs[descs[0] ? 0 : 1]->bEndpointAddress;
2594 }
2595 break;
2596 }
2597
Michal Nazarewiczaa02f172010-11-17 17:09:47 +01002598 pr_vdebug("%02x -> %02x\n", *valuep, newValue);
Michal Nazarewiczddf8abd2010-05-05 12:53:14 +02002599 *valuep = newValue;
2600 return 0;
2601}
2602
Andrzej Pietrasiewiczf0175ab2014-07-09 12:20:08 +02002603static int __ffs_func_bind_do_os_desc(enum ffs_os_desc_type type,
2604 struct usb_os_desc_header *h, void *data,
2605 unsigned len, void *priv)
2606{
2607 struct ffs_function *func = priv;
2608 u8 length = 0;
2609
2610 switch (type) {
2611 case FFS_OS_DESC_EXT_COMPAT: {
2612 struct usb_ext_compat_desc *desc = data;
2613 struct usb_os_desc_table *t;
2614
2615 t = &func->function.os_desc_table[desc->bFirstInterfaceNumber];
2616 t->if_id = func->interfaces_nums[desc->bFirstInterfaceNumber];
2617 memcpy(t->os_desc->ext_compat_id, &desc->CompatibleID,
2618 ARRAY_SIZE(desc->CompatibleID) +
2619 ARRAY_SIZE(desc->SubCompatibleID));
2620 length = sizeof(*desc);
2621 }
2622 break;
2623 case FFS_OS_DESC_EXT_PROP: {
2624 struct usb_ext_prop_desc *desc = data;
2625 struct usb_os_desc_table *t;
2626 struct usb_os_desc_ext_prop *ext_prop;
2627 char *ext_prop_name;
2628 char *ext_prop_data;
2629
2630 t = &func->function.os_desc_table[h->interface];
2631 t->if_id = func->interfaces_nums[h->interface];
2632
2633 ext_prop = func->ffs->ms_os_descs_ext_prop_avail;
2634 func->ffs->ms_os_descs_ext_prop_avail += sizeof(*ext_prop);
2635
2636 ext_prop->type = le32_to_cpu(desc->dwPropertyDataType);
2637 ext_prop->name_len = le16_to_cpu(desc->wPropertyNameLength);
2638 ext_prop->data_len = le32_to_cpu(*(u32 *)
2639 usb_ext_prop_data_len_ptr(data, ext_prop->name_len));
2640 length = ext_prop->name_len + ext_prop->data_len + 14;
2641
2642 ext_prop_name = func->ffs->ms_os_descs_ext_prop_name_avail;
2643 func->ffs->ms_os_descs_ext_prop_name_avail +=
2644 ext_prop->name_len;
2645
2646 ext_prop_data = func->ffs->ms_os_descs_ext_prop_data_avail;
2647 func->ffs->ms_os_descs_ext_prop_data_avail +=
2648 ext_prop->data_len;
2649 memcpy(ext_prop_data,
2650 usb_ext_prop_data_ptr(data, ext_prop->name_len),
2651 ext_prop->data_len);
2652 /* unicode data reported to the host as "WCHAR"s */
2653 switch (ext_prop->type) {
2654 case USB_EXT_PROP_UNICODE:
2655 case USB_EXT_PROP_UNICODE_ENV:
2656 case USB_EXT_PROP_UNICODE_LINK:
2657 case USB_EXT_PROP_UNICODE_MULTI:
2658 ext_prop->data_len *= 2;
2659 break;
2660 }
2661 ext_prop->data = ext_prop_data;
2662
2663 memcpy(ext_prop_name, usb_ext_prop_name_ptr(data),
2664 ext_prop->name_len);
2665 /* property name reported to the host as "WCHAR"s */
2666 ext_prop->name_len *= 2;
2667 ext_prop->name = ext_prop_name;
2668
2669 t->os_desc->ext_prop_len +=
2670 ext_prop->name_len + ext_prop->data_len + 14;
2671 ++t->os_desc->ext_prop_count;
2672 list_add_tail(&ext_prop->entry, &t->os_desc->ext_prop);
2673 }
2674 break;
2675 default:
2676 pr_vdebug("unknown descriptor: %d\n", type);
2677 }
2678
2679 return length;
2680}
2681
Andrzej Pietrasiewicz5920cda2013-12-03 15:15:33 +01002682static inline struct f_fs_opts *ffs_do_functionfs_bind(struct usb_function *f,
2683 struct usb_configuration *c)
2684{
2685 struct ffs_function *func = ffs_func_from_usb(f);
2686 struct f_fs_opts *ffs_opts =
2687 container_of(f->fi, struct f_fs_opts, func_inst);
2688 int ret;
2689
2690 ENTER();
2691
2692 /*
2693 * Legacy gadget triggers binding in functionfs_ready_callback,
2694 * which already uses locking; taking the same lock here would
2695 * cause a deadlock.
2696 *
2697 * Configfs-enabled gadgets however do need ffs_dev_lock.
2698 */
2699 if (!ffs_opts->no_configfs)
2700 ffs_dev_lock();
2701 ret = ffs_opts->dev->desc_ready ? 0 : -ENODEV;
2702 func->ffs = ffs_opts->dev->ffs_data;
2703 if (!ffs_opts->no_configfs)
2704 ffs_dev_unlock();
2705 if (ret)
2706 return ERR_PTR(ret);
2707
2708 func->conf = c;
2709 func->gadget = c->cdev->gadget;
2710
Andrzej Pietrasiewicz5920cda2013-12-03 15:15:33 +01002711 /*
2712 * in drivers/usb/gadget/configfs.c:configfs_composite_bind()
2713 * configurations are bound in sequence with list_for_each_entry,
2714 * in each configuration its functions are bound in sequence
2715 * with list_for_each_entry, so we assume no race condition
2716 * with regard to ffs_opts->bound access
2717 */
2718 if (!ffs_opts->refcnt) {
2719 ret = functionfs_bind(func->ffs, c->cdev);
2720 if (ret)
2721 return ERR_PTR(ret);
2722 }
2723 ffs_opts->refcnt++;
2724 func->function.strings = func->ffs->stringtabs;
2725
2726 return ffs_opts;
2727}
Andrzej Pietrasiewicz5920cda2013-12-03 15:15:33 +01002728
2729static int _ffs_func_bind(struct usb_configuration *c,
2730 struct usb_function *f)
Michal Nazarewiczddf8abd2010-05-05 12:53:14 +02002731{
2732 struct ffs_function *func = ffs_func_from_usb(f);
2733 struct ffs_data *ffs = func->ffs;
2734
2735 const int full = !!func->ffs->fs_descs_count;
2736 const int high = gadget_is_dualspeed(func->gadget) &&
2737 func->ffs->hs_descs_count;
Manu Gautam8d4e8972014-02-28 16:50:22 +05302738 const int super = gadget_is_superspeed(func->gadget) &&
2739 func->ffs->ss_descs_count;
Michal Nazarewiczddf8abd2010-05-05 12:53:14 +02002740
Andrzej Pietrasiewiczf0175ab2014-07-09 12:20:08 +02002741 int fs_len, hs_len, ss_len, ret, i;
Michal Nazarewiczddf8abd2010-05-05 12:53:14 +02002742
2743 /* Make it a single chunk, less management later on */
Andrzej Pietrasiewicze6f38622013-12-03 15:15:30 +01002744 vla_group(d);
2745 vla_item_with_sz(d, struct ffs_ep, eps, ffs->eps_count);
2746 vla_item_with_sz(d, struct usb_descriptor_header *, fs_descs,
2747 full ? ffs->fs_descs_count + 1 : 0);
2748 vla_item_with_sz(d, struct usb_descriptor_header *, hs_descs,
2749 high ? ffs->hs_descs_count + 1 : 0);
Manu Gautam8d4e8972014-02-28 16:50:22 +05302750 vla_item_with_sz(d, struct usb_descriptor_header *, ss_descs,
2751 super ? ffs->ss_descs_count + 1 : 0);
Andrzej Pietrasiewicze6f38622013-12-03 15:15:30 +01002752 vla_item_with_sz(d, short, inums, ffs->interfaces_count);
Andrzej Pietrasiewiczf0175ab2014-07-09 12:20:08 +02002753 vla_item_with_sz(d, struct usb_os_desc_table, os_desc_table,
2754 c->cdev->use_os_string ? ffs->interfaces_count : 0);
2755 vla_item_with_sz(d, char[16], ext_compat,
2756 c->cdev->use_os_string ? ffs->interfaces_count : 0);
2757 vla_item_with_sz(d, struct usb_os_desc, os_desc,
2758 c->cdev->use_os_string ? ffs->interfaces_count : 0);
2759 vla_item_with_sz(d, struct usb_os_desc_ext_prop, ext_prop,
2760 ffs->ms_os_descs_ext_prop_count);
2761 vla_item_with_sz(d, char, ext_prop_name,
2762 ffs->ms_os_descs_ext_prop_name_len);
2763 vla_item_with_sz(d, char, ext_prop_data,
2764 ffs->ms_os_descs_ext_prop_data_len);
Michal Nazarewiczac8dde12014-02-28 16:50:23 +05302765 vla_item_with_sz(d, char, raw_descs, ffs->raw_descs_length);
Andrzej Pietrasiewicze6f38622013-12-03 15:15:30 +01002766 char *vlabuf;
Michal Nazarewiczddf8abd2010-05-05 12:53:14 +02002767
2768 ENTER();
2769
Manu Gautam8d4e8972014-02-28 16:50:22 +05302770 /* Has descriptors only for speeds gadget does not support */
2771 if (unlikely(!(full | high | super)))
Michal Nazarewiczddf8abd2010-05-05 12:53:14 +02002772 return -ENOTSUPP;
2773
Andrzej Pietrasiewicze6f38622013-12-03 15:15:30 +01002774 /* Allocate a single chunk, less management later on */
Andrzej Pietrasiewiczf0175ab2014-07-09 12:20:08 +02002775 vlabuf = kzalloc(vla_group_size(d), GFP_KERNEL);
Andrzej Pietrasiewicze6f38622013-12-03 15:15:30 +01002776 if (unlikely(!vlabuf))
Michal Nazarewiczddf8abd2010-05-05 12:53:14 +02002777 return -ENOMEM;
2778
Andrzej Pietrasiewiczf0175ab2014-07-09 12:20:08 +02002779 ffs->ms_os_descs_ext_prop_avail = vla_ptr(vlabuf, d, ext_prop);
2780 ffs->ms_os_descs_ext_prop_name_avail =
2781 vla_ptr(vlabuf, d, ext_prop_name);
2782 ffs->ms_os_descs_ext_prop_data_avail =
2783 vla_ptr(vlabuf, d, ext_prop_data);
2784
Michal Nazarewiczac8dde12014-02-28 16:50:23 +05302785 /* Copy descriptors */
2786 memcpy(vla_ptr(vlabuf, d, raw_descs), ffs->raw_descs,
2787 ffs->raw_descs_length);
Manu Gautam8d4e8972014-02-28 16:50:22 +05302788
Andrzej Pietrasiewicze6f38622013-12-03 15:15:30 +01002789 memset(vla_ptr(vlabuf, d, inums), 0xff, d_inums__sz);
2790 for (ret = ffs->eps_count; ret; --ret) {
2791 struct ffs_ep *ptr;
Michal Nazarewiczddf8abd2010-05-05 12:53:14 +02002792
Andrzej Pietrasiewicze6f38622013-12-03 15:15:30 +01002793 ptr = vla_ptr(vlabuf, d, eps);
2794 ptr[ret].num = -1;
2795 }
2796
2797 /* Save pointers
2798 * d_eps == vlabuf, func->eps used to kfree vlabuf later
2799 */
2800 func->eps = vla_ptr(vlabuf, d, eps);
2801 func->interfaces_nums = vla_ptr(vlabuf, d, inums);
Michal Nazarewiczddf8abd2010-05-05 12:53:14 +02002802
Michal Nazarewicz5ab54cf2010-11-12 14:29:28 +01002803 /*
2804 * Go through all the endpoint descriptors and allocate
Michal Nazarewiczddf8abd2010-05-05 12:53:14 +02002805 * endpoints first, so that later we can rewrite the endpoint
Michal Nazarewicz5ab54cf2010-11-12 14:29:28 +01002806 * numbers without worrying that it may be described later on.
2807 */
Michal Nazarewiczddf8abd2010-05-05 12:53:14 +02002808 if (likely(full)) {
Andrzej Pietrasiewicze6f38622013-12-03 15:15:30 +01002809 func->function.fs_descriptors = vla_ptr(vlabuf, d, fs_descs);
Manu Gautam8d4e8972014-02-28 16:50:22 +05302810 fs_len = ffs_do_descs(ffs->fs_descs_count,
2811 vla_ptr(vlabuf, d, raw_descs),
2812 d_raw_descs__sz,
2813 __ffs_func_bind_do_descs, func);
2814 if (unlikely(fs_len < 0)) {
2815 ret = fs_len;
Michal Nazarewiczddf8abd2010-05-05 12:53:14 +02002816 goto error;
Manu Gautam8d4e8972014-02-28 16:50:22 +05302817 }
Michal Nazarewiczddf8abd2010-05-05 12:53:14 +02002818 } else {
Manu Gautam8d4e8972014-02-28 16:50:22 +05302819 fs_len = 0;
Michal Nazarewiczddf8abd2010-05-05 12:53:14 +02002820 }
2821
2822 if (likely(high)) {
Andrzej Pietrasiewicze6f38622013-12-03 15:15:30 +01002823 func->function.hs_descriptors = vla_ptr(vlabuf, d, hs_descs);
Manu Gautam8d4e8972014-02-28 16:50:22 +05302824 hs_len = ffs_do_descs(ffs->hs_descs_count,
2825 vla_ptr(vlabuf, d, raw_descs) + fs_len,
2826 d_raw_descs__sz - fs_len,
2827 __ffs_func_bind_do_descs, func);
2828 if (unlikely(hs_len < 0)) {
2829 ret = hs_len;
2830 goto error;
2831 }
2832 } else {
2833 hs_len = 0;
2834 }
2835
2836 if (likely(super)) {
2837 func->function.ss_descriptors = vla_ptr(vlabuf, d, ss_descs);
Andrzej Pietrasiewiczf0175ab2014-07-09 12:20:08 +02002838 ss_len = ffs_do_descs(ffs->ss_descs_count,
Manu Gautam8d4e8972014-02-28 16:50:22 +05302839 vla_ptr(vlabuf, d, raw_descs) + fs_len + hs_len,
2840 d_raw_descs__sz - fs_len - hs_len,
2841 __ffs_func_bind_do_descs, func);
Andrzej Pietrasiewiczf0175ab2014-07-09 12:20:08 +02002842 if (unlikely(ss_len < 0)) {
2843 ret = ss_len;
Robert Baldyga88548942013-09-27 12:28:54 +02002844 goto error;
Andrzej Pietrasiewiczf0175ab2014-07-09 12:20:08 +02002845 }
2846 } else {
2847 ss_len = 0;
Michal Nazarewiczddf8abd2010-05-05 12:53:14 +02002848 }
2849
Michal Nazarewicz5ab54cf2010-11-12 14:29:28 +01002850 /*
2851 * Now handle interface numbers allocation and interface and
2852 * endpoint numbers rewriting. We can do that in one go
2853 * now.
2854 */
Michal Nazarewiczddf8abd2010-05-05 12:53:14 +02002855 ret = ffs_do_descs(ffs->fs_descs_count +
Manu Gautam8d4e8972014-02-28 16:50:22 +05302856 (high ? ffs->hs_descs_count : 0) +
2857 (super ? ffs->ss_descs_count : 0),
Andrzej Pietrasiewicze6f38622013-12-03 15:15:30 +01002858 vla_ptr(vlabuf, d, raw_descs), d_raw_descs__sz,
Michal Nazarewiczddf8abd2010-05-05 12:53:14 +02002859 __ffs_func_bind_do_nums, func);
2860 if (unlikely(ret < 0))
2861 goto error;
2862
Andrzej Pietrasiewiczf0175ab2014-07-09 12:20:08 +02002863 func->function.os_desc_table = vla_ptr(vlabuf, d, os_desc_table);
2864 if (c->cdev->use_os_string)
2865 for (i = 0; i < ffs->interfaces_count; ++i) {
2866 struct usb_os_desc *desc;
2867
2868 desc = func->function.os_desc_table[i].os_desc =
2869 vla_ptr(vlabuf, d, os_desc) +
2870 i * sizeof(struct usb_os_desc);
2871 desc->ext_compat_id =
2872 vla_ptr(vlabuf, d, ext_compat) + i * 16;
2873 INIT_LIST_HEAD(&desc->ext_prop);
2874 }
2875 ret = ffs_do_os_descs(ffs->ms_os_descs_count,
2876 vla_ptr(vlabuf, d, raw_descs) +
2877 fs_len + hs_len + ss_len,
2878 d_raw_descs__sz - fs_len - hs_len - ss_len,
2879 __ffs_func_bind_do_os_desc, func);
2880 if (unlikely(ret < 0))
2881 goto error;
2882 func->function.os_desc_n =
2883 c->cdev->use_os_string ? ffs->interfaces_count : 0;
2884
Michal Nazarewiczddf8abd2010-05-05 12:53:14 +02002885 /* And we're done */
2886 ffs_event_add(ffs, FUNCTIONFS_BIND);
2887 return 0;
2888
2889error:
2890 /* XXX Do we need to release all claimed endpoints here? */
2891 return ret;
2892}
2893
Andrzej Pietrasiewicz5920cda2013-12-03 15:15:33 +01002894static int ffs_func_bind(struct usb_configuration *c,
2895 struct usb_function *f)
2896{
Andrzej Pietrasiewicz5920cda2013-12-03 15:15:33 +01002897 struct f_fs_opts *ffs_opts = ffs_do_functionfs_bind(f, c);
2898
2899 if (IS_ERR(ffs_opts))
2900 return PTR_ERR(ffs_opts);
Andrzej Pietrasiewicz5920cda2013-12-03 15:15:33 +01002901
2902 return _ffs_func_bind(c, f);
2903}
2904
Michal Nazarewiczddf8abd2010-05-05 12:53:14 +02002905
2906/* Other USB function hooks *************************************************/
2907
Robert Baldyga18d6b32f2014-12-18 09:55:10 +01002908static void ffs_reset_work(struct work_struct *work)
2909{
2910 struct ffs_data *ffs = container_of(work,
2911 struct ffs_data, reset_work);
2912 ffs_data_reset(ffs);
2913}
2914
Michal Nazarewiczddf8abd2010-05-05 12:53:14 +02002915static int ffs_func_set_alt(struct usb_function *f,
2916 unsigned interface, unsigned alt)
2917{
2918 struct ffs_function *func = ffs_func_from_usb(f);
2919 struct ffs_data *ffs = func->ffs;
2920 int ret = 0, intf;
2921
2922 if (alt != (unsigned)-1) {
2923 intf = ffs_func_revmap_intf(func, interface);
2924 if (unlikely(intf < 0))
2925 return intf;
2926 }
2927
2928 if (ffs->func)
2929 ffs_func_eps_disable(ffs->func);
2930
Robert Baldyga18d6b32f2014-12-18 09:55:10 +01002931 if (ffs->state == FFS_DEACTIVATED) {
2932 ffs->state = FFS_CLOSING;
2933 INIT_WORK(&ffs->reset_work, ffs_reset_work);
2934 schedule_work(&ffs->reset_work);
2935 return -ENODEV;
2936 }
2937
Michal Nazarewiczddf8abd2010-05-05 12:53:14 +02002938 if (ffs->state != FFS_ACTIVE)
2939 return -ENODEV;
2940
2941 if (alt == (unsigned)-1) {
2942 ffs->func = NULL;
2943 ffs_event_add(ffs, FUNCTIONFS_DISABLE);
2944 return 0;
2945 }
2946
2947 ffs->func = func;
2948 ret = ffs_func_eps_enable(func);
2949 if (likely(ret >= 0))
2950 ffs_event_add(ffs, FUNCTIONFS_ENABLE);
2951 return ret;
2952}
2953
2954static void ffs_func_disable(struct usb_function *f)
2955{
2956 ffs_func_set_alt(f, 0, (unsigned)-1);
2957}
2958
2959static int ffs_func_setup(struct usb_function *f,
2960 const struct usb_ctrlrequest *creq)
2961{
2962 struct ffs_function *func = ffs_func_from_usb(f);
2963 struct ffs_data *ffs = func->ffs;
2964 unsigned long flags;
2965 int ret;
2966
2967 ENTER();
2968
Michal Nazarewiczaa02f172010-11-17 17:09:47 +01002969 pr_vdebug("creq->bRequestType = %02x\n", creq->bRequestType);
2970 pr_vdebug("creq->bRequest = %02x\n", creq->bRequest);
2971 pr_vdebug("creq->wValue = %04x\n", le16_to_cpu(creq->wValue));
2972 pr_vdebug("creq->wIndex = %04x\n", le16_to_cpu(creq->wIndex));
2973 pr_vdebug("creq->wLength = %04x\n", le16_to_cpu(creq->wLength));
Michal Nazarewiczddf8abd2010-05-05 12:53:14 +02002974
Michal Nazarewicz5ab54cf2010-11-12 14:29:28 +01002975 /*
2976 * Most requests directed to interface go through here
Michal Nazarewiczddf8abd2010-05-05 12:53:14 +02002977 * (notable exceptions are set/get interface) so we need to
2978 * handle them. All other either handled by composite or
2979 * passed to usb_configuration->setup() (if one is set). No
2980 * matter, we will handle requests directed to endpoint here
2981 * as well (as it's straightforward) but what to do with any
Michal Nazarewicz5ab54cf2010-11-12 14:29:28 +01002982 * other request?
2983 */
Michal Nazarewiczddf8abd2010-05-05 12:53:14 +02002984 if (ffs->state != FFS_ACTIVE)
2985 return -ENODEV;
2986
2987 switch (creq->bRequestType & USB_RECIP_MASK) {
2988 case USB_RECIP_INTERFACE:
2989 ret = ffs_func_revmap_intf(func, le16_to_cpu(creq->wIndex));
2990 if (unlikely(ret < 0))
2991 return ret;
2992 break;
2993
2994 case USB_RECIP_ENDPOINT:
2995 ret = ffs_func_revmap_ep(func, le16_to_cpu(creq->wIndex));
2996 if (unlikely(ret < 0))
2997 return ret;
Robert Baldyga1b0bf882014-09-09 08:23:17 +02002998 if (func->ffs->user_flags & FUNCTIONFS_VIRTUAL_ADDR)
2999 ret = func->ffs->eps_addrmap[ret];
Michal Nazarewiczddf8abd2010-05-05 12:53:14 +02003000 break;
3001
3002 default:
3003 return -EOPNOTSUPP;
3004 }
3005
3006 spin_lock_irqsave(&ffs->ev.waitq.lock, flags);
3007 ffs->ev.setup = *creq;
3008 ffs->ev.setup.wIndex = cpu_to_le16(ret);
3009 __ffs_event_add(ffs, FUNCTIONFS_SETUP);
3010 spin_unlock_irqrestore(&ffs->ev.waitq.lock, flags);
3011
3012 return 0;
3013}
3014
3015static void ffs_func_suspend(struct usb_function *f)
3016{
3017 ENTER();
3018 ffs_event_add(ffs_func_from_usb(f)->ffs, FUNCTIONFS_SUSPEND);
3019}
3020
3021static void ffs_func_resume(struct usb_function *f)
3022{
3023 ENTER();
3024 ffs_event_add(ffs_func_from_usb(f)->ffs, FUNCTIONFS_RESUME);
3025}
3026
3027
Michal Nazarewicz5ab54cf2010-11-12 14:29:28 +01003028/* Endpoint and interface numbers reverse mapping ***************************/
Michal Nazarewiczddf8abd2010-05-05 12:53:14 +02003029
3030static int ffs_func_revmap_ep(struct ffs_function *func, u8 num)
3031{
3032 num = func->eps_revmap[num & USB_ENDPOINT_NUMBER_MASK];
3033 return num ? num : -EDOM;
3034}
3035
3036static int ffs_func_revmap_intf(struct ffs_function *func, u8 intf)
3037{
3038 short *nums = func->interfaces_nums;
3039 unsigned count = func->ffs->interfaces_count;
3040
3041 for (; count; --count, ++nums) {
3042 if (*nums >= 0 && *nums == intf)
3043 return nums - func->interfaces_nums;
3044 }
3045
3046 return -EDOM;
3047}
3048
3049
Andrzej Pietrasiewicz4b187fc2013-12-03 15:15:32 +01003050/* Devices management *******************************************************/
3051
3052static LIST_HEAD(ffs_devices);
3053
Andrzej Pietrasiewiczda13a772014-01-13 16:49:38 +01003054static struct ffs_dev *_ffs_do_find_dev(const char *name)
Andrzej Pietrasiewicz4b187fc2013-12-03 15:15:32 +01003055{
3056 struct ffs_dev *dev;
3057
3058 list_for_each_entry(dev, &ffs_devices, entry) {
3059 if (!dev->name || !name)
3060 continue;
3061 if (strcmp(dev->name, name) == 0)
3062 return dev;
3063 }
Andrzej Pietrasiewiczb6584992013-12-03 15:15:36 +01003064
Andrzej Pietrasiewicz4b187fc2013-12-03 15:15:32 +01003065 return NULL;
3066}
3067
3068/*
3069 * ffs_lock must be taken by the caller of this function
3070 */
Andrzej Pietrasiewiczda13a772014-01-13 16:49:38 +01003071static struct ffs_dev *_ffs_get_single_dev(void)
Andrzej Pietrasiewicz4b187fc2013-12-03 15:15:32 +01003072{
3073 struct ffs_dev *dev;
3074
3075 if (list_is_singular(&ffs_devices)) {
3076 dev = list_first_entry(&ffs_devices, struct ffs_dev, entry);
3077 if (dev->single)
3078 return dev;
3079 }
3080
3081 return NULL;
3082}
3083
3084/*
3085 * ffs_lock must be taken by the caller of this function
3086 */
Andrzej Pietrasiewiczda13a772014-01-13 16:49:38 +01003087static struct ffs_dev *_ffs_find_dev(const char *name)
Andrzej Pietrasiewicz4b187fc2013-12-03 15:15:32 +01003088{
3089 struct ffs_dev *dev;
3090
Andrzej Pietrasiewiczda13a772014-01-13 16:49:38 +01003091 dev = _ffs_get_single_dev();
Andrzej Pietrasiewicz4b187fc2013-12-03 15:15:32 +01003092 if (dev)
3093 return dev;
3094
Andrzej Pietrasiewiczda13a772014-01-13 16:49:38 +01003095 return _ffs_do_find_dev(name);
Andrzej Pietrasiewicz4b187fc2013-12-03 15:15:32 +01003096}
3097
Andrzej Pietrasiewiczb6584992013-12-03 15:15:36 +01003098/* Configfs support *********************************************************/
3099
3100static inline struct f_fs_opts *to_ffs_opts(struct config_item *item)
3101{
3102 return container_of(to_config_group(item), struct f_fs_opts,
3103 func_inst.group);
3104}
3105
3106static void ffs_attr_release(struct config_item *item)
3107{
3108 struct f_fs_opts *opts = to_ffs_opts(item);
3109
3110 usb_put_function_instance(&opts->func_inst);
3111}
3112
3113static struct configfs_item_operations ffs_item_ops = {
3114 .release = ffs_attr_release,
3115};
3116
3117static struct config_item_type ffs_func_type = {
3118 .ct_item_ops = &ffs_item_ops,
3119 .ct_owner = THIS_MODULE,
3120};
3121
3122
Andrzej Pietrasiewicz5920cda2013-12-03 15:15:33 +01003123/* Function registration interface ******************************************/
3124
Andrzej Pietrasiewicz5920cda2013-12-03 15:15:33 +01003125static void ffs_free_inst(struct usb_function_instance *f)
3126{
3127 struct f_fs_opts *opts;
3128
3129 opts = to_f_fs_opts(f);
3130 ffs_dev_lock();
Andrzej Pietrasiewiczda13a772014-01-13 16:49:38 +01003131 _ffs_free_dev(opts->dev);
Andrzej Pietrasiewicz5920cda2013-12-03 15:15:33 +01003132 ffs_dev_unlock();
3133 kfree(opts);
3134}
3135
Andrzej Pietrasiewiczb6584992013-12-03 15:15:36 +01003136#define MAX_INST_NAME_LEN 40
3137
3138static int ffs_set_inst_name(struct usb_function_instance *fi, const char *name)
3139{
3140 struct f_fs_opts *opts;
3141 char *ptr;
3142 const char *tmp;
3143 int name_len, ret;
3144
3145 name_len = strlen(name) + 1;
3146 if (name_len > MAX_INST_NAME_LEN)
3147 return -ENAMETOOLONG;
3148
3149 ptr = kstrndup(name, name_len, GFP_KERNEL);
3150 if (!ptr)
3151 return -ENOMEM;
3152
3153 opts = to_f_fs_opts(fi);
3154 tmp = NULL;
3155
3156 ffs_dev_lock();
3157
3158 tmp = opts->dev->name_allocated ? opts->dev->name : NULL;
3159 ret = _ffs_name_dev(opts->dev, ptr);
3160 if (ret) {
3161 kfree(ptr);
3162 ffs_dev_unlock();
3163 return ret;
3164 }
3165 opts->dev->name_allocated = true;
3166
3167 ffs_dev_unlock();
3168
3169 kfree(tmp);
3170
3171 return 0;
3172}
3173
Andrzej Pietrasiewicz5920cda2013-12-03 15:15:33 +01003174static struct usb_function_instance *ffs_alloc_inst(void)
3175{
3176 struct f_fs_opts *opts;
3177 struct ffs_dev *dev;
3178
3179 opts = kzalloc(sizeof(*opts), GFP_KERNEL);
3180 if (!opts)
3181 return ERR_PTR(-ENOMEM);
3182
Andrzej Pietrasiewiczb6584992013-12-03 15:15:36 +01003183 opts->func_inst.set_inst_name = ffs_set_inst_name;
Andrzej Pietrasiewicz5920cda2013-12-03 15:15:33 +01003184 opts->func_inst.free_func_inst = ffs_free_inst;
3185 ffs_dev_lock();
Andrzej Pietrasiewiczda13a772014-01-13 16:49:38 +01003186 dev = _ffs_alloc_dev();
Andrzej Pietrasiewicz5920cda2013-12-03 15:15:33 +01003187 ffs_dev_unlock();
3188 if (IS_ERR(dev)) {
3189 kfree(opts);
3190 return ERR_CAST(dev);
3191 }
3192 opts->dev = dev;
Andrzej Pietrasiewiczb6584992013-12-03 15:15:36 +01003193 dev->opts = opts;
Andrzej Pietrasiewicz5920cda2013-12-03 15:15:33 +01003194
Andrzej Pietrasiewiczb6584992013-12-03 15:15:36 +01003195 config_group_init_type_name(&opts->func_inst.group, "",
3196 &ffs_func_type);
Andrzej Pietrasiewicz5920cda2013-12-03 15:15:33 +01003197 return &opts->func_inst;
3198}
3199
3200static void ffs_free(struct usb_function *f)
3201{
3202 kfree(ffs_func_from_usb(f));
3203}
3204
3205static void ffs_func_unbind(struct usb_configuration *c,
3206 struct usb_function *f)
3207{
3208 struct ffs_function *func = ffs_func_from_usb(f);
3209 struct ffs_data *ffs = func->ffs;
3210 struct f_fs_opts *opts =
3211 container_of(f->fi, struct f_fs_opts, func_inst);
3212 struct ffs_ep *ep = func->eps;
3213 unsigned count = ffs->eps_count;
3214 unsigned long flags;
3215
3216 ENTER();
3217 if (ffs->func == func) {
3218 ffs_func_eps_disable(func);
3219 ffs->func = NULL;
3220 }
3221
3222 if (!--opts->refcnt)
3223 functionfs_unbind(ffs);
3224
3225 /* cleanup after autoconfig */
3226 spin_lock_irqsave(&func->ffs->eps_lock, flags);
3227 do {
3228 if (ep->ep && ep->req)
3229 usb_ep_free_request(ep->ep, ep->req);
3230 ep->req = NULL;
3231 ++ep;
3232 } while (--count);
3233 spin_unlock_irqrestore(&func->ffs->eps_lock, flags);
3234 kfree(func->eps);
3235 func->eps = NULL;
3236 /*
3237 * eps, descriptors and interfaces_nums are allocated in the
3238 * same chunk so only one free is required.
3239 */
3240 func->function.fs_descriptors = NULL;
3241 func->function.hs_descriptors = NULL;
Manu Gautam8d4e8972014-02-28 16:50:22 +05303242 func->function.ss_descriptors = NULL;
Andrzej Pietrasiewicz5920cda2013-12-03 15:15:33 +01003243 func->interfaces_nums = NULL;
3244
3245 ffs_event_add(ffs, FUNCTIONFS_UNBIND);
3246}
3247
3248static struct usb_function *ffs_alloc(struct usb_function_instance *fi)
3249{
3250 struct ffs_function *func;
3251
3252 ENTER();
3253
3254 func = kzalloc(sizeof(*func), GFP_KERNEL);
3255 if (unlikely(!func))
3256 return ERR_PTR(-ENOMEM);
3257
3258 func->function.name = "Function FS Gadget";
3259
3260 func->function.bind = ffs_func_bind;
3261 func->function.unbind = ffs_func_unbind;
3262 func->function.set_alt = ffs_func_set_alt;
3263 func->function.disable = ffs_func_disable;
3264 func->function.setup = ffs_func_setup;
3265 func->function.suspend = ffs_func_suspend;
3266 func->function.resume = ffs_func_resume;
3267 func->function.free_func = ffs_free;
3268
3269 return &func->function;
3270}
3271
Andrzej Pietrasiewicz4b187fc2013-12-03 15:15:32 +01003272/*
3273 * ffs_lock must be taken by the caller of this function
3274 */
Andrzej Pietrasiewiczda13a772014-01-13 16:49:38 +01003275static struct ffs_dev *_ffs_alloc_dev(void)
Andrzej Pietrasiewicz4b187fc2013-12-03 15:15:32 +01003276{
3277 struct ffs_dev *dev;
3278 int ret;
3279
Andrzej Pietrasiewiczda13a772014-01-13 16:49:38 +01003280 if (_ffs_get_single_dev())
Andrzej Pietrasiewicz4b187fc2013-12-03 15:15:32 +01003281 return ERR_PTR(-EBUSY);
3282
3283 dev = kzalloc(sizeof(*dev), GFP_KERNEL);
3284 if (!dev)
3285 return ERR_PTR(-ENOMEM);
3286
3287 if (list_empty(&ffs_devices)) {
3288 ret = functionfs_init();
3289 if (ret) {
3290 kfree(dev);
3291 return ERR_PTR(ret);
3292 }
3293 }
3294
3295 list_add(&dev->entry, &ffs_devices);
3296
3297 return dev;
3298}
3299
3300/*
3301 * ffs_lock must be taken by the caller of this function
3302 * The caller is responsible for "name" being available whenever f_fs needs it
3303 */
3304static int _ffs_name_dev(struct ffs_dev *dev, const char *name)
3305{
3306 struct ffs_dev *existing;
3307
Andrzej Pietrasiewiczda13a772014-01-13 16:49:38 +01003308 existing = _ffs_do_find_dev(name);
Andrzej Pietrasiewicz4b187fc2013-12-03 15:15:32 +01003309 if (existing)
3310 return -EBUSY;
Andrzej Pietrasiewiczab13cb02014-01-13 16:49:36 +01003311
Andrzej Pietrasiewicz4b187fc2013-12-03 15:15:32 +01003312 dev->name = name;
3313
3314 return 0;
3315}
3316
3317/*
3318 * The caller is responsible for "name" being available whenever f_fs needs it
3319 */
3320int ffs_name_dev(struct ffs_dev *dev, const char *name)
3321{
3322 int ret;
3323
3324 ffs_dev_lock();
3325 ret = _ffs_name_dev(dev, name);
3326 ffs_dev_unlock();
3327
3328 return ret;
3329}
Felipe Balbi0700faa2014-04-01 13:19:32 -05003330EXPORT_SYMBOL_GPL(ffs_name_dev);
Andrzej Pietrasiewicz4b187fc2013-12-03 15:15:32 +01003331
3332int ffs_single_dev(struct ffs_dev *dev)
3333{
3334 int ret;
3335
3336 ret = 0;
3337 ffs_dev_lock();
3338
3339 if (!list_is_singular(&ffs_devices))
3340 ret = -EBUSY;
3341 else
3342 dev->single = true;
3343
3344 ffs_dev_unlock();
3345 return ret;
3346}
Felipe Balbi0700faa2014-04-01 13:19:32 -05003347EXPORT_SYMBOL_GPL(ffs_single_dev);
Andrzej Pietrasiewicz4b187fc2013-12-03 15:15:32 +01003348
3349/*
3350 * ffs_lock must be taken by the caller of this function
3351 */
Andrzej Pietrasiewiczda13a772014-01-13 16:49:38 +01003352static void _ffs_free_dev(struct ffs_dev *dev)
Andrzej Pietrasiewicz4b187fc2013-12-03 15:15:32 +01003353{
3354 list_del(&dev->entry);
Andrzej Pietrasiewiczb6584992013-12-03 15:15:36 +01003355 if (dev->name_allocated)
3356 kfree(dev->name);
Andrzej Pietrasiewicz4b187fc2013-12-03 15:15:32 +01003357 kfree(dev);
3358 if (list_empty(&ffs_devices))
3359 functionfs_cleanup();
3360}
3361
3362static void *ffs_acquire_dev(const char *dev_name)
3363{
3364 struct ffs_dev *ffs_dev;
3365
3366 ENTER();
3367 ffs_dev_lock();
3368
Andrzej Pietrasiewiczda13a772014-01-13 16:49:38 +01003369 ffs_dev = _ffs_find_dev(dev_name);
Andrzej Pietrasiewicz4b187fc2013-12-03 15:15:32 +01003370 if (!ffs_dev)
Krzysztof Opasiakd668b4f2014-05-21 14:05:35 +02003371 ffs_dev = ERR_PTR(-ENOENT);
Andrzej Pietrasiewicz4b187fc2013-12-03 15:15:32 +01003372 else if (ffs_dev->mounted)
3373 ffs_dev = ERR_PTR(-EBUSY);
Andrzej Pietrasiewicz5920cda2013-12-03 15:15:33 +01003374 else if (ffs_dev->ffs_acquire_dev_callback &&
3375 ffs_dev->ffs_acquire_dev_callback(ffs_dev))
Krzysztof Opasiakd668b4f2014-05-21 14:05:35 +02003376 ffs_dev = ERR_PTR(-ENOENT);
Andrzej Pietrasiewicz4b187fc2013-12-03 15:15:32 +01003377 else
3378 ffs_dev->mounted = true;
3379
3380 ffs_dev_unlock();
3381 return ffs_dev;
3382}
3383
3384static void ffs_release_dev(struct ffs_data *ffs_data)
3385{
3386 struct ffs_dev *ffs_dev;
3387
3388 ENTER();
3389 ffs_dev_lock();
3390
3391 ffs_dev = ffs_data->private_data;
Andrzej Pietrasiewiczea365922014-01-13 16:49:35 +01003392 if (ffs_dev) {
Andrzej Pietrasiewicz4b187fc2013-12-03 15:15:32 +01003393 ffs_dev->mounted = false;
Andrzej Pietrasiewiczea365922014-01-13 16:49:35 +01003394
3395 if (ffs_dev->ffs_release_dev_callback)
3396 ffs_dev->ffs_release_dev_callback(ffs_dev);
3397 }
Andrzej Pietrasiewicz4b187fc2013-12-03 15:15:32 +01003398
3399 ffs_dev_unlock();
3400}
3401
3402static int ffs_ready(struct ffs_data *ffs)
3403{
3404 struct ffs_dev *ffs_obj;
3405 int ret = 0;
3406
3407 ENTER();
3408 ffs_dev_lock();
3409
3410 ffs_obj = ffs->private_data;
3411 if (!ffs_obj) {
3412 ret = -EINVAL;
3413 goto done;
3414 }
3415 if (WARN_ON(ffs_obj->desc_ready)) {
3416 ret = -EBUSY;
3417 goto done;
3418 }
3419
3420 ffs_obj->desc_ready = true;
3421 ffs_obj->ffs_data = ffs;
3422
Krzysztof Opasiak49a79d82015-05-22 17:25:18 +02003423 if (ffs_obj->ffs_ready_callback) {
Andrzej Pietrasiewicz4b187fc2013-12-03 15:15:32 +01003424 ret = ffs_obj->ffs_ready_callback(ffs);
Krzysztof Opasiak49a79d82015-05-22 17:25:18 +02003425 if (ret)
3426 goto done;
3427 }
Andrzej Pietrasiewicz4b187fc2013-12-03 15:15:32 +01003428
Krzysztof Opasiak49a79d82015-05-22 17:25:18 +02003429 set_bit(FFS_FL_CALL_CLOSED_CALLBACK, &ffs->flags);
Andrzej Pietrasiewicz4b187fc2013-12-03 15:15:32 +01003430done:
3431 ffs_dev_unlock();
3432 return ret;
3433}
3434
3435static void ffs_closed(struct ffs_data *ffs)
3436{
3437 struct ffs_dev *ffs_obj;
3438
3439 ENTER();
3440 ffs_dev_lock();
3441
3442 ffs_obj = ffs->private_data;
3443 if (!ffs_obj)
3444 goto done;
3445
3446 ffs_obj->desc_ready = false;
3447
Krzysztof Opasiak49a79d82015-05-22 17:25:18 +02003448 if (test_and_clear_bit(FFS_FL_CALL_CLOSED_CALLBACK, &ffs->flags) &&
3449 ffs_obj->ffs_closed_callback)
Andrzej Pietrasiewicz4b187fc2013-12-03 15:15:32 +01003450 ffs_obj->ffs_closed_callback(ffs);
Andrzej Pietrasiewiczb6584992013-12-03 15:15:36 +01003451
3452 if (!ffs_obj->opts || ffs_obj->opts->no_configfs
3453 || !ffs_obj->opts->func_inst.group.cg_item.ci_parent)
3454 goto done;
3455
3456 unregister_gadget_item(ffs_obj->opts->
3457 func_inst.group.cg_item.ci_parent->ci_parent);
Andrzej Pietrasiewicz4b187fc2013-12-03 15:15:32 +01003458done:
3459 ffs_dev_unlock();
3460}
3461
Michal Nazarewiczddf8abd2010-05-05 12:53:14 +02003462/* Misc helper functions ****************************************************/
3463
3464static int ffs_mutex_lock(struct mutex *mutex, unsigned nonblock)
3465{
3466 return nonblock
3467 ? likely(mutex_trylock(mutex)) ? 0 : -EAGAIN
3468 : mutex_lock_interruptible(mutex);
3469}
3470
Al Viro260ef312012-09-26 21:43:45 -04003471static char *ffs_prepare_buffer(const char __user *buf, size_t len)
Michal Nazarewiczddf8abd2010-05-05 12:53:14 +02003472{
3473 char *data;
3474
3475 if (unlikely(!len))
3476 return NULL;
3477
3478 data = kmalloc(len, GFP_KERNEL);
3479 if (unlikely(!data))
3480 return ERR_PTR(-ENOMEM);
3481
3482 if (unlikely(__copy_from_user(data, buf, len))) {
3483 kfree(data);
3484 return ERR_PTR(-EFAULT);
3485 }
3486
Michal Nazarewiczaa02f172010-11-17 17:09:47 +01003487 pr_vdebug("Buffer from user space:\n");
Michal Nazarewiczddf8abd2010-05-05 12:53:14 +02003488 ffs_dump_mem("", data, len);
3489
3490 return data;
3491}
Andrzej Pietrasiewicz5920cda2013-12-03 15:15:33 +01003492
Andrzej Pietrasiewicz5920cda2013-12-03 15:15:33 +01003493DECLARE_USB_FUNCTION_INIT(ffs, ffs_alloc_inst, ffs_alloc);
3494MODULE_LICENSE("GPL");
3495MODULE_AUTHOR("Michal Nazarewicz");