2005-05-06 21:05:39 +04:00
/* Siemens ID Mouse driver v0.6
2005-04-17 02:20:36 +04:00
This program is free software ; you can redistribute it and / or
modify it under the terms of the GNU General Public License as
published by the Free Software Foundation ; either version 2 of
the License , or ( at your option ) any later version .
Copyright ( C ) 2004 - 5 by Florian ' Floe ' Echtler < echtler @ fs . tum . de >
and Andreas ' ad ' Deresch < aderesch @ fs . tum . de >
Derived from the USB Skeleton driver 1.1 ,
Copyright ( C ) 2003 Greg Kroah - Hartman ( greg @ kroah . com )
2005-05-06 21:05:39 +04:00
Additional information provided by Martin Reising
< Martin . Reising @ natural - computing . de >
2005-04-17 02:20:36 +04:00
*/
# include <linux/kernel.h>
# include <linux/errno.h>
# include <linux/delay.h>
# include <linux/init.h>
# include <linux/slab.h>
# include <linux/module.h>
# include <linux/completion.h>
2006-01-11 17:55:29 +03:00
# include <linux/mutex.h>
2005-04-17 02:20:36 +04:00
# include <asm/uaccess.h>
# include <linux/usb.h>
2005-05-06 21:05:39 +04:00
/* image constants */
2005-04-17 02:20:36 +04:00
# define WIDTH 225
2005-05-06 21:05:39 +04:00
# define HEIGHT 289
# define HEADER "P5 225 289 255 "
2005-04-17 02:20:36 +04:00
# define IMGSIZE ((WIDTH * HEIGHT) + sizeof(HEADER)-1)
2005-05-06 21:05:39 +04:00
/* version information */
# define DRIVER_VERSION "0.6"
2005-04-17 02:20:36 +04:00
# define DRIVER_SHORT "idmouse"
# define DRIVER_AUTHOR "Florian 'Floe' Echtler <echtler@fs.tum.de>"
# define DRIVER_DESC "Siemens ID Mouse FingerTIP Sensor Driver"
2005-05-06 21:05:39 +04:00
/* minor number for misc USB devices */
2005-04-17 02:20:36 +04:00
# define USB_IDMOUSE_MINOR_BASE 132
2005-05-06 21:05:39 +04:00
/* vendor and device IDs */
# define ID_SIEMENS 0x0681
# define ID_IDMOUSE 0x0005
# define ID_CHERRY 0x0010
/* device ID table */
2005-04-17 02:20:36 +04:00
static struct usb_device_id idmouse_table [ ] = {
2005-05-06 21:05:39 +04:00
{ USB_DEVICE ( ID_SIEMENS , ID_IDMOUSE ) } , /* Siemens ID Mouse (Professional) */
{ USB_DEVICE ( ID_SIEMENS , ID_CHERRY ) } , /* Cherry FingerTIP ID Board */
{ } /* terminating null entry */
2005-04-17 02:20:36 +04:00
} ;
2005-05-06 21:05:39 +04:00
/* sensor commands */
# define FTIP_RESET 0x20
# define FTIP_ACQUIRE 0x21
# define FTIP_RELEASE 0x22
# define FTIP_BLINK 0x23 /* LSB of value = blink pulse width */
# define FTIP_SCROLL 0x24
# define ftip_command(dev, command, value, index) \
usb_control_msg ( dev - > udev , usb_sndctrlpipe ( dev - > udev , 0 ) , command , \
USB_TYPE_VENDOR | USB_RECIP_ENDPOINT | USB_DIR_OUT , value , index , NULL , 0 , 1000 )
2005-04-17 02:20:36 +04:00
MODULE_DEVICE_TABLE ( usb , idmouse_table ) ;
2007-10-23 16:23:13 +04:00
static DEFINE_MUTEX ( open_disc_mutex ) ;
2005-04-17 02:20:36 +04:00
/* structure to hold all of our device specific stuff */
struct usb_idmouse {
struct usb_device * udev ; /* save off the usb device pointer */
struct usb_interface * interface ; /* the interface for this device */
unsigned char * bulk_in_buffer ; /* the buffer to receive data */
2005-05-06 21:05:39 +04:00
size_t bulk_in_size ; /* the maximum bulk packet size */
size_t orig_bi_size ; /* same as above, but reported by the device */
2005-04-17 02:20:36 +04:00
__u8 bulk_in_endpointAddr ; /* the address of the bulk in endpoint */
int open ; /* if the port is open or not */
int present ; /* if the device is not disconnected */
2007-10-23 16:23:13 +04:00
struct mutex lock ; /* locks this structure */
2005-04-17 02:20:36 +04:00
} ;
/* local function prototypes */
static ssize_t idmouse_read ( struct file * file , char __user * buffer ,
size_t count , loff_t * ppos ) ;
static int idmouse_open ( struct inode * inode , struct file * file ) ;
static int idmouse_release ( struct inode * inode , struct file * file ) ;
static int idmouse_probe ( struct usb_interface * interface ,
const struct usb_device_id * id ) ;
static void idmouse_disconnect ( struct usb_interface * interface ) ;
2009-07-13 01:58:23 +04:00
static int idmouse_suspend ( struct usb_interface * intf , pm_message_t message ) ;
static int idmouse_resume ( struct usb_interface * intf ) ;
2005-04-17 02:20:36 +04:00
/* file operation pointers */
2006-08-06 03:37:11 +04:00
static const struct file_operations idmouse_fops = {
2005-04-17 02:20:36 +04:00
. owner = THIS_MODULE ,
. read = idmouse_read ,
. open = idmouse_open ,
. release = idmouse_release ,
} ;
2005-06-21 08:15:16 +04:00
/* class driver information */
2005-04-17 02:20:36 +04:00
static struct usb_class_driver idmouse_class = {
2005-06-21 08:15:16 +04:00
. name = " idmouse%d " ,
2005-04-17 02:20:36 +04:00
. fops = & idmouse_fops ,
. minor_base = USB_IDMOUSE_MINOR_BASE ,
} ;
/* usb specific object needed to register this driver with the usb subsystem */
static struct usb_driver idmouse_driver = {
. name = DRIVER_SHORT ,
. probe = idmouse_probe ,
. disconnect = idmouse_disconnect ,
2009-07-13 01:58:23 +04:00
. suspend = idmouse_suspend ,
. resume = idmouse_resume ,
. reset_resume = idmouse_resume ,
2005-04-17 02:20:36 +04:00
. id_table = idmouse_table ,
2009-07-13 01:58:23 +04:00
. supports_autosuspend = 1 ,
2005-04-17 02:20:36 +04:00
} ;
static int idmouse_create_image ( struct usb_idmouse * dev )
{
2006-11-06 19:37:20 +03:00
int bytes_read ;
int bulk_read ;
int result ;
2005-04-17 02:20:36 +04:00
2005-05-06 21:05:39 +04:00
memcpy ( dev - > bulk_in_buffer , HEADER , sizeof ( HEADER ) - 1 ) ;
2006-11-06 19:37:20 +03:00
bytes_read = sizeof ( HEADER ) - 1 ;
2005-04-17 02:20:36 +04:00
2005-05-06 21:05:39 +04:00
/* reset the device and set a fast blink rate */
result = ftip_command ( dev , FTIP_RELEASE , 0 , 0 ) ;
2005-04-17 02:20:36 +04:00
if ( result < 0 )
2005-05-06 21:05:39 +04:00
goto reset ;
result = ftip_command ( dev , FTIP_BLINK , 1 , 0 ) ;
2005-04-17 02:20:36 +04:00
if ( result < 0 )
2005-05-06 21:05:39 +04:00
goto reset ;
2005-04-17 02:20:36 +04:00
2005-05-06 21:05:39 +04:00
/* initialize the sensor - sending this command twice */
/* significantly reduces the rate of failed reads */
result = ftip_command ( dev , FTIP_ACQUIRE , 0 , 0 ) ;
2005-04-17 02:20:36 +04:00
if ( result < 0 )
2005-05-06 21:05:39 +04:00
goto reset ;
result = ftip_command ( dev , FTIP_ACQUIRE , 0 , 0 ) ;
2005-04-17 02:20:36 +04:00
if ( result < 0 )
2005-05-06 21:05:39 +04:00
goto reset ;
/* start the readout - sending this command twice */
/* presumably enables the high dynamic range mode */
result = ftip_command ( dev , FTIP_RESET , 0 , 0 ) ;
2005-04-17 02:20:36 +04:00
if ( result < 0 )
2005-05-06 21:05:39 +04:00
goto reset ;
result = ftip_command ( dev , FTIP_RESET , 0 , 0 ) ;
if ( result < 0 )
goto reset ;
2005-04-17 02:20:36 +04:00
/* loop over a blocking bulk read to get data from the device */
while ( bytes_read < IMGSIZE ) {
result = usb_bulk_msg ( dev - > udev ,
usb_rcvbulkpipe ( dev - > udev , dev - > bulk_in_endpointAddr ) ,
dev - > bulk_in_buffer + bytes_read ,
dev - > bulk_in_size , & bulk_read , 5000 ) ;
2005-05-06 21:05:39 +04:00
if ( result < 0 ) {
/* Maybe this error was caused by the increased packet size? */
/* Reset to the original value and tell userspace to retry. */
if ( dev - > bulk_in_size ! = dev - > orig_bi_size ) {
dev - > bulk_in_size = dev - > orig_bi_size ;
result = - EAGAIN ;
}
break ;
}
if ( signal_pending ( current ) ) {
result = - EINTR ;
break ;
}
2005-04-17 02:20:36 +04:00
bytes_read + = bulk_read ;
}
/* reset the device */
2005-05-06 21:05:39 +04:00
reset :
ftip_command ( dev , FTIP_RELEASE , 0 , 0 ) ;
/* check for valid image */
/* right border should be black (0x00) */
for ( bytes_read = sizeof ( HEADER ) - 1 + WIDTH - 1 ; bytes_read < IMGSIZE ; bytes_read + = WIDTH )
if ( dev - > bulk_in_buffer [ bytes_read ] ! = 0x00 )
return - EAGAIN ;
2005-04-17 02:20:36 +04:00
2005-05-06 21:05:39 +04:00
/* lower border should be white (0xFF) */
for ( bytes_read = IMGSIZE - WIDTH ; bytes_read < IMGSIZE - 1 ; bytes_read + + )
if ( dev - > bulk_in_buffer [ bytes_read ] ! = 0xFF )
return - EAGAIN ;
/* should be IMGSIZE == 65040 */
2005-04-17 02:20:36 +04:00
dbg ( " read %d bytes fingerprint data " , bytes_read ) ;
2005-05-06 21:05:39 +04:00
return result ;
2005-04-17 02:20:36 +04:00
}
2009-07-13 01:58:23 +04:00
/* PM operations are nops as this driver does IO only during open() */
static int idmouse_suspend ( struct usb_interface * intf , pm_message_t message )
{
return 0 ;
}
static int idmouse_resume ( struct usb_interface * intf )
{
return 0 ;
}
2005-04-17 02:20:36 +04:00
static inline void idmouse_delete ( struct usb_idmouse * dev )
{
kfree ( dev - > bulk_in_buffer ) ;
kfree ( dev ) ;
}
static int idmouse_open ( struct inode * inode , struct file * file )
{
2006-11-06 19:37:20 +03:00
struct usb_idmouse * dev ;
2005-04-17 02:20:36 +04:00
struct usb_interface * interface ;
2006-11-06 19:37:20 +03:00
int result ;
2005-04-17 02:20:36 +04:00
/* get the interface from minor number and driver information */
interface = usb_find_interface ( & idmouse_driver , iminor ( inode ) ) ;
USB: prevent char device open/deregister race
This patch (as908) adds central protection in usbcore for the
prototypical race between opening and unregistering a char device.
The spinlock used to protect the minor-numbers array is replaced with
an rwsem, which can remain locked across a call to a driver's open()
method. This guarantees that open() and deregister() will be mutually
exclusive.
The private locks currently used in several individual drivers for
this purpose are no longer necessary, and the patch removes them. The
following USB drivers are affected: usblcd, idmouse, auerswald,
legousbtower, sisusbvga/sisusb, ldusb, adutux, iowarrior, and
usb-skeleton.
As a side effect of this change, usb_deregister_dev() must not be
called while holding a lock that is acquired by open(). Unfortunately
a number of drivers do this, but luckily the solution is simple: call
usb_deregister_dev() before acquiring the lock.
In addition to these changes (and their consequent code
simplifications), the patch fixes a use-after-free bug in adutux and a
race between open() and release() in iowarrior.
Signed-off-by: Alan Stern <stern@rowland.harvard.edu>
Signed-off-by: Greg Kroah-Hartman <gregkh@suse.de>
2007-05-22 19:46:41 +04:00
if ( ! interface )
2005-04-17 02:20:36 +04:00
return - ENODEV ;
USB: prevent char device open/deregister race
This patch (as908) adds central protection in usbcore for the
prototypical race between opening and unregistering a char device.
The spinlock used to protect the minor-numbers array is replaced with
an rwsem, which can remain locked across a call to a driver's open()
method. This guarantees that open() and deregister() will be mutually
exclusive.
The private locks currently used in several individual drivers for
this purpose are no longer necessary, and the patch removes them. The
following USB drivers are affected: usblcd, idmouse, auerswald,
legousbtower, sisusbvga/sisusb, ldusb, adutux, iowarrior, and
usb-skeleton.
As a side effect of this change, usb_deregister_dev() must not be
called while holding a lock that is acquired by open(). Unfortunately
a number of drivers do this, but luckily the solution is simple: call
usb_deregister_dev() before acquiring the lock.
In addition to these changes (and their consequent code
simplifications), the patch fixes a use-after-free bug in adutux and a
race between open() and release() in iowarrior.
Signed-off-by: Alan Stern <stern@rowland.harvard.edu>
Signed-off-by: Greg Kroah-Hartman <gregkh@suse.de>
2007-05-22 19:46:41 +04:00
2007-10-23 16:23:13 +04:00
mutex_lock ( & open_disc_mutex ) ;
2005-04-17 02:20:36 +04:00
/* get the device information block from the interface */
dev = usb_get_intfdata ( interface ) ;
2007-10-23 16:23:13 +04:00
if ( ! dev ) {
mutex_unlock ( & open_disc_mutex ) ;
2005-04-17 02:20:36 +04:00
return - ENODEV ;
2007-10-23 16:23:13 +04:00
}
2005-04-17 02:20:36 +04:00
/* lock this device */
2007-10-23 16:23:13 +04:00
mutex_lock ( & dev - > lock ) ;
mutex_unlock ( & open_disc_mutex ) ;
2005-04-17 02:20:36 +04:00
/* check if already open */
if ( dev - > open ) {
/* already open, so fail */
result = - EBUSY ;
} else {
/* create a new image and check for success */
2009-07-13 01:58:23 +04:00
result = usb_autopm_get_interface ( interface ) ;
if ( result )
goto error ;
2005-04-17 02:20:36 +04:00
result = idmouse_create_image ( dev ) ;
if ( result )
goto error ;
2009-07-13 01:58:23 +04:00
usb_autopm_put_interface ( interface ) ;
2005-04-17 02:20:36 +04:00
/* increment our usage count for the driver */
+ + dev - > open ;
/* save our object in the file's private structure */
file - > private_data = dev ;
}
error :
/* unlock this device */
2007-10-23 16:23:13 +04:00
mutex_unlock ( & dev - > lock ) ;
2005-04-17 02:20:36 +04:00
return result ;
}
static int idmouse_release ( struct inode * inode , struct file * file )
{
struct usb_idmouse * dev ;
2006-12-20 13:42:12 +03:00
dev = file - > private_data ;
2005-04-17 02:20:36 +04:00
USB: prevent char device open/deregister race
This patch (as908) adds central protection in usbcore for the
prototypical race between opening and unregistering a char device.
The spinlock used to protect the minor-numbers array is replaced with
an rwsem, which can remain locked across a call to a driver's open()
method. This guarantees that open() and deregister() will be mutually
exclusive.
The private locks currently used in several individual drivers for
this purpose are no longer necessary, and the patch removes them. The
following USB drivers are affected: usblcd, idmouse, auerswald,
legousbtower, sisusbvga/sisusb, ldusb, adutux, iowarrior, and
usb-skeleton.
As a side effect of this change, usb_deregister_dev() must not be
called while holding a lock that is acquired by open(). Unfortunately
a number of drivers do this, but luckily the solution is simple: call
usb_deregister_dev() before acquiring the lock.
In addition to these changes (and their consequent code
simplifications), the patch fixes a use-after-free bug in adutux and a
race between open() and release() in iowarrior.
Signed-off-by: Alan Stern <stern@rowland.harvard.edu>
Signed-off-by: Greg Kroah-Hartman <gregkh@suse.de>
2007-05-22 19:46:41 +04:00
if ( dev = = NULL )
2005-04-17 02:20:36 +04:00
return - ENODEV ;
2007-10-23 16:23:13 +04:00
mutex_lock ( & open_disc_mutex ) ;
2005-04-17 02:20:36 +04:00
/* lock our device */
2007-10-23 16:23:13 +04:00
mutex_lock ( & dev - > lock ) ;
2005-04-17 02:20:36 +04:00
/* are we really open? */
if ( dev - > open < = 0 ) {
2007-10-23 16:23:13 +04:00
mutex_unlock ( & dev - > lock ) ;
mutex_unlock ( & open_disc_mutex ) ;
2005-04-17 02:20:36 +04:00
return - ENODEV ;
}
- - dev - > open ;
if ( ! dev - > present ) {
/* the device was unplugged before the file was released */
2007-10-23 16:23:13 +04:00
mutex_unlock ( & dev - > lock ) ;
mutex_unlock ( & open_disc_mutex ) ;
2005-04-17 02:20:36 +04:00
idmouse_delete ( dev ) ;
USB: prevent char device open/deregister race
This patch (as908) adds central protection in usbcore for the
prototypical race between opening and unregistering a char device.
The spinlock used to protect the minor-numbers array is replaced with
an rwsem, which can remain locked across a call to a driver's open()
method. This guarantees that open() and deregister() will be mutually
exclusive.
The private locks currently used in several individual drivers for
this purpose are no longer necessary, and the patch removes them. The
following USB drivers are affected: usblcd, idmouse, auerswald,
legousbtower, sisusbvga/sisusb, ldusb, adutux, iowarrior, and
usb-skeleton.
As a side effect of this change, usb_deregister_dev() must not be
called while holding a lock that is acquired by open(). Unfortunately
a number of drivers do this, but luckily the solution is simple: call
usb_deregister_dev() before acquiring the lock.
In addition to these changes (and their consequent code
simplifications), the patch fixes a use-after-free bug in adutux and a
race between open() and release() in iowarrior.
Signed-off-by: Alan Stern <stern@rowland.harvard.edu>
Signed-off-by: Greg Kroah-Hartman <gregkh@suse.de>
2007-05-22 19:46:41 +04:00
} else {
2007-10-23 16:23:13 +04:00
mutex_unlock ( & dev - > lock ) ;
mutex_unlock ( & open_disc_mutex ) ;
2005-04-17 02:20:36 +04:00
}
return 0 ;
}
static ssize_t idmouse_read ( struct file * file , char __user * buffer , size_t count ,
loff_t * ppos )
{
2006-12-20 13:42:12 +03:00
struct usb_idmouse * dev = file - > private_data ;
2006-11-06 19:37:20 +03:00
int result ;
2005-04-17 02:20:36 +04:00
2005-05-06 21:05:39 +04:00
/* lock this object */
2007-10-23 16:23:13 +04:00
mutex_lock ( & dev - > lock ) ;
2005-04-17 02:20:36 +04:00
2005-05-06 21:05:39 +04:00
/* verify that the device wasn't unplugged */
2005-04-17 02:20:36 +04:00
if ( ! dev - > present ) {
2007-10-23 16:23:13 +04:00
mutex_unlock ( & dev - > lock ) ;
2005-04-17 02:20:36 +04:00
return - ENODEV ;
}
2005-10-29 14:56:13 +04:00
result = simple_read_from_buffer ( buffer , count , ppos ,
dev - > bulk_in_buffer , IMGSIZE ) ;
2005-05-06 21:05:39 +04:00
/* unlock the device */
2007-10-23 16:23:13 +04:00
mutex_unlock ( & dev - > lock ) ;
2005-04-17 02:20:36 +04:00
return result ;
}
static int idmouse_probe ( struct usb_interface * interface ,
const struct usb_device_id * id )
{
struct usb_device * udev = interface_to_usbdev ( interface ) ;
2006-11-06 19:37:20 +03:00
struct usb_idmouse * dev ;
2005-04-17 02:20:36 +04:00
struct usb_host_interface * iface_desc ;
struct usb_endpoint_descriptor * endpoint ;
int result ;
/* check if we have gotten the data or the hid interface */
iface_desc = & interface - > altsetting [ 0 ] ;
if ( iface_desc - > desc . bInterfaceClass ! = 0x0A )
return - ENODEV ;
/* allocate memory for our device state and initialize it */
2006-01-07 00:36:27 +03:00
dev = kzalloc ( sizeof ( * dev ) , GFP_KERNEL ) ;
2005-04-17 02:20:36 +04:00
if ( dev = = NULL )
return - ENOMEM ;
2007-10-23 16:23:13 +04:00
mutex_init ( & dev - > lock ) ;
2005-04-17 02:20:36 +04:00
dev - > udev = udev ;
dev - > interface = interface ;
/* set up the endpoint information - use only the first bulk-in endpoint */
endpoint = & iface_desc - > endpoint [ 0 ] . desc ;
2006-10-26 20:02:52 +04:00
if ( ! dev - > bulk_in_endpointAddr & & usb_endpoint_is_bulk_in ( endpoint ) ) {
2005-04-17 02:20:36 +04:00
/* we found a bulk in endpoint */
2005-05-06 21:05:39 +04:00
dev - > orig_bi_size = le16_to_cpu ( endpoint - > wMaxPacketSize ) ;
dev - > bulk_in_size = 0x200 ; /* works _much_ faster */
2005-04-17 02:20:36 +04:00
dev - > bulk_in_endpointAddr = endpoint - > bEndpointAddress ;
dev - > bulk_in_buffer =
2005-05-06 21:05:39 +04:00
kmalloc ( IMGSIZE + dev - > bulk_in_size , GFP_KERNEL ) ;
2005-04-17 02:20:36 +04:00
if ( ! dev - > bulk_in_buffer ) {
err ( " Unable to allocate input buffer. " ) ;
idmouse_delete ( dev ) ;
return - ENOMEM ;
}
}
if ( ! ( dev - > bulk_in_endpointAddr ) ) {
err ( " Unable to find bulk-in endpoint. " ) ;
idmouse_delete ( dev ) ;
return - ENODEV ;
}
/* allow device read, write and ioctl */
dev - > present = 1 ;
/* we can register the device now, as it is ready */
usb_set_intfdata ( interface , dev ) ;
result = usb_register_dev ( interface , & idmouse_class ) ;
if ( result ) {
/* something prevented us from registering this device */
err ( " Unble to allocate minor number. " ) ;
usb_set_intfdata ( interface , NULL ) ;
idmouse_delete ( dev ) ;
return result ;
}
/* be noisy */
dev_info ( & interface - > dev , " %s now attached \n " , DRIVER_DESC ) ;
return 0 ;
}
static void idmouse_disconnect ( struct usb_interface * interface )
{
struct usb_idmouse * dev ;
/* get device structure */
dev = usb_get_intfdata ( interface ) ;
/* give back our minor */
usb_deregister_dev ( interface , & idmouse_class ) ;
2007-10-23 16:23:13 +04:00
mutex_lock ( & open_disc_mutex ) ;
usb_set_intfdata ( interface , NULL ) ;
/* lock the device */
mutex_lock ( & dev - > lock ) ;
mutex_unlock ( & open_disc_mutex ) ;
USB: prevent char device open/deregister race
This patch (as908) adds central protection in usbcore for the
prototypical race between opening and unregistering a char device.
The spinlock used to protect the minor-numbers array is replaced with
an rwsem, which can remain locked across a call to a driver's open()
method. This guarantees that open() and deregister() will be mutually
exclusive.
The private locks currently used in several individual drivers for
this purpose are no longer necessary, and the patch removes them. The
following USB drivers are affected: usblcd, idmouse, auerswald,
legousbtower, sisusbvga/sisusb, ldusb, adutux, iowarrior, and
usb-skeleton.
As a side effect of this change, usb_deregister_dev() must not be
called while holding a lock that is acquired by open(). Unfortunately
a number of drivers do this, but luckily the solution is simple: call
usb_deregister_dev() before acquiring the lock.
In addition to these changes (and their consequent code
simplifications), the patch fixes a use-after-free bug in adutux and a
race between open() and release() in iowarrior.
Signed-off-by: Alan Stern <stern@rowland.harvard.edu>
Signed-off-by: Greg Kroah-Hartman <gregkh@suse.de>
2007-05-22 19:46:41 +04:00
2005-04-17 02:20:36 +04:00
/* prevent device read, write and ioctl */
dev - > present = 0 ;
/* if the device is opened, idmouse_release will clean this up */
USB: prevent char device open/deregister race
This patch (as908) adds central protection in usbcore for the
prototypical race between opening and unregistering a char device.
The spinlock used to protect the minor-numbers array is replaced with
an rwsem, which can remain locked across a call to a driver's open()
method. This guarantees that open() and deregister() will be mutually
exclusive.
The private locks currently used in several individual drivers for
this purpose are no longer necessary, and the patch removes them. The
following USB drivers are affected: usblcd, idmouse, auerswald,
legousbtower, sisusbvga/sisusb, ldusb, adutux, iowarrior, and
usb-skeleton.
As a side effect of this change, usb_deregister_dev() must not be
called while holding a lock that is acquired by open(). Unfortunately
a number of drivers do this, but luckily the solution is simple: call
usb_deregister_dev() before acquiring the lock.
In addition to these changes (and their consequent code
simplifications), the patch fixes a use-after-free bug in adutux and a
race between open() and release() in iowarrior.
Signed-off-by: Alan Stern <stern@rowland.harvard.edu>
Signed-off-by: Greg Kroah-Hartman <gregkh@suse.de>
2007-05-22 19:46:41 +04:00
if ( ! dev - > open ) {
2007-10-23 16:23:13 +04:00
mutex_unlock ( & dev - > lock ) ;
2005-04-17 02:20:36 +04:00
idmouse_delete ( dev ) ;
USB: prevent char device open/deregister race
This patch (as908) adds central protection in usbcore for the
prototypical race between opening and unregistering a char device.
The spinlock used to protect the minor-numbers array is replaced with
an rwsem, which can remain locked across a call to a driver's open()
method. This guarantees that open() and deregister() will be mutually
exclusive.
The private locks currently used in several individual drivers for
this purpose are no longer necessary, and the patch removes them. The
following USB drivers are affected: usblcd, idmouse, auerswald,
legousbtower, sisusbvga/sisusb, ldusb, adutux, iowarrior, and
usb-skeleton.
As a side effect of this change, usb_deregister_dev() must not be
called while holding a lock that is acquired by open(). Unfortunately
a number of drivers do this, but luckily the solution is simple: call
usb_deregister_dev() before acquiring the lock.
In addition to these changes (and their consequent code
simplifications), the patch fixes a use-after-free bug in adutux and a
race between open() and release() in iowarrior.
Signed-off-by: Alan Stern <stern@rowland.harvard.edu>
Signed-off-by: Greg Kroah-Hartman <gregkh@suse.de>
2007-05-22 19:46:41 +04:00
} else {
/* unlock */
2007-10-23 16:23:13 +04:00
mutex_unlock ( & dev - > lock ) ;
USB: prevent char device open/deregister race
This patch (as908) adds central protection in usbcore for the
prototypical race between opening and unregistering a char device.
The spinlock used to protect the minor-numbers array is replaced with
an rwsem, which can remain locked across a call to a driver's open()
method. This guarantees that open() and deregister() will be mutually
exclusive.
The private locks currently used in several individual drivers for
this purpose are no longer necessary, and the patch removes them. The
following USB drivers are affected: usblcd, idmouse, auerswald,
legousbtower, sisusbvga/sisusb, ldusb, adutux, iowarrior, and
usb-skeleton.
As a side effect of this change, usb_deregister_dev() must not be
called while holding a lock that is acquired by open(). Unfortunately
a number of drivers do this, but luckily the solution is simple: call
usb_deregister_dev() before acquiring the lock.
In addition to these changes (and their consequent code
simplifications), the patch fixes a use-after-free bug in adutux and a
race between open() and release() in iowarrior.
Signed-off-by: Alan Stern <stern@rowland.harvard.edu>
Signed-off-by: Greg Kroah-Hartman <gregkh@suse.de>
2007-05-22 19:46:41 +04:00
}
2005-04-17 02:20:36 +04:00
2008-08-19 00:21:04 +04:00
dev_info ( & interface - > dev , " disconnected \n " ) ;
2005-04-17 02:20:36 +04:00
}
static int __init usb_idmouse_init ( void )
{
int result ;
2008-08-19 00:21:04 +04:00
printk ( KERN_INFO KBUILD_MODNAME " : " DRIVER_VERSION " : "
DRIVER_DESC " \n " ) ;
2005-04-17 02:20:36 +04:00
/* register this driver with the USB subsystem */
result = usb_register ( & idmouse_driver ) ;
if ( result )
err ( " Unable to register device (error %d). " , result ) ;
return result ;
}
static void __exit usb_idmouse_exit ( void )
{
/* deregister this driver with the USB subsystem */
usb_deregister ( & idmouse_driver ) ;
}
module_init ( usb_idmouse_init ) ;
module_exit ( usb_idmouse_exit ) ;
MODULE_AUTHOR ( DRIVER_AUTHOR ) ;
MODULE_DESCRIPTION ( DRIVER_DESC ) ;
MODULE_LICENSE ( " GPL " ) ;