2019-05-27 09:55:07 +03:00
|
|
|
// SPDX-License-Identifier: GPL-2.0-or-later
|
2010-04-17 01:29:02 +04:00
|
|
|
/*
|
|
|
|
* imon.c: input and display driver for SoundGraph iMON IR/VFD/LCD
|
|
|
|
*
|
2010-09-15 22:56:03 +04:00
|
|
|
* Copyright(C) 2010 Jarod Wilson <jarod@wilsonet.com>
|
2010-04-17 01:29:02 +04:00
|
|
|
* Portions based on the original lirc_imon driver,
|
|
|
|
* Copyright(C) 2004 Venky Raju(dev@venky.ws)
|
|
|
|
*
|
|
|
|
* Huge thanks to R. Geoff Newbury for invaluable debugging on the
|
|
|
|
* 0xffdc iMON devices, and for sending me one to hack on, without
|
|
|
|
* which the support for them wouldn't be nearly as good. Thanks
|
|
|
|
* also to the numerous 0xffdc device owners that tested auto-config
|
|
|
|
* support for me and provided debug dumps from their devices.
|
|
|
|
*/
|
|
|
|
|
2010-06-20 11:20:46 +04:00
|
|
|
#define pr_fmt(fmt) KBUILD_MODNAME ":%s: " fmt, __func__
|
|
|
|
|
2010-04-17 01:29:02 +04:00
|
|
|
#include <linux/errno.h>
|
|
|
|
#include <linux/init.h>
|
|
|
|
#include <linux/kernel.h>
|
2017-11-06 17:06:10 +03:00
|
|
|
#include <linux/ktime.h>
|
2010-04-17 01:29:02 +04:00
|
|
|
#include <linux/module.h>
|
|
|
|
#include <linux/slab.h>
|
|
|
|
#include <linux/uaccess.h>
|
2011-07-14 21:20:46 +04:00
|
|
|
#include <linux/ratelimit.h>
|
2010-04-17 01:29:02 +04:00
|
|
|
|
|
|
|
#include <linux/input.h>
|
|
|
|
#include <linux/usb.h>
|
|
|
|
#include <linux/usb/input.h>
|
2010-11-17 19:28:38 +03:00
|
|
|
#include <media/rc-core.h>
|
2010-04-17 01:29:02 +04:00
|
|
|
|
|
|
|
#include <linux/timer.h>
|
|
|
|
|
|
|
|
#define MOD_AUTHOR "Jarod Wilson <jarod@wilsonet.com>"
|
|
|
|
#define MOD_DESC "Driver for SoundGraph iMON MultiMedia IR/Display"
|
|
|
|
#define MOD_NAME "imon"
|
2012-01-26 19:04:11 +04:00
|
|
|
#define MOD_VERSION "0.9.4"
|
2010-04-17 01:29:02 +04:00
|
|
|
|
|
|
|
#define DISPLAY_MINOR_BASE 144
|
|
|
|
#define DEVICE_NAME "lcd%d"
|
|
|
|
|
|
|
|
#define BUF_CHUNK_SIZE 8
|
|
|
|
#define BUF_SIZE 128
|
|
|
|
|
|
|
|
#define BIT_DURATION 250 /* each bit received is 250us */
|
|
|
|
|
|
|
|
#define IMON_CLOCK_ENABLE_PACKETS 2
|
|
|
|
|
|
|
|
/*** P R O T O T Y P E S ***/
|
|
|
|
|
|
|
|
/* USB Callback prototypes */
|
|
|
|
static int imon_probe(struct usb_interface *interface,
|
|
|
|
const struct usb_device_id *id);
|
|
|
|
static void imon_disconnect(struct usb_interface *interface);
|
|
|
|
static void usb_rx_callback_intf0(struct urb *urb);
|
|
|
|
static void usb_rx_callback_intf1(struct urb *urb);
|
|
|
|
static void usb_tx_callback(struct urb *urb);
|
|
|
|
|
|
|
|
/* suspend/resume support */
|
|
|
|
static int imon_resume(struct usb_interface *intf);
|
|
|
|
static int imon_suspend(struct usb_interface *intf, pm_message_t message);
|
|
|
|
|
|
|
|
/* Display file_operations function prototypes */
|
|
|
|
static int display_open(struct inode *inode, struct file *file);
|
|
|
|
static int display_close(struct inode *inode, struct file *file);
|
|
|
|
|
|
|
|
/* VFD write operation */
|
2014-04-04 03:34:53 +04:00
|
|
|
static ssize_t vfd_write(struct file *file, const char __user *buf,
|
2010-04-17 01:29:02 +04:00
|
|
|
size_t n_bytes, loff_t *pos);
|
|
|
|
|
|
|
|
/* LCD file_operations override function prototypes */
|
2014-04-04 03:34:53 +04:00
|
|
|
static ssize_t lcd_write(struct file *file, const char __user *buf,
|
2010-04-17 01:29:02 +04:00
|
|
|
size_t n_bytes, loff_t *pos);
|
|
|
|
|
|
|
|
/*** G L O B A L S ***/
|
|
|
|
|
2014-07-26 21:56:01 +04:00
|
|
|
struct imon_panel_key_table {
|
|
|
|
u64 hw_code;
|
|
|
|
u32 keycode;
|
|
|
|
};
|
|
|
|
|
|
|
|
struct imon_usb_dev_descr {
|
|
|
|
__u16 flags;
|
|
|
|
#define IMON_NO_FLAGS 0
|
|
|
|
#define IMON_NEED_20MS_PKT_DELAY 1
|
2019-09-20 19:11:39 +03:00
|
|
|
#define IMON_SUPPRESS_REPEATED_KEYS 2
|
2014-07-26 21:56:01 +04:00
|
|
|
struct imon_panel_key_table key_table[];
|
|
|
|
};
|
|
|
|
|
2010-04-17 01:29:02 +04:00
|
|
|
struct imon_context {
|
|
|
|
struct device *dev;
|
|
|
|
/* Newer devices have two interfaces */
|
|
|
|
struct usb_device *usbdev_intf0;
|
|
|
|
struct usb_device *usbdev_intf1;
|
|
|
|
|
|
|
|
bool display_supported; /* not all controllers do */
|
|
|
|
bool display_isopen; /* display port has been opened */
|
2010-05-24 19:02:05 +04:00
|
|
|
bool rf_device; /* true if iMON 2.4G LT/DT RF device */
|
2010-04-17 01:29:02 +04:00
|
|
|
bool rf_isassociating; /* RF remote associating */
|
|
|
|
bool dev_present_intf0; /* USB device presence, interface 0 */
|
|
|
|
bool dev_present_intf1; /* USB device presence, interface 1 */
|
|
|
|
|
|
|
|
struct mutex lock; /* to lock this object */
|
|
|
|
wait_queue_head_t remove_ok; /* For unexpected USB disconnects */
|
|
|
|
|
|
|
|
struct usb_endpoint_descriptor *rx_endpoint_intf0;
|
|
|
|
struct usb_endpoint_descriptor *rx_endpoint_intf1;
|
|
|
|
struct usb_endpoint_descriptor *tx_endpoint;
|
|
|
|
struct urb *rx_urb_intf0;
|
|
|
|
struct urb *rx_urb_intf1;
|
|
|
|
struct urb *tx_urb;
|
|
|
|
bool tx_control;
|
|
|
|
unsigned char usb_rx_buf[8];
|
|
|
|
unsigned char usb_tx_buf[8];
|
2013-02-18 21:42:47 +04:00
|
|
|
unsigned int send_packet_delay;
|
2010-04-17 01:29:02 +04:00
|
|
|
|
|
|
|
struct tx_t {
|
|
|
|
unsigned char data_buf[35]; /* user data buffer */
|
|
|
|
struct completion finished; /* wait for write to finish */
|
|
|
|
bool busy; /* write in progress */
|
|
|
|
int status; /* status of tx completion */
|
|
|
|
} tx;
|
|
|
|
|
|
|
|
u16 vendor; /* usb vendor ID */
|
|
|
|
u16 product; /* usb product ID */
|
|
|
|
|
2010-10-29 23:08:23 +04:00
|
|
|
struct rc_dev *rdev; /* rc-core device for remote */
|
2010-09-15 22:42:07 +04:00
|
|
|
struct input_dev *idev; /* input device for panel & IR mouse */
|
2010-04-17 01:29:02 +04:00
|
|
|
struct input_dev *touch; /* input device for touchscreen */
|
|
|
|
|
2010-09-15 22:56:03 +04:00
|
|
|
spinlock_t kc_lock; /* make sure we get keycodes right */
|
2010-04-17 01:29:02 +04:00
|
|
|
u32 kc; /* current input keycode */
|
|
|
|
u32 last_keycode; /* last reported input keycode */
|
2010-09-15 22:42:07 +04:00
|
|
|
u32 rc_scancode; /* the computed remote scancode */
|
|
|
|
u8 rc_toggle; /* the computed remote toggle bit */
|
2017-08-07 23:20:58 +03:00
|
|
|
u64 rc_proto; /* iMON or MCE (RC6) IR protocol? */
|
2010-04-17 01:29:02 +04:00
|
|
|
bool release_code; /* some keys send a release code */
|
|
|
|
|
|
|
|
u8 display_type; /* store the display type */
|
|
|
|
bool pad_mouse; /* toggle kbd(0)/mouse(1) mode */
|
|
|
|
|
2010-09-15 22:42:07 +04:00
|
|
|
char name_rdev[128]; /* rc input device name */
|
|
|
|
char phys_rdev[64]; /* rc input device phys path */
|
|
|
|
|
2010-04-17 01:29:02 +04:00
|
|
|
char name_idev[128]; /* input device name */
|
|
|
|
char phys_idev[64]; /* input device phys path */
|
|
|
|
|
|
|
|
char name_touch[128]; /* touch screen name */
|
|
|
|
char phys_touch[64]; /* touch screen phys path */
|
|
|
|
struct timer_list ttimer; /* touch screen timer */
|
|
|
|
int touch_x; /* x coordinate on touchscreen */
|
|
|
|
int touch_y; /* y coordinate on touchscreen */
|
2019-09-20 19:11:39 +03:00
|
|
|
const struct imon_usb_dev_descr *dev_descr;
|
|
|
|
/* device description with key */
|
|
|
|
/* table for front panels */
|
media: imon: reorganize serialization
Since usb_register_dev() from imon_init_display() from imon_probe() holds
minor_rwsem while display_open() which holds driver_lock and ictx->lock is
called with minor_rwsem held from usb_open(), holding driver_lock or
ictx->lock when calling usb_register_dev() causes circular locking
dependency problem.
Since usb_deregister_dev() from imon_disconnect() holds minor_rwsem while
display_open() which holds driver_lock is called with minor_rwsem held,
holding driver_lock when calling usb_deregister_dev() also causes circular
locking dependency problem.
Sean Young explained that the problem is there are imon devices which have
two usb interfaces, even though it is one device. The probe and disconnect
function of both usb interfaces can run concurrently.
Alan Stern responded that the driver and USB cores guarantee that when an
interface is probed, both the interface and its USB device are locked.
Ditto for when the disconnect callback gets run. So concurrent probing/
disconnection of multiple interfaces on the same device is not possible.
Therefore, we don't need locks for handling race between imon_probe() and
imon_disconnect(). But we still need to handle race between display_open()
/vfd_write()/lcd_write()/display_close() and imon_disconnect(), for
disconnect event can happen while file descriptors are in use.
Since "struct file"->private_data is set by display_open(), vfd_write()/
lcd_write()/display_close() can assume that "struct file"->private_data
is not NULL even after usb_set_intfdata(interface, NULL) was called.
Replace insufficiently held driver_lock with refcount_t based management.
Add a boolean flag for recording whether imon_disconnect() was already
called. Use RCU for accessing this boolean flag and refcount_t.
Since the boolean flag for imon_disconnect() is shared, disconnect event
on either intf0 or intf1 affects both interfaces. But I assume that this
change does not matter, for usually disconnect event would not happen
while interfaces are in use.
Link: https://syzkaller.appspot.com/bug?extid=c558267ad910fc494497
Reported-by: syzbot <syzbot+c558267ad910fc494497@syzkaller.appspotmail.com>
Signed-off-by: Tetsuo Handa <penguin-kernel@I-love.SAKURA.ne.jp>
Tested-by: syzbot <syzbot+c558267ad910fc494497@syzkaller.appspotmail.com>
Cc: Alan Stern <stern@rowland.harvard.edu>
Signed-off-by: Sean Young <sean@mess.org>
Signed-off-by: Mauro Carvalho Chehab <mchehab@kernel.org>
2022-05-02 06:49:04 +03:00
|
|
|
/*
|
|
|
|
* Fields for deferring free_imon_context().
|
|
|
|
*
|
|
|
|
* Since reference to "struct imon_context" is stored into
|
|
|
|
* "struct file"->private_data, we need to remember
|
|
|
|
* how many file descriptors might access this "struct imon_context".
|
|
|
|
*/
|
|
|
|
refcount_t users;
|
|
|
|
/*
|
|
|
|
* Use a flag for telling display_open()/vfd_write()/lcd_write() that
|
|
|
|
* imon_disconnect() was already called.
|
|
|
|
*/
|
|
|
|
bool disconnected;
|
|
|
|
/*
|
|
|
|
* We need to wait for RCU grace period in order to allow
|
|
|
|
* display_open() to safely check ->disconnected and increment ->users.
|
|
|
|
*/
|
|
|
|
struct rcu_head rcu;
|
2010-04-17 01:29:02 +04:00
|
|
|
};
|
|
|
|
|
|
|
|
#define TOUCH_TIMEOUT (HZ/30)
|
|
|
|
|
|
|
|
/* vfd character device file operations */
|
|
|
|
static const struct file_operations vfd_fops = {
|
|
|
|
.owner = THIS_MODULE,
|
media: imon: reorganize serialization
Since usb_register_dev() from imon_init_display() from imon_probe() holds
minor_rwsem while display_open() which holds driver_lock and ictx->lock is
called with minor_rwsem held from usb_open(), holding driver_lock or
ictx->lock when calling usb_register_dev() causes circular locking
dependency problem.
Since usb_deregister_dev() from imon_disconnect() holds minor_rwsem while
display_open() which holds driver_lock is called with minor_rwsem held,
holding driver_lock when calling usb_deregister_dev() also causes circular
locking dependency problem.
Sean Young explained that the problem is there are imon devices which have
two usb interfaces, even though it is one device. The probe and disconnect
function of both usb interfaces can run concurrently.
Alan Stern responded that the driver and USB cores guarantee that when an
interface is probed, both the interface and its USB device are locked.
Ditto for when the disconnect callback gets run. So concurrent probing/
disconnection of multiple interfaces on the same device is not possible.
Therefore, we don't need locks for handling race between imon_probe() and
imon_disconnect(). But we still need to handle race between display_open()
/vfd_write()/lcd_write()/display_close() and imon_disconnect(), for
disconnect event can happen while file descriptors are in use.
Since "struct file"->private_data is set by display_open(), vfd_write()/
lcd_write()/display_close() can assume that "struct file"->private_data
is not NULL even after usb_set_intfdata(interface, NULL) was called.
Replace insufficiently held driver_lock with refcount_t based management.
Add a boolean flag for recording whether imon_disconnect() was already
called. Use RCU for accessing this boolean flag and refcount_t.
Since the boolean flag for imon_disconnect() is shared, disconnect event
on either intf0 or intf1 affects both interfaces. But I assume that this
change does not matter, for usually disconnect event would not happen
while interfaces are in use.
Link: https://syzkaller.appspot.com/bug?extid=c558267ad910fc494497
Reported-by: syzbot <syzbot+c558267ad910fc494497@syzkaller.appspotmail.com>
Signed-off-by: Tetsuo Handa <penguin-kernel@I-love.SAKURA.ne.jp>
Tested-by: syzbot <syzbot+c558267ad910fc494497@syzkaller.appspotmail.com>
Cc: Alan Stern <stern@rowland.harvard.edu>
Signed-off-by: Sean Young <sean@mess.org>
Signed-off-by: Mauro Carvalho Chehab <mchehab@kernel.org>
2022-05-02 06:49:04 +03:00
|
|
|
.open = display_open,
|
|
|
|
.write = vfd_write,
|
|
|
|
.release = display_close,
|
llseek: automatically add .llseek fop
All file_operations should get a .llseek operation so we can make
nonseekable_open the default for future file operations without a
.llseek pointer.
The three cases that we can automatically detect are no_llseek, seq_lseek
and default_llseek. For cases where we can we can automatically prove that
the file offset is always ignored, we use noop_llseek, which maintains
the current behavior of not returning an error from a seek.
New drivers should normally not use noop_llseek but instead use no_llseek
and call nonseekable_open at open time. Existing drivers can be converted
to do the same when the maintainer knows for certain that no user code
relies on calling seek on the device file.
The generated code is often incorrectly indented and right now contains
comments that clarify for each added line why a specific variant was
chosen. In the version that gets submitted upstream, the comments will
be gone and I will manually fix the indentation, because there does not
seem to be a way to do that using coccinelle.
Some amount of new code is currently sitting in linux-next that should get
the same modifications, which I will do at the end of the merge window.
Many thanks to Julia Lawall for helping me learn to write a semantic
patch that does all this.
===== begin semantic patch =====
// This adds an llseek= method to all file operations,
// as a preparation for making no_llseek the default.
//
// The rules are
// - use no_llseek explicitly if we do nonseekable_open
// - use seq_lseek for sequential files
// - use default_llseek if we know we access f_pos
// - use noop_llseek if we know we don't access f_pos,
// but we still want to allow users to call lseek
//
@ open1 exists @
identifier nested_open;
@@
nested_open(...)
{
<+...
nonseekable_open(...)
...+>
}
@ open exists@
identifier open_f;
identifier i, f;
identifier open1.nested_open;
@@
int open_f(struct inode *i, struct file *f)
{
<+...
(
nonseekable_open(...)
|
nested_open(...)
)
...+>
}
@ read disable optional_qualifier exists @
identifier read_f;
identifier f, p, s, off;
type ssize_t, size_t, loff_t;
expression E;
identifier func;
@@
ssize_t read_f(struct file *f, char *p, size_t s, loff_t *off)
{
<+...
(
*off = E
|
*off += E
|
func(..., off, ...)
|
E = *off
)
...+>
}
@ read_no_fpos disable optional_qualifier exists @
identifier read_f;
identifier f, p, s, off;
type ssize_t, size_t, loff_t;
@@
ssize_t read_f(struct file *f, char *p, size_t s, loff_t *off)
{
... when != off
}
@ write @
identifier write_f;
identifier f, p, s, off;
type ssize_t, size_t, loff_t;
expression E;
identifier func;
@@
ssize_t write_f(struct file *f, const char *p, size_t s, loff_t *off)
{
<+...
(
*off = E
|
*off += E
|
func(..., off, ...)
|
E = *off
)
...+>
}
@ write_no_fpos @
identifier write_f;
identifier f, p, s, off;
type ssize_t, size_t, loff_t;
@@
ssize_t write_f(struct file *f, const char *p, size_t s, loff_t *off)
{
... when != off
}
@ fops0 @
identifier fops;
@@
struct file_operations fops = {
...
};
@ has_llseek depends on fops0 @
identifier fops0.fops;
identifier llseek_f;
@@
struct file_operations fops = {
...
.llseek = llseek_f,
...
};
@ has_read depends on fops0 @
identifier fops0.fops;
identifier read_f;
@@
struct file_operations fops = {
...
.read = read_f,
...
};
@ has_write depends on fops0 @
identifier fops0.fops;
identifier write_f;
@@
struct file_operations fops = {
...
.write = write_f,
...
};
@ has_open depends on fops0 @
identifier fops0.fops;
identifier open_f;
@@
struct file_operations fops = {
...
.open = open_f,
...
};
// use no_llseek if we call nonseekable_open
////////////////////////////////////////////
@ nonseekable1 depends on !has_llseek && has_open @
identifier fops0.fops;
identifier nso ~= "nonseekable_open";
@@
struct file_operations fops = {
... .open = nso, ...
+.llseek = no_llseek, /* nonseekable */
};
@ nonseekable2 depends on !has_llseek @
identifier fops0.fops;
identifier open.open_f;
@@
struct file_operations fops = {
... .open = open_f, ...
+.llseek = no_llseek, /* open uses nonseekable */
};
// use seq_lseek for sequential files
/////////////////////////////////////
@ seq depends on !has_llseek @
identifier fops0.fops;
identifier sr ~= "seq_read";
@@
struct file_operations fops = {
... .read = sr, ...
+.llseek = seq_lseek, /* we have seq_read */
};
// use default_llseek if there is a readdir
///////////////////////////////////////////
@ fops1 depends on !has_llseek && !nonseekable1 && !nonseekable2 && !seq @
identifier fops0.fops;
identifier readdir_e;
@@
// any other fop is used that changes pos
struct file_operations fops = {
... .readdir = readdir_e, ...
+.llseek = default_llseek, /* readdir is present */
};
// use default_llseek if at least one of read/write touches f_pos
/////////////////////////////////////////////////////////////////
@ fops2 depends on !fops1 && !has_llseek && !nonseekable1 && !nonseekable2 && !seq @
identifier fops0.fops;
identifier read.read_f;
@@
// read fops use offset
struct file_operations fops = {
... .read = read_f, ...
+.llseek = default_llseek, /* read accesses f_pos */
};
@ fops3 depends on !fops1 && !fops2 && !has_llseek && !nonseekable1 && !nonseekable2 && !seq @
identifier fops0.fops;
identifier write.write_f;
@@
// write fops use offset
struct file_operations fops = {
... .write = write_f, ...
+ .llseek = default_llseek, /* write accesses f_pos */
};
// Use noop_llseek if neither read nor write accesses f_pos
///////////////////////////////////////////////////////////
@ fops4 depends on !fops1 && !fops2 && !fops3 && !has_llseek && !nonseekable1 && !nonseekable2 && !seq @
identifier fops0.fops;
identifier read_no_fpos.read_f;
identifier write_no_fpos.write_f;
@@
// write fops use offset
struct file_operations fops = {
...
.write = write_f,
.read = read_f,
...
+.llseek = noop_llseek, /* read and write both use no f_pos */
};
@ depends on has_write && !has_read && !fops1 && !fops2 && !has_llseek && !nonseekable1 && !nonseekable2 && !seq @
identifier fops0.fops;
identifier write_no_fpos.write_f;
@@
struct file_operations fops = {
... .write = write_f, ...
+.llseek = noop_llseek, /* write uses no f_pos */
};
@ depends on has_read && !has_write && !fops1 && !fops2 && !has_llseek && !nonseekable1 && !nonseekable2 && !seq @
identifier fops0.fops;
identifier read_no_fpos.read_f;
@@
struct file_operations fops = {
... .read = read_f, ...
+.llseek = noop_llseek, /* read uses no f_pos */
};
@ depends on !has_read && !has_write && !fops1 && !fops2 && !has_llseek && !nonseekable1 && !nonseekable2 && !seq @
identifier fops0.fops;
@@
struct file_operations fops = {
...
+.llseek = noop_llseek, /* no read or write fn */
};
===== End semantic patch =====
Signed-off-by: Arnd Bergmann <arnd@arndb.de>
Cc: Julia Lawall <julia@diku.dk>
Cc: Christoph Hellwig <hch@infradead.org>
2010-08-15 20:52:59 +04:00
|
|
|
.llseek = noop_llseek,
|
2010-04-17 01:29:02 +04:00
|
|
|
};
|
|
|
|
|
|
|
|
/* lcd character device file operations */
|
|
|
|
static const struct file_operations lcd_fops = {
|
|
|
|
.owner = THIS_MODULE,
|
media: imon: reorganize serialization
Since usb_register_dev() from imon_init_display() from imon_probe() holds
minor_rwsem while display_open() which holds driver_lock and ictx->lock is
called with minor_rwsem held from usb_open(), holding driver_lock or
ictx->lock when calling usb_register_dev() causes circular locking
dependency problem.
Since usb_deregister_dev() from imon_disconnect() holds minor_rwsem while
display_open() which holds driver_lock is called with minor_rwsem held,
holding driver_lock when calling usb_deregister_dev() also causes circular
locking dependency problem.
Sean Young explained that the problem is there are imon devices which have
two usb interfaces, even though it is one device. The probe and disconnect
function of both usb interfaces can run concurrently.
Alan Stern responded that the driver and USB cores guarantee that when an
interface is probed, both the interface and its USB device are locked.
Ditto for when the disconnect callback gets run. So concurrent probing/
disconnection of multiple interfaces on the same device is not possible.
Therefore, we don't need locks for handling race between imon_probe() and
imon_disconnect(). But we still need to handle race between display_open()
/vfd_write()/lcd_write()/display_close() and imon_disconnect(), for
disconnect event can happen while file descriptors are in use.
Since "struct file"->private_data is set by display_open(), vfd_write()/
lcd_write()/display_close() can assume that "struct file"->private_data
is not NULL even after usb_set_intfdata(interface, NULL) was called.
Replace insufficiently held driver_lock with refcount_t based management.
Add a boolean flag for recording whether imon_disconnect() was already
called. Use RCU for accessing this boolean flag and refcount_t.
Since the boolean flag for imon_disconnect() is shared, disconnect event
on either intf0 or intf1 affects both interfaces. But I assume that this
change does not matter, for usually disconnect event would not happen
while interfaces are in use.
Link: https://syzkaller.appspot.com/bug?extid=c558267ad910fc494497
Reported-by: syzbot <syzbot+c558267ad910fc494497@syzkaller.appspotmail.com>
Signed-off-by: Tetsuo Handa <penguin-kernel@I-love.SAKURA.ne.jp>
Tested-by: syzbot <syzbot+c558267ad910fc494497@syzkaller.appspotmail.com>
Cc: Alan Stern <stern@rowland.harvard.edu>
Signed-off-by: Sean Young <sean@mess.org>
Signed-off-by: Mauro Carvalho Chehab <mchehab@kernel.org>
2022-05-02 06:49:04 +03:00
|
|
|
.open = display_open,
|
|
|
|
.write = lcd_write,
|
|
|
|
.release = display_close,
|
llseek: automatically add .llseek fop
All file_operations should get a .llseek operation so we can make
nonseekable_open the default for future file operations without a
.llseek pointer.
The three cases that we can automatically detect are no_llseek, seq_lseek
and default_llseek. For cases where we can we can automatically prove that
the file offset is always ignored, we use noop_llseek, which maintains
the current behavior of not returning an error from a seek.
New drivers should normally not use noop_llseek but instead use no_llseek
and call nonseekable_open at open time. Existing drivers can be converted
to do the same when the maintainer knows for certain that no user code
relies on calling seek on the device file.
The generated code is often incorrectly indented and right now contains
comments that clarify for each added line why a specific variant was
chosen. In the version that gets submitted upstream, the comments will
be gone and I will manually fix the indentation, because there does not
seem to be a way to do that using coccinelle.
Some amount of new code is currently sitting in linux-next that should get
the same modifications, which I will do at the end of the merge window.
Many thanks to Julia Lawall for helping me learn to write a semantic
patch that does all this.
===== begin semantic patch =====
// This adds an llseek= method to all file operations,
// as a preparation for making no_llseek the default.
//
// The rules are
// - use no_llseek explicitly if we do nonseekable_open
// - use seq_lseek for sequential files
// - use default_llseek if we know we access f_pos
// - use noop_llseek if we know we don't access f_pos,
// but we still want to allow users to call lseek
//
@ open1 exists @
identifier nested_open;
@@
nested_open(...)
{
<+...
nonseekable_open(...)
...+>
}
@ open exists@
identifier open_f;
identifier i, f;
identifier open1.nested_open;
@@
int open_f(struct inode *i, struct file *f)
{
<+...
(
nonseekable_open(...)
|
nested_open(...)
)
...+>
}
@ read disable optional_qualifier exists @
identifier read_f;
identifier f, p, s, off;
type ssize_t, size_t, loff_t;
expression E;
identifier func;
@@
ssize_t read_f(struct file *f, char *p, size_t s, loff_t *off)
{
<+...
(
*off = E
|
*off += E
|
func(..., off, ...)
|
E = *off
)
...+>
}
@ read_no_fpos disable optional_qualifier exists @
identifier read_f;
identifier f, p, s, off;
type ssize_t, size_t, loff_t;
@@
ssize_t read_f(struct file *f, char *p, size_t s, loff_t *off)
{
... when != off
}
@ write @
identifier write_f;
identifier f, p, s, off;
type ssize_t, size_t, loff_t;
expression E;
identifier func;
@@
ssize_t write_f(struct file *f, const char *p, size_t s, loff_t *off)
{
<+...
(
*off = E
|
*off += E
|
func(..., off, ...)
|
E = *off
)
...+>
}
@ write_no_fpos @
identifier write_f;
identifier f, p, s, off;
type ssize_t, size_t, loff_t;
@@
ssize_t write_f(struct file *f, const char *p, size_t s, loff_t *off)
{
... when != off
}
@ fops0 @
identifier fops;
@@
struct file_operations fops = {
...
};
@ has_llseek depends on fops0 @
identifier fops0.fops;
identifier llseek_f;
@@
struct file_operations fops = {
...
.llseek = llseek_f,
...
};
@ has_read depends on fops0 @
identifier fops0.fops;
identifier read_f;
@@
struct file_operations fops = {
...
.read = read_f,
...
};
@ has_write depends on fops0 @
identifier fops0.fops;
identifier write_f;
@@
struct file_operations fops = {
...
.write = write_f,
...
};
@ has_open depends on fops0 @
identifier fops0.fops;
identifier open_f;
@@
struct file_operations fops = {
...
.open = open_f,
...
};
// use no_llseek if we call nonseekable_open
////////////////////////////////////////////
@ nonseekable1 depends on !has_llseek && has_open @
identifier fops0.fops;
identifier nso ~= "nonseekable_open";
@@
struct file_operations fops = {
... .open = nso, ...
+.llseek = no_llseek, /* nonseekable */
};
@ nonseekable2 depends on !has_llseek @
identifier fops0.fops;
identifier open.open_f;
@@
struct file_operations fops = {
... .open = open_f, ...
+.llseek = no_llseek, /* open uses nonseekable */
};
// use seq_lseek for sequential files
/////////////////////////////////////
@ seq depends on !has_llseek @
identifier fops0.fops;
identifier sr ~= "seq_read";
@@
struct file_operations fops = {
... .read = sr, ...
+.llseek = seq_lseek, /* we have seq_read */
};
// use default_llseek if there is a readdir
///////////////////////////////////////////
@ fops1 depends on !has_llseek && !nonseekable1 && !nonseekable2 && !seq @
identifier fops0.fops;
identifier readdir_e;
@@
// any other fop is used that changes pos
struct file_operations fops = {
... .readdir = readdir_e, ...
+.llseek = default_llseek, /* readdir is present */
};
// use default_llseek if at least one of read/write touches f_pos
/////////////////////////////////////////////////////////////////
@ fops2 depends on !fops1 && !has_llseek && !nonseekable1 && !nonseekable2 && !seq @
identifier fops0.fops;
identifier read.read_f;
@@
// read fops use offset
struct file_operations fops = {
... .read = read_f, ...
+.llseek = default_llseek, /* read accesses f_pos */
};
@ fops3 depends on !fops1 && !fops2 && !has_llseek && !nonseekable1 && !nonseekable2 && !seq @
identifier fops0.fops;
identifier write.write_f;
@@
// write fops use offset
struct file_operations fops = {
... .write = write_f, ...
+ .llseek = default_llseek, /* write accesses f_pos */
};
// Use noop_llseek if neither read nor write accesses f_pos
///////////////////////////////////////////////////////////
@ fops4 depends on !fops1 && !fops2 && !fops3 && !has_llseek && !nonseekable1 && !nonseekable2 && !seq @
identifier fops0.fops;
identifier read_no_fpos.read_f;
identifier write_no_fpos.write_f;
@@
// write fops use offset
struct file_operations fops = {
...
.write = write_f,
.read = read_f,
...
+.llseek = noop_llseek, /* read and write both use no f_pos */
};
@ depends on has_write && !has_read && !fops1 && !fops2 && !has_llseek && !nonseekable1 && !nonseekable2 && !seq @
identifier fops0.fops;
identifier write_no_fpos.write_f;
@@
struct file_operations fops = {
... .write = write_f, ...
+.llseek = noop_llseek, /* write uses no f_pos */
};
@ depends on has_read && !has_write && !fops1 && !fops2 && !has_llseek && !nonseekable1 && !nonseekable2 && !seq @
identifier fops0.fops;
identifier read_no_fpos.read_f;
@@
struct file_operations fops = {
... .read = read_f, ...
+.llseek = noop_llseek, /* read uses no f_pos */
};
@ depends on !has_read && !has_write && !fops1 && !fops2 && !has_llseek && !nonseekable1 && !nonseekable2 && !seq @
identifier fops0.fops;
@@
struct file_operations fops = {
...
+.llseek = noop_llseek, /* no read or write fn */
};
===== End semantic patch =====
Signed-off-by: Arnd Bergmann <arnd@arndb.de>
Cc: Julia Lawall <julia@diku.dk>
Cc: Christoph Hellwig <hch@infradead.org>
2010-08-15 20:52:59 +04:00
|
|
|
.llseek = noop_llseek,
|
2010-04-17 01:29:02 +04:00
|
|
|
};
|
|
|
|
|
|
|
|
enum {
|
|
|
|
IMON_DISPLAY_TYPE_AUTO = 0,
|
|
|
|
IMON_DISPLAY_TYPE_VFD = 1,
|
|
|
|
IMON_DISPLAY_TYPE_LCD = 2,
|
|
|
|
IMON_DISPLAY_TYPE_VGA = 3,
|
|
|
|
IMON_DISPLAY_TYPE_NONE = 4,
|
|
|
|
};
|
|
|
|
|
|
|
|
enum {
|
|
|
|
IMON_KEY_IMON = 0,
|
|
|
|
IMON_KEY_MCE = 1,
|
|
|
|
IMON_KEY_PANEL = 2,
|
|
|
|
};
|
|
|
|
|
2014-07-26 21:56:01 +04:00
|
|
|
static struct usb_class_driver imon_vfd_class = {
|
|
|
|
.name = DEVICE_NAME,
|
|
|
|
.fops = &vfd_fops,
|
|
|
|
.minor_base = DISPLAY_MINOR_BASE,
|
|
|
|
};
|
|
|
|
|
|
|
|
static struct usb_class_driver imon_lcd_class = {
|
|
|
|
.name = DEVICE_NAME,
|
|
|
|
.fops = &lcd_fops,
|
|
|
|
.minor_base = DISPLAY_MINOR_BASE,
|
|
|
|
};
|
|
|
|
|
|
|
|
/* imon receiver front panel/knob key table */
|
|
|
|
static const struct imon_usb_dev_descr imon_default_table = {
|
|
|
|
.flags = IMON_NO_FLAGS,
|
|
|
|
.key_table = {
|
|
|
|
{ 0x000000000f00ffeell, KEY_MEDIA }, /* Go */
|
|
|
|
{ 0x000000001200ffeell, KEY_UP },
|
|
|
|
{ 0x000000001300ffeell, KEY_DOWN },
|
|
|
|
{ 0x000000001400ffeell, KEY_LEFT },
|
|
|
|
{ 0x000000001500ffeell, KEY_RIGHT },
|
|
|
|
{ 0x000000001600ffeell, KEY_ENTER },
|
|
|
|
{ 0x000000001700ffeell, KEY_ESC },
|
|
|
|
{ 0x000000001f00ffeell, KEY_AUDIO },
|
|
|
|
{ 0x000000002000ffeell, KEY_VIDEO },
|
|
|
|
{ 0x000000002100ffeell, KEY_CAMERA },
|
|
|
|
{ 0x000000002700ffeell, KEY_DVD },
|
|
|
|
{ 0x000000002300ffeell, KEY_TV },
|
|
|
|
{ 0x000000002b00ffeell, KEY_EXIT },
|
|
|
|
{ 0x000000002c00ffeell, KEY_SELECT },
|
|
|
|
{ 0x000000002d00ffeell, KEY_MENU },
|
|
|
|
{ 0x000000000500ffeell, KEY_PREVIOUS },
|
|
|
|
{ 0x000000000700ffeell, KEY_REWIND },
|
|
|
|
{ 0x000000000400ffeell, KEY_STOP },
|
|
|
|
{ 0x000000003c00ffeell, KEY_PLAYPAUSE },
|
|
|
|
{ 0x000000000800ffeell, KEY_FASTFORWARD },
|
|
|
|
{ 0x000000000600ffeell, KEY_NEXT },
|
|
|
|
{ 0x000000010000ffeell, KEY_RIGHT },
|
|
|
|
{ 0x000001000000ffeell, KEY_LEFT },
|
|
|
|
{ 0x000000003d00ffeell, KEY_SELECT },
|
|
|
|
{ 0x000100000000ffeell, KEY_VOLUMEUP },
|
|
|
|
{ 0x010000000000ffeell, KEY_VOLUMEDOWN },
|
|
|
|
{ 0x000000000100ffeell, KEY_MUTE },
|
|
|
|
/* 0xffdc iMON MCE VFD */
|
|
|
|
{ 0x00010000ffffffeell, KEY_VOLUMEUP },
|
|
|
|
{ 0x01000000ffffffeell, KEY_VOLUMEDOWN },
|
|
|
|
{ 0x00000001ffffffeell, KEY_MUTE },
|
|
|
|
{ 0x0000000fffffffeell, KEY_MEDIA },
|
|
|
|
{ 0x00000012ffffffeell, KEY_UP },
|
|
|
|
{ 0x00000013ffffffeell, KEY_DOWN },
|
|
|
|
{ 0x00000014ffffffeell, KEY_LEFT },
|
|
|
|
{ 0x00000015ffffffeell, KEY_RIGHT },
|
|
|
|
{ 0x00000016ffffffeell, KEY_ENTER },
|
|
|
|
{ 0x00000017ffffffeell, KEY_ESC },
|
|
|
|
/* iMON Knob values */
|
|
|
|
{ 0x000100ffffffffeell, KEY_VOLUMEUP },
|
|
|
|
{ 0x010000ffffffffeell, KEY_VOLUMEDOWN },
|
|
|
|
{ 0x000008ffffffffeell, KEY_MUTE },
|
|
|
|
{ 0, KEY_RESERVED },
|
|
|
|
}
|
|
|
|
};
|
|
|
|
|
|
|
|
static const struct imon_usb_dev_descr imon_OEM_VFD = {
|
|
|
|
.flags = IMON_NEED_20MS_PKT_DELAY,
|
|
|
|
.key_table = {
|
|
|
|
{ 0x000000000f00ffeell, KEY_MEDIA }, /* Go */
|
|
|
|
{ 0x000000001200ffeell, KEY_UP },
|
|
|
|
{ 0x000000001300ffeell, KEY_DOWN },
|
|
|
|
{ 0x000000001400ffeell, KEY_LEFT },
|
|
|
|
{ 0x000000001500ffeell, KEY_RIGHT },
|
|
|
|
{ 0x000000001600ffeell, KEY_ENTER },
|
|
|
|
{ 0x000000001700ffeell, KEY_ESC },
|
|
|
|
{ 0x000000001f00ffeell, KEY_AUDIO },
|
|
|
|
{ 0x000000002b00ffeell, KEY_EXIT },
|
|
|
|
{ 0x000000002c00ffeell, KEY_SELECT },
|
|
|
|
{ 0x000000002d00ffeell, KEY_MENU },
|
|
|
|
{ 0x000000000500ffeell, KEY_PREVIOUS },
|
|
|
|
{ 0x000000000700ffeell, KEY_REWIND },
|
|
|
|
{ 0x000000000400ffeell, KEY_STOP },
|
|
|
|
{ 0x000000003c00ffeell, KEY_PLAYPAUSE },
|
|
|
|
{ 0x000000000800ffeell, KEY_FASTFORWARD },
|
|
|
|
{ 0x000000000600ffeell, KEY_NEXT },
|
|
|
|
{ 0x000000010000ffeell, KEY_RIGHT },
|
|
|
|
{ 0x000001000000ffeell, KEY_LEFT },
|
|
|
|
{ 0x000000003d00ffeell, KEY_SELECT },
|
|
|
|
{ 0x000100000000ffeell, KEY_VOLUMEUP },
|
|
|
|
{ 0x010000000000ffeell, KEY_VOLUMEDOWN },
|
|
|
|
{ 0x000000000100ffeell, KEY_MUTE },
|
|
|
|
/* 0xffdc iMON MCE VFD */
|
|
|
|
{ 0x00010000ffffffeell, KEY_VOLUMEUP },
|
|
|
|
{ 0x01000000ffffffeell, KEY_VOLUMEDOWN },
|
|
|
|
{ 0x00000001ffffffeell, KEY_MUTE },
|
|
|
|
{ 0x0000000fffffffeell, KEY_MEDIA },
|
|
|
|
{ 0x00000012ffffffeell, KEY_UP },
|
|
|
|
{ 0x00000013ffffffeell, KEY_DOWN },
|
|
|
|
{ 0x00000014ffffffeell, KEY_LEFT },
|
|
|
|
{ 0x00000015ffffffeell, KEY_RIGHT },
|
|
|
|
{ 0x00000016ffffffeell, KEY_ENTER },
|
|
|
|
{ 0x00000017ffffffeell, KEY_ESC },
|
|
|
|
/* iMON Knob values */
|
|
|
|
{ 0x000100ffffffffeell, KEY_VOLUMEUP },
|
|
|
|
{ 0x010000ffffffffeell, KEY_VOLUMEDOWN },
|
|
|
|
{ 0x000008ffffffffeell, KEY_MUTE },
|
|
|
|
{ 0, KEY_RESERVED },
|
|
|
|
}
|
2013-02-18 21:42:47 +04:00
|
|
|
};
|
|
|
|
|
2014-07-26 21:59:07 +04:00
|
|
|
/* imon receiver front panel/knob key table for DH102*/
|
|
|
|
static const struct imon_usb_dev_descr imon_DH102 = {
|
|
|
|
.flags = IMON_NO_FLAGS,
|
|
|
|
.key_table = {
|
|
|
|
{ 0x000100000000ffeell, KEY_VOLUMEUP },
|
|
|
|
{ 0x010000000000ffeell, KEY_VOLUMEDOWN },
|
|
|
|
{ 0x000000010000ffeell, KEY_MUTE },
|
|
|
|
{ 0x0000000f0000ffeell, KEY_MEDIA },
|
|
|
|
{ 0x000000120000ffeell, KEY_UP },
|
|
|
|
{ 0x000000130000ffeell, KEY_DOWN },
|
|
|
|
{ 0x000000140000ffeell, KEY_LEFT },
|
|
|
|
{ 0x000000150000ffeell, KEY_RIGHT },
|
|
|
|
{ 0x000000160000ffeell, KEY_ENTER },
|
|
|
|
{ 0x000000170000ffeell, KEY_ESC },
|
|
|
|
{ 0x0000002b0000ffeell, KEY_EXIT },
|
|
|
|
{ 0x0000002c0000ffeell, KEY_SELECT },
|
|
|
|
{ 0x0000002d0000ffeell, KEY_MENU },
|
|
|
|
{ 0, KEY_RESERVED }
|
|
|
|
}
|
|
|
|
};
|
|
|
|
|
2019-09-20 19:11:39 +03:00
|
|
|
/* imon ultrabay front panel key table */
|
|
|
|
static const struct imon_usb_dev_descr ultrabay_table = {
|
|
|
|
.flags = IMON_SUPPRESS_REPEATED_KEYS,
|
|
|
|
.key_table = {
|
|
|
|
{ 0x0000000f0000ffeell, KEY_MEDIA }, /* Go */
|
|
|
|
{ 0x000000000100ffeell, KEY_UP },
|
|
|
|
{ 0x000000000001ffeell, KEY_DOWN },
|
|
|
|
{ 0x000000160000ffeell, KEY_ENTER },
|
|
|
|
{ 0x0000001f0000ffeell, KEY_AUDIO }, /* Music */
|
|
|
|
{ 0x000000200000ffeell, KEY_VIDEO }, /* Movie */
|
|
|
|
{ 0x000000210000ffeell, KEY_CAMERA }, /* Photo */
|
|
|
|
{ 0x000000270000ffeell, KEY_DVD }, /* DVD */
|
|
|
|
{ 0x000000230000ffeell, KEY_TV }, /* TV */
|
|
|
|
{ 0x000000050000ffeell, KEY_PREVIOUS }, /* Previous */
|
|
|
|
{ 0x000000070000ffeell, KEY_REWIND },
|
|
|
|
{ 0x000000040000ffeell, KEY_STOP },
|
|
|
|
{ 0x000000020000ffeell, KEY_PLAYPAUSE },
|
|
|
|
{ 0x000000080000ffeell, KEY_FASTFORWARD },
|
|
|
|
{ 0x000000060000ffeell, KEY_NEXT }, /* Next */
|
|
|
|
{ 0x000100000000ffeell, KEY_VOLUMEUP },
|
|
|
|
{ 0x010000000000ffeell, KEY_VOLUMEDOWN },
|
|
|
|
{ 0x000000010000ffeell, KEY_MUTE },
|
|
|
|
{ 0, KEY_RESERVED },
|
|
|
|
}
|
|
|
|
};
|
|
|
|
|
2010-04-17 01:29:02 +04:00
|
|
|
/*
|
|
|
|
* USB Device ID for iMON USB Control Boards
|
|
|
|
*
|
|
|
|
* The Windows drivers contain 6 different inf files, more or less one for
|
|
|
|
* each new device until the 0x0034-0x0046 devices, which all use the same
|
|
|
|
* driver. Some of the devices in the 34-46 range haven't been definitively
|
|
|
|
* identified yet. Early devices have either a TriGem Computer, Inc. or a
|
|
|
|
* Samsung vendor ID (0x0aa8 and 0x04e8 respectively), while all later
|
|
|
|
* devices use the SoundGraph vendor ID (0x15c2). This driver only supports
|
|
|
|
* the ffdc and later devices, which do onboard decoding.
|
|
|
|
*/
|
2017-08-13 11:54:44 +03:00
|
|
|
static const struct usb_device_id imon_usb_id_table[] = {
|
2010-04-17 01:29:02 +04:00
|
|
|
/*
|
|
|
|
* Several devices with this same device ID, all use iMON_PAD.inf
|
|
|
|
* SoundGraph iMON PAD (IR & VFD)
|
|
|
|
* SoundGraph iMON PAD (IR & LCD)
|
|
|
|
* SoundGraph iMON Knob (IR only)
|
|
|
|
*/
|
2014-07-26 21:56:01 +04:00
|
|
|
{ USB_DEVICE(0x15c2, 0xffdc),
|
|
|
|
.driver_info = (unsigned long)&imon_default_table },
|
2010-04-17 01:29:02 +04:00
|
|
|
|
|
|
|
/*
|
|
|
|
* Newer devices, all driven by the latest iMON Windows driver, full
|
|
|
|
* list of device IDs extracted via 'strings Setup/data1.hdr |grep 15c2'
|
|
|
|
* Need user input to fill in details on unknown devices.
|
|
|
|
*/
|
|
|
|
/* SoundGraph iMON OEM Touch LCD (IR & 7" VGA LCD) */
|
2014-07-26 21:56:01 +04:00
|
|
|
{ USB_DEVICE(0x15c2, 0x0034),
|
2014-07-26 21:59:07 +04:00
|
|
|
.driver_info = (unsigned long)&imon_DH102 },
|
2010-04-17 01:29:02 +04:00
|
|
|
/* SoundGraph iMON OEM Touch LCD (IR & 4.3" VGA LCD) */
|
2014-07-26 21:56:01 +04:00
|
|
|
{ USB_DEVICE(0x15c2, 0x0035),
|
|
|
|
.driver_info = (unsigned long)&imon_default_table},
|
2010-04-17 01:29:02 +04:00
|
|
|
/* SoundGraph iMON OEM VFD (IR & VFD) */
|
2014-07-26 21:56:01 +04:00
|
|
|
{ USB_DEVICE(0x15c2, 0x0036),
|
|
|
|
.driver_info = (unsigned long)&imon_OEM_VFD },
|
2010-04-17 01:29:02 +04:00
|
|
|
/* device specifics unknown */
|
2014-07-26 21:56:01 +04:00
|
|
|
{ USB_DEVICE(0x15c2, 0x0037),
|
|
|
|
.driver_info = (unsigned long)&imon_default_table},
|
2010-04-17 01:29:02 +04:00
|
|
|
/* SoundGraph iMON OEM LCD (IR & LCD) */
|
2014-07-26 21:56:01 +04:00
|
|
|
{ USB_DEVICE(0x15c2, 0x0038),
|
|
|
|
.driver_info = (unsigned long)&imon_default_table},
|
2010-04-17 01:29:02 +04:00
|
|
|
/* SoundGraph iMON UltraBay (IR & LCD) */
|
2014-07-26 21:56:01 +04:00
|
|
|
{ USB_DEVICE(0x15c2, 0x0039),
|
|
|
|
.driver_info = (unsigned long)&imon_default_table},
|
2010-04-17 01:29:02 +04:00
|
|
|
/* device specifics unknown */
|
2014-07-26 21:56:01 +04:00
|
|
|
{ USB_DEVICE(0x15c2, 0x003a),
|
|
|
|
.driver_info = (unsigned long)&imon_default_table},
|
2010-04-17 01:29:02 +04:00
|
|
|
/* device specifics unknown */
|
2014-07-26 21:56:01 +04:00
|
|
|
{ USB_DEVICE(0x15c2, 0x003b),
|
|
|
|
.driver_info = (unsigned long)&imon_default_table},
|
2010-04-17 01:29:02 +04:00
|
|
|
/* SoundGraph iMON OEM Inside (IR only) */
|
2014-07-26 21:56:01 +04:00
|
|
|
{ USB_DEVICE(0x15c2, 0x003c),
|
|
|
|
.driver_info = (unsigned long)&imon_default_table},
|
2010-04-17 01:29:02 +04:00
|
|
|
/* device specifics unknown */
|
2014-07-26 21:56:01 +04:00
|
|
|
{ USB_DEVICE(0x15c2, 0x003d),
|
|
|
|
.driver_info = (unsigned long)&imon_default_table},
|
2010-04-17 01:29:02 +04:00
|
|
|
/* device specifics unknown */
|
2014-07-26 21:56:01 +04:00
|
|
|
{ USB_DEVICE(0x15c2, 0x003e),
|
|
|
|
.driver_info = (unsigned long)&imon_default_table},
|
2010-04-17 01:29:02 +04:00
|
|
|
/* device specifics unknown */
|
2014-07-26 21:56:01 +04:00
|
|
|
{ USB_DEVICE(0x15c2, 0x003f),
|
|
|
|
.driver_info = (unsigned long)&imon_default_table},
|
2010-04-17 01:29:02 +04:00
|
|
|
/* device specifics unknown */
|
2014-07-26 21:56:01 +04:00
|
|
|
{ USB_DEVICE(0x15c2, 0x0040),
|
|
|
|
.driver_info = (unsigned long)&imon_default_table},
|
2010-04-17 01:29:02 +04:00
|
|
|
/* SoundGraph iMON MINI (IR only) */
|
2014-07-26 21:56:01 +04:00
|
|
|
{ USB_DEVICE(0x15c2, 0x0041),
|
|
|
|
.driver_info = (unsigned long)&imon_default_table},
|
2010-04-17 01:29:02 +04:00
|
|
|
/* Antec Veris Multimedia Station EZ External (IR only) */
|
2014-07-26 21:56:01 +04:00
|
|
|
{ USB_DEVICE(0x15c2, 0x0042),
|
|
|
|
.driver_info = (unsigned long)&imon_default_table},
|
2010-04-17 01:29:02 +04:00
|
|
|
/* Antec Veris Multimedia Station Basic Internal (IR only) */
|
2014-07-26 21:56:01 +04:00
|
|
|
{ USB_DEVICE(0x15c2, 0x0043),
|
|
|
|
.driver_info = (unsigned long)&imon_default_table},
|
2010-04-17 01:29:02 +04:00
|
|
|
/* Antec Veris Multimedia Station Elite (IR & VFD) */
|
2014-07-26 21:56:01 +04:00
|
|
|
{ USB_DEVICE(0x15c2, 0x0044),
|
|
|
|
.driver_info = (unsigned long)&imon_default_table},
|
2010-04-17 01:29:02 +04:00
|
|
|
/* Antec Veris Multimedia Station Premiere (IR & LCD) */
|
2014-07-26 21:56:01 +04:00
|
|
|
{ USB_DEVICE(0x15c2, 0x0045),
|
|
|
|
.driver_info = (unsigned long)&imon_default_table},
|
2010-04-17 01:29:02 +04:00
|
|
|
/* device specifics unknown */
|
2014-07-26 21:56:01 +04:00
|
|
|
{ USB_DEVICE(0x15c2, 0x0046),
|
|
|
|
.driver_info = (unsigned long)&imon_default_table},
|
2010-04-17 01:29:02 +04:00
|
|
|
{}
|
|
|
|
};
|
|
|
|
|
|
|
|
/* USB Device data */
|
|
|
|
static struct usb_driver imon_driver = {
|
|
|
|
.name = MOD_NAME,
|
|
|
|
.probe = imon_probe,
|
2012-12-22 01:17:53 +04:00
|
|
|
.disconnect = imon_disconnect,
|
2010-04-17 01:29:02 +04:00
|
|
|
.suspend = imon_suspend,
|
|
|
|
.resume = imon_resume,
|
|
|
|
.id_table = imon_usb_id_table,
|
|
|
|
};
|
|
|
|
|
|
|
|
/* Module bookkeeping bits */
|
|
|
|
MODULE_AUTHOR(MOD_AUTHOR);
|
|
|
|
MODULE_DESCRIPTION(MOD_DESC);
|
|
|
|
MODULE_VERSION(MOD_VERSION);
|
|
|
|
MODULE_LICENSE("GPL");
|
|
|
|
MODULE_DEVICE_TABLE(usb, imon_usb_id_table);
|
|
|
|
|
|
|
|
static bool debug;
|
|
|
|
module_param(debug, bool, S_IRUGO | S_IWUSR);
|
2010-10-23 23:42:51 +04:00
|
|
|
MODULE_PARM_DESC(debug, "Debug messages: 0=no, 1=yes (default: no)");
|
2010-04-17 01:29:02 +04:00
|
|
|
|
|
|
|
/* lcd, vfd, vga or none? should be auto-detected, but can be overridden... */
|
|
|
|
static int display_type;
|
|
|
|
module_param(display_type, int, S_IRUGO);
|
[media] rc: don't break long lines
Due to the 80-cols restrictions, and latter due to checkpatch
warnings, several strings were broken into multiple lines. This
is not considered a good practice anymore, as it makes harder
to grep for strings at the source code.
As we're right now fixing other drivers due to KERN_CONT, we need
to be able to identify what printk strings don't end with a "\n".
It is a way easier to detect those if we don't break long lines.
So, join those continuation lines.
The patch was generated via the script below, and manually
adjusted if needed.
</script>
use Text::Tabs;
while (<>) {
if ($next ne "") {
$c=$_;
if ($c =~ /^\s+\"(.*)/) {
$c2=$1;
$next =~ s/\"\n$//;
$n = expand($next);
$funpos = index($n, '(');
$pos = index($c2, '",');
if ($funpos && $pos > 0) {
$s1 = substr $c2, 0, $pos + 2;
$s2 = ' ' x ($funpos + 1) . substr $c2, $pos + 2;
$s2 =~ s/^\s+//;
$s2 = ' ' x ($funpos + 1) . $s2 if ($s2 ne "");
print unexpand("$next$s1\n");
print unexpand("$s2\n") if ($s2 ne "");
} else {
print "$next$c2\n";
}
$next="";
next;
} else {
print $next;
}
$next="";
} else {
if (m/\"$/) {
if (!m/\\n\"$/) {
$next=$_;
next;
}
}
}
print $_;
}
</script>
Signed-off-by: Mauro Carvalho Chehab <mchehab@s-opensource.com>
2016-10-18 22:44:25 +03:00
|
|
|
MODULE_PARM_DESC(display_type, "Type of attached display. 0=autodetect, 1=vfd, 2=lcd, 3=vga, 4=none (default: autodetect)");
|
2010-04-17 01:29:02 +04:00
|
|
|
|
2010-04-23 09:27:11 +04:00
|
|
|
static int pad_stabilize = 1;
|
|
|
|
module_param(pad_stabilize, int, S_IRUGO | S_IWUSR);
|
[media] rc: don't break long lines
Due to the 80-cols restrictions, and latter due to checkpatch
warnings, several strings were broken into multiple lines. This
is not considered a good practice anymore, as it makes harder
to grep for strings at the source code.
As we're right now fixing other drivers due to KERN_CONT, we need
to be able to identify what printk strings don't end with a "\n".
It is a way easier to detect those if we don't break long lines.
So, join those continuation lines.
The patch was generated via the script below, and manually
adjusted if needed.
</script>
use Text::Tabs;
while (<>) {
if ($next ne "") {
$c=$_;
if ($c =~ /^\s+\"(.*)/) {
$c2=$1;
$next =~ s/\"\n$//;
$n = expand($next);
$funpos = index($n, '(');
$pos = index($c2, '",');
if ($funpos && $pos > 0) {
$s1 = substr $c2, 0, $pos + 2;
$s2 = ' ' x ($funpos + 1) . substr $c2, $pos + 2;
$s2 =~ s/^\s+//;
$s2 = ' ' x ($funpos + 1) . $s2 if ($s2 ne "");
print unexpand("$next$s1\n");
print unexpand("$s2\n") if ($s2 ne "");
} else {
print "$next$c2\n";
}
$next="";
next;
} else {
print $next;
}
$next="";
} else {
if (m/\"$/) {
if (!m/\\n\"$/) {
$next=$_;
next;
}
}
}
print $_;
}
</script>
Signed-off-by: Mauro Carvalho Chehab <mchehab@s-opensource.com>
2016-10-18 22:44:25 +03:00
|
|
|
MODULE_PARM_DESC(pad_stabilize, "Apply stabilization algorithm to iMON PAD presses in arrow key mode. 0=disable, 1=enable (default).");
|
2010-04-17 01:29:02 +04:00
|
|
|
|
|
|
|
/*
|
|
|
|
* In certain use cases, mouse mode isn't really helpful, and could actually
|
|
|
|
* cause confusion, so allow disabling it when the IR device is open.
|
|
|
|
*/
|
|
|
|
static bool nomouse;
|
|
|
|
module_param(nomouse, bool, S_IRUGO | S_IWUSR);
|
[media] rc: don't break long lines
Due to the 80-cols restrictions, and latter due to checkpatch
warnings, several strings were broken into multiple lines. This
is not considered a good practice anymore, as it makes harder
to grep for strings at the source code.
As we're right now fixing other drivers due to KERN_CONT, we need
to be able to identify what printk strings don't end with a "\n".
It is a way easier to detect those if we don't break long lines.
So, join those continuation lines.
The patch was generated via the script below, and manually
adjusted if needed.
</script>
use Text::Tabs;
while (<>) {
if ($next ne "") {
$c=$_;
if ($c =~ /^\s+\"(.*)/) {
$c2=$1;
$next =~ s/\"\n$//;
$n = expand($next);
$funpos = index($n, '(');
$pos = index($c2, '",');
if ($funpos && $pos > 0) {
$s1 = substr $c2, 0, $pos + 2;
$s2 = ' ' x ($funpos + 1) . substr $c2, $pos + 2;
$s2 =~ s/^\s+//;
$s2 = ' ' x ($funpos + 1) . $s2 if ($s2 ne "");
print unexpand("$next$s1\n");
print unexpand("$s2\n") if ($s2 ne "");
} else {
print "$next$c2\n";
}
$next="";
next;
} else {
print $next;
}
$next="";
} else {
if (m/\"$/) {
if (!m/\\n\"$/) {
$next=$_;
next;
}
}
}
print $_;
}
</script>
Signed-off-by: Mauro Carvalho Chehab <mchehab@s-opensource.com>
2016-10-18 22:44:25 +03:00
|
|
|
MODULE_PARM_DESC(nomouse, "Disable mouse input device mode when IR device is open. 0=don't disable, 1=disable. (default: don't disable)");
|
2010-04-17 01:29:02 +04:00
|
|
|
|
|
|
|
/* threshold at which a pad push registers as an arrow key in kbd mode */
|
|
|
|
static int pad_thresh;
|
|
|
|
module_param(pad_thresh, int, S_IRUGO | S_IWUSR);
|
[media] rc: don't break long lines
Due to the 80-cols restrictions, and latter due to checkpatch
warnings, several strings were broken into multiple lines. This
is not considered a good practice anymore, as it makes harder
to grep for strings at the source code.
As we're right now fixing other drivers due to KERN_CONT, we need
to be able to identify what printk strings don't end with a "\n".
It is a way easier to detect those if we don't break long lines.
So, join those continuation lines.
The patch was generated via the script below, and manually
adjusted if needed.
</script>
use Text::Tabs;
while (<>) {
if ($next ne "") {
$c=$_;
if ($c =~ /^\s+\"(.*)/) {
$c2=$1;
$next =~ s/\"\n$//;
$n = expand($next);
$funpos = index($n, '(');
$pos = index($c2, '",');
if ($funpos && $pos > 0) {
$s1 = substr $c2, 0, $pos + 2;
$s2 = ' ' x ($funpos + 1) . substr $c2, $pos + 2;
$s2 =~ s/^\s+//;
$s2 = ' ' x ($funpos + 1) . $s2 if ($s2 ne "");
print unexpand("$next$s1\n");
print unexpand("$s2\n") if ($s2 ne "");
} else {
print "$next$c2\n";
}
$next="";
next;
} else {
print $next;
}
$next="";
} else {
if (m/\"$/) {
if (!m/\\n\"$/) {
$next=$_;
next;
}
}
}
print $_;
}
</script>
Signed-off-by: Mauro Carvalho Chehab <mchehab@s-opensource.com>
2016-10-18 22:44:25 +03:00
|
|
|
MODULE_PARM_DESC(pad_thresh, "Threshold at which a pad push registers as an arrow key in kbd mode (default: 28)");
|
2010-04-17 01:29:02 +04:00
|
|
|
|
|
|
|
|
|
|
|
static void free_imon_context(struct imon_context *ictx)
|
|
|
|
{
|
|
|
|
struct device *dev = ictx->dev;
|
|
|
|
|
|
|
|
usb_free_urb(ictx->tx_urb);
|
media: imon: reorganize serialization
Since usb_register_dev() from imon_init_display() from imon_probe() holds
minor_rwsem while display_open() which holds driver_lock and ictx->lock is
called with minor_rwsem held from usb_open(), holding driver_lock or
ictx->lock when calling usb_register_dev() causes circular locking
dependency problem.
Since usb_deregister_dev() from imon_disconnect() holds minor_rwsem while
display_open() which holds driver_lock is called with minor_rwsem held,
holding driver_lock when calling usb_deregister_dev() also causes circular
locking dependency problem.
Sean Young explained that the problem is there are imon devices which have
two usb interfaces, even though it is one device. The probe and disconnect
function of both usb interfaces can run concurrently.
Alan Stern responded that the driver and USB cores guarantee that when an
interface is probed, both the interface and its USB device are locked.
Ditto for when the disconnect callback gets run. So concurrent probing/
disconnection of multiple interfaces on the same device is not possible.
Therefore, we don't need locks for handling race between imon_probe() and
imon_disconnect(). But we still need to handle race between display_open()
/vfd_write()/lcd_write()/display_close() and imon_disconnect(), for
disconnect event can happen while file descriptors are in use.
Since "struct file"->private_data is set by display_open(), vfd_write()/
lcd_write()/display_close() can assume that "struct file"->private_data
is not NULL even after usb_set_intfdata(interface, NULL) was called.
Replace insufficiently held driver_lock with refcount_t based management.
Add a boolean flag for recording whether imon_disconnect() was already
called. Use RCU for accessing this boolean flag and refcount_t.
Since the boolean flag for imon_disconnect() is shared, disconnect event
on either intf0 or intf1 affects both interfaces. But I assume that this
change does not matter, for usually disconnect event would not happen
while interfaces are in use.
Link: https://syzkaller.appspot.com/bug?extid=c558267ad910fc494497
Reported-by: syzbot <syzbot+c558267ad910fc494497@syzkaller.appspotmail.com>
Signed-off-by: Tetsuo Handa <penguin-kernel@I-love.SAKURA.ne.jp>
Tested-by: syzbot <syzbot+c558267ad910fc494497@syzkaller.appspotmail.com>
Cc: Alan Stern <stern@rowland.harvard.edu>
Signed-off-by: Sean Young <sean@mess.org>
Signed-off-by: Mauro Carvalho Chehab <mchehab@kernel.org>
2022-05-02 06:49:04 +03:00
|
|
|
WARN_ON(ictx->dev_present_intf0);
|
2010-04-17 01:29:02 +04:00
|
|
|
usb_free_urb(ictx->rx_urb_intf0);
|
media: imon: reorganize serialization
Since usb_register_dev() from imon_init_display() from imon_probe() holds
minor_rwsem while display_open() which holds driver_lock and ictx->lock is
called with minor_rwsem held from usb_open(), holding driver_lock or
ictx->lock when calling usb_register_dev() causes circular locking
dependency problem.
Since usb_deregister_dev() from imon_disconnect() holds minor_rwsem while
display_open() which holds driver_lock is called with minor_rwsem held,
holding driver_lock when calling usb_deregister_dev() also causes circular
locking dependency problem.
Sean Young explained that the problem is there are imon devices which have
two usb interfaces, even though it is one device. The probe and disconnect
function of both usb interfaces can run concurrently.
Alan Stern responded that the driver and USB cores guarantee that when an
interface is probed, both the interface and its USB device are locked.
Ditto for when the disconnect callback gets run. So concurrent probing/
disconnection of multiple interfaces on the same device is not possible.
Therefore, we don't need locks for handling race between imon_probe() and
imon_disconnect(). But we still need to handle race between display_open()
/vfd_write()/lcd_write()/display_close() and imon_disconnect(), for
disconnect event can happen while file descriptors are in use.
Since "struct file"->private_data is set by display_open(), vfd_write()/
lcd_write()/display_close() can assume that "struct file"->private_data
is not NULL even after usb_set_intfdata(interface, NULL) was called.
Replace insufficiently held driver_lock with refcount_t based management.
Add a boolean flag for recording whether imon_disconnect() was already
called. Use RCU for accessing this boolean flag and refcount_t.
Since the boolean flag for imon_disconnect() is shared, disconnect event
on either intf0 or intf1 affects both interfaces. But I assume that this
change does not matter, for usually disconnect event would not happen
while interfaces are in use.
Link: https://syzkaller.appspot.com/bug?extid=c558267ad910fc494497
Reported-by: syzbot <syzbot+c558267ad910fc494497@syzkaller.appspotmail.com>
Signed-off-by: Tetsuo Handa <penguin-kernel@I-love.SAKURA.ne.jp>
Tested-by: syzbot <syzbot+c558267ad910fc494497@syzkaller.appspotmail.com>
Cc: Alan Stern <stern@rowland.harvard.edu>
Signed-off-by: Sean Young <sean@mess.org>
Signed-off-by: Mauro Carvalho Chehab <mchehab@kernel.org>
2022-05-02 06:49:04 +03:00
|
|
|
WARN_ON(ictx->dev_present_intf1);
|
2010-04-17 01:29:02 +04:00
|
|
|
usb_free_urb(ictx->rx_urb_intf1);
|
media: imon: reorganize serialization
Since usb_register_dev() from imon_init_display() from imon_probe() holds
minor_rwsem while display_open() which holds driver_lock and ictx->lock is
called with minor_rwsem held from usb_open(), holding driver_lock or
ictx->lock when calling usb_register_dev() causes circular locking
dependency problem.
Since usb_deregister_dev() from imon_disconnect() holds minor_rwsem while
display_open() which holds driver_lock is called with minor_rwsem held,
holding driver_lock when calling usb_deregister_dev() also causes circular
locking dependency problem.
Sean Young explained that the problem is there are imon devices which have
two usb interfaces, even though it is one device. The probe and disconnect
function of both usb interfaces can run concurrently.
Alan Stern responded that the driver and USB cores guarantee that when an
interface is probed, both the interface and its USB device are locked.
Ditto for when the disconnect callback gets run. So concurrent probing/
disconnection of multiple interfaces on the same device is not possible.
Therefore, we don't need locks for handling race between imon_probe() and
imon_disconnect(). But we still need to handle race between display_open()
/vfd_write()/lcd_write()/display_close() and imon_disconnect(), for
disconnect event can happen while file descriptors are in use.
Since "struct file"->private_data is set by display_open(), vfd_write()/
lcd_write()/display_close() can assume that "struct file"->private_data
is not NULL even after usb_set_intfdata(interface, NULL) was called.
Replace insufficiently held driver_lock with refcount_t based management.
Add a boolean flag for recording whether imon_disconnect() was already
called. Use RCU for accessing this boolean flag and refcount_t.
Since the boolean flag for imon_disconnect() is shared, disconnect event
on either intf0 or intf1 affects both interfaces. But I assume that this
change does not matter, for usually disconnect event would not happen
while interfaces are in use.
Link: https://syzkaller.appspot.com/bug?extid=c558267ad910fc494497
Reported-by: syzbot <syzbot+c558267ad910fc494497@syzkaller.appspotmail.com>
Signed-off-by: Tetsuo Handa <penguin-kernel@I-love.SAKURA.ne.jp>
Tested-by: syzbot <syzbot+c558267ad910fc494497@syzkaller.appspotmail.com>
Cc: Alan Stern <stern@rowland.harvard.edu>
Signed-off-by: Sean Young <sean@mess.org>
Signed-off-by: Mauro Carvalho Chehab <mchehab@kernel.org>
2022-05-02 06:49:04 +03:00
|
|
|
kfree_rcu(ictx, rcu);
|
2010-04-17 01:29:02 +04:00
|
|
|
|
|
|
|
dev_dbg(dev, "%s: iMON context freed\n", __func__);
|
|
|
|
}
|
|
|
|
|
2017-11-27 18:27:54 +03:00
|
|
|
/*
|
2010-04-17 01:29:02 +04:00
|
|
|
* Called when the Display device (e.g. /dev/lcd0)
|
|
|
|
* is opened by the application.
|
|
|
|
*/
|
|
|
|
static int display_open(struct inode *inode, struct file *file)
|
|
|
|
{
|
|
|
|
struct usb_interface *interface;
|
|
|
|
struct imon_context *ictx = NULL;
|
|
|
|
int subminor;
|
|
|
|
int retval = 0;
|
|
|
|
|
|
|
|
subminor = iminor(inode);
|
|
|
|
interface = usb_find_interface(&imon_driver, subminor);
|
|
|
|
if (!interface) {
|
2010-06-20 11:20:46 +04:00
|
|
|
pr_err("could not find interface for minor %d\n", subminor);
|
2010-04-17 01:29:02 +04:00
|
|
|
retval = -ENODEV;
|
|
|
|
goto exit;
|
|
|
|
}
|
|
|
|
|
media: imon: reorganize serialization
Since usb_register_dev() from imon_init_display() from imon_probe() holds
minor_rwsem while display_open() which holds driver_lock and ictx->lock is
called with minor_rwsem held from usb_open(), holding driver_lock or
ictx->lock when calling usb_register_dev() causes circular locking
dependency problem.
Since usb_deregister_dev() from imon_disconnect() holds minor_rwsem while
display_open() which holds driver_lock is called with minor_rwsem held,
holding driver_lock when calling usb_deregister_dev() also causes circular
locking dependency problem.
Sean Young explained that the problem is there are imon devices which have
two usb interfaces, even though it is one device. The probe and disconnect
function of both usb interfaces can run concurrently.
Alan Stern responded that the driver and USB cores guarantee that when an
interface is probed, both the interface and its USB device are locked.
Ditto for when the disconnect callback gets run. So concurrent probing/
disconnection of multiple interfaces on the same device is not possible.
Therefore, we don't need locks for handling race between imon_probe() and
imon_disconnect(). But we still need to handle race between display_open()
/vfd_write()/lcd_write()/display_close() and imon_disconnect(), for
disconnect event can happen while file descriptors are in use.
Since "struct file"->private_data is set by display_open(), vfd_write()/
lcd_write()/display_close() can assume that "struct file"->private_data
is not NULL even after usb_set_intfdata(interface, NULL) was called.
Replace insufficiently held driver_lock with refcount_t based management.
Add a boolean flag for recording whether imon_disconnect() was already
called. Use RCU for accessing this boolean flag and refcount_t.
Since the boolean flag for imon_disconnect() is shared, disconnect event
on either intf0 or intf1 affects both interfaces. But I assume that this
change does not matter, for usually disconnect event would not happen
while interfaces are in use.
Link: https://syzkaller.appspot.com/bug?extid=c558267ad910fc494497
Reported-by: syzbot <syzbot+c558267ad910fc494497@syzkaller.appspotmail.com>
Signed-off-by: Tetsuo Handa <penguin-kernel@I-love.SAKURA.ne.jp>
Tested-by: syzbot <syzbot+c558267ad910fc494497@syzkaller.appspotmail.com>
Cc: Alan Stern <stern@rowland.harvard.edu>
Signed-off-by: Sean Young <sean@mess.org>
Signed-off-by: Mauro Carvalho Chehab <mchehab@kernel.org>
2022-05-02 06:49:04 +03:00
|
|
|
rcu_read_lock();
|
|
|
|
ictx = usb_get_intfdata(interface);
|
|
|
|
if (!ictx || ictx->disconnected || !refcount_inc_not_zero(&ictx->users)) {
|
|
|
|
rcu_read_unlock();
|
2010-06-20 11:20:46 +04:00
|
|
|
pr_err("no context found for minor %d\n", subminor);
|
2010-04-17 01:29:02 +04:00
|
|
|
retval = -ENODEV;
|
|
|
|
goto exit;
|
|
|
|
}
|
media: imon: reorganize serialization
Since usb_register_dev() from imon_init_display() from imon_probe() holds
minor_rwsem while display_open() which holds driver_lock and ictx->lock is
called with minor_rwsem held from usb_open(), holding driver_lock or
ictx->lock when calling usb_register_dev() causes circular locking
dependency problem.
Since usb_deregister_dev() from imon_disconnect() holds minor_rwsem while
display_open() which holds driver_lock is called with minor_rwsem held,
holding driver_lock when calling usb_deregister_dev() also causes circular
locking dependency problem.
Sean Young explained that the problem is there are imon devices which have
two usb interfaces, even though it is one device. The probe and disconnect
function of both usb interfaces can run concurrently.
Alan Stern responded that the driver and USB cores guarantee that when an
interface is probed, both the interface and its USB device are locked.
Ditto for when the disconnect callback gets run. So concurrent probing/
disconnection of multiple interfaces on the same device is not possible.
Therefore, we don't need locks for handling race between imon_probe() and
imon_disconnect(). But we still need to handle race between display_open()
/vfd_write()/lcd_write()/display_close() and imon_disconnect(), for
disconnect event can happen while file descriptors are in use.
Since "struct file"->private_data is set by display_open(), vfd_write()/
lcd_write()/display_close() can assume that "struct file"->private_data
is not NULL even after usb_set_intfdata(interface, NULL) was called.
Replace insufficiently held driver_lock with refcount_t based management.
Add a boolean flag for recording whether imon_disconnect() was already
called. Use RCU for accessing this boolean flag and refcount_t.
Since the boolean flag for imon_disconnect() is shared, disconnect event
on either intf0 or intf1 affects both interfaces. But I assume that this
change does not matter, for usually disconnect event would not happen
while interfaces are in use.
Link: https://syzkaller.appspot.com/bug?extid=c558267ad910fc494497
Reported-by: syzbot <syzbot+c558267ad910fc494497@syzkaller.appspotmail.com>
Signed-off-by: Tetsuo Handa <penguin-kernel@I-love.SAKURA.ne.jp>
Tested-by: syzbot <syzbot+c558267ad910fc494497@syzkaller.appspotmail.com>
Cc: Alan Stern <stern@rowland.harvard.edu>
Signed-off-by: Sean Young <sean@mess.org>
Signed-off-by: Mauro Carvalho Chehab <mchehab@kernel.org>
2022-05-02 06:49:04 +03:00
|
|
|
rcu_read_unlock();
|
2010-04-17 01:29:02 +04:00
|
|
|
|
|
|
|
mutex_lock(&ictx->lock);
|
|
|
|
|
|
|
|
if (!ictx->display_supported) {
|
2010-06-20 11:20:46 +04:00
|
|
|
pr_err("display not supported by device\n");
|
2010-04-17 01:29:02 +04:00
|
|
|
retval = -ENODEV;
|
|
|
|
} else if (ictx->display_isopen) {
|
2010-06-20 11:20:46 +04:00
|
|
|
pr_err("display port is already open\n");
|
2010-04-17 01:29:02 +04:00
|
|
|
retval = -EBUSY;
|
|
|
|
} else {
|
2010-05-24 19:00:31 +04:00
|
|
|
ictx->display_isopen = true;
|
2010-04-17 01:29:02 +04:00
|
|
|
file->private_data = ictx;
|
|
|
|
dev_dbg(ictx->dev, "display port opened\n");
|
|
|
|
}
|
|
|
|
|
|
|
|
mutex_unlock(&ictx->lock);
|
|
|
|
|
media: imon: reorganize serialization
Since usb_register_dev() from imon_init_display() from imon_probe() holds
minor_rwsem while display_open() which holds driver_lock and ictx->lock is
called with minor_rwsem held from usb_open(), holding driver_lock or
ictx->lock when calling usb_register_dev() causes circular locking
dependency problem.
Since usb_deregister_dev() from imon_disconnect() holds minor_rwsem while
display_open() which holds driver_lock is called with minor_rwsem held,
holding driver_lock when calling usb_deregister_dev() also causes circular
locking dependency problem.
Sean Young explained that the problem is there are imon devices which have
two usb interfaces, even though it is one device. The probe and disconnect
function of both usb interfaces can run concurrently.
Alan Stern responded that the driver and USB cores guarantee that when an
interface is probed, both the interface and its USB device are locked.
Ditto for when the disconnect callback gets run. So concurrent probing/
disconnection of multiple interfaces on the same device is not possible.
Therefore, we don't need locks for handling race between imon_probe() and
imon_disconnect(). But we still need to handle race between display_open()
/vfd_write()/lcd_write()/display_close() and imon_disconnect(), for
disconnect event can happen while file descriptors are in use.
Since "struct file"->private_data is set by display_open(), vfd_write()/
lcd_write()/display_close() can assume that "struct file"->private_data
is not NULL even after usb_set_intfdata(interface, NULL) was called.
Replace insufficiently held driver_lock with refcount_t based management.
Add a boolean flag for recording whether imon_disconnect() was already
called. Use RCU for accessing this boolean flag and refcount_t.
Since the boolean flag for imon_disconnect() is shared, disconnect event
on either intf0 or intf1 affects both interfaces. But I assume that this
change does not matter, for usually disconnect event would not happen
while interfaces are in use.
Link: https://syzkaller.appspot.com/bug?extid=c558267ad910fc494497
Reported-by: syzbot <syzbot+c558267ad910fc494497@syzkaller.appspotmail.com>
Signed-off-by: Tetsuo Handa <penguin-kernel@I-love.SAKURA.ne.jp>
Tested-by: syzbot <syzbot+c558267ad910fc494497@syzkaller.appspotmail.com>
Cc: Alan Stern <stern@rowland.harvard.edu>
Signed-off-by: Sean Young <sean@mess.org>
Signed-off-by: Mauro Carvalho Chehab <mchehab@kernel.org>
2022-05-02 06:49:04 +03:00
|
|
|
if (retval && refcount_dec_and_test(&ictx->users))
|
|
|
|
free_imon_context(ictx);
|
|
|
|
|
2010-04-17 01:29:02 +04:00
|
|
|
exit:
|
|
|
|
return retval;
|
|
|
|
}
|
|
|
|
|
2017-11-27 18:27:54 +03:00
|
|
|
/*
|
2010-04-17 01:29:02 +04:00
|
|
|
* Called when the display device (e.g. /dev/lcd0)
|
|
|
|
* is closed by the application.
|
|
|
|
*/
|
|
|
|
static int display_close(struct inode *inode, struct file *file)
|
|
|
|
{
|
media: imon: reorganize serialization
Since usb_register_dev() from imon_init_display() from imon_probe() holds
minor_rwsem while display_open() which holds driver_lock and ictx->lock is
called with minor_rwsem held from usb_open(), holding driver_lock or
ictx->lock when calling usb_register_dev() causes circular locking
dependency problem.
Since usb_deregister_dev() from imon_disconnect() holds minor_rwsem while
display_open() which holds driver_lock is called with minor_rwsem held,
holding driver_lock when calling usb_deregister_dev() also causes circular
locking dependency problem.
Sean Young explained that the problem is there are imon devices which have
two usb interfaces, even though it is one device. The probe and disconnect
function of both usb interfaces can run concurrently.
Alan Stern responded that the driver and USB cores guarantee that when an
interface is probed, both the interface and its USB device are locked.
Ditto for when the disconnect callback gets run. So concurrent probing/
disconnection of multiple interfaces on the same device is not possible.
Therefore, we don't need locks for handling race between imon_probe() and
imon_disconnect(). But we still need to handle race between display_open()
/vfd_write()/lcd_write()/display_close() and imon_disconnect(), for
disconnect event can happen while file descriptors are in use.
Since "struct file"->private_data is set by display_open(), vfd_write()/
lcd_write()/display_close() can assume that "struct file"->private_data
is not NULL even after usb_set_intfdata(interface, NULL) was called.
Replace insufficiently held driver_lock with refcount_t based management.
Add a boolean flag for recording whether imon_disconnect() was already
called. Use RCU for accessing this boolean flag and refcount_t.
Since the boolean flag for imon_disconnect() is shared, disconnect event
on either intf0 or intf1 affects both interfaces. But I assume that this
change does not matter, for usually disconnect event would not happen
while interfaces are in use.
Link: https://syzkaller.appspot.com/bug?extid=c558267ad910fc494497
Reported-by: syzbot <syzbot+c558267ad910fc494497@syzkaller.appspotmail.com>
Signed-off-by: Tetsuo Handa <penguin-kernel@I-love.SAKURA.ne.jp>
Tested-by: syzbot <syzbot+c558267ad910fc494497@syzkaller.appspotmail.com>
Cc: Alan Stern <stern@rowland.harvard.edu>
Signed-off-by: Sean Young <sean@mess.org>
Signed-off-by: Mauro Carvalho Chehab <mchehab@kernel.org>
2022-05-02 06:49:04 +03:00
|
|
|
struct imon_context *ictx = file->private_data;
|
2010-04-17 01:29:02 +04:00
|
|
|
int retval = 0;
|
|
|
|
|
|
|
|
mutex_lock(&ictx->lock);
|
|
|
|
|
|
|
|
if (!ictx->display_supported) {
|
2010-06-20 11:20:46 +04:00
|
|
|
pr_err("display not supported by device\n");
|
2010-04-17 01:29:02 +04:00
|
|
|
retval = -ENODEV;
|
|
|
|
} else if (!ictx->display_isopen) {
|
2010-06-20 11:20:46 +04:00
|
|
|
pr_err("display is not open\n");
|
2010-04-17 01:29:02 +04:00
|
|
|
retval = -EIO;
|
|
|
|
} else {
|
2010-05-24 19:00:31 +04:00
|
|
|
ictx->display_isopen = false;
|
2010-04-17 01:29:02 +04:00
|
|
|
dev_dbg(ictx->dev, "display port closed\n");
|
|
|
|
}
|
|
|
|
|
|
|
|
mutex_unlock(&ictx->lock);
|
media: imon: reorganize serialization
Since usb_register_dev() from imon_init_display() from imon_probe() holds
minor_rwsem while display_open() which holds driver_lock and ictx->lock is
called with minor_rwsem held from usb_open(), holding driver_lock or
ictx->lock when calling usb_register_dev() causes circular locking
dependency problem.
Since usb_deregister_dev() from imon_disconnect() holds minor_rwsem while
display_open() which holds driver_lock is called with minor_rwsem held,
holding driver_lock when calling usb_deregister_dev() also causes circular
locking dependency problem.
Sean Young explained that the problem is there are imon devices which have
two usb interfaces, even though it is one device. The probe and disconnect
function of both usb interfaces can run concurrently.
Alan Stern responded that the driver and USB cores guarantee that when an
interface is probed, both the interface and its USB device are locked.
Ditto for when the disconnect callback gets run. So concurrent probing/
disconnection of multiple interfaces on the same device is not possible.
Therefore, we don't need locks for handling race between imon_probe() and
imon_disconnect(). But we still need to handle race between display_open()
/vfd_write()/lcd_write()/display_close() and imon_disconnect(), for
disconnect event can happen while file descriptors are in use.
Since "struct file"->private_data is set by display_open(), vfd_write()/
lcd_write()/display_close() can assume that "struct file"->private_data
is not NULL even after usb_set_intfdata(interface, NULL) was called.
Replace insufficiently held driver_lock with refcount_t based management.
Add a boolean flag for recording whether imon_disconnect() was already
called. Use RCU for accessing this boolean flag and refcount_t.
Since the boolean flag for imon_disconnect() is shared, disconnect event
on either intf0 or intf1 affects both interfaces. But I assume that this
change does not matter, for usually disconnect event would not happen
while interfaces are in use.
Link: https://syzkaller.appspot.com/bug?extid=c558267ad910fc494497
Reported-by: syzbot <syzbot+c558267ad910fc494497@syzkaller.appspotmail.com>
Signed-off-by: Tetsuo Handa <penguin-kernel@I-love.SAKURA.ne.jp>
Tested-by: syzbot <syzbot+c558267ad910fc494497@syzkaller.appspotmail.com>
Cc: Alan Stern <stern@rowland.harvard.edu>
Signed-off-by: Sean Young <sean@mess.org>
Signed-off-by: Mauro Carvalho Chehab <mchehab@kernel.org>
2022-05-02 06:49:04 +03:00
|
|
|
if (refcount_dec_and_test(&ictx->users))
|
|
|
|
free_imon_context(ictx);
|
2010-04-17 01:29:02 +04:00
|
|
|
return retval;
|
|
|
|
}
|
|
|
|
|
2017-11-27 18:27:54 +03:00
|
|
|
/*
|
[media] imon: add conditional locking in change_protocol
The imon_ir_change_protocol function gets called two different ways, one
way is from rc_register_device, for initial protocol selection/setup,
and the other is via a userspace-initiated protocol change request,
either by direct sysfs prodding or by something like ir-keytable.
In the rc_register_device case, the imon context lock is already held,
but when initiated from userspace, it is not, so we must acquire it,
prior to calling send_packet, which requires that the lock is held.
Without this change, there's an easily reproduceable deadlock when
another function calls send_packet (such as either of the display write
fops) after a userspace-initiated change_protocol.
With a lock-debugging-enabled kernel, I was getting this:
[ 15.014153] =====================================
[ 15.015048] [ BUG: bad unlock balance detected! ]
[ 15.015048] -------------------------------------
[ 15.015048] ir-keytable/773 is trying to release lock (&ictx->lock) at:
[ 15.015048] [<ffffffff814c6297>] mutex_unlock+0xe/0x10
[ 15.015048] but there are no more locks to release!
[ 15.015048]
[ 15.015048] other info that might help us debug this:
[ 15.015048] 2 locks held by ir-keytable/773:
[ 15.015048] #0: (&buffer->mutex){+.+.+.}, at: [<ffffffff8119d400>] sysfs_write_file+0x3c/0x144
[ 15.015048] #1: (s_active#87){.+.+.+}, at: [<ffffffff8119d4ab>] sysfs_write_file+0xe7/0x144
[ 15.015048]
[ 15.015048] stack backtrace:
[ 15.015048] Pid: 773, comm: ir-keytable Not tainted 2.6.38.4-20.fc15.x86_64.debug #1
[ 15.015048] Call Trace:
[ 15.015048] [<ffffffff81089715>] ? print_unlock_inbalance_bug+0xca/0xd5
[ 15.015048] [<ffffffff8108b35c>] ? lock_release_non_nested+0xc1/0x263
[ 15.015048] [<ffffffff814c6297>] ? mutex_unlock+0xe/0x10
[ 15.015048] [<ffffffff814c6297>] ? mutex_unlock+0xe/0x10
[ 15.015048] [<ffffffff8108b67b>] ? lock_release+0x17d/0x1a4
[ 15.015048] [<ffffffff814c6229>] ? __mutex_unlock_slowpath+0xc5/0x125
[ 15.015048] [<ffffffff814c6297>] ? mutex_unlock+0xe/0x10
[ 15.015048] [<ffffffffa02964b6>] ? send_packet+0x1c9/0x264 [imon]
[ 15.015048] [<ffffffff8108b376>] ? lock_release_non_nested+0xdb/0x263
[ 15.015048] [<ffffffffa0296731>] ? imon_ir_change_protocol+0x126/0x15e [imon]
[ 15.015048] [<ffffffffa024a334>] ? store_protocols+0x1c3/0x286 [rc_core]
[ 15.015048] [<ffffffff81326e4e>] ? dev_attr_store+0x20/0x22
[ 15.015048] [<ffffffff8119d4cc>] ? sysfs_write_file+0x108/0x144
...
The original report that led to the investigation was the following:
[ 1679.457305] INFO: task LCDd:8460 blocked for more than 120 seconds.
[ 1679.457307] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
[ 1679.457309] LCDd D ffff88010fcd89c8 0 8460 1 0x00000000
[ 1679.457312] ffff8800d5a03b48 0000000000000082 0000000000000000 ffff8800d5a03fd8
[ 1679.457314] 00000000012dcd30 fffffffffffffffd ffff8800d5a03fd8 ffff88010fcd86f0
[ 1679.457316] ffff8800d5a03fd8 ffff8800d5a03fd8 ffff88010fcd89d0 ffff8800d5a03fd8
[ 1679.457319] Call Trace:
[ 1679.457324] [<ffffffff810ff1a5>] ? zone_statistics+0x75/0x90
[ 1679.457327] [<ffffffff810ea907>] ? get_page_from_freelist+0x3c7/0x820
[ 1679.457330] [<ffffffff813b0a49>] __mutex_lock_slowpath+0x139/0x320
[ 1679.457335] [<ffffffff813b0c41>] mutex_lock+0x11/0x30
[ 1679.457338] [<ffffffffa0d54216>] display_open+0x66/0x130 [imon]
[ 1679.457345] [<ffffffffa01d06c0>] usb_open+0x180/0x310 [usbcore]
[ 1679.457349] [<ffffffff81143b3b>] chrdev_open+0x1bb/0x2d0
[ 1679.457350] [<ffffffff8113d93d>] __dentry_open+0x10d/0x370
[ 1679.457352] [<ffffffff81143980>] ? chrdev_open+0x0/0x2d0
...
Bump the driver version here so its easier to tell if people have this
locking fix or not, and also make locking during probe easier to follow.
CC: stable@kernel.org
Reported-by: Benjamin Hodgetts <ben@xnode.org>
Signed-off-by: Jarod Wilson <jarod@redhat.com>
Signed-off-by: Mauro Carvalho Chehab <mchehab@redhat.com>
2011-04-28 02:01:44 +04:00
|
|
|
* Sends a packet to the device -- this function must be called with
|
|
|
|
* ictx->lock held, or its unlock/lock sequence while waiting for tx
|
|
|
|
* to complete can/will lead to a deadlock.
|
2010-04-17 01:29:02 +04:00
|
|
|
*/
|
|
|
|
static int send_packet(struct imon_context *ictx)
|
|
|
|
{
|
|
|
|
unsigned int pipe;
|
|
|
|
unsigned long timeout;
|
|
|
|
int interval = 0;
|
|
|
|
int retval = 0;
|
|
|
|
struct usb_ctrlrequest *control_req = NULL;
|
|
|
|
|
|
|
|
/* Check if we need to use control or interrupt urb */
|
|
|
|
if (!ictx->tx_control) {
|
|
|
|
pipe = usb_sndintpipe(ictx->usbdev_intf0,
|
|
|
|
ictx->tx_endpoint->bEndpointAddress);
|
|
|
|
interval = ictx->tx_endpoint->bInterval;
|
|
|
|
|
|
|
|
usb_fill_int_urb(ictx->tx_urb, ictx->usbdev_intf0, pipe,
|
|
|
|
ictx->usb_tx_buf,
|
|
|
|
sizeof(ictx->usb_tx_buf),
|
|
|
|
usb_tx_callback, ictx, interval);
|
|
|
|
|
|
|
|
ictx->tx_urb->actual_length = 0;
|
|
|
|
} else {
|
|
|
|
/* fill request into kmalloc'ed space: */
|
2017-08-29 13:45:59 +03:00
|
|
|
control_req = kmalloc(sizeof(*control_req), GFP_KERNEL);
|
2010-04-17 01:29:02 +04:00
|
|
|
if (control_req == NULL)
|
|
|
|
return -ENOMEM;
|
|
|
|
|
|
|
|
/* setup packet is '21 09 0200 0001 0008' */
|
|
|
|
control_req->bRequestType = 0x21;
|
|
|
|
control_req->bRequest = 0x09;
|
|
|
|
control_req->wValue = cpu_to_le16(0x0200);
|
|
|
|
control_req->wIndex = cpu_to_le16(0x0001);
|
|
|
|
control_req->wLength = cpu_to_le16(0x0008);
|
|
|
|
|
|
|
|
/* control pipe is endpoint 0x00 */
|
|
|
|
pipe = usb_sndctrlpipe(ictx->usbdev_intf0, 0);
|
|
|
|
|
|
|
|
/* build the control urb */
|
|
|
|
usb_fill_control_urb(ictx->tx_urb, ictx->usbdev_intf0,
|
|
|
|
pipe, (unsigned char *)control_req,
|
|
|
|
ictx->usb_tx_buf,
|
|
|
|
sizeof(ictx->usb_tx_buf),
|
|
|
|
usb_tx_callback, ictx);
|
|
|
|
ictx->tx_urb->actual_length = 0;
|
|
|
|
}
|
|
|
|
|
2016-09-16 14:18:21 +03:00
|
|
|
reinit_completion(&ictx->tx.finished);
|
2010-05-24 19:00:31 +04:00
|
|
|
ictx->tx.busy = true;
|
2010-04-17 01:29:02 +04:00
|
|
|
smp_rmb(); /* ensure later readers know we're busy */
|
|
|
|
|
|
|
|
retval = usb_submit_urb(ictx->tx_urb, GFP_KERNEL);
|
|
|
|
if (retval) {
|
2010-05-24 19:00:31 +04:00
|
|
|
ictx->tx.busy = false;
|
2010-04-17 01:29:02 +04:00
|
|
|
smp_rmb(); /* ensure later readers know we're not busy */
|
2011-07-14 21:20:46 +04:00
|
|
|
pr_err_ratelimited("error submitting urb(%d)\n", retval);
|
2010-04-17 01:29:02 +04:00
|
|
|
} else {
|
|
|
|
/* Wait for transmission to complete (or abort) */
|
|
|
|
retval = wait_for_completion_interruptible(
|
|
|
|
&ictx->tx.finished);
|
2013-04-22 23:09:46 +04:00
|
|
|
if (retval) {
|
|
|
|
usb_kill_urb(ictx->tx_urb);
|
2011-07-14 21:20:46 +04:00
|
|
|
pr_err_ratelimited("task interrupted\n");
|
2013-04-22 23:09:46 +04:00
|
|
|
}
|
2010-04-17 01:29:02 +04:00
|
|
|
|
2022-10-19 08:02:14 +03:00
|
|
|
ictx->tx.busy = false;
|
2010-04-17 01:29:02 +04:00
|
|
|
retval = ictx->tx.status;
|
|
|
|
if (retval)
|
2011-07-14 21:20:46 +04:00
|
|
|
pr_err_ratelimited("packet tx failed (%d)\n", retval);
|
2010-04-17 01:29:02 +04:00
|
|
|
}
|
|
|
|
|
|
|
|
kfree(control_req);
|
|
|
|
|
|
|
|
/*
|
2013-02-18 21:42:47 +04:00
|
|
|
* Induce a mandatory delay before returning, as otherwise,
|
2010-04-17 01:29:02 +04:00
|
|
|
* send_packet can get called so rapidly as to overwhelm the device,
|
|
|
|
* particularly on faster systems and/or those with quirky usb.
|
|
|
|
*/
|
2013-02-18 21:42:47 +04:00
|
|
|
timeout = msecs_to_jiffies(ictx->send_packet_delay);
|
|
|
|
set_current_state(TASK_INTERRUPTIBLE);
|
2010-04-17 01:29:02 +04:00
|
|
|
schedule_timeout(timeout);
|
|
|
|
|
|
|
|
return retval;
|
|
|
|
}
|
|
|
|
|
2017-11-27 18:27:54 +03:00
|
|
|
/*
|
2010-04-17 01:29:02 +04:00
|
|
|
* Sends an associate packet to the iMON 2.4G.
|
|
|
|
*
|
|
|
|
* This might not be such a good idea, since it has an id collision with
|
|
|
|
* some versions of the "IR & VFD" combo. The only way to determine if it
|
|
|
|
* is an RF version is to look at the product description string. (Which
|
|
|
|
* we currently do not fetch).
|
|
|
|
*/
|
|
|
|
static int send_associate_24g(struct imon_context *ictx)
|
|
|
|
{
|
|
|
|
const unsigned char packet[8] = { 0x01, 0x00, 0x00, 0x00,
|
|
|
|
0x00, 0x00, 0x00, 0x20 };
|
|
|
|
|
|
|
|
if (!ictx) {
|
2010-06-20 11:20:46 +04:00
|
|
|
pr_err("no context for device\n");
|
2010-04-17 01:29:02 +04:00
|
|
|
return -ENODEV;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (!ictx->dev_present_intf0) {
|
2010-06-20 11:20:46 +04:00
|
|
|
pr_err("no iMON device present\n");
|
2010-04-17 01:29:02 +04:00
|
|
|
return -ENODEV;
|
|
|
|
}
|
|
|
|
|
|
|
|
memcpy(ictx->usb_tx_buf, packet, sizeof(packet));
|
|
|
|
|
2022-08-30 11:30:27 +03:00
|
|
|
return send_packet(ictx);
|
2010-04-17 01:29:02 +04:00
|
|
|
}
|
|
|
|
|
2017-11-27 18:27:54 +03:00
|
|
|
/*
|
2010-04-17 01:29:02 +04:00
|
|
|
* Sends packets to setup and show clock on iMON display
|
|
|
|
*
|
|
|
|
* Arguments: year - last 2 digits of year, month - 1..12,
|
|
|
|
* day - 1..31, dow - day of the week (0-Sun...6-Sat),
|
|
|
|
* hour - 0..23, minute - 0..59, second - 0..59
|
|
|
|
*/
|
|
|
|
static int send_set_imon_clock(struct imon_context *ictx,
|
|
|
|
unsigned int year, unsigned int month,
|
|
|
|
unsigned int day, unsigned int dow,
|
|
|
|
unsigned int hour, unsigned int minute,
|
|
|
|
unsigned int second)
|
|
|
|
{
|
|
|
|
unsigned char clock_enable_pkt[IMON_CLOCK_ENABLE_PACKETS][8];
|
|
|
|
int retval = 0;
|
|
|
|
int i;
|
|
|
|
|
|
|
|
if (!ictx) {
|
2010-06-20 11:20:46 +04:00
|
|
|
pr_err("no context for device\n");
|
2010-04-17 01:29:02 +04:00
|
|
|
return -ENODEV;
|
|
|
|
}
|
|
|
|
|
|
|
|
switch (ictx->display_type) {
|
|
|
|
case IMON_DISPLAY_TYPE_LCD:
|
|
|
|
clock_enable_pkt[0][0] = 0x80;
|
|
|
|
clock_enable_pkt[0][1] = year;
|
|
|
|
clock_enable_pkt[0][2] = month-1;
|
|
|
|
clock_enable_pkt[0][3] = day;
|
|
|
|
clock_enable_pkt[0][4] = hour;
|
|
|
|
clock_enable_pkt[0][5] = minute;
|
|
|
|
clock_enable_pkt[0][6] = second;
|
|
|
|
|
|
|
|
clock_enable_pkt[1][0] = 0x80;
|
|
|
|
clock_enable_pkt[1][1] = 0;
|
|
|
|
clock_enable_pkt[1][2] = 0;
|
|
|
|
clock_enable_pkt[1][3] = 0;
|
|
|
|
clock_enable_pkt[1][4] = 0;
|
|
|
|
clock_enable_pkt[1][5] = 0;
|
|
|
|
clock_enable_pkt[1][6] = 0;
|
|
|
|
|
|
|
|
if (ictx->product == 0xffdc) {
|
|
|
|
clock_enable_pkt[0][7] = 0x50;
|
|
|
|
clock_enable_pkt[1][7] = 0x51;
|
|
|
|
} else {
|
|
|
|
clock_enable_pkt[0][7] = 0x88;
|
|
|
|
clock_enable_pkt[1][7] = 0x8a;
|
|
|
|
}
|
|
|
|
|
|
|
|
break;
|
|
|
|
|
|
|
|
case IMON_DISPLAY_TYPE_VFD:
|
|
|
|
clock_enable_pkt[0][0] = year;
|
|
|
|
clock_enable_pkt[0][1] = month-1;
|
|
|
|
clock_enable_pkt[0][2] = day;
|
|
|
|
clock_enable_pkt[0][3] = dow;
|
|
|
|
clock_enable_pkt[0][4] = hour;
|
|
|
|
clock_enable_pkt[0][5] = minute;
|
|
|
|
clock_enable_pkt[0][6] = second;
|
|
|
|
clock_enable_pkt[0][7] = 0x40;
|
|
|
|
|
|
|
|
clock_enable_pkt[1][0] = 0;
|
|
|
|
clock_enable_pkt[1][1] = 0;
|
|
|
|
clock_enable_pkt[1][2] = 1;
|
|
|
|
clock_enable_pkt[1][3] = 0;
|
|
|
|
clock_enable_pkt[1][4] = 0;
|
|
|
|
clock_enable_pkt[1][5] = 0;
|
|
|
|
clock_enable_pkt[1][6] = 0;
|
|
|
|
clock_enable_pkt[1][7] = 0x42;
|
|
|
|
|
|
|
|
break;
|
|
|
|
|
|
|
|
default:
|
|
|
|
return -ENODEV;
|
|
|
|
}
|
|
|
|
|
|
|
|
for (i = 0; i < IMON_CLOCK_ENABLE_PACKETS; i++) {
|
|
|
|
memcpy(ictx->usb_tx_buf, clock_enable_pkt[i], 8);
|
|
|
|
retval = send_packet(ictx);
|
|
|
|
if (retval) {
|
2010-06-20 11:20:46 +04:00
|
|
|
pr_err("send_packet failed for packet %d\n", i);
|
2010-04-17 01:29:02 +04:00
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return retval;
|
|
|
|
}
|
|
|
|
|
2017-11-27 18:27:54 +03:00
|
|
|
/*
|
2010-04-17 01:29:02 +04:00
|
|
|
* These are the sysfs functions to handle the association on the iMON 2.4G LT.
|
|
|
|
*/
|
2021-06-03 10:02:30 +03:00
|
|
|
static ssize_t associate_remote_show(struct device *d,
|
2010-04-17 01:29:02 +04:00
|
|
|
struct device_attribute *attr,
|
|
|
|
char *buf)
|
|
|
|
{
|
|
|
|
struct imon_context *ictx = dev_get_drvdata(d);
|
|
|
|
|
|
|
|
if (!ictx)
|
|
|
|
return -ENODEV;
|
|
|
|
|
|
|
|
mutex_lock(&ictx->lock);
|
|
|
|
if (ictx->rf_isassociating)
|
2018-09-10 23:14:15 +03:00
|
|
|
strscpy(buf, "associating\n", PAGE_SIZE);
|
2010-04-17 01:29:02 +04:00
|
|
|
else
|
2018-09-10 23:14:15 +03:00
|
|
|
strscpy(buf, "closed\n", PAGE_SIZE);
|
2010-04-17 01:29:02 +04:00
|
|
|
|
2020-07-13 18:31:53 +03:00
|
|
|
dev_info(d, "Visit https://www.lirc.org/html/imon-24g.html for instructions on how to associate your iMON 2.4G DT/LT remote\n");
|
2010-04-17 01:29:02 +04:00
|
|
|
mutex_unlock(&ictx->lock);
|
|
|
|
return strlen(buf);
|
|
|
|
}
|
|
|
|
|
2021-06-03 10:02:30 +03:00
|
|
|
static ssize_t associate_remote_store(struct device *d,
|
2010-04-17 01:29:02 +04:00
|
|
|
struct device_attribute *attr,
|
|
|
|
const char *buf, size_t count)
|
|
|
|
{
|
|
|
|
struct imon_context *ictx;
|
|
|
|
|
|
|
|
ictx = dev_get_drvdata(d);
|
|
|
|
|
|
|
|
if (!ictx)
|
|
|
|
return -ENODEV;
|
|
|
|
|
|
|
|
mutex_lock(&ictx->lock);
|
2010-05-24 19:00:31 +04:00
|
|
|
ictx->rf_isassociating = true;
|
2010-04-17 01:29:02 +04:00
|
|
|
send_associate_24g(ictx);
|
|
|
|
mutex_unlock(&ictx->lock);
|
|
|
|
|
|
|
|
return count;
|
|
|
|
}
|
|
|
|
|
2017-11-27 18:27:54 +03:00
|
|
|
/*
|
2010-04-17 01:29:02 +04:00
|
|
|
* sysfs functions to control internal imon clock
|
|
|
|
*/
|
2021-06-03 10:02:30 +03:00
|
|
|
static ssize_t imon_clock_show(struct device *d,
|
2010-04-17 01:29:02 +04:00
|
|
|
struct device_attribute *attr, char *buf)
|
|
|
|
{
|
|
|
|
struct imon_context *ictx = dev_get_drvdata(d);
|
|
|
|
size_t len;
|
|
|
|
|
|
|
|
if (!ictx)
|
|
|
|
return -ENODEV;
|
|
|
|
|
|
|
|
mutex_lock(&ictx->lock);
|
|
|
|
|
|
|
|
if (!ictx->display_supported) {
|
|
|
|
len = snprintf(buf, PAGE_SIZE, "Not supported.");
|
|
|
|
} else {
|
|
|
|
len = snprintf(buf, PAGE_SIZE,
|
|
|
|
"To set the clock on your iMON display:\n"
|
|
|
|
"# date \"+%%y %%m %%d %%w %%H %%M %%S\" > imon_clock\n"
|
|
|
|
"%s", ictx->display_isopen ?
|
|
|
|
"\nNOTE: imon device must be closed\n" : "");
|
|
|
|
}
|
|
|
|
|
|
|
|
mutex_unlock(&ictx->lock);
|
|
|
|
|
|
|
|
return len;
|
|
|
|
}
|
|
|
|
|
2021-06-03 10:02:30 +03:00
|
|
|
static ssize_t imon_clock_store(struct device *d,
|
2010-04-17 01:29:02 +04:00
|
|
|
struct device_attribute *attr,
|
|
|
|
const char *buf, size_t count)
|
|
|
|
{
|
|
|
|
struct imon_context *ictx = dev_get_drvdata(d);
|
|
|
|
ssize_t retval;
|
|
|
|
unsigned int year, month, day, dow, hour, minute, second;
|
|
|
|
|
|
|
|
if (!ictx)
|
|
|
|
return -ENODEV;
|
|
|
|
|
|
|
|
mutex_lock(&ictx->lock);
|
|
|
|
|
|
|
|
if (!ictx->display_supported) {
|
|
|
|
retval = -ENODEV;
|
|
|
|
goto exit;
|
|
|
|
} else if (ictx->display_isopen) {
|
|
|
|
retval = -EBUSY;
|
|
|
|
goto exit;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (sscanf(buf, "%u %u %u %u %u %u %u", &year, &month, &day, &dow,
|
|
|
|
&hour, &minute, &second) != 7) {
|
|
|
|
retval = -EINVAL;
|
|
|
|
goto exit;
|
|
|
|
}
|
|
|
|
|
|
|
|
if ((month < 1 || month > 12) ||
|
|
|
|
(day < 1 || day > 31) || (dow > 6) ||
|
|
|
|
(hour > 23) || (minute > 59) || (second > 59)) {
|
|
|
|
retval = -EINVAL;
|
|
|
|
goto exit;
|
|
|
|
}
|
|
|
|
|
|
|
|
retval = send_set_imon_clock(ictx, year, month, day, dow,
|
|
|
|
hour, minute, second);
|
|
|
|
if (retval)
|
|
|
|
goto exit;
|
|
|
|
|
|
|
|
retval = count;
|
|
|
|
exit:
|
|
|
|
mutex_unlock(&ictx->lock);
|
|
|
|
|
|
|
|
return retval;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2021-06-03 10:02:30 +03:00
|
|
|
static DEVICE_ATTR_RW(imon_clock);
|
|
|
|
static DEVICE_ATTR_RW(associate_remote);
|
2010-04-17 01:29:02 +04:00
|
|
|
|
|
|
|
static struct attribute *imon_display_sysfs_entries[] = {
|
|
|
|
&dev_attr_imon_clock.attr,
|
|
|
|
NULL
|
|
|
|
};
|
|
|
|
|
2017-07-07 11:15:12 +03:00
|
|
|
static const struct attribute_group imon_display_attr_group = {
|
2010-04-17 01:29:02 +04:00
|
|
|
.attrs = imon_display_sysfs_entries
|
|
|
|
};
|
|
|
|
|
|
|
|
static struct attribute *imon_rf_sysfs_entries[] = {
|
|
|
|
&dev_attr_associate_remote.attr,
|
|
|
|
NULL
|
|
|
|
};
|
|
|
|
|
2017-07-07 11:15:12 +03:00
|
|
|
static const struct attribute_group imon_rf_attr_group = {
|
2010-04-17 01:29:02 +04:00
|
|
|
.attrs = imon_rf_sysfs_entries
|
|
|
|
};
|
|
|
|
|
2017-11-27 18:27:54 +03:00
|
|
|
/*
|
2010-04-17 01:29:02 +04:00
|
|
|
* Writes data to the VFD. The iMON VFD is 2x16 characters
|
|
|
|
* and requires data in 5 consecutive USB interrupt packets,
|
|
|
|
* each packet but the last carrying 7 bytes.
|
|
|
|
*
|
|
|
|
* I don't know if the VFD board supports features such as
|
|
|
|
* scrolling, clearing rows, blanking, etc. so at
|
|
|
|
* the caller must provide a full screen of data. If fewer
|
|
|
|
* than 32 bytes are provided spaces will be appended to
|
|
|
|
* generate a full screen.
|
|
|
|
*/
|
2014-04-04 03:34:53 +04:00
|
|
|
static ssize_t vfd_write(struct file *file, const char __user *buf,
|
2010-04-17 01:29:02 +04:00
|
|
|
size_t n_bytes, loff_t *pos)
|
|
|
|
{
|
|
|
|
int i;
|
|
|
|
int offset;
|
|
|
|
int seq;
|
|
|
|
int retval = 0;
|
media: imon: reorganize serialization
Since usb_register_dev() from imon_init_display() from imon_probe() holds
minor_rwsem while display_open() which holds driver_lock and ictx->lock is
called with minor_rwsem held from usb_open(), holding driver_lock or
ictx->lock when calling usb_register_dev() causes circular locking
dependency problem.
Since usb_deregister_dev() from imon_disconnect() holds minor_rwsem while
display_open() which holds driver_lock is called with minor_rwsem held,
holding driver_lock when calling usb_deregister_dev() also causes circular
locking dependency problem.
Sean Young explained that the problem is there are imon devices which have
two usb interfaces, even though it is one device. The probe and disconnect
function of both usb interfaces can run concurrently.
Alan Stern responded that the driver and USB cores guarantee that when an
interface is probed, both the interface and its USB device are locked.
Ditto for when the disconnect callback gets run. So concurrent probing/
disconnection of multiple interfaces on the same device is not possible.
Therefore, we don't need locks for handling race between imon_probe() and
imon_disconnect(). But we still need to handle race between display_open()
/vfd_write()/lcd_write()/display_close() and imon_disconnect(), for
disconnect event can happen while file descriptors are in use.
Since "struct file"->private_data is set by display_open(), vfd_write()/
lcd_write()/display_close() can assume that "struct file"->private_data
is not NULL even after usb_set_intfdata(interface, NULL) was called.
Replace insufficiently held driver_lock with refcount_t based management.
Add a boolean flag for recording whether imon_disconnect() was already
called. Use RCU for accessing this boolean flag and refcount_t.
Since the boolean flag for imon_disconnect() is shared, disconnect event
on either intf0 or intf1 affects both interfaces. But I assume that this
change does not matter, for usually disconnect event would not happen
while interfaces are in use.
Link: https://syzkaller.appspot.com/bug?extid=c558267ad910fc494497
Reported-by: syzbot <syzbot+c558267ad910fc494497@syzkaller.appspotmail.com>
Signed-off-by: Tetsuo Handa <penguin-kernel@I-love.SAKURA.ne.jp>
Tested-by: syzbot <syzbot+c558267ad910fc494497@syzkaller.appspotmail.com>
Cc: Alan Stern <stern@rowland.harvard.edu>
Signed-off-by: Sean Young <sean@mess.org>
Signed-off-by: Mauro Carvalho Chehab <mchehab@kernel.org>
2022-05-02 06:49:04 +03:00
|
|
|
struct imon_context *ictx = file->private_data;
|
2017-09-05 15:07:50 +03:00
|
|
|
static const unsigned char vfd_packet6[] = {
|
2010-04-17 01:29:02 +04:00
|
|
|
0x01, 0x00, 0x00, 0x00, 0x00, 0xFF, 0xFF };
|
|
|
|
|
media: imon: reorganize serialization
Since usb_register_dev() from imon_init_display() from imon_probe() holds
minor_rwsem while display_open() which holds driver_lock and ictx->lock is
called with minor_rwsem held from usb_open(), holding driver_lock or
ictx->lock when calling usb_register_dev() causes circular locking
dependency problem.
Since usb_deregister_dev() from imon_disconnect() holds minor_rwsem while
display_open() which holds driver_lock is called with minor_rwsem held,
holding driver_lock when calling usb_deregister_dev() also causes circular
locking dependency problem.
Sean Young explained that the problem is there are imon devices which have
two usb interfaces, even though it is one device. The probe and disconnect
function of both usb interfaces can run concurrently.
Alan Stern responded that the driver and USB cores guarantee that when an
interface is probed, both the interface and its USB device are locked.
Ditto for when the disconnect callback gets run. So concurrent probing/
disconnection of multiple interfaces on the same device is not possible.
Therefore, we don't need locks for handling race between imon_probe() and
imon_disconnect(). But we still need to handle race between display_open()
/vfd_write()/lcd_write()/display_close() and imon_disconnect(), for
disconnect event can happen while file descriptors are in use.
Since "struct file"->private_data is set by display_open(), vfd_write()/
lcd_write()/display_close() can assume that "struct file"->private_data
is not NULL even after usb_set_intfdata(interface, NULL) was called.
Replace insufficiently held driver_lock with refcount_t based management.
Add a boolean flag for recording whether imon_disconnect() was already
called. Use RCU for accessing this boolean flag and refcount_t.
Since the boolean flag for imon_disconnect() is shared, disconnect event
on either intf0 or intf1 affects both interfaces. But I assume that this
change does not matter, for usually disconnect event would not happen
while interfaces are in use.
Link: https://syzkaller.appspot.com/bug?extid=c558267ad910fc494497
Reported-by: syzbot <syzbot+c558267ad910fc494497@syzkaller.appspotmail.com>
Signed-off-by: Tetsuo Handa <penguin-kernel@I-love.SAKURA.ne.jp>
Tested-by: syzbot <syzbot+c558267ad910fc494497@syzkaller.appspotmail.com>
Cc: Alan Stern <stern@rowland.harvard.edu>
Signed-off-by: Sean Young <sean@mess.org>
Signed-off-by: Mauro Carvalho Chehab <mchehab@kernel.org>
2022-05-02 06:49:04 +03:00
|
|
|
if (ictx->disconnected)
|
2010-04-17 01:29:02 +04:00
|
|
|
return -ENODEV;
|
|
|
|
|
2022-10-19 08:02:14 +03:00
|
|
|
if (mutex_lock_interruptible(&ictx->lock))
|
|
|
|
return -ERESTARTSYS;
|
2010-04-17 01:29:02 +04:00
|
|
|
|
|
|
|
if (!ictx->dev_present_intf0) {
|
2011-07-14 21:20:46 +04:00
|
|
|
pr_err_ratelimited("no iMON device present\n");
|
2010-04-17 01:29:02 +04:00
|
|
|
retval = -ENODEV;
|
|
|
|
goto exit;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (n_bytes <= 0 || n_bytes > 32) {
|
2011-07-14 21:20:46 +04:00
|
|
|
pr_err_ratelimited("invalid payload size\n");
|
2010-04-17 01:29:02 +04:00
|
|
|
retval = -EINVAL;
|
|
|
|
goto exit;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (copy_from_user(ictx->tx.data_buf, buf, n_bytes)) {
|
|
|
|
retval = -EFAULT;
|
|
|
|
goto exit;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Pad with spaces */
|
|
|
|
for (i = n_bytes; i < 32; ++i)
|
|
|
|
ictx->tx.data_buf[i] = ' ';
|
|
|
|
|
|
|
|
for (i = 32; i < 35; ++i)
|
|
|
|
ictx->tx.data_buf[i] = 0xFF;
|
|
|
|
|
|
|
|
offset = 0;
|
|
|
|
seq = 0;
|
|
|
|
|
|
|
|
do {
|
|
|
|
memcpy(ictx->usb_tx_buf, ictx->tx.data_buf + offset, 7);
|
|
|
|
ictx->usb_tx_buf[7] = (unsigned char) seq;
|
|
|
|
|
|
|
|
retval = send_packet(ictx);
|
|
|
|
if (retval) {
|
2011-07-14 21:20:46 +04:00
|
|
|
pr_err_ratelimited("send packet #%d failed\n", seq / 2);
|
2010-04-17 01:29:02 +04:00
|
|
|
goto exit;
|
|
|
|
} else {
|
|
|
|
seq += 2;
|
|
|
|
offset += 7;
|
|
|
|
}
|
|
|
|
|
|
|
|
} while (offset < 35);
|
|
|
|
|
|
|
|
/* Send packet #6 */
|
|
|
|
memcpy(ictx->usb_tx_buf, &vfd_packet6, sizeof(vfd_packet6));
|
|
|
|
ictx->usb_tx_buf[7] = (unsigned char) seq;
|
|
|
|
retval = send_packet(ictx);
|
|
|
|
if (retval)
|
2011-07-14 21:20:46 +04:00
|
|
|
pr_err_ratelimited("send packet #%d failed\n", seq / 2);
|
2010-04-17 01:29:02 +04:00
|
|
|
|
|
|
|
exit:
|
|
|
|
mutex_unlock(&ictx->lock);
|
|
|
|
|
|
|
|
return (!retval) ? n_bytes : retval;
|
|
|
|
}
|
|
|
|
|
2017-11-27 18:27:54 +03:00
|
|
|
/*
|
2010-04-17 01:29:02 +04:00
|
|
|
* Writes data to the LCD. The iMON OEM LCD screen expects 8-byte
|
|
|
|
* packets. We accept data as 16 hexadecimal digits, followed by a
|
|
|
|
* newline (to make it easy to drive the device from a command-line
|
|
|
|
* -- even though the actual binary data is a bit complicated).
|
|
|
|
*
|
|
|
|
* The device itself is not a "traditional" text-mode display. It's
|
|
|
|
* actually a 16x96 pixel bitmap display. That means if you want to
|
|
|
|
* display text, you've got to have your own "font" and translate the
|
|
|
|
* text into bitmaps for display. This is really flexible (you can
|
|
|
|
* display whatever diacritics you need, and so on), but it's also
|
|
|
|
* a lot more complicated than most LCDs...
|
|
|
|
*/
|
2014-04-04 03:34:53 +04:00
|
|
|
static ssize_t lcd_write(struct file *file, const char __user *buf,
|
2010-04-17 01:29:02 +04:00
|
|
|
size_t n_bytes, loff_t *pos)
|
|
|
|
{
|
|
|
|
int retval = 0;
|
media: imon: reorganize serialization
Since usb_register_dev() from imon_init_display() from imon_probe() holds
minor_rwsem while display_open() which holds driver_lock and ictx->lock is
called with minor_rwsem held from usb_open(), holding driver_lock or
ictx->lock when calling usb_register_dev() causes circular locking
dependency problem.
Since usb_deregister_dev() from imon_disconnect() holds minor_rwsem while
display_open() which holds driver_lock is called with minor_rwsem held,
holding driver_lock when calling usb_deregister_dev() also causes circular
locking dependency problem.
Sean Young explained that the problem is there are imon devices which have
two usb interfaces, even though it is one device. The probe and disconnect
function of both usb interfaces can run concurrently.
Alan Stern responded that the driver and USB cores guarantee that when an
interface is probed, both the interface and its USB device are locked.
Ditto for when the disconnect callback gets run. So concurrent probing/
disconnection of multiple interfaces on the same device is not possible.
Therefore, we don't need locks for handling race between imon_probe() and
imon_disconnect(). But we still need to handle race between display_open()
/vfd_write()/lcd_write()/display_close() and imon_disconnect(), for
disconnect event can happen while file descriptors are in use.
Since "struct file"->private_data is set by display_open(), vfd_write()/
lcd_write()/display_close() can assume that "struct file"->private_data
is not NULL even after usb_set_intfdata(interface, NULL) was called.
Replace insufficiently held driver_lock with refcount_t based management.
Add a boolean flag for recording whether imon_disconnect() was already
called. Use RCU for accessing this boolean flag and refcount_t.
Since the boolean flag for imon_disconnect() is shared, disconnect event
on either intf0 or intf1 affects both interfaces. But I assume that this
change does not matter, for usually disconnect event would not happen
while interfaces are in use.
Link: https://syzkaller.appspot.com/bug?extid=c558267ad910fc494497
Reported-by: syzbot <syzbot+c558267ad910fc494497@syzkaller.appspotmail.com>
Signed-off-by: Tetsuo Handa <penguin-kernel@I-love.SAKURA.ne.jp>
Tested-by: syzbot <syzbot+c558267ad910fc494497@syzkaller.appspotmail.com>
Cc: Alan Stern <stern@rowland.harvard.edu>
Signed-off-by: Sean Young <sean@mess.org>
Signed-off-by: Mauro Carvalho Chehab <mchehab@kernel.org>
2022-05-02 06:49:04 +03:00
|
|
|
struct imon_context *ictx = file->private_data;
|
2010-04-17 01:29:02 +04:00
|
|
|
|
media: imon: reorganize serialization
Since usb_register_dev() from imon_init_display() from imon_probe() holds
minor_rwsem while display_open() which holds driver_lock and ictx->lock is
called with minor_rwsem held from usb_open(), holding driver_lock or
ictx->lock when calling usb_register_dev() causes circular locking
dependency problem.
Since usb_deregister_dev() from imon_disconnect() holds minor_rwsem while
display_open() which holds driver_lock is called with minor_rwsem held,
holding driver_lock when calling usb_deregister_dev() also causes circular
locking dependency problem.
Sean Young explained that the problem is there are imon devices which have
two usb interfaces, even though it is one device. The probe and disconnect
function of both usb interfaces can run concurrently.
Alan Stern responded that the driver and USB cores guarantee that when an
interface is probed, both the interface and its USB device are locked.
Ditto for when the disconnect callback gets run. So concurrent probing/
disconnection of multiple interfaces on the same device is not possible.
Therefore, we don't need locks for handling race between imon_probe() and
imon_disconnect(). But we still need to handle race between display_open()
/vfd_write()/lcd_write()/display_close() and imon_disconnect(), for
disconnect event can happen while file descriptors are in use.
Since "struct file"->private_data is set by display_open(), vfd_write()/
lcd_write()/display_close() can assume that "struct file"->private_data
is not NULL even after usb_set_intfdata(interface, NULL) was called.
Replace insufficiently held driver_lock with refcount_t based management.
Add a boolean flag for recording whether imon_disconnect() was already
called. Use RCU for accessing this boolean flag and refcount_t.
Since the boolean flag for imon_disconnect() is shared, disconnect event
on either intf0 or intf1 affects both interfaces. But I assume that this
change does not matter, for usually disconnect event would not happen
while interfaces are in use.
Link: https://syzkaller.appspot.com/bug?extid=c558267ad910fc494497
Reported-by: syzbot <syzbot+c558267ad910fc494497@syzkaller.appspotmail.com>
Signed-off-by: Tetsuo Handa <penguin-kernel@I-love.SAKURA.ne.jp>
Tested-by: syzbot <syzbot+c558267ad910fc494497@syzkaller.appspotmail.com>
Cc: Alan Stern <stern@rowland.harvard.edu>
Signed-off-by: Sean Young <sean@mess.org>
Signed-off-by: Mauro Carvalho Chehab <mchehab@kernel.org>
2022-05-02 06:49:04 +03:00
|
|
|
if (ictx->disconnected)
|
2010-04-17 01:29:02 +04:00
|
|
|
return -ENODEV;
|
|
|
|
|
|
|
|
mutex_lock(&ictx->lock);
|
|
|
|
|
|
|
|
if (!ictx->display_supported) {
|
2011-07-14 21:20:46 +04:00
|
|
|
pr_err_ratelimited("no iMON display present\n");
|
2010-04-17 01:29:02 +04:00
|
|
|
retval = -ENODEV;
|
|
|
|
goto exit;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (n_bytes != 8) {
|
2011-07-14 21:20:46 +04:00
|
|
|
pr_err_ratelimited("invalid payload size: %d (expected 8)\n",
|
|
|
|
(int)n_bytes);
|
2010-04-17 01:29:02 +04:00
|
|
|
retval = -EINVAL;
|
|
|
|
goto exit;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (copy_from_user(ictx->usb_tx_buf, buf, 8)) {
|
|
|
|
retval = -EFAULT;
|
|
|
|
goto exit;
|
|
|
|
}
|
|
|
|
|
|
|
|
retval = send_packet(ictx);
|
|
|
|
if (retval) {
|
2011-07-14 21:20:46 +04:00
|
|
|
pr_err_ratelimited("send packet failed!\n");
|
2010-04-17 01:29:02 +04:00
|
|
|
goto exit;
|
|
|
|
} else {
|
|
|
|
dev_dbg(ictx->dev, "%s: write %d bytes to LCD\n",
|
|
|
|
__func__, (int) n_bytes);
|
|
|
|
}
|
|
|
|
exit:
|
|
|
|
mutex_unlock(&ictx->lock);
|
|
|
|
return (!retval) ? n_bytes : retval;
|
|
|
|
}
|
|
|
|
|
2017-11-27 18:27:54 +03:00
|
|
|
/*
|
2010-04-17 01:29:02 +04:00
|
|
|
* Callback function for USB core API: transmit data
|
|
|
|
*/
|
|
|
|
static void usb_tx_callback(struct urb *urb)
|
|
|
|
{
|
|
|
|
struct imon_context *ictx;
|
|
|
|
|
|
|
|
if (!urb)
|
|
|
|
return;
|
|
|
|
ictx = (struct imon_context *)urb->context;
|
|
|
|
if (!ictx)
|
|
|
|
return;
|
|
|
|
|
|
|
|
ictx->tx.status = urb->status;
|
|
|
|
|
|
|
|
/* notify waiters that write has finished */
|
2010-05-24 19:00:31 +04:00
|
|
|
ictx->tx.busy = false;
|
2010-04-17 01:29:02 +04:00
|
|
|
smp_rmb(); /* ensure later readers know we're not busy */
|
|
|
|
complete(&ictx->tx.finished);
|
|
|
|
}
|
|
|
|
|
2017-11-27 18:27:54 +03:00
|
|
|
/*
|
2010-04-17 01:29:02 +04:00
|
|
|
* report touchscreen input
|
|
|
|
*/
|
2017-10-24 18:23:14 +03:00
|
|
|
static void imon_touch_display_timeout(struct timer_list *t)
|
2010-04-17 01:29:02 +04:00
|
|
|
{
|
2017-10-24 18:23:14 +03:00
|
|
|
struct imon_context *ictx = from_timer(ictx, t, ttimer);
|
2010-04-17 01:29:02 +04:00
|
|
|
|
2010-05-04 15:37:33 +04:00
|
|
|
if (ictx->display_type != IMON_DISPLAY_TYPE_VGA)
|
2010-04-17 01:29:02 +04:00
|
|
|
return;
|
|
|
|
|
|
|
|
input_report_abs(ictx->touch, ABS_X, ictx->touch_x);
|
|
|
|
input_report_abs(ictx->touch, ABS_Y, ictx->touch_y);
|
|
|
|
input_report_key(ictx->touch, BTN_TOUCH, 0x00);
|
|
|
|
input_sync(ictx->touch);
|
|
|
|
}
|
|
|
|
|
2017-11-27 18:27:54 +03:00
|
|
|
/*
|
2010-04-17 01:29:02 +04:00
|
|
|
* iMON IR receivers support two different signal sets -- those used by
|
|
|
|
* the iMON remotes, and those used by the Windows MCE remotes (which is
|
|
|
|
* really just RC-6), but only one or the other at a time, as the signals
|
|
|
|
* are decoded onboard the receiver.
|
[media] imon: add conditional locking in change_protocol
The imon_ir_change_protocol function gets called two different ways, one
way is from rc_register_device, for initial protocol selection/setup,
and the other is via a userspace-initiated protocol change request,
either by direct sysfs prodding or by something like ir-keytable.
In the rc_register_device case, the imon context lock is already held,
but when initiated from userspace, it is not, so we must acquire it,
prior to calling send_packet, which requires that the lock is held.
Without this change, there's an easily reproduceable deadlock when
another function calls send_packet (such as either of the display write
fops) after a userspace-initiated change_protocol.
With a lock-debugging-enabled kernel, I was getting this:
[ 15.014153] =====================================
[ 15.015048] [ BUG: bad unlock balance detected! ]
[ 15.015048] -------------------------------------
[ 15.015048] ir-keytable/773 is trying to release lock (&ictx->lock) at:
[ 15.015048] [<ffffffff814c6297>] mutex_unlock+0xe/0x10
[ 15.015048] but there are no more locks to release!
[ 15.015048]
[ 15.015048] other info that might help us debug this:
[ 15.015048] 2 locks held by ir-keytable/773:
[ 15.015048] #0: (&buffer->mutex){+.+.+.}, at: [<ffffffff8119d400>] sysfs_write_file+0x3c/0x144
[ 15.015048] #1: (s_active#87){.+.+.+}, at: [<ffffffff8119d4ab>] sysfs_write_file+0xe7/0x144
[ 15.015048]
[ 15.015048] stack backtrace:
[ 15.015048] Pid: 773, comm: ir-keytable Not tainted 2.6.38.4-20.fc15.x86_64.debug #1
[ 15.015048] Call Trace:
[ 15.015048] [<ffffffff81089715>] ? print_unlock_inbalance_bug+0xca/0xd5
[ 15.015048] [<ffffffff8108b35c>] ? lock_release_non_nested+0xc1/0x263
[ 15.015048] [<ffffffff814c6297>] ? mutex_unlock+0xe/0x10
[ 15.015048] [<ffffffff814c6297>] ? mutex_unlock+0xe/0x10
[ 15.015048] [<ffffffff8108b67b>] ? lock_release+0x17d/0x1a4
[ 15.015048] [<ffffffff814c6229>] ? __mutex_unlock_slowpath+0xc5/0x125
[ 15.015048] [<ffffffff814c6297>] ? mutex_unlock+0xe/0x10
[ 15.015048] [<ffffffffa02964b6>] ? send_packet+0x1c9/0x264 [imon]
[ 15.015048] [<ffffffff8108b376>] ? lock_release_non_nested+0xdb/0x263
[ 15.015048] [<ffffffffa0296731>] ? imon_ir_change_protocol+0x126/0x15e [imon]
[ 15.015048] [<ffffffffa024a334>] ? store_protocols+0x1c3/0x286 [rc_core]
[ 15.015048] [<ffffffff81326e4e>] ? dev_attr_store+0x20/0x22
[ 15.015048] [<ffffffff8119d4cc>] ? sysfs_write_file+0x108/0x144
...
The original report that led to the investigation was the following:
[ 1679.457305] INFO: task LCDd:8460 blocked for more than 120 seconds.
[ 1679.457307] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
[ 1679.457309] LCDd D ffff88010fcd89c8 0 8460 1 0x00000000
[ 1679.457312] ffff8800d5a03b48 0000000000000082 0000000000000000 ffff8800d5a03fd8
[ 1679.457314] 00000000012dcd30 fffffffffffffffd ffff8800d5a03fd8 ffff88010fcd86f0
[ 1679.457316] ffff8800d5a03fd8 ffff8800d5a03fd8 ffff88010fcd89d0 ffff8800d5a03fd8
[ 1679.457319] Call Trace:
[ 1679.457324] [<ffffffff810ff1a5>] ? zone_statistics+0x75/0x90
[ 1679.457327] [<ffffffff810ea907>] ? get_page_from_freelist+0x3c7/0x820
[ 1679.457330] [<ffffffff813b0a49>] __mutex_lock_slowpath+0x139/0x320
[ 1679.457335] [<ffffffff813b0c41>] mutex_lock+0x11/0x30
[ 1679.457338] [<ffffffffa0d54216>] display_open+0x66/0x130 [imon]
[ 1679.457345] [<ffffffffa01d06c0>] usb_open+0x180/0x310 [usbcore]
[ 1679.457349] [<ffffffff81143b3b>] chrdev_open+0x1bb/0x2d0
[ 1679.457350] [<ffffffff8113d93d>] __dentry_open+0x10d/0x370
[ 1679.457352] [<ffffffff81143980>] ? chrdev_open+0x0/0x2d0
...
Bump the driver version here so its easier to tell if people have this
locking fix or not, and also make locking during probe easier to follow.
CC: stable@kernel.org
Reported-by: Benjamin Hodgetts <ben@xnode.org>
Signed-off-by: Jarod Wilson <jarod@redhat.com>
Signed-off-by: Mauro Carvalho Chehab <mchehab@redhat.com>
2011-04-28 02:01:44 +04:00
|
|
|
*
|
|
|
|
* This function gets called two different ways, one way is from
|
|
|
|
* rc_register_device, for initial protocol selection/setup, and the other is
|
|
|
|
* via a userspace-initiated protocol change request, either by direct sysfs
|
|
|
|
* prodding or by something like ir-keytable. In the rc_register_device case,
|
|
|
|
* the imon context lock is already held, but when initiated from userspace,
|
|
|
|
* it is not, so we must acquire it prior to calling send_packet, which
|
|
|
|
* requires that the lock is held.
|
2010-04-17 01:29:02 +04:00
|
|
|
*/
|
2017-08-07 23:20:58 +03:00
|
|
|
static int imon_ir_change_protocol(struct rc_dev *rc, u64 *rc_proto)
|
2010-04-17 01:29:02 +04:00
|
|
|
{
|
|
|
|
int retval;
|
2010-10-29 23:08:23 +04:00
|
|
|
struct imon_context *ictx = rc->priv;
|
2010-04-17 01:29:02 +04:00
|
|
|
struct device *dev = ictx->dev;
|
[media] imon: add conditional locking in change_protocol
The imon_ir_change_protocol function gets called two different ways, one
way is from rc_register_device, for initial protocol selection/setup,
and the other is via a userspace-initiated protocol change request,
either by direct sysfs prodding or by something like ir-keytable.
In the rc_register_device case, the imon context lock is already held,
but when initiated from userspace, it is not, so we must acquire it,
prior to calling send_packet, which requires that the lock is held.
Without this change, there's an easily reproduceable deadlock when
another function calls send_packet (such as either of the display write
fops) after a userspace-initiated change_protocol.
With a lock-debugging-enabled kernel, I was getting this:
[ 15.014153] =====================================
[ 15.015048] [ BUG: bad unlock balance detected! ]
[ 15.015048] -------------------------------------
[ 15.015048] ir-keytable/773 is trying to release lock (&ictx->lock) at:
[ 15.015048] [<ffffffff814c6297>] mutex_unlock+0xe/0x10
[ 15.015048] but there are no more locks to release!
[ 15.015048]
[ 15.015048] other info that might help us debug this:
[ 15.015048] 2 locks held by ir-keytable/773:
[ 15.015048] #0: (&buffer->mutex){+.+.+.}, at: [<ffffffff8119d400>] sysfs_write_file+0x3c/0x144
[ 15.015048] #1: (s_active#87){.+.+.+}, at: [<ffffffff8119d4ab>] sysfs_write_file+0xe7/0x144
[ 15.015048]
[ 15.015048] stack backtrace:
[ 15.015048] Pid: 773, comm: ir-keytable Not tainted 2.6.38.4-20.fc15.x86_64.debug #1
[ 15.015048] Call Trace:
[ 15.015048] [<ffffffff81089715>] ? print_unlock_inbalance_bug+0xca/0xd5
[ 15.015048] [<ffffffff8108b35c>] ? lock_release_non_nested+0xc1/0x263
[ 15.015048] [<ffffffff814c6297>] ? mutex_unlock+0xe/0x10
[ 15.015048] [<ffffffff814c6297>] ? mutex_unlock+0xe/0x10
[ 15.015048] [<ffffffff8108b67b>] ? lock_release+0x17d/0x1a4
[ 15.015048] [<ffffffff814c6229>] ? __mutex_unlock_slowpath+0xc5/0x125
[ 15.015048] [<ffffffff814c6297>] ? mutex_unlock+0xe/0x10
[ 15.015048] [<ffffffffa02964b6>] ? send_packet+0x1c9/0x264 [imon]
[ 15.015048] [<ffffffff8108b376>] ? lock_release_non_nested+0xdb/0x263
[ 15.015048] [<ffffffffa0296731>] ? imon_ir_change_protocol+0x126/0x15e [imon]
[ 15.015048] [<ffffffffa024a334>] ? store_protocols+0x1c3/0x286 [rc_core]
[ 15.015048] [<ffffffff81326e4e>] ? dev_attr_store+0x20/0x22
[ 15.015048] [<ffffffff8119d4cc>] ? sysfs_write_file+0x108/0x144
...
The original report that led to the investigation was the following:
[ 1679.457305] INFO: task LCDd:8460 blocked for more than 120 seconds.
[ 1679.457307] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
[ 1679.457309] LCDd D ffff88010fcd89c8 0 8460 1 0x00000000
[ 1679.457312] ffff8800d5a03b48 0000000000000082 0000000000000000 ffff8800d5a03fd8
[ 1679.457314] 00000000012dcd30 fffffffffffffffd ffff8800d5a03fd8 ffff88010fcd86f0
[ 1679.457316] ffff8800d5a03fd8 ffff8800d5a03fd8 ffff88010fcd89d0 ffff8800d5a03fd8
[ 1679.457319] Call Trace:
[ 1679.457324] [<ffffffff810ff1a5>] ? zone_statistics+0x75/0x90
[ 1679.457327] [<ffffffff810ea907>] ? get_page_from_freelist+0x3c7/0x820
[ 1679.457330] [<ffffffff813b0a49>] __mutex_lock_slowpath+0x139/0x320
[ 1679.457335] [<ffffffff813b0c41>] mutex_lock+0x11/0x30
[ 1679.457338] [<ffffffffa0d54216>] display_open+0x66/0x130 [imon]
[ 1679.457345] [<ffffffffa01d06c0>] usb_open+0x180/0x310 [usbcore]
[ 1679.457349] [<ffffffff81143b3b>] chrdev_open+0x1bb/0x2d0
[ 1679.457350] [<ffffffff8113d93d>] __dentry_open+0x10d/0x370
[ 1679.457352] [<ffffffff81143980>] ? chrdev_open+0x0/0x2d0
...
Bump the driver version here so its easier to tell if people have this
locking fix or not, and also make locking during probe easier to follow.
CC: stable@kernel.org
Reported-by: Benjamin Hodgetts <ben@xnode.org>
Signed-off-by: Jarod Wilson <jarod@redhat.com>
Signed-off-by: Mauro Carvalho Chehab <mchehab@redhat.com>
2011-04-28 02:01:44 +04:00
|
|
|
bool unlock = false;
|
2010-04-17 01:29:02 +04:00
|
|
|
unsigned char ir_proto_packet[] = {
|
|
|
|
0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x86 };
|
|
|
|
|
2017-08-07 23:20:58 +03:00
|
|
|
if (*rc_proto && !(*rc_proto & rc->allowed_protocols))
|
[media] rc: don't break long lines
Due to the 80-cols restrictions, and latter due to checkpatch
warnings, several strings were broken into multiple lines. This
is not considered a good practice anymore, as it makes harder
to grep for strings at the source code.
As we're right now fixing other drivers due to KERN_CONT, we need
to be able to identify what printk strings don't end with a "\n".
It is a way easier to detect those if we don't break long lines.
So, join those continuation lines.
The patch was generated via the script below, and manually
adjusted if needed.
</script>
use Text::Tabs;
while (<>) {
if ($next ne "") {
$c=$_;
if ($c =~ /^\s+\"(.*)/) {
$c2=$1;
$next =~ s/\"\n$//;
$n = expand($next);
$funpos = index($n, '(');
$pos = index($c2, '",');
if ($funpos && $pos > 0) {
$s1 = substr $c2, 0, $pos + 2;
$s2 = ' ' x ($funpos + 1) . substr $c2, $pos + 2;
$s2 =~ s/^\s+//;
$s2 = ' ' x ($funpos + 1) . $s2 if ($s2 ne "");
print unexpand("$next$s1\n");
print unexpand("$s2\n") if ($s2 ne "");
} else {
print "$next$c2\n";
}
$next="";
next;
} else {
print $next;
}
$next="";
} else {
if (m/\"$/) {
if (!m/\\n\"$/) {
$next=$_;
next;
}
}
}
print $_;
}
</script>
Signed-off-by: Mauro Carvalho Chehab <mchehab@s-opensource.com>
2016-10-18 22:44:25 +03:00
|
|
|
dev_warn(dev, "Looks like you're trying to use an IR protocol this device does not support\n");
|
2010-04-17 01:29:02 +04:00
|
|
|
|
2017-08-07 23:20:58 +03:00
|
|
|
if (*rc_proto & RC_PROTO_BIT_RC6_MCE) {
|
2010-04-17 01:29:02 +04:00
|
|
|
dev_dbg(dev, "Configuring IR receiver for MCE protocol\n");
|
|
|
|
ir_proto_packet[0] = 0x01;
|
2017-08-07 23:20:58 +03:00
|
|
|
*rc_proto = RC_PROTO_BIT_RC6_MCE;
|
2018-03-07 13:55:38 +03:00
|
|
|
} else if (*rc_proto & RC_PROTO_BIT_IMON) {
|
2010-04-28 21:37:29 +04:00
|
|
|
dev_dbg(dev, "Configuring IR receiver for iMON protocol\n");
|
2011-01-06 22:59:35 +03:00
|
|
|
if (!pad_stabilize)
|
2010-04-28 21:37:29 +04:00
|
|
|
dev_dbg(dev, "PAD stabilize functionality disabled\n");
|
2010-04-17 01:29:02 +04:00
|
|
|
/* ir_proto_packet[0] = 0x00; // already the default */
|
2018-03-07 13:55:38 +03:00
|
|
|
*rc_proto = RC_PROTO_BIT_IMON;
|
2012-10-12 02:11:54 +04:00
|
|
|
} else {
|
[media] rc: don't break long lines
Due to the 80-cols restrictions, and latter due to checkpatch
warnings, several strings were broken into multiple lines. This
is not considered a good practice anymore, as it makes harder
to grep for strings at the source code.
As we're right now fixing other drivers due to KERN_CONT, we need
to be able to identify what printk strings don't end with a "\n".
It is a way easier to detect those if we don't break long lines.
So, join those continuation lines.
The patch was generated via the script below, and manually
adjusted if needed.
</script>
use Text::Tabs;
while (<>) {
if ($next ne "") {
$c=$_;
if ($c =~ /^\s+\"(.*)/) {
$c2=$1;
$next =~ s/\"\n$//;
$n = expand($next);
$funpos = index($n, '(');
$pos = index($c2, '",');
if ($funpos && $pos > 0) {
$s1 = substr $c2, 0, $pos + 2;
$s2 = ' ' x ($funpos + 1) . substr $c2, $pos + 2;
$s2 =~ s/^\s+//;
$s2 = ' ' x ($funpos + 1) . $s2 if ($s2 ne "");
print unexpand("$next$s1\n");
print unexpand("$s2\n") if ($s2 ne "");
} else {
print "$next$c2\n";
}
$next="";
next;
} else {
print $next;
}
$next="";
} else {
if (m/\"$/) {
if (!m/\\n\"$/) {
$next=$_;
next;
}
}
}
print $_;
}
</script>
Signed-off-by: Mauro Carvalho Chehab <mchehab@s-opensource.com>
2016-10-18 22:44:25 +03:00
|
|
|
dev_warn(dev, "Unsupported IR protocol specified, overriding to iMON IR protocol\n");
|
2011-01-06 22:59:35 +03:00
|
|
|
if (!pad_stabilize)
|
2010-04-28 21:37:29 +04:00
|
|
|
dev_dbg(dev, "PAD stabilize functionality disabled\n");
|
2010-04-23 09:27:11 +04:00
|
|
|
/* ir_proto_packet[0] = 0x00; // already the default */
|
2018-03-07 13:55:38 +03:00
|
|
|
*rc_proto = RC_PROTO_BIT_IMON;
|
2010-04-17 01:29:02 +04:00
|
|
|
}
|
|
|
|
|
|
|
|
memcpy(ictx->usb_tx_buf, &ir_proto_packet, sizeof(ir_proto_packet));
|
|
|
|
|
[media] imon: add conditional locking in change_protocol
The imon_ir_change_protocol function gets called two different ways, one
way is from rc_register_device, for initial protocol selection/setup,
and the other is via a userspace-initiated protocol change request,
either by direct sysfs prodding or by something like ir-keytable.
In the rc_register_device case, the imon context lock is already held,
but when initiated from userspace, it is not, so we must acquire it,
prior to calling send_packet, which requires that the lock is held.
Without this change, there's an easily reproduceable deadlock when
another function calls send_packet (such as either of the display write
fops) after a userspace-initiated change_protocol.
With a lock-debugging-enabled kernel, I was getting this:
[ 15.014153] =====================================
[ 15.015048] [ BUG: bad unlock balance detected! ]
[ 15.015048] -------------------------------------
[ 15.015048] ir-keytable/773 is trying to release lock (&ictx->lock) at:
[ 15.015048] [<ffffffff814c6297>] mutex_unlock+0xe/0x10
[ 15.015048] but there are no more locks to release!
[ 15.015048]
[ 15.015048] other info that might help us debug this:
[ 15.015048] 2 locks held by ir-keytable/773:
[ 15.015048] #0: (&buffer->mutex){+.+.+.}, at: [<ffffffff8119d400>] sysfs_write_file+0x3c/0x144
[ 15.015048] #1: (s_active#87){.+.+.+}, at: [<ffffffff8119d4ab>] sysfs_write_file+0xe7/0x144
[ 15.015048]
[ 15.015048] stack backtrace:
[ 15.015048] Pid: 773, comm: ir-keytable Not tainted 2.6.38.4-20.fc15.x86_64.debug #1
[ 15.015048] Call Trace:
[ 15.015048] [<ffffffff81089715>] ? print_unlock_inbalance_bug+0xca/0xd5
[ 15.015048] [<ffffffff8108b35c>] ? lock_release_non_nested+0xc1/0x263
[ 15.015048] [<ffffffff814c6297>] ? mutex_unlock+0xe/0x10
[ 15.015048] [<ffffffff814c6297>] ? mutex_unlock+0xe/0x10
[ 15.015048] [<ffffffff8108b67b>] ? lock_release+0x17d/0x1a4
[ 15.015048] [<ffffffff814c6229>] ? __mutex_unlock_slowpath+0xc5/0x125
[ 15.015048] [<ffffffff814c6297>] ? mutex_unlock+0xe/0x10
[ 15.015048] [<ffffffffa02964b6>] ? send_packet+0x1c9/0x264 [imon]
[ 15.015048] [<ffffffff8108b376>] ? lock_release_non_nested+0xdb/0x263
[ 15.015048] [<ffffffffa0296731>] ? imon_ir_change_protocol+0x126/0x15e [imon]
[ 15.015048] [<ffffffffa024a334>] ? store_protocols+0x1c3/0x286 [rc_core]
[ 15.015048] [<ffffffff81326e4e>] ? dev_attr_store+0x20/0x22
[ 15.015048] [<ffffffff8119d4cc>] ? sysfs_write_file+0x108/0x144
...
The original report that led to the investigation was the following:
[ 1679.457305] INFO: task LCDd:8460 blocked for more than 120 seconds.
[ 1679.457307] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
[ 1679.457309] LCDd D ffff88010fcd89c8 0 8460 1 0x00000000
[ 1679.457312] ffff8800d5a03b48 0000000000000082 0000000000000000 ffff8800d5a03fd8
[ 1679.457314] 00000000012dcd30 fffffffffffffffd ffff8800d5a03fd8 ffff88010fcd86f0
[ 1679.457316] ffff8800d5a03fd8 ffff8800d5a03fd8 ffff88010fcd89d0 ffff8800d5a03fd8
[ 1679.457319] Call Trace:
[ 1679.457324] [<ffffffff810ff1a5>] ? zone_statistics+0x75/0x90
[ 1679.457327] [<ffffffff810ea907>] ? get_page_from_freelist+0x3c7/0x820
[ 1679.457330] [<ffffffff813b0a49>] __mutex_lock_slowpath+0x139/0x320
[ 1679.457335] [<ffffffff813b0c41>] mutex_lock+0x11/0x30
[ 1679.457338] [<ffffffffa0d54216>] display_open+0x66/0x130 [imon]
[ 1679.457345] [<ffffffffa01d06c0>] usb_open+0x180/0x310 [usbcore]
[ 1679.457349] [<ffffffff81143b3b>] chrdev_open+0x1bb/0x2d0
[ 1679.457350] [<ffffffff8113d93d>] __dentry_open+0x10d/0x370
[ 1679.457352] [<ffffffff81143980>] ? chrdev_open+0x0/0x2d0
...
Bump the driver version here so its easier to tell if people have this
locking fix or not, and also make locking during probe easier to follow.
CC: stable@kernel.org
Reported-by: Benjamin Hodgetts <ben@xnode.org>
Signed-off-by: Jarod Wilson <jarod@redhat.com>
Signed-off-by: Mauro Carvalho Chehab <mchehab@redhat.com>
2011-04-28 02:01:44 +04:00
|
|
|
if (!mutex_is_locked(&ictx->lock)) {
|
|
|
|
unlock = true;
|
|
|
|
mutex_lock(&ictx->lock);
|
|
|
|
}
|
|
|
|
|
2010-04-17 01:29:02 +04:00
|
|
|
retval = send_packet(ictx);
|
2010-04-23 09:27:11 +04:00
|
|
|
if (retval)
|
|
|
|
goto out;
|
|
|
|
|
2017-08-07 23:20:58 +03:00
|
|
|
ictx->rc_proto = *rc_proto;
|
2011-01-06 22:59:35 +03:00
|
|
|
ictx->pad_mouse = false;
|
2010-04-23 09:27:11 +04:00
|
|
|
|
|
|
|
out:
|
[media] imon: add conditional locking in change_protocol
The imon_ir_change_protocol function gets called two different ways, one
way is from rc_register_device, for initial protocol selection/setup,
and the other is via a userspace-initiated protocol change request,
either by direct sysfs prodding or by something like ir-keytable.
In the rc_register_device case, the imon context lock is already held,
but when initiated from userspace, it is not, so we must acquire it,
prior to calling send_packet, which requires that the lock is held.
Without this change, there's an easily reproduceable deadlock when
another function calls send_packet (such as either of the display write
fops) after a userspace-initiated change_protocol.
With a lock-debugging-enabled kernel, I was getting this:
[ 15.014153] =====================================
[ 15.015048] [ BUG: bad unlock balance detected! ]
[ 15.015048] -------------------------------------
[ 15.015048] ir-keytable/773 is trying to release lock (&ictx->lock) at:
[ 15.015048] [<ffffffff814c6297>] mutex_unlock+0xe/0x10
[ 15.015048] but there are no more locks to release!
[ 15.015048]
[ 15.015048] other info that might help us debug this:
[ 15.015048] 2 locks held by ir-keytable/773:
[ 15.015048] #0: (&buffer->mutex){+.+.+.}, at: [<ffffffff8119d400>] sysfs_write_file+0x3c/0x144
[ 15.015048] #1: (s_active#87){.+.+.+}, at: [<ffffffff8119d4ab>] sysfs_write_file+0xe7/0x144
[ 15.015048]
[ 15.015048] stack backtrace:
[ 15.015048] Pid: 773, comm: ir-keytable Not tainted 2.6.38.4-20.fc15.x86_64.debug #1
[ 15.015048] Call Trace:
[ 15.015048] [<ffffffff81089715>] ? print_unlock_inbalance_bug+0xca/0xd5
[ 15.015048] [<ffffffff8108b35c>] ? lock_release_non_nested+0xc1/0x263
[ 15.015048] [<ffffffff814c6297>] ? mutex_unlock+0xe/0x10
[ 15.015048] [<ffffffff814c6297>] ? mutex_unlock+0xe/0x10
[ 15.015048] [<ffffffff8108b67b>] ? lock_release+0x17d/0x1a4
[ 15.015048] [<ffffffff814c6229>] ? __mutex_unlock_slowpath+0xc5/0x125
[ 15.015048] [<ffffffff814c6297>] ? mutex_unlock+0xe/0x10
[ 15.015048] [<ffffffffa02964b6>] ? send_packet+0x1c9/0x264 [imon]
[ 15.015048] [<ffffffff8108b376>] ? lock_release_non_nested+0xdb/0x263
[ 15.015048] [<ffffffffa0296731>] ? imon_ir_change_protocol+0x126/0x15e [imon]
[ 15.015048] [<ffffffffa024a334>] ? store_protocols+0x1c3/0x286 [rc_core]
[ 15.015048] [<ffffffff81326e4e>] ? dev_attr_store+0x20/0x22
[ 15.015048] [<ffffffff8119d4cc>] ? sysfs_write_file+0x108/0x144
...
The original report that led to the investigation was the following:
[ 1679.457305] INFO: task LCDd:8460 blocked for more than 120 seconds.
[ 1679.457307] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
[ 1679.457309] LCDd D ffff88010fcd89c8 0 8460 1 0x00000000
[ 1679.457312] ffff8800d5a03b48 0000000000000082 0000000000000000 ffff8800d5a03fd8
[ 1679.457314] 00000000012dcd30 fffffffffffffffd ffff8800d5a03fd8 ffff88010fcd86f0
[ 1679.457316] ffff8800d5a03fd8 ffff8800d5a03fd8 ffff88010fcd89d0 ffff8800d5a03fd8
[ 1679.457319] Call Trace:
[ 1679.457324] [<ffffffff810ff1a5>] ? zone_statistics+0x75/0x90
[ 1679.457327] [<ffffffff810ea907>] ? get_page_from_freelist+0x3c7/0x820
[ 1679.457330] [<ffffffff813b0a49>] __mutex_lock_slowpath+0x139/0x320
[ 1679.457335] [<ffffffff813b0c41>] mutex_lock+0x11/0x30
[ 1679.457338] [<ffffffffa0d54216>] display_open+0x66/0x130 [imon]
[ 1679.457345] [<ffffffffa01d06c0>] usb_open+0x180/0x310 [usbcore]
[ 1679.457349] [<ffffffff81143b3b>] chrdev_open+0x1bb/0x2d0
[ 1679.457350] [<ffffffff8113d93d>] __dentry_open+0x10d/0x370
[ 1679.457352] [<ffffffff81143980>] ? chrdev_open+0x0/0x2d0
...
Bump the driver version here so its easier to tell if people have this
locking fix or not, and also make locking during probe easier to follow.
CC: stable@kernel.org
Reported-by: Benjamin Hodgetts <ben@xnode.org>
Signed-off-by: Jarod Wilson <jarod@redhat.com>
Signed-off-by: Mauro Carvalho Chehab <mchehab@redhat.com>
2011-04-28 02:01:44 +04:00
|
|
|
if (unlock)
|
|
|
|
mutex_unlock(&ictx->lock);
|
|
|
|
|
2010-04-23 09:27:11 +04:00
|
|
|
return retval;
|
2010-04-17 01:29:02 +04:00
|
|
|
}
|
|
|
|
|
2017-11-27 18:27:54 +03:00
|
|
|
/*
|
2010-04-17 01:29:02 +04:00
|
|
|
* The directional pad behaves a bit differently, depending on whether this is
|
|
|
|
* one of the older ffdc devices or a newer device. Newer devices appear to
|
|
|
|
* have a higher resolution matrix for more precise mouse movement, but it
|
|
|
|
* makes things overly sensitive in keyboard mode, so we do some interesting
|
|
|
|
* contortions to make it less touchy. Older devices run through the same
|
|
|
|
* routine with shorter timeout and a smaller threshold.
|
|
|
|
*/
|
|
|
|
static int stabilize(int a, int b, u16 timeout, u16 threshold)
|
|
|
|
{
|
2017-11-06 17:06:10 +03:00
|
|
|
ktime_t ct;
|
|
|
|
static ktime_t prev_time;
|
|
|
|
static ktime_t hit_time;
|
2010-04-17 01:29:02 +04:00
|
|
|
static int x, y, prev_result, hits;
|
|
|
|
int result = 0;
|
2017-11-06 17:06:10 +03:00
|
|
|
long msec, msec_hit;
|
2010-04-17 01:29:02 +04:00
|
|
|
|
2017-11-06 17:06:10 +03:00
|
|
|
ct = ktime_get();
|
|
|
|
msec = ktime_ms_delta(ct, prev_time);
|
|
|
|
msec_hit = ktime_ms_delta(ct, hit_time);
|
2010-04-17 01:29:02 +04:00
|
|
|
|
|
|
|
if (msec > 100) {
|
|
|
|
x = 0;
|
|
|
|
y = 0;
|
|
|
|
hits = 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
x += a;
|
|
|
|
y += b;
|
|
|
|
|
|
|
|
prev_time = ct;
|
|
|
|
|
|
|
|
if (abs(x) > threshold || abs(y) > threshold) {
|
|
|
|
if (abs(y) > abs(x))
|
|
|
|
result = (y > 0) ? 0x7F : 0x80;
|
|
|
|
else
|
|
|
|
result = (x > 0) ? 0x7F00 : 0x8000;
|
|
|
|
|
|
|
|
x = 0;
|
|
|
|
y = 0;
|
|
|
|
|
|
|
|
if (result == prev_result) {
|
|
|
|
hits++;
|
|
|
|
|
|
|
|
if (hits > 3) {
|
|
|
|
switch (result) {
|
|
|
|
case 0x7F:
|
|
|
|
y = 17 * threshold / 30;
|
|
|
|
break;
|
|
|
|
case 0x80:
|
|
|
|
y -= 17 * threshold / 30;
|
|
|
|
break;
|
|
|
|
case 0x7F00:
|
|
|
|
x = 17 * threshold / 30;
|
|
|
|
break;
|
|
|
|
case 0x8000:
|
|
|
|
x -= 17 * threshold / 30;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
if (hits == 2 && msec_hit < timeout) {
|
|
|
|
result = 0;
|
|
|
|
hits = 1;
|
|
|
|
}
|
|
|
|
} else {
|
|
|
|
prev_result = result;
|
|
|
|
hits = 1;
|
|
|
|
hit_time = ct;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return result;
|
|
|
|
}
|
|
|
|
|
2010-09-15 22:42:07 +04:00
|
|
|
static u32 imon_remote_key_lookup(struct imon_context *ictx, u32 scancode)
|
2010-04-17 01:29:02 +04:00
|
|
|
{
|
|
|
|
u32 keycode;
|
|
|
|
u32 release;
|
|
|
|
bool is_release_code = false;
|
|
|
|
|
|
|
|
/* Look for the initial press of a button */
|
2010-11-17 19:53:11 +03:00
|
|
|
keycode = rc_g_keycode_from_table(ictx->rdev, scancode);
|
2010-09-15 22:42:07 +04:00
|
|
|
ictx->rc_toggle = 0x0;
|
|
|
|
ictx->rc_scancode = scancode;
|
2010-04-17 01:29:02 +04:00
|
|
|
|
|
|
|
/* Look for the release of a button */
|
|
|
|
if (keycode == KEY_RESERVED) {
|
|
|
|
release = scancode & ~0x4000;
|
2010-11-17 19:53:11 +03:00
|
|
|
keycode = rc_g_keycode_from_table(ictx->rdev, release);
|
2010-04-17 01:29:02 +04:00
|
|
|
if (keycode != KEY_RESERVED)
|
|
|
|
is_release_code = true;
|
|
|
|
}
|
|
|
|
|
|
|
|
ictx->release_code = is_release_code;
|
|
|
|
|
|
|
|
return keycode;
|
|
|
|
}
|
|
|
|
|
2010-09-15 22:42:07 +04:00
|
|
|
static u32 imon_mce_key_lookup(struct imon_context *ictx, u32 scancode)
|
2010-04-17 01:29:02 +04:00
|
|
|
{
|
|
|
|
u32 keycode;
|
|
|
|
|
|
|
|
#define MCE_KEY_MASK 0x7000
|
|
|
|
#define MCE_TOGGLE_BIT 0x8000
|
|
|
|
|
|
|
|
/*
|
|
|
|
* On some receivers, mce keys decode to 0x8000f04xx and 0x8000f84xx
|
|
|
|
* (the toggle bit flipping between alternating key presses), while
|
|
|
|
* on other receivers, we see 0x8000f74xx and 0x8000ff4xx. To keep
|
|
|
|
* the table trim, we always or in the bits to look up 0x8000ff4xx,
|
|
|
|
* but we can't or them into all codes, as some keys are decoded in
|
|
|
|
* a different way w/o the same use of the toggle bit...
|
|
|
|
*/
|
2010-09-15 22:42:07 +04:00
|
|
|
if (scancode & 0x80000000)
|
2010-04-17 01:29:02 +04:00
|
|
|
scancode = scancode | MCE_KEY_MASK | MCE_TOGGLE_BIT;
|
|
|
|
|
2010-09-15 22:42:07 +04:00
|
|
|
ictx->rc_scancode = scancode;
|
2010-11-17 19:53:11 +03:00
|
|
|
keycode = rc_g_keycode_from_table(ictx->rdev, scancode);
|
2010-09-15 22:42:07 +04:00
|
|
|
|
|
|
|
/* not used in mce mode, but make sure we know its false */
|
|
|
|
ictx->release_code = false;
|
2010-04-17 01:29:02 +04:00
|
|
|
|
|
|
|
return keycode;
|
|
|
|
}
|
|
|
|
|
2014-07-26 21:56:01 +04:00
|
|
|
static u32 imon_panel_key_lookup(struct imon_context *ictx, u64 code)
|
2010-04-17 01:29:02 +04:00
|
|
|
{
|
2019-09-20 19:11:39 +03:00
|
|
|
const struct imon_panel_key_table *key_table;
|
V4L/DVB: IR/imon: remove dead IMON_KEY_RELEASE_OFFSET
On Tue, May 04, 2010 at 06:06:41PM +0200, Dan Carpenter wrote:
> On Tue, May 04, 2010 at 10:03:18AM -0400, Jarod Wilson wrote:
> > @@ -1205,7 +1204,7 @@ static u32 imon_panel_key_lookup(u64 hw_code)
> > if (imon_panel_key_table[i].hw_code == (code | 0xffee))
> > break;
> >
> > - keycode = imon_panel_key_table[i % IMON_KEY_RELEASE_OFFSET].keycode;
> > + keycode = imon_panel_key_table[i].keycode;
> >
> > return keycode;
> > }
>
> There is still potentially a problem here because if we don't hit the
> break statement, then we're one past the end of the array.
D'oh. Okay, here's v2, should fix that buglet too.
This hack was used when the imon driver was using internal key lookup
routines, but became dead weight when the driver was converted to use
ir-core's key lookup routines. These bits simply didn't get removed,
drop 'em now.
Pointed out by Dan Carpenter.
v2: fix possible attempt to access beyond end of key table array,
also pointed out by Dan.
Signed-off-by: Jarod Wilson <jarod@redhat.com>
Signed-off-by: Mauro Carvalho Chehab <mchehab@redhat.com>
2010-05-04 23:17:05 +04:00
|
|
|
u32 keycode = KEY_RESERVED;
|
2019-09-20 19:11:39 +03:00
|
|
|
int i;
|
|
|
|
|
|
|
|
key_table = ictx->dev_descr->key_table;
|
2010-04-17 01:29:02 +04:00
|
|
|
|
2014-07-26 21:56:01 +04:00
|
|
|
for (i = 0; key_table[i].hw_code != 0; i++) {
|
|
|
|
if (key_table[i].hw_code == (code | 0xffee)) {
|
|
|
|
keycode = key_table[i].keycode;
|
2010-04-17 01:29:02 +04:00
|
|
|
break;
|
V4L/DVB: IR/imon: remove dead IMON_KEY_RELEASE_OFFSET
On Tue, May 04, 2010 at 06:06:41PM +0200, Dan Carpenter wrote:
> On Tue, May 04, 2010 at 10:03:18AM -0400, Jarod Wilson wrote:
> > @@ -1205,7 +1204,7 @@ static u32 imon_panel_key_lookup(u64 hw_code)
> > if (imon_panel_key_table[i].hw_code == (code | 0xffee))
> > break;
> >
> > - keycode = imon_panel_key_table[i % IMON_KEY_RELEASE_OFFSET].keycode;
> > + keycode = imon_panel_key_table[i].keycode;
> >
> > return keycode;
> > }
>
> There is still potentially a problem here because if we don't hit the
> break statement, then we're one past the end of the array.
D'oh. Okay, here's v2, should fix that buglet too.
This hack was used when the imon driver was using internal key lookup
routines, but became dead weight when the driver was converted to use
ir-core's key lookup routines. These bits simply didn't get removed,
drop 'em now.
Pointed out by Dan Carpenter.
v2: fix possible attempt to access beyond end of key table array,
also pointed out by Dan.
Signed-off-by: Jarod Wilson <jarod@redhat.com>
Signed-off-by: Mauro Carvalho Chehab <mchehab@redhat.com>
2010-05-04 23:17:05 +04:00
|
|
|
}
|
|
|
|
}
|
2014-07-26 21:56:01 +04:00
|
|
|
ictx->release_code = false;
|
2010-04-17 01:29:02 +04:00
|
|
|
return keycode;
|
|
|
|
}
|
|
|
|
|
|
|
|
static bool imon_mouse_event(struct imon_context *ictx,
|
|
|
|
unsigned char *buf, int len)
|
|
|
|
{
|
[media] imon: fix Knob event interpretation issues on ARM
Events for the iMon Knob pad where not correctly interpreted on ARM,
resulting in buggy mouse movements (cursor going straight out of the
screen), key pad only generating KEY_RIGHT and KEY_DOWN events.
A reproducer is:
int main(int argc, char ** argv)
{
char rel_x = 0x00; printf("rel_x:%d @%s:%d\n", rel_x, __FILE__, __LINE__);
rel_x = 0x0f; printf("rel_x:%d @%s:%d\n", rel_x, __FILE__, __LINE__);
rel_x |= ~0x0f; printf("rel_x:%d @%s:%d\n", rel_x, __FILE__, __LINE__);
return 0;
}
(running on x86 or amd64)
$ ./test
rel_x:0 @test.c:6
rel_x:15 @test.c:7
rel_x:-1 @test.c:8
(running on armv6)
rel_x:0 @test.c:6
rel_x:15 @test.c:7
rel_x:255 @test.c:8
Forcing the rel_x and rel_y variables as signed char fixes the issue.
Reference: http://www.arm.linux.org.uk/docs/faqs/signedchar.php
Signed-off-by: Alexandre Lissy <alexandrelissy@free.fr>
Signed-off-by: Mauro Carvalho Chehab <mchehab@redhat.com>
2012-09-02 22:35:20 +04:00
|
|
|
signed char rel_x = 0x00, rel_y = 0x00;
|
2010-04-17 01:29:02 +04:00
|
|
|
u8 right_shift = 1;
|
2010-05-24 19:00:31 +04:00
|
|
|
bool mouse_input = true;
|
2010-04-17 01:29:02 +04:00
|
|
|
int dir = 0;
|
2010-09-15 22:56:03 +04:00
|
|
|
unsigned long flags;
|
|
|
|
|
|
|
|
spin_lock_irqsave(&ictx->kc_lock, flags);
|
2010-04-17 01:29:02 +04:00
|
|
|
|
|
|
|
/* newer iMON device PAD or mouse button */
|
|
|
|
if (ictx->product != 0xffdc && (buf[0] & 0x01) && len == 5) {
|
|
|
|
rel_x = buf[2];
|
|
|
|
rel_y = buf[3];
|
|
|
|
right_shift = 1;
|
|
|
|
/* 0xffdc iMON PAD or mouse button input */
|
|
|
|
} else if (ictx->product == 0xffdc && (buf[0] & 0x40) &&
|
|
|
|
!((buf[1] & 0x01) || ((buf[1] >> 2) & 0x01))) {
|
|
|
|
rel_x = (buf[1] & 0x08) | (buf[1] & 0x10) >> 2 |
|
|
|
|
(buf[1] & 0x20) >> 4 | (buf[1] & 0x40) >> 6;
|
|
|
|
if (buf[0] & 0x02)
|
|
|
|
rel_x |= ~0x0f;
|
|
|
|
rel_x = rel_x + rel_x / 2;
|
|
|
|
rel_y = (buf[2] & 0x08) | (buf[2] & 0x10) >> 2 |
|
|
|
|
(buf[2] & 0x20) >> 4 | (buf[2] & 0x40) >> 6;
|
|
|
|
if (buf[0] & 0x01)
|
|
|
|
rel_y |= ~0x0f;
|
|
|
|
rel_y = rel_y + rel_y / 2;
|
|
|
|
right_shift = 2;
|
|
|
|
/* some ffdc devices decode mouse buttons differently... */
|
|
|
|
} else if (ictx->product == 0xffdc && (buf[0] == 0x68)) {
|
|
|
|
right_shift = 2;
|
|
|
|
/* ch+/- buttons, which we use for an emulated scroll wheel */
|
|
|
|
} else if (ictx->kc == KEY_CHANNELUP && (buf[2] & 0x40) != 0x40) {
|
|
|
|
dir = 1;
|
|
|
|
} else if (ictx->kc == KEY_CHANNELDOWN && (buf[2] & 0x40) != 0x40) {
|
|
|
|
dir = -1;
|
|
|
|
} else
|
2010-05-24 19:00:31 +04:00
|
|
|
mouse_input = false;
|
2010-04-17 01:29:02 +04:00
|
|
|
|
2010-09-15 22:56:03 +04:00
|
|
|
spin_unlock_irqrestore(&ictx->kc_lock, flags);
|
|
|
|
|
2010-04-17 01:29:02 +04:00
|
|
|
if (mouse_input) {
|
|
|
|
dev_dbg(ictx->dev, "sending mouse data via input subsystem\n");
|
|
|
|
|
|
|
|
if (dir) {
|
|
|
|
input_report_rel(ictx->idev, REL_WHEEL, dir);
|
|
|
|
} else if (rel_x || rel_y) {
|
|
|
|
input_report_rel(ictx->idev, REL_X, rel_x);
|
|
|
|
input_report_rel(ictx->idev, REL_Y, rel_y);
|
|
|
|
} else {
|
|
|
|
input_report_key(ictx->idev, BTN_LEFT, buf[1] & 0x1);
|
|
|
|
input_report_key(ictx->idev, BTN_RIGHT,
|
|
|
|
buf[1] >> right_shift & 0x1);
|
|
|
|
}
|
|
|
|
input_sync(ictx->idev);
|
2010-09-15 22:56:03 +04:00
|
|
|
spin_lock_irqsave(&ictx->kc_lock, flags);
|
2010-04-17 01:29:02 +04:00
|
|
|
ictx->last_keycode = ictx->kc;
|
2010-09-15 22:56:03 +04:00
|
|
|
spin_unlock_irqrestore(&ictx->kc_lock, flags);
|
2010-04-17 01:29:02 +04:00
|
|
|
}
|
|
|
|
|
|
|
|
return mouse_input;
|
|
|
|
}
|
|
|
|
|
|
|
|
static void imon_touch_event(struct imon_context *ictx, unsigned char *buf)
|
|
|
|
{
|
|
|
|
mod_timer(&ictx->ttimer, jiffies + TOUCH_TIMEOUT);
|
|
|
|
ictx->touch_x = (buf[0] << 4) | (buf[1] >> 4);
|
|
|
|
ictx->touch_y = 0xfff - ((buf[2] << 4) | (buf[1] & 0xf));
|
|
|
|
input_report_abs(ictx->touch, ABS_X, ictx->touch_x);
|
|
|
|
input_report_abs(ictx->touch, ABS_Y, ictx->touch_y);
|
|
|
|
input_report_key(ictx->touch, BTN_TOUCH, 0x01);
|
|
|
|
input_sync(ictx->touch);
|
|
|
|
}
|
|
|
|
|
|
|
|
static void imon_pad_to_keys(struct imon_context *ictx, unsigned char *buf)
|
|
|
|
{
|
|
|
|
int dir = 0;
|
[media] imon: fix Knob event interpretation issues on ARM
Events for the iMon Knob pad where not correctly interpreted on ARM,
resulting in buggy mouse movements (cursor going straight out of the
screen), key pad only generating KEY_RIGHT and KEY_DOWN events.
A reproducer is:
int main(int argc, char ** argv)
{
char rel_x = 0x00; printf("rel_x:%d @%s:%d\n", rel_x, __FILE__, __LINE__);
rel_x = 0x0f; printf("rel_x:%d @%s:%d\n", rel_x, __FILE__, __LINE__);
rel_x |= ~0x0f; printf("rel_x:%d @%s:%d\n", rel_x, __FILE__, __LINE__);
return 0;
}
(running on x86 or amd64)
$ ./test
rel_x:0 @test.c:6
rel_x:15 @test.c:7
rel_x:-1 @test.c:8
(running on armv6)
rel_x:0 @test.c:6
rel_x:15 @test.c:7
rel_x:255 @test.c:8
Forcing the rel_x and rel_y variables as signed char fixes the issue.
Reference: http://www.arm.linux.org.uk/docs/faqs/signedchar.php
Signed-off-by: Alexandre Lissy <alexandrelissy@free.fr>
Signed-off-by: Mauro Carvalho Chehab <mchehab@redhat.com>
2012-09-02 22:35:20 +04:00
|
|
|
signed char rel_x = 0x00, rel_y = 0x00;
|
2010-04-17 01:29:02 +04:00
|
|
|
u16 timeout, threshold;
|
2010-09-15 22:42:07 +04:00
|
|
|
u32 scancode = KEY_RESERVED;
|
2010-09-15 22:56:03 +04:00
|
|
|
unsigned long flags;
|
2010-04-17 01:29:02 +04:00
|
|
|
|
|
|
|
/*
|
|
|
|
* The imon directional pad functions more like a touchpad. Bytes 3 & 4
|
|
|
|
* contain a position coordinate (x,y), with each component ranging
|
|
|
|
* from -14 to 14. We want to down-sample this to only 4 discrete values
|
|
|
|
* for up/down/left/right arrow keys. Also, when you get too close to
|
2011-03-31 05:57:33 +04:00
|
|
|
* diagonals, it has a tendency to jump back and forth, so lets try to
|
2010-04-17 01:29:02 +04:00
|
|
|
* ignore when they get too close.
|
|
|
|
*/
|
|
|
|
if (ictx->product != 0xffdc) {
|
|
|
|
/* first, pad to 8 bytes so it conforms with everything else */
|
|
|
|
buf[5] = buf[6] = buf[7] = 0;
|
|
|
|
timeout = 500; /* in msecs */
|
|
|
|
/* (2*threshold) x (2*threshold) square */
|
|
|
|
threshold = pad_thresh ? pad_thresh : 28;
|
|
|
|
rel_x = buf[2];
|
|
|
|
rel_y = buf[3];
|
|
|
|
|
2018-03-07 13:55:38 +03:00
|
|
|
if (ictx->rc_proto == RC_PROTO_BIT_IMON && pad_stabilize) {
|
2010-04-17 01:29:02 +04:00
|
|
|
if ((buf[1] == 0) && ((rel_x != 0) || (rel_y != 0))) {
|
|
|
|
dir = stabilize((int)rel_x, (int)rel_y,
|
|
|
|
timeout, threshold);
|
|
|
|
if (!dir) {
|
2010-09-15 22:56:03 +04:00
|
|
|
spin_lock_irqsave(&ictx->kc_lock,
|
|
|
|
flags);
|
2010-04-17 01:29:02 +04:00
|
|
|
ictx->kc = KEY_UNKNOWN;
|
2010-09-15 22:56:03 +04:00
|
|
|
spin_unlock_irqrestore(&ictx->kc_lock,
|
|
|
|
flags);
|
2010-04-17 01:29:02 +04:00
|
|
|
return;
|
|
|
|
}
|
|
|
|
buf[2] = dir & 0xFF;
|
|
|
|
buf[3] = (dir >> 8) & 0xFF;
|
2014-08-21 02:34:33 +04:00
|
|
|
scancode = be32_to_cpu(*((__be32 *)buf));
|
2010-04-17 01:29:02 +04:00
|
|
|
}
|
|
|
|
} else {
|
2010-09-15 22:42:07 +04:00
|
|
|
/*
|
|
|
|
* Hack alert: instead of using keycodes, we have
|
|
|
|
* to use hard-coded scancodes here...
|
|
|
|
*/
|
2010-04-17 01:29:02 +04:00
|
|
|
if (abs(rel_y) > abs(rel_x)) {
|
|
|
|
buf[2] = (rel_y > 0) ? 0x7F : 0x80;
|
|
|
|
buf[3] = 0;
|
2010-09-15 22:42:07 +04:00
|
|
|
if (rel_y > 0)
|
|
|
|
scancode = 0x01007f00; /* KEY_DOWN */
|
|
|
|
else
|
|
|
|
scancode = 0x01008000; /* KEY_UP */
|
2010-04-17 01:29:02 +04:00
|
|
|
} else {
|
|
|
|
buf[2] = 0;
|
|
|
|
buf[3] = (rel_x > 0) ? 0x7F : 0x80;
|
2010-09-15 22:42:07 +04:00
|
|
|
if (rel_x > 0)
|
|
|
|
scancode = 0x0100007f; /* KEY_RIGHT */
|
|
|
|
else
|
|
|
|
scancode = 0x01000080; /* KEY_LEFT */
|
2010-04-17 01:29:02 +04:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Handle on-board decoded pad events for e.g. older VFD/iMON-Pad
|
|
|
|
* device (15c2:ffdc). The remote generates various codes from
|
|
|
|
* 0x68nnnnB7 to 0x6AnnnnB7, the left mouse button generates
|
|
|
|
* 0x688301b7 and the right one 0x688481b7. All other keys generate
|
|
|
|
* 0x2nnnnnnn. Position coordinate is encoded in buf[1] and buf[2] with
|
2013-10-21 04:34:01 +04:00
|
|
|
* reversed endianness. Extract direction from buffer, rotate endianness,
|
2010-04-17 01:29:02 +04:00
|
|
|
* adjust sign and feed the values into stabilize(). The resulting codes
|
|
|
|
* will be 0x01008000, 0x01007F00, which match the newer devices.
|
|
|
|
*/
|
|
|
|
} else {
|
|
|
|
timeout = 10; /* in msecs */
|
|
|
|
/* (2*threshold) x (2*threshold) square */
|
|
|
|
threshold = pad_thresh ? pad_thresh : 15;
|
|
|
|
|
|
|
|
/* buf[1] is x */
|
|
|
|
rel_x = (buf[1] & 0x08) | (buf[1] & 0x10) >> 2 |
|
|
|
|
(buf[1] & 0x20) >> 4 | (buf[1] & 0x40) >> 6;
|
|
|
|
if (buf[0] & 0x02)
|
|
|
|
rel_x |= ~0x10+1;
|
|
|
|
/* buf[2] is y */
|
|
|
|
rel_y = (buf[2] & 0x08) | (buf[2] & 0x10) >> 2 |
|
|
|
|
(buf[2] & 0x20) >> 4 | (buf[2] & 0x40) >> 6;
|
|
|
|
if (buf[0] & 0x01)
|
|
|
|
rel_y |= ~0x10+1;
|
|
|
|
|
|
|
|
buf[0] = 0x01;
|
|
|
|
buf[1] = buf[4] = buf[5] = buf[6] = buf[7] = 0;
|
|
|
|
|
2018-03-07 13:55:38 +03:00
|
|
|
if (ictx->rc_proto == RC_PROTO_BIT_IMON && pad_stabilize) {
|
2010-04-17 01:29:02 +04:00
|
|
|
dir = stabilize((int)rel_x, (int)rel_y,
|
|
|
|
timeout, threshold);
|
|
|
|
if (!dir) {
|
2010-09-15 22:56:03 +04:00
|
|
|
spin_lock_irqsave(&ictx->kc_lock, flags);
|
2010-04-17 01:29:02 +04:00
|
|
|
ictx->kc = KEY_UNKNOWN;
|
2010-09-15 22:56:03 +04:00
|
|
|
spin_unlock_irqrestore(&ictx->kc_lock, flags);
|
2010-04-17 01:29:02 +04:00
|
|
|
return;
|
|
|
|
}
|
|
|
|
buf[2] = dir & 0xFF;
|
|
|
|
buf[3] = (dir >> 8) & 0xFF;
|
2014-08-21 02:34:33 +04:00
|
|
|
scancode = be32_to_cpu(*((__be32 *)buf));
|
2010-04-17 01:29:02 +04:00
|
|
|
} else {
|
2010-09-15 22:42:07 +04:00
|
|
|
/*
|
|
|
|
* Hack alert: instead of using keycodes, we have
|
|
|
|
* to use hard-coded scancodes here...
|
|
|
|
*/
|
2010-04-17 01:29:02 +04:00
|
|
|
if (abs(rel_y) > abs(rel_x)) {
|
|
|
|
buf[2] = (rel_y > 0) ? 0x7F : 0x80;
|
|
|
|
buf[3] = 0;
|
2010-09-15 22:42:07 +04:00
|
|
|
if (rel_y > 0)
|
|
|
|
scancode = 0x01007f00; /* KEY_DOWN */
|
|
|
|
else
|
|
|
|
scancode = 0x01008000; /* KEY_UP */
|
2010-04-17 01:29:02 +04:00
|
|
|
} else {
|
|
|
|
buf[2] = 0;
|
|
|
|
buf[3] = (rel_x > 0) ? 0x7F : 0x80;
|
2010-09-15 22:42:07 +04:00
|
|
|
if (rel_x > 0)
|
|
|
|
scancode = 0x0100007f; /* KEY_RIGHT */
|
|
|
|
else
|
|
|
|
scancode = 0x01000080; /* KEY_LEFT */
|
2010-04-17 01:29:02 +04:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
2010-09-15 22:42:07 +04:00
|
|
|
|
2010-09-15 22:56:03 +04:00
|
|
|
if (scancode) {
|
|
|
|
spin_lock_irqsave(&ictx->kc_lock, flags);
|
2010-09-15 22:42:07 +04:00
|
|
|
ictx->kc = imon_remote_key_lookup(ictx, scancode);
|
2010-09-15 22:56:03 +04:00
|
|
|
spin_unlock_irqrestore(&ictx->kc_lock, flags);
|
|
|
|
}
|
2010-04-17 01:29:02 +04:00
|
|
|
}
|
|
|
|
|
2017-11-27 18:27:54 +03:00
|
|
|
/*
|
2010-09-15 22:42:07 +04:00
|
|
|
* figure out if these is a press or a release. We don't actually
|
|
|
|
* care about repeats, as those will be auto-generated within the IR
|
|
|
|
* subsystem for repeating scancodes.
|
|
|
|
*/
|
2010-04-17 01:29:02 +04:00
|
|
|
static int imon_parse_press_type(struct imon_context *ictx,
|
|
|
|
unsigned char *buf, u8 ktype)
|
|
|
|
{
|
|
|
|
int press_type = 0;
|
2010-09-15 22:56:03 +04:00
|
|
|
unsigned long flags;
|
|
|
|
|
|
|
|
spin_lock_irqsave(&ictx->kc_lock, flags);
|
2010-04-17 01:29:02 +04:00
|
|
|
|
|
|
|
/* key release of 0x02XXXXXX key */
|
|
|
|
if (ictx->kc == KEY_RESERVED && buf[0] == 0x02 && buf[3] == 0x00)
|
|
|
|
ictx->kc = ictx->last_keycode;
|
|
|
|
|
|
|
|
/* mouse button release on (some) 0xffdc devices */
|
|
|
|
else if (ictx->kc == KEY_RESERVED && buf[0] == 0x68 && buf[1] == 0x82 &&
|
|
|
|
buf[2] == 0x81 && buf[3] == 0xb7)
|
|
|
|
ictx->kc = ictx->last_keycode;
|
|
|
|
|
|
|
|
/* mouse button release on (some other) 0xffdc devices */
|
|
|
|
else if (ictx->kc == KEY_RESERVED && buf[0] == 0x01 && buf[1] == 0x00 &&
|
|
|
|
buf[2] == 0x81 && buf[3] == 0xb7)
|
|
|
|
ictx->kc = ictx->last_keycode;
|
|
|
|
|
2010-09-15 22:42:07 +04:00
|
|
|
/* mce-specific button handling, no keyup events */
|
2010-04-17 01:29:02 +04:00
|
|
|
else if (ktype == IMON_KEY_MCE) {
|
2010-09-15 22:42:07 +04:00
|
|
|
ictx->rc_toggle = buf[2];
|
|
|
|
press_type = 1;
|
2010-04-17 01:29:02 +04:00
|
|
|
|
|
|
|
/* incoherent or irrelevant data */
|
|
|
|
} else if (ictx->kc == KEY_RESERVED)
|
|
|
|
press_type = -EINVAL;
|
|
|
|
|
|
|
|
/* key release of 0xXXXXXXb7 key */
|
|
|
|
else if (ictx->release_code)
|
|
|
|
press_type = 0;
|
|
|
|
|
|
|
|
/* this is a button press */
|
|
|
|
else
|
|
|
|
press_type = 1;
|
|
|
|
|
2010-09-15 22:56:03 +04:00
|
|
|
spin_unlock_irqrestore(&ictx->kc_lock, flags);
|
|
|
|
|
2010-04-17 01:29:02 +04:00
|
|
|
return press_type;
|
|
|
|
}
|
|
|
|
|
2017-11-27 18:27:54 +03:00
|
|
|
/*
|
2010-04-17 01:29:02 +04:00
|
|
|
* Process the incoming packet
|
|
|
|
*/
|
2018-01-06 15:24:50 +03:00
|
|
|
static void imon_incoming_packet(struct imon_context *ictx,
|
2010-04-17 01:29:02 +04:00
|
|
|
struct urb *urb, int intf)
|
|
|
|
{
|
|
|
|
int len = urb->actual_length;
|
|
|
|
unsigned char *buf = urb->transfer_buffer;
|
|
|
|
struct device *dev = ictx->dev;
|
2010-09-15 22:56:03 +04:00
|
|
|
unsigned long flags;
|
2010-04-17 01:29:02 +04:00
|
|
|
u32 kc;
|
2010-09-15 22:42:07 +04:00
|
|
|
u64 scancode;
|
2010-04-17 01:29:02 +04:00
|
|
|
int press_type = 0;
|
2017-11-06 17:06:10 +03:00
|
|
|
ktime_t t;
|
|
|
|
static ktime_t prev_time;
|
2010-09-15 22:42:07 +04:00
|
|
|
u8 ktype;
|
2010-04-17 01:29:02 +04:00
|
|
|
|
|
|
|
/* filter out junk data on the older 0xffdc imon devices */
|
2010-05-24 19:02:05 +04:00
|
|
|
if ((buf[0] == 0xff) && (buf[1] == 0xff) && (buf[2] == 0xff))
|
2010-04-17 01:29:02 +04:00
|
|
|
return;
|
|
|
|
|
|
|
|
/* Figure out what key was pressed */
|
|
|
|
if (len == 8 && buf[7] == 0xee) {
|
2014-08-21 02:34:33 +04:00
|
|
|
scancode = be64_to_cpu(*((__be64 *)buf));
|
2010-04-17 01:29:02 +04:00
|
|
|
ktype = IMON_KEY_PANEL;
|
2014-07-26 21:56:01 +04:00
|
|
|
kc = imon_panel_key_lookup(ictx, scancode);
|
2014-07-26 22:01:12 +04:00
|
|
|
ictx->release_code = false;
|
2010-04-17 01:29:02 +04:00
|
|
|
} else {
|
2014-08-21 02:34:33 +04:00
|
|
|
scancode = be32_to_cpu(*((__be32 *)buf));
|
2017-08-07 23:20:58 +03:00
|
|
|
if (ictx->rc_proto == RC_PROTO_BIT_RC6_MCE) {
|
2010-09-15 22:42:07 +04:00
|
|
|
ktype = IMON_KEY_IMON;
|
2010-04-17 01:29:02 +04:00
|
|
|
if (buf[0] == 0x80)
|
|
|
|
ktype = IMON_KEY_MCE;
|
2010-09-15 22:42:07 +04:00
|
|
|
kc = imon_mce_key_lookup(ictx, scancode);
|
|
|
|
} else {
|
|
|
|
ktype = IMON_KEY_IMON;
|
|
|
|
kc = imon_remote_key_lookup(ictx, scancode);
|
|
|
|
}
|
2010-04-17 01:29:02 +04:00
|
|
|
}
|
|
|
|
|
2010-09-15 22:56:03 +04:00
|
|
|
spin_lock_irqsave(&ictx->kc_lock, flags);
|
2010-04-17 01:29:02 +04:00
|
|
|
/* keyboard/mouse mode toggle button */
|
|
|
|
if (kc == KEY_KEYBOARD && !ictx->release_code) {
|
|
|
|
ictx->last_keycode = kc;
|
|
|
|
if (!nomouse) {
|
2017-05-11 14:46:44 +03:00
|
|
|
ictx->pad_mouse = !ictx->pad_mouse;
|
2010-04-17 01:29:02 +04:00
|
|
|
dev_dbg(dev, "toggling to %s mode\n",
|
|
|
|
ictx->pad_mouse ? "mouse" : "keyboard");
|
2010-09-15 22:56:03 +04:00
|
|
|
spin_unlock_irqrestore(&ictx->kc_lock, flags);
|
2010-04-17 01:29:02 +04:00
|
|
|
return;
|
|
|
|
} else {
|
2011-01-06 22:59:35 +03:00
|
|
|
ictx->pad_mouse = false;
|
2010-04-17 01:29:02 +04:00
|
|
|
dev_dbg(dev, "mouse mode disabled, passing key value\n");
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
ictx->kc = kc;
|
2010-09-15 22:56:03 +04:00
|
|
|
spin_unlock_irqrestore(&ictx->kc_lock, flags);
|
2010-04-17 01:29:02 +04:00
|
|
|
|
|
|
|
/* send touchscreen events through input subsystem if touchpad data */
|
2019-10-16 20:19:15 +03:00
|
|
|
if (ictx->touch && len == 8 && buf[7] == 0x86) {
|
2010-04-17 01:29:02 +04:00
|
|
|
imon_touch_event(ictx, buf);
|
2010-09-15 22:42:07 +04:00
|
|
|
return;
|
2010-04-17 01:29:02 +04:00
|
|
|
|
|
|
|
/* look for mouse events with pad in mouse mode */
|
|
|
|
} else if (ictx->pad_mouse) {
|
|
|
|
if (imon_mouse_event(ictx, buf, len))
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Now for some special handling to convert pad input to arrow keys */
|
|
|
|
if (((len == 5) && (buf[0] == 0x01) && (buf[4] == 0x00)) ||
|
|
|
|
((len == 8) && (buf[0] & 0x40) &&
|
|
|
|
!(buf[1] & 0x1 || buf[1] >> 2 & 0x1))) {
|
|
|
|
len = 8;
|
|
|
|
imon_pad_to_keys(ictx, buf);
|
|
|
|
}
|
|
|
|
|
|
|
|
if (debug) {
|
2016-10-14 13:48:35 +03:00
|
|
|
printk(KERN_INFO "intf%d decoded packet: %*ph\n",
|
|
|
|
intf, len, buf);
|
2010-04-17 01:29:02 +04:00
|
|
|
}
|
|
|
|
|
|
|
|
press_type = imon_parse_press_type(ictx, buf, ktype);
|
|
|
|
if (press_type < 0)
|
|
|
|
goto not_input_data;
|
|
|
|
|
2010-09-15 22:42:07 +04:00
|
|
|
if (ktype != IMON_KEY_PANEL) {
|
|
|
|
if (press_type == 0)
|
2010-11-17 19:53:11 +03:00
|
|
|
rc_keyup(ictx->rdev);
|
2010-09-15 22:42:07 +04:00
|
|
|
else {
|
2018-03-07 13:55:38 +03:00
|
|
|
enum rc_proto proto;
|
|
|
|
|
|
|
|
if (ictx->rc_proto == RC_PROTO_BIT_RC6_MCE)
|
|
|
|
proto = RC_PROTO_RC6_MCE;
|
|
|
|
else if (ictx->rc_proto == RC_PROTO_BIT_IMON)
|
|
|
|
proto = RC_PROTO_IMON;
|
|
|
|
else
|
|
|
|
return;
|
|
|
|
|
|
|
|
rc_keydown(ictx->rdev, proto, ictx->rc_scancode,
|
|
|
|
ictx->rc_toggle);
|
|
|
|
|
2010-09-15 22:56:03 +04:00
|
|
|
spin_lock_irqsave(&ictx->kc_lock, flags);
|
2010-09-15 22:42:07 +04:00
|
|
|
ictx->last_keycode = ictx->kc;
|
2010-09-15 22:56:03 +04:00
|
|
|
spin_unlock_irqrestore(&ictx->kc_lock, flags);
|
2010-09-15 22:42:07 +04:00
|
|
|
}
|
|
|
|
return;
|
|
|
|
}
|
2010-04-17 01:29:02 +04:00
|
|
|
|
2010-09-15 22:42:07 +04:00
|
|
|
/* Only panel type events left to process now */
|
2010-09-15 22:56:03 +04:00
|
|
|
spin_lock_irqsave(&ictx->kc_lock, flags);
|
|
|
|
|
2017-11-06 17:06:10 +03:00
|
|
|
t = ktime_get();
|
2019-09-20 19:11:39 +03:00
|
|
|
/* KEY repeats from knob and panel that need to be suppressed */
|
|
|
|
if (ictx->kc == KEY_MUTE ||
|
|
|
|
ictx->dev_descr->flags & IMON_SUPPRESS_REPEATED_KEYS) {
|
|
|
|
if (ictx->kc == ictx->last_keycode &&
|
|
|
|
ktime_ms_delta(t, prev_time) < ictx->idev->rep[REP_DELAY]) {
|
2010-09-15 22:56:03 +04:00
|
|
|
spin_unlock_irqrestore(&ictx->kc_lock, flags);
|
2010-04-17 01:29:02 +04:00
|
|
|
return;
|
2010-09-15 22:56:03 +04:00
|
|
|
}
|
2010-04-17 01:29:02 +04:00
|
|
|
}
|
2019-09-20 19:11:39 +03:00
|
|
|
|
2011-06-04 21:14:41 +04:00
|
|
|
prev_time = t;
|
2010-09-15 22:56:03 +04:00
|
|
|
kc = ictx->kc;
|
2010-04-17 01:29:02 +04:00
|
|
|
|
2010-09-15 22:56:03 +04:00
|
|
|
spin_unlock_irqrestore(&ictx->kc_lock, flags);
|
2010-04-17 01:29:02 +04:00
|
|
|
|
2010-10-23 23:42:20 +04:00
|
|
|
input_report_key(ictx->idev, kc, press_type);
|
|
|
|
input_sync(ictx->idev);
|
2010-04-17 01:29:02 +04:00
|
|
|
|
2010-09-15 22:42:07 +04:00
|
|
|
/* panel keys don't generate a release */
|
2010-10-23 23:42:20 +04:00
|
|
|
input_report_key(ictx->idev, kc, 0);
|
|
|
|
input_sync(ictx->idev);
|
2010-04-17 01:29:02 +04:00
|
|
|
|
2011-06-04 21:14:41 +04:00
|
|
|
spin_lock_irqsave(&ictx->kc_lock, flags);
|
2010-09-15 22:56:03 +04:00
|
|
|
ictx->last_keycode = kc;
|
2011-06-04 21:14:41 +04:00
|
|
|
spin_unlock_irqrestore(&ictx->kc_lock, flags);
|
2010-04-17 01:29:02 +04:00
|
|
|
|
|
|
|
return;
|
|
|
|
|
|
|
|
not_input_data:
|
|
|
|
if (len != 8) {
|
[media] rc: don't break long lines
Due to the 80-cols restrictions, and latter due to checkpatch
warnings, several strings were broken into multiple lines. This
is not considered a good practice anymore, as it makes harder
to grep for strings at the source code.
As we're right now fixing other drivers due to KERN_CONT, we need
to be able to identify what printk strings don't end with a "\n".
It is a way easier to detect those if we don't break long lines.
So, join those continuation lines.
The patch was generated via the script below, and manually
adjusted if needed.
</script>
use Text::Tabs;
while (<>) {
if ($next ne "") {
$c=$_;
if ($c =~ /^\s+\"(.*)/) {
$c2=$1;
$next =~ s/\"\n$//;
$n = expand($next);
$funpos = index($n, '(');
$pos = index($c2, '",');
if ($funpos && $pos > 0) {
$s1 = substr $c2, 0, $pos + 2;
$s2 = ' ' x ($funpos + 1) . substr $c2, $pos + 2;
$s2 =~ s/^\s+//;
$s2 = ' ' x ($funpos + 1) . $s2 if ($s2 ne "");
print unexpand("$next$s1\n");
print unexpand("$s2\n") if ($s2 ne "");
} else {
print "$next$c2\n";
}
$next="";
next;
} else {
print $next;
}
$next="";
} else {
if (m/\"$/) {
if (!m/\\n\"$/) {
$next=$_;
next;
}
}
}
print $_;
}
</script>
Signed-off-by: Mauro Carvalho Chehab <mchehab@s-opensource.com>
2016-10-18 22:44:25 +03:00
|
|
|
dev_warn(dev, "imon %s: invalid incoming packet size (len = %d, intf%d)\n",
|
|
|
|
__func__, len, intf);
|
2010-04-17 01:29:02 +04:00
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* iMON 2.4G associate frame */
|
|
|
|
if (buf[0] == 0x00 &&
|
|
|
|
buf[2] == 0xFF && /* REFID */
|
|
|
|
buf[3] == 0xFF &&
|
|
|
|
buf[4] == 0xFF &&
|
|
|
|
buf[5] == 0xFF && /* iMON 2.4G */
|
|
|
|
((buf[6] == 0x4E && buf[7] == 0xDF) || /* LT */
|
|
|
|
(buf[6] == 0x5E && buf[7] == 0xDF))) { /* DT */
|
|
|
|
dev_warn(dev, "%s: remote associated refid=%02X\n",
|
|
|
|
__func__, buf[1]);
|
2010-05-24 19:00:31 +04:00
|
|
|
ictx->rf_isassociating = false;
|
2010-04-17 01:29:02 +04:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2017-11-27 18:27:54 +03:00
|
|
|
/*
|
2010-04-17 01:29:02 +04:00
|
|
|
* Callback function for USB core API: receive data
|
|
|
|
*/
|
|
|
|
static void usb_rx_callback_intf0(struct urb *urb)
|
|
|
|
{
|
|
|
|
struct imon_context *ictx;
|
|
|
|
int intfnum = 0;
|
|
|
|
|
|
|
|
if (!urb)
|
|
|
|
return;
|
|
|
|
|
|
|
|
ictx = (struct imon_context *)urb->context;
|
2012-01-26 19:04:11 +04:00
|
|
|
if (!ictx)
|
2010-04-17 01:29:02 +04:00
|
|
|
return;
|
|
|
|
|
2012-01-26 19:04:11 +04:00
|
|
|
/*
|
|
|
|
* if we get a callback before we're done configuring the hardware, we
|
|
|
|
* can't yet process the data, as there's nowhere to send it, but we
|
|
|
|
* still need to submit a new rx URB to avoid wedging the hardware
|
|
|
|
*/
|
|
|
|
if (!ictx->dev_present_intf0)
|
|
|
|
goto out;
|
|
|
|
|
2010-04-17 01:29:02 +04:00
|
|
|
switch (urb->status) {
|
|
|
|
case -ENOENT: /* usbcore unlink successful! */
|
|
|
|
return;
|
|
|
|
|
|
|
|
case -ESHUTDOWN: /* transport endpoint was shut down */
|
|
|
|
break;
|
|
|
|
|
|
|
|
case 0:
|
2018-01-06 15:24:50 +03:00
|
|
|
imon_incoming_packet(ictx, urb, intfnum);
|
2010-04-17 01:29:02 +04:00
|
|
|
break;
|
|
|
|
|
|
|
|
default:
|
|
|
|
dev_warn(ictx->dev, "imon %s: status(%d): ignored\n",
|
|
|
|
__func__, urb->status);
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
2012-01-26 19:04:11 +04:00
|
|
|
out:
|
2010-04-17 01:29:02 +04:00
|
|
|
usb_submit_urb(ictx->rx_urb_intf0, GFP_ATOMIC);
|
|
|
|
}
|
|
|
|
|
|
|
|
static void usb_rx_callback_intf1(struct urb *urb)
|
|
|
|
{
|
|
|
|
struct imon_context *ictx;
|
|
|
|
int intfnum = 1;
|
|
|
|
|
|
|
|
if (!urb)
|
|
|
|
return;
|
|
|
|
|
|
|
|
ictx = (struct imon_context *)urb->context;
|
2012-01-26 19:04:11 +04:00
|
|
|
if (!ictx)
|
2010-04-17 01:29:02 +04:00
|
|
|
return;
|
|
|
|
|
2012-01-26 19:04:11 +04:00
|
|
|
/*
|
|
|
|
* if we get a callback before we're done configuring the hardware, we
|
|
|
|
* can't yet process the data, as there's nowhere to send it, but we
|
|
|
|
* still need to submit a new rx URB to avoid wedging the hardware
|
|
|
|
*/
|
|
|
|
if (!ictx->dev_present_intf1)
|
|
|
|
goto out;
|
|
|
|
|
2010-04-17 01:29:02 +04:00
|
|
|
switch (urb->status) {
|
|
|
|
case -ENOENT: /* usbcore unlink successful! */
|
|
|
|
return;
|
|
|
|
|
|
|
|
case -ESHUTDOWN: /* transport endpoint was shut down */
|
|
|
|
break;
|
|
|
|
|
|
|
|
case 0:
|
2018-01-06 15:24:50 +03:00
|
|
|
imon_incoming_packet(ictx, urb, intfnum);
|
2010-04-17 01:29:02 +04:00
|
|
|
break;
|
|
|
|
|
|
|
|
default:
|
|
|
|
dev_warn(ictx->dev, "imon %s: status(%d): ignored\n",
|
|
|
|
__func__, urb->status);
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
2012-01-26 19:04:11 +04:00
|
|
|
out:
|
2010-04-17 01:29:02 +04:00
|
|
|
usb_submit_urb(ictx->rx_urb_intf1, GFP_ATOMIC);
|
|
|
|
}
|
|
|
|
|
2010-09-15 07:28:41 +04:00
|
|
|
/*
|
|
|
|
* The 0x15c2:0xffdc device ID was used for umpteen different imon
|
|
|
|
* devices, and all of them constantly spew interrupts, even when there
|
|
|
|
* is no actual data to report. However, byte 6 of this buffer looks like
|
|
|
|
* its unique across device variants, so we're trying to key off that to
|
|
|
|
* figure out which display type (if any) and what IR protocol the device
|
|
|
|
* actually supports. These devices have their IR protocol hard-coded into
|
|
|
|
* their firmware, they can't be changed on the fly like the newer hardware.
|
|
|
|
*/
|
|
|
|
static void imon_get_ffdc_type(struct imon_context *ictx)
|
|
|
|
{
|
|
|
|
u8 ffdc_cfg_byte = ictx->usb_rx_buf[6];
|
|
|
|
u8 detected_display_type = IMON_DISPLAY_TYPE_NONE;
|
2018-03-07 13:55:38 +03:00
|
|
|
u64 allowed_protos = RC_PROTO_BIT_IMON;
|
2010-09-15 07:28:41 +04:00
|
|
|
|
|
|
|
switch (ffdc_cfg_byte) {
|
|
|
|
/* iMON Knob, no display, iMON IR + vol knob */
|
|
|
|
case 0x21:
|
|
|
|
dev_info(ictx->dev, "0xffdc iMON Knob, iMON IR");
|
|
|
|
ictx->display_supported = false;
|
|
|
|
break;
|
|
|
|
/* iMON 2.4G LT (usb stick), no display, iMON RF */
|
|
|
|
case 0x4e:
|
|
|
|
dev_info(ictx->dev, "0xffdc iMON 2.4G LT, iMON RF");
|
|
|
|
ictx->display_supported = false;
|
|
|
|
ictx->rf_device = true;
|
|
|
|
break;
|
|
|
|
/* iMON VFD, no IR (does have vol knob tho) */
|
|
|
|
case 0x35:
|
|
|
|
dev_info(ictx->dev, "0xffdc iMON VFD + knob, no IR");
|
|
|
|
detected_display_type = IMON_DISPLAY_TYPE_VFD;
|
|
|
|
break;
|
|
|
|
/* iMON VFD, iMON IR */
|
|
|
|
case 0x24:
|
2017-11-21 23:51:39 +03:00
|
|
|
case 0x30:
|
2010-09-15 07:28:41 +04:00
|
|
|
case 0x85:
|
|
|
|
dev_info(ictx->dev, "0xffdc iMON VFD, iMON IR");
|
|
|
|
detected_display_type = IMON_DISPLAY_TYPE_VFD;
|
|
|
|
break;
|
|
|
|
/* iMON VFD, MCE IR */
|
2011-06-04 21:00:54 +04:00
|
|
|
case 0x46:
|
2010-09-15 07:28:41 +04:00
|
|
|
case 0x9e:
|
|
|
|
dev_info(ictx->dev, "0xffdc iMON VFD, MCE IR");
|
|
|
|
detected_display_type = IMON_DISPLAY_TYPE_VFD;
|
2017-08-07 23:20:58 +03:00
|
|
|
allowed_protos = RC_PROTO_BIT_RC6_MCE;
|
2010-09-15 07:28:41 +04:00
|
|
|
break;
|
2019-07-23 19:37:46 +03:00
|
|
|
/* iMON VFD, iMON or MCE IR */
|
|
|
|
case 0x7e:
|
|
|
|
dev_info(ictx->dev, "0xffdc iMON VFD, iMON or MCE IR");
|
|
|
|
detected_display_type = IMON_DISPLAY_TYPE_VFD;
|
|
|
|
allowed_protos |= RC_PROTO_BIT_RC6_MCE;
|
|
|
|
break;
|
2010-09-15 07:28:41 +04:00
|
|
|
/* iMON LCD, MCE IR */
|
|
|
|
case 0x9f:
|
|
|
|
dev_info(ictx->dev, "0xffdc iMON LCD, MCE IR");
|
|
|
|
detected_display_type = IMON_DISPLAY_TYPE_LCD;
|
2017-08-07 23:20:58 +03:00
|
|
|
allowed_protos = RC_PROTO_BIT_RC6_MCE;
|
2010-09-15 07:28:41 +04:00
|
|
|
break;
|
2017-12-02 14:10:34 +03:00
|
|
|
/* no display, iMON IR */
|
|
|
|
case 0x26:
|
|
|
|
dev_info(ictx->dev, "0xffdc iMON Inside, iMON IR");
|
|
|
|
ictx->display_supported = false;
|
|
|
|
break;
|
2019-09-20 19:11:39 +03:00
|
|
|
/* Soundgraph iMON UltraBay */
|
|
|
|
case 0x98:
|
|
|
|
dev_info(ictx->dev, "0xffdc iMON UltraBay, LCD + IR");
|
|
|
|
detected_display_type = IMON_DISPLAY_TYPE_LCD;
|
|
|
|
allowed_protos = RC_PROTO_BIT_IMON | RC_PROTO_BIT_RC6_MCE;
|
|
|
|
ictx->dev_descr = &ultrabay_table;
|
|
|
|
break;
|
|
|
|
|
2010-09-15 07:28:41 +04:00
|
|
|
default:
|
[media] rc: don't break long lines
Due to the 80-cols restrictions, and latter due to checkpatch
warnings, several strings were broken into multiple lines. This
is not considered a good practice anymore, as it makes harder
to grep for strings at the source code.
As we're right now fixing other drivers due to KERN_CONT, we need
to be able to identify what printk strings don't end with a "\n".
It is a way easier to detect those if we don't break long lines.
So, join those continuation lines.
The patch was generated via the script below, and manually
adjusted if needed.
</script>
use Text::Tabs;
while (<>) {
if ($next ne "") {
$c=$_;
if ($c =~ /^\s+\"(.*)/) {
$c2=$1;
$next =~ s/\"\n$//;
$n = expand($next);
$funpos = index($n, '(');
$pos = index($c2, '",');
if ($funpos && $pos > 0) {
$s1 = substr $c2, 0, $pos + 2;
$s2 = ' ' x ($funpos + 1) . substr $c2, $pos + 2;
$s2 =~ s/^\s+//;
$s2 = ' ' x ($funpos + 1) . $s2 if ($s2 ne "");
print unexpand("$next$s1\n");
print unexpand("$s2\n") if ($s2 ne "");
} else {
print "$next$c2\n";
}
$next="";
next;
} else {
print $next;
}
$next="";
} else {
if (m/\"$/) {
if (!m/\\n\"$/) {
$next=$_;
next;
}
}
}
print $_;
}
</script>
Signed-off-by: Mauro Carvalho Chehab <mchehab@s-opensource.com>
2016-10-18 22:44:25 +03:00
|
|
|
dev_info(ictx->dev, "Unknown 0xffdc device, defaulting to VFD and iMON IR");
|
2010-09-15 07:28:41 +04:00
|
|
|
detected_display_type = IMON_DISPLAY_TYPE_VFD;
|
2018-03-07 13:55:38 +03:00
|
|
|
/*
|
|
|
|
* We don't know which one it is, allow user to set the
|
|
|
|
* RC6 one from userspace if IMON wasn't correct.
|
|
|
|
*/
|
2017-08-07 23:20:58 +03:00
|
|
|
allowed_protos |= RC_PROTO_BIT_RC6_MCE;
|
2010-09-15 07:28:41 +04:00
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
|
|
|
printk(KERN_CONT " (id 0x%02x)\n", ffdc_cfg_byte);
|
|
|
|
|
|
|
|
ictx->display_type = detected_display_type;
|
2017-08-07 23:20:58 +03:00
|
|
|
ictx->rc_proto = allowed_protos;
|
2010-09-15 07:28:41 +04:00
|
|
|
}
|
|
|
|
|
|
|
|
static void imon_set_display_type(struct imon_context *ictx)
|
|
|
|
{
|
|
|
|
u8 configured_display_type = IMON_DISPLAY_TYPE_VFD;
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Try to auto-detect the type of display if the user hasn't set
|
|
|
|
* it by hand via the display_type modparam. Default is VFD.
|
|
|
|
*/
|
|
|
|
|
|
|
|
if (display_type == IMON_DISPLAY_TYPE_AUTO) {
|
|
|
|
switch (ictx->product) {
|
|
|
|
case 0xffdc:
|
|
|
|
/* set in imon_get_ffdc_type() */
|
|
|
|
configured_display_type = ictx->display_type;
|
|
|
|
break;
|
|
|
|
case 0x0034:
|
|
|
|
case 0x0035:
|
|
|
|
configured_display_type = IMON_DISPLAY_TYPE_VGA;
|
|
|
|
break;
|
|
|
|
case 0x0038:
|
|
|
|
case 0x0039:
|
|
|
|
case 0x0045:
|
|
|
|
configured_display_type = IMON_DISPLAY_TYPE_LCD;
|
|
|
|
break;
|
|
|
|
case 0x003c:
|
|
|
|
case 0x0041:
|
|
|
|
case 0x0042:
|
|
|
|
case 0x0043:
|
|
|
|
configured_display_type = IMON_DISPLAY_TYPE_NONE;
|
|
|
|
ictx->display_supported = false;
|
|
|
|
break;
|
|
|
|
case 0x0036:
|
|
|
|
case 0x0044:
|
|
|
|
default:
|
|
|
|
configured_display_type = IMON_DISPLAY_TYPE_VFD;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
} else {
|
|
|
|
configured_display_type = display_type;
|
|
|
|
if (display_type == IMON_DISPLAY_TYPE_NONE)
|
|
|
|
ictx->display_supported = false;
|
|
|
|
else
|
|
|
|
ictx->display_supported = true;
|
[media] rc: don't break long lines
Due to the 80-cols restrictions, and latter due to checkpatch
warnings, several strings were broken into multiple lines. This
is not considered a good practice anymore, as it makes harder
to grep for strings at the source code.
As we're right now fixing other drivers due to KERN_CONT, we need
to be able to identify what printk strings don't end with a "\n".
It is a way easier to detect those if we don't break long lines.
So, join those continuation lines.
The patch was generated via the script below, and manually
adjusted if needed.
</script>
use Text::Tabs;
while (<>) {
if ($next ne "") {
$c=$_;
if ($c =~ /^\s+\"(.*)/) {
$c2=$1;
$next =~ s/\"\n$//;
$n = expand($next);
$funpos = index($n, '(');
$pos = index($c2, '",');
if ($funpos && $pos > 0) {
$s1 = substr $c2, 0, $pos + 2;
$s2 = ' ' x ($funpos + 1) . substr $c2, $pos + 2;
$s2 =~ s/^\s+//;
$s2 = ' ' x ($funpos + 1) . $s2 if ($s2 ne "");
print unexpand("$next$s1\n");
print unexpand("$s2\n") if ($s2 ne "");
} else {
print "$next$c2\n";
}
$next="";
next;
} else {
print $next;
}
$next="";
} else {
if (m/\"$/) {
if (!m/\\n\"$/) {
$next=$_;
next;
}
}
}
print $_;
}
</script>
Signed-off-by: Mauro Carvalho Chehab <mchehab@s-opensource.com>
2016-10-18 22:44:25 +03:00
|
|
|
dev_info(ictx->dev, "%s: overriding display type to %d via modparam\n",
|
|
|
|
__func__, display_type);
|
2010-09-15 07:28:41 +04:00
|
|
|
}
|
|
|
|
|
|
|
|
ictx->display_type = configured_display_type;
|
|
|
|
}
|
|
|
|
|
2010-10-29 23:08:23 +04:00
|
|
|
static struct rc_dev *imon_init_rdev(struct imon_context *ictx)
|
2010-09-15 22:42:07 +04:00
|
|
|
{
|
2010-10-29 23:08:23 +04:00
|
|
|
struct rc_dev *rdev;
|
2010-09-15 22:42:07 +04:00
|
|
|
int ret;
|
2017-09-05 15:07:50 +03:00
|
|
|
static const unsigned char fp_packet[] = {
|
|
|
|
0x40, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x88 };
|
2010-09-15 22:42:07 +04:00
|
|
|
|
2018-01-06 15:24:50 +03:00
|
|
|
rdev = rc_allocate_device(RC_DRIVER_SCANCODE);
|
2010-10-29 23:08:23 +04:00
|
|
|
if (!rdev) {
|
2010-09-15 22:42:07 +04:00
|
|
|
dev_err(ictx->dev, "remote control dev allocation failed\n");
|
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
|
|
|
|
snprintf(ictx->name_rdev, sizeof(ictx->name_rdev),
|
|
|
|
"iMON Remote (%04x:%04x)", ictx->vendor, ictx->product);
|
|
|
|
usb_make_path(ictx->usbdev_intf0, ictx->phys_rdev,
|
|
|
|
sizeof(ictx->phys_rdev));
|
|
|
|
strlcat(ictx->phys_rdev, "/input0", sizeof(ictx->phys_rdev));
|
|
|
|
|
2017-07-01 19:13:19 +03:00
|
|
|
rdev->device_name = ictx->name_rdev;
|
2010-10-29 23:08:23 +04:00
|
|
|
rdev->input_phys = ictx->phys_rdev;
|
|
|
|
usb_to_input_id(ictx->usbdev_intf0, &rdev->input_id);
|
2010-09-15 22:42:07 +04:00
|
|
|
rdev->dev.parent = ictx->dev;
|
|
|
|
|
2010-10-29 23:08:23 +04:00
|
|
|
rdev->priv = ictx;
|
2018-01-06 15:24:50 +03:00
|
|
|
/* iMON PAD or MCE */
|
2018-03-07 13:55:38 +03:00
|
|
|
rdev->allowed_protocols = RC_PROTO_BIT_IMON | RC_PROTO_BIT_RC6_MCE;
|
2010-10-29 23:08:23 +04:00
|
|
|
rdev->change_protocol = imon_ir_change_protocol;
|
|
|
|
rdev->driver_name = MOD_NAME;
|
2010-09-15 22:42:07 +04:00
|
|
|
|
2010-09-15 07:28:41 +04:00
|
|
|
/* Enable front-panel buttons and/or knobs */
|
|
|
|
memcpy(ictx->usb_tx_buf, &fp_packet, sizeof(fp_packet));
|
|
|
|
ret = send_packet(ictx);
|
|
|
|
/* Not fatal, but warn about it */
|
|
|
|
if (ret)
|
|
|
|
dev_info(ictx->dev, "panel buttons/knobs setup failed\n");
|
|
|
|
|
2011-01-06 22:57:14 +03:00
|
|
|
if (ictx->product == 0xffdc) {
|
2010-09-15 07:28:41 +04:00
|
|
|
imon_get_ffdc_type(ictx);
|
2017-08-07 23:20:58 +03:00
|
|
|
rdev->allowed_protocols = ictx->rc_proto;
|
2011-01-06 22:57:14 +03:00
|
|
|
}
|
2010-09-15 07:28:41 +04:00
|
|
|
|
|
|
|
imon_set_display_type(ictx);
|
|
|
|
|
2018-01-06 15:24:50 +03:00
|
|
|
if (ictx->rc_proto == RC_PROTO_BIT_RC6_MCE)
|
2011-01-06 22:57:14 +03:00
|
|
|
rdev->map_name = RC_MAP_IMON_MCE;
|
|
|
|
else
|
|
|
|
rdev->map_name = RC_MAP_IMON_PAD;
|
|
|
|
|
2010-10-29 23:08:23 +04:00
|
|
|
ret = rc_register_device(rdev);
|
2010-09-15 22:42:07 +04:00
|
|
|
if (ret < 0) {
|
|
|
|
dev_err(ictx->dev, "remote input dev register failed\n");
|
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
|
|
|
|
return rdev;
|
|
|
|
|
|
|
|
out:
|
2010-10-29 23:08:23 +04:00
|
|
|
rc_free_device(rdev);
|
2010-09-15 22:42:07 +04:00
|
|
|
return NULL;
|
|
|
|
}
|
|
|
|
|
2010-04-17 01:29:02 +04:00
|
|
|
static struct input_dev *imon_init_idev(struct imon_context *ictx)
|
|
|
|
{
|
2019-09-20 19:11:39 +03:00
|
|
|
const struct imon_panel_key_table *key_table;
|
2010-04-17 01:29:02 +04:00
|
|
|
struct input_dev *idev;
|
|
|
|
int ret, i;
|
|
|
|
|
2019-09-20 19:11:39 +03:00
|
|
|
key_table = ictx->dev_descr->key_table;
|
|
|
|
|
2010-04-17 01:29:02 +04:00
|
|
|
idev = input_allocate_device();
|
2013-10-23 23:14:51 +04:00
|
|
|
if (!idev)
|
2010-09-15 22:42:07 +04:00
|
|
|
goto out;
|
2010-04-17 01:29:02 +04:00
|
|
|
|
|
|
|
snprintf(ictx->name_idev, sizeof(ictx->name_idev),
|
2010-09-15 22:42:07 +04:00
|
|
|
"iMON Panel, Knob and Mouse(%04x:%04x)",
|
|
|
|
ictx->vendor, ictx->product);
|
2010-04-17 01:29:02 +04:00
|
|
|
idev->name = ictx->name_idev;
|
|
|
|
|
|
|
|
usb_make_path(ictx->usbdev_intf0, ictx->phys_idev,
|
|
|
|
sizeof(ictx->phys_idev));
|
2010-09-15 22:42:07 +04:00
|
|
|
strlcat(ictx->phys_idev, "/input1", sizeof(ictx->phys_idev));
|
2010-04-17 01:29:02 +04:00
|
|
|
idev->phys = ictx->phys_idev;
|
|
|
|
|
2010-04-30 23:06:12 +04:00
|
|
|
idev->evbit[0] = BIT_MASK(EV_KEY) | BIT_MASK(EV_REP) | BIT_MASK(EV_REL);
|
2010-04-17 01:29:02 +04:00
|
|
|
|
|
|
|
idev->keybit[BIT_WORD(BTN_MOUSE)] =
|
|
|
|
BIT_MASK(BTN_LEFT) | BIT_MASK(BTN_RIGHT);
|
|
|
|
idev->relbit[0] = BIT_MASK(REL_X) | BIT_MASK(REL_Y) |
|
|
|
|
BIT_MASK(REL_WHEEL);
|
|
|
|
|
|
|
|
/* panel and/or knob code support */
|
2014-07-26 21:56:01 +04:00
|
|
|
for (i = 0; key_table[i].hw_code != 0; i++) {
|
|
|
|
u32 kc = key_table[i].keycode;
|
2010-04-17 01:29:02 +04:00
|
|
|
__set_bit(kc, idev->keybit);
|
|
|
|
}
|
|
|
|
|
|
|
|
usb_to_input_id(ictx->usbdev_intf0, &idev->id);
|
|
|
|
idev->dev.parent = ictx->dev;
|
2010-09-15 22:42:07 +04:00
|
|
|
input_set_drvdata(idev, ictx);
|
2010-04-17 01:29:02 +04:00
|
|
|
|
2010-09-15 22:42:07 +04:00
|
|
|
ret = input_register_device(idev);
|
2010-04-17 01:29:02 +04:00
|
|
|
if (ret < 0) {
|
2010-09-15 22:42:07 +04:00
|
|
|
dev_err(ictx->dev, "input dev register failed\n");
|
|
|
|
goto out;
|
2010-04-17 01:29:02 +04:00
|
|
|
}
|
|
|
|
|
|
|
|
return idev;
|
|
|
|
|
2010-09-15 22:42:07 +04:00
|
|
|
out:
|
2010-04-17 01:29:02 +04:00
|
|
|
input_free_device(idev);
|
|
|
|
return NULL;
|
|
|
|
}
|
|
|
|
|
|
|
|
static struct input_dev *imon_init_touch(struct imon_context *ictx)
|
|
|
|
{
|
|
|
|
struct input_dev *touch;
|
|
|
|
int ret;
|
|
|
|
|
|
|
|
touch = input_allocate_device();
|
2013-10-23 23:14:51 +04:00
|
|
|
if (!touch)
|
2010-04-17 01:29:02 +04:00
|
|
|
goto touch_alloc_failed;
|
|
|
|
|
|
|
|
snprintf(ictx->name_touch, sizeof(ictx->name_touch),
|
|
|
|
"iMON USB Touchscreen (%04x:%04x)",
|
|
|
|
ictx->vendor, ictx->product);
|
|
|
|
touch->name = ictx->name_touch;
|
|
|
|
|
|
|
|
usb_make_path(ictx->usbdev_intf1, ictx->phys_touch,
|
|
|
|
sizeof(ictx->phys_touch));
|
2010-09-15 22:42:07 +04:00
|
|
|
strlcat(ictx->phys_touch, "/input2", sizeof(ictx->phys_touch));
|
2010-04-17 01:29:02 +04:00
|
|
|
touch->phys = ictx->phys_touch;
|
|
|
|
|
|
|
|
touch->evbit[0] =
|
|
|
|
BIT_MASK(EV_KEY) | BIT_MASK(EV_ABS);
|
|
|
|
touch->keybit[BIT_WORD(BTN_TOUCH)] =
|
|
|
|
BIT_MASK(BTN_TOUCH);
|
|
|
|
input_set_abs_params(touch, ABS_X,
|
|
|
|
0x00, 0xfff, 0, 0);
|
|
|
|
input_set_abs_params(touch, ABS_Y,
|
|
|
|
0x00, 0xfff, 0, 0);
|
|
|
|
|
|
|
|
input_set_drvdata(touch, ictx);
|
|
|
|
|
|
|
|
usb_to_input_id(ictx->usbdev_intf1, &touch->id);
|
|
|
|
touch->dev.parent = ictx->dev;
|
|
|
|
ret = input_register_device(touch);
|
|
|
|
if (ret < 0) {
|
|
|
|
dev_info(ictx->dev, "touchscreen input dev register failed\n");
|
|
|
|
goto touch_register_failed;
|
|
|
|
}
|
|
|
|
|
|
|
|
return touch;
|
|
|
|
|
|
|
|
touch_register_failed:
|
[media] imon: Correct call to input_free_device
ictx->touch is intialied in imon_init_intf1, to the result of calling the
function that contains this code. Thus, in this code, input_free_device
should be called on touch itself.
A simplified version of the semantic match that finds this problem is:
(http://coccinelle.lip6.fr/)
// <smpl>
@r exists@
local idexpression struct input_dev * x;
expression ra,rr;
position p1,p2;
@@
x = input_allocate_device@p1(...)
... when != x = rr
when != input_free_device(x,...)
when != if (...) { ... input_free_device(x,...) ...}
if(...) { ... when != x = ra
when forall
when != input_free_device(x,...)
\(return <+...x...+>; \| return@p2...; \) }
@script:python@
p1 << r.p1;
p2 << r.p2;
@@
cocci.print_main("input_allocate_device",p1)
cocci.print_secs("input_free_device",p2)
// </smpl>
Signed-off-by: Julia Lawall <julia@diku.dk>
Signed-off-by: Jarod Wilson <jarod@redhat.com>
Signed-off-by: Mauro Carvalho Chehab <mchehab@redhat.com>
2011-05-20 22:31:59 +04:00
|
|
|
input_free_device(touch);
|
2010-04-17 01:29:02 +04:00
|
|
|
|
|
|
|
touch_alloc_failed:
|
|
|
|
return NULL;
|
|
|
|
}
|
|
|
|
|
|
|
|
static bool imon_find_endpoints(struct imon_context *ictx,
|
|
|
|
struct usb_host_interface *iface_desc)
|
|
|
|
{
|
|
|
|
struct usb_endpoint_descriptor *ep;
|
|
|
|
struct usb_endpoint_descriptor *rx_endpoint = NULL;
|
|
|
|
struct usb_endpoint_descriptor *tx_endpoint = NULL;
|
|
|
|
int ifnum = iface_desc->desc.bInterfaceNumber;
|
|
|
|
int num_endpts = iface_desc->desc.bNumEndpoints;
|
|
|
|
int i, ep_dir, ep_type;
|
2010-05-24 19:00:31 +04:00
|
|
|
bool ir_ep_found = false;
|
|
|
|
bool display_ep_found = false;
|
|
|
|
bool tx_control = false;
|
2010-04-17 01:29:02 +04:00
|
|
|
|
|
|
|
/*
|
|
|
|
* Scan the endpoint list and set:
|
|
|
|
* first input endpoint = IR endpoint
|
|
|
|
* first output endpoint = display endpoint
|
|
|
|
*/
|
|
|
|
for (i = 0; i < num_endpts && !(ir_ep_found && display_ep_found); ++i) {
|
|
|
|
ep = &iface_desc->endpoint[i].desc;
|
|
|
|
ep_dir = ep->bEndpointAddress & USB_ENDPOINT_DIR_MASK;
|
2014-08-15 20:18:53 +04:00
|
|
|
ep_type = usb_endpoint_type(ep);
|
2010-04-17 01:29:02 +04:00
|
|
|
|
|
|
|
if (!ir_ep_found && ep_dir == USB_DIR_IN &&
|
|
|
|
ep_type == USB_ENDPOINT_XFER_INT) {
|
|
|
|
|
|
|
|
rx_endpoint = ep;
|
2010-05-24 19:00:31 +04:00
|
|
|
ir_ep_found = true;
|
2010-04-17 01:29:02 +04:00
|
|
|
dev_dbg(ictx->dev, "%s: found IR endpoint\n", __func__);
|
|
|
|
|
|
|
|
} else if (!display_ep_found && ep_dir == USB_DIR_OUT &&
|
|
|
|
ep_type == USB_ENDPOINT_XFER_INT) {
|
|
|
|
tx_endpoint = ep;
|
2010-05-24 19:00:31 +04:00
|
|
|
display_ep_found = true;
|
2010-04-17 01:29:02 +04:00
|
|
|
dev_dbg(ictx->dev, "%s: found display endpoint\n", __func__);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
if (ifnum == 0) {
|
|
|
|
ictx->rx_endpoint_intf0 = rx_endpoint;
|
|
|
|
/*
|
|
|
|
* tx is used to send characters to lcd/vfd, associate RF
|
|
|
|
* remotes, set IR protocol, and maybe more...
|
|
|
|
*/
|
|
|
|
ictx->tx_endpoint = tx_endpoint;
|
|
|
|
} else {
|
|
|
|
ictx->rx_endpoint_intf1 = rx_endpoint;
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* If we didn't find a display endpoint, this is probably one of the
|
|
|
|
* newer iMON devices that use control urb instead of interrupt
|
|
|
|
*/
|
|
|
|
if (!display_ep_found) {
|
2010-05-24 19:00:31 +04:00
|
|
|
tx_control = true;
|
|
|
|
display_ep_found = true;
|
[media] rc: don't break long lines
Due to the 80-cols restrictions, and latter due to checkpatch
warnings, several strings were broken into multiple lines. This
is not considered a good practice anymore, as it makes harder
to grep for strings at the source code.
As we're right now fixing other drivers due to KERN_CONT, we need
to be able to identify what printk strings don't end with a "\n".
It is a way easier to detect those if we don't break long lines.
So, join those continuation lines.
The patch was generated via the script below, and manually
adjusted if needed.
</script>
use Text::Tabs;
while (<>) {
if ($next ne "") {
$c=$_;
if ($c =~ /^\s+\"(.*)/) {
$c2=$1;
$next =~ s/\"\n$//;
$n = expand($next);
$funpos = index($n, '(');
$pos = index($c2, '",');
if ($funpos && $pos > 0) {
$s1 = substr $c2, 0, $pos + 2;
$s2 = ' ' x ($funpos + 1) . substr $c2, $pos + 2;
$s2 =~ s/^\s+//;
$s2 = ' ' x ($funpos + 1) . $s2 if ($s2 ne "");
print unexpand("$next$s1\n");
print unexpand("$s2\n") if ($s2 ne "");
} else {
print "$next$c2\n";
}
$next="";
next;
} else {
print $next;
}
$next="";
} else {
if (m/\"$/) {
if (!m/\\n\"$/) {
$next=$_;
next;
}
}
}
print $_;
}
</script>
Signed-off-by: Mauro Carvalho Chehab <mchehab@s-opensource.com>
2016-10-18 22:44:25 +03:00
|
|
|
dev_dbg(ictx->dev, "%s: device uses control endpoint, not interface OUT endpoint\n",
|
|
|
|
__func__);
|
2010-04-17 01:29:02 +04:00
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Some iMON receivers have no display. Unfortunately, it seems
|
|
|
|
* that SoundGraph recycles device IDs between devices both with
|
|
|
|
* and without... :\
|
|
|
|
*/
|
|
|
|
if (ictx->display_type == IMON_DISPLAY_TYPE_NONE) {
|
2010-05-24 19:00:31 +04:00
|
|
|
display_ep_found = false;
|
2010-04-17 01:29:02 +04:00
|
|
|
dev_dbg(ictx->dev, "%s: device has no display\n", __func__);
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* iMON Touch devices have a VGA touchscreen, but no "display", as
|
|
|
|
* that refers to e.g. /dev/lcd0 (a character device LCD or VFD).
|
|
|
|
*/
|
|
|
|
if (ictx->display_type == IMON_DISPLAY_TYPE_VGA) {
|
2010-05-24 19:00:31 +04:00
|
|
|
display_ep_found = false;
|
2010-04-17 01:29:02 +04:00
|
|
|
dev_dbg(ictx->dev, "%s: iMON Touch device found\n", __func__);
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Input endpoint is mandatory */
|
|
|
|
if (!ir_ep_found)
|
2010-06-20 11:20:46 +04:00
|
|
|
pr_err("no valid input (IR) endpoint found\n");
|
2010-04-17 01:29:02 +04:00
|
|
|
|
|
|
|
ictx->tx_control = tx_control;
|
|
|
|
|
|
|
|
if (display_ep_found)
|
|
|
|
ictx->display_supported = true;
|
|
|
|
|
|
|
|
return ir_ep_found;
|
|
|
|
|
|
|
|
}
|
|
|
|
|
2013-04-22 23:09:44 +04:00
|
|
|
static struct imon_context *imon_init_intf0(struct usb_interface *intf,
|
|
|
|
const struct usb_device_id *id)
|
2010-04-17 01:29:02 +04:00
|
|
|
{
|
|
|
|
struct imon_context *ictx;
|
|
|
|
struct urb *rx_urb;
|
|
|
|
struct urb *tx_urb;
|
|
|
|
struct device *dev = &intf->dev;
|
|
|
|
struct usb_host_interface *iface_desc;
|
2010-04-21 02:11:30 +04:00
|
|
|
int ret = -ENOMEM;
|
2010-04-17 01:29:02 +04:00
|
|
|
|
2017-08-29 13:45:59 +03:00
|
|
|
ictx = kzalloc(sizeof(*ictx), GFP_KERNEL);
|
2017-08-29 13:40:07 +03:00
|
|
|
if (!ictx)
|
2010-04-17 01:29:02 +04:00
|
|
|
goto exit;
|
2017-08-29 13:40:07 +03:00
|
|
|
|
2010-04-17 01:29:02 +04:00
|
|
|
rx_urb = usb_alloc_urb(0, GFP_KERNEL);
|
2016-08-12 00:03:39 +03:00
|
|
|
if (!rx_urb)
|
2010-04-17 01:29:02 +04:00
|
|
|
goto rx_urb_alloc_failed;
|
|
|
|
tx_urb = usb_alloc_urb(0, GFP_KERNEL);
|
2016-08-12 00:03:39 +03:00
|
|
|
if (!tx_urb)
|
2010-04-17 01:29:02 +04:00
|
|
|
goto tx_urb_alloc_failed;
|
|
|
|
|
|
|
|
mutex_init(&ictx->lock);
|
2010-09-15 22:56:03 +04:00
|
|
|
spin_lock_init(&ictx->kc_lock);
|
2010-04-17 01:29:02 +04:00
|
|
|
|
|
|
|
mutex_lock(&ictx->lock);
|
|
|
|
|
|
|
|
ictx->dev = dev;
|
|
|
|
ictx->usbdev_intf0 = usb_get_dev(interface_to_usbdev(intf));
|
|
|
|
ictx->rx_urb_intf0 = rx_urb;
|
|
|
|
ictx->tx_urb = tx_urb;
|
2010-05-24 19:02:05 +04:00
|
|
|
ictx->rf_device = false;
|
2010-04-17 01:29:02 +04:00
|
|
|
|
2016-09-16 14:18:21 +03:00
|
|
|
init_completion(&ictx->tx.finished);
|
|
|
|
|
2010-04-17 01:29:02 +04:00
|
|
|
ictx->vendor = le16_to_cpu(ictx->usbdev_intf0->descriptor.idVendor);
|
|
|
|
ictx->product = le16_to_cpu(ictx->usbdev_intf0->descriptor.idProduct);
|
|
|
|
|
2014-07-26 21:56:01 +04:00
|
|
|
/* save drive info for later accessing the panel/knob key table */
|
|
|
|
ictx->dev_descr = (struct imon_usb_dev_descr *)id->driver_info;
|
2013-04-22 23:09:44 +04:00
|
|
|
/* default send_packet delay is 5ms but some devices need more */
|
2014-07-26 21:56:01 +04:00
|
|
|
ictx->send_packet_delay = ictx->dev_descr->flags &
|
|
|
|
IMON_NEED_20MS_PKT_DELAY ? 20 : 5;
|
2013-04-22 23:09:44 +04:00
|
|
|
|
2010-04-21 02:11:30 +04:00
|
|
|
ret = -ENODEV;
|
2010-04-17 01:29:02 +04:00
|
|
|
iface_desc = intf->cur_altsetting;
|
2010-04-21 02:11:30 +04:00
|
|
|
if (!imon_find_endpoints(ictx, iface_desc)) {
|
2010-04-17 01:29:02 +04:00
|
|
|
goto find_endpoint_failed;
|
2010-04-21 02:11:30 +04:00
|
|
|
}
|
2010-04-17 01:29:02 +04:00
|
|
|
|
|
|
|
usb_fill_int_urb(ictx->rx_urb_intf0, ictx->usbdev_intf0,
|
|
|
|
usb_rcvintpipe(ictx->usbdev_intf0,
|
|
|
|
ictx->rx_endpoint_intf0->bEndpointAddress),
|
|
|
|
ictx->usb_rx_buf, sizeof(ictx->usb_rx_buf),
|
|
|
|
usb_rx_callback_intf0, ictx,
|
|
|
|
ictx->rx_endpoint_intf0->bInterval);
|
|
|
|
|
|
|
|
ret = usb_submit_urb(ictx->rx_urb_intf0, GFP_KERNEL);
|
|
|
|
if (ret) {
|
2010-06-20 11:20:46 +04:00
|
|
|
pr_err("usb_submit_urb failed for intf0 (%d)\n", ret);
|
2010-04-17 01:29:02 +04:00
|
|
|
goto urb_submit_failed;
|
|
|
|
}
|
|
|
|
|
2011-01-06 22:59:34 +03:00
|
|
|
ictx->idev = imon_init_idev(ictx);
|
|
|
|
if (!ictx->idev) {
|
|
|
|
dev_err(dev, "%s: input device setup failed\n", __func__);
|
|
|
|
goto idev_setup_failed;
|
|
|
|
}
|
|
|
|
|
|
|
|
ictx->rdev = imon_init_rdev(ictx);
|
|
|
|
if (!ictx->rdev) {
|
|
|
|
dev_err(dev, "%s: rc device setup failed\n", __func__);
|
|
|
|
goto rdev_setup_failed;
|
|
|
|
}
|
|
|
|
|
2011-07-19 19:12:47 +04:00
|
|
|
ictx->dev_present_intf0 = true;
|
|
|
|
|
[media] imon: add conditional locking in change_protocol
The imon_ir_change_protocol function gets called two different ways, one
way is from rc_register_device, for initial protocol selection/setup,
and the other is via a userspace-initiated protocol change request,
either by direct sysfs prodding or by something like ir-keytable.
In the rc_register_device case, the imon context lock is already held,
but when initiated from userspace, it is not, so we must acquire it,
prior to calling send_packet, which requires that the lock is held.
Without this change, there's an easily reproduceable deadlock when
another function calls send_packet (such as either of the display write
fops) after a userspace-initiated change_protocol.
With a lock-debugging-enabled kernel, I was getting this:
[ 15.014153] =====================================
[ 15.015048] [ BUG: bad unlock balance detected! ]
[ 15.015048] -------------------------------------
[ 15.015048] ir-keytable/773 is trying to release lock (&ictx->lock) at:
[ 15.015048] [<ffffffff814c6297>] mutex_unlock+0xe/0x10
[ 15.015048] but there are no more locks to release!
[ 15.015048]
[ 15.015048] other info that might help us debug this:
[ 15.015048] 2 locks held by ir-keytable/773:
[ 15.015048] #0: (&buffer->mutex){+.+.+.}, at: [<ffffffff8119d400>] sysfs_write_file+0x3c/0x144
[ 15.015048] #1: (s_active#87){.+.+.+}, at: [<ffffffff8119d4ab>] sysfs_write_file+0xe7/0x144
[ 15.015048]
[ 15.015048] stack backtrace:
[ 15.015048] Pid: 773, comm: ir-keytable Not tainted 2.6.38.4-20.fc15.x86_64.debug #1
[ 15.015048] Call Trace:
[ 15.015048] [<ffffffff81089715>] ? print_unlock_inbalance_bug+0xca/0xd5
[ 15.015048] [<ffffffff8108b35c>] ? lock_release_non_nested+0xc1/0x263
[ 15.015048] [<ffffffff814c6297>] ? mutex_unlock+0xe/0x10
[ 15.015048] [<ffffffff814c6297>] ? mutex_unlock+0xe/0x10
[ 15.015048] [<ffffffff8108b67b>] ? lock_release+0x17d/0x1a4
[ 15.015048] [<ffffffff814c6229>] ? __mutex_unlock_slowpath+0xc5/0x125
[ 15.015048] [<ffffffff814c6297>] ? mutex_unlock+0xe/0x10
[ 15.015048] [<ffffffffa02964b6>] ? send_packet+0x1c9/0x264 [imon]
[ 15.015048] [<ffffffff8108b376>] ? lock_release_non_nested+0xdb/0x263
[ 15.015048] [<ffffffffa0296731>] ? imon_ir_change_protocol+0x126/0x15e [imon]
[ 15.015048] [<ffffffffa024a334>] ? store_protocols+0x1c3/0x286 [rc_core]
[ 15.015048] [<ffffffff81326e4e>] ? dev_attr_store+0x20/0x22
[ 15.015048] [<ffffffff8119d4cc>] ? sysfs_write_file+0x108/0x144
...
The original report that led to the investigation was the following:
[ 1679.457305] INFO: task LCDd:8460 blocked for more than 120 seconds.
[ 1679.457307] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
[ 1679.457309] LCDd D ffff88010fcd89c8 0 8460 1 0x00000000
[ 1679.457312] ffff8800d5a03b48 0000000000000082 0000000000000000 ffff8800d5a03fd8
[ 1679.457314] 00000000012dcd30 fffffffffffffffd ffff8800d5a03fd8 ffff88010fcd86f0
[ 1679.457316] ffff8800d5a03fd8 ffff8800d5a03fd8 ffff88010fcd89d0 ffff8800d5a03fd8
[ 1679.457319] Call Trace:
[ 1679.457324] [<ffffffff810ff1a5>] ? zone_statistics+0x75/0x90
[ 1679.457327] [<ffffffff810ea907>] ? get_page_from_freelist+0x3c7/0x820
[ 1679.457330] [<ffffffff813b0a49>] __mutex_lock_slowpath+0x139/0x320
[ 1679.457335] [<ffffffff813b0c41>] mutex_lock+0x11/0x30
[ 1679.457338] [<ffffffffa0d54216>] display_open+0x66/0x130 [imon]
[ 1679.457345] [<ffffffffa01d06c0>] usb_open+0x180/0x310 [usbcore]
[ 1679.457349] [<ffffffff81143b3b>] chrdev_open+0x1bb/0x2d0
[ 1679.457350] [<ffffffff8113d93d>] __dentry_open+0x10d/0x370
[ 1679.457352] [<ffffffff81143980>] ? chrdev_open+0x0/0x2d0
...
Bump the driver version here so its easier to tell if people have this
locking fix or not, and also make locking during probe easier to follow.
CC: stable@kernel.org
Reported-by: Benjamin Hodgetts <ben@xnode.org>
Signed-off-by: Jarod Wilson <jarod@redhat.com>
Signed-off-by: Mauro Carvalho Chehab <mchehab@redhat.com>
2011-04-28 02:01:44 +04:00
|
|
|
mutex_unlock(&ictx->lock);
|
2010-04-17 01:29:02 +04:00
|
|
|
return ictx;
|
|
|
|
|
2010-09-15 22:42:07 +04:00
|
|
|
rdev_setup_failed:
|
|
|
|
input_unregister_device(ictx->idev);
|
2010-04-17 01:29:02 +04:00
|
|
|
idev_setup_failed:
|
2011-01-06 22:59:34 +03:00
|
|
|
usb_kill_urb(ictx->rx_urb_intf0);
|
|
|
|
urb_submit_failed:
|
2010-04-17 01:29:02 +04:00
|
|
|
find_endpoint_failed:
|
2014-09-16 01:36:15 +04:00
|
|
|
usb_put_dev(ictx->usbdev_intf0);
|
2010-04-17 01:29:02 +04:00
|
|
|
mutex_unlock(&ictx->lock);
|
|
|
|
usb_free_urb(tx_urb);
|
|
|
|
tx_urb_alloc_failed:
|
|
|
|
usb_free_urb(rx_urb);
|
|
|
|
rx_urb_alloc_failed:
|
|
|
|
kfree(ictx);
|
|
|
|
exit:
|
|
|
|
dev_err(dev, "unable to initialize intf0, err %d\n", ret);
|
|
|
|
|
|
|
|
return NULL;
|
|
|
|
}
|
|
|
|
|
|
|
|
static struct imon_context *imon_init_intf1(struct usb_interface *intf,
|
|
|
|
struct imon_context *ictx)
|
|
|
|
{
|
|
|
|
struct urb *rx_urb;
|
|
|
|
struct usb_host_interface *iface_desc;
|
2010-04-21 02:11:30 +04:00
|
|
|
int ret = -ENOMEM;
|
2010-04-17 01:29:02 +04:00
|
|
|
|
|
|
|
rx_urb = usb_alloc_urb(0, GFP_KERNEL);
|
2016-08-12 00:03:39 +03:00
|
|
|
if (!rx_urb)
|
2010-04-17 01:29:02 +04:00
|
|
|
goto rx_urb_alloc_failed;
|
|
|
|
|
|
|
|
mutex_lock(&ictx->lock);
|
|
|
|
|
|
|
|
if (ictx->display_type == IMON_DISPLAY_TYPE_VGA) {
|
2017-10-24 18:23:14 +03:00
|
|
|
timer_setup(&ictx->ttimer, imon_touch_display_timeout, 0);
|
2010-04-17 01:29:02 +04:00
|
|
|
}
|
|
|
|
|
|
|
|
ictx->usbdev_intf1 = usb_get_dev(interface_to_usbdev(intf));
|
|
|
|
ictx->rx_urb_intf1 = rx_urb;
|
|
|
|
|
2010-04-21 02:11:30 +04:00
|
|
|
ret = -ENODEV;
|
2010-04-17 01:29:02 +04:00
|
|
|
iface_desc = intf->cur_altsetting;
|
|
|
|
if (!imon_find_endpoints(ictx, iface_desc))
|
|
|
|
goto find_endpoint_failed;
|
|
|
|
|
|
|
|
if (ictx->display_type == IMON_DISPLAY_TYPE_VGA) {
|
|
|
|
ictx->touch = imon_init_touch(ictx);
|
|
|
|
if (!ictx->touch)
|
|
|
|
goto touch_setup_failed;
|
|
|
|
} else
|
|
|
|
ictx->touch = NULL;
|
|
|
|
|
|
|
|
usb_fill_int_urb(ictx->rx_urb_intf1, ictx->usbdev_intf1,
|
|
|
|
usb_rcvintpipe(ictx->usbdev_intf1,
|
|
|
|
ictx->rx_endpoint_intf1->bEndpointAddress),
|
|
|
|
ictx->usb_rx_buf, sizeof(ictx->usb_rx_buf),
|
|
|
|
usb_rx_callback_intf1, ictx,
|
|
|
|
ictx->rx_endpoint_intf1->bInterval);
|
|
|
|
|
|
|
|
ret = usb_submit_urb(ictx->rx_urb_intf1, GFP_KERNEL);
|
|
|
|
|
|
|
|
if (ret) {
|
2010-06-20 11:20:46 +04:00
|
|
|
pr_err("usb_submit_urb failed for intf1 (%d)\n", ret);
|
2010-04-17 01:29:02 +04:00
|
|
|
goto urb_submit_failed;
|
|
|
|
}
|
|
|
|
|
2011-07-19 19:12:47 +04:00
|
|
|
ictx->dev_present_intf1 = true;
|
|
|
|
|
[media] imon: add conditional locking in change_protocol
The imon_ir_change_protocol function gets called two different ways, one
way is from rc_register_device, for initial protocol selection/setup,
and the other is via a userspace-initiated protocol change request,
either by direct sysfs prodding or by something like ir-keytable.
In the rc_register_device case, the imon context lock is already held,
but when initiated from userspace, it is not, so we must acquire it,
prior to calling send_packet, which requires that the lock is held.
Without this change, there's an easily reproduceable deadlock when
another function calls send_packet (such as either of the display write
fops) after a userspace-initiated change_protocol.
With a lock-debugging-enabled kernel, I was getting this:
[ 15.014153] =====================================
[ 15.015048] [ BUG: bad unlock balance detected! ]
[ 15.015048] -------------------------------------
[ 15.015048] ir-keytable/773 is trying to release lock (&ictx->lock) at:
[ 15.015048] [<ffffffff814c6297>] mutex_unlock+0xe/0x10
[ 15.015048] but there are no more locks to release!
[ 15.015048]
[ 15.015048] other info that might help us debug this:
[ 15.015048] 2 locks held by ir-keytable/773:
[ 15.015048] #0: (&buffer->mutex){+.+.+.}, at: [<ffffffff8119d400>] sysfs_write_file+0x3c/0x144
[ 15.015048] #1: (s_active#87){.+.+.+}, at: [<ffffffff8119d4ab>] sysfs_write_file+0xe7/0x144
[ 15.015048]
[ 15.015048] stack backtrace:
[ 15.015048] Pid: 773, comm: ir-keytable Not tainted 2.6.38.4-20.fc15.x86_64.debug #1
[ 15.015048] Call Trace:
[ 15.015048] [<ffffffff81089715>] ? print_unlock_inbalance_bug+0xca/0xd5
[ 15.015048] [<ffffffff8108b35c>] ? lock_release_non_nested+0xc1/0x263
[ 15.015048] [<ffffffff814c6297>] ? mutex_unlock+0xe/0x10
[ 15.015048] [<ffffffff814c6297>] ? mutex_unlock+0xe/0x10
[ 15.015048] [<ffffffff8108b67b>] ? lock_release+0x17d/0x1a4
[ 15.015048] [<ffffffff814c6229>] ? __mutex_unlock_slowpath+0xc5/0x125
[ 15.015048] [<ffffffff814c6297>] ? mutex_unlock+0xe/0x10
[ 15.015048] [<ffffffffa02964b6>] ? send_packet+0x1c9/0x264 [imon]
[ 15.015048] [<ffffffff8108b376>] ? lock_release_non_nested+0xdb/0x263
[ 15.015048] [<ffffffffa0296731>] ? imon_ir_change_protocol+0x126/0x15e [imon]
[ 15.015048] [<ffffffffa024a334>] ? store_protocols+0x1c3/0x286 [rc_core]
[ 15.015048] [<ffffffff81326e4e>] ? dev_attr_store+0x20/0x22
[ 15.015048] [<ffffffff8119d4cc>] ? sysfs_write_file+0x108/0x144
...
The original report that led to the investigation was the following:
[ 1679.457305] INFO: task LCDd:8460 blocked for more than 120 seconds.
[ 1679.457307] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
[ 1679.457309] LCDd D ffff88010fcd89c8 0 8460 1 0x00000000
[ 1679.457312] ffff8800d5a03b48 0000000000000082 0000000000000000 ffff8800d5a03fd8
[ 1679.457314] 00000000012dcd30 fffffffffffffffd ffff8800d5a03fd8 ffff88010fcd86f0
[ 1679.457316] ffff8800d5a03fd8 ffff8800d5a03fd8 ffff88010fcd89d0 ffff8800d5a03fd8
[ 1679.457319] Call Trace:
[ 1679.457324] [<ffffffff810ff1a5>] ? zone_statistics+0x75/0x90
[ 1679.457327] [<ffffffff810ea907>] ? get_page_from_freelist+0x3c7/0x820
[ 1679.457330] [<ffffffff813b0a49>] __mutex_lock_slowpath+0x139/0x320
[ 1679.457335] [<ffffffff813b0c41>] mutex_lock+0x11/0x30
[ 1679.457338] [<ffffffffa0d54216>] display_open+0x66/0x130 [imon]
[ 1679.457345] [<ffffffffa01d06c0>] usb_open+0x180/0x310 [usbcore]
[ 1679.457349] [<ffffffff81143b3b>] chrdev_open+0x1bb/0x2d0
[ 1679.457350] [<ffffffff8113d93d>] __dentry_open+0x10d/0x370
[ 1679.457352] [<ffffffff81143980>] ? chrdev_open+0x0/0x2d0
...
Bump the driver version here so its easier to tell if people have this
locking fix or not, and also make locking during probe easier to follow.
CC: stable@kernel.org
Reported-by: Benjamin Hodgetts <ben@xnode.org>
Signed-off-by: Jarod Wilson <jarod@redhat.com>
Signed-off-by: Mauro Carvalho Chehab <mchehab@redhat.com>
2011-04-28 02:01:44 +04:00
|
|
|
mutex_unlock(&ictx->lock);
|
2010-04-17 01:29:02 +04:00
|
|
|
return ictx;
|
|
|
|
|
|
|
|
urb_submit_failed:
|
2010-07-26 18:11:36 +04:00
|
|
|
if (ictx->touch)
|
2010-04-17 01:29:02 +04:00
|
|
|
input_unregister_device(ictx->touch);
|
|
|
|
touch_setup_failed:
|
|
|
|
find_endpoint_failed:
|
2014-09-16 01:36:15 +04:00
|
|
|
usb_put_dev(ictx->usbdev_intf1);
|
2021-08-14 13:29:39 +03:00
|
|
|
ictx->usbdev_intf1 = NULL;
|
2010-04-17 01:29:02 +04:00
|
|
|
mutex_unlock(&ictx->lock);
|
|
|
|
usb_free_urb(rx_urb);
|
2021-08-14 13:29:39 +03:00
|
|
|
ictx->rx_urb_intf1 = NULL;
|
2010-04-17 01:29:02 +04:00
|
|
|
rx_urb_alloc_failed:
|
2012-01-26 19:04:11 +04:00
|
|
|
dev_err(ictx->dev, "unable to initialize intf1, err %d\n", ret);
|
2010-04-17 01:29:02 +04:00
|
|
|
|
|
|
|
return NULL;
|
|
|
|
}
|
|
|
|
|
|
|
|
static void imon_init_display(struct imon_context *ictx,
|
|
|
|
struct usb_interface *intf)
|
|
|
|
{
|
|
|
|
int ret;
|
|
|
|
|
|
|
|
dev_dbg(ictx->dev, "Registering iMON display with sysfs\n");
|
|
|
|
|
|
|
|
/* set up sysfs entry for built-in clock */
|
2010-10-23 23:42:51 +04:00
|
|
|
ret = sysfs_create_group(&intf->dev.kobj, &imon_display_attr_group);
|
2010-04-17 01:29:02 +04:00
|
|
|
if (ret)
|
[media] rc: don't break long lines
Due to the 80-cols restrictions, and latter due to checkpatch
warnings, several strings were broken into multiple lines. This
is not considered a good practice anymore, as it makes harder
to grep for strings at the source code.
As we're right now fixing other drivers due to KERN_CONT, we need
to be able to identify what printk strings don't end with a "\n".
It is a way easier to detect those if we don't break long lines.
So, join those continuation lines.
The patch was generated via the script below, and manually
adjusted if needed.
</script>
use Text::Tabs;
while (<>) {
if ($next ne "") {
$c=$_;
if ($c =~ /^\s+\"(.*)/) {
$c2=$1;
$next =~ s/\"\n$//;
$n = expand($next);
$funpos = index($n, '(');
$pos = index($c2, '",');
if ($funpos && $pos > 0) {
$s1 = substr $c2, 0, $pos + 2;
$s2 = ' ' x ($funpos + 1) . substr $c2, $pos + 2;
$s2 =~ s/^\s+//;
$s2 = ' ' x ($funpos + 1) . $s2 if ($s2 ne "");
print unexpand("$next$s1\n");
print unexpand("$s2\n") if ($s2 ne "");
} else {
print "$next$c2\n";
}
$next="";
next;
} else {
print $next;
}
$next="";
} else {
if (m/\"$/) {
if (!m/\\n\"$/) {
$next=$_;
next;
}
}
}
print $_;
}
</script>
Signed-off-by: Mauro Carvalho Chehab <mchehab@s-opensource.com>
2016-10-18 22:44:25 +03:00
|
|
|
dev_err(ictx->dev, "Could not create display sysfs entries(%d)",
|
|
|
|
ret);
|
2010-04-17 01:29:02 +04:00
|
|
|
|
|
|
|
if (ictx->display_type == IMON_DISPLAY_TYPE_LCD)
|
|
|
|
ret = usb_register_dev(intf, &imon_lcd_class);
|
|
|
|
else
|
|
|
|
ret = usb_register_dev(intf, &imon_vfd_class);
|
|
|
|
if (ret)
|
|
|
|
/* Not a fatal error, so ignore */
|
[media] rc: don't break long lines
Due to the 80-cols restrictions, and latter due to checkpatch
warnings, several strings were broken into multiple lines. This
is not considered a good practice anymore, as it makes harder
to grep for strings at the source code.
As we're right now fixing other drivers due to KERN_CONT, we need
to be able to identify what printk strings don't end with a "\n".
It is a way easier to detect those if we don't break long lines.
So, join those continuation lines.
The patch was generated via the script below, and manually
adjusted if needed.
</script>
use Text::Tabs;
while (<>) {
if ($next ne "") {
$c=$_;
if ($c =~ /^\s+\"(.*)/) {
$c2=$1;
$next =~ s/\"\n$//;
$n = expand($next);
$funpos = index($n, '(');
$pos = index($c2, '",');
if ($funpos && $pos > 0) {
$s1 = substr $c2, 0, $pos + 2;
$s2 = ' ' x ($funpos + 1) . substr $c2, $pos + 2;
$s2 =~ s/^\s+//;
$s2 = ' ' x ($funpos + 1) . $s2 if ($s2 ne "");
print unexpand("$next$s1\n");
print unexpand("$s2\n") if ($s2 ne "");
} else {
print "$next$c2\n";
}
$next="";
next;
} else {
print $next;
}
$next="";
} else {
if (m/\"$/) {
if (!m/\\n\"$/) {
$next=$_;
next;
}
}
}
print $_;
}
</script>
Signed-off-by: Mauro Carvalho Chehab <mchehab@s-opensource.com>
2016-10-18 22:44:25 +03:00
|
|
|
dev_info(ictx->dev, "could not get a minor number for display\n");
|
2010-04-17 01:29:02 +04:00
|
|
|
|
|
|
|
}
|
|
|
|
|
2017-11-27 18:27:54 +03:00
|
|
|
/*
|
2010-04-17 01:29:02 +04:00
|
|
|
* Callback function for USB core API: Probe
|
|
|
|
*/
|
2012-12-22 01:17:53 +04:00
|
|
|
static int imon_probe(struct usb_interface *interface,
|
|
|
|
const struct usb_device_id *id)
|
2010-04-17 01:29:02 +04:00
|
|
|
{
|
|
|
|
struct usb_device *usbdev = NULL;
|
|
|
|
struct usb_host_interface *iface_desc = NULL;
|
|
|
|
struct usb_interface *first_if;
|
|
|
|
struct device *dev = &interface->dev;
|
2011-04-29 01:20:58 +04:00
|
|
|
int ifnum, sysfs_err;
|
2010-04-17 01:29:02 +04:00
|
|
|
int ret = 0;
|
|
|
|
struct imon_context *ictx = NULL;
|
|
|
|
u16 vendor, product;
|
|
|
|
|
|
|
|
usbdev = usb_get_dev(interface_to_usbdev(interface));
|
|
|
|
iface_desc = interface->cur_altsetting;
|
|
|
|
ifnum = iface_desc->desc.bInterfaceNumber;
|
|
|
|
vendor = le16_to_cpu(usbdev->descriptor.idVendor);
|
|
|
|
product = le16_to_cpu(usbdev->descriptor.idProduct);
|
|
|
|
|
|
|
|
dev_dbg(dev, "%s: found iMON device (%04x:%04x, intf%d)\n",
|
|
|
|
__func__, vendor, product, ifnum);
|
|
|
|
|
|
|
|
first_if = usb_ifnum_to_if(usbdev, 0);
|
2017-10-09 21:14:48 +03:00
|
|
|
if (!first_if) {
|
|
|
|
ret = -ENODEV;
|
|
|
|
goto fail;
|
|
|
|
}
|
|
|
|
|
2010-04-17 01:29:02 +04:00
|
|
|
if (ifnum == 0) {
|
2013-04-22 23:09:44 +04:00
|
|
|
ictx = imon_init_intf0(interface, id);
|
2010-04-17 01:29:02 +04:00
|
|
|
if (!ictx) {
|
2010-06-20 11:20:46 +04:00
|
|
|
pr_err("failed to initialize context!\n");
|
2010-04-17 01:29:02 +04:00
|
|
|
ret = -ENODEV;
|
|
|
|
goto fail;
|
|
|
|
}
|
media: imon: reorganize serialization
Since usb_register_dev() from imon_init_display() from imon_probe() holds
minor_rwsem while display_open() which holds driver_lock and ictx->lock is
called with minor_rwsem held from usb_open(), holding driver_lock or
ictx->lock when calling usb_register_dev() causes circular locking
dependency problem.
Since usb_deregister_dev() from imon_disconnect() holds minor_rwsem while
display_open() which holds driver_lock is called with minor_rwsem held,
holding driver_lock when calling usb_deregister_dev() also causes circular
locking dependency problem.
Sean Young explained that the problem is there are imon devices which have
two usb interfaces, even though it is one device. The probe and disconnect
function of both usb interfaces can run concurrently.
Alan Stern responded that the driver and USB cores guarantee that when an
interface is probed, both the interface and its USB device are locked.
Ditto for when the disconnect callback gets run. So concurrent probing/
disconnection of multiple interfaces on the same device is not possible.
Therefore, we don't need locks for handling race between imon_probe() and
imon_disconnect(). But we still need to handle race between display_open()
/vfd_write()/lcd_write()/display_close() and imon_disconnect(), for
disconnect event can happen while file descriptors are in use.
Since "struct file"->private_data is set by display_open(), vfd_write()/
lcd_write()/display_close() can assume that "struct file"->private_data
is not NULL even after usb_set_intfdata(interface, NULL) was called.
Replace insufficiently held driver_lock with refcount_t based management.
Add a boolean flag for recording whether imon_disconnect() was already
called. Use RCU for accessing this boolean flag and refcount_t.
Since the boolean flag for imon_disconnect() is shared, disconnect event
on either intf0 or intf1 affects both interfaces. But I assume that this
change does not matter, for usually disconnect event would not happen
while interfaces are in use.
Link: https://syzkaller.appspot.com/bug?extid=c558267ad910fc494497
Reported-by: syzbot <syzbot+c558267ad910fc494497@syzkaller.appspotmail.com>
Signed-off-by: Tetsuo Handa <penguin-kernel@I-love.SAKURA.ne.jp>
Tested-by: syzbot <syzbot+c558267ad910fc494497@syzkaller.appspotmail.com>
Cc: Alan Stern <stern@rowland.harvard.edu>
Signed-off-by: Sean Young <sean@mess.org>
Signed-off-by: Mauro Carvalho Chehab <mchehab@kernel.org>
2022-05-02 06:49:04 +03:00
|
|
|
refcount_set(&ictx->users, 1);
|
2010-04-17 01:29:02 +04:00
|
|
|
|
|
|
|
} else {
|
2013-04-22 23:09:45 +04:00
|
|
|
/* this is the secondary interface on the device */
|
media: imon: reorganize serialization
Since usb_register_dev() from imon_init_display() from imon_probe() holds
minor_rwsem while display_open() which holds driver_lock and ictx->lock is
called with minor_rwsem held from usb_open(), holding driver_lock or
ictx->lock when calling usb_register_dev() causes circular locking
dependency problem.
Since usb_deregister_dev() from imon_disconnect() holds minor_rwsem while
display_open() which holds driver_lock is called with minor_rwsem held,
holding driver_lock when calling usb_deregister_dev() also causes circular
locking dependency problem.
Sean Young explained that the problem is there are imon devices which have
two usb interfaces, even though it is one device. The probe and disconnect
function of both usb interfaces can run concurrently.
Alan Stern responded that the driver and USB cores guarantee that when an
interface is probed, both the interface and its USB device are locked.
Ditto for when the disconnect callback gets run. So concurrent probing/
disconnection of multiple interfaces on the same device is not possible.
Therefore, we don't need locks for handling race between imon_probe() and
imon_disconnect(). But we still need to handle race between display_open()
/vfd_write()/lcd_write()/display_close() and imon_disconnect(), for
disconnect event can happen while file descriptors are in use.
Since "struct file"->private_data is set by display_open(), vfd_write()/
lcd_write()/display_close() can assume that "struct file"->private_data
is not NULL even after usb_set_intfdata(interface, NULL) was called.
Replace insufficiently held driver_lock with refcount_t based management.
Add a boolean flag for recording whether imon_disconnect() was already
called. Use RCU for accessing this boolean flag and refcount_t.
Since the boolean flag for imon_disconnect() is shared, disconnect event
on either intf0 or intf1 affects both interfaces. But I assume that this
change does not matter, for usually disconnect event would not happen
while interfaces are in use.
Link: https://syzkaller.appspot.com/bug?extid=c558267ad910fc494497
Reported-by: syzbot <syzbot+c558267ad910fc494497@syzkaller.appspotmail.com>
Signed-off-by: Tetsuo Handa <penguin-kernel@I-love.SAKURA.ne.jp>
Tested-by: syzbot <syzbot+c558267ad910fc494497@syzkaller.appspotmail.com>
Cc: Alan Stern <stern@rowland.harvard.edu>
Signed-off-by: Sean Young <sean@mess.org>
Signed-off-by: Mauro Carvalho Chehab <mchehab@kernel.org>
2022-05-02 06:49:04 +03:00
|
|
|
struct imon_context *first_if_ctx = usb_get_intfdata(first_if);
|
2013-04-22 23:09:45 +04:00
|
|
|
|
|
|
|
/* fail early if first intf failed to register */
|
|
|
|
if (!first_if_ctx) {
|
|
|
|
ret = -ENODEV;
|
|
|
|
goto fail;
|
|
|
|
}
|
|
|
|
|
2010-04-17 01:29:02 +04:00
|
|
|
ictx = imon_init_intf1(interface, first_if_ctx);
|
|
|
|
if (!ictx) {
|
2010-06-20 11:20:46 +04:00
|
|
|
pr_err("failed to attach to context!\n");
|
2010-04-17 01:29:02 +04:00
|
|
|
ret = -ENODEV;
|
|
|
|
goto fail;
|
|
|
|
}
|
media: imon: reorganize serialization
Since usb_register_dev() from imon_init_display() from imon_probe() holds
minor_rwsem while display_open() which holds driver_lock and ictx->lock is
called with minor_rwsem held from usb_open(), holding driver_lock or
ictx->lock when calling usb_register_dev() causes circular locking
dependency problem.
Since usb_deregister_dev() from imon_disconnect() holds minor_rwsem while
display_open() which holds driver_lock is called with minor_rwsem held,
holding driver_lock when calling usb_deregister_dev() also causes circular
locking dependency problem.
Sean Young explained that the problem is there are imon devices which have
two usb interfaces, even though it is one device. The probe and disconnect
function of both usb interfaces can run concurrently.
Alan Stern responded that the driver and USB cores guarantee that when an
interface is probed, both the interface and its USB device are locked.
Ditto for when the disconnect callback gets run. So concurrent probing/
disconnection of multiple interfaces on the same device is not possible.
Therefore, we don't need locks for handling race between imon_probe() and
imon_disconnect(). But we still need to handle race between display_open()
/vfd_write()/lcd_write()/display_close() and imon_disconnect(), for
disconnect event can happen while file descriptors are in use.
Since "struct file"->private_data is set by display_open(), vfd_write()/
lcd_write()/display_close() can assume that "struct file"->private_data
is not NULL even after usb_set_intfdata(interface, NULL) was called.
Replace insufficiently held driver_lock with refcount_t based management.
Add a boolean flag for recording whether imon_disconnect() was already
called. Use RCU for accessing this boolean flag and refcount_t.
Since the boolean flag for imon_disconnect() is shared, disconnect event
on either intf0 or intf1 affects both interfaces. But I assume that this
change does not matter, for usually disconnect event would not happen
while interfaces are in use.
Link: https://syzkaller.appspot.com/bug?extid=c558267ad910fc494497
Reported-by: syzbot <syzbot+c558267ad910fc494497@syzkaller.appspotmail.com>
Signed-off-by: Tetsuo Handa <penguin-kernel@I-love.SAKURA.ne.jp>
Tested-by: syzbot <syzbot+c558267ad910fc494497@syzkaller.appspotmail.com>
Cc: Alan Stern <stern@rowland.harvard.edu>
Signed-off-by: Sean Young <sean@mess.org>
Signed-off-by: Mauro Carvalho Chehab <mchehab@kernel.org>
2022-05-02 06:49:04 +03:00
|
|
|
refcount_inc(&ictx->users);
|
2010-04-17 01:29:02 +04:00
|
|
|
|
|
|
|
}
|
|
|
|
|
|
|
|
usb_set_intfdata(interface, ictx);
|
|
|
|
|
|
|
|
if (ifnum == 0) {
|
2010-05-24 19:02:05 +04:00
|
|
|
if (product == 0xffdc && ictx->rf_device) {
|
|
|
|
sysfs_err = sysfs_create_group(&interface->dev.kobj,
|
2010-10-23 23:42:51 +04:00
|
|
|
&imon_rf_attr_group);
|
2010-05-24 19:02:05 +04:00
|
|
|
if (sysfs_err)
|
2010-06-20 11:20:46 +04:00
|
|
|
pr_err("Could not create RF sysfs entries(%d)\n",
|
|
|
|
sysfs_err);
|
2010-05-24 19:02:05 +04:00
|
|
|
}
|
|
|
|
|
2010-04-17 01:29:02 +04:00
|
|
|
if (ictx->display_supported)
|
|
|
|
imon_init_display(ictx, interface);
|
|
|
|
}
|
|
|
|
|
[media] rc: don't break long lines
Due to the 80-cols restrictions, and latter due to checkpatch
warnings, several strings were broken into multiple lines. This
is not considered a good practice anymore, as it makes harder
to grep for strings at the source code.
As we're right now fixing other drivers due to KERN_CONT, we need
to be able to identify what printk strings don't end with a "\n".
It is a way easier to detect those if we don't break long lines.
So, join those continuation lines.
The patch was generated via the script below, and manually
adjusted if needed.
</script>
use Text::Tabs;
while (<>) {
if ($next ne "") {
$c=$_;
if ($c =~ /^\s+\"(.*)/) {
$c2=$1;
$next =~ s/\"\n$//;
$n = expand($next);
$funpos = index($n, '(');
$pos = index($c2, '",');
if ($funpos && $pos > 0) {
$s1 = substr $c2, 0, $pos + 2;
$s2 = ' ' x ($funpos + 1) . substr $c2, $pos + 2;
$s2 =~ s/^\s+//;
$s2 = ' ' x ($funpos + 1) . $s2 if ($s2 ne "");
print unexpand("$next$s1\n");
print unexpand("$s2\n") if ($s2 ne "");
} else {
print "$next$c2\n";
}
$next="";
next;
} else {
print $next;
}
$next="";
} else {
if (m/\"$/) {
if (!m/\\n\"$/) {
$next=$_;
next;
}
}
}
print $_;
}
</script>
Signed-off-by: Mauro Carvalho Chehab <mchehab@s-opensource.com>
2016-10-18 22:44:25 +03:00
|
|
|
dev_info(dev, "iMON device (%04x:%04x, intf%d) on usb<%d:%d> initialized\n",
|
|
|
|
vendor, product, ifnum,
|
2010-04-17 01:29:02 +04:00
|
|
|
usbdev->bus->busnum, usbdev->devnum);
|
|
|
|
|
2014-09-16 01:36:15 +04:00
|
|
|
usb_put_dev(usbdev);
|
2010-04-17 01:29:02 +04:00
|
|
|
|
|
|
|
return 0;
|
|
|
|
|
|
|
|
fail:
|
2014-09-16 01:36:15 +04:00
|
|
|
usb_put_dev(usbdev);
|
2010-04-17 01:29:02 +04:00
|
|
|
dev_err(dev, "unable to register, err %d\n", ret);
|
|
|
|
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
2017-11-27 18:27:54 +03:00
|
|
|
/*
|
2010-04-17 01:29:02 +04:00
|
|
|
* Callback function for USB core API: disconnect
|
|
|
|
*/
|
2012-12-22 01:17:53 +04:00
|
|
|
static void imon_disconnect(struct usb_interface *interface)
|
2010-04-17 01:29:02 +04:00
|
|
|
{
|
|
|
|
struct imon_context *ictx;
|
|
|
|
struct device *dev;
|
|
|
|
int ifnum;
|
|
|
|
|
|
|
|
ictx = usb_get_intfdata(interface);
|
media: imon: reorganize serialization
Since usb_register_dev() from imon_init_display() from imon_probe() holds
minor_rwsem while display_open() which holds driver_lock and ictx->lock is
called with minor_rwsem held from usb_open(), holding driver_lock or
ictx->lock when calling usb_register_dev() causes circular locking
dependency problem.
Since usb_deregister_dev() from imon_disconnect() holds minor_rwsem while
display_open() which holds driver_lock is called with minor_rwsem held,
holding driver_lock when calling usb_deregister_dev() also causes circular
locking dependency problem.
Sean Young explained that the problem is there are imon devices which have
two usb interfaces, even though it is one device. The probe and disconnect
function of both usb interfaces can run concurrently.
Alan Stern responded that the driver and USB cores guarantee that when an
interface is probed, both the interface and its USB device are locked.
Ditto for when the disconnect callback gets run. So concurrent probing/
disconnection of multiple interfaces on the same device is not possible.
Therefore, we don't need locks for handling race between imon_probe() and
imon_disconnect(). But we still need to handle race between display_open()
/vfd_write()/lcd_write()/display_close() and imon_disconnect(), for
disconnect event can happen while file descriptors are in use.
Since "struct file"->private_data is set by display_open(), vfd_write()/
lcd_write()/display_close() can assume that "struct file"->private_data
is not NULL even after usb_set_intfdata(interface, NULL) was called.
Replace insufficiently held driver_lock with refcount_t based management.
Add a boolean flag for recording whether imon_disconnect() was already
called. Use RCU for accessing this boolean flag and refcount_t.
Since the boolean flag for imon_disconnect() is shared, disconnect event
on either intf0 or intf1 affects both interfaces. But I assume that this
change does not matter, for usually disconnect event would not happen
while interfaces are in use.
Link: https://syzkaller.appspot.com/bug?extid=c558267ad910fc494497
Reported-by: syzbot <syzbot+c558267ad910fc494497@syzkaller.appspotmail.com>
Signed-off-by: Tetsuo Handa <penguin-kernel@I-love.SAKURA.ne.jp>
Tested-by: syzbot <syzbot+c558267ad910fc494497@syzkaller.appspotmail.com>
Cc: Alan Stern <stern@rowland.harvard.edu>
Signed-off-by: Sean Young <sean@mess.org>
Signed-off-by: Mauro Carvalho Chehab <mchehab@kernel.org>
2022-05-02 06:49:04 +03:00
|
|
|
ictx->disconnected = true;
|
2010-04-17 01:29:02 +04:00
|
|
|
dev = ictx->dev;
|
|
|
|
ifnum = interface->cur_altsetting->desc.bInterfaceNumber;
|
|
|
|
|
|
|
|
/*
|
|
|
|
* sysfs_remove_group is safe to call even if sysfs_create_group
|
|
|
|
* hasn't been called
|
|
|
|
*/
|
2010-10-23 23:42:51 +04:00
|
|
|
sysfs_remove_group(&interface->dev.kobj, &imon_display_attr_group);
|
|
|
|
sysfs_remove_group(&interface->dev.kobj, &imon_rf_attr_group);
|
2010-04-17 01:29:02 +04:00
|
|
|
|
|
|
|
usb_set_intfdata(interface, NULL);
|
|
|
|
|
|
|
|
/* Abort ongoing write */
|
|
|
|
if (ictx->tx.busy) {
|
|
|
|
usb_kill_urb(ictx->tx_urb);
|
2016-09-16 14:18:21 +03:00
|
|
|
complete(&ictx->tx.finished);
|
2010-04-17 01:29:02 +04:00
|
|
|
}
|
|
|
|
|
|
|
|
if (ifnum == 0) {
|
2010-05-24 19:00:31 +04:00
|
|
|
ictx->dev_present_intf0 = false;
|
2010-04-17 01:29:02 +04:00
|
|
|
usb_kill_urb(ictx->rx_urb_intf0);
|
2010-09-15 22:42:07 +04:00
|
|
|
input_unregister_device(ictx->idev);
|
2010-10-29 23:08:23 +04:00
|
|
|
rc_unregister_device(ictx->rdev);
|
2010-04-17 01:29:02 +04:00
|
|
|
if (ictx->display_supported) {
|
|
|
|
if (ictx->display_type == IMON_DISPLAY_TYPE_LCD)
|
|
|
|
usb_deregister_dev(interface, &imon_lcd_class);
|
2011-04-29 01:20:58 +04:00
|
|
|
else if (ictx->display_type == IMON_DISPLAY_TYPE_VFD)
|
2010-04-17 01:29:02 +04:00
|
|
|
usb_deregister_dev(interface, &imon_vfd_class);
|
|
|
|
}
|
2022-04-28 16:34:55 +03:00
|
|
|
usb_put_dev(ictx->usbdev_intf0);
|
2010-04-17 01:29:02 +04:00
|
|
|
} else {
|
2010-05-24 19:00:31 +04:00
|
|
|
ictx->dev_present_intf1 = false;
|
2010-04-17 01:29:02 +04:00
|
|
|
usb_kill_urb(ictx->rx_urb_intf1);
|
2011-04-29 01:20:58 +04:00
|
|
|
if (ictx->display_type == IMON_DISPLAY_TYPE_VGA) {
|
|
|
|
del_timer_sync(&ictx->ttimer);
|
2022-04-28 16:34:54 +03:00
|
|
|
input_unregister_device(ictx->touch);
|
2011-04-29 01:20:58 +04:00
|
|
|
}
|
2022-04-28 16:34:55 +03:00
|
|
|
usb_put_dev(ictx->usbdev_intf1);
|
2010-04-17 01:29:02 +04:00
|
|
|
}
|
|
|
|
|
media: imon: reorganize serialization
Since usb_register_dev() from imon_init_display() from imon_probe() holds
minor_rwsem while display_open() which holds driver_lock and ictx->lock is
called with minor_rwsem held from usb_open(), holding driver_lock or
ictx->lock when calling usb_register_dev() causes circular locking
dependency problem.
Since usb_deregister_dev() from imon_disconnect() holds minor_rwsem while
display_open() which holds driver_lock is called with minor_rwsem held,
holding driver_lock when calling usb_deregister_dev() also causes circular
locking dependency problem.
Sean Young explained that the problem is there are imon devices which have
two usb interfaces, even though it is one device. The probe and disconnect
function of both usb interfaces can run concurrently.
Alan Stern responded that the driver and USB cores guarantee that when an
interface is probed, both the interface and its USB device are locked.
Ditto for when the disconnect callback gets run. So concurrent probing/
disconnection of multiple interfaces on the same device is not possible.
Therefore, we don't need locks for handling race between imon_probe() and
imon_disconnect(). But we still need to handle race between display_open()
/vfd_write()/lcd_write()/display_close() and imon_disconnect(), for
disconnect event can happen while file descriptors are in use.
Since "struct file"->private_data is set by display_open(), vfd_write()/
lcd_write()/display_close() can assume that "struct file"->private_data
is not NULL even after usb_set_intfdata(interface, NULL) was called.
Replace insufficiently held driver_lock with refcount_t based management.
Add a boolean flag for recording whether imon_disconnect() was already
called. Use RCU for accessing this boolean flag and refcount_t.
Since the boolean flag for imon_disconnect() is shared, disconnect event
on either intf0 or intf1 affects both interfaces. But I assume that this
change does not matter, for usually disconnect event would not happen
while interfaces are in use.
Link: https://syzkaller.appspot.com/bug?extid=c558267ad910fc494497
Reported-by: syzbot <syzbot+c558267ad910fc494497@syzkaller.appspotmail.com>
Signed-off-by: Tetsuo Handa <penguin-kernel@I-love.SAKURA.ne.jp>
Tested-by: syzbot <syzbot+c558267ad910fc494497@syzkaller.appspotmail.com>
Cc: Alan Stern <stern@rowland.harvard.edu>
Signed-off-by: Sean Young <sean@mess.org>
Signed-off-by: Mauro Carvalho Chehab <mchehab@kernel.org>
2022-05-02 06:49:04 +03:00
|
|
|
if (refcount_dec_and_test(&ictx->users))
|
2011-04-29 01:20:58 +04:00
|
|
|
free_imon_context(ictx);
|
2010-04-17 01:29:02 +04:00
|
|
|
|
|
|
|
dev_dbg(dev, "%s: iMON device (intf%d) disconnected\n",
|
|
|
|
__func__, ifnum);
|
|
|
|
}
|
|
|
|
|
|
|
|
static int imon_suspend(struct usb_interface *intf, pm_message_t message)
|
|
|
|
{
|
|
|
|
struct imon_context *ictx = usb_get_intfdata(intf);
|
|
|
|
int ifnum = intf->cur_altsetting->desc.bInterfaceNumber;
|
|
|
|
|
|
|
|
if (ifnum == 0)
|
|
|
|
usb_kill_urb(ictx->rx_urb_intf0);
|
|
|
|
else
|
|
|
|
usb_kill_urb(ictx->rx_urb_intf1);
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int imon_resume(struct usb_interface *intf)
|
|
|
|
{
|
|
|
|
int rc = 0;
|
|
|
|
struct imon_context *ictx = usb_get_intfdata(intf);
|
|
|
|
int ifnum = intf->cur_altsetting->desc.bInterfaceNumber;
|
|
|
|
|
|
|
|
if (ifnum == 0) {
|
|
|
|
usb_fill_int_urb(ictx->rx_urb_intf0, ictx->usbdev_intf0,
|
|
|
|
usb_rcvintpipe(ictx->usbdev_intf0,
|
|
|
|
ictx->rx_endpoint_intf0->bEndpointAddress),
|
|
|
|
ictx->usb_rx_buf, sizeof(ictx->usb_rx_buf),
|
|
|
|
usb_rx_callback_intf0, ictx,
|
|
|
|
ictx->rx_endpoint_intf0->bInterval);
|
|
|
|
|
2022-04-28 16:34:53 +03:00
|
|
|
rc = usb_submit_urb(ictx->rx_urb_intf0, GFP_NOIO);
|
2010-04-17 01:29:02 +04:00
|
|
|
|
|
|
|
} else {
|
|
|
|
usb_fill_int_urb(ictx->rx_urb_intf1, ictx->usbdev_intf1,
|
|
|
|
usb_rcvintpipe(ictx->usbdev_intf1,
|
|
|
|
ictx->rx_endpoint_intf1->bEndpointAddress),
|
|
|
|
ictx->usb_rx_buf, sizeof(ictx->usb_rx_buf),
|
|
|
|
usb_rx_callback_intf1, ictx,
|
|
|
|
ictx->rx_endpoint_intf1->bInterval);
|
|
|
|
|
2022-04-28 16:34:53 +03:00
|
|
|
rc = usb_submit_urb(ictx->rx_urb_intf1, GFP_NOIO);
|
2010-04-17 01:29:02 +04:00
|
|
|
}
|
|
|
|
|
|
|
|
return rc;
|
|
|
|
}
|
|
|
|
|
2011-11-18 21:46:12 +04:00
|
|
|
module_usb_driver(imon_driver);
|