xref: /netbsd-src/sys/dev/usb/uhid.c (revision 2026b7285b519b6985686c4f29b6309b5e58de6d)
1 /*	$NetBSD: uhid.c,v 1.129 2024/02/04 05:43:06 mrg Exp $	*/
2 
3 /*
4  * Copyright (c) 1998, 2004, 2008, 2012 The NetBSD Foundation, Inc.
5  * All rights reserved.
6  *
7  * This code is derived from software contributed to The NetBSD Foundation
8  * by Lennart Augustsson (lennart@augustsson.net) at
9  * Carlstedt Research & Technology and Matthew R. Green (mrg@eterna23.net).
10  *
11  * Redistribution and use in source and binary forms, with or without
12  * modification, are permitted provided that the following conditions
13  * are met:
14  * 1. Redistributions of source code must retain the above copyright
15  *    notice, this list of conditions and the following disclaimer.
16  * 2. Redistributions in binary form must reproduce the above copyright
17  *    notice, this list of conditions and the following disclaimer in the
18  *    documentation and/or other materials provided with the distribution.
19  *
20  * THIS SOFTWARE IS PROVIDED BY THE NETBSD FOUNDATION, INC. AND CONTRIBUTORS
21  * ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED
22  * TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
23  * PURPOSE ARE DISCLAIMED.  IN NO EVENT SHALL THE FOUNDATION OR CONTRIBUTORS
24  * BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
25  * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
26  * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
27  * INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
28  * CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
29  * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
30  * POSSIBILITY OF SUCH DAMAGE.
31  */
32 
33 /*
34  * HID spec: http://www.usb.org/developers/devclass_docs/HID1_11.pdf
35  */
36 
37 #include <sys/cdefs.h>
38 __KERNEL_RCSID(0, "$NetBSD: uhid.c,v 1.129 2024/02/04 05:43:06 mrg Exp $");
39 
40 #ifdef _KERNEL_OPT
41 #include "opt_compat_netbsd.h"
42 #include "opt_usb.h"
43 #endif
44 
45 #include <sys/param.h>
46 #include <sys/types.h>
47 
48 #include <sys/atomic.h>
49 #include <sys/compat_stub.h>
50 #include <sys/conf.h>
51 #include <sys/device.h>
52 #include <sys/file.h>
53 #include <sys/intr.h>
54 #include <sys/ioctl.h>
55 #include <sys/kernel.h>
56 #include <sys/kmem.h>
57 #include <sys/poll.h>
58 #include <sys/proc.h>
59 #include <sys/select.h>
60 #include <sys/signalvar.h>
61 #include <sys/systm.h>
62 #include <sys/tty.h>
63 #include <sys/vnode.h>
64 
65 #include <dev/usb/usb.h>
66 #include <dev/usb/usbhid.h>
67 
68 #include <dev/usb/usbdevs.h>
69 #include <dev/usb/usbdi.h>
70 #include <dev/usb/usbdi_util.h>
71 #include <dev/usb/usb_quirks.h>
72 #include <dev/hid/hid.h>
73 
74 #include <dev/usb/uhidev.h>
75 
76 #include "ioconf.h"
77 
78 #ifdef UHID_DEBUG
79 #define DPRINTF(x)	if (uhiddebug) printf x
80 #define DPRINTFN(n,x)	if (uhiddebug>(n)) printf x
81 int	uhiddebug = 0;
82 #else
83 #define DPRINTF(x)
84 #define DPRINTFN(n,x)
85 #endif
86 
87 struct uhid_softc {
88 	device_t sc_dev;
89 	struct uhidev *sc_hdev;
90 	struct usbd_device *sc_udev;
91 	uint8_t sc_report_id;
92 
93 	kmutex_t sc_lock;
94 	kcondvar_t sc_cv;
95 
96 	int sc_isize;
97 	int sc_osize;
98 	int sc_fsize;
99 
100 	u_char *sc_obuf;
101 
102 	struct clist sc_q;	/* protected by sc_lock */
103 	struct selinfo sc_rsel;
104 	proc_t *sc_async;	/* process that wants SIGIO */
105 	void *sc_sih;
106 	volatile uint32_t sc_state;	/* driver state */
107 #define UHID_IMMED	0x02	/* return read data immediately */
108 
109 	int sc_raw;
110 	enum {
111 		UHID_CLOSED,
112 		UHID_OPENING,
113 		UHID_OPEN,
114 	} sc_open;
115 	bool sc_closing;
116 };
117 
118 #define	UHIDUNIT(dev)	(minor(dev))
119 #define	UHID_CHUNK	128	/* chunk size for read */
120 #define	UHID_BSIZE	1020	/* buffer size */
121 
122 static dev_type_open(uhidopen);
123 static dev_type_cancel(uhidcancel);
124 static dev_type_close(uhidclose);
125 static dev_type_read(uhidread);
126 static dev_type_write(uhidwrite);
127 static dev_type_ioctl(uhidioctl);
128 static dev_type_poll(uhidpoll);
129 static dev_type_kqfilter(uhidkqfilter);
130 
131 const struct cdevsw uhid_cdevsw = {
132 	.d_open = uhidopen,
133 	.d_cancel = uhidcancel,
134 	.d_close = uhidclose,
135 	.d_read = uhidread,
136 	.d_write = uhidwrite,
137 	.d_ioctl = uhidioctl,
138 	.d_stop = nostop,
139 	.d_tty = notty,
140 	.d_poll = uhidpoll,
141 	.d_mmap = nommap,
142 	.d_kqfilter = uhidkqfilter,
143 	.d_discard = nodiscard,
144 	.d_cfdriver = &uhid_cd,
145 	.d_devtounit = dev_minor_unit,
146 	.d_flag = D_OTHER
147 };
148 
149 static void uhid_intr(void *, void *, u_int);
150 
151 static int	uhid_match(device_t, cfdata_t, void *);
152 static void	uhid_attach(device_t, device_t, void *);
153 static int	uhid_detach(device_t, int);
154 
155 CFATTACH_DECL_NEW(uhid, sizeof(struct uhid_softc), uhid_match, uhid_attach,
156     uhid_detach, NULL);
157 
158 static int
uhid_match(device_t parent,cfdata_t match,void * aux)159 uhid_match(device_t parent, cfdata_t match, void *aux)
160 {
161 #ifdef UHID_DEBUG
162 	struct uhidev_attach_arg *uha = aux;
163 #endif
164 
165 	DPRINTF(("uhid_match: report=%d\n", uha->reportid));
166 
167 	if (match->cf_flags & 1)
168 		return UMATCH_HIGHEST;
169 	else
170 		return UMATCH_IFACECLASS_GENERIC;
171 }
172 
173 static void
uhid_attach(device_t parent,device_t self,void * aux)174 uhid_attach(device_t parent, device_t self, void *aux)
175 {
176 	struct uhid_softc *sc = device_private(self);
177 	struct uhidev_attach_arg *uha = aux;
178 	int size, repid;
179 	void *desc;
180 
181 	sc->sc_dev = self;
182 	sc->sc_hdev = uha->parent;
183 	sc->sc_udev = uha->uiaa->uiaa_device;
184 	sc->sc_report_id = uha->reportid;
185 
186 	selinit(&sc->sc_rsel);
187 
188 	uhidev_get_report_desc(uha->parent, &desc, &size);
189 	repid = uha->reportid;
190 	sc->sc_isize = hid_report_size(desc, size, hid_input,   repid);
191 	sc->sc_osize = hid_report_size(desc, size, hid_output,  repid);
192 	sc->sc_fsize = hid_report_size(desc, size, hid_feature, repid);
193 	sc->sc_raw =  hid_is_collection(desc, size, uha->reportid,
194 	    HID_USAGE2(HUP_FIDO, HUF_U2FHID));
195 
196 	aprint_naive("\n");
197 	aprint_normal(": input=%d, output=%d, feature=%d\n",
198 	       sc->sc_isize, sc->sc_osize, sc->sc_fsize);
199 
200 	mutex_init(&sc->sc_lock, MUTEX_DEFAULT, IPL_SOFTUSB);
201 	cv_init(&sc->sc_cv, "uhidrea");
202 
203 	if (!pmf_device_register(self, NULL, NULL))
204 		aprint_error_dev(self, "couldn't establish power handler\n");
205 
206 	return;
207 }
208 
209 static int
uhid_detach(device_t self,int flags)210 uhid_detach(device_t self, int flags)
211 {
212 	struct uhid_softc *sc = device_private(self);
213 	int maj, mn;
214 
215 	DPRINTF(("uhid_detach: sc=%p flags=%d\n", sc, flags));
216 
217 	pmf_device_deregister(self);
218 
219 	/* locate the major number */
220 	maj = cdevsw_lookup_major(&uhid_cdevsw);
221 
222 	/* Nuke the vnodes for any open instances (calls close). */
223 	mn = device_unit(self);
224 	vdevgone(maj, mn, mn, VCHR);
225 
226 	KASSERTMSG(sc->sc_open == UHID_CLOSED, "open=%d", (int)sc->sc_open);
227 
228 	cv_destroy(&sc->sc_cv);
229 	mutex_destroy(&sc->sc_lock);
230 	seldestroy(&sc->sc_rsel);
231 
232 	return 0;
233 }
234 
235 static void
uhid_intr(void * cookie,void * data,u_int len)236 uhid_intr(void *cookie, void *data, u_int len)
237 {
238 	struct uhid_softc *sc = cookie;
239 
240 #ifdef UHID_DEBUG
241 	if (uhiddebug > 5) {
242 		uint32_t i;
243 
244 		DPRINTF(("uhid_intr: data ="));
245 		for (i = 0; i < len; i++)
246 			DPRINTF((" %02x", ((u_char *)data)[i]));
247 		DPRINTF(("\n"));
248 	}
249 #endif
250 
251 	mutex_enter(&sc->sc_lock);
252 	(void)b_to_q(data, len, &sc->sc_q);
253 
254 	DPRINTFN(5, ("uhid_intr: waking %p\n", &sc->sc_q));
255 	cv_broadcast(&sc->sc_cv);
256 	selnotify(&sc->sc_rsel, 0, NOTE_SUBMIT);
257 	if (atomic_load_relaxed(&sc->sc_async) != NULL) {
258 		mutex_enter(&proc_lock);
259 		if (sc->sc_async != NULL) {
260 			DPRINTFN(3, ("uhid_intr: sending SIGIO to %jd\n",
261 				(intmax_t)sc->sc_async->p_pid));
262 			psignal(sc->sc_async, SIGIO);
263 		}
264 		mutex_exit(&proc_lock);
265 	}
266 	mutex_exit(&sc->sc_lock);
267 }
268 
269 static int
uhidopen(dev_t dev,int flag,int mode,struct lwp * l)270 uhidopen(dev_t dev, int flag, int mode, struct lwp *l)
271 {
272 	struct uhid_softc *sc = device_lookup_private(&uhid_cd, UHIDUNIT(dev));
273 	int error;
274 
275 	DPRINTF(("uhidopen: sc=%p\n", sc));
276 	if (sc == NULL)
277 		return ENXIO;
278 
279 	/*
280 	 * Try to open.  If closing in progress, give up.  If already
281 	 * open (or opening), fail -- opens are exclusive.
282 	 */
283 	mutex_enter(&sc->sc_lock);
284 	if (sc->sc_open != UHID_CLOSED || sc->sc_closing) {
285 		mutex_exit(&sc->sc_lock);
286 		return EBUSY;
287 	}
288 	sc->sc_open = UHID_OPENING;
289 	atomic_store_relaxed(&sc->sc_state, 0);
290 	mutex_exit(&sc->sc_lock);
291 
292 	/* uhid interrupts aren't enabled yet, so setup sc_q now */
293 	if (clalloc(&sc->sc_q, UHID_BSIZE, 0) == -1) {
294 		error = ENOMEM;
295 		goto fail0;
296 	}
297 
298 	/* Allocate an output buffer if needed.  */
299 	if (sc->sc_osize > 0)
300 		sc->sc_obuf = kmem_alloc(sc->sc_osize, KM_SLEEP);
301 	else
302 		sc->sc_obuf = NULL;
303 
304 	/* Paranoia: reset SIGIO before enabling interrupts.  */
305 	mutex_enter(&proc_lock);
306 	atomic_store_relaxed(&sc->sc_async, NULL);
307 	mutex_exit(&proc_lock);
308 
309 	/* Open the uhidev -- after this point we can get interrupts.  */
310 	error = uhidev_open(sc->sc_hdev, &uhid_intr, sc);
311 	if (error)
312 		goto fail1;
313 
314 	/* We are open for business.  */
315 	mutex_enter(&sc->sc_lock);
316 	sc->sc_open = UHID_OPEN;
317 	mutex_exit(&sc->sc_lock);
318 
319 	return 0;
320 
321 fail1:	selnotify(&sc->sc_rsel, POLLHUP, 0);
322 	mutex_enter(&proc_lock);
323 	atomic_store_relaxed(&sc->sc_async, NULL);
324 	mutex_exit(&proc_lock);
325 	if (sc->sc_osize > 0) {
326 		kmem_free(sc->sc_obuf, sc->sc_osize);
327 		sc->sc_obuf = NULL;
328 	}
329 	clfree(&sc->sc_q);
330 fail0:	mutex_enter(&sc->sc_lock);
331 	KASSERT(sc->sc_open == UHID_OPENING);
332 	sc->sc_open = UHID_CLOSED;
333 	atomic_store_relaxed(&sc->sc_state, 0);
334 	mutex_exit(&sc->sc_lock);
335 	return error;
336 }
337 
338 static int
uhidcancel(dev_t dev,int flag,int mode,struct lwp * l)339 uhidcancel(dev_t dev, int flag, int mode, struct lwp *l)
340 {
341 	struct uhid_softc *sc = device_lookup_private(&uhid_cd, UHIDUNIT(dev));
342 
343 	DPRINTF(("uhidcancel: sc=%p\n", sc));
344 	if (sc == NULL)
345 		return 0;
346 
347 	/*
348 	 * Mark it closing, wake any waiters, and suspend output.
349 	 * After this point, no new xfers can be submitted.
350 	 */
351 	mutex_enter(&sc->sc_lock);
352 	sc->sc_closing = true;
353 	cv_broadcast(&sc->sc_cv);
354 	mutex_exit(&sc->sc_lock);
355 
356 	uhidev_stop(sc->sc_hdev);
357 
358 	return 0;
359 }
360 
361 static int
uhidclose(dev_t dev,int flag,int mode,struct lwp * l)362 uhidclose(dev_t dev, int flag, int mode, struct lwp *l)
363 {
364 	struct uhid_softc *sc = device_lookup_private(&uhid_cd, UHIDUNIT(dev));
365 
366 	DPRINTF(("uhidclose: sc=%p\n", sc));
367 	if (sc == NULL)
368 		return 0;
369 
370 	mutex_enter(&sc->sc_lock);
371 	KASSERT(sc->sc_closing);
372 	KASSERTMSG(sc->sc_open == UHID_OPEN || sc->sc_open == UHID_CLOSED,
373 	    "sc_open=%d", sc->sc_open);
374 	if (sc->sc_open == UHID_CLOSED)
375 		goto out;
376 
377 	/* Release the lock while we free things.  */
378 	mutex_exit(&sc->sc_lock);
379 
380 	/* Prevent further interrupts.  */
381 	uhidev_close(sc->sc_hdev);
382 
383 	/* Hang up all select/poll.  */
384 	selnotify(&sc->sc_rsel, POLLHUP, 0);
385 
386 	/* Reset SIGIO.  */
387 	mutex_enter(&proc_lock);
388 	atomic_store_relaxed(&sc->sc_async, NULL);
389 	mutex_exit(&proc_lock);
390 
391 	/* Free the buffer and queue.  */
392 	if (sc->sc_osize > 0) {
393 		kmem_free(sc->sc_obuf, sc->sc_osize);
394 		sc->sc_obuf = NULL;
395 	}
396 	clfree(&sc->sc_q);
397 
398 	mutex_enter(&sc->sc_lock);
399 
400 	/* All set.  We are now closed.  */
401 	sc->sc_open = UHID_CLOSED;
402 out:	KASSERT(sc->sc_open == UHID_CLOSED);
403 	sc->sc_closing = false;
404 	atomic_store_relaxed(&sc->sc_state, 0);
405 	mutex_exit(&sc->sc_lock);
406 
407 	return 0;
408 }
409 
410 static int
uhidread(dev_t dev,struct uio * uio,int flag)411 uhidread(dev_t dev, struct uio *uio, int flag)
412 {
413 	struct uhid_softc *sc = device_lookup_private(&uhid_cd, UHIDUNIT(dev));
414 	int error = 0;
415 	int extra;
416 	size_t length;
417 	u_char buffer[UHID_CHUNK];
418 	usbd_status err;
419 
420 	DPRINTFN(1, ("uhidread\n"));
421 	if (atomic_load_relaxed(&sc->sc_state) & UHID_IMMED) {
422 		DPRINTFN(1, ("uhidread immed\n"));
423 		extra = sc->sc_report_id != 0;
424 		if (sc->sc_isize + extra > sizeof(buffer))
425 			return ENOBUFS;
426 		err = uhidev_get_report(sc->sc_hdev, UHID_INPUT_REPORT,
427 					buffer, sc->sc_isize + extra);
428 		if (err)
429 			return EIO;
430 		return uiomove(buffer+extra, sc->sc_isize, uio);
431 	}
432 
433 	mutex_enter(&sc->sc_lock);
434 	while (sc->sc_q.c_cc == 0) {
435 		if (flag & IO_NDELAY) {
436 			mutex_exit(&sc->sc_lock);
437 			return EWOULDBLOCK;
438 		}
439 		if (sc->sc_closing) {
440 			mutex_exit(&sc->sc_lock);
441 			return EIO;
442 		}
443 		DPRINTFN(5, ("uhidread: sleep on %p\n", &sc->sc_q));
444 		error = cv_wait_sig(&sc->sc_cv, &sc->sc_lock);
445 		DPRINTFN(5, ("uhidread: woke, error=%d\n", error));
446 		if (error) {
447 			break;
448 		}
449 	}
450 
451 	/* Transfer as many chunks as possible. */
452 	while (sc->sc_q.c_cc > 0 && uio->uio_resid > 0 && !error) {
453 		length = uimin(sc->sc_q.c_cc, uio->uio_resid);
454 		if (length > sizeof(buffer))
455 			length = sizeof(buffer);
456 
457 		/* Remove a small chunk from the input queue. */
458 		(void) q_to_b(&sc->sc_q, buffer, length);
459 		DPRINTFN(5, ("uhidread: got %lu chars\n", (u_long)length));
460 
461 		/* Copy the data to the user process. */
462 		mutex_exit(&sc->sc_lock);
463 		if ((error = uiomove(buffer, length, uio)) != 0)
464 			return error;
465 		mutex_enter(&sc->sc_lock);
466 	}
467 
468 	mutex_exit(&sc->sc_lock);
469 	return error;
470 }
471 
472 static int
uhidwrite(dev_t dev,struct uio * uio,int flag)473 uhidwrite(dev_t dev, struct uio *uio, int flag)
474 {
475 	struct uhid_softc *sc = device_lookup_private(&uhid_cd, UHIDUNIT(dev));
476 	int error;
477 	int size;
478 	usbd_status err;
479 
480 	DPRINTFN(1, ("uhidwrite\n"));
481 
482 	size = sc->sc_osize;
483 	if (uio->uio_resid != size || size == 0)
484 		return EINVAL;
485 	error = uiomove(sc->sc_obuf, size, uio);
486 #ifdef UHID_DEBUG
487 	if (uhiddebug > 5) {
488 		uint32_t i;
489 
490 		DPRINTF(("%s: outdata[%d] =", device_xname(sc->sc_dev),
491 		    error));
492 		for (i = 0; i < size; i++)
493 			DPRINTF((" %02x", sc->sc_obuf[i]));
494 		DPRINTF(("\n"));
495 	}
496 #endif
497 	if (!error) {
498 		if (sc->sc_raw)
499 			err = uhidev_write(sc->sc_hdev, sc->sc_obuf, size);
500 		else
501 			err = uhidev_set_report(sc->sc_hdev,
502 			    UHID_OUTPUT_REPORT, sc->sc_obuf, size);
503 		if (err) {
504 			DPRINTF(("%s: err = %d\n",
505 			    device_xname(sc->sc_dev), err));
506 			error = EIO;
507 		}
508 	}
509 
510 	return error;
511 }
512 
513 static int
uhidioctl(dev_t dev,u_long cmd,void * addr,int flag,struct lwp * l)514 uhidioctl(dev_t dev, u_long cmd, void *addr, int flag, struct lwp *l)
515 {
516 	struct uhid_softc *sc = device_lookup_private(&uhid_cd, UHIDUNIT(dev));
517 	struct usb_ctl_report_desc *rd;
518 	struct usb_ctl_report *re;
519 	u_char buffer[UHID_CHUNK];
520 	int size, extra;
521 	usbd_status err;
522 	void *desc;
523 
524 	DPRINTFN(2, ("uhidioctl: cmd=%lx\n", cmd));
525 
526 	switch (cmd) {
527 	case FIONBIO:
528 		/* All handled in the upper FS layer. */
529 		break;
530 
531 	case FIOASYNC:
532 		mutex_enter(&proc_lock);
533 		if (*(int *)addr) {
534 			if (sc->sc_async != NULL) {
535 				mutex_exit(&proc_lock);
536 				return EBUSY;
537 			}
538 			atomic_store_relaxed(&sc->sc_async, l->l_proc);
539 			DPRINTF(("uhid_do_ioctl: FIOASYNC %p\n", l->l_proc));
540 		} else
541 			atomic_store_relaxed(&sc->sc_async, NULL);
542 		mutex_exit(&proc_lock);
543 		break;
544 
545 	/* XXX this is not the most general solution. */
546 	case TIOCSPGRP:
547 		mutex_enter(&proc_lock);
548 		if (sc->sc_async == NULL) {
549 			mutex_exit(&proc_lock);
550 			return EINVAL;
551 		}
552 		if (*(int *)addr != sc->sc_async->p_pgid) {
553 			mutex_exit(&proc_lock);
554 			return EPERM;
555 		}
556 		mutex_exit(&proc_lock);
557 		break;
558 
559 	case FIOSETOWN:
560 		mutex_enter(&proc_lock);
561 		if (sc->sc_async == NULL) {
562 			mutex_exit(&proc_lock);
563 			return EINVAL;
564 		}
565 		if (-*(int *)addr != sc->sc_async->p_pgid
566 		    && *(int *)addr != sc->sc_async->p_pid) {
567 			mutex_exit(&proc_lock);
568 			return EPERM;
569 		}
570 		mutex_exit(&proc_lock);
571 		break;
572 
573 	case USB_HID_GET_RAW:
574 		*(int *)addr = sc->sc_raw;
575 		break;
576 
577 	case USB_HID_SET_RAW:
578 		sc->sc_raw = *(int *)addr;
579 		break;
580 
581 	case USB_GET_REPORT_DESC:
582 		uhidev_get_report_desc(sc->sc_hdev, &desc, &size);
583 		rd = (struct usb_ctl_report_desc *)addr;
584 		size = uimin(size, sizeof(rd->ucrd_data));
585 		rd->ucrd_size = size;
586 		memcpy(rd->ucrd_data, desc, size);
587 		break;
588 
589 	case USB_SET_IMMED:
590 		if (*(int *)addr) {
591 			extra = sc->sc_report_id != 0;
592 			if (sc->sc_isize + extra > sizeof(buffer))
593 				return ENOBUFS;
594 			err = uhidev_get_report(sc->sc_hdev, UHID_INPUT_REPORT,
595 						buffer, sc->sc_isize + extra);
596 			if (err)
597 				return EOPNOTSUPP;
598 
599 			atomic_or_32(&sc->sc_state, UHID_IMMED);
600 		} else
601 			atomic_and_32(&sc->sc_state, ~UHID_IMMED);
602 		break;
603 
604 	case USB_GET_REPORT:
605 		re = (struct usb_ctl_report *)addr;
606 		switch (re->ucr_report) {
607 		case UHID_INPUT_REPORT:
608 			size = sc->sc_isize;
609 			break;
610 		case UHID_OUTPUT_REPORT:
611 			size = sc->sc_osize;
612 			break;
613 		case UHID_FEATURE_REPORT:
614 			size = sc->sc_fsize;
615 			break;
616 		default:
617 			return EINVAL;
618 		}
619 		extra = sc->sc_report_id != 0;
620 		if (size + extra > sizeof(re->ucr_data))
621 			return ENOBUFS;
622 		err = uhidev_get_report(sc->sc_hdev, re->ucr_report,
623 		    re->ucr_data, size + extra);
624 		if (extra)
625 			memmove(re->ucr_data, re->ucr_data+1, size);
626 		if (err)
627 			return EIO;
628 		break;
629 
630 	case USB_SET_REPORT:
631 		re = (struct usb_ctl_report *)addr;
632 		switch (re->ucr_report) {
633 		case UHID_INPUT_REPORT:
634 			size = sc->sc_isize;
635 			break;
636 		case UHID_OUTPUT_REPORT:
637 			size = sc->sc_osize;
638 			break;
639 		case UHID_FEATURE_REPORT:
640 			size = sc->sc_fsize;
641 			break;
642 		default:
643 			return EINVAL;
644 		}
645 		if (size > sizeof(re->ucr_data))
646 			return ENOBUFS;
647 		err = uhidev_set_report(sc->sc_hdev, re->ucr_report,
648 		    re->ucr_data, size);
649 		if (err)
650 			return EIO;
651 		break;
652 
653 	case USB_GET_REPORT_ID:
654 		*(int *)addr = sc->sc_report_id;
655 		break;
656 
657 	case USB_GET_DEVICE_DESC:
658 		*(usb_device_descriptor_t *)addr =
659 			*usbd_get_device_descriptor(sc->sc_udev);
660 		break;
661 
662 	case USB_GET_DEVICEINFO:
663 		usbd_fill_deviceinfo(sc->sc_udev,
664 				     (struct usb_device_info *)addr, 0);
665 		break;
666 	case USB_GET_DEVICEINFO_30:
667 		MODULE_HOOK_CALL(usb_subr_fill_30_hook,
668                     (sc->sc_udev,
669 		      (struct usb_device_info30 *)addr, 0,
670                       usbd_devinfo_vp, usbd_printBCD),
671                     enosys(), err);
672 		if (err == 0)
673 			return 0;
674 		break;
675 	case USB_GET_STRING_DESC:
676 	    {
677 		struct usb_string_desc *si = (struct usb_string_desc *)addr;
678 		err = usbd_get_string_desc(sc->sc_udev,
679 			si->usd_string_index,
680 			si->usd_language_id, &si->usd_desc, &size);
681 		if (err)
682 			return EINVAL;
683 		break;
684 	    }
685 
686 	default:
687 		return EINVAL;
688 	}
689 	return 0;
690 }
691 
692 static int
uhidpoll(dev_t dev,int events,struct lwp * l)693 uhidpoll(dev_t dev, int events, struct lwp *l)
694 {
695 	struct uhid_softc *sc = device_lookup_private(&uhid_cd, UHIDUNIT(dev));
696 	int revents = 0;
697 
698 	mutex_enter(&sc->sc_lock);
699 	if (events & (POLLOUT | POLLWRNORM))
700 		revents |= events & (POLLOUT | POLLWRNORM);
701 	if (events & (POLLIN | POLLRDNORM)) {
702 		if (sc->sc_q.c_cc > 0)
703 			revents |= events & (POLLIN | POLLRDNORM);
704 		else
705 			selrecord(l, &sc->sc_rsel);
706 	}
707 	mutex_exit(&sc->sc_lock);
708 
709 	return revents;
710 }
711 
712 static void
filt_uhidrdetach(struct knote * kn)713 filt_uhidrdetach(struct knote *kn)
714 {
715 	struct uhid_softc *sc = kn->kn_hook;
716 
717 	mutex_enter(&sc->sc_lock);
718 	selremove_knote(&sc->sc_rsel, kn);
719 	mutex_exit(&sc->sc_lock);
720 }
721 
722 static int
filt_uhidread(struct knote * kn,long hint)723 filt_uhidread(struct knote *kn, long hint)
724 {
725 	struct uhid_softc *sc = kn->kn_hook;
726 
727 	if (hint == NOTE_SUBMIT)
728 		KASSERT(mutex_owned(&sc->sc_lock));
729 	else
730 		mutex_enter(&sc->sc_lock);
731 
732 	kn->kn_data = sc->sc_q.c_cc;
733 
734 	if (hint == NOTE_SUBMIT)
735 		KASSERT(mutex_owned(&sc->sc_lock));
736 	else
737 		mutex_exit(&sc->sc_lock);
738 
739 	return kn->kn_data > 0;
740 }
741 
742 static const struct filterops uhidread_filtops = {
743 	.f_flags = FILTEROP_ISFD,
744 	.f_attach = NULL,
745 	.f_detach = filt_uhidrdetach,
746 	.f_event = filt_uhidread,
747 };
748 
749 static int
uhidkqfilter(dev_t dev,struct knote * kn)750 uhidkqfilter(dev_t dev, struct knote *kn)
751 {
752 	struct uhid_softc *sc = device_lookup_private(&uhid_cd, UHIDUNIT(dev));
753 
754 	switch (kn->kn_filter) {
755 	case EVFILT_READ:
756 		kn->kn_fop = &uhidread_filtops;
757 		kn->kn_hook = sc;
758 		mutex_enter(&sc->sc_lock);
759 		selrecord_knote(&sc->sc_rsel, kn);
760 		mutex_exit(&sc->sc_lock);
761 		return 0;
762 
763 	case EVFILT_WRITE:
764 		kn->kn_fop = &seltrue_filtops;
765 		return 0;
766 
767 	default:
768 		return EINVAL;
769 	}
770 }
771