xref: /netbsd-src/sys/dev/usb/uhid.c (revision 7330f729ccf0bd976a06f95fad452fe774fc7fd1)
1 /*	$NetBSD: uhid.c,v 1.108 2019/05/05 03:17:54 mrg Exp $	*/
2 
3 /*
4  * Copyright (c) 1998, 2004, 2008, 2012 The NetBSD Foundation, Inc.
5  * All rights reserved.
6  *
7  * This code is derived from software contributed to The NetBSD Foundation
8  * by Lennart Augustsson (lennart@augustsson.net) at
9  * Carlstedt Research & Technology and Matthew R. Green (mrg@eterna.com.au).
10  *
11  * Redistribution and use in source and binary forms, with or without
12  * modification, are permitted provided that the following conditions
13  * are met:
14  * 1. Redistributions of source code must retain the above copyright
15  *    notice, this list of conditions and the following disclaimer.
16  * 2. Redistributions in binary form must reproduce the above copyright
17  *    notice, this list of conditions and the following disclaimer in the
18  *    documentation and/or other materials provided with the distribution.
19  *
20  * THIS SOFTWARE IS PROVIDED BY THE NETBSD FOUNDATION, INC. AND CONTRIBUTORS
21  * ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED
22  * TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
23  * PURPOSE ARE DISCLAIMED.  IN NO EVENT SHALL THE FOUNDATION OR CONTRIBUTORS
24  * BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
25  * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
26  * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
27  * INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
28  * CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
29  * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
30  * POSSIBILITY OF SUCH DAMAGE.
31  */
32 
33 /*
34  * HID spec: http://www.usb.org/developers/devclass_docs/HID1_11.pdf
35  */
36 
37 #include <sys/cdefs.h>
38 __KERNEL_RCSID(0, "$NetBSD: uhid.c,v 1.108 2019/05/05 03:17:54 mrg Exp $");
39 
40 #ifdef _KERNEL_OPT
41 #include "opt_compat_netbsd.h"
42 #include "opt_usb.h"
43 #endif
44 
45 #include <sys/param.h>
46 #include <sys/systm.h>
47 #include <sys/kernel.h>
48 #include <sys/kmem.h>
49 #include <sys/signalvar.h>
50 #include <sys/device.h>
51 #include <sys/ioctl.h>
52 #include <sys/conf.h>
53 #include <sys/tty.h>
54 #include <sys/file.h>
55 #include <sys/select.h>
56 #include <sys/proc.h>
57 #include <sys/vnode.h>
58 #include <sys/poll.h>
59 #include <sys/intr.h>
60 #include <sys/compat_stub.h>
61 
62 #include <dev/usb/usb.h>
63 #include <dev/usb/usbhid.h>
64 
65 #include <dev/usb/usbdevs.h>
66 #include <dev/usb/usbdi.h>
67 #include <dev/usb/usbdi_util.h>
68 #include <dev/usb/usb_quirks.h>
69 #include <dev/hid/hid.h>
70 
71 #include <dev/usb/uhidev.h>
72 
73 #include "ioconf.h"
74 
75 #ifdef UHID_DEBUG
76 #define DPRINTF(x)	if (uhiddebug) printf x
77 #define DPRINTFN(n,x)	if (uhiddebug>(n)) printf x
78 int	uhiddebug = 0;
79 #else
80 #define DPRINTF(x)
81 #define DPRINTFN(n,x)
82 #endif
83 
84 struct uhid_softc {
85 	struct uhidev sc_hdev;
86 
87 	kmutex_t sc_access_lock; /* serialises syscall accesses */
88 	kmutex_t sc_lock;	/* protects refcnt, others */
89 	kcondvar_t sc_cv;
90 	kcondvar_t sc_detach_cv;
91 
92 	int sc_isize;
93 	int sc_osize;
94 	int sc_fsize;
95 
96 	u_char *sc_obuf;
97 
98 	struct clist sc_q;	/* protected by sc_lock */
99 	struct selinfo sc_rsel;
100 	proc_t *sc_async;	/* process that wants SIGIO */
101 	void *sc_sih;
102 	u_char sc_state;	/* driver state */
103 #define	UHID_ASLP	0x01	/* waiting for device data */
104 #define UHID_IMMED	0x02	/* return read data immediately */
105 
106 	int sc_refcnt;
107 	u_char sc_dying;
108 };
109 
110 #define	UHIDUNIT(dev)	(minor(dev))
111 #define	UHID_CHUNK	128	/* chunk size for read */
112 #define	UHID_BSIZE	1020	/* buffer size */
113 
114 dev_type_open(uhidopen);
115 dev_type_close(uhidclose);
116 dev_type_read(uhidread);
117 dev_type_write(uhidwrite);
118 dev_type_ioctl(uhidioctl);
119 dev_type_poll(uhidpoll);
120 dev_type_kqfilter(uhidkqfilter);
121 
122 const struct cdevsw uhid_cdevsw = {
123 	.d_open = uhidopen,
124 	.d_close = uhidclose,
125 	.d_read = uhidread,
126 	.d_write = uhidwrite,
127 	.d_ioctl = uhidioctl,
128 	.d_stop = nostop,
129 	.d_tty = notty,
130 	.d_poll = uhidpoll,
131 	.d_mmap = nommap,
132 	.d_kqfilter = uhidkqfilter,
133 	.d_discard = nodiscard,
134 	.d_flag = D_OTHER
135 };
136 
137 Static void uhid_intr(struct uhidev *, void *, u_int);
138 Static void uhid_softintr(void *);
139 
140 Static int uhid_do_read(struct uhid_softc *, struct uio *, int);
141 Static int uhid_do_write(struct uhid_softc *, struct uio *, int);
142 Static int uhid_do_ioctl(struct uhid_softc*, u_long, void *, int, struct lwp *);
143 
144 int	uhid_match(device_t, cfdata_t, void *);
145 void	uhid_attach(device_t, device_t, void *);
146 int	uhid_detach(device_t, int);
147 int	uhid_activate(device_t, enum devact);
148 
149 CFATTACH_DECL_NEW(uhid, sizeof(struct uhid_softc), uhid_match, uhid_attach,
150     uhid_detach, uhid_activate);
151 
152 int
153 uhid_match(device_t parent, cfdata_t match, void *aux)
154 {
155 #ifdef UHID_DEBUG
156 	struct uhidev_attach_arg *uha = aux;
157 #endif
158 
159 	DPRINTF(("uhid_match: report=%d\n", uha->reportid));
160 
161 	if (match->cf_flags & 1)
162 		return UMATCH_HIGHEST;
163 	else
164 		return UMATCH_IFACECLASS_GENERIC;
165 }
166 
167 void
168 uhid_attach(device_t parent, device_t self, void *aux)
169 {
170 	struct uhid_softc *sc = device_private(self);
171 	struct uhidev_attach_arg *uha = aux;
172 	int size, repid;
173 	void *desc;
174 
175 	sc->sc_hdev.sc_dev = self;
176 	selinit(&sc->sc_rsel);
177 	sc->sc_hdev.sc_intr = uhid_intr;
178 	sc->sc_hdev.sc_parent = uha->parent;
179 	sc->sc_hdev.sc_report_id = uha->reportid;
180 	sc->sc_sih = softint_establish(SOFTINT_CLOCK, uhid_softintr, sc);
181 
182 	uhidev_get_report_desc(uha->parent, &desc, &size);
183 	repid = uha->reportid;
184 	sc->sc_isize = hid_report_size(desc, size, hid_input,   repid);
185 	sc->sc_osize = hid_report_size(desc, size, hid_output,  repid);
186 	sc->sc_fsize = hid_report_size(desc, size, hid_feature, repid);
187 
188 	aprint_naive("\n");
189 	aprint_normal(": input=%d, output=%d, feature=%d\n",
190 	       sc->sc_isize, sc->sc_osize, sc->sc_fsize);
191 
192 	mutex_init(&sc->sc_access_lock, MUTEX_DEFAULT, IPL_NONE);
193 	mutex_init(&sc->sc_lock, MUTEX_DEFAULT, IPL_SOFTUSB);
194 	cv_init(&sc->sc_cv, "uhidrea");
195 	cv_init(&sc->sc_detach_cv, "uhiddet");
196 
197 	if (!pmf_device_register(self, NULL, NULL))
198 		aprint_error_dev(self, "couldn't establish power handler\n");
199 
200 	return;
201 }
202 
203 int
204 uhid_activate(device_t self, enum devact act)
205 {
206 	struct uhid_softc *sc = device_private(self);
207 
208 	switch (act) {
209 	case DVACT_DEACTIVATE:
210 		sc->sc_dying = 1;
211 		return 0;
212 	default:
213 		return EOPNOTSUPP;
214 	}
215 }
216 
217 int
218 uhid_detach(device_t self, int flags)
219 {
220 	struct uhid_softc *sc = device_private(self);
221 	int maj, mn;
222 
223 	DPRINTF(("uhid_detach: sc=%p flags=%d\n", sc, flags));
224 
225 	sc->sc_dying = 1;
226 
227 	pmf_device_deregister(self);
228 
229 	mutex_enter(&sc->sc_lock);
230 	if (sc->sc_hdev.sc_state & UHIDEV_OPEN) {
231 		if (--sc->sc_refcnt >= 0) {
232 			/* Wake everyone */
233 			cv_broadcast(&sc->sc_cv);
234 			/* Wait for processes to go away. */
235 			if (cv_timedwait(&sc->sc_detach_cv, &sc->sc_lock, hz * 60))
236 				aprint_error_dev(self, ": didn't detach\n");
237 		}
238 	}
239 	mutex_exit(&sc->sc_lock);
240 
241 	/* locate the major number */
242 	maj = cdevsw_lookup_major(&uhid_cdevsw);
243 
244 	/* Nuke the vnodes for any open instances (calls close). */
245 	mn = device_unit(self);
246 	vdevgone(maj, mn, mn, VCHR);
247 
248 #if 0
249 	usbd_add_drv_event(USB_EVENT_DRIVER_DETACH,
250 	    sc->sc_hdev.sc_parent->sc_udev, sc->sc_hdev.sc_dev);
251 #endif
252 	cv_destroy(&sc->sc_cv);
253 	cv_destroy(&sc->sc_detach_cv);
254 	mutex_destroy(&sc->sc_lock);
255 	mutex_destroy(&sc->sc_access_lock);
256 	seldestroy(&sc->sc_rsel);
257 	softint_disestablish(sc->sc_sih);
258 
259 	return 0;
260 }
261 
262 void
263 uhid_intr(struct uhidev *addr, void *data, u_int len)
264 {
265 	struct uhid_softc *sc = (struct uhid_softc *)addr;
266 
267 #ifdef UHID_DEBUG
268 	if (uhiddebug > 5) {
269 		uint32_t i;
270 
271 		DPRINTF(("uhid_intr: data ="));
272 		for (i = 0; i < len; i++)
273 			DPRINTF((" %02x", ((u_char *)data)[i]));
274 		DPRINTF(("\n"));
275 	}
276 #endif
277 
278 	mutex_enter(&sc->sc_lock);
279 	(void)b_to_q(data, len, &sc->sc_q);
280 
281 	if (sc->sc_state & UHID_ASLP) {
282 		sc->sc_state &= ~UHID_ASLP;
283 		DPRINTFN(5, ("uhid_intr: waking %p\n", &sc->sc_q));
284 		cv_broadcast(&sc->sc_cv);
285 	}
286 	selnotify(&sc->sc_rsel, 0, 0);
287 	if (sc->sc_async != NULL) {
288 		DPRINTFN(3, ("uhid_intr: sending SIGIO %p\n", sc->sc_async));
289 		softint_schedule(sc->sc_sih);
290 	}
291 	mutex_exit(&sc->sc_lock);
292 }
293 
294 void
295 uhid_softintr(void *cookie)
296 {
297 	struct uhid_softc *sc;
298 
299 	sc = cookie;
300 
301 	mutex_enter(proc_lock);
302 	if (sc->sc_async != NULL)
303 		 psignal(sc->sc_async, SIGIO);
304 	mutex_exit(proc_lock);
305 }
306 
307 int
308 uhidopen(dev_t dev, int flag, int mode, struct lwp *l)
309 {
310 	struct uhid_softc *sc;
311 	int error;
312 
313 	sc = device_lookup_private(&uhid_cd, UHIDUNIT(dev));
314 	if (sc == NULL)
315 		return ENXIO;
316 
317 	DPRINTF(("uhidopen: sc=%p\n", sc));
318 
319 	if (sc->sc_dying)
320 		return ENXIO;
321 
322 	mutex_enter(&sc->sc_lock);
323 
324 	/*
325 	 * uhid interrupts aren't enabled yet, so setup sc_q now, as
326 	 * long as they're not already allocated.
327 	 */
328 	if (sc->sc_hdev.sc_state & UHIDEV_OPEN) {
329 		mutex_exit(&sc->sc_lock);
330 		return EBUSY;
331 	}
332 	mutex_exit(&sc->sc_lock);
333 
334 	if (clalloc(&sc->sc_q, UHID_BSIZE, 0) == -1) {
335 		return ENOMEM;
336 	}
337 
338 	mutex_enter(&sc->sc_access_lock);
339 	error = uhidev_open(&sc->sc_hdev);
340 	if (error) {
341 		clfree(&sc->sc_q);
342 		mutex_exit(&sc->sc_access_lock);
343 		return error;
344 	}
345 	mutex_exit(&sc->sc_access_lock);
346 
347 	if (sc->sc_osize > 0)
348 		sc->sc_obuf = kmem_alloc(sc->sc_osize, KM_SLEEP);
349 	else
350 		sc->sc_obuf = NULL;
351 	sc->sc_state &= ~UHID_IMMED;
352 
353 	mutex_enter(proc_lock);
354 	sc->sc_async = NULL;
355 	mutex_exit(proc_lock);
356 
357 	return 0;
358 }
359 
360 int
361 uhidclose(dev_t dev, int flag, int mode, struct lwp *l)
362 {
363 	struct uhid_softc *sc;
364 
365 	sc = device_lookup_private(&uhid_cd, UHIDUNIT(dev));
366 
367 	DPRINTF(("uhidclose: sc=%p\n", sc));
368 
369 	mutex_enter(proc_lock);
370 	sc->sc_async = NULL;
371 	mutex_exit(proc_lock);
372 
373 	mutex_enter(&sc->sc_access_lock);
374 
375 	uhidev_stop(&sc->sc_hdev);
376 
377 	clfree(&sc->sc_q);
378 	if (sc->sc_osize > 0)
379 		kmem_free(sc->sc_obuf, sc->sc_osize);
380 
381 	uhidev_close(&sc->sc_hdev);
382 
383 	mutex_exit(&sc->sc_access_lock);
384 
385 	return 0;
386 }
387 
388 int
389 uhid_do_read(struct uhid_softc *sc, struct uio *uio, int flag)
390 {
391 	int error = 0;
392 	int extra;
393 	size_t length;
394 	u_char buffer[UHID_CHUNK];
395 	usbd_status err;
396 
397 	DPRINTFN(1, ("uhidread\n"));
398 	if (sc->sc_state & UHID_IMMED) {
399 		DPRINTFN(1, ("uhidread immed\n"));
400 		extra = sc->sc_hdev.sc_report_id != 0;
401 		err = uhidev_get_report(&sc->sc_hdev, UHID_INPUT_REPORT,
402 					buffer, sc->sc_isize + extra);
403 		if (err)
404 			return EIO;
405 		return uiomove(buffer+extra, sc->sc_isize, uio);
406 	}
407 
408 	mutex_enter(&sc->sc_lock);
409 	while (sc->sc_q.c_cc == 0) {
410 		if (flag & IO_NDELAY) {
411 			mutex_exit(&sc->sc_lock);
412 			return EWOULDBLOCK;
413 		}
414 		sc->sc_state |= UHID_ASLP;
415 		DPRINTFN(5, ("uhidread: sleep on %p\n", &sc->sc_q));
416 		error = cv_wait_sig(&sc->sc_cv, &sc->sc_lock);
417 		DPRINTFN(5, ("uhidread: woke, error=%d\n", error));
418 		if (sc->sc_dying)
419 			error = EIO;
420 		if (error) {
421 			sc->sc_state &= ~UHID_ASLP;
422 			break;
423 		}
424 	}
425 
426 	/* Transfer as many chunks as possible. */
427 	while (sc->sc_q.c_cc > 0 && uio->uio_resid > 0 && !error) {
428 		length = uimin(sc->sc_q.c_cc, uio->uio_resid);
429 		if (length > sizeof(buffer))
430 			length = sizeof(buffer);
431 
432 		/* Remove a small chunk from the input queue. */
433 		(void) q_to_b(&sc->sc_q, buffer, length);
434 		DPRINTFN(5, ("uhidread: got %lu chars\n", (u_long)length));
435 
436 		/* Copy the data to the user process. */
437 		mutex_exit(&sc->sc_lock);
438 		if ((error = uiomove(buffer, length, uio)) != 0)
439 			return error;
440 		mutex_enter(&sc->sc_lock);
441 	}
442 
443 	mutex_exit(&sc->sc_lock);
444 	return error;
445 }
446 
447 int
448 uhidread(dev_t dev, struct uio *uio, int flag)
449 {
450 	struct uhid_softc *sc;
451 	int error;
452 
453 	sc = device_lookup_private(&uhid_cd, UHIDUNIT(dev));
454 
455 	mutex_enter(&sc->sc_lock);
456 	sc->sc_refcnt++;
457 	mutex_exit(&sc->sc_lock);
458 
459 	mutex_enter(&sc->sc_access_lock);
460 	error = uhid_do_read(sc, uio, flag);
461 	mutex_exit(&sc->sc_access_lock);
462 
463 	mutex_enter(&sc->sc_lock);
464 	if (--sc->sc_refcnt < 0)
465 		cv_broadcast(&sc->sc_detach_cv);
466 	mutex_exit(&sc->sc_lock);
467 	return error;
468 }
469 
470 int
471 uhid_do_write(struct uhid_softc *sc, struct uio *uio, int flag)
472 {
473 	int error;
474 	int size;
475 	usbd_status err;
476 
477 	DPRINTFN(1, ("uhidwrite\n"));
478 
479 	if (sc->sc_dying)
480 		return EIO;
481 
482 	size = sc->sc_osize;
483 	error = 0;
484 	if (uio->uio_resid != size || size == 0)
485 		return EINVAL;
486 	error = uiomove(sc->sc_obuf, size, uio);
487 	if (!error) {
488 		err = uhidev_set_report(&sc->sc_hdev, UHID_OUTPUT_REPORT,
489 					sc->sc_obuf, size);
490 		if (err)
491 			error = EIO;
492 	}
493 
494 	return error;
495 }
496 
497 int
498 uhidwrite(dev_t dev, struct uio *uio, int flag)
499 {
500 	struct uhid_softc *sc;
501 	int error;
502 
503 	sc = device_lookup_private(&uhid_cd, UHIDUNIT(dev));
504 
505 	mutex_enter(&sc->sc_lock);
506 	sc->sc_refcnt++;
507 	mutex_exit(&sc->sc_lock);
508 
509 	mutex_enter(&sc->sc_access_lock);
510 	error = uhid_do_write(sc, uio, flag);
511 	mutex_exit(&sc->sc_access_lock);
512 
513 	mutex_enter(&sc->sc_lock);
514 	if (--sc->sc_refcnt < 0)
515 		cv_broadcast(&sc->sc_detach_cv);
516 	mutex_exit(&sc->sc_lock);
517 	return error;
518 }
519 
520 int
521 uhid_do_ioctl(struct uhid_softc *sc, u_long cmd, void *addr,
522     int flag, struct lwp *l)
523 {
524 	struct usb_ctl_report_desc *rd;
525 	struct usb_ctl_report *re;
526 	u_char buffer[UHID_CHUNK];
527 	int size, extra;
528 	usbd_status err;
529 	void *desc;
530 
531 	DPRINTFN(2, ("uhidioctl: cmd=%lx\n", cmd));
532 
533 	if (sc->sc_dying)
534 		return EIO;
535 
536 	switch (cmd) {
537 	case FIONBIO:
538 		/* All handled in the upper FS layer. */
539 		break;
540 
541 	case FIOASYNC:
542 		mutex_enter(proc_lock);
543 		if (*(int *)addr) {
544 			if (sc->sc_async != NULL)
545 				return EBUSY;
546 			sc->sc_async = l->l_proc;
547 			DPRINTF(("uhid_do_ioctl: FIOASYNC %p\n", l->l_proc));
548 		} else
549 			sc->sc_async = NULL;
550 		mutex_exit(proc_lock);
551 		break;
552 
553 	/* XXX this is not the most general solution. */
554 	case TIOCSPGRP:
555 		mutex_enter(proc_lock);
556 		if (sc->sc_async == NULL) {
557 			mutex_exit(proc_lock);
558 			return EINVAL;
559 		}
560 		if (*(int *)addr != sc->sc_async->p_pgid) {
561 			mutex_exit(proc_lock);
562 			return EPERM;
563 		}
564 		mutex_exit(proc_lock);
565 		break;
566 
567 	case FIOSETOWN:
568 		mutex_enter(proc_lock);
569 		if (sc->sc_async == NULL) {
570 			mutex_exit(proc_lock);
571 			return EINVAL;
572 		}
573 		if (-*(int *)addr != sc->sc_async->p_pgid
574 		    && *(int *)addr != sc->sc_async->p_pid) {
575 			mutex_exit(proc_lock);
576 			return EPERM;
577 		}
578 		mutex_exit(proc_lock);
579 		break;
580 
581 	case USB_GET_REPORT_DESC:
582 		uhidev_get_report_desc(sc->sc_hdev.sc_parent, &desc, &size);
583 		rd = (struct usb_ctl_report_desc *)addr;
584 		size = uimin(size, sizeof(rd->ucrd_data));
585 		rd->ucrd_size = size;
586 		memcpy(rd->ucrd_data, desc, size);
587 		break;
588 
589 	case USB_SET_IMMED:
590 		if (*(int *)addr) {
591 			extra = sc->sc_hdev.sc_report_id != 0;
592 			err = uhidev_get_report(&sc->sc_hdev, UHID_INPUT_REPORT,
593 						buffer, sc->sc_isize + extra);
594 			if (err)
595 				return EOPNOTSUPP;
596 
597 			sc->sc_state |=  UHID_IMMED;
598 		} else
599 			sc->sc_state &= ~UHID_IMMED;
600 		break;
601 
602 	case USB_GET_REPORT:
603 		re = (struct usb_ctl_report *)addr;
604 		switch (re->ucr_report) {
605 		case UHID_INPUT_REPORT:
606 			size = sc->sc_isize;
607 			break;
608 		case UHID_OUTPUT_REPORT:
609 			size = sc->sc_osize;
610 			break;
611 		case UHID_FEATURE_REPORT:
612 			size = sc->sc_fsize;
613 			break;
614 		default:
615 			return EINVAL;
616 		}
617 		extra = sc->sc_hdev.sc_report_id != 0;
618 		err = uhidev_get_report(&sc->sc_hdev, re->ucr_report,
619 		    re->ucr_data, size + extra);
620 		if (extra)
621 			memmove(re->ucr_data, re->ucr_data+1, size);
622 		if (err)
623 			return EIO;
624 		break;
625 
626 	case USB_SET_REPORT:
627 		re = (struct usb_ctl_report *)addr;
628 		switch (re->ucr_report) {
629 		case UHID_INPUT_REPORT:
630 			size = sc->sc_isize;
631 			break;
632 		case UHID_OUTPUT_REPORT:
633 			size = sc->sc_osize;
634 			break;
635 		case UHID_FEATURE_REPORT:
636 			size = sc->sc_fsize;
637 			break;
638 		default:
639 			return EINVAL;
640 		}
641 		err = uhidev_set_report(&sc->sc_hdev, re->ucr_report,
642 		    re->ucr_data, size);
643 		if (err)
644 			return EIO;
645 		break;
646 
647 	case USB_GET_REPORT_ID:
648 		*(int *)addr = sc->sc_hdev.sc_report_id;
649 		break;
650 
651 	case USB_GET_DEVICE_DESC:
652 		*(usb_device_descriptor_t *)addr =
653 			*usbd_get_device_descriptor(sc->sc_hdev.sc_parent->sc_udev);
654 		break;
655 
656 	case USB_GET_DEVICEINFO:
657 		usbd_fill_deviceinfo(sc->sc_hdev.sc_parent->sc_udev,
658 				     (struct usb_device_info *)addr, 0);
659 		break;
660 	case USB_GET_DEVICEINFO_OLD:
661 		MODULE_HOOK_CALL(usb_subr_fill_30_hook,
662                     (sc->sc_hdev.sc_parent->sc_udev,
663 		      (struct usb_device_info_old *)addr, 0,
664                       usbd_devinfo_vp, usbd_printBCD),
665                     enosys(), err);
666 		if (err == 0)
667 			return 0;
668 		break;
669 	case USB_GET_STRING_DESC:
670 	    {
671 		struct usb_string_desc *si = (struct usb_string_desc *)addr;
672 		err = usbd_get_string_desc(sc->sc_hdev.sc_parent->sc_udev,
673 			si->usd_string_index,
674 			si->usd_language_id, &si->usd_desc, &size);
675 		if (err)
676 			return EINVAL;
677 		break;
678 	    }
679 
680 	default:
681 		return EINVAL;
682 	}
683 	return 0;
684 }
685 
686 int
687 uhidioctl(dev_t dev, u_long cmd, void *addr, int flag, struct lwp *l)
688 {
689 	struct uhid_softc *sc;
690 	int error;
691 
692 	sc = device_lookup_private(&uhid_cd, UHIDUNIT(dev));
693 	if (sc == NULL)
694 		return ENXIO;
695 
696 	if (sc->sc_dying)
697 		return EIO;
698 
699 	mutex_enter(&sc->sc_lock);
700 	sc->sc_refcnt++;
701 	mutex_exit(&sc->sc_lock);
702 
703 	mutex_enter(&sc->sc_access_lock);
704 	error = uhid_do_ioctl(sc, cmd, addr, flag, l);
705 	mutex_exit(&sc->sc_access_lock);
706 
707 	mutex_enter(&sc->sc_lock);
708 	if (--sc->sc_refcnt < 0)
709 		cv_broadcast(&sc->sc_detach_cv);
710 	mutex_exit(&sc->sc_lock);
711 	return error;
712 }
713 
714 int
715 uhidpoll(dev_t dev, int events, struct lwp *l)
716 {
717 	struct uhid_softc *sc;
718 	int revents = 0;
719 
720 	sc = device_lookup_private(&uhid_cd, UHIDUNIT(dev));
721 	if (sc == NULL)
722 		return ENXIO;
723 
724 	if (sc->sc_dying)
725 		return EIO;
726 
727 	mutex_enter(&sc->sc_lock);
728 	if (events & (POLLOUT | POLLWRNORM))
729 		revents |= events & (POLLOUT | POLLWRNORM);
730 	if (events & (POLLIN | POLLRDNORM)) {
731 		if (sc->sc_q.c_cc > 0)
732 			revents |= events & (POLLIN | POLLRDNORM);
733 		else
734 			selrecord(l, &sc->sc_rsel);
735 	}
736 	mutex_exit(&sc->sc_lock);
737 
738 	return revents;
739 }
740 
741 static void
742 filt_uhidrdetach(struct knote *kn)
743 {
744 	struct uhid_softc *sc = kn->kn_hook;
745 
746 	mutex_enter(&sc->sc_lock);
747 	SLIST_REMOVE(&sc->sc_rsel.sel_klist, kn, knote, kn_selnext);
748 	mutex_exit(&sc->sc_lock);
749 }
750 
751 static int
752 filt_uhidread(struct knote *kn, long hint)
753 {
754 	struct uhid_softc *sc = kn->kn_hook;
755 
756 	kn->kn_data = sc->sc_q.c_cc;
757 	return kn->kn_data > 0;
758 }
759 
760 static const struct filterops uhidread_filtops = {
761 	.f_isfd = 1,
762 	.f_attach = NULL,
763 	.f_detach = filt_uhidrdetach,
764 	.f_event = filt_uhidread,
765 };
766 
767 static const struct filterops uhid_seltrue_filtops = {
768 	.f_isfd = 1,
769 	.f_attach = NULL,
770 	.f_detach = filt_uhidrdetach,
771 	.f_event = filt_seltrue,
772 };
773 
774 int
775 uhidkqfilter(dev_t dev, struct knote *kn)
776 {
777 	struct uhid_softc *sc;
778 	struct klist *klist;
779 
780 	sc = device_lookup_private(&uhid_cd, UHIDUNIT(dev));
781 
782 	if (sc->sc_dying)
783 		return ENXIO;
784 
785 	switch (kn->kn_filter) {
786 	case EVFILT_READ:
787 		klist = &sc->sc_rsel.sel_klist;
788 		kn->kn_fop = &uhidread_filtops;
789 		break;
790 
791 	case EVFILT_WRITE:
792 		klist = &sc->sc_rsel.sel_klist;
793 		kn->kn_fop = &uhid_seltrue_filtops;
794 		break;
795 
796 	default:
797 		return EINVAL;
798 	}
799 
800 	kn->kn_hook = sc;
801 
802 	mutex_enter(&sc->sc_lock);
803 	SLIST_INSERT_HEAD(klist, kn, kn_selnext);
804 	mutex_exit(&sc->sc_lock);
805 
806 	return 0;
807 }
808