xref: /netbsd-src/sys/dev/usb/uhid.c (revision bdc22b2e01993381dcefeff2bc9b56ca75a4235c)
1 /*	$NetBSD: uhid.c,v 1.101 2017/12/10 17:03:07 bouyer Exp $	*/
2 
3 /*
4  * Copyright (c) 1998, 2004, 2008, 2012 The NetBSD Foundation, Inc.
5  * All rights reserved.
6  *
7  * This code is derived from software contributed to The NetBSD Foundation
8  * by Lennart Augustsson (lennart@augustsson.net) at
9  * Carlstedt Research & Technology and Matthew R. Green (mrg@eterna.com.au).
10  *
11  * Redistribution and use in source and binary forms, with or without
12  * modification, are permitted provided that the following conditions
13  * are met:
14  * 1. Redistributions of source code must retain the above copyright
15  *    notice, this list of conditions and the following disclaimer.
16  * 2. Redistributions in binary form must reproduce the above copyright
17  *    notice, this list of conditions and the following disclaimer in the
18  *    documentation and/or other materials provided with the distribution.
19  *
20  * THIS SOFTWARE IS PROVIDED BY THE NETBSD FOUNDATION, INC. AND CONTRIBUTORS
21  * ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED
22  * TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
23  * PURPOSE ARE DISCLAIMED.  IN NO EVENT SHALL THE FOUNDATION OR CONTRIBUTORS
24  * BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
25  * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
26  * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
27  * INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
28  * CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
29  * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
30  * POSSIBILITY OF SUCH DAMAGE.
31  */
32 
33 /*
34  * HID spec: http://www.usb.org/developers/devclass_docs/HID1_11.pdf
35  */
36 
37 #include <sys/cdefs.h>
38 __KERNEL_RCSID(0, "$NetBSD: uhid.c,v 1.101 2017/12/10 17:03:07 bouyer Exp $");
39 
40 #ifdef _KERNEL_OPT
41 #include "opt_compat_netbsd.h"
42 #include "opt_usb.h"
43 #endif
44 
45 #include <sys/param.h>
46 #include <sys/systm.h>
47 #include <sys/kernel.h>
48 #include <sys/kmem.h>
49 #include <sys/signalvar.h>
50 #include <sys/device.h>
51 #include <sys/ioctl.h>
52 #include <sys/conf.h>
53 #include <sys/tty.h>
54 #include <sys/file.h>
55 #include <sys/select.h>
56 #include <sys/proc.h>
57 #include <sys/vnode.h>
58 #include <sys/poll.h>
59 #include <sys/intr.h>
60 
61 #include <dev/usb/usb.h>
62 #include <dev/usb/usbhid.h>
63 
64 #include <dev/usb/usbdevs.h>
65 #include <dev/usb/usbdi.h>
66 #include <dev/usb/usbdi_util.h>
67 #include <dev/usb/usb_quirks.h>
68 #include <dev/hid/hid.h>
69 
70 #include <dev/usb/uhidev.h>
71 
72 #ifdef UHID_DEBUG
73 #define DPRINTF(x)	if (uhiddebug) printf x
74 #define DPRINTFN(n,x)	if (uhiddebug>(n)) printf x
75 int	uhiddebug = 0;
76 #else
77 #define DPRINTF(x)
78 #define DPRINTFN(n,x)
79 #endif
80 
81 struct uhid_softc {
82 	struct uhidev sc_hdev;
83 
84 	kmutex_t sc_access_lock; /* serialises syscall accesses */
85 	kmutex_t sc_lock;	/* protects refcnt, others */
86 	kcondvar_t sc_cv;
87 	kcondvar_t sc_detach_cv;
88 
89 	int sc_isize;
90 	int sc_osize;
91 	int sc_fsize;
92 
93 	u_char *sc_obuf;
94 
95 	struct clist sc_q;	/* protected by sc_lock */
96 	struct selinfo sc_rsel;
97 	proc_t *sc_async;	/* process that wants SIGIO */
98 	void *sc_sih;
99 	u_char sc_state;	/* driver state */
100 #define	UHID_ASLP	0x01	/* waiting for device data */
101 #define UHID_IMMED	0x02	/* return read data immediately */
102 
103 	int sc_refcnt;
104 	u_char sc_dying;
105 };
106 
107 #define	UHIDUNIT(dev)	(minor(dev))
108 #define	UHID_CHUNK	128	/* chunk size for read */
109 #define	UHID_BSIZE	1020	/* buffer size */
110 
111 dev_type_open(uhidopen);
112 dev_type_close(uhidclose);
113 dev_type_read(uhidread);
114 dev_type_write(uhidwrite);
115 dev_type_ioctl(uhidioctl);
116 dev_type_poll(uhidpoll);
117 dev_type_kqfilter(uhidkqfilter);
118 
119 const struct cdevsw uhid_cdevsw = {
120 	.d_open = uhidopen,
121 	.d_close = uhidclose,
122 	.d_read = uhidread,
123 	.d_write = uhidwrite,
124 	.d_ioctl = uhidioctl,
125 	.d_stop = nostop,
126 	.d_tty = notty,
127 	.d_poll = uhidpoll,
128 	.d_mmap = nommap,
129 	.d_kqfilter = uhidkqfilter,
130 	.d_discard = nodiscard,
131 	.d_flag = D_OTHER
132 };
133 
134 Static void uhid_intr(struct uhidev *, void *, u_int);
135 Static void uhid_softintr(void *);
136 
137 Static int uhid_do_read(struct uhid_softc *, struct uio *, int);
138 Static int uhid_do_write(struct uhid_softc *, struct uio *, int);
139 Static int uhid_do_ioctl(struct uhid_softc*, u_long, void *, int, struct lwp *);
140 
141 int	uhid_match(device_t, cfdata_t, void *);
142 void	uhid_attach(device_t, device_t, void *);
143 int	uhid_detach(device_t, int);
144 int	uhid_activate(device_t, enum devact);
145 extern struct cfdriver uhid_cd;
146 CFATTACH_DECL_NEW(uhid, sizeof(struct uhid_softc), uhid_match, uhid_attach,
147     uhid_detach, uhid_activate);
148 
149 int
150 uhid_match(device_t parent, cfdata_t match, void *aux)
151 {
152 #ifdef UHID_DEBUG
153 	struct uhidev_attach_arg *uha = aux;
154 #endif
155 
156 	DPRINTF(("uhid_match: report=%d\n", uha->reportid));
157 
158 	if (match->cf_flags & 1)
159 		return UMATCH_HIGHEST;
160 	else
161 		return UMATCH_IFACECLASS_GENERIC;
162 }
163 
164 void
165 uhid_attach(device_t parent, device_t self, void *aux)
166 {
167 	struct uhid_softc *sc = device_private(self);
168 	struct uhidev_attach_arg *uha = aux;
169 	int size, repid;
170 	void *desc;
171 
172 	sc->sc_hdev.sc_dev = self;
173 	selinit(&sc->sc_rsel);
174 	sc->sc_hdev.sc_intr = uhid_intr;
175 	sc->sc_hdev.sc_parent = uha->parent;
176 	sc->sc_hdev.sc_report_id = uha->reportid;
177 	sc->sc_sih = softint_establish(SOFTINT_CLOCK, uhid_softintr, sc);
178 
179 	uhidev_get_report_desc(uha->parent, &desc, &size);
180 	repid = uha->reportid;
181 	sc->sc_isize = hid_report_size(desc, size, hid_input,   repid);
182 	sc->sc_osize = hid_report_size(desc, size, hid_output,  repid);
183 	sc->sc_fsize = hid_report_size(desc, size, hid_feature, repid);
184 
185 	aprint_naive("\n");
186 	aprint_normal(": input=%d, output=%d, feature=%d\n",
187 	       sc->sc_isize, sc->sc_osize, sc->sc_fsize);
188 
189 	mutex_init(&sc->sc_access_lock, MUTEX_DEFAULT, IPL_NONE);
190 	mutex_init(&sc->sc_lock, MUTEX_DEFAULT, IPL_SOFTUSB);
191 	cv_init(&sc->sc_cv, "uhidrea");
192 	cv_init(&sc->sc_detach_cv, "uhiddet");
193 
194 	if (!pmf_device_register(self, NULL, NULL))
195 		aprint_error_dev(self, "couldn't establish power handler\n");
196 
197 	return;
198 }
199 
200 int
201 uhid_activate(device_t self, enum devact act)
202 {
203 	struct uhid_softc *sc = device_private(self);
204 
205 	switch (act) {
206 	case DVACT_DEACTIVATE:
207 		sc->sc_dying = 1;
208 		return 0;
209 	default:
210 		return EOPNOTSUPP;
211 	}
212 }
213 
214 int
215 uhid_detach(device_t self, int flags)
216 {
217 	struct uhid_softc *sc = device_private(self);
218 	int maj, mn;
219 
220 	DPRINTF(("uhid_detach: sc=%p flags=%d\n", sc, flags));
221 
222 	sc->sc_dying = 1;
223 
224 	pmf_device_deregister(self);
225 
226 	mutex_enter(&sc->sc_lock);
227 	if (sc->sc_hdev.sc_state & UHIDEV_OPEN) {
228 		if (--sc->sc_refcnt >= 0) {
229 			/* Wake everyone */
230 			cv_broadcast(&sc->sc_cv);
231 			/* Wait for processes to go away. */
232 			usb_detach_wait(sc->sc_hdev.sc_dev,
233 			    &sc->sc_detach_cv, &sc->sc_lock);
234 		}
235 	}
236 	mutex_exit(&sc->sc_lock);
237 
238 	/* locate the major number */
239 	maj = cdevsw_lookup_major(&uhid_cdevsw);
240 
241 	/* Nuke the vnodes for any open instances (calls close). */
242 	mn = device_unit(self);
243 	vdevgone(maj, mn, mn, VCHR);
244 
245 #if 0
246 	usbd_add_drv_event(USB_EVENT_DRIVER_DETACH,
247 	    sc->sc_hdev.sc_parent->sc_udev, sc->sc_hdev.sc_dev);
248 #endif
249 	cv_destroy(&sc->sc_cv);
250 	cv_destroy(&sc->sc_detach_cv);
251 	mutex_destroy(&sc->sc_lock);
252 	mutex_destroy(&sc->sc_access_lock);
253 	seldestroy(&sc->sc_rsel);
254 	softint_disestablish(sc->sc_sih);
255 
256 	return 0;
257 }
258 
259 void
260 uhid_intr(struct uhidev *addr, void *data, u_int len)
261 {
262 	struct uhid_softc *sc = (struct uhid_softc *)addr;
263 
264 #ifdef UHID_DEBUG
265 	if (uhiddebug > 5) {
266 		uint32_t i;
267 
268 		DPRINTF(("uhid_intr: data ="));
269 		for (i = 0; i < len; i++)
270 			DPRINTF((" %02x", ((u_char *)data)[i]));
271 		DPRINTF(("\n"));
272 	}
273 #endif
274 
275 	mutex_enter(&sc->sc_lock);
276 	(void)b_to_q(data, len, &sc->sc_q);
277 
278 	if (sc->sc_state & UHID_ASLP) {
279 		sc->sc_state &= ~UHID_ASLP;
280 		DPRINTFN(5, ("uhid_intr: waking %p\n", &sc->sc_q));
281 		cv_broadcast(&sc->sc_cv);
282 	}
283 	selnotify(&sc->sc_rsel, 0, 0);
284 	if (sc->sc_async != NULL) {
285 		DPRINTFN(3, ("uhid_intr: sending SIGIO %p\n", sc->sc_async));
286 		softint_schedule(sc->sc_sih);
287 	}
288 	mutex_exit(&sc->sc_lock);
289 }
290 
291 void
292 uhid_softintr(void *cookie)
293 {
294 	struct uhid_softc *sc;
295 
296 	sc = cookie;
297 
298 	mutex_enter(proc_lock);
299 	if (sc->sc_async != NULL)
300 		 psignal(sc->sc_async, SIGIO);
301 	mutex_exit(proc_lock);
302 }
303 
304 int
305 uhidopen(dev_t dev, int flag, int mode, struct lwp *l)
306 {
307 	struct uhid_softc *sc;
308 	int error;
309 
310 	sc = device_lookup_private(&uhid_cd, UHIDUNIT(dev));
311 	if (sc == NULL)
312 		return ENXIO;
313 
314 	DPRINTF(("uhidopen: sc=%p\n", sc));
315 
316 	if (sc->sc_dying)
317 		return ENXIO;
318 
319 	mutex_enter(&sc->sc_access_lock);
320 
321 	/*
322 	 * uhid interrupts aren't enabled yet, so setup sc_q now, as
323 	 * long as they're not already allocated.
324 	 */
325 	if (sc->sc_hdev.sc_state & UHIDEV_OPEN) {
326 		mutex_exit(&sc->sc_access_lock);
327 		return EBUSY;
328 	}
329 	if (clalloc(&sc->sc_q, UHID_BSIZE, 0) == -1) {
330 		mutex_exit(&sc->sc_access_lock);
331 		return ENOMEM;
332 	}
333 
334 	error = uhidev_open(&sc->sc_hdev);
335 	if (error) {
336 		clfree(&sc->sc_q);
337 		mutex_exit(&sc->sc_access_lock);
338 		return error;
339 	}
340 	mutex_exit(&sc->sc_access_lock);
341 
342 	if (sc->sc_osize > 0)
343 		sc->sc_obuf = kmem_alloc(sc->sc_osize, KM_SLEEP);
344 	else
345 		sc->sc_obuf = NULL;
346 	sc->sc_state &= ~UHID_IMMED;
347 
348 	mutex_enter(proc_lock);
349 	sc->sc_async = NULL;
350 	mutex_exit(proc_lock);
351 
352 	return 0;
353 }
354 
355 int
356 uhidclose(dev_t dev, int flag, int mode, struct lwp *l)
357 {
358 	struct uhid_softc *sc;
359 
360 	sc = device_lookup_private(&uhid_cd, UHIDUNIT(dev));
361 
362 	DPRINTF(("uhidclose: sc=%p\n", sc));
363 
364 	mutex_enter(proc_lock);
365 	sc->sc_async = NULL;
366 	mutex_exit(proc_lock);
367 
368 	mutex_enter(&sc->sc_access_lock);
369 
370 	uhidev_stop(&sc->sc_hdev);
371 
372 	clfree(&sc->sc_q);
373 	if (sc->sc_osize > 0)
374 		kmem_free(sc->sc_obuf, sc->sc_osize);
375 
376 	uhidev_close(&sc->sc_hdev);
377 
378 	mutex_exit(&sc->sc_access_lock);
379 
380 	return 0;
381 }
382 
383 int
384 uhid_do_read(struct uhid_softc *sc, struct uio *uio, int flag)
385 {
386 	int error = 0;
387 	int extra;
388 	size_t length;
389 	u_char buffer[UHID_CHUNK];
390 	usbd_status err;
391 
392 	DPRINTFN(1, ("uhidread\n"));
393 	if (sc->sc_state & UHID_IMMED) {
394 		DPRINTFN(1, ("uhidread immed\n"));
395 		extra = sc->sc_hdev.sc_report_id != 0;
396 		err = uhidev_get_report(&sc->sc_hdev, UHID_INPUT_REPORT,
397 					buffer, sc->sc_isize + extra);
398 		if (err)
399 			return EIO;
400 		return uiomove(buffer+extra, sc->sc_isize, uio);
401 	}
402 
403 	mutex_enter(&sc->sc_lock);
404 	while (sc->sc_q.c_cc == 0) {
405 		if (flag & IO_NDELAY) {
406 			mutex_exit(&sc->sc_lock);
407 			return EWOULDBLOCK;
408 		}
409 		sc->sc_state |= UHID_ASLP;
410 		DPRINTFN(5, ("uhidread: sleep on %p\n", &sc->sc_q));
411 		error = cv_wait_sig(&sc->sc_cv, &sc->sc_lock);
412 		DPRINTFN(5, ("uhidread: woke, error=%d\n", error));
413 		if (sc->sc_dying)
414 			error = EIO;
415 		if (error) {
416 			sc->sc_state &= ~UHID_ASLP;
417 			break;
418 		}
419 	}
420 
421 	/* Transfer as many chunks as possible. */
422 	while (sc->sc_q.c_cc > 0 && uio->uio_resid > 0 && !error) {
423 		length = min(sc->sc_q.c_cc, uio->uio_resid);
424 		if (length > sizeof(buffer))
425 			length = sizeof(buffer);
426 
427 		/* Remove a small chunk from the input queue. */
428 		(void) q_to_b(&sc->sc_q, buffer, length);
429 		DPRINTFN(5, ("uhidread: got %lu chars\n", (u_long)length));
430 
431 		/* Copy the data to the user process. */
432 		mutex_exit(&sc->sc_lock);
433 		if ((error = uiomove(buffer, length, uio)) != 0)
434 			return error;
435 		mutex_enter(&sc->sc_lock);
436 	}
437 
438 	mutex_exit(&sc->sc_lock);
439 	return error;
440 }
441 
442 int
443 uhidread(dev_t dev, struct uio *uio, int flag)
444 {
445 	struct uhid_softc *sc;
446 	int error;
447 
448 	sc = device_lookup_private(&uhid_cd, UHIDUNIT(dev));
449 
450 	mutex_enter(&sc->sc_lock);
451 	sc->sc_refcnt++;
452 	mutex_exit(&sc->sc_lock);
453 
454 	mutex_enter(&sc->sc_access_lock);
455 	error = uhid_do_read(sc, uio, flag);
456 	mutex_exit(&sc->sc_access_lock);
457 
458 	mutex_enter(&sc->sc_lock);
459 	if (--sc->sc_refcnt < 0)
460 		usb_detach_broadcast(sc->sc_hdev.sc_dev, &sc->sc_detach_cv);
461 	mutex_exit(&sc->sc_lock);
462 	return error;
463 }
464 
465 int
466 uhid_do_write(struct uhid_softc *sc, struct uio *uio, int flag)
467 {
468 	int error;
469 	int size;
470 	usbd_status err;
471 
472 	DPRINTFN(1, ("uhidwrite\n"));
473 
474 	if (sc->sc_dying)
475 		return EIO;
476 
477 	size = sc->sc_osize;
478 	error = 0;
479 	if (uio->uio_resid != size || size == 0)
480 		return EINVAL;
481 	error = uiomove(sc->sc_obuf, size, uio);
482 	if (!error) {
483 		err = uhidev_set_report(&sc->sc_hdev, UHID_OUTPUT_REPORT,
484 					sc->sc_obuf, size);
485 		if (err)
486 			error = EIO;
487 	}
488 
489 	return error;
490 }
491 
492 int
493 uhidwrite(dev_t dev, struct uio *uio, int flag)
494 {
495 	struct uhid_softc *sc;
496 	int error;
497 
498 	sc = device_lookup_private(&uhid_cd, UHIDUNIT(dev));
499 
500 	mutex_enter(&sc->sc_lock);
501 	sc->sc_refcnt++;
502 	mutex_exit(&sc->sc_lock);
503 
504 	mutex_enter(&sc->sc_access_lock);
505 	error = uhid_do_write(sc, uio, flag);
506 	mutex_exit(&sc->sc_access_lock);
507 
508 	mutex_enter(&sc->sc_lock);
509 	if (--sc->sc_refcnt < 0)
510 		usb_detach_broadcast(sc->sc_hdev.sc_dev, &sc->sc_detach_cv);
511 	mutex_exit(&sc->sc_lock);
512 	return error;
513 }
514 
515 int
516 uhid_do_ioctl(struct uhid_softc *sc, u_long cmd, void *addr,
517     int flag, struct lwp *l)
518 {
519 	struct usb_ctl_report_desc *rd;
520 	struct usb_ctl_report *re;
521 	u_char buffer[UHID_CHUNK];
522 	int size, extra;
523 	usbd_status err;
524 	void *desc;
525 
526 	DPRINTFN(2, ("uhidioctl: cmd=%lx\n", cmd));
527 
528 	if (sc->sc_dying)
529 		return EIO;
530 
531 	switch (cmd) {
532 	case FIONBIO:
533 		/* All handled in the upper FS layer. */
534 		break;
535 
536 	case FIOASYNC:
537 		mutex_enter(proc_lock);
538 		if (*(int *)addr) {
539 			if (sc->sc_async != NULL)
540 				return EBUSY;
541 			sc->sc_async = l->l_proc;
542 			DPRINTF(("uhid_do_ioctl: FIOASYNC %p\n", l->l_proc));
543 		} else
544 			sc->sc_async = NULL;
545 		mutex_exit(proc_lock);
546 		break;
547 
548 	/* XXX this is not the most general solution. */
549 	case TIOCSPGRP:
550 		mutex_enter(proc_lock);
551 		if (sc->sc_async == NULL) {
552 			mutex_exit(proc_lock);
553 			return EINVAL;
554 		}
555 		if (*(int *)addr != sc->sc_async->p_pgid) {
556 			mutex_exit(proc_lock);
557 			return EPERM;
558 		}
559 		mutex_exit(proc_lock);
560 		break;
561 
562 	case FIOSETOWN:
563 		mutex_enter(proc_lock);
564 		if (sc->sc_async == NULL) {
565 			mutex_exit(proc_lock);
566 			return EINVAL;
567 		}
568 		if (-*(int *)addr != sc->sc_async->p_pgid
569 		    && *(int *)addr != sc->sc_async->p_pid) {
570 			mutex_exit(proc_lock);
571 			return EPERM;
572 		}
573 		mutex_exit(proc_lock);
574 		break;
575 
576 	case USB_GET_REPORT_DESC:
577 		uhidev_get_report_desc(sc->sc_hdev.sc_parent, &desc, &size);
578 		rd = (struct usb_ctl_report_desc *)addr;
579 		size = min(size, sizeof(rd->ucrd_data));
580 		rd->ucrd_size = size;
581 		memcpy(rd->ucrd_data, desc, size);
582 		break;
583 
584 	case USB_SET_IMMED:
585 		if (*(int *)addr) {
586 			extra = sc->sc_hdev.sc_report_id != 0;
587 			err = uhidev_get_report(&sc->sc_hdev, UHID_INPUT_REPORT,
588 						buffer, sc->sc_isize + extra);
589 			if (err)
590 				return EOPNOTSUPP;
591 
592 			sc->sc_state |=  UHID_IMMED;
593 		} else
594 			sc->sc_state &= ~UHID_IMMED;
595 		break;
596 
597 	case USB_GET_REPORT:
598 		re = (struct usb_ctl_report *)addr;
599 		switch (re->ucr_report) {
600 		case UHID_INPUT_REPORT:
601 			size = sc->sc_isize;
602 			break;
603 		case UHID_OUTPUT_REPORT:
604 			size = sc->sc_osize;
605 			break;
606 		case UHID_FEATURE_REPORT:
607 			size = sc->sc_fsize;
608 			break;
609 		default:
610 			return EINVAL;
611 		}
612 		extra = sc->sc_hdev.sc_report_id != 0;
613 		err = uhidev_get_report(&sc->sc_hdev, re->ucr_report,
614 		    re->ucr_data, size + extra);
615 		if (extra)
616 			memmove(re->ucr_data, re->ucr_data+1, size);
617 		if (err)
618 			return EIO;
619 		break;
620 
621 	case USB_SET_REPORT:
622 		re = (struct usb_ctl_report *)addr;
623 		switch (re->ucr_report) {
624 		case UHID_INPUT_REPORT:
625 			size = sc->sc_isize;
626 			break;
627 		case UHID_OUTPUT_REPORT:
628 			size = sc->sc_osize;
629 			break;
630 		case UHID_FEATURE_REPORT:
631 			size = sc->sc_fsize;
632 			break;
633 		default:
634 			return EINVAL;
635 		}
636 		err = uhidev_set_report(&sc->sc_hdev, re->ucr_report,
637 		    re->ucr_data, size);
638 		if (err)
639 			return EIO;
640 		break;
641 
642 	case USB_GET_REPORT_ID:
643 		*(int *)addr = sc->sc_hdev.sc_report_id;
644 		break;
645 
646 	case USB_GET_DEVICE_DESC:
647 		*(usb_device_descriptor_t *)addr =
648 			*usbd_get_device_descriptor(sc->sc_hdev.sc_parent->sc_udev);
649 		break;
650 
651 	case USB_GET_DEVICEINFO:
652 		usbd_fill_deviceinfo(sc->sc_hdev.sc_parent->sc_udev,
653 				     (struct usb_device_info *)addr, 0);
654 		break;
655 #ifdef COMPAT_30
656 	case USB_GET_DEVICEINFO_OLD:
657 		usbd_fill_deviceinfo_old(sc->sc_hdev.sc_parent->sc_udev,
658 					 (struct usb_device_info_old *)addr, 0);
659 
660 		break;
661 #endif
662 	case USB_GET_STRING_DESC:
663 	    {
664 		struct usb_string_desc *si = (struct usb_string_desc *)addr;
665 		err = usbd_get_string_desc(sc->sc_hdev.sc_parent->sc_udev,
666 			si->usd_string_index,
667 			si->usd_language_id, &si->usd_desc, &size);
668 		if (err)
669 			return EINVAL;
670 		break;
671 	    }
672 
673 	default:
674 		return EINVAL;
675 	}
676 	return 0;
677 }
678 
679 int
680 uhidioctl(dev_t dev, u_long cmd, void *addr, int flag, struct lwp *l)
681 {
682 	struct uhid_softc *sc;
683 	int error;
684 
685 	sc = device_lookup_private(&uhid_cd, UHIDUNIT(dev));
686 	if (sc == NULL)
687 		return ENXIO;
688 
689 	if (sc->sc_dying)
690 		return EIO;
691 
692 	mutex_enter(&sc->sc_lock);
693 	sc->sc_refcnt++;
694 	mutex_exit(&sc->sc_lock);
695 
696 	mutex_enter(&sc->sc_access_lock);
697 	error = uhid_do_ioctl(sc, cmd, addr, flag, l);
698 	mutex_exit(&sc->sc_access_lock);
699 
700 	mutex_enter(&sc->sc_lock);
701 	if (--sc->sc_refcnt < 0)
702 		usb_detach_broadcast(sc->sc_hdev.sc_dev, &sc->sc_detach_cv);
703 	mutex_exit(&sc->sc_lock);
704 	return error;
705 }
706 
707 int
708 uhidpoll(dev_t dev, int events, struct lwp *l)
709 {
710 	struct uhid_softc *sc;
711 	int revents = 0;
712 
713 	sc = device_lookup_private(&uhid_cd, UHIDUNIT(dev));
714 	if (sc == NULL)
715 		return ENXIO;
716 
717 	if (sc->sc_dying)
718 		return EIO;
719 
720 	mutex_enter(&sc->sc_lock);
721 	if (events & (POLLOUT | POLLWRNORM))
722 		revents |= events & (POLLOUT | POLLWRNORM);
723 	if (events & (POLLIN | POLLRDNORM)) {
724 		if (sc->sc_q.c_cc > 0)
725 			revents |= events & (POLLIN | POLLRDNORM);
726 		else
727 			selrecord(l, &sc->sc_rsel);
728 	}
729 	mutex_exit(&sc->sc_lock);
730 
731 	return revents;
732 }
733 
734 static void
735 filt_uhidrdetach(struct knote *kn)
736 {
737 	struct uhid_softc *sc = kn->kn_hook;
738 
739 	mutex_enter(&sc->sc_lock);
740 	SLIST_REMOVE(&sc->sc_rsel.sel_klist, kn, knote, kn_selnext);
741 	mutex_exit(&sc->sc_lock);
742 }
743 
744 static int
745 filt_uhidread(struct knote *kn, long hint)
746 {
747 	struct uhid_softc *sc = kn->kn_hook;
748 
749 	kn->kn_data = sc->sc_q.c_cc;
750 	return kn->kn_data > 0;
751 }
752 
753 static const struct filterops uhidread_filtops = {
754 	.f_isfd = 1,
755 	.f_attach = NULL,
756 	.f_detach = filt_uhidrdetach,
757 	.f_event = filt_uhidread,
758 };
759 
760 static const struct filterops uhid_seltrue_filtops = {
761 	.f_isfd = 1,
762 	.f_attach = NULL,
763 	.f_detach = filt_uhidrdetach,
764 	.f_event = filt_seltrue,
765 };
766 
767 int
768 uhidkqfilter(dev_t dev, struct knote *kn)
769 {
770 	struct uhid_softc *sc;
771 	struct klist *klist;
772 
773 	sc = device_lookup_private(&uhid_cd, UHIDUNIT(dev));
774 
775 	if (sc->sc_dying)
776 		return ENXIO;
777 
778 	switch (kn->kn_filter) {
779 	case EVFILT_READ:
780 		klist = &sc->sc_rsel.sel_klist;
781 		kn->kn_fop = &uhidread_filtops;
782 		break;
783 
784 	case EVFILT_WRITE:
785 		klist = &sc->sc_rsel.sel_klist;
786 		kn->kn_fop = &uhid_seltrue_filtops;
787 		break;
788 
789 	default:
790 		return EINVAL;
791 	}
792 
793 	kn->kn_hook = sc;
794 
795 	mutex_enter(&sc->sc_lock);
796 	SLIST_INSERT_HEAD(klist, kn, kn_selnext);
797 	mutex_exit(&sc->sc_lock);
798 
799 	return 0;
800 }
801