Home | History | Annotate | Line # | Download | only in usb
      1 /*	$NetBSD: uhid.c,v 1.129 2024/02/04 05:43:06 mrg Exp $	*/
      2 
      3 /*
      4  * Copyright (c) 1998, 2004, 2008, 2012 The NetBSD Foundation, Inc.
      5  * All rights reserved.
      6  *
      7  * This code is derived from software contributed to The NetBSD Foundation
      8  * by Lennart Augustsson (lennart (at) augustsson.net) at
      9  * Carlstedt Research & Technology and Matthew R. Green (mrg (at) eterna23.net).
     10  *
     11  * Redistribution and use in source and binary forms, with or without
     12  * modification, are permitted provided that the following conditions
     13  * are met:
     14  * 1. Redistributions of source code must retain the above copyright
     15  *    notice, this list of conditions and the following disclaimer.
     16  * 2. Redistributions in binary form must reproduce the above copyright
     17  *    notice, this list of conditions and the following disclaimer in the
     18  *    documentation and/or other materials provided with the distribution.
     19  *
     20  * THIS SOFTWARE IS PROVIDED BY THE NETBSD FOUNDATION, INC. AND CONTRIBUTORS
     21  * ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED
     22  * TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
     23  * PURPOSE ARE DISCLAIMED.  IN NO EVENT SHALL THE FOUNDATION OR CONTRIBUTORS
     24  * BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
     25  * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
     26  * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
     27  * INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
     28  * CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
     29  * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
     30  * POSSIBILITY OF SUCH DAMAGE.
     31  */
     32 
     33 /*
     34  * HID spec: http://www.usb.org/developers/devclass_docs/HID1_11.pdf
     35  */
     36 
     37 #include <sys/cdefs.h>
     38 __KERNEL_RCSID(0, "$NetBSD: uhid.c,v 1.129 2024/02/04 05:43:06 mrg Exp $");
     39 
     40 #ifdef _KERNEL_OPT
     41 #include "opt_compat_netbsd.h"
     42 #include "opt_usb.h"
     43 #endif
     44 
     45 #include <sys/param.h>
     46 #include <sys/types.h>
     47 
     48 #include <sys/atomic.h>
     49 #include <sys/compat_stub.h>
     50 #include <sys/conf.h>
     51 #include <sys/device.h>
     52 #include <sys/file.h>
     53 #include <sys/intr.h>
     54 #include <sys/ioctl.h>
     55 #include <sys/kernel.h>
     56 #include <sys/kmem.h>
     57 #include <sys/poll.h>
     58 #include <sys/proc.h>
     59 #include <sys/select.h>
     60 #include <sys/signalvar.h>
     61 #include <sys/systm.h>
     62 #include <sys/tty.h>
     63 #include <sys/vnode.h>
     64 
     65 #include <dev/usb/usb.h>
     66 #include <dev/usb/usbhid.h>
     67 
     68 #include <dev/usb/usbdevs.h>
     69 #include <dev/usb/usbdi.h>
     70 #include <dev/usb/usbdi_util.h>
     71 #include <dev/usb/usb_quirks.h>
     72 #include <dev/hid/hid.h>
     73 
     74 #include <dev/usb/uhidev.h>
     75 
     76 #include "ioconf.h"
     77 
     78 #ifdef UHID_DEBUG
     79 #define DPRINTF(x)	if (uhiddebug) printf x
     80 #define DPRINTFN(n,x)	if (uhiddebug>(n)) printf x
     81 int	uhiddebug = 0;
     82 #else
     83 #define DPRINTF(x)
     84 #define DPRINTFN(n,x)
     85 #endif
     86 
     87 struct uhid_softc {
     88 	device_t sc_dev;
     89 	struct uhidev *sc_hdev;
     90 	struct usbd_device *sc_udev;
     91 	uint8_t sc_report_id;
     92 
     93 	kmutex_t sc_lock;
     94 	kcondvar_t sc_cv;
     95 
     96 	int sc_isize;
     97 	int sc_osize;
     98 	int sc_fsize;
     99 
    100 	u_char *sc_obuf;
    101 
    102 	struct clist sc_q;	/* protected by sc_lock */
    103 	struct selinfo sc_rsel;
    104 	proc_t *sc_async;	/* process that wants SIGIO */
    105 	void *sc_sih;
    106 	volatile uint32_t sc_state;	/* driver state */
    107 #define UHID_IMMED	0x02	/* return read data immediately */
    108 
    109 	int sc_raw;
    110 	enum {
    111 		UHID_CLOSED,
    112 		UHID_OPENING,
    113 		UHID_OPEN,
    114 	} sc_open;
    115 	bool sc_closing;
    116 };
    117 
    118 #define	UHIDUNIT(dev)	(minor(dev))
    119 #define	UHID_CHUNK	128	/* chunk size for read */
    120 #define	UHID_BSIZE	1020	/* buffer size */
    121 
    122 static dev_type_open(uhidopen);
    123 static dev_type_cancel(uhidcancel);
    124 static dev_type_close(uhidclose);
    125 static dev_type_read(uhidread);
    126 static dev_type_write(uhidwrite);
    127 static dev_type_ioctl(uhidioctl);
    128 static dev_type_poll(uhidpoll);
    129 static dev_type_kqfilter(uhidkqfilter);
    130 
    131 const struct cdevsw uhid_cdevsw = {
    132 	.d_open = uhidopen,
    133 	.d_cancel = uhidcancel,
    134 	.d_close = uhidclose,
    135 	.d_read = uhidread,
    136 	.d_write = uhidwrite,
    137 	.d_ioctl = uhidioctl,
    138 	.d_stop = nostop,
    139 	.d_tty = notty,
    140 	.d_poll = uhidpoll,
    141 	.d_mmap = nommap,
    142 	.d_kqfilter = uhidkqfilter,
    143 	.d_discard = nodiscard,
    144 	.d_cfdriver = &uhid_cd,
    145 	.d_devtounit = dev_minor_unit,
    146 	.d_flag = D_OTHER
    147 };
    148 
    149 static void uhid_intr(void *, void *, u_int);
    150 
    151 static int	uhid_match(device_t, cfdata_t, void *);
    152 static void	uhid_attach(device_t, device_t, void *);
    153 static int	uhid_detach(device_t, int);
    154 
    155 CFATTACH_DECL_NEW(uhid, sizeof(struct uhid_softc), uhid_match, uhid_attach,
    156     uhid_detach, NULL);
    157 
    158 static int
    159 uhid_match(device_t parent, cfdata_t match, void *aux)
    160 {
    161 #ifdef UHID_DEBUG
    162 	struct uhidev_attach_arg *uha = aux;
    163 #endif
    164 
    165 	DPRINTF(("uhid_match: report=%d\n", uha->reportid));
    166 
    167 	if (match->cf_flags & 1)
    168 		return UMATCH_HIGHEST;
    169 	else
    170 		return UMATCH_IFACECLASS_GENERIC;
    171 }
    172 
    173 static void
    174 uhid_attach(device_t parent, device_t self, void *aux)
    175 {
    176 	struct uhid_softc *sc = device_private(self);
    177 	struct uhidev_attach_arg *uha = aux;
    178 	int size, repid;
    179 	void *desc;
    180 
    181 	sc->sc_dev = self;
    182 	sc->sc_hdev = uha->parent;
    183 	sc->sc_udev = uha->uiaa->uiaa_device;
    184 	sc->sc_report_id = uha->reportid;
    185 
    186 	selinit(&sc->sc_rsel);
    187 
    188 	uhidev_get_report_desc(uha->parent, &desc, &size);
    189 	repid = uha->reportid;
    190 	sc->sc_isize = hid_report_size(desc, size, hid_input,   repid);
    191 	sc->sc_osize = hid_report_size(desc, size, hid_output,  repid);
    192 	sc->sc_fsize = hid_report_size(desc, size, hid_feature, repid);
    193 	sc->sc_raw =  hid_is_collection(desc, size, uha->reportid,
    194 	    HID_USAGE2(HUP_FIDO, HUF_U2FHID));
    195 
    196 	aprint_naive("\n");
    197 	aprint_normal(": input=%d, output=%d, feature=%d\n",
    198 	       sc->sc_isize, sc->sc_osize, sc->sc_fsize);
    199 
    200 	mutex_init(&sc->sc_lock, MUTEX_DEFAULT, IPL_SOFTUSB);
    201 	cv_init(&sc->sc_cv, "uhidrea");
    202 
    203 	if (!pmf_device_register(self, NULL, NULL))
    204 		aprint_error_dev(self, "couldn't establish power handler\n");
    205 
    206 	return;
    207 }
    208 
    209 static int
    210 uhid_detach(device_t self, int flags)
    211 {
    212 	struct uhid_softc *sc = device_private(self);
    213 	int maj, mn;
    214 
    215 	DPRINTF(("uhid_detach: sc=%p flags=%d\n", sc, flags));
    216 
    217 	pmf_device_deregister(self);
    218 
    219 	/* locate the major number */
    220 	maj = cdevsw_lookup_major(&uhid_cdevsw);
    221 
    222 	/* Nuke the vnodes for any open instances (calls close). */
    223 	mn = device_unit(self);
    224 	vdevgone(maj, mn, mn, VCHR);
    225 
    226 	KASSERTMSG(sc->sc_open == UHID_CLOSED, "open=%d", (int)sc->sc_open);
    227 
    228 	cv_destroy(&sc->sc_cv);
    229 	mutex_destroy(&sc->sc_lock);
    230 	seldestroy(&sc->sc_rsel);
    231 
    232 	return 0;
    233 }
    234 
    235 static void
    236 uhid_intr(void *cookie, void *data, u_int len)
    237 {
    238 	struct uhid_softc *sc = cookie;
    239 
    240 #ifdef UHID_DEBUG
    241 	if (uhiddebug > 5) {
    242 		uint32_t i;
    243 
    244 		DPRINTF(("uhid_intr: data ="));
    245 		for (i = 0; i < len; i++)
    246 			DPRINTF((" %02x", ((u_char *)data)[i]));
    247 		DPRINTF(("\n"));
    248 	}
    249 #endif
    250 
    251 	mutex_enter(&sc->sc_lock);
    252 	(void)b_to_q(data, len, &sc->sc_q);
    253 
    254 	DPRINTFN(5, ("uhid_intr: waking %p\n", &sc->sc_q));
    255 	cv_broadcast(&sc->sc_cv);
    256 	selnotify(&sc->sc_rsel, 0, NOTE_SUBMIT);
    257 	if (atomic_load_relaxed(&sc->sc_async) != NULL) {
    258 		mutex_enter(&proc_lock);
    259 		if (sc->sc_async != NULL) {
    260 			DPRINTFN(3, ("uhid_intr: sending SIGIO to %jd\n",
    261 				(intmax_t)sc->sc_async->p_pid));
    262 			psignal(sc->sc_async, SIGIO);
    263 		}
    264 		mutex_exit(&proc_lock);
    265 	}
    266 	mutex_exit(&sc->sc_lock);
    267 }
    268 
    269 static int
    270 uhidopen(dev_t dev, int flag, int mode, struct lwp *l)
    271 {
    272 	struct uhid_softc *sc = device_lookup_private(&uhid_cd, UHIDUNIT(dev));
    273 	int error;
    274 
    275 	DPRINTF(("uhidopen: sc=%p\n", sc));
    276 	if (sc == NULL)
    277 		return ENXIO;
    278 
    279 	/*
    280 	 * Try to open.  If closing in progress, give up.  If already
    281 	 * open (or opening), fail -- opens are exclusive.
    282 	 */
    283 	mutex_enter(&sc->sc_lock);
    284 	if (sc->sc_open != UHID_CLOSED || sc->sc_closing) {
    285 		mutex_exit(&sc->sc_lock);
    286 		return EBUSY;
    287 	}
    288 	sc->sc_open = UHID_OPENING;
    289 	atomic_store_relaxed(&sc->sc_state, 0);
    290 	mutex_exit(&sc->sc_lock);
    291 
    292 	/* uhid interrupts aren't enabled yet, so setup sc_q now */
    293 	if (clalloc(&sc->sc_q, UHID_BSIZE, 0) == -1) {
    294 		error = ENOMEM;
    295 		goto fail0;
    296 	}
    297 
    298 	/* Allocate an output buffer if needed.  */
    299 	if (sc->sc_osize > 0)
    300 		sc->sc_obuf = kmem_alloc(sc->sc_osize, KM_SLEEP);
    301 	else
    302 		sc->sc_obuf = NULL;
    303 
    304 	/* Paranoia: reset SIGIO before enabling interrupts.  */
    305 	mutex_enter(&proc_lock);
    306 	atomic_store_relaxed(&sc->sc_async, NULL);
    307 	mutex_exit(&proc_lock);
    308 
    309 	/* Open the uhidev -- after this point we can get interrupts.  */
    310 	error = uhidev_open(sc->sc_hdev, &uhid_intr, sc);
    311 	if (error)
    312 		goto fail1;
    313 
    314 	/* We are open for business.  */
    315 	mutex_enter(&sc->sc_lock);
    316 	sc->sc_open = UHID_OPEN;
    317 	mutex_exit(&sc->sc_lock);
    318 
    319 	return 0;
    320 
    321 fail1:	selnotify(&sc->sc_rsel, POLLHUP, 0);
    322 	mutex_enter(&proc_lock);
    323 	atomic_store_relaxed(&sc->sc_async, NULL);
    324 	mutex_exit(&proc_lock);
    325 	if (sc->sc_osize > 0) {
    326 		kmem_free(sc->sc_obuf, sc->sc_osize);
    327 		sc->sc_obuf = NULL;
    328 	}
    329 	clfree(&sc->sc_q);
    330 fail0:	mutex_enter(&sc->sc_lock);
    331 	KASSERT(sc->sc_open == UHID_OPENING);
    332 	sc->sc_open = UHID_CLOSED;
    333 	atomic_store_relaxed(&sc->sc_state, 0);
    334 	mutex_exit(&sc->sc_lock);
    335 	return error;
    336 }
    337 
    338 static int
    339 uhidcancel(dev_t dev, int flag, int mode, struct lwp *l)
    340 {
    341 	struct uhid_softc *sc = device_lookup_private(&uhid_cd, UHIDUNIT(dev));
    342 
    343 	DPRINTF(("uhidcancel: sc=%p\n", sc));
    344 	if (sc == NULL)
    345 		return 0;
    346 
    347 	/*
    348 	 * Mark it closing, wake any waiters, and suspend output.
    349 	 * After this point, no new xfers can be submitted.
    350 	 */
    351 	mutex_enter(&sc->sc_lock);
    352 	sc->sc_closing = true;
    353 	cv_broadcast(&sc->sc_cv);
    354 	mutex_exit(&sc->sc_lock);
    355 
    356 	uhidev_stop(sc->sc_hdev);
    357 
    358 	return 0;
    359 }
    360 
    361 static int
    362 uhidclose(dev_t dev, int flag, int mode, struct lwp *l)
    363 {
    364 	struct uhid_softc *sc = device_lookup_private(&uhid_cd, UHIDUNIT(dev));
    365 
    366 	DPRINTF(("uhidclose: sc=%p\n", sc));
    367 	if (sc == NULL)
    368 		return 0;
    369 
    370 	mutex_enter(&sc->sc_lock);
    371 	KASSERT(sc->sc_closing);
    372 	KASSERTMSG(sc->sc_open == UHID_OPEN || sc->sc_open == UHID_CLOSED,
    373 	    "sc_open=%d", sc->sc_open);
    374 	if (sc->sc_open == UHID_CLOSED)
    375 		goto out;
    376 
    377 	/* Release the lock while we free things.  */
    378 	mutex_exit(&sc->sc_lock);
    379 
    380 	/* Prevent further interrupts.  */
    381 	uhidev_close(sc->sc_hdev);
    382 
    383 	/* Hang up all select/poll.  */
    384 	selnotify(&sc->sc_rsel, POLLHUP, 0);
    385 
    386 	/* Reset SIGIO.  */
    387 	mutex_enter(&proc_lock);
    388 	atomic_store_relaxed(&sc->sc_async, NULL);
    389 	mutex_exit(&proc_lock);
    390 
    391 	/* Free the buffer and queue.  */
    392 	if (sc->sc_osize > 0) {
    393 		kmem_free(sc->sc_obuf, sc->sc_osize);
    394 		sc->sc_obuf = NULL;
    395 	}
    396 	clfree(&sc->sc_q);
    397 
    398 	mutex_enter(&sc->sc_lock);
    399 
    400 	/* All set.  We are now closed.  */
    401 	sc->sc_open = UHID_CLOSED;
    402 out:	KASSERT(sc->sc_open == UHID_CLOSED);
    403 	sc->sc_closing = false;
    404 	atomic_store_relaxed(&sc->sc_state, 0);
    405 	mutex_exit(&sc->sc_lock);
    406 
    407 	return 0;
    408 }
    409 
    410 static int
    411 uhidread(dev_t dev, struct uio *uio, int flag)
    412 {
    413 	struct uhid_softc *sc = device_lookup_private(&uhid_cd, UHIDUNIT(dev));
    414 	int error = 0;
    415 	int extra;
    416 	size_t length;
    417 	u_char buffer[UHID_CHUNK];
    418 	usbd_status err;
    419 
    420 	DPRINTFN(1, ("uhidread\n"));
    421 	if (atomic_load_relaxed(&sc->sc_state) & UHID_IMMED) {
    422 		DPRINTFN(1, ("uhidread immed\n"));
    423 		extra = sc->sc_report_id != 0;
    424 		if (sc->sc_isize + extra > sizeof(buffer))
    425 			return ENOBUFS;
    426 		err = uhidev_get_report(sc->sc_hdev, UHID_INPUT_REPORT,
    427 					buffer, sc->sc_isize + extra);
    428 		if (err)
    429 			return EIO;
    430 		return uiomove(buffer+extra, sc->sc_isize, uio);
    431 	}
    432 
    433 	mutex_enter(&sc->sc_lock);
    434 	while (sc->sc_q.c_cc == 0) {
    435 		if (flag & IO_NDELAY) {
    436 			mutex_exit(&sc->sc_lock);
    437 			return EWOULDBLOCK;
    438 		}
    439 		if (sc->sc_closing) {
    440 			mutex_exit(&sc->sc_lock);
    441 			return EIO;
    442 		}
    443 		DPRINTFN(5, ("uhidread: sleep on %p\n", &sc->sc_q));
    444 		error = cv_wait_sig(&sc->sc_cv, &sc->sc_lock);
    445 		DPRINTFN(5, ("uhidread: woke, error=%d\n", error));
    446 		if (error) {
    447 			break;
    448 		}
    449 	}
    450 
    451 	/* Transfer as many chunks as possible. */
    452 	while (sc->sc_q.c_cc > 0 && uio->uio_resid > 0 && !error) {
    453 		length = uimin(sc->sc_q.c_cc, uio->uio_resid);
    454 		if (length > sizeof(buffer))
    455 			length = sizeof(buffer);
    456 
    457 		/* Remove a small chunk from the input queue. */
    458 		(void) q_to_b(&sc->sc_q, buffer, length);
    459 		DPRINTFN(5, ("uhidread: got %lu chars\n", (u_long)length));
    460 
    461 		/* Copy the data to the user process. */
    462 		mutex_exit(&sc->sc_lock);
    463 		if ((error = uiomove(buffer, length, uio)) != 0)
    464 			return error;
    465 		mutex_enter(&sc->sc_lock);
    466 	}
    467 
    468 	mutex_exit(&sc->sc_lock);
    469 	return error;
    470 }
    471 
    472 static int
    473 uhidwrite(dev_t dev, struct uio *uio, int flag)
    474 {
    475 	struct uhid_softc *sc = device_lookup_private(&uhid_cd, UHIDUNIT(dev));
    476 	int error;
    477 	int size;
    478 	usbd_status err;
    479 
    480 	DPRINTFN(1, ("uhidwrite\n"));
    481 
    482 	size = sc->sc_osize;
    483 	if (uio->uio_resid != size || size == 0)
    484 		return EINVAL;
    485 	error = uiomove(sc->sc_obuf, size, uio);
    486 #ifdef UHID_DEBUG
    487 	if (uhiddebug > 5) {
    488 		uint32_t i;
    489 
    490 		DPRINTF(("%s: outdata[%d] =", device_xname(sc->sc_dev),
    491 		    error));
    492 		for (i = 0; i < size; i++)
    493 			DPRINTF((" %02x", sc->sc_obuf[i]));
    494 		DPRINTF(("\n"));
    495 	}
    496 #endif
    497 	if (!error) {
    498 		if (sc->sc_raw)
    499 			err = uhidev_write(sc->sc_hdev, sc->sc_obuf, size);
    500 		else
    501 			err = uhidev_set_report(sc->sc_hdev,
    502 			    UHID_OUTPUT_REPORT, sc->sc_obuf, size);
    503 		if (err) {
    504 			DPRINTF(("%s: err = %d\n",
    505 			    device_xname(sc->sc_dev), err));
    506 			error = EIO;
    507 		}
    508 	}
    509 
    510 	return error;
    511 }
    512 
    513 static int
    514 uhidioctl(dev_t dev, u_long cmd, void *addr, int flag, struct lwp *l)
    515 {
    516 	struct uhid_softc *sc = device_lookup_private(&uhid_cd, UHIDUNIT(dev));
    517 	struct usb_ctl_report_desc *rd;
    518 	struct usb_ctl_report *re;
    519 	u_char buffer[UHID_CHUNK];
    520 	int size, extra;
    521 	usbd_status err;
    522 	void *desc;
    523 
    524 	DPRINTFN(2, ("uhidioctl: cmd=%lx\n", cmd));
    525 
    526 	switch (cmd) {
    527 	case FIONBIO:
    528 		/* All handled in the upper FS layer. */
    529 		break;
    530 
    531 	case FIOASYNC:
    532 		mutex_enter(&proc_lock);
    533 		if (*(int *)addr) {
    534 			if (sc->sc_async != NULL) {
    535 				mutex_exit(&proc_lock);
    536 				return EBUSY;
    537 			}
    538 			atomic_store_relaxed(&sc->sc_async, l->l_proc);
    539 			DPRINTF(("uhid_do_ioctl: FIOASYNC %p\n", l->l_proc));
    540 		} else
    541 			atomic_store_relaxed(&sc->sc_async, NULL);
    542 		mutex_exit(&proc_lock);
    543 		break;
    544 
    545 	/* XXX this is not the most general solution. */
    546 	case TIOCSPGRP:
    547 		mutex_enter(&proc_lock);
    548 		if (sc->sc_async == NULL) {
    549 			mutex_exit(&proc_lock);
    550 			return EINVAL;
    551 		}
    552 		if (*(int *)addr != sc->sc_async->p_pgid) {
    553 			mutex_exit(&proc_lock);
    554 			return EPERM;
    555 		}
    556 		mutex_exit(&proc_lock);
    557 		break;
    558 
    559 	case FIOSETOWN:
    560 		mutex_enter(&proc_lock);
    561 		if (sc->sc_async == NULL) {
    562 			mutex_exit(&proc_lock);
    563 			return EINVAL;
    564 		}
    565 		if (-*(int *)addr != sc->sc_async->p_pgid
    566 		    && *(int *)addr != sc->sc_async->p_pid) {
    567 			mutex_exit(&proc_lock);
    568 			return EPERM;
    569 		}
    570 		mutex_exit(&proc_lock);
    571 		break;
    572 
    573 	case USB_HID_GET_RAW:
    574 		*(int *)addr = sc->sc_raw;
    575 		break;
    576 
    577 	case USB_HID_SET_RAW:
    578 		sc->sc_raw = *(int *)addr;
    579 		break;
    580 
    581 	case USB_GET_REPORT_DESC:
    582 		uhidev_get_report_desc(sc->sc_hdev, &desc, &size);
    583 		rd = (struct usb_ctl_report_desc *)addr;
    584 		size = uimin(size, sizeof(rd->ucrd_data));
    585 		rd->ucrd_size = size;
    586 		memcpy(rd->ucrd_data, desc, size);
    587 		break;
    588 
    589 	case USB_SET_IMMED:
    590 		if (*(int *)addr) {
    591 			extra = sc->sc_report_id != 0;
    592 			if (sc->sc_isize + extra > sizeof(buffer))
    593 				return ENOBUFS;
    594 			err = uhidev_get_report(sc->sc_hdev, UHID_INPUT_REPORT,
    595 						buffer, sc->sc_isize + extra);
    596 			if (err)
    597 				return EOPNOTSUPP;
    598 
    599 			atomic_or_32(&sc->sc_state, UHID_IMMED);
    600 		} else
    601 			atomic_and_32(&sc->sc_state, ~UHID_IMMED);
    602 		break;
    603 
    604 	case USB_GET_REPORT:
    605 		re = (struct usb_ctl_report *)addr;
    606 		switch (re->ucr_report) {
    607 		case UHID_INPUT_REPORT:
    608 			size = sc->sc_isize;
    609 			break;
    610 		case UHID_OUTPUT_REPORT:
    611 			size = sc->sc_osize;
    612 			break;
    613 		case UHID_FEATURE_REPORT:
    614 			size = sc->sc_fsize;
    615 			break;
    616 		default:
    617 			return EINVAL;
    618 		}
    619 		extra = sc->sc_report_id != 0;
    620 		if (size + extra > sizeof(re->ucr_data))
    621 			return ENOBUFS;
    622 		err = uhidev_get_report(sc->sc_hdev, re->ucr_report,
    623 		    re->ucr_data, size + extra);
    624 		if (extra)
    625 			memmove(re->ucr_data, re->ucr_data+1, size);
    626 		if (err)
    627 			return EIO;
    628 		break;
    629 
    630 	case USB_SET_REPORT:
    631 		re = (struct usb_ctl_report *)addr;
    632 		switch (re->ucr_report) {
    633 		case UHID_INPUT_REPORT:
    634 			size = sc->sc_isize;
    635 			break;
    636 		case UHID_OUTPUT_REPORT:
    637 			size = sc->sc_osize;
    638 			break;
    639 		case UHID_FEATURE_REPORT:
    640 			size = sc->sc_fsize;
    641 			break;
    642 		default:
    643 			return EINVAL;
    644 		}
    645 		if (size > sizeof(re->ucr_data))
    646 			return ENOBUFS;
    647 		err = uhidev_set_report(sc->sc_hdev, re->ucr_report,
    648 		    re->ucr_data, size);
    649 		if (err)
    650 			return EIO;
    651 		break;
    652 
    653 	case USB_GET_REPORT_ID:
    654 		*(int *)addr = sc->sc_report_id;
    655 		break;
    656 
    657 	case USB_GET_DEVICE_DESC:
    658 		*(usb_device_descriptor_t *)addr =
    659 			*usbd_get_device_descriptor(sc->sc_udev);
    660 		break;
    661 
    662 	case USB_GET_DEVICEINFO:
    663 		usbd_fill_deviceinfo(sc->sc_udev,
    664 				     (struct usb_device_info *)addr, 0);
    665 		break;
    666 	case USB_GET_DEVICEINFO_30:
    667 		MODULE_HOOK_CALL(usb_subr_fill_30_hook,
    668                     (sc->sc_udev,
    669 		      (struct usb_device_info30 *)addr, 0,
    670                       usbd_devinfo_vp, usbd_printBCD),
    671                     enosys(), err);
    672 		if (err == 0)
    673 			return 0;
    674 		break;
    675 	case USB_GET_STRING_DESC:
    676 	    {
    677 		struct usb_string_desc *si = (struct usb_string_desc *)addr;
    678 		err = usbd_get_string_desc(sc->sc_udev,
    679 			si->usd_string_index,
    680 			si->usd_language_id, &si->usd_desc, &size);
    681 		if (err)
    682 			return EINVAL;
    683 		break;
    684 	    }
    685 
    686 	default:
    687 		return EINVAL;
    688 	}
    689 	return 0;
    690 }
    691 
    692 static int
    693 uhidpoll(dev_t dev, int events, struct lwp *l)
    694 {
    695 	struct uhid_softc *sc = device_lookup_private(&uhid_cd, UHIDUNIT(dev));
    696 	int revents = 0;
    697 
    698 	mutex_enter(&sc->sc_lock);
    699 	if (events & (POLLOUT | POLLWRNORM))
    700 		revents |= events & (POLLOUT | POLLWRNORM);
    701 	if (events & (POLLIN | POLLRDNORM)) {
    702 		if (sc->sc_q.c_cc > 0)
    703 			revents |= events & (POLLIN | POLLRDNORM);
    704 		else
    705 			selrecord(l, &sc->sc_rsel);
    706 	}
    707 	mutex_exit(&sc->sc_lock);
    708 
    709 	return revents;
    710 }
    711 
    712 static void
    713 filt_uhidrdetach(struct knote *kn)
    714 {
    715 	struct uhid_softc *sc = kn->kn_hook;
    716 
    717 	mutex_enter(&sc->sc_lock);
    718 	selremove_knote(&sc->sc_rsel, kn);
    719 	mutex_exit(&sc->sc_lock);
    720 }
    721 
    722 static int
    723 filt_uhidread(struct knote *kn, long hint)
    724 {
    725 	struct uhid_softc *sc = kn->kn_hook;
    726 
    727 	if (hint == NOTE_SUBMIT)
    728 		KASSERT(mutex_owned(&sc->sc_lock));
    729 	else
    730 		mutex_enter(&sc->sc_lock);
    731 
    732 	kn->kn_data = sc->sc_q.c_cc;
    733 
    734 	if (hint == NOTE_SUBMIT)
    735 		KASSERT(mutex_owned(&sc->sc_lock));
    736 	else
    737 		mutex_exit(&sc->sc_lock);
    738 
    739 	return kn->kn_data > 0;
    740 }
    741 
    742 static const struct filterops uhidread_filtops = {
    743 	.f_flags = FILTEROP_ISFD,
    744 	.f_attach = NULL,
    745 	.f_detach = filt_uhidrdetach,
    746 	.f_event = filt_uhidread,
    747 };
    748 
    749 static int
    750 uhidkqfilter(dev_t dev, struct knote *kn)
    751 {
    752 	struct uhid_softc *sc = device_lookup_private(&uhid_cd, UHIDUNIT(dev));
    753 
    754 	switch (kn->kn_filter) {
    755 	case EVFILT_READ:
    756 		kn->kn_fop = &uhidread_filtops;
    757 		kn->kn_hook = sc;
    758 		mutex_enter(&sc->sc_lock);
    759 		selrecord_knote(&sc->sc_rsel, kn);
    760 		mutex_exit(&sc->sc_lock);
    761 		return 0;
    762 
    763 	case EVFILT_WRITE:
    764 		kn->kn_fop = &seltrue_filtops;
    765 		return 0;
    766 
    767 	default:
    768 		return EINVAL;
    769 	}
    770 }
    771