uhid.c revision 1.99.6.1 1 /* $NetBSD: uhid.c,v 1.99.6.1 2020/01/02 09:43:56 martin Exp $ */
2
3 /*
4 * Copyright (c) 1998, 2004, 2008, 2012 The NetBSD Foundation, Inc.
5 * All rights reserved.
6 *
7 * This code is derived from software contributed to The NetBSD Foundation
8 * by Lennart Augustsson (lennart (at) augustsson.net) at
9 * Carlstedt Research & Technology and Matthew R. Green (mrg (at) eterna.com.au).
10 *
11 * Redistribution and use in source and binary forms, with or without
12 * modification, are permitted provided that the following conditions
13 * are met:
14 * 1. Redistributions of source code must retain the above copyright
15 * notice, this list of conditions and the following disclaimer.
16 * 2. Redistributions in binary form must reproduce the above copyright
17 * notice, this list of conditions and the following disclaimer in the
18 * documentation and/or other materials provided with the distribution.
19 *
20 * THIS SOFTWARE IS PROVIDED BY THE NETBSD FOUNDATION, INC. AND CONTRIBUTORS
21 * ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED
22 * TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
23 * PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE FOUNDATION OR CONTRIBUTORS
24 * BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
25 * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
26 * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
27 * INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
28 * CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
29 * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
30 * POSSIBILITY OF SUCH DAMAGE.
31 */
32
33 /*
34 * HID spec: http://www.usb.org/developers/devclass_docs/HID1_11.pdf
35 */
36
37 #include <sys/cdefs.h>
38 __KERNEL_RCSID(0, "$NetBSD: uhid.c,v 1.99.6.1 2020/01/02 09:43:56 martin Exp $");
39
40 #ifdef _KERNEL_OPT
41 #include "opt_compat_netbsd.h"
42 #include "opt_usb.h"
43 #endif
44
45 #include <sys/param.h>
46 #include <sys/systm.h>
47 #include <sys/kernel.h>
48 #include <sys/kmem.h>
49 #include <sys/signalvar.h>
50 #include <sys/device.h>
51 #include <sys/ioctl.h>
52 #include <sys/conf.h>
53 #include <sys/tty.h>
54 #include <sys/file.h>
55 #include <sys/select.h>
56 #include <sys/proc.h>
57 #include <sys/vnode.h>
58 #include <sys/poll.h>
59 #include <sys/intr.h>
60
61 #include <dev/usb/usb.h>
62 #include <dev/usb/usbhid.h>
63
64 #include <dev/usb/usbdevs.h>
65 #include <dev/usb/usbdi.h>
66 #include <dev/usb/usbdi_util.h>
67 #include <dev/usb/hid.h>
68 #include <dev/usb/usb_quirks.h>
69
70 #include <dev/usb/uhidev.h>
71
72 #ifdef UHID_DEBUG
73 #define DPRINTF(x) if (uhiddebug) printf x
74 #define DPRINTFN(n,x) if (uhiddebug>(n)) printf x
75 int uhiddebug = 0;
76 #else
77 #define DPRINTF(x)
78 #define DPRINTFN(n,x)
79 #endif
80
81 struct uhid_softc {
82 struct uhidev sc_hdev;
83
84 kmutex_t sc_access_lock; /* serialises syscall accesses */
85 kmutex_t sc_lock; /* protects refcnt, others */
86 kcondvar_t sc_cv;
87 kcondvar_t sc_detach_cv;
88
89 int sc_isize;
90 int sc_osize;
91 int sc_fsize;
92
93 u_char *sc_obuf;
94
95 struct clist sc_q; /* protected by sc_lock */
96 struct selinfo sc_rsel;
97 proc_t *sc_async; /* process that wants SIGIO */
98 void *sc_sih;
99 u_char sc_state; /* driver state */
100 #define UHID_ASLP 0x01 /* waiting for device data */
101 #define UHID_IMMED 0x02 /* return read data immediately */
102
103 int sc_refcnt;
104 u_char sc_dying;
105 };
106
107 #define UHIDUNIT(dev) (minor(dev))
108 #define UHID_CHUNK 128 /* chunk size for read */
109 #define UHID_BSIZE 1020 /* buffer size */
110
111 dev_type_open(uhidopen);
112 dev_type_close(uhidclose);
113 dev_type_read(uhidread);
114 dev_type_write(uhidwrite);
115 dev_type_ioctl(uhidioctl);
116 dev_type_poll(uhidpoll);
117 dev_type_kqfilter(uhidkqfilter);
118
119 const struct cdevsw uhid_cdevsw = {
120 .d_open = uhidopen,
121 .d_close = uhidclose,
122 .d_read = uhidread,
123 .d_write = uhidwrite,
124 .d_ioctl = uhidioctl,
125 .d_stop = nostop,
126 .d_tty = notty,
127 .d_poll = uhidpoll,
128 .d_mmap = nommap,
129 .d_kqfilter = uhidkqfilter,
130 .d_discard = nodiscard,
131 .d_flag = D_OTHER
132 };
133
134 Static void uhid_intr(struct uhidev *, void *, u_int);
135 Static void uhid_softintr(void *);
136
137 Static int uhid_do_read(struct uhid_softc *, struct uio *, int);
138 Static int uhid_do_write(struct uhid_softc *, struct uio *, int);
139 Static int uhid_do_ioctl(struct uhid_softc*, u_long, void *, int, struct lwp *);
140
141 int uhid_match(device_t, cfdata_t, void *);
142 void uhid_attach(device_t, device_t, void *);
143 int uhid_detach(device_t, int);
144 int uhid_activate(device_t, enum devact);
145 extern struct cfdriver uhid_cd;
146 CFATTACH_DECL_NEW(uhid, sizeof(struct uhid_softc), uhid_match, uhid_attach,
147 uhid_detach, uhid_activate);
148
149 int
150 uhid_match(device_t parent, cfdata_t match, void *aux)
151 {
152 #ifdef UHID_DEBUG
153 struct uhidev_attach_arg *uha = aux;
154 #endif
155
156 DPRINTF(("uhid_match: report=%d\n", uha->reportid));
157
158 if (match->cf_flags & 1)
159 return UMATCH_HIGHEST;
160 else
161 return UMATCH_IFACECLASS_GENERIC;
162 }
163
164 void
165 uhid_attach(device_t parent, device_t self, void *aux)
166 {
167 struct uhid_softc *sc = device_private(self);
168 struct uhidev_attach_arg *uha = aux;
169 int size, repid;
170 void *desc;
171
172 sc->sc_hdev.sc_dev = self;
173 selinit(&sc->sc_rsel);
174 sc->sc_hdev.sc_intr = uhid_intr;
175 sc->sc_hdev.sc_parent = uha->parent;
176 sc->sc_hdev.sc_report_id = uha->reportid;
177 sc->sc_sih = softint_establish(SOFTINT_CLOCK, uhid_softintr, sc);
178
179 uhidev_get_report_desc(uha->parent, &desc, &size);
180 repid = uha->reportid;
181 sc->sc_isize = hid_report_size(desc, size, hid_input, repid);
182 sc->sc_osize = hid_report_size(desc, size, hid_output, repid);
183 sc->sc_fsize = hid_report_size(desc, size, hid_feature, repid);
184
185 aprint_naive("\n");
186 aprint_normal(": input=%d, output=%d, feature=%d\n",
187 sc->sc_isize, sc->sc_osize, sc->sc_fsize);
188
189 mutex_init(&sc->sc_access_lock, MUTEX_DEFAULT, IPL_NONE);
190 mutex_init(&sc->sc_lock, MUTEX_DEFAULT, IPL_SOFTUSB);
191 cv_init(&sc->sc_cv, "uhidrea");
192 cv_init(&sc->sc_detach_cv, "uhiddet");
193
194 if (!pmf_device_register(self, NULL, NULL))
195 aprint_error_dev(self, "couldn't establish power handler\n");
196
197 return;
198 }
199
200 int
201 uhid_activate(device_t self, enum devact act)
202 {
203 struct uhid_softc *sc = device_private(self);
204
205 switch (act) {
206 case DVACT_DEACTIVATE:
207 sc->sc_dying = 1;
208 return 0;
209 default:
210 return EOPNOTSUPP;
211 }
212 }
213
214 int
215 uhid_detach(device_t self, int flags)
216 {
217 struct uhid_softc *sc = device_private(self);
218 int maj, mn;
219
220 DPRINTF(("uhid_detach: sc=%p flags=%d\n", sc, flags));
221
222 sc->sc_dying = 1;
223
224 pmf_device_deregister(self);
225
226 mutex_enter(&sc->sc_lock);
227 if (sc->sc_hdev.sc_state & UHIDEV_OPEN) {
228 if (--sc->sc_refcnt >= 0) {
229 /* Wake everyone */
230 cv_broadcast(&sc->sc_cv);
231 /* Wait for processes to go away. */
232 usb_detach_wait(sc->sc_hdev.sc_dev,
233 &sc->sc_detach_cv, &sc->sc_lock);
234 }
235 }
236 mutex_exit(&sc->sc_lock);
237
238 /* locate the major number */
239 maj = cdevsw_lookup_major(&uhid_cdevsw);
240
241 /* Nuke the vnodes for any open instances (calls close). */
242 mn = device_unit(self);
243 vdevgone(maj, mn, mn, VCHR);
244
245 #if 0
246 usbd_add_drv_event(USB_EVENT_DRIVER_DETACH,
247 sc->sc_hdev.sc_parent->sc_udev, sc->sc_hdev.sc_dev);
248 #endif
249 cv_destroy(&sc->sc_cv);
250 cv_destroy(&sc->sc_detach_cv);
251 mutex_destroy(&sc->sc_lock);
252 mutex_destroy(&sc->sc_access_lock);
253 seldestroy(&sc->sc_rsel);
254 softint_disestablish(sc->sc_sih);
255
256 return 0;
257 }
258
259 void
260 uhid_intr(struct uhidev *addr, void *data, u_int len)
261 {
262 struct uhid_softc *sc = (struct uhid_softc *)addr;
263
264 #ifdef UHID_DEBUG
265 if (uhiddebug > 5) {
266 uint32_t i;
267
268 DPRINTF(("uhid_intr: data ="));
269 for (i = 0; i < len; i++)
270 DPRINTF((" %02x", ((u_char *)data)[i]));
271 DPRINTF(("\n"));
272 }
273 #endif
274
275 mutex_enter(&sc->sc_lock);
276 (void)b_to_q(data, len, &sc->sc_q);
277
278 if (sc->sc_state & UHID_ASLP) {
279 sc->sc_state &= ~UHID_ASLP;
280 DPRINTFN(5, ("uhid_intr: waking %p\n", &sc->sc_q));
281 cv_broadcast(&sc->sc_cv);
282 }
283 selnotify(&sc->sc_rsel, 0, 0);
284 if (sc->sc_async != NULL) {
285 DPRINTFN(3, ("uhid_intr: sending SIGIO %p\n", sc->sc_async));
286 softint_schedule(sc->sc_sih);
287 }
288 mutex_exit(&sc->sc_lock);
289 }
290
291 void
292 uhid_softintr(void *cookie)
293 {
294 struct uhid_softc *sc;
295
296 sc = cookie;
297
298 mutex_enter(proc_lock);
299 if (sc->sc_async != NULL)
300 psignal(sc->sc_async, SIGIO);
301 mutex_exit(proc_lock);
302 }
303
304 int
305 uhidopen(dev_t dev, int flag, int mode, struct lwp *l)
306 {
307 struct uhid_softc *sc;
308 int error;
309
310 sc = device_lookup_private(&uhid_cd, UHIDUNIT(dev));
311 if (sc == NULL)
312 return ENXIO;
313
314 DPRINTF(("uhidopen: sc=%p\n", sc));
315
316 if (sc->sc_dying)
317 return ENXIO;
318
319 mutex_enter(&sc->sc_access_lock);
320
321 /*
322 * uhid interrupts aren't enabled yet, so setup sc_q now, as
323 * long as they're not already allocated.
324 */
325 if (sc->sc_hdev.sc_state & UHIDEV_OPEN) {
326 mutex_exit(&sc->sc_access_lock);
327 return EBUSY;
328 }
329 if (clalloc(&sc->sc_q, UHID_BSIZE, 0) == -1) {
330 mutex_exit(&sc->sc_access_lock);
331 return ENOMEM;
332 }
333
334 error = uhidev_open(&sc->sc_hdev);
335 if (error) {
336 clfree(&sc->sc_q);
337 mutex_exit(&sc->sc_access_lock);
338 return error;
339 }
340 mutex_exit(&sc->sc_access_lock);
341
342 if (sc->sc_osize > 0)
343 sc->sc_obuf = kmem_alloc(sc->sc_osize, KM_SLEEP);
344 else
345 sc->sc_obuf = NULL;
346 sc->sc_state &= ~UHID_IMMED;
347
348 mutex_enter(proc_lock);
349 sc->sc_async = NULL;
350 mutex_exit(proc_lock);
351
352 return 0;
353 }
354
355 int
356 uhidclose(dev_t dev, int flag, int mode, struct lwp *l)
357 {
358 struct uhid_softc *sc;
359
360 sc = device_lookup_private(&uhid_cd, UHIDUNIT(dev));
361
362 DPRINTF(("uhidclose: sc=%p\n", sc));
363
364 mutex_enter(proc_lock);
365 sc->sc_async = NULL;
366 mutex_exit(proc_lock);
367
368 mutex_enter(&sc->sc_access_lock);
369
370 uhidev_stop(&sc->sc_hdev);
371
372 clfree(&sc->sc_q);
373 if (sc->sc_osize > 0)
374 kmem_free(sc->sc_obuf, sc->sc_osize);
375
376 uhidev_close(&sc->sc_hdev);
377
378 mutex_exit(&sc->sc_access_lock);
379
380 return 0;
381 }
382
383 int
384 uhid_do_read(struct uhid_softc *sc, struct uio *uio, int flag)
385 {
386 int error = 0;
387 int extra;
388 size_t length;
389 u_char buffer[UHID_CHUNK];
390 usbd_status err;
391
392 DPRINTFN(1, ("uhidread\n"));
393 if (sc->sc_state & UHID_IMMED) {
394 DPRINTFN(1, ("uhidread immed\n"));
395 extra = sc->sc_hdev.sc_report_id != 0;
396 if (sc->sc_isize + extra > sizeof(buffer))
397 return ENOBUFS;
398 err = uhidev_get_report(&sc->sc_hdev, UHID_INPUT_REPORT,
399 buffer, sc->sc_isize + extra);
400 if (err)
401 return EIO;
402 return uiomove(buffer+extra, sc->sc_isize, uio);
403 }
404
405 mutex_enter(&sc->sc_lock);
406 while (sc->sc_q.c_cc == 0) {
407 if (flag & IO_NDELAY) {
408 mutex_exit(&sc->sc_lock);
409 return EWOULDBLOCK;
410 }
411 sc->sc_state |= UHID_ASLP;
412 DPRINTFN(5, ("uhidread: sleep on %p\n", &sc->sc_q));
413 error = cv_wait_sig(&sc->sc_cv, &sc->sc_lock);
414 DPRINTFN(5, ("uhidread: woke, error=%d\n", error));
415 if (sc->sc_dying)
416 error = EIO;
417 if (error) {
418 sc->sc_state &= ~UHID_ASLP;
419 break;
420 }
421 }
422
423 /* Transfer as many chunks as possible. */
424 while (sc->sc_q.c_cc > 0 && uio->uio_resid > 0 && !error) {
425 length = min(sc->sc_q.c_cc, uio->uio_resid);
426 if (length > sizeof(buffer))
427 length = sizeof(buffer);
428
429 /* Remove a small chunk from the input queue. */
430 (void) q_to_b(&sc->sc_q, buffer, length);
431 DPRINTFN(5, ("uhidread: got %lu chars\n", (u_long)length));
432
433 /* Copy the data to the user process. */
434 mutex_exit(&sc->sc_lock);
435 if ((error = uiomove(buffer, length, uio)) != 0)
436 return error;
437 mutex_enter(&sc->sc_lock);
438 }
439
440 mutex_exit(&sc->sc_lock);
441 return error;
442 }
443
444 int
445 uhidread(dev_t dev, struct uio *uio, int flag)
446 {
447 struct uhid_softc *sc;
448 int error;
449
450 sc = device_lookup_private(&uhid_cd, UHIDUNIT(dev));
451
452 mutex_enter(&sc->sc_lock);
453 sc->sc_refcnt++;
454 mutex_exit(&sc->sc_lock);
455
456 mutex_enter(&sc->sc_access_lock);
457 error = uhid_do_read(sc, uio, flag);
458 mutex_exit(&sc->sc_access_lock);
459
460 mutex_enter(&sc->sc_lock);
461 if (--sc->sc_refcnt < 0)
462 usb_detach_broadcast(sc->sc_hdev.sc_dev, &sc->sc_detach_cv);
463 mutex_exit(&sc->sc_lock);
464 return error;
465 }
466
467 int
468 uhid_do_write(struct uhid_softc *sc, struct uio *uio, int flag)
469 {
470 int error;
471 int size;
472 usbd_status err;
473
474 DPRINTFN(1, ("uhidwrite\n"));
475
476 if (sc->sc_dying)
477 return EIO;
478
479 size = sc->sc_osize;
480 error = 0;
481 if (uio->uio_resid != size || size == 0)
482 return EINVAL;
483 error = uiomove(sc->sc_obuf, size, uio);
484 if (!error) {
485 err = uhidev_set_report(&sc->sc_hdev, UHID_OUTPUT_REPORT,
486 sc->sc_obuf, size);
487 if (err)
488 error = EIO;
489 }
490
491 return error;
492 }
493
494 int
495 uhidwrite(dev_t dev, struct uio *uio, int flag)
496 {
497 struct uhid_softc *sc;
498 int error;
499
500 sc = device_lookup_private(&uhid_cd, UHIDUNIT(dev));
501
502 mutex_enter(&sc->sc_lock);
503 sc->sc_refcnt++;
504 mutex_exit(&sc->sc_lock);
505
506 mutex_enter(&sc->sc_access_lock);
507 error = uhid_do_write(sc, uio, flag);
508 mutex_exit(&sc->sc_access_lock);
509
510 mutex_enter(&sc->sc_lock);
511 if (--sc->sc_refcnt < 0)
512 usb_detach_broadcast(sc->sc_hdev.sc_dev, &sc->sc_detach_cv);
513 mutex_exit(&sc->sc_lock);
514 return error;
515 }
516
517 int
518 uhid_do_ioctl(struct uhid_softc *sc, u_long cmd, void *addr,
519 int flag, struct lwp *l)
520 {
521 struct usb_ctl_report_desc *rd;
522 struct usb_ctl_report *re;
523 u_char buffer[UHID_CHUNK];
524 int size, extra;
525 usbd_status err;
526 void *desc;
527
528 DPRINTFN(2, ("uhidioctl: cmd=%lx\n", cmd));
529
530 if (sc->sc_dying)
531 return EIO;
532
533 switch (cmd) {
534 case FIONBIO:
535 /* All handled in the upper FS layer. */
536 break;
537
538 case FIOASYNC:
539 mutex_enter(proc_lock);
540 if (*(int *)addr) {
541 if (sc->sc_async != NULL) {
542 mutex_exit(proc_lock);
543 return EBUSY;
544 }
545 sc->sc_async = l->l_proc;
546 DPRINTF(("uhid_do_ioctl: FIOASYNC %p\n", l->l_proc));
547 } else
548 sc->sc_async = NULL;
549 mutex_exit(proc_lock);
550 break;
551
552 /* XXX this is not the most general solution. */
553 case TIOCSPGRP:
554 mutex_enter(proc_lock);
555 if (sc->sc_async == NULL) {
556 mutex_exit(proc_lock);
557 return EINVAL;
558 }
559 if (*(int *)addr != sc->sc_async->p_pgid) {
560 mutex_exit(proc_lock);
561 return EPERM;
562 }
563 mutex_exit(proc_lock);
564 break;
565
566 case FIOSETOWN:
567 mutex_enter(proc_lock);
568 if (sc->sc_async == NULL) {
569 mutex_exit(proc_lock);
570 return EINVAL;
571 }
572 if (-*(int *)addr != sc->sc_async->p_pgid
573 && *(int *)addr != sc->sc_async->p_pid) {
574 mutex_exit(proc_lock);
575 return EPERM;
576 }
577 mutex_exit(proc_lock);
578 break;
579
580 case USB_GET_REPORT_DESC:
581 uhidev_get_report_desc(sc->sc_hdev.sc_parent, &desc, &size);
582 rd = (struct usb_ctl_report_desc *)addr;
583 size = min(size, sizeof(rd->ucrd_data));
584 rd->ucrd_size = size;
585 memcpy(rd->ucrd_data, desc, size);
586 break;
587
588 case USB_SET_IMMED:
589 if (*(int *)addr) {
590 extra = sc->sc_hdev.sc_report_id != 0;
591 if (sc->sc_isize + extra > sizeof(buffer))
592 return ENOBUFS;
593 err = uhidev_get_report(&sc->sc_hdev, UHID_INPUT_REPORT,
594 buffer, sc->sc_isize + extra);
595 if (err)
596 return EOPNOTSUPP;
597
598 sc->sc_state |= UHID_IMMED;
599 } else
600 sc->sc_state &= ~UHID_IMMED;
601 break;
602
603 case USB_GET_REPORT:
604 re = (struct usb_ctl_report *)addr;
605 switch (re->ucr_report) {
606 case UHID_INPUT_REPORT:
607 size = sc->sc_isize;
608 break;
609 case UHID_OUTPUT_REPORT:
610 size = sc->sc_osize;
611 break;
612 case UHID_FEATURE_REPORT:
613 size = sc->sc_fsize;
614 break;
615 default:
616 return EINVAL;
617 }
618 extra = sc->sc_hdev.sc_report_id != 0;
619 if (size + extra > sizeof(re->ucr_data))
620 return ENOBUFS;
621 err = uhidev_get_report(&sc->sc_hdev, re->ucr_report,
622 re->ucr_data, size + extra);
623 if (extra)
624 memmove(re->ucr_data, re->ucr_data+1, size);
625 if (err)
626 return EIO;
627 break;
628
629 case USB_SET_REPORT:
630 re = (struct usb_ctl_report *)addr;
631 switch (re->ucr_report) {
632 case UHID_INPUT_REPORT:
633 size = sc->sc_isize;
634 break;
635 case UHID_OUTPUT_REPORT:
636 size = sc->sc_osize;
637 break;
638 case UHID_FEATURE_REPORT:
639 size = sc->sc_fsize;
640 break;
641 default:
642 return EINVAL;
643 }
644 if (size > sizeof(re->ucr_data))
645 return ENOBUFS;
646 err = uhidev_set_report(&sc->sc_hdev, re->ucr_report,
647 re->ucr_data, size);
648 if (err)
649 return EIO;
650 break;
651
652 case USB_GET_REPORT_ID:
653 *(int *)addr = sc->sc_hdev.sc_report_id;
654 break;
655
656 case USB_GET_DEVICE_DESC:
657 *(usb_device_descriptor_t *)addr =
658 *usbd_get_device_descriptor(sc->sc_hdev.sc_parent->sc_udev);
659 break;
660
661 case USB_GET_DEVICEINFO:
662 usbd_fill_deviceinfo(sc->sc_hdev.sc_parent->sc_udev,
663 (struct usb_device_info *)addr, 0);
664 break;
665 #ifdef COMPAT_30
666 case USB_GET_DEVICEINFO_OLD:
667 usbd_fill_deviceinfo_old(sc->sc_hdev.sc_parent->sc_udev,
668 (struct usb_device_info_old *)addr, 0);
669
670 break;
671 #endif
672 case USB_GET_STRING_DESC:
673 {
674 struct usb_string_desc *si = (struct usb_string_desc *)addr;
675 err = usbd_get_string_desc(sc->sc_hdev.sc_parent->sc_udev,
676 si->usd_string_index,
677 si->usd_language_id, &si->usd_desc, &size);
678 if (err)
679 return EINVAL;
680 break;
681 }
682
683 default:
684 return EINVAL;
685 }
686 return 0;
687 }
688
689 int
690 uhidioctl(dev_t dev, u_long cmd, void *addr, int flag, struct lwp *l)
691 {
692 struct uhid_softc *sc;
693 int error;
694
695 sc = device_lookup_private(&uhid_cd, UHIDUNIT(dev));
696 if (sc == NULL)
697 return ENXIO;
698
699 if (sc->sc_dying)
700 return EIO;
701
702 mutex_enter(&sc->sc_lock);
703 sc->sc_refcnt++;
704 mutex_exit(&sc->sc_lock);
705
706 mutex_enter(&sc->sc_access_lock);
707 error = uhid_do_ioctl(sc, cmd, addr, flag, l);
708 mutex_exit(&sc->sc_access_lock);
709
710 mutex_enter(&sc->sc_lock);
711 if (--sc->sc_refcnt < 0)
712 usb_detach_broadcast(sc->sc_hdev.sc_dev, &sc->sc_detach_cv);
713 mutex_exit(&sc->sc_lock);
714 return error;
715 }
716
717 int
718 uhidpoll(dev_t dev, int events, struct lwp *l)
719 {
720 struct uhid_softc *sc;
721 int revents = 0;
722
723 sc = device_lookup_private(&uhid_cd, UHIDUNIT(dev));
724 if (sc == NULL)
725 return ENXIO;
726
727 if (sc->sc_dying)
728 return EIO;
729
730 mutex_enter(&sc->sc_lock);
731 if (events & (POLLOUT | POLLWRNORM))
732 revents |= events & (POLLOUT | POLLWRNORM);
733 if (events & (POLLIN | POLLRDNORM)) {
734 if (sc->sc_q.c_cc > 0)
735 revents |= events & (POLLIN | POLLRDNORM);
736 else
737 selrecord(l, &sc->sc_rsel);
738 }
739 mutex_exit(&sc->sc_lock);
740
741 return revents;
742 }
743
744 static void
745 filt_uhidrdetach(struct knote *kn)
746 {
747 struct uhid_softc *sc = kn->kn_hook;
748
749 mutex_enter(&sc->sc_lock);
750 SLIST_REMOVE(&sc->sc_rsel.sel_klist, kn, knote, kn_selnext);
751 mutex_exit(&sc->sc_lock);
752 }
753
754 static int
755 filt_uhidread(struct knote *kn, long hint)
756 {
757 struct uhid_softc *sc = kn->kn_hook;
758
759 kn->kn_data = sc->sc_q.c_cc;
760 return kn->kn_data > 0;
761 }
762
763 static const struct filterops uhidread_filtops =
764 { 1, NULL, filt_uhidrdetach, filt_uhidread };
765
766 static const struct filterops uhid_seltrue_filtops =
767 { 1, NULL, filt_uhidrdetach, filt_seltrue };
768
769 int
770 uhidkqfilter(dev_t dev, struct knote *kn)
771 {
772 struct uhid_softc *sc;
773 struct klist *klist;
774
775 sc = device_lookup_private(&uhid_cd, UHIDUNIT(dev));
776
777 if (sc->sc_dying)
778 return ENXIO;
779
780 switch (kn->kn_filter) {
781 case EVFILT_READ:
782 klist = &sc->sc_rsel.sel_klist;
783 kn->kn_fop = &uhidread_filtops;
784 break;
785
786 case EVFILT_WRITE:
787 klist = &sc->sc_rsel.sel_klist;
788 kn->kn_fop = &uhid_seltrue_filtops;
789 break;
790
791 default:
792 return EINVAL;
793 }
794
795 kn->kn_hook = sc;
796
797 mutex_enter(&sc->sc_lock);
798 SLIST_INSERT_HEAD(klist, kn, kn_selnext);
799 mutex_exit(&sc->sc_lock);
800
801 return 0;
802 }
803