Changeset 095b2017 in mainline for uspace/drv
- Timestamp:
- 2011-03-25T17:13:02Z (15 years ago)
- Branches:
- lfn, master, serial, ticket/834-toolchain-update, topic/msim-upgrade, topic/simplify-dev-export
- Children:
- b8d453ec, fa3de85
- Parents:
- da88eb82 (diff), da3dafc (diff)
Note: this is a merge changeset, the changes displayed below correspond to the merge itself.
Use the(diff)links above to see all the changes relative to each parent. - Location:
- uspace/drv
- Files:
-
- 1 added
- 4 deleted
- 5 edited
- 10 moved
-
ohci/batch.c (modified) (1 diff)
-
ohci/root_hub.c (modified) (2 diffs)
-
ohci/root_hub.h (modified) (1 diff)
-
usbhid/descdump.c (deleted)
-
usbhid/hiddev.c (deleted)
-
usbhid/hiddev.h (deleted)
-
usbhid/main.c (deleted)
-
usbhub/port_status.h (modified) (2 diffs)
-
usbhub/usbhub.c (modified) (1 diff)
-
usbkbd/Makefile (moved) (moved from uspace/drv/usbhid/Makefile ) (2 diffs)
-
usbkbd/conv.c (moved) (moved from uspace/drv/usbhid/conv.c )
-
usbkbd/conv.h (moved) (moved from uspace/drv/usbhid/conv.h ) (1 diff)
-
usbkbd/kbd.h (moved) (moved from uspace/drv/usbhid/kbd.h )
-
usbkbd/kbddev.c (moved) (moved from uspace/drv/usbhid/kbddev.c ) (33 diffs)
-
usbkbd/kbddev.h (moved) (moved from uspace/drv/usbhid/kbddev.h ) (5 diffs)
-
usbkbd/kbdrepeat.c (moved) (moved from uspace/drv/usbhid/kbdrepeat.c ) (8 diffs)
-
usbkbd/kbdrepeat.h (moved) (moved from uspace/drv/usbhid/kbdrepeat.h ) (1 diff)
-
usbkbd/layout.h (moved) (moved from uspace/drv/usbhid/layout.h ) (1 diff)
-
usbkbd/main.c (added)
-
usbkbd/usbkbd.ma (moved) (moved from uspace/drv/usbhid/usbhid.ma )
Legend:
- Unmodified
- Added
- Removed
-
uspace/drv/ohci/batch.c
rda88eb82 r095b2017 118 118 instance->next_step = batch_call_in_and_dispose; 119 119 /* TODO: implement */ 120 usb_log_debug("Batch(%p) CONTROL WRITEinitialized.\n", instance);120 usb_log_debug("Batch(%p) CONTROL READ initialized.\n", instance); 121 121 } 122 122 /*----------------------------------------------------------------------------*/ -
uspace/drv/ohci/root_hub.c
rda88eb82 r095b2017 39 39 40 40 #include "root_hub.h" 41 #include "usb/classes/classes.h" 42 #include <usb/request.h> 43 #include <usb/classes/hub.h> 44 41 45 42 46 /** Root hub initialization … … 50 54 instance->device = dev; 51 55 56 52 57 usb_log_info("OHCI root hub with %d ports.\n", regs->rh_desc_a & 0xff); 53 58 59 //start generic usb hub driver 60 54 61 /* TODO: implement */ 55 62 return EOK; 56 63 } 57 64 /*----------------------------------------------------------------------------*/ 65 66 67 static int process_get_port_status_request(rh_t *instance, uint16_t port, 68 usb_transfer_batch_t * request){ 69 if(port<1 || port>instance->port_count) 70 return EINVAL; 71 uint32_t * uint32_buffer = (uint32_t*)request->buffer; 72 request->transfered_size = 4; 73 uint32_buffer[0] = instance->registers->rh_port_status[port -1]; 74 return EOK; 75 } 76 77 static int process_get_hub_status_request(rh_t *instance, 78 usb_transfer_batch_t * request){ 79 uint32_t * uint32_buffer = (uint32_t*)request->buffer; 80 //bits, 0,1,16,17 81 request->transfered_size = 4; 82 uint32_t mask = 1 & (1<<1) & (1<<16) & (1<<17); 83 uint32_buffer[0] = mask & instance->registers->rh_status; 84 return EOK; 85 86 } 87 88 static void usb_create_serialized_hub_descriptor(rh_t *instance, uint8_t ** out_result, 89 size_t * out_size) { 90 //base size 91 size_t size = 7; 92 //variable size according to port count 93 size_t var_size = instance->port_count / 8 + 94 ((instance->port_count % 8 > 0) ? 1 : 0); 95 size += 2 * var_size; 96 uint8_t * result = (uint8_t*) malloc(size); 97 bzero(result,size); 98 //size 99 result[0] = size; 100 //descriptor type 101 result[1] = USB_DESCTYPE_HUB; 102 result[2] = instance->port_count; 103 uint32_t hub_desc_reg = instance->registers->rh_desc_a; 104 result[3] = 105 ((hub_desc_reg >> 8) %2) + 106 (((hub_desc_reg >> 9) %2) << 1) + 107 (((hub_desc_reg >> 10) %2) << 2) + 108 (((hub_desc_reg >> 11) %2) << 3) + 109 (((hub_desc_reg >> 12) %2) << 4); 110 result[4] = 0; 111 result[5] = /*descriptor->pwr_on_2_good_time*/ 50; 112 result[6] = 50; 113 114 int port; 115 for (port = 1; port <= instance->port_count; ++port) { 116 result[7 + port/8] += 117 ((instance->registers->rh_desc_b >> port)%2) << (port%8); 118 } 119 size_t i; 120 for (i = 0; i < var_size; ++i) { 121 result[7 + var_size + i] = 255; 122 } 123 (*out_result) = result; 124 (*out_size) = size; 125 } 126 127 128 static int process_get_status_request(rh_t *instance, 129 usb_transfer_batch_t * request) 130 { 131 size_t buffer_size = request->buffer_size; 132 usb_device_request_setup_packet_t * request_packet = 133 (usb_device_request_setup_packet_t*) 134 request->setup_buffer; 135 136 usb_hub_bm_request_type_t request_type = request_packet->request_type; 137 if(buffer_size<4/*request_packet->length*/){///\TODO 138 usb_log_warning("requested more data than buffer size\n"); 139 return EINVAL; 140 } 141 142 if(request_type == USB_HUB_REQ_TYPE_GET_HUB_STATUS) 143 return process_get_hub_status_request(instance, request); 144 if(request_type == USB_HUB_REQ_TYPE_GET_PORT_STATUS) 145 return process_get_port_status_request(instance, request_packet->index, 146 request); 147 return ENOTSUP; 148 } 149 150 static void create_interrupt_mask(rh_t *instance, void ** buffer, 151 size_t * buffer_size){ 152 int bit_count = instance->port_count + 1; 153 (*buffer_size) = (bit_count / 8) + (bit_count%8==0)?0:1; 154 (*buffer) = malloc(*buffer_size); 155 uint8_t * bitmap = (uint8_t*)(*buffer); 156 uint32_t mask = (1<<16) + (1<<17); 157 bzero(bitmap,(*buffer_size)); 158 if(instance->registers->rh_status & mask){ 159 bitmap[0] = 1; 160 } 161 int port; 162 mask = 0; 163 int i; 164 for(i=16;i<=20;++i) 165 mask += 1<<i; 166 for(port = 1; port<=instance->port_count;++port){ 167 if(mask & instance->registers->rh_port_status[port-1]){ 168 bitmap[(port+1)/8] += 1<<(port%8); 169 } 170 } 171 } 172 173 174 static int process_get_descriptor_request(rh_t *instance, 175 usb_transfer_batch_t *request){ 176 /// \TODO 177 usb_device_request_setup_packet_t * setup_request = 178 (usb_device_request_setup_packet_t*)request->setup_buffer; 179 size_t size; 180 void * result_descriptor; 181 uint16_t setup_request_value = setup_request->value_high; 182 //(setup_request->value_low << 8); 183 if(setup_request_value == USB_DESCTYPE_HUB){ 184 usb_log_debug("USB_DESCTYPE_HUB\n"); 185 //create hub descriptor 186 uint8_t * descriptor; 187 usb_create_serialized_hub_descriptor(instance, 188 &descriptor, &size); 189 result_descriptor = descriptor; 190 }else if(setup_request_value == USB_DESCTYPE_DEVICE){ 191 //create std device descriptor 192 usb_log_debug("USB_DESCTYPE_DEVICE\n"); 193 usb_standard_device_descriptor_t * descriptor = 194 (usb_standard_device_descriptor_t*) 195 malloc(sizeof(usb_standard_device_descriptor_t)); 196 descriptor->configuration_count = 1; 197 descriptor->descriptor_type = USB_DESCTYPE_DEVICE; 198 descriptor->device_class = USB_CLASS_HUB; 199 descriptor->device_protocol = 0; 200 descriptor->device_subclass = 0; 201 descriptor->device_version = 0; 202 descriptor->length = sizeof(usb_standard_device_descriptor_t); 203 /// \TODO this value is guessed 204 descriptor->max_packet_size = 8; 205 descriptor->product_id = 0x0001; 206 /// \TODO these values migt be different 207 descriptor->str_serial_number = 0; 208 descriptor->str_serial_number = 0; 209 descriptor->usb_spec_version = 0; 210 descriptor->vendor_id = 0x16db; 211 result_descriptor = descriptor; 212 size = sizeof(usb_standard_device_descriptor_t); 213 }else if(setup_request_value == USB_DESCTYPE_CONFIGURATION){ 214 usb_log_debug("USB_DESCTYPE_CONFIGURATION\n"); 215 usb_standard_configuration_descriptor_t * descriptor = 216 (usb_standard_configuration_descriptor_t*) 217 malloc(sizeof(usb_standard_configuration_descriptor_t)); 218 /// \TODO some values are default or guessed 219 descriptor->attributes = 1<<7; 220 descriptor->configuration_number = 1; 221 descriptor->descriptor_type = USB_DESCTYPE_CONFIGURATION; 222 descriptor->interface_count = 1; 223 descriptor->length = sizeof(usb_standard_configuration_descriptor_t); 224 descriptor->max_power = 100; 225 descriptor->str_configuration = 0; 226 /// \TODO should this include device descriptor? 227 size_t hub_descriptor_size = 7 + 228 2* (instance->port_count / 8 + 229 ((instance->port_count % 8 > 0) ? 1 : 0)); 230 descriptor->total_length = 231 sizeof(usb_standard_configuration_descriptor_t)+ 232 sizeof(usb_standard_endpoint_descriptor_t)+ 233 sizeof(usb_standard_interface_descriptor_t)+ 234 hub_descriptor_size; 235 result_descriptor = descriptor; 236 size = sizeof(usb_standard_configuration_descriptor_t); 237 238 }else if(setup_request_value == USB_DESCTYPE_INTERFACE){ 239 usb_log_debug("USB_DESCTYPE_INTERFACE\n"); 240 usb_standard_interface_descriptor_t * descriptor = 241 (usb_standard_interface_descriptor_t*) 242 malloc(sizeof(usb_standard_interface_descriptor_t)); 243 descriptor->alternate_setting = 0; 244 descriptor->descriptor_type = USB_DESCTYPE_INTERFACE; 245 descriptor->endpoint_count = 1; 246 descriptor->interface_class = USB_CLASS_HUB; 247 /// \TODO is this correct? 248 descriptor->interface_number = 1; 249 descriptor->interface_protocol = 0; 250 descriptor->interface_subclass = 0; 251 descriptor->length = sizeof(usb_standard_interface_descriptor_t); 252 descriptor->str_interface = 0; 253 result_descriptor = descriptor; 254 size = sizeof(usb_standard_interface_descriptor_t); 255 }else if(setup_request_value == USB_DESCTYPE_ENDPOINT){ 256 usb_log_debug("USB_DESCTYPE_ENDPOINT\n"); 257 usb_standard_endpoint_descriptor_t * descriptor = 258 (usb_standard_endpoint_descriptor_t*) 259 malloc(sizeof(usb_standard_endpoint_descriptor_t)); 260 descriptor->attributes = USB_TRANSFER_INTERRUPT; 261 descriptor->descriptor_type = USB_DESCTYPE_ENDPOINT; 262 descriptor->endpoint_address = 1 + (1<<7); 263 descriptor->length = sizeof(usb_standard_endpoint_descriptor_t); 264 descriptor->max_packet_size = 8; 265 descriptor->poll_interval = 255; 266 result_descriptor = descriptor; 267 size = sizeof(usb_standard_endpoint_descriptor_t); 268 }else{ 269 usb_log_debug("USB_DESCTYPE_EINVAL %d \n",setup_request->value); 270 usb_log_debug("\ttype %d\n\trequest %d\n\tvalue %d\n\tindex %d\n\tlen %d\n ", 271 setup_request->request_type, 272 setup_request->request, 273 setup_request_value, 274 setup_request->index, 275 setup_request->length 276 ); 277 return EINVAL; 278 } 279 if(request->buffer_size < size){ 280 size = request->buffer_size; 281 } 282 request->transfered_size = size; 283 memcpy(request->buffer,result_descriptor,size); 284 free(result_descriptor); 285 return EOK; 286 } 287 288 static int process_get_configuration_request(rh_t *instance, 289 usb_transfer_batch_t *request){ 290 //set and get configuration requests do not have any meaning, only dummy 291 //values are returned 292 if(request->buffer_size != 1) 293 return EINVAL; 294 request->buffer[0] = 1; 295 request->transfered_size = 1; 296 return EOK; 297 } 298 299 static int process_hub_feature_set_request(rh_t *instance, 300 uint16_t feature, bool enable){ 301 if(feature > USB_HUB_FEATURE_C_HUB_OVER_CURRENT) 302 return EINVAL; 303 instance->registers->rh_status = 304 enable ? 305 (instance->registers->rh_status | (1<<feature)) 306 : 307 (instance->registers->rh_status & (~(1<<feature))); 308 /// \TODO any error? 309 return EOK; 310 } 311 312 static int process_port_feature_set_request(rh_t *instance, 313 uint16_t feature, uint16_t port, bool enable){ 314 if(feature > USB_HUB_FEATURE_C_PORT_RESET) 315 return EINVAL; 316 if(port<1 || port>instance->port_count) 317 return EINVAL; 318 instance->registers->rh_port_status[port - 1] = 319 enable ? 320 (instance->registers->rh_port_status[port - 1] | (1<<feature)) 321 : 322 (instance->registers->rh_port_status[port - 1] & (~(1<<feature))); 323 /// \TODO any error? 324 return EOK; 325 } 326 327 static int process_address_set_request(rh_t *instance, 328 uint16_t address){ 329 instance->address = address; 330 return EOK; 331 } 332 333 static int process_request_with_output(rh_t *instance, 334 usb_transfer_batch_t *request){ 335 usb_device_request_setup_packet_t * setup_request = 336 (usb_device_request_setup_packet_t*)request->setup_buffer; 337 if(setup_request->request == USB_DEVREQ_GET_STATUS){ 338 usb_log_debug("USB_DEVREQ_GET_STATUS\n"); 339 return process_get_status_request(instance, request); 340 } 341 if(setup_request->request == USB_DEVREQ_GET_DESCRIPTOR){ 342 usb_log_debug("USB_DEVREQ_GET_DESCRIPTOR\n"); 343 return process_get_descriptor_request(instance, request); 344 } 345 if(setup_request->request == USB_DEVREQ_GET_CONFIGURATION){ 346 usb_log_debug("USB_DEVREQ_GET_CONFIGURATION\n"); 347 return process_get_configuration_request(instance, request); 348 } 349 return ENOTSUP; 350 } 351 352 static int process_request_with_input(rh_t *instance, 353 usb_transfer_batch_t *request){ 354 usb_device_request_setup_packet_t * setup_request = 355 (usb_device_request_setup_packet_t*)request->setup_buffer; 356 request->transfered_size = 0; 357 if(setup_request->request == USB_DEVREQ_SET_DESCRIPTOR){ 358 return ENOTSUP; 359 } 360 if(setup_request->request == USB_DEVREQ_SET_CONFIGURATION){ 361 //set and get configuration requests do not have any meaning, 362 //only dummy values are returned 363 return EOK; 364 } 365 return ENOTSUP; 366 } 367 368 369 static int process_request_without_data(rh_t *instance, 370 usb_transfer_batch_t *request){ 371 usb_device_request_setup_packet_t * setup_request = 372 (usb_device_request_setup_packet_t*)request->setup_buffer; 373 request->transfered_size = 0; 374 if(setup_request->request == USB_DEVREQ_CLEAR_FEATURE 375 || setup_request->request == USB_DEVREQ_SET_FEATURE){ 376 if(setup_request->request_type == USB_HUB_REQ_TYPE_SET_HUB_FEATURE){ 377 usb_log_debug("USB_HUB_REQ_TYPE_SET_HUB_FEATURE\n"); 378 return process_hub_feature_set_request(instance, setup_request->value, 379 setup_request->request == USB_DEVREQ_SET_FEATURE); 380 } 381 if(setup_request->request_type == USB_HUB_REQ_TYPE_SET_PORT_FEATURE){ 382 usb_log_debug("USB_HUB_REQ_TYPE_SET_PORT_FEATURE\n"); 383 return process_port_feature_set_request(instance, setup_request->value, 384 setup_request->index, 385 setup_request->request == USB_DEVREQ_SET_FEATURE); 386 } 387 usb_log_debug("USB_HUB_REQ_TYPE_INVALID %d\n",setup_request->request_type); 388 return EINVAL; 389 } 390 if(setup_request->request == USB_DEVREQ_SET_ADDRESS){ 391 usb_log_debug("USB_DEVREQ_SET_ADDRESS\n"); 392 return process_address_set_request(instance, setup_request->value); 393 } 394 usb_log_debug("USB_DEVREQ_SET_ENOTSUP %d\n",setup_request->request_type); 395 return ENOTSUP; 396 } 397 398 399 /** 400 * 401 * @param instance 402 * @param request 403 * @return 404 */ 58 405 int rh_request(rh_t *instance, usb_transfer_batch_t *request) 59 406 { 60 407 assert(instance); 61 408 assert(request); 62 /* TODO: implement */ 63 if (request->setup_buffer) { 64 usb_log_info("Root hub got SETUP packet: %s.\n", 65 usb_debug_str_buffer((const uint8_t *)request->setup_buffer, 8, 8)); 66 } 67 usb_log_error("Root hub request processing not implemented.\n"); 68 usb_transfer_batch_finish(request, ENOTSUP); 409 int opResult; 410 if(request->transfer_type == USB_TRANSFER_CONTROL){ 411 if (request->setup_buffer) { 412 usb_log_info("Root hub got CTRL packet: %s.\n", 413 usb_debug_str_buffer((const uint8_t *)request->setup_buffer, 8, 8)); 414 if(sizeof(usb_device_request_setup_packet_t)>request->setup_size){ 415 usb_log_error("setup packet too small\n"); 416 return EINVAL; 417 } 418 usb_device_request_setup_packet_t * setup_request = 419 (usb_device_request_setup_packet_t*)request->setup_buffer; 420 if( 421 setup_request->request == USB_DEVREQ_GET_STATUS 422 || setup_request->request == USB_DEVREQ_GET_DESCRIPTOR 423 || setup_request->request == USB_DEVREQ_GET_CONFIGURATION 424 ){ 425 usb_log_debug("processing request with output\n"); 426 opResult = process_request_with_output(instance,request); 427 }else if( 428 setup_request->request == USB_DEVREQ_CLEAR_FEATURE 429 || setup_request->request == USB_DEVREQ_SET_FEATURE 430 || setup_request->request == USB_DEVREQ_SET_ADDRESS 431 ){ 432 usb_log_debug("processing request without additional data\n"); 433 opResult = process_request_without_data(instance,request); 434 }else if(setup_request->request == USB_DEVREQ_SET_DESCRIPTOR 435 || setup_request->request == USB_DEVREQ_SET_CONFIGURATION 436 ){ 437 usb_log_debug("processing request with input\n"); 438 opResult = process_request_with_input(instance,request); 439 }else{ 440 usb_log_warning("received unsuported request: %d\n", 441 setup_request->request 442 ); 443 opResult = ENOTSUP; 444 } 445 }else{ 446 usb_log_error("root hub received empty transaction?"); 447 opResult = EINVAL; 448 } 449 }else if(request->transfer_type == USB_TRANSFER_INTERRUPT){ 450 usb_log_info("Root hub got INTERRUPT packet\n"); 451 void * buffer; 452 create_interrupt_mask(instance, &buffer, 453 &(request->transfered_size)); 454 memcpy(request->transport_buffer,buffer, request->transfered_size); 455 opResult = EOK; 456 }else{ 457 opResult = EINVAL; 458 } 459 usb_transfer_batch_finish(request, opResult); 69 460 return EOK; 70 461 } 71 462 /*----------------------------------------------------------------------------*/ 463 464 72 465 void rh_interrupt(rh_t *instance) 73 466 { -
uspace/drv/ohci/root_hub.h
rda88eb82 r095b2017 45 45 usb_address_t address; 46 46 ddf_dev_t *device; 47 int port_count; 47 48 } rh_t; 48 49 -
uspace/drv/usbhub/port_status.h
rda88eb82 r095b2017 30 30 */ 31 31 32 #ifndef PORT_STATUS_H33 #define PORT_STATUS_H32 #ifndef HUB_PORT_STATUS_H 33 #define HUB_PORT_STATUS_H 34 34 35 35 #include <bool.h> … … 335 335 336 336 337 #endif /* PORT_STATUS_H */337 #endif /* HUB_PORT_STATUS_H */ 338 338 339 339 /** -
uspace/drv/usbhub/usbhub.c
rda88eb82 r095b2017 162 162 std_descriptor->configuration_count); 163 163 if(std_descriptor->configuration_count<1){ 164 usb_log_error("THERE ARE NO CONFIGURATIONS AVAILABLE\n"); 165 //shouldn`t I return? 166 //definitely 164 usb_log_error("there are no configurations available\n"); 167 165 return EINVAL; 168 166 } -
uspace/drv/usbkbd/Makefile
rda88eb82 r095b2017 30 30 LIBS = $(LIBDRV_PREFIX)/libdrv.a $(LIBUSB_PREFIX)/libusb.a 31 31 EXTRA_CFLAGS += -I$(LIBDRV_PREFIX)/include -I$(LIBUSB_PREFIX)/include -I. 32 BINARY = usb hid32 BINARY = usbkbd 33 33 34 34 STOLEN_LAYOUT_SOURCES = \ … … 40 40 main.c \ 41 41 conv.c \ 42 hidreq.c \43 42 kbddev.c \ 44 43 kbdrepeat.c \ 45 hiddev.c \46 44 $(STOLEN_LAYOUT_SOURCES) 47 45 -
uspace/drv/usbkbd/conv.h
rda88eb82 r095b2017 34 34 */ 35 35 36 #ifndef USB HID_CONV_H_37 #define USB HID_CONV_H_36 #ifndef USB_KBD_CONV_H_ 37 #define USB_KBD_CONV_H_ 38 38 39 39 unsigned int usbhid_parse_scancode(int scancode); 40 40 41 #endif /* USB HID_CONV_H_ */41 #endif /* USB_KBD_CONV_H_ */ 42 42 43 43 /** -
uspace/drv/usbkbd/kbddev.c
rda88eb82 r095b2017 46 46 47 47 #include <usb/usb.h> 48 #include <usb/dp.h> 49 #include <usb/request.h> 48 50 #include <usb/classes/hid.h> 49 51 #include <usb/pipes.h> … … 52 54 #include <usb/classes/classes.h> 53 55 #include <usb/classes/hidut.h> 56 #include <usb/classes/hidreq.h> 57 #include <usb/classes/hidreport.h> 58 59 #include <usb/devdrv.h> 54 60 55 61 #include "kbddev.h" 56 #include "hiddev.h" 57 #include "hidreq.h" 62 58 63 #include "layout.h" 59 64 #include "conv.h" … … 85 90 static const unsigned int DEFAULT_REPEAT_DELAY = 50 * 1000; 86 91 92 /*----------------------------------------------------------------------------*/ 93 87 94 /** Keyboard polling endpoint description for boot protocol class. */ 88 static usb_endpoint_description_t poll_endpoint_description = {95 static usb_endpoint_description_t boot_poll_endpoint_description = { 89 96 .transfer_type = USB_TRANSFER_INTERRUPT, 90 97 .direction = USB_DIRECTION_IN, … … 95 102 }; 96 103 97 typedef enum usbhid_kbd_flags { 98 USBHID_KBD_STATUS_UNINITIALIZED = 0, 99 USBHID_KBD_STATUS_INITIALIZED = 1, 100 USBHID_KBD_STATUS_TO_DESTROY = -1 101 } usbhid_kbd_flags; 104 /* Array of endpoints expected on the device, NULL terminated. */ 105 usb_endpoint_description_t 106 *usb_kbd_endpoints[USB_KBD_POLL_EP_COUNT + 1] = { 107 &boot_poll_endpoint_description, 108 NULL 109 }; 110 111 /*----------------------------------------------------------------------------*/ 112 113 enum { 114 BOOT_REPORT_DESCRIPTOR_SIZE = 63 115 }; 116 117 static const uint8_t BOOT_REPORT_DESCRIPTOR[BOOT_REPORT_DESCRIPTOR_SIZE] = { 118 0x05, 0x01, // Usage Page (Generic Desktop), 119 0x09, 0x06, // Usage (Keyboard), 120 0xA1, 0x01, // Collection (Application), 121 0x75, 0x01, // Report Size (1), 122 0x95, 0x08, // Report Count (8), 123 0x05, 0x07, // Usage Page (Key Codes); 124 0x19, 0xE0, // Usage Minimum (224), 125 0x29, 0xE7, // Usage Maximum (231), 126 0x15, 0x00, // Logical Minimum (0), 127 0x25, 0x01, // Logical Maximum (1), 128 0x81, 0x02, // Input (Data, Variable, Absolute), ; Modifier byte 129 0x95, 0x01, // Report Count (1), 130 0x75, 0x08, // Report Size (8), 131 0x81, 0x01, // Input (Constant), ; Reserved byte 132 0x95, 0x05, // Report Count (5), 133 0x75, 0x01, // Report Size (1), 134 0x05, 0x08, // Usage Page (Page# for LEDs), 135 0x19, 0x01, // Usage Minimum (1), 136 0x29, 0x05, // Usage Maxmimum (5), 137 0x91, 0x02, // Output (Data, Variable, Absolute), ; LED report 138 0x95, 0x01, // Report Count (1), 139 0x75, 0x03, // Report Size (3), 140 0x91, 0x01, // Output (Constant), ; LED report padding 141 0x95, 0x06, // Report Count (6), 142 0x75, 0x08, // Report Size (8), 143 0x15, 0x00, // Logical Minimum (0), 144 0x25, 0xff, // Logical Maximum (255), 145 0x05, 0x07, // Usage Page (Key Codes), 146 0x19, 0x00, // Usage Minimum (0), 147 0x29, 0xff, // Usage Maximum (255), 148 0x81, 0x00, // Input (Data, Array), ; Key arrays (6 bytes) 149 0xC0 // End Collection 150 151 }; 152 153 /*----------------------------------------------------------------------------*/ 154 155 typedef enum usb_kbd_flags { 156 USB_KBD_STATUS_UNINITIALIZED = 0, 157 USB_KBD_STATUS_INITIALIZED = 1, 158 USB_KBD_STATUS_TO_DESTROY = -1 159 } usb_kbd_flags; 102 160 103 161 /*----------------------------------------------------------------------------*/ … … 132 190 133 191 typedef enum usbhid_lock_code { 134 USB HID_LOCK_NUM = 0x53,135 USB HID_LOCK_CAPS = 0x39,136 USB HID_LOCK_SCROLL = 0x47,137 USB HID_LOCK_COUNT = 3192 USB_KBD_LOCK_NUM = 0x53, 193 USB_KBD_LOCK_CAPS = 0x39, 194 USB_KBD_LOCK_SCROLL = 0x47, 195 USB_KBD_LOCK_COUNT = 3 138 196 } usbhid_lock_code; 139 197 140 static const usbhid_lock_code usbhid_lock_codes[USB HID_LOCK_COUNT] = {141 USB HID_LOCK_NUM,142 USB HID_LOCK_CAPS,143 USB HID_LOCK_SCROLL198 static const usbhid_lock_code usbhid_lock_codes[USB_KBD_LOCK_COUNT] = { 199 USB_KBD_LOCK_NUM, 200 USB_KBD_LOCK_CAPS, 201 USB_KBD_LOCK_SCROLL 144 202 }; 145 203 … … 149 207 150 208 static void default_connection_handler(ddf_fun_t *, ipc_callid_t, ipc_call_t *); 151 staticddf_dev_ops_t keyboard_ops = {209 ddf_dev_ops_t keyboard_ops = { 152 210 .default_handler = default_connection_handler 153 211 }; … … 169 227 sysarg_t method = IPC_GET_IMETHOD(*icall); 170 228 171 usb hid_kbd_t *kbd_dev = (usbhid_kbd_t *)fun->driver_data;229 usb_kbd_t *kbd_dev = (usb_kbd_t *)fun->driver_data; 172 230 assert(kbd_dev != NULL); 173 231 … … 203 261 * @param kbd_dev Keyboard device structure. 204 262 */ 205 static void usb hid_kbd_set_led(usbhid_kbd_t *kbd_dev)263 static void usb_kbd_set_led(usb_kbd_t *kbd_dev) 206 264 { 207 265 uint8_t buffer[BOOTP_BUFFER_OUT_SIZE]; … … 237 295 usb_debug_str_buffer(buffer, BOOTP_BUFFER_OUT_SIZE, 0)); 238 296 239 assert(kbd_dev->hid_dev != NULL); 240 assert(kbd_dev->hid_dev->initialized == USBHID_KBD_STATUS_INITIALIZED); 241 usbhid_req_set_report(kbd_dev->hid_dev, USB_HID_REPORT_TYPE_OUTPUT, 297 assert(kbd_dev->usb_dev != NULL); 298 299 usbhid_req_set_report(&kbd_dev->usb_dev->ctrl_pipe, 300 kbd_dev->usb_dev->interface_no, USB_HID_REPORT_TYPE_OUTPUT, 242 301 buffer, BOOTP_BUFFER_OUT_SIZE); 243 302 } … … 260 319 * @param key Key code of the key according to HID Usage Tables. 261 320 */ 262 void usb hid_kbd_push_ev(usbhid_kbd_t *kbd_dev, int type, unsigned int key)321 void usb_kbd_push_ev(usb_kbd_t *kbd_dev, int type, unsigned int key) 263 322 { 264 323 console_event_t ev; … … 310 369 /* Update keyboard lock indicator lights. */ 311 370 if (kbd_dev->lock_keys != locks_old) { 312 usb hid_kbd_set_led(kbd_dev);371 usb_kbd_set_led(kbd_dev); 313 372 } 314 373 } else { … … 358 417 359 418 /*----------------------------------------------------------------------------*/ 360 /** 361 * Checks if modifiers were pressed or released and generates key events. 362 * 363 * @param kbd_dev Keyboard device structure. 364 * @param modifiers Bitmap of modifiers. 365 * 366 * @sa usbhid_kbd_push_ev() 367 */ 368 //static void usbhid_kbd_check_modifier_changes(usbhid_kbd_t *kbd_dev, 369 // const uint8_t *key_codes, size_t count) 370 //{ 371 // /* 372 // * TODO: why the USB keyboard has NUM_, SCROLL_ and CAPS_LOCK 373 // * both as modifiers and as keyUSB_HID_LOCK_COUNTs with their own scancodes??? 374 // * 375 // * modifiers should be sent as normal keys to usbhid_parse_scancode()!! 376 // * so maybe it would be better if I received it from report parser in 377 // * that way 378 // */ 379 380 // int i; 381 // for (i = 0; i < count; ++i) { 382 // if ((modifiers & usb_hid_modifiers_consts[i]) && 383 // !(kbd_dev->modifiers & usb_hid_modifiers_consts[i])) { 384 // // modifier pressed 385 // if (usbhid_modifiers_keycodes[i] != 0) { 386 // usbhid_kbd_push_ev(kbd_dev, KEY_PRESS, 387 // usbhid_modifiers_keycodes[i]); 388 // } 389 // } else if (!(modifiers & usb_hid_modifiers_consts[i]) && 390 // (kbd_dev->modifiers & usb_hid_modifiers_consts[i])) { 391 // // modifier released 392 // if (usbhid_modifiers_keycodes[i] != 0) { 393 // usbhid_kbd_push_ev(kbd_dev, KEY_RELEASE, 394 // usbhid_modifiers_keycodes[i]); 395 // } 396 // } // no change 397 // } 398 399 // kbd_dev->modifiers = modifiers; 400 //} 401 402 /*----------------------------------------------------------------------------*/ 403 404 static inline int usbhid_kbd_is_lock(unsigned int key_code) 419 420 static inline int usb_kbd_is_lock(unsigned int key_code) 405 421 { 406 422 return (key_code == KC_NUM_LOCK … … 414 430 * 415 431 * An event is created only when key is pressed or released. Besides handling 416 * the events (usb hid_kbd_push_ev()), the auto-repeat fibril is notified about417 * key presses and releases (see usb hid_kbd_repeat_start() and418 * usb hid_kbd_repeat_stop()).432 * the events (usb_kbd_push_ev()), the auto-repeat fibril is notified about 433 * key presses and releases (see usb_kbd_repeat_start() and 434 * usb_kbd_repeat_stop()). 419 435 * 420 436 * @param kbd_dev Keyboard device structure. … … 423 439 * @param count Number of key codes in report (size of the report). 424 440 * 425 * @sa usb hid_kbd_push_ev(), usbhid_kbd_repeat_start(), usbhid_kbd_repeat_stop()426 */ 427 static void usb hid_kbd_check_key_changes(usbhid_kbd_t *kbd_dev,441 * @sa usb_kbd_push_ev(), usb_kbd_repeat_start(), usb_kbd_repeat_stop() 442 */ 443 static void usb_kbd_check_key_changes(usb_kbd_t *kbd_dev, 428 444 const uint8_t *key_codes, size_t count) 429 445 { … … 434 450 * First of all, check if the kbd have reported phantom state. 435 451 * 436 * TODO:this must be changed as we don't know which keys are modifiers452 * this must be changed as we don't know which keys are modifiers 437 453 * and which are regular keys. 438 454 */ … … 466 482 // not found, i.e. the key was released 467 483 key = usbhid_parse_scancode(kbd_dev->keys[j]); 468 if (!usb hid_kbd_is_lock(key)) {469 usb hid_kbd_repeat_stop(kbd_dev, key);484 if (!usb_kbd_is_lock(key)) { 485 usb_kbd_repeat_stop(kbd_dev, key); 470 486 } 471 usb hid_kbd_push_ev(kbd_dev, KEY_RELEASE, key);487 usb_kbd_push_ev(kbd_dev, KEY_RELEASE, key); 472 488 usb_log_debug2("Key released: %d\n", key); 473 489 } else { … … 491 507 usb_log_debug2("Key pressed: %d (keycode: %d)\n", key, 492 508 key_codes[i]); 493 usb hid_kbd_push_ev(kbd_dev, KEY_PRESS, key);494 if (!usb hid_kbd_is_lock(key)) {495 usb hid_kbd_repeat_start(kbd_dev, key);509 usb_kbd_push_ev(kbd_dev, KEY_PRESS, key); 510 if (!usb_kbd_is_lock(key)) { 511 usb_kbd_repeat_start(kbd_dev, key); 496 512 } 497 513 } else { … … 523 539 * structure representing the keyboard. 524 540 * 525 * @sa usb hid_kbd_check_key_changes(), usbhid_kbd_check_modifier_changes()526 */ 527 static void usb hid_kbd_process_keycodes(const uint8_t *key_codes, size_t count,541 * @sa usb_kbd_check_key_changes(), usb_kbd_check_modifier_changes() 542 */ 543 static void usb_kbd_process_keycodes(const uint8_t *key_codes, size_t count, 528 544 uint8_t modifiers, void *arg) 529 545 { … … 534 550 } 535 551 536 usb hid_kbd_t *kbd_dev = (usbhid_kbd_t *)arg;552 usb_kbd_t *kbd_dev = (usb_kbd_t *)arg; 537 553 assert(kbd_dev != NULL); 538 554 … … 546 562 } 547 563 548 ///usb hid_kbd_check_modifier_changes(kbd_dev, key_codes, count);549 usb hid_kbd_check_key_changes(kbd_dev, key_codes, count);564 ///usb_kbd_check_modifier_changes(kbd_dev, key_codes, count); 565 usb_kbd_check_key_changes(kbd_dev, key_codes, count); 550 566 } 551 567 … … 558 574 * This function uses the HID report parser to translate the data received from 559 575 * the device into generic USB HID key codes and into generic modifiers bitmap. 560 * The parser then calls the given callback (usb hid_kbd_process_keycodes()).576 * The parser then calls the given callback (usb_kbd_process_keycodes()). 561 577 * 562 578 * @note Currently, only the boot protocol is supported. … … 566 582 * @param actual_size Size of the data from keyboard (report size) in bytes. 567 583 * 568 * @sa usbhid_kbd_process_keycodes(), usb_hid_boot_keyboard_input_report(). 569 */ 570 static void usbhid_kbd_process_data(usbhid_kbd_t *kbd_dev, 584 * @sa usb_kbd_process_keycodes(), usb_hid_boot_keyboard_input_report(), 585 * usb_hid_parse_report(). 586 */ 587 static void usb_kbd_process_data(usb_kbd_t *kbd_dev, 571 588 uint8_t *buffer, size_t actual_size) 572 589 { 573 assert(kbd_dev->initialized == USB HID_KBD_STATUS_INITIALIZED);574 assert(kbd_dev-> hid_dev->parser != NULL);590 assert(kbd_dev->initialized == USB_KBD_STATUS_INITIALIZED); 591 assert(kbd_dev->parser != NULL); 575 592 576 593 usb_hid_report_in_callbacks_t *callbacks = … … 578 595 sizeof(usb_hid_report_in_callbacks_t)); 579 596 580 callbacks->keyboard = usb hid_kbd_process_keycodes;597 callbacks->keyboard = usb_kbd_process_keycodes; 581 598 582 599 usb_log_debug("Calling usb_hid_parse_report() with " … … 585 602 // int rc = usb_hid_boot_keyboard_input_report(buffer, actual_size, 586 603 // callbacks, kbd_dev); 587 int rc = usb_hid_parse_report(kbd_dev->hid_dev->parser, buffer, 588 actual_size, callbacks, kbd_dev); 604 usb_hid_report_path_t *path = usb_hid_report_path(); 605 usb_hid_report_path_append_item(path, USB_HIDUT_PAGE_KEYBOARD, 0); 606 607 int rc = usb_hid_parse_report(kbd_dev->parser, buffer, 608 actual_size, path, USB_HID_PATH_COMPARE_STRICT, callbacks, kbd_dev); 609 610 usb_hid_report_path_free (path); 589 611 590 612 if (rc != EOK) { … … 597 619 /* HID/KBD structure manipulation */ 598 620 /*----------------------------------------------------------------------------*/ 621 622 static void usb_kbd_mark_unusable(usb_kbd_t *kbd_dev) 623 { 624 kbd_dev->initialized = USB_KBD_STATUS_TO_DESTROY; 625 } 626 627 628 /*----------------------------------------------------------------------------*/ 629 /* API functions */ 630 /*----------------------------------------------------------------------------*/ 599 631 /** 600 632 * Creates a new USB/HID keyboard structure. 601 633 * 602 634 * The structure returned by this function is not initialized. Use 603 * usb hid_kbd_init() to initialize it prior to polling.635 * usb_kbd_init() to initialize it prior to polling. 604 636 * 605 637 * @return New uninitialized structure for representing a USB/HID keyboard or 606 638 * NULL if not successful (memory error). 607 639 */ 608 static usbhid_kbd_t *usbhid_kbd_new(void)609 { 610 usb hid_kbd_t *kbd_dev =611 (usb hid_kbd_t *)malloc(sizeof(usbhid_kbd_t));640 usb_kbd_t *usb_kbd_new(void) 641 { 642 usb_kbd_t *kbd_dev = 643 (usb_kbd_t *)malloc(sizeof(usb_kbd_t)); 612 644 613 645 if (kbd_dev == NULL) { … … 616 648 } 617 649 618 memset(kbd_dev, 0, sizeof(usbhid_kbd_t)); 619 620 kbd_dev->hid_dev = usbhid_dev_new(); 621 if (kbd_dev->hid_dev == NULL) { 622 usb_log_fatal("Could not create HID device structure.\n"); 650 memset(kbd_dev, 0, sizeof(usb_kbd_t)); 651 652 kbd_dev->parser = (usb_hid_report_parser_t *)(malloc(sizeof( 653 usb_hid_report_parser_t))); 654 if (kbd_dev->parser == NULL) { 655 usb_log_fatal("No memory!\n"); 656 free(kbd_dev); 623 657 return NULL; 624 658 } 625 659 626 660 kbd_dev->console_phone = -1; 627 kbd_dev->initialized = USB HID_KBD_STATUS_UNINITIALIZED;661 kbd_dev->initialized = USB_KBD_STATUS_UNINITIALIZED; 628 662 629 663 return kbd_dev; 630 }631 632 /*----------------------------------------------------------------------------*/633 634 static void usbhid_kbd_mark_unusable(usbhid_kbd_t *kbd_dev)635 {636 kbd_dev->initialized = USBHID_KBD_STATUS_TO_DESTROY;637 664 } 638 665 … … 658 685 * @return Other value inherited from function usbhid_dev_init(). 659 686 */ 660 static int usbhid_kbd_init(usbhid_kbd_t *kbd_dev, ddf_dev_t *dev)687 int usb_kbd_init(usb_kbd_t *kbd_dev, usb_device_t *dev) 661 688 { 662 689 int rc; … … 671 698 672 699 if (dev == NULL) { 673 usb_log_error("Failed to init keyboard structure: no device"700 usb_log_error("Failed to init keyboard structure: no USB device" 674 701 " given.\n"); 675 702 return EINVAL; 676 703 } 677 704 678 if (kbd_dev->initialized == USB HID_KBD_STATUS_INITIALIZED) {705 if (kbd_dev->initialized == USB_KBD_STATUS_INITIALIZED) { 679 706 usb_log_warning("Keyboard structure already initialized.\n"); 680 707 return EINVAL; 681 708 } 682 709 683 rc = usbhid_dev_init(kbd_dev->hid_dev, dev, &poll_endpoint_description); 684 710 /* TODO: does not work! */ 711 if (!dev->pipes[USB_KBD_POLL_EP_NO].present) { 712 usb_log_warning("Required endpoint not found - probably not " 713 "a supported device.\n"); 714 return ENOTSUP; 715 } 716 717 /* The USB device should already be initialized, save it in structure */ 718 kbd_dev->usb_dev = dev; 719 720 /* Initialize the report parser. */ 721 rc = usb_hid_parser_init(kbd_dev->parser); 685 722 if (rc != EOK) { 686 usb_log_error("Failed to initialize HID device structure: %s\n", 687 str_error(rc)); 723 usb_log_error("Failed to initialize report parser.\n"); 688 724 return rc; 689 725 } 690 726 691 assert(kbd_dev->hid_dev->initialized == USBHID_KBD_STATUS_INITIALIZED); 692 693 // save the size of the report (boot protocol report by default) 694 // kbd_dev->key_count = BOOTP_REPORT_SIZE; 695 696 usb_hid_report_path_t path; 697 path.usage_page = USB_HIDUT_PAGE_KEYBOARD; 727 /* Get the report descriptor and parse it. */ 728 rc = usb_hid_process_report_descriptor(kbd_dev->usb_dev, 729 kbd_dev->parser); 730 if (rc != EOK) { 731 usb_log_warning("Could not process report descriptor, " 732 "falling back to boot protocol.\n"); 733 rc = usb_hid_parse_report_descriptor(kbd_dev->parser, 734 BOOT_REPORT_DESCRIPTOR, BOOT_REPORT_DESCRIPTOR_SIZE); 735 if (rc != EOK) { 736 usb_log_error("Failed to parse boot report descriptor:" 737 " %s.\n", str_error(rc)); 738 return rc; 739 } 740 741 rc = usbhid_req_set_protocol(&kbd_dev->usb_dev->ctrl_pipe, 742 kbd_dev->usb_dev->interface_no, USB_HID_PROTOCOL_BOOT); 743 744 if (rc != EOK) { 745 usb_log_warning("Failed to set boot protocol to the " 746 "device: %s\n", str_error(rc)); 747 return rc; 748 } 749 } 750 751 /* 752 * TODO: make more general 753 */ 754 usb_hid_report_path_t *path = usb_hid_report_path(); 755 usb_hid_report_path_append_item(path, USB_HIDUT_PAGE_KEYBOARD, 0); 698 756 kbd_dev->key_count = usb_hid_report_input_length( 699 kbd_dev->hid_dev->parser, &path); 757 kbd_dev->parser, path, USB_HID_PATH_COMPARE_STRICT); 758 usb_hid_report_path_free (path); 700 759 701 760 usb_log_debug("Size of the input report: %zu\n", kbd_dev->key_count); … … 729 788 730 789 /* 731 * Set boot protocol.732 790 * Set LEDs according to initial setup. 733 791 * Set Idle rate 734 792 */ 735 assert(kbd_dev->hid_dev != NULL); 736 assert(kbd_dev->hid_dev->initialized); 737 //usbhid_req_set_protocol(kbd_dev->hid_dev, USB_HID_PROTOCOL_BOOT); 738 739 usbhid_kbd_set_led(kbd_dev); 740 741 usbhid_req_set_idle(kbd_dev->hid_dev, IDLE_RATE); 742 743 kbd_dev->initialized = USBHID_KBD_STATUS_INITIALIZED; 793 usb_kbd_set_led(kbd_dev); 794 795 usbhid_req_set_idle(&kbd_dev->usb_dev->ctrl_pipe, 796 kbd_dev->usb_dev->interface_no, IDLE_RATE); 797 798 kbd_dev->initialized = USB_KBD_STATUS_INITIALIZED; 744 799 usb_log_debug("HID/KBD device structure initialized.\n"); 745 800 … … 748 803 749 804 /*----------------------------------------------------------------------------*/ 750 /* HID/KBD polling */ 751 /*----------------------------------------------------------------------------*/ 752 /** 753 * Main keyboard polling function. 754 * 755 * This function uses the Interrupt In pipe of the keyboard to poll for events. 756 * The keyboard is initialized in a way that it reports only when a key is 757 * pressed or released, so there is no actual need for any sleeping between 758 * polls (see usbhid_kbd_try_add_device() or usbhid_kbd_init()). 759 * 760 * @param kbd_dev Initialized keyboard structure representing the device to 761 * poll. 762 * 763 * @sa usbhid_kbd_process_data() 764 */ 765 static void usbhid_kbd_poll(usbhid_kbd_t *kbd_dev) 766 { 767 int rc, sess_rc; 768 uint8_t buffer[BOOTP_BUFFER_SIZE]; 769 size_t actual_size; 770 771 usb_log_debug("Polling keyboard...\n"); 772 773 if (!kbd_dev->initialized) { 774 usb_log_error("HID/KBD device not initialized!\n"); 775 return; 776 } 777 778 assert(kbd_dev->hid_dev != NULL); 779 assert(kbd_dev->hid_dev->initialized); 780 781 while (true) { 782 sess_rc = usb_pipe_start_session( 783 &kbd_dev->hid_dev->poll_pipe); 784 if (sess_rc != EOK) { 785 usb_log_warning("Failed to start a session: %s.\n", 786 str_error(sess_rc)); 787 break; 788 } 789 790 rc = usb_pipe_read(&kbd_dev->hid_dev->poll_pipe, 791 buffer, BOOTP_BUFFER_SIZE, &actual_size); 792 793 sess_rc = usb_pipe_end_session( 794 &kbd_dev->hid_dev->poll_pipe); 795 796 if (rc != EOK) { 797 usb_log_warning("Error polling the keyboard: %s.\n", 798 str_error(rc)); 799 break; 800 } 801 802 if (sess_rc != EOK) { 803 usb_log_warning("Error closing session: %s.\n", 804 str_error(sess_rc)); 805 break; 806 } 807 808 /* 809 * If the keyboard answered with NAK, it returned no data. 810 * This implies that no change happened since last query. 811 */ 812 if (actual_size == 0) { 813 usb_log_debug("Keyboard returned NAK\n"); 814 continue; 815 } 816 817 /* 818 * TODO: Process pressed keys. 819 */ 820 usb_log_debug("Calling usbhid_kbd_process_data()\n"); 821 usbhid_kbd_process_data(kbd_dev, buffer, actual_size); 822 823 // disabled for now, no reason to sleep 824 //async_usleep(kbd_dev->hid_dev->poll_interval); 825 } 826 } 827 828 /*----------------------------------------------------------------------------*/ 829 /** 830 * Function executed by the main driver fibril. 831 * 832 * Just starts polling the keyboard for events. 833 * 834 * @param arg Initialized keyboard device structure (of type usbhid_kbd_t) 835 * representing the device. 836 * 837 * @retval EOK if the fibril finished polling the device. 838 * @retval EINVAL if no device was given in the argument. 839 * 840 * @sa usbhid_kbd_poll() 841 * 842 * @todo Change return value - only case when the fibril finishes is in case 843 * of some error, so the error should probably be propagated from function 844 * usbhid_kbd_poll() to here and up. 845 */ 846 static int usbhid_kbd_fibril(void *arg) 847 { 848 if (arg == NULL) { 849 usb_log_error("No device!\n"); 850 return EINVAL; 851 } 852 853 usbhid_kbd_t *kbd_dev = (usbhid_kbd_t *)arg; 854 855 usbhid_kbd_poll(kbd_dev); 856 857 // as there is another fibril using this device, so we must leave the 858 // structure to it, but mark it for destroying. 859 usbhid_kbd_mark_unusable(kbd_dev); 860 // at the end, properly destroy the KBD structure 861 // usbhid_kbd_free(&kbd_dev); 862 // assert(kbd_dev == NULL); 863 864 return EOK; 865 } 866 867 /*----------------------------------------------------------------------------*/ 868 /* API functions */ 869 /*----------------------------------------------------------------------------*/ 870 /** 871 * Function for adding a new device of type USB/HID/keyboard. 872 * 873 * This functions initializes required structures from the device's descriptors 874 * and starts new fibril for polling the keyboard for events and another one for 875 * handling auto-repeat of keys. 876 * 877 * During initialization, the keyboard is switched into boot protocol, the idle 878 * rate is set to 0 (infinity), resulting in the keyboard only reporting event 879 * when a key is pressed or released. Finally, the LED lights are turned on 880 * according to the default setup of lock keys. 881 * 882 * @note By default, the keyboards is initialized with Num Lock turned on and 883 * other locks turned off. 884 * @note Currently supports only boot-protocol keyboards. 885 * 886 * @param dev Device to add. 887 * 888 * @retval EOK if successful. 889 * @retval ENOMEM if there 890 * @return Other error code inherited from one of functions usbhid_kbd_init(), 891 * ddf_fun_bind() and ddf_fun_add_to_class(). 892 * 893 * @sa usbhid_kbd_fibril(), usbhid_kbd_repeat_fibril() 894 */ 895 int usbhid_kbd_try_add_device(ddf_dev_t *dev) 896 { 897 /* 898 * Create default function. 899 */ 900 ddf_fun_t *kbd_fun = ddf_fun_create(dev, fun_exposed, "keyboard"); 901 if (kbd_fun == NULL) { 902 usb_log_error("Could not create DDF function node.\n"); 903 return ENOMEM; 904 } 905 906 /* 907 * Initialize device (get and process descriptors, get address, etc.) 908 */ 909 usb_log_debug("Initializing USB/HID KBD device...\n"); 910 911 usbhid_kbd_t *kbd_dev = usbhid_kbd_new(); 912 if (kbd_dev == NULL) { 913 usb_log_error("Error while creating USB/HID KBD device " 914 "structure.\n"); 915 ddf_fun_destroy(kbd_fun); 916 return ENOMEM; // TODO: some other code?? 917 } 918 919 int rc = usbhid_kbd_init(kbd_dev, dev); 920 921 if (rc != EOK) { 922 usb_log_error("Failed to initialize USB/HID KBD device.\n"); 923 ddf_fun_destroy(kbd_fun); 924 usbhid_kbd_free(&kbd_dev); 925 return rc; 926 } 927 928 usb_log_debug("USB/HID KBD device structure initialized.\n"); 929 930 /* 931 * Store the initialized keyboard device and keyboard ops 932 * to the DDF function. 933 */ 934 kbd_fun->driver_data = kbd_dev; 935 kbd_fun->ops = &keyboard_ops; 936 937 rc = ddf_fun_bind(kbd_fun); 938 if (rc != EOK) { 939 usb_log_error("Could not bind DDF function: %s.\n", 940 str_error(rc)); 941 // TODO: Can / should I destroy the DDF function? 942 ddf_fun_destroy(kbd_fun); 943 usbhid_kbd_free(&kbd_dev); 944 return rc; 945 } 946 947 rc = ddf_fun_add_to_class(kbd_fun, "keyboard"); 948 if (rc != EOK) { 949 usb_log_error( 950 "Could not add DDF function to class 'keyboard': %s.\n", 951 str_error(rc)); 952 // TODO: Can / should I destroy the DDF function? 953 ddf_fun_destroy(kbd_fun); 954 usbhid_kbd_free(&kbd_dev); 955 return rc; 956 } 957 958 /* 959 * Create new fibril for handling this keyboard 960 */ 961 fid_t fid = fibril_create(usbhid_kbd_fibril, kbd_dev); 962 if (fid == 0) { 963 usb_log_error("Failed to start fibril for `%s' device.\n", 964 dev->name); 965 return ENOMEM; 966 } 967 fibril_add_ready(fid); 968 969 /* 970 * Create new fibril for auto-repeat 971 */ 972 fid = fibril_create(usbhid_kbd_repeat_fibril, kbd_dev); 973 if (fid == 0) { 974 usb_log_error("Failed to start fibril for KBD auto-repeat"); 975 return ENOMEM; 976 } 977 fibril_add_ready(fid); 978 979 (void)keyboard_ops; 980 981 /* 982 * Hurrah, device is initialized. 983 */ 984 return EOK; 985 } 986 987 /*----------------------------------------------------------------------------*/ 988 989 int usbhid_kbd_is_usable(const usbhid_kbd_t *kbd_dev) 990 { 991 return (kbd_dev->initialized == USBHID_KBD_STATUS_INITIALIZED); 805 806 bool usb_kbd_polling_callback(usb_device_t *dev, uint8_t *buffer, 807 size_t buffer_size, void *arg) 808 { 809 if (dev == NULL || buffer == NULL || arg == NULL) { 810 // do not continue polling (???) 811 return false; 812 } 813 814 usb_kbd_t *kbd_dev = (usb_kbd_t *)arg; 815 816 // TODO: add return value from this function 817 usb_kbd_process_data(kbd_dev, buffer, buffer_size); 818 819 return true; 820 } 821 822 /*----------------------------------------------------------------------------*/ 823 824 void usb_kbd_polling_ended_callback(usb_device_t *dev, bool reason, 825 void *arg) 826 { 827 if (dev == NULL || arg == NULL) { 828 return; 829 } 830 831 usb_kbd_t *kbd = (usb_kbd_t *)arg; 832 833 usb_kbd_mark_unusable(kbd); 834 } 835 836 /*----------------------------------------------------------------------------*/ 837 838 int usb_kbd_is_initialized(const usb_kbd_t *kbd_dev) 839 { 840 return (kbd_dev->initialized == USB_KBD_STATUS_INITIALIZED); 841 } 842 843 /*----------------------------------------------------------------------------*/ 844 845 int usb_kbd_is_ready_to_destroy(const usb_kbd_t *kbd_dev) 846 { 847 return (kbd_dev->initialized == USB_KBD_STATUS_TO_DESTROY); 992 848 } 993 849 … … 998 854 * @param kbd_dev Pointer to the structure to be destroyed. 999 855 */ 1000 void usb hid_kbd_free(usbhid_kbd_t **kbd_dev)856 void usb_kbd_free(usb_kbd_t **kbd_dev) 1001 857 { 1002 858 if (kbd_dev == NULL || *kbd_dev == NULL) { … … 1007 863 async_hangup((*kbd_dev)->console_phone); 1008 864 1009 if ((*kbd_dev)->hid_dev != NULL) {1010 usbhid_dev_free(&(*kbd_dev)->hid_dev);1011 assert((*kbd_dev)->hid_dev == NULL);1012 }865 // if ((*kbd_dev)->hid_dev != NULL) { 866 // usbhid_dev_free(&(*kbd_dev)->hid_dev); 867 // assert((*kbd_dev)->hid_dev == NULL); 868 // } 1013 869 1014 870 if ((*kbd_dev)->repeat_mtx != NULL) { … … 1017 873 free((*kbd_dev)->repeat_mtx); 1018 874 } 875 876 // destroy the parser 877 if ((*kbd_dev)->parser != NULL) { 878 usb_hid_free_report_parser((*kbd_dev)->parser); 879 } 880 881 /* TODO: what about the USB device structure?? */ 1019 882 1020 883 free(*kbd_dev); -
uspace/drv/usbkbd/kbddev.h
rda88eb82 r095b2017 34 34 */ 35 35 36 #ifndef USB HID_KBDDEV_H_37 #define USB HID_KBDDEV_H_36 #ifndef USB_KBDDEV_H_ 37 #define USB_KBDDEV_H_ 38 38 39 39 #include <stdint.h> … … 45 45 #include <ddf/driver.h> 46 46 #include <usb/pipes.h> 47 #include <usb/devdrv.h> 47 48 48 #include " hiddev.h"49 #include "kbdrepeat.h" 49 50 50 51 /*----------------------------------------------------------------------------*/ 51 /**52 * Structure for keeping information needed for auto-repeat of keys.53 */54 typedef struct {55 /** Last pressed key. */56 unsigned int key_new;57 /** Key to be repeated. */58 unsigned int key_repeated;59 /** Delay before first repeat in microseconds. */60 unsigned int delay_before;61 /** Delay between repeats in microseconds. */62 unsigned int delay_between;63 } usbhid_kbd_repeat_t;64 65 52 /** 66 53 * USB/HID keyboard device type. … … 75 62 * being device-specific. 76 63 */ 77 typedef struct { 78 /** Structure holding generic USB/HID device information. */ 79 usbhid_dev_t *hid_dev; 64 typedef struct usb_kbd_t { 65 /** Structure holding generic USB device information. */ 66 //usbhid_dev_t *hid_dev; 67 usb_device_t *usb_dev; 80 68 81 69 /** Currently pressed keys (not translated to key codes). */ … … 96 84 97 85 /** Information for auto-repeat of keys. */ 98 usb hid_kbd_repeat_t repeat;86 usb_kbd_repeat_t repeat; 99 87 100 88 /** Mutex for accessing the information about auto-repeat. */ 101 89 fibril_mutex_t *repeat_mtx; 90 91 /** Report descriptor. */ 92 uint8_t *report_desc; 93 94 /** Report descriptor size. */ 95 size_t report_desc_size; 96 97 /** HID Report parser. */ 98 usb_hid_report_parser_t *parser; 102 99 103 100 /** State of the structure (for checking before use). … … 108 105 */ 109 106 int initialized; 110 } usb hid_kbd_t;107 } usb_kbd_t; 111 108 112 109 /*----------------------------------------------------------------------------*/ 113 110 114 int usbhid_kbd_try_add_device(ddf_dev_t *dev); 111 enum { 112 USB_KBD_POLL_EP_NO = 0, 113 USB_KBD_POLL_EP_COUNT = 1 114 }; 115 115 116 int usbhid_kbd_is_usable(const usbhid_kbd_t *kbd_dev);116 usb_endpoint_description_t *usb_kbd_endpoints[USB_KBD_POLL_EP_COUNT + 1]; 117 117 118 void usbhid_kbd_free(usbhid_kbd_t **kbd_dev);118 ddf_dev_ops_t keyboard_ops; 119 119 120 void usbhid_kbd_push_ev(usbhid_kbd_t *kbd_dev, int type, unsigned int key); 120 /*----------------------------------------------------------------------------*/ 121 121 122 #endif /* USBHID_KBDDEV_H_ */ 122 usb_kbd_t *usb_kbd_new(void); 123 124 int usb_kbd_init(usb_kbd_t *kbd_dev, usb_device_t *dev); 125 126 bool usb_kbd_polling_callback(usb_device_t *dev, uint8_t *buffer, 127 size_t buffer_size, void *arg); 128 129 void usb_kbd_polling_ended_callback(usb_device_t *dev, bool reason, 130 void *arg); 131 132 int usb_kbd_is_initialized(const usb_kbd_t *kbd_dev); 133 134 int usb_kbd_is_ready_to_destroy(const usb_kbd_t *kbd_dev); 135 136 void usb_kbd_free(usb_kbd_t **kbd_dev); 137 138 void usb_kbd_push_ev(usb_kbd_t *kbd_dev, int type, unsigned int key); 139 140 #endif /* USB_KBDDEV_H_ */ 123 141 124 142 /** -
uspace/drv/usbkbd/kbdrepeat.c
rda88eb82 r095b2017 62 62 * 63 63 * If the currently repeated key is not pressed any more ( 64 * usb hid_kbd_repeat_stop() was called), it stops repeating it and starts64 * usb_kbd_repeat_stop() was called), it stops repeating it and starts 65 65 * checking again. 66 66 * … … 70 70 * @param kbd Keyboard device structure. 71 71 */ 72 static void usb hid_kbd_repeat_loop(usbhid_kbd_t *kbd)72 static void usb_kbd_repeat_loop(usb_kbd_t *kbd) 73 73 { 74 74 unsigned int delay = 0; … … 78 78 while (true) { 79 79 // check if the kbd structure is usable 80 if (!usbhid_kbd_is_usable(kbd)) { 81 usbhid_kbd_free(&kbd); 82 assert(kbd == NULL); 80 if (!usb_kbd_is_initialized(kbd)) { 81 if (usb_kbd_is_ready_to_destroy(kbd)) { 82 usb_kbd_free(&kbd); 83 assert(kbd == NULL); 84 } 83 85 return; 84 86 } … … 90 92 usb_log_debug2("Repeating key: %u.\n", 91 93 kbd->repeat.key_repeated); 92 usb hid_kbd_push_ev(kbd, KEY_PRESS,94 usb_kbd_push_ev(kbd, KEY_PRESS, 93 95 kbd->repeat.key_repeated); 94 96 delay = kbd->repeat.delay_between; … … 125 127 * @retval EINVAL if no argument is supplied. 126 128 */ 127 int usb hid_kbd_repeat_fibril(void *arg)129 int usb_kbd_repeat_fibril(void *arg) 128 130 { 129 131 usb_log_debug("Autorepeat fibril spawned.\n"); … … 134 136 } 135 137 136 usb hid_kbd_t *kbd = (usbhid_kbd_t *)arg;138 usb_kbd_t *kbd = (usb_kbd_t *)arg; 137 139 138 usb hid_kbd_repeat_loop(kbd);140 usb_kbd_repeat_loop(kbd); 139 141 140 142 return EOK; … … 152 154 * @param key Key to start repeating. 153 155 */ 154 void usb hid_kbd_repeat_start(usbhid_kbd_t *kbd, unsigned int key)156 void usb_kbd_repeat_start(usb_kbd_t *kbd, unsigned int key) 155 157 { 156 158 fibril_mutex_lock(kbd->repeat_mtx); … … 170 172 * @param key Key to stop repeating. 171 173 */ 172 void usb hid_kbd_repeat_stop(usbhid_kbd_t *kbd, unsigned int key)174 void usb_kbd_repeat_stop(usb_kbd_t *kbd, unsigned int key) 173 175 { 174 176 fibril_mutex_lock(kbd->repeat_mtx); -
uspace/drv/usbkbd/kbdrepeat.h
rda88eb82 r095b2017 34 34 */ 35 35 36 #ifndef USB HID_KBDREPEAT_H_37 #define USB HID_KBDREPEAT_H_36 #ifndef USB_KBDREPEAT_H_ 37 #define USB_KBDREPEAT_H_ 38 38 39 #include "kbddev.h" 39 struct usb_kbd_t; 40 41 /*----------------------------------------------------------------------------*/ 42 /** 43 * Structure for keeping information needed for auto-repeat of keys. 44 */ 45 typedef struct { 46 /** Last pressed key. */ 47 unsigned int key_new; 48 /** Key to be repeated. */ 49 unsigned int key_repeated; 50 /** Delay before first repeat in microseconds. */ 51 unsigned int delay_before; 52 /** Delay between repeats in microseconds. */ 53 unsigned int delay_between; 54 } usb_kbd_repeat_t; 40 55 41 56 /*----------------------------------------------------------------------------*/ 42 57 43 int usb hid_kbd_repeat_fibril(void *arg);58 int usb_kbd_repeat_fibril(void *arg); 44 59 45 void usb hid_kbd_repeat_start(usbhid_kbd_t *kbd, unsigned int key);60 void usb_kbd_repeat_start(struct usb_kbd_t *kbd, unsigned int key); 46 61 47 void usb hid_kbd_repeat_stop(usbhid_kbd_t *kbd, unsigned int key);62 void usb_kbd_repeat_stop(struct usb_kbd_t *kbd, unsigned int key); 48 63 49 #endif /* USB HID_KBDREPEAT_H_ */64 #endif /* USB_KBDREPEAT_H_ */ 50 65 51 66 /** -
uspace/drv/usbkbd/layout.h
rda88eb82 r095b2017 36 36 */ 37 37 38 #ifndef USB HID_LAYOUT_H_39 #define USB HID_LAYOUT_H_38 #ifndef USB_KBD_LAYOUT_H_ 39 #define USB_KBD_LAYOUT_H_ 40 40 41 41 #include <sys/types.h>
Note:
See TracChangeset
for help on using the changeset viewer.
