1 // Copyright (c) 2014 The Chromium Authors. All rights reserved.
2 // Use of this source code is governed by a BSD-style license that can be
3 // found in the LICENSE file.
5 #include "device/hid/hid_connection_linux.h"
10 #include <linux/hidraw.h>
11 #include <sys/ioctl.h>
15 #include "base/files/file_path.h"
16 #include "base/message_loop/message_loop.h"
17 #include "base/posix/eintr_wrapper.h"
18 #include "base/threading/thread_restrictions.h"
19 #include "base/tuple.h"
20 #include "device/hid/hid_service.h"
22 // These are already defined in newer versions of linux/hidraw.h.
23 #ifndef HIDIOCSFEATURE
24 #define HIDIOCSFEATURE(len) _IOC(_IOC_WRITE | _IOC_READ, 'H', 0x06, len)
26 #ifndef HIDIOCGFEATURE
27 #define HIDIOCGFEATURE(len) _IOC(_IOC_WRITE | _IOC_READ, 'H', 0x07, len)
32 HidConnectionLinux::HidConnectionLinux(HidDeviceInfo device_info
,
34 : HidConnection(device_info
) {
35 int flags
= base::File::FLAG_OPEN
|
36 base::File::FLAG_READ
|
37 base::File::FLAG_WRITE
;
39 base::File
device_file(base::FilePath(dev_node
), flags
);
40 if (!device_file
.IsValid()) {
41 base::File::Error file_error
= device_file
.error_details();
43 if (file_error
== base::File::FILE_ERROR_ACCESS_DENIED
) {
44 VLOG(1) << "Access denied opening device read-write, trying read-only.";
46 flags
= base::File::FLAG_OPEN
| base::File::FLAG_READ
;
48 device_file
= base::File(base::FilePath(dev_node
), flags
);
51 if (!device_file
.IsValid()) {
52 LOG(ERROR
) << "Failed to open '" << dev_node
<< "': "
53 << base::File::ErrorToString(device_file
.error_details());
57 if (fcntl(device_file
.GetPlatformFile(), F_SETFL
,
58 fcntl(device_file
.GetPlatformFile(), F_GETFL
) | O_NONBLOCK
)) {
59 PLOG(ERROR
) << "Failed to set non-blocking flag to device file";
62 device_file_
= device_file
.Pass();
64 if (!base::MessageLoopForIO::current()->WatchFileDescriptor(
65 device_file_
.GetPlatformFile(),
67 base::MessageLoopForIO::WATCH_READ_WRITE
,
68 &device_file_watcher_
,
70 LOG(ERROR
) << "Failed to start watching device file.";
74 HidConnectionLinux::~HidConnectionLinux() {
79 void HidConnectionLinux::PlatformRead(const ReadCallback
& callback
) {
80 PendingHidRead pending_read
;
81 pending_read
.callback
= callback
;
82 pending_reads_
.push(pending_read
);
86 void HidConnectionLinux::PlatformWrite(scoped_refptr
<net::IOBuffer
> buffer
,
88 const WriteCallback
& callback
) {
89 // Linux expects the first byte of the buffer to always be a report ID so the
90 // buffer can be used directly.
91 const ssize_t bytes_written
=
92 HANDLE_EINTR(write(device_file_
.GetPlatformFile(), buffer
->data(), size
));
93 if (bytes_written
< 0) {
94 VPLOG(1) << "Write failed";
98 if (static_cast<size_t>(bytes_written
) != size
) {
99 LOG(WARNING
) << "Incomplete HID write: " << bytes_written
106 void HidConnectionLinux::PlatformGetFeatureReport(
108 const ReadCallback
& callback
) {
109 // The first byte of the destination buffer is the report ID being requested
110 // and is overwritten by the feature report.
111 DCHECK_GT(device_info().max_feature_report_size
, 0);
112 scoped_refptr
<net::IOBufferWithSize
> buffer(
113 new net::IOBufferWithSize(device_info().max_feature_report_size
));
114 buffer
->data()[0] = report_id
;
116 int result
= ioctl(device_file_
.GetPlatformFile(),
117 HIDIOCGFEATURE(buffer
->size()),
120 VPLOG(1) << "Failed to get feature report";
121 callback
.Run(false, NULL
, 0);
123 callback
.Run(true, buffer
, result
);
127 void HidConnectionLinux::PlatformSendFeatureReport(
128 scoped_refptr
<net::IOBuffer
> buffer
,
130 const WriteCallback
& callback
) {
131 // Linux expects the first byte of the buffer to always be a report ID so the
132 // buffer can be used directly.
134 device_file_
.GetPlatformFile(), HIDIOCSFEATURE(size
), buffer
->data());
136 VPLOG(1) << "Failed to send feature report";
143 void HidConnectionLinux::OnFileCanReadWithoutBlocking(int fd
) {
144 DCHECK(thread_checker().CalledOnValidThread());
145 DCHECK_EQ(fd
, device_file_
.GetPlatformFile());
147 size_t expected_report_size
= device_info().max_input_report_size
+ 1;
148 scoped_refptr
<net::IOBuffer
> buffer(new net::IOBuffer(expected_report_size
));
149 char* data
= buffer
->data();
150 if (!device_info().has_report_id
) {
151 // Linux will not prefix the buffer with a report ID if they are not used
155 expected_report_size
--;
158 ssize_t bytes_read
= HANDLE_EINTR(
159 read(device_file_
.GetPlatformFile(), data
, expected_report_size
));
160 if (bytes_read
< 0) {
161 if (errno
== EAGAIN
) {
164 VPLOG(1) << "Read failed";
168 if (!device_info().has_report_id
) {
169 // Include the byte prepended earlier.
173 ProcessInputReport(buffer
, bytes_read
);
176 void HidConnectionLinux::OnFileCanWriteWithoutBlocking(int fd
) {
179 void HidConnectionLinux::Disconnect() {
180 DCHECK(thread_checker().CalledOnValidThread());
181 device_file_watcher_
.StopWatchingFileDescriptor();
182 device_file_
.Close();
187 void HidConnectionLinux::Flush() {
188 while (!pending_reads_
.empty()) {
189 pending_reads_
.front().callback
.Run(false, NULL
, 0);
190 pending_reads_
.pop();
194 void HidConnectionLinux::ProcessInputReport(scoped_refptr
<net::IOBuffer
> buffer
,
196 DCHECK(thread_checker().CalledOnValidThread());
197 PendingHidReport report
;
198 report
.buffer
= buffer
;
200 pending_reports_
.push(report
);
204 void HidConnectionLinux::ProcessReadQueue() {
205 DCHECK(thread_checker().CalledOnValidThread());
206 while (pending_reads_
.size() && pending_reports_
.size()) {
207 PendingHidRead read
= pending_reads_
.front();
208 PendingHidReport report
= pending_reports_
.front();
210 pending_reports_
.pop();
211 if (CompleteRead(report
.buffer
, report
.size
, read
.callback
)) {
212 pending_reads_
.pop();
217 } // namespace device