On 2025-10-29, Martin <[email protected]> wrote:
> First time some tests have been performed with OpenBSD 7.7 + Iridium and 
> Chromium browsers with connected NanoKVM USB (USB camera + audio + uhid input 
> device emulation) composite device.
>
> The same machine (OpenBSD 7.7 and 7.8 after upgrade) hosts nginx server with 
> web page to access NanoKVM USB.
>
> By opening a link http://nanokvm.local in Iridium or Chromium browser on the 
> same machine resolves and opens NanoKVM access page with drop down menu which 
> asks to access camera and microphone device. Once permissions are granted 
> "Select USB device" drop down menu has appeared with "USB3 Video" and "Select 
> Serial Device" button to access NanoKVM USB video from remote PC where 
> NanoKVM is connected.
>
> Once "Select Serial Device" button is pressed on the nanokvm.local web page, 
> Iridium and Chromium browsers crash with core dump.

No idea if it will help but you could try building a kernel with a
quirk added to prevent the hid interface from attaching to uhid so that
it falls back to ugen. See UQ_BAD_HID in usb_quirks.c. Seems the serial
port device is attached behind the HID presumably so browsers can get
access to it with webhid-like mechanisms (as also used for fido keys
etc) rather than webusb. I guess you may need to disable some pledge/
unveil too.

Generally OpenBSD is not the right OS for accessing random USB hardware
from userland.

FWIW I used to take a usb hdmi capture stick (and small keyboard) for this
use-case (iirc I used vlc or ffplay with our v4l2 compat) but gave up
on it and got a jetkvm instead which I'm pretty happy with. Much easier
to handle via network than USB.


Reply via email to