From nobody Sat Nov 30 07:44:08 2024 Received: from smtp.kernel.org (aws-us-west-2-korg-mail-1.web.codeaurora.org [10.30.226.201]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id CD30B199952; Tue, 10 Sep 2024 14:43:52 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=10.30.226.201 ARC-Seal: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1725979432; cv=none; b=b1VKqM6QRTTEd7DR5vPig2DHb2fteHzr/w6rLgLyI5SC21kyZlONmuFf6MPCMl55rUNy93tuUI7tylgaOIiHBQCcpXcPtA1E4ZXPFU5bwhdnPmgz3AdOy6DxJZPXEXi7qJpeLw46RLLLCZPVdPDjZLLleadiRvhuimeVJg2EIVo= ARC-Message-Signature: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1725979432; c=relaxed/simple; bh=w2GuvfapADWngezjPqhaRKjXMs8AxDtj7AKQPZiO04o=; h=From:Date:Subject:MIME-Version:Content-Type:Message-Id:References: In-Reply-To:To:Cc; b=SRjnyZ9/n9lDbncTZmCjft4YGsSROHk4HB/1h1UVzaEHih3ohQWVUrO66CkAeR4zR+djGKLjCAQGK7nypQ8lilA7YEex9F0MiowtpAdeLcghdSpgspceKD7lx8idwsYXRyHspLDevCmjv2JO14tKLWSjUmqqA1eZdiD/uUazvKQ= ARC-Authentication-Results: i=1; smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=kernel.org header.i=@kernel.org header.b=EYOlfhS2; arc=none smtp.client-ip=10.30.226.201 Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=kernel.org header.i=@kernel.org header.b="EYOlfhS2" Received: by smtp.kernel.org (Postfix) with ESMTPSA id A845DC4CEC4; Tue, 10 Sep 2024 14:43:50 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1725979432; bh=w2GuvfapADWngezjPqhaRKjXMs8AxDtj7AKQPZiO04o=; h=From:Date:Subject:References:In-Reply-To:To:Cc:From; b=EYOlfhS2sa+fLm8PS0MOo5NQJ7R20BEKib5MJhHATx65nQs54O1eIN/2bKh3/qHKd qXZ5LneshTX8P4KhgRdOGaTp9ph+y/CRMQ0r9btqf2sUpY06b882Z929BhB2pkTC4p BAahp9O7GqQoUSihQOtl3NAJ/ZYlaqC81rIt2uNlHidTWBBDbPoqGynD652PUWTdLA C2o28083hoczGWII9SsZ1x1ofJko7lRZmDvixuCRdQKKgE/ItqlgEczLbY6Mu5rNf3 xHjA+FS9Ptsj3HZx8cGbsu/ZnaUPB8QCGvoEAV83jMcmFWdjkdiR1a13VJ27aFQKjQ /FAlZse1O0m+Q== From: Benjamin Tissoires Date: Tue, 10 Sep 2024 23:43:37 +0900 Subject: [PATCH HID v2 01/11] HID: bpf: move HID-BPF report descriptor fixup earlier Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: quoted-printable Message-Id: <20240910-hid-bpf-hid-generic-v2-1-083dfc189e97@kernel.org> References: <20240910-hid-bpf-hid-generic-v2-0-083dfc189e97@kernel.org> In-Reply-To: <20240910-hid-bpf-hid-generic-v2-0-083dfc189e97@kernel.org> To: Jiri Kosina , Peter Hutterer , Vicki Pfau , Shuah Khan Cc: linux-input@vger.kernel.org, linux-kselftest@vger.kernel.org, linux-kernel@vger.kernel.org, bpf@vger.kernel.org, Benjamin Tissoires X-Mailer: b4 0.14.1 X-Developer-Signature: v=1; a=ed25519-sha256; t=1725979428; l=7588; i=bentiss@kernel.org; s=20230215; h=from:subject:message-id; bh=w2GuvfapADWngezjPqhaRKjXMs8AxDtj7AKQPZiO04o=; b=agec0rI0QU0hVLvpvSXvLP9nPKm6u6c+g2P0Ec0M9MCueLCNyStIERaq4dGic+T4JCsiNwtXq Bl473uUW1I/B4rMfAuh4gszoLuHMCUW3Sn8RZejb1pgj0o5NyvN0TNb X-Developer-Key: i=bentiss@kernel.org; a=ed25519; pk=7D1DyAVh6ajCkuUTudt/chMuXWIJHlv2qCsRkIizvFw= Currently, hid_bpf_rdesc_fixup() is called once the match between the HID device and the driver is done. This can be problematic in case the driver selected by the kernel would change the report descriptor after the fact. To give a chance for hid_bpf_rdesc_fixup() to provide hints on to how to select a dedicated driver or not, move the call to that BPF hook earlier in the .probe() process, when we get the first match. However, this means that we might get called more than once (typically once for hid-generic, and once for hid-vendor-specific). So we store the result of HID-BPF fixup in struct hid_device. If that new value is NULL, we need to use ->dev_rdesc. In order to not grow struct hid_device, some fields are re-ordered. This was the output of pahole for the first 128 bytes: struct hid_device { __u8 * dev_rdesc; /* 0 8 */ unsigned int dev_rsize; /* 8 4 */ /* XXX 4 bytes hole, try to pack */ __u8 * rdesc; /* 16 8 */ unsigned int rsize; /* 24 4 */ /* XXX 4 bytes hole, try to pack */ struct hid_collection * collection; /* 32 8 */ unsigned int collection_size; /* 40 4 */ unsigned int maxcollection; /* 44 4 */ unsigned int maxapplication; /* 48 4 */ __u16 bus; /* 52 2 */ __u16 group; /* 54 2 */ __u32 vendor; /* 56 4 */ __u32 product; /* 60 4 */ /* --- cacheline 1 boundary (64 bytes) --- */ __u32 version; /* 64 4 */ enum hid_type type; /* 68 4 */ unsigned int country; /* 72 4 */ /* XXX 4 bytes hole, try to pack */ struct hid_report_enum report_enum[3]; /* 80 6216 */ Basically, we got three holes of 4 bytes. We can reorder things a little and makes those 3 holes a continuous 12 bytes hole, which can be replaced by the new pointer and the new unsigned int we need. In terms of code allocation, when not using HID-BPF, we are back to kernel v6.2 in hid_open_report(). These multiple kmemdup() calls will be fixed in a later commit. Signed-off-by: Benjamin Tissoires --- new in v2 --- drivers/hid/bpf/hid_bpf_dispatch.c | 8 ++++++-- drivers/hid/hid-core.c | 17 +++++++++++++---- include/linux/hid.h | 18 ++++++++++-------- include/linux/hid_bpf.h | 9 ++------- 4 files changed, 31 insertions(+), 21 deletions(-) diff --git a/drivers/hid/bpf/hid_bpf_dispatch.c b/drivers/hid/bpf/hid_bpf_d= ispatch.c index 8420c227e21b..58839c125fba 100644 --- a/drivers/hid/bpf/hid_bpf_dispatch.c +++ b/drivers/hid/bpf/hid_bpf_dispatch.c @@ -183,7 +183,7 @@ u8 *call_hid_bpf_rdesc_fixup(struct hid_device *hdev, c= onst u8 *rdesc, unsigned =20 ignore_bpf: kfree(ctx_kern.data); - return kmemdup(rdesc, *size, GFP_KERNEL); + return NULL; } EXPORT_SYMBOL_GPL(call_hid_bpf_rdesc_fixup); =20 @@ -260,8 +260,12 @@ int hid_bpf_allocate_event_data(struct hid_device *hde= v) =20 int hid_bpf_reconnect(struct hid_device *hdev) { - if (!test_and_set_bit(ffs(HID_STAT_REPROBED), &hdev->status)) + if (!test_and_set_bit(ffs(HID_STAT_REPROBED), &hdev->status)) { + kfree(hdev->bpf_rdesc); + hdev->bpf_rdesc =3D NULL; + hdev->bpf_rsize =3D 0; return device_reprobe(&hdev->dev); + } =20 return 0; } diff --git a/drivers/hid/hid-core.c b/drivers/hid/hid-core.c index 311069588321..a5f5415571cb 100644 --- a/drivers/hid/hid-core.c +++ b/drivers/hid/hid-core.c @@ -708,6 +708,7 @@ void hiddev_free(struct kref *ref) =20 hid_close_report(hid); kfree(hid->dev_rdesc); + kfree(hid->bpf_rdesc); kfree(hid); } =20 @@ -1221,13 +1222,12 @@ int hid_open_report(struct hid_device *device) if (WARN_ON(device->status & HID_STAT_PARSED)) return -EBUSY; =20 - start =3D device->dev_rdesc; + start =3D device->bpf_rdesc ? device->bpf_rdesc : device->dev_rdesc; + size =3D device->bpf_rsize; if (WARN_ON(!start)) return -ENODEV; - size =3D device->dev_rsize; =20 - /* call_hid_bpf_rdesc_fixup() ensures we work on a copy of rdesc */ - buf =3D call_hid_bpf_rdesc_fixup(device, start, &size); + buf =3D kmemdup(start, size, GFP_KERNEL); if (buf =3D=3D NULL) return -ENOMEM; =20 @@ -2659,6 +2659,12 @@ static int __hid_device_probe(struct hid_device *hde= v, struct hid_driver *hdrv) const struct hid_device_id *id; int ret; =20 + if (!hdev->bpf_rsize) { + hdev->bpf_rsize =3D hdev->dev_rsize; + hdev->bpf_rdesc =3D call_hid_bpf_rdesc_fixup(hdev, hdev->dev_rdesc, + &hdev->bpf_rsize); + } + if (!hid_check_device_match(hdev, hdrv, &id)) return -ENODEV; =20 @@ -2916,8 +2922,11 @@ static void hid_remove_device(struct hid_device *hde= v) hdev->status &=3D ~HID_STAT_ADDED; } kfree(hdev->dev_rdesc); + kfree(hdev->bpf_rdesc); hdev->dev_rdesc =3D NULL; + hdev->bpf_rdesc =3D NULL; hdev->dev_rsize =3D 0; + hdev->bpf_rsize =3D 0; } =20 /** diff --git a/include/linux/hid.h b/include/linux/hid.h index 3a998fa3812d..d41fa18f1e03 100644 --- a/include/linux/hid.h +++ b/include/linux/hid.h @@ -599,15 +599,17 @@ enum hid_battery_status { struct hid_driver; struct hid_ll_driver; =20 -struct hid_device { /* device report descriptor */ - const __u8 *dev_rdesc; - unsigned dev_rsize; - const __u8 *rdesc; - unsigned rsize; +struct hid_device { + const __u8 *dev_rdesc; /* device report descriptor */ + const __u8 *bpf_rdesc; /* bpf modified report descriptor, if any */ + const __u8 *rdesc; /* currently used report descriptor */ + unsigned int dev_rsize; + unsigned int bpf_rsize; + unsigned int rsize; + unsigned int collection_size; /* Number of allocated hid_collections = */ struct hid_collection *collection; /* List of HID collections */ - unsigned collection_size; /* Number of allocated hid_collections */ - unsigned maxcollection; /* Number of parsed collections */ - unsigned maxapplication; /* Number of applications */ + unsigned int maxcollection; /* Number of parsed collections */ + unsigned int maxapplication; /* Number of applications */ __u16 bus; /* BUS ID */ __u16 group; /* Report group */ __u32 vendor; /* Vendor ID */ diff --git a/include/linux/hid_bpf.h b/include/linux/hid_bpf.h index 6a47223e6460..0290833544c8 100644 --- a/include/linux/hid_bpf.h +++ b/include/linux/hid_bpf.h @@ -228,13 +228,8 @@ static inline int hid_bpf_connect_device(struct hid_de= vice *hdev) { return 0; } static inline void hid_bpf_disconnect_device(struct hid_device *hdev) {} static inline void hid_bpf_destroy_device(struct hid_device *hid) {} static inline int hid_bpf_device_init(struct hid_device *hid) { return 0; } -/* - * This specialized allocator has to be a macro for its allocations to be - * accounted separately (to have a separate alloc_tag). The typecast is - * intentional to enforce typesafety. - */ -#define call_hid_bpf_rdesc_fixup(_hdev, _rdesc, _size) \ - ((u8 *)kmemdup(_rdesc, *(_size), GFP_KERNEL)) +static inline u8 *call_hid_bpf_rdesc_fixup(struct hid_device *hdev, u8 *rd= esc, + unsigned int *size) { return NULL; } =20 #endif /* CONFIG_HID_BPF */ =20 --=20 2.46.0 From nobody Sat Nov 30 07:44:08 2024 Received: from smtp.kernel.org (aws-us-west-2-korg-mail-1.web.codeaurora.org [10.30.226.201]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id EB28119ABB6; Tue, 10 Sep 2024 14:43:54 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=10.30.226.201 ARC-Seal: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1725979435; cv=none; b=VxLQiZWwM6+eeeFEWsUdIkvoFUP3DHB6lpUvL0Z6Gte3C/SNHRmmUGWrsnx8dKkByED0lViv3qC1yoC1MDf1ihxA/+ByMESFPue+LJmjD2dC1/xs7rcdynT3bLzkNZB3O8elgZpkSRDHf1ZDmiVrjpis3IA+RbiaRZIXKxRL0B8= ARC-Message-Signature: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1725979435; c=relaxed/simple; bh=8Rv7wHGS5vnx8vrFXpuXccJrUODHQOZZwz7abDTtL1w=; h=From:Date:Subject:MIME-Version:Content-Type:Message-Id:References: In-Reply-To:To:Cc; b=c02/3cCjwVDH40qGeXoDqBVXykhKyH2qqSIq+t2Z2FYIxV17h4oNrsv44mZjJionjNWWz+nHIhz/xE3l7VkWlBrfpNsODGp99APGw5XWawnIaBsC6cnscGk/k98hwrQEHcum8Il7ncwA5f2YemwX87IwCWPymyT5Hn/M3c5LtUM= ARC-Authentication-Results: i=1; smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=kernel.org header.i=@kernel.org header.b=nbIswF3R; arc=none smtp.client-ip=10.30.226.201 Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=kernel.org header.i=@kernel.org header.b="nbIswF3R" Received: by smtp.kernel.org (Postfix) with ESMTPSA id CA90DC4CECD; Tue, 10 Sep 2024 14:43:52 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1725979434; bh=8Rv7wHGS5vnx8vrFXpuXccJrUODHQOZZwz7abDTtL1w=; h=From:Date:Subject:References:In-Reply-To:To:Cc:From; b=nbIswF3RwCl57bL6Bt07Dr2YJ3pPLFxXZxMdp8Lpb837Z5XKNgOQz1sebIUyi2rl2 2zRfXVRZID+X7LerA3Pc9uXmD3tJsjnzJyBeJ/rhJx1jH1F3udgF+Cv0Kf9tbOAfKR hsABs1tKRvBoot+IU/Hut3n4uM3E0hpwvhlV8Jw4vdhyM0vVQHsVJ1TFl0vE8mxDSt 9r6W07Fk4W8LgtawXyf2VNCwZkybzOzXacYurNwaR/WtJ21XJSUqTDBY7fThTIqfWa 8tMsylbEMPtW2nnoDVaXqn94Ri57TN1g6BDjv/Dg46/jcWaxzdfLPXkdBpyVk2c4AU SFdVf8iJARZ4w== From: Benjamin Tissoires Date: Tue, 10 Sep 2024 23:43:38 +0900 Subject: [PATCH HID v2 02/11] HID: core: save one kmemdup during .probe() Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: quoted-printable Message-Id: <20240910-hid-bpf-hid-generic-v2-2-083dfc189e97@kernel.org> References: <20240910-hid-bpf-hid-generic-v2-0-083dfc189e97@kernel.org> In-Reply-To: <20240910-hid-bpf-hid-generic-v2-0-083dfc189e97@kernel.org> To: Jiri Kosina , Peter Hutterer , Vicki Pfau , Shuah Khan Cc: linux-input@vger.kernel.org, linux-kselftest@vger.kernel.org, linux-kernel@vger.kernel.org, bpf@vger.kernel.org, Benjamin Tissoires X-Mailer: b4 0.14.1 X-Developer-Signature: v=1; a=ed25519-sha256; t=1725979428; l=1424; i=bentiss@kernel.org; s=20230215; h=from:subject:message-id; bh=8Rv7wHGS5vnx8vrFXpuXccJrUODHQOZZwz7abDTtL1w=; b=h9Sdeen8uG5RlGASV0hN9wRWgXmQw8z5HNVcL/zvvgetMiG/cvF2VjrPn/OV33cwj7x4qSVpe HodTtFpOazUDtxOcJTY+fv4sk6EqXgYPtBw8MSYWn4AVhy/laVKnexJ X-Developer-Key: i=bentiss@kernel.org; a=ed25519; pk=7D1DyAVh6ajCkuUTudt/chMuXWIJHlv2qCsRkIizvFw= Turns out the first kmemdup is only required for the .report_fixup() driver callback. There is no need to do two kmemdup() in a raw in case .report_fixup() is not present. Signed-off-by: Benjamin Tissoires --- new in v2 --- drivers/hid/hid-core.c | 18 +++++++++++------- 1 file changed, 11 insertions(+), 7 deletions(-) diff --git a/drivers/hid/hid-core.c b/drivers/hid/hid-core.c index a5f5415571cb..172746a082f9 100644 --- a/drivers/hid/hid-core.c +++ b/drivers/hid/hid-core.c @@ -1206,7 +1206,7 @@ int hid_open_report(struct hid_device *device) struct hid_item item; unsigned int size; const __u8 *start; - __u8 *buf; + __u8 *buf =3D NULL; const __u8 *end; const __u8 *next; int ret; @@ -1227,14 +1227,18 @@ int hid_open_report(struct hid_device *device) if (WARN_ON(!start)) return -ENODEV; =20 - buf =3D kmemdup(start, size, GFP_KERNEL); - if (buf =3D=3D NULL) - return -ENOMEM; + if (device->driver->report_fixup) { + /* + * device->driver->report_fixup() needs to work + * on a copy of our report descriptor so it can + * change it. + */ + buf =3D kmemdup(start, size, GFP_KERNEL); + if (buf =3D=3D NULL) + return -ENOMEM; =20 - if (device->driver->report_fixup) start =3D device->driver->report_fixup(device, buf, &size); - else - start =3D buf; + } =20 start =3D kmemdup(start, size, GFP_KERNEL); kfree(buf); --=20 2.46.0 From nobody Sat Nov 30 07:44:08 2024 Received: from smtp.kernel.org (aws-us-west-2-korg-mail-1.web.codeaurora.org [10.30.226.201]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id C98D719ABAB; Tue, 10 Sep 2024 14:43:56 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=10.30.226.201 ARC-Seal: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1725979436; cv=none; b=t/qWAgPtahClTxpBPDn70TgtmRgzwNfnrpTnUG3ktInh7W7aeMLT9phzbNpsMT2CSdmbUzLF/K8pVMjj6rzGvRyoKHF+DwJWoTkiezpOwTuJBnm74iUfAclh/aPcX4FOB1jfrzRjbEPf59hbZz1Y8/3wjgir4ypEzNot309nCHk= ARC-Message-Signature: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1725979436; c=relaxed/simple; bh=8ktPfzBt6ih236F5v0U2BPIw8M4SjLXm76j3JdVJj8M=; h=From:Date:Subject:MIME-Version:Content-Type:Message-Id:References: In-Reply-To:To:Cc; b=Z15ooOlKrl9j2RtFshu8SgVBvMhEDam7oTtordfsSDyR3tgH2MdETnJZtcHX4smAEGZfmbMDe6kyBOWRLL+2D8RR0anJVCuog4eVgRm4JPHmeIOURUnPOygyCq/v1NxWborsYBbrCKJF/XPSrkElGQwTxqagWFt7h5PkcK+rx88= ARC-Authentication-Results: i=1; smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=kernel.org header.i=@kernel.org header.b=ONK6tnE8; arc=none smtp.client-ip=10.30.226.201 Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=kernel.org header.i=@kernel.org header.b="ONK6tnE8" Received: by smtp.kernel.org (Postfix) with ESMTPSA id EB431C4CED0; Tue, 10 Sep 2024 14:43:54 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1725979436; bh=8ktPfzBt6ih236F5v0U2BPIw8M4SjLXm76j3JdVJj8M=; h=From:Date:Subject:References:In-Reply-To:To:Cc:From; b=ONK6tnE8nqgbJIU2yJ5xJbPAkSq1Wtim7WQn4Eks/QBzEyGuSkXqjrBqxkZH1gNqr 2hfNs0ZABZl9eK4o0Uazikq3iEc7oSZ61z37wEjy+9U5C9Qya9J/CskVVrKN5D9Lct 0yG1j7WsbV7mQbdjPQg4AYK+oNOwAiKzd0YlZwiAfHlqFDQH4TWOY+dhnEOQXID8yr 2Out4bg8r7bCUvw8YA7M32mVOGvruI4Lf2Vd4fhphnfNM3NKETj9MfzfLJ5AVaxuJa Jo3Y50QdHYtWCtG3UTkVZF/8yiRHjC87YG7z0Lg+VnyyImEq9OknySrQkOGfA1ifgq pEYrLLAOtBQCg== From: Benjamin Tissoires Date: Tue, 10 Sep 2024 23:43:39 +0900 Subject: [PATCH HID v2 03/11] HID: core: remove one more kmemdup on .probe() Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: quoted-printable Message-Id: <20240910-hid-bpf-hid-generic-v2-3-083dfc189e97@kernel.org> References: <20240910-hid-bpf-hid-generic-v2-0-083dfc189e97@kernel.org> In-Reply-To: <20240910-hid-bpf-hid-generic-v2-0-083dfc189e97@kernel.org> To: Jiri Kosina , Peter Hutterer , Vicki Pfau , Shuah Khan Cc: linux-input@vger.kernel.org, linux-kselftest@vger.kernel.org, linux-kernel@vger.kernel.org, bpf@vger.kernel.org, Benjamin Tissoires X-Mailer: b4 0.14.1 X-Developer-Signature: v=1; a=ed25519-sha256; t=1725979428; l=2284; i=bentiss@kernel.org; s=20230215; h=from:subject:message-id; bh=8ktPfzBt6ih236F5v0U2BPIw8M4SjLXm76j3JdVJj8M=; b=zXJ1whlSNOnhHWGHdrRFTCSgVa1H7tFvYXlnGwJ1z+gWdtW5BeQMnAr8dm3L21tdJjrtVMNpQ a1sV3MgyzGICy+rElYyIhvYUjZbBRr2SpdwmSh7Uu+VvuDdrtvC9AVK X-Developer-Key: i=bentiss@kernel.org; a=ed25519; pk=7D1DyAVh6ajCkuUTudt/chMuXWIJHlv2qCsRkIizvFw= That last kmemdup while opening the report descriptor was required to have a common kfree() on it. Move that kmemdup in the only special case it's required (if there is a .report_fixup()), and add a more elaborated check before freeing hdev->rdesc, to avoid a double free. Signed-off-by: Benjamin Tissoires --- new in v2 --- drivers/hid/hid-core.c | 28 ++++++++++++++++++++-------- 1 file changed, 20 insertions(+), 8 deletions(-) diff --git a/drivers/hid/hid-core.c b/drivers/hid/hid-core.c index 172746a082f9..2b70a12a2135 100644 --- a/drivers/hid/hid-core.c +++ b/drivers/hid/hid-core.c @@ -685,7 +685,14 @@ static void hid_close_report(struct hid_device *device) INIT_LIST_HEAD(&report_enum->report_list); } =20 - kfree(device->rdesc); + /* + * If the HID driver had a rdesc_fixup() callback, dev->rdesc + * will be allocated by hid-core and needs to be freed. + * Otherwise, it is either equal to dev_rdesc or bpf_rdesc, in + * which cases it'll be freed later on device removal or destroy. + */ + if (device->rdesc !=3D device->dev_rdesc && device->rdesc !=3D device->bp= f_rdesc) + kfree(device->rdesc); device->rdesc =3D NULL; device->rsize =3D 0; =20 @@ -1206,7 +1213,6 @@ int hid_open_report(struct hid_device *device) struct hid_item item; unsigned int size; const __u8 *start; - __u8 *buf =3D NULL; const __u8 *end; const __u8 *next; int ret; @@ -1233,17 +1239,23 @@ int hid_open_report(struct hid_device *device) * on a copy of our report descriptor so it can * change it. */ - buf =3D kmemdup(start, size, GFP_KERNEL); + __u8 *buf =3D kmemdup(start, size, GFP_KERNEL); + if (buf =3D=3D NULL) return -ENOMEM; =20 start =3D device->driver->report_fixup(device, buf, &size); - } =20 - start =3D kmemdup(start, size, GFP_KERNEL); - kfree(buf); - if (start =3D=3D NULL) - return -ENOMEM; + /* + * The second kmemdup is required in case report_fixup() returns + * a static read-only memory, but we have no idea if that memory + * needs to be cleaned up or not at the end. + */ + start =3D kmemdup(start, size, GFP_KERNEL); + kfree(buf); + if (start =3D=3D NULL) + return -ENOMEM; + } =20 device->rdesc =3D start; device->rsize =3D size; --=20 2.46.0 From nobody Sat Nov 30 07:44:08 2024 Received: from smtp.kernel.org (aws-us-west-2-korg-mail-1.web.codeaurora.org [10.30.226.201]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 499F6195FF0; Tue, 10 Sep 2024 14:43:58 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=10.30.226.201 ARC-Seal: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1725979440; cv=none; b=Itg7UDPRUynNClQFDWvQJ8SKxDs/ALl0IS15kyURCK+T02OSpkfA9xh5rmbfjtodse9oOQkPAKRf5sNz1HgQEBqG6pLbuuYZpnuuSvhKmgvQHtD6b9XfVILd/9vS86S6iFNMn5umMi4yiXeMHi9YnuZJxW5d36VX4pvVJZUxH2o= ARC-Message-Signature: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1725979440; c=relaxed/simple; bh=ViWIkS3pENGlV8JsArrtQVZLs5ZqoLV/BOu0z+rM8eQ=; h=From:Date:Subject:MIME-Version:Content-Type:Message-Id:References: In-Reply-To:To:Cc; b=gpnD1XdRO4X4Km5bR8BZhP9TcjWdJonXc/cmfKRncMNAgwpJJg0s6AM61WAzII4jYtvILJLJh9geM2nSc50e68cq4ZcO08cNUf+k9W2wlgIDr7B7mGUDtuzBzi06pylrNgtiTR29TtY51kz0ghMa7MWsenT49thUmt0cnkrJsIs= ARC-Authentication-Results: i=1; smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=kernel.org header.i=@kernel.org header.b=ohOGReQH; arc=none smtp.client-ip=10.30.226.201 Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=kernel.org header.i=@kernel.org header.b="ohOGReQH" Received: by smtp.kernel.org (Postfix) with ESMTPSA id 1826BC4CEC3; Tue, 10 Sep 2024 14:43:56 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1725979438; bh=ViWIkS3pENGlV8JsArrtQVZLs5ZqoLV/BOu0z+rM8eQ=; h=From:Date:Subject:References:In-Reply-To:To:Cc:From; b=ohOGReQHOZgTJ1tI5zc/QVIatKUx0XbYh15WYbtxxmpEc4YPK31rKhxBRVwJZIWR9 Q6xu8IRpFkMR37RN5dXLe4FQhNN6D67nArJuCNKumFI40LIRuLp1Q3uDZl1n2XWOoF A/0HfcAgzr4KpO5ZZPBRLdRVquMplbUTeiPJJe/rSWM/z/ghTrSfXsd47ZvH3sZpCM ci5sv4n8lxAR6182o9rVH7ZImYVG7rc+s0Atd0KSZHG75KCc+DIn2K6BVcIyG3vnib F+mWq0Ad+uBb9uCtmhIH0U5WDkrvln2e6s3Gb6XmBq7/ZF4OMI4WQtihNrO2ijUECV hb7jwBM3F4Etg== From: Benjamin Tissoires Date: Tue, 10 Sep 2024 23:43:40 +0900 Subject: [PATCH HID v2 04/11] HID: bpf: allow write access to quirks field in struct hid_device Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: quoted-printable Message-Id: <20240910-hid-bpf-hid-generic-v2-4-083dfc189e97@kernel.org> References: <20240910-hid-bpf-hid-generic-v2-0-083dfc189e97@kernel.org> In-Reply-To: <20240910-hid-bpf-hid-generic-v2-0-083dfc189e97@kernel.org> To: Jiri Kosina , Peter Hutterer , Vicki Pfau , Shuah Khan Cc: linux-input@vger.kernel.org, linux-kselftest@vger.kernel.org, linux-kernel@vger.kernel.org, bpf@vger.kernel.org, Benjamin Tissoires X-Mailer: b4 0.14.1 X-Developer-Signature: v=1; a=ed25519-sha256; t=1725979428; l=2073; i=bentiss@kernel.org; s=20230215; h=from:subject:message-id; bh=ViWIkS3pENGlV8JsArrtQVZLs5ZqoLV/BOu0z+rM8eQ=; b=PVKuJyPMXrekjkrvb1iGSwOV4LtFK8vfroehMdz3WWF5qRjHmIWsiEy/SiHxr2iXg2gTMKE9+ B/33+IqZFg4DyPm2Fxgg5PgFEHGdP/bbCFupo43ms48iYayVy2fLUmi X-Developer-Key: i=bentiss@kernel.org; a=ed25519; pk=7D1DyAVh6ajCkuUTudt/chMuXWIJHlv2qCsRkIizvFw= This allows to give more control from BPF during report descriptor fixup. We already reset the quirks before calling ->probe(), so now we reset it once before calling hid_bpf_rdesc_fixup(). Signed-off-by: Benjamin Tissoires --- new in v2 --- drivers/hid/bpf/hid_bpf_struct_ops.c | 1 + drivers/hid/hid-core.c | 10 ++++++++-- 2 files changed, 9 insertions(+), 2 deletions(-) diff --git a/drivers/hid/bpf/hid_bpf_struct_ops.c b/drivers/hid/bpf/hid_bpf= _struct_ops.c index cd696c59ba0f..e4c25ade54a3 100644 --- a/drivers/hid/bpf/hid_bpf_struct_ops.c +++ b/drivers/hid/bpf/hid_bpf_struct_ops.c @@ -79,6 +79,7 @@ static int hid_bpf_ops_btf_struct_access(struct bpf_verif= ier_log *log, WRITE_RANGE(hid_device, name, true), WRITE_RANGE(hid_device, uniq, true), WRITE_RANGE(hid_device, phys, true), + WRITE_RANGE(hid_device, quirks, false), }; #undef WRITE_RANGE const struct btf_type *state =3D NULL; diff --git a/drivers/hid/hid-core.c b/drivers/hid/hid-core.c index 2b70a12a2135..37e52759a931 100644 --- a/drivers/hid/hid-core.c +++ b/drivers/hid/hid-core.c @@ -2676,9 +2676,17 @@ static int __hid_device_probe(struct hid_device *hde= v, struct hid_driver *hdrv) int ret; =20 if (!hdev->bpf_rsize) { + unsigned int quirks; + + /* reset the quirks that has been previously set */ + quirks =3D hid_lookup_quirk(hdev); + hdev->quirks =3D quirks; hdev->bpf_rsize =3D hdev->dev_rsize; hdev->bpf_rdesc =3D call_hid_bpf_rdesc_fixup(hdev, hdev->dev_rdesc, &hdev->bpf_rsize); + if (quirks ^ hdev->quirks) + hid_info(hdev, "HID-BPF toggled quirks on the device: %04x", + quirks ^ hdev->quirks); } =20 if (!hid_check_device_match(hdev, hdrv, &id)) @@ -2688,8 +2696,6 @@ static int __hid_device_probe(struct hid_device *hdev= , struct hid_driver *hdrv) if (!hdev->devres_group_id) return -ENOMEM; =20 - /* reset the quirks that has been previously set */ - hdev->quirks =3D hid_lookup_quirk(hdev); hdev->driver =3D hdrv; =20 if (hdrv->probe) { --=20 2.46.0 From nobody Sat Nov 30 07:44:08 2024 Received: from smtp.kernel.org (aws-us-west-2-korg-mail-1.web.codeaurora.org [10.30.226.201]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 6D5F719FA93; Tue, 10 Sep 2024 14:44:01 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=10.30.226.201 ARC-Seal: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1725979441; cv=none; b=Qg5w1h1bUlEwqWKNlGFCRtn6H/WirFNHl+a1d8n1SbdQ6gCqkC7wz1yFdM5SQ8QfqIiKCFTfMO434WE1wbsB+51JB2sJTYh45gfz4zKbXaUqXUReifs/Yh02SdiPITVYE9K5UWuTXn3FHoUz97m6ARVVfUYVJevqIhIOhsy+EFI= ARC-Message-Signature: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1725979441; c=relaxed/simple; bh=PcylA1+94LG9KARyIPuGccijQnN2vj003tX21Zw9Tbo=; h=From:Date:Subject:MIME-Version:Content-Type:Message-Id:References: In-Reply-To:To:Cc; b=VPe0DbDq25cSRCBkmF7DIbTeEJe81l2jrFIA9qZWj+tpn1IDQ1lm+wX0BnhegCUuCZ/kDSEzjsHNr24OJt8NRFxWmVVGWdus1+fNzRNV9lVj631DEEQbqGLuMZxmwTaW9FgOueG4XLv4Q0vvfCD5L31Rei+UcKrQBNqPhe0zVWI= ARC-Authentication-Results: i=1; smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=kernel.org header.i=@kernel.org header.b=lOe/CVQH; arc=none smtp.client-ip=10.30.226.201 Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=kernel.org header.i=@kernel.org header.b="lOe/CVQH" Received: by smtp.kernel.org (Postfix) with ESMTPSA id 39E6EC4CEC4; Tue, 10 Sep 2024 14:43:59 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1725979440; bh=PcylA1+94LG9KARyIPuGccijQnN2vj003tX21Zw9Tbo=; h=From:Date:Subject:References:In-Reply-To:To:Cc:From; b=lOe/CVQHP+un+q+BINAwM4P5krDbalcG0y04Hm1hFLFHKN6GoXHy2/6onoOBiKHe9 ouJZ5UWBDk6mpkKa3QSzC6FgveU/I2c1DERinKyaZOUbVIjM8jwLAGxQUAQih/U0/P /8VSs8pwli+Dm+VOP1nLJULx3rqxe3FZ4jG/2WQJKfNYnXLI1DVQfde3yg+x6SrFzI 08uwDp9LA59pQhYMUqhZl5B3xJXsNJ0IeXRTrlygUleGP030pAqErTukaS/pJfMfIe LQ2upPEh4+cTOEe9ivEUe6vi6PVjhLtZEKPFI+ONdJbYCcHgGNwbKXOQI9s5RhKhKs AtoyRNv3hsw0A== From: Benjamin Tissoires Date: Tue, 10 Sep 2024 23:43:41 +0900 Subject: [PATCH HID v2 05/11] selftests/hid: add dependency on hid_common.h Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: quoted-printable Message-Id: <20240910-hid-bpf-hid-generic-v2-5-083dfc189e97@kernel.org> References: <20240910-hid-bpf-hid-generic-v2-0-083dfc189e97@kernel.org> In-Reply-To: <20240910-hid-bpf-hid-generic-v2-0-083dfc189e97@kernel.org> To: Jiri Kosina , Peter Hutterer , Vicki Pfau , Shuah Khan Cc: linux-input@vger.kernel.org, linux-kselftest@vger.kernel.org, linux-kernel@vger.kernel.org, bpf@vger.kernel.org, Benjamin Tissoires X-Mailer: b4 0.14.1 X-Developer-Signature: v=1; a=ed25519-sha256; t=1725979428; l=854; i=bentiss@kernel.org; s=20230215; h=from:subject:message-id; bh=PcylA1+94LG9KARyIPuGccijQnN2vj003tX21Zw9Tbo=; b=tpMw5MpnEKcNrunsr9z9pW2Db9YDiTxivD3VnNkIADJv6IoDbXWXHMgu+Bb/uG073eo4skWMK eVswxdpd6ZaBwrihlr1d2LQ2kddOvMnB1Hf6b2tlQC3CKNuSu0xNtx3 X-Developer-Key: i=bentiss@kernel.org; a=ed25519; pk=7D1DyAVh6ajCkuUTudt/chMuXWIJHlv2qCsRkIizvFw= Allows to recompile the C tests when that file changes Signed-off-by: Benjamin Tissoires --- no changes in v2 --- tools/testing/selftests/hid/Makefile | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/tools/testing/selftests/hid/Makefile b/tools/testing/selftests= /hid/Makefile index 72be55ac4bdf..9399fa3f2f9d 100644 --- a/tools/testing/selftests/hid/Makefile +++ b/tools/testing/selftests/hid/Makefile @@ -229,7 +229,7 @@ $(BPF_SKELS): %.skel.h: %.bpf.o $(BPFTOOL) | $(OUTPUT) $(Q)$(BPFTOOL) gen object $(<:.o=3D.linked1.o) $< $(Q)$(BPFTOOL) gen skeleton $(<:.o=3D.linked1.o) name $(notdir $(<:.bpf.o= =3D)) > $@ =20 -$(OUTPUT)/%.o: %.c $(BPF_SKELS) +$(OUTPUT)/%.o: %.c $(BPF_SKELS) hid_common.h $(call msg,CC,,$@) $(Q)$(CC) $(CFLAGS) -c $(filter %.c,$^) $(LDLIBS) -o $@ =20 --=20 2.46.0 From nobody Sat Nov 30 07:44:08 2024 Received: from smtp.kernel.org (aws-us-west-2-korg-mail-1.web.codeaurora.org [10.30.226.201]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 601C21A08B0; Tue, 10 Sep 2024 14:44:03 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=10.30.226.201 ARC-Seal: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1725979443; cv=none; b=aaIgXIQiPoMoQMjoZtB0m2X7mJpO2vgmUi4RaqrLDitcAaDF5ZdvzsYQWV46Sm4mtRbSyyDRDFPubbMV2sSIoweFtSXh/l7VSFDnh5kqdEXNjMgd+QeYzcHvMO9q5GELBfHfiHuV7Mt1ZODLDOvkj/g05UVXrv5Bsg+q90tePWw= ARC-Message-Signature: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1725979443; c=relaxed/simple; bh=htugAPk+PkAXQlk8Fs9wvuB/VI+A0TtvtJjDu1Tu61s=; h=From:Date:Subject:MIME-Version:Content-Type:Message-Id:References: In-Reply-To:To:Cc; b=N4EY3Iym6xQG1Tp3nUiFlBttC+5o+DI7R3AwJ9uceImiQpb+lBQQ5tsYCs0XjyepyBZJ7dZuWCBUAsv+1qsZvTFIsIMNnwjJI3r/qkVxUxmCk9bFL//hRsMiKO+sJU+0f87EQ2KX5i7ilIr95H7sfk75pMisBoaaR036wOSzJdk= ARC-Authentication-Results: i=1; smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=kernel.org header.i=@kernel.org header.b=DrhUvZhx; arc=none smtp.client-ip=10.30.226.201 Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=kernel.org header.i=@kernel.org header.b="DrhUvZhx" Received: by smtp.kernel.org (Postfix) with ESMTPSA id 5A64FC4CED0; Tue, 10 Sep 2024 14:44:01 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1725979443; bh=htugAPk+PkAXQlk8Fs9wvuB/VI+A0TtvtJjDu1Tu61s=; h=From:Date:Subject:References:In-Reply-To:To:Cc:From; b=DrhUvZhxdINERtmj+7Bp2zSJ7bfnv3p4qxwIjuLtpSnpdInyDZwGXaXII0S4S7IqX lJoRojAx+KXW269q94fcJR+2gMysLYxqkkuEc5/uCER5lQ/CgvcslVxBUZDPVjoTn5 WDxrH9L7uNtB0GSdQ6Z8D4C35zZ29oxAaQWYBEZVljNF0xtMAs33dRZmYqPf1oVn3g qoQ8+O6ttqvu3/1miSPOroCJROcSB5s+U4NE0zbE9f1kfa5KDHBs9JdjoSkw16528S 2SJufzQd7iAKh4cpPK5AJRIhDIKLe292vzWnPIhOFJD1Yjj/ZLJfjsX+G+kkaorOU+ IVdY7rqf76GSA== From: Benjamin Tissoires Date: Tue, 10 Sep 2024 23:43:42 +0900 Subject: [PATCH HID v2 06/11] selftests/hid: cleanup C tests by adding a common struct uhid_device Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: quoted-printable Message-Id: <20240910-hid-bpf-hid-generic-v2-6-083dfc189e97@kernel.org> References: <20240910-hid-bpf-hid-generic-v2-0-083dfc189e97@kernel.org> In-Reply-To: <20240910-hid-bpf-hid-generic-v2-0-083dfc189e97@kernel.org> To: Jiri Kosina , Peter Hutterer , Vicki Pfau , Shuah Khan Cc: linux-input@vger.kernel.org, linux-kselftest@vger.kernel.org, linux-kernel@vger.kernel.org, bpf@vger.kernel.org, Benjamin Tissoires X-Mailer: b4 0.14.1 X-Developer-Signature: v=1; a=ed25519-sha256; t=1725979428; l=15743; i=bentiss@kernel.org; s=20230215; h=from:subject:message-id; bh=htugAPk+PkAXQlk8Fs9wvuB/VI+A0TtvtJjDu1Tu61s=; b=9U53oWpImgp1DdNSN1dtz0yxi3FDRxDfEX0ORSk1x/HrMaiXJH58xZN6eXkJWI1LiR7SJ29jW 93csPyZkSiPDqYOHgj5eJiroTEfLgsW7FHxRq8jlam3i3tKWMdyzSiO X-Developer-Key: i=bentiss@kernel.org; a=ed25519; pk=7D1DyAVh6ajCkuUTudt/chMuXWIJHlv2qCsRkIizvFw= Allows to have an abstract class uhid_device which handles all of the uhid part without having to mess up with individual fds. struct attach_prog_args is now never used in hid_bpf.c, so drop it as well Signed-off-by: Benjamin Tissoires --- no changes in v2 --- tools/testing/selftests/hid/hid_bpf.c | 77 +++++++++++-----------------= ---- tools/testing/selftests/hid/hid_common.h | 74 ++++++++++++++++++++--------= -- tools/testing/selftests/hid/hidraw.c | 36 +++++---------- 3 files changed, 87 insertions(+), 100 deletions(-) diff --git a/tools/testing/selftests/hid/hid_bpf.c b/tools/testing/selftest= s/hid/hid_bpf.c index d10cf6883683..17ccbf5ff4b5 100644 --- a/tools/testing/selftests/hid/hid_bpf.c +++ b/tools/testing/selftests/hid/hid_bpf.c @@ -4,13 +4,6 @@ #include "hid_common.h" #include =20 -struct attach_prog_args { - int prog_fd; - unsigned int hid; - int retval; - int insert_head; -}; - struct hid_hw_request_syscall_args { __u8 data[10]; unsigned int hid; @@ -21,11 +14,8 @@ struct hid_hw_request_syscall_args { }; =20 FIXTURE(hid_bpf) { - int dev_id; - int uhid_fd; + struct uhid_device hid; int hidraw_fd; - int hid_id; - pthread_t tid; struct hid *skel; struct bpf_link *hid_links[3]; /* max number of programs loaded in a sing= le test */ }; @@ -54,10 +44,10 @@ static void detach_bpf(FIXTURE_DATA(hid_bpf) * self) FIXTURE_TEARDOWN(hid_bpf) { void *uhid_err; =20 - uhid_destroy(_metadata, self->uhid_fd); + uhid_destroy(_metadata, &self->hid); =20 detach_bpf(self); - pthread_join(self->tid, &uhid_err); + pthread_join(self->hid.tid, &uhid_err); } #define TEARDOWN_LOG(fmt, ...) do { \ TH_LOG(fmt, ##__VA_ARGS__); \ @@ -66,23 +56,10 @@ FIXTURE_TEARDOWN(hid_bpf) { =20 FIXTURE_SETUP(hid_bpf) { - time_t t; int err; =20 - /* initialize random number generator */ - srand((unsigned int)time(&t)); - - self->dev_id =3D rand() % 1024; - - self->uhid_fd =3D setup_uhid(_metadata, self->dev_id); - - /* locate the uev, self, variant);ent file of the created device */ - self->hid_id =3D get_hid_id(self->dev_id); - ASSERT_GT(self->hid_id, 0) - TEARDOWN_LOG("Could not locate uhid device id: %d", self->hid_id); - - err =3D uhid_start_listener(_metadata, &self->tid, self->uhid_fd); - ASSERT_EQ(0, err) TEARDOWN_LOG("could not start udev listener: %d", err); + err =3D setup_uhid(_metadata, &self->hid); + ASSERT_OK(err); } =20 struct test_program { @@ -129,7 +106,7 @@ static void load_programs(const struct test_program pro= grams[], ops_hid_id =3D bpf_map__initial_value(map, NULL); ASSERT_OK_PTR(ops_hid_id) TH_LOG("unable to retrieve struct_ops data"); =20 - *ops_hid_id =3D self->hid_id; + *ops_hid_id =3D self->hid.hid_id; } =20 /* we disable the auto-attach feature of all maps because we @@ -157,7 +134,7 @@ static void load_programs(const struct test_program pro= grams[], =20 hid__attach(self->skel); =20 - self->hidraw_fd =3D open_hidraw(self->dev_id); + self->hidraw_fd =3D open_hidraw(&self->hid); ASSERT_GE(self->hidraw_fd, 0) TH_LOG("open_hidraw"); } =20 @@ -192,7 +169,7 @@ TEST_F(hid_bpf, raw_event) /* inject one event */ buf[0] =3D 1; buf[1] =3D 42; - uhid_send_event(_metadata, self->uhid_fd, buf, 6); + uhid_send_event(_metadata, &self->hid, buf, 6); =20 /* check that hid_first_event() was executed */ ASSERT_EQ(self->skel->data->callback_check, 42) TH_LOG("callback_check1"); @@ -208,7 +185,7 @@ TEST_F(hid_bpf, raw_event) memset(buf, 0, sizeof(buf)); buf[0] =3D 1; buf[1] =3D 47; - uhid_send_event(_metadata, self->uhid_fd, buf, 6); + uhid_send_event(_metadata, &self->hid, buf, 6); =20 /* check that hid_first_event() was executed */ ASSERT_EQ(self->skel->data->callback_check, 47) TH_LOG("callback_check1"); @@ -239,7 +216,7 @@ TEST_F(hid_bpf, subprog_raw_event) /* inject one event */ buf[0] =3D 1; buf[1] =3D 42; - uhid_send_event(_metadata, self->uhid_fd, buf, 6); + uhid_send_event(_metadata, &self->hid, buf, 6); =20 /* read the data from hidraw */ memset(buf, 0, sizeof(buf)); @@ -252,7 +229,7 @@ TEST_F(hid_bpf, subprog_raw_event) memset(buf, 0, sizeof(buf)); buf[0] =3D 1; buf[1] =3D 47; - uhid_send_event(_metadata, self->uhid_fd, buf, 6); + uhid_send_event(_metadata, &self->hid, buf, 6); =20 /* read the data from hidraw */ memset(buf, 0, sizeof(buf)); @@ -303,7 +280,7 @@ TEST_F(hid_bpf, test_attach_detach) /* inject one event */ buf[0] =3D 1; buf[1] =3D 42; - uhid_send_event(_metadata, self->uhid_fd, buf, 6); + uhid_send_event(_metadata, &self->hid, buf, 6); =20 /* read the data from hidraw */ memset(buf, 0, sizeof(buf)); @@ -326,14 +303,14 @@ TEST_F(hid_bpf, test_attach_detach) /* detach the program */ detach_bpf(self); =20 - self->hidraw_fd =3D open_hidraw(self->dev_id); + self->hidraw_fd =3D open_hidraw(&self->hid); ASSERT_GE(self->hidraw_fd, 0) TH_LOG("open_hidraw"); =20 /* inject another event */ memset(buf, 0, sizeof(buf)); buf[0] =3D 1; buf[1] =3D 47; - uhid_send_event(_metadata, self->uhid_fd, buf, 6); + uhid_send_event(_metadata, &self->hid, buf, 6); =20 /* read the data from hidraw */ memset(buf, 0, sizeof(buf)); @@ -352,7 +329,7 @@ TEST_F(hid_bpf, test_attach_detach) memset(buf, 0, sizeof(buf)); buf[0] =3D 1; buf[1] =3D 42; - uhid_send_event(_metadata, self->uhid_fd, buf, 6); + uhid_send_event(_metadata, &self->hid, buf, 6); =20 /* read the data from hidraw */ memset(buf, 0, sizeof(buf)); @@ -382,7 +359,7 @@ TEST_F(hid_bpf, test_hid_change_report) /* inject one event */ buf[0] =3D 1; buf[1] =3D 42; - uhid_send_event(_metadata, self->uhid_fd, buf, 6); + uhid_send_event(_metadata, &self->hid, buf, 6); =20 /* read the data from hidraw */ memset(buf, 0, sizeof(buf)); @@ -412,7 +389,7 @@ TEST_F(hid_bpf, test_hid_user_input_report_call) =20 LOAD_BPF; =20 - args.hid =3D self->hid_id; + args.hid =3D self->hid.hid_id; args.data[0] =3D 1; /* report ID */ args.data[1] =3D 2; /* report ID */ args.data[2] =3D 42; /* report ID */ @@ -458,7 +435,7 @@ TEST_F(hid_bpf, test_hid_user_output_report_call) =20 LOAD_BPF; =20 - args.hid =3D self->hid_id; + args.hid =3D self->hid.hid_id; args.data[0] =3D 1; /* report ID */ args.data[1] =3D 2; /* report ID */ args.data[2] =3D 42; /* report ID */ @@ -506,7 +483,7 @@ TEST_F(hid_bpf, test_hid_user_raw_request_call) =20 LOAD_BPF; =20 - args.hid =3D self->hid_id; + args.hid =3D self->hid.hid_id; args.data[0] =3D 1; /* report ID */ =20 prog_fd =3D bpf_program__fd(self->skel->progs.hid_user_raw_request); @@ -539,7 +516,7 @@ TEST_F(hid_bpf, test_hid_filter_raw_request_call) /* inject one event */ buf[0] =3D 1; buf[1] =3D 42; - uhid_send_event(_metadata, self->uhid_fd, buf, 6); + uhid_send_event(_metadata, &self->hid, buf, 6); =20 /* read the data from hidraw */ memset(buf, 0, sizeof(buf)); @@ -565,7 +542,7 @@ TEST_F(hid_bpf, test_hid_filter_raw_request_call) /* detach the program */ detach_bpf(self); =20 - self->hidraw_fd =3D open_hidraw(self->dev_id); + self->hidraw_fd =3D open_hidraw(&self->hid); ASSERT_GE(self->hidraw_fd, 0) TH_LOG("open_hidraw"); =20 err =3D ioctl(self->hidraw_fd, HIDIOCGFEATURE(sizeof(buf)), buf); @@ -641,7 +618,7 @@ TEST_F(hid_bpf, test_hid_filter_output_report_call) /* inject one event */ buf[0] =3D 1; buf[1] =3D 42; - uhid_send_event(_metadata, self->uhid_fd, buf, 6); + uhid_send_event(_metadata, &self->hid, buf, 6); =20 /* read the data from hidraw */ memset(buf, 0, sizeof(buf)); @@ -667,7 +644,7 @@ TEST_F(hid_bpf, test_hid_filter_output_report_call) /* detach the program */ detach_bpf(self); =20 - self->hidraw_fd =3D open_hidraw(self->dev_id); + self->hidraw_fd =3D open_hidraw(&self->hid); ASSERT_GE(self->hidraw_fd, 0) TH_LOG("open_hidraw"); =20 err =3D write(self->hidraw_fd, buf, 3); @@ -742,7 +719,7 @@ TEST_F(hid_bpf, test_multiply_events_wq) /* inject one event */ buf[0] =3D 1; buf[1] =3D 42; - uhid_send_event(_metadata, self->uhid_fd, buf, 6); + uhid_send_event(_metadata, &self->hid, buf, 6); =20 /* read the data from hidraw */ memset(buf, 0, sizeof(buf)); @@ -780,7 +757,7 @@ TEST_F(hid_bpf, test_multiply_events) /* inject one event */ buf[0] =3D 1; buf[1] =3D 42; - uhid_send_event(_metadata, self->uhid_fd, buf, 6); + uhid_send_event(_metadata, &self->hid, buf, 6); =20 /* read the data from hidraw */ memset(buf, 0, sizeof(buf)); @@ -816,7 +793,7 @@ TEST_F(hid_bpf, test_hid_infinite_loop_input_report_cal= l) buf[1] =3D 2; buf[2] =3D 42; =20 - uhid_send_event(_metadata, self->uhid_fd, buf, 6); + uhid_send_event(_metadata, &self->hid, buf, 6); =20 /* read the data from hidraw */ memset(buf, 0, sizeof(buf)); @@ -867,7 +844,7 @@ TEST_F(hid_bpf, test_hid_attach_flags) =20 /* inject one event */ buf[0] =3D 1; - uhid_send_event(_metadata, self->uhid_fd, buf, 6); + uhid_send_event(_metadata, &self->hid, buf, 6); =20 /* read the data from hidraw */ memset(buf, 0, sizeof(buf)); diff --git a/tools/testing/selftests/hid/hid_common.h b/tools/testing/selft= ests/hid/hid_common.h index f151f151a1ed..a7d836a35bb1 100644 --- a/tools/testing/selftests/hid/hid_common.h +++ b/tools/testing/selftests/hid/hid_common.h @@ -19,6 +19,13 @@ __typeof__(b) _b =3D (b); \ _a < _b ? _a : _b; }) =20 +struct uhid_device { + int dev_id; /* uniq (random) number to identify the device */ + int uhid_fd; + int hid_id; /* HID device id in the system */ + pthread_t tid; /* thread for reading uhid events */ +}; + static unsigned char rdesc[] =3D { 0x06, 0x00, 0xff, /* Usage Page (Vendor Defined Page 1) */ 0x09, 0x21, /* Usage (Vendor Usage 0x21) */ @@ -146,14 +153,14 @@ static int uhid_create(struct __test_metadata *_metad= ata, int fd, int rand_nb) return uhid_write(_metadata, fd, &ev); } =20 -static void uhid_destroy(struct __test_metadata *_metadata, int fd) +static void uhid_destroy(struct __test_metadata *_metadata, struct uhid_de= vice *hid) { struct uhid_event ev; =20 memset(&ev, 0, sizeof(ev)); ev.type =3D UHID_DESTROY; =20 - uhid_write(_metadata, fd, &ev); + uhid_write(_metadata, hid->uhid_fd, &ev); } =20 static int uhid_event(struct __test_metadata *_metadata, int fd) @@ -281,7 +288,8 @@ static int uhid_start_listener(struct __test_metadata *= _metadata, pthread_t *tid return 0; } =20 -static int uhid_send_event(struct __test_metadata *_metadata, int fd, __u8= *buf, size_t size) +static int uhid_send_event(struct __test_metadata *_metadata, struct uhid_= device *hid, + __u8 *buf, size_t size) { struct uhid_event ev; =20 @@ -294,25 +302,7 @@ static int uhid_send_event(struct __test_metadata *_me= tadata, int fd, __u8 *buf, =20 memcpy(ev.u.input2.data, buf, size); =20 - return uhid_write(_metadata, fd, &ev); -} - -static int setup_uhid(struct __test_metadata *_metadata, int rand_nb) -{ - int fd; - const char *path =3D "/dev/uhid"; - int ret; - - fd =3D open(path, O_RDWR | O_CLOEXEC); - ASSERT_GE(fd, 0) TH_LOG("open uhid-cdev failed; %d", fd); - - ret =3D uhid_create(_metadata, fd, rand_nb); - ASSERT_EQ(0, ret) { - TH_LOG("create uhid device failed: %d", ret); - close(fd); - } - - return fd; + return uhid_write(_metadata, hid->uhid_fd, &ev); } =20 static bool match_sysfs_device(int dev_id, const char *workdir, struct dir= ent *dir) @@ -421,12 +411,12 @@ static int get_hidraw(int dev_id) return found; } =20 -static int open_hidraw(int dev_id) +static int open_hidraw(struct uhid_device *hid) { int hidraw_number; char hidraw_path[64] =3D { 0 }; =20 - hidraw_number =3D get_hidraw(dev_id); + hidraw_number =3D get_hidraw(hid->dev_id); if (hidraw_number < 0) return hidraw_number; =20 @@ -434,3 +424,39 @@ static int open_hidraw(int dev_id) sprintf(hidraw_path, "/dev/hidraw%d", hidraw_number); return open(hidraw_path, O_RDWR | O_NONBLOCK); } + +static int setup_uhid(struct __test_metadata *_metadata, struct uhid_devic= e *hid) +{ + const char *path =3D "/dev/uhid"; + time_t t; + int ret; + + /* initialize random number generator */ + srand((unsigned int)time(&t)); + + hid->dev_id =3D rand() % 1024; + + hid->uhid_fd =3D open(path, O_RDWR | O_CLOEXEC); + ASSERT_GE(hid->uhid_fd, 0) TH_LOG("open uhid-cdev failed; %d", hid->uhid_= fd); + + ret =3D uhid_create(_metadata, hid->uhid_fd, hid->dev_id); + ASSERT_EQ(0, ret) { + TH_LOG("create uhid device failed: %d", ret); + close(hid->uhid_fd); + return ret; + } + + /* locate the uevent file of the created device */ + hid->hid_id =3D get_hid_id(hid->dev_id); + ASSERT_GT(hid->hid_id, 0) + TH_LOG("Could not locate uhid device id: %d", hid->hid_id); + + ret =3D uhid_start_listener(_metadata, &hid->tid, hid->uhid_fd); + ASSERT_EQ(0, ret) { + TH_LOG("could not start udev listener: %d", ret); + close(hid->uhid_fd); + return ret; + } + + return 0; +} diff --git a/tools/testing/selftests/hid/hidraw.c b/tools/testing/selftests= /hid/hidraw.c index f8b4f7ff292c..5934818b2036 100644 --- a/tools/testing/selftests/hid/hidraw.c +++ b/tools/testing/selftests/hid/hidraw.c @@ -9,11 +9,8 @@ #endif /* HIDIOCREVOKE */ =20 FIXTURE(hidraw) { - int dev_id; - int uhid_fd; + struct uhid_device hid; int hidraw_fd; - int hid_id; - pthread_t tid; }; static void close_hidraw(FIXTURE_DATA(hidraw) * self) { @@ -25,10 +22,10 @@ static void close_hidraw(FIXTURE_DATA(hidraw) * self) FIXTURE_TEARDOWN(hidraw) { void *uhid_err; =20 - uhid_destroy(_metadata, self->uhid_fd); + uhid_destroy(_metadata, &self->hid); =20 close_hidraw(self); - pthread_join(self->tid, &uhid_err); + pthread_join(self->hid.tid, &uhid_err); } #define TEARDOWN_LOG(fmt, ...) do { \ TH_LOG(fmt, ##__VA_ARGS__); \ @@ -37,25 +34,12 @@ FIXTURE_TEARDOWN(hidraw) { =20 FIXTURE_SETUP(hidraw) { - time_t t; int err; =20 - /* initialize random number generator */ - srand((unsigned int)time(&t)); + err =3D setup_uhid(_metadata, &self->hid); + ASSERT_OK(err); =20 - self->dev_id =3D rand() % 1024; - - self->uhid_fd =3D setup_uhid(_metadata, self->dev_id); - - /* locate the uev, self, variant);ent file of the created device */ - self->hid_id =3D get_hid_id(self->dev_id); - ASSERT_GT(self->hid_id, 0) - TEARDOWN_LOG("Could not locate uhid device id: %d", self->hid_id); - - err =3D uhid_start_listener(_metadata, &self->tid, self->uhid_fd); - ASSERT_EQ(0, err) TEARDOWN_LOG("could not start udev listener: %d", err); - - self->hidraw_fd =3D open_hidraw(self->dev_id); + self->hidraw_fd =3D open_hidraw(&self->hid); ASSERT_GE(self->hidraw_fd, 0) TH_LOG("open_hidraw"); } =20 @@ -79,7 +63,7 @@ TEST_F(hidraw, raw_event) /* inject one event */ buf[0] =3D 1; buf[1] =3D 42; - uhid_send_event(_metadata, self->uhid_fd, buf, 6); + uhid_send_event(_metadata, &self->hid, buf, 6); =20 /* read the data from hidraw */ memset(buf, 0, sizeof(buf)); @@ -101,7 +85,7 @@ TEST_F(hidraw, raw_event_revoked) /* inject one event */ buf[0] =3D 1; buf[1] =3D 42; - uhid_send_event(_metadata, self->uhid_fd, buf, 6); + uhid_send_event(_metadata, &self->hid, buf, 6); =20 /* read the data from hidraw */ memset(buf, 0, sizeof(buf)); @@ -117,7 +101,7 @@ TEST_F(hidraw, raw_event_revoked) /* inject one other event */ buf[0] =3D 1; buf[1] =3D 43; - uhid_send_event(_metadata, self->uhid_fd, buf, 6); + uhid_send_event(_metadata, &self->hid, buf, 6); =20 /* read the data from hidraw */ memset(buf, 0, sizeof(buf)); @@ -161,7 +145,7 @@ TEST_F(hidraw, poll_revoked) /* inject one event */ buf[0] =3D 1; buf[1] =3D 42; - uhid_send_event(_metadata, self->uhid_fd, buf, 6); + uhid_send_event(_metadata, &self->hid, buf, 6); =20 while (true) { ready =3D poll(pfds, 1, 5000); --=20 2.46.0 From nobody Sat Nov 30 07:44:08 2024 Received: from smtp.kernel.org (aws-us-west-2-korg-mail-1.web.codeaurora.org [10.30.226.201]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 7C8E01A08DB; Tue, 10 Sep 2024 14:44:05 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=10.30.226.201 ARC-Seal: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1725979445; cv=none; b=rxOOtu2HDDlchasWsS+Y4isvXluIWfS7ZqUcmA6Y1AV+DEXexXlmdH5wM32HGtzixWNkY18iNuJH/eGjst+LeBz67nXWwvSINKQjgVRUIrVC0jC/DvBUYMZXWRy/It9FwqBxZ01Y3nXwaBab67nyw6S0Z3tH4r8HsJ5RxInzLmM= ARC-Message-Signature: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1725979445; c=relaxed/simple; bh=JfbqgBGrbPRf4Q+i81ZCJ1xRNQLnuvbrzRkeCT0GBRk=; h=From:Date:Subject:MIME-Version:Content-Type:Message-Id:References: In-Reply-To:To:Cc; b=YBLhe7KW1HxMjzZAbacaC+lnGw1apmikCnA+MJDVy6EOjFt3vnrbPq34L7Af7DaV9HfQcvIXfbsDoTXGZU9m+DucFWH6SYi/kNn735zGE89XAmlteXdzl9t0h439vQJw9YNUUoYowiMq7HUkb/78VOzUSQzvFVKbHofIhS0aJ6A= ARC-Authentication-Results: i=1; smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=kernel.org header.i=@kernel.org header.b=PaTE2ETl; arc=none smtp.client-ip=10.30.226.201 Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=kernel.org header.i=@kernel.org header.b="PaTE2ETl" Received: by smtp.kernel.org (Postfix) with ESMTPSA id A5FA8C4CEC4; Tue, 10 Sep 2024 14:44:03 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1725979445; bh=JfbqgBGrbPRf4Q+i81ZCJ1xRNQLnuvbrzRkeCT0GBRk=; h=From:Date:Subject:References:In-Reply-To:To:Cc:From; b=PaTE2ETlZNbgSY5WDwpH4EqdZrHAUaF95gfVOO/LIZNoojsXeQftZgywGzJeoroxT JPg2FUrmnqdKwsy4q6XZB2CsPNz/Tvme5V+TFUFtWKKYrJ4rAwEA9yFTJJ/n7pVf0L H7nBk0C9bWK8ImLKXFdtb1P8N+ywQFms7JToCURgjUmvVZHMduHpcj7bnhtR2cqLgP o4hNGk4URMagdO4ZzWJQNlaWbFaOsv66cH7b02IKHsUyneWbG4KsiskHhY2guv9A+B JL59djHRER5KfDbNPdUN29aqKuTWJiIxDgGg6CwmJYocEgI4MByR8L2JzuL5WiHerK HpxnRGBW7RVIw== From: Benjamin Tissoires Date: Tue, 10 Sep 2024 23:43:43 +0900 Subject: [PATCH HID v2 07/11] selftests/hid: allow to parametrize bus/vid/pid/rdesc on the test device Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: quoted-printable Message-Id: <20240910-hid-bpf-hid-generic-v2-7-083dfc189e97@kernel.org> References: <20240910-hid-bpf-hid-generic-v2-0-083dfc189e97@kernel.org> In-Reply-To: <20240910-hid-bpf-hid-generic-v2-0-083dfc189e97@kernel.org> To: Jiri Kosina , Peter Hutterer , Vicki Pfau , Shuah Khan Cc: linux-input@vger.kernel.org, linux-kselftest@vger.kernel.org, linux-kernel@vger.kernel.org, bpf@vger.kernel.org, Benjamin Tissoires X-Mailer: b4 0.14.1 X-Developer-Signature: v=1; a=ed25519-sha256; t=1725979428; l=6751; i=bentiss@kernel.org; s=20230215; h=from:subject:message-id; bh=JfbqgBGrbPRf4Q+i81ZCJ1xRNQLnuvbrzRkeCT0GBRk=; b=xVAcS4cnlpjQsJDWLeRz+OzmlDzB3mJIKDEfA28Jxs9i4Blua3zu46Ez68CuposqGojXj8lFr i0AaiosyEqlA/eLDTdsQaxcIRmCkxzuZMPlHWfar/mjara7QNlEQQRI X-Developer-Key: i=bentiss@kernel.org; a=ed25519; pk=7D1DyAVh6ajCkuUTudt/chMuXWIJHlv2qCsRkIizvFw= This will be useful to introduce variants in tests to test the interactions between HID-BPF and some kernel modules. Signed-off-by: Benjamin Tissoires --- no changes in v2 --- tools/testing/selftests/hid/hid_bpf.c | 2 +- tools/testing/selftests/hid/hid_common.h | 46 ++++++++++++++++++++--------= ---- tools/testing/selftests/hid/hidraw.c | 2 +- 3 files changed, 31 insertions(+), 19 deletions(-) diff --git a/tools/testing/selftests/hid/hid_bpf.c b/tools/testing/selftest= s/hid/hid_bpf.c index 17ccbf5ff4b5..7eb15da62bdc 100644 --- a/tools/testing/selftests/hid/hid_bpf.c +++ b/tools/testing/selftests/hid/hid_bpf.c @@ -58,7 +58,7 @@ FIXTURE_SETUP(hid_bpf) { int err; =20 - err =3D setup_uhid(_metadata, &self->hid); + err =3D setup_uhid(_metadata, &self->hid, BUS_USB, 0x0001, 0x0a36, rdesc,= sizeof(rdesc)); ASSERT_OK(err); } =20 diff --git a/tools/testing/selftests/hid/hid_common.h b/tools/testing/selft= ests/hid/hid_common.h index a7d836a35bb1..f77f69c6657d 100644 --- a/tools/testing/selftests/hid/hid_common.h +++ b/tools/testing/selftests/hid/hid_common.h @@ -23,6 +23,9 @@ struct uhid_device { int dev_id; /* uniq (random) number to identify the device */ int uhid_fd; int hid_id; /* HID device id in the system */ + __u16 bus; + __u32 vid; + __u32 pid; pthread_t tid; /* thread for reading uhid events */ }; =20 @@ -129,7 +132,9 @@ static int uhid_write(struct __test_metadata *_metadata= , int fd, const struct uh } } =20 -static int uhid_create(struct __test_metadata *_metadata, int fd, int rand= _nb) +static int uhid_create(struct __test_metadata *_metadata, int fd, int rand= _nb, + __u16 bus, __u32 vid, __u32 pid, __u8 *rdesc, + size_t rdesc_size) { struct uhid_event ev; char buf[25]; @@ -140,10 +145,10 @@ static int uhid_create(struct __test_metadata *_metad= ata, int fd, int rand_nb) ev.type =3D UHID_CREATE; strcpy((char *)ev.u.create.name, buf); ev.u.create.rd_data =3D rdesc; - ev.u.create.rd_size =3D sizeof(rdesc); - ev.u.create.bus =3D BUS_USB; - ev.u.create.vendor =3D 0x0001; - ev.u.create.product =3D 0x0a37; + ev.u.create.rd_size =3D rdesc_size; + ev.u.create.bus =3D bus; + ev.u.create.vendor =3D vid; + ev.u.create.product =3D pid; ev.u.create.version =3D 0; ev.u.create.country =3D 0; =20 @@ -305,15 +310,17 @@ static int uhid_send_event(struct __test_metadata *_m= etadata, struct uhid_device return uhid_write(_metadata, hid->uhid_fd, &ev); } =20 -static bool match_sysfs_device(int dev_id, const char *workdir, struct dir= ent *dir) +static bool match_sysfs_device(struct uhid_device *hid, const char *workdi= r, struct dirent *dir) { - const char *target =3D "0003:0001:0A37.*"; + char target[20] =3D ""; char phys[512]; char uevent[1024]; char temp[512]; int fd, nread; bool found =3D false; =20 + snprintf(target, sizeof(target), "%04X:%04X:%04X.*", hid->bus, hid->vid, = hid->pid); + if (fnmatch(target, dir->d_name, 0)) return false; =20 @@ -324,7 +331,7 @@ static bool match_sysfs_device(int dev_id, const char *= workdir, struct dirent *d if (fd < 0) return false; =20 - sprintf(phys, "PHYS=3D%d", dev_id); + sprintf(phys, "PHYS=3D%d", hid->dev_id); =20 nread =3D read(fd, temp, ARRAY_SIZE(temp)); if (nread > 0 && (strstr(temp, phys)) !=3D NULL) @@ -335,7 +342,7 @@ static bool match_sysfs_device(int dev_id, const char *= workdir, struct dirent *d return found; } =20 -static int get_hid_id(int dev_id) +static int get_hid_id(struct uhid_device *hid) { const char *workdir =3D "/sys/devices/virtual/misc/uhid"; const char *str_id; @@ -350,10 +357,10 @@ static int get_hid_id(int dev_id) d =3D opendir(workdir); if (d) { while ((dir =3D readdir(d)) !=3D NULL) { - if (!match_sysfs_device(dev_id, workdir, dir)) + if (!match_sysfs_device(hid, workdir, dir)) continue; =20 - str_id =3D dir->d_name + sizeof("0003:0001:0A37."); + str_id =3D dir->d_name + sizeof("0000:0000:0000."); found =3D (int)strtol(str_id, NULL, 16); =20 break; @@ -367,7 +374,7 @@ static int get_hid_id(int dev_id) return found; } =20 -static int get_hidraw(int dev_id) +static int get_hidraw(struct uhid_device *hid) { const char *workdir =3D "/sys/devices/virtual/misc/uhid"; char sysfs[1024]; @@ -384,7 +391,7 @@ static int get_hidraw(int dev_id) continue; =20 while ((dir =3D readdir(d)) !=3D NULL) { - if (!match_sysfs_device(dev_id, workdir, dir)) + if (!match_sysfs_device(hid, workdir, dir)) continue; =20 sprintf(sysfs, "%s/%s/hidraw", workdir, dir->d_name); @@ -416,7 +423,7 @@ static int open_hidraw(struct uhid_device *hid) int hidraw_number; char hidraw_path[64] =3D { 0 }; =20 - hidraw_number =3D get_hidraw(hid->dev_id); + hidraw_number =3D get_hidraw(hid); if (hidraw_number < 0) return hidraw_number; =20 @@ -425,7 +432,8 @@ static int open_hidraw(struct uhid_device *hid) return open(hidraw_path, O_RDWR | O_NONBLOCK); } =20 -static int setup_uhid(struct __test_metadata *_metadata, struct uhid_devic= e *hid) +static int setup_uhid(struct __test_metadata *_metadata, struct uhid_devic= e *hid, + __u16 bus, __u32 vid, __u32 pid, const __u8 *rdesc, size_t rdesc_s= ize) { const char *path =3D "/dev/uhid"; time_t t; @@ -435,11 +443,15 @@ static int setup_uhid(struct __test_metadata *_metada= ta, struct uhid_device *hid srand((unsigned int)time(&t)); =20 hid->dev_id =3D rand() % 1024; + hid->bus =3D bus; + hid->vid =3D vid; + hid->pid =3D pid; =20 hid->uhid_fd =3D open(path, O_RDWR | O_CLOEXEC); ASSERT_GE(hid->uhid_fd, 0) TH_LOG("open uhid-cdev failed; %d", hid->uhid_= fd); =20 - ret =3D uhid_create(_metadata, hid->uhid_fd, hid->dev_id); + ret =3D uhid_create(_metadata, hid->uhid_fd, hid->dev_id, bus, vid, pid, + (__u8 *)rdesc, rdesc_size); ASSERT_EQ(0, ret) { TH_LOG("create uhid device failed: %d", ret); close(hid->uhid_fd); @@ -447,7 +459,7 @@ static int setup_uhid(struct __test_metadata *_metadata= , struct uhid_device *hid } =20 /* locate the uevent file of the created device */ - hid->hid_id =3D get_hid_id(hid->dev_id); + hid->hid_id =3D get_hid_id(hid); ASSERT_GT(hid->hid_id, 0) TH_LOG("Could not locate uhid device id: %d", hid->hid_id); =20 diff --git a/tools/testing/selftests/hid/hidraw.c b/tools/testing/selftests= /hid/hidraw.c index 5934818b2036..821db37ba4bb 100644 --- a/tools/testing/selftests/hid/hidraw.c +++ b/tools/testing/selftests/hid/hidraw.c @@ -36,7 +36,7 @@ FIXTURE_SETUP(hidraw) { int err; =20 - err =3D setup_uhid(_metadata, &self->hid); + err =3D setup_uhid(_metadata, &self->hid, BUS_USB, 0x0001, 0x0a37, rdesc,= sizeof(rdesc)); ASSERT_OK(err); =20 self->hidraw_fd =3D open_hidraw(&self->hid); --=20 2.46.0 From nobody Sat Nov 30 07:44:08 2024 Received: from smtp.kernel.org (aws-us-west-2-korg-mail-1.web.codeaurora.org [10.30.226.201]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 104A2199937; Tue, 10 Sep 2024 14:44:07 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=10.30.226.201 ARC-Seal: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1725979448; cv=none; b=oRiKzjWliz1xBMNTQ8bo+6zYs2JXuL5iUMiZpn6g7Hg9lAYvKy+7ahk4I9IfUY64Z4yftIALTgwFH+VUZrT7hf/iuNyY+EpYcDBSTsFiz1240KngGgBu0xHgqD9WheoauVQMaV0tg+cdpRFP3dHu7njDEUGlyDFQzFWmB3qwGdY= ARC-Message-Signature: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1725979448; c=relaxed/simple; bh=cekMYo1ojSfea+jvGvXqY7LovIV5+3t1/k3FCtBa3rU=; h=From:Date:Subject:MIME-Version:Content-Type:Message-Id:References: In-Reply-To:To:Cc; b=gZkmha6XhcBpm8SjwV0ezzFQgtvcaGJGcXVY6URJcc5MnT2oMfb6fLa5/nSTRImcH+ZUynBB3EXOg7yXeVH6lvfxZ40mSV6mwIe5GoI4udLprzD2RfKtGFyg/W2MwOhgln6u9fwZv99gREAiwSO6YjJXpMnZXRyb3j9QYK8BmHE= ARC-Authentication-Results: i=1; smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=kernel.org header.i=@kernel.org header.b=EaY1qsuT; arc=none smtp.client-ip=10.30.226.201 Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=kernel.org header.i=@kernel.org header.b="EaY1qsuT" Received: by smtp.kernel.org (Postfix) with ESMTPSA id C7510C4CECF; Tue, 10 Sep 2024 14:44:05 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1725979447; bh=cekMYo1ojSfea+jvGvXqY7LovIV5+3t1/k3FCtBa3rU=; h=From:Date:Subject:References:In-Reply-To:To:Cc:From; b=EaY1qsuTfUXevsNMoVjb+DLUymG43u5h51cGmJy+9mCyQi34drzWawR8LrjLYnvJr TBaaF3sjqm0hYz/HnrOTCDa6TZsyhCLQnvruZTFz/diHSwlnLz1iintPE6WILdiOxc JUPIhCyDQfnDPmXWv4cDOZL8njbxOyjeWaVq7IxdeGFIMjcFxi8/TdkXPYVTe+uW0W DHmJ2iU59mpfVLE5Wp0FeVaVYwyRP/j955uhOzcrpo/mrwS+UcBuV9DAY/SImc1I/B 1j7DOTi7JmsIVGJKr5X2g6xNvyE6vwiqOSkdBJKnVzSyGBsTQuRPBqlibbseX6W8Xt cDFNZqoQMUmOA== From: Benjamin Tissoires Date: Tue, 10 Sep 2024 23:43:44 +0900 Subject: [PATCH HID v2 08/11] HID: add per device quirk to force bind to hid-generic Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: quoted-printable Message-Id: <20240910-hid-bpf-hid-generic-v2-8-083dfc189e97@kernel.org> References: <20240910-hid-bpf-hid-generic-v2-0-083dfc189e97@kernel.org> In-Reply-To: <20240910-hid-bpf-hid-generic-v2-0-083dfc189e97@kernel.org> To: Jiri Kosina , Peter Hutterer , Vicki Pfau , Shuah Khan Cc: linux-input@vger.kernel.org, linux-kselftest@vger.kernel.org, linux-kernel@vger.kernel.org, bpf@vger.kernel.org, Benjamin Tissoires X-Mailer: b4 0.14.1 X-Developer-Signature: v=1; a=ed25519-sha256; t=1725979428; l=2708; i=bentiss@kernel.org; s=20230215; h=from:subject:message-id; bh=cekMYo1ojSfea+jvGvXqY7LovIV5+3t1/k3FCtBa3rU=; b=5P1N3bSR8ds90Ae+puqheLFiVErJaoZEHQBC9qRZvGVrSKlWqGvfvWLBO/ctgSRVqV6k7QRLV qMiW1a3SG0BCCUdN/GNi+XXXXLHh2ELjfGJ70wzyDYvgzearsZiVCMN X-Developer-Key: i=bentiss@kernel.org; a=ed25519; pk=7D1DyAVh6ajCkuUTudt/chMuXWIJHlv2qCsRkIizvFw= We already have the possibility to force not binding to hid-generic and rely on a dedicated driver, but we couldn't do the other way around. This is useful for BPF programs where we are fixing the report descriptor and the events, but want to avoid a specialized driver to come after BPF which would unwind everything that is done there. Signed-off-by: Benjamin Tissoires Reviewed-by: Peter Hutterer --- changes in v2: - rely on hdev->quirks for that instead of a new struct for hid_driver --- drivers/hid/hid-core.c | 5 +++-- drivers/hid/hid-generic.c | 3 +++ include/linux/hid.h | 2 ++ 3 files changed, 8 insertions(+), 2 deletions(-) diff --git a/drivers/hid/hid-core.c b/drivers/hid/hid-core.c index 37e52759a931..bf63e2819baf 100644 --- a/drivers/hid/hid-core.c +++ b/drivers/hid/hid-core.c @@ -2665,9 +2665,10 @@ static bool hid_check_device_match(struct hid_device= *hdev, /* * hid-generic implements .match(), so we must be dealing with a * different HID driver here, and can simply check if - * hid_ignore_special_drivers is set or not. + * hid_ignore_special_drivers or HID_QUIRK_IGNORE_SPECIAL_DRIVER + * are set or not. */ - return !hid_ignore_special_drivers; + return !hid_ignore_special_drivers && !(hdev->quirks & HID_QUIRK_IGNORE_S= PECIAL_DRIVER); } =20 static int __hid_device_probe(struct hid_device *hdev, struct hid_driver *= hdrv) diff --git a/drivers/hid/hid-generic.c b/drivers/hid/hid-generic.c index f9db991d3c5a..88882c1bfffe 100644 --- a/drivers/hid/hid-generic.c +++ b/drivers/hid/hid-generic.c @@ -40,6 +40,9 @@ static bool hid_generic_match(struct hid_device *hdev, if (ignore_special_driver) return true; =20 + if (hdev->quirks & HID_QUIRK_IGNORE_SPECIAL_DRIVER) + return true; + if (hdev->quirks & HID_QUIRK_HAVE_SPECIAL_DRIVER) return false; =20 diff --git a/include/linux/hid.h b/include/linux/hid.h index d41fa18f1e03..b3a9586363c9 100644 --- a/include/linux/hid.h +++ b/include/linux/hid.h @@ -359,6 +359,7 @@ struct hid_item { * | @HID_QUIRK_NO_OUTPUT_REPORTS_ON_INTR_EP: * | @HID_QUIRK_HAVE_SPECIAL_DRIVER: * | @HID_QUIRK_INCREMENT_USAGE_ON_DUPLICATE: + * | @HID_QUIRK_IGNORE_SPECIAL_DRIVER * | @HID_QUIRK_FULLSPEED_INTERVAL: * | @HID_QUIRK_NO_INIT_REPORTS: * | @HID_QUIRK_NO_IGNORE: @@ -384,6 +385,7 @@ struct hid_item { #define HID_QUIRK_HAVE_SPECIAL_DRIVER BIT(19) #define HID_QUIRK_INCREMENT_USAGE_ON_DUPLICATE BIT(20) #define HID_QUIRK_NOINVERT BIT(21) +#define HID_QUIRK_IGNORE_SPECIAL_DRIVER BIT(22) #define HID_QUIRK_FULLSPEED_INTERVAL BIT(28) #define HID_QUIRK_NO_INIT_REPORTS BIT(29) #define HID_QUIRK_NO_IGNORE BIT(30) --=20 2.46.0 From nobody Sat Nov 30 07:44:08 2024 Received: from smtp.kernel.org (aws-us-west-2-korg-mail-1.web.codeaurora.org [10.30.226.201]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id BBCFC1A2C25; Tue, 10 Sep 2024 14:44:09 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=10.30.226.201 ARC-Seal: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1725979449; cv=none; b=J7HDGu1V23WhP2sAY6N32nMK1Z7jepoXYRitP6+clGBDM386RP69J438GHknl/P5zhFP86yd6HqHymyl+scm1BrFhcOVRGIEKWDcXFPAPWSpa31sddFowrrQxHEIL7jBIoXmp4q2gJWKWjX1bK2zvXM4j56ccBDLQCuGKvWx9S0= ARC-Message-Signature: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1725979449; c=relaxed/simple; bh=RC0OcZWXYp36gijPOdDycz5WVWZVh9ovwtf2TjypL1c=; h=From:Date:Subject:MIME-Version:Content-Type:Message-Id:References: In-Reply-To:To:Cc; b=GZ4auBadlcqAkvw7MsJSnExDYzTm6XNFlTD2xdFJGZ7SSGJx1SSNBFyqAxM6aUlLYy28yQyie5VNHsYOowZfuggiCUGmAeK3CHxhKeVnqyFwVpvQuEBpV3w3A4no0Y8IjMmle2zyB+DQmpecpVkRlpdQt/geXx0vOK0uoE7k9zY= ARC-Authentication-Results: i=1; smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=kernel.org header.i=@kernel.org header.b=Trrra9ZH; arc=none smtp.client-ip=10.30.226.201 Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=kernel.org header.i=@kernel.org header.b="Trrra9ZH" Received: by smtp.kernel.org (Postfix) with ESMTPSA id E6B05C4CECD; Tue, 10 Sep 2024 14:44:07 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1725979449; bh=RC0OcZWXYp36gijPOdDycz5WVWZVh9ovwtf2TjypL1c=; h=From:Date:Subject:References:In-Reply-To:To:Cc:From; b=Trrra9ZH6To3Y9ufxjR1LwEemwbKI6KZqedfrsWBthdBig+b/poPOc4OavedR+0C9 n1xXHKnTy8tRCYi9RF7aSXy+I+/VrczFojJLArgf9KkAvSlc+Ig2ewgpOF1H2ej3nN sj50c2u4o34qi8kz2cMp5ommctEM7SvGN0eb5jAoCXmv+8Q8Ul470JrhM3+c/5LAlF zZTkEqWOTAOe6sC2GNccg0AhOFrj06MGcjnODMdNcKVJU28d7B+3MY9ESHeQC4Dpc1 JysRVZLAae4t79awU4cqmtaJeINfNjfB83OPxqoOM2fz/plbEwBUV5DoLDghVHSzRt h//7usybeD25Q== From: Benjamin Tissoires Date: Tue, 10 Sep 2024 23:43:45 +0900 Subject: [PATCH HID v2 09/11] selftests/hid: add test for assigning a given device to hid-generic Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: quoted-printable Message-Id: <20240910-hid-bpf-hid-generic-v2-9-083dfc189e97@kernel.org> References: <20240910-hid-bpf-hid-generic-v2-0-083dfc189e97@kernel.org> In-Reply-To: <20240910-hid-bpf-hid-generic-v2-0-083dfc189e97@kernel.org> To: Jiri Kosina , Peter Hutterer , Vicki Pfau , Shuah Khan Cc: linux-input@vger.kernel.org, linux-kselftest@vger.kernel.org, linux-kernel@vger.kernel.org, bpf@vger.kernel.org, Benjamin Tissoires X-Mailer: b4 0.14.1 X-Developer-Signature: v=1; a=ed25519-sha256; t=1725979428; l=4691; i=bentiss@kernel.org; s=20230215; h=from:subject:message-id; bh=RC0OcZWXYp36gijPOdDycz5WVWZVh9ovwtf2TjypL1c=; b=K1T3X/S3FcETPm5Afe9U7NGYx0EE4aQ22NbRrEZ7Ug/ASedd5wDVzOy44sw68LpR1PRdGols/ usgMKApzaUyDH+xCDisOMdXZobf/jZu5BtdE3a/4Mm/jSJwy/r9b6X4 X-Developer-Key: i=bentiss@kernel.org; a=ed25519; pk=7D1DyAVh6ajCkuUTudt/chMuXWIJHlv2qCsRkIizvFw= We use a well known VID/PID on a driver that doesn't need to talk to the device, ensures we created the device against the target driver, then load our program and ensure we have unbound to this driver and use hid-generic instead. Signed-off-by: Benjamin Tissoires --- changes in v2: - amended for the new API --- tools/testing/selftests/hid/hid_bpf.c | 80 ++++++++++++++++++= +++- tools/testing/selftests/hid/progs/hid.c | 12 ++++ .../testing/selftests/hid/progs/hid_bpf_helpers.h | 6 +- 3 files changed, 96 insertions(+), 2 deletions(-) diff --git a/tools/testing/selftests/hid/hid_bpf.c b/tools/testing/selftest= s/hid/hid_bpf.c index 7eb15da62bdc..edc061b38528 100644 --- a/tools/testing/selftests/hid/hid_bpf.c +++ b/tools/testing/selftests/hid/hid_bpf.c @@ -54,11 +54,41 @@ FIXTURE_TEARDOWN(hid_bpf) { hid_bpf_teardown(_metadata, self, variant); \ } while (0) =20 +struct specific_device { + const char test_name[64]; + __u16 bus; + __u32 vid; + __u32 pid; +}; + FIXTURE_SETUP(hid_bpf) { + const struct specific_device *match =3D NULL; int err; =20 - err =3D setup_uhid(_metadata, &self->hid, BUS_USB, 0x0001, 0x0a36, rdesc,= sizeof(rdesc)); + const struct specific_device devices[] =3D { + { + .test_name =3D "test_hid_driver_probe", + .bus =3D BUS_BLUETOOTH, + .vid =3D 0x05ac, /* USB_VENDOR_ID_APPLE */ + .pid =3D 0x022c, /* USB_DEVICE_ID_APPLE_ALU_WIRELESS_ANSI */ + }, { + .test_name =3D "*", + .bus =3D BUS_USB, + .vid =3D 0x0001, + .pid =3D 0x0a36, + }}; + + for (int i =3D 0; i < ARRAY_SIZE(devices); i++) { + match =3D &devices[i]; + if (!strncmp(_metadata->name, devices[i].test_name, sizeof(devices[i].te= st_name))) + break; + } + + ASSERT_OK_PTR(match); + + err =3D setup_uhid(_metadata, &self->hid, match->bus, match->vid, match->= pid, + rdesc, sizeof(rdesc)); ASSERT_OK(err); } =20 @@ -855,6 +885,54 @@ TEST_F(hid_bpf, test_hid_attach_flags) ASSERT_EQ(buf[3], 3); } =20 +static bool is_using_driver(struct __test_metadata *_metadata, struct uhid= _device *hid, + const char *driver) +{ + char driver_line[512]; + char uevent[1024]; + char temp[512]; + int fd, nread; + bool found =3D false; + + sprintf(uevent, "/sys/bus/hid/devices/%04X:%04X:%04X.%04X/uevent", + hid->bus, hid->vid, hid->pid, hid->hid_id); + + fd =3D open(uevent, O_RDONLY | O_NONBLOCK); + if (fd < 0) { + TH_LOG("couldn't open '%s': %d, %d", uevent, fd, errno); + return false; + } + + sprintf(driver_line, "DRIVER=3D%s", driver); + + nread =3D read(fd, temp, ARRAY_SIZE(temp)); + if (nread > 0 && (strstr(temp, driver_line)) !=3D NULL) + found =3D true; + + close(fd); + + return found; +} + +/* + * Attach hid_driver_probe to the given uhid device, + * check that the device is now using hid-generic. + */ +TEST_F(hid_bpf, test_hid_driver_probe) +{ + const struct test_program progs[] =3D { + { + .name =3D "hid_test_driver_probe", + }, + }; + + ASSERT_TRUE(is_using_driver(_metadata, &self->hid, "apple")); + + LOAD_PROGRAMS(progs); + + ASSERT_TRUE(is_using_driver(_metadata, &self->hid, "hid-generic")); +} + /* * Attach hid_rdesc_fixup to the given uhid device, * retrieve and open the matching hidraw node, diff --git a/tools/testing/selftests/hid/progs/hid.c b/tools/testing/selfte= sts/hid/progs/hid.c index 5ecc845ef792..9b22e9a0e658 100644 --- a/tools/testing/selftests/hid/progs/hid.c +++ b/tools/testing/selftests/hid/progs/hid.c @@ -598,3 +598,15 @@ SEC(".struct_ops.link") struct hid_bpf_ops test_infinite_loop_input_report =3D { .hid_device_event =3D (void *)hid_test_infinite_loop_input_report, }; + +SEC("?struct_ops.s/hid_rdesc_fixup") +int BPF_PROG(hid_test_driver_probe, struct hid_bpf_ctx *hid_ctx) +{ + hid_ctx->hid->quirks |=3D HID_QUIRK_IGNORE_SPECIAL_DRIVER; + return 0; +} + +SEC(".struct_ops.link") +struct hid_bpf_ops test_driver_probe =3D { + .hid_rdesc_fixup =3D (void *)hid_test_driver_probe, +}; diff --git a/tools/testing/selftests/hid/progs/hid_bpf_helpers.h b/tools/te= sting/selftests/hid/progs/hid_bpf_helpers.h index e5db897586bb..1a645684a117 100644 --- a/tools/testing/selftests/hid/progs/hid_bpf_helpers.h +++ b/tools/testing/selftests/hid/progs/hid_bpf_helpers.h @@ -84,10 +84,14 @@ struct hid_bpf_ops { struct hid_device *hdev; }; =20 +#define BIT(n) (1U << n) + #ifndef BPF_F_BEFORE -#define BPF_F_BEFORE (1U << 3) +#define BPF_F_BEFORE BIT(3) #endif =20 +#define HID_QUIRK_IGNORE_SPECIAL_DRIVER BIT(22) + /* following are kfuncs exported by HID for HID-BPF */ extern __u8 *hid_bpf_get_data(struct hid_bpf_ctx *ctx, unsigned int offset, --=20 2.46.0 From nobody Sat Nov 30 07:44:08 2024 Received: from smtp.kernel.org (aws-us-west-2-korg-mail-1.web.codeaurora.org [10.30.226.201]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 4D3841A38CF; Tue, 10 Sep 2024 14:44:11 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=10.30.226.201 ARC-Seal: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1725979452; cv=none; b=I7ZO25FzCJ+t6piaju/QcBCZFzND4YuKgSYW5k9RSjz9AV+n/aiYW+KOeVPe4i/Seay19rJEiGB1vw+5CSC4yuC7syV5mS3D71AjqK34+SzYvx2LzJjausSEjGf753SOGdA3JBkY9qrjtIzxcdX7ouHve3J+ApbasWh2dCHi9s8= ARC-Message-Signature: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1725979452; c=relaxed/simple; bh=9dyQnVWhgspQ6LB9IUnWrlJkGheZruF2s/Ba5yr7S1s=; h=From:Date:Subject:MIME-Version:Content-Type:Message-Id:References: In-Reply-To:To:Cc; b=US+H/cwi52qWta8UzacEDXCwBIldNDxzeE0x464bvitCS1kdYJeDLpxdLuqUKiljJNoOpElIfurlvTC5QMxaZmiO/a5F2NDvAEotxrjU0liMj5xXcftndtnKnBzKdRSEN4eE7Ti97HleDmr2PEqc2pudPFHHgtOi4ZoTXWSN8rc= ARC-Authentication-Results: i=1; smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=kernel.org header.i=@kernel.org header.b=d/KI7iwA; arc=none smtp.client-ip=10.30.226.201 Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=kernel.org header.i=@kernel.org header.b="d/KI7iwA" Received: by smtp.kernel.org (Postfix) with ESMTPSA id 1302BC4CEC3; Tue, 10 Sep 2024 14:44:09 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1725979451; bh=9dyQnVWhgspQ6LB9IUnWrlJkGheZruF2s/Ba5yr7S1s=; h=From:Date:Subject:References:In-Reply-To:To:Cc:From; b=d/KI7iwAD7NGTrhWlbp1VbZQwLj3yYaTsJt4cDG1p8t4yfyxRiBqMSmFbjfLSbIdn N7QkDYNkP1D4tbToGK8cxVraZ3PTsRvY28yi/9BshIeqOZvhoqMhy9SUB1rwI1PKOx e+eZN9xO4gDpJg7NA3tpyl5E48ph+J5d6buz2jal/IW6x//fWc0HBbCw0pKrfK9hFt DTofOiYwpiMp9zKndTDcCbM05cmsPfU6QM9KmPwX4F27PQDy3uiC2T+wLWc94PsM/l WvD7GNFYGcXMwgXG19OHoYmvQbJbHc605w5NgbQKLkY7dOM3feD2pBUz6x9hk7cAeu dH/4Pj1tols5w== From: Benjamin Tissoires Date: Tue, 10 Sep 2024 23:43:46 +0900 Subject: [PATCH HID v2 10/11] HID: add quirk to prevent hid-input to be used Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: quoted-printable Message-Id: <20240910-hid-bpf-hid-generic-v2-10-083dfc189e97@kernel.org> References: <20240910-hid-bpf-hid-generic-v2-0-083dfc189e97@kernel.org> In-Reply-To: <20240910-hid-bpf-hid-generic-v2-0-083dfc189e97@kernel.org> To: Jiri Kosina , Peter Hutterer , Vicki Pfau , Shuah Khan Cc: linux-input@vger.kernel.org, linux-kselftest@vger.kernel.org, linux-kernel@vger.kernel.org, bpf@vger.kernel.org, Benjamin Tissoires X-Mailer: b4 0.14.1 X-Developer-Signature: v=1; a=ed25519-sha256; t=1725979428; l=2228; i=bentiss@kernel.org; s=20230215; h=from:subject:message-id; bh=9dyQnVWhgspQ6LB9IUnWrlJkGheZruF2s/Ba5yr7S1s=; b=gY6clRpXriioBX5njKmURCqoN1D1JzNxSjAENynzdjftIEW+qaTluKr1VV4vMaUjSnKscL7XC HnDDG6V28PzAOm2zcyVf4G/xCCkasJySvjvzxTV/vH7HNTyZtFvSziw X-Developer-Key: i=bentiss@kernel.org; a=ed25519; pk=7D1DyAVh6ajCkuUTudt/chMuXWIJHlv2qCsRkIizvFw= This is useful when you want to handle the device entirely from BPF without exposing the automatic input nodes. This is useful in case we want to have a third party program that directly talks to the hidraw node and we don't want regular input events to be emitted. This third party program can load a BPF program that instructs hid-generic to rebind on the device with hidraw only and then open the hidraw node itself. When the application is closed, the BPF program is unloaded and the normal driver takes back the control of the device. Signed-off-by: Benjamin Tissoires --- changes in v2: - rely on hdev->quirks instead of a new struct --- drivers/hid/hid-core.c | 2 ++ include/linux/hid.h | 2 ++ 2 files changed, 4 insertions(+) diff --git a/drivers/hid/hid-core.c b/drivers/hid/hid-core.c index bf63e2819baf..35cefd7167aa 100644 --- a/drivers/hid/hid-core.c +++ b/drivers/hid/hid-core.c @@ -2217,6 +2217,8 @@ int hid_connect(struct hid_device *hdev, unsigned int= connect_mask) connect_mask |=3D (HID_CONNECT_HIDDEV_FORCE | HID_CONNECT_HIDDEV); if (hdev->quirks & HID_QUIRK_HIDINPUT_FORCE) connect_mask |=3D HID_CONNECT_HIDINPUT_FORCE; + if (hdev->quirks & HID_QUIRK_IGNORE_HIDINPUT) + connect_mask &=3D ~HID_CONNECT_HIDINPUT; if (hdev->bus !=3D BUS_USB) connect_mask &=3D ~HID_CONNECT_HIDDEV; if (hid_hiddev(hdev)) diff --git a/include/linux/hid.h b/include/linux/hid.h index b3a9586363c9..b6bad03649f6 100644 --- a/include/linux/hid.h +++ b/include/linux/hid.h @@ -360,6 +360,7 @@ struct hid_item { * | @HID_QUIRK_HAVE_SPECIAL_DRIVER: * | @HID_QUIRK_INCREMENT_USAGE_ON_DUPLICATE: * | @HID_QUIRK_IGNORE_SPECIAL_DRIVER + * | @HID_QUIRK_IGNORE_HIDINPUT * | @HID_QUIRK_FULLSPEED_INTERVAL: * | @HID_QUIRK_NO_INIT_REPORTS: * | @HID_QUIRK_NO_IGNORE: @@ -386,6 +387,7 @@ struct hid_item { #define HID_QUIRK_INCREMENT_USAGE_ON_DUPLICATE BIT(20) #define HID_QUIRK_NOINVERT BIT(21) #define HID_QUIRK_IGNORE_SPECIAL_DRIVER BIT(22) +#define HID_QUIRK_IGNORE_HIDINPUT BIT(23) #define HID_QUIRK_FULLSPEED_INTERVAL BIT(28) #define HID_QUIRK_NO_INIT_REPORTS BIT(29) #define HID_QUIRK_NO_IGNORE BIT(30) --=20 2.46.0 From nobody Sat Nov 30 07:44:08 2024 Received: from smtp.kernel.org (aws-us-west-2-korg-mail-1.web.codeaurora.org [10.30.226.201]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 5CE371A38F9; Tue, 10 Sep 2024 14:44:14 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=10.30.226.201 ARC-Seal: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1725979454; cv=none; b=qb3lleWqEeSihxYgvx3ocQlOKGEVuwWIO58yDdurvEF1juVeeNoGGGFlNgUIB63DtzKaTduhj+6JweAyK+pX8KIAbiKYT/3N62tAWI5TaFF+Mj5ccp4EH7Iz7fH6NZ8uMV0PW1tsh/VClbduSBk9jEcur+LqOUUb0+yVPdvVawo= ARC-Message-Signature: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1725979454; c=relaxed/simple; bh=LmBG5BHGYdWXIOucMdHZKe5DqBhFcqK07cXblfY/l0Y=; h=From:Date:Subject:MIME-Version:Content-Type:Message-Id:References: In-Reply-To:To:Cc; b=rGPjdzdkS3RXHs3L3wc36SQsbeWpb5oY/ptTnwa6NO5ABskypcqMF8oarKUHaW8OfVjDEiQCp8ehWp+ibNY8+XHCHjLPdzV7wJ8VTpwmf34hO8DTvvPtfOPqO9FyixTjFaiwNdLHekxSaqmkw3HkgZwy8RUHs4d1x7MfNU8LqXA= ARC-Authentication-Results: i=1; smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=kernel.org header.i=@kernel.org header.b=d1a24Ert; arc=none smtp.client-ip=10.30.226.201 Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=kernel.org header.i=@kernel.org header.b="d1a24Ert" Received: by smtp.kernel.org (Postfix) with ESMTPSA id 34A45C4CECE; Tue, 10 Sep 2024 14:44:12 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1725979453; bh=LmBG5BHGYdWXIOucMdHZKe5DqBhFcqK07cXblfY/l0Y=; h=From:Date:Subject:References:In-Reply-To:To:Cc:From; b=d1a24ErtDm70VPJ1/SWrFe5tAMR7WPpUaynaU3xdzRJTFV6sMH/ZMS2vVQVQ5ybcm XKSbbcnmgj7TU6/AKRlHMD2reEwlnm35yz5Hoo78ogb05GU+YWQZYO4O6pw8uIfkqj 3CpU2eVxPebHErmS4Wr79PocLsi3ugvrBl7mKq0u8U4wzQpc3cclViAhEcypGaydvp MbI7w+7erasZTqeKKwRJ0Bq1DpUF9QhqtWKa9Bgu5bDki1q6jIsIXa/NHtN+ervRu/ B21zyh92Tlv+1p4aMJiRmo1eNfDuTQkH882m7B8bfE1tcM8jYdc/nCE5q81cwYojM5 klx6jykHzcasg== From: Benjamin Tissoires Date: Tue, 10 Sep 2024 23:43:47 +0900 Subject: [PATCH HID v2 11/11] selftests/hid: add test to disable hid-input Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: quoted-printable Message-Id: <20240910-hid-bpf-hid-generic-v2-11-083dfc189e97@kernel.org> References: <20240910-hid-bpf-hid-generic-v2-0-083dfc189e97@kernel.org> In-Reply-To: <20240910-hid-bpf-hid-generic-v2-0-083dfc189e97@kernel.org> To: Jiri Kosina , Peter Hutterer , Vicki Pfau , Shuah Khan Cc: linux-input@vger.kernel.org, linux-kselftest@vger.kernel.org, linux-kernel@vger.kernel.org, bpf@vger.kernel.org, Benjamin Tissoires X-Mailer: b4 0.14.1 X-Developer-Signature: v=1; a=ed25519-sha256; t=1725979428; l=5547; i=bentiss@kernel.org; s=20230215; h=from:subject:message-id; bh=LmBG5BHGYdWXIOucMdHZKe5DqBhFcqK07cXblfY/l0Y=; b=0EYf1JyMDXPcGWcDKNKveACXh9M/f/oJ1DKRuDRxRsjir8szlhhgA+1DLiD8hRQ+kSHCgpOMe 56E2fUVaOkdAO24gPrhGHVcCacPQRl0wHVtYn6ZvXktAWdBnt9hJer/ X-Developer-Key: i=bentiss@kernel.org; a=ed25519; pk=7D1DyAVh6ajCkuUTudt/chMuXWIJHlv2qCsRkIizvFw= Add a test for the newly enabled feature to control the connect_mask of hid-generic. Signed-off-by: Benjamin Tissoires --- changes in v2: - amended for the new API --- tools/testing/selftests/hid/hid_bpf.c | 60 ++++++++++++++++++= +++- tools/testing/selftests/hid/progs/hid.c | 1 + .../testing/selftests/hid/progs/hid_bpf_helpers.h | 1 + 3 files changed, 61 insertions(+), 1 deletion(-) diff --git a/tools/testing/selftests/hid/hid_bpf.c b/tools/testing/selftest= s/hid/hid_bpf.c index edc061b38528..41cacc30ef8b 100644 --- a/tools/testing/selftests/hid/hid_bpf.c +++ b/tools/testing/selftests/hid/hid_bpf.c @@ -4,6 +4,38 @@ #include "hid_common.h" #include =20 +static const __u8 mouse_rdesc[] =3D { + 0x05, 0x01, /* .Usage Page (Generic Desktop) 0 */ + 0x09, 0x02, /* .Usage (Mouse) 2 */ + 0xa1, 0x01, /* .Collection (Application) 4 */ + 0x09, 0x02, /* ..Usage (Mouse) 6 */ + 0xa1, 0x02, /* ..Collection (Logical) 8 */ + 0x09, 0x01, /* ...Usage (Pointer) 10 */ + 0xa1, 0x00, /* ...Collection (Physical) 12 */ + 0x05, 0x09, /* ....Usage Page (Button) 14 */ + 0x19, 0x01, /* ....Usage Minimum (1) 16 */ + 0x29, 0x03, /* ....Usage Maximum (3) 18 */ + 0x15, 0x00, /* ....Logical Minimum (0) 20 */ + 0x25, 0x01, /* ....Logical Maximum (1) 22 */ + 0x75, 0x01, /* ....Report Size (1) 24 */ + 0x95, 0x03, /* ....Report Count (3) 26 */ + 0x81, 0x02, /* ....Input (Data,Var,Abs) 28 */ + 0x75, 0x05, /* ....Report Size (5) 30 */ + 0x95, 0x01, /* ....Report Count (1) 32 */ + 0x81, 0x03, /* ....Input (Cnst,Var,Abs) 34 */ + 0x05, 0x01, /* ....Usage Page (Generic Desktop) 36 */ + 0x09, 0x30, /* ....Usage (X) 38 */ + 0x09, 0x31, /* ....Usage (Y) 40 */ + 0x15, 0x81, /* ....Logical Minimum (-127) 42 */ + 0x25, 0x7f, /* ....Logical Maximum (127) 44 */ + 0x75, 0x08, /* ....Report Size (8) 46 */ + 0x95, 0x02, /* ....Report Count (2) 48 */ + 0x81, 0x06, /* ....Input (Data,Var,Rel) 50 */ + 0xc0, /* ...End Collection 52 */ + 0xc0, /* ..End Collection 53 */ + 0xc0, /* .End Collection 54 */ +}; + struct hid_hw_request_syscall_args { __u8 data[10]; unsigned int hid; @@ -59,6 +91,8 @@ struct specific_device { __u16 bus; __u32 vid; __u32 pid; + const __u8 *rdesc; + const size_t rdesc_size; }; =20 FIXTURE_SETUP(hid_bpf) @@ -72,11 +106,15 @@ FIXTURE_SETUP(hid_bpf) .bus =3D BUS_BLUETOOTH, .vid =3D 0x05ac, /* USB_VENDOR_ID_APPLE */ .pid =3D 0x022c, /* USB_DEVICE_ID_APPLE_ALU_WIRELESS_ANSI */ + .rdesc =3D mouse_rdesc, + .rdesc_size =3D sizeof(mouse_rdesc), }, { .test_name =3D "*", .bus =3D BUS_USB, .vid =3D 0x0001, .pid =3D 0x0a36, + .rdesc =3D rdesc, + .rdesc_size =3D sizeof(rdesc), }}; =20 for (int i =3D 0; i < ARRAY_SIZE(devices); i++) { @@ -88,7 +126,7 @@ FIXTURE_SETUP(hid_bpf) ASSERT_OK_PTR(match); =20 err =3D setup_uhid(_metadata, &self->hid, match->bus, match->vid, match->= pid, - rdesc, sizeof(rdesc)); + match->rdesc, match->rdesc_size); ASSERT_OK(err); } =20 @@ -914,6 +952,24 @@ static bool is_using_driver(struct __test_metadata *_m= etadata, struct uhid_devic return found; } =20 +static bool has_hid_input(struct uhid_device *hid) +{ + char input[1024]; + DIR *d; + + sprintf(input, "/sys/bus/hid/devices/%04X:%04X:%04X.%04X/input", + hid->bus, hid->vid, hid->pid, hid->hid_id); + + d =3D opendir(input); + if (d) { + closedir(d); + + return true; + } + + return false; +} + /* * Attach hid_driver_probe to the given uhid device, * check that the device is now using hid-generic. @@ -927,10 +983,12 @@ TEST_F(hid_bpf, test_hid_driver_probe) }; =20 ASSERT_TRUE(is_using_driver(_metadata, &self->hid, "apple")); + ASSERT_TRUE(has_hid_input(&self->hid)) TH_LOG("input node not found"); =20 LOAD_PROGRAMS(progs); =20 ASSERT_TRUE(is_using_driver(_metadata, &self->hid, "hid-generic")); + ASSERT_FALSE(has_hid_input(&self->hid)) TH_LOG("input node unexpectly fou= nd"); } =20 /* diff --git a/tools/testing/selftests/hid/progs/hid.c b/tools/testing/selfte= sts/hid/progs/hid.c index 9b22e9a0e658..7e24bec8ef43 100644 --- a/tools/testing/selftests/hid/progs/hid.c +++ b/tools/testing/selftests/hid/progs/hid.c @@ -603,6 +603,7 @@ SEC("?struct_ops.s/hid_rdesc_fixup") int BPF_PROG(hid_test_driver_probe, struct hid_bpf_ctx *hid_ctx) { hid_ctx->hid->quirks |=3D HID_QUIRK_IGNORE_SPECIAL_DRIVER; + hid_ctx->hid->quirks |=3D HID_QUIRK_IGNORE_HIDINPUT; return 0; } =20 diff --git a/tools/testing/selftests/hid/progs/hid_bpf_helpers.h b/tools/te= sting/selftests/hid/progs/hid_bpf_helpers.h index 1a645684a117..9c3cfd61d992 100644 --- a/tools/testing/selftests/hid/progs/hid_bpf_helpers.h +++ b/tools/testing/selftests/hid/progs/hid_bpf_helpers.h @@ -91,6 +91,7 @@ struct hid_bpf_ops { #endif =20 #define HID_QUIRK_IGNORE_SPECIAL_DRIVER BIT(22) +#define HID_QUIRK_IGNORE_HIDINPUT BIT(23) =20 /* following are kfuncs exported by HID for HID-BPF */ extern __u8 *hid_bpf_get_data(struct hid_bpf_ctx *ctx, --=20 2.46.0