Received: by 2002:a05:6a10:413:0:0:0:0 with SMTP id 19csp1219448pxp; Sun, 20 Mar 2022 09:32:20 -0700 (PDT) X-Google-Smtp-Source: ABdhPJx4bY1pqBT37ZCRZI9cFnRBDRYDwwWRpkHWWeYOFkYjoRJCUZavkRiK3BmKFwIsoWu8wIsc X-Received: by 2002:a17:90b:228a:b0:1bc:7ca4:efaf with SMTP id kx10-20020a17090b228a00b001bc7ca4efafmr21803598pjb.245.1647793939828; Sun, 20 Mar 2022 09:32:19 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1647793939; cv=none; d=google.com; s=arc-20160816; b=Xr3NYCyrd5qCk52YzZPlY+rScw5jLZ3cDiJy/ypIvTc+1rFonRGATNB5CBBKAXOOYg ii20rvWEWJlt756iZJG5Uzqcip/bG7jOMfJUGiTi3SgwZEDVkDFK/d3PR52urE51cyro fIWglF5clQiPKoZRH+5uWLbbCfMb2K0aeTwqgFgP5asdxdNlY+OKdKZq9xJpMYZj0nUi Gcjv8H4xmuNB1EqejiKhblikkY5SL3XuFpApIlpNbl7/AhmZ9gpk3fIyYvSY8vVjzs6R czdhgPsHUdHUjzkNMwEhssSNSCqZuzda1DE7CHAXaUOi+MKY956gyxSM+J7Gp2dfBLrn GmIg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:cc:to:subject:message-id:date:from:in-reply-to :references:mime-version:dkim-signature; bh=vz5O4mNMRA0cgPPp+NvdIpLYM7w4IU0AxchruLzlu+k=; b=eQgtLkIFzCeWd3HFUch8m+rkjNW7ST7CsRz5JX2RIrfxngNCfQUOaQ/WV4okyFhT9b e4+ZNaKS9/5Y4SXcSXxSMD32xfAdjemRztOBEBO+/pqvcjCEHGLNbK7CJscRj+TN0xpk g9VnwJBT6h7e4Bj9RSf0drFdwYnQM52eRgTIaCVJhe3Lz0WwcL8imL7+VtT40Sgt3MUc 3wM4h3MiQKYXdkg/Zq1TizZVJDgoTBk4ZKJap55meqdvaMcHk3sffXh3waW99D7sYkW4 eh/mK9GdgnEjhmRKL20cPbLCLFLVUa+ibeyxJM35iJFUMpyCFmPI2kS4ciojLoeDSi8V Rk0w== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=OV+8ZI7X; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id 12-20020a630d4c000000b003816043ef71si10396110pgn.358.2022.03.20.09.32.05; Sun, 20 Mar 2022 09:32:19 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=OV+8ZI7X; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S241045AbiCRVLg (ORCPT + 99 others); Fri, 18 Mar 2022 17:11:36 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:41602 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S241034AbiCRVLe (ORCPT ); Fri, 18 Mar 2022 17:11:34 -0400 Received: from ams.source.kernel.org (ams.source.kernel.org [IPv6:2604:1380:4601:e00::1]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 2898D1A8FD4; Fri, 18 Mar 2022 14:10:15 -0700 (PDT) Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ams.source.kernel.org (Postfix) with ESMTPS id B9406B825AE; Fri, 18 Mar 2022 21:10:13 +0000 (UTC) Received: by smtp.kernel.org (Postfix) with ESMTPSA id 868F7C340F0; Fri, 18 Mar 2022 21:10:12 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1647637812; bh=uRbG0uWM5xu5uaPfqEzJdtDtnU9jnY1GFY9rvCd+m5Y=; h=References:In-Reply-To:From:Date:Subject:To:Cc:From; b=OV+8ZI7Xy7U6DF87KRXD4f8tAfq2DARUsgJ72O0tTxibY7I0VMi8F7RAln2YqybOD N2n9oRrG2Fmp74OqhigcRwWMRVvO2OxG0MtEw3/2INUW01Fp5YmwpqPQbT6iI0jqIR vf9cs0RYyMleU58ulv+8F6D9hytkJa/1RuPyoQNMuIfrxOGGvvVipssaZ2YEr1ngqN sHfxYY/XQwvKukRfPUGuIUQVh/5SlZVYLF9tMPU3sW4HIQvdW5LmZ/gxWNHTW9LaNx tU0mkOTgwhjKwB8SB5qb6bpOChTeXEp8vXmtpJIi9SHo2YcybedbhIQGoDbDGxFRzT GyR7glGKi2HGg== Received: by mail-yw1-f174.google.com with SMTP id 00721157ae682-2d07ae0b1c0so103916897b3.2; Fri, 18 Mar 2022 14:10:12 -0700 (PDT) X-Gm-Message-State: AOAM533813GwlcZaX/Jl2o8rYXA+9fqNyoFmjq6jyeFFvZd9ZUaSToho QDMfGB79fVf/QMrZbcFyLnjcUSxdq4JfHQuJ3u8= X-Received: by 2002:a81:c405:0:b0:2d0:d09a:576c with SMTP id j5-20020a81c405000000b002d0d09a576cmr13537663ywi.447.1647637811581; Fri, 18 Mar 2022 14:10:11 -0700 (PDT) MIME-Version: 1.0 References: <20220318161528.1531164-1-benjamin.tissoires@redhat.com> <20220318161528.1531164-7-benjamin.tissoires@redhat.com> In-Reply-To: <20220318161528.1531164-7-benjamin.tissoires@redhat.com> From: Song Liu Date: Fri, 18 Mar 2022 14:10:00 -0700 X-Gmail-Original-Message-ID: Message-ID: Subject: Re: [PATCH bpf-next v3 06/17] HID: allow to change the report descriptor from an eBPF program To: Benjamin Tissoires Cc: Greg KH , Jiri Kosina , Alexei Starovoitov , Daniel Borkmann , Andrii Nakryiko , Martin KaFai Lau , Song Liu , Yonghong Song , John Fastabend , KP Singh , Shuah Khan , Dave Marchevsky , Joe Stringer , Jonathan Corbet , Tero Kristo , open list , "open list:HID CORE LAYER" , Networking , bpf , linux-kselftest@vger.kernel.org, Linux Doc Mailing List Content-Type: text/plain; charset="UTF-8" X-Spam-Status: No, score=-8.6 required=5.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,RCVD_IN_DNSWL_HI, SPF_HELO_NONE,SPF_PASS,T_SCC_BODY_TEXT_LINE autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Fri, Mar 18, 2022 at 9:17 AM Benjamin Tissoires wrote: > > Make use of BPF_HID_ATTACH_RDESC_FIXUP so we can trigger an rdesc fixup > in the bpf world. > > Whenever the program gets attached/detached, the device is reconnected > meaning that userspace will see it disappearing and reappearing with > the new report descriptor. > > Signed-off-by: Benjamin Tissoires > > --- > > changes in v3: > - ensure the ctx.size is properly bounded by allocated size > - s/link_attached/post_link_attach/ > - removed the switch statement with only one case > > changes in v2: > - split the series by bpf/libbpf/hid/selftests and samples > --- > drivers/hid/hid-bpf.c | 62 ++++++++++++++++++++++++++++++++++++++++++ > drivers/hid/hid-core.c | 3 +- > include/linux/hid.h | 6 ++++ > 3 files changed, 70 insertions(+), 1 deletion(-) > > diff --git a/drivers/hid/hid-bpf.c b/drivers/hid/hid-bpf.c > index 5060ebcb9979..45c87ff47324 100644 > --- a/drivers/hid/hid-bpf.c > +++ b/drivers/hid/hid-bpf.c > @@ -50,6 +50,14 @@ static struct hid_device *hid_bpf_fd_to_hdev(int fd) > return hdev; > } > > +static int hid_reconnect(struct hid_device *hdev) > +{ > + if (!test_and_set_bit(ffs(HID_STAT_REPROBED), &hdev->status)) > + return device_reprobe(&hdev->dev); > + > + return 0; > +} > + > static int hid_bpf_pre_link_attach(struct hid_device *hdev, enum bpf_hid_attach_type type) > { > int err = 0; > @@ -92,6 +100,12 @@ static int hid_bpf_pre_link_attach(struct hid_device *hdev, enum bpf_hid_attach_ > return err; > } > > +static void hid_bpf_post_link_attach(struct hid_device *hdev, enum bpf_hid_attach_type type) > +{ > + if (type == BPF_HID_ATTACH_RDESC_FIXUP) > + hid_reconnect(hdev); > +} > + > static void hid_bpf_array_detach(struct hid_device *hdev, enum bpf_hid_attach_type type) > { > switch (type) { > @@ -99,6 +113,9 @@ static void hid_bpf_array_detach(struct hid_device *hdev, enum bpf_hid_attach_ty > kfree(hdev->bpf.device_data); > hdev->bpf.device_data = NULL; > break; > + case BPF_HID_ATTACH_RDESC_FIXUP: > + hid_reconnect(hdev); > + break; > default: > /* do nothing */ > break; > @@ -116,6 +133,9 @@ static int hid_bpf_run_progs(struct hid_device *hdev, struct hid_bpf_ctx_kern *c > case HID_BPF_DEVICE_EVENT: > type = BPF_HID_ATTACH_DEVICE_EVENT; > break; > + case HID_BPF_RDESC_FIXUP: > + type = BPF_HID_ATTACH_RDESC_FIXUP; > + break; > default: > return -EINVAL; > } > @@ -155,11 +175,53 @@ u8 *hid_bpf_raw_event(struct hid_device *hdev, u8 *data, int *size) > return ctx.data; > } > > +u8 *hid_bpf_report_fixup(struct hid_device *hdev, u8 *rdesc, unsigned int *size) > +{ > + int ret; > + struct hid_bpf_ctx_kern ctx = { > + .type = HID_BPF_RDESC_FIXUP, > + .hdev = hdev, > + .size = *size, > + }; > + > + if (bpf_hid_link_empty(&hdev->bpf, BPF_HID_ATTACH_RDESC_FIXUP)) Do we need to lock bpf_hid_mutex before calling bpf_hid_link_empty()? (or maybe we already did?) > + goto ignore_bpf; > + > + ctx.data = kmemdup(rdesc, HID_MAX_DESCRIPTOR_SIZE, GFP_KERNEL); > + if (!ctx.data) > + goto ignore_bpf; > + > + ctx.allocated_size = HID_MAX_DESCRIPTOR_SIZE; > + > + ret = hid_bpf_run_progs(hdev, &ctx); > + if (ret) > + goto ignore_bpf; > + > + if (ctx.size > ctx.allocated_size) > + goto ignore_bpf; > + > + *size = ctx.size; > + > + if (*size) { > + rdesc = krealloc(ctx.data, *size, GFP_KERNEL); > + } else { > + rdesc = NULL; > + kfree(ctx.data); > + } > + > + return rdesc; > + > + ignore_bpf: > + kfree(ctx.data); > + return kmemdup(rdesc, *size, GFP_KERNEL); > +} > + > int __init hid_bpf_module_init(void) > { > struct bpf_hid_hooks hooks = { > .hdev_from_fd = hid_bpf_fd_to_hdev, > .pre_link_attach = hid_bpf_pre_link_attach, > + .post_link_attach = hid_bpf_post_link_attach, > .array_detach = hid_bpf_array_detach, > }; > > diff --git a/drivers/hid/hid-core.c b/drivers/hid/hid-core.c > index 937fab7eb9c6..3182c39db006 100644 > --- a/drivers/hid/hid-core.c > +++ b/drivers/hid/hid-core.c > @@ -1213,7 +1213,8 @@ int hid_open_report(struct hid_device *device) > return -ENODEV; > size = device->dev_rsize; > > - buf = kmemdup(start, size, GFP_KERNEL); > + /* hid_bpf_report_fixup() ensures we work on a copy of rdesc */ > + buf = hid_bpf_report_fixup(device, start, &size); > if (buf == NULL) > return -ENOMEM; > > diff --git a/include/linux/hid.h b/include/linux/hid.h > index 8fd79011f461..66d949d10b78 100644 > --- a/include/linux/hid.h > +++ b/include/linux/hid.h > @@ -1213,10 +1213,16 @@ do { \ > > #ifdef CONFIG_BPF > u8 *hid_bpf_raw_event(struct hid_device *hdev, u8 *rd, int *size); > +u8 *hid_bpf_report_fixup(struct hid_device *hdev, u8 *rdesc, unsigned int *size); > int hid_bpf_module_init(void); > void hid_bpf_module_exit(void); > #else > static inline u8 *hid_bpf_raw_event(struct hid_device *hdev, u8 *rd, int *size) { return rd; } > +static inline u8 *hid_bpf_report_fixup(struct hid_device *hdev, u8 *rdesc, > + unsigned int *size) > +{ > + return kmemdup(rdesc, *size, GFP_KERNEL); > +} > static inline int hid_bpf_module_init(void) { return 0; } > static inline void hid_bpf_module_exit(void) {} > #endif > -- > 2.35.1 >