From: Vitaly Kuznetsov <vkuznets@redhat.com>
To: Michael Kelley <mhklinux@outlook.com>,
Saurabh Singh Sengar <ssengar@linux.microsoft.com>
Cc: "linux-hyperv@vger.kernel.org" <linux-hyperv@vger.kernel.org>,
"linux-input@vger.kernel.org" <linux-input@vger.kernel.org>,
"K. Y. Srinivasan" <kys@microsoft.com>,
Haiyang Zhang <haiyangz@microsoft.com>,
Wei Liu <wei.liu@kernel.org>, Dexuan Cui <decui@microsoft.com>,
Jiri Kosina <jikos@kernel.org>,
Benjamin Tissoires <bentiss@kernel.org>,
Dmitry Torokhov <dmitry.torokhov@gmail.com>
Subject: RE: [PATCH] HID: hyperv: streamline driver probe to avoid devres issues
Date: Thu, 07 Nov 2024 10:01:41 +0100 [thread overview]
Message-ID: <87ikszv2mi.fsf@redhat.com> (raw)
In-Reply-To: <SN6PR02MB41577BB0B8724ED058E94F92D4532@SN6PR02MB4157.namprd02.prod.outlook.com>
Michael Kelley <mhklinux@outlook.com> writes:
> From: Vitaly Kuznetsov <vkuznets@redhat.com> Sent: Tuesday, November 5, 2024 9:45 AM
>>
>> Saurabh Singh Sengar <ssengar@linux.microsoft.com> writes:
>>
>> > On Mon, Nov 04, 2024 at 05:48:24PM +0100, Vitaly Kuznetsov wrote:
>> >> It was found that unloading 'hid_hyperv' module results in a devres
>> >> complaint:
>> >>
>> >> ...
>> >> hv_vmbus: unregistering driver hid_hyperv
>> >> ------------[ cut here ]------------
>> >> WARNING: CPU: 2 PID: 3983 at drivers/base/devres.c:691 devres_release_group+0x1f2/0x2c0
>> >> ...
>> >> Call Trace:
>> >> <TASK>
>> >> ? devres_release_group+0x1f2/0x2c0
>> >> ? __warn+0xd1/0x1c0
>> >> ? devres_release_group+0x1f2/0x2c0
>> >> ? report_bug+0x32a/0x3c0
>> >> ? handle_bug+0x53/0xa0
>> >> ? exc_invalid_op+0x18/0x50
>> >> ? asm_exc_invalid_op+0x1a/0x20
>> >> ? devres_release_group+0x1f2/0x2c0
>> >> ? devres_release_group+0x90/0x2c0
>> >> ? rcu_is_watching+0x15/0xb0
>> >> ? __pfx_devres_release_group+0x10/0x10
>> >> hid_device_remove+0xf5/0x220
>> >> device_release_driver_internal+0x371/0x540
>> >> ? klist_put+0xf3/0x170
>> >> bus_remove_device+0x1f1/0x3f0
>> >> device_del+0x33f/0x8c0
>> >> ? __pfx_device_del+0x10/0x10
>> >> ? cleanup_srcu_struct+0x337/0x500
>> >> hid_destroy_device+0xc8/0x130
>> >> mousevsc_remove+0xd2/0x1d0 [hid_hyperv]
>> >> device_release_driver_internal+0x371/0x540
>> >> driver_detach+0xc5/0x180
>> >> bus_remove_driver+0x11e/0x2a0
>> >> ? __mutex_unlock_slowpath+0x160/0x5e0
>> >> vmbus_driver_unregister+0x62/0x2b0 [hv_vmbus]
>> >> ...
>> >>
>> >> And the issue seems to be that the corresponding devres group is not
>> >> allocated. Normally, devres_open_group() is called from
>> >> __hid_device_probe() but Hyper-V HID driver overrides 'hid_dev->driver'
>> >> with 'mousevsc_hid_driver' stub and basically re-implements
>> >> __hid_device_probe() by calling hid_parse() and hid_hw_start() but not
>> >> devres_open_group(). hid_device_probe() does not call __hid_device_probe()
>> >> for it. Later, when the driver is removed, hid_device_remove() calls
>> >> devres_release_group() as it doesn't check whether hdev->driver was
>> >> initially overridden or not.
>> >>
>> >> The issue seems to be related to the commit 62c68e7cee33 ("HID: ensure
>> >> timely release of driver-allocated resources") but the commit itself seems
>> >> to be correct.
>> >>
>> >> Fix the issue by dropping the 'hid_dev->driver' override and the
>> >> now unneeded hid_parse()/hid_hw_start() calls. One notable difference of
>> >> the change is hid_hw_start() is now called with HID_CONNECT_DEFAULT which
>> >> implies HID_CONNECT_HIDRAW. This doesn't seem to cause any immediate issues
>> >> but 'HID_CONNECT_HIDINPUT | HID_CONNECT_HIDDEV' combo was used in the
>> >> driver for a long time and it is unclear whether hidraw was excluded on
>> >> purpose or not.
>> >>
>> >> Signed-off-by: Vitaly Kuznetsov <vkuznets@redhat.com>
>> >
>> > A fixme tag would be helpful.
>>
>> I concluded that it's the unusual 'hid_dev->driver' override in
>> hid-hyperv to blame and not the 62c68e7cee33 ("HID: ensure timely
>> release of driver-allocated resources") but the override was there since
>> the inception of the driver so I'm not sure, mentioning 62c68e7cee33
>> probably makes more sense...
>
> I've finished looking at the linux-next issue in detail, and I agree that
> the hid_dev->driver override is the underlying cause. I was
> commenting out that line Monday night, but had not gotten as far as
> removing the the hid_parse() and hid_hw_start(). Then your patch
> came out, Vitaly, which is great!
>
>>
>> >
>> >> ---
>> >> drivers/hid/hid-hyperv.c | 17 -----------------
>> >> 1 file changed, 17 deletions(-)
>> >>
>> >> diff --git a/drivers/hid/hid-hyperv.c b/drivers/hid/hid-hyperv.c
>> >> index f33485d83d24..1609a56ffa7c 100644
>> >> --- a/drivers/hid/hid-hyperv.c
>> >> +++ b/drivers/hid/hid-hyperv.c
>> >> @@ -431,8 +431,6 @@ static const struct hid_ll_driver mousevsc_ll_driver = {
>> >> .raw_request = mousevsc_hid_raw_request,
>> >> };
>> >>
>> >> -static struct hid_driver mousevsc_hid_driver;
>> >> -
>> >> static int mousevsc_probe(struct hv_device *device,
>> >> const struct hv_vmbus_device_id *dev_id)
>> >> {
>> >> @@ -473,7 +471,6 @@ static int mousevsc_probe(struct hv_device *device,
>> >> }
>> >>
>> >> hid_dev->ll_driver = &mousevsc_ll_driver;
>> >> - hid_dev->driver = &mousevsc_hid_driver;
>> >> hid_dev->bus = BUS_VIRTUAL;
>> >> hid_dev->vendor = input_dev->hid_dev_info.vendor;
>> >> hid_dev->product = input_dev->hid_dev_info.product;
>> >> @@ -488,20 +485,6 @@ static int mousevsc_probe(struct hv_device *device,
>> >> if (ret)
>> >> goto probe_err2;
>> >>
>> >> -
>> >> - ret = hid_parse(hid_dev);
>> >> - if (ret) {
>> >> - hid_err(hid_dev, "parse failed\n");
>> >> - goto probe_err2;
>> >> - }
>> >> -
>> >> - ret = hid_hw_start(hid_dev, HID_CONNECT_HIDINPUT | HID_CONNECT_HIDDEV);
>
> As you noted, using HID_CONNECT_DEFAULT in the default probe function
> __hid_device_probe() ends up adding HID_CONNECT_HIDRAW and HID_CONNECT_FF.
> The latter is benign as it only affects devices that support force-feedback. As best I
> can tell, HID_CNNECT_HIDRAW causes /dev/hidraw0 to appear, which provides a raw
> interface to the mouse device. See https://docs.kernel.org/hid/hidraw.html. It doesn't
> seem like making this interface visible hurts anything, but I'm not 100% sure.
>
> The alternative is to keep the "struct hid_driver mousevsc_hid_driver;" line
> and to populate it with a name, id_table, and an HID probe function specific
> to the Hyper-V mouse. Then instead of the incorrect assignment to
> hid_dev->driver, add a
>
> module_hid_driver(mousevsc_hid_driver);
>
> statement, which registers the driver. The new HID probe function does
> the hid_parse() and hid_hw_start() which have been removed from
> mousevsc_probe() as your patch does. With this arrangement, the
> hid_hw_start() can be done with the desired HID_CONNECT_*
> options so that /dev/hidraw0 won't appear. It's only a few lines
> of code.
>
> I can try to code up this approach if it is preferred. But I'm likely tied
> up with some personal things for the next few days, so might not get
> to it for a little while. Feel free to try it yourself if you want.
>
> Question: Have you tested your change with an app that consumes
> mouse data in the Hyper-V console window? I was trying to figure
> out a convenient way to do that. I usually install the server version
> of Linux distros and use only the command line, so didn't have a
> mouse-consuming app easily available.
I have tested my patch with a standard Wayland/Gnome UI and I didn't see
any issues because of hidraw. I tried rmmod/modprobe cycle, no trace
appeared and mouse worked well after.
It would be nice to check whether hidraw actually works or not. In
particular, I see that we don't implement .raw_request() hook for
mousevsc (mousevsc_hid_raw_request() exists but always returns 0). I
tried 'hid-example' from samples/hidraw and it gives me:
# ./hid-example
Report Descriptor Size: 67
Report Descriptor:
5 1 9 2 a1 1 9 1 a1 0 5 9 19 1 29 5 15 0 25 1 95 5 75 1 81 2 95 1 75 3 81 1 5 1 9 30 9 31 15 0 26 ff 7f 75 10 95 2 81 2 5 1 9 38 16 1 80 26 ff 7f 75 10 95 1 81 6 c0 c0
Raw Name: Microsoft Vmbus HID-compliant Mouse
Raw Phys:
Raw Info:
bustype: 6 (Virtual)
vendor: 0x045e
product: 0x0621
ioctl HIDIOCSFEATURE returned: 0
ioctl HIDIOCGFEATURE returned: 0
Report data:
write() wrote 0 bytes
read: Resource temporarily unavailable
but I can't really tell if this is totally broken or not. In case it is,
your approach to get rid of hidraw sounds reasonable, I can probably try
it early next week or so.
>
>> >> -
>> >> - if (ret) {
>> >> - hid_err(hid_dev, "hw start failed\n");
>> >> - goto probe_err2;
>> >> - }
>> >> -
>> >> device_init_wakeup(&device->device, true);
>> >>
>> >> input_dev->connected = true;
>> >> --
>> >> 2.47.0
>> >>
>> >
>> > I have tested this patch, but the original issue reported in commit message is
>> > not observed in latest kernel due to an other error reported by Michael here:
>> > https://lore.kernel.org/linux-hyperv/SN6PR02MB41573CDE3E478455D17837DED4502@SN6PR02MB4157.namprd02.prod.outlook.com/
>> >
>>
>> Let's Cc: Michael then!
>>
>> > The error addressed by this patch is observed before the commit
>> > "8b7fd6a15f8c: HID: bpf: move HID-BPF report descriptor fixup earlier",
>> > and is resolved by this patch. In fact, this patch appears to fix both issues.
>> >
>> > Tested-by: Saurabh Sengar <ssengar@linux.microsoft.com>
>
> Yes, I agree that Vitaly's patch fixes the problem I observed in linux-next.
> I've looked at the details enough to believe that the fix is the correct fix.
>
>>
>> Thanks! I was reproducing the issue on 6.12-rc6 by just doing 'rmmod
>> hid_hyperv' and tested my patch there.
>
> FWIW, I also tested device unbind/bind of the VMBus mousevsc device,
> and its companion HID device that is created in mousevsc_probe(). Doing
> unbind/bind for the VMBus mousevsc device works correctly, and the
> companion HID device goes away and comes back as expected. Doing
> unbind/bind for just the HID device also works, and the VMBus
> mousevsc device is not affected, again as expected.
>
> Michael
>
--
Vitaly
prev parent reply other threads:[~2024-11-07 9:01 UTC|newest]
Thread overview: 9+ messages / expand[flat|nested] mbox.gz Atom feed top
2024-11-04 16:48 [PATCH] HID: hyperv: streamline driver probe to avoid devres issues Vitaly Kuznetsov
2024-11-05 17:11 ` Saurabh Singh Sengar
2024-11-05 17:44 ` Vitaly Kuznetsov
2024-11-06 18:36 ` Michael Kelley
2024-11-07 2:42 ` Michael Kelley
2024-11-07 9:07 ` Vitaly Kuznetsov
2024-11-11 13:01 ` Vitaly Kuznetsov
2024-11-11 16:46 ` Michael Kelley
2024-11-07 9:01 ` Vitaly Kuznetsov [this message]
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=87ikszv2mi.fsf@redhat.com \
--to=vkuznets@redhat.com \
--cc=bentiss@kernel.org \
--cc=decui@microsoft.com \
--cc=dmitry.torokhov@gmail.com \
--cc=haiyangz@microsoft.com \
--cc=jikos@kernel.org \
--cc=kys@microsoft.com \
--cc=linux-hyperv@vger.kernel.org \
--cc=linux-input@vger.kernel.org \
--cc=mhklinux@outlook.com \
--cc=ssengar@linux.microsoft.com \
--cc=wei.liu@kernel.org \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).