]> www.infradead.org Git - users/jedix/linux-maple.git/commitdiff
HID: bpf: add HID-BPF hooks for hid_hw_raw_requests
authorBenjamin Tissoires <bentiss@kernel.org>
Wed, 26 Jun 2024 13:46:25 +0000 (15:46 +0200)
committerBenjamin Tissoires <bentiss@kernel.org>
Thu, 27 Jun 2024 09:00:07 +0000 (11:00 +0200)
This allows to intercept and prevent or change the behavior of
hid_hw_raw_request() from a bpf program.

The intent is to solve a couple of use case:
- firewalling a HID device: a firewall can monitor who opens the hidraw
  nodes and then prevent or allow access to write operations on that
  hidraw node.
- change the behavior of a device and emulate a new HID feature request

The hook is allowed to be run as sleepable so it can itself call
hid_bpf_hw_request(), which allows to "convert" one feature request into
another or even call the feature request on a different HID device on the
same physical device.

Link: https://patch.msgid.link/20240626-hid_hw_req_bpf-v2-4-cfd60fb6c79f@kernel.org
Acked-by: Jiri Kosina <jkosina@suse.com>
Signed-off-by: Benjamin Tissoires <bentiss@kernel.org>
drivers/hid/bpf/hid_bpf_dispatch.c
drivers/hid/bpf/hid_bpf_struct_ops.c
drivers/hid/hid-core.c
include/linux/hid_bpf.h

index c026248e3d73265c30235ad8f640c722dbe082f1..37a1bb381684001b797429941237470a7065b1e4 100644 (file)
@@ -74,6 +74,44 @@ dispatch_hid_bpf_device_event(struct hid_device *hdev, enum hid_report_type type
 }
 EXPORT_SYMBOL_GPL(dispatch_hid_bpf_device_event);
 
+int dispatch_hid_bpf_raw_requests(struct hid_device *hdev,
+                                 unsigned char reportnum, u8 *buf,
+                                 u32 size, enum hid_report_type rtype,
+                                 enum hid_class_request reqtype,
+                                 u64 source)
+{
+       struct hid_bpf_ctx_kern ctx_kern = {
+               .ctx = {
+                       .hid = hdev,
+                       .allocated_size = size,
+                       .size = size,
+               },
+               .data = buf,
+       };
+       struct hid_bpf_ops *e;
+       int ret, idx;
+
+       if (rtype >= HID_REPORT_TYPES)
+               return -EINVAL;
+
+       idx = srcu_read_lock(&hdev->bpf.srcu);
+       list_for_each_entry_srcu(e, &hdev->bpf.prog_list, list,
+                                srcu_read_lock_held(&hdev->bpf.srcu)) {
+               if (!e->hid_hw_request)
+                       continue;
+
+               ret = e->hid_hw_request(&ctx_kern.ctx, reportnum, rtype, reqtype, source);
+               if (ret)
+                       goto out;
+       }
+       ret = 0;
+
+out:
+       srcu_read_unlock(&hdev->bpf.srcu, idx);
+       return ret;
+}
+EXPORT_SYMBOL_GPL(dispatch_hid_bpf_raw_requests);
+
 u8 *call_hid_bpf_rdesc_fixup(struct hid_device *hdev, u8 *rdesc, unsigned int *size)
 {
        int ret;
index d34731a1b45788eb69c05ae5511c14e522b0bc72..a540a44171740edbdf3a02d267ccdf0973c1bcdc 100644 (file)
@@ -44,6 +44,7 @@ static int hid_bpf_ops_check_member(const struct btf_type *t,
 
        switch (moff) {
        case offsetof(struct hid_bpf_ops, hid_rdesc_fixup):
+       case offsetof(struct hid_bpf_ops, hid_hw_request):
                break;
        default:
                if (prog->sleepable)
index ad08289752da0387a8260a6893547b030ccb6b83..16731804c6bd0eb215829ffeeb21dcd3b4448462 100644 (file)
@@ -2406,6 +2406,7 @@ int __hid_hw_raw_request(struct hid_device *hdev,
                         __u64 source)
 {
        unsigned int max_buffer_size = HID_MAX_BUFFER_SIZE;
+       int ret;
 
        if (hdev->ll_driver->max_buffer_size)
                max_buffer_size = hdev->ll_driver->max_buffer_size;
@@ -2413,6 +2414,11 @@ int __hid_hw_raw_request(struct hid_device *hdev,
        if (len < 1 || len > max_buffer_size || !buf)
                return -EINVAL;
 
+       ret = dispatch_hid_bpf_raw_requests(hdev, reportnum, buf, len, rtype,
+                                           reqtype, source);
+       if (ret)
+               return ret;
+
        return hdev->ll_driver->raw_request(hdev, reportnum, buf, len,
                                            rtype, reqtype);
 }
index f93845de5cac8e6dd29ae58cbe6c161ba96f6286..3c01f7f8b6fce7c3530cff3b57615bfa69b633eb 100644 (file)
@@ -130,6 +130,31 @@ struct hid_bpf_ops {
         */
        int (*hid_rdesc_fixup)(struct hid_bpf_ctx *ctx);
 
+       /**
+        * @hid_hw_request: called whenever a hid_hw_raw_request() call is emitted
+        * on the HID device
+        *
+        * It has the following arguments:
+        *
+        * ``ctx``: The HID-BPF context as &struct hid_bpf_ctx
+        * ``reportnum``: the report number, as in hid_hw_raw_request()
+        * ``rtype``: the report type (``HID_INPUT_REPORT``, ``HID_FEATURE_REPORT``,
+        *            ``HID_OUTPUT_REPORT``)
+        * ``reqtype``: the request
+        * ``source``: a u64 referring to a uniq but identifiable source. If %0, the
+        *             kernel itself emitted that call. For hidraw, ``source`` is set
+        *             to the associated ``struct file *``.
+        *
+        * Return: %0 to keep processing the request by hid-core; any other value
+        * stops hid-core from processing that event. A positive value should be
+        * returned with the number of bytes returned in the incoming buffer; a
+        * negative error code interrupts the processing of this call.
+        */
+       int (*hid_hw_request)(struct hid_bpf_ctx *ctx, unsigned char reportnum,
+                              enum hid_report_type rtype, enum hid_class_request reqtype,
+                              __u64 source);
+
+
        /* private: do not show up in the docs */
        struct hid_device *hdev;
 };
@@ -152,6 +177,11 @@ struct hid_bpf {
 #ifdef CONFIG_HID_BPF
 u8 *dispatch_hid_bpf_device_event(struct hid_device *hid, enum hid_report_type type, u8 *data,
                                  u32 *size, int interrupt, u64 source);
+int dispatch_hid_bpf_raw_requests(struct hid_device *hdev,
+                                 unsigned char reportnum, __u8 *buf,
+                                 u32 size, enum hid_report_type rtype,
+                                 enum hid_class_request reqtype,
+                                 __u64 source);
 int hid_bpf_connect_device(struct hid_device *hdev);
 void hid_bpf_disconnect_device(struct hid_device *hdev);
 void hid_bpf_destroy_device(struct hid_device *hid);
@@ -161,6 +191,11 @@ u8 *call_hid_bpf_rdesc_fixup(struct hid_device *hdev, u8 *rdesc, unsigned int *s
 static inline u8 *dispatch_hid_bpf_device_event(struct hid_device *hid, enum hid_report_type type,
                                                u8 *data, u32 *size, int interrupt,
                                                u64 source) { return data; }
+static inline int dispatch_hid_bpf_raw_requests(struct hid_device *hdev,
+                                               unsigned char reportnum, u8 *buf,
+                                               u32 size, enum hid_report_type rtype,
+                                               enum hid_class_request reqtype,
+                                               u64 source) { return 0; }
 static inline int hid_bpf_connect_device(struct hid_device *hdev) { return 0; }
 static inline void hid_bpf_disconnect_device(struct hid_device *hdev) {}
 static inline void hid_bpf_destroy_device(struct hid_device *hid) {}