mirror of
https://mirrors.bfsu.edu.cn/git/linux.git
synced 2024-11-11 12:28:41 +08:00
HID: bpf: remove double fdget()
When the kfunc hid_bpf_attach_prog() is called, we called twice fdget():
one for fetching the type of the bpf program, and one for actually
attaching the program to the device.
The problem is that between those two calls, we have no guarantees that
the prog_fd is still the same file descriptor for the given program.
Solve this by calling bpf_prog_get() earlier, and use this to fetch the
program type.
Reported-by: Dan Carpenter <dan.carpenter@linaro.org>
Link: https://lore.kernel.org/bpf/CAO-hwJJ8vh8JD3-P43L-_CLNmPx0hWj44aom0O838vfP4=_1CA@mail.gmail.com/T/#t
Cc: <stable@vger.kernel.org>
Fixes: f5c27da4e3
("HID: initial BPF implementation")
Link: https://lore.kernel.org/r/20240124-b4-hid-bpf-fixes-v2-1-052520b1e5e6@kernel.org
Signed-off-by: Benjamin Tissoires <bentiss@kernel.org>
This commit is contained in:
parent
00aab7dcb2
commit
7cdd210890
@ -241,6 +241,39 @@ int hid_bpf_reconnect(struct hid_device *hdev)
|
|||||||
return 0;
|
return 0;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
static int do_hid_bpf_attach_prog(struct hid_device *hdev, int prog_fd, struct bpf_prog *prog,
|
||||||
|
__u32 flags)
|
||||||
|
{
|
||||||
|
int fd, err, prog_type;
|
||||||
|
|
||||||
|
prog_type = hid_bpf_get_prog_attach_type(prog);
|
||||||
|
if (prog_type < 0)
|
||||||
|
return prog_type;
|
||||||
|
|
||||||
|
if (prog_type >= HID_BPF_PROG_TYPE_MAX)
|
||||||
|
return -EINVAL;
|
||||||
|
|
||||||
|
if (prog_type == HID_BPF_PROG_TYPE_DEVICE_EVENT) {
|
||||||
|
err = hid_bpf_allocate_event_data(hdev);
|
||||||
|
if (err)
|
||||||
|
return err;
|
||||||
|
}
|
||||||
|
|
||||||
|
fd = __hid_bpf_attach_prog(hdev, prog_type, prog_fd, prog, flags);
|
||||||
|
if (fd < 0)
|
||||||
|
return fd;
|
||||||
|
|
||||||
|
if (prog_type == HID_BPF_PROG_TYPE_RDESC_FIXUP) {
|
||||||
|
err = hid_bpf_reconnect(hdev);
|
||||||
|
if (err) {
|
||||||
|
close_fd(fd);
|
||||||
|
return err;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
return fd;
|
||||||
|
}
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* hid_bpf_attach_prog - Attach the given @prog_fd to the given HID device
|
* hid_bpf_attach_prog - Attach the given @prog_fd to the given HID device
|
||||||
*
|
*
|
||||||
@ -257,18 +290,13 @@ noinline int
|
|||||||
hid_bpf_attach_prog(unsigned int hid_id, int prog_fd, __u32 flags)
|
hid_bpf_attach_prog(unsigned int hid_id, int prog_fd, __u32 flags)
|
||||||
{
|
{
|
||||||
struct hid_device *hdev;
|
struct hid_device *hdev;
|
||||||
|
struct bpf_prog *prog;
|
||||||
struct device *dev;
|
struct device *dev;
|
||||||
int fd, err, prog_type = hid_bpf_get_prog_attach_type(prog_fd);
|
int fd;
|
||||||
|
|
||||||
if (!hid_bpf_ops)
|
if (!hid_bpf_ops)
|
||||||
return -EINVAL;
|
return -EINVAL;
|
||||||
|
|
||||||
if (prog_type < 0)
|
|
||||||
return prog_type;
|
|
||||||
|
|
||||||
if (prog_type >= HID_BPF_PROG_TYPE_MAX)
|
|
||||||
return -EINVAL;
|
|
||||||
|
|
||||||
if ((flags & ~HID_BPF_FLAG_MASK))
|
if ((flags & ~HID_BPF_FLAG_MASK))
|
||||||
return -EINVAL;
|
return -EINVAL;
|
||||||
|
|
||||||
@ -278,23 +306,17 @@ hid_bpf_attach_prog(unsigned int hid_id, int prog_fd, __u32 flags)
|
|||||||
|
|
||||||
hdev = to_hid_device(dev);
|
hdev = to_hid_device(dev);
|
||||||
|
|
||||||
if (prog_type == HID_BPF_PROG_TYPE_DEVICE_EVENT) {
|
/*
|
||||||
err = hid_bpf_allocate_event_data(hdev);
|
* take a ref on the prog itself, it will be released
|
||||||
if (err)
|
* on errors or when it'll be detached
|
||||||
return err;
|
*/
|
||||||
}
|
prog = bpf_prog_get(prog_fd);
|
||||||
|
if (IS_ERR(prog))
|
||||||
|
return PTR_ERR(prog);
|
||||||
|
|
||||||
fd = __hid_bpf_attach_prog(hdev, prog_type, prog_fd, flags);
|
fd = do_hid_bpf_attach_prog(hdev, prog_fd, prog, flags);
|
||||||
if (fd < 0)
|
if (fd < 0)
|
||||||
return fd;
|
bpf_prog_put(prog);
|
||||||
|
|
||||||
if (prog_type == HID_BPF_PROG_TYPE_RDESC_FIXUP) {
|
|
||||||
err = hid_bpf_reconnect(hdev);
|
|
||||||
if (err) {
|
|
||||||
close_fd(fd);
|
|
||||||
return err;
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
return fd;
|
return fd;
|
||||||
}
|
}
|
||||||
|
@ -12,9 +12,9 @@ struct hid_bpf_ctx_kern {
|
|||||||
|
|
||||||
int hid_bpf_preload_skel(void);
|
int hid_bpf_preload_skel(void);
|
||||||
void hid_bpf_free_links_and_skel(void);
|
void hid_bpf_free_links_and_skel(void);
|
||||||
int hid_bpf_get_prog_attach_type(int prog_fd);
|
int hid_bpf_get_prog_attach_type(struct bpf_prog *prog);
|
||||||
int __hid_bpf_attach_prog(struct hid_device *hdev, enum hid_bpf_prog_type prog_type, int prog_fd,
|
int __hid_bpf_attach_prog(struct hid_device *hdev, enum hid_bpf_prog_type prog_type, int prog_fd,
|
||||||
__u32 flags);
|
struct bpf_prog *prog, __u32 flags);
|
||||||
void __hid_bpf_destroy_device(struct hid_device *hdev);
|
void __hid_bpf_destroy_device(struct hid_device *hdev);
|
||||||
int hid_bpf_prog_run(struct hid_device *hdev, enum hid_bpf_prog_type type,
|
int hid_bpf_prog_run(struct hid_device *hdev, enum hid_bpf_prog_type type,
|
||||||
struct hid_bpf_ctx_kern *ctx_kern);
|
struct hid_bpf_ctx_kern *ctx_kern);
|
||||||
|
@ -333,15 +333,10 @@ static int hid_bpf_insert_prog(int prog_fd, struct bpf_prog *prog)
|
|||||||
return err;
|
return err;
|
||||||
}
|
}
|
||||||
|
|
||||||
int hid_bpf_get_prog_attach_type(int prog_fd)
|
int hid_bpf_get_prog_attach_type(struct bpf_prog *prog)
|
||||||
{
|
{
|
||||||
struct bpf_prog *prog = NULL;
|
|
||||||
int i;
|
|
||||||
int prog_type = HID_BPF_PROG_TYPE_UNDEF;
|
int prog_type = HID_BPF_PROG_TYPE_UNDEF;
|
||||||
|
int i;
|
||||||
prog = bpf_prog_get(prog_fd);
|
|
||||||
if (IS_ERR(prog))
|
|
||||||
return PTR_ERR(prog);
|
|
||||||
|
|
||||||
for (i = 0; i < HID_BPF_PROG_TYPE_MAX; i++) {
|
for (i = 0; i < HID_BPF_PROG_TYPE_MAX; i++) {
|
||||||
if (hid_bpf_btf_ids[i] == prog->aux->attach_btf_id) {
|
if (hid_bpf_btf_ids[i] == prog->aux->attach_btf_id) {
|
||||||
@ -350,8 +345,6 @@ int hid_bpf_get_prog_attach_type(int prog_fd)
|
|||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
bpf_prog_put(prog);
|
|
||||||
|
|
||||||
return prog_type;
|
return prog_type;
|
||||||
}
|
}
|
||||||
|
|
||||||
@ -388,19 +381,13 @@ static const struct bpf_link_ops hid_bpf_link_lops = {
|
|||||||
/* called from syscall */
|
/* called from syscall */
|
||||||
noinline int
|
noinline int
|
||||||
__hid_bpf_attach_prog(struct hid_device *hdev, enum hid_bpf_prog_type prog_type,
|
__hid_bpf_attach_prog(struct hid_device *hdev, enum hid_bpf_prog_type prog_type,
|
||||||
int prog_fd, __u32 flags)
|
int prog_fd, struct bpf_prog *prog, __u32 flags)
|
||||||
{
|
{
|
||||||
struct bpf_link_primer link_primer;
|
struct bpf_link_primer link_primer;
|
||||||
struct hid_bpf_link *link;
|
struct hid_bpf_link *link;
|
||||||
struct bpf_prog *prog = NULL;
|
|
||||||
struct hid_bpf_prog_entry *prog_entry;
|
struct hid_bpf_prog_entry *prog_entry;
|
||||||
int cnt, err = -EINVAL, prog_table_idx = -1;
|
int cnt, err = -EINVAL, prog_table_idx = -1;
|
||||||
|
|
||||||
/* take a ref on the prog itself */
|
|
||||||
prog = bpf_prog_get(prog_fd);
|
|
||||||
if (IS_ERR(prog))
|
|
||||||
return PTR_ERR(prog);
|
|
||||||
|
|
||||||
mutex_lock(&hid_bpf_attach_lock);
|
mutex_lock(&hid_bpf_attach_lock);
|
||||||
|
|
||||||
link = kzalloc(sizeof(*link), GFP_USER);
|
link = kzalloc(sizeof(*link), GFP_USER);
|
||||||
@ -467,7 +454,6 @@ __hid_bpf_attach_prog(struct hid_device *hdev, enum hid_bpf_prog_type prog_type,
|
|||||||
err_unlock:
|
err_unlock:
|
||||||
mutex_unlock(&hid_bpf_attach_lock);
|
mutex_unlock(&hid_bpf_attach_lock);
|
||||||
|
|
||||||
bpf_prog_put(prog);
|
|
||||||
kfree(link);
|
kfree(link);
|
||||||
|
|
||||||
return err;
|
return err;
|
||||||
|
Loading…
Reference in New Issue
Block a user