diff options
author | 2024-06-26 15:46:25 +0200 | |
---|---|---|
committer | 2024-06-27 11:00:07 +0200 | |
commit | 8bd0488b5ea58655ad6fdcbe0408ef49b16882b1 (patch) | |
tree | 490b7e0108d826a9711f6796881ac1ce5d350748 /tools/perf/scripts/python/call-graph-from-postgresql.py | |
parent | HID: bpf: protect HID-BPF prog_list access by a SRCU (diff) | |
download | wireguard-linux-8bd0488b5ea58655ad6fdcbe0408ef49b16882b1.tar.xz wireguard-linux-8bd0488b5ea58655ad6fdcbe0408ef49b16882b1.zip |
HID: bpf: add HID-BPF hooks for hid_hw_raw_requests
This allows to intercept and prevent or change the behavior of
hid_hw_raw_request() from a bpf program.
The intent is to solve a couple of use case:
- firewalling a HID device: a firewall can monitor who opens the hidraw
nodes and then prevent or allow access to write operations on that
hidraw node.
- change the behavior of a device and emulate a new HID feature request
The hook is allowed to be run as sleepable so it can itself call
hid_bpf_hw_request(), which allows to "convert" one feature request into
another or even call the feature request on a different HID device on the
same physical device.
Link: https://patch.msgid.link/20240626-hid_hw_req_bpf-v2-4-cfd60fb6c79f@kernel.org
Acked-by: Jiri Kosina <jkosina@suse.com>
Signed-off-by: Benjamin Tissoires <bentiss@kernel.org>
Diffstat (limited to 'tools/perf/scripts/python/call-graph-from-postgresql.py')
0 files changed, 0 insertions, 0 deletions