~ [ source navigation ] ~ [ diff markup ] ~ [ identifier search ] ~

TOMOYO Linux Cross Reference
Linux/tools/testing/selftests/hid/hid_bpf.c

Version: ~ [ linux-6.11.5 ] ~ [ linux-6.10.14 ] ~ [ linux-6.9.12 ] ~ [ linux-6.8.12 ] ~ [ linux-6.7.12 ] ~ [ linux-6.6.58 ] ~ [ linux-6.5.13 ] ~ [ linux-6.4.16 ] ~ [ linux-6.3.13 ] ~ [ linux-6.2.16 ] ~ [ linux-6.1.114 ] ~ [ linux-6.0.19 ] ~ [ linux-5.19.17 ] ~ [ linux-5.18.19 ] ~ [ linux-5.17.15 ] ~ [ linux-5.16.20 ] ~ [ linux-5.15.169 ] ~ [ linux-5.14.21 ] ~ [ linux-5.13.19 ] ~ [ linux-5.12.19 ] ~ [ linux-5.11.22 ] ~ [ linux-5.10.228 ] ~ [ linux-5.9.16 ] ~ [ linux-5.8.18 ] ~ [ linux-5.7.19 ] ~ [ linux-5.6.19 ] ~ [ linux-5.5.19 ] ~ [ linux-5.4.284 ] ~ [ linux-5.3.18 ] ~ [ linux-5.2.21 ] ~ [ linux-5.1.21 ] ~ [ linux-5.0.21 ] ~ [ linux-4.20.17 ] ~ [ linux-4.19.322 ] ~ [ linux-4.18.20 ] ~ [ linux-4.17.19 ] ~ [ linux-4.16.18 ] ~ [ linux-4.15.18 ] ~ [ linux-4.14.336 ] ~ [ linux-4.13.16 ] ~ [ linux-4.12.14 ] ~ [ linux-4.11.12 ] ~ [ linux-4.10.17 ] ~ [ linux-4.9.337 ] ~ [ linux-4.4.302 ] ~ [ linux-3.10.108 ] ~ [ linux-2.6.32.71 ] ~ [ linux-2.6.0 ] ~ [ linux-2.4.37.11 ] ~ [ unix-v6-master ] ~ [ ccs-tools-1.8.9 ] ~ [ policy-sample ] ~
Architecture: ~ [ i386 ] ~ [ alpha ] ~ [ m68k ] ~ [ mips ] ~ [ ppc ] ~ [ sparc ] ~ [ sparc64 ] ~

  1 // SPDX-License-Identifier: GPL-2.0
  2 /* Copyright (c) 2022 Red Hat */
  3 #include "hid.skel.h"
  4 
  5 #include "../kselftest_harness.h"
  6 
  7 #include <bpf/bpf.h>
  8 #include <fcntl.h>
  9 #include <fnmatch.h>
 10 #include <dirent.h>
 11 #include <poll.h>
 12 #include <pthread.h>
 13 #include <stdbool.h>
 14 #include <linux/hidraw.h>
 15 #include <linux/uhid.h>
 16 
 17 #define SHOW_UHID_DEBUG 0
 18 
 19 #define min(a, b) \
 20         ({ __typeof__(a) _a = (a); \
 21         __typeof__(b) _b = (b); \
 22         _a < _b ? _a : _b; })
 23 
 24 static unsigned char rdesc[] = {
 25         0x06, 0x00, 0xff,       /* Usage Page (Vendor Defined Page 1) */
 26         0x09, 0x21,             /* Usage (Vendor Usage 0x21) */
 27         0xa1, 0x01,             /* COLLECTION (Application) */
 28         0x09, 0x01,                     /* Usage (Vendor Usage 0x01) */
 29         0xa1, 0x00,                     /* COLLECTION (Physical) */
 30         0x85, 0x02,                             /* REPORT_ID (2) */
 31         0x19, 0x01,                             /* USAGE_MINIMUM (1) */
 32         0x29, 0x08,                             /* USAGE_MAXIMUM (3) */
 33         0x15, 0x00,                             /* LOGICAL_MINIMUM (0) */
 34         0x25, 0xff,                             /* LOGICAL_MAXIMUM (255) */
 35         0x95, 0x08,                             /* REPORT_COUNT (8) */
 36         0x75, 0x08,                             /* REPORT_SIZE (8) */
 37         0x81, 0x02,                             /* INPUT (Data,Var,Abs) */
 38         0xc0,                           /* END_COLLECTION */
 39         0x09, 0x01,                     /* Usage (Vendor Usage 0x01) */
 40         0xa1, 0x00,                     /* COLLECTION (Physical) */
 41         0x85, 0x01,                             /* REPORT_ID (1) */
 42         0x06, 0x00, 0xff,                       /* Usage Page (Vendor Defined Page 1) */
 43         0x19, 0x01,                             /* USAGE_MINIMUM (1) */
 44         0x29, 0x03,                             /* USAGE_MAXIMUM (3) */
 45         0x15, 0x00,                             /* LOGICAL_MINIMUM (0) */
 46         0x25, 0x01,                             /* LOGICAL_MAXIMUM (1) */
 47         0x95, 0x03,                             /* REPORT_COUNT (3) */
 48         0x75, 0x01,                             /* REPORT_SIZE (1) */
 49         0x81, 0x02,                             /* INPUT (Data,Var,Abs) */
 50         0x95, 0x01,                             /* REPORT_COUNT (1) */
 51         0x75, 0x05,                             /* REPORT_SIZE (5) */
 52         0x81, 0x01,                             /* INPUT (Cnst,Var,Abs) */
 53         0x05, 0x01,                             /* USAGE_PAGE (Generic Desktop) */
 54         0x09, 0x30,                             /* USAGE (X) */
 55         0x09, 0x31,                             /* USAGE (Y) */
 56         0x15, 0x81,                             /* LOGICAL_MINIMUM (-127) */
 57         0x25, 0x7f,                             /* LOGICAL_MAXIMUM (127) */
 58         0x75, 0x10,                             /* REPORT_SIZE (16) */
 59         0x95, 0x02,                             /* REPORT_COUNT (2) */
 60         0x81, 0x06,                             /* INPUT (Data,Var,Rel) */
 61 
 62         0x06, 0x00, 0xff,                       /* Usage Page (Vendor Defined Page 1) */
 63         0x19, 0x01,                             /* USAGE_MINIMUM (1) */
 64         0x29, 0x03,                             /* USAGE_MAXIMUM (3) */
 65         0x15, 0x00,                             /* LOGICAL_MINIMUM (0) */
 66         0x25, 0x01,                             /* LOGICAL_MAXIMUM (1) */
 67         0x95, 0x03,                             /* REPORT_COUNT (3) */
 68         0x75, 0x01,                             /* REPORT_SIZE (1) */
 69         0x91, 0x02,                             /* Output (Data,Var,Abs) */
 70         0x95, 0x01,                             /* REPORT_COUNT (1) */
 71         0x75, 0x05,                             /* REPORT_SIZE (5) */
 72         0x91, 0x01,                             /* Output (Cnst,Var,Abs) */
 73 
 74         0x06, 0x00, 0xff,                       /* Usage Page (Vendor Defined Page 1) */
 75         0x19, 0x06,                             /* USAGE_MINIMUM (6) */
 76         0x29, 0x08,                             /* USAGE_MAXIMUM (8) */
 77         0x15, 0x00,                             /* LOGICAL_MINIMUM (0) */
 78         0x25, 0x01,                             /* LOGICAL_MAXIMUM (1) */
 79         0x95, 0x03,                             /* REPORT_COUNT (3) */
 80         0x75, 0x01,                             /* REPORT_SIZE (1) */
 81         0xb1, 0x02,                             /* Feature (Data,Var,Abs) */
 82         0x95, 0x01,                             /* REPORT_COUNT (1) */
 83         0x75, 0x05,                             /* REPORT_SIZE (5) */
 84         0x91, 0x01,                             /* Output (Cnst,Var,Abs) */
 85 
 86         0xc0,                           /* END_COLLECTION */
 87         0xc0,                   /* END_COLLECTION */
 88 };
 89 
 90 static __u8 feature_data[] = { 1, 2 };
 91 
 92 struct attach_prog_args {
 93         int prog_fd;
 94         unsigned int hid;
 95         int retval;
 96         int insert_head;
 97 };
 98 
 99 struct hid_hw_request_syscall_args {
100         __u8 data[10];
101         unsigned int hid;
102         int retval;
103         size_t size;
104         enum hid_report_type type;
105         __u8 request_type;
106 };
107 
108 #define ASSERT_OK(data) ASSERT_FALSE(data)
109 #define ASSERT_OK_PTR(ptr) ASSERT_NE(NULL, ptr)
110 
111 #define UHID_LOG(fmt, ...) do { \
112         if (SHOW_UHID_DEBUG) \
113                 TH_LOG(fmt, ##__VA_ARGS__); \
114 } while (0)
115 
116 static pthread_mutex_t uhid_started_mtx = PTHREAD_MUTEX_INITIALIZER;
117 static pthread_cond_t uhid_started = PTHREAD_COND_INITIALIZER;
118 
119 static pthread_mutex_t uhid_output_mtx = PTHREAD_MUTEX_INITIALIZER;
120 static pthread_cond_t uhid_output_cond = PTHREAD_COND_INITIALIZER;
121 static unsigned char output_report[10];
122 
123 /* no need to protect uhid_stopped, only one thread accesses it */
124 static bool uhid_stopped;
125 
126 static int uhid_write(struct __test_metadata *_metadata, int fd, const struct uhid_event *ev)
127 {
128         ssize_t ret;
129 
130         ret = write(fd, ev, sizeof(*ev));
131         if (ret < 0) {
132                 TH_LOG("Cannot write to uhid: %m");
133                 return -errno;
134         } else if (ret != sizeof(*ev)) {
135                 TH_LOG("Wrong size written to uhid: %zd != %zu",
136                         ret, sizeof(ev));
137                 return -EFAULT;
138         } else {
139                 return 0;
140         }
141 }
142 
143 static int uhid_create(struct __test_metadata *_metadata, int fd, int rand_nb)
144 {
145         struct uhid_event ev;
146         char buf[25];
147 
148         sprintf(buf, "test-uhid-device-%d", rand_nb);
149 
150         memset(&ev, 0, sizeof(ev));
151         ev.type = UHID_CREATE;
152         strcpy((char *)ev.u.create.name, buf);
153         ev.u.create.rd_data = rdesc;
154         ev.u.create.rd_size = sizeof(rdesc);
155         ev.u.create.bus = BUS_USB;
156         ev.u.create.vendor = 0x0001;
157         ev.u.create.product = 0x0a37;
158         ev.u.create.version = 0;
159         ev.u.create.country = 0;
160 
161         sprintf(buf, "%d", rand_nb);
162         strcpy((char *)ev.u.create.phys, buf);
163 
164         return uhid_write(_metadata, fd, &ev);
165 }
166 
167 static void uhid_destroy(struct __test_metadata *_metadata, int fd)
168 {
169         struct uhid_event ev;
170 
171         memset(&ev, 0, sizeof(ev));
172         ev.type = UHID_DESTROY;
173 
174         uhid_write(_metadata, fd, &ev);
175 }
176 
177 static int uhid_event(struct __test_metadata *_metadata, int fd)
178 {
179         struct uhid_event ev, answer;
180         ssize_t ret;
181 
182         memset(&ev, 0, sizeof(ev));
183         ret = read(fd, &ev, sizeof(ev));
184         if (ret == 0) {
185                 UHID_LOG("Read HUP on uhid-cdev");
186                 return -EFAULT;
187         } else if (ret < 0) {
188                 UHID_LOG("Cannot read uhid-cdev: %m");
189                 return -errno;
190         } else if (ret != sizeof(ev)) {
191                 UHID_LOG("Invalid size read from uhid-dev: %zd != %zu",
192                         ret, sizeof(ev));
193                 return -EFAULT;
194         }
195 
196         switch (ev.type) {
197         case UHID_START:
198                 pthread_mutex_lock(&uhid_started_mtx);
199                 pthread_cond_signal(&uhid_started);
200                 pthread_mutex_unlock(&uhid_started_mtx);
201 
202                 UHID_LOG("UHID_START from uhid-dev");
203                 break;
204         case UHID_STOP:
205                 uhid_stopped = true;
206 
207                 UHID_LOG("UHID_STOP from uhid-dev");
208                 break;
209         case UHID_OPEN:
210                 UHID_LOG("UHID_OPEN from uhid-dev");
211                 break;
212         case UHID_CLOSE:
213                 UHID_LOG("UHID_CLOSE from uhid-dev");
214                 break;
215         case UHID_OUTPUT:
216                 UHID_LOG("UHID_OUTPUT from uhid-dev");
217 
218                 pthread_mutex_lock(&uhid_output_mtx);
219                 memcpy(output_report,
220                        ev.u.output.data,
221                        min(ev.u.output.size, sizeof(output_report)));
222                 pthread_cond_signal(&uhid_output_cond);
223                 pthread_mutex_unlock(&uhid_output_mtx);
224                 break;
225         case UHID_GET_REPORT:
226                 UHID_LOG("UHID_GET_REPORT from uhid-dev");
227 
228                 answer.type = UHID_GET_REPORT_REPLY;
229                 answer.u.get_report_reply.id = ev.u.get_report.id;
230                 answer.u.get_report_reply.err = ev.u.get_report.rnum == 1 ? 0 : -EIO;
231                 answer.u.get_report_reply.size = sizeof(feature_data);
232                 memcpy(answer.u.get_report_reply.data, feature_data, sizeof(feature_data));
233 
234                 uhid_write(_metadata, fd, &answer);
235 
236                 break;
237         case UHID_SET_REPORT:
238                 UHID_LOG("UHID_SET_REPORT from uhid-dev");
239                 break;
240         default:
241                 TH_LOG("Invalid event from uhid-dev: %u", ev.type);
242         }
243 
244         return 0;
245 }
246 
247 struct uhid_thread_args {
248         int fd;
249         struct __test_metadata *_metadata;
250 };
251 static void *uhid_read_events_thread(void *arg)
252 {
253         struct uhid_thread_args *args = (struct uhid_thread_args *)arg;
254         struct __test_metadata *_metadata = args->_metadata;
255         struct pollfd pfds[1];
256         int fd = args->fd;
257         int ret = 0;
258 
259         pfds[0].fd = fd;
260         pfds[0].events = POLLIN;
261 
262         uhid_stopped = false;
263 
264         while (!uhid_stopped) {
265                 ret = poll(pfds, 1, 100);
266                 if (ret < 0) {
267                         TH_LOG("Cannot poll for fds: %m");
268                         break;
269                 }
270                 if (pfds[0].revents & POLLIN) {
271                         ret = uhid_event(_metadata, fd);
272                         if (ret)
273                                 break;
274                 }
275         }
276 
277         return (void *)(long)ret;
278 }
279 
280 static int uhid_start_listener(struct __test_metadata *_metadata, pthread_t *tid, int uhid_fd)
281 {
282         struct uhid_thread_args args = {
283                 .fd = uhid_fd,
284                 ._metadata = _metadata,
285         };
286         int err;
287 
288         pthread_mutex_lock(&uhid_started_mtx);
289         err = pthread_create(tid, NULL, uhid_read_events_thread, (void *)&args);
290         ASSERT_EQ(0, err) {
291                 TH_LOG("Could not start the uhid thread: %d", err);
292                 pthread_mutex_unlock(&uhid_started_mtx);
293                 close(uhid_fd);
294                 return -EIO;
295         }
296         pthread_cond_wait(&uhid_started, &uhid_started_mtx);
297         pthread_mutex_unlock(&uhid_started_mtx);
298 
299         return 0;
300 }
301 
302 static int uhid_send_event(struct __test_metadata *_metadata, int fd, __u8 *buf, size_t size)
303 {
304         struct uhid_event ev;
305 
306         if (size > sizeof(ev.u.input.data))
307                 return -E2BIG;
308 
309         memset(&ev, 0, sizeof(ev));
310         ev.type = UHID_INPUT2;
311         ev.u.input2.size = size;
312 
313         memcpy(ev.u.input2.data, buf, size);
314 
315         return uhid_write(_metadata, fd, &ev);
316 }
317 
318 static int setup_uhid(struct __test_metadata *_metadata, int rand_nb)
319 {
320         int fd;
321         const char *path = "/dev/uhid";
322         int ret;
323 
324         fd = open(path, O_RDWR | O_CLOEXEC);
325         ASSERT_GE(fd, 0) TH_LOG("open uhid-cdev failed; %d", fd);
326 
327         ret = uhid_create(_metadata, fd, rand_nb);
328         ASSERT_EQ(0, ret) {
329                 TH_LOG("create uhid device failed: %d", ret);
330                 close(fd);
331         }
332 
333         return fd;
334 }
335 
336 static bool match_sysfs_device(int dev_id, const char *workdir, struct dirent *dir)
337 {
338         const char *target = "0003:0001:0A37.*";
339         char phys[512];
340         char uevent[1024];
341         char temp[512];
342         int fd, nread;
343         bool found = false;
344 
345         if (fnmatch(target, dir->d_name, 0))
346                 return false;
347 
348         /* we found the correct VID/PID, now check for phys */
349         sprintf(uevent, "%s/%s/uevent", workdir, dir->d_name);
350 
351         fd = open(uevent, O_RDONLY | O_NONBLOCK);
352         if (fd < 0)
353                 return false;
354 
355         sprintf(phys, "PHYS=%d", dev_id);
356 
357         nread = read(fd, temp, ARRAY_SIZE(temp));
358         if (nread > 0 && (strstr(temp, phys)) != NULL)
359                 found = true;
360 
361         close(fd);
362 
363         return found;
364 }
365 
366 static int get_hid_id(int dev_id)
367 {
368         const char *workdir = "/sys/devices/virtual/misc/uhid";
369         const char *str_id;
370         DIR *d;
371         struct dirent *dir;
372         int found = -1, attempts = 3;
373 
374         /* it would be nice to be able to use nftw, but the no_alu32 target doesn't support it */
375 
376         while (found < 0 && attempts > 0) {
377                 attempts--;
378                 d = opendir(workdir);
379                 if (d) {
380                         while ((dir = readdir(d)) != NULL) {
381                                 if (!match_sysfs_device(dev_id, workdir, dir))
382                                         continue;
383 
384                                 str_id = dir->d_name + sizeof("0003:0001:0A37.");
385                                 found = (int)strtol(str_id, NULL, 16);
386 
387                                 break;
388                         }
389                         closedir(d);
390                 }
391                 if (found < 0)
392                         usleep(100000);
393         }
394 
395         return found;
396 }
397 
398 static int get_hidraw(int dev_id)
399 {
400         const char *workdir = "/sys/devices/virtual/misc/uhid";
401         char sysfs[1024];
402         DIR *d, *subd;
403         struct dirent *dir, *subdir;
404         int i, found = -1;
405 
406         /* retry 5 times in case the system is loaded */
407         for (i = 5; i > 0; i--) {
408                 usleep(10);
409                 d = opendir(workdir);
410 
411                 if (!d)
412                         continue;
413 
414                 while ((dir = readdir(d)) != NULL) {
415                         if (!match_sysfs_device(dev_id, workdir, dir))
416                                 continue;
417 
418                         sprintf(sysfs, "%s/%s/hidraw", workdir, dir->d_name);
419 
420                         subd = opendir(sysfs);
421                         if (!subd)
422                                 continue;
423 
424                         while ((subdir = readdir(subd)) != NULL) {
425                                 if (fnmatch("hidraw*", subdir->d_name, 0))
426                                         continue;
427 
428                                 found = atoi(subdir->d_name + strlen("hidraw"));
429                         }
430 
431                         closedir(subd);
432 
433                         if (found > 0)
434                                 break;
435                 }
436                 closedir(d);
437         }
438 
439         return found;
440 }
441 
442 static int open_hidraw(int dev_id)
443 {
444         int hidraw_number;
445         char hidraw_path[64] = { 0 };
446 
447         hidraw_number = get_hidraw(dev_id);
448         if (hidraw_number < 0)
449                 return hidraw_number;
450 
451         /* open hidraw node to check the other side of the pipe */
452         sprintf(hidraw_path, "/dev/hidraw%d", hidraw_number);
453         return open(hidraw_path, O_RDWR | O_NONBLOCK);
454 }
455 
456 FIXTURE(hid_bpf) {
457         int dev_id;
458         int uhid_fd;
459         int hidraw_fd;
460         int hid_id;
461         pthread_t tid;
462         struct hid *skel;
463         struct bpf_link *hid_links[3]; /* max number of programs loaded in a single test */
464 };
465 static void detach_bpf(FIXTURE_DATA(hid_bpf) * self)
466 {
467         int i;
468 
469         if (self->hidraw_fd)
470                 close(self->hidraw_fd);
471         self->hidraw_fd = 0;
472 
473         if (!self->skel)
474                 return;
475 
476         hid__detach(self->skel);
477 
478         for (i = 0; i < ARRAY_SIZE(self->hid_links); i++) {
479                 if (self->hid_links[i])
480                         bpf_link__destroy(self->hid_links[i]);
481         }
482 
483         hid__destroy(self->skel);
484         self->skel = NULL;
485 }
486 
487 FIXTURE_TEARDOWN(hid_bpf) {
488         void *uhid_err;
489 
490         uhid_destroy(_metadata, self->uhid_fd);
491 
492         detach_bpf(self);
493         pthread_join(self->tid, &uhid_err);
494 }
495 #define TEARDOWN_LOG(fmt, ...) do { \
496         TH_LOG(fmt, ##__VA_ARGS__); \
497         hid_bpf_teardown(_metadata, self, variant); \
498 } while (0)
499 
500 FIXTURE_SETUP(hid_bpf)
501 {
502         time_t t;
503         int err;
504 
505         /* initialize random number generator */
506         srand((unsigned int)time(&t));
507 
508         self->dev_id = rand() % 1024;
509 
510         self->uhid_fd = setup_uhid(_metadata, self->dev_id);
511 
512         /* locate the uev, self, variant);ent file of the created device */
513         self->hid_id = get_hid_id(self->dev_id);
514         ASSERT_GT(self->hid_id, 0)
515                 TEARDOWN_LOG("Could not locate uhid device id: %d", self->hid_id);
516 
517         err = uhid_start_listener(_metadata, &self->tid, self->uhid_fd);
518         ASSERT_EQ(0, err) TEARDOWN_LOG("could not start udev listener: %d", err);
519 }
520 
521 struct test_program {
522         const char *name;
523         int insert_head;
524 };
525 #define LOAD_PROGRAMS(progs) \
526         load_programs(progs, ARRAY_SIZE(progs), _metadata, self, variant)
527 #define LOAD_BPF \
528         load_programs(NULL, 0, _metadata, self, variant)
529 static void load_programs(const struct test_program programs[],
530                           const size_t progs_count,
531                           struct __test_metadata *_metadata,
532                           FIXTURE_DATA(hid_bpf) * self,
533                           const FIXTURE_VARIANT(hid_bpf) * variant)
534 {
535         struct bpf_map *iter_map;
536         int err = -EINVAL;
537 
538         ASSERT_LE(progs_count, ARRAY_SIZE(self->hid_links))
539                 TH_LOG("too many programs are to be loaded");
540 
541         /* open the bpf file */
542         self->skel = hid__open();
543         ASSERT_OK_PTR(self->skel) TEARDOWN_LOG("Error while calling hid__open");
544 
545         for (int i = 0; i < progs_count; i++) {
546                 struct bpf_program *prog;
547                 struct bpf_map *map;
548                 int *ops_hid_id;
549 
550                 prog = bpf_object__find_program_by_name(*self->skel->skeleton->obj,
551                                                         programs[i].name);
552                 ASSERT_OK_PTR(prog) TH_LOG("can not find program by name '%s'", programs[i].name);
553 
554                 bpf_program__set_autoload(prog, true);
555 
556                 map = bpf_object__find_map_by_name(*self->skel->skeleton->obj,
557                                                           programs[i].name + 4);
558                 ASSERT_OK_PTR(map) TH_LOG("can not find struct_ops by name '%s'",
559                                           programs[i].name + 4);
560 
561                 /* hid_id is the first field of struct hid_bpf_ops */
562                 ops_hid_id = bpf_map__initial_value(map, NULL);
563                 ASSERT_OK_PTR(ops_hid_id) TH_LOG("unable to retrieve struct_ops data");
564 
565                 *ops_hid_id = self->hid_id;
566         }
567 
568         /* we disable the auto-attach feature of all maps because we
569          * only want the tested one to be manually attached in the next
570          * call to bpf_map__attach_struct_ops()
571          */
572         bpf_object__for_each_map(iter_map, *self->skel->skeleton->obj)
573                 bpf_map__set_autoattach(iter_map, false);
574 
575         err = hid__load(self->skel);
576         ASSERT_OK(err) TH_LOG("hid_skel_load failed: %d", err);
577 
578         for (int i = 0; i < progs_count; i++) {
579                 struct bpf_map *map;
580 
581                 map = bpf_object__find_map_by_name(*self->skel->skeleton->obj,
582                                                           programs[i].name + 4);
583                 ASSERT_OK_PTR(map) TH_LOG("can not find struct_ops by name '%s'",
584                                           programs[i].name + 4);
585 
586                 self->hid_links[i] = bpf_map__attach_struct_ops(map);
587                 ASSERT_OK_PTR(self->hid_links[i]) TH_LOG("failed to attach struct ops '%s'",
588                                                          programs[i].name + 4);
589         }
590 
591         hid__attach(self->skel);
592 
593         self->hidraw_fd = open_hidraw(self->dev_id);
594         ASSERT_GE(self->hidraw_fd, 0) TH_LOG("open_hidraw");
595 }
596 
597 /*
598  * A simple test to see if the fixture is working fine.
599  * If this fails, none of the other tests will pass.
600  */
601 TEST_F(hid_bpf, test_create_uhid)
602 {
603 }
604 
605 /*
606  * Attach hid_first_event to the given uhid device,
607  * retrieve and open the matching hidraw node,
608  * inject one event in the uhid device,
609  * check that the program sees it and can change the data
610  */
611 TEST_F(hid_bpf, raw_event)
612 {
613         const struct test_program progs[] = {
614                 { .name = "hid_first_event" },
615         };
616         __u8 buf[10] = {0};
617         int err;
618 
619         LOAD_PROGRAMS(progs);
620 
621         /* check that the program is correctly loaded */
622         ASSERT_EQ(self->skel->data->callback_check, 52) TH_LOG("callback_check1");
623         ASSERT_EQ(self->skel->data->callback2_check, 52) TH_LOG("callback2_check1");
624 
625         /* inject one event */
626         buf[0] = 1;
627         buf[1] = 42;
628         uhid_send_event(_metadata, self->uhid_fd, buf, 6);
629 
630         /* check that hid_first_event() was executed */
631         ASSERT_EQ(self->skel->data->callback_check, 42) TH_LOG("callback_check1");
632 
633         /* read the data from hidraw */
634         memset(buf, 0, sizeof(buf));
635         err = read(self->hidraw_fd, buf, sizeof(buf));
636         ASSERT_EQ(err, 6) TH_LOG("read_hidraw");
637         ASSERT_EQ(buf[0], 1);
638         ASSERT_EQ(buf[2], 47);
639 
640         /* inject another event */
641         memset(buf, 0, sizeof(buf));
642         buf[0] = 1;
643         buf[1] = 47;
644         uhid_send_event(_metadata, self->uhid_fd, buf, 6);
645 
646         /* check that hid_first_event() was executed */
647         ASSERT_EQ(self->skel->data->callback_check, 47) TH_LOG("callback_check1");
648 
649         /* read the data from hidraw */
650         memset(buf, 0, sizeof(buf));
651         err = read(self->hidraw_fd, buf, sizeof(buf));
652         ASSERT_EQ(err, 6) TH_LOG("read_hidraw");
653         ASSERT_EQ(buf[2], 52);
654 }
655 
656 /*
657  * Attach hid_first_event to the given uhid device,
658  * retrieve and open the matching hidraw node,
659  * inject one event in the uhid device,
660  * check that the program sees it and can change the data
661  */
662 TEST_F(hid_bpf, subprog_raw_event)
663 {
664         const struct test_program progs[] = {
665                 { .name = "hid_subprog_first_event" },
666         };
667         __u8 buf[10] = {0};
668         int err;
669 
670         LOAD_PROGRAMS(progs);
671 
672         /* inject one event */
673         buf[0] = 1;
674         buf[1] = 42;
675         uhid_send_event(_metadata, self->uhid_fd, buf, 6);
676 
677         /* read the data from hidraw */
678         memset(buf, 0, sizeof(buf));
679         err = read(self->hidraw_fd, buf, sizeof(buf));
680         ASSERT_EQ(err, 6) TH_LOG("read_hidraw");
681         ASSERT_EQ(buf[0], 1);
682         ASSERT_EQ(buf[2], 47);
683 
684         /* inject another event */
685         memset(buf, 0, sizeof(buf));
686         buf[0] = 1;
687         buf[1] = 47;
688         uhid_send_event(_metadata, self->uhid_fd, buf, 6);
689 
690         /* read the data from hidraw */
691         memset(buf, 0, sizeof(buf));
692         err = read(self->hidraw_fd, buf, sizeof(buf));
693         ASSERT_EQ(err, 6) TH_LOG("read_hidraw");
694         ASSERT_EQ(buf[2], 52);
695 }
696 
697 /*
698  * Attach hid_first_event to the given uhid device,
699  * attempt at re-attaching it, we should not lock and
700  * return an invalid struct bpf_link
701  */
702 TEST_F(hid_bpf, multiple_attach)
703 {
704         const struct test_program progs[] = {
705                 { .name = "hid_first_event" },
706         };
707         struct bpf_link *link;
708 
709         LOAD_PROGRAMS(progs);
710 
711         link = bpf_map__attach_struct_ops(self->skel->maps.first_event);
712         ASSERT_NULL(link) TH_LOG("unexpected return value when re-attaching the struct_ops");
713 }
714 
715 /*
716  * Ensures that we can attach/detach programs
717  */
718 TEST_F(hid_bpf, test_attach_detach)
719 {
720         const struct test_program progs[] = {
721                 { .name = "hid_first_event" },
722                 { .name = "hid_second_event" },
723         };
724         struct bpf_link *link;
725         __u8 buf[10] = {0};
726         int err, link_fd;
727 
728         LOAD_PROGRAMS(progs);
729 
730         link = self->hid_links[0];
731         ASSERT_OK_PTR(link) TH_LOG("HID-BPF link not created");
732 
733         link_fd = bpf_link__fd(link);
734         ASSERT_GE(link_fd, 0) TH_LOG("HID-BPF link FD not valid");
735 
736         /* inject one event */
737         buf[0] = 1;
738         buf[1] = 42;
739         uhid_send_event(_metadata, self->uhid_fd, buf, 6);
740 
741         /* read the data from hidraw */
742         memset(buf, 0, sizeof(buf));
743         err = read(self->hidraw_fd, buf, sizeof(buf));
744         ASSERT_EQ(err, 6) TH_LOG("read_hidraw");
745         ASSERT_EQ(buf[0], 1);
746         ASSERT_EQ(buf[2], 47);
747 
748         /* make sure both programs are run */
749         ASSERT_EQ(buf[3], 52);
750 
751         /* pin the first program and immediately unpin it */
752 #define PIN_PATH "/sys/fs/bpf/hid_first_event"
753         err = bpf_obj_pin(link_fd, PIN_PATH);
754         ASSERT_OK(err) TH_LOG("error while calling bpf_obj_pin");
755         remove(PIN_PATH);
756 #undef PIN_PATH
757         usleep(100000);
758 
759         /* detach the program */
760         detach_bpf(self);
761 
762         self->hidraw_fd = open_hidraw(self->dev_id);
763         ASSERT_GE(self->hidraw_fd, 0) TH_LOG("open_hidraw");
764 
765         /* inject another event */
766         memset(buf, 0, sizeof(buf));
767         buf[0] = 1;
768         buf[1] = 47;
769         uhid_send_event(_metadata, self->uhid_fd, buf, 6);
770 
771         /* read the data from hidraw */
772         memset(buf, 0, sizeof(buf));
773         err = read(self->hidraw_fd, buf, sizeof(buf));
774         ASSERT_EQ(err, 6) TH_LOG("read_hidraw_no_bpf");
775         ASSERT_EQ(buf[0], 1);
776         ASSERT_EQ(buf[1], 47);
777         ASSERT_EQ(buf[2], 0);
778         ASSERT_EQ(buf[3], 0);
779 
780         /* re-attach our program */
781 
782         LOAD_PROGRAMS(progs);
783 
784         /* inject one event */
785         memset(buf, 0, sizeof(buf));
786         buf[0] = 1;
787         buf[1] = 42;
788         uhid_send_event(_metadata, self->uhid_fd, buf, 6);
789 
790         /* read the data from hidraw */
791         memset(buf, 0, sizeof(buf));
792         err = read(self->hidraw_fd, buf, sizeof(buf));
793         ASSERT_EQ(err, 6) TH_LOG("read_hidraw");
794         ASSERT_EQ(buf[0], 1);
795         ASSERT_EQ(buf[2], 47);
796         ASSERT_EQ(buf[3], 52);
797 }
798 
799 /*
800  * Attach hid_change_report_id to the given uhid device,
801  * retrieve and open the matching hidraw node,
802  * inject one event in the uhid device,
803  * check that the program sees it and can change the data
804  */
805 TEST_F(hid_bpf, test_hid_change_report)
806 {
807         const struct test_program progs[] = {
808                 { .name = "hid_change_report_id" },
809         };
810         __u8 buf[10] = {0};
811         int err;
812 
813         LOAD_PROGRAMS(progs);
814 
815         /* inject one event */
816         buf[0] = 1;
817         buf[1] = 42;
818         uhid_send_event(_metadata, self->uhid_fd, buf, 6);
819 
820         /* read the data from hidraw */
821         memset(buf, 0, sizeof(buf));
822         err = read(self->hidraw_fd, buf, sizeof(buf));
823         ASSERT_EQ(err, 9) TH_LOG("read_hidraw");
824         ASSERT_EQ(buf[0], 2);
825         ASSERT_EQ(buf[1], 42);
826         ASSERT_EQ(buf[2], 0) TH_LOG("leftovers_from_previous_test");
827 }
828 
829 /*
830  * Call hid_bpf_input_report against the given uhid device,
831  * check that the program is called and does the expected.
832  */
833 TEST_F(hid_bpf, test_hid_user_input_report_call)
834 {
835         struct hid_hw_request_syscall_args args = {
836                 .retval = -1,
837                 .size = 10,
838         };
839         DECLARE_LIBBPF_OPTS(bpf_test_run_opts, tattrs,
840                             .ctx_in = &args,
841                             .ctx_size_in = sizeof(args),
842         );
843         __u8 buf[10] = {0};
844         int err, prog_fd;
845 
846         LOAD_BPF;
847 
848         args.hid = self->hid_id;
849         args.data[0] = 1; /* report ID */
850         args.data[1] = 2; /* report ID */
851         args.data[2] = 42; /* report ID */
852 
853         prog_fd = bpf_program__fd(self->skel->progs.hid_user_input_report);
854 
855         /* check that there is no data to read from hidraw */
856         memset(buf, 0, sizeof(buf));
857         err = read(self->hidraw_fd, buf, sizeof(buf));
858         ASSERT_EQ(err, -1) TH_LOG("read_hidraw");
859 
860         err = bpf_prog_test_run_opts(prog_fd, &tattrs);
861 
862         ASSERT_OK(err) TH_LOG("error while calling bpf_prog_test_run_opts");
863 
864         ASSERT_EQ(args.retval, 0);
865 
866         /* read the data from hidraw */
867         memset(buf, 0, sizeof(buf));
868         err = read(self->hidraw_fd, buf, sizeof(buf));
869         ASSERT_EQ(err, 6) TH_LOG("read_hidraw");
870         ASSERT_EQ(buf[0], 1);
871         ASSERT_EQ(buf[1], 2);
872         ASSERT_EQ(buf[2], 42);
873 }
874 
875 /*
876  * Call hid_bpf_hw_output_report against the given uhid device,
877  * check that the program is called and does the expected.
878  */
879 TEST_F(hid_bpf, test_hid_user_output_report_call)
880 {
881         struct hid_hw_request_syscall_args args = {
882                 .retval = -1,
883                 .size = 10,
884         };
885         DECLARE_LIBBPF_OPTS(bpf_test_run_opts, tattrs,
886                             .ctx_in = &args,
887                             .ctx_size_in = sizeof(args),
888         );
889         int err, cond_err, prog_fd;
890         struct timespec time_to_wait;
891 
892         LOAD_BPF;
893 
894         args.hid = self->hid_id;
895         args.data[0] = 1; /* report ID */
896         args.data[1] = 2; /* report ID */
897         args.data[2] = 42; /* report ID */
898 
899         prog_fd = bpf_program__fd(self->skel->progs.hid_user_output_report);
900 
901         pthread_mutex_lock(&uhid_output_mtx);
902 
903         memset(output_report, 0, sizeof(output_report));
904         clock_gettime(CLOCK_REALTIME, &time_to_wait);
905         time_to_wait.tv_sec += 2;
906 
907         err = bpf_prog_test_run_opts(prog_fd, &tattrs);
908         cond_err = pthread_cond_timedwait(&uhid_output_cond, &uhid_output_mtx, &time_to_wait);
909 
910         ASSERT_OK(err) TH_LOG("error while calling bpf_prog_test_run_opts");
911         ASSERT_OK(cond_err) TH_LOG("error while calling waiting for the condition");
912 
913         ASSERT_EQ(args.retval, 3);
914 
915         ASSERT_EQ(output_report[0], 1);
916         ASSERT_EQ(output_report[1], 2);
917         ASSERT_EQ(output_report[2], 42);
918 
919         pthread_mutex_unlock(&uhid_output_mtx);
920 }
921 
922 /*
923  * Call hid_hw_raw_request against the given uhid device,
924  * check that the program is called and does the expected.
925  */
926 TEST_F(hid_bpf, test_hid_user_raw_request_call)
927 {
928         struct hid_hw_request_syscall_args args = {
929                 .retval = -1,
930                 .type = HID_FEATURE_REPORT,
931                 .request_type = HID_REQ_GET_REPORT,
932                 .size = 10,
933         };
934         DECLARE_LIBBPF_OPTS(bpf_test_run_opts, tattrs,
935                             .ctx_in = &args,
936                             .ctx_size_in = sizeof(args),
937         );
938         int err, prog_fd;
939 
940         LOAD_BPF;
941 
942         args.hid = self->hid_id;
943         args.data[0] = 1; /* report ID */
944 
945         prog_fd = bpf_program__fd(self->skel->progs.hid_user_raw_request);
946 
947         err = bpf_prog_test_run_opts(prog_fd, &tattrs);
948         ASSERT_OK(err) TH_LOG("error while calling bpf_prog_test_run_opts");
949 
950         ASSERT_EQ(args.retval, 2);
951 
952         ASSERT_EQ(args.data[1], 2);
953 }
954 
955 /*
956  * Call hid_hw_raw_request against the given uhid device,
957  * check that the program is called and prevents the
958  * call to uhid.
959  */
960 TEST_F(hid_bpf, test_hid_filter_raw_request_call)
961 {
962         const struct test_program progs[] = {
963                 { .name = "hid_test_filter_raw_request" },
964         };
965         __u8 buf[10] = {0};
966         int err;
967 
968         LOAD_PROGRAMS(progs);
969 
970         /* first check that we did not attach to device_event */
971 
972         /* inject one event */
973         buf[0] = 1;
974         buf[1] = 42;
975         uhid_send_event(_metadata, self->uhid_fd, buf, 6);
976 
977         /* read the data from hidraw */
978         memset(buf, 0, sizeof(buf));
979         err = read(self->hidraw_fd, buf, sizeof(buf));
980         ASSERT_EQ(err, 6) TH_LOG("read_hidraw");
981         ASSERT_EQ(buf[0], 1);
982         ASSERT_EQ(buf[1], 42);
983         ASSERT_EQ(buf[2], 0) TH_LOG("leftovers_from_previous_test");
984 
985         /* now check that our program is preventing hid_hw_raw_request() */
986 
987         /* emit hid_hw_raw_request from hidraw */
988         /* Get Feature */
989         memset(buf, 0, sizeof(buf));
990         buf[0] = 0x1; /* Report Number */
991         err = ioctl(self->hidraw_fd, HIDIOCGFEATURE(sizeof(buf)), buf);
992         ASSERT_LT(err, 0) TH_LOG("unexpected success while reading HIDIOCGFEATURE: %d", err);
993         ASSERT_EQ(errno, 20) TH_LOG("unexpected error code while reading HIDIOCGFEATURE: %d",
994                                     errno);
995 
996         /* remove our bpf program and check that we can now emit commands */
997 
998         /* detach the program */
999         detach_bpf(self);
1000 
1001         self->hidraw_fd = open_hidraw(self->dev_id);
1002         ASSERT_GE(self->hidraw_fd, 0) TH_LOG("open_hidraw");
1003 
1004         err = ioctl(self->hidraw_fd, HIDIOCGFEATURE(sizeof(buf)), buf);
1005         ASSERT_GE(err, 0) TH_LOG("error while reading HIDIOCGFEATURE: %d", err);
1006 }
1007 
1008 /*
1009  * Call hid_hw_raw_request against the given uhid device,
1010  * check that the program is called and can issue the call
1011  * to uhid and transform the answer.
1012  */
1013 TEST_F(hid_bpf, test_hid_change_raw_request_call)
1014 {
1015         const struct test_program progs[] = {
1016                 { .name = "hid_test_hidraw_raw_request" },
1017         };
1018         __u8 buf[10] = {0};
1019         int err;
1020 
1021         LOAD_PROGRAMS(progs);
1022 
1023         /* emit hid_hw_raw_request from hidraw */
1024         /* Get Feature */
1025         memset(buf, 0, sizeof(buf));
1026         buf[0] = 0x1; /* Report Number */
1027         err = ioctl(self->hidraw_fd, HIDIOCGFEATURE(sizeof(buf)), buf);
1028         ASSERT_EQ(err, 3) TH_LOG("unexpected returned size while reading HIDIOCGFEATURE: %d", err);
1029 
1030         ASSERT_EQ(buf[0], 2);
1031         ASSERT_EQ(buf[1], 3);
1032         ASSERT_EQ(buf[2], 4);
1033 }
1034 
1035 /*
1036  * Call hid_hw_raw_request against the given uhid device,
1037  * check that the program is not making infinite loops.
1038  */
1039 TEST_F(hid_bpf, test_hid_infinite_loop_raw_request_call)
1040 {
1041         const struct test_program progs[] = {
1042                 { .name = "hid_test_infinite_loop_raw_request" },
1043         };
1044         __u8 buf[10] = {0};
1045         int err;
1046 
1047         LOAD_PROGRAMS(progs);
1048 
1049         /* emit hid_hw_raw_request from hidraw */
1050         /* Get Feature */
1051         memset(buf, 0, sizeof(buf));
1052         buf[0] = 0x1; /* Report Number */
1053         err = ioctl(self->hidraw_fd, HIDIOCGFEATURE(sizeof(buf)), buf);
1054         ASSERT_EQ(err, 3) TH_LOG("unexpected returned size while reading HIDIOCGFEATURE: %d", err);
1055 }
1056 
1057 /*
1058  * Call hid_hw_output_report against the given uhid device,
1059  * check that the program is called and prevents the
1060  * call to uhid.
1061  */
1062 TEST_F(hid_bpf, test_hid_filter_output_report_call)
1063 {
1064         const struct test_program progs[] = {
1065                 { .name = "hid_test_filter_output_report" },
1066         };
1067         __u8 buf[10] = {0};
1068         int err;
1069 
1070         LOAD_PROGRAMS(progs);
1071 
1072         /* first check that we did not attach to device_event */
1073 
1074         /* inject one event */
1075         buf[0] = 1;
1076         buf[1] = 42;
1077         uhid_send_event(_metadata, self->uhid_fd, buf, 6);
1078 
1079         /* read the data from hidraw */
1080         memset(buf, 0, sizeof(buf));
1081         err = read(self->hidraw_fd, buf, sizeof(buf));
1082         ASSERT_EQ(err, 6) TH_LOG("read_hidraw");
1083         ASSERT_EQ(buf[0], 1);
1084         ASSERT_EQ(buf[1], 42);
1085         ASSERT_EQ(buf[2], 0) TH_LOG("leftovers_from_previous_test");
1086 
1087         /* now check that our program is preventing hid_hw_output_report() */
1088 
1089         buf[0] = 1; /* report ID */
1090         buf[1] = 2;
1091         buf[2] = 42;
1092 
1093         err = write(self->hidraw_fd, buf, 3);
1094         ASSERT_LT(err, 0) TH_LOG("unexpected success while sending hid_hw_output_report: %d", err);
1095         ASSERT_EQ(errno, 25) TH_LOG("unexpected error code while sending hid_hw_output_report: %d",
1096                                     errno);
1097 
1098         /* remove our bpf program and check that we can now emit commands */
1099 
1100         /* detach the program */
1101         detach_bpf(self);
1102 
1103         self->hidraw_fd = open_hidraw(self->dev_id);
1104         ASSERT_GE(self->hidraw_fd, 0) TH_LOG("open_hidraw");
1105 
1106         err = write(self->hidraw_fd, buf, 3);
1107         ASSERT_GE(err, 0) TH_LOG("error while sending hid_hw_output_report: %d", err);
1108 }
1109 
1110 /*
1111  * Call hid_hw_output_report against the given uhid device,
1112  * check that the program is called and can issue the call
1113  * to uhid and transform the answer.
1114  */
1115 TEST_F(hid_bpf, test_hid_change_output_report_call)
1116 {
1117         const struct test_program progs[] = {
1118                 { .name = "hid_test_hidraw_output_report" },
1119         };
1120         __u8 buf[10] = {0};
1121         int err;
1122 
1123         LOAD_PROGRAMS(progs);
1124 
1125         /* emit hid_hw_output_report from hidraw */
1126         buf[0] = 1; /* report ID */
1127         buf[1] = 2;
1128         buf[2] = 42;
1129 
1130         err = write(self->hidraw_fd, buf, 10);
1131         ASSERT_EQ(err, 2) TH_LOG("unexpected returned size while sending hid_hw_output_report: %d",
1132                                  err);
1133 }
1134 
1135 /*
1136  * Call hid_hw_output_report against the given uhid device,
1137  * check that the program is not making infinite loops.
1138  */
1139 TEST_F(hid_bpf, test_hid_infinite_loop_output_report_call)
1140 {
1141         const struct test_program progs[] = {
1142                 { .name = "hid_test_infinite_loop_output_report" },
1143         };
1144         __u8 buf[10] = {0};
1145         int err;
1146 
1147         LOAD_PROGRAMS(progs);
1148 
1149         /* emit hid_hw_output_report from hidraw */
1150         buf[0] = 1; /* report ID */
1151         buf[1] = 2;
1152         buf[2] = 42;
1153 
1154         err = write(self->hidraw_fd, buf, 8);
1155         ASSERT_EQ(err, 2) TH_LOG("unexpected returned size while sending hid_hw_output_report: %d",
1156                                  err);
1157 }
1158 
1159 /*
1160  * Attach hid_multiply_event_wq to the given uhid device,
1161  * retrieve and open the matching hidraw node,
1162  * inject one event in the uhid device,
1163  * check that the program sees it and can add extra data
1164  */
1165 TEST_F(hid_bpf, test_multiply_events_wq)
1166 {
1167         const struct test_program progs[] = {
1168                 { .name = "hid_test_multiply_events_wq" },
1169         };
1170         __u8 buf[10] = {0};
1171         int err;
1172 
1173         LOAD_PROGRAMS(progs);
1174 
1175         /* inject one event */
1176         buf[0] = 1;
1177         buf[1] = 42;
1178         uhid_send_event(_metadata, self->uhid_fd, buf, 6);
1179 
1180         /* read the data from hidraw */
1181         memset(buf, 0, sizeof(buf));
1182         err = read(self->hidraw_fd, buf, sizeof(buf));
1183         ASSERT_EQ(err, 6) TH_LOG("read_hidraw");
1184         ASSERT_EQ(buf[0], 1);
1185         ASSERT_EQ(buf[1], 47);
1186 
1187         usleep(100000);
1188 
1189         /* read the data from hidraw */
1190         memset(buf, 0, sizeof(buf));
1191         err = read(self->hidraw_fd, buf, sizeof(buf));
1192         ASSERT_EQ(err, 9) TH_LOG("read_hidraw");
1193         ASSERT_EQ(buf[0], 2);
1194         ASSERT_EQ(buf[1], 3);
1195 }
1196 
1197 /*
1198  * Attach hid_multiply_event to the given uhid device,
1199  * retrieve and open the matching hidraw node,
1200  * inject one event in the uhid device,
1201  * check that the program sees it and can add extra data
1202  */
1203 TEST_F(hid_bpf, test_multiply_events)
1204 {
1205         const struct test_program progs[] = {
1206                 { .name = "hid_test_multiply_events" },
1207         };
1208         __u8 buf[10] = {0};
1209         int err;
1210 
1211         LOAD_PROGRAMS(progs);
1212 
1213         /* inject one event */
1214         buf[0] = 1;
1215         buf[1] = 42;
1216         uhid_send_event(_metadata, self->uhid_fd, buf, 6);
1217 
1218         /* read the data from hidraw */
1219         memset(buf, 0, sizeof(buf));
1220         err = read(self->hidraw_fd, buf, sizeof(buf));
1221         ASSERT_EQ(err, 9) TH_LOG("read_hidraw");
1222         ASSERT_EQ(buf[0], 2);
1223         ASSERT_EQ(buf[1], 47);
1224 
1225         /* read the data from hidraw */
1226         memset(buf, 0, sizeof(buf));
1227         err = read(self->hidraw_fd, buf, sizeof(buf));
1228         ASSERT_EQ(err, 9) TH_LOG("read_hidraw");
1229         ASSERT_EQ(buf[0], 2);
1230         ASSERT_EQ(buf[1], 52);
1231 }
1232 
1233 /*
1234  * Call hid_bpf_input_report against the given uhid device,
1235  * check that the program is not making infinite loops.
1236  */
1237 TEST_F(hid_bpf, test_hid_infinite_loop_input_report_call)
1238 {
1239         const struct test_program progs[] = {
1240                 { .name = "hid_test_infinite_loop_input_report" },
1241         };
1242         __u8 buf[10] = {0};
1243         int err;
1244 
1245         LOAD_PROGRAMS(progs);
1246 
1247         /* emit hid_hw_output_report from hidraw */
1248         buf[0] = 1; /* report ID */
1249         buf[1] = 2;
1250         buf[2] = 42;
1251 
1252         uhid_send_event(_metadata, self->uhid_fd, buf, 6);
1253 
1254         /* read the data from hidraw */
1255         memset(buf, 0, sizeof(buf));
1256         err = read(self->hidraw_fd, buf, sizeof(buf));
1257         ASSERT_EQ(err, 6) TH_LOG("read_hidraw");
1258         ASSERT_EQ(buf[0], 1);
1259         ASSERT_EQ(buf[1], 3);
1260 
1261         /* read the data from hidraw: hid_bpf_try_input_report should work exactly one time */
1262         memset(buf, 0, sizeof(buf));
1263         err = read(self->hidraw_fd, buf, sizeof(buf));
1264         ASSERT_EQ(err, 6) TH_LOG("read_hidraw");
1265         ASSERT_EQ(buf[0], 1);
1266         ASSERT_EQ(buf[1], 4);
1267 
1268         /* read the data from hidraw: there should be none */
1269         memset(buf, 0, sizeof(buf));
1270         err = read(self->hidraw_fd, buf, sizeof(buf));
1271         ASSERT_EQ(err, -1) TH_LOG("read_hidraw");
1272 }
1273 
1274 /*
1275  * Attach hid_insert{0,1,2} to the given uhid device,
1276  * retrieve and open the matching hidraw node,
1277  * inject one event in the uhid device,
1278  * check that the programs have been inserted in the correct order.
1279  */
1280 TEST_F(hid_bpf, test_hid_attach_flags)
1281 {
1282         const struct test_program progs[] = {
1283                 {
1284                         .name = "hid_test_insert2",
1285                         .insert_head = 0,
1286                 },
1287                 {
1288                         .name = "hid_test_insert1",
1289                         .insert_head = 1,
1290                 },
1291                 {
1292                         .name = "hid_test_insert3",
1293                         .insert_head = 0,
1294                 },
1295         };
1296         __u8 buf[10] = {0};
1297         int err;
1298 
1299         LOAD_PROGRAMS(progs);
1300 
1301         /* inject one event */
1302         buf[0] = 1;
1303         uhid_send_event(_metadata, self->uhid_fd, buf, 6);
1304 
1305         /* read the data from hidraw */
1306         memset(buf, 0, sizeof(buf));
1307         err = read(self->hidraw_fd, buf, sizeof(buf));
1308         ASSERT_EQ(err, 6) TH_LOG("read_hidraw");
1309         ASSERT_EQ(buf[1], 1);
1310         ASSERT_EQ(buf[2], 2);
1311         ASSERT_EQ(buf[3], 3);
1312 }
1313 
1314 /*
1315  * Attach hid_rdesc_fixup to the given uhid device,
1316  * retrieve and open the matching hidraw node,
1317  * check that the hidraw report descriptor has been updated.
1318  */
1319 TEST_F(hid_bpf, test_rdesc_fixup)
1320 {
1321         struct hidraw_report_descriptor rpt_desc = {0};
1322         const struct test_program progs[] = {
1323                 { .name = "hid_rdesc_fixup" },
1324         };
1325         int err, desc_size;
1326 
1327         LOAD_PROGRAMS(progs);
1328 
1329         /* check that hid_rdesc_fixup() was executed */
1330         ASSERT_EQ(self->skel->data->callback2_check, 0x21);
1331 
1332         /* read the exposed report descriptor from hidraw */
1333         err = ioctl(self->hidraw_fd, HIDIOCGRDESCSIZE, &desc_size);
1334         ASSERT_GE(err, 0) TH_LOG("error while reading HIDIOCGRDESCSIZE: %d", err);
1335 
1336         /* ensure the new size of the rdesc is bigger than the old one */
1337         ASSERT_GT(desc_size, sizeof(rdesc));
1338 
1339         rpt_desc.size = desc_size;
1340         err = ioctl(self->hidraw_fd, HIDIOCGRDESC, &rpt_desc);
1341         ASSERT_GE(err, 0) TH_LOG("error while reading HIDIOCGRDESC: %d", err);
1342 
1343         ASSERT_EQ(rpt_desc.value[4], 0x42);
1344 }
1345 
1346 static int libbpf_print_fn(enum libbpf_print_level level,
1347                            const char *format, va_list args)
1348 {
1349         char buf[1024];
1350 
1351         if (level == LIBBPF_DEBUG)
1352                 return 0;
1353 
1354         snprintf(buf, sizeof(buf), "# %s", format);
1355 
1356         vfprintf(stdout, buf, args);
1357         return 0;
1358 }
1359 
1360 static void __attribute__((constructor)) __constructor_order_last(void)
1361 {
1362         if (!__constructor_order)
1363                 __constructor_order = _CONSTRUCTOR_ORDER_BACKWARD;
1364 }
1365 
1366 int main(int argc, char **argv)
1367 {
1368         /* Use libbpf 1.0 API mode */
1369         libbpf_set_strict_mode(LIBBPF_STRICT_ALL);
1370         libbpf_set_print(libbpf_print_fn);
1371 
1372         return test_harness_run(argc, argv);
1373 }
1374 

~ [ source navigation ] ~ [ diff markup ] ~ [ identifier search ] ~

kernel.org | git.kernel.org | LWN.net | Project Home | SVN repository | Mail admin

Linux® is a registered trademark of Linus Torvalds in the United States and other countries.
TOMOYO® is a registered trademark of NTT DATA CORPORATION.

sflogo.php