xref: /linux/tools/testing/selftests/hid/hid_bpf.c (revision ae22a94997b8a03dcb3c922857c203246711f9d4)
1 // SPDX-License-Identifier: GPL-2.0
2 /* Copyright (c) 2022 Red Hat */
3 #include "hid.skel.h"
4 
5 #include "../kselftest_harness.h"
6 
7 #include <bpf/bpf.h>
8 #include <fcntl.h>
9 #include <fnmatch.h>
10 #include <dirent.h>
11 #include <poll.h>
12 #include <pthread.h>
13 #include <stdbool.h>
14 #include <linux/hidraw.h>
15 #include <linux/uhid.h>
16 
17 #define SHOW_UHID_DEBUG 0
18 
19 static unsigned char rdesc[] = {
20 	0x06, 0x00, 0xff,	/* Usage Page (Vendor Defined Page 1) */
21 	0x09, 0x21,		/* Usage (Vendor Usage 0x21) */
22 	0xa1, 0x01,		/* COLLECTION (Application) */
23 	0x09, 0x01,			/* Usage (Vendor Usage 0x01) */
24 	0xa1, 0x00,			/* COLLECTION (Physical) */
25 	0x85, 0x02,				/* REPORT_ID (2) */
26 	0x19, 0x01,				/* USAGE_MINIMUM (1) */
27 	0x29, 0x08,				/* USAGE_MAXIMUM (3) */
28 	0x15, 0x00,				/* LOGICAL_MINIMUM (0) */
29 	0x25, 0xff,				/* LOGICAL_MAXIMUM (255) */
30 	0x95, 0x08,				/* REPORT_COUNT (8) */
31 	0x75, 0x08,				/* REPORT_SIZE (8) */
32 	0x81, 0x02,				/* INPUT (Data,Var,Abs) */
33 	0xc0,				/* END_COLLECTION */
34 	0x09, 0x01,			/* Usage (Vendor Usage 0x01) */
35 	0xa1, 0x00,			/* COLLECTION (Physical) */
36 	0x85, 0x01,				/* REPORT_ID (1) */
37 	0x06, 0x00, 0xff,			/* Usage Page (Vendor Defined Page 1) */
38 	0x19, 0x01,				/* USAGE_MINIMUM (1) */
39 	0x29, 0x03,				/* USAGE_MAXIMUM (3) */
40 	0x15, 0x00,				/* LOGICAL_MINIMUM (0) */
41 	0x25, 0x01,				/* LOGICAL_MAXIMUM (1) */
42 	0x95, 0x03,				/* REPORT_COUNT (3) */
43 	0x75, 0x01,				/* REPORT_SIZE (1) */
44 	0x81, 0x02,				/* INPUT (Data,Var,Abs) */
45 	0x95, 0x01,				/* REPORT_COUNT (1) */
46 	0x75, 0x05,				/* REPORT_SIZE (5) */
47 	0x81, 0x01,				/* INPUT (Cnst,Var,Abs) */
48 	0x05, 0x01,				/* USAGE_PAGE (Generic Desktop) */
49 	0x09, 0x30,				/* USAGE (X) */
50 	0x09, 0x31,				/* USAGE (Y) */
51 	0x15, 0x81,				/* LOGICAL_MINIMUM (-127) */
52 	0x25, 0x7f,				/* LOGICAL_MAXIMUM (127) */
53 	0x75, 0x10,				/* REPORT_SIZE (16) */
54 	0x95, 0x02,				/* REPORT_COUNT (2) */
55 	0x81, 0x06,				/* INPUT (Data,Var,Rel) */
56 
57 	0x06, 0x00, 0xff,			/* Usage Page (Vendor Defined Page 1) */
58 	0x19, 0x01,				/* USAGE_MINIMUM (1) */
59 	0x29, 0x03,				/* USAGE_MAXIMUM (3) */
60 	0x15, 0x00,				/* LOGICAL_MINIMUM (0) */
61 	0x25, 0x01,				/* LOGICAL_MAXIMUM (1) */
62 	0x95, 0x03,				/* REPORT_COUNT (3) */
63 	0x75, 0x01,				/* REPORT_SIZE (1) */
64 	0x91, 0x02,				/* Output (Data,Var,Abs) */
65 	0x95, 0x01,				/* REPORT_COUNT (1) */
66 	0x75, 0x05,				/* REPORT_SIZE (5) */
67 	0x91, 0x01,				/* Output (Cnst,Var,Abs) */
68 
69 	0x06, 0x00, 0xff,			/* Usage Page (Vendor Defined Page 1) */
70 	0x19, 0x06,				/* USAGE_MINIMUM (6) */
71 	0x29, 0x08,				/* USAGE_MAXIMUM (8) */
72 	0x15, 0x00,				/* LOGICAL_MINIMUM (0) */
73 	0x25, 0x01,				/* LOGICAL_MAXIMUM (1) */
74 	0x95, 0x03,				/* REPORT_COUNT (3) */
75 	0x75, 0x01,				/* REPORT_SIZE (1) */
76 	0xb1, 0x02,				/* Feature (Data,Var,Abs) */
77 	0x95, 0x01,				/* REPORT_COUNT (1) */
78 	0x75, 0x05,				/* REPORT_SIZE (5) */
79 	0x91, 0x01,				/* Output (Cnst,Var,Abs) */
80 
81 	0xc0,				/* END_COLLECTION */
82 	0xc0,			/* END_COLLECTION */
83 };
84 
85 static __u8 feature_data[] = { 1, 2 };
86 
87 struct attach_prog_args {
88 	int prog_fd;
89 	unsigned int hid;
90 	int retval;
91 	int insert_head;
92 };
93 
94 struct hid_hw_request_syscall_args {
95 	__u8 data[10];
96 	unsigned int hid;
97 	int retval;
98 	size_t size;
99 	enum hid_report_type type;
100 	__u8 request_type;
101 };
102 
103 #define ASSERT_OK(data) ASSERT_FALSE(data)
104 #define ASSERT_OK_PTR(ptr) ASSERT_NE(NULL, ptr)
105 
106 #define UHID_LOG(fmt, ...) do { \
107 	if (SHOW_UHID_DEBUG) \
108 		TH_LOG(fmt, ##__VA_ARGS__); \
109 } while (0)
110 
111 static pthread_mutex_t uhid_started_mtx = PTHREAD_MUTEX_INITIALIZER;
112 static pthread_cond_t uhid_started = PTHREAD_COND_INITIALIZER;
113 
114 /* no need to protect uhid_stopped, only one thread accesses it */
115 static bool uhid_stopped;
116 
117 static int uhid_write(struct __test_metadata *_metadata, int fd, const struct uhid_event *ev)
118 {
119 	ssize_t ret;
120 
121 	ret = write(fd, ev, sizeof(*ev));
122 	if (ret < 0) {
123 		TH_LOG("Cannot write to uhid: %m");
124 		return -errno;
125 	} else if (ret != sizeof(*ev)) {
126 		TH_LOG("Wrong size written to uhid: %zd != %zu",
127 			ret, sizeof(ev));
128 		return -EFAULT;
129 	} else {
130 		return 0;
131 	}
132 }
133 
134 static int uhid_create(struct __test_metadata *_metadata, int fd, int rand_nb)
135 {
136 	struct uhid_event ev;
137 	char buf[25];
138 
139 	sprintf(buf, "test-uhid-device-%d", rand_nb);
140 
141 	memset(&ev, 0, sizeof(ev));
142 	ev.type = UHID_CREATE;
143 	strcpy((char *)ev.u.create.name, buf);
144 	ev.u.create.rd_data = rdesc;
145 	ev.u.create.rd_size = sizeof(rdesc);
146 	ev.u.create.bus = BUS_USB;
147 	ev.u.create.vendor = 0x0001;
148 	ev.u.create.product = 0x0a37;
149 	ev.u.create.version = 0;
150 	ev.u.create.country = 0;
151 
152 	sprintf(buf, "%d", rand_nb);
153 	strcpy((char *)ev.u.create.phys, buf);
154 
155 	return uhid_write(_metadata, fd, &ev);
156 }
157 
158 static void uhid_destroy(struct __test_metadata *_metadata, int fd)
159 {
160 	struct uhid_event ev;
161 
162 	memset(&ev, 0, sizeof(ev));
163 	ev.type = UHID_DESTROY;
164 
165 	uhid_write(_metadata, fd, &ev);
166 }
167 
168 static int uhid_event(struct __test_metadata *_metadata, int fd)
169 {
170 	struct uhid_event ev, answer;
171 	ssize_t ret;
172 
173 	memset(&ev, 0, sizeof(ev));
174 	ret = read(fd, &ev, sizeof(ev));
175 	if (ret == 0) {
176 		UHID_LOG("Read HUP on uhid-cdev");
177 		return -EFAULT;
178 	} else if (ret < 0) {
179 		UHID_LOG("Cannot read uhid-cdev: %m");
180 		return -errno;
181 	} else if (ret != sizeof(ev)) {
182 		UHID_LOG("Invalid size read from uhid-dev: %zd != %zu",
183 			ret, sizeof(ev));
184 		return -EFAULT;
185 	}
186 
187 	switch (ev.type) {
188 	case UHID_START:
189 		pthread_mutex_lock(&uhid_started_mtx);
190 		pthread_cond_signal(&uhid_started);
191 		pthread_mutex_unlock(&uhid_started_mtx);
192 
193 		UHID_LOG("UHID_START from uhid-dev");
194 		break;
195 	case UHID_STOP:
196 		uhid_stopped = true;
197 
198 		UHID_LOG("UHID_STOP from uhid-dev");
199 		break;
200 	case UHID_OPEN:
201 		UHID_LOG("UHID_OPEN from uhid-dev");
202 		break;
203 	case UHID_CLOSE:
204 		UHID_LOG("UHID_CLOSE from uhid-dev");
205 		break;
206 	case UHID_OUTPUT:
207 		UHID_LOG("UHID_OUTPUT from uhid-dev");
208 		break;
209 	case UHID_GET_REPORT:
210 		UHID_LOG("UHID_GET_REPORT from uhid-dev");
211 
212 		answer.type = UHID_GET_REPORT_REPLY;
213 		answer.u.get_report_reply.id = ev.u.get_report.id;
214 		answer.u.get_report_reply.err = ev.u.get_report.rnum == 1 ? 0 : -EIO;
215 		answer.u.get_report_reply.size = sizeof(feature_data);
216 		memcpy(answer.u.get_report_reply.data, feature_data, sizeof(feature_data));
217 
218 		uhid_write(_metadata, fd, &answer);
219 
220 		break;
221 	case UHID_SET_REPORT:
222 		UHID_LOG("UHID_SET_REPORT from uhid-dev");
223 		break;
224 	default:
225 		TH_LOG("Invalid event from uhid-dev: %u", ev.type);
226 	}
227 
228 	return 0;
229 }
230 
231 struct uhid_thread_args {
232 	int fd;
233 	struct __test_metadata *_metadata;
234 };
235 static void *uhid_read_events_thread(void *arg)
236 {
237 	struct uhid_thread_args *args = (struct uhid_thread_args *)arg;
238 	struct __test_metadata *_metadata = args->_metadata;
239 	struct pollfd pfds[1];
240 	int fd = args->fd;
241 	int ret = 0;
242 
243 	pfds[0].fd = fd;
244 	pfds[0].events = POLLIN;
245 
246 	uhid_stopped = false;
247 
248 	while (!uhid_stopped) {
249 		ret = poll(pfds, 1, 100);
250 		if (ret < 0) {
251 			TH_LOG("Cannot poll for fds: %m");
252 			break;
253 		}
254 		if (pfds[0].revents & POLLIN) {
255 			ret = uhid_event(_metadata, fd);
256 			if (ret)
257 				break;
258 		}
259 	}
260 
261 	return (void *)(long)ret;
262 }
263 
264 static int uhid_start_listener(struct __test_metadata *_metadata, pthread_t *tid, int uhid_fd)
265 {
266 	struct uhid_thread_args args = {
267 		.fd = uhid_fd,
268 		._metadata = _metadata,
269 	};
270 	int err;
271 
272 	pthread_mutex_lock(&uhid_started_mtx);
273 	err = pthread_create(tid, NULL, uhid_read_events_thread, (void *)&args);
274 	ASSERT_EQ(0, err) {
275 		TH_LOG("Could not start the uhid thread: %d", err);
276 		pthread_mutex_unlock(&uhid_started_mtx);
277 		close(uhid_fd);
278 		return -EIO;
279 	}
280 	pthread_cond_wait(&uhid_started, &uhid_started_mtx);
281 	pthread_mutex_unlock(&uhid_started_mtx);
282 
283 	return 0;
284 }
285 
286 static int uhid_send_event(struct __test_metadata *_metadata, int fd, __u8 *buf, size_t size)
287 {
288 	struct uhid_event ev;
289 
290 	if (size > sizeof(ev.u.input.data))
291 		return -E2BIG;
292 
293 	memset(&ev, 0, sizeof(ev));
294 	ev.type = UHID_INPUT2;
295 	ev.u.input2.size = size;
296 
297 	memcpy(ev.u.input2.data, buf, size);
298 
299 	return uhid_write(_metadata, fd, &ev);
300 }
301 
302 static int setup_uhid(struct __test_metadata *_metadata, int rand_nb)
303 {
304 	int fd;
305 	const char *path = "/dev/uhid";
306 	int ret;
307 
308 	fd = open(path, O_RDWR | O_CLOEXEC);
309 	ASSERT_GE(fd, 0) TH_LOG("open uhid-cdev failed; %d", fd);
310 
311 	ret = uhid_create(_metadata, fd, rand_nb);
312 	ASSERT_EQ(0, ret) {
313 		TH_LOG("create uhid device failed: %d", ret);
314 		close(fd);
315 	}
316 
317 	return fd;
318 }
319 
320 static bool match_sysfs_device(int dev_id, const char *workdir, struct dirent *dir)
321 {
322 	const char *target = "0003:0001:0A37.*";
323 	char phys[512];
324 	char uevent[1024];
325 	char temp[512];
326 	int fd, nread;
327 	bool found = false;
328 
329 	if (fnmatch(target, dir->d_name, 0))
330 		return false;
331 
332 	/* we found the correct VID/PID, now check for phys */
333 	sprintf(uevent, "%s/%s/uevent", workdir, dir->d_name);
334 
335 	fd = open(uevent, O_RDONLY | O_NONBLOCK);
336 	if (fd < 0)
337 		return false;
338 
339 	sprintf(phys, "PHYS=%d", dev_id);
340 
341 	nread = read(fd, temp, ARRAY_SIZE(temp));
342 	if (nread > 0 && (strstr(temp, phys)) != NULL)
343 		found = true;
344 
345 	close(fd);
346 
347 	return found;
348 }
349 
350 static int get_hid_id(int dev_id)
351 {
352 	const char *workdir = "/sys/devices/virtual/misc/uhid";
353 	const char *str_id;
354 	DIR *d;
355 	struct dirent *dir;
356 	int found = -1, attempts = 3;
357 
358 	/* it would be nice to be able to use nftw, but the no_alu32 target doesn't support it */
359 
360 	while (found < 0 && attempts > 0) {
361 		attempts--;
362 		d = opendir(workdir);
363 		if (d) {
364 			while ((dir = readdir(d)) != NULL) {
365 				if (!match_sysfs_device(dev_id, workdir, dir))
366 					continue;
367 
368 				str_id = dir->d_name + sizeof("0003:0001:0A37.");
369 				found = (int)strtol(str_id, NULL, 16);
370 
371 				break;
372 			}
373 			closedir(d);
374 		}
375 		if (found < 0)
376 			usleep(100000);
377 	}
378 
379 	return found;
380 }
381 
382 static int get_hidraw(int dev_id)
383 {
384 	const char *workdir = "/sys/devices/virtual/misc/uhid";
385 	char sysfs[1024];
386 	DIR *d, *subd;
387 	struct dirent *dir, *subdir;
388 	int i, found = -1;
389 
390 	/* retry 5 times in case the system is loaded */
391 	for (i = 5; i > 0; i--) {
392 		usleep(10);
393 		d = opendir(workdir);
394 
395 		if (!d)
396 			continue;
397 
398 		while ((dir = readdir(d)) != NULL) {
399 			if (!match_sysfs_device(dev_id, workdir, dir))
400 				continue;
401 
402 			sprintf(sysfs, "%s/%s/hidraw", workdir, dir->d_name);
403 
404 			subd = opendir(sysfs);
405 			if (!subd)
406 				continue;
407 
408 			while ((subdir = readdir(subd)) != NULL) {
409 				if (fnmatch("hidraw*", subdir->d_name, 0))
410 					continue;
411 
412 				found = atoi(subdir->d_name + strlen("hidraw"));
413 			}
414 
415 			closedir(subd);
416 
417 			if (found > 0)
418 				break;
419 		}
420 		closedir(d);
421 	}
422 
423 	return found;
424 }
425 
426 static int open_hidraw(int dev_id)
427 {
428 	int hidraw_number;
429 	char hidraw_path[64] = { 0 };
430 
431 	hidraw_number = get_hidraw(dev_id);
432 	if (hidraw_number < 0)
433 		return hidraw_number;
434 
435 	/* open hidraw node to check the other side of the pipe */
436 	sprintf(hidraw_path, "/dev/hidraw%d", hidraw_number);
437 	return open(hidraw_path, O_RDWR | O_NONBLOCK);
438 }
439 
440 FIXTURE(hid_bpf) {
441 	int dev_id;
442 	int uhid_fd;
443 	int hidraw_fd;
444 	int hid_id;
445 	pthread_t tid;
446 	struct hid *skel;
447 	int hid_links[3]; /* max number of programs loaded in a single test */
448 };
449 static void detach_bpf(FIXTURE_DATA(hid_bpf) * self)
450 {
451 	int i;
452 
453 	if (self->hidraw_fd)
454 		close(self->hidraw_fd);
455 	self->hidraw_fd = 0;
456 
457 	for (i = 0; i < ARRAY_SIZE(self->hid_links); i++) {
458 		if (self->hid_links[i])
459 			close(self->hid_links[i]);
460 	}
461 
462 	hid__destroy(self->skel);
463 	self->skel = NULL;
464 }
465 
466 FIXTURE_TEARDOWN(hid_bpf) {
467 	void *uhid_err;
468 
469 	uhid_destroy(_metadata, self->uhid_fd);
470 
471 	detach_bpf(self);
472 	pthread_join(self->tid, &uhid_err);
473 }
474 #define TEARDOWN_LOG(fmt, ...) do { \
475 	TH_LOG(fmt, ##__VA_ARGS__); \
476 	hid_bpf_teardown(_metadata, self, variant); \
477 } while (0)
478 
479 FIXTURE_SETUP(hid_bpf)
480 {
481 	time_t t;
482 	int err;
483 
484 	/* initialize random number generator */
485 	srand((unsigned int)time(&t));
486 
487 	self->dev_id = rand() % 1024;
488 
489 	self->uhid_fd = setup_uhid(_metadata, self->dev_id);
490 
491 	/* locate the uev, self, variant);ent file of the created device */
492 	self->hid_id = get_hid_id(self->dev_id);
493 	ASSERT_GT(self->hid_id, 0)
494 		TEARDOWN_LOG("Could not locate uhid device id: %d", self->hid_id);
495 
496 	err = uhid_start_listener(_metadata, &self->tid, self->uhid_fd);
497 	ASSERT_EQ(0, err) TEARDOWN_LOG("could not start udev listener: %d", err);
498 }
499 
500 struct test_program {
501 	const char *name;
502 	int insert_head;
503 };
504 #define LOAD_PROGRAMS(progs) \
505 	load_programs(progs, ARRAY_SIZE(progs), _metadata, self, variant)
506 #define LOAD_BPF \
507 	load_programs(NULL, 0, _metadata, self, variant)
508 static void load_programs(const struct test_program programs[],
509 			  const size_t progs_count,
510 			  struct __test_metadata *_metadata,
511 			  FIXTURE_DATA(hid_bpf) * self,
512 			  const FIXTURE_VARIANT(hid_bpf) * variant)
513 {
514 	int attach_fd, err = -EINVAL;
515 	struct attach_prog_args args = {
516 		.retval = -1,
517 	};
518 	DECLARE_LIBBPF_OPTS(bpf_test_run_opts, tattr,
519 			    .ctx_in = &args,
520 			    .ctx_size_in = sizeof(args),
521 	);
522 
523 	ASSERT_LE(progs_count, ARRAY_SIZE(self->hid_links))
524 		TH_LOG("too many programs are to be loaded");
525 
526 	/* open the bpf file */
527 	self->skel = hid__open();
528 	ASSERT_OK_PTR(self->skel) TEARDOWN_LOG("Error while calling hid__open");
529 
530 	for (int i = 0; i < progs_count; i++) {
531 		struct bpf_program *prog;
532 
533 		prog = bpf_object__find_program_by_name(*self->skel->skeleton->obj,
534 							programs[i].name);
535 		ASSERT_OK_PTR(prog) TH_LOG("can not find program by name '%s'", programs[i].name);
536 
537 		bpf_program__set_autoload(prog, true);
538 	}
539 
540 	err = hid__load(self->skel);
541 	ASSERT_OK(err) TH_LOG("hid_skel_load failed: %d", err);
542 
543 	attach_fd = bpf_program__fd(self->skel->progs.attach_prog);
544 	ASSERT_GE(attach_fd, 0) TH_LOG("locate attach_prog: %d", attach_fd);
545 
546 	for (int i = 0; i < progs_count; i++) {
547 		struct bpf_program *prog;
548 
549 		prog = bpf_object__find_program_by_name(*self->skel->skeleton->obj,
550 							programs[i].name);
551 		ASSERT_OK_PTR(prog) TH_LOG("can not find program by name '%s'", programs[i].name);
552 
553 		args.prog_fd = bpf_program__fd(prog);
554 		args.hid = self->hid_id;
555 		args.insert_head = programs[i].insert_head;
556 		err = bpf_prog_test_run_opts(attach_fd, &tattr);
557 		ASSERT_GE(args.retval, 0)
558 			TH_LOG("attach_hid(%s): %d", programs[i].name, args.retval);
559 
560 		self->hid_links[i] = args.retval;
561 	}
562 
563 	self->hidraw_fd = open_hidraw(self->dev_id);
564 	ASSERT_GE(self->hidraw_fd, 0) TH_LOG("open_hidraw");
565 }
566 
567 /*
568  * A simple test to see if the fixture is working fine.
569  * If this fails, none of the other tests will pass.
570  */
571 TEST_F(hid_bpf, test_create_uhid)
572 {
573 }
574 
575 /*
576  * Attach hid_first_event to the given uhid device,
577  * retrieve and open the matching hidraw node,
578  * inject one event in the uhid device,
579  * check that the program sees it and can change the data
580  */
581 TEST_F(hid_bpf, raw_event)
582 {
583 	const struct test_program progs[] = {
584 		{ .name = "hid_first_event" },
585 	};
586 	__u8 buf[10] = {0};
587 	int err;
588 
589 	LOAD_PROGRAMS(progs);
590 
591 	/* check that the program is correctly loaded */
592 	ASSERT_EQ(self->skel->data->callback_check, 52) TH_LOG("callback_check1");
593 	ASSERT_EQ(self->skel->data->callback2_check, 52) TH_LOG("callback2_check1");
594 
595 	/* inject one event */
596 	buf[0] = 1;
597 	buf[1] = 42;
598 	uhid_send_event(_metadata, self->uhid_fd, buf, 6);
599 
600 	/* check that hid_first_event() was executed */
601 	ASSERT_EQ(self->skel->data->callback_check, 42) TH_LOG("callback_check1");
602 
603 	/* read the data from hidraw */
604 	memset(buf, 0, sizeof(buf));
605 	err = read(self->hidraw_fd, buf, sizeof(buf));
606 	ASSERT_EQ(err, 6) TH_LOG("read_hidraw");
607 	ASSERT_EQ(buf[0], 1);
608 	ASSERT_EQ(buf[2], 47);
609 
610 	/* inject another event */
611 	memset(buf, 0, sizeof(buf));
612 	buf[0] = 1;
613 	buf[1] = 47;
614 	uhid_send_event(_metadata, self->uhid_fd, buf, 6);
615 
616 	/* check that hid_first_event() was executed */
617 	ASSERT_EQ(self->skel->data->callback_check, 47) TH_LOG("callback_check1");
618 
619 	/* read the data from hidraw */
620 	memset(buf, 0, sizeof(buf));
621 	err = read(self->hidraw_fd, buf, sizeof(buf));
622 	ASSERT_EQ(err, 6) TH_LOG("read_hidraw");
623 	ASSERT_EQ(buf[2], 52);
624 }
625 
626 /*
627  * Ensures that we can attach/detach programs
628  */
629 TEST_F(hid_bpf, test_attach_detach)
630 {
631 	const struct test_program progs[] = {
632 		{ .name = "hid_first_event" },
633 		{ .name = "hid_second_event" },
634 	};
635 	__u8 buf[10] = {0};
636 	int err, link;
637 
638 	LOAD_PROGRAMS(progs);
639 
640 	link = self->hid_links[0];
641 	ASSERT_GT(link, 0) TH_LOG("HID-BPF link not created");
642 
643 	/* inject one event */
644 	buf[0] = 1;
645 	buf[1] = 42;
646 	uhid_send_event(_metadata, self->uhid_fd, buf, 6);
647 
648 	/* read the data from hidraw */
649 	memset(buf, 0, sizeof(buf));
650 	err = read(self->hidraw_fd, buf, sizeof(buf));
651 	ASSERT_EQ(err, 6) TH_LOG("read_hidraw");
652 	ASSERT_EQ(buf[0], 1);
653 	ASSERT_EQ(buf[2], 47);
654 
655 	/* make sure both programs are run */
656 	ASSERT_EQ(buf[3], 52);
657 
658 	/* pin the first program and immediately unpin it */
659 #define PIN_PATH "/sys/fs/bpf/hid_first_event"
660 	err = bpf_obj_pin(link, PIN_PATH);
661 	ASSERT_OK(err) TH_LOG("error while calling bpf_obj_pin");
662 	remove(PIN_PATH);
663 #undef PIN_PATH
664 	usleep(100000);
665 
666 	/* detach the program */
667 	detach_bpf(self);
668 
669 	self->hidraw_fd = open_hidraw(self->dev_id);
670 	ASSERT_GE(self->hidraw_fd, 0) TH_LOG("open_hidraw");
671 
672 	/* inject another event */
673 	memset(buf, 0, sizeof(buf));
674 	buf[0] = 1;
675 	buf[1] = 47;
676 	uhid_send_event(_metadata, self->uhid_fd, buf, 6);
677 
678 	/* read the data from hidraw */
679 	memset(buf, 0, sizeof(buf));
680 	err = read(self->hidraw_fd, buf, sizeof(buf));
681 	ASSERT_EQ(err, 6) TH_LOG("read_hidraw_no_bpf");
682 	ASSERT_EQ(buf[0], 1);
683 	ASSERT_EQ(buf[1], 47);
684 	ASSERT_EQ(buf[2], 0);
685 	ASSERT_EQ(buf[3], 0);
686 
687 	/* re-attach our program */
688 
689 	LOAD_PROGRAMS(progs);
690 
691 	/* inject one event */
692 	memset(buf, 0, sizeof(buf));
693 	buf[0] = 1;
694 	buf[1] = 42;
695 	uhid_send_event(_metadata, self->uhid_fd, buf, 6);
696 
697 	/* read the data from hidraw */
698 	memset(buf, 0, sizeof(buf));
699 	err = read(self->hidraw_fd, buf, sizeof(buf));
700 	ASSERT_EQ(err, 6) TH_LOG("read_hidraw");
701 	ASSERT_EQ(buf[0], 1);
702 	ASSERT_EQ(buf[2], 47);
703 	ASSERT_EQ(buf[3], 52);
704 }
705 
706 /*
707  * Attach hid_change_report_id to the given uhid device,
708  * retrieve and open the matching hidraw node,
709  * inject one event in the uhid device,
710  * check that the program sees it and can change the data
711  */
712 TEST_F(hid_bpf, test_hid_change_report)
713 {
714 	const struct test_program progs[] = {
715 		{ .name = "hid_change_report_id" },
716 	};
717 	__u8 buf[10] = {0};
718 	int err;
719 
720 	LOAD_PROGRAMS(progs);
721 
722 	/* inject one event */
723 	buf[0] = 1;
724 	buf[1] = 42;
725 	uhid_send_event(_metadata, self->uhid_fd, buf, 6);
726 
727 	/* read the data from hidraw */
728 	memset(buf, 0, sizeof(buf));
729 	err = read(self->hidraw_fd, buf, sizeof(buf));
730 	ASSERT_EQ(err, 9) TH_LOG("read_hidraw");
731 	ASSERT_EQ(buf[0], 2);
732 	ASSERT_EQ(buf[1], 42);
733 	ASSERT_EQ(buf[2], 0) TH_LOG("leftovers_from_previous_test");
734 }
735 
736 /*
737  * Attach hid_user_raw_request to the given uhid device,
738  * call the bpf program from userspace
739  * check that the program is called and does the expected.
740  */
741 TEST_F(hid_bpf, test_hid_user_raw_request_call)
742 {
743 	struct hid_hw_request_syscall_args args = {
744 		.retval = -1,
745 		.type = HID_FEATURE_REPORT,
746 		.request_type = HID_REQ_GET_REPORT,
747 		.size = 10,
748 	};
749 	DECLARE_LIBBPF_OPTS(bpf_test_run_opts, tattrs,
750 			    .ctx_in = &args,
751 			    .ctx_size_in = sizeof(args),
752 	);
753 	int err, prog_fd;
754 
755 	LOAD_BPF;
756 
757 	args.hid = self->hid_id;
758 	args.data[0] = 1; /* report ID */
759 
760 	prog_fd = bpf_program__fd(self->skel->progs.hid_user_raw_request);
761 
762 	err = bpf_prog_test_run_opts(prog_fd, &tattrs);
763 	ASSERT_OK(err) TH_LOG("error while calling bpf_prog_test_run_opts");
764 
765 	ASSERT_EQ(args.retval, 2);
766 
767 	ASSERT_EQ(args.data[1], 2);
768 }
769 
770 /*
771  * Attach hid_insert{0,1,2} to the given uhid device,
772  * retrieve and open the matching hidraw node,
773  * inject one event in the uhid device,
774  * check that the programs have been inserted in the correct order.
775  */
776 TEST_F(hid_bpf, test_hid_attach_flags)
777 {
778 	const struct test_program progs[] = {
779 		{
780 			.name = "hid_test_insert2",
781 			.insert_head = 0,
782 		},
783 		{
784 			.name = "hid_test_insert1",
785 			.insert_head = 1,
786 		},
787 		{
788 			.name = "hid_test_insert3",
789 			.insert_head = 0,
790 		},
791 	};
792 	__u8 buf[10] = {0};
793 	int err;
794 
795 	LOAD_PROGRAMS(progs);
796 
797 	/* inject one event */
798 	buf[0] = 1;
799 	uhid_send_event(_metadata, self->uhid_fd, buf, 6);
800 
801 	/* read the data from hidraw */
802 	memset(buf, 0, sizeof(buf));
803 	err = read(self->hidraw_fd, buf, sizeof(buf));
804 	ASSERT_EQ(err, 6) TH_LOG("read_hidraw");
805 	ASSERT_EQ(buf[1], 1);
806 	ASSERT_EQ(buf[2], 2);
807 	ASSERT_EQ(buf[3], 3);
808 }
809 
810 /*
811  * Attach hid_rdesc_fixup to the given uhid device,
812  * retrieve and open the matching hidraw node,
813  * check that the hidraw report descriptor has been updated.
814  */
815 TEST_F(hid_bpf, test_rdesc_fixup)
816 {
817 	struct hidraw_report_descriptor rpt_desc = {0};
818 	const struct test_program progs[] = {
819 		{ .name = "hid_rdesc_fixup" },
820 	};
821 	int err, desc_size;
822 
823 	LOAD_PROGRAMS(progs);
824 
825 	/* check that hid_rdesc_fixup() was executed */
826 	ASSERT_EQ(self->skel->data->callback2_check, 0x21);
827 
828 	/* read the exposed report descriptor from hidraw */
829 	err = ioctl(self->hidraw_fd, HIDIOCGRDESCSIZE, &desc_size);
830 	ASSERT_GE(err, 0) TH_LOG("error while reading HIDIOCGRDESCSIZE: %d", err);
831 
832 	/* ensure the new size of the rdesc is bigger than the old one */
833 	ASSERT_GT(desc_size, sizeof(rdesc));
834 
835 	rpt_desc.size = desc_size;
836 	err = ioctl(self->hidraw_fd, HIDIOCGRDESC, &rpt_desc);
837 	ASSERT_GE(err, 0) TH_LOG("error while reading HIDIOCGRDESC: %d", err);
838 
839 	ASSERT_EQ(rpt_desc.value[4], 0x42);
840 }
841 
842 static int libbpf_print_fn(enum libbpf_print_level level,
843 			   const char *format, va_list args)
844 {
845 	char buf[1024];
846 
847 	if (level == LIBBPF_DEBUG)
848 		return 0;
849 
850 	snprintf(buf, sizeof(buf), "# %s", format);
851 
852 	vfprintf(stdout, buf, args);
853 	return 0;
854 }
855 
856 static void __attribute__((constructor)) __constructor_order_last(void)
857 {
858 	if (!__constructor_order)
859 		__constructor_order = _CONSTRUCTOR_ORDER_BACKWARD;
860 }
861 
862 int main(int argc, char **argv)
863 {
864 	/* Use libbpf 1.0 API mode */
865 	libbpf_set_strict_mode(LIBBPF_STRICT_ALL);
866 	libbpf_set_print(libbpf_print_fn);
867 
868 	return test_harness_run(argc, argv);
869 }
870