1// SPDX-License-Identifier: GPL-2.0
2/* Copyright (c) 2022 Red Hat */
3#include "hid.skel.h"
4
5#include "../kselftest_harness.h"
6
7#include <bpf/bpf.h>
8#include <fcntl.h>
9#include <fnmatch.h>
10#include <dirent.h>
11#include <poll.h>
12#include <pthread.h>
13#include <stdbool.h>
14#include <linux/hidraw.h>
15#include <linux/uhid.h>
16
17#define SHOW_UHID_DEBUG 0
18
19static unsigned char rdesc[] = {
20	0x06, 0x00, 0xff,	/* Usage Page (Vendor Defined Page 1) */
21	0x09, 0x21,		/* Usage (Vendor Usage 0x21) */
22	0xa1, 0x01,		/* COLLECTION (Application) */
23	0x09, 0x01,			/* Usage (Vendor Usage 0x01) */
24	0xa1, 0x00,			/* COLLECTION (Physical) */
25	0x85, 0x02,				/* REPORT_ID (2) */
26	0x19, 0x01,				/* USAGE_MINIMUM (1) */
27	0x29, 0x08,				/* USAGE_MAXIMUM (3) */
28	0x15, 0x00,				/* LOGICAL_MINIMUM (0) */
29	0x25, 0xff,				/* LOGICAL_MAXIMUM (255) */
30	0x95, 0x08,				/* REPORT_COUNT (8) */
31	0x75, 0x08,				/* REPORT_SIZE (8) */
32	0x81, 0x02,				/* INPUT (Data,Var,Abs) */
33	0xc0,				/* END_COLLECTION */
34	0x09, 0x01,			/* Usage (Vendor Usage 0x01) */
35	0xa1, 0x00,			/* COLLECTION (Physical) */
36	0x85, 0x01,				/* REPORT_ID (1) */
37	0x06, 0x00, 0xff,			/* Usage Page (Vendor Defined Page 1) */
38	0x19, 0x01,				/* USAGE_MINIMUM (1) */
39	0x29, 0x03,				/* USAGE_MAXIMUM (3) */
40	0x15, 0x00,				/* LOGICAL_MINIMUM (0) */
41	0x25, 0x01,				/* LOGICAL_MAXIMUM (1) */
42	0x95, 0x03,				/* REPORT_COUNT (3) */
43	0x75, 0x01,				/* REPORT_SIZE (1) */
44	0x81, 0x02,				/* INPUT (Data,Var,Abs) */
45	0x95, 0x01,				/* REPORT_COUNT (1) */
46	0x75, 0x05,				/* REPORT_SIZE (5) */
47	0x81, 0x01,				/* INPUT (Cnst,Var,Abs) */
48	0x05, 0x01,				/* USAGE_PAGE (Generic Desktop) */
49	0x09, 0x30,				/* USAGE (X) */
50	0x09, 0x31,				/* USAGE (Y) */
51	0x15, 0x81,				/* LOGICAL_MINIMUM (-127) */
52	0x25, 0x7f,				/* LOGICAL_MAXIMUM (127) */
53	0x75, 0x10,				/* REPORT_SIZE (16) */
54	0x95, 0x02,				/* REPORT_COUNT (2) */
55	0x81, 0x06,				/* INPUT (Data,Var,Rel) */
56
57	0x06, 0x00, 0xff,			/* Usage Page (Vendor Defined Page 1) */
58	0x19, 0x01,				/* USAGE_MINIMUM (1) */
59	0x29, 0x03,				/* USAGE_MAXIMUM (3) */
60	0x15, 0x00,				/* LOGICAL_MINIMUM (0) */
61	0x25, 0x01,				/* LOGICAL_MAXIMUM (1) */
62	0x95, 0x03,				/* REPORT_COUNT (3) */
63	0x75, 0x01,				/* REPORT_SIZE (1) */
64	0x91, 0x02,				/* Output (Data,Var,Abs) */
65	0x95, 0x01,				/* REPORT_COUNT (1) */
66	0x75, 0x05,				/* REPORT_SIZE (5) */
67	0x91, 0x01,				/* Output (Cnst,Var,Abs) */
68
69	0x06, 0x00, 0xff,			/* Usage Page (Vendor Defined Page 1) */
70	0x19, 0x06,				/* USAGE_MINIMUM (6) */
71	0x29, 0x08,				/* USAGE_MAXIMUM (8) */
72	0x15, 0x00,				/* LOGICAL_MINIMUM (0) */
73	0x25, 0x01,				/* LOGICAL_MAXIMUM (1) */
74	0x95, 0x03,				/* REPORT_COUNT (3) */
75	0x75, 0x01,				/* REPORT_SIZE (1) */
76	0xb1, 0x02,				/* Feature (Data,Var,Abs) */
77	0x95, 0x01,				/* REPORT_COUNT (1) */
78	0x75, 0x05,				/* REPORT_SIZE (5) */
79	0x91, 0x01,				/* Output (Cnst,Var,Abs) */
80
81	0xc0,				/* END_COLLECTION */
82	0xc0,			/* END_COLLECTION */
83};
84
85static __u8 feature_data[] = { 1, 2 };
86
87struct attach_prog_args {
88	int prog_fd;
89	unsigned int hid;
90	int retval;
91	int insert_head;
92};
93
94struct hid_hw_request_syscall_args {
95	__u8 data[10];
96	unsigned int hid;
97	int retval;
98	size_t size;
99	enum hid_report_type type;
100	__u8 request_type;
101};
102
103#define ASSERT_OK(data) ASSERT_FALSE(data)
104#define ASSERT_OK_PTR(ptr) ASSERT_NE(NULL, ptr)
105
106#define UHID_LOG(fmt, ...) do { \
107	if (SHOW_UHID_DEBUG) \
108		TH_LOG(fmt, ##__VA_ARGS__); \
109} while (0)
110
111static pthread_mutex_t uhid_started_mtx = PTHREAD_MUTEX_INITIALIZER;
112static pthread_cond_t uhid_started = PTHREAD_COND_INITIALIZER;
113
114/* no need to protect uhid_stopped, only one thread accesses it */
115static bool uhid_stopped;
116
117static int uhid_write(struct __test_metadata *_metadata, int fd, const struct uhid_event *ev)
118{
119	ssize_t ret;
120
121	ret = write(fd, ev, sizeof(*ev));
122	if (ret < 0) {
123		TH_LOG("Cannot write to uhid: %m");
124		return -errno;
125	} else if (ret != sizeof(*ev)) {
126		TH_LOG("Wrong size written to uhid: %zd != %zu",
127			ret, sizeof(ev));
128		return -EFAULT;
129	} else {
130		return 0;
131	}
132}
133
134static int uhid_create(struct __test_metadata *_metadata, int fd, int rand_nb)
135{
136	struct uhid_event ev;
137	char buf[25];
138
139	sprintf(buf, "test-uhid-device-%d", rand_nb);
140
141	memset(&ev, 0, sizeof(ev));
142	ev.type = UHID_CREATE;
143	strcpy((char *)ev.u.create.name, buf);
144	ev.u.create.rd_data = rdesc;
145	ev.u.create.rd_size = sizeof(rdesc);
146	ev.u.create.bus = BUS_USB;
147	ev.u.create.vendor = 0x0001;
148	ev.u.create.product = 0x0a37;
149	ev.u.create.version = 0;
150	ev.u.create.country = 0;
151
152	sprintf(buf, "%d", rand_nb);
153	strcpy((char *)ev.u.create.phys, buf);
154
155	return uhid_write(_metadata, fd, &ev);
156}
157
158static void uhid_destroy(struct __test_metadata *_metadata, int fd)
159{
160	struct uhid_event ev;
161
162	memset(&ev, 0, sizeof(ev));
163	ev.type = UHID_DESTROY;
164
165	uhid_write(_metadata, fd, &ev);
166}
167
168static int uhid_event(struct __test_metadata *_metadata, int fd)
169{
170	struct uhid_event ev, answer;
171	ssize_t ret;
172
173	memset(&ev, 0, sizeof(ev));
174	ret = read(fd, &ev, sizeof(ev));
175	if (ret == 0) {
176		UHID_LOG("Read HUP on uhid-cdev");
177		return -EFAULT;
178	} else if (ret < 0) {
179		UHID_LOG("Cannot read uhid-cdev: %m");
180		return -errno;
181	} else if (ret != sizeof(ev)) {
182		UHID_LOG("Invalid size read from uhid-dev: %zd != %zu",
183			ret, sizeof(ev));
184		return -EFAULT;
185	}
186
187	switch (ev.type) {
188	case UHID_START:
189		pthread_mutex_lock(&uhid_started_mtx);
190		pthread_cond_signal(&uhid_started);
191		pthread_mutex_unlock(&uhid_started_mtx);
192
193		UHID_LOG("UHID_START from uhid-dev");
194		break;
195	case UHID_STOP:
196		uhid_stopped = true;
197
198		UHID_LOG("UHID_STOP from uhid-dev");
199		break;
200	case UHID_OPEN:
201		UHID_LOG("UHID_OPEN from uhid-dev");
202		break;
203	case UHID_CLOSE:
204		UHID_LOG("UHID_CLOSE from uhid-dev");
205		break;
206	case UHID_OUTPUT:
207		UHID_LOG("UHID_OUTPUT from uhid-dev");
208		break;
209	case UHID_GET_REPORT:
210		UHID_LOG("UHID_GET_REPORT from uhid-dev");
211
212		answer.type = UHID_GET_REPORT_REPLY;
213		answer.u.get_report_reply.id = ev.u.get_report.id;
214		answer.u.get_report_reply.err = ev.u.get_report.rnum == 1 ? 0 : -EIO;
215		answer.u.get_report_reply.size = sizeof(feature_data);
216		memcpy(answer.u.get_report_reply.data, feature_data, sizeof(feature_data));
217
218		uhid_write(_metadata, fd, &answer);
219
220		break;
221	case UHID_SET_REPORT:
222		UHID_LOG("UHID_SET_REPORT from uhid-dev");
223		break;
224	default:
225		TH_LOG("Invalid event from uhid-dev: %u", ev.type);
226	}
227
228	return 0;
229}
230
231struct uhid_thread_args {
232	int fd;
233	struct __test_metadata *_metadata;
234};
235static void *uhid_read_events_thread(void *arg)
236{
237	struct uhid_thread_args *args = (struct uhid_thread_args *)arg;
238	struct __test_metadata *_metadata = args->_metadata;
239	struct pollfd pfds[1];
240	int fd = args->fd;
241	int ret = 0;
242
243	pfds[0].fd = fd;
244	pfds[0].events = POLLIN;
245
246	uhid_stopped = false;
247
248	while (!uhid_stopped) {
249		ret = poll(pfds, 1, 100);
250		if (ret < 0) {
251			TH_LOG("Cannot poll for fds: %m");
252			break;
253		}
254		if (pfds[0].revents & POLLIN) {
255			ret = uhid_event(_metadata, fd);
256			if (ret)
257				break;
258		}
259	}
260
261	return (void *)(long)ret;
262}
263
264static int uhid_start_listener(struct __test_metadata *_metadata, pthread_t *tid, int uhid_fd)
265{
266	struct uhid_thread_args args = {
267		.fd = uhid_fd,
268		._metadata = _metadata,
269	};
270	int err;
271
272	pthread_mutex_lock(&uhid_started_mtx);
273	err = pthread_create(tid, NULL, uhid_read_events_thread, (void *)&args);
274	ASSERT_EQ(0, err) {
275		TH_LOG("Could not start the uhid thread: %d", err);
276		pthread_mutex_unlock(&uhid_started_mtx);
277		close(uhid_fd);
278		return -EIO;
279	}
280	pthread_cond_wait(&uhid_started, &uhid_started_mtx);
281	pthread_mutex_unlock(&uhid_started_mtx);
282
283	return 0;
284}
285
286static int uhid_send_event(struct __test_metadata *_metadata, int fd, __u8 *buf, size_t size)
287{
288	struct uhid_event ev;
289
290	if (size > sizeof(ev.u.input.data))
291		return -E2BIG;
292
293	memset(&ev, 0, sizeof(ev));
294	ev.type = UHID_INPUT2;
295	ev.u.input2.size = size;
296
297	memcpy(ev.u.input2.data, buf, size);
298
299	return uhid_write(_metadata, fd, &ev);
300}
301
302static int setup_uhid(struct __test_metadata *_metadata, int rand_nb)
303{
304	int fd;
305	const char *path = "/dev/uhid";
306	int ret;
307
308	fd = open(path, O_RDWR | O_CLOEXEC);
309	ASSERT_GE(fd, 0) TH_LOG("open uhid-cdev failed; %d", fd);
310
311	ret = uhid_create(_metadata, fd, rand_nb);
312	ASSERT_EQ(0, ret) {
313		TH_LOG("create uhid device failed: %d", ret);
314		close(fd);
315	}
316
317	return fd;
318}
319
320static bool match_sysfs_device(int dev_id, const char *workdir, struct dirent *dir)
321{
322	const char *target = "0003:0001:0A37.*";
323	char phys[512];
324	char uevent[1024];
325	char temp[512];
326	int fd, nread;
327	bool found = false;
328
329	if (fnmatch(target, dir->d_name, 0))
330		return false;
331
332	/* we found the correct VID/PID, now check for phys */
333	sprintf(uevent, "%s/%s/uevent", workdir, dir->d_name);
334
335	fd = open(uevent, O_RDONLY | O_NONBLOCK);
336	if (fd < 0)
337		return false;
338
339	sprintf(phys, "PHYS=%d", dev_id);
340
341	nread = read(fd, temp, ARRAY_SIZE(temp));
342	if (nread > 0 && (strstr(temp, phys)) != NULL)
343		found = true;
344
345	close(fd);
346
347	return found;
348}
349
350static int get_hid_id(int dev_id)
351{
352	const char *workdir = "/sys/devices/virtual/misc/uhid";
353	const char *str_id;
354	DIR *d;
355	struct dirent *dir;
356	int found = -1, attempts = 3;
357
358	/* it would be nice to be able to use nftw, but the no_alu32 target doesn't support it */
359
360	while (found < 0 && attempts > 0) {
361		attempts--;
362		d = opendir(workdir);
363		if (d) {
364			while ((dir = readdir(d)) != NULL) {
365				if (!match_sysfs_device(dev_id, workdir, dir))
366					continue;
367
368				str_id = dir->d_name + sizeof("0003:0001:0A37.");
369				found = (int)strtol(str_id, NULL, 16);
370
371				break;
372			}
373			closedir(d);
374		}
375		if (found < 0)
376			usleep(100000);
377	}
378
379	return found;
380}
381
382static int get_hidraw(int dev_id)
383{
384	const char *workdir = "/sys/devices/virtual/misc/uhid";
385	char sysfs[1024];
386	DIR *d, *subd;
387	struct dirent *dir, *subdir;
388	int i, found = -1;
389
390	/* retry 5 times in case the system is loaded */
391	for (i = 5; i > 0; i--) {
392		usleep(10);
393		d = opendir(workdir);
394
395		if (!d)
396			continue;
397
398		while ((dir = readdir(d)) != NULL) {
399			if (!match_sysfs_device(dev_id, workdir, dir))
400				continue;
401
402			sprintf(sysfs, "%s/%s/hidraw", workdir, dir->d_name);
403
404			subd = opendir(sysfs);
405			if (!subd)
406				continue;
407
408			while ((subdir = readdir(subd)) != NULL) {
409				if (fnmatch("hidraw*", subdir->d_name, 0))
410					continue;
411
412				found = atoi(subdir->d_name + strlen("hidraw"));
413			}
414
415			closedir(subd);
416
417			if (found > 0)
418				break;
419		}
420		closedir(d);
421	}
422
423	return found;
424}
425
426static int open_hidraw(int dev_id)
427{
428	int hidraw_number;
429	char hidraw_path[64] = { 0 };
430
431	hidraw_number = get_hidraw(dev_id);
432	if (hidraw_number < 0)
433		return hidraw_number;
434
435	/* open hidraw node to check the other side of the pipe */
436	sprintf(hidraw_path, "/dev/hidraw%d", hidraw_number);
437	return open(hidraw_path, O_RDWR | O_NONBLOCK);
438}
439
440FIXTURE(hid_bpf) {
441	int dev_id;
442	int uhid_fd;
443	int hidraw_fd;
444	int hid_id;
445	pthread_t tid;
446	struct hid *skel;
447	int hid_links[3]; /* max number of programs loaded in a single test */
448};
449static void detach_bpf(FIXTURE_DATA(hid_bpf) * self)
450{
451	int i;
452
453	if (self->hidraw_fd)
454		close(self->hidraw_fd);
455	self->hidraw_fd = 0;
456
457	for (i = 0; i < ARRAY_SIZE(self->hid_links); i++) {
458		if (self->hid_links[i])
459			close(self->hid_links[i]);
460	}
461
462	hid__destroy(self->skel);
463	self->skel = NULL;
464}
465
466FIXTURE_TEARDOWN(hid_bpf) {
467	void *uhid_err;
468
469	uhid_destroy(_metadata, self->uhid_fd);
470
471	detach_bpf(self);
472	pthread_join(self->tid, &uhid_err);
473}
474#define TEARDOWN_LOG(fmt, ...) do { \
475	TH_LOG(fmt, ##__VA_ARGS__); \
476	hid_bpf_teardown(_metadata, self, variant); \
477} while (0)
478
479FIXTURE_SETUP(hid_bpf)
480{
481	time_t t;
482	int err;
483
484	/* initialize random number generator */
485	srand((unsigned int)time(&t));
486
487	self->dev_id = rand() % 1024;
488
489	self->uhid_fd = setup_uhid(_metadata, self->dev_id);
490
491	/* locate the uev, self, variant);ent file of the created device */
492	self->hid_id = get_hid_id(self->dev_id);
493	ASSERT_GT(self->hid_id, 0)
494		TEARDOWN_LOG("Could not locate uhid device id: %d", self->hid_id);
495
496	err = uhid_start_listener(_metadata, &self->tid, self->uhid_fd);
497	ASSERT_EQ(0, err) TEARDOWN_LOG("could not start udev listener: %d", err);
498}
499
500struct test_program {
501	const char *name;
502	int insert_head;
503};
504#define LOAD_PROGRAMS(progs) \
505	load_programs(progs, ARRAY_SIZE(progs), _metadata, self, variant)
506#define LOAD_BPF \
507	load_programs(NULL, 0, _metadata, self, variant)
508static void load_programs(const struct test_program programs[],
509			  const size_t progs_count,
510			  struct __test_metadata *_metadata,
511			  FIXTURE_DATA(hid_bpf) * self,
512			  const FIXTURE_VARIANT(hid_bpf) * variant)
513{
514	int attach_fd, err = -EINVAL;
515	struct attach_prog_args args = {
516		.retval = -1,
517	};
518	DECLARE_LIBBPF_OPTS(bpf_test_run_opts, tattr,
519			    .ctx_in = &args,
520			    .ctx_size_in = sizeof(args),
521	);
522
523	ASSERT_LE(progs_count, ARRAY_SIZE(self->hid_links))
524		TH_LOG("too many programs are to be loaded");
525
526	/* open the bpf file */
527	self->skel = hid__open();
528	ASSERT_OK_PTR(self->skel) TEARDOWN_LOG("Error while calling hid__open");
529
530	for (int i = 0; i < progs_count; i++) {
531		struct bpf_program *prog;
532
533		prog = bpf_object__find_program_by_name(*self->skel->skeleton->obj,
534							programs[i].name);
535		ASSERT_OK_PTR(prog) TH_LOG("can not find program by name '%s'", programs[i].name);
536
537		bpf_program__set_autoload(prog, true);
538	}
539
540	err = hid__load(self->skel);
541	ASSERT_OK(err) TH_LOG("hid_skel_load failed: %d", err);
542
543	attach_fd = bpf_program__fd(self->skel->progs.attach_prog);
544	ASSERT_GE(attach_fd, 0) TH_LOG("locate attach_prog: %d", attach_fd);
545
546	for (int i = 0; i < progs_count; i++) {
547		struct bpf_program *prog;
548
549		prog = bpf_object__find_program_by_name(*self->skel->skeleton->obj,
550							programs[i].name);
551		ASSERT_OK_PTR(prog) TH_LOG("can not find program by name '%s'", programs[i].name);
552
553		args.prog_fd = bpf_program__fd(prog);
554		args.hid = self->hid_id;
555		args.insert_head = programs[i].insert_head;
556		err = bpf_prog_test_run_opts(attach_fd, &tattr);
557		ASSERT_GE(args.retval, 0)
558			TH_LOG("attach_hid(%s): %d", programs[i].name, args.retval);
559
560		self->hid_links[i] = args.retval;
561	}
562
563	self->hidraw_fd = open_hidraw(self->dev_id);
564	ASSERT_GE(self->hidraw_fd, 0) TH_LOG("open_hidraw");
565}
566
567/*
568 * A simple test to see if the fixture is working fine.
569 * If this fails, none of the other tests will pass.
570 */
571TEST_F(hid_bpf, test_create_uhid)
572{
573}
574
575/*
576 * Attach hid_first_event to the given uhid device,
577 * retrieve and open the matching hidraw node,
578 * inject one event in the uhid device,
579 * check that the program sees it and can change the data
580 */
581TEST_F(hid_bpf, raw_event)
582{
583	const struct test_program progs[] = {
584		{ .name = "hid_first_event" },
585	};
586	__u8 buf[10] = {0};
587	int err;
588
589	LOAD_PROGRAMS(progs);
590
591	/* check that the program is correctly loaded */
592	ASSERT_EQ(self->skel->data->callback_check, 52) TH_LOG("callback_check1");
593	ASSERT_EQ(self->skel->data->callback2_check, 52) TH_LOG("callback2_check1");
594
595	/* inject one event */
596	buf[0] = 1;
597	buf[1] = 42;
598	uhid_send_event(_metadata, self->uhid_fd, buf, 6);
599
600	/* check that hid_first_event() was executed */
601	ASSERT_EQ(self->skel->data->callback_check, 42) TH_LOG("callback_check1");
602
603	/* read the data from hidraw */
604	memset(buf, 0, sizeof(buf));
605	err = read(self->hidraw_fd, buf, sizeof(buf));
606	ASSERT_EQ(err, 6) TH_LOG("read_hidraw");
607	ASSERT_EQ(buf[0], 1);
608	ASSERT_EQ(buf[2], 47);
609
610	/* inject another event */
611	memset(buf, 0, sizeof(buf));
612	buf[0] = 1;
613	buf[1] = 47;
614	uhid_send_event(_metadata, self->uhid_fd, buf, 6);
615
616	/* check that hid_first_event() was executed */
617	ASSERT_EQ(self->skel->data->callback_check, 47) TH_LOG("callback_check1");
618
619	/* read the data from hidraw */
620	memset(buf, 0, sizeof(buf));
621	err = read(self->hidraw_fd, buf, sizeof(buf));
622	ASSERT_EQ(err, 6) TH_LOG("read_hidraw");
623	ASSERT_EQ(buf[2], 52);
624}
625
626/*
627 * Ensures that we can attach/detach programs
628 */
629TEST_F(hid_bpf, test_attach_detach)
630{
631	const struct test_program progs[] = {
632		{ .name = "hid_first_event" },
633		{ .name = "hid_second_event" },
634	};
635	__u8 buf[10] = {0};
636	int err, link;
637
638	LOAD_PROGRAMS(progs);
639
640	link = self->hid_links[0];
641	ASSERT_GT(link, 0) TH_LOG("HID-BPF link not created");
642
643	/* inject one event */
644	buf[0] = 1;
645	buf[1] = 42;
646	uhid_send_event(_metadata, self->uhid_fd, buf, 6);
647
648	/* read the data from hidraw */
649	memset(buf, 0, sizeof(buf));
650	err = read(self->hidraw_fd, buf, sizeof(buf));
651	ASSERT_EQ(err, 6) TH_LOG("read_hidraw");
652	ASSERT_EQ(buf[0], 1);
653	ASSERT_EQ(buf[2], 47);
654
655	/* make sure both programs are run */
656	ASSERT_EQ(buf[3], 52);
657
658	/* pin the first program and immediately unpin it */
659#define PIN_PATH "/sys/fs/bpf/hid_first_event"
660	err = bpf_obj_pin(link, PIN_PATH);
661	ASSERT_OK(err) TH_LOG("error while calling bpf_obj_pin");
662	remove(PIN_PATH);
663#undef PIN_PATH
664	usleep(100000);
665
666	/* detach the program */
667	detach_bpf(self);
668
669	self->hidraw_fd = open_hidraw(self->dev_id);
670	ASSERT_GE(self->hidraw_fd, 0) TH_LOG("open_hidraw");
671
672	/* inject another event */
673	memset(buf, 0, sizeof(buf));
674	buf[0] = 1;
675	buf[1] = 47;
676	uhid_send_event(_metadata, self->uhid_fd, buf, 6);
677
678	/* read the data from hidraw */
679	memset(buf, 0, sizeof(buf));
680	err = read(self->hidraw_fd, buf, sizeof(buf));
681	ASSERT_EQ(err, 6) TH_LOG("read_hidraw_no_bpf");
682	ASSERT_EQ(buf[0], 1);
683	ASSERT_EQ(buf[1], 47);
684	ASSERT_EQ(buf[2], 0);
685	ASSERT_EQ(buf[3], 0);
686
687	/* re-attach our program */
688
689	LOAD_PROGRAMS(progs);
690
691	/* inject one event */
692	memset(buf, 0, sizeof(buf));
693	buf[0] = 1;
694	buf[1] = 42;
695	uhid_send_event(_metadata, self->uhid_fd, buf, 6);
696
697	/* read the data from hidraw */
698	memset(buf, 0, sizeof(buf));
699	err = read(self->hidraw_fd, buf, sizeof(buf));
700	ASSERT_EQ(err, 6) TH_LOG("read_hidraw");
701	ASSERT_EQ(buf[0], 1);
702	ASSERT_EQ(buf[2], 47);
703	ASSERT_EQ(buf[3], 52);
704}
705
706/*
707 * Attach hid_change_report_id to the given uhid device,
708 * retrieve and open the matching hidraw node,
709 * inject one event in the uhid device,
710 * check that the program sees it and can change the data
711 */
712TEST_F(hid_bpf, test_hid_change_report)
713{
714	const struct test_program progs[] = {
715		{ .name = "hid_change_report_id" },
716	};
717	__u8 buf[10] = {0};
718	int err;
719
720	LOAD_PROGRAMS(progs);
721
722	/* inject one event */
723	buf[0] = 1;
724	buf[1] = 42;
725	uhid_send_event(_metadata, self->uhid_fd, buf, 6);
726
727	/* read the data from hidraw */
728	memset(buf, 0, sizeof(buf));
729	err = read(self->hidraw_fd, buf, sizeof(buf));
730	ASSERT_EQ(err, 9) TH_LOG("read_hidraw");
731	ASSERT_EQ(buf[0], 2);
732	ASSERT_EQ(buf[1], 42);
733	ASSERT_EQ(buf[2], 0) TH_LOG("leftovers_from_previous_test");
734}
735
736/*
737 * Attach hid_user_raw_request to the given uhid device,
738 * call the bpf program from userspace
739 * check that the program is called and does the expected.
740 */
741TEST_F(hid_bpf, test_hid_user_raw_request_call)
742{
743	struct hid_hw_request_syscall_args args = {
744		.retval = -1,
745		.type = HID_FEATURE_REPORT,
746		.request_type = HID_REQ_GET_REPORT,
747		.size = 10,
748	};
749	DECLARE_LIBBPF_OPTS(bpf_test_run_opts, tattrs,
750			    .ctx_in = &args,
751			    .ctx_size_in = sizeof(args),
752	);
753	int err, prog_fd;
754
755	LOAD_BPF;
756
757	args.hid = self->hid_id;
758	args.data[0] = 1; /* report ID */
759
760	prog_fd = bpf_program__fd(self->skel->progs.hid_user_raw_request);
761
762	err = bpf_prog_test_run_opts(prog_fd, &tattrs);
763	ASSERT_OK(err) TH_LOG("error while calling bpf_prog_test_run_opts");
764
765	ASSERT_EQ(args.retval, 2);
766
767	ASSERT_EQ(args.data[1], 2);
768}
769
770/*
771 * Attach hid_insert{0,1,2} to the given uhid device,
772 * retrieve and open the matching hidraw node,
773 * inject one event in the uhid device,
774 * check that the programs have been inserted in the correct order.
775 */
776TEST_F(hid_bpf, test_hid_attach_flags)
777{
778	const struct test_program progs[] = {
779		{
780			.name = "hid_test_insert2",
781			.insert_head = 0,
782		},
783		{
784			.name = "hid_test_insert1",
785			.insert_head = 1,
786		},
787		{
788			.name = "hid_test_insert3",
789			.insert_head = 0,
790		},
791	};
792	__u8 buf[10] = {0};
793	int err;
794
795	LOAD_PROGRAMS(progs);
796
797	/* inject one event */
798	buf[0] = 1;
799	uhid_send_event(_metadata, self->uhid_fd, buf, 6);
800
801	/* read the data from hidraw */
802	memset(buf, 0, sizeof(buf));
803	err = read(self->hidraw_fd, buf, sizeof(buf));
804	ASSERT_EQ(err, 6) TH_LOG("read_hidraw");
805	ASSERT_EQ(buf[1], 1);
806	ASSERT_EQ(buf[2], 2);
807	ASSERT_EQ(buf[3], 3);
808}
809
810/*
811 * Attach hid_rdesc_fixup to the given uhid device,
812 * retrieve and open the matching hidraw node,
813 * check that the hidraw report descriptor has been updated.
814 */
815TEST_F(hid_bpf, test_rdesc_fixup)
816{
817	struct hidraw_report_descriptor rpt_desc = {0};
818	const struct test_program progs[] = {
819		{ .name = "hid_rdesc_fixup" },
820	};
821	int err, desc_size;
822
823	LOAD_PROGRAMS(progs);
824
825	/* check that hid_rdesc_fixup() was executed */
826	ASSERT_EQ(self->skel->data->callback2_check, 0x21);
827
828	/* read the exposed report descriptor from hidraw */
829	err = ioctl(self->hidraw_fd, HIDIOCGRDESCSIZE, &desc_size);
830	ASSERT_GE(err, 0) TH_LOG("error while reading HIDIOCGRDESCSIZE: %d", err);
831
832	/* ensure the new size of the rdesc is bigger than the old one */
833	ASSERT_GT(desc_size, sizeof(rdesc));
834
835	rpt_desc.size = desc_size;
836	err = ioctl(self->hidraw_fd, HIDIOCGRDESC, &rpt_desc);
837	ASSERT_GE(err, 0) TH_LOG("error while reading HIDIOCGRDESC: %d", err);
838
839	ASSERT_EQ(rpt_desc.value[4], 0x42);
840}
841
842static int libbpf_print_fn(enum libbpf_print_level level,
843			   const char *format, va_list args)
844{
845	char buf[1024];
846
847	if (level == LIBBPF_DEBUG)
848		return 0;
849
850	snprintf(buf, sizeof(buf), "# %s", format);
851
852	vfprintf(stdout, buf, args);
853	return 0;
854}
855
856static void __attribute__((constructor)) __constructor_order_last(void)
857{
858	if (!__constructor_order)
859		__constructor_order = _CONSTRUCTOR_ORDER_BACKWARD;
860}
861
862int main(int argc, char **argv)
863{
864	/* Use libbpf 1.0 API mode */
865	libbpf_set_strict_mode(LIBBPF_STRICT_ALL);
866	libbpf_set_print(libbpf_print_fn);
867
868	return test_harness_run(argc, argv);
869}
870