// SPDX-License-Identifier: GPL-2.0 /* Copyright (c) 2022-2024 Red Hat */ #include "hid.skel.h" #include "hid_common.h" #include struct hid_hw_request_syscall_args { __u8 data[10]; unsigned int hid; int retval; size_t size; enum hid_report_type type; __u8 request_type; }; FIXTURE(hid_bpf) { struct uhid_device hid; int hidraw_fd; struct hid *skel; struct bpf_link *hid_links[3]; /* max number of programs loaded in a single test */ }; static void detach_bpf(FIXTURE_DATA(hid_bpf) * self) { int i; if (self->hidraw_fd) close(self->hidraw_fd); self->hidraw_fd = 0; if (!self->skel) return; hid__detach(self->skel); for (i = 0; i < ARRAY_SIZE(self->hid_links); i++) { if (self->hid_links[i]) bpf_link__destroy(self->hid_links[i]); } hid__destroy(self->skel); self->skel = NULL; } FIXTURE_TEARDOWN(hid_bpf) { void *uhid_err; uhid_destroy(_metadata, &self->hid); detach_bpf(self); pthread_join(self->hid.tid, &uhid_err); } #define TEARDOWN_LOG(fmt, ...) do { \ TH_LOG(fmt, ##__VA_ARGS__); \ hid_bpf_teardown(_metadata, self, variant); \ } while (0) FIXTURE_SETUP(hid_bpf) { int err; err = setup_uhid(_metadata, &self->hid, BUS_USB, 0x0001, 0x0a36, rdesc, sizeof(rdesc)); ASSERT_OK(err); } struct test_program { const char *name; int insert_head; }; #define LOAD_PROGRAMS(progs) \ load_programs(progs, ARRAY_SIZE(progs), _metadata, self, variant) #define LOAD_BPF \ load_programs(NULL, 0, _metadata, self, variant) static void load_programs(const struct test_program programs[], const size_t progs_count, struct __test_metadata *_metadata, FIXTURE_DATA(hid_bpf) * self, const FIXTURE_VARIANT(hid_bpf) * variant) { struct bpf_map *iter_map; int err = -EINVAL; ASSERT_LE(progs_count, ARRAY_SIZE(self->hid_links)) TH_LOG("too many programs are to be loaded"); /* open the bpf file */ self->skel = hid__open(); ASSERT_OK_PTR(self->skel) TEARDOWN_LOG("Error while calling hid__open"); for (int i = 0; i < progs_count; i++) { struct bpf_program *prog; struct bpf_map *map; int *ops_hid_id; prog = bpf_object__find_program_by_name(*self->skel->skeleton->obj, programs[i].name); ASSERT_OK_PTR(prog) TH_LOG("can not find program by name '%s'", programs[i].name); bpf_program__set_autoload(prog, true); map = bpf_object__find_map_by_name(*self->skel->skeleton->obj, programs[i].name + 4); ASSERT_OK_PTR(map) TH_LOG("can not find struct_ops by name '%s'", programs[i].name + 4); /* hid_id is the first field of struct hid_bpf_ops */ ops_hid_id = bpf_map__initial_value(map, NULL); ASSERT_OK_PTR(ops_hid_id) TH_LOG("unable to retrieve struct_ops data"); *ops_hid_id = self->hid.hid_id; } /* we disable the auto-attach feature of all maps because we * only want the tested one to be manually attached in the next * call to bpf_map__attach_struct_ops() */ bpf_object__for_each_map(iter_map, *self->skel->skeleton->obj) bpf_map__set_autoattach(iter_map, false); err = hid__load(self->skel); ASSERT_OK(err) TH_LOG("hid_skel_load failed: %d", err); for (int i = 0; i < progs_count; i++) { struct bpf_map *map; map = bpf_object__find_map_by_name(*self->skel->skeleton->obj, programs[i].name + 4); ASSERT_OK_PTR(map) TH_LOG("can not find struct_ops by name '%s'", programs[i].name + 4); self->hid_links[i] = bpf_map__attach_struct_ops(map); ASSERT_OK_PTR(self->hid_links[i]) TH_LOG("failed to attach struct ops '%s'", programs[i].name + 4); } hid__attach(self->skel); self->hidraw_fd = open_hidraw(&self->hid); ASSERT_GE(self->hidraw_fd, 0) TH_LOG("open_hidraw"); } /* * A simple test to see if the fixture is working fine. * If this fails, none of the other tests will pass. */ TEST_F(hid_bpf, test_create_uhid) { } /* * Attach hid_first_event to the given uhid device, * retrieve and open the matching hidraw node, * inject one event in the uhid device, * check that the program sees it and can change the data */ TEST_F(hid_bpf, raw_event) { const struct test_program progs[] = { { .name = "hid_first_event" }, }; __u8 buf[10] = {0}; int err; LOAD_PROGRAMS(progs); /* check that the program is correctly loaded */ ASSERT_EQ(self->skel->data->callback_check, 52) TH_LOG("callback_check1"); ASSERT_EQ(self->skel->data->callback2_check, 52) TH_LOG("callback2_check1"); /* inject one event */ buf[0] = 1; buf[1] = 42; uhid_send_event(_metadata, &self->hid, buf, 6); /* check that hid_first_event() was executed */ ASSERT_EQ(self->skel->data->callback_check, 42) TH_LOG("callback_check1"); /* read the data from hidraw */ memset(buf, 0, sizeof(buf)); err = read(self->hidraw_fd, buf, sizeof(buf)); ASSERT_EQ(err, 6) TH_LOG("read_hidraw"); ASSERT_EQ(buf[0], 1); ASSERT_EQ(buf[2], 47); /* inject another event */ memset(buf, 0, sizeof(buf)); buf[0] = 1; buf[1] = 47; uhid_send_event(_metadata, &self->hid, buf, 6); /* check that hid_first_event() was executed */ ASSERT_EQ(self->skel->data->callback_check, 47) TH_LOG("callback_check1"); /* read the data from hidraw */ memset(buf, 0, sizeof(buf)); err = read(self->hidraw_fd, buf, sizeof(buf)); ASSERT_EQ(err, 6) TH_LOG("read_hidraw"); ASSERT_EQ(buf[2], 52); } /* * Attach hid_first_event to the given uhid device, * retrieve and open the matching hidraw node, * inject one event in the uhid device, * check that the program sees it and can change the data */ TEST_F(hid_bpf, subprog_raw_event) { const struct test_program progs[] = { { .name = "hid_subprog_first_event" }, }; __u8 buf[10] = {0}; int err; LOAD_PROGRAMS(progs); /* inject one event */ buf[0] = 1; buf[1] = 42; uhid_send_event(_metadata, &self->hid, buf, 6); /* read the data from hidraw */ memset(buf, 0, sizeof(buf)); err = read(self->hidraw_fd, buf, sizeof(buf)); ASSERT_EQ(err, 6) TH_LOG("read_hidraw"); ASSERT_EQ(buf[0], 1); ASSERT_EQ(buf[2], 47); /* inject another event */ memset(buf, 0, sizeof(buf)); buf[0] = 1; buf[1] = 47; uhid_send_event(_metadata, &self->hid, buf, 6); /* read the data from hidraw */ memset(buf, 0, sizeof(buf)); err = read(self->hidraw_fd, buf, sizeof(buf)); ASSERT_EQ(err, 6) TH_LOG("read_hidraw"); ASSERT_EQ(buf[2], 52); } /* * Attach hid_first_event to the given uhid device, * attempt at re-attaching it, we should not lock and * return an invalid struct bpf_link */ TEST_F(hid_bpf, multiple_attach) { const struct test_program progs[] = { { .name = "hid_first_event" }, }; struct bpf_link *link; LOAD_PROGRAMS(progs); link = bpf_map__attach_struct_ops(self->skel->maps.first_event); ASSERT_NULL(link) TH_LOG("unexpected return value when re-attaching the struct_ops"); } /* * Ensures that we can attach/detach programs */ TEST_F(hid_bpf, test_attach_detach) { const struct test_program progs[] = { { .name = "hid_first_event" }, { .name = "hid_second_event" }, }; struct bpf_link *link; __u8 buf[10] = {0}; int err, link_fd; LOAD_PROGRAMS(progs); link = self->hid_links[0]; ASSERT_OK_PTR(link) TH_LOG("HID-BPF link not created"); link_fd = bpf_link__fd(link); ASSERT_GE(link_fd, 0) TH_LOG("HID-BPF link FD not valid"); /* inject one event */ buf[0] = 1; buf[1] = 42; uhid_send_event(_metadata, &self->hid, buf, 6); /* read the data from hidraw */ memset(buf, 0, sizeof(buf)); err = read(self->hidraw_fd, buf, sizeof(buf)); ASSERT_EQ(err, 6) TH_LOG("read_hidraw"); ASSERT_EQ(buf[0], 1); ASSERT_EQ(buf[2], 47); /* make sure both programs are run */ ASSERT_EQ(buf[3], 52); /* pin the first program and immediately unpin it */ #define PIN_PATH "/sys/fs/bpf/hid_first_event" err = bpf_obj_pin(link_fd, PIN_PATH); ASSERT_OK(err) TH_LOG("error while calling bpf_obj_pin"); remove(PIN_PATH); #undef PIN_PATH usleep(100000); /* detach the program */ detach_bpf(self); self->hidraw_fd = open_hidraw(&self->hid); ASSERT_GE(self->hidraw_fd, 0) TH_LOG("open_hidraw"); /* inject another event */ memset(buf, 0, sizeof(buf)); buf[0] = 1; buf[1] = 47; uhid_send_event(_metadata, &self->hid, buf, 6); /* read the data from hidraw */ memset(buf, 0, sizeof(buf)); err = read(self->hidraw_fd, buf, sizeof(buf)); ASSERT_EQ(err, 6) TH_LOG("read_hidraw_no_bpf"); ASSERT_EQ(buf[0], 1); ASSERT_EQ(buf[1], 47); ASSERT_EQ(buf[2], 0); ASSERT_EQ(buf[3], 0); /* re-attach our program */ LOAD_PROGRAMS(progs); /* inject one event */ memset(buf, 0, sizeof(buf)); buf[0] = 1; buf[1] = 42; uhid_send_event(_metadata, &self->hid, buf, 6); /* read the data from hidraw */ memset(buf, 0, sizeof(buf)); err = read(self->hidraw_fd, buf, sizeof(buf)); ASSERT_EQ(err, 6) TH_LOG("read_hidraw"); ASSERT_EQ(buf[0], 1); ASSERT_EQ(buf[2], 47); ASSERT_EQ(buf[3], 52); } /* * Attach hid_change_report_id to the given uhid device, * retrieve and open the matching hidraw node, * inject one event in the uhid device, * check that the program sees it and can change the data */ TEST_F(hid_bpf, test_hid_change_report) { const struct test_program progs[] = { { .name = "hid_change_report_id" }, }; __u8 buf[10] = {0}; int err; LOAD_PROGRAMS(progs); /* inject one event */ buf[0] = 1; buf[1] = 42; uhid_send_event(_metadata, &self->hid, buf, 6); /* read the data from hidraw */ memset(buf, 0, sizeof(buf)); err = read(self->hidraw_fd, buf, sizeof(buf)); ASSERT_EQ(err, 9) TH_LOG("read_hidraw"); ASSERT_EQ(buf[0], 2); ASSERT_EQ(buf[1], 42); ASSERT_EQ(buf[2], 0) TH_LOG("leftovers_from_previous_test"); } /* * Call hid_bpf_input_report against the given uhid device, * check that the program is called and does the expected. */ TEST_F(hid_bpf, test_hid_user_input_report_call) { struct hid_hw_request_syscall_args args = { .retval = -1, .size = 10, }; DECLARE_LIBBPF_OPTS(bpf_test_run_opts, tattrs, .ctx_in = &args, .ctx_size_in = sizeof(args), ); __u8 buf[10] = {0}; int err, prog_fd; LOAD_BPF; args.hid = self->hid.hid_id; args.data[0] = 1; /* report ID */ args.data[1] = 2; /* report ID */ args.data[2] = 42; /* report ID */ prog_fd = bpf_program__fd(self->skel->progs.hid_user_input_report); /* check that there is no data to read from hidraw */ memset(buf, 0, sizeof(buf)); err = read(self->hidraw_fd, buf, sizeof(buf)); ASSERT_EQ(err, -1) TH_LOG("read_hidraw"); err = bpf_prog_test_run_opts(prog_fd, &tattrs); ASSERT_OK(err) TH_LOG("error while calling bpf_prog_test_run_opts"); ASSERT_EQ(args.retval, 0); /* read the data from hidraw */ memset(buf, 0, sizeof(buf)); err = read(self->hidraw_fd, buf, sizeof(buf)); ASSERT_EQ(err, 6) TH_LOG("read_hidraw"); ASSERT_EQ(buf[0], 1); ASSERT_EQ(buf[1], 2); ASSERT_EQ(buf[2], 42); } /* * Call hid_bpf_hw_output_report against the given uhid device, * check that the program is called and does the expected. */ TEST_F(hid_bpf, test_hid_user_output_report_call) { struct hid_hw_request_syscall_args args = { .retval = -1, .size = 10, }; DECLARE_LIBBPF_OPTS(bpf_test_run_opts, tattrs, .ctx_in = &args, .ctx_size_in = sizeof(args), ); int err, cond_err, prog_fd; struct timespec time_to_wait; LOAD_BPF; args.hid = self->hid.hid_id; args.data[0] = 1; /* report ID */ args.data[1] = 2; /* report ID */ args.data[2] = 42; /* report ID */ prog_fd = bpf_program__fd(self->skel->progs.hid_user_output_report); pthread_mutex_lock(&uhid_output_mtx); memset(output_report, 0, sizeof(output_report)); clock_gettime(CLOCK_REALTIME, &time_to_wait); time_to_wait.tv_sec += 2; err = bpf_prog_test_run_opts(prog_fd, &tattrs); cond_err = pthread_cond_timedwait(&uhid_output_cond, &uhid_output_mtx, &time_to_wait); ASSERT_OK(err) TH_LOG("error while calling bpf_prog_test_run_opts"); ASSERT_OK(cond_err) TH_LOG("error while calling waiting for the condition"); ASSERT_EQ(args.retval, 3); ASSERT_EQ(output_report[0], 1); ASSERT_EQ(output_report[1], 2); ASSERT_EQ(output_report[2], 42); pthread_mutex_unlock(&uhid_output_mtx); } /* * Call hid_hw_raw_request against the given uhid device, * check that the program is called and does the expected. */ TEST_F(hid_bpf, test_hid_user_raw_request_call) { struct hid_hw_request_syscall_args args = { .retval = -1, .type = HID_FEATURE_REPORT, .request_type = HID_REQ_GET_REPORT, .size = 10, }; DECLARE_LIBBPF_OPTS(bpf_test_run_opts, tattrs, .ctx_in = &args, .ctx_size_in = sizeof(args), ); int err, prog_fd; LOAD_BPF; args.hid = self->hid.hid_id; args.data[0] = 1; /* report ID */ prog_fd = bpf_program__fd(self->skel->progs.hid_user_raw_request); err = bpf_prog_test_run_opts(prog_fd, &tattrs); ASSERT_OK(err) TH_LOG("error while calling bpf_prog_test_run_opts"); ASSERT_EQ(args.retval, 2); ASSERT_EQ(args.data[1], 2); } /* * Call hid_hw_raw_request against the given uhid device, * check that the program is called and prevents the * call to uhid. */ TEST_F(hid_bpf, test_hid_filter_raw_request_call) { const struct test_program progs[] = { { .name = "hid_test_filter_raw_request" }, }; __u8 buf[10] = {0}; int err; LOAD_PROGRAMS(progs); /* first check that we did not attach to device_event */ /* inject one event */ buf[0] = 1; buf[1] = 42; uhid_send_event(_metadata, &self->hid, buf, 6); /* read the data from hidraw */ memset(buf, 0, sizeof(buf)); err = read(self->hidraw_fd, buf, sizeof(buf)); ASSERT_EQ(err, 6) TH_LOG("read_hidraw"); ASSERT_EQ(buf[0], 1); ASSERT_EQ(buf[1], 42); ASSERT_EQ(buf[2], 0) TH_LOG("leftovers_from_previous_test"); /* now check that our program is preventing hid_hw_raw_request() */ /* emit hid_hw_raw_request from hidraw */ /* Get Feature */ memset(buf, 0, sizeof(buf)); buf[0] = 0x1; /* Report Number */ err = ioctl(self->hidraw_fd, HIDIOCGFEATURE(sizeof(buf)), buf); ASSERT_LT(err, 0) TH_LOG("unexpected success while reading HIDIOCGFEATURE: %d", err); ASSERT_EQ(errno, 20) TH_LOG("unexpected error code while reading HIDIOCGFEATURE: %d", errno); /* remove our bpf program and check that we can now emit commands */ /* detach the program */ detach_bpf(self); self->hidraw_fd = open_hidraw(&self->hid); ASSERT_GE(self->hidraw_fd, 0) TH_LOG("open_hidraw"); err = ioctl(self->hidraw_fd, HIDIOCGFEATURE(sizeof(buf)), buf); ASSERT_GE(err, 0) TH_LOG("error while reading HIDIOCGFEATURE: %d", err); } /* * Call hid_hw_raw_request against the given uhid device, * check that the program is called and can issue the call * to uhid and transform the answer. */ TEST_F(hid_bpf, test_hid_change_raw_request_call) { const struct test_program progs[] = { { .name = "hid_test_hidraw_raw_request" }, }; __u8 buf[10] = {0}; int err; LOAD_PROGRAMS(progs); /* emit hid_hw_raw_request from hidraw */ /* Get Feature */ memset(buf, 0, sizeof(buf)); buf[0] = 0x1; /* Report Number */ err = ioctl(self->hidraw_fd, HIDIOCGFEATURE(sizeof(buf)), buf); ASSERT_EQ(err, 3) TH_LOG("unexpected returned size while reading HIDIOCGFEATURE: %d", err); ASSERT_EQ(buf[0], 2); ASSERT_EQ(buf[1], 3); ASSERT_EQ(buf[2], 4); } /* * Call hid_hw_raw_request against the given uhid device, * check that the program is not making infinite loops. */ TEST_F(hid_bpf, test_hid_infinite_loop_raw_request_call) { const struct test_program progs[] = { { .name = "hid_test_infinite_loop_raw_request" }, }; __u8 buf[10] = {0}; int err; LOAD_PROGRAMS(progs); /* emit hid_hw_raw_request from hidraw */ /* Get Feature */ memset(buf, 0, sizeof(buf)); buf[0] = 0x1; /* Report Number */ err = ioctl(self->hidraw_fd, HIDIOCGFEATURE(sizeof(buf)), buf); ASSERT_EQ(err, 3) TH_LOG("unexpected returned size while reading HIDIOCGFEATURE: %d", err); } /* * Call hid_hw_output_report against the given uhid device, * check that the program is called and prevents the * call to uhid. */ TEST_F(hid_bpf, test_hid_filter_output_report_call) { const struct test_program progs[] = { { .name = "hid_test_filter_output_report" }, }; __u8 buf[10] = {0}; int err; LOAD_PROGRAMS(progs); /* first check that we did not attach to device_event */ /* inject one event */ buf[0] = 1; buf[1] = 42; uhid_send_event(_metadata, &self->hid, buf, 6); /* read the data from hidraw */ memset(buf, 0, sizeof(buf)); err = read(self->hidraw_fd, buf, sizeof(buf)); ASSERT_EQ(err, 6) TH_LOG("read_hidraw"); ASSERT_EQ(buf[0], 1); ASSERT_EQ(buf[1], 42); ASSERT_EQ(buf[2], 0) TH_LOG("leftovers_from_previous_test"); /* now check that our program is preventing hid_hw_output_report() */ buf[0] = 1; /* report ID */ buf[1] = 2; buf[2] = 42; err = write(self->hidraw_fd, buf, 3); ASSERT_LT(err, 0) TH_LOG("unexpected success while sending hid_hw_output_report: %d", err); ASSERT_EQ(errno, 25) TH_LOG("unexpected error code while sending hid_hw_output_report: %d", errno); /* remove our bpf program and check that we can now emit commands */ /* detach the program */ detach_bpf(self); self->hidraw_fd = open_hidraw(&self->hid); ASSERT_GE(self->hidraw_fd, 0) TH_LOG("open_hidraw"); err = write(self->hidraw_fd, buf, 3); ASSERT_GE(err, 0) TH_LOG("error while sending hid_hw_output_report: %d", err); } /* * Call hid_hw_output_report against the given uhid device, * check that the program is called and can issue the call * to uhid and transform the answer. */ TEST_F(hid_bpf, test_hid_change_output_report_call) { const struct test_program progs[] = { { .name = "hid_test_hidraw_output_report" }, }; __u8 buf[10] = {0}; int err; LOAD_PROGRAMS(progs); /* emit hid_hw_output_report from hidraw */ buf[0] = 1; /* report ID */ buf[1] = 2; buf[2] = 42; err = write(self->hidraw_fd, buf, 10); ASSERT_EQ(err, 2) TH_LOG("unexpected returned size while sending hid_hw_output_report: %d", err); } /* * Call hid_hw_output_report against the given uhid device, * check that the program is not making infinite loops. */ TEST_F(hid_bpf, test_hid_infinite_loop_output_report_call) { const struct test_program progs[] = { { .name = "hid_test_infinite_loop_output_report" }, }; __u8 buf[10] = {0}; int err; LOAD_PROGRAMS(progs); /* emit hid_hw_output_report from hidraw */ buf[0] = 1; /* report ID */ buf[1] = 2; buf[2] = 42; err = write(self->hidraw_fd, buf, 8); ASSERT_EQ(err, 2) TH_LOG("unexpected returned size while sending hid_hw_output_report: %d", err); } /* * Attach hid_multiply_event_wq to the given uhid device, * retrieve and open the matching hidraw node, * inject one event in the uhid device, * check that the program sees it and can add extra data */ TEST_F(hid_bpf, test_multiply_events_wq) { const struct test_program progs[] = { { .name = "hid_test_multiply_events_wq" }, }; __u8 buf[10] = {0}; int err; LOAD_PROGRAMS(progs); /* inject one event */ buf[0] = 1; buf[1] = 42; uhid_send_event(_metadata, &self->hid, buf, 6); /* read the data from hidraw */ memset(buf, 0, sizeof(buf)); err = read(self->hidraw_fd, buf, sizeof(buf)); ASSERT_EQ(err, 6) TH_LOG("read_hidraw"); ASSERT_EQ(buf[0], 1); ASSERT_EQ(buf[1], 47); usleep(100000); /* read the data from hidraw */ memset(buf, 0, sizeof(buf)); err = read(self->hidraw_fd, buf, sizeof(buf)); ASSERT_EQ(err, 9) TH_LOG("read_hidraw"); ASSERT_EQ(buf[0], 2); ASSERT_EQ(buf[1], 3); } /* * Attach hid_multiply_event to the given uhid device, * retrieve and open the matching hidraw node, * inject one event in the uhid device, * check that the program sees it and can add extra data */ TEST_F(hid_bpf, test_multiply_events) { const struct test_program progs[] = { { .name = "hid_test_multiply_events" }, }; __u8 buf[10] = {0}; int err; LOAD_PROGRAMS(progs); /* inject one event */ buf[0] = 1; buf[1] = 42; uhid_send_event(_metadata, &self->hid, buf, 6); /* read the data from hidraw */ memset(buf, 0, sizeof(buf)); err = read(self->hidraw_fd, buf, sizeof(buf)); ASSERT_EQ(err, 9) TH_LOG("read_hidraw"); ASSERT_EQ(buf[0], 2); ASSERT_EQ(buf[1], 47); /* read the data from hidraw */ memset(buf, 0, sizeof(buf)); err = read(self->hidraw_fd, buf, sizeof(buf)); ASSERT_EQ(err, 9) TH_LOG("read_hidraw"); ASSERT_EQ(buf[0], 2); ASSERT_EQ(buf[1], 52); } /* * Call hid_bpf_input_report against the given uhid device, * check that the program is not making infinite loops. */ TEST_F(hid_bpf, test_hid_infinite_loop_input_report_call) { const struct test_program progs[] = { { .name = "hid_test_infinite_loop_input_report" }, }; __u8 buf[10] = {0}; int err; LOAD_PROGRAMS(progs); /* emit hid_hw_output_report from hidraw */ buf[0] = 1; /* report ID */ buf[1] = 2; buf[2] = 42; uhid_send_event(_metadata, &self->hid, buf, 6); /* read the data from hidraw */ memset(buf, 0, sizeof(buf)); err = read(self->hidraw_fd, buf, sizeof(buf)); ASSERT_EQ(err, 6) TH_LOG("read_hidraw"); ASSERT_EQ(buf[0], 1); ASSERT_EQ(buf[1], 3); /* read the data from hidraw: hid_bpf_try_input_report should work exactly one time */ memset(buf, 0, sizeof(buf)); err = read(self->hidraw_fd, buf, sizeof(buf)); ASSERT_EQ(err, 6) TH_LOG("read_hidraw"); ASSERT_EQ(buf[0], 1); ASSERT_EQ(buf[1], 4); /* read the data from hidraw: there should be none */ memset(buf, 0, sizeof(buf)); err = read(self->hidraw_fd, buf, sizeof(buf)); ASSERT_EQ(err, -1) TH_LOG("read_hidraw"); } /* * Attach hid_insert{0,1,2} to the given uhid device, * retrieve and open the matching hidraw node, * inject one event in the uhid device, * check that the programs have been inserted in the correct order. */ TEST_F(hid_bpf, test_hid_attach_flags) { const struct test_program progs[] = { { .name = "hid_test_insert2", .insert_head = 0, }, { .name = "hid_test_insert1", .insert_head = 1, }, { .name = "hid_test_insert3", .insert_head = 0, }, }; __u8 buf[10] = {0}; int err; LOAD_PROGRAMS(progs); /* inject one event */ buf[0] = 1; uhid_send_event(_metadata, &self->hid, buf, 6); /* read the data from hidraw */ memset(buf, 0, sizeof(buf)); err = read(self->hidraw_fd, buf, sizeof(buf)); ASSERT_EQ(err, 6) TH_LOG("read_hidraw"); ASSERT_EQ(buf[1], 1); ASSERT_EQ(buf[2], 2); ASSERT_EQ(buf[3], 3); } /* * Attach hid_rdesc_fixup to the given uhid device, * retrieve and open the matching hidraw node, * check that the hidraw report descriptor has been updated. */ TEST_F(hid_bpf, test_rdesc_fixup) { struct hidraw_report_descriptor rpt_desc = {0}; const struct test_program progs[] = { { .name = "hid_rdesc_fixup" }, }; int err, desc_size; LOAD_PROGRAMS(progs); /* check that hid_rdesc_fixup() was executed */ ASSERT_EQ(self->skel->data->callback2_check, 0x21); /* read the exposed report descriptor from hidraw */ err = ioctl(self->hidraw_fd, HIDIOCGRDESCSIZE, &desc_size); ASSERT_GE(err, 0) TH_LOG("error while reading HIDIOCGRDESCSIZE: %d", err); /* ensure the new size of the rdesc is bigger than the old one */ ASSERT_GT(desc_size, sizeof(rdesc)); rpt_desc.size = desc_size; err = ioctl(self->hidraw_fd, HIDIOCGRDESC, &rpt_desc); ASSERT_GE(err, 0) TH_LOG("error while reading HIDIOCGRDESC: %d", err); ASSERT_EQ(rpt_desc.value[4], 0x42); } static int libbpf_print_fn(enum libbpf_print_level level, const char *format, va_list args) { char buf[1024]; if (level == LIBBPF_DEBUG) return 0; snprintf(buf, sizeof(buf), "# %s", format); vfprintf(stdout, buf, args); return 0; } int main(int argc, char **argv) { /* Use libbpf 1.0 API mode */ libbpf_set_strict_mode(LIBBPF_STRICT_ALL); libbpf_set_print(libbpf_print_fn); return test_harness_run(argc, argv); }