mirror of
https://mirrors.bfsu.edu.cn/git/linux.git
synced 2024-12-26 04:25:27 +08:00
afef88e655
BPF object files are, in a way, the final artifact produced as part of the ahead-of-time compilation process. That makes them somewhat special compared to "regular" object files, which are a intermediate build artifacts that can typically be removed safely. As such, it can make sense to name them differently to make it easier to spot this difference at a glance. Among others, libbpf-bootstrap [0] has established the extension .bpf.o for BPF object files. It seems reasonable to follow this example and establish the same denomination for selftest build artifacts. To that end, this change adjusts the corresponding part of the build system and the test programs loading BPF object files to work with .bpf.o files. [0] https://github.com/libbpf/libbpf-bootstrap Suggested-by: Andrii Nakryiko <andrii@kernel.org> Signed-off-by: Daniel Müller <deso@posteo.net> Signed-off-by: Daniel Borkmann <daniel@iogearbox.net> Link: https://lore.kernel.org/bpf/20220901222253.1199242-1-deso@posteo.net
178 lines
4.3 KiB
C
178 lines
4.3 KiB
C
// SPDX-License-Identifier: GPL-2.0
|
|
// test ir decoder
|
|
//
|
|
// Copyright (C) 2018 Sean Young <sean@mess.org>
|
|
|
|
// A lirc chardev is a device representing a consumer IR (cir) device which
|
|
// can receive infrared signals from remote control and/or transmit IR.
|
|
//
|
|
// IR is sent as a series of pulses and space somewhat like morse code. The
|
|
// BPF program can decode this into scancodes so that rc-core can translate
|
|
// this into input key codes using the rc keymap.
|
|
//
|
|
// This test works by sending IR over rc-loopback, so the IR is processed by
|
|
// BPF and then decoded into scancodes. The lirc chardev must be the one
|
|
// associated with rc-loopback, see the output of ir-keytable(1).
|
|
//
|
|
// The following CONFIG options must be enabled for the test to succeed:
|
|
// CONFIG_RC_CORE=y
|
|
// CONFIG_BPF_RAWIR_EVENT=y
|
|
// CONFIG_RC_LOOPBACK=y
|
|
|
|
// Steps:
|
|
// 1. Open the /dev/lircN device for rc-loopback (given on command line)
|
|
// 2. Attach bpf_lirc_mode2 program which decodes some IR.
|
|
// 3. Send some IR to the same IR device; since it is loopback, this will
|
|
// end up in the bpf program
|
|
// 4. bpf program should decode IR and report keycode
|
|
// 5. We can read keycode from same /dev/lirc device
|
|
|
|
#include <linux/bpf.h>
|
|
#include <linux/input.h>
|
|
#include <errno.h>
|
|
#include <stdio.h>
|
|
#include <stdlib.h>
|
|
#include <string.h>
|
|
#include <unistd.h>
|
|
#include <poll.h>
|
|
#include <sys/types.h>
|
|
#include <sys/ioctl.h>
|
|
#include <sys/stat.h>
|
|
#include <fcntl.h>
|
|
|
|
#include "bpf_util.h"
|
|
#include <bpf/bpf.h>
|
|
#include <bpf/libbpf.h>
|
|
|
|
#include "testing_helpers.h"
|
|
|
|
int main(int argc, char **argv)
|
|
{
|
|
struct bpf_object *obj;
|
|
int ret, lircfd, progfd, inputfd;
|
|
int testir1 = 0x1dead;
|
|
int testir2 = 0x20101;
|
|
u32 prog_ids[10], prog_flags[10], prog_cnt;
|
|
|
|
if (argc != 3) {
|
|
printf("Usage: %s /dev/lircN /dev/input/eventM\n", argv[0]);
|
|
return 2;
|
|
}
|
|
|
|
ret = bpf_prog_test_load("test_lirc_mode2_kern.bpf.o",
|
|
BPF_PROG_TYPE_LIRC_MODE2, &obj, &progfd);
|
|
if (ret) {
|
|
printf("Failed to load bpf program\n");
|
|
return 1;
|
|
}
|
|
|
|
lircfd = open(argv[1], O_RDWR | O_NONBLOCK);
|
|
if (lircfd == -1) {
|
|
printf("failed to open lirc device %s: %m\n", argv[1]);
|
|
return 1;
|
|
}
|
|
|
|
/* Let's try detach it before it was ever attached */
|
|
ret = bpf_prog_detach2(progfd, lircfd, BPF_LIRC_MODE2);
|
|
if (ret != -1 || errno != ENOENT) {
|
|
printf("bpf_prog_detach2 not attached should fail: %m\n");
|
|
return 1;
|
|
}
|
|
|
|
inputfd = open(argv[2], O_RDONLY | O_NONBLOCK);
|
|
if (inputfd == -1) {
|
|
printf("failed to open input device %s: %m\n", argv[1]);
|
|
return 1;
|
|
}
|
|
|
|
prog_cnt = 10;
|
|
ret = bpf_prog_query(lircfd, BPF_LIRC_MODE2, 0, prog_flags, prog_ids,
|
|
&prog_cnt);
|
|
if (ret) {
|
|
printf("Failed to query bpf programs on lirc device: %m\n");
|
|
return 1;
|
|
}
|
|
|
|
if (prog_cnt != 0) {
|
|
printf("Expected nothing to be attached\n");
|
|
return 1;
|
|
}
|
|
|
|
ret = bpf_prog_attach(progfd, lircfd, BPF_LIRC_MODE2, 0);
|
|
if (ret) {
|
|
printf("Failed to attach bpf to lirc device: %m\n");
|
|
return 1;
|
|
}
|
|
|
|
/* Write raw IR */
|
|
ret = write(lircfd, &testir1, sizeof(testir1));
|
|
if (ret != sizeof(testir1)) {
|
|
printf("Failed to send test IR message: %m\n");
|
|
return 1;
|
|
}
|
|
|
|
struct pollfd pfd = { .fd = inputfd, .events = POLLIN };
|
|
struct input_event event;
|
|
|
|
for (;;) {
|
|
poll(&pfd, 1, 100);
|
|
|
|
/* Read decoded IR */
|
|
ret = read(inputfd, &event, sizeof(event));
|
|
if (ret != sizeof(event)) {
|
|
printf("Failed to read decoded IR: %m\n");
|
|
return 1;
|
|
}
|
|
|
|
if (event.type == EV_MSC && event.code == MSC_SCAN &&
|
|
event.value == 0xdead) {
|
|
break;
|
|
}
|
|
}
|
|
|
|
/* Write raw IR */
|
|
ret = write(lircfd, &testir2, sizeof(testir2));
|
|
if (ret != sizeof(testir2)) {
|
|
printf("Failed to send test IR message: %m\n");
|
|
return 1;
|
|
}
|
|
|
|
for (;;) {
|
|
poll(&pfd, 1, 100);
|
|
|
|
/* Read decoded IR */
|
|
ret = read(inputfd, &event, sizeof(event));
|
|
if (ret != sizeof(event)) {
|
|
printf("Failed to read decoded IR: %m\n");
|
|
return 1;
|
|
}
|
|
|
|
if (event.type == EV_REL && event.code == REL_Y &&
|
|
event.value == 1 ) {
|
|
break;
|
|
}
|
|
}
|
|
|
|
prog_cnt = 10;
|
|
ret = bpf_prog_query(lircfd, BPF_LIRC_MODE2, 0, prog_flags, prog_ids,
|
|
&prog_cnt);
|
|
if (ret) {
|
|
printf("Failed to query bpf programs on lirc device: %m\n");
|
|
return 1;
|
|
}
|
|
|
|
if (prog_cnt != 1) {
|
|
printf("Expected one program to be attached\n");
|
|
return 1;
|
|
}
|
|
|
|
/* Let's try detaching it now it is actually attached */
|
|
ret = bpf_prog_detach2(progfd, lircfd, BPF_LIRC_MODE2);
|
|
if (ret) {
|
|
printf("bpf_prog_detach2: returned %m\n");
|
|
return 1;
|
|
}
|
|
|
|
return 0;
|
|
}
|