1*e8763fb6SViktor Malik // SPDX-License-Identifier: GPL-2.0
2*e8763fb6SViktor Malik /* Copyright (C) 2025 Red Hat, Inc.*/
3*e8763fb6SViktor Malik #include <test_progs.h>
4*e8763fb6SViktor Malik #include "string_kfuncs_success.skel.h"
5*e8763fb6SViktor Malik #include "string_kfuncs_failure1.skel.h"
6*e8763fb6SViktor Malik #include "string_kfuncs_failure2.skel.h"
7*e8763fb6SViktor Malik #include <sys/mman.h>
8*e8763fb6SViktor Malik
9*e8763fb6SViktor Malik static const char * const test_cases[] = {
10*e8763fb6SViktor Malik "strcmp",
11*e8763fb6SViktor Malik "strchr",
12*e8763fb6SViktor Malik "strchrnul",
13*e8763fb6SViktor Malik "strnchr",
14*e8763fb6SViktor Malik "strrchr",
15*e8763fb6SViktor Malik "strlen",
16*e8763fb6SViktor Malik "strnlen",
17*e8763fb6SViktor Malik "strspn_str",
18*e8763fb6SViktor Malik "strspn_accept",
19*e8763fb6SViktor Malik "strcspn_str",
20*e8763fb6SViktor Malik "strcspn_reject",
21*e8763fb6SViktor Malik "strstr",
22*e8763fb6SViktor Malik "strnstr",
23*e8763fb6SViktor Malik };
24*e8763fb6SViktor Malik
run_too_long_tests(void)25*e8763fb6SViktor Malik void run_too_long_tests(void)
26*e8763fb6SViktor Malik {
27*e8763fb6SViktor Malik struct string_kfuncs_failure2 *skel;
28*e8763fb6SViktor Malik struct bpf_program *prog;
29*e8763fb6SViktor Malik char test_name[256];
30*e8763fb6SViktor Malik int err, i;
31*e8763fb6SViktor Malik
32*e8763fb6SViktor Malik skel = string_kfuncs_failure2__open_and_load();
33*e8763fb6SViktor Malik if (!ASSERT_OK_PTR(skel, "string_kfuncs_failure2__open_and_load"))
34*e8763fb6SViktor Malik return;
35*e8763fb6SViktor Malik
36*e8763fb6SViktor Malik memset(skel->bss->long_str, 'a', sizeof(skel->bss->long_str));
37*e8763fb6SViktor Malik
38*e8763fb6SViktor Malik for (i = 0; i < ARRAY_SIZE(test_cases); i++) {
39*e8763fb6SViktor Malik sprintf(test_name, "test_%s_too_long", test_cases[i]);
40*e8763fb6SViktor Malik if (!test__start_subtest(test_name))
41*e8763fb6SViktor Malik continue;
42*e8763fb6SViktor Malik
43*e8763fb6SViktor Malik prog = bpf_object__find_program_by_name(skel->obj, test_name);
44*e8763fb6SViktor Malik if (!ASSERT_OK_PTR(prog, "bpf_object__find_program_by_name"))
45*e8763fb6SViktor Malik goto cleanup;
46*e8763fb6SViktor Malik
47*e8763fb6SViktor Malik LIBBPF_OPTS(bpf_test_run_opts, topts);
48*e8763fb6SViktor Malik err = bpf_prog_test_run_opts(bpf_program__fd(prog), &topts);
49*e8763fb6SViktor Malik if (!ASSERT_OK(err, "bpf_prog_test_run"))
50*e8763fb6SViktor Malik goto cleanup;
51*e8763fb6SViktor Malik
52*e8763fb6SViktor Malik ASSERT_EQ(topts.retval, -E2BIG, "reading too long string fails with -E2BIG");
53*e8763fb6SViktor Malik }
54*e8763fb6SViktor Malik
55*e8763fb6SViktor Malik cleanup:
56*e8763fb6SViktor Malik string_kfuncs_failure2__destroy(skel);
57*e8763fb6SViktor Malik }
58*e8763fb6SViktor Malik
test_string_kfuncs(void)59*e8763fb6SViktor Malik void test_string_kfuncs(void)
60*e8763fb6SViktor Malik {
61*e8763fb6SViktor Malik RUN_TESTS(string_kfuncs_success);
62*e8763fb6SViktor Malik RUN_TESTS(string_kfuncs_failure1);
63*e8763fb6SViktor Malik
64*e8763fb6SViktor Malik run_too_long_tests();
65*e8763fb6SViktor Malik }
66