xref: /openbmc/linux/mm/kasan/kasan_test.c (revision 0eafff1c5a56893ca9708fb8ff1327a738b242e9)
1f7e01ab8SAndrey Konovalov // SPDX-License-Identifier: GPL-2.0-only
2f7e01ab8SAndrey Konovalov /*
3f7e01ab8SAndrey Konovalov  *
4f7e01ab8SAndrey Konovalov  * Copyright (c) 2014 Samsung Electronics Co., Ltd.
5f7e01ab8SAndrey Konovalov  * Author: Andrey Ryabinin <a.ryabinin@samsung.com>
6f7e01ab8SAndrey Konovalov  */
7f7e01ab8SAndrey Konovalov 
87ce0ea19SAndrey Konovalov #define pr_fmt(fmt) "kasan_test: " fmt
97ce0ea19SAndrey Konovalov 
107ce0ea19SAndrey Konovalov #include <kunit/test.h>
11f7e01ab8SAndrey Konovalov #include <linux/bitops.h>
12f7e01ab8SAndrey Konovalov #include <linux/delay.h>
137ce0ea19SAndrey Konovalov #include <linux/io.h>
14f7e01ab8SAndrey Konovalov #include <linux/kasan.h>
15f7e01ab8SAndrey Konovalov #include <linux/kernel.h>
16f7e01ab8SAndrey Konovalov #include <linux/mm.h>
17f7e01ab8SAndrey Konovalov #include <linux/mman.h>
18f7e01ab8SAndrey Konovalov #include <linux/module.h>
19f7e01ab8SAndrey Konovalov #include <linux/printk.h>
20f7e01ab8SAndrey Konovalov #include <linux/random.h>
217ce0ea19SAndrey Konovalov #include <linux/set_memory.h>
22f7e01ab8SAndrey Konovalov #include <linux/slab.h>
23f7e01ab8SAndrey Konovalov #include <linux/string.h>
247ce0ea19SAndrey Konovalov #include <linux/tracepoint.h>
25f7e01ab8SAndrey Konovalov #include <linux/uaccess.h>
26f7e01ab8SAndrey Konovalov #include <linux/vmalloc.h>
277ce0ea19SAndrey Konovalov #include <trace/events/printk.h>
28f7e01ab8SAndrey Konovalov 
29f7e01ab8SAndrey Konovalov #include <asm/page.h>
30f7e01ab8SAndrey Konovalov 
31f7e01ab8SAndrey Konovalov #include "kasan.h"
32f7e01ab8SAndrey Konovalov 
33f7e01ab8SAndrey Konovalov #define OOB_TAG_OFF (IS_ENABLED(CONFIG_KASAN_GENERIC) ? 0 : KASAN_GRANULE_SIZE)
34f7e01ab8SAndrey Konovalov 
357ce0ea19SAndrey Konovalov static bool multishot;
367ce0ea19SAndrey Konovalov 
377ce0ea19SAndrey Konovalov /* Fields set based on lines observed in the console. */
387ce0ea19SAndrey Konovalov static struct {
397ce0ea19SAndrey Konovalov 	bool report_found;
407ce0ea19SAndrey Konovalov 	bool async_fault;
417ce0ea19SAndrey Konovalov } test_status;
427ce0ea19SAndrey Konovalov 
43f7e01ab8SAndrey Konovalov /*
44f7e01ab8SAndrey Konovalov  * Some tests use these global variables to store return values from function
45f7e01ab8SAndrey Konovalov  * calls that could otherwise be eliminated by the compiler as dead code.
46f7e01ab8SAndrey Konovalov  */
47f7e01ab8SAndrey Konovalov void *kasan_ptr_result;
48f7e01ab8SAndrey Konovalov int kasan_int_result;
49f7e01ab8SAndrey Konovalov 
507ce0ea19SAndrey Konovalov /* Probe for console output: obtains test_status lines of interest. */
517ce0ea19SAndrey Konovalov static void probe_console(void *ignore, const char *buf, size_t len)
527ce0ea19SAndrey Konovalov {
537ce0ea19SAndrey Konovalov 	if (strnstr(buf, "BUG: KASAN: ", len))
547ce0ea19SAndrey Konovalov 		WRITE_ONCE(test_status.report_found, true);
557ce0ea19SAndrey Konovalov 	else if (strnstr(buf, "Asynchronous fault: ", len))
567ce0ea19SAndrey Konovalov 		WRITE_ONCE(test_status.async_fault, true);
577ce0ea19SAndrey Konovalov }
58f7e01ab8SAndrey Konovalov 
597ce0ea19SAndrey Konovalov static void register_tracepoints(struct tracepoint *tp, void *ignore)
607ce0ea19SAndrey Konovalov {
617ce0ea19SAndrey Konovalov 	check_trace_callback_type_console(probe_console);
627ce0ea19SAndrey Konovalov 	if (!strcmp(tp->name, "console"))
637ce0ea19SAndrey Konovalov 		WARN_ON(tracepoint_probe_register(tp, probe_console, NULL));
647ce0ea19SAndrey Konovalov }
657ce0ea19SAndrey Konovalov 
667ce0ea19SAndrey Konovalov static void unregister_tracepoints(struct tracepoint *tp, void *ignore)
677ce0ea19SAndrey Konovalov {
687ce0ea19SAndrey Konovalov 	if (!strcmp(tp->name, "console"))
697ce0ea19SAndrey Konovalov 		tracepoint_probe_unregister(tp, probe_console, NULL);
707ce0ea19SAndrey Konovalov }
717ce0ea19SAndrey Konovalov 
727ce0ea19SAndrey Konovalov static int kasan_suite_init(struct kunit_suite *suite)
73f7e01ab8SAndrey Konovalov {
74f7e01ab8SAndrey Konovalov 	if (!kasan_enabled()) {
757ce0ea19SAndrey Konovalov 		pr_err("Can't run KASAN tests with KASAN disabled");
76f7e01ab8SAndrey Konovalov 		return -1;
77f7e01ab8SAndrey Konovalov 	}
78f7e01ab8SAndrey Konovalov 
79c8c7016fSAndrey Konovalov 	/* Stop failing KUnit tests on KASAN reports. */
80c8c7016fSAndrey Konovalov 	kasan_kunit_test_suite_start();
81c8c7016fSAndrey Konovalov 
827ce0ea19SAndrey Konovalov 	/*
837ce0ea19SAndrey Konovalov 	 * Temporarily enable multi-shot mode. Otherwise, KASAN would only
847ce0ea19SAndrey Konovalov 	 * report the first detected bug and panic the kernel if panic_on_warn
857ce0ea19SAndrey Konovalov 	 * is enabled.
867ce0ea19SAndrey Konovalov 	 */
87f7e01ab8SAndrey Konovalov 	multishot = kasan_save_enable_multi_shot();
887ce0ea19SAndrey Konovalov 
897ce0ea19SAndrey Konovalov 	/*
907ce0ea19SAndrey Konovalov 	 * Because we want to be able to build the test as a module, we need to
917ce0ea19SAndrey Konovalov 	 * iterate through all known tracepoints, since the static registration
927ce0ea19SAndrey Konovalov 	 * won't work here.
937ce0ea19SAndrey Konovalov 	 */
947ce0ea19SAndrey Konovalov 	for_each_kernel_tracepoint(register_tracepoints, NULL);
95f7e01ab8SAndrey Konovalov 	return 0;
96f7e01ab8SAndrey Konovalov }
97f7e01ab8SAndrey Konovalov 
987ce0ea19SAndrey Konovalov static void kasan_suite_exit(struct kunit_suite *suite)
997ce0ea19SAndrey Konovalov {
100c8c7016fSAndrey Konovalov 	kasan_kunit_test_suite_end();
1017ce0ea19SAndrey Konovalov 	kasan_restore_multi_shot(multishot);
1027ce0ea19SAndrey Konovalov 	for_each_kernel_tracepoint(unregister_tracepoints, NULL);
1037ce0ea19SAndrey Konovalov 	tracepoint_synchronize_unregister();
1047ce0ea19SAndrey Konovalov }
1057ce0ea19SAndrey Konovalov 
106f7e01ab8SAndrey Konovalov static void kasan_test_exit(struct kunit *test)
107f7e01ab8SAndrey Konovalov {
1087ce0ea19SAndrey Konovalov 	KUNIT_EXPECT_FALSE(test, READ_ONCE(test_status.report_found));
109f7e01ab8SAndrey Konovalov }
110f7e01ab8SAndrey Konovalov 
111f7e01ab8SAndrey Konovalov /**
112f7e01ab8SAndrey Konovalov  * KUNIT_EXPECT_KASAN_FAIL() - check that the executed expression produces a
113f7e01ab8SAndrey Konovalov  * KASAN report; causes a test failure otherwise. This relies on a KUnit
114f7e01ab8SAndrey Konovalov  * resource named "kasan_status". Do not use this name for KUnit resources
115f7e01ab8SAndrey Konovalov  * outside of KASAN tests.
116f7e01ab8SAndrey Konovalov  *
117f7e01ab8SAndrey Konovalov  * For hardware tag-based KASAN, when a synchronous tag fault happens, tag
118f7e01ab8SAndrey Konovalov  * checking is auto-disabled. When this happens, this test handler reenables
119f7e01ab8SAndrey Konovalov  * tag checking. As tag checking can be only disabled or enabled per CPU,
120f7e01ab8SAndrey Konovalov  * this handler disables migration (preemption).
121f7e01ab8SAndrey Konovalov  *
122f7e01ab8SAndrey Konovalov  * Since the compiler doesn't see that the expression can change the test_status
123f7e01ab8SAndrey Konovalov  * fields, it can reorder or optimize away the accesses to those fields.
124f7e01ab8SAndrey Konovalov  * Use READ/WRITE_ONCE() for the accesses and compiler barriers around the
125f7e01ab8SAndrey Konovalov  * expression to prevent that.
126f7e01ab8SAndrey Konovalov  *
127f7e01ab8SAndrey Konovalov  * In between KUNIT_EXPECT_KASAN_FAIL checks, test_status.report_found is kept
128f7e01ab8SAndrey Konovalov  * as false. This allows detecting KASAN reports that happen outside of the
129f7e01ab8SAndrey Konovalov  * checks by asserting !test_status.report_found at the start of
130f7e01ab8SAndrey Konovalov  * KUNIT_EXPECT_KASAN_FAIL and in kasan_test_exit.
131f7e01ab8SAndrey Konovalov  */
132f7e01ab8SAndrey Konovalov #define KUNIT_EXPECT_KASAN_FAIL(test, expression) do {			\
133f7e01ab8SAndrey Konovalov 	if (IS_ENABLED(CONFIG_KASAN_HW_TAGS) &&				\
134f7e01ab8SAndrey Konovalov 	    kasan_sync_fault_possible())				\
135f7e01ab8SAndrey Konovalov 		migrate_disable();					\
136f7e01ab8SAndrey Konovalov 	KUNIT_EXPECT_FALSE(test, READ_ONCE(test_status.report_found));	\
137f7e01ab8SAndrey Konovalov 	barrier();							\
138f7e01ab8SAndrey Konovalov 	expression;							\
139f7e01ab8SAndrey Konovalov 	barrier();							\
140f7e01ab8SAndrey Konovalov 	if (kasan_async_fault_possible())				\
141f7e01ab8SAndrey Konovalov 		kasan_force_async_fault();				\
142f7e01ab8SAndrey Konovalov 	if (!READ_ONCE(test_status.report_found)) {			\
143f7e01ab8SAndrey Konovalov 		KUNIT_FAIL(test, KUNIT_SUBTEST_INDENT "KASAN failure "	\
144f7e01ab8SAndrey Konovalov 				"expected in \"" #expression		\
145f7e01ab8SAndrey Konovalov 				 "\", but none occurred");		\
146f7e01ab8SAndrey Konovalov 	}								\
147f7e01ab8SAndrey Konovalov 	if (IS_ENABLED(CONFIG_KASAN_HW_TAGS) &&				\
148f7e01ab8SAndrey Konovalov 	    kasan_sync_fault_possible()) {				\
149f7e01ab8SAndrey Konovalov 		if (READ_ONCE(test_status.report_found) &&		\
1507ce0ea19SAndrey Konovalov 		    !READ_ONCE(test_status.async_fault))		\
151*0eafff1cSAndrey Konovalov 			kasan_enable_hw_tags();				\
152f7e01ab8SAndrey Konovalov 		migrate_enable();					\
153f7e01ab8SAndrey Konovalov 	}								\
154f7e01ab8SAndrey Konovalov 	WRITE_ONCE(test_status.report_found, false);			\
1557ce0ea19SAndrey Konovalov 	WRITE_ONCE(test_status.async_fault, false);			\
156f7e01ab8SAndrey Konovalov } while (0)
157f7e01ab8SAndrey Konovalov 
158f7e01ab8SAndrey Konovalov #define KASAN_TEST_NEEDS_CONFIG_ON(test, config) do {			\
159f7e01ab8SAndrey Konovalov 	if (!IS_ENABLED(config))					\
160f7e01ab8SAndrey Konovalov 		kunit_skip((test), "Test requires " #config "=y");	\
161f7e01ab8SAndrey Konovalov } while (0)
162f7e01ab8SAndrey Konovalov 
163f7e01ab8SAndrey Konovalov #define KASAN_TEST_NEEDS_CONFIG_OFF(test, config) do {			\
164f7e01ab8SAndrey Konovalov 	if (IS_ENABLED(config))						\
165f7e01ab8SAndrey Konovalov 		kunit_skip((test), "Test requires " #config "=n");	\
166f7e01ab8SAndrey Konovalov } while (0)
167f7e01ab8SAndrey Konovalov 
16885f195b1SMarco Elver #define KASAN_TEST_NEEDS_CHECKED_MEMINTRINSICS(test) do {		\
16985f195b1SMarco Elver 	if (IS_ENABLED(CONFIG_KASAN_HW_TAGS))				\
17085f195b1SMarco Elver 		break;  /* No compiler instrumentation. */		\
17185f195b1SMarco Elver 	if (IS_ENABLED(CONFIG_CC_HAS_KASAN_MEMINTRINSIC_PREFIX))	\
17285f195b1SMarco Elver 		break;  /* Should always be instrumented! */		\
17385f195b1SMarco Elver 	if (IS_ENABLED(CONFIG_GENERIC_ENTRY))				\
17485f195b1SMarco Elver 		kunit_skip((test), "Test requires checked mem*()");	\
17585f195b1SMarco Elver } while (0)
17685f195b1SMarco Elver 
177f7e01ab8SAndrey Konovalov static void kmalloc_oob_right(struct kunit *test)
178f7e01ab8SAndrey Konovalov {
179f7e01ab8SAndrey Konovalov 	char *ptr;
180f7e01ab8SAndrey Konovalov 	size_t size = 128 - KASAN_GRANULE_SIZE - 5;
181f7e01ab8SAndrey Konovalov 
182f7e01ab8SAndrey Konovalov 	ptr = kmalloc(size, GFP_KERNEL);
183f7e01ab8SAndrey Konovalov 	KUNIT_ASSERT_NOT_ERR_OR_NULL(test, ptr);
184f7e01ab8SAndrey Konovalov 
185f7e01ab8SAndrey Konovalov 	OPTIMIZER_HIDE_VAR(ptr);
186f7e01ab8SAndrey Konovalov 	/*
187f7e01ab8SAndrey Konovalov 	 * An unaligned access past the requested kmalloc size.
188f7e01ab8SAndrey Konovalov 	 * Only generic KASAN can precisely detect these.
189f7e01ab8SAndrey Konovalov 	 */
190f7e01ab8SAndrey Konovalov 	if (IS_ENABLED(CONFIG_KASAN_GENERIC))
191f7e01ab8SAndrey Konovalov 		KUNIT_EXPECT_KASAN_FAIL(test, ptr[size] = 'x');
192f7e01ab8SAndrey Konovalov 
193f7e01ab8SAndrey Konovalov 	/*
194f7e01ab8SAndrey Konovalov 	 * An aligned access into the first out-of-bounds granule that falls
195f7e01ab8SAndrey Konovalov 	 * within the aligned kmalloc object.
196f7e01ab8SAndrey Konovalov 	 */
197f7e01ab8SAndrey Konovalov 	KUNIT_EXPECT_KASAN_FAIL(test, ptr[size + 5] = 'y');
198f7e01ab8SAndrey Konovalov 
199f7e01ab8SAndrey Konovalov 	/* Out-of-bounds access past the aligned kmalloc object. */
200f7e01ab8SAndrey Konovalov 	KUNIT_EXPECT_KASAN_FAIL(test, ptr[0] =
201f7e01ab8SAndrey Konovalov 					ptr[size + KASAN_GRANULE_SIZE + 5]);
202f7e01ab8SAndrey Konovalov 
203f7e01ab8SAndrey Konovalov 	kfree(ptr);
204f7e01ab8SAndrey Konovalov }
205f7e01ab8SAndrey Konovalov 
206f7e01ab8SAndrey Konovalov static void kmalloc_oob_left(struct kunit *test)
207f7e01ab8SAndrey Konovalov {
208f7e01ab8SAndrey Konovalov 	char *ptr;
209f7e01ab8SAndrey Konovalov 	size_t size = 15;
210f7e01ab8SAndrey Konovalov 
211f7e01ab8SAndrey Konovalov 	ptr = kmalloc(size, GFP_KERNEL);
212f7e01ab8SAndrey Konovalov 	KUNIT_ASSERT_NOT_ERR_OR_NULL(test, ptr);
213f7e01ab8SAndrey Konovalov 
214f7e01ab8SAndrey Konovalov 	OPTIMIZER_HIDE_VAR(ptr);
215f7e01ab8SAndrey Konovalov 	KUNIT_EXPECT_KASAN_FAIL(test, *ptr = *(ptr - 1));
216f7e01ab8SAndrey Konovalov 	kfree(ptr);
217f7e01ab8SAndrey Konovalov }
218f7e01ab8SAndrey Konovalov 
219f7e01ab8SAndrey Konovalov static void kmalloc_node_oob_right(struct kunit *test)
220f7e01ab8SAndrey Konovalov {
221f7e01ab8SAndrey Konovalov 	char *ptr;
222f7e01ab8SAndrey Konovalov 	size_t size = 4096;
223f7e01ab8SAndrey Konovalov 
224f7e01ab8SAndrey Konovalov 	ptr = kmalloc_node(size, GFP_KERNEL, 0);
225f7e01ab8SAndrey Konovalov 	KUNIT_ASSERT_NOT_ERR_OR_NULL(test, ptr);
226f7e01ab8SAndrey Konovalov 
227f7e01ab8SAndrey Konovalov 	OPTIMIZER_HIDE_VAR(ptr);
228f7e01ab8SAndrey Konovalov 	KUNIT_EXPECT_KASAN_FAIL(test, ptr[0] = ptr[size]);
229f7e01ab8SAndrey Konovalov 	kfree(ptr);
230f7e01ab8SAndrey Konovalov }
231f7e01ab8SAndrey Konovalov 
232f7e01ab8SAndrey Konovalov /*
233f7e01ab8SAndrey Konovalov  * These kmalloc_pagealloc_* tests try allocating a memory chunk that doesn't
234f7e01ab8SAndrey Konovalov  * fit into a slab cache and therefore is allocated via the page allocator
235f7e01ab8SAndrey Konovalov  * fallback. Since this kind of fallback is only implemented for SLUB, these
236f7e01ab8SAndrey Konovalov  * tests are limited to that allocator.
237f7e01ab8SAndrey Konovalov  */
238f7e01ab8SAndrey Konovalov static void kmalloc_pagealloc_oob_right(struct kunit *test)
239f7e01ab8SAndrey Konovalov {
240f7e01ab8SAndrey Konovalov 	char *ptr;
241f7e01ab8SAndrey Konovalov 	size_t size = KMALLOC_MAX_CACHE_SIZE + 10;
242f7e01ab8SAndrey Konovalov 
243f7e01ab8SAndrey Konovalov 	KASAN_TEST_NEEDS_CONFIG_ON(test, CONFIG_SLUB);
244f7e01ab8SAndrey Konovalov 
245f7e01ab8SAndrey Konovalov 	ptr = kmalloc(size, GFP_KERNEL);
246f7e01ab8SAndrey Konovalov 	KUNIT_ASSERT_NOT_ERR_OR_NULL(test, ptr);
247f7e01ab8SAndrey Konovalov 
248f7e01ab8SAndrey Konovalov 	OPTIMIZER_HIDE_VAR(ptr);
249f7e01ab8SAndrey Konovalov 	KUNIT_EXPECT_KASAN_FAIL(test, ptr[size + OOB_TAG_OFF] = 0);
250f7e01ab8SAndrey Konovalov 
251f7e01ab8SAndrey Konovalov 	kfree(ptr);
252f7e01ab8SAndrey Konovalov }
253f7e01ab8SAndrey Konovalov 
254f7e01ab8SAndrey Konovalov static void kmalloc_pagealloc_uaf(struct kunit *test)
255f7e01ab8SAndrey Konovalov {
256f7e01ab8SAndrey Konovalov 	char *ptr;
257f7e01ab8SAndrey Konovalov 	size_t size = KMALLOC_MAX_CACHE_SIZE + 10;
258f7e01ab8SAndrey Konovalov 
259f7e01ab8SAndrey Konovalov 	KASAN_TEST_NEEDS_CONFIG_ON(test, CONFIG_SLUB);
260f7e01ab8SAndrey Konovalov 
261f7e01ab8SAndrey Konovalov 	ptr = kmalloc(size, GFP_KERNEL);
262f7e01ab8SAndrey Konovalov 	KUNIT_ASSERT_NOT_ERR_OR_NULL(test, ptr);
263f7e01ab8SAndrey Konovalov 	kfree(ptr);
264f7e01ab8SAndrey Konovalov 
265f7e01ab8SAndrey Konovalov 	KUNIT_EXPECT_KASAN_FAIL(test, ((volatile char *)ptr)[0]);
266f7e01ab8SAndrey Konovalov }
267f7e01ab8SAndrey Konovalov 
268f7e01ab8SAndrey Konovalov static void kmalloc_pagealloc_invalid_free(struct kunit *test)
269f7e01ab8SAndrey Konovalov {
270f7e01ab8SAndrey Konovalov 	char *ptr;
271f7e01ab8SAndrey Konovalov 	size_t size = KMALLOC_MAX_CACHE_SIZE + 10;
272f7e01ab8SAndrey Konovalov 
273f7e01ab8SAndrey Konovalov 	KASAN_TEST_NEEDS_CONFIG_ON(test, CONFIG_SLUB);
274f7e01ab8SAndrey Konovalov 
275f7e01ab8SAndrey Konovalov 	ptr = kmalloc(size, GFP_KERNEL);
276f7e01ab8SAndrey Konovalov 	KUNIT_ASSERT_NOT_ERR_OR_NULL(test, ptr);
277f7e01ab8SAndrey Konovalov 
278f7e01ab8SAndrey Konovalov 	KUNIT_EXPECT_KASAN_FAIL(test, kfree(ptr + 1));
279f7e01ab8SAndrey Konovalov }
280f7e01ab8SAndrey Konovalov 
281f7e01ab8SAndrey Konovalov static void pagealloc_oob_right(struct kunit *test)
282f7e01ab8SAndrey Konovalov {
283f7e01ab8SAndrey Konovalov 	char *ptr;
284f7e01ab8SAndrey Konovalov 	struct page *pages;
285f7e01ab8SAndrey Konovalov 	size_t order = 4;
286f7e01ab8SAndrey Konovalov 	size_t size = (1UL << (PAGE_SHIFT + order));
287f7e01ab8SAndrey Konovalov 
288f7e01ab8SAndrey Konovalov 	/*
289f7e01ab8SAndrey Konovalov 	 * With generic KASAN page allocations have no redzones, thus
290f7e01ab8SAndrey Konovalov 	 * out-of-bounds detection is not guaranteed.
291f7e01ab8SAndrey Konovalov 	 * See https://bugzilla.kernel.org/show_bug.cgi?id=210503.
292f7e01ab8SAndrey Konovalov 	 */
293f7e01ab8SAndrey Konovalov 	KASAN_TEST_NEEDS_CONFIG_OFF(test, CONFIG_KASAN_GENERIC);
294f7e01ab8SAndrey Konovalov 
295f7e01ab8SAndrey Konovalov 	pages = alloc_pages(GFP_KERNEL, order);
296f7e01ab8SAndrey Konovalov 	ptr = page_address(pages);
297f7e01ab8SAndrey Konovalov 	KUNIT_ASSERT_NOT_ERR_OR_NULL(test, ptr);
298f7e01ab8SAndrey Konovalov 
299f7e01ab8SAndrey Konovalov 	KUNIT_EXPECT_KASAN_FAIL(test, ptr[0] = ptr[size]);
300f7e01ab8SAndrey Konovalov 	free_pages((unsigned long)ptr, order);
301f7e01ab8SAndrey Konovalov }
302f7e01ab8SAndrey Konovalov 
303f7e01ab8SAndrey Konovalov static void pagealloc_uaf(struct kunit *test)
304f7e01ab8SAndrey Konovalov {
305f7e01ab8SAndrey Konovalov 	char *ptr;
306f7e01ab8SAndrey Konovalov 	struct page *pages;
307f7e01ab8SAndrey Konovalov 	size_t order = 4;
308f7e01ab8SAndrey Konovalov 
309f7e01ab8SAndrey Konovalov 	pages = alloc_pages(GFP_KERNEL, order);
310f7e01ab8SAndrey Konovalov 	ptr = page_address(pages);
311f7e01ab8SAndrey Konovalov 	KUNIT_ASSERT_NOT_ERR_OR_NULL(test, ptr);
312f7e01ab8SAndrey Konovalov 	free_pages((unsigned long)ptr, order);
313f7e01ab8SAndrey Konovalov 
314f7e01ab8SAndrey Konovalov 	KUNIT_EXPECT_KASAN_FAIL(test, ((volatile char *)ptr)[0]);
315f7e01ab8SAndrey Konovalov }
316f7e01ab8SAndrey Konovalov 
317f7e01ab8SAndrey Konovalov static void kmalloc_large_oob_right(struct kunit *test)
318f7e01ab8SAndrey Konovalov {
319f7e01ab8SAndrey Konovalov 	char *ptr;
320f7e01ab8SAndrey Konovalov 	size_t size = KMALLOC_MAX_CACHE_SIZE - 256;
321f7e01ab8SAndrey Konovalov 
322f7e01ab8SAndrey Konovalov 	/*
323f7e01ab8SAndrey Konovalov 	 * Allocate a chunk that is large enough, but still fits into a slab
324f7e01ab8SAndrey Konovalov 	 * and does not trigger the page allocator fallback in SLUB.
325f7e01ab8SAndrey Konovalov 	 */
326f7e01ab8SAndrey Konovalov 	ptr = kmalloc(size, GFP_KERNEL);
327f7e01ab8SAndrey Konovalov 	KUNIT_ASSERT_NOT_ERR_OR_NULL(test, ptr);
328f7e01ab8SAndrey Konovalov 
329f7e01ab8SAndrey Konovalov 	OPTIMIZER_HIDE_VAR(ptr);
330f7e01ab8SAndrey Konovalov 	KUNIT_EXPECT_KASAN_FAIL(test, ptr[size] = 0);
331f7e01ab8SAndrey Konovalov 	kfree(ptr);
332f7e01ab8SAndrey Konovalov }
333f7e01ab8SAndrey Konovalov 
334f7e01ab8SAndrey Konovalov static void krealloc_more_oob_helper(struct kunit *test,
335f7e01ab8SAndrey Konovalov 					size_t size1, size_t size2)
336f7e01ab8SAndrey Konovalov {
337f7e01ab8SAndrey Konovalov 	char *ptr1, *ptr2;
338f7e01ab8SAndrey Konovalov 	size_t middle;
339f7e01ab8SAndrey Konovalov 
340f7e01ab8SAndrey Konovalov 	KUNIT_ASSERT_LT(test, size1, size2);
341f7e01ab8SAndrey Konovalov 	middle = size1 + (size2 - size1) / 2;
342f7e01ab8SAndrey Konovalov 
343f7e01ab8SAndrey Konovalov 	ptr1 = kmalloc(size1, GFP_KERNEL);
344f7e01ab8SAndrey Konovalov 	KUNIT_ASSERT_NOT_ERR_OR_NULL(test, ptr1);
345f7e01ab8SAndrey Konovalov 
346f7e01ab8SAndrey Konovalov 	ptr2 = krealloc(ptr1, size2, GFP_KERNEL);
347f7e01ab8SAndrey Konovalov 	KUNIT_ASSERT_NOT_ERR_OR_NULL(test, ptr2);
348f7e01ab8SAndrey Konovalov 
349d6e5040bSAndrey Konovalov 	/* Suppress -Warray-bounds warnings. */
350d6e5040bSAndrey Konovalov 	OPTIMIZER_HIDE_VAR(ptr2);
351d6e5040bSAndrey Konovalov 
352f7e01ab8SAndrey Konovalov 	/* All offsets up to size2 must be accessible. */
353f7e01ab8SAndrey Konovalov 	ptr2[size1 - 1] = 'x';
354f7e01ab8SAndrey Konovalov 	ptr2[size1] = 'x';
355f7e01ab8SAndrey Konovalov 	ptr2[middle] = 'x';
356f7e01ab8SAndrey Konovalov 	ptr2[size2 - 1] = 'x';
357f7e01ab8SAndrey Konovalov 
358f7e01ab8SAndrey Konovalov 	/* Generic mode is precise, so unaligned size2 must be inaccessible. */
359f7e01ab8SAndrey Konovalov 	if (IS_ENABLED(CONFIG_KASAN_GENERIC))
360f7e01ab8SAndrey Konovalov 		KUNIT_EXPECT_KASAN_FAIL(test, ptr2[size2] = 'x');
361f7e01ab8SAndrey Konovalov 
362f7e01ab8SAndrey Konovalov 	/* For all modes first aligned offset after size2 must be inaccessible. */
363f7e01ab8SAndrey Konovalov 	KUNIT_EXPECT_KASAN_FAIL(test,
364f7e01ab8SAndrey Konovalov 		ptr2[round_up(size2, KASAN_GRANULE_SIZE)] = 'x');
365f7e01ab8SAndrey Konovalov 
366f7e01ab8SAndrey Konovalov 	kfree(ptr2);
367f7e01ab8SAndrey Konovalov }
368f7e01ab8SAndrey Konovalov 
369f7e01ab8SAndrey Konovalov static void krealloc_less_oob_helper(struct kunit *test,
370f7e01ab8SAndrey Konovalov 					size_t size1, size_t size2)
371f7e01ab8SAndrey Konovalov {
372f7e01ab8SAndrey Konovalov 	char *ptr1, *ptr2;
373f7e01ab8SAndrey Konovalov 	size_t middle;
374f7e01ab8SAndrey Konovalov 
375f7e01ab8SAndrey Konovalov 	KUNIT_ASSERT_LT(test, size2, size1);
376f7e01ab8SAndrey Konovalov 	middle = size2 + (size1 - size2) / 2;
377f7e01ab8SAndrey Konovalov 
378f7e01ab8SAndrey Konovalov 	ptr1 = kmalloc(size1, GFP_KERNEL);
379f7e01ab8SAndrey Konovalov 	KUNIT_ASSERT_NOT_ERR_OR_NULL(test, ptr1);
380f7e01ab8SAndrey Konovalov 
381f7e01ab8SAndrey Konovalov 	ptr2 = krealloc(ptr1, size2, GFP_KERNEL);
382f7e01ab8SAndrey Konovalov 	KUNIT_ASSERT_NOT_ERR_OR_NULL(test, ptr2);
383f7e01ab8SAndrey Konovalov 
384d6e5040bSAndrey Konovalov 	/* Suppress -Warray-bounds warnings. */
385d6e5040bSAndrey Konovalov 	OPTIMIZER_HIDE_VAR(ptr2);
386d6e5040bSAndrey Konovalov 
387f7e01ab8SAndrey Konovalov 	/* Must be accessible for all modes. */
388f7e01ab8SAndrey Konovalov 	ptr2[size2 - 1] = 'x';
389f7e01ab8SAndrey Konovalov 
390f7e01ab8SAndrey Konovalov 	/* Generic mode is precise, so unaligned size2 must be inaccessible. */
391f7e01ab8SAndrey Konovalov 	if (IS_ENABLED(CONFIG_KASAN_GENERIC))
392f7e01ab8SAndrey Konovalov 		KUNIT_EXPECT_KASAN_FAIL(test, ptr2[size2] = 'x');
393f7e01ab8SAndrey Konovalov 
394f7e01ab8SAndrey Konovalov 	/* For all modes first aligned offset after size2 must be inaccessible. */
395f7e01ab8SAndrey Konovalov 	KUNIT_EXPECT_KASAN_FAIL(test,
396f7e01ab8SAndrey Konovalov 		ptr2[round_up(size2, KASAN_GRANULE_SIZE)] = 'x');
397f7e01ab8SAndrey Konovalov 
398f7e01ab8SAndrey Konovalov 	/*
399f7e01ab8SAndrey Konovalov 	 * For all modes all size2, middle, and size1 should land in separate
400f7e01ab8SAndrey Konovalov 	 * granules and thus the latter two offsets should be inaccessible.
401f7e01ab8SAndrey Konovalov 	 */
402f7e01ab8SAndrey Konovalov 	KUNIT_EXPECT_LE(test, round_up(size2, KASAN_GRANULE_SIZE),
403f7e01ab8SAndrey Konovalov 				round_down(middle, KASAN_GRANULE_SIZE));
404f7e01ab8SAndrey Konovalov 	KUNIT_EXPECT_LE(test, round_up(middle, KASAN_GRANULE_SIZE),
405f7e01ab8SAndrey Konovalov 				round_down(size1, KASAN_GRANULE_SIZE));
406f7e01ab8SAndrey Konovalov 	KUNIT_EXPECT_KASAN_FAIL(test, ptr2[middle] = 'x');
407f7e01ab8SAndrey Konovalov 	KUNIT_EXPECT_KASAN_FAIL(test, ptr2[size1 - 1] = 'x');
408f7e01ab8SAndrey Konovalov 	KUNIT_EXPECT_KASAN_FAIL(test, ptr2[size1] = 'x');
409f7e01ab8SAndrey Konovalov 
410f7e01ab8SAndrey Konovalov 	kfree(ptr2);
411f7e01ab8SAndrey Konovalov }
412f7e01ab8SAndrey Konovalov 
413f7e01ab8SAndrey Konovalov static void krealloc_more_oob(struct kunit *test)
414f7e01ab8SAndrey Konovalov {
415f7e01ab8SAndrey Konovalov 	krealloc_more_oob_helper(test, 201, 235);
416f7e01ab8SAndrey Konovalov }
417f7e01ab8SAndrey Konovalov 
418f7e01ab8SAndrey Konovalov static void krealloc_less_oob(struct kunit *test)
419f7e01ab8SAndrey Konovalov {
420f7e01ab8SAndrey Konovalov 	krealloc_less_oob_helper(test, 235, 201);
421f7e01ab8SAndrey Konovalov }
422f7e01ab8SAndrey Konovalov 
423f7e01ab8SAndrey Konovalov static void krealloc_pagealloc_more_oob(struct kunit *test)
424f7e01ab8SAndrey Konovalov {
425f7e01ab8SAndrey Konovalov 	/* page_alloc fallback in only implemented for SLUB. */
426f7e01ab8SAndrey Konovalov 	KASAN_TEST_NEEDS_CONFIG_ON(test, CONFIG_SLUB);
427f7e01ab8SAndrey Konovalov 
428f7e01ab8SAndrey Konovalov 	krealloc_more_oob_helper(test, KMALLOC_MAX_CACHE_SIZE + 201,
429f7e01ab8SAndrey Konovalov 					KMALLOC_MAX_CACHE_SIZE + 235);
430f7e01ab8SAndrey Konovalov }
431f7e01ab8SAndrey Konovalov 
432f7e01ab8SAndrey Konovalov static void krealloc_pagealloc_less_oob(struct kunit *test)
433f7e01ab8SAndrey Konovalov {
434f7e01ab8SAndrey Konovalov 	/* page_alloc fallback in only implemented for SLUB. */
435f7e01ab8SAndrey Konovalov 	KASAN_TEST_NEEDS_CONFIG_ON(test, CONFIG_SLUB);
436f7e01ab8SAndrey Konovalov 
437f7e01ab8SAndrey Konovalov 	krealloc_less_oob_helper(test, KMALLOC_MAX_CACHE_SIZE + 235,
438f7e01ab8SAndrey Konovalov 					KMALLOC_MAX_CACHE_SIZE + 201);
439f7e01ab8SAndrey Konovalov }
440f7e01ab8SAndrey Konovalov 
441f7e01ab8SAndrey Konovalov /*
442f7e01ab8SAndrey Konovalov  * Check that krealloc() detects a use-after-free, returns NULL,
443f7e01ab8SAndrey Konovalov  * and doesn't unpoison the freed object.
444f7e01ab8SAndrey Konovalov  */
445f7e01ab8SAndrey Konovalov static void krealloc_uaf(struct kunit *test)
446f7e01ab8SAndrey Konovalov {
447f7e01ab8SAndrey Konovalov 	char *ptr1, *ptr2;
448f7e01ab8SAndrey Konovalov 	int size1 = 201;
449f7e01ab8SAndrey Konovalov 	int size2 = 235;
450f7e01ab8SAndrey Konovalov 
451f7e01ab8SAndrey Konovalov 	ptr1 = kmalloc(size1, GFP_KERNEL);
452f7e01ab8SAndrey Konovalov 	KUNIT_ASSERT_NOT_ERR_OR_NULL(test, ptr1);
453f7e01ab8SAndrey Konovalov 	kfree(ptr1);
454f7e01ab8SAndrey Konovalov 
455f7e01ab8SAndrey Konovalov 	KUNIT_EXPECT_KASAN_FAIL(test, ptr2 = krealloc(ptr1, size2, GFP_KERNEL));
456f7e01ab8SAndrey Konovalov 	KUNIT_ASSERT_NULL(test, ptr2);
457f7e01ab8SAndrey Konovalov 	KUNIT_EXPECT_KASAN_FAIL(test, *(volatile char *)ptr1);
458f7e01ab8SAndrey Konovalov }
459f7e01ab8SAndrey Konovalov 
460f7e01ab8SAndrey Konovalov static void kmalloc_oob_16(struct kunit *test)
461f7e01ab8SAndrey Konovalov {
462f7e01ab8SAndrey Konovalov 	struct {
463f7e01ab8SAndrey Konovalov 		u64 words[2];
464f7e01ab8SAndrey Konovalov 	} *ptr1, *ptr2;
465f7e01ab8SAndrey Konovalov 
46685f195b1SMarco Elver 	KASAN_TEST_NEEDS_CHECKED_MEMINTRINSICS(test);
46785f195b1SMarco Elver 
468f7e01ab8SAndrey Konovalov 	/* This test is specifically crafted for the generic mode. */
469f7e01ab8SAndrey Konovalov 	KASAN_TEST_NEEDS_CONFIG_ON(test, CONFIG_KASAN_GENERIC);
470f7e01ab8SAndrey Konovalov 
471f7e01ab8SAndrey Konovalov 	ptr1 = kmalloc(sizeof(*ptr1) - 3, GFP_KERNEL);
472f7e01ab8SAndrey Konovalov 	KUNIT_ASSERT_NOT_ERR_OR_NULL(test, ptr1);
473f7e01ab8SAndrey Konovalov 
474f7e01ab8SAndrey Konovalov 	ptr2 = kmalloc(sizeof(*ptr2), GFP_KERNEL);
475f7e01ab8SAndrey Konovalov 	KUNIT_ASSERT_NOT_ERR_OR_NULL(test, ptr2);
476f7e01ab8SAndrey Konovalov 
477f7e01ab8SAndrey Konovalov 	OPTIMIZER_HIDE_VAR(ptr1);
478f7e01ab8SAndrey Konovalov 	OPTIMIZER_HIDE_VAR(ptr2);
479f7e01ab8SAndrey Konovalov 	KUNIT_EXPECT_KASAN_FAIL(test, *ptr1 = *ptr2);
480f7e01ab8SAndrey Konovalov 	kfree(ptr1);
481f7e01ab8SAndrey Konovalov 	kfree(ptr2);
482f7e01ab8SAndrey Konovalov }
483f7e01ab8SAndrey Konovalov 
484f7e01ab8SAndrey Konovalov static void kmalloc_uaf_16(struct kunit *test)
485f7e01ab8SAndrey Konovalov {
486f7e01ab8SAndrey Konovalov 	struct {
487f7e01ab8SAndrey Konovalov 		u64 words[2];
488f7e01ab8SAndrey Konovalov 	} *ptr1, *ptr2;
489f7e01ab8SAndrey Konovalov 
49085f195b1SMarco Elver 	KASAN_TEST_NEEDS_CHECKED_MEMINTRINSICS(test);
49185f195b1SMarco Elver 
492f7e01ab8SAndrey Konovalov 	ptr1 = kmalloc(sizeof(*ptr1), GFP_KERNEL);
493f7e01ab8SAndrey Konovalov 	KUNIT_ASSERT_NOT_ERR_OR_NULL(test, ptr1);
494f7e01ab8SAndrey Konovalov 
495f7e01ab8SAndrey Konovalov 	ptr2 = kmalloc(sizeof(*ptr2), GFP_KERNEL);
496f7e01ab8SAndrey Konovalov 	KUNIT_ASSERT_NOT_ERR_OR_NULL(test, ptr2);
497f7e01ab8SAndrey Konovalov 	kfree(ptr2);
498f7e01ab8SAndrey Konovalov 
499f7e01ab8SAndrey Konovalov 	KUNIT_EXPECT_KASAN_FAIL(test, *ptr1 = *ptr2);
500f7e01ab8SAndrey Konovalov 	kfree(ptr1);
501f7e01ab8SAndrey Konovalov }
502f7e01ab8SAndrey Konovalov 
503f7e01ab8SAndrey Konovalov /*
504f7e01ab8SAndrey Konovalov  * Note: in the memset tests below, the written range touches both valid and
505f7e01ab8SAndrey Konovalov  * invalid memory. This makes sure that the instrumentation does not only check
506f7e01ab8SAndrey Konovalov  * the starting address but the whole range.
507f7e01ab8SAndrey Konovalov  */
508f7e01ab8SAndrey Konovalov 
509f7e01ab8SAndrey Konovalov static void kmalloc_oob_memset_2(struct kunit *test)
510f7e01ab8SAndrey Konovalov {
511f7e01ab8SAndrey Konovalov 	char *ptr;
512f7e01ab8SAndrey Konovalov 	size_t size = 128 - KASAN_GRANULE_SIZE;
513f7e01ab8SAndrey Konovalov 
51485f195b1SMarco Elver 	KASAN_TEST_NEEDS_CHECKED_MEMINTRINSICS(test);
51585f195b1SMarco Elver 
516f7e01ab8SAndrey Konovalov 	ptr = kmalloc(size, GFP_KERNEL);
517f7e01ab8SAndrey Konovalov 	KUNIT_ASSERT_NOT_ERR_OR_NULL(test, ptr);
518f7e01ab8SAndrey Konovalov 
519f7e01ab8SAndrey Konovalov 	OPTIMIZER_HIDE_VAR(size);
520f7e01ab8SAndrey Konovalov 	KUNIT_EXPECT_KASAN_FAIL(test, memset(ptr + size - 1, 0, 2));
521f7e01ab8SAndrey Konovalov 	kfree(ptr);
522f7e01ab8SAndrey Konovalov }
523f7e01ab8SAndrey Konovalov 
524f7e01ab8SAndrey Konovalov static void kmalloc_oob_memset_4(struct kunit *test)
525f7e01ab8SAndrey Konovalov {
526f7e01ab8SAndrey Konovalov 	char *ptr;
527f7e01ab8SAndrey Konovalov 	size_t size = 128 - KASAN_GRANULE_SIZE;
528f7e01ab8SAndrey Konovalov 
52985f195b1SMarco Elver 	KASAN_TEST_NEEDS_CHECKED_MEMINTRINSICS(test);
53085f195b1SMarco Elver 
531f7e01ab8SAndrey Konovalov 	ptr = kmalloc(size, GFP_KERNEL);
532f7e01ab8SAndrey Konovalov 	KUNIT_ASSERT_NOT_ERR_OR_NULL(test, ptr);
533f7e01ab8SAndrey Konovalov 
534f7e01ab8SAndrey Konovalov 	OPTIMIZER_HIDE_VAR(size);
535f7e01ab8SAndrey Konovalov 	KUNIT_EXPECT_KASAN_FAIL(test, memset(ptr + size - 3, 0, 4));
536f7e01ab8SAndrey Konovalov 	kfree(ptr);
537f7e01ab8SAndrey Konovalov }
538f7e01ab8SAndrey Konovalov 
539f7e01ab8SAndrey Konovalov static void kmalloc_oob_memset_8(struct kunit *test)
540f7e01ab8SAndrey Konovalov {
541f7e01ab8SAndrey Konovalov 	char *ptr;
542f7e01ab8SAndrey Konovalov 	size_t size = 128 - KASAN_GRANULE_SIZE;
543f7e01ab8SAndrey Konovalov 
54485f195b1SMarco Elver 	KASAN_TEST_NEEDS_CHECKED_MEMINTRINSICS(test);
54585f195b1SMarco Elver 
546f7e01ab8SAndrey Konovalov 	ptr = kmalloc(size, GFP_KERNEL);
547f7e01ab8SAndrey Konovalov 	KUNIT_ASSERT_NOT_ERR_OR_NULL(test, ptr);
548f7e01ab8SAndrey Konovalov 
549f7e01ab8SAndrey Konovalov 	OPTIMIZER_HIDE_VAR(size);
550f7e01ab8SAndrey Konovalov 	KUNIT_EXPECT_KASAN_FAIL(test, memset(ptr + size - 7, 0, 8));
551f7e01ab8SAndrey Konovalov 	kfree(ptr);
552f7e01ab8SAndrey Konovalov }
553f7e01ab8SAndrey Konovalov 
554f7e01ab8SAndrey Konovalov static void kmalloc_oob_memset_16(struct kunit *test)
555f7e01ab8SAndrey Konovalov {
556f7e01ab8SAndrey Konovalov 	char *ptr;
557f7e01ab8SAndrey Konovalov 	size_t size = 128 - KASAN_GRANULE_SIZE;
558f7e01ab8SAndrey Konovalov 
55985f195b1SMarco Elver 	KASAN_TEST_NEEDS_CHECKED_MEMINTRINSICS(test);
56085f195b1SMarco Elver 
561f7e01ab8SAndrey Konovalov 	ptr = kmalloc(size, GFP_KERNEL);
562f7e01ab8SAndrey Konovalov 	KUNIT_ASSERT_NOT_ERR_OR_NULL(test, ptr);
563f7e01ab8SAndrey Konovalov 
564f7e01ab8SAndrey Konovalov 	OPTIMIZER_HIDE_VAR(size);
565f7e01ab8SAndrey Konovalov 	KUNIT_EXPECT_KASAN_FAIL(test, memset(ptr + size - 15, 0, 16));
566f7e01ab8SAndrey Konovalov 	kfree(ptr);
567f7e01ab8SAndrey Konovalov }
568f7e01ab8SAndrey Konovalov 
569f7e01ab8SAndrey Konovalov static void kmalloc_oob_in_memset(struct kunit *test)
570f7e01ab8SAndrey Konovalov {
571f7e01ab8SAndrey Konovalov 	char *ptr;
572f7e01ab8SAndrey Konovalov 	size_t size = 128 - KASAN_GRANULE_SIZE;
573f7e01ab8SAndrey Konovalov 
57485f195b1SMarco Elver 	KASAN_TEST_NEEDS_CHECKED_MEMINTRINSICS(test);
57585f195b1SMarco Elver 
576f7e01ab8SAndrey Konovalov 	ptr = kmalloc(size, GFP_KERNEL);
577f7e01ab8SAndrey Konovalov 	KUNIT_ASSERT_NOT_ERR_OR_NULL(test, ptr);
578f7e01ab8SAndrey Konovalov 
579f7e01ab8SAndrey Konovalov 	OPTIMIZER_HIDE_VAR(ptr);
580f7e01ab8SAndrey Konovalov 	OPTIMIZER_HIDE_VAR(size);
581f7e01ab8SAndrey Konovalov 	KUNIT_EXPECT_KASAN_FAIL(test,
582f7e01ab8SAndrey Konovalov 				memset(ptr, 0, size + KASAN_GRANULE_SIZE));
583f7e01ab8SAndrey Konovalov 	kfree(ptr);
584f7e01ab8SAndrey Konovalov }
585f7e01ab8SAndrey Konovalov 
586f7e01ab8SAndrey Konovalov static void kmalloc_memmove_negative_size(struct kunit *test)
587f7e01ab8SAndrey Konovalov {
588f7e01ab8SAndrey Konovalov 	char *ptr;
589f7e01ab8SAndrey Konovalov 	size_t size = 64;
590f7e01ab8SAndrey Konovalov 	size_t invalid_size = -2;
591f7e01ab8SAndrey Konovalov 
59285f195b1SMarco Elver 	KASAN_TEST_NEEDS_CHECKED_MEMINTRINSICS(test);
59385f195b1SMarco Elver 
594f7e01ab8SAndrey Konovalov 	/*
595f7e01ab8SAndrey Konovalov 	 * Hardware tag-based mode doesn't check memmove for negative size.
596f7e01ab8SAndrey Konovalov 	 * As a result, this test introduces a side-effect memory corruption,
597f7e01ab8SAndrey Konovalov 	 * which can result in a crash.
598f7e01ab8SAndrey Konovalov 	 */
599f7e01ab8SAndrey Konovalov 	KASAN_TEST_NEEDS_CONFIG_OFF(test, CONFIG_KASAN_HW_TAGS);
600f7e01ab8SAndrey Konovalov 
601f7e01ab8SAndrey Konovalov 	ptr = kmalloc(size, GFP_KERNEL);
602f7e01ab8SAndrey Konovalov 	KUNIT_ASSERT_NOT_ERR_OR_NULL(test, ptr);
603f7e01ab8SAndrey Konovalov 
604f7e01ab8SAndrey Konovalov 	memset((char *)ptr, 0, 64);
605f7e01ab8SAndrey Konovalov 	OPTIMIZER_HIDE_VAR(ptr);
606f7e01ab8SAndrey Konovalov 	OPTIMIZER_HIDE_VAR(invalid_size);
607f7e01ab8SAndrey Konovalov 	KUNIT_EXPECT_KASAN_FAIL(test,
608f7e01ab8SAndrey Konovalov 		memmove((char *)ptr, (char *)ptr + 4, invalid_size));
609f7e01ab8SAndrey Konovalov 	kfree(ptr);
610f7e01ab8SAndrey Konovalov }
611f7e01ab8SAndrey Konovalov 
612f7e01ab8SAndrey Konovalov static void kmalloc_memmove_invalid_size(struct kunit *test)
613f7e01ab8SAndrey Konovalov {
614f7e01ab8SAndrey Konovalov 	char *ptr;
615f7e01ab8SAndrey Konovalov 	size_t size = 64;
616d6e5040bSAndrey Konovalov 	size_t invalid_size = size;
617f7e01ab8SAndrey Konovalov 
61885f195b1SMarco Elver 	KASAN_TEST_NEEDS_CHECKED_MEMINTRINSICS(test);
61985f195b1SMarco Elver 
620f7e01ab8SAndrey Konovalov 	ptr = kmalloc(size, GFP_KERNEL);
621f7e01ab8SAndrey Konovalov 	KUNIT_ASSERT_NOT_ERR_OR_NULL(test, ptr);
622f7e01ab8SAndrey Konovalov 
623f7e01ab8SAndrey Konovalov 	memset((char *)ptr, 0, 64);
624f7e01ab8SAndrey Konovalov 	OPTIMIZER_HIDE_VAR(ptr);
625d6e5040bSAndrey Konovalov 	OPTIMIZER_HIDE_VAR(invalid_size);
626f7e01ab8SAndrey Konovalov 	KUNIT_EXPECT_KASAN_FAIL(test,
627f7e01ab8SAndrey Konovalov 		memmove((char *)ptr, (char *)ptr + 4, invalid_size));
628f7e01ab8SAndrey Konovalov 	kfree(ptr);
629f7e01ab8SAndrey Konovalov }
630f7e01ab8SAndrey Konovalov 
631f7e01ab8SAndrey Konovalov static void kmalloc_uaf(struct kunit *test)
632f7e01ab8SAndrey Konovalov {
633f7e01ab8SAndrey Konovalov 	char *ptr;
634f7e01ab8SAndrey Konovalov 	size_t size = 10;
635f7e01ab8SAndrey Konovalov 
636f7e01ab8SAndrey Konovalov 	ptr = kmalloc(size, GFP_KERNEL);
637f7e01ab8SAndrey Konovalov 	KUNIT_ASSERT_NOT_ERR_OR_NULL(test, ptr);
638f7e01ab8SAndrey Konovalov 
639f7e01ab8SAndrey Konovalov 	kfree(ptr);
640f7e01ab8SAndrey Konovalov 	KUNIT_EXPECT_KASAN_FAIL(test, ((volatile char *)ptr)[8]);
641f7e01ab8SAndrey Konovalov }
642f7e01ab8SAndrey Konovalov 
643f7e01ab8SAndrey Konovalov static void kmalloc_uaf_memset(struct kunit *test)
644f7e01ab8SAndrey Konovalov {
645f7e01ab8SAndrey Konovalov 	char *ptr;
646f7e01ab8SAndrey Konovalov 	size_t size = 33;
647f7e01ab8SAndrey Konovalov 
64885f195b1SMarco Elver 	KASAN_TEST_NEEDS_CHECKED_MEMINTRINSICS(test);
64985f195b1SMarco Elver 
650f7e01ab8SAndrey Konovalov 	/*
651f7e01ab8SAndrey Konovalov 	 * Only generic KASAN uses quarantine, which is required to avoid a
652f7e01ab8SAndrey Konovalov 	 * kernel memory corruption this test causes.
653f7e01ab8SAndrey Konovalov 	 */
654f7e01ab8SAndrey Konovalov 	KASAN_TEST_NEEDS_CONFIG_ON(test, CONFIG_KASAN_GENERIC);
655f7e01ab8SAndrey Konovalov 
656f7e01ab8SAndrey Konovalov 	ptr = kmalloc(size, GFP_KERNEL);
657f7e01ab8SAndrey Konovalov 	KUNIT_ASSERT_NOT_ERR_OR_NULL(test, ptr);
658f7e01ab8SAndrey Konovalov 
659f7e01ab8SAndrey Konovalov 	kfree(ptr);
660f7e01ab8SAndrey Konovalov 	KUNIT_EXPECT_KASAN_FAIL(test, memset(ptr, 0, size));
661f7e01ab8SAndrey Konovalov }
662f7e01ab8SAndrey Konovalov 
663f7e01ab8SAndrey Konovalov static void kmalloc_uaf2(struct kunit *test)
664f7e01ab8SAndrey Konovalov {
665f7e01ab8SAndrey Konovalov 	char *ptr1, *ptr2;
666f7e01ab8SAndrey Konovalov 	size_t size = 43;
667f7e01ab8SAndrey Konovalov 	int counter = 0;
668f7e01ab8SAndrey Konovalov 
669f7e01ab8SAndrey Konovalov again:
670f7e01ab8SAndrey Konovalov 	ptr1 = kmalloc(size, GFP_KERNEL);
671f7e01ab8SAndrey Konovalov 	KUNIT_ASSERT_NOT_ERR_OR_NULL(test, ptr1);
672f7e01ab8SAndrey Konovalov 
673f7e01ab8SAndrey Konovalov 	kfree(ptr1);
674f7e01ab8SAndrey Konovalov 
675f7e01ab8SAndrey Konovalov 	ptr2 = kmalloc(size, GFP_KERNEL);
676f7e01ab8SAndrey Konovalov 	KUNIT_ASSERT_NOT_ERR_OR_NULL(test, ptr2);
677f7e01ab8SAndrey Konovalov 
678f7e01ab8SAndrey Konovalov 	/*
679f7e01ab8SAndrey Konovalov 	 * For tag-based KASAN ptr1 and ptr2 tags might happen to be the same.
680f7e01ab8SAndrey Konovalov 	 * Allow up to 16 attempts at generating different tags.
681f7e01ab8SAndrey Konovalov 	 */
682f7e01ab8SAndrey Konovalov 	if (!IS_ENABLED(CONFIG_KASAN_GENERIC) && ptr1 == ptr2 && counter++ < 16) {
683f7e01ab8SAndrey Konovalov 		kfree(ptr2);
684f7e01ab8SAndrey Konovalov 		goto again;
685f7e01ab8SAndrey Konovalov 	}
686f7e01ab8SAndrey Konovalov 
687f7e01ab8SAndrey Konovalov 	KUNIT_EXPECT_KASAN_FAIL(test, ((volatile char *)ptr1)[40]);
688f7e01ab8SAndrey Konovalov 	KUNIT_EXPECT_PTR_NE(test, ptr1, ptr2);
689f7e01ab8SAndrey Konovalov 
690f7e01ab8SAndrey Konovalov 	kfree(ptr2);
691f7e01ab8SAndrey Konovalov }
692f7e01ab8SAndrey Konovalov 
693f7e01ab8SAndrey Konovalov /*
694f7e01ab8SAndrey Konovalov  * Check that KASAN detects use-after-free when another object was allocated in
695f7e01ab8SAndrey Konovalov  * the same slot. Relevant for the tag-based modes, which do not use quarantine.
696f7e01ab8SAndrey Konovalov  */
697f7e01ab8SAndrey Konovalov static void kmalloc_uaf3(struct kunit *test)
698f7e01ab8SAndrey Konovalov {
699f7e01ab8SAndrey Konovalov 	char *ptr1, *ptr2;
700f7e01ab8SAndrey Konovalov 	size_t size = 100;
701f7e01ab8SAndrey Konovalov 
702f7e01ab8SAndrey Konovalov 	/* This test is specifically crafted for tag-based modes. */
703f7e01ab8SAndrey Konovalov 	KASAN_TEST_NEEDS_CONFIG_OFF(test, CONFIG_KASAN_GENERIC);
704f7e01ab8SAndrey Konovalov 
705f7e01ab8SAndrey Konovalov 	ptr1 = kmalloc(size, GFP_KERNEL);
706f7e01ab8SAndrey Konovalov 	KUNIT_ASSERT_NOT_ERR_OR_NULL(test, ptr1);
707f7e01ab8SAndrey Konovalov 	kfree(ptr1);
708f7e01ab8SAndrey Konovalov 
709f7e01ab8SAndrey Konovalov 	ptr2 = kmalloc(size, GFP_KERNEL);
710f7e01ab8SAndrey Konovalov 	KUNIT_ASSERT_NOT_ERR_OR_NULL(test, ptr2);
711f7e01ab8SAndrey Konovalov 	kfree(ptr2);
712f7e01ab8SAndrey Konovalov 
713f7e01ab8SAndrey Konovalov 	KUNIT_EXPECT_KASAN_FAIL(test, ((volatile char *)ptr1)[8]);
714f7e01ab8SAndrey Konovalov }
715f7e01ab8SAndrey Konovalov 
716f7e01ab8SAndrey Konovalov static void kfree_via_page(struct kunit *test)
717f7e01ab8SAndrey Konovalov {
718f7e01ab8SAndrey Konovalov 	char *ptr;
719f7e01ab8SAndrey Konovalov 	size_t size = 8;
720f7e01ab8SAndrey Konovalov 	struct page *page;
721f7e01ab8SAndrey Konovalov 	unsigned long offset;
722f7e01ab8SAndrey Konovalov 
723f7e01ab8SAndrey Konovalov 	ptr = kmalloc(size, GFP_KERNEL);
724f7e01ab8SAndrey Konovalov 	KUNIT_ASSERT_NOT_ERR_OR_NULL(test, ptr);
725f7e01ab8SAndrey Konovalov 
726f7e01ab8SAndrey Konovalov 	page = virt_to_page(ptr);
727f7e01ab8SAndrey Konovalov 	offset = offset_in_page(ptr);
728f7e01ab8SAndrey Konovalov 	kfree(page_address(page) + offset);
729f7e01ab8SAndrey Konovalov }
730f7e01ab8SAndrey Konovalov 
731f7e01ab8SAndrey Konovalov static void kfree_via_phys(struct kunit *test)
732f7e01ab8SAndrey Konovalov {
733f7e01ab8SAndrey Konovalov 	char *ptr;
734f7e01ab8SAndrey Konovalov 	size_t size = 8;
735f7e01ab8SAndrey Konovalov 	phys_addr_t phys;
736f7e01ab8SAndrey Konovalov 
737f7e01ab8SAndrey Konovalov 	ptr = kmalloc(size, GFP_KERNEL);
738f7e01ab8SAndrey Konovalov 	KUNIT_ASSERT_NOT_ERR_OR_NULL(test, ptr);
739f7e01ab8SAndrey Konovalov 
740f7e01ab8SAndrey Konovalov 	phys = virt_to_phys(ptr);
741f7e01ab8SAndrey Konovalov 	kfree(phys_to_virt(phys));
742f7e01ab8SAndrey Konovalov }
743f7e01ab8SAndrey Konovalov 
744f7e01ab8SAndrey Konovalov static void kmem_cache_oob(struct kunit *test)
745f7e01ab8SAndrey Konovalov {
746f7e01ab8SAndrey Konovalov 	char *p;
747f7e01ab8SAndrey Konovalov 	size_t size = 200;
748f7e01ab8SAndrey Konovalov 	struct kmem_cache *cache;
749f7e01ab8SAndrey Konovalov 
750f7e01ab8SAndrey Konovalov 	cache = kmem_cache_create("test_cache", size, 0, 0, NULL);
751f7e01ab8SAndrey Konovalov 	KUNIT_ASSERT_NOT_ERR_OR_NULL(test, cache);
752f7e01ab8SAndrey Konovalov 
753f7e01ab8SAndrey Konovalov 	p = kmem_cache_alloc(cache, GFP_KERNEL);
754f7e01ab8SAndrey Konovalov 	if (!p) {
755f7e01ab8SAndrey Konovalov 		kunit_err(test, "Allocation failed: %s\n", __func__);
756f7e01ab8SAndrey Konovalov 		kmem_cache_destroy(cache);
757f7e01ab8SAndrey Konovalov 		return;
758f7e01ab8SAndrey Konovalov 	}
759f7e01ab8SAndrey Konovalov 
760f7e01ab8SAndrey Konovalov 	KUNIT_EXPECT_KASAN_FAIL(test, *p = p[size + OOB_TAG_OFF]);
761f7e01ab8SAndrey Konovalov 
762f7e01ab8SAndrey Konovalov 	kmem_cache_free(cache, p);
763f7e01ab8SAndrey Konovalov 	kmem_cache_destroy(cache);
764f7e01ab8SAndrey Konovalov }
765f7e01ab8SAndrey Konovalov 
766f7e01ab8SAndrey Konovalov static void kmem_cache_accounted(struct kunit *test)
767f7e01ab8SAndrey Konovalov {
768f7e01ab8SAndrey Konovalov 	int i;
769f7e01ab8SAndrey Konovalov 	char *p;
770f7e01ab8SAndrey Konovalov 	size_t size = 200;
771f7e01ab8SAndrey Konovalov 	struct kmem_cache *cache;
772f7e01ab8SAndrey Konovalov 
773f7e01ab8SAndrey Konovalov 	cache = kmem_cache_create("test_cache", size, 0, SLAB_ACCOUNT, NULL);
774f7e01ab8SAndrey Konovalov 	KUNIT_ASSERT_NOT_ERR_OR_NULL(test, cache);
775f7e01ab8SAndrey Konovalov 
776f7e01ab8SAndrey Konovalov 	/*
777f7e01ab8SAndrey Konovalov 	 * Several allocations with a delay to allow for lazy per memcg kmem
778f7e01ab8SAndrey Konovalov 	 * cache creation.
779f7e01ab8SAndrey Konovalov 	 */
780f7e01ab8SAndrey Konovalov 	for (i = 0; i < 5; i++) {
781f7e01ab8SAndrey Konovalov 		p = kmem_cache_alloc(cache, GFP_KERNEL);
782f7e01ab8SAndrey Konovalov 		if (!p)
783f7e01ab8SAndrey Konovalov 			goto free_cache;
784f7e01ab8SAndrey Konovalov 
785f7e01ab8SAndrey Konovalov 		kmem_cache_free(cache, p);
786f7e01ab8SAndrey Konovalov 		msleep(100);
787f7e01ab8SAndrey Konovalov 	}
788f7e01ab8SAndrey Konovalov 
789f7e01ab8SAndrey Konovalov free_cache:
790f7e01ab8SAndrey Konovalov 	kmem_cache_destroy(cache);
791f7e01ab8SAndrey Konovalov }
792f7e01ab8SAndrey Konovalov 
793f7e01ab8SAndrey Konovalov static void kmem_cache_bulk(struct kunit *test)
794f7e01ab8SAndrey Konovalov {
795f7e01ab8SAndrey Konovalov 	struct kmem_cache *cache;
796f7e01ab8SAndrey Konovalov 	size_t size = 200;
797f7e01ab8SAndrey Konovalov 	char *p[10];
798f7e01ab8SAndrey Konovalov 	bool ret;
799f7e01ab8SAndrey Konovalov 	int i;
800f7e01ab8SAndrey Konovalov 
801f7e01ab8SAndrey Konovalov 	cache = kmem_cache_create("test_cache", size, 0, 0, NULL);
802f7e01ab8SAndrey Konovalov 	KUNIT_ASSERT_NOT_ERR_OR_NULL(test, cache);
803f7e01ab8SAndrey Konovalov 
804f7e01ab8SAndrey Konovalov 	ret = kmem_cache_alloc_bulk(cache, GFP_KERNEL, ARRAY_SIZE(p), (void **)&p);
805f7e01ab8SAndrey Konovalov 	if (!ret) {
806f7e01ab8SAndrey Konovalov 		kunit_err(test, "Allocation failed: %s\n", __func__);
807f7e01ab8SAndrey Konovalov 		kmem_cache_destroy(cache);
808f7e01ab8SAndrey Konovalov 		return;
809f7e01ab8SAndrey Konovalov 	}
810f7e01ab8SAndrey Konovalov 
811f7e01ab8SAndrey Konovalov 	for (i = 0; i < ARRAY_SIZE(p); i++)
812f7e01ab8SAndrey Konovalov 		p[i][0] = p[i][size - 1] = 42;
813f7e01ab8SAndrey Konovalov 
814f7e01ab8SAndrey Konovalov 	kmem_cache_free_bulk(cache, ARRAY_SIZE(p), (void **)&p);
815f7e01ab8SAndrey Konovalov 	kmem_cache_destroy(cache);
816f7e01ab8SAndrey Konovalov }
817f7e01ab8SAndrey Konovalov 
818f7e01ab8SAndrey Konovalov static char global_array[10];
819f7e01ab8SAndrey Konovalov 
820f7e01ab8SAndrey Konovalov static void kasan_global_oob_right(struct kunit *test)
821f7e01ab8SAndrey Konovalov {
822f7e01ab8SAndrey Konovalov 	/*
823f7e01ab8SAndrey Konovalov 	 * Deliberate out-of-bounds access. To prevent CONFIG_UBSAN_LOCAL_BOUNDS
824f7e01ab8SAndrey Konovalov 	 * from failing here and panicking the kernel, access the array via a
825f7e01ab8SAndrey Konovalov 	 * volatile pointer, which will prevent the compiler from being able to
826f7e01ab8SAndrey Konovalov 	 * determine the array bounds.
827f7e01ab8SAndrey Konovalov 	 *
828f7e01ab8SAndrey Konovalov 	 * This access uses a volatile pointer to char (char *volatile) rather
829f7e01ab8SAndrey Konovalov 	 * than the more conventional pointer to volatile char (volatile char *)
830f7e01ab8SAndrey Konovalov 	 * because we want to prevent the compiler from making inferences about
831f7e01ab8SAndrey Konovalov 	 * the pointer itself (i.e. its array bounds), not the data that it
832f7e01ab8SAndrey Konovalov 	 * refers to.
833f7e01ab8SAndrey Konovalov 	 */
834f7e01ab8SAndrey Konovalov 	char *volatile array = global_array;
835f7e01ab8SAndrey Konovalov 	char *p = &array[ARRAY_SIZE(global_array) + 3];
836f7e01ab8SAndrey Konovalov 
837f7e01ab8SAndrey Konovalov 	/* Only generic mode instruments globals. */
838f7e01ab8SAndrey Konovalov 	KASAN_TEST_NEEDS_CONFIG_ON(test, CONFIG_KASAN_GENERIC);
839f7e01ab8SAndrey Konovalov 
840f7e01ab8SAndrey Konovalov 	KUNIT_EXPECT_KASAN_FAIL(test, *(volatile char *)p);
841f7e01ab8SAndrey Konovalov }
842f7e01ab8SAndrey Konovalov 
843f7e01ab8SAndrey Konovalov static void kasan_global_oob_left(struct kunit *test)
844f7e01ab8SAndrey Konovalov {
845f7e01ab8SAndrey Konovalov 	char *volatile array = global_array;
846f7e01ab8SAndrey Konovalov 	char *p = array - 3;
847f7e01ab8SAndrey Konovalov 
848f7e01ab8SAndrey Konovalov 	/*
849f7e01ab8SAndrey Konovalov 	 * GCC is known to fail this test, skip it.
850f7e01ab8SAndrey Konovalov 	 * See https://bugzilla.kernel.org/show_bug.cgi?id=215051.
851f7e01ab8SAndrey Konovalov 	 */
852f7e01ab8SAndrey Konovalov 	KASAN_TEST_NEEDS_CONFIG_ON(test, CONFIG_CC_IS_CLANG);
853f7e01ab8SAndrey Konovalov 	KASAN_TEST_NEEDS_CONFIG_ON(test, CONFIG_KASAN_GENERIC);
854f7e01ab8SAndrey Konovalov 	KUNIT_EXPECT_KASAN_FAIL(test, *(volatile char *)p);
855f7e01ab8SAndrey Konovalov }
856f7e01ab8SAndrey Konovalov 
85738931d89SKees Cook /* Check that ksize() does NOT unpoison whole object. */
858f7e01ab8SAndrey Konovalov static void ksize_unpoisons_memory(struct kunit *test)
859f7e01ab8SAndrey Konovalov {
860f7e01ab8SAndrey Konovalov 	char *ptr;
86138931d89SKees Cook 	size_t size = 128 - KASAN_GRANULE_SIZE - 5;
86238931d89SKees Cook 	size_t real_size;
863f7e01ab8SAndrey Konovalov 
864f7e01ab8SAndrey Konovalov 	ptr = kmalloc(size, GFP_KERNEL);
865f7e01ab8SAndrey Konovalov 	KUNIT_ASSERT_NOT_ERR_OR_NULL(test, ptr);
86638931d89SKees Cook 
867f7e01ab8SAndrey Konovalov 	real_size = ksize(ptr);
86838931d89SKees Cook 	KUNIT_EXPECT_GT(test, real_size, size);
869f7e01ab8SAndrey Konovalov 
870f7e01ab8SAndrey Konovalov 	OPTIMIZER_HIDE_VAR(ptr);
871f7e01ab8SAndrey Konovalov 
87238931d89SKees Cook 	/* These accesses shouldn't trigger a KASAN report. */
87338931d89SKees Cook 	ptr[0] = 'x';
87438931d89SKees Cook 	ptr[size - 1] = 'x';
875f7e01ab8SAndrey Konovalov 
87638931d89SKees Cook 	/* These must trigger a KASAN report. */
87738931d89SKees Cook 	if (IS_ENABLED(CONFIG_KASAN_GENERIC))
87838931d89SKees Cook 		KUNIT_EXPECT_KASAN_FAIL(test, ((volatile char *)ptr)[size]);
87938931d89SKees Cook 	KUNIT_EXPECT_KASAN_FAIL(test, ((volatile char *)ptr)[size + 5]);
88038931d89SKees Cook 	KUNIT_EXPECT_KASAN_FAIL(test, ((volatile char *)ptr)[real_size - 1]);
881f7e01ab8SAndrey Konovalov 
882f7e01ab8SAndrey Konovalov 	kfree(ptr);
883f7e01ab8SAndrey Konovalov }
884f7e01ab8SAndrey Konovalov 
885f7e01ab8SAndrey Konovalov /*
886f7e01ab8SAndrey Konovalov  * Check that a use-after-free is detected by ksize() and via normal accesses
887f7e01ab8SAndrey Konovalov  * after it.
888f7e01ab8SAndrey Konovalov  */
889f7e01ab8SAndrey Konovalov static void ksize_uaf(struct kunit *test)
890f7e01ab8SAndrey Konovalov {
891f7e01ab8SAndrey Konovalov 	char *ptr;
892f7e01ab8SAndrey Konovalov 	int size = 128 - KASAN_GRANULE_SIZE;
893f7e01ab8SAndrey Konovalov 
894f7e01ab8SAndrey Konovalov 	ptr = kmalloc(size, GFP_KERNEL);
895f7e01ab8SAndrey Konovalov 	KUNIT_ASSERT_NOT_ERR_OR_NULL(test, ptr);
896f7e01ab8SAndrey Konovalov 	kfree(ptr);
897f7e01ab8SAndrey Konovalov 
898f7e01ab8SAndrey Konovalov 	OPTIMIZER_HIDE_VAR(ptr);
899f7e01ab8SAndrey Konovalov 	KUNIT_EXPECT_KASAN_FAIL(test, ksize(ptr));
900f7e01ab8SAndrey Konovalov 	KUNIT_EXPECT_KASAN_FAIL(test, ((volatile char *)ptr)[0]);
901f7e01ab8SAndrey Konovalov 	KUNIT_EXPECT_KASAN_FAIL(test, ((volatile char *)ptr)[size]);
902f7e01ab8SAndrey Konovalov }
903f7e01ab8SAndrey Konovalov 
904f7e01ab8SAndrey Konovalov static void kasan_stack_oob(struct kunit *test)
905f7e01ab8SAndrey Konovalov {
906f7e01ab8SAndrey Konovalov 	char stack_array[10];
907f7e01ab8SAndrey Konovalov 	/* See comment in kasan_global_oob_right. */
908f7e01ab8SAndrey Konovalov 	char *volatile array = stack_array;
909f7e01ab8SAndrey Konovalov 	char *p = &array[ARRAY_SIZE(stack_array) + OOB_TAG_OFF];
910f7e01ab8SAndrey Konovalov 
911f7e01ab8SAndrey Konovalov 	KASAN_TEST_NEEDS_CONFIG_ON(test, CONFIG_KASAN_STACK);
912f7e01ab8SAndrey Konovalov 
913f7e01ab8SAndrey Konovalov 	KUNIT_EXPECT_KASAN_FAIL(test, *(volatile char *)p);
914f7e01ab8SAndrey Konovalov }
915f7e01ab8SAndrey Konovalov 
916f7e01ab8SAndrey Konovalov static void kasan_alloca_oob_left(struct kunit *test)
917f7e01ab8SAndrey Konovalov {
918f7e01ab8SAndrey Konovalov 	volatile int i = 10;
919f7e01ab8SAndrey Konovalov 	char alloca_array[i];
920f7e01ab8SAndrey Konovalov 	/* See comment in kasan_global_oob_right. */
921f7e01ab8SAndrey Konovalov 	char *volatile array = alloca_array;
922f7e01ab8SAndrey Konovalov 	char *p = array - 1;
923f7e01ab8SAndrey Konovalov 
924f7e01ab8SAndrey Konovalov 	/* Only generic mode instruments dynamic allocas. */
925f7e01ab8SAndrey Konovalov 	KASAN_TEST_NEEDS_CONFIG_ON(test, CONFIG_KASAN_GENERIC);
926f7e01ab8SAndrey Konovalov 	KASAN_TEST_NEEDS_CONFIG_ON(test, CONFIG_KASAN_STACK);
927f7e01ab8SAndrey Konovalov 
928f7e01ab8SAndrey Konovalov 	KUNIT_EXPECT_KASAN_FAIL(test, *(volatile char *)p);
929f7e01ab8SAndrey Konovalov }
930f7e01ab8SAndrey Konovalov 
931f7e01ab8SAndrey Konovalov static void kasan_alloca_oob_right(struct kunit *test)
932f7e01ab8SAndrey Konovalov {
933f7e01ab8SAndrey Konovalov 	volatile int i = 10;
934f7e01ab8SAndrey Konovalov 	char alloca_array[i];
935f7e01ab8SAndrey Konovalov 	/* See comment in kasan_global_oob_right. */
936f7e01ab8SAndrey Konovalov 	char *volatile array = alloca_array;
937f7e01ab8SAndrey Konovalov 	char *p = array + i;
938f7e01ab8SAndrey Konovalov 
939f7e01ab8SAndrey Konovalov 	/* Only generic mode instruments dynamic allocas. */
940f7e01ab8SAndrey Konovalov 	KASAN_TEST_NEEDS_CONFIG_ON(test, CONFIG_KASAN_GENERIC);
941f7e01ab8SAndrey Konovalov 	KASAN_TEST_NEEDS_CONFIG_ON(test, CONFIG_KASAN_STACK);
942f7e01ab8SAndrey Konovalov 
943f7e01ab8SAndrey Konovalov 	KUNIT_EXPECT_KASAN_FAIL(test, *(volatile char *)p);
944f7e01ab8SAndrey Konovalov }
945f7e01ab8SAndrey Konovalov 
946f7e01ab8SAndrey Konovalov static void kmem_cache_double_free(struct kunit *test)
947f7e01ab8SAndrey Konovalov {
948f7e01ab8SAndrey Konovalov 	char *p;
949f7e01ab8SAndrey Konovalov 	size_t size = 200;
950f7e01ab8SAndrey Konovalov 	struct kmem_cache *cache;
951f7e01ab8SAndrey Konovalov 
952f7e01ab8SAndrey Konovalov 	cache = kmem_cache_create("test_cache", size, 0, 0, NULL);
953f7e01ab8SAndrey Konovalov 	KUNIT_ASSERT_NOT_ERR_OR_NULL(test, cache);
954f7e01ab8SAndrey Konovalov 
955f7e01ab8SAndrey Konovalov 	p = kmem_cache_alloc(cache, GFP_KERNEL);
956f7e01ab8SAndrey Konovalov 	if (!p) {
957f7e01ab8SAndrey Konovalov 		kunit_err(test, "Allocation failed: %s\n", __func__);
958f7e01ab8SAndrey Konovalov 		kmem_cache_destroy(cache);
959f7e01ab8SAndrey Konovalov 		return;
960f7e01ab8SAndrey Konovalov 	}
961f7e01ab8SAndrey Konovalov 
962f7e01ab8SAndrey Konovalov 	kmem_cache_free(cache, p);
963f7e01ab8SAndrey Konovalov 	KUNIT_EXPECT_KASAN_FAIL(test, kmem_cache_free(cache, p));
964f7e01ab8SAndrey Konovalov 	kmem_cache_destroy(cache);
965f7e01ab8SAndrey Konovalov }
966f7e01ab8SAndrey Konovalov 
967f7e01ab8SAndrey Konovalov static void kmem_cache_invalid_free(struct kunit *test)
968f7e01ab8SAndrey Konovalov {
969f7e01ab8SAndrey Konovalov 	char *p;
970f7e01ab8SAndrey Konovalov 	size_t size = 200;
971f7e01ab8SAndrey Konovalov 	struct kmem_cache *cache;
972f7e01ab8SAndrey Konovalov 
973f7e01ab8SAndrey Konovalov 	cache = kmem_cache_create("test_cache", size, 0, SLAB_TYPESAFE_BY_RCU,
974f7e01ab8SAndrey Konovalov 				  NULL);
975f7e01ab8SAndrey Konovalov 	KUNIT_ASSERT_NOT_ERR_OR_NULL(test, cache);
976f7e01ab8SAndrey Konovalov 
977f7e01ab8SAndrey Konovalov 	p = kmem_cache_alloc(cache, GFP_KERNEL);
978f7e01ab8SAndrey Konovalov 	if (!p) {
979f7e01ab8SAndrey Konovalov 		kunit_err(test, "Allocation failed: %s\n", __func__);
980f7e01ab8SAndrey Konovalov 		kmem_cache_destroy(cache);
981f7e01ab8SAndrey Konovalov 		return;
982f7e01ab8SAndrey Konovalov 	}
983f7e01ab8SAndrey Konovalov 
984f7e01ab8SAndrey Konovalov 	/* Trigger invalid free, the object doesn't get freed. */
985f7e01ab8SAndrey Konovalov 	KUNIT_EXPECT_KASAN_FAIL(test, kmem_cache_free(cache, p + 1));
986f7e01ab8SAndrey Konovalov 
987f7e01ab8SAndrey Konovalov 	/*
988f7e01ab8SAndrey Konovalov 	 * Properly free the object to prevent the "Objects remaining in
989f7e01ab8SAndrey Konovalov 	 * test_cache on __kmem_cache_shutdown" BUG failure.
990f7e01ab8SAndrey Konovalov 	 */
991f7e01ab8SAndrey Konovalov 	kmem_cache_free(cache, p);
992f7e01ab8SAndrey Konovalov 
993f7e01ab8SAndrey Konovalov 	kmem_cache_destroy(cache);
994f7e01ab8SAndrey Konovalov }
995f7e01ab8SAndrey Konovalov 
996f7e01ab8SAndrey Konovalov static void empty_cache_ctor(void *object) { }
997f7e01ab8SAndrey Konovalov 
998f7e01ab8SAndrey Konovalov static void kmem_cache_double_destroy(struct kunit *test)
999f7e01ab8SAndrey Konovalov {
1000f7e01ab8SAndrey Konovalov 	struct kmem_cache *cache;
1001f7e01ab8SAndrey Konovalov 
1002f7e01ab8SAndrey Konovalov 	/* Provide a constructor to prevent cache merging. */
1003f7e01ab8SAndrey Konovalov 	cache = kmem_cache_create("test_cache", 200, 0, 0, empty_cache_ctor);
1004f7e01ab8SAndrey Konovalov 	KUNIT_ASSERT_NOT_ERR_OR_NULL(test, cache);
1005f7e01ab8SAndrey Konovalov 	kmem_cache_destroy(cache);
1006f7e01ab8SAndrey Konovalov 	KUNIT_EXPECT_KASAN_FAIL(test, kmem_cache_destroy(cache));
1007f7e01ab8SAndrey Konovalov }
1008f7e01ab8SAndrey Konovalov 
1009f7e01ab8SAndrey Konovalov static void kasan_memchr(struct kunit *test)
1010f7e01ab8SAndrey Konovalov {
1011f7e01ab8SAndrey Konovalov 	char *ptr;
1012f7e01ab8SAndrey Konovalov 	size_t size = 24;
1013f7e01ab8SAndrey Konovalov 
1014f7e01ab8SAndrey Konovalov 	/*
1015f7e01ab8SAndrey Konovalov 	 * str* functions are not instrumented with CONFIG_AMD_MEM_ENCRYPT.
1016f7e01ab8SAndrey Konovalov 	 * See https://bugzilla.kernel.org/show_bug.cgi?id=206337 for details.
1017f7e01ab8SAndrey Konovalov 	 */
1018f7e01ab8SAndrey Konovalov 	KASAN_TEST_NEEDS_CONFIG_OFF(test, CONFIG_AMD_MEM_ENCRYPT);
1019f7e01ab8SAndrey Konovalov 
1020f7e01ab8SAndrey Konovalov 	if (OOB_TAG_OFF)
1021f7e01ab8SAndrey Konovalov 		size = round_up(size, OOB_TAG_OFF);
1022f7e01ab8SAndrey Konovalov 
1023f7e01ab8SAndrey Konovalov 	ptr = kmalloc(size, GFP_KERNEL | __GFP_ZERO);
1024f7e01ab8SAndrey Konovalov 	KUNIT_ASSERT_NOT_ERR_OR_NULL(test, ptr);
1025f7e01ab8SAndrey Konovalov 
1026f7e01ab8SAndrey Konovalov 	OPTIMIZER_HIDE_VAR(ptr);
1027f7e01ab8SAndrey Konovalov 	OPTIMIZER_HIDE_VAR(size);
1028f7e01ab8SAndrey Konovalov 	KUNIT_EXPECT_KASAN_FAIL(test,
1029f7e01ab8SAndrey Konovalov 		kasan_ptr_result = memchr(ptr, '1', size + 1));
1030f7e01ab8SAndrey Konovalov 
1031f7e01ab8SAndrey Konovalov 	kfree(ptr);
1032f7e01ab8SAndrey Konovalov }
1033f7e01ab8SAndrey Konovalov 
1034f7e01ab8SAndrey Konovalov static void kasan_memcmp(struct kunit *test)
1035f7e01ab8SAndrey Konovalov {
1036f7e01ab8SAndrey Konovalov 	char *ptr;
1037f7e01ab8SAndrey Konovalov 	size_t size = 24;
1038f7e01ab8SAndrey Konovalov 	int arr[9];
1039f7e01ab8SAndrey Konovalov 
1040f7e01ab8SAndrey Konovalov 	/*
1041f7e01ab8SAndrey Konovalov 	 * str* functions are not instrumented with CONFIG_AMD_MEM_ENCRYPT.
1042f7e01ab8SAndrey Konovalov 	 * See https://bugzilla.kernel.org/show_bug.cgi?id=206337 for details.
1043f7e01ab8SAndrey Konovalov 	 */
1044f7e01ab8SAndrey Konovalov 	KASAN_TEST_NEEDS_CONFIG_OFF(test, CONFIG_AMD_MEM_ENCRYPT);
1045f7e01ab8SAndrey Konovalov 
1046f7e01ab8SAndrey Konovalov 	if (OOB_TAG_OFF)
1047f7e01ab8SAndrey Konovalov 		size = round_up(size, OOB_TAG_OFF);
1048f7e01ab8SAndrey Konovalov 
1049f7e01ab8SAndrey Konovalov 	ptr = kmalloc(size, GFP_KERNEL | __GFP_ZERO);
1050f7e01ab8SAndrey Konovalov 	KUNIT_ASSERT_NOT_ERR_OR_NULL(test, ptr);
1051f7e01ab8SAndrey Konovalov 	memset(arr, 0, sizeof(arr));
1052f7e01ab8SAndrey Konovalov 
1053f7e01ab8SAndrey Konovalov 	OPTIMIZER_HIDE_VAR(ptr);
1054f7e01ab8SAndrey Konovalov 	OPTIMIZER_HIDE_VAR(size);
1055f7e01ab8SAndrey Konovalov 	KUNIT_EXPECT_KASAN_FAIL(test,
1056f7e01ab8SAndrey Konovalov 		kasan_int_result = memcmp(ptr, arr, size+1));
1057f7e01ab8SAndrey Konovalov 	kfree(ptr);
1058f7e01ab8SAndrey Konovalov }
1059f7e01ab8SAndrey Konovalov 
1060f7e01ab8SAndrey Konovalov static void kasan_strings(struct kunit *test)
1061f7e01ab8SAndrey Konovalov {
1062f7e01ab8SAndrey Konovalov 	char *ptr;
1063f7e01ab8SAndrey Konovalov 	size_t size = 24;
1064f7e01ab8SAndrey Konovalov 
1065f7e01ab8SAndrey Konovalov 	/*
1066f7e01ab8SAndrey Konovalov 	 * str* functions are not instrumented with CONFIG_AMD_MEM_ENCRYPT.
1067f7e01ab8SAndrey Konovalov 	 * See https://bugzilla.kernel.org/show_bug.cgi?id=206337 for details.
1068f7e01ab8SAndrey Konovalov 	 */
1069f7e01ab8SAndrey Konovalov 	KASAN_TEST_NEEDS_CONFIG_OFF(test, CONFIG_AMD_MEM_ENCRYPT);
1070f7e01ab8SAndrey Konovalov 
1071f7e01ab8SAndrey Konovalov 	ptr = kmalloc(size, GFP_KERNEL | __GFP_ZERO);
1072f7e01ab8SAndrey Konovalov 	KUNIT_ASSERT_NOT_ERR_OR_NULL(test, ptr);
1073f7e01ab8SAndrey Konovalov 
1074f7e01ab8SAndrey Konovalov 	kfree(ptr);
1075f7e01ab8SAndrey Konovalov 
1076f7e01ab8SAndrey Konovalov 	/*
1077f7e01ab8SAndrey Konovalov 	 * Try to cause only 1 invalid access (less spam in dmesg).
1078f7e01ab8SAndrey Konovalov 	 * For that we need ptr to point to zeroed byte.
1079f7e01ab8SAndrey Konovalov 	 * Skip metadata that could be stored in freed object so ptr
1080f7e01ab8SAndrey Konovalov 	 * will likely point to zeroed byte.
1081f7e01ab8SAndrey Konovalov 	 */
1082f7e01ab8SAndrey Konovalov 	ptr += 16;
1083f7e01ab8SAndrey Konovalov 	KUNIT_EXPECT_KASAN_FAIL(test, kasan_ptr_result = strchr(ptr, '1'));
1084f7e01ab8SAndrey Konovalov 
1085f7e01ab8SAndrey Konovalov 	KUNIT_EXPECT_KASAN_FAIL(test, kasan_ptr_result = strrchr(ptr, '1'));
1086f7e01ab8SAndrey Konovalov 
1087f7e01ab8SAndrey Konovalov 	KUNIT_EXPECT_KASAN_FAIL(test, kasan_int_result = strcmp(ptr, "2"));
1088f7e01ab8SAndrey Konovalov 
1089f7e01ab8SAndrey Konovalov 	KUNIT_EXPECT_KASAN_FAIL(test, kasan_int_result = strncmp(ptr, "2", 1));
1090f7e01ab8SAndrey Konovalov 
1091f7e01ab8SAndrey Konovalov 	KUNIT_EXPECT_KASAN_FAIL(test, kasan_int_result = strlen(ptr));
1092f7e01ab8SAndrey Konovalov 
1093f7e01ab8SAndrey Konovalov 	KUNIT_EXPECT_KASAN_FAIL(test, kasan_int_result = strnlen(ptr, 1));
1094f7e01ab8SAndrey Konovalov }
1095f7e01ab8SAndrey Konovalov 
1096f7e01ab8SAndrey Konovalov static void kasan_bitops_modify(struct kunit *test, int nr, void *addr)
1097f7e01ab8SAndrey Konovalov {
1098f7e01ab8SAndrey Konovalov 	KUNIT_EXPECT_KASAN_FAIL(test, set_bit(nr, addr));
1099f7e01ab8SAndrey Konovalov 	KUNIT_EXPECT_KASAN_FAIL(test, __set_bit(nr, addr));
1100f7e01ab8SAndrey Konovalov 	KUNIT_EXPECT_KASAN_FAIL(test, clear_bit(nr, addr));
1101f7e01ab8SAndrey Konovalov 	KUNIT_EXPECT_KASAN_FAIL(test, __clear_bit(nr, addr));
1102f7e01ab8SAndrey Konovalov 	KUNIT_EXPECT_KASAN_FAIL(test, clear_bit_unlock(nr, addr));
1103f7e01ab8SAndrey Konovalov 	KUNIT_EXPECT_KASAN_FAIL(test, __clear_bit_unlock(nr, addr));
1104f7e01ab8SAndrey Konovalov 	KUNIT_EXPECT_KASAN_FAIL(test, change_bit(nr, addr));
1105f7e01ab8SAndrey Konovalov 	KUNIT_EXPECT_KASAN_FAIL(test, __change_bit(nr, addr));
1106f7e01ab8SAndrey Konovalov }
1107f7e01ab8SAndrey Konovalov 
1108f7e01ab8SAndrey Konovalov static void kasan_bitops_test_and_modify(struct kunit *test, int nr, void *addr)
1109f7e01ab8SAndrey Konovalov {
1110f7e01ab8SAndrey Konovalov 	KUNIT_EXPECT_KASAN_FAIL(test, test_and_set_bit(nr, addr));
1111f7e01ab8SAndrey Konovalov 	KUNIT_EXPECT_KASAN_FAIL(test, __test_and_set_bit(nr, addr));
1112f7e01ab8SAndrey Konovalov 	KUNIT_EXPECT_KASAN_FAIL(test, test_and_set_bit_lock(nr, addr));
1113f7e01ab8SAndrey Konovalov 	KUNIT_EXPECT_KASAN_FAIL(test, test_and_clear_bit(nr, addr));
1114f7e01ab8SAndrey Konovalov 	KUNIT_EXPECT_KASAN_FAIL(test, __test_and_clear_bit(nr, addr));
1115f7e01ab8SAndrey Konovalov 	KUNIT_EXPECT_KASAN_FAIL(test, test_and_change_bit(nr, addr));
1116f7e01ab8SAndrey Konovalov 	KUNIT_EXPECT_KASAN_FAIL(test, __test_and_change_bit(nr, addr));
1117f7e01ab8SAndrey Konovalov 	KUNIT_EXPECT_KASAN_FAIL(test, kasan_int_result = test_bit(nr, addr));
1118f7e01ab8SAndrey Konovalov 
1119f7e01ab8SAndrey Konovalov #if defined(clear_bit_unlock_is_negative_byte)
1120f7e01ab8SAndrey Konovalov 	KUNIT_EXPECT_KASAN_FAIL(test, kasan_int_result =
1121f7e01ab8SAndrey Konovalov 				clear_bit_unlock_is_negative_byte(nr, addr));
1122f7e01ab8SAndrey Konovalov #endif
1123f7e01ab8SAndrey Konovalov }
1124f7e01ab8SAndrey Konovalov 
1125f7e01ab8SAndrey Konovalov static void kasan_bitops_generic(struct kunit *test)
1126f7e01ab8SAndrey Konovalov {
1127f7e01ab8SAndrey Konovalov 	long *bits;
1128f7e01ab8SAndrey Konovalov 
1129f7e01ab8SAndrey Konovalov 	/* This test is specifically crafted for the generic mode. */
1130f7e01ab8SAndrey Konovalov 	KASAN_TEST_NEEDS_CONFIG_ON(test, CONFIG_KASAN_GENERIC);
1131f7e01ab8SAndrey Konovalov 
1132f7e01ab8SAndrey Konovalov 	/*
1133f7e01ab8SAndrey Konovalov 	 * Allocate 1 more byte, which causes kzalloc to round up to 16 bytes;
1134f7e01ab8SAndrey Konovalov 	 * this way we do not actually corrupt other memory.
1135f7e01ab8SAndrey Konovalov 	 */
1136f7e01ab8SAndrey Konovalov 	bits = kzalloc(sizeof(*bits) + 1, GFP_KERNEL);
1137f7e01ab8SAndrey Konovalov 	KUNIT_ASSERT_NOT_ERR_OR_NULL(test, bits);
1138f7e01ab8SAndrey Konovalov 
1139f7e01ab8SAndrey Konovalov 	/*
1140f7e01ab8SAndrey Konovalov 	 * Below calls try to access bit within allocated memory; however, the
1141f7e01ab8SAndrey Konovalov 	 * below accesses are still out-of-bounds, since bitops are defined to
1142f7e01ab8SAndrey Konovalov 	 * operate on the whole long the bit is in.
1143f7e01ab8SAndrey Konovalov 	 */
1144f7e01ab8SAndrey Konovalov 	kasan_bitops_modify(test, BITS_PER_LONG, bits);
1145f7e01ab8SAndrey Konovalov 
1146f7e01ab8SAndrey Konovalov 	/*
1147f7e01ab8SAndrey Konovalov 	 * Below calls try to access bit beyond allocated memory.
1148f7e01ab8SAndrey Konovalov 	 */
1149f7e01ab8SAndrey Konovalov 	kasan_bitops_test_and_modify(test, BITS_PER_LONG + BITS_PER_BYTE, bits);
1150f7e01ab8SAndrey Konovalov 
1151f7e01ab8SAndrey Konovalov 	kfree(bits);
1152f7e01ab8SAndrey Konovalov }
1153f7e01ab8SAndrey Konovalov 
1154f7e01ab8SAndrey Konovalov static void kasan_bitops_tags(struct kunit *test)
1155f7e01ab8SAndrey Konovalov {
1156f7e01ab8SAndrey Konovalov 	long *bits;
1157f7e01ab8SAndrey Konovalov 
1158f7e01ab8SAndrey Konovalov 	/* This test is specifically crafted for tag-based modes. */
1159f7e01ab8SAndrey Konovalov 	KASAN_TEST_NEEDS_CONFIG_OFF(test, CONFIG_KASAN_GENERIC);
1160f7e01ab8SAndrey Konovalov 
1161f7e01ab8SAndrey Konovalov 	/* kmalloc-64 cache will be used and the last 16 bytes will be the redzone. */
1162f7e01ab8SAndrey Konovalov 	bits = kzalloc(48, GFP_KERNEL);
1163f7e01ab8SAndrey Konovalov 	KUNIT_ASSERT_NOT_ERR_OR_NULL(test, bits);
1164f7e01ab8SAndrey Konovalov 
1165f7e01ab8SAndrey Konovalov 	/* Do the accesses past the 48 allocated bytes, but within the redone. */
1166f7e01ab8SAndrey Konovalov 	kasan_bitops_modify(test, BITS_PER_LONG, (void *)bits + 48);
1167f7e01ab8SAndrey Konovalov 	kasan_bitops_test_and_modify(test, BITS_PER_LONG + BITS_PER_BYTE, (void *)bits + 48);
1168f7e01ab8SAndrey Konovalov 
1169f7e01ab8SAndrey Konovalov 	kfree(bits);
1170f7e01ab8SAndrey Konovalov }
1171f7e01ab8SAndrey Konovalov 
1172f7e01ab8SAndrey Konovalov static void kmalloc_double_kzfree(struct kunit *test)
1173f7e01ab8SAndrey Konovalov {
1174f7e01ab8SAndrey Konovalov 	char *ptr;
1175f7e01ab8SAndrey Konovalov 	size_t size = 16;
1176f7e01ab8SAndrey Konovalov 
1177f7e01ab8SAndrey Konovalov 	ptr = kmalloc(size, GFP_KERNEL);
1178f7e01ab8SAndrey Konovalov 	KUNIT_ASSERT_NOT_ERR_OR_NULL(test, ptr);
1179f7e01ab8SAndrey Konovalov 
1180f7e01ab8SAndrey Konovalov 	kfree_sensitive(ptr);
1181f7e01ab8SAndrey Konovalov 	KUNIT_EXPECT_KASAN_FAIL(test, kfree_sensitive(ptr));
1182f7e01ab8SAndrey Konovalov }
1183f7e01ab8SAndrey Konovalov 
1184b2c5bd4cSAndrey Konovalov /*
1185b2c5bd4cSAndrey Konovalov  * The two tests below check that Generic KASAN prints auxiliary stack traces
1186b2c5bd4cSAndrey Konovalov  * for RCU callbacks and workqueues. The reports need to be inspected manually.
1187b2c5bd4cSAndrey Konovalov  *
1188b2c5bd4cSAndrey Konovalov  * These tests are still enabled for other KASAN modes to make sure that all
1189b2c5bd4cSAndrey Konovalov  * modes report bad accesses in tested scenarios.
1190b2c5bd4cSAndrey Konovalov  */
1191b2c5bd4cSAndrey Konovalov 
11928516e837SAndrey Konovalov static struct kasan_rcu_info {
11938516e837SAndrey Konovalov 	int i;
11948516e837SAndrey Konovalov 	struct rcu_head rcu;
11958516e837SAndrey Konovalov } *global_rcu_ptr;
11968516e837SAndrey Konovalov 
11978516e837SAndrey Konovalov static void rcu_uaf_reclaim(struct rcu_head *rp)
11988516e837SAndrey Konovalov {
11998516e837SAndrey Konovalov 	struct kasan_rcu_info *fp =
12008516e837SAndrey Konovalov 		container_of(rp, struct kasan_rcu_info, rcu);
12018516e837SAndrey Konovalov 
12028516e837SAndrey Konovalov 	kfree(fp);
12038516e837SAndrey Konovalov 	((volatile struct kasan_rcu_info *)fp)->i;
12048516e837SAndrey Konovalov }
12058516e837SAndrey Konovalov 
12068516e837SAndrey Konovalov static void rcu_uaf(struct kunit *test)
12078516e837SAndrey Konovalov {
12088516e837SAndrey Konovalov 	struct kasan_rcu_info *ptr;
12098516e837SAndrey Konovalov 
12108516e837SAndrey Konovalov 	ptr = kmalloc(sizeof(struct kasan_rcu_info), GFP_KERNEL);
12118516e837SAndrey Konovalov 	KUNIT_ASSERT_NOT_ERR_OR_NULL(test, ptr);
12128516e837SAndrey Konovalov 
12138516e837SAndrey Konovalov 	global_rcu_ptr = rcu_dereference_protected(
12148516e837SAndrey Konovalov 				(struct kasan_rcu_info __rcu *)ptr, NULL);
12158516e837SAndrey Konovalov 
12168516e837SAndrey Konovalov 	KUNIT_EXPECT_KASAN_FAIL(test,
12178516e837SAndrey Konovalov 		call_rcu(&global_rcu_ptr->rcu, rcu_uaf_reclaim);
12188516e837SAndrey Konovalov 		rcu_barrier());
12198516e837SAndrey Konovalov }
12208516e837SAndrey Konovalov 
1221b2c5bd4cSAndrey Konovalov static void workqueue_uaf_work(struct work_struct *work)
1222b2c5bd4cSAndrey Konovalov {
1223b2c5bd4cSAndrey Konovalov 	kfree(work);
1224b2c5bd4cSAndrey Konovalov }
1225b2c5bd4cSAndrey Konovalov 
1226b2c5bd4cSAndrey Konovalov static void workqueue_uaf(struct kunit *test)
1227b2c5bd4cSAndrey Konovalov {
1228b2c5bd4cSAndrey Konovalov 	struct workqueue_struct *workqueue;
1229b2c5bd4cSAndrey Konovalov 	struct work_struct *work;
1230b2c5bd4cSAndrey Konovalov 
1231b2c5bd4cSAndrey Konovalov 	workqueue = create_workqueue("kasan_workqueue_test");
1232b2c5bd4cSAndrey Konovalov 	KUNIT_ASSERT_NOT_ERR_OR_NULL(test, workqueue);
1233b2c5bd4cSAndrey Konovalov 
1234b2c5bd4cSAndrey Konovalov 	work = kmalloc(sizeof(struct work_struct), GFP_KERNEL);
1235b2c5bd4cSAndrey Konovalov 	KUNIT_ASSERT_NOT_ERR_OR_NULL(test, work);
1236b2c5bd4cSAndrey Konovalov 
1237b2c5bd4cSAndrey Konovalov 	INIT_WORK(work, workqueue_uaf_work);
1238b2c5bd4cSAndrey Konovalov 	queue_work(workqueue, work);
1239b2c5bd4cSAndrey Konovalov 	destroy_workqueue(workqueue);
1240b2c5bd4cSAndrey Konovalov 
1241b2c5bd4cSAndrey Konovalov 	KUNIT_EXPECT_KASAN_FAIL(test,
1242b2c5bd4cSAndrey Konovalov 		((volatile struct work_struct *)work)->data);
1243b2c5bd4cSAndrey Konovalov }
1244b2c5bd4cSAndrey Konovalov 
1245f7e01ab8SAndrey Konovalov static void vmalloc_helpers_tags(struct kunit *test)
1246f7e01ab8SAndrey Konovalov {
1247f7e01ab8SAndrey Konovalov 	void *ptr;
1248f7e01ab8SAndrey Konovalov 
1249f7e01ab8SAndrey Konovalov 	/* This test is intended for tag-based modes. */
1250f7e01ab8SAndrey Konovalov 	KASAN_TEST_NEEDS_CONFIG_OFF(test, CONFIG_KASAN_GENERIC);
1251f7e01ab8SAndrey Konovalov 
1252f7e01ab8SAndrey Konovalov 	KASAN_TEST_NEEDS_CONFIG_ON(test, CONFIG_KASAN_VMALLOC);
1253f7e01ab8SAndrey Konovalov 
1254f7e01ab8SAndrey Konovalov 	ptr = vmalloc(PAGE_SIZE);
1255f7e01ab8SAndrey Konovalov 	KUNIT_ASSERT_NOT_ERR_OR_NULL(test, ptr);
1256f7e01ab8SAndrey Konovalov 
1257f7e01ab8SAndrey Konovalov 	/* Check that the returned pointer is tagged. */
1258f7e01ab8SAndrey Konovalov 	KUNIT_EXPECT_GE(test, (u8)get_tag(ptr), (u8)KASAN_TAG_MIN);
1259f7e01ab8SAndrey Konovalov 	KUNIT_EXPECT_LT(test, (u8)get_tag(ptr), (u8)KASAN_TAG_KERNEL);
1260f7e01ab8SAndrey Konovalov 
1261f7e01ab8SAndrey Konovalov 	/* Make sure exported vmalloc helpers handle tagged pointers. */
1262f7e01ab8SAndrey Konovalov 	KUNIT_ASSERT_TRUE(test, is_vmalloc_addr(ptr));
1263f7e01ab8SAndrey Konovalov 	KUNIT_ASSERT_NOT_ERR_OR_NULL(test, vmalloc_to_page(ptr));
1264f7e01ab8SAndrey Konovalov 
1265f7e01ab8SAndrey Konovalov #if !IS_MODULE(CONFIG_KASAN_KUNIT_TEST)
1266f7e01ab8SAndrey Konovalov 	{
1267f7e01ab8SAndrey Konovalov 		int rv;
1268f7e01ab8SAndrey Konovalov 
1269f7e01ab8SAndrey Konovalov 		/* Make sure vmalloc'ed memory permissions can be changed. */
1270f7e01ab8SAndrey Konovalov 		rv = set_memory_ro((unsigned long)ptr, 1);
1271f7e01ab8SAndrey Konovalov 		KUNIT_ASSERT_GE(test, rv, 0);
1272f7e01ab8SAndrey Konovalov 		rv = set_memory_rw((unsigned long)ptr, 1);
1273f7e01ab8SAndrey Konovalov 		KUNIT_ASSERT_GE(test, rv, 0);
1274f7e01ab8SAndrey Konovalov 	}
1275f7e01ab8SAndrey Konovalov #endif
1276f7e01ab8SAndrey Konovalov 
1277f7e01ab8SAndrey Konovalov 	vfree(ptr);
1278f7e01ab8SAndrey Konovalov }
1279f7e01ab8SAndrey Konovalov 
1280f7e01ab8SAndrey Konovalov static void vmalloc_oob(struct kunit *test)
1281f7e01ab8SAndrey Konovalov {
1282f7e01ab8SAndrey Konovalov 	char *v_ptr, *p_ptr;
1283f7e01ab8SAndrey Konovalov 	struct page *page;
1284f7e01ab8SAndrey Konovalov 	size_t size = PAGE_SIZE / 2 - KASAN_GRANULE_SIZE - 5;
1285f7e01ab8SAndrey Konovalov 
1286f7e01ab8SAndrey Konovalov 	KASAN_TEST_NEEDS_CONFIG_ON(test, CONFIG_KASAN_VMALLOC);
1287f7e01ab8SAndrey Konovalov 
1288f7e01ab8SAndrey Konovalov 	v_ptr = vmalloc(size);
1289f7e01ab8SAndrey Konovalov 	KUNIT_ASSERT_NOT_ERR_OR_NULL(test, v_ptr);
1290f7e01ab8SAndrey Konovalov 
1291f7e01ab8SAndrey Konovalov 	OPTIMIZER_HIDE_VAR(v_ptr);
1292f7e01ab8SAndrey Konovalov 
1293f7e01ab8SAndrey Konovalov 	/*
1294f7e01ab8SAndrey Konovalov 	 * We have to be careful not to hit the guard page in vmalloc tests.
1295f7e01ab8SAndrey Konovalov 	 * The MMU will catch that and crash us.
1296f7e01ab8SAndrey Konovalov 	 */
1297f7e01ab8SAndrey Konovalov 
1298f7e01ab8SAndrey Konovalov 	/* Make sure in-bounds accesses are valid. */
1299f7e01ab8SAndrey Konovalov 	v_ptr[0] = 0;
1300f7e01ab8SAndrey Konovalov 	v_ptr[size - 1] = 0;
1301f7e01ab8SAndrey Konovalov 
1302f7e01ab8SAndrey Konovalov 	/*
1303f7e01ab8SAndrey Konovalov 	 * An unaligned access past the requested vmalloc size.
1304f7e01ab8SAndrey Konovalov 	 * Only generic KASAN can precisely detect these.
1305f7e01ab8SAndrey Konovalov 	 */
1306f7e01ab8SAndrey Konovalov 	if (IS_ENABLED(CONFIG_KASAN_GENERIC))
1307f7e01ab8SAndrey Konovalov 		KUNIT_EXPECT_KASAN_FAIL(test, ((volatile char *)v_ptr)[size]);
1308f7e01ab8SAndrey Konovalov 
1309f7e01ab8SAndrey Konovalov 	/* An aligned access into the first out-of-bounds granule. */
1310f7e01ab8SAndrey Konovalov 	KUNIT_EXPECT_KASAN_FAIL(test, ((volatile char *)v_ptr)[size + 5]);
1311f7e01ab8SAndrey Konovalov 
1312f7e01ab8SAndrey Konovalov 	/* Check that in-bounds accesses to the physical page are valid. */
1313f7e01ab8SAndrey Konovalov 	page = vmalloc_to_page(v_ptr);
1314f7e01ab8SAndrey Konovalov 	KUNIT_ASSERT_NOT_ERR_OR_NULL(test, page);
1315f7e01ab8SAndrey Konovalov 	p_ptr = page_address(page);
1316f7e01ab8SAndrey Konovalov 	KUNIT_ASSERT_NOT_ERR_OR_NULL(test, p_ptr);
1317f7e01ab8SAndrey Konovalov 	p_ptr[0] = 0;
1318f7e01ab8SAndrey Konovalov 
1319f7e01ab8SAndrey Konovalov 	vfree(v_ptr);
1320f7e01ab8SAndrey Konovalov 
1321f7e01ab8SAndrey Konovalov 	/*
1322f7e01ab8SAndrey Konovalov 	 * We can't check for use-after-unmap bugs in this nor in the following
1323f7e01ab8SAndrey Konovalov 	 * vmalloc tests, as the page might be fully unmapped and accessing it
1324f7e01ab8SAndrey Konovalov 	 * will crash the kernel.
1325f7e01ab8SAndrey Konovalov 	 */
1326f7e01ab8SAndrey Konovalov }
1327f7e01ab8SAndrey Konovalov 
1328f7e01ab8SAndrey Konovalov static void vmap_tags(struct kunit *test)
1329f7e01ab8SAndrey Konovalov {
1330f7e01ab8SAndrey Konovalov 	char *p_ptr, *v_ptr;
1331f7e01ab8SAndrey Konovalov 	struct page *p_page, *v_page;
1332f7e01ab8SAndrey Konovalov 
1333f7e01ab8SAndrey Konovalov 	/*
1334f7e01ab8SAndrey Konovalov 	 * This test is specifically crafted for the software tag-based mode,
1335f7e01ab8SAndrey Konovalov 	 * the only tag-based mode that poisons vmap mappings.
1336f7e01ab8SAndrey Konovalov 	 */
1337f7e01ab8SAndrey Konovalov 	KASAN_TEST_NEEDS_CONFIG_ON(test, CONFIG_KASAN_SW_TAGS);
1338f7e01ab8SAndrey Konovalov 
1339f7e01ab8SAndrey Konovalov 	KASAN_TEST_NEEDS_CONFIG_ON(test, CONFIG_KASAN_VMALLOC);
1340f7e01ab8SAndrey Konovalov 
1341f7e01ab8SAndrey Konovalov 	p_page = alloc_pages(GFP_KERNEL, 1);
1342f7e01ab8SAndrey Konovalov 	KUNIT_ASSERT_NOT_ERR_OR_NULL(test, p_page);
1343f7e01ab8SAndrey Konovalov 	p_ptr = page_address(p_page);
1344f7e01ab8SAndrey Konovalov 	KUNIT_ASSERT_NOT_ERR_OR_NULL(test, p_ptr);
1345f7e01ab8SAndrey Konovalov 
1346f7e01ab8SAndrey Konovalov 	v_ptr = vmap(&p_page, 1, VM_MAP, PAGE_KERNEL);
1347f7e01ab8SAndrey Konovalov 	KUNIT_ASSERT_NOT_ERR_OR_NULL(test, v_ptr);
1348f7e01ab8SAndrey Konovalov 
1349f7e01ab8SAndrey Konovalov 	/*
1350f7e01ab8SAndrey Konovalov 	 * We can't check for out-of-bounds bugs in this nor in the following
1351f7e01ab8SAndrey Konovalov 	 * vmalloc tests, as allocations have page granularity and accessing
1352f7e01ab8SAndrey Konovalov 	 * the guard page will crash the kernel.
1353f7e01ab8SAndrey Konovalov 	 */
1354f7e01ab8SAndrey Konovalov 
1355f7e01ab8SAndrey Konovalov 	KUNIT_EXPECT_GE(test, (u8)get_tag(v_ptr), (u8)KASAN_TAG_MIN);
1356f7e01ab8SAndrey Konovalov 	KUNIT_EXPECT_LT(test, (u8)get_tag(v_ptr), (u8)KASAN_TAG_KERNEL);
1357f7e01ab8SAndrey Konovalov 
1358f7e01ab8SAndrey Konovalov 	/* Make sure that in-bounds accesses through both pointers work. */
1359f7e01ab8SAndrey Konovalov 	*p_ptr = 0;
1360f7e01ab8SAndrey Konovalov 	*v_ptr = 0;
1361f7e01ab8SAndrey Konovalov 
1362f7e01ab8SAndrey Konovalov 	/* Make sure vmalloc_to_page() correctly recovers the page pointer. */
1363f7e01ab8SAndrey Konovalov 	v_page = vmalloc_to_page(v_ptr);
1364f7e01ab8SAndrey Konovalov 	KUNIT_ASSERT_NOT_ERR_OR_NULL(test, v_page);
1365f7e01ab8SAndrey Konovalov 	KUNIT_EXPECT_PTR_EQ(test, p_page, v_page);
1366f7e01ab8SAndrey Konovalov 
1367f7e01ab8SAndrey Konovalov 	vunmap(v_ptr);
1368f7e01ab8SAndrey Konovalov 	free_pages((unsigned long)p_ptr, 1);
1369f7e01ab8SAndrey Konovalov }
1370f7e01ab8SAndrey Konovalov 
1371f7e01ab8SAndrey Konovalov static void vm_map_ram_tags(struct kunit *test)
1372f7e01ab8SAndrey Konovalov {
1373f7e01ab8SAndrey Konovalov 	char *p_ptr, *v_ptr;
1374f7e01ab8SAndrey Konovalov 	struct page *page;
1375f7e01ab8SAndrey Konovalov 
1376f7e01ab8SAndrey Konovalov 	/*
1377f7e01ab8SAndrey Konovalov 	 * This test is specifically crafted for the software tag-based mode,
1378f7e01ab8SAndrey Konovalov 	 * the only tag-based mode that poisons vm_map_ram mappings.
1379f7e01ab8SAndrey Konovalov 	 */
1380f7e01ab8SAndrey Konovalov 	KASAN_TEST_NEEDS_CONFIG_ON(test, CONFIG_KASAN_SW_TAGS);
1381f7e01ab8SAndrey Konovalov 
1382f7e01ab8SAndrey Konovalov 	page = alloc_pages(GFP_KERNEL, 1);
1383f7e01ab8SAndrey Konovalov 	KUNIT_ASSERT_NOT_ERR_OR_NULL(test, page);
1384f7e01ab8SAndrey Konovalov 	p_ptr = page_address(page);
1385f7e01ab8SAndrey Konovalov 	KUNIT_ASSERT_NOT_ERR_OR_NULL(test, p_ptr);
1386f7e01ab8SAndrey Konovalov 
1387f7e01ab8SAndrey Konovalov 	v_ptr = vm_map_ram(&page, 1, -1);
1388f7e01ab8SAndrey Konovalov 	KUNIT_ASSERT_NOT_ERR_OR_NULL(test, v_ptr);
1389f7e01ab8SAndrey Konovalov 
1390f7e01ab8SAndrey Konovalov 	KUNIT_EXPECT_GE(test, (u8)get_tag(v_ptr), (u8)KASAN_TAG_MIN);
1391f7e01ab8SAndrey Konovalov 	KUNIT_EXPECT_LT(test, (u8)get_tag(v_ptr), (u8)KASAN_TAG_KERNEL);
1392f7e01ab8SAndrey Konovalov 
1393f7e01ab8SAndrey Konovalov 	/* Make sure that in-bounds accesses through both pointers work. */
1394f7e01ab8SAndrey Konovalov 	*p_ptr = 0;
1395f7e01ab8SAndrey Konovalov 	*v_ptr = 0;
1396f7e01ab8SAndrey Konovalov 
1397f7e01ab8SAndrey Konovalov 	vm_unmap_ram(v_ptr, 1);
1398f7e01ab8SAndrey Konovalov 	free_pages((unsigned long)p_ptr, 1);
1399f7e01ab8SAndrey Konovalov }
1400f7e01ab8SAndrey Konovalov 
1401f7e01ab8SAndrey Konovalov static void vmalloc_percpu(struct kunit *test)
1402f7e01ab8SAndrey Konovalov {
1403f7e01ab8SAndrey Konovalov 	char __percpu *ptr;
1404f7e01ab8SAndrey Konovalov 	int cpu;
1405f7e01ab8SAndrey Konovalov 
1406f7e01ab8SAndrey Konovalov 	/*
1407f7e01ab8SAndrey Konovalov 	 * This test is specifically crafted for the software tag-based mode,
1408f7e01ab8SAndrey Konovalov 	 * the only tag-based mode that poisons percpu mappings.
1409f7e01ab8SAndrey Konovalov 	 */
1410f7e01ab8SAndrey Konovalov 	KASAN_TEST_NEEDS_CONFIG_ON(test, CONFIG_KASAN_SW_TAGS);
1411f7e01ab8SAndrey Konovalov 
1412f7e01ab8SAndrey Konovalov 	ptr = __alloc_percpu(PAGE_SIZE, PAGE_SIZE);
1413f7e01ab8SAndrey Konovalov 
1414f7e01ab8SAndrey Konovalov 	for_each_possible_cpu(cpu) {
1415f7e01ab8SAndrey Konovalov 		char *c_ptr = per_cpu_ptr(ptr, cpu);
1416f7e01ab8SAndrey Konovalov 
1417f7e01ab8SAndrey Konovalov 		KUNIT_EXPECT_GE(test, (u8)get_tag(c_ptr), (u8)KASAN_TAG_MIN);
1418f7e01ab8SAndrey Konovalov 		KUNIT_EXPECT_LT(test, (u8)get_tag(c_ptr), (u8)KASAN_TAG_KERNEL);
1419f7e01ab8SAndrey Konovalov 
1420f7e01ab8SAndrey Konovalov 		/* Make sure that in-bounds accesses don't crash the kernel. */
1421f7e01ab8SAndrey Konovalov 		*c_ptr = 0;
1422f7e01ab8SAndrey Konovalov 	}
1423f7e01ab8SAndrey Konovalov 
1424f7e01ab8SAndrey Konovalov 	free_percpu(ptr);
1425f7e01ab8SAndrey Konovalov }
1426f7e01ab8SAndrey Konovalov 
1427f7e01ab8SAndrey Konovalov /*
1428f7e01ab8SAndrey Konovalov  * Check that the assigned pointer tag falls within the [KASAN_TAG_MIN,
1429f7e01ab8SAndrey Konovalov  * KASAN_TAG_KERNEL) range (note: excluding the match-all tag) for tag-based
1430f7e01ab8SAndrey Konovalov  * modes.
1431f7e01ab8SAndrey Konovalov  */
1432f7e01ab8SAndrey Konovalov static void match_all_not_assigned(struct kunit *test)
1433f7e01ab8SAndrey Konovalov {
1434f7e01ab8SAndrey Konovalov 	char *ptr;
1435f7e01ab8SAndrey Konovalov 	struct page *pages;
1436f7e01ab8SAndrey Konovalov 	int i, size, order;
1437f7e01ab8SAndrey Konovalov 
1438f7e01ab8SAndrey Konovalov 	KASAN_TEST_NEEDS_CONFIG_OFF(test, CONFIG_KASAN_GENERIC);
1439f7e01ab8SAndrey Konovalov 
1440f7e01ab8SAndrey Konovalov 	for (i = 0; i < 256; i++) {
1441e8a533cbSJason A. Donenfeld 		size = get_random_u32_inclusive(1, 1024);
1442f7e01ab8SAndrey Konovalov 		ptr = kmalloc(size, GFP_KERNEL);
1443f7e01ab8SAndrey Konovalov 		KUNIT_ASSERT_NOT_ERR_OR_NULL(test, ptr);
1444f7e01ab8SAndrey Konovalov 		KUNIT_EXPECT_GE(test, (u8)get_tag(ptr), (u8)KASAN_TAG_MIN);
1445f7e01ab8SAndrey Konovalov 		KUNIT_EXPECT_LT(test, (u8)get_tag(ptr), (u8)KASAN_TAG_KERNEL);
1446f7e01ab8SAndrey Konovalov 		kfree(ptr);
1447f7e01ab8SAndrey Konovalov 	}
1448f7e01ab8SAndrey Konovalov 
1449f7e01ab8SAndrey Konovalov 	for (i = 0; i < 256; i++) {
1450e8a533cbSJason A. Donenfeld 		order = get_random_u32_inclusive(1, 4);
1451f7e01ab8SAndrey Konovalov 		pages = alloc_pages(GFP_KERNEL, order);
1452f7e01ab8SAndrey Konovalov 		ptr = page_address(pages);
1453f7e01ab8SAndrey Konovalov 		KUNIT_ASSERT_NOT_ERR_OR_NULL(test, ptr);
1454f7e01ab8SAndrey Konovalov 		KUNIT_EXPECT_GE(test, (u8)get_tag(ptr), (u8)KASAN_TAG_MIN);
1455f7e01ab8SAndrey Konovalov 		KUNIT_EXPECT_LT(test, (u8)get_tag(ptr), (u8)KASAN_TAG_KERNEL);
1456f7e01ab8SAndrey Konovalov 		free_pages((unsigned long)ptr, order);
1457f7e01ab8SAndrey Konovalov 	}
1458f7e01ab8SAndrey Konovalov 
1459f7e01ab8SAndrey Konovalov 	if (!IS_ENABLED(CONFIG_KASAN_VMALLOC))
1460f7e01ab8SAndrey Konovalov 		return;
1461f7e01ab8SAndrey Konovalov 
1462f7e01ab8SAndrey Konovalov 	for (i = 0; i < 256; i++) {
1463e8a533cbSJason A. Donenfeld 		size = get_random_u32_inclusive(1, 1024);
1464f7e01ab8SAndrey Konovalov 		ptr = vmalloc(size);
1465f7e01ab8SAndrey Konovalov 		KUNIT_ASSERT_NOT_ERR_OR_NULL(test, ptr);
1466f7e01ab8SAndrey Konovalov 		KUNIT_EXPECT_GE(test, (u8)get_tag(ptr), (u8)KASAN_TAG_MIN);
1467f7e01ab8SAndrey Konovalov 		KUNIT_EXPECT_LT(test, (u8)get_tag(ptr), (u8)KASAN_TAG_KERNEL);
1468f7e01ab8SAndrey Konovalov 		vfree(ptr);
1469f7e01ab8SAndrey Konovalov 	}
1470f7e01ab8SAndrey Konovalov }
1471f7e01ab8SAndrey Konovalov 
1472f7e01ab8SAndrey Konovalov /* Check that 0xff works as a match-all pointer tag for tag-based modes. */
1473f7e01ab8SAndrey Konovalov static void match_all_ptr_tag(struct kunit *test)
1474f7e01ab8SAndrey Konovalov {
1475f7e01ab8SAndrey Konovalov 	char *ptr;
1476f7e01ab8SAndrey Konovalov 	u8 tag;
1477f7e01ab8SAndrey Konovalov 
1478f7e01ab8SAndrey Konovalov 	KASAN_TEST_NEEDS_CONFIG_OFF(test, CONFIG_KASAN_GENERIC);
1479f7e01ab8SAndrey Konovalov 
1480f7e01ab8SAndrey Konovalov 	ptr = kmalloc(128, GFP_KERNEL);
1481f7e01ab8SAndrey Konovalov 	KUNIT_ASSERT_NOT_ERR_OR_NULL(test, ptr);
1482f7e01ab8SAndrey Konovalov 
1483f7e01ab8SAndrey Konovalov 	/* Backup the assigned tag. */
1484f7e01ab8SAndrey Konovalov 	tag = get_tag(ptr);
1485f7e01ab8SAndrey Konovalov 	KUNIT_EXPECT_NE(test, tag, (u8)KASAN_TAG_KERNEL);
1486f7e01ab8SAndrey Konovalov 
1487f7e01ab8SAndrey Konovalov 	/* Reset the tag to 0xff.*/
1488f7e01ab8SAndrey Konovalov 	ptr = set_tag(ptr, KASAN_TAG_KERNEL);
1489f7e01ab8SAndrey Konovalov 
1490f7e01ab8SAndrey Konovalov 	/* This access shouldn't trigger a KASAN report. */
1491f7e01ab8SAndrey Konovalov 	*ptr = 0;
1492f7e01ab8SAndrey Konovalov 
1493f7e01ab8SAndrey Konovalov 	/* Recover the pointer tag and free. */
1494f7e01ab8SAndrey Konovalov 	ptr = set_tag(ptr, tag);
1495f7e01ab8SAndrey Konovalov 	kfree(ptr);
1496f7e01ab8SAndrey Konovalov }
1497f7e01ab8SAndrey Konovalov 
1498f7e01ab8SAndrey Konovalov /* Check that there are no match-all memory tags for tag-based modes. */
1499f7e01ab8SAndrey Konovalov static void match_all_mem_tag(struct kunit *test)
1500f7e01ab8SAndrey Konovalov {
1501f7e01ab8SAndrey Konovalov 	char *ptr;
1502f7e01ab8SAndrey Konovalov 	int tag;
1503f7e01ab8SAndrey Konovalov 
1504f7e01ab8SAndrey Konovalov 	KASAN_TEST_NEEDS_CONFIG_OFF(test, CONFIG_KASAN_GENERIC);
1505f7e01ab8SAndrey Konovalov 
1506f7e01ab8SAndrey Konovalov 	ptr = kmalloc(128, GFP_KERNEL);
1507f7e01ab8SAndrey Konovalov 	KUNIT_ASSERT_NOT_ERR_OR_NULL(test, ptr);
1508f7e01ab8SAndrey Konovalov 	KUNIT_EXPECT_NE(test, (u8)get_tag(ptr), (u8)KASAN_TAG_KERNEL);
1509f7e01ab8SAndrey Konovalov 
1510f7e01ab8SAndrey Konovalov 	/* For each possible tag value not matching the pointer tag. */
1511f7e01ab8SAndrey Konovalov 	for (tag = KASAN_TAG_MIN; tag <= KASAN_TAG_KERNEL; tag++) {
1512f7e01ab8SAndrey Konovalov 		if (tag == get_tag(ptr))
1513f7e01ab8SAndrey Konovalov 			continue;
1514f7e01ab8SAndrey Konovalov 
1515f7e01ab8SAndrey Konovalov 		/* Mark the first memory granule with the chosen memory tag. */
1516f7e01ab8SAndrey Konovalov 		kasan_poison(ptr, KASAN_GRANULE_SIZE, (u8)tag, false);
1517f7e01ab8SAndrey Konovalov 
1518f7e01ab8SAndrey Konovalov 		/* This access must cause a KASAN report. */
1519f7e01ab8SAndrey Konovalov 		KUNIT_EXPECT_KASAN_FAIL(test, *ptr = 0);
1520f7e01ab8SAndrey Konovalov 	}
1521f7e01ab8SAndrey Konovalov 
1522f7e01ab8SAndrey Konovalov 	/* Recover the memory tag and free. */
1523f7e01ab8SAndrey Konovalov 	kasan_poison(ptr, KASAN_GRANULE_SIZE, get_tag(ptr), false);
1524f7e01ab8SAndrey Konovalov 	kfree(ptr);
1525f7e01ab8SAndrey Konovalov }
1526f7e01ab8SAndrey Konovalov 
1527f7e01ab8SAndrey Konovalov static struct kunit_case kasan_kunit_test_cases[] = {
1528f7e01ab8SAndrey Konovalov 	KUNIT_CASE(kmalloc_oob_right),
1529f7e01ab8SAndrey Konovalov 	KUNIT_CASE(kmalloc_oob_left),
1530f7e01ab8SAndrey Konovalov 	KUNIT_CASE(kmalloc_node_oob_right),
1531f7e01ab8SAndrey Konovalov 	KUNIT_CASE(kmalloc_pagealloc_oob_right),
1532f7e01ab8SAndrey Konovalov 	KUNIT_CASE(kmalloc_pagealloc_uaf),
1533f7e01ab8SAndrey Konovalov 	KUNIT_CASE(kmalloc_pagealloc_invalid_free),
1534f7e01ab8SAndrey Konovalov 	KUNIT_CASE(pagealloc_oob_right),
1535f7e01ab8SAndrey Konovalov 	KUNIT_CASE(pagealloc_uaf),
1536f7e01ab8SAndrey Konovalov 	KUNIT_CASE(kmalloc_large_oob_right),
1537f7e01ab8SAndrey Konovalov 	KUNIT_CASE(krealloc_more_oob),
1538f7e01ab8SAndrey Konovalov 	KUNIT_CASE(krealloc_less_oob),
1539f7e01ab8SAndrey Konovalov 	KUNIT_CASE(krealloc_pagealloc_more_oob),
1540f7e01ab8SAndrey Konovalov 	KUNIT_CASE(krealloc_pagealloc_less_oob),
1541f7e01ab8SAndrey Konovalov 	KUNIT_CASE(krealloc_uaf),
1542f7e01ab8SAndrey Konovalov 	KUNIT_CASE(kmalloc_oob_16),
1543f7e01ab8SAndrey Konovalov 	KUNIT_CASE(kmalloc_uaf_16),
1544f7e01ab8SAndrey Konovalov 	KUNIT_CASE(kmalloc_oob_in_memset),
1545f7e01ab8SAndrey Konovalov 	KUNIT_CASE(kmalloc_oob_memset_2),
1546f7e01ab8SAndrey Konovalov 	KUNIT_CASE(kmalloc_oob_memset_4),
1547f7e01ab8SAndrey Konovalov 	KUNIT_CASE(kmalloc_oob_memset_8),
1548f7e01ab8SAndrey Konovalov 	KUNIT_CASE(kmalloc_oob_memset_16),
1549f7e01ab8SAndrey Konovalov 	KUNIT_CASE(kmalloc_memmove_negative_size),
1550f7e01ab8SAndrey Konovalov 	KUNIT_CASE(kmalloc_memmove_invalid_size),
1551f7e01ab8SAndrey Konovalov 	KUNIT_CASE(kmalloc_uaf),
1552f7e01ab8SAndrey Konovalov 	KUNIT_CASE(kmalloc_uaf_memset),
1553f7e01ab8SAndrey Konovalov 	KUNIT_CASE(kmalloc_uaf2),
1554f7e01ab8SAndrey Konovalov 	KUNIT_CASE(kmalloc_uaf3),
1555f7e01ab8SAndrey Konovalov 	KUNIT_CASE(kfree_via_page),
1556f7e01ab8SAndrey Konovalov 	KUNIT_CASE(kfree_via_phys),
1557f7e01ab8SAndrey Konovalov 	KUNIT_CASE(kmem_cache_oob),
1558f7e01ab8SAndrey Konovalov 	KUNIT_CASE(kmem_cache_accounted),
1559f7e01ab8SAndrey Konovalov 	KUNIT_CASE(kmem_cache_bulk),
1560f7e01ab8SAndrey Konovalov 	KUNIT_CASE(kasan_global_oob_right),
1561f7e01ab8SAndrey Konovalov 	KUNIT_CASE(kasan_global_oob_left),
1562f7e01ab8SAndrey Konovalov 	KUNIT_CASE(kasan_stack_oob),
1563f7e01ab8SAndrey Konovalov 	KUNIT_CASE(kasan_alloca_oob_left),
1564f7e01ab8SAndrey Konovalov 	KUNIT_CASE(kasan_alloca_oob_right),
1565f7e01ab8SAndrey Konovalov 	KUNIT_CASE(ksize_unpoisons_memory),
1566f7e01ab8SAndrey Konovalov 	KUNIT_CASE(ksize_uaf),
1567f7e01ab8SAndrey Konovalov 	KUNIT_CASE(kmem_cache_double_free),
1568f7e01ab8SAndrey Konovalov 	KUNIT_CASE(kmem_cache_invalid_free),
1569f7e01ab8SAndrey Konovalov 	KUNIT_CASE(kmem_cache_double_destroy),
1570f7e01ab8SAndrey Konovalov 	KUNIT_CASE(kasan_memchr),
1571f7e01ab8SAndrey Konovalov 	KUNIT_CASE(kasan_memcmp),
1572f7e01ab8SAndrey Konovalov 	KUNIT_CASE(kasan_strings),
1573f7e01ab8SAndrey Konovalov 	KUNIT_CASE(kasan_bitops_generic),
1574f7e01ab8SAndrey Konovalov 	KUNIT_CASE(kasan_bitops_tags),
1575f7e01ab8SAndrey Konovalov 	KUNIT_CASE(kmalloc_double_kzfree),
15768516e837SAndrey Konovalov 	KUNIT_CASE(rcu_uaf),
1577b2c5bd4cSAndrey Konovalov 	KUNIT_CASE(workqueue_uaf),
1578f7e01ab8SAndrey Konovalov 	KUNIT_CASE(vmalloc_helpers_tags),
1579f7e01ab8SAndrey Konovalov 	KUNIT_CASE(vmalloc_oob),
1580f7e01ab8SAndrey Konovalov 	KUNIT_CASE(vmap_tags),
1581f7e01ab8SAndrey Konovalov 	KUNIT_CASE(vm_map_ram_tags),
1582f7e01ab8SAndrey Konovalov 	KUNIT_CASE(vmalloc_percpu),
1583f7e01ab8SAndrey Konovalov 	KUNIT_CASE(match_all_not_assigned),
1584f7e01ab8SAndrey Konovalov 	KUNIT_CASE(match_all_ptr_tag),
1585f7e01ab8SAndrey Konovalov 	KUNIT_CASE(match_all_mem_tag),
1586f7e01ab8SAndrey Konovalov 	{}
1587f7e01ab8SAndrey Konovalov };
1588f7e01ab8SAndrey Konovalov 
1589f7e01ab8SAndrey Konovalov static struct kunit_suite kasan_kunit_test_suite = {
1590f7e01ab8SAndrey Konovalov 	.name = "kasan",
1591f7e01ab8SAndrey Konovalov 	.test_cases = kasan_kunit_test_cases,
1592f7e01ab8SAndrey Konovalov 	.exit = kasan_test_exit,
15937ce0ea19SAndrey Konovalov 	.suite_init = kasan_suite_init,
15947ce0ea19SAndrey Konovalov 	.suite_exit = kasan_suite_exit,
1595f7e01ab8SAndrey Konovalov };
1596f7e01ab8SAndrey Konovalov 
1597f7e01ab8SAndrey Konovalov kunit_test_suite(kasan_kunit_test_suite);
1598f7e01ab8SAndrey Konovalov 
1599f7e01ab8SAndrey Konovalov MODULE_LICENSE("GPL");
1600