xref: /kernel/linux/linux-5.10/lib/test_kasan.c (revision 8c2ecf20)
18c2ecf20Sopenharmony_ci// SPDX-License-Identifier: GPL-2.0-only
28c2ecf20Sopenharmony_ci/*
38c2ecf20Sopenharmony_ci *
48c2ecf20Sopenharmony_ci * Copyright (c) 2014 Samsung Electronics Co., Ltd.
58c2ecf20Sopenharmony_ci * Author: Andrey Ryabinin <a.ryabinin@samsung.com>
68c2ecf20Sopenharmony_ci */
78c2ecf20Sopenharmony_ci
88c2ecf20Sopenharmony_ci#include <linux/bitops.h>
98c2ecf20Sopenharmony_ci#include <linux/delay.h>
108c2ecf20Sopenharmony_ci#include <linux/kasan.h>
118c2ecf20Sopenharmony_ci#include <linux/kernel.h>
128c2ecf20Sopenharmony_ci#include <linux/mm.h>
138c2ecf20Sopenharmony_ci#include <linux/mman.h>
148c2ecf20Sopenharmony_ci#include <linux/module.h>
158c2ecf20Sopenharmony_ci#include <linux/printk.h>
168c2ecf20Sopenharmony_ci#include <linux/slab.h>
178c2ecf20Sopenharmony_ci#include <linux/string.h>
188c2ecf20Sopenharmony_ci#include <linux/uaccess.h>
198c2ecf20Sopenharmony_ci#include <linux/io.h>
208c2ecf20Sopenharmony_ci#include <linux/vmalloc.h>
218c2ecf20Sopenharmony_ci
228c2ecf20Sopenharmony_ci#include <asm/page.h>
238c2ecf20Sopenharmony_ci
248c2ecf20Sopenharmony_ci#include <kunit/test.h>
258c2ecf20Sopenharmony_ci
268c2ecf20Sopenharmony_ci#include "../mm/kasan/kasan.h"
278c2ecf20Sopenharmony_ci
288c2ecf20Sopenharmony_ci#define OOB_TAG_OFF (IS_ENABLED(CONFIG_KASAN_GENERIC) ? 0 : KASAN_SHADOW_SCALE_SIZE)
298c2ecf20Sopenharmony_ci
308c2ecf20Sopenharmony_ci/*
318c2ecf20Sopenharmony_ci * We assign some test results to these globals to make sure the tests
328c2ecf20Sopenharmony_ci * are not eliminated as dead code.
338c2ecf20Sopenharmony_ci */
348c2ecf20Sopenharmony_ci
358c2ecf20Sopenharmony_civoid *kasan_ptr_result;
368c2ecf20Sopenharmony_ciint kasan_int_result;
378c2ecf20Sopenharmony_ci
388c2ecf20Sopenharmony_cistatic struct kunit_resource resource;
398c2ecf20Sopenharmony_cistatic struct kunit_kasan_expectation fail_data;
408c2ecf20Sopenharmony_cistatic bool multishot;
418c2ecf20Sopenharmony_ci
428c2ecf20Sopenharmony_cistatic int kasan_test_init(struct kunit *test)
438c2ecf20Sopenharmony_ci{
448c2ecf20Sopenharmony_ci	/*
458c2ecf20Sopenharmony_ci	 * Temporarily enable multi-shot mode and set panic_on_warn=0.
468c2ecf20Sopenharmony_ci	 * Otherwise, we'd only get a report for the first case.
478c2ecf20Sopenharmony_ci	 */
488c2ecf20Sopenharmony_ci	multishot = kasan_save_enable_multi_shot();
498c2ecf20Sopenharmony_ci
508c2ecf20Sopenharmony_ci	return 0;
518c2ecf20Sopenharmony_ci}
528c2ecf20Sopenharmony_ci
538c2ecf20Sopenharmony_cistatic void kasan_test_exit(struct kunit *test)
548c2ecf20Sopenharmony_ci{
558c2ecf20Sopenharmony_ci	kasan_restore_multi_shot(multishot);
568c2ecf20Sopenharmony_ci}
578c2ecf20Sopenharmony_ci
588c2ecf20Sopenharmony_ci/**
598c2ecf20Sopenharmony_ci * KUNIT_EXPECT_KASAN_FAIL() - Causes a test failure when the expression does
608c2ecf20Sopenharmony_ci * not cause a KASAN error. This uses a KUnit resource named "kasan_data." Do
618c2ecf20Sopenharmony_ci * Do not use this name for a KUnit resource outside here.
628c2ecf20Sopenharmony_ci *
638c2ecf20Sopenharmony_ci */
648c2ecf20Sopenharmony_ci#define KUNIT_EXPECT_KASAN_FAIL(test, condition) do { \
658c2ecf20Sopenharmony_ci	fail_data.report_expected = true; \
668c2ecf20Sopenharmony_ci	fail_data.report_found = false; \
678c2ecf20Sopenharmony_ci	kunit_add_named_resource(test, \
688c2ecf20Sopenharmony_ci				NULL, \
698c2ecf20Sopenharmony_ci				NULL, \
708c2ecf20Sopenharmony_ci				&resource, \
718c2ecf20Sopenharmony_ci				"kasan_data", &fail_data); \
728c2ecf20Sopenharmony_ci	condition; \
738c2ecf20Sopenharmony_ci	KUNIT_EXPECT_EQ(test, \
748c2ecf20Sopenharmony_ci			fail_data.report_expected, \
758c2ecf20Sopenharmony_ci			fail_data.report_found); \
768c2ecf20Sopenharmony_ci} while (0)
778c2ecf20Sopenharmony_ci
788c2ecf20Sopenharmony_cistatic void kmalloc_oob_right(struct kunit *test)
798c2ecf20Sopenharmony_ci{
808c2ecf20Sopenharmony_ci	char *ptr;
818c2ecf20Sopenharmony_ci	size_t size = 123;
828c2ecf20Sopenharmony_ci
838c2ecf20Sopenharmony_ci	ptr = kmalloc(size, GFP_KERNEL);
848c2ecf20Sopenharmony_ci	KUNIT_ASSERT_NOT_ERR_OR_NULL(test, ptr);
858c2ecf20Sopenharmony_ci
868c2ecf20Sopenharmony_ci	KUNIT_EXPECT_KASAN_FAIL(test, ptr[size + OOB_TAG_OFF] = 'x');
878c2ecf20Sopenharmony_ci	kfree(ptr);
888c2ecf20Sopenharmony_ci}
898c2ecf20Sopenharmony_ci
908c2ecf20Sopenharmony_cistatic void kmalloc_oob_left(struct kunit *test)
918c2ecf20Sopenharmony_ci{
928c2ecf20Sopenharmony_ci	char *ptr;
938c2ecf20Sopenharmony_ci	size_t size = 15;
948c2ecf20Sopenharmony_ci
958c2ecf20Sopenharmony_ci	ptr = kmalloc(size, GFP_KERNEL);
968c2ecf20Sopenharmony_ci	KUNIT_ASSERT_NOT_ERR_OR_NULL(test, ptr);
978c2ecf20Sopenharmony_ci
988c2ecf20Sopenharmony_ci	KUNIT_EXPECT_KASAN_FAIL(test, *ptr = *(ptr - 1));
998c2ecf20Sopenharmony_ci	kfree(ptr);
1008c2ecf20Sopenharmony_ci}
1018c2ecf20Sopenharmony_ci
1028c2ecf20Sopenharmony_cistatic void kmalloc_node_oob_right(struct kunit *test)
1038c2ecf20Sopenharmony_ci{
1048c2ecf20Sopenharmony_ci	char *ptr;
1058c2ecf20Sopenharmony_ci	size_t size = 4096;
1068c2ecf20Sopenharmony_ci
1078c2ecf20Sopenharmony_ci	ptr = kmalloc_node(size, GFP_KERNEL, 0);
1088c2ecf20Sopenharmony_ci	KUNIT_ASSERT_NOT_ERR_OR_NULL(test, ptr);
1098c2ecf20Sopenharmony_ci
1108c2ecf20Sopenharmony_ci	KUNIT_EXPECT_KASAN_FAIL(test, ptr[size] = 0);
1118c2ecf20Sopenharmony_ci	kfree(ptr);
1128c2ecf20Sopenharmony_ci}
1138c2ecf20Sopenharmony_ci
1148c2ecf20Sopenharmony_cistatic void kmalloc_pagealloc_oob_right(struct kunit *test)
1158c2ecf20Sopenharmony_ci{
1168c2ecf20Sopenharmony_ci	char *ptr;
1178c2ecf20Sopenharmony_ci	size_t size = KMALLOC_MAX_CACHE_SIZE + 10;
1188c2ecf20Sopenharmony_ci
1198c2ecf20Sopenharmony_ci	if (!IS_ENABLED(CONFIG_SLUB)) {
1208c2ecf20Sopenharmony_ci		kunit_info(test, "CONFIG_SLUB is not enabled.");
1218c2ecf20Sopenharmony_ci		return;
1228c2ecf20Sopenharmony_ci	}
1238c2ecf20Sopenharmony_ci
1248c2ecf20Sopenharmony_ci	/* Allocate a chunk that does not fit into a SLUB cache to trigger
1258c2ecf20Sopenharmony_ci	 * the page allocator fallback.
1268c2ecf20Sopenharmony_ci	 */
1278c2ecf20Sopenharmony_ci	ptr = kmalloc(size, GFP_KERNEL);
1288c2ecf20Sopenharmony_ci	KUNIT_ASSERT_NOT_ERR_OR_NULL(test, ptr);
1298c2ecf20Sopenharmony_ci
1308c2ecf20Sopenharmony_ci	KUNIT_EXPECT_KASAN_FAIL(test, ptr[size + OOB_TAG_OFF] = 0);
1318c2ecf20Sopenharmony_ci	kfree(ptr);
1328c2ecf20Sopenharmony_ci}
1338c2ecf20Sopenharmony_ci
1348c2ecf20Sopenharmony_cistatic void kmalloc_pagealloc_uaf(struct kunit *test)
1358c2ecf20Sopenharmony_ci{
1368c2ecf20Sopenharmony_ci	char *ptr;
1378c2ecf20Sopenharmony_ci	size_t size = KMALLOC_MAX_CACHE_SIZE + 10;
1388c2ecf20Sopenharmony_ci
1398c2ecf20Sopenharmony_ci	if (!IS_ENABLED(CONFIG_SLUB)) {
1408c2ecf20Sopenharmony_ci		kunit_info(test, "CONFIG_SLUB is not enabled.");
1418c2ecf20Sopenharmony_ci		return;
1428c2ecf20Sopenharmony_ci	}
1438c2ecf20Sopenharmony_ci
1448c2ecf20Sopenharmony_ci	ptr = kmalloc(size, GFP_KERNEL);
1458c2ecf20Sopenharmony_ci	KUNIT_ASSERT_NOT_ERR_OR_NULL(test, ptr);
1468c2ecf20Sopenharmony_ci
1478c2ecf20Sopenharmony_ci	kfree(ptr);
1488c2ecf20Sopenharmony_ci	KUNIT_EXPECT_KASAN_FAIL(test, ptr[0] = 0);
1498c2ecf20Sopenharmony_ci}
1508c2ecf20Sopenharmony_ci
1518c2ecf20Sopenharmony_cistatic void kmalloc_pagealloc_invalid_free(struct kunit *test)
1528c2ecf20Sopenharmony_ci{
1538c2ecf20Sopenharmony_ci	char *ptr;
1548c2ecf20Sopenharmony_ci	size_t size = KMALLOC_MAX_CACHE_SIZE + 10;
1558c2ecf20Sopenharmony_ci
1568c2ecf20Sopenharmony_ci	if (!IS_ENABLED(CONFIG_SLUB)) {
1578c2ecf20Sopenharmony_ci		kunit_info(test, "CONFIG_SLUB is not enabled.");
1588c2ecf20Sopenharmony_ci		return;
1598c2ecf20Sopenharmony_ci	}
1608c2ecf20Sopenharmony_ci
1618c2ecf20Sopenharmony_ci	ptr = kmalloc(size, GFP_KERNEL);
1628c2ecf20Sopenharmony_ci	KUNIT_ASSERT_NOT_ERR_OR_NULL(test, ptr);
1638c2ecf20Sopenharmony_ci
1648c2ecf20Sopenharmony_ci	KUNIT_EXPECT_KASAN_FAIL(test, kfree(ptr + 1));
1658c2ecf20Sopenharmony_ci}
1668c2ecf20Sopenharmony_ci
1678c2ecf20Sopenharmony_cistatic void kmalloc_large_oob_right(struct kunit *test)
1688c2ecf20Sopenharmony_ci{
1698c2ecf20Sopenharmony_ci	char *ptr;
1708c2ecf20Sopenharmony_ci	size_t size = KMALLOC_MAX_CACHE_SIZE - 256;
1718c2ecf20Sopenharmony_ci	/* Allocate a chunk that is large enough, but still fits into a slab
1728c2ecf20Sopenharmony_ci	 * and does not trigger the page allocator fallback in SLUB.
1738c2ecf20Sopenharmony_ci	 */
1748c2ecf20Sopenharmony_ci	ptr = kmalloc(size, GFP_KERNEL);
1758c2ecf20Sopenharmony_ci	KUNIT_ASSERT_NOT_ERR_OR_NULL(test, ptr);
1768c2ecf20Sopenharmony_ci
1778c2ecf20Sopenharmony_ci	KUNIT_EXPECT_KASAN_FAIL(test, ptr[size] = 0);
1788c2ecf20Sopenharmony_ci	kfree(ptr);
1798c2ecf20Sopenharmony_ci}
1808c2ecf20Sopenharmony_ci
1818c2ecf20Sopenharmony_cistatic void kmalloc_oob_krealloc_more(struct kunit *test)
1828c2ecf20Sopenharmony_ci{
1838c2ecf20Sopenharmony_ci	char *ptr1, *ptr2;
1848c2ecf20Sopenharmony_ci	size_t size1 = 17;
1858c2ecf20Sopenharmony_ci	size_t size2 = 19;
1868c2ecf20Sopenharmony_ci
1878c2ecf20Sopenharmony_ci	ptr1 = kmalloc(size1, GFP_KERNEL);
1888c2ecf20Sopenharmony_ci	KUNIT_ASSERT_NOT_ERR_OR_NULL(test, ptr1);
1898c2ecf20Sopenharmony_ci
1908c2ecf20Sopenharmony_ci	ptr2 = krealloc(ptr1, size2, GFP_KERNEL);
1918c2ecf20Sopenharmony_ci	KUNIT_ASSERT_NOT_ERR_OR_NULL(test, ptr2);
1928c2ecf20Sopenharmony_ci
1938c2ecf20Sopenharmony_ci	KUNIT_EXPECT_KASAN_FAIL(test, ptr2[size2 + OOB_TAG_OFF] = 'x');
1948c2ecf20Sopenharmony_ci	kfree(ptr2);
1958c2ecf20Sopenharmony_ci}
1968c2ecf20Sopenharmony_ci
1978c2ecf20Sopenharmony_cistatic void kmalloc_oob_krealloc_less(struct kunit *test)
1988c2ecf20Sopenharmony_ci{
1998c2ecf20Sopenharmony_ci	char *ptr1, *ptr2;
2008c2ecf20Sopenharmony_ci	size_t size1 = 17;
2018c2ecf20Sopenharmony_ci	size_t size2 = 15;
2028c2ecf20Sopenharmony_ci
2038c2ecf20Sopenharmony_ci	ptr1 = kmalloc(size1, GFP_KERNEL);
2048c2ecf20Sopenharmony_ci	KUNIT_ASSERT_NOT_ERR_OR_NULL(test, ptr1);
2058c2ecf20Sopenharmony_ci
2068c2ecf20Sopenharmony_ci	ptr2 = krealloc(ptr1, size2, GFP_KERNEL);
2078c2ecf20Sopenharmony_ci	KUNIT_ASSERT_NOT_ERR_OR_NULL(test, ptr2);
2088c2ecf20Sopenharmony_ci
2098c2ecf20Sopenharmony_ci	KUNIT_EXPECT_KASAN_FAIL(test, ptr2[size2 + OOB_TAG_OFF] = 'x');
2108c2ecf20Sopenharmony_ci	kfree(ptr2);
2118c2ecf20Sopenharmony_ci}
2128c2ecf20Sopenharmony_ci
2138c2ecf20Sopenharmony_cistatic void kmalloc_oob_16(struct kunit *test)
2148c2ecf20Sopenharmony_ci{
2158c2ecf20Sopenharmony_ci	struct {
2168c2ecf20Sopenharmony_ci		u64 words[2];
2178c2ecf20Sopenharmony_ci	} *ptr1, *ptr2;
2188c2ecf20Sopenharmony_ci
2198c2ecf20Sopenharmony_ci	/* This test is specifically crafted for the generic mode. */
2208c2ecf20Sopenharmony_ci	if (!IS_ENABLED(CONFIG_KASAN_GENERIC)) {
2218c2ecf20Sopenharmony_ci		kunit_info(test, "CONFIG_KASAN_GENERIC required\n");
2228c2ecf20Sopenharmony_ci		return;
2238c2ecf20Sopenharmony_ci	}
2248c2ecf20Sopenharmony_ci
2258c2ecf20Sopenharmony_ci	ptr1 = kmalloc(sizeof(*ptr1) - 3, GFP_KERNEL);
2268c2ecf20Sopenharmony_ci	KUNIT_ASSERT_NOT_ERR_OR_NULL(test, ptr1);
2278c2ecf20Sopenharmony_ci
2288c2ecf20Sopenharmony_ci	ptr2 = kmalloc(sizeof(*ptr2), GFP_KERNEL);
2298c2ecf20Sopenharmony_ci	KUNIT_ASSERT_NOT_ERR_OR_NULL(test, ptr2);
2308c2ecf20Sopenharmony_ci
2318c2ecf20Sopenharmony_ci	KUNIT_EXPECT_KASAN_FAIL(test, *ptr1 = *ptr2);
2328c2ecf20Sopenharmony_ci	kfree(ptr1);
2338c2ecf20Sopenharmony_ci	kfree(ptr2);
2348c2ecf20Sopenharmony_ci}
2358c2ecf20Sopenharmony_ci
2368c2ecf20Sopenharmony_cistatic void kmalloc_uaf_16(struct kunit *test)
2378c2ecf20Sopenharmony_ci{
2388c2ecf20Sopenharmony_ci	struct {
2398c2ecf20Sopenharmony_ci		u64 words[2];
2408c2ecf20Sopenharmony_ci	} *ptr1, *ptr2;
2418c2ecf20Sopenharmony_ci
2428c2ecf20Sopenharmony_ci	ptr1 = kmalloc(sizeof(*ptr1), GFP_KERNEL);
2438c2ecf20Sopenharmony_ci	KUNIT_ASSERT_NOT_ERR_OR_NULL(test, ptr1);
2448c2ecf20Sopenharmony_ci
2458c2ecf20Sopenharmony_ci	ptr2 = kmalloc(sizeof(*ptr2), GFP_KERNEL);
2468c2ecf20Sopenharmony_ci	KUNIT_ASSERT_NOT_ERR_OR_NULL(test, ptr2);
2478c2ecf20Sopenharmony_ci	kfree(ptr2);
2488c2ecf20Sopenharmony_ci
2498c2ecf20Sopenharmony_ci	KUNIT_EXPECT_KASAN_FAIL(test, *ptr1 = *ptr2);
2508c2ecf20Sopenharmony_ci	kfree(ptr1);
2518c2ecf20Sopenharmony_ci}
2528c2ecf20Sopenharmony_ci
2538c2ecf20Sopenharmony_cistatic void kmalloc_oob_memset_2(struct kunit *test)
2548c2ecf20Sopenharmony_ci{
2558c2ecf20Sopenharmony_ci	char *ptr;
2568c2ecf20Sopenharmony_ci	size_t size = 8;
2578c2ecf20Sopenharmony_ci
2588c2ecf20Sopenharmony_ci	ptr = kmalloc(size, GFP_KERNEL);
2598c2ecf20Sopenharmony_ci	KUNIT_ASSERT_NOT_ERR_OR_NULL(test, ptr);
2608c2ecf20Sopenharmony_ci
2618c2ecf20Sopenharmony_ci	KUNIT_EXPECT_KASAN_FAIL(test, memset(ptr + 7 + OOB_TAG_OFF, 0, 2));
2628c2ecf20Sopenharmony_ci	kfree(ptr);
2638c2ecf20Sopenharmony_ci}
2648c2ecf20Sopenharmony_ci
2658c2ecf20Sopenharmony_cistatic void kmalloc_oob_memset_4(struct kunit *test)
2668c2ecf20Sopenharmony_ci{
2678c2ecf20Sopenharmony_ci	char *ptr;
2688c2ecf20Sopenharmony_ci	size_t size = 8;
2698c2ecf20Sopenharmony_ci
2708c2ecf20Sopenharmony_ci	ptr = kmalloc(size, GFP_KERNEL);
2718c2ecf20Sopenharmony_ci	KUNIT_ASSERT_NOT_ERR_OR_NULL(test, ptr);
2728c2ecf20Sopenharmony_ci
2738c2ecf20Sopenharmony_ci	KUNIT_EXPECT_KASAN_FAIL(test, memset(ptr + 5 + OOB_TAG_OFF, 0, 4));
2748c2ecf20Sopenharmony_ci	kfree(ptr);
2758c2ecf20Sopenharmony_ci}
2768c2ecf20Sopenharmony_ci
2778c2ecf20Sopenharmony_ci
2788c2ecf20Sopenharmony_cistatic void kmalloc_oob_memset_8(struct kunit *test)
2798c2ecf20Sopenharmony_ci{
2808c2ecf20Sopenharmony_ci	char *ptr;
2818c2ecf20Sopenharmony_ci	size_t size = 8;
2828c2ecf20Sopenharmony_ci
2838c2ecf20Sopenharmony_ci	ptr = kmalloc(size, GFP_KERNEL);
2848c2ecf20Sopenharmony_ci	KUNIT_ASSERT_NOT_ERR_OR_NULL(test, ptr);
2858c2ecf20Sopenharmony_ci
2868c2ecf20Sopenharmony_ci	KUNIT_EXPECT_KASAN_FAIL(test, memset(ptr + 1 + OOB_TAG_OFF, 0, 8));
2878c2ecf20Sopenharmony_ci	kfree(ptr);
2888c2ecf20Sopenharmony_ci}
2898c2ecf20Sopenharmony_ci
2908c2ecf20Sopenharmony_cistatic void kmalloc_oob_memset_16(struct kunit *test)
2918c2ecf20Sopenharmony_ci{
2928c2ecf20Sopenharmony_ci	char *ptr;
2938c2ecf20Sopenharmony_ci	size_t size = 16;
2948c2ecf20Sopenharmony_ci
2958c2ecf20Sopenharmony_ci	ptr = kmalloc(size, GFP_KERNEL);
2968c2ecf20Sopenharmony_ci	KUNIT_ASSERT_NOT_ERR_OR_NULL(test, ptr);
2978c2ecf20Sopenharmony_ci
2988c2ecf20Sopenharmony_ci	KUNIT_EXPECT_KASAN_FAIL(test, memset(ptr + 1 + OOB_TAG_OFF, 0, 16));
2998c2ecf20Sopenharmony_ci	kfree(ptr);
3008c2ecf20Sopenharmony_ci}
3018c2ecf20Sopenharmony_ci
3028c2ecf20Sopenharmony_cistatic void kmalloc_oob_in_memset(struct kunit *test)
3038c2ecf20Sopenharmony_ci{
3048c2ecf20Sopenharmony_ci	char *ptr;
3058c2ecf20Sopenharmony_ci	size_t size = 666;
3068c2ecf20Sopenharmony_ci
3078c2ecf20Sopenharmony_ci	ptr = kmalloc(size, GFP_KERNEL);
3088c2ecf20Sopenharmony_ci	KUNIT_ASSERT_NOT_ERR_OR_NULL(test, ptr);
3098c2ecf20Sopenharmony_ci
3108c2ecf20Sopenharmony_ci	KUNIT_EXPECT_KASAN_FAIL(test, memset(ptr, 0, size + 5 + OOB_TAG_OFF));
3118c2ecf20Sopenharmony_ci	kfree(ptr);
3128c2ecf20Sopenharmony_ci}
3138c2ecf20Sopenharmony_ci
3148c2ecf20Sopenharmony_cistatic void kmalloc_memmove_invalid_size(struct kunit *test)
3158c2ecf20Sopenharmony_ci{
3168c2ecf20Sopenharmony_ci	char *ptr;
3178c2ecf20Sopenharmony_ci	size_t size = 64;
3188c2ecf20Sopenharmony_ci	volatile size_t invalid_size = -2;
3198c2ecf20Sopenharmony_ci
3208c2ecf20Sopenharmony_ci	ptr = kmalloc(size, GFP_KERNEL);
3218c2ecf20Sopenharmony_ci	KUNIT_ASSERT_NOT_ERR_OR_NULL(test, ptr);
3228c2ecf20Sopenharmony_ci
3238c2ecf20Sopenharmony_ci	memset((char *)ptr, 0, 64);
3248c2ecf20Sopenharmony_ci
3258c2ecf20Sopenharmony_ci	KUNIT_EXPECT_KASAN_FAIL(test,
3268c2ecf20Sopenharmony_ci		memmove((char *)ptr, (char *)ptr + 4, invalid_size));
3278c2ecf20Sopenharmony_ci	kfree(ptr);
3288c2ecf20Sopenharmony_ci}
3298c2ecf20Sopenharmony_ci
3308c2ecf20Sopenharmony_cistatic void kmalloc_uaf(struct kunit *test)
3318c2ecf20Sopenharmony_ci{
3328c2ecf20Sopenharmony_ci	char *ptr;
3338c2ecf20Sopenharmony_ci	size_t size = 10;
3348c2ecf20Sopenharmony_ci
3358c2ecf20Sopenharmony_ci	ptr = kmalloc(size, GFP_KERNEL);
3368c2ecf20Sopenharmony_ci	KUNIT_ASSERT_NOT_ERR_OR_NULL(test, ptr);
3378c2ecf20Sopenharmony_ci
3388c2ecf20Sopenharmony_ci	kfree(ptr);
3398c2ecf20Sopenharmony_ci	KUNIT_EXPECT_KASAN_FAIL(test, *(ptr + 8) = 'x');
3408c2ecf20Sopenharmony_ci}
3418c2ecf20Sopenharmony_ci
3428c2ecf20Sopenharmony_cistatic void kmalloc_uaf_memset(struct kunit *test)
3438c2ecf20Sopenharmony_ci{
3448c2ecf20Sopenharmony_ci	char *ptr;
3458c2ecf20Sopenharmony_ci	size_t size = 33;
3468c2ecf20Sopenharmony_ci
3478c2ecf20Sopenharmony_ci	ptr = kmalloc(size, GFP_KERNEL);
3488c2ecf20Sopenharmony_ci	KUNIT_ASSERT_NOT_ERR_OR_NULL(test, ptr);
3498c2ecf20Sopenharmony_ci
3508c2ecf20Sopenharmony_ci	kfree(ptr);
3518c2ecf20Sopenharmony_ci	KUNIT_EXPECT_KASAN_FAIL(test, memset(ptr, 0, size));
3528c2ecf20Sopenharmony_ci}
3538c2ecf20Sopenharmony_ci
3548c2ecf20Sopenharmony_cistatic void kmalloc_uaf2(struct kunit *test)
3558c2ecf20Sopenharmony_ci{
3568c2ecf20Sopenharmony_ci	char *ptr1, *ptr2;
3578c2ecf20Sopenharmony_ci	size_t size = 43;
3588c2ecf20Sopenharmony_ci
3598c2ecf20Sopenharmony_ci	ptr1 = kmalloc(size, GFP_KERNEL);
3608c2ecf20Sopenharmony_ci	KUNIT_ASSERT_NOT_ERR_OR_NULL(test, ptr1);
3618c2ecf20Sopenharmony_ci
3628c2ecf20Sopenharmony_ci	kfree(ptr1);
3638c2ecf20Sopenharmony_ci
3648c2ecf20Sopenharmony_ci	ptr2 = kmalloc(size, GFP_KERNEL);
3658c2ecf20Sopenharmony_ci	KUNIT_ASSERT_NOT_ERR_OR_NULL(test, ptr2);
3668c2ecf20Sopenharmony_ci
3678c2ecf20Sopenharmony_ci	KUNIT_EXPECT_KASAN_FAIL(test, ptr1[40] = 'x');
3688c2ecf20Sopenharmony_ci	KUNIT_EXPECT_PTR_NE(test, ptr1, ptr2);
3698c2ecf20Sopenharmony_ci
3708c2ecf20Sopenharmony_ci	kfree(ptr2);
3718c2ecf20Sopenharmony_ci}
3728c2ecf20Sopenharmony_ci
3738c2ecf20Sopenharmony_cistatic void kfree_via_page(struct kunit *test)
3748c2ecf20Sopenharmony_ci{
3758c2ecf20Sopenharmony_ci	char *ptr;
3768c2ecf20Sopenharmony_ci	size_t size = 8;
3778c2ecf20Sopenharmony_ci	struct page *page;
3788c2ecf20Sopenharmony_ci	unsigned long offset;
3798c2ecf20Sopenharmony_ci
3808c2ecf20Sopenharmony_ci	ptr = kmalloc(size, GFP_KERNEL);
3818c2ecf20Sopenharmony_ci	KUNIT_ASSERT_NOT_ERR_OR_NULL(test, ptr);
3828c2ecf20Sopenharmony_ci
3838c2ecf20Sopenharmony_ci	page = virt_to_page(ptr);
3848c2ecf20Sopenharmony_ci	offset = offset_in_page(ptr);
3858c2ecf20Sopenharmony_ci	kfree(page_address(page) + offset);
3868c2ecf20Sopenharmony_ci}
3878c2ecf20Sopenharmony_ci
3888c2ecf20Sopenharmony_cistatic void kfree_via_phys(struct kunit *test)
3898c2ecf20Sopenharmony_ci{
3908c2ecf20Sopenharmony_ci	char *ptr;
3918c2ecf20Sopenharmony_ci	size_t size = 8;
3928c2ecf20Sopenharmony_ci	phys_addr_t phys;
3938c2ecf20Sopenharmony_ci
3948c2ecf20Sopenharmony_ci	ptr = kmalloc(size, GFP_KERNEL);
3958c2ecf20Sopenharmony_ci	KUNIT_ASSERT_NOT_ERR_OR_NULL(test, ptr);
3968c2ecf20Sopenharmony_ci
3978c2ecf20Sopenharmony_ci	phys = virt_to_phys(ptr);
3988c2ecf20Sopenharmony_ci	kfree(phys_to_virt(phys));
3998c2ecf20Sopenharmony_ci}
4008c2ecf20Sopenharmony_ci
4018c2ecf20Sopenharmony_cistatic void kmem_cache_oob(struct kunit *test)
4028c2ecf20Sopenharmony_ci{
4038c2ecf20Sopenharmony_ci	char *p;
4048c2ecf20Sopenharmony_ci	size_t size = 200;
4058c2ecf20Sopenharmony_ci	struct kmem_cache *cache = kmem_cache_create("test_cache",
4068c2ecf20Sopenharmony_ci						size, 0,
4078c2ecf20Sopenharmony_ci						0, NULL);
4088c2ecf20Sopenharmony_ci	KUNIT_ASSERT_NOT_ERR_OR_NULL(test, cache);
4098c2ecf20Sopenharmony_ci	p = kmem_cache_alloc(cache, GFP_KERNEL);
4108c2ecf20Sopenharmony_ci	if (!p) {
4118c2ecf20Sopenharmony_ci		kunit_err(test, "Allocation failed: %s\n", __func__);
4128c2ecf20Sopenharmony_ci		kmem_cache_destroy(cache);
4138c2ecf20Sopenharmony_ci		return;
4148c2ecf20Sopenharmony_ci	}
4158c2ecf20Sopenharmony_ci
4168c2ecf20Sopenharmony_ci	KUNIT_EXPECT_KASAN_FAIL(test, *p = p[size + OOB_TAG_OFF]);
4178c2ecf20Sopenharmony_ci	kmem_cache_free(cache, p);
4188c2ecf20Sopenharmony_ci	kmem_cache_destroy(cache);
4198c2ecf20Sopenharmony_ci}
4208c2ecf20Sopenharmony_ci
4218c2ecf20Sopenharmony_cistatic void memcg_accounted_kmem_cache(struct kunit *test)
4228c2ecf20Sopenharmony_ci{
4238c2ecf20Sopenharmony_ci	int i;
4248c2ecf20Sopenharmony_ci	char *p;
4258c2ecf20Sopenharmony_ci	size_t size = 200;
4268c2ecf20Sopenharmony_ci	struct kmem_cache *cache;
4278c2ecf20Sopenharmony_ci
4288c2ecf20Sopenharmony_ci	cache = kmem_cache_create("test_cache", size, 0, SLAB_ACCOUNT, NULL);
4298c2ecf20Sopenharmony_ci	KUNIT_ASSERT_NOT_ERR_OR_NULL(test, cache);
4308c2ecf20Sopenharmony_ci
4318c2ecf20Sopenharmony_ci	/*
4328c2ecf20Sopenharmony_ci	 * Several allocations with a delay to allow for lazy per memcg kmem
4338c2ecf20Sopenharmony_ci	 * cache creation.
4348c2ecf20Sopenharmony_ci	 */
4358c2ecf20Sopenharmony_ci	for (i = 0; i < 5; i++) {
4368c2ecf20Sopenharmony_ci		p = kmem_cache_alloc(cache, GFP_KERNEL);
4378c2ecf20Sopenharmony_ci		if (!p)
4388c2ecf20Sopenharmony_ci			goto free_cache;
4398c2ecf20Sopenharmony_ci
4408c2ecf20Sopenharmony_ci		kmem_cache_free(cache, p);
4418c2ecf20Sopenharmony_ci		msleep(100);
4428c2ecf20Sopenharmony_ci	}
4438c2ecf20Sopenharmony_ci
4448c2ecf20Sopenharmony_cifree_cache:
4458c2ecf20Sopenharmony_ci	kmem_cache_destroy(cache);
4468c2ecf20Sopenharmony_ci}
4478c2ecf20Sopenharmony_ci
4488c2ecf20Sopenharmony_cistatic char global_array[10];
4498c2ecf20Sopenharmony_ci
4508c2ecf20Sopenharmony_cistatic void kasan_global_oob(struct kunit *test)
4518c2ecf20Sopenharmony_ci{
4528c2ecf20Sopenharmony_ci	/*
4538c2ecf20Sopenharmony_ci	 * Deliberate out-of-bounds access. To prevent CONFIG_UBSAN_LOCAL_BOUNDS
4548c2ecf20Sopenharmony_ci	 * from failing here and panicing the kernel, access the array via a
4558c2ecf20Sopenharmony_ci	 * volatile pointer, which will prevent the compiler from being able to
4568c2ecf20Sopenharmony_ci	 * determine the array bounds.
4578c2ecf20Sopenharmony_ci	 *
4588c2ecf20Sopenharmony_ci	 * This access uses a volatile pointer to char (char *volatile) rather
4598c2ecf20Sopenharmony_ci	 * than the more conventional pointer to volatile char (volatile char *)
4608c2ecf20Sopenharmony_ci	 * because we want to prevent the compiler from making inferences about
4618c2ecf20Sopenharmony_ci	 * the pointer itself (i.e. its array bounds), not the data that it
4628c2ecf20Sopenharmony_ci	 * refers to.
4638c2ecf20Sopenharmony_ci	 */
4648c2ecf20Sopenharmony_ci	char *volatile array = global_array;
4658c2ecf20Sopenharmony_ci	char *p = &array[ARRAY_SIZE(global_array) + 3];
4668c2ecf20Sopenharmony_ci
4678c2ecf20Sopenharmony_ci	/* Only generic mode instruments globals. */
4688c2ecf20Sopenharmony_ci	if (!IS_ENABLED(CONFIG_KASAN_GENERIC)) {
4698c2ecf20Sopenharmony_ci		kunit_info(test, "CONFIG_KASAN_GENERIC required");
4708c2ecf20Sopenharmony_ci		return;
4718c2ecf20Sopenharmony_ci	}
4728c2ecf20Sopenharmony_ci
4738c2ecf20Sopenharmony_ci	KUNIT_EXPECT_KASAN_FAIL(test, *(volatile char *)p);
4748c2ecf20Sopenharmony_ci}
4758c2ecf20Sopenharmony_ci
4768c2ecf20Sopenharmony_cistatic void ksize_unpoisons_memory(struct kunit *test)
4778c2ecf20Sopenharmony_ci{
4788c2ecf20Sopenharmony_ci	char *ptr;
4798c2ecf20Sopenharmony_ci	size_t size = 123, real_size;
4808c2ecf20Sopenharmony_ci
4818c2ecf20Sopenharmony_ci	ptr = kmalloc(size, GFP_KERNEL);
4828c2ecf20Sopenharmony_ci	KUNIT_ASSERT_NOT_ERR_OR_NULL(test, ptr);
4838c2ecf20Sopenharmony_ci	real_size = ksize(ptr);
4848c2ecf20Sopenharmony_ci	/* This access doesn't trigger an error. */
4858c2ecf20Sopenharmony_ci	ptr[size] = 'x';
4868c2ecf20Sopenharmony_ci	/* This one does. */
4878c2ecf20Sopenharmony_ci	KUNIT_EXPECT_KASAN_FAIL(test, ptr[real_size] = 'y');
4888c2ecf20Sopenharmony_ci	kfree(ptr);
4898c2ecf20Sopenharmony_ci}
4908c2ecf20Sopenharmony_ci
4918c2ecf20Sopenharmony_cistatic void kasan_stack_oob(struct kunit *test)
4928c2ecf20Sopenharmony_ci{
4938c2ecf20Sopenharmony_ci	char stack_array[10];
4948c2ecf20Sopenharmony_ci	/* See comment in kasan_global_oob. */
4958c2ecf20Sopenharmony_ci	char *volatile array = stack_array;
4968c2ecf20Sopenharmony_ci	char *p = &array[ARRAY_SIZE(stack_array) + OOB_TAG_OFF];
4978c2ecf20Sopenharmony_ci
4988c2ecf20Sopenharmony_ci	if (!IS_ENABLED(CONFIG_KASAN_STACK)) {
4998c2ecf20Sopenharmony_ci		kunit_info(test, "CONFIG_KASAN_STACK is not enabled");
5008c2ecf20Sopenharmony_ci		return;
5018c2ecf20Sopenharmony_ci	}
5028c2ecf20Sopenharmony_ci
5038c2ecf20Sopenharmony_ci	KUNIT_EXPECT_KASAN_FAIL(test, *(volatile char *)p);
5048c2ecf20Sopenharmony_ci}
5058c2ecf20Sopenharmony_ci
5068c2ecf20Sopenharmony_cistatic void kasan_alloca_oob_left(struct kunit *test)
5078c2ecf20Sopenharmony_ci{
5088c2ecf20Sopenharmony_ci	volatile int i = 10;
5098c2ecf20Sopenharmony_ci	char alloca_array[i];
5108c2ecf20Sopenharmony_ci	/* See comment in kasan_global_oob. */
5118c2ecf20Sopenharmony_ci	char *volatile array = alloca_array;
5128c2ecf20Sopenharmony_ci	char *p = array - 1;
5138c2ecf20Sopenharmony_ci
5148c2ecf20Sopenharmony_ci	/* Only generic mode instruments dynamic allocas. */
5158c2ecf20Sopenharmony_ci	if (!IS_ENABLED(CONFIG_KASAN_GENERIC)) {
5168c2ecf20Sopenharmony_ci		kunit_info(test, "CONFIG_KASAN_GENERIC required");
5178c2ecf20Sopenharmony_ci		return;
5188c2ecf20Sopenharmony_ci	}
5198c2ecf20Sopenharmony_ci
5208c2ecf20Sopenharmony_ci	if (!IS_ENABLED(CONFIG_KASAN_STACK)) {
5218c2ecf20Sopenharmony_ci		kunit_info(test, "CONFIG_KASAN_STACK is not enabled");
5228c2ecf20Sopenharmony_ci		return;
5238c2ecf20Sopenharmony_ci	}
5248c2ecf20Sopenharmony_ci
5258c2ecf20Sopenharmony_ci	KUNIT_EXPECT_KASAN_FAIL(test, *(volatile char *)p);
5268c2ecf20Sopenharmony_ci}
5278c2ecf20Sopenharmony_ci
5288c2ecf20Sopenharmony_cistatic void kasan_alloca_oob_right(struct kunit *test)
5298c2ecf20Sopenharmony_ci{
5308c2ecf20Sopenharmony_ci	volatile int i = 10;
5318c2ecf20Sopenharmony_ci	char alloca_array[i];
5328c2ecf20Sopenharmony_ci	/* See comment in kasan_global_oob. */
5338c2ecf20Sopenharmony_ci	char *volatile array = alloca_array;
5348c2ecf20Sopenharmony_ci	char *p = array + i;
5358c2ecf20Sopenharmony_ci
5368c2ecf20Sopenharmony_ci	/* Only generic mode instruments dynamic allocas. */
5378c2ecf20Sopenharmony_ci	if (!IS_ENABLED(CONFIG_KASAN_GENERIC)) {
5388c2ecf20Sopenharmony_ci		kunit_info(test, "CONFIG_KASAN_GENERIC required");
5398c2ecf20Sopenharmony_ci		return;
5408c2ecf20Sopenharmony_ci	}
5418c2ecf20Sopenharmony_ci
5428c2ecf20Sopenharmony_ci	if (!IS_ENABLED(CONFIG_KASAN_STACK)) {
5438c2ecf20Sopenharmony_ci		kunit_info(test, "CONFIG_KASAN_STACK is not enabled");
5448c2ecf20Sopenharmony_ci		return;
5458c2ecf20Sopenharmony_ci	}
5468c2ecf20Sopenharmony_ci
5478c2ecf20Sopenharmony_ci	KUNIT_EXPECT_KASAN_FAIL(test, *(volatile char *)p);
5488c2ecf20Sopenharmony_ci}
5498c2ecf20Sopenharmony_ci
5508c2ecf20Sopenharmony_cistatic void kmem_cache_double_free(struct kunit *test)
5518c2ecf20Sopenharmony_ci{
5528c2ecf20Sopenharmony_ci	char *p;
5538c2ecf20Sopenharmony_ci	size_t size = 200;
5548c2ecf20Sopenharmony_ci	struct kmem_cache *cache;
5558c2ecf20Sopenharmony_ci
5568c2ecf20Sopenharmony_ci	cache = kmem_cache_create("test_cache", size, 0, 0, NULL);
5578c2ecf20Sopenharmony_ci	KUNIT_ASSERT_NOT_ERR_OR_NULL(test, cache);
5588c2ecf20Sopenharmony_ci
5598c2ecf20Sopenharmony_ci	p = kmem_cache_alloc(cache, GFP_KERNEL);
5608c2ecf20Sopenharmony_ci	if (!p) {
5618c2ecf20Sopenharmony_ci		kunit_err(test, "Allocation failed: %s\n", __func__);
5628c2ecf20Sopenharmony_ci		kmem_cache_destroy(cache);
5638c2ecf20Sopenharmony_ci		return;
5648c2ecf20Sopenharmony_ci	}
5658c2ecf20Sopenharmony_ci
5668c2ecf20Sopenharmony_ci	kmem_cache_free(cache, p);
5678c2ecf20Sopenharmony_ci	KUNIT_EXPECT_KASAN_FAIL(test, kmem_cache_free(cache, p));
5688c2ecf20Sopenharmony_ci	kmem_cache_destroy(cache);
5698c2ecf20Sopenharmony_ci}
5708c2ecf20Sopenharmony_ci
5718c2ecf20Sopenharmony_cistatic void kmem_cache_invalid_free(struct kunit *test)
5728c2ecf20Sopenharmony_ci{
5738c2ecf20Sopenharmony_ci	char *p;
5748c2ecf20Sopenharmony_ci	size_t size = 200;
5758c2ecf20Sopenharmony_ci	struct kmem_cache *cache;
5768c2ecf20Sopenharmony_ci
5778c2ecf20Sopenharmony_ci	cache = kmem_cache_create("test_cache", size, 0, SLAB_TYPESAFE_BY_RCU,
5788c2ecf20Sopenharmony_ci				  NULL);
5798c2ecf20Sopenharmony_ci	KUNIT_ASSERT_NOT_ERR_OR_NULL(test, cache);
5808c2ecf20Sopenharmony_ci
5818c2ecf20Sopenharmony_ci	p = kmem_cache_alloc(cache, GFP_KERNEL);
5828c2ecf20Sopenharmony_ci	if (!p) {
5838c2ecf20Sopenharmony_ci		kunit_err(test, "Allocation failed: %s\n", __func__);
5848c2ecf20Sopenharmony_ci		kmem_cache_destroy(cache);
5858c2ecf20Sopenharmony_ci		return;
5868c2ecf20Sopenharmony_ci	}
5878c2ecf20Sopenharmony_ci
5888c2ecf20Sopenharmony_ci	/* Trigger invalid free, the object doesn't get freed */
5898c2ecf20Sopenharmony_ci	KUNIT_EXPECT_KASAN_FAIL(test, kmem_cache_free(cache, p + 1));
5908c2ecf20Sopenharmony_ci
5918c2ecf20Sopenharmony_ci	/*
5928c2ecf20Sopenharmony_ci	 * Properly free the object to prevent the "Objects remaining in
5938c2ecf20Sopenharmony_ci	 * test_cache on __kmem_cache_shutdown" BUG failure.
5948c2ecf20Sopenharmony_ci	 */
5958c2ecf20Sopenharmony_ci	kmem_cache_free(cache, p);
5968c2ecf20Sopenharmony_ci
5978c2ecf20Sopenharmony_ci	kmem_cache_destroy(cache);
5988c2ecf20Sopenharmony_ci}
5998c2ecf20Sopenharmony_ci
6008c2ecf20Sopenharmony_cistatic void kasan_memchr(struct kunit *test)
6018c2ecf20Sopenharmony_ci{
6028c2ecf20Sopenharmony_ci	char *ptr;
6038c2ecf20Sopenharmony_ci	size_t size = 24;
6048c2ecf20Sopenharmony_ci
6058c2ecf20Sopenharmony_ci	/* See https://bugzilla.kernel.org/show_bug.cgi?id=206337 */
6068c2ecf20Sopenharmony_ci	if (IS_ENABLED(CONFIG_AMD_MEM_ENCRYPT)) {
6078c2ecf20Sopenharmony_ci		kunit_info(test,
6088c2ecf20Sopenharmony_ci			"str* functions are not instrumented with CONFIG_AMD_MEM_ENCRYPT");
6098c2ecf20Sopenharmony_ci		return;
6108c2ecf20Sopenharmony_ci	}
6118c2ecf20Sopenharmony_ci
6128c2ecf20Sopenharmony_ci	if (OOB_TAG_OFF)
6138c2ecf20Sopenharmony_ci		size = round_up(size, OOB_TAG_OFF);
6148c2ecf20Sopenharmony_ci
6158c2ecf20Sopenharmony_ci	ptr = kmalloc(size, GFP_KERNEL | __GFP_ZERO);
6168c2ecf20Sopenharmony_ci	KUNIT_ASSERT_NOT_ERR_OR_NULL(test, ptr);
6178c2ecf20Sopenharmony_ci
6188c2ecf20Sopenharmony_ci	KUNIT_EXPECT_KASAN_FAIL(test,
6198c2ecf20Sopenharmony_ci		kasan_ptr_result = memchr(ptr, '1', size + 1));
6208c2ecf20Sopenharmony_ci
6218c2ecf20Sopenharmony_ci	kfree(ptr);
6228c2ecf20Sopenharmony_ci}
6238c2ecf20Sopenharmony_ci
6248c2ecf20Sopenharmony_cistatic void kasan_memcmp(struct kunit *test)
6258c2ecf20Sopenharmony_ci{
6268c2ecf20Sopenharmony_ci	char *ptr;
6278c2ecf20Sopenharmony_ci	size_t size = 24;
6288c2ecf20Sopenharmony_ci	int arr[9];
6298c2ecf20Sopenharmony_ci
6308c2ecf20Sopenharmony_ci	/* See https://bugzilla.kernel.org/show_bug.cgi?id=206337 */
6318c2ecf20Sopenharmony_ci	if (IS_ENABLED(CONFIG_AMD_MEM_ENCRYPT)) {
6328c2ecf20Sopenharmony_ci		kunit_info(test,
6338c2ecf20Sopenharmony_ci			"str* functions are not instrumented with CONFIG_AMD_MEM_ENCRYPT");
6348c2ecf20Sopenharmony_ci		return;
6358c2ecf20Sopenharmony_ci	}
6368c2ecf20Sopenharmony_ci
6378c2ecf20Sopenharmony_ci	if (OOB_TAG_OFF)
6388c2ecf20Sopenharmony_ci		size = round_up(size, OOB_TAG_OFF);
6398c2ecf20Sopenharmony_ci
6408c2ecf20Sopenharmony_ci	ptr = kmalloc(size, GFP_KERNEL | __GFP_ZERO);
6418c2ecf20Sopenharmony_ci	KUNIT_ASSERT_NOT_ERR_OR_NULL(test, ptr);
6428c2ecf20Sopenharmony_ci	memset(arr, 0, sizeof(arr));
6438c2ecf20Sopenharmony_ci
6448c2ecf20Sopenharmony_ci	KUNIT_EXPECT_KASAN_FAIL(test,
6458c2ecf20Sopenharmony_ci		kasan_int_result = memcmp(ptr, arr, size+1));
6468c2ecf20Sopenharmony_ci	kfree(ptr);
6478c2ecf20Sopenharmony_ci}
6488c2ecf20Sopenharmony_ci
6498c2ecf20Sopenharmony_cistatic void kasan_strings(struct kunit *test)
6508c2ecf20Sopenharmony_ci{
6518c2ecf20Sopenharmony_ci	char *ptr;
6528c2ecf20Sopenharmony_ci	size_t size = 24;
6538c2ecf20Sopenharmony_ci
6548c2ecf20Sopenharmony_ci	/* See https://bugzilla.kernel.org/show_bug.cgi?id=206337 */
6558c2ecf20Sopenharmony_ci	if (IS_ENABLED(CONFIG_AMD_MEM_ENCRYPT)) {
6568c2ecf20Sopenharmony_ci		kunit_info(test,
6578c2ecf20Sopenharmony_ci			"str* functions are not instrumented with CONFIG_AMD_MEM_ENCRYPT");
6588c2ecf20Sopenharmony_ci		return;
6598c2ecf20Sopenharmony_ci	}
6608c2ecf20Sopenharmony_ci
6618c2ecf20Sopenharmony_ci	ptr = kmalloc(size, GFP_KERNEL | __GFP_ZERO);
6628c2ecf20Sopenharmony_ci	KUNIT_ASSERT_NOT_ERR_OR_NULL(test, ptr);
6638c2ecf20Sopenharmony_ci
6648c2ecf20Sopenharmony_ci	kfree(ptr);
6658c2ecf20Sopenharmony_ci
6668c2ecf20Sopenharmony_ci	/*
6678c2ecf20Sopenharmony_ci	 * Try to cause only 1 invalid access (less spam in dmesg).
6688c2ecf20Sopenharmony_ci	 * For that we need ptr to point to zeroed byte.
6698c2ecf20Sopenharmony_ci	 * Skip metadata that could be stored in freed object so ptr
6708c2ecf20Sopenharmony_ci	 * will likely point to zeroed byte.
6718c2ecf20Sopenharmony_ci	 */
6728c2ecf20Sopenharmony_ci	ptr += 16;
6738c2ecf20Sopenharmony_ci	KUNIT_EXPECT_KASAN_FAIL(test, kasan_ptr_result = strchr(ptr, '1'));
6748c2ecf20Sopenharmony_ci
6758c2ecf20Sopenharmony_ci	KUNIT_EXPECT_KASAN_FAIL(test, kasan_ptr_result = strrchr(ptr, '1'));
6768c2ecf20Sopenharmony_ci
6778c2ecf20Sopenharmony_ci	KUNIT_EXPECT_KASAN_FAIL(test, kasan_int_result = strcmp(ptr, "2"));
6788c2ecf20Sopenharmony_ci
6798c2ecf20Sopenharmony_ci	KUNIT_EXPECT_KASAN_FAIL(test, kasan_int_result = strncmp(ptr, "2", 1));
6808c2ecf20Sopenharmony_ci
6818c2ecf20Sopenharmony_ci	KUNIT_EXPECT_KASAN_FAIL(test, kasan_int_result = strlen(ptr));
6828c2ecf20Sopenharmony_ci
6838c2ecf20Sopenharmony_ci	KUNIT_EXPECT_KASAN_FAIL(test, kasan_int_result = strnlen(ptr, 1));
6848c2ecf20Sopenharmony_ci}
6858c2ecf20Sopenharmony_ci
6868c2ecf20Sopenharmony_cistatic void kasan_bitops_modify(struct kunit *test, int nr, void *addr)
6878c2ecf20Sopenharmony_ci{
6888c2ecf20Sopenharmony_ci	KUNIT_EXPECT_KASAN_FAIL(test, set_bit(nr, addr));
6898c2ecf20Sopenharmony_ci	KUNIT_EXPECT_KASAN_FAIL(test, __set_bit(nr, addr));
6908c2ecf20Sopenharmony_ci	KUNIT_EXPECT_KASAN_FAIL(test, clear_bit(nr, addr));
6918c2ecf20Sopenharmony_ci	KUNIT_EXPECT_KASAN_FAIL(test, __clear_bit(nr, addr));
6928c2ecf20Sopenharmony_ci	KUNIT_EXPECT_KASAN_FAIL(test, clear_bit_unlock(nr, addr));
6938c2ecf20Sopenharmony_ci	KUNIT_EXPECT_KASAN_FAIL(test, __clear_bit_unlock(nr, addr));
6948c2ecf20Sopenharmony_ci	KUNIT_EXPECT_KASAN_FAIL(test, change_bit(nr, addr));
6958c2ecf20Sopenharmony_ci	KUNIT_EXPECT_KASAN_FAIL(test, __change_bit(nr, addr));
6968c2ecf20Sopenharmony_ci}
6978c2ecf20Sopenharmony_ci
6988c2ecf20Sopenharmony_cistatic void kasan_bitops_test_and_modify(struct kunit *test, int nr, void *addr)
6998c2ecf20Sopenharmony_ci{
7008c2ecf20Sopenharmony_ci	KUNIT_EXPECT_KASAN_FAIL(test, test_and_set_bit(nr, addr));
7018c2ecf20Sopenharmony_ci	KUNIT_EXPECT_KASAN_FAIL(test, __test_and_set_bit(nr, addr));
7028c2ecf20Sopenharmony_ci	KUNIT_EXPECT_KASAN_FAIL(test, test_and_set_bit_lock(nr, addr));
7038c2ecf20Sopenharmony_ci	KUNIT_EXPECT_KASAN_FAIL(test, test_and_clear_bit(nr, addr));
7048c2ecf20Sopenharmony_ci	KUNIT_EXPECT_KASAN_FAIL(test, __test_and_clear_bit(nr, addr));
7058c2ecf20Sopenharmony_ci	KUNIT_EXPECT_KASAN_FAIL(test, test_and_change_bit(nr, addr));
7068c2ecf20Sopenharmony_ci	KUNIT_EXPECT_KASAN_FAIL(test, __test_and_change_bit(nr, addr));
7078c2ecf20Sopenharmony_ci	KUNIT_EXPECT_KASAN_FAIL(test, kasan_int_result = test_bit(nr, addr));
7088c2ecf20Sopenharmony_ci
7098c2ecf20Sopenharmony_ci#if defined(clear_bit_unlock_is_negative_byte)
7108c2ecf20Sopenharmony_ci	KUNIT_EXPECT_KASAN_FAIL(test, kasan_int_result =
7118c2ecf20Sopenharmony_ci				clear_bit_unlock_is_negative_byte(nr, addr));
7128c2ecf20Sopenharmony_ci#endif
7138c2ecf20Sopenharmony_ci}
7148c2ecf20Sopenharmony_ci
7158c2ecf20Sopenharmony_cistatic void kasan_bitops_generic(struct kunit *test)
7168c2ecf20Sopenharmony_ci{
7178c2ecf20Sopenharmony_ci	long *bits;
7188c2ecf20Sopenharmony_ci
7198c2ecf20Sopenharmony_ci	/* This test is specifically crafted for the generic mode. */
7208c2ecf20Sopenharmony_ci	if (!IS_ENABLED(CONFIG_KASAN_GENERIC)) {
7218c2ecf20Sopenharmony_ci		kunit_info(test, "CONFIG_KASAN_GENERIC required\n");
7228c2ecf20Sopenharmony_ci		return;
7238c2ecf20Sopenharmony_ci	}
7248c2ecf20Sopenharmony_ci
7258c2ecf20Sopenharmony_ci	/*
7268c2ecf20Sopenharmony_ci	 * Allocate 1 more byte, which causes kzalloc to round up to 16-bytes;
7278c2ecf20Sopenharmony_ci	 * this way we do not actually corrupt other memory.
7288c2ecf20Sopenharmony_ci	 */
7298c2ecf20Sopenharmony_ci	bits = kzalloc(sizeof(*bits) + 1, GFP_KERNEL);
7308c2ecf20Sopenharmony_ci	KUNIT_ASSERT_NOT_ERR_OR_NULL(test, bits);
7318c2ecf20Sopenharmony_ci
7328c2ecf20Sopenharmony_ci	/*
7338c2ecf20Sopenharmony_ci	 * Below calls try to access bit within allocated memory; however, the
7348c2ecf20Sopenharmony_ci	 * below accesses are still out-of-bounds, since bitops are defined to
7358c2ecf20Sopenharmony_ci	 * operate on the whole long the bit is in.
7368c2ecf20Sopenharmony_ci	 */
7378c2ecf20Sopenharmony_ci	kasan_bitops_modify(test, BITS_PER_LONG, bits);
7388c2ecf20Sopenharmony_ci
7398c2ecf20Sopenharmony_ci	/*
7408c2ecf20Sopenharmony_ci	 * Below calls try to access bit beyond allocated memory.
7418c2ecf20Sopenharmony_ci	 */
7428c2ecf20Sopenharmony_ci	kasan_bitops_test_and_modify(test, BITS_PER_LONG + BITS_PER_BYTE, bits);
7438c2ecf20Sopenharmony_ci
7448c2ecf20Sopenharmony_ci	kfree(bits);
7458c2ecf20Sopenharmony_ci}
7468c2ecf20Sopenharmony_ci
7478c2ecf20Sopenharmony_cistatic void kasan_bitops_tags(struct kunit *test)
7488c2ecf20Sopenharmony_ci{
7498c2ecf20Sopenharmony_ci	long *bits;
7508c2ecf20Sopenharmony_ci
7518c2ecf20Sopenharmony_ci	/* This test is specifically crafted for the tag-based mode. */
7528c2ecf20Sopenharmony_ci	if (IS_ENABLED(CONFIG_KASAN_GENERIC)) {
7538c2ecf20Sopenharmony_ci		kunit_info(test, "CONFIG_KASAN_SW_TAGS required\n");
7548c2ecf20Sopenharmony_ci		return;
7558c2ecf20Sopenharmony_ci	}
7568c2ecf20Sopenharmony_ci
7578c2ecf20Sopenharmony_ci	/* kmalloc-64 cache will be used and the last 16 bytes will be the redzone. */
7588c2ecf20Sopenharmony_ci	bits = kzalloc(48, GFP_KERNEL);
7598c2ecf20Sopenharmony_ci	KUNIT_ASSERT_NOT_ERR_OR_NULL(test, bits);
7608c2ecf20Sopenharmony_ci
7618c2ecf20Sopenharmony_ci	/* Do the accesses past the 48 allocated bytes, but within the redone. */
7628c2ecf20Sopenharmony_ci	kasan_bitops_modify(test, BITS_PER_LONG, (void *)bits + 48);
7638c2ecf20Sopenharmony_ci	kasan_bitops_test_and_modify(test, BITS_PER_LONG + BITS_PER_BYTE, (void *)bits + 48);
7648c2ecf20Sopenharmony_ci
7658c2ecf20Sopenharmony_ci	kfree(bits);
7668c2ecf20Sopenharmony_ci}
7678c2ecf20Sopenharmony_ci
7688c2ecf20Sopenharmony_cistatic void kmalloc_double_kzfree(struct kunit *test)
7698c2ecf20Sopenharmony_ci{
7708c2ecf20Sopenharmony_ci	char *ptr;
7718c2ecf20Sopenharmony_ci	size_t size = 16;
7728c2ecf20Sopenharmony_ci
7738c2ecf20Sopenharmony_ci	ptr = kmalloc(size, GFP_KERNEL);
7748c2ecf20Sopenharmony_ci	KUNIT_ASSERT_NOT_ERR_OR_NULL(test, ptr);
7758c2ecf20Sopenharmony_ci
7768c2ecf20Sopenharmony_ci	kfree_sensitive(ptr);
7778c2ecf20Sopenharmony_ci	KUNIT_EXPECT_KASAN_FAIL(test, kfree_sensitive(ptr));
7788c2ecf20Sopenharmony_ci}
7798c2ecf20Sopenharmony_ci
7808c2ecf20Sopenharmony_cistatic void vmalloc_oob(struct kunit *test)
7818c2ecf20Sopenharmony_ci{
7828c2ecf20Sopenharmony_ci	void *area;
7838c2ecf20Sopenharmony_ci
7848c2ecf20Sopenharmony_ci	if (!IS_ENABLED(CONFIG_KASAN_VMALLOC)) {
7858c2ecf20Sopenharmony_ci		kunit_info(test, "CONFIG_KASAN_VMALLOC is not enabled.");
7868c2ecf20Sopenharmony_ci		return;
7878c2ecf20Sopenharmony_ci	}
7888c2ecf20Sopenharmony_ci
7898c2ecf20Sopenharmony_ci	/*
7908c2ecf20Sopenharmony_ci	 * We have to be careful not to hit the guard page.
7918c2ecf20Sopenharmony_ci	 * The MMU will catch that and crash us.
7928c2ecf20Sopenharmony_ci	 */
7938c2ecf20Sopenharmony_ci	area = vmalloc(3000);
7948c2ecf20Sopenharmony_ci	KUNIT_ASSERT_NOT_ERR_OR_NULL(test, area);
7958c2ecf20Sopenharmony_ci
7968c2ecf20Sopenharmony_ci	KUNIT_EXPECT_KASAN_FAIL(test, ((volatile char *)area)[3100]);
7978c2ecf20Sopenharmony_ci	vfree(area);
7988c2ecf20Sopenharmony_ci}
7998c2ecf20Sopenharmony_ci
8008c2ecf20Sopenharmony_cistatic struct kunit_case kasan_kunit_test_cases[] = {
8018c2ecf20Sopenharmony_ci	KUNIT_CASE(kmalloc_oob_right),
8028c2ecf20Sopenharmony_ci	KUNIT_CASE(kmalloc_oob_left),
8038c2ecf20Sopenharmony_ci	KUNIT_CASE(kmalloc_node_oob_right),
8048c2ecf20Sopenharmony_ci	KUNIT_CASE(kmalloc_pagealloc_oob_right),
8058c2ecf20Sopenharmony_ci	KUNIT_CASE(kmalloc_pagealloc_uaf),
8068c2ecf20Sopenharmony_ci	KUNIT_CASE(kmalloc_pagealloc_invalid_free),
8078c2ecf20Sopenharmony_ci	KUNIT_CASE(kmalloc_large_oob_right),
8088c2ecf20Sopenharmony_ci	KUNIT_CASE(kmalloc_oob_krealloc_more),
8098c2ecf20Sopenharmony_ci	KUNIT_CASE(kmalloc_oob_krealloc_less),
8108c2ecf20Sopenharmony_ci	KUNIT_CASE(kmalloc_oob_16),
8118c2ecf20Sopenharmony_ci	KUNIT_CASE(kmalloc_uaf_16),
8128c2ecf20Sopenharmony_ci	KUNIT_CASE(kmalloc_oob_in_memset),
8138c2ecf20Sopenharmony_ci	KUNIT_CASE(kmalloc_oob_memset_2),
8148c2ecf20Sopenharmony_ci	KUNIT_CASE(kmalloc_oob_memset_4),
8158c2ecf20Sopenharmony_ci	KUNIT_CASE(kmalloc_oob_memset_8),
8168c2ecf20Sopenharmony_ci	KUNIT_CASE(kmalloc_oob_memset_16),
8178c2ecf20Sopenharmony_ci	KUNIT_CASE(kmalloc_memmove_invalid_size),
8188c2ecf20Sopenharmony_ci	KUNIT_CASE(kmalloc_uaf),
8198c2ecf20Sopenharmony_ci	KUNIT_CASE(kmalloc_uaf_memset),
8208c2ecf20Sopenharmony_ci	KUNIT_CASE(kmalloc_uaf2),
8218c2ecf20Sopenharmony_ci	KUNIT_CASE(kfree_via_page),
8228c2ecf20Sopenharmony_ci	KUNIT_CASE(kfree_via_phys),
8238c2ecf20Sopenharmony_ci	KUNIT_CASE(kmem_cache_oob),
8248c2ecf20Sopenharmony_ci	KUNIT_CASE(memcg_accounted_kmem_cache),
8258c2ecf20Sopenharmony_ci	KUNIT_CASE(kasan_global_oob),
8268c2ecf20Sopenharmony_ci	KUNIT_CASE(kasan_stack_oob),
8278c2ecf20Sopenharmony_ci	KUNIT_CASE(kasan_alloca_oob_left),
8288c2ecf20Sopenharmony_ci	KUNIT_CASE(kasan_alloca_oob_right),
8298c2ecf20Sopenharmony_ci	KUNIT_CASE(ksize_unpoisons_memory),
8308c2ecf20Sopenharmony_ci	KUNIT_CASE(kmem_cache_double_free),
8318c2ecf20Sopenharmony_ci	KUNIT_CASE(kmem_cache_invalid_free),
8328c2ecf20Sopenharmony_ci	KUNIT_CASE(kasan_memchr),
8338c2ecf20Sopenharmony_ci	KUNIT_CASE(kasan_memcmp),
8348c2ecf20Sopenharmony_ci	KUNIT_CASE(kasan_strings),
8358c2ecf20Sopenharmony_ci	KUNIT_CASE(kasan_bitops_generic),
8368c2ecf20Sopenharmony_ci	KUNIT_CASE(kasan_bitops_tags),
8378c2ecf20Sopenharmony_ci	KUNIT_CASE(kmalloc_double_kzfree),
8388c2ecf20Sopenharmony_ci	KUNIT_CASE(vmalloc_oob),
8398c2ecf20Sopenharmony_ci	{}
8408c2ecf20Sopenharmony_ci};
8418c2ecf20Sopenharmony_ci
8428c2ecf20Sopenharmony_cistatic struct kunit_suite kasan_kunit_test_suite = {
8438c2ecf20Sopenharmony_ci	.name = "kasan",
8448c2ecf20Sopenharmony_ci	.init = kasan_test_init,
8458c2ecf20Sopenharmony_ci	.test_cases = kasan_kunit_test_cases,
8468c2ecf20Sopenharmony_ci	.exit = kasan_test_exit,
8478c2ecf20Sopenharmony_ci};
8488c2ecf20Sopenharmony_ci
8498c2ecf20Sopenharmony_cikunit_test_suite(kasan_kunit_test_suite);
8508c2ecf20Sopenharmony_ci
8518c2ecf20Sopenharmony_ciMODULE_LICENSE("GPL");
852