18c2ecf20Sopenharmony_ci// SPDX-License-Identifier: GPL-2.0-only 28c2ecf20Sopenharmony_ci/* 38c2ecf20Sopenharmony_ci * 48c2ecf20Sopenharmony_ci * Copyright (c) 2014 Samsung Electronics Co., Ltd. 58c2ecf20Sopenharmony_ci * Author: Andrey Ryabinin <a.ryabinin@samsung.com> 68c2ecf20Sopenharmony_ci */ 78c2ecf20Sopenharmony_ci 88c2ecf20Sopenharmony_ci#include <linux/bitops.h> 98c2ecf20Sopenharmony_ci#include <linux/delay.h> 108c2ecf20Sopenharmony_ci#include <linux/kasan.h> 118c2ecf20Sopenharmony_ci#include <linux/kernel.h> 128c2ecf20Sopenharmony_ci#include <linux/mm.h> 138c2ecf20Sopenharmony_ci#include <linux/mman.h> 148c2ecf20Sopenharmony_ci#include <linux/module.h> 158c2ecf20Sopenharmony_ci#include <linux/printk.h> 168c2ecf20Sopenharmony_ci#include <linux/slab.h> 178c2ecf20Sopenharmony_ci#include <linux/string.h> 188c2ecf20Sopenharmony_ci#include <linux/uaccess.h> 198c2ecf20Sopenharmony_ci#include <linux/io.h> 208c2ecf20Sopenharmony_ci#include <linux/vmalloc.h> 218c2ecf20Sopenharmony_ci 228c2ecf20Sopenharmony_ci#include <asm/page.h> 238c2ecf20Sopenharmony_ci 248c2ecf20Sopenharmony_ci#include <kunit/test.h> 258c2ecf20Sopenharmony_ci 268c2ecf20Sopenharmony_ci#include "../mm/kasan/kasan.h" 278c2ecf20Sopenharmony_ci 288c2ecf20Sopenharmony_ci#define OOB_TAG_OFF (IS_ENABLED(CONFIG_KASAN_GENERIC) ? 0 : KASAN_SHADOW_SCALE_SIZE) 298c2ecf20Sopenharmony_ci 308c2ecf20Sopenharmony_ci/* 318c2ecf20Sopenharmony_ci * We assign some test results to these globals to make sure the tests 328c2ecf20Sopenharmony_ci * are not eliminated as dead code. 338c2ecf20Sopenharmony_ci */ 348c2ecf20Sopenharmony_ci 358c2ecf20Sopenharmony_civoid *kasan_ptr_result; 368c2ecf20Sopenharmony_ciint kasan_int_result; 378c2ecf20Sopenharmony_ci 388c2ecf20Sopenharmony_cistatic struct kunit_resource resource; 398c2ecf20Sopenharmony_cistatic struct kunit_kasan_expectation fail_data; 408c2ecf20Sopenharmony_cistatic bool multishot; 418c2ecf20Sopenharmony_ci 428c2ecf20Sopenharmony_cistatic int kasan_test_init(struct kunit *test) 438c2ecf20Sopenharmony_ci{ 448c2ecf20Sopenharmony_ci /* 458c2ecf20Sopenharmony_ci * Temporarily enable multi-shot mode and set panic_on_warn=0. 468c2ecf20Sopenharmony_ci * Otherwise, we'd only get a report for the first case. 478c2ecf20Sopenharmony_ci */ 488c2ecf20Sopenharmony_ci multishot = kasan_save_enable_multi_shot(); 498c2ecf20Sopenharmony_ci 508c2ecf20Sopenharmony_ci return 0; 518c2ecf20Sopenharmony_ci} 528c2ecf20Sopenharmony_ci 538c2ecf20Sopenharmony_cistatic void kasan_test_exit(struct kunit *test) 548c2ecf20Sopenharmony_ci{ 558c2ecf20Sopenharmony_ci kasan_restore_multi_shot(multishot); 568c2ecf20Sopenharmony_ci} 578c2ecf20Sopenharmony_ci 588c2ecf20Sopenharmony_ci/** 598c2ecf20Sopenharmony_ci * KUNIT_EXPECT_KASAN_FAIL() - Causes a test failure when the expression does 608c2ecf20Sopenharmony_ci * not cause a KASAN error. This uses a KUnit resource named "kasan_data." Do 618c2ecf20Sopenharmony_ci * Do not use this name for a KUnit resource outside here. 628c2ecf20Sopenharmony_ci * 638c2ecf20Sopenharmony_ci */ 648c2ecf20Sopenharmony_ci#define KUNIT_EXPECT_KASAN_FAIL(test, condition) do { \ 658c2ecf20Sopenharmony_ci fail_data.report_expected = true; \ 668c2ecf20Sopenharmony_ci fail_data.report_found = false; \ 678c2ecf20Sopenharmony_ci kunit_add_named_resource(test, \ 688c2ecf20Sopenharmony_ci NULL, \ 698c2ecf20Sopenharmony_ci NULL, \ 708c2ecf20Sopenharmony_ci &resource, \ 718c2ecf20Sopenharmony_ci "kasan_data", &fail_data); \ 728c2ecf20Sopenharmony_ci condition; \ 738c2ecf20Sopenharmony_ci KUNIT_EXPECT_EQ(test, \ 748c2ecf20Sopenharmony_ci fail_data.report_expected, \ 758c2ecf20Sopenharmony_ci fail_data.report_found); \ 768c2ecf20Sopenharmony_ci} while (0) 778c2ecf20Sopenharmony_ci 788c2ecf20Sopenharmony_cistatic void kmalloc_oob_right(struct kunit *test) 798c2ecf20Sopenharmony_ci{ 808c2ecf20Sopenharmony_ci char *ptr; 818c2ecf20Sopenharmony_ci size_t size = 123; 828c2ecf20Sopenharmony_ci 838c2ecf20Sopenharmony_ci ptr = kmalloc(size, GFP_KERNEL); 848c2ecf20Sopenharmony_ci KUNIT_ASSERT_NOT_ERR_OR_NULL(test, ptr); 858c2ecf20Sopenharmony_ci 868c2ecf20Sopenharmony_ci KUNIT_EXPECT_KASAN_FAIL(test, ptr[size + OOB_TAG_OFF] = 'x'); 878c2ecf20Sopenharmony_ci kfree(ptr); 888c2ecf20Sopenharmony_ci} 898c2ecf20Sopenharmony_ci 908c2ecf20Sopenharmony_cistatic void kmalloc_oob_left(struct kunit *test) 918c2ecf20Sopenharmony_ci{ 928c2ecf20Sopenharmony_ci char *ptr; 938c2ecf20Sopenharmony_ci size_t size = 15; 948c2ecf20Sopenharmony_ci 958c2ecf20Sopenharmony_ci ptr = kmalloc(size, GFP_KERNEL); 968c2ecf20Sopenharmony_ci KUNIT_ASSERT_NOT_ERR_OR_NULL(test, ptr); 978c2ecf20Sopenharmony_ci 988c2ecf20Sopenharmony_ci KUNIT_EXPECT_KASAN_FAIL(test, *ptr = *(ptr - 1)); 998c2ecf20Sopenharmony_ci kfree(ptr); 1008c2ecf20Sopenharmony_ci} 1018c2ecf20Sopenharmony_ci 1028c2ecf20Sopenharmony_cistatic void kmalloc_node_oob_right(struct kunit *test) 1038c2ecf20Sopenharmony_ci{ 1048c2ecf20Sopenharmony_ci char *ptr; 1058c2ecf20Sopenharmony_ci size_t size = 4096; 1068c2ecf20Sopenharmony_ci 1078c2ecf20Sopenharmony_ci ptr = kmalloc_node(size, GFP_KERNEL, 0); 1088c2ecf20Sopenharmony_ci KUNIT_ASSERT_NOT_ERR_OR_NULL(test, ptr); 1098c2ecf20Sopenharmony_ci 1108c2ecf20Sopenharmony_ci KUNIT_EXPECT_KASAN_FAIL(test, ptr[size] = 0); 1118c2ecf20Sopenharmony_ci kfree(ptr); 1128c2ecf20Sopenharmony_ci} 1138c2ecf20Sopenharmony_ci 1148c2ecf20Sopenharmony_cistatic void kmalloc_pagealloc_oob_right(struct kunit *test) 1158c2ecf20Sopenharmony_ci{ 1168c2ecf20Sopenharmony_ci char *ptr; 1178c2ecf20Sopenharmony_ci size_t size = KMALLOC_MAX_CACHE_SIZE + 10; 1188c2ecf20Sopenharmony_ci 1198c2ecf20Sopenharmony_ci if (!IS_ENABLED(CONFIG_SLUB)) { 1208c2ecf20Sopenharmony_ci kunit_info(test, "CONFIG_SLUB is not enabled."); 1218c2ecf20Sopenharmony_ci return; 1228c2ecf20Sopenharmony_ci } 1238c2ecf20Sopenharmony_ci 1248c2ecf20Sopenharmony_ci /* Allocate a chunk that does not fit into a SLUB cache to trigger 1258c2ecf20Sopenharmony_ci * the page allocator fallback. 1268c2ecf20Sopenharmony_ci */ 1278c2ecf20Sopenharmony_ci ptr = kmalloc(size, GFP_KERNEL); 1288c2ecf20Sopenharmony_ci KUNIT_ASSERT_NOT_ERR_OR_NULL(test, ptr); 1298c2ecf20Sopenharmony_ci 1308c2ecf20Sopenharmony_ci KUNIT_EXPECT_KASAN_FAIL(test, ptr[size + OOB_TAG_OFF] = 0); 1318c2ecf20Sopenharmony_ci kfree(ptr); 1328c2ecf20Sopenharmony_ci} 1338c2ecf20Sopenharmony_ci 1348c2ecf20Sopenharmony_cistatic void kmalloc_pagealloc_uaf(struct kunit *test) 1358c2ecf20Sopenharmony_ci{ 1368c2ecf20Sopenharmony_ci char *ptr; 1378c2ecf20Sopenharmony_ci size_t size = KMALLOC_MAX_CACHE_SIZE + 10; 1388c2ecf20Sopenharmony_ci 1398c2ecf20Sopenharmony_ci if (!IS_ENABLED(CONFIG_SLUB)) { 1408c2ecf20Sopenharmony_ci kunit_info(test, "CONFIG_SLUB is not enabled."); 1418c2ecf20Sopenharmony_ci return; 1428c2ecf20Sopenharmony_ci } 1438c2ecf20Sopenharmony_ci 1448c2ecf20Sopenharmony_ci ptr = kmalloc(size, GFP_KERNEL); 1458c2ecf20Sopenharmony_ci KUNIT_ASSERT_NOT_ERR_OR_NULL(test, ptr); 1468c2ecf20Sopenharmony_ci 1478c2ecf20Sopenharmony_ci kfree(ptr); 1488c2ecf20Sopenharmony_ci KUNIT_EXPECT_KASAN_FAIL(test, ptr[0] = 0); 1498c2ecf20Sopenharmony_ci} 1508c2ecf20Sopenharmony_ci 1518c2ecf20Sopenharmony_cistatic void kmalloc_pagealloc_invalid_free(struct kunit *test) 1528c2ecf20Sopenharmony_ci{ 1538c2ecf20Sopenharmony_ci char *ptr; 1548c2ecf20Sopenharmony_ci size_t size = KMALLOC_MAX_CACHE_SIZE + 10; 1558c2ecf20Sopenharmony_ci 1568c2ecf20Sopenharmony_ci if (!IS_ENABLED(CONFIG_SLUB)) { 1578c2ecf20Sopenharmony_ci kunit_info(test, "CONFIG_SLUB is not enabled."); 1588c2ecf20Sopenharmony_ci return; 1598c2ecf20Sopenharmony_ci } 1608c2ecf20Sopenharmony_ci 1618c2ecf20Sopenharmony_ci ptr = kmalloc(size, GFP_KERNEL); 1628c2ecf20Sopenharmony_ci KUNIT_ASSERT_NOT_ERR_OR_NULL(test, ptr); 1638c2ecf20Sopenharmony_ci 1648c2ecf20Sopenharmony_ci KUNIT_EXPECT_KASAN_FAIL(test, kfree(ptr + 1)); 1658c2ecf20Sopenharmony_ci} 1668c2ecf20Sopenharmony_ci 1678c2ecf20Sopenharmony_cistatic void kmalloc_large_oob_right(struct kunit *test) 1688c2ecf20Sopenharmony_ci{ 1698c2ecf20Sopenharmony_ci char *ptr; 1708c2ecf20Sopenharmony_ci size_t size = KMALLOC_MAX_CACHE_SIZE - 256; 1718c2ecf20Sopenharmony_ci /* Allocate a chunk that is large enough, but still fits into a slab 1728c2ecf20Sopenharmony_ci * and does not trigger the page allocator fallback in SLUB. 1738c2ecf20Sopenharmony_ci */ 1748c2ecf20Sopenharmony_ci ptr = kmalloc(size, GFP_KERNEL); 1758c2ecf20Sopenharmony_ci KUNIT_ASSERT_NOT_ERR_OR_NULL(test, ptr); 1768c2ecf20Sopenharmony_ci 1778c2ecf20Sopenharmony_ci KUNIT_EXPECT_KASAN_FAIL(test, ptr[size] = 0); 1788c2ecf20Sopenharmony_ci kfree(ptr); 1798c2ecf20Sopenharmony_ci} 1808c2ecf20Sopenharmony_ci 1818c2ecf20Sopenharmony_cistatic void kmalloc_oob_krealloc_more(struct kunit *test) 1828c2ecf20Sopenharmony_ci{ 1838c2ecf20Sopenharmony_ci char *ptr1, *ptr2; 1848c2ecf20Sopenharmony_ci size_t size1 = 17; 1858c2ecf20Sopenharmony_ci size_t size2 = 19; 1868c2ecf20Sopenharmony_ci 1878c2ecf20Sopenharmony_ci ptr1 = kmalloc(size1, GFP_KERNEL); 1888c2ecf20Sopenharmony_ci KUNIT_ASSERT_NOT_ERR_OR_NULL(test, ptr1); 1898c2ecf20Sopenharmony_ci 1908c2ecf20Sopenharmony_ci ptr2 = krealloc(ptr1, size2, GFP_KERNEL); 1918c2ecf20Sopenharmony_ci KUNIT_ASSERT_NOT_ERR_OR_NULL(test, ptr2); 1928c2ecf20Sopenharmony_ci 1938c2ecf20Sopenharmony_ci KUNIT_EXPECT_KASAN_FAIL(test, ptr2[size2 + OOB_TAG_OFF] = 'x'); 1948c2ecf20Sopenharmony_ci kfree(ptr2); 1958c2ecf20Sopenharmony_ci} 1968c2ecf20Sopenharmony_ci 1978c2ecf20Sopenharmony_cistatic void kmalloc_oob_krealloc_less(struct kunit *test) 1988c2ecf20Sopenharmony_ci{ 1998c2ecf20Sopenharmony_ci char *ptr1, *ptr2; 2008c2ecf20Sopenharmony_ci size_t size1 = 17; 2018c2ecf20Sopenharmony_ci size_t size2 = 15; 2028c2ecf20Sopenharmony_ci 2038c2ecf20Sopenharmony_ci ptr1 = kmalloc(size1, GFP_KERNEL); 2048c2ecf20Sopenharmony_ci KUNIT_ASSERT_NOT_ERR_OR_NULL(test, ptr1); 2058c2ecf20Sopenharmony_ci 2068c2ecf20Sopenharmony_ci ptr2 = krealloc(ptr1, size2, GFP_KERNEL); 2078c2ecf20Sopenharmony_ci KUNIT_ASSERT_NOT_ERR_OR_NULL(test, ptr2); 2088c2ecf20Sopenharmony_ci 2098c2ecf20Sopenharmony_ci KUNIT_EXPECT_KASAN_FAIL(test, ptr2[size2 + OOB_TAG_OFF] = 'x'); 2108c2ecf20Sopenharmony_ci kfree(ptr2); 2118c2ecf20Sopenharmony_ci} 2128c2ecf20Sopenharmony_ci 2138c2ecf20Sopenharmony_cistatic void kmalloc_oob_16(struct kunit *test) 2148c2ecf20Sopenharmony_ci{ 2158c2ecf20Sopenharmony_ci struct { 2168c2ecf20Sopenharmony_ci u64 words[2]; 2178c2ecf20Sopenharmony_ci } *ptr1, *ptr2; 2188c2ecf20Sopenharmony_ci 2198c2ecf20Sopenharmony_ci /* This test is specifically crafted for the generic mode. */ 2208c2ecf20Sopenharmony_ci if (!IS_ENABLED(CONFIG_KASAN_GENERIC)) { 2218c2ecf20Sopenharmony_ci kunit_info(test, "CONFIG_KASAN_GENERIC required\n"); 2228c2ecf20Sopenharmony_ci return; 2238c2ecf20Sopenharmony_ci } 2248c2ecf20Sopenharmony_ci 2258c2ecf20Sopenharmony_ci ptr1 = kmalloc(sizeof(*ptr1) - 3, GFP_KERNEL); 2268c2ecf20Sopenharmony_ci KUNIT_ASSERT_NOT_ERR_OR_NULL(test, ptr1); 2278c2ecf20Sopenharmony_ci 2288c2ecf20Sopenharmony_ci ptr2 = kmalloc(sizeof(*ptr2), GFP_KERNEL); 2298c2ecf20Sopenharmony_ci KUNIT_ASSERT_NOT_ERR_OR_NULL(test, ptr2); 2308c2ecf20Sopenharmony_ci 2318c2ecf20Sopenharmony_ci KUNIT_EXPECT_KASAN_FAIL(test, *ptr1 = *ptr2); 2328c2ecf20Sopenharmony_ci kfree(ptr1); 2338c2ecf20Sopenharmony_ci kfree(ptr2); 2348c2ecf20Sopenharmony_ci} 2358c2ecf20Sopenharmony_ci 2368c2ecf20Sopenharmony_cistatic void kmalloc_uaf_16(struct kunit *test) 2378c2ecf20Sopenharmony_ci{ 2388c2ecf20Sopenharmony_ci struct { 2398c2ecf20Sopenharmony_ci u64 words[2]; 2408c2ecf20Sopenharmony_ci } *ptr1, *ptr2; 2418c2ecf20Sopenharmony_ci 2428c2ecf20Sopenharmony_ci ptr1 = kmalloc(sizeof(*ptr1), GFP_KERNEL); 2438c2ecf20Sopenharmony_ci KUNIT_ASSERT_NOT_ERR_OR_NULL(test, ptr1); 2448c2ecf20Sopenharmony_ci 2458c2ecf20Sopenharmony_ci ptr2 = kmalloc(sizeof(*ptr2), GFP_KERNEL); 2468c2ecf20Sopenharmony_ci KUNIT_ASSERT_NOT_ERR_OR_NULL(test, ptr2); 2478c2ecf20Sopenharmony_ci kfree(ptr2); 2488c2ecf20Sopenharmony_ci 2498c2ecf20Sopenharmony_ci KUNIT_EXPECT_KASAN_FAIL(test, *ptr1 = *ptr2); 2508c2ecf20Sopenharmony_ci kfree(ptr1); 2518c2ecf20Sopenharmony_ci} 2528c2ecf20Sopenharmony_ci 2538c2ecf20Sopenharmony_cistatic void kmalloc_oob_memset_2(struct kunit *test) 2548c2ecf20Sopenharmony_ci{ 2558c2ecf20Sopenharmony_ci char *ptr; 2568c2ecf20Sopenharmony_ci size_t size = 8; 2578c2ecf20Sopenharmony_ci 2588c2ecf20Sopenharmony_ci ptr = kmalloc(size, GFP_KERNEL); 2598c2ecf20Sopenharmony_ci KUNIT_ASSERT_NOT_ERR_OR_NULL(test, ptr); 2608c2ecf20Sopenharmony_ci 2618c2ecf20Sopenharmony_ci KUNIT_EXPECT_KASAN_FAIL(test, memset(ptr + 7 + OOB_TAG_OFF, 0, 2)); 2628c2ecf20Sopenharmony_ci kfree(ptr); 2638c2ecf20Sopenharmony_ci} 2648c2ecf20Sopenharmony_ci 2658c2ecf20Sopenharmony_cistatic void kmalloc_oob_memset_4(struct kunit *test) 2668c2ecf20Sopenharmony_ci{ 2678c2ecf20Sopenharmony_ci char *ptr; 2688c2ecf20Sopenharmony_ci size_t size = 8; 2698c2ecf20Sopenharmony_ci 2708c2ecf20Sopenharmony_ci ptr = kmalloc(size, GFP_KERNEL); 2718c2ecf20Sopenharmony_ci KUNIT_ASSERT_NOT_ERR_OR_NULL(test, ptr); 2728c2ecf20Sopenharmony_ci 2738c2ecf20Sopenharmony_ci KUNIT_EXPECT_KASAN_FAIL(test, memset(ptr + 5 + OOB_TAG_OFF, 0, 4)); 2748c2ecf20Sopenharmony_ci kfree(ptr); 2758c2ecf20Sopenharmony_ci} 2768c2ecf20Sopenharmony_ci 2778c2ecf20Sopenharmony_ci 2788c2ecf20Sopenharmony_cistatic void kmalloc_oob_memset_8(struct kunit *test) 2798c2ecf20Sopenharmony_ci{ 2808c2ecf20Sopenharmony_ci char *ptr; 2818c2ecf20Sopenharmony_ci size_t size = 8; 2828c2ecf20Sopenharmony_ci 2838c2ecf20Sopenharmony_ci ptr = kmalloc(size, GFP_KERNEL); 2848c2ecf20Sopenharmony_ci KUNIT_ASSERT_NOT_ERR_OR_NULL(test, ptr); 2858c2ecf20Sopenharmony_ci 2868c2ecf20Sopenharmony_ci KUNIT_EXPECT_KASAN_FAIL(test, memset(ptr + 1 + OOB_TAG_OFF, 0, 8)); 2878c2ecf20Sopenharmony_ci kfree(ptr); 2888c2ecf20Sopenharmony_ci} 2898c2ecf20Sopenharmony_ci 2908c2ecf20Sopenharmony_cistatic void kmalloc_oob_memset_16(struct kunit *test) 2918c2ecf20Sopenharmony_ci{ 2928c2ecf20Sopenharmony_ci char *ptr; 2938c2ecf20Sopenharmony_ci size_t size = 16; 2948c2ecf20Sopenharmony_ci 2958c2ecf20Sopenharmony_ci ptr = kmalloc(size, GFP_KERNEL); 2968c2ecf20Sopenharmony_ci KUNIT_ASSERT_NOT_ERR_OR_NULL(test, ptr); 2978c2ecf20Sopenharmony_ci 2988c2ecf20Sopenharmony_ci KUNIT_EXPECT_KASAN_FAIL(test, memset(ptr + 1 + OOB_TAG_OFF, 0, 16)); 2998c2ecf20Sopenharmony_ci kfree(ptr); 3008c2ecf20Sopenharmony_ci} 3018c2ecf20Sopenharmony_ci 3028c2ecf20Sopenharmony_cistatic void kmalloc_oob_in_memset(struct kunit *test) 3038c2ecf20Sopenharmony_ci{ 3048c2ecf20Sopenharmony_ci char *ptr; 3058c2ecf20Sopenharmony_ci size_t size = 666; 3068c2ecf20Sopenharmony_ci 3078c2ecf20Sopenharmony_ci ptr = kmalloc(size, GFP_KERNEL); 3088c2ecf20Sopenharmony_ci KUNIT_ASSERT_NOT_ERR_OR_NULL(test, ptr); 3098c2ecf20Sopenharmony_ci 3108c2ecf20Sopenharmony_ci KUNIT_EXPECT_KASAN_FAIL(test, memset(ptr, 0, size + 5 + OOB_TAG_OFF)); 3118c2ecf20Sopenharmony_ci kfree(ptr); 3128c2ecf20Sopenharmony_ci} 3138c2ecf20Sopenharmony_ci 3148c2ecf20Sopenharmony_cistatic void kmalloc_memmove_invalid_size(struct kunit *test) 3158c2ecf20Sopenharmony_ci{ 3168c2ecf20Sopenharmony_ci char *ptr; 3178c2ecf20Sopenharmony_ci size_t size = 64; 3188c2ecf20Sopenharmony_ci volatile size_t invalid_size = -2; 3198c2ecf20Sopenharmony_ci 3208c2ecf20Sopenharmony_ci ptr = kmalloc(size, GFP_KERNEL); 3218c2ecf20Sopenharmony_ci KUNIT_ASSERT_NOT_ERR_OR_NULL(test, ptr); 3228c2ecf20Sopenharmony_ci 3238c2ecf20Sopenharmony_ci memset((char *)ptr, 0, 64); 3248c2ecf20Sopenharmony_ci 3258c2ecf20Sopenharmony_ci KUNIT_EXPECT_KASAN_FAIL(test, 3268c2ecf20Sopenharmony_ci memmove((char *)ptr, (char *)ptr + 4, invalid_size)); 3278c2ecf20Sopenharmony_ci kfree(ptr); 3288c2ecf20Sopenharmony_ci} 3298c2ecf20Sopenharmony_ci 3308c2ecf20Sopenharmony_cistatic void kmalloc_uaf(struct kunit *test) 3318c2ecf20Sopenharmony_ci{ 3328c2ecf20Sopenharmony_ci char *ptr; 3338c2ecf20Sopenharmony_ci size_t size = 10; 3348c2ecf20Sopenharmony_ci 3358c2ecf20Sopenharmony_ci ptr = kmalloc(size, GFP_KERNEL); 3368c2ecf20Sopenharmony_ci KUNIT_ASSERT_NOT_ERR_OR_NULL(test, ptr); 3378c2ecf20Sopenharmony_ci 3388c2ecf20Sopenharmony_ci kfree(ptr); 3398c2ecf20Sopenharmony_ci KUNIT_EXPECT_KASAN_FAIL(test, *(ptr + 8) = 'x'); 3408c2ecf20Sopenharmony_ci} 3418c2ecf20Sopenharmony_ci 3428c2ecf20Sopenharmony_cistatic void kmalloc_uaf_memset(struct kunit *test) 3438c2ecf20Sopenharmony_ci{ 3448c2ecf20Sopenharmony_ci char *ptr; 3458c2ecf20Sopenharmony_ci size_t size = 33; 3468c2ecf20Sopenharmony_ci 3478c2ecf20Sopenharmony_ci ptr = kmalloc(size, GFP_KERNEL); 3488c2ecf20Sopenharmony_ci KUNIT_ASSERT_NOT_ERR_OR_NULL(test, ptr); 3498c2ecf20Sopenharmony_ci 3508c2ecf20Sopenharmony_ci kfree(ptr); 3518c2ecf20Sopenharmony_ci KUNIT_EXPECT_KASAN_FAIL(test, memset(ptr, 0, size)); 3528c2ecf20Sopenharmony_ci} 3538c2ecf20Sopenharmony_ci 3548c2ecf20Sopenharmony_cistatic void kmalloc_uaf2(struct kunit *test) 3558c2ecf20Sopenharmony_ci{ 3568c2ecf20Sopenharmony_ci char *ptr1, *ptr2; 3578c2ecf20Sopenharmony_ci size_t size = 43; 3588c2ecf20Sopenharmony_ci 3598c2ecf20Sopenharmony_ci ptr1 = kmalloc(size, GFP_KERNEL); 3608c2ecf20Sopenharmony_ci KUNIT_ASSERT_NOT_ERR_OR_NULL(test, ptr1); 3618c2ecf20Sopenharmony_ci 3628c2ecf20Sopenharmony_ci kfree(ptr1); 3638c2ecf20Sopenharmony_ci 3648c2ecf20Sopenharmony_ci ptr2 = kmalloc(size, GFP_KERNEL); 3658c2ecf20Sopenharmony_ci KUNIT_ASSERT_NOT_ERR_OR_NULL(test, ptr2); 3668c2ecf20Sopenharmony_ci 3678c2ecf20Sopenharmony_ci KUNIT_EXPECT_KASAN_FAIL(test, ptr1[40] = 'x'); 3688c2ecf20Sopenharmony_ci KUNIT_EXPECT_PTR_NE(test, ptr1, ptr2); 3698c2ecf20Sopenharmony_ci 3708c2ecf20Sopenharmony_ci kfree(ptr2); 3718c2ecf20Sopenharmony_ci} 3728c2ecf20Sopenharmony_ci 3738c2ecf20Sopenharmony_cistatic void kfree_via_page(struct kunit *test) 3748c2ecf20Sopenharmony_ci{ 3758c2ecf20Sopenharmony_ci char *ptr; 3768c2ecf20Sopenharmony_ci size_t size = 8; 3778c2ecf20Sopenharmony_ci struct page *page; 3788c2ecf20Sopenharmony_ci unsigned long offset; 3798c2ecf20Sopenharmony_ci 3808c2ecf20Sopenharmony_ci ptr = kmalloc(size, GFP_KERNEL); 3818c2ecf20Sopenharmony_ci KUNIT_ASSERT_NOT_ERR_OR_NULL(test, ptr); 3828c2ecf20Sopenharmony_ci 3838c2ecf20Sopenharmony_ci page = virt_to_page(ptr); 3848c2ecf20Sopenharmony_ci offset = offset_in_page(ptr); 3858c2ecf20Sopenharmony_ci kfree(page_address(page) + offset); 3868c2ecf20Sopenharmony_ci} 3878c2ecf20Sopenharmony_ci 3888c2ecf20Sopenharmony_cistatic void kfree_via_phys(struct kunit *test) 3898c2ecf20Sopenharmony_ci{ 3908c2ecf20Sopenharmony_ci char *ptr; 3918c2ecf20Sopenharmony_ci size_t size = 8; 3928c2ecf20Sopenharmony_ci phys_addr_t phys; 3938c2ecf20Sopenharmony_ci 3948c2ecf20Sopenharmony_ci ptr = kmalloc(size, GFP_KERNEL); 3958c2ecf20Sopenharmony_ci KUNIT_ASSERT_NOT_ERR_OR_NULL(test, ptr); 3968c2ecf20Sopenharmony_ci 3978c2ecf20Sopenharmony_ci phys = virt_to_phys(ptr); 3988c2ecf20Sopenharmony_ci kfree(phys_to_virt(phys)); 3998c2ecf20Sopenharmony_ci} 4008c2ecf20Sopenharmony_ci 4018c2ecf20Sopenharmony_cistatic void kmem_cache_oob(struct kunit *test) 4028c2ecf20Sopenharmony_ci{ 4038c2ecf20Sopenharmony_ci char *p; 4048c2ecf20Sopenharmony_ci size_t size = 200; 4058c2ecf20Sopenharmony_ci struct kmem_cache *cache = kmem_cache_create("test_cache", 4068c2ecf20Sopenharmony_ci size, 0, 4078c2ecf20Sopenharmony_ci 0, NULL); 4088c2ecf20Sopenharmony_ci KUNIT_ASSERT_NOT_ERR_OR_NULL(test, cache); 4098c2ecf20Sopenharmony_ci p = kmem_cache_alloc(cache, GFP_KERNEL); 4108c2ecf20Sopenharmony_ci if (!p) { 4118c2ecf20Sopenharmony_ci kunit_err(test, "Allocation failed: %s\n", __func__); 4128c2ecf20Sopenharmony_ci kmem_cache_destroy(cache); 4138c2ecf20Sopenharmony_ci return; 4148c2ecf20Sopenharmony_ci } 4158c2ecf20Sopenharmony_ci 4168c2ecf20Sopenharmony_ci KUNIT_EXPECT_KASAN_FAIL(test, *p = p[size + OOB_TAG_OFF]); 4178c2ecf20Sopenharmony_ci kmem_cache_free(cache, p); 4188c2ecf20Sopenharmony_ci kmem_cache_destroy(cache); 4198c2ecf20Sopenharmony_ci} 4208c2ecf20Sopenharmony_ci 4218c2ecf20Sopenharmony_cistatic void memcg_accounted_kmem_cache(struct kunit *test) 4228c2ecf20Sopenharmony_ci{ 4238c2ecf20Sopenharmony_ci int i; 4248c2ecf20Sopenharmony_ci char *p; 4258c2ecf20Sopenharmony_ci size_t size = 200; 4268c2ecf20Sopenharmony_ci struct kmem_cache *cache; 4278c2ecf20Sopenharmony_ci 4288c2ecf20Sopenharmony_ci cache = kmem_cache_create("test_cache", size, 0, SLAB_ACCOUNT, NULL); 4298c2ecf20Sopenharmony_ci KUNIT_ASSERT_NOT_ERR_OR_NULL(test, cache); 4308c2ecf20Sopenharmony_ci 4318c2ecf20Sopenharmony_ci /* 4328c2ecf20Sopenharmony_ci * Several allocations with a delay to allow for lazy per memcg kmem 4338c2ecf20Sopenharmony_ci * cache creation. 4348c2ecf20Sopenharmony_ci */ 4358c2ecf20Sopenharmony_ci for (i = 0; i < 5; i++) { 4368c2ecf20Sopenharmony_ci p = kmem_cache_alloc(cache, GFP_KERNEL); 4378c2ecf20Sopenharmony_ci if (!p) 4388c2ecf20Sopenharmony_ci goto free_cache; 4398c2ecf20Sopenharmony_ci 4408c2ecf20Sopenharmony_ci kmem_cache_free(cache, p); 4418c2ecf20Sopenharmony_ci msleep(100); 4428c2ecf20Sopenharmony_ci } 4438c2ecf20Sopenharmony_ci 4448c2ecf20Sopenharmony_cifree_cache: 4458c2ecf20Sopenharmony_ci kmem_cache_destroy(cache); 4468c2ecf20Sopenharmony_ci} 4478c2ecf20Sopenharmony_ci 4488c2ecf20Sopenharmony_cistatic char global_array[10]; 4498c2ecf20Sopenharmony_ci 4508c2ecf20Sopenharmony_cistatic void kasan_global_oob(struct kunit *test) 4518c2ecf20Sopenharmony_ci{ 4528c2ecf20Sopenharmony_ci /* 4538c2ecf20Sopenharmony_ci * Deliberate out-of-bounds access. To prevent CONFIG_UBSAN_LOCAL_BOUNDS 4548c2ecf20Sopenharmony_ci * from failing here and panicing the kernel, access the array via a 4558c2ecf20Sopenharmony_ci * volatile pointer, which will prevent the compiler from being able to 4568c2ecf20Sopenharmony_ci * determine the array bounds. 4578c2ecf20Sopenharmony_ci * 4588c2ecf20Sopenharmony_ci * This access uses a volatile pointer to char (char *volatile) rather 4598c2ecf20Sopenharmony_ci * than the more conventional pointer to volatile char (volatile char *) 4608c2ecf20Sopenharmony_ci * because we want to prevent the compiler from making inferences about 4618c2ecf20Sopenharmony_ci * the pointer itself (i.e. its array bounds), not the data that it 4628c2ecf20Sopenharmony_ci * refers to. 4638c2ecf20Sopenharmony_ci */ 4648c2ecf20Sopenharmony_ci char *volatile array = global_array; 4658c2ecf20Sopenharmony_ci char *p = &array[ARRAY_SIZE(global_array) + 3]; 4668c2ecf20Sopenharmony_ci 4678c2ecf20Sopenharmony_ci /* Only generic mode instruments globals. */ 4688c2ecf20Sopenharmony_ci if (!IS_ENABLED(CONFIG_KASAN_GENERIC)) { 4698c2ecf20Sopenharmony_ci kunit_info(test, "CONFIG_KASAN_GENERIC required"); 4708c2ecf20Sopenharmony_ci return; 4718c2ecf20Sopenharmony_ci } 4728c2ecf20Sopenharmony_ci 4738c2ecf20Sopenharmony_ci KUNIT_EXPECT_KASAN_FAIL(test, *(volatile char *)p); 4748c2ecf20Sopenharmony_ci} 4758c2ecf20Sopenharmony_ci 4768c2ecf20Sopenharmony_cistatic void ksize_unpoisons_memory(struct kunit *test) 4778c2ecf20Sopenharmony_ci{ 4788c2ecf20Sopenharmony_ci char *ptr; 4798c2ecf20Sopenharmony_ci size_t size = 123, real_size; 4808c2ecf20Sopenharmony_ci 4818c2ecf20Sopenharmony_ci ptr = kmalloc(size, GFP_KERNEL); 4828c2ecf20Sopenharmony_ci KUNIT_ASSERT_NOT_ERR_OR_NULL(test, ptr); 4838c2ecf20Sopenharmony_ci real_size = ksize(ptr); 4848c2ecf20Sopenharmony_ci /* This access doesn't trigger an error. */ 4858c2ecf20Sopenharmony_ci ptr[size] = 'x'; 4868c2ecf20Sopenharmony_ci /* This one does. */ 4878c2ecf20Sopenharmony_ci KUNIT_EXPECT_KASAN_FAIL(test, ptr[real_size] = 'y'); 4888c2ecf20Sopenharmony_ci kfree(ptr); 4898c2ecf20Sopenharmony_ci} 4908c2ecf20Sopenharmony_ci 4918c2ecf20Sopenharmony_cistatic void kasan_stack_oob(struct kunit *test) 4928c2ecf20Sopenharmony_ci{ 4938c2ecf20Sopenharmony_ci char stack_array[10]; 4948c2ecf20Sopenharmony_ci /* See comment in kasan_global_oob. */ 4958c2ecf20Sopenharmony_ci char *volatile array = stack_array; 4968c2ecf20Sopenharmony_ci char *p = &array[ARRAY_SIZE(stack_array) + OOB_TAG_OFF]; 4978c2ecf20Sopenharmony_ci 4988c2ecf20Sopenharmony_ci if (!IS_ENABLED(CONFIG_KASAN_STACK)) { 4998c2ecf20Sopenharmony_ci kunit_info(test, "CONFIG_KASAN_STACK is not enabled"); 5008c2ecf20Sopenharmony_ci return; 5018c2ecf20Sopenharmony_ci } 5028c2ecf20Sopenharmony_ci 5038c2ecf20Sopenharmony_ci KUNIT_EXPECT_KASAN_FAIL(test, *(volatile char *)p); 5048c2ecf20Sopenharmony_ci} 5058c2ecf20Sopenharmony_ci 5068c2ecf20Sopenharmony_cistatic void kasan_alloca_oob_left(struct kunit *test) 5078c2ecf20Sopenharmony_ci{ 5088c2ecf20Sopenharmony_ci volatile int i = 10; 5098c2ecf20Sopenharmony_ci char alloca_array[i]; 5108c2ecf20Sopenharmony_ci /* See comment in kasan_global_oob. */ 5118c2ecf20Sopenharmony_ci char *volatile array = alloca_array; 5128c2ecf20Sopenharmony_ci char *p = array - 1; 5138c2ecf20Sopenharmony_ci 5148c2ecf20Sopenharmony_ci /* Only generic mode instruments dynamic allocas. */ 5158c2ecf20Sopenharmony_ci if (!IS_ENABLED(CONFIG_KASAN_GENERIC)) { 5168c2ecf20Sopenharmony_ci kunit_info(test, "CONFIG_KASAN_GENERIC required"); 5178c2ecf20Sopenharmony_ci return; 5188c2ecf20Sopenharmony_ci } 5198c2ecf20Sopenharmony_ci 5208c2ecf20Sopenharmony_ci if (!IS_ENABLED(CONFIG_KASAN_STACK)) { 5218c2ecf20Sopenharmony_ci kunit_info(test, "CONFIG_KASAN_STACK is not enabled"); 5228c2ecf20Sopenharmony_ci return; 5238c2ecf20Sopenharmony_ci } 5248c2ecf20Sopenharmony_ci 5258c2ecf20Sopenharmony_ci KUNIT_EXPECT_KASAN_FAIL(test, *(volatile char *)p); 5268c2ecf20Sopenharmony_ci} 5278c2ecf20Sopenharmony_ci 5288c2ecf20Sopenharmony_cistatic void kasan_alloca_oob_right(struct kunit *test) 5298c2ecf20Sopenharmony_ci{ 5308c2ecf20Sopenharmony_ci volatile int i = 10; 5318c2ecf20Sopenharmony_ci char alloca_array[i]; 5328c2ecf20Sopenharmony_ci /* See comment in kasan_global_oob. */ 5338c2ecf20Sopenharmony_ci char *volatile array = alloca_array; 5348c2ecf20Sopenharmony_ci char *p = array + i; 5358c2ecf20Sopenharmony_ci 5368c2ecf20Sopenharmony_ci /* Only generic mode instruments dynamic allocas. */ 5378c2ecf20Sopenharmony_ci if (!IS_ENABLED(CONFIG_KASAN_GENERIC)) { 5388c2ecf20Sopenharmony_ci kunit_info(test, "CONFIG_KASAN_GENERIC required"); 5398c2ecf20Sopenharmony_ci return; 5408c2ecf20Sopenharmony_ci } 5418c2ecf20Sopenharmony_ci 5428c2ecf20Sopenharmony_ci if (!IS_ENABLED(CONFIG_KASAN_STACK)) { 5438c2ecf20Sopenharmony_ci kunit_info(test, "CONFIG_KASAN_STACK is not enabled"); 5448c2ecf20Sopenharmony_ci return; 5458c2ecf20Sopenharmony_ci } 5468c2ecf20Sopenharmony_ci 5478c2ecf20Sopenharmony_ci KUNIT_EXPECT_KASAN_FAIL(test, *(volatile char *)p); 5488c2ecf20Sopenharmony_ci} 5498c2ecf20Sopenharmony_ci 5508c2ecf20Sopenharmony_cistatic void kmem_cache_double_free(struct kunit *test) 5518c2ecf20Sopenharmony_ci{ 5528c2ecf20Sopenharmony_ci char *p; 5538c2ecf20Sopenharmony_ci size_t size = 200; 5548c2ecf20Sopenharmony_ci struct kmem_cache *cache; 5558c2ecf20Sopenharmony_ci 5568c2ecf20Sopenharmony_ci cache = kmem_cache_create("test_cache", size, 0, 0, NULL); 5578c2ecf20Sopenharmony_ci KUNIT_ASSERT_NOT_ERR_OR_NULL(test, cache); 5588c2ecf20Sopenharmony_ci 5598c2ecf20Sopenharmony_ci p = kmem_cache_alloc(cache, GFP_KERNEL); 5608c2ecf20Sopenharmony_ci if (!p) { 5618c2ecf20Sopenharmony_ci kunit_err(test, "Allocation failed: %s\n", __func__); 5628c2ecf20Sopenharmony_ci kmem_cache_destroy(cache); 5638c2ecf20Sopenharmony_ci return; 5648c2ecf20Sopenharmony_ci } 5658c2ecf20Sopenharmony_ci 5668c2ecf20Sopenharmony_ci kmem_cache_free(cache, p); 5678c2ecf20Sopenharmony_ci KUNIT_EXPECT_KASAN_FAIL(test, kmem_cache_free(cache, p)); 5688c2ecf20Sopenharmony_ci kmem_cache_destroy(cache); 5698c2ecf20Sopenharmony_ci} 5708c2ecf20Sopenharmony_ci 5718c2ecf20Sopenharmony_cistatic void kmem_cache_invalid_free(struct kunit *test) 5728c2ecf20Sopenharmony_ci{ 5738c2ecf20Sopenharmony_ci char *p; 5748c2ecf20Sopenharmony_ci size_t size = 200; 5758c2ecf20Sopenharmony_ci struct kmem_cache *cache; 5768c2ecf20Sopenharmony_ci 5778c2ecf20Sopenharmony_ci cache = kmem_cache_create("test_cache", size, 0, SLAB_TYPESAFE_BY_RCU, 5788c2ecf20Sopenharmony_ci NULL); 5798c2ecf20Sopenharmony_ci KUNIT_ASSERT_NOT_ERR_OR_NULL(test, cache); 5808c2ecf20Sopenharmony_ci 5818c2ecf20Sopenharmony_ci p = kmem_cache_alloc(cache, GFP_KERNEL); 5828c2ecf20Sopenharmony_ci if (!p) { 5838c2ecf20Sopenharmony_ci kunit_err(test, "Allocation failed: %s\n", __func__); 5848c2ecf20Sopenharmony_ci kmem_cache_destroy(cache); 5858c2ecf20Sopenharmony_ci return; 5868c2ecf20Sopenharmony_ci } 5878c2ecf20Sopenharmony_ci 5888c2ecf20Sopenharmony_ci /* Trigger invalid free, the object doesn't get freed */ 5898c2ecf20Sopenharmony_ci KUNIT_EXPECT_KASAN_FAIL(test, kmem_cache_free(cache, p + 1)); 5908c2ecf20Sopenharmony_ci 5918c2ecf20Sopenharmony_ci /* 5928c2ecf20Sopenharmony_ci * Properly free the object to prevent the "Objects remaining in 5938c2ecf20Sopenharmony_ci * test_cache on __kmem_cache_shutdown" BUG failure. 5948c2ecf20Sopenharmony_ci */ 5958c2ecf20Sopenharmony_ci kmem_cache_free(cache, p); 5968c2ecf20Sopenharmony_ci 5978c2ecf20Sopenharmony_ci kmem_cache_destroy(cache); 5988c2ecf20Sopenharmony_ci} 5998c2ecf20Sopenharmony_ci 6008c2ecf20Sopenharmony_cistatic void kasan_memchr(struct kunit *test) 6018c2ecf20Sopenharmony_ci{ 6028c2ecf20Sopenharmony_ci char *ptr; 6038c2ecf20Sopenharmony_ci size_t size = 24; 6048c2ecf20Sopenharmony_ci 6058c2ecf20Sopenharmony_ci /* See https://bugzilla.kernel.org/show_bug.cgi?id=206337 */ 6068c2ecf20Sopenharmony_ci if (IS_ENABLED(CONFIG_AMD_MEM_ENCRYPT)) { 6078c2ecf20Sopenharmony_ci kunit_info(test, 6088c2ecf20Sopenharmony_ci "str* functions are not instrumented with CONFIG_AMD_MEM_ENCRYPT"); 6098c2ecf20Sopenharmony_ci return; 6108c2ecf20Sopenharmony_ci } 6118c2ecf20Sopenharmony_ci 6128c2ecf20Sopenharmony_ci if (OOB_TAG_OFF) 6138c2ecf20Sopenharmony_ci size = round_up(size, OOB_TAG_OFF); 6148c2ecf20Sopenharmony_ci 6158c2ecf20Sopenharmony_ci ptr = kmalloc(size, GFP_KERNEL | __GFP_ZERO); 6168c2ecf20Sopenharmony_ci KUNIT_ASSERT_NOT_ERR_OR_NULL(test, ptr); 6178c2ecf20Sopenharmony_ci 6188c2ecf20Sopenharmony_ci KUNIT_EXPECT_KASAN_FAIL(test, 6198c2ecf20Sopenharmony_ci kasan_ptr_result = memchr(ptr, '1', size + 1)); 6208c2ecf20Sopenharmony_ci 6218c2ecf20Sopenharmony_ci kfree(ptr); 6228c2ecf20Sopenharmony_ci} 6238c2ecf20Sopenharmony_ci 6248c2ecf20Sopenharmony_cistatic void kasan_memcmp(struct kunit *test) 6258c2ecf20Sopenharmony_ci{ 6268c2ecf20Sopenharmony_ci char *ptr; 6278c2ecf20Sopenharmony_ci size_t size = 24; 6288c2ecf20Sopenharmony_ci int arr[9]; 6298c2ecf20Sopenharmony_ci 6308c2ecf20Sopenharmony_ci /* See https://bugzilla.kernel.org/show_bug.cgi?id=206337 */ 6318c2ecf20Sopenharmony_ci if (IS_ENABLED(CONFIG_AMD_MEM_ENCRYPT)) { 6328c2ecf20Sopenharmony_ci kunit_info(test, 6338c2ecf20Sopenharmony_ci "str* functions are not instrumented with CONFIG_AMD_MEM_ENCRYPT"); 6348c2ecf20Sopenharmony_ci return; 6358c2ecf20Sopenharmony_ci } 6368c2ecf20Sopenharmony_ci 6378c2ecf20Sopenharmony_ci if (OOB_TAG_OFF) 6388c2ecf20Sopenharmony_ci size = round_up(size, OOB_TAG_OFF); 6398c2ecf20Sopenharmony_ci 6408c2ecf20Sopenharmony_ci ptr = kmalloc(size, GFP_KERNEL | __GFP_ZERO); 6418c2ecf20Sopenharmony_ci KUNIT_ASSERT_NOT_ERR_OR_NULL(test, ptr); 6428c2ecf20Sopenharmony_ci memset(arr, 0, sizeof(arr)); 6438c2ecf20Sopenharmony_ci 6448c2ecf20Sopenharmony_ci KUNIT_EXPECT_KASAN_FAIL(test, 6458c2ecf20Sopenharmony_ci kasan_int_result = memcmp(ptr, arr, size+1)); 6468c2ecf20Sopenharmony_ci kfree(ptr); 6478c2ecf20Sopenharmony_ci} 6488c2ecf20Sopenharmony_ci 6498c2ecf20Sopenharmony_cistatic void kasan_strings(struct kunit *test) 6508c2ecf20Sopenharmony_ci{ 6518c2ecf20Sopenharmony_ci char *ptr; 6528c2ecf20Sopenharmony_ci size_t size = 24; 6538c2ecf20Sopenharmony_ci 6548c2ecf20Sopenharmony_ci /* See https://bugzilla.kernel.org/show_bug.cgi?id=206337 */ 6558c2ecf20Sopenharmony_ci if (IS_ENABLED(CONFIG_AMD_MEM_ENCRYPT)) { 6568c2ecf20Sopenharmony_ci kunit_info(test, 6578c2ecf20Sopenharmony_ci "str* functions are not instrumented with CONFIG_AMD_MEM_ENCRYPT"); 6588c2ecf20Sopenharmony_ci return; 6598c2ecf20Sopenharmony_ci } 6608c2ecf20Sopenharmony_ci 6618c2ecf20Sopenharmony_ci ptr = kmalloc(size, GFP_KERNEL | __GFP_ZERO); 6628c2ecf20Sopenharmony_ci KUNIT_ASSERT_NOT_ERR_OR_NULL(test, ptr); 6638c2ecf20Sopenharmony_ci 6648c2ecf20Sopenharmony_ci kfree(ptr); 6658c2ecf20Sopenharmony_ci 6668c2ecf20Sopenharmony_ci /* 6678c2ecf20Sopenharmony_ci * Try to cause only 1 invalid access (less spam in dmesg). 6688c2ecf20Sopenharmony_ci * For that we need ptr to point to zeroed byte. 6698c2ecf20Sopenharmony_ci * Skip metadata that could be stored in freed object so ptr 6708c2ecf20Sopenharmony_ci * will likely point to zeroed byte. 6718c2ecf20Sopenharmony_ci */ 6728c2ecf20Sopenharmony_ci ptr += 16; 6738c2ecf20Sopenharmony_ci KUNIT_EXPECT_KASAN_FAIL(test, kasan_ptr_result = strchr(ptr, '1')); 6748c2ecf20Sopenharmony_ci 6758c2ecf20Sopenharmony_ci KUNIT_EXPECT_KASAN_FAIL(test, kasan_ptr_result = strrchr(ptr, '1')); 6768c2ecf20Sopenharmony_ci 6778c2ecf20Sopenharmony_ci KUNIT_EXPECT_KASAN_FAIL(test, kasan_int_result = strcmp(ptr, "2")); 6788c2ecf20Sopenharmony_ci 6798c2ecf20Sopenharmony_ci KUNIT_EXPECT_KASAN_FAIL(test, kasan_int_result = strncmp(ptr, "2", 1)); 6808c2ecf20Sopenharmony_ci 6818c2ecf20Sopenharmony_ci KUNIT_EXPECT_KASAN_FAIL(test, kasan_int_result = strlen(ptr)); 6828c2ecf20Sopenharmony_ci 6838c2ecf20Sopenharmony_ci KUNIT_EXPECT_KASAN_FAIL(test, kasan_int_result = strnlen(ptr, 1)); 6848c2ecf20Sopenharmony_ci} 6858c2ecf20Sopenharmony_ci 6868c2ecf20Sopenharmony_cistatic void kasan_bitops_modify(struct kunit *test, int nr, void *addr) 6878c2ecf20Sopenharmony_ci{ 6888c2ecf20Sopenharmony_ci KUNIT_EXPECT_KASAN_FAIL(test, set_bit(nr, addr)); 6898c2ecf20Sopenharmony_ci KUNIT_EXPECT_KASAN_FAIL(test, __set_bit(nr, addr)); 6908c2ecf20Sopenharmony_ci KUNIT_EXPECT_KASAN_FAIL(test, clear_bit(nr, addr)); 6918c2ecf20Sopenharmony_ci KUNIT_EXPECT_KASAN_FAIL(test, __clear_bit(nr, addr)); 6928c2ecf20Sopenharmony_ci KUNIT_EXPECT_KASAN_FAIL(test, clear_bit_unlock(nr, addr)); 6938c2ecf20Sopenharmony_ci KUNIT_EXPECT_KASAN_FAIL(test, __clear_bit_unlock(nr, addr)); 6948c2ecf20Sopenharmony_ci KUNIT_EXPECT_KASAN_FAIL(test, change_bit(nr, addr)); 6958c2ecf20Sopenharmony_ci KUNIT_EXPECT_KASAN_FAIL(test, __change_bit(nr, addr)); 6968c2ecf20Sopenharmony_ci} 6978c2ecf20Sopenharmony_ci 6988c2ecf20Sopenharmony_cistatic void kasan_bitops_test_and_modify(struct kunit *test, int nr, void *addr) 6998c2ecf20Sopenharmony_ci{ 7008c2ecf20Sopenharmony_ci KUNIT_EXPECT_KASAN_FAIL(test, test_and_set_bit(nr, addr)); 7018c2ecf20Sopenharmony_ci KUNIT_EXPECT_KASAN_FAIL(test, __test_and_set_bit(nr, addr)); 7028c2ecf20Sopenharmony_ci KUNIT_EXPECT_KASAN_FAIL(test, test_and_set_bit_lock(nr, addr)); 7038c2ecf20Sopenharmony_ci KUNIT_EXPECT_KASAN_FAIL(test, test_and_clear_bit(nr, addr)); 7048c2ecf20Sopenharmony_ci KUNIT_EXPECT_KASAN_FAIL(test, __test_and_clear_bit(nr, addr)); 7058c2ecf20Sopenharmony_ci KUNIT_EXPECT_KASAN_FAIL(test, test_and_change_bit(nr, addr)); 7068c2ecf20Sopenharmony_ci KUNIT_EXPECT_KASAN_FAIL(test, __test_and_change_bit(nr, addr)); 7078c2ecf20Sopenharmony_ci KUNIT_EXPECT_KASAN_FAIL(test, kasan_int_result = test_bit(nr, addr)); 7088c2ecf20Sopenharmony_ci 7098c2ecf20Sopenharmony_ci#if defined(clear_bit_unlock_is_negative_byte) 7108c2ecf20Sopenharmony_ci KUNIT_EXPECT_KASAN_FAIL(test, kasan_int_result = 7118c2ecf20Sopenharmony_ci clear_bit_unlock_is_negative_byte(nr, addr)); 7128c2ecf20Sopenharmony_ci#endif 7138c2ecf20Sopenharmony_ci} 7148c2ecf20Sopenharmony_ci 7158c2ecf20Sopenharmony_cistatic void kasan_bitops_generic(struct kunit *test) 7168c2ecf20Sopenharmony_ci{ 7178c2ecf20Sopenharmony_ci long *bits; 7188c2ecf20Sopenharmony_ci 7198c2ecf20Sopenharmony_ci /* This test is specifically crafted for the generic mode. */ 7208c2ecf20Sopenharmony_ci if (!IS_ENABLED(CONFIG_KASAN_GENERIC)) { 7218c2ecf20Sopenharmony_ci kunit_info(test, "CONFIG_KASAN_GENERIC required\n"); 7228c2ecf20Sopenharmony_ci return; 7238c2ecf20Sopenharmony_ci } 7248c2ecf20Sopenharmony_ci 7258c2ecf20Sopenharmony_ci /* 7268c2ecf20Sopenharmony_ci * Allocate 1 more byte, which causes kzalloc to round up to 16-bytes; 7278c2ecf20Sopenharmony_ci * this way we do not actually corrupt other memory. 7288c2ecf20Sopenharmony_ci */ 7298c2ecf20Sopenharmony_ci bits = kzalloc(sizeof(*bits) + 1, GFP_KERNEL); 7308c2ecf20Sopenharmony_ci KUNIT_ASSERT_NOT_ERR_OR_NULL(test, bits); 7318c2ecf20Sopenharmony_ci 7328c2ecf20Sopenharmony_ci /* 7338c2ecf20Sopenharmony_ci * Below calls try to access bit within allocated memory; however, the 7348c2ecf20Sopenharmony_ci * below accesses are still out-of-bounds, since bitops are defined to 7358c2ecf20Sopenharmony_ci * operate on the whole long the bit is in. 7368c2ecf20Sopenharmony_ci */ 7378c2ecf20Sopenharmony_ci kasan_bitops_modify(test, BITS_PER_LONG, bits); 7388c2ecf20Sopenharmony_ci 7398c2ecf20Sopenharmony_ci /* 7408c2ecf20Sopenharmony_ci * Below calls try to access bit beyond allocated memory. 7418c2ecf20Sopenharmony_ci */ 7428c2ecf20Sopenharmony_ci kasan_bitops_test_and_modify(test, BITS_PER_LONG + BITS_PER_BYTE, bits); 7438c2ecf20Sopenharmony_ci 7448c2ecf20Sopenharmony_ci kfree(bits); 7458c2ecf20Sopenharmony_ci} 7468c2ecf20Sopenharmony_ci 7478c2ecf20Sopenharmony_cistatic void kasan_bitops_tags(struct kunit *test) 7488c2ecf20Sopenharmony_ci{ 7498c2ecf20Sopenharmony_ci long *bits; 7508c2ecf20Sopenharmony_ci 7518c2ecf20Sopenharmony_ci /* This test is specifically crafted for the tag-based mode. */ 7528c2ecf20Sopenharmony_ci if (IS_ENABLED(CONFIG_KASAN_GENERIC)) { 7538c2ecf20Sopenharmony_ci kunit_info(test, "CONFIG_KASAN_SW_TAGS required\n"); 7548c2ecf20Sopenharmony_ci return; 7558c2ecf20Sopenharmony_ci } 7568c2ecf20Sopenharmony_ci 7578c2ecf20Sopenharmony_ci /* kmalloc-64 cache will be used and the last 16 bytes will be the redzone. */ 7588c2ecf20Sopenharmony_ci bits = kzalloc(48, GFP_KERNEL); 7598c2ecf20Sopenharmony_ci KUNIT_ASSERT_NOT_ERR_OR_NULL(test, bits); 7608c2ecf20Sopenharmony_ci 7618c2ecf20Sopenharmony_ci /* Do the accesses past the 48 allocated bytes, but within the redone. */ 7628c2ecf20Sopenharmony_ci kasan_bitops_modify(test, BITS_PER_LONG, (void *)bits + 48); 7638c2ecf20Sopenharmony_ci kasan_bitops_test_and_modify(test, BITS_PER_LONG + BITS_PER_BYTE, (void *)bits + 48); 7648c2ecf20Sopenharmony_ci 7658c2ecf20Sopenharmony_ci kfree(bits); 7668c2ecf20Sopenharmony_ci} 7678c2ecf20Sopenharmony_ci 7688c2ecf20Sopenharmony_cistatic void kmalloc_double_kzfree(struct kunit *test) 7698c2ecf20Sopenharmony_ci{ 7708c2ecf20Sopenharmony_ci char *ptr; 7718c2ecf20Sopenharmony_ci size_t size = 16; 7728c2ecf20Sopenharmony_ci 7738c2ecf20Sopenharmony_ci ptr = kmalloc(size, GFP_KERNEL); 7748c2ecf20Sopenharmony_ci KUNIT_ASSERT_NOT_ERR_OR_NULL(test, ptr); 7758c2ecf20Sopenharmony_ci 7768c2ecf20Sopenharmony_ci kfree_sensitive(ptr); 7778c2ecf20Sopenharmony_ci KUNIT_EXPECT_KASAN_FAIL(test, kfree_sensitive(ptr)); 7788c2ecf20Sopenharmony_ci} 7798c2ecf20Sopenharmony_ci 7808c2ecf20Sopenharmony_cistatic void vmalloc_oob(struct kunit *test) 7818c2ecf20Sopenharmony_ci{ 7828c2ecf20Sopenharmony_ci void *area; 7838c2ecf20Sopenharmony_ci 7848c2ecf20Sopenharmony_ci if (!IS_ENABLED(CONFIG_KASAN_VMALLOC)) { 7858c2ecf20Sopenharmony_ci kunit_info(test, "CONFIG_KASAN_VMALLOC is not enabled."); 7868c2ecf20Sopenharmony_ci return; 7878c2ecf20Sopenharmony_ci } 7888c2ecf20Sopenharmony_ci 7898c2ecf20Sopenharmony_ci /* 7908c2ecf20Sopenharmony_ci * We have to be careful not to hit the guard page. 7918c2ecf20Sopenharmony_ci * The MMU will catch that and crash us. 7928c2ecf20Sopenharmony_ci */ 7938c2ecf20Sopenharmony_ci area = vmalloc(3000); 7948c2ecf20Sopenharmony_ci KUNIT_ASSERT_NOT_ERR_OR_NULL(test, area); 7958c2ecf20Sopenharmony_ci 7968c2ecf20Sopenharmony_ci KUNIT_EXPECT_KASAN_FAIL(test, ((volatile char *)area)[3100]); 7978c2ecf20Sopenharmony_ci vfree(area); 7988c2ecf20Sopenharmony_ci} 7998c2ecf20Sopenharmony_ci 8008c2ecf20Sopenharmony_cistatic struct kunit_case kasan_kunit_test_cases[] = { 8018c2ecf20Sopenharmony_ci KUNIT_CASE(kmalloc_oob_right), 8028c2ecf20Sopenharmony_ci KUNIT_CASE(kmalloc_oob_left), 8038c2ecf20Sopenharmony_ci KUNIT_CASE(kmalloc_node_oob_right), 8048c2ecf20Sopenharmony_ci KUNIT_CASE(kmalloc_pagealloc_oob_right), 8058c2ecf20Sopenharmony_ci KUNIT_CASE(kmalloc_pagealloc_uaf), 8068c2ecf20Sopenharmony_ci KUNIT_CASE(kmalloc_pagealloc_invalid_free), 8078c2ecf20Sopenharmony_ci KUNIT_CASE(kmalloc_large_oob_right), 8088c2ecf20Sopenharmony_ci KUNIT_CASE(kmalloc_oob_krealloc_more), 8098c2ecf20Sopenharmony_ci KUNIT_CASE(kmalloc_oob_krealloc_less), 8108c2ecf20Sopenharmony_ci KUNIT_CASE(kmalloc_oob_16), 8118c2ecf20Sopenharmony_ci KUNIT_CASE(kmalloc_uaf_16), 8128c2ecf20Sopenharmony_ci KUNIT_CASE(kmalloc_oob_in_memset), 8138c2ecf20Sopenharmony_ci KUNIT_CASE(kmalloc_oob_memset_2), 8148c2ecf20Sopenharmony_ci KUNIT_CASE(kmalloc_oob_memset_4), 8158c2ecf20Sopenharmony_ci KUNIT_CASE(kmalloc_oob_memset_8), 8168c2ecf20Sopenharmony_ci KUNIT_CASE(kmalloc_oob_memset_16), 8178c2ecf20Sopenharmony_ci KUNIT_CASE(kmalloc_memmove_invalid_size), 8188c2ecf20Sopenharmony_ci KUNIT_CASE(kmalloc_uaf), 8198c2ecf20Sopenharmony_ci KUNIT_CASE(kmalloc_uaf_memset), 8208c2ecf20Sopenharmony_ci KUNIT_CASE(kmalloc_uaf2), 8218c2ecf20Sopenharmony_ci KUNIT_CASE(kfree_via_page), 8228c2ecf20Sopenharmony_ci KUNIT_CASE(kfree_via_phys), 8238c2ecf20Sopenharmony_ci KUNIT_CASE(kmem_cache_oob), 8248c2ecf20Sopenharmony_ci KUNIT_CASE(memcg_accounted_kmem_cache), 8258c2ecf20Sopenharmony_ci KUNIT_CASE(kasan_global_oob), 8268c2ecf20Sopenharmony_ci KUNIT_CASE(kasan_stack_oob), 8278c2ecf20Sopenharmony_ci KUNIT_CASE(kasan_alloca_oob_left), 8288c2ecf20Sopenharmony_ci KUNIT_CASE(kasan_alloca_oob_right), 8298c2ecf20Sopenharmony_ci KUNIT_CASE(ksize_unpoisons_memory), 8308c2ecf20Sopenharmony_ci KUNIT_CASE(kmem_cache_double_free), 8318c2ecf20Sopenharmony_ci KUNIT_CASE(kmem_cache_invalid_free), 8328c2ecf20Sopenharmony_ci KUNIT_CASE(kasan_memchr), 8338c2ecf20Sopenharmony_ci KUNIT_CASE(kasan_memcmp), 8348c2ecf20Sopenharmony_ci KUNIT_CASE(kasan_strings), 8358c2ecf20Sopenharmony_ci KUNIT_CASE(kasan_bitops_generic), 8368c2ecf20Sopenharmony_ci KUNIT_CASE(kasan_bitops_tags), 8378c2ecf20Sopenharmony_ci KUNIT_CASE(kmalloc_double_kzfree), 8388c2ecf20Sopenharmony_ci KUNIT_CASE(vmalloc_oob), 8398c2ecf20Sopenharmony_ci {} 8408c2ecf20Sopenharmony_ci}; 8418c2ecf20Sopenharmony_ci 8428c2ecf20Sopenharmony_cistatic struct kunit_suite kasan_kunit_test_suite = { 8438c2ecf20Sopenharmony_ci .name = "kasan", 8448c2ecf20Sopenharmony_ci .init = kasan_test_init, 8458c2ecf20Sopenharmony_ci .test_cases = kasan_kunit_test_cases, 8468c2ecf20Sopenharmony_ci .exit = kasan_test_exit, 8478c2ecf20Sopenharmony_ci}; 8488c2ecf20Sopenharmony_ci 8498c2ecf20Sopenharmony_cikunit_test_suite(kasan_kunit_test_suite); 8508c2ecf20Sopenharmony_ci 8518c2ecf20Sopenharmony_ciMODULE_LICENSE("GPL"); 852