Skip to content

Commit

Permalink
kasan: check kasan_vmalloc_enabled in vmalloc tests
Browse files Browse the repository at this point in the history
Check that vmalloc poisoning is not disabled via command line when running
the vmalloc-related KASAN tests.  Skip the tests otherwise.

Link: https://lkml.kernel.org/r/954456e50ac98519910c3e24a479a18eae62f8dd.1703188911.git.andreyknvl@google.com
Signed-off-by: Andrey Konovalov <[email protected]>
Cc: Alexander Potapenko <[email protected]>
Cc: Andrey Ryabinin <[email protected]>
Cc: Dmitry Vyukov <[email protected]>
Cc: Marco Elver <[email protected]>
Signed-off-by: Andrew Morton <[email protected]>
  • Loading branch information
xairy authored and akpm00 committed Dec 29, 2023
1 parent 58ee788 commit 14c99b9
Show file tree
Hide file tree
Showing 3 changed files with 16 additions and 1 deletion.
1 change: 1 addition & 0 deletions mm/kasan/hw_tags.c
Original file line number Diff line number Diff line change
Expand Up @@ -62,6 +62,7 @@ DEFINE_STATIC_KEY_TRUE(kasan_flag_vmalloc);
#else
DEFINE_STATIC_KEY_FALSE(kasan_flag_vmalloc);
#endif
EXPORT_SYMBOL_GPL(kasan_flag_vmalloc);

#define PAGE_ALLOC_SAMPLE_DEFAULT 1
#define PAGE_ALLOC_SAMPLE_ORDER_DEFAULT 3
Expand Down
5 changes: 5 additions & 0 deletions mm/kasan/kasan.h
Original file line number Diff line number Diff line change
Expand Up @@ -83,6 +83,11 @@ static inline bool kasan_sample_page_alloc(unsigned int order)

#else /* CONFIG_KASAN_HW_TAGS */

static inline bool kasan_vmalloc_enabled(void)
{
return IS_ENABLED(CONFIG_KASAN_VMALLOC);
}

static inline bool kasan_async_fault_possible(void)
{
return false;
Expand Down
11 changes: 10 additions & 1 deletion mm/kasan/kasan_test.c
Original file line number Diff line number Diff line change
Expand Up @@ -1552,6 +1552,9 @@ static void vmalloc_helpers_tags(struct kunit *test)

KASAN_TEST_NEEDS_CONFIG_ON(test, CONFIG_KASAN_VMALLOC);

if (!kasan_vmalloc_enabled())
kunit_skip(test, "Test requires kasan.vmalloc=on");

ptr = vmalloc(PAGE_SIZE);
KUNIT_ASSERT_NOT_ERR_OR_NULL(test, ptr);

Expand Down Expand Up @@ -1586,6 +1589,9 @@ static void vmalloc_oob(struct kunit *test)

KASAN_TEST_NEEDS_CONFIG_ON(test, CONFIG_KASAN_VMALLOC);

if (!kasan_vmalloc_enabled())
kunit_skip(test, "Test requires kasan.vmalloc=on");

v_ptr = vmalloc(size);
KUNIT_ASSERT_NOT_ERR_OR_NULL(test, v_ptr);

Expand Down Expand Up @@ -1639,6 +1645,9 @@ static void vmap_tags(struct kunit *test)

KASAN_TEST_NEEDS_CONFIG_ON(test, CONFIG_KASAN_VMALLOC);

if (!kasan_vmalloc_enabled())
kunit_skip(test, "Test requires kasan.vmalloc=on");

p_page = alloc_pages(GFP_KERNEL, 1);
KUNIT_ASSERT_NOT_ERR_OR_NULL(test, p_page);
p_ptr = page_address(p_page);
Expand Down Expand Up @@ -1757,7 +1766,7 @@ static void match_all_not_assigned(struct kunit *test)
free_pages((unsigned long)ptr, order);
}

if (!IS_ENABLED(CONFIG_KASAN_VMALLOC))
if (!kasan_vmalloc_enabled())
return;

for (i = 0; i < 256; i++) {
Expand Down

0 comments on commit 14c99b9

Please sign in to comment.