From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from kanga.kvack.org (kanga.kvack.org [205.233.56.17]) by smtp.lore.kernel.org (Postfix) with ESMTP id 2FD7DC4332F for ; Fri, 14 Jan 2022 22:05:01 +0000 (UTC) Received: by kanga.kvack.org (Postfix) id AB4D36B00CD; Fri, 14 Jan 2022 17:05:00 -0500 (EST) Received: by kanga.kvack.org (Postfix, from userid 40) id A638A6B00CF; Fri, 14 Jan 2022 17:05:00 -0500 (EST) X-Delivered-To: int-list-linux-mm@kvack.org Received: by kanga.kvack.org (Postfix, from userid 63042) id 9043D6B00D0; Fri, 14 Jan 2022 17:05:00 -0500 (EST) X-Delivered-To: linux-mm@kvack.org Received: from forelay.hostedemail.com (smtprelay0057.hostedemail.com [216.40.44.57]) by kanga.kvack.org (Postfix) with ESMTP id 7E4276B00CD for ; Fri, 14 Jan 2022 17:05:00 -0500 (EST) Received: from smtpin23.hostedemail.com (10.5.19.251.rfc1918.com [10.5.19.251]) by forelay05.hostedemail.com (Postfix) with ESMTP id 3F9381822D2B5 for ; Fri, 14 Jan 2022 22:05:00 +0000 (UTC) X-FDA: 79030273560.23.93C66F5 Received: from dfw.source.kernel.org (dfw.source.kernel.org [139.178.84.217]) by imf03.hostedemail.com (Postfix) with ESMTP id DC4C620003 for ; Fri, 14 Jan 2022 22:04:59 +0000 (UTC) Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by dfw.source.kernel.org (Postfix) with ESMTPS id 3A2F961FFA; Fri, 14 Jan 2022 22:04:59 +0000 (UTC) Received: by smtp.kernel.org (Postfix) with ESMTPSA id 2DBFEC36AE5; Fri, 14 Jan 2022 22:04:58 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linux-foundation.org; s=korg; t=1642197898; bh=wqBPSDc1Kr3I6HWzV5gdSwjzmr5IF5sRGfh2s8Cn7ug=; h=Date:From:To:Subject:In-Reply-To:From; b=OCQ65dIBNAsYsgKAGcLhEOZGgKUvl41UUivXn2bzS6w+abV+K6dTFTpQf2MpKDDIf xNmBy+tBflDpHKOxer+YWOi4j6gjT9a+bU0MzaCzRKYFJv3glj2dCam+qhk12C3wnQ oDAnoc1XYrn6buudtMuLXirUFMMFQyh4Iu3PBPpE= Date: Fri, 14 Jan 2022 14:04:57 -0800 From: Andrew Morton To: akpm@linux-foundation.org, andreyknvl@gmail.com, cl@linux.com, dvyukov@google.com, elver@google.com, glider@google.com, iamjoonsoo.kim@lge.com, linux-mm@kvack.org, mm-commits@vger.kernel.org, penberg@kernel.org, rientjes@google.com, ryabinin.a.a@gmail.com, torvalds@linux-foundation.org, vbabka@suse.cz Subject: [patch 038/146] kasan: test: add test case for double-kmem_cache_destroy() Message-ID: <20220114220457.lZG7Lp8OI%akpm@linux-foundation.org> In-Reply-To: <20220114140222.6b14f0061194d3200000c52d@linux-foundation.org> User-Agent: s-nail v14.8.16 X-Rspamd-Server: rspam10 X-Rspamd-Queue-Id: DC4C620003 X-Stat-Signature: xepkfs4kw16gkgcygkgxw69k45hxnoni Authentication-Results: imf03.hostedemail.com; dkim=pass header.d=linux-foundation.org header.s=korg header.b=OCQ65dIB; dmarc=none; spf=pass (imf03.hostedemail.com: domain of akpm@linux-foundation.org designates 139.178.84.217 as permitted sender) smtp.mailfrom=akpm@linux-foundation.org X-HE-Tag: 1642197899-610167 X-Bogosity: Ham, tests=bogofilter, spamicity=0.000000, version=1.2.4 Sender: owner-linux-mm@kvack.org Precedence: bulk X-Loop: owner-majordomo@kvack.org List-ID: From: Marco Elver Subject: kasan: test: add test case for double-kmem_cache_destroy() Add a test case for double-kmem_cache_destroy() detection. Link: https://lkml.kernel.org/r/20211119142219.1519617-2-elver@google.com Signed-off-by: Marco Elver Reviewed-by: Andrey Konovalov Cc: Andrey Ryabinin Cc: Alexander Potapenko Cc: Dmitry Vyukov Cc: Christoph Lameter Cc: Pekka Enberg Cc: David Rientjes Cc: Joonsoo Kim Cc: Vlastimil Babka Signed-off-by: Andrew Morton --- lib/test_kasan.c | 11 +++++++++++ 1 file changed, 11 insertions(+) --- a/lib/test_kasan.c~kasan-test-add-test-case-for-double-kmem_cache_destroy +++ a/lib/test_kasan.c @@ -866,6 +866,16 @@ static void kmem_cache_invalid_free(stru kmem_cache_destroy(cache); } +static void kmem_cache_double_destroy(struct kunit *test) +{ + struct kmem_cache *cache; + + cache = kmem_cache_create("test_cache", 200, 0, 0, NULL); + KUNIT_ASSERT_NOT_ERR_OR_NULL(test, cache); + kmem_cache_destroy(cache); + KUNIT_EXPECT_KASAN_FAIL(test, kmem_cache_destroy(cache)); +} + static void kasan_memchr(struct kunit *test) { char *ptr; @@ -1185,6 +1195,7 @@ static struct kunit_case kasan_kunit_tes KUNIT_CASE(ksize_uaf), KUNIT_CASE(kmem_cache_double_free), KUNIT_CASE(kmem_cache_invalid_free), + KUNIT_CASE(kmem_cache_double_destroy), KUNIT_CASE(kasan_memchr), KUNIT_CASE(kasan_memcmp), KUNIT_CASE(kasan_strings), _