Linux Audio

Check our new training course

Yocto distribution development and maintenance

Need a Yocto distribution for your embedded project?
Loading...
v3.1
  1/*
  2 * Kprobe module for testing crash dumps
  3 *
  4 * This program is free software; you can redistribute it and/or modify
  5 * it under the terms of the GNU General Public License as published by
  6 * the Free Software Foundation; either version 2 of the License, or
  7 * (at your option) any later version.
  8 *
  9 * This program is distributed in the hope that it will be useful,
 10 * but WITHOUT ANY WARRANTY; without even the implied warranty of
 11 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
 12 * GNU General Public License for more details.
 13 *
 14 * You should have received a copy of the GNU General Public License
 15 * along with this program; if not, write to the Free Software
 16 * Foundation, Inc., 59 Temple Place - Suite 330, Boston, MA 02111-1307, USA.
 17 *
 18 * Copyright (C) IBM Corporation, 2006
 19 *
 20 * Author: Ankita Garg <ankita@in.ibm.com>
 21 *
 22 * This module induces system failures at predefined crashpoints to
 23 * evaluate the reliability of crash dumps obtained using different dumping
 24 * solutions.
 25 *
 26 * It is adapted from the Linux Kernel Dump Test Tool by
 27 * Fernando Luis Vazquez Cao <http://lkdtt.sourceforge.net>
 28 *
 29 * Debugfs support added by Simon Kagstrom <simon.kagstrom@netinsight.net>
 30 *
 31 * See Documentation/fault-injection/provoke-crashes.txt for instructions
 32 */
 
 33
 34#include <linux/kernel.h>
 35#include <linux/fs.h>
 36#include <linux/module.h>
 37#include <linux/buffer_head.h>
 38#include <linux/kprobes.h>
 39#include <linux/list.h>
 40#include <linux/init.h>
 41#include <linux/interrupt.h>
 42#include <linux/hrtimer.h>
 43#include <linux/slab.h>
 44#include <scsi/scsi_cmnd.h>
 45#include <linux/debugfs.h>
 
 
 
 46
 47#ifdef CONFIG_IDE
 48#include <linux/ide.h>
 49#endif
 50
 
 
 
 
 
 
 
 
 
 
 
 
 51#define DEFAULT_COUNT 10
 52#define REC_NUM_DEFAULT 10
 53
 54enum cname {
 55	CN_INVALID,
 56	CN_INT_HARDWARE_ENTRY,
 57	CN_INT_HW_IRQ_EN,
 58	CN_INT_TASKLET_ENTRY,
 59	CN_FS_DEVRW,
 60	CN_MEM_SWAPOUT,
 61	CN_TIMERADD,
 62	CN_SCSI_DISPATCH_CMD,
 63	CN_IDE_CORE_CP,
 64	CN_DIRECT,
 65};
 66
 67enum ctype {
 68	CT_NONE,
 69	CT_PANIC,
 70	CT_BUG,
 
 71	CT_EXCEPTION,
 72	CT_LOOP,
 73	CT_OVERFLOW,
 74	CT_CORRUPT_STACK,
 75	CT_UNALIGNED_LOAD_STORE_WRITE,
 76	CT_OVERWRITE_ALLOCATION,
 77	CT_WRITE_AFTER_FREE,
 
 
 
 78	CT_SOFTLOCKUP,
 79	CT_HARDLOCKUP,
 
 80	CT_HUNG_TASK,
 
 
 
 
 
 
 
 
 
 
 81};
 82
 83static char* cp_name[] = {
 84	"INT_HARDWARE_ENTRY",
 85	"INT_HW_IRQ_EN",
 86	"INT_TASKLET_ENTRY",
 87	"FS_DEVRW",
 88	"MEM_SWAPOUT",
 89	"TIMERADD",
 90	"SCSI_DISPATCH_CMD",
 91	"IDE_CORE_CP",
 92	"DIRECT",
 93};
 94
 95static char* cp_type[] = {
 96	"PANIC",
 97	"BUG",
 
 98	"EXCEPTION",
 99	"LOOP",
100	"OVERFLOW",
101	"CORRUPT_STACK",
102	"UNALIGNED_LOAD_STORE_WRITE",
103	"OVERWRITE_ALLOCATION",
104	"WRITE_AFTER_FREE",
 
 
 
105	"SOFTLOCKUP",
106	"HARDLOCKUP",
 
107	"HUNG_TASK",
 
 
 
 
 
 
 
 
 
 
108};
109
110static struct jprobe lkdtm;
111
112static int lkdtm_parse_commandline(void);
113static void lkdtm_handler(void);
114
115static char* cpoint_name;
116static char* cpoint_type;
117static int cpoint_count = DEFAULT_COUNT;
118static int recur_count = REC_NUM_DEFAULT;
119
120static enum cname cpoint = CN_INVALID;
121static enum ctype cptype = CT_NONE;
122static int count = DEFAULT_COUNT;
123static DEFINE_SPINLOCK(count_lock);
 
 
 
 
 
 
124
125module_param(recur_count, int, 0644);
126MODULE_PARM_DESC(recur_count, " Recursion level for the stack overflow test, "\
127				 "default is 10");
128module_param(cpoint_name, charp, 0444);
129MODULE_PARM_DESC(cpoint_name, " Crash Point, where kernel is to be crashed");
130module_param(cpoint_type, charp, 0444);
131MODULE_PARM_DESC(cpoint_type, " Crash Point Type, action to be taken on "\
132				"hitting the crash point");
133module_param(cpoint_count, int, 0644);
134MODULE_PARM_DESC(cpoint_count, " Crash Point Count, number of times the "\
135				"crash point is to be hit to trigger action");
136
137static unsigned int jp_do_irq(unsigned int irq)
138{
139	lkdtm_handler();
140	jprobe_return();
141	return 0;
142}
143
144static irqreturn_t jp_handle_irq_event(unsigned int irq,
145				       struct irqaction *action)
146{
147	lkdtm_handler();
148	jprobe_return();
149	return 0;
150}
151
152static void jp_tasklet_action(struct softirq_action *a)
153{
154	lkdtm_handler();
155	jprobe_return();
156}
157
158static void jp_ll_rw_block(int rw, int nr, struct buffer_head *bhs[])
159{
160	lkdtm_handler();
161	jprobe_return();
162}
163
164struct scan_control;
165
166static unsigned long jp_shrink_inactive_list(unsigned long max_scan,
167					     struct zone *zone,
168					     struct scan_control *sc)
169{
170	lkdtm_handler();
171	jprobe_return();
172	return 0;
173}
174
175static int jp_hrtimer_start(struct hrtimer *timer, ktime_t tim,
176			    const enum hrtimer_mode mode)
177{
178	lkdtm_handler();
179	jprobe_return();
180	return 0;
181}
182
183static int jp_scsi_dispatch_cmd(struct scsi_cmnd *cmd)
184{
185	lkdtm_handler();
186	jprobe_return();
187	return 0;
188}
189
190#ifdef CONFIG_IDE
191int jp_generic_ide_ioctl(ide_drive_t *drive, struct file *file,
192			struct block_device *bdev, unsigned int cmd,
193			unsigned long arg)
194{
195	lkdtm_handler();
196	jprobe_return();
197	return 0;
198}
199#endif
200
201/* Return the crashpoint number or NONE if the name is invalid */
202static enum ctype parse_cp_type(const char *what, size_t count)
203{
204	int i;
205
206	for (i = 0; i < ARRAY_SIZE(cp_type); i++) {
207		if (!strcmp(what, cp_type[i]))
208			return i + 1;
209	}
210
211	return CT_NONE;
212}
213
214static const char *cp_type_to_str(enum ctype type)
215{
216	if (type == CT_NONE || type < 0 || type > ARRAY_SIZE(cp_type))
217		return "None";
218
219	return cp_type[type - 1];
220}
221
222static const char *cp_name_to_str(enum cname name)
223{
224	if (name == CN_INVALID || name < 0 || name > ARRAY_SIZE(cp_name))
225		return "INVALID";
226
227	return cp_name[name - 1];
228}
229
230
231static int lkdtm_parse_commandline(void)
232{
233	int i;
234	unsigned long flags;
235
236	if (cpoint_count < 1 || recur_count < 1)
237		return -EINVAL;
238
239	spin_lock_irqsave(&count_lock, flags);
240	count = cpoint_count;
241	spin_unlock_irqrestore(&count_lock, flags);
242
243	/* No special parameters */
244	if (!cpoint_type && !cpoint_name)
245		return 0;
246
247	/* Neither or both of these need to be set */
248	if (!cpoint_type || !cpoint_name)
249		return -EINVAL;
250
251	cptype = parse_cp_type(cpoint_type, strlen(cpoint_type));
252	if (cptype == CT_NONE)
253		return -EINVAL;
254
255	for (i = 0; i < ARRAY_SIZE(cp_name); i++) {
256		if (!strcmp(cpoint_name, cp_name[i])) {
257			cpoint = i + 1;
258			return 0;
259		}
260	}
261
262	/* Could not find a valid crash point */
263	return -EINVAL;
264}
265
266static int recursive_loop(int a)
267{
268	char buf[1024];
269
270	memset(buf,0xFF,1024);
271	recur_count--;
272	if (!recur_count)
273		return 0;
274	else
275        	return recursive_loop(a);
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
276}
277
278static void lkdtm_do_action(enum ctype which)
279{
280	switch (which) {
281	case CT_PANIC:
282		panic("dumptest");
283		break;
284	case CT_BUG:
285		BUG();
286		break;
 
 
 
287	case CT_EXCEPTION:
288		*((int *) 0) = 0;
289		break;
290	case CT_LOOP:
291		for (;;)
292			;
293		break;
294	case CT_OVERFLOW:
295		(void) recursive_loop(0);
296		break;
297	case CT_CORRUPT_STACK: {
298		volatile u32 data[8];
299		volatile u32 *p = data;
300
301		p[12] = 0x12345678;
302		break;
303	}
304	case CT_UNALIGNED_LOAD_STORE_WRITE: {
305		static u8 data[5] __attribute__((aligned(4))) = {1, 2,
306				3, 4, 5};
307		u32 *p;
308		u32 val = 0x12345678;
309
310		p = (u32 *)(data + 1);
311		if (*p == 0)
312			val = 0x87654321;
313		*p = val;
314		 break;
315	}
316	case CT_OVERWRITE_ALLOCATION: {
317		size_t len = 1020;
318		u32 *data = kmalloc(len, GFP_KERNEL);
319
320		data[1024 / sizeof(u32)] = 0x12345678;
321		kfree(data);
322		break;
323	}
324	case CT_WRITE_AFTER_FREE: {
 
325		size_t len = 1024;
326		u32 *data = kmalloc(len, GFP_KERNEL);
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
327
328		kfree(data);
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
329		schedule();
330		memset(data, 0x78, len);
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
331		break;
332	}
333	case CT_SOFTLOCKUP:
334		preempt_disable();
335		for (;;)
336			cpu_relax();
337		break;
338	case CT_HARDLOCKUP:
339		local_irq_disable();
340		for (;;)
341			cpu_relax();
342		break;
 
 
 
 
 
 
343	case CT_HUNG_TASK:
344		set_current_state(TASK_UNINTERRUPTIBLE);
345		schedule();
346		break;
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
347	case CT_NONE:
348	default:
349		break;
350	}
351
352}
353
354static void lkdtm_handler(void)
355{
356	unsigned long flags;
 
357
358	spin_lock_irqsave(&count_lock, flags);
359	count--;
360	printk(KERN_INFO "lkdtm: Crash point %s of type %s hit, trigger in %d rounds\n",
361			cp_name_to_str(cpoint), cp_type_to_str(cptype), count);
362
363	if (count == 0) {
364		lkdtm_do_action(cptype);
365		count = cpoint_count;
366	}
367	spin_unlock_irqrestore(&count_lock, flags);
 
 
 
368}
369
370static int lkdtm_register_cpoint(enum cname which)
371{
372	int ret;
373
374	cpoint = CN_INVALID;
375	if (lkdtm.entry != NULL)
376		unregister_jprobe(&lkdtm);
377
378	switch (which) {
379	case CN_DIRECT:
380		lkdtm_do_action(cptype);
381		return 0;
382	case CN_INT_HARDWARE_ENTRY:
383		lkdtm.kp.symbol_name = "do_IRQ";
384		lkdtm.entry = (kprobe_opcode_t*) jp_do_irq;
385		break;
386	case CN_INT_HW_IRQ_EN:
387		lkdtm.kp.symbol_name = "handle_IRQ_event";
388		lkdtm.entry = (kprobe_opcode_t*) jp_handle_irq_event;
389		break;
390	case CN_INT_TASKLET_ENTRY:
391		lkdtm.kp.symbol_name = "tasklet_action";
392		lkdtm.entry = (kprobe_opcode_t*) jp_tasklet_action;
393		break;
394	case CN_FS_DEVRW:
395		lkdtm.kp.symbol_name = "ll_rw_block";
396		lkdtm.entry = (kprobe_opcode_t*) jp_ll_rw_block;
397		break;
398	case CN_MEM_SWAPOUT:
399		lkdtm.kp.symbol_name = "shrink_inactive_list";
400		lkdtm.entry = (kprobe_opcode_t*) jp_shrink_inactive_list;
401		break;
402	case CN_TIMERADD:
403		lkdtm.kp.symbol_name = "hrtimer_start";
404		lkdtm.entry = (kprobe_opcode_t*) jp_hrtimer_start;
405		break;
406	case CN_SCSI_DISPATCH_CMD:
407		lkdtm.kp.symbol_name = "scsi_dispatch_cmd";
408		lkdtm.entry = (kprobe_opcode_t*) jp_scsi_dispatch_cmd;
409		break;
410	case CN_IDE_CORE_CP:
411#ifdef CONFIG_IDE
412		lkdtm.kp.symbol_name = "generic_ide_ioctl";
413		lkdtm.entry = (kprobe_opcode_t*) jp_generic_ide_ioctl;
414#else
415		printk(KERN_INFO "lkdtm: Crash point not available\n");
416		return -EINVAL;
417#endif
418		break;
419	default:
420		printk(KERN_INFO "lkdtm: Invalid Crash Point\n");
421		return -EINVAL;
422	}
423
424	cpoint = which;
425	if ((ret = register_jprobe(&lkdtm)) < 0) {
426		printk(KERN_INFO "lkdtm: Couldn't register jprobe\n");
427		cpoint = CN_INVALID;
428	}
429
430	return ret;
431}
432
433static ssize_t do_register_entry(enum cname which, struct file *f,
434		const char __user *user_buf, size_t count, loff_t *off)
435{
436	char *buf;
437	int err;
438
439	if (count >= PAGE_SIZE)
440		return -EINVAL;
441
442	buf = (char *)__get_free_page(GFP_KERNEL);
443	if (!buf)
444		return -ENOMEM;
445	if (copy_from_user(buf, user_buf, count)) {
446		free_page((unsigned long) buf);
447		return -EFAULT;
448	}
449	/* NULL-terminate and remove enter */
450	buf[count] = '\0';
451	strim(buf);
452
453	cptype = parse_cp_type(buf, count);
454	free_page((unsigned long) buf);
455
456	if (cptype == CT_NONE)
457		return -EINVAL;
458
459	err = lkdtm_register_cpoint(which);
460	if (err < 0)
461		return err;
462
463	*off += count;
464
465	return count;
466}
467
468/* Generic read callback that just prints out the available crash types */
469static ssize_t lkdtm_debugfs_read(struct file *f, char __user *user_buf,
470		size_t count, loff_t *off)
471{
472	char *buf;
473	int i, n, out;
474
475	buf = (char *)__get_free_page(GFP_KERNEL);
 
 
476
477	n = snprintf(buf, PAGE_SIZE, "Available crash types:\n");
478	for (i = 0; i < ARRAY_SIZE(cp_type); i++)
479		n += snprintf(buf + n, PAGE_SIZE - n, "%s\n", cp_type[i]);
480	buf[n] = '\0';
481
482	out = simple_read_from_buffer(user_buf, count, off,
483				      buf, n);
484	free_page((unsigned long) buf);
485
486	return out;
487}
488
489static int lkdtm_debugfs_open(struct inode *inode, struct file *file)
490{
491	return 0;
492}
493
494
495static ssize_t int_hardware_entry(struct file *f, const char __user *buf,
496		size_t count, loff_t *off)
497{
498	return do_register_entry(CN_INT_HARDWARE_ENTRY, f, buf, count, off);
499}
500
501static ssize_t int_hw_irq_en(struct file *f, const char __user *buf,
502		size_t count, loff_t *off)
503{
504	return do_register_entry(CN_INT_HW_IRQ_EN, f, buf, count, off);
505}
506
507static ssize_t int_tasklet_entry(struct file *f, const char __user *buf,
508		size_t count, loff_t *off)
509{
510	return do_register_entry(CN_INT_TASKLET_ENTRY, f, buf, count, off);
511}
512
513static ssize_t fs_devrw_entry(struct file *f, const char __user *buf,
514		size_t count, loff_t *off)
515{
516	return do_register_entry(CN_FS_DEVRW, f, buf, count, off);
517}
518
519static ssize_t mem_swapout_entry(struct file *f, const char __user *buf,
520		size_t count, loff_t *off)
521{
522	return do_register_entry(CN_MEM_SWAPOUT, f, buf, count, off);
523}
524
525static ssize_t timeradd_entry(struct file *f, const char __user *buf,
526		size_t count, loff_t *off)
527{
528	return do_register_entry(CN_TIMERADD, f, buf, count, off);
529}
530
531static ssize_t scsi_dispatch_cmd_entry(struct file *f,
532		const char __user *buf, size_t count, loff_t *off)
533{
534	return do_register_entry(CN_SCSI_DISPATCH_CMD, f, buf, count, off);
535}
536
537static ssize_t ide_core_cp_entry(struct file *f, const char __user *buf,
538		size_t count, loff_t *off)
539{
540	return do_register_entry(CN_IDE_CORE_CP, f, buf, count, off);
541}
542
543/* Special entry to just crash directly. Available without KPROBEs */
544static ssize_t direct_entry(struct file *f, const char __user *user_buf,
545		size_t count, loff_t *off)
546{
547	enum ctype type;
548	char *buf;
549
550	if (count >= PAGE_SIZE)
551		return -EINVAL;
552	if (count < 1)
553		return -EINVAL;
554
555	buf = (char *)__get_free_page(GFP_KERNEL);
556	if (!buf)
557		return -ENOMEM;
558	if (copy_from_user(buf, user_buf, count)) {
559		free_page((unsigned long) buf);
560		return -EFAULT;
561	}
562	/* NULL-terminate and remove enter */
563	buf[count] = '\0';
564	strim(buf);
565
566	type = parse_cp_type(buf, count);
567	free_page((unsigned long) buf);
568	if (type == CT_NONE)
569		return -EINVAL;
570
571	printk(KERN_INFO "lkdtm: Performing direct entry %s\n",
572			cp_type_to_str(type));
573	lkdtm_do_action(type);
574	*off += count;
575
576	return count;
577}
578
579struct crash_entry {
580	const char *name;
581	const struct file_operations fops;
582};
583
584static const struct crash_entry crash_entries[] = {
585	{"DIRECT", {.read = lkdtm_debugfs_read,
586			.llseek = generic_file_llseek,
587			.open = lkdtm_debugfs_open,
588			.write = direct_entry} },
589	{"INT_HARDWARE_ENTRY", {.read = lkdtm_debugfs_read,
590			.llseek = generic_file_llseek,
591			.open = lkdtm_debugfs_open,
592			.write = int_hardware_entry} },
593	{"INT_HW_IRQ_EN", {.read = lkdtm_debugfs_read,
594			.llseek = generic_file_llseek,
595			.open = lkdtm_debugfs_open,
596			.write = int_hw_irq_en} },
597	{"INT_TASKLET_ENTRY", {.read = lkdtm_debugfs_read,
598			.llseek = generic_file_llseek,
599			.open = lkdtm_debugfs_open,
600			.write = int_tasklet_entry} },
601	{"FS_DEVRW", {.read = lkdtm_debugfs_read,
602			.llseek = generic_file_llseek,
603			.open = lkdtm_debugfs_open,
604			.write = fs_devrw_entry} },
605	{"MEM_SWAPOUT", {.read = lkdtm_debugfs_read,
606			.llseek = generic_file_llseek,
607			.open = lkdtm_debugfs_open,
608			.write = mem_swapout_entry} },
609	{"TIMERADD", {.read = lkdtm_debugfs_read,
610			.llseek = generic_file_llseek,
611			.open = lkdtm_debugfs_open,
612			.write = timeradd_entry} },
613	{"SCSI_DISPATCH_CMD", {.read = lkdtm_debugfs_read,
614			.llseek = generic_file_llseek,
615			.open = lkdtm_debugfs_open,
616			.write = scsi_dispatch_cmd_entry} },
617	{"IDE_CORE_CP",	{.read = lkdtm_debugfs_read,
618			.llseek = generic_file_llseek,
619			.open = lkdtm_debugfs_open,
620			.write = ide_core_cp_entry} },
621};
622
623static struct dentry *lkdtm_debugfs_root;
624
625static int __init lkdtm_module_init(void)
626{
627	int ret = -EINVAL;
628	int n_debugfs_entries = 1; /* Assume only the direct entry */
629	int i;
630
 
 
 
631	/* Register debugfs interface */
632	lkdtm_debugfs_root = debugfs_create_dir("provoke-crash", NULL);
633	if (!lkdtm_debugfs_root) {
634		printk(KERN_ERR "lkdtm: creating root dir failed\n");
635		return -ENODEV;
636	}
637
638#ifdef CONFIG_KPROBES
639	n_debugfs_entries = ARRAY_SIZE(crash_entries);
640#endif
641
642	for (i = 0; i < n_debugfs_entries; i++) {
643		const struct crash_entry *cur = &crash_entries[i];
644		struct dentry *de;
645
646		de = debugfs_create_file(cur->name, 0644, lkdtm_debugfs_root,
647				NULL, &cur->fops);
648		if (de == NULL) {
649			printk(KERN_ERR "lkdtm: could not create %s\n",
650					cur->name);
651			goto out_err;
652		}
653	}
654
655	if (lkdtm_parse_commandline() == -EINVAL) {
656		printk(KERN_INFO "lkdtm: Invalid command\n");
657		goto out_err;
658	}
659
660	if (cpoint != CN_INVALID && cptype != CT_NONE) {
661		ret = lkdtm_register_cpoint(cpoint);
662		if (ret < 0) {
663			printk(KERN_INFO "lkdtm: Invalid crash point %d\n",
664					cpoint);
665			goto out_err;
666		}
667		printk(KERN_INFO "lkdtm: Crash point %s of type %s registered\n",
668				cpoint_name, cpoint_type);
669	} else {
670		printk(KERN_INFO "lkdtm: No crash points registered, enable through debugfs\n");
671	}
672
673	return 0;
674
675out_err:
676	debugfs_remove_recursive(lkdtm_debugfs_root);
677	return ret;
678}
679
680static void __exit lkdtm_module_exit(void)
681{
682	debugfs_remove_recursive(lkdtm_debugfs_root);
683
684	unregister_jprobe(&lkdtm);
685	printk(KERN_INFO "lkdtm: Crash point unregistered\n");
686}
687
688module_init(lkdtm_module_init);
689module_exit(lkdtm_module_exit);
690
691MODULE_LICENSE("GPL");
v4.6
   1/*
   2 * Kprobe module for testing crash dumps
   3 *
   4 * This program is free software; you can redistribute it and/or modify
   5 * it under the terms of the GNU General Public License as published by
   6 * the Free Software Foundation; either version 2 of the License, or
   7 * (at your option) any later version.
   8 *
   9 * This program is distributed in the hope that it will be useful,
  10 * but WITHOUT ANY WARRANTY; without even the implied warranty of
  11 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
  12 * GNU General Public License for more details.
  13 *
  14 * You should have received a copy of the GNU General Public License
  15 * along with this program; if not, write to the Free Software
  16 * Foundation, Inc., 59 Temple Place - Suite 330, Boston, MA 02111-1307, USA.
  17 *
  18 * Copyright (C) IBM Corporation, 2006
  19 *
  20 * Author: Ankita Garg <ankita@in.ibm.com>
  21 *
  22 * This module induces system failures at predefined crashpoints to
  23 * evaluate the reliability of crash dumps obtained using different dumping
  24 * solutions.
  25 *
  26 * It is adapted from the Linux Kernel Dump Test Tool by
  27 * Fernando Luis Vazquez Cao <http://lkdtt.sourceforge.net>
  28 *
  29 * Debugfs support added by Simon Kagstrom <simon.kagstrom@netinsight.net>
  30 *
  31 * See Documentation/fault-injection/provoke-crashes.txt for instructions
  32 */
  33#define pr_fmt(fmt) KBUILD_MODNAME ": " fmt
  34
  35#include <linux/kernel.h>
  36#include <linux/fs.h>
  37#include <linux/module.h>
  38#include <linux/buffer_head.h>
  39#include <linux/kprobes.h>
  40#include <linux/list.h>
  41#include <linux/init.h>
  42#include <linux/interrupt.h>
  43#include <linux/hrtimer.h>
  44#include <linux/slab.h>
  45#include <scsi/scsi_cmnd.h>
  46#include <linux/debugfs.h>
  47#include <linux/vmalloc.h>
  48#include <linux/mman.h>
  49#include <asm/cacheflush.h>
  50
  51#ifdef CONFIG_IDE
  52#include <linux/ide.h>
  53#endif
  54
  55/*
  56 * Make sure our attempts to over run the kernel stack doesn't trigger
  57 * a compiler warning when CONFIG_FRAME_WARN is set. Then make sure we
  58 * recurse past the end of THREAD_SIZE by default.
  59 */
  60#if defined(CONFIG_FRAME_WARN) && (CONFIG_FRAME_WARN > 0)
  61#define REC_STACK_SIZE (CONFIG_FRAME_WARN / 2)
  62#else
  63#define REC_STACK_SIZE (THREAD_SIZE / 8)
  64#endif
  65#define REC_NUM_DEFAULT ((THREAD_SIZE / REC_STACK_SIZE) * 2)
  66
  67#define DEFAULT_COUNT 10
  68#define EXEC_SIZE 64
  69
  70enum cname {
  71	CN_INVALID,
  72	CN_INT_HARDWARE_ENTRY,
  73	CN_INT_HW_IRQ_EN,
  74	CN_INT_TASKLET_ENTRY,
  75	CN_FS_DEVRW,
  76	CN_MEM_SWAPOUT,
  77	CN_TIMERADD,
  78	CN_SCSI_DISPATCH_CMD,
  79	CN_IDE_CORE_CP,
  80	CN_DIRECT,
  81};
  82
  83enum ctype {
  84	CT_NONE,
  85	CT_PANIC,
  86	CT_BUG,
  87	CT_WARNING,
  88	CT_EXCEPTION,
  89	CT_LOOP,
  90	CT_OVERFLOW,
  91	CT_CORRUPT_STACK,
  92	CT_UNALIGNED_LOAD_STORE_WRITE,
  93	CT_OVERWRITE_ALLOCATION,
  94	CT_WRITE_AFTER_FREE,
  95	CT_READ_AFTER_FREE,
  96	CT_WRITE_BUDDY_AFTER_FREE,
  97	CT_READ_BUDDY_AFTER_FREE,
  98	CT_SOFTLOCKUP,
  99	CT_HARDLOCKUP,
 100	CT_SPINLOCKUP,
 101	CT_HUNG_TASK,
 102	CT_EXEC_DATA,
 103	CT_EXEC_STACK,
 104	CT_EXEC_KMALLOC,
 105	CT_EXEC_VMALLOC,
 106	CT_EXEC_USERSPACE,
 107	CT_ACCESS_USERSPACE,
 108	CT_WRITE_RO,
 109	CT_WRITE_RO_AFTER_INIT,
 110	CT_WRITE_KERN,
 111	CT_WRAP_ATOMIC
 112};
 113
 114static char* cp_name[] = {
 115	"INT_HARDWARE_ENTRY",
 116	"INT_HW_IRQ_EN",
 117	"INT_TASKLET_ENTRY",
 118	"FS_DEVRW",
 119	"MEM_SWAPOUT",
 120	"TIMERADD",
 121	"SCSI_DISPATCH_CMD",
 122	"IDE_CORE_CP",
 123	"DIRECT",
 124};
 125
 126static char* cp_type[] = {
 127	"PANIC",
 128	"BUG",
 129	"WARNING",
 130	"EXCEPTION",
 131	"LOOP",
 132	"OVERFLOW",
 133	"CORRUPT_STACK",
 134	"UNALIGNED_LOAD_STORE_WRITE",
 135	"OVERWRITE_ALLOCATION",
 136	"WRITE_AFTER_FREE",
 137	"READ_AFTER_FREE",
 138	"WRITE_BUDDY_AFTER_FREE",
 139	"READ_BUDDY_AFTER_FREE",
 140	"SOFTLOCKUP",
 141	"HARDLOCKUP",
 142	"SPINLOCKUP",
 143	"HUNG_TASK",
 144	"EXEC_DATA",
 145	"EXEC_STACK",
 146	"EXEC_KMALLOC",
 147	"EXEC_VMALLOC",
 148	"EXEC_USERSPACE",
 149	"ACCESS_USERSPACE",
 150	"WRITE_RO",
 151	"WRITE_RO_AFTER_INIT",
 152	"WRITE_KERN",
 153	"WRAP_ATOMIC"
 154};
 155
 156static struct jprobe lkdtm;
 157
 158static int lkdtm_parse_commandline(void);
 159static void lkdtm_handler(void);
 160
 161static char* cpoint_name;
 162static char* cpoint_type;
 163static int cpoint_count = DEFAULT_COUNT;
 164static int recur_count = REC_NUM_DEFAULT;
 165
 166static enum cname cpoint = CN_INVALID;
 167static enum ctype cptype = CT_NONE;
 168static int count = DEFAULT_COUNT;
 169static DEFINE_SPINLOCK(count_lock);
 170static DEFINE_SPINLOCK(lock_me_up);
 171
 172static u8 data_area[EXEC_SIZE];
 173
 174static const unsigned long rodata = 0xAA55AA55;
 175static unsigned long ro_after_init __ro_after_init = 0x55AA5500;
 176
 177module_param(recur_count, int, 0644);
 178MODULE_PARM_DESC(recur_count, " Recursion level for the stack overflow test");
 
 179module_param(cpoint_name, charp, 0444);
 180MODULE_PARM_DESC(cpoint_name, " Crash Point, where kernel is to be crashed");
 181module_param(cpoint_type, charp, 0444);
 182MODULE_PARM_DESC(cpoint_type, " Crash Point Type, action to be taken on "\
 183				"hitting the crash point");
 184module_param(cpoint_count, int, 0644);
 185MODULE_PARM_DESC(cpoint_count, " Crash Point Count, number of times the "\
 186				"crash point is to be hit to trigger action");
 187
 188static unsigned int jp_do_irq(unsigned int irq)
 189{
 190	lkdtm_handler();
 191	jprobe_return();
 192	return 0;
 193}
 194
 195static irqreturn_t jp_handle_irq_event(unsigned int irq,
 196				       struct irqaction *action)
 197{
 198	lkdtm_handler();
 199	jprobe_return();
 200	return 0;
 201}
 202
 203static void jp_tasklet_action(struct softirq_action *a)
 204{
 205	lkdtm_handler();
 206	jprobe_return();
 207}
 208
 209static void jp_ll_rw_block(int rw, int nr, struct buffer_head *bhs[])
 210{
 211	lkdtm_handler();
 212	jprobe_return();
 213}
 214
 215struct scan_control;
 216
 217static unsigned long jp_shrink_inactive_list(unsigned long max_scan,
 218					     struct zone *zone,
 219					     struct scan_control *sc)
 220{
 221	lkdtm_handler();
 222	jprobe_return();
 223	return 0;
 224}
 225
 226static int jp_hrtimer_start(struct hrtimer *timer, ktime_t tim,
 227			    const enum hrtimer_mode mode)
 228{
 229	lkdtm_handler();
 230	jprobe_return();
 231	return 0;
 232}
 233
 234static int jp_scsi_dispatch_cmd(struct scsi_cmnd *cmd)
 235{
 236	lkdtm_handler();
 237	jprobe_return();
 238	return 0;
 239}
 240
 241#ifdef CONFIG_IDE
 242static int jp_generic_ide_ioctl(ide_drive_t *drive, struct file *file,
 243			struct block_device *bdev, unsigned int cmd,
 244			unsigned long arg)
 245{
 246	lkdtm_handler();
 247	jprobe_return();
 248	return 0;
 249}
 250#endif
 251
 252/* Return the crashpoint number or NONE if the name is invalid */
 253static enum ctype parse_cp_type(const char *what, size_t count)
 254{
 255	int i;
 256
 257	for (i = 0; i < ARRAY_SIZE(cp_type); i++) {
 258		if (!strcmp(what, cp_type[i]))
 259			return i + 1;
 260	}
 261
 262	return CT_NONE;
 263}
 264
 265static const char *cp_type_to_str(enum ctype type)
 266{
 267	if (type == CT_NONE || type < 0 || type > ARRAY_SIZE(cp_type))
 268		return "None";
 269
 270	return cp_type[type - 1];
 271}
 272
 273static const char *cp_name_to_str(enum cname name)
 274{
 275	if (name == CN_INVALID || name < 0 || name > ARRAY_SIZE(cp_name))
 276		return "INVALID";
 277
 278	return cp_name[name - 1];
 279}
 280
 281
 282static int lkdtm_parse_commandline(void)
 283{
 284	int i;
 285	unsigned long flags;
 286
 287	if (cpoint_count < 1 || recur_count < 1)
 288		return -EINVAL;
 289
 290	spin_lock_irqsave(&count_lock, flags);
 291	count = cpoint_count;
 292	spin_unlock_irqrestore(&count_lock, flags);
 293
 294	/* No special parameters */
 295	if (!cpoint_type && !cpoint_name)
 296		return 0;
 297
 298	/* Neither or both of these need to be set */
 299	if (!cpoint_type || !cpoint_name)
 300		return -EINVAL;
 301
 302	cptype = parse_cp_type(cpoint_type, strlen(cpoint_type));
 303	if (cptype == CT_NONE)
 304		return -EINVAL;
 305
 306	for (i = 0; i < ARRAY_SIZE(cp_name); i++) {
 307		if (!strcmp(cpoint_name, cp_name[i])) {
 308			cpoint = i + 1;
 309			return 0;
 310		}
 311	}
 312
 313	/* Could not find a valid crash point */
 314	return -EINVAL;
 315}
 316
 317static int recursive_loop(int remaining)
 318{
 319	char buf[REC_STACK_SIZE];
 320
 321	/* Make sure compiler does not optimize this away. */
 322	memset(buf, (remaining & 0xff) | 0x1, REC_STACK_SIZE);
 323	if (!remaining)
 324		return 0;
 325	else
 326		return recursive_loop(remaining - 1);
 327}
 328
 329static void do_nothing(void)
 330{
 331	return;
 332}
 333
 334/* Must immediately follow do_nothing for size calculuations to work out. */
 335static void do_overwritten(void)
 336{
 337	pr_info("do_overwritten wasn't overwritten!\n");
 338	return;
 339}
 340
 341static noinline void corrupt_stack(void)
 342{
 343	/* Use default char array length that triggers stack protection. */
 344	char data[8];
 345
 346	memset((void *)data, 0, 64);
 347}
 348
 349static void noinline execute_location(void *dst)
 350{
 351	void (*func)(void) = dst;
 352
 353	pr_info("attempting ok execution at %p\n", do_nothing);
 354	do_nothing();
 355
 356	memcpy(dst, do_nothing, EXEC_SIZE);
 357	flush_icache_range((unsigned long)dst, (unsigned long)dst + EXEC_SIZE);
 358	pr_info("attempting bad execution at %p\n", func);
 359	func();
 360}
 361
 362static void execute_user_location(void *dst)
 363{
 364	/* Intentionally crossing kernel/user memory boundary. */
 365	void (*func)(void) = dst;
 366
 367	pr_info("attempting ok execution at %p\n", do_nothing);
 368	do_nothing();
 369
 370	if (copy_to_user((void __user *)dst, do_nothing, EXEC_SIZE))
 371		return;
 372	flush_icache_range((unsigned long)dst, (unsigned long)dst + EXEC_SIZE);
 373	pr_info("attempting bad execution at %p\n", func);
 374	func();
 375}
 376
 377static void lkdtm_do_action(enum ctype which)
 378{
 379	switch (which) {
 380	case CT_PANIC:
 381		panic("dumptest");
 382		break;
 383	case CT_BUG:
 384		BUG();
 385		break;
 386	case CT_WARNING:
 387		WARN_ON(1);
 388		break;
 389	case CT_EXCEPTION:
 390		*((int *) 0) = 0;
 391		break;
 392	case CT_LOOP:
 393		for (;;)
 394			;
 395		break;
 396	case CT_OVERFLOW:
 397		(void) recursive_loop(recur_count);
 398		break;
 399	case CT_CORRUPT_STACK:
 400		corrupt_stack();
 
 
 
 401		break;
 
 402	case CT_UNALIGNED_LOAD_STORE_WRITE: {
 403		static u8 data[5] __attribute__((aligned(4))) = {1, 2,
 404				3, 4, 5};
 405		u32 *p;
 406		u32 val = 0x12345678;
 407
 408		p = (u32 *)(data + 1);
 409		if (*p == 0)
 410			val = 0x87654321;
 411		*p = val;
 412		 break;
 413	}
 414	case CT_OVERWRITE_ALLOCATION: {
 415		size_t len = 1020;
 416		u32 *data = kmalloc(len, GFP_KERNEL);
 417
 418		data[1024 / sizeof(u32)] = 0x12345678;
 419		kfree(data);
 420		break;
 421	}
 422	case CT_WRITE_AFTER_FREE: {
 423		int *base, *again;
 424		size_t len = 1024;
 425		/*
 426		 * The slub allocator uses the first word to store the free
 427		 * pointer in some configurations. Use the middle of the
 428		 * allocation to avoid running into the freelist
 429		 */
 430		size_t offset = (len / sizeof(*base)) / 2;
 431
 432		base = kmalloc(len, GFP_KERNEL);
 433		pr_info("Allocated memory %p-%p\n", base, &base[offset * 2]);
 434		pr_info("Attempting bad write to freed memory at %p\n",
 435			&base[offset]);
 436		kfree(base);
 437		base[offset] = 0x0abcdef0;
 438		/* Attempt to notice the overwrite. */
 439		again = kmalloc(len, GFP_KERNEL);
 440		kfree(again);
 441		if (again != base)
 442			pr_info("Hmm, didn't get the same memory range.\n");
 443
 444		break;
 445	}
 446	case CT_READ_AFTER_FREE: {
 447		int *base, *val, saw;
 448		size_t len = 1024;
 449		/*
 450		 * The slub allocator uses the first word to store the free
 451		 * pointer in some configurations. Use the middle of the
 452		 * allocation to avoid running into the freelist
 453		 */
 454		size_t offset = (len / sizeof(*base)) / 2;
 455
 456		base = kmalloc(len, GFP_KERNEL);
 457		if (!base)
 458			break;
 459
 460		val = kmalloc(len, GFP_KERNEL);
 461		if (!val) {
 462			kfree(base);
 463			break;
 464		}
 465
 466		*val = 0x12345678;
 467		base[offset] = *val;
 468		pr_info("Value in memory before free: %x\n", base[offset]);
 469
 470		kfree(base);
 471
 472		pr_info("Attempting bad read from freed memory\n");
 473		saw = base[offset];
 474		if (saw != *val) {
 475			/* Good! Poisoning happened, so declare a win. */
 476			pr_info("Memory correctly poisoned (%x)\n", saw);
 477			BUG();
 478		}
 479		pr_info("Memory was not poisoned\n");
 480
 481		kfree(val);
 482		break;
 483	}
 484	case CT_WRITE_BUDDY_AFTER_FREE: {
 485		unsigned long p = __get_free_page(GFP_KERNEL);
 486		if (!p)
 487			break;
 488		pr_info("Writing to the buddy page before free\n");
 489		memset((void *)p, 0x3, PAGE_SIZE);
 490		free_page(p);
 491		schedule();
 492		pr_info("Attempting bad write to the buddy page after free\n");
 493		memset((void *)p, 0x78, PAGE_SIZE);
 494		/* Attempt to notice the overwrite. */
 495		p = __get_free_page(GFP_KERNEL);
 496		free_page(p);
 497		schedule();
 498
 499		break;
 500	}
 501	case CT_READ_BUDDY_AFTER_FREE: {
 502		unsigned long p = __get_free_page(GFP_KERNEL);
 503		int saw, *val;
 504		int *base;
 505
 506		if (!p)
 507			break;
 508
 509		val = kmalloc(1024, GFP_KERNEL);
 510		if (!val) {
 511			free_page(p);
 512			break;
 513		}
 514
 515		base = (int *)p;
 516
 517		*val = 0x12345678;
 518		base[0] = *val;
 519		pr_info("Value in memory before free: %x\n", base[0]);
 520		free_page(p);
 521		pr_info("Attempting to read from freed memory\n");
 522		saw = base[0];
 523		if (saw != *val) {
 524			/* Good! Poisoning happened, so declare a win. */
 525			pr_info("Memory correctly poisoned (%x)\n", saw);
 526			BUG();
 527		}
 528		pr_info("Buddy page was not poisoned\n");
 529
 530		kfree(val);
 531		break;
 532	}
 533	case CT_SOFTLOCKUP:
 534		preempt_disable();
 535		for (;;)
 536			cpu_relax();
 537		break;
 538	case CT_HARDLOCKUP:
 539		local_irq_disable();
 540		for (;;)
 541			cpu_relax();
 542		break;
 543	case CT_SPINLOCKUP:
 544		/* Must be called twice to trigger. */
 545		spin_lock(&lock_me_up);
 546		/* Let sparse know we intended to exit holding the lock. */
 547		__release(&lock_me_up);
 548		break;
 549	case CT_HUNG_TASK:
 550		set_current_state(TASK_UNINTERRUPTIBLE);
 551		schedule();
 552		break;
 553	case CT_EXEC_DATA:
 554		execute_location(data_area);
 555		break;
 556	case CT_EXEC_STACK: {
 557		u8 stack_area[EXEC_SIZE];
 558		execute_location(stack_area);
 559		break;
 560	}
 561	case CT_EXEC_KMALLOC: {
 562		u32 *kmalloc_area = kmalloc(EXEC_SIZE, GFP_KERNEL);
 563		execute_location(kmalloc_area);
 564		kfree(kmalloc_area);
 565		break;
 566	}
 567	case CT_EXEC_VMALLOC: {
 568		u32 *vmalloc_area = vmalloc(EXEC_SIZE);
 569		execute_location(vmalloc_area);
 570		vfree(vmalloc_area);
 571		break;
 572	}
 573	case CT_EXEC_USERSPACE: {
 574		unsigned long user_addr;
 575
 576		user_addr = vm_mmap(NULL, 0, PAGE_SIZE,
 577				    PROT_READ | PROT_WRITE | PROT_EXEC,
 578				    MAP_ANONYMOUS | MAP_PRIVATE, 0);
 579		if (user_addr >= TASK_SIZE) {
 580			pr_warn("Failed to allocate user memory\n");
 581			return;
 582		}
 583		execute_user_location((void *)user_addr);
 584		vm_munmap(user_addr, PAGE_SIZE);
 585		break;
 586	}
 587	case CT_ACCESS_USERSPACE: {
 588		unsigned long user_addr, tmp = 0;
 589		unsigned long *ptr;
 590
 591		user_addr = vm_mmap(NULL, 0, PAGE_SIZE,
 592				    PROT_READ | PROT_WRITE | PROT_EXEC,
 593				    MAP_ANONYMOUS | MAP_PRIVATE, 0);
 594		if (user_addr >= TASK_SIZE) {
 595			pr_warn("Failed to allocate user memory\n");
 596			return;
 597		}
 598
 599		if (copy_to_user((void __user *)user_addr, &tmp, sizeof(tmp))) {
 600			pr_warn("copy_to_user failed\n");
 601			vm_munmap(user_addr, PAGE_SIZE);
 602			return;
 603		}
 604
 605		ptr = (unsigned long *)user_addr;
 606
 607		pr_info("attempting bad read at %p\n", ptr);
 608		tmp = *ptr;
 609		tmp += 0xc0dec0de;
 610
 611		pr_info("attempting bad write at %p\n", ptr);
 612		*ptr = tmp;
 613
 614		vm_munmap(user_addr, PAGE_SIZE);
 615
 616		break;
 617	}
 618	case CT_WRITE_RO: {
 619		/* Explicitly cast away "const" for the test. */
 620		unsigned long *ptr = (unsigned long *)&rodata;
 621
 622		pr_info("attempting bad rodata write at %p\n", ptr);
 623		*ptr ^= 0xabcd1234;
 624
 625		break;
 626	}
 627	case CT_WRITE_RO_AFTER_INIT: {
 628		unsigned long *ptr = &ro_after_init;
 629
 630		/*
 631		 * Verify we were written to during init. Since an Oops
 632		 * is considered a "success", a failure is to just skip the
 633		 * real test.
 634		 */
 635		if ((*ptr & 0xAA) != 0xAA) {
 636			pr_info("%p was NOT written during init!?\n", ptr);
 637			break;
 638		}
 639
 640		pr_info("attempting bad ro_after_init write at %p\n", ptr);
 641		*ptr ^= 0xabcd1234;
 642
 643		break;
 644	}
 645	case CT_WRITE_KERN: {
 646		size_t size;
 647		unsigned char *ptr;
 648
 649		size = (unsigned long)do_overwritten -
 650		       (unsigned long)do_nothing;
 651		ptr = (unsigned char *)do_overwritten;
 652
 653		pr_info("attempting bad %zu byte write at %p\n", size, ptr);
 654		memcpy(ptr, (unsigned char *)do_nothing, size);
 655		flush_icache_range((unsigned long)ptr,
 656				   (unsigned long)(ptr + size));
 657
 658		do_overwritten();
 659		break;
 660	}
 661	case CT_WRAP_ATOMIC: {
 662		atomic_t under = ATOMIC_INIT(INT_MIN);
 663		atomic_t over = ATOMIC_INIT(INT_MAX);
 664
 665		pr_info("attempting atomic underflow\n");
 666		atomic_dec(&under);
 667		pr_info("attempting atomic overflow\n");
 668		atomic_inc(&over);
 669
 670		return;
 671	}
 672	case CT_NONE:
 673	default:
 674		break;
 675	}
 676
 677}
 678
 679static void lkdtm_handler(void)
 680{
 681	unsigned long flags;
 682	bool do_it = false;
 683
 684	spin_lock_irqsave(&count_lock, flags);
 685	count--;
 686	pr_info("Crash point %s of type %s hit, trigger in %d rounds\n",
 687		cp_name_to_str(cpoint), cp_type_to_str(cptype), count);
 688
 689	if (count == 0) {
 690		do_it = true;
 691		count = cpoint_count;
 692	}
 693	spin_unlock_irqrestore(&count_lock, flags);
 694
 695	if (do_it)
 696		lkdtm_do_action(cptype);
 697}
 698
 699static int lkdtm_register_cpoint(enum cname which)
 700{
 701	int ret;
 702
 703	cpoint = CN_INVALID;
 704	if (lkdtm.entry != NULL)
 705		unregister_jprobe(&lkdtm);
 706
 707	switch (which) {
 708	case CN_DIRECT:
 709		lkdtm_do_action(cptype);
 710		return 0;
 711	case CN_INT_HARDWARE_ENTRY:
 712		lkdtm.kp.symbol_name = "do_IRQ";
 713		lkdtm.entry = (kprobe_opcode_t*) jp_do_irq;
 714		break;
 715	case CN_INT_HW_IRQ_EN:
 716		lkdtm.kp.symbol_name = "handle_IRQ_event";
 717		lkdtm.entry = (kprobe_opcode_t*) jp_handle_irq_event;
 718		break;
 719	case CN_INT_TASKLET_ENTRY:
 720		lkdtm.kp.symbol_name = "tasklet_action";
 721		lkdtm.entry = (kprobe_opcode_t*) jp_tasklet_action;
 722		break;
 723	case CN_FS_DEVRW:
 724		lkdtm.kp.symbol_name = "ll_rw_block";
 725		lkdtm.entry = (kprobe_opcode_t*) jp_ll_rw_block;
 726		break;
 727	case CN_MEM_SWAPOUT:
 728		lkdtm.kp.symbol_name = "shrink_inactive_list";
 729		lkdtm.entry = (kprobe_opcode_t*) jp_shrink_inactive_list;
 730		break;
 731	case CN_TIMERADD:
 732		lkdtm.kp.symbol_name = "hrtimer_start";
 733		lkdtm.entry = (kprobe_opcode_t*) jp_hrtimer_start;
 734		break;
 735	case CN_SCSI_DISPATCH_CMD:
 736		lkdtm.kp.symbol_name = "scsi_dispatch_cmd";
 737		lkdtm.entry = (kprobe_opcode_t*) jp_scsi_dispatch_cmd;
 738		break;
 739	case CN_IDE_CORE_CP:
 740#ifdef CONFIG_IDE
 741		lkdtm.kp.symbol_name = "generic_ide_ioctl";
 742		lkdtm.entry = (kprobe_opcode_t*) jp_generic_ide_ioctl;
 743#else
 744		pr_info("Crash point not available\n");
 745		return -EINVAL;
 746#endif
 747		break;
 748	default:
 749		pr_info("Invalid Crash Point\n");
 750		return -EINVAL;
 751	}
 752
 753	cpoint = which;
 754	if ((ret = register_jprobe(&lkdtm)) < 0) {
 755		pr_info("Couldn't register jprobe\n");
 756		cpoint = CN_INVALID;
 757	}
 758
 759	return ret;
 760}
 761
 762static ssize_t do_register_entry(enum cname which, struct file *f,
 763		const char __user *user_buf, size_t count, loff_t *off)
 764{
 765	char *buf;
 766	int err;
 767
 768	if (count >= PAGE_SIZE)
 769		return -EINVAL;
 770
 771	buf = (char *)__get_free_page(GFP_KERNEL);
 772	if (!buf)
 773		return -ENOMEM;
 774	if (copy_from_user(buf, user_buf, count)) {
 775		free_page((unsigned long) buf);
 776		return -EFAULT;
 777	}
 778	/* NULL-terminate and remove enter */
 779	buf[count] = '\0';
 780	strim(buf);
 781
 782	cptype = parse_cp_type(buf, count);
 783	free_page((unsigned long) buf);
 784
 785	if (cptype == CT_NONE)
 786		return -EINVAL;
 787
 788	err = lkdtm_register_cpoint(which);
 789	if (err < 0)
 790		return err;
 791
 792	*off += count;
 793
 794	return count;
 795}
 796
 797/* Generic read callback that just prints out the available crash types */
 798static ssize_t lkdtm_debugfs_read(struct file *f, char __user *user_buf,
 799		size_t count, loff_t *off)
 800{
 801	char *buf;
 802	int i, n, out;
 803
 804	buf = (char *)__get_free_page(GFP_KERNEL);
 805	if (buf == NULL)
 806		return -ENOMEM;
 807
 808	n = snprintf(buf, PAGE_SIZE, "Available crash types:\n");
 809	for (i = 0; i < ARRAY_SIZE(cp_type); i++)
 810		n += snprintf(buf + n, PAGE_SIZE - n, "%s\n", cp_type[i]);
 811	buf[n] = '\0';
 812
 813	out = simple_read_from_buffer(user_buf, count, off,
 814				      buf, n);
 815	free_page((unsigned long) buf);
 816
 817	return out;
 818}
 819
 820static int lkdtm_debugfs_open(struct inode *inode, struct file *file)
 821{
 822	return 0;
 823}
 824
 825
 826static ssize_t int_hardware_entry(struct file *f, const char __user *buf,
 827		size_t count, loff_t *off)
 828{
 829	return do_register_entry(CN_INT_HARDWARE_ENTRY, f, buf, count, off);
 830}
 831
 832static ssize_t int_hw_irq_en(struct file *f, const char __user *buf,
 833		size_t count, loff_t *off)
 834{
 835	return do_register_entry(CN_INT_HW_IRQ_EN, f, buf, count, off);
 836}
 837
 838static ssize_t int_tasklet_entry(struct file *f, const char __user *buf,
 839		size_t count, loff_t *off)
 840{
 841	return do_register_entry(CN_INT_TASKLET_ENTRY, f, buf, count, off);
 842}
 843
 844static ssize_t fs_devrw_entry(struct file *f, const char __user *buf,
 845		size_t count, loff_t *off)
 846{
 847	return do_register_entry(CN_FS_DEVRW, f, buf, count, off);
 848}
 849
 850static ssize_t mem_swapout_entry(struct file *f, const char __user *buf,
 851		size_t count, loff_t *off)
 852{
 853	return do_register_entry(CN_MEM_SWAPOUT, f, buf, count, off);
 854}
 855
 856static ssize_t timeradd_entry(struct file *f, const char __user *buf,
 857		size_t count, loff_t *off)
 858{
 859	return do_register_entry(CN_TIMERADD, f, buf, count, off);
 860}
 861
 862static ssize_t scsi_dispatch_cmd_entry(struct file *f,
 863		const char __user *buf, size_t count, loff_t *off)
 864{
 865	return do_register_entry(CN_SCSI_DISPATCH_CMD, f, buf, count, off);
 866}
 867
 868static ssize_t ide_core_cp_entry(struct file *f, const char __user *buf,
 869		size_t count, loff_t *off)
 870{
 871	return do_register_entry(CN_IDE_CORE_CP, f, buf, count, off);
 872}
 873
 874/* Special entry to just crash directly. Available without KPROBEs */
 875static ssize_t direct_entry(struct file *f, const char __user *user_buf,
 876		size_t count, loff_t *off)
 877{
 878	enum ctype type;
 879	char *buf;
 880
 881	if (count >= PAGE_SIZE)
 882		return -EINVAL;
 883	if (count < 1)
 884		return -EINVAL;
 885
 886	buf = (char *)__get_free_page(GFP_KERNEL);
 887	if (!buf)
 888		return -ENOMEM;
 889	if (copy_from_user(buf, user_buf, count)) {
 890		free_page((unsigned long) buf);
 891		return -EFAULT;
 892	}
 893	/* NULL-terminate and remove enter */
 894	buf[count] = '\0';
 895	strim(buf);
 896
 897	type = parse_cp_type(buf, count);
 898	free_page((unsigned long) buf);
 899	if (type == CT_NONE)
 900		return -EINVAL;
 901
 902	pr_info("Performing direct entry %s\n", cp_type_to_str(type));
 
 903	lkdtm_do_action(type);
 904	*off += count;
 905
 906	return count;
 907}
 908
 909struct crash_entry {
 910	const char *name;
 911	const struct file_operations fops;
 912};
 913
 914static const struct crash_entry crash_entries[] = {
 915	{"DIRECT", {.read = lkdtm_debugfs_read,
 916			.llseek = generic_file_llseek,
 917			.open = lkdtm_debugfs_open,
 918			.write = direct_entry} },
 919	{"INT_HARDWARE_ENTRY", {.read = lkdtm_debugfs_read,
 920			.llseek = generic_file_llseek,
 921			.open = lkdtm_debugfs_open,
 922			.write = int_hardware_entry} },
 923	{"INT_HW_IRQ_EN", {.read = lkdtm_debugfs_read,
 924			.llseek = generic_file_llseek,
 925			.open = lkdtm_debugfs_open,
 926			.write = int_hw_irq_en} },
 927	{"INT_TASKLET_ENTRY", {.read = lkdtm_debugfs_read,
 928			.llseek = generic_file_llseek,
 929			.open = lkdtm_debugfs_open,
 930			.write = int_tasklet_entry} },
 931	{"FS_DEVRW", {.read = lkdtm_debugfs_read,
 932			.llseek = generic_file_llseek,
 933			.open = lkdtm_debugfs_open,
 934			.write = fs_devrw_entry} },
 935	{"MEM_SWAPOUT", {.read = lkdtm_debugfs_read,
 936			.llseek = generic_file_llseek,
 937			.open = lkdtm_debugfs_open,
 938			.write = mem_swapout_entry} },
 939	{"TIMERADD", {.read = lkdtm_debugfs_read,
 940			.llseek = generic_file_llseek,
 941			.open = lkdtm_debugfs_open,
 942			.write = timeradd_entry} },
 943	{"SCSI_DISPATCH_CMD", {.read = lkdtm_debugfs_read,
 944			.llseek = generic_file_llseek,
 945			.open = lkdtm_debugfs_open,
 946			.write = scsi_dispatch_cmd_entry} },
 947	{"IDE_CORE_CP",	{.read = lkdtm_debugfs_read,
 948			.llseek = generic_file_llseek,
 949			.open = lkdtm_debugfs_open,
 950			.write = ide_core_cp_entry} },
 951};
 952
 953static struct dentry *lkdtm_debugfs_root;
 954
 955static int __init lkdtm_module_init(void)
 956{
 957	int ret = -EINVAL;
 958	int n_debugfs_entries = 1; /* Assume only the direct entry */
 959	int i;
 960
 961	/* Make sure we can write to __ro_after_init values during __init */
 962	ro_after_init |= 0xAA;
 963
 964	/* Register debugfs interface */
 965	lkdtm_debugfs_root = debugfs_create_dir("provoke-crash", NULL);
 966	if (!lkdtm_debugfs_root) {
 967		pr_err("creating root dir failed\n");
 968		return -ENODEV;
 969	}
 970
 971#ifdef CONFIG_KPROBES
 972	n_debugfs_entries = ARRAY_SIZE(crash_entries);
 973#endif
 974
 975	for (i = 0; i < n_debugfs_entries; i++) {
 976		const struct crash_entry *cur = &crash_entries[i];
 977		struct dentry *de;
 978
 979		de = debugfs_create_file(cur->name, 0644, lkdtm_debugfs_root,
 980				NULL, &cur->fops);
 981		if (de == NULL) {
 982			pr_err("could not create %s\n", cur->name);
 
 983			goto out_err;
 984		}
 985	}
 986
 987	if (lkdtm_parse_commandline() == -EINVAL) {
 988		pr_info("Invalid command\n");
 989		goto out_err;
 990	}
 991
 992	if (cpoint != CN_INVALID && cptype != CT_NONE) {
 993		ret = lkdtm_register_cpoint(cpoint);
 994		if (ret < 0) {
 995			pr_info("Invalid crash point %d\n", cpoint);
 
 996			goto out_err;
 997		}
 998		pr_info("Crash point %s of type %s registered\n",
 999			cpoint_name, cpoint_type);
1000	} else {
1001		pr_info("No crash points registered, enable through debugfs\n");
1002	}
1003
1004	return 0;
1005
1006out_err:
1007	debugfs_remove_recursive(lkdtm_debugfs_root);
1008	return ret;
1009}
1010
1011static void __exit lkdtm_module_exit(void)
1012{
1013	debugfs_remove_recursive(lkdtm_debugfs_root);
1014
1015	unregister_jprobe(&lkdtm);
1016	pr_info("Crash point unregistered\n");
1017}
1018
1019module_init(lkdtm_module_init);
1020module_exit(lkdtm_module_exit);
1021
1022MODULE_LICENSE("GPL");
1023MODULE_DESCRIPTION("Kprobe module for testing crash dumps");