Linux Audio

Check our new training course

Loading...
v3.15
  1/*
  2 * Kprobe module for testing crash dumps
  3 *
  4 * This program is free software; you can redistribute it and/or modify
  5 * it under the terms of the GNU General Public License as published by
  6 * the Free Software Foundation; either version 2 of the License, or
  7 * (at your option) any later version.
  8 *
  9 * This program is distributed in the hope that it will be useful,
 10 * but WITHOUT ANY WARRANTY; without even the implied warranty of
 11 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
 12 * GNU General Public License for more details.
 13 *
 14 * You should have received a copy of the GNU General Public License
 15 * along with this program; if not, write to the Free Software
 16 * Foundation, Inc., 59 Temple Place - Suite 330, Boston, MA 02111-1307, USA.
 17 *
 18 * Copyright (C) IBM Corporation, 2006
 19 *
 20 * Author: Ankita Garg <ankita@in.ibm.com>
 21 *
 22 * This module induces system failures at predefined crashpoints to
 23 * evaluate the reliability of crash dumps obtained using different dumping
 24 * solutions.
 25 *
 26 * It is adapted from the Linux Kernel Dump Test Tool by
 27 * Fernando Luis Vazquez Cao <http://lkdtt.sourceforge.net>
 28 *
 29 * Debugfs support added by Simon Kagstrom <simon.kagstrom@netinsight.net>
 30 *
 31 * See Documentation/fault-injection/provoke-crashes.txt for instructions
 32 */
 33#define pr_fmt(fmt) KBUILD_MODNAME ": " fmt
 34
 35#include <linux/kernel.h>
 36#include <linux/fs.h>
 37#include <linux/module.h>
 38#include <linux/buffer_head.h>
 39#include <linux/kprobes.h>
 40#include <linux/list.h>
 41#include <linux/init.h>
 42#include <linux/interrupt.h>
 43#include <linux/hrtimer.h>
 44#include <linux/slab.h>
 45#include <scsi/scsi_cmnd.h>
 46#include <linux/debugfs.h>
 47#include <linux/vmalloc.h>
 48#include <linux/mman.h>
 49#include <asm/cacheflush.h>
 50
 51#ifdef CONFIG_IDE
 52#include <linux/ide.h>
 53#endif
 54
 55/*
 56 * Make sure our attempts to over run the kernel stack doesn't trigger
 57 * a compiler warning when CONFIG_FRAME_WARN is set. Then make sure we
 58 * recurse past the end of THREAD_SIZE by default.
 59 */
 60#if defined(CONFIG_FRAME_WARN) && (CONFIG_FRAME_WARN > 0)
 61#define REC_STACK_SIZE (CONFIG_FRAME_WARN / 2)
 62#else
 63#define REC_STACK_SIZE (THREAD_SIZE / 8)
 64#endif
 65#define REC_NUM_DEFAULT ((THREAD_SIZE / REC_STACK_SIZE) * 2)
 66
 67#define DEFAULT_COUNT 10
 68#define EXEC_SIZE 64
 69
 70enum cname {
 71	CN_INVALID,
 72	CN_INT_HARDWARE_ENTRY,
 73	CN_INT_HW_IRQ_EN,
 74	CN_INT_TASKLET_ENTRY,
 75	CN_FS_DEVRW,
 76	CN_MEM_SWAPOUT,
 77	CN_TIMERADD,
 78	CN_SCSI_DISPATCH_CMD,
 79	CN_IDE_CORE_CP,
 80	CN_DIRECT,
 81};
 82
 83enum ctype {
 84	CT_NONE,
 85	CT_PANIC,
 86	CT_BUG,
 87	CT_WARNING,
 88	CT_EXCEPTION,
 89	CT_LOOP,
 90	CT_OVERFLOW,
 91	CT_CORRUPT_STACK,
 92	CT_UNALIGNED_LOAD_STORE_WRITE,
 93	CT_OVERWRITE_ALLOCATION,
 94	CT_WRITE_AFTER_FREE,
 
 
 
 95	CT_SOFTLOCKUP,
 96	CT_HARDLOCKUP,
 97	CT_SPINLOCKUP,
 98	CT_HUNG_TASK,
 99	CT_EXEC_DATA,
100	CT_EXEC_STACK,
101	CT_EXEC_KMALLOC,
102	CT_EXEC_VMALLOC,
103	CT_EXEC_USERSPACE,
104	CT_ACCESS_USERSPACE,
105	CT_WRITE_RO,
 
106	CT_WRITE_KERN,
 
107};
108
109static char* cp_name[] = {
110	"INT_HARDWARE_ENTRY",
111	"INT_HW_IRQ_EN",
112	"INT_TASKLET_ENTRY",
113	"FS_DEVRW",
114	"MEM_SWAPOUT",
115	"TIMERADD",
116	"SCSI_DISPATCH_CMD",
117	"IDE_CORE_CP",
118	"DIRECT",
119};
120
121static char* cp_type[] = {
122	"PANIC",
123	"BUG",
124	"WARNING",
125	"EXCEPTION",
126	"LOOP",
127	"OVERFLOW",
128	"CORRUPT_STACK",
129	"UNALIGNED_LOAD_STORE_WRITE",
130	"OVERWRITE_ALLOCATION",
131	"WRITE_AFTER_FREE",
 
 
 
132	"SOFTLOCKUP",
133	"HARDLOCKUP",
134	"SPINLOCKUP",
135	"HUNG_TASK",
136	"EXEC_DATA",
137	"EXEC_STACK",
138	"EXEC_KMALLOC",
139	"EXEC_VMALLOC",
140	"EXEC_USERSPACE",
141	"ACCESS_USERSPACE",
142	"WRITE_RO",
 
143	"WRITE_KERN",
 
144};
145
146static struct jprobe lkdtm;
147
148static int lkdtm_parse_commandline(void);
149static void lkdtm_handler(void);
150
151static char* cpoint_name;
152static char* cpoint_type;
153static int cpoint_count = DEFAULT_COUNT;
154static int recur_count = REC_NUM_DEFAULT;
155
156static enum cname cpoint = CN_INVALID;
157static enum ctype cptype = CT_NONE;
158static int count = DEFAULT_COUNT;
159static DEFINE_SPINLOCK(count_lock);
160static DEFINE_SPINLOCK(lock_me_up);
161
162static u8 data_area[EXEC_SIZE];
163
164static const unsigned long rodata = 0xAA55AA55;
 
165
166module_param(recur_count, int, 0644);
167MODULE_PARM_DESC(recur_count, " Recursion level for the stack overflow test");
168module_param(cpoint_name, charp, 0444);
169MODULE_PARM_DESC(cpoint_name, " Crash Point, where kernel is to be crashed");
170module_param(cpoint_type, charp, 0444);
171MODULE_PARM_DESC(cpoint_type, " Crash Point Type, action to be taken on "\
172				"hitting the crash point");
173module_param(cpoint_count, int, 0644);
174MODULE_PARM_DESC(cpoint_count, " Crash Point Count, number of times the "\
175				"crash point is to be hit to trigger action");
176
177static unsigned int jp_do_irq(unsigned int irq)
178{
179	lkdtm_handler();
180	jprobe_return();
181	return 0;
182}
183
184static irqreturn_t jp_handle_irq_event(unsigned int irq,
185				       struct irqaction *action)
186{
187	lkdtm_handler();
188	jprobe_return();
189	return 0;
190}
191
192static void jp_tasklet_action(struct softirq_action *a)
193{
194	lkdtm_handler();
195	jprobe_return();
196}
197
198static void jp_ll_rw_block(int rw, int nr, struct buffer_head *bhs[])
199{
200	lkdtm_handler();
201	jprobe_return();
202}
203
204struct scan_control;
205
206static unsigned long jp_shrink_inactive_list(unsigned long max_scan,
207					     struct zone *zone,
208					     struct scan_control *sc)
209{
210	lkdtm_handler();
211	jprobe_return();
212	return 0;
213}
214
215static int jp_hrtimer_start(struct hrtimer *timer, ktime_t tim,
216			    const enum hrtimer_mode mode)
217{
218	lkdtm_handler();
219	jprobe_return();
220	return 0;
221}
222
223static int jp_scsi_dispatch_cmd(struct scsi_cmnd *cmd)
224{
225	lkdtm_handler();
226	jprobe_return();
227	return 0;
228}
229
230#ifdef CONFIG_IDE
231static int jp_generic_ide_ioctl(ide_drive_t *drive, struct file *file,
232			struct block_device *bdev, unsigned int cmd,
233			unsigned long arg)
234{
235	lkdtm_handler();
236	jprobe_return();
237	return 0;
238}
239#endif
240
241/* Return the crashpoint number or NONE if the name is invalid */
242static enum ctype parse_cp_type(const char *what, size_t count)
243{
244	int i;
245
246	for (i = 0; i < ARRAY_SIZE(cp_type); i++) {
247		if (!strcmp(what, cp_type[i]))
248			return i + 1;
249	}
250
251	return CT_NONE;
252}
253
254static const char *cp_type_to_str(enum ctype type)
255{
256	if (type == CT_NONE || type < 0 || type > ARRAY_SIZE(cp_type))
257		return "None";
258
259	return cp_type[type - 1];
260}
261
262static const char *cp_name_to_str(enum cname name)
263{
264	if (name == CN_INVALID || name < 0 || name > ARRAY_SIZE(cp_name))
265		return "INVALID";
266
267	return cp_name[name - 1];
268}
269
270
271static int lkdtm_parse_commandline(void)
272{
273	int i;
274	unsigned long flags;
275
276	if (cpoint_count < 1 || recur_count < 1)
277		return -EINVAL;
278
279	spin_lock_irqsave(&count_lock, flags);
280	count = cpoint_count;
281	spin_unlock_irqrestore(&count_lock, flags);
282
283	/* No special parameters */
284	if (!cpoint_type && !cpoint_name)
285		return 0;
286
287	/* Neither or both of these need to be set */
288	if (!cpoint_type || !cpoint_name)
289		return -EINVAL;
290
291	cptype = parse_cp_type(cpoint_type, strlen(cpoint_type));
292	if (cptype == CT_NONE)
293		return -EINVAL;
294
295	for (i = 0; i < ARRAY_SIZE(cp_name); i++) {
296		if (!strcmp(cpoint_name, cp_name[i])) {
297			cpoint = i + 1;
298			return 0;
299		}
300	}
301
302	/* Could not find a valid crash point */
303	return -EINVAL;
304}
305
306static int recursive_loop(int remaining)
307{
308	char buf[REC_STACK_SIZE];
309
310	/* Make sure compiler does not optimize this away. */
311	memset(buf, (remaining & 0xff) | 0x1, REC_STACK_SIZE);
312	if (!remaining)
313		return 0;
314	else
315		return recursive_loop(remaining - 1);
316}
317
318static void do_nothing(void)
319{
320	return;
321}
322
323/* Must immediately follow do_nothing for size calculuations to work out. */
324static void do_overwritten(void)
325{
326	pr_info("do_overwritten wasn't overwritten!\n");
327	return;
328}
329
330static noinline void corrupt_stack(void)
331{
332	/* Use default char array length that triggers stack protection. */
333	char data[8];
334
335	memset((void *)data, 0, 64);
336}
337
338static void execute_location(void *dst)
339{
340	void (*func)(void) = dst;
341
342	pr_info("attempting ok execution at %p\n", do_nothing);
343	do_nothing();
344
345	memcpy(dst, do_nothing, EXEC_SIZE);
346	flush_icache_range((unsigned long)dst, (unsigned long)dst + EXEC_SIZE);
347	pr_info("attempting bad execution at %p\n", func);
348	func();
349}
350
351static void execute_user_location(void *dst)
352{
353	/* Intentionally crossing kernel/user memory boundary. */
354	void (*func)(void) = dst;
355
356	pr_info("attempting ok execution at %p\n", do_nothing);
357	do_nothing();
358
359	if (copy_to_user((void __user *)dst, do_nothing, EXEC_SIZE))
360		return;
361	flush_icache_range((unsigned long)dst, (unsigned long)dst + EXEC_SIZE);
362	pr_info("attempting bad execution at %p\n", func);
363	func();
364}
365
366static void lkdtm_do_action(enum ctype which)
367{
368	switch (which) {
369	case CT_PANIC:
370		panic("dumptest");
371		break;
372	case CT_BUG:
373		BUG();
374		break;
375	case CT_WARNING:
376		WARN_ON(1);
377		break;
378	case CT_EXCEPTION:
379		*((int *) 0) = 0;
380		break;
381	case CT_LOOP:
382		for (;;)
383			;
384		break;
385	case CT_OVERFLOW:
386		(void) recursive_loop(recur_count);
387		break;
388	case CT_CORRUPT_STACK:
389		corrupt_stack();
390		break;
391	case CT_UNALIGNED_LOAD_STORE_WRITE: {
392		static u8 data[5] __attribute__((aligned(4))) = {1, 2,
393				3, 4, 5};
394		u32 *p;
395		u32 val = 0x12345678;
396
397		p = (u32 *)(data + 1);
398		if (*p == 0)
399			val = 0x87654321;
400		*p = val;
401		 break;
402	}
403	case CT_OVERWRITE_ALLOCATION: {
404		size_t len = 1020;
405		u32 *data = kmalloc(len, GFP_KERNEL);
406
407		data[1024 / sizeof(u32)] = 0x12345678;
408		kfree(data);
409		break;
410	}
411	case CT_WRITE_AFTER_FREE: {
 
412		size_t len = 1024;
413		u32 *data = kmalloc(len, GFP_KERNEL);
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
414
415		kfree(data);
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
416		schedule();
417		memset(data, 0x78, len);
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
418		break;
419	}
420	case CT_SOFTLOCKUP:
421		preempt_disable();
422		for (;;)
423			cpu_relax();
424		break;
425	case CT_HARDLOCKUP:
426		local_irq_disable();
427		for (;;)
428			cpu_relax();
429		break;
430	case CT_SPINLOCKUP:
431		/* Must be called twice to trigger. */
432		spin_lock(&lock_me_up);
433		/* Let sparse know we intended to exit holding the lock. */
434		__release(&lock_me_up);
435		break;
436	case CT_HUNG_TASK:
437		set_current_state(TASK_UNINTERRUPTIBLE);
438		schedule();
439		break;
440	case CT_EXEC_DATA:
441		execute_location(data_area);
442		break;
443	case CT_EXEC_STACK: {
444		u8 stack_area[EXEC_SIZE];
445		execute_location(stack_area);
446		break;
447	}
448	case CT_EXEC_KMALLOC: {
449		u32 *kmalloc_area = kmalloc(EXEC_SIZE, GFP_KERNEL);
450		execute_location(kmalloc_area);
451		kfree(kmalloc_area);
452		break;
453	}
454	case CT_EXEC_VMALLOC: {
455		u32 *vmalloc_area = vmalloc(EXEC_SIZE);
456		execute_location(vmalloc_area);
457		vfree(vmalloc_area);
458		break;
459	}
460	case CT_EXEC_USERSPACE: {
461		unsigned long user_addr;
462
463		user_addr = vm_mmap(NULL, 0, PAGE_SIZE,
464				    PROT_READ | PROT_WRITE | PROT_EXEC,
465				    MAP_ANONYMOUS | MAP_PRIVATE, 0);
466		if (user_addr >= TASK_SIZE) {
467			pr_warn("Failed to allocate user memory\n");
468			return;
469		}
470		execute_user_location((void *)user_addr);
471		vm_munmap(user_addr, PAGE_SIZE);
472		break;
473	}
474	case CT_ACCESS_USERSPACE: {
475		unsigned long user_addr, tmp;
476		unsigned long *ptr;
477
478		user_addr = vm_mmap(NULL, 0, PAGE_SIZE,
479				    PROT_READ | PROT_WRITE | PROT_EXEC,
480				    MAP_ANONYMOUS | MAP_PRIVATE, 0);
481		if (user_addr >= TASK_SIZE) {
482			pr_warn("Failed to allocate user memory\n");
483			return;
484		}
485
 
 
 
 
 
 
486		ptr = (unsigned long *)user_addr;
487
488		pr_info("attempting bad read at %p\n", ptr);
489		tmp = *ptr;
490		tmp += 0xc0dec0de;
491
492		pr_info("attempting bad write at %p\n", ptr);
493		*ptr = tmp;
494
495		vm_munmap(user_addr, PAGE_SIZE);
496
497		break;
498	}
499	case CT_WRITE_RO: {
500		unsigned long *ptr;
 
501
502		ptr = (unsigned long *)&rodata;
 
503
504		pr_info("attempting bad write at %p\n", ptr);
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
505		*ptr ^= 0xabcd1234;
506
507		break;
508	}
509	case CT_WRITE_KERN: {
510		size_t size;
511		unsigned char *ptr;
512
513		size = (unsigned long)do_overwritten -
514		       (unsigned long)do_nothing;
515		ptr = (unsigned char *)do_overwritten;
516
517		pr_info("attempting bad %zu byte write at %p\n", size, ptr);
518		memcpy(ptr, (unsigned char *)do_nothing, size);
519		flush_icache_range((unsigned long)ptr,
520				   (unsigned long)(ptr + size));
521
522		do_overwritten();
523		break;
524	}
 
 
 
 
 
 
 
 
 
 
 
525	case CT_NONE:
526	default:
527		break;
528	}
529
530}
531
532static void lkdtm_handler(void)
533{
534	unsigned long flags;
535	bool do_it = false;
536
537	spin_lock_irqsave(&count_lock, flags);
538	count--;
539	pr_info("Crash point %s of type %s hit, trigger in %d rounds\n",
540		cp_name_to_str(cpoint), cp_type_to_str(cptype), count);
541
542	if (count == 0) {
543		do_it = true;
544		count = cpoint_count;
545	}
546	spin_unlock_irqrestore(&count_lock, flags);
547
548	if (do_it)
549		lkdtm_do_action(cptype);
550}
551
552static int lkdtm_register_cpoint(enum cname which)
553{
554	int ret;
555
556	cpoint = CN_INVALID;
557	if (lkdtm.entry != NULL)
558		unregister_jprobe(&lkdtm);
559
560	switch (which) {
561	case CN_DIRECT:
562		lkdtm_do_action(cptype);
563		return 0;
564	case CN_INT_HARDWARE_ENTRY:
565		lkdtm.kp.symbol_name = "do_IRQ";
566		lkdtm.entry = (kprobe_opcode_t*) jp_do_irq;
567		break;
568	case CN_INT_HW_IRQ_EN:
569		lkdtm.kp.symbol_name = "handle_IRQ_event";
570		lkdtm.entry = (kprobe_opcode_t*) jp_handle_irq_event;
571		break;
572	case CN_INT_TASKLET_ENTRY:
573		lkdtm.kp.symbol_name = "tasklet_action";
574		lkdtm.entry = (kprobe_opcode_t*) jp_tasklet_action;
575		break;
576	case CN_FS_DEVRW:
577		lkdtm.kp.symbol_name = "ll_rw_block";
578		lkdtm.entry = (kprobe_opcode_t*) jp_ll_rw_block;
579		break;
580	case CN_MEM_SWAPOUT:
581		lkdtm.kp.symbol_name = "shrink_inactive_list";
582		lkdtm.entry = (kprobe_opcode_t*) jp_shrink_inactive_list;
583		break;
584	case CN_TIMERADD:
585		lkdtm.kp.symbol_name = "hrtimer_start";
586		lkdtm.entry = (kprobe_opcode_t*) jp_hrtimer_start;
587		break;
588	case CN_SCSI_DISPATCH_CMD:
589		lkdtm.kp.symbol_name = "scsi_dispatch_cmd";
590		lkdtm.entry = (kprobe_opcode_t*) jp_scsi_dispatch_cmd;
591		break;
592	case CN_IDE_CORE_CP:
593#ifdef CONFIG_IDE
594		lkdtm.kp.symbol_name = "generic_ide_ioctl";
595		lkdtm.entry = (kprobe_opcode_t*) jp_generic_ide_ioctl;
596#else
597		pr_info("Crash point not available\n");
598		return -EINVAL;
599#endif
600		break;
601	default:
602		pr_info("Invalid Crash Point\n");
603		return -EINVAL;
604	}
605
606	cpoint = which;
607	if ((ret = register_jprobe(&lkdtm)) < 0) {
608		pr_info("Couldn't register jprobe\n");
609		cpoint = CN_INVALID;
610	}
611
612	return ret;
613}
614
615static ssize_t do_register_entry(enum cname which, struct file *f,
616		const char __user *user_buf, size_t count, loff_t *off)
617{
618	char *buf;
619	int err;
620
621	if (count >= PAGE_SIZE)
622		return -EINVAL;
623
624	buf = (char *)__get_free_page(GFP_KERNEL);
625	if (!buf)
626		return -ENOMEM;
627	if (copy_from_user(buf, user_buf, count)) {
628		free_page((unsigned long) buf);
629		return -EFAULT;
630	}
631	/* NULL-terminate and remove enter */
632	buf[count] = '\0';
633	strim(buf);
634
635	cptype = parse_cp_type(buf, count);
636	free_page((unsigned long) buf);
637
638	if (cptype == CT_NONE)
639		return -EINVAL;
640
641	err = lkdtm_register_cpoint(which);
642	if (err < 0)
643		return err;
644
645	*off += count;
646
647	return count;
648}
649
650/* Generic read callback that just prints out the available crash types */
651static ssize_t lkdtm_debugfs_read(struct file *f, char __user *user_buf,
652		size_t count, loff_t *off)
653{
654	char *buf;
655	int i, n, out;
656
657	buf = (char *)__get_free_page(GFP_KERNEL);
658	if (buf == NULL)
659		return -ENOMEM;
660
661	n = snprintf(buf, PAGE_SIZE, "Available crash types:\n");
662	for (i = 0; i < ARRAY_SIZE(cp_type); i++)
663		n += snprintf(buf + n, PAGE_SIZE - n, "%s\n", cp_type[i]);
664	buf[n] = '\0';
665
666	out = simple_read_from_buffer(user_buf, count, off,
667				      buf, n);
668	free_page((unsigned long) buf);
669
670	return out;
671}
672
673static int lkdtm_debugfs_open(struct inode *inode, struct file *file)
674{
675	return 0;
676}
677
678
679static ssize_t int_hardware_entry(struct file *f, const char __user *buf,
680		size_t count, loff_t *off)
681{
682	return do_register_entry(CN_INT_HARDWARE_ENTRY, f, buf, count, off);
683}
684
685static ssize_t int_hw_irq_en(struct file *f, const char __user *buf,
686		size_t count, loff_t *off)
687{
688	return do_register_entry(CN_INT_HW_IRQ_EN, f, buf, count, off);
689}
690
691static ssize_t int_tasklet_entry(struct file *f, const char __user *buf,
692		size_t count, loff_t *off)
693{
694	return do_register_entry(CN_INT_TASKLET_ENTRY, f, buf, count, off);
695}
696
697static ssize_t fs_devrw_entry(struct file *f, const char __user *buf,
698		size_t count, loff_t *off)
699{
700	return do_register_entry(CN_FS_DEVRW, f, buf, count, off);
701}
702
703static ssize_t mem_swapout_entry(struct file *f, const char __user *buf,
704		size_t count, loff_t *off)
705{
706	return do_register_entry(CN_MEM_SWAPOUT, f, buf, count, off);
707}
708
709static ssize_t timeradd_entry(struct file *f, const char __user *buf,
710		size_t count, loff_t *off)
711{
712	return do_register_entry(CN_TIMERADD, f, buf, count, off);
713}
714
715static ssize_t scsi_dispatch_cmd_entry(struct file *f,
716		const char __user *buf, size_t count, loff_t *off)
717{
718	return do_register_entry(CN_SCSI_DISPATCH_CMD, f, buf, count, off);
719}
720
721static ssize_t ide_core_cp_entry(struct file *f, const char __user *buf,
722		size_t count, loff_t *off)
723{
724	return do_register_entry(CN_IDE_CORE_CP, f, buf, count, off);
725}
726
727/* Special entry to just crash directly. Available without KPROBEs */
728static ssize_t direct_entry(struct file *f, const char __user *user_buf,
729		size_t count, loff_t *off)
730{
731	enum ctype type;
732	char *buf;
733
734	if (count >= PAGE_SIZE)
735		return -EINVAL;
736	if (count < 1)
737		return -EINVAL;
738
739	buf = (char *)__get_free_page(GFP_KERNEL);
740	if (!buf)
741		return -ENOMEM;
742	if (copy_from_user(buf, user_buf, count)) {
743		free_page((unsigned long) buf);
744		return -EFAULT;
745	}
746	/* NULL-terminate and remove enter */
747	buf[count] = '\0';
748	strim(buf);
749
750	type = parse_cp_type(buf, count);
751	free_page((unsigned long) buf);
752	if (type == CT_NONE)
753		return -EINVAL;
754
755	pr_info("Performing direct entry %s\n", cp_type_to_str(type));
756	lkdtm_do_action(type);
757	*off += count;
758
759	return count;
760}
761
762struct crash_entry {
763	const char *name;
764	const struct file_operations fops;
765};
766
767static const struct crash_entry crash_entries[] = {
768	{"DIRECT", {.read = lkdtm_debugfs_read,
769			.llseek = generic_file_llseek,
770			.open = lkdtm_debugfs_open,
771			.write = direct_entry} },
772	{"INT_HARDWARE_ENTRY", {.read = lkdtm_debugfs_read,
773			.llseek = generic_file_llseek,
774			.open = lkdtm_debugfs_open,
775			.write = int_hardware_entry} },
776	{"INT_HW_IRQ_EN", {.read = lkdtm_debugfs_read,
777			.llseek = generic_file_llseek,
778			.open = lkdtm_debugfs_open,
779			.write = int_hw_irq_en} },
780	{"INT_TASKLET_ENTRY", {.read = lkdtm_debugfs_read,
781			.llseek = generic_file_llseek,
782			.open = lkdtm_debugfs_open,
783			.write = int_tasklet_entry} },
784	{"FS_DEVRW", {.read = lkdtm_debugfs_read,
785			.llseek = generic_file_llseek,
786			.open = lkdtm_debugfs_open,
787			.write = fs_devrw_entry} },
788	{"MEM_SWAPOUT", {.read = lkdtm_debugfs_read,
789			.llseek = generic_file_llseek,
790			.open = lkdtm_debugfs_open,
791			.write = mem_swapout_entry} },
792	{"TIMERADD", {.read = lkdtm_debugfs_read,
793			.llseek = generic_file_llseek,
794			.open = lkdtm_debugfs_open,
795			.write = timeradd_entry} },
796	{"SCSI_DISPATCH_CMD", {.read = lkdtm_debugfs_read,
797			.llseek = generic_file_llseek,
798			.open = lkdtm_debugfs_open,
799			.write = scsi_dispatch_cmd_entry} },
800	{"IDE_CORE_CP",	{.read = lkdtm_debugfs_read,
801			.llseek = generic_file_llseek,
802			.open = lkdtm_debugfs_open,
803			.write = ide_core_cp_entry} },
804};
805
806static struct dentry *lkdtm_debugfs_root;
807
808static int __init lkdtm_module_init(void)
809{
810	int ret = -EINVAL;
811	int n_debugfs_entries = 1; /* Assume only the direct entry */
812	int i;
813
 
 
 
814	/* Register debugfs interface */
815	lkdtm_debugfs_root = debugfs_create_dir("provoke-crash", NULL);
816	if (!lkdtm_debugfs_root) {
817		pr_err("creating root dir failed\n");
818		return -ENODEV;
819	}
820
821#ifdef CONFIG_KPROBES
822	n_debugfs_entries = ARRAY_SIZE(crash_entries);
823#endif
824
825	for (i = 0; i < n_debugfs_entries; i++) {
826		const struct crash_entry *cur = &crash_entries[i];
827		struct dentry *de;
828
829		de = debugfs_create_file(cur->name, 0644, lkdtm_debugfs_root,
830				NULL, &cur->fops);
831		if (de == NULL) {
832			pr_err("could not create %s\n", cur->name);
833			goto out_err;
834		}
835	}
836
837	if (lkdtm_parse_commandline() == -EINVAL) {
838		pr_info("Invalid command\n");
839		goto out_err;
840	}
841
842	if (cpoint != CN_INVALID && cptype != CT_NONE) {
843		ret = lkdtm_register_cpoint(cpoint);
844		if (ret < 0) {
845			pr_info("Invalid crash point %d\n", cpoint);
846			goto out_err;
847		}
848		pr_info("Crash point %s of type %s registered\n",
849			cpoint_name, cpoint_type);
850	} else {
851		pr_info("No crash points registered, enable through debugfs\n");
852	}
853
854	return 0;
855
856out_err:
857	debugfs_remove_recursive(lkdtm_debugfs_root);
858	return ret;
859}
860
861static void __exit lkdtm_module_exit(void)
862{
863	debugfs_remove_recursive(lkdtm_debugfs_root);
864
865	unregister_jprobe(&lkdtm);
866	pr_info("Crash point unregistered\n");
867}
868
869module_init(lkdtm_module_init);
870module_exit(lkdtm_module_exit);
871
872MODULE_LICENSE("GPL");
v4.6
   1/*
   2 * Kprobe module for testing crash dumps
   3 *
   4 * This program is free software; you can redistribute it and/or modify
   5 * it under the terms of the GNU General Public License as published by
   6 * the Free Software Foundation; either version 2 of the License, or
   7 * (at your option) any later version.
   8 *
   9 * This program is distributed in the hope that it will be useful,
  10 * but WITHOUT ANY WARRANTY; without even the implied warranty of
  11 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
  12 * GNU General Public License for more details.
  13 *
  14 * You should have received a copy of the GNU General Public License
  15 * along with this program; if not, write to the Free Software
  16 * Foundation, Inc., 59 Temple Place - Suite 330, Boston, MA 02111-1307, USA.
  17 *
  18 * Copyright (C) IBM Corporation, 2006
  19 *
  20 * Author: Ankita Garg <ankita@in.ibm.com>
  21 *
  22 * This module induces system failures at predefined crashpoints to
  23 * evaluate the reliability of crash dumps obtained using different dumping
  24 * solutions.
  25 *
  26 * It is adapted from the Linux Kernel Dump Test Tool by
  27 * Fernando Luis Vazquez Cao <http://lkdtt.sourceforge.net>
  28 *
  29 * Debugfs support added by Simon Kagstrom <simon.kagstrom@netinsight.net>
  30 *
  31 * See Documentation/fault-injection/provoke-crashes.txt for instructions
  32 */
  33#define pr_fmt(fmt) KBUILD_MODNAME ": " fmt
  34
  35#include <linux/kernel.h>
  36#include <linux/fs.h>
  37#include <linux/module.h>
  38#include <linux/buffer_head.h>
  39#include <linux/kprobes.h>
  40#include <linux/list.h>
  41#include <linux/init.h>
  42#include <linux/interrupt.h>
  43#include <linux/hrtimer.h>
  44#include <linux/slab.h>
  45#include <scsi/scsi_cmnd.h>
  46#include <linux/debugfs.h>
  47#include <linux/vmalloc.h>
  48#include <linux/mman.h>
  49#include <asm/cacheflush.h>
  50
  51#ifdef CONFIG_IDE
  52#include <linux/ide.h>
  53#endif
  54
  55/*
  56 * Make sure our attempts to over run the kernel stack doesn't trigger
  57 * a compiler warning when CONFIG_FRAME_WARN is set. Then make sure we
  58 * recurse past the end of THREAD_SIZE by default.
  59 */
  60#if defined(CONFIG_FRAME_WARN) && (CONFIG_FRAME_WARN > 0)
  61#define REC_STACK_SIZE (CONFIG_FRAME_WARN / 2)
  62#else
  63#define REC_STACK_SIZE (THREAD_SIZE / 8)
  64#endif
  65#define REC_NUM_DEFAULT ((THREAD_SIZE / REC_STACK_SIZE) * 2)
  66
  67#define DEFAULT_COUNT 10
  68#define EXEC_SIZE 64
  69
  70enum cname {
  71	CN_INVALID,
  72	CN_INT_HARDWARE_ENTRY,
  73	CN_INT_HW_IRQ_EN,
  74	CN_INT_TASKLET_ENTRY,
  75	CN_FS_DEVRW,
  76	CN_MEM_SWAPOUT,
  77	CN_TIMERADD,
  78	CN_SCSI_DISPATCH_CMD,
  79	CN_IDE_CORE_CP,
  80	CN_DIRECT,
  81};
  82
  83enum ctype {
  84	CT_NONE,
  85	CT_PANIC,
  86	CT_BUG,
  87	CT_WARNING,
  88	CT_EXCEPTION,
  89	CT_LOOP,
  90	CT_OVERFLOW,
  91	CT_CORRUPT_STACK,
  92	CT_UNALIGNED_LOAD_STORE_WRITE,
  93	CT_OVERWRITE_ALLOCATION,
  94	CT_WRITE_AFTER_FREE,
  95	CT_READ_AFTER_FREE,
  96	CT_WRITE_BUDDY_AFTER_FREE,
  97	CT_READ_BUDDY_AFTER_FREE,
  98	CT_SOFTLOCKUP,
  99	CT_HARDLOCKUP,
 100	CT_SPINLOCKUP,
 101	CT_HUNG_TASK,
 102	CT_EXEC_DATA,
 103	CT_EXEC_STACK,
 104	CT_EXEC_KMALLOC,
 105	CT_EXEC_VMALLOC,
 106	CT_EXEC_USERSPACE,
 107	CT_ACCESS_USERSPACE,
 108	CT_WRITE_RO,
 109	CT_WRITE_RO_AFTER_INIT,
 110	CT_WRITE_KERN,
 111	CT_WRAP_ATOMIC
 112};
 113
 114static char* cp_name[] = {
 115	"INT_HARDWARE_ENTRY",
 116	"INT_HW_IRQ_EN",
 117	"INT_TASKLET_ENTRY",
 118	"FS_DEVRW",
 119	"MEM_SWAPOUT",
 120	"TIMERADD",
 121	"SCSI_DISPATCH_CMD",
 122	"IDE_CORE_CP",
 123	"DIRECT",
 124};
 125
 126static char* cp_type[] = {
 127	"PANIC",
 128	"BUG",
 129	"WARNING",
 130	"EXCEPTION",
 131	"LOOP",
 132	"OVERFLOW",
 133	"CORRUPT_STACK",
 134	"UNALIGNED_LOAD_STORE_WRITE",
 135	"OVERWRITE_ALLOCATION",
 136	"WRITE_AFTER_FREE",
 137	"READ_AFTER_FREE",
 138	"WRITE_BUDDY_AFTER_FREE",
 139	"READ_BUDDY_AFTER_FREE",
 140	"SOFTLOCKUP",
 141	"HARDLOCKUP",
 142	"SPINLOCKUP",
 143	"HUNG_TASK",
 144	"EXEC_DATA",
 145	"EXEC_STACK",
 146	"EXEC_KMALLOC",
 147	"EXEC_VMALLOC",
 148	"EXEC_USERSPACE",
 149	"ACCESS_USERSPACE",
 150	"WRITE_RO",
 151	"WRITE_RO_AFTER_INIT",
 152	"WRITE_KERN",
 153	"WRAP_ATOMIC"
 154};
 155
 156static struct jprobe lkdtm;
 157
 158static int lkdtm_parse_commandline(void);
 159static void lkdtm_handler(void);
 160
 161static char* cpoint_name;
 162static char* cpoint_type;
 163static int cpoint_count = DEFAULT_COUNT;
 164static int recur_count = REC_NUM_DEFAULT;
 165
 166static enum cname cpoint = CN_INVALID;
 167static enum ctype cptype = CT_NONE;
 168static int count = DEFAULT_COUNT;
 169static DEFINE_SPINLOCK(count_lock);
 170static DEFINE_SPINLOCK(lock_me_up);
 171
 172static u8 data_area[EXEC_SIZE];
 173
 174static const unsigned long rodata = 0xAA55AA55;
 175static unsigned long ro_after_init __ro_after_init = 0x55AA5500;
 176
 177module_param(recur_count, int, 0644);
 178MODULE_PARM_DESC(recur_count, " Recursion level for the stack overflow test");
 179module_param(cpoint_name, charp, 0444);
 180MODULE_PARM_DESC(cpoint_name, " Crash Point, where kernel is to be crashed");
 181module_param(cpoint_type, charp, 0444);
 182MODULE_PARM_DESC(cpoint_type, " Crash Point Type, action to be taken on "\
 183				"hitting the crash point");
 184module_param(cpoint_count, int, 0644);
 185MODULE_PARM_DESC(cpoint_count, " Crash Point Count, number of times the "\
 186				"crash point is to be hit to trigger action");
 187
 188static unsigned int jp_do_irq(unsigned int irq)
 189{
 190	lkdtm_handler();
 191	jprobe_return();
 192	return 0;
 193}
 194
 195static irqreturn_t jp_handle_irq_event(unsigned int irq,
 196				       struct irqaction *action)
 197{
 198	lkdtm_handler();
 199	jprobe_return();
 200	return 0;
 201}
 202
 203static void jp_tasklet_action(struct softirq_action *a)
 204{
 205	lkdtm_handler();
 206	jprobe_return();
 207}
 208
 209static void jp_ll_rw_block(int rw, int nr, struct buffer_head *bhs[])
 210{
 211	lkdtm_handler();
 212	jprobe_return();
 213}
 214
 215struct scan_control;
 216
 217static unsigned long jp_shrink_inactive_list(unsigned long max_scan,
 218					     struct zone *zone,
 219					     struct scan_control *sc)
 220{
 221	lkdtm_handler();
 222	jprobe_return();
 223	return 0;
 224}
 225
 226static int jp_hrtimer_start(struct hrtimer *timer, ktime_t tim,
 227			    const enum hrtimer_mode mode)
 228{
 229	lkdtm_handler();
 230	jprobe_return();
 231	return 0;
 232}
 233
 234static int jp_scsi_dispatch_cmd(struct scsi_cmnd *cmd)
 235{
 236	lkdtm_handler();
 237	jprobe_return();
 238	return 0;
 239}
 240
 241#ifdef CONFIG_IDE
 242static int jp_generic_ide_ioctl(ide_drive_t *drive, struct file *file,
 243			struct block_device *bdev, unsigned int cmd,
 244			unsigned long arg)
 245{
 246	lkdtm_handler();
 247	jprobe_return();
 248	return 0;
 249}
 250#endif
 251
 252/* Return the crashpoint number or NONE if the name is invalid */
 253static enum ctype parse_cp_type(const char *what, size_t count)
 254{
 255	int i;
 256
 257	for (i = 0; i < ARRAY_SIZE(cp_type); i++) {
 258		if (!strcmp(what, cp_type[i]))
 259			return i + 1;
 260	}
 261
 262	return CT_NONE;
 263}
 264
 265static const char *cp_type_to_str(enum ctype type)
 266{
 267	if (type == CT_NONE || type < 0 || type > ARRAY_SIZE(cp_type))
 268		return "None";
 269
 270	return cp_type[type - 1];
 271}
 272
 273static const char *cp_name_to_str(enum cname name)
 274{
 275	if (name == CN_INVALID || name < 0 || name > ARRAY_SIZE(cp_name))
 276		return "INVALID";
 277
 278	return cp_name[name - 1];
 279}
 280
 281
 282static int lkdtm_parse_commandline(void)
 283{
 284	int i;
 285	unsigned long flags;
 286
 287	if (cpoint_count < 1 || recur_count < 1)
 288		return -EINVAL;
 289
 290	spin_lock_irqsave(&count_lock, flags);
 291	count = cpoint_count;
 292	spin_unlock_irqrestore(&count_lock, flags);
 293
 294	/* No special parameters */
 295	if (!cpoint_type && !cpoint_name)
 296		return 0;
 297
 298	/* Neither or both of these need to be set */
 299	if (!cpoint_type || !cpoint_name)
 300		return -EINVAL;
 301
 302	cptype = parse_cp_type(cpoint_type, strlen(cpoint_type));
 303	if (cptype == CT_NONE)
 304		return -EINVAL;
 305
 306	for (i = 0; i < ARRAY_SIZE(cp_name); i++) {
 307		if (!strcmp(cpoint_name, cp_name[i])) {
 308			cpoint = i + 1;
 309			return 0;
 310		}
 311	}
 312
 313	/* Could not find a valid crash point */
 314	return -EINVAL;
 315}
 316
 317static int recursive_loop(int remaining)
 318{
 319	char buf[REC_STACK_SIZE];
 320
 321	/* Make sure compiler does not optimize this away. */
 322	memset(buf, (remaining & 0xff) | 0x1, REC_STACK_SIZE);
 323	if (!remaining)
 324		return 0;
 325	else
 326		return recursive_loop(remaining - 1);
 327}
 328
 329static void do_nothing(void)
 330{
 331	return;
 332}
 333
 334/* Must immediately follow do_nothing for size calculuations to work out. */
 335static void do_overwritten(void)
 336{
 337	pr_info("do_overwritten wasn't overwritten!\n");
 338	return;
 339}
 340
 341static noinline void corrupt_stack(void)
 342{
 343	/* Use default char array length that triggers stack protection. */
 344	char data[8];
 345
 346	memset((void *)data, 0, 64);
 347}
 348
 349static void noinline execute_location(void *dst)
 350{
 351	void (*func)(void) = dst;
 352
 353	pr_info("attempting ok execution at %p\n", do_nothing);
 354	do_nothing();
 355
 356	memcpy(dst, do_nothing, EXEC_SIZE);
 357	flush_icache_range((unsigned long)dst, (unsigned long)dst + EXEC_SIZE);
 358	pr_info("attempting bad execution at %p\n", func);
 359	func();
 360}
 361
 362static void execute_user_location(void *dst)
 363{
 364	/* Intentionally crossing kernel/user memory boundary. */
 365	void (*func)(void) = dst;
 366
 367	pr_info("attempting ok execution at %p\n", do_nothing);
 368	do_nothing();
 369
 370	if (copy_to_user((void __user *)dst, do_nothing, EXEC_SIZE))
 371		return;
 372	flush_icache_range((unsigned long)dst, (unsigned long)dst + EXEC_SIZE);
 373	pr_info("attempting bad execution at %p\n", func);
 374	func();
 375}
 376
 377static void lkdtm_do_action(enum ctype which)
 378{
 379	switch (which) {
 380	case CT_PANIC:
 381		panic("dumptest");
 382		break;
 383	case CT_BUG:
 384		BUG();
 385		break;
 386	case CT_WARNING:
 387		WARN_ON(1);
 388		break;
 389	case CT_EXCEPTION:
 390		*((int *) 0) = 0;
 391		break;
 392	case CT_LOOP:
 393		for (;;)
 394			;
 395		break;
 396	case CT_OVERFLOW:
 397		(void) recursive_loop(recur_count);
 398		break;
 399	case CT_CORRUPT_STACK:
 400		corrupt_stack();
 401		break;
 402	case CT_UNALIGNED_LOAD_STORE_WRITE: {
 403		static u8 data[5] __attribute__((aligned(4))) = {1, 2,
 404				3, 4, 5};
 405		u32 *p;
 406		u32 val = 0x12345678;
 407
 408		p = (u32 *)(data + 1);
 409		if (*p == 0)
 410			val = 0x87654321;
 411		*p = val;
 412		 break;
 413	}
 414	case CT_OVERWRITE_ALLOCATION: {
 415		size_t len = 1020;
 416		u32 *data = kmalloc(len, GFP_KERNEL);
 417
 418		data[1024 / sizeof(u32)] = 0x12345678;
 419		kfree(data);
 420		break;
 421	}
 422	case CT_WRITE_AFTER_FREE: {
 423		int *base, *again;
 424		size_t len = 1024;
 425		/*
 426		 * The slub allocator uses the first word to store the free
 427		 * pointer in some configurations. Use the middle of the
 428		 * allocation to avoid running into the freelist
 429		 */
 430		size_t offset = (len / sizeof(*base)) / 2;
 431
 432		base = kmalloc(len, GFP_KERNEL);
 433		pr_info("Allocated memory %p-%p\n", base, &base[offset * 2]);
 434		pr_info("Attempting bad write to freed memory at %p\n",
 435			&base[offset]);
 436		kfree(base);
 437		base[offset] = 0x0abcdef0;
 438		/* Attempt to notice the overwrite. */
 439		again = kmalloc(len, GFP_KERNEL);
 440		kfree(again);
 441		if (again != base)
 442			pr_info("Hmm, didn't get the same memory range.\n");
 443
 444		break;
 445	}
 446	case CT_READ_AFTER_FREE: {
 447		int *base, *val, saw;
 448		size_t len = 1024;
 449		/*
 450		 * The slub allocator uses the first word to store the free
 451		 * pointer in some configurations. Use the middle of the
 452		 * allocation to avoid running into the freelist
 453		 */
 454		size_t offset = (len / sizeof(*base)) / 2;
 455
 456		base = kmalloc(len, GFP_KERNEL);
 457		if (!base)
 458			break;
 459
 460		val = kmalloc(len, GFP_KERNEL);
 461		if (!val) {
 462			kfree(base);
 463			break;
 464		}
 465
 466		*val = 0x12345678;
 467		base[offset] = *val;
 468		pr_info("Value in memory before free: %x\n", base[offset]);
 469
 470		kfree(base);
 471
 472		pr_info("Attempting bad read from freed memory\n");
 473		saw = base[offset];
 474		if (saw != *val) {
 475			/* Good! Poisoning happened, so declare a win. */
 476			pr_info("Memory correctly poisoned (%x)\n", saw);
 477			BUG();
 478		}
 479		pr_info("Memory was not poisoned\n");
 480
 481		kfree(val);
 482		break;
 483	}
 484	case CT_WRITE_BUDDY_AFTER_FREE: {
 485		unsigned long p = __get_free_page(GFP_KERNEL);
 486		if (!p)
 487			break;
 488		pr_info("Writing to the buddy page before free\n");
 489		memset((void *)p, 0x3, PAGE_SIZE);
 490		free_page(p);
 491		schedule();
 492		pr_info("Attempting bad write to the buddy page after free\n");
 493		memset((void *)p, 0x78, PAGE_SIZE);
 494		/* Attempt to notice the overwrite. */
 495		p = __get_free_page(GFP_KERNEL);
 496		free_page(p);
 497		schedule();
 498
 499		break;
 500	}
 501	case CT_READ_BUDDY_AFTER_FREE: {
 502		unsigned long p = __get_free_page(GFP_KERNEL);
 503		int saw, *val;
 504		int *base;
 505
 506		if (!p)
 507			break;
 508
 509		val = kmalloc(1024, GFP_KERNEL);
 510		if (!val) {
 511			free_page(p);
 512			break;
 513		}
 514
 515		base = (int *)p;
 516
 517		*val = 0x12345678;
 518		base[0] = *val;
 519		pr_info("Value in memory before free: %x\n", base[0]);
 520		free_page(p);
 521		pr_info("Attempting to read from freed memory\n");
 522		saw = base[0];
 523		if (saw != *val) {
 524			/* Good! Poisoning happened, so declare a win. */
 525			pr_info("Memory correctly poisoned (%x)\n", saw);
 526			BUG();
 527		}
 528		pr_info("Buddy page was not poisoned\n");
 529
 530		kfree(val);
 531		break;
 532	}
 533	case CT_SOFTLOCKUP:
 534		preempt_disable();
 535		for (;;)
 536			cpu_relax();
 537		break;
 538	case CT_HARDLOCKUP:
 539		local_irq_disable();
 540		for (;;)
 541			cpu_relax();
 542		break;
 543	case CT_SPINLOCKUP:
 544		/* Must be called twice to trigger. */
 545		spin_lock(&lock_me_up);
 546		/* Let sparse know we intended to exit holding the lock. */
 547		__release(&lock_me_up);
 548		break;
 549	case CT_HUNG_TASK:
 550		set_current_state(TASK_UNINTERRUPTIBLE);
 551		schedule();
 552		break;
 553	case CT_EXEC_DATA:
 554		execute_location(data_area);
 555		break;
 556	case CT_EXEC_STACK: {
 557		u8 stack_area[EXEC_SIZE];
 558		execute_location(stack_area);
 559		break;
 560	}
 561	case CT_EXEC_KMALLOC: {
 562		u32 *kmalloc_area = kmalloc(EXEC_SIZE, GFP_KERNEL);
 563		execute_location(kmalloc_area);
 564		kfree(kmalloc_area);
 565		break;
 566	}
 567	case CT_EXEC_VMALLOC: {
 568		u32 *vmalloc_area = vmalloc(EXEC_SIZE);
 569		execute_location(vmalloc_area);
 570		vfree(vmalloc_area);
 571		break;
 572	}
 573	case CT_EXEC_USERSPACE: {
 574		unsigned long user_addr;
 575
 576		user_addr = vm_mmap(NULL, 0, PAGE_SIZE,
 577				    PROT_READ | PROT_WRITE | PROT_EXEC,
 578				    MAP_ANONYMOUS | MAP_PRIVATE, 0);
 579		if (user_addr >= TASK_SIZE) {
 580			pr_warn("Failed to allocate user memory\n");
 581			return;
 582		}
 583		execute_user_location((void *)user_addr);
 584		vm_munmap(user_addr, PAGE_SIZE);
 585		break;
 586	}
 587	case CT_ACCESS_USERSPACE: {
 588		unsigned long user_addr, tmp = 0;
 589		unsigned long *ptr;
 590
 591		user_addr = vm_mmap(NULL, 0, PAGE_SIZE,
 592				    PROT_READ | PROT_WRITE | PROT_EXEC,
 593				    MAP_ANONYMOUS | MAP_PRIVATE, 0);
 594		if (user_addr >= TASK_SIZE) {
 595			pr_warn("Failed to allocate user memory\n");
 596			return;
 597		}
 598
 599		if (copy_to_user((void __user *)user_addr, &tmp, sizeof(tmp))) {
 600			pr_warn("copy_to_user failed\n");
 601			vm_munmap(user_addr, PAGE_SIZE);
 602			return;
 603		}
 604
 605		ptr = (unsigned long *)user_addr;
 606
 607		pr_info("attempting bad read at %p\n", ptr);
 608		tmp = *ptr;
 609		tmp += 0xc0dec0de;
 610
 611		pr_info("attempting bad write at %p\n", ptr);
 612		*ptr = tmp;
 613
 614		vm_munmap(user_addr, PAGE_SIZE);
 615
 616		break;
 617	}
 618	case CT_WRITE_RO: {
 619		/* Explicitly cast away "const" for the test. */
 620		unsigned long *ptr = (unsigned long *)&rodata;
 621
 622		pr_info("attempting bad rodata write at %p\n", ptr);
 623		*ptr ^= 0xabcd1234;
 624
 625		break;
 626	}
 627	case CT_WRITE_RO_AFTER_INIT: {
 628		unsigned long *ptr = &ro_after_init;
 629
 630		/*
 631		 * Verify we were written to during init. Since an Oops
 632		 * is considered a "success", a failure is to just skip the
 633		 * real test.
 634		 */
 635		if ((*ptr & 0xAA) != 0xAA) {
 636			pr_info("%p was NOT written during init!?\n", ptr);
 637			break;
 638		}
 639
 640		pr_info("attempting bad ro_after_init write at %p\n", ptr);
 641		*ptr ^= 0xabcd1234;
 642
 643		break;
 644	}
 645	case CT_WRITE_KERN: {
 646		size_t size;
 647		unsigned char *ptr;
 648
 649		size = (unsigned long)do_overwritten -
 650		       (unsigned long)do_nothing;
 651		ptr = (unsigned char *)do_overwritten;
 652
 653		pr_info("attempting bad %zu byte write at %p\n", size, ptr);
 654		memcpy(ptr, (unsigned char *)do_nothing, size);
 655		flush_icache_range((unsigned long)ptr,
 656				   (unsigned long)(ptr + size));
 657
 658		do_overwritten();
 659		break;
 660	}
 661	case CT_WRAP_ATOMIC: {
 662		atomic_t under = ATOMIC_INIT(INT_MIN);
 663		atomic_t over = ATOMIC_INIT(INT_MAX);
 664
 665		pr_info("attempting atomic underflow\n");
 666		atomic_dec(&under);
 667		pr_info("attempting atomic overflow\n");
 668		atomic_inc(&over);
 669
 670		return;
 671	}
 672	case CT_NONE:
 673	default:
 674		break;
 675	}
 676
 677}
 678
 679static void lkdtm_handler(void)
 680{
 681	unsigned long flags;
 682	bool do_it = false;
 683
 684	spin_lock_irqsave(&count_lock, flags);
 685	count--;
 686	pr_info("Crash point %s of type %s hit, trigger in %d rounds\n",
 687		cp_name_to_str(cpoint), cp_type_to_str(cptype), count);
 688
 689	if (count == 0) {
 690		do_it = true;
 691		count = cpoint_count;
 692	}
 693	spin_unlock_irqrestore(&count_lock, flags);
 694
 695	if (do_it)
 696		lkdtm_do_action(cptype);
 697}
 698
 699static int lkdtm_register_cpoint(enum cname which)
 700{
 701	int ret;
 702
 703	cpoint = CN_INVALID;
 704	if (lkdtm.entry != NULL)
 705		unregister_jprobe(&lkdtm);
 706
 707	switch (which) {
 708	case CN_DIRECT:
 709		lkdtm_do_action(cptype);
 710		return 0;
 711	case CN_INT_HARDWARE_ENTRY:
 712		lkdtm.kp.symbol_name = "do_IRQ";
 713		lkdtm.entry = (kprobe_opcode_t*) jp_do_irq;
 714		break;
 715	case CN_INT_HW_IRQ_EN:
 716		lkdtm.kp.symbol_name = "handle_IRQ_event";
 717		lkdtm.entry = (kprobe_opcode_t*) jp_handle_irq_event;
 718		break;
 719	case CN_INT_TASKLET_ENTRY:
 720		lkdtm.kp.symbol_name = "tasklet_action";
 721		lkdtm.entry = (kprobe_opcode_t*) jp_tasklet_action;
 722		break;
 723	case CN_FS_DEVRW:
 724		lkdtm.kp.symbol_name = "ll_rw_block";
 725		lkdtm.entry = (kprobe_opcode_t*) jp_ll_rw_block;
 726		break;
 727	case CN_MEM_SWAPOUT:
 728		lkdtm.kp.symbol_name = "shrink_inactive_list";
 729		lkdtm.entry = (kprobe_opcode_t*) jp_shrink_inactive_list;
 730		break;
 731	case CN_TIMERADD:
 732		lkdtm.kp.symbol_name = "hrtimer_start";
 733		lkdtm.entry = (kprobe_opcode_t*) jp_hrtimer_start;
 734		break;
 735	case CN_SCSI_DISPATCH_CMD:
 736		lkdtm.kp.symbol_name = "scsi_dispatch_cmd";
 737		lkdtm.entry = (kprobe_opcode_t*) jp_scsi_dispatch_cmd;
 738		break;
 739	case CN_IDE_CORE_CP:
 740#ifdef CONFIG_IDE
 741		lkdtm.kp.symbol_name = "generic_ide_ioctl";
 742		lkdtm.entry = (kprobe_opcode_t*) jp_generic_ide_ioctl;
 743#else
 744		pr_info("Crash point not available\n");
 745		return -EINVAL;
 746#endif
 747		break;
 748	default:
 749		pr_info("Invalid Crash Point\n");
 750		return -EINVAL;
 751	}
 752
 753	cpoint = which;
 754	if ((ret = register_jprobe(&lkdtm)) < 0) {
 755		pr_info("Couldn't register jprobe\n");
 756		cpoint = CN_INVALID;
 757	}
 758
 759	return ret;
 760}
 761
 762static ssize_t do_register_entry(enum cname which, struct file *f,
 763		const char __user *user_buf, size_t count, loff_t *off)
 764{
 765	char *buf;
 766	int err;
 767
 768	if (count >= PAGE_SIZE)
 769		return -EINVAL;
 770
 771	buf = (char *)__get_free_page(GFP_KERNEL);
 772	if (!buf)
 773		return -ENOMEM;
 774	if (copy_from_user(buf, user_buf, count)) {
 775		free_page((unsigned long) buf);
 776		return -EFAULT;
 777	}
 778	/* NULL-terminate and remove enter */
 779	buf[count] = '\0';
 780	strim(buf);
 781
 782	cptype = parse_cp_type(buf, count);
 783	free_page((unsigned long) buf);
 784
 785	if (cptype == CT_NONE)
 786		return -EINVAL;
 787
 788	err = lkdtm_register_cpoint(which);
 789	if (err < 0)
 790		return err;
 791
 792	*off += count;
 793
 794	return count;
 795}
 796
 797/* Generic read callback that just prints out the available crash types */
 798static ssize_t lkdtm_debugfs_read(struct file *f, char __user *user_buf,
 799		size_t count, loff_t *off)
 800{
 801	char *buf;
 802	int i, n, out;
 803
 804	buf = (char *)__get_free_page(GFP_KERNEL);
 805	if (buf == NULL)
 806		return -ENOMEM;
 807
 808	n = snprintf(buf, PAGE_SIZE, "Available crash types:\n");
 809	for (i = 0; i < ARRAY_SIZE(cp_type); i++)
 810		n += snprintf(buf + n, PAGE_SIZE - n, "%s\n", cp_type[i]);
 811	buf[n] = '\0';
 812
 813	out = simple_read_from_buffer(user_buf, count, off,
 814				      buf, n);
 815	free_page((unsigned long) buf);
 816
 817	return out;
 818}
 819
 820static int lkdtm_debugfs_open(struct inode *inode, struct file *file)
 821{
 822	return 0;
 823}
 824
 825
 826static ssize_t int_hardware_entry(struct file *f, const char __user *buf,
 827		size_t count, loff_t *off)
 828{
 829	return do_register_entry(CN_INT_HARDWARE_ENTRY, f, buf, count, off);
 830}
 831
 832static ssize_t int_hw_irq_en(struct file *f, const char __user *buf,
 833		size_t count, loff_t *off)
 834{
 835	return do_register_entry(CN_INT_HW_IRQ_EN, f, buf, count, off);
 836}
 837
 838static ssize_t int_tasklet_entry(struct file *f, const char __user *buf,
 839		size_t count, loff_t *off)
 840{
 841	return do_register_entry(CN_INT_TASKLET_ENTRY, f, buf, count, off);
 842}
 843
 844static ssize_t fs_devrw_entry(struct file *f, const char __user *buf,
 845		size_t count, loff_t *off)
 846{
 847	return do_register_entry(CN_FS_DEVRW, f, buf, count, off);
 848}
 849
 850static ssize_t mem_swapout_entry(struct file *f, const char __user *buf,
 851		size_t count, loff_t *off)
 852{
 853	return do_register_entry(CN_MEM_SWAPOUT, f, buf, count, off);
 854}
 855
 856static ssize_t timeradd_entry(struct file *f, const char __user *buf,
 857		size_t count, loff_t *off)
 858{
 859	return do_register_entry(CN_TIMERADD, f, buf, count, off);
 860}
 861
 862static ssize_t scsi_dispatch_cmd_entry(struct file *f,
 863		const char __user *buf, size_t count, loff_t *off)
 864{
 865	return do_register_entry(CN_SCSI_DISPATCH_CMD, f, buf, count, off);
 866}
 867
 868static ssize_t ide_core_cp_entry(struct file *f, const char __user *buf,
 869		size_t count, loff_t *off)
 870{
 871	return do_register_entry(CN_IDE_CORE_CP, f, buf, count, off);
 872}
 873
 874/* Special entry to just crash directly. Available without KPROBEs */
 875static ssize_t direct_entry(struct file *f, const char __user *user_buf,
 876		size_t count, loff_t *off)
 877{
 878	enum ctype type;
 879	char *buf;
 880
 881	if (count >= PAGE_SIZE)
 882		return -EINVAL;
 883	if (count < 1)
 884		return -EINVAL;
 885
 886	buf = (char *)__get_free_page(GFP_KERNEL);
 887	if (!buf)
 888		return -ENOMEM;
 889	if (copy_from_user(buf, user_buf, count)) {
 890		free_page((unsigned long) buf);
 891		return -EFAULT;
 892	}
 893	/* NULL-terminate and remove enter */
 894	buf[count] = '\0';
 895	strim(buf);
 896
 897	type = parse_cp_type(buf, count);
 898	free_page((unsigned long) buf);
 899	if (type == CT_NONE)
 900		return -EINVAL;
 901
 902	pr_info("Performing direct entry %s\n", cp_type_to_str(type));
 903	lkdtm_do_action(type);
 904	*off += count;
 905
 906	return count;
 907}
 908
 909struct crash_entry {
 910	const char *name;
 911	const struct file_operations fops;
 912};
 913
 914static const struct crash_entry crash_entries[] = {
 915	{"DIRECT", {.read = lkdtm_debugfs_read,
 916			.llseek = generic_file_llseek,
 917			.open = lkdtm_debugfs_open,
 918			.write = direct_entry} },
 919	{"INT_HARDWARE_ENTRY", {.read = lkdtm_debugfs_read,
 920			.llseek = generic_file_llseek,
 921			.open = lkdtm_debugfs_open,
 922			.write = int_hardware_entry} },
 923	{"INT_HW_IRQ_EN", {.read = lkdtm_debugfs_read,
 924			.llseek = generic_file_llseek,
 925			.open = lkdtm_debugfs_open,
 926			.write = int_hw_irq_en} },
 927	{"INT_TASKLET_ENTRY", {.read = lkdtm_debugfs_read,
 928			.llseek = generic_file_llseek,
 929			.open = lkdtm_debugfs_open,
 930			.write = int_tasklet_entry} },
 931	{"FS_DEVRW", {.read = lkdtm_debugfs_read,
 932			.llseek = generic_file_llseek,
 933			.open = lkdtm_debugfs_open,
 934			.write = fs_devrw_entry} },
 935	{"MEM_SWAPOUT", {.read = lkdtm_debugfs_read,
 936			.llseek = generic_file_llseek,
 937			.open = lkdtm_debugfs_open,
 938			.write = mem_swapout_entry} },
 939	{"TIMERADD", {.read = lkdtm_debugfs_read,
 940			.llseek = generic_file_llseek,
 941			.open = lkdtm_debugfs_open,
 942			.write = timeradd_entry} },
 943	{"SCSI_DISPATCH_CMD", {.read = lkdtm_debugfs_read,
 944			.llseek = generic_file_llseek,
 945			.open = lkdtm_debugfs_open,
 946			.write = scsi_dispatch_cmd_entry} },
 947	{"IDE_CORE_CP",	{.read = lkdtm_debugfs_read,
 948			.llseek = generic_file_llseek,
 949			.open = lkdtm_debugfs_open,
 950			.write = ide_core_cp_entry} },
 951};
 952
 953static struct dentry *lkdtm_debugfs_root;
 954
 955static int __init lkdtm_module_init(void)
 956{
 957	int ret = -EINVAL;
 958	int n_debugfs_entries = 1; /* Assume only the direct entry */
 959	int i;
 960
 961	/* Make sure we can write to __ro_after_init values during __init */
 962	ro_after_init |= 0xAA;
 963
 964	/* Register debugfs interface */
 965	lkdtm_debugfs_root = debugfs_create_dir("provoke-crash", NULL);
 966	if (!lkdtm_debugfs_root) {
 967		pr_err("creating root dir failed\n");
 968		return -ENODEV;
 969	}
 970
 971#ifdef CONFIG_KPROBES
 972	n_debugfs_entries = ARRAY_SIZE(crash_entries);
 973#endif
 974
 975	for (i = 0; i < n_debugfs_entries; i++) {
 976		const struct crash_entry *cur = &crash_entries[i];
 977		struct dentry *de;
 978
 979		de = debugfs_create_file(cur->name, 0644, lkdtm_debugfs_root,
 980				NULL, &cur->fops);
 981		if (de == NULL) {
 982			pr_err("could not create %s\n", cur->name);
 983			goto out_err;
 984		}
 985	}
 986
 987	if (lkdtm_parse_commandline() == -EINVAL) {
 988		pr_info("Invalid command\n");
 989		goto out_err;
 990	}
 991
 992	if (cpoint != CN_INVALID && cptype != CT_NONE) {
 993		ret = lkdtm_register_cpoint(cpoint);
 994		if (ret < 0) {
 995			pr_info("Invalid crash point %d\n", cpoint);
 996			goto out_err;
 997		}
 998		pr_info("Crash point %s of type %s registered\n",
 999			cpoint_name, cpoint_type);
1000	} else {
1001		pr_info("No crash points registered, enable through debugfs\n");
1002	}
1003
1004	return 0;
1005
1006out_err:
1007	debugfs_remove_recursive(lkdtm_debugfs_root);
1008	return ret;
1009}
1010
1011static void __exit lkdtm_module_exit(void)
1012{
1013	debugfs_remove_recursive(lkdtm_debugfs_root);
1014
1015	unregister_jprobe(&lkdtm);
1016	pr_info("Crash point unregistered\n");
1017}
1018
1019module_init(lkdtm_module_init);
1020module_exit(lkdtm_module_exit);
1021
1022MODULE_LICENSE("GPL");
1023MODULE_DESCRIPTION("Kprobe module for testing crash dumps");