lkdtm_core.c 30.7 KB
Newer Older
1
/*
K
Kees Cook 已提交
2 3 4 5 6
 * Linux Kernel Dump Test Module for testing kernel crashes conditions:
 * induces system failures at predefined crashpoints and under predefined
 * operational conditions in order to evaluate the reliability of kernel
 * sanity checking and crash dumps obtained using different dumping
 * solutions.
7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28
 *
 * This program is free software; you can redistribute it and/or modify
 * it under the terms of the GNU General Public License as published by
 * the Free Software Foundation; either version 2 of the License, or
 * (at your option) any later version.
 *
 * This program is distributed in the hope that it will be useful,
 * but WITHOUT ANY WARRANTY; without even the implied warranty of
 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
 * GNU General Public License for more details.
 *
 * You should have received a copy of the GNU General Public License
 * along with this program; if not, write to the Free Software
 * Foundation, Inc., 59 Temple Place - Suite 330, Boston, MA 02111-1307, USA.
 *
 * Copyright (C) IBM Corporation, 2006
 *
 * Author: Ankita Garg <ankita@in.ibm.com>
 *
 * It is adapted from the Linux Kernel Dump Test Tool by
 * Fernando Luis Vazquez Cao <http://lkdtt.sourceforge.net>
 *
29
 * Debugfs support added by Simon Kagstrom <simon.kagstrom@netinsight.net>
30
 *
31
 * See Documentation/fault-injection/provoke-crashes.txt for instructions
32
 */
K
Kees Cook 已提交
33
#define pr_fmt(fmt) "lkdtm: " fmt
34 35

#include <linux/kernel.h>
36
#include <linux/fs.h>
37
#include <linux/module.h>
38
#include <linux/buffer_head.h>
39
#include <linux/kprobes.h>
40
#include <linux/list.h>
41 42
#include <linux/init.h>
#include <linux/interrupt.h>
43
#include <linux/hrtimer.h>
44
#include <linux/slab.h>
45
#include <scsi/scsi_cmnd.h>
46
#include <linux/debugfs.h>
K
Kees Cook 已提交
47
#include <linux/vmalloc.h>
48
#include <linux/mman.h>
K
Kees Cook 已提交
49
#include <asm/cacheflush.h>
50 51 52 53 54

#ifdef CONFIG_IDE
#include <linux/ide.h>
#endif

55 56
#include "lkdtm.h"

57 58 59 60 61 62 63 64 65 66 67 68
/*
 * Make sure our attempts to over run the kernel stack doesn't trigger
 * a compiler warning when CONFIG_FRAME_WARN is set. Then make sure we
 * recurse past the end of THREAD_SIZE by default.
 */
#if defined(CONFIG_FRAME_WARN) && (CONFIG_FRAME_WARN > 0)
#define REC_STACK_SIZE (CONFIG_FRAME_WARN / 2)
#else
#define REC_STACK_SIZE (THREAD_SIZE / 8)
#endif
#define REC_NUM_DEFAULT ((THREAD_SIZE / REC_STACK_SIZE) * 2)

69
#define DEFAULT_COUNT 10
K
Kees Cook 已提交
70
#define EXEC_SIZE 64
71 72

enum cname {
N
Namhyung Kim 已提交
73 74 75 76 77 78 79 80 81 82
	CN_INVALID,
	CN_INT_HARDWARE_ENTRY,
	CN_INT_HW_IRQ_EN,
	CN_INT_TASKLET_ENTRY,
	CN_FS_DEVRW,
	CN_MEM_SWAPOUT,
	CN_TIMERADD,
	CN_SCSI_DISPATCH_CMD,
	CN_IDE_CORE_CP,
	CN_DIRECT,
83 84 85
};

enum ctype {
N
Namhyung Kim 已提交
86 87 88
	CT_NONE,
	CT_PANIC,
	CT_BUG,
K
Kees Cook 已提交
89
	CT_WARNING,
N
Namhyung Kim 已提交
90 91 92 93 94 95 96
	CT_EXCEPTION,
	CT_LOOP,
	CT_OVERFLOW,
	CT_CORRUPT_STACK,
	CT_UNALIGNED_LOAD_STORE_WRITE,
	CT_OVERWRITE_ALLOCATION,
	CT_WRITE_AFTER_FREE,
L
Laura Abbott 已提交
97
	CT_READ_AFTER_FREE,
98 99
	CT_WRITE_BUDDY_AFTER_FREE,
	CT_READ_BUDDY_AFTER_FREE,
N
Namhyung Kim 已提交
100 101
	CT_SOFTLOCKUP,
	CT_HARDLOCKUP,
K
Kees Cook 已提交
102
	CT_SPINLOCKUP,
N
Namhyung Kim 已提交
103
	CT_HUNG_TASK,
K
Kees Cook 已提交
104 105 106 107
	CT_EXEC_DATA,
	CT_EXEC_STACK,
	CT_EXEC_KMALLOC,
	CT_EXEC_VMALLOC,
108
	CT_EXEC_RODATA,
109 110 111
	CT_EXEC_USERSPACE,
	CT_ACCESS_USERSPACE,
	CT_WRITE_RO,
112
	CT_WRITE_RO_AFTER_INIT,
K
Kees Cook 已提交
113
	CT_WRITE_KERN,
K
Kees Cook 已提交
114 115 116 117 118 119 120 121
	CT_WRAP_ATOMIC,
	CT_USERCOPY_HEAP_SIZE_TO,
	CT_USERCOPY_HEAP_SIZE_FROM,
	CT_USERCOPY_HEAP_FLAG_TO,
	CT_USERCOPY_HEAP_FLAG_FROM,
	CT_USERCOPY_STACK_FRAME_TO,
	CT_USERCOPY_STACK_FRAME_FROM,
	CT_USERCOPY_STACK_BEYOND,
122 123 124 125 126 127 128 129 130 131
};

static char* cp_name[] = {
	"INT_HARDWARE_ENTRY",
	"INT_HW_IRQ_EN",
	"INT_TASKLET_ENTRY",
	"FS_DEVRW",
	"MEM_SWAPOUT",
	"TIMERADD",
	"SCSI_DISPATCH_CMD",
132 133
	"IDE_CORE_CP",
	"DIRECT",
134 135 136 137 138
};

static char* cp_type[] = {
	"PANIC",
	"BUG",
K
Kees Cook 已提交
139
	"WARNING",
140 141
	"EXCEPTION",
	"LOOP",
142 143 144 145 146
	"OVERFLOW",
	"CORRUPT_STACK",
	"UNALIGNED_LOAD_STORE_WRITE",
	"OVERWRITE_ALLOCATION",
	"WRITE_AFTER_FREE",
L
Laura Abbott 已提交
147
	"READ_AFTER_FREE",
148 149
	"WRITE_BUDDY_AFTER_FREE",
	"READ_BUDDY_AFTER_FREE",
150 151
	"SOFTLOCKUP",
	"HARDLOCKUP",
K
Kees Cook 已提交
152
	"SPINLOCKUP",
153
	"HUNG_TASK",
K
Kees Cook 已提交
154 155 156 157
	"EXEC_DATA",
	"EXEC_STACK",
	"EXEC_KMALLOC",
	"EXEC_VMALLOC",
158
	"EXEC_RODATA",
159 160 161
	"EXEC_USERSPACE",
	"ACCESS_USERSPACE",
	"WRITE_RO",
162
	"WRITE_RO_AFTER_INIT",
K
Kees Cook 已提交
163
	"WRITE_KERN",
K
Kees Cook 已提交
164 165 166 167 168 169 170 171
	"WRAP_ATOMIC",
	"USERCOPY_HEAP_SIZE_TO",
	"USERCOPY_HEAP_SIZE_FROM",
	"USERCOPY_HEAP_FLAG_TO",
	"USERCOPY_HEAP_FLAG_FROM",
	"USERCOPY_STACK_FRAME_TO",
	"USERCOPY_STACK_FRAME_FROM",
	"USERCOPY_STACK_BEYOND",
172 173 174 175 176 177 178
};

static struct jprobe lkdtm;

static int lkdtm_parse_commandline(void);
static void lkdtm_handler(void);

179 180
static char* cpoint_name;
static char* cpoint_type;
181 182
static int cpoint_count = DEFAULT_COUNT;
static int recur_count = REC_NUM_DEFAULT;
K
Kees Cook 已提交
183 184
static int alloc_size = 1024;
static size_t cache_size;
185

N
Namhyung Kim 已提交
186 187
static enum cname cpoint = CN_INVALID;
static enum ctype cptype = CT_NONE;
188
static int count = DEFAULT_COUNT;
189
static DEFINE_SPINLOCK(count_lock);
K
Kees Cook 已提交
190
static DEFINE_SPINLOCK(lock_me_up);
191

K
Kees Cook 已提交
192
static u8 data_area[EXEC_SIZE];
K
Kees Cook 已提交
193
static struct kmem_cache *bad_cache;
K
Kees Cook 已提交
194

K
Kees Cook 已提交
195
static const unsigned char test_text[] = "This is a test.\n";
196
static const unsigned long rodata = 0xAA55AA55;
197
static unsigned long ro_after_init __ro_after_init = 0x55AA5500;
198

199
module_param(recur_count, int, 0644);
200
MODULE_PARM_DESC(recur_count, " Recursion level for the stack overflow test");
201
module_param(cpoint_name, charp, 0444);
202
MODULE_PARM_DESC(cpoint_name, " Crash Point, where kernel is to be crashed");
203
module_param(cpoint_type, charp, 0444);
204 205 206 207 208
MODULE_PARM_DESC(cpoint_type, " Crash Point Type, action to be taken on "\
				"hitting the crash point");
module_param(cpoint_count, int, 0644);
MODULE_PARM_DESC(cpoint_count, " Crash Point Count, number of times the "\
				"crash point is to be hit to trigger action");
K
Kees Cook 已提交
209 210 211
module_param(alloc_size, int, 0644);
MODULE_PARM_DESC(alloc_size, " Size of allocation for user copy tests "\
			     "(from 1 to PAGE_SIZE)");
212

A
Adrian Bunk 已提交
213
static unsigned int jp_do_irq(unsigned int irq)
214 215 216 217 218 219
{
	lkdtm_handler();
	jprobe_return();
	return 0;
}

A
Adrian Bunk 已提交
220 221
static irqreturn_t jp_handle_irq_event(unsigned int irq,
				       struct irqaction *action)
222 223 224 225 226 227
{
	lkdtm_handler();
	jprobe_return();
	return 0;
}

A
Adrian Bunk 已提交
228
static void jp_tasklet_action(struct softirq_action *a)
229 230 231 232 233
{
	lkdtm_handler();
	jprobe_return();
}

A
Adrian Bunk 已提交
234
static void jp_ll_rw_block(int rw, int nr, struct buffer_head *bhs[])
235 236 237 238 239 240 241
{
	lkdtm_handler();
	jprobe_return();
}

struct scan_control;

A
Adrian Bunk 已提交
242 243 244
static unsigned long jp_shrink_inactive_list(unsigned long max_scan,
					     struct zone *zone,
					     struct scan_control *sc)
245 246 247 248 249 250
{
	lkdtm_handler();
	jprobe_return();
	return 0;
}

A
Adrian Bunk 已提交
251 252
static int jp_hrtimer_start(struct hrtimer *timer, ktime_t tim,
			    const enum hrtimer_mode mode)
253 254 255 256 257 258
{
	lkdtm_handler();
	jprobe_return();
	return 0;
}

A
Adrian Bunk 已提交
259
static int jp_scsi_dispatch_cmd(struct scsi_cmnd *cmd)
260 261 262 263 264 265 266
{
	lkdtm_handler();
	jprobe_return();
	return 0;
}

#ifdef CONFIG_IDE
267
static int jp_generic_ide_ioctl(ide_drive_t *drive, struct file *file,
268 269 270 271 272 273 274 275 276
			struct block_device *bdev, unsigned int cmd,
			unsigned long arg)
{
	lkdtm_handler();
	jprobe_return();
	return 0;
}
#endif

277 278 279 280 281 282 283 284 285 286
/* Return the crashpoint number or NONE if the name is invalid */
static enum ctype parse_cp_type(const char *what, size_t count)
{
	int i;

	for (i = 0; i < ARRAY_SIZE(cp_type); i++) {
		if (!strcmp(what, cp_type[i]))
			return i + 1;
	}

N
Namhyung Kim 已提交
287
	return CT_NONE;
288 289 290 291
}

static const char *cp_type_to_str(enum ctype type)
{
N
Namhyung Kim 已提交
292
	if (type == CT_NONE || type < 0 || type > ARRAY_SIZE(cp_type))
293 294 295 296 297 298 299
		return "None";

	return cp_type[type - 1];
}

static const char *cp_name_to_str(enum cname name)
{
N
Namhyung Kim 已提交
300
	if (name == CN_INVALID || name < 0 || name > ARRAY_SIZE(cp_name))
301 302 303 304 305 306
		return "INVALID";

	return cp_name[name - 1];
}


307 308 309
static int lkdtm_parse_commandline(void)
{
	int i;
310
	unsigned long flags;
311

312
	if (cpoint_count < 1 || recur_count < 1)
313 314
		return -EINVAL;

315
	spin_lock_irqsave(&count_lock, flags);
316
	count = cpoint_count;
317
	spin_unlock_irqrestore(&count_lock, flags);
318 319 320 321 322 323 324 325 326 327

	/* No special parameters */
	if (!cpoint_type && !cpoint_name)
		return 0;

	/* Neither or both of these need to be set */
	if (!cpoint_type || !cpoint_name)
		return -EINVAL;

	cptype = parse_cp_type(cpoint_type, strlen(cpoint_type));
N
Namhyung Kim 已提交
328
	if (cptype == CT_NONE)
329 330 331
		return -EINVAL;

	for (i = 0; i < ARRAY_SIZE(cp_name); i++) {
332 333
		if (!strcmp(cpoint_name, cp_name[i])) {
			cpoint = i + 1;
334
			return 0;
335 336 337
		}
	}

338 339
	/* Could not find a valid crash point */
	return -EINVAL;
340 341
}

342
static int recursive_loop(int remaining)
343
{
344
	char buf[REC_STACK_SIZE];
345

346 347 348
	/* Make sure compiler does not optimize this away. */
	memset(buf, (remaining & 0xff) | 0x1, REC_STACK_SIZE);
	if (!remaining)
349 350
		return 0;
	else
351
		return recursive_loop(remaining - 1);
352 353
}

K
Kees Cook 已提交
354 355 356 357 358
static void do_nothing(void)
{
	return;
}

K
Kees Cook 已提交
359 360 361 362 363 364 365
/* Must immediately follow do_nothing for size calculuations to work out. */
static void do_overwritten(void)
{
	pr_info("do_overwritten wasn't overwritten!\n");
	return;
}

K
Kees Cook 已提交
366 367 368 369 370 371 372 373
static noinline void corrupt_stack(void)
{
	/* Use default char array length that triggers stack protection. */
	char data[8];

	memset((void *)data, 0, 64);
}

374
static noinline void execute_location(void *dst, bool write)
K
Kees Cook 已提交
375 376 377
{
	void (*func)(void) = dst;

378 379 380
	pr_info("attempting ok execution at %p\n", do_nothing);
	do_nothing();

381 382 383 384 385
	if (write) {
		memcpy(dst, do_nothing, EXEC_SIZE);
		flush_icache_range((unsigned long)dst,
				   (unsigned long)dst + EXEC_SIZE);
	}
386
	pr_info("attempting bad execution at %p\n", func);
K
Kees Cook 已提交
387 388 389
	func();
}

390 391
static void execute_user_location(void *dst)
{
K
Kees Cook 已提交
392
	/* Intentionally crossing kernel/user memory boundary. */
393 394
	void (*func)(void) = dst;

395 396 397
	pr_info("attempting ok execution at %p\n", do_nothing);
	do_nothing();

K
Kees Cook 已提交
398
	if (copy_to_user((void __user *)dst, do_nothing, EXEC_SIZE))
399
		return;
400 401
	flush_icache_range((unsigned long)dst, (unsigned long)dst + EXEC_SIZE);
	pr_info("attempting bad execution at %p\n", func);
402 403 404
	func();
}

K
Kees Cook 已提交
405 406 407 408 409 410 411 412 413 414 415 416 417 418 419 420 421 422 423 424 425 426 427 428 429 430 431 432 433 434 435 436 437 438 439 440 441 442 443 444 445 446 447 448 449 450 451 452 453 454 455 456 457 458 459 460 461 462 463 464 465 466 467 468 469 470 471 472 473 474 475 476 477 478 479 480 481 482 483 484 485 486 487 488 489 490 491 492 493 494 495 496 497 498 499 500 501 502 503 504 505 506 507 508 509 510 511 512 513 514 515 516 517 518 519 520 521 522 523 524 525 526 527 528 529 530 531 532 533 534 535 536 537 538 539 540 541 542 543 544 545 546 547 548 549 550 551 552 553 554 555 556 557 558 559 560 561 562 563 564 565 566 567 568 569 570 571 572 573 574 575 576 577 578 579 580 581 582 583 584 585 586 587 588 589 590 591 592 593 594 595 596 597 598 599 600 601 602 603 604 605 606 607 608 609 610 611 612 613 614 615 616 617 618 619 620 621 622 623 624 625 626
/*
 * Instead of adding -Wno-return-local-addr, just pass the stack address
 * through a function to obfuscate it from the compiler.
 */
static noinline unsigned char *trick_compiler(unsigned char *stack)
{
	return stack + 0;
}

static noinline unsigned char *do_usercopy_stack_callee(int value)
{
	unsigned char buf[32];
	int i;

	/* Exercise stack to avoid everything living in registers. */
	for (i = 0; i < sizeof(buf); i++) {
		buf[i] = value & 0xff;
	}

	return trick_compiler(buf);
}

static noinline void do_usercopy_stack(bool to_user, bool bad_frame)
{
	unsigned long user_addr;
	unsigned char good_stack[32];
	unsigned char *bad_stack;
	int i;

	/* Exercise stack to avoid everything living in registers. */
	for (i = 0; i < sizeof(good_stack); i++)
		good_stack[i] = test_text[i % sizeof(test_text)];

	/* This is a pointer to outside our current stack frame. */
	if (bad_frame) {
		bad_stack = do_usercopy_stack_callee(alloc_size);
	} else {
		/* Put start address just inside stack. */
		bad_stack = task_stack_page(current) + THREAD_SIZE;
		bad_stack -= sizeof(unsigned long);
	}

	user_addr = vm_mmap(NULL, 0, PAGE_SIZE,
			    PROT_READ | PROT_WRITE | PROT_EXEC,
			    MAP_ANONYMOUS | MAP_PRIVATE, 0);
	if (user_addr >= TASK_SIZE) {
		pr_warn("Failed to allocate user memory\n");
		return;
	}

	if (to_user) {
		pr_info("attempting good copy_to_user of local stack\n");
		if (copy_to_user((void __user *)user_addr, good_stack,
				 sizeof(good_stack))) {
			pr_warn("copy_to_user failed unexpectedly?!\n");
			goto free_user;
		}

		pr_info("attempting bad copy_to_user of distant stack\n");
		if (copy_to_user((void __user *)user_addr, bad_stack,
				 sizeof(good_stack))) {
			pr_warn("copy_to_user failed, but lacked Oops\n");
			goto free_user;
		}
	} else {
		/*
		 * There isn't a safe way to not be protected by usercopy
		 * if we're going to write to another thread's stack.
		 */
		if (!bad_frame)
			goto free_user;

		pr_info("attempting good copy_from_user of local stack\n");
		if (copy_from_user(good_stack, (void __user *)user_addr,
				   sizeof(good_stack))) {
			pr_warn("copy_from_user failed unexpectedly?!\n");
			goto free_user;
		}

		pr_info("attempting bad copy_from_user of distant stack\n");
		if (copy_from_user(bad_stack, (void __user *)user_addr,
				   sizeof(good_stack))) {
			pr_warn("copy_from_user failed, but lacked Oops\n");
			goto free_user;
		}
	}

free_user:
	vm_munmap(user_addr, PAGE_SIZE);
}

static void do_usercopy_heap_size(bool to_user)
{
	unsigned long user_addr;
	unsigned char *one, *two;
	size_t size = clamp_t(int, alloc_size, 1, PAGE_SIZE);

	one = kmalloc(size, GFP_KERNEL);
	two = kmalloc(size, GFP_KERNEL);
	if (!one || !two) {
		pr_warn("Failed to allocate kernel memory\n");
		goto free_kernel;
	}

	user_addr = vm_mmap(NULL, 0, PAGE_SIZE,
			    PROT_READ | PROT_WRITE | PROT_EXEC,
			    MAP_ANONYMOUS | MAP_PRIVATE, 0);
	if (user_addr >= TASK_SIZE) {
		pr_warn("Failed to allocate user memory\n");
		goto free_kernel;
	}

	memset(one, 'A', size);
	memset(two, 'B', size);

	if (to_user) {
		pr_info("attempting good copy_to_user of correct size\n");
		if (copy_to_user((void __user *)user_addr, one, size)) {
			pr_warn("copy_to_user failed unexpectedly?!\n");
			goto free_user;
		}

		pr_info("attempting bad copy_to_user of too large size\n");
		if (copy_to_user((void __user *)user_addr, one, 2 * size)) {
			pr_warn("copy_to_user failed, but lacked Oops\n");
			goto free_user;
		}
	} else {
		pr_info("attempting good copy_from_user of correct size\n");
		if (copy_from_user(one, (void __user *)user_addr,
				   size)) {
			pr_warn("copy_from_user failed unexpectedly?!\n");
			goto free_user;
		}

		pr_info("attempting bad copy_from_user of too large size\n");
		if (copy_from_user(one, (void __user *)user_addr, 2 * size)) {
			pr_warn("copy_from_user failed, but lacked Oops\n");
			goto free_user;
		}
	}

free_user:
	vm_munmap(user_addr, PAGE_SIZE);
free_kernel:
	kfree(one);
	kfree(two);
}

static void do_usercopy_heap_flag(bool to_user)
{
	unsigned long user_addr;
	unsigned char *good_buf = NULL;
	unsigned char *bad_buf = NULL;

	/* Make sure cache was prepared. */
	if (!bad_cache) {
		pr_warn("Failed to allocate kernel cache\n");
		return;
	}

	/*
	 * Allocate one buffer from each cache (kmalloc will have the
	 * SLAB_USERCOPY flag already, but "bad_cache" won't).
	 */
	good_buf = kmalloc(cache_size, GFP_KERNEL);
	bad_buf = kmem_cache_alloc(bad_cache, GFP_KERNEL);
	if (!good_buf || !bad_buf) {
		pr_warn("Failed to allocate buffers from caches\n");
		goto free_alloc;
	}

	/* Allocate user memory we'll poke at. */
	user_addr = vm_mmap(NULL, 0, PAGE_SIZE,
			    PROT_READ | PROT_WRITE | PROT_EXEC,
			    MAP_ANONYMOUS | MAP_PRIVATE, 0);
	if (user_addr >= TASK_SIZE) {
		pr_warn("Failed to allocate user memory\n");
		goto free_alloc;
	}

	memset(good_buf, 'A', cache_size);
	memset(bad_buf, 'B', cache_size);

	if (to_user) {
		pr_info("attempting good copy_to_user with SLAB_USERCOPY\n");
		if (copy_to_user((void __user *)user_addr, good_buf,
				 cache_size)) {
			pr_warn("copy_to_user failed unexpectedly?!\n");
			goto free_user;
		}

		pr_info("attempting bad copy_to_user w/o SLAB_USERCOPY\n");
		if (copy_to_user((void __user *)user_addr, bad_buf,
				 cache_size)) {
			pr_warn("copy_to_user failed, but lacked Oops\n");
			goto free_user;
		}
	} else {
		pr_info("attempting good copy_from_user with SLAB_USERCOPY\n");
		if (copy_from_user(good_buf, (void __user *)user_addr,
				   cache_size)) {
			pr_warn("copy_from_user failed unexpectedly?!\n");
			goto free_user;
		}

		pr_info("attempting bad copy_from_user w/o SLAB_USERCOPY\n");
		if (copy_from_user(bad_buf, (void __user *)user_addr,
				   cache_size)) {
			pr_warn("copy_from_user failed, but lacked Oops\n");
			goto free_user;
		}
	}

free_user:
	vm_munmap(user_addr, PAGE_SIZE);
free_alloc:
	if (bad_buf)
		kmem_cache_free(bad_cache, bad_buf);
	kfree(good_buf);
}

627
static void lkdtm_do_action(enum ctype which)
628
{
629
	switch (which) {
N
Namhyung Kim 已提交
630
	case CT_PANIC:
631 632
		panic("dumptest");
		break;
N
Namhyung Kim 已提交
633
	case CT_BUG:
634 635
		BUG();
		break;
K
Kees Cook 已提交
636 637 638
	case CT_WARNING:
		WARN_ON(1);
		break;
N
Namhyung Kim 已提交
639
	case CT_EXCEPTION:
640 641
		*((int *) 0) = 0;
		break;
N
Namhyung Kim 已提交
642
	case CT_LOOP:
643 644 645
		for (;;)
			;
		break;
N
Namhyung Kim 已提交
646
	case CT_OVERFLOW:
647
		(void) recursive_loop(recur_count);
648
		break;
K
Kees Cook 已提交
649 650
	case CT_CORRUPT_STACK:
		corrupt_stack();
651
		break;
N
Namhyung Kim 已提交
652
	case CT_UNALIGNED_LOAD_STORE_WRITE: {
653 654 655 656 657 658 659 660 661 662 663
		static u8 data[5] __attribute__((aligned(4))) = {1, 2,
				3, 4, 5};
		u32 *p;
		u32 val = 0x12345678;

		p = (u32 *)(data + 1);
		if (*p == 0)
			val = 0x87654321;
		*p = val;
		 break;
	}
N
Namhyung Kim 已提交
664
	case CT_OVERWRITE_ALLOCATION: {
665 666 667 668 669 670 671
		size_t len = 1020;
		u32 *data = kmalloc(len, GFP_KERNEL);

		data[1024 / sizeof(u32)] = 0x12345678;
		kfree(data);
		break;
	}
N
Namhyung Kim 已提交
672
	case CT_WRITE_AFTER_FREE: {
K
Kees Cook 已提交
673
		int *base, *again;
674
		size_t len = 1024;
675 676 677 678 679 680
		/*
		 * The slub allocator uses the first word to store the free
		 * pointer in some configurations. Use the middle of the
		 * allocation to avoid running into the freelist
		 */
		size_t offset = (len / sizeof(*base)) / 2;
681

682 683 684 685
		base = kmalloc(len, GFP_KERNEL);
		pr_info("Allocated memory %p-%p\n", base, &base[offset * 2]);
		pr_info("Attempting bad write to freed memory at %p\n",
			&base[offset]);
K
Kees Cook 已提交
686
		kfree(base);
687
		base[offset] = 0x0abcdef0;
K
Kees Cook 已提交
688 689 690 691 692
		/* Attempt to notice the overwrite. */
		again = kmalloc(len, GFP_KERNEL);
		kfree(again);
		if (again != base)
			pr_info("Hmm, didn't get the same memory range.\n");
693 694 695

		break;
	}
L
Laura Abbott 已提交
696 697 698 699 700 701 702 703 704 705 706 707 708 709 710
	case CT_READ_AFTER_FREE: {
		int *base, *val, saw;
		size_t len = 1024;
		/*
		 * The slub allocator uses the first word to store the free
		 * pointer in some configurations. Use the middle of the
		 * allocation to avoid running into the freelist
		 */
		size_t offset = (len / sizeof(*base)) / 2;

		base = kmalloc(len, GFP_KERNEL);
		if (!base)
			break;

		val = kmalloc(len, GFP_KERNEL);
S
Sudip Mukherjee 已提交
711 712
		if (!val) {
			kfree(base);
L
Laura Abbott 已提交
713
			break;
S
Sudip Mukherjee 已提交
714
		}
L
Laura Abbott 已提交
715 716 717 718 719 720 721 722 723 724 725

		*val = 0x12345678;
		base[offset] = *val;
		pr_info("Value in memory before free: %x\n", base[offset]);

		kfree(base);

		pr_info("Attempting bad read from freed memory\n");
		saw = base[offset];
		if (saw != *val) {
			/* Good! Poisoning happened, so declare a win. */
K
Kees Cook 已提交
726
			pr_info("Memory correctly poisoned (%x)\n", saw);
L
Laura Abbott 已提交
727 728 729 730 731 732 733
			BUG();
		}
		pr_info("Memory was not poisoned\n");

		kfree(val);
		break;
	}
734 735 736 737 738 739 740
	case CT_WRITE_BUDDY_AFTER_FREE: {
		unsigned long p = __get_free_page(GFP_KERNEL);
		if (!p)
			break;
		pr_info("Writing to the buddy page before free\n");
		memset((void *)p, 0x3, PAGE_SIZE);
		free_page(p);
741
		schedule();
742 743
		pr_info("Attempting bad write to the buddy page after free\n");
		memset((void *)p, 0x78, PAGE_SIZE);
K
Kees Cook 已提交
744 745 746
		/* Attempt to notice the overwrite. */
		p = __get_free_page(GFP_KERNEL);
		free_page(p);
747
		schedule();
K
Kees Cook 已提交
748

749 750 751 752
		break;
	}
	case CT_READ_BUDDY_AFTER_FREE: {
		unsigned long p = __get_free_page(GFP_KERNEL);
S
Sudip Mukherjee 已提交
753
		int saw, *val;
754 755 756 757 758
		int *base;

		if (!p)
			break;

S
Sudip Mukherjee 已提交
759
		val = kmalloc(1024, GFP_KERNEL);
760 761
		if (!val) {
			free_page(p);
762
			break;
763
		}
764 765 766 767 768 769 770 771 772 773 774

		base = (int *)p;

		*val = 0x12345678;
		base[0] = *val;
		pr_info("Value in memory before free: %x\n", base[0]);
		free_page(p);
		pr_info("Attempting to read from freed memory\n");
		saw = base[0];
		if (saw != *val) {
			/* Good! Poisoning happened, so declare a win. */
K
Kees Cook 已提交
775
			pr_info("Memory correctly poisoned (%x)\n", saw);
776 777 778 779 780
			BUG();
		}
		pr_info("Buddy page was not poisoned\n");

		kfree(val);
781 782
		break;
	}
N
Namhyung Kim 已提交
783
	case CT_SOFTLOCKUP:
784 785 786 787
		preempt_disable();
		for (;;)
			cpu_relax();
		break;
N
Namhyung Kim 已提交
788
	case CT_HARDLOCKUP:
789 790 791 792
		local_irq_disable();
		for (;;)
			cpu_relax();
		break;
K
Kees Cook 已提交
793 794 795
	case CT_SPINLOCKUP:
		/* Must be called twice to trigger. */
		spin_lock(&lock_me_up);
K
Kees Cook 已提交
796 797
		/* Let sparse know we intended to exit holding the lock. */
		__release(&lock_me_up);
K
Kees Cook 已提交
798
		break;
N
Namhyung Kim 已提交
799
	case CT_HUNG_TASK:
800 801 802
		set_current_state(TASK_UNINTERRUPTIBLE);
		schedule();
		break;
K
Kees Cook 已提交
803
	case CT_EXEC_DATA:
804
		execute_location(data_area, true);
K
Kees Cook 已提交
805 806 807
		break;
	case CT_EXEC_STACK: {
		u8 stack_area[EXEC_SIZE];
808
		execute_location(stack_area, true);
K
Kees Cook 已提交
809 810 811 812
		break;
	}
	case CT_EXEC_KMALLOC: {
		u32 *kmalloc_area = kmalloc(EXEC_SIZE, GFP_KERNEL);
813
		execute_location(kmalloc_area, true);
K
Kees Cook 已提交
814 815 816 817 818
		kfree(kmalloc_area);
		break;
	}
	case CT_EXEC_VMALLOC: {
		u32 *vmalloc_area = vmalloc(EXEC_SIZE);
819
		execute_location(vmalloc_area, true);
K
Kees Cook 已提交
820 821 822
		vfree(vmalloc_area);
		break;
	}
823 824 825
	case CT_EXEC_RODATA:
		execute_location(lkdtm_rodata_do_nothing, false);
		break;
826 827 828 829 830 831 832 833 834 835 836 837 838 839 840
	case CT_EXEC_USERSPACE: {
		unsigned long user_addr;

		user_addr = vm_mmap(NULL, 0, PAGE_SIZE,
				    PROT_READ | PROT_WRITE | PROT_EXEC,
				    MAP_ANONYMOUS | MAP_PRIVATE, 0);
		if (user_addr >= TASK_SIZE) {
			pr_warn("Failed to allocate user memory\n");
			return;
		}
		execute_user_location((void *)user_addr);
		vm_munmap(user_addr, PAGE_SIZE);
		break;
	}
	case CT_ACCESS_USERSPACE: {
S
Stephen Smalley 已提交
841
		unsigned long user_addr, tmp = 0;
842 843 844 845 846 847 848 849 850 851
		unsigned long *ptr;

		user_addr = vm_mmap(NULL, 0, PAGE_SIZE,
				    PROT_READ | PROT_WRITE | PROT_EXEC,
				    MAP_ANONYMOUS | MAP_PRIVATE, 0);
		if (user_addr >= TASK_SIZE) {
			pr_warn("Failed to allocate user memory\n");
			return;
		}

S
Stephen Smalley 已提交
852 853 854 855 856 857
		if (copy_to_user((void __user *)user_addr, &tmp, sizeof(tmp))) {
			pr_warn("copy_to_user failed\n");
			vm_munmap(user_addr, PAGE_SIZE);
			return;
		}

858
		ptr = (unsigned long *)user_addr;
859 860

		pr_info("attempting bad read at %p\n", ptr);
861 862
		tmp = *ptr;
		tmp += 0xc0dec0de;
863 864

		pr_info("attempting bad write at %p\n", ptr);
865 866 867 868 869 870 871
		*ptr = tmp;

		vm_munmap(user_addr, PAGE_SIZE);

		break;
	}
	case CT_WRITE_RO: {
872 873
		/* Explicitly cast away "const" for the test. */
		unsigned long *ptr = (unsigned long *)&rodata;
874

875 876
		pr_info("attempting bad rodata write at %p\n", ptr);
		*ptr ^= 0xabcd1234;
877

878 879 880 881 882 883 884 885 886 887 888 889 890 891 892 893
		break;
	}
	case CT_WRITE_RO_AFTER_INIT: {
		unsigned long *ptr = &ro_after_init;

		/*
		 * Verify we were written to during init. Since an Oops
		 * is considered a "success", a failure is to just skip the
		 * real test.
		 */
		if ((*ptr & 0xAA) != 0xAA) {
			pr_info("%p was NOT written during init!?\n", ptr);
			break;
		}

		pr_info("attempting bad ro_after_init write at %p\n", ptr);
894 895 896 897
		*ptr ^= 0xabcd1234;

		break;
	}
K
Kees Cook 已提交
898 899 900 901 902 903 904 905 906 907 908 909 910 911 912 913
	case CT_WRITE_KERN: {
		size_t size;
		unsigned char *ptr;

		size = (unsigned long)do_overwritten -
		       (unsigned long)do_nothing;
		ptr = (unsigned char *)do_overwritten;

		pr_info("attempting bad %zu byte write at %p\n", size, ptr);
		memcpy(ptr, (unsigned char *)do_nothing, size);
		flush_icache_range((unsigned long)ptr,
				   (unsigned long)(ptr + size));

		do_overwritten();
		break;
	}
914 915 916 917 918 919 920 921 922 923 924
	case CT_WRAP_ATOMIC: {
		atomic_t under = ATOMIC_INIT(INT_MIN);
		atomic_t over = ATOMIC_INIT(INT_MAX);

		pr_info("attempting atomic underflow\n");
		atomic_dec(&under);
		pr_info("attempting atomic overflow\n");
		atomic_inc(&over);

		return;
	}
K
Kees Cook 已提交
925 926 927 928 929 930 931 932 933 934 935 936 937 938 939 940 941 942 943 944 945
	case CT_USERCOPY_HEAP_SIZE_TO:
		do_usercopy_heap_size(true);
		break;
	case CT_USERCOPY_HEAP_SIZE_FROM:
		do_usercopy_heap_size(false);
		break;
	case CT_USERCOPY_HEAP_FLAG_TO:
		do_usercopy_heap_flag(true);
		break;
	case CT_USERCOPY_HEAP_FLAG_FROM:
		do_usercopy_heap_flag(false);
		break;
	case CT_USERCOPY_STACK_FRAME_TO:
		do_usercopy_stack(true, true);
		break;
	case CT_USERCOPY_STACK_FRAME_FROM:
		do_usercopy_stack(false, true);
		break;
	case CT_USERCOPY_STACK_BEYOND:
		do_usercopy_stack(true, false);
		break;
N
Namhyung Kim 已提交
946
	case CT_NONE:
947 948 949 950 951 952 953 954
	default:
		break;
	}

}

static void lkdtm_handler(void)
{
955
	unsigned long flags;
956
	bool do_it = false;
957 958

	spin_lock_irqsave(&count_lock, flags);
959
	count--;
960 961
	pr_info("Crash point %s of type %s hit, trigger in %d rounds\n",
		cp_name_to_str(cpoint), cp_type_to_str(cptype), count);
962 963

	if (count == 0) {
964
		do_it = true;
965 966
		count = cpoint_count;
	}
967
	spin_unlock_irqrestore(&count_lock, flags);
968 969 970

	if (do_it)
		lkdtm_do_action(cptype);
971 972
}

973
static int lkdtm_register_cpoint(enum cname which)
974 975 976
{
	int ret;

N
Namhyung Kim 已提交
977
	cpoint = CN_INVALID;
978 979
	if (lkdtm.entry != NULL)
		unregister_jprobe(&lkdtm);
980

981
	switch (which) {
N
Namhyung Kim 已提交
982
	case CN_DIRECT:
983 984
		lkdtm_do_action(cptype);
		return 0;
N
Namhyung Kim 已提交
985
	case CN_INT_HARDWARE_ENTRY:
M
M. Mohan Kumar 已提交
986
		lkdtm.kp.symbol_name = "do_IRQ";
987 988
		lkdtm.entry = (kprobe_opcode_t*) jp_do_irq;
		break;
N
Namhyung Kim 已提交
989
	case CN_INT_HW_IRQ_EN:
990 991 992
		lkdtm.kp.symbol_name = "handle_IRQ_event";
		lkdtm.entry = (kprobe_opcode_t*) jp_handle_irq_event;
		break;
N
Namhyung Kim 已提交
993
	case CN_INT_TASKLET_ENTRY:
994 995 996
		lkdtm.kp.symbol_name = "tasklet_action";
		lkdtm.entry = (kprobe_opcode_t*) jp_tasklet_action;
		break;
N
Namhyung Kim 已提交
997
	case CN_FS_DEVRW:
998 999 1000
		lkdtm.kp.symbol_name = "ll_rw_block";
		lkdtm.entry = (kprobe_opcode_t*) jp_ll_rw_block;
		break;
N
Namhyung Kim 已提交
1001
	case CN_MEM_SWAPOUT:
1002 1003
		lkdtm.kp.symbol_name = "shrink_inactive_list";
		lkdtm.entry = (kprobe_opcode_t*) jp_shrink_inactive_list;
1004
		break;
N
Namhyung Kim 已提交
1005
	case CN_TIMERADD:
1006 1007 1008
		lkdtm.kp.symbol_name = "hrtimer_start";
		lkdtm.entry = (kprobe_opcode_t*) jp_hrtimer_start;
		break;
N
Namhyung Kim 已提交
1009
	case CN_SCSI_DISPATCH_CMD:
1010 1011 1012
		lkdtm.kp.symbol_name = "scsi_dispatch_cmd";
		lkdtm.entry = (kprobe_opcode_t*) jp_scsi_dispatch_cmd;
		break;
N
Namhyung Kim 已提交
1013
	case CN_IDE_CORE_CP:
1014 1015 1016 1017
#ifdef CONFIG_IDE
		lkdtm.kp.symbol_name = "generic_ide_ioctl";
		lkdtm.entry = (kprobe_opcode_t*) jp_generic_ide_ioctl;
#else
1018
		pr_info("Crash point not available\n");
1019
		return -EINVAL;
1020 1021 1022
#endif
		break;
	default:
1023
		pr_info("Invalid Crash Point\n");
1024
		return -EINVAL;
1025 1026
	}

1027
	cpoint = which;
1028
	if ((ret = register_jprobe(&lkdtm)) < 0) {
1029
		pr_info("Couldn't register jprobe\n");
N
Namhyung Kim 已提交
1030
		cpoint = CN_INVALID;
1031 1032 1033 1034 1035 1036 1037 1038 1039 1040 1041 1042 1043 1044 1045 1046 1047 1048 1049 1050 1051 1052 1053 1054 1055 1056 1057 1058
	}

	return ret;
}

static ssize_t do_register_entry(enum cname which, struct file *f,
		const char __user *user_buf, size_t count, loff_t *off)
{
	char *buf;
	int err;

	if (count >= PAGE_SIZE)
		return -EINVAL;

	buf = (char *)__get_free_page(GFP_KERNEL);
	if (!buf)
		return -ENOMEM;
	if (copy_from_user(buf, user_buf, count)) {
		free_page((unsigned long) buf);
		return -EFAULT;
	}
	/* NULL-terminate and remove enter */
	buf[count] = '\0';
	strim(buf);

	cptype = parse_cp_type(buf, count);
	free_page((unsigned long) buf);

N
Namhyung Kim 已提交
1059
	if (cptype == CT_NONE)
1060 1061 1062 1063 1064 1065 1066 1067 1068 1069 1070 1071 1072 1073 1074 1075 1076 1077 1078
		return -EINVAL;

	err = lkdtm_register_cpoint(which);
	if (err < 0)
		return err;

	*off += count;

	return count;
}

/* Generic read callback that just prints out the available crash types */
static ssize_t lkdtm_debugfs_read(struct file *f, char __user *user_buf,
		size_t count, loff_t *off)
{
	char *buf;
	int i, n, out;

	buf = (char *)__get_free_page(GFP_KERNEL);
1079 1080
	if (buf == NULL)
		return -ENOMEM;
1081 1082 1083 1084 1085 1086 1087 1088 1089 1090 1091 1092 1093 1094 1095 1096 1097 1098 1099 1100 1101 1102

	n = snprintf(buf, PAGE_SIZE, "Available crash types:\n");
	for (i = 0; i < ARRAY_SIZE(cp_type); i++)
		n += snprintf(buf + n, PAGE_SIZE - n, "%s\n", cp_type[i]);
	buf[n] = '\0';

	out = simple_read_from_buffer(user_buf, count, off,
				      buf, n);
	free_page((unsigned long) buf);

	return out;
}

static int lkdtm_debugfs_open(struct inode *inode, struct file *file)
{
	return 0;
}


static ssize_t int_hardware_entry(struct file *f, const char __user *buf,
		size_t count, loff_t *off)
{
N
Namhyung Kim 已提交
1103
	return do_register_entry(CN_INT_HARDWARE_ENTRY, f, buf, count, off);
1104 1105 1106 1107 1108
}

static ssize_t int_hw_irq_en(struct file *f, const char __user *buf,
		size_t count, loff_t *off)
{
N
Namhyung Kim 已提交
1109
	return do_register_entry(CN_INT_HW_IRQ_EN, f, buf, count, off);
1110 1111 1112 1113 1114
}

static ssize_t int_tasklet_entry(struct file *f, const char __user *buf,
		size_t count, loff_t *off)
{
N
Namhyung Kim 已提交
1115
	return do_register_entry(CN_INT_TASKLET_ENTRY, f, buf, count, off);
1116 1117 1118 1119 1120
}

static ssize_t fs_devrw_entry(struct file *f, const char __user *buf,
		size_t count, loff_t *off)
{
N
Namhyung Kim 已提交
1121
	return do_register_entry(CN_FS_DEVRW, f, buf, count, off);
1122 1123 1124 1125 1126
}

static ssize_t mem_swapout_entry(struct file *f, const char __user *buf,
		size_t count, loff_t *off)
{
N
Namhyung Kim 已提交
1127
	return do_register_entry(CN_MEM_SWAPOUT, f, buf, count, off);
1128 1129 1130 1131 1132
}

static ssize_t timeradd_entry(struct file *f, const char __user *buf,
		size_t count, loff_t *off)
{
N
Namhyung Kim 已提交
1133
	return do_register_entry(CN_TIMERADD, f, buf, count, off);
1134 1135 1136 1137 1138
}

static ssize_t scsi_dispatch_cmd_entry(struct file *f,
		const char __user *buf, size_t count, loff_t *off)
{
N
Namhyung Kim 已提交
1139
	return do_register_entry(CN_SCSI_DISPATCH_CMD, f, buf, count, off);
1140 1141 1142 1143 1144
}

static ssize_t ide_core_cp_entry(struct file *f, const char __user *buf,
		size_t count, loff_t *off)
{
N
Namhyung Kim 已提交
1145
	return do_register_entry(CN_IDE_CORE_CP, f, buf, count, off);
1146 1147 1148 1149 1150 1151 1152 1153 1154 1155 1156 1157 1158 1159 1160 1161 1162 1163 1164 1165 1166 1167 1168 1169 1170 1171 1172
}

/* Special entry to just crash directly. Available without KPROBEs */
static ssize_t direct_entry(struct file *f, const char __user *user_buf,
		size_t count, loff_t *off)
{
	enum ctype type;
	char *buf;

	if (count >= PAGE_SIZE)
		return -EINVAL;
	if (count < 1)
		return -EINVAL;

	buf = (char *)__get_free_page(GFP_KERNEL);
	if (!buf)
		return -ENOMEM;
	if (copy_from_user(buf, user_buf, count)) {
		free_page((unsigned long) buf);
		return -EFAULT;
	}
	/* NULL-terminate and remove enter */
	buf[count] = '\0';
	strim(buf);

	type = parse_cp_type(buf, count);
	free_page((unsigned long) buf);
N
Namhyung Kim 已提交
1173
	if (type == CT_NONE)
1174 1175
		return -EINVAL;

1176
	pr_info("Performing direct entry %s\n", cp_type_to_str(type));
1177 1178 1179 1180 1181 1182 1183 1184 1185 1186 1187 1188 1189
	lkdtm_do_action(type);
	*off += count;

	return count;
}

struct crash_entry {
	const char *name;
	const struct file_operations fops;
};

static const struct crash_entry crash_entries[] = {
	{"DIRECT", {.read = lkdtm_debugfs_read,
1190
			.llseek = generic_file_llseek,
1191 1192 1193
			.open = lkdtm_debugfs_open,
			.write = direct_entry} },
	{"INT_HARDWARE_ENTRY", {.read = lkdtm_debugfs_read,
1194
			.llseek = generic_file_llseek,
1195 1196 1197
			.open = lkdtm_debugfs_open,
			.write = int_hardware_entry} },
	{"INT_HW_IRQ_EN", {.read = lkdtm_debugfs_read,
1198
			.llseek = generic_file_llseek,
1199 1200 1201
			.open = lkdtm_debugfs_open,
			.write = int_hw_irq_en} },
	{"INT_TASKLET_ENTRY", {.read = lkdtm_debugfs_read,
1202
			.llseek = generic_file_llseek,
1203 1204 1205
			.open = lkdtm_debugfs_open,
			.write = int_tasklet_entry} },
	{"FS_DEVRW", {.read = lkdtm_debugfs_read,
1206
			.llseek = generic_file_llseek,
1207 1208 1209
			.open = lkdtm_debugfs_open,
			.write = fs_devrw_entry} },
	{"MEM_SWAPOUT", {.read = lkdtm_debugfs_read,
1210
			.llseek = generic_file_llseek,
1211 1212 1213
			.open = lkdtm_debugfs_open,
			.write = mem_swapout_entry} },
	{"TIMERADD", {.read = lkdtm_debugfs_read,
1214
			.llseek = generic_file_llseek,
1215 1216 1217
			.open = lkdtm_debugfs_open,
			.write = timeradd_entry} },
	{"SCSI_DISPATCH_CMD", {.read = lkdtm_debugfs_read,
1218
			.llseek = generic_file_llseek,
1219 1220 1221
			.open = lkdtm_debugfs_open,
			.write = scsi_dispatch_cmd_entry} },
	{"IDE_CORE_CP",	{.read = lkdtm_debugfs_read,
1222
			.llseek = generic_file_llseek,
1223 1224 1225 1226 1227 1228 1229 1230 1231 1232 1233 1234
			.open = lkdtm_debugfs_open,
			.write = ide_core_cp_entry} },
};

static struct dentry *lkdtm_debugfs_root;

static int __init lkdtm_module_init(void)
{
	int ret = -EINVAL;
	int n_debugfs_entries = 1; /* Assume only the direct entry */
	int i;

1235 1236 1237
	/* Make sure we can write to __ro_after_init values during __init */
	ro_after_init |= 0xAA;

K
Kees Cook 已提交
1238 1239 1240 1241 1242
	/* Prepare cache that lacks SLAB_USERCOPY flag. */
	cache_size = clamp_t(int, alloc_size, 1, PAGE_SIZE);
	bad_cache = kmem_cache_create("lkdtm-no-usercopy", cache_size, 0,
				      0, NULL);

1243 1244 1245
	/* Register debugfs interface */
	lkdtm_debugfs_root = debugfs_create_dir("provoke-crash", NULL);
	if (!lkdtm_debugfs_root) {
1246
		pr_err("creating root dir failed\n");
1247 1248 1249 1250 1251 1252 1253 1254 1255 1256 1257 1258 1259 1260
		return -ENODEV;
	}

#ifdef CONFIG_KPROBES
	n_debugfs_entries = ARRAY_SIZE(crash_entries);
#endif

	for (i = 0; i < n_debugfs_entries; i++) {
		const struct crash_entry *cur = &crash_entries[i];
		struct dentry *de;

		de = debugfs_create_file(cur->name, 0644, lkdtm_debugfs_root,
				NULL, &cur->fops);
		if (de == NULL) {
1261
			pr_err("could not create %s\n", cur->name);
1262 1263 1264 1265 1266
			goto out_err;
		}
	}

	if (lkdtm_parse_commandline() == -EINVAL) {
1267
		pr_info("Invalid command\n");
1268 1269 1270
		goto out_err;
	}

N
Namhyung Kim 已提交
1271
	if (cpoint != CN_INVALID && cptype != CT_NONE) {
1272 1273
		ret = lkdtm_register_cpoint(cpoint);
		if (ret < 0) {
1274
			pr_info("Invalid crash point %d\n", cpoint);
1275 1276
			goto out_err;
		}
1277 1278
		pr_info("Crash point %s of type %s registered\n",
			cpoint_name, cpoint_type);
1279
	} else {
1280
		pr_info("No crash points registered, enable through debugfs\n");
1281 1282 1283
	}

	return 0;
1284 1285 1286 1287

out_err:
	debugfs_remove_recursive(lkdtm_debugfs_root);
	return ret;
1288 1289
}

A
Adrian Bunk 已提交
1290
static void __exit lkdtm_module_exit(void)
1291
{
1292 1293
	debugfs_remove_recursive(lkdtm_debugfs_root);

K
Kees Cook 已提交
1294 1295
	kmem_cache_destroy(bad_cache);

1296
	unregister_jprobe(&lkdtm);
1297
	pr_info("Crash point unregistered\n");
1298 1299 1300 1301 1302 1303
}

module_init(lkdtm_module_init);
module_exit(lkdtm_module_exit);

MODULE_LICENSE("GPL");
1304
MODULE_DESCRIPTION("Kprobe module for testing crash dumps");