linux/drivers/misc/lkdtm.c
<<
>>
Prefs
   1/*
   2 * Kprobe module for testing crash dumps
   3 *
   4 * This program is free software; you can redistribute it and/or modify
   5 * it under the terms of the GNU General Public License as published by
   6 * the Free Software Foundation; either version 2 of the License, or
   7 * (at your option) any later version.
   8 *
   9 * This program is distributed in the hope that it will be useful,
  10 * but WITHOUT ANY WARRANTY; without even the implied warranty of
  11 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
  12 * GNU General Public License for more details.
  13 *
  14 * You should have received a copy of the GNU General Public License
  15 * along with this program; if not, write to the Free Software
  16 * Foundation, Inc., 59 Temple Place - Suite 330, Boston, MA 02111-1307, USA.
  17 *
  18 * Copyright (C) IBM Corporation, 2006
  19 *
  20 * Author: Ankita Garg <ankita@in.ibm.com>
  21 *
  22 * This module induces system failures at predefined crashpoints to
  23 * evaluate the reliability of crash dumps obtained using different dumping
  24 * solutions.
  25 *
  26 * It is adapted from the Linux Kernel Dump Test Tool by
  27 * Fernando Luis Vazquez Cao <http://lkdtt.sourceforge.net>
  28 *
  29 * Debugfs support added by Simon Kagstrom <simon.kagstrom@netinsight.net>
  30 *
  31 * See Documentation/fault-injection/provoke-crashes.txt for instructions
  32 */
  33
  34#include <linux/kernel.h>
  35#include <linux/fs.h>
  36#include <linux/module.h>
  37#include <linux/buffer_head.h>
  38#include <linux/kprobes.h>
  39#include <linux/list.h>
  40#include <linux/init.h>
  41#include <linux/interrupt.h>
  42#include <linux/hrtimer.h>
  43#include <linux/slab.h>
  44#include <scsi/scsi_cmnd.h>
  45#include <linux/debugfs.h>
  46#include <linux/vmalloc.h>
  47#include <linux/mman.h>
  48
  49#ifdef CONFIG_IDE
  50#include <linux/ide.h>
  51#endif
  52
  53/*
  54 * Make sure our attempts to over run the kernel stack doesn't trigger
  55 * a compiler warning when CONFIG_FRAME_WARN is set. Then make sure we
  56 * recurse past the end of THREAD_SIZE by default.
  57 */
  58#if defined(CONFIG_FRAME_WARN) && (CONFIG_FRAME_WARN > 0)
  59#define REC_STACK_SIZE (CONFIG_FRAME_WARN / 2)
  60#else
  61#define REC_STACK_SIZE (THREAD_SIZE / 8)
  62#endif
  63#define REC_NUM_DEFAULT ((THREAD_SIZE / REC_STACK_SIZE) * 2)
  64
  65#define DEFAULT_COUNT 10
  66#define EXEC_SIZE 64
  67
  68enum cname {
  69        CN_INVALID,
  70        CN_INT_HARDWARE_ENTRY,
  71        CN_INT_HW_IRQ_EN,
  72        CN_INT_TASKLET_ENTRY,
  73        CN_FS_DEVRW,
  74        CN_MEM_SWAPOUT,
  75        CN_TIMERADD,
  76        CN_SCSI_DISPATCH_CMD,
  77        CN_IDE_CORE_CP,
  78        CN_DIRECT,
  79};
  80
  81enum ctype {
  82        CT_NONE,
  83        CT_PANIC,
  84        CT_BUG,
  85        CT_WARNING,
  86        CT_EXCEPTION,
  87        CT_LOOP,
  88        CT_OVERFLOW,
  89        CT_CORRUPT_STACK,
  90        CT_UNALIGNED_LOAD_STORE_WRITE,
  91        CT_OVERWRITE_ALLOCATION,
  92        CT_WRITE_AFTER_FREE,
  93        CT_SOFTLOCKUP,
  94        CT_HARDLOCKUP,
  95        CT_SPINLOCKUP,
  96        CT_HUNG_TASK,
  97        CT_EXEC_DATA,
  98        CT_EXEC_STACK,
  99        CT_EXEC_KMALLOC,
 100        CT_EXEC_VMALLOC,
 101        CT_EXEC_USERSPACE,
 102        CT_ACCESS_USERSPACE,
 103        CT_WRITE_RO,
 104};
 105
 106static char* cp_name[] = {
 107        "INT_HARDWARE_ENTRY",
 108        "INT_HW_IRQ_EN",
 109        "INT_TASKLET_ENTRY",
 110        "FS_DEVRW",
 111        "MEM_SWAPOUT",
 112        "TIMERADD",
 113        "SCSI_DISPATCH_CMD",
 114        "IDE_CORE_CP",
 115        "DIRECT",
 116};
 117
 118static char* cp_type[] = {
 119        "PANIC",
 120        "BUG",
 121        "WARNING",
 122        "EXCEPTION",
 123        "LOOP",
 124        "OVERFLOW",
 125        "CORRUPT_STACK",
 126        "UNALIGNED_LOAD_STORE_WRITE",
 127        "OVERWRITE_ALLOCATION",
 128        "WRITE_AFTER_FREE",
 129        "SOFTLOCKUP",
 130        "HARDLOCKUP",
 131        "SPINLOCKUP",
 132        "HUNG_TASK",
 133        "EXEC_DATA",
 134        "EXEC_STACK",
 135        "EXEC_KMALLOC",
 136        "EXEC_VMALLOC",
 137        "EXEC_USERSPACE",
 138        "ACCESS_USERSPACE",
 139        "WRITE_RO",
 140};
 141
 142static struct jprobe lkdtm;
 143
 144static int lkdtm_parse_commandline(void);
 145static void lkdtm_handler(void);
 146
 147static char* cpoint_name;
 148static char* cpoint_type;
 149static int cpoint_count = DEFAULT_COUNT;
 150static int recur_count = REC_NUM_DEFAULT;
 151
 152static enum cname cpoint = CN_INVALID;
 153static enum ctype cptype = CT_NONE;
 154static int count = DEFAULT_COUNT;
 155static DEFINE_SPINLOCK(count_lock);
 156static DEFINE_SPINLOCK(lock_me_up);
 157
 158static u8 data_area[EXEC_SIZE];
 159
 160static const unsigned long rodata = 0xAA55AA55;
 161
 162module_param(recur_count, int, 0644);
 163MODULE_PARM_DESC(recur_count, " Recursion level for the stack overflow test");
 164module_param(cpoint_name, charp, 0444);
 165MODULE_PARM_DESC(cpoint_name, " Crash Point, where kernel is to be crashed");
 166module_param(cpoint_type, charp, 0444);
 167MODULE_PARM_DESC(cpoint_type, " Crash Point Type, action to be taken on "\
 168                                "hitting the crash point");
 169module_param(cpoint_count, int, 0644);
 170MODULE_PARM_DESC(cpoint_count, " Crash Point Count, number of times the "\
 171                                "crash point is to be hit to trigger action");
 172
 173static unsigned int jp_do_irq(unsigned int irq)
 174{
 175        lkdtm_handler();
 176        jprobe_return();
 177        return 0;
 178}
 179
 180static irqreturn_t jp_handle_irq_event(unsigned int irq,
 181                                       struct irqaction *action)
 182{
 183        lkdtm_handler();
 184        jprobe_return();
 185        return 0;
 186}
 187
 188static void jp_tasklet_action(struct softirq_action *a)
 189{
 190        lkdtm_handler();
 191        jprobe_return();
 192}
 193
 194static void jp_ll_rw_block(int rw, int nr, struct buffer_head *bhs[])
 195{
 196        lkdtm_handler();
 197        jprobe_return();
 198}
 199
 200struct scan_control;
 201
 202static unsigned long jp_shrink_inactive_list(unsigned long max_scan,
 203                                             struct zone *zone,
 204                                             struct scan_control *sc)
 205{
 206        lkdtm_handler();
 207        jprobe_return();
 208        return 0;
 209}
 210
 211static int jp_hrtimer_start(struct hrtimer *timer, ktime_t tim,
 212                            const enum hrtimer_mode mode)
 213{
 214        lkdtm_handler();
 215        jprobe_return();
 216        return 0;
 217}
 218
 219static int jp_scsi_dispatch_cmd(struct scsi_cmnd *cmd)
 220{
 221        lkdtm_handler();
 222        jprobe_return();
 223        return 0;
 224}
 225
 226#ifdef CONFIG_IDE
 227int jp_generic_ide_ioctl(ide_drive_t *drive, struct file *file,
 228                        struct block_device *bdev, unsigned int cmd,
 229                        unsigned long arg)
 230{
 231        lkdtm_handler();
 232        jprobe_return();
 233        return 0;
 234}
 235#endif
 236
 237/* Return the crashpoint number or NONE if the name is invalid */
 238static enum ctype parse_cp_type(const char *what, size_t count)
 239{
 240        int i;
 241
 242        for (i = 0; i < ARRAY_SIZE(cp_type); i++) {
 243                if (!strcmp(what, cp_type[i]))
 244                        return i + 1;
 245        }
 246
 247        return CT_NONE;
 248}
 249
 250static const char *cp_type_to_str(enum ctype type)
 251{
 252        if (type == CT_NONE || type < 0 || type > ARRAY_SIZE(cp_type))
 253                return "None";
 254
 255        return cp_type[type - 1];
 256}
 257
 258static const char *cp_name_to_str(enum cname name)
 259{
 260        if (name == CN_INVALID || name < 0 || name > ARRAY_SIZE(cp_name))
 261                return "INVALID";
 262
 263        return cp_name[name - 1];
 264}
 265
 266
 267static int lkdtm_parse_commandline(void)
 268{
 269        int i;
 270        unsigned long flags;
 271
 272        if (cpoint_count < 1 || recur_count < 1)
 273                return -EINVAL;
 274
 275        spin_lock_irqsave(&count_lock, flags);
 276        count = cpoint_count;
 277        spin_unlock_irqrestore(&count_lock, flags);
 278
 279        /* No special parameters */
 280        if (!cpoint_type && !cpoint_name)
 281                return 0;
 282
 283        /* Neither or both of these need to be set */
 284        if (!cpoint_type || !cpoint_name)
 285                return -EINVAL;
 286
 287        cptype = parse_cp_type(cpoint_type, strlen(cpoint_type));
 288        if (cptype == CT_NONE)
 289                return -EINVAL;
 290
 291        for (i = 0; i < ARRAY_SIZE(cp_name); i++) {
 292                if (!strcmp(cpoint_name, cp_name[i])) {
 293                        cpoint = i + 1;
 294                        return 0;
 295                }
 296        }
 297
 298        /* Could not find a valid crash point */
 299        return -EINVAL;
 300}
 301
 302static int recursive_loop(int remaining)
 303{
 304        char buf[REC_STACK_SIZE];
 305
 306        /* Make sure compiler does not optimize this away. */
 307        memset(buf, (remaining & 0xff) | 0x1, REC_STACK_SIZE);
 308        if (!remaining)
 309                return 0;
 310        else
 311                return recursive_loop(remaining - 1);
 312}
 313
 314static void do_nothing(void)
 315{
 316        return;
 317}
 318
 319static noinline void corrupt_stack(void)
 320{
 321        /* Use default char array length that triggers stack protection. */
 322        char data[8];
 323
 324        memset((void *)data, 0, 64);
 325}
 326
 327static void execute_location(void *dst)
 328{
 329        void (*func)(void) = dst;
 330
 331        memcpy(dst, do_nothing, EXEC_SIZE);
 332        func();
 333}
 334
 335static void execute_user_location(void *dst)
 336{
 337        void (*func)(void) = dst;
 338
 339        if (copy_to_user(dst, do_nothing, EXEC_SIZE))
 340                return;
 341        func();
 342}
 343
 344static void lkdtm_do_action(enum ctype which)
 345{
 346        switch (which) {
 347        case CT_PANIC:
 348                panic("dumptest");
 349                break;
 350        case CT_BUG:
 351                BUG();
 352                break;
 353        case CT_WARNING:
 354                WARN_ON(1);
 355                break;
 356        case CT_EXCEPTION:
 357                *((int *) 0) = 0;
 358                break;
 359        case CT_LOOP:
 360                for (;;)
 361                        ;
 362                break;
 363        case CT_OVERFLOW:
 364                (void) recursive_loop(recur_count);
 365                break;
 366        case CT_CORRUPT_STACK:
 367                corrupt_stack();
 368                break;
 369        case CT_UNALIGNED_LOAD_STORE_WRITE: {
 370                static u8 data[5] __attribute__((aligned(4))) = {1, 2,
 371                                3, 4, 5};
 372                u32 *p;
 373                u32 val = 0x12345678;
 374
 375                p = (u32 *)(data + 1);
 376                if (*p == 0)
 377                        val = 0x87654321;
 378                *p = val;
 379                 break;
 380        }
 381        case CT_OVERWRITE_ALLOCATION: {
 382                size_t len = 1020;
 383                u32 *data = kmalloc(len, GFP_KERNEL);
 384
 385                data[1024 / sizeof(u32)] = 0x12345678;
 386                kfree(data);
 387                break;
 388        }
 389        case CT_WRITE_AFTER_FREE: {
 390                size_t len = 1024;
 391                u32 *data = kmalloc(len, GFP_KERNEL);
 392
 393                kfree(data);
 394                schedule();
 395                memset(data, 0x78, len);
 396                break;
 397        }
 398        case CT_SOFTLOCKUP:
 399                preempt_disable();
 400                for (;;)
 401                        cpu_relax();
 402                break;
 403        case CT_HARDLOCKUP:
 404                local_irq_disable();
 405                for (;;)
 406                        cpu_relax();
 407                break;
 408        case CT_SPINLOCKUP:
 409                /* Must be called twice to trigger. */
 410                spin_lock(&lock_me_up);
 411                break;
 412        case CT_HUNG_TASK:
 413                set_current_state(TASK_UNINTERRUPTIBLE);
 414                schedule();
 415                break;
 416        case CT_EXEC_DATA:
 417                execute_location(data_area);
 418                break;
 419        case CT_EXEC_STACK: {
 420                u8 stack_area[EXEC_SIZE];
 421                execute_location(stack_area);
 422                break;
 423        }
 424        case CT_EXEC_KMALLOC: {
 425                u32 *kmalloc_area = kmalloc(EXEC_SIZE, GFP_KERNEL);
 426                execute_location(kmalloc_area);
 427                kfree(kmalloc_area);
 428                break;
 429        }
 430        case CT_EXEC_VMALLOC: {
 431                u32 *vmalloc_area = vmalloc(EXEC_SIZE);
 432                execute_location(vmalloc_area);
 433                vfree(vmalloc_area);
 434                break;
 435        }
 436        case CT_EXEC_USERSPACE: {
 437                unsigned long user_addr;
 438
 439                user_addr = vm_mmap(NULL, 0, PAGE_SIZE,
 440                                    PROT_READ | PROT_WRITE | PROT_EXEC,
 441                                    MAP_ANONYMOUS | MAP_PRIVATE, 0);
 442                if (user_addr >= TASK_SIZE) {
 443                        pr_warn("Failed to allocate user memory\n");
 444                        return;
 445                }
 446                execute_user_location((void *)user_addr);
 447                vm_munmap(user_addr, PAGE_SIZE);
 448                break;
 449        }
 450        case CT_ACCESS_USERSPACE: {
 451                unsigned long user_addr, tmp;
 452                unsigned long *ptr;
 453
 454                user_addr = vm_mmap(NULL, 0, PAGE_SIZE,
 455                                    PROT_READ | PROT_WRITE | PROT_EXEC,
 456                                    MAP_ANONYMOUS | MAP_PRIVATE, 0);
 457                if (user_addr >= TASK_SIZE) {
 458                        pr_warn("Failed to allocate user memory\n");
 459                        return;
 460                }
 461
 462                ptr = (unsigned long *)user_addr;
 463                tmp = *ptr;
 464                tmp += 0xc0dec0de;
 465                *ptr = tmp;
 466
 467                vm_munmap(user_addr, PAGE_SIZE);
 468
 469                break;
 470        }
 471        case CT_WRITE_RO: {
 472                unsigned long *ptr;
 473
 474                ptr = (unsigned long *)&rodata;
 475                *ptr ^= 0xabcd1234;
 476
 477                break;
 478        }
 479        case CT_NONE:
 480        default:
 481                break;
 482        }
 483
 484}
 485
 486static void lkdtm_handler(void)
 487{
 488        unsigned long flags;
 489        bool do_it = false;
 490
 491        spin_lock_irqsave(&count_lock, flags);
 492        count--;
 493        printk(KERN_INFO "lkdtm: Crash point %s of type %s hit, trigger in %d rounds\n",
 494                        cp_name_to_str(cpoint), cp_type_to_str(cptype), count);
 495
 496        if (count == 0) {
 497                do_it = true;
 498                count = cpoint_count;
 499        }
 500        spin_unlock_irqrestore(&count_lock, flags);
 501
 502        if (do_it)
 503                lkdtm_do_action(cptype);
 504}
 505
 506static int lkdtm_register_cpoint(enum cname which)
 507{
 508        int ret;
 509
 510        cpoint = CN_INVALID;
 511        if (lkdtm.entry != NULL)
 512                unregister_jprobe(&lkdtm);
 513
 514        switch (which) {
 515        case CN_DIRECT:
 516                lkdtm_do_action(cptype);
 517                return 0;
 518        case CN_INT_HARDWARE_ENTRY:
 519                lkdtm.kp.symbol_name = "do_IRQ";
 520                lkdtm.entry = (kprobe_opcode_t*) jp_do_irq;
 521                break;
 522        case CN_INT_HW_IRQ_EN:
 523                lkdtm.kp.symbol_name = "handle_IRQ_event";
 524                lkdtm.entry = (kprobe_opcode_t*) jp_handle_irq_event;
 525                break;
 526        case CN_INT_TASKLET_ENTRY:
 527                lkdtm.kp.symbol_name = "tasklet_action";
 528                lkdtm.entry = (kprobe_opcode_t*) jp_tasklet_action;
 529                break;
 530        case CN_FS_DEVRW:
 531                lkdtm.kp.symbol_name = "ll_rw_block";
 532                lkdtm.entry = (kprobe_opcode_t*) jp_ll_rw_block;
 533                break;
 534        case CN_MEM_SWAPOUT:
 535                lkdtm.kp.symbol_name = "shrink_inactive_list";
 536                lkdtm.entry = (kprobe_opcode_t*) jp_shrink_inactive_list;
 537                break;
 538        case CN_TIMERADD:
 539                lkdtm.kp.symbol_name = "hrtimer_start";
 540                lkdtm.entry = (kprobe_opcode_t*) jp_hrtimer_start;
 541                break;
 542        case CN_SCSI_DISPATCH_CMD:
 543                lkdtm.kp.symbol_name = "scsi_dispatch_cmd";
 544                lkdtm.entry = (kprobe_opcode_t*) jp_scsi_dispatch_cmd;
 545                break;
 546        case CN_IDE_CORE_CP:
 547#ifdef CONFIG_IDE
 548                lkdtm.kp.symbol_name = "generic_ide_ioctl";
 549                lkdtm.entry = (kprobe_opcode_t*) jp_generic_ide_ioctl;
 550#else
 551                printk(KERN_INFO "lkdtm: Crash point not available\n");
 552                return -EINVAL;
 553#endif
 554                break;
 555        default:
 556                printk(KERN_INFO "lkdtm: Invalid Crash Point\n");
 557                return -EINVAL;
 558        }
 559
 560        cpoint = which;
 561        if ((ret = register_jprobe(&lkdtm)) < 0) {
 562                printk(KERN_INFO "lkdtm: Couldn't register jprobe\n");
 563                cpoint = CN_INVALID;
 564        }
 565
 566        return ret;
 567}
 568
 569static ssize_t do_register_entry(enum cname which, struct file *f,
 570                const char __user *user_buf, size_t count, loff_t *off)
 571{
 572        char *buf;
 573        int err;
 574
 575        if (count >= PAGE_SIZE)
 576                return -EINVAL;
 577
 578        buf = (char *)__get_free_page(GFP_KERNEL);
 579        if (!buf)
 580                return -ENOMEM;
 581        if (copy_from_user(buf, user_buf, count)) {
 582                free_page((unsigned long) buf);
 583                return -EFAULT;
 584        }
 585        /* NULL-terminate and remove enter */
 586        buf[count] = '\0';
 587        strim(buf);
 588
 589        cptype = parse_cp_type(buf, count);
 590        free_page((unsigned long) buf);
 591
 592        if (cptype == CT_NONE)
 593                return -EINVAL;
 594
 595        err = lkdtm_register_cpoint(which);
 596        if (err < 0)
 597                return err;
 598
 599        *off += count;
 600
 601        return count;
 602}
 603
 604/* Generic read callback that just prints out the available crash types */
 605static ssize_t lkdtm_debugfs_read(struct file *f, char __user *user_buf,
 606                size_t count, loff_t *off)
 607{
 608        char *buf;
 609        int i, n, out;
 610
 611        buf = (char *)__get_free_page(GFP_KERNEL);
 612        if (buf == NULL)
 613                return -ENOMEM;
 614
 615        n = snprintf(buf, PAGE_SIZE, "Available crash types:\n");
 616        for (i = 0; i < ARRAY_SIZE(cp_type); i++)
 617                n += snprintf(buf + n, PAGE_SIZE - n, "%s\n", cp_type[i]);
 618        buf[n] = '\0';
 619
 620        out = simple_read_from_buffer(user_buf, count, off,
 621                                      buf, n);
 622        free_page((unsigned long) buf);
 623
 624        return out;
 625}
 626
 627static int lkdtm_debugfs_open(struct inode *inode, struct file *file)
 628{
 629        return 0;
 630}
 631
 632
 633static ssize_t int_hardware_entry(struct file *f, const char __user *buf,
 634                size_t count, loff_t *off)
 635{
 636        return do_register_entry(CN_INT_HARDWARE_ENTRY, f, buf, count, off);
 637}
 638
 639static ssize_t int_hw_irq_en(struct file *f, const char __user *buf,
 640                size_t count, loff_t *off)
 641{
 642        return do_register_entry(CN_INT_HW_IRQ_EN, f, buf, count, off);
 643}
 644
 645static ssize_t int_tasklet_entry(struct file *f, const char __user *buf,
 646                size_t count, loff_t *off)
 647{
 648        return do_register_entry(CN_INT_TASKLET_ENTRY, f, buf, count, off);
 649}
 650
 651static ssize_t fs_devrw_entry(struct file *f, const char __user *buf,
 652                size_t count, loff_t *off)
 653{
 654        return do_register_entry(CN_FS_DEVRW, f, buf, count, off);
 655}
 656
 657static ssize_t mem_swapout_entry(struct file *f, const char __user *buf,
 658                size_t count, loff_t *off)
 659{
 660        return do_register_entry(CN_MEM_SWAPOUT, f, buf, count, off);
 661}
 662
 663static ssize_t timeradd_entry(struct file *f, const char __user *buf,
 664                size_t count, loff_t *off)
 665{
 666        return do_register_entry(CN_TIMERADD, f, buf, count, off);
 667}
 668
 669static ssize_t scsi_dispatch_cmd_entry(struct file *f,
 670                const char __user *buf, size_t count, loff_t *off)
 671{
 672        return do_register_entry(CN_SCSI_DISPATCH_CMD, f, buf, count, off);
 673}
 674
 675static ssize_t ide_core_cp_entry(struct file *f, const char __user *buf,
 676                size_t count, loff_t *off)
 677{
 678        return do_register_entry(CN_IDE_CORE_CP, f, buf, count, off);
 679}
 680
 681/* Special entry to just crash directly. Available without KPROBEs */
 682static ssize_t direct_entry(struct file *f, const char __user *user_buf,
 683                size_t count, loff_t *off)
 684{
 685        enum ctype type;
 686        char *buf;
 687
 688        if (count >= PAGE_SIZE)
 689                return -EINVAL;
 690        if (count < 1)
 691                return -EINVAL;
 692
 693        buf = (char *)__get_free_page(GFP_KERNEL);
 694        if (!buf)
 695                return -ENOMEM;
 696        if (copy_from_user(buf, user_buf, count)) {
 697                free_page((unsigned long) buf);
 698                return -EFAULT;
 699        }
 700        /* NULL-terminate and remove enter */
 701        buf[count] = '\0';
 702        strim(buf);
 703
 704        type = parse_cp_type(buf, count);
 705        free_page((unsigned long) buf);
 706        if (type == CT_NONE)
 707                return -EINVAL;
 708
 709        printk(KERN_INFO "lkdtm: Performing direct entry %s\n",
 710                        cp_type_to_str(type));
 711        lkdtm_do_action(type);
 712        *off += count;
 713
 714        return count;
 715}
 716
 717struct crash_entry {
 718        const char *name;
 719        const struct file_operations fops;
 720};
 721
 722static const struct crash_entry crash_entries[] = {
 723        {"DIRECT", {.read = lkdtm_debugfs_read,
 724                        .llseek = generic_file_llseek,
 725                        .open = lkdtm_debugfs_open,
 726                        .write = direct_entry} },
 727        {"INT_HARDWARE_ENTRY", {.read = lkdtm_debugfs_read,
 728                        .llseek = generic_file_llseek,
 729                        .open = lkdtm_debugfs_open,
 730                        .write = int_hardware_entry} },
 731        {"INT_HW_IRQ_EN", {.read = lkdtm_debugfs_read,
 732                        .llseek = generic_file_llseek,
 733                        .open = lkdtm_debugfs_open,
 734                        .write = int_hw_irq_en} },
 735        {"INT_TASKLET_ENTRY", {.read = lkdtm_debugfs_read,
 736                        .llseek = generic_file_llseek,
 737                        .open = lkdtm_debugfs_open,
 738                        .write = int_tasklet_entry} },
 739        {"FS_DEVRW", {.read = lkdtm_debugfs_read,
 740                        .llseek = generic_file_llseek,
 741                        .open = lkdtm_debugfs_open,
 742                        .write = fs_devrw_entry} },
 743        {"MEM_SWAPOUT", {.read = lkdtm_debugfs_read,
 744                        .llseek = generic_file_llseek,
 745                        .open = lkdtm_debugfs_open,
 746                        .write = mem_swapout_entry} },
 747        {"TIMERADD", {.read = lkdtm_debugfs_read,
 748                        .llseek = generic_file_llseek,
 749                        .open = lkdtm_debugfs_open,
 750                        .write = timeradd_entry} },
 751        {"SCSI_DISPATCH_CMD", {.read = lkdtm_debugfs_read,
 752                        .llseek = generic_file_llseek,
 753                        .open = lkdtm_debugfs_open,
 754                        .write = scsi_dispatch_cmd_entry} },
 755        {"IDE_CORE_CP", {.read = lkdtm_debugfs_read,
 756                        .llseek = generic_file_llseek,
 757                        .open = lkdtm_debugfs_open,
 758                        .write = ide_core_cp_entry} },
 759};
 760
 761static struct dentry *lkdtm_debugfs_root;
 762
 763static int __init lkdtm_module_init(void)
 764{
 765        int ret = -EINVAL;
 766        int n_debugfs_entries = 1; /* Assume only the direct entry */
 767        int i;
 768
 769        /* Register debugfs interface */
 770        lkdtm_debugfs_root = debugfs_create_dir("provoke-crash", NULL);
 771        if (!lkdtm_debugfs_root) {
 772                printk(KERN_ERR "lkdtm: creating root dir failed\n");
 773                return -ENODEV;
 774        }
 775
 776#ifdef CONFIG_KPROBES
 777        n_debugfs_entries = ARRAY_SIZE(crash_entries);
 778#endif
 779
 780        for (i = 0; i < n_debugfs_entries; i++) {
 781                const struct crash_entry *cur = &crash_entries[i];
 782                struct dentry *de;
 783
 784                de = debugfs_create_file(cur->name, 0644, lkdtm_debugfs_root,
 785                                NULL, &cur->fops);
 786                if (de == NULL) {
 787                        printk(KERN_ERR "lkdtm: could not create %s\n",
 788                                        cur->name);
 789                        goto out_err;
 790                }
 791        }
 792
 793        if (lkdtm_parse_commandline() == -EINVAL) {
 794                printk(KERN_INFO "lkdtm: Invalid command\n");
 795                goto out_err;
 796        }
 797
 798        if (cpoint != CN_INVALID && cptype != CT_NONE) {
 799                ret = lkdtm_register_cpoint(cpoint);
 800                if (ret < 0) {
 801                        printk(KERN_INFO "lkdtm: Invalid crash point %d\n",
 802                                        cpoint);
 803                        goto out_err;
 804                }
 805                printk(KERN_INFO "lkdtm: Crash point %s of type %s registered\n",
 806                                cpoint_name, cpoint_type);
 807        } else {
 808                printk(KERN_INFO "lkdtm: No crash points registered, enable through debugfs\n");
 809        }
 810
 811        return 0;
 812
 813out_err:
 814        debugfs_remove_recursive(lkdtm_debugfs_root);
 815        return ret;
 816}
 817
 818static void __exit lkdtm_module_exit(void)
 819{
 820        debugfs_remove_recursive(lkdtm_debugfs_root);
 821
 822        unregister_jprobe(&lkdtm);
 823        printk(KERN_INFO "lkdtm: Crash point unregistered\n");
 824}
 825
 826module_init(lkdtm_module_init);
 827module_exit(lkdtm_module_exit);
 828
 829MODULE_LICENSE("GPL");
 830