162306a36Sopenharmony_ci// SPDX-License-Identifier: GPL-2.0
262306a36Sopenharmony_ci// error-inject.c: Function-level error injection table
362306a36Sopenharmony_ci#include <linux/error-injection.h>
462306a36Sopenharmony_ci#include <linux/debugfs.h>
562306a36Sopenharmony_ci#include <linux/kallsyms.h>
662306a36Sopenharmony_ci#include <linux/kprobes.h>
762306a36Sopenharmony_ci#include <linux/module.h>
862306a36Sopenharmony_ci#include <linux/mutex.h>
962306a36Sopenharmony_ci#include <linux/list.h>
1062306a36Sopenharmony_ci#include <linux/slab.h>
1162306a36Sopenharmony_ci#include <asm/sections.h>
1262306a36Sopenharmony_ci
1362306a36Sopenharmony_ci/* Whitelist of symbols that can be overridden for error injection. */
1462306a36Sopenharmony_cistatic LIST_HEAD(error_injection_list);
1562306a36Sopenharmony_cistatic DEFINE_MUTEX(ei_mutex);
1662306a36Sopenharmony_cistruct ei_entry {
1762306a36Sopenharmony_ci	struct list_head list;
1862306a36Sopenharmony_ci	unsigned long start_addr;
1962306a36Sopenharmony_ci	unsigned long end_addr;
2062306a36Sopenharmony_ci	int etype;
2162306a36Sopenharmony_ci	void *priv;
2262306a36Sopenharmony_ci};
2362306a36Sopenharmony_ci
2462306a36Sopenharmony_cibool within_error_injection_list(unsigned long addr)
2562306a36Sopenharmony_ci{
2662306a36Sopenharmony_ci	struct ei_entry *ent;
2762306a36Sopenharmony_ci	bool ret = false;
2862306a36Sopenharmony_ci
2962306a36Sopenharmony_ci	mutex_lock(&ei_mutex);
3062306a36Sopenharmony_ci	list_for_each_entry(ent, &error_injection_list, list) {
3162306a36Sopenharmony_ci		if (addr >= ent->start_addr && addr < ent->end_addr) {
3262306a36Sopenharmony_ci			ret = true;
3362306a36Sopenharmony_ci			break;
3462306a36Sopenharmony_ci		}
3562306a36Sopenharmony_ci	}
3662306a36Sopenharmony_ci	mutex_unlock(&ei_mutex);
3762306a36Sopenharmony_ci	return ret;
3862306a36Sopenharmony_ci}
3962306a36Sopenharmony_ci
4062306a36Sopenharmony_ciint get_injectable_error_type(unsigned long addr)
4162306a36Sopenharmony_ci{
4262306a36Sopenharmony_ci	struct ei_entry *ent;
4362306a36Sopenharmony_ci	int ei_type = -EINVAL;
4462306a36Sopenharmony_ci
4562306a36Sopenharmony_ci	mutex_lock(&ei_mutex);
4662306a36Sopenharmony_ci	list_for_each_entry(ent, &error_injection_list, list) {
4762306a36Sopenharmony_ci		if (addr >= ent->start_addr && addr < ent->end_addr) {
4862306a36Sopenharmony_ci			ei_type = ent->etype;
4962306a36Sopenharmony_ci			break;
5062306a36Sopenharmony_ci		}
5162306a36Sopenharmony_ci	}
5262306a36Sopenharmony_ci	mutex_unlock(&ei_mutex);
5362306a36Sopenharmony_ci
5462306a36Sopenharmony_ci	return ei_type;
5562306a36Sopenharmony_ci}
5662306a36Sopenharmony_ci
5762306a36Sopenharmony_ci/*
5862306a36Sopenharmony_ci * Lookup and populate the error_injection_list.
5962306a36Sopenharmony_ci *
6062306a36Sopenharmony_ci * For safety reasons we only allow certain functions to be overridden with
6162306a36Sopenharmony_ci * bpf_error_injection, so we need to populate the list of the symbols that have
6262306a36Sopenharmony_ci * been marked as safe for overriding.
6362306a36Sopenharmony_ci */
6462306a36Sopenharmony_cistatic void populate_error_injection_list(struct error_injection_entry *start,
6562306a36Sopenharmony_ci					  struct error_injection_entry *end,
6662306a36Sopenharmony_ci					  void *priv)
6762306a36Sopenharmony_ci{
6862306a36Sopenharmony_ci	struct error_injection_entry *iter;
6962306a36Sopenharmony_ci	struct ei_entry *ent;
7062306a36Sopenharmony_ci	unsigned long entry, offset = 0, size = 0;
7162306a36Sopenharmony_ci
7262306a36Sopenharmony_ci	mutex_lock(&ei_mutex);
7362306a36Sopenharmony_ci	for (iter = start; iter < end; iter++) {
7462306a36Sopenharmony_ci		entry = (unsigned long)dereference_symbol_descriptor((void *)iter->addr);
7562306a36Sopenharmony_ci
7662306a36Sopenharmony_ci		if (!kernel_text_address(entry) ||
7762306a36Sopenharmony_ci		    !kallsyms_lookup_size_offset(entry, &size, &offset)) {
7862306a36Sopenharmony_ci			pr_err("Failed to find error inject entry at %p\n",
7962306a36Sopenharmony_ci				(void *)entry);
8062306a36Sopenharmony_ci			continue;
8162306a36Sopenharmony_ci		}
8262306a36Sopenharmony_ci
8362306a36Sopenharmony_ci		ent = kmalloc(sizeof(*ent), GFP_KERNEL);
8462306a36Sopenharmony_ci		if (!ent)
8562306a36Sopenharmony_ci			break;
8662306a36Sopenharmony_ci		ent->start_addr = entry;
8762306a36Sopenharmony_ci		ent->end_addr = entry + size;
8862306a36Sopenharmony_ci		ent->etype = iter->etype;
8962306a36Sopenharmony_ci		ent->priv = priv;
9062306a36Sopenharmony_ci		INIT_LIST_HEAD(&ent->list);
9162306a36Sopenharmony_ci		list_add_tail(&ent->list, &error_injection_list);
9262306a36Sopenharmony_ci	}
9362306a36Sopenharmony_ci	mutex_unlock(&ei_mutex);
9462306a36Sopenharmony_ci}
9562306a36Sopenharmony_ci
9662306a36Sopenharmony_ci/* Markers of the _error_inject_whitelist section */
9762306a36Sopenharmony_ciextern struct error_injection_entry __start_error_injection_whitelist[];
9862306a36Sopenharmony_ciextern struct error_injection_entry __stop_error_injection_whitelist[];
9962306a36Sopenharmony_ci
10062306a36Sopenharmony_cistatic void __init populate_kernel_ei_list(void)
10162306a36Sopenharmony_ci{
10262306a36Sopenharmony_ci	populate_error_injection_list(__start_error_injection_whitelist,
10362306a36Sopenharmony_ci				      __stop_error_injection_whitelist,
10462306a36Sopenharmony_ci				      NULL);
10562306a36Sopenharmony_ci}
10662306a36Sopenharmony_ci
10762306a36Sopenharmony_ci#ifdef CONFIG_MODULES
10862306a36Sopenharmony_cistatic void module_load_ei_list(struct module *mod)
10962306a36Sopenharmony_ci{
11062306a36Sopenharmony_ci	if (!mod->num_ei_funcs)
11162306a36Sopenharmony_ci		return;
11262306a36Sopenharmony_ci
11362306a36Sopenharmony_ci	populate_error_injection_list(mod->ei_funcs,
11462306a36Sopenharmony_ci				      mod->ei_funcs + mod->num_ei_funcs, mod);
11562306a36Sopenharmony_ci}
11662306a36Sopenharmony_ci
11762306a36Sopenharmony_cistatic void module_unload_ei_list(struct module *mod)
11862306a36Sopenharmony_ci{
11962306a36Sopenharmony_ci	struct ei_entry *ent, *n;
12062306a36Sopenharmony_ci
12162306a36Sopenharmony_ci	if (!mod->num_ei_funcs)
12262306a36Sopenharmony_ci		return;
12362306a36Sopenharmony_ci
12462306a36Sopenharmony_ci	mutex_lock(&ei_mutex);
12562306a36Sopenharmony_ci	list_for_each_entry_safe(ent, n, &error_injection_list, list) {
12662306a36Sopenharmony_ci		if (ent->priv == mod) {
12762306a36Sopenharmony_ci			list_del_init(&ent->list);
12862306a36Sopenharmony_ci			kfree(ent);
12962306a36Sopenharmony_ci		}
13062306a36Sopenharmony_ci	}
13162306a36Sopenharmony_ci	mutex_unlock(&ei_mutex);
13262306a36Sopenharmony_ci}
13362306a36Sopenharmony_ci
13462306a36Sopenharmony_ci/* Module notifier call back, checking error injection table on the module */
13562306a36Sopenharmony_cistatic int ei_module_callback(struct notifier_block *nb,
13662306a36Sopenharmony_ci			      unsigned long val, void *data)
13762306a36Sopenharmony_ci{
13862306a36Sopenharmony_ci	struct module *mod = data;
13962306a36Sopenharmony_ci
14062306a36Sopenharmony_ci	if (val == MODULE_STATE_COMING)
14162306a36Sopenharmony_ci		module_load_ei_list(mod);
14262306a36Sopenharmony_ci	else if (val == MODULE_STATE_GOING)
14362306a36Sopenharmony_ci		module_unload_ei_list(mod);
14462306a36Sopenharmony_ci
14562306a36Sopenharmony_ci	return NOTIFY_DONE;
14662306a36Sopenharmony_ci}
14762306a36Sopenharmony_ci
14862306a36Sopenharmony_cistatic struct notifier_block ei_module_nb = {
14962306a36Sopenharmony_ci	.notifier_call = ei_module_callback,
15062306a36Sopenharmony_ci	.priority = 0
15162306a36Sopenharmony_ci};
15262306a36Sopenharmony_ci
15362306a36Sopenharmony_cistatic __init int module_ei_init(void)
15462306a36Sopenharmony_ci{
15562306a36Sopenharmony_ci	return register_module_notifier(&ei_module_nb);
15662306a36Sopenharmony_ci}
15762306a36Sopenharmony_ci#else /* !CONFIG_MODULES */
15862306a36Sopenharmony_ci#define module_ei_init()	(0)
15962306a36Sopenharmony_ci#endif
16062306a36Sopenharmony_ci
16162306a36Sopenharmony_ci/*
16262306a36Sopenharmony_ci * error_injection/whitelist -- shows which functions can be overridden for
16362306a36Sopenharmony_ci * error injection.
16462306a36Sopenharmony_ci */
16562306a36Sopenharmony_cistatic void *ei_seq_start(struct seq_file *m, loff_t *pos)
16662306a36Sopenharmony_ci{
16762306a36Sopenharmony_ci	mutex_lock(&ei_mutex);
16862306a36Sopenharmony_ci	return seq_list_start(&error_injection_list, *pos);
16962306a36Sopenharmony_ci}
17062306a36Sopenharmony_ci
17162306a36Sopenharmony_cistatic void ei_seq_stop(struct seq_file *m, void *v)
17262306a36Sopenharmony_ci{
17362306a36Sopenharmony_ci	mutex_unlock(&ei_mutex);
17462306a36Sopenharmony_ci}
17562306a36Sopenharmony_ci
17662306a36Sopenharmony_cistatic void *ei_seq_next(struct seq_file *m, void *v, loff_t *pos)
17762306a36Sopenharmony_ci{
17862306a36Sopenharmony_ci	return seq_list_next(v, &error_injection_list, pos);
17962306a36Sopenharmony_ci}
18062306a36Sopenharmony_ci
18162306a36Sopenharmony_cistatic const char *error_type_string(int etype)
18262306a36Sopenharmony_ci{
18362306a36Sopenharmony_ci	switch (etype) {
18462306a36Sopenharmony_ci	case EI_ETYPE_NULL:
18562306a36Sopenharmony_ci		return "NULL";
18662306a36Sopenharmony_ci	case EI_ETYPE_ERRNO:
18762306a36Sopenharmony_ci		return "ERRNO";
18862306a36Sopenharmony_ci	case EI_ETYPE_ERRNO_NULL:
18962306a36Sopenharmony_ci		return "ERRNO_NULL";
19062306a36Sopenharmony_ci	case EI_ETYPE_TRUE:
19162306a36Sopenharmony_ci		return "TRUE";
19262306a36Sopenharmony_ci	default:
19362306a36Sopenharmony_ci		return "(unknown)";
19462306a36Sopenharmony_ci	}
19562306a36Sopenharmony_ci}
19662306a36Sopenharmony_ci
19762306a36Sopenharmony_cistatic int ei_seq_show(struct seq_file *m, void *v)
19862306a36Sopenharmony_ci{
19962306a36Sopenharmony_ci	struct ei_entry *ent = list_entry(v, struct ei_entry, list);
20062306a36Sopenharmony_ci
20162306a36Sopenharmony_ci	seq_printf(m, "%ps\t%s\n", (void *)ent->start_addr,
20262306a36Sopenharmony_ci		   error_type_string(ent->etype));
20362306a36Sopenharmony_ci	return 0;
20462306a36Sopenharmony_ci}
20562306a36Sopenharmony_ci
20662306a36Sopenharmony_cistatic const struct seq_operations ei_sops = {
20762306a36Sopenharmony_ci	.start = ei_seq_start,
20862306a36Sopenharmony_ci	.next  = ei_seq_next,
20962306a36Sopenharmony_ci	.stop  = ei_seq_stop,
21062306a36Sopenharmony_ci	.show  = ei_seq_show,
21162306a36Sopenharmony_ci};
21262306a36Sopenharmony_ci
21362306a36Sopenharmony_ciDEFINE_SEQ_ATTRIBUTE(ei);
21462306a36Sopenharmony_ci
21562306a36Sopenharmony_cistatic int __init ei_debugfs_init(void)
21662306a36Sopenharmony_ci{
21762306a36Sopenharmony_ci	struct dentry *dir, *file;
21862306a36Sopenharmony_ci
21962306a36Sopenharmony_ci	dir = debugfs_create_dir("error_injection", NULL);
22062306a36Sopenharmony_ci
22162306a36Sopenharmony_ci	file = debugfs_create_file("list", 0444, dir, NULL, &ei_fops);
22262306a36Sopenharmony_ci	if (!file) {
22362306a36Sopenharmony_ci		debugfs_remove(dir);
22462306a36Sopenharmony_ci		return -ENOMEM;
22562306a36Sopenharmony_ci	}
22662306a36Sopenharmony_ci
22762306a36Sopenharmony_ci	return 0;
22862306a36Sopenharmony_ci}
22962306a36Sopenharmony_ci
23062306a36Sopenharmony_cistatic int __init init_error_injection(void)
23162306a36Sopenharmony_ci{
23262306a36Sopenharmony_ci	populate_kernel_ei_list();
23362306a36Sopenharmony_ci
23462306a36Sopenharmony_ci	if (!module_ei_init())
23562306a36Sopenharmony_ci		ei_debugfs_init();
23662306a36Sopenharmony_ci
23762306a36Sopenharmony_ci	return 0;
23862306a36Sopenharmony_ci}
23962306a36Sopenharmony_cilate_initcall(init_error_injection);
240