162306a36Sopenharmony_ci// SPDX-License-Identifier: GPL-2.0 262306a36Sopenharmony_ci// error-inject.c: Function-level error injection table 362306a36Sopenharmony_ci#include <linux/error-injection.h> 462306a36Sopenharmony_ci#include <linux/debugfs.h> 562306a36Sopenharmony_ci#include <linux/kallsyms.h> 662306a36Sopenharmony_ci#include <linux/kprobes.h> 762306a36Sopenharmony_ci#include <linux/module.h> 862306a36Sopenharmony_ci#include <linux/mutex.h> 962306a36Sopenharmony_ci#include <linux/list.h> 1062306a36Sopenharmony_ci#include <linux/slab.h> 1162306a36Sopenharmony_ci#include <asm/sections.h> 1262306a36Sopenharmony_ci 1362306a36Sopenharmony_ci/* Whitelist of symbols that can be overridden for error injection. */ 1462306a36Sopenharmony_cistatic LIST_HEAD(error_injection_list); 1562306a36Sopenharmony_cistatic DEFINE_MUTEX(ei_mutex); 1662306a36Sopenharmony_cistruct ei_entry { 1762306a36Sopenharmony_ci struct list_head list; 1862306a36Sopenharmony_ci unsigned long start_addr; 1962306a36Sopenharmony_ci unsigned long end_addr; 2062306a36Sopenharmony_ci int etype; 2162306a36Sopenharmony_ci void *priv; 2262306a36Sopenharmony_ci}; 2362306a36Sopenharmony_ci 2462306a36Sopenharmony_cibool within_error_injection_list(unsigned long addr) 2562306a36Sopenharmony_ci{ 2662306a36Sopenharmony_ci struct ei_entry *ent; 2762306a36Sopenharmony_ci bool ret = false; 2862306a36Sopenharmony_ci 2962306a36Sopenharmony_ci mutex_lock(&ei_mutex); 3062306a36Sopenharmony_ci list_for_each_entry(ent, &error_injection_list, list) { 3162306a36Sopenharmony_ci if (addr >= ent->start_addr && addr < ent->end_addr) { 3262306a36Sopenharmony_ci ret = true; 3362306a36Sopenharmony_ci break; 3462306a36Sopenharmony_ci } 3562306a36Sopenharmony_ci } 3662306a36Sopenharmony_ci mutex_unlock(&ei_mutex); 3762306a36Sopenharmony_ci return ret; 3862306a36Sopenharmony_ci} 3962306a36Sopenharmony_ci 4062306a36Sopenharmony_ciint get_injectable_error_type(unsigned long addr) 4162306a36Sopenharmony_ci{ 4262306a36Sopenharmony_ci struct ei_entry *ent; 4362306a36Sopenharmony_ci int ei_type = -EINVAL; 4462306a36Sopenharmony_ci 4562306a36Sopenharmony_ci mutex_lock(&ei_mutex); 4662306a36Sopenharmony_ci list_for_each_entry(ent, &error_injection_list, list) { 4762306a36Sopenharmony_ci if (addr >= ent->start_addr && addr < ent->end_addr) { 4862306a36Sopenharmony_ci ei_type = ent->etype; 4962306a36Sopenharmony_ci break; 5062306a36Sopenharmony_ci } 5162306a36Sopenharmony_ci } 5262306a36Sopenharmony_ci mutex_unlock(&ei_mutex); 5362306a36Sopenharmony_ci 5462306a36Sopenharmony_ci return ei_type; 5562306a36Sopenharmony_ci} 5662306a36Sopenharmony_ci 5762306a36Sopenharmony_ci/* 5862306a36Sopenharmony_ci * Lookup and populate the error_injection_list. 5962306a36Sopenharmony_ci * 6062306a36Sopenharmony_ci * For safety reasons we only allow certain functions to be overridden with 6162306a36Sopenharmony_ci * bpf_error_injection, so we need to populate the list of the symbols that have 6262306a36Sopenharmony_ci * been marked as safe for overriding. 6362306a36Sopenharmony_ci */ 6462306a36Sopenharmony_cistatic void populate_error_injection_list(struct error_injection_entry *start, 6562306a36Sopenharmony_ci struct error_injection_entry *end, 6662306a36Sopenharmony_ci void *priv) 6762306a36Sopenharmony_ci{ 6862306a36Sopenharmony_ci struct error_injection_entry *iter; 6962306a36Sopenharmony_ci struct ei_entry *ent; 7062306a36Sopenharmony_ci unsigned long entry, offset = 0, size = 0; 7162306a36Sopenharmony_ci 7262306a36Sopenharmony_ci mutex_lock(&ei_mutex); 7362306a36Sopenharmony_ci for (iter = start; iter < end; iter++) { 7462306a36Sopenharmony_ci entry = (unsigned long)dereference_symbol_descriptor((void *)iter->addr); 7562306a36Sopenharmony_ci 7662306a36Sopenharmony_ci if (!kernel_text_address(entry) || 7762306a36Sopenharmony_ci !kallsyms_lookup_size_offset(entry, &size, &offset)) { 7862306a36Sopenharmony_ci pr_err("Failed to find error inject entry at %p\n", 7962306a36Sopenharmony_ci (void *)entry); 8062306a36Sopenharmony_ci continue; 8162306a36Sopenharmony_ci } 8262306a36Sopenharmony_ci 8362306a36Sopenharmony_ci ent = kmalloc(sizeof(*ent), GFP_KERNEL); 8462306a36Sopenharmony_ci if (!ent) 8562306a36Sopenharmony_ci break; 8662306a36Sopenharmony_ci ent->start_addr = entry; 8762306a36Sopenharmony_ci ent->end_addr = entry + size; 8862306a36Sopenharmony_ci ent->etype = iter->etype; 8962306a36Sopenharmony_ci ent->priv = priv; 9062306a36Sopenharmony_ci INIT_LIST_HEAD(&ent->list); 9162306a36Sopenharmony_ci list_add_tail(&ent->list, &error_injection_list); 9262306a36Sopenharmony_ci } 9362306a36Sopenharmony_ci mutex_unlock(&ei_mutex); 9462306a36Sopenharmony_ci} 9562306a36Sopenharmony_ci 9662306a36Sopenharmony_ci/* Markers of the _error_inject_whitelist section */ 9762306a36Sopenharmony_ciextern struct error_injection_entry __start_error_injection_whitelist[]; 9862306a36Sopenharmony_ciextern struct error_injection_entry __stop_error_injection_whitelist[]; 9962306a36Sopenharmony_ci 10062306a36Sopenharmony_cistatic void __init populate_kernel_ei_list(void) 10162306a36Sopenharmony_ci{ 10262306a36Sopenharmony_ci populate_error_injection_list(__start_error_injection_whitelist, 10362306a36Sopenharmony_ci __stop_error_injection_whitelist, 10462306a36Sopenharmony_ci NULL); 10562306a36Sopenharmony_ci} 10662306a36Sopenharmony_ci 10762306a36Sopenharmony_ci#ifdef CONFIG_MODULES 10862306a36Sopenharmony_cistatic void module_load_ei_list(struct module *mod) 10962306a36Sopenharmony_ci{ 11062306a36Sopenharmony_ci if (!mod->num_ei_funcs) 11162306a36Sopenharmony_ci return; 11262306a36Sopenharmony_ci 11362306a36Sopenharmony_ci populate_error_injection_list(mod->ei_funcs, 11462306a36Sopenharmony_ci mod->ei_funcs + mod->num_ei_funcs, mod); 11562306a36Sopenharmony_ci} 11662306a36Sopenharmony_ci 11762306a36Sopenharmony_cistatic void module_unload_ei_list(struct module *mod) 11862306a36Sopenharmony_ci{ 11962306a36Sopenharmony_ci struct ei_entry *ent, *n; 12062306a36Sopenharmony_ci 12162306a36Sopenharmony_ci if (!mod->num_ei_funcs) 12262306a36Sopenharmony_ci return; 12362306a36Sopenharmony_ci 12462306a36Sopenharmony_ci mutex_lock(&ei_mutex); 12562306a36Sopenharmony_ci list_for_each_entry_safe(ent, n, &error_injection_list, list) { 12662306a36Sopenharmony_ci if (ent->priv == mod) { 12762306a36Sopenharmony_ci list_del_init(&ent->list); 12862306a36Sopenharmony_ci kfree(ent); 12962306a36Sopenharmony_ci } 13062306a36Sopenharmony_ci } 13162306a36Sopenharmony_ci mutex_unlock(&ei_mutex); 13262306a36Sopenharmony_ci} 13362306a36Sopenharmony_ci 13462306a36Sopenharmony_ci/* Module notifier call back, checking error injection table on the module */ 13562306a36Sopenharmony_cistatic int ei_module_callback(struct notifier_block *nb, 13662306a36Sopenharmony_ci unsigned long val, void *data) 13762306a36Sopenharmony_ci{ 13862306a36Sopenharmony_ci struct module *mod = data; 13962306a36Sopenharmony_ci 14062306a36Sopenharmony_ci if (val == MODULE_STATE_COMING) 14162306a36Sopenharmony_ci module_load_ei_list(mod); 14262306a36Sopenharmony_ci else if (val == MODULE_STATE_GOING) 14362306a36Sopenharmony_ci module_unload_ei_list(mod); 14462306a36Sopenharmony_ci 14562306a36Sopenharmony_ci return NOTIFY_DONE; 14662306a36Sopenharmony_ci} 14762306a36Sopenharmony_ci 14862306a36Sopenharmony_cistatic struct notifier_block ei_module_nb = { 14962306a36Sopenharmony_ci .notifier_call = ei_module_callback, 15062306a36Sopenharmony_ci .priority = 0 15162306a36Sopenharmony_ci}; 15262306a36Sopenharmony_ci 15362306a36Sopenharmony_cistatic __init int module_ei_init(void) 15462306a36Sopenharmony_ci{ 15562306a36Sopenharmony_ci return register_module_notifier(&ei_module_nb); 15662306a36Sopenharmony_ci} 15762306a36Sopenharmony_ci#else /* !CONFIG_MODULES */ 15862306a36Sopenharmony_ci#define module_ei_init() (0) 15962306a36Sopenharmony_ci#endif 16062306a36Sopenharmony_ci 16162306a36Sopenharmony_ci/* 16262306a36Sopenharmony_ci * error_injection/whitelist -- shows which functions can be overridden for 16362306a36Sopenharmony_ci * error injection. 16462306a36Sopenharmony_ci */ 16562306a36Sopenharmony_cistatic void *ei_seq_start(struct seq_file *m, loff_t *pos) 16662306a36Sopenharmony_ci{ 16762306a36Sopenharmony_ci mutex_lock(&ei_mutex); 16862306a36Sopenharmony_ci return seq_list_start(&error_injection_list, *pos); 16962306a36Sopenharmony_ci} 17062306a36Sopenharmony_ci 17162306a36Sopenharmony_cistatic void ei_seq_stop(struct seq_file *m, void *v) 17262306a36Sopenharmony_ci{ 17362306a36Sopenharmony_ci mutex_unlock(&ei_mutex); 17462306a36Sopenharmony_ci} 17562306a36Sopenharmony_ci 17662306a36Sopenharmony_cistatic void *ei_seq_next(struct seq_file *m, void *v, loff_t *pos) 17762306a36Sopenharmony_ci{ 17862306a36Sopenharmony_ci return seq_list_next(v, &error_injection_list, pos); 17962306a36Sopenharmony_ci} 18062306a36Sopenharmony_ci 18162306a36Sopenharmony_cistatic const char *error_type_string(int etype) 18262306a36Sopenharmony_ci{ 18362306a36Sopenharmony_ci switch (etype) { 18462306a36Sopenharmony_ci case EI_ETYPE_NULL: 18562306a36Sopenharmony_ci return "NULL"; 18662306a36Sopenharmony_ci case EI_ETYPE_ERRNO: 18762306a36Sopenharmony_ci return "ERRNO"; 18862306a36Sopenharmony_ci case EI_ETYPE_ERRNO_NULL: 18962306a36Sopenharmony_ci return "ERRNO_NULL"; 19062306a36Sopenharmony_ci case EI_ETYPE_TRUE: 19162306a36Sopenharmony_ci return "TRUE"; 19262306a36Sopenharmony_ci default: 19362306a36Sopenharmony_ci return "(unknown)"; 19462306a36Sopenharmony_ci } 19562306a36Sopenharmony_ci} 19662306a36Sopenharmony_ci 19762306a36Sopenharmony_cistatic int ei_seq_show(struct seq_file *m, void *v) 19862306a36Sopenharmony_ci{ 19962306a36Sopenharmony_ci struct ei_entry *ent = list_entry(v, struct ei_entry, list); 20062306a36Sopenharmony_ci 20162306a36Sopenharmony_ci seq_printf(m, "%ps\t%s\n", (void *)ent->start_addr, 20262306a36Sopenharmony_ci error_type_string(ent->etype)); 20362306a36Sopenharmony_ci return 0; 20462306a36Sopenharmony_ci} 20562306a36Sopenharmony_ci 20662306a36Sopenharmony_cistatic const struct seq_operations ei_sops = { 20762306a36Sopenharmony_ci .start = ei_seq_start, 20862306a36Sopenharmony_ci .next = ei_seq_next, 20962306a36Sopenharmony_ci .stop = ei_seq_stop, 21062306a36Sopenharmony_ci .show = ei_seq_show, 21162306a36Sopenharmony_ci}; 21262306a36Sopenharmony_ci 21362306a36Sopenharmony_ciDEFINE_SEQ_ATTRIBUTE(ei); 21462306a36Sopenharmony_ci 21562306a36Sopenharmony_cistatic int __init ei_debugfs_init(void) 21662306a36Sopenharmony_ci{ 21762306a36Sopenharmony_ci struct dentry *dir, *file; 21862306a36Sopenharmony_ci 21962306a36Sopenharmony_ci dir = debugfs_create_dir("error_injection", NULL); 22062306a36Sopenharmony_ci 22162306a36Sopenharmony_ci file = debugfs_create_file("list", 0444, dir, NULL, &ei_fops); 22262306a36Sopenharmony_ci if (!file) { 22362306a36Sopenharmony_ci debugfs_remove(dir); 22462306a36Sopenharmony_ci return -ENOMEM; 22562306a36Sopenharmony_ci } 22662306a36Sopenharmony_ci 22762306a36Sopenharmony_ci return 0; 22862306a36Sopenharmony_ci} 22962306a36Sopenharmony_ci 23062306a36Sopenharmony_cistatic int __init init_error_injection(void) 23162306a36Sopenharmony_ci{ 23262306a36Sopenharmony_ci populate_kernel_ei_list(); 23362306a36Sopenharmony_ci 23462306a36Sopenharmony_ci if (!module_ei_init()) 23562306a36Sopenharmony_ci ei_debugfs_init(); 23662306a36Sopenharmony_ci 23762306a36Sopenharmony_ci return 0; 23862306a36Sopenharmony_ci} 23962306a36Sopenharmony_cilate_initcall(init_error_injection); 240