diff options
author | Masami Hiramatsu <mhiramat@kernel.org> | 2018-01-12 12:56:03 -0500 |
---|---|---|
committer | Alexei Starovoitov <ast@kernel.org> | 2018-01-12 20:33:38 -0500 |
commit | 4b1a29a7f5425d32640b34b8a755f34e02f64d0f (patch) | |
tree | 1925d4ef5c272c7aedea297359a35eeed505362b | |
parent | 663faf9f7beeaca4ad0176bb96c776eed9dad0c5 (diff) |
error-injection: Support fault injection framework
Support in-kernel fault-injection framework via debugfs.
This allows you to inject a conditional error to specified
function using debugfs interfaces.
Here is the result of test script described in
Documentation/fault-injection/fault-injection.txt
===========
# ./test_fail_function.sh
1+0 records in
1+0 records out
1048576 bytes (1.0 MB, 1.0 MiB) copied, 0.0227404 s, 46.1 MB/s
btrfs-progs v4.4
See http://btrfs.wiki.kernel.org for more information.
Label: (null)
UUID: bfa96010-12e9-4360-aed0-42eec7af5798
Node size: 16384
Sector size: 4096
Filesystem size: 1001.00MiB
Block group profiles:
Data: single 8.00MiB
Metadata: DUP 58.00MiB
System: DUP 12.00MiB
SSD detected: no
Incompat features: extref, skinny-metadata
Number of devices: 1
Devices:
ID SIZE PATH
1 1001.00MiB /dev/loop2
mount: mount /dev/loop2 on /opt/tmpmnt failed: Cannot allocate memory
SUCCESS!
===========
Signed-off-by: Masami Hiramatsu <mhiramat@kernel.org>
Reviewed-by: Josef Bacik <jbacik@fb.com>
Signed-off-by: Alexei Starovoitov <ast@kernel.org>
-rw-r--r-- | Documentation/fault-injection/fault-injection.txt | 68 | ||||
-rw-r--r-- | kernel/Makefile | 1 | ||||
-rw-r--r-- | kernel/fail_function.c | 349 | ||||
-rw-r--r-- | lib/Kconfig.debug | 10 |
4 files changed, 428 insertions, 0 deletions
diff --git a/Documentation/fault-injection/fault-injection.txt b/Documentation/fault-injection/fault-injection.txt index 918972babcd8..f4a32463ca48 100644 --- a/Documentation/fault-injection/fault-injection.txt +++ b/Documentation/fault-injection/fault-injection.txt | |||
@@ -30,6 +30,12 @@ o fail_mmc_request | |||
30 | injects MMC data errors on devices permitted by setting | 30 | injects MMC data errors on devices permitted by setting |
31 | debugfs entries under /sys/kernel/debug/mmc0/fail_mmc_request | 31 | debugfs entries under /sys/kernel/debug/mmc0/fail_mmc_request |
32 | 32 | ||
33 | o fail_function | ||
34 | |||
35 | injects error return on specific functions, which are marked by | ||
36 | ALLOW_ERROR_INJECTION() macro, by setting debugfs entries | ||
37 | under /sys/kernel/debug/fail_function. No boot option supported. | ||
38 | |||
33 | Configure fault-injection capabilities behavior | 39 | Configure fault-injection capabilities behavior |
34 | ----------------------------------------------- | 40 | ----------------------------------------------- |
35 | 41 | ||
@@ -123,6 +129,29 @@ configuration of fault-injection capabilities. | |||
123 | default is 'N', setting it to 'Y' will disable failure injections | 129 | default is 'N', setting it to 'Y' will disable failure injections |
124 | when dealing with private (address space) futexes. | 130 | when dealing with private (address space) futexes. |
125 | 131 | ||
132 | - /sys/kernel/debug/fail_function/inject: | ||
133 | |||
134 | Format: { 'function-name' | '!function-name' | '' } | ||
135 | specifies the target function of error injection by name. | ||
136 | If the function name leads '!' prefix, given function is | ||
137 | removed from injection list. If nothing specified ('') | ||
138 | injection list is cleared. | ||
139 | |||
140 | - /sys/kernel/debug/fail_function/injectable: | ||
141 | |||
142 | (read only) shows error injectable functions and what type of | ||
143 | error values can be specified. The error type will be one of | ||
144 | below; | ||
145 | - NULL: retval must be 0. | ||
146 | - ERRNO: retval must be -1 to -MAX_ERRNO (-4096). | ||
147 | - ERR_NULL: retval must be 0 or -1 to -MAX_ERRNO (-4096). | ||
148 | |||
149 | - /sys/kernel/debug/fail_function/<functiuon-name>/retval: | ||
150 | |||
151 | specifies the "error" return value to inject to the given | ||
152 | function for given function. This will be created when | ||
153 | user specifies new injection entry. | ||
154 | |||
126 | o Boot option | 155 | o Boot option |
127 | 156 | ||
128 | In order to inject faults while debugfs is not available (early boot time), | 157 | In order to inject faults while debugfs is not available (early boot time), |
@@ -268,6 +297,45 @@ trap "echo 0 > /sys/kernel/debug/$FAILTYPE/probability" SIGINT SIGTERM EXIT | |||
268 | echo "Injecting errors into the module $module... (interrupt to stop)" | 297 | echo "Injecting errors into the module $module... (interrupt to stop)" |
269 | sleep 1000000 | 298 | sleep 1000000 |
270 | 299 | ||
300 | ------------------------------------------------------------------------------ | ||
301 | |||
302 | o Inject open_ctree error while btrfs mount | ||
303 | |||
304 | #!/bin/bash | ||
305 | |||
306 | rm -f testfile.img | ||
307 | dd if=/dev/zero of=testfile.img bs=1M seek=1000 count=1 | ||
308 | DEVICE=$(losetup --show -f testfile.img) | ||
309 | mkfs.btrfs -f $DEVICE | ||
310 | mkdir -p tmpmnt | ||
311 | |||
312 | FAILTYPE=fail_function | ||
313 | FAILFUNC=open_ctree | ||
314 | echo $FAILFUNC > /sys/kernel/debug/$FAILTYPE/inject | ||
315 | echo -12 > /sys/kernel/debug/$FAILTYPE/$FAILFUNC/retval | ||
316 | echo N > /sys/kernel/debug/$FAILTYPE/task-filter | ||
317 | echo 100 > /sys/kernel/debug/$FAILTYPE/probability | ||
318 | echo 0 > /sys/kernel/debug/$FAILTYPE/interval | ||
319 | echo -1 > /sys/kernel/debug/$FAILTYPE/times | ||
320 | echo 0 > /sys/kernel/debug/$FAILTYPE/space | ||
321 | echo 1 > /sys/kernel/debug/$FAILTYPE/verbose | ||
322 | |||
323 | mount -t btrfs $DEVICE tmpmnt | ||
324 | if [ $? -ne 0 ] | ||
325 | then | ||
326 | echo "SUCCESS!" | ||
327 | else | ||
328 | echo "FAILED!" | ||
329 | umount tmpmnt | ||
330 | fi | ||
331 | |||
332 | echo > /sys/kernel/debug/$FAILTYPE/inject | ||
333 | |||
334 | rmdir tmpmnt | ||
335 | losetup -d $DEVICE | ||
336 | rm testfile.img | ||
337 | |||
338 | |||
271 | Tool to run command with failslab or fail_page_alloc | 339 | Tool to run command with failslab or fail_page_alloc |
272 | ---------------------------------------------------- | 340 | ---------------------------------------------------- |
273 | In order to make it easier to accomplish the tasks mentioned above, we can use | 341 | In order to make it easier to accomplish the tasks mentioned above, we can use |
diff --git a/kernel/Makefile b/kernel/Makefile index 172d151d429c..f85ae5dfa474 100644 --- a/kernel/Makefile +++ b/kernel/Makefile | |||
@@ -81,6 +81,7 @@ obj-$(CONFIG_AUDIT_TREE) += audit_tree.o | |||
81 | obj-$(CONFIG_GCOV_KERNEL) += gcov/ | 81 | obj-$(CONFIG_GCOV_KERNEL) += gcov/ |
82 | obj-$(CONFIG_KCOV) += kcov.o | 82 | obj-$(CONFIG_KCOV) += kcov.o |
83 | obj-$(CONFIG_KPROBES) += kprobes.o | 83 | obj-$(CONFIG_KPROBES) += kprobes.o |
84 | obj-$(CONFIG_FAIL_FUNCTION) += fail_function.o | ||
84 | obj-$(CONFIG_KGDB) += debug/ | 85 | obj-$(CONFIG_KGDB) += debug/ |
85 | obj-$(CONFIG_DETECT_HUNG_TASK) += hung_task.o | 86 | obj-$(CONFIG_DETECT_HUNG_TASK) += hung_task.o |
86 | obj-$(CONFIG_LOCKUP_DETECTOR) += watchdog.o | 87 | obj-$(CONFIG_LOCKUP_DETECTOR) += watchdog.o |
diff --git a/kernel/fail_function.c b/kernel/fail_function.c new file mode 100644 index 000000000000..21b0122cb39c --- /dev/null +++ b/kernel/fail_function.c | |||
@@ -0,0 +1,349 @@ | |||
1 | // SPDX-License-Identifier: GPL-2.0 | ||
2 | /* | ||
3 | * fail_function.c: Function-based error injection | ||
4 | */ | ||
5 | #include <linux/error-injection.h> | ||
6 | #include <linux/debugfs.h> | ||
7 | #include <linux/fault-inject.h> | ||
8 | #include <linux/kallsyms.h> | ||
9 | #include <linux/kprobes.h> | ||
10 | #include <linux/module.h> | ||
11 | #include <linux/mutex.h> | ||
12 | #include <linux/slab.h> | ||
13 | #include <linux/uaccess.h> | ||
14 | |||
15 | static int fei_kprobe_handler(struct kprobe *kp, struct pt_regs *regs); | ||
16 | |||
17 | struct fei_attr { | ||
18 | struct list_head list; | ||
19 | struct kprobe kp; | ||
20 | unsigned long retval; | ||
21 | }; | ||
22 | static DEFINE_MUTEX(fei_lock); | ||
23 | static LIST_HEAD(fei_attr_list); | ||
24 | static DECLARE_FAULT_ATTR(fei_fault_attr); | ||
25 | static struct dentry *fei_debugfs_dir; | ||
26 | |||
27 | static unsigned long adjust_error_retval(unsigned long addr, unsigned long retv) | ||
28 | { | ||
29 | switch (get_injectable_error_type(addr)) { | ||
30 | case EI_ETYPE_NULL: | ||
31 | if (retv != 0) | ||
32 | return 0; | ||
33 | break; | ||
34 | case EI_ETYPE_ERRNO: | ||
35 | if (retv < (unsigned long)-MAX_ERRNO) | ||
36 | return (unsigned long)-EINVAL; | ||
37 | break; | ||
38 | case EI_ETYPE_ERRNO_NULL: | ||
39 | if (retv != 0 && retv < (unsigned long)-MAX_ERRNO) | ||
40 | return (unsigned long)-EINVAL; | ||
41 | break; | ||
42 | } | ||
43 | |||
44 | return retv; | ||
45 | } | ||
46 | |||
47 | static struct fei_attr *fei_attr_new(const char *sym, unsigned long addr) | ||
48 | { | ||
49 | struct fei_attr *attr; | ||
50 | |||
51 | attr = kzalloc(sizeof(*attr), GFP_KERNEL); | ||
52 | if (attr) { | ||
53 | attr->kp.symbol_name = kstrdup(sym, GFP_KERNEL); | ||
54 | if (!attr->kp.symbol_name) { | ||
55 | kfree(attr); | ||
56 | return NULL; | ||
57 | } | ||
58 | attr->kp.pre_handler = fei_kprobe_handler; | ||
59 | attr->retval = adjust_error_retval(addr, 0); | ||
60 | INIT_LIST_HEAD(&attr->list); | ||
61 | } | ||
62 | return attr; | ||
63 | } | ||
64 | |||
65 | static void fei_attr_free(struct fei_attr *attr) | ||
66 | { | ||
67 | if (attr) { | ||
68 | kfree(attr->kp.symbol_name); | ||
69 | kfree(attr); | ||
70 | } | ||
71 | } | ||
72 | |||
73 | static struct fei_attr *fei_attr_lookup(const char *sym) | ||
74 | { | ||
75 | struct fei_attr *attr; | ||
76 | |||
77 | list_for_each_entry(attr, &fei_attr_list, list) { | ||
78 | if (!strcmp(attr->kp.symbol_name, sym)) | ||
79 | return attr; | ||
80 | } | ||
81 | |||
82 | return NULL; | ||
83 | } | ||
84 | |||
85 | static bool fei_attr_is_valid(struct fei_attr *_attr) | ||
86 | { | ||
87 | struct fei_attr *attr; | ||
88 | |||
89 | list_for_each_entry(attr, &fei_attr_list, list) { | ||
90 | if (attr == _attr) | ||
91 | return true; | ||
92 | } | ||
93 | |||
94 | return false; | ||
95 | } | ||
96 | |||
97 | static int fei_retval_set(void *data, u64 val) | ||
98 | { | ||
99 | struct fei_attr *attr = data; | ||
100 | unsigned long retv = (unsigned long)val; | ||
101 | int err = 0; | ||
102 | |||
103 | mutex_lock(&fei_lock); | ||
104 | /* | ||
105 | * Since this operation can be done after retval file is removed, | ||
106 | * It is safer to check the attr is still valid before accessing | ||
107 | * its member. | ||
108 | */ | ||
109 | if (!fei_attr_is_valid(attr)) { | ||
110 | err = -ENOENT; | ||
111 | goto out; | ||
112 | } | ||
113 | |||
114 | if (attr->kp.addr) { | ||
115 | if (adjust_error_retval((unsigned long)attr->kp.addr, | ||
116 | val) != retv) | ||
117 | err = -EINVAL; | ||
118 | } | ||
119 | if (!err) | ||
120 | attr->retval = val; | ||
121 | out: | ||
122 | mutex_unlock(&fei_lock); | ||
123 | |||
124 | return err; | ||
125 | } | ||
126 | |||
127 | static int fei_retval_get(void *data, u64 *val) | ||
128 | { | ||
129 | struct fei_attr *attr = data; | ||
130 | int err = 0; | ||
131 | |||
132 | mutex_lock(&fei_lock); | ||
133 | /* Here we also validate @attr to ensure it still exists. */ | ||
134 | if (!fei_attr_is_valid(attr)) | ||
135 | err = -ENOENT; | ||
136 | else | ||
137 | *val = attr->retval; | ||
138 | mutex_unlock(&fei_lock); | ||
139 | |||
140 | return err; | ||
141 | } | ||
142 | DEFINE_DEBUGFS_ATTRIBUTE(fei_retval_ops, fei_retval_get, fei_retval_set, | ||
143 | "%llx\n"); | ||
144 | |||
145 | static int fei_debugfs_add_attr(struct fei_attr *attr) | ||
146 | { | ||
147 | struct dentry *dir; | ||
148 | |||
149 | dir = debugfs_create_dir(attr->kp.symbol_name, fei_debugfs_dir); | ||
150 | if (!dir) | ||
151 | return -ENOMEM; | ||
152 | |||
153 | if (!debugfs_create_file("retval", 0600, dir, attr, &fei_retval_ops)) { | ||
154 | debugfs_remove_recursive(dir); | ||
155 | return -ENOMEM; | ||
156 | } | ||
157 | |||
158 | return 0; | ||
159 | } | ||
160 | |||
161 | static void fei_debugfs_remove_attr(struct fei_attr *attr) | ||
162 | { | ||
163 | struct dentry *dir; | ||
164 | |||
165 | dir = debugfs_lookup(attr->kp.symbol_name, fei_debugfs_dir); | ||
166 | if (dir) | ||
167 | debugfs_remove_recursive(dir); | ||
168 | } | ||
169 | |||
170 | static int fei_kprobe_handler(struct kprobe *kp, struct pt_regs *regs) | ||
171 | { | ||
172 | struct fei_attr *attr = container_of(kp, struct fei_attr, kp); | ||
173 | |||
174 | if (should_fail(&fei_fault_attr, 1)) { | ||
175 | regs_set_return_value(regs, attr->retval); | ||
176 | override_function_with_return(regs); | ||
177 | /* Kprobe specific fixup */ | ||
178 | reset_current_kprobe(); | ||
179 | preempt_enable_no_resched(); | ||
180 | return 1; | ||
181 | } | ||
182 | |||
183 | return 0; | ||
184 | } | ||
185 | NOKPROBE_SYMBOL(fei_kprobe_handler) | ||
186 | |||
187 | static void *fei_seq_start(struct seq_file *m, loff_t *pos) | ||
188 | { | ||
189 | mutex_lock(&fei_lock); | ||
190 | return seq_list_start(&fei_attr_list, *pos); | ||
191 | } | ||
192 | |||
193 | static void fei_seq_stop(struct seq_file *m, void *v) | ||
194 | { | ||
195 | mutex_unlock(&fei_lock); | ||
196 | } | ||
197 | |||
198 | static void *fei_seq_next(struct seq_file *m, void *v, loff_t *pos) | ||
199 | { | ||
200 | return seq_list_next(v, &fei_attr_list, pos); | ||
201 | } | ||
202 | |||
203 | static int fei_seq_show(struct seq_file *m, void *v) | ||
204 | { | ||
205 | struct fei_attr *attr = list_entry(v, struct fei_attr, list); | ||
206 | |||
207 | seq_printf(m, "%pf\n", attr->kp.addr); | ||
208 | return 0; | ||
209 | } | ||
210 | |||
211 | static const struct seq_operations fei_seq_ops = { | ||
212 | .start = fei_seq_start, | ||
213 | .next = fei_seq_next, | ||
214 | .stop = fei_seq_stop, | ||
215 | .show = fei_seq_show, | ||
216 | }; | ||
217 | |||
218 | static int fei_open(struct inode *inode, struct file *file) | ||
219 | { | ||
220 | return seq_open(file, &fei_seq_ops); | ||
221 | } | ||
222 | |||
223 | static void fei_attr_remove(struct fei_attr *attr) | ||
224 | { | ||
225 | fei_debugfs_remove_attr(attr); | ||
226 | unregister_kprobe(&attr->kp); | ||
227 | list_del(&attr->list); | ||
228 | fei_attr_free(attr); | ||
229 | } | ||
230 | |||
231 | static void fei_attr_remove_all(void) | ||
232 | { | ||
233 | struct fei_attr *attr, *n; | ||
234 | |||
235 | list_for_each_entry_safe(attr, n, &fei_attr_list, list) { | ||
236 | fei_attr_remove(attr); | ||
237 | } | ||
238 | } | ||
239 | |||
240 | static ssize_t fei_write(struct file *file, const char __user *buffer, | ||
241 | size_t count, loff_t *ppos) | ||
242 | { | ||
243 | struct fei_attr *attr; | ||
244 | unsigned long addr; | ||
245 | char *buf, *sym; | ||
246 | int ret; | ||
247 | |||
248 | /* cut off if it is too long */ | ||
249 | if (count > KSYM_NAME_LEN) | ||
250 | count = KSYM_NAME_LEN; | ||
251 | buf = kmalloc(sizeof(char) * (count + 1), GFP_KERNEL); | ||
252 | if (!buf) | ||
253 | return -ENOMEM; | ||
254 | |||
255 | if (copy_from_user(buf, buffer, count)) { | ||
256 | ret = -EFAULT; | ||
257 | goto out; | ||
258 | } | ||
259 | buf[count] = '\0'; | ||
260 | sym = strstrip(buf); | ||
261 | |||
262 | mutex_lock(&fei_lock); | ||
263 | |||
264 | /* Writing just spaces will remove all injection points */ | ||
265 | if (sym[0] == '\0') { | ||
266 | fei_attr_remove_all(); | ||
267 | ret = count; | ||
268 | goto out; | ||
269 | } | ||
270 | /* Writing !function will remove one injection point */ | ||
271 | if (sym[0] == '!') { | ||
272 | attr = fei_attr_lookup(sym + 1); | ||
273 | if (!attr) { | ||
274 | ret = -ENOENT; | ||
275 | goto out; | ||
276 | } | ||
277 | fei_attr_remove(attr); | ||
278 | ret = count; | ||
279 | goto out; | ||
280 | } | ||
281 | |||
282 | addr = kallsyms_lookup_name(sym); | ||
283 | if (!addr) { | ||
284 | ret = -EINVAL; | ||
285 | goto out; | ||
286 | } | ||
287 | if (!within_error_injection_list(addr)) { | ||
288 | ret = -ERANGE; | ||
289 | goto out; | ||
290 | } | ||
291 | if (fei_attr_lookup(sym)) { | ||
292 | ret = -EBUSY; | ||
293 | goto out; | ||
294 | } | ||
295 | attr = fei_attr_new(sym, addr); | ||
296 | if (!attr) { | ||
297 | ret = -ENOMEM; | ||
298 | goto out; | ||
299 | } | ||
300 | |||
301 | ret = register_kprobe(&attr->kp); | ||
302 | if (!ret) | ||
303 | ret = fei_debugfs_add_attr(attr); | ||
304 | if (ret < 0) | ||
305 | fei_attr_remove(attr); | ||
306 | else { | ||
307 | list_add_tail(&attr->list, &fei_attr_list); | ||
308 | ret = count; | ||
309 | } | ||
310 | out: | ||
311 | kfree(buf); | ||
312 | mutex_unlock(&fei_lock); | ||
313 | return ret; | ||
314 | } | ||
315 | |||
316 | static const struct file_operations fei_ops = { | ||
317 | .open = fei_open, | ||
318 | .read = seq_read, | ||
319 | .write = fei_write, | ||
320 | .llseek = seq_lseek, | ||
321 | .release = seq_release, | ||
322 | }; | ||
323 | |||
324 | static int __init fei_debugfs_init(void) | ||
325 | { | ||
326 | struct dentry *dir; | ||
327 | |||
328 | dir = fault_create_debugfs_attr("fail_function", NULL, | ||
329 | &fei_fault_attr); | ||
330 | if (IS_ERR(dir)) | ||
331 | return PTR_ERR(dir); | ||
332 | |||
333 | /* injectable attribute is just a symlink of error_inject/list */ | ||
334 | if (!debugfs_create_symlink("injectable", dir, | ||
335 | "../error_injection/list")) | ||
336 | goto error; | ||
337 | |||
338 | if (!debugfs_create_file("inject", 0600, dir, NULL, &fei_ops)) | ||
339 | goto error; | ||
340 | |||
341 | fei_debugfs_dir = dir; | ||
342 | |||
343 | return 0; | ||
344 | error: | ||
345 | debugfs_remove_recursive(dir); | ||
346 | return -ENOMEM; | ||
347 | } | ||
348 | |||
349 | late_initcall(fei_debugfs_init); | ||
diff --git a/lib/Kconfig.debug b/lib/Kconfig.debug index 2a33efdd1fea..890d4766cef3 100644 --- a/lib/Kconfig.debug +++ b/lib/Kconfig.debug | |||
@@ -1551,6 +1551,16 @@ config FAIL_FUTEX | |||
1551 | help | 1551 | help |
1552 | Provide fault-injection capability for futexes. | 1552 | Provide fault-injection capability for futexes. |
1553 | 1553 | ||
1554 | config FAIL_FUNCTION | ||
1555 | bool "Fault-injection capability for functions" | ||
1556 | depends on FAULT_INJECTION_DEBUG_FS && FUNCTION_ERROR_INJECTION | ||
1557 | help | ||
1558 | Provide function-based fault-injection capability. | ||
1559 | This will allow you to override a specific function with a return | ||
1560 | with given return value. As a result, function caller will see | ||
1561 | an error value and have to handle it. This is useful to test the | ||
1562 | error handling in various subsystems. | ||
1563 | |||
1554 | config FAULT_INJECTION_DEBUG_FS | 1564 | config FAULT_INJECTION_DEBUG_FS |
1555 | bool "Debugfs entries for fault-injection capabilities" | 1565 | bool "Debugfs entries for fault-injection capabilities" |
1556 | depends on FAULT_INJECTION && SYSFS && DEBUG_FS | 1566 | depends on FAULT_INJECTION && SYSFS && DEBUG_FS |