2020-10-15 22:45:59 +00:00
|
|
|
.. SPDX-License-Identifier: GPL-2.0
|
2019-06-12 17:52:44 +00:00
|
|
|
|
2020-10-15 22:45:59 +00:00
|
|
|
============================================================
|
|
|
|
Provoking crashes with Linux Kernel Dump Test Module (LKDTM)
|
|
|
|
============================================================
|
2019-06-12 17:52:44 +00:00
|
|
|
|
2020-10-15 22:45:59 +00:00
|
|
|
The lkdtm module provides an interface to disrupt (and usually crash)
|
|
|
|
the kernel at predefined code locations to evaluate the reliability of
|
|
|
|
the kernel's exception handling and to test crash dumps obtained using
|
|
|
|
different dumping solutions. The module uses KPROBEs to instrument the
|
|
|
|
trigger location, but can also trigger the kernel directly without KPROBE
|
|
|
|
support via debugfs.
|
2019-06-12 17:52:44 +00:00
|
|
|
|
2020-10-15 22:45:59 +00:00
|
|
|
You can select the location of the trigger ("crash point name") and the
|
|
|
|
type of action ("crash point type") either through module arguments when
|
|
|
|
inserting the module, or through the debugfs interface.
|
2019-06-12 17:52:44 +00:00
|
|
|
|
|
|
|
Usage::
|
|
|
|
|
|
|
|
insmod lkdtm.ko [recur_count={>0}] cpoint_name=<> cpoint_type=<>
|
|
|
|
[cpoint_count={>0}]
|
|
|
|
|
|
|
|
recur_count
|
2020-10-15 22:45:59 +00:00
|
|
|
Recursion level for the stack overflow test. By default this is
|
|
|
|
dynamically calculated based on kernel configuration, with the
|
|
|
|
goal of being just large enough to exhaust the kernel stack. The
|
|
|
|
value can be seen at `/sys/module/lkdtm/parameters/recur_count`.
|
2019-06-12 17:52:44 +00:00
|
|
|
|
|
|
|
cpoint_name
|
2020-10-15 22:45:59 +00:00
|
|
|
Where in the kernel to trigger the action. It can be
|
2019-06-12 17:52:44 +00:00
|
|
|
one of INT_HARDWARE_ENTRY, INT_HW_IRQ_EN, INT_TASKLET_ENTRY,
|
2023-05-03 16:29:44 +00:00
|
|
|
FS_SUBMIT_BH, MEM_SWAPOUT, TIMERADD, SCSI_QUEUE_RQ, or DIRECT.
|
2019-06-12 17:52:44 +00:00
|
|
|
|
|
|
|
cpoint_type
|
|
|
|
Indicates the action to be taken on hitting the crash point.
|
2020-10-15 22:45:59 +00:00
|
|
|
These are numerous, and best queried directly from debugfs. Some
|
|
|
|
of the common ones are PANIC, BUG, EXCEPTION, LOOP, and OVERFLOW.
|
|
|
|
See the contents of `/sys/kernel/debug/provoke-crash/DIRECT` for
|
|
|
|
a complete list.
|
2019-06-12 17:52:44 +00:00
|
|
|
|
|
|
|
cpoint_count
|
|
|
|
Indicates the number of times the crash point is to be hit
|
2020-10-15 22:45:59 +00:00
|
|
|
before triggering the action. The default is 10 (except for
|
|
|
|
DIRECT, which always fires immediately).
|
2019-06-12 17:52:44 +00:00
|
|
|
|
|
|
|
You can also induce failures by mounting debugfs and writing the type to
|
2020-10-15 22:45:59 +00:00
|
|
|
<debugfs>/provoke-crash/<crashpoint>. E.g.::
|
2019-06-12 17:52:44 +00:00
|
|
|
|
2020-10-15 22:45:59 +00:00
|
|
|
mount -t debugfs debugfs /sys/kernel/debug
|
|
|
|
echo EXCEPTION > /sys/kernel/debug/provoke-crash/INT_HARDWARE_ENTRY
|
2019-06-12 17:52:44 +00:00
|
|
|
|
2020-10-15 22:45:59 +00:00
|
|
|
The special file `DIRECT` will induce the action directly without KPROBE
|
|
|
|
instrumentation. This mode is the only one available when the module is
|
|
|
|
built for a kernel without KPROBEs support::
|
2019-06-12 17:52:44 +00:00
|
|
|
|
2020-10-15 22:45:59 +00:00
|
|
|
# Instead of having a BUG kill your shell, have it kill "cat":
|
|
|
|
cat <(echo WRITE_RO) >/sys/kernel/debug/provoke-crash/DIRECT
|