Reproducing the synchronous external abort that the device memory guard prevents requires disabling the guard at runtime. Without this, there is no way to verify the guard is actually needed or to regression-test the crash path.
Add a module parameter (skip_vmio, default true) that controls whether the guard is active. Set to 0 to disable it: Boot: stacktrace.skip_vmio=0 Runtime: echo 0 > /sys/module/stacktrace/parameters/skip_vmio When disabled, perf follows frame pointers into device memory regions, triggering a synchronous external abort and kernel panic on arm64. Assisted-by: Kiro:claude-opus-4.6 [kiro-cli] Signed-off-by: Fredrik Markstrom <[email protected]> Reviewed-by: Ivar Holmqvist <[email protected]> Reviewed-by: Malin Jonsson <[email protected]> --- arch/arm64/kernel/stacktrace.c | 11 +++++++++-- 1 file changed, 9 insertions(+), 2 deletions(-) diff --git a/arch/arm64/kernel/stacktrace.c b/arch/arm64/kernel/stacktrace.c index 4a28df9bbe763ea7e88f02c1797bf0d4f1bbac2d..19b5251f214f2f6e083e55894ebaed84a3a4f585 100644 --- a/arch/arm64/kernel/stacktrace.c +++ b/arch/arm64/kernel/stacktrace.c @@ -11,6 +11,7 @@ #include <linux/filter.h> #include <linux/ftrace.h> #include <linux/kprobes.h> +#include <linux/moduleparam.h> #include <linux/pgtable.h> #include <linux/sched.h> #include <linux/sched/debug.h> @@ -123,6 +124,10 @@ static bool range_is_device_mem(unsigned long start, unsigned long size) return false; } +static bool skip_vmio = true; +module_param_unsafe(skip_vmio, bool, 0600); +MODULE_PARM_DESC(skip_vmio, "Skip device memory during user callchain unwinding"); + enum kunwind_source { KUNWIND_SOURCE_UNKNOWN, KUNWIND_SOURCE_FRAME, @@ -627,7 +632,8 @@ unwind_user_frame(struct frame_tail __user *tail, void *cookie, if (!access_ok(tail, sizeof(buftail))) return NULL; - if (range_is_device_mem((unsigned long)tail, sizeof(buftail))) + if (READ_ONCE(skip_vmio) && + range_is_device_mem((unsigned long)tail, sizeof(buftail))) return NULL; pagefault_disable(); @@ -678,7 +684,8 @@ unwind_compat_user_frame(struct compat_frame_tail __user *tail, void *cookie, if (!access_ok(tail, sizeof(buftail))) return NULL; - if (range_is_device_mem((unsigned long)tail, sizeof(buftail))) + if (READ_ONCE(skip_vmio) && + range_is_device_mem((unsigned long)tail, sizeof(buftail))) return NULL; pagefault_disable(); -- 2.51.0

