123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142 |
- /* Inject a hwpoison memory failure on a arbitrary pfn */
- #include <linux/module.h>
- #include <linux/debugfs.h>
- #include <linux/kernel.h>
- #include <linux/mm.h>
- #include <linux/swap.h>
- #include <linux/pagemap.h>
- #include <linux/hugetlb.h>
- #include "internal.h"
- static struct dentry *hwpoison_dir;
- static int hwpoison_inject(void *data, u64 val)
- {
- unsigned long pfn = val;
- struct page *p;
- struct page *hpage;
- int err;
- if (!capable(CAP_SYS_ADMIN))
- return -EPERM;
- if (!hwpoison_filter_enable)
- goto inject;
- if (!pfn_valid(pfn))
- return -ENXIO;
- p = pfn_to_page(pfn);
- hpage = compound_head(p);
- /*
- * This implies unable to support free buddy pages.
- */
- if (!get_page_unless_zero(hpage))
- return 0;
- if (!PageLRU(p) && !PageHuge(p))
- shake_page(p, 0);
- /*
- * This implies unable to support non-LRU pages.
- */
- if (!PageLRU(p) && !PageHuge(p))
- return 0;
- /*
- * do a racy check with elevated page count, to make sure PG_hwpoison
- * will only be set for the targeted owner (or on a free page).
- * We temporarily take page lock for try_get_mem_cgroup_from_page().
- * __memory_failure() will redo the check reliably inside page lock.
- */
- lock_page(hpage);
- err = hwpoison_filter(hpage);
- unlock_page(hpage);
- if (err)
- return 0;
- inject:
- printk(KERN_INFO "Injecting memory failure at pfn %lx\n", pfn);
- return __memory_failure(pfn, 18, MF_COUNT_INCREASED);
- }
- static int hwpoison_unpoison(void *data, u64 val)
- {
- if (!capable(CAP_SYS_ADMIN))
- return -EPERM;
- return unpoison_memory(val);
- }
- DEFINE_SIMPLE_ATTRIBUTE(hwpoison_fops, NULL, hwpoison_inject, "%lli\n");
- DEFINE_SIMPLE_ATTRIBUTE(unpoison_fops, NULL, hwpoison_unpoison, "%lli\n");
- static void pfn_inject_exit(void)
- {
- if (hwpoison_dir)
- debugfs_remove_recursive(hwpoison_dir);
- }
- static int pfn_inject_init(void)
- {
- struct dentry *dentry;
- hwpoison_dir = debugfs_create_dir("hwpoison", NULL);
- if (hwpoison_dir == NULL)
- return -ENOMEM;
- /*
- * Note that the below poison/unpoison interfaces do not involve
- * hardware status change, hence do not require hardware support.
- * They are mainly for testing hwpoison in software level.
- */
- dentry = debugfs_create_file("corrupt-pfn", 0600, hwpoison_dir,
- NULL, &hwpoison_fops);
- if (!dentry)
- goto fail;
- dentry = debugfs_create_file("unpoison-pfn", 0600, hwpoison_dir,
- NULL, &unpoison_fops);
- if (!dentry)
- goto fail;
- dentry = debugfs_create_u32("corrupt-filter-enable", 0600,
- hwpoison_dir, &hwpoison_filter_enable);
- if (!dentry)
- goto fail;
- dentry = debugfs_create_u32("corrupt-filter-dev-major", 0600,
- hwpoison_dir, &hwpoison_filter_dev_major);
- if (!dentry)
- goto fail;
- dentry = debugfs_create_u32("corrupt-filter-dev-minor", 0600,
- hwpoison_dir, &hwpoison_filter_dev_minor);
- if (!dentry)
- goto fail;
- dentry = debugfs_create_u64("corrupt-filter-flags-mask", 0600,
- hwpoison_dir, &hwpoison_filter_flags_mask);
- if (!dentry)
- goto fail;
- dentry = debugfs_create_u64("corrupt-filter-flags-value", 0600,
- hwpoison_dir, &hwpoison_filter_flags_value);
- if (!dentry)
- goto fail;
- #ifdef CONFIG_CGROUP_MEM_RES_CTLR_SWAP
- dentry = debugfs_create_u64("corrupt-filter-memcg", 0600,
- hwpoison_dir, &hwpoison_filter_memcg);
- if (!dentry)
- goto fail;
- #endif
- return 0;
- fail:
- pfn_inject_exit();
- return -ENOMEM;
- }
- module_init(pfn_inject_init);
- module_exit(pfn_inject_exit);
- MODULE_LICENSE("GPL");
|