memory-failure.c 23 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812813814815816817818819820821822823824825826827828829830831832833834835836837838839840841842843844845846847848849850851852853854
  1. /*
  2. * Copyright (C) 2008, 2009 Intel Corporation
  3. * Authors: Andi Kleen, Fengguang Wu
  4. *
  5. * This software may be redistributed and/or modified under the terms of
  6. * the GNU General Public License ("GPL") version 2 only as published by the
  7. * Free Software Foundation.
  8. *
  9. * High level machine check handler. Handles pages reported by the
  10. * hardware as being corrupted usually due to a 2bit ECC memory or cache
  11. * failure.
  12. *
  13. * Handles page cache pages in various states. The tricky part
  14. * here is that we can access any page asynchronous to other VM
  15. * users, because memory failures could happen anytime and anywhere,
  16. * possibly violating some of their assumptions. This is why this code
  17. * has to be extremely careful. Generally it tries to use normal locking
  18. * rules, as in get the standard locks, even if that means the
  19. * error handling takes potentially a long time.
  20. *
  21. * The operation to map back from RMAP chains to processes has to walk
  22. * the complete process list and has non linear complexity with the number
  23. * mappings. In short it can be quite slow. But since memory corruptions
  24. * are rare we hope to get away with this.
  25. */
  26. /*
  27. * Notebook:
  28. * - hugetlb needs more code
  29. * - kcore/oldmem/vmcore/mem/kmem check for hwpoison pages
  30. * - pass bad pages to kdump next kernel
  31. */
  32. #define DEBUG 1 /* remove me in 2.6.34 */
  33. #include <linux/kernel.h>
  34. #include <linux/mm.h>
  35. #include <linux/page-flags.h>
  36. #include <linux/sched.h>
  37. #include <linux/ksm.h>
  38. #include <linux/rmap.h>
  39. #include <linux/pagemap.h>
  40. #include <linux/swap.h>
  41. #include <linux/backing-dev.h>
  42. #include "internal.h"
  43. int sysctl_memory_failure_early_kill __read_mostly = 0;
  44. int sysctl_memory_failure_recovery __read_mostly = 1;
  45. atomic_long_t mce_bad_pages __read_mostly = ATOMIC_LONG_INIT(0);
  46. /*
  47. * Send all the processes who have the page mapped an ``action optional''
  48. * signal.
  49. */
  50. static int kill_proc_ao(struct task_struct *t, unsigned long addr, int trapno,
  51. unsigned long pfn)
  52. {
  53. struct siginfo si;
  54. int ret;
  55. printk(KERN_ERR
  56. "MCE %#lx: Killing %s:%d early due to hardware memory corruption\n",
  57. pfn, t->comm, t->pid);
  58. si.si_signo = SIGBUS;
  59. si.si_errno = 0;
  60. si.si_code = BUS_MCEERR_AO;
  61. si.si_addr = (void *)addr;
  62. #ifdef __ARCH_SI_TRAPNO
  63. si.si_trapno = trapno;
  64. #endif
  65. si.si_addr_lsb = PAGE_SHIFT;
  66. /*
  67. * Don't use force here, it's convenient if the signal
  68. * can be temporarily blocked.
  69. * This could cause a loop when the user sets SIGBUS
  70. * to SIG_IGN, but hopefully noone will do that?
  71. */
  72. ret = send_sig_info(SIGBUS, &si, t); /* synchronous? */
  73. if (ret < 0)
  74. printk(KERN_INFO "MCE: Error sending signal to %s:%d: %d\n",
  75. t->comm, t->pid, ret);
  76. return ret;
  77. }
  78. /*
  79. * When a unknown page type is encountered drain as many buffers as possible
  80. * in the hope to turn the page into a LRU or free page, which we can handle.
  81. */
  82. void shake_page(struct page *p)
  83. {
  84. if (!PageSlab(p)) {
  85. lru_add_drain_all();
  86. if (PageLRU(p))
  87. return;
  88. drain_all_pages();
  89. if (PageLRU(p) || is_free_buddy_page(p))
  90. return;
  91. }
  92. /*
  93. * Could call shrink_slab here (which would also
  94. * shrink other caches). Unfortunately that might
  95. * also access the corrupted page, which could be fatal.
  96. */
  97. }
  98. EXPORT_SYMBOL_GPL(shake_page);
  99. /*
  100. * Kill all processes that have a poisoned page mapped and then isolate
  101. * the page.
  102. *
  103. * General strategy:
  104. * Find all processes having the page mapped and kill them.
  105. * But we keep a page reference around so that the page is not
  106. * actually freed yet.
  107. * Then stash the page away
  108. *
  109. * There's no convenient way to get back to mapped processes
  110. * from the VMAs. So do a brute-force search over all
  111. * running processes.
  112. *
  113. * Remember that machine checks are not common (or rather
  114. * if they are common you have other problems), so this shouldn't
  115. * be a performance issue.
  116. *
  117. * Also there are some races possible while we get from the
  118. * error detection to actually handle it.
  119. */
  120. struct to_kill {
  121. struct list_head nd;
  122. struct task_struct *tsk;
  123. unsigned long addr;
  124. unsigned addr_valid:1;
  125. };
  126. /*
  127. * Failure handling: if we can't find or can't kill a process there's
  128. * not much we can do. We just print a message and ignore otherwise.
  129. */
  130. /*
  131. * Schedule a process for later kill.
  132. * Uses GFP_ATOMIC allocations to avoid potential recursions in the VM.
  133. * TBD would GFP_NOIO be enough?
  134. */
  135. static void add_to_kill(struct task_struct *tsk, struct page *p,
  136. struct vm_area_struct *vma,
  137. struct list_head *to_kill,
  138. struct to_kill **tkc)
  139. {
  140. struct to_kill *tk;
  141. if (*tkc) {
  142. tk = *tkc;
  143. *tkc = NULL;
  144. } else {
  145. tk = kmalloc(sizeof(struct to_kill), GFP_ATOMIC);
  146. if (!tk) {
  147. printk(KERN_ERR
  148. "MCE: Out of memory while machine check handling\n");
  149. return;
  150. }
  151. }
  152. tk->addr = page_address_in_vma(p, vma);
  153. tk->addr_valid = 1;
  154. /*
  155. * In theory we don't have to kill when the page was
  156. * munmaped. But it could be also a mremap. Since that's
  157. * likely very rare kill anyways just out of paranoia, but use
  158. * a SIGKILL because the error is not contained anymore.
  159. */
  160. if (tk->addr == -EFAULT) {
  161. pr_debug("MCE: Unable to find user space address %lx in %s\n",
  162. page_to_pfn(p), tsk->comm);
  163. tk->addr_valid = 0;
  164. }
  165. get_task_struct(tsk);
  166. tk->tsk = tsk;
  167. list_add_tail(&tk->nd, to_kill);
  168. }
  169. /*
  170. * Kill the processes that have been collected earlier.
  171. *
  172. * Only do anything when DOIT is set, otherwise just free the list
  173. * (this is used for clean pages which do not need killing)
  174. * Also when FAIL is set do a force kill because something went
  175. * wrong earlier.
  176. */
  177. static void kill_procs_ao(struct list_head *to_kill, int doit, int trapno,
  178. int fail, unsigned long pfn)
  179. {
  180. struct to_kill *tk, *next;
  181. list_for_each_entry_safe (tk, next, to_kill, nd) {
  182. if (doit) {
  183. /*
  184. * In case something went wrong with munmapping
  185. * make sure the process doesn't catch the
  186. * signal and then access the memory. Just kill it.
  187. * the signal handlers
  188. */
  189. if (fail || tk->addr_valid == 0) {
  190. printk(KERN_ERR
  191. "MCE %#lx: forcibly killing %s:%d because of failure to unmap corrupted page\n",
  192. pfn, tk->tsk->comm, tk->tsk->pid);
  193. force_sig(SIGKILL, tk->tsk);
  194. }
  195. /*
  196. * In theory the process could have mapped
  197. * something else on the address in-between. We could
  198. * check for that, but we need to tell the
  199. * process anyways.
  200. */
  201. else if (kill_proc_ao(tk->tsk, tk->addr, trapno,
  202. pfn) < 0)
  203. printk(KERN_ERR
  204. "MCE %#lx: Cannot send advisory machine check signal to %s:%d\n",
  205. pfn, tk->tsk->comm, tk->tsk->pid);
  206. }
  207. put_task_struct(tk->tsk);
  208. kfree(tk);
  209. }
  210. }
  211. static int task_early_kill(struct task_struct *tsk)
  212. {
  213. if (!tsk->mm)
  214. return 0;
  215. if (tsk->flags & PF_MCE_PROCESS)
  216. return !!(tsk->flags & PF_MCE_EARLY);
  217. return sysctl_memory_failure_early_kill;
  218. }
  219. /*
  220. * Collect processes when the error hit an anonymous page.
  221. */
  222. static void collect_procs_anon(struct page *page, struct list_head *to_kill,
  223. struct to_kill **tkc)
  224. {
  225. struct vm_area_struct *vma;
  226. struct task_struct *tsk;
  227. struct anon_vma *av;
  228. read_lock(&tasklist_lock);
  229. av = page_lock_anon_vma(page);
  230. if (av == NULL) /* Not actually mapped anymore */
  231. goto out;
  232. for_each_process (tsk) {
  233. if (!task_early_kill(tsk))
  234. continue;
  235. list_for_each_entry (vma, &av->head, anon_vma_node) {
  236. if (!page_mapped_in_vma(page, vma))
  237. continue;
  238. if (vma->vm_mm == tsk->mm)
  239. add_to_kill(tsk, page, vma, to_kill, tkc);
  240. }
  241. }
  242. page_unlock_anon_vma(av);
  243. out:
  244. read_unlock(&tasklist_lock);
  245. }
  246. /*
  247. * Collect processes when the error hit a file mapped page.
  248. */
  249. static void collect_procs_file(struct page *page, struct list_head *to_kill,
  250. struct to_kill **tkc)
  251. {
  252. struct vm_area_struct *vma;
  253. struct task_struct *tsk;
  254. struct prio_tree_iter iter;
  255. struct address_space *mapping = page->mapping;
  256. /*
  257. * A note on the locking order between the two locks.
  258. * We don't rely on this particular order.
  259. * If you have some other code that needs a different order
  260. * feel free to switch them around. Or add a reverse link
  261. * from mm_struct to task_struct, then this could be all
  262. * done without taking tasklist_lock and looping over all tasks.
  263. */
  264. read_lock(&tasklist_lock);
  265. spin_lock(&mapping->i_mmap_lock);
  266. for_each_process(tsk) {
  267. pgoff_t pgoff = page->index << (PAGE_CACHE_SHIFT - PAGE_SHIFT);
  268. if (!task_early_kill(tsk))
  269. continue;
  270. vma_prio_tree_foreach(vma, &iter, &mapping->i_mmap, pgoff,
  271. pgoff) {
  272. /*
  273. * Send early kill signal to tasks where a vma covers
  274. * the page but the corrupted page is not necessarily
  275. * mapped it in its pte.
  276. * Assume applications who requested early kill want
  277. * to be informed of all such data corruptions.
  278. */
  279. if (vma->vm_mm == tsk->mm)
  280. add_to_kill(tsk, page, vma, to_kill, tkc);
  281. }
  282. }
  283. spin_unlock(&mapping->i_mmap_lock);
  284. read_unlock(&tasklist_lock);
  285. }
  286. /*
  287. * Collect the processes who have the corrupted page mapped to kill.
  288. * This is done in two steps for locking reasons.
  289. * First preallocate one tokill structure outside the spin locks,
  290. * so that we can kill at least one process reasonably reliable.
  291. */
  292. static void collect_procs(struct page *page, struct list_head *tokill)
  293. {
  294. struct to_kill *tk;
  295. if (!page->mapping)
  296. return;
  297. tk = kmalloc(sizeof(struct to_kill), GFP_NOIO);
  298. if (!tk)
  299. return;
  300. if (PageAnon(page))
  301. collect_procs_anon(page, tokill, &tk);
  302. else
  303. collect_procs_file(page, tokill, &tk);
  304. kfree(tk);
  305. }
  306. /*
  307. * Error handlers for various types of pages.
  308. */
  309. enum outcome {
  310. FAILED, /* Error handling failed */
  311. DELAYED, /* Will be handled later */
  312. IGNORED, /* Error safely ignored */
  313. RECOVERED, /* Successfully recovered */
  314. };
  315. static const char *action_name[] = {
  316. [FAILED] = "Failed",
  317. [DELAYED] = "Delayed",
  318. [IGNORED] = "Ignored",
  319. [RECOVERED] = "Recovered",
  320. };
  321. /*
  322. * Error hit kernel page.
  323. * Do nothing, try to be lucky and not touch this instead. For a few cases we
  324. * could be more sophisticated.
  325. */
  326. static int me_kernel(struct page *p, unsigned long pfn)
  327. {
  328. return DELAYED;
  329. }
  330. /*
  331. * Already poisoned page.
  332. */
  333. static int me_ignore(struct page *p, unsigned long pfn)
  334. {
  335. return IGNORED;
  336. }
  337. /*
  338. * Page in unknown state. Do nothing.
  339. */
  340. static int me_unknown(struct page *p, unsigned long pfn)
  341. {
  342. printk(KERN_ERR "MCE %#lx: Unknown page state\n", pfn);
  343. return FAILED;
  344. }
  345. /*
  346. * Free memory
  347. */
  348. static int me_free(struct page *p, unsigned long pfn)
  349. {
  350. return DELAYED;
  351. }
  352. /*
  353. * Clean (or cleaned) page cache page.
  354. */
  355. static int me_pagecache_clean(struct page *p, unsigned long pfn)
  356. {
  357. int err;
  358. int ret = FAILED;
  359. struct address_space *mapping;
  360. /*
  361. * For anonymous pages we're done the only reference left
  362. * should be the one m_f() holds.
  363. */
  364. if (PageAnon(p))
  365. return RECOVERED;
  366. /*
  367. * Now truncate the page in the page cache. This is really
  368. * more like a "temporary hole punch"
  369. * Don't do this for block devices when someone else
  370. * has a reference, because it could be file system metadata
  371. * and that's not safe to truncate.
  372. */
  373. mapping = page_mapping(p);
  374. if (!mapping) {
  375. /*
  376. * Page has been teared down in the meanwhile
  377. */
  378. return FAILED;
  379. }
  380. /*
  381. * Truncation is a bit tricky. Enable it per file system for now.
  382. *
  383. * Open: to take i_mutex or not for this? Right now we don't.
  384. */
  385. if (mapping->a_ops->error_remove_page) {
  386. err = mapping->a_ops->error_remove_page(mapping, p);
  387. if (err != 0) {
  388. printk(KERN_INFO "MCE %#lx: Failed to punch page: %d\n",
  389. pfn, err);
  390. } else if (page_has_private(p) &&
  391. !try_to_release_page(p, GFP_NOIO)) {
  392. pr_debug("MCE %#lx: failed to release buffers\n", pfn);
  393. } else {
  394. ret = RECOVERED;
  395. }
  396. } else {
  397. /*
  398. * If the file system doesn't support it just invalidate
  399. * This fails on dirty or anything with private pages
  400. */
  401. if (invalidate_inode_page(p))
  402. ret = RECOVERED;
  403. else
  404. printk(KERN_INFO "MCE %#lx: Failed to invalidate\n",
  405. pfn);
  406. }
  407. return ret;
  408. }
  409. /*
  410. * Dirty cache page page
  411. * Issues: when the error hit a hole page the error is not properly
  412. * propagated.
  413. */
  414. static int me_pagecache_dirty(struct page *p, unsigned long pfn)
  415. {
  416. struct address_space *mapping = page_mapping(p);
  417. SetPageError(p);
  418. /* TBD: print more information about the file. */
  419. if (mapping) {
  420. /*
  421. * IO error will be reported by write(), fsync(), etc.
  422. * who check the mapping.
  423. * This way the application knows that something went
  424. * wrong with its dirty file data.
  425. *
  426. * There's one open issue:
  427. *
  428. * The EIO will be only reported on the next IO
  429. * operation and then cleared through the IO map.
  430. * Normally Linux has two mechanisms to pass IO error
  431. * first through the AS_EIO flag in the address space
  432. * and then through the PageError flag in the page.
  433. * Since we drop pages on memory failure handling the
  434. * only mechanism open to use is through AS_AIO.
  435. *
  436. * This has the disadvantage that it gets cleared on
  437. * the first operation that returns an error, while
  438. * the PageError bit is more sticky and only cleared
  439. * when the page is reread or dropped. If an
  440. * application assumes it will always get error on
  441. * fsync, but does other operations on the fd before
  442. * and the page is dropped inbetween then the error
  443. * will not be properly reported.
  444. *
  445. * This can already happen even without hwpoisoned
  446. * pages: first on metadata IO errors (which only
  447. * report through AS_EIO) or when the page is dropped
  448. * at the wrong time.
  449. *
  450. * So right now we assume that the application DTRT on
  451. * the first EIO, but we're not worse than other parts
  452. * of the kernel.
  453. */
  454. mapping_set_error(mapping, EIO);
  455. }
  456. return me_pagecache_clean(p, pfn);
  457. }
  458. /*
  459. * Clean and dirty swap cache.
  460. *
  461. * Dirty swap cache page is tricky to handle. The page could live both in page
  462. * cache and swap cache(ie. page is freshly swapped in). So it could be
  463. * referenced concurrently by 2 types of PTEs:
  464. * normal PTEs and swap PTEs. We try to handle them consistently by calling
  465. * try_to_unmap(TTU_IGNORE_HWPOISON) to convert the normal PTEs to swap PTEs,
  466. * and then
  467. * - clear dirty bit to prevent IO
  468. * - remove from LRU
  469. * - but keep in the swap cache, so that when we return to it on
  470. * a later page fault, we know the application is accessing
  471. * corrupted data and shall be killed (we installed simple
  472. * interception code in do_swap_page to catch it).
  473. *
  474. * Clean swap cache pages can be directly isolated. A later page fault will
  475. * bring in the known good data from disk.
  476. */
  477. static int me_swapcache_dirty(struct page *p, unsigned long pfn)
  478. {
  479. ClearPageDirty(p);
  480. /* Trigger EIO in shmem: */
  481. ClearPageUptodate(p);
  482. return DELAYED;
  483. }
  484. static int me_swapcache_clean(struct page *p, unsigned long pfn)
  485. {
  486. delete_from_swap_cache(p);
  487. return RECOVERED;
  488. }
  489. /*
  490. * Huge pages. Needs work.
  491. * Issues:
  492. * No rmap support so we cannot find the original mapper. In theory could walk
  493. * all MMs and look for the mappings, but that would be non atomic and racy.
  494. * Need rmap for hugepages for this. Alternatively we could employ a heuristic,
  495. * like just walking the current process and hoping it has it mapped (that
  496. * should be usually true for the common "shared database cache" case)
  497. * Should handle free huge pages and dequeue them too, but this needs to
  498. * handle huge page accounting correctly.
  499. */
  500. static int me_huge_page(struct page *p, unsigned long pfn)
  501. {
  502. return FAILED;
  503. }
  504. /*
  505. * Various page states we can handle.
  506. *
  507. * A page state is defined by its current page->flags bits.
  508. * The table matches them in order and calls the right handler.
  509. *
  510. * This is quite tricky because we can access page at any time
  511. * in its live cycle, so all accesses have to be extremly careful.
  512. *
  513. * This is not complete. More states could be added.
  514. * For any missing state don't attempt recovery.
  515. */
  516. #define dirty (1UL << PG_dirty)
  517. #define sc (1UL << PG_swapcache)
  518. #define unevict (1UL << PG_unevictable)
  519. #define mlock (1UL << PG_mlocked)
  520. #define writeback (1UL << PG_writeback)
  521. #define lru (1UL << PG_lru)
  522. #define swapbacked (1UL << PG_swapbacked)
  523. #define head (1UL << PG_head)
  524. #define tail (1UL << PG_tail)
  525. #define compound (1UL << PG_compound)
  526. #define slab (1UL << PG_slab)
  527. #define buddy (1UL << PG_buddy)
  528. #define reserved (1UL << PG_reserved)
  529. static struct page_state {
  530. unsigned long mask;
  531. unsigned long res;
  532. char *msg;
  533. int (*action)(struct page *p, unsigned long pfn);
  534. } error_states[] = {
  535. { reserved, reserved, "reserved kernel", me_ignore },
  536. { buddy, buddy, "free kernel", me_free },
  537. /*
  538. * Could in theory check if slab page is free or if we can drop
  539. * currently unused objects without touching them. But just
  540. * treat it as standard kernel for now.
  541. */
  542. { slab, slab, "kernel slab", me_kernel },
  543. #ifdef CONFIG_PAGEFLAGS_EXTENDED
  544. { head, head, "huge", me_huge_page },
  545. { tail, tail, "huge", me_huge_page },
  546. #else
  547. { compound, compound, "huge", me_huge_page },
  548. #endif
  549. { sc|dirty, sc|dirty, "swapcache", me_swapcache_dirty },
  550. { sc|dirty, sc, "swapcache", me_swapcache_clean },
  551. { unevict|dirty, unevict|dirty, "unevictable LRU", me_pagecache_dirty},
  552. { unevict, unevict, "unevictable LRU", me_pagecache_clean},
  553. { mlock|dirty, mlock|dirty, "mlocked LRU", me_pagecache_dirty },
  554. { mlock, mlock, "mlocked LRU", me_pagecache_clean },
  555. { lru|dirty, lru|dirty, "LRU", me_pagecache_dirty },
  556. { lru|dirty, lru, "clean LRU", me_pagecache_clean },
  557. /*
  558. * Catchall entry: must be at end.
  559. */
  560. { 0, 0, "unknown page state", me_unknown },
  561. };
  562. static void action_result(unsigned long pfn, char *msg, int result)
  563. {
  564. struct page *page = pfn_to_page(pfn);
  565. printk(KERN_ERR "MCE %#lx: %s%s page recovery: %s\n",
  566. pfn,
  567. PageDirty(page) ? "dirty " : "",
  568. msg, action_name[result]);
  569. }
  570. static int page_action(struct page_state *ps, struct page *p,
  571. unsigned long pfn, int ref)
  572. {
  573. int result;
  574. int count;
  575. result = ps->action(p, pfn);
  576. action_result(pfn, ps->msg, result);
  577. count = page_count(p) - 1 - ref;
  578. if (count != 0)
  579. printk(KERN_ERR
  580. "MCE %#lx: %s page still referenced by %d users\n",
  581. pfn, ps->msg, count);
  582. /* Could do more checks here if page looks ok */
  583. /*
  584. * Could adjust zone counters here to correct for the missing page.
  585. */
  586. return result == RECOVERED ? 0 : -EBUSY;
  587. }
  588. #define N_UNMAP_TRIES 5
  589. /*
  590. * Do all that is necessary to remove user space mappings. Unmap
  591. * the pages and send SIGBUS to the processes if the data was dirty.
  592. */
  593. static void hwpoison_user_mappings(struct page *p, unsigned long pfn,
  594. int trapno)
  595. {
  596. enum ttu_flags ttu = TTU_UNMAP | TTU_IGNORE_MLOCK | TTU_IGNORE_ACCESS;
  597. struct address_space *mapping;
  598. LIST_HEAD(tokill);
  599. int ret;
  600. int i;
  601. int kill = 1;
  602. if (PageReserved(p) || PageCompound(p) || PageSlab(p) || PageKsm(p))
  603. return;
  604. /*
  605. * This check implies we don't kill processes if their pages
  606. * are in the swap cache early. Those are always late kills.
  607. */
  608. if (!page_mapped(p))
  609. return;
  610. if (PageSwapCache(p)) {
  611. printk(KERN_ERR
  612. "MCE %#lx: keeping poisoned page in swap cache\n", pfn);
  613. ttu |= TTU_IGNORE_HWPOISON;
  614. }
  615. /*
  616. * Propagate the dirty bit from PTEs to struct page first, because we
  617. * need this to decide if we should kill or just drop the page.
  618. */
  619. mapping = page_mapping(p);
  620. if (!PageDirty(p) && mapping && mapping_cap_writeback_dirty(mapping)) {
  621. if (page_mkclean(p)) {
  622. SetPageDirty(p);
  623. } else {
  624. kill = 0;
  625. ttu |= TTU_IGNORE_HWPOISON;
  626. printk(KERN_INFO
  627. "MCE %#lx: corrupted page was clean: dropped without side effects\n",
  628. pfn);
  629. }
  630. }
  631. /*
  632. * First collect all the processes that have the page
  633. * mapped in dirty form. This has to be done before try_to_unmap,
  634. * because ttu takes the rmap data structures down.
  635. *
  636. * Error handling: We ignore errors here because
  637. * there's nothing that can be done.
  638. */
  639. if (kill)
  640. collect_procs(p, &tokill);
  641. /*
  642. * try_to_unmap can fail temporarily due to races.
  643. * Try a few times (RED-PEN better strategy?)
  644. */
  645. for (i = 0; i < N_UNMAP_TRIES; i++) {
  646. ret = try_to_unmap(p, ttu);
  647. if (ret == SWAP_SUCCESS)
  648. break;
  649. pr_debug("MCE %#lx: try_to_unmap retry needed %d\n", pfn, ret);
  650. }
  651. if (ret != SWAP_SUCCESS)
  652. printk(KERN_ERR "MCE %#lx: failed to unmap page (mapcount=%d)\n",
  653. pfn, page_mapcount(p));
  654. /*
  655. * Now that the dirty bit has been propagated to the
  656. * struct page and all unmaps done we can decide if
  657. * killing is needed or not. Only kill when the page
  658. * was dirty, otherwise the tokill list is merely
  659. * freed. When there was a problem unmapping earlier
  660. * use a more force-full uncatchable kill to prevent
  661. * any accesses to the poisoned memory.
  662. */
  663. kill_procs_ao(&tokill, !!PageDirty(p), trapno,
  664. ret != SWAP_SUCCESS, pfn);
  665. }
  666. int __memory_failure(unsigned long pfn, int trapno, int ref)
  667. {
  668. unsigned long lru_flag;
  669. struct page_state *ps;
  670. struct page *p;
  671. int res;
  672. if (!sysctl_memory_failure_recovery)
  673. panic("Memory failure from trap %d on page %lx", trapno, pfn);
  674. if (!pfn_valid(pfn)) {
  675. printk(KERN_ERR
  676. "MCE %#lx: memory outside kernel control\n",
  677. pfn);
  678. return -ENXIO;
  679. }
  680. p = pfn_to_page(pfn);
  681. if (TestSetPageHWPoison(p)) {
  682. action_result(pfn, "already hardware poisoned", IGNORED);
  683. return 0;
  684. }
  685. atomic_long_add(1, &mce_bad_pages);
  686. /*
  687. * We need/can do nothing about count=0 pages.
  688. * 1) it's a free page, and therefore in safe hand:
  689. * prep_new_page() will be the gate keeper.
  690. * 2) it's part of a non-compound high order page.
  691. * Implies some kernel user: cannot stop them from
  692. * R/W the page; let's pray that the page has been
  693. * used and will be freed some time later.
  694. * In fact it's dangerous to directly bump up page count from 0,
  695. * that may make page_freeze_refs()/page_unfreeze_refs() mismatch.
  696. */
  697. if (!get_page_unless_zero(compound_head(p))) {
  698. action_result(pfn, "free or high order kernel", IGNORED);
  699. return PageBuddy(compound_head(p)) ? 0 : -EBUSY;
  700. }
  701. /*
  702. * We ignore non-LRU pages for good reasons.
  703. * - PG_locked is only well defined for LRU pages and a few others
  704. * - to avoid races with __set_page_locked()
  705. * - to avoid races with __SetPageSlab*() (and more non-atomic ops)
  706. * The check (unnecessarily) ignores LRU pages being isolated and
  707. * walked by the page reclaim code, however that's not a big loss.
  708. */
  709. if (!PageLRU(p))
  710. lru_add_drain_all();
  711. lru_flag = p->flags & lru;
  712. if (isolate_lru_page(p)) {
  713. action_result(pfn, "non LRU", IGNORED);
  714. put_page(p);
  715. return -EBUSY;
  716. }
  717. page_cache_release(p);
  718. /*
  719. * Lock the page and wait for writeback to finish.
  720. * It's very difficult to mess with pages currently under IO
  721. * and in many cases impossible, so we just avoid it here.
  722. */
  723. lock_page_nosync(p);
  724. wait_on_page_writeback(p);
  725. /*
  726. * Now take care of user space mappings.
  727. */
  728. hwpoison_user_mappings(p, pfn, trapno);
  729. /*
  730. * Torn down by someone else?
  731. */
  732. if ((lru_flag & lru) && !PageSwapCache(p) && p->mapping == NULL) {
  733. action_result(pfn, "already truncated LRU", IGNORED);
  734. res = 0;
  735. goto out;
  736. }
  737. res = -EBUSY;
  738. for (ps = error_states;; ps++) {
  739. if (((p->flags | lru_flag)& ps->mask) == ps->res) {
  740. res = page_action(ps, p, pfn, ref);
  741. break;
  742. }
  743. }
  744. out:
  745. unlock_page(p);
  746. return res;
  747. }
  748. EXPORT_SYMBOL_GPL(__memory_failure);
  749. /**
  750. * memory_failure - Handle memory failure of a page.
  751. * @pfn: Page Number of the corrupted page
  752. * @trapno: Trap number reported in the signal to user space.
  753. *
  754. * This function is called by the low level machine check code
  755. * of an architecture when it detects hardware memory corruption
  756. * of a page. It tries its best to recover, which includes
  757. * dropping pages, killing processes etc.
  758. *
  759. * The function is primarily of use for corruptions that
  760. * happen outside the current execution context (e.g. when
  761. * detected by a background scrubber)
  762. *
  763. * Must run in process context (e.g. a work queue) with interrupts
  764. * enabled and no spinlocks hold.
  765. */
  766. void memory_failure(unsigned long pfn, int trapno)
  767. {
  768. __memory_failure(pfn, trapno, 0);
  769. }