memory-failure.c 26 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812813814815816817818819820821822823824825826827828829830831832833834835836837838839840841842843844845846847848849850851852853854855856857858859860861862863864865866867868869870871872873874875876877878879880881882883884885886887888889890891892893894895896897898899900901902903904905906907908909910911912913914915916917918919920921922923924925926927928929930931932933934935936937938939940941942943944945946947948949950951952953954955
  1. /*
  2. * Copyright (C) 2008, 2009 Intel Corporation
  3. * Authors: Andi Kleen, Fengguang Wu
  4. *
  5. * This software may be redistributed and/or modified under the terms of
  6. * the GNU General Public License ("GPL") version 2 only as published by the
  7. * Free Software Foundation.
  8. *
  9. * High level machine check handler. Handles pages reported by the
  10. * hardware as being corrupted usually due to a 2bit ECC memory or cache
  11. * failure.
  12. *
  13. * Handles page cache pages in various states. The tricky part
  14. * here is that we can access any page asynchronous to other VM
  15. * users, because memory failures could happen anytime and anywhere,
  16. * possibly violating some of their assumptions. This is why this code
  17. * has to be extremely careful. Generally it tries to use normal locking
  18. * rules, as in get the standard locks, even if that means the
  19. * error handling takes potentially a long time.
  20. *
  21. * The operation to map back from RMAP chains to processes has to walk
  22. * the complete process list and has non linear complexity with the number
  23. * mappings. In short it can be quite slow. But since memory corruptions
  24. * are rare we hope to get away with this.
  25. */
  26. /*
  27. * Notebook:
  28. * - hugetlb needs more code
  29. * - kcore/oldmem/vmcore/mem/kmem check for hwpoison pages
  30. * - pass bad pages to kdump next kernel
  31. */
  32. #define DEBUG 1 /* remove me in 2.6.34 */
  33. #include <linux/kernel.h>
  34. #include <linux/mm.h>
  35. #include <linux/page-flags.h>
  36. #include <linux/sched.h>
  37. #include <linux/ksm.h>
  38. #include <linux/rmap.h>
  39. #include <linux/pagemap.h>
  40. #include <linux/swap.h>
  41. #include <linux/backing-dev.h>
  42. #include "internal.h"
  43. int sysctl_memory_failure_early_kill __read_mostly = 0;
  44. int sysctl_memory_failure_recovery __read_mostly = 1;
  45. atomic_long_t mce_bad_pages __read_mostly = ATOMIC_LONG_INIT(0);
  46. /*
  47. * Send all the processes who have the page mapped an ``action optional''
  48. * signal.
  49. */
  50. static int kill_proc_ao(struct task_struct *t, unsigned long addr, int trapno,
  51. unsigned long pfn)
  52. {
  53. struct siginfo si;
  54. int ret;
  55. printk(KERN_ERR
  56. "MCE %#lx: Killing %s:%d early due to hardware memory corruption\n",
  57. pfn, t->comm, t->pid);
  58. si.si_signo = SIGBUS;
  59. si.si_errno = 0;
  60. si.si_code = BUS_MCEERR_AO;
  61. si.si_addr = (void *)addr;
  62. #ifdef __ARCH_SI_TRAPNO
  63. si.si_trapno = trapno;
  64. #endif
  65. si.si_addr_lsb = PAGE_SHIFT;
  66. /*
  67. * Don't use force here, it's convenient if the signal
  68. * can be temporarily blocked.
  69. * This could cause a loop when the user sets SIGBUS
  70. * to SIG_IGN, but hopefully noone will do that?
  71. */
  72. ret = send_sig_info(SIGBUS, &si, t); /* synchronous? */
  73. if (ret < 0)
  74. printk(KERN_INFO "MCE: Error sending signal to %s:%d: %d\n",
  75. t->comm, t->pid, ret);
  76. return ret;
  77. }
  78. /*
  79. * When a unknown page type is encountered drain as many buffers as possible
  80. * in the hope to turn the page into a LRU or free page, which we can handle.
  81. */
  82. void shake_page(struct page *p)
  83. {
  84. if (!PageSlab(p)) {
  85. lru_add_drain_all();
  86. if (PageLRU(p))
  87. return;
  88. drain_all_pages();
  89. if (PageLRU(p) || is_free_buddy_page(p))
  90. return;
  91. }
  92. /*
  93. * Could call shrink_slab here (which would also
  94. * shrink other caches). Unfortunately that might
  95. * also access the corrupted page, which could be fatal.
  96. */
  97. }
  98. EXPORT_SYMBOL_GPL(shake_page);
  99. /*
  100. * Kill all processes that have a poisoned page mapped and then isolate
  101. * the page.
  102. *
  103. * General strategy:
  104. * Find all processes having the page mapped and kill them.
  105. * But we keep a page reference around so that the page is not
  106. * actually freed yet.
  107. * Then stash the page away
  108. *
  109. * There's no convenient way to get back to mapped processes
  110. * from the VMAs. So do a brute-force search over all
  111. * running processes.
  112. *
  113. * Remember that machine checks are not common (or rather
  114. * if they are common you have other problems), so this shouldn't
  115. * be a performance issue.
  116. *
  117. * Also there are some races possible while we get from the
  118. * error detection to actually handle it.
  119. */
  120. struct to_kill {
  121. struct list_head nd;
  122. struct task_struct *tsk;
  123. unsigned long addr;
  124. unsigned addr_valid:1;
  125. };
  126. /*
  127. * Failure handling: if we can't find or can't kill a process there's
  128. * not much we can do. We just print a message and ignore otherwise.
  129. */
  130. /*
  131. * Schedule a process for later kill.
  132. * Uses GFP_ATOMIC allocations to avoid potential recursions in the VM.
  133. * TBD would GFP_NOIO be enough?
  134. */
  135. static void add_to_kill(struct task_struct *tsk, struct page *p,
  136. struct vm_area_struct *vma,
  137. struct list_head *to_kill,
  138. struct to_kill **tkc)
  139. {
  140. struct to_kill *tk;
  141. if (*tkc) {
  142. tk = *tkc;
  143. *tkc = NULL;
  144. } else {
  145. tk = kmalloc(sizeof(struct to_kill), GFP_ATOMIC);
  146. if (!tk) {
  147. printk(KERN_ERR
  148. "MCE: Out of memory while machine check handling\n");
  149. return;
  150. }
  151. }
  152. tk->addr = page_address_in_vma(p, vma);
  153. tk->addr_valid = 1;
  154. /*
  155. * In theory we don't have to kill when the page was
  156. * munmaped. But it could be also a mremap. Since that's
  157. * likely very rare kill anyways just out of paranoia, but use
  158. * a SIGKILL because the error is not contained anymore.
  159. */
  160. if (tk->addr == -EFAULT) {
  161. pr_debug("MCE: Unable to find user space address %lx in %s\n",
  162. page_to_pfn(p), tsk->comm);
  163. tk->addr_valid = 0;
  164. }
  165. get_task_struct(tsk);
  166. tk->tsk = tsk;
  167. list_add_tail(&tk->nd, to_kill);
  168. }
  169. /*
  170. * Kill the processes that have been collected earlier.
  171. *
  172. * Only do anything when DOIT is set, otherwise just free the list
  173. * (this is used for clean pages which do not need killing)
  174. * Also when FAIL is set do a force kill because something went
  175. * wrong earlier.
  176. */
  177. static void kill_procs_ao(struct list_head *to_kill, int doit, int trapno,
  178. int fail, unsigned long pfn)
  179. {
  180. struct to_kill *tk, *next;
  181. list_for_each_entry_safe (tk, next, to_kill, nd) {
  182. if (doit) {
  183. /*
  184. * In case something went wrong with munmapping
  185. * make sure the process doesn't catch the
  186. * signal and then access the memory. Just kill it.
  187. * the signal handlers
  188. */
  189. if (fail || tk->addr_valid == 0) {
  190. printk(KERN_ERR
  191. "MCE %#lx: forcibly killing %s:%d because of failure to unmap corrupted page\n",
  192. pfn, tk->tsk->comm, tk->tsk->pid);
  193. force_sig(SIGKILL, tk->tsk);
  194. }
  195. /*
  196. * In theory the process could have mapped
  197. * something else on the address in-between. We could
  198. * check for that, but we need to tell the
  199. * process anyways.
  200. */
  201. else if (kill_proc_ao(tk->tsk, tk->addr, trapno,
  202. pfn) < 0)
  203. printk(KERN_ERR
  204. "MCE %#lx: Cannot send advisory machine check signal to %s:%d\n",
  205. pfn, tk->tsk->comm, tk->tsk->pid);
  206. }
  207. put_task_struct(tk->tsk);
  208. kfree(tk);
  209. }
  210. }
  211. static int task_early_kill(struct task_struct *tsk)
  212. {
  213. if (!tsk->mm)
  214. return 0;
  215. if (tsk->flags & PF_MCE_PROCESS)
  216. return !!(tsk->flags & PF_MCE_EARLY);
  217. return sysctl_memory_failure_early_kill;
  218. }
  219. /*
  220. * Collect processes when the error hit an anonymous page.
  221. */
  222. static void collect_procs_anon(struct page *page, struct list_head *to_kill,
  223. struct to_kill **tkc)
  224. {
  225. struct vm_area_struct *vma;
  226. struct task_struct *tsk;
  227. struct anon_vma *av;
  228. read_lock(&tasklist_lock);
  229. av = page_lock_anon_vma(page);
  230. if (av == NULL) /* Not actually mapped anymore */
  231. goto out;
  232. for_each_process (tsk) {
  233. if (!task_early_kill(tsk))
  234. continue;
  235. list_for_each_entry (vma, &av->head, anon_vma_node) {
  236. if (!page_mapped_in_vma(page, vma))
  237. continue;
  238. if (vma->vm_mm == tsk->mm)
  239. add_to_kill(tsk, page, vma, to_kill, tkc);
  240. }
  241. }
  242. page_unlock_anon_vma(av);
  243. out:
  244. read_unlock(&tasklist_lock);
  245. }
  246. /*
  247. * Collect processes when the error hit a file mapped page.
  248. */
  249. static void collect_procs_file(struct page *page, struct list_head *to_kill,
  250. struct to_kill **tkc)
  251. {
  252. struct vm_area_struct *vma;
  253. struct task_struct *tsk;
  254. struct prio_tree_iter iter;
  255. struct address_space *mapping = page->mapping;
  256. /*
  257. * A note on the locking order between the two locks.
  258. * We don't rely on this particular order.
  259. * If you have some other code that needs a different order
  260. * feel free to switch them around. Or add a reverse link
  261. * from mm_struct to task_struct, then this could be all
  262. * done without taking tasklist_lock and looping over all tasks.
  263. */
  264. read_lock(&tasklist_lock);
  265. spin_lock(&mapping->i_mmap_lock);
  266. for_each_process(tsk) {
  267. pgoff_t pgoff = page->index << (PAGE_CACHE_SHIFT - PAGE_SHIFT);
  268. if (!task_early_kill(tsk))
  269. continue;
  270. vma_prio_tree_foreach(vma, &iter, &mapping->i_mmap, pgoff,
  271. pgoff) {
  272. /*
  273. * Send early kill signal to tasks where a vma covers
  274. * the page but the corrupted page is not necessarily
  275. * mapped it in its pte.
  276. * Assume applications who requested early kill want
  277. * to be informed of all such data corruptions.
  278. */
  279. if (vma->vm_mm == tsk->mm)
  280. add_to_kill(tsk, page, vma, to_kill, tkc);
  281. }
  282. }
  283. spin_unlock(&mapping->i_mmap_lock);
  284. read_unlock(&tasklist_lock);
  285. }
  286. /*
  287. * Collect the processes who have the corrupted page mapped to kill.
  288. * This is done in two steps for locking reasons.
  289. * First preallocate one tokill structure outside the spin locks,
  290. * so that we can kill at least one process reasonably reliable.
  291. */
  292. static void collect_procs(struct page *page, struct list_head *tokill)
  293. {
  294. struct to_kill *tk;
  295. if (!page->mapping)
  296. return;
  297. tk = kmalloc(sizeof(struct to_kill), GFP_NOIO);
  298. if (!tk)
  299. return;
  300. if (PageAnon(page))
  301. collect_procs_anon(page, tokill, &tk);
  302. else
  303. collect_procs_file(page, tokill, &tk);
  304. kfree(tk);
  305. }
  306. /*
  307. * Error handlers for various types of pages.
  308. */
  309. enum outcome {
  310. IGNORED, /* Error: cannot be handled */
  311. FAILED, /* Error: handling failed */
  312. DELAYED, /* Will be handled later */
  313. RECOVERED, /* Successfully recovered */
  314. };
  315. static const char *action_name[] = {
  316. [IGNORED] = "Ignored",
  317. [FAILED] = "Failed",
  318. [DELAYED] = "Delayed",
  319. [RECOVERED] = "Recovered",
  320. };
  321. /*
  322. * XXX: It is possible that a page is isolated from LRU cache,
  323. * and then kept in swap cache or failed to remove from page cache.
  324. * The page count will stop it from being freed by unpoison.
  325. * Stress tests should be aware of this memory leak problem.
  326. */
  327. static int delete_from_lru_cache(struct page *p)
  328. {
  329. if (!isolate_lru_page(p)) {
  330. /*
  331. * Clear sensible page flags, so that the buddy system won't
  332. * complain when the page is unpoison-and-freed.
  333. */
  334. ClearPageActive(p);
  335. ClearPageUnevictable(p);
  336. /*
  337. * drop the page count elevated by isolate_lru_page()
  338. */
  339. page_cache_release(p);
  340. return 0;
  341. }
  342. return -EIO;
  343. }
  344. /*
  345. * Error hit kernel page.
  346. * Do nothing, try to be lucky and not touch this instead. For a few cases we
  347. * could be more sophisticated.
  348. */
  349. static int me_kernel(struct page *p, unsigned long pfn)
  350. {
  351. return IGNORED;
  352. }
  353. /*
  354. * Page in unknown state. Do nothing.
  355. */
  356. static int me_unknown(struct page *p, unsigned long pfn)
  357. {
  358. printk(KERN_ERR "MCE %#lx: Unknown page state\n", pfn);
  359. return FAILED;
  360. }
  361. /*
  362. * Clean (or cleaned) page cache page.
  363. */
  364. static int me_pagecache_clean(struct page *p, unsigned long pfn)
  365. {
  366. int err;
  367. int ret = FAILED;
  368. struct address_space *mapping;
  369. delete_from_lru_cache(p);
  370. /*
  371. * For anonymous pages we're done the only reference left
  372. * should be the one m_f() holds.
  373. */
  374. if (PageAnon(p))
  375. return RECOVERED;
  376. /*
  377. * Now truncate the page in the page cache. This is really
  378. * more like a "temporary hole punch"
  379. * Don't do this for block devices when someone else
  380. * has a reference, because it could be file system metadata
  381. * and that's not safe to truncate.
  382. */
  383. mapping = page_mapping(p);
  384. if (!mapping) {
  385. /*
  386. * Page has been teared down in the meanwhile
  387. */
  388. return FAILED;
  389. }
  390. /*
  391. * Truncation is a bit tricky. Enable it per file system for now.
  392. *
  393. * Open: to take i_mutex or not for this? Right now we don't.
  394. */
  395. if (mapping->a_ops->error_remove_page) {
  396. err = mapping->a_ops->error_remove_page(mapping, p);
  397. if (err != 0) {
  398. printk(KERN_INFO "MCE %#lx: Failed to punch page: %d\n",
  399. pfn, err);
  400. } else if (page_has_private(p) &&
  401. !try_to_release_page(p, GFP_NOIO)) {
  402. pr_debug("MCE %#lx: failed to release buffers\n", pfn);
  403. } else {
  404. ret = RECOVERED;
  405. }
  406. } else {
  407. /*
  408. * If the file system doesn't support it just invalidate
  409. * This fails on dirty or anything with private pages
  410. */
  411. if (invalidate_inode_page(p))
  412. ret = RECOVERED;
  413. else
  414. printk(KERN_INFO "MCE %#lx: Failed to invalidate\n",
  415. pfn);
  416. }
  417. return ret;
  418. }
  419. /*
  420. * Dirty cache page page
  421. * Issues: when the error hit a hole page the error is not properly
  422. * propagated.
  423. */
  424. static int me_pagecache_dirty(struct page *p, unsigned long pfn)
  425. {
  426. struct address_space *mapping = page_mapping(p);
  427. SetPageError(p);
  428. /* TBD: print more information about the file. */
  429. if (mapping) {
  430. /*
  431. * IO error will be reported by write(), fsync(), etc.
  432. * who check the mapping.
  433. * This way the application knows that something went
  434. * wrong with its dirty file data.
  435. *
  436. * There's one open issue:
  437. *
  438. * The EIO will be only reported on the next IO
  439. * operation and then cleared through the IO map.
  440. * Normally Linux has two mechanisms to pass IO error
  441. * first through the AS_EIO flag in the address space
  442. * and then through the PageError flag in the page.
  443. * Since we drop pages on memory failure handling the
  444. * only mechanism open to use is through AS_AIO.
  445. *
  446. * This has the disadvantage that it gets cleared on
  447. * the first operation that returns an error, while
  448. * the PageError bit is more sticky and only cleared
  449. * when the page is reread or dropped. If an
  450. * application assumes it will always get error on
  451. * fsync, but does other operations on the fd before
  452. * and the page is dropped inbetween then the error
  453. * will not be properly reported.
  454. *
  455. * This can already happen even without hwpoisoned
  456. * pages: first on metadata IO errors (which only
  457. * report through AS_EIO) or when the page is dropped
  458. * at the wrong time.
  459. *
  460. * So right now we assume that the application DTRT on
  461. * the first EIO, but we're not worse than other parts
  462. * of the kernel.
  463. */
  464. mapping_set_error(mapping, EIO);
  465. }
  466. return me_pagecache_clean(p, pfn);
  467. }
  468. /*
  469. * Clean and dirty swap cache.
  470. *
  471. * Dirty swap cache page is tricky to handle. The page could live both in page
  472. * cache and swap cache(ie. page is freshly swapped in). So it could be
  473. * referenced concurrently by 2 types of PTEs:
  474. * normal PTEs and swap PTEs. We try to handle them consistently by calling
  475. * try_to_unmap(TTU_IGNORE_HWPOISON) to convert the normal PTEs to swap PTEs,
  476. * and then
  477. * - clear dirty bit to prevent IO
  478. * - remove from LRU
  479. * - but keep in the swap cache, so that when we return to it on
  480. * a later page fault, we know the application is accessing
  481. * corrupted data and shall be killed (we installed simple
  482. * interception code in do_swap_page to catch it).
  483. *
  484. * Clean swap cache pages can be directly isolated. A later page fault will
  485. * bring in the known good data from disk.
  486. */
  487. static int me_swapcache_dirty(struct page *p, unsigned long pfn)
  488. {
  489. ClearPageDirty(p);
  490. /* Trigger EIO in shmem: */
  491. ClearPageUptodate(p);
  492. if (!delete_from_lru_cache(p))
  493. return DELAYED;
  494. else
  495. return FAILED;
  496. }
  497. static int me_swapcache_clean(struct page *p, unsigned long pfn)
  498. {
  499. delete_from_swap_cache(p);
  500. if (!delete_from_lru_cache(p))
  501. return RECOVERED;
  502. else
  503. return FAILED;
  504. }
  505. /*
  506. * Huge pages. Needs work.
  507. * Issues:
  508. * No rmap support so we cannot find the original mapper. In theory could walk
  509. * all MMs and look for the mappings, but that would be non atomic and racy.
  510. * Need rmap for hugepages for this. Alternatively we could employ a heuristic,
  511. * like just walking the current process and hoping it has it mapped (that
  512. * should be usually true for the common "shared database cache" case)
  513. * Should handle free huge pages and dequeue them too, but this needs to
  514. * handle huge page accounting correctly.
  515. */
  516. static int me_huge_page(struct page *p, unsigned long pfn)
  517. {
  518. return FAILED;
  519. }
  520. /*
  521. * Various page states we can handle.
  522. *
  523. * A page state is defined by its current page->flags bits.
  524. * The table matches them in order and calls the right handler.
  525. *
  526. * This is quite tricky because we can access page at any time
  527. * in its live cycle, so all accesses have to be extremly careful.
  528. *
  529. * This is not complete. More states could be added.
  530. * For any missing state don't attempt recovery.
  531. */
  532. #define dirty (1UL << PG_dirty)
  533. #define sc (1UL << PG_swapcache)
  534. #define unevict (1UL << PG_unevictable)
  535. #define mlock (1UL << PG_mlocked)
  536. #define writeback (1UL << PG_writeback)
  537. #define lru (1UL << PG_lru)
  538. #define swapbacked (1UL << PG_swapbacked)
  539. #define head (1UL << PG_head)
  540. #define tail (1UL << PG_tail)
  541. #define compound (1UL << PG_compound)
  542. #define slab (1UL << PG_slab)
  543. #define reserved (1UL << PG_reserved)
  544. static struct page_state {
  545. unsigned long mask;
  546. unsigned long res;
  547. char *msg;
  548. int (*action)(struct page *p, unsigned long pfn);
  549. } error_states[] = {
  550. { reserved, reserved, "reserved kernel", me_kernel },
  551. /*
  552. * free pages are specially detected outside this table:
  553. * PG_buddy pages only make a small fraction of all free pages.
  554. */
  555. /*
  556. * Could in theory check if slab page is free or if we can drop
  557. * currently unused objects without touching them. But just
  558. * treat it as standard kernel for now.
  559. */
  560. { slab, slab, "kernel slab", me_kernel },
  561. #ifdef CONFIG_PAGEFLAGS_EXTENDED
  562. { head, head, "huge", me_huge_page },
  563. { tail, tail, "huge", me_huge_page },
  564. #else
  565. { compound, compound, "huge", me_huge_page },
  566. #endif
  567. { sc|dirty, sc|dirty, "swapcache", me_swapcache_dirty },
  568. { sc|dirty, sc, "swapcache", me_swapcache_clean },
  569. { unevict|dirty, unevict|dirty, "unevictable LRU", me_pagecache_dirty},
  570. { unevict, unevict, "unevictable LRU", me_pagecache_clean},
  571. { mlock|dirty, mlock|dirty, "mlocked LRU", me_pagecache_dirty },
  572. { mlock, mlock, "mlocked LRU", me_pagecache_clean },
  573. { lru|dirty, lru|dirty, "LRU", me_pagecache_dirty },
  574. { lru|dirty, lru, "clean LRU", me_pagecache_clean },
  575. /*
  576. * Catchall entry: must be at end.
  577. */
  578. { 0, 0, "unknown page state", me_unknown },
  579. };
  580. static void action_result(unsigned long pfn, char *msg, int result)
  581. {
  582. struct page *page = pfn_to_page(pfn);
  583. printk(KERN_ERR "MCE %#lx: %s%s page recovery: %s\n",
  584. pfn,
  585. PageDirty(page) ? "dirty " : "",
  586. msg, action_name[result]);
  587. }
  588. static int page_action(struct page_state *ps, struct page *p,
  589. unsigned long pfn)
  590. {
  591. int result;
  592. int count;
  593. result = ps->action(p, pfn);
  594. action_result(pfn, ps->msg, result);
  595. count = page_count(p) - 1;
  596. if (count != 0)
  597. printk(KERN_ERR
  598. "MCE %#lx: %s page still referenced by %d users\n",
  599. pfn, ps->msg, count);
  600. /* Could do more checks here if page looks ok */
  601. /*
  602. * Could adjust zone counters here to correct for the missing page.
  603. */
  604. return result == RECOVERED ? 0 : -EBUSY;
  605. }
  606. #define N_UNMAP_TRIES 5
  607. /*
  608. * Do all that is necessary to remove user space mappings. Unmap
  609. * the pages and send SIGBUS to the processes if the data was dirty.
  610. */
  611. static int hwpoison_user_mappings(struct page *p, unsigned long pfn,
  612. int trapno)
  613. {
  614. enum ttu_flags ttu = TTU_UNMAP | TTU_IGNORE_MLOCK | TTU_IGNORE_ACCESS;
  615. struct address_space *mapping;
  616. LIST_HEAD(tokill);
  617. int ret;
  618. int i;
  619. int kill = 1;
  620. if (PageReserved(p) || PageSlab(p))
  621. return SWAP_SUCCESS;
  622. /*
  623. * This check implies we don't kill processes if their pages
  624. * are in the swap cache early. Those are always late kills.
  625. */
  626. if (!page_mapped(p))
  627. return SWAP_SUCCESS;
  628. if (PageCompound(p) || PageKsm(p))
  629. return SWAP_FAIL;
  630. if (PageSwapCache(p)) {
  631. printk(KERN_ERR
  632. "MCE %#lx: keeping poisoned page in swap cache\n", pfn);
  633. ttu |= TTU_IGNORE_HWPOISON;
  634. }
  635. /*
  636. * Propagate the dirty bit from PTEs to struct page first, because we
  637. * need this to decide if we should kill or just drop the page.
  638. * XXX: the dirty test could be racy: set_page_dirty() may not always
  639. * be called inside page lock (it's recommended but not enforced).
  640. */
  641. mapping = page_mapping(p);
  642. if (!PageDirty(p) && mapping && mapping_cap_writeback_dirty(mapping)) {
  643. if (page_mkclean(p)) {
  644. SetPageDirty(p);
  645. } else {
  646. kill = 0;
  647. ttu |= TTU_IGNORE_HWPOISON;
  648. printk(KERN_INFO
  649. "MCE %#lx: corrupted page was clean: dropped without side effects\n",
  650. pfn);
  651. }
  652. }
  653. /*
  654. * First collect all the processes that have the page
  655. * mapped in dirty form. This has to be done before try_to_unmap,
  656. * because ttu takes the rmap data structures down.
  657. *
  658. * Error handling: We ignore errors here because
  659. * there's nothing that can be done.
  660. */
  661. if (kill)
  662. collect_procs(p, &tokill);
  663. /*
  664. * try_to_unmap can fail temporarily due to races.
  665. * Try a few times (RED-PEN better strategy?)
  666. */
  667. for (i = 0; i < N_UNMAP_TRIES; i++) {
  668. ret = try_to_unmap(p, ttu);
  669. if (ret == SWAP_SUCCESS)
  670. break;
  671. pr_debug("MCE %#lx: try_to_unmap retry needed %d\n", pfn, ret);
  672. }
  673. if (ret != SWAP_SUCCESS)
  674. printk(KERN_ERR "MCE %#lx: failed to unmap page (mapcount=%d)\n",
  675. pfn, page_mapcount(p));
  676. /*
  677. * Now that the dirty bit has been propagated to the
  678. * struct page and all unmaps done we can decide if
  679. * killing is needed or not. Only kill when the page
  680. * was dirty, otherwise the tokill list is merely
  681. * freed. When there was a problem unmapping earlier
  682. * use a more force-full uncatchable kill to prevent
  683. * any accesses to the poisoned memory.
  684. */
  685. kill_procs_ao(&tokill, !!PageDirty(p), trapno,
  686. ret != SWAP_SUCCESS, pfn);
  687. return ret;
  688. }
  689. int __memory_failure(unsigned long pfn, int trapno, int flags)
  690. {
  691. struct page_state *ps;
  692. struct page *p;
  693. int res;
  694. if (!sysctl_memory_failure_recovery)
  695. panic("Memory failure from trap %d on page %lx", trapno, pfn);
  696. if (!pfn_valid(pfn)) {
  697. printk(KERN_ERR
  698. "MCE %#lx: memory outside kernel control\n",
  699. pfn);
  700. return -ENXIO;
  701. }
  702. p = pfn_to_page(pfn);
  703. if (TestSetPageHWPoison(p)) {
  704. printk(KERN_ERR "MCE %#lx: already hardware poisoned\n", pfn);
  705. return 0;
  706. }
  707. atomic_long_add(1, &mce_bad_pages);
  708. /*
  709. * We need/can do nothing about count=0 pages.
  710. * 1) it's a free page, and therefore in safe hand:
  711. * prep_new_page() will be the gate keeper.
  712. * 2) it's part of a non-compound high order page.
  713. * Implies some kernel user: cannot stop them from
  714. * R/W the page; let's pray that the page has been
  715. * used and will be freed some time later.
  716. * In fact it's dangerous to directly bump up page count from 0,
  717. * that may make page_freeze_refs()/page_unfreeze_refs() mismatch.
  718. */
  719. if (!(flags & MF_COUNT_INCREASED) &&
  720. !get_page_unless_zero(compound_head(p))) {
  721. if (is_free_buddy_page(p)) {
  722. action_result(pfn, "free buddy", DELAYED);
  723. return 0;
  724. } else {
  725. action_result(pfn, "high order kernel", IGNORED);
  726. return -EBUSY;
  727. }
  728. }
  729. /*
  730. * We ignore non-LRU pages for good reasons.
  731. * - PG_locked is only well defined for LRU pages and a few others
  732. * - to avoid races with __set_page_locked()
  733. * - to avoid races with __SetPageSlab*() (and more non-atomic ops)
  734. * The check (unnecessarily) ignores LRU pages being isolated and
  735. * walked by the page reclaim code, however that's not a big loss.
  736. */
  737. if (!PageLRU(p))
  738. lru_add_drain_all();
  739. if (!PageLRU(p)) {
  740. action_result(pfn, "non LRU", IGNORED);
  741. put_page(p);
  742. return -EBUSY;
  743. }
  744. /*
  745. * Lock the page and wait for writeback to finish.
  746. * It's very difficult to mess with pages currently under IO
  747. * and in many cases impossible, so we just avoid it here.
  748. */
  749. lock_page_nosync(p);
  750. /*
  751. * unpoison always clear PG_hwpoison inside page lock
  752. */
  753. if (!PageHWPoison(p)) {
  754. printk(KERN_ERR "MCE %#lx: just unpoisoned\n", pfn);
  755. res = 0;
  756. goto out;
  757. }
  758. wait_on_page_writeback(p);
  759. /*
  760. * Now take care of user space mappings.
  761. * Abort on fail: __remove_from_page_cache() assumes unmapped page.
  762. */
  763. if (hwpoison_user_mappings(p, pfn, trapno) != SWAP_SUCCESS) {
  764. printk(KERN_ERR "MCE %#lx: cannot unmap page, give up\n", pfn);
  765. res = -EBUSY;
  766. goto out;
  767. }
  768. /*
  769. * Torn down by someone else?
  770. */
  771. if (PageLRU(p) && !PageSwapCache(p) && p->mapping == NULL) {
  772. action_result(pfn, "already truncated LRU", IGNORED);
  773. res = -EBUSY;
  774. goto out;
  775. }
  776. res = -EBUSY;
  777. for (ps = error_states;; ps++) {
  778. if ((p->flags & ps->mask) == ps->res) {
  779. res = page_action(ps, p, pfn);
  780. break;
  781. }
  782. }
  783. out:
  784. unlock_page(p);
  785. return res;
  786. }
  787. EXPORT_SYMBOL_GPL(__memory_failure);
  788. /**
  789. * memory_failure - Handle memory failure of a page.
  790. * @pfn: Page Number of the corrupted page
  791. * @trapno: Trap number reported in the signal to user space.
  792. *
  793. * This function is called by the low level machine check code
  794. * of an architecture when it detects hardware memory corruption
  795. * of a page. It tries its best to recover, which includes
  796. * dropping pages, killing processes etc.
  797. *
  798. * The function is primarily of use for corruptions that
  799. * happen outside the current execution context (e.g. when
  800. * detected by a background scrubber)
  801. *
  802. * Must run in process context (e.g. a work queue) with interrupts
  803. * enabled and no spinlocks hold.
  804. */
  805. void memory_failure(unsigned long pfn, int trapno)
  806. {
  807. __memory_failure(pfn, trapno, 0);
  808. }
  809. /**
  810. * unpoison_memory - Unpoison a previously poisoned page
  811. * @pfn: Page number of the to be unpoisoned page
  812. *
  813. * Software-unpoison a page that has been poisoned by
  814. * memory_failure() earlier.
  815. *
  816. * This is only done on the software-level, so it only works
  817. * for linux injected failures, not real hardware failures
  818. *
  819. * Returns 0 for success, otherwise -errno.
  820. */
  821. int unpoison_memory(unsigned long pfn)
  822. {
  823. struct page *page;
  824. struct page *p;
  825. int freeit = 0;
  826. if (!pfn_valid(pfn))
  827. return -ENXIO;
  828. p = pfn_to_page(pfn);
  829. page = compound_head(p);
  830. if (!PageHWPoison(p)) {
  831. pr_debug("MCE: Page was already unpoisoned %#lx\n", pfn);
  832. return 0;
  833. }
  834. if (!get_page_unless_zero(page)) {
  835. if (TestClearPageHWPoison(p))
  836. atomic_long_dec(&mce_bad_pages);
  837. pr_debug("MCE: Software-unpoisoned free page %#lx\n", pfn);
  838. return 0;
  839. }
  840. lock_page_nosync(page);
  841. /*
  842. * This test is racy because PG_hwpoison is set outside of page lock.
  843. * That's acceptable because that won't trigger kernel panic. Instead,
  844. * the PG_hwpoison page will be caught and isolated on the entrance to
  845. * the free buddy page pool.
  846. */
  847. if (TestClearPageHWPoison(p)) {
  848. pr_debug("MCE: Software-unpoisoned page %#lx\n", pfn);
  849. atomic_long_dec(&mce_bad_pages);
  850. freeit = 1;
  851. }
  852. unlock_page(page);
  853. put_page(page);
  854. if (freeit)
  855. put_page(page);
  856. return 0;
  857. }
  858. EXPORT_SYMBOL(unpoison_memory);