Blame view
lib/fault-inject.c
5.9 KB
6ff1cb355 [PATCH] fault-inj... |
1 2 3 |
#include <linux/kernel.h> #include <linux/init.h> #include <linux/random.h> |
d43c36dc6 headers: remove s... |
4 |
#include <linux/sched.h> |
6ff1cb355 [PATCH] fault-inj... |
5 6 7 8 |
#include <linux/stat.h> #include <linux/types.h> #include <linux/fs.h> #include <linux/module.h> |
f4f154fd9 [PATCH] fault inj... |
9 |
#include <linux/interrupt.h> |
329409aed [PATCH] fault inj... |
10 |
#include <linux/stacktrace.h> |
6ff1cb355 [PATCH] fault-inj... |
11 12 13 14 15 16 |
#include <linux/fault-inject.h> /* * setup_fault_attr() is a helper function for various __setup handlers, so it * returns 0 on error, because that is what __setup handlers do. */ |
6cba00eaa fault-inject: exp... |
17 |
int setup_fault_attr(struct fault_attr *attr, char *str) |
6ff1cb355 [PATCH] fault-inj... |
18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 |
{ unsigned long probability; unsigned long interval; int times; int space; /* "<interval>,<probability>,<space>,<times>" */ if (sscanf(str, "%lu,%lu,%d,%d", &interval, &probability, &space, ×) < 4) { printk(KERN_WARNING "FAULT_INJECTION: failed to parse arguments "); return 0; } attr->probability = probability; attr->interval = interval; atomic_set(&attr->times, times); atomic_set(&attr->space, space); return 1; } |
6cba00eaa fault-inject: exp... |
40 |
EXPORT_SYMBOL_GPL(setup_fault_attr); |
6ff1cb355 [PATCH] fault-inj... |
41 42 43 44 45 46 47 48 49 50 51 |
static void fail_dump(struct fault_attr *attr) { if (attr->verbose > 0) printk(KERN_NOTICE "FAULT_INJECTION: forcing a failure "); if (attr->verbose > 1) dump_stack(); } #define atomic_dec_not_zero(v) atomic_add_unless((v), -1, 0) |
08b3df2d1 [PATCH] fault-inj... |
52 |
static bool fail_task(struct fault_attr *attr, struct task_struct *task) |
f4f154fd9 [PATCH] fault inj... |
53 54 55 |
{ return !in_interrupt() && task->make_it_fail; } |
a124c28ef [PATCH] fault-inj... |
56 |
#define MAX_STACK_TRACE_DEPTH 32 |
1df49008f [PATCH] fault inj... |
57 |
#ifdef CONFIG_FAULT_INJECTION_STACKTRACE_FILTER |
329409aed [PATCH] fault inj... |
58 |
|
08b3df2d1 [PATCH] fault-inj... |
59 |
static bool fail_stacktrace(struct fault_attr *attr) |
329409aed [PATCH] fault inj... |
60 61 62 63 64 65 66 67 68 69 70 71 |
{ struct stack_trace trace; int depth = attr->stacktrace_depth; unsigned long entries[MAX_STACK_TRACE_DEPTH]; int n; bool found = (attr->require_start == 0 && attr->require_end == ULONG_MAX); if (depth == 0) return found; trace.nr_entries = 0; trace.entries = entries; |
a124c28ef [PATCH] fault-inj... |
72 |
trace.max_entries = depth; |
329409aed [PATCH] fault inj... |
73 |
trace.skip = 1; |
329409aed [PATCH] fault inj... |
74 |
|
ab1b6f03a simplify the stac... |
75 |
save_stack_trace(&trace); |
329409aed [PATCH] fault inj... |
76 77 78 |
for (n = 0; n < trace.nr_entries; n++) { if (attr->reject_start <= entries[n] && entries[n] < attr->reject_end) |
08b3df2d1 [PATCH] fault-inj... |
79 |
return false; |
329409aed [PATCH] fault inj... |
80 81 |
if (attr->require_start <= entries[n] && entries[n] < attr->require_end) |
08b3df2d1 [PATCH] fault-inj... |
82 |
found = true; |
329409aed [PATCH] fault inj... |
83 84 85 86 87 |
} return found; } #else |
08b3df2d1 [PATCH] fault-inj... |
88 |
static inline bool fail_stacktrace(struct fault_attr *attr) |
329409aed [PATCH] fault inj... |
89 |
{ |
1df49008f [PATCH] fault inj... |
90 |
return true; |
329409aed [PATCH] fault inj... |
91 |
} |
1df49008f [PATCH] fault inj... |
92 |
#endif /* CONFIG_FAULT_INJECTION_STACKTRACE_FILTER */ |
329409aed [PATCH] fault inj... |
93 |
|
6ff1cb355 [PATCH] fault-inj... |
94 95 96 97 |
/* * This code is stolen from failmalloc-1.0 * http://www.nongnu.org/failmalloc/ */ |
08b3df2d1 [PATCH] fault-inj... |
98 |
bool should_fail(struct fault_attr *attr, ssize_t size) |
6ff1cb355 [PATCH] fault-inj... |
99 |
{ |
f4f154fd9 [PATCH] fault inj... |
100 |
if (attr->task_filter && !fail_task(attr, current)) |
08b3df2d1 [PATCH] fault-inj... |
101 |
return false; |
f4f154fd9 [PATCH] fault inj... |
102 |
|
6ff1cb355 [PATCH] fault-inj... |
103 |
if (atomic_read(&attr->times) == 0) |
08b3df2d1 [PATCH] fault-inj... |
104 |
return false; |
6ff1cb355 [PATCH] fault-inj... |
105 106 107 |
if (atomic_read(&attr->space) > size) { atomic_sub(size, &attr->space); |
08b3df2d1 [PATCH] fault-inj... |
108 |
return false; |
6ff1cb355 [PATCH] fault-inj... |
109 110 111 112 113 |
} if (attr->interval > 1) { attr->count++; if (attr->count % attr->interval) |
08b3df2d1 [PATCH] fault-inj... |
114 |
return false; |
6ff1cb355 [PATCH] fault-inj... |
115 |
} |
f1729c28a [PATCH] fault-inj... |
116 117 |
if (attr->probability <= random32() % 100) return false; |
6ff1cb355 [PATCH] fault-inj... |
118 |
|
f1729c28a [PATCH] fault-inj... |
119 120 |
if (!fail_stacktrace(attr)) return false; |
6ff1cb355 [PATCH] fault-inj... |
121 |
|
6ff1cb355 [PATCH] fault-inj... |
122 123 124 125 |
fail_dump(attr); if (atomic_read(&attr->times) != -1) atomic_dec_not_zero(&attr->times); |
08b3df2d1 [PATCH] fault-inj... |
126 |
return true; |
6ff1cb355 [PATCH] fault-inj... |
127 |
} |
df87ecbf1 fault-inject: exp... |
128 |
EXPORT_SYMBOL_GPL(should_fail); |
6ff1cb355 [PATCH] fault-inj... |
129 130 |
#ifdef CONFIG_FAULT_INJECTION_DEBUG_FS |
8b88b0998 libfs: allow erro... |
131 |
static int debugfs_ul_set(void *data, u64 val) |
6ff1cb355 [PATCH] fault-inj... |
132 133 |
{ *(unsigned long *)data = val; |
8b88b0998 libfs: allow erro... |
134 |
return 0; |
6ff1cb355 [PATCH] fault-inj... |
135 |
} |
8b88b0998 libfs: allow erro... |
136 |
static int debugfs_ul_get(void *data, u64 *val) |
6ff1cb355 [PATCH] fault-inj... |
137 |
{ |
8b88b0998 libfs: allow erro... |
138 139 |
*val = *(unsigned long *)data; return 0; |
6ff1cb355 [PATCH] fault-inj... |
140 141 142 143 144 145 146 147 148 149 |
} DEFINE_SIMPLE_ATTRIBUTE(fops_ul, debugfs_ul_get, debugfs_ul_set, "%llu "); static struct dentry *debugfs_create_ul(const char *name, mode_t mode, struct dentry *parent, unsigned long *value) { return debugfs_create_file(name, mode, parent, value, &fops_ul); } |
6ddb23c78 fault_inject: sil... |
150 |
#ifdef CONFIG_FAULT_INJECTION_STACKTRACE_FILTER |
a124c28ef [PATCH] fault-inj... |
151 |
|
8307fc257 fault-injection: ... |
152 153 154 155 156 157 158 159 160 161 162 163 164 |
static int debugfs_stacktrace_depth_set(void *data, u64 val) { *(unsigned long *)data = min_t(unsigned long, val, MAX_STACK_TRACE_DEPTH); return 0; } DEFINE_SIMPLE_ATTRIBUTE(fops_stacktrace_depth, debugfs_ul_get, debugfs_stacktrace_depth_set, "%llu "); static struct dentry *debugfs_create_stacktrace_depth( |
a124c28ef [PATCH] fault-inj... |
165 166 167 168 |
const char *name, mode_t mode, struct dentry *parent, unsigned long *value) { return debugfs_create_file(name, mode, parent, value, |
8307fc257 fault-injection: ... |
169 |
&fops_stacktrace_depth); |
a124c28ef [PATCH] fault-inj... |
170 |
} |
8307fc257 fault-injection: ... |
171 |
|
6ddb23c78 fault_inject: sil... |
172 |
#endif /* CONFIG_FAULT_INJECTION_STACKTRACE_FILTER */ |
a124c28ef [PATCH] fault-inj... |
173 |
|
8b88b0998 libfs: allow erro... |
174 |
static int debugfs_atomic_t_set(void *data, u64 val) |
6ff1cb355 [PATCH] fault-inj... |
175 176 |
{ atomic_set((atomic_t *)data, val); |
8b88b0998 libfs: allow erro... |
177 |
return 0; |
6ff1cb355 [PATCH] fault-inj... |
178 |
} |
8b88b0998 libfs: allow erro... |
179 |
static int debugfs_atomic_t_get(void *data, u64 *val) |
6ff1cb355 [PATCH] fault-inj... |
180 |
{ |
8b88b0998 libfs: allow erro... |
181 182 |
*val = atomic_read((atomic_t *)data); return 0; |
6ff1cb355 [PATCH] fault-inj... |
183 184 185 186 187 188 189 190 191 192 193 |
} DEFINE_SIMPLE_ATTRIBUTE(fops_atomic_t, debugfs_atomic_t_get, debugfs_atomic_t_set, "%lld "); static struct dentry *debugfs_create_atomic_t(const char *name, mode_t mode, struct dentry *parent, atomic_t *value) { return debugfs_create_file(name, mode, parent, value, &fops_atomic_t); } |
dd48c085c fault-injection: ... |
194 195 |
struct dentry *fault_create_debugfs_attr(const char *name, struct dentry *parent, struct fault_attr *attr) |
6ff1cb355 [PATCH] fault-inj... |
196 197 198 |
{ mode_t mode = S_IFREG | S_IRUSR | S_IWUSR; struct dentry *dir; |
dd48c085c fault-injection: ... |
199 |
dir = debugfs_create_dir(name, parent); |
6ff1cb355 [PATCH] fault-inj... |
200 |
if (!dir) |
dd48c085c fault-injection: ... |
201 |
return ERR_PTR(-ENOMEM); |
6ff1cb355 [PATCH] fault-inj... |
202 |
|
7f5ddcc8d fault-injection: ... |
203 204 205 206 207 208 209 210 211 212 213 |
if (!debugfs_create_ul("probability", mode, dir, &attr->probability)) goto fail; if (!debugfs_create_ul("interval", mode, dir, &attr->interval)) goto fail; if (!debugfs_create_atomic_t("times", mode, dir, &attr->times)) goto fail; if (!debugfs_create_atomic_t("space", mode, dir, &attr->space)) goto fail; if (!debugfs_create_ul("verbose", mode, dir, &attr->verbose)) goto fail; if (!debugfs_create_bool("task-filter", mode, dir, &attr->task_filter)) |
1df49008f [PATCH] fault inj... |
214 215 216 |
goto fail; #ifdef CONFIG_FAULT_INJECTION_STACKTRACE_FILTER |
7f5ddcc8d fault-injection: ... |
217 218 219 220 221 222 223 224 225 226 227 |
if (!debugfs_create_stacktrace_depth("stacktrace-depth", mode, dir, &attr->stacktrace_depth)) goto fail; if (!debugfs_create_ul("require-start", mode, dir, &attr->require_start)) goto fail; if (!debugfs_create_ul("require-end", mode, dir, &attr->require_end)) goto fail; if (!debugfs_create_ul("reject-start", mode, dir, &attr->reject_start)) goto fail; if (!debugfs_create_ul("reject-end", mode, dir, &attr->reject_end)) |
6ff1cb355 [PATCH] fault-inj... |
228 |
goto fail; |
1df49008f [PATCH] fault inj... |
229 |
#endif /* CONFIG_FAULT_INJECTION_STACKTRACE_FILTER */ |
dd48c085c fault-injection: ... |
230 |
return dir; |
6ff1cb355 [PATCH] fault-inj... |
231 |
fail: |
dd48c085c fault-injection: ... |
232 |
debugfs_remove_recursive(dir); |
7f5ddcc8d fault-injection: ... |
233 |
|
dd48c085c fault-injection: ... |
234 |
return ERR_PTR(-ENOMEM); |
6ff1cb355 [PATCH] fault-inj... |
235 |
} |
df87ecbf1 fault-inject: exp... |
236 |
EXPORT_SYMBOL_GPL(fault_create_debugfs_attr); |
6ff1cb355 [PATCH] fault-inj... |
237 238 |
#endif /* CONFIG_FAULT_INJECTION_DEBUG_FS */ |