Blame view
lib/fault-inject.c
5.83 KB
457c89965
|
1 |
// SPDX-License-Identifier: GPL-2.0-only |
6ff1cb355
|
2 3 4 |
#include <linux/kernel.h> #include <linux/init.h> #include <linux/random.h> |
d43c36dc6
|
5 |
#include <linux/sched.h> |
6ff1cb355
|
6 7 8 |
#include <linux/stat.h> #include <linux/types.h> #include <linux/fs.h> |
8bc3bcc93
|
9 |
#include <linux/export.h> |
f4f154fd9
|
10 |
#include <linux/interrupt.h> |
329409aed
|
11 |
#include <linux/stacktrace.h> |
6ff1cb355
|
12 13 14 15 16 17 |
#include <linux/fault-inject.h> /* * setup_fault_attr() is a helper function for various __setup handlers, so it * returns 0 on error, because that is what __setup handlers do. */ |
6cba00eaa
|
18 |
int setup_fault_attr(struct fault_attr *attr, char *str) |
6ff1cb355
|
19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 |
{ unsigned long probability; unsigned long interval; int times; int space; /* "<interval>,<probability>,<space>,<times>" */ if (sscanf(str, "%lu,%lu,%d,%d", &interval, &probability, &space, ×) < 4) { printk(KERN_WARNING "FAULT_INJECTION: failed to parse arguments "); return 0; } attr->probability = probability; attr->interval = interval; atomic_set(&attr->times, times); atomic_set(&attr->space, space); return 1; } |
6cba00eaa
|
41 |
EXPORT_SYMBOL_GPL(setup_fault_attr); |
6ff1cb355
|
42 43 44 |
static void fail_dump(struct fault_attr *attr) { |
6adc4a22f
|
45 46 47 48 49 50 |
if (attr->verbose > 0 && __ratelimit(&attr->ratelimit_state)) { printk(KERN_NOTICE "FAULT_INJECTION: forcing a failure. " "name %pd, interval %lu, probability %lu, " "space %d, times %d ", attr->dname, |
bb3870026
|
51 |
attr->interval, attr->probability, |
6adc4a22f
|
52 53 54 55 56 |
atomic_read(&attr->space), atomic_read(&attr->times)); if (attr->verbose > 1) dump_stack(); } |
6ff1cb355
|
57 58 59 |
} #define atomic_dec_not_zero(v) atomic_add_unless((v), -1, 0) |
08b3df2d1
|
60 |
static bool fail_task(struct fault_attr *attr, struct task_struct *task) |
f4f154fd9
|
61 |
{ |
f2ad37da8
|
62 |
return in_task() && task->make_it_fail; |
f4f154fd9
|
63 |
} |
a124c28ef
|
64 |
#define MAX_STACK_TRACE_DEPTH 32 |
1df49008f
|
65 |
#ifdef CONFIG_FAULT_INJECTION_STACKTRACE_FILTER |
329409aed
|
66 |
|
08b3df2d1
|
67 |
static bool fail_stacktrace(struct fault_attr *attr) |
329409aed
|
68 |
{ |
329409aed
|
69 70 |
int depth = attr->stacktrace_depth; unsigned long entries[MAX_STACK_TRACE_DEPTH]; |
30191250c
|
71 |
int n, nr_entries; |
329409aed
|
72 73 74 75 |
bool found = (attr->require_start == 0 && attr->require_end == ULONG_MAX); if (depth == 0) return found; |
30191250c
|
76 77 |
nr_entries = stack_trace_save(entries, depth, 1); for (n = 0; n < nr_entries; n++) { |
329409aed
|
78 79 |
if (attr->reject_start <= entries[n] && entries[n] < attr->reject_end) |
08b3df2d1
|
80 |
return false; |
329409aed
|
81 82 |
if (attr->require_start <= entries[n] && entries[n] < attr->require_end) |
08b3df2d1
|
83 |
found = true; |
329409aed
|
84 85 86 87 88 |
} return found; } #else |
08b3df2d1
|
89 |
static inline bool fail_stacktrace(struct fault_attr *attr) |
329409aed
|
90 |
{ |
1df49008f
|
91 |
return true; |
329409aed
|
92 |
} |
1df49008f
|
93 |
#endif /* CONFIG_FAULT_INJECTION_STACKTRACE_FILTER */ |
329409aed
|
94 |
|
6ff1cb355
|
95 96 97 98 |
/* * This code is stolen from failmalloc-1.0 * http://www.nongnu.org/failmalloc/ */ |
08b3df2d1
|
99 |
bool should_fail(struct fault_attr *attr, ssize_t size) |
6ff1cb355
|
100 |
{ |
1203c8e6f
|
101 102 |
if (in_task()) { unsigned int fail_nth = READ_ONCE(current->fail_nth); |
9eeb52ae7
|
103 104 105 |
if (fail_nth) { if (!WRITE_ONCE(current->fail_nth, fail_nth - 1)) goto fail; |
1203c8e6f
|
106 |
|
9eeb52ae7
|
107 108 |
return false; } |
e41d58185
|
109 |
} |
f39cdaebb
|
110 111 112 |
/* No need to check any other properties if the probability is 0 */ if (attr->probability == 0) return false; |
f4f154fd9
|
113 |
if (attr->task_filter && !fail_task(attr, current)) |
08b3df2d1
|
114 |
return false; |
f4f154fd9
|
115 |
|
6ff1cb355
|
116 |
if (atomic_read(&attr->times) == 0) |
08b3df2d1
|
117 |
return false; |
6ff1cb355
|
118 119 120 |
if (atomic_read(&attr->space) > size) { atomic_sub(size, &attr->space); |
08b3df2d1
|
121 |
return false; |
6ff1cb355
|
122 123 124 125 126 |
} if (attr->interval > 1) { attr->count++; if (attr->count % attr->interval) |
08b3df2d1
|
127 |
return false; |
6ff1cb355
|
128 |
} |
f39fee5f1
|
129 |
if (attr->probability <= prandom_u32() % 100) |
f1729c28a
|
130 |
return false; |
6ff1cb355
|
131 |
|
f1729c28a
|
132 133 |
if (!fail_stacktrace(attr)) return false; |
6ff1cb355
|
134 |
|
e41d58185
|
135 |
fail: |
6ff1cb355
|
136 137 138 139 |
fail_dump(attr); if (atomic_read(&attr->times) != -1) atomic_dec_not_zero(&attr->times); |
08b3df2d1
|
140 |
return true; |
6ff1cb355
|
141 |
} |
df87ecbf1
|
142 |
EXPORT_SYMBOL_GPL(should_fail); |
6ff1cb355
|
143 144 |
#ifdef CONFIG_FAULT_INJECTION_DEBUG_FS |
8b88b0998
|
145 |
static int debugfs_ul_set(void *data, u64 val) |
6ff1cb355
|
146 147 |
{ *(unsigned long *)data = val; |
8b88b0998
|
148 |
return 0; |
6ff1cb355
|
149 |
} |
8b88b0998
|
150 |
static int debugfs_ul_get(void *data, u64 *val) |
6ff1cb355
|
151 |
{ |
8b88b0998
|
152 153 |
*val = *(unsigned long *)data; return 0; |
6ff1cb355
|
154 155 156 157 |
} DEFINE_SIMPLE_ATTRIBUTE(fops_ul, debugfs_ul_get, debugfs_ul_set, "%llu "); |
053cf5104
|
158 159 |
static void debugfs_create_ul(const char *name, umode_t mode, struct dentry *parent, unsigned long *value) |
6ff1cb355
|
160 |
{ |
053cf5104
|
161 |
debugfs_create_file(name, mode, parent, value, &fops_ul); |
6ff1cb355
|
162 |
} |
6ddb23c78
|
163 |
#ifdef CONFIG_FAULT_INJECTION_STACKTRACE_FILTER |
a124c28ef
|
164 |
|
8307fc257
|
165 166 167 168 169 170 171 172 173 174 175 |
static int debugfs_stacktrace_depth_set(void *data, u64 val) { *(unsigned long *)data = min_t(unsigned long, val, MAX_STACK_TRACE_DEPTH); return 0; } DEFINE_SIMPLE_ATTRIBUTE(fops_stacktrace_depth, debugfs_ul_get, debugfs_stacktrace_depth_set, "%llu "); |
053cf5104
|
176 177 178 |
static void debugfs_create_stacktrace_depth(const char *name, umode_t mode, struct dentry *parent, unsigned long *value) |
a124c28ef
|
179 |
{ |
053cf5104
|
180 |
debugfs_create_file(name, mode, parent, value, &fops_stacktrace_depth); |
a124c28ef
|
181 |
} |
8307fc257
|
182 |
|
6ddb23c78
|
183 |
#endif /* CONFIG_FAULT_INJECTION_STACKTRACE_FILTER */ |
a124c28ef
|
184 |
|
dd48c085c
|
185 186 |
struct dentry *fault_create_debugfs_attr(const char *name, struct dentry *parent, struct fault_attr *attr) |
6ff1cb355
|
187 |
{ |
f4ae40a6a
|
188 |
umode_t mode = S_IFREG | S_IRUSR | S_IWUSR; |
6ff1cb355
|
189 |
struct dentry *dir; |
dd48c085c
|
190 |
dir = debugfs_create_dir(name, parent); |
053cf5104
|
191 192 193 194 195 196 197 198 199 200 201 202 203 |
if (IS_ERR(dir)) return dir; debugfs_create_ul("probability", mode, dir, &attr->probability); debugfs_create_ul("interval", mode, dir, &attr->interval); debugfs_create_atomic_t("times", mode, dir, &attr->times); debugfs_create_atomic_t("space", mode, dir, &attr->space); debugfs_create_ul("verbose", mode, dir, &attr->verbose); debugfs_create_u32("verbose_ratelimit_interval_ms", mode, dir, &attr->ratelimit_state.interval); debugfs_create_u32("verbose_ratelimit_burst", mode, dir, &attr->ratelimit_state.burst); debugfs_create_bool("task-filter", mode, dir, &attr->task_filter); |
1df49008f
|
204 205 |
#ifdef CONFIG_FAULT_INJECTION_STACKTRACE_FILTER |
053cf5104
|
206 207 208 209 210 211 |
debugfs_create_stacktrace_depth("stacktrace-depth", mode, dir, &attr->stacktrace_depth); debugfs_create_ul("require-start", mode, dir, &attr->require_start); debugfs_create_ul("require-end", mode, dir, &attr->require_end); debugfs_create_ul("reject-start", mode, dir, &attr->reject_start); debugfs_create_ul("reject-end", mode, dir, &attr->reject_end); |
1df49008f
|
212 |
#endif /* CONFIG_FAULT_INJECTION_STACKTRACE_FILTER */ |
6adc4a22f
|
213 |
attr->dname = dget(dir); |
dd48c085c
|
214 |
return dir; |
6ff1cb355
|
215 |
} |
df87ecbf1
|
216 |
EXPORT_SYMBOL_GPL(fault_create_debugfs_attr); |
6ff1cb355
|
217 218 |
#endif /* CONFIG_FAULT_INJECTION_DEBUG_FS */ |