Blame view
lib/fault-inject.c
5.83 KB
457c89965 treewide: Add SPD... |
1 |
// SPDX-License-Identifier: GPL-2.0-only |
6ff1cb355 [PATCH] fault-inj... |
2 3 4 |
#include <linux/kernel.h> #include <linux/init.h> #include <linux/random.h> |
d43c36dc6 headers: remove s... |
5 |
#include <linux/sched.h> |
6ff1cb355 [PATCH] fault-inj... |
6 7 8 |
#include <linux/stat.h> #include <linux/types.h> #include <linux/fs.h> |
8bc3bcc93 lib: reduce the u... |
9 |
#include <linux/export.h> |
f4f154fd9 [PATCH] fault inj... |
10 |
#include <linux/interrupt.h> |
329409aed [PATCH] fault inj... |
11 |
#include <linux/stacktrace.h> |
6ff1cb355 [PATCH] fault-inj... |
12 13 14 15 16 17 |
#include <linux/fault-inject.h> /* * setup_fault_attr() is a helper function for various __setup handlers, so it * returns 0 on error, because that is what __setup handlers do. */ |
6cba00eaa fault-inject: exp... |
18 |
int setup_fault_attr(struct fault_attr *attr, char *str) |
6ff1cb355 [PATCH] fault-inj... |
19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 |
{ unsigned long probability; unsigned long interval; int times; int space; /* "<interval>,<probability>,<space>,<times>" */ if (sscanf(str, "%lu,%lu,%d,%d", &interval, &probability, &space, ×) < 4) { printk(KERN_WARNING "FAULT_INJECTION: failed to parse arguments "); return 0; } attr->probability = probability; attr->interval = interval; atomic_set(&attr->times, times); atomic_set(&attr->space, space); return 1; } |
6cba00eaa fault-inject: exp... |
41 |
EXPORT_SYMBOL_GPL(setup_fault_attr); |
6ff1cb355 [PATCH] fault-inj... |
42 43 44 |
static void fail_dump(struct fault_attr *attr) { |
6adc4a22f fault-inject: add... |
45 46 47 48 49 50 |
if (attr->verbose > 0 && __ratelimit(&attr->ratelimit_state)) { printk(KERN_NOTICE "FAULT_INJECTION: forcing a failure. " "name %pd, interval %lu, probability %lu, " "space %d, times %d ", attr->dname, |
bb3870026 fault-inject: fix... |
51 |
attr->interval, attr->probability, |
6adc4a22f fault-inject: add... |
52 53 54 55 56 |
atomic_read(&attr->space), atomic_read(&attr->times)); if (attr->verbose > 1) dump_stack(); } |
6ff1cb355 [PATCH] fault-inj... |
57 58 59 |
} #define atomic_dec_not_zero(v) atomic_add_unless((v), -1, 0) |
08b3df2d1 [PATCH] fault-inj... |
60 |
static bool fail_task(struct fault_attr *attr, struct task_struct *task) |
f4f154fd9 [PATCH] fault inj... |
61 |
{ |
f2ad37da8 lib/fault-inject.... |
62 |
return in_task() && task->make_it_fail; |
f4f154fd9 [PATCH] fault inj... |
63 |
} |
a124c28ef [PATCH] fault-inj... |
64 |
#define MAX_STACK_TRACE_DEPTH 32 |
1df49008f [PATCH] fault inj... |
65 |
#ifdef CONFIG_FAULT_INJECTION_STACKTRACE_FILTER |
329409aed [PATCH] fault inj... |
66 |
|
08b3df2d1 [PATCH] fault-inj... |
67 |
static bool fail_stacktrace(struct fault_attr *attr) |
329409aed [PATCH] fault inj... |
68 |
{ |
329409aed [PATCH] fault inj... |
69 70 |
int depth = attr->stacktrace_depth; unsigned long entries[MAX_STACK_TRACE_DEPTH]; |
30191250c fault-inject: Sim... |
71 |
int n, nr_entries; |
329409aed [PATCH] fault inj... |
72 73 74 75 |
bool found = (attr->require_start == 0 && attr->require_end == ULONG_MAX); if (depth == 0) return found; |
30191250c fault-inject: Sim... |
76 77 |
nr_entries = stack_trace_save(entries, depth, 1); for (n = 0; n < nr_entries; n++) { |
329409aed [PATCH] fault inj... |
78 79 |
if (attr->reject_start <= entries[n] && entries[n] < attr->reject_end) |
08b3df2d1 [PATCH] fault-inj... |
80 |
return false; |
329409aed [PATCH] fault inj... |
81 82 |
if (attr->require_start <= entries[n] && entries[n] < attr->require_end) |
08b3df2d1 [PATCH] fault-inj... |
83 |
found = true; |
329409aed [PATCH] fault inj... |
84 85 86 87 88 |
} return found; } #else |
08b3df2d1 [PATCH] fault-inj... |
89 |
static inline bool fail_stacktrace(struct fault_attr *attr) |
329409aed [PATCH] fault inj... |
90 |
{ |
1df49008f [PATCH] fault inj... |
91 |
return true; |
329409aed [PATCH] fault inj... |
92 |
} |
1df49008f [PATCH] fault inj... |
93 |
#endif /* CONFIG_FAULT_INJECTION_STACKTRACE_FILTER */ |
329409aed [PATCH] fault inj... |
94 |
|
6ff1cb355 [PATCH] fault-inj... |
95 96 97 98 |
/* * This code is stolen from failmalloc-1.0 * http://www.nongnu.org/failmalloc/ */ |
08b3df2d1 [PATCH] fault-inj... |
99 |
bool should_fail(struct fault_attr *attr, ssize_t size) |
6ff1cb355 [PATCH] fault-inj... |
100 |
{ |
1203c8e6f fault-inject: sim... |
101 102 |
if (in_task()) { unsigned int fail_nth = READ_ONCE(current->fail_nth); |
9eeb52ae7 fault-inject: fix... |
103 104 105 |
if (fail_nth) { if (!WRITE_ONCE(current->fail_nth, fail_nth - 1)) goto fail; |
1203c8e6f fault-inject: sim... |
106 |
|
9eeb52ae7 fault-inject: fix... |
107 108 |
return false; } |
e41d58185 fault-inject: sup... |
109 |
} |
f39cdaebb fault-inject: avo... |
110 111 112 |
/* No need to check any other properties if the probability is 0 */ if (attr->probability == 0) return false; |
f4f154fd9 [PATCH] fault inj... |
113 |
if (attr->task_filter && !fail_task(attr, current)) |
08b3df2d1 [PATCH] fault-inj... |
114 |
return false; |
f4f154fd9 [PATCH] fault inj... |
115 |
|
6ff1cb355 [PATCH] fault-inj... |
116 |
if (atomic_read(&attr->times) == 0) |
08b3df2d1 [PATCH] fault-inj... |
117 |
return false; |
6ff1cb355 [PATCH] fault-inj... |
118 119 120 |
if (atomic_read(&attr->space) > size) { atomic_sub(size, &attr->space); |
08b3df2d1 [PATCH] fault-inj... |
121 |
return false; |
6ff1cb355 [PATCH] fault-inj... |
122 123 124 125 126 |
} if (attr->interval > 1) { attr->count++; if (attr->count % attr->interval) |
08b3df2d1 [PATCH] fault-inj... |
127 |
return false; |
6ff1cb355 [PATCH] fault-inj... |
128 |
} |
f39fee5f1 lib/: rename rand... |
129 |
if (attr->probability <= prandom_u32() % 100) |
f1729c28a [PATCH] fault-inj... |
130 |
return false; |
6ff1cb355 [PATCH] fault-inj... |
131 |
|
f1729c28a [PATCH] fault-inj... |
132 133 |
if (!fail_stacktrace(attr)) return false; |
6ff1cb355 [PATCH] fault-inj... |
134 |
|
e41d58185 fault-inject: sup... |
135 |
fail: |
6ff1cb355 [PATCH] fault-inj... |
136 137 138 139 |
fail_dump(attr); if (atomic_read(&attr->times) != -1) atomic_dec_not_zero(&attr->times); |
08b3df2d1 [PATCH] fault-inj... |
140 |
return true; |
6ff1cb355 [PATCH] fault-inj... |
141 |
} |
df87ecbf1 fault-inject: exp... |
142 |
EXPORT_SYMBOL_GPL(should_fail); |
6ff1cb355 [PATCH] fault-inj... |
143 144 |
#ifdef CONFIG_FAULT_INJECTION_DEBUG_FS |
8b88b0998 libfs: allow erro... |
145 |
static int debugfs_ul_set(void *data, u64 val) |
6ff1cb355 [PATCH] fault-inj... |
146 147 |
{ *(unsigned long *)data = val; |
8b88b0998 libfs: allow erro... |
148 |
return 0; |
6ff1cb355 [PATCH] fault-inj... |
149 |
} |
8b88b0998 libfs: allow erro... |
150 |
static int debugfs_ul_get(void *data, u64 *val) |
6ff1cb355 [PATCH] fault-inj... |
151 |
{ |
8b88b0998 libfs: allow erro... |
152 153 |
*val = *(unsigned long *)data; return 0; |
6ff1cb355 [PATCH] fault-inj... |
154 155 156 157 |
} DEFINE_SIMPLE_ATTRIBUTE(fops_ul, debugfs_ul_get, debugfs_ul_set, "%llu "); |
053cf5104 fault-inject: cle... |
158 159 |
static void debugfs_create_ul(const char *name, umode_t mode, struct dentry *parent, unsigned long *value) |
6ff1cb355 [PATCH] fault-inj... |
160 |
{ |
053cf5104 fault-inject: cle... |
161 |
debugfs_create_file(name, mode, parent, value, &fops_ul); |
6ff1cb355 [PATCH] fault-inj... |
162 |
} |
6ddb23c78 fault_inject: sil... |
163 |
#ifdef CONFIG_FAULT_INJECTION_STACKTRACE_FILTER |
a124c28ef [PATCH] fault-inj... |
164 |
|
8307fc257 fault-injection: ... |
165 166 167 168 169 170 171 172 173 174 175 |
static int debugfs_stacktrace_depth_set(void *data, u64 val) { *(unsigned long *)data = min_t(unsigned long, val, MAX_STACK_TRACE_DEPTH); return 0; } DEFINE_SIMPLE_ATTRIBUTE(fops_stacktrace_depth, debugfs_ul_get, debugfs_stacktrace_depth_set, "%llu "); |
053cf5104 fault-inject: cle... |
176 177 178 |
static void debugfs_create_stacktrace_depth(const char *name, umode_t mode, struct dentry *parent, unsigned long *value) |
a124c28ef [PATCH] fault-inj... |
179 |
{ |
053cf5104 fault-inject: cle... |
180 |
debugfs_create_file(name, mode, parent, value, &fops_stacktrace_depth); |
a124c28ef [PATCH] fault-inj... |
181 |
} |
8307fc257 fault-injection: ... |
182 |
|
6ddb23c78 fault_inject: sil... |
183 |
#endif /* CONFIG_FAULT_INJECTION_STACKTRACE_FILTER */ |
a124c28ef [PATCH] fault-inj... |
184 |
|
dd48c085c fault-injection: ... |
185 186 |
struct dentry *fault_create_debugfs_attr(const char *name, struct dentry *parent, struct fault_attr *attr) |
6ff1cb355 [PATCH] fault-inj... |
187 |
{ |
f4ae40a6a switch debugfs to... |
188 |
umode_t mode = S_IFREG | S_IRUSR | S_IWUSR; |
6ff1cb355 [PATCH] fault-inj... |
189 |
struct dentry *dir; |
dd48c085c fault-injection: ... |
190 |
dir = debugfs_create_dir(name, parent); |
053cf5104 fault-inject: cle... |
191 192 193 194 195 196 197 198 199 200 201 202 203 |
if (IS_ERR(dir)) return dir; debugfs_create_ul("probability", mode, dir, &attr->probability); debugfs_create_ul("interval", mode, dir, &attr->interval); debugfs_create_atomic_t("times", mode, dir, &attr->times); debugfs_create_atomic_t("space", mode, dir, &attr->space); debugfs_create_ul("verbose", mode, dir, &attr->verbose); debugfs_create_u32("verbose_ratelimit_interval_ms", mode, dir, &attr->ratelimit_state.interval); debugfs_create_u32("verbose_ratelimit_burst", mode, dir, &attr->ratelimit_state.burst); debugfs_create_bool("task-filter", mode, dir, &attr->task_filter); |
1df49008f [PATCH] fault inj... |
204 205 |
#ifdef CONFIG_FAULT_INJECTION_STACKTRACE_FILTER |
053cf5104 fault-inject: cle... |
206 207 208 209 210 211 |
debugfs_create_stacktrace_depth("stacktrace-depth", mode, dir, &attr->stacktrace_depth); debugfs_create_ul("require-start", mode, dir, &attr->require_start); debugfs_create_ul("require-end", mode, dir, &attr->require_end); debugfs_create_ul("reject-start", mode, dir, &attr->reject_start); debugfs_create_ul("reject-end", mode, dir, &attr->reject_end); |
1df49008f [PATCH] fault inj... |
212 |
#endif /* CONFIG_FAULT_INJECTION_STACKTRACE_FILTER */ |
6adc4a22f fault-inject: add... |
213 |
attr->dname = dget(dir); |
dd48c085c fault-injection: ... |
214 |
return dir; |
6ff1cb355 [PATCH] fault-inj... |
215 |
} |
df87ecbf1 fault-inject: exp... |
216 |
EXPORT_SYMBOL_GPL(fault_create_debugfs_attr); |
6ff1cb355 [PATCH] fault-inj... |
217 218 |
#endif /* CONFIG_FAULT_INJECTION_DEBUG_FS */ |