]> git.proxmox.com Git - mirror_ubuntu-artful-kernel.git/blame - mm/memory-failure.c
mm: soft-offline: don't free target page in successful page migration
[mirror_ubuntu-artful-kernel.git] / mm / memory-failure.c
CommitLineData
6a46079c
AK
1/*
2 * Copyright (C) 2008, 2009 Intel Corporation
3 * Authors: Andi Kleen, Fengguang Wu
4 *
5 * This software may be redistributed and/or modified under the terms of
6 * the GNU General Public License ("GPL") version 2 only as published by the
7 * Free Software Foundation.
8 *
9 * High level machine check handler. Handles pages reported by the
1c80b990 10 * hardware as being corrupted usually due to a multi-bit ECC memory or cache
6a46079c 11 * failure.
1c80b990
AK
12 *
13 * In addition there is a "soft offline" entry point that allows stop using
14 * not-yet-corrupted-by-suspicious pages without killing anything.
6a46079c
AK
15 *
16 * Handles page cache pages in various states. The tricky part
1c80b990
AK
17 * here is that we can access any page asynchronously in respect to
18 * other VM users, because memory failures could happen anytime and
19 * anywhere. This could violate some of their assumptions. This is why
20 * this code has to be extremely careful. Generally it tries to use
21 * normal locking rules, as in get the standard locks, even if that means
22 * the error handling takes potentially a long time.
e0de78df
AK
23 *
24 * It can be very tempting to add handling for obscure cases here.
25 * In general any code for handling new cases should only be added iff:
26 * - You know how to test it.
27 * - You have a test that can be added to mce-test
28 * https://git.kernel.org/cgit/utils/cpu/mce/mce-test.git/
29 * - The case actually shows up as a frequent (top 10) page state in
30 * tools/vm/page-types when running a real workload.
1c80b990
AK
31 *
32 * There are several operations here with exponential complexity because
33 * of unsuitable VM data structures. For example the operation to map back
34 * from RMAP chains to processes has to walk the complete process list and
35 * has non linear complexity with the number. But since memory corruptions
36 * are rare we hope to get away with this. This avoids impacting the core
37 * VM.
6a46079c 38 */
6a46079c
AK
39#include <linux/kernel.h>
40#include <linux/mm.h>
41#include <linux/page-flags.h>
478c5ffc 42#include <linux/kernel-page-flags.h>
6a46079c 43#include <linux/sched.h>
01e00f88 44#include <linux/ksm.h>
6a46079c 45#include <linux/rmap.h>
b9e15baf 46#include <linux/export.h>
6a46079c
AK
47#include <linux/pagemap.h>
48#include <linux/swap.h>
49#include <linux/backing-dev.h>
facb6011
AK
50#include <linux/migrate.h>
51#include <linux/page-isolation.h>
52#include <linux/suspend.h>
5a0e3ad6 53#include <linux/slab.h>
bf998156 54#include <linux/swapops.h>
7af446a8 55#include <linux/hugetlb.h>
20d6c96b 56#include <linux/memory_hotplug.h>
5db8a73a 57#include <linux/mm_inline.h>
ea8f5fb8 58#include <linux/kfifo.h>
6a46079c
AK
59#include "internal.h"
60
61int sysctl_memory_failure_early_kill __read_mostly = 0;
62
63int sysctl_memory_failure_recovery __read_mostly = 1;
64
293c07e3 65atomic_long_t num_poisoned_pages __read_mostly = ATOMIC_LONG_INIT(0);
6a46079c 66
27df5068
AK
67#if defined(CONFIG_HWPOISON_INJECT) || defined(CONFIG_HWPOISON_INJECT_MODULE)
68
1bfe5feb 69u32 hwpoison_filter_enable = 0;
7c116f2b
WF
70u32 hwpoison_filter_dev_major = ~0U;
71u32 hwpoison_filter_dev_minor = ~0U;
478c5ffc
WF
72u64 hwpoison_filter_flags_mask;
73u64 hwpoison_filter_flags_value;
1bfe5feb 74EXPORT_SYMBOL_GPL(hwpoison_filter_enable);
7c116f2b
WF
75EXPORT_SYMBOL_GPL(hwpoison_filter_dev_major);
76EXPORT_SYMBOL_GPL(hwpoison_filter_dev_minor);
478c5ffc
WF
77EXPORT_SYMBOL_GPL(hwpoison_filter_flags_mask);
78EXPORT_SYMBOL_GPL(hwpoison_filter_flags_value);
7c116f2b
WF
79
80static int hwpoison_filter_dev(struct page *p)
81{
82 struct address_space *mapping;
83 dev_t dev;
84
85 if (hwpoison_filter_dev_major == ~0U &&
86 hwpoison_filter_dev_minor == ~0U)
87 return 0;
88
89 /*
1c80b990 90 * page_mapping() does not accept slab pages.
7c116f2b
WF
91 */
92 if (PageSlab(p))
93 return -EINVAL;
94
95 mapping = page_mapping(p);
96 if (mapping == NULL || mapping->host == NULL)
97 return -EINVAL;
98
99 dev = mapping->host->i_sb->s_dev;
100 if (hwpoison_filter_dev_major != ~0U &&
101 hwpoison_filter_dev_major != MAJOR(dev))
102 return -EINVAL;
103 if (hwpoison_filter_dev_minor != ~0U &&
104 hwpoison_filter_dev_minor != MINOR(dev))
105 return -EINVAL;
106
107 return 0;
108}
109
478c5ffc
WF
110static int hwpoison_filter_flags(struct page *p)
111{
112 if (!hwpoison_filter_flags_mask)
113 return 0;
114
115 if ((stable_page_flags(p) & hwpoison_filter_flags_mask) ==
116 hwpoison_filter_flags_value)
117 return 0;
118 else
119 return -EINVAL;
120}
121
4fd466eb
AK
122/*
123 * This allows stress tests to limit test scope to a collection of tasks
124 * by putting them under some memcg. This prevents killing unrelated/important
125 * processes such as /sbin/init. Note that the target task may share clean
126 * pages with init (eg. libc text), which is harmless. If the target task
127 * share _dirty_ pages with another task B, the test scheme must make sure B
128 * is also included in the memcg. At last, due to race conditions this filter
129 * can only guarantee that the page either belongs to the memcg tasks, or is
130 * a freed page.
131 */
c255a458 132#ifdef CONFIG_MEMCG_SWAP
4fd466eb
AK
133u64 hwpoison_filter_memcg;
134EXPORT_SYMBOL_GPL(hwpoison_filter_memcg);
135static int hwpoison_filter_task(struct page *p)
136{
137 struct mem_cgroup *mem;
138 struct cgroup_subsys_state *css;
139 unsigned long ino;
140
141 if (!hwpoison_filter_memcg)
142 return 0;
143
144 mem = try_get_mem_cgroup_from_page(p);
145 if (!mem)
146 return -EINVAL;
147
148 css = mem_cgroup_css(mem);
b1664924 149 ino = cgroup_ino(css->cgroup);
4fd466eb
AK
150 css_put(css);
151
f29374b1 152 if (ino != hwpoison_filter_memcg)
4fd466eb
AK
153 return -EINVAL;
154
155 return 0;
156}
157#else
158static int hwpoison_filter_task(struct page *p) { return 0; }
159#endif
160
7c116f2b
WF
161int hwpoison_filter(struct page *p)
162{
1bfe5feb
HL
163 if (!hwpoison_filter_enable)
164 return 0;
165
7c116f2b
WF
166 if (hwpoison_filter_dev(p))
167 return -EINVAL;
168
478c5ffc
WF
169 if (hwpoison_filter_flags(p))
170 return -EINVAL;
171
4fd466eb
AK
172 if (hwpoison_filter_task(p))
173 return -EINVAL;
174
7c116f2b
WF
175 return 0;
176}
27df5068
AK
177#else
178int hwpoison_filter(struct page *p)
179{
180 return 0;
181}
182#endif
183
7c116f2b
WF
184EXPORT_SYMBOL_GPL(hwpoison_filter);
185
6a46079c 186/*
7329bbeb
TL
187 * Send all the processes who have the page mapped a signal.
188 * ``action optional'' if they are not immediately affected by the error
189 * ``action required'' if error happened in current execution context
6a46079c 190 */
7329bbeb
TL
191static int kill_proc(struct task_struct *t, unsigned long addr, int trapno,
192 unsigned long pfn, struct page *page, int flags)
6a46079c
AK
193{
194 struct siginfo si;
195 int ret;
196
197 printk(KERN_ERR
7329bbeb 198 "MCE %#lx: Killing %s:%d due to hardware memory corruption\n",
6a46079c
AK
199 pfn, t->comm, t->pid);
200 si.si_signo = SIGBUS;
201 si.si_errno = 0;
6a46079c
AK
202 si.si_addr = (void *)addr;
203#ifdef __ARCH_SI_TRAPNO
204 si.si_trapno = trapno;
205#endif
f9121153 206 si.si_addr_lsb = compound_order(compound_head(page)) + PAGE_SHIFT;
7329bbeb 207
a70ffcac 208 if ((flags & MF_ACTION_REQUIRED) && t->mm == current->mm) {
7329bbeb 209 si.si_code = BUS_MCEERR_AR;
a70ffcac 210 ret = force_sig_info(SIGBUS, &si, current);
7329bbeb
TL
211 } else {
212 /*
213 * Don't use force here, it's convenient if the signal
214 * can be temporarily blocked.
215 * This could cause a loop when the user sets SIGBUS
216 * to SIG_IGN, but hopefully no one will do that?
217 */
218 si.si_code = BUS_MCEERR_AO;
219 ret = send_sig_info(SIGBUS, &si, t); /* synchronous? */
220 }
6a46079c
AK
221 if (ret < 0)
222 printk(KERN_INFO "MCE: Error sending signal to %s:%d: %d\n",
223 t->comm, t->pid, ret);
224 return ret;
225}
226
588f9ce6
AK
227/*
228 * When a unknown page type is encountered drain as many buffers as possible
229 * in the hope to turn the page into a LRU or free page, which we can handle.
230 */
facb6011 231void shake_page(struct page *p, int access)
588f9ce6
AK
232{
233 if (!PageSlab(p)) {
234 lru_add_drain_all();
235 if (PageLRU(p))
236 return;
c0554329 237 drain_all_pages(page_zone(p));
588f9ce6
AK
238 if (PageLRU(p) || is_free_buddy_page(p))
239 return;
240 }
facb6011 241
588f9ce6 242 /*
6b4f7799
JW
243 * Only call shrink_node_slabs here (which would also shrink
244 * other caches) if access is not potentially fatal.
588f9ce6 245 */
cb731d6c
VD
246 if (access)
247 drop_slab_node(page_to_nid(p));
588f9ce6
AK
248}
249EXPORT_SYMBOL_GPL(shake_page);
250
6a46079c
AK
251/*
252 * Kill all processes that have a poisoned page mapped and then isolate
253 * the page.
254 *
255 * General strategy:
256 * Find all processes having the page mapped and kill them.
257 * But we keep a page reference around so that the page is not
258 * actually freed yet.
259 * Then stash the page away
260 *
261 * There's no convenient way to get back to mapped processes
262 * from the VMAs. So do a brute-force search over all
263 * running processes.
264 *
265 * Remember that machine checks are not common (or rather
266 * if they are common you have other problems), so this shouldn't
267 * be a performance issue.
268 *
269 * Also there are some races possible while we get from the
270 * error detection to actually handle it.
271 */
272
273struct to_kill {
274 struct list_head nd;
275 struct task_struct *tsk;
276 unsigned long addr;
9033ae16 277 char addr_valid;
6a46079c
AK
278};
279
280/*
281 * Failure handling: if we can't find or can't kill a process there's
282 * not much we can do. We just print a message and ignore otherwise.
283 */
284
285/*
286 * Schedule a process for later kill.
287 * Uses GFP_ATOMIC allocations to avoid potential recursions in the VM.
288 * TBD would GFP_NOIO be enough?
289 */
290static void add_to_kill(struct task_struct *tsk, struct page *p,
291 struct vm_area_struct *vma,
292 struct list_head *to_kill,
293 struct to_kill **tkc)
294{
295 struct to_kill *tk;
296
297 if (*tkc) {
298 tk = *tkc;
299 *tkc = NULL;
300 } else {
301 tk = kmalloc(sizeof(struct to_kill), GFP_ATOMIC);
302 if (!tk) {
303 printk(KERN_ERR
304 "MCE: Out of memory while machine check handling\n");
305 return;
306 }
307 }
308 tk->addr = page_address_in_vma(p, vma);
309 tk->addr_valid = 1;
310
311 /*
312 * In theory we don't have to kill when the page was
313 * munmaped. But it could be also a mremap. Since that's
314 * likely very rare kill anyways just out of paranoia, but use
315 * a SIGKILL because the error is not contained anymore.
316 */
317 if (tk->addr == -EFAULT) {
fb46e735 318 pr_info("MCE: Unable to find user space address %lx in %s\n",
6a46079c
AK
319 page_to_pfn(p), tsk->comm);
320 tk->addr_valid = 0;
321 }
322 get_task_struct(tsk);
323 tk->tsk = tsk;
324 list_add_tail(&tk->nd, to_kill);
325}
326
327/*
328 * Kill the processes that have been collected earlier.
329 *
330 * Only do anything when DOIT is set, otherwise just free the list
331 * (this is used for clean pages which do not need killing)
332 * Also when FAIL is set do a force kill because something went
333 * wrong earlier.
334 */
6751ed65 335static void kill_procs(struct list_head *to_kill, int forcekill, int trapno,
7329bbeb
TL
336 int fail, struct page *page, unsigned long pfn,
337 int flags)
6a46079c
AK
338{
339 struct to_kill *tk, *next;
340
341 list_for_each_entry_safe (tk, next, to_kill, nd) {
6751ed65 342 if (forcekill) {
6a46079c 343 /*
af901ca1 344 * In case something went wrong with munmapping
6a46079c
AK
345 * make sure the process doesn't catch the
346 * signal and then access the memory. Just kill it.
6a46079c
AK
347 */
348 if (fail || tk->addr_valid == 0) {
349 printk(KERN_ERR
350 "MCE %#lx: forcibly killing %s:%d because of failure to unmap corrupted page\n",
351 pfn, tk->tsk->comm, tk->tsk->pid);
352 force_sig(SIGKILL, tk->tsk);
353 }
354
355 /*
356 * In theory the process could have mapped
357 * something else on the address in-between. We could
358 * check for that, but we need to tell the
359 * process anyways.
360 */
7329bbeb
TL
361 else if (kill_proc(tk->tsk, tk->addr, trapno,
362 pfn, page, flags) < 0)
6a46079c
AK
363 printk(KERN_ERR
364 "MCE %#lx: Cannot send advisory machine check signal to %s:%d\n",
365 pfn, tk->tsk->comm, tk->tsk->pid);
366 }
367 put_task_struct(tk->tsk);
368 kfree(tk);
369 }
370}
371
3ba08129
NH
372/*
373 * Find a dedicated thread which is supposed to handle SIGBUS(BUS_MCEERR_AO)
374 * on behalf of the thread group. Return task_struct of the (first found)
375 * dedicated thread if found, and return NULL otherwise.
376 *
377 * We already hold read_lock(&tasklist_lock) in the caller, so we don't
378 * have to call rcu_read_lock/unlock() in this function.
379 */
380static struct task_struct *find_early_kill_thread(struct task_struct *tsk)
6a46079c 381{
3ba08129
NH
382 struct task_struct *t;
383
384 for_each_thread(tsk, t)
385 if ((t->flags & PF_MCE_PROCESS) && (t->flags & PF_MCE_EARLY))
386 return t;
387 return NULL;
388}
389
390/*
391 * Determine whether a given process is "early kill" process which expects
392 * to be signaled when some page under the process is hwpoisoned.
393 * Return task_struct of the dedicated thread (main thread unless explicitly
394 * specified) if the process is "early kill," and otherwise returns NULL.
395 */
396static struct task_struct *task_early_kill(struct task_struct *tsk,
397 int force_early)
398{
399 struct task_struct *t;
6a46079c 400 if (!tsk->mm)
3ba08129 401 return NULL;
74614de1 402 if (force_early)
3ba08129
NH
403 return tsk;
404 t = find_early_kill_thread(tsk);
405 if (t)
406 return t;
407 if (sysctl_memory_failure_early_kill)
408 return tsk;
409 return NULL;
6a46079c
AK
410}
411
412/*
413 * Collect processes when the error hit an anonymous page.
414 */
415static void collect_procs_anon(struct page *page, struct list_head *to_kill,
74614de1 416 struct to_kill **tkc, int force_early)
6a46079c
AK
417{
418 struct vm_area_struct *vma;
419 struct task_struct *tsk;
420 struct anon_vma *av;
bf181b9f 421 pgoff_t pgoff;
6a46079c 422
4fc3f1d6 423 av = page_lock_anon_vma_read(page);
6a46079c 424 if (av == NULL) /* Not actually mapped anymore */
9b679320
PZ
425 return;
426
a0f7a756 427 pgoff = page_to_pgoff(page);
9b679320 428 read_lock(&tasklist_lock);
6a46079c 429 for_each_process (tsk) {
5beb4930 430 struct anon_vma_chain *vmac;
3ba08129 431 struct task_struct *t = task_early_kill(tsk, force_early);
5beb4930 432
3ba08129 433 if (!t)
6a46079c 434 continue;
bf181b9f
ML
435 anon_vma_interval_tree_foreach(vmac, &av->rb_root,
436 pgoff, pgoff) {
5beb4930 437 vma = vmac->vma;
6a46079c
AK
438 if (!page_mapped_in_vma(page, vma))
439 continue;
3ba08129
NH
440 if (vma->vm_mm == t->mm)
441 add_to_kill(t, page, vma, to_kill, tkc);
6a46079c
AK
442 }
443 }
6a46079c 444 read_unlock(&tasklist_lock);
4fc3f1d6 445 page_unlock_anon_vma_read(av);
6a46079c
AK
446}
447
448/*
449 * Collect processes when the error hit a file mapped page.
450 */
451static void collect_procs_file(struct page *page, struct list_head *to_kill,
74614de1 452 struct to_kill **tkc, int force_early)
6a46079c
AK
453{
454 struct vm_area_struct *vma;
455 struct task_struct *tsk;
6a46079c
AK
456 struct address_space *mapping = page->mapping;
457
d28eb9c8 458 i_mmap_lock_read(mapping);
9b679320 459 read_lock(&tasklist_lock);
6a46079c 460 for_each_process(tsk) {
a0f7a756 461 pgoff_t pgoff = page_to_pgoff(page);
3ba08129 462 struct task_struct *t = task_early_kill(tsk, force_early);
6a46079c 463
3ba08129 464 if (!t)
6a46079c 465 continue;
6b2dbba8 466 vma_interval_tree_foreach(vma, &mapping->i_mmap, pgoff,
6a46079c
AK
467 pgoff) {
468 /*
469 * Send early kill signal to tasks where a vma covers
470 * the page but the corrupted page is not necessarily
471 * mapped it in its pte.
472 * Assume applications who requested early kill want
473 * to be informed of all such data corruptions.
474 */
3ba08129
NH
475 if (vma->vm_mm == t->mm)
476 add_to_kill(t, page, vma, to_kill, tkc);
6a46079c
AK
477 }
478 }
6a46079c 479 read_unlock(&tasklist_lock);
d28eb9c8 480 i_mmap_unlock_read(mapping);
6a46079c
AK
481}
482
483/*
484 * Collect the processes who have the corrupted page mapped to kill.
485 * This is done in two steps for locking reasons.
486 * First preallocate one tokill structure outside the spin locks,
487 * so that we can kill at least one process reasonably reliable.
488 */
74614de1
TL
489static void collect_procs(struct page *page, struct list_head *tokill,
490 int force_early)
6a46079c
AK
491{
492 struct to_kill *tk;
493
494 if (!page->mapping)
495 return;
496
497 tk = kmalloc(sizeof(struct to_kill), GFP_NOIO);
498 if (!tk)
499 return;
500 if (PageAnon(page))
74614de1 501 collect_procs_anon(page, tokill, &tk, force_early);
6a46079c 502 else
74614de1 503 collect_procs_file(page, tokill, &tk, force_early);
6a46079c
AK
504 kfree(tk);
505}
506
507/*
508 * Error handlers for various types of pages.
509 */
510
511enum outcome {
d95ea51e
WF
512 IGNORED, /* Error: cannot be handled */
513 FAILED, /* Error: handling failed */
6a46079c 514 DELAYED, /* Will be handled later */
6a46079c
AK
515 RECOVERED, /* Successfully recovered */
516};
517
518static const char *action_name[] = {
d95ea51e 519 [IGNORED] = "Ignored",
6a46079c
AK
520 [FAILED] = "Failed",
521 [DELAYED] = "Delayed",
6a46079c
AK
522 [RECOVERED] = "Recovered",
523};
524
64d37a2b
NH
525enum action_page_type {
526 MSG_KERNEL,
527 MSG_KERNEL_HIGH_ORDER,
528 MSG_SLAB,
529 MSG_DIFFERENT_COMPOUND,
530 MSG_POISONED_HUGE,
531 MSG_HUGE,
532 MSG_FREE_HUGE,
533 MSG_UNMAP_FAILED,
534 MSG_DIRTY_SWAPCACHE,
535 MSG_CLEAN_SWAPCACHE,
536 MSG_DIRTY_MLOCKED_LRU,
537 MSG_CLEAN_MLOCKED_LRU,
538 MSG_DIRTY_UNEVICTABLE_LRU,
539 MSG_CLEAN_UNEVICTABLE_LRU,
540 MSG_DIRTY_LRU,
541 MSG_CLEAN_LRU,
542 MSG_TRUNCATED_LRU,
543 MSG_BUDDY,
544 MSG_BUDDY_2ND,
545 MSG_UNKNOWN,
546};
547
548static const char * const action_page_types[] = {
549 [MSG_KERNEL] = "reserved kernel page",
550 [MSG_KERNEL_HIGH_ORDER] = "high-order kernel page",
551 [MSG_SLAB] = "kernel slab page",
552 [MSG_DIFFERENT_COMPOUND] = "different compound page after locking",
553 [MSG_POISONED_HUGE] = "huge page already hardware poisoned",
554 [MSG_HUGE] = "huge page",
555 [MSG_FREE_HUGE] = "free huge page",
556 [MSG_UNMAP_FAILED] = "unmapping failed page",
557 [MSG_DIRTY_SWAPCACHE] = "dirty swapcache page",
558 [MSG_CLEAN_SWAPCACHE] = "clean swapcache page",
559 [MSG_DIRTY_MLOCKED_LRU] = "dirty mlocked LRU page",
560 [MSG_CLEAN_MLOCKED_LRU] = "clean mlocked LRU page",
561 [MSG_DIRTY_UNEVICTABLE_LRU] = "dirty unevictable LRU page",
562 [MSG_CLEAN_UNEVICTABLE_LRU] = "clean unevictable LRU page",
563 [MSG_DIRTY_LRU] = "dirty LRU page",
564 [MSG_CLEAN_LRU] = "clean LRU page",
565 [MSG_TRUNCATED_LRU] = "already truncated LRU page",
566 [MSG_BUDDY] = "free buddy page",
567 [MSG_BUDDY_2ND] = "free buddy page (2nd try)",
568 [MSG_UNKNOWN] = "unknown page",
569};
570
dc2a1cbf
WF
571/*
572 * XXX: It is possible that a page is isolated from LRU cache,
573 * and then kept in swap cache or failed to remove from page cache.
574 * The page count will stop it from being freed by unpoison.
575 * Stress tests should be aware of this memory leak problem.
576 */
577static int delete_from_lru_cache(struct page *p)
578{
579 if (!isolate_lru_page(p)) {
580 /*
581 * Clear sensible page flags, so that the buddy system won't
582 * complain when the page is unpoison-and-freed.
583 */
584 ClearPageActive(p);
585 ClearPageUnevictable(p);
586 /*
587 * drop the page count elevated by isolate_lru_page()
588 */
589 page_cache_release(p);
590 return 0;
591 }
592 return -EIO;
593}
594
6a46079c
AK
595/*
596 * Error hit kernel page.
597 * Do nothing, try to be lucky and not touch this instead. For a few cases we
598 * could be more sophisticated.
599 */
600static int me_kernel(struct page *p, unsigned long pfn)
6a46079c
AK
601{
602 return IGNORED;
603}
604
605/*
606 * Page in unknown state. Do nothing.
607 */
608static int me_unknown(struct page *p, unsigned long pfn)
609{
610 printk(KERN_ERR "MCE %#lx: Unknown page state\n", pfn);
611 return FAILED;
612}
613
6a46079c
AK
614/*
615 * Clean (or cleaned) page cache page.
616 */
617static int me_pagecache_clean(struct page *p, unsigned long pfn)
618{
619 int err;
620 int ret = FAILED;
621 struct address_space *mapping;
622
dc2a1cbf
WF
623 delete_from_lru_cache(p);
624
6a46079c
AK
625 /*
626 * For anonymous pages we're done the only reference left
627 * should be the one m_f() holds.
628 */
629 if (PageAnon(p))
630 return RECOVERED;
631
632 /*
633 * Now truncate the page in the page cache. This is really
634 * more like a "temporary hole punch"
635 * Don't do this for block devices when someone else
636 * has a reference, because it could be file system metadata
637 * and that's not safe to truncate.
638 */
639 mapping = page_mapping(p);
640 if (!mapping) {
641 /*
642 * Page has been teared down in the meanwhile
643 */
644 return FAILED;
645 }
646
647 /*
648 * Truncation is a bit tricky. Enable it per file system for now.
649 *
650 * Open: to take i_mutex or not for this? Right now we don't.
651 */
652 if (mapping->a_ops->error_remove_page) {
653 err = mapping->a_ops->error_remove_page(mapping, p);
654 if (err != 0) {
655 printk(KERN_INFO "MCE %#lx: Failed to punch page: %d\n",
656 pfn, err);
657 } else if (page_has_private(p) &&
658 !try_to_release_page(p, GFP_NOIO)) {
fb46e735 659 pr_info("MCE %#lx: failed to release buffers\n", pfn);
6a46079c
AK
660 } else {
661 ret = RECOVERED;
662 }
663 } else {
664 /*
665 * If the file system doesn't support it just invalidate
666 * This fails on dirty or anything with private pages
667 */
668 if (invalidate_inode_page(p))
669 ret = RECOVERED;
670 else
671 printk(KERN_INFO "MCE %#lx: Failed to invalidate\n",
672 pfn);
673 }
674 return ret;
675}
676
677/*
549543df 678 * Dirty pagecache page
6a46079c
AK
679 * Issues: when the error hit a hole page the error is not properly
680 * propagated.
681 */
682static int me_pagecache_dirty(struct page *p, unsigned long pfn)
683{
684 struct address_space *mapping = page_mapping(p);
685
686 SetPageError(p);
687 /* TBD: print more information about the file. */
688 if (mapping) {
689 /*
690 * IO error will be reported by write(), fsync(), etc.
691 * who check the mapping.
692 * This way the application knows that something went
693 * wrong with its dirty file data.
694 *
695 * There's one open issue:
696 *
697 * The EIO will be only reported on the next IO
698 * operation and then cleared through the IO map.
699 * Normally Linux has two mechanisms to pass IO error
700 * first through the AS_EIO flag in the address space
701 * and then through the PageError flag in the page.
702 * Since we drop pages on memory failure handling the
703 * only mechanism open to use is through AS_AIO.
704 *
705 * This has the disadvantage that it gets cleared on
706 * the first operation that returns an error, while
707 * the PageError bit is more sticky and only cleared
708 * when the page is reread or dropped. If an
709 * application assumes it will always get error on
710 * fsync, but does other operations on the fd before
25985edc 711 * and the page is dropped between then the error
6a46079c
AK
712 * will not be properly reported.
713 *
714 * This can already happen even without hwpoisoned
715 * pages: first on metadata IO errors (which only
716 * report through AS_EIO) or when the page is dropped
717 * at the wrong time.
718 *
719 * So right now we assume that the application DTRT on
720 * the first EIO, but we're not worse than other parts
721 * of the kernel.
722 */
723 mapping_set_error(mapping, EIO);
724 }
725
726 return me_pagecache_clean(p, pfn);
727}
728
729/*
730 * Clean and dirty swap cache.
731 *
732 * Dirty swap cache page is tricky to handle. The page could live both in page
733 * cache and swap cache(ie. page is freshly swapped in). So it could be
734 * referenced concurrently by 2 types of PTEs:
735 * normal PTEs and swap PTEs. We try to handle them consistently by calling
736 * try_to_unmap(TTU_IGNORE_HWPOISON) to convert the normal PTEs to swap PTEs,
737 * and then
738 * - clear dirty bit to prevent IO
739 * - remove from LRU
740 * - but keep in the swap cache, so that when we return to it on
741 * a later page fault, we know the application is accessing
742 * corrupted data and shall be killed (we installed simple
743 * interception code in do_swap_page to catch it).
744 *
745 * Clean swap cache pages can be directly isolated. A later page fault will
746 * bring in the known good data from disk.
747 */
748static int me_swapcache_dirty(struct page *p, unsigned long pfn)
749{
6a46079c
AK
750 ClearPageDirty(p);
751 /* Trigger EIO in shmem: */
752 ClearPageUptodate(p);
753
dc2a1cbf
WF
754 if (!delete_from_lru_cache(p))
755 return DELAYED;
756 else
757 return FAILED;
6a46079c
AK
758}
759
760static int me_swapcache_clean(struct page *p, unsigned long pfn)
761{
6a46079c 762 delete_from_swap_cache(p);
e43c3afb 763
dc2a1cbf
WF
764 if (!delete_from_lru_cache(p))
765 return RECOVERED;
766 else
767 return FAILED;
6a46079c
AK
768}
769
770/*
771 * Huge pages. Needs work.
772 * Issues:
93f70f90
NH
773 * - Error on hugepage is contained in hugepage unit (not in raw page unit.)
774 * To narrow down kill region to one page, we need to break up pmd.
6a46079c
AK
775 */
776static int me_huge_page(struct page *p, unsigned long pfn)
777{
6de2b1aa 778 int res = 0;
93f70f90
NH
779 struct page *hpage = compound_head(p);
780 /*
781 * We can safely recover from error on free or reserved (i.e.
782 * not in-use) hugepage by dequeuing it from freelist.
783 * To check whether a hugepage is in-use or not, we can't use
784 * page->lru because it can be used in other hugepage operations,
785 * such as __unmap_hugepage_range() and gather_surplus_pages().
786 * So instead we use page_mapping() and PageAnon().
787 * We assume that this function is called with page lock held,
788 * so there is no race between isolation and mapping/unmapping.
789 */
790 if (!(page_mapping(hpage) || PageAnon(hpage))) {
6de2b1aa
NH
791 res = dequeue_hwpoisoned_huge_page(hpage);
792 if (!res)
793 return RECOVERED;
93f70f90
NH
794 }
795 return DELAYED;
6a46079c
AK
796}
797
798/*
799 * Various page states we can handle.
800 *
801 * A page state is defined by its current page->flags bits.
802 * The table matches them in order and calls the right handler.
803 *
804 * This is quite tricky because we can access page at any time
25985edc 805 * in its live cycle, so all accesses have to be extremely careful.
6a46079c
AK
806 *
807 * This is not complete. More states could be added.
808 * For any missing state don't attempt recovery.
809 */
810
811#define dirty (1UL << PG_dirty)
812#define sc (1UL << PG_swapcache)
813#define unevict (1UL << PG_unevictable)
814#define mlock (1UL << PG_mlocked)
815#define writeback (1UL << PG_writeback)
816#define lru (1UL << PG_lru)
817#define swapbacked (1UL << PG_swapbacked)
818#define head (1UL << PG_head)
819#define tail (1UL << PG_tail)
820#define compound (1UL << PG_compound)
821#define slab (1UL << PG_slab)
6a46079c
AK
822#define reserved (1UL << PG_reserved)
823
824static struct page_state {
825 unsigned long mask;
826 unsigned long res;
64d37a2b 827 enum action_page_type type;
6a46079c
AK
828 int (*action)(struct page *p, unsigned long pfn);
829} error_states[] = {
64d37a2b 830 { reserved, reserved, MSG_KERNEL, me_kernel },
95d01fc6
WF
831 /*
832 * free pages are specially detected outside this table:
833 * PG_buddy pages only make a small fraction of all free pages.
834 */
6a46079c
AK
835
836 /*
837 * Could in theory check if slab page is free or if we can drop
838 * currently unused objects without touching them. But just
839 * treat it as standard kernel for now.
840 */
64d37a2b 841 { slab, slab, MSG_SLAB, me_kernel },
6a46079c
AK
842
843#ifdef CONFIG_PAGEFLAGS_EXTENDED
64d37a2b
NH
844 { head, head, MSG_HUGE, me_huge_page },
845 { tail, tail, MSG_HUGE, me_huge_page },
6a46079c 846#else
64d37a2b 847 { compound, compound, MSG_HUGE, me_huge_page },
6a46079c
AK
848#endif
849
64d37a2b
NH
850 { sc|dirty, sc|dirty, MSG_DIRTY_SWAPCACHE, me_swapcache_dirty },
851 { sc|dirty, sc, MSG_CLEAN_SWAPCACHE, me_swapcache_clean },
6a46079c 852
64d37a2b
NH
853 { mlock|dirty, mlock|dirty, MSG_DIRTY_MLOCKED_LRU, me_pagecache_dirty },
854 { mlock|dirty, mlock, MSG_CLEAN_MLOCKED_LRU, me_pagecache_clean },
6a46079c 855
64d37a2b
NH
856 { unevict|dirty, unevict|dirty, MSG_DIRTY_UNEVICTABLE_LRU, me_pagecache_dirty },
857 { unevict|dirty, unevict, MSG_CLEAN_UNEVICTABLE_LRU, me_pagecache_clean },
5f4b9fc5 858
64d37a2b
NH
859 { lru|dirty, lru|dirty, MSG_DIRTY_LRU, me_pagecache_dirty },
860 { lru|dirty, lru, MSG_CLEAN_LRU, me_pagecache_clean },
6a46079c
AK
861
862 /*
863 * Catchall entry: must be at end.
864 */
64d37a2b 865 { 0, 0, MSG_UNKNOWN, me_unknown },
6a46079c
AK
866};
867
2326c467
AK
868#undef dirty
869#undef sc
870#undef unevict
871#undef mlock
872#undef writeback
873#undef lru
874#undef swapbacked
875#undef head
876#undef tail
877#undef compound
878#undef slab
879#undef reserved
880
ff604cf6
NH
881/*
882 * "Dirty/Clean" indication is not 100% accurate due to the possibility of
883 * setting PG_dirty outside page lock. See also comment above set_page_dirty().
884 */
64d37a2b 885static void action_result(unsigned long pfn, enum action_page_type type, int result)
6a46079c 886{
64d37a2b
NH
887 pr_err("MCE %#lx: recovery action for %s: %s\n",
888 pfn, action_page_types[type], action_name[result]);
6a46079c
AK
889}
890
891static int page_action(struct page_state *ps, struct page *p,
bd1ce5f9 892 unsigned long pfn)
6a46079c
AK
893{
894 int result;
7456b040 895 int count;
6a46079c
AK
896
897 result = ps->action(p, pfn);
7456b040 898
bd1ce5f9 899 count = page_count(p) - 1;
138ce286
WF
900 if (ps->action == me_swapcache_dirty && result == DELAYED)
901 count--;
902 if (count != 0) {
6a46079c 903 printk(KERN_ERR
64d37a2b
NH
904 "MCE %#lx: %s still referenced by %d users\n",
905 pfn, action_page_types[ps->type], count);
138ce286
WF
906 result = FAILED;
907 }
64d37a2b 908 action_result(pfn, ps->type, result);
6a46079c
AK
909
910 /* Could do more checks here if page looks ok */
911 /*
912 * Could adjust zone counters here to correct for the missing page.
913 */
914
138ce286 915 return (result == RECOVERED || result == DELAYED) ? 0 : -EBUSY;
6a46079c
AK
916}
917
ead07f6a
NH
918/**
919 * get_hwpoison_page() - Get refcount for memory error handling:
920 * @page: raw error page (hit by memory error)
921 *
922 * Return: return 0 if failed to grab the refcount, otherwise true (some
923 * non-zero value.)
924 */
925int get_hwpoison_page(struct page *page)
926{
927 struct page *head = compound_head(page);
928
929 if (PageHuge(head))
930 return get_page_unless_zero(head);
931
932 /*
933 * Thp tail page has special refcounting rule (refcount of tail pages
934 * is stored in ->_mapcount,) so we can't call get_page_unless_zero()
935 * directly for tail pages.
936 */
937 if (PageTransHuge(head)) {
938 if (get_page_unless_zero(head)) {
939 if (PageTail(page))
940 get_page(page);
941 return 1;
942 } else {
943 return 0;
944 }
945 }
946
947 return get_page_unless_zero(page);
948}
949EXPORT_SYMBOL_GPL(get_hwpoison_page);
950
6a46079c
AK
951/*
952 * Do all that is necessary to remove user space mappings. Unmap
953 * the pages and send SIGBUS to the processes if the data was dirty.
954 */
1668bfd5 955static int hwpoison_user_mappings(struct page *p, unsigned long pfn,
54b9dd14 956 int trapno, int flags, struct page **hpagep)
6a46079c
AK
957{
958 enum ttu_flags ttu = TTU_UNMAP | TTU_IGNORE_MLOCK | TTU_IGNORE_ACCESS;
959 struct address_space *mapping;
960 LIST_HEAD(tokill);
961 int ret;
6751ed65 962 int kill = 1, forcekill;
54b9dd14 963 struct page *hpage = *hpagep;
6a46079c 964
93a9eb39
NH
965 /*
966 * Here we are interested only in user-mapped pages, so skip any
967 * other types of pages.
968 */
969 if (PageReserved(p) || PageSlab(p))
970 return SWAP_SUCCESS;
971 if (!(PageLRU(hpage) || PageHuge(p)))
1668bfd5 972 return SWAP_SUCCESS;
6a46079c 973
6a46079c
AK
974 /*
975 * This check implies we don't kill processes if their pages
976 * are in the swap cache early. Those are always late kills.
977 */
7af446a8 978 if (!page_mapped(hpage))
1668bfd5
WF
979 return SWAP_SUCCESS;
980
52089b14
NH
981 if (PageKsm(p)) {
982 pr_err("MCE %#lx: can't handle KSM pages.\n", pfn);
1668bfd5 983 return SWAP_FAIL;
52089b14 984 }
6a46079c
AK
985
986 if (PageSwapCache(p)) {
987 printk(KERN_ERR
988 "MCE %#lx: keeping poisoned page in swap cache\n", pfn);
989 ttu |= TTU_IGNORE_HWPOISON;
990 }
991
992 /*
993 * Propagate the dirty bit from PTEs to struct page first, because we
994 * need this to decide if we should kill or just drop the page.
db0480b3
WF
995 * XXX: the dirty test could be racy: set_page_dirty() may not always
996 * be called inside page lock (it's recommended but not enforced).
6a46079c 997 */
7af446a8 998 mapping = page_mapping(hpage);
6751ed65 999 if (!(flags & MF_MUST_KILL) && !PageDirty(hpage) && mapping &&
7af446a8
NH
1000 mapping_cap_writeback_dirty(mapping)) {
1001 if (page_mkclean(hpage)) {
1002 SetPageDirty(hpage);
6a46079c
AK
1003 } else {
1004 kill = 0;
1005 ttu |= TTU_IGNORE_HWPOISON;
1006 printk(KERN_INFO
1007 "MCE %#lx: corrupted page was clean: dropped without side effects\n",
1008 pfn);
1009 }
1010 }
1011
1012 /*
1013 * First collect all the processes that have the page
1014 * mapped in dirty form. This has to be done before try_to_unmap,
1015 * because ttu takes the rmap data structures down.
1016 *
1017 * Error handling: We ignore errors here because
1018 * there's nothing that can be done.
1019 */
1020 if (kill)
415c64c1 1021 collect_procs(hpage, &tokill, flags & MF_ACTION_REQUIRED);
6a46079c 1022
415c64c1 1023 ret = try_to_unmap(hpage, ttu);
6a46079c
AK
1024 if (ret != SWAP_SUCCESS)
1025 printk(KERN_ERR "MCE %#lx: failed to unmap page (mapcount=%d)\n",
415c64c1 1026 pfn, page_mapcount(hpage));
a6d30ddd 1027
6a46079c
AK
1028 /*
1029 * Now that the dirty bit has been propagated to the
1030 * struct page and all unmaps done we can decide if
1031 * killing is needed or not. Only kill when the page
6751ed65
TL
1032 * was dirty or the process is not restartable,
1033 * otherwise the tokill list is merely
6a46079c
AK
1034 * freed. When there was a problem unmapping earlier
1035 * use a more force-full uncatchable kill to prevent
1036 * any accesses to the poisoned memory.
1037 */
415c64c1 1038 forcekill = PageDirty(hpage) || (flags & MF_MUST_KILL);
6751ed65 1039 kill_procs(&tokill, forcekill, trapno,
7329bbeb 1040 ret != SWAP_SUCCESS, p, pfn, flags);
1668bfd5
WF
1041
1042 return ret;
6a46079c
AK
1043}
1044
7013febc
NH
1045static void set_page_hwpoison_huge_page(struct page *hpage)
1046{
1047 int i;
f9121153 1048 int nr_pages = 1 << compound_order(hpage);
7013febc
NH
1049 for (i = 0; i < nr_pages; i++)
1050 SetPageHWPoison(hpage + i);
1051}
1052
1053static void clear_page_hwpoison_huge_page(struct page *hpage)
1054{
1055 int i;
f9121153 1056 int nr_pages = 1 << compound_order(hpage);
7013febc
NH
1057 for (i = 0; i < nr_pages; i++)
1058 ClearPageHWPoison(hpage + i);
1059}
1060
cd42f4a3
TL
1061/**
1062 * memory_failure - Handle memory failure of a page.
1063 * @pfn: Page Number of the corrupted page
1064 * @trapno: Trap number reported in the signal to user space.
1065 * @flags: fine tune action taken
1066 *
1067 * This function is called by the low level machine check code
1068 * of an architecture when it detects hardware memory corruption
1069 * of a page. It tries its best to recover, which includes
1070 * dropping pages, killing processes etc.
1071 *
1072 * The function is primarily of use for corruptions that
1073 * happen outside the current execution context (e.g. when
1074 * detected by a background scrubber)
1075 *
1076 * Must run in process context (e.g. a work queue) with interrupts
1077 * enabled and no spinlocks hold.
1078 */
1079int memory_failure(unsigned long pfn, int trapno, int flags)
6a46079c
AK
1080{
1081 struct page_state *ps;
1082 struct page *p;
7af446a8 1083 struct page *hpage;
415c64c1 1084 struct page *orig_head;
6a46079c 1085 int res;
c9fbdd5f 1086 unsigned int nr_pages;
524fca1e 1087 unsigned long page_flags;
6a46079c
AK
1088
1089 if (!sysctl_memory_failure_recovery)
1090 panic("Memory failure from trap %d on page %lx", trapno, pfn);
1091
1092 if (!pfn_valid(pfn)) {
a7560fc8
WF
1093 printk(KERN_ERR
1094 "MCE %#lx: memory outside kernel control\n",
1095 pfn);
1096 return -ENXIO;
6a46079c
AK
1097 }
1098
1099 p = pfn_to_page(pfn);
415c64c1 1100 orig_head = hpage = compound_head(p);
6a46079c 1101 if (TestSetPageHWPoison(p)) {
d95ea51e 1102 printk(KERN_ERR "MCE %#lx: already hardware poisoned\n", pfn);
6a46079c
AK
1103 return 0;
1104 }
1105
4db0e950
NH
1106 /*
1107 * Currently errors on hugetlbfs pages are measured in hugepage units,
1108 * so nr_pages should be 1 << compound_order. OTOH when errors are on
1109 * transparent hugepages, they are supposed to be split and error
1110 * measurement is done in normal page units. So nr_pages should be one
1111 * in this case.
1112 */
1113 if (PageHuge(p))
1114 nr_pages = 1 << compound_order(hpage);
1115 else /* normal page or thp */
1116 nr_pages = 1;
293c07e3 1117 atomic_long_add(nr_pages, &num_poisoned_pages);
6a46079c
AK
1118
1119 /*
1120 * We need/can do nothing about count=0 pages.
1121 * 1) it's a free page, and therefore in safe hand:
1122 * prep_new_page() will be the gate keeper.
8c6c2ecb
NH
1123 * 2) it's a free hugepage, which is also safe:
1124 * an affected hugepage will be dequeued from hugepage freelist,
1125 * so there's no concern about reusing it ever after.
1126 * 3) it's part of a non-compound high order page.
6a46079c
AK
1127 * Implies some kernel user: cannot stop them from
1128 * R/W the page; let's pray that the page has been
1129 * used and will be freed some time later.
1130 * In fact it's dangerous to directly bump up page count from 0,
1131 * that may make page_freeze_refs()/page_unfreeze_refs() mismatch.
1132 */
ead07f6a 1133 if (!(flags & MF_COUNT_INCREASED) && !get_hwpoison_page(p)) {
8d22ba1b 1134 if (is_free_buddy_page(p)) {
64d37a2b 1135 action_result(pfn, MSG_BUDDY, DELAYED);
8d22ba1b 1136 return 0;
8c6c2ecb
NH
1137 } else if (PageHuge(hpage)) {
1138 /*
b985194c 1139 * Check "filter hit" and "race with other subpage."
8c6c2ecb 1140 */
7eaceacc 1141 lock_page(hpage);
b985194c
CY
1142 if (PageHWPoison(hpage)) {
1143 if ((hwpoison_filter(p) && TestClearPageHWPoison(p))
1144 || (p != hpage && TestSetPageHWPoison(hpage))) {
1145 atomic_long_sub(nr_pages, &num_poisoned_pages);
1146 unlock_page(hpage);
1147 return 0;
1148 }
8c6c2ecb
NH
1149 }
1150 set_page_hwpoison_huge_page(hpage);
1151 res = dequeue_hwpoisoned_huge_page(hpage);
64d37a2b 1152 action_result(pfn, MSG_FREE_HUGE,
8c6c2ecb
NH
1153 res ? IGNORED : DELAYED);
1154 unlock_page(hpage);
1155 return res;
8d22ba1b 1156 } else {
64d37a2b 1157 action_result(pfn, MSG_KERNEL_HIGH_ORDER, IGNORED);
8d22ba1b
WF
1158 return -EBUSY;
1159 }
6a46079c
AK
1160 }
1161
415c64c1
NH
1162 if (!PageHuge(p) && PageTransHuge(hpage)) {
1163 if (!PageAnon(hpage)) {
1164 pr_err("MCE: %#lx: non anonymous thp\n", pfn);
ead07f6a
NH
1165 if (TestClearPageHWPoison(p))
1166 atomic_long_sub(nr_pages, &num_poisoned_pages);
415c64c1 1167 put_page(p);
ead07f6a
NH
1168 if (p != hpage)
1169 put_page(hpage);
415c64c1
NH
1170 return -EBUSY;
1171 }
1172 if (unlikely(split_huge_page(hpage))) {
1173 pr_err("MCE: %#lx: thp split failed\n", pfn);
ead07f6a
NH
1174 if (TestClearPageHWPoison(p))
1175 atomic_long_sub(nr_pages, &num_poisoned_pages);
415c64c1 1176 put_page(p);
ead07f6a
NH
1177 if (p != hpage)
1178 put_page(hpage);
415c64c1
NH
1179 return -EBUSY;
1180 }
1181 VM_BUG_ON_PAGE(!page_count(p), p);
1182 hpage = compound_head(p);
1183 }
1184
e43c3afb
WF
1185 /*
1186 * We ignore non-LRU pages for good reasons.
1187 * - PG_locked is only well defined for LRU pages and a few others
1188 * - to avoid races with __set_page_locked()
1189 * - to avoid races with __SetPageSlab*() (and more non-atomic ops)
1190 * The check (unnecessarily) ignores LRU pages being isolated and
1191 * walked by the page reclaim code, however that's not a big loss.
1192 */
09789e5d 1193 if (!PageHuge(p)) {
415c64c1
NH
1194 if (!PageLRU(p))
1195 shake_page(p, 0);
1196 if (!PageLRU(p)) {
af241a08
JD
1197 /*
1198 * shake_page could have turned it free.
1199 */
1200 if (is_free_buddy_page(p)) {
2d421acd 1201 if (flags & MF_COUNT_INCREASED)
64d37a2b 1202 action_result(pfn, MSG_BUDDY, DELAYED);
2d421acd 1203 else
64d37a2b
NH
1204 action_result(pfn, MSG_BUDDY_2ND,
1205 DELAYED);
af241a08
JD
1206 return 0;
1207 }
0474a60e 1208 }
e43c3afb 1209 }
e43c3afb 1210
7eaceacc 1211 lock_page(hpage);
847ce401 1212
f37d4298
AK
1213 /*
1214 * The page could have changed compound pages during the locking.
1215 * If this happens just bail out.
1216 */
415c64c1 1217 if (PageCompound(p) && compound_head(p) != orig_head) {
64d37a2b 1218 action_result(pfn, MSG_DIFFERENT_COMPOUND, IGNORED);
f37d4298
AK
1219 res = -EBUSY;
1220 goto out;
1221 }
1222
524fca1e
NH
1223 /*
1224 * We use page flags to determine what action should be taken, but
1225 * the flags can be modified by the error containment action. One
1226 * example is an mlocked page, where PG_mlocked is cleared by
1227 * page_remove_rmap() in try_to_unmap_one(). So to determine page status
1228 * correctly, we save a copy of the page flags at this time.
1229 */
1230 page_flags = p->flags;
1231
847ce401
WF
1232 /*
1233 * unpoison always clear PG_hwpoison inside page lock
1234 */
1235 if (!PageHWPoison(p)) {
d95ea51e 1236 printk(KERN_ERR "MCE %#lx: just unpoisoned\n", pfn);
3e030ecc
NH
1237 atomic_long_sub(nr_pages, &num_poisoned_pages);
1238 put_page(hpage);
847ce401
WF
1239 res = 0;
1240 goto out;
1241 }
7c116f2b
WF
1242 if (hwpoison_filter(p)) {
1243 if (TestClearPageHWPoison(p))
293c07e3 1244 atomic_long_sub(nr_pages, &num_poisoned_pages);
7af446a8
NH
1245 unlock_page(hpage);
1246 put_page(hpage);
7c116f2b
WF
1247 return 0;
1248 }
847ce401 1249
0bc1f8b0
CY
1250 if (!PageHuge(p) && !PageTransTail(p) && !PageLRU(p))
1251 goto identify_page_state;
1252
7013febc
NH
1253 /*
1254 * For error on the tail page, we should set PG_hwpoison
1255 * on the head page to show that the hugepage is hwpoisoned
1256 */
a6d30ddd 1257 if (PageHuge(p) && PageTail(p) && TestSetPageHWPoison(hpage)) {
64d37a2b 1258 action_result(pfn, MSG_POISONED_HUGE, IGNORED);
7013febc
NH
1259 unlock_page(hpage);
1260 put_page(hpage);
1261 return 0;
1262 }
1263 /*
1264 * Set PG_hwpoison on all pages in an error hugepage,
1265 * because containment is done in hugepage unit for now.
1266 * Since we have done TestSetPageHWPoison() for the head page with
1267 * page lock held, we can safely set PG_hwpoison bits on tail pages.
1268 */
1269 if (PageHuge(p))
1270 set_page_hwpoison_huge_page(hpage);
1271
6edd6cc6
NH
1272 /*
1273 * It's very difficult to mess with pages currently under IO
1274 * and in many cases impossible, so we just avoid it here.
1275 */
6a46079c
AK
1276 wait_on_page_writeback(p);
1277
1278 /*
1279 * Now take care of user space mappings.
e64a782f 1280 * Abort on fail: __delete_from_page_cache() assumes unmapped page.
54b9dd14
NH
1281 *
1282 * When the raw error page is thp tail page, hpage points to the raw
1283 * page after thp split.
6a46079c 1284 */
54b9dd14
NH
1285 if (hwpoison_user_mappings(p, pfn, trapno, flags, &hpage)
1286 != SWAP_SUCCESS) {
64d37a2b 1287 action_result(pfn, MSG_UNMAP_FAILED, IGNORED);
1668bfd5
WF
1288 res = -EBUSY;
1289 goto out;
1290 }
6a46079c
AK
1291
1292 /*
1293 * Torn down by someone else?
1294 */
dc2a1cbf 1295 if (PageLRU(p) && !PageSwapCache(p) && p->mapping == NULL) {
64d37a2b 1296 action_result(pfn, MSG_TRUNCATED_LRU, IGNORED);
d95ea51e 1297 res = -EBUSY;
6a46079c
AK
1298 goto out;
1299 }
1300
0bc1f8b0 1301identify_page_state:
6a46079c 1302 res = -EBUSY;
524fca1e
NH
1303 /*
1304 * The first check uses the current page flags which may not have any
1305 * relevant information. The second check with the saved page flagss is
1306 * carried out only if the first check can't determine the page status.
1307 */
1308 for (ps = error_states;; ps++)
1309 if ((p->flags & ps->mask) == ps->res)
6a46079c 1310 break;
841fcc58
WL
1311
1312 page_flags |= (p->flags & (1UL << PG_dirty));
1313
524fca1e
NH
1314 if (!ps->mask)
1315 for (ps = error_states;; ps++)
1316 if ((page_flags & ps->mask) == ps->res)
1317 break;
1318 res = page_action(ps, p, pfn);
6a46079c 1319out:
7af446a8 1320 unlock_page(hpage);
6a46079c
AK
1321 return res;
1322}
cd42f4a3 1323EXPORT_SYMBOL_GPL(memory_failure);
847ce401 1324
ea8f5fb8
HY
1325#define MEMORY_FAILURE_FIFO_ORDER 4
1326#define MEMORY_FAILURE_FIFO_SIZE (1 << MEMORY_FAILURE_FIFO_ORDER)
1327
1328struct memory_failure_entry {
1329 unsigned long pfn;
1330 int trapno;
1331 int flags;
1332};
1333
1334struct memory_failure_cpu {
1335 DECLARE_KFIFO(fifo, struct memory_failure_entry,
1336 MEMORY_FAILURE_FIFO_SIZE);
1337 spinlock_t lock;
1338 struct work_struct work;
1339};
1340
1341static DEFINE_PER_CPU(struct memory_failure_cpu, memory_failure_cpu);
1342
1343/**
1344 * memory_failure_queue - Schedule handling memory failure of a page.
1345 * @pfn: Page Number of the corrupted page
1346 * @trapno: Trap number reported in the signal to user space.
1347 * @flags: Flags for memory failure handling
1348 *
1349 * This function is called by the low level hardware error handler
1350 * when it detects hardware memory corruption of a page. It schedules
1351 * the recovering of error page, including dropping pages, killing
1352 * processes etc.
1353 *
1354 * The function is primarily of use for corruptions that
1355 * happen outside the current execution context (e.g. when
1356 * detected by a background scrubber)
1357 *
1358 * Can run in IRQ context.
1359 */
1360void memory_failure_queue(unsigned long pfn, int trapno, int flags)
1361{
1362 struct memory_failure_cpu *mf_cpu;
1363 unsigned long proc_flags;
1364 struct memory_failure_entry entry = {
1365 .pfn = pfn,
1366 .trapno = trapno,
1367 .flags = flags,
1368 };
1369
1370 mf_cpu = &get_cpu_var(memory_failure_cpu);
1371 spin_lock_irqsave(&mf_cpu->lock, proc_flags);
498d319b 1372 if (kfifo_put(&mf_cpu->fifo, entry))
ea8f5fb8
HY
1373 schedule_work_on(smp_processor_id(), &mf_cpu->work);
1374 else
8e33a52f 1375 pr_err("Memory failure: buffer overflow when queuing memory failure at %#lx\n",
ea8f5fb8
HY
1376 pfn);
1377 spin_unlock_irqrestore(&mf_cpu->lock, proc_flags);
1378 put_cpu_var(memory_failure_cpu);
1379}
1380EXPORT_SYMBOL_GPL(memory_failure_queue);
1381
1382static void memory_failure_work_func(struct work_struct *work)
1383{
1384 struct memory_failure_cpu *mf_cpu;
1385 struct memory_failure_entry entry = { 0, };
1386 unsigned long proc_flags;
1387 int gotten;
1388
7c8e0181 1389 mf_cpu = this_cpu_ptr(&memory_failure_cpu);
ea8f5fb8
HY
1390 for (;;) {
1391 spin_lock_irqsave(&mf_cpu->lock, proc_flags);
1392 gotten = kfifo_get(&mf_cpu->fifo, &entry);
1393 spin_unlock_irqrestore(&mf_cpu->lock, proc_flags);
1394 if (!gotten)
1395 break;
cf870c70
NR
1396 if (entry.flags & MF_SOFT_OFFLINE)
1397 soft_offline_page(pfn_to_page(entry.pfn), entry.flags);
1398 else
1399 memory_failure(entry.pfn, entry.trapno, entry.flags);
ea8f5fb8
HY
1400 }
1401}
1402
1403static int __init memory_failure_init(void)
1404{
1405 struct memory_failure_cpu *mf_cpu;
1406 int cpu;
1407
1408 for_each_possible_cpu(cpu) {
1409 mf_cpu = &per_cpu(memory_failure_cpu, cpu);
1410 spin_lock_init(&mf_cpu->lock);
1411 INIT_KFIFO(mf_cpu->fifo);
1412 INIT_WORK(&mf_cpu->work, memory_failure_work_func);
1413 }
1414
1415 return 0;
1416}
1417core_initcall(memory_failure_init);
1418
847ce401
WF
1419/**
1420 * unpoison_memory - Unpoison a previously poisoned page
1421 * @pfn: Page number of the to be unpoisoned page
1422 *
1423 * Software-unpoison a page that has been poisoned by
1424 * memory_failure() earlier.
1425 *
1426 * This is only done on the software-level, so it only works
1427 * for linux injected failures, not real hardware failures
1428 *
1429 * Returns 0 for success, otherwise -errno.
1430 */
1431int unpoison_memory(unsigned long pfn)
1432{
1433 struct page *page;
1434 struct page *p;
1435 int freeit = 0;
c9fbdd5f 1436 unsigned int nr_pages;
847ce401
WF
1437
1438 if (!pfn_valid(pfn))
1439 return -ENXIO;
1440
1441 p = pfn_to_page(pfn);
1442 page = compound_head(p);
1443
1444 if (!PageHWPoison(p)) {
fb46e735 1445 pr_info("MCE: Page was already unpoisoned %#lx\n", pfn);
847ce401
WF
1446 return 0;
1447 }
1448
0cea3fdc
WL
1449 /*
1450 * unpoison_memory() can encounter thp only when the thp is being
1451 * worked by memory_failure() and the page lock is not held yet.
1452 * In such case, we yield to memory_failure() and make unpoison fail.
1453 */
e76d30e2 1454 if (!PageHuge(page) && PageTransHuge(page)) {
0cea3fdc 1455 pr_info("MCE: Memory failure is now running on %#lx\n", pfn);
ead07f6a 1456 return 0;
0cea3fdc
WL
1457 }
1458
f9121153 1459 nr_pages = 1 << compound_order(page);
c9fbdd5f 1460
ead07f6a 1461 if (!get_hwpoison_page(p)) {
8c6c2ecb
NH
1462 /*
1463 * Since HWPoisoned hugepage should have non-zero refcount,
1464 * race between memory failure and unpoison seems to happen.
1465 * In such case unpoison fails and memory failure runs
1466 * to the end.
1467 */
1468 if (PageHuge(page)) {
dd73e85f 1469 pr_info("MCE: Memory failure is now running on free hugepage %#lx\n", pfn);
8c6c2ecb
NH
1470 return 0;
1471 }
847ce401 1472 if (TestClearPageHWPoison(p))
dd9538a5 1473 atomic_long_dec(&num_poisoned_pages);
fb46e735 1474 pr_info("MCE: Software-unpoisoned free page %#lx\n", pfn);
847ce401
WF
1475 return 0;
1476 }
1477
7eaceacc 1478 lock_page(page);
847ce401
WF
1479 /*
1480 * This test is racy because PG_hwpoison is set outside of page lock.
1481 * That's acceptable because that won't trigger kernel panic. Instead,
1482 * the PG_hwpoison page will be caught and isolated on the entrance to
1483 * the free buddy page pool.
1484 */
c9fbdd5f 1485 if (TestClearPageHWPoison(page)) {
fb46e735 1486 pr_info("MCE: Software-unpoisoned page %#lx\n", pfn);
293c07e3 1487 atomic_long_sub(nr_pages, &num_poisoned_pages);
847ce401 1488 freeit = 1;
6a90181c
NH
1489 if (PageHuge(page))
1490 clear_page_hwpoison_huge_page(page);
847ce401
WF
1491 }
1492 unlock_page(page);
1493
1494 put_page(page);
3ba5eebc 1495 if (freeit && !(pfn == my_zero_pfn(0) && page_count(p) == 1))
847ce401
WF
1496 put_page(page);
1497
1498 return 0;
1499}
1500EXPORT_SYMBOL(unpoison_memory);
facb6011
AK
1501
1502static struct page *new_page(struct page *p, unsigned long private, int **x)
1503{
12686d15 1504 int nid = page_to_nid(p);
d950b958
NH
1505 if (PageHuge(p))
1506 return alloc_huge_page_node(page_hstate(compound_head(p)),
1507 nid);
1508 else
1509 return alloc_pages_exact_node(nid, GFP_HIGHUSER_MOVABLE, 0);
facb6011
AK
1510}
1511
1512/*
1513 * Safely get reference count of an arbitrary page.
1514 * Returns 0 for a free page, -EIO for a zero refcount page
1515 * that is not free, and 1 for any other page type.
1516 * For 1 the page is returned with increased page count, otherwise not.
1517 */
af8fae7c 1518static int __get_any_page(struct page *p, unsigned long pfn, int flags)
facb6011
AK
1519{
1520 int ret;
1521
1522 if (flags & MF_COUNT_INCREASED)
1523 return 1;
1524
d950b958
NH
1525 /*
1526 * When the target page is a free hugepage, just remove it
1527 * from free hugepage list.
1528 */
ead07f6a 1529 if (!get_hwpoison_page(p)) {
d950b958 1530 if (PageHuge(p)) {
71dd0b8a 1531 pr_info("%s: %#lx free huge page\n", __func__, pfn);
af8fae7c 1532 ret = 0;
d950b958 1533 } else if (is_free_buddy_page(p)) {
71dd0b8a 1534 pr_info("%s: %#lx free buddy page\n", __func__, pfn);
facb6011
AK
1535 ret = 0;
1536 } else {
71dd0b8a
BP
1537 pr_info("%s: %#lx: unknown zero refcount page type %lx\n",
1538 __func__, pfn, p->flags);
facb6011
AK
1539 ret = -EIO;
1540 }
1541 } else {
1542 /* Not a free page */
1543 ret = 1;
1544 }
facb6011
AK
1545 return ret;
1546}
1547
af8fae7c
NH
1548static int get_any_page(struct page *page, unsigned long pfn, int flags)
1549{
1550 int ret = __get_any_page(page, pfn, flags);
1551
1552 if (ret == 1 && !PageHuge(page) && !PageLRU(page)) {
1553 /*
1554 * Try to free it.
1555 */
1556 put_page(page);
1557 shake_page(page, 1);
1558
1559 /*
1560 * Did it turn free?
1561 */
1562 ret = __get_any_page(page, pfn, 0);
1563 if (!PageLRU(page)) {
1564 pr_info("soft_offline: %#lx: unknown non LRU page type %lx\n",
1565 pfn, page->flags);
1566 return -EIO;
1567 }
1568 }
1569 return ret;
1570}
1571
d950b958
NH
1572static int soft_offline_huge_page(struct page *page, int flags)
1573{
1574 int ret;
1575 unsigned long pfn = page_to_pfn(page);
1576 struct page *hpage = compound_head(page);
b8ec1cee 1577 LIST_HEAD(pagelist);
d950b958 1578
af8fae7c
NH
1579 /*
1580 * This double-check of PageHWPoison is to avoid the race with
1581 * memory_failure(). See also comment in __soft_offline_page().
1582 */
1583 lock_page(hpage);
0ebff32c 1584 if (PageHWPoison(hpage)) {
af8fae7c
NH
1585 unlock_page(hpage);
1586 put_page(hpage);
0ebff32c 1587 pr_info("soft offline: %#lx hugepage already poisoned\n", pfn);
af8fae7c 1588 return -EBUSY;
0ebff32c 1589 }
af8fae7c 1590 unlock_page(hpage);
d950b958 1591
bcc54222
NH
1592 ret = isolate_huge_page(hpage, &pagelist);
1593 if (ret) {
1594 /*
1595 * get_any_page() and isolate_huge_page() takes a refcount each,
1596 * so need to drop one here.
1597 */
1598 put_page(hpage);
1599 } else {
1600 pr_info("soft offline: %#lx hugepage failed to isolate\n", pfn);
1601 return -EBUSY;
1602 }
1603
68711a74 1604 ret = migrate_pages(&pagelist, new_page, NULL, MPOL_MF_MOVE_ALL,
b8ec1cee 1605 MIGRATE_SYNC, MR_MEMORY_FAILURE);
d950b958 1606 if (ret) {
dd73e85f
DN
1607 pr_info("soft offline: %#lx: migration failed %d, type %lx\n",
1608 pfn, ret, page->flags);
b8ec1cee
NH
1609 /*
1610 * We know that soft_offline_huge_page() tries to migrate
1611 * only one hugepage pointed to by hpage, so we need not
1612 * run through the pagelist here.
1613 */
1614 putback_active_hugepage(hpage);
1615 if (ret > 0)
1616 ret = -EIO;
af8fae7c 1617 } else {
a49ecbcd
JW
1618 /* overcommit hugetlb page will be freed to buddy */
1619 if (PageHuge(page)) {
1620 set_page_hwpoison_huge_page(hpage);
1621 dequeue_hwpoisoned_huge_page(hpage);
1622 atomic_long_add(1 << compound_order(hpage),
1623 &num_poisoned_pages);
1624 } else {
1625 SetPageHWPoison(page);
1626 atomic_long_inc(&num_poisoned_pages);
1627 }
d950b958 1628 }
d950b958
NH
1629 return ret;
1630}
1631
af8fae7c
NH
1632static int __soft_offline_page(struct page *page, int flags)
1633{
1634 int ret;
1635 unsigned long pfn = page_to_pfn(page);
facb6011 1636
facb6011 1637 /*
af8fae7c
NH
1638 * Check PageHWPoison again inside page lock because PageHWPoison
1639 * is set by memory_failure() outside page lock. Note that
1640 * memory_failure() also double-checks PageHWPoison inside page lock,
1641 * so there's no race between soft_offline_page() and memory_failure().
facb6011 1642 */
0ebff32c
XQ
1643 lock_page(page);
1644 wait_on_page_writeback(page);
af8fae7c
NH
1645 if (PageHWPoison(page)) {
1646 unlock_page(page);
1647 put_page(page);
1648 pr_info("soft offline: %#lx page already poisoned\n", pfn);
1649 return -EBUSY;
1650 }
facb6011
AK
1651 /*
1652 * Try to invalidate first. This should work for
1653 * non dirty unmapped page cache pages.
1654 */
1655 ret = invalidate_inode_page(page);
1656 unlock_page(page);
facb6011 1657 /*
facb6011
AK
1658 * RED-PEN would be better to keep it isolated here, but we
1659 * would need to fix isolation locking first.
1660 */
facb6011 1661 if (ret == 1) {
bd486285 1662 put_page(page);
fb46e735 1663 pr_info("soft_offline: %#lx: invalidated\n", pfn);
af8fae7c
NH
1664 SetPageHWPoison(page);
1665 atomic_long_inc(&num_poisoned_pages);
1666 return 0;
facb6011
AK
1667 }
1668
1669 /*
1670 * Simple invalidation didn't work.
1671 * Try to migrate to a new page instead. migrate.c
1672 * handles a large number of cases for us.
1673 */
1674 ret = isolate_lru_page(page);
bd486285
KK
1675 /*
1676 * Drop page reference which is came from get_any_page()
1677 * successful isolate_lru_page() already took another one.
1678 */
1679 put_page(page);
facb6011
AK
1680 if (!ret) {
1681 LIST_HEAD(pagelist);
5db8a73a 1682 inc_zone_page_state(page, NR_ISOLATED_ANON +
9c620e2b 1683 page_is_file_cache(page));
facb6011 1684 list_add(&page->lru, &pagelist);
68711a74 1685 ret = migrate_pages(&pagelist, new_page, NULL, MPOL_MF_MOVE_ALL,
9c620e2b 1686 MIGRATE_SYNC, MR_MEMORY_FAILURE);
facb6011 1687 if (ret) {
59c82b70
JK
1688 if (!list_empty(&pagelist)) {
1689 list_del(&page->lru);
1690 dec_zone_page_state(page, NR_ISOLATED_ANON +
1691 page_is_file_cache(page));
1692 putback_lru_page(page);
1693 }
1694
fb46e735 1695 pr_info("soft offline: %#lx: migration failed %d, type %lx\n",
facb6011
AK
1696 pfn, ret, page->flags);
1697 if (ret > 0)
1698 ret = -EIO;
af8fae7c
NH
1699 } else {
1700 SetPageHWPoison(page);
1701 atomic_long_inc(&num_poisoned_pages);
facb6011
AK
1702 }
1703 } else {
fb46e735 1704 pr_info("soft offline: %#lx: isolation failed: %d, page count %d, type %lx\n",
dd73e85f 1705 pfn, ret, page_count(page), page->flags);
facb6011 1706 }
facb6011
AK
1707 return ret;
1708}
86e05773
WL
1709
1710/**
1711 * soft_offline_page - Soft offline a page.
1712 * @page: page to offline
1713 * @flags: flags. Same as memory_failure().
1714 *
1715 * Returns 0 on success, otherwise negated errno.
1716 *
1717 * Soft offline a page, by migration or invalidation,
1718 * without killing anything. This is for the case when
1719 * a page is not corrupted yet (so it's still valid to access),
1720 * but has had a number of corrected errors and is better taken
1721 * out.
1722 *
1723 * The actual policy on when to do that is maintained by
1724 * user space.
1725 *
1726 * This should never impact any application or cause data loss,
1727 * however it might take some time.
1728 *
1729 * This is not a 100% solution for all memory, but tries to be
1730 * ``good enough'' for the majority of memory.
1731 */
1732int soft_offline_page(struct page *page, int flags)
1733{
1734 int ret;
1735 unsigned long pfn = page_to_pfn(page);
668f9abb 1736 struct page *hpage = compound_head(page);
86e05773
WL
1737
1738 if (PageHWPoison(page)) {
1739 pr_info("soft offline: %#lx page already poisoned\n", pfn);
1740 return -EBUSY;
1741 }
1742 if (!PageHuge(page) && PageTransHuge(hpage)) {
1743 if (PageAnon(hpage) && unlikely(split_huge_page(hpage))) {
1744 pr_info("soft offline: %#lx: failed to split THP\n",
1745 pfn);
1746 return -EBUSY;
1747 }
1748 }
1749
bfc8c901 1750 get_online_mems();
03b61ff3 1751
86e05773 1752 ret = get_any_page(page, pfn, flags);
bfc8c901 1753 put_online_mems();
03b61ff3 1754 if (ret > 0) { /* for in-use pages */
86e05773
WL
1755 if (PageHuge(page))
1756 ret = soft_offline_huge_page(page, flags);
1757 else
1758 ret = __soft_offline_page(page, flags);
03b61ff3 1759 } else if (ret == 0) { /* for free pages */
86e05773
WL
1760 if (PageHuge(page)) {
1761 set_page_hwpoison_huge_page(hpage);
602498f9
NH
1762 if (!dequeue_hwpoisoned_huge_page(hpage))
1763 atomic_long_add(1 << compound_order(hpage),
86e05773
WL
1764 &num_poisoned_pages);
1765 } else {
602498f9
NH
1766 if (!TestSetPageHWPoison(page))
1767 atomic_long_inc(&num_poisoned_pages);
86e05773
WL
1768 }
1769 }
86e05773
WL
1770 return ret;
1771}