xref: /openbmc/linux/mm/debug_vm_pgtable.c (revision 05289402d71736bd275902372e4b25664aeac6b8)
1399145f9SAnshuman Khandual // SPDX-License-Identifier: GPL-2.0-only
2399145f9SAnshuman Khandual /*
3399145f9SAnshuman Khandual  * This kernel test validates architecture page table helpers and
4399145f9SAnshuman Khandual  * accessors and helps in verifying their continued compliance with
5399145f9SAnshuman Khandual  * expected generic MM semantics.
6399145f9SAnshuman Khandual  *
7399145f9SAnshuman Khandual  * Copyright (C) 2019 ARM Ltd.
8399145f9SAnshuman Khandual  *
9399145f9SAnshuman Khandual  * Author: Anshuman Khandual <anshuman.khandual@arm.com>
10399145f9SAnshuman Khandual  */
11399145f9SAnshuman Khandual #define pr_fmt(fmt) "debug_vm_pgtable: %s: " fmt, __func__
12399145f9SAnshuman Khandual 
13399145f9SAnshuman Khandual #include <linux/gfp.h>
14399145f9SAnshuman Khandual #include <linux/highmem.h>
15399145f9SAnshuman Khandual #include <linux/hugetlb.h>
16399145f9SAnshuman Khandual #include <linux/kernel.h>
17399145f9SAnshuman Khandual #include <linux/kconfig.h>
18399145f9SAnshuman Khandual #include <linux/mm.h>
19399145f9SAnshuman Khandual #include <linux/mman.h>
20399145f9SAnshuman Khandual #include <linux/mm_types.h>
21399145f9SAnshuman Khandual #include <linux/module.h>
22399145f9SAnshuman Khandual #include <linux/pfn_t.h>
23399145f9SAnshuman Khandual #include <linux/printk.h>
24399145f9SAnshuman Khandual #include <linux/random.h>
25399145f9SAnshuman Khandual #include <linux/spinlock.h>
26399145f9SAnshuman Khandual #include <linux/swap.h>
27399145f9SAnshuman Khandual #include <linux/swapops.h>
28399145f9SAnshuman Khandual #include <linux/start_kernel.h>
29399145f9SAnshuman Khandual #include <linux/sched/mm.h>
30399145f9SAnshuman Khandual #include <asm/pgalloc.h>
31399145f9SAnshuman Khandual 
32399145f9SAnshuman Khandual #define VMFLAGS	(VM_READ|VM_WRITE|VM_EXEC)
33399145f9SAnshuman Khandual 
34399145f9SAnshuman Khandual /*
35399145f9SAnshuman Khandual  * On s390 platform, the lower 4 bits are used to identify given page table
36399145f9SAnshuman Khandual  * entry type. But these bits might affect the ability to clear entries with
37399145f9SAnshuman Khandual  * pxx_clear() because of how dynamic page table folding works on s390. So
38399145f9SAnshuman Khandual  * while loading up the entries do not change the lower 4 bits. It does not
39399145f9SAnshuman Khandual  * have affect any other platform.
40399145f9SAnshuman Khandual  */
41399145f9SAnshuman Khandual #define S390_MASK_BITS	4
42399145f9SAnshuman Khandual #define RANDOM_ORVALUE	GENMASK(BITS_PER_LONG - 1, S390_MASK_BITS)
43399145f9SAnshuman Khandual #define RANDOM_NZVALUE	GENMASK(7, 0)
44399145f9SAnshuman Khandual 
45399145f9SAnshuman Khandual static void __init pte_basic_tests(unsigned long pfn, pgprot_t prot)
46399145f9SAnshuman Khandual {
47399145f9SAnshuman Khandual 	pte_t pte = pfn_pte(pfn, prot);
48399145f9SAnshuman Khandual 
49399145f9SAnshuman Khandual 	WARN_ON(!pte_same(pte, pte));
50399145f9SAnshuman Khandual 	WARN_ON(!pte_young(pte_mkyoung(pte_mkold(pte))));
51399145f9SAnshuman Khandual 	WARN_ON(!pte_dirty(pte_mkdirty(pte_mkclean(pte))));
52399145f9SAnshuman Khandual 	WARN_ON(!pte_write(pte_mkwrite(pte_wrprotect(pte))));
53399145f9SAnshuman Khandual 	WARN_ON(pte_young(pte_mkold(pte_mkyoung(pte))));
54399145f9SAnshuman Khandual 	WARN_ON(pte_dirty(pte_mkclean(pte_mkdirty(pte))));
55399145f9SAnshuman Khandual 	WARN_ON(pte_write(pte_wrprotect(pte_mkwrite(pte))));
56399145f9SAnshuman Khandual }
57399145f9SAnshuman Khandual 
58399145f9SAnshuman Khandual #ifdef CONFIG_TRANSPARENT_HUGEPAGE
59399145f9SAnshuman Khandual static void __init pmd_basic_tests(unsigned long pfn, pgprot_t prot)
60399145f9SAnshuman Khandual {
61399145f9SAnshuman Khandual 	pmd_t pmd = pfn_pmd(pfn, prot);
62399145f9SAnshuman Khandual 
63787d563bSAneesh Kumar K.V 	if (!has_transparent_hugepage())
64787d563bSAneesh Kumar K.V 		return;
65787d563bSAneesh Kumar K.V 
66399145f9SAnshuman Khandual 	WARN_ON(!pmd_same(pmd, pmd));
67399145f9SAnshuman Khandual 	WARN_ON(!pmd_young(pmd_mkyoung(pmd_mkold(pmd))));
68399145f9SAnshuman Khandual 	WARN_ON(!pmd_dirty(pmd_mkdirty(pmd_mkclean(pmd))));
69399145f9SAnshuman Khandual 	WARN_ON(!pmd_write(pmd_mkwrite(pmd_wrprotect(pmd))));
70399145f9SAnshuman Khandual 	WARN_ON(pmd_young(pmd_mkold(pmd_mkyoung(pmd))));
71399145f9SAnshuman Khandual 	WARN_ON(pmd_dirty(pmd_mkclean(pmd_mkdirty(pmd))));
72399145f9SAnshuman Khandual 	WARN_ON(pmd_write(pmd_wrprotect(pmd_mkwrite(pmd))));
73399145f9SAnshuman Khandual 	/*
74399145f9SAnshuman Khandual 	 * A huge page does not point to next level page table
75399145f9SAnshuman Khandual 	 * entry. Hence this must qualify as pmd_bad().
76399145f9SAnshuman Khandual 	 */
77399145f9SAnshuman Khandual 	WARN_ON(!pmd_bad(pmd_mkhuge(pmd)));
78399145f9SAnshuman Khandual }
79399145f9SAnshuman Khandual 
80399145f9SAnshuman Khandual #ifdef CONFIG_HAVE_ARCH_TRANSPARENT_HUGEPAGE_PUD
81399145f9SAnshuman Khandual static void __init pud_basic_tests(unsigned long pfn, pgprot_t prot)
82399145f9SAnshuman Khandual {
83399145f9SAnshuman Khandual 	pud_t pud = pfn_pud(pfn, prot);
84399145f9SAnshuman Khandual 
85787d563bSAneesh Kumar K.V 	if (!has_transparent_hugepage())
86787d563bSAneesh Kumar K.V 		return;
87787d563bSAneesh Kumar K.V 
88399145f9SAnshuman Khandual 	WARN_ON(!pud_same(pud, pud));
89399145f9SAnshuman Khandual 	WARN_ON(!pud_young(pud_mkyoung(pud_mkold(pud))));
90399145f9SAnshuman Khandual 	WARN_ON(!pud_write(pud_mkwrite(pud_wrprotect(pud))));
91399145f9SAnshuman Khandual 	WARN_ON(pud_write(pud_wrprotect(pud_mkwrite(pud))));
92399145f9SAnshuman Khandual 	WARN_ON(pud_young(pud_mkold(pud_mkyoung(pud))));
93399145f9SAnshuman Khandual 
94399145f9SAnshuman Khandual 	if (mm_pmd_folded(mm))
95399145f9SAnshuman Khandual 		return;
96399145f9SAnshuman Khandual 
97399145f9SAnshuman Khandual 	/*
98399145f9SAnshuman Khandual 	 * A huge page does not point to next level page table
99399145f9SAnshuman Khandual 	 * entry. Hence this must qualify as pud_bad().
100399145f9SAnshuman Khandual 	 */
101399145f9SAnshuman Khandual 	WARN_ON(!pud_bad(pud_mkhuge(pud)));
102399145f9SAnshuman Khandual }
103399145f9SAnshuman Khandual #else  /* !CONFIG_HAVE_ARCH_TRANSPARENT_HUGEPAGE_PUD */
104399145f9SAnshuman Khandual static void __init pud_basic_tests(unsigned long pfn, pgprot_t prot) { }
105399145f9SAnshuman Khandual #endif /* CONFIG_HAVE_ARCH_TRANSPARENT_HUGEPAGE_PUD */
106399145f9SAnshuman Khandual #else  /* !CONFIG_TRANSPARENT_HUGEPAGE */
107399145f9SAnshuman Khandual static void __init pmd_basic_tests(unsigned long pfn, pgprot_t prot) { }
108399145f9SAnshuman Khandual static void __init pud_basic_tests(unsigned long pfn, pgprot_t prot) { }
109399145f9SAnshuman Khandual #endif /* CONFIG_TRANSPARENT_HUGEPAGE */
110399145f9SAnshuman Khandual 
111399145f9SAnshuman Khandual static void __init p4d_basic_tests(unsigned long pfn, pgprot_t prot)
112399145f9SAnshuman Khandual {
113399145f9SAnshuman Khandual 	p4d_t p4d;
114399145f9SAnshuman Khandual 
115399145f9SAnshuman Khandual 	memset(&p4d, RANDOM_NZVALUE, sizeof(p4d_t));
116399145f9SAnshuman Khandual 	WARN_ON(!p4d_same(p4d, p4d));
117399145f9SAnshuman Khandual }
118399145f9SAnshuman Khandual 
119399145f9SAnshuman Khandual static void __init pgd_basic_tests(unsigned long pfn, pgprot_t prot)
120399145f9SAnshuman Khandual {
121399145f9SAnshuman Khandual 	pgd_t pgd;
122399145f9SAnshuman Khandual 
123399145f9SAnshuman Khandual 	memset(&pgd, RANDOM_NZVALUE, sizeof(pgd_t));
124399145f9SAnshuman Khandual 	WARN_ON(!pgd_same(pgd, pgd));
125399145f9SAnshuman Khandual }
126399145f9SAnshuman Khandual 
127399145f9SAnshuman Khandual #ifndef __PAGETABLE_PUD_FOLDED
128399145f9SAnshuman Khandual static void __init pud_clear_tests(struct mm_struct *mm, pud_t *pudp)
129399145f9SAnshuman Khandual {
130399145f9SAnshuman Khandual 	pud_t pud = READ_ONCE(*pudp);
131399145f9SAnshuman Khandual 
132399145f9SAnshuman Khandual 	if (mm_pmd_folded(mm))
133399145f9SAnshuman Khandual 		return;
134399145f9SAnshuman Khandual 
135399145f9SAnshuman Khandual 	pud = __pud(pud_val(pud) | RANDOM_ORVALUE);
136399145f9SAnshuman Khandual 	WRITE_ONCE(*pudp, pud);
137399145f9SAnshuman Khandual 	pud_clear(pudp);
138399145f9SAnshuman Khandual 	pud = READ_ONCE(*pudp);
139399145f9SAnshuman Khandual 	WARN_ON(!pud_none(pud));
140399145f9SAnshuman Khandual }
141399145f9SAnshuman Khandual 
142399145f9SAnshuman Khandual static void __init pud_populate_tests(struct mm_struct *mm, pud_t *pudp,
143399145f9SAnshuman Khandual 				      pmd_t *pmdp)
144399145f9SAnshuman Khandual {
145399145f9SAnshuman Khandual 	pud_t pud;
146399145f9SAnshuman Khandual 
147399145f9SAnshuman Khandual 	if (mm_pmd_folded(mm))
148399145f9SAnshuman Khandual 		return;
149399145f9SAnshuman Khandual 	/*
150399145f9SAnshuman Khandual 	 * This entry points to next level page table page.
151399145f9SAnshuman Khandual 	 * Hence this must not qualify as pud_bad().
152399145f9SAnshuman Khandual 	 */
153399145f9SAnshuman Khandual 	pmd_clear(pmdp);
154399145f9SAnshuman Khandual 	pud_clear(pudp);
155399145f9SAnshuman Khandual 	pud_populate(mm, pudp, pmdp);
156399145f9SAnshuman Khandual 	pud = READ_ONCE(*pudp);
157399145f9SAnshuman Khandual 	WARN_ON(pud_bad(pud));
158399145f9SAnshuman Khandual }
159399145f9SAnshuman Khandual #else  /* !__PAGETABLE_PUD_FOLDED */
160399145f9SAnshuman Khandual static void __init pud_clear_tests(struct mm_struct *mm, pud_t *pudp) { }
161399145f9SAnshuman Khandual static void __init pud_populate_tests(struct mm_struct *mm, pud_t *pudp,
162399145f9SAnshuman Khandual 				      pmd_t *pmdp)
163399145f9SAnshuman Khandual {
164399145f9SAnshuman Khandual }
165399145f9SAnshuman Khandual #endif /* PAGETABLE_PUD_FOLDED */
166399145f9SAnshuman Khandual 
167399145f9SAnshuman Khandual #ifndef __PAGETABLE_P4D_FOLDED
168399145f9SAnshuman Khandual static void __init p4d_clear_tests(struct mm_struct *mm, p4d_t *p4dp)
169399145f9SAnshuman Khandual {
170399145f9SAnshuman Khandual 	p4d_t p4d = READ_ONCE(*p4dp);
171399145f9SAnshuman Khandual 
172399145f9SAnshuman Khandual 	if (mm_pud_folded(mm))
173399145f9SAnshuman Khandual 		return;
174399145f9SAnshuman Khandual 
175399145f9SAnshuman Khandual 	p4d = __p4d(p4d_val(p4d) | RANDOM_ORVALUE);
176399145f9SAnshuman Khandual 	WRITE_ONCE(*p4dp, p4d);
177399145f9SAnshuman Khandual 	p4d_clear(p4dp);
178399145f9SAnshuman Khandual 	p4d = READ_ONCE(*p4dp);
179399145f9SAnshuman Khandual 	WARN_ON(!p4d_none(p4d));
180399145f9SAnshuman Khandual }
181399145f9SAnshuman Khandual 
182399145f9SAnshuman Khandual static void __init p4d_populate_tests(struct mm_struct *mm, p4d_t *p4dp,
183399145f9SAnshuman Khandual 				      pud_t *pudp)
184399145f9SAnshuman Khandual {
185399145f9SAnshuman Khandual 	p4d_t p4d;
186399145f9SAnshuman Khandual 
187399145f9SAnshuman Khandual 	if (mm_pud_folded(mm))
188399145f9SAnshuman Khandual 		return;
189399145f9SAnshuman Khandual 
190399145f9SAnshuman Khandual 	/*
191399145f9SAnshuman Khandual 	 * This entry points to next level page table page.
192399145f9SAnshuman Khandual 	 * Hence this must not qualify as p4d_bad().
193399145f9SAnshuman Khandual 	 */
194399145f9SAnshuman Khandual 	pud_clear(pudp);
195399145f9SAnshuman Khandual 	p4d_clear(p4dp);
196399145f9SAnshuman Khandual 	p4d_populate(mm, p4dp, pudp);
197399145f9SAnshuman Khandual 	p4d = READ_ONCE(*p4dp);
198399145f9SAnshuman Khandual 	WARN_ON(p4d_bad(p4d));
199399145f9SAnshuman Khandual }
200399145f9SAnshuman Khandual 
201399145f9SAnshuman Khandual static void __init pgd_clear_tests(struct mm_struct *mm, pgd_t *pgdp)
202399145f9SAnshuman Khandual {
203399145f9SAnshuman Khandual 	pgd_t pgd = READ_ONCE(*pgdp);
204399145f9SAnshuman Khandual 
205399145f9SAnshuman Khandual 	if (mm_p4d_folded(mm))
206399145f9SAnshuman Khandual 		return;
207399145f9SAnshuman Khandual 
208399145f9SAnshuman Khandual 	pgd = __pgd(pgd_val(pgd) | RANDOM_ORVALUE);
209399145f9SAnshuman Khandual 	WRITE_ONCE(*pgdp, pgd);
210399145f9SAnshuman Khandual 	pgd_clear(pgdp);
211399145f9SAnshuman Khandual 	pgd = READ_ONCE(*pgdp);
212399145f9SAnshuman Khandual 	WARN_ON(!pgd_none(pgd));
213399145f9SAnshuman Khandual }
214399145f9SAnshuman Khandual 
215399145f9SAnshuman Khandual static void __init pgd_populate_tests(struct mm_struct *mm, pgd_t *pgdp,
216399145f9SAnshuman Khandual 				      p4d_t *p4dp)
217399145f9SAnshuman Khandual {
218399145f9SAnshuman Khandual 	pgd_t pgd;
219399145f9SAnshuman Khandual 
220399145f9SAnshuman Khandual 	if (mm_p4d_folded(mm))
221399145f9SAnshuman Khandual 		return;
222399145f9SAnshuman Khandual 
223399145f9SAnshuman Khandual 	/*
224399145f9SAnshuman Khandual 	 * This entry points to next level page table page.
225399145f9SAnshuman Khandual 	 * Hence this must not qualify as pgd_bad().
226399145f9SAnshuman Khandual 	 */
227399145f9SAnshuman Khandual 	p4d_clear(p4dp);
228399145f9SAnshuman Khandual 	pgd_clear(pgdp);
229399145f9SAnshuman Khandual 	pgd_populate(mm, pgdp, p4dp);
230399145f9SAnshuman Khandual 	pgd = READ_ONCE(*pgdp);
231399145f9SAnshuman Khandual 	WARN_ON(pgd_bad(pgd));
232399145f9SAnshuman Khandual }
233399145f9SAnshuman Khandual #else  /* !__PAGETABLE_P4D_FOLDED */
234399145f9SAnshuman Khandual static void __init p4d_clear_tests(struct mm_struct *mm, p4d_t *p4dp) { }
235399145f9SAnshuman Khandual static void __init pgd_clear_tests(struct mm_struct *mm, pgd_t *pgdp) { }
236399145f9SAnshuman Khandual static void __init p4d_populate_tests(struct mm_struct *mm, p4d_t *p4dp,
237399145f9SAnshuman Khandual 				      pud_t *pudp)
238399145f9SAnshuman Khandual {
239399145f9SAnshuman Khandual }
240399145f9SAnshuman Khandual static void __init pgd_populate_tests(struct mm_struct *mm, pgd_t *pgdp,
241399145f9SAnshuman Khandual 				      p4d_t *p4dp)
242399145f9SAnshuman Khandual {
243399145f9SAnshuman Khandual }
244399145f9SAnshuman Khandual #endif /* PAGETABLE_P4D_FOLDED */
245399145f9SAnshuman Khandual 
246399145f9SAnshuman Khandual static void __init pte_clear_tests(struct mm_struct *mm, pte_t *ptep,
247399145f9SAnshuman Khandual 				   unsigned long vaddr)
248399145f9SAnshuman Khandual {
2499449c9cbSChristophe Leroy 	pte_t pte = ptep_get(ptep);
250399145f9SAnshuman Khandual 
251399145f9SAnshuman Khandual 	pte = __pte(pte_val(pte) | RANDOM_ORVALUE);
252399145f9SAnshuman Khandual 	set_pte_at(mm, vaddr, ptep, pte);
253399145f9SAnshuman Khandual 	barrier();
254399145f9SAnshuman Khandual 	pte_clear(mm, vaddr, ptep);
2559449c9cbSChristophe Leroy 	pte = ptep_get(ptep);
256399145f9SAnshuman Khandual 	WARN_ON(!pte_none(pte));
257399145f9SAnshuman Khandual }
258399145f9SAnshuman Khandual 
259399145f9SAnshuman Khandual static void __init pmd_clear_tests(struct mm_struct *mm, pmd_t *pmdp)
260399145f9SAnshuman Khandual {
261399145f9SAnshuman Khandual 	pmd_t pmd = READ_ONCE(*pmdp);
262399145f9SAnshuman Khandual 
263399145f9SAnshuman Khandual 	pmd = __pmd(pmd_val(pmd) | RANDOM_ORVALUE);
264399145f9SAnshuman Khandual 	WRITE_ONCE(*pmdp, pmd);
265399145f9SAnshuman Khandual 	pmd_clear(pmdp);
266399145f9SAnshuman Khandual 	pmd = READ_ONCE(*pmdp);
267399145f9SAnshuman Khandual 	WARN_ON(!pmd_none(pmd));
268399145f9SAnshuman Khandual }
269399145f9SAnshuman Khandual 
270399145f9SAnshuman Khandual static void __init pmd_populate_tests(struct mm_struct *mm, pmd_t *pmdp,
271399145f9SAnshuman Khandual 				      pgtable_t pgtable)
272399145f9SAnshuman Khandual {
273399145f9SAnshuman Khandual 	pmd_t pmd;
274399145f9SAnshuman Khandual 
275399145f9SAnshuman Khandual 	/*
276399145f9SAnshuman Khandual 	 * This entry points to next level page table page.
277399145f9SAnshuman Khandual 	 * Hence this must not qualify as pmd_bad().
278399145f9SAnshuman Khandual 	 */
279399145f9SAnshuman Khandual 	pmd_clear(pmdp);
280399145f9SAnshuman Khandual 	pmd_populate(mm, pmdp, pgtable);
281399145f9SAnshuman Khandual 	pmd = READ_ONCE(*pmdp);
282399145f9SAnshuman Khandual 	WARN_ON(pmd_bad(pmd));
283399145f9SAnshuman Khandual }
284399145f9SAnshuman Khandual 
285*05289402SAnshuman Khandual static void __init pte_special_tests(unsigned long pfn, pgprot_t prot)
286*05289402SAnshuman Khandual {
287*05289402SAnshuman Khandual 	pte_t pte = pfn_pte(pfn, prot);
288*05289402SAnshuman Khandual 
289*05289402SAnshuman Khandual 	if (!IS_ENABLED(CONFIG_ARCH_HAS_PTE_SPECIAL))
290*05289402SAnshuman Khandual 		return;
291*05289402SAnshuman Khandual 
292*05289402SAnshuman Khandual 	WARN_ON(!pte_special(pte_mkspecial(pte)));
293*05289402SAnshuman Khandual }
294*05289402SAnshuman Khandual 
295*05289402SAnshuman Khandual static void __init pte_protnone_tests(unsigned long pfn, pgprot_t prot)
296*05289402SAnshuman Khandual {
297*05289402SAnshuman Khandual 	pte_t pte = pfn_pte(pfn, prot);
298*05289402SAnshuman Khandual 
299*05289402SAnshuman Khandual 	if (!IS_ENABLED(CONFIG_NUMA_BALANCING))
300*05289402SAnshuman Khandual 		return;
301*05289402SAnshuman Khandual 
302*05289402SAnshuman Khandual 	WARN_ON(!pte_protnone(pte));
303*05289402SAnshuman Khandual 	WARN_ON(!pte_present(pte));
304*05289402SAnshuman Khandual }
305*05289402SAnshuman Khandual 
306*05289402SAnshuman Khandual #ifdef CONFIG_TRANSPARENT_HUGEPAGE
307*05289402SAnshuman Khandual static void __init pmd_protnone_tests(unsigned long pfn, pgprot_t prot)
308*05289402SAnshuman Khandual {
309*05289402SAnshuman Khandual 	pmd_t pmd = pmd_mkhuge(pfn_pmd(pfn, prot));
310*05289402SAnshuman Khandual 
311*05289402SAnshuman Khandual 	if (!IS_ENABLED(CONFIG_NUMA_BALANCING))
312*05289402SAnshuman Khandual 		return;
313*05289402SAnshuman Khandual 
314*05289402SAnshuman Khandual 	WARN_ON(!pmd_protnone(pmd));
315*05289402SAnshuman Khandual 	WARN_ON(!pmd_present(pmd));
316*05289402SAnshuman Khandual }
317*05289402SAnshuman Khandual #else  /* !CONFIG_TRANSPARENT_HUGEPAGE */
318*05289402SAnshuman Khandual static void __init pmd_protnone_tests(unsigned long pfn, pgprot_t prot) { }
319*05289402SAnshuman Khandual #endif /* CONFIG_TRANSPARENT_HUGEPAGE */
320*05289402SAnshuman Khandual 
321*05289402SAnshuman Khandual #ifdef CONFIG_ARCH_HAS_PTE_DEVMAP
322*05289402SAnshuman Khandual static void __init pte_devmap_tests(unsigned long pfn, pgprot_t prot)
323*05289402SAnshuman Khandual {
324*05289402SAnshuman Khandual 	pte_t pte = pfn_pte(pfn, prot);
325*05289402SAnshuman Khandual 
326*05289402SAnshuman Khandual 	WARN_ON(!pte_devmap(pte_mkdevmap(pte)));
327*05289402SAnshuman Khandual }
328*05289402SAnshuman Khandual 
329*05289402SAnshuman Khandual #ifdef CONFIG_TRANSPARENT_HUGEPAGE
330*05289402SAnshuman Khandual static void __init pmd_devmap_tests(unsigned long pfn, pgprot_t prot)
331*05289402SAnshuman Khandual {
332*05289402SAnshuman Khandual 	pmd_t pmd = pfn_pmd(pfn, prot);
333*05289402SAnshuman Khandual 
334*05289402SAnshuman Khandual 	WARN_ON(!pmd_devmap(pmd_mkdevmap(pmd)));
335*05289402SAnshuman Khandual }
336*05289402SAnshuman Khandual 
337*05289402SAnshuman Khandual #ifdef CONFIG_HAVE_ARCH_TRANSPARENT_HUGEPAGE_PUD
338*05289402SAnshuman Khandual static void __init pud_devmap_tests(unsigned long pfn, pgprot_t prot)
339*05289402SAnshuman Khandual {
340*05289402SAnshuman Khandual 	pud_t pud = pfn_pud(pfn, prot);
341*05289402SAnshuman Khandual 
342*05289402SAnshuman Khandual 	WARN_ON(!pud_devmap(pud_mkdevmap(pud)));
343*05289402SAnshuman Khandual }
344*05289402SAnshuman Khandual #else  /* !CONFIG_HAVE_ARCH_TRANSPARENT_HUGEPAGE_PUD */
345*05289402SAnshuman Khandual static void __init pud_devmap_tests(unsigned long pfn, pgprot_t prot) { }
346*05289402SAnshuman Khandual #endif /* CONFIG_HAVE_ARCH_TRANSPARENT_HUGEPAGE_PUD */
347*05289402SAnshuman Khandual #else  /* CONFIG_TRANSPARENT_HUGEPAGE */
348*05289402SAnshuman Khandual static void __init pmd_devmap_tests(unsigned long pfn, pgprot_t prot) { }
349*05289402SAnshuman Khandual static void __init pud_devmap_tests(unsigned long pfn, pgprot_t prot) { }
350*05289402SAnshuman Khandual #endif /* CONFIG_TRANSPARENT_HUGEPAGE */
351*05289402SAnshuman Khandual #else
352*05289402SAnshuman Khandual static void __init pte_devmap_tests(unsigned long pfn, pgprot_t prot) { }
353*05289402SAnshuman Khandual static void __init pmd_devmap_tests(unsigned long pfn, pgprot_t prot) { }
354*05289402SAnshuman Khandual static void __init pud_devmap_tests(unsigned long pfn, pgprot_t prot) { }
355*05289402SAnshuman Khandual #endif /* CONFIG_ARCH_HAS_PTE_DEVMAP */
356*05289402SAnshuman Khandual 
357*05289402SAnshuman Khandual static void __init pte_soft_dirty_tests(unsigned long pfn, pgprot_t prot)
358*05289402SAnshuman Khandual {
359*05289402SAnshuman Khandual 	pte_t pte = pfn_pte(pfn, prot);
360*05289402SAnshuman Khandual 
361*05289402SAnshuman Khandual 	if (!IS_ENABLED(CONFIG_MEM_SOFT_DIRTY))
362*05289402SAnshuman Khandual 		return;
363*05289402SAnshuman Khandual 
364*05289402SAnshuman Khandual 	WARN_ON(!pte_soft_dirty(pte_mksoft_dirty(pte)));
365*05289402SAnshuman Khandual 	WARN_ON(pte_soft_dirty(pte_clear_soft_dirty(pte)));
366*05289402SAnshuman Khandual }
367*05289402SAnshuman Khandual 
368*05289402SAnshuman Khandual static void __init pte_swap_soft_dirty_tests(unsigned long pfn, pgprot_t prot)
369*05289402SAnshuman Khandual {
370*05289402SAnshuman Khandual 	pte_t pte = pfn_pte(pfn, prot);
371*05289402SAnshuman Khandual 
372*05289402SAnshuman Khandual 	if (!IS_ENABLED(CONFIG_MEM_SOFT_DIRTY))
373*05289402SAnshuman Khandual 		return;
374*05289402SAnshuman Khandual 
375*05289402SAnshuman Khandual 	WARN_ON(!pte_swp_soft_dirty(pte_swp_mksoft_dirty(pte)));
376*05289402SAnshuman Khandual 	WARN_ON(pte_swp_soft_dirty(pte_swp_clear_soft_dirty(pte)));
377*05289402SAnshuman Khandual }
378*05289402SAnshuman Khandual 
379*05289402SAnshuman Khandual #ifdef CONFIG_TRANSPARENT_HUGEPAGE
380*05289402SAnshuman Khandual static void __init pmd_soft_dirty_tests(unsigned long pfn, pgprot_t prot)
381*05289402SAnshuman Khandual {
382*05289402SAnshuman Khandual 	pmd_t pmd = pfn_pmd(pfn, prot);
383*05289402SAnshuman Khandual 
384*05289402SAnshuman Khandual 	if (!IS_ENABLED(CONFIG_MEM_SOFT_DIRTY))
385*05289402SAnshuman Khandual 		return;
386*05289402SAnshuman Khandual 
387*05289402SAnshuman Khandual 	WARN_ON(!pmd_soft_dirty(pmd_mksoft_dirty(pmd)));
388*05289402SAnshuman Khandual 	WARN_ON(pmd_soft_dirty(pmd_clear_soft_dirty(pmd)));
389*05289402SAnshuman Khandual }
390*05289402SAnshuman Khandual 
391*05289402SAnshuman Khandual static void __init pmd_swap_soft_dirty_tests(unsigned long pfn, pgprot_t prot)
392*05289402SAnshuman Khandual {
393*05289402SAnshuman Khandual 	pmd_t pmd = pfn_pmd(pfn, prot);
394*05289402SAnshuman Khandual 
395*05289402SAnshuman Khandual 	if (!IS_ENABLED(CONFIG_MEM_SOFT_DIRTY) ||
396*05289402SAnshuman Khandual 		!IS_ENABLED(CONFIG_ARCH_ENABLE_THP_MIGRATION))
397*05289402SAnshuman Khandual 		return;
398*05289402SAnshuman Khandual 
399*05289402SAnshuman Khandual 	WARN_ON(!pmd_swp_soft_dirty(pmd_swp_mksoft_dirty(pmd)));
400*05289402SAnshuman Khandual 	WARN_ON(pmd_swp_soft_dirty(pmd_swp_clear_soft_dirty(pmd)));
401*05289402SAnshuman Khandual }
402*05289402SAnshuman Khandual #else  /* !CONFIG_ARCH_HAS_PTE_DEVMAP */
403*05289402SAnshuman Khandual static void __init pmd_soft_dirty_tests(unsigned long pfn, pgprot_t prot) { }
404*05289402SAnshuman Khandual static void __init pmd_swap_soft_dirty_tests(unsigned long pfn, pgprot_t prot)
405*05289402SAnshuman Khandual {
406*05289402SAnshuman Khandual }
407*05289402SAnshuman Khandual #endif /* CONFIG_ARCH_HAS_PTE_DEVMAP */
408*05289402SAnshuman Khandual 
409*05289402SAnshuman Khandual static void __init pte_swap_tests(unsigned long pfn, pgprot_t prot)
410*05289402SAnshuman Khandual {
411*05289402SAnshuman Khandual 	swp_entry_t swp;
412*05289402SAnshuman Khandual 	pte_t pte;
413*05289402SAnshuman Khandual 
414*05289402SAnshuman Khandual 	pte = pfn_pte(pfn, prot);
415*05289402SAnshuman Khandual 	swp = __pte_to_swp_entry(pte);
416*05289402SAnshuman Khandual 	pte = __swp_entry_to_pte(swp);
417*05289402SAnshuman Khandual 	WARN_ON(pfn != pte_pfn(pte));
418*05289402SAnshuman Khandual }
419*05289402SAnshuman Khandual 
420*05289402SAnshuman Khandual #ifdef CONFIG_ARCH_ENABLE_THP_MIGRATION
421*05289402SAnshuman Khandual static void __init pmd_swap_tests(unsigned long pfn, pgprot_t prot)
422*05289402SAnshuman Khandual {
423*05289402SAnshuman Khandual 	swp_entry_t swp;
424*05289402SAnshuman Khandual 	pmd_t pmd;
425*05289402SAnshuman Khandual 
426*05289402SAnshuman Khandual 	pmd = pfn_pmd(pfn, prot);
427*05289402SAnshuman Khandual 	swp = __pmd_to_swp_entry(pmd);
428*05289402SAnshuman Khandual 	pmd = __swp_entry_to_pmd(swp);
429*05289402SAnshuman Khandual 	WARN_ON(pfn != pmd_pfn(pmd));
430*05289402SAnshuman Khandual }
431*05289402SAnshuman Khandual #else  /* !CONFIG_ARCH_ENABLE_THP_MIGRATION */
432*05289402SAnshuman Khandual static void __init pmd_swap_tests(unsigned long pfn, pgprot_t prot) { }
433*05289402SAnshuman Khandual #endif /* CONFIG_ARCH_ENABLE_THP_MIGRATION */
434*05289402SAnshuman Khandual 
435*05289402SAnshuman Khandual static void __init swap_migration_tests(void)
436*05289402SAnshuman Khandual {
437*05289402SAnshuman Khandual 	struct page *page;
438*05289402SAnshuman Khandual 	swp_entry_t swp;
439*05289402SAnshuman Khandual 
440*05289402SAnshuman Khandual 	if (!IS_ENABLED(CONFIG_MIGRATION))
441*05289402SAnshuman Khandual 		return;
442*05289402SAnshuman Khandual 	/*
443*05289402SAnshuman Khandual 	 * swap_migration_tests() requires a dedicated page as it needs to
444*05289402SAnshuman Khandual 	 * be locked before creating a migration entry from it. Locking the
445*05289402SAnshuman Khandual 	 * page that actually maps kernel text ('start_kernel') can be real
446*05289402SAnshuman Khandual 	 * problematic. Lets allocate a dedicated page explicitly for this
447*05289402SAnshuman Khandual 	 * purpose that will be freed subsequently.
448*05289402SAnshuman Khandual 	 */
449*05289402SAnshuman Khandual 	page = alloc_page(GFP_KERNEL);
450*05289402SAnshuman Khandual 	if (!page) {
451*05289402SAnshuman Khandual 		pr_err("page allocation failed\n");
452*05289402SAnshuman Khandual 		return;
453*05289402SAnshuman Khandual 	}
454*05289402SAnshuman Khandual 
455*05289402SAnshuman Khandual 	/*
456*05289402SAnshuman Khandual 	 * make_migration_entry() expects given page to be
457*05289402SAnshuman Khandual 	 * locked, otherwise it stumbles upon a BUG_ON().
458*05289402SAnshuman Khandual 	 */
459*05289402SAnshuman Khandual 	__SetPageLocked(page);
460*05289402SAnshuman Khandual 	swp = make_migration_entry(page, 1);
461*05289402SAnshuman Khandual 	WARN_ON(!is_migration_entry(swp));
462*05289402SAnshuman Khandual 	WARN_ON(!is_write_migration_entry(swp));
463*05289402SAnshuman Khandual 
464*05289402SAnshuman Khandual 	make_migration_entry_read(&swp);
465*05289402SAnshuman Khandual 	WARN_ON(!is_migration_entry(swp));
466*05289402SAnshuman Khandual 	WARN_ON(is_write_migration_entry(swp));
467*05289402SAnshuman Khandual 
468*05289402SAnshuman Khandual 	swp = make_migration_entry(page, 0);
469*05289402SAnshuman Khandual 	WARN_ON(!is_migration_entry(swp));
470*05289402SAnshuman Khandual 	WARN_ON(is_write_migration_entry(swp));
471*05289402SAnshuman Khandual 	__ClearPageLocked(page);
472*05289402SAnshuman Khandual 	__free_page(page);
473*05289402SAnshuman Khandual }
474*05289402SAnshuman Khandual 
475*05289402SAnshuman Khandual #ifdef CONFIG_HUGETLB_PAGE
476*05289402SAnshuman Khandual static void __init hugetlb_basic_tests(unsigned long pfn, pgprot_t prot)
477*05289402SAnshuman Khandual {
478*05289402SAnshuman Khandual 	struct page *page;
479*05289402SAnshuman Khandual 	pte_t pte;
480*05289402SAnshuman Khandual 
481*05289402SAnshuman Khandual 	/*
482*05289402SAnshuman Khandual 	 * Accessing the page associated with the pfn is safe here,
483*05289402SAnshuman Khandual 	 * as it was previously derived from a real kernel symbol.
484*05289402SAnshuman Khandual 	 */
485*05289402SAnshuman Khandual 	page = pfn_to_page(pfn);
486*05289402SAnshuman Khandual 	pte = mk_huge_pte(page, prot);
487*05289402SAnshuman Khandual 
488*05289402SAnshuman Khandual 	WARN_ON(!huge_pte_dirty(huge_pte_mkdirty(pte)));
489*05289402SAnshuman Khandual 	WARN_ON(!huge_pte_write(huge_pte_mkwrite(huge_pte_wrprotect(pte))));
490*05289402SAnshuman Khandual 	WARN_ON(huge_pte_write(huge_pte_wrprotect(huge_pte_mkwrite(pte))));
491*05289402SAnshuman Khandual 
492*05289402SAnshuman Khandual #ifdef CONFIG_ARCH_WANT_GENERAL_HUGETLB
493*05289402SAnshuman Khandual 	pte = pfn_pte(pfn, prot);
494*05289402SAnshuman Khandual 
495*05289402SAnshuman Khandual 	WARN_ON(!pte_huge(pte_mkhuge(pte)));
496*05289402SAnshuman Khandual #endif /* CONFIG_ARCH_WANT_GENERAL_HUGETLB */
497*05289402SAnshuman Khandual }
498*05289402SAnshuman Khandual #else  /* !CONFIG_HUGETLB_PAGE */
499*05289402SAnshuman Khandual static void __init hugetlb_basic_tests(unsigned long pfn, pgprot_t prot) { }
500*05289402SAnshuman Khandual #endif /* CONFIG_HUGETLB_PAGE */
501*05289402SAnshuman Khandual 
502*05289402SAnshuman Khandual #ifdef CONFIG_TRANSPARENT_HUGEPAGE
503*05289402SAnshuman Khandual static void __init pmd_thp_tests(unsigned long pfn, pgprot_t prot)
504*05289402SAnshuman Khandual {
505*05289402SAnshuman Khandual 	pmd_t pmd;
506*05289402SAnshuman Khandual 
507*05289402SAnshuman Khandual 	if (!has_transparent_hugepage())
508*05289402SAnshuman Khandual 		return;
509*05289402SAnshuman Khandual 
510*05289402SAnshuman Khandual 	/*
511*05289402SAnshuman Khandual 	 * pmd_trans_huge() and pmd_present() must return positive after
512*05289402SAnshuman Khandual 	 * MMU invalidation with pmd_mkinvalid(). This behavior is an
513*05289402SAnshuman Khandual 	 * optimization for transparent huge page. pmd_trans_huge() must
514*05289402SAnshuman Khandual 	 * be true if pmd_page() returns a valid THP to avoid taking the
515*05289402SAnshuman Khandual 	 * pmd_lock when others walk over non transhuge pmds (i.e. there
516*05289402SAnshuman Khandual 	 * are no THP allocated). Especially when splitting a THP and
517*05289402SAnshuman Khandual 	 * removing the present bit from the pmd, pmd_trans_huge() still
518*05289402SAnshuman Khandual 	 * needs to return true. pmd_present() should be true whenever
519*05289402SAnshuman Khandual 	 * pmd_trans_huge() returns true.
520*05289402SAnshuman Khandual 	 */
521*05289402SAnshuman Khandual 	pmd = pfn_pmd(pfn, prot);
522*05289402SAnshuman Khandual 	WARN_ON(!pmd_trans_huge(pmd_mkhuge(pmd)));
523*05289402SAnshuman Khandual 
524*05289402SAnshuman Khandual #ifndef __HAVE_ARCH_PMDP_INVALIDATE
525*05289402SAnshuman Khandual 	WARN_ON(!pmd_trans_huge(pmd_mkinvalid(pmd_mkhuge(pmd))));
526*05289402SAnshuman Khandual 	WARN_ON(!pmd_present(pmd_mkinvalid(pmd_mkhuge(pmd))));
527*05289402SAnshuman Khandual #endif /* __HAVE_ARCH_PMDP_INVALIDATE */
528*05289402SAnshuman Khandual }
529*05289402SAnshuman Khandual 
530*05289402SAnshuman Khandual #ifdef CONFIG_HAVE_ARCH_TRANSPARENT_HUGEPAGE_PUD
531*05289402SAnshuman Khandual static void __init pud_thp_tests(unsigned long pfn, pgprot_t prot)
532*05289402SAnshuman Khandual {
533*05289402SAnshuman Khandual 	pud_t pud;
534*05289402SAnshuman Khandual 
535*05289402SAnshuman Khandual 	if (!has_transparent_hugepage())
536*05289402SAnshuman Khandual 		return;
537*05289402SAnshuman Khandual 
538*05289402SAnshuman Khandual 	pud = pfn_pud(pfn, prot);
539*05289402SAnshuman Khandual 	WARN_ON(!pud_trans_huge(pud_mkhuge(pud)));
540*05289402SAnshuman Khandual 
541*05289402SAnshuman Khandual 	/*
542*05289402SAnshuman Khandual 	 * pud_mkinvalid() has been dropped for now. Enable back
543*05289402SAnshuman Khandual 	 * these tests when it comes back with a modified pud_present().
544*05289402SAnshuman Khandual 	 *
545*05289402SAnshuman Khandual 	 * WARN_ON(!pud_trans_huge(pud_mkinvalid(pud_mkhuge(pud))));
546*05289402SAnshuman Khandual 	 * WARN_ON(!pud_present(pud_mkinvalid(pud_mkhuge(pud))));
547*05289402SAnshuman Khandual 	 */
548*05289402SAnshuman Khandual }
549*05289402SAnshuman Khandual #else  /* !CONFIG_HAVE_ARCH_TRANSPARENT_HUGEPAGE_PUD */
550*05289402SAnshuman Khandual static void __init pud_thp_tests(unsigned long pfn, pgprot_t prot) { }
551*05289402SAnshuman Khandual #endif /* CONFIG_HAVE_ARCH_TRANSPARENT_HUGEPAGE_PUD */
552*05289402SAnshuman Khandual #else  /* !CONFIG_TRANSPARENT_HUGEPAGE */
553*05289402SAnshuman Khandual static void __init pmd_thp_tests(unsigned long pfn, pgprot_t prot) { }
554*05289402SAnshuman Khandual static void __init pud_thp_tests(unsigned long pfn, pgprot_t prot) { }
555*05289402SAnshuman Khandual #endif /* CONFIG_TRANSPARENT_HUGEPAGE */
556*05289402SAnshuman Khandual 
557399145f9SAnshuman Khandual static unsigned long __init get_random_vaddr(void)
558399145f9SAnshuman Khandual {
559399145f9SAnshuman Khandual 	unsigned long random_vaddr, random_pages, total_user_pages;
560399145f9SAnshuman Khandual 
561399145f9SAnshuman Khandual 	total_user_pages = (TASK_SIZE - FIRST_USER_ADDRESS) / PAGE_SIZE;
562399145f9SAnshuman Khandual 
563399145f9SAnshuman Khandual 	random_pages = get_random_long() % total_user_pages;
564399145f9SAnshuman Khandual 	random_vaddr = FIRST_USER_ADDRESS + random_pages * PAGE_SIZE;
565399145f9SAnshuman Khandual 
566399145f9SAnshuman Khandual 	return random_vaddr;
567399145f9SAnshuman Khandual }
568399145f9SAnshuman Khandual 
569399145f9SAnshuman Khandual static int __init debug_vm_pgtable(void)
570399145f9SAnshuman Khandual {
571399145f9SAnshuman Khandual 	struct mm_struct *mm;
572399145f9SAnshuman Khandual 	pgd_t *pgdp;
573399145f9SAnshuman Khandual 	p4d_t *p4dp, *saved_p4dp;
574399145f9SAnshuman Khandual 	pud_t *pudp, *saved_pudp;
575399145f9SAnshuman Khandual 	pmd_t *pmdp, *saved_pmdp, pmd;
576399145f9SAnshuman Khandual 	pte_t *ptep;
577399145f9SAnshuman Khandual 	pgtable_t saved_ptep;
578*05289402SAnshuman Khandual 	pgprot_t prot, protnone;
579399145f9SAnshuman Khandual 	phys_addr_t paddr;
580399145f9SAnshuman Khandual 	unsigned long vaddr, pte_aligned, pmd_aligned;
581399145f9SAnshuman Khandual 	unsigned long pud_aligned, p4d_aligned, pgd_aligned;
582fea1120cSKees Cook 	spinlock_t *ptl = NULL;
583399145f9SAnshuman Khandual 
584399145f9SAnshuman Khandual 	pr_info("Validating architecture page table helpers\n");
585399145f9SAnshuman Khandual 	prot = vm_get_page_prot(VMFLAGS);
586399145f9SAnshuman Khandual 	vaddr = get_random_vaddr();
587399145f9SAnshuman Khandual 	mm = mm_alloc();
588399145f9SAnshuman Khandual 	if (!mm) {
589399145f9SAnshuman Khandual 		pr_err("mm_struct allocation failed\n");
590399145f9SAnshuman Khandual 		return 1;
591399145f9SAnshuman Khandual 	}
592399145f9SAnshuman Khandual 
593399145f9SAnshuman Khandual 	/*
594*05289402SAnshuman Khandual 	 * __P000 (or even __S000) will help create page table entries with
595*05289402SAnshuman Khandual 	 * PROT_NONE permission as required for pxx_protnone_tests().
596*05289402SAnshuman Khandual 	 */
597*05289402SAnshuman Khandual 	protnone = __P000;
598*05289402SAnshuman Khandual 
599*05289402SAnshuman Khandual 	/*
600399145f9SAnshuman Khandual 	 * PFN for mapping at PTE level is determined from a standard kernel
601399145f9SAnshuman Khandual 	 * text symbol. But pfns for higher page table levels are derived by
602399145f9SAnshuman Khandual 	 * masking lower bits of this real pfn. These derived pfns might not
603399145f9SAnshuman Khandual 	 * exist on the platform but that does not really matter as pfn_pxx()
604399145f9SAnshuman Khandual 	 * helpers will still create appropriate entries for the test. This
605399145f9SAnshuman Khandual 	 * helps avoid large memory block allocations to be used for mapping
606399145f9SAnshuman Khandual 	 * at higher page table levels.
607399145f9SAnshuman Khandual 	 */
608399145f9SAnshuman Khandual 	paddr = __pa_symbol(&start_kernel);
609399145f9SAnshuman Khandual 
610399145f9SAnshuman Khandual 	pte_aligned = (paddr & PAGE_MASK) >> PAGE_SHIFT;
611399145f9SAnshuman Khandual 	pmd_aligned = (paddr & PMD_MASK) >> PAGE_SHIFT;
612399145f9SAnshuman Khandual 	pud_aligned = (paddr & PUD_MASK) >> PAGE_SHIFT;
613399145f9SAnshuman Khandual 	p4d_aligned = (paddr & P4D_MASK) >> PAGE_SHIFT;
614399145f9SAnshuman Khandual 	pgd_aligned = (paddr & PGDIR_MASK) >> PAGE_SHIFT;
615399145f9SAnshuman Khandual 	WARN_ON(!pfn_valid(pte_aligned));
616399145f9SAnshuman Khandual 
617399145f9SAnshuman Khandual 	pgdp = pgd_offset(mm, vaddr);
618399145f9SAnshuman Khandual 	p4dp = p4d_alloc(mm, pgdp, vaddr);
619399145f9SAnshuman Khandual 	pudp = pud_alloc(mm, p4dp, vaddr);
620399145f9SAnshuman Khandual 	pmdp = pmd_alloc(mm, pudp, vaddr);
621399145f9SAnshuman Khandual 	ptep = pte_alloc_map_lock(mm, pmdp, vaddr, &ptl);
622399145f9SAnshuman Khandual 
623399145f9SAnshuman Khandual 	/*
624399145f9SAnshuman Khandual 	 * Save all the page table page addresses as the page table
625399145f9SAnshuman Khandual 	 * entries will be used for testing with random or garbage
626399145f9SAnshuman Khandual 	 * values. These saved addresses will be used for freeing
627399145f9SAnshuman Khandual 	 * page table pages.
628399145f9SAnshuman Khandual 	 */
629399145f9SAnshuman Khandual 	pmd = READ_ONCE(*pmdp);
630399145f9SAnshuman Khandual 	saved_p4dp = p4d_offset(pgdp, 0UL);
631399145f9SAnshuman Khandual 	saved_pudp = pud_offset(p4dp, 0UL);
632399145f9SAnshuman Khandual 	saved_pmdp = pmd_offset(pudp, 0UL);
633399145f9SAnshuman Khandual 	saved_ptep = pmd_pgtable(pmd);
634399145f9SAnshuman Khandual 
635399145f9SAnshuman Khandual 	pte_basic_tests(pte_aligned, prot);
636399145f9SAnshuman Khandual 	pmd_basic_tests(pmd_aligned, prot);
637399145f9SAnshuman Khandual 	pud_basic_tests(pud_aligned, prot);
638399145f9SAnshuman Khandual 	p4d_basic_tests(p4d_aligned, prot);
639399145f9SAnshuman Khandual 	pgd_basic_tests(pgd_aligned, prot);
640399145f9SAnshuman Khandual 
641399145f9SAnshuman Khandual 	pte_clear_tests(mm, ptep, vaddr);
642399145f9SAnshuman Khandual 	pmd_clear_tests(mm, pmdp);
643399145f9SAnshuman Khandual 	pud_clear_tests(mm, pudp);
644399145f9SAnshuman Khandual 	p4d_clear_tests(mm, p4dp);
645399145f9SAnshuman Khandual 	pgd_clear_tests(mm, pgdp);
646399145f9SAnshuman Khandual 
647399145f9SAnshuman Khandual 	pte_unmap_unlock(ptep, ptl);
648399145f9SAnshuman Khandual 
649399145f9SAnshuman Khandual 	pmd_populate_tests(mm, pmdp, saved_ptep);
650399145f9SAnshuman Khandual 	pud_populate_tests(mm, pudp, saved_pmdp);
651399145f9SAnshuman Khandual 	p4d_populate_tests(mm, p4dp, saved_pudp);
652399145f9SAnshuman Khandual 	pgd_populate_tests(mm, pgdp, saved_p4dp);
653399145f9SAnshuman Khandual 
654*05289402SAnshuman Khandual 	pte_special_tests(pte_aligned, prot);
655*05289402SAnshuman Khandual 	pte_protnone_tests(pte_aligned, protnone);
656*05289402SAnshuman Khandual 	pmd_protnone_tests(pmd_aligned, protnone);
657*05289402SAnshuman Khandual 
658*05289402SAnshuman Khandual 	pte_devmap_tests(pte_aligned, prot);
659*05289402SAnshuman Khandual 	pmd_devmap_tests(pmd_aligned, prot);
660*05289402SAnshuman Khandual 	pud_devmap_tests(pud_aligned, prot);
661*05289402SAnshuman Khandual 
662*05289402SAnshuman Khandual 	pte_soft_dirty_tests(pte_aligned, prot);
663*05289402SAnshuman Khandual 	pmd_soft_dirty_tests(pmd_aligned, prot);
664*05289402SAnshuman Khandual 	pte_swap_soft_dirty_tests(pte_aligned, prot);
665*05289402SAnshuman Khandual 	pmd_swap_soft_dirty_tests(pmd_aligned, prot);
666*05289402SAnshuman Khandual 
667*05289402SAnshuman Khandual 	pte_swap_tests(pte_aligned, prot);
668*05289402SAnshuman Khandual 	pmd_swap_tests(pmd_aligned, prot);
669*05289402SAnshuman Khandual 
670*05289402SAnshuman Khandual 	swap_migration_tests();
671*05289402SAnshuman Khandual 	hugetlb_basic_tests(pte_aligned, prot);
672*05289402SAnshuman Khandual 
673*05289402SAnshuman Khandual 	pmd_thp_tests(pmd_aligned, prot);
674*05289402SAnshuman Khandual 	pud_thp_tests(pud_aligned, prot);
675*05289402SAnshuman Khandual 
676399145f9SAnshuman Khandual 	p4d_free(mm, saved_p4dp);
677399145f9SAnshuman Khandual 	pud_free(mm, saved_pudp);
678399145f9SAnshuman Khandual 	pmd_free(mm, saved_pmdp);
679399145f9SAnshuman Khandual 	pte_free(mm, saved_ptep);
680399145f9SAnshuman Khandual 
681399145f9SAnshuman Khandual 	mm_dec_nr_puds(mm);
682399145f9SAnshuman Khandual 	mm_dec_nr_pmds(mm);
683399145f9SAnshuman Khandual 	mm_dec_nr_ptes(mm);
684399145f9SAnshuman Khandual 	mmdrop(mm);
685399145f9SAnshuman Khandual 	return 0;
686399145f9SAnshuman Khandual }
687399145f9SAnshuman Khandual late_initcall(debug_vm_pgtable);
688