1399145f9SAnshuman Khandual // SPDX-License-Identifier: GPL-2.0-only 2399145f9SAnshuman Khandual /* 3399145f9SAnshuman Khandual * This kernel test validates architecture page table helpers and 4399145f9SAnshuman Khandual * accessors and helps in verifying their continued compliance with 5399145f9SAnshuman Khandual * expected generic MM semantics. 6399145f9SAnshuman Khandual * 7399145f9SAnshuman Khandual * Copyright (C) 2019 ARM Ltd. 8399145f9SAnshuman Khandual * 9399145f9SAnshuman Khandual * Author: Anshuman Khandual <anshuman.khandual@arm.com> 10399145f9SAnshuman Khandual */ 11399145f9SAnshuman Khandual #define pr_fmt(fmt) "debug_vm_pgtable: %s: " fmt, __func__ 12399145f9SAnshuman Khandual 13399145f9SAnshuman Khandual #include <linux/gfp.h> 14399145f9SAnshuman Khandual #include <linux/highmem.h> 15399145f9SAnshuman Khandual #include <linux/hugetlb.h> 16399145f9SAnshuman Khandual #include <linux/kernel.h> 17399145f9SAnshuman Khandual #include <linux/kconfig.h> 18399145f9SAnshuman Khandual #include <linux/mm.h> 19399145f9SAnshuman Khandual #include <linux/mman.h> 20399145f9SAnshuman Khandual #include <linux/mm_types.h> 21399145f9SAnshuman Khandual #include <linux/module.h> 22399145f9SAnshuman Khandual #include <linux/pfn_t.h> 23399145f9SAnshuman Khandual #include <linux/printk.h> 24399145f9SAnshuman Khandual #include <linux/random.h> 25399145f9SAnshuman Khandual #include <linux/spinlock.h> 26399145f9SAnshuman Khandual #include <linux/swap.h> 27399145f9SAnshuman Khandual #include <linux/swapops.h> 28399145f9SAnshuman Khandual #include <linux/start_kernel.h> 29399145f9SAnshuman Khandual #include <linux/sched/mm.h> 30399145f9SAnshuman Khandual #include <asm/pgalloc.h> 31399145f9SAnshuman Khandual 32399145f9SAnshuman Khandual #define VMFLAGS (VM_READ|VM_WRITE|VM_EXEC) 33399145f9SAnshuman Khandual 34399145f9SAnshuman Khandual /* 35399145f9SAnshuman Khandual * On s390 platform, the lower 4 bits are used to identify given page table 36399145f9SAnshuman Khandual * entry type. But these bits might affect the ability to clear entries with 37399145f9SAnshuman Khandual * pxx_clear() because of how dynamic page table folding works on s390. So 38399145f9SAnshuman Khandual * while loading up the entries do not change the lower 4 bits. It does not 39399145f9SAnshuman Khandual * have affect any other platform. 40399145f9SAnshuman Khandual */ 41399145f9SAnshuman Khandual #define S390_MASK_BITS 4 42399145f9SAnshuman Khandual #define RANDOM_ORVALUE GENMASK(BITS_PER_LONG - 1, S390_MASK_BITS) 43399145f9SAnshuman Khandual #define RANDOM_NZVALUE GENMASK(7, 0) 44399145f9SAnshuman Khandual 45399145f9SAnshuman Khandual static void __init pte_basic_tests(unsigned long pfn, pgprot_t prot) 46399145f9SAnshuman Khandual { 47399145f9SAnshuman Khandual pte_t pte = pfn_pte(pfn, prot); 48399145f9SAnshuman Khandual 49399145f9SAnshuman Khandual WARN_ON(!pte_same(pte, pte)); 50399145f9SAnshuman Khandual WARN_ON(!pte_young(pte_mkyoung(pte_mkold(pte)))); 51399145f9SAnshuman Khandual WARN_ON(!pte_dirty(pte_mkdirty(pte_mkclean(pte)))); 52399145f9SAnshuman Khandual WARN_ON(!pte_write(pte_mkwrite(pte_wrprotect(pte)))); 53399145f9SAnshuman Khandual WARN_ON(pte_young(pte_mkold(pte_mkyoung(pte)))); 54399145f9SAnshuman Khandual WARN_ON(pte_dirty(pte_mkclean(pte_mkdirty(pte)))); 55399145f9SAnshuman Khandual WARN_ON(pte_write(pte_wrprotect(pte_mkwrite(pte)))); 56399145f9SAnshuman Khandual } 57399145f9SAnshuman Khandual 58399145f9SAnshuman Khandual #ifdef CONFIG_TRANSPARENT_HUGEPAGE 59399145f9SAnshuman Khandual static void __init pmd_basic_tests(unsigned long pfn, pgprot_t prot) 60399145f9SAnshuman Khandual { 61399145f9SAnshuman Khandual pmd_t pmd = pfn_pmd(pfn, prot); 62399145f9SAnshuman Khandual 63787d563bSAneesh Kumar K.V if (!has_transparent_hugepage()) 64787d563bSAneesh Kumar K.V return; 65787d563bSAneesh Kumar K.V 66399145f9SAnshuman Khandual WARN_ON(!pmd_same(pmd, pmd)); 67399145f9SAnshuman Khandual WARN_ON(!pmd_young(pmd_mkyoung(pmd_mkold(pmd)))); 68399145f9SAnshuman Khandual WARN_ON(!pmd_dirty(pmd_mkdirty(pmd_mkclean(pmd)))); 69399145f9SAnshuman Khandual WARN_ON(!pmd_write(pmd_mkwrite(pmd_wrprotect(pmd)))); 70399145f9SAnshuman Khandual WARN_ON(pmd_young(pmd_mkold(pmd_mkyoung(pmd)))); 71399145f9SAnshuman Khandual WARN_ON(pmd_dirty(pmd_mkclean(pmd_mkdirty(pmd)))); 72399145f9SAnshuman Khandual WARN_ON(pmd_write(pmd_wrprotect(pmd_mkwrite(pmd)))); 73399145f9SAnshuman Khandual /* 74399145f9SAnshuman Khandual * A huge page does not point to next level page table 75399145f9SAnshuman Khandual * entry. Hence this must qualify as pmd_bad(). 76399145f9SAnshuman Khandual */ 77399145f9SAnshuman Khandual WARN_ON(!pmd_bad(pmd_mkhuge(pmd))); 78399145f9SAnshuman Khandual } 79399145f9SAnshuman Khandual 80399145f9SAnshuman Khandual #ifdef CONFIG_HAVE_ARCH_TRANSPARENT_HUGEPAGE_PUD 81399145f9SAnshuman Khandual static void __init pud_basic_tests(unsigned long pfn, pgprot_t prot) 82399145f9SAnshuman Khandual { 83399145f9SAnshuman Khandual pud_t pud = pfn_pud(pfn, prot); 84399145f9SAnshuman Khandual 85787d563bSAneesh Kumar K.V if (!has_transparent_hugepage()) 86787d563bSAneesh Kumar K.V return; 87787d563bSAneesh Kumar K.V 88399145f9SAnshuman Khandual WARN_ON(!pud_same(pud, pud)); 89399145f9SAnshuman Khandual WARN_ON(!pud_young(pud_mkyoung(pud_mkold(pud)))); 90399145f9SAnshuman Khandual WARN_ON(!pud_write(pud_mkwrite(pud_wrprotect(pud)))); 91399145f9SAnshuman Khandual WARN_ON(pud_write(pud_wrprotect(pud_mkwrite(pud)))); 92399145f9SAnshuman Khandual WARN_ON(pud_young(pud_mkold(pud_mkyoung(pud)))); 93399145f9SAnshuman Khandual 94399145f9SAnshuman Khandual if (mm_pmd_folded(mm)) 95399145f9SAnshuman Khandual return; 96399145f9SAnshuman Khandual 97399145f9SAnshuman Khandual /* 98399145f9SAnshuman Khandual * A huge page does not point to next level page table 99399145f9SAnshuman Khandual * entry. Hence this must qualify as pud_bad(). 100399145f9SAnshuman Khandual */ 101399145f9SAnshuman Khandual WARN_ON(!pud_bad(pud_mkhuge(pud))); 102399145f9SAnshuman Khandual } 103399145f9SAnshuman Khandual #else /* !CONFIG_HAVE_ARCH_TRANSPARENT_HUGEPAGE_PUD */ 104399145f9SAnshuman Khandual static void __init pud_basic_tests(unsigned long pfn, pgprot_t prot) { } 105399145f9SAnshuman Khandual #endif /* CONFIG_HAVE_ARCH_TRANSPARENT_HUGEPAGE_PUD */ 106399145f9SAnshuman Khandual #else /* !CONFIG_TRANSPARENT_HUGEPAGE */ 107399145f9SAnshuman Khandual static void __init pmd_basic_tests(unsigned long pfn, pgprot_t prot) { } 108399145f9SAnshuman Khandual static void __init pud_basic_tests(unsigned long pfn, pgprot_t prot) { } 109399145f9SAnshuman Khandual #endif /* CONFIG_TRANSPARENT_HUGEPAGE */ 110399145f9SAnshuman Khandual 111399145f9SAnshuman Khandual static void __init p4d_basic_tests(unsigned long pfn, pgprot_t prot) 112399145f9SAnshuman Khandual { 113399145f9SAnshuman Khandual p4d_t p4d; 114399145f9SAnshuman Khandual 115399145f9SAnshuman Khandual memset(&p4d, RANDOM_NZVALUE, sizeof(p4d_t)); 116399145f9SAnshuman Khandual WARN_ON(!p4d_same(p4d, p4d)); 117399145f9SAnshuman Khandual } 118399145f9SAnshuman Khandual 119399145f9SAnshuman Khandual static void __init pgd_basic_tests(unsigned long pfn, pgprot_t prot) 120399145f9SAnshuman Khandual { 121399145f9SAnshuman Khandual pgd_t pgd; 122399145f9SAnshuman Khandual 123399145f9SAnshuman Khandual memset(&pgd, RANDOM_NZVALUE, sizeof(pgd_t)); 124399145f9SAnshuman Khandual WARN_ON(!pgd_same(pgd, pgd)); 125399145f9SAnshuman Khandual } 126399145f9SAnshuman Khandual 127399145f9SAnshuman Khandual #ifndef __PAGETABLE_PUD_FOLDED 128399145f9SAnshuman Khandual static void __init pud_clear_tests(struct mm_struct *mm, pud_t *pudp) 129399145f9SAnshuman Khandual { 130399145f9SAnshuman Khandual pud_t pud = READ_ONCE(*pudp); 131399145f9SAnshuman Khandual 132399145f9SAnshuman Khandual if (mm_pmd_folded(mm)) 133399145f9SAnshuman Khandual return; 134399145f9SAnshuman Khandual 135399145f9SAnshuman Khandual pud = __pud(pud_val(pud) | RANDOM_ORVALUE); 136399145f9SAnshuman Khandual WRITE_ONCE(*pudp, pud); 137399145f9SAnshuman Khandual pud_clear(pudp); 138399145f9SAnshuman Khandual pud = READ_ONCE(*pudp); 139399145f9SAnshuman Khandual WARN_ON(!pud_none(pud)); 140399145f9SAnshuman Khandual } 141399145f9SAnshuman Khandual 142399145f9SAnshuman Khandual static void __init pud_populate_tests(struct mm_struct *mm, pud_t *pudp, 143399145f9SAnshuman Khandual pmd_t *pmdp) 144399145f9SAnshuman Khandual { 145399145f9SAnshuman Khandual pud_t pud; 146399145f9SAnshuman Khandual 147399145f9SAnshuman Khandual if (mm_pmd_folded(mm)) 148399145f9SAnshuman Khandual return; 149399145f9SAnshuman Khandual /* 150399145f9SAnshuman Khandual * This entry points to next level page table page. 151399145f9SAnshuman Khandual * Hence this must not qualify as pud_bad(). 152399145f9SAnshuman Khandual */ 153399145f9SAnshuman Khandual pmd_clear(pmdp); 154399145f9SAnshuman Khandual pud_clear(pudp); 155399145f9SAnshuman Khandual pud_populate(mm, pudp, pmdp); 156399145f9SAnshuman Khandual pud = READ_ONCE(*pudp); 157399145f9SAnshuman Khandual WARN_ON(pud_bad(pud)); 158399145f9SAnshuman Khandual } 159399145f9SAnshuman Khandual #else /* !__PAGETABLE_PUD_FOLDED */ 160399145f9SAnshuman Khandual static void __init pud_clear_tests(struct mm_struct *mm, pud_t *pudp) { } 161399145f9SAnshuman Khandual static void __init pud_populate_tests(struct mm_struct *mm, pud_t *pudp, 162399145f9SAnshuman Khandual pmd_t *pmdp) 163399145f9SAnshuman Khandual { 164399145f9SAnshuman Khandual } 165399145f9SAnshuman Khandual #endif /* PAGETABLE_PUD_FOLDED */ 166399145f9SAnshuman Khandual 167399145f9SAnshuman Khandual #ifndef __PAGETABLE_P4D_FOLDED 168399145f9SAnshuman Khandual static void __init p4d_clear_tests(struct mm_struct *mm, p4d_t *p4dp) 169399145f9SAnshuman Khandual { 170399145f9SAnshuman Khandual p4d_t p4d = READ_ONCE(*p4dp); 171399145f9SAnshuman Khandual 172399145f9SAnshuman Khandual if (mm_pud_folded(mm)) 173399145f9SAnshuman Khandual return; 174399145f9SAnshuman Khandual 175399145f9SAnshuman Khandual p4d = __p4d(p4d_val(p4d) | RANDOM_ORVALUE); 176399145f9SAnshuman Khandual WRITE_ONCE(*p4dp, p4d); 177399145f9SAnshuman Khandual p4d_clear(p4dp); 178399145f9SAnshuman Khandual p4d = READ_ONCE(*p4dp); 179399145f9SAnshuman Khandual WARN_ON(!p4d_none(p4d)); 180399145f9SAnshuman Khandual } 181399145f9SAnshuman Khandual 182399145f9SAnshuman Khandual static void __init p4d_populate_tests(struct mm_struct *mm, p4d_t *p4dp, 183399145f9SAnshuman Khandual pud_t *pudp) 184399145f9SAnshuman Khandual { 185399145f9SAnshuman Khandual p4d_t p4d; 186399145f9SAnshuman Khandual 187399145f9SAnshuman Khandual if (mm_pud_folded(mm)) 188399145f9SAnshuman Khandual return; 189399145f9SAnshuman Khandual 190399145f9SAnshuman Khandual /* 191399145f9SAnshuman Khandual * This entry points to next level page table page. 192399145f9SAnshuman Khandual * Hence this must not qualify as p4d_bad(). 193399145f9SAnshuman Khandual */ 194399145f9SAnshuman Khandual pud_clear(pudp); 195399145f9SAnshuman Khandual p4d_clear(p4dp); 196399145f9SAnshuman Khandual p4d_populate(mm, p4dp, pudp); 197399145f9SAnshuman Khandual p4d = READ_ONCE(*p4dp); 198399145f9SAnshuman Khandual WARN_ON(p4d_bad(p4d)); 199399145f9SAnshuman Khandual } 200399145f9SAnshuman Khandual 201399145f9SAnshuman Khandual static void __init pgd_clear_tests(struct mm_struct *mm, pgd_t *pgdp) 202399145f9SAnshuman Khandual { 203399145f9SAnshuman Khandual pgd_t pgd = READ_ONCE(*pgdp); 204399145f9SAnshuman Khandual 205399145f9SAnshuman Khandual if (mm_p4d_folded(mm)) 206399145f9SAnshuman Khandual return; 207399145f9SAnshuman Khandual 208399145f9SAnshuman Khandual pgd = __pgd(pgd_val(pgd) | RANDOM_ORVALUE); 209399145f9SAnshuman Khandual WRITE_ONCE(*pgdp, pgd); 210399145f9SAnshuman Khandual pgd_clear(pgdp); 211399145f9SAnshuman Khandual pgd = READ_ONCE(*pgdp); 212399145f9SAnshuman Khandual WARN_ON(!pgd_none(pgd)); 213399145f9SAnshuman Khandual } 214399145f9SAnshuman Khandual 215399145f9SAnshuman Khandual static void __init pgd_populate_tests(struct mm_struct *mm, pgd_t *pgdp, 216399145f9SAnshuman Khandual p4d_t *p4dp) 217399145f9SAnshuman Khandual { 218399145f9SAnshuman Khandual pgd_t pgd; 219399145f9SAnshuman Khandual 220399145f9SAnshuman Khandual if (mm_p4d_folded(mm)) 221399145f9SAnshuman Khandual return; 222399145f9SAnshuman Khandual 223399145f9SAnshuman Khandual /* 224399145f9SAnshuman Khandual * This entry points to next level page table page. 225399145f9SAnshuman Khandual * Hence this must not qualify as pgd_bad(). 226399145f9SAnshuman Khandual */ 227399145f9SAnshuman Khandual p4d_clear(p4dp); 228399145f9SAnshuman Khandual pgd_clear(pgdp); 229399145f9SAnshuman Khandual pgd_populate(mm, pgdp, p4dp); 230399145f9SAnshuman Khandual pgd = READ_ONCE(*pgdp); 231399145f9SAnshuman Khandual WARN_ON(pgd_bad(pgd)); 232399145f9SAnshuman Khandual } 233399145f9SAnshuman Khandual #else /* !__PAGETABLE_P4D_FOLDED */ 234399145f9SAnshuman Khandual static void __init p4d_clear_tests(struct mm_struct *mm, p4d_t *p4dp) { } 235399145f9SAnshuman Khandual static void __init pgd_clear_tests(struct mm_struct *mm, pgd_t *pgdp) { } 236399145f9SAnshuman Khandual static void __init p4d_populate_tests(struct mm_struct *mm, p4d_t *p4dp, 237399145f9SAnshuman Khandual pud_t *pudp) 238399145f9SAnshuman Khandual { 239399145f9SAnshuman Khandual } 240399145f9SAnshuman Khandual static void __init pgd_populate_tests(struct mm_struct *mm, pgd_t *pgdp, 241399145f9SAnshuman Khandual p4d_t *p4dp) 242399145f9SAnshuman Khandual { 243399145f9SAnshuman Khandual } 244399145f9SAnshuman Khandual #endif /* PAGETABLE_P4D_FOLDED */ 245399145f9SAnshuman Khandual 246399145f9SAnshuman Khandual static void __init pte_clear_tests(struct mm_struct *mm, pte_t *ptep, 247399145f9SAnshuman Khandual unsigned long vaddr) 248399145f9SAnshuman Khandual { 2499449c9cbSChristophe Leroy pte_t pte = ptep_get(ptep); 250399145f9SAnshuman Khandual 251399145f9SAnshuman Khandual pte = __pte(pte_val(pte) | RANDOM_ORVALUE); 252399145f9SAnshuman Khandual set_pte_at(mm, vaddr, ptep, pte); 253399145f9SAnshuman Khandual barrier(); 254399145f9SAnshuman Khandual pte_clear(mm, vaddr, ptep); 2559449c9cbSChristophe Leroy pte = ptep_get(ptep); 256399145f9SAnshuman Khandual WARN_ON(!pte_none(pte)); 257399145f9SAnshuman Khandual } 258399145f9SAnshuman Khandual 259399145f9SAnshuman Khandual static void __init pmd_clear_tests(struct mm_struct *mm, pmd_t *pmdp) 260399145f9SAnshuman Khandual { 261399145f9SAnshuman Khandual pmd_t pmd = READ_ONCE(*pmdp); 262399145f9SAnshuman Khandual 263399145f9SAnshuman Khandual pmd = __pmd(pmd_val(pmd) | RANDOM_ORVALUE); 264399145f9SAnshuman Khandual WRITE_ONCE(*pmdp, pmd); 265399145f9SAnshuman Khandual pmd_clear(pmdp); 266399145f9SAnshuman Khandual pmd = READ_ONCE(*pmdp); 267399145f9SAnshuman Khandual WARN_ON(!pmd_none(pmd)); 268399145f9SAnshuman Khandual } 269399145f9SAnshuman Khandual 270399145f9SAnshuman Khandual static void __init pmd_populate_tests(struct mm_struct *mm, pmd_t *pmdp, 271399145f9SAnshuman Khandual pgtable_t pgtable) 272399145f9SAnshuman Khandual { 273399145f9SAnshuman Khandual pmd_t pmd; 274399145f9SAnshuman Khandual 275399145f9SAnshuman Khandual /* 276399145f9SAnshuman Khandual * This entry points to next level page table page. 277399145f9SAnshuman Khandual * Hence this must not qualify as pmd_bad(). 278399145f9SAnshuman Khandual */ 279399145f9SAnshuman Khandual pmd_clear(pmdp); 280399145f9SAnshuman Khandual pmd_populate(mm, pmdp, pgtable); 281399145f9SAnshuman Khandual pmd = READ_ONCE(*pmdp); 282399145f9SAnshuman Khandual WARN_ON(pmd_bad(pmd)); 283399145f9SAnshuman Khandual } 284399145f9SAnshuman Khandual 285*05289402SAnshuman Khandual static void __init pte_special_tests(unsigned long pfn, pgprot_t prot) 286*05289402SAnshuman Khandual { 287*05289402SAnshuman Khandual pte_t pte = pfn_pte(pfn, prot); 288*05289402SAnshuman Khandual 289*05289402SAnshuman Khandual if (!IS_ENABLED(CONFIG_ARCH_HAS_PTE_SPECIAL)) 290*05289402SAnshuman Khandual return; 291*05289402SAnshuman Khandual 292*05289402SAnshuman Khandual WARN_ON(!pte_special(pte_mkspecial(pte))); 293*05289402SAnshuman Khandual } 294*05289402SAnshuman Khandual 295*05289402SAnshuman Khandual static void __init pte_protnone_tests(unsigned long pfn, pgprot_t prot) 296*05289402SAnshuman Khandual { 297*05289402SAnshuman Khandual pte_t pte = pfn_pte(pfn, prot); 298*05289402SAnshuman Khandual 299*05289402SAnshuman Khandual if (!IS_ENABLED(CONFIG_NUMA_BALANCING)) 300*05289402SAnshuman Khandual return; 301*05289402SAnshuman Khandual 302*05289402SAnshuman Khandual WARN_ON(!pte_protnone(pte)); 303*05289402SAnshuman Khandual WARN_ON(!pte_present(pte)); 304*05289402SAnshuman Khandual } 305*05289402SAnshuman Khandual 306*05289402SAnshuman Khandual #ifdef CONFIG_TRANSPARENT_HUGEPAGE 307*05289402SAnshuman Khandual static void __init pmd_protnone_tests(unsigned long pfn, pgprot_t prot) 308*05289402SAnshuman Khandual { 309*05289402SAnshuman Khandual pmd_t pmd = pmd_mkhuge(pfn_pmd(pfn, prot)); 310*05289402SAnshuman Khandual 311*05289402SAnshuman Khandual if (!IS_ENABLED(CONFIG_NUMA_BALANCING)) 312*05289402SAnshuman Khandual return; 313*05289402SAnshuman Khandual 314*05289402SAnshuman Khandual WARN_ON(!pmd_protnone(pmd)); 315*05289402SAnshuman Khandual WARN_ON(!pmd_present(pmd)); 316*05289402SAnshuman Khandual } 317*05289402SAnshuman Khandual #else /* !CONFIG_TRANSPARENT_HUGEPAGE */ 318*05289402SAnshuman Khandual static void __init pmd_protnone_tests(unsigned long pfn, pgprot_t prot) { } 319*05289402SAnshuman Khandual #endif /* CONFIG_TRANSPARENT_HUGEPAGE */ 320*05289402SAnshuman Khandual 321*05289402SAnshuman Khandual #ifdef CONFIG_ARCH_HAS_PTE_DEVMAP 322*05289402SAnshuman Khandual static void __init pte_devmap_tests(unsigned long pfn, pgprot_t prot) 323*05289402SAnshuman Khandual { 324*05289402SAnshuman Khandual pte_t pte = pfn_pte(pfn, prot); 325*05289402SAnshuman Khandual 326*05289402SAnshuman Khandual WARN_ON(!pte_devmap(pte_mkdevmap(pte))); 327*05289402SAnshuman Khandual } 328*05289402SAnshuman Khandual 329*05289402SAnshuman Khandual #ifdef CONFIG_TRANSPARENT_HUGEPAGE 330*05289402SAnshuman Khandual static void __init pmd_devmap_tests(unsigned long pfn, pgprot_t prot) 331*05289402SAnshuman Khandual { 332*05289402SAnshuman Khandual pmd_t pmd = pfn_pmd(pfn, prot); 333*05289402SAnshuman Khandual 334*05289402SAnshuman Khandual WARN_ON(!pmd_devmap(pmd_mkdevmap(pmd))); 335*05289402SAnshuman Khandual } 336*05289402SAnshuman Khandual 337*05289402SAnshuman Khandual #ifdef CONFIG_HAVE_ARCH_TRANSPARENT_HUGEPAGE_PUD 338*05289402SAnshuman Khandual static void __init pud_devmap_tests(unsigned long pfn, pgprot_t prot) 339*05289402SAnshuman Khandual { 340*05289402SAnshuman Khandual pud_t pud = pfn_pud(pfn, prot); 341*05289402SAnshuman Khandual 342*05289402SAnshuman Khandual WARN_ON(!pud_devmap(pud_mkdevmap(pud))); 343*05289402SAnshuman Khandual } 344*05289402SAnshuman Khandual #else /* !CONFIG_HAVE_ARCH_TRANSPARENT_HUGEPAGE_PUD */ 345*05289402SAnshuman Khandual static void __init pud_devmap_tests(unsigned long pfn, pgprot_t prot) { } 346*05289402SAnshuman Khandual #endif /* CONFIG_HAVE_ARCH_TRANSPARENT_HUGEPAGE_PUD */ 347*05289402SAnshuman Khandual #else /* CONFIG_TRANSPARENT_HUGEPAGE */ 348*05289402SAnshuman Khandual static void __init pmd_devmap_tests(unsigned long pfn, pgprot_t prot) { } 349*05289402SAnshuman Khandual static void __init pud_devmap_tests(unsigned long pfn, pgprot_t prot) { } 350*05289402SAnshuman Khandual #endif /* CONFIG_TRANSPARENT_HUGEPAGE */ 351*05289402SAnshuman Khandual #else 352*05289402SAnshuman Khandual static void __init pte_devmap_tests(unsigned long pfn, pgprot_t prot) { } 353*05289402SAnshuman Khandual static void __init pmd_devmap_tests(unsigned long pfn, pgprot_t prot) { } 354*05289402SAnshuman Khandual static void __init pud_devmap_tests(unsigned long pfn, pgprot_t prot) { } 355*05289402SAnshuman Khandual #endif /* CONFIG_ARCH_HAS_PTE_DEVMAP */ 356*05289402SAnshuman Khandual 357*05289402SAnshuman Khandual static void __init pte_soft_dirty_tests(unsigned long pfn, pgprot_t prot) 358*05289402SAnshuman Khandual { 359*05289402SAnshuman Khandual pte_t pte = pfn_pte(pfn, prot); 360*05289402SAnshuman Khandual 361*05289402SAnshuman Khandual if (!IS_ENABLED(CONFIG_MEM_SOFT_DIRTY)) 362*05289402SAnshuman Khandual return; 363*05289402SAnshuman Khandual 364*05289402SAnshuman Khandual WARN_ON(!pte_soft_dirty(pte_mksoft_dirty(pte))); 365*05289402SAnshuman Khandual WARN_ON(pte_soft_dirty(pte_clear_soft_dirty(pte))); 366*05289402SAnshuman Khandual } 367*05289402SAnshuman Khandual 368*05289402SAnshuman Khandual static void __init pte_swap_soft_dirty_tests(unsigned long pfn, pgprot_t prot) 369*05289402SAnshuman Khandual { 370*05289402SAnshuman Khandual pte_t pte = pfn_pte(pfn, prot); 371*05289402SAnshuman Khandual 372*05289402SAnshuman Khandual if (!IS_ENABLED(CONFIG_MEM_SOFT_DIRTY)) 373*05289402SAnshuman Khandual return; 374*05289402SAnshuman Khandual 375*05289402SAnshuman Khandual WARN_ON(!pte_swp_soft_dirty(pte_swp_mksoft_dirty(pte))); 376*05289402SAnshuman Khandual WARN_ON(pte_swp_soft_dirty(pte_swp_clear_soft_dirty(pte))); 377*05289402SAnshuman Khandual } 378*05289402SAnshuman Khandual 379*05289402SAnshuman Khandual #ifdef CONFIG_TRANSPARENT_HUGEPAGE 380*05289402SAnshuman Khandual static void __init pmd_soft_dirty_tests(unsigned long pfn, pgprot_t prot) 381*05289402SAnshuman Khandual { 382*05289402SAnshuman Khandual pmd_t pmd = pfn_pmd(pfn, prot); 383*05289402SAnshuman Khandual 384*05289402SAnshuman Khandual if (!IS_ENABLED(CONFIG_MEM_SOFT_DIRTY)) 385*05289402SAnshuman Khandual return; 386*05289402SAnshuman Khandual 387*05289402SAnshuman Khandual WARN_ON(!pmd_soft_dirty(pmd_mksoft_dirty(pmd))); 388*05289402SAnshuman Khandual WARN_ON(pmd_soft_dirty(pmd_clear_soft_dirty(pmd))); 389*05289402SAnshuman Khandual } 390*05289402SAnshuman Khandual 391*05289402SAnshuman Khandual static void __init pmd_swap_soft_dirty_tests(unsigned long pfn, pgprot_t prot) 392*05289402SAnshuman Khandual { 393*05289402SAnshuman Khandual pmd_t pmd = pfn_pmd(pfn, prot); 394*05289402SAnshuman Khandual 395*05289402SAnshuman Khandual if (!IS_ENABLED(CONFIG_MEM_SOFT_DIRTY) || 396*05289402SAnshuman Khandual !IS_ENABLED(CONFIG_ARCH_ENABLE_THP_MIGRATION)) 397*05289402SAnshuman Khandual return; 398*05289402SAnshuman Khandual 399*05289402SAnshuman Khandual WARN_ON(!pmd_swp_soft_dirty(pmd_swp_mksoft_dirty(pmd))); 400*05289402SAnshuman Khandual WARN_ON(pmd_swp_soft_dirty(pmd_swp_clear_soft_dirty(pmd))); 401*05289402SAnshuman Khandual } 402*05289402SAnshuman Khandual #else /* !CONFIG_ARCH_HAS_PTE_DEVMAP */ 403*05289402SAnshuman Khandual static void __init pmd_soft_dirty_tests(unsigned long pfn, pgprot_t prot) { } 404*05289402SAnshuman Khandual static void __init pmd_swap_soft_dirty_tests(unsigned long pfn, pgprot_t prot) 405*05289402SAnshuman Khandual { 406*05289402SAnshuman Khandual } 407*05289402SAnshuman Khandual #endif /* CONFIG_ARCH_HAS_PTE_DEVMAP */ 408*05289402SAnshuman Khandual 409*05289402SAnshuman Khandual static void __init pte_swap_tests(unsigned long pfn, pgprot_t prot) 410*05289402SAnshuman Khandual { 411*05289402SAnshuman Khandual swp_entry_t swp; 412*05289402SAnshuman Khandual pte_t pte; 413*05289402SAnshuman Khandual 414*05289402SAnshuman Khandual pte = pfn_pte(pfn, prot); 415*05289402SAnshuman Khandual swp = __pte_to_swp_entry(pte); 416*05289402SAnshuman Khandual pte = __swp_entry_to_pte(swp); 417*05289402SAnshuman Khandual WARN_ON(pfn != pte_pfn(pte)); 418*05289402SAnshuman Khandual } 419*05289402SAnshuman Khandual 420*05289402SAnshuman Khandual #ifdef CONFIG_ARCH_ENABLE_THP_MIGRATION 421*05289402SAnshuman Khandual static void __init pmd_swap_tests(unsigned long pfn, pgprot_t prot) 422*05289402SAnshuman Khandual { 423*05289402SAnshuman Khandual swp_entry_t swp; 424*05289402SAnshuman Khandual pmd_t pmd; 425*05289402SAnshuman Khandual 426*05289402SAnshuman Khandual pmd = pfn_pmd(pfn, prot); 427*05289402SAnshuman Khandual swp = __pmd_to_swp_entry(pmd); 428*05289402SAnshuman Khandual pmd = __swp_entry_to_pmd(swp); 429*05289402SAnshuman Khandual WARN_ON(pfn != pmd_pfn(pmd)); 430*05289402SAnshuman Khandual } 431*05289402SAnshuman Khandual #else /* !CONFIG_ARCH_ENABLE_THP_MIGRATION */ 432*05289402SAnshuman Khandual static void __init pmd_swap_tests(unsigned long pfn, pgprot_t prot) { } 433*05289402SAnshuman Khandual #endif /* CONFIG_ARCH_ENABLE_THP_MIGRATION */ 434*05289402SAnshuman Khandual 435*05289402SAnshuman Khandual static void __init swap_migration_tests(void) 436*05289402SAnshuman Khandual { 437*05289402SAnshuman Khandual struct page *page; 438*05289402SAnshuman Khandual swp_entry_t swp; 439*05289402SAnshuman Khandual 440*05289402SAnshuman Khandual if (!IS_ENABLED(CONFIG_MIGRATION)) 441*05289402SAnshuman Khandual return; 442*05289402SAnshuman Khandual /* 443*05289402SAnshuman Khandual * swap_migration_tests() requires a dedicated page as it needs to 444*05289402SAnshuman Khandual * be locked before creating a migration entry from it. Locking the 445*05289402SAnshuman Khandual * page that actually maps kernel text ('start_kernel') can be real 446*05289402SAnshuman Khandual * problematic. Lets allocate a dedicated page explicitly for this 447*05289402SAnshuman Khandual * purpose that will be freed subsequently. 448*05289402SAnshuman Khandual */ 449*05289402SAnshuman Khandual page = alloc_page(GFP_KERNEL); 450*05289402SAnshuman Khandual if (!page) { 451*05289402SAnshuman Khandual pr_err("page allocation failed\n"); 452*05289402SAnshuman Khandual return; 453*05289402SAnshuman Khandual } 454*05289402SAnshuman Khandual 455*05289402SAnshuman Khandual /* 456*05289402SAnshuman Khandual * make_migration_entry() expects given page to be 457*05289402SAnshuman Khandual * locked, otherwise it stumbles upon a BUG_ON(). 458*05289402SAnshuman Khandual */ 459*05289402SAnshuman Khandual __SetPageLocked(page); 460*05289402SAnshuman Khandual swp = make_migration_entry(page, 1); 461*05289402SAnshuman Khandual WARN_ON(!is_migration_entry(swp)); 462*05289402SAnshuman Khandual WARN_ON(!is_write_migration_entry(swp)); 463*05289402SAnshuman Khandual 464*05289402SAnshuman Khandual make_migration_entry_read(&swp); 465*05289402SAnshuman Khandual WARN_ON(!is_migration_entry(swp)); 466*05289402SAnshuman Khandual WARN_ON(is_write_migration_entry(swp)); 467*05289402SAnshuman Khandual 468*05289402SAnshuman Khandual swp = make_migration_entry(page, 0); 469*05289402SAnshuman Khandual WARN_ON(!is_migration_entry(swp)); 470*05289402SAnshuman Khandual WARN_ON(is_write_migration_entry(swp)); 471*05289402SAnshuman Khandual __ClearPageLocked(page); 472*05289402SAnshuman Khandual __free_page(page); 473*05289402SAnshuman Khandual } 474*05289402SAnshuman Khandual 475*05289402SAnshuman Khandual #ifdef CONFIG_HUGETLB_PAGE 476*05289402SAnshuman Khandual static void __init hugetlb_basic_tests(unsigned long pfn, pgprot_t prot) 477*05289402SAnshuman Khandual { 478*05289402SAnshuman Khandual struct page *page; 479*05289402SAnshuman Khandual pte_t pte; 480*05289402SAnshuman Khandual 481*05289402SAnshuman Khandual /* 482*05289402SAnshuman Khandual * Accessing the page associated with the pfn is safe here, 483*05289402SAnshuman Khandual * as it was previously derived from a real kernel symbol. 484*05289402SAnshuman Khandual */ 485*05289402SAnshuman Khandual page = pfn_to_page(pfn); 486*05289402SAnshuman Khandual pte = mk_huge_pte(page, prot); 487*05289402SAnshuman Khandual 488*05289402SAnshuman Khandual WARN_ON(!huge_pte_dirty(huge_pte_mkdirty(pte))); 489*05289402SAnshuman Khandual WARN_ON(!huge_pte_write(huge_pte_mkwrite(huge_pte_wrprotect(pte)))); 490*05289402SAnshuman Khandual WARN_ON(huge_pte_write(huge_pte_wrprotect(huge_pte_mkwrite(pte)))); 491*05289402SAnshuman Khandual 492*05289402SAnshuman Khandual #ifdef CONFIG_ARCH_WANT_GENERAL_HUGETLB 493*05289402SAnshuman Khandual pte = pfn_pte(pfn, prot); 494*05289402SAnshuman Khandual 495*05289402SAnshuman Khandual WARN_ON(!pte_huge(pte_mkhuge(pte))); 496*05289402SAnshuman Khandual #endif /* CONFIG_ARCH_WANT_GENERAL_HUGETLB */ 497*05289402SAnshuman Khandual } 498*05289402SAnshuman Khandual #else /* !CONFIG_HUGETLB_PAGE */ 499*05289402SAnshuman Khandual static void __init hugetlb_basic_tests(unsigned long pfn, pgprot_t prot) { } 500*05289402SAnshuman Khandual #endif /* CONFIG_HUGETLB_PAGE */ 501*05289402SAnshuman Khandual 502*05289402SAnshuman Khandual #ifdef CONFIG_TRANSPARENT_HUGEPAGE 503*05289402SAnshuman Khandual static void __init pmd_thp_tests(unsigned long pfn, pgprot_t prot) 504*05289402SAnshuman Khandual { 505*05289402SAnshuman Khandual pmd_t pmd; 506*05289402SAnshuman Khandual 507*05289402SAnshuman Khandual if (!has_transparent_hugepage()) 508*05289402SAnshuman Khandual return; 509*05289402SAnshuman Khandual 510*05289402SAnshuman Khandual /* 511*05289402SAnshuman Khandual * pmd_trans_huge() and pmd_present() must return positive after 512*05289402SAnshuman Khandual * MMU invalidation with pmd_mkinvalid(). This behavior is an 513*05289402SAnshuman Khandual * optimization for transparent huge page. pmd_trans_huge() must 514*05289402SAnshuman Khandual * be true if pmd_page() returns a valid THP to avoid taking the 515*05289402SAnshuman Khandual * pmd_lock when others walk over non transhuge pmds (i.e. there 516*05289402SAnshuman Khandual * are no THP allocated). Especially when splitting a THP and 517*05289402SAnshuman Khandual * removing the present bit from the pmd, pmd_trans_huge() still 518*05289402SAnshuman Khandual * needs to return true. pmd_present() should be true whenever 519*05289402SAnshuman Khandual * pmd_trans_huge() returns true. 520*05289402SAnshuman Khandual */ 521*05289402SAnshuman Khandual pmd = pfn_pmd(pfn, prot); 522*05289402SAnshuman Khandual WARN_ON(!pmd_trans_huge(pmd_mkhuge(pmd))); 523*05289402SAnshuman Khandual 524*05289402SAnshuman Khandual #ifndef __HAVE_ARCH_PMDP_INVALIDATE 525*05289402SAnshuman Khandual WARN_ON(!pmd_trans_huge(pmd_mkinvalid(pmd_mkhuge(pmd)))); 526*05289402SAnshuman Khandual WARN_ON(!pmd_present(pmd_mkinvalid(pmd_mkhuge(pmd)))); 527*05289402SAnshuman Khandual #endif /* __HAVE_ARCH_PMDP_INVALIDATE */ 528*05289402SAnshuman Khandual } 529*05289402SAnshuman Khandual 530*05289402SAnshuman Khandual #ifdef CONFIG_HAVE_ARCH_TRANSPARENT_HUGEPAGE_PUD 531*05289402SAnshuman Khandual static void __init pud_thp_tests(unsigned long pfn, pgprot_t prot) 532*05289402SAnshuman Khandual { 533*05289402SAnshuman Khandual pud_t pud; 534*05289402SAnshuman Khandual 535*05289402SAnshuman Khandual if (!has_transparent_hugepage()) 536*05289402SAnshuman Khandual return; 537*05289402SAnshuman Khandual 538*05289402SAnshuman Khandual pud = pfn_pud(pfn, prot); 539*05289402SAnshuman Khandual WARN_ON(!pud_trans_huge(pud_mkhuge(pud))); 540*05289402SAnshuman Khandual 541*05289402SAnshuman Khandual /* 542*05289402SAnshuman Khandual * pud_mkinvalid() has been dropped for now. Enable back 543*05289402SAnshuman Khandual * these tests when it comes back with a modified pud_present(). 544*05289402SAnshuman Khandual * 545*05289402SAnshuman Khandual * WARN_ON(!pud_trans_huge(pud_mkinvalid(pud_mkhuge(pud)))); 546*05289402SAnshuman Khandual * WARN_ON(!pud_present(pud_mkinvalid(pud_mkhuge(pud)))); 547*05289402SAnshuman Khandual */ 548*05289402SAnshuman Khandual } 549*05289402SAnshuman Khandual #else /* !CONFIG_HAVE_ARCH_TRANSPARENT_HUGEPAGE_PUD */ 550*05289402SAnshuman Khandual static void __init pud_thp_tests(unsigned long pfn, pgprot_t prot) { } 551*05289402SAnshuman Khandual #endif /* CONFIG_HAVE_ARCH_TRANSPARENT_HUGEPAGE_PUD */ 552*05289402SAnshuman Khandual #else /* !CONFIG_TRANSPARENT_HUGEPAGE */ 553*05289402SAnshuman Khandual static void __init pmd_thp_tests(unsigned long pfn, pgprot_t prot) { } 554*05289402SAnshuman Khandual static void __init pud_thp_tests(unsigned long pfn, pgprot_t prot) { } 555*05289402SAnshuman Khandual #endif /* CONFIG_TRANSPARENT_HUGEPAGE */ 556*05289402SAnshuman Khandual 557399145f9SAnshuman Khandual static unsigned long __init get_random_vaddr(void) 558399145f9SAnshuman Khandual { 559399145f9SAnshuman Khandual unsigned long random_vaddr, random_pages, total_user_pages; 560399145f9SAnshuman Khandual 561399145f9SAnshuman Khandual total_user_pages = (TASK_SIZE - FIRST_USER_ADDRESS) / PAGE_SIZE; 562399145f9SAnshuman Khandual 563399145f9SAnshuman Khandual random_pages = get_random_long() % total_user_pages; 564399145f9SAnshuman Khandual random_vaddr = FIRST_USER_ADDRESS + random_pages * PAGE_SIZE; 565399145f9SAnshuman Khandual 566399145f9SAnshuman Khandual return random_vaddr; 567399145f9SAnshuman Khandual } 568399145f9SAnshuman Khandual 569399145f9SAnshuman Khandual static int __init debug_vm_pgtable(void) 570399145f9SAnshuman Khandual { 571399145f9SAnshuman Khandual struct mm_struct *mm; 572399145f9SAnshuman Khandual pgd_t *pgdp; 573399145f9SAnshuman Khandual p4d_t *p4dp, *saved_p4dp; 574399145f9SAnshuman Khandual pud_t *pudp, *saved_pudp; 575399145f9SAnshuman Khandual pmd_t *pmdp, *saved_pmdp, pmd; 576399145f9SAnshuman Khandual pte_t *ptep; 577399145f9SAnshuman Khandual pgtable_t saved_ptep; 578*05289402SAnshuman Khandual pgprot_t prot, protnone; 579399145f9SAnshuman Khandual phys_addr_t paddr; 580399145f9SAnshuman Khandual unsigned long vaddr, pte_aligned, pmd_aligned; 581399145f9SAnshuman Khandual unsigned long pud_aligned, p4d_aligned, pgd_aligned; 582fea1120cSKees Cook spinlock_t *ptl = NULL; 583399145f9SAnshuman Khandual 584399145f9SAnshuman Khandual pr_info("Validating architecture page table helpers\n"); 585399145f9SAnshuman Khandual prot = vm_get_page_prot(VMFLAGS); 586399145f9SAnshuman Khandual vaddr = get_random_vaddr(); 587399145f9SAnshuman Khandual mm = mm_alloc(); 588399145f9SAnshuman Khandual if (!mm) { 589399145f9SAnshuman Khandual pr_err("mm_struct allocation failed\n"); 590399145f9SAnshuman Khandual return 1; 591399145f9SAnshuman Khandual } 592399145f9SAnshuman Khandual 593399145f9SAnshuman Khandual /* 594*05289402SAnshuman Khandual * __P000 (or even __S000) will help create page table entries with 595*05289402SAnshuman Khandual * PROT_NONE permission as required for pxx_protnone_tests(). 596*05289402SAnshuman Khandual */ 597*05289402SAnshuman Khandual protnone = __P000; 598*05289402SAnshuman Khandual 599*05289402SAnshuman Khandual /* 600399145f9SAnshuman Khandual * PFN for mapping at PTE level is determined from a standard kernel 601399145f9SAnshuman Khandual * text symbol. But pfns for higher page table levels are derived by 602399145f9SAnshuman Khandual * masking lower bits of this real pfn. These derived pfns might not 603399145f9SAnshuman Khandual * exist on the platform but that does not really matter as pfn_pxx() 604399145f9SAnshuman Khandual * helpers will still create appropriate entries for the test. This 605399145f9SAnshuman Khandual * helps avoid large memory block allocations to be used for mapping 606399145f9SAnshuman Khandual * at higher page table levels. 607399145f9SAnshuman Khandual */ 608399145f9SAnshuman Khandual paddr = __pa_symbol(&start_kernel); 609399145f9SAnshuman Khandual 610399145f9SAnshuman Khandual pte_aligned = (paddr & PAGE_MASK) >> PAGE_SHIFT; 611399145f9SAnshuman Khandual pmd_aligned = (paddr & PMD_MASK) >> PAGE_SHIFT; 612399145f9SAnshuman Khandual pud_aligned = (paddr & PUD_MASK) >> PAGE_SHIFT; 613399145f9SAnshuman Khandual p4d_aligned = (paddr & P4D_MASK) >> PAGE_SHIFT; 614399145f9SAnshuman Khandual pgd_aligned = (paddr & PGDIR_MASK) >> PAGE_SHIFT; 615399145f9SAnshuman Khandual WARN_ON(!pfn_valid(pte_aligned)); 616399145f9SAnshuman Khandual 617399145f9SAnshuman Khandual pgdp = pgd_offset(mm, vaddr); 618399145f9SAnshuman Khandual p4dp = p4d_alloc(mm, pgdp, vaddr); 619399145f9SAnshuman Khandual pudp = pud_alloc(mm, p4dp, vaddr); 620399145f9SAnshuman Khandual pmdp = pmd_alloc(mm, pudp, vaddr); 621399145f9SAnshuman Khandual ptep = pte_alloc_map_lock(mm, pmdp, vaddr, &ptl); 622399145f9SAnshuman Khandual 623399145f9SAnshuman Khandual /* 624399145f9SAnshuman Khandual * Save all the page table page addresses as the page table 625399145f9SAnshuman Khandual * entries will be used for testing with random or garbage 626399145f9SAnshuman Khandual * values. These saved addresses will be used for freeing 627399145f9SAnshuman Khandual * page table pages. 628399145f9SAnshuman Khandual */ 629399145f9SAnshuman Khandual pmd = READ_ONCE(*pmdp); 630399145f9SAnshuman Khandual saved_p4dp = p4d_offset(pgdp, 0UL); 631399145f9SAnshuman Khandual saved_pudp = pud_offset(p4dp, 0UL); 632399145f9SAnshuman Khandual saved_pmdp = pmd_offset(pudp, 0UL); 633399145f9SAnshuman Khandual saved_ptep = pmd_pgtable(pmd); 634399145f9SAnshuman Khandual 635399145f9SAnshuman Khandual pte_basic_tests(pte_aligned, prot); 636399145f9SAnshuman Khandual pmd_basic_tests(pmd_aligned, prot); 637399145f9SAnshuman Khandual pud_basic_tests(pud_aligned, prot); 638399145f9SAnshuman Khandual p4d_basic_tests(p4d_aligned, prot); 639399145f9SAnshuman Khandual pgd_basic_tests(pgd_aligned, prot); 640399145f9SAnshuman Khandual 641399145f9SAnshuman Khandual pte_clear_tests(mm, ptep, vaddr); 642399145f9SAnshuman Khandual pmd_clear_tests(mm, pmdp); 643399145f9SAnshuman Khandual pud_clear_tests(mm, pudp); 644399145f9SAnshuman Khandual p4d_clear_tests(mm, p4dp); 645399145f9SAnshuman Khandual pgd_clear_tests(mm, pgdp); 646399145f9SAnshuman Khandual 647399145f9SAnshuman Khandual pte_unmap_unlock(ptep, ptl); 648399145f9SAnshuman Khandual 649399145f9SAnshuman Khandual pmd_populate_tests(mm, pmdp, saved_ptep); 650399145f9SAnshuman Khandual pud_populate_tests(mm, pudp, saved_pmdp); 651399145f9SAnshuman Khandual p4d_populate_tests(mm, p4dp, saved_pudp); 652399145f9SAnshuman Khandual pgd_populate_tests(mm, pgdp, saved_p4dp); 653399145f9SAnshuman Khandual 654*05289402SAnshuman Khandual pte_special_tests(pte_aligned, prot); 655*05289402SAnshuman Khandual pte_protnone_tests(pte_aligned, protnone); 656*05289402SAnshuman Khandual pmd_protnone_tests(pmd_aligned, protnone); 657*05289402SAnshuman Khandual 658*05289402SAnshuman Khandual pte_devmap_tests(pte_aligned, prot); 659*05289402SAnshuman Khandual pmd_devmap_tests(pmd_aligned, prot); 660*05289402SAnshuman Khandual pud_devmap_tests(pud_aligned, prot); 661*05289402SAnshuman Khandual 662*05289402SAnshuman Khandual pte_soft_dirty_tests(pte_aligned, prot); 663*05289402SAnshuman Khandual pmd_soft_dirty_tests(pmd_aligned, prot); 664*05289402SAnshuman Khandual pte_swap_soft_dirty_tests(pte_aligned, prot); 665*05289402SAnshuman Khandual pmd_swap_soft_dirty_tests(pmd_aligned, prot); 666*05289402SAnshuman Khandual 667*05289402SAnshuman Khandual pte_swap_tests(pte_aligned, prot); 668*05289402SAnshuman Khandual pmd_swap_tests(pmd_aligned, prot); 669*05289402SAnshuman Khandual 670*05289402SAnshuman Khandual swap_migration_tests(); 671*05289402SAnshuman Khandual hugetlb_basic_tests(pte_aligned, prot); 672*05289402SAnshuman Khandual 673*05289402SAnshuman Khandual pmd_thp_tests(pmd_aligned, prot); 674*05289402SAnshuman Khandual pud_thp_tests(pud_aligned, prot); 675*05289402SAnshuman Khandual 676399145f9SAnshuman Khandual p4d_free(mm, saved_p4dp); 677399145f9SAnshuman Khandual pud_free(mm, saved_pudp); 678399145f9SAnshuman Khandual pmd_free(mm, saved_pmdp); 679399145f9SAnshuman Khandual pte_free(mm, saved_ptep); 680399145f9SAnshuman Khandual 681399145f9SAnshuman Khandual mm_dec_nr_puds(mm); 682399145f9SAnshuman Khandual mm_dec_nr_pmds(mm); 683399145f9SAnshuman Khandual mm_dec_nr_ptes(mm); 684399145f9SAnshuman Khandual mmdrop(mm); 685399145f9SAnshuman Khandual return 0; 686399145f9SAnshuman Khandual } 687399145f9SAnshuman Khandual late_initcall(debug_vm_pgtable); 688