xref: /openbmc/linux/mm/debug_vm_pgtable.c (revision 08d5b29eac7dd5e6c79b66d390ecbb9219e05931)
1399145f9SAnshuman Khandual // SPDX-License-Identifier: GPL-2.0-only
2399145f9SAnshuman Khandual /*
3399145f9SAnshuman Khandual  * This kernel test validates architecture page table helpers and
4399145f9SAnshuman Khandual  * accessors and helps in verifying their continued compliance with
5399145f9SAnshuman Khandual  * expected generic MM semantics.
6399145f9SAnshuman Khandual  *
7399145f9SAnshuman Khandual  * Copyright (C) 2019 ARM Ltd.
8399145f9SAnshuman Khandual  *
9399145f9SAnshuman Khandual  * Author: Anshuman Khandual <anshuman.khandual@arm.com>
10399145f9SAnshuman Khandual  */
116315df41SAnshuman Khandual #define pr_fmt(fmt) "debug_vm_pgtable: [%-25s]: " fmt, __func__
12399145f9SAnshuman Khandual 
13399145f9SAnshuman Khandual #include <linux/gfp.h>
14399145f9SAnshuman Khandual #include <linux/highmem.h>
15399145f9SAnshuman Khandual #include <linux/hugetlb.h>
16399145f9SAnshuman Khandual #include <linux/kernel.h>
17399145f9SAnshuman Khandual #include <linux/kconfig.h>
18399145f9SAnshuman Khandual #include <linux/mm.h>
19399145f9SAnshuman Khandual #include <linux/mman.h>
20399145f9SAnshuman Khandual #include <linux/mm_types.h>
21399145f9SAnshuman Khandual #include <linux/module.h>
22399145f9SAnshuman Khandual #include <linux/pfn_t.h>
23399145f9SAnshuman Khandual #include <linux/printk.h>
24a5c3b9ffSAnshuman Khandual #include <linux/pgtable.h>
25399145f9SAnshuman Khandual #include <linux/random.h>
26399145f9SAnshuman Khandual #include <linux/spinlock.h>
27399145f9SAnshuman Khandual #include <linux/swap.h>
28399145f9SAnshuman Khandual #include <linux/swapops.h>
29399145f9SAnshuman Khandual #include <linux/start_kernel.h>
30399145f9SAnshuman Khandual #include <linux/sched/mm.h>
3185a14463SAneesh Kumar K.V #include <linux/io.h>
328c5b3a8aSGavin Shan 
338c5b3a8aSGavin Shan #include <asm/cacheflush.h>
34399145f9SAnshuman Khandual #include <asm/pgalloc.h>
35a5c3b9ffSAnshuman Khandual #include <asm/tlbflush.h>
36399145f9SAnshuman Khandual 
37b1d00007SAnshuman Khandual /*
38b1d00007SAnshuman Khandual  * Please refer Documentation/vm/arch_pgtable_helpers.rst for the semantics
39b1d00007SAnshuman Khandual  * expectations that are being validated here. All future changes in here
40b1d00007SAnshuman Khandual  * or the documentation need to be in sync.
41b1d00007SAnshuman Khandual  */
42b1d00007SAnshuman Khandual 
43399145f9SAnshuman Khandual #define VMFLAGS	(VM_READ|VM_WRITE|VM_EXEC)
44399145f9SAnshuman Khandual 
45399145f9SAnshuman Khandual /*
46399145f9SAnshuman Khandual  * On s390 platform, the lower 4 bits are used to identify given page table
47399145f9SAnshuman Khandual  * entry type. But these bits might affect the ability to clear entries with
48399145f9SAnshuman Khandual  * pxx_clear() because of how dynamic page table folding works on s390. So
49399145f9SAnshuman Khandual  * while loading up the entries do not change the lower 4 bits. It does not
50cfc5bbc4SAneesh Kumar K.V  * have affect any other platform. Also avoid the 62nd bit on ppc64 that is
51cfc5bbc4SAneesh Kumar K.V  * used to mark a pte entry.
52399145f9SAnshuman Khandual  */
53cfc5bbc4SAneesh Kumar K.V #define S390_SKIP_MASK		GENMASK(3, 0)
54cfc5bbc4SAneesh Kumar K.V #if __BITS_PER_LONG == 64
55cfc5bbc4SAneesh Kumar K.V #define PPC64_SKIP_MASK		GENMASK(62, 62)
56cfc5bbc4SAneesh Kumar K.V #else
57cfc5bbc4SAneesh Kumar K.V #define PPC64_SKIP_MASK		0x0
58cfc5bbc4SAneesh Kumar K.V #endif
59cfc5bbc4SAneesh Kumar K.V #define ARCH_SKIP_MASK (S390_SKIP_MASK | PPC64_SKIP_MASK)
60cfc5bbc4SAneesh Kumar K.V #define RANDOM_ORVALUE (GENMASK(BITS_PER_LONG - 1, 0) & ~ARCH_SKIP_MASK)
61399145f9SAnshuman Khandual #define RANDOM_NZVALUE	GENMASK(7, 0)
62399145f9SAnshuman Khandual 
633c9b84f0SGavin Shan struct pgtable_debug_args {
643c9b84f0SGavin Shan 	struct mm_struct	*mm;
653c9b84f0SGavin Shan 	struct vm_area_struct	*vma;
663c9b84f0SGavin Shan 
673c9b84f0SGavin Shan 	pgd_t			*pgdp;
683c9b84f0SGavin Shan 	p4d_t			*p4dp;
693c9b84f0SGavin Shan 	pud_t			*pudp;
703c9b84f0SGavin Shan 	pmd_t			*pmdp;
713c9b84f0SGavin Shan 	pte_t			*ptep;
723c9b84f0SGavin Shan 
733c9b84f0SGavin Shan 	p4d_t			*start_p4dp;
743c9b84f0SGavin Shan 	pud_t			*start_pudp;
753c9b84f0SGavin Shan 	pmd_t			*start_pmdp;
763c9b84f0SGavin Shan 	pgtable_t		start_ptep;
773c9b84f0SGavin Shan 
783c9b84f0SGavin Shan 	unsigned long		vaddr;
793c9b84f0SGavin Shan 	pgprot_t		page_prot;
803c9b84f0SGavin Shan 	pgprot_t		page_prot_none;
813c9b84f0SGavin Shan 
823c9b84f0SGavin Shan 	bool			is_contiguous_page;
833c9b84f0SGavin Shan 	unsigned long		pud_pfn;
843c9b84f0SGavin Shan 	unsigned long		pmd_pfn;
853c9b84f0SGavin Shan 	unsigned long		pte_pfn;
863c9b84f0SGavin Shan 
873c9b84f0SGavin Shan 	unsigned long		fixed_pgd_pfn;
883c9b84f0SGavin Shan 	unsigned long		fixed_p4d_pfn;
893c9b84f0SGavin Shan 	unsigned long		fixed_pud_pfn;
903c9b84f0SGavin Shan 	unsigned long		fixed_pmd_pfn;
913c9b84f0SGavin Shan 	unsigned long		fixed_pte_pfn;
923c9b84f0SGavin Shan };
933c9b84f0SGavin Shan 
9436b77d1eSGavin Shan static void __init pte_basic_tests(struct pgtable_debug_args *args, int idx)
95399145f9SAnshuman Khandual {
962e326c07SAnshuman Khandual 	pgprot_t prot = protection_map[idx];
9736b77d1eSGavin Shan 	pte_t pte = pfn_pte(args->fixed_pte_pfn, prot);
982e326c07SAnshuman Khandual 	unsigned long val = idx, *ptr = &val;
99399145f9SAnshuman Khandual 
1002e326c07SAnshuman Khandual 	pr_debug("Validating PTE basic (%pGv)\n", ptr);
101bb5c47ceSAnshuman Khandual 
102bb5c47ceSAnshuman Khandual 	/*
103bb5c47ceSAnshuman Khandual 	 * This test needs to be executed after the given page table entry
104bb5c47ceSAnshuman Khandual 	 * is created with pfn_pte() to make sure that protection_map[idx]
105bb5c47ceSAnshuman Khandual 	 * does not have the dirty bit enabled from the beginning. This is
106bb5c47ceSAnshuman Khandual 	 * important for platforms like arm64 where (!PTE_RDONLY) indicate
107bb5c47ceSAnshuman Khandual 	 * dirty bit being set.
108bb5c47ceSAnshuman Khandual 	 */
109bb5c47ceSAnshuman Khandual 	WARN_ON(pte_dirty(pte_wrprotect(pte)));
110bb5c47ceSAnshuman Khandual 
111399145f9SAnshuman Khandual 	WARN_ON(!pte_same(pte, pte));
112399145f9SAnshuman Khandual 	WARN_ON(!pte_young(pte_mkyoung(pte_mkold(pte))));
113399145f9SAnshuman Khandual 	WARN_ON(!pte_dirty(pte_mkdirty(pte_mkclean(pte))));
114399145f9SAnshuman Khandual 	WARN_ON(!pte_write(pte_mkwrite(pte_wrprotect(pte))));
115399145f9SAnshuman Khandual 	WARN_ON(pte_young(pte_mkold(pte_mkyoung(pte))));
116399145f9SAnshuman Khandual 	WARN_ON(pte_dirty(pte_mkclean(pte_mkdirty(pte))));
117399145f9SAnshuman Khandual 	WARN_ON(pte_write(pte_wrprotect(pte_mkwrite(pte))));
118bb5c47ceSAnshuman Khandual 	WARN_ON(pte_dirty(pte_wrprotect(pte_mkclean(pte))));
119bb5c47ceSAnshuman Khandual 	WARN_ON(!pte_dirty(pte_wrprotect(pte_mkdirty(pte))));
120399145f9SAnshuman Khandual }
121399145f9SAnshuman Khandual 
12244966c44SGavin Shan static void __init pte_advanced_tests(struct pgtable_debug_args *args)
123a5c3b9ffSAnshuman Khandual {
1248c5b3a8aSGavin Shan 	struct page *page;
125b593b90dSShixin Liu 	pte_t pte;
126a5c3b9ffSAnshuman Khandual 
127c3824e18SAneesh Kumar K.V 	/*
128c3824e18SAneesh Kumar K.V 	 * Architectures optimize set_pte_at by avoiding TLB flush.
129c3824e18SAneesh Kumar K.V 	 * This requires set_pte_at to be not used to update an
130c3824e18SAneesh Kumar K.V 	 * existing pte entry. Clear pte before we do set_pte_at
1318c5b3a8aSGavin Shan 	 *
1328c5b3a8aSGavin Shan 	 * flush_dcache_page() is called after set_pte_at() to clear
1338c5b3a8aSGavin Shan 	 * PG_arch_1 for the page on ARM64. The page flag isn't cleared
1348c5b3a8aSGavin Shan 	 * when it's released and page allocation check will fail when
1358c5b3a8aSGavin Shan 	 * the page is allocated again. For architectures other than ARM64,
1368c5b3a8aSGavin Shan 	 * the unexpected overhead of cache flushing is acceptable.
137c3824e18SAneesh Kumar K.V 	 */
1388c5b3a8aSGavin Shan 	page = (args->pte_pfn != ULONG_MAX) ? pfn_to_page(args->pte_pfn) : NULL;
1398c5b3a8aSGavin Shan 	if (!page)
14044966c44SGavin Shan 		return;
141c3824e18SAneesh Kumar K.V 
1426315df41SAnshuman Khandual 	pr_debug("Validating PTE advanced\n");
14344966c44SGavin Shan 	pte = pfn_pte(args->pte_pfn, args->page_prot);
14444966c44SGavin Shan 	set_pte_at(args->mm, args->vaddr, args->ptep, pte);
1458c5b3a8aSGavin Shan 	flush_dcache_page(page);
14644966c44SGavin Shan 	ptep_set_wrprotect(args->mm, args->vaddr, args->ptep);
14744966c44SGavin Shan 	pte = ptep_get(args->ptep);
148a5c3b9ffSAnshuman Khandual 	WARN_ON(pte_write(pte));
14944966c44SGavin Shan 	ptep_get_and_clear(args->mm, args->vaddr, args->ptep);
15044966c44SGavin Shan 	pte = ptep_get(args->ptep);
151a5c3b9ffSAnshuman Khandual 	WARN_ON(!pte_none(pte));
152a5c3b9ffSAnshuman Khandual 
15344966c44SGavin Shan 	pte = pfn_pte(args->pte_pfn, args->page_prot);
154a5c3b9ffSAnshuman Khandual 	pte = pte_wrprotect(pte);
155a5c3b9ffSAnshuman Khandual 	pte = pte_mkclean(pte);
15644966c44SGavin Shan 	set_pte_at(args->mm, args->vaddr, args->ptep, pte);
1578c5b3a8aSGavin Shan 	flush_dcache_page(page);
158a5c3b9ffSAnshuman Khandual 	pte = pte_mkwrite(pte);
159a5c3b9ffSAnshuman Khandual 	pte = pte_mkdirty(pte);
16044966c44SGavin Shan 	ptep_set_access_flags(args->vma, args->vaddr, args->ptep, pte, 1);
16144966c44SGavin Shan 	pte = ptep_get(args->ptep);
162a5c3b9ffSAnshuman Khandual 	WARN_ON(!(pte_write(pte) && pte_dirty(pte)));
16344966c44SGavin Shan 	ptep_get_and_clear_full(args->mm, args->vaddr, args->ptep, 1);
16444966c44SGavin Shan 	pte = ptep_get(args->ptep);
165a5c3b9ffSAnshuman Khandual 	WARN_ON(!pte_none(pte));
166a5c3b9ffSAnshuman Khandual 
16744966c44SGavin Shan 	pte = pfn_pte(args->pte_pfn, args->page_prot);
168a5c3b9ffSAnshuman Khandual 	pte = pte_mkyoung(pte);
16944966c44SGavin Shan 	set_pte_at(args->mm, args->vaddr, args->ptep, pte);
1708c5b3a8aSGavin Shan 	flush_dcache_page(page);
17144966c44SGavin Shan 	ptep_test_and_clear_young(args->vma, args->vaddr, args->ptep);
17244966c44SGavin Shan 	pte = ptep_get(args->ptep);
173a5c3b9ffSAnshuman Khandual 	WARN_ON(pte_young(pte));
174a5c3b9ffSAnshuman Khandual }
175a5c3b9ffSAnshuman Khandual 
1768983d231SGavin Shan static void __init pte_savedwrite_tests(struct pgtable_debug_args *args)
177a5c3b9ffSAnshuman Khandual {
1788983d231SGavin Shan 	pte_t pte = pfn_pte(args->fixed_pte_pfn, args->page_prot_none);
179a5c3b9ffSAnshuman Khandual 
1804200605bSAneesh Kumar K.V 	if (!IS_ENABLED(CONFIG_NUMA_BALANCING))
1814200605bSAneesh Kumar K.V 		return;
1824200605bSAneesh Kumar K.V 
1836315df41SAnshuman Khandual 	pr_debug("Validating PTE saved write\n");
184a5c3b9ffSAnshuman Khandual 	WARN_ON(!pte_savedwrite(pte_mk_savedwrite(pte_clear_savedwrite(pte))));
185a5c3b9ffSAnshuman Khandual 	WARN_ON(pte_savedwrite(pte_clear_savedwrite(pte_mk_savedwrite(pte))));
186a5c3b9ffSAnshuman Khandual }
1874200605bSAneesh Kumar K.V 
188399145f9SAnshuman Khandual #ifdef CONFIG_TRANSPARENT_HUGEPAGE
18936b77d1eSGavin Shan static void __init pmd_basic_tests(struct pgtable_debug_args *args, int idx)
190399145f9SAnshuman Khandual {
1912e326c07SAnshuman Khandual 	pgprot_t prot = protection_map[idx];
1922e326c07SAnshuman Khandual 	unsigned long val = idx, *ptr = &val;
19365ac1a60SAnshuman Khandual 	pmd_t pmd;
194399145f9SAnshuman Khandual 
195787d563bSAneesh Kumar K.V 	if (!has_transparent_hugepage())
196787d563bSAneesh Kumar K.V 		return;
197787d563bSAneesh Kumar K.V 
1982e326c07SAnshuman Khandual 	pr_debug("Validating PMD basic (%pGv)\n", ptr);
19936b77d1eSGavin Shan 	pmd = pfn_pmd(args->fixed_pmd_pfn, prot);
200bb5c47ceSAnshuman Khandual 
201bb5c47ceSAnshuman Khandual 	/*
202bb5c47ceSAnshuman Khandual 	 * This test needs to be executed after the given page table entry
203bb5c47ceSAnshuman Khandual 	 * is created with pfn_pmd() to make sure that protection_map[idx]
204bb5c47ceSAnshuman Khandual 	 * does not have the dirty bit enabled from the beginning. This is
205bb5c47ceSAnshuman Khandual 	 * important for platforms like arm64 where (!PTE_RDONLY) indicate
206bb5c47ceSAnshuman Khandual 	 * dirty bit being set.
207bb5c47ceSAnshuman Khandual 	 */
208bb5c47ceSAnshuman Khandual 	WARN_ON(pmd_dirty(pmd_wrprotect(pmd)));
209bb5c47ceSAnshuman Khandual 
210bb5c47ceSAnshuman Khandual 
211399145f9SAnshuman Khandual 	WARN_ON(!pmd_same(pmd, pmd));
212399145f9SAnshuman Khandual 	WARN_ON(!pmd_young(pmd_mkyoung(pmd_mkold(pmd))));
213399145f9SAnshuman Khandual 	WARN_ON(!pmd_dirty(pmd_mkdirty(pmd_mkclean(pmd))));
214399145f9SAnshuman Khandual 	WARN_ON(!pmd_write(pmd_mkwrite(pmd_wrprotect(pmd))));
215399145f9SAnshuman Khandual 	WARN_ON(pmd_young(pmd_mkold(pmd_mkyoung(pmd))));
216399145f9SAnshuman Khandual 	WARN_ON(pmd_dirty(pmd_mkclean(pmd_mkdirty(pmd))));
217399145f9SAnshuman Khandual 	WARN_ON(pmd_write(pmd_wrprotect(pmd_mkwrite(pmd))));
218bb5c47ceSAnshuman Khandual 	WARN_ON(pmd_dirty(pmd_wrprotect(pmd_mkclean(pmd))));
219bb5c47ceSAnshuman Khandual 	WARN_ON(!pmd_dirty(pmd_wrprotect(pmd_mkdirty(pmd))));
220399145f9SAnshuman Khandual 	/*
221399145f9SAnshuman Khandual 	 * A huge page does not point to next level page table
222399145f9SAnshuman Khandual 	 * entry. Hence this must qualify as pmd_bad().
223399145f9SAnshuman Khandual 	 */
224399145f9SAnshuman Khandual 	WARN_ON(!pmd_bad(pmd_mkhuge(pmd)));
225399145f9SAnshuman Khandual }
226399145f9SAnshuman Khandual 
227c0fe07b0SGavin Shan static void __init pmd_advanced_tests(struct pgtable_debug_args *args)
228a5c3b9ffSAnshuman Khandual {
2298c5b3a8aSGavin Shan 	struct page *page;
23065ac1a60SAnshuman Khandual 	pmd_t pmd;
231c0fe07b0SGavin Shan 	unsigned long vaddr = args->vaddr;
232a5c3b9ffSAnshuman Khandual 
233a5c3b9ffSAnshuman Khandual 	if (!has_transparent_hugepage())
234a5c3b9ffSAnshuman Khandual 		return;
235a5c3b9ffSAnshuman Khandual 
2368c5b3a8aSGavin Shan 	page = (args->pmd_pfn != ULONG_MAX) ? pfn_to_page(args->pmd_pfn) : NULL;
2378c5b3a8aSGavin Shan 	if (!page)
238c0fe07b0SGavin Shan 		return;
239c0fe07b0SGavin Shan 
2408c5b3a8aSGavin Shan 	/*
2418c5b3a8aSGavin Shan 	 * flush_dcache_page() is called after set_pmd_at() to clear
2428c5b3a8aSGavin Shan 	 * PG_arch_1 for the page on ARM64. The page flag isn't cleared
2438c5b3a8aSGavin Shan 	 * when it's released and page allocation check will fail when
2448c5b3a8aSGavin Shan 	 * the page is allocated again. For architectures other than ARM64,
2458c5b3a8aSGavin Shan 	 * the unexpected overhead of cache flushing is acceptable.
2468c5b3a8aSGavin Shan 	 */
2476315df41SAnshuman Khandual 	pr_debug("Validating PMD advanced\n");
248a5c3b9ffSAnshuman Khandual 	/* Align the address wrt HPAGE_PMD_SIZE */
24904f7ce3fSGerald Schaefer 	vaddr &= HPAGE_PMD_MASK;
250a5c3b9ffSAnshuman Khandual 
251c0fe07b0SGavin Shan 	pgtable_trans_huge_deposit(args->mm, args->pmdp, args->start_ptep);
25287f34986SAneesh Kumar K.V 
253c0fe07b0SGavin Shan 	pmd = pfn_pmd(args->pmd_pfn, args->page_prot);
254c0fe07b0SGavin Shan 	set_pmd_at(args->mm, vaddr, args->pmdp, pmd);
2558c5b3a8aSGavin Shan 	flush_dcache_page(page);
256c0fe07b0SGavin Shan 	pmdp_set_wrprotect(args->mm, vaddr, args->pmdp);
257c0fe07b0SGavin Shan 	pmd = READ_ONCE(*args->pmdp);
258a5c3b9ffSAnshuman Khandual 	WARN_ON(pmd_write(pmd));
259c0fe07b0SGavin Shan 	pmdp_huge_get_and_clear(args->mm, vaddr, args->pmdp);
260c0fe07b0SGavin Shan 	pmd = READ_ONCE(*args->pmdp);
261a5c3b9ffSAnshuman Khandual 	WARN_ON(!pmd_none(pmd));
262a5c3b9ffSAnshuman Khandual 
263c0fe07b0SGavin Shan 	pmd = pfn_pmd(args->pmd_pfn, args->page_prot);
264a5c3b9ffSAnshuman Khandual 	pmd = pmd_wrprotect(pmd);
265a5c3b9ffSAnshuman Khandual 	pmd = pmd_mkclean(pmd);
266c0fe07b0SGavin Shan 	set_pmd_at(args->mm, vaddr, args->pmdp, pmd);
2678c5b3a8aSGavin Shan 	flush_dcache_page(page);
268a5c3b9ffSAnshuman Khandual 	pmd = pmd_mkwrite(pmd);
269a5c3b9ffSAnshuman Khandual 	pmd = pmd_mkdirty(pmd);
270c0fe07b0SGavin Shan 	pmdp_set_access_flags(args->vma, vaddr, args->pmdp, pmd, 1);
271c0fe07b0SGavin Shan 	pmd = READ_ONCE(*args->pmdp);
272a5c3b9ffSAnshuman Khandual 	WARN_ON(!(pmd_write(pmd) && pmd_dirty(pmd)));
273c0fe07b0SGavin Shan 	pmdp_huge_get_and_clear_full(args->vma, vaddr, args->pmdp, 1);
274c0fe07b0SGavin Shan 	pmd = READ_ONCE(*args->pmdp);
275a5c3b9ffSAnshuman Khandual 	WARN_ON(!pmd_none(pmd));
276a5c3b9ffSAnshuman Khandual 
277c0fe07b0SGavin Shan 	pmd = pmd_mkhuge(pfn_pmd(args->pmd_pfn, args->page_prot));
278a5c3b9ffSAnshuman Khandual 	pmd = pmd_mkyoung(pmd);
279c0fe07b0SGavin Shan 	set_pmd_at(args->mm, vaddr, args->pmdp, pmd);
2808c5b3a8aSGavin Shan 	flush_dcache_page(page);
281c0fe07b0SGavin Shan 	pmdp_test_and_clear_young(args->vma, vaddr, args->pmdp);
282c0fe07b0SGavin Shan 	pmd = READ_ONCE(*args->pmdp);
283a5c3b9ffSAnshuman Khandual 	WARN_ON(pmd_young(pmd));
28487f34986SAneesh Kumar K.V 
28513af0506SAneesh Kumar K.V 	/*  Clear the pte entries  */
286c0fe07b0SGavin Shan 	pmdp_huge_get_and_clear(args->mm, vaddr, args->pmdp);
287c0fe07b0SGavin Shan 	pgtable_trans_huge_withdraw(args->mm, args->pmdp);
288a5c3b9ffSAnshuman Khandual }
289a5c3b9ffSAnshuman Khandual 
2908983d231SGavin Shan static void __init pmd_leaf_tests(struct pgtable_debug_args *args)
291a5c3b9ffSAnshuman Khandual {
29265ac1a60SAnshuman Khandual 	pmd_t pmd;
29365ac1a60SAnshuman Khandual 
29465ac1a60SAnshuman Khandual 	if (!has_transparent_hugepage())
29565ac1a60SAnshuman Khandual 		return;
296a5c3b9ffSAnshuman Khandual 
2976315df41SAnshuman Khandual 	pr_debug("Validating PMD leaf\n");
2988983d231SGavin Shan 	pmd = pfn_pmd(args->fixed_pmd_pfn, args->page_prot);
29965ac1a60SAnshuman Khandual 
300a5c3b9ffSAnshuman Khandual 	/*
301a5c3b9ffSAnshuman Khandual 	 * PMD based THP is a leaf entry.
302a5c3b9ffSAnshuman Khandual 	 */
303a5c3b9ffSAnshuman Khandual 	pmd = pmd_mkhuge(pmd);
304a5c3b9ffSAnshuman Khandual 	WARN_ON(!pmd_leaf(pmd));
305a5c3b9ffSAnshuman Khandual }
306a5c3b9ffSAnshuman Khandual 
3078983d231SGavin Shan static void __init pmd_savedwrite_tests(struct pgtable_debug_args *args)
308a5c3b9ffSAnshuman Khandual {
30965ac1a60SAnshuman Khandual 	pmd_t pmd;
310a5c3b9ffSAnshuman Khandual 
3114200605bSAneesh Kumar K.V 	if (!IS_ENABLED(CONFIG_NUMA_BALANCING))
3124200605bSAneesh Kumar K.V 		return;
3134200605bSAneesh Kumar K.V 
31465ac1a60SAnshuman Khandual 	if (!has_transparent_hugepage())
31565ac1a60SAnshuman Khandual 		return;
31665ac1a60SAnshuman Khandual 
3176315df41SAnshuman Khandual 	pr_debug("Validating PMD saved write\n");
3188983d231SGavin Shan 	pmd = pfn_pmd(args->fixed_pmd_pfn, args->page_prot_none);
319a5c3b9ffSAnshuman Khandual 	WARN_ON(!pmd_savedwrite(pmd_mk_savedwrite(pmd_clear_savedwrite(pmd))));
320a5c3b9ffSAnshuman Khandual 	WARN_ON(pmd_savedwrite(pmd_clear_savedwrite(pmd_mk_savedwrite(pmd))));
321a5c3b9ffSAnshuman Khandual }
322a5c3b9ffSAnshuman Khandual 
323399145f9SAnshuman Khandual #ifdef CONFIG_HAVE_ARCH_TRANSPARENT_HUGEPAGE_PUD
32436b77d1eSGavin Shan static void __init pud_basic_tests(struct pgtable_debug_args *args, int idx)
325399145f9SAnshuman Khandual {
3262e326c07SAnshuman Khandual 	pgprot_t prot = protection_map[idx];
3272e326c07SAnshuman Khandual 	unsigned long val = idx, *ptr = &val;
32865ac1a60SAnshuman Khandual 	pud_t pud;
329399145f9SAnshuman Khandual 
330787d563bSAneesh Kumar K.V 	if (!has_transparent_hugepage())
331787d563bSAneesh Kumar K.V 		return;
332787d563bSAneesh Kumar K.V 
3332e326c07SAnshuman Khandual 	pr_debug("Validating PUD basic (%pGv)\n", ptr);
33436b77d1eSGavin Shan 	pud = pfn_pud(args->fixed_pud_pfn, prot);
335bb5c47ceSAnshuman Khandual 
336bb5c47ceSAnshuman Khandual 	/*
337bb5c47ceSAnshuman Khandual 	 * This test needs to be executed after the given page table entry
338bb5c47ceSAnshuman Khandual 	 * is created with pfn_pud() to make sure that protection_map[idx]
339bb5c47ceSAnshuman Khandual 	 * does not have the dirty bit enabled from the beginning. This is
340bb5c47ceSAnshuman Khandual 	 * important for platforms like arm64 where (!PTE_RDONLY) indicate
341bb5c47ceSAnshuman Khandual 	 * dirty bit being set.
342bb5c47ceSAnshuman Khandual 	 */
343bb5c47ceSAnshuman Khandual 	WARN_ON(pud_dirty(pud_wrprotect(pud)));
344bb5c47ceSAnshuman Khandual 
345399145f9SAnshuman Khandual 	WARN_ON(!pud_same(pud, pud));
346399145f9SAnshuman Khandual 	WARN_ON(!pud_young(pud_mkyoung(pud_mkold(pud))));
347bb5c47ceSAnshuman Khandual 	WARN_ON(!pud_dirty(pud_mkdirty(pud_mkclean(pud))));
348bb5c47ceSAnshuman Khandual 	WARN_ON(pud_dirty(pud_mkclean(pud_mkdirty(pud))));
349399145f9SAnshuman Khandual 	WARN_ON(!pud_write(pud_mkwrite(pud_wrprotect(pud))));
350399145f9SAnshuman Khandual 	WARN_ON(pud_write(pud_wrprotect(pud_mkwrite(pud))));
351399145f9SAnshuman Khandual 	WARN_ON(pud_young(pud_mkold(pud_mkyoung(pud))));
352bb5c47ceSAnshuman Khandual 	WARN_ON(pud_dirty(pud_wrprotect(pud_mkclean(pud))));
353bb5c47ceSAnshuman Khandual 	WARN_ON(!pud_dirty(pud_wrprotect(pud_mkdirty(pud))));
354399145f9SAnshuman Khandual 
35536b77d1eSGavin Shan 	if (mm_pmd_folded(args->mm))
356399145f9SAnshuman Khandual 		return;
357399145f9SAnshuman Khandual 
358399145f9SAnshuman Khandual 	/*
359399145f9SAnshuman Khandual 	 * A huge page does not point to next level page table
360399145f9SAnshuman Khandual 	 * entry. Hence this must qualify as pud_bad().
361399145f9SAnshuman Khandual 	 */
362399145f9SAnshuman Khandual 	WARN_ON(!pud_bad(pud_mkhuge(pud)));
363399145f9SAnshuman Khandual }
364a5c3b9ffSAnshuman Khandual 
3654cbde03bSGavin Shan static void __init pud_advanced_tests(struct pgtable_debug_args *args)
366a5c3b9ffSAnshuman Khandual {
3678c5b3a8aSGavin Shan 	struct page *page;
3684cbde03bSGavin Shan 	unsigned long vaddr = args->vaddr;
36965ac1a60SAnshuman Khandual 	pud_t pud;
370a5c3b9ffSAnshuman Khandual 
371a5c3b9ffSAnshuman Khandual 	if (!has_transparent_hugepage())
372a5c3b9ffSAnshuman Khandual 		return;
373a5c3b9ffSAnshuman Khandual 
3748c5b3a8aSGavin Shan 	page = (args->pud_pfn != ULONG_MAX) ? pfn_to_page(args->pud_pfn) : NULL;
3758c5b3a8aSGavin Shan 	if (!page)
3764cbde03bSGavin Shan 		return;
3774cbde03bSGavin Shan 
3788c5b3a8aSGavin Shan 	/*
3798c5b3a8aSGavin Shan 	 * flush_dcache_page() is called after set_pud_at() to clear
3808c5b3a8aSGavin Shan 	 * PG_arch_1 for the page on ARM64. The page flag isn't cleared
3818c5b3a8aSGavin Shan 	 * when it's released and page allocation check will fail when
3828c5b3a8aSGavin Shan 	 * the page is allocated again. For architectures other than ARM64,
3838c5b3a8aSGavin Shan 	 * the unexpected overhead of cache flushing is acceptable.
3848c5b3a8aSGavin Shan 	 */
3856315df41SAnshuman Khandual 	pr_debug("Validating PUD advanced\n");
386a5c3b9ffSAnshuman Khandual 	/* Align the address wrt HPAGE_PUD_SIZE */
38704f7ce3fSGerald Schaefer 	vaddr &= HPAGE_PUD_MASK;
388a5c3b9ffSAnshuman Khandual 
3894cbde03bSGavin Shan 	pud = pfn_pud(args->pud_pfn, args->page_prot);
3904cbde03bSGavin Shan 	set_pud_at(args->mm, vaddr, args->pudp, pud);
3918c5b3a8aSGavin Shan 	flush_dcache_page(page);
3924cbde03bSGavin Shan 	pudp_set_wrprotect(args->mm, vaddr, args->pudp);
3934cbde03bSGavin Shan 	pud = READ_ONCE(*args->pudp);
394a5c3b9ffSAnshuman Khandual 	WARN_ON(pud_write(pud));
395a5c3b9ffSAnshuman Khandual 
396a5c3b9ffSAnshuman Khandual #ifndef __PAGETABLE_PMD_FOLDED
3974cbde03bSGavin Shan 	pudp_huge_get_and_clear(args->mm, vaddr, args->pudp);
3984cbde03bSGavin Shan 	pud = READ_ONCE(*args->pudp);
399a5c3b9ffSAnshuman Khandual 	WARN_ON(!pud_none(pud));
400a5c3b9ffSAnshuman Khandual #endif /* __PAGETABLE_PMD_FOLDED */
4014cbde03bSGavin Shan 	pud = pfn_pud(args->pud_pfn, args->page_prot);
402a5c3b9ffSAnshuman Khandual 	pud = pud_wrprotect(pud);
403a5c3b9ffSAnshuman Khandual 	pud = pud_mkclean(pud);
4044cbde03bSGavin Shan 	set_pud_at(args->mm, vaddr, args->pudp, pud);
4058c5b3a8aSGavin Shan 	flush_dcache_page(page);
406a5c3b9ffSAnshuman Khandual 	pud = pud_mkwrite(pud);
407a5c3b9ffSAnshuman Khandual 	pud = pud_mkdirty(pud);
4084cbde03bSGavin Shan 	pudp_set_access_flags(args->vma, vaddr, args->pudp, pud, 1);
4094cbde03bSGavin Shan 	pud = READ_ONCE(*args->pudp);
410a5c3b9ffSAnshuman Khandual 	WARN_ON(!(pud_write(pud) && pud_dirty(pud)));
411a5c3b9ffSAnshuman Khandual 
412c3824e18SAneesh Kumar K.V #ifndef __PAGETABLE_PMD_FOLDED
4134cbde03bSGavin Shan 	pudp_huge_get_and_clear_full(args->mm, vaddr, args->pudp, 1);
4144cbde03bSGavin Shan 	pud = READ_ONCE(*args->pudp);
415c3824e18SAneesh Kumar K.V 	WARN_ON(!pud_none(pud));
416c3824e18SAneesh Kumar K.V #endif /* __PAGETABLE_PMD_FOLDED */
417c3824e18SAneesh Kumar K.V 
4184cbde03bSGavin Shan 	pud = pfn_pud(args->pud_pfn, args->page_prot);
419a5c3b9ffSAnshuman Khandual 	pud = pud_mkyoung(pud);
4204cbde03bSGavin Shan 	set_pud_at(args->mm, vaddr, args->pudp, pud);
4218c5b3a8aSGavin Shan 	flush_dcache_page(page);
4224cbde03bSGavin Shan 	pudp_test_and_clear_young(args->vma, vaddr, args->pudp);
4234cbde03bSGavin Shan 	pud = READ_ONCE(*args->pudp);
424a5c3b9ffSAnshuman Khandual 	WARN_ON(pud_young(pud));
42513af0506SAneesh Kumar K.V 
4264cbde03bSGavin Shan 	pudp_huge_get_and_clear(args->mm, vaddr, args->pudp);
427a5c3b9ffSAnshuman Khandual }
428a5c3b9ffSAnshuman Khandual 
4298983d231SGavin Shan static void __init pud_leaf_tests(struct pgtable_debug_args *args)
430a5c3b9ffSAnshuman Khandual {
43165ac1a60SAnshuman Khandual 	pud_t pud;
43265ac1a60SAnshuman Khandual 
43365ac1a60SAnshuman Khandual 	if (!has_transparent_hugepage())
43465ac1a60SAnshuman Khandual 		return;
435a5c3b9ffSAnshuman Khandual 
4366315df41SAnshuman Khandual 	pr_debug("Validating PUD leaf\n");
4378983d231SGavin Shan 	pud = pfn_pud(args->fixed_pud_pfn, args->page_prot);
438a5c3b9ffSAnshuman Khandual 	/*
439a5c3b9ffSAnshuman Khandual 	 * PUD based THP is a leaf entry.
440a5c3b9ffSAnshuman Khandual 	 */
441a5c3b9ffSAnshuman Khandual 	pud = pud_mkhuge(pud);
442a5c3b9ffSAnshuman Khandual 	WARN_ON(!pud_leaf(pud));
443a5c3b9ffSAnshuman Khandual }
4445fe77be6SShixin Liu #else  /* !CONFIG_HAVE_ARCH_TRANSPARENT_HUGEPAGE_PUD */
44536b77d1eSGavin Shan static void __init pud_basic_tests(struct pgtable_debug_args *args, int idx) { }
4464cbde03bSGavin Shan static void __init pud_advanced_tests(struct pgtable_debug_args *args) { }
4478983d231SGavin Shan static void __init pud_leaf_tests(struct pgtable_debug_args *args) { }
4485fe77be6SShixin Liu #endif /* CONFIG_HAVE_ARCH_TRANSPARENT_HUGEPAGE_PUD */
4495fe77be6SShixin Liu #else  /* !CONFIG_TRANSPARENT_HUGEPAGE */
45036b77d1eSGavin Shan static void __init pmd_basic_tests(struct pgtable_debug_args *args, int idx) { }
45136b77d1eSGavin Shan static void __init pud_basic_tests(struct pgtable_debug_args *args, int idx) { }
452c0fe07b0SGavin Shan static void __init pmd_advanced_tests(struct pgtable_debug_args *args) { }
4534cbde03bSGavin Shan static void __init pud_advanced_tests(struct pgtable_debug_args *args) { }
4548983d231SGavin Shan static void __init pmd_leaf_tests(struct pgtable_debug_args *args) { }
4558983d231SGavin Shan static void __init pud_leaf_tests(struct pgtable_debug_args *args) { }
4568983d231SGavin Shan static void __init pmd_savedwrite_tests(struct pgtable_debug_args *args) { }
4575fe77be6SShixin Liu #endif /* CONFIG_TRANSPARENT_HUGEPAGE */
458a5c3b9ffSAnshuman Khandual 
45985a14463SAneesh Kumar K.V #ifdef CONFIG_HAVE_ARCH_HUGE_VMAP
460c0fe07b0SGavin Shan static void __init pmd_huge_tests(struct pgtable_debug_args *args)
4615fe77be6SShixin Liu {
4625fe77be6SShixin Liu 	pmd_t pmd;
4635fe77be6SShixin Liu 
464c0fe07b0SGavin Shan 	if (!arch_vmap_pmd_supported(args->page_prot))
4655fe77be6SShixin Liu 		return;
4665fe77be6SShixin Liu 
4675fe77be6SShixin Liu 	pr_debug("Validating PMD huge\n");
4685fe77be6SShixin Liu 	/*
4695fe77be6SShixin Liu 	 * X86 defined pmd_set_huge() verifies that the given
4705fe77be6SShixin Liu 	 * PMD is not a populated non-leaf entry.
4715fe77be6SShixin Liu 	 */
472c0fe07b0SGavin Shan 	WRITE_ONCE(*args->pmdp, __pmd(0));
473c0fe07b0SGavin Shan 	WARN_ON(!pmd_set_huge(args->pmdp, __pfn_to_phys(args->fixed_pmd_pfn), args->page_prot));
474c0fe07b0SGavin Shan 	WARN_ON(!pmd_clear_huge(args->pmdp));
475c0fe07b0SGavin Shan 	pmd = READ_ONCE(*args->pmdp);
4765fe77be6SShixin Liu 	WARN_ON(!pmd_none(pmd));
4775fe77be6SShixin Liu }
4785fe77be6SShixin Liu 
4794cbde03bSGavin Shan static void __init pud_huge_tests(struct pgtable_debug_args *args)
480a5c3b9ffSAnshuman Khandual {
481a5c3b9ffSAnshuman Khandual 	pud_t pud;
482a5c3b9ffSAnshuman Khandual 
4834cbde03bSGavin Shan 	if (!arch_vmap_pud_supported(args->page_prot))
484a5c3b9ffSAnshuman Khandual 		return;
4856315df41SAnshuman Khandual 
4866315df41SAnshuman Khandual 	pr_debug("Validating PUD huge\n");
487a5c3b9ffSAnshuman Khandual 	/*
488a5c3b9ffSAnshuman Khandual 	 * X86 defined pud_set_huge() verifies that the given
489a5c3b9ffSAnshuman Khandual 	 * PUD is not a populated non-leaf entry.
490a5c3b9ffSAnshuman Khandual 	 */
4914cbde03bSGavin Shan 	WRITE_ONCE(*args->pudp, __pud(0));
4924cbde03bSGavin Shan 	WARN_ON(!pud_set_huge(args->pudp, __pfn_to_phys(args->fixed_pud_pfn), args->page_prot));
4934cbde03bSGavin Shan 	WARN_ON(!pud_clear_huge(args->pudp));
4944cbde03bSGavin Shan 	pud = READ_ONCE(*args->pudp);
495a5c3b9ffSAnshuman Khandual 	WARN_ON(!pud_none(pud));
496a5c3b9ffSAnshuman Khandual }
49785a14463SAneesh Kumar K.V #else /* !CONFIG_HAVE_ARCH_HUGE_VMAP */
498c0fe07b0SGavin Shan static void __init pmd_huge_tests(struct pgtable_debug_args *args) { }
4994cbde03bSGavin Shan static void __init pud_huge_tests(struct pgtable_debug_args *args) { }
5005fe77be6SShixin Liu #endif /* CONFIG_HAVE_ARCH_HUGE_VMAP */
501399145f9SAnshuman Khandual 
50236b77d1eSGavin Shan static void __init p4d_basic_tests(struct pgtable_debug_args *args)
503399145f9SAnshuman Khandual {
504399145f9SAnshuman Khandual 	p4d_t p4d;
505399145f9SAnshuman Khandual 
5066315df41SAnshuman Khandual 	pr_debug("Validating P4D basic\n");
507399145f9SAnshuman Khandual 	memset(&p4d, RANDOM_NZVALUE, sizeof(p4d_t));
508399145f9SAnshuman Khandual 	WARN_ON(!p4d_same(p4d, p4d));
509399145f9SAnshuman Khandual }
510399145f9SAnshuman Khandual 
51136b77d1eSGavin Shan static void __init pgd_basic_tests(struct pgtable_debug_args *args)
512399145f9SAnshuman Khandual {
513399145f9SAnshuman Khandual 	pgd_t pgd;
514399145f9SAnshuman Khandual 
5156315df41SAnshuman Khandual 	pr_debug("Validating PGD basic\n");
516399145f9SAnshuman Khandual 	memset(&pgd, RANDOM_NZVALUE, sizeof(pgd_t));
517399145f9SAnshuman Khandual 	WARN_ON(!pgd_same(pgd, pgd));
518399145f9SAnshuman Khandual }
519399145f9SAnshuman Khandual 
520399145f9SAnshuman Khandual #ifndef __PAGETABLE_PUD_FOLDED
5214cbde03bSGavin Shan static void __init pud_clear_tests(struct pgtable_debug_args *args)
522399145f9SAnshuman Khandual {
5234cbde03bSGavin Shan 	pud_t pud = READ_ONCE(*args->pudp);
524399145f9SAnshuman Khandual 
5254cbde03bSGavin Shan 	if (mm_pmd_folded(args->mm))
526399145f9SAnshuman Khandual 		return;
527399145f9SAnshuman Khandual 
5286315df41SAnshuman Khandual 	pr_debug("Validating PUD clear\n");
529399145f9SAnshuman Khandual 	pud = __pud(pud_val(pud) | RANDOM_ORVALUE);
5304cbde03bSGavin Shan 	WRITE_ONCE(*args->pudp, pud);
5314cbde03bSGavin Shan 	pud_clear(args->pudp);
5324cbde03bSGavin Shan 	pud = READ_ONCE(*args->pudp);
533399145f9SAnshuman Khandual 	WARN_ON(!pud_none(pud));
534399145f9SAnshuman Khandual }
535399145f9SAnshuman Khandual 
5364cbde03bSGavin Shan static void __init pud_populate_tests(struct pgtable_debug_args *args)
537399145f9SAnshuman Khandual {
538399145f9SAnshuman Khandual 	pud_t pud;
539399145f9SAnshuman Khandual 
5404cbde03bSGavin Shan 	if (mm_pmd_folded(args->mm))
541399145f9SAnshuman Khandual 		return;
5426315df41SAnshuman Khandual 
5436315df41SAnshuman Khandual 	pr_debug("Validating PUD populate\n");
544399145f9SAnshuman Khandual 	/*
545399145f9SAnshuman Khandual 	 * This entry points to next level page table page.
546399145f9SAnshuman Khandual 	 * Hence this must not qualify as pud_bad().
547399145f9SAnshuman Khandual 	 */
5484cbde03bSGavin Shan 	pud_populate(args->mm, args->pudp, args->start_pmdp);
5494cbde03bSGavin Shan 	pud = READ_ONCE(*args->pudp);
550399145f9SAnshuman Khandual 	WARN_ON(pud_bad(pud));
551399145f9SAnshuman Khandual }
552399145f9SAnshuman Khandual #else  /* !__PAGETABLE_PUD_FOLDED */
5534cbde03bSGavin Shan static void __init pud_clear_tests(struct pgtable_debug_args *args) { }
5544cbde03bSGavin Shan static void __init pud_populate_tests(struct pgtable_debug_args *args) { }
555399145f9SAnshuman Khandual #endif /* PAGETABLE_PUD_FOLDED */
556399145f9SAnshuman Khandual 
557399145f9SAnshuman Khandual #ifndef __PAGETABLE_P4D_FOLDED
5582f87f8c3SGavin Shan static void __init p4d_clear_tests(struct pgtable_debug_args *args)
559399145f9SAnshuman Khandual {
5602f87f8c3SGavin Shan 	p4d_t p4d = READ_ONCE(*args->p4dp);
561399145f9SAnshuman Khandual 
5622f87f8c3SGavin Shan 	if (mm_pud_folded(args->mm))
563399145f9SAnshuman Khandual 		return;
564399145f9SAnshuman Khandual 
5656315df41SAnshuman Khandual 	pr_debug("Validating P4D clear\n");
566399145f9SAnshuman Khandual 	p4d = __p4d(p4d_val(p4d) | RANDOM_ORVALUE);
5672f87f8c3SGavin Shan 	WRITE_ONCE(*args->p4dp, p4d);
5682f87f8c3SGavin Shan 	p4d_clear(args->p4dp);
5692f87f8c3SGavin Shan 	p4d = READ_ONCE(*args->p4dp);
570399145f9SAnshuman Khandual 	WARN_ON(!p4d_none(p4d));
571399145f9SAnshuman Khandual }
572399145f9SAnshuman Khandual 
5732f87f8c3SGavin Shan static void __init p4d_populate_tests(struct pgtable_debug_args *args)
574399145f9SAnshuman Khandual {
575399145f9SAnshuman Khandual 	p4d_t p4d;
576399145f9SAnshuman Khandual 
5772f87f8c3SGavin Shan 	if (mm_pud_folded(args->mm))
578399145f9SAnshuman Khandual 		return;
579399145f9SAnshuman Khandual 
5806315df41SAnshuman Khandual 	pr_debug("Validating P4D populate\n");
581399145f9SAnshuman Khandual 	/*
582399145f9SAnshuman Khandual 	 * This entry points to next level page table page.
583399145f9SAnshuman Khandual 	 * Hence this must not qualify as p4d_bad().
584399145f9SAnshuman Khandual 	 */
5852f87f8c3SGavin Shan 	pud_clear(args->pudp);
5862f87f8c3SGavin Shan 	p4d_clear(args->p4dp);
5872f87f8c3SGavin Shan 	p4d_populate(args->mm, args->p4dp, args->start_pudp);
5882f87f8c3SGavin Shan 	p4d = READ_ONCE(*args->p4dp);
589399145f9SAnshuman Khandual 	WARN_ON(p4d_bad(p4d));
590399145f9SAnshuman Khandual }
591399145f9SAnshuman Khandual 
5922f87f8c3SGavin Shan static void __init pgd_clear_tests(struct pgtable_debug_args *args)
593399145f9SAnshuman Khandual {
5942f87f8c3SGavin Shan 	pgd_t pgd = READ_ONCE(*(args->pgdp));
595399145f9SAnshuman Khandual 
5962f87f8c3SGavin Shan 	if (mm_p4d_folded(args->mm))
597399145f9SAnshuman Khandual 		return;
598399145f9SAnshuman Khandual 
5996315df41SAnshuman Khandual 	pr_debug("Validating PGD clear\n");
600399145f9SAnshuman Khandual 	pgd = __pgd(pgd_val(pgd) | RANDOM_ORVALUE);
6012f87f8c3SGavin Shan 	WRITE_ONCE(*args->pgdp, pgd);
6022f87f8c3SGavin Shan 	pgd_clear(args->pgdp);
6032f87f8c3SGavin Shan 	pgd = READ_ONCE(*args->pgdp);
604399145f9SAnshuman Khandual 	WARN_ON(!pgd_none(pgd));
605399145f9SAnshuman Khandual }
606399145f9SAnshuman Khandual 
6072f87f8c3SGavin Shan static void __init pgd_populate_tests(struct pgtable_debug_args *args)
608399145f9SAnshuman Khandual {
609399145f9SAnshuman Khandual 	pgd_t pgd;
610399145f9SAnshuman Khandual 
6112f87f8c3SGavin Shan 	if (mm_p4d_folded(args->mm))
612399145f9SAnshuman Khandual 		return;
613399145f9SAnshuman Khandual 
6146315df41SAnshuman Khandual 	pr_debug("Validating PGD populate\n");
615399145f9SAnshuman Khandual 	/*
616399145f9SAnshuman Khandual 	 * This entry points to next level page table page.
617399145f9SAnshuman Khandual 	 * Hence this must not qualify as pgd_bad().
618399145f9SAnshuman Khandual 	 */
6192f87f8c3SGavin Shan 	p4d_clear(args->p4dp);
6202f87f8c3SGavin Shan 	pgd_clear(args->pgdp);
6212f87f8c3SGavin Shan 	pgd_populate(args->mm, args->pgdp, args->start_p4dp);
6222f87f8c3SGavin Shan 	pgd = READ_ONCE(*args->pgdp);
623399145f9SAnshuman Khandual 	WARN_ON(pgd_bad(pgd));
624399145f9SAnshuman Khandual }
625399145f9SAnshuman Khandual #else  /* !__PAGETABLE_P4D_FOLDED */
6262f87f8c3SGavin Shan static void __init p4d_clear_tests(struct pgtable_debug_args *args) { }
6272f87f8c3SGavin Shan static void __init pgd_clear_tests(struct pgtable_debug_args *args) { }
6282f87f8c3SGavin Shan static void __init p4d_populate_tests(struct pgtable_debug_args *args) { }
6292f87f8c3SGavin Shan static void __init pgd_populate_tests(struct pgtable_debug_args *args) { }
630399145f9SAnshuman Khandual #endif /* PAGETABLE_P4D_FOLDED */
631399145f9SAnshuman Khandual 
63244966c44SGavin Shan static void __init pte_clear_tests(struct pgtable_debug_args *args)
633399145f9SAnshuman Khandual {
6348c5b3a8aSGavin Shan 	struct page *page;
63544966c44SGavin Shan 	pte_t pte = pfn_pte(args->pte_pfn, args->page_prot);
63644966c44SGavin Shan 
6378c5b3a8aSGavin Shan 	page = (args->pte_pfn != ULONG_MAX) ? pfn_to_page(args->pte_pfn) : NULL;
6388c5b3a8aSGavin Shan 	if (!page)
63944966c44SGavin Shan 		return;
640399145f9SAnshuman Khandual 
6418c5b3a8aSGavin Shan 	/*
6428c5b3a8aSGavin Shan 	 * flush_dcache_page() is called after set_pte_at() to clear
6438c5b3a8aSGavin Shan 	 * PG_arch_1 for the page on ARM64. The page flag isn't cleared
6448c5b3a8aSGavin Shan 	 * when it's released and page allocation check will fail when
6458c5b3a8aSGavin Shan 	 * the page is allocated again. For architectures other than ARM64,
6468c5b3a8aSGavin Shan 	 * the unexpected overhead of cache flushing is acceptable.
6478c5b3a8aSGavin Shan 	 */
6486315df41SAnshuman Khandual 	pr_debug("Validating PTE clear\n");
649401035d5SAneesh Kumar K.V #ifndef CONFIG_RISCV
650399145f9SAnshuman Khandual 	pte = __pte(pte_val(pte) | RANDOM_ORVALUE);
651401035d5SAneesh Kumar K.V #endif
65244966c44SGavin Shan 	set_pte_at(args->mm, args->vaddr, args->ptep, pte);
6538c5b3a8aSGavin Shan 	flush_dcache_page(page);
654399145f9SAnshuman Khandual 	barrier();
655*08d5b29eSPasha Tatashin 	ptep_clear(args->mm, args->vaddr, args->ptep);
65644966c44SGavin Shan 	pte = ptep_get(args->ptep);
657399145f9SAnshuman Khandual 	WARN_ON(!pte_none(pte));
658399145f9SAnshuman Khandual }
659399145f9SAnshuman Khandual 
660c0fe07b0SGavin Shan static void __init pmd_clear_tests(struct pgtable_debug_args *args)
661399145f9SAnshuman Khandual {
662c0fe07b0SGavin Shan 	pmd_t pmd = READ_ONCE(*args->pmdp);
663399145f9SAnshuman Khandual 
6646315df41SAnshuman Khandual 	pr_debug("Validating PMD clear\n");
665399145f9SAnshuman Khandual 	pmd = __pmd(pmd_val(pmd) | RANDOM_ORVALUE);
666c0fe07b0SGavin Shan 	WRITE_ONCE(*args->pmdp, pmd);
667c0fe07b0SGavin Shan 	pmd_clear(args->pmdp);
668c0fe07b0SGavin Shan 	pmd = READ_ONCE(*args->pmdp);
669399145f9SAnshuman Khandual 	WARN_ON(!pmd_none(pmd));
670399145f9SAnshuman Khandual }
671399145f9SAnshuman Khandual 
672c0fe07b0SGavin Shan static void __init pmd_populate_tests(struct pgtable_debug_args *args)
673399145f9SAnshuman Khandual {
674399145f9SAnshuman Khandual 	pmd_t pmd;
675399145f9SAnshuman Khandual 
6766315df41SAnshuman Khandual 	pr_debug("Validating PMD populate\n");
677399145f9SAnshuman Khandual 	/*
678399145f9SAnshuman Khandual 	 * This entry points to next level page table page.
679399145f9SAnshuman Khandual 	 * Hence this must not qualify as pmd_bad().
680399145f9SAnshuman Khandual 	 */
681c0fe07b0SGavin Shan 	pmd_populate(args->mm, args->pmdp, args->start_ptep);
682c0fe07b0SGavin Shan 	pmd = READ_ONCE(*args->pmdp);
683399145f9SAnshuman Khandual 	WARN_ON(pmd_bad(pmd));
684399145f9SAnshuman Khandual }
685399145f9SAnshuman Khandual 
6868cb183f2SGavin Shan static void __init pte_special_tests(struct pgtable_debug_args *args)
68705289402SAnshuman Khandual {
6888cb183f2SGavin Shan 	pte_t pte = pfn_pte(args->fixed_pte_pfn, args->page_prot);
68905289402SAnshuman Khandual 
69005289402SAnshuman Khandual 	if (!IS_ENABLED(CONFIG_ARCH_HAS_PTE_SPECIAL))
69105289402SAnshuman Khandual 		return;
69205289402SAnshuman Khandual 
6936315df41SAnshuman Khandual 	pr_debug("Validating PTE special\n");
69405289402SAnshuman Khandual 	WARN_ON(!pte_special(pte_mkspecial(pte)));
69505289402SAnshuman Khandual }
69605289402SAnshuman Khandual 
6978cb183f2SGavin Shan static void __init pte_protnone_tests(struct pgtable_debug_args *args)
69805289402SAnshuman Khandual {
6998cb183f2SGavin Shan 	pte_t pte = pfn_pte(args->fixed_pte_pfn, args->page_prot_none);
70005289402SAnshuman Khandual 
70105289402SAnshuman Khandual 	if (!IS_ENABLED(CONFIG_NUMA_BALANCING))
70205289402SAnshuman Khandual 		return;
70305289402SAnshuman Khandual 
7046315df41SAnshuman Khandual 	pr_debug("Validating PTE protnone\n");
70505289402SAnshuman Khandual 	WARN_ON(!pte_protnone(pte));
70605289402SAnshuman Khandual 	WARN_ON(!pte_present(pte));
70705289402SAnshuman Khandual }
70805289402SAnshuman Khandual 
70905289402SAnshuman Khandual #ifdef CONFIG_TRANSPARENT_HUGEPAGE
7108cb183f2SGavin Shan static void __init pmd_protnone_tests(struct pgtable_debug_args *args)
71105289402SAnshuman Khandual {
71265ac1a60SAnshuman Khandual 	pmd_t pmd;
71305289402SAnshuman Khandual 
71405289402SAnshuman Khandual 	if (!IS_ENABLED(CONFIG_NUMA_BALANCING))
71505289402SAnshuman Khandual 		return;
71605289402SAnshuman Khandual 
71765ac1a60SAnshuman Khandual 	if (!has_transparent_hugepage())
71865ac1a60SAnshuman Khandual 		return;
71965ac1a60SAnshuman Khandual 
7206315df41SAnshuman Khandual 	pr_debug("Validating PMD protnone\n");
7218cb183f2SGavin Shan 	pmd = pmd_mkhuge(pfn_pmd(args->fixed_pmd_pfn, args->page_prot_none));
72205289402SAnshuman Khandual 	WARN_ON(!pmd_protnone(pmd));
72305289402SAnshuman Khandual 	WARN_ON(!pmd_present(pmd));
72405289402SAnshuman Khandual }
72505289402SAnshuman Khandual #else  /* !CONFIG_TRANSPARENT_HUGEPAGE */
7268cb183f2SGavin Shan static void __init pmd_protnone_tests(struct pgtable_debug_args *args) { }
72705289402SAnshuman Khandual #endif /* CONFIG_TRANSPARENT_HUGEPAGE */
72805289402SAnshuman Khandual 
72905289402SAnshuman Khandual #ifdef CONFIG_ARCH_HAS_PTE_DEVMAP
7308cb183f2SGavin Shan static void __init pte_devmap_tests(struct pgtable_debug_args *args)
73105289402SAnshuman Khandual {
7328cb183f2SGavin Shan 	pte_t pte = pfn_pte(args->fixed_pte_pfn, args->page_prot);
73305289402SAnshuman Khandual 
7346315df41SAnshuman Khandual 	pr_debug("Validating PTE devmap\n");
73505289402SAnshuman Khandual 	WARN_ON(!pte_devmap(pte_mkdevmap(pte)));
73605289402SAnshuman Khandual }
73705289402SAnshuman Khandual 
73805289402SAnshuman Khandual #ifdef CONFIG_TRANSPARENT_HUGEPAGE
7398cb183f2SGavin Shan static void __init pmd_devmap_tests(struct pgtable_debug_args *args)
74005289402SAnshuman Khandual {
74165ac1a60SAnshuman Khandual 	pmd_t pmd;
74265ac1a60SAnshuman Khandual 
74365ac1a60SAnshuman Khandual 	if (!has_transparent_hugepage())
74465ac1a60SAnshuman Khandual 		return;
74505289402SAnshuman Khandual 
7466315df41SAnshuman Khandual 	pr_debug("Validating PMD devmap\n");
7478cb183f2SGavin Shan 	pmd = pfn_pmd(args->fixed_pmd_pfn, args->page_prot);
74805289402SAnshuman Khandual 	WARN_ON(!pmd_devmap(pmd_mkdevmap(pmd)));
74905289402SAnshuman Khandual }
75005289402SAnshuman Khandual 
75105289402SAnshuman Khandual #ifdef CONFIG_HAVE_ARCH_TRANSPARENT_HUGEPAGE_PUD
7528cb183f2SGavin Shan static void __init pud_devmap_tests(struct pgtable_debug_args *args)
75305289402SAnshuman Khandual {
75465ac1a60SAnshuman Khandual 	pud_t pud;
75565ac1a60SAnshuman Khandual 
75665ac1a60SAnshuman Khandual 	if (!has_transparent_hugepage())
75765ac1a60SAnshuman Khandual 		return;
75805289402SAnshuman Khandual 
7596315df41SAnshuman Khandual 	pr_debug("Validating PUD devmap\n");
7608cb183f2SGavin Shan 	pud = pfn_pud(args->fixed_pud_pfn, args->page_prot);
76105289402SAnshuman Khandual 	WARN_ON(!pud_devmap(pud_mkdevmap(pud)));
76205289402SAnshuman Khandual }
76305289402SAnshuman Khandual #else  /* !CONFIG_HAVE_ARCH_TRANSPARENT_HUGEPAGE_PUD */
7648cb183f2SGavin Shan static void __init pud_devmap_tests(struct pgtable_debug_args *args) { }
76505289402SAnshuman Khandual #endif /* CONFIG_HAVE_ARCH_TRANSPARENT_HUGEPAGE_PUD */
76605289402SAnshuman Khandual #else  /* CONFIG_TRANSPARENT_HUGEPAGE */
7678cb183f2SGavin Shan static void __init pmd_devmap_tests(struct pgtable_debug_args *args) { }
7688cb183f2SGavin Shan static void __init pud_devmap_tests(struct pgtable_debug_args *args) { }
76905289402SAnshuman Khandual #endif /* CONFIG_TRANSPARENT_HUGEPAGE */
77005289402SAnshuman Khandual #else
7718cb183f2SGavin Shan static void __init pte_devmap_tests(struct pgtable_debug_args *args) { }
7728cb183f2SGavin Shan static void __init pmd_devmap_tests(struct pgtable_debug_args *args) { }
7738cb183f2SGavin Shan static void __init pud_devmap_tests(struct pgtable_debug_args *args) { }
77405289402SAnshuman Khandual #endif /* CONFIG_ARCH_HAS_PTE_DEVMAP */
77505289402SAnshuman Khandual 
7765f447e80SGavin Shan static void __init pte_soft_dirty_tests(struct pgtable_debug_args *args)
77705289402SAnshuman Khandual {
7785f447e80SGavin Shan 	pte_t pte = pfn_pte(args->fixed_pte_pfn, args->page_prot);
77905289402SAnshuman Khandual 
78005289402SAnshuman Khandual 	if (!IS_ENABLED(CONFIG_MEM_SOFT_DIRTY))
78105289402SAnshuman Khandual 		return;
78205289402SAnshuman Khandual 
7836315df41SAnshuman Khandual 	pr_debug("Validating PTE soft dirty\n");
78405289402SAnshuman Khandual 	WARN_ON(!pte_soft_dirty(pte_mksoft_dirty(pte)));
78505289402SAnshuman Khandual 	WARN_ON(pte_soft_dirty(pte_clear_soft_dirty(pte)));
78605289402SAnshuman Khandual }
78705289402SAnshuman Khandual 
7885f447e80SGavin Shan static void __init pte_swap_soft_dirty_tests(struct pgtable_debug_args *args)
78905289402SAnshuman Khandual {
7905f447e80SGavin Shan 	pte_t pte = pfn_pte(args->fixed_pte_pfn, args->page_prot);
79105289402SAnshuman Khandual 
79205289402SAnshuman Khandual 	if (!IS_ENABLED(CONFIG_MEM_SOFT_DIRTY))
79305289402SAnshuman Khandual 		return;
79405289402SAnshuman Khandual 
7956315df41SAnshuman Khandual 	pr_debug("Validating PTE swap soft dirty\n");
79605289402SAnshuman Khandual 	WARN_ON(!pte_swp_soft_dirty(pte_swp_mksoft_dirty(pte)));
79705289402SAnshuman Khandual 	WARN_ON(pte_swp_soft_dirty(pte_swp_clear_soft_dirty(pte)));
79805289402SAnshuman Khandual }
79905289402SAnshuman Khandual 
80005289402SAnshuman Khandual #ifdef CONFIG_TRANSPARENT_HUGEPAGE
8015f447e80SGavin Shan static void __init pmd_soft_dirty_tests(struct pgtable_debug_args *args)
80205289402SAnshuman Khandual {
80365ac1a60SAnshuman Khandual 	pmd_t pmd;
80405289402SAnshuman Khandual 
80505289402SAnshuman Khandual 	if (!IS_ENABLED(CONFIG_MEM_SOFT_DIRTY))
80605289402SAnshuman Khandual 		return;
80705289402SAnshuman Khandual 
80865ac1a60SAnshuman Khandual 	if (!has_transparent_hugepage())
80965ac1a60SAnshuman Khandual 		return;
81065ac1a60SAnshuman Khandual 
8116315df41SAnshuman Khandual 	pr_debug("Validating PMD soft dirty\n");
8125f447e80SGavin Shan 	pmd = pfn_pmd(args->fixed_pmd_pfn, args->page_prot);
81305289402SAnshuman Khandual 	WARN_ON(!pmd_soft_dirty(pmd_mksoft_dirty(pmd)));
81405289402SAnshuman Khandual 	WARN_ON(pmd_soft_dirty(pmd_clear_soft_dirty(pmd)));
81505289402SAnshuman Khandual }
81605289402SAnshuman Khandual 
8175f447e80SGavin Shan static void __init pmd_swap_soft_dirty_tests(struct pgtable_debug_args *args)
81805289402SAnshuman Khandual {
81965ac1a60SAnshuman Khandual 	pmd_t pmd;
82005289402SAnshuman Khandual 
82105289402SAnshuman Khandual 	if (!IS_ENABLED(CONFIG_MEM_SOFT_DIRTY) ||
82205289402SAnshuman Khandual 		!IS_ENABLED(CONFIG_ARCH_ENABLE_THP_MIGRATION))
82305289402SAnshuman Khandual 		return;
82405289402SAnshuman Khandual 
82565ac1a60SAnshuman Khandual 	if (!has_transparent_hugepage())
82665ac1a60SAnshuman Khandual 		return;
82765ac1a60SAnshuman Khandual 
8286315df41SAnshuman Khandual 	pr_debug("Validating PMD swap soft dirty\n");
8295f447e80SGavin Shan 	pmd = pfn_pmd(args->fixed_pmd_pfn, args->page_prot);
83005289402SAnshuman Khandual 	WARN_ON(!pmd_swp_soft_dirty(pmd_swp_mksoft_dirty(pmd)));
83105289402SAnshuman Khandual 	WARN_ON(pmd_swp_soft_dirty(pmd_swp_clear_soft_dirty(pmd)));
83205289402SAnshuman Khandual }
833b593b90dSShixin Liu #else  /* !CONFIG_TRANSPARENT_HUGEPAGE */
8345f447e80SGavin Shan static void __init pmd_soft_dirty_tests(struct pgtable_debug_args *args) { }
8355f447e80SGavin Shan static void __init pmd_swap_soft_dirty_tests(struct pgtable_debug_args *args) { }
836b593b90dSShixin Liu #endif /* CONFIG_TRANSPARENT_HUGEPAGE */
83705289402SAnshuman Khandual 
8385f447e80SGavin Shan static void __init pte_swap_tests(struct pgtable_debug_args *args)
83905289402SAnshuman Khandual {
84005289402SAnshuman Khandual 	swp_entry_t swp;
84105289402SAnshuman Khandual 	pte_t pte;
84205289402SAnshuman Khandual 
8436315df41SAnshuman Khandual 	pr_debug("Validating PTE swap\n");
8445f447e80SGavin Shan 	pte = pfn_pte(args->fixed_pte_pfn, args->page_prot);
84505289402SAnshuman Khandual 	swp = __pte_to_swp_entry(pte);
84605289402SAnshuman Khandual 	pte = __swp_entry_to_pte(swp);
8475f447e80SGavin Shan 	WARN_ON(args->fixed_pte_pfn != pte_pfn(pte));
84805289402SAnshuman Khandual }
84905289402SAnshuman Khandual 
85005289402SAnshuman Khandual #ifdef CONFIG_ARCH_ENABLE_THP_MIGRATION
8515f447e80SGavin Shan static void __init pmd_swap_tests(struct pgtable_debug_args *args)
85205289402SAnshuman Khandual {
85305289402SAnshuman Khandual 	swp_entry_t swp;
85405289402SAnshuman Khandual 	pmd_t pmd;
85505289402SAnshuman Khandual 
85665ac1a60SAnshuman Khandual 	if (!has_transparent_hugepage())
85765ac1a60SAnshuman Khandual 		return;
85865ac1a60SAnshuman Khandual 
8596315df41SAnshuman Khandual 	pr_debug("Validating PMD swap\n");
8605f447e80SGavin Shan 	pmd = pfn_pmd(args->fixed_pmd_pfn, args->page_prot);
86105289402SAnshuman Khandual 	swp = __pmd_to_swp_entry(pmd);
86205289402SAnshuman Khandual 	pmd = __swp_entry_to_pmd(swp);
8635f447e80SGavin Shan 	WARN_ON(args->fixed_pmd_pfn != pmd_pfn(pmd));
86405289402SAnshuman Khandual }
86505289402SAnshuman Khandual #else  /* !CONFIG_ARCH_ENABLE_THP_MIGRATION */
8665f447e80SGavin Shan static void __init pmd_swap_tests(struct pgtable_debug_args *args) { }
86705289402SAnshuman Khandual #endif /* CONFIG_ARCH_ENABLE_THP_MIGRATION */
86805289402SAnshuman Khandual 
8694878a888SGavin Shan static void __init swap_migration_tests(struct pgtable_debug_args *args)
87005289402SAnshuman Khandual {
87105289402SAnshuman Khandual 	struct page *page;
87205289402SAnshuman Khandual 	swp_entry_t swp;
87305289402SAnshuman Khandual 
87405289402SAnshuman Khandual 	if (!IS_ENABLED(CONFIG_MIGRATION))
87505289402SAnshuman Khandual 		return;
8766315df41SAnshuman Khandual 
87705289402SAnshuman Khandual 	/*
87805289402SAnshuman Khandual 	 * swap_migration_tests() requires a dedicated page as it needs to
87905289402SAnshuman Khandual 	 * be locked before creating a migration entry from it. Locking the
88005289402SAnshuman Khandual 	 * page that actually maps kernel text ('start_kernel') can be real
8814878a888SGavin Shan 	 * problematic. Lets use the allocated page explicitly for this
8824878a888SGavin Shan 	 * purpose.
88305289402SAnshuman Khandual 	 */
8844878a888SGavin Shan 	page = (args->pte_pfn != ULONG_MAX) ? pfn_to_page(args->pte_pfn) : NULL;
8854878a888SGavin Shan 	if (!page)
88605289402SAnshuman Khandual 		return;
8874878a888SGavin Shan 
8884878a888SGavin Shan 	pr_debug("Validating swap migration\n");
88905289402SAnshuman Khandual 
89005289402SAnshuman Khandual 	/*
89123647618SAnshuman Khandual 	 * make_[readable|writable]_migration_entry() expects given page to
89223647618SAnshuman Khandual 	 * be locked, otherwise it stumbles upon a BUG_ON().
89305289402SAnshuman Khandual 	 */
89405289402SAnshuman Khandual 	__SetPageLocked(page);
8954dd845b5SAlistair Popple 	swp = make_writable_migration_entry(page_to_pfn(page));
89605289402SAnshuman Khandual 	WARN_ON(!is_migration_entry(swp));
8974dd845b5SAlistair Popple 	WARN_ON(!is_writable_migration_entry(swp));
89805289402SAnshuman Khandual 
8994dd845b5SAlistair Popple 	swp = make_readable_migration_entry(swp_offset(swp));
90005289402SAnshuman Khandual 	WARN_ON(!is_migration_entry(swp));
9014dd845b5SAlistair Popple 	WARN_ON(is_writable_migration_entry(swp));
90205289402SAnshuman Khandual 
9034dd845b5SAlistair Popple 	swp = make_readable_migration_entry(page_to_pfn(page));
90405289402SAnshuman Khandual 	WARN_ON(!is_migration_entry(swp));
9054dd845b5SAlistair Popple 	WARN_ON(is_writable_migration_entry(swp));
90605289402SAnshuman Khandual 	__ClearPageLocked(page);
90705289402SAnshuman Khandual }
90805289402SAnshuman Khandual 
90905289402SAnshuman Khandual #ifdef CONFIG_HUGETLB_PAGE
91036b77d1eSGavin Shan static void __init hugetlb_basic_tests(struct pgtable_debug_args *args)
91105289402SAnshuman Khandual {
91205289402SAnshuman Khandual 	struct page *page;
91305289402SAnshuman Khandual 	pte_t pte;
91405289402SAnshuman Khandual 
9156315df41SAnshuman Khandual 	pr_debug("Validating HugeTLB basic\n");
91605289402SAnshuman Khandual 	/*
91705289402SAnshuman Khandual 	 * Accessing the page associated with the pfn is safe here,
91805289402SAnshuman Khandual 	 * as it was previously derived from a real kernel symbol.
91905289402SAnshuman Khandual 	 */
92036b77d1eSGavin Shan 	page = pfn_to_page(args->fixed_pmd_pfn);
92136b77d1eSGavin Shan 	pte = mk_huge_pte(page, args->page_prot);
92205289402SAnshuman Khandual 
92305289402SAnshuman Khandual 	WARN_ON(!huge_pte_dirty(huge_pte_mkdirty(pte)));
92405289402SAnshuman Khandual 	WARN_ON(!huge_pte_write(huge_pte_mkwrite(huge_pte_wrprotect(pte))));
92505289402SAnshuman Khandual 	WARN_ON(huge_pte_write(huge_pte_wrprotect(huge_pte_mkwrite(pte))));
92605289402SAnshuman Khandual 
92705289402SAnshuman Khandual #ifdef CONFIG_ARCH_WANT_GENERAL_HUGETLB
92836b77d1eSGavin Shan 	pte = pfn_pte(args->fixed_pmd_pfn, args->page_prot);
92905289402SAnshuman Khandual 
93005289402SAnshuman Khandual 	WARN_ON(!pte_huge(pte_mkhuge(pte)));
93105289402SAnshuman Khandual #endif /* CONFIG_ARCH_WANT_GENERAL_HUGETLB */
93205289402SAnshuman Khandual }
93305289402SAnshuman Khandual #else  /* !CONFIG_HUGETLB_PAGE */
93436b77d1eSGavin Shan static void __init hugetlb_basic_tests(struct pgtable_debug_args *args) { }
93505289402SAnshuman Khandual #endif /* CONFIG_HUGETLB_PAGE */
93605289402SAnshuman Khandual 
93705289402SAnshuman Khandual #ifdef CONFIG_TRANSPARENT_HUGEPAGE
9384878a888SGavin Shan static void __init pmd_thp_tests(struct pgtable_debug_args *args)
93905289402SAnshuman Khandual {
94005289402SAnshuman Khandual 	pmd_t pmd;
94105289402SAnshuman Khandual 
94205289402SAnshuman Khandual 	if (!has_transparent_hugepage())
94305289402SAnshuman Khandual 		return;
94405289402SAnshuman Khandual 
9456315df41SAnshuman Khandual 	pr_debug("Validating PMD based THP\n");
94605289402SAnshuman Khandual 	/*
94705289402SAnshuman Khandual 	 * pmd_trans_huge() and pmd_present() must return positive after
94805289402SAnshuman Khandual 	 * MMU invalidation with pmd_mkinvalid(). This behavior is an
94905289402SAnshuman Khandual 	 * optimization for transparent huge page. pmd_trans_huge() must
95005289402SAnshuman Khandual 	 * be true if pmd_page() returns a valid THP to avoid taking the
95105289402SAnshuman Khandual 	 * pmd_lock when others walk over non transhuge pmds (i.e. there
95205289402SAnshuman Khandual 	 * are no THP allocated). Especially when splitting a THP and
95305289402SAnshuman Khandual 	 * removing the present bit from the pmd, pmd_trans_huge() still
95405289402SAnshuman Khandual 	 * needs to return true. pmd_present() should be true whenever
95505289402SAnshuman Khandual 	 * pmd_trans_huge() returns true.
95605289402SAnshuman Khandual 	 */
9574878a888SGavin Shan 	pmd = pfn_pmd(args->fixed_pmd_pfn, args->page_prot);
95805289402SAnshuman Khandual 	WARN_ON(!pmd_trans_huge(pmd_mkhuge(pmd)));
95905289402SAnshuman Khandual 
96005289402SAnshuman Khandual #ifndef __HAVE_ARCH_PMDP_INVALIDATE
96105289402SAnshuman Khandual 	WARN_ON(!pmd_trans_huge(pmd_mkinvalid(pmd_mkhuge(pmd))));
96205289402SAnshuman Khandual 	WARN_ON(!pmd_present(pmd_mkinvalid(pmd_mkhuge(pmd))));
96305289402SAnshuman Khandual #endif /* __HAVE_ARCH_PMDP_INVALIDATE */
96405289402SAnshuman Khandual }
96505289402SAnshuman Khandual 
96605289402SAnshuman Khandual #ifdef CONFIG_HAVE_ARCH_TRANSPARENT_HUGEPAGE_PUD
9674878a888SGavin Shan static void __init pud_thp_tests(struct pgtable_debug_args *args)
96805289402SAnshuman Khandual {
96905289402SAnshuman Khandual 	pud_t pud;
97005289402SAnshuman Khandual 
97105289402SAnshuman Khandual 	if (!has_transparent_hugepage())
97205289402SAnshuman Khandual 		return;
97305289402SAnshuman Khandual 
9746315df41SAnshuman Khandual 	pr_debug("Validating PUD based THP\n");
9754878a888SGavin Shan 	pud = pfn_pud(args->fixed_pud_pfn, args->page_prot);
97605289402SAnshuman Khandual 	WARN_ON(!pud_trans_huge(pud_mkhuge(pud)));
97705289402SAnshuman Khandual 
97805289402SAnshuman Khandual 	/*
97905289402SAnshuman Khandual 	 * pud_mkinvalid() has been dropped for now. Enable back
98005289402SAnshuman Khandual 	 * these tests when it comes back with a modified pud_present().
98105289402SAnshuman Khandual 	 *
98205289402SAnshuman Khandual 	 * WARN_ON(!pud_trans_huge(pud_mkinvalid(pud_mkhuge(pud))));
98305289402SAnshuman Khandual 	 * WARN_ON(!pud_present(pud_mkinvalid(pud_mkhuge(pud))));
98405289402SAnshuman Khandual 	 */
98505289402SAnshuman Khandual }
98605289402SAnshuman Khandual #else  /* !CONFIG_HAVE_ARCH_TRANSPARENT_HUGEPAGE_PUD */
9874878a888SGavin Shan static void __init pud_thp_tests(struct pgtable_debug_args *args) { }
98805289402SAnshuman Khandual #endif /* CONFIG_HAVE_ARCH_TRANSPARENT_HUGEPAGE_PUD */
98905289402SAnshuman Khandual #else  /* !CONFIG_TRANSPARENT_HUGEPAGE */
9904878a888SGavin Shan static void __init pmd_thp_tests(struct pgtable_debug_args *args) { }
9914878a888SGavin Shan static void __init pud_thp_tests(struct pgtable_debug_args *args) { }
99205289402SAnshuman Khandual #endif /* CONFIG_TRANSPARENT_HUGEPAGE */
99305289402SAnshuman Khandual 
994399145f9SAnshuman Khandual static unsigned long __init get_random_vaddr(void)
995399145f9SAnshuman Khandual {
996399145f9SAnshuman Khandual 	unsigned long random_vaddr, random_pages, total_user_pages;
997399145f9SAnshuman Khandual 
998399145f9SAnshuman Khandual 	total_user_pages = (TASK_SIZE - FIRST_USER_ADDRESS) / PAGE_SIZE;
999399145f9SAnshuman Khandual 
1000399145f9SAnshuman Khandual 	random_pages = get_random_long() % total_user_pages;
1001399145f9SAnshuman Khandual 	random_vaddr = FIRST_USER_ADDRESS + random_pages * PAGE_SIZE;
1002399145f9SAnshuman Khandual 
1003399145f9SAnshuman Khandual 	return random_vaddr;
1004399145f9SAnshuman Khandual }
1005399145f9SAnshuman Khandual 
10063c9b84f0SGavin Shan static void __init destroy_args(struct pgtable_debug_args *args)
10073c9b84f0SGavin Shan {
10083c9b84f0SGavin Shan 	struct page *page = NULL;
10093c9b84f0SGavin Shan 
10103c9b84f0SGavin Shan 	/* Free (huge) page */
10113c9b84f0SGavin Shan 	if (IS_ENABLED(CONFIG_TRANSPARENT_HUGEPAGE) &&
10123c9b84f0SGavin Shan 	    IS_ENABLED(CONFIG_HAVE_ARCH_TRANSPARENT_HUGEPAGE_PUD) &&
10133c9b84f0SGavin Shan 	    has_transparent_hugepage() &&
10143c9b84f0SGavin Shan 	    args->pud_pfn != ULONG_MAX) {
10153c9b84f0SGavin Shan 		if (args->is_contiguous_page) {
10163c9b84f0SGavin Shan 			free_contig_range(args->pud_pfn,
10173c9b84f0SGavin Shan 					  (1 << (HPAGE_PUD_SHIFT - PAGE_SHIFT)));
10183c9b84f0SGavin Shan 		} else {
10193c9b84f0SGavin Shan 			page = pfn_to_page(args->pud_pfn);
10203c9b84f0SGavin Shan 			__free_pages(page, HPAGE_PUD_SHIFT - PAGE_SHIFT);
10213c9b84f0SGavin Shan 		}
10223c9b84f0SGavin Shan 
10233c9b84f0SGavin Shan 		args->pud_pfn = ULONG_MAX;
10243c9b84f0SGavin Shan 		args->pmd_pfn = ULONG_MAX;
10253c9b84f0SGavin Shan 		args->pte_pfn = ULONG_MAX;
10263c9b84f0SGavin Shan 	}
10273c9b84f0SGavin Shan 
10283c9b84f0SGavin Shan 	if (IS_ENABLED(CONFIG_TRANSPARENT_HUGEPAGE) &&
10293c9b84f0SGavin Shan 	    has_transparent_hugepage() &&
10303c9b84f0SGavin Shan 	    args->pmd_pfn != ULONG_MAX) {
10313c9b84f0SGavin Shan 		if (args->is_contiguous_page) {
10323c9b84f0SGavin Shan 			free_contig_range(args->pmd_pfn, (1 << HPAGE_PMD_ORDER));
10333c9b84f0SGavin Shan 		} else {
10343c9b84f0SGavin Shan 			page = pfn_to_page(args->pmd_pfn);
10353c9b84f0SGavin Shan 			__free_pages(page, HPAGE_PMD_ORDER);
10363c9b84f0SGavin Shan 		}
10373c9b84f0SGavin Shan 
10383c9b84f0SGavin Shan 		args->pmd_pfn = ULONG_MAX;
10393c9b84f0SGavin Shan 		args->pte_pfn = ULONG_MAX;
10403c9b84f0SGavin Shan 	}
10413c9b84f0SGavin Shan 
10423c9b84f0SGavin Shan 	if (args->pte_pfn != ULONG_MAX) {
10433c9b84f0SGavin Shan 		page = pfn_to_page(args->pte_pfn);
10443c9b84f0SGavin Shan 		__free_pages(page, 0);
10453c9b84f0SGavin Shan 
10463c9b84f0SGavin Shan 		args->pte_pfn = ULONG_MAX;
10473c9b84f0SGavin Shan 	}
10483c9b84f0SGavin Shan 
10493c9b84f0SGavin Shan 	/* Free page table entries */
10503c9b84f0SGavin Shan 	if (args->start_ptep) {
10513c9b84f0SGavin Shan 		pte_free(args->mm, args->start_ptep);
10523c9b84f0SGavin Shan 		mm_dec_nr_ptes(args->mm);
10533c9b84f0SGavin Shan 	}
10543c9b84f0SGavin Shan 
10553c9b84f0SGavin Shan 	if (args->start_pmdp) {
10563c9b84f0SGavin Shan 		pmd_free(args->mm, args->start_pmdp);
10573c9b84f0SGavin Shan 		mm_dec_nr_pmds(args->mm);
10583c9b84f0SGavin Shan 	}
10593c9b84f0SGavin Shan 
10603c9b84f0SGavin Shan 	if (args->start_pudp) {
10613c9b84f0SGavin Shan 		pud_free(args->mm, args->start_pudp);
10623c9b84f0SGavin Shan 		mm_dec_nr_puds(args->mm);
10633c9b84f0SGavin Shan 	}
10643c9b84f0SGavin Shan 
10653c9b84f0SGavin Shan 	if (args->start_p4dp)
10663c9b84f0SGavin Shan 		p4d_free(args->mm, args->start_p4dp);
10673c9b84f0SGavin Shan 
10683c9b84f0SGavin Shan 	/* Free vma and mm struct */
10693c9b84f0SGavin Shan 	if (args->vma)
10703c9b84f0SGavin Shan 		vm_area_free(args->vma);
10713c9b84f0SGavin Shan 
10723c9b84f0SGavin Shan 	if (args->mm)
10733c9b84f0SGavin Shan 		mmdrop(args->mm);
10743c9b84f0SGavin Shan }
10753c9b84f0SGavin Shan 
10763c9b84f0SGavin Shan static struct page * __init
10773c9b84f0SGavin Shan debug_vm_pgtable_alloc_huge_page(struct pgtable_debug_args *args, int order)
10783c9b84f0SGavin Shan {
10793c9b84f0SGavin Shan 	struct page *page = NULL;
10803c9b84f0SGavin Shan 
10813c9b84f0SGavin Shan #ifdef CONFIG_CONTIG_ALLOC
10823c9b84f0SGavin Shan 	if (order >= MAX_ORDER) {
10833c9b84f0SGavin Shan 		page = alloc_contig_pages((1 << order), GFP_KERNEL,
10843c9b84f0SGavin Shan 					  first_online_node, NULL);
10853c9b84f0SGavin Shan 		if (page) {
10863c9b84f0SGavin Shan 			args->is_contiguous_page = true;
10873c9b84f0SGavin Shan 			return page;
10883c9b84f0SGavin Shan 		}
10893c9b84f0SGavin Shan 	}
10903c9b84f0SGavin Shan #endif
10913c9b84f0SGavin Shan 
10923c9b84f0SGavin Shan 	if (order < MAX_ORDER)
10933c9b84f0SGavin Shan 		page = alloc_pages(GFP_KERNEL, order);
10943c9b84f0SGavin Shan 
10953c9b84f0SGavin Shan 	return page;
10963c9b84f0SGavin Shan }
10973c9b84f0SGavin Shan 
10983c9b84f0SGavin Shan static int __init init_args(struct pgtable_debug_args *args)
10993c9b84f0SGavin Shan {
11003c9b84f0SGavin Shan 	struct page *page = NULL;
11013c9b84f0SGavin Shan 	phys_addr_t phys;
11023c9b84f0SGavin Shan 	int ret = 0;
11033c9b84f0SGavin Shan 
11043c9b84f0SGavin Shan 	/*
11053c9b84f0SGavin Shan 	 * Initialize the debugging data.
11063c9b84f0SGavin Shan 	 *
11078772716fSGuo Ren 	 * protection_map[0] (or even protection_map[8]) will help create
11088772716fSGuo Ren 	 * page table entries with PROT_NONE permission as required for
11098772716fSGuo Ren 	 * pxx_protnone_tests().
11103c9b84f0SGavin Shan 	 */
11113c9b84f0SGavin Shan 	memset(args, 0, sizeof(*args));
11123c9b84f0SGavin Shan 	args->vaddr              = get_random_vaddr();
11133c9b84f0SGavin Shan 	args->page_prot          = vm_get_page_prot(VMFLAGS);
11148772716fSGuo Ren 	args->page_prot_none     = protection_map[0];
11153c9b84f0SGavin Shan 	args->is_contiguous_page = false;
11163c9b84f0SGavin Shan 	args->pud_pfn            = ULONG_MAX;
11173c9b84f0SGavin Shan 	args->pmd_pfn            = ULONG_MAX;
11183c9b84f0SGavin Shan 	args->pte_pfn            = ULONG_MAX;
11193c9b84f0SGavin Shan 	args->fixed_pgd_pfn      = ULONG_MAX;
11203c9b84f0SGavin Shan 	args->fixed_p4d_pfn      = ULONG_MAX;
11213c9b84f0SGavin Shan 	args->fixed_pud_pfn      = ULONG_MAX;
11223c9b84f0SGavin Shan 	args->fixed_pmd_pfn      = ULONG_MAX;
11233c9b84f0SGavin Shan 	args->fixed_pte_pfn      = ULONG_MAX;
11243c9b84f0SGavin Shan 
11253c9b84f0SGavin Shan 	/* Allocate mm and vma */
11263c9b84f0SGavin Shan 	args->mm = mm_alloc();
11273c9b84f0SGavin Shan 	if (!args->mm) {
11283c9b84f0SGavin Shan 		pr_err("Failed to allocate mm struct\n");
11293c9b84f0SGavin Shan 		ret = -ENOMEM;
11303c9b84f0SGavin Shan 		goto error;
11313c9b84f0SGavin Shan 	}
11323c9b84f0SGavin Shan 
11333c9b84f0SGavin Shan 	args->vma = vm_area_alloc(args->mm);
11343c9b84f0SGavin Shan 	if (!args->vma) {
11353c9b84f0SGavin Shan 		pr_err("Failed to allocate vma\n");
11363c9b84f0SGavin Shan 		ret = -ENOMEM;
11373c9b84f0SGavin Shan 		goto error;
11383c9b84f0SGavin Shan 	}
11393c9b84f0SGavin Shan 
11403c9b84f0SGavin Shan 	/*
11413c9b84f0SGavin Shan 	 * Allocate page table entries. They will be modified in the tests.
11423c9b84f0SGavin Shan 	 * Lets save the page table entries so that they can be released
11433c9b84f0SGavin Shan 	 * when the tests are completed.
11443c9b84f0SGavin Shan 	 */
11453c9b84f0SGavin Shan 	args->pgdp = pgd_offset(args->mm, args->vaddr);
11463c9b84f0SGavin Shan 	args->p4dp = p4d_alloc(args->mm, args->pgdp, args->vaddr);
11473c9b84f0SGavin Shan 	if (!args->p4dp) {
11483c9b84f0SGavin Shan 		pr_err("Failed to allocate p4d entries\n");
11493c9b84f0SGavin Shan 		ret = -ENOMEM;
11503c9b84f0SGavin Shan 		goto error;
11513c9b84f0SGavin Shan 	}
11523c9b84f0SGavin Shan 	args->start_p4dp = p4d_offset(args->pgdp, 0UL);
11533c9b84f0SGavin Shan 	WARN_ON(!args->start_p4dp);
11543c9b84f0SGavin Shan 
11553c9b84f0SGavin Shan 	args->pudp = pud_alloc(args->mm, args->p4dp, args->vaddr);
11563c9b84f0SGavin Shan 	if (!args->pudp) {
11573c9b84f0SGavin Shan 		pr_err("Failed to allocate pud entries\n");
11583c9b84f0SGavin Shan 		ret = -ENOMEM;
11593c9b84f0SGavin Shan 		goto error;
11603c9b84f0SGavin Shan 	}
11613c9b84f0SGavin Shan 	args->start_pudp = pud_offset(args->p4dp, 0UL);
11623c9b84f0SGavin Shan 	WARN_ON(!args->start_pudp);
11633c9b84f0SGavin Shan 
11643c9b84f0SGavin Shan 	args->pmdp = pmd_alloc(args->mm, args->pudp, args->vaddr);
11653c9b84f0SGavin Shan 	if (!args->pmdp) {
11663c9b84f0SGavin Shan 		pr_err("Failed to allocate pmd entries\n");
11673c9b84f0SGavin Shan 		ret = -ENOMEM;
11683c9b84f0SGavin Shan 		goto error;
11693c9b84f0SGavin Shan 	}
11703c9b84f0SGavin Shan 	args->start_pmdp = pmd_offset(args->pudp, 0UL);
11713c9b84f0SGavin Shan 	WARN_ON(!args->start_pmdp);
11723c9b84f0SGavin Shan 
11733c9b84f0SGavin Shan 	if (pte_alloc(args->mm, args->pmdp)) {
11743c9b84f0SGavin Shan 		pr_err("Failed to allocate pte entries\n");
11753c9b84f0SGavin Shan 		ret = -ENOMEM;
11763c9b84f0SGavin Shan 		goto error;
11773c9b84f0SGavin Shan 	}
11783c9b84f0SGavin Shan 	args->start_ptep = pmd_pgtable(READ_ONCE(*args->pmdp));
11793c9b84f0SGavin Shan 	WARN_ON(!args->start_ptep);
11803c9b84f0SGavin Shan 
11813c9b84f0SGavin Shan 	/*
11823c9b84f0SGavin Shan 	 * PFN for mapping at PTE level is determined from a standard kernel
11833c9b84f0SGavin Shan 	 * text symbol. But pfns for higher page table levels are derived by
11843c9b84f0SGavin Shan 	 * masking lower bits of this real pfn. These derived pfns might not
11853c9b84f0SGavin Shan 	 * exist on the platform but that does not really matter as pfn_pxx()
11863c9b84f0SGavin Shan 	 * helpers will still create appropriate entries for the test. This
11873c9b84f0SGavin Shan 	 * helps avoid large memory block allocations to be used for mapping
11883c9b84f0SGavin Shan 	 * at higher page table levels in some of the tests.
11893c9b84f0SGavin Shan 	 */
11903c9b84f0SGavin Shan 	phys = __pa_symbol(&start_kernel);
11913c9b84f0SGavin Shan 	args->fixed_pgd_pfn = __phys_to_pfn(phys & PGDIR_MASK);
11923c9b84f0SGavin Shan 	args->fixed_p4d_pfn = __phys_to_pfn(phys & P4D_MASK);
11933c9b84f0SGavin Shan 	args->fixed_pud_pfn = __phys_to_pfn(phys & PUD_MASK);
11943c9b84f0SGavin Shan 	args->fixed_pmd_pfn = __phys_to_pfn(phys & PMD_MASK);
11953c9b84f0SGavin Shan 	args->fixed_pte_pfn = __phys_to_pfn(phys & PAGE_MASK);
11963c9b84f0SGavin Shan 	WARN_ON(!pfn_valid(args->fixed_pte_pfn));
11973c9b84f0SGavin Shan 
11983c9b84f0SGavin Shan 	/*
11993c9b84f0SGavin Shan 	 * Allocate (huge) pages because some of the tests need to access
12003c9b84f0SGavin Shan 	 * the data in the pages. The corresponding tests will be skipped
12013c9b84f0SGavin Shan 	 * if we fail to allocate (huge) pages.
12023c9b84f0SGavin Shan 	 */
12033c9b84f0SGavin Shan 	if (IS_ENABLED(CONFIG_TRANSPARENT_HUGEPAGE) &&
12043c9b84f0SGavin Shan 	    IS_ENABLED(CONFIG_HAVE_ARCH_TRANSPARENT_HUGEPAGE_PUD) &&
12053c9b84f0SGavin Shan 	    has_transparent_hugepage()) {
12063c9b84f0SGavin Shan 		page = debug_vm_pgtable_alloc_huge_page(args,
12073c9b84f0SGavin Shan 				HPAGE_PUD_SHIFT - PAGE_SHIFT);
12083c9b84f0SGavin Shan 		if (page) {
12093c9b84f0SGavin Shan 			args->pud_pfn = page_to_pfn(page);
12103c9b84f0SGavin Shan 			args->pmd_pfn = args->pud_pfn;
12113c9b84f0SGavin Shan 			args->pte_pfn = args->pud_pfn;
12123c9b84f0SGavin Shan 			return 0;
12133c9b84f0SGavin Shan 		}
12143c9b84f0SGavin Shan 	}
12153c9b84f0SGavin Shan 
12163c9b84f0SGavin Shan 	if (IS_ENABLED(CONFIG_TRANSPARENT_HUGEPAGE) &&
12173c9b84f0SGavin Shan 	    has_transparent_hugepage()) {
12183c9b84f0SGavin Shan 		page = debug_vm_pgtable_alloc_huge_page(args, HPAGE_PMD_ORDER);
12193c9b84f0SGavin Shan 		if (page) {
12203c9b84f0SGavin Shan 			args->pmd_pfn = page_to_pfn(page);
12213c9b84f0SGavin Shan 			args->pte_pfn = args->pmd_pfn;
12223c9b84f0SGavin Shan 			return 0;
12233c9b84f0SGavin Shan 		}
12243c9b84f0SGavin Shan 	}
12253c9b84f0SGavin Shan 
12263c9b84f0SGavin Shan 	page = alloc_pages(GFP_KERNEL, 0);
12273c9b84f0SGavin Shan 	if (page)
12283c9b84f0SGavin Shan 		args->pte_pfn = page_to_pfn(page);
12293c9b84f0SGavin Shan 
12303c9b84f0SGavin Shan 	return 0;
12313c9b84f0SGavin Shan 
12323c9b84f0SGavin Shan error:
12333c9b84f0SGavin Shan 	destroy_args(args);
12343c9b84f0SGavin Shan 	return ret;
12353c9b84f0SGavin Shan }
12363c9b84f0SGavin Shan 
1237399145f9SAnshuman Khandual static int __init debug_vm_pgtable(void)
1238399145f9SAnshuman Khandual {
12393c9b84f0SGavin Shan 	struct pgtable_debug_args args;
1240fea1120cSKees Cook 	spinlock_t *ptl = NULL;
12413c9b84f0SGavin Shan 	int idx, ret;
1242399145f9SAnshuman Khandual 
1243399145f9SAnshuman Khandual 	pr_info("Validating architecture page table helpers\n");
12443c9b84f0SGavin Shan 	ret = init_args(&args);
12453c9b84f0SGavin Shan 	if (ret)
12463c9b84f0SGavin Shan 		return ret;
12473c9b84f0SGavin Shan 
12482e326c07SAnshuman Khandual 	/*
12492e326c07SAnshuman Khandual 	 * Iterate over the protection_map[] to make sure that all
12502e326c07SAnshuman Khandual 	 * the basic page table transformation validations just hold
12512e326c07SAnshuman Khandual 	 * true irrespective of the starting protection value for a
12522e326c07SAnshuman Khandual 	 * given page table entry.
12532e326c07SAnshuman Khandual 	 */
12542e326c07SAnshuman Khandual 	for (idx = 0; idx < ARRAY_SIZE(protection_map); idx++) {
125536b77d1eSGavin Shan 		pte_basic_tests(&args, idx);
125636b77d1eSGavin Shan 		pmd_basic_tests(&args, idx);
125736b77d1eSGavin Shan 		pud_basic_tests(&args, idx);
12582e326c07SAnshuman Khandual 	}
12592e326c07SAnshuman Khandual 
12602e326c07SAnshuman Khandual 	/*
12612e326c07SAnshuman Khandual 	 * Both P4D and PGD level tests are very basic which do not
12622e326c07SAnshuman Khandual 	 * involve creating page table entries from the protection
12632e326c07SAnshuman Khandual 	 * value and the given pfn. Hence just keep them out from
12642e326c07SAnshuman Khandual 	 * the above iteration for now to save some test execution
12652e326c07SAnshuman Khandual 	 * time.
12662e326c07SAnshuman Khandual 	 */
126736b77d1eSGavin Shan 	p4d_basic_tests(&args);
126836b77d1eSGavin Shan 	pgd_basic_tests(&args);
1269399145f9SAnshuman Khandual 
12708983d231SGavin Shan 	pmd_leaf_tests(&args);
12718983d231SGavin Shan 	pud_leaf_tests(&args);
1272a5c3b9ffSAnshuman Khandual 
12738983d231SGavin Shan 	pte_savedwrite_tests(&args);
12748983d231SGavin Shan 	pmd_savedwrite_tests(&args);
1275a5c3b9ffSAnshuman Khandual 
12768cb183f2SGavin Shan 	pte_special_tests(&args);
12778cb183f2SGavin Shan 	pte_protnone_tests(&args);
12788cb183f2SGavin Shan 	pmd_protnone_tests(&args);
127905289402SAnshuman Khandual 
12808cb183f2SGavin Shan 	pte_devmap_tests(&args);
12818cb183f2SGavin Shan 	pmd_devmap_tests(&args);
12828cb183f2SGavin Shan 	pud_devmap_tests(&args);
128305289402SAnshuman Khandual 
12845f447e80SGavin Shan 	pte_soft_dirty_tests(&args);
12855f447e80SGavin Shan 	pmd_soft_dirty_tests(&args);
12865f447e80SGavin Shan 	pte_swap_soft_dirty_tests(&args);
12875f447e80SGavin Shan 	pmd_swap_soft_dirty_tests(&args);
128805289402SAnshuman Khandual 
12895f447e80SGavin Shan 	pte_swap_tests(&args);
12905f447e80SGavin Shan 	pmd_swap_tests(&args);
129105289402SAnshuman Khandual 
12924878a888SGavin Shan 	swap_migration_tests(&args);
129305289402SAnshuman Khandual 
12944878a888SGavin Shan 	pmd_thp_tests(&args);
12954878a888SGavin Shan 	pud_thp_tests(&args);
129605289402SAnshuman Khandual 
129736b77d1eSGavin Shan 	hugetlb_basic_tests(&args);
1298e8edf0adSAneesh Kumar K.V 
12996f302e27SAneesh Kumar K.V 	/*
13006f302e27SAneesh Kumar K.V 	 * Page table modifying tests. They need to hold
13016f302e27SAneesh Kumar K.V 	 * proper page table lock.
13026f302e27SAneesh Kumar K.V 	 */
1303e8edf0adSAneesh Kumar K.V 
130444966c44SGavin Shan 	args.ptep = pte_offset_map_lock(args.mm, args.pmdp, args.vaddr, &ptl);
130544966c44SGavin Shan 	pte_clear_tests(&args);
130644966c44SGavin Shan 	pte_advanced_tests(&args);
130744966c44SGavin Shan 	pte_unmap_unlock(args.ptep, ptl);
1308e8edf0adSAneesh Kumar K.V 
1309c0fe07b0SGavin Shan 	ptl = pmd_lock(args.mm, args.pmdp);
1310c0fe07b0SGavin Shan 	pmd_clear_tests(&args);
1311c0fe07b0SGavin Shan 	pmd_advanced_tests(&args);
1312c0fe07b0SGavin Shan 	pmd_huge_tests(&args);
1313c0fe07b0SGavin Shan 	pmd_populate_tests(&args);
13146f302e27SAneesh Kumar K.V 	spin_unlock(ptl);
13156f302e27SAneesh Kumar K.V 
13164cbde03bSGavin Shan 	ptl = pud_lock(args.mm, args.pudp);
13174cbde03bSGavin Shan 	pud_clear_tests(&args);
13184cbde03bSGavin Shan 	pud_advanced_tests(&args);
13194cbde03bSGavin Shan 	pud_huge_tests(&args);
13204cbde03bSGavin Shan 	pud_populate_tests(&args);
13216f302e27SAneesh Kumar K.V 	spin_unlock(ptl);
13226f302e27SAneesh Kumar K.V 
13232f87f8c3SGavin Shan 	spin_lock(&(args.mm->page_table_lock));
13242f87f8c3SGavin Shan 	p4d_clear_tests(&args);
13252f87f8c3SGavin Shan 	pgd_clear_tests(&args);
13262f87f8c3SGavin Shan 	p4d_populate_tests(&args);
13272f87f8c3SGavin Shan 	pgd_populate_tests(&args);
13282f87f8c3SGavin Shan 	spin_unlock(&(args.mm->page_table_lock));
1329e8edf0adSAneesh Kumar K.V 
13303c9b84f0SGavin Shan 	destroy_args(&args);
1331399145f9SAnshuman Khandual 	return 0;
1332399145f9SAnshuman Khandual }
1333399145f9SAnshuman Khandual late_initcall(debug_vm_pgtable);
1334