1399145f9SAnshuman Khandual // SPDX-License-Identifier: GPL-2.0-only 2399145f9SAnshuman Khandual /* 3399145f9SAnshuman Khandual * This kernel test validates architecture page table helpers and 4399145f9SAnshuman Khandual * accessors and helps in verifying their continued compliance with 5399145f9SAnshuman Khandual * expected generic MM semantics. 6399145f9SAnshuman Khandual * 7399145f9SAnshuman Khandual * Copyright (C) 2019 ARM Ltd. 8399145f9SAnshuman Khandual * 9399145f9SAnshuman Khandual * Author: Anshuman Khandual <anshuman.khandual@arm.com> 10399145f9SAnshuman Khandual */ 116315df41SAnshuman Khandual #define pr_fmt(fmt) "debug_vm_pgtable: [%-25s]: " fmt, __func__ 12399145f9SAnshuman Khandual 13399145f9SAnshuman Khandual #include <linux/gfp.h> 14399145f9SAnshuman Khandual #include <linux/highmem.h> 15399145f9SAnshuman Khandual #include <linux/hugetlb.h> 16399145f9SAnshuman Khandual #include <linux/kernel.h> 17399145f9SAnshuman Khandual #include <linux/kconfig.h> 18399145f9SAnshuman Khandual #include <linux/mm.h> 19399145f9SAnshuman Khandual #include <linux/mman.h> 20399145f9SAnshuman Khandual #include <linux/mm_types.h> 21399145f9SAnshuman Khandual #include <linux/module.h> 22399145f9SAnshuman Khandual #include <linux/pfn_t.h> 23399145f9SAnshuman Khandual #include <linux/printk.h> 24a5c3b9ffSAnshuman Khandual #include <linux/pgtable.h> 25399145f9SAnshuman Khandual #include <linux/random.h> 26399145f9SAnshuman Khandual #include <linux/spinlock.h> 27399145f9SAnshuman Khandual #include <linux/swap.h> 28399145f9SAnshuman Khandual #include <linux/swapops.h> 29399145f9SAnshuman Khandual #include <linux/start_kernel.h> 30399145f9SAnshuman Khandual #include <linux/sched/mm.h> 3185a14463SAneesh Kumar K.V #include <linux/io.h> 32399145f9SAnshuman Khandual #include <asm/pgalloc.h> 33a5c3b9ffSAnshuman Khandual #include <asm/tlbflush.h> 34399145f9SAnshuman Khandual 35b1d00007SAnshuman Khandual /* 36b1d00007SAnshuman Khandual * Please refer Documentation/vm/arch_pgtable_helpers.rst for the semantics 37b1d00007SAnshuman Khandual * expectations that are being validated here. All future changes in here 38b1d00007SAnshuman Khandual * or the documentation need to be in sync. 39b1d00007SAnshuman Khandual */ 40b1d00007SAnshuman Khandual 41399145f9SAnshuman Khandual #define VMFLAGS (VM_READ|VM_WRITE|VM_EXEC) 42399145f9SAnshuman Khandual 43399145f9SAnshuman Khandual /* 44399145f9SAnshuman Khandual * On s390 platform, the lower 4 bits are used to identify given page table 45399145f9SAnshuman Khandual * entry type. But these bits might affect the ability to clear entries with 46399145f9SAnshuman Khandual * pxx_clear() because of how dynamic page table folding works on s390. So 47399145f9SAnshuman Khandual * while loading up the entries do not change the lower 4 bits. It does not 48cfc5bbc4SAneesh Kumar K.V * have affect any other platform. Also avoid the 62nd bit on ppc64 that is 49cfc5bbc4SAneesh Kumar K.V * used to mark a pte entry. 50399145f9SAnshuman Khandual */ 51cfc5bbc4SAneesh Kumar K.V #define S390_SKIP_MASK GENMASK(3, 0) 52cfc5bbc4SAneesh Kumar K.V #if __BITS_PER_LONG == 64 53cfc5bbc4SAneesh Kumar K.V #define PPC64_SKIP_MASK GENMASK(62, 62) 54cfc5bbc4SAneesh Kumar K.V #else 55cfc5bbc4SAneesh Kumar K.V #define PPC64_SKIP_MASK 0x0 56cfc5bbc4SAneesh Kumar K.V #endif 57cfc5bbc4SAneesh Kumar K.V #define ARCH_SKIP_MASK (S390_SKIP_MASK | PPC64_SKIP_MASK) 58cfc5bbc4SAneesh Kumar K.V #define RANDOM_ORVALUE (GENMASK(BITS_PER_LONG - 1, 0) & ~ARCH_SKIP_MASK) 59399145f9SAnshuman Khandual #define RANDOM_NZVALUE GENMASK(7, 0) 60399145f9SAnshuman Khandual 613c9b84f0SGavin Shan struct pgtable_debug_args { 623c9b84f0SGavin Shan struct mm_struct *mm; 633c9b84f0SGavin Shan struct vm_area_struct *vma; 643c9b84f0SGavin Shan 653c9b84f0SGavin Shan pgd_t *pgdp; 663c9b84f0SGavin Shan p4d_t *p4dp; 673c9b84f0SGavin Shan pud_t *pudp; 683c9b84f0SGavin Shan pmd_t *pmdp; 693c9b84f0SGavin Shan pte_t *ptep; 703c9b84f0SGavin Shan 713c9b84f0SGavin Shan p4d_t *start_p4dp; 723c9b84f0SGavin Shan pud_t *start_pudp; 733c9b84f0SGavin Shan pmd_t *start_pmdp; 743c9b84f0SGavin Shan pgtable_t start_ptep; 753c9b84f0SGavin Shan 763c9b84f0SGavin Shan unsigned long vaddr; 773c9b84f0SGavin Shan pgprot_t page_prot; 783c9b84f0SGavin Shan pgprot_t page_prot_none; 793c9b84f0SGavin Shan 803c9b84f0SGavin Shan bool is_contiguous_page; 813c9b84f0SGavin Shan unsigned long pud_pfn; 823c9b84f0SGavin Shan unsigned long pmd_pfn; 833c9b84f0SGavin Shan unsigned long pte_pfn; 843c9b84f0SGavin Shan 853c9b84f0SGavin Shan unsigned long fixed_pgd_pfn; 863c9b84f0SGavin Shan unsigned long fixed_p4d_pfn; 873c9b84f0SGavin Shan unsigned long fixed_pud_pfn; 883c9b84f0SGavin Shan unsigned long fixed_pmd_pfn; 893c9b84f0SGavin Shan unsigned long fixed_pte_pfn; 903c9b84f0SGavin Shan }; 913c9b84f0SGavin Shan 92*36b77d1eSGavin Shan static void __init pte_basic_tests(struct pgtable_debug_args *args, int idx) 93399145f9SAnshuman Khandual { 942e326c07SAnshuman Khandual pgprot_t prot = protection_map[idx]; 95*36b77d1eSGavin Shan pte_t pte = pfn_pte(args->fixed_pte_pfn, prot); 962e326c07SAnshuman Khandual unsigned long val = idx, *ptr = &val; 97399145f9SAnshuman Khandual 982e326c07SAnshuman Khandual pr_debug("Validating PTE basic (%pGv)\n", ptr); 99bb5c47ceSAnshuman Khandual 100bb5c47ceSAnshuman Khandual /* 101bb5c47ceSAnshuman Khandual * This test needs to be executed after the given page table entry 102bb5c47ceSAnshuman Khandual * is created with pfn_pte() to make sure that protection_map[idx] 103bb5c47ceSAnshuman Khandual * does not have the dirty bit enabled from the beginning. This is 104bb5c47ceSAnshuman Khandual * important for platforms like arm64 where (!PTE_RDONLY) indicate 105bb5c47ceSAnshuman Khandual * dirty bit being set. 106bb5c47ceSAnshuman Khandual */ 107bb5c47ceSAnshuman Khandual WARN_ON(pte_dirty(pte_wrprotect(pte))); 108bb5c47ceSAnshuman Khandual 109399145f9SAnshuman Khandual WARN_ON(!pte_same(pte, pte)); 110399145f9SAnshuman Khandual WARN_ON(!pte_young(pte_mkyoung(pte_mkold(pte)))); 111399145f9SAnshuman Khandual WARN_ON(!pte_dirty(pte_mkdirty(pte_mkclean(pte)))); 112399145f9SAnshuman Khandual WARN_ON(!pte_write(pte_mkwrite(pte_wrprotect(pte)))); 113399145f9SAnshuman Khandual WARN_ON(pte_young(pte_mkold(pte_mkyoung(pte)))); 114399145f9SAnshuman Khandual WARN_ON(pte_dirty(pte_mkclean(pte_mkdirty(pte)))); 115399145f9SAnshuman Khandual WARN_ON(pte_write(pte_wrprotect(pte_mkwrite(pte)))); 116bb5c47ceSAnshuman Khandual WARN_ON(pte_dirty(pte_wrprotect(pte_mkclean(pte)))); 117bb5c47ceSAnshuman Khandual WARN_ON(!pte_dirty(pte_wrprotect(pte_mkdirty(pte)))); 118399145f9SAnshuman Khandual } 119399145f9SAnshuman Khandual 120a5c3b9ffSAnshuman Khandual static void __init pte_advanced_tests(struct mm_struct *mm, 121a5c3b9ffSAnshuman Khandual struct vm_area_struct *vma, pte_t *ptep, 122a5c3b9ffSAnshuman Khandual unsigned long pfn, unsigned long vaddr, 123a5c3b9ffSAnshuman Khandual pgprot_t prot) 124a5c3b9ffSAnshuman Khandual { 125b593b90dSShixin Liu pte_t pte; 126a5c3b9ffSAnshuman Khandual 127c3824e18SAneesh Kumar K.V /* 128c3824e18SAneesh Kumar K.V * Architectures optimize set_pte_at by avoiding TLB flush. 129c3824e18SAneesh Kumar K.V * This requires set_pte_at to be not used to update an 130c3824e18SAneesh Kumar K.V * existing pte entry. Clear pte before we do set_pte_at 131c3824e18SAneesh Kumar K.V */ 132c3824e18SAneesh Kumar K.V 1336315df41SAnshuman Khandual pr_debug("Validating PTE advanced\n"); 134a5c3b9ffSAnshuman Khandual pte = pfn_pte(pfn, prot); 135a5c3b9ffSAnshuman Khandual set_pte_at(mm, vaddr, ptep, pte); 136a5c3b9ffSAnshuman Khandual ptep_set_wrprotect(mm, vaddr, ptep); 137a5c3b9ffSAnshuman Khandual pte = ptep_get(ptep); 138a5c3b9ffSAnshuman Khandual WARN_ON(pte_write(pte)); 139a5c3b9ffSAnshuman Khandual ptep_get_and_clear(mm, vaddr, ptep); 140a5c3b9ffSAnshuman Khandual pte = ptep_get(ptep); 141a5c3b9ffSAnshuman Khandual WARN_ON(!pte_none(pte)); 142a5c3b9ffSAnshuman Khandual 143a5c3b9ffSAnshuman Khandual pte = pfn_pte(pfn, prot); 144a5c3b9ffSAnshuman Khandual pte = pte_wrprotect(pte); 145a5c3b9ffSAnshuman Khandual pte = pte_mkclean(pte); 146a5c3b9ffSAnshuman Khandual set_pte_at(mm, vaddr, ptep, pte); 147a5c3b9ffSAnshuman Khandual pte = pte_mkwrite(pte); 148a5c3b9ffSAnshuman Khandual pte = pte_mkdirty(pte); 149a5c3b9ffSAnshuman Khandual ptep_set_access_flags(vma, vaddr, ptep, pte, 1); 150a5c3b9ffSAnshuman Khandual pte = ptep_get(ptep); 151a5c3b9ffSAnshuman Khandual WARN_ON(!(pte_write(pte) && pte_dirty(pte))); 152a5c3b9ffSAnshuman Khandual ptep_get_and_clear_full(mm, vaddr, ptep, 1); 153a5c3b9ffSAnshuman Khandual pte = ptep_get(ptep); 154a5c3b9ffSAnshuman Khandual WARN_ON(!pte_none(pte)); 155a5c3b9ffSAnshuman Khandual 156c3824e18SAneesh Kumar K.V pte = pfn_pte(pfn, prot); 157a5c3b9ffSAnshuman Khandual pte = pte_mkyoung(pte); 158a5c3b9ffSAnshuman Khandual set_pte_at(mm, vaddr, ptep, pte); 159a5c3b9ffSAnshuman Khandual ptep_test_and_clear_young(vma, vaddr, ptep); 160a5c3b9ffSAnshuman Khandual pte = ptep_get(ptep); 161a5c3b9ffSAnshuman Khandual WARN_ON(pte_young(pte)); 162a5c3b9ffSAnshuman Khandual } 163a5c3b9ffSAnshuman Khandual 164a5c3b9ffSAnshuman Khandual static void __init pte_savedwrite_tests(unsigned long pfn, pgprot_t prot) 165a5c3b9ffSAnshuman Khandual { 166a5c3b9ffSAnshuman Khandual pte_t pte = pfn_pte(pfn, prot); 167a5c3b9ffSAnshuman Khandual 1684200605bSAneesh Kumar K.V if (!IS_ENABLED(CONFIG_NUMA_BALANCING)) 1694200605bSAneesh Kumar K.V return; 1704200605bSAneesh Kumar K.V 1716315df41SAnshuman Khandual pr_debug("Validating PTE saved write\n"); 172a5c3b9ffSAnshuman Khandual WARN_ON(!pte_savedwrite(pte_mk_savedwrite(pte_clear_savedwrite(pte)))); 173a5c3b9ffSAnshuman Khandual WARN_ON(pte_savedwrite(pte_clear_savedwrite(pte_mk_savedwrite(pte)))); 174a5c3b9ffSAnshuman Khandual } 1754200605bSAneesh Kumar K.V 176399145f9SAnshuman Khandual #ifdef CONFIG_TRANSPARENT_HUGEPAGE 177*36b77d1eSGavin Shan static void __init pmd_basic_tests(struct pgtable_debug_args *args, int idx) 178399145f9SAnshuman Khandual { 1792e326c07SAnshuman Khandual pgprot_t prot = protection_map[idx]; 1802e326c07SAnshuman Khandual unsigned long val = idx, *ptr = &val; 18165ac1a60SAnshuman Khandual pmd_t pmd; 182399145f9SAnshuman Khandual 183787d563bSAneesh Kumar K.V if (!has_transparent_hugepage()) 184787d563bSAneesh Kumar K.V return; 185787d563bSAneesh Kumar K.V 1862e326c07SAnshuman Khandual pr_debug("Validating PMD basic (%pGv)\n", ptr); 187*36b77d1eSGavin Shan pmd = pfn_pmd(args->fixed_pmd_pfn, prot); 188bb5c47ceSAnshuman Khandual 189bb5c47ceSAnshuman Khandual /* 190bb5c47ceSAnshuman Khandual * This test needs to be executed after the given page table entry 191bb5c47ceSAnshuman Khandual * is created with pfn_pmd() to make sure that protection_map[idx] 192bb5c47ceSAnshuman Khandual * does not have the dirty bit enabled from the beginning. This is 193bb5c47ceSAnshuman Khandual * important for platforms like arm64 where (!PTE_RDONLY) indicate 194bb5c47ceSAnshuman Khandual * dirty bit being set. 195bb5c47ceSAnshuman Khandual */ 196bb5c47ceSAnshuman Khandual WARN_ON(pmd_dirty(pmd_wrprotect(pmd))); 197bb5c47ceSAnshuman Khandual 198bb5c47ceSAnshuman Khandual 199399145f9SAnshuman Khandual WARN_ON(!pmd_same(pmd, pmd)); 200399145f9SAnshuman Khandual WARN_ON(!pmd_young(pmd_mkyoung(pmd_mkold(pmd)))); 201399145f9SAnshuman Khandual WARN_ON(!pmd_dirty(pmd_mkdirty(pmd_mkclean(pmd)))); 202399145f9SAnshuman Khandual WARN_ON(!pmd_write(pmd_mkwrite(pmd_wrprotect(pmd)))); 203399145f9SAnshuman Khandual WARN_ON(pmd_young(pmd_mkold(pmd_mkyoung(pmd)))); 204399145f9SAnshuman Khandual WARN_ON(pmd_dirty(pmd_mkclean(pmd_mkdirty(pmd)))); 205399145f9SAnshuman Khandual WARN_ON(pmd_write(pmd_wrprotect(pmd_mkwrite(pmd)))); 206bb5c47ceSAnshuman Khandual WARN_ON(pmd_dirty(pmd_wrprotect(pmd_mkclean(pmd)))); 207bb5c47ceSAnshuman Khandual WARN_ON(!pmd_dirty(pmd_wrprotect(pmd_mkdirty(pmd)))); 208399145f9SAnshuman Khandual /* 209399145f9SAnshuman Khandual * A huge page does not point to next level page table 210399145f9SAnshuman Khandual * entry. Hence this must qualify as pmd_bad(). 211399145f9SAnshuman Khandual */ 212399145f9SAnshuman Khandual WARN_ON(!pmd_bad(pmd_mkhuge(pmd))); 213399145f9SAnshuman Khandual } 214399145f9SAnshuman Khandual 215a5c3b9ffSAnshuman Khandual static void __init pmd_advanced_tests(struct mm_struct *mm, 216a5c3b9ffSAnshuman Khandual struct vm_area_struct *vma, pmd_t *pmdp, 217a5c3b9ffSAnshuman Khandual unsigned long pfn, unsigned long vaddr, 21887f34986SAneesh Kumar K.V pgprot_t prot, pgtable_t pgtable) 219a5c3b9ffSAnshuman Khandual { 22065ac1a60SAnshuman Khandual pmd_t pmd; 221a5c3b9ffSAnshuman Khandual 222a5c3b9ffSAnshuman Khandual if (!has_transparent_hugepage()) 223a5c3b9ffSAnshuman Khandual return; 224a5c3b9ffSAnshuman Khandual 2256315df41SAnshuman Khandual pr_debug("Validating PMD advanced\n"); 226a5c3b9ffSAnshuman Khandual /* Align the address wrt HPAGE_PMD_SIZE */ 22704f7ce3fSGerald Schaefer vaddr &= HPAGE_PMD_MASK; 228a5c3b9ffSAnshuman Khandual 22987f34986SAneesh Kumar K.V pgtable_trans_huge_deposit(mm, pmdp, pgtable); 23087f34986SAneesh Kumar K.V 231a5c3b9ffSAnshuman Khandual pmd = pfn_pmd(pfn, prot); 232a5c3b9ffSAnshuman Khandual set_pmd_at(mm, vaddr, pmdp, pmd); 233a5c3b9ffSAnshuman Khandual pmdp_set_wrprotect(mm, vaddr, pmdp); 234a5c3b9ffSAnshuman Khandual pmd = READ_ONCE(*pmdp); 235a5c3b9ffSAnshuman Khandual WARN_ON(pmd_write(pmd)); 236a5c3b9ffSAnshuman Khandual pmdp_huge_get_and_clear(mm, vaddr, pmdp); 237a5c3b9ffSAnshuman Khandual pmd = READ_ONCE(*pmdp); 238a5c3b9ffSAnshuman Khandual WARN_ON(!pmd_none(pmd)); 239a5c3b9ffSAnshuman Khandual 240a5c3b9ffSAnshuman Khandual pmd = pfn_pmd(pfn, prot); 241a5c3b9ffSAnshuman Khandual pmd = pmd_wrprotect(pmd); 242a5c3b9ffSAnshuman Khandual pmd = pmd_mkclean(pmd); 243a5c3b9ffSAnshuman Khandual set_pmd_at(mm, vaddr, pmdp, pmd); 244a5c3b9ffSAnshuman Khandual pmd = pmd_mkwrite(pmd); 245a5c3b9ffSAnshuman Khandual pmd = pmd_mkdirty(pmd); 246a5c3b9ffSAnshuman Khandual pmdp_set_access_flags(vma, vaddr, pmdp, pmd, 1); 247a5c3b9ffSAnshuman Khandual pmd = READ_ONCE(*pmdp); 248a5c3b9ffSAnshuman Khandual WARN_ON(!(pmd_write(pmd) && pmd_dirty(pmd))); 249a5c3b9ffSAnshuman Khandual pmdp_huge_get_and_clear_full(vma, vaddr, pmdp, 1); 250a5c3b9ffSAnshuman Khandual pmd = READ_ONCE(*pmdp); 251a5c3b9ffSAnshuman Khandual WARN_ON(!pmd_none(pmd)); 252a5c3b9ffSAnshuman Khandual 253c3824e18SAneesh Kumar K.V pmd = pmd_mkhuge(pfn_pmd(pfn, prot)); 254a5c3b9ffSAnshuman Khandual pmd = pmd_mkyoung(pmd); 255a5c3b9ffSAnshuman Khandual set_pmd_at(mm, vaddr, pmdp, pmd); 256a5c3b9ffSAnshuman Khandual pmdp_test_and_clear_young(vma, vaddr, pmdp); 257a5c3b9ffSAnshuman Khandual pmd = READ_ONCE(*pmdp); 258a5c3b9ffSAnshuman Khandual WARN_ON(pmd_young(pmd)); 25987f34986SAneesh Kumar K.V 26013af0506SAneesh Kumar K.V /* Clear the pte entries */ 26113af0506SAneesh Kumar K.V pmdp_huge_get_and_clear(mm, vaddr, pmdp); 26287f34986SAneesh Kumar K.V pgtable = pgtable_trans_huge_withdraw(mm, pmdp); 263a5c3b9ffSAnshuman Khandual } 264a5c3b9ffSAnshuman Khandual 265a5c3b9ffSAnshuman Khandual static void __init pmd_leaf_tests(unsigned long pfn, pgprot_t prot) 266a5c3b9ffSAnshuman Khandual { 26765ac1a60SAnshuman Khandual pmd_t pmd; 26865ac1a60SAnshuman Khandual 26965ac1a60SAnshuman Khandual if (!has_transparent_hugepage()) 27065ac1a60SAnshuman Khandual return; 271a5c3b9ffSAnshuman Khandual 2726315df41SAnshuman Khandual pr_debug("Validating PMD leaf\n"); 27365ac1a60SAnshuman Khandual pmd = pfn_pmd(pfn, prot); 27465ac1a60SAnshuman Khandual 275a5c3b9ffSAnshuman Khandual /* 276a5c3b9ffSAnshuman Khandual * PMD based THP is a leaf entry. 277a5c3b9ffSAnshuman Khandual */ 278a5c3b9ffSAnshuman Khandual pmd = pmd_mkhuge(pmd); 279a5c3b9ffSAnshuman Khandual WARN_ON(!pmd_leaf(pmd)); 280a5c3b9ffSAnshuman Khandual } 281a5c3b9ffSAnshuman Khandual 282a5c3b9ffSAnshuman Khandual static void __init pmd_savedwrite_tests(unsigned long pfn, pgprot_t prot) 283a5c3b9ffSAnshuman Khandual { 28465ac1a60SAnshuman Khandual pmd_t pmd; 285a5c3b9ffSAnshuman Khandual 2864200605bSAneesh Kumar K.V if (!IS_ENABLED(CONFIG_NUMA_BALANCING)) 2874200605bSAneesh Kumar K.V return; 2884200605bSAneesh Kumar K.V 28965ac1a60SAnshuman Khandual if (!has_transparent_hugepage()) 29065ac1a60SAnshuman Khandual return; 29165ac1a60SAnshuman Khandual 2926315df41SAnshuman Khandual pr_debug("Validating PMD saved write\n"); 29365ac1a60SAnshuman Khandual pmd = pfn_pmd(pfn, prot); 294a5c3b9ffSAnshuman Khandual WARN_ON(!pmd_savedwrite(pmd_mk_savedwrite(pmd_clear_savedwrite(pmd)))); 295a5c3b9ffSAnshuman Khandual WARN_ON(pmd_savedwrite(pmd_clear_savedwrite(pmd_mk_savedwrite(pmd)))); 296a5c3b9ffSAnshuman Khandual } 297a5c3b9ffSAnshuman Khandual 298399145f9SAnshuman Khandual #ifdef CONFIG_HAVE_ARCH_TRANSPARENT_HUGEPAGE_PUD 299*36b77d1eSGavin Shan static void __init pud_basic_tests(struct pgtable_debug_args *args, int idx) 300399145f9SAnshuman Khandual { 3012e326c07SAnshuman Khandual pgprot_t prot = protection_map[idx]; 3022e326c07SAnshuman Khandual unsigned long val = idx, *ptr = &val; 30365ac1a60SAnshuman Khandual pud_t pud; 304399145f9SAnshuman Khandual 305787d563bSAneesh Kumar K.V if (!has_transparent_hugepage()) 306787d563bSAneesh Kumar K.V return; 307787d563bSAneesh Kumar K.V 3082e326c07SAnshuman Khandual pr_debug("Validating PUD basic (%pGv)\n", ptr); 309*36b77d1eSGavin Shan pud = pfn_pud(args->fixed_pud_pfn, prot); 310bb5c47ceSAnshuman Khandual 311bb5c47ceSAnshuman Khandual /* 312bb5c47ceSAnshuman Khandual * This test needs to be executed after the given page table entry 313bb5c47ceSAnshuman Khandual * is created with pfn_pud() to make sure that protection_map[idx] 314bb5c47ceSAnshuman Khandual * does not have the dirty bit enabled from the beginning. This is 315bb5c47ceSAnshuman Khandual * important for platforms like arm64 where (!PTE_RDONLY) indicate 316bb5c47ceSAnshuman Khandual * dirty bit being set. 317bb5c47ceSAnshuman Khandual */ 318bb5c47ceSAnshuman Khandual WARN_ON(pud_dirty(pud_wrprotect(pud))); 319bb5c47ceSAnshuman Khandual 320399145f9SAnshuman Khandual WARN_ON(!pud_same(pud, pud)); 321399145f9SAnshuman Khandual WARN_ON(!pud_young(pud_mkyoung(pud_mkold(pud)))); 322bb5c47ceSAnshuman Khandual WARN_ON(!pud_dirty(pud_mkdirty(pud_mkclean(pud)))); 323bb5c47ceSAnshuman Khandual WARN_ON(pud_dirty(pud_mkclean(pud_mkdirty(pud)))); 324399145f9SAnshuman Khandual WARN_ON(!pud_write(pud_mkwrite(pud_wrprotect(pud)))); 325399145f9SAnshuman Khandual WARN_ON(pud_write(pud_wrprotect(pud_mkwrite(pud)))); 326399145f9SAnshuman Khandual WARN_ON(pud_young(pud_mkold(pud_mkyoung(pud)))); 327bb5c47ceSAnshuman Khandual WARN_ON(pud_dirty(pud_wrprotect(pud_mkclean(pud)))); 328bb5c47ceSAnshuman Khandual WARN_ON(!pud_dirty(pud_wrprotect(pud_mkdirty(pud)))); 329399145f9SAnshuman Khandual 330*36b77d1eSGavin Shan if (mm_pmd_folded(args->mm)) 331399145f9SAnshuman Khandual return; 332399145f9SAnshuman Khandual 333399145f9SAnshuman Khandual /* 334399145f9SAnshuman Khandual * A huge page does not point to next level page table 335399145f9SAnshuman Khandual * entry. Hence this must qualify as pud_bad(). 336399145f9SAnshuman Khandual */ 337399145f9SAnshuman Khandual WARN_ON(!pud_bad(pud_mkhuge(pud))); 338399145f9SAnshuman Khandual } 339a5c3b9ffSAnshuman Khandual 340a5c3b9ffSAnshuman Khandual static void __init pud_advanced_tests(struct mm_struct *mm, 341a5c3b9ffSAnshuman Khandual struct vm_area_struct *vma, pud_t *pudp, 342a5c3b9ffSAnshuman Khandual unsigned long pfn, unsigned long vaddr, 343a5c3b9ffSAnshuman Khandual pgprot_t prot) 344a5c3b9ffSAnshuman Khandual { 34565ac1a60SAnshuman Khandual pud_t pud; 346a5c3b9ffSAnshuman Khandual 347a5c3b9ffSAnshuman Khandual if (!has_transparent_hugepage()) 348a5c3b9ffSAnshuman Khandual return; 349a5c3b9ffSAnshuman Khandual 3506315df41SAnshuman Khandual pr_debug("Validating PUD advanced\n"); 351a5c3b9ffSAnshuman Khandual /* Align the address wrt HPAGE_PUD_SIZE */ 35204f7ce3fSGerald Schaefer vaddr &= HPAGE_PUD_MASK; 353a5c3b9ffSAnshuman Khandual 35465ac1a60SAnshuman Khandual pud = pfn_pud(pfn, prot); 355a5c3b9ffSAnshuman Khandual set_pud_at(mm, vaddr, pudp, pud); 356a5c3b9ffSAnshuman Khandual pudp_set_wrprotect(mm, vaddr, pudp); 357a5c3b9ffSAnshuman Khandual pud = READ_ONCE(*pudp); 358a5c3b9ffSAnshuman Khandual WARN_ON(pud_write(pud)); 359a5c3b9ffSAnshuman Khandual 360a5c3b9ffSAnshuman Khandual #ifndef __PAGETABLE_PMD_FOLDED 361a5c3b9ffSAnshuman Khandual pudp_huge_get_and_clear(mm, vaddr, pudp); 362a5c3b9ffSAnshuman Khandual pud = READ_ONCE(*pudp); 363a5c3b9ffSAnshuman Khandual WARN_ON(!pud_none(pud)); 364a5c3b9ffSAnshuman Khandual #endif /* __PAGETABLE_PMD_FOLDED */ 365a5c3b9ffSAnshuman Khandual pud = pfn_pud(pfn, prot); 366a5c3b9ffSAnshuman Khandual pud = pud_wrprotect(pud); 367a5c3b9ffSAnshuman Khandual pud = pud_mkclean(pud); 368a5c3b9ffSAnshuman Khandual set_pud_at(mm, vaddr, pudp, pud); 369a5c3b9ffSAnshuman Khandual pud = pud_mkwrite(pud); 370a5c3b9ffSAnshuman Khandual pud = pud_mkdirty(pud); 371a5c3b9ffSAnshuman Khandual pudp_set_access_flags(vma, vaddr, pudp, pud, 1); 372a5c3b9ffSAnshuman Khandual pud = READ_ONCE(*pudp); 373a5c3b9ffSAnshuman Khandual WARN_ON(!(pud_write(pud) && pud_dirty(pud))); 374a5c3b9ffSAnshuman Khandual 375c3824e18SAneesh Kumar K.V #ifndef __PAGETABLE_PMD_FOLDED 376c3824e18SAneesh Kumar K.V pudp_huge_get_and_clear_full(mm, vaddr, pudp, 1); 377c3824e18SAneesh Kumar K.V pud = READ_ONCE(*pudp); 378c3824e18SAneesh Kumar K.V WARN_ON(!pud_none(pud)); 379c3824e18SAneesh Kumar K.V #endif /* __PAGETABLE_PMD_FOLDED */ 380c3824e18SAneesh Kumar K.V 381c3824e18SAneesh Kumar K.V pud = pfn_pud(pfn, prot); 382a5c3b9ffSAnshuman Khandual pud = pud_mkyoung(pud); 383a5c3b9ffSAnshuman Khandual set_pud_at(mm, vaddr, pudp, pud); 384a5c3b9ffSAnshuman Khandual pudp_test_and_clear_young(vma, vaddr, pudp); 385a5c3b9ffSAnshuman Khandual pud = READ_ONCE(*pudp); 386a5c3b9ffSAnshuman Khandual WARN_ON(pud_young(pud)); 38713af0506SAneesh Kumar K.V 38813af0506SAneesh Kumar K.V pudp_huge_get_and_clear(mm, vaddr, pudp); 389a5c3b9ffSAnshuman Khandual } 390a5c3b9ffSAnshuman Khandual 391a5c3b9ffSAnshuman Khandual static void __init pud_leaf_tests(unsigned long pfn, pgprot_t prot) 392a5c3b9ffSAnshuman Khandual { 39365ac1a60SAnshuman Khandual pud_t pud; 39465ac1a60SAnshuman Khandual 39565ac1a60SAnshuman Khandual if (!has_transparent_hugepage()) 39665ac1a60SAnshuman Khandual return; 397a5c3b9ffSAnshuman Khandual 3986315df41SAnshuman Khandual pr_debug("Validating PUD leaf\n"); 39965ac1a60SAnshuman Khandual pud = pfn_pud(pfn, prot); 400a5c3b9ffSAnshuman Khandual /* 401a5c3b9ffSAnshuman Khandual * PUD based THP is a leaf entry. 402a5c3b9ffSAnshuman Khandual */ 403a5c3b9ffSAnshuman Khandual pud = pud_mkhuge(pud); 404a5c3b9ffSAnshuman Khandual WARN_ON(!pud_leaf(pud)); 405a5c3b9ffSAnshuman Khandual } 4065fe77be6SShixin Liu #else /* !CONFIG_HAVE_ARCH_TRANSPARENT_HUGEPAGE_PUD */ 407*36b77d1eSGavin Shan static void __init pud_basic_tests(struct pgtable_debug_args *args, int idx) { } 4085fe77be6SShixin Liu static void __init pud_advanced_tests(struct mm_struct *mm, 4095fe77be6SShixin Liu struct vm_area_struct *vma, pud_t *pudp, 4105fe77be6SShixin Liu unsigned long pfn, unsigned long vaddr, 4115fe77be6SShixin Liu pgprot_t prot) 4125fe77be6SShixin Liu { 4135fe77be6SShixin Liu } 4145fe77be6SShixin Liu static void __init pud_leaf_tests(unsigned long pfn, pgprot_t prot) { } 4155fe77be6SShixin Liu #endif /* CONFIG_HAVE_ARCH_TRANSPARENT_HUGEPAGE_PUD */ 4165fe77be6SShixin Liu #else /* !CONFIG_TRANSPARENT_HUGEPAGE */ 417*36b77d1eSGavin Shan static void __init pmd_basic_tests(struct pgtable_debug_args *args, int idx) { } 418*36b77d1eSGavin Shan static void __init pud_basic_tests(struct pgtable_debug_args *args, int idx) { } 4195fe77be6SShixin Liu static void __init pmd_advanced_tests(struct mm_struct *mm, 4205fe77be6SShixin Liu struct vm_area_struct *vma, pmd_t *pmdp, 4215fe77be6SShixin Liu unsigned long pfn, unsigned long vaddr, 4225fe77be6SShixin Liu pgprot_t prot, pgtable_t pgtable) 4235fe77be6SShixin Liu { 4245fe77be6SShixin Liu } 4255fe77be6SShixin Liu static void __init pud_advanced_tests(struct mm_struct *mm, 4265fe77be6SShixin Liu struct vm_area_struct *vma, pud_t *pudp, 4275fe77be6SShixin Liu unsigned long pfn, unsigned long vaddr, 4285fe77be6SShixin Liu pgprot_t prot) 4295fe77be6SShixin Liu { 4305fe77be6SShixin Liu } 4315fe77be6SShixin Liu static void __init pmd_leaf_tests(unsigned long pfn, pgprot_t prot) { } 4325fe77be6SShixin Liu static void __init pud_leaf_tests(unsigned long pfn, pgprot_t prot) { } 4335fe77be6SShixin Liu static void __init pmd_savedwrite_tests(unsigned long pfn, pgprot_t prot) { } 4345fe77be6SShixin Liu #endif /* CONFIG_TRANSPARENT_HUGEPAGE */ 435a5c3b9ffSAnshuman Khandual 43685a14463SAneesh Kumar K.V #ifdef CONFIG_HAVE_ARCH_HUGE_VMAP 4375fe77be6SShixin Liu static void __init pmd_huge_tests(pmd_t *pmdp, unsigned long pfn, pgprot_t prot) 4385fe77be6SShixin Liu { 4395fe77be6SShixin Liu pmd_t pmd; 4405fe77be6SShixin Liu 4415fe77be6SShixin Liu if (!arch_vmap_pmd_supported(prot)) 4425fe77be6SShixin Liu return; 4435fe77be6SShixin Liu 4445fe77be6SShixin Liu pr_debug("Validating PMD huge\n"); 4455fe77be6SShixin Liu /* 4465fe77be6SShixin Liu * X86 defined pmd_set_huge() verifies that the given 4475fe77be6SShixin Liu * PMD is not a populated non-leaf entry. 4485fe77be6SShixin Liu */ 4495fe77be6SShixin Liu WRITE_ONCE(*pmdp, __pmd(0)); 4505fe77be6SShixin Liu WARN_ON(!pmd_set_huge(pmdp, __pfn_to_phys(pfn), prot)); 4515fe77be6SShixin Liu WARN_ON(!pmd_clear_huge(pmdp)); 4525fe77be6SShixin Liu pmd = READ_ONCE(*pmdp); 4535fe77be6SShixin Liu WARN_ON(!pmd_none(pmd)); 4545fe77be6SShixin Liu } 4555fe77be6SShixin Liu 456a5c3b9ffSAnshuman Khandual static void __init pud_huge_tests(pud_t *pudp, unsigned long pfn, pgprot_t prot) 457a5c3b9ffSAnshuman Khandual { 458a5c3b9ffSAnshuman Khandual pud_t pud; 459a5c3b9ffSAnshuman Khandual 460bbc180a5SNicholas Piggin if (!arch_vmap_pud_supported(prot)) 461a5c3b9ffSAnshuman Khandual return; 4626315df41SAnshuman Khandual 4636315df41SAnshuman Khandual pr_debug("Validating PUD huge\n"); 464a5c3b9ffSAnshuman Khandual /* 465a5c3b9ffSAnshuman Khandual * X86 defined pud_set_huge() verifies that the given 466a5c3b9ffSAnshuman Khandual * PUD is not a populated non-leaf entry. 467a5c3b9ffSAnshuman Khandual */ 468a5c3b9ffSAnshuman Khandual WRITE_ONCE(*pudp, __pud(0)); 469a5c3b9ffSAnshuman Khandual WARN_ON(!pud_set_huge(pudp, __pfn_to_phys(pfn), prot)); 470a5c3b9ffSAnshuman Khandual WARN_ON(!pud_clear_huge(pudp)); 471a5c3b9ffSAnshuman Khandual pud = READ_ONCE(*pudp); 472a5c3b9ffSAnshuman Khandual WARN_ON(!pud_none(pud)); 473a5c3b9ffSAnshuman Khandual } 47485a14463SAneesh Kumar K.V #else /* !CONFIG_HAVE_ARCH_HUGE_VMAP */ 4755fe77be6SShixin Liu static void __init pmd_huge_tests(pmd_t *pmdp, unsigned long pfn, pgprot_t prot) { } 47685a14463SAneesh Kumar K.V static void __init pud_huge_tests(pud_t *pudp, unsigned long pfn, pgprot_t prot) { } 4775fe77be6SShixin Liu #endif /* CONFIG_HAVE_ARCH_HUGE_VMAP */ 478399145f9SAnshuman Khandual 479*36b77d1eSGavin Shan static void __init p4d_basic_tests(struct pgtable_debug_args *args) 480399145f9SAnshuman Khandual { 481399145f9SAnshuman Khandual p4d_t p4d; 482399145f9SAnshuman Khandual 4836315df41SAnshuman Khandual pr_debug("Validating P4D basic\n"); 484399145f9SAnshuman Khandual memset(&p4d, RANDOM_NZVALUE, sizeof(p4d_t)); 485399145f9SAnshuman Khandual WARN_ON(!p4d_same(p4d, p4d)); 486399145f9SAnshuman Khandual } 487399145f9SAnshuman Khandual 488*36b77d1eSGavin Shan static void __init pgd_basic_tests(struct pgtable_debug_args *args) 489399145f9SAnshuman Khandual { 490399145f9SAnshuman Khandual pgd_t pgd; 491399145f9SAnshuman Khandual 4926315df41SAnshuman Khandual pr_debug("Validating PGD basic\n"); 493399145f9SAnshuman Khandual memset(&pgd, RANDOM_NZVALUE, sizeof(pgd_t)); 494399145f9SAnshuman Khandual WARN_ON(!pgd_same(pgd, pgd)); 495399145f9SAnshuman Khandual } 496399145f9SAnshuman Khandual 497399145f9SAnshuman Khandual #ifndef __PAGETABLE_PUD_FOLDED 498399145f9SAnshuman Khandual static void __init pud_clear_tests(struct mm_struct *mm, pud_t *pudp) 499399145f9SAnshuman Khandual { 500399145f9SAnshuman Khandual pud_t pud = READ_ONCE(*pudp); 501399145f9SAnshuman Khandual 502399145f9SAnshuman Khandual if (mm_pmd_folded(mm)) 503399145f9SAnshuman Khandual return; 504399145f9SAnshuman Khandual 5056315df41SAnshuman Khandual pr_debug("Validating PUD clear\n"); 506399145f9SAnshuman Khandual pud = __pud(pud_val(pud) | RANDOM_ORVALUE); 507399145f9SAnshuman Khandual WRITE_ONCE(*pudp, pud); 508399145f9SAnshuman Khandual pud_clear(pudp); 509399145f9SAnshuman Khandual pud = READ_ONCE(*pudp); 510399145f9SAnshuman Khandual WARN_ON(!pud_none(pud)); 511399145f9SAnshuman Khandual } 512399145f9SAnshuman Khandual 513399145f9SAnshuman Khandual static void __init pud_populate_tests(struct mm_struct *mm, pud_t *pudp, 514399145f9SAnshuman Khandual pmd_t *pmdp) 515399145f9SAnshuman Khandual { 516399145f9SAnshuman Khandual pud_t pud; 517399145f9SAnshuman Khandual 518399145f9SAnshuman Khandual if (mm_pmd_folded(mm)) 519399145f9SAnshuman Khandual return; 5206315df41SAnshuman Khandual 5216315df41SAnshuman Khandual pr_debug("Validating PUD populate\n"); 522399145f9SAnshuman Khandual /* 523399145f9SAnshuman Khandual * This entry points to next level page table page. 524399145f9SAnshuman Khandual * Hence this must not qualify as pud_bad(). 525399145f9SAnshuman Khandual */ 526399145f9SAnshuman Khandual pud_populate(mm, pudp, pmdp); 527399145f9SAnshuman Khandual pud = READ_ONCE(*pudp); 528399145f9SAnshuman Khandual WARN_ON(pud_bad(pud)); 529399145f9SAnshuman Khandual } 530399145f9SAnshuman Khandual #else /* !__PAGETABLE_PUD_FOLDED */ 531399145f9SAnshuman Khandual static void __init pud_clear_tests(struct mm_struct *mm, pud_t *pudp) { } 532399145f9SAnshuman Khandual static void __init pud_populate_tests(struct mm_struct *mm, pud_t *pudp, 533399145f9SAnshuman Khandual pmd_t *pmdp) 534399145f9SAnshuman Khandual { 535399145f9SAnshuman Khandual } 536399145f9SAnshuman Khandual #endif /* PAGETABLE_PUD_FOLDED */ 537399145f9SAnshuman Khandual 538399145f9SAnshuman Khandual #ifndef __PAGETABLE_P4D_FOLDED 539399145f9SAnshuman Khandual static void __init p4d_clear_tests(struct mm_struct *mm, p4d_t *p4dp) 540399145f9SAnshuman Khandual { 541399145f9SAnshuman Khandual p4d_t p4d = READ_ONCE(*p4dp); 542399145f9SAnshuman Khandual 543399145f9SAnshuman Khandual if (mm_pud_folded(mm)) 544399145f9SAnshuman Khandual return; 545399145f9SAnshuman Khandual 5466315df41SAnshuman Khandual pr_debug("Validating P4D clear\n"); 547399145f9SAnshuman Khandual p4d = __p4d(p4d_val(p4d) | RANDOM_ORVALUE); 548399145f9SAnshuman Khandual WRITE_ONCE(*p4dp, p4d); 549399145f9SAnshuman Khandual p4d_clear(p4dp); 550399145f9SAnshuman Khandual p4d = READ_ONCE(*p4dp); 551399145f9SAnshuman Khandual WARN_ON(!p4d_none(p4d)); 552399145f9SAnshuman Khandual } 553399145f9SAnshuman Khandual 554399145f9SAnshuman Khandual static void __init p4d_populate_tests(struct mm_struct *mm, p4d_t *p4dp, 555399145f9SAnshuman Khandual pud_t *pudp) 556399145f9SAnshuman Khandual { 557399145f9SAnshuman Khandual p4d_t p4d; 558399145f9SAnshuman Khandual 559399145f9SAnshuman Khandual if (mm_pud_folded(mm)) 560399145f9SAnshuman Khandual return; 561399145f9SAnshuman Khandual 5626315df41SAnshuman Khandual pr_debug("Validating P4D populate\n"); 563399145f9SAnshuman Khandual /* 564399145f9SAnshuman Khandual * This entry points to next level page table page. 565399145f9SAnshuman Khandual * Hence this must not qualify as p4d_bad(). 566399145f9SAnshuman Khandual */ 567399145f9SAnshuman Khandual pud_clear(pudp); 568399145f9SAnshuman Khandual p4d_clear(p4dp); 569399145f9SAnshuman Khandual p4d_populate(mm, p4dp, pudp); 570399145f9SAnshuman Khandual p4d = READ_ONCE(*p4dp); 571399145f9SAnshuman Khandual WARN_ON(p4d_bad(p4d)); 572399145f9SAnshuman Khandual } 573399145f9SAnshuman Khandual 574399145f9SAnshuman Khandual static void __init pgd_clear_tests(struct mm_struct *mm, pgd_t *pgdp) 575399145f9SAnshuman Khandual { 576399145f9SAnshuman Khandual pgd_t pgd = READ_ONCE(*pgdp); 577399145f9SAnshuman Khandual 578399145f9SAnshuman Khandual if (mm_p4d_folded(mm)) 579399145f9SAnshuman Khandual return; 580399145f9SAnshuman Khandual 5816315df41SAnshuman Khandual pr_debug("Validating PGD clear\n"); 582399145f9SAnshuman Khandual pgd = __pgd(pgd_val(pgd) | RANDOM_ORVALUE); 583399145f9SAnshuman Khandual WRITE_ONCE(*pgdp, pgd); 584399145f9SAnshuman Khandual pgd_clear(pgdp); 585399145f9SAnshuman Khandual pgd = READ_ONCE(*pgdp); 586399145f9SAnshuman Khandual WARN_ON(!pgd_none(pgd)); 587399145f9SAnshuman Khandual } 588399145f9SAnshuman Khandual 589399145f9SAnshuman Khandual static void __init pgd_populate_tests(struct mm_struct *mm, pgd_t *pgdp, 590399145f9SAnshuman Khandual p4d_t *p4dp) 591399145f9SAnshuman Khandual { 592399145f9SAnshuman Khandual pgd_t pgd; 593399145f9SAnshuman Khandual 594399145f9SAnshuman Khandual if (mm_p4d_folded(mm)) 595399145f9SAnshuman Khandual return; 596399145f9SAnshuman Khandual 5976315df41SAnshuman Khandual pr_debug("Validating PGD populate\n"); 598399145f9SAnshuman Khandual /* 599399145f9SAnshuman Khandual * This entry points to next level page table page. 600399145f9SAnshuman Khandual * Hence this must not qualify as pgd_bad(). 601399145f9SAnshuman Khandual */ 602399145f9SAnshuman Khandual p4d_clear(p4dp); 603399145f9SAnshuman Khandual pgd_clear(pgdp); 604399145f9SAnshuman Khandual pgd_populate(mm, pgdp, p4dp); 605399145f9SAnshuman Khandual pgd = READ_ONCE(*pgdp); 606399145f9SAnshuman Khandual WARN_ON(pgd_bad(pgd)); 607399145f9SAnshuman Khandual } 608399145f9SAnshuman Khandual #else /* !__PAGETABLE_P4D_FOLDED */ 609399145f9SAnshuman Khandual static void __init p4d_clear_tests(struct mm_struct *mm, p4d_t *p4dp) { } 610399145f9SAnshuman Khandual static void __init pgd_clear_tests(struct mm_struct *mm, pgd_t *pgdp) { } 611399145f9SAnshuman Khandual static void __init p4d_populate_tests(struct mm_struct *mm, p4d_t *p4dp, 612399145f9SAnshuman Khandual pud_t *pudp) 613399145f9SAnshuman Khandual { 614399145f9SAnshuman Khandual } 615399145f9SAnshuman Khandual static void __init pgd_populate_tests(struct mm_struct *mm, pgd_t *pgdp, 616399145f9SAnshuman Khandual p4d_t *p4dp) 617399145f9SAnshuman Khandual { 618399145f9SAnshuman Khandual } 619399145f9SAnshuman Khandual #endif /* PAGETABLE_P4D_FOLDED */ 620399145f9SAnshuman Khandual 621399145f9SAnshuman Khandual static void __init pte_clear_tests(struct mm_struct *mm, pte_t *ptep, 622401035d5SAneesh Kumar K.V unsigned long pfn, unsigned long vaddr, 623401035d5SAneesh Kumar K.V pgprot_t prot) 624399145f9SAnshuman Khandual { 625401035d5SAneesh Kumar K.V pte_t pte = pfn_pte(pfn, prot); 626399145f9SAnshuman Khandual 6276315df41SAnshuman Khandual pr_debug("Validating PTE clear\n"); 628401035d5SAneesh Kumar K.V #ifndef CONFIG_RISCV 629399145f9SAnshuman Khandual pte = __pte(pte_val(pte) | RANDOM_ORVALUE); 630401035d5SAneesh Kumar K.V #endif 631399145f9SAnshuman Khandual set_pte_at(mm, vaddr, ptep, pte); 632399145f9SAnshuman Khandual barrier(); 633399145f9SAnshuman Khandual pte_clear(mm, vaddr, ptep); 6349449c9cbSChristophe Leroy pte = ptep_get(ptep); 635399145f9SAnshuman Khandual WARN_ON(!pte_none(pte)); 636399145f9SAnshuman Khandual } 637399145f9SAnshuman Khandual 638399145f9SAnshuman Khandual static void __init pmd_clear_tests(struct mm_struct *mm, pmd_t *pmdp) 639399145f9SAnshuman Khandual { 640399145f9SAnshuman Khandual pmd_t pmd = READ_ONCE(*pmdp); 641399145f9SAnshuman Khandual 6426315df41SAnshuman Khandual pr_debug("Validating PMD clear\n"); 643399145f9SAnshuman Khandual pmd = __pmd(pmd_val(pmd) | RANDOM_ORVALUE); 644399145f9SAnshuman Khandual WRITE_ONCE(*pmdp, pmd); 645399145f9SAnshuman Khandual pmd_clear(pmdp); 646399145f9SAnshuman Khandual pmd = READ_ONCE(*pmdp); 647399145f9SAnshuman Khandual WARN_ON(!pmd_none(pmd)); 648399145f9SAnshuman Khandual } 649399145f9SAnshuman Khandual 650399145f9SAnshuman Khandual static void __init pmd_populate_tests(struct mm_struct *mm, pmd_t *pmdp, 651399145f9SAnshuman Khandual pgtable_t pgtable) 652399145f9SAnshuman Khandual { 653399145f9SAnshuman Khandual pmd_t pmd; 654399145f9SAnshuman Khandual 6556315df41SAnshuman Khandual pr_debug("Validating PMD populate\n"); 656399145f9SAnshuman Khandual /* 657399145f9SAnshuman Khandual * This entry points to next level page table page. 658399145f9SAnshuman Khandual * Hence this must not qualify as pmd_bad(). 659399145f9SAnshuman Khandual */ 660399145f9SAnshuman Khandual pmd_populate(mm, pmdp, pgtable); 661399145f9SAnshuman Khandual pmd = READ_ONCE(*pmdp); 662399145f9SAnshuman Khandual WARN_ON(pmd_bad(pmd)); 663399145f9SAnshuman Khandual } 664399145f9SAnshuman Khandual 66505289402SAnshuman Khandual static void __init pte_special_tests(unsigned long pfn, pgprot_t prot) 66605289402SAnshuman Khandual { 66705289402SAnshuman Khandual pte_t pte = pfn_pte(pfn, prot); 66805289402SAnshuman Khandual 66905289402SAnshuman Khandual if (!IS_ENABLED(CONFIG_ARCH_HAS_PTE_SPECIAL)) 67005289402SAnshuman Khandual return; 67105289402SAnshuman Khandual 6726315df41SAnshuman Khandual pr_debug("Validating PTE special\n"); 67305289402SAnshuman Khandual WARN_ON(!pte_special(pte_mkspecial(pte))); 67405289402SAnshuman Khandual } 67505289402SAnshuman Khandual 67605289402SAnshuman Khandual static void __init pte_protnone_tests(unsigned long pfn, pgprot_t prot) 67705289402SAnshuman Khandual { 67805289402SAnshuman Khandual pte_t pte = pfn_pte(pfn, prot); 67905289402SAnshuman Khandual 68005289402SAnshuman Khandual if (!IS_ENABLED(CONFIG_NUMA_BALANCING)) 68105289402SAnshuman Khandual return; 68205289402SAnshuman Khandual 6836315df41SAnshuman Khandual pr_debug("Validating PTE protnone\n"); 68405289402SAnshuman Khandual WARN_ON(!pte_protnone(pte)); 68505289402SAnshuman Khandual WARN_ON(!pte_present(pte)); 68605289402SAnshuman Khandual } 68705289402SAnshuman Khandual 68805289402SAnshuman Khandual #ifdef CONFIG_TRANSPARENT_HUGEPAGE 68905289402SAnshuman Khandual static void __init pmd_protnone_tests(unsigned long pfn, pgprot_t prot) 69005289402SAnshuman Khandual { 69165ac1a60SAnshuman Khandual pmd_t pmd; 69205289402SAnshuman Khandual 69305289402SAnshuman Khandual if (!IS_ENABLED(CONFIG_NUMA_BALANCING)) 69405289402SAnshuman Khandual return; 69505289402SAnshuman Khandual 69665ac1a60SAnshuman Khandual if (!has_transparent_hugepage()) 69765ac1a60SAnshuman Khandual return; 69865ac1a60SAnshuman Khandual 6996315df41SAnshuman Khandual pr_debug("Validating PMD protnone\n"); 70065ac1a60SAnshuman Khandual pmd = pmd_mkhuge(pfn_pmd(pfn, prot)); 70105289402SAnshuman Khandual WARN_ON(!pmd_protnone(pmd)); 70205289402SAnshuman Khandual WARN_ON(!pmd_present(pmd)); 70305289402SAnshuman Khandual } 70405289402SAnshuman Khandual #else /* !CONFIG_TRANSPARENT_HUGEPAGE */ 70505289402SAnshuman Khandual static void __init pmd_protnone_tests(unsigned long pfn, pgprot_t prot) { } 70605289402SAnshuman Khandual #endif /* CONFIG_TRANSPARENT_HUGEPAGE */ 70705289402SAnshuman Khandual 70805289402SAnshuman Khandual #ifdef CONFIG_ARCH_HAS_PTE_DEVMAP 70905289402SAnshuman Khandual static void __init pte_devmap_tests(unsigned long pfn, pgprot_t prot) 71005289402SAnshuman Khandual { 71105289402SAnshuman Khandual pte_t pte = pfn_pte(pfn, prot); 71205289402SAnshuman Khandual 7136315df41SAnshuman Khandual pr_debug("Validating PTE devmap\n"); 71405289402SAnshuman Khandual WARN_ON(!pte_devmap(pte_mkdevmap(pte))); 71505289402SAnshuman Khandual } 71605289402SAnshuman Khandual 71705289402SAnshuman Khandual #ifdef CONFIG_TRANSPARENT_HUGEPAGE 71805289402SAnshuman Khandual static void __init pmd_devmap_tests(unsigned long pfn, pgprot_t prot) 71905289402SAnshuman Khandual { 72065ac1a60SAnshuman Khandual pmd_t pmd; 72165ac1a60SAnshuman Khandual 72265ac1a60SAnshuman Khandual if (!has_transparent_hugepage()) 72365ac1a60SAnshuman Khandual return; 72405289402SAnshuman Khandual 7256315df41SAnshuman Khandual pr_debug("Validating PMD devmap\n"); 72665ac1a60SAnshuman Khandual pmd = pfn_pmd(pfn, prot); 72705289402SAnshuman Khandual WARN_ON(!pmd_devmap(pmd_mkdevmap(pmd))); 72805289402SAnshuman Khandual } 72905289402SAnshuman Khandual 73005289402SAnshuman Khandual #ifdef CONFIG_HAVE_ARCH_TRANSPARENT_HUGEPAGE_PUD 73105289402SAnshuman Khandual static void __init pud_devmap_tests(unsigned long pfn, pgprot_t prot) 73205289402SAnshuman Khandual { 73365ac1a60SAnshuman Khandual pud_t pud; 73465ac1a60SAnshuman Khandual 73565ac1a60SAnshuman Khandual if (!has_transparent_hugepage()) 73665ac1a60SAnshuman Khandual return; 73705289402SAnshuman Khandual 7386315df41SAnshuman Khandual pr_debug("Validating PUD devmap\n"); 73965ac1a60SAnshuman Khandual pud = pfn_pud(pfn, prot); 74005289402SAnshuman Khandual WARN_ON(!pud_devmap(pud_mkdevmap(pud))); 74105289402SAnshuman Khandual } 74205289402SAnshuman Khandual #else /* !CONFIG_HAVE_ARCH_TRANSPARENT_HUGEPAGE_PUD */ 74305289402SAnshuman Khandual static void __init pud_devmap_tests(unsigned long pfn, pgprot_t prot) { } 74405289402SAnshuman Khandual #endif /* CONFIG_HAVE_ARCH_TRANSPARENT_HUGEPAGE_PUD */ 74505289402SAnshuman Khandual #else /* CONFIG_TRANSPARENT_HUGEPAGE */ 74605289402SAnshuman Khandual static void __init pmd_devmap_tests(unsigned long pfn, pgprot_t prot) { } 74705289402SAnshuman Khandual static void __init pud_devmap_tests(unsigned long pfn, pgprot_t prot) { } 74805289402SAnshuman Khandual #endif /* CONFIG_TRANSPARENT_HUGEPAGE */ 74905289402SAnshuman Khandual #else 75005289402SAnshuman Khandual static void __init pte_devmap_tests(unsigned long pfn, pgprot_t prot) { } 75105289402SAnshuman Khandual static void __init pmd_devmap_tests(unsigned long pfn, pgprot_t prot) { } 75205289402SAnshuman Khandual static void __init pud_devmap_tests(unsigned long pfn, pgprot_t prot) { } 75305289402SAnshuman Khandual #endif /* CONFIG_ARCH_HAS_PTE_DEVMAP */ 75405289402SAnshuman Khandual 75505289402SAnshuman Khandual static void __init pte_soft_dirty_tests(unsigned long pfn, pgprot_t prot) 75605289402SAnshuman Khandual { 75705289402SAnshuman Khandual pte_t pte = pfn_pte(pfn, prot); 75805289402SAnshuman Khandual 75905289402SAnshuman Khandual if (!IS_ENABLED(CONFIG_MEM_SOFT_DIRTY)) 76005289402SAnshuman Khandual return; 76105289402SAnshuman Khandual 7626315df41SAnshuman Khandual pr_debug("Validating PTE soft dirty\n"); 76305289402SAnshuman Khandual WARN_ON(!pte_soft_dirty(pte_mksoft_dirty(pte))); 76405289402SAnshuman Khandual WARN_ON(pte_soft_dirty(pte_clear_soft_dirty(pte))); 76505289402SAnshuman Khandual } 76605289402SAnshuman Khandual 76705289402SAnshuman Khandual static void __init pte_swap_soft_dirty_tests(unsigned long pfn, pgprot_t prot) 76805289402SAnshuman Khandual { 76905289402SAnshuman Khandual pte_t pte = pfn_pte(pfn, prot); 77005289402SAnshuman Khandual 77105289402SAnshuman Khandual if (!IS_ENABLED(CONFIG_MEM_SOFT_DIRTY)) 77205289402SAnshuman Khandual return; 77305289402SAnshuman Khandual 7746315df41SAnshuman Khandual pr_debug("Validating PTE swap soft dirty\n"); 77505289402SAnshuman Khandual WARN_ON(!pte_swp_soft_dirty(pte_swp_mksoft_dirty(pte))); 77605289402SAnshuman Khandual WARN_ON(pte_swp_soft_dirty(pte_swp_clear_soft_dirty(pte))); 77705289402SAnshuman Khandual } 77805289402SAnshuman Khandual 77905289402SAnshuman Khandual #ifdef CONFIG_TRANSPARENT_HUGEPAGE 78005289402SAnshuman Khandual static void __init pmd_soft_dirty_tests(unsigned long pfn, pgprot_t prot) 78105289402SAnshuman Khandual { 78265ac1a60SAnshuman Khandual pmd_t pmd; 78305289402SAnshuman Khandual 78405289402SAnshuman Khandual if (!IS_ENABLED(CONFIG_MEM_SOFT_DIRTY)) 78505289402SAnshuman Khandual return; 78605289402SAnshuman Khandual 78765ac1a60SAnshuman Khandual if (!has_transparent_hugepage()) 78865ac1a60SAnshuman Khandual return; 78965ac1a60SAnshuman Khandual 7906315df41SAnshuman Khandual pr_debug("Validating PMD soft dirty\n"); 79165ac1a60SAnshuman Khandual pmd = pfn_pmd(pfn, prot); 79205289402SAnshuman Khandual WARN_ON(!pmd_soft_dirty(pmd_mksoft_dirty(pmd))); 79305289402SAnshuman Khandual WARN_ON(pmd_soft_dirty(pmd_clear_soft_dirty(pmd))); 79405289402SAnshuman Khandual } 79505289402SAnshuman Khandual 79605289402SAnshuman Khandual static void __init pmd_swap_soft_dirty_tests(unsigned long pfn, pgprot_t prot) 79705289402SAnshuman Khandual { 79865ac1a60SAnshuman Khandual pmd_t pmd; 79905289402SAnshuman Khandual 80005289402SAnshuman Khandual if (!IS_ENABLED(CONFIG_MEM_SOFT_DIRTY) || 80105289402SAnshuman Khandual !IS_ENABLED(CONFIG_ARCH_ENABLE_THP_MIGRATION)) 80205289402SAnshuman Khandual return; 80305289402SAnshuman Khandual 80465ac1a60SAnshuman Khandual if (!has_transparent_hugepage()) 80565ac1a60SAnshuman Khandual return; 80665ac1a60SAnshuman Khandual 8076315df41SAnshuman Khandual pr_debug("Validating PMD swap soft dirty\n"); 80865ac1a60SAnshuman Khandual pmd = pfn_pmd(pfn, prot); 80905289402SAnshuman Khandual WARN_ON(!pmd_swp_soft_dirty(pmd_swp_mksoft_dirty(pmd))); 81005289402SAnshuman Khandual WARN_ON(pmd_swp_soft_dirty(pmd_swp_clear_soft_dirty(pmd))); 81105289402SAnshuman Khandual } 812b593b90dSShixin Liu #else /* !CONFIG_TRANSPARENT_HUGEPAGE */ 81305289402SAnshuman Khandual static void __init pmd_soft_dirty_tests(unsigned long pfn, pgprot_t prot) { } 81405289402SAnshuman Khandual static void __init pmd_swap_soft_dirty_tests(unsigned long pfn, pgprot_t prot) 81505289402SAnshuman Khandual { 81605289402SAnshuman Khandual } 817b593b90dSShixin Liu #endif /* CONFIG_TRANSPARENT_HUGEPAGE */ 81805289402SAnshuman Khandual 81905289402SAnshuman Khandual static void __init pte_swap_tests(unsigned long pfn, pgprot_t prot) 82005289402SAnshuman Khandual { 82105289402SAnshuman Khandual swp_entry_t swp; 82205289402SAnshuman Khandual pte_t pte; 82305289402SAnshuman Khandual 8246315df41SAnshuman Khandual pr_debug("Validating PTE swap\n"); 82505289402SAnshuman Khandual pte = pfn_pte(pfn, prot); 82605289402SAnshuman Khandual swp = __pte_to_swp_entry(pte); 82705289402SAnshuman Khandual pte = __swp_entry_to_pte(swp); 82805289402SAnshuman Khandual WARN_ON(pfn != pte_pfn(pte)); 82905289402SAnshuman Khandual } 83005289402SAnshuman Khandual 83105289402SAnshuman Khandual #ifdef CONFIG_ARCH_ENABLE_THP_MIGRATION 83205289402SAnshuman Khandual static void __init pmd_swap_tests(unsigned long pfn, pgprot_t prot) 83305289402SAnshuman Khandual { 83405289402SAnshuman Khandual swp_entry_t swp; 83505289402SAnshuman Khandual pmd_t pmd; 83605289402SAnshuman Khandual 83765ac1a60SAnshuman Khandual if (!has_transparent_hugepage()) 83865ac1a60SAnshuman Khandual return; 83965ac1a60SAnshuman Khandual 8406315df41SAnshuman Khandual pr_debug("Validating PMD swap\n"); 84105289402SAnshuman Khandual pmd = pfn_pmd(pfn, prot); 84205289402SAnshuman Khandual swp = __pmd_to_swp_entry(pmd); 84305289402SAnshuman Khandual pmd = __swp_entry_to_pmd(swp); 84405289402SAnshuman Khandual WARN_ON(pfn != pmd_pfn(pmd)); 84505289402SAnshuman Khandual } 84605289402SAnshuman Khandual #else /* !CONFIG_ARCH_ENABLE_THP_MIGRATION */ 84705289402SAnshuman Khandual static void __init pmd_swap_tests(unsigned long pfn, pgprot_t prot) { } 84805289402SAnshuman Khandual #endif /* CONFIG_ARCH_ENABLE_THP_MIGRATION */ 84905289402SAnshuman Khandual 85005289402SAnshuman Khandual static void __init swap_migration_tests(void) 85105289402SAnshuman Khandual { 85205289402SAnshuman Khandual struct page *page; 85305289402SAnshuman Khandual swp_entry_t swp; 85405289402SAnshuman Khandual 85505289402SAnshuman Khandual if (!IS_ENABLED(CONFIG_MIGRATION)) 85605289402SAnshuman Khandual return; 8576315df41SAnshuman Khandual 8586315df41SAnshuman Khandual pr_debug("Validating swap migration\n"); 85905289402SAnshuman Khandual /* 86005289402SAnshuman Khandual * swap_migration_tests() requires a dedicated page as it needs to 86105289402SAnshuman Khandual * be locked before creating a migration entry from it. Locking the 86205289402SAnshuman Khandual * page that actually maps kernel text ('start_kernel') can be real 86305289402SAnshuman Khandual * problematic. Lets allocate a dedicated page explicitly for this 86405289402SAnshuman Khandual * purpose that will be freed subsequently. 86505289402SAnshuman Khandual */ 86605289402SAnshuman Khandual page = alloc_page(GFP_KERNEL); 86705289402SAnshuman Khandual if (!page) { 86805289402SAnshuman Khandual pr_err("page allocation failed\n"); 86905289402SAnshuman Khandual return; 87005289402SAnshuman Khandual } 87105289402SAnshuman Khandual 87205289402SAnshuman Khandual /* 87305289402SAnshuman Khandual * make_migration_entry() expects given page to be 87405289402SAnshuman Khandual * locked, otherwise it stumbles upon a BUG_ON(). 87505289402SAnshuman Khandual */ 87605289402SAnshuman Khandual __SetPageLocked(page); 8774dd845b5SAlistair Popple swp = make_writable_migration_entry(page_to_pfn(page)); 87805289402SAnshuman Khandual WARN_ON(!is_migration_entry(swp)); 8794dd845b5SAlistair Popple WARN_ON(!is_writable_migration_entry(swp)); 88005289402SAnshuman Khandual 8814dd845b5SAlistair Popple swp = make_readable_migration_entry(swp_offset(swp)); 88205289402SAnshuman Khandual WARN_ON(!is_migration_entry(swp)); 8834dd845b5SAlistair Popple WARN_ON(is_writable_migration_entry(swp)); 88405289402SAnshuman Khandual 8854dd845b5SAlistair Popple swp = make_readable_migration_entry(page_to_pfn(page)); 88605289402SAnshuman Khandual WARN_ON(!is_migration_entry(swp)); 8874dd845b5SAlistair Popple WARN_ON(is_writable_migration_entry(swp)); 88805289402SAnshuman Khandual __ClearPageLocked(page); 88905289402SAnshuman Khandual __free_page(page); 89005289402SAnshuman Khandual } 89105289402SAnshuman Khandual 89205289402SAnshuman Khandual #ifdef CONFIG_HUGETLB_PAGE 893*36b77d1eSGavin Shan static void __init hugetlb_basic_tests(struct pgtable_debug_args *args) 89405289402SAnshuman Khandual { 89505289402SAnshuman Khandual struct page *page; 89605289402SAnshuman Khandual pte_t pte; 89705289402SAnshuman Khandual 8986315df41SAnshuman Khandual pr_debug("Validating HugeTLB basic\n"); 89905289402SAnshuman Khandual /* 90005289402SAnshuman Khandual * Accessing the page associated with the pfn is safe here, 90105289402SAnshuman Khandual * as it was previously derived from a real kernel symbol. 90205289402SAnshuman Khandual */ 903*36b77d1eSGavin Shan page = pfn_to_page(args->fixed_pmd_pfn); 904*36b77d1eSGavin Shan pte = mk_huge_pte(page, args->page_prot); 90505289402SAnshuman Khandual 90605289402SAnshuman Khandual WARN_ON(!huge_pte_dirty(huge_pte_mkdirty(pte))); 90705289402SAnshuman Khandual WARN_ON(!huge_pte_write(huge_pte_mkwrite(huge_pte_wrprotect(pte)))); 90805289402SAnshuman Khandual WARN_ON(huge_pte_write(huge_pte_wrprotect(huge_pte_mkwrite(pte)))); 90905289402SAnshuman Khandual 91005289402SAnshuman Khandual #ifdef CONFIG_ARCH_WANT_GENERAL_HUGETLB 911*36b77d1eSGavin Shan pte = pfn_pte(args->fixed_pmd_pfn, args->page_prot); 91205289402SAnshuman Khandual 91305289402SAnshuman Khandual WARN_ON(!pte_huge(pte_mkhuge(pte))); 91405289402SAnshuman Khandual #endif /* CONFIG_ARCH_WANT_GENERAL_HUGETLB */ 91505289402SAnshuman Khandual } 91605289402SAnshuman Khandual #else /* !CONFIG_HUGETLB_PAGE */ 917*36b77d1eSGavin Shan static void __init hugetlb_basic_tests(struct pgtable_debug_args *args) { } 91805289402SAnshuman Khandual #endif /* CONFIG_HUGETLB_PAGE */ 91905289402SAnshuman Khandual 92005289402SAnshuman Khandual #ifdef CONFIG_TRANSPARENT_HUGEPAGE 92105289402SAnshuman Khandual static void __init pmd_thp_tests(unsigned long pfn, pgprot_t prot) 92205289402SAnshuman Khandual { 92305289402SAnshuman Khandual pmd_t pmd; 92405289402SAnshuman Khandual 92505289402SAnshuman Khandual if (!has_transparent_hugepage()) 92605289402SAnshuman Khandual return; 92705289402SAnshuman Khandual 9286315df41SAnshuman Khandual pr_debug("Validating PMD based THP\n"); 92905289402SAnshuman Khandual /* 93005289402SAnshuman Khandual * pmd_trans_huge() and pmd_present() must return positive after 93105289402SAnshuman Khandual * MMU invalidation with pmd_mkinvalid(). This behavior is an 93205289402SAnshuman Khandual * optimization for transparent huge page. pmd_trans_huge() must 93305289402SAnshuman Khandual * be true if pmd_page() returns a valid THP to avoid taking the 93405289402SAnshuman Khandual * pmd_lock when others walk over non transhuge pmds (i.e. there 93505289402SAnshuman Khandual * are no THP allocated). Especially when splitting a THP and 93605289402SAnshuman Khandual * removing the present bit from the pmd, pmd_trans_huge() still 93705289402SAnshuman Khandual * needs to return true. pmd_present() should be true whenever 93805289402SAnshuman Khandual * pmd_trans_huge() returns true. 93905289402SAnshuman Khandual */ 94005289402SAnshuman Khandual pmd = pfn_pmd(pfn, prot); 94105289402SAnshuman Khandual WARN_ON(!pmd_trans_huge(pmd_mkhuge(pmd))); 94205289402SAnshuman Khandual 94305289402SAnshuman Khandual #ifndef __HAVE_ARCH_PMDP_INVALIDATE 94405289402SAnshuman Khandual WARN_ON(!pmd_trans_huge(pmd_mkinvalid(pmd_mkhuge(pmd)))); 94505289402SAnshuman Khandual WARN_ON(!pmd_present(pmd_mkinvalid(pmd_mkhuge(pmd)))); 94605289402SAnshuman Khandual #endif /* __HAVE_ARCH_PMDP_INVALIDATE */ 94705289402SAnshuman Khandual } 94805289402SAnshuman Khandual 94905289402SAnshuman Khandual #ifdef CONFIG_HAVE_ARCH_TRANSPARENT_HUGEPAGE_PUD 95005289402SAnshuman Khandual static void __init pud_thp_tests(unsigned long pfn, pgprot_t prot) 95105289402SAnshuman Khandual { 95205289402SAnshuman Khandual pud_t pud; 95305289402SAnshuman Khandual 95405289402SAnshuman Khandual if (!has_transparent_hugepage()) 95505289402SAnshuman Khandual return; 95605289402SAnshuman Khandual 9576315df41SAnshuman Khandual pr_debug("Validating PUD based THP\n"); 95805289402SAnshuman Khandual pud = pfn_pud(pfn, prot); 95905289402SAnshuman Khandual WARN_ON(!pud_trans_huge(pud_mkhuge(pud))); 96005289402SAnshuman Khandual 96105289402SAnshuman Khandual /* 96205289402SAnshuman Khandual * pud_mkinvalid() has been dropped for now. Enable back 96305289402SAnshuman Khandual * these tests when it comes back with a modified pud_present(). 96405289402SAnshuman Khandual * 96505289402SAnshuman Khandual * WARN_ON(!pud_trans_huge(pud_mkinvalid(pud_mkhuge(pud)))); 96605289402SAnshuman Khandual * WARN_ON(!pud_present(pud_mkinvalid(pud_mkhuge(pud)))); 96705289402SAnshuman Khandual */ 96805289402SAnshuman Khandual } 96905289402SAnshuman Khandual #else /* !CONFIG_HAVE_ARCH_TRANSPARENT_HUGEPAGE_PUD */ 97005289402SAnshuman Khandual static void __init pud_thp_tests(unsigned long pfn, pgprot_t prot) { } 97105289402SAnshuman Khandual #endif /* CONFIG_HAVE_ARCH_TRANSPARENT_HUGEPAGE_PUD */ 97205289402SAnshuman Khandual #else /* !CONFIG_TRANSPARENT_HUGEPAGE */ 97305289402SAnshuman Khandual static void __init pmd_thp_tests(unsigned long pfn, pgprot_t prot) { } 97405289402SAnshuman Khandual static void __init pud_thp_tests(unsigned long pfn, pgprot_t prot) { } 97505289402SAnshuman Khandual #endif /* CONFIG_TRANSPARENT_HUGEPAGE */ 97605289402SAnshuman Khandual 977399145f9SAnshuman Khandual static unsigned long __init get_random_vaddr(void) 978399145f9SAnshuman Khandual { 979399145f9SAnshuman Khandual unsigned long random_vaddr, random_pages, total_user_pages; 980399145f9SAnshuman Khandual 981399145f9SAnshuman Khandual total_user_pages = (TASK_SIZE - FIRST_USER_ADDRESS) / PAGE_SIZE; 982399145f9SAnshuman Khandual 983399145f9SAnshuman Khandual random_pages = get_random_long() % total_user_pages; 984399145f9SAnshuman Khandual random_vaddr = FIRST_USER_ADDRESS + random_pages * PAGE_SIZE; 985399145f9SAnshuman Khandual 986399145f9SAnshuman Khandual return random_vaddr; 987399145f9SAnshuman Khandual } 988399145f9SAnshuman Khandual 9893c9b84f0SGavin Shan static void __init destroy_args(struct pgtable_debug_args *args) 9903c9b84f0SGavin Shan { 9913c9b84f0SGavin Shan struct page *page = NULL; 9923c9b84f0SGavin Shan 9933c9b84f0SGavin Shan /* Free (huge) page */ 9943c9b84f0SGavin Shan if (IS_ENABLED(CONFIG_TRANSPARENT_HUGEPAGE) && 9953c9b84f0SGavin Shan IS_ENABLED(CONFIG_HAVE_ARCH_TRANSPARENT_HUGEPAGE_PUD) && 9963c9b84f0SGavin Shan has_transparent_hugepage() && 9973c9b84f0SGavin Shan args->pud_pfn != ULONG_MAX) { 9983c9b84f0SGavin Shan if (args->is_contiguous_page) { 9993c9b84f0SGavin Shan free_contig_range(args->pud_pfn, 10003c9b84f0SGavin Shan (1 << (HPAGE_PUD_SHIFT - PAGE_SHIFT))); 10013c9b84f0SGavin Shan } else { 10023c9b84f0SGavin Shan page = pfn_to_page(args->pud_pfn); 10033c9b84f0SGavin Shan __free_pages(page, HPAGE_PUD_SHIFT - PAGE_SHIFT); 10043c9b84f0SGavin Shan } 10053c9b84f0SGavin Shan 10063c9b84f0SGavin Shan args->pud_pfn = ULONG_MAX; 10073c9b84f0SGavin Shan args->pmd_pfn = ULONG_MAX; 10083c9b84f0SGavin Shan args->pte_pfn = ULONG_MAX; 10093c9b84f0SGavin Shan } 10103c9b84f0SGavin Shan 10113c9b84f0SGavin Shan if (IS_ENABLED(CONFIG_TRANSPARENT_HUGEPAGE) && 10123c9b84f0SGavin Shan has_transparent_hugepage() && 10133c9b84f0SGavin Shan args->pmd_pfn != ULONG_MAX) { 10143c9b84f0SGavin Shan if (args->is_contiguous_page) { 10153c9b84f0SGavin Shan free_contig_range(args->pmd_pfn, (1 << HPAGE_PMD_ORDER)); 10163c9b84f0SGavin Shan } else { 10173c9b84f0SGavin Shan page = pfn_to_page(args->pmd_pfn); 10183c9b84f0SGavin Shan __free_pages(page, HPAGE_PMD_ORDER); 10193c9b84f0SGavin Shan } 10203c9b84f0SGavin Shan 10213c9b84f0SGavin Shan args->pmd_pfn = ULONG_MAX; 10223c9b84f0SGavin Shan args->pte_pfn = ULONG_MAX; 10233c9b84f0SGavin Shan } 10243c9b84f0SGavin Shan 10253c9b84f0SGavin Shan if (args->pte_pfn != ULONG_MAX) { 10263c9b84f0SGavin Shan page = pfn_to_page(args->pte_pfn); 10273c9b84f0SGavin Shan __free_pages(page, 0); 10283c9b84f0SGavin Shan 10293c9b84f0SGavin Shan args->pte_pfn = ULONG_MAX; 10303c9b84f0SGavin Shan } 10313c9b84f0SGavin Shan 10323c9b84f0SGavin Shan /* Free page table entries */ 10333c9b84f0SGavin Shan if (args->start_ptep) { 10343c9b84f0SGavin Shan pte_free(args->mm, args->start_ptep); 10353c9b84f0SGavin Shan mm_dec_nr_ptes(args->mm); 10363c9b84f0SGavin Shan } 10373c9b84f0SGavin Shan 10383c9b84f0SGavin Shan if (args->start_pmdp) { 10393c9b84f0SGavin Shan pmd_free(args->mm, args->start_pmdp); 10403c9b84f0SGavin Shan mm_dec_nr_pmds(args->mm); 10413c9b84f0SGavin Shan } 10423c9b84f0SGavin Shan 10433c9b84f0SGavin Shan if (args->start_pudp) { 10443c9b84f0SGavin Shan pud_free(args->mm, args->start_pudp); 10453c9b84f0SGavin Shan mm_dec_nr_puds(args->mm); 10463c9b84f0SGavin Shan } 10473c9b84f0SGavin Shan 10483c9b84f0SGavin Shan if (args->start_p4dp) 10493c9b84f0SGavin Shan p4d_free(args->mm, args->start_p4dp); 10503c9b84f0SGavin Shan 10513c9b84f0SGavin Shan /* Free vma and mm struct */ 10523c9b84f0SGavin Shan if (args->vma) 10533c9b84f0SGavin Shan vm_area_free(args->vma); 10543c9b84f0SGavin Shan 10553c9b84f0SGavin Shan if (args->mm) 10563c9b84f0SGavin Shan mmdrop(args->mm); 10573c9b84f0SGavin Shan } 10583c9b84f0SGavin Shan 10593c9b84f0SGavin Shan static struct page * __init 10603c9b84f0SGavin Shan debug_vm_pgtable_alloc_huge_page(struct pgtable_debug_args *args, int order) 10613c9b84f0SGavin Shan { 10623c9b84f0SGavin Shan struct page *page = NULL; 10633c9b84f0SGavin Shan 10643c9b84f0SGavin Shan #ifdef CONFIG_CONTIG_ALLOC 10653c9b84f0SGavin Shan if (order >= MAX_ORDER) { 10663c9b84f0SGavin Shan page = alloc_contig_pages((1 << order), GFP_KERNEL, 10673c9b84f0SGavin Shan first_online_node, NULL); 10683c9b84f0SGavin Shan if (page) { 10693c9b84f0SGavin Shan args->is_contiguous_page = true; 10703c9b84f0SGavin Shan return page; 10713c9b84f0SGavin Shan } 10723c9b84f0SGavin Shan } 10733c9b84f0SGavin Shan #endif 10743c9b84f0SGavin Shan 10753c9b84f0SGavin Shan if (order < MAX_ORDER) 10763c9b84f0SGavin Shan page = alloc_pages(GFP_KERNEL, order); 10773c9b84f0SGavin Shan 10783c9b84f0SGavin Shan return page; 10793c9b84f0SGavin Shan } 10803c9b84f0SGavin Shan 10813c9b84f0SGavin Shan static int __init init_args(struct pgtable_debug_args *args) 10823c9b84f0SGavin Shan { 10833c9b84f0SGavin Shan struct page *page = NULL; 10843c9b84f0SGavin Shan phys_addr_t phys; 10853c9b84f0SGavin Shan int ret = 0; 10863c9b84f0SGavin Shan 10873c9b84f0SGavin Shan /* 10883c9b84f0SGavin Shan * Initialize the debugging data. 10893c9b84f0SGavin Shan * 10903c9b84f0SGavin Shan * __P000 (or even __S000) will help create page table entries with 10913c9b84f0SGavin Shan * PROT_NONE permission as required for pxx_protnone_tests(). 10923c9b84f0SGavin Shan */ 10933c9b84f0SGavin Shan memset(args, 0, sizeof(*args)); 10943c9b84f0SGavin Shan args->vaddr = get_random_vaddr(); 10953c9b84f0SGavin Shan args->page_prot = vm_get_page_prot(VMFLAGS); 10963c9b84f0SGavin Shan args->page_prot_none = __P000; 10973c9b84f0SGavin Shan args->is_contiguous_page = false; 10983c9b84f0SGavin Shan args->pud_pfn = ULONG_MAX; 10993c9b84f0SGavin Shan args->pmd_pfn = ULONG_MAX; 11003c9b84f0SGavin Shan args->pte_pfn = ULONG_MAX; 11013c9b84f0SGavin Shan args->fixed_pgd_pfn = ULONG_MAX; 11023c9b84f0SGavin Shan args->fixed_p4d_pfn = ULONG_MAX; 11033c9b84f0SGavin Shan args->fixed_pud_pfn = ULONG_MAX; 11043c9b84f0SGavin Shan args->fixed_pmd_pfn = ULONG_MAX; 11053c9b84f0SGavin Shan args->fixed_pte_pfn = ULONG_MAX; 11063c9b84f0SGavin Shan 11073c9b84f0SGavin Shan /* Allocate mm and vma */ 11083c9b84f0SGavin Shan args->mm = mm_alloc(); 11093c9b84f0SGavin Shan if (!args->mm) { 11103c9b84f0SGavin Shan pr_err("Failed to allocate mm struct\n"); 11113c9b84f0SGavin Shan ret = -ENOMEM; 11123c9b84f0SGavin Shan goto error; 11133c9b84f0SGavin Shan } 11143c9b84f0SGavin Shan 11153c9b84f0SGavin Shan args->vma = vm_area_alloc(args->mm); 11163c9b84f0SGavin Shan if (!args->vma) { 11173c9b84f0SGavin Shan pr_err("Failed to allocate vma\n"); 11183c9b84f0SGavin Shan ret = -ENOMEM; 11193c9b84f0SGavin Shan goto error; 11203c9b84f0SGavin Shan } 11213c9b84f0SGavin Shan 11223c9b84f0SGavin Shan /* 11233c9b84f0SGavin Shan * Allocate page table entries. They will be modified in the tests. 11243c9b84f0SGavin Shan * Lets save the page table entries so that they can be released 11253c9b84f0SGavin Shan * when the tests are completed. 11263c9b84f0SGavin Shan */ 11273c9b84f0SGavin Shan args->pgdp = pgd_offset(args->mm, args->vaddr); 11283c9b84f0SGavin Shan args->p4dp = p4d_alloc(args->mm, args->pgdp, args->vaddr); 11293c9b84f0SGavin Shan if (!args->p4dp) { 11303c9b84f0SGavin Shan pr_err("Failed to allocate p4d entries\n"); 11313c9b84f0SGavin Shan ret = -ENOMEM; 11323c9b84f0SGavin Shan goto error; 11333c9b84f0SGavin Shan } 11343c9b84f0SGavin Shan args->start_p4dp = p4d_offset(args->pgdp, 0UL); 11353c9b84f0SGavin Shan WARN_ON(!args->start_p4dp); 11363c9b84f0SGavin Shan 11373c9b84f0SGavin Shan args->pudp = pud_alloc(args->mm, args->p4dp, args->vaddr); 11383c9b84f0SGavin Shan if (!args->pudp) { 11393c9b84f0SGavin Shan pr_err("Failed to allocate pud entries\n"); 11403c9b84f0SGavin Shan ret = -ENOMEM; 11413c9b84f0SGavin Shan goto error; 11423c9b84f0SGavin Shan } 11433c9b84f0SGavin Shan args->start_pudp = pud_offset(args->p4dp, 0UL); 11443c9b84f0SGavin Shan WARN_ON(!args->start_pudp); 11453c9b84f0SGavin Shan 11463c9b84f0SGavin Shan args->pmdp = pmd_alloc(args->mm, args->pudp, args->vaddr); 11473c9b84f0SGavin Shan if (!args->pmdp) { 11483c9b84f0SGavin Shan pr_err("Failed to allocate pmd entries\n"); 11493c9b84f0SGavin Shan ret = -ENOMEM; 11503c9b84f0SGavin Shan goto error; 11513c9b84f0SGavin Shan } 11523c9b84f0SGavin Shan args->start_pmdp = pmd_offset(args->pudp, 0UL); 11533c9b84f0SGavin Shan WARN_ON(!args->start_pmdp); 11543c9b84f0SGavin Shan 11553c9b84f0SGavin Shan if (pte_alloc(args->mm, args->pmdp)) { 11563c9b84f0SGavin Shan pr_err("Failed to allocate pte entries\n"); 11573c9b84f0SGavin Shan ret = -ENOMEM; 11583c9b84f0SGavin Shan goto error; 11593c9b84f0SGavin Shan } 11603c9b84f0SGavin Shan args->start_ptep = pmd_pgtable(READ_ONCE(*args->pmdp)); 11613c9b84f0SGavin Shan WARN_ON(!args->start_ptep); 11623c9b84f0SGavin Shan 11633c9b84f0SGavin Shan /* 11643c9b84f0SGavin Shan * PFN for mapping at PTE level is determined from a standard kernel 11653c9b84f0SGavin Shan * text symbol. But pfns for higher page table levels are derived by 11663c9b84f0SGavin Shan * masking lower bits of this real pfn. These derived pfns might not 11673c9b84f0SGavin Shan * exist on the platform but that does not really matter as pfn_pxx() 11683c9b84f0SGavin Shan * helpers will still create appropriate entries for the test. This 11693c9b84f0SGavin Shan * helps avoid large memory block allocations to be used for mapping 11703c9b84f0SGavin Shan * at higher page table levels in some of the tests. 11713c9b84f0SGavin Shan */ 11723c9b84f0SGavin Shan phys = __pa_symbol(&start_kernel); 11733c9b84f0SGavin Shan args->fixed_pgd_pfn = __phys_to_pfn(phys & PGDIR_MASK); 11743c9b84f0SGavin Shan args->fixed_p4d_pfn = __phys_to_pfn(phys & P4D_MASK); 11753c9b84f0SGavin Shan args->fixed_pud_pfn = __phys_to_pfn(phys & PUD_MASK); 11763c9b84f0SGavin Shan args->fixed_pmd_pfn = __phys_to_pfn(phys & PMD_MASK); 11773c9b84f0SGavin Shan args->fixed_pte_pfn = __phys_to_pfn(phys & PAGE_MASK); 11783c9b84f0SGavin Shan WARN_ON(!pfn_valid(args->fixed_pte_pfn)); 11793c9b84f0SGavin Shan 11803c9b84f0SGavin Shan /* 11813c9b84f0SGavin Shan * Allocate (huge) pages because some of the tests need to access 11823c9b84f0SGavin Shan * the data in the pages. The corresponding tests will be skipped 11833c9b84f0SGavin Shan * if we fail to allocate (huge) pages. 11843c9b84f0SGavin Shan */ 11853c9b84f0SGavin Shan if (IS_ENABLED(CONFIG_TRANSPARENT_HUGEPAGE) && 11863c9b84f0SGavin Shan IS_ENABLED(CONFIG_HAVE_ARCH_TRANSPARENT_HUGEPAGE_PUD) && 11873c9b84f0SGavin Shan has_transparent_hugepage()) { 11883c9b84f0SGavin Shan page = debug_vm_pgtable_alloc_huge_page(args, 11893c9b84f0SGavin Shan HPAGE_PUD_SHIFT - PAGE_SHIFT); 11903c9b84f0SGavin Shan if (page) { 11913c9b84f0SGavin Shan args->pud_pfn = page_to_pfn(page); 11923c9b84f0SGavin Shan args->pmd_pfn = args->pud_pfn; 11933c9b84f0SGavin Shan args->pte_pfn = args->pud_pfn; 11943c9b84f0SGavin Shan return 0; 11953c9b84f0SGavin Shan } 11963c9b84f0SGavin Shan } 11973c9b84f0SGavin Shan 11983c9b84f0SGavin Shan if (IS_ENABLED(CONFIG_TRANSPARENT_HUGEPAGE) && 11993c9b84f0SGavin Shan has_transparent_hugepage()) { 12003c9b84f0SGavin Shan page = debug_vm_pgtable_alloc_huge_page(args, HPAGE_PMD_ORDER); 12013c9b84f0SGavin Shan if (page) { 12023c9b84f0SGavin Shan args->pmd_pfn = page_to_pfn(page); 12033c9b84f0SGavin Shan args->pte_pfn = args->pmd_pfn; 12043c9b84f0SGavin Shan return 0; 12053c9b84f0SGavin Shan } 12063c9b84f0SGavin Shan } 12073c9b84f0SGavin Shan 12083c9b84f0SGavin Shan page = alloc_pages(GFP_KERNEL, 0); 12093c9b84f0SGavin Shan if (page) 12103c9b84f0SGavin Shan args->pte_pfn = page_to_pfn(page); 12113c9b84f0SGavin Shan 12123c9b84f0SGavin Shan return 0; 12133c9b84f0SGavin Shan 12143c9b84f0SGavin Shan error: 12153c9b84f0SGavin Shan destroy_args(args); 12163c9b84f0SGavin Shan return ret; 12173c9b84f0SGavin Shan } 12183c9b84f0SGavin Shan 1219399145f9SAnshuman Khandual static int __init debug_vm_pgtable(void) 1220399145f9SAnshuman Khandual { 12213c9b84f0SGavin Shan struct pgtable_debug_args args; 1222a5c3b9ffSAnshuman Khandual struct vm_area_struct *vma; 1223399145f9SAnshuman Khandual struct mm_struct *mm; 1224399145f9SAnshuman Khandual pgd_t *pgdp; 1225399145f9SAnshuman Khandual p4d_t *p4dp, *saved_p4dp; 1226399145f9SAnshuman Khandual pud_t *pudp, *saved_pudp; 1227399145f9SAnshuman Khandual pmd_t *pmdp, *saved_pmdp, pmd; 1228399145f9SAnshuman Khandual pte_t *ptep; 1229399145f9SAnshuman Khandual pgtable_t saved_ptep; 123005289402SAnshuman Khandual pgprot_t prot, protnone; 1231399145f9SAnshuman Khandual phys_addr_t paddr; 1232399145f9SAnshuman Khandual unsigned long vaddr, pte_aligned, pmd_aligned; 1233*36b77d1eSGavin Shan unsigned long pud_aligned; 1234fea1120cSKees Cook spinlock_t *ptl = NULL; 12353c9b84f0SGavin Shan int idx, ret; 1236399145f9SAnshuman Khandual 1237399145f9SAnshuman Khandual pr_info("Validating architecture page table helpers\n"); 12383c9b84f0SGavin Shan ret = init_args(&args); 12393c9b84f0SGavin Shan if (ret) 12403c9b84f0SGavin Shan return ret; 12413c9b84f0SGavin Shan 1242399145f9SAnshuman Khandual prot = vm_get_page_prot(VMFLAGS); 1243399145f9SAnshuman Khandual vaddr = get_random_vaddr(); 1244399145f9SAnshuman Khandual mm = mm_alloc(); 1245399145f9SAnshuman Khandual if (!mm) { 1246399145f9SAnshuman Khandual pr_err("mm_struct allocation failed\n"); 1247399145f9SAnshuman Khandual return 1; 1248399145f9SAnshuman Khandual } 1249399145f9SAnshuman Khandual 1250399145f9SAnshuman Khandual /* 125105289402SAnshuman Khandual * __P000 (or even __S000) will help create page table entries with 125205289402SAnshuman Khandual * PROT_NONE permission as required for pxx_protnone_tests(). 125305289402SAnshuman Khandual */ 125405289402SAnshuman Khandual protnone = __P000; 125505289402SAnshuman Khandual 1256a5c3b9ffSAnshuman Khandual vma = vm_area_alloc(mm); 1257a5c3b9ffSAnshuman Khandual if (!vma) { 1258a5c3b9ffSAnshuman Khandual pr_err("vma allocation failed\n"); 1259a5c3b9ffSAnshuman Khandual return 1; 1260a5c3b9ffSAnshuman Khandual } 1261a5c3b9ffSAnshuman Khandual 126205289402SAnshuman Khandual /* 1263399145f9SAnshuman Khandual * PFN for mapping at PTE level is determined from a standard kernel 1264399145f9SAnshuman Khandual * text symbol. But pfns for higher page table levels are derived by 1265399145f9SAnshuman Khandual * masking lower bits of this real pfn. These derived pfns might not 1266399145f9SAnshuman Khandual * exist on the platform but that does not really matter as pfn_pxx() 1267399145f9SAnshuman Khandual * helpers will still create appropriate entries for the test. This 1268399145f9SAnshuman Khandual * helps avoid large memory block allocations to be used for mapping 1269399145f9SAnshuman Khandual * at higher page table levels. 1270399145f9SAnshuman Khandual */ 1271399145f9SAnshuman Khandual paddr = __pa_symbol(&start_kernel); 1272399145f9SAnshuman Khandual 1273399145f9SAnshuman Khandual pte_aligned = (paddr & PAGE_MASK) >> PAGE_SHIFT; 1274399145f9SAnshuman Khandual pmd_aligned = (paddr & PMD_MASK) >> PAGE_SHIFT; 1275399145f9SAnshuman Khandual pud_aligned = (paddr & PUD_MASK) >> PAGE_SHIFT; 1276399145f9SAnshuman Khandual WARN_ON(!pfn_valid(pte_aligned)); 1277399145f9SAnshuman Khandual 1278399145f9SAnshuman Khandual pgdp = pgd_offset(mm, vaddr); 1279399145f9SAnshuman Khandual p4dp = p4d_alloc(mm, pgdp, vaddr); 1280399145f9SAnshuman Khandual pudp = pud_alloc(mm, p4dp, vaddr); 1281399145f9SAnshuman Khandual pmdp = pmd_alloc(mm, pudp, vaddr); 1282f14312e1SAneesh Kumar K.V /* 1283f14312e1SAneesh Kumar K.V * Allocate pgtable_t 1284f14312e1SAneesh Kumar K.V */ 1285f14312e1SAneesh Kumar K.V if (pte_alloc(mm, pmdp)) { 1286f14312e1SAneesh Kumar K.V pr_err("pgtable allocation failed\n"); 1287f14312e1SAneesh Kumar K.V return 1; 1288f14312e1SAneesh Kumar K.V } 1289399145f9SAnshuman Khandual 1290399145f9SAnshuman Khandual /* 1291399145f9SAnshuman Khandual * Save all the page table page addresses as the page table 1292399145f9SAnshuman Khandual * entries will be used for testing with random or garbage 1293399145f9SAnshuman Khandual * values. These saved addresses will be used for freeing 1294399145f9SAnshuman Khandual * page table pages. 1295399145f9SAnshuman Khandual */ 1296399145f9SAnshuman Khandual pmd = READ_ONCE(*pmdp); 1297399145f9SAnshuman Khandual saved_p4dp = p4d_offset(pgdp, 0UL); 1298399145f9SAnshuman Khandual saved_pudp = pud_offset(p4dp, 0UL); 1299399145f9SAnshuman Khandual saved_pmdp = pmd_offset(pudp, 0UL); 1300399145f9SAnshuman Khandual saved_ptep = pmd_pgtable(pmd); 1301399145f9SAnshuman Khandual 13022e326c07SAnshuman Khandual /* 13032e326c07SAnshuman Khandual * Iterate over the protection_map[] to make sure that all 13042e326c07SAnshuman Khandual * the basic page table transformation validations just hold 13052e326c07SAnshuman Khandual * true irrespective of the starting protection value for a 13062e326c07SAnshuman Khandual * given page table entry. 13072e326c07SAnshuman Khandual */ 13082e326c07SAnshuman Khandual for (idx = 0; idx < ARRAY_SIZE(protection_map); idx++) { 1309*36b77d1eSGavin Shan pte_basic_tests(&args, idx); 1310*36b77d1eSGavin Shan pmd_basic_tests(&args, idx); 1311*36b77d1eSGavin Shan pud_basic_tests(&args, idx); 13122e326c07SAnshuman Khandual } 13132e326c07SAnshuman Khandual 13142e326c07SAnshuman Khandual /* 13152e326c07SAnshuman Khandual * Both P4D and PGD level tests are very basic which do not 13162e326c07SAnshuman Khandual * involve creating page table entries from the protection 13172e326c07SAnshuman Khandual * value and the given pfn. Hence just keep them out from 13182e326c07SAnshuman Khandual * the above iteration for now to save some test execution 13192e326c07SAnshuman Khandual * time. 13202e326c07SAnshuman Khandual */ 1321*36b77d1eSGavin Shan p4d_basic_tests(&args); 1322*36b77d1eSGavin Shan pgd_basic_tests(&args); 1323399145f9SAnshuman Khandual 1324a5c3b9ffSAnshuman Khandual pmd_leaf_tests(pmd_aligned, prot); 1325a5c3b9ffSAnshuman Khandual pud_leaf_tests(pud_aligned, prot); 1326a5c3b9ffSAnshuman Khandual 13274200605bSAneesh Kumar K.V pte_savedwrite_tests(pte_aligned, protnone); 13284200605bSAneesh Kumar K.V pmd_savedwrite_tests(pmd_aligned, protnone); 1329a5c3b9ffSAnshuman Khandual 133005289402SAnshuman Khandual pte_special_tests(pte_aligned, prot); 133105289402SAnshuman Khandual pte_protnone_tests(pte_aligned, protnone); 133205289402SAnshuman Khandual pmd_protnone_tests(pmd_aligned, protnone); 133305289402SAnshuman Khandual 133405289402SAnshuman Khandual pte_devmap_tests(pte_aligned, prot); 133505289402SAnshuman Khandual pmd_devmap_tests(pmd_aligned, prot); 133605289402SAnshuman Khandual pud_devmap_tests(pud_aligned, prot); 133705289402SAnshuman Khandual 133805289402SAnshuman Khandual pte_soft_dirty_tests(pte_aligned, prot); 133905289402SAnshuman Khandual pmd_soft_dirty_tests(pmd_aligned, prot); 134005289402SAnshuman Khandual pte_swap_soft_dirty_tests(pte_aligned, prot); 134105289402SAnshuman Khandual pmd_swap_soft_dirty_tests(pmd_aligned, prot); 134205289402SAnshuman Khandual 134305289402SAnshuman Khandual pte_swap_tests(pte_aligned, prot); 134405289402SAnshuman Khandual pmd_swap_tests(pmd_aligned, prot); 134505289402SAnshuman Khandual 134605289402SAnshuman Khandual swap_migration_tests(); 134705289402SAnshuman Khandual 134805289402SAnshuman Khandual pmd_thp_tests(pmd_aligned, prot); 134905289402SAnshuman Khandual pud_thp_tests(pud_aligned, prot); 135005289402SAnshuman Khandual 1351*36b77d1eSGavin Shan hugetlb_basic_tests(&args); 1352e8edf0adSAneesh Kumar K.V 13536f302e27SAneesh Kumar K.V /* 13546f302e27SAneesh Kumar K.V * Page table modifying tests. They need to hold 13556f302e27SAneesh Kumar K.V * proper page table lock. 13566f302e27SAneesh Kumar K.V */ 1357e8edf0adSAneesh Kumar K.V 1358f14312e1SAneesh Kumar K.V ptep = pte_offset_map_lock(mm, pmdp, vaddr, &ptl); 1359401035d5SAneesh Kumar K.V pte_clear_tests(mm, ptep, pte_aligned, vaddr, prot); 1360e8edf0adSAneesh Kumar K.V pte_advanced_tests(mm, vma, ptep, pte_aligned, vaddr, prot); 1361e8edf0adSAneesh Kumar K.V pte_unmap_unlock(ptep, ptl); 1362e8edf0adSAneesh Kumar K.V 13636f302e27SAneesh Kumar K.V ptl = pmd_lock(mm, pmdp); 13646f302e27SAneesh Kumar K.V pmd_clear_tests(mm, pmdp); 136587f34986SAneesh Kumar K.V pmd_advanced_tests(mm, vma, pmdp, pmd_aligned, vaddr, prot, saved_ptep); 13666f302e27SAneesh Kumar K.V pmd_huge_tests(pmdp, pmd_aligned, prot); 1367e8edf0adSAneesh Kumar K.V pmd_populate_tests(mm, pmdp, saved_ptep); 13686f302e27SAneesh Kumar K.V spin_unlock(ptl); 13696f302e27SAneesh Kumar K.V 13706f302e27SAneesh Kumar K.V ptl = pud_lock(mm, pudp); 13716f302e27SAneesh Kumar K.V pud_clear_tests(mm, pudp); 13726f302e27SAneesh Kumar K.V pud_advanced_tests(mm, vma, pudp, pud_aligned, vaddr, prot); 13736f302e27SAneesh Kumar K.V pud_huge_tests(pudp, pud_aligned, prot); 1374e8edf0adSAneesh Kumar K.V pud_populate_tests(mm, pudp, saved_pmdp); 13756f302e27SAneesh Kumar K.V spin_unlock(ptl); 13766f302e27SAneesh Kumar K.V 13776f302e27SAneesh Kumar K.V spin_lock(&mm->page_table_lock); 13786f302e27SAneesh Kumar K.V p4d_clear_tests(mm, p4dp); 13796f302e27SAneesh Kumar K.V pgd_clear_tests(mm, pgdp); 1380e8edf0adSAneesh Kumar K.V p4d_populate_tests(mm, p4dp, saved_pudp); 1381e8edf0adSAneesh Kumar K.V pgd_populate_tests(mm, pgdp, saved_p4dp); 13826f302e27SAneesh Kumar K.V spin_unlock(&mm->page_table_lock); 1383e8edf0adSAneesh Kumar K.V 1384399145f9SAnshuman Khandual p4d_free(mm, saved_p4dp); 1385399145f9SAnshuman Khandual pud_free(mm, saved_pudp); 1386399145f9SAnshuman Khandual pmd_free(mm, saved_pmdp); 1387399145f9SAnshuman Khandual pte_free(mm, saved_ptep); 1388399145f9SAnshuman Khandual 1389a5c3b9ffSAnshuman Khandual vm_area_free(vma); 1390399145f9SAnshuman Khandual mm_dec_nr_puds(mm); 1391399145f9SAnshuman Khandual mm_dec_nr_pmds(mm); 1392399145f9SAnshuman Khandual mm_dec_nr_ptes(mm); 1393399145f9SAnshuman Khandual mmdrop(mm); 13943c9b84f0SGavin Shan 13953c9b84f0SGavin Shan destroy_args(&args); 1396399145f9SAnshuman Khandual return 0; 1397399145f9SAnshuman Khandual } 1398399145f9SAnshuman Khandual late_initcall(debug_vm_pgtable); 1399