1399145f9SAnshuman Khandual // SPDX-License-Identifier: GPL-2.0-only 2399145f9SAnshuman Khandual /* 3399145f9SAnshuman Khandual * This kernel test validates architecture page table helpers and 4399145f9SAnshuman Khandual * accessors and helps in verifying their continued compliance with 5399145f9SAnshuman Khandual * expected generic MM semantics. 6399145f9SAnshuman Khandual * 7399145f9SAnshuman Khandual * Copyright (C) 2019 ARM Ltd. 8399145f9SAnshuman Khandual * 9399145f9SAnshuman Khandual * Author: Anshuman Khandual <anshuman.khandual@arm.com> 10399145f9SAnshuman Khandual */ 116315df41SAnshuman Khandual #define pr_fmt(fmt) "debug_vm_pgtable: [%-25s]: " fmt, __func__ 12399145f9SAnshuman Khandual 13399145f9SAnshuman Khandual #include <linux/gfp.h> 14399145f9SAnshuman Khandual #include <linux/highmem.h> 15399145f9SAnshuman Khandual #include <linux/hugetlb.h> 16399145f9SAnshuman Khandual #include <linux/kernel.h> 17399145f9SAnshuman Khandual #include <linux/kconfig.h> 18399145f9SAnshuman Khandual #include <linux/mm.h> 19399145f9SAnshuman Khandual #include <linux/mman.h> 20399145f9SAnshuman Khandual #include <linux/mm_types.h> 21399145f9SAnshuman Khandual #include <linux/module.h> 22399145f9SAnshuman Khandual #include <linux/pfn_t.h> 23399145f9SAnshuman Khandual #include <linux/printk.h> 24a5c3b9ffSAnshuman Khandual #include <linux/pgtable.h> 25399145f9SAnshuman Khandual #include <linux/random.h> 26399145f9SAnshuman Khandual #include <linux/spinlock.h> 27399145f9SAnshuman Khandual #include <linux/swap.h> 28399145f9SAnshuman Khandual #include <linux/swapops.h> 29399145f9SAnshuman Khandual #include <linux/start_kernel.h> 30399145f9SAnshuman Khandual #include <linux/sched/mm.h> 3185a14463SAneesh Kumar K.V #include <linux/io.h> 32399145f9SAnshuman Khandual #include <asm/pgalloc.h> 33a5c3b9ffSAnshuman Khandual #include <asm/tlbflush.h> 34399145f9SAnshuman Khandual 35b1d00007SAnshuman Khandual /* 36b1d00007SAnshuman Khandual * Please refer Documentation/vm/arch_pgtable_helpers.rst for the semantics 37b1d00007SAnshuman Khandual * expectations that are being validated here. All future changes in here 38b1d00007SAnshuman Khandual * or the documentation need to be in sync. 39b1d00007SAnshuman Khandual */ 40b1d00007SAnshuman Khandual 41399145f9SAnshuman Khandual #define VMFLAGS (VM_READ|VM_WRITE|VM_EXEC) 42399145f9SAnshuman Khandual 43399145f9SAnshuman Khandual /* 44399145f9SAnshuman Khandual * On s390 platform, the lower 4 bits are used to identify given page table 45399145f9SAnshuman Khandual * entry type. But these bits might affect the ability to clear entries with 46399145f9SAnshuman Khandual * pxx_clear() because of how dynamic page table folding works on s390. So 47399145f9SAnshuman Khandual * while loading up the entries do not change the lower 4 bits. It does not 48cfc5bbc4SAneesh Kumar K.V * have affect any other platform. Also avoid the 62nd bit on ppc64 that is 49cfc5bbc4SAneesh Kumar K.V * used to mark a pte entry. 50399145f9SAnshuman Khandual */ 51cfc5bbc4SAneesh Kumar K.V #define S390_SKIP_MASK GENMASK(3, 0) 52cfc5bbc4SAneesh Kumar K.V #if __BITS_PER_LONG == 64 53cfc5bbc4SAneesh Kumar K.V #define PPC64_SKIP_MASK GENMASK(62, 62) 54cfc5bbc4SAneesh Kumar K.V #else 55cfc5bbc4SAneesh Kumar K.V #define PPC64_SKIP_MASK 0x0 56cfc5bbc4SAneesh Kumar K.V #endif 57cfc5bbc4SAneesh Kumar K.V #define ARCH_SKIP_MASK (S390_SKIP_MASK | PPC64_SKIP_MASK) 58cfc5bbc4SAneesh Kumar K.V #define RANDOM_ORVALUE (GENMASK(BITS_PER_LONG - 1, 0) & ~ARCH_SKIP_MASK) 59399145f9SAnshuman Khandual #define RANDOM_NZVALUE GENMASK(7, 0) 60399145f9SAnshuman Khandual 612e326c07SAnshuman Khandual static void __init pte_basic_tests(unsigned long pfn, int idx) 62399145f9SAnshuman Khandual { 632e326c07SAnshuman Khandual pgprot_t prot = protection_map[idx]; 64399145f9SAnshuman Khandual pte_t pte = pfn_pte(pfn, prot); 652e326c07SAnshuman Khandual unsigned long val = idx, *ptr = &val; 66399145f9SAnshuman Khandual 672e326c07SAnshuman Khandual pr_debug("Validating PTE basic (%pGv)\n", ptr); 68bb5c47ceSAnshuman Khandual 69bb5c47ceSAnshuman Khandual /* 70bb5c47ceSAnshuman Khandual * This test needs to be executed after the given page table entry 71bb5c47ceSAnshuman Khandual * is created with pfn_pte() to make sure that protection_map[idx] 72bb5c47ceSAnshuman Khandual * does not have the dirty bit enabled from the beginning. This is 73bb5c47ceSAnshuman Khandual * important for platforms like arm64 where (!PTE_RDONLY) indicate 74bb5c47ceSAnshuman Khandual * dirty bit being set. 75bb5c47ceSAnshuman Khandual */ 76bb5c47ceSAnshuman Khandual WARN_ON(pte_dirty(pte_wrprotect(pte))); 77bb5c47ceSAnshuman Khandual 78399145f9SAnshuman Khandual WARN_ON(!pte_same(pte, pte)); 79399145f9SAnshuman Khandual WARN_ON(!pte_young(pte_mkyoung(pte_mkold(pte)))); 80399145f9SAnshuman Khandual WARN_ON(!pte_dirty(pte_mkdirty(pte_mkclean(pte)))); 81399145f9SAnshuman Khandual WARN_ON(!pte_write(pte_mkwrite(pte_wrprotect(pte)))); 82399145f9SAnshuman Khandual WARN_ON(pte_young(pte_mkold(pte_mkyoung(pte)))); 83399145f9SAnshuman Khandual WARN_ON(pte_dirty(pte_mkclean(pte_mkdirty(pte)))); 84399145f9SAnshuman Khandual WARN_ON(pte_write(pte_wrprotect(pte_mkwrite(pte)))); 85bb5c47ceSAnshuman Khandual WARN_ON(pte_dirty(pte_wrprotect(pte_mkclean(pte)))); 86bb5c47ceSAnshuman Khandual WARN_ON(!pte_dirty(pte_wrprotect(pte_mkdirty(pte)))); 87399145f9SAnshuman Khandual } 88399145f9SAnshuman Khandual 89a5c3b9ffSAnshuman Khandual static void __init pte_advanced_tests(struct mm_struct *mm, 90a5c3b9ffSAnshuman Khandual struct vm_area_struct *vma, pte_t *ptep, 91a5c3b9ffSAnshuman Khandual unsigned long pfn, unsigned long vaddr, 92a5c3b9ffSAnshuman Khandual pgprot_t prot) 93a5c3b9ffSAnshuman Khandual { 94*b593b90dSShixin Liu pte_t pte; 95a5c3b9ffSAnshuman Khandual 96c3824e18SAneesh Kumar K.V /* 97c3824e18SAneesh Kumar K.V * Architectures optimize set_pte_at by avoiding TLB flush. 98c3824e18SAneesh Kumar K.V * This requires set_pte_at to be not used to update an 99c3824e18SAneesh Kumar K.V * existing pte entry. Clear pte before we do set_pte_at 100c3824e18SAneesh Kumar K.V */ 101c3824e18SAneesh Kumar K.V 1026315df41SAnshuman Khandual pr_debug("Validating PTE advanced\n"); 103a5c3b9ffSAnshuman Khandual pte = pfn_pte(pfn, prot); 104a5c3b9ffSAnshuman Khandual set_pte_at(mm, vaddr, ptep, pte); 105a5c3b9ffSAnshuman Khandual ptep_set_wrprotect(mm, vaddr, ptep); 106a5c3b9ffSAnshuman Khandual pte = ptep_get(ptep); 107a5c3b9ffSAnshuman Khandual WARN_ON(pte_write(pte)); 108a5c3b9ffSAnshuman Khandual ptep_get_and_clear(mm, vaddr, ptep); 109a5c3b9ffSAnshuman Khandual pte = ptep_get(ptep); 110a5c3b9ffSAnshuman Khandual WARN_ON(!pte_none(pte)); 111a5c3b9ffSAnshuman Khandual 112a5c3b9ffSAnshuman Khandual pte = pfn_pte(pfn, prot); 113a5c3b9ffSAnshuman Khandual pte = pte_wrprotect(pte); 114a5c3b9ffSAnshuman Khandual pte = pte_mkclean(pte); 115a5c3b9ffSAnshuman Khandual set_pte_at(mm, vaddr, ptep, pte); 116a5c3b9ffSAnshuman Khandual pte = pte_mkwrite(pte); 117a5c3b9ffSAnshuman Khandual pte = pte_mkdirty(pte); 118a5c3b9ffSAnshuman Khandual ptep_set_access_flags(vma, vaddr, ptep, pte, 1); 119a5c3b9ffSAnshuman Khandual pte = ptep_get(ptep); 120a5c3b9ffSAnshuman Khandual WARN_ON(!(pte_write(pte) && pte_dirty(pte))); 121a5c3b9ffSAnshuman Khandual ptep_get_and_clear_full(mm, vaddr, ptep, 1); 122a5c3b9ffSAnshuman Khandual pte = ptep_get(ptep); 123a5c3b9ffSAnshuman Khandual WARN_ON(!pte_none(pte)); 124a5c3b9ffSAnshuman Khandual 125c3824e18SAneesh Kumar K.V pte = pfn_pte(pfn, prot); 126a5c3b9ffSAnshuman Khandual pte = pte_mkyoung(pte); 127a5c3b9ffSAnshuman Khandual set_pte_at(mm, vaddr, ptep, pte); 128a5c3b9ffSAnshuman Khandual ptep_test_and_clear_young(vma, vaddr, ptep); 129a5c3b9ffSAnshuman Khandual pte = ptep_get(ptep); 130a5c3b9ffSAnshuman Khandual WARN_ON(pte_young(pte)); 131a5c3b9ffSAnshuman Khandual } 132a5c3b9ffSAnshuman Khandual 133a5c3b9ffSAnshuman Khandual static void __init pte_savedwrite_tests(unsigned long pfn, pgprot_t prot) 134a5c3b9ffSAnshuman Khandual { 135a5c3b9ffSAnshuman Khandual pte_t pte = pfn_pte(pfn, prot); 136a5c3b9ffSAnshuman Khandual 1374200605bSAneesh Kumar K.V if (!IS_ENABLED(CONFIG_NUMA_BALANCING)) 1384200605bSAneesh Kumar K.V return; 1394200605bSAneesh Kumar K.V 1406315df41SAnshuman Khandual pr_debug("Validating PTE saved write\n"); 141a5c3b9ffSAnshuman Khandual WARN_ON(!pte_savedwrite(pte_mk_savedwrite(pte_clear_savedwrite(pte)))); 142a5c3b9ffSAnshuman Khandual WARN_ON(pte_savedwrite(pte_clear_savedwrite(pte_mk_savedwrite(pte)))); 143a5c3b9ffSAnshuman Khandual } 1444200605bSAneesh Kumar K.V 145399145f9SAnshuman Khandual #ifdef CONFIG_TRANSPARENT_HUGEPAGE 1462e326c07SAnshuman Khandual static void __init pmd_basic_tests(unsigned long pfn, int idx) 147399145f9SAnshuman Khandual { 1482e326c07SAnshuman Khandual pgprot_t prot = protection_map[idx]; 1492e326c07SAnshuman Khandual unsigned long val = idx, *ptr = &val; 15065ac1a60SAnshuman Khandual pmd_t pmd; 151399145f9SAnshuman Khandual 152787d563bSAneesh Kumar K.V if (!has_transparent_hugepage()) 153787d563bSAneesh Kumar K.V return; 154787d563bSAneesh Kumar K.V 1552e326c07SAnshuman Khandual pr_debug("Validating PMD basic (%pGv)\n", ptr); 15665ac1a60SAnshuman Khandual pmd = pfn_pmd(pfn, prot); 157bb5c47ceSAnshuman Khandual 158bb5c47ceSAnshuman Khandual /* 159bb5c47ceSAnshuman Khandual * This test needs to be executed after the given page table entry 160bb5c47ceSAnshuman Khandual * is created with pfn_pmd() to make sure that protection_map[idx] 161bb5c47ceSAnshuman Khandual * does not have the dirty bit enabled from the beginning. This is 162bb5c47ceSAnshuman Khandual * important for platforms like arm64 where (!PTE_RDONLY) indicate 163bb5c47ceSAnshuman Khandual * dirty bit being set. 164bb5c47ceSAnshuman Khandual */ 165bb5c47ceSAnshuman Khandual WARN_ON(pmd_dirty(pmd_wrprotect(pmd))); 166bb5c47ceSAnshuman Khandual 167bb5c47ceSAnshuman Khandual 168399145f9SAnshuman Khandual WARN_ON(!pmd_same(pmd, pmd)); 169399145f9SAnshuman Khandual WARN_ON(!pmd_young(pmd_mkyoung(pmd_mkold(pmd)))); 170399145f9SAnshuman Khandual WARN_ON(!pmd_dirty(pmd_mkdirty(pmd_mkclean(pmd)))); 171399145f9SAnshuman Khandual WARN_ON(!pmd_write(pmd_mkwrite(pmd_wrprotect(pmd)))); 172399145f9SAnshuman Khandual WARN_ON(pmd_young(pmd_mkold(pmd_mkyoung(pmd)))); 173399145f9SAnshuman Khandual WARN_ON(pmd_dirty(pmd_mkclean(pmd_mkdirty(pmd)))); 174399145f9SAnshuman Khandual WARN_ON(pmd_write(pmd_wrprotect(pmd_mkwrite(pmd)))); 175bb5c47ceSAnshuman Khandual WARN_ON(pmd_dirty(pmd_wrprotect(pmd_mkclean(pmd)))); 176bb5c47ceSAnshuman Khandual WARN_ON(!pmd_dirty(pmd_wrprotect(pmd_mkdirty(pmd)))); 177399145f9SAnshuman Khandual /* 178399145f9SAnshuman Khandual * A huge page does not point to next level page table 179399145f9SAnshuman Khandual * entry. Hence this must qualify as pmd_bad(). 180399145f9SAnshuman Khandual */ 181399145f9SAnshuman Khandual WARN_ON(!pmd_bad(pmd_mkhuge(pmd))); 182399145f9SAnshuman Khandual } 183399145f9SAnshuman Khandual 184a5c3b9ffSAnshuman Khandual static void __init pmd_advanced_tests(struct mm_struct *mm, 185a5c3b9ffSAnshuman Khandual struct vm_area_struct *vma, pmd_t *pmdp, 186a5c3b9ffSAnshuman Khandual unsigned long pfn, unsigned long vaddr, 18787f34986SAneesh Kumar K.V pgprot_t prot, pgtable_t pgtable) 188a5c3b9ffSAnshuman Khandual { 18965ac1a60SAnshuman Khandual pmd_t pmd; 190a5c3b9ffSAnshuman Khandual 191a5c3b9ffSAnshuman Khandual if (!has_transparent_hugepage()) 192a5c3b9ffSAnshuman Khandual return; 193a5c3b9ffSAnshuman Khandual 1946315df41SAnshuman Khandual pr_debug("Validating PMD advanced\n"); 195a5c3b9ffSAnshuman Khandual /* Align the address wrt HPAGE_PMD_SIZE */ 19604f7ce3fSGerald Schaefer vaddr &= HPAGE_PMD_MASK; 197a5c3b9ffSAnshuman Khandual 19887f34986SAneesh Kumar K.V pgtable_trans_huge_deposit(mm, pmdp, pgtable); 19987f34986SAneesh Kumar K.V 200a5c3b9ffSAnshuman Khandual pmd = pfn_pmd(pfn, prot); 201a5c3b9ffSAnshuman Khandual set_pmd_at(mm, vaddr, pmdp, pmd); 202a5c3b9ffSAnshuman Khandual pmdp_set_wrprotect(mm, vaddr, pmdp); 203a5c3b9ffSAnshuman Khandual pmd = READ_ONCE(*pmdp); 204a5c3b9ffSAnshuman Khandual WARN_ON(pmd_write(pmd)); 205a5c3b9ffSAnshuman Khandual pmdp_huge_get_and_clear(mm, vaddr, pmdp); 206a5c3b9ffSAnshuman Khandual pmd = READ_ONCE(*pmdp); 207a5c3b9ffSAnshuman Khandual WARN_ON(!pmd_none(pmd)); 208a5c3b9ffSAnshuman Khandual 209a5c3b9ffSAnshuman Khandual pmd = pfn_pmd(pfn, prot); 210a5c3b9ffSAnshuman Khandual pmd = pmd_wrprotect(pmd); 211a5c3b9ffSAnshuman Khandual pmd = pmd_mkclean(pmd); 212a5c3b9ffSAnshuman Khandual set_pmd_at(mm, vaddr, pmdp, pmd); 213a5c3b9ffSAnshuman Khandual pmd = pmd_mkwrite(pmd); 214a5c3b9ffSAnshuman Khandual pmd = pmd_mkdirty(pmd); 215a5c3b9ffSAnshuman Khandual pmdp_set_access_flags(vma, vaddr, pmdp, pmd, 1); 216a5c3b9ffSAnshuman Khandual pmd = READ_ONCE(*pmdp); 217a5c3b9ffSAnshuman Khandual WARN_ON(!(pmd_write(pmd) && pmd_dirty(pmd))); 218a5c3b9ffSAnshuman Khandual pmdp_huge_get_and_clear_full(vma, vaddr, pmdp, 1); 219a5c3b9ffSAnshuman Khandual pmd = READ_ONCE(*pmdp); 220a5c3b9ffSAnshuman Khandual WARN_ON(!pmd_none(pmd)); 221a5c3b9ffSAnshuman Khandual 222c3824e18SAneesh Kumar K.V pmd = pmd_mkhuge(pfn_pmd(pfn, prot)); 223a5c3b9ffSAnshuman Khandual pmd = pmd_mkyoung(pmd); 224a5c3b9ffSAnshuman Khandual set_pmd_at(mm, vaddr, pmdp, pmd); 225a5c3b9ffSAnshuman Khandual pmdp_test_and_clear_young(vma, vaddr, pmdp); 226a5c3b9ffSAnshuman Khandual pmd = READ_ONCE(*pmdp); 227a5c3b9ffSAnshuman Khandual WARN_ON(pmd_young(pmd)); 22887f34986SAneesh Kumar K.V 22913af0506SAneesh Kumar K.V /* Clear the pte entries */ 23013af0506SAneesh Kumar K.V pmdp_huge_get_and_clear(mm, vaddr, pmdp); 23187f34986SAneesh Kumar K.V pgtable = pgtable_trans_huge_withdraw(mm, pmdp); 232a5c3b9ffSAnshuman Khandual } 233a5c3b9ffSAnshuman Khandual 234a5c3b9ffSAnshuman Khandual static void __init pmd_leaf_tests(unsigned long pfn, pgprot_t prot) 235a5c3b9ffSAnshuman Khandual { 23665ac1a60SAnshuman Khandual pmd_t pmd; 23765ac1a60SAnshuman Khandual 23865ac1a60SAnshuman Khandual if (!has_transparent_hugepage()) 23965ac1a60SAnshuman Khandual return; 240a5c3b9ffSAnshuman Khandual 2416315df41SAnshuman Khandual pr_debug("Validating PMD leaf\n"); 24265ac1a60SAnshuman Khandual pmd = pfn_pmd(pfn, prot); 24365ac1a60SAnshuman Khandual 244a5c3b9ffSAnshuman Khandual /* 245a5c3b9ffSAnshuman Khandual * PMD based THP is a leaf entry. 246a5c3b9ffSAnshuman Khandual */ 247a5c3b9ffSAnshuman Khandual pmd = pmd_mkhuge(pmd); 248a5c3b9ffSAnshuman Khandual WARN_ON(!pmd_leaf(pmd)); 249a5c3b9ffSAnshuman Khandual } 250a5c3b9ffSAnshuman Khandual 251a5c3b9ffSAnshuman Khandual static void __init pmd_savedwrite_tests(unsigned long pfn, pgprot_t prot) 252a5c3b9ffSAnshuman Khandual { 25365ac1a60SAnshuman Khandual pmd_t pmd; 254a5c3b9ffSAnshuman Khandual 2554200605bSAneesh Kumar K.V if (!IS_ENABLED(CONFIG_NUMA_BALANCING)) 2564200605bSAneesh Kumar K.V return; 2574200605bSAneesh Kumar K.V 25865ac1a60SAnshuman Khandual if (!has_transparent_hugepage()) 25965ac1a60SAnshuman Khandual return; 26065ac1a60SAnshuman Khandual 2616315df41SAnshuman Khandual pr_debug("Validating PMD saved write\n"); 26265ac1a60SAnshuman Khandual pmd = pfn_pmd(pfn, prot); 263a5c3b9ffSAnshuman Khandual WARN_ON(!pmd_savedwrite(pmd_mk_savedwrite(pmd_clear_savedwrite(pmd)))); 264a5c3b9ffSAnshuman Khandual WARN_ON(pmd_savedwrite(pmd_clear_savedwrite(pmd_mk_savedwrite(pmd)))); 265a5c3b9ffSAnshuman Khandual } 266a5c3b9ffSAnshuman Khandual 267399145f9SAnshuman Khandual #ifdef CONFIG_HAVE_ARCH_TRANSPARENT_HUGEPAGE_PUD 2682e326c07SAnshuman Khandual static void __init pud_basic_tests(struct mm_struct *mm, unsigned long pfn, int idx) 269399145f9SAnshuman Khandual { 2702e326c07SAnshuman Khandual pgprot_t prot = protection_map[idx]; 2712e326c07SAnshuman Khandual unsigned long val = idx, *ptr = &val; 27265ac1a60SAnshuman Khandual pud_t pud; 273399145f9SAnshuman Khandual 274787d563bSAneesh Kumar K.V if (!has_transparent_hugepage()) 275787d563bSAneesh Kumar K.V return; 276787d563bSAneesh Kumar K.V 2772e326c07SAnshuman Khandual pr_debug("Validating PUD basic (%pGv)\n", ptr); 27865ac1a60SAnshuman Khandual pud = pfn_pud(pfn, prot); 279bb5c47ceSAnshuman Khandual 280bb5c47ceSAnshuman Khandual /* 281bb5c47ceSAnshuman Khandual * This test needs to be executed after the given page table entry 282bb5c47ceSAnshuman Khandual * is created with pfn_pud() to make sure that protection_map[idx] 283bb5c47ceSAnshuman Khandual * does not have the dirty bit enabled from the beginning. This is 284bb5c47ceSAnshuman Khandual * important for platforms like arm64 where (!PTE_RDONLY) indicate 285bb5c47ceSAnshuman Khandual * dirty bit being set. 286bb5c47ceSAnshuman Khandual */ 287bb5c47ceSAnshuman Khandual WARN_ON(pud_dirty(pud_wrprotect(pud))); 288bb5c47ceSAnshuman Khandual 289399145f9SAnshuman Khandual WARN_ON(!pud_same(pud, pud)); 290399145f9SAnshuman Khandual WARN_ON(!pud_young(pud_mkyoung(pud_mkold(pud)))); 291bb5c47ceSAnshuman Khandual WARN_ON(!pud_dirty(pud_mkdirty(pud_mkclean(pud)))); 292bb5c47ceSAnshuman Khandual WARN_ON(pud_dirty(pud_mkclean(pud_mkdirty(pud)))); 293399145f9SAnshuman Khandual WARN_ON(!pud_write(pud_mkwrite(pud_wrprotect(pud)))); 294399145f9SAnshuman Khandual WARN_ON(pud_write(pud_wrprotect(pud_mkwrite(pud)))); 295399145f9SAnshuman Khandual WARN_ON(pud_young(pud_mkold(pud_mkyoung(pud)))); 296bb5c47ceSAnshuman Khandual WARN_ON(pud_dirty(pud_wrprotect(pud_mkclean(pud)))); 297bb5c47ceSAnshuman Khandual WARN_ON(!pud_dirty(pud_wrprotect(pud_mkdirty(pud)))); 298399145f9SAnshuman Khandual 299399145f9SAnshuman Khandual if (mm_pmd_folded(mm)) 300399145f9SAnshuman Khandual return; 301399145f9SAnshuman Khandual 302399145f9SAnshuman Khandual /* 303399145f9SAnshuman Khandual * A huge page does not point to next level page table 304399145f9SAnshuman Khandual * entry. Hence this must qualify as pud_bad(). 305399145f9SAnshuman Khandual */ 306399145f9SAnshuman Khandual WARN_ON(!pud_bad(pud_mkhuge(pud))); 307399145f9SAnshuman Khandual } 308a5c3b9ffSAnshuman Khandual 309a5c3b9ffSAnshuman Khandual static void __init pud_advanced_tests(struct mm_struct *mm, 310a5c3b9ffSAnshuman Khandual struct vm_area_struct *vma, pud_t *pudp, 311a5c3b9ffSAnshuman Khandual unsigned long pfn, unsigned long vaddr, 312a5c3b9ffSAnshuman Khandual pgprot_t prot) 313a5c3b9ffSAnshuman Khandual { 31465ac1a60SAnshuman Khandual pud_t pud; 315a5c3b9ffSAnshuman Khandual 316a5c3b9ffSAnshuman Khandual if (!has_transparent_hugepage()) 317a5c3b9ffSAnshuman Khandual return; 318a5c3b9ffSAnshuman Khandual 3196315df41SAnshuman Khandual pr_debug("Validating PUD advanced\n"); 320a5c3b9ffSAnshuman Khandual /* Align the address wrt HPAGE_PUD_SIZE */ 32104f7ce3fSGerald Schaefer vaddr &= HPAGE_PUD_MASK; 322a5c3b9ffSAnshuman Khandual 32365ac1a60SAnshuman Khandual pud = pfn_pud(pfn, prot); 324a5c3b9ffSAnshuman Khandual set_pud_at(mm, vaddr, pudp, pud); 325a5c3b9ffSAnshuman Khandual pudp_set_wrprotect(mm, vaddr, pudp); 326a5c3b9ffSAnshuman Khandual pud = READ_ONCE(*pudp); 327a5c3b9ffSAnshuman Khandual WARN_ON(pud_write(pud)); 328a5c3b9ffSAnshuman Khandual 329a5c3b9ffSAnshuman Khandual #ifndef __PAGETABLE_PMD_FOLDED 330a5c3b9ffSAnshuman Khandual pudp_huge_get_and_clear(mm, vaddr, pudp); 331a5c3b9ffSAnshuman Khandual pud = READ_ONCE(*pudp); 332a5c3b9ffSAnshuman Khandual WARN_ON(!pud_none(pud)); 333a5c3b9ffSAnshuman Khandual #endif /* __PAGETABLE_PMD_FOLDED */ 334a5c3b9ffSAnshuman Khandual pud = pfn_pud(pfn, prot); 335a5c3b9ffSAnshuman Khandual pud = pud_wrprotect(pud); 336a5c3b9ffSAnshuman Khandual pud = pud_mkclean(pud); 337a5c3b9ffSAnshuman Khandual set_pud_at(mm, vaddr, pudp, pud); 338a5c3b9ffSAnshuman Khandual pud = pud_mkwrite(pud); 339a5c3b9ffSAnshuman Khandual pud = pud_mkdirty(pud); 340a5c3b9ffSAnshuman Khandual pudp_set_access_flags(vma, vaddr, pudp, pud, 1); 341a5c3b9ffSAnshuman Khandual pud = READ_ONCE(*pudp); 342a5c3b9ffSAnshuman Khandual WARN_ON(!(pud_write(pud) && pud_dirty(pud))); 343a5c3b9ffSAnshuman Khandual 344c3824e18SAneesh Kumar K.V #ifndef __PAGETABLE_PMD_FOLDED 345c3824e18SAneesh Kumar K.V pudp_huge_get_and_clear_full(mm, vaddr, pudp, 1); 346c3824e18SAneesh Kumar K.V pud = READ_ONCE(*pudp); 347c3824e18SAneesh Kumar K.V WARN_ON(!pud_none(pud)); 348c3824e18SAneesh Kumar K.V #endif /* __PAGETABLE_PMD_FOLDED */ 349c3824e18SAneesh Kumar K.V 350c3824e18SAneesh Kumar K.V pud = pfn_pud(pfn, prot); 351a5c3b9ffSAnshuman Khandual pud = pud_mkyoung(pud); 352a5c3b9ffSAnshuman Khandual set_pud_at(mm, vaddr, pudp, pud); 353a5c3b9ffSAnshuman Khandual pudp_test_and_clear_young(vma, vaddr, pudp); 354a5c3b9ffSAnshuman Khandual pud = READ_ONCE(*pudp); 355a5c3b9ffSAnshuman Khandual WARN_ON(pud_young(pud)); 35613af0506SAneesh Kumar K.V 35713af0506SAneesh Kumar K.V pudp_huge_get_and_clear(mm, vaddr, pudp); 358a5c3b9ffSAnshuman Khandual } 359a5c3b9ffSAnshuman Khandual 360a5c3b9ffSAnshuman Khandual static void __init pud_leaf_tests(unsigned long pfn, pgprot_t prot) 361a5c3b9ffSAnshuman Khandual { 36265ac1a60SAnshuman Khandual pud_t pud; 36365ac1a60SAnshuman Khandual 36465ac1a60SAnshuman Khandual if (!has_transparent_hugepage()) 36565ac1a60SAnshuman Khandual return; 366a5c3b9ffSAnshuman Khandual 3676315df41SAnshuman Khandual pr_debug("Validating PUD leaf\n"); 36865ac1a60SAnshuman Khandual pud = pfn_pud(pfn, prot); 369a5c3b9ffSAnshuman Khandual /* 370a5c3b9ffSAnshuman Khandual * PUD based THP is a leaf entry. 371a5c3b9ffSAnshuman Khandual */ 372a5c3b9ffSAnshuman Khandual pud = pud_mkhuge(pud); 373a5c3b9ffSAnshuman Khandual WARN_ON(!pud_leaf(pud)); 374a5c3b9ffSAnshuman Khandual } 3755fe77be6SShixin Liu #else /* !CONFIG_HAVE_ARCH_TRANSPARENT_HUGEPAGE_PUD */ 3765fe77be6SShixin Liu static void __init pud_basic_tests(struct mm_struct *mm, unsigned long pfn, int idx) { } 3775fe77be6SShixin Liu static void __init pud_advanced_tests(struct mm_struct *mm, 3785fe77be6SShixin Liu struct vm_area_struct *vma, pud_t *pudp, 3795fe77be6SShixin Liu unsigned long pfn, unsigned long vaddr, 3805fe77be6SShixin Liu pgprot_t prot) 3815fe77be6SShixin Liu { 3825fe77be6SShixin Liu } 3835fe77be6SShixin Liu static void __init pud_leaf_tests(unsigned long pfn, pgprot_t prot) { } 3845fe77be6SShixin Liu #endif /* CONFIG_HAVE_ARCH_TRANSPARENT_HUGEPAGE_PUD */ 3855fe77be6SShixin Liu #else /* !CONFIG_TRANSPARENT_HUGEPAGE */ 3865fe77be6SShixin Liu static void __init pmd_basic_tests(unsigned long pfn, int idx) { } 3875fe77be6SShixin Liu static void __init pud_basic_tests(struct mm_struct *mm, unsigned long pfn, int idx) { } 3885fe77be6SShixin Liu static void __init pmd_advanced_tests(struct mm_struct *mm, 3895fe77be6SShixin Liu struct vm_area_struct *vma, pmd_t *pmdp, 3905fe77be6SShixin Liu unsigned long pfn, unsigned long vaddr, 3915fe77be6SShixin Liu pgprot_t prot, pgtable_t pgtable) 3925fe77be6SShixin Liu { 3935fe77be6SShixin Liu } 3945fe77be6SShixin Liu static void __init pud_advanced_tests(struct mm_struct *mm, 3955fe77be6SShixin Liu struct vm_area_struct *vma, pud_t *pudp, 3965fe77be6SShixin Liu unsigned long pfn, unsigned long vaddr, 3975fe77be6SShixin Liu pgprot_t prot) 3985fe77be6SShixin Liu { 3995fe77be6SShixin Liu } 4005fe77be6SShixin Liu static void __init pmd_leaf_tests(unsigned long pfn, pgprot_t prot) { } 4015fe77be6SShixin Liu static void __init pud_leaf_tests(unsigned long pfn, pgprot_t prot) { } 4025fe77be6SShixin Liu static void __init pmd_savedwrite_tests(unsigned long pfn, pgprot_t prot) { } 4035fe77be6SShixin Liu #endif /* CONFIG_TRANSPARENT_HUGEPAGE */ 404a5c3b9ffSAnshuman Khandual 40585a14463SAneesh Kumar K.V #ifdef CONFIG_HAVE_ARCH_HUGE_VMAP 4065fe77be6SShixin Liu static void __init pmd_huge_tests(pmd_t *pmdp, unsigned long pfn, pgprot_t prot) 4075fe77be6SShixin Liu { 4085fe77be6SShixin Liu pmd_t pmd; 4095fe77be6SShixin Liu 4105fe77be6SShixin Liu if (!arch_vmap_pmd_supported(prot)) 4115fe77be6SShixin Liu return; 4125fe77be6SShixin Liu 4135fe77be6SShixin Liu pr_debug("Validating PMD huge\n"); 4145fe77be6SShixin Liu /* 4155fe77be6SShixin Liu * X86 defined pmd_set_huge() verifies that the given 4165fe77be6SShixin Liu * PMD is not a populated non-leaf entry. 4175fe77be6SShixin Liu */ 4185fe77be6SShixin Liu WRITE_ONCE(*pmdp, __pmd(0)); 4195fe77be6SShixin Liu WARN_ON(!pmd_set_huge(pmdp, __pfn_to_phys(pfn), prot)); 4205fe77be6SShixin Liu WARN_ON(!pmd_clear_huge(pmdp)); 4215fe77be6SShixin Liu pmd = READ_ONCE(*pmdp); 4225fe77be6SShixin Liu WARN_ON(!pmd_none(pmd)); 4235fe77be6SShixin Liu } 4245fe77be6SShixin Liu 425a5c3b9ffSAnshuman Khandual static void __init pud_huge_tests(pud_t *pudp, unsigned long pfn, pgprot_t prot) 426a5c3b9ffSAnshuman Khandual { 427a5c3b9ffSAnshuman Khandual pud_t pud; 428a5c3b9ffSAnshuman Khandual 429bbc180a5SNicholas Piggin if (!arch_vmap_pud_supported(prot)) 430a5c3b9ffSAnshuman Khandual return; 4316315df41SAnshuman Khandual 4326315df41SAnshuman Khandual pr_debug("Validating PUD huge\n"); 433a5c3b9ffSAnshuman Khandual /* 434a5c3b9ffSAnshuman Khandual * X86 defined pud_set_huge() verifies that the given 435a5c3b9ffSAnshuman Khandual * PUD is not a populated non-leaf entry. 436a5c3b9ffSAnshuman Khandual */ 437a5c3b9ffSAnshuman Khandual WRITE_ONCE(*pudp, __pud(0)); 438a5c3b9ffSAnshuman Khandual WARN_ON(!pud_set_huge(pudp, __pfn_to_phys(pfn), prot)); 439a5c3b9ffSAnshuman Khandual WARN_ON(!pud_clear_huge(pudp)); 440a5c3b9ffSAnshuman Khandual pud = READ_ONCE(*pudp); 441a5c3b9ffSAnshuman Khandual WARN_ON(!pud_none(pud)); 442a5c3b9ffSAnshuman Khandual } 44385a14463SAneesh Kumar K.V #else /* !CONFIG_HAVE_ARCH_HUGE_VMAP */ 4445fe77be6SShixin Liu static void __init pmd_huge_tests(pmd_t *pmdp, unsigned long pfn, pgprot_t prot) { } 44585a14463SAneesh Kumar K.V static void __init pud_huge_tests(pud_t *pudp, unsigned long pfn, pgprot_t prot) { } 4465fe77be6SShixin Liu #endif /* CONFIG_HAVE_ARCH_HUGE_VMAP */ 447399145f9SAnshuman Khandual 448399145f9SAnshuman Khandual static void __init p4d_basic_tests(unsigned long pfn, pgprot_t prot) 449399145f9SAnshuman Khandual { 450399145f9SAnshuman Khandual p4d_t p4d; 451399145f9SAnshuman Khandual 4526315df41SAnshuman Khandual pr_debug("Validating P4D basic\n"); 453399145f9SAnshuman Khandual memset(&p4d, RANDOM_NZVALUE, sizeof(p4d_t)); 454399145f9SAnshuman Khandual WARN_ON(!p4d_same(p4d, p4d)); 455399145f9SAnshuman Khandual } 456399145f9SAnshuman Khandual 457399145f9SAnshuman Khandual static void __init pgd_basic_tests(unsigned long pfn, pgprot_t prot) 458399145f9SAnshuman Khandual { 459399145f9SAnshuman Khandual pgd_t pgd; 460399145f9SAnshuman Khandual 4616315df41SAnshuman Khandual pr_debug("Validating PGD basic\n"); 462399145f9SAnshuman Khandual memset(&pgd, RANDOM_NZVALUE, sizeof(pgd_t)); 463399145f9SAnshuman Khandual WARN_ON(!pgd_same(pgd, pgd)); 464399145f9SAnshuman Khandual } 465399145f9SAnshuman Khandual 466399145f9SAnshuman Khandual #ifndef __PAGETABLE_PUD_FOLDED 467399145f9SAnshuman Khandual static void __init pud_clear_tests(struct mm_struct *mm, pud_t *pudp) 468399145f9SAnshuman Khandual { 469399145f9SAnshuman Khandual pud_t pud = READ_ONCE(*pudp); 470399145f9SAnshuman Khandual 471399145f9SAnshuman Khandual if (mm_pmd_folded(mm)) 472399145f9SAnshuman Khandual return; 473399145f9SAnshuman Khandual 4746315df41SAnshuman Khandual pr_debug("Validating PUD clear\n"); 475399145f9SAnshuman Khandual pud = __pud(pud_val(pud) | RANDOM_ORVALUE); 476399145f9SAnshuman Khandual WRITE_ONCE(*pudp, pud); 477399145f9SAnshuman Khandual pud_clear(pudp); 478399145f9SAnshuman Khandual pud = READ_ONCE(*pudp); 479399145f9SAnshuman Khandual WARN_ON(!pud_none(pud)); 480399145f9SAnshuman Khandual } 481399145f9SAnshuman Khandual 482399145f9SAnshuman Khandual static void __init pud_populate_tests(struct mm_struct *mm, pud_t *pudp, 483399145f9SAnshuman Khandual pmd_t *pmdp) 484399145f9SAnshuman Khandual { 485399145f9SAnshuman Khandual pud_t pud; 486399145f9SAnshuman Khandual 487399145f9SAnshuman Khandual if (mm_pmd_folded(mm)) 488399145f9SAnshuman Khandual return; 4896315df41SAnshuman Khandual 4906315df41SAnshuman Khandual pr_debug("Validating PUD populate\n"); 491399145f9SAnshuman Khandual /* 492399145f9SAnshuman Khandual * This entry points to next level page table page. 493399145f9SAnshuman Khandual * Hence this must not qualify as pud_bad(). 494399145f9SAnshuman Khandual */ 495399145f9SAnshuman Khandual pud_populate(mm, pudp, pmdp); 496399145f9SAnshuman Khandual pud = READ_ONCE(*pudp); 497399145f9SAnshuman Khandual WARN_ON(pud_bad(pud)); 498399145f9SAnshuman Khandual } 499399145f9SAnshuman Khandual #else /* !__PAGETABLE_PUD_FOLDED */ 500399145f9SAnshuman Khandual static void __init pud_clear_tests(struct mm_struct *mm, pud_t *pudp) { } 501399145f9SAnshuman Khandual static void __init pud_populate_tests(struct mm_struct *mm, pud_t *pudp, 502399145f9SAnshuman Khandual pmd_t *pmdp) 503399145f9SAnshuman Khandual { 504399145f9SAnshuman Khandual } 505399145f9SAnshuman Khandual #endif /* PAGETABLE_PUD_FOLDED */ 506399145f9SAnshuman Khandual 507399145f9SAnshuman Khandual #ifndef __PAGETABLE_P4D_FOLDED 508399145f9SAnshuman Khandual static void __init p4d_clear_tests(struct mm_struct *mm, p4d_t *p4dp) 509399145f9SAnshuman Khandual { 510399145f9SAnshuman Khandual p4d_t p4d = READ_ONCE(*p4dp); 511399145f9SAnshuman Khandual 512399145f9SAnshuman Khandual if (mm_pud_folded(mm)) 513399145f9SAnshuman Khandual return; 514399145f9SAnshuman Khandual 5156315df41SAnshuman Khandual pr_debug("Validating P4D clear\n"); 516399145f9SAnshuman Khandual p4d = __p4d(p4d_val(p4d) | RANDOM_ORVALUE); 517399145f9SAnshuman Khandual WRITE_ONCE(*p4dp, p4d); 518399145f9SAnshuman Khandual p4d_clear(p4dp); 519399145f9SAnshuman Khandual p4d = READ_ONCE(*p4dp); 520399145f9SAnshuman Khandual WARN_ON(!p4d_none(p4d)); 521399145f9SAnshuman Khandual } 522399145f9SAnshuman Khandual 523399145f9SAnshuman Khandual static void __init p4d_populate_tests(struct mm_struct *mm, p4d_t *p4dp, 524399145f9SAnshuman Khandual pud_t *pudp) 525399145f9SAnshuman Khandual { 526399145f9SAnshuman Khandual p4d_t p4d; 527399145f9SAnshuman Khandual 528399145f9SAnshuman Khandual if (mm_pud_folded(mm)) 529399145f9SAnshuman Khandual return; 530399145f9SAnshuman Khandual 5316315df41SAnshuman Khandual pr_debug("Validating P4D populate\n"); 532399145f9SAnshuman Khandual /* 533399145f9SAnshuman Khandual * This entry points to next level page table page. 534399145f9SAnshuman Khandual * Hence this must not qualify as p4d_bad(). 535399145f9SAnshuman Khandual */ 536399145f9SAnshuman Khandual pud_clear(pudp); 537399145f9SAnshuman Khandual p4d_clear(p4dp); 538399145f9SAnshuman Khandual p4d_populate(mm, p4dp, pudp); 539399145f9SAnshuman Khandual p4d = READ_ONCE(*p4dp); 540399145f9SAnshuman Khandual WARN_ON(p4d_bad(p4d)); 541399145f9SAnshuman Khandual } 542399145f9SAnshuman Khandual 543399145f9SAnshuman Khandual static void __init pgd_clear_tests(struct mm_struct *mm, pgd_t *pgdp) 544399145f9SAnshuman Khandual { 545399145f9SAnshuman Khandual pgd_t pgd = READ_ONCE(*pgdp); 546399145f9SAnshuman Khandual 547399145f9SAnshuman Khandual if (mm_p4d_folded(mm)) 548399145f9SAnshuman Khandual return; 549399145f9SAnshuman Khandual 5506315df41SAnshuman Khandual pr_debug("Validating PGD clear\n"); 551399145f9SAnshuman Khandual pgd = __pgd(pgd_val(pgd) | RANDOM_ORVALUE); 552399145f9SAnshuman Khandual WRITE_ONCE(*pgdp, pgd); 553399145f9SAnshuman Khandual pgd_clear(pgdp); 554399145f9SAnshuman Khandual pgd = READ_ONCE(*pgdp); 555399145f9SAnshuman Khandual WARN_ON(!pgd_none(pgd)); 556399145f9SAnshuman Khandual } 557399145f9SAnshuman Khandual 558399145f9SAnshuman Khandual static void __init pgd_populate_tests(struct mm_struct *mm, pgd_t *pgdp, 559399145f9SAnshuman Khandual p4d_t *p4dp) 560399145f9SAnshuman Khandual { 561399145f9SAnshuman Khandual pgd_t pgd; 562399145f9SAnshuman Khandual 563399145f9SAnshuman Khandual if (mm_p4d_folded(mm)) 564399145f9SAnshuman Khandual return; 565399145f9SAnshuman Khandual 5666315df41SAnshuman Khandual pr_debug("Validating PGD populate\n"); 567399145f9SAnshuman Khandual /* 568399145f9SAnshuman Khandual * This entry points to next level page table page. 569399145f9SAnshuman Khandual * Hence this must not qualify as pgd_bad(). 570399145f9SAnshuman Khandual */ 571399145f9SAnshuman Khandual p4d_clear(p4dp); 572399145f9SAnshuman Khandual pgd_clear(pgdp); 573399145f9SAnshuman Khandual pgd_populate(mm, pgdp, p4dp); 574399145f9SAnshuman Khandual pgd = READ_ONCE(*pgdp); 575399145f9SAnshuman Khandual WARN_ON(pgd_bad(pgd)); 576399145f9SAnshuman Khandual } 577399145f9SAnshuman Khandual #else /* !__PAGETABLE_P4D_FOLDED */ 578399145f9SAnshuman Khandual static void __init p4d_clear_tests(struct mm_struct *mm, p4d_t *p4dp) { } 579399145f9SAnshuman Khandual static void __init pgd_clear_tests(struct mm_struct *mm, pgd_t *pgdp) { } 580399145f9SAnshuman Khandual static void __init p4d_populate_tests(struct mm_struct *mm, p4d_t *p4dp, 581399145f9SAnshuman Khandual pud_t *pudp) 582399145f9SAnshuman Khandual { 583399145f9SAnshuman Khandual } 584399145f9SAnshuman Khandual static void __init pgd_populate_tests(struct mm_struct *mm, pgd_t *pgdp, 585399145f9SAnshuman Khandual p4d_t *p4dp) 586399145f9SAnshuman Khandual { 587399145f9SAnshuman Khandual } 588399145f9SAnshuman Khandual #endif /* PAGETABLE_P4D_FOLDED */ 589399145f9SAnshuman Khandual 590399145f9SAnshuman Khandual static void __init pte_clear_tests(struct mm_struct *mm, pte_t *ptep, 591401035d5SAneesh Kumar K.V unsigned long pfn, unsigned long vaddr, 592401035d5SAneesh Kumar K.V pgprot_t prot) 593399145f9SAnshuman Khandual { 594401035d5SAneesh Kumar K.V pte_t pte = pfn_pte(pfn, prot); 595399145f9SAnshuman Khandual 5966315df41SAnshuman Khandual pr_debug("Validating PTE clear\n"); 597401035d5SAneesh Kumar K.V #ifndef CONFIG_RISCV 598399145f9SAnshuman Khandual pte = __pte(pte_val(pte) | RANDOM_ORVALUE); 599401035d5SAneesh Kumar K.V #endif 600399145f9SAnshuman Khandual set_pte_at(mm, vaddr, ptep, pte); 601399145f9SAnshuman Khandual barrier(); 602399145f9SAnshuman Khandual pte_clear(mm, vaddr, ptep); 6039449c9cbSChristophe Leroy pte = ptep_get(ptep); 604399145f9SAnshuman Khandual WARN_ON(!pte_none(pte)); 605399145f9SAnshuman Khandual } 606399145f9SAnshuman Khandual 607399145f9SAnshuman Khandual static void __init pmd_clear_tests(struct mm_struct *mm, pmd_t *pmdp) 608399145f9SAnshuman Khandual { 609399145f9SAnshuman Khandual pmd_t pmd = READ_ONCE(*pmdp); 610399145f9SAnshuman Khandual 6116315df41SAnshuman Khandual pr_debug("Validating PMD clear\n"); 612399145f9SAnshuman Khandual pmd = __pmd(pmd_val(pmd) | RANDOM_ORVALUE); 613399145f9SAnshuman Khandual WRITE_ONCE(*pmdp, pmd); 614399145f9SAnshuman Khandual pmd_clear(pmdp); 615399145f9SAnshuman Khandual pmd = READ_ONCE(*pmdp); 616399145f9SAnshuman Khandual WARN_ON(!pmd_none(pmd)); 617399145f9SAnshuman Khandual } 618399145f9SAnshuman Khandual 619399145f9SAnshuman Khandual static void __init pmd_populate_tests(struct mm_struct *mm, pmd_t *pmdp, 620399145f9SAnshuman Khandual pgtable_t pgtable) 621399145f9SAnshuman Khandual { 622399145f9SAnshuman Khandual pmd_t pmd; 623399145f9SAnshuman Khandual 6246315df41SAnshuman Khandual pr_debug("Validating PMD populate\n"); 625399145f9SAnshuman Khandual /* 626399145f9SAnshuman Khandual * This entry points to next level page table page. 627399145f9SAnshuman Khandual * Hence this must not qualify as pmd_bad(). 628399145f9SAnshuman Khandual */ 629399145f9SAnshuman Khandual pmd_populate(mm, pmdp, pgtable); 630399145f9SAnshuman Khandual pmd = READ_ONCE(*pmdp); 631399145f9SAnshuman Khandual WARN_ON(pmd_bad(pmd)); 632399145f9SAnshuman Khandual } 633399145f9SAnshuman Khandual 63405289402SAnshuman Khandual static void __init pte_special_tests(unsigned long pfn, pgprot_t prot) 63505289402SAnshuman Khandual { 63605289402SAnshuman Khandual pte_t pte = pfn_pte(pfn, prot); 63705289402SAnshuman Khandual 63805289402SAnshuman Khandual if (!IS_ENABLED(CONFIG_ARCH_HAS_PTE_SPECIAL)) 63905289402SAnshuman Khandual return; 64005289402SAnshuman Khandual 6416315df41SAnshuman Khandual pr_debug("Validating PTE special\n"); 64205289402SAnshuman Khandual WARN_ON(!pte_special(pte_mkspecial(pte))); 64305289402SAnshuman Khandual } 64405289402SAnshuman Khandual 64505289402SAnshuman Khandual static void __init pte_protnone_tests(unsigned long pfn, pgprot_t prot) 64605289402SAnshuman Khandual { 64705289402SAnshuman Khandual pte_t pte = pfn_pte(pfn, prot); 64805289402SAnshuman Khandual 64905289402SAnshuman Khandual if (!IS_ENABLED(CONFIG_NUMA_BALANCING)) 65005289402SAnshuman Khandual return; 65105289402SAnshuman Khandual 6526315df41SAnshuman Khandual pr_debug("Validating PTE protnone\n"); 65305289402SAnshuman Khandual WARN_ON(!pte_protnone(pte)); 65405289402SAnshuman Khandual WARN_ON(!pte_present(pte)); 65505289402SAnshuman Khandual } 65605289402SAnshuman Khandual 65705289402SAnshuman Khandual #ifdef CONFIG_TRANSPARENT_HUGEPAGE 65805289402SAnshuman Khandual static void __init pmd_protnone_tests(unsigned long pfn, pgprot_t prot) 65905289402SAnshuman Khandual { 66065ac1a60SAnshuman Khandual pmd_t pmd; 66105289402SAnshuman Khandual 66205289402SAnshuman Khandual if (!IS_ENABLED(CONFIG_NUMA_BALANCING)) 66305289402SAnshuman Khandual return; 66405289402SAnshuman Khandual 66565ac1a60SAnshuman Khandual if (!has_transparent_hugepage()) 66665ac1a60SAnshuman Khandual return; 66765ac1a60SAnshuman Khandual 6686315df41SAnshuman Khandual pr_debug("Validating PMD protnone\n"); 66965ac1a60SAnshuman Khandual pmd = pmd_mkhuge(pfn_pmd(pfn, prot)); 67005289402SAnshuman Khandual WARN_ON(!pmd_protnone(pmd)); 67105289402SAnshuman Khandual WARN_ON(!pmd_present(pmd)); 67205289402SAnshuman Khandual } 67305289402SAnshuman Khandual #else /* !CONFIG_TRANSPARENT_HUGEPAGE */ 67405289402SAnshuman Khandual static void __init pmd_protnone_tests(unsigned long pfn, pgprot_t prot) { } 67505289402SAnshuman Khandual #endif /* CONFIG_TRANSPARENT_HUGEPAGE */ 67605289402SAnshuman Khandual 67705289402SAnshuman Khandual #ifdef CONFIG_ARCH_HAS_PTE_DEVMAP 67805289402SAnshuman Khandual static void __init pte_devmap_tests(unsigned long pfn, pgprot_t prot) 67905289402SAnshuman Khandual { 68005289402SAnshuman Khandual pte_t pte = pfn_pte(pfn, prot); 68105289402SAnshuman Khandual 6826315df41SAnshuman Khandual pr_debug("Validating PTE devmap\n"); 68305289402SAnshuman Khandual WARN_ON(!pte_devmap(pte_mkdevmap(pte))); 68405289402SAnshuman Khandual } 68505289402SAnshuman Khandual 68605289402SAnshuman Khandual #ifdef CONFIG_TRANSPARENT_HUGEPAGE 68705289402SAnshuman Khandual static void __init pmd_devmap_tests(unsigned long pfn, pgprot_t prot) 68805289402SAnshuman Khandual { 68965ac1a60SAnshuman Khandual pmd_t pmd; 69065ac1a60SAnshuman Khandual 69165ac1a60SAnshuman Khandual if (!has_transparent_hugepage()) 69265ac1a60SAnshuman Khandual return; 69305289402SAnshuman Khandual 6946315df41SAnshuman Khandual pr_debug("Validating PMD devmap\n"); 69565ac1a60SAnshuman Khandual pmd = pfn_pmd(pfn, prot); 69605289402SAnshuman Khandual WARN_ON(!pmd_devmap(pmd_mkdevmap(pmd))); 69705289402SAnshuman Khandual } 69805289402SAnshuman Khandual 69905289402SAnshuman Khandual #ifdef CONFIG_HAVE_ARCH_TRANSPARENT_HUGEPAGE_PUD 70005289402SAnshuman Khandual static void __init pud_devmap_tests(unsigned long pfn, pgprot_t prot) 70105289402SAnshuman Khandual { 70265ac1a60SAnshuman Khandual pud_t pud; 70365ac1a60SAnshuman Khandual 70465ac1a60SAnshuman Khandual if (!has_transparent_hugepage()) 70565ac1a60SAnshuman Khandual return; 70605289402SAnshuman Khandual 7076315df41SAnshuman Khandual pr_debug("Validating PUD devmap\n"); 70865ac1a60SAnshuman Khandual pud = pfn_pud(pfn, prot); 70905289402SAnshuman Khandual WARN_ON(!pud_devmap(pud_mkdevmap(pud))); 71005289402SAnshuman Khandual } 71105289402SAnshuman Khandual #else /* !CONFIG_HAVE_ARCH_TRANSPARENT_HUGEPAGE_PUD */ 71205289402SAnshuman Khandual static void __init pud_devmap_tests(unsigned long pfn, pgprot_t prot) { } 71305289402SAnshuman Khandual #endif /* CONFIG_HAVE_ARCH_TRANSPARENT_HUGEPAGE_PUD */ 71405289402SAnshuman Khandual #else /* CONFIG_TRANSPARENT_HUGEPAGE */ 71505289402SAnshuman Khandual static void __init pmd_devmap_tests(unsigned long pfn, pgprot_t prot) { } 71605289402SAnshuman Khandual static void __init pud_devmap_tests(unsigned long pfn, pgprot_t prot) { } 71705289402SAnshuman Khandual #endif /* CONFIG_TRANSPARENT_HUGEPAGE */ 71805289402SAnshuman Khandual #else 71905289402SAnshuman Khandual static void __init pte_devmap_tests(unsigned long pfn, pgprot_t prot) { } 72005289402SAnshuman Khandual static void __init pmd_devmap_tests(unsigned long pfn, pgprot_t prot) { } 72105289402SAnshuman Khandual static void __init pud_devmap_tests(unsigned long pfn, pgprot_t prot) { } 72205289402SAnshuman Khandual #endif /* CONFIG_ARCH_HAS_PTE_DEVMAP */ 72305289402SAnshuman Khandual 72405289402SAnshuman Khandual static void __init pte_soft_dirty_tests(unsigned long pfn, pgprot_t prot) 72505289402SAnshuman Khandual { 72605289402SAnshuman Khandual pte_t pte = pfn_pte(pfn, prot); 72705289402SAnshuman Khandual 72805289402SAnshuman Khandual if (!IS_ENABLED(CONFIG_MEM_SOFT_DIRTY)) 72905289402SAnshuman Khandual return; 73005289402SAnshuman Khandual 7316315df41SAnshuman Khandual pr_debug("Validating PTE soft dirty\n"); 73205289402SAnshuman Khandual WARN_ON(!pte_soft_dirty(pte_mksoft_dirty(pte))); 73305289402SAnshuman Khandual WARN_ON(pte_soft_dirty(pte_clear_soft_dirty(pte))); 73405289402SAnshuman Khandual } 73505289402SAnshuman Khandual 73605289402SAnshuman Khandual static void __init pte_swap_soft_dirty_tests(unsigned long pfn, pgprot_t prot) 73705289402SAnshuman Khandual { 73805289402SAnshuman Khandual pte_t pte = pfn_pte(pfn, prot); 73905289402SAnshuman Khandual 74005289402SAnshuman Khandual if (!IS_ENABLED(CONFIG_MEM_SOFT_DIRTY)) 74105289402SAnshuman Khandual return; 74205289402SAnshuman Khandual 7436315df41SAnshuman Khandual pr_debug("Validating PTE swap soft dirty\n"); 74405289402SAnshuman Khandual WARN_ON(!pte_swp_soft_dirty(pte_swp_mksoft_dirty(pte))); 74505289402SAnshuman Khandual WARN_ON(pte_swp_soft_dirty(pte_swp_clear_soft_dirty(pte))); 74605289402SAnshuman Khandual } 74705289402SAnshuman Khandual 74805289402SAnshuman Khandual #ifdef CONFIG_TRANSPARENT_HUGEPAGE 74905289402SAnshuman Khandual static void __init pmd_soft_dirty_tests(unsigned long pfn, pgprot_t prot) 75005289402SAnshuman Khandual { 75165ac1a60SAnshuman Khandual pmd_t pmd; 75205289402SAnshuman Khandual 75305289402SAnshuman Khandual if (!IS_ENABLED(CONFIG_MEM_SOFT_DIRTY)) 75405289402SAnshuman Khandual return; 75505289402SAnshuman Khandual 75665ac1a60SAnshuman Khandual if (!has_transparent_hugepage()) 75765ac1a60SAnshuman Khandual return; 75865ac1a60SAnshuman Khandual 7596315df41SAnshuman Khandual pr_debug("Validating PMD soft dirty\n"); 76065ac1a60SAnshuman Khandual pmd = pfn_pmd(pfn, prot); 76105289402SAnshuman Khandual WARN_ON(!pmd_soft_dirty(pmd_mksoft_dirty(pmd))); 76205289402SAnshuman Khandual WARN_ON(pmd_soft_dirty(pmd_clear_soft_dirty(pmd))); 76305289402SAnshuman Khandual } 76405289402SAnshuman Khandual 76505289402SAnshuman Khandual static void __init pmd_swap_soft_dirty_tests(unsigned long pfn, pgprot_t prot) 76605289402SAnshuman Khandual { 76765ac1a60SAnshuman Khandual pmd_t pmd; 76805289402SAnshuman Khandual 76905289402SAnshuman Khandual if (!IS_ENABLED(CONFIG_MEM_SOFT_DIRTY) || 77005289402SAnshuman Khandual !IS_ENABLED(CONFIG_ARCH_ENABLE_THP_MIGRATION)) 77105289402SAnshuman Khandual return; 77205289402SAnshuman Khandual 77365ac1a60SAnshuman Khandual if (!has_transparent_hugepage()) 77465ac1a60SAnshuman Khandual return; 77565ac1a60SAnshuman Khandual 7766315df41SAnshuman Khandual pr_debug("Validating PMD swap soft dirty\n"); 77765ac1a60SAnshuman Khandual pmd = pfn_pmd(pfn, prot); 77805289402SAnshuman Khandual WARN_ON(!pmd_swp_soft_dirty(pmd_swp_mksoft_dirty(pmd))); 77905289402SAnshuman Khandual WARN_ON(pmd_swp_soft_dirty(pmd_swp_clear_soft_dirty(pmd))); 78005289402SAnshuman Khandual } 781*b593b90dSShixin Liu #else /* !CONFIG_TRANSPARENT_HUGEPAGE */ 78205289402SAnshuman Khandual static void __init pmd_soft_dirty_tests(unsigned long pfn, pgprot_t prot) { } 78305289402SAnshuman Khandual static void __init pmd_swap_soft_dirty_tests(unsigned long pfn, pgprot_t prot) 78405289402SAnshuman Khandual { 78505289402SAnshuman Khandual } 786*b593b90dSShixin Liu #endif /* CONFIG_TRANSPARENT_HUGEPAGE */ 78705289402SAnshuman Khandual 78805289402SAnshuman Khandual static void __init pte_swap_tests(unsigned long pfn, pgprot_t prot) 78905289402SAnshuman Khandual { 79005289402SAnshuman Khandual swp_entry_t swp; 79105289402SAnshuman Khandual pte_t pte; 79205289402SAnshuman Khandual 7936315df41SAnshuman Khandual pr_debug("Validating PTE swap\n"); 79405289402SAnshuman Khandual pte = pfn_pte(pfn, prot); 79505289402SAnshuman Khandual swp = __pte_to_swp_entry(pte); 79605289402SAnshuman Khandual pte = __swp_entry_to_pte(swp); 79705289402SAnshuman Khandual WARN_ON(pfn != pte_pfn(pte)); 79805289402SAnshuman Khandual } 79905289402SAnshuman Khandual 80005289402SAnshuman Khandual #ifdef CONFIG_ARCH_ENABLE_THP_MIGRATION 80105289402SAnshuman Khandual static void __init pmd_swap_tests(unsigned long pfn, pgprot_t prot) 80205289402SAnshuman Khandual { 80305289402SAnshuman Khandual swp_entry_t swp; 80405289402SAnshuman Khandual pmd_t pmd; 80505289402SAnshuman Khandual 80665ac1a60SAnshuman Khandual if (!has_transparent_hugepage()) 80765ac1a60SAnshuman Khandual return; 80865ac1a60SAnshuman Khandual 8096315df41SAnshuman Khandual pr_debug("Validating PMD swap\n"); 81005289402SAnshuman Khandual pmd = pfn_pmd(pfn, prot); 81105289402SAnshuman Khandual swp = __pmd_to_swp_entry(pmd); 81205289402SAnshuman Khandual pmd = __swp_entry_to_pmd(swp); 81305289402SAnshuman Khandual WARN_ON(pfn != pmd_pfn(pmd)); 81405289402SAnshuman Khandual } 81505289402SAnshuman Khandual #else /* !CONFIG_ARCH_ENABLE_THP_MIGRATION */ 81605289402SAnshuman Khandual static void __init pmd_swap_tests(unsigned long pfn, pgprot_t prot) { } 81705289402SAnshuman Khandual #endif /* CONFIG_ARCH_ENABLE_THP_MIGRATION */ 81805289402SAnshuman Khandual 81905289402SAnshuman Khandual static void __init swap_migration_tests(void) 82005289402SAnshuman Khandual { 82105289402SAnshuman Khandual struct page *page; 82205289402SAnshuman Khandual swp_entry_t swp; 82305289402SAnshuman Khandual 82405289402SAnshuman Khandual if (!IS_ENABLED(CONFIG_MIGRATION)) 82505289402SAnshuman Khandual return; 8266315df41SAnshuman Khandual 8276315df41SAnshuman Khandual pr_debug("Validating swap migration\n"); 82805289402SAnshuman Khandual /* 82905289402SAnshuman Khandual * swap_migration_tests() requires a dedicated page as it needs to 83005289402SAnshuman Khandual * be locked before creating a migration entry from it. Locking the 83105289402SAnshuman Khandual * page that actually maps kernel text ('start_kernel') can be real 83205289402SAnshuman Khandual * problematic. Lets allocate a dedicated page explicitly for this 83305289402SAnshuman Khandual * purpose that will be freed subsequently. 83405289402SAnshuman Khandual */ 83505289402SAnshuman Khandual page = alloc_page(GFP_KERNEL); 83605289402SAnshuman Khandual if (!page) { 83705289402SAnshuman Khandual pr_err("page allocation failed\n"); 83805289402SAnshuman Khandual return; 83905289402SAnshuman Khandual } 84005289402SAnshuman Khandual 84105289402SAnshuman Khandual /* 84205289402SAnshuman Khandual * make_migration_entry() expects given page to be 84305289402SAnshuman Khandual * locked, otherwise it stumbles upon a BUG_ON(). 84405289402SAnshuman Khandual */ 84505289402SAnshuman Khandual __SetPageLocked(page); 84605289402SAnshuman Khandual swp = make_migration_entry(page, 1); 84705289402SAnshuman Khandual WARN_ON(!is_migration_entry(swp)); 84805289402SAnshuman Khandual WARN_ON(!is_write_migration_entry(swp)); 84905289402SAnshuman Khandual 85005289402SAnshuman Khandual make_migration_entry_read(&swp); 85105289402SAnshuman Khandual WARN_ON(!is_migration_entry(swp)); 85205289402SAnshuman Khandual WARN_ON(is_write_migration_entry(swp)); 85305289402SAnshuman Khandual 85405289402SAnshuman Khandual swp = make_migration_entry(page, 0); 85505289402SAnshuman Khandual WARN_ON(!is_migration_entry(swp)); 85605289402SAnshuman Khandual WARN_ON(is_write_migration_entry(swp)); 85705289402SAnshuman Khandual __ClearPageLocked(page); 85805289402SAnshuman Khandual __free_page(page); 85905289402SAnshuman Khandual } 86005289402SAnshuman Khandual 86105289402SAnshuman Khandual #ifdef CONFIG_HUGETLB_PAGE 86205289402SAnshuman Khandual static void __init hugetlb_basic_tests(unsigned long pfn, pgprot_t prot) 86305289402SAnshuman Khandual { 86405289402SAnshuman Khandual struct page *page; 86505289402SAnshuman Khandual pte_t pte; 86605289402SAnshuman Khandual 8676315df41SAnshuman Khandual pr_debug("Validating HugeTLB basic\n"); 86805289402SAnshuman Khandual /* 86905289402SAnshuman Khandual * Accessing the page associated with the pfn is safe here, 87005289402SAnshuman Khandual * as it was previously derived from a real kernel symbol. 87105289402SAnshuman Khandual */ 87205289402SAnshuman Khandual page = pfn_to_page(pfn); 87305289402SAnshuman Khandual pte = mk_huge_pte(page, prot); 87405289402SAnshuman Khandual 87505289402SAnshuman Khandual WARN_ON(!huge_pte_dirty(huge_pte_mkdirty(pte))); 87605289402SAnshuman Khandual WARN_ON(!huge_pte_write(huge_pte_mkwrite(huge_pte_wrprotect(pte)))); 87705289402SAnshuman Khandual WARN_ON(huge_pte_write(huge_pte_wrprotect(huge_pte_mkwrite(pte)))); 87805289402SAnshuman Khandual 87905289402SAnshuman Khandual #ifdef CONFIG_ARCH_WANT_GENERAL_HUGETLB 88005289402SAnshuman Khandual pte = pfn_pte(pfn, prot); 88105289402SAnshuman Khandual 88205289402SAnshuman Khandual WARN_ON(!pte_huge(pte_mkhuge(pte))); 88305289402SAnshuman Khandual #endif /* CONFIG_ARCH_WANT_GENERAL_HUGETLB */ 88405289402SAnshuman Khandual } 88505289402SAnshuman Khandual #else /* !CONFIG_HUGETLB_PAGE */ 88605289402SAnshuman Khandual static void __init hugetlb_basic_tests(unsigned long pfn, pgprot_t prot) { } 88705289402SAnshuman Khandual #endif /* CONFIG_HUGETLB_PAGE */ 88805289402SAnshuman Khandual 88905289402SAnshuman Khandual #ifdef CONFIG_TRANSPARENT_HUGEPAGE 89005289402SAnshuman Khandual static void __init pmd_thp_tests(unsigned long pfn, pgprot_t prot) 89105289402SAnshuman Khandual { 89205289402SAnshuman Khandual pmd_t pmd; 89305289402SAnshuman Khandual 89405289402SAnshuman Khandual if (!has_transparent_hugepage()) 89505289402SAnshuman Khandual return; 89605289402SAnshuman Khandual 8976315df41SAnshuman Khandual pr_debug("Validating PMD based THP\n"); 89805289402SAnshuman Khandual /* 89905289402SAnshuman Khandual * pmd_trans_huge() and pmd_present() must return positive after 90005289402SAnshuman Khandual * MMU invalidation with pmd_mkinvalid(). This behavior is an 90105289402SAnshuman Khandual * optimization for transparent huge page. pmd_trans_huge() must 90205289402SAnshuman Khandual * be true if pmd_page() returns a valid THP to avoid taking the 90305289402SAnshuman Khandual * pmd_lock when others walk over non transhuge pmds (i.e. there 90405289402SAnshuman Khandual * are no THP allocated). Especially when splitting a THP and 90505289402SAnshuman Khandual * removing the present bit from the pmd, pmd_trans_huge() still 90605289402SAnshuman Khandual * needs to return true. pmd_present() should be true whenever 90705289402SAnshuman Khandual * pmd_trans_huge() returns true. 90805289402SAnshuman Khandual */ 90905289402SAnshuman Khandual pmd = pfn_pmd(pfn, prot); 91005289402SAnshuman Khandual WARN_ON(!pmd_trans_huge(pmd_mkhuge(pmd))); 91105289402SAnshuman Khandual 91205289402SAnshuman Khandual #ifndef __HAVE_ARCH_PMDP_INVALIDATE 91305289402SAnshuman Khandual WARN_ON(!pmd_trans_huge(pmd_mkinvalid(pmd_mkhuge(pmd)))); 91405289402SAnshuman Khandual WARN_ON(!pmd_present(pmd_mkinvalid(pmd_mkhuge(pmd)))); 91505289402SAnshuman Khandual #endif /* __HAVE_ARCH_PMDP_INVALIDATE */ 91605289402SAnshuman Khandual } 91705289402SAnshuman Khandual 91805289402SAnshuman Khandual #ifdef CONFIG_HAVE_ARCH_TRANSPARENT_HUGEPAGE_PUD 91905289402SAnshuman Khandual static void __init pud_thp_tests(unsigned long pfn, pgprot_t prot) 92005289402SAnshuman Khandual { 92105289402SAnshuman Khandual pud_t pud; 92205289402SAnshuman Khandual 92305289402SAnshuman Khandual if (!has_transparent_hugepage()) 92405289402SAnshuman Khandual return; 92505289402SAnshuman Khandual 9266315df41SAnshuman Khandual pr_debug("Validating PUD based THP\n"); 92705289402SAnshuman Khandual pud = pfn_pud(pfn, prot); 92805289402SAnshuman Khandual WARN_ON(!pud_trans_huge(pud_mkhuge(pud))); 92905289402SAnshuman Khandual 93005289402SAnshuman Khandual /* 93105289402SAnshuman Khandual * pud_mkinvalid() has been dropped for now. Enable back 93205289402SAnshuman Khandual * these tests when it comes back with a modified pud_present(). 93305289402SAnshuman Khandual * 93405289402SAnshuman Khandual * WARN_ON(!pud_trans_huge(pud_mkinvalid(pud_mkhuge(pud)))); 93505289402SAnshuman Khandual * WARN_ON(!pud_present(pud_mkinvalid(pud_mkhuge(pud)))); 93605289402SAnshuman Khandual */ 93705289402SAnshuman Khandual } 93805289402SAnshuman Khandual #else /* !CONFIG_HAVE_ARCH_TRANSPARENT_HUGEPAGE_PUD */ 93905289402SAnshuman Khandual static void __init pud_thp_tests(unsigned long pfn, pgprot_t prot) { } 94005289402SAnshuman Khandual #endif /* CONFIG_HAVE_ARCH_TRANSPARENT_HUGEPAGE_PUD */ 94105289402SAnshuman Khandual #else /* !CONFIG_TRANSPARENT_HUGEPAGE */ 94205289402SAnshuman Khandual static void __init pmd_thp_tests(unsigned long pfn, pgprot_t prot) { } 94305289402SAnshuman Khandual static void __init pud_thp_tests(unsigned long pfn, pgprot_t prot) { } 94405289402SAnshuman Khandual #endif /* CONFIG_TRANSPARENT_HUGEPAGE */ 94505289402SAnshuman Khandual 946399145f9SAnshuman Khandual static unsigned long __init get_random_vaddr(void) 947399145f9SAnshuman Khandual { 948399145f9SAnshuman Khandual unsigned long random_vaddr, random_pages, total_user_pages; 949399145f9SAnshuman Khandual 950399145f9SAnshuman Khandual total_user_pages = (TASK_SIZE - FIRST_USER_ADDRESS) / PAGE_SIZE; 951399145f9SAnshuman Khandual 952399145f9SAnshuman Khandual random_pages = get_random_long() % total_user_pages; 953399145f9SAnshuman Khandual random_vaddr = FIRST_USER_ADDRESS + random_pages * PAGE_SIZE; 954399145f9SAnshuman Khandual 955399145f9SAnshuman Khandual return random_vaddr; 956399145f9SAnshuman Khandual } 957399145f9SAnshuman Khandual 958399145f9SAnshuman Khandual static int __init debug_vm_pgtable(void) 959399145f9SAnshuman Khandual { 960a5c3b9ffSAnshuman Khandual struct vm_area_struct *vma; 961399145f9SAnshuman Khandual struct mm_struct *mm; 962399145f9SAnshuman Khandual pgd_t *pgdp; 963399145f9SAnshuman Khandual p4d_t *p4dp, *saved_p4dp; 964399145f9SAnshuman Khandual pud_t *pudp, *saved_pudp; 965399145f9SAnshuman Khandual pmd_t *pmdp, *saved_pmdp, pmd; 966399145f9SAnshuman Khandual pte_t *ptep; 967399145f9SAnshuman Khandual pgtable_t saved_ptep; 96805289402SAnshuman Khandual pgprot_t prot, protnone; 969399145f9SAnshuman Khandual phys_addr_t paddr; 970399145f9SAnshuman Khandual unsigned long vaddr, pte_aligned, pmd_aligned; 971399145f9SAnshuman Khandual unsigned long pud_aligned, p4d_aligned, pgd_aligned; 972fea1120cSKees Cook spinlock_t *ptl = NULL; 9732e326c07SAnshuman Khandual int idx; 974399145f9SAnshuman Khandual 975399145f9SAnshuman Khandual pr_info("Validating architecture page table helpers\n"); 976399145f9SAnshuman Khandual prot = vm_get_page_prot(VMFLAGS); 977399145f9SAnshuman Khandual vaddr = get_random_vaddr(); 978399145f9SAnshuman Khandual mm = mm_alloc(); 979399145f9SAnshuman Khandual if (!mm) { 980399145f9SAnshuman Khandual pr_err("mm_struct allocation failed\n"); 981399145f9SAnshuman Khandual return 1; 982399145f9SAnshuman Khandual } 983399145f9SAnshuman Khandual 984399145f9SAnshuman Khandual /* 98505289402SAnshuman Khandual * __P000 (or even __S000) will help create page table entries with 98605289402SAnshuman Khandual * PROT_NONE permission as required for pxx_protnone_tests(). 98705289402SAnshuman Khandual */ 98805289402SAnshuman Khandual protnone = __P000; 98905289402SAnshuman Khandual 990a5c3b9ffSAnshuman Khandual vma = vm_area_alloc(mm); 991a5c3b9ffSAnshuman Khandual if (!vma) { 992a5c3b9ffSAnshuman Khandual pr_err("vma allocation failed\n"); 993a5c3b9ffSAnshuman Khandual return 1; 994a5c3b9ffSAnshuman Khandual } 995a5c3b9ffSAnshuman Khandual 99605289402SAnshuman Khandual /* 997399145f9SAnshuman Khandual * PFN for mapping at PTE level is determined from a standard kernel 998399145f9SAnshuman Khandual * text symbol. But pfns for higher page table levels are derived by 999399145f9SAnshuman Khandual * masking lower bits of this real pfn. These derived pfns might not 1000399145f9SAnshuman Khandual * exist on the platform but that does not really matter as pfn_pxx() 1001399145f9SAnshuman Khandual * helpers will still create appropriate entries for the test. This 1002399145f9SAnshuman Khandual * helps avoid large memory block allocations to be used for mapping 1003399145f9SAnshuman Khandual * at higher page table levels. 1004399145f9SAnshuman Khandual */ 1005399145f9SAnshuman Khandual paddr = __pa_symbol(&start_kernel); 1006399145f9SAnshuman Khandual 1007399145f9SAnshuman Khandual pte_aligned = (paddr & PAGE_MASK) >> PAGE_SHIFT; 1008399145f9SAnshuman Khandual pmd_aligned = (paddr & PMD_MASK) >> PAGE_SHIFT; 1009399145f9SAnshuman Khandual pud_aligned = (paddr & PUD_MASK) >> PAGE_SHIFT; 1010399145f9SAnshuman Khandual p4d_aligned = (paddr & P4D_MASK) >> PAGE_SHIFT; 1011399145f9SAnshuman Khandual pgd_aligned = (paddr & PGDIR_MASK) >> PAGE_SHIFT; 1012399145f9SAnshuman Khandual WARN_ON(!pfn_valid(pte_aligned)); 1013399145f9SAnshuman Khandual 1014399145f9SAnshuman Khandual pgdp = pgd_offset(mm, vaddr); 1015399145f9SAnshuman Khandual p4dp = p4d_alloc(mm, pgdp, vaddr); 1016399145f9SAnshuman Khandual pudp = pud_alloc(mm, p4dp, vaddr); 1017399145f9SAnshuman Khandual pmdp = pmd_alloc(mm, pudp, vaddr); 1018f14312e1SAneesh Kumar K.V /* 1019f14312e1SAneesh Kumar K.V * Allocate pgtable_t 1020f14312e1SAneesh Kumar K.V */ 1021f14312e1SAneesh Kumar K.V if (pte_alloc(mm, pmdp)) { 1022f14312e1SAneesh Kumar K.V pr_err("pgtable allocation failed\n"); 1023f14312e1SAneesh Kumar K.V return 1; 1024f14312e1SAneesh Kumar K.V } 1025399145f9SAnshuman Khandual 1026399145f9SAnshuman Khandual /* 1027399145f9SAnshuman Khandual * Save all the page table page addresses as the page table 1028399145f9SAnshuman Khandual * entries will be used for testing with random or garbage 1029399145f9SAnshuman Khandual * values. These saved addresses will be used for freeing 1030399145f9SAnshuman Khandual * page table pages. 1031399145f9SAnshuman Khandual */ 1032399145f9SAnshuman Khandual pmd = READ_ONCE(*pmdp); 1033399145f9SAnshuman Khandual saved_p4dp = p4d_offset(pgdp, 0UL); 1034399145f9SAnshuman Khandual saved_pudp = pud_offset(p4dp, 0UL); 1035399145f9SAnshuman Khandual saved_pmdp = pmd_offset(pudp, 0UL); 1036399145f9SAnshuman Khandual saved_ptep = pmd_pgtable(pmd); 1037399145f9SAnshuman Khandual 10382e326c07SAnshuman Khandual /* 10392e326c07SAnshuman Khandual * Iterate over the protection_map[] to make sure that all 10402e326c07SAnshuman Khandual * the basic page table transformation validations just hold 10412e326c07SAnshuman Khandual * true irrespective of the starting protection value for a 10422e326c07SAnshuman Khandual * given page table entry. 10432e326c07SAnshuman Khandual */ 10442e326c07SAnshuman Khandual for (idx = 0; idx < ARRAY_SIZE(protection_map); idx++) { 10452e326c07SAnshuman Khandual pte_basic_tests(pte_aligned, idx); 10462e326c07SAnshuman Khandual pmd_basic_tests(pmd_aligned, idx); 10472e326c07SAnshuman Khandual pud_basic_tests(mm, pud_aligned, idx); 10482e326c07SAnshuman Khandual } 10492e326c07SAnshuman Khandual 10502e326c07SAnshuman Khandual /* 10512e326c07SAnshuman Khandual * Both P4D and PGD level tests are very basic which do not 10522e326c07SAnshuman Khandual * involve creating page table entries from the protection 10532e326c07SAnshuman Khandual * value and the given pfn. Hence just keep them out from 10542e326c07SAnshuman Khandual * the above iteration for now to save some test execution 10552e326c07SAnshuman Khandual * time. 10562e326c07SAnshuman Khandual */ 1057399145f9SAnshuman Khandual p4d_basic_tests(p4d_aligned, prot); 1058399145f9SAnshuman Khandual pgd_basic_tests(pgd_aligned, prot); 1059399145f9SAnshuman Khandual 1060a5c3b9ffSAnshuman Khandual pmd_leaf_tests(pmd_aligned, prot); 1061a5c3b9ffSAnshuman Khandual pud_leaf_tests(pud_aligned, prot); 1062a5c3b9ffSAnshuman Khandual 10634200605bSAneesh Kumar K.V pte_savedwrite_tests(pte_aligned, protnone); 10644200605bSAneesh Kumar K.V pmd_savedwrite_tests(pmd_aligned, protnone); 1065a5c3b9ffSAnshuman Khandual 106605289402SAnshuman Khandual pte_special_tests(pte_aligned, prot); 106705289402SAnshuman Khandual pte_protnone_tests(pte_aligned, protnone); 106805289402SAnshuman Khandual pmd_protnone_tests(pmd_aligned, protnone); 106905289402SAnshuman Khandual 107005289402SAnshuman Khandual pte_devmap_tests(pte_aligned, prot); 107105289402SAnshuman Khandual pmd_devmap_tests(pmd_aligned, prot); 107205289402SAnshuman Khandual pud_devmap_tests(pud_aligned, prot); 107305289402SAnshuman Khandual 107405289402SAnshuman Khandual pte_soft_dirty_tests(pte_aligned, prot); 107505289402SAnshuman Khandual pmd_soft_dirty_tests(pmd_aligned, prot); 107605289402SAnshuman Khandual pte_swap_soft_dirty_tests(pte_aligned, prot); 107705289402SAnshuman Khandual pmd_swap_soft_dirty_tests(pmd_aligned, prot); 107805289402SAnshuman Khandual 107905289402SAnshuman Khandual pte_swap_tests(pte_aligned, prot); 108005289402SAnshuman Khandual pmd_swap_tests(pmd_aligned, prot); 108105289402SAnshuman Khandual 108205289402SAnshuman Khandual swap_migration_tests(); 108305289402SAnshuman Khandual 108405289402SAnshuman Khandual pmd_thp_tests(pmd_aligned, prot); 108505289402SAnshuman Khandual pud_thp_tests(pud_aligned, prot); 108605289402SAnshuman Khandual 1087e8edf0adSAneesh Kumar K.V hugetlb_basic_tests(pte_aligned, prot); 1088e8edf0adSAneesh Kumar K.V 10896f302e27SAneesh Kumar K.V /* 10906f302e27SAneesh Kumar K.V * Page table modifying tests. They need to hold 10916f302e27SAneesh Kumar K.V * proper page table lock. 10926f302e27SAneesh Kumar K.V */ 1093e8edf0adSAneesh Kumar K.V 1094f14312e1SAneesh Kumar K.V ptep = pte_offset_map_lock(mm, pmdp, vaddr, &ptl); 1095401035d5SAneesh Kumar K.V pte_clear_tests(mm, ptep, pte_aligned, vaddr, prot); 1096e8edf0adSAneesh Kumar K.V pte_advanced_tests(mm, vma, ptep, pte_aligned, vaddr, prot); 1097e8edf0adSAneesh Kumar K.V pte_unmap_unlock(ptep, ptl); 1098e8edf0adSAneesh Kumar K.V 10996f302e27SAneesh Kumar K.V ptl = pmd_lock(mm, pmdp); 11006f302e27SAneesh Kumar K.V pmd_clear_tests(mm, pmdp); 110187f34986SAneesh Kumar K.V pmd_advanced_tests(mm, vma, pmdp, pmd_aligned, vaddr, prot, saved_ptep); 11026f302e27SAneesh Kumar K.V pmd_huge_tests(pmdp, pmd_aligned, prot); 1103e8edf0adSAneesh Kumar K.V pmd_populate_tests(mm, pmdp, saved_ptep); 11046f302e27SAneesh Kumar K.V spin_unlock(ptl); 11056f302e27SAneesh Kumar K.V 11066f302e27SAneesh Kumar K.V ptl = pud_lock(mm, pudp); 11076f302e27SAneesh Kumar K.V pud_clear_tests(mm, pudp); 11086f302e27SAneesh Kumar K.V pud_advanced_tests(mm, vma, pudp, pud_aligned, vaddr, prot); 11096f302e27SAneesh Kumar K.V pud_huge_tests(pudp, pud_aligned, prot); 1110e8edf0adSAneesh Kumar K.V pud_populate_tests(mm, pudp, saved_pmdp); 11116f302e27SAneesh Kumar K.V spin_unlock(ptl); 11126f302e27SAneesh Kumar K.V 11136f302e27SAneesh Kumar K.V spin_lock(&mm->page_table_lock); 11146f302e27SAneesh Kumar K.V p4d_clear_tests(mm, p4dp); 11156f302e27SAneesh Kumar K.V pgd_clear_tests(mm, pgdp); 1116e8edf0adSAneesh Kumar K.V p4d_populate_tests(mm, p4dp, saved_pudp); 1117e8edf0adSAneesh Kumar K.V pgd_populate_tests(mm, pgdp, saved_p4dp); 11186f302e27SAneesh Kumar K.V spin_unlock(&mm->page_table_lock); 1119e8edf0adSAneesh Kumar K.V 1120399145f9SAnshuman Khandual p4d_free(mm, saved_p4dp); 1121399145f9SAnshuman Khandual pud_free(mm, saved_pudp); 1122399145f9SAnshuman Khandual pmd_free(mm, saved_pmdp); 1123399145f9SAnshuman Khandual pte_free(mm, saved_ptep); 1124399145f9SAnshuman Khandual 1125a5c3b9ffSAnshuman Khandual vm_area_free(vma); 1126399145f9SAnshuman Khandual mm_dec_nr_puds(mm); 1127399145f9SAnshuman Khandual mm_dec_nr_pmds(mm); 1128399145f9SAnshuman Khandual mm_dec_nr_ptes(mm); 1129399145f9SAnshuman Khandual mmdrop(mm); 1130399145f9SAnshuman Khandual return 0; 1131399145f9SAnshuman Khandual } 1132399145f9SAnshuman Khandual late_initcall(debug_vm_pgtable); 1133