xref: /openbmc/linux/mm/debug_vm_pgtable.c (revision b593b90dc9768d4873b8b7c60be2c69d8f5c180e)
1399145f9SAnshuman Khandual // SPDX-License-Identifier: GPL-2.0-only
2399145f9SAnshuman Khandual /*
3399145f9SAnshuman Khandual  * This kernel test validates architecture page table helpers and
4399145f9SAnshuman Khandual  * accessors and helps in verifying their continued compliance with
5399145f9SAnshuman Khandual  * expected generic MM semantics.
6399145f9SAnshuman Khandual  *
7399145f9SAnshuman Khandual  * Copyright (C) 2019 ARM Ltd.
8399145f9SAnshuman Khandual  *
9399145f9SAnshuman Khandual  * Author: Anshuman Khandual <anshuman.khandual@arm.com>
10399145f9SAnshuman Khandual  */
116315df41SAnshuman Khandual #define pr_fmt(fmt) "debug_vm_pgtable: [%-25s]: " fmt, __func__
12399145f9SAnshuman Khandual 
13399145f9SAnshuman Khandual #include <linux/gfp.h>
14399145f9SAnshuman Khandual #include <linux/highmem.h>
15399145f9SAnshuman Khandual #include <linux/hugetlb.h>
16399145f9SAnshuman Khandual #include <linux/kernel.h>
17399145f9SAnshuman Khandual #include <linux/kconfig.h>
18399145f9SAnshuman Khandual #include <linux/mm.h>
19399145f9SAnshuman Khandual #include <linux/mman.h>
20399145f9SAnshuman Khandual #include <linux/mm_types.h>
21399145f9SAnshuman Khandual #include <linux/module.h>
22399145f9SAnshuman Khandual #include <linux/pfn_t.h>
23399145f9SAnshuman Khandual #include <linux/printk.h>
24a5c3b9ffSAnshuman Khandual #include <linux/pgtable.h>
25399145f9SAnshuman Khandual #include <linux/random.h>
26399145f9SAnshuman Khandual #include <linux/spinlock.h>
27399145f9SAnshuman Khandual #include <linux/swap.h>
28399145f9SAnshuman Khandual #include <linux/swapops.h>
29399145f9SAnshuman Khandual #include <linux/start_kernel.h>
30399145f9SAnshuman Khandual #include <linux/sched/mm.h>
3185a14463SAneesh Kumar K.V #include <linux/io.h>
32399145f9SAnshuman Khandual #include <asm/pgalloc.h>
33a5c3b9ffSAnshuman Khandual #include <asm/tlbflush.h>
34399145f9SAnshuman Khandual 
35b1d00007SAnshuman Khandual /*
36b1d00007SAnshuman Khandual  * Please refer Documentation/vm/arch_pgtable_helpers.rst for the semantics
37b1d00007SAnshuman Khandual  * expectations that are being validated here. All future changes in here
38b1d00007SAnshuman Khandual  * or the documentation need to be in sync.
39b1d00007SAnshuman Khandual  */
40b1d00007SAnshuman Khandual 
41399145f9SAnshuman Khandual #define VMFLAGS	(VM_READ|VM_WRITE|VM_EXEC)
42399145f9SAnshuman Khandual 
43399145f9SAnshuman Khandual /*
44399145f9SAnshuman Khandual  * On s390 platform, the lower 4 bits are used to identify given page table
45399145f9SAnshuman Khandual  * entry type. But these bits might affect the ability to clear entries with
46399145f9SAnshuman Khandual  * pxx_clear() because of how dynamic page table folding works on s390. So
47399145f9SAnshuman Khandual  * while loading up the entries do not change the lower 4 bits. It does not
48cfc5bbc4SAneesh Kumar K.V  * have affect any other platform. Also avoid the 62nd bit on ppc64 that is
49cfc5bbc4SAneesh Kumar K.V  * used to mark a pte entry.
50399145f9SAnshuman Khandual  */
51cfc5bbc4SAneesh Kumar K.V #define S390_SKIP_MASK		GENMASK(3, 0)
52cfc5bbc4SAneesh Kumar K.V #if __BITS_PER_LONG == 64
53cfc5bbc4SAneesh Kumar K.V #define PPC64_SKIP_MASK		GENMASK(62, 62)
54cfc5bbc4SAneesh Kumar K.V #else
55cfc5bbc4SAneesh Kumar K.V #define PPC64_SKIP_MASK		0x0
56cfc5bbc4SAneesh Kumar K.V #endif
57cfc5bbc4SAneesh Kumar K.V #define ARCH_SKIP_MASK (S390_SKIP_MASK | PPC64_SKIP_MASK)
58cfc5bbc4SAneesh Kumar K.V #define RANDOM_ORVALUE (GENMASK(BITS_PER_LONG - 1, 0) & ~ARCH_SKIP_MASK)
59399145f9SAnshuman Khandual #define RANDOM_NZVALUE	GENMASK(7, 0)
60399145f9SAnshuman Khandual 
612e326c07SAnshuman Khandual static void __init pte_basic_tests(unsigned long pfn, int idx)
62399145f9SAnshuman Khandual {
632e326c07SAnshuman Khandual 	pgprot_t prot = protection_map[idx];
64399145f9SAnshuman Khandual 	pte_t pte = pfn_pte(pfn, prot);
652e326c07SAnshuman Khandual 	unsigned long val = idx, *ptr = &val;
66399145f9SAnshuman Khandual 
672e326c07SAnshuman Khandual 	pr_debug("Validating PTE basic (%pGv)\n", ptr);
68bb5c47ceSAnshuman Khandual 
69bb5c47ceSAnshuman Khandual 	/*
70bb5c47ceSAnshuman Khandual 	 * This test needs to be executed after the given page table entry
71bb5c47ceSAnshuman Khandual 	 * is created with pfn_pte() to make sure that protection_map[idx]
72bb5c47ceSAnshuman Khandual 	 * does not have the dirty bit enabled from the beginning. This is
73bb5c47ceSAnshuman Khandual 	 * important for platforms like arm64 where (!PTE_RDONLY) indicate
74bb5c47ceSAnshuman Khandual 	 * dirty bit being set.
75bb5c47ceSAnshuman Khandual 	 */
76bb5c47ceSAnshuman Khandual 	WARN_ON(pte_dirty(pte_wrprotect(pte)));
77bb5c47ceSAnshuman Khandual 
78399145f9SAnshuman Khandual 	WARN_ON(!pte_same(pte, pte));
79399145f9SAnshuman Khandual 	WARN_ON(!pte_young(pte_mkyoung(pte_mkold(pte))));
80399145f9SAnshuman Khandual 	WARN_ON(!pte_dirty(pte_mkdirty(pte_mkclean(pte))));
81399145f9SAnshuman Khandual 	WARN_ON(!pte_write(pte_mkwrite(pte_wrprotect(pte))));
82399145f9SAnshuman Khandual 	WARN_ON(pte_young(pte_mkold(pte_mkyoung(pte))));
83399145f9SAnshuman Khandual 	WARN_ON(pte_dirty(pte_mkclean(pte_mkdirty(pte))));
84399145f9SAnshuman Khandual 	WARN_ON(pte_write(pte_wrprotect(pte_mkwrite(pte))));
85bb5c47ceSAnshuman Khandual 	WARN_ON(pte_dirty(pte_wrprotect(pte_mkclean(pte))));
86bb5c47ceSAnshuman Khandual 	WARN_ON(!pte_dirty(pte_wrprotect(pte_mkdirty(pte))));
87399145f9SAnshuman Khandual }
88399145f9SAnshuman Khandual 
89a5c3b9ffSAnshuman Khandual static void __init pte_advanced_tests(struct mm_struct *mm,
90a5c3b9ffSAnshuman Khandual 				      struct vm_area_struct *vma, pte_t *ptep,
91a5c3b9ffSAnshuman Khandual 				      unsigned long pfn, unsigned long vaddr,
92a5c3b9ffSAnshuman Khandual 				      pgprot_t prot)
93a5c3b9ffSAnshuman Khandual {
94*b593b90dSShixin Liu 	pte_t pte;
95a5c3b9ffSAnshuman Khandual 
96c3824e18SAneesh Kumar K.V 	/*
97c3824e18SAneesh Kumar K.V 	 * Architectures optimize set_pte_at by avoiding TLB flush.
98c3824e18SAneesh Kumar K.V 	 * This requires set_pte_at to be not used to update an
99c3824e18SAneesh Kumar K.V 	 * existing pte entry. Clear pte before we do set_pte_at
100c3824e18SAneesh Kumar K.V 	 */
101c3824e18SAneesh Kumar K.V 
1026315df41SAnshuman Khandual 	pr_debug("Validating PTE advanced\n");
103a5c3b9ffSAnshuman Khandual 	pte = pfn_pte(pfn, prot);
104a5c3b9ffSAnshuman Khandual 	set_pte_at(mm, vaddr, ptep, pte);
105a5c3b9ffSAnshuman Khandual 	ptep_set_wrprotect(mm, vaddr, ptep);
106a5c3b9ffSAnshuman Khandual 	pte = ptep_get(ptep);
107a5c3b9ffSAnshuman Khandual 	WARN_ON(pte_write(pte));
108a5c3b9ffSAnshuman Khandual 	ptep_get_and_clear(mm, vaddr, ptep);
109a5c3b9ffSAnshuman Khandual 	pte = ptep_get(ptep);
110a5c3b9ffSAnshuman Khandual 	WARN_ON(!pte_none(pte));
111a5c3b9ffSAnshuman Khandual 
112a5c3b9ffSAnshuman Khandual 	pte = pfn_pte(pfn, prot);
113a5c3b9ffSAnshuman Khandual 	pte = pte_wrprotect(pte);
114a5c3b9ffSAnshuman Khandual 	pte = pte_mkclean(pte);
115a5c3b9ffSAnshuman Khandual 	set_pte_at(mm, vaddr, ptep, pte);
116a5c3b9ffSAnshuman Khandual 	pte = pte_mkwrite(pte);
117a5c3b9ffSAnshuman Khandual 	pte = pte_mkdirty(pte);
118a5c3b9ffSAnshuman Khandual 	ptep_set_access_flags(vma, vaddr, ptep, pte, 1);
119a5c3b9ffSAnshuman Khandual 	pte = ptep_get(ptep);
120a5c3b9ffSAnshuman Khandual 	WARN_ON(!(pte_write(pte) && pte_dirty(pte)));
121a5c3b9ffSAnshuman Khandual 	ptep_get_and_clear_full(mm, vaddr, ptep, 1);
122a5c3b9ffSAnshuman Khandual 	pte = ptep_get(ptep);
123a5c3b9ffSAnshuman Khandual 	WARN_ON(!pte_none(pte));
124a5c3b9ffSAnshuman Khandual 
125c3824e18SAneesh Kumar K.V 	pte = pfn_pte(pfn, prot);
126a5c3b9ffSAnshuman Khandual 	pte = pte_mkyoung(pte);
127a5c3b9ffSAnshuman Khandual 	set_pte_at(mm, vaddr, ptep, pte);
128a5c3b9ffSAnshuman Khandual 	ptep_test_and_clear_young(vma, vaddr, ptep);
129a5c3b9ffSAnshuman Khandual 	pte = ptep_get(ptep);
130a5c3b9ffSAnshuman Khandual 	WARN_ON(pte_young(pte));
131a5c3b9ffSAnshuman Khandual }
132a5c3b9ffSAnshuman Khandual 
133a5c3b9ffSAnshuman Khandual static void __init pte_savedwrite_tests(unsigned long pfn, pgprot_t prot)
134a5c3b9ffSAnshuman Khandual {
135a5c3b9ffSAnshuman Khandual 	pte_t pte = pfn_pte(pfn, prot);
136a5c3b9ffSAnshuman Khandual 
1374200605bSAneesh Kumar K.V 	if (!IS_ENABLED(CONFIG_NUMA_BALANCING))
1384200605bSAneesh Kumar K.V 		return;
1394200605bSAneesh Kumar K.V 
1406315df41SAnshuman Khandual 	pr_debug("Validating PTE saved write\n");
141a5c3b9ffSAnshuman Khandual 	WARN_ON(!pte_savedwrite(pte_mk_savedwrite(pte_clear_savedwrite(pte))));
142a5c3b9ffSAnshuman Khandual 	WARN_ON(pte_savedwrite(pte_clear_savedwrite(pte_mk_savedwrite(pte))));
143a5c3b9ffSAnshuman Khandual }
1444200605bSAneesh Kumar K.V 
145399145f9SAnshuman Khandual #ifdef CONFIG_TRANSPARENT_HUGEPAGE
1462e326c07SAnshuman Khandual static void __init pmd_basic_tests(unsigned long pfn, int idx)
147399145f9SAnshuman Khandual {
1482e326c07SAnshuman Khandual 	pgprot_t prot = protection_map[idx];
1492e326c07SAnshuman Khandual 	unsigned long val = idx, *ptr = &val;
15065ac1a60SAnshuman Khandual 	pmd_t pmd;
151399145f9SAnshuman Khandual 
152787d563bSAneesh Kumar K.V 	if (!has_transparent_hugepage())
153787d563bSAneesh Kumar K.V 		return;
154787d563bSAneesh Kumar K.V 
1552e326c07SAnshuman Khandual 	pr_debug("Validating PMD basic (%pGv)\n", ptr);
15665ac1a60SAnshuman Khandual 	pmd = pfn_pmd(pfn, prot);
157bb5c47ceSAnshuman Khandual 
158bb5c47ceSAnshuman Khandual 	/*
159bb5c47ceSAnshuman Khandual 	 * This test needs to be executed after the given page table entry
160bb5c47ceSAnshuman Khandual 	 * is created with pfn_pmd() to make sure that protection_map[idx]
161bb5c47ceSAnshuman Khandual 	 * does not have the dirty bit enabled from the beginning. This is
162bb5c47ceSAnshuman Khandual 	 * important for platforms like arm64 where (!PTE_RDONLY) indicate
163bb5c47ceSAnshuman Khandual 	 * dirty bit being set.
164bb5c47ceSAnshuman Khandual 	 */
165bb5c47ceSAnshuman Khandual 	WARN_ON(pmd_dirty(pmd_wrprotect(pmd)));
166bb5c47ceSAnshuman Khandual 
167bb5c47ceSAnshuman Khandual 
168399145f9SAnshuman Khandual 	WARN_ON(!pmd_same(pmd, pmd));
169399145f9SAnshuman Khandual 	WARN_ON(!pmd_young(pmd_mkyoung(pmd_mkold(pmd))));
170399145f9SAnshuman Khandual 	WARN_ON(!pmd_dirty(pmd_mkdirty(pmd_mkclean(pmd))));
171399145f9SAnshuman Khandual 	WARN_ON(!pmd_write(pmd_mkwrite(pmd_wrprotect(pmd))));
172399145f9SAnshuman Khandual 	WARN_ON(pmd_young(pmd_mkold(pmd_mkyoung(pmd))));
173399145f9SAnshuman Khandual 	WARN_ON(pmd_dirty(pmd_mkclean(pmd_mkdirty(pmd))));
174399145f9SAnshuman Khandual 	WARN_ON(pmd_write(pmd_wrprotect(pmd_mkwrite(pmd))));
175bb5c47ceSAnshuman Khandual 	WARN_ON(pmd_dirty(pmd_wrprotect(pmd_mkclean(pmd))));
176bb5c47ceSAnshuman Khandual 	WARN_ON(!pmd_dirty(pmd_wrprotect(pmd_mkdirty(pmd))));
177399145f9SAnshuman Khandual 	/*
178399145f9SAnshuman Khandual 	 * A huge page does not point to next level page table
179399145f9SAnshuman Khandual 	 * entry. Hence this must qualify as pmd_bad().
180399145f9SAnshuman Khandual 	 */
181399145f9SAnshuman Khandual 	WARN_ON(!pmd_bad(pmd_mkhuge(pmd)));
182399145f9SAnshuman Khandual }
183399145f9SAnshuman Khandual 
184a5c3b9ffSAnshuman Khandual static void __init pmd_advanced_tests(struct mm_struct *mm,
185a5c3b9ffSAnshuman Khandual 				      struct vm_area_struct *vma, pmd_t *pmdp,
186a5c3b9ffSAnshuman Khandual 				      unsigned long pfn, unsigned long vaddr,
18787f34986SAneesh Kumar K.V 				      pgprot_t prot, pgtable_t pgtable)
188a5c3b9ffSAnshuman Khandual {
18965ac1a60SAnshuman Khandual 	pmd_t pmd;
190a5c3b9ffSAnshuman Khandual 
191a5c3b9ffSAnshuman Khandual 	if (!has_transparent_hugepage())
192a5c3b9ffSAnshuman Khandual 		return;
193a5c3b9ffSAnshuman Khandual 
1946315df41SAnshuman Khandual 	pr_debug("Validating PMD advanced\n");
195a5c3b9ffSAnshuman Khandual 	/* Align the address wrt HPAGE_PMD_SIZE */
19604f7ce3fSGerald Schaefer 	vaddr &= HPAGE_PMD_MASK;
197a5c3b9ffSAnshuman Khandual 
19887f34986SAneesh Kumar K.V 	pgtable_trans_huge_deposit(mm, pmdp, pgtable);
19987f34986SAneesh Kumar K.V 
200a5c3b9ffSAnshuman Khandual 	pmd = pfn_pmd(pfn, prot);
201a5c3b9ffSAnshuman Khandual 	set_pmd_at(mm, vaddr, pmdp, pmd);
202a5c3b9ffSAnshuman Khandual 	pmdp_set_wrprotect(mm, vaddr, pmdp);
203a5c3b9ffSAnshuman Khandual 	pmd = READ_ONCE(*pmdp);
204a5c3b9ffSAnshuman Khandual 	WARN_ON(pmd_write(pmd));
205a5c3b9ffSAnshuman Khandual 	pmdp_huge_get_and_clear(mm, vaddr, pmdp);
206a5c3b9ffSAnshuman Khandual 	pmd = READ_ONCE(*pmdp);
207a5c3b9ffSAnshuman Khandual 	WARN_ON(!pmd_none(pmd));
208a5c3b9ffSAnshuman Khandual 
209a5c3b9ffSAnshuman Khandual 	pmd = pfn_pmd(pfn, prot);
210a5c3b9ffSAnshuman Khandual 	pmd = pmd_wrprotect(pmd);
211a5c3b9ffSAnshuman Khandual 	pmd = pmd_mkclean(pmd);
212a5c3b9ffSAnshuman Khandual 	set_pmd_at(mm, vaddr, pmdp, pmd);
213a5c3b9ffSAnshuman Khandual 	pmd = pmd_mkwrite(pmd);
214a5c3b9ffSAnshuman Khandual 	pmd = pmd_mkdirty(pmd);
215a5c3b9ffSAnshuman Khandual 	pmdp_set_access_flags(vma, vaddr, pmdp, pmd, 1);
216a5c3b9ffSAnshuman Khandual 	pmd = READ_ONCE(*pmdp);
217a5c3b9ffSAnshuman Khandual 	WARN_ON(!(pmd_write(pmd) && pmd_dirty(pmd)));
218a5c3b9ffSAnshuman Khandual 	pmdp_huge_get_and_clear_full(vma, vaddr, pmdp, 1);
219a5c3b9ffSAnshuman Khandual 	pmd = READ_ONCE(*pmdp);
220a5c3b9ffSAnshuman Khandual 	WARN_ON(!pmd_none(pmd));
221a5c3b9ffSAnshuman Khandual 
222c3824e18SAneesh Kumar K.V 	pmd = pmd_mkhuge(pfn_pmd(pfn, prot));
223a5c3b9ffSAnshuman Khandual 	pmd = pmd_mkyoung(pmd);
224a5c3b9ffSAnshuman Khandual 	set_pmd_at(mm, vaddr, pmdp, pmd);
225a5c3b9ffSAnshuman Khandual 	pmdp_test_and_clear_young(vma, vaddr, pmdp);
226a5c3b9ffSAnshuman Khandual 	pmd = READ_ONCE(*pmdp);
227a5c3b9ffSAnshuman Khandual 	WARN_ON(pmd_young(pmd));
22887f34986SAneesh Kumar K.V 
22913af0506SAneesh Kumar K.V 	/*  Clear the pte entries  */
23013af0506SAneesh Kumar K.V 	pmdp_huge_get_and_clear(mm, vaddr, pmdp);
23187f34986SAneesh Kumar K.V 	pgtable = pgtable_trans_huge_withdraw(mm, pmdp);
232a5c3b9ffSAnshuman Khandual }
233a5c3b9ffSAnshuman Khandual 
234a5c3b9ffSAnshuman Khandual static void __init pmd_leaf_tests(unsigned long pfn, pgprot_t prot)
235a5c3b9ffSAnshuman Khandual {
23665ac1a60SAnshuman Khandual 	pmd_t pmd;
23765ac1a60SAnshuman Khandual 
23865ac1a60SAnshuman Khandual 	if (!has_transparent_hugepage())
23965ac1a60SAnshuman Khandual 		return;
240a5c3b9ffSAnshuman Khandual 
2416315df41SAnshuman Khandual 	pr_debug("Validating PMD leaf\n");
24265ac1a60SAnshuman Khandual 	pmd = pfn_pmd(pfn, prot);
24365ac1a60SAnshuman Khandual 
244a5c3b9ffSAnshuman Khandual 	/*
245a5c3b9ffSAnshuman Khandual 	 * PMD based THP is a leaf entry.
246a5c3b9ffSAnshuman Khandual 	 */
247a5c3b9ffSAnshuman Khandual 	pmd = pmd_mkhuge(pmd);
248a5c3b9ffSAnshuman Khandual 	WARN_ON(!pmd_leaf(pmd));
249a5c3b9ffSAnshuman Khandual }
250a5c3b9ffSAnshuman Khandual 
251a5c3b9ffSAnshuman Khandual static void __init pmd_savedwrite_tests(unsigned long pfn, pgprot_t prot)
252a5c3b9ffSAnshuman Khandual {
25365ac1a60SAnshuman Khandual 	pmd_t pmd;
254a5c3b9ffSAnshuman Khandual 
2554200605bSAneesh Kumar K.V 	if (!IS_ENABLED(CONFIG_NUMA_BALANCING))
2564200605bSAneesh Kumar K.V 		return;
2574200605bSAneesh Kumar K.V 
25865ac1a60SAnshuman Khandual 	if (!has_transparent_hugepage())
25965ac1a60SAnshuman Khandual 		return;
26065ac1a60SAnshuman Khandual 
2616315df41SAnshuman Khandual 	pr_debug("Validating PMD saved write\n");
26265ac1a60SAnshuman Khandual 	pmd = pfn_pmd(pfn, prot);
263a5c3b9ffSAnshuman Khandual 	WARN_ON(!pmd_savedwrite(pmd_mk_savedwrite(pmd_clear_savedwrite(pmd))));
264a5c3b9ffSAnshuman Khandual 	WARN_ON(pmd_savedwrite(pmd_clear_savedwrite(pmd_mk_savedwrite(pmd))));
265a5c3b9ffSAnshuman Khandual }
266a5c3b9ffSAnshuman Khandual 
267399145f9SAnshuman Khandual #ifdef CONFIG_HAVE_ARCH_TRANSPARENT_HUGEPAGE_PUD
2682e326c07SAnshuman Khandual static void __init pud_basic_tests(struct mm_struct *mm, unsigned long pfn, int idx)
269399145f9SAnshuman Khandual {
2702e326c07SAnshuman Khandual 	pgprot_t prot = protection_map[idx];
2712e326c07SAnshuman Khandual 	unsigned long val = idx, *ptr = &val;
27265ac1a60SAnshuman Khandual 	pud_t pud;
273399145f9SAnshuman Khandual 
274787d563bSAneesh Kumar K.V 	if (!has_transparent_hugepage())
275787d563bSAneesh Kumar K.V 		return;
276787d563bSAneesh Kumar K.V 
2772e326c07SAnshuman Khandual 	pr_debug("Validating PUD basic (%pGv)\n", ptr);
27865ac1a60SAnshuman Khandual 	pud = pfn_pud(pfn, prot);
279bb5c47ceSAnshuman Khandual 
280bb5c47ceSAnshuman Khandual 	/*
281bb5c47ceSAnshuman Khandual 	 * This test needs to be executed after the given page table entry
282bb5c47ceSAnshuman Khandual 	 * is created with pfn_pud() to make sure that protection_map[idx]
283bb5c47ceSAnshuman Khandual 	 * does not have the dirty bit enabled from the beginning. This is
284bb5c47ceSAnshuman Khandual 	 * important for platforms like arm64 where (!PTE_RDONLY) indicate
285bb5c47ceSAnshuman Khandual 	 * dirty bit being set.
286bb5c47ceSAnshuman Khandual 	 */
287bb5c47ceSAnshuman Khandual 	WARN_ON(pud_dirty(pud_wrprotect(pud)));
288bb5c47ceSAnshuman Khandual 
289399145f9SAnshuman Khandual 	WARN_ON(!pud_same(pud, pud));
290399145f9SAnshuman Khandual 	WARN_ON(!pud_young(pud_mkyoung(pud_mkold(pud))));
291bb5c47ceSAnshuman Khandual 	WARN_ON(!pud_dirty(pud_mkdirty(pud_mkclean(pud))));
292bb5c47ceSAnshuman Khandual 	WARN_ON(pud_dirty(pud_mkclean(pud_mkdirty(pud))));
293399145f9SAnshuman Khandual 	WARN_ON(!pud_write(pud_mkwrite(pud_wrprotect(pud))));
294399145f9SAnshuman Khandual 	WARN_ON(pud_write(pud_wrprotect(pud_mkwrite(pud))));
295399145f9SAnshuman Khandual 	WARN_ON(pud_young(pud_mkold(pud_mkyoung(pud))));
296bb5c47ceSAnshuman Khandual 	WARN_ON(pud_dirty(pud_wrprotect(pud_mkclean(pud))));
297bb5c47ceSAnshuman Khandual 	WARN_ON(!pud_dirty(pud_wrprotect(pud_mkdirty(pud))));
298399145f9SAnshuman Khandual 
299399145f9SAnshuman Khandual 	if (mm_pmd_folded(mm))
300399145f9SAnshuman Khandual 		return;
301399145f9SAnshuman Khandual 
302399145f9SAnshuman Khandual 	/*
303399145f9SAnshuman Khandual 	 * A huge page does not point to next level page table
304399145f9SAnshuman Khandual 	 * entry. Hence this must qualify as pud_bad().
305399145f9SAnshuman Khandual 	 */
306399145f9SAnshuman Khandual 	WARN_ON(!pud_bad(pud_mkhuge(pud)));
307399145f9SAnshuman Khandual }
308a5c3b9ffSAnshuman Khandual 
309a5c3b9ffSAnshuman Khandual static void __init pud_advanced_tests(struct mm_struct *mm,
310a5c3b9ffSAnshuman Khandual 				      struct vm_area_struct *vma, pud_t *pudp,
311a5c3b9ffSAnshuman Khandual 				      unsigned long pfn, unsigned long vaddr,
312a5c3b9ffSAnshuman Khandual 				      pgprot_t prot)
313a5c3b9ffSAnshuman Khandual {
31465ac1a60SAnshuman Khandual 	pud_t pud;
315a5c3b9ffSAnshuman Khandual 
316a5c3b9ffSAnshuman Khandual 	if (!has_transparent_hugepage())
317a5c3b9ffSAnshuman Khandual 		return;
318a5c3b9ffSAnshuman Khandual 
3196315df41SAnshuman Khandual 	pr_debug("Validating PUD advanced\n");
320a5c3b9ffSAnshuman Khandual 	/* Align the address wrt HPAGE_PUD_SIZE */
32104f7ce3fSGerald Schaefer 	vaddr &= HPAGE_PUD_MASK;
322a5c3b9ffSAnshuman Khandual 
32365ac1a60SAnshuman Khandual 	pud = pfn_pud(pfn, prot);
324a5c3b9ffSAnshuman Khandual 	set_pud_at(mm, vaddr, pudp, pud);
325a5c3b9ffSAnshuman Khandual 	pudp_set_wrprotect(mm, vaddr, pudp);
326a5c3b9ffSAnshuman Khandual 	pud = READ_ONCE(*pudp);
327a5c3b9ffSAnshuman Khandual 	WARN_ON(pud_write(pud));
328a5c3b9ffSAnshuman Khandual 
329a5c3b9ffSAnshuman Khandual #ifndef __PAGETABLE_PMD_FOLDED
330a5c3b9ffSAnshuman Khandual 	pudp_huge_get_and_clear(mm, vaddr, pudp);
331a5c3b9ffSAnshuman Khandual 	pud = READ_ONCE(*pudp);
332a5c3b9ffSAnshuman Khandual 	WARN_ON(!pud_none(pud));
333a5c3b9ffSAnshuman Khandual #endif /* __PAGETABLE_PMD_FOLDED */
334a5c3b9ffSAnshuman Khandual 	pud = pfn_pud(pfn, prot);
335a5c3b9ffSAnshuman Khandual 	pud = pud_wrprotect(pud);
336a5c3b9ffSAnshuman Khandual 	pud = pud_mkclean(pud);
337a5c3b9ffSAnshuman Khandual 	set_pud_at(mm, vaddr, pudp, pud);
338a5c3b9ffSAnshuman Khandual 	pud = pud_mkwrite(pud);
339a5c3b9ffSAnshuman Khandual 	pud = pud_mkdirty(pud);
340a5c3b9ffSAnshuman Khandual 	pudp_set_access_flags(vma, vaddr, pudp, pud, 1);
341a5c3b9ffSAnshuman Khandual 	pud = READ_ONCE(*pudp);
342a5c3b9ffSAnshuman Khandual 	WARN_ON(!(pud_write(pud) && pud_dirty(pud)));
343a5c3b9ffSAnshuman Khandual 
344c3824e18SAneesh Kumar K.V #ifndef __PAGETABLE_PMD_FOLDED
345c3824e18SAneesh Kumar K.V 	pudp_huge_get_and_clear_full(mm, vaddr, pudp, 1);
346c3824e18SAneesh Kumar K.V 	pud = READ_ONCE(*pudp);
347c3824e18SAneesh Kumar K.V 	WARN_ON(!pud_none(pud));
348c3824e18SAneesh Kumar K.V #endif /* __PAGETABLE_PMD_FOLDED */
349c3824e18SAneesh Kumar K.V 
350c3824e18SAneesh Kumar K.V 	pud = pfn_pud(pfn, prot);
351a5c3b9ffSAnshuman Khandual 	pud = pud_mkyoung(pud);
352a5c3b9ffSAnshuman Khandual 	set_pud_at(mm, vaddr, pudp, pud);
353a5c3b9ffSAnshuman Khandual 	pudp_test_and_clear_young(vma, vaddr, pudp);
354a5c3b9ffSAnshuman Khandual 	pud = READ_ONCE(*pudp);
355a5c3b9ffSAnshuman Khandual 	WARN_ON(pud_young(pud));
35613af0506SAneesh Kumar K.V 
35713af0506SAneesh Kumar K.V 	pudp_huge_get_and_clear(mm, vaddr, pudp);
358a5c3b9ffSAnshuman Khandual }
359a5c3b9ffSAnshuman Khandual 
360a5c3b9ffSAnshuman Khandual static void __init pud_leaf_tests(unsigned long pfn, pgprot_t prot)
361a5c3b9ffSAnshuman Khandual {
36265ac1a60SAnshuman Khandual 	pud_t pud;
36365ac1a60SAnshuman Khandual 
36465ac1a60SAnshuman Khandual 	if (!has_transparent_hugepage())
36565ac1a60SAnshuman Khandual 		return;
366a5c3b9ffSAnshuman Khandual 
3676315df41SAnshuman Khandual 	pr_debug("Validating PUD leaf\n");
36865ac1a60SAnshuman Khandual 	pud = pfn_pud(pfn, prot);
369a5c3b9ffSAnshuman Khandual 	/*
370a5c3b9ffSAnshuman Khandual 	 * PUD based THP is a leaf entry.
371a5c3b9ffSAnshuman Khandual 	 */
372a5c3b9ffSAnshuman Khandual 	pud = pud_mkhuge(pud);
373a5c3b9ffSAnshuman Khandual 	WARN_ON(!pud_leaf(pud));
374a5c3b9ffSAnshuman Khandual }
3755fe77be6SShixin Liu #else  /* !CONFIG_HAVE_ARCH_TRANSPARENT_HUGEPAGE_PUD */
3765fe77be6SShixin Liu static void __init pud_basic_tests(struct mm_struct *mm, unsigned long pfn, int idx) { }
3775fe77be6SShixin Liu static void __init pud_advanced_tests(struct mm_struct *mm,
3785fe77be6SShixin Liu 				      struct vm_area_struct *vma, pud_t *pudp,
3795fe77be6SShixin Liu 				      unsigned long pfn, unsigned long vaddr,
3805fe77be6SShixin Liu 				      pgprot_t prot)
3815fe77be6SShixin Liu {
3825fe77be6SShixin Liu }
3835fe77be6SShixin Liu static void __init pud_leaf_tests(unsigned long pfn, pgprot_t prot) { }
3845fe77be6SShixin Liu #endif /* CONFIG_HAVE_ARCH_TRANSPARENT_HUGEPAGE_PUD */
3855fe77be6SShixin Liu #else  /* !CONFIG_TRANSPARENT_HUGEPAGE */
3865fe77be6SShixin Liu static void __init pmd_basic_tests(unsigned long pfn, int idx) { }
3875fe77be6SShixin Liu static void __init pud_basic_tests(struct mm_struct *mm, unsigned long pfn, int idx) { }
3885fe77be6SShixin Liu static void __init pmd_advanced_tests(struct mm_struct *mm,
3895fe77be6SShixin Liu 				      struct vm_area_struct *vma, pmd_t *pmdp,
3905fe77be6SShixin Liu 				      unsigned long pfn, unsigned long vaddr,
3915fe77be6SShixin Liu 				      pgprot_t prot, pgtable_t pgtable)
3925fe77be6SShixin Liu {
3935fe77be6SShixin Liu }
3945fe77be6SShixin Liu static void __init pud_advanced_tests(struct mm_struct *mm,
3955fe77be6SShixin Liu 				      struct vm_area_struct *vma, pud_t *pudp,
3965fe77be6SShixin Liu 				      unsigned long pfn, unsigned long vaddr,
3975fe77be6SShixin Liu 				      pgprot_t prot)
3985fe77be6SShixin Liu {
3995fe77be6SShixin Liu }
4005fe77be6SShixin Liu static void __init pmd_leaf_tests(unsigned long pfn, pgprot_t prot) { }
4015fe77be6SShixin Liu static void __init pud_leaf_tests(unsigned long pfn, pgprot_t prot) { }
4025fe77be6SShixin Liu static void __init pmd_savedwrite_tests(unsigned long pfn, pgprot_t prot) { }
4035fe77be6SShixin Liu #endif /* CONFIG_TRANSPARENT_HUGEPAGE */
404a5c3b9ffSAnshuman Khandual 
40585a14463SAneesh Kumar K.V #ifdef CONFIG_HAVE_ARCH_HUGE_VMAP
4065fe77be6SShixin Liu static void __init pmd_huge_tests(pmd_t *pmdp, unsigned long pfn, pgprot_t prot)
4075fe77be6SShixin Liu {
4085fe77be6SShixin Liu 	pmd_t pmd;
4095fe77be6SShixin Liu 
4105fe77be6SShixin Liu 	if (!arch_vmap_pmd_supported(prot))
4115fe77be6SShixin Liu 		return;
4125fe77be6SShixin Liu 
4135fe77be6SShixin Liu 	pr_debug("Validating PMD huge\n");
4145fe77be6SShixin Liu 	/*
4155fe77be6SShixin Liu 	 * X86 defined pmd_set_huge() verifies that the given
4165fe77be6SShixin Liu 	 * PMD is not a populated non-leaf entry.
4175fe77be6SShixin Liu 	 */
4185fe77be6SShixin Liu 	WRITE_ONCE(*pmdp, __pmd(0));
4195fe77be6SShixin Liu 	WARN_ON(!pmd_set_huge(pmdp, __pfn_to_phys(pfn), prot));
4205fe77be6SShixin Liu 	WARN_ON(!pmd_clear_huge(pmdp));
4215fe77be6SShixin Liu 	pmd = READ_ONCE(*pmdp);
4225fe77be6SShixin Liu 	WARN_ON(!pmd_none(pmd));
4235fe77be6SShixin Liu }
4245fe77be6SShixin Liu 
425a5c3b9ffSAnshuman Khandual static void __init pud_huge_tests(pud_t *pudp, unsigned long pfn, pgprot_t prot)
426a5c3b9ffSAnshuman Khandual {
427a5c3b9ffSAnshuman Khandual 	pud_t pud;
428a5c3b9ffSAnshuman Khandual 
429bbc180a5SNicholas Piggin 	if (!arch_vmap_pud_supported(prot))
430a5c3b9ffSAnshuman Khandual 		return;
4316315df41SAnshuman Khandual 
4326315df41SAnshuman Khandual 	pr_debug("Validating PUD huge\n");
433a5c3b9ffSAnshuman Khandual 	/*
434a5c3b9ffSAnshuman Khandual 	 * X86 defined pud_set_huge() verifies that the given
435a5c3b9ffSAnshuman Khandual 	 * PUD is not a populated non-leaf entry.
436a5c3b9ffSAnshuman Khandual 	 */
437a5c3b9ffSAnshuman Khandual 	WRITE_ONCE(*pudp, __pud(0));
438a5c3b9ffSAnshuman Khandual 	WARN_ON(!pud_set_huge(pudp, __pfn_to_phys(pfn), prot));
439a5c3b9ffSAnshuman Khandual 	WARN_ON(!pud_clear_huge(pudp));
440a5c3b9ffSAnshuman Khandual 	pud = READ_ONCE(*pudp);
441a5c3b9ffSAnshuman Khandual 	WARN_ON(!pud_none(pud));
442a5c3b9ffSAnshuman Khandual }
44385a14463SAneesh Kumar K.V #else /* !CONFIG_HAVE_ARCH_HUGE_VMAP */
4445fe77be6SShixin Liu static void __init pmd_huge_tests(pmd_t *pmdp, unsigned long pfn, pgprot_t prot) { }
44585a14463SAneesh Kumar K.V static void __init pud_huge_tests(pud_t *pudp, unsigned long pfn, pgprot_t prot) { }
4465fe77be6SShixin Liu #endif /* CONFIG_HAVE_ARCH_HUGE_VMAP */
447399145f9SAnshuman Khandual 
448399145f9SAnshuman Khandual static void __init p4d_basic_tests(unsigned long pfn, pgprot_t prot)
449399145f9SAnshuman Khandual {
450399145f9SAnshuman Khandual 	p4d_t p4d;
451399145f9SAnshuman Khandual 
4526315df41SAnshuman Khandual 	pr_debug("Validating P4D basic\n");
453399145f9SAnshuman Khandual 	memset(&p4d, RANDOM_NZVALUE, sizeof(p4d_t));
454399145f9SAnshuman Khandual 	WARN_ON(!p4d_same(p4d, p4d));
455399145f9SAnshuman Khandual }
456399145f9SAnshuman Khandual 
457399145f9SAnshuman Khandual static void __init pgd_basic_tests(unsigned long pfn, pgprot_t prot)
458399145f9SAnshuman Khandual {
459399145f9SAnshuman Khandual 	pgd_t pgd;
460399145f9SAnshuman Khandual 
4616315df41SAnshuman Khandual 	pr_debug("Validating PGD basic\n");
462399145f9SAnshuman Khandual 	memset(&pgd, RANDOM_NZVALUE, sizeof(pgd_t));
463399145f9SAnshuman Khandual 	WARN_ON(!pgd_same(pgd, pgd));
464399145f9SAnshuman Khandual }
465399145f9SAnshuman Khandual 
466399145f9SAnshuman Khandual #ifndef __PAGETABLE_PUD_FOLDED
467399145f9SAnshuman Khandual static void __init pud_clear_tests(struct mm_struct *mm, pud_t *pudp)
468399145f9SAnshuman Khandual {
469399145f9SAnshuman Khandual 	pud_t pud = READ_ONCE(*pudp);
470399145f9SAnshuman Khandual 
471399145f9SAnshuman Khandual 	if (mm_pmd_folded(mm))
472399145f9SAnshuman Khandual 		return;
473399145f9SAnshuman Khandual 
4746315df41SAnshuman Khandual 	pr_debug("Validating PUD clear\n");
475399145f9SAnshuman Khandual 	pud = __pud(pud_val(pud) | RANDOM_ORVALUE);
476399145f9SAnshuman Khandual 	WRITE_ONCE(*pudp, pud);
477399145f9SAnshuman Khandual 	pud_clear(pudp);
478399145f9SAnshuman Khandual 	pud = READ_ONCE(*pudp);
479399145f9SAnshuman Khandual 	WARN_ON(!pud_none(pud));
480399145f9SAnshuman Khandual }
481399145f9SAnshuman Khandual 
482399145f9SAnshuman Khandual static void __init pud_populate_tests(struct mm_struct *mm, pud_t *pudp,
483399145f9SAnshuman Khandual 				      pmd_t *pmdp)
484399145f9SAnshuman Khandual {
485399145f9SAnshuman Khandual 	pud_t pud;
486399145f9SAnshuman Khandual 
487399145f9SAnshuman Khandual 	if (mm_pmd_folded(mm))
488399145f9SAnshuman Khandual 		return;
4896315df41SAnshuman Khandual 
4906315df41SAnshuman Khandual 	pr_debug("Validating PUD populate\n");
491399145f9SAnshuman Khandual 	/*
492399145f9SAnshuman Khandual 	 * This entry points to next level page table page.
493399145f9SAnshuman Khandual 	 * Hence this must not qualify as pud_bad().
494399145f9SAnshuman Khandual 	 */
495399145f9SAnshuman Khandual 	pud_populate(mm, pudp, pmdp);
496399145f9SAnshuman Khandual 	pud = READ_ONCE(*pudp);
497399145f9SAnshuman Khandual 	WARN_ON(pud_bad(pud));
498399145f9SAnshuman Khandual }
499399145f9SAnshuman Khandual #else  /* !__PAGETABLE_PUD_FOLDED */
500399145f9SAnshuman Khandual static void __init pud_clear_tests(struct mm_struct *mm, pud_t *pudp) { }
501399145f9SAnshuman Khandual static void __init pud_populate_tests(struct mm_struct *mm, pud_t *pudp,
502399145f9SAnshuman Khandual 				      pmd_t *pmdp)
503399145f9SAnshuman Khandual {
504399145f9SAnshuman Khandual }
505399145f9SAnshuman Khandual #endif /* PAGETABLE_PUD_FOLDED */
506399145f9SAnshuman Khandual 
507399145f9SAnshuman Khandual #ifndef __PAGETABLE_P4D_FOLDED
508399145f9SAnshuman Khandual static void __init p4d_clear_tests(struct mm_struct *mm, p4d_t *p4dp)
509399145f9SAnshuman Khandual {
510399145f9SAnshuman Khandual 	p4d_t p4d = READ_ONCE(*p4dp);
511399145f9SAnshuman Khandual 
512399145f9SAnshuman Khandual 	if (mm_pud_folded(mm))
513399145f9SAnshuman Khandual 		return;
514399145f9SAnshuman Khandual 
5156315df41SAnshuman Khandual 	pr_debug("Validating P4D clear\n");
516399145f9SAnshuman Khandual 	p4d = __p4d(p4d_val(p4d) | RANDOM_ORVALUE);
517399145f9SAnshuman Khandual 	WRITE_ONCE(*p4dp, p4d);
518399145f9SAnshuman Khandual 	p4d_clear(p4dp);
519399145f9SAnshuman Khandual 	p4d = READ_ONCE(*p4dp);
520399145f9SAnshuman Khandual 	WARN_ON(!p4d_none(p4d));
521399145f9SAnshuman Khandual }
522399145f9SAnshuman Khandual 
523399145f9SAnshuman Khandual static void __init p4d_populate_tests(struct mm_struct *mm, p4d_t *p4dp,
524399145f9SAnshuman Khandual 				      pud_t *pudp)
525399145f9SAnshuman Khandual {
526399145f9SAnshuman Khandual 	p4d_t p4d;
527399145f9SAnshuman Khandual 
528399145f9SAnshuman Khandual 	if (mm_pud_folded(mm))
529399145f9SAnshuman Khandual 		return;
530399145f9SAnshuman Khandual 
5316315df41SAnshuman Khandual 	pr_debug("Validating P4D populate\n");
532399145f9SAnshuman Khandual 	/*
533399145f9SAnshuman Khandual 	 * This entry points to next level page table page.
534399145f9SAnshuman Khandual 	 * Hence this must not qualify as p4d_bad().
535399145f9SAnshuman Khandual 	 */
536399145f9SAnshuman Khandual 	pud_clear(pudp);
537399145f9SAnshuman Khandual 	p4d_clear(p4dp);
538399145f9SAnshuman Khandual 	p4d_populate(mm, p4dp, pudp);
539399145f9SAnshuman Khandual 	p4d = READ_ONCE(*p4dp);
540399145f9SAnshuman Khandual 	WARN_ON(p4d_bad(p4d));
541399145f9SAnshuman Khandual }
542399145f9SAnshuman Khandual 
543399145f9SAnshuman Khandual static void __init pgd_clear_tests(struct mm_struct *mm, pgd_t *pgdp)
544399145f9SAnshuman Khandual {
545399145f9SAnshuman Khandual 	pgd_t pgd = READ_ONCE(*pgdp);
546399145f9SAnshuman Khandual 
547399145f9SAnshuman Khandual 	if (mm_p4d_folded(mm))
548399145f9SAnshuman Khandual 		return;
549399145f9SAnshuman Khandual 
5506315df41SAnshuman Khandual 	pr_debug("Validating PGD clear\n");
551399145f9SAnshuman Khandual 	pgd = __pgd(pgd_val(pgd) | RANDOM_ORVALUE);
552399145f9SAnshuman Khandual 	WRITE_ONCE(*pgdp, pgd);
553399145f9SAnshuman Khandual 	pgd_clear(pgdp);
554399145f9SAnshuman Khandual 	pgd = READ_ONCE(*pgdp);
555399145f9SAnshuman Khandual 	WARN_ON(!pgd_none(pgd));
556399145f9SAnshuman Khandual }
557399145f9SAnshuman Khandual 
558399145f9SAnshuman Khandual static void __init pgd_populate_tests(struct mm_struct *mm, pgd_t *pgdp,
559399145f9SAnshuman Khandual 				      p4d_t *p4dp)
560399145f9SAnshuman Khandual {
561399145f9SAnshuman Khandual 	pgd_t pgd;
562399145f9SAnshuman Khandual 
563399145f9SAnshuman Khandual 	if (mm_p4d_folded(mm))
564399145f9SAnshuman Khandual 		return;
565399145f9SAnshuman Khandual 
5666315df41SAnshuman Khandual 	pr_debug("Validating PGD populate\n");
567399145f9SAnshuman Khandual 	/*
568399145f9SAnshuman Khandual 	 * This entry points to next level page table page.
569399145f9SAnshuman Khandual 	 * Hence this must not qualify as pgd_bad().
570399145f9SAnshuman Khandual 	 */
571399145f9SAnshuman Khandual 	p4d_clear(p4dp);
572399145f9SAnshuman Khandual 	pgd_clear(pgdp);
573399145f9SAnshuman Khandual 	pgd_populate(mm, pgdp, p4dp);
574399145f9SAnshuman Khandual 	pgd = READ_ONCE(*pgdp);
575399145f9SAnshuman Khandual 	WARN_ON(pgd_bad(pgd));
576399145f9SAnshuman Khandual }
577399145f9SAnshuman Khandual #else  /* !__PAGETABLE_P4D_FOLDED */
578399145f9SAnshuman Khandual static void __init p4d_clear_tests(struct mm_struct *mm, p4d_t *p4dp) { }
579399145f9SAnshuman Khandual static void __init pgd_clear_tests(struct mm_struct *mm, pgd_t *pgdp) { }
580399145f9SAnshuman Khandual static void __init p4d_populate_tests(struct mm_struct *mm, p4d_t *p4dp,
581399145f9SAnshuman Khandual 				      pud_t *pudp)
582399145f9SAnshuman Khandual {
583399145f9SAnshuman Khandual }
584399145f9SAnshuman Khandual static void __init pgd_populate_tests(struct mm_struct *mm, pgd_t *pgdp,
585399145f9SAnshuman Khandual 				      p4d_t *p4dp)
586399145f9SAnshuman Khandual {
587399145f9SAnshuman Khandual }
588399145f9SAnshuman Khandual #endif /* PAGETABLE_P4D_FOLDED */
589399145f9SAnshuman Khandual 
590399145f9SAnshuman Khandual static void __init pte_clear_tests(struct mm_struct *mm, pte_t *ptep,
591401035d5SAneesh Kumar K.V 				   unsigned long pfn, unsigned long vaddr,
592401035d5SAneesh Kumar K.V 				   pgprot_t prot)
593399145f9SAnshuman Khandual {
594401035d5SAneesh Kumar K.V 	pte_t pte = pfn_pte(pfn, prot);
595399145f9SAnshuman Khandual 
5966315df41SAnshuman Khandual 	pr_debug("Validating PTE clear\n");
597401035d5SAneesh Kumar K.V #ifndef CONFIG_RISCV
598399145f9SAnshuman Khandual 	pte = __pte(pte_val(pte) | RANDOM_ORVALUE);
599401035d5SAneesh Kumar K.V #endif
600399145f9SAnshuman Khandual 	set_pte_at(mm, vaddr, ptep, pte);
601399145f9SAnshuman Khandual 	barrier();
602399145f9SAnshuman Khandual 	pte_clear(mm, vaddr, ptep);
6039449c9cbSChristophe Leroy 	pte = ptep_get(ptep);
604399145f9SAnshuman Khandual 	WARN_ON(!pte_none(pte));
605399145f9SAnshuman Khandual }
606399145f9SAnshuman Khandual 
607399145f9SAnshuman Khandual static void __init pmd_clear_tests(struct mm_struct *mm, pmd_t *pmdp)
608399145f9SAnshuman Khandual {
609399145f9SAnshuman Khandual 	pmd_t pmd = READ_ONCE(*pmdp);
610399145f9SAnshuman Khandual 
6116315df41SAnshuman Khandual 	pr_debug("Validating PMD clear\n");
612399145f9SAnshuman Khandual 	pmd = __pmd(pmd_val(pmd) | RANDOM_ORVALUE);
613399145f9SAnshuman Khandual 	WRITE_ONCE(*pmdp, pmd);
614399145f9SAnshuman Khandual 	pmd_clear(pmdp);
615399145f9SAnshuman Khandual 	pmd = READ_ONCE(*pmdp);
616399145f9SAnshuman Khandual 	WARN_ON(!pmd_none(pmd));
617399145f9SAnshuman Khandual }
618399145f9SAnshuman Khandual 
619399145f9SAnshuman Khandual static void __init pmd_populate_tests(struct mm_struct *mm, pmd_t *pmdp,
620399145f9SAnshuman Khandual 				      pgtable_t pgtable)
621399145f9SAnshuman Khandual {
622399145f9SAnshuman Khandual 	pmd_t pmd;
623399145f9SAnshuman Khandual 
6246315df41SAnshuman Khandual 	pr_debug("Validating PMD populate\n");
625399145f9SAnshuman Khandual 	/*
626399145f9SAnshuman Khandual 	 * This entry points to next level page table page.
627399145f9SAnshuman Khandual 	 * Hence this must not qualify as pmd_bad().
628399145f9SAnshuman Khandual 	 */
629399145f9SAnshuman Khandual 	pmd_populate(mm, pmdp, pgtable);
630399145f9SAnshuman Khandual 	pmd = READ_ONCE(*pmdp);
631399145f9SAnshuman Khandual 	WARN_ON(pmd_bad(pmd));
632399145f9SAnshuman Khandual }
633399145f9SAnshuman Khandual 
63405289402SAnshuman Khandual static void __init pte_special_tests(unsigned long pfn, pgprot_t prot)
63505289402SAnshuman Khandual {
63605289402SAnshuman Khandual 	pte_t pte = pfn_pte(pfn, prot);
63705289402SAnshuman Khandual 
63805289402SAnshuman Khandual 	if (!IS_ENABLED(CONFIG_ARCH_HAS_PTE_SPECIAL))
63905289402SAnshuman Khandual 		return;
64005289402SAnshuman Khandual 
6416315df41SAnshuman Khandual 	pr_debug("Validating PTE special\n");
64205289402SAnshuman Khandual 	WARN_ON(!pte_special(pte_mkspecial(pte)));
64305289402SAnshuman Khandual }
64405289402SAnshuman Khandual 
64505289402SAnshuman Khandual static void __init pte_protnone_tests(unsigned long pfn, pgprot_t prot)
64605289402SAnshuman Khandual {
64705289402SAnshuman Khandual 	pte_t pte = pfn_pte(pfn, prot);
64805289402SAnshuman Khandual 
64905289402SAnshuman Khandual 	if (!IS_ENABLED(CONFIG_NUMA_BALANCING))
65005289402SAnshuman Khandual 		return;
65105289402SAnshuman Khandual 
6526315df41SAnshuman Khandual 	pr_debug("Validating PTE protnone\n");
65305289402SAnshuman Khandual 	WARN_ON(!pte_protnone(pte));
65405289402SAnshuman Khandual 	WARN_ON(!pte_present(pte));
65505289402SAnshuman Khandual }
65605289402SAnshuman Khandual 
65705289402SAnshuman Khandual #ifdef CONFIG_TRANSPARENT_HUGEPAGE
65805289402SAnshuman Khandual static void __init pmd_protnone_tests(unsigned long pfn, pgprot_t prot)
65905289402SAnshuman Khandual {
66065ac1a60SAnshuman Khandual 	pmd_t pmd;
66105289402SAnshuman Khandual 
66205289402SAnshuman Khandual 	if (!IS_ENABLED(CONFIG_NUMA_BALANCING))
66305289402SAnshuman Khandual 		return;
66405289402SAnshuman Khandual 
66565ac1a60SAnshuman Khandual 	if (!has_transparent_hugepage())
66665ac1a60SAnshuman Khandual 		return;
66765ac1a60SAnshuman Khandual 
6686315df41SAnshuman Khandual 	pr_debug("Validating PMD protnone\n");
66965ac1a60SAnshuman Khandual 	pmd = pmd_mkhuge(pfn_pmd(pfn, prot));
67005289402SAnshuman Khandual 	WARN_ON(!pmd_protnone(pmd));
67105289402SAnshuman Khandual 	WARN_ON(!pmd_present(pmd));
67205289402SAnshuman Khandual }
67305289402SAnshuman Khandual #else  /* !CONFIG_TRANSPARENT_HUGEPAGE */
67405289402SAnshuman Khandual static void __init pmd_protnone_tests(unsigned long pfn, pgprot_t prot) { }
67505289402SAnshuman Khandual #endif /* CONFIG_TRANSPARENT_HUGEPAGE */
67605289402SAnshuman Khandual 
67705289402SAnshuman Khandual #ifdef CONFIG_ARCH_HAS_PTE_DEVMAP
67805289402SAnshuman Khandual static void __init pte_devmap_tests(unsigned long pfn, pgprot_t prot)
67905289402SAnshuman Khandual {
68005289402SAnshuman Khandual 	pte_t pte = pfn_pte(pfn, prot);
68105289402SAnshuman Khandual 
6826315df41SAnshuman Khandual 	pr_debug("Validating PTE devmap\n");
68305289402SAnshuman Khandual 	WARN_ON(!pte_devmap(pte_mkdevmap(pte)));
68405289402SAnshuman Khandual }
68505289402SAnshuman Khandual 
68605289402SAnshuman Khandual #ifdef CONFIG_TRANSPARENT_HUGEPAGE
68705289402SAnshuman Khandual static void __init pmd_devmap_tests(unsigned long pfn, pgprot_t prot)
68805289402SAnshuman Khandual {
68965ac1a60SAnshuman Khandual 	pmd_t pmd;
69065ac1a60SAnshuman Khandual 
69165ac1a60SAnshuman Khandual 	if (!has_transparent_hugepage())
69265ac1a60SAnshuman Khandual 		return;
69305289402SAnshuman Khandual 
6946315df41SAnshuman Khandual 	pr_debug("Validating PMD devmap\n");
69565ac1a60SAnshuman Khandual 	pmd = pfn_pmd(pfn, prot);
69605289402SAnshuman Khandual 	WARN_ON(!pmd_devmap(pmd_mkdevmap(pmd)));
69705289402SAnshuman Khandual }
69805289402SAnshuman Khandual 
69905289402SAnshuman Khandual #ifdef CONFIG_HAVE_ARCH_TRANSPARENT_HUGEPAGE_PUD
70005289402SAnshuman Khandual static void __init pud_devmap_tests(unsigned long pfn, pgprot_t prot)
70105289402SAnshuman Khandual {
70265ac1a60SAnshuman Khandual 	pud_t pud;
70365ac1a60SAnshuman Khandual 
70465ac1a60SAnshuman Khandual 	if (!has_transparent_hugepage())
70565ac1a60SAnshuman Khandual 		return;
70605289402SAnshuman Khandual 
7076315df41SAnshuman Khandual 	pr_debug("Validating PUD devmap\n");
70865ac1a60SAnshuman Khandual 	pud = pfn_pud(pfn, prot);
70905289402SAnshuman Khandual 	WARN_ON(!pud_devmap(pud_mkdevmap(pud)));
71005289402SAnshuman Khandual }
71105289402SAnshuman Khandual #else  /* !CONFIG_HAVE_ARCH_TRANSPARENT_HUGEPAGE_PUD */
71205289402SAnshuman Khandual static void __init pud_devmap_tests(unsigned long pfn, pgprot_t prot) { }
71305289402SAnshuman Khandual #endif /* CONFIG_HAVE_ARCH_TRANSPARENT_HUGEPAGE_PUD */
71405289402SAnshuman Khandual #else  /* CONFIG_TRANSPARENT_HUGEPAGE */
71505289402SAnshuman Khandual static void __init pmd_devmap_tests(unsigned long pfn, pgprot_t prot) { }
71605289402SAnshuman Khandual static void __init pud_devmap_tests(unsigned long pfn, pgprot_t prot) { }
71705289402SAnshuman Khandual #endif /* CONFIG_TRANSPARENT_HUGEPAGE */
71805289402SAnshuman Khandual #else
71905289402SAnshuman Khandual static void __init pte_devmap_tests(unsigned long pfn, pgprot_t prot) { }
72005289402SAnshuman Khandual static void __init pmd_devmap_tests(unsigned long pfn, pgprot_t prot) { }
72105289402SAnshuman Khandual static void __init pud_devmap_tests(unsigned long pfn, pgprot_t prot) { }
72205289402SAnshuman Khandual #endif /* CONFIG_ARCH_HAS_PTE_DEVMAP */
72305289402SAnshuman Khandual 
72405289402SAnshuman Khandual static void __init pte_soft_dirty_tests(unsigned long pfn, pgprot_t prot)
72505289402SAnshuman Khandual {
72605289402SAnshuman Khandual 	pte_t pte = pfn_pte(pfn, prot);
72705289402SAnshuman Khandual 
72805289402SAnshuman Khandual 	if (!IS_ENABLED(CONFIG_MEM_SOFT_DIRTY))
72905289402SAnshuman Khandual 		return;
73005289402SAnshuman Khandual 
7316315df41SAnshuman Khandual 	pr_debug("Validating PTE soft dirty\n");
73205289402SAnshuman Khandual 	WARN_ON(!pte_soft_dirty(pte_mksoft_dirty(pte)));
73305289402SAnshuman Khandual 	WARN_ON(pte_soft_dirty(pte_clear_soft_dirty(pte)));
73405289402SAnshuman Khandual }
73505289402SAnshuman Khandual 
73605289402SAnshuman Khandual static void __init pte_swap_soft_dirty_tests(unsigned long pfn, pgprot_t prot)
73705289402SAnshuman Khandual {
73805289402SAnshuman Khandual 	pte_t pte = pfn_pte(pfn, prot);
73905289402SAnshuman Khandual 
74005289402SAnshuman Khandual 	if (!IS_ENABLED(CONFIG_MEM_SOFT_DIRTY))
74105289402SAnshuman Khandual 		return;
74205289402SAnshuman Khandual 
7436315df41SAnshuman Khandual 	pr_debug("Validating PTE swap soft dirty\n");
74405289402SAnshuman Khandual 	WARN_ON(!pte_swp_soft_dirty(pte_swp_mksoft_dirty(pte)));
74505289402SAnshuman Khandual 	WARN_ON(pte_swp_soft_dirty(pte_swp_clear_soft_dirty(pte)));
74605289402SAnshuman Khandual }
74705289402SAnshuman Khandual 
74805289402SAnshuman Khandual #ifdef CONFIG_TRANSPARENT_HUGEPAGE
74905289402SAnshuman Khandual static void __init pmd_soft_dirty_tests(unsigned long pfn, pgprot_t prot)
75005289402SAnshuman Khandual {
75165ac1a60SAnshuman Khandual 	pmd_t pmd;
75205289402SAnshuman Khandual 
75305289402SAnshuman Khandual 	if (!IS_ENABLED(CONFIG_MEM_SOFT_DIRTY))
75405289402SAnshuman Khandual 		return;
75505289402SAnshuman Khandual 
75665ac1a60SAnshuman Khandual 	if (!has_transparent_hugepage())
75765ac1a60SAnshuman Khandual 		return;
75865ac1a60SAnshuman Khandual 
7596315df41SAnshuman Khandual 	pr_debug("Validating PMD soft dirty\n");
76065ac1a60SAnshuman Khandual 	pmd = pfn_pmd(pfn, prot);
76105289402SAnshuman Khandual 	WARN_ON(!pmd_soft_dirty(pmd_mksoft_dirty(pmd)));
76205289402SAnshuman Khandual 	WARN_ON(pmd_soft_dirty(pmd_clear_soft_dirty(pmd)));
76305289402SAnshuman Khandual }
76405289402SAnshuman Khandual 
76505289402SAnshuman Khandual static void __init pmd_swap_soft_dirty_tests(unsigned long pfn, pgprot_t prot)
76605289402SAnshuman Khandual {
76765ac1a60SAnshuman Khandual 	pmd_t pmd;
76805289402SAnshuman Khandual 
76905289402SAnshuman Khandual 	if (!IS_ENABLED(CONFIG_MEM_SOFT_DIRTY) ||
77005289402SAnshuman Khandual 		!IS_ENABLED(CONFIG_ARCH_ENABLE_THP_MIGRATION))
77105289402SAnshuman Khandual 		return;
77205289402SAnshuman Khandual 
77365ac1a60SAnshuman Khandual 	if (!has_transparent_hugepage())
77465ac1a60SAnshuman Khandual 		return;
77565ac1a60SAnshuman Khandual 
7766315df41SAnshuman Khandual 	pr_debug("Validating PMD swap soft dirty\n");
77765ac1a60SAnshuman Khandual 	pmd = pfn_pmd(pfn, prot);
77805289402SAnshuman Khandual 	WARN_ON(!pmd_swp_soft_dirty(pmd_swp_mksoft_dirty(pmd)));
77905289402SAnshuman Khandual 	WARN_ON(pmd_swp_soft_dirty(pmd_swp_clear_soft_dirty(pmd)));
78005289402SAnshuman Khandual }
781*b593b90dSShixin Liu #else  /* !CONFIG_TRANSPARENT_HUGEPAGE */
78205289402SAnshuman Khandual static void __init pmd_soft_dirty_tests(unsigned long pfn, pgprot_t prot) { }
78305289402SAnshuman Khandual static void __init pmd_swap_soft_dirty_tests(unsigned long pfn, pgprot_t prot)
78405289402SAnshuman Khandual {
78505289402SAnshuman Khandual }
786*b593b90dSShixin Liu #endif /* CONFIG_TRANSPARENT_HUGEPAGE */
78705289402SAnshuman Khandual 
78805289402SAnshuman Khandual static void __init pte_swap_tests(unsigned long pfn, pgprot_t prot)
78905289402SAnshuman Khandual {
79005289402SAnshuman Khandual 	swp_entry_t swp;
79105289402SAnshuman Khandual 	pte_t pte;
79205289402SAnshuman Khandual 
7936315df41SAnshuman Khandual 	pr_debug("Validating PTE swap\n");
79405289402SAnshuman Khandual 	pte = pfn_pte(pfn, prot);
79505289402SAnshuman Khandual 	swp = __pte_to_swp_entry(pte);
79605289402SAnshuman Khandual 	pte = __swp_entry_to_pte(swp);
79705289402SAnshuman Khandual 	WARN_ON(pfn != pte_pfn(pte));
79805289402SAnshuman Khandual }
79905289402SAnshuman Khandual 
80005289402SAnshuman Khandual #ifdef CONFIG_ARCH_ENABLE_THP_MIGRATION
80105289402SAnshuman Khandual static void __init pmd_swap_tests(unsigned long pfn, pgprot_t prot)
80205289402SAnshuman Khandual {
80305289402SAnshuman Khandual 	swp_entry_t swp;
80405289402SAnshuman Khandual 	pmd_t pmd;
80505289402SAnshuman Khandual 
80665ac1a60SAnshuman Khandual 	if (!has_transparent_hugepage())
80765ac1a60SAnshuman Khandual 		return;
80865ac1a60SAnshuman Khandual 
8096315df41SAnshuman Khandual 	pr_debug("Validating PMD swap\n");
81005289402SAnshuman Khandual 	pmd = pfn_pmd(pfn, prot);
81105289402SAnshuman Khandual 	swp = __pmd_to_swp_entry(pmd);
81205289402SAnshuman Khandual 	pmd = __swp_entry_to_pmd(swp);
81305289402SAnshuman Khandual 	WARN_ON(pfn != pmd_pfn(pmd));
81405289402SAnshuman Khandual }
81505289402SAnshuman Khandual #else  /* !CONFIG_ARCH_ENABLE_THP_MIGRATION */
81605289402SAnshuman Khandual static void __init pmd_swap_tests(unsigned long pfn, pgprot_t prot) { }
81705289402SAnshuman Khandual #endif /* CONFIG_ARCH_ENABLE_THP_MIGRATION */
81805289402SAnshuman Khandual 
81905289402SAnshuman Khandual static void __init swap_migration_tests(void)
82005289402SAnshuman Khandual {
82105289402SAnshuman Khandual 	struct page *page;
82205289402SAnshuman Khandual 	swp_entry_t swp;
82305289402SAnshuman Khandual 
82405289402SAnshuman Khandual 	if (!IS_ENABLED(CONFIG_MIGRATION))
82505289402SAnshuman Khandual 		return;
8266315df41SAnshuman Khandual 
8276315df41SAnshuman Khandual 	pr_debug("Validating swap migration\n");
82805289402SAnshuman Khandual 	/*
82905289402SAnshuman Khandual 	 * swap_migration_tests() requires a dedicated page as it needs to
83005289402SAnshuman Khandual 	 * be locked before creating a migration entry from it. Locking the
83105289402SAnshuman Khandual 	 * page that actually maps kernel text ('start_kernel') can be real
83205289402SAnshuman Khandual 	 * problematic. Lets allocate a dedicated page explicitly for this
83305289402SAnshuman Khandual 	 * purpose that will be freed subsequently.
83405289402SAnshuman Khandual 	 */
83505289402SAnshuman Khandual 	page = alloc_page(GFP_KERNEL);
83605289402SAnshuman Khandual 	if (!page) {
83705289402SAnshuman Khandual 		pr_err("page allocation failed\n");
83805289402SAnshuman Khandual 		return;
83905289402SAnshuman Khandual 	}
84005289402SAnshuman Khandual 
84105289402SAnshuman Khandual 	/*
84205289402SAnshuman Khandual 	 * make_migration_entry() expects given page to be
84305289402SAnshuman Khandual 	 * locked, otherwise it stumbles upon a BUG_ON().
84405289402SAnshuman Khandual 	 */
84505289402SAnshuman Khandual 	__SetPageLocked(page);
84605289402SAnshuman Khandual 	swp = make_migration_entry(page, 1);
84705289402SAnshuman Khandual 	WARN_ON(!is_migration_entry(swp));
84805289402SAnshuman Khandual 	WARN_ON(!is_write_migration_entry(swp));
84905289402SAnshuman Khandual 
85005289402SAnshuman Khandual 	make_migration_entry_read(&swp);
85105289402SAnshuman Khandual 	WARN_ON(!is_migration_entry(swp));
85205289402SAnshuman Khandual 	WARN_ON(is_write_migration_entry(swp));
85305289402SAnshuman Khandual 
85405289402SAnshuman Khandual 	swp = make_migration_entry(page, 0);
85505289402SAnshuman Khandual 	WARN_ON(!is_migration_entry(swp));
85605289402SAnshuman Khandual 	WARN_ON(is_write_migration_entry(swp));
85705289402SAnshuman Khandual 	__ClearPageLocked(page);
85805289402SAnshuman Khandual 	__free_page(page);
85905289402SAnshuman Khandual }
86005289402SAnshuman Khandual 
86105289402SAnshuman Khandual #ifdef CONFIG_HUGETLB_PAGE
86205289402SAnshuman Khandual static void __init hugetlb_basic_tests(unsigned long pfn, pgprot_t prot)
86305289402SAnshuman Khandual {
86405289402SAnshuman Khandual 	struct page *page;
86505289402SAnshuman Khandual 	pte_t pte;
86605289402SAnshuman Khandual 
8676315df41SAnshuman Khandual 	pr_debug("Validating HugeTLB basic\n");
86805289402SAnshuman Khandual 	/*
86905289402SAnshuman Khandual 	 * Accessing the page associated with the pfn is safe here,
87005289402SAnshuman Khandual 	 * as it was previously derived from a real kernel symbol.
87105289402SAnshuman Khandual 	 */
87205289402SAnshuman Khandual 	page = pfn_to_page(pfn);
87305289402SAnshuman Khandual 	pte = mk_huge_pte(page, prot);
87405289402SAnshuman Khandual 
87505289402SAnshuman Khandual 	WARN_ON(!huge_pte_dirty(huge_pte_mkdirty(pte)));
87605289402SAnshuman Khandual 	WARN_ON(!huge_pte_write(huge_pte_mkwrite(huge_pte_wrprotect(pte))));
87705289402SAnshuman Khandual 	WARN_ON(huge_pte_write(huge_pte_wrprotect(huge_pte_mkwrite(pte))));
87805289402SAnshuman Khandual 
87905289402SAnshuman Khandual #ifdef CONFIG_ARCH_WANT_GENERAL_HUGETLB
88005289402SAnshuman Khandual 	pte = pfn_pte(pfn, prot);
88105289402SAnshuman Khandual 
88205289402SAnshuman Khandual 	WARN_ON(!pte_huge(pte_mkhuge(pte)));
88305289402SAnshuman Khandual #endif /* CONFIG_ARCH_WANT_GENERAL_HUGETLB */
88405289402SAnshuman Khandual }
88505289402SAnshuman Khandual #else  /* !CONFIG_HUGETLB_PAGE */
88605289402SAnshuman Khandual static void __init hugetlb_basic_tests(unsigned long pfn, pgprot_t prot) { }
88705289402SAnshuman Khandual #endif /* CONFIG_HUGETLB_PAGE */
88805289402SAnshuman Khandual 
88905289402SAnshuman Khandual #ifdef CONFIG_TRANSPARENT_HUGEPAGE
89005289402SAnshuman Khandual static void __init pmd_thp_tests(unsigned long pfn, pgprot_t prot)
89105289402SAnshuman Khandual {
89205289402SAnshuman Khandual 	pmd_t pmd;
89305289402SAnshuman Khandual 
89405289402SAnshuman Khandual 	if (!has_transparent_hugepage())
89505289402SAnshuman Khandual 		return;
89605289402SAnshuman Khandual 
8976315df41SAnshuman Khandual 	pr_debug("Validating PMD based THP\n");
89805289402SAnshuman Khandual 	/*
89905289402SAnshuman Khandual 	 * pmd_trans_huge() and pmd_present() must return positive after
90005289402SAnshuman Khandual 	 * MMU invalidation with pmd_mkinvalid(). This behavior is an
90105289402SAnshuman Khandual 	 * optimization for transparent huge page. pmd_trans_huge() must
90205289402SAnshuman Khandual 	 * be true if pmd_page() returns a valid THP to avoid taking the
90305289402SAnshuman Khandual 	 * pmd_lock when others walk over non transhuge pmds (i.e. there
90405289402SAnshuman Khandual 	 * are no THP allocated). Especially when splitting a THP and
90505289402SAnshuman Khandual 	 * removing the present bit from the pmd, pmd_trans_huge() still
90605289402SAnshuman Khandual 	 * needs to return true. pmd_present() should be true whenever
90705289402SAnshuman Khandual 	 * pmd_trans_huge() returns true.
90805289402SAnshuman Khandual 	 */
90905289402SAnshuman Khandual 	pmd = pfn_pmd(pfn, prot);
91005289402SAnshuman Khandual 	WARN_ON(!pmd_trans_huge(pmd_mkhuge(pmd)));
91105289402SAnshuman Khandual 
91205289402SAnshuman Khandual #ifndef __HAVE_ARCH_PMDP_INVALIDATE
91305289402SAnshuman Khandual 	WARN_ON(!pmd_trans_huge(pmd_mkinvalid(pmd_mkhuge(pmd))));
91405289402SAnshuman Khandual 	WARN_ON(!pmd_present(pmd_mkinvalid(pmd_mkhuge(pmd))));
91505289402SAnshuman Khandual #endif /* __HAVE_ARCH_PMDP_INVALIDATE */
91605289402SAnshuman Khandual }
91705289402SAnshuman Khandual 
91805289402SAnshuman Khandual #ifdef CONFIG_HAVE_ARCH_TRANSPARENT_HUGEPAGE_PUD
91905289402SAnshuman Khandual static void __init pud_thp_tests(unsigned long pfn, pgprot_t prot)
92005289402SAnshuman Khandual {
92105289402SAnshuman Khandual 	pud_t pud;
92205289402SAnshuman Khandual 
92305289402SAnshuman Khandual 	if (!has_transparent_hugepage())
92405289402SAnshuman Khandual 		return;
92505289402SAnshuman Khandual 
9266315df41SAnshuman Khandual 	pr_debug("Validating PUD based THP\n");
92705289402SAnshuman Khandual 	pud = pfn_pud(pfn, prot);
92805289402SAnshuman Khandual 	WARN_ON(!pud_trans_huge(pud_mkhuge(pud)));
92905289402SAnshuman Khandual 
93005289402SAnshuman Khandual 	/*
93105289402SAnshuman Khandual 	 * pud_mkinvalid() has been dropped for now. Enable back
93205289402SAnshuman Khandual 	 * these tests when it comes back with a modified pud_present().
93305289402SAnshuman Khandual 	 *
93405289402SAnshuman Khandual 	 * WARN_ON(!pud_trans_huge(pud_mkinvalid(pud_mkhuge(pud))));
93505289402SAnshuman Khandual 	 * WARN_ON(!pud_present(pud_mkinvalid(pud_mkhuge(pud))));
93605289402SAnshuman Khandual 	 */
93705289402SAnshuman Khandual }
93805289402SAnshuman Khandual #else  /* !CONFIG_HAVE_ARCH_TRANSPARENT_HUGEPAGE_PUD */
93905289402SAnshuman Khandual static void __init pud_thp_tests(unsigned long pfn, pgprot_t prot) { }
94005289402SAnshuman Khandual #endif /* CONFIG_HAVE_ARCH_TRANSPARENT_HUGEPAGE_PUD */
94105289402SAnshuman Khandual #else  /* !CONFIG_TRANSPARENT_HUGEPAGE */
94205289402SAnshuman Khandual static void __init pmd_thp_tests(unsigned long pfn, pgprot_t prot) { }
94305289402SAnshuman Khandual static void __init pud_thp_tests(unsigned long pfn, pgprot_t prot) { }
94405289402SAnshuman Khandual #endif /* CONFIG_TRANSPARENT_HUGEPAGE */
94505289402SAnshuman Khandual 
946399145f9SAnshuman Khandual static unsigned long __init get_random_vaddr(void)
947399145f9SAnshuman Khandual {
948399145f9SAnshuman Khandual 	unsigned long random_vaddr, random_pages, total_user_pages;
949399145f9SAnshuman Khandual 
950399145f9SAnshuman Khandual 	total_user_pages = (TASK_SIZE - FIRST_USER_ADDRESS) / PAGE_SIZE;
951399145f9SAnshuman Khandual 
952399145f9SAnshuman Khandual 	random_pages = get_random_long() % total_user_pages;
953399145f9SAnshuman Khandual 	random_vaddr = FIRST_USER_ADDRESS + random_pages * PAGE_SIZE;
954399145f9SAnshuman Khandual 
955399145f9SAnshuman Khandual 	return random_vaddr;
956399145f9SAnshuman Khandual }
957399145f9SAnshuman Khandual 
958399145f9SAnshuman Khandual static int __init debug_vm_pgtable(void)
959399145f9SAnshuman Khandual {
960a5c3b9ffSAnshuman Khandual 	struct vm_area_struct *vma;
961399145f9SAnshuman Khandual 	struct mm_struct *mm;
962399145f9SAnshuman Khandual 	pgd_t *pgdp;
963399145f9SAnshuman Khandual 	p4d_t *p4dp, *saved_p4dp;
964399145f9SAnshuman Khandual 	pud_t *pudp, *saved_pudp;
965399145f9SAnshuman Khandual 	pmd_t *pmdp, *saved_pmdp, pmd;
966399145f9SAnshuman Khandual 	pte_t *ptep;
967399145f9SAnshuman Khandual 	pgtable_t saved_ptep;
96805289402SAnshuman Khandual 	pgprot_t prot, protnone;
969399145f9SAnshuman Khandual 	phys_addr_t paddr;
970399145f9SAnshuman Khandual 	unsigned long vaddr, pte_aligned, pmd_aligned;
971399145f9SAnshuman Khandual 	unsigned long pud_aligned, p4d_aligned, pgd_aligned;
972fea1120cSKees Cook 	spinlock_t *ptl = NULL;
9732e326c07SAnshuman Khandual 	int idx;
974399145f9SAnshuman Khandual 
975399145f9SAnshuman Khandual 	pr_info("Validating architecture page table helpers\n");
976399145f9SAnshuman Khandual 	prot = vm_get_page_prot(VMFLAGS);
977399145f9SAnshuman Khandual 	vaddr = get_random_vaddr();
978399145f9SAnshuman Khandual 	mm = mm_alloc();
979399145f9SAnshuman Khandual 	if (!mm) {
980399145f9SAnshuman Khandual 		pr_err("mm_struct allocation failed\n");
981399145f9SAnshuman Khandual 		return 1;
982399145f9SAnshuman Khandual 	}
983399145f9SAnshuman Khandual 
984399145f9SAnshuman Khandual 	/*
98505289402SAnshuman Khandual 	 * __P000 (or even __S000) will help create page table entries with
98605289402SAnshuman Khandual 	 * PROT_NONE permission as required for pxx_protnone_tests().
98705289402SAnshuman Khandual 	 */
98805289402SAnshuman Khandual 	protnone = __P000;
98905289402SAnshuman Khandual 
990a5c3b9ffSAnshuman Khandual 	vma = vm_area_alloc(mm);
991a5c3b9ffSAnshuman Khandual 	if (!vma) {
992a5c3b9ffSAnshuman Khandual 		pr_err("vma allocation failed\n");
993a5c3b9ffSAnshuman Khandual 		return 1;
994a5c3b9ffSAnshuman Khandual 	}
995a5c3b9ffSAnshuman Khandual 
99605289402SAnshuman Khandual 	/*
997399145f9SAnshuman Khandual 	 * PFN for mapping at PTE level is determined from a standard kernel
998399145f9SAnshuman Khandual 	 * text symbol. But pfns for higher page table levels are derived by
999399145f9SAnshuman Khandual 	 * masking lower bits of this real pfn. These derived pfns might not
1000399145f9SAnshuman Khandual 	 * exist on the platform but that does not really matter as pfn_pxx()
1001399145f9SAnshuman Khandual 	 * helpers will still create appropriate entries for the test. This
1002399145f9SAnshuman Khandual 	 * helps avoid large memory block allocations to be used for mapping
1003399145f9SAnshuman Khandual 	 * at higher page table levels.
1004399145f9SAnshuman Khandual 	 */
1005399145f9SAnshuman Khandual 	paddr = __pa_symbol(&start_kernel);
1006399145f9SAnshuman Khandual 
1007399145f9SAnshuman Khandual 	pte_aligned = (paddr & PAGE_MASK) >> PAGE_SHIFT;
1008399145f9SAnshuman Khandual 	pmd_aligned = (paddr & PMD_MASK) >> PAGE_SHIFT;
1009399145f9SAnshuman Khandual 	pud_aligned = (paddr & PUD_MASK) >> PAGE_SHIFT;
1010399145f9SAnshuman Khandual 	p4d_aligned = (paddr & P4D_MASK) >> PAGE_SHIFT;
1011399145f9SAnshuman Khandual 	pgd_aligned = (paddr & PGDIR_MASK) >> PAGE_SHIFT;
1012399145f9SAnshuman Khandual 	WARN_ON(!pfn_valid(pte_aligned));
1013399145f9SAnshuman Khandual 
1014399145f9SAnshuman Khandual 	pgdp = pgd_offset(mm, vaddr);
1015399145f9SAnshuman Khandual 	p4dp = p4d_alloc(mm, pgdp, vaddr);
1016399145f9SAnshuman Khandual 	pudp = pud_alloc(mm, p4dp, vaddr);
1017399145f9SAnshuman Khandual 	pmdp = pmd_alloc(mm, pudp, vaddr);
1018f14312e1SAneesh Kumar K.V 	/*
1019f14312e1SAneesh Kumar K.V 	 * Allocate pgtable_t
1020f14312e1SAneesh Kumar K.V 	 */
1021f14312e1SAneesh Kumar K.V 	if (pte_alloc(mm, pmdp)) {
1022f14312e1SAneesh Kumar K.V 		pr_err("pgtable allocation failed\n");
1023f14312e1SAneesh Kumar K.V 		return 1;
1024f14312e1SAneesh Kumar K.V 	}
1025399145f9SAnshuman Khandual 
1026399145f9SAnshuman Khandual 	/*
1027399145f9SAnshuman Khandual 	 * Save all the page table page addresses as the page table
1028399145f9SAnshuman Khandual 	 * entries will be used for testing with random or garbage
1029399145f9SAnshuman Khandual 	 * values. These saved addresses will be used for freeing
1030399145f9SAnshuman Khandual 	 * page table pages.
1031399145f9SAnshuman Khandual 	 */
1032399145f9SAnshuman Khandual 	pmd = READ_ONCE(*pmdp);
1033399145f9SAnshuman Khandual 	saved_p4dp = p4d_offset(pgdp, 0UL);
1034399145f9SAnshuman Khandual 	saved_pudp = pud_offset(p4dp, 0UL);
1035399145f9SAnshuman Khandual 	saved_pmdp = pmd_offset(pudp, 0UL);
1036399145f9SAnshuman Khandual 	saved_ptep = pmd_pgtable(pmd);
1037399145f9SAnshuman Khandual 
10382e326c07SAnshuman Khandual 	/*
10392e326c07SAnshuman Khandual 	 * Iterate over the protection_map[] to make sure that all
10402e326c07SAnshuman Khandual 	 * the basic page table transformation validations just hold
10412e326c07SAnshuman Khandual 	 * true irrespective of the starting protection value for a
10422e326c07SAnshuman Khandual 	 * given page table entry.
10432e326c07SAnshuman Khandual 	 */
10442e326c07SAnshuman Khandual 	for (idx = 0; idx < ARRAY_SIZE(protection_map); idx++) {
10452e326c07SAnshuman Khandual 		pte_basic_tests(pte_aligned, idx);
10462e326c07SAnshuman Khandual 		pmd_basic_tests(pmd_aligned, idx);
10472e326c07SAnshuman Khandual 		pud_basic_tests(mm, pud_aligned, idx);
10482e326c07SAnshuman Khandual 	}
10492e326c07SAnshuman Khandual 
10502e326c07SAnshuman Khandual 	/*
10512e326c07SAnshuman Khandual 	 * Both P4D and PGD level tests are very basic which do not
10522e326c07SAnshuman Khandual 	 * involve creating page table entries from the protection
10532e326c07SAnshuman Khandual 	 * value and the given pfn. Hence just keep them out from
10542e326c07SAnshuman Khandual 	 * the above iteration for now to save some test execution
10552e326c07SAnshuman Khandual 	 * time.
10562e326c07SAnshuman Khandual 	 */
1057399145f9SAnshuman Khandual 	p4d_basic_tests(p4d_aligned, prot);
1058399145f9SAnshuman Khandual 	pgd_basic_tests(pgd_aligned, prot);
1059399145f9SAnshuman Khandual 
1060a5c3b9ffSAnshuman Khandual 	pmd_leaf_tests(pmd_aligned, prot);
1061a5c3b9ffSAnshuman Khandual 	pud_leaf_tests(pud_aligned, prot);
1062a5c3b9ffSAnshuman Khandual 
10634200605bSAneesh Kumar K.V 	pte_savedwrite_tests(pte_aligned, protnone);
10644200605bSAneesh Kumar K.V 	pmd_savedwrite_tests(pmd_aligned, protnone);
1065a5c3b9ffSAnshuman Khandual 
106605289402SAnshuman Khandual 	pte_special_tests(pte_aligned, prot);
106705289402SAnshuman Khandual 	pte_protnone_tests(pte_aligned, protnone);
106805289402SAnshuman Khandual 	pmd_protnone_tests(pmd_aligned, protnone);
106905289402SAnshuman Khandual 
107005289402SAnshuman Khandual 	pte_devmap_tests(pte_aligned, prot);
107105289402SAnshuman Khandual 	pmd_devmap_tests(pmd_aligned, prot);
107205289402SAnshuman Khandual 	pud_devmap_tests(pud_aligned, prot);
107305289402SAnshuman Khandual 
107405289402SAnshuman Khandual 	pte_soft_dirty_tests(pte_aligned, prot);
107505289402SAnshuman Khandual 	pmd_soft_dirty_tests(pmd_aligned, prot);
107605289402SAnshuman Khandual 	pte_swap_soft_dirty_tests(pte_aligned, prot);
107705289402SAnshuman Khandual 	pmd_swap_soft_dirty_tests(pmd_aligned, prot);
107805289402SAnshuman Khandual 
107905289402SAnshuman Khandual 	pte_swap_tests(pte_aligned, prot);
108005289402SAnshuman Khandual 	pmd_swap_tests(pmd_aligned, prot);
108105289402SAnshuman Khandual 
108205289402SAnshuman Khandual 	swap_migration_tests();
108305289402SAnshuman Khandual 
108405289402SAnshuman Khandual 	pmd_thp_tests(pmd_aligned, prot);
108505289402SAnshuman Khandual 	pud_thp_tests(pud_aligned, prot);
108605289402SAnshuman Khandual 
1087e8edf0adSAneesh Kumar K.V 	hugetlb_basic_tests(pte_aligned, prot);
1088e8edf0adSAneesh Kumar K.V 
10896f302e27SAneesh Kumar K.V 	/*
10906f302e27SAneesh Kumar K.V 	 * Page table modifying tests. They need to hold
10916f302e27SAneesh Kumar K.V 	 * proper page table lock.
10926f302e27SAneesh Kumar K.V 	 */
1093e8edf0adSAneesh Kumar K.V 
1094f14312e1SAneesh Kumar K.V 	ptep = pte_offset_map_lock(mm, pmdp, vaddr, &ptl);
1095401035d5SAneesh Kumar K.V 	pte_clear_tests(mm, ptep, pte_aligned, vaddr, prot);
1096e8edf0adSAneesh Kumar K.V 	pte_advanced_tests(mm, vma, ptep, pte_aligned, vaddr, prot);
1097e8edf0adSAneesh Kumar K.V 	pte_unmap_unlock(ptep, ptl);
1098e8edf0adSAneesh Kumar K.V 
10996f302e27SAneesh Kumar K.V 	ptl = pmd_lock(mm, pmdp);
11006f302e27SAneesh Kumar K.V 	pmd_clear_tests(mm, pmdp);
110187f34986SAneesh Kumar K.V 	pmd_advanced_tests(mm, vma, pmdp, pmd_aligned, vaddr, prot, saved_ptep);
11026f302e27SAneesh Kumar K.V 	pmd_huge_tests(pmdp, pmd_aligned, prot);
1103e8edf0adSAneesh Kumar K.V 	pmd_populate_tests(mm, pmdp, saved_ptep);
11046f302e27SAneesh Kumar K.V 	spin_unlock(ptl);
11056f302e27SAneesh Kumar K.V 
11066f302e27SAneesh Kumar K.V 	ptl = pud_lock(mm, pudp);
11076f302e27SAneesh Kumar K.V 	pud_clear_tests(mm, pudp);
11086f302e27SAneesh Kumar K.V 	pud_advanced_tests(mm, vma, pudp, pud_aligned, vaddr, prot);
11096f302e27SAneesh Kumar K.V 	pud_huge_tests(pudp, pud_aligned, prot);
1110e8edf0adSAneesh Kumar K.V 	pud_populate_tests(mm, pudp, saved_pmdp);
11116f302e27SAneesh Kumar K.V 	spin_unlock(ptl);
11126f302e27SAneesh Kumar K.V 
11136f302e27SAneesh Kumar K.V 	spin_lock(&mm->page_table_lock);
11146f302e27SAneesh Kumar K.V 	p4d_clear_tests(mm, p4dp);
11156f302e27SAneesh Kumar K.V 	pgd_clear_tests(mm, pgdp);
1116e8edf0adSAneesh Kumar K.V 	p4d_populate_tests(mm, p4dp, saved_pudp);
1117e8edf0adSAneesh Kumar K.V 	pgd_populate_tests(mm, pgdp, saved_p4dp);
11186f302e27SAneesh Kumar K.V 	spin_unlock(&mm->page_table_lock);
1119e8edf0adSAneesh Kumar K.V 
1120399145f9SAnshuman Khandual 	p4d_free(mm, saved_p4dp);
1121399145f9SAnshuman Khandual 	pud_free(mm, saved_pudp);
1122399145f9SAnshuman Khandual 	pmd_free(mm, saved_pmdp);
1123399145f9SAnshuman Khandual 	pte_free(mm, saved_ptep);
1124399145f9SAnshuman Khandual 
1125a5c3b9ffSAnshuman Khandual 	vm_area_free(vma);
1126399145f9SAnshuman Khandual 	mm_dec_nr_puds(mm);
1127399145f9SAnshuman Khandual 	mm_dec_nr_pmds(mm);
1128399145f9SAnshuman Khandual 	mm_dec_nr_ptes(mm);
1129399145f9SAnshuman Khandual 	mmdrop(mm);
1130399145f9SAnshuman Khandual 	return 0;
1131399145f9SAnshuman Khandual }
1132399145f9SAnshuman Khandual late_initcall(debug_vm_pgtable);
1133