1399145f9SAnshuman Khandual // SPDX-License-Identifier: GPL-2.0-only 2399145f9SAnshuman Khandual /* 3399145f9SAnshuman Khandual * This kernel test validates architecture page table helpers and 4399145f9SAnshuman Khandual * accessors and helps in verifying their continued compliance with 5399145f9SAnshuman Khandual * expected generic MM semantics. 6399145f9SAnshuman Khandual * 7399145f9SAnshuman Khandual * Copyright (C) 2019 ARM Ltd. 8399145f9SAnshuman Khandual * 9399145f9SAnshuman Khandual * Author: Anshuman Khandual <anshuman.khandual@arm.com> 10399145f9SAnshuman Khandual */ 116315df41SAnshuman Khandual #define pr_fmt(fmt) "debug_vm_pgtable: [%-25s]: " fmt, __func__ 12399145f9SAnshuman Khandual 13399145f9SAnshuman Khandual #include <linux/gfp.h> 14399145f9SAnshuman Khandual #include <linux/highmem.h> 15399145f9SAnshuman Khandual #include <linux/hugetlb.h> 16399145f9SAnshuman Khandual #include <linux/kernel.h> 17399145f9SAnshuman Khandual #include <linux/kconfig.h> 18399145f9SAnshuman Khandual #include <linux/mm.h> 19399145f9SAnshuman Khandual #include <linux/mman.h> 20399145f9SAnshuman Khandual #include <linux/mm_types.h> 21399145f9SAnshuman Khandual #include <linux/module.h> 22399145f9SAnshuman Khandual #include <linux/pfn_t.h> 23399145f9SAnshuman Khandual #include <linux/printk.h> 24a5c3b9ffSAnshuman Khandual #include <linux/pgtable.h> 25399145f9SAnshuman Khandual #include <linux/random.h> 26399145f9SAnshuman Khandual #include <linux/spinlock.h> 27399145f9SAnshuman Khandual #include <linux/swap.h> 28399145f9SAnshuman Khandual #include <linux/swapops.h> 29399145f9SAnshuman Khandual #include <linux/start_kernel.h> 30399145f9SAnshuman Khandual #include <linux/sched/mm.h> 3185a14463SAneesh Kumar K.V #include <linux/io.h> 32399145f9SAnshuman Khandual #include <asm/pgalloc.h> 33a5c3b9ffSAnshuman Khandual #include <asm/tlbflush.h> 34399145f9SAnshuman Khandual 35b1d00007SAnshuman Khandual /* 36b1d00007SAnshuman Khandual * Please refer Documentation/vm/arch_pgtable_helpers.rst for the semantics 37b1d00007SAnshuman Khandual * expectations that are being validated here. All future changes in here 38b1d00007SAnshuman Khandual * or the documentation need to be in sync. 39b1d00007SAnshuman Khandual */ 40b1d00007SAnshuman Khandual 41399145f9SAnshuman Khandual #define VMFLAGS (VM_READ|VM_WRITE|VM_EXEC) 42399145f9SAnshuman Khandual 43399145f9SAnshuman Khandual /* 44399145f9SAnshuman Khandual * On s390 platform, the lower 4 bits are used to identify given page table 45399145f9SAnshuman Khandual * entry type. But these bits might affect the ability to clear entries with 46399145f9SAnshuman Khandual * pxx_clear() because of how dynamic page table folding works on s390. So 47399145f9SAnshuman Khandual * while loading up the entries do not change the lower 4 bits. It does not 48cfc5bbc4SAneesh Kumar K.V * have affect any other platform. Also avoid the 62nd bit on ppc64 that is 49cfc5bbc4SAneesh Kumar K.V * used to mark a pte entry. 50399145f9SAnshuman Khandual */ 51cfc5bbc4SAneesh Kumar K.V #define S390_SKIP_MASK GENMASK(3, 0) 52cfc5bbc4SAneesh Kumar K.V #if __BITS_PER_LONG == 64 53cfc5bbc4SAneesh Kumar K.V #define PPC64_SKIP_MASK GENMASK(62, 62) 54cfc5bbc4SAneesh Kumar K.V #else 55cfc5bbc4SAneesh Kumar K.V #define PPC64_SKIP_MASK 0x0 56cfc5bbc4SAneesh Kumar K.V #endif 57cfc5bbc4SAneesh Kumar K.V #define ARCH_SKIP_MASK (S390_SKIP_MASK | PPC64_SKIP_MASK) 58cfc5bbc4SAneesh Kumar K.V #define RANDOM_ORVALUE (GENMASK(BITS_PER_LONG - 1, 0) & ~ARCH_SKIP_MASK) 59399145f9SAnshuman Khandual #define RANDOM_NZVALUE GENMASK(7, 0) 60399145f9SAnshuman Khandual 612e326c07SAnshuman Khandual static void __init pte_basic_tests(unsigned long pfn, int idx) 62399145f9SAnshuman Khandual { 632e326c07SAnshuman Khandual pgprot_t prot = protection_map[idx]; 64399145f9SAnshuman Khandual pte_t pte = pfn_pte(pfn, prot); 652e326c07SAnshuman Khandual unsigned long val = idx, *ptr = &val; 66399145f9SAnshuman Khandual 672e326c07SAnshuman Khandual pr_debug("Validating PTE basic (%pGv)\n", ptr); 68bb5c47ceSAnshuman Khandual 69bb5c47ceSAnshuman Khandual /* 70bb5c47ceSAnshuman Khandual * This test needs to be executed after the given page table entry 71bb5c47ceSAnshuman Khandual * is created with pfn_pte() to make sure that protection_map[idx] 72bb5c47ceSAnshuman Khandual * does not have the dirty bit enabled from the beginning. This is 73bb5c47ceSAnshuman Khandual * important for platforms like arm64 where (!PTE_RDONLY) indicate 74bb5c47ceSAnshuman Khandual * dirty bit being set. 75bb5c47ceSAnshuman Khandual */ 76bb5c47ceSAnshuman Khandual WARN_ON(pte_dirty(pte_wrprotect(pte))); 77bb5c47ceSAnshuman Khandual 78399145f9SAnshuman Khandual WARN_ON(!pte_same(pte, pte)); 79399145f9SAnshuman Khandual WARN_ON(!pte_young(pte_mkyoung(pte_mkold(pte)))); 80399145f9SAnshuman Khandual WARN_ON(!pte_dirty(pte_mkdirty(pte_mkclean(pte)))); 81399145f9SAnshuman Khandual WARN_ON(!pte_write(pte_mkwrite(pte_wrprotect(pte)))); 82399145f9SAnshuman Khandual WARN_ON(pte_young(pte_mkold(pte_mkyoung(pte)))); 83399145f9SAnshuman Khandual WARN_ON(pte_dirty(pte_mkclean(pte_mkdirty(pte)))); 84399145f9SAnshuman Khandual WARN_ON(pte_write(pte_wrprotect(pte_mkwrite(pte)))); 85bb5c47ceSAnshuman Khandual WARN_ON(pte_dirty(pte_wrprotect(pte_mkclean(pte)))); 86bb5c47ceSAnshuman Khandual WARN_ON(!pte_dirty(pte_wrprotect(pte_mkdirty(pte)))); 87399145f9SAnshuman Khandual } 88399145f9SAnshuman Khandual 89a5c3b9ffSAnshuman Khandual static void __init pte_advanced_tests(struct mm_struct *mm, 90a5c3b9ffSAnshuman Khandual struct vm_area_struct *vma, pte_t *ptep, 91a5c3b9ffSAnshuman Khandual unsigned long pfn, unsigned long vaddr, 92a5c3b9ffSAnshuman Khandual pgprot_t prot) 93a5c3b9ffSAnshuman Khandual { 94a5c3b9ffSAnshuman Khandual pte_t pte = pfn_pte(pfn, prot); 95a5c3b9ffSAnshuman Khandual 96c3824e18SAneesh Kumar K.V /* 97c3824e18SAneesh Kumar K.V * Architectures optimize set_pte_at by avoiding TLB flush. 98c3824e18SAneesh Kumar K.V * This requires set_pte_at to be not used to update an 99c3824e18SAneesh Kumar K.V * existing pte entry. Clear pte before we do set_pte_at 100c3824e18SAneesh Kumar K.V */ 101c3824e18SAneesh Kumar K.V 1026315df41SAnshuman Khandual pr_debug("Validating PTE advanced\n"); 103a5c3b9ffSAnshuman Khandual pte = pfn_pte(pfn, prot); 104a5c3b9ffSAnshuman Khandual set_pte_at(mm, vaddr, ptep, pte); 105a5c3b9ffSAnshuman Khandual ptep_set_wrprotect(mm, vaddr, ptep); 106a5c3b9ffSAnshuman Khandual pte = ptep_get(ptep); 107a5c3b9ffSAnshuman Khandual WARN_ON(pte_write(pte)); 108a5c3b9ffSAnshuman Khandual ptep_get_and_clear(mm, vaddr, ptep); 109a5c3b9ffSAnshuman Khandual pte = ptep_get(ptep); 110a5c3b9ffSAnshuman Khandual WARN_ON(!pte_none(pte)); 111a5c3b9ffSAnshuman Khandual 112a5c3b9ffSAnshuman Khandual pte = pfn_pte(pfn, prot); 113a5c3b9ffSAnshuman Khandual pte = pte_wrprotect(pte); 114a5c3b9ffSAnshuman Khandual pte = pte_mkclean(pte); 115a5c3b9ffSAnshuman Khandual set_pte_at(mm, vaddr, ptep, pte); 116a5c3b9ffSAnshuman Khandual pte = pte_mkwrite(pte); 117a5c3b9ffSAnshuman Khandual pte = pte_mkdirty(pte); 118a5c3b9ffSAnshuman Khandual ptep_set_access_flags(vma, vaddr, ptep, pte, 1); 119a5c3b9ffSAnshuman Khandual pte = ptep_get(ptep); 120a5c3b9ffSAnshuman Khandual WARN_ON(!(pte_write(pte) && pte_dirty(pte))); 121a5c3b9ffSAnshuman Khandual ptep_get_and_clear_full(mm, vaddr, ptep, 1); 122a5c3b9ffSAnshuman Khandual pte = ptep_get(ptep); 123a5c3b9ffSAnshuman Khandual WARN_ON(!pte_none(pte)); 124a5c3b9ffSAnshuman Khandual 125c3824e18SAneesh Kumar K.V pte = pfn_pte(pfn, prot); 126a5c3b9ffSAnshuman Khandual pte = pte_mkyoung(pte); 127a5c3b9ffSAnshuman Khandual set_pte_at(mm, vaddr, ptep, pte); 128a5c3b9ffSAnshuman Khandual ptep_test_and_clear_young(vma, vaddr, ptep); 129a5c3b9ffSAnshuman Khandual pte = ptep_get(ptep); 130a5c3b9ffSAnshuman Khandual WARN_ON(pte_young(pte)); 131a5c3b9ffSAnshuman Khandual } 132a5c3b9ffSAnshuman Khandual 133a5c3b9ffSAnshuman Khandual static void __init pte_savedwrite_tests(unsigned long pfn, pgprot_t prot) 134a5c3b9ffSAnshuman Khandual { 135a5c3b9ffSAnshuman Khandual pte_t pte = pfn_pte(pfn, prot); 136a5c3b9ffSAnshuman Khandual 1374200605bSAneesh Kumar K.V if (!IS_ENABLED(CONFIG_NUMA_BALANCING)) 1384200605bSAneesh Kumar K.V return; 1394200605bSAneesh Kumar K.V 1406315df41SAnshuman Khandual pr_debug("Validating PTE saved write\n"); 141a5c3b9ffSAnshuman Khandual WARN_ON(!pte_savedwrite(pte_mk_savedwrite(pte_clear_savedwrite(pte)))); 142a5c3b9ffSAnshuman Khandual WARN_ON(pte_savedwrite(pte_clear_savedwrite(pte_mk_savedwrite(pte)))); 143a5c3b9ffSAnshuman Khandual } 1444200605bSAneesh Kumar K.V 145399145f9SAnshuman Khandual #ifdef CONFIG_TRANSPARENT_HUGEPAGE 1462e326c07SAnshuman Khandual static void __init pmd_basic_tests(unsigned long pfn, int idx) 147399145f9SAnshuman Khandual { 1482e326c07SAnshuman Khandual pgprot_t prot = protection_map[idx]; 149399145f9SAnshuman Khandual pmd_t pmd = pfn_pmd(pfn, prot); 1502e326c07SAnshuman Khandual unsigned long val = idx, *ptr = &val; 151399145f9SAnshuman Khandual 152787d563bSAneesh Kumar K.V if (!has_transparent_hugepage()) 153787d563bSAneesh Kumar K.V return; 154787d563bSAneesh Kumar K.V 1552e326c07SAnshuman Khandual pr_debug("Validating PMD basic (%pGv)\n", ptr); 156bb5c47ceSAnshuman Khandual 157bb5c47ceSAnshuman Khandual /* 158bb5c47ceSAnshuman Khandual * This test needs to be executed after the given page table entry 159bb5c47ceSAnshuman Khandual * is created with pfn_pmd() to make sure that protection_map[idx] 160bb5c47ceSAnshuman Khandual * does not have the dirty bit enabled from the beginning. This is 161bb5c47ceSAnshuman Khandual * important for platforms like arm64 where (!PTE_RDONLY) indicate 162bb5c47ceSAnshuman Khandual * dirty bit being set. 163bb5c47ceSAnshuman Khandual */ 164bb5c47ceSAnshuman Khandual WARN_ON(pmd_dirty(pmd_wrprotect(pmd))); 165bb5c47ceSAnshuman Khandual 166bb5c47ceSAnshuman Khandual 167399145f9SAnshuman Khandual WARN_ON(!pmd_same(pmd, pmd)); 168399145f9SAnshuman Khandual WARN_ON(!pmd_young(pmd_mkyoung(pmd_mkold(pmd)))); 169399145f9SAnshuman Khandual WARN_ON(!pmd_dirty(pmd_mkdirty(pmd_mkclean(pmd)))); 170399145f9SAnshuman Khandual WARN_ON(!pmd_write(pmd_mkwrite(pmd_wrprotect(pmd)))); 171399145f9SAnshuman Khandual WARN_ON(pmd_young(pmd_mkold(pmd_mkyoung(pmd)))); 172399145f9SAnshuman Khandual WARN_ON(pmd_dirty(pmd_mkclean(pmd_mkdirty(pmd)))); 173399145f9SAnshuman Khandual WARN_ON(pmd_write(pmd_wrprotect(pmd_mkwrite(pmd)))); 174bb5c47ceSAnshuman Khandual WARN_ON(pmd_dirty(pmd_wrprotect(pmd_mkclean(pmd)))); 175bb5c47ceSAnshuman Khandual WARN_ON(!pmd_dirty(pmd_wrprotect(pmd_mkdirty(pmd)))); 176399145f9SAnshuman Khandual /* 177399145f9SAnshuman Khandual * A huge page does not point to next level page table 178399145f9SAnshuman Khandual * entry. Hence this must qualify as pmd_bad(). 179399145f9SAnshuman Khandual */ 180399145f9SAnshuman Khandual WARN_ON(!pmd_bad(pmd_mkhuge(pmd))); 181399145f9SAnshuman Khandual } 182399145f9SAnshuman Khandual 183a5c3b9ffSAnshuman Khandual static void __init pmd_advanced_tests(struct mm_struct *mm, 184a5c3b9ffSAnshuman Khandual struct vm_area_struct *vma, pmd_t *pmdp, 185a5c3b9ffSAnshuman Khandual unsigned long pfn, unsigned long vaddr, 18687f34986SAneesh Kumar K.V pgprot_t prot, pgtable_t pgtable) 187a5c3b9ffSAnshuman Khandual { 188a5c3b9ffSAnshuman Khandual pmd_t pmd = pfn_pmd(pfn, prot); 189a5c3b9ffSAnshuman Khandual 190a5c3b9ffSAnshuman Khandual if (!has_transparent_hugepage()) 191a5c3b9ffSAnshuman Khandual return; 192a5c3b9ffSAnshuman Khandual 1936315df41SAnshuman Khandual pr_debug("Validating PMD advanced\n"); 194a5c3b9ffSAnshuman Khandual /* Align the address wrt HPAGE_PMD_SIZE */ 195a5c3b9ffSAnshuman Khandual vaddr = (vaddr & HPAGE_PMD_MASK) + HPAGE_PMD_SIZE; 196a5c3b9ffSAnshuman Khandual 19787f34986SAneesh Kumar K.V pgtable_trans_huge_deposit(mm, pmdp, pgtable); 19887f34986SAneesh Kumar K.V 199a5c3b9ffSAnshuman Khandual pmd = pfn_pmd(pfn, prot); 200a5c3b9ffSAnshuman Khandual set_pmd_at(mm, vaddr, pmdp, pmd); 201a5c3b9ffSAnshuman Khandual pmdp_set_wrprotect(mm, vaddr, pmdp); 202a5c3b9ffSAnshuman Khandual pmd = READ_ONCE(*pmdp); 203a5c3b9ffSAnshuman Khandual WARN_ON(pmd_write(pmd)); 204a5c3b9ffSAnshuman Khandual pmdp_huge_get_and_clear(mm, vaddr, pmdp); 205a5c3b9ffSAnshuman Khandual pmd = READ_ONCE(*pmdp); 206a5c3b9ffSAnshuman Khandual WARN_ON(!pmd_none(pmd)); 207a5c3b9ffSAnshuman Khandual 208a5c3b9ffSAnshuman Khandual pmd = pfn_pmd(pfn, prot); 209a5c3b9ffSAnshuman Khandual pmd = pmd_wrprotect(pmd); 210a5c3b9ffSAnshuman Khandual pmd = pmd_mkclean(pmd); 211a5c3b9ffSAnshuman Khandual set_pmd_at(mm, vaddr, pmdp, pmd); 212a5c3b9ffSAnshuman Khandual pmd = pmd_mkwrite(pmd); 213a5c3b9ffSAnshuman Khandual pmd = pmd_mkdirty(pmd); 214a5c3b9ffSAnshuman Khandual pmdp_set_access_flags(vma, vaddr, pmdp, pmd, 1); 215a5c3b9ffSAnshuman Khandual pmd = READ_ONCE(*pmdp); 216a5c3b9ffSAnshuman Khandual WARN_ON(!(pmd_write(pmd) && pmd_dirty(pmd))); 217a5c3b9ffSAnshuman Khandual pmdp_huge_get_and_clear_full(vma, vaddr, pmdp, 1); 218a5c3b9ffSAnshuman Khandual pmd = READ_ONCE(*pmdp); 219a5c3b9ffSAnshuman Khandual WARN_ON(!pmd_none(pmd)); 220a5c3b9ffSAnshuman Khandual 221c3824e18SAneesh Kumar K.V pmd = pmd_mkhuge(pfn_pmd(pfn, prot)); 222a5c3b9ffSAnshuman Khandual pmd = pmd_mkyoung(pmd); 223a5c3b9ffSAnshuman Khandual set_pmd_at(mm, vaddr, pmdp, pmd); 224a5c3b9ffSAnshuman Khandual pmdp_test_and_clear_young(vma, vaddr, pmdp); 225a5c3b9ffSAnshuman Khandual pmd = READ_ONCE(*pmdp); 226a5c3b9ffSAnshuman Khandual WARN_ON(pmd_young(pmd)); 22787f34986SAneesh Kumar K.V 22813af0506SAneesh Kumar K.V /* Clear the pte entries */ 22913af0506SAneesh Kumar K.V pmdp_huge_get_and_clear(mm, vaddr, pmdp); 23087f34986SAneesh Kumar K.V pgtable = pgtable_trans_huge_withdraw(mm, pmdp); 231a5c3b9ffSAnshuman Khandual } 232a5c3b9ffSAnshuman Khandual 233a5c3b9ffSAnshuman Khandual static void __init pmd_leaf_tests(unsigned long pfn, pgprot_t prot) 234a5c3b9ffSAnshuman Khandual { 235a5c3b9ffSAnshuman Khandual pmd_t pmd = pfn_pmd(pfn, prot); 236a5c3b9ffSAnshuman Khandual 2376315df41SAnshuman Khandual pr_debug("Validating PMD leaf\n"); 238a5c3b9ffSAnshuman Khandual /* 239a5c3b9ffSAnshuman Khandual * PMD based THP is a leaf entry. 240a5c3b9ffSAnshuman Khandual */ 241a5c3b9ffSAnshuman Khandual pmd = pmd_mkhuge(pmd); 242a5c3b9ffSAnshuman Khandual WARN_ON(!pmd_leaf(pmd)); 243a5c3b9ffSAnshuman Khandual } 244a5c3b9ffSAnshuman Khandual 24585a14463SAneesh Kumar K.V #ifdef CONFIG_HAVE_ARCH_HUGE_VMAP 246a5c3b9ffSAnshuman Khandual static void __init pmd_huge_tests(pmd_t *pmdp, unsigned long pfn, pgprot_t prot) 247a5c3b9ffSAnshuman Khandual { 248a5c3b9ffSAnshuman Khandual pmd_t pmd; 249a5c3b9ffSAnshuman Khandual 250*bbc180a5SNicholas Piggin if (!arch_vmap_pmd_supported(prot)) 251a5c3b9ffSAnshuman Khandual return; 2526315df41SAnshuman Khandual 2536315df41SAnshuman Khandual pr_debug("Validating PMD huge\n"); 254a5c3b9ffSAnshuman Khandual /* 255a5c3b9ffSAnshuman Khandual * X86 defined pmd_set_huge() verifies that the given 256a5c3b9ffSAnshuman Khandual * PMD is not a populated non-leaf entry. 257a5c3b9ffSAnshuman Khandual */ 258a5c3b9ffSAnshuman Khandual WRITE_ONCE(*pmdp, __pmd(0)); 259a5c3b9ffSAnshuman Khandual WARN_ON(!pmd_set_huge(pmdp, __pfn_to_phys(pfn), prot)); 260a5c3b9ffSAnshuman Khandual WARN_ON(!pmd_clear_huge(pmdp)); 261a5c3b9ffSAnshuman Khandual pmd = READ_ONCE(*pmdp); 262a5c3b9ffSAnshuman Khandual WARN_ON(!pmd_none(pmd)); 263a5c3b9ffSAnshuman Khandual } 26485a14463SAneesh Kumar K.V #else /* CONFIG_HAVE_ARCH_HUGE_VMAP */ 26585a14463SAneesh Kumar K.V static void __init pmd_huge_tests(pmd_t *pmdp, unsigned long pfn, pgprot_t prot) { } 26685a14463SAneesh Kumar K.V #endif /* CONFIG_HAVE_ARCH_HUGE_VMAP */ 267a5c3b9ffSAnshuman Khandual 268a5c3b9ffSAnshuman Khandual static void __init pmd_savedwrite_tests(unsigned long pfn, pgprot_t prot) 269a5c3b9ffSAnshuman Khandual { 270a5c3b9ffSAnshuman Khandual pmd_t pmd = pfn_pmd(pfn, prot); 271a5c3b9ffSAnshuman Khandual 2724200605bSAneesh Kumar K.V if (!IS_ENABLED(CONFIG_NUMA_BALANCING)) 2734200605bSAneesh Kumar K.V return; 2744200605bSAneesh Kumar K.V 2756315df41SAnshuman Khandual pr_debug("Validating PMD saved write\n"); 276a5c3b9ffSAnshuman Khandual WARN_ON(!pmd_savedwrite(pmd_mk_savedwrite(pmd_clear_savedwrite(pmd)))); 277a5c3b9ffSAnshuman Khandual WARN_ON(pmd_savedwrite(pmd_clear_savedwrite(pmd_mk_savedwrite(pmd)))); 278a5c3b9ffSAnshuman Khandual } 279a5c3b9ffSAnshuman Khandual 280399145f9SAnshuman Khandual #ifdef CONFIG_HAVE_ARCH_TRANSPARENT_HUGEPAGE_PUD 2812e326c07SAnshuman Khandual static void __init pud_basic_tests(struct mm_struct *mm, unsigned long pfn, int idx) 282399145f9SAnshuman Khandual { 2832e326c07SAnshuman Khandual pgprot_t prot = protection_map[idx]; 284399145f9SAnshuman Khandual pud_t pud = pfn_pud(pfn, prot); 2852e326c07SAnshuman Khandual unsigned long val = idx, *ptr = &val; 286399145f9SAnshuman Khandual 287787d563bSAneesh Kumar K.V if (!has_transparent_hugepage()) 288787d563bSAneesh Kumar K.V return; 289787d563bSAneesh Kumar K.V 2902e326c07SAnshuman Khandual pr_debug("Validating PUD basic (%pGv)\n", ptr); 291bb5c47ceSAnshuman Khandual 292bb5c47ceSAnshuman Khandual /* 293bb5c47ceSAnshuman Khandual * This test needs to be executed after the given page table entry 294bb5c47ceSAnshuman Khandual * is created with pfn_pud() to make sure that protection_map[idx] 295bb5c47ceSAnshuman Khandual * does not have the dirty bit enabled from the beginning. This is 296bb5c47ceSAnshuman Khandual * important for platforms like arm64 where (!PTE_RDONLY) indicate 297bb5c47ceSAnshuman Khandual * dirty bit being set. 298bb5c47ceSAnshuman Khandual */ 299bb5c47ceSAnshuman Khandual WARN_ON(pud_dirty(pud_wrprotect(pud))); 300bb5c47ceSAnshuman Khandual 301399145f9SAnshuman Khandual WARN_ON(!pud_same(pud, pud)); 302399145f9SAnshuman Khandual WARN_ON(!pud_young(pud_mkyoung(pud_mkold(pud)))); 303bb5c47ceSAnshuman Khandual WARN_ON(!pud_dirty(pud_mkdirty(pud_mkclean(pud)))); 304bb5c47ceSAnshuman Khandual WARN_ON(pud_dirty(pud_mkclean(pud_mkdirty(pud)))); 305399145f9SAnshuman Khandual WARN_ON(!pud_write(pud_mkwrite(pud_wrprotect(pud)))); 306399145f9SAnshuman Khandual WARN_ON(pud_write(pud_wrprotect(pud_mkwrite(pud)))); 307399145f9SAnshuman Khandual WARN_ON(pud_young(pud_mkold(pud_mkyoung(pud)))); 308bb5c47ceSAnshuman Khandual WARN_ON(pud_dirty(pud_wrprotect(pud_mkclean(pud)))); 309bb5c47ceSAnshuman Khandual WARN_ON(!pud_dirty(pud_wrprotect(pud_mkdirty(pud)))); 310399145f9SAnshuman Khandual 311399145f9SAnshuman Khandual if (mm_pmd_folded(mm)) 312399145f9SAnshuman Khandual return; 313399145f9SAnshuman Khandual 314399145f9SAnshuman Khandual /* 315399145f9SAnshuman Khandual * A huge page does not point to next level page table 316399145f9SAnshuman Khandual * entry. Hence this must qualify as pud_bad(). 317399145f9SAnshuman Khandual */ 318399145f9SAnshuman Khandual WARN_ON(!pud_bad(pud_mkhuge(pud))); 319399145f9SAnshuman Khandual } 320a5c3b9ffSAnshuman Khandual 321a5c3b9ffSAnshuman Khandual static void __init pud_advanced_tests(struct mm_struct *mm, 322a5c3b9ffSAnshuman Khandual struct vm_area_struct *vma, pud_t *pudp, 323a5c3b9ffSAnshuman Khandual unsigned long pfn, unsigned long vaddr, 324a5c3b9ffSAnshuman Khandual pgprot_t prot) 325a5c3b9ffSAnshuman Khandual { 326a5c3b9ffSAnshuman Khandual pud_t pud = pfn_pud(pfn, prot); 327a5c3b9ffSAnshuman Khandual 328a5c3b9ffSAnshuman Khandual if (!has_transparent_hugepage()) 329a5c3b9ffSAnshuman Khandual return; 330a5c3b9ffSAnshuman Khandual 3316315df41SAnshuman Khandual pr_debug("Validating PUD advanced\n"); 332a5c3b9ffSAnshuman Khandual /* Align the address wrt HPAGE_PUD_SIZE */ 333a5c3b9ffSAnshuman Khandual vaddr = (vaddr & HPAGE_PUD_MASK) + HPAGE_PUD_SIZE; 334a5c3b9ffSAnshuman Khandual 335a5c3b9ffSAnshuman Khandual set_pud_at(mm, vaddr, pudp, pud); 336a5c3b9ffSAnshuman Khandual pudp_set_wrprotect(mm, vaddr, pudp); 337a5c3b9ffSAnshuman Khandual pud = READ_ONCE(*pudp); 338a5c3b9ffSAnshuman Khandual WARN_ON(pud_write(pud)); 339a5c3b9ffSAnshuman Khandual 340a5c3b9ffSAnshuman Khandual #ifndef __PAGETABLE_PMD_FOLDED 341a5c3b9ffSAnshuman Khandual pudp_huge_get_and_clear(mm, vaddr, pudp); 342a5c3b9ffSAnshuman Khandual pud = READ_ONCE(*pudp); 343a5c3b9ffSAnshuman Khandual WARN_ON(!pud_none(pud)); 344a5c3b9ffSAnshuman Khandual #endif /* __PAGETABLE_PMD_FOLDED */ 345a5c3b9ffSAnshuman Khandual pud = pfn_pud(pfn, prot); 346a5c3b9ffSAnshuman Khandual pud = pud_wrprotect(pud); 347a5c3b9ffSAnshuman Khandual pud = pud_mkclean(pud); 348a5c3b9ffSAnshuman Khandual set_pud_at(mm, vaddr, pudp, pud); 349a5c3b9ffSAnshuman Khandual pud = pud_mkwrite(pud); 350a5c3b9ffSAnshuman Khandual pud = pud_mkdirty(pud); 351a5c3b9ffSAnshuman Khandual pudp_set_access_flags(vma, vaddr, pudp, pud, 1); 352a5c3b9ffSAnshuman Khandual pud = READ_ONCE(*pudp); 353a5c3b9ffSAnshuman Khandual WARN_ON(!(pud_write(pud) && pud_dirty(pud))); 354a5c3b9ffSAnshuman Khandual 355c3824e18SAneesh Kumar K.V #ifndef __PAGETABLE_PMD_FOLDED 356c3824e18SAneesh Kumar K.V pudp_huge_get_and_clear_full(mm, vaddr, pudp, 1); 357c3824e18SAneesh Kumar K.V pud = READ_ONCE(*pudp); 358c3824e18SAneesh Kumar K.V WARN_ON(!pud_none(pud)); 359c3824e18SAneesh Kumar K.V #endif /* __PAGETABLE_PMD_FOLDED */ 360c3824e18SAneesh Kumar K.V 361c3824e18SAneesh Kumar K.V pud = pfn_pud(pfn, prot); 362a5c3b9ffSAnshuman Khandual pud = pud_mkyoung(pud); 363a5c3b9ffSAnshuman Khandual set_pud_at(mm, vaddr, pudp, pud); 364a5c3b9ffSAnshuman Khandual pudp_test_and_clear_young(vma, vaddr, pudp); 365a5c3b9ffSAnshuman Khandual pud = READ_ONCE(*pudp); 366a5c3b9ffSAnshuman Khandual WARN_ON(pud_young(pud)); 36713af0506SAneesh Kumar K.V 36813af0506SAneesh Kumar K.V pudp_huge_get_and_clear(mm, vaddr, pudp); 369a5c3b9ffSAnshuman Khandual } 370a5c3b9ffSAnshuman Khandual 371a5c3b9ffSAnshuman Khandual static void __init pud_leaf_tests(unsigned long pfn, pgprot_t prot) 372a5c3b9ffSAnshuman Khandual { 373a5c3b9ffSAnshuman Khandual pud_t pud = pfn_pud(pfn, prot); 374a5c3b9ffSAnshuman Khandual 3756315df41SAnshuman Khandual pr_debug("Validating PUD leaf\n"); 376a5c3b9ffSAnshuman Khandual /* 377a5c3b9ffSAnshuman Khandual * PUD based THP is a leaf entry. 378a5c3b9ffSAnshuman Khandual */ 379a5c3b9ffSAnshuman Khandual pud = pud_mkhuge(pud); 380a5c3b9ffSAnshuman Khandual WARN_ON(!pud_leaf(pud)); 381a5c3b9ffSAnshuman Khandual } 382a5c3b9ffSAnshuman Khandual 38385a14463SAneesh Kumar K.V #ifdef CONFIG_HAVE_ARCH_HUGE_VMAP 384a5c3b9ffSAnshuman Khandual static void __init pud_huge_tests(pud_t *pudp, unsigned long pfn, pgprot_t prot) 385a5c3b9ffSAnshuman Khandual { 386a5c3b9ffSAnshuman Khandual pud_t pud; 387a5c3b9ffSAnshuman Khandual 388*bbc180a5SNicholas Piggin if (!arch_vmap_pud_supported(prot)) 389a5c3b9ffSAnshuman Khandual return; 3906315df41SAnshuman Khandual 3916315df41SAnshuman Khandual pr_debug("Validating PUD huge\n"); 392a5c3b9ffSAnshuman Khandual /* 393a5c3b9ffSAnshuman Khandual * X86 defined pud_set_huge() verifies that the given 394a5c3b9ffSAnshuman Khandual * PUD is not a populated non-leaf entry. 395a5c3b9ffSAnshuman Khandual */ 396a5c3b9ffSAnshuman Khandual WRITE_ONCE(*pudp, __pud(0)); 397a5c3b9ffSAnshuman Khandual WARN_ON(!pud_set_huge(pudp, __pfn_to_phys(pfn), prot)); 398a5c3b9ffSAnshuman Khandual WARN_ON(!pud_clear_huge(pudp)); 399a5c3b9ffSAnshuman Khandual pud = READ_ONCE(*pudp); 400a5c3b9ffSAnshuman Khandual WARN_ON(!pud_none(pud)); 401a5c3b9ffSAnshuman Khandual } 40285a14463SAneesh Kumar K.V #else /* !CONFIG_HAVE_ARCH_HUGE_VMAP */ 40385a14463SAneesh Kumar K.V static void __init pud_huge_tests(pud_t *pudp, unsigned long pfn, pgprot_t prot) { } 40485a14463SAneesh Kumar K.V #endif /* !CONFIG_HAVE_ARCH_HUGE_VMAP */ 40585a14463SAneesh Kumar K.V 406399145f9SAnshuman Khandual #else /* !CONFIG_HAVE_ARCH_TRANSPARENT_HUGEPAGE_PUD */ 4072e326c07SAnshuman Khandual static void __init pud_basic_tests(struct mm_struct *mm, unsigned long pfn, int idx) { } 408a5c3b9ffSAnshuman Khandual static void __init pud_advanced_tests(struct mm_struct *mm, 409a5c3b9ffSAnshuman Khandual struct vm_area_struct *vma, pud_t *pudp, 410a5c3b9ffSAnshuman Khandual unsigned long pfn, unsigned long vaddr, 411a5c3b9ffSAnshuman Khandual pgprot_t prot) 412a5c3b9ffSAnshuman Khandual { 413a5c3b9ffSAnshuman Khandual } 414a5c3b9ffSAnshuman Khandual static void __init pud_leaf_tests(unsigned long pfn, pgprot_t prot) { } 415a5c3b9ffSAnshuman Khandual static void __init pud_huge_tests(pud_t *pudp, unsigned long pfn, pgprot_t prot) 416a5c3b9ffSAnshuman Khandual { 417a5c3b9ffSAnshuman Khandual } 418399145f9SAnshuman Khandual #endif /* CONFIG_HAVE_ARCH_TRANSPARENT_HUGEPAGE_PUD */ 419399145f9SAnshuman Khandual #else /* !CONFIG_TRANSPARENT_HUGEPAGE */ 4202e326c07SAnshuman Khandual static void __init pmd_basic_tests(unsigned long pfn, int idx) { } 4212e326c07SAnshuman Khandual static void __init pud_basic_tests(struct mm_struct *mm, unsigned long pfn, int idx) { } 422a5c3b9ffSAnshuman Khandual static void __init pmd_advanced_tests(struct mm_struct *mm, 423a5c3b9ffSAnshuman Khandual struct vm_area_struct *vma, pmd_t *pmdp, 424a5c3b9ffSAnshuman Khandual unsigned long pfn, unsigned long vaddr, 42587f34986SAneesh Kumar K.V pgprot_t prot, pgtable_t pgtable) 426a5c3b9ffSAnshuman Khandual { 427a5c3b9ffSAnshuman Khandual } 428a5c3b9ffSAnshuman Khandual static void __init pud_advanced_tests(struct mm_struct *mm, 429a5c3b9ffSAnshuman Khandual struct vm_area_struct *vma, pud_t *pudp, 430a5c3b9ffSAnshuman Khandual unsigned long pfn, unsigned long vaddr, 431a5c3b9ffSAnshuman Khandual pgprot_t prot) 432a5c3b9ffSAnshuman Khandual { 433a5c3b9ffSAnshuman Khandual } 434a5c3b9ffSAnshuman Khandual static void __init pmd_leaf_tests(unsigned long pfn, pgprot_t prot) { } 435a5c3b9ffSAnshuman Khandual static void __init pud_leaf_tests(unsigned long pfn, pgprot_t prot) { } 436a5c3b9ffSAnshuman Khandual static void __init pmd_huge_tests(pmd_t *pmdp, unsigned long pfn, pgprot_t prot) 437a5c3b9ffSAnshuman Khandual { 438a5c3b9ffSAnshuman Khandual } 439a5c3b9ffSAnshuman Khandual static void __init pud_huge_tests(pud_t *pudp, unsigned long pfn, pgprot_t prot) 440a5c3b9ffSAnshuman Khandual { 441a5c3b9ffSAnshuman Khandual } 442a5c3b9ffSAnshuman Khandual static void __init pmd_savedwrite_tests(unsigned long pfn, pgprot_t prot) { } 443399145f9SAnshuman Khandual #endif /* CONFIG_TRANSPARENT_HUGEPAGE */ 444399145f9SAnshuman Khandual 445399145f9SAnshuman Khandual static void __init p4d_basic_tests(unsigned long pfn, pgprot_t prot) 446399145f9SAnshuman Khandual { 447399145f9SAnshuman Khandual p4d_t p4d; 448399145f9SAnshuman Khandual 4496315df41SAnshuman Khandual pr_debug("Validating P4D basic\n"); 450399145f9SAnshuman Khandual memset(&p4d, RANDOM_NZVALUE, sizeof(p4d_t)); 451399145f9SAnshuman Khandual WARN_ON(!p4d_same(p4d, p4d)); 452399145f9SAnshuman Khandual } 453399145f9SAnshuman Khandual 454399145f9SAnshuman Khandual static void __init pgd_basic_tests(unsigned long pfn, pgprot_t prot) 455399145f9SAnshuman Khandual { 456399145f9SAnshuman Khandual pgd_t pgd; 457399145f9SAnshuman Khandual 4586315df41SAnshuman Khandual pr_debug("Validating PGD basic\n"); 459399145f9SAnshuman Khandual memset(&pgd, RANDOM_NZVALUE, sizeof(pgd_t)); 460399145f9SAnshuman Khandual WARN_ON(!pgd_same(pgd, pgd)); 461399145f9SAnshuman Khandual } 462399145f9SAnshuman Khandual 463399145f9SAnshuman Khandual #ifndef __PAGETABLE_PUD_FOLDED 464399145f9SAnshuman Khandual static void __init pud_clear_tests(struct mm_struct *mm, pud_t *pudp) 465399145f9SAnshuman Khandual { 466399145f9SAnshuman Khandual pud_t pud = READ_ONCE(*pudp); 467399145f9SAnshuman Khandual 468399145f9SAnshuman Khandual if (mm_pmd_folded(mm)) 469399145f9SAnshuman Khandual return; 470399145f9SAnshuman Khandual 4716315df41SAnshuman Khandual pr_debug("Validating PUD clear\n"); 472399145f9SAnshuman Khandual pud = __pud(pud_val(pud) | RANDOM_ORVALUE); 473399145f9SAnshuman Khandual WRITE_ONCE(*pudp, pud); 474399145f9SAnshuman Khandual pud_clear(pudp); 475399145f9SAnshuman Khandual pud = READ_ONCE(*pudp); 476399145f9SAnshuman Khandual WARN_ON(!pud_none(pud)); 477399145f9SAnshuman Khandual } 478399145f9SAnshuman Khandual 479399145f9SAnshuman Khandual static void __init pud_populate_tests(struct mm_struct *mm, pud_t *pudp, 480399145f9SAnshuman Khandual pmd_t *pmdp) 481399145f9SAnshuman Khandual { 482399145f9SAnshuman Khandual pud_t pud; 483399145f9SAnshuman Khandual 484399145f9SAnshuman Khandual if (mm_pmd_folded(mm)) 485399145f9SAnshuman Khandual return; 4866315df41SAnshuman Khandual 4876315df41SAnshuman Khandual pr_debug("Validating PUD populate\n"); 488399145f9SAnshuman Khandual /* 489399145f9SAnshuman Khandual * This entry points to next level page table page. 490399145f9SAnshuman Khandual * Hence this must not qualify as pud_bad(). 491399145f9SAnshuman Khandual */ 492399145f9SAnshuman Khandual pud_populate(mm, pudp, pmdp); 493399145f9SAnshuman Khandual pud = READ_ONCE(*pudp); 494399145f9SAnshuman Khandual WARN_ON(pud_bad(pud)); 495399145f9SAnshuman Khandual } 496399145f9SAnshuman Khandual #else /* !__PAGETABLE_PUD_FOLDED */ 497399145f9SAnshuman Khandual static void __init pud_clear_tests(struct mm_struct *mm, pud_t *pudp) { } 498399145f9SAnshuman Khandual static void __init pud_populate_tests(struct mm_struct *mm, pud_t *pudp, 499399145f9SAnshuman Khandual pmd_t *pmdp) 500399145f9SAnshuman Khandual { 501399145f9SAnshuman Khandual } 502399145f9SAnshuman Khandual #endif /* PAGETABLE_PUD_FOLDED */ 503399145f9SAnshuman Khandual 504399145f9SAnshuman Khandual #ifndef __PAGETABLE_P4D_FOLDED 505399145f9SAnshuman Khandual static void __init p4d_clear_tests(struct mm_struct *mm, p4d_t *p4dp) 506399145f9SAnshuman Khandual { 507399145f9SAnshuman Khandual p4d_t p4d = READ_ONCE(*p4dp); 508399145f9SAnshuman Khandual 509399145f9SAnshuman Khandual if (mm_pud_folded(mm)) 510399145f9SAnshuman Khandual return; 511399145f9SAnshuman Khandual 5126315df41SAnshuman Khandual pr_debug("Validating P4D clear\n"); 513399145f9SAnshuman Khandual p4d = __p4d(p4d_val(p4d) | RANDOM_ORVALUE); 514399145f9SAnshuman Khandual WRITE_ONCE(*p4dp, p4d); 515399145f9SAnshuman Khandual p4d_clear(p4dp); 516399145f9SAnshuman Khandual p4d = READ_ONCE(*p4dp); 517399145f9SAnshuman Khandual WARN_ON(!p4d_none(p4d)); 518399145f9SAnshuman Khandual } 519399145f9SAnshuman Khandual 520399145f9SAnshuman Khandual static void __init p4d_populate_tests(struct mm_struct *mm, p4d_t *p4dp, 521399145f9SAnshuman Khandual pud_t *pudp) 522399145f9SAnshuman Khandual { 523399145f9SAnshuman Khandual p4d_t p4d; 524399145f9SAnshuman Khandual 525399145f9SAnshuman Khandual if (mm_pud_folded(mm)) 526399145f9SAnshuman Khandual return; 527399145f9SAnshuman Khandual 5286315df41SAnshuman Khandual pr_debug("Validating P4D populate\n"); 529399145f9SAnshuman Khandual /* 530399145f9SAnshuman Khandual * This entry points to next level page table page. 531399145f9SAnshuman Khandual * Hence this must not qualify as p4d_bad(). 532399145f9SAnshuman Khandual */ 533399145f9SAnshuman Khandual pud_clear(pudp); 534399145f9SAnshuman Khandual p4d_clear(p4dp); 535399145f9SAnshuman Khandual p4d_populate(mm, p4dp, pudp); 536399145f9SAnshuman Khandual p4d = READ_ONCE(*p4dp); 537399145f9SAnshuman Khandual WARN_ON(p4d_bad(p4d)); 538399145f9SAnshuman Khandual } 539399145f9SAnshuman Khandual 540399145f9SAnshuman Khandual static void __init pgd_clear_tests(struct mm_struct *mm, pgd_t *pgdp) 541399145f9SAnshuman Khandual { 542399145f9SAnshuman Khandual pgd_t pgd = READ_ONCE(*pgdp); 543399145f9SAnshuman Khandual 544399145f9SAnshuman Khandual if (mm_p4d_folded(mm)) 545399145f9SAnshuman Khandual return; 546399145f9SAnshuman Khandual 5476315df41SAnshuman Khandual pr_debug("Validating PGD clear\n"); 548399145f9SAnshuman Khandual pgd = __pgd(pgd_val(pgd) | RANDOM_ORVALUE); 549399145f9SAnshuman Khandual WRITE_ONCE(*pgdp, pgd); 550399145f9SAnshuman Khandual pgd_clear(pgdp); 551399145f9SAnshuman Khandual pgd = READ_ONCE(*pgdp); 552399145f9SAnshuman Khandual WARN_ON(!pgd_none(pgd)); 553399145f9SAnshuman Khandual } 554399145f9SAnshuman Khandual 555399145f9SAnshuman Khandual static void __init pgd_populate_tests(struct mm_struct *mm, pgd_t *pgdp, 556399145f9SAnshuman Khandual p4d_t *p4dp) 557399145f9SAnshuman Khandual { 558399145f9SAnshuman Khandual pgd_t pgd; 559399145f9SAnshuman Khandual 560399145f9SAnshuman Khandual if (mm_p4d_folded(mm)) 561399145f9SAnshuman Khandual return; 562399145f9SAnshuman Khandual 5636315df41SAnshuman Khandual pr_debug("Validating PGD populate\n"); 564399145f9SAnshuman Khandual /* 565399145f9SAnshuman Khandual * This entry points to next level page table page. 566399145f9SAnshuman Khandual * Hence this must not qualify as pgd_bad(). 567399145f9SAnshuman Khandual */ 568399145f9SAnshuman Khandual p4d_clear(p4dp); 569399145f9SAnshuman Khandual pgd_clear(pgdp); 570399145f9SAnshuman Khandual pgd_populate(mm, pgdp, p4dp); 571399145f9SAnshuman Khandual pgd = READ_ONCE(*pgdp); 572399145f9SAnshuman Khandual WARN_ON(pgd_bad(pgd)); 573399145f9SAnshuman Khandual } 574399145f9SAnshuman Khandual #else /* !__PAGETABLE_P4D_FOLDED */ 575399145f9SAnshuman Khandual static void __init p4d_clear_tests(struct mm_struct *mm, p4d_t *p4dp) { } 576399145f9SAnshuman Khandual static void __init pgd_clear_tests(struct mm_struct *mm, pgd_t *pgdp) { } 577399145f9SAnshuman Khandual static void __init p4d_populate_tests(struct mm_struct *mm, p4d_t *p4dp, 578399145f9SAnshuman Khandual pud_t *pudp) 579399145f9SAnshuman Khandual { 580399145f9SAnshuman Khandual } 581399145f9SAnshuman Khandual static void __init pgd_populate_tests(struct mm_struct *mm, pgd_t *pgdp, 582399145f9SAnshuman Khandual p4d_t *p4dp) 583399145f9SAnshuman Khandual { 584399145f9SAnshuman Khandual } 585399145f9SAnshuman Khandual #endif /* PAGETABLE_P4D_FOLDED */ 586399145f9SAnshuman Khandual 587399145f9SAnshuman Khandual static void __init pte_clear_tests(struct mm_struct *mm, pte_t *ptep, 588401035d5SAneesh Kumar K.V unsigned long pfn, unsigned long vaddr, 589401035d5SAneesh Kumar K.V pgprot_t prot) 590399145f9SAnshuman Khandual { 591401035d5SAneesh Kumar K.V pte_t pte = pfn_pte(pfn, prot); 592399145f9SAnshuman Khandual 5936315df41SAnshuman Khandual pr_debug("Validating PTE clear\n"); 594401035d5SAneesh Kumar K.V #ifndef CONFIG_RISCV 595399145f9SAnshuman Khandual pte = __pte(pte_val(pte) | RANDOM_ORVALUE); 596401035d5SAneesh Kumar K.V #endif 597399145f9SAnshuman Khandual set_pte_at(mm, vaddr, ptep, pte); 598399145f9SAnshuman Khandual barrier(); 599399145f9SAnshuman Khandual pte_clear(mm, vaddr, ptep); 6009449c9cbSChristophe Leroy pte = ptep_get(ptep); 601399145f9SAnshuman Khandual WARN_ON(!pte_none(pte)); 602399145f9SAnshuman Khandual } 603399145f9SAnshuman Khandual 604399145f9SAnshuman Khandual static void __init pmd_clear_tests(struct mm_struct *mm, pmd_t *pmdp) 605399145f9SAnshuman Khandual { 606399145f9SAnshuman Khandual pmd_t pmd = READ_ONCE(*pmdp); 607399145f9SAnshuman Khandual 6086315df41SAnshuman Khandual pr_debug("Validating PMD clear\n"); 609399145f9SAnshuman Khandual pmd = __pmd(pmd_val(pmd) | RANDOM_ORVALUE); 610399145f9SAnshuman Khandual WRITE_ONCE(*pmdp, pmd); 611399145f9SAnshuman Khandual pmd_clear(pmdp); 612399145f9SAnshuman Khandual pmd = READ_ONCE(*pmdp); 613399145f9SAnshuman Khandual WARN_ON(!pmd_none(pmd)); 614399145f9SAnshuman Khandual } 615399145f9SAnshuman Khandual 616399145f9SAnshuman Khandual static void __init pmd_populate_tests(struct mm_struct *mm, pmd_t *pmdp, 617399145f9SAnshuman Khandual pgtable_t pgtable) 618399145f9SAnshuman Khandual { 619399145f9SAnshuman Khandual pmd_t pmd; 620399145f9SAnshuman Khandual 6216315df41SAnshuman Khandual pr_debug("Validating PMD populate\n"); 622399145f9SAnshuman Khandual /* 623399145f9SAnshuman Khandual * This entry points to next level page table page. 624399145f9SAnshuman Khandual * Hence this must not qualify as pmd_bad(). 625399145f9SAnshuman Khandual */ 626399145f9SAnshuman Khandual pmd_populate(mm, pmdp, pgtable); 627399145f9SAnshuman Khandual pmd = READ_ONCE(*pmdp); 628399145f9SAnshuman Khandual WARN_ON(pmd_bad(pmd)); 629399145f9SAnshuman Khandual } 630399145f9SAnshuman Khandual 63105289402SAnshuman Khandual static void __init pte_special_tests(unsigned long pfn, pgprot_t prot) 63205289402SAnshuman Khandual { 63305289402SAnshuman Khandual pte_t pte = pfn_pte(pfn, prot); 63405289402SAnshuman Khandual 63505289402SAnshuman Khandual if (!IS_ENABLED(CONFIG_ARCH_HAS_PTE_SPECIAL)) 63605289402SAnshuman Khandual return; 63705289402SAnshuman Khandual 6386315df41SAnshuman Khandual pr_debug("Validating PTE special\n"); 63905289402SAnshuman Khandual WARN_ON(!pte_special(pte_mkspecial(pte))); 64005289402SAnshuman Khandual } 64105289402SAnshuman Khandual 64205289402SAnshuman Khandual static void __init pte_protnone_tests(unsigned long pfn, pgprot_t prot) 64305289402SAnshuman Khandual { 64405289402SAnshuman Khandual pte_t pte = pfn_pte(pfn, prot); 64505289402SAnshuman Khandual 64605289402SAnshuman Khandual if (!IS_ENABLED(CONFIG_NUMA_BALANCING)) 64705289402SAnshuman Khandual return; 64805289402SAnshuman Khandual 6496315df41SAnshuman Khandual pr_debug("Validating PTE protnone\n"); 65005289402SAnshuman Khandual WARN_ON(!pte_protnone(pte)); 65105289402SAnshuman Khandual WARN_ON(!pte_present(pte)); 65205289402SAnshuman Khandual } 65305289402SAnshuman Khandual 65405289402SAnshuman Khandual #ifdef CONFIG_TRANSPARENT_HUGEPAGE 65505289402SAnshuman Khandual static void __init pmd_protnone_tests(unsigned long pfn, pgprot_t prot) 65605289402SAnshuman Khandual { 65705289402SAnshuman Khandual pmd_t pmd = pmd_mkhuge(pfn_pmd(pfn, prot)); 65805289402SAnshuman Khandual 65905289402SAnshuman Khandual if (!IS_ENABLED(CONFIG_NUMA_BALANCING)) 66005289402SAnshuman Khandual return; 66105289402SAnshuman Khandual 6626315df41SAnshuman Khandual pr_debug("Validating PMD protnone\n"); 66305289402SAnshuman Khandual WARN_ON(!pmd_protnone(pmd)); 66405289402SAnshuman Khandual WARN_ON(!pmd_present(pmd)); 66505289402SAnshuman Khandual } 66605289402SAnshuman Khandual #else /* !CONFIG_TRANSPARENT_HUGEPAGE */ 66705289402SAnshuman Khandual static void __init pmd_protnone_tests(unsigned long pfn, pgprot_t prot) { } 66805289402SAnshuman Khandual #endif /* CONFIG_TRANSPARENT_HUGEPAGE */ 66905289402SAnshuman Khandual 67005289402SAnshuman Khandual #ifdef CONFIG_ARCH_HAS_PTE_DEVMAP 67105289402SAnshuman Khandual static void __init pte_devmap_tests(unsigned long pfn, pgprot_t prot) 67205289402SAnshuman Khandual { 67305289402SAnshuman Khandual pte_t pte = pfn_pte(pfn, prot); 67405289402SAnshuman Khandual 6756315df41SAnshuman Khandual pr_debug("Validating PTE devmap\n"); 67605289402SAnshuman Khandual WARN_ON(!pte_devmap(pte_mkdevmap(pte))); 67705289402SAnshuman Khandual } 67805289402SAnshuman Khandual 67905289402SAnshuman Khandual #ifdef CONFIG_TRANSPARENT_HUGEPAGE 68005289402SAnshuman Khandual static void __init pmd_devmap_tests(unsigned long pfn, pgprot_t prot) 68105289402SAnshuman Khandual { 68205289402SAnshuman Khandual pmd_t pmd = pfn_pmd(pfn, prot); 68305289402SAnshuman Khandual 6846315df41SAnshuman Khandual pr_debug("Validating PMD devmap\n"); 68505289402SAnshuman Khandual WARN_ON(!pmd_devmap(pmd_mkdevmap(pmd))); 68605289402SAnshuman Khandual } 68705289402SAnshuman Khandual 68805289402SAnshuman Khandual #ifdef CONFIG_HAVE_ARCH_TRANSPARENT_HUGEPAGE_PUD 68905289402SAnshuman Khandual static void __init pud_devmap_tests(unsigned long pfn, pgprot_t prot) 69005289402SAnshuman Khandual { 69105289402SAnshuman Khandual pud_t pud = pfn_pud(pfn, prot); 69205289402SAnshuman Khandual 6936315df41SAnshuman Khandual pr_debug("Validating PUD devmap\n"); 69405289402SAnshuman Khandual WARN_ON(!pud_devmap(pud_mkdevmap(pud))); 69505289402SAnshuman Khandual } 69605289402SAnshuman Khandual #else /* !CONFIG_HAVE_ARCH_TRANSPARENT_HUGEPAGE_PUD */ 69705289402SAnshuman Khandual static void __init pud_devmap_tests(unsigned long pfn, pgprot_t prot) { } 69805289402SAnshuman Khandual #endif /* CONFIG_HAVE_ARCH_TRANSPARENT_HUGEPAGE_PUD */ 69905289402SAnshuman Khandual #else /* CONFIG_TRANSPARENT_HUGEPAGE */ 70005289402SAnshuman Khandual static void __init pmd_devmap_tests(unsigned long pfn, pgprot_t prot) { } 70105289402SAnshuman Khandual static void __init pud_devmap_tests(unsigned long pfn, pgprot_t prot) { } 70205289402SAnshuman Khandual #endif /* CONFIG_TRANSPARENT_HUGEPAGE */ 70305289402SAnshuman Khandual #else 70405289402SAnshuman Khandual static void __init pte_devmap_tests(unsigned long pfn, pgprot_t prot) { } 70505289402SAnshuman Khandual static void __init pmd_devmap_tests(unsigned long pfn, pgprot_t prot) { } 70605289402SAnshuman Khandual static void __init pud_devmap_tests(unsigned long pfn, pgprot_t prot) { } 70705289402SAnshuman Khandual #endif /* CONFIG_ARCH_HAS_PTE_DEVMAP */ 70805289402SAnshuman Khandual 70905289402SAnshuman Khandual static void __init pte_soft_dirty_tests(unsigned long pfn, pgprot_t prot) 71005289402SAnshuman Khandual { 71105289402SAnshuman Khandual pte_t pte = pfn_pte(pfn, prot); 71205289402SAnshuman Khandual 71305289402SAnshuman Khandual if (!IS_ENABLED(CONFIG_MEM_SOFT_DIRTY)) 71405289402SAnshuman Khandual return; 71505289402SAnshuman Khandual 7166315df41SAnshuman Khandual pr_debug("Validating PTE soft dirty\n"); 71705289402SAnshuman Khandual WARN_ON(!pte_soft_dirty(pte_mksoft_dirty(pte))); 71805289402SAnshuman Khandual WARN_ON(pte_soft_dirty(pte_clear_soft_dirty(pte))); 71905289402SAnshuman Khandual } 72005289402SAnshuman Khandual 72105289402SAnshuman Khandual static void __init pte_swap_soft_dirty_tests(unsigned long pfn, pgprot_t prot) 72205289402SAnshuman Khandual { 72305289402SAnshuman Khandual pte_t pte = pfn_pte(pfn, prot); 72405289402SAnshuman Khandual 72505289402SAnshuman Khandual if (!IS_ENABLED(CONFIG_MEM_SOFT_DIRTY)) 72605289402SAnshuman Khandual return; 72705289402SAnshuman Khandual 7286315df41SAnshuman Khandual pr_debug("Validating PTE swap soft dirty\n"); 72905289402SAnshuman Khandual WARN_ON(!pte_swp_soft_dirty(pte_swp_mksoft_dirty(pte))); 73005289402SAnshuman Khandual WARN_ON(pte_swp_soft_dirty(pte_swp_clear_soft_dirty(pte))); 73105289402SAnshuman Khandual } 73205289402SAnshuman Khandual 73305289402SAnshuman Khandual #ifdef CONFIG_TRANSPARENT_HUGEPAGE 73405289402SAnshuman Khandual static void __init pmd_soft_dirty_tests(unsigned long pfn, pgprot_t prot) 73505289402SAnshuman Khandual { 73605289402SAnshuman Khandual pmd_t pmd = pfn_pmd(pfn, prot); 73705289402SAnshuman Khandual 73805289402SAnshuman Khandual if (!IS_ENABLED(CONFIG_MEM_SOFT_DIRTY)) 73905289402SAnshuman Khandual return; 74005289402SAnshuman Khandual 7416315df41SAnshuman Khandual pr_debug("Validating PMD soft dirty\n"); 74205289402SAnshuman Khandual WARN_ON(!pmd_soft_dirty(pmd_mksoft_dirty(pmd))); 74305289402SAnshuman Khandual WARN_ON(pmd_soft_dirty(pmd_clear_soft_dirty(pmd))); 74405289402SAnshuman Khandual } 74505289402SAnshuman Khandual 74605289402SAnshuman Khandual static void __init pmd_swap_soft_dirty_tests(unsigned long pfn, pgprot_t prot) 74705289402SAnshuman Khandual { 74805289402SAnshuman Khandual pmd_t pmd = pfn_pmd(pfn, prot); 74905289402SAnshuman Khandual 75005289402SAnshuman Khandual if (!IS_ENABLED(CONFIG_MEM_SOFT_DIRTY) || 75105289402SAnshuman Khandual !IS_ENABLED(CONFIG_ARCH_ENABLE_THP_MIGRATION)) 75205289402SAnshuman Khandual return; 75305289402SAnshuman Khandual 7546315df41SAnshuman Khandual pr_debug("Validating PMD swap soft dirty\n"); 75505289402SAnshuman Khandual WARN_ON(!pmd_swp_soft_dirty(pmd_swp_mksoft_dirty(pmd))); 75605289402SAnshuman Khandual WARN_ON(pmd_swp_soft_dirty(pmd_swp_clear_soft_dirty(pmd))); 75705289402SAnshuman Khandual } 75805289402SAnshuman Khandual #else /* !CONFIG_ARCH_HAS_PTE_DEVMAP */ 75905289402SAnshuman Khandual static void __init pmd_soft_dirty_tests(unsigned long pfn, pgprot_t prot) { } 76005289402SAnshuman Khandual static void __init pmd_swap_soft_dirty_tests(unsigned long pfn, pgprot_t prot) 76105289402SAnshuman Khandual { 76205289402SAnshuman Khandual } 76305289402SAnshuman Khandual #endif /* CONFIG_ARCH_HAS_PTE_DEVMAP */ 76405289402SAnshuman Khandual 76505289402SAnshuman Khandual static void __init pte_swap_tests(unsigned long pfn, pgprot_t prot) 76605289402SAnshuman Khandual { 76705289402SAnshuman Khandual swp_entry_t swp; 76805289402SAnshuman Khandual pte_t pte; 76905289402SAnshuman Khandual 7706315df41SAnshuman Khandual pr_debug("Validating PTE swap\n"); 77105289402SAnshuman Khandual pte = pfn_pte(pfn, prot); 77205289402SAnshuman Khandual swp = __pte_to_swp_entry(pte); 77305289402SAnshuman Khandual pte = __swp_entry_to_pte(swp); 77405289402SAnshuman Khandual WARN_ON(pfn != pte_pfn(pte)); 77505289402SAnshuman Khandual } 77605289402SAnshuman Khandual 77705289402SAnshuman Khandual #ifdef CONFIG_ARCH_ENABLE_THP_MIGRATION 77805289402SAnshuman Khandual static void __init pmd_swap_tests(unsigned long pfn, pgprot_t prot) 77905289402SAnshuman Khandual { 78005289402SAnshuman Khandual swp_entry_t swp; 78105289402SAnshuman Khandual pmd_t pmd; 78205289402SAnshuman Khandual 7836315df41SAnshuman Khandual pr_debug("Validating PMD swap\n"); 78405289402SAnshuman Khandual pmd = pfn_pmd(pfn, prot); 78505289402SAnshuman Khandual swp = __pmd_to_swp_entry(pmd); 78605289402SAnshuman Khandual pmd = __swp_entry_to_pmd(swp); 78705289402SAnshuman Khandual WARN_ON(pfn != pmd_pfn(pmd)); 78805289402SAnshuman Khandual } 78905289402SAnshuman Khandual #else /* !CONFIG_ARCH_ENABLE_THP_MIGRATION */ 79005289402SAnshuman Khandual static void __init pmd_swap_tests(unsigned long pfn, pgprot_t prot) { } 79105289402SAnshuman Khandual #endif /* CONFIG_ARCH_ENABLE_THP_MIGRATION */ 79205289402SAnshuman Khandual 79305289402SAnshuman Khandual static void __init swap_migration_tests(void) 79405289402SAnshuman Khandual { 79505289402SAnshuman Khandual struct page *page; 79605289402SAnshuman Khandual swp_entry_t swp; 79705289402SAnshuman Khandual 79805289402SAnshuman Khandual if (!IS_ENABLED(CONFIG_MIGRATION)) 79905289402SAnshuman Khandual return; 8006315df41SAnshuman Khandual 8016315df41SAnshuman Khandual pr_debug("Validating swap migration\n"); 80205289402SAnshuman Khandual /* 80305289402SAnshuman Khandual * swap_migration_tests() requires a dedicated page as it needs to 80405289402SAnshuman Khandual * be locked before creating a migration entry from it. Locking the 80505289402SAnshuman Khandual * page that actually maps kernel text ('start_kernel') can be real 80605289402SAnshuman Khandual * problematic. Lets allocate a dedicated page explicitly for this 80705289402SAnshuman Khandual * purpose that will be freed subsequently. 80805289402SAnshuman Khandual */ 80905289402SAnshuman Khandual page = alloc_page(GFP_KERNEL); 81005289402SAnshuman Khandual if (!page) { 81105289402SAnshuman Khandual pr_err("page allocation failed\n"); 81205289402SAnshuman Khandual return; 81305289402SAnshuman Khandual } 81405289402SAnshuman Khandual 81505289402SAnshuman Khandual /* 81605289402SAnshuman Khandual * make_migration_entry() expects given page to be 81705289402SAnshuman Khandual * locked, otherwise it stumbles upon a BUG_ON(). 81805289402SAnshuman Khandual */ 81905289402SAnshuman Khandual __SetPageLocked(page); 82005289402SAnshuman Khandual swp = make_migration_entry(page, 1); 82105289402SAnshuman Khandual WARN_ON(!is_migration_entry(swp)); 82205289402SAnshuman Khandual WARN_ON(!is_write_migration_entry(swp)); 82305289402SAnshuman Khandual 82405289402SAnshuman Khandual make_migration_entry_read(&swp); 82505289402SAnshuman Khandual WARN_ON(!is_migration_entry(swp)); 82605289402SAnshuman Khandual WARN_ON(is_write_migration_entry(swp)); 82705289402SAnshuman Khandual 82805289402SAnshuman Khandual swp = make_migration_entry(page, 0); 82905289402SAnshuman Khandual WARN_ON(!is_migration_entry(swp)); 83005289402SAnshuman Khandual WARN_ON(is_write_migration_entry(swp)); 83105289402SAnshuman Khandual __ClearPageLocked(page); 83205289402SAnshuman Khandual __free_page(page); 83305289402SAnshuman Khandual } 83405289402SAnshuman Khandual 83505289402SAnshuman Khandual #ifdef CONFIG_HUGETLB_PAGE 83605289402SAnshuman Khandual static void __init hugetlb_basic_tests(unsigned long pfn, pgprot_t prot) 83705289402SAnshuman Khandual { 83805289402SAnshuman Khandual struct page *page; 83905289402SAnshuman Khandual pte_t pte; 84005289402SAnshuman Khandual 8416315df41SAnshuman Khandual pr_debug("Validating HugeTLB basic\n"); 84205289402SAnshuman Khandual /* 84305289402SAnshuman Khandual * Accessing the page associated with the pfn is safe here, 84405289402SAnshuman Khandual * as it was previously derived from a real kernel symbol. 84505289402SAnshuman Khandual */ 84605289402SAnshuman Khandual page = pfn_to_page(pfn); 84705289402SAnshuman Khandual pte = mk_huge_pte(page, prot); 84805289402SAnshuman Khandual 84905289402SAnshuman Khandual WARN_ON(!huge_pte_dirty(huge_pte_mkdirty(pte))); 85005289402SAnshuman Khandual WARN_ON(!huge_pte_write(huge_pte_mkwrite(huge_pte_wrprotect(pte)))); 85105289402SAnshuman Khandual WARN_ON(huge_pte_write(huge_pte_wrprotect(huge_pte_mkwrite(pte)))); 85205289402SAnshuman Khandual 85305289402SAnshuman Khandual #ifdef CONFIG_ARCH_WANT_GENERAL_HUGETLB 85405289402SAnshuman Khandual pte = pfn_pte(pfn, prot); 85505289402SAnshuman Khandual 85605289402SAnshuman Khandual WARN_ON(!pte_huge(pte_mkhuge(pte))); 85705289402SAnshuman Khandual #endif /* CONFIG_ARCH_WANT_GENERAL_HUGETLB */ 85805289402SAnshuman Khandual } 85905289402SAnshuman Khandual #else /* !CONFIG_HUGETLB_PAGE */ 86005289402SAnshuman Khandual static void __init hugetlb_basic_tests(unsigned long pfn, pgprot_t prot) { } 86105289402SAnshuman Khandual #endif /* CONFIG_HUGETLB_PAGE */ 86205289402SAnshuman Khandual 86305289402SAnshuman Khandual #ifdef CONFIG_TRANSPARENT_HUGEPAGE 86405289402SAnshuman Khandual static void __init pmd_thp_tests(unsigned long pfn, pgprot_t prot) 86505289402SAnshuman Khandual { 86605289402SAnshuman Khandual pmd_t pmd; 86705289402SAnshuman Khandual 86805289402SAnshuman Khandual if (!has_transparent_hugepage()) 86905289402SAnshuman Khandual return; 87005289402SAnshuman Khandual 8716315df41SAnshuman Khandual pr_debug("Validating PMD based THP\n"); 87205289402SAnshuman Khandual /* 87305289402SAnshuman Khandual * pmd_trans_huge() and pmd_present() must return positive after 87405289402SAnshuman Khandual * MMU invalidation with pmd_mkinvalid(). This behavior is an 87505289402SAnshuman Khandual * optimization for transparent huge page. pmd_trans_huge() must 87605289402SAnshuman Khandual * be true if pmd_page() returns a valid THP to avoid taking the 87705289402SAnshuman Khandual * pmd_lock when others walk over non transhuge pmds (i.e. there 87805289402SAnshuman Khandual * are no THP allocated). Especially when splitting a THP and 87905289402SAnshuman Khandual * removing the present bit from the pmd, pmd_trans_huge() still 88005289402SAnshuman Khandual * needs to return true. pmd_present() should be true whenever 88105289402SAnshuman Khandual * pmd_trans_huge() returns true. 88205289402SAnshuman Khandual */ 88305289402SAnshuman Khandual pmd = pfn_pmd(pfn, prot); 88405289402SAnshuman Khandual WARN_ON(!pmd_trans_huge(pmd_mkhuge(pmd))); 88505289402SAnshuman Khandual 88605289402SAnshuman Khandual #ifndef __HAVE_ARCH_PMDP_INVALIDATE 88705289402SAnshuman Khandual WARN_ON(!pmd_trans_huge(pmd_mkinvalid(pmd_mkhuge(pmd)))); 88805289402SAnshuman Khandual WARN_ON(!pmd_present(pmd_mkinvalid(pmd_mkhuge(pmd)))); 88905289402SAnshuman Khandual #endif /* __HAVE_ARCH_PMDP_INVALIDATE */ 89005289402SAnshuman Khandual } 89105289402SAnshuman Khandual 89205289402SAnshuman Khandual #ifdef CONFIG_HAVE_ARCH_TRANSPARENT_HUGEPAGE_PUD 89305289402SAnshuman Khandual static void __init pud_thp_tests(unsigned long pfn, pgprot_t prot) 89405289402SAnshuman Khandual { 89505289402SAnshuman Khandual pud_t pud; 89605289402SAnshuman Khandual 89705289402SAnshuman Khandual if (!has_transparent_hugepage()) 89805289402SAnshuman Khandual return; 89905289402SAnshuman Khandual 9006315df41SAnshuman Khandual pr_debug("Validating PUD based THP\n"); 90105289402SAnshuman Khandual pud = pfn_pud(pfn, prot); 90205289402SAnshuman Khandual WARN_ON(!pud_trans_huge(pud_mkhuge(pud))); 90305289402SAnshuman Khandual 90405289402SAnshuman Khandual /* 90505289402SAnshuman Khandual * pud_mkinvalid() has been dropped for now. Enable back 90605289402SAnshuman Khandual * these tests when it comes back with a modified pud_present(). 90705289402SAnshuman Khandual * 90805289402SAnshuman Khandual * WARN_ON(!pud_trans_huge(pud_mkinvalid(pud_mkhuge(pud)))); 90905289402SAnshuman Khandual * WARN_ON(!pud_present(pud_mkinvalid(pud_mkhuge(pud)))); 91005289402SAnshuman Khandual */ 91105289402SAnshuman Khandual } 91205289402SAnshuman Khandual #else /* !CONFIG_HAVE_ARCH_TRANSPARENT_HUGEPAGE_PUD */ 91305289402SAnshuman Khandual static void __init pud_thp_tests(unsigned long pfn, pgprot_t prot) { } 91405289402SAnshuman Khandual #endif /* CONFIG_HAVE_ARCH_TRANSPARENT_HUGEPAGE_PUD */ 91505289402SAnshuman Khandual #else /* !CONFIG_TRANSPARENT_HUGEPAGE */ 91605289402SAnshuman Khandual static void __init pmd_thp_tests(unsigned long pfn, pgprot_t prot) { } 91705289402SAnshuman Khandual static void __init pud_thp_tests(unsigned long pfn, pgprot_t prot) { } 91805289402SAnshuman Khandual #endif /* CONFIG_TRANSPARENT_HUGEPAGE */ 91905289402SAnshuman Khandual 920399145f9SAnshuman Khandual static unsigned long __init get_random_vaddr(void) 921399145f9SAnshuman Khandual { 922399145f9SAnshuman Khandual unsigned long random_vaddr, random_pages, total_user_pages; 923399145f9SAnshuman Khandual 924399145f9SAnshuman Khandual total_user_pages = (TASK_SIZE - FIRST_USER_ADDRESS) / PAGE_SIZE; 925399145f9SAnshuman Khandual 926399145f9SAnshuman Khandual random_pages = get_random_long() % total_user_pages; 927399145f9SAnshuman Khandual random_vaddr = FIRST_USER_ADDRESS + random_pages * PAGE_SIZE; 928399145f9SAnshuman Khandual 929399145f9SAnshuman Khandual return random_vaddr; 930399145f9SAnshuman Khandual } 931399145f9SAnshuman Khandual 932399145f9SAnshuman Khandual static int __init debug_vm_pgtable(void) 933399145f9SAnshuman Khandual { 934a5c3b9ffSAnshuman Khandual struct vm_area_struct *vma; 935399145f9SAnshuman Khandual struct mm_struct *mm; 936399145f9SAnshuman Khandual pgd_t *pgdp; 937399145f9SAnshuman Khandual p4d_t *p4dp, *saved_p4dp; 938399145f9SAnshuman Khandual pud_t *pudp, *saved_pudp; 939399145f9SAnshuman Khandual pmd_t *pmdp, *saved_pmdp, pmd; 940399145f9SAnshuman Khandual pte_t *ptep; 941399145f9SAnshuman Khandual pgtable_t saved_ptep; 94205289402SAnshuman Khandual pgprot_t prot, protnone; 943399145f9SAnshuman Khandual phys_addr_t paddr; 944399145f9SAnshuman Khandual unsigned long vaddr, pte_aligned, pmd_aligned; 945399145f9SAnshuman Khandual unsigned long pud_aligned, p4d_aligned, pgd_aligned; 946fea1120cSKees Cook spinlock_t *ptl = NULL; 9472e326c07SAnshuman Khandual int idx; 948399145f9SAnshuman Khandual 949399145f9SAnshuman Khandual pr_info("Validating architecture page table helpers\n"); 950399145f9SAnshuman Khandual prot = vm_get_page_prot(VMFLAGS); 951399145f9SAnshuman Khandual vaddr = get_random_vaddr(); 952399145f9SAnshuman Khandual mm = mm_alloc(); 953399145f9SAnshuman Khandual if (!mm) { 954399145f9SAnshuman Khandual pr_err("mm_struct allocation failed\n"); 955399145f9SAnshuman Khandual return 1; 956399145f9SAnshuman Khandual } 957399145f9SAnshuman Khandual 958399145f9SAnshuman Khandual /* 95905289402SAnshuman Khandual * __P000 (or even __S000) will help create page table entries with 96005289402SAnshuman Khandual * PROT_NONE permission as required for pxx_protnone_tests(). 96105289402SAnshuman Khandual */ 96205289402SAnshuman Khandual protnone = __P000; 96305289402SAnshuman Khandual 964a5c3b9ffSAnshuman Khandual vma = vm_area_alloc(mm); 965a5c3b9ffSAnshuman Khandual if (!vma) { 966a5c3b9ffSAnshuman Khandual pr_err("vma allocation failed\n"); 967a5c3b9ffSAnshuman Khandual return 1; 968a5c3b9ffSAnshuman Khandual } 969a5c3b9ffSAnshuman Khandual 97005289402SAnshuman Khandual /* 971399145f9SAnshuman Khandual * PFN for mapping at PTE level is determined from a standard kernel 972399145f9SAnshuman Khandual * text symbol. But pfns for higher page table levels are derived by 973399145f9SAnshuman Khandual * masking lower bits of this real pfn. These derived pfns might not 974399145f9SAnshuman Khandual * exist on the platform but that does not really matter as pfn_pxx() 975399145f9SAnshuman Khandual * helpers will still create appropriate entries for the test. This 976399145f9SAnshuman Khandual * helps avoid large memory block allocations to be used for mapping 977399145f9SAnshuman Khandual * at higher page table levels. 978399145f9SAnshuman Khandual */ 979399145f9SAnshuman Khandual paddr = __pa_symbol(&start_kernel); 980399145f9SAnshuman Khandual 981399145f9SAnshuman Khandual pte_aligned = (paddr & PAGE_MASK) >> PAGE_SHIFT; 982399145f9SAnshuman Khandual pmd_aligned = (paddr & PMD_MASK) >> PAGE_SHIFT; 983399145f9SAnshuman Khandual pud_aligned = (paddr & PUD_MASK) >> PAGE_SHIFT; 984399145f9SAnshuman Khandual p4d_aligned = (paddr & P4D_MASK) >> PAGE_SHIFT; 985399145f9SAnshuman Khandual pgd_aligned = (paddr & PGDIR_MASK) >> PAGE_SHIFT; 986399145f9SAnshuman Khandual WARN_ON(!pfn_valid(pte_aligned)); 987399145f9SAnshuman Khandual 988399145f9SAnshuman Khandual pgdp = pgd_offset(mm, vaddr); 989399145f9SAnshuman Khandual p4dp = p4d_alloc(mm, pgdp, vaddr); 990399145f9SAnshuman Khandual pudp = pud_alloc(mm, p4dp, vaddr); 991399145f9SAnshuman Khandual pmdp = pmd_alloc(mm, pudp, vaddr); 992f14312e1SAneesh Kumar K.V /* 993f14312e1SAneesh Kumar K.V * Allocate pgtable_t 994f14312e1SAneesh Kumar K.V */ 995f14312e1SAneesh Kumar K.V if (pte_alloc(mm, pmdp)) { 996f14312e1SAneesh Kumar K.V pr_err("pgtable allocation failed\n"); 997f14312e1SAneesh Kumar K.V return 1; 998f14312e1SAneesh Kumar K.V } 999399145f9SAnshuman Khandual 1000399145f9SAnshuman Khandual /* 1001399145f9SAnshuman Khandual * Save all the page table page addresses as the page table 1002399145f9SAnshuman Khandual * entries will be used for testing with random or garbage 1003399145f9SAnshuman Khandual * values. These saved addresses will be used for freeing 1004399145f9SAnshuman Khandual * page table pages. 1005399145f9SAnshuman Khandual */ 1006399145f9SAnshuman Khandual pmd = READ_ONCE(*pmdp); 1007399145f9SAnshuman Khandual saved_p4dp = p4d_offset(pgdp, 0UL); 1008399145f9SAnshuman Khandual saved_pudp = pud_offset(p4dp, 0UL); 1009399145f9SAnshuman Khandual saved_pmdp = pmd_offset(pudp, 0UL); 1010399145f9SAnshuman Khandual saved_ptep = pmd_pgtable(pmd); 1011399145f9SAnshuman Khandual 10122e326c07SAnshuman Khandual /* 10132e326c07SAnshuman Khandual * Iterate over the protection_map[] to make sure that all 10142e326c07SAnshuman Khandual * the basic page table transformation validations just hold 10152e326c07SAnshuman Khandual * true irrespective of the starting protection value for a 10162e326c07SAnshuman Khandual * given page table entry. 10172e326c07SAnshuman Khandual */ 10182e326c07SAnshuman Khandual for (idx = 0; idx < ARRAY_SIZE(protection_map); idx++) { 10192e326c07SAnshuman Khandual pte_basic_tests(pte_aligned, idx); 10202e326c07SAnshuman Khandual pmd_basic_tests(pmd_aligned, idx); 10212e326c07SAnshuman Khandual pud_basic_tests(mm, pud_aligned, idx); 10222e326c07SAnshuman Khandual } 10232e326c07SAnshuman Khandual 10242e326c07SAnshuman Khandual /* 10252e326c07SAnshuman Khandual * Both P4D and PGD level tests are very basic which do not 10262e326c07SAnshuman Khandual * involve creating page table entries from the protection 10272e326c07SAnshuman Khandual * value and the given pfn. Hence just keep them out from 10282e326c07SAnshuman Khandual * the above iteration for now to save some test execution 10292e326c07SAnshuman Khandual * time. 10302e326c07SAnshuman Khandual */ 1031399145f9SAnshuman Khandual p4d_basic_tests(p4d_aligned, prot); 1032399145f9SAnshuman Khandual pgd_basic_tests(pgd_aligned, prot); 1033399145f9SAnshuman Khandual 1034a5c3b9ffSAnshuman Khandual pmd_leaf_tests(pmd_aligned, prot); 1035a5c3b9ffSAnshuman Khandual pud_leaf_tests(pud_aligned, prot); 1036a5c3b9ffSAnshuman Khandual 10374200605bSAneesh Kumar K.V pte_savedwrite_tests(pte_aligned, protnone); 10384200605bSAneesh Kumar K.V pmd_savedwrite_tests(pmd_aligned, protnone); 1039a5c3b9ffSAnshuman Khandual 104005289402SAnshuman Khandual pte_special_tests(pte_aligned, prot); 104105289402SAnshuman Khandual pte_protnone_tests(pte_aligned, protnone); 104205289402SAnshuman Khandual pmd_protnone_tests(pmd_aligned, protnone); 104305289402SAnshuman Khandual 104405289402SAnshuman Khandual pte_devmap_tests(pte_aligned, prot); 104505289402SAnshuman Khandual pmd_devmap_tests(pmd_aligned, prot); 104605289402SAnshuman Khandual pud_devmap_tests(pud_aligned, prot); 104705289402SAnshuman Khandual 104805289402SAnshuman Khandual pte_soft_dirty_tests(pte_aligned, prot); 104905289402SAnshuman Khandual pmd_soft_dirty_tests(pmd_aligned, prot); 105005289402SAnshuman Khandual pte_swap_soft_dirty_tests(pte_aligned, prot); 105105289402SAnshuman Khandual pmd_swap_soft_dirty_tests(pmd_aligned, prot); 105205289402SAnshuman Khandual 105305289402SAnshuman Khandual pte_swap_tests(pte_aligned, prot); 105405289402SAnshuman Khandual pmd_swap_tests(pmd_aligned, prot); 105505289402SAnshuman Khandual 105605289402SAnshuman Khandual swap_migration_tests(); 105705289402SAnshuman Khandual 105805289402SAnshuman Khandual pmd_thp_tests(pmd_aligned, prot); 105905289402SAnshuman Khandual pud_thp_tests(pud_aligned, prot); 106005289402SAnshuman Khandual 1061e8edf0adSAneesh Kumar K.V hugetlb_basic_tests(pte_aligned, prot); 1062e8edf0adSAneesh Kumar K.V 10636f302e27SAneesh Kumar K.V /* 10646f302e27SAneesh Kumar K.V * Page table modifying tests. They need to hold 10656f302e27SAneesh Kumar K.V * proper page table lock. 10666f302e27SAneesh Kumar K.V */ 1067e8edf0adSAneesh Kumar K.V 1068f14312e1SAneesh Kumar K.V ptep = pte_offset_map_lock(mm, pmdp, vaddr, &ptl); 1069401035d5SAneesh Kumar K.V pte_clear_tests(mm, ptep, pte_aligned, vaddr, prot); 1070e8edf0adSAneesh Kumar K.V pte_advanced_tests(mm, vma, ptep, pte_aligned, vaddr, prot); 1071e8edf0adSAneesh Kumar K.V pte_unmap_unlock(ptep, ptl); 1072e8edf0adSAneesh Kumar K.V 10736f302e27SAneesh Kumar K.V ptl = pmd_lock(mm, pmdp); 10746f302e27SAneesh Kumar K.V pmd_clear_tests(mm, pmdp); 107587f34986SAneesh Kumar K.V pmd_advanced_tests(mm, vma, pmdp, pmd_aligned, vaddr, prot, saved_ptep); 10766f302e27SAneesh Kumar K.V pmd_huge_tests(pmdp, pmd_aligned, prot); 1077e8edf0adSAneesh Kumar K.V pmd_populate_tests(mm, pmdp, saved_ptep); 10786f302e27SAneesh Kumar K.V spin_unlock(ptl); 10796f302e27SAneesh Kumar K.V 10806f302e27SAneesh Kumar K.V ptl = pud_lock(mm, pudp); 10816f302e27SAneesh Kumar K.V pud_clear_tests(mm, pudp); 10826f302e27SAneesh Kumar K.V pud_advanced_tests(mm, vma, pudp, pud_aligned, vaddr, prot); 10836f302e27SAneesh Kumar K.V pud_huge_tests(pudp, pud_aligned, prot); 1084e8edf0adSAneesh Kumar K.V pud_populate_tests(mm, pudp, saved_pmdp); 10856f302e27SAneesh Kumar K.V spin_unlock(ptl); 10866f302e27SAneesh Kumar K.V 10876f302e27SAneesh Kumar K.V spin_lock(&mm->page_table_lock); 10886f302e27SAneesh Kumar K.V p4d_clear_tests(mm, p4dp); 10896f302e27SAneesh Kumar K.V pgd_clear_tests(mm, pgdp); 1090e8edf0adSAneesh Kumar K.V p4d_populate_tests(mm, p4dp, saved_pudp); 1091e8edf0adSAneesh Kumar K.V pgd_populate_tests(mm, pgdp, saved_p4dp); 10926f302e27SAneesh Kumar K.V spin_unlock(&mm->page_table_lock); 1093e8edf0adSAneesh Kumar K.V 1094399145f9SAnshuman Khandual p4d_free(mm, saved_p4dp); 1095399145f9SAnshuman Khandual pud_free(mm, saved_pudp); 1096399145f9SAnshuman Khandual pmd_free(mm, saved_pmdp); 1097399145f9SAnshuman Khandual pte_free(mm, saved_ptep); 1098399145f9SAnshuman Khandual 1099a5c3b9ffSAnshuman Khandual vm_area_free(vma); 1100399145f9SAnshuman Khandual mm_dec_nr_puds(mm); 1101399145f9SAnshuman Khandual mm_dec_nr_pmds(mm); 1102399145f9SAnshuman Khandual mm_dec_nr_ptes(mm); 1103399145f9SAnshuman Khandual mmdrop(mm); 1104399145f9SAnshuman Khandual return 0; 1105399145f9SAnshuman Khandual } 1106399145f9SAnshuman Khandual late_initcall(debug_vm_pgtable); 1107