1399145f9SAnshuman Khandual // SPDX-License-Identifier: GPL-2.0-only 2399145f9SAnshuman Khandual /* 3399145f9SAnshuman Khandual * This kernel test validates architecture page table helpers and 4399145f9SAnshuman Khandual * accessors and helps in verifying their continued compliance with 5399145f9SAnshuman Khandual * expected generic MM semantics. 6399145f9SAnshuman Khandual * 7399145f9SAnshuman Khandual * Copyright (C) 2019 ARM Ltd. 8399145f9SAnshuman Khandual * 9399145f9SAnshuman Khandual * Author: Anshuman Khandual <anshuman.khandual@arm.com> 10399145f9SAnshuman Khandual */ 116315df41SAnshuman Khandual #define pr_fmt(fmt) "debug_vm_pgtable: [%-25s]: " fmt, __func__ 12399145f9SAnshuman Khandual 13399145f9SAnshuman Khandual #include <linux/gfp.h> 14399145f9SAnshuman Khandual #include <linux/highmem.h> 15399145f9SAnshuman Khandual #include <linux/hugetlb.h> 16399145f9SAnshuman Khandual #include <linux/kernel.h> 17399145f9SAnshuman Khandual #include <linux/kconfig.h> 18399145f9SAnshuman Khandual #include <linux/mm.h> 19399145f9SAnshuman Khandual #include <linux/mman.h> 20399145f9SAnshuman Khandual #include <linux/mm_types.h> 21399145f9SAnshuman Khandual #include <linux/module.h> 22399145f9SAnshuman Khandual #include <linux/pfn_t.h> 23399145f9SAnshuman Khandual #include <linux/printk.h> 24a5c3b9ffSAnshuman Khandual #include <linux/pgtable.h> 25399145f9SAnshuman Khandual #include <linux/random.h> 26399145f9SAnshuman Khandual #include <linux/spinlock.h> 27399145f9SAnshuman Khandual #include <linux/swap.h> 28399145f9SAnshuman Khandual #include <linux/swapops.h> 29399145f9SAnshuman Khandual #include <linux/start_kernel.h> 30399145f9SAnshuman Khandual #include <linux/sched/mm.h> 31399145f9SAnshuman Khandual #include <asm/pgalloc.h> 32a5c3b9ffSAnshuman Khandual #include <asm/tlbflush.h> 33399145f9SAnshuman Khandual 34b1d00007SAnshuman Khandual /* 35b1d00007SAnshuman Khandual * Please refer Documentation/vm/arch_pgtable_helpers.rst for the semantics 36b1d00007SAnshuman Khandual * expectations that are being validated here. All future changes in here 37b1d00007SAnshuman Khandual * or the documentation need to be in sync. 38b1d00007SAnshuman Khandual */ 39b1d00007SAnshuman Khandual 40399145f9SAnshuman Khandual #define VMFLAGS (VM_READ|VM_WRITE|VM_EXEC) 41399145f9SAnshuman Khandual 42399145f9SAnshuman Khandual /* 43399145f9SAnshuman Khandual * On s390 platform, the lower 4 bits are used to identify given page table 44399145f9SAnshuman Khandual * entry type. But these bits might affect the ability to clear entries with 45399145f9SAnshuman Khandual * pxx_clear() because of how dynamic page table folding works on s390. So 46399145f9SAnshuman Khandual * while loading up the entries do not change the lower 4 bits. It does not 47*cfc5bbc4SAneesh Kumar K.V * have affect any other platform. Also avoid the 62nd bit on ppc64 that is 48*cfc5bbc4SAneesh Kumar K.V * used to mark a pte entry. 49399145f9SAnshuman Khandual */ 50*cfc5bbc4SAneesh Kumar K.V #define S390_SKIP_MASK GENMASK(3, 0) 51*cfc5bbc4SAneesh Kumar K.V #if __BITS_PER_LONG == 64 52*cfc5bbc4SAneesh Kumar K.V #define PPC64_SKIP_MASK GENMASK(62, 62) 53*cfc5bbc4SAneesh Kumar K.V #else 54*cfc5bbc4SAneesh Kumar K.V #define PPC64_SKIP_MASK 0x0 55*cfc5bbc4SAneesh Kumar K.V #endif 56*cfc5bbc4SAneesh Kumar K.V #define ARCH_SKIP_MASK (S390_SKIP_MASK | PPC64_SKIP_MASK) 57*cfc5bbc4SAneesh Kumar K.V #define RANDOM_ORVALUE (GENMASK(BITS_PER_LONG - 1, 0) & ~ARCH_SKIP_MASK) 58399145f9SAnshuman Khandual #define RANDOM_NZVALUE GENMASK(7, 0) 59399145f9SAnshuman Khandual 60399145f9SAnshuman Khandual static void __init pte_basic_tests(unsigned long pfn, pgprot_t prot) 61399145f9SAnshuman Khandual { 62399145f9SAnshuman Khandual pte_t pte = pfn_pte(pfn, prot); 63399145f9SAnshuman Khandual 646315df41SAnshuman Khandual pr_debug("Validating PTE basic\n"); 65399145f9SAnshuman Khandual WARN_ON(!pte_same(pte, pte)); 66399145f9SAnshuman Khandual WARN_ON(!pte_young(pte_mkyoung(pte_mkold(pte)))); 67399145f9SAnshuman Khandual WARN_ON(!pte_dirty(pte_mkdirty(pte_mkclean(pte)))); 68399145f9SAnshuman Khandual WARN_ON(!pte_write(pte_mkwrite(pte_wrprotect(pte)))); 69399145f9SAnshuman Khandual WARN_ON(pte_young(pte_mkold(pte_mkyoung(pte)))); 70399145f9SAnshuman Khandual WARN_ON(pte_dirty(pte_mkclean(pte_mkdirty(pte)))); 71399145f9SAnshuman Khandual WARN_ON(pte_write(pte_wrprotect(pte_mkwrite(pte)))); 72399145f9SAnshuman Khandual } 73399145f9SAnshuman Khandual 74a5c3b9ffSAnshuman Khandual static void __init pte_advanced_tests(struct mm_struct *mm, 75a5c3b9ffSAnshuman Khandual struct vm_area_struct *vma, pte_t *ptep, 76a5c3b9ffSAnshuman Khandual unsigned long pfn, unsigned long vaddr, 77a5c3b9ffSAnshuman Khandual pgprot_t prot) 78a5c3b9ffSAnshuman Khandual { 79a5c3b9ffSAnshuman Khandual pte_t pte = pfn_pte(pfn, prot); 80a5c3b9ffSAnshuman Khandual 816315df41SAnshuman Khandual pr_debug("Validating PTE advanced\n"); 82a5c3b9ffSAnshuman Khandual pte = pfn_pte(pfn, prot); 83a5c3b9ffSAnshuman Khandual set_pte_at(mm, vaddr, ptep, pte); 84a5c3b9ffSAnshuman Khandual ptep_set_wrprotect(mm, vaddr, ptep); 85a5c3b9ffSAnshuman Khandual pte = ptep_get(ptep); 86a5c3b9ffSAnshuman Khandual WARN_ON(pte_write(pte)); 87a5c3b9ffSAnshuman Khandual 88a5c3b9ffSAnshuman Khandual pte = pfn_pte(pfn, prot); 89a5c3b9ffSAnshuman Khandual set_pte_at(mm, vaddr, ptep, pte); 90a5c3b9ffSAnshuman Khandual ptep_get_and_clear(mm, vaddr, ptep); 91a5c3b9ffSAnshuman Khandual pte = ptep_get(ptep); 92a5c3b9ffSAnshuman Khandual WARN_ON(!pte_none(pte)); 93a5c3b9ffSAnshuman Khandual 94a5c3b9ffSAnshuman Khandual pte = pfn_pte(pfn, prot); 95a5c3b9ffSAnshuman Khandual pte = pte_wrprotect(pte); 96a5c3b9ffSAnshuman Khandual pte = pte_mkclean(pte); 97a5c3b9ffSAnshuman Khandual set_pte_at(mm, vaddr, ptep, pte); 98a5c3b9ffSAnshuman Khandual pte = pte_mkwrite(pte); 99a5c3b9ffSAnshuman Khandual pte = pte_mkdirty(pte); 100a5c3b9ffSAnshuman Khandual ptep_set_access_flags(vma, vaddr, ptep, pte, 1); 101a5c3b9ffSAnshuman Khandual pte = ptep_get(ptep); 102a5c3b9ffSAnshuman Khandual WARN_ON(!(pte_write(pte) && pte_dirty(pte))); 103a5c3b9ffSAnshuman Khandual 104a5c3b9ffSAnshuman Khandual pte = pfn_pte(pfn, prot); 105a5c3b9ffSAnshuman Khandual set_pte_at(mm, vaddr, ptep, pte); 106a5c3b9ffSAnshuman Khandual ptep_get_and_clear_full(mm, vaddr, ptep, 1); 107a5c3b9ffSAnshuman Khandual pte = ptep_get(ptep); 108a5c3b9ffSAnshuman Khandual WARN_ON(!pte_none(pte)); 109a5c3b9ffSAnshuman Khandual 110a5c3b9ffSAnshuman Khandual pte = pte_mkyoung(pte); 111a5c3b9ffSAnshuman Khandual set_pte_at(mm, vaddr, ptep, pte); 112a5c3b9ffSAnshuman Khandual ptep_test_and_clear_young(vma, vaddr, ptep); 113a5c3b9ffSAnshuman Khandual pte = ptep_get(ptep); 114a5c3b9ffSAnshuman Khandual WARN_ON(pte_young(pte)); 115a5c3b9ffSAnshuman Khandual } 116a5c3b9ffSAnshuman Khandual 117a5c3b9ffSAnshuman Khandual static void __init pte_savedwrite_tests(unsigned long pfn, pgprot_t prot) 118a5c3b9ffSAnshuman Khandual { 119a5c3b9ffSAnshuman Khandual pte_t pte = pfn_pte(pfn, prot); 120a5c3b9ffSAnshuman Khandual 1216315df41SAnshuman Khandual pr_debug("Validating PTE saved write\n"); 122a5c3b9ffSAnshuman Khandual WARN_ON(!pte_savedwrite(pte_mk_savedwrite(pte_clear_savedwrite(pte)))); 123a5c3b9ffSAnshuman Khandual WARN_ON(pte_savedwrite(pte_clear_savedwrite(pte_mk_savedwrite(pte)))); 124a5c3b9ffSAnshuman Khandual } 125399145f9SAnshuman Khandual #ifdef CONFIG_TRANSPARENT_HUGEPAGE 126399145f9SAnshuman Khandual static void __init pmd_basic_tests(unsigned long pfn, pgprot_t prot) 127399145f9SAnshuman Khandual { 128399145f9SAnshuman Khandual pmd_t pmd = pfn_pmd(pfn, prot); 129399145f9SAnshuman Khandual 130787d563bSAneesh Kumar K.V if (!has_transparent_hugepage()) 131787d563bSAneesh Kumar K.V return; 132787d563bSAneesh Kumar K.V 1336315df41SAnshuman Khandual pr_debug("Validating PMD basic\n"); 134399145f9SAnshuman Khandual WARN_ON(!pmd_same(pmd, pmd)); 135399145f9SAnshuman Khandual WARN_ON(!pmd_young(pmd_mkyoung(pmd_mkold(pmd)))); 136399145f9SAnshuman Khandual WARN_ON(!pmd_dirty(pmd_mkdirty(pmd_mkclean(pmd)))); 137399145f9SAnshuman Khandual WARN_ON(!pmd_write(pmd_mkwrite(pmd_wrprotect(pmd)))); 138399145f9SAnshuman Khandual WARN_ON(pmd_young(pmd_mkold(pmd_mkyoung(pmd)))); 139399145f9SAnshuman Khandual WARN_ON(pmd_dirty(pmd_mkclean(pmd_mkdirty(pmd)))); 140399145f9SAnshuman Khandual WARN_ON(pmd_write(pmd_wrprotect(pmd_mkwrite(pmd)))); 141399145f9SAnshuman Khandual /* 142399145f9SAnshuman Khandual * A huge page does not point to next level page table 143399145f9SAnshuman Khandual * entry. Hence this must qualify as pmd_bad(). 144399145f9SAnshuman Khandual */ 145399145f9SAnshuman Khandual WARN_ON(!pmd_bad(pmd_mkhuge(pmd))); 146399145f9SAnshuman Khandual } 147399145f9SAnshuman Khandual 148a5c3b9ffSAnshuman Khandual static void __init pmd_advanced_tests(struct mm_struct *mm, 149a5c3b9ffSAnshuman Khandual struct vm_area_struct *vma, pmd_t *pmdp, 150a5c3b9ffSAnshuman Khandual unsigned long pfn, unsigned long vaddr, 151a5c3b9ffSAnshuman Khandual pgprot_t prot) 152a5c3b9ffSAnshuman Khandual { 153a5c3b9ffSAnshuman Khandual pmd_t pmd = pfn_pmd(pfn, prot); 154a5c3b9ffSAnshuman Khandual 155a5c3b9ffSAnshuman Khandual if (!has_transparent_hugepage()) 156a5c3b9ffSAnshuman Khandual return; 157a5c3b9ffSAnshuman Khandual 1586315df41SAnshuman Khandual pr_debug("Validating PMD advanced\n"); 159a5c3b9ffSAnshuman Khandual /* Align the address wrt HPAGE_PMD_SIZE */ 160a5c3b9ffSAnshuman Khandual vaddr = (vaddr & HPAGE_PMD_MASK) + HPAGE_PMD_SIZE; 161a5c3b9ffSAnshuman Khandual 162a5c3b9ffSAnshuman Khandual pmd = pfn_pmd(pfn, prot); 163a5c3b9ffSAnshuman Khandual set_pmd_at(mm, vaddr, pmdp, pmd); 164a5c3b9ffSAnshuman Khandual pmdp_set_wrprotect(mm, vaddr, pmdp); 165a5c3b9ffSAnshuman Khandual pmd = READ_ONCE(*pmdp); 166a5c3b9ffSAnshuman Khandual WARN_ON(pmd_write(pmd)); 167a5c3b9ffSAnshuman Khandual 168a5c3b9ffSAnshuman Khandual pmd = pfn_pmd(pfn, prot); 169a5c3b9ffSAnshuman Khandual set_pmd_at(mm, vaddr, pmdp, pmd); 170a5c3b9ffSAnshuman Khandual pmdp_huge_get_and_clear(mm, vaddr, pmdp); 171a5c3b9ffSAnshuman Khandual pmd = READ_ONCE(*pmdp); 172a5c3b9ffSAnshuman Khandual WARN_ON(!pmd_none(pmd)); 173a5c3b9ffSAnshuman Khandual 174a5c3b9ffSAnshuman Khandual pmd = pfn_pmd(pfn, prot); 175a5c3b9ffSAnshuman Khandual pmd = pmd_wrprotect(pmd); 176a5c3b9ffSAnshuman Khandual pmd = pmd_mkclean(pmd); 177a5c3b9ffSAnshuman Khandual set_pmd_at(mm, vaddr, pmdp, pmd); 178a5c3b9ffSAnshuman Khandual pmd = pmd_mkwrite(pmd); 179a5c3b9ffSAnshuman Khandual pmd = pmd_mkdirty(pmd); 180a5c3b9ffSAnshuman Khandual pmdp_set_access_flags(vma, vaddr, pmdp, pmd, 1); 181a5c3b9ffSAnshuman Khandual pmd = READ_ONCE(*pmdp); 182a5c3b9ffSAnshuman Khandual WARN_ON(!(pmd_write(pmd) && pmd_dirty(pmd))); 183a5c3b9ffSAnshuman Khandual 184a5c3b9ffSAnshuman Khandual pmd = pmd_mkhuge(pfn_pmd(pfn, prot)); 185a5c3b9ffSAnshuman Khandual set_pmd_at(mm, vaddr, pmdp, pmd); 186a5c3b9ffSAnshuman Khandual pmdp_huge_get_and_clear_full(vma, vaddr, pmdp, 1); 187a5c3b9ffSAnshuman Khandual pmd = READ_ONCE(*pmdp); 188a5c3b9ffSAnshuman Khandual WARN_ON(!pmd_none(pmd)); 189a5c3b9ffSAnshuman Khandual 190a5c3b9ffSAnshuman Khandual pmd = pmd_mkyoung(pmd); 191a5c3b9ffSAnshuman Khandual set_pmd_at(mm, vaddr, pmdp, pmd); 192a5c3b9ffSAnshuman Khandual pmdp_test_and_clear_young(vma, vaddr, pmdp); 193a5c3b9ffSAnshuman Khandual pmd = READ_ONCE(*pmdp); 194a5c3b9ffSAnshuman Khandual WARN_ON(pmd_young(pmd)); 195a5c3b9ffSAnshuman Khandual } 196a5c3b9ffSAnshuman Khandual 197a5c3b9ffSAnshuman Khandual static void __init pmd_leaf_tests(unsigned long pfn, pgprot_t prot) 198a5c3b9ffSAnshuman Khandual { 199a5c3b9ffSAnshuman Khandual pmd_t pmd = pfn_pmd(pfn, prot); 200a5c3b9ffSAnshuman Khandual 2016315df41SAnshuman Khandual pr_debug("Validating PMD leaf\n"); 202a5c3b9ffSAnshuman Khandual /* 203a5c3b9ffSAnshuman Khandual * PMD based THP is a leaf entry. 204a5c3b9ffSAnshuman Khandual */ 205a5c3b9ffSAnshuman Khandual pmd = pmd_mkhuge(pmd); 206a5c3b9ffSAnshuman Khandual WARN_ON(!pmd_leaf(pmd)); 207a5c3b9ffSAnshuman Khandual } 208a5c3b9ffSAnshuman Khandual 209a5c3b9ffSAnshuman Khandual static void __init pmd_huge_tests(pmd_t *pmdp, unsigned long pfn, pgprot_t prot) 210a5c3b9ffSAnshuman Khandual { 211a5c3b9ffSAnshuman Khandual pmd_t pmd; 212a5c3b9ffSAnshuman Khandual 213a5c3b9ffSAnshuman Khandual if (!IS_ENABLED(CONFIG_HAVE_ARCH_HUGE_VMAP)) 214a5c3b9ffSAnshuman Khandual return; 2156315df41SAnshuman Khandual 2166315df41SAnshuman Khandual pr_debug("Validating PMD huge\n"); 217a5c3b9ffSAnshuman Khandual /* 218a5c3b9ffSAnshuman Khandual * X86 defined pmd_set_huge() verifies that the given 219a5c3b9ffSAnshuman Khandual * PMD is not a populated non-leaf entry. 220a5c3b9ffSAnshuman Khandual */ 221a5c3b9ffSAnshuman Khandual WRITE_ONCE(*pmdp, __pmd(0)); 222a5c3b9ffSAnshuman Khandual WARN_ON(!pmd_set_huge(pmdp, __pfn_to_phys(pfn), prot)); 223a5c3b9ffSAnshuman Khandual WARN_ON(!pmd_clear_huge(pmdp)); 224a5c3b9ffSAnshuman Khandual pmd = READ_ONCE(*pmdp); 225a5c3b9ffSAnshuman Khandual WARN_ON(!pmd_none(pmd)); 226a5c3b9ffSAnshuman Khandual } 227a5c3b9ffSAnshuman Khandual 228a5c3b9ffSAnshuman Khandual static void __init pmd_savedwrite_tests(unsigned long pfn, pgprot_t prot) 229a5c3b9ffSAnshuman Khandual { 230a5c3b9ffSAnshuman Khandual pmd_t pmd = pfn_pmd(pfn, prot); 231a5c3b9ffSAnshuman Khandual 2326315df41SAnshuman Khandual pr_debug("Validating PMD saved write\n"); 233a5c3b9ffSAnshuman Khandual WARN_ON(!pmd_savedwrite(pmd_mk_savedwrite(pmd_clear_savedwrite(pmd)))); 234a5c3b9ffSAnshuman Khandual WARN_ON(pmd_savedwrite(pmd_clear_savedwrite(pmd_mk_savedwrite(pmd)))); 235a5c3b9ffSAnshuman Khandual } 236a5c3b9ffSAnshuman Khandual 237399145f9SAnshuman Khandual #ifdef CONFIG_HAVE_ARCH_TRANSPARENT_HUGEPAGE_PUD 238399145f9SAnshuman Khandual static void __init pud_basic_tests(unsigned long pfn, pgprot_t prot) 239399145f9SAnshuman Khandual { 240399145f9SAnshuman Khandual pud_t pud = pfn_pud(pfn, prot); 241399145f9SAnshuman Khandual 242787d563bSAneesh Kumar K.V if (!has_transparent_hugepage()) 243787d563bSAneesh Kumar K.V return; 244787d563bSAneesh Kumar K.V 2456315df41SAnshuman Khandual pr_debug("Validating PUD basic\n"); 246399145f9SAnshuman Khandual WARN_ON(!pud_same(pud, pud)); 247399145f9SAnshuman Khandual WARN_ON(!pud_young(pud_mkyoung(pud_mkold(pud)))); 248399145f9SAnshuman Khandual WARN_ON(!pud_write(pud_mkwrite(pud_wrprotect(pud)))); 249399145f9SAnshuman Khandual WARN_ON(pud_write(pud_wrprotect(pud_mkwrite(pud)))); 250399145f9SAnshuman Khandual WARN_ON(pud_young(pud_mkold(pud_mkyoung(pud)))); 251399145f9SAnshuman Khandual 252399145f9SAnshuman Khandual if (mm_pmd_folded(mm)) 253399145f9SAnshuman Khandual return; 254399145f9SAnshuman Khandual 255399145f9SAnshuman Khandual /* 256399145f9SAnshuman Khandual * A huge page does not point to next level page table 257399145f9SAnshuman Khandual * entry. Hence this must qualify as pud_bad(). 258399145f9SAnshuman Khandual */ 259399145f9SAnshuman Khandual WARN_ON(!pud_bad(pud_mkhuge(pud))); 260399145f9SAnshuman Khandual } 261a5c3b9ffSAnshuman Khandual 262a5c3b9ffSAnshuman Khandual static void __init pud_advanced_tests(struct mm_struct *mm, 263a5c3b9ffSAnshuman Khandual struct vm_area_struct *vma, pud_t *pudp, 264a5c3b9ffSAnshuman Khandual unsigned long pfn, unsigned long vaddr, 265a5c3b9ffSAnshuman Khandual pgprot_t prot) 266a5c3b9ffSAnshuman Khandual { 267a5c3b9ffSAnshuman Khandual pud_t pud = pfn_pud(pfn, prot); 268a5c3b9ffSAnshuman Khandual 269a5c3b9ffSAnshuman Khandual if (!has_transparent_hugepage()) 270a5c3b9ffSAnshuman Khandual return; 271a5c3b9ffSAnshuman Khandual 2726315df41SAnshuman Khandual pr_debug("Validating PUD advanced\n"); 273a5c3b9ffSAnshuman Khandual /* Align the address wrt HPAGE_PUD_SIZE */ 274a5c3b9ffSAnshuman Khandual vaddr = (vaddr & HPAGE_PUD_MASK) + HPAGE_PUD_SIZE; 275a5c3b9ffSAnshuman Khandual 276a5c3b9ffSAnshuman Khandual set_pud_at(mm, vaddr, pudp, pud); 277a5c3b9ffSAnshuman Khandual pudp_set_wrprotect(mm, vaddr, pudp); 278a5c3b9ffSAnshuman Khandual pud = READ_ONCE(*pudp); 279a5c3b9ffSAnshuman Khandual WARN_ON(pud_write(pud)); 280a5c3b9ffSAnshuman Khandual 281a5c3b9ffSAnshuman Khandual #ifndef __PAGETABLE_PMD_FOLDED 282a5c3b9ffSAnshuman Khandual pud = pfn_pud(pfn, prot); 283a5c3b9ffSAnshuman Khandual set_pud_at(mm, vaddr, pudp, pud); 284a5c3b9ffSAnshuman Khandual pudp_huge_get_and_clear(mm, vaddr, pudp); 285a5c3b9ffSAnshuman Khandual pud = READ_ONCE(*pudp); 286a5c3b9ffSAnshuman Khandual WARN_ON(!pud_none(pud)); 287a5c3b9ffSAnshuman Khandual 288a5c3b9ffSAnshuman Khandual pud = pfn_pud(pfn, prot); 289a5c3b9ffSAnshuman Khandual set_pud_at(mm, vaddr, pudp, pud); 290a5c3b9ffSAnshuman Khandual pudp_huge_get_and_clear_full(mm, vaddr, pudp, 1); 291a5c3b9ffSAnshuman Khandual pud = READ_ONCE(*pudp); 292a5c3b9ffSAnshuman Khandual WARN_ON(!pud_none(pud)); 293a5c3b9ffSAnshuman Khandual #endif /* __PAGETABLE_PMD_FOLDED */ 294a5c3b9ffSAnshuman Khandual pud = pfn_pud(pfn, prot); 295a5c3b9ffSAnshuman Khandual pud = pud_wrprotect(pud); 296a5c3b9ffSAnshuman Khandual pud = pud_mkclean(pud); 297a5c3b9ffSAnshuman Khandual set_pud_at(mm, vaddr, pudp, pud); 298a5c3b9ffSAnshuman Khandual pud = pud_mkwrite(pud); 299a5c3b9ffSAnshuman Khandual pud = pud_mkdirty(pud); 300a5c3b9ffSAnshuman Khandual pudp_set_access_flags(vma, vaddr, pudp, pud, 1); 301a5c3b9ffSAnshuman Khandual pud = READ_ONCE(*pudp); 302a5c3b9ffSAnshuman Khandual WARN_ON(!(pud_write(pud) && pud_dirty(pud))); 303a5c3b9ffSAnshuman Khandual 304a5c3b9ffSAnshuman Khandual pud = pud_mkyoung(pud); 305a5c3b9ffSAnshuman Khandual set_pud_at(mm, vaddr, pudp, pud); 306a5c3b9ffSAnshuman Khandual pudp_test_and_clear_young(vma, vaddr, pudp); 307a5c3b9ffSAnshuman Khandual pud = READ_ONCE(*pudp); 308a5c3b9ffSAnshuman Khandual WARN_ON(pud_young(pud)); 309a5c3b9ffSAnshuman Khandual } 310a5c3b9ffSAnshuman Khandual 311a5c3b9ffSAnshuman Khandual static void __init pud_leaf_tests(unsigned long pfn, pgprot_t prot) 312a5c3b9ffSAnshuman Khandual { 313a5c3b9ffSAnshuman Khandual pud_t pud = pfn_pud(pfn, prot); 314a5c3b9ffSAnshuman Khandual 3156315df41SAnshuman Khandual pr_debug("Validating PUD leaf\n"); 316a5c3b9ffSAnshuman Khandual /* 317a5c3b9ffSAnshuman Khandual * PUD based THP is a leaf entry. 318a5c3b9ffSAnshuman Khandual */ 319a5c3b9ffSAnshuman Khandual pud = pud_mkhuge(pud); 320a5c3b9ffSAnshuman Khandual WARN_ON(!pud_leaf(pud)); 321a5c3b9ffSAnshuman Khandual } 322a5c3b9ffSAnshuman Khandual 323a5c3b9ffSAnshuman Khandual static void __init pud_huge_tests(pud_t *pudp, unsigned long pfn, pgprot_t prot) 324a5c3b9ffSAnshuman Khandual { 325a5c3b9ffSAnshuman Khandual pud_t pud; 326a5c3b9ffSAnshuman Khandual 327a5c3b9ffSAnshuman Khandual if (!IS_ENABLED(CONFIG_HAVE_ARCH_HUGE_VMAP)) 328a5c3b9ffSAnshuman Khandual return; 3296315df41SAnshuman Khandual 3306315df41SAnshuman Khandual pr_debug("Validating PUD huge\n"); 331a5c3b9ffSAnshuman Khandual /* 332a5c3b9ffSAnshuman Khandual * X86 defined pud_set_huge() verifies that the given 333a5c3b9ffSAnshuman Khandual * PUD is not a populated non-leaf entry. 334a5c3b9ffSAnshuman Khandual */ 335a5c3b9ffSAnshuman Khandual WRITE_ONCE(*pudp, __pud(0)); 336a5c3b9ffSAnshuman Khandual WARN_ON(!pud_set_huge(pudp, __pfn_to_phys(pfn), prot)); 337a5c3b9ffSAnshuman Khandual WARN_ON(!pud_clear_huge(pudp)); 338a5c3b9ffSAnshuman Khandual pud = READ_ONCE(*pudp); 339a5c3b9ffSAnshuman Khandual WARN_ON(!pud_none(pud)); 340a5c3b9ffSAnshuman Khandual } 341399145f9SAnshuman Khandual #else /* !CONFIG_HAVE_ARCH_TRANSPARENT_HUGEPAGE_PUD */ 342399145f9SAnshuman Khandual static void __init pud_basic_tests(unsigned long pfn, pgprot_t prot) { } 343a5c3b9ffSAnshuman Khandual static void __init pud_advanced_tests(struct mm_struct *mm, 344a5c3b9ffSAnshuman Khandual struct vm_area_struct *vma, pud_t *pudp, 345a5c3b9ffSAnshuman Khandual unsigned long pfn, unsigned long vaddr, 346a5c3b9ffSAnshuman Khandual pgprot_t prot) 347a5c3b9ffSAnshuman Khandual { 348a5c3b9ffSAnshuman Khandual } 349a5c3b9ffSAnshuman Khandual static void __init pud_leaf_tests(unsigned long pfn, pgprot_t prot) { } 350a5c3b9ffSAnshuman Khandual static void __init pud_huge_tests(pud_t *pudp, unsigned long pfn, pgprot_t prot) 351a5c3b9ffSAnshuman Khandual { 352a5c3b9ffSAnshuman Khandual } 353399145f9SAnshuman Khandual #endif /* CONFIG_HAVE_ARCH_TRANSPARENT_HUGEPAGE_PUD */ 354399145f9SAnshuman Khandual #else /* !CONFIG_TRANSPARENT_HUGEPAGE */ 355399145f9SAnshuman Khandual static void __init pmd_basic_tests(unsigned long pfn, pgprot_t prot) { } 356399145f9SAnshuman Khandual static void __init pud_basic_tests(unsigned long pfn, pgprot_t prot) { } 357a5c3b9ffSAnshuman Khandual static void __init pmd_advanced_tests(struct mm_struct *mm, 358a5c3b9ffSAnshuman Khandual struct vm_area_struct *vma, pmd_t *pmdp, 359a5c3b9ffSAnshuman Khandual unsigned long pfn, unsigned long vaddr, 360a5c3b9ffSAnshuman Khandual pgprot_t prot) 361a5c3b9ffSAnshuman Khandual { 362a5c3b9ffSAnshuman Khandual } 363a5c3b9ffSAnshuman Khandual static void __init pud_advanced_tests(struct mm_struct *mm, 364a5c3b9ffSAnshuman Khandual struct vm_area_struct *vma, pud_t *pudp, 365a5c3b9ffSAnshuman Khandual unsigned long pfn, unsigned long vaddr, 366a5c3b9ffSAnshuman Khandual pgprot_t prot) 367a5c3b9ffSAnshuman Khandual { 368a5c3b9ffSAnshuman Khandual } 369a5c3b9ffSAnshuman Khandual static void __init pmd_leaf_tests(unsigned long pfn, pgprot_t prot) { } 370a5c3b9ffSAnshuman Khandual static void __init pud_leaf_tests(unsigned long pfn, pgprot_t prot) { } 371a5c3b9ffSAnshuman Khandual static void __init pmd_huge_tests(pmd_t *pmdp, unsigned long pfn, pgprot_t prot) 372a5c3b9ffSAnshuman Khandual { 373a5c3b9ffSAnshuman Khandual } 374a5c3b9ffSAnshuman Khandual static void __init pud_huge_tests(pud_t *pudp, unsigned long pfn, pgprot_t prot) 375a5c3b9ffSAnshuman Khandual { 376a5c3b9ffSAnshuman Khandual } 377a5c3b9ffSAnshuman Khandual static void __init pmd_savedwrite_tests(unsigned long pfn, pgprot_t prot) { } 378399145f9SAnshuman Khandual #endif /* CONFIG_TRANSPARENT_HUGEPAGE */ 379399145f9SAnshuman Khandual 380399145f9SAnshuman Khandual static void __init p4d_basic_tests(unsigned long pfn, pgprot_t prot) 381399145f9SAnshuman Khandual { 382399145f9SAnshuman Khandual p4d_t p4d; 383399145f9SAnshuman Khandual 3846315df41SAnshuman Khandual pr_debug("Validating P4D basic\n"); 385399145f9SAnshuman Khandual memset(&p4d, RANDOM_NZVALUE, sizeof(p4d_t)); 386399145f9SAnshuman Khandual WARN_ON(!p4d_same(p4d, p4d)); 387399145f9SAnshuman Khandual } 388399145f9SAnshuman Khandual 389399145f9SAnshuman Khandual static void __init pgd_basic_tests(unsigned long pfn, pgprot_t prot) 390399145f9SAnshuman Khandual { 391399145f9SAnshuman Khandual pgd_t pgd; 392399145f9SAnshuman Khandual 3936315df41SAnshuman Khandual pr_debug("Validating PGD basic\n"); 394399145f9SAnshuman Khandual memset(&pgd, RANDOM_NZVALUE, sizeof(pgd_t)); 395399145f9SAnshuman Khandual WARN_ON(!pgd_same(pgd, pgd)); 396399145f9SAnshuman Khandual } 397399145f9SAnshuman Khandual 398399145f9SAnshuman Khandual #ifndef __PAGETABLE_PUD_FOLDED 399399145f9SAnshuman Khandual static void __init pud_clear_tests(struct mm_struct *mm, pud_t *pudp) 400399145f9SAnshuman Khandual { 401399145f9SAnshuman Khandual pud_t pud = READ_ONCE(*pudp); 402399145f9SAnshuman Khandual 403399145f9SAnshuman Khandual if (mm_pmd_folded(mm)) 404399145f9SAnshuman Khandual return; 405399145f9SAnshuman Khandual 4066315df41SAnshuman Khandual pr_debug("Validating PUD clear\n"); 407399145f9SAnshuman Khandual pud = __pud(pud_val(pud) | RANDOM_ORVALUE); 408399145f9SAnshuman Khandual WRITE_ONCE(*pudp, pud); 409399145f9SAnshuman Khandual pud_clear(pudp); 410399145f9SAnshuman Khandual pud = READ_ONCE(*pudp); 411399145f9SAnshuman Khandual WARN_ON(!pud_none(pud)); 412399145f9SAnshuman Khandual } 413399145f9SAnshuman Khandual 414399145f9SAnshuman Khandual static void __init pud_populate_tests(struct mm_struct *mm, pud_t *pudp, 415399145f9SAnshuman Khandual pmd_t *pmdp) 416399145f9SAnshuman Khandual { 417399145f9SAnshuman Khandual pud_t pud; 418399145f9SAnshuman Khandual 419399145f9SAnshuman Khandual if (mm_pmd_folded(mm)) 420399145f9SAnshuman Khandual return; 4216315df41SAnshuman Khandual 4226315df41SAnshuman Khandual pr_debug("Validating PUD populate\n"); 423399145f9SAnshuman Khandual /* 424399145f9SAnshuman Khandual * This entry points to next level page table page. 425399145f9SAnshuman Khandual * Hence this must not qualify as pud_bad(). 426399145f9SAnshuman Khandual */ 427399145f9SAnshuman Khandual pmd_clear(pmdp); 428399145f9SAnshuman Khandual pud_clear(pudp); 429399145f9SAnshuman Khandual pud_populate(mm, pudp, pmdp); 430399145f9SAnshuman Khandual pud = READ_ONCE(*pudp); 431399145f9SAnshuman Khandual WARN_ON(pud_bad(pud)); 432399145f9SAnshuman Khandual } 433399145f9SAnshuman Khandual #else /* !__PAGETABLE_PUD_FOLDED */ 434399145f9SAnshuman Khandual static void __init pud_clear_tests(struct mm_struct *mm, pud_t *pudp) { } 435399145f9SAnshuman Khandual static void __init pud_populate_tests(struct mm_struct *mm, pud_t *pudp, 436399145f9SAnshuman Khandual pmd_t *pmdp) 437399145f9SAnshuman Khandual { 438399145f9SAnshuman Khandual } 439399145f9SAnshuman Khandual #endif /* PAGETABLE_PUD_FOLDED */ 440399145f9SAnshuman Khandual 441399145f9SAnshuman Khandual #ifndef __PAGETABLE_P4D_FOLDED 442399145f9SAnshuman Khandual static void __init p4d_clear_tests(struct mm_struct *mm, p4d_t *p4dp) 443399145f9SAnshuman Khandual { 444399145f9SAnshuman Khandual p4d_t p4d = READ_ONCE(*p4dp); 445399145f9SAnshuman Khandual 446399145f9SAnshuman Khandual if (mm_pud_folded(mm)) 447399145f9SAnshuman Khandual return; 448399145f9SAnshuman Khandual 4496315df41SAnshuman Khandual pr_debug("Validating P4D clear\n"); 450399145f9SAnshuman Khandual p4d = __p4d(p4d_val(p4d) | RANDOM_ORVALUE); 451399145f9SAnshuman Khandual WRITE_ONCE(*p4dp, p4d); 452399145f9SAnshuman Khandual p4d_clear(p4dp); 453399145f9SAnshuman Khandual p4d = READ_ONCE(*p4dp); 454399145f9SAnshuman Khandual WARN_ON(!p4d_none(p4d)); 455399145f9SAnshuman Khandual } 456399145f9SAnshuman Khandual 457399145f9SAnshuman Khandual static void __init p4d_populate_tests(struct mm_struct *mm, p4d_t *p4dp, 458399145f9SAnshuman Khandual pud_t *pudp) 459399145f9SAnshuman Khandual { 460399145f9SAnshuman Khandual p4d_t p4d; 461399145f9SAnshuman Khandual 462399145f9SAnshuman Khandual if (mm_pud_folded(mm)) 463399145f9SAnshuman Khandual return; 464399145f9SAnshuman Khandual 4656315df41SAnshuman Khandual pr_debug("Validating P4D populate\n"); 466399145f9SAnshuman Khandual /* 467399145f9SAnshuman Khandual * This entry points to next level page table page. 468399145f9SAnshuman Khandual * Hence this must not qualify as p4d_bad(). 469399145f9SAnshuman Khandual */ 470399145f9SAnshuman Khandual pud_clear(pudp); 471399145f9SAnshuman Khandual p4d_clear(p4dp); 472399145f9SAnshuman Khandual p4d_populate(mm, p4dp, pudp); 473399145f9SAnshuman Khandual p4d = READ_ONCE(*p4dp); 474399145f9SAnshuman Khandual WARN_ON(p4d_bad(p4d)); 475399145f9SAnshuman Khandual } 476399145f9SAnshuman Khandual 477399145f9SAnshuman Khandual static void __init pgd_clear_tests(struct mm_struct *mm, pgd_t *pgdp) 478399145f9SAnshuman Khandual { 479399145f9SAnshuman Khandual pgd_t pgd = READ_ONCE(*pgdp); 480399145f9SAnshuman Khandual 481399145f9SAnshuman Khandual if (mm_p4d_folded(mm)) 482399145f9SAnshuman Khandual return; 483399145f9SAnshuman Khandual 4846315df41SAnshuman Khandual pr_debug("Validating PGD clear\n"); 485399145f9SAnshuman Khandual pgd = __pgd(pgd_val(pgd) | RANDOM_ORVALUE); 486399145f9SAnshuman Khandual WRITE_ONCE(*pgdp, pgd); 487399145f9SAnshuman Khandual pgd_clear(pgdp); 488399145f9SAnshuman Khandual pgd = READ_ONCE(*pgdp); 489399145f9SAnshuman Khandual WARN_ON(!pgd_none(pgd)); 490399145f9SAnshuman Khandual } 491399145f9SAnshuman Khandual 492399145f9SAnshuman Khandual static void __init pgd_populate_tests(struct mm_struct *mm, pgd_t *pgdp, 493399145f9SAnshuman Khandual p4d_t *p4dp) 494399145f9SAnshuman Khandual { 495399145f9SAnshuman Khandual pgd_t pgd; 496399145f9SAnshuman Khandual 497399145f9SAnshuman Khandual if (mm_p4d_folded(mm)) 498399145f9SAnshuman Khandual return; 499399145f9SAnshuman Khandual 5006315df41SAnshuman Khandual pr_debug("Validating PGD populate\n"); 501399145f9SAnshuman Khandual /* 502399145f9SAnshuman Khandual * This entry points to next level page table page. 503399145f9SAnshuman Khandual * Hence this must not qualify as pgd_bad(). 504399145f9SAnshuman Khandual */ 505399145f9SAnshuman Khandual p4d_clear(p4dp); 506399145f9SAnshuman Khandual pgd_clear(pgdp); 507399145f9SAnshuman Khandual pgd_populate(mm, pgdp, p4dp); 508399145f9SAnshuman Khandual pgd = READ_ONCE(*pgdp); 509399145f9SAnshuman Khandual WARN_ON(pgd_bad(pgd)); 510399145f9SAnshuman Khandual } 511399145f9SAnshuman Khandual #else /* !__PAGETABLE_P4D_FOLDED */ 512399145f9SAnshuman Khandual static void __init p4d_clear_tests(struct mm_struct *mm, p4d_t *p4dp) { } 513399145f9SAnshuman Khandual static void __init pgd_clear_tests(struct mm_struct *mm, pgd_t *pgdp) { } 514399145f9SAnshuman Khandual static void __init p4d_populate_tests(struct mm_struct *mm, p4d_t *p4dp, 515399145f9SAnshuman Khandual pud_t *pudp) 516399145f9SAnshuman Khandual { 517399145f9SAnshuman Khandual } 518399145f9SAnshuman Khandual static void __init pgd_populate_tests(struct mm_struct *mm, pgd_t *pgdp, 519399145f9SAnshuman Khandual p4d_t *p4dp) 520399145f9SAnshuman Khandual { 521399145f9SAnshuman Khandual } 522399145f9SAnshuman Khandual #endif /* PAGETABLE_P4D_FOLDED */ 523399145f9SAnshuman Khandual 524399145f9SAnshuman Khandual static void __init pte_clear_tests(struct mm_struct *mm, pte_t *ptep, 525399145f9SAnshuman Khandual unsigned long vaddr) 526399145f9SAnshuman Khandual { 5279449c9cbSChristophe Leroy pte_t pte = ptep_get(ptep); 528399145f9SAnshuman Khandual 5296315df41SAnshuman Khandual pr_debug("Validating PTE clear\n"); 530399145f9SAnshuman Khandual pte = __pte(pte_val(pte) | RANDOM_ORVALUE); 531399145f9SAnshuman Khandual set_pte_at(mm, vaddr, ptep, pte); 532399145f9SAnshuman Khandual barrier(); 533399145f9SAnshuman Khandual pte_clear(mm, vaddr, ptep); 5349449c9cbSChristophe Leroy pte = ptep_get(ptep); 535399145f9SAnshuman Khandual WARN_ON(!pte_none(pte)); 536399145f9SAnshuman Khandual } 537399145f9SAnshuman Khandual 538399145f9SAnshuman Khandual static void __init pmd_clear_tests(struct mm_struct *mm, pmd_t *pmdp) 539399145f9SAnshuman Khandual { 540399145f9SAnshuman Khandual pmd_t pmd = READ_ONCE(*pmdp); 541399145f9SAnshuman Khandual 5426315df41SAnshuman Khandual pr_debug("Validating PMD clear\n"); 543399145f9SAnshuman Khandual pmd = __pmd(pmd_val(pmd) | RANDOM_ORVALUE); 544399145f9SAnshuman Khandual WRITE_ONCE(*pmdp, pmd); 545399145f9SAnshuman Khandual pmd_clear(pmdp); 546399145f9SAnshuman Khandual pmd = READ_ONCE(*pmdp); 547399145f9SAnshuman Khandual WARN_ON(!pmd_none(pmd)); 548399145f9SAnshuman Khandual } 549399145f9SAnshuman Khandual 550399145f9SAnshuman Khandual static void __init pmd_populate_tests(struct mm_struct *mm, pmd_t *pmdp, 551399145f9SAnshuman Khandual pgtable_t pgtable) 552399145f9SAnshuman Khandual { 553399145f9SAnshuman Khandual pmd_t pmd; 554399145f9SAnshuman Khandual 5556315df41SAnshuman Khandual pr_debug("Validating PMD populate\n"); 556399145f9SAnshuman Khandual /* 557399145f9SAnshuman Khandual * This entry points to next level page table page. 558399145f9SAnshuman Khandual * Hence this must not qualify as pmd_bad(). 559399145f9SAnshuman Khandual */ 560399145f9SAnshuman Khandual pmd_clear(pmdp); 561399145f9SAnshuman Khandual pmd_populate(mm, pmdp, pgtable); 562399145f9SAnshuman Khandual pmd = READ_ONCE(*pmdp); 563399145f9SAnshuman Khandual WARN_ON(pmd_bad(pmd)); 564399145f9SAnshuman Khandual } 565399145f9SAnshuman Khandual 56605289402SAnshuman Khandual static void __init pte_special_tests(unsigned long pfn, pgprot_t prot) 56705289402SAnshuman Khandual { 56805289402SAnshuman Khandual pte_t pte = pfn_pte(pfn, prot); 56905289402SAnshuman Khandual 57005289402SAnshuman Khandual if (!IS_ENABLED(CONFIG_ARCH_HAS_PTE_SPECIAL)) 57105289402SAnshuman Khandual return; 57205289402SAnshuman Khandual 5736315df41SAnshuman Khandual pr_debug("Validating PTE special\n"); 57405289402SAnshuman Khandual WARN_ON(!pte_special(pte_mkspecial(pte))); 57505289402SAnshuman Khandual } 57605289402SAnshuman Khandual 57705289402SAnshuman Khandual static void __init pte_protnone_tests(unsigned long pfn, pgprot_t prot) 57805289402SAnshuman Khandual { 57905289402SAnshuman Khandual pte_t pte = pfn_pte(pfn, prot); 58005289402SAnshuman Khandual 58105289402SAnshuman Khandual if (!IS_ENABLED(CONFIG_NUMA_BALANCING)) 58205289402SAnshuman Khandual return; 58305289402SAnshuman Khandual 5846315df41SAnshuman Khandual pr_debug("Validating PTE protnone\n"); 58505289402SAnshuman Khandual WARN_ON(!pte_protnone(pte)); 58605289402SAnshuman Khandual WARN_ON(!pte_present(pte)); 58705289402SAnshuman Khandual } 58805289402SAnshuman Khandual 58905289402SAnshuman Khandual #ifdef CONFIG_TRANSPARENT_HUGEPAGE 59005289402SAnshuman Khandual static void __init pmd_protnone_tests(unsigned long pfn, pgprot_t prot) 59105289402SAnshuman Khandual { 59205289402SAnshuman Khandual pmd_t pmd = pmd_mkhuge(pfn_pmd(pfn, prot)); 59305289402SAnshuman Khandual 59405289402SAnshuman Khandual if (!IS_ENABLED(CONFIG_NUMA_BALANCING)) 59505289402SAnshuman Khandual return; 59605289402SAnshuman Khandual 5976315df41SAnshuman Khandual pr_debug("Validating PMD protnone\n"); 59805289402SAnshuman Khandual WARN_ON(!pmd_protnone(pmd)); 59905289402SAnshuman Khandual WARN_ON(!pmd_present(pmd)); 60005289402SAnshuman Khandual } 60105289402SAnshuman Khandual #else /* !CONFIG_TRANSPARENT_HUGEPAGE */ 60205289402SAnshuman Khandual static void __init pmd_protnone_tests(unsigned long pfn, pgprot_t prot) { } 60305289402SAnshuman Khandual #endif /* CONFIG_TRANSPARENT_HUGEPAGE */ 60405289402SAnshuman Khandual 60505289402SAnshuman Khandual #ifdef CONFIG_ARCH_HAS_PTE_DEVMAP 60605289402SAnshuman Khandual static void __init pte_devmap_tests(unsigned long pfn, pgprot_t prot) 60705289402SAnshuman Khandual { 60805289402SAnshuman Khandual pte_t pte = pfn_pte(pfn, prot); 60905289402SAnshuman Khandual 6106315df41SAnshuman Khandual pr_debug("Validating PTE devmap\n"); 61105289402SAnshuman Khandual WARN_ON(!pte_devmap(pte_mkdevmap(pte))); 61205289402SAnshuman Khandual } 61305289402SAnshuman Khandual 61405289402SAnshuman Khandual #ifdef CONFIG_TRANSPARENT_HUGEPAGE 61505289402SAnshuman Khandual static void __init pmd_devmap_tests(unsigned long pfn, pgprot_t prot) 61605289402SAnshuman Khandual { 61705289402SAnshuman Khandual pmd_t pmd = pfn_pmd(pfn, prot); 61805289402SAnshuman Khandual 6196315df41SAnshuman Khandual pr_debug("Validating PMD devmap\n"); 62005289402SAnshuman Khandual WARN_ON(!pmd_devmap(pmd_mkdevmap(pmd))); 62105289402SAnshuman Khandual } 62205289402SAnshuman Khandual 62305289402SAnshuman Khandual #ifdef CONFIG_HAVE_ARCH_TRANSPARENT_HUGEPAGE_PUD 62405289402SAnshuman Khandual static void __init pud_devmap_tests(unsigned long pfn, pgprot_t prot) 62505289402SAnshuman Khandual { 62605289402SAnshuman Khandual pud_t pud = pfn_pud(pfn, prot); 62705289402SAnshuman Khandual 6286315df41SAnshuman Khandual pr_debug("Validating PUD devmap\n"); 62905289402SAnshuman Khandual WARN_ON(!pud_devmap(pud_mkdevmap(pud))); 63005289402SAnshuman Khandual } 63105289402SAnshuman Khandual #else /* !CONFIG_HAVE_ARCH_TRANSPARENT_HUGEPAGE_PUD */ 63205289402SAnshuman Khandual static void __init pud_devmap_tests(unsigned long pfn, pgprot_t prot) { } 63305289402SAnshuman Khandual #endif /* CONFIG_HAVE_ARCH_TRANSPARENT_HUGEPAGE_PUD */ 63405289402SAnshuman Khandual #else /* CONFIG_TRANSPARENT_HUGEPAGE */ 63505289402SAnshuman Khandual static void __init pmd_devmap_tests(unsigned long pfn, pgprot_t prot) { } 63605289402SAnshuman Khandual static void __init pud_devmap_tests(unsigned long pfn, pgprot_t prot) { } 63705289402SAnshuman Khandual #endif /* CONFIG_TRANSPARENT_HUGEPAGE */ 63805289402SAnshuman Khandual #else 63905289402SAnshuman Khandual static void __init pte_devmap_tests(unsigned long pfn, pgprot_t prot) { } 64005289402SAnshuman Khandual static void __init pmd_devmap_tests(unsigned long pfn, pgprot_t prot) { } 64105289402SAnshuman Khandual static void __init pud_devmap_tests(unsigned long pfn, pgprot_t prot) { } 64205289402SAnshuman Khandual #endif /* CONFIG_ARCH_HAS_PTE_DEVMAP */ 64305289402SAnshuman Khandual 64405289402SAnshuman Khandual static void __init pte_soft_dirty_tests(unsigned long pfn, pgprot_t prot) 64505289402SAnshuman Khandual { 64605289402SAnshuman Khandual pte_t pte = pfn_pte(pfn, prot); 64705289402SAnshuman Khandual 64805289402SAnshuman Khandual if (!IS_ENABLED(CONFIG_MEM_SOFT_DIRTY)) 64905289402SAnshuman Khandual return; 65005289402SAnshuman Khandual 6516315df41SAnshuman Khandual pr_debug("Validating PTE soft dirty\n"); 65205289402SAnshuman Khandual WARN_ON(!pte_soft_dirty(pte_mksoft_dirty(pte))); 65305289402SAnshuman Khandual WARN_ON(pte_soft_dirty(pte_clear_soft_dirty(pte))); 65405289402SAnshuman Khandual } 65505289402SAnshuman Khandual 65605289402SAnshuman Khandual static void __init pte_swap_soft_dirty_tests(unsigned long pfn, pgprot_t prot) 65705289402SAnshuman Khandual { 65805289402SAnshuman Khandual pte_t pte = pfn_pte(pfn, prot); 65905289402SAnshuman Khandual 66005289402SAnshuman Khandual if (!IS_ENABLED(CONFIG_MEM_SOFT_DIRTY)) 66105289402SAnshuman Khandual return; 66205289402SAnshuman Khandual 6636315df41SAnshuman Khandual pr_debug("Validating PTE swap soft dirty\n"); 66405289402SAnshuman Khandual WARN_ON(!pte_swp_soft_dirty(pte_swp_mksoft_dirty(pte))); 66505289402SAnshuman Khandual WARN_ON(pte_swp_soft_dirty(pte_swp_clear_soft_dirty(pte))); 66605289402SAnshuman Khandual } 66705289402SAnshuman Khandual 66805289402SAnshuman Khandual #ifdef CONFIG_TRANSPARENT_HUGEPAGE 66905289402SAnshuman Khandual static void __init pmd_soft_dirty_tests(unsigned long pfn, pgprot_t prot) 67005289402SAnshuman Khandual { 67105289402SAnshuman Khandual pmd_t pmd = pfn_pmd(pfn, prot); 67205289402SAnshuman Khandual 67305289402SAnshuman Khandual if (!IS_ENABLED(CONFIG_MEM_SOFT_DIRTY)) 67405289402SAnshuman Khandual return; 67505289402SAnshuman Khandual 6766315df41SAnshuman Khandual pr_debug("Validating PMD soft dirty\n"); 67705289402SAnshuman Khandual WARN_ON(!pmd_soft_dirty(pmd_mksoft_dirty(pmd))); 67805289402SAnshuman Khandual WARN_ON(pmd_soft_dirty(pmd_clear_soft_dirty(pmd))); 67905289402SAnshuman Khandual } 68005289402SAnshuman Khandual 68105289402SAnshuman Khandual static void __init pmd_swap_soft_dirty_tests(unsigned long pfn, pgprot_t prot) 68205289402SAnshuman Khandual { 68305289402SAnshuman Khandual pmd_t pmd = pfn_pmd(pfn, prot); 68405289402SAnshuman Khandual 68505289402SAnshuman Khandual if (!IS_ENABLED(CONFIG_MEM_SOFT_DIRTY) || 68605289402SAnshuman Khandual !IS_ENABLED(CONFIG_ARCH_ENABLE_THP_MIGRATION)) 68705289402SAnshuman Khandual return; 68805289402SAnshuman Khandual 6896315df41SAnshuman Khandual pr_debug("Validating PMD swap soft dirty\n"); 69005289402SAnshuman Khandual WARN_ON(!pmd_swp_soft_dirty(pmd_swp_mksoft_dirty(pmd))); 69105289402SAnshuman Khandual WARN_ON(pmd_swp_soft_dirty(pmd_swp_clear_soft_dirty(pmd))); 69205289402SAnshuman Khandual } 69305289402SAnshuman Khandual #else /* !CONFIG_ARCH_HAS_PTE_DEVMAP */ 69405289402SAnshuman Khandual static void __init pmd_soft_dirty_tests(unsigned long pfn, pgprot_t prot) { } 69505289402SAnshuman Khandual static void __init pmd_swap_soft_dirty_tests(unsigned long pfn, pgprot_t prot) 69605289402SAnshuman Khandual { 69705289402SAnshuman Khandual } 69805289402SAnshuman Khandual #endif /* CONFIG_ARCH_HAS_PTE_DEVMAP */ 69905289402SAnshuman Khandual 70005289402SAnshuman Khandual static void __init pte_swap_tests(unsigned long pfn, pgprot_t prot) 70105289402SAnshuman Khandual { 70205289402SAnshuman Khandual swp_entry_t swp; 70305289402SAnshuman Khandual pte_t pte; 70405289402SAnshuman Khandual 7056315df41SAnshuman Khandual pr_debug("Validating PTE swap\n"); 70605289402SAnshuman Khandual pte = pfn_pte(pfn, prot); 70705289402SAnshuman Khandual swp = __pte_to_swp_entry(pte); 70805289402SAnshuman Khandual pte = __swp_entry_to_pte(swp); 70905289402SAnshuman Khandual WARN_ON(pfn != pte_pfn(pte)); 71005289402SAnshuman Khandual } 71105289402SAnshuman Khandual 71205289402SAnshuman Khandual #ifdef CONFIG_ARCH_ENABLE_THP_MIGRATION 71305289402SAnshuman Khandual static void __init pmd_swap_tests(unsigned long pfn, pgprot_t prot) 71405289402SAnshuman Khandual { 71505289402SAnshuman Khandual swp_entry_t swp; 71605289402SAnshuman Khandual pmd_t pmd; 71705289402SAnshuman Khandual 7186315df41SAnshuman Khandual pr_debug("Validating PMD swap\n"); 71905289402SAnshuman Khandual pmd = pfn_pmd(pfn, prot); 72005289402SAnshuman Khandual swp = __pmd_to_swp_entry(pmd); 72105289402SAnshuman Khandual pmd = __swp_entry_to_pmd(swp); 72205289402SAnshuman Khandual WARN_ON(pfn != pmd_pfn(pmd)); 72305289402SAnshuman Khandual } 72405289402SAnshuman Khandual #else /* !CONFIG_ARCH_ENABLE_THP_MIGRATION */ 72505289402SAnshuman Khandual static void __init pmd_swap_tests(unsigned long pfn, pgprot_t prot) { } 72605289402SAnshuman Khandual #endif /* CONFIG_ARCH_ENABLE_THP_MIGRATION */ 72705289402SAnshuman Khandual 72805289402SAnshuman Khandual static void __init swap_migration_tests(void) 72905289402SAnshuman Khandual { 73005289402SAnshuman Khandual struct page *page; 73105289402SAnshuman Khandual swp_entry_t swp; 73205289402SAnshuman Khandual 73305289402SAnshuman Khandual if (!IS_ENABLED(CONFIG_MIGRATION)) 73405289402SAnshuman Khandual return; 7356315df41SAnshuman Khandual 7366315df41SAnshuman Khandual pr_debug("Validating swap migration\n"); 73705289402SAnshuman Khandual /* 73805289402SAnshuman Khandual * swap_migration_tests() requires a dedicated page as it needs to 73905289402SAnshuman Khandual * be locked before creating a migration entry from it. Locking the 74005289402SAnshuman Khandual * page that actually maps kernel text ('start_kernel') can be real 74105289402SAnshuman Khandual * problematic. Lets allocate a dedicated page explicitly for this 74205289402SAnshuman Khandual * purpose that will be freed subsequently. 74305289402SAnshuman Khandual */ 74405289402SAnshuman Khandual page = alloc_page(GFP_KERNEL); 74505289402SAnshuman Khandual if (!page) { 74605289402SAnshuman Khandual pr_err("page allocation failed\n"); 74705289402SAnshuman Khandual return; 74805289402SAnshuman Khandual } 74905289402SAnshuman Khandual 75005289402SAnshuman Khandual /* 75105289402SAnshuman Khandual * make_migration_entry() expects given page to be 75205289402SAnshuman Khandual * locked, otherwise it stumbles upon a BUG_ON(). 75305289402SAnshuman Khandual */ 75405289402SAnshuman Khandual __SetPageLocked(page); 75505289402SAnshuman Khandual swp = make_migration_entry(page, 1); 75605289402SAnshuman Khandual WARN_ON(!is_migration_entry(swp)); 75705289402SAnshuman Khandual WARN_ON(!is_write_migration_entry(swp)); 75805289402SAnshuman Khandual 75905289402SAnshuman Khandual make_migration_entry_read(&swp); 76005289402SAnshuman Khandual WARN_ON(!is_migration_entry(swp)); 76105289402SAnshuman Khandual WARN_ON(is_write_migration_entry(swp)); 76205289402SAnshuman Khandual 76305289402SAnshuman Khandual swp = make_migration_entry(page, 0); 76405289402SAnshuman Khandual WARN_ON(!is_migration_entry(swp)); 76505289402SAnshuman Khandual WARN_ON(is_write_migration_entry(swp)); 76605289402SAnshuman Khandual __ClearPageLocked(page); 76705289402SAnshuman Khandual __free_page(page); 76805289402SAnshuman Khandual } 76905289402SAnshuman Khandual 77005289402SAnshuman Khandual #ifdef CONFIG_HUGETLB_PAGE 77105289402SAnshuman Khandual static void __init hugetlb_basic_tests(unsigned long pfn, pgprot_t prot) 77205289402SAnshuman Khandual { 77305289402SAnshuman Khandual struct page *page; 77405289402SAnshuman Khandual pte_t pte; 77505289402SAnshuman Khandual 7766315df41SAnshuman Khandual pr_debug("Validating HugeTLB basic\n"); 77705289402SAnshuman Khandual /* 77805289402SAnshuman Khandual * Accessing the page associated with the pfn is safe here, 77905289402SAnshuman Khandual * as it was previously derived from a real kernel symbol. 78005289402SAnshuman Khandual */ 78105289402SAnshuman Khandual page = pfn_to_page(pfn); 78205289402SAnshuman Khandual pte = mk_huge_pte(page, prot); 78305289402SAnshuman Khandual 78405289402SAnshuman Khandual WARN_ON(!huge_pte_dirty(huge_pte_mkdirty(pte))); 78505289402SAnshuman Khandual WARN_ON(!huge_pte_write(huge_pte_mkwrite(huge_pte_wrprotect(pte)))); 78605289402SAnshuman Khandual WARN_ON(huge_pte_write(huge_pte_wrprotect(huge_pte_mkwrite(pte)))); 78705289402SAnshuman Khandual 78805289402SAnshuman Khandual #ifdef CONFIG_ARCH_WANT_GENERAL_HUGETLB 78905289402SAnshuman Khandual pte = pfn_pte(pfn, prot); 79005289402SAnshuman Khandual 79105289402SAnshuman Khandual WARN_ON(!pte_huge(pte_mkhuge(pte))); 79205289402SAnshuman Khandual #endif /* CONFIG_ARCH_WANT_GENERAL_HUGETLB */ 79305289402SAnshuman Khandual } 794a5c3b9ffSAnshuman Khandual 795a5c3b9ffSAnshuman Khandual static void __init hugetlb_advanced_tests(struct mm_struct *mm, 796a5c3b9ffSAnshuman Khandual struct vm_area_struct *vma, 797a5c3b9ffSAnshuman Khandual pte_t *ptep, unsigned long pfn, 798a5c3b9ffSAnshuman Khandual unsigned long vaddr, pgprot_t prot) 799a5c3b9ffSAnshuman Khandual { 800a5c3b9ffSAnshuman Khandual struct page *page = pfn_to_page(pfn); 801a5c3b9ffSAnshuman Khandual pte_t pte = ptep_get(ptep); 802a5c3b9ffSAnshuman Khandual unsigned long paddr = __pfn_to_phys(pfn) & PMD_MASK; 803a5c3b9ffSAnshuman Khandual 8046315df41SAnshuman Khandual pr_debug("Validating HugeTLB advanced\n"); 805a5c3b9ffSAnshuman Khandual pte = pte_mkhuge(mk_pte(pfn_to_page(PHYS_PFN(paddr)), prot)); 806a5c3b9ffSAnshuman Khandual set_huge_pte_at(mm, vaddr, ptep, pte); 807a5c3b9ffSAnshuman Khandual barrier(); 808a5c3b9ffSAnshuman Khandual WARN_ON(!pte_same(pte, huge_ptep_get(ptep))); 809a5c3b9ffSAnshuman Khandual huge_pte_clear(mm, vaddr, ptep, PMD_SIZE); 810a5c3b9ffSAnshuman Khandual pte = huge_ptep_get(ptep); 811a5c3b9ffSAnshuman Khandual WARN_ON(!huge_pte_none(pte)); 812a5c3b9ffSAnshuman Khandual 813a5c3b9ffSAnshuman Khandual pte = mk_huge_pte(page, prot); 814a5c3b9ffSAnshuman Khandual set_huge_pte_at(mm, vaddr, ptep, pte); 815a5c3b9ffSAnshuman Khandual barrier(); 816a5c3b9ffSAnshuman Khandual huge_ptep_set_wrprotect(mm, vaddr, ptep); 817a5c3b9ffSAnshuman Khandual pte = huge_ptep_get(ptep); 818a5c3b9ffSAnshuman Khandual WARN_ON(huge_pte_write(pte)); 819a5c3b9ffSAnshuman Khandual 820a5c3b9ffSAnshuman Khandual pte = mk_huge_pte(page, prot); 821a5c3b9ffSAnshuman Khandual set_huge_pte_at(mm, vaddr, ptep, pte); 822a5c3b9ffSAnshuman Khandual barrier(); 823a5c3b9ffSAnshuman Khandual huge_ptep_get_and_clear(mm, vaddr, ptep); 824a5c3b9ffSAnshuman Khandual pte = huge_ptep_get(ptep); 825a5c3b9ffSAnshuman Khandual WARN_ON(!huge_pte_none(pte)); 826a5c3b9ffSAnshuman Khandual 827a5c3b9ffSAnshuman Khandual pte = mk_huge_pte(page, prot); 828a5c3b9ffSAnshuman Khandual pte = huge_pte_wrprotect(pte); 829a5c3b9ffSAnshuman Khandual set_huge_pte_at(mm, vaddr, ptep, pte); 830a5c3b9ffSAnshuman Khandual barrier(); 831a5c3b9ffSAnshuman Khandual pte = huge_pte_mkwrite(pte); 832a5c3b9ffSAnshuman Khandual pte = huge_pte_mkdirty(pte); 833a5c3b9ffSAnshuman Khandual huge_ptep_set_access_flags(vma, vaddr, ptep, pte, 1); 834a5c3b9ffSAnshuman Khandual pte = huge_ptep_get(ptep); 835a5c3b9ffSAnshuman Khandual WARN_ON(!(huge_pte_write(pte) && huge_pte_dirty(pte))); 836a5c3b9ffSAnshuman Khandual } 83705289402SAnshuman Khandual #else /* !CONFIG_HUGETLB_PAGE */ 83805289402SAnshuman Khandual static void __init hugetlb_basic_tests(unsigned long pfn, pgprot_t prot) { } 839a5c3b9ffSAnshuman Khandual static void __init hugetlb_advanced_tests(struct mm_struct *mm, 840a5c3b9ffSAnshuman Khandual struct vm_area_struct *vma, 841a5c3b9ffSAnshuman Khandual pte_t *ptep, unsigned long pfn, 842a5c3b9ffSAnshuman Khandual unsigned long vaddr, pgprot_t prot) 843a5c3b9ffSAnshuman Khandual { 844a5c3b9ffSAnshuman Khandual } 84505289402SAnshuman Khandual #endif /* CONFIG_HUGETLB_PAGE */ 84605289402SAnshuman Khandual 84705289402SAnshuman Khandual #ifdef CONFIG_TRANSPARENT_HUGEPAGE 84805289402SAnshuman Khandual static void __init pmd_thp_tests(unsigned long pfn, pgprot_t prot) 84905289402SAnshuman Khandual { 85005289402SAnshuman Khandual pmd_t pmd; 85105289402SAnshuman Khandual 85205289402SAnshuman Khandual if (!has_transparent_hugepage()) 85305289402SAnshuman Khandual return; 85405289402SAnshuman Khandual 8556315df41SAnshuman Khandual pr_debug("Validating PMD based THP\n"); 85605289402SAnshuman Khandual /* 85705289402SAnshuman Khandual * pmd_trans_huge() and pmd_present() must return positive after 85805289402SAnshuman Khandual * MMU invalidation with pmd_mkinvalid(). This behavior is an 85905289402SAnshuman Khandual * optimization for transparent huge page. pmd_trans_huge() must 86005289402SAnshuman Khandual * be true if pmd_page() returns a valid THP to avoid taking the 86105289402SAnshuman Khandual * pmd_lock when others walk over non transhuge pmds (i.e. there 86205289402SAnshuman Khandual * are no THP allocated). Especially when splitting a THP and 86305289402SAnshuman Khandual * removing the present bit from the pmd, pmd_trans_huge() still 86405289402SAnshuman Khandual * needs to return true. pmd_present() should be true whenever 86505289402SAnshuman Khandual * pmd_trans_huge() returns true. 86605289402SAnshuman Khandual */ 86705289402SAnshuman Khandual pmd = pfn_pmd(pfn, prot); 86805289402SAnshuman Khandual WARN_ON(!pmd_trans_huge(pmd_mkhuge(pmd))); 86905289402SAnshuman Khandual 87005289402SAnshuman Khandual #ifndef __HAVE_ARCH_PMDP_INVALIDATE 87105289402SAnshuman Khandual WARN_ON(!pmd_trans_huge(pmd_mkinvalid(pmd_mkhuge(pmd)))); 87205289402SAnshuman Khandual WARN_ON(!pmd_present(pmd_mkinvalid(pmd_mkhuge(pmd)))); 87305289402SAnshuman Khandual #endif /* __HAVE_ARCH_PMDP_INVALIDATE */ 87405289402SAnshuman Khandual } 87505289402SAnshuman Khandual 87605289402SAnshuman Khandual #ifdef CONFIG_HAVE_ARCH_TRANSPARENT_HUGEPAGE_PUD 87705289402SAnshuman Khandual static void __init pud_thp_tests(unsigned long pfn, pgprot_t prot) 87805289402SAnshuman Khandual { 87905289402SAnshuman Khandual pud_t pud; 88005289402SAnshuman Khandual 88105289402SAnshuman Khandual if (!has_transparent_hugepage()) 88205289402SAnshuman Khandual return; 88305289402SAnshuman Khandual 8846315df41SAnshuman Khandual pr_debug("Validating PUD based THP\n"); 88505289402SAnshuman Khandual pud = pfn_pud(pfn, prot); 88605289402SAnshuman Khandual WARN_ON(!pud_trans_huge(pud_mkhuge(pud))); 88705289402SAnshuman Khandual 88805289402SAnshuman Khandual /* 88905289402SAnshuman Khandual * pud_mkinvalid() has been dropped for now. Enable back 89005289402SAnshuman Khandual * these tests when it comes back with a modified pud_present(). 89105289402SAnshuman Khandual * 89205289402SAnshuman Khandual * WARN_ON(!pud_trans_huge(pud_mkinvalid(pud_mkhuge(pud)))); 89305289402SAnshuman Khandual * WARN_ON(!pud_present(pud_mkinvalid(pud_mkhuge(pud)))); 89405289402SAnshuman Khandual */ 89505289402SAnshuman Khandual } 89605289402SAnshuman Khandual #else /* !CONFIG_HAVE_ARCH_TRANSPARENT_HUGEPAGE_PUD */ 89705289402SAnshuman Khandual static void __init pud_thp_tests(unsigned long pfn, pgprot_t prot) { } 89805289402SAnshuman Khandual #endif /* CONFIG_HAVE_ARCH_TRANSPARENT_HUGEPAGE_PUD */ 89905289402SAnshuman Khandual #else /* !CONFIG_TRANSPARENT_HUGEPAGE */ 90005289402SAnshuman Khandual static void __init pmd_thp_tests(unsigned long pfn, pgprot_t prot) { } 90105289402SAnshuman Khandual static void __init pud_thp_tests(unsigned long pfn, pgprot_t prot) { } 90205289402SAnshuman Khandual #endif /* CONFIG_TRANSPARENT_HUGEPAGE */ 90305289402SAnshuman Khandual 904399145f9SAnshuman Khandual static unsigned long __init get_random_vaddr(void) 905399145f9SAnshuman Khandual { 906399145f9SAnshuman Khandual unsigned long random_vaddr, random_pages, total_user_pages; 907399145f9SAnshuman Khandual 908399145f9SAnshuman Khandual total_user_pages = (TASK_SIZE - FIRST_USER_ADDRESS) / PAGE_SIZE; 909399145f9SAnshuman Khandual 910399145f9SAnshuman Khandual random_pages = get_random_long() % total_user_pages; 911399145f9SAnshuman Khandual random_vaddr = FIRST_USER_ADDRESS + random_pages * PAGE_SIZE; 912399145f9SAnshuman Khandual 913399145f9SAnshuman Khandual return random_vaddr; 914399145f9SAnshuman Khandual } 915399145f9SAnshuman Khandual 916399145f9SAnshuman Khandual static int __init debug_vm_pgtable(void) 917399145f9SAnshuman Khandual { 918a5c3b9ffSAnshuman Khandual struct vm_area_struct *vma; 919399145f9SAnshuman Khandual struct mm_struct *mm; 920399145f9SAnshuman Khandual pgd_t *pgdp; 921399145f9SAnshuman Khandual p4d_t *p4dp, *saved_p4dp; 922399145f9SAnshuman Khandual pud_t *pudp, *saved_pudp; 923399145f9SAnshuman Khandual pmd_t *pmdp, *saved_pmdp, pmd; 924399145f9SAnshuman Khandual pte_t *ptep; 925399145f9SAnshuman Khandual pgtable_t saved_ptep; 92605289402SAnshuman Khandual pgprot_t prot, protnone; 927399145f9SAnshuman Khandual phys_addr_t paddr; 928399145f9SAnshuman Khandual unsigned long vaddr, pte_aligned, pmd_aligned; 929399145f9SAnshuman Khandual unsigned long pud_aligned, p4d_aligned, pgd_aligned; 930fea1120cSKees Cook spinlock_t *ptl = NULL; 931399145f9SAnshuman Khandual 932399145f9SAnshuman Khandual pr_info("Validating architecture page table helpers\n"); 933399145f9SAnshuman Khandual prot = vm_get_page_prot(VMFLAGS); 934399145f9SAnshuman Khandual vaddr = get_random_vaddr(); 935399145f9SAnshuman Khandual mm = mm_alloc(); 936399145f9SAnshuman Khandual if (!mm) { 937399145f9SAnshuman Khandual pr_err("mm_struct allocation failed\n"); 938399145f9SAnshuman Khandual return 1; 939399145f9SAnshuman Khandual } 940399145f9SAnshuman Khandual 941399145f9SAnshuman Khandual /* 94205289402SAnshuman Khandual * __P000 (or even __S000) will help create page table entries with 94305289402SAnshuman Khandual * PROT_NONE permission as required for pxx_protnone_tests(). 94405289402SAnshuman Khandual */ 94505289402SAnshuman Khandual protnone = __P000; 94605289402SAnshuman Khandual 947a5c3b9ffSAnshuman Khandual vma = vm_area_alloc(mm); 948a5c3b9ffSAnshuman Khandual if (!vma) { 949a5c3b9ffSAnshuman Khandual pr_err("vma allocation failed\n"); 950a5c3b9ffSAnshuman Khandual return 1; 951a5c3b9ffSAnshuman Khandual } 952a5c3b9ffSAnshuman Khandual 95305289402SAnshuman Khandual /* 954399145f9SAnshuman Khandual * PFN for mapping at PTE level is determined from a standard kernel 955399145f9SAnshuman Khandual * text symbol. But pfns for higher page table levels are derived by 956399145f9SAnshuman Khandual * masking lower bits of this real pfn. These derived pfns might not 957399145f9SAnshuman Khandual * exist on the platform but that does not really matter as pfn_pxx() 958399145f9SAnshuman Khandual * helpers will still create appropriate entries for the test. This 959399145f9SAnshuman Khandual * helps avoid large memory block allocations to be used for mapping 960399145f9SAnshuman Khandual * at higher page table levels. 961399145f9SAnshuman Khandual */ 962399145f9SAnshuman Khandual paddr = __pa_symbol(&start_kernel); 963399145f9SAnshuman Khandual 964399145f9SAnshuman Khandual pte_aligned = (paddr & PAGE_MASK) >> PAGE_SHIFT; 965399145f9SAnshuman Khandual pmd_aligned = (paddr & PMD_MASK) >> PAGE_SHIFT; 966399145f9SAnshuman Khandual pud_aligned = (paddr & PUD_MASK) >> PAGE_SHIFT; 967399145f9SAnshuman Khandual p4d_aligned = (paddr & P4D_MASK) >> PAGE_SHIFT; 968399145f9SAnshuman Khandual pgd_aligned = (paddr & PGDIR_MASK) >> PAGE_SHIFT; 969399145f9SAnshuman Khandual WARN_ON(!pfn_valid(pte_aligned)); 970399145f9SAnshuman Khandual 971399145f9SAnshuman Khandual pgdp = pgd_offset(mm, vaddr); 972399145f9SAnshuman Khandual p4dp = p4d_alloc(mm, pgdp, vaddr); 973399145f9SAnshuman Khandual pudp = pud_alloc(mm, p4dp, vaddr); 974399145f9SAnshuman Khandual pmdp = pmd_alloc(mm, pudp, vaddr); 975399145f9SAnshuman Khandual ptep = pte_alloc_map_lock(mm, pmdp, vaddr, &ptl); 976399145f9SAnshuman Khandual 977399145f9SAnshuman Khandual /* 978399145f9SAnshuman Khandual * Save all the page table page addresses as the page table 979399145f9SAnshuman Khandual * entries will be used for testing with random or garbage 980399145f9SAnshuman Khandual * values. These saved addresses will be used for freeing 981399145f9SAnshuman Khandual * page table pages. 982399145f9SAnshuman Khandual */ 983399145f9SAnshuman Khandual pmd = READ_ONCE(*pmdp); 984399145f9SAnshuman Khandual saved_p4dp = p4d_offset(pgdp, 0UL); 985399145f9SAnshuman Khandual saved_pudp = pud_offset(p4dp, 0UL); 986399145f9SAnshuman Khandual saved_pmdp = pmd_offset(pudp, 0UL); 987399145f9SAnshuman Khandual saved_ptep = pmd_pgtable(pmd); 988399145f9SAnshuman Khandual 989399145f9SAnshuman Khandual pte_basic_tests(pte_aligned, prot); 990399145f9SAnshuman Khandual pmd_basic_tests(pmd_aligned, prot); 991399145f9SAnshuman Khandual pud_basic_tests(pud_aligned, prot); 992399145f9SAnshuman Khandual p4d_basic_tests(p4d_aligned, prot); 993399145f9SAnshuman Khandual pgd_basic_tests(pgd_aligned, prot); 994399145f9SAnshuman Khandual 995399145f9SAnshuman Khandual pte_clear_tests(mm, ptep, vaddr); 996399145f9SAnshuman Khandual pmd_clear_tests(mm, pmdp); 997399145f9SAnshuman Khandual pud_clear_tests(mm, pudp); 998399145f9SAnshuman Khandual p4d_clear_tests(mm, p4dp); 999399145f9SAnshuman Khandual pgd_clear_tests(mm, pgdp); 1000399145f9SAnshuman Khandual 1001a5c3b9ffSAnshuman Khandual pte_advanced_tests(mm, vma, ptep, pte_aligned, vaddr, prot); 1002a5c3b9ffSAnshuman Khandual pmd_advanced_tests(mm, vma, pmdp, pmd_aligned, vaddr, prot); 1003a5c3b9ffSAnshuman Khandual pud_advanced_tests(mm, vma, pudp, pud_aligned, vaddr, prot); 1004a5c3b9ffSAnshuman Khandual hugetlb_advanced_tests(mm, vma, ptep, pte_aligned, vaddr, prot); 1005a5c3b9ffSAnshuman Khandual 1006a5c3b9ffSAnshuman Khandual pmd_leaf_tests(pmd_aligned, prot); 1007a5c3b9ffSAnshuman Khandual pud_leaf_tests(pud_aligned, prot); 1008a5c3b9ffSAnshuman Khandual 1009a5c3b9ffSAnshuman Khandual pmd_huge_tests(pmdp, pmd_aligned, prot); 1010a5c3b9ffSAnshuman Khandual pud_huge_tests(pudp, pud_aligned, prot); 1011a5c3b9ffSAnshuman Khandual 1012a5c3b9ffSAnshuman Khandual pte_savedwrite_tests(pte_aligned, prot); 1013a5c3b9ffSAnshuman Khandual pmd_savedwrite_tests(pmd_aligned, prot); 1014a5c3b9ffSAnshuman Khandual 1015399145f9SAnshuman Khandual pte_unmap_unlock(ptep, ptl); 1016399145f9SAnshuman Khandual 1017399145f9SAnshuman Khandual pmd_populate_tests(mm, pmdp, saved_ptep); 1018399145f9SAnshuman Khandual pud_populate_tests(mm, pudp, saved_pmdp); 1019399145f9SAnshuman Khandual p4d_populate_tests(mm, p4dp, saved_pudp); 1020399145f9SAnshuman Khandual pgd_populate_tests(mm, pgdp, saved_p4dp); 1021399145f9SAnshuman Khandual 102205289402SAnshuman Khandual pte_special_tests(pte_aligned, prot); 102305289402SAnshuman Khandual pte_protnone_tests(pte_aligned, protnone); 102405289402SAnshuman Khandual pmd_protnone_tests(pmd_aligned, protnone); 102505289402SAnshuman Khandual 102605289402SAnshuman Khandual pte_devmap_tests(pte_aligned, prot); 102705289402SAnshuman Khandual pmd_devmap_tests(pmd_aligned, prot); 102805289402SAnshuman Khandual pud_devmap_tests(pud_aligned, prot); 102905289402SAnshuman Khandual 103005289402SAnshuman Khandual pte_soft_dirty_tests(pte_aligned, prot); 103105289402SAnshuman Khandual pmd_soft_dirty_tests(pmd_aligned, prot); 103205289402SAnshuman Khandual pte_swap_soft_dirty_tests(pte_aligned, prot); 103305289402SAnshuman Khandual pmd_swap_soft_dirty_tests(pmd_aligned, prot); 103405289402SAnshuman Khandual 103505289402SAnshuman Khandual pte_swap_tests(pte_aligned, prot); 103605289402SAnshuman Khandual pmd_swap_tests(pmd_aligned, prot); 103705289402SAnshuman Khandual 103805289402SAnshuman Khandual swap_migration_tests(); 103905289402SAnshuman Khandual hugetlb_basic_tests(pte_aligned, prot); 104005289402SAnshuman Khandual 104105289402SAnshuman Khandual pmd_thp_tests(pmd_aligned, prot); 104205289402SAnshuman Khandual pud_thp_tests(pud_aligned, prot); 104305289402SAnshuman Khandual 1044399145f9SAnshuman Khandual p4d_free(mm, saved_p4dp); 1045399145f9SAnshuman Khandual pud_free(mm, saved_pudp); 1046399145f9SAnshuman Khandual pmd_free(mm, saved_pmdp); 1047399145f9SAnshuman Khandual pte_free(mm, saved_ptep); 1048399145f9SAnshuman Khandual 1049a5c3b9ffSAnshuman Khandual vm_area_free(vma); 1050399145f9SAnshuman Khandual mm_dec_nr_puds(mm); 1051399145f9SAnshuman Khandual mm_dec_nr_pmds(mm); 1052399145f9SAnshuman Khandual mm_dec_nr_ptes(mm); 1053399145f9SAnshuman Khandual mmdrop(mm); 1054399145f9SAnshuman Khandual return 0; 1055399145f9SAnshuman Khandual } 1056399145f9SAnshuman Khandual late_initcall(debug_vm_pgtable); 1057