blob: dc7df1254f0a06947164456de75fb248a32a1e60 [file] [log] [blame]
Anshuman Khandual399145f2020-06-04 16:47:15 -07001// SPDX-License-Identifier: GPL-2.0-only
2/*
3 * This kernel test validates architecture page table helpers and
4 * accessors and helps in verifying their continued compliance with
5 * expected generic MM semantics.
6 *
7 * Copyright (C) 2019 ARM Ltd.
8 *
9 * Author: Anshuman Khandual <anshuman.khandual@arm.com>
10 */
Anshuman Khandual6315df42020-08-06 23:19:25 -070011#define pr_fmt(fmt) "debug_vm_pgtable: [%-25s]: " fmt, __func__
Anshuman Khandual399145f2020-06-04 16:47:15 -070012
13#include <linux/gfp.h>
14#include <linux/highmem.h>
15#include <linux/hugetlb.h>
16#include <linux/kernel.h>
17#include <linux/kconfig.h>
18#include <linux/mm.h>
19#include <linux/mman.h>
20#include <linux/mm_types.h>
21#include <linux/module.h>
22#include <linux/pfn_t.h>
23#include <linux/printk.h>
Anshuman Khanduala5c3b9f2020-08-06 23:19:20 -070024#include <linux/pgtable.h>
Anshuman Khandual399145f2020-06-04 16:47:15 -070025#include <linux/random.h>
26#include <linux/spinlock.h>
27#include <linux/swap.h>
28#include <linux/swapops.h>
29#include <linux/start_kernel.h>
30#include <linux/sched/mm.h>
Aneesh Kumar K.V85a14462020-10-15 20:04:36 -070031#include <linux/io.h>
Gavin Shan8c5b3a82021-09-02 14:52:54 -070032
33#include <asm/cacheflush.h>
Anshuman Khandual399145f2020-06-04 16:47:15 -070034#include <asm/pgalloc.h>
Anshuman Khanduala5c3b9f2020-08-06 23:19:20 -070035#include <asm/tlbflush.h>
Anshuman Khandual399145f2020-06-04 16:47:15 -070036
Anshuman Khandualb1d00002020-08-06 23:19:28 -070037/*
Mike Rapoportee657282022-06-27 09:00:26 +030038 * Please refer Documentation/mm/arch_pgtable_helpers.rst for the semantics
Anshuman Khandualb1d00002020-08-06 23:19:28 -070039 * expectations that are being validated here. All future changes in here
40 * or the documentation need to be in sync.
41 */
42
Anshuman Khandual399145f2020-06-04 16:47:15 -070043#define VMFLAGS (VM_READ|VM_WRITE|VM_EXEC)
44
45/*
46 * On s390 platform, the lower 4 bits are used to identify given page table
47 * entry type. But these bits might affect the ability to clear entries with
48 * pxx_clear() because of how dynamic page table folding works on s390. So
49 * while loading up the entries do not change the lower 4 bits. It does not
Aneesh Kumar K.Vcfc5bbc2020-10-15 20:04:33 -070050 * have affect any other platform. Also avoid the 62nd bit on ppc64 that is
51 * used to mark a pte entry.
Anshuman Khandual399145f2020-06-04 16:47:15 -070052 */
Aneesh Kumar K.Vcfc5bbc2020-10-15 20:04:33 -070053#define S390_SKIP_MASK GENMASK(3, 0)
54#if __BITS_PER_LONG == 64
55#define PPC64_SKIP_MASK GENMASK(62, 62)
56#else
57#define PPC64_SKIP_MASK 0x0
58#endif
59#define ARCH_SKIP_MASK (S390_SKIP_MASK | PPC64_SKIP_MASK)
60#define RANDOM_ORVALUE (GENMASK(BITS_PER_LONG - 1, 0) & ~ARCH_SKIP_MASK)
Anshuman Khandual399145f2020-06-04 16:47:15 -070061#define RANDOM_NZVALUE GENMASK(7, 0)
62
Gavin Shan3c9b84f2021-09-02 14:52:19 -070063struct pgtable_debug_args {
64 struct mm_struct *mm;
65 struct vm_area_struct *vma;
66
67 pgd_t *pgdp;
68 p4d_t *p4dp;
69 pud_t *pudp;
70 pmd_t *pmdp;
71 pte_t *ptep;
72
73 p4d_t *start_p4dp;
74 pud_t *start_pudp;
75 pmd_t *start_pmdp;
76 pgtable_t start_ptep;
77
78 unsigned long vaddr;
79 pgprot_t page_prot;
80 pgprot_t page_prot_none;
81
82 bool is_contiguous_page;
83 unsigned long pud_pfn;
84 unsigned long pmd_pfn;
85 unsigned long pte_pfn;
86
87 unsigned long fixed_pgd_pfn;
88 unsigned long fixed_p4d_pfn;
89 unsigned long fixed_pud_pfn;
90 unsigned long fixed_pmd_pfn;
91 unsigned long fixed_pte_pfn;
92};
93
Gavin Shan36b77d12021-09-02 14:52:22 -070094static void __init pte_basic_tests(struct pgtable_debug_args *args, int idx)
Anshuman Khandual399145f2020-06-04 16:47:15 -070095{
Anshuman Khandual31d17072022-04-28 23:16:12 -070096 pgprot_t prot = vm_get_page_prot(idx);
Gavin Shan36b77d12021-09-02 14:52:22 -070097 pte_t pte = pfn_pte(args->fixed_pte_pfn, prot);
Anshuman Khandual2e326c02021-02-24 12:01:36 -080098 unsigned long val = idx, *ptr = &val;
Anshuman Khandual399145f2020-06-04 16:47:15 -070099
Anshuman Khandual2e326c02021-02-24 12:01:36 -0800100 pr_debug("Validating PTE basic (%pGv)\n", ptr);
Anshuman Khandualbb5c47c2021-02-24 12:01:32 -0800101
102 /*
103 * This test needs to be executed after the given page table entry
Anshuman Khandual31d17072022-04-28 23:16:12 -0700104 * is created with pfn_pte() to make sure that vm_get_page_prot(idx)
Anshuman Khandualbb5c47c2021-02-24 12:01:32 -0800105 * does not have the dirty bit enabled from the beginning. This is
106 * important for platforms like arm64 where (!PTE_RDONLY) indicate
107 * dirty bit being set.
108 */
109 WARN_ON(pte_dirty(pte_wrprotect(pte)));
110
Anshuman Khandual399145f2020-06-04 16:47:15 -0700111 WARN_ON(!pte_same(pte, pte));
112 WARN_ON(!pte_young(pte_mkyoung(pte_mkold(pte))));
113 WARN_ON(!pte_dirty(pte_mkdirty(pte_mkclean(pte))));
114 WARN_ON(!pte_write(pte_mkwrite(pte_wrprotect(pte))));
115 WARN_ON(pte_young(pte_mkold(pte_mkyoung(pte))));
116 WARN_ON(pte_dirty(pte_mkclean(pte_mkdirty(pte))));
117 WARN_ON(pte_write(pte_wrprotect(pte_mkwrite(pte))));
Anshuman Khandualbb5c47c2021-02-24 12:01:32 -0800118 WARN_ON(pte_dirty(pte_wrprotect(pte_mkclean(pte))));
119 WARN_ON(!pte_dirty(pte_wrprotect(pte_mkdirty(pte))));
Anshuman Khandual399145f2020-06-04 16:47:15 -0700120}
121
Gavin Shan44966c42021-09-02 14:52:38 -0700122static void __init pte_advanced_tests(struct pgtable_debug_args *args)
Anshuman Khanduala5c3b9f2020-08-06 23:19:20 -0700123{
Gavin Shan8c5b3a82021-09-02 14:52:54 -0700124 struct page *page;
Shixin Liub593b902021-06-30 18:47:40 -0700125 pte_t pte;
Anshuman Khanduala5c3b9f2020-08-06 23:19:20 -0700126
Aneesh Kumar K.Vc3824e12020-10-15 20:04:46 -0700127 /*
128 * Architectures optimize set_pte_at by avoiding TLB flush.
129 * This requires set_pte_at to be not used to update an
130 * existing pte entry. Clear pte before we do set_pte_at
Gavin Shan8c5b3a82021-09-02 14:52:54 -0700131 *
132 * flush_dcache_page() is called after set_pte_at() to clear
133 * PG_arch_1 for the page on ARM64. The page flag isn't cleared
134 * when it's released and page allocation check will fail when
135 * the page is allocated again. For architectures other than ARM64,
136 * the unexpected overhead of cache flushing is acceptable.
Aneesh Kumar K.Vc3824e12020-10-15 20:04:46 -0700137 */
Gavin Shan8c5b3a82021-09-02 14:52:54 -0700138 page = (args->pte_pfn != ULONG_MAX) ? pfn_to_page(args->pte_pfn) : NULL;
139 if (!page)
Gavin Shan44966c42021-09-02 14:52:38 -0700140 return;
Aneesh Kumar K.Vc3824e12020-10-15 20:04:46 -0700141
Anshuman Khandual6315df42020-08-06 23:19:25 -0700142 pr_debug("Validating PTE advanced\n");
Gavin Shan44966c42021-09-02 14:52:38 -0700143 pte = pfn_pte(args->pte_pfn, args->page_prot);
144 set_pte_at(args->mm, args->vaddr, args->ptep, pte);
Gavin Shan8c5b3a82021-09-02 14:52:54 -0700145 flush_dcache_page(page);
Gavin Shan44966c42021-09-02 14:52:38 -0700146 ptep_set_wrprotect(args->mm, args->vaddr, args->ptep);
147 pte = ptep_get(args->ptep);
Anshuman Khanduala5c3b9f2020-08-06 23:19:20 -0700148 WARN_ON(pte_write(pte));
Gavin Shan44966c42021-09-02 14:52:38 -0700149 ptep_get_and_clear(args->mm, args->vaddr, args->ptep);
150 pte = ptep_get(args->ptep);
Anshuman Khanduala5c3b9f2020-08-06 23:19:20 -0700151 WARN_ON(!pte_none(pte));
152
Gavin Shan44966c42021-09-02 14:52:38 -0700153 pte = pfn_pte(args->pte_pfn, args->page_prot);
Anshuman Khanduala5c3b9f2020-08-06 23:19:20 -0700154 pte = pte_wrprotect(pte);
155 pte = pte_mkclean(pte);
Gavin Shan44966c42021-09-02 14:52:38 -0700156 set_pte_at(args->mm, args->vaddr, args->ptep, pte);
Gavin Shan8c5b3a82021-09-02 14:52:54 -0700157 flush_dcache_page(page);
Anshuman Khanduala5c3b9f2020-08-06 23:19:20 -0700158 pte = pte_mkwrite(pte);
159 pte = pte_mkdirty(pte);
Gavin Shan44966c42021-09-02 14:52:38 -0700160 ptep_set_access_flags(args->vma, args->vaddr, args->ptep, pte, 1);
161 pte = ptep_get(args->ptep);
Anshuman Khanduala5c3b9f2020-08-06 23:19:20 -0700162 WARN_ON(!(pte_write(pte) && pte_dirty(pte)));
Gavin Shan44966c42021-09-02 14:52:38 -0700163 ptep_get_and_clear_full(args->mm, args->vaddr, args->ptep, 1);
164 pte = ptep_get(args->ptep);
Anshuman Khanduala5c3b9f2020-08-06 23:19:20 -0700165 WARN_ON(!pte_none(pte));
166
Gavin Shan44966c42021-09-02 14:52:38 -0700167 pte = pfn_pte(args->pte_pfn, args->page_prot);
Anshuman Khanduala5c3b9f2020-08-06 23:19:20 -0700168 pte = pte_mkyoung(pte);
Gavin Shan44966c42021-09-02 14:52:38 -0700169 set_pte_at(args->mm, args->vaddr, args->ptep, pte);
Gavin Shan8c5b3a82021-09-02 14:52:54 -0700170 flush_dcache_page(page);
Gavin Shan44966c42021-09-02 14:52:38 -0700171 ptep_test_and_clear_young(args->vma, args->vaddr, args->ptep);
172 pte = ptep_get(args->ptep);
Anshuman Khanduala5c3b9f2020-08-06 23:19:20 -0700173 WARN_ON(pte_young(pte));
Pasha Tatashinfb5222a2022-02-03 20:49:10 -0800174
175 ptep_get_and_clear_full(args->mm, args->vaddr, args->ptep, 1);
Anshuman Khanduala5c3b9f2020-08-06 23:19:20 -0700176}
177
Gavin Shan8983d232021-09-02 14:52:25 -0700178static void __init pte_savedwrite_tests(struct pgtable_debug_args *args)
Anshuman Khanduala5c3b9f2020-08-06 23:19:20 -0700179{
Gavin Shan8983d232021-09-02 14:52:25 -0700180 pte_t pte = pfn_pte(args->fixed_pte_pfn, args->page_prot_none);
Anshuman Khanduala5c3b9f2020-08-06 23:19:20 -0700181
Aneesh Kumar K.V42006052020-10-15 20:04:40 -0700182 if (!IS_ENABLED(CONFIG_NUMA_BALANCING))
183 return;
184
Anshuman Khandual6315df42020-08-06 23:19:25 -0700185 pr_debug("Validating PTE saved write\n");
Anshuman Khanduala5c3b9f2020-08-06 23:19:20 -0700186 WARN_ON(!pte_savedwrite(pte_mk_savedwrite(pte_clear_savedwrite(pte))));
187 WARN_ON(pte_savedwrite(pte_clear_savedwrite(pte_mk_savedwrite(pte))));
188}
Aneesh Kumar K.V42006052020-10-15 20:04:40 -0700189
Anshuman Khandual399145f2020-06-04 16:47:15 -0700190#ifdef CONFIG_TRANSPARENT_HUGEPAGE
Gavin Shan36b77d12021-09-02 14:52:22 -0700191static void __init pmd_basic_tests(struct pgtable_debug_args *args, int idx)
Anshuman Khandual399145f2020-06-04 16:47:15 -0700192{
Anshuman Khandual31d17072022-04-28 23:16:12 -0700193 pgprot_t prot = vm_get_page_prot(idx);
Anshuman Khandual2e326c02021-02-24 12:01:36 -0800194 unsigned long val = idx, *ptr = &val;
Anshuman Khandual65ac1a62021-06-28 19:35:10 -0700195 pmd_t pmd;
Anshuman Khandual399145f2020-06-04 16:47:15 -0700196
Aneesh Kumar K.V787d5632020-06-10 18:41:44 -0700197 if (!has_transparent_hugepage())
198 return;
199
Anshuman Khandual2e326c02021-02-24 12:01:36 -0800200 pr_debug("Validating PMD basic (%pGv)\n", ptr);
Gavin Shan36b77d12021-09-02 14:52:22 -0700201 pmd = pfn_pmd(args->fixed_pmd_pfn, prot);
Anshuman Khandualbb5c47c2021-02-24 12:01:32 -0800202
203 /*
204 * This test needs to be executed after the given page table entry
Anshuman Khandual31d17072022-04-28 23:16:12 -0700205 * is created with pfn_pmd() to make sure that vm_get_page_prot(idx)
Anshuman Khandualbb5c47c2021-02-24 12:01:32 -0800206 * does not have the dirty bit enabled from the beginning. This is
207 * important for platforms like arm64 where (!PTE_RDONLY) indicate
208 * dirty bit being set.
209 */
210 WARN_ON(pmd_dirty(pmd_wrprotect(pmd)));
211
212
Anshuman Khandual399145f2020-06-04 16:47:15 -0700213 WARN_ON(!pmd_same(pmd, pmd));
214 WARN_ON(!pmd_young(pmd_mkyoung(pmd_mkold(pmd))));
215 WARN_ON(!pmd_dirty(pmd_mkdirty(pmd_mkclean(pmd))));
216 WARN_ON(!pmd_write(pmd_mkwrite(pmd_wrprotect(pmd))));
217 WARN_ON(pmd_young(pmd_mkold(pmd_mkyoung(pmd))));
218 WARN_ON(pmd_dirty(pmd_mkclean(pmd_mkdirty(pmd))));
219 WARN_ON(pmd_write(pmd_wrprotect(pmd_mkwrite(pmd))));
Anshuman Khandualbb5c47c2021-02-24 12:01:32 -0800220 WARN_ON(pmd_dirty(pmd_wrprotect(pmd_mkclean(pmd))));
221 WARN_ON(!pmd_dirty(pmd_wrprotect(pmd_mkdirty(pmd))));
Anshuman Khandual399145f2020-06-04 16:47:15 -0700222 /*
223 * A huge page does not point to next level page table
224 * entry. Hence this must qualify as pmd_bad().
225 */
226 WARN_ON(!pmd_bad(pmd_mkhuge(pmd)));
227}
228
Gavin Shanc0fe07b2021-09-02 14:52:41 -0700229static void __init pmd_advanced_tests(struct pgtable_debug_args *args)
Anshuman Khanduala5c3b9f2020-08-06 23:19:20 -0700230{
Gavin Shan8c5b3a82021-09-02 14:52:54 -0700231 struct page *page;
Anshuman Khandual65ac1a62021-06-28 19:35:10 -0700232 pmd_t pmd;
Gavin Shanc0fe07b2021-09-02 14:52:41 -0700233 unsigned long vaddr = args->vaddr;
Anshuman Khanduala5c3b9f2020-08-06 23:19:20 -0700234
235 if (!has_transparent_hugepage())
236 return;
237
Gavin Shan8c5b3a82021-09-02 14:52:54 -0700238 page = (args->pmd_pfn != ULONG_MAX) ? pfn_to_page(args->pmd_pfn) : NULL;
239 if (!page)
Gavin Shanc0fe07b2021-09-02 14:52:41 -0700240 return;
241
Gavin Shan8c5b3a82021-09-02 14:52:54 -0700242 /*
243 * flush_dcache_page() is called after set_pmd_at() to clear
244 * PG_arch_1 for the page on ARM64. The page flag isn't cleared
245 * when it's released and page allocation check will fail when
246 * the page is allocated again. For architectures other than ARM64,
247 * the unexpected overhead of cache flushing is acceptable.
248 */
Anshuman Khandual6315df42020-08-06 23:19:25 -0700249 pr_debug("Validating PMD advanced\n");
Anshuman Khanduala5c3b9f2020-08-06 23:19:20 -0700250 /* Align the address wrt HPAGE_PMD_SIZE */
Gerald Schaefer04f7ce32021-06-04 20:01:18 -0700251 vaddr &= HPAGE_PMD_MASK;
Anshuman Khanduala5c3b9f2020-08-06 23:19:20 -0700252
Gavin Shanc0fe07b2021-09-02 14:52:41 -0700253 pgtable_trans_huge_deposit(args->mm, args->pmdp, args->start_ptep);
Aneesh Kumar K.V87f34982020-10-15 20:04:56 -0700254
Gavin Shanc0fe07b2021-09-02 14:52:41 -0700255 pmd = pfn_pmd(args->pmd_pfn, args->page_prot);
256 set_pmd_at(args->mm, vaddr, args->pmdp, pmd);
Gavin Shan8c5b3a82021-09-02 14:52:54 -0700257 flush_dcache_page(page);
Gavin Shanc0fe07b2021-09-02 14:52:41 -0700258 pmdp_set_wrprotect(args->mm, vaddr, args->pmdp);
259 pmd = READ_ONCE(*args->pmdp);
Anshuman Khanduala5c3b9f2020-08-06 23:19:20 -0700260 WARN_ON(pmd_write(pmd));
Gavin Shanc0fe07b2021-09-02 14:52:41 -0700261 pmdp_huge_get_and_clear(args->mm, vaddr, args->pmdp);
262 pmd = READ_ONCE(*args->pmdp);
Anshuman Khanduala5c3b9f2020-08-06 23:19:20 -0700263 WARN_ON(!pmd_none(pmd));
264
Gavin Shanc0fe07b2021-09-02 14:52:41 -0700265 pmd = pfn_pmd(args->pmd_pfn, args->page_prot);
Anshuman Khanduala5c3b9f2020-08-06 23:19:20 -0700266 pmd = pmd_wrprotect(pmd);
267 pmd = pmd_mkclean(pmd);
Gavin Shanc0fe07b2021-09-02 14:52:41 -0700268 set_pmd_at(args->mm, vaddr, args->pmdp, pmd);
Gavin Shan8c5b3a82021-09-02 14:52:54 -0700269 flush_dcache_page(page);
Anshuman Khanduala5c3b9f2020-08-06 23:19:20 -0700270 pmd = pmd_mkwrite(pmd);
271 pmd = pmd_mkdirty(pmd);
Gavin Shanc0fe07b2021-09-02 14:52:41 -0700272 pmdp_set_access_flags(args->vma, vaddr, args->pmdp, pmd, 1);
273 pmd = READ_ONCE(*args->pmdp);
Anshuman Khanduala5c3b9f2020-08-06 23:19:20 -0700274 WARN_ON(!(pmd_write(pmd) && pmd_dirty(pmd)));
Gavin Shanc0fe07b2021-09-02 14:52:41 -0700275 pmdp_huge_get_and_clear_full(args->vma, vaddr, args->pmdp, 1);
276 pmd = READ_ONCE(*args->pmdp);
Anshuman Khanduala5c3b9f2020-08-06 23:19:20 -0700277 WARN_ON(!pmd_none(pmd));
278
Gavin Shanc0fe07b2021-09-02 14:52:41 -0700279 pmd = pmd_mkhuge(pfn_pmd(args->pmd_pfn, args->page_prot));
Anshuman Khanduala5c3b9f2020-08-06 23:19:20 -0700280 pmd = pmd_mkyoung(pmd);
Gavin Shanc0fe07b2021-09-02 14:52:41 -0700281 set_pmd_at(args->mm, vaddr, args->pmdp, pmd);
Gavin Shan8c5b3a82021-09-02 14:52:54 -0700282 flush_dcache_page(page);
Gavin Shanc0fe07b2021-09-02 14:52:41 -0700283 pmdp_test_and_clear_young(args->vma, vaddr, args->pmdp);
284 pmd = READ_ONCE(*args->pmdp);
Anshuman Khanduala5c3b9f2020-08-06 23:19:20 -0700285 WARN_ON(pmd_young(pmd));
Aneesh Kumar K.V87f34982020-10-15 20:04:56 -0700286
Aneesh Kumar K.V13af0502020-10-15 20:04:59 -0700287 /* Clear the pte entries */
Gavin Shanc0fe07b2021-09-02 14:52:41 -0700288 pmdp_huge_get_and_clear(args->mm, vaddr, args->pmdp);
289 pgtable_trans_huge_withdraw(args->mm, args->pmdp);
Anshuman Khanduala5c3b9f2020-08-06 23:19:20 -0700290}
291
Gavin Shan8983d232021-09-02 14:52:25 -0700292static void __init pmd_leaf_tests(struct pgtable_debug_args *args)
Anshuman Khanduala5c3b9f2020-08-06 23:19:20 -0700293{
Anshuman Khandual65ac1a62021-06-28 19:35:10 -0700294 pmd_t pmd;
295
296 if (!has_transparent_hugepage())
297 return;
Anshuman Khanduala5c3b9f2020-08-06 23:19:20 -0700298
Anshuman Khandual6315df42020-08-06 23:19:25 -0700299 pr_debug("Validating PMD leaf\n");
Gavin Shan8983d232021-09-02 14:52:25 -0700300 pmd = pfn_pmd(args->fixed_pmd_pfn, args->page_prot);
Anshuman Khandual65ac1a62021-06-28 19:35:10 -0700301
Anshuman Khanduala5c3b9f2020-08-06 23:19:20 -0700302 /*
303 * PMD based THP is a leaf entry.
304 */
305 pmd = pmd_mkhuge(pmd);
306 WARN_ON(!pmd_leaf(pmd));
307}
308
Gavin Shan8983d232021-09-02 14:52:25 -0700309static void __init pmd_savedwrite_tests(struct pgtable_debug_args *args)
Anshuman Khanduala5c3b9f2020-08-06 23:19:20 -0700310{
Anshuman Khandual65ac1a62021-06-28 19:35:10 -0700311 pmd_t pmd;
Anshuman Khanduala5c3b9f2020-08-06 23:19:20 -0700312
Aneesh Kumar K.V42006052020-10-15 20:04:40 -0700313 if (!IS_ENABLED(CONFIG_NUMA_BALANCING))
314 return;
315
Anshuman Khandual65ac1a62021-06-28 19:35:10 -0700316 if (!has_transparent_hugepage())
317 return;
318
Anshuman Khandual6315df42020-08-06 23:19:25 -0700319 pr_debug("Validating PMD saved write\n");
Gavin Shan8983d232021-09-02 14:52:25 -0700320 pmd = pfn_pmd(args->fixed_pmd_pfn, args->page_prot_none);
Anshuman Khanduala5c3b9f2020-08-06 23:19:20 -0700321 WARN_ON(!pmd_savedwrite(pmd_mk_savedwrite(pmd_clear_savedwrite(pmd))));
322 WARN_ON(pmd_savedwrite(pmd_clear_savedwrite(pmd_mk_savedwrite(pmd))));
323}
324
Anshuman Khandual399145f2020-06-04 16:47:15 -0700325#ifdef CONFIG_HAVE_ARCH_TRANSPARENT_HUGEPAGE_PUD
Gavin Shan36b77d12021-09-02 14:52:22 -0700326static void __init pud_basic_tests(struct pgtable_debug_args *args, int idx)
Anshuman Khandual399145f2020-06-04 16:47:15 -0700327{
Anshuman Khandual31d17072022-04-28 23:16:12 -0700328 pgprot_t prot = vm_get_page_prot(idx);
Anshuman Khandual2e326c02021-02-24 12:01:36 -0800329 unsigned long val = idx, *ptr = &val;
Anshuman Khandual65ac1a62021-06-28 19:35:10 -0700330 pud_t pud;
Anshuman Khandual399145f2020-06-04 16:47:15 -0700331
Aneesh Kumar K.V787d5632020-06-10 18:41:44 -0700332 if (!has_transparent_hugepage())
333 return;
334
Anshuman Khandual2e326c02021-02-24 12:01:36 -0800335 pr_debug("Validating PUD basic (%pGv)\n", ptr);
Gavin Shan36b77d12021-09-02 14:52:22 -0700336 pud = pfn_pud(args->fixed_pud_pfn, prot);
Anshuman Khandualbb5c47c2021-02-24 12:01:32 -0800337
338 /*
339 * This test needs to be executed after the given page table entry
Anshuman Khandual31d17072022-04-28 23:16:12 -0700340 * is created with pfn_pud() to make sure that vm_get_page_prot(idx)
Anshuman Khandualbb5c47c2021-02-24 12:01:32 -0800341 * does not have the dirty bit enabled from the beginning. This is
342 * important for platforms like arm64 where (!PTE_RDONLY) indicate
343 * dirty bit being set.
344 */
345 WARN_ON(pud_dirty(pud_wrprotect(pud)));
346
Anshuman Khandual399145f2020-06-04 16:47:15 -0700347 WARN_ON(!pud_same(pud, pud));
348 WARN_ON(!pud_young(pud_mkyoung(pud_mkold(pud))));
Anshuman Khandualbb5c47c2021-02-24 12:01:32 -0800349 WARN_ON(!pud_dirty(pud_mkdirty(pud_mkclean(pud))));
350 WARN_ON(pud_dirty(pud_mkclean(pud_mkdirty(pud))));
Anshuman Khandual399145f2020-06-04 16:47:15 -0700351 WARN_ON(!pud_write(pud_mkwrite(pud_wrprotect(pud))));
352 WARN_ON(pud_write(pud_wrprotect(pud_mkwrite(pud))));
353 WARN_ON(pud_young(pud_mkold(pud_mkyoung(pud))));
Anshuman Khandualbb5c47c2021-02-24 12:01:32 -0800354 WARN_ON(pud_dirty(pud_wrprotect(pud_mkclean(pud))));
355 WARN_ON(!pud_dirty(pud_wrprotect(pud_mkdirty(pud))));
Anshuman Khandual399145f2020-06-04 16:47:15 -0700356
Gavin Shan36b77d12021-09-02 14:52:22 -0700357 if (mm_pmd_folded(args->mm))
Anshuman Khandual399145f2020-06-04 16:47:15 -0700358 return;
359
360 /*
361 * A huge page does not point to next level page table
362 * entry. Hence this must qualify as pud_bad().
363 */
364 WARN_ON(!pud_bad(pud_mkhuge(pud)));
365}
Anshuman Khanduala5c3b9f2020-08-06 23:19:20 -0700366
Gavin Shan4cbde032021-09-02 14:52:45 -0700367static void __init pud_advanced_tests(struct pgtable_debug_args *args)
Anshuman Khanduala5c3b9f2020-08-06 23:19:20 -0700368{
Gavin Shan8c5b3a82021-09-02 14:52:54 -0700369 struct page *page;
Gavin Shan4cbde032021-09-02 14:52:45 -0700370 unsigned long vaddr = args->vaddr;
Anshuman Khandual65ac1a62021-06-28 19:35:10 -0700371 pud_t pud;
Anshuman Khanduala5c3b9f2020-08-06 23:19:20 -0700372
373 if (!has_transparent_hugepage())
374 return;
375
Gavin Shan8c5b3a82021-09-02 14:52:54 -0700376 page = (args->pud_pfn != ULONG_MAX) ? pfn_to_page(args->pud_pfn) : NULL;
377 if (!page)
Gavin Shan4cbde032021-09-02 14:52:45 -0700378 return;
379
Gavin Shan8c5b3a82021-09-02 14:52:54 -0700380 /*
381 * flush_dcache_page() is called after set_pud_at() to clear
382 * PG_arch_1 for the page on ARM64. The page flag isn't cleared
383 * when it's released and page allocation check will fail when
384 * the page is allocated again. For architectures other than ARM64,
385 * the unexpected overhead of cache flushing is acceptable.
386 */
Anshuman Khandual6315df42020-08-06 23:19:25 -0700387 pr_debug("Validating PUD advanced\n");
Anshuman Khanduala5c3b9f2020-08-06 23:19:20 -0700388 /* Align the address wrt HPAGE_PUD_SIZE */
Gerald Schaefer04f7ce32021-06-04 20:01:18 -0700389 vaddr &= HPAGE_PUD_MASK;
Anshuman Khanduala5c3b9f2020-08-06 23:19:20 -0700390
Gavin Shan4cbde032021-09-02 14:52:45 -0700391 pud = pfn_pud(args->pud_pfn, args->page_prot);
392 set_pud_at(args->mm, vaddr, args->pudp, pud);
Gavin Shan8c5b3a82021-09-02 14:52:54 -0700393 flush_dcache_page(page);
Gavin Shan4cbde032021-09-02 14:52:45 -0700394 pudp_set_wrprotect(args->mm, vaddr, args->pudp);
395 pud = READ_ONCE(*args->pudp);
Anshuman Khanduala5c3b9f2020-08-06 23:19:20 -0700396 WARN_ON(pud_write(pud));
397
398#ifndef __PAGETABLE_PMD_FOLDED
Gavin Shan4cbde032021-09-02 14:52:45 -0700399 pudp_huge_get_and_clear(args->mm, vaddr, args->pudp);
400 pud = READ_ONCE(*args->pudp);
Anshuman Khanduala5c3b9f2020-08-06 23:19:20 -0700401 WARN_ON(!pud_none(pud));
Anshuman Khanduala5c3b9f2020-08-06 23:19:20 -0700402#endif /* __PAGETABLE_PMD_FOLDED */
Gavin Shan4cbde032021-09-02 14:52:45 -0700403 pud = pfn_pud(args->pud_pfn, args->page_prot);
Anshuman Khanduala5c3b9f2020-08-06 23:19:20 -0700404 pud = pud_wrprotect(pud);
405 pud = pud_mkclean(pud);
Gavin Shan4cbde032021-09-02 14:52:45 -0700406 set_pud_at(args->mm, vaddr, args->pudp, pud);
Gavin Shan8c5b3a82021-09-02 14:52:54 -0700407 flush_dcache_page(page);
Anshuman Khanduala5c3b9f2020-08-06 23:19:20 -0700408 pud = pud_mkwrite(pud);
409 pud = pud_mkdirty(pud);
Gavin Shan4cbde032021-09-02 14:52:45 -0700410 pudp_set_access_flags(args->vma, vaddr, args->pudp, pud, 1);
411 pud = READ_ONCE(*args->pudp);
Anshuman Khanduala5c3b9f2020-08-06 23:19:20 -0700412 WARN_ON(!(pud_write(pud) && pud_dirty(pud)));
413
Aneesh Kumar K.Vc3824e12020-10-15 20:04:46 -0700414#ifndef __PAGETABLE_PMD_FOLDED
Gavin Shan4cbde032021-09-02 14:52:45 -0700415 pudp_huge_get_and_clear_full(args->mm, vaddr, args->pudp, 1);
416 pud = READ_ONCE(*args->pudp);
Aneesh Kumar K.Vc3824e12020-10-15 20:04:46 -0700417 WARN_ON(!pud_none(pud));
418#endif /* __PAGETABLE_PMD_FOLDED */
419
Gavin Shan4cbde032021-09-02 14:52:45 -0700420 pud = pfn_pud(args->pud_pfn, args->page_prot);
Anshuman Khanduala5c3b9f2020-08-06 23:19:20 -0700421 pud = pud_mkyoung(pud);
Gavin Shan4cbde032021-09-02 14:52:45 -0700422 set_pud_at(args->mm, vaddr, args->pudp, pud);
Gavin Shan8c5b3a82021-09-02 14:52:54 -0700423 flush_dcache_page(page);
Gavin Shan4cbde032021-09-02 14:52:45 -0700424 pudp_test_and_clear_young(args->vma, vaddr, args->pudp);
425 pud = READ_ONCE(*args->pudp);
Anshuman Khanduala5c3b9f2020-08-06 23:19:20 -0700426 WARN_ON(pud_young(pud));
Aneesh Kumar K.V13af0502020-10-15 20:04:59 -0700427
Gavin Shan4cbde032021-09-02 14:52:45 -0700428 pudp_huge_get_and_clear(args->mm, vaddr, args->pudp);
Anshuman Khanduala5c3b9f2020-08-06 23:19:20 -0700429}
430
Gavin Shan8983d232021-09-02 14:52:25 -0700431static void __init pud_leaf_tests(struct pgtable_debug_args *args)
Anshuman Khanduala5c3b9f2020-08-06 23:19:20 -0700432{
Anshuman Khandual65ac1a62021-06-28 19:35:10 -0700433 pud_t pud;
434
435 if (!has_transparent_hugepage())
436 return;
Anshuman Khanduala5c3b9f2020-08-06 23:19:20 -0700437
Anshuman Khandual6315df42020-08-06 23:19:25 -0700438 pr_debug("Validating PUD leaf\n");
Gavin Shan8983d232021-09-02 14:52:25 -0700439 pud = pfn_pud(args->fixed_pud_pfn, args->page_prot);
Anshuman Khanduala5c3b9f2020-08-06 23:19:20 -0700440 /*
441 * PUD based THP is a leaf entry.
442 */
443 pud = pud_mkhuge(pud);
444 WARN_ON(!pud_leaf(pud));
445}
Shixin Liu5fe77be2021-06-30 18:47:37 -0700446#else /* !CONFIG_HAVE_ARCH_TRANSPARENT_HUGEPAGE_PUD */
Gavin Shan36b77d12021-09-02 14:52:22 -0700447static void __init pud_basic_tests(struct pgtable_debug_args *args, int idx) { }
Gavin Shan4cbde032021-09-02 14:52:45 -0700448static void __init pud_advanced_tests(struct pgtable_debug_args *args) { }
Gavin Shan8983d232021-09-02 14:52:25 -0700449static void __init pud_leaf_tests(struct pgtable_debug_args *args) { }
Shixin Liu5fe77be2021-06-30 18:47:37 -0700450#endif /* CONFIG_HAVE_ARCH_TRANSPARENT_HUGEPAGE_PUD */
451#else /* !CONFIG_TRANSPARENT_HUGEPAGE */
Gavin Shan36b77d12021-09-02 14:52:22 -0700452static void __init pmd_basic_tests(struct pgtable_debug_args *args, int idx) { }
453static void __init pud_basic_tests(struct pgtable_debug_args *args, int idx) { }
Gavin Shanc0fe07b2021-09-02 14:52:41 -0700454static void __init pmd_advanced_tests(struct pgtable_debug_args *args) { }
Gavin Shan4cbde032021-09-02 14:52:45 -0700455static void __init pud_advanced_tests(struct pgtable_debug_args *args) { }
Gavin Shan8983d232021-09-02 14:52:25 -0700456static void __init pmd_leaf_tests(struct pgtable_debug_args *args) { }
457static void __init pud_leaf_tests(struct pgtable_debug_args *args) { }
458static void __init pmd_savedwrite_tests(struct pgtable_debug_args *args) { }
Shixin Liu5fe77be2021-06-30 18:47:37 -0700459#endif /* CONFIG_TRANSPARENT_HUGEPAGE */
Anshuman Khanduala5c3b9f2020-08-06 23:19:20 -0700460
Aneesh Kumar K.V85a14462020-10-15 20:04:36 -0700461#ifdef CONFIG_HAVE_ARCH_HUGE_VMAP
Gavin Shanc0fe07b2021-09-02 14:52:41 -0700462static void __init pmd_huge_tests(struct pgtable_debug_args *args)
Shixin Liu5fe77be2021-06-30 18:47:37 -0700463{
464 pmd_t pmd;
465
Gavin Shanc0fe07b2021-09-02 14:52:41 -0700466 if (!arch_vmap_pmd_supported(args->page_prot))
Shixin Liu5fe77be2021-06-30 18:47:37 -0700467 return;
468
469 pr_debug("Validating PMD huge\n");
470 /*
471 * X86 defined pmd_set_huge() verifies that the given
472 * PMD is not a populated non-leaf entry.
473 */
Gavin Shanc0fe07b2021-09-02 14:52:41 -0700474 WRITE_ONCE(*args->pmdp, __pmd(0));
475 WARN_ON(!pmd_set_huge(args->pmdp, __pfn_to_phys(args->fixed_pmd_pfn), args->page_prot));
476 WARN_ON(!pmd_clear_huge(args->pmdp));
477 pmd = READ_ONCE(*args->pmdp);
Shixin Liu5fe77be2021-06-30 18:47:37 -0700478 WARN_ON(!pmd_none(pmd));
479}
480
Gavin Shan4cbde032021-09-02 14:52:45 -0700481static void __init pud_huge_tests(struct pgtable_debug_args *args)
Anshuman Khanduala5c3b9f2020-08-06 23:19:20 -0700482{
483 pud_t pud;
484
Gavin Shan4cbde032021-09-02 14:52:45 -0700485 if (!arch_vmap_pud_supported(args->page_prot))
Anshuman Khanduala5c3b9f2020-08-06 23:19:20 -0700486 return;
Anshuman Khandual6315df42020-08-06 23:19:25 -0700487
488 pr_debug("Validating PUD huge\n");
Anshuman Khanduala5c3b9f2020-08-06 23:19:20 -0700489 /*
490 * X86 defined pud_set_huge() verifies that the given
491 * PUD is not a populated non-leaf entry.
492 */
Gavin Shan4cbde032021-09-02 14:52:45 -0700493 WRITE_ONCE(*args->pudp, __pud(0));
494 WARN_ON(!pud_set_huge(args->pudp, __pfn_to_phys(args->fixed_pud_pfn), args->page_prot));
495 WARN_ON(!pud_clear_huge(args->pudp));
496 pud = READ_ONCE(*args->pudp);
Anshuman Khanduala5c3b9f2020-08-06 23:19:20 -0700497 WARN_ON(!pud_none(pud));
498}
Aneesh Kumar K.V85a14462020-10-15 20:04:36 -0700499#else /* !CONFIG_HAVE_ARCH_HUGE_VMAP */
Gavin Shanc0fe07b2021-09-02 14:52:41 -0700500static void __init pmd_huge_tests(struct pgtable_debug_args *args) { }
Gavin Shan4cbde032021-09-02 14:52:45 -0700501static void __init pud_huge_tests(struct pgtable_debug_args *args) { }
Shixin Liu5fe77be2021-06-30 18:47:37 -0700502#endif /* CONFIG_HAVE_ARCH_HUGE_VMAP */
Anshuman Khandual399145f2020-06-04 16:47:15 -0700503
Gavin Shan36b77d12021-09-02 14:52:22 -0700504static void __init p4d_basic_tests(struct pgtable_debug_args *args)
Anshuman Khandual399145f2020-06-04 16:47:15 -0700505{
506 p4d_t p4d;
507
Anshuman Khandual6315df42020-08-06 23:19:25 -0700508 pr_debug("Validating P4D basic\n");
Anshuman Khandual399145f2020-06-04 16:47:15 -0700509 memset(&p4d, RANDOM_NZVALUE, sizeof(p4d_t));
510 WARN_ON(!p4d_same(p4d, p4d));
511}
512
Gavin Shan36b77d12021-09-02 14:52:22 -0700513static void __init pgd_basic_tests(struct pgtable_debug_args *args)
Anshuman Khandual399145f2020-06-04 16:47:15 -0700514{
515 pgd_t pgd;
516
Anshuman Khandual6315df42020-08-06 23:19:25 -0700517 pr_debug("Validating PGD basic\n");
Anshuman Khandual399145f2020-06-04 16:47:15 -0700518 memset(&pgd, RANDOM_NZVALUE, sizeof(pgd_t));
519 WARN_ON(!pgd_same(pgd, pgd));
520}
521
522#ifndef __PAGETABLE_PUD_FOLDED
Gavin Shan4cbde032021-09-02 14:52:45 -0700523static void __init pud_clear_tests(struct pgtable_debug_args *args)
Anshuman Khandual399145f2020-06-04 16:47:15 -0700524{
Gavin Shan4cbde032021-09-02 14:52:45 -0700525 pud_t pud = READ_ONCE(*args->pudp);
Anshuman Khandual399145f2020-06-04 16:47:15 -0700526
Gavin Shan4cbde032021-09-02 14:52:45 -0700527 if (mm_pmd_folded(args->mm))
Anshuman Khandual399145f2020-06-04 16:47:15 -0700528 return;
529
Anshuman Khandual6315df42020-08-06 23:19:25 -0700530 pr_debug("Validating PUD clear\n");
Anshuman Khandual399145f2020-06-04 16:47:15 -0700531 pud = __pud(pud_val(pud) | RANDOM_ORVALUE);
Gavin Shan4cbde032021-09-02 14:52:45 -0700532 WRITE_ONCE(*args->pudp, pud);
533 pud_clear(args->pudp);
534 pud = READ_ONCE(*args->pudp);
Anshuman Khandual399145f2020-06-04 16:47:15 -0700535 WARN_ON(!pud_none(pud));
536}
537
Gavin Shan4cbde032021-09-02 14:52:45 -0700538static void __init pud_populate_tests(struct pgtable_debug_args *args)
Anshuman Khandual399145f2020-06-04 16:47:15 -0700539{
540 pud_t pud;
541
Gavin Shan4cbde032021-09-02 14:52:45 -0700542 if (mm_pmd_folded(args->mm))
Anshuman Khandual399145f2020-06-04 16:47:15 -0700543 return;
Anshuman Khandual6315df42020-08-06 23:19:25 -0700544
545 pr_debug("Validating PUD populate\n");
Anshuman Khandual399145f2020-06-04 16:47:15 -0700546 /*
547 * This entry points to next level page table page.
548 * Hence this must not qualify as pud_bad().
549 */
Gavin Shan4cbde032021-09-02 14:52:45 -0700550 pud_populate(args->mm, args->pudp, args->start_pmdp);
551 pud = READ_ONCE(*args->pudp);
Anshuman Khandual399145f2020-06-04 16:47:15 -0700552 WARN_ON(pud_bad(pud));
553}
554#else /* !__PAGETABLE_PUD_FOLDED */
Gavin Shan4cbde032021-09-02 14:52:45 -0700555static void __init pud_clear_tests(struct pgtable_debug_args *args) { }
556static void __init pud_populate_tests(struct pgtable_debug_args *args) { }
Anshuman Khandual399145f2020-06-04 16:47:15 -0700557#endif /* PAGETABLE_PUD_FOLDED */
558
559#ifndef __PAGETABLE_P4D_FOLDED
Gavin Shan2f87f8c2021-09-02 14:52:48 -0700560static void __init p4d_clear_tests(struct pgtable_debug_args *args)
Anshuman Khandual399145f2020-06-04 16:47:15 -0700561{
Gavin Shan2f87f8c2021-09-02 14:52:48 -0700562 p4d_t p4d = READ_ONCE(*args->p4dp);
Anshuman Khandual399145f2020-06-04 16:47:15 -0700563
Gavin Shan2f87f8c2021-09-02 14:52:48 -0700564 if (mm_pud_folded(args->mm))
Anshuman Khandual399145f2020-06-04 16:47:15 -0700565 return;
566
Anshuman Khandual6315df42020-08-06 23:19:25 -0700567 pr_debug("Validating P4D clear\n");
Anshuman Khandual399145f2020-06-04 16:47:15 -0700568 p4d = __p4d(p4d_val(p4d) | RANDOM_ORVALUE);
Gavin Shan2f87f8c2021-09-02 14:52:48 -0700569 WRITE_ONCE(*args->p4dp, p4d);
570 p4d_clear(args->p4dp);
571 p4d = READ_ONCE(*args->p4dp);
Anshuman Khandual399145f2020-06-04 16:47:15 -0700572 WARN_ON(!p4d_none(p4d));
573}
574
Gavin Shan2f87f8c2021-09-02 14:52:48 -0700575static void __init p4d_populate_tests(struct pgtable_debug_args *args)
Anshuman Khandual399145f2020-06-04 16:47:15 -0700576{
577 p4d_t p4d;
578
Gavin Shan2f87f8c2021-09-02 14:52:48 -0700579 if (mm_pud_folded(args->mm))
Anshuman Khandual399145f2020-06-04 16:47:15 -0700580 return;
581
Anshuman Khandual6315df42020-08-06 23:19:25 -0700582 pr_debug("Validating P4D populate\n");
Anshuman Khandual399145f2020-06-04 16:47:15 -0700583 /*
584 * This entry points to next level page table page.
585 * Hence this must not qualify as p4d_bad().
586 */
Gavin Shan2f87f8c2021-09-02 14:52:48 -0700587 pud_clear(args->pudp);
588 p4d_clear(args->p4dp);
589 p4d_populate(args->mm, args->p4dp, args->start_pudp);
590 p4d = READ_ONCE(*args->p4dp);
Anshuman Khandual399145f2020-06-04 16:47:15 -0700591 WARN_ON(p4d_bad(p4d));
592}
593
Gavin Shan2f87f8c2021-09-02 14:52:48 -0700594static void __init pgd_clear_tests(struct pgtable_debug_args *args)
Anshuman Khandual399145f2020-06-04 16:47:15 -0700595{
Gavin Shan2f87f8c2021-09-02 14:52:48 -0700596 pgd_t pgd = READ_ONCE(*(args->pgdp));
Anshuman Khandual399145f2020-06-04 16:47:15 -0700597
Gavin Shan2f87f8c2021-09-02 14:52:48 -0700598 if (mm_p4d_folded(args->mm))
Anshuman Khandual399145f2020-06-04 16:47:15 -0700599 return;
600
Anshuman Khandual6315df42020-08-06 23:19:25 -0700601 pr_debug("Validating PGD clear\n");
Anshuman Khandual399145f2020-06-04 16:47:15 -0700602 pgd = __pgd(pgd_val(pgd) | RANDOM_ORVALUE);
Gavin Shan2f87f8c2021-09-02 14:52:48 -0700603 WRITE_ONCE(*args->pgdp, pgd);
604 pgd_clear(args->pgdp);
605 pgd = READ_ONCE(*args->pgdp);
Anshuman Khandual399145f2020-06-04 16:47:15 -0700606 WARN_ON(!pgd_none(pgd));
607}
608
Gavin Shan2f87f8c2021-09-02 14:52:48 -0700609static void __init pgd_populate_tests(struct pgtable_debug_args *args)
Anshuman Khandual399145f2020-06-04 16:47:15 -0700610{
611 pgd_t pgd;
612
Gavin Shan2f87f8c2021-09-02 14:52:48 -0700613 if (mm_p4d_folded(args->mm))
Anshuman Khandual399145f2020-06-04 16:47:15 -0700614 return;
615
Anshuman Khandual6315df42020-08-06 23:19:25 -0700616 pr_debug("Validating PGD populate\n");
Anshuman Khandual399145f2020-06-04 16:47:15 -0700617 /*
618 * This entry points to next level page table page.
619 * Hence this must not qualify as pgd_bad().
620 */
Gavin Shan2f87f8c2021-09-02 14:52:48 -0700621 p4d_clear(args->p4dp);
622 pgd_clear(args->pgdp);
623 pgd_populate(args->mm, args->pgdp, args->start_p4dp);
624 pgd = READ_ONCE(*args->pgdp);
Anshuman Khandual399145f2020-06-04 16:47:15 -0700625 WARN_ON(pgd_bad(pgd));
626}
627#else /* !__PAGETABLE_P4D_FOLDED */
Gavin Shan2f87f8c2021-09-02 14:52:48 -0700628static void __init p4d_clear_tests(struct pgtable_debug_args *args) { }
629static void __init pgd_clear_tests(struct pgtable_debug_args *args) { }
630static void __init p4d_populate_tests(struct pgtable_debug_args *args) { }
631static void __init pgd_populate_tests(struct pgtable_debug_args *args) { }
Anshuman Khandual399145f2020-06-04 16:47:15 -0700632#endif /* PAGETABLE_P4D_FOLDED */
633
Gavin Shan44966c42021-09-02 14:52:38 -0700634static void __init pte_clear_tests(struct pgtable_debug_args *args)
Anshuman Khandual399145f2020-06-04 16:47:15 -0700635{
Gavin Shan8c5b3a82021-09-02 14:52:54 -0700636 struct page *page;
Gavin Shan44966c42021-09-02 14:52:38 -0700637 pte_t pte = pfn_pte(args->pte_pfn, args->page_prot);
638
Gavin Shan8c5b3a82021-09-02 14:52:54 -0700639 page = (args->pte_pfn != ULONG_MAX) ? pfn_to_page(args->pte_pfn) : NULL;
640 if (!page)
Gavin Shan44966c42021-09-02 14:52:38 -0700641 return;
Anshuman Khandual399145f2020-06-04 16:47:15 -0700642
Gavin Shan8c5b3a82021-09-02 14:52:54 -0700643 /*
644 * flush_dcache_page() is called after set_pte_at() to clear
645 * PG_arch_1 for the page on ARM64. The page flag isn't cleared
646 * when it's released and page allocation check will fail when
647 * the page is allocated again. For architectures other than ARM64,
648 * the unexpected overhead of cache flushing is acceptable.
649 */
Anshuman Khandual6315df42020-08-06 23:19:25 -0700650 pr_debug("Validating PTE clear\n");
Aneesh Kumar K.V401035d2020-10-15 20:05:06 -0700651#ifndef CONFIG_RISCV
Anshuman Khandual399145f2020-06-04 16:47:15 -0700652 pte = __pte(pte_val(pte) | RANDOM_ORVALUE);
Aneesh Kumar K.V401035d2020-10-15 20:05:06 -0700653#endif
Gavin Shan44966c42021-09-02 14:52:38 -0700654 set_pte_at(args->mm, args->vaddr, args->ptep, pte);
Gavin Shan8c5b3a82021-09-02 14:52:54 -0700655 flush_dcache_page(page);
Anshuman Khandual399145f2020-06-04 16:47:15 -0700656 barrier();
Pasha Tatashin08d5b292022-01-14 14:06:33 -0800657 ptep_clear(args->mm, args->vaddr, args->ptep);
Gavin Shan44966c42021-09-02 14:52:38 -0700658 pte = ptep_get(args->ptep);
Anshuman Khandual399145f2020-06-04 16:47:15 -0700659 WARN_ON(!pte_none(pte));
660}
661
Gavin Shanc0fe07b2021-09-02 14:52:41 -0700662static void __init pmd_clear_tests(struct pgtable_debug_args *args)
Anshuman Khandual399145f2020-06-04 16:47:15 -0700663{
Gavin Shanc0fe07b2021-09-02 14:52:41 -0700664 pmd_t pmd = READ_ONCE(*args->pmdp);
Anshuman Khandual399145f2020-06-04 16:47:15 -0700665
Anshuman Khandual6315df42020-08-06 23:19:25 -0700666 pr_debug("Validating PMD clear\n");
Anshuman Khandual399145f2020-06-04 16:47:15 -0700667 pmd = __pmd(pmd_val(pmd) | RANDOM_ORVALUE);
Gavin Shanc0fe07b2021-09-02 14:52:41 -0700668 WRITE_ONCE(*args->pmdp, pmd);
669 pmd_clear(args->pmdp);
670 pmd = READ_ONCE(*args->pmdp);
Anshuman Khandual399145f2020-06-04 16:47:15 -0700671 WARN_ON(!pmd_none(pmd));
672}
673
Gavin Shanc0fe07b2021-09-02 14:52:41 -0700674static void __init pmd_populate_tests(struct pgtable_debug_args *args)
Anshuman Khandual399145f2020-06-04 16:47:15 -0700675{
676 pmd_t pmd;
677
Anshuman Khandual6315df42020-08-06 23:19:25 -0700678 pr_debug("Validating PMD populate\n");
Anshuman Khandual399145f2020-06-04 16:47:15 -0700679 /*
680 * This entry points to next level page table page.
681 * Hence this must not qualify as pmd_bad().
682 */
Gavin Shanc0fe07b2021-09-02 14:52:41 -0700683 pmd_populate(args->mm, args->pmdp, args->start_ptep);
684 pmd = READ_ONCE(*args->pmdp);
Anshuman Khandual399145f2020-06-04 16:47:15 -0700685 WARN_ON(pmd_bad(pmd));
686}
687
Gavin Shan8cb183f2021-09-02 14:52:28 -0700688static void __init pte_special_tests(struct pgtable_debug_args *args)
Anshuman Khandual05289402020-08-06 23:19:16 -0700689{
Gavin Shan8cb183f2021-09-02 14:52:28 -0700690 pte_t pte = pfn_pte(args->fixed_pte_pfn, args->page_prot);
Anshuman Khandual05289402020-08-06 23:19:16 -0700691
692 if (!IS_ENABLED(CONFIG_ARCH_HAS_PTE_SPECIAL))
693 return;
694
Anshuman Khandual6315df42020-08-06 23:19:25 -0700695 pr_debug("Validating PTE special\n");
Anshuman Khandual05289402020-08-06 23:19:16 -0700696 WARN_ON(!pte_special(pte_mkspecial(pte)));
697}
698
Gavin Shan8cb183f2021-09-02 14:52:28 -0700699static void __init pte_protnone_tests(struct pgtable_debug_args *args)
Anshuman Khandual05289402020-08-06 23:19:16 -0700700{
Gavin Shan8cb183f2021-09-02 14:52:28 -0700701 pte_t pte = pfn_pte(args->fixed_pte_pfn, args->page_prot_none);
Anshuman Khandual05289402020-08-06 23:19:16 -0700702
703 if (!IS_ENABLED(CONFIG_NUMA_BALANCING))
704 return;
705
Anshuman Khandual6315df42020-08-06 23:19:25 -0700706 pr_debug("Validating PTE protnone\n");
Anshuman Khandual05289402020-08-06 23:19:16 -0700707 WARN_ON(!pte_protnone(pte));
708 WARN_ON(!pte_present(pte));
709}
710
711#ifdef CONFIG_TRANSPARENT_HUGEPAGE
Gavin Shan8cb183f2021-09-02 14:52:28 -0700712static void __init pmd_protnone_tests(struct pgtable_debug_args *args)
Anshuman Khandual05289402020-08-06 23:19:16 -0700713{
Anshuman Khandual65ac1a62021-06-28 19:35:10 -0700714 pmd_t pmd;
Anshuman Khandual05289402020-08-06 23:19:16 -0700715
716 if (!IS_ENABLED(CONFIG_NUMA_BALANCING))
717 return;
718
Anshuman Khandual65ac1a62021-06-28 19:35:10 -0700719 if (!has_transparent_hugepage())
720 return;
721
Anshuman Khandual6315df42020-08-06 23:19:25 -0700722 pr_debug("Validating PMD protnone\n");
Gavin Shan8cb183f2021-09-02 14:52:28 -0700723 pmd = pmd_mkhuge(pfn_pmd(args->fixed_pmd_pfn, args->page_prot_none));
Anshuman Khandual05289402020-08-06 23:19:16 -0700724 WARN_ON(!pmd_protnone(pmd));
725 WARN_ON(!pmd_present(pmd));
726}
727#else /* !CONFIG_TRANSPARENT_HUGEPAGE */
Gavin Shan8cb183f2021-09-02 14:52:28 -0700728static void __init pmd_protnone_tests(struct pgtable_debug_args *args) { }
Anshuman Khandual05289402020-08-06 23:19:16 -0700729#endif /* CONFIG_TRANSPARENT_HUGEPAGE */
730
731#ifdef CONFIG_ARCH_HAS_PTE_DEVMAP
Gavin Shan8cb183f2021-09-02 14:52:28 -0700732static void __init pte_devmap_tests(struct pgtable_debug_args *args)
Anshuman Khandual05289402020-08-06 23:19:16 -0700733{
Gavin Shan8cb183f2021-09-02 14:52:28 -0700734 pte_t pte = pfn_pte(args->fixed_pte_pfn, args->page_prot);
Anshuman Khandual05289402020-08-06 23:19:16 -0700735
Anshuman Khandual6315df42020-08-06 23:19:25 -0700736 pr_debug("Validating PTE devmap\n");
Anshuman Khandual05289402020-08-06 23:19:16 -0700737 WARN_ON(!pte_devmap(pte_mkdevmap(pte)));
738}
739
740#ifdef CONFIG_TRANSPARENT_HUGEPAGE
Gavin Shan8cb183f2021-09-02 14:52:28 -0700741static void __init pmd_devmap_tests(struct pgtable_debug_args *args)
Anshuman Khandual05289402020-08-06 23:19:16 -0700742{
Anshuman Khandual65ac1a62021-06-28 19:35:10 -0700743 pmd_t pmd;
744
745 if (!has_transparent_hugepage())
746 return;
Anshuman Khandual05289402020-08-06 23:19:16 -0700747
Anshuman Khandual6315df42020-08-06 23:19:25 -0700748 pr_debug("Validating PMD devmap\n");
Gavin Shan8cb183f2021-09-02 14:52:28 -0700749 pmd = pfn_pmd(args->fixed_pmd_pfn, args->page_prot);
Anshuman Khandual05289402020-08-06 23:19:16 -0700750 WARN_ON(!pmd_devmap(pmd_mkdevmap(pmd)));
751}
752
753#ifdef CONFIG_HAVE_ARCH_TRANSPARENT_HUGEPAGE_PUD
Gavin Shan8cb183f2021-09-02 14:52:28 -0700754static void __init pud_devmap_tests(struct pgtable_debug_args *args)
Anshuman Khandual05289402020-08-06 23:19:16 -0700755{
Anshuman Khandual65ac1a62021-06-28 19:35:10 -0700756 pud_t pud;
757
758 if (!has_transparent_hugepage())
759 return;
Anshuman Khandual05289402020-08-06 23:19:16 -0700760
Anshuman Khandual6315df42020-08-06 23:19:25 -0700761 pr_debug("Validating PUD devmap\n");
Gavin Shan8cb183f2021-09-02 14:52:28 -0700762 pud = pfn_pud(args->fixed_pud_pfn, args->page_prot);
Anshuman Khandual05289402020-08-06 23:19:16 -0700763 WARN_ON(!pud_devmap(pud_mkdevmap(pud)));
764}
765#else /* !CONFIG_HAVE_ARCH_TRANSPARENT_HUGEPAGE_PUD */
Gavin Shan8cb183f2021-09-02 14:52:28 -0700766static void __init pud_devmap_tests(struct pgtable_debug_args *args) { }
Anshuman Khandual05289402020-08-06 23:19:16 -0700767#endif /* CONFIG_HAVE_ARCH_TRANSPARENT_HUGEPAGE_PUD */
768#else /* CONFIG_TRANSPARENT_HUGEPAGE */
Gavin Shan8cb183f2021-09-02 14:52:28 -0700769static void __init pmd_devmap_tests(struct pgtable_debug_args *args) { }
770static void __init pud_devmap_tests(struct pgtable_debug_args *args) { }
Anshuman Khandual05289402020-08-06 23:19:16 -0700771#endif /* CONFIG_TRANSPARENT_HUGEPAGE */
772#else
Gavin Shan8cb183f2021-09-02 14:52:28 -0700773static void __init pte_devmap_tests(struct pgtable_debug_args *args) { }
774static void __init pmd_devmap_tests(struct pgtable_debug_args *args) { }
775static void __init pud_devmap_tests(struct pgtable_debug_args *args) { }
Anshuman Khandual05289402020-08-06 23:19:16 -0700776#endif /* CONFIG_ARCH_HAS_PTE_DEVMAP */
777
Gavin Shan5f447e82021-09-02 14:52:32 -0700778static void __init pte_soft_dirty_tests(struct pgtable_debug_args *args)
Anshuman Khandual05289402020-08-06 23:19:16 -0700779{
Gavin Shan5f447e82021-09-02 14:52:32 -0700780 pte_t pte = pfn_pte(args->fixed_pte_pfn, args->page_prot);
Anshuman Khandual05289402020-08-06 23:19:16 -0700781
782 if (!IS_ENABLED(CONFIG_MEM_SOFT_DIRTY))
783 return;
784
Anshuman Khandual6315df42020-08-06 23:19:25 -0700785 pr_debug("Validating PTE soft dirty\n");
Anshuman Khandual05289402020-08-06 23:19:16 -0700786 WARN_ON(!pte_soft_dirty(pte_mksoft_dirty(pte)));
787 WARN_ON(pte_soft_dirty(pte_clear_soft_dirty(pte)));
788}
789
Gavin Shan5f447e82021-09-02 14:52:32 -0700790static void __init pte_swap_soft_dirty_tests(struct pgtable_debug_args *args)
Anshuman Khandual05289402020-08-06 23:19:16 -0700791{
Gavin Shan5f447e82021-09-02 14:52:32 -0700792 pte_t pte = pfn_pte(args->fixed_pte_pfn, args->page_prot);
Anshuman Khandual05289402020-08-06 23:19:16 -0700793
794 if (!IS_ENABLED(CONFIG_MEM_SOFT_DIRTY))
795 return;
796
Anshuman Khandual6315df42020-08-06 23:19:25 -0700797 pr_debug("Validating PTE swap soft dirty\n");
Anshuman Khandual05289402020-08-06 23:19:16 -0700798 WARN_ON(!pte_swp_soft_dirty(pte_swp_mksoft_dirty(pte)));
799 WARN_ON(pte_swp_soft_dirty(pte_swp_clear_soft_dirty(pte)));
800}
801
802#ifdef CONFIG_TRANSPARENT_HUGEPAGE
Gavin Shan5f447e82021-09-02 14:52:32 -0700803static void __init pmd_soft_dirty_tests(struct pgtable_debug_args *args)
Anshuman Khandual05289402020-08-06 23:19:16 -0700804{
Anshuman Khandual65ac1a62021-06-28 19:35:10 -0700805 pmd_t pmd;
Anshuman Khandual05289402020-08-06 23:19:16 -0700806
807 if (!IS_ENABLED(CONFIG_MEM_SOFT_DIRTY))
808 return;
809
Anshuman Khandual65ac1a62021-06-28 19:35:10 -0700810 if (!has_transparent_hugepage())
811 return;
812
Anshuman Khandual6315df42020-08-06 23:19:25 -0700813 pr_debug("Validating PMD soft dirty\n");
Gavin Shan5f447e82021-09-02 14:52:32 -0700814 pmd = pfn_pmd(args->fixed_pmd_pfn, args->page_prot);
Anshuman Khandual05289402020-08-06 23:19:16 -0700815 WARN_ON(!pmd_soft_dirty(pmd_mksoft_dirty(pmd)));
816 WARN_ON(pmd_soft_dirty(pmd_clear_soft_dirty(pmd)));
817}
818
Gavin Shan5f447e82021-09-02 14:52:32 -0700819static void __init pmd_swap_soft_dirty_tests(struct pgtable_debug_args *args)
Anshuman Khandual05289402020-08-06 23:19:16 -0700820{
Anshuman Khandual65ac1a62021-06-28 19:35:10 -0700821 pmd_t pmd;
Anshuman Khandual05289402020-08-06 23:19:16 -0700822
823 if (!IS_ENABLED(CONFIG_MEM_SOFT_DIRTY) ||
824 !IS_ENABLED(CONFIG_ARCH_ENABLE_THP_MIGRATION))
825 return;
826
Anshuman Khandual65ac1a62021-06-28 19:35:10 -0700827 if (!has_transparent_hugepage())
828 return;
829
Anshuman Khandual6315df42020-08-06 23:19:25 -0700830 pr_debug("Validating PMD swap soft dirty\n");
Gavin Shan5f447e82021-09-02 14:52:32 -0700831 pmd = pfn_pmd(args->fixed_pmd_pfn, args->page_prot);
Anshuman Khandual05289402020-08-06 23:19:16 -0700832 WARN_ON(!pmd_swp_soft_dirty(pmd_swp_mksoft_dirty(pmd)));
833 WARN_ON(pmd_swp_soft_dirty(pmd_swp_clear_soft_dirty(pmd)));
834}
Shixin Liub593b902021-06-30 18:47:40 -0700835#else /* !CONFIG_TRANSPARENT_HUGEPAGE */
Gavin Shan5f447e82021-09-02 14:52:32 -0700836static void __init pmd_soft_dirty_tests(struct pgtable_debug_args *args) { }
837static void __init pmd_swap_soft_dirty_tests(struct pgtable_debug_args *args) { }
Shixin Liub593b902021-06-30 18:47:40 -0700838#endif /* CONFIG_TRANSPARENT_HUGEPAGE */
Anshuman Khandual05289402020-08-06 23:19:16 -0700839
David Hildenbrand210d1e82022-05-09 18:20:45 -0700840static void __init pte_swap_exclusive_tests(struct pgtable_debug_args *args)
841{
842#ifdef __HAVE_ARCH_PTE_SWP_EXCLUSIVE
843 pte_t pte = pfn_pte(args->fixed_pte_pfn, args->page_prot);
844
845 pr_debug("Validating PTE swap exclusive\n");
846 pte = pte_swp_mkexclusive(pte);
847 WARN_ON(!pte_swp_exclusive(pte));
848 pte = pte_swp_clear_exclusive(pte);
849 WARN_ON(pte_swp_exclusive(pte));
850#endif /* __HAVE_ARCH_PTE_SWP_EXCLUSIVE */
851}
852
Gavin Shan5f447e82021-09-02 14:52:32 -0700853static void __init pte_swap_tests(struct pgtable_debug_args *args)
Anshuman Khandual05289402020-08-06 23:19:16 -0700854{
855 swp_entry_t swp;
856 pte_t pte;
857
Anshuman Khandual6315df42020-08-06 23:19:25 -0700858 pr_debug("Validating PTE swap\n");
Gavin Shan5f447e82021-09-02 14:52:32 -0700859 pte = pfn_pte(args->fixed_pte_pfn, args->page_prot);
Anshuman Khandual05289402020-08-06 23:19:16 -0700860 swp = __pte_to_swp_entry(pte);
861 pte = __swp_entry_to_pte(swp);
Gavin Shan5f447e82021-09-02 14:52:32 -0700862 WARN_ON(args->fixed_pte_pfn != pte_pfn(pte));
Anshuman Khandual05289402020-08-06 23:19:16 -0700863}
864
865#ifdef CONFIG_ARCH_ENABLE_THP_MIGRATION
Gavin Shan5f447e82021-09-02 14:52:32 -0700866static void __init pmd_swap_tests(struct pgtable_debug_args *args)
Anshuman Khandual05289402020-08-06 23:19:16 -0700867{
868 swp_entry_t swp;
869 pmd_t pmd;
870
Anshuman Khandual65ac1a62021-06-28 19:35:10 -0700871 if (!has_transparent_hugepage())
872 return;
873
Anshuman Khandual6315df42020-08-06 23:19:25 -0700874 pr_debug("Validating PMD swap\n");
Gavin Shan5f447e82021-09-02 14:52:32 -0700875 pmd = pfn_pmd(args->fixed_pmd_pfn, args->page_prot);
Anshuman Khandual05289402020-08-06 23:19:16 -0700876 swp = __pmd_to_swp_entry(pmd);
877 pmd = __swp_entry_to_pmd(swp);
Gavin Shan5f447e82021-09-02 14:52:32 -0700878 WARN_ON(args->fixed_pmd_pfn != pmd_pfn(pmd));
Anshuman Khandual05289402020-08-06 23:19:16 -0700879}
880#else /* !CONFIG_ARCH_ENABLE_THP_MIGRATION */
Gavin Shan5f447e82021-09-02 14:52:32 -0700881static void __init pmd_swap_tests(struct pgtable_debug_args *args) { }
Anshuman Khandual05289402020-08-06 23:19:16 -0700882#endif /* CONFIG_ARCH_ENABLE_THP_MIGRATION */
883
Gavin Shan4878a882021-09-02 14:52:35 -0700884static void __init swap_migration_tests(struct pgtable_debug_args *args)
Anshuman Khandual05289402020-08-06 23:19:16 -0700885{
886 struct page *page;
887 swp_entry_t swp;
888
889 if (!IS_ENABLED(CONFIG_MIGRATION))
890 return;
Anshuman Khandual6315df42020-08-06 23:19:25 -0700891
Anshuman Khandual05289402020-08-06 23:19:16 -0700892 /*
893 * swap_migration_tests() requires a dedicated page as it needs to
894 * be locked before creating a migration entry from it. Locking the
895 * page that actually maps kernel text ('start_kernel') can be real
Gavin Shan4878a882021-09-02 14:52:35 -0700896 * problematic. Lets use the allocated page explicitly for this
897 * purpose.
Anshuman Khandual05289402020-08-06 23:19:16 -0700898 */
Gavin Shan4878a882021-09-02 14:52:35 -0700899 page = (args->pte_pfn != ULONG_MAX) ? pfn_to_page(args->pte_pfn) : NULL;
900 if (!page)
Anshuman Khandual05289402020-08-06 23:19:16 -0700901 return;
Gavin Shan4878a882021-09-02 14:52:35 -0700902
903 pr_debug("Validating swap migration\n");
Anshuman Khandual05289402020-08-06 23:19:16 -0700904
905 /*
Anshuman Khandual23647612022-01-14 14:05:07 -0800906 * make_[readable|writable]_migration_entry() expects given page to
907 * be locked, otherwise it stumbles upon a BUG_ON().
Anshuman Khandual05289402020-08-06 23:19:16 -0700908 */
909 __SetPageLocked(page);
Alistair Popple4dd845b2021-06-30 18:54:09 -0700910 swp = make_writable_migration_entry(page_to_pfn(page));
Anshuman Khandual05289402020-08-06 23:19:16 -0700911 WARN_ON(!is_migration_entry(swp));
Alistair Popple4dd845b2021-06-30 18:54:09 -0700912 WARN_ON(!is_writable_migration_entry(swp));
Anshuman Khandual05289402020-08-06 23:19:16 -0700913
Alistair Popple4dd845b2021-06-30 18:54:09 -0700914 swp = make_readable_migration_entry(swp_offset(swp));
Anshuman Khandual05289402020-08-06 23:19:16 -0700915 WARN_ON(!is_migration_entry(swp));
Alistair Popple4dd845b2021-06-30 18:54:09 -0700916 WARN_ON(is_writable_migration_entry(swp));
Anshuman Khandual05289402020-08-06 23:19:16 -0700917
Alistair Popple4dd845b2021-06-30 18:54:09 -0700918 swp = make_readable_migration_entry(page_to_pfn(page));
Anshuman Khandual05289402020-08-06 23:19:16 -0700919 WARN_ON(!is_migration_entry(swp));
Alistair Popple4dd845b2021-06-30 18:54:09 -0700920 WARN_ON(is_writable_migration_entry(swp));
Anshuman Khandual05289402020-08-06 23:19:16 -0700921 __ClearPageLocked(page);
Anshuman Khandual05289402020-08-06 23:19:16 -0700922}
923
924#ifdef CONFIG_HUGETLB_PAGE
Gavin Shan36b77d12021-09-02 14:52:22 -0700925static void __init hugetlb_basic_tests(struct pgtable_debug_args *args)
Anshuman Khandual05289402020-08-06 23:19:16 -0700926{
927 struct page *page;
928 pte_t pte;
929
Anshuman Khandual6315df42020-08-06 23:19:25 -0700930 pr_debug("Validating HugeTLB basic\n");
Anshuman Khandual05289402020-08-06 23:19:16 -0700931 /*
932 * Accessing the page associated with the pfn is safe here,
933 * as it was previously derived from a real kernel symbol.
934 */
Gavin Shan36b77d12021-09-02 14:52:22 -0700935 page = pfn_to_page(args->fixed_pmd_pfn);
936 pte = mk_huge_pte(page, args->page_prot);
Anshuman Khandual05289402020-08-06 23:19:16 -0700937
938 WARN_ON(!huge_pte_dirty(huge_pte_mkdirty(pte)));
939 WARN_ON(!huge_pte_write(huge_pte_mkwrite(huge_pte_wrprotect(pte))));
940 WARN_ON(huge_pte_write(huge_pte_wrprotect(huge_pte_mkwrite(pte))));
941
942#ifdef CONFIG_ARCH_WANT_GENERAL_HUGETLB
Gavin Shan36b77d12021-09-02 14:52:22 -0700943 pte = pfn_pte(args->fixed_pmd_pfn, args->page_prot);
Anshuman Khandual05289402020-08-06 23:19:16 -0700944
945 WARN_ON(!pte_huge(pte_mkhuge(pte)));
946#endif /* CONFIG_ARCH_WANT_GENERAL_HUGETLB */
947}
948#else /* !CONFIG_HUGETLB_PAGE */
Gavin Shan36b77d12021-09-02 14:52:22 -0700949static void __init hugetlb_basic_tests(struct pgtable_debug_args *args) { }
Anshuman Khandual05289402020-08-06 23:19:16 -0700950#endif /* CONFIG_HUGETLB_PAGE */
951
952#ifdef CONFIG_TRANSPARENT_HUGEPAGE
Gavin Shan4878a882021-09-02 14:52:35 -0700953static void __init pmd_thp_tests(struct pgtable_debug_args *args)
Anshuman Khandual05289402020-08-06 23:19:16 -0700954{
955 pmd_t pmd;
956
957 if (!has_transparent_hugepage())
958 return;
959
Anshuman Khandual6315df42020-08-06 23:19:25 -0700960 pr_debug("Validating PMD based THP\n");
Anshuman Khandual05289402020-08-06 23:19:16 -0700961 /*
962 * pmd_trans_huge() and pmd_present() must return positive after
963 * MMU invalidation with pmd_mkinvalid(). This behavior is an
964 * optimization for transparent huge page. pmd_trans_huge() must
965 * be true if pmd_page() returns a valid THP to avoid taking the
966 * pmd_lock when others walk over non transhuge pmds (i.e. there
967 * are no THP allocated). Especially when splitting a THP and
968 * removing the present bit from the pmd, pmd_trans_huge() still
969 * needs to return true. pmd_present() should be true whenever
970 * pmd_trans_huge() returns true.
971 */
Gavin Shan4878a882021-09-02 14:52:35 -0700972 pmd = pfn_pmd(args->fixed_pmd_pfn, args->page_prot);
Anshuman Khandual05289402020-08-06 23:19:16 -0700973 WARN_ON(!pmd_trans_huge(pmd_mkhuge(pmd)));
974
975#ifndef __HAVE_ARCH_PMDP_INVALIDATE
976 WARN_ON(!pmd_trans_huge(pmd_mkinvalid(pmd_mkhuge(pmd))));
977 WARN_ON(!pmd_present(pmd_mkinvalid(pmd_mkhuge(pmd))));
978#endif /* __HAVE_ARCH_PMDP_INVALIDATE */
979}
980
981#ifdef CONFIG_HAVE_ARCH_TRANSPARENT_HUGEPAGE_PUD
Gavin Shan4878a882021-09-02 14:52:35 -0700982static void __init pud_thp_tests(struct pgtable_debug_args *args)
Anshuman Khandual05289402020-08-06 23:19:16 -0700983{
984 pud_t pud;
985
986 if (!has_transparent_hugepage())
987 return;
988
Anshuman Khandual6315df42020-08-06 23:19:25 -0700989 pr_debug("Validating PUD based THP\n");
Gavin Shan4878a882021-09-02 14:52:35 -0700990 pud = pfn_pud(args->fixed_pud_pfn, args->page_prot);
Anshuman Khandual05289402020-08-06 23:19:16 -0700991 WARN_ON(!pud_trans_huge(pud_mkhuge(pud)));
992
993 /*
994 * pud_mkinvalid() has been dropped for now. Enable back
995 * these tests when it comes back with a modified pud_present().
996 *
997 * WARN_ON(!pud_trans_huge(pud_mkinvalid(pud_mkhuge(pud))));
998 * WARN_ON(!pud_present(pud_mkinvalid(pud_mkhuge(pud))));
999 */
1000}
1001#else /* !CONFIG_HAVE_ARCH_TRANSPARENT_HUGEPAGE_PUD */
Gavin Shan4878a882021-09-02 14:52:35 -07001002static void __init pud_thp_tests(struct pgtable_debug_args *args) { }
Anshuman Khandual05289402020-08-06 23:19:16 -07001003#endif /* CONFIG_HAVE_ARCH_TRANSPARENT_HUGEPAGE_PUD */
1004#else /* !CONFIG_TRANSPARENT_HUGEPAGE */
Gavin Shan4878a882021-09-02 14:52:35 -07001005static void __init pmd_thp_tests(struct pgtable_debug_args *args) { }
1006static void __init pud_thp_tests(struct pgtable_debug_args *args) { }
Anshuman Khandual05289402020-08-06 23:19:16 -07001007#endif /* CONFIG_TRANSPARENT_HUGEPAGE */
1008
Anshuman Khandual399145f2020-06-04 16:47:15 -07001009static unsigned long __init get_random_vaddr(void)
1010{
1011 unsigned long random_vaddr, random_pages, total_user_pages;
1012
1013 total_user_pages = (TASK_SIZE - FIRST_USER_ADDRESS) / PAGE_SIZE;
1014
1015 random_pages = get_random_long() % total_user_pages;
1016 random_vaddr = FIRST_USER_ADDRESS + random_pages * PAGE_SIZE;
1017
1018 return random_vaddr;
1019}
1020
Gavin Shan3c9b84f2021-09-02 14:52:19 -07001021static void __init destroy_args(struct pgtable_debug_args *args)
1022{
1023 struct page *page = NULL;
1024
1025 /* Free (huge) page */
1026 if (IS_ENABLED(CONFIG_TRANSPARENT_HUGEPAGE) &&
1027 IS_ENABLED(CONFIG_HAVE_ARCH_TRANSPARENT_HUGEPAGE_PUD) &&
1028 has_transparent_hugepage() &&
1029 args->pud_pfn != ULONG_MAX) {
1030 if (args->is_contiguous_page) {
1031 free_contig_range(args->pud_pfn,
1032 (1 << (HPAGE_PUD_SHIFT - PAGE_SHIFT)));
1033 } else {
1034 page = pfn_to_page(args->pud_pfn);
1035 __free_pages(page, HPAGE_PUD_SHIFT - PAGE_SHIFT);
1036 }
1037
1038 args->pud_pfn = ULONG_MAX;
1039 args->pmd_pfn = ULONG_MAX;
1040 args->pte_pfn = ULONG_MAX;
1041 }
1042
1043 if (IS_ENABLED(CONFIG_TRANSPARENT_HUGEPAGE) &&
1044 has_transparent_hugepage() &&
1045 args->pmd_pfn != ULONG_MAX) {
1046 if (args->is_contiguous_page) {
1047 free_contig_range(args->pmd_pfn, (1 << HPAGE_PMD_ORDER));
1048 } else {
1049 page = pfn_to_page(args->pmd_pfn);
1050 __free_pages(page, HPAGE_PMD_ORDER);
1051 }
1052
1053 args->pmd_pfn = ULONG_MAX;
1054 args->pte_pfn = ULONG_MAX;
1055 }
1056
1057 if (args->pte_pfn != ULONG_MAX) {
1058 page = pfn_to_page(args->pte_pfn);
1059 __free_pages(page, 0);
1060
1061 args->pte_pfn = ULONG_MAX;
1062 }
1063
1064 /* Free page table entries */
1065 if (args->start_ptep) {
1066 pte_free(args->mm, args->start_ptep);
1067 mm_dec_nr_ptes(args->mm);
1068 }
1069
1070 if (args->start_pmdp) {
1071 pmd_free(args->mm, args->start_pmdp);
1072 mm_dec_nr_pmds(args->mm);
1073 }
1074
1075 if (args->start_pudp) {
1076 pud_free(args->mm, args->start_pudp);
1077 mm_dec_nr_puds(args->mm);
1078 }
1079
1080 if (args->start_p4dp)
1081 p4d_free(args->mm, args->start_p4dp);
1082
1083 /* Free vma and mm struct */
1084 if (args->vma)
1085 vm_area_free(args->vma);
1086
1087 if (args->mm)
1088 mmdrop(args->mm);
1089}
1090
1091static struct page * __init
1092debug_vm_pgtable_alloc_huge_page(struct pgtable_debug_args *args, int order)
1093{
1094 struct page *page = NULL;
1095
1096#ifdef CONFIG_CONTIG_ALLOC
1097 if (order >= MAX_ORDER) {
1098 page = alloc_contig_pages((1 << order), GFP_KERNEL,
1099 first_online_node, NULL);
1100 if (page) {
1101 args->is_contiguous_page = true;
1102 return page;
1103 }
1104 }
1105#endif
1106
1107 if (order < MAX_ORDER)
1108 page = alloc_pages(GFP_KERNEL, order);
1109
1110 return page;
1111}
1112
1113static int __init init_args(struct pgtable_debug_args *args)
1114{
1115 struct page *page = NULL;
1116 phys_addr_t phys;
1117 int ret = 0;
1118
1119 /*
1120 * Initialize the debugging data.
1121 *
Anshuman Khandual31d17072022-04-28 23:16:12 -07001122 * vm_get_page_prot(VM_NONE) or vm_get_page_prot(VM_SHARED|VM_NONE)
1123 * will help create page table entries with PROT_NONE permission as
1124 * required for pxx_protnone_tests().
Gavin Shan3c9b84f2021-09-02 14:52:19 -07001125 */
1126 memset(args, 0, sizeof(*args));
1127 args->vaddr = get_random_vaddr();
1128 args->page_prot = vm_get_page_prot(VMFLAGS);
Anshuman Khandual31d17072022-04-28 23:16:12 -07001129 args->page_prot_none = vm_get_page_prot(VM_NONE);
Gavin Shan3c9b84f2021-09-02 14:52:19 -07001130 args->is_contiguous_page = false;
1131 args->pud_pfn = ULONG_MAX;
1132 args->pmd_pfn = ULONG_MAX;
1133 args->pte_pfn = ULONG_MAX;
1134 args->fixed_pgd_pfn = ULONG_MAX;
1135 args->fixed_p4d_pfn = ULONG_MAX;
1136 args->fixed_pud_pfn = ULONG_MAX;
1137 args->fixed_pmd_pfn = ULONG_MAX;
1138 args->fixed_pte_pfn = ULONG_MAX;
1139
1140 /* Allocate mm and vma */
1141 args->mm = mm_alloc();
1142 if (!args->mm) {
1143 pr_err("Failed to allocate mm struct\n");
1144 ret = -ENOMEM;
1145 goto error;
1146 }
1147
1148 args->vma = vm_area_alloc(args->mm);
1149 if (!args->vma) {
1150 pr_err("Failed to allocate vma\n");
1151 ret = -ENOMEM;
1152 goto error;
1153 }
1154
1155 /*
1156 * Allocate page table entries. They will be modified in the tests.
1157 * Lets save the page table entries so that they can be released
1158 * when the tests are completed.
1159 */
1160 args->pgdp = pgd_offset(args->mm, args->vaddr);
1161 args->p4dp = p4d_alloc(args->mm, args->pgdp, args->vaddr);
1162 if (!args->p4dp) {
1163 pr_err("Failed to allocate p4d entries\n");
1164 ret = -ENOMEM;
1165 goto error;
1166 }
1167 args->start_p4dp = p4d_offset(args->pgdp, 0UL);
1168 WARN_ON(!args->start_p4dp);
1169
1170 args->pudp = pud_alloc(args->mm, args->p4dp, args->vaddr);
1171 if (!args->pudp) {
1172 pr_err("Failed to allocate pud entries\n");
1173 ret = -ENOMEM;
1174 goto error;
1175 }
1176 args->start_pudp = pud_offset(args->p4dp, 0UL);
1177 WARN_ON(!args->start_pudp);
1178
1179 args->pmdp = pmd_alloc(args->mm, args->pudp, args->vaddr);
1180 if (!args->pmdp) {
1181 pr_err("Failed to allocate pmd entries\n");
1182 ret = -ENOMEM;
1183 goto error;
1184 }
1185 args->start_pmdp = pmd_offset(args->pudp, 0UL);
1186 WARN_ON(!args->start_pmdp);
1187
1188 if (pte_alloc(args->mm, args->pmdp)) {
1189 pr_err("Failed to allocate pte entries\n");
1190 ret = -ENOMEM;
1191 goto error;
1192 }
1193 args->start_ptep = pmd_pgtable(READ_ONCE(*args->pmdp));
1194 WARN_ON(!args->start_ptep);
1195
1196 /*
1197 * PFN for mapping at PTE level is determined from a standard kernel
1198 * text symbol. But pfns for higher page table levels are derived by
1199 * masking lower bits of this real pfn. These derived pfns might not
1200 * exist on the platform but that does not really matter as pfn_pxx()
1201 * helpers will still create appropriate entries for the test. This
1202 * helps avoid large memory block allocations to be used for mapping
1203 * at higher page table levels in some of the tests.
1204 */
1205 phys = __pa_symbol(&start_kernel);
1206 args->fixed_pgd_pfn = __phys_to_pfn(phys & PGDIR_MASK);
1207 args->fixed_p4d_pfn = __phys_to_pfn(phys & P4D_MASK);
1208 args->fixed_pud_pfn = __phys_to_pfn(phys & PUD_MASK);
1209 args->fixed_pmd_pfn = __phys_to_pfn(phys & PMD_MASK);
1210 args->fixed_pte_pfn = __phys_to_pfn(phys & PAGE_MASK);
1211 WARN_ON(!pfn_valid(args->fixed_pte_pfn));
1212
1213 /*
1214 * Allocate (huge) pages because some of the tests need to access
1215 * the data in the pages. The corresponding tests will be skipped
1216 * if we fail to allocate (huge) pages.
1217 */
1218 if (IS_ENABLED(CONFIG_TRANSPARENT_HUGEPAGE) &&
1219 IS_ENABLED(CONFIG_HAVE_ARCH_TRANSPARENT_HUGEPAGE_PUD) &&
1220 has_transparent_hugepage()) {
1221 page = debug_vm_pgtable_alloc_huge_page(args,
1222 HPAGE_PUD_SHIFT - PAGE_SHIFT);
1223 if (page) {
1224 args->pud_pfn = page_to_pfn(page);
1225 args->pmd_pfn = args->pud_pfn;
1226 args->pte_pfn = args->pud_pfn;
1227 return 0;
1228 }
1229 }
1230
1231 if (IS_ENABLED(CONFIG_TRANSPARENT_HUGEPAGE) &&
1232 has_transparent_hugepage()) {
1233 page = debug_vm_pgtable_alloc_huge_page(args, HPAGE_PMD_ORDER);
1234 if (page) {
1235 args->pmd_pfn = page_to_pfn(page);
1236 args->pte_pfn = args->pmd_pfn;
1237 return 0;
1238 }
1239 }
1240
1241 page = alloc_pages(GFP_KERNEL, 0);
1242 if (page)
1243 args->pte_pfn = page_to_pfn(page);
1244
1245 return 0;
1246
1247error:
1248 destroy_args(args);
1249 return ret;
1250}
1251
Anshuman Khandual399145f2020-06-04 16:47:15 -07001252static int __init debug_vm_pgtable(void)
1253{
Gavin Shan3c9b84f2021-09-02 14:52:19 -07001254 struct pgtable_debug_args args;
Kees Cookfea11202020-06-03 13:28:45 -07001255 spinlock_t *ptl = NULL;
Gavin Shan3c9b84f2021-09-02 14:52:19 -07001256 int idx, ret;
Anshuman Khandual399145f2020-06-04 16:47:15 -07001257
1258 pr_info("Validating architecture page table helpers\n");
Gavin Shan3c9b84f2021-09-02 14:52:19 -07001259 ret = init_args(&args);
1260 if (ret)
1261 return ret;
1262
Anshuman Khandual2e326c02021-02-24 12:01:36 -08001263 /*
Anshuman Khandual31d17072022-04-28 23:16:12 -07001264 * Iterate over each possible vm_flags to make sure that all
Anshuman Khandual2e326c02021-02-24 12:01:36 -08001265 * the basic page table transformation validations just hold
1266 * true irrespective of the starting protection value for a
1267 * given page table entry.
Anshuman Khandual31d17072022-04-28 23:16:12 -07001268 *
1269 * Protection based vm_flags combinatins are always linear
1270 * and increasing i.e starting from VM_NONE and going upto
1271 * (VM_SHARED | READ | WRITE | EXEC).
Anshuman Khandual2e326c02021-02-24 12:01:36 -08001272 */
Anshuman Khandual31d17072022-04-28 23:16:12 -07001273#define VM_FLAGS_START (VM_NONE)
1274#define VM_FLAGS_END (VM_SHARED | VM_EXEC | VM_WRITE | VM_READ)
1275
1276 for (idx = VM_FLAGS_START; idx <= VM_FLAGS_END; idx++) {
Gavin Shan36b77d12021-09-02 14:52:22 -07001277 pte_basic_tests(&args, idx);
1278 pmd_basic_tests(&args, idx);
1279 pud_basic_tests(&args, idx);
Anshuman Khandual2e326c02021-02-24 12:01:36 -08001280 }
1281
1282 /*
1283 * Both P4D and PGD level tests are very basic which do not
1284 * involve creating page table entries from the protection
1285 * value and the given pfn. Hence just keep them out from
1286 * the above iteration for now to save some test execution
1287 * time.
1288 */
Gavin Shan36b77d12021-09-02 14:52:22 -07001289 p4d_basic_tests(&args);
1290 pgd_basic_tests(&args);
Anshuman Khandual399145f2020-06-04 16:47:15 -07001291
Gavin Shan8983d232021-09-02 14:52:25 -07001292 pmd_leaf_tests(&args);
1293 pud_leaf_tests(&args);
Anshuman Khanduala5c3b9f2020-08-06 23:19:20 -07001294
Gavin Shan8983d232021-09-02 14:52:25 -07001295 pte_savedwrite_tests(&args);
1296 pmd_savedwrite_tests(&args);
Anshuman Khanduala5c3b9f2020-08-06 23:19:20 -07001297
Gavin Shan8cb183f2021-09-02 14:52:28 -07001298 pte_special_tests(&args);
1299 pte_protnone_tests(&args);
1300 pmd_protnone_tests(&args);
Anshuman Khandual05289402020-08-06 23:19:16 -07001301
Gavin Shan8cb183f2021-09-02 14:52:28 -07001302 pte_devmap_tests(&args);
1303 pmd_devmap_tests(&args);
1304 pud_devmap_tests(&args);
Anshuman Khandual05289402020-08-06 23:19:16 -07001305
Gavin Shan5f447e82021-09-02 14:52:32 -07001306 pte_soft_dirty_tests(&args);
1307 pmd_soft_dirty_tests(&args);
1308 pte_swap_soft_dirty_tests(&args);
1309 pmd_swap_soft_dirty_tests(&args);
Anshuman Khandual05289402020-08-06 23:19:16 -07001310
David Hildenbrand210d1e82022-05-09 18:20:45 -07001311 pte_swap_exclusive_tests(&args);
1312
Gavin Shan5f447e82021-09-02 14:52:32 -07001313 pte_swap_tests(&args);
1314 pmd_swap_tests(&args);
Anshuman Khandual05289402020-08-06 23:19:16 -07001315
Gavin Shan4878a882021-09-02 14:52:35 -07001316 swap_migration_tests(&args);
Anshuman Khandual05289402020-08-06 23:19:16 -07001317
Gavin Shan4878a882021-09-02 14:52:35 -07001318 pmd_thp_tests(&args);
1319 pud_thp_tests(&args);
Anshuman Khandual05289402020-08-06 23:19:16 -07001320
Gavin Shan36b77d12021-09-02 14:52:22 -07001321 hugetlb_basic_tests(&args);
Aneesh Kumar K.Ve8edf0a2020-10-15 20:04:49 -07001322
Aneesh Kumar K.V6f302e272020-10-15 20:04:53 -07001323 /*
1324 * Page table modifying tests. They need to hold
1325 * proper page table lock.
1326 */
Aneesh Kumar K.Ve8edf0a2020-10-15 20:04:49 -07001327
Gavin Shan44966c42021-09-02 14:52:38 -07001328 args.ptep = pte_offset_map_lock(args.mm, args.pmdp, args.vaddr, &ptl);
1329 pte_clear_tests(&args);
1330 pte_advanced_tests(&args);
1331 pte_unmap_unlock(args.ptep, ptl);
Aneesh Kumar K.Ve8edf0a2020-10-15 20:04:49 -07001332
Gavin Shanc0fe07b2021-09-02 14:52:41 -07001333 ptl = pmd_lock(args.mm, args.pmdp);
1334 pmd_clear_tests(&args);
1335 pmd_advanced_tests(&args);
1336 pmd_huge_tests(&args);
1337 pmd_populate_tests(&args);
Aneesh Kumar K.V6f302e272020-10-15 20:04:53 -07001338 spin_unlock(ptl);
1339
Gavin Shan4cbde032021-09-02 14:52:45 -07001340 ptl = pud_lock(args.mm, args.pudp);
1341 pud_clear_tests(&args);
1342 pud_advanced_tests(&args);
1343 pud_huge_tests(&args);
1344 pud_populate_tests(&args);
Aneesh Kumar K.V6f302e272020-10-15 20:04:53 -07001345 spin_unlock(ptl);
1346
Gavin Shan2f87f8c2021-09-02 14:52:48 -07001347 spin_lock(&(args.mm->page_table_lock));
1348 p4d_clear_tests(&args);
1349 pgd_clear_tests(&args);
1350 p4d_populate_tests(&args);
1351 pgd_populate_tests(&args);
1352 spin_unlock(&(args.mm->page_table_lock));
Aneesh Kumar K.Ve8edf0a2020-10-15 20:04:49 -07001353
Gavin Shan3c9b84f2021-09-02 14:52:19 -07001354 destroy_args(&args);
Anshuman Khandual399145f2020-06-04 16:47:15 -07001355 return 0;
1356}
1357late_initcall(debug_vm_pgtable);