blob: e651500e597a2e857a5d532219e771c66beed18f [file] [log] [blame]
Anshuman Khandual399145f2020-06-04 16:47:15 -07001// SPDX-License-Identifier: GPL-2.0-only
2/*
3 * This kernel test validates architecture page table helpers and
4 * accessors and helps in verifying their continued compliance with
5 * expected generic MM semantics.
6 *
7 * Copyright (C) 2019 ARM Ltd.
8 *
9 * Author: Anshuman Khandual <anshuman.khandual@arm.com>
10 */
Anshuman Khandual6315df42020-08-06 23:19:25 -070011#define pr_fmt(fmt) "debug_vm_pgtable: [%-25s]: " fmt, __func__
Anshuman Khandual399145f2020-06-04 16:47:15 -070012
13#include <linux/gfp.h>
14#include <linux/highmem.h>
15#include <linux/hugetlb.h>
16#include <linux/kernel.h>
17#include <linux/kconfig.h>
Frank van der Lindenc4876ff2023-01-09 17:43:32 +000018#include <linux/memblock.h>
Anshuman Khandual399145f2020-06-04 16:47:15 -070019#include <linux/mm.h>
20#include <linux/mman.h>
21#include <linux/mm_types.h>
22#include <linux/module.h>
23#include <linux/pfn_t.h>
24#include <linux/printk.h>
Anshuman Khanduala5c3b9f2020-08-06 23:19:20 -070025#include <linux/pgtable.h>
Anshuman Khandual399145f2020-06-04 16:47:15 -070026#include <linux/random.h>
27#include <linux/spinlock.h>
28#include <linux/swap.h>
29#include <linux/swapops.h>
30#include <linux/start_kernel.h>
31#include <linux/sched/mm.h>
Aneesh Kumar K.V85a14462020-10-15 20:04:36 -070032#include <linux/io.h>
Gavin Shan8c5b3a82021-09-02 14:52:54 -070033
34#include <asm/cacheflush.h>
Anshuman Khandual399145f2020-06-04 16:47:15 -070035#include <asm/pgalloc.h>
Anshuman Khanduala5c3b9f2020-08-06 23:19:20 -070036#include <asm/tlbflush.h>
Anshuman Khandual399145f2020-06-04 16:47:15 -070037
Anshuman Khandualb1d00002020-08-06 23:19:28 -070038/*
Mike Rapoportee657282022-06-27 09:00:26 +030039 * Please refer Documentation/mm/arch_pgtable_helpers.rst for the semantics
Anshuman Khandualb1d00002020-08-06 23:19:28 -070040 * expectations that are being validated here. All future changes in here
41 * or the documentation need to be in sync.
Kefeng Wangd7e679b2022-10-19 11:49:44 +080042 *
Anshuman Khandual399145f2020-06-04 16:47:15 -070043 * On s390 platform, the lower 4 bits are used to identify given page table
44 * entry type. But these bits might affect the ability to clear entries with
45 * pxx_clear() because of how dynamic page table folding works on s390. So
46 * while loading up the entries do not change the lower 4 bits. It does not
Aneesh Kumar K.Vcfc5bbc2020-10-15 20:04:33 -070047 * have affect any other platform. Also avoid the 62nd bit on ppc64 that is
48 * used to mark a pte entry.
Anshuman Khandual399145f2020-06-04 16:47:15 -070049 */
Aneesh Kumar K.Vcfc5bbc2020-10-15 20:04:33 -070050#define S390_SKIP_MASK GENMASK(3, 0)
51#if __BITS_PER_LONG == 64
52#define PPC64_SKIP_MASK GENMASK(62, 62)
53#else
54#define PPC64_SKIP_MASK 0x0
55#endif
56#define ARCH_SKIP_MASK (S390_SKIP_MASK | PPC64_SKIP_MASK)
57#define RANDOM_ORVALUE (GENMASK(BITS_PER_LONG - 1, 0) & ~ARCH_SKIP_MASK)
Anshuman Khandual399145f2020-06-04 16:47:15 -070058#define RANDOM_NZVALUE GENMASK(7, 0)
59
Gavin Shan3c9b84f2021-09-02 14:52:19 -070060struct pgtable_debug_args {
61 struct mm_struct *mm;
62 struct vm_area_struct *vma;
63
64 pgd_t *pgdp;
65 p4d_t *p4dp;
66 pud_t *pudp;
67 pmd_t *pmdp;
68 pte_t *ptep;
69
70 p4d_t *start_p4dp;
71 pud_t *start_pudp;
72 pmd_t *start_pmdp;
73 pgtable_t start_ptep;
74
75 unsigned long vaddr;
76 pgprot_t page_prot;
77 pgprot_t page_prot_none;
78
79 bool is_contiguous_page;
80 unsigned long pud_pfn;
81 unsigned long pmd_pfn;
82 unsigned long pte_pfn;
83
Frank van der Lindenc4876ff2023-01-09 17:43:32 +000084 unsigned long fixed_alignment;
Gavin Shan3c9b84f2021-09-02 14:52:19 -070085 unsigned long fixed_pgd_pfn;
86 unsigned long fixed_p4d_pfn;
87 unsigned long fixed_pud_pfn;
88 unsigned long fixed_pmd_pfn;
89 unsigned long fixed_pte_pfn;
90};
91
Gavin Shan36b77d12021-09-02 14:52:22 -070092static void __init pte_basic_tests(struct pgtable_debug_args *args, int idx)
Anshuman Khandual399145f2020-06-04 16:47:15 -070093{
Anshuman Khandual31d17072022-04-28 23:16:12 -070094 pgprot_t prot = vm_get_page_prot(idx);
Gavin Shan36b77d12021-09-02 14:52:22 -070095 pte_t pte = pfn_pte(args->fixed_pte_pfn, prot);
Anshuman Khandual2e326c02021-02-24 12:01:36 -080096 unsigned long val = idx, *ptr = &val;
Anshuman Khandual399145f2020-06-04 16:47:15 -070097
Anshuman Khandual2e326c02021-02-24 12:01:36 -080098 pr_debug("Validating PTE basic (%pGv)\n", ptr);
Anshuman Khandualbb5c47c2021-02-24 12:01:32 -080099
100 /*
101 * This test needs to be executed after the given page table entry
Anshuman Khandual31d17072022-04-28 23:16:12 -0700102 * is created with pfn_pte() to make sure that vm_get_page_prot(idx)
Anshuman Khandualbb5c47c2021-02-24 12:01:32 -0800103 * does not have the dirty bit enabled from the beginning. This is
104 * important for platforms like arm64 where (!PTE_RDONLY) indicate
105 * dirty bit being set.
106 */
107 WARN_ON(pte_dirty(pte_wrprotect(pte)));
108
Anshuman Khandual399145f2020-06-04 16:47:15 -0700109 WARN_ON(!pte_same(pte, pte));
110 WARN_ON(!pte_young(pte_mkyoung(pte_mkold(pte))));
111 WARN_ON(!pte_dirty(pte_mkdirty(pte_mkclean(pte))));
Rick Edgecombe161e3932023-06-12 17:10:29 -0700112 WARN_ON(!pte_write(pte_mkwrite(pte_wrprotect(pte), args->vma)));
Anshuman Khandual399145f2020-06-04 16:47:15 -0700113 WARN_ON(pte_young(pte_mkold(pte_mkyoung(pte))));
114 WARN_ON(pte_dirty(pte_mkclean(pte_mkdirty(pte))));
Rick Edgecombe161e3932023-06-12 17:10:29 -0700115 WARN_ON(pte_write(pte_wrprotect(pte_mkwrite(pte, args->vma))));
Anshuman Khandualbb5c47c2021-02-24 12:01:32 -0800116 WARN_ON(pte_dirty(pte_wrprotect(pte_mkclean(pte))));
117 WARN_ON(!pte_dirty(pte_wrprotect(pte_mkdirty(pte))));
Anshuman Khandual399145f2020-06-04 16:47:15 -0700118}
119
Gavin Shan44966c42021-09-02 14:52:38 -0700120static void __init pte_advanced_tests(struct pgtable_debug_args *args)
Anshuman Khanduala5c3b9f2020-08-06 23:19:20 -0700121{
Gavin Shan8c5b3a82021-09-02 14:52:54 -0700122 struct page *page;
Shixin Liub593b902021-06-30 18:47:40 -0700123 pte_t pte;
Anshuman Khanduala5c3b9f2020-08-06 23:19:20 -0700124
Aneesh Kumar K.Vc3824e12020-10-15 20:04:46 -0700125 /*
126 * Architectures optimize set_pte_at by avoiding TLB flush.
127 * This requires set_pte_at to be not used to update an
128 * existing pte entry. Clear pte before we do set_pte_at
Gavin Shan8c5b3a82021-09-02 14:52:54 -0700129 *
130 * flush_dcache_page() is called after set_pte_at() to clear
131 * PG_arch_1 for the page on ARM64. The page flag isn't cleared
132 * when it's released and page allocation check will fail when
133 * the page is allocated again. For architectures other than ARM64,
134 * the unexpected overhead of cache flushing is acceptable.
Aneesh Kumar K.Vc3824e12020-10-15 20:04:46 -0700135 */
Gavin Shan8c5b3a82021-09-02 14:52:54 -0700136 page = (args->pte_pfn != ULONG_MAX) ? pfn_to_page(args->pte_pfn) : NULL;
137 if (!page)
Gavin Shan44966c42021-09-02 14:52:38 -0700138 return;
Aneesh Kumar K.Vc3824e12020-10-15 20:04:46 -0700139
Anshuman Khandual6315df42020-08-06 23:19:25 -0700140 pr_debug("Validating PTE advanced\n");
Hugh Dickins9f2bad02023-06-08 18:27:52 -0700141 if (WARN_ON(!args->ptep))
142 return;
143
Gavin Shan44966c42021-09-02 14:52:38 -0700144 pte = pfn_pte(args->pte_pfn, args->page_prot);
145 set_pte_at(args->mm, args->vaddr, args->ptep, pte);
Gavin Shan8c5b3a82021-09-02 14:52:54 -0700146 flush_dcache_page(page);
Gavin Shan44966c42021-09-02 14:52:38 -0700147 ptep_set_wrprotect(args->mm, args->vaddr, args->ptep);
148 pte = ptep_get(args->ptep);
Anshuman Khanduala5c3b9f2020-08-06 23:19:20 -0700149 WARN_ON(pte_write(pte));
Gavin Shan44966c42021-09-02 14:52:38 -0700150 ptep_get_and_clear(args->mm, args->vaddr, args->ptep);
151 pte = ptep_get(args->ptep);
Anshuman Khanduala5c3b9f2020-08-06 23:19:20 -0700152 WARN_ON(!pte_none(pte));
153
Gavin Shan44966c42021-09-02 14:52:38 -0700154 pte = pfn_pte(args->pte_pfn, args->page_prot);
Anshuman Khanduala5c3b9f2020-08-06 23:19:20 -0700155 pte = pte_wrprotect(pte);
156 pte = pte_mkclean(pte);
Gavin Shan44966c42021-09-02 14:52:38 -0700157 set_pte_at(args->mm, args->vaddr, args->ptep, pte);
Gavin Shan8c5b3a82021-09-02 14:52:54 -0700158 flush_dcache_page(page);
Rick Edgecombe161e3932023-06-12 17:10:29 -0700159 pte = pte_mkwrite(pte, args->vma);
Anshuman Khanduala5c3b9f2020-08-06 23:19:20 -0700160 pte = pte_mkdirty(pte);
Gavin Shan44966c42021-09-02 14:52:38 -0700161 ptep_set_access_flags(args->vma, args->vaddr, args->ptep, pte, 1);
162 pte = ptep_get(args->ptep);
Anshuman Khanduala5c3b9f2020-08-06 23:19:20 -0700163 WARN_ON(!(pte_write(pte) && pte_dirty(pte)));
Gavin Shan44966c42021-09-02 14:52:38 -0700164 ptep_get_and_clear_full(args->mm, args->vaddr, args->ptep, 1);
165 pte = ptep_get(args->ptep);
Anshuman Khanduala5c3b9f2020-08-06 23:19:20 -0700166 WARN_ON(!pte_none(pte));
167
Gavin Shan44966c42021-09-02 14:52:38 -0700168 pte = pfn_pte(args->pte_pfn, args->page_prot);
Anshuman Khanduala5c3b9f2020-08-06 23:19:20 -0700169 pte = pte_mkyoung(pte);
Gavin Shan44966c42021-09-02 14:52:38 -0700170 set_pte_at(args->mm, args->vaddr, args->ptep, pte);
Gavin Shan8c5b3a82021-09-02 14:52:54 -0700171 flush_dcache_page(page);
Gavin Shan44966c42021-09-02 14:52:38 -0700172 ptep_test_and_clear_young(args->vma, args->vaddr, args->ptep);
173 pte = ptep_get(args->ptep);
Anshuman Khanduala5c3b9f2020-08-06 23:19:20 -0700174 WARN_ON(pte_young(pte));
Pasha Tatashinfb5222a2022-02-03 20:49:10 -0800175
176 ptep_get_and_clear_full(args->mm, args->vaddr, args->ptep, 1);
Anshuman Khanduala5c3b9f2020-08-06 23:19:20 -0700177}
178
Anshuman Khandual399145f2020-06-04 16:47:15 -0700179#ifdef CONFIG_TRANSPARENT_HUGEPAGE
Gavin Shan36b77d12021-09-02 14:52:22 -0700180static void __init pmd_basic_tests(struct pgtable_debug_args *args, int idx)
Anshuman Khandual399145f2020-06-04 16:47:15 -0700181{
Anshuman Khandual31d17072022-04-28 23:16:12 -0700182 pgprot_t prot = vm_get_page_prot(idx);
Anshuman Khandual2e326c02021-02-24 12:01:36 -0800183 unsigned long val = idx, *ptr = &val;
Anshuman Khandual65ac1a62021-06-28 19:35:10 -0700184 pmd_t pmd;
Anshuman Khandual399145f2020-06-04 16:47:15 -0700185
Aneesh Kumar K.V787d5632020-06-10 18:41:44 -0700186 if (!has_transparent_hugepage())
187 return;
188
Anshuman Khandual2e326c02021-02-24 12:01:36 -0800189 pr_debug("Validating PMD basic (%pGv)\n", ptr);
Gavin Shan36b77d12021-09-02 14:52:22 -0700190 pmd = pfn_pmd(args->fixed_pmd_pfn, prot);
Anshuman Khandualbb5c47c2021-02-24 12:01:32 -0800191
192 /*
193 * This test needs to be executed after the given page table entry
Anshuman Khandual31d17072022-04-28 23:16:12 -0700194 * is created with pfn_pmd() to make sure that vm_get_page_prot(idx)
Anshuman Khandualbb5c47c2021-02-24 12:01:32 -0800195 * does not have the dirty bit enabled from the beginning. This is
196 * important for platforms like arm64 where (!PTE_RDONLY) indicate
197 * dirty bit being set.
198 */
199 WARN_ON(pmd_dirty(pmd_wrprotect(pmd)));
200
201
Anshuman Khandual399145f2020-06-04 16:47:15 -0700202 WARN_ON(!pmd_same(pmd, pmd));
203 WARN_ON(!pmd_young(pmd_mkyoung(pmd_mkold(pmd))));
204 WARN_ON(!pmd_dirty(pmd_mkdirty(pmd_mkclean(pmd))));
Rick Edgecombe161e3932023-06-12 17:10:29 -0700205 WARN_ON(!pmd_write(pmd_mkwrite(pmd_wrprotect(pmd), args->vma)));
Anshuman Khandual399145f2020-06-04 16:47:15 -0700206 WARN_ON(pmd_young(pmd_mkold(pmd_mkyoung(pmd))));
207 WARN_ON(pmd_dirty(pmd_mkclean(pmd_mkdirty(pmd))));
Rick Edgecombe161e3932023-06-12 17:10:29 -0700208 WARN_ON(pmd_write(pmd_wrprotect(pmd_mkwrite(pmd, args->vma))));
Anshuman Khandualbb5c47c2021-02-24 12:01:32 -0800209 WARN_ON(pmd_dirty(pmd_wrprotect(pmd_mkclean(pmd))));
210 WARN_ON(!pmd_dirty(pmd_wrprotect(pmd_mkdirty(pmd))));
Anshuman Khandual399145f2020-06-04 16:47:15 -0700211 /*
212 * A huge page does not point to next level page table
213 * entry. Hence this must qualify as pmd_bad().
214 */
215 WARN_ON(!pmd_bad(pmd_mkhuge(pmd)));
216}
217
Gavin Shanc0fe07b2021-09-02 14:52:41 -0700218static void __init pmd_advanced_tests(struct pgtable_debug_args *args)
Anshuman Khanduala5c3b9f2020-08-06 23:19:20 -0700219{
Gavin Shan8c5b3a82021-09-02 14:52:54 -0700220 struct page *page;
Anshuman Khandual65ac1a62021-06-28 19:35:10 -0700221 pmd_t pmd;
Gavin Shanc0fe07b2021-09-02 14:52:41 -0700222 unsigned long vaddr = args->vaddr;
Anshuman Khanduala5c3b9f2020-08-06 23:19:20 -0700223
224 if (!has_transparent_hugepage())
225 return;
226
Gavin Shan8c5b3a82021-09-02 14:52:54 -0700227 page = (args->pmd_pfn != ULONG_MAX) ? pfn_to_page(args->pmd_pfn) : NULL;
228 if (!page)
Gavin Shanc0fe07b2021-09-02 14:52:41 -0700229 return;
230
Gavin Shan8c5b3a82021-09-02 14:52:54 -0700231 /*
232 * flush_dcache_page() is called after set_pmd_at() to clear
233 * PG_arch_1 for the page on ARM64. The page flag isn't cleared
234 * when it's released and page allocation check will fail when
235 * the page is allocated again. For architectures other than ARM64,
236 * the unexpected overhead of cache flushing is acceptable.
237 */
Anshuman Khandual6315df42020-08-06 23:19:25 -0700238 pr_debug("Validating PMD advanced\n");
Anshuman Khanduala5c3b9f2020-08-06 23:19:20 -0700239 /* Align the address wrt HPAGE_PMD_SIZE */
Gerald Schaefer04f7ce32021-06-04 20:01:18 -0700240 vaddr &= HPAGE_PMD_MASK;
Anshuman Khanduala5c3b9f2020-08-06 23:19:20 -0700241
Gavin Shanc0fe07b2021-09-02 14:52:41 -0700242 pgtable_trans_huge_deposit(args->mm, args->pmdp, args->start_ptep);
Aneesh Kumar K.V87f34982020-10-15 20:04:56 -0700243
Gavin Shanc0fe07b2021-09-02 14:52:41 -0700244 pmd = pfn_pmd(args->pmd_pfn, args->page_prot);
245 set_pmd_at(args->mm, vaddr, args->pmdp, pmd);
Gavin Shan8c5b3a82021-09-02 14:52:54 -0700246 flush_dcache_page(page);
Gavin Shanc0fe07b2021-09-02 14:52:41 -0700247 pmdp_set_wrprotect(args->mm, vaddr, args->pmdp);
248 pmd = READ_ONCE(*args->pmdp);
Anshuman Khanduala5c3b9f2020-08-06 23:19:20 -0700249 WARN_ON(pmd_write(pmd));
Gavin Shanc0fe07b2021-09-02 14:52:41 -0700250 pmdp_huge_get_and_clear(args->mm, vaddr, args->pmdp);
251 pmd = READ_ONCE(*args->pmdp);
Anshuman Khanduala5c3b9f2020-08-06 23:19:20 -0700252 WARN_ON(!pmd_none(pmd));
253
Gavin Shanc0fe07b2021-09-02 14:52:41 -0700254 pmd = pfn_pmd(args->pmd_pfn, args->page_prot);
Anshuman Khanduala5c3b9f2020-08-06 23:19:20 -0700255 pmd = pmd_wrprotect(pmd);
256 pmd = pmd_mkclean(pmd);
Gavin Shanc0fe07b2021-09-02 14:52:41 -0700257 set_pmd_at(args->mm, vaddr, args->pmdp, pmd);
Gavin Shan8c5b3a82021-09-02 14:52:54 -0700258 flush_dcache_page(page);
Rick Edgecombe161e3932023-06-12 17:10:29 -0700259 pmd = pmd_mkwrite(pmd, args->vma);
Anshuman Khanduala5c3b9f2020-08-06 23:19:20 -0700260 pmd = pmd_mkdirty(pmd);
Gavin Shanc0fe07b2021-09-02 14:52:41 -0700261 pmdp_set_access_flags(args->vma, vaddr, args->pmdp, pmd, 1);
262 pmd = READ_ONCE(*args->pmdp);
Anshuman Khanduala5c3b9f2020-08-06 23:19:20 -0700263 WARN_ON(!(pmd_write(pmd) && pmd_dirty(pmd)));
Gavin Shanc0fe07b2021-09-02 14:52:41 -0700264 pmdp_huge_get_and_clear_full(args->vma, vaddr, args->pmdp, 1);
265 pmd = READ_ONCE(*args->pmdp);
Anshuman Khanduala5c3b9f2020-08-06 23:19:20 -0700266 WARN_ON(!pmd_none(pmd));
267
Gavin Shanc0fe07b2021-09-02 14:52:41 -0700268 pmd = pmd_mkhuge(pfn_pmd(args->pmd_pfn, args->page_prot));
Anshuman Khanduala5c3b9f2020-08-06 23:19:20 -0700269 pmd = pmd_mkyoung(pmd);
Gavin Shanc0fe07b2021-09-02 14:52:41 -0700270 set_pmd_at(args->mm, vaddr, args->pmdp, pmd);
Gavin Shan8c5b3a82021-09-02 14:52:54 -0700271 flush_dcache_page(page);
Gavin Shanc0fe07b2021-09-02 14:52:41 -0700272 pmdp_test_and_clear_young(args->vma, vaddr, args->pmdp);
273 pmd = READ_ONCE(*args->pmdp);
Anshuman Khanduala5c3b9f2020-08-06 23:19:20 -0700274 WARN_ON(pmd_young(pmd));
Aneesh Kumar K.V87f34982020-10-15 20:04:56 -0700275
Aneesh Kumar K.V13af0502020-10-15 20:04:59 -0700276 /* Clear the pte entries */
Gavin Shanc0fe07b2021-09-02 14:52:41 -0700277 pmdp_huge_get_and_clear(args->mm, vaddr, args->pmdp);
278 pgtable_trans_huge_withdraw(args->mm, args->pmdp);
Anshuman Khanduala5c3b9f2020-08-06 23:19:20 -0700279}
280
Gavin Shan8983d232021-09-02 14:52:25 -0700281static void __init pmd_leaf_tests(struct pgtable_debug_args *args)
Anshuman Khanduala5c3b9f2020-08-06 23:19:20 -0700282{
Anshuman Khandual65ac1a62021-06-28 19:35:10 -0700283 pmd_t pmd;
284
285 if (!has_transparent_hugepage())
286 return;
Anshuman Khanduala5c3b9f2020-08-06 23:19:20 -0700287
Anshuman Khandual6315df42020-08-06 23:19:25 -0700288 pr_debug("Validating PMD leaf\n");
Gavin Shan8983d232021-09-02 14:52:25 -0700289 pmd = pfn_pmd(args->fixed_pmd_pfn, args->page_prot);
Anshuman Khandual65ac1a62021-06-28 19:35:10 -0700290
Anshuman Khanduala5c3b9f2020-08-06 23:19:20 -0700291 /*
292 * PMD based THP is a leaf entry.
293 */
294 pmd = pmd_mkhuge(pmd);
295 WARN_ON(!pmd_leaf(pmd));
296}
297
Anshuman Khandual399145f2020-06-04 16:47:15 -0700298#ifdef CONFIG_HAVE_ARCH_TRANSPARENT_HUGEPAGE_PUD
Gavin Shan36b77d12021-09-02 14:52:22 -0700299static void __init pud_basic_tests(struct pgtable_debug_args *args, int idx)
Anshuman Khandual399145f2020-06-04 16:47:15 -0700300{
Anshuman Khandual31d17072022-04-28 23:16:12 -0700301 pgprot_t prot = vm_get_page_prot(idx);
Anshuman Khandual2e326c02021-02-24 12:01:36 -0800302 unsigned long val = idx, *ptr = &val;
Anshuman Khandual65ac1a62021-06-28 19:35:10 -0700303 pud_t pud;
Anshuman Khandual399145f2020-06-04 16:47:15 -0700304
Aneesh Kumar K.V348ad162023-07-25 00:37:47 +0530305 if (!has_transparent_pud_hugepage())
Aneesh Kumar K.V787d5632020-06-10 18:41:44 -0700306 return;
307
Anshuman Khandual2e326c02021-02-24 12:01:36 -0800308 pr_debug("Validating PUD basic (%pGv)\n", ptr);
Gavin Shan36b77d12021-09-02 14:52:22 -0700309 pud = pfn_pud(args->fixed_pud_pfn, prot);
Anshuman Khandualbb5c47c2021-02-24 12:01:32 -0800310
311 /*
312 * This test needs to be executed after the given page table entry
Anshuman Khandual31d17072022-04-28 23:16:12 -0700313 * is created with pfn_pud() to make sure that vm_get_page_prot(idx)
Anshuman Khandualbb5c47c2021-02-24 12:01:32 -0800314 * does not have the dirty bit enabled from the beginning. This is
315 * important for platforms like arm64 where (!PTE_RDONLY) indicate
316 * dirty bit being set.
317 */
318 WARN_ON(pud_dirty(pud_wrprotect(pud)));
319
Anshuman Khandual399145f2020-06-04 16:47:15 -0700320 WARN_ON(!pud_same(pud, pud));
321 WARN_ON(!pud_young(pud_mkyoung(pud_mkold(pud))));
Anshuman Khandualbb5c47c2021-02-24 12:01:32 -0800322 WARN_ON(!pud_dirty(pud_mkdirty(pud_mkclean(pud))));
323 WARN_ON(pud_dirty(pud_mkclean(pud_mkdirty(pud))));
Anshuman Khandual399145f2020-06-04 16:47:15 -0700324 WARN_ON(!pud_write(pud_mkwrite(pud_wrprotect(pud))));
325 WARN_ON(pud_write(pud_wrprotect(pud_mkwrite(pud))));
326 WARN_ON(pud_young(pud_mkold(pud_mkyoung(pud))));
Anshuman Khandualbb5c47c2021-02-24 12:01:32 -0800327 WARN_ON(pud_dirty(pud_wrprotect(pud_mkclean(pud))));
328 WARN_ON(!pud_dirty(pud_wrprotect(pud_mkdirty(pud))));
Anshuman Khandual399145f2020-06-04 16:47:15 -0700329
Gavin Shan36b77d12021-09-02 14:52:22 -0700330 if (mm_pmd_folded(args->mm))
Anshuman Khandual399145f2020-06-04 16:47:15 -0700331 return;
332
333 /*
334 * A huge page does not point to next level page table
335 * entry. Hence this must qualify as pud_bad().
336 */
337 WARN_ON(!pud_bad(pud_mkhuge(pud)));
338}
Anshuman Khanduala5c3b9f2020-08-06 23:19:20 -0700339
Gavin Shan4cbde032021-09-02 14:52:45 -0700340static void __init pud_advanced_tests(struct pgtable_debug_args *args)
Anshuman Khanduala5c3b9f2020-08-06 23:19:20 -0700341{
Gavin Shan8c5b3a82021-09-02 14:52:54 -0700342 struct page *page;
Gavin Shan4cbde032021-09-02 14:52:45 -0700343 unsigned long vaddr = args->vaddr;
Anshuman Khandual65ac1a62021-06-28 19:35:10 -0700344 pud_t pud;
Anshuman Khanduala5c3b9f2020-08-06 23:19:20 -0700345
Aneesh Kumar K.V348ad162023-07-25 00:37:47 +0530346 if (!has_transparent_pud_hugepage())
Anshuman Khanduala5c3b9f2020-08-06 23:19:20 -0700347 return;
348
Gavin Shan8c5b3a82021-09-02 14:52:54 -0700349 page = (args->pud_pfn != ULONG_MAX) ? pfn_to_page(args->pud_pfn) : NULL;
350 if (!page)
Gavin Shan4cbde032021-09-02 14:52:45 -0700351 return;
352
Gavin Shan8c5b3a82021-09-02 14:52:54 -0700353 /*
354 * flush_dcache_page() is called after set_pud_at() to clear
355 * PG_arch_1 for the page on ARM64. The page flag isn't cleared
356 * when it's released and page allocation check will fail when
357 * the page is allocated again. For architectures other than ARM64,
358 * the unexpected overhead of cache flushing is acceptable.
359 */
Anshuman Khandual6315df42020-08-06 23:19:25 -0700360 pr_debug("Validating PUD advanced\n");
Anshuman Khanduala5c3b9f2020-08-06 23:19:20 -0700361 /* Align the address wrt HPAGE_PUD_SIZE */
Gerald Schaefer04f7ce32021-06-04 20:01:18 -0700362 vaddr &= HPAGE_PUD_MASK;
Anshuman Khanduala5c3b9f2020-08-06 23:19:20 -0700363
Gavin Shan4cbde032021-09-02 14:52:45 -0700364 pud = pfn_pud(args->pud_pfn, args->page_prot);
365 set_pud_at(args->mm, vaddr, args->pudp, pud);
Gavin Shan8c5b3a82021-09-02 14:52:54 -0700366 flush_dcache_page(page);
Gavin Shan4cbde032021-09-02 14:52:45 -0700367 pudp_set_wrprotect(args->mm, vaddr, args->pudp);
368 pud = READ_ONCE(*args->pudp);
Anshuman Khanduala5c3b9f2020-08-06 23:19:20 -0700369 WARN_ON(pud_write(pud));
370
371#ifndef __PAGETABLE_PMD_FOLDED
Gavin Shan4cbde032021-09-02 14:52:45 -0700372 pudp_huge_get_and_clear(args->mm, vaddr, args->pudp);
373 pud = READ_ONCE(*args->pudp);
Anshuman Khanduala5c3b9f2020-08-06 23:19:20 -0700374 WARN_ON(!pud_none(pud));
Anshuman Khanduala5c3b9f2020-08-06 23:19:20 -0700375#endif /* __PAGETABLE_PMD_FOLDED */
Gavin Shan4cbde032021-09-02 14:52:45 -0700376 pud = pfn_pud(args->pud_pfn, args->page_prot);
Anshuman Khanduala5c3b9f2020-08-06 23:19:20 -0700377 pud = pud_wrprotect(pud);
378 pud = pud_mkclean(pud);
Gavin Shan4cbde032021-09-02 14:52:45 -0700379 set_pud_at(args->mm, vaddr, args->pudp, pud);
Gavin Shan8c5b3a82021-09-02 14:52:54 -0700380 flush_dcache_page(page);
Anshuman Khanduala5c3b9f2020-08-06 23:19:20 -0700381 pud = pud_mkwrite(pud);
382 pud = pud_mkdirty(pud);
Gavin Shan4cbde032021-09-02 14:52:45 -0700383 pudp_set_access_flags(args->vma, vaddr, args->pudp, pud, 1);
384 pud = READ_ONCE(*args->pudp);
Anshuman Khanduala5c3b9f2020-08-06 23:19:20 -0700385 WARN_ON(!(pud_write(pud) && pud_dirty(pud)));
386
Aneesh Kumar K.Vc3824e12020-10-15 20:04:46 -0700387#ifndef __PAGETABLE_PMD_FOLDED
Aneesh Kumar K.Vf32928a2023-07-25 00:37:48 +0530388 pudp_huge_get_and_clear_full(args->vma, vaddr, args->pudp, 1);
Gavin Shan4cbde032021-09-02 14:52:45 -0700389 pud = READ_ONCE(*args->pudp);
Aneesh Kumar K.Vc3824e12020-10-15 20:04:46 -0700390 WARN_ON(!pud_none(pud));
391#endif /* __PAGETABLE_PMD_FOLDED */
392
Gavin Shan4cbde032021-09-02 14:52:45 -0700393 pud = pfn_pud(args->pud_pfn, args->page_prot);
Anshuman Khanduala5c3b9f2020-08-06 23:19:20 -0700394 pud = pud_mkyoung(pud);
Gavin Shan4cbde032021-09-02 14:52:45 -0700395 set_pud_at(args->mm, vaddr, args->pudp, pud);
Gavin Shan8c5b3a82021-09-02 14:52:54 -0700396 flush_dcache_page(page);
Gavin Shan4cbde032021-09-02 14:52:45 -0700397 pudp_test_and_clear_young(args->vma, vaddr, args->pudp);
398 pud = READ_ONCE(*args->pudp);
Anshuman Khanduala5c3b9f2020-08-06 23:19:20 -0700399 WARN_ON(pud_young(pud));
Aneesh Kumar K.V13af0502020-10-15 20:04:59 -0700400
Gavin Shan4cbde032021-09-02 14:52:45 -0700401 pudp_huge_get_and_clear(args->mm, vaddr, args->pudp);
Anshuman Khanduala5c3b9f2020-08-06 23:19:20 -0700402}
403
Gavin Shan8983d232021-09-02 14:52:25 -0700404static void __init pud_leaf_tests(struct pgtable_debug_args *args)
Anshuman Khanduala5c3b9f2020-08-06 23:19:20 -0700405{
Anshuman Khandual65ac1a62021-06-28 19:35:10 -0700406 pud_t pud;
407
Aneesh Kumar K.V348ad162023-07-25 00:37:47 +0530408 if (!has_transparent_pud_hugepage())
Anshuman Khandual65ac1a62021-06-28 19:35:10 -0700409 return;
Anshuman Khanduala5c3b9f2020-08-06 23:19:20 -0700410
Anshuman Khandual6315df42020-08-06 23:19:25 -0700411 pr_debug("Validating PUD leaf\n");
Gavin Shan8983d232021-09-02 14:52:25 -0700412 pud = pfn_pud(args->fixed_pud_pfn, args->page_prot);
Anshuman Khanduala5c3b9f2020-08-06 23:19:20 -0700413 /*
414 * PUD based THP is a leaf entry.
415 */
416 pud = pud_mkhuge(pud);
417 WARN_ON(!pud_leaf(pud));
418}
Shixin Liu5fe77be2021-06-30 18:47:37 -0700419#else /* !CONFIG_HAVE_ARCH_TRANSPARENT_HUGEPAGE_PUD */
Gavin Shan36b77d12021-09-02 14:52:22 -0700420static void __init pud_basic_tests(struct pgtable_debug_args *args, int idx) { }
Gavin Shan4cbde032021-09-02 14:52:45 -0700421static void __init pud_advanced_tests(struct pgtable_debug_args *args) { }
Gavin Shan8983d232021-09-02 14:52:25 -0700422static void __init pud_leaf_tests(struct pgtable_debug_args *args) { }
Shixin Liu5fe77be2021-06-30 18:47:37 -0700423#endif /* CONFIG_HAVE_ARCH_TRANSPARENT_HUGEPAGE_PUD */
424#else /* !CONFIG_TRANSPARENT_HUGEPAGE */
Gavin Shan36b77d12021-09-02 14:52:22 -0700425static void __init pmd_basic_tests(struct pgtable_debug_args *args, int idx) { }
426static void __init pud_basic_tests(struct pgtable_debug_args *args, int idx) { }
Gavin Shanc0fe07b2021-09-02 14:52:41 -0700427static void __init pmd_advanced_tests(struct pgtable_debug_args *args) { }
Gavin Shan4cbde032021-09-02 14:52:45 -0700428static void __init pud_advanced_tests(struct pgtable_debug_args *args) { }
Gavin Shan8983d232021-09-02 14:52:25 -0700429static void __init pmd_leaf_tests(struct pgtable_debug_args *args) { }
430static void __init pud_leaf_tests(struct pgtable_debug_args *args) { }
Shixin Liu5fe77be2021-06-30 18:47:37 -0700431#endif /* CONFIG_TRANSPARENT_HUGEPAGE */
Anshuman Khanduala5c3b9f2020-08-06 23:19:20 -0700432
Aneesh Kumar K.V85a14462020-10-15 20:04:36 -0700433#ifdef CONFIG_HAVE_ARCH_HUGE_VMAP
Gavin Shanc0fe07b2021-09-02 14:52:41 -0700434static void __init pmd_huge_tests(struct pgtable_debug_args *args)
Shixin Liu5fe77be2021-06-30 18:47:37 -0700435{
436 pmd_t pmd;
437
Frank van der Lindenc4876ff2023-01-09 17:43:32 +0000438 if (!arch_vmap_pmd_supported(args->page_prot) ||
439 args->fixed_alignment < PMD_SIZE)
Shixin Liu5fe77be2021-06-30 18:47:37 -0700440 return;
441
442 pr_debug("Validating PMD huge\n");
443 /*
444 * X86 defined pmd_set_huge() verifies that the given
445 * PMD is not a populated non-leaf entry.
446 */
Gavin Shanc0fe07b2021-09-02 14:52:41 -0700447 WRITE_ONCE(*args->pmdp, __pmd(0));
448 WARN_ON(!pmd_set_huge(args->pmdp, __pfn_to_phys(args->fixed_pmd_pfn), args->page_prot));
449 WARN_ON(!pmd_clear_huge(args->pmdp));
450 pmd = READ_ONCE(*args->pmdp);
Shixin Liu5fe77be2021-06-30 18:47:37 -0700451 WARN_ON(!pmd_none(pmd));
452}
453
Gavin Shan4cbde032021-09-02 14:52:45 -0700454static void __init pud_huge_tests(struct pgtable_debug_args *args)
Anshuman Khanduala5c3b9f2020-08-06 23:19:20 -0700455{
456 pud_t pud;
457
Frank van der Lindenc4876ff2023-01-09 17:43:32 +0000458 if (!arch_vmap_pud_supported(args->page_prot) ||
459 args->fixed_alignment < PUD_SIZE)
Anshuman Khanduala5c3b9f2020-08-06 23:19:20 -0700460 return;
Anshuman Khandual6315df42020-08-06 23:19:25 -0700461
462 pr_debug("Validating PUD huge\n");
Anshuman Khanduala5c3b9f2020-08-06 23:19:20 -0700463 /*
464 * X86 defined pud_set_huge() verifies that the given
465 * PUD is not a populated non-leaf entry.
466 */
Gavin Shan4cbde032021-09-02 14:52:45 -0700467 WRITE_ONCE(*args->pudp, __pud(0));
468 WARN_ON(!pud_set_huge(args->pudp, __pfn_to_phys(args->fixed_pud_pfn), args->page_prot));
469 WARN_ON(!pud_clear_huge(args->pudp));
470 pud = READ_ONCE(*args->pudp);
Anshuman Khanduala5c3b9f2020-08-06 23:19:20 -0700471 WARN_ON(!pud_none(pud));
472}
Aneesh Kumar K.V85a14462020-10-15 20:04:36 -0700473#else /* !CONFIG_HAVE_ARCH_HUGE_VMAP */
Gavin Shanc0fe07b2021-09-02 14:52:41 -0700474static void __init pmd_huge_tests(struct pgtable_debug_args *args) { }
Gavin Shan4cbde032021-09-02 14:52:45 -0700475static void __init pud_huge_tests(struct pgtable_debug_args *args) { }
Shixin Liu5fe77be2021-06-30 18:47:37 -0700476#endif /* CONFIG_HAVE_ARCH_HUGE_VMAP */
Anshuman Khandual399145f2020-06-04 16:47:15 -0700477
Gavin Shan36b77d12021-09-02 14:52:22 -0700478static void __init p4d_basic_tests(struct pgtable_debug_args *args)
Anshuman Khandual399145f2020-06-04 16:47:15 -0700479{
480 p4d_t p4d;
481
Anshuman Khandual6315df42020-08-06 23:19:25 -0700482 pr_debug("Validating P4D basic\n");
Anshuman Khandual399145f2020-06-04 16:47:15 -0700483 memset(&p4d, RANDOM_NZVALUE, sizeof(p4d_t));
484 WARN_ON(!p4d_same(p4d, p4d));
485}
486
Gavin Shan36b77d12021-09-02 14:52:22 -0700487static void __init pgd_basic_tests(struct pgtable_debug_args *args)
Anshuman Khandual399145f2020-06-04 16:47:15 -0700488{
489 pgd_t pgd;
490
Anshuman Khandual6315df42020-08-06 23:19:25 -0700491 pr_debug("Validating PGD basic\n");
Anshuman Khandual399145f2020-06-04 16:47:15 -0700492 memset(&pgd, RANDOM_NZVALUE, sizeof(pgd_t));
493 WARN_ON(!pgd_same(pgd, pgd));
494}
495
496#ifndef __PAGETABLE_PUD_FOLDED
Gavin Shan4cbde032021-09-02 14:52:45 -0700497static void __init pud_clear_tests(struct pgtable_debug_args *args)
Anshuman Khandual399145f2020-06-04 16:47:15 -0700498{
Gavin Shan4cbde032021-09-02 14:52:45 -0700499 pud_t pud = READ_ONCE(*args->pudp);
Anshuman Khandual399145f2020-06-04 16:47:15 -0700500
Gavin Shan4cbde032021-09-02 14:52:45 -0700501 if (mm_pmd_folded(args->mm))
Anshuman Khandual399145f2020-06-04 16:47:15 -0700502 return;
503
Anshuman Khandual6315df42020-08-06 23:19:25 -0700504 pr_debug("Validating PUD clear\n");
Anshuman Khandual399145f2020-06-04 16:47:15 -0700505 pud = __pud(pud_val(pud) | RANDOM_ORVALUE);
Gavin Shan4cbde032021-09-02 14:52:45 -0700506 WRITE_ONCE(*args->pudp, pud);
507 pud_clear(args->pudp);
508 pud = READ_ONCE(*args->pudp);
Anshuman Khandual399145f2020-06-04 16:47:15 -0700509 WARN_ON(!pud_none(pud));
510}
511
Gavin Shan4cbde032021-09-02 14:52:45 -0700512static void __init pud_populate_tests(struct pgtable_debug_args *args)
Anshuman Khandual399145f2020-06-04 16:47:15 -0700513{
514 pud_t pud;
515
Gavin Shan4cbde032021-09-02 14:52:45 -0700516 if (mm_pmd_folded(args->mm))
Anshuman Khandual399145f2020-06-04 16:47:15 -0700517 return;
Anshuman Khandual6315df42020-08-06 23:19:25 -0700518
519 pr_debug("Validating PUD populate\n");
Anshuman Khandual399145f2020-06-04 16:47:15 -0700520 /*
521 * This entry points to next level page table page.
522 * Hence this must not qualify as pud_bad().
523 */
Gavin Shan4cbde032021-09-02 14:52:45 -0700524 pud_populate(args->mm, args->pudp, args->start_pmdp);
525 pud = READ_ONCE(*args->pudp);
Anshuman Khandual399145f2020-06-04 16:47:15 -0700526 WARN_ON(pud_bad(pud));
527}
528#else /* !__PAGETABLE_PUD_FOLDED */
Gavin Shan4cbde032021-09-02 14:52:45 -0700529static void __init pud_clear_tests(struct pgtable_debug_args *args) { }
530static void __init pud_populate_tests(struct pgtable_debug_args *args) { }
Anshuman Khandual399145f2020-06-04 16:47:15 -0700531#endif /* PAGETABLE_PUD_FOLDED */
532
533#ifndef __PAGETABLE_P4D_FOLDED
Gavin Shan2f87f8c2021-09-02 14:52:48 -0700534static void __init p4d_clear_tests(struct pgtable_debug_args *args)
Anshuman Khandual399145f2020-06-04 16:47:15 -0700535{
Gavin Shan2f87f8c2021-09-02 14:52:48 -0700536 p4d_t p4d = READ_ONCE(*args->p4dp);
Anshuman Khandual399145f2020-06-04 16:47:15 -0700537
Gavin Shan2f87f8c2021-09-02 14:52:48 -0700538 if (mm_pud_folded(args->mm))
Anshuman Khandual399145f2020-06-04 16:47:15 -0700539 return;
540
Anshuman Khandual6315df42020-08-06 23:19:25 -0700541 pr_debug("Validating P4D clear\n");
Anshuman Khandual399145f2020-06-04 16:47:15 -0700542 p4d = __p4d(p4d_val(p4d) | RANDOM_ORVALUE);
Gavin Shan2f87f8c2021-09-02 14:52:48 -0700543 WRITE_ONCE(*args->p4dp, p4d);
544 p4d_clear(args->p4dp);
545 p4d = READ_ONCE(*args->p4dp);
Anshuman Khandual399145f2020-06-04 16:47:15 -0700546 WARN_ON(!p4d_none(p4d));
547}
548
Gavin Shan2f87f8c2021-09-02 14:52:48 -0700549static void __init p4d_populate_tests(struct pgtable_debug_args *args)
Anshuman Khandual399145f2020-06-04 16:47:15 -0700550{
551 p4d_t p4d;
552
Gavin Shan2f87f8c2021-09-02 14:52:48 -0700553 if (mm_pud_folded(args->mm))
Anshuman Khandual399145f2020-06-04 16:47:15 -0700554 return;
555
Anshuman Khandual6315df42020-08-06 23:19:25 -0700556 pr_debug("Validating P4D populate\n");
Anshuman Khandual399145f2020-06-04 16:47:15 -0700557 /*
558 * This entry points to next level page table page.
559 * Hence this must not qualify as p4d_bad().
560 */
Gavin Shan2f87f8c2021-09-02 14:52:48 -0700561 pud_clear(args->pudp);
562 p4d_clear(args->p4dp);
563 p4d_populate(args->mm, args->p4dp, args->start_pudp);
564 p4d = READ_ONCE(*args->p4dp);
Anshuman Khandual399145f2020-06-04 16:47:15 -0700565 WARN_ON(p4d_bad(p4d));
566}
567
Gavin Shan2f87f8c2021-09-02 14:52:48 -0700568static void __init pgd_clear_tests(struct pgtable_debug_args *args)
Anshuman Khandual399145f2020-06-04 16:47:15 -0700569{
Gavin Shan2f87f8c2021-09-02 14:52:48 -0700570 pgd_t pgd = READ_ONCE(*(args->pgdp));
Anshuman Khandual399145f2020-06-04 16:47:15 -0700571
Gavin Shan2f87f8c2021-09-02 14:52:48 -0700572 if (mm_p4d_folded(args->mm))
Anshuman Khandual399145f2020-06-04 16:47:15 -0700573 return;
574
Anshuman Khandual6315df42020-08-06 23:19:25 -0700575 pr_debug("Validating PGD clear\n");
Anshuman Khandual399145f2020-06-04 16:47:15 -0700576 pgd = __pgd(pgd_val(pgd) | RANDOM_ORVALUE);
Gavin Shan2f87f8c2021-09-02 14:52:48 -0700577 WRITE_ONCE(*args->pgdp, pgd);
578 pgd_clear(args->pgdp);
579 pgd = READ_ONCE(*args->pgdp);
Anshuman Khandual399145f2020-06-04 16:47:15 -0700580 WARN_ON(!pgd_none(pgd));
581}
582
Gavin Shan2f87f8c2021-09-02 14:52:48 -0700583static void __init pgd_populate_tests(struct pgtable_debug_args *args)
Anshuman Khandual399145f2020-06-04 16:47:15 -0700584{
585 pgd_t pgd;
586
Gavin Shan2f87f8c2021-09-02 14:52:48 -0700587 if (mm_p4d_folded(args->mm))
Anshuman Khandual399145f2020-06-04 16:47:15 -0700588 return;
589
Anshuman Khandual6315df42020-08-06 23:19:25 -0700590 pr_debug("Validating PGD populate\n");
Anshuman Khandual399145f2020-06-04 16:47:15 -0700591 /*
592 * This entry points to next level page table page.
593 * Hence this must not qualify as pgd_bad().
594 */
Gavin Shan2f87f8c2021-09-02 14:52:48 -0700595 p4d_clear(args->p4dp);
596 pgd_clear(args->pgdp);
597 pgd_populate(args->mm, args->pgdp, args->start_p4dp);
598 pgd = READ_ONCE(*args->pgdp);
Anshuman Khandual399145f2020-06-04 16:47:15 -0700599 WARN_ON(pgd_bad(pgd));
600}
601#else /* !__PAGETABLE_P4D_FOLDED */
Gavin Shan2f87f8c2021-09-02 14:52:48 -0700602static void __init p4d_clear_tests(struct pgtable_debug_args *args) { }
603static void __init pgd_clear_tests(struct pgtable_debug_args *args) { }
604static void __init p4d_populate_tests(struct pgtable_debug_args *args) { }
605static void __init pgd_populate_tests(struct pgtable_debug_args *args) { }
Anshuman Khandual399145f2020-06-04 16:47:15 -0700606#endif /* PAGETABLE_P4D_FOLDED */
607
Gavin Shan44966c42021-09-02 14:52:38 -0700608static void __init pte_clear_tests(struct pgtable_debug_args *args)
Anshuman Khandual399145f2020-06-04 16:47:15 -0700609{
Gavin Shan8c5b3a82021-09-02 14:52:54 -0700610 struct page *page;
Gavin Shan44966c42021-09-02 14:52:38 -0700611 pte_t pte = pfn_pte(args->pte_pfn, args->page_prot);
612
Gavin Shan8c5b3a82021-09-02 14:52:54 -0700613 page = (args->pte_pfn != ULONG_MAX) ? pfn_to_page(args->pte_pfn) : NULL;
614 if (!page)
Gavin Shan44966c42021-09-02 14:52:38 -0700615 return;
Anshuman Khandual399145f2020-06-04 16:47:15 -0700616
Gavin Shan8c5b3a82021-09-02 14:52:54 -0700617 /*
618 * flush_dcache_page() is called after set_pte_at() to clear
619 * PG_arch_1 for the page on ARM64. The page flag isn't cleared
620 * when it's released and page allocation check will fail when
621 * the page is allocated again. For architectures other than ARM64,
622 * the unexpected overhead of cache flushing is acceptable.
623 */
Anshuman Khandual6315df42020-08-06 23:19:25 -0700624 pr_debug("Validating PTE clear\n");
Hugh Dickins9f2bad02023-06-08 18:27:52 -0700625 if (WARN_ON(!args->ptep))
626 return;
627
Aneesh Kumar K.V401035d2020-10-15 20:05:06 -0700628#ifndef CONFIG_RISCV
Anshuman Khandual399145f2020-06-04 16:47:15 -0700629 pte = __pte(pte_val(pte) | RANDOM_ORVALUE);
Aneesh Kumar K.V401035d2020-10-15 20:05:06 -0700630#endif
Gavin Shan44966c42021-09-02 14:52:38 -0700631 set_pte_at(args->mm, args->vaddr, args->ptep, pte);
Gavin Shan8c5b3a82021-09-02 14:52:54 -0700632 flush_dcache_page(page);
Anshuman Khandual399145f2020-06-04 16:47:15 -0700633 barrier();
Pasha Tatashin08d5b292022-01-14 14:06:33 -0800634 ptep_clear(args->mm, args->vaddr, args->ptep);
Gavin Shan44966c42021-09-02 14:52:38 -0700635 pte = ptep_get(args->ptep);
Anshuman Khandual399145f2020-06-04 16:47:15 -0700636 WARN_ON(!pte_none(pte));
637}
638
Gavin Shanc0fe07b2021-09-02 14:52:41 -0700639static void __init pmd_clear_tests(struct pgtable_debug_args *args)
Anshuman Khandual399145f2020-06-04 16:47:15 -0700640{
Gavin Shanc0fe07b2021-09-02 14:52:41 -0700641 pmd_t pmd = READ_ONCE(*args->pmdp);
Anshuman Khandual399145f2020-06-04 16:47:15 -0700642
Anshuman Khandual6315df42020-08-06 23:19:25 -0700643 pr_debug("Validating PMD clear\n");
Anshuman Khandual399145f2020-06-04 16:47:15 -0700644 pmd = __pmd(pmd_val(pmd) | RANDOM_ORVALUE);
Gavin Shanc0fe07b2021-09-02 14:52:41 -0700645 WRITE_ONCE(*args->pmdp, pmd);
646 pmd_clear(args->pmdp);
647 pmd = READ_ONCE(*args->pmdp);
Anshuman Khandual399145f2020-06-04 16:47:15 -0700648 WARN_ON(!pmd_none(pmd));
649}
650
Gavin Shanc0fe07b2021-09-02 14:52:41 -0700651static void __init pmd_populate_tests(struct pgtable_debug_args *args)
Anshuman Khandual399145f2020-06-04 16:47:15 -0700652{
653 pmd_t pmd;
654
Anshuman Khandual6315df42020-08-06 23:19:25 -0700655 pr_debug("Validating PMD populate\n");
Anshuman Khandual399145f2020-06-04 16:47:15 -0700656 /*
657 * This entry points to next level page table page.
658 * Hence this must not qualify as pmd_bad().
659 */
Gavin Shanc0fe07b2021-09-02 14:52:41 -0700660 pmd_populate(args->mm, args->pmdp, args->start_ptep);
661 pmd = READ_ONCE(*args->pmdp);
Anshuman Khandual399145f2020-06-04 16:47:15 -0700662 WARN_ON(pmd_bad(pmd));
663}
664
Gavin Shan8cb183f2021-09-02 14:52:28 -0700665static void __init pte_special_tests(struct pgtable_debug_args *args)
Anshuman Khandual05289402020-08-06 23:19:16 -0700666{
Gavin Shan8cb183f2021-09-02 14:52:28 -0700667 pte_t pte = pfn_pte(args->fixed_pte_pfn, args->page_prot);
Anshuman Khandual05289402020-08-06 23:19:16 -0700668
669 if (!IS_ENABLED(CONFIG_ARCH_HAS_PTE_SPECIAL))
670 return;
671
Anshuman Khandual6315df42020-08-06 23:19:25 -0700672 pr_debug("Validating PTE special\n");
Anshuman Khandual05289402020-08-06 23:19:16 -0700673 WARN_ON(!pte_special(pte_mkspecial(pte)));
674}
675
Gavin Shan8cb183f2021-09-02 14:52:28 -0700676static void __init pte_protnone_tests(struct pgtable_debug_args *args)
Anshuman Khandual05289402020-08-06 23:19:16 -0700677{
Gavin Shan8cb183f2021-09-02 14:52:28 -0700678 pte_t pte = pfn_pte(args->fixed_pte_pfn, args->page_prot_none);
Anshuman Khandual05289402020-08-06 23:19:16 -0700679
680 if (!IS_ENABLED(CONFIG_NUMA_BALANCING))
681 return;
682
Anshuman Khandual6315df42020-08-06 23:19:25 -0700683 pr_debug("Validating PTE protnone\n");
Anshuman Khandual05289402020-08-06 23:19:16 -0700684 WARN_ON(!pte_protnone(pte));
685 WARN_ON(!pte_present(pte));
686}
687
688#ifdef CONFIG_TRANSPARENT_HUGEPAGE
Gavin Shan8cb183f2021-09-02 14:52:28 -0700689static void __init pmd_protnone_tests(struct pgtable_debug_args *args)
Anshuman Khandual05289402020-08-06 23:19:16 -0700690{
Anshuman Khandual65ac1a62021-06-28 19:35:10 -0700691 pmd_t pmd;
Anshuman Khandual05289402020-08-06 23:19:16 -0700692
693 if (!IS_ENABLED(CONFIG_NUMA_BALANCING))
694 return;
695
Anshuman Khandual65ac1a62021-06-28 19:35:10 -0700696 if (!has_transparent_hugepage())
697 return;
698
Anshuman Khandual6315df42020-08-06 23:19:25 -0700699 pr_debug("Validating PMD protnone\n");
Gavin Shan8cb183f2021-09-02 14:52:28 -0700700 pmd = pmd_mkhuge(pfn_pmd(args->fixed_pmd_pfn, args->page_prot_none));
Anshuman Khandual05289402020-08-06 23:19:16 -0700701 WARN_ON(!pmd_protnone(pmd));
702 WARN_ON(!pmd_present(pmd));
703}
704#else /* !CONFIG_TRANSPARENT_HUGEPAGE */
Gavin Shan8cb183f2021-09-02 14:52:28 -0700705static void __init pmd_protnone_tests(struct pgtable_debug_args *args) { }
Anshuman Khandual05289402020-08-06 23:19:16 -0700706#endif /* CONFIG_TRANSPARENT_HUGEPAGE */
707
708#ifdef CONFIG_ARCH_HAS_PTE_DEVMAP
Gavin Shan8cb183f2021-09-02 14:52:28 -0700709static void __init pte_devmap_tests(struct pgtable_debug_args *args)
Anshuman Khandual05289402020-08-06 23:19:16 -0700710{
Gavin Shan8cb183f2021-09-02 14:52:28 -0700711 pte_t pte = pfn_pte(args->fixed_pte_pfn, args->page_prot);
Anshuman Khandual05289402020-08-06 23:19:16 -0700712
Anshuman Khandual6315df42020-08-06 23:19:25 -0700713 pr_debug("Validating PTE devmap\n");
Anshuman Khandual05289402020-08-06 23:19:16 -0700714 WARN_ON(!pte_devmap(pte_mkdevmap(pte)));
715}
716
717#ifdef CONFIG_TRANSPARENT_HUGEPAGE
Gavin Shan8cb183f2021-09-02 14:52:28 -0700718static void __init pmd_devmap_tests(struct pgtable_debug_args *args)
Anshuman Khandual05289402020-08-06 23:19:16 -0700719{
Anshuman Khandual65ac1a62021-06-28 19:35:10 -0700720 pmd_t pmd;
721
722 if (!has_transparent_hugepage())
723 return;
Anshuman Khandual05289402020-08-06 23:19:16 -0700724
Anshuman Khandual6315df42020-08-06 23:19:25 -0700725 pr_debug("Validating PMD devmap\n");
Gavin Shan8cb183f2021-09-02 14:52:28 -0700726 pmd = pfn_pmd(args->fixed_pmd_pfn, args->page_prot);
Anshuman Khandual05289402020-08-06 23:19:16 -0700727 WARN_ON(!pmd_devmap(pmd_mkdevmap(pmd)));
728}
729
730#ifdef CONFIG_HAVE_ARCH_TRANSPARENT_HUGEPAGE_PUD
Gavin Shan8cb183f2021-09-02 14:52:28 -0700731static void __init pud_devmap_tests(struct pgtable_debug_args *args)
Anshuman Khandual05289402020-08-06 23:19:16 -0700732{
Anshuman Khandual65ac1a62021-06-28 19:35:10 -0700733 pud_t pud;
734
Aneesh Kumar K.V348ad162023-07-25 00:37:47 +0530735 if (!has_transparent_pud_hugepage())
Anshuman Khandual65ac1a62021-06-28 19:35:10 -0700736 return;
Anshuman Khandual05289402020-08-06 23:19:16 -0700737
Anshuman Khandual6315df42020-08-06 23:19:25 -0700738 pr_debug("Validating PUD devmap\n");
Gavin Shan8cb183f2021-09-02 14:52:28 -0700739 pud = pfn_pud(args->fixed_pud_pfn, args->page_prot);
Anshuman Khandual05289402020-08-06 23:19:16 -0700740 WARN_ON(!pud_devmap(pud_mkdevmap(pud)));
741}
742#else /* !CONFIG_HAVE_ARCH_TRANSPARENT_HUGEPAGE_PUD */
Gavin Shan8cb183f2021-09-02 14:52:28 -0700743static void __init pud_devmap_tests(struct pgtable_debug_args *args) { }
Anshuman Khandual05289402020-08-06 23:19:16 -0700744#endif /* CONFIG_HAVE_ARCH_TRANSPARENT_HUGEPAGE_PUD */
745#else /* CONFIG_TRANSPARENT_HUGEPAGE */
Gavin Shan8cb183f2021-09-02 14:52:28 -0700746static void __init pmd_devmap_tests(struct pgtable_debug_args *args) { }
747static void __init pud_devmap_tests(struct pgtable_debug_args *args) { }
Anshuman Khandual05289402020-08-06 23:19:16 -0700748#endif /* CONFIG_TRANSPARENT_HUGEPAGE */
749#else
Gavin Shan8cb183f2021-09-02 14:52:28 -0700750static void __init pte_devmap_tests(struct pgtable_debug_args *args) { }
751static void __init pmd_devmap_tests(struct pgtable_debug_args *args) { }
752static void __init pud_devmap_tests(struct pgtable_debug_args *args) { }
Anshuman Khandual05289402020-08-06 23:19:16 -0700753#endif /* CONFIG_ARCH_HAS_PTE_DEVMAP */
754
Gavin Shan5f447e82021-09-02 14:52:32 -0700755static void __init pte_soft_dirty_tests(struct pgtable_debug_args *args)
Anshuman Khandual05289402020-08-06 23:19:16 -0700756{
Gavin Shan5f447e82021-09-02 14:52:32 -0700757 pte_t pte = pfn_pte(args->fixed_pte_pfn, args->page_prot);
Anshuman Khandual05289402020-08-06 23:19:16 -0700758
759 if (!IS_ENABLED(CONFIG_MEM_SOFT_DIRTY))
760 return;
761
Anshuman Khandual6315df42020-08-06 23:19:25 -0700762 pr_debug("Validating PTE soft dirty\n");
Anshuman Khandual05289402020-08-06 23:19:16 -0700763 WARN_ON(!pte_soft_dirty(pte_mksoft_dirty(pte)));
764 WARN_ON(pte_soft_dirty(pte_clear_soft_dirty(pte)));
765}
766
Gavin Shan5f447e82021-09-02 14:52:32 -0700767static void __init pte_swap_soft_dirty_tests(struct pgtable_debug_args *args)
Anshuman Khandual05289402020-08-06 23:19:16 -0700768{
Gavin Shan5f447e82021-09-02 14:52:32 -0700769 pte_t pte = pfn_pte(args->fixed_pte_pfn, args->page_prot);
Anshuman Khandual05289402020-08-06 23:19:16 -0700770
771 if (!IS_ENABLED(CONFIG_MEM_SOFT_DIRTY))
772 return;
773
Anshuman Khandual6315df42020-08-06 23:19:25 -0700774 pr_debug("Validating PTE swap soft dirty\n");
Anshuman Khandual05289402020-08-06 23:19:16 -0700775 WARN_ON(!pte_swp_soft_dirty(pte_swp_mksoft_dirty(pte)));
776 WARN_ON(pte_swp_soft_dirty(pte_swp_clear_soft_dirty(pte)));
777}
778
779#ifdef CONFIG_TRANSPARENT_HUGEPAGE
Gavin Shan5f447e82021-09-02 14:52:32 -0700780static void __init pmd_soft_dirty_tests(struct pgtable_debug_args *args)
Anshuman Khandual05289402020-08-06 23:19:16 -0700781{
Anshuman Khandual65ac1a62021-06-28 19:35:10 -0700782 pmd_t pmd;
Anshuman Khandual05289402020-08-06 23:19:16 -0700783
784 if (!IS_ENABLED(CONFIG_MEM_SOFT_DIRTY))
785 return;
786
Anshuman Khandual65ac1a62021-06-28 19:35:10 -0700787 if (!has_transparent_hugepage())
788 return;
789
Anshuman Khandual6315df42020-08-06 23:19:25 -0700790 pr_debug("Validating PMD soft dirty\n");
Gavin Shan5f447e82021-09-02 14:52:32 -0700791 pmd = pfn_pmd(args->fixed_pmd_pfn, args->page_prot);
Anshuman Khandual05289402020-08-06 23:19:16 -0700792 WARN_ON(!pmd_soft_dirty(pmd_mksoft_dirty(pmd)));
793 WARN_ON(pmd_soft_dirty(pmd_clear_soft_dirty(pmd)));
794}
795
Gavin Shan5f447e82021-09-02 14:52:32 -0700796static void __init pmd_swap_soft_dirty_tests(struct pgtable_debug_args *args)
Anshuman Khandual05289402020-08-06 23:19:16 -0700797{
Anshuman Khandual65ac1a62021-06-28 19:35:10 -0700798 pmd_t pmd;
Anshuman Khandual05289402020-08-06 23:19:16 -0700799
800 if (!IS_ENABLED(CONFIG_MEM_SOFT_DIRTY) ||
801 !IS_ENABLED(CONFIG_ARCH_ENABLE_THP_MIGRATION))
802 return;
803
Anshuman Khandual65ac1a62021-06-28 19:35:10 -0700804 if (!has_transparent_hugepage())
805 return;
806
Anshuman Khandual6315df42020-08-06 23:19:25 -0700807 pr_debug("Validating PMD swap soft dirty\n");
Gavin Shan5f447e82021-09-02 14:52:32 -0700808 pmd = pfn_pmd(args->fixed_pmd_pfn, args->page_prot);
Anshuman Khandual05289402020-08-06 23:19:16 -0700809 WARN_ON(!pmd_swp_soft_dirty(pmd_swp_mksoft_dirty(pmd)));
810 WARN_ON(pmd_swp_soft_dirty(pmd_swp_clear_soft_dirty(pmd)));
811}
Shixin Liub593b902021-06-30 18:47:40 -0700812#else /* !CONFIG_TRANSPARENT_HUGEPAGE */
Gavin Shan5f447e82021-09-02 14:52:32 -0700813static void __init pmd_soft_dirty_tests(struct pgtable_debug_args *args) { }
814static void __init pmd_swap_soft_dirty_tests(struct pgtable_debug_args *args) { }
Shixin Liub593b902021-06-30 18:47:40 -0700815#endif /* CONFIG_TRANSPARENT_HUGEPAGE */
Anshuman Khandual05289402020-08-06 23:19:16 -0700816
David Hildenbrand210d1e82022-05-09 18:20:45 -0700817static void __init pte_swap_exclusive_tests(struct pgtable_debug_args *args)
818{
David Hildenbrand2321ba32023-01-13 18:10:01 +0100819 unsigned long max_swap_offset;
820 swp_entry_t entry, entry2;
821 pte_t pte;
David Hildenbrand210d1e82022-05-09 18:20:45 -0700822
823 pr_debug("Validating PTE swap exclusive\n");
David Hildenbrand2321ba32023-01-13 18:10:01 +0100824
825 /* See generic_max_swapfile_size(): probe the maximum offset */
826 max_swap_offset = swp_offset(pte_to_swp_entry(swp_entry_to_pte(swp_entry(0, ~0UL))));
827
828 /* Create a swp entry with all possible bits set */
829 entry = swp_entry((1 << MAX_SWAPFILES_SHIFT) - 1, max_swap_offset);
830
831 pte = swp_entry_to_pte(entry);
832 WARN_ON(pte_swp_exclusive(pte));
833 WARN_ON(!is_swap_pte(pte));
834 entry2 = pte_to_swp_entry(pte);
835 WARN_ON(memcmp(&entry, &entry2, sizeof(entry)));
836
David Hildenbrand210d1e82022-05-09 18:20:45 -0700837 pte = pte_swp_mkexclusive(pte);
838 WARN_ON(!pte_swp_exclusive(pte));
David Hildenbrand2321ba32023-01-13 18:10:01 +0100839 WARN_ON(!is_swap_pte(pte));
840 WARN_ON(pte_swp_soft_dirty(pte));
841 entry2 = pte_to_swp_entry(pte);
842 WARN_ON(memcmp(&entry, &entry2, sizeof(entry)));
843
David Hildenbrand210d1e82022-05-09 18:20:45 -0700844 pte = pte_swp_clear_exclusive(pte);
845 WARN_ON(pte_swp_exclusive(pte));
David Hildenbrand2321ba32023-01-13 18:10:01 +0100846 WARN_ON(!is_swap_pte(pte));
847 entry2 = pte_to_swp_entry(pte);
848 WARN_ON(memcmp(&entry, &entry2, sizeof(entry)));
David Hildenbrand210d1e82022-05-09 18:20:45 -0700849}
850
Gavin Shan5f447e82021-09-02 14:52:32 -0700851static void __init pte_swap_tests(struct pgtable_debug_args *args)
Anshuman Khandual05289402020-08-06 23:19:16 -0700852{
853 swp_entry_t swp;
854 pte_t pte;
855
Anshuman Khandual6315df42020-08-06 23:19:25 -0700856 pr_debug("Validating PTE swap\n");
Gavin Shan5f447e82021-09-02 14:52:32 -0700857 pte = pfn_pte(args->fixed_pte_pfn, args->page_prot);
Anshuman Khandual05289402020-08-06 23:19:16 -0700858 swp = __pte_to_swp_entry(pte);
859 pte = __swp_entry_to_pte(swp);
Gavin Shan5f447e82021-09-02 14:52:32 -0700860 WARN_ON(args->fixed_pte_pfn != pte_pfn(pte));
Anshuman Khandual05289402020-08-06 23:19:16 -0700861}
862
863#ifdef CONFIG_ARCH_ENABLE_THP_MIGRATION
Gavin Shan5f447e82021-09-02 14:52:32 -0700864static void __init pmd_swap_tests(struct pgtable_debug_args *args)
Anshuman Khandual05289402020-08-06 23:19:16 -0700865{
866 swp_entry_t swp;
867 pmd_t pmd;
868
Anshuman Khandual65ac1a62021-06-28 19:35:10 -0700869 if (!has_transparent_hugepage())
870 return;
871
Anshuman Khandual6315df42020-08-06 23:19:25 -0700872 pr_debug("Validating PMD swap\n");
Gavin Shan5f447e82021-09-02 14:52:32 -0700873 pmd = pfn_pmd(args->fixed_pmd_pfn, args->page_prot);
Anshuman Khandual05289402020-08-06 23:19:16 -0700874 swp = __pmd_to_swp_entry(pmd);
875 pmd = __swp_entry_to_pmd(swp);
Gavin Shan5f447e82021-09-02 14:52:32 -0700876 WARN_ON(args->fixed_pmd_pfn != pmd_pfn(pmd));
Anshuman Khandual05289402020-08-06 23:19:16 -0700877}
878#else /* !CONFIG_ARCH_ENABLE_THP_MIGRATION */
Gavin Shan5f447e82021-09-02 14:52:32 -0700879static void __init pmd_swap_tests(struct pgtable_debug_args *args) { }
Anshuman Khandual05289402020-08-06 23:19:16 -0700880#endif /* CONFIG_ARCH_ENABLE_THP_MIGRATION */
881
Gavin Shan4878a882021-09-02 14:52:35 -0700882static void __init swap_migration_tests(struct pgtable_debug_args *args)
Anshuman Khandual05289402020-08-06 23:19:16 -0700883{
884 struct page *page;
885 swp_entry_t swp;
886
887 if (!IS_ENABLED(CONFIG_MIGRATION))
888 return;
Anshuman Khandual6315df42020-08-06 23:19:25 -0700889
Anshuman Khandual05289402020-08-06 23:19:16 -0700890 /*
891 * swap_migration_tests() requires a dedicated page as it needs to
892 * be locked before creating a migration entry from it. Locking the
893 * page that actually maps kernel text ('start_kernel') can be real
Gavin Shan4878a882021-09-02 14:52:35 -0700894 * problematic. Lets use the allocated page explicitly for this
895 * purpose.
Anshuman Khandual05289402020-08-06 23:19:16 -0700896 */
Gavin Shan4878a882021-09-02 14:52:35 -0700897 page = (args->pte_pfn != ULONG_MAX) ? pfn_to_page(args->pte_pfn) : NULL;
898 if (!page)
Anshuman Khandual05289402020-08-06 23:19:16 -0700899 return;
Gavin Shan4878a882021-09-02 14:52:35 -0700900
901 pr_debug("Validating swap migration\n");
Anshuman Khandual05289402020-08-06 23:19:16 -0700902
903 /*
Anshuman Khandual23647612022-01-14 14:05:07 -0800904 * make_[readable|writable]_migration_entry() expects given page to
905 * be locked, otherwise it stumbles upon a BUG_ON().
Anshuman Khandual05289402020-08-06 23:19:16 -0700906 */
907 __SetPageLocked(page);
Alistair Popple4dd845b2021-06-30 18:54:09 -0700908 swp = make_writable_migration_entry(page_to_pfn(page));
Anshuman Khandual05289402020-08-06 23:19:16 -0700909 WARN_ON(!is_migration_entry(swp));
Alistair Popple4dd845b2021-06-30 18:54:09 -0700910 WARN_ON(!is_writable_migration_entry(swp));
Anshuman Khandual05289402020-08-06 23:19:16 -0700911
Alistair Popple4dd845b2021-06-30 18:54:09 -0700912 swp = make_readable_migration_entry(swp_offset(swp));
Anshuman Khandual05289402020-08-06 23:19:16 -0700913 WARN_ON(!is_migration_entry(swp));
Alistair Popple4dd845b2021-06-30 18:54:09 -0700914 WARN_ON(is_writable_migration_entry(swp));
Anshuman Khandual05289402020-08-06 23:19:16 -0700915
Alistair Popple4dd845b2021-06-30 18:54:09 -0700916 swp = make_readable_migration_entry(page_to_pfn(page));
Anshuman Khandual05289402020-08-06 23:19:16 -0700917 WARN_ON(!is_migration_entry(swp));
Alistair Popple4dd845b2021-06-30 18:54:09 -0700918 WARN_ON(is_writable_migration_entry(swp));
Anshuman Khandual05289402020-08-06 23:19:16 -0700919 __ClearPageLocked(page);
Anshuman Khandual05289402020-08-06 23:19:16 -0700920}
921
922#ifdef CONFIG_HUGETLB_PAGE
Gavin Shan36b77d12021-09-02 14:52:22 -0700923static void __init hugetlb_basic_tests(struct pgtable_debug_args *args)
Anshuman Khandual05289402020-08-06 23:19:16 -0700924{
925 struct page *page;
926 pte_t pte;
927
Anshuman Khandual6315df42020-08-06 23:19:25 -0700928 pr_debug("Validating HugeTLB basic\n");
Anshuman Khandual05289402020-08-06 23:19:16 -0700929 /*
930 * Accessing the page associated with the pfn is safe here,
931 * as it was previously derived from a real kernel symbol.
932 */
Gavin Shan36b77d12021-09-02 14:52:22 -0700933 page = pfn_to_page(args->fixed_pmd_pfn);
934 pte = mk_huge_pte(page, args->page_prot);
Anshuman Khandual05289402020-08-06 23:19:16 -0700935
936 WARN_ON(!huge_pte_dirty(huge_pte_mkdirty(pte)));
937 WARN_ON(!huge_pte_write(huge_pte_mkwrite(huge_pte_wrprotect(pte))));
938 WARN_ON(huge_pte_write(huge_pte_wrprotect(huge_pte_mkwrite(pte))));
939
940#ifdef CONFIG_ARCH_WANT_GENERAL_HUGETLB
Gavin Shan36b77d12021-09-02 14:52:22 -0700941 pte = pfn_pte(args->fixed_pmd_pfn, args->page_prot);
Anshuman Khandual05289402020-08-06 23:19:16 -0700942
Anshuman Khandual9dabf6e2023-03-02 17:18:45 +0530943 WARN_ON(!pte_huge(arch_make_huge_pte(pte, PMD_SHIFT, VM_ACCESS_FLAGS)));
Anshuman Khandual05289402020-08-06 23:19:16 -0700944#endif /* CONFIG_ARCH_WANT_GENERAL_HUGETLB */
945}
946#else /* !CONFIG_HUGETLB_PAGE */
Gavin Shan36b77d12021-09-02 14:52:22 -0700947static void __init hugetlb_basic_tests(struct pgtable_debug_args *args) { }
Anshuman Khandual05289402020-08-06 23:19:16 -0700948#endif /* CONFIG_HUGETLB_PAGE */
949
950#ifdef CONFIG_TRANSPARENT_HUGEPAGE
Gavin Shan4878a882021-09-02 14:52:35 -0700951static void __init pmd_thp_tests(struct pgtable_debug_args *args)
Anshuman Khandual05289402020-08-06 23:19:16 -0700952{
953 pmd_t pmd;
954
955 if (!has_transparent_hugepage())
956 return;
957
Anshuman Khandual6315df42020-08-06 23:19:25 -0700958 pr_debug("Validating PMD based THP\n");
Anshuman Khandual05289402020-08-06 23:19:16 -0700959 /*
960 * pmd_trans_huge() and pmd_present() must return positive after
961 * MMU invalidation with pmd_mkinvalid(). This behavior is an
962 * optimization for transparent huge page. pmd_trans_huge() must
963 * be true if pmd_page() returns a valid THP to avoid taking the
964 * pmd_lock when others walk over non transhuge pmds (i.e. there
965 * are no THP allocated). Especially when splitting a THP and
966 * removing the present bit from the pmd, pmd_trans_huge() still
967 * needs to return true. pmd_present() should be true whenever
968 * pmd_trans_huge() returns true.
969 */
Gavin Shan4878a882021-09-02 14:52:35 -0700970 pmd = pfn_pmd(args->fixed_pmd_pfn, args->page_prot);
Anshuman Khandual05289402020-08-06 23:19:16 -0700971 WARN_ON(!pmd_trans_huge(pmd_mkhuge(pmd)));
972
973#ifndef __HAVE_ARCH_PMDP_INVALIDATE
974 WARN_ON(!pmd_trans_huge(pmd_mkinvalid(pmd_mkhuge(pmd))));
975 WARN_ON(!pmd_present(pmd_mkinvalid(pmd_mkhuge(pmd))));
976#endif /* __HAVE_ARCH_PMDP_INVALIDATE */
977}
978
979#ifdef CONFIG_HAVE_ARCH_TRANSPARENT_HUGEPAGE_PUD
Gavin Shan4878a882021-09-02 14:52:35 -0700980static void __init pud_thp_tests(struct pgtable_debug_args *args)
Anshuman Khandual05289402020-08-06 23:19:16 -0700981{
982 pud_t pud;
983
Aneesh Kumar K.V348ad162023-07-25 00:37:47 +0530984 if (!has_transparent_pud_hugepage())
Anshuman Khandual05289402020-08-06 23:19:16 -0700985 return;
986
Anshuman Khandual6315df42020-08-06 23:19:25 -0700987 pr_debug("Validating PUD based THP\n");
Gavin Shan4878a882021-09-02 14:52:35 -0700988 pud = pfn_pud(args->fixed_pud_pfn, args->page_prot);
Anshuman Khandual05289402020-08-06 23:19:16 -0700989 WARN_ON(!pud_trans_huge(pud_mkhuge(pud)));
990
991 /*
992 * pud_mkinvalid() has been dropped for now. Enable back
993 * these tests when it comes back with a modified pud_present().
994 *
995 * WARN_ON(!pud_trans_huge(pud_mkinvalid(pud_mkhuge(pud))));
996 * WARN_ON(!pud_present(pud_mkinvalid(pud_mkhuge(pud))));
997 */
998}
999#else /* !CONFIG_HAVE_ARCH_TRANSPARENT_HUGEPAGE_PUD */
Gavin Shan4878a882021-09-02 14:52:35 -07001000static void __init pud_thp_tests(struct pgtable_debug_args *args) { }
Anshuman Khandual05289402020-08-06 23:19:16 -07001001#endif /* CONFIG_HAVE_ARCH_TRANSPARENT_HUGEPAGE_PUD */
1002#else /* !CONFIG_TRANSPARENT_HUGEPAGE */
Gavin Shan4878a882021-09-02 14:52:35 -07001003static void __init pmd_thp_tests(struct pgtable_debug_args *args) { }
1004static void __init pud_thp_tests(struct pgtable_debug_args *args) { }
Anshuman Khandual05289402020-08-06 23:19:16 -07001005#endif /* CONFIG_TRANSPARENT_HUGEPAGE */
1006
Anshuman Khandual399145f2020-06-04 16:47:15 -07001007static unsigned long __init get_random_vaddr(void)
1008{
1009 unsigned long random_vaddr, random_pages, total_user_pages;
1010
1011 total_user_pages = (TASK_SIZE - FIRST_USER_ADDRESS) / PAGE_SIZE;
1012
1013 random_pages = get_random_long() % total_user_pages;
1014 random_vaddr = FIRST_USER_ADDRESS + random_pages * PAGE_SIZE;
1015
1016 return random_vaddr;
1017}
1018
Gavin Shan3c9b84f2021-09-02 14:52:19 -07001019static void __init destroy_args(struct pgtable_debug_args *args)
1020{
1021 struct page *page = NULL;
1022
1023 /* Free (huge) page */
1024 if (IS_ENABLED(CONFIG_TRANSPARENT_HUGEPAGE) &&
Aneesh Kumar K.V348ad162023-07-25 00:37:47 +05301025 has_transparent_pud_hugepage() &&
Gavin Shan3c9b84f2021-09-02 14:52:19 -07001026 args->pud_pfn != ULONG_MAX) {
1027 if (args->is_contiguous_page) {
1028 free_contig_range(args->pud_pfn,
1029 (1 << (HPAGE_PUD_SHIFT - PAGE_SHIFT)));
1030 } else {
1031 page = pfn_to_page(args->pud_pfn);
1032 __free_pages(page, HPAGE_PUD_SHIFT - PAGE_SHIFT);
1033 }
1034
1035 args->pud_pfn = ULONG_MAX;
1036 args->pmd_pfn = ULONG_MAX;
1037 args->pte_pfn = ULONG_MAX;
1038 }
1039
1040 if (IS_ENABLED(CONFIG_TRANSPARENT_HUGEPAGE) &&
1041 has_transparent_hugepage() &&
1042 args->pmd_pfn != ULONG_MAX) {
1043 if (args->is_contiguous_page) {
1044 free_contig_range(args->pmd_pfn, (1 << HPAGE_PMD_ORDER));
1045 } else {
1046 page = pfn_to_page(args->pmd_pfn);
1047 __free_pages(page, HPAGE_PMD_ORDER);
1048 }
1049
1050 args->pmd_pfn = ULONG_MAX;
1051 args->pte_pfn = ULONG_MAX;
1052 }
1053
1054 if (args->pte_pfn != ULONG_MAX) {
1055 page = pfn_to_page(args->pte_pfn);
Lorenzo Stoakesdcc1be12023-03-13 12:27:14 +00001056 __free_page(page);
Gavin Shan3c9b84f2021-09-02 14:52:19 -07001057
1058 args->pte_pfn = ULONG_MAX;
1059 }
1060
1061 /* Free page table entries */
1062 if (args->start_ptep) {
1063 pte_free(args->mm, args->start_ptep);
1064 mm_dec_nr_ptes(args->mm);
1065 }
1066
1067 if (args->start_pmdp) {
1068 pmd_free(args->mm, args->start_pmdp);
1069 mm_dec_nr_pmds(args->mm);
1070 }
1071
1072 if (args->start_pudp) {
1073 pud_free(args->mm, args->start_pudp);
1074 mm_dec_nr_puds(args->mm);
1075 }
1076
1077 if (args->start_p4dp)
1078 p4d_free(args->mm, args->start_p4dp);
1079
1080 /* Free vma and mm struct */
1081 if (args->vma)
1082 vm_area_free(args->vma);
1083
1084 if (args->mm)
1085 mmdrop(args->mm);
1086}
1087
1088static struct page * __init
1089debug_vm_pgtable_alloc_huge_page(struct pgtable_debug_args *args, int order)
1090{
1091 struct page *page = NULL;
1092
1093#ifdef CONFIG_CONTIG_ALLOC
Kirill A. Shutemov23baf832023-03-15 14:31:33 +03001094 if (order > MAX_ORDER) {
Gavin Shan3c9b84f2021-09-02 14:52:19 -07001095 page = alloc_contig_pages((1 << order), GFP_KERNEL,
1096 first_online_node, NULL);
1097 if (page) {
1098 args->is_contiguous_page = true;
1099 return page;
1100 }
1101 }
1102#endif
1103
Kirill A. Shutemov23baf832023-03-15 14:31:33 +03001104 if (order <= MAX_ORDER)
Gavin Shan3c9b84f2021-09-02 14:52:19 -07001105 page = alloc_pages(GFP_KERNEL, order);
1106
1107 return page;
1108}
1109
Frank van der Lindenc4876ff2023-01-09 17:43:32 +00001110/*
1111 * Check if a physical memory range described by <pstart, pend> contains
1112 * an area that is of size psize, and aligned to psize.
1113 *
1114 * Don't use address 0, an all-zeroes physical address might mask bugs, and
1115 * it's not used on x86.
1116 */
1117static void __init phys_align_check(phys_addr_t pstart,
1118 phys_addr_t pend, unsigned long psize,
1119 phys_addr_t *physp, unsigned long *alignp)
1120{
1121 phys_addr_t aligned_start, aligned_end;
1122
1123 if (pstart == 0)
1124 pstart = PAGE_SIZE;
1125
1126 aligned_start = ALIGN(pstart, psize);
1127 aligned_end = aligned_start + psize;
1128
1129 if (aligned_end > aligned_start && aligned_end <= pend) {
1130 *alignp = psize;
1131 *physp = aligned_start;
1132 }
1133}
1134
1135static void __init init_fixed_pfns(struct pgtable_debug_args *args)
1136{
1137 u64 idx;
1138 phys_addr_t phys, pstart, pend;
1139
1140 /*
1141 * Initialize the fixed pfns. To do this, try to find a
1142 * valid physical range, preferably aligned to PUD_SIZE,
1143 * but settling for aligned to PMD_SIZE as a fallback. If
1144 * neither of those is found, use the physical address of
1145 * the start_kernel symbol.
1146 *
1147 * The memory doesn't need to be allocated, it just needs to exist
1148 * as usable memory. It won't be touched.
1149 *
1150 * The alignment is recorded, and can be checked to see if we
1151 * can run the tests that require an actual valid physical
1152 * address range on some architectures ({pmd,pud}_huge_test
1153 * on x86).
1154 */
1155
1156 phys = __pa_symbol(&start_kernel);
1157 args->fixed_alignment = PAGE_SIZE;
1158
1159 for_each_mem_range(idx, &pstart, &pend) {
1160 /* First check for a PUD-aligned area */
1161 phys_align_check(pstart, pend, PUD_SIZE, &phys,
1162 &args->fixed_alignment);
1163
1164 /* If a PUD-aligned area is found, we're done */
1165 if (args->fixed_alignment == PUD_SIZE)
1166 break;
1167
1168 /*
1169 * If no PMD-aligned area found yet, check for one,
1170 * but continue the loop to look for a PUD-aligned area.
1171 */
1172 if (args->fixed_alignment < PMD_SIZE)
1173 phys_align_check(pstart, pend, PMD_SIZE, &phys,
1174 &args->fixed_alignment);
1175 }
1176
1177 args->fixed_pgd_pfn = __phys_to_pfn(phys & PGDIR_MASK);
1178 args->fixed_p4d_pfn = __phys_to_pfn(phys & P4D_MASK);
1179 args->fixed_pud_pfn = __phys_to_pfn(phys & PUD_MASK);
1180 args->fixed_pmd_pfn = __phys_to_pfn(phys & PMD_MASK);
1181 args->fixed_pte_pfn = __phys_to_pfn(phys & PAGE_MASK);
1182 WARN_ON(!pfn_valid(args->fixed_pte_pfn));
1183}
1184
1185
Gavin Shan3c9b84f2021-09-02 14:52:19 -07001186static int __init init_args(struct pgtable_debug_args *args)
1187{
1188 struct page *page = NULL;
Gavin Shan3c9b84f2021-09-02 14:52:19 -07001189 int ret = 0;
1190
1191 /*
1192 * Initialize the debugging data.
1193 *
Anshuman Khandual31d17072022-04-28 23:16:12 -07001194 * vm_get_page_prot(VM_NONE) or vm_get_page_prot(VM_SHARED|VM_NONE)
1195 * will help create page table entries with PROT_NONE permission as
1196 * required for pxx_protnone_tests().
Gavin Shan3c9b84f2021-09-02 14:52:19 -07001197 */
1198 memset(args, 0, sizeof(*args));
1199 args->vaddr = get_random_vaddr();
Kefeng Wangd7e679b2022-10-19 11:49:44 +08001200 args->page_prot = vm_get_page_prot(VM_ACCESS_FLAGS);
Anshuman Khandual31d17072022-04-28 23:16:12 -07001201 args->page_prot_none = vm_get_page_prot(VM_NONE);
Gavin Shan3c9b84f2021-09-02 14:52:19 -07001202 args->is_contiguous_page = false;
1203 args->pud_pfn = ULONG_MAX;
1204 args->pmd_pfn = ULONG_MAX;
1205 args->pte_pfn = ULONG_MAX;
1206 args->fixed_pgd_pfn = ULONG_MAX;
1207 args->fixed_p4d_pfn = ULONG_MAX;
1208 args->fixed_pud_pfn = ULONG_MAX;
1209 args->fixed_pmd_pfn = ULONG_MAX;
1210 args->fixed_pte_pfn = ULONG_MAX;
1211
1212 /* Allocate mm and vma */
1213 args->mm = mm_alloc();
1214 if (!args->mm) {
1215 pr_err("Failed to allocate mm struct\n");
1216 ret = -ENOMEM;
1217 goto error;
1218 }
1219
1220 args->vma = vm_area_alloc(args->mm);
1221 if (!args->vma) {
1222 pr_err("Failed to allocate vma\n");
1223 ret = -ENOMEM;
1224 goto error;
1225 }
1226
1227 /*
1228 * Allocate page table entries. They will be modified in the tests.
1229 * Lets save the page table entries so that they can be released
1230 * when the tests are completed.
1231 */
1232 args->pgdp = pgd_offset(args->mm, args->vaddr);
1233 args->p4dp = p4d_alloc(args->mm, args->pgdp, args->vaddr);
1234 if (!args->p4dp) {
1235 pr_err("Failed to allocate p4d entries\n");
1236 ret = -ENOMEM;
1237 goto error;
1238 }
1239 args->start_p4dp = p4d_offset(args->pgdp, 0UL);
1240 WARN_ON(!args->start_p4dp);
1241
1242 args->pudp = pud_alloc(args->mm, args->p4dp, args->vaddr);
1243 if (!args->pudp) {
1244 pr_err("Failed to allocate pud entries\n");
1245 ret = -ENOMEM;
1246 goto error;
1247 }
1248 args->start_pudp = pud_offset(args->p4dp, 0UL);
1249 WARN_ON(!args->start_pudp);
1250
1251 args->pmdp = pmd_alloc(args->mm, args->pudp, args->vaddr);
1252 if (!args->pmdp) {
1253 pr_err("Failed to allocate pmd entries\n");
1254 ret = -ENOMEM;
1255 goto error;
1256 }
1257 args->start_pmdp = pmd_offset(args->pudp, 0UL);
1258 WARN_ON(!args->start_pmdp);
1259
1260 if (pte_alloc(args->mm, args->pmdp)) {
1261 pr_err("Failed to allocate pte entries\n");
1262 ret = -ENOMEM;
1263 goto error;
1264 }
1265 args->start_ptep = pmd_pgtable(READ_ONCE(*args->pmdp));
1266 WARN_ON(!args->start_ptep);
1267
Frank van der Lindenc4876ff2023-01-09 17:43:32 +00001268 init_fixed_pfns(args);
Gavin Shan3c9b84f2021-09-02 14:52:19 -07001269
1270 /*
1271 * Allocate (huge) pages because some of the tests need to access
1272 * the data in the pages. The corresponding tests will be skipped
1273 * if we fail to allocate (huge) pages.
1274 */
1275 if (IS_ENABLED(CONFIG_TRANSPARENT_HUGEPAGE) &&
Aneesh Kumar K.V348ad162023-07-25 00:37:47 +05301276 has_transparent_pud_hugepage()) {
Gavin Shan3c9b84f2021-09-02 14:52:19 -07001277 page = debug_vm_pgtable_alloc_huge_page(args,
1278 HPAGE_PUD_SHIFT - PAGE_SHIFT);
1279 if (page) {
1280 args->pud_pfn = page_to_pfn(page);
1281 args->pmd_pfn = args->pud_pfn;
1282 args->pte_pfn = args->pud_pfn;
1283 return 0;
1284 }
1285 }
1286
1287 if (IS_ENABLED(CONFIG_TRANSPARENT_HUGEPAGE) &&
1288 has_transparent_hugepage()) {
1289 page = debug_vm_pgtable_alloc_huge_page(args, HPAGE_PMD_ORDER);
1290 if (page) {
1291 args->pmd_pfn = page_to_pfn(page);
1292 args->pte_pfn = args->pmd_pfn;
1293 return 0;
1294 }
1295 }
1296
Lorenzo Stoakesdcc1be12023-03-13 12:27:14 +00001297 page = alloc_page(GFP_KERNEL);
Gavin Shan3c9b84f2021-09-02 14:52:19 -07001298 if (page)
1299 args->pte_pfn = page_to_pfn(page);
1300
1301 return 0;
1302
1303error:
1304 destroy_args(args);
1305 return ret;
1306}
1307
Anshuman Khandual399145f2020-06-04 16:47:15 -07001308static int __init debug_vm_pgtable(void)
1309{
Gavin Shan3c9b84f2021-09-02 14:52:19 -07001310 struct pgtable_debug_args args;
Kees Cookfea11202020-06-03 13:28:45 -07001311 spinlock_t *ptl = NULL;
Gavin Shan3c9b84f2021-09-02 14:52:19 -07001312 int idx, ret;
Anshuman Khandual399145f2020-06-04 16:47:15 -07001313
1314 pr_info("Validating architecture page table helpers\n");
Gavin Shan3c9b84f2021-09-02 14:52:19 -07001315 ret = init_args(&args);
1316 if (ret)
1317 return ret;
1318
Anshuman Khandual2e326c02021-02-24 12:01:36 -08001319 /*
Anshuman Khandual31d17072022-04-28 23:16:12 -07001320 * Iterate over each possible vm_flags to make sure that all
Anshuman Khandual2e326c02021-02-24 12:01:36 -08001321 * the basic page table transformation validations just hold
1322 * true irrespective of the starting protection value for a
1323 * given page table entry.
Anshuman Khandual31d17072022-04-28 23:16:12 -07001324 *
Muhammad Muzammilbe16dd762023-10-23 17:44:05 +05001325 * Protection based vm_flags combinations are always linear
1326 * and increasing i.e starting from VM_NONE and going up to
Anshuman Khandual31d17072022-04-28 23:16:12 -07001327 * (VM_SHARED | READ | WRITE | EXEC).
Anshuman Khandual2e326c02021-02-24 12:01:36 -08001328 */
Anshuman Khandual31d17072022-04-28 23:16:12 -07001329#define VM_FLAGS_START (VM_NONE)
1330#define VM_FLAGS_END (VM_SHARED | VM_EXEC | VM_WRITE | VM_READ)
1331
1332 for (idx = VM_FLAGS_START; idx <= VM_FLAGS_END; idx++) {
Gavin Shan36b77d12021-09-02 14:52:22 -07001333 pte_basic_tests(&args, idx);
1334 pmd_basic_tests(&args, idx);
1335 pud_basic_tests(&args, idx);
Anshuman Khandual2e326c02021-02-24 12:01:36 -08001336 }
1337
1338 /*
1339 * Both P4D and PGD level tests are very basic which do not
1340 * involve creating page table entries from the protection
1341 * value and the given pfn. Hence just keep them out from
1342 * the above iteration for now to save some test execution
1343 * time.
1344 */
Gavin Shan36b77d12021-09-02 14:52:22 -07001345 p4d_basic_tests(&args);
1346 pgd_basic_tests(&args);
Anshuman Khandual399145f2020-06-04 16:47:15 -07001347
Gavin Shan8983d232021-09-02 14:52:25 -07001348 pmd_leaf_tests(&args);
1349 pud_leaf_tests(&args);
Anshuman Khanduala5c3b9f2020-08-06 23:19:20 -07001350
Gavin Shan8cb183f2021-09-02 14:52:28 -07001351 pte_special_tests(&args);
1352 pte_protnone_tests(&args);
1353 pmd_protnone_tests(&args);
Anshuman Khandual05289402020-08-06 23:19:16 -07001354
Gavin Shan8cb183f2021-09-02 14:52:28 -07001355 pte_devmap_tests(&args);
1356 pmd_devmap_tests(&args);
1357 pud_devmap_tests(&args);
Anshuman Khandual05289402020-08-06 23:19:16 -07001358
Gavin Shan5f447e82021-09-02 14:52:32 -07001359 pte_soft_dirty_tests(&args);
1360 pmd_soft_dirty_tests(&args);
1361 pte_swap_soft_dirty_tests(&args);
1362 pmd_swap_soft_dirty_tests(&args);
Anshuman Khandual05289402020-08-06 23:19:16 -07001363
David Hildenbrand210d1e82022-05-09 18:20:45 -07001364 pte_swap_exclusive_tests(&args);
1365
Gavin Shan5f447e82021-09-02 14:52:32 -07001366 pte_swap_tests(&args);
1367 pmd_swap_tests(&args);
Anshuman Khandual05289402020-08-06 23:19:16 -07001368
Gavin Shan4878a882021-09-02 14:52:35 -07001369 swap_migration_tests(&args);
Anshuman Khandual05289402020-08-06 23:19:16 -07001370
Gavin Shan4878a882021-09-02 14:52:35 -07001371 pmd_thp_tests(&args);
1372 pud_thp_tests(&args);
Anshuman Khandual05289402020-08-06 23:19:16 -07001373
Gavin Shan36b77d12021-09-02 14:52:22 -07001374 hugetlb_basic_tests(&args);
Aneesh Kumar K.Ve8edf0a2020-10-15 20:04:49 -07001375
Aneesh Kumar K.V6f302e272020-10-15 20:04:53 -07001376 /*
1377 * Page table modifying tests. They need to hold
1378 * proper page table lock.
1379 */
Aneesh Kumar K.Ve8edf0a2020-10-15 20:04:49 -07001380
Gavin Shan44966c42021-09-02 14:52:38 -07001381 args.ptep = pte_offset_map_lock(args.mm, args.pmdp, args.vaddr, &ptl);
1382 pte_clear_tests(&args);
1383 pte_advanced_tests(&args);
Hugh Dickins9f2bad02023-06-08 18:27:52 -07001384 if (args.ptep)
1385 pte_unmap_unlock(args.ptep, ptl);
Aneesh Kumar K.Ve8edf0a2020-10-15 20:04:49 -07001386
Gavin Shanc0fe07b2021-09-02 14:52:41 -07001387 ptl = pmd_lock(args.mm, args.pmdp);
1388 pmd_clear_tests(&args);
1389 pmd_advanced_tests(&args);
1390 pmd_huge_tests(&args);
1391 pmd_populate_tests(&args);
Aneesh Kumar K.V6f302e272020-10-15 20:04:53 -07001392 spin_unlock(ptl);
1393
Gavin Shan4cbde032021-09-02 14:52:45 -07001394 ptl = pud_lock(args.mm, args.pudp);
1395 pud_clear_tests(&args);
1396 pud_advanced_tests(&args);
1397 pud_huge_tests(&args);
1398 pud_populate_tests(&args);
Aneesh Kumar K.V6f302e272020-10-15 20:04:53 -07001399 spin_unlock(ptl);
1400
Gavin Shan2f87f8c2021-09-02 14:52:48 -07001401 spin_lock(&(args.mm->page_table_lock));
1402 p4d_clear_tests(&args);
1403 pgd_clear_tests(&args);
1404 p4d_populate_tests(&args);
1405 pgd_populate_tests(&args);
1406 spin_unlock(&(args.mm->page_table_lock));
Aneesh Kumar K.Ve8edf0a2020-10-15 20:04:49 -07001407
Gavin Shan3c9b84f2021-09-02 14:52:19 -07001408 destroy_args(&args);
Anshuman Khandual399145f2020-06-04 16:47:15 -07001409 return 0;
1410}
1411late_initcall(debug_vm_pgtable);