Received: by 2002:a25:c205:0:0:0:0:0 with SMTP id s5csp952073ybf; Thu, 27 Feb 2020 02:34:57 -0800 (PST) X-Google-Smtp-Source: APXvYqx+7tzkpZAOWaJFXixH2yyNNGXMLp7c6t0n4qKVhtexKiUtXXsdFeqGyF/FXLShYdf+02ox X-Received: by 2002:a05:6808:8cd:: with SMTP id k13mr2819758oij.4.1582799697847; Thu, 27 Feb 2020 02:34:57 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1582799697; cv=none; d=google.com; s=arc-20160816; b=0egRmbb9rjdRd8chxTYX7G48mUnXq6N5oiVQjqVCXruliEMxucLq9ckJZr54RMQiJ+ zsN7HeaAYbJRZrel/Q+yyowmAaJ6fcK0rUGVDTzuY5LWZTk0R8VQaNiLQKpi40+QS9cN pm+5zfGJFNcohaU7Yo8j4V0Xdl2baIfBnUS/DeBRENOehW9wn8sdCz/ZnIqSVubKt38l 2HPT0eFCmWfOXmD6dqmBHJBP8YrKM4GUmxF4qUZnmxy5et8DmmxN6SE/USxWDITXLylZ upJNhZfkPY/dPN8jBrASQ3678clN7xGXAjbVp1hsTHcACJNfQJuYCSLjGPv7fOvBaelf asxg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:message-id:date:subject:cc:to:from; bh=XRuevsbPodi2WTenQG0zZi5zqaIfe2+MaIlRTOz5CBQ=; b=MGsGzMC4Bz0yz3eBFD9jWWMlb/MuNRnG03kaSyUbOEihHybEqVsMhCNXxYd9Zz4ktz dzRDmUrt5Asjy+SwrDTtAc1OngZfwLgUga8IWkiepC5KjB9CJhHHd3d9jo9eS4qeGkLm NidUBsAXFJXs8DY8uvPkuMm/Go+UP2u++OH4Z6NPJQhyDBU4tn+NLm60xGPoPz6VQaK9 zNJjx+aPoTq5hOJZVkYplBpm3+uy/l8JH47RvPPwVPsTwd2Jb1xH48kKojENGZhxuOTS ls4z3RAIBdeMzD6GU96cxi2vAIPwFlh8AbrhftXiT306iDQl3CF8HfL7YRzYX64/s2FQ 8kBg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id v10si1313227oth.136.2020.02.27.02.34.44; Thu, 27 Feb 2020 02:34:57 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728739AbgB0Kej (ORCPT + 99 others); Thu, 27 Feb 2020 05:34:39 -0500 Received: from foss.arm.com ([217.140.110.172]:48210 "EHLO foss.arm.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1728714AbgB0Kei (ORCPT ); Thu, 27 Feb 2020 05:34:38 -0500 Received: from usa-sjc-imap-foss1.foss.arm.com (unknown [10.121.207.14]) by usa-sjc-mx-foss1.foss.arm.com (Postfix) with ESMTP id 4971A1FB; Thu, 27 Feb 2020 02:34:37 -0800 (PST) Received: from p8cg001049571a15.arm.com (unknown [10.163.1.119]) by usa-sjc-imap-foss1.foss.arm.com (Postfix) with ESMTPA id A584B3F881; Thu, 27 Feb 2020 02:34:27 -0800 (PST) From: Anshuman Khandual To: linux-mm@kvack.org Cc: Anshuman Khandual , Andrew Morton , Mike Rapoport , Vineet Gupta , Catalin Marinas , Will Deacon , Benjamin Herrenschmidt , Paul Mackerras , Michael Ellerman , Heiko Carstens , Vasily Gorbik , Christian Borntraeger , Thomas Gleixner , Ingo Molnar , Borislav Petkov , "H. Peter Anvin" , "Kirill A . Shutemov" , Paul Walmsley , Palmer Dabbelt , linux-snps-arc@lists.infradead.org, linux-arm-kernel@lists.infradead.org, linuxppc-dev@lists.ozlabs.org, linux-s390@vger.kernel.org, linux-riscv@lists.infradead.org, x86@kernel.org, linux-arch@vger.kernel.org, linux-kernel@vger.kernel.org Subject: [PATCH] mm/debug: Add tests validating arch page table helpers for core features Date: Thu, 27 Feb 2020 16:03:57 +0530 Message-Id: <1582799637-11786-1-git-send-email-anshuman.khandual@arm.com> X-Mailer: git-send-email 2.7.4 Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org This adds new tests validating arch page table helpers for these following core memory features. These tests create and test specific mapping types at various page table levels. * SPECIAL mapping * PROTNONE mapping * DEVMAP mapping * SOFTDIRTY mapping * SWAP mapping * MIGRATION mapping * HUGETLB mapping * THP mapping Cc: Andrew Morton Cc: Mike Rapoport Cc: Vineet Gupta Cc: Catalin Marinas Cc: Will Deacon Cc: Benjamin Herrenschmidt Cc: Paul Mackerras Cc: Michael Ellerman Cc: Heiko Carstens Cc: Vasily Gorbik Cc: Christian Borntraeger Cc: Thomas Gleixner Cc: Ingo Molnar Cc: Borislav Petkov Cc: "H. Peter Anvin" Cc: Kirill A. Shutemov Cc: Paul Walmsley Cc: Palmer Dabbelt Cc: linux-snps-arc@lists.infradead.org Cc: linux-arm-kernel@lists.infradead.org Cc: linuxppc-dev@lists.ozlabs.org Cc: linux-s390@vger.kernel.org Cc: linux-riscv@lists.infradead.org Cc: x86@kernel.org Cc: linux-arch@vger.kernel.org Cc: linux-kernel@vger.kernel.org Suggested-by: Catalin Marinas Signed-off-by: Anshuman Khandual --- Tested on arm64 and x86 platforms without any test failures. But this has only been built tested on several other platforms. Individual tests need to be verified on all current enabling platforms for the test i.e s390, ppc32, arc etc. This patch must be applied on v5.6-rc3 after these patches 1. https://patchwork.kernel.org/patch/11385057/ 2. https://patchwork.kernel.org/patch/11407715/ OR This patch must be applied on linux-next (next-20200227) after this patch 2. https://patchwork.kernel.org/patch/11407715/ mm/debug_vm_pgtable.c | 310 +++++++++++++++++++++++++++++++++++++++++- 1 file changed, 309 insertions(+), 1 deletion(-) diff --git a/mm/debug_vm_pgtable.c b/mm/debug_vm_pgtable.c index 96dd7d574cef..3fb90d5b604e 100644 --- a/mm/debug_vm_pgtable.c +++ b/mm/debug_vm_pgtable.c @@ -41,6 +41,44 @@ * wrprotect(entry) = A write protected and not a write entry * pxx_bad(entry) = A mapped and non-table entry * pxx_same(entry1, entry2) = Both entries hold the exact same value + * + * Specific feature operations + * + * pte_mkspecial(entry) = Creates a special entry at PTE level + * pte_special(entry) = Tests a special entry at PTE level + * + * pte_protnone(entry) = Tests a no access entry at PTE level + * pmd_protnone(entry) = Tests a no access entry at PMD level + * + * pte_mkdevmap(entry) = Creates a device entry at PTE level + * pmd_mkdevmap(entry) = Creates a device entry at PMD level + * pud_mkdevmap(entry) = Creates a device entry at PUD level + * pte_devmap(entry) = Tests a device entry at PTE level + * pmd_devmap(entry) = Tests a device entry at PMD level + * pud_devmap(entry) = Tests a device entry at PUD level + * + * pte_mksoft_dirty(entry) = Creates a soft dirty entry at PTE level + * pmd_mksoft_dirty(entry) = Creates a soft dirty entry at PMD level + * pte_swp_mksoft_dirty(entry) = Creates a soft dirty swap entry at PTE level + * pmd_swp_mksoft_dirty(entry) = Creates a soft dirty swap entry at PMD level + * pte_soft_dirty(entry) = Tests a soft dirty entry at PTE level + * pmd_soft_dirty(entry) = Tests a soft dirty entry at PMD level + * pte_swp_soft_dirty(entry) = Tests a soft dirty swap entry at PTE level + * pmd_swp_soft_dirty(entry) = Tests a soft dirty swap entry at PMD level + * pte_clear_soft_dirty(entry) = Clears a soft dirty entry at PTE level + * pmd_clear_soft_dirty(entry) = Clears a soft dirty entry at PMD level + * pte_swp_clear_soft_dirty(entry) = Clears a soft dirty swap entry at PTE level + * pmd_swp_clear_soft_dirty(entry) = Clears a soft dirty swap entry at PMD level + * + * pte_mkhuge(entry) = Creates a HugeTLB entry at given level + * pte_huge(entry) = Tests a HugeTLB entry at given level + * + * pmd_trans_huge(entry) = Tests a trans huge page at PMD level + * pud_trans_huge(entry) = Tests a trans huge page at PUD level + * pmd_present(entry) = Tests an entry points to memory at PMD level + * pud_present(entry) = Tests an entry points to memory at PUD level + * pmd_mknotpresent(entry) = Invalidates an PMD entry for MMU + * pud_mknotpresent(entry) = Invalidates an PUD entry for MMU */ #define VMFLAGS (VM_READ|VM_WRITE|VM_EXEC) @@ -287,6 +325,233 @@ static void __init pmd_populate_tests(struct mm_struct *mm, pmd_t *pmdp, WARN_ON(pmd_bad(pmd)); } +#ifdef CONFIG_ARCH_HAS_PTE_SPECIAL +static void __init pte_special_tests(unsigned long pfn, pgprot_t prot) +{ + pte_t pte = pfn_pte(pfn, prot); + + WARN_ON(!pte_special(pte_mkspecial(pte))); +} +#else +static void __init pte_special_tests(unsigned long pfn, pgprot_t prot) { } +#endif + +#ifdef CONFIG_NUMA_BALANCING +static void __init pte_protnone_tests(unsigned long pfn, pgprot_t prot) +{ + pte_t pte = pfn_pte(pfn, prot); + + WARN_ON(!pte_protnone(pte)); + WARN_ON(!pte_present(pte)); +} + +static void __init pmd_protnone_tests(unsigned long pfn, pgprot_t prot) +{ + pmd_t pmd = pfn_pmd(pfn, prot); + + WARN_ON(!pmd_protnone(pmd)); + WARN_ON(!pmd_present(pmd)); +} +#else +static void __init pte_protnone_tests(unsigned long pfn, pgprot_t prot) { } +static void __init pmd_protnone_tests(unsigned long pfn, pgprot_t prot) { } +#endif + +#ifdef CONFIG_ARCH_HAS_PTE_DEVMAP +static void __init pte_devmap_tests(unsigned long pfn, pgprot_t prot) +{ + pte_t pte = pfn_pte(pfn, prot); + + WARN_ON(!pte_devmap(pte_mkdevmap(pte))); +} + +#ifdef CONFIG_TRANSPARENT_HUGEPAGE +static void __init pmd_devmap_tests(unsigned long pfn, pgprot_t prot) +{ + pmd_t pmd = pfn_pmd(pfn, prot); + + WARN_ON(!pmd_devmap(pmd_mkdevmap(pmd))); +} + +#ifdef CONFIG_HAVE_ARCH_TRANSPARENT_HUGEPAGE_PUD +static void __init pud_devmap_tests(unsigned long pfn, pgprot_t prot) +{ + pud_t pud = pfn_pud(pfn, prot); + + WARN_ON(!pud_devmap(pud_mkdevmap(pud))); +} +#else +static void __init pud_devmap_tests(unsigned long pfn, pgprot_t prot) { } +#endif +#else +static void __init pmd_devmap_tests(unsigned long pfn, pgprot_t prot) { } +static void __init pud_devmap_tests(unsigned long pfn, pgprot_t prot) { } +#endif +#else +static void __init pte_devmap_tests(unsigned long pfn, pgprot_t prot) { } +static void __init pmd_devmap_tests(unsigned long pfn, pgprot_t prot) { } +static void __init pud_devmap_tests(unsigned long pfn, pgprot_t prot) { } +#endif + +#ifdef CONFIG_MEM_SOFT_DIRTY +static void __init pte_soft_dirty_tests(unsigned long pfn, pgprot_t prot) +{ + pte_t pte = pfn_pte(pfn, prot); + + WARN_ON(!pte_soft_dirty(pte_mksoft_dirty(pte))); + WARN_ON(pte_soft_dirty(pte_clear_soft_dirty(pte))); +} + +static void __init pte_swap_soft_dirty_tests(unsigned long pfn, pgprot_t prot) +{ + pte_t pte = pfn_pte(pfn, prot); + + WARN_ON(!pte_swp_soft_dirty(pte_swp_mksoft_dirty(pte))); + WARN_ON(pte_swp_soft_dirty(pte_swp_clear_soft_dirty(pte))); +} + +#ifdef CONFIG_ARCH_ENABLE_THP_MIGRATION +static void __init pmd_soft_dirty_tests(unsigned long pfn, pgprot_t prot) +{ + pmd_t pmd = pfn_pmd(pfn, prot); + + WARN_ON(!pmd_soft_dirty(pmd_mksoft_dirty(pmd))); + WARN_ON(pmd_soft_dirty(pmd_clear_soft_dirty(pmd))); +} + +static void __init pmd_swap_soft_dirty_tests(unsigned long pfn, pgprot_t prot) +{ + pmd_t pmd = pfn_pmd(pfn, prot); + + WARN_ON(!pmd_swp_soft_dirty(pmd_swp_mksoft_dirty(pmd))); + WARN_ON(pmd_swp_soft_dirty(pmd_swp_clear_soft_dirty(pmd))); +} +#else +static void __init pmd_soft_dirty_tests(unsigned long pfn, pgprot_t prot) { } +static void __init pmd_swap_soft_dirty_tests(unsigned long pfn, pgprot_t prot) +{ +} +#endif +#else +static void __init pte_soft_dirty_tests(unsigned long pfn, pgprot_t prot) { } +static void __init pmd_soft_dirty_tests(unsigned long pfn, pgprot_t prot) { } +static void __init pte_swap_soft_dirty_tests(unsigned long pfn, pgprot_t prot) +{ +} +static void __init pmd_swap_soft_dirty_tests(unsigned long pfn, pgprot_t prot) +{ +} +#endif + +static void __init pte_swap_tests(unsigned long pfn, pgprot_t prot) +{ + swp_entry_t swp; + pte_t pte; + + pte = pfn_pte(pfn, prot); + swp = __pte_to_swp_entry(pte); + WARN_ON(!pte_same(pte, __swp_entry_to_pte(swp))); +} + +#ifdef CONFIG_ARCH_ENABLE_THP_MIGRATION +static void __init pmd_swap_tests(unsigned long pfn, pgprot_t prot) +{ + swp_entry_t swp; + pmd_t pmd; + + pmd = pfn_pmd(pfn, prot); + swp = __pmd_to_swp_entry(pmd); + WARN_ON(!pmd_same(pmd, __swp_entry_to_pmd(swp))); +} +#else +static void __init pmd_swap_tests(unsigned long pfn, pgprot_t prot) { } +#endif + +#ifdef CONFIG_MIGRATION +static void __init swap_migration_tests(struct page *page) +{ + swp_entry_t swp; + + /* + * make_migration_entry() expects given page to be + * locked, otherwise it stumbles upon a BUG_ON(). + */ + __SetPageLocked(page); + swp = make_migration_entry(page, 1); + WARN_ON(!is_migration_entry(swp)); + WARN_ON(!is_write_migration_entry(swp)); + + make_migration_entry_read(&swp); + WARN_ON(!is_migration_entry(swp)); + WARN_ON(is_write_migration_entry(swp)); + + swp = make_migration_entry(page, 0); + WARN_ON(!is_migration_entry(swp)); + WARN_ON(is_write_migration_entry(swp)); + __ClearPageLocked(page); +} +#else +static void __init swap_migration_tests(struct page *page) { } +#endif + +#ifdef CONFIG_HUGETLB_PAGE +static void __init hugetlb_tests(unsigned long pfn, pgprot_t prot) +{ +#ifdef CONFIG_ARCH_WANT_GENERAL_HUGETLB + pte_t pte = pfn_pte(pfn, prot); + + WARN_ON(!pte_huge(pte_mkhuge(pte))); +#endif +} +#else +static void __init hugetlb_tests(unsigned long pfn, pgprot_t prot) { } +#endif + +#ifdef CONFIG_TRANSPARENT_HUGEPAGE +static void __init pmd_thp_tests(unsigned long pfn, pgprot_t prot) +{ + pmd_t pmd; + + /* + * pmd_trans_huge() and pmd_present() must return negative + * after MMU invalidation with pmd_mknotpresent(). + */ + pmd = pfn_pmd(pfn, prot); + WARN_ON(!pmd_trans_huge(pmd_mkhuge(pmd))); + + /* + * Though platform specific test exclusions are not ideal, + * in this case S390 does not define pmd_mknotpresent() + * which should be tested on other platforms enabling THP. + */ +#ifndef CONFIG_S390 + WARN_ON(pmd_trans_huge(pmd_mknotpresent(pmd))); + WARN_ON(pmd_present(pmd_mknotpresent(pmd))); +#endif +} + +#ifdef CONFIG_HAVE_ARCH_TRANSPARENT_HUGEPAGE_PUD +static void __init pud_thp_tests(unsigned long pfn, pgprot_t prot) +{ + pud_t pud; + + /* + * pud_trans_huge() and pud_present() must return negative + * after MMU invalidation with pud_mknotpresent(). + */ + pud = pfn_pud(pfn, prot); + WARN_ON(!pud_trans_huge(pud_mkhuge(pud))); + WARN_ON(pud_trans_huge(pud_mknotpresent(pud))); + WARN_ON(pud_present(pud_mknotpresent(pud))); +} +#else +static void __init pud_thp_tests(unsigned long pfn, pgprot_t prot) { } +#endif +#else +static void __init pmd_thp_tests(unsigned long pfn, pgprot_t prot) { } +static void __init pud_thp_tests(unsigned long pfn, pgprot_t prot) { } +#endif + static unsigned long __init get_random_vaddr(void) { unsigned long random_vaddr, random_pages, total_user_pages; @@ -302,13 +567,14 @@ static unsigned long __init get_random_vaddr(void) void __init debug_vm_pgtable(void) { struct mm_struct *mm; + struct page *page; pgd_t *pgdp; p4d_t *p4dp, *saved_p4dp; pud_t *pudp, *saved_pudp; pmd_t *pmdp, *saved_pmdp, pmd; pte_t *ptep; pgtable_t saved_ptep; - pgprot_t prot; + pgprot_t prot, protnone; phys_addr_t paddr; unsigned long vaddr, pte_aligned, pmd_aligned; unsigned long pud_aligned, p4d_aligned, pgd_aligned; @@ -322,6 +588,25 @@ void __init debug_vm_pgtable(void) return; } + /* + * swap_migration_tests() requires a dedicated page as it needs to + * be locked before creating a migration entry from it. Locking the + * page that actually maps kernel text ('start_kernel') can be real + * problematic. Lets allocate a dedicated page explicitly for this + * purpose that will be freed later. + */ + page = alloc_page(GFP_KERNEL); + if (!page) { + pr_err("page allocation failed\n"); + return; + } + + /* + * __P000 (or even __S000) will help create page table entries with + * PROT_NONE permission as required for pxx_protnone_tests(). + */ + protnone = __P000; + /* * PFN for mapping at PTE level is determined from a standard kernel * text symbol. But pfns for higher page table levels are derived by @@ -377,11 +662,34 @@ void __init debug_vm_pgtable(void) p4d_populate_tests(mm, p4dp, saved_pudp); pgd_populate_tests(mm, pgdp, saved_p4dp); + pte_special_tests(pte_aligned, prot); + pte_protnone_tests(pte_aligned, protnone); + pmd_protnone_tests(pmd_aligned, protnone); + + pte_devmap_tests(pte_aligned, prot); + pmd_devmap_tests(pmd_aligned, prot); + pud_devmap_tests(pud_aligned, prot); + + pte_soft_dirty_tests(pte_aligned, prot); + pmd_soft_dirty_tests(pmd_aligned, prot); + pte_swap_soft_dirty_tests(pte_aligned, prot); + pmd_swap_soft_dirty_tests(pmd_aligned, prot); + + pte_swap_tests(pte_aligned, prot); + pmd_swap_tests(pmd_aligned, prot); + + swap_migration_tests(page); + hugetlb_tests(pte_aligned, prot); + + pmd_thp_tests(pmd_aligned, prot); + pud_thp_tests(pud_aligned, prot); + p4d_free(mm, saved_p4dp); pud_free(mm, saved_pudp); pmd_free(mm, saved_pmdp); pte_free(mm, saved_ptep); + __free_page(page); mm_dec_nr_puds(mm); mm_dec_nr_pmds(mm); mm_dec_nr_ptes(mm); -- 2.20.1