From nobody Mon Feb 9 04:31:52 2026 Received: from mx0a-00069f02.pphosted.com (mx0a-00069f02.pphosted.com [205.220.165.32]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 222533A7022; Thu, 22 Jan 2026 16:08:58 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=fail smtp.client-ip=205.220.165.32 ARC-Seal: i=2; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1769098145; cv=fail; b=Zqy8ZEvbOEwJIDTRwuSQrM/zMlbTVjFYkAWb9xWEt3fnJvR4C1LlpJDdCi1wHf1A6V/nJ4TAGXoX1OMP9GFRlZN1pSDpu9ssB3DI/WQ12xKS3iNca53me9devGKez+qUMr6I+wWO1OFdvpcwJdNiYDuYcVMbDx4jVlku9o/o2Ag= ARC-Message-Signature: i=2; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1769098145; c=relaxed/simple; bh=n0YtxJTDSXAQvm/lwKIwtFicjmWgkAOuMHCrdOAOKFo=; h=From:To:Cc:Subject:Date:Message-ID:In-Reply-To:References: Content-Type:MIME-Version; b=OPIxdzlG+zzAIPsqqXlUvtxH6jsNlDf6YLM2emd13qOgOxNOl73HEsxF9HXj2YZ/8vKKqsp/NJ2jjPdM0uF7G/rp7FIspuSQ6VX5IWdWuDMvPWo4ffJWeS6E/6s66s+Dy7+Jukx714n4bONZ0nORbIMvePuKrmnih5Us1l/caD8= ARC-Authentication-Results: i=2; smtp.subspace.kernel.org; dmarc=pass (p=reject dis=none) header.from=oracle.com; spf=pass smtp.mailfrom=oracle.com; dkim=pass (2048-bit key) header.d=oracle.com header.i=@oracle.com header.b=M2pgTpGr; dkim=pass (1024-bit key) header.d=oracle.onmicrosoft.com header.i=@oracle.onmicrosoft.com header.b=dwCeDlFL; arc=fail smtp.client-ip=205.220.165.32 Authentication-Results: smtp.subspace.kernel.org; dmarc=pass (p=reject dis=none) header.from=oracle.com Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=oracle.com Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=oracle.com header.i=@oracle.com header.b="M2pgTpGr"; dkim=pass (1024-bit key) header.d=oracle.onmicrosoft.com header.i=@oracle.onmicrosoft.com header.b="dwCeDlFL" Received: from pps.filterd (m0333521.ppops.net [127.0.0.1]) by mx0b-00069f02.pphosted.com (8.18.1.11/8.18.1.11) with ESMTP id 60MDgK2R460462; Thu, 22 Jan 2026 16:06:47 GMT DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=oracle.com; h=cc :content-transfer-encoding:content-type:date:from:in-reply-to :message-id:mime-version:references:subject:to; s= corp-2025-04-25; bh=AqWdNqe6ZKMwUptrEDhlZN4DrFDotmEh5bIisbxVldg=; b= M2pgTpGrg+qR+5eHoStPTJ+01zGn22i9TaU74Gfv47KIHMUaj+oov8RLgQiMxkSE FOfhfZEqePnjYJRqbJWX++pAK7okjoaoDkQHyqqql78WYaNW+6AhMQQpT3K+wGwp +QIdVWRFIHl1UzlJAPULxlpHc3/OuX6PyLEnwUSyveyBg/M9rW8C2H5BpmPdmsGv o8WNW9CVJa7ev2QNlz+vJOG0x86g5qE/NC13mhk5ieUFf4Zp8daMHiCzLNFtk2o9 QDQCtH48GjgiqFw8j34X1iOTnB9lfcmEx+vhERLHMchKDPCfKXRrE4F6lsUNFG67 GrGaLTI+OsNFr/Sm8d6Yng== Received: from iadpaimrmta02.imrmtpd1.prodappiadaev1.oraclevcn.com (iadpaimrmta02.appoci.oracle.com [147.154.18.20]) by mx0b-00069f02.pphosted.com (PPS) with ESMTPS id 4br1b8g0bh-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK); Thu, 22 Jan 2026 16:06:46 +0000 (GMT) Received: from pps.filterd (iadpaimrmta02.imrmtpd1.prodappiadaev1.oraclevcn.com [127.0.0.1]) by iadpaimrmta02.imrmtpd1.prodappiadaev1.oraclevcn.com (8.18.1.2/8.18.1.2) with ESMTP id 60MEgcCJ032257; Thu, 22 Jan 2026 16:06:45 GMT Received: from bl0pr03cu003.outbound.protection.outlook.com (mail-eastusazon11012013.outbound.protection.outlook.com [52.101.53.13]) by iadpaimrmta02.imrmtpd1.prodappiadaev1.oraclevcn.com (PPS) with ESMTPS id 4br0vgusre-2 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK); Thu, 22 Jan 2026 16:06:45 +0000 ARC-Seal: i=1; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=none; b=GgHiKYp1e590G7yTGSIzCciUIGP8cUK2yveGCGC5fmSwc6TefeKm4taV7D7er/3S/VV2sgKgKLyvA1kVawlRkq6TQnz4ECXjzSwjpS/eXgJ1FFgutDi6t+wJM6ZhCP6AWRSBE5l1pqgKNZjv2jIEfjKifAFeXQjQY6CDO5DgajCljPfdsd8B8/AlIZNfhJAH+W8egpuho6ptA4uoQHvbY+J7DOTFHqbtNJ5o9hllrVVW2ELsru2Z5uAuJz5xXxlSVN1oiqsMgnm2lRV53ytZ2W29M2gNlqmpSYHOMjxMWfnMmIO4R/+v1iuhy/Zq4IfrAdEzesrZl4txPDvzagvhMw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector10001; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=AqWdNqe6ZKMwUptrEDhlZN4DrFDotmEh5bIisbxVldg=; b=qwNsCw79FIdhAbjnRrL1Nu7mt55VZwzV19NMbhZrqVfZQLu26iiQ381XMS8C6AqUSdz3Dp1umY7mfn6WU/SyIHlSsTGor+WOu0DWAemxb7bR1bpPASUsjY6lFNQBeDcVCFQ3pIPnEU90wx6XEQGWmlS5H2n0eJHXjRwmUKTOo5rGtdtBDeciGn/x4O5SDOhkDu+Cbs2lnQ/Oajfk6K8fww80NveHfbKZ011xELg7onOUT3n4/Th29QaEFWTZKWYhm3FwNaoC08N+IUDxKbhhaA2MHqkaX0n7IfXSENSrUg/l5pYZGD0VlOxCLoCGf+MiwWPmHAVVXFHsyh99jdFwZw== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=oracle.com; dmarc=pass action=none header.from=oracle.com; dkim=pass header.d=oracle.com; arc=none DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=oracle.onmicrosoft.com; s=selector2-oracle-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=AqWdNqe6ZKMwUptrEDhlZN4DrFDotmEh5bIisbxVldg=; b=dwCeDlFL6Wed7zJ07Z3J1xFsqNJ2PSglKgD3OQu59ml4wyFZMmu9LjbC3gGcJRe1v8EMuZDISqTxhwvDddmspp/eWwMJPZZ9MxrG5N7vR0UOWA/vTniIyKJwmIY0jgtSqmuOGdl77qCniNtHm4yDOI3kxeznrinI89cbgm7wjFg= Received: from BL4PR10MB8229.namprd10.prod.outlook.com (2603:10b6:208:4e6::14) by BL3PR10MB6065.namprd10.prod.outlook.com (2603:10b6:208:3b4::10) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.9542.9; Thu, 22 Jan 2026 16:06:27 +0000 Received: from BL4PR10MB8229.namprd10.prod.outlook.com ([fe80::552b:16d2:af:c582]) by BL4PR10MB8229.namprd10.prod.outlook.com ([fe80::552b:16d2:af:c582%6]) with mapi id 15.20.9520.005; Thu, 22 Jan 2026 16:06:27 +0000 From: Lorenzo Stoakes To: Andrew Morton Cc: Jarkko Sakkinen , Dave Hansen , Thomas Gleixner , Ingo Molnar , Borislav Petkov , x86@kernel.org, "H . Peter Anvin" , Arnd Bergmann , Greg Kroah-Hartman , Dan Williams , Vishal Verma , Dave Jiang , Maarten Lankhorst , Maxime Ripard , Thomas Zimmermann , David Airlie , Simona Vetter , Jani Nikula , Joonas Lahtinen , Rodrigo Vivi , Tvrtko Ursulin , Christian Koenig , Huang Rui , Matthew Auld , Matthew Brost , Alexander Viro , Christian Brauner , Jan Kara , Benjamin LaHaise , Gao Xiang , Chao Yu , Yue Hu , Jeffle Xu , Sandeep Dhavale , Hongbo Li , Chunhai Guo , Theodore Ts'o , Andreas Dilger , Muchun Song , Oscar Salvador , David Hildenbrand , Konstantin Komarov , Mike Marshall , Martin Brandenburg , Tony Luck , Reinette Chatre , Dave Martin , James Morse , Babu Moger , Carlos Maiolino , Damien Le Moal , Naohiro Aota , Johannes Thumshirn , Matthew Wilcox , "Liam R . Howlett" , Vlastimil Babka , Mike Rapoport , Suren Baghdasaryan , Michal Hocko , Hugh Dickins , Baolin Wang , Zi Yan , Nico Pache , Ryan Roberts , Dev Jain , Barry Song , Lance Yang , Jann Horn , Pedro Falcato , David Howells , Paul Moore , James Morris , "Serge E . Hallyn" , Yury Norov , Rasmus Villemoes , linux-sgx@vger.kernel.org, linux-kernel@vger.kernel.org, nvdimm@lists.linux.dev, linux-cxl@vger.kernel.org, dri-devel@lists.freedesktop.org, intel-gfx@lists.freedesktop.org, linux-fsdevel@vger.kernel.org, linux-aio@kvack.org, linux-erofs@lists.ozlabs.org, linux-ext4@vger.kernel.org, linux-mm@kvack.org, ntfs3@lists.linux.dev, devel@lists.orangefs.org, linux-xfs@vger.kernel.org, keyrings@vger.kernel.org, linux-security-module@vger.kernel.org, Jason Gunthorpe Subject: [PATCH v2 02/13] mm: rename vma_flag_test/set_atomic() to vma_test/set_atomic_flag() Date: Thu, 22 Jan 2026 16:06:11 +0000 Message-ID: <033dcf12e819dee5064582bced9b12ea346d1607.1769097829.git.lorenzo.stoakes@oracle.com> X-Mailer: git-send-email 2.52.0 In-Reply-To: References: Content-Transfer-Encoding: quoted-printable X-ClientProxiedBy: LO4P265CA0181.GBRP265.PROD.OUTLOOK.COM (2603:10a6:600:311::8) To BL4PR10MB8229.namprd10.prod.outlook.com (2603:10b6:208:4e6::14) Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 X-MS-PublicTrafficType: Email X-MS-TrafficTypeDiagnostic: BL4PR10MB8229:EE_|BL3PR10MB6065:EE_ X-MS-Office365-Filtering-Correlation-Id: 797048c0-4351-4ddd-df7e-08de59d03290 X-MS-Exchange-SenderADCheck: 1 X-MS-Exchange-AntiSpam-Relay: 0 X-Microsoft-Antispam: BCL:0;ARA:13230040|1800799024|7416014|376014|366016; X-Microsoft-Antispam-Message-Info: =?us-ascii?Q?OTB9D9XuTm8h6QsgNQnPU/zdnXE0z8QJW1Pd48D2Feq1T/tzo8yXpm1JQWW/?= =?us-ascii?Q?VkOpytOS2ZqJcnCsontgzAPvrlyGSMDBNUy6biHxKR+Wb+BbuHiw90DuZFnS?= =?us-ascii?Q?rWE8b9ZYyZnvlsOpSzZKL3CbQEHrTuHFB4flgxuIabuDgrr6xmikcTjHDaZc?= =?us-ascii?Q?nVFePf8m+iXJC5VY+mpbbh6Qd9hel/0XC+8jk65R+meyoX9zk1xE1tUpj8si?= =?us-ascii?Q?V7A9vj+EqN374nInmb6oppE4TNYb/GV6EhGcH6yKNHy/g68BKoEsyurNym/d?= =?us-ascii?Q?ntwQ/6iRQObZv5DsYfIoCP91tIAQv/24bGHMYjpGvGw9xgzwE0h7DlEhkHqW?= =?us-ascii?Q?1EUSQPOoIVcwQwuU6a8z0odSmpPOww9Z/IqDNABoo47nThKFP902TX26qEok?= =?us-ascii?Q?w4Z2A0iktzFnyZaHxrsckfap9I2pNRwZPQe03vu0V8c/ysn0gyzLPFzYDDQR?= =?us-ascii?Q?qyCH0sf4hQ0UJ6AyOeeJDJY7HSxNTOgADyDDqtt7yEHN8jBw1y+LVrtt61Sd?= =?us-ascii?Q?MZBE9qCwwQNAxzzatImTt/xTVaW74uwwN7L7E/QCeeacw9XTeyJNTKbY2/sj?= =?us-ascii?Q?zJjzt9+DgBka6ntR+cvdZ+3SN5PDycAosaz7hhnFnTNbAHsSyLHioQ92t9ai?= =?us-ascii?Q?YzD8dG/xmfxZ1SCVUMxp6kee/um40JSPsZkWbR90BKJP5BfO8pSnwgk1VV7H?= =?us-ascii?Q?LJhv5+jeJYKTINnBjw0C7FV1T8quZzp/sy1mSVa9Z/M0y3jRuMqqyCL/nEfk?= =?us-ascii?Q?Nmd+OlqdDwwYn7gELdtgxxcvwhrcDrdNyccOcz898Dp5cHVfu/9w/Dvby0XV?= =?us-ascii?Q?SNKqNzL3DfgS3FoTfnZXnkkC+BKJew/a/zORm0WJXeozWYTgZa2a2HHlmFiu?= =?us-ascii?Q?DsUGKulZW/xjOLjRrtWntmn/3QQnF8Xx3quvs+IUzrTXYCvFFPCDuNSVSwk4?= =?us-ascii?Q?ehu76PdO81sb6V9EhdQsJD2wBQeMyPK3eNIuxDYFXdDz/mD2VgAhRmL/UgCR?= =?us-ascii?Q?CSt9/RsWXqtrxnf72y70MM9lh2iJFbmay4vgq9ELIgmo1Bohxz4gxZQhkUIm?= =?us-ascii?Q?zzW7OpwNJVXRcI5oWKhCzbRMT+kki6qWZIRg2+pucqjpjNdToXmmwBbRsCx0?= =?us-ascii?Q?50qVI+fpfBI0otDhpZjgpvkLbsH0v/JqcbBvuJj2wFxfcJC3IRtj1Ckfehcz?= =?us-ascii?Q?4z/ualZIAq7aJIx9wgHW6Sp+NCEeWQV9nOtiqYzw4AslMz5yTTb0fwM7LeTb?= =?us-ascii?Q?RJyia/FPKj4JH3vyUKSj9v9Wa6y3nzdRzvm45Eu42g7y82MbKkcJ2Egvcqai?= =?us-ascii?Q?VLJs655Ckju/R63h2F1wC8ykTVf+97se255WHiF4NsEn+587Gte6zaajTHHN?= =?us-ascii?Q?ICyPif8IIRnbMFBae+dJ0gM+84cSFE/qGuPq29G40sPVaXO94e4USsC4WdXM?= =?us-ascii?Q?rOU4cwsv0t8ejsNiLmgzpguVmqExm1tmY+k7Q64GG06nUyVrFZyjXO3R2XGW?= =?us-ascii?Q?3LVkD0u3VSG3vVu0SMzzLNQEUDIgesS7OiqDgqoqA3pH5uj//S+EmTSUYqs5?= =?us-ascii?Q?nqXbKd4Rlfa8WJ3efr0=3D?= X-Forefront-Antispam-Report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:BL4PR10MB8229.namprd10.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230040)(1800799024)(7416014)(376014)(366016);DIR:OUT;SFP:1101; X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1 X-MS-Exchange-AntiSpam-MessageData-0: =?us-ascii?Q?IKaNBkHLs7hxug9muHuPLX0wNwAMCYm1GpLdmA6Jdj9TN9AfuiOA4b/e3sk9?= =?us-ascii?Q?kTbQcbBgxd73NWOiaBApeyDoxWri9dSBZCh/QLJ8w/hNakBuwNeL+Dk/IJBV?= =?us-ascii?Q?kgp5cGcoSza7VtNe2ZSdFKjgNXkVB32U7/KIPjxDkKhEIubGISyNbXqWH4AN?= =?us-ascii?Q?ctee6pgE/B7ynGxKq/9qaFVbk+uIkyxai8yEgf2nRmp44lciw3iTEIvZN8nf?= =?us-ascii?Q?7iXhy0yA2u6/JQzJy8p8r6yFd54C2dl/01TAoPFRXPaSJZpCo1R5igLy3YTs?= =?us-ascii?Q?NazHyprrg8m15NiFEFneKhySvg5UV2mFfspq5jHFTV2iwzX6p5qz2+xyf4R7?= =?us-ascii?Q?wYHLygy2E/enrv8oyPMBq7eYwAJKiX7dAz65DQ5eMBtoG5uiMcyCd+hBaiLp?= =?us-ascii?Q?dg1aX+y5mEze2AVLQZakgLnq8ETzH1pELtYfWkypQX2BSpeoclK4aC7Lqo1C?= =?us-ascii?Q?vLVfNJb/6JVtXWzcDLI1uUghyTxCliHmKv53YS9PklTPw1/Q7RA+NsIsYa1M?= =?us-ascii?Q?XN1W8ui+cIyvFeh3UDY1xdGPTS/mjxWk5RN7KsuaPAMdQScF1p1Tbl/Kxnr9?= =?us-ascii?Q?UkIR1d+BEC5yj2nixQYTxRtvgd09C0JplsWXJmYwW5SNCcpVge/pl9NnbxFj?= =?us-ascii?Q?eo2XAE+oUmuXbyaxFhfvCDzX/1yD+JlyZTFh1Pogio7PBYJ2UD0FX27H7Nf6?= =?us-ascii?Q?ySIZdTBUr9Sb28pWP874ApAAfJ+2763x6jVFp/DT2hyRzszricSCLRbsaxrm?= =?us-ascii?Q?+MUzyExfMn8vdad8gxzWw5uqsZAgcABn9OcBVnwqBbDmrz0A9vilo9RSkYF2?= =?us-ascii?Q?S3LI/S4HSURSoy8jl8v3dLG6M14nR+YprbWYWgl++E5eDZ+SfTAXOAFMJ2PA?= =?us-ascii?Q?r48ea3FW5N4ZK66KGh540So/GEnlpi6R77wIKA7M0KKtG3dnXfYczte3I20w?= =?us-ascii?Q?K3sOZrGpmC4zH5qD21IcVA5tg8M4xr0zft2Rm0JhMqCTKOPM1Q3Jjoyz5V3y?= =?us-ascii?Q?sJ/W0THtdaSZsrb29tTqnqbPkpfITeOUuA08/8rtCYDuGC9A5KsUPl3vKOZg?= =?us-ascii?Q?kZQmX1VYpPz/FCiHtkE+vzAD2kwUcS7nzWPwiHgzvhup6vWY6mqgLwAb9a+G?= =?us-ascii?Q?dbkA+BHWUqr3VB66pRx2zZAQtjviHNedvjQaRxIHgqOB5ATk6WFVqDD8pNWh?= =?us-ascii?Q?Nch6p0oK/BeExdPQ/Zbw3VR9ozsKw9YvDiJGtpUlU2oTdeOsG1+Ul0P+vDes?= =?us-ascii?Q?I4aqCz7mPZUblR+qxTSA7rgnmj0iUV87MKPJpfuRLb2r+Wh+GWUNi1oqbmqp?= =?us-ascii?Q?UY8byozXsW4SoySjMyM02gX+zSb7f+xL/ySWyA2ynW2nhKkm7lTBVm5qboBo?= =?us-ascii?Q?VG6Z6i4w9Kn1728Q8WK9SLQAez66Tjbg5PqhZHAw/IHXIxVs39X/9/By+w/L?= =?us-ascii?Q?BrtIet27KFbb9VjRqQdDhWdCRl0ldCSC5wzzb3IU0Wlp1dHCSvkiCEioopCM?= =?us-ascii?Q?lP2cKQDNjk8NkMwnPsA3DPHwaeJ6PtT9LTpwZ7flm4hq0Jmo0pf8hMhYsyqd?= =?us-ascii?Q?+lv9BODt8PDO/1hVTcDR1SVURhJ5h1cqdqb3iWX3bwyFsz+mVWaE8QNwfJFy?= =?us-ascii?Q?GJaWXX0fMsWHEPB+VETF7gikxc4hxGC+FmXDKMDUZ9ODtb4DO7XBfeVY5P7V?= =?us-ascii?Q?ZZmmVR96NHdt7/yecc9SktBPd1Y9z7fFBIesgBy+13TU6dt6yaqMV1N1sJN9?= =?us-ascii?Q?KqXzA/om/3dPNQ4tOX5TxpQ0UHCxelM=3D?= X-MS-Exchange-AntiSpam-ExternalHop-MessageData-ChunkCount: 1 X-MS-Exchange-AntiSpam-ExternalHop-MessageData-0: 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 X-OriginatorOrg: oracle.com X-MS-Exchange-CrossTenant-Network-Message-Id: 797048c0-4351-4ddd-df7e-08de59d03290 X-MS-Exchange-CrossTenant-AuthSource: BL4PR10MB8229.namprd10.prod.outlook.com X-MS-Exchange-CrossTenant-AuthAs: Internal X-MS-Exchange-CrossTenant-OriginalArrivalTime: 22 Jan 2026 16:06:27.0370 (UTC) X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted X-MS-Exchange-CrossTenant-Id: 4e2c6054-71cb-48f1-bd6c-3a9705aca71b X-MS-Exchange-CrossTenant-MailboxType: HOSTED X-MS-Exchange-CrossTenant-UserPrincipalName: Oi2/ooVBuKYn4W0Mgxn9CQmFXSSp12acwg9tI4j8MESnplfp01ARBjC5OC9hqGJHFxF3+QKIidem79jEPRyoqfr+W7kGN/QJ5y9K8G/m3gc= X-MS-Exchange-Transport-CrossTenantHeadersStamped: BL3PR10MB6065 X-Proofpoint-Virus-Version: vendor=baseguard engine=ICAP:2.0.293,Aquarius:18.0.1121,Hydra:6.1.20,FMLib:17.12.100.49 definitions=2026-01-22_02,2026-01-22_02,2025-10-01_01 X-Proofpoint-Spam-Details: rule=notspam policy=default score=0 malwarescore=0 bulkscore=0 adultscore=0 spamscore=0 phishscore=0 mlxscore=0 mlxlogscore=999 suspectscore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.12.0-2601150000 definitions=main-2601220123 X-Authority-Analysis: v=2.4 cv=WbcBqkhX c=1 sm=1 tr=0 ts=69724b17 b=1 cx=c_pps a=e1sVV491RgrpLwSTMOnk8w==:117 a=e1sVV491RgrpLwSTMOnk8w==:17 a=6eWqkTHjU83fiwn7nKZWdM+Sl24=:19 a=z/mQ4Ysz8XfWz/Q5cLBRGdckG28=:19 a=lCpzRmAYbLLaTzLvsPZ7Mbvzbb8=:19 a=xqWC_Br6kY4A:10 a=vUbySO9Y5rIA:10 a=GoEa3M9JfhUA:10 a=VkNPw1HP01LnGYTKEx00:22 a=yPCof4ZbAAAA:8 a=79C6M4AKyJxmQlF-J2AA:9 cc=ntf awl=host:13644 X-Proofpoint-Spam-Details-Enc: AW1haW4tMjYwMTIyMDEyMyBTYWx0ZWRfX8ialYCYToqiO SBsPqHPwFdmas4mmG4s6msvYlFSpW4NBzDHEENAJXsZbYhKPnV6/T1eLKl1QL8N+zzMAibapq51 PSRIiaOzC2NzwK4ARZMvRKkQyevtai4VmnbSJwKOmWPZPfBVM2S3woHvlV3F5Cjr2fWv4Js46Ui v1BD9ejLl9vQqea8zzSgFue4mGk8pf3BpOefQvi87aLCuDTKokZaflJMC0188HkcuUUsgMofOJ3 1QoCMJNQRyaDua2zeZsVMP078gsYKk+J15vXpzU4xw8M9cKSiHEuSFodP7EKQaFFLZLNFRezGC+ 4j6C8SWnCZlb5RFb97xgrYNf4GZSYFbQnH7TLMGJq62t+eDZwCgfDFblaT9bDpPD85eodWZMO1b EAdbtFDgF8D7Qn0HJlioI4cnnyPMQhlcFIwMl42w8zUSsgjyNOm13+93Y78ncOKFUi7FwFFgN3w DOFi651HOHmD5tcVgUAQNeqvfgckuj7xwloDmrJ4= X-Proofpoint-ORIG-GUID: 04KnarC-JKFxzHdGBSTxHhbBHKXVYIUs X-Proofpoint-GUID: 04KnarC-JKFxzHdGBSTxHhbBHKXVYIUs Content-Type: text/plain; charset="utf-8" In order to stay consistent between functions which manipulate a vm_flags_t argument of the form of vma_flags_...() and those which manipulate a VMA (in this case the flags field of a VMA), rename vma_flag_[test/set]_atomic() to vma_[test/set]_atomic_flag(). This lays the groundwork for adding VMA flag manipulation functions in a subsequent commit. Signed-off-by: Lorenzo Stoakes Reviewed-by: Pedro Falcato --- include/linux/mm.h | 13 +++++-------- mm/khugepaged.c | 2 +- mm/madvise.c | 2 +- 3 files changed, 7 insertions(+), 10 deletions(-) diff --git a/include/linux/mm.h b/include/linux/mm.h index 776a7e03f88b..e0d31238097c 100644 --- a/include/linux/mm.h +++ b/include/linux/mm.h @@ -987,8 +987,7 @@ static inline void vm_flags_mod(struct vm_area_struct *= vma, __vm_flags_mod(vma, set, clear); } =20 -static inline bool __vma_flag_atomic_valid(struct vm_area_struct *vma, - vma_flag_t bit) +static inline bool __vma_atomic_valid_flag(struct vm_area_struct *vma, vma= _flag_t bit) { const vm_flags_t mask =3D BIT((__force int)bit); =20 @@ -1003,13 +1002,12 @@ static inline bool __vma_flag_atomic_valid(struct v= m_area_struct *vma, * Set VMA flag atomically. Requires only VMA/mmap read lock. Only specific * valid flags are allowed to do this. */ -static inline void vma_flag_set_atomic(struct vm_area_struct *vma, - vma_flag_t bit) +static inline void vma_set_atomic_flag(struct vm_area_struct *vma, vma_fla= g_t bit) { unsigned long *bitmap =3D vma->flags.__vma_flags; =20 vma_assert_stabilised(vma); - if (__vma_flag_atomic_valid(vma, bit)) + if (__vma_atomic_valid_flag(vma, bit)) set_bit((__force int)bit, bitmap); } =20 @@ -1020,10 +1018,9 @@ static inline void vma_flag_set_atomic(struct vm_are= a_struct *vma, * This is necessarily racey, so callers must ensure that serialisation is * achieved through some other means, or that races are permissible. */ -static inline bool vma_flag_test_atomic(struct vm_area_struct *vma, - vma_flag_t bit) +static inline bool vma_test_atomic_flag(struct vm_area_struct *vma, vma_fl= ag_t bit) { - if (__vma_flag_atomic_valid(vma, bit)) + if (__vma_atomic_valid_flag(vma, bit)) return test_bit((__force int)bit, &vma->vm_flags); =20 return false; diff --git a/mm/khugepaged.c b/mm/khugepaged.c index fba6aea5bea6..e76f42243534 100644 --- a/mm/khugepaged.c +++ b/mm/khugepaged.c @@ -1741,7 +1741,7 @@ static bool file_backed_vma_is_retractable(struct vm_= area_struct *vma) * obtained on guard region installation after the flag is set, so this * check being performed under this lock excludes races. */ - if (vma_flag_test_atomic(vma, VMA_MAYBE_GUARD_BIT)) + if (vma_test_atomic_flag(vma, VMA_MAYBE_GUARD_BIT)) return false; =20 return true; diff --git a/mm/madvise.c b/mm/madvise.c index 1f3040688f04..8debb2d434aa 100644 --- a/mm/madvise.c +++ b/mm/madvise.c @@ -1140,7 +1140,7 @@ static long madvise_guard_install(struct madvise_beha= vior *madv_behavior) * acquire an mmap/VMA write lock to read it. All remaining readers may * or may not see the flag set, but we don't care. */ - vma_flag_set_atomic(vma, VMA_MAYBE_GUARD_BIT); + vma_set_atomic_flag(vma, VMA_MAYBE_GUARD_BIT); =20 /* * If anonymous and we are establishing page tables the VMA ought to --=20 2.52.0