From nobody Sun Feb 8 07:07:08 2026 Received: from mail-wm1-f74.google.com (mail-wm1-f74.google.com [209.85.128.74]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id D33912E7BD4 for ; Tue, 7 Oct 2025 16:21:56 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=209.85.128.74 ARC-Seal: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1759854120; cv=none; b=lDZkSlhM+u8xkAzbmgnvv8NHCHZXohWymLthm3+NXPY9YSbbEc4TDM9MFMp3Uue4ETIyhGFNb5d2Ari/tP6WvFpEdUqEpGGdgGUxxHJZ6p7/p4g71iKlAfToaJGNgbqD6YBCY6CsA19MyD+Cz17l+CjCEqIdyXVfw+zc2E3ePY0= ARC-Message-Signature: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1759854120; c=relaxed/simple; bh=lvPYZKSeQucFx2SgeOdYOtw4O2ksAxgo0FsweuBHcec=; h=Date:In-Reply-To:Mime-Version:References:Message-ID:Subject:From: To:Cc:Content-Type; b=NEQPhqk4pQVFyTvu9jEbsrRfNW8glDMViwzosJkFQVQJp7mdDKntxOU+mVS6pjOvWnuHbTFW5xK3m56DoUhL5vddusAqRhx8msvZsG6sd7GQhGlwH3kBDS0FKtDjUVvXRRvxBZjQvwoX+ThLBcI1nCuVA4f5LdCmpVkUx7O6Xyo= ARC-Authentication-Results: i=1; smtp.subspace.kernel.org; dmarc=pass (p=reject dis=none) header.from=google.com; spf=pass smtp.mailfrom=flex--aliceryhl.bounces.google.com; dkim=pass (2048-bit key) header.d=google.com header.i=@google.com header.b=RTO/FuVc; arc=none smtp.client-ip=209.85.128.74 Authentication-Results: smtp.subspace.kernel.org; dmarc=pass (p=reject dis=none) header.from=google.com Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=flex--aliceryhl.bounces.google.com Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=google.com header.i=@google.com header.b="RTO/FuVc" Received: by mail-wm1-f74.google.com with SMTP id 5b1f17b1804b1-46fa88b5760so874915e9.3 for ; Tue, 07 Oct 2025 09:21:56 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20230601; t=1759854115; x=1760458915; darn=vger.kernel.org; h=cc:to:from:subject:message-id:references:mime-version:in-reply-to :date:from:to:cc:subject:date:message-id:reply-to; bh=JPke7s3EpbXC6ErmX/FPvC/unGHuc//hg1lOBj1qibA=; b=RTO/FuVcWAZEL7PyaNzslaeUaM2MzZd2AkBd4aCwmY/eTVfp7SC7HJ1ssF0PXWT08e maZManOa5G3BTLFmqySoNEw3vwwlVwoNXIAxXCNrsWAOjv3SOVw07aBFhUiFB77wXtz3 6nhD2+W0v88ruT10Aig3zmbiv0c0nFaQ6eTDlcToDuP9tb8F9SbODraysTlHVItw6RP1 A1XEvtCN3aEgO6ciA9e2aLZLR8rnAVxuHPyI5hzvTnpKt1VoigO81QBdrYn6xPUlMwTH p6sxaNchGfarQYj6DmEzhcNtoeIkgaKzHbiY5wn8o3E3F16Zq4WvO4unMKqAYwhA9Ohx ueJA== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1759854115; x=1760458915; h=cc:to:from:subject:message-id:references:mime-version:in-reply-to :date:x-gm-message-state:from:to:cc:subject:date:message-id:reply-to; bh=JPke7s3EpbXC6ErmX/FPvC/unGHuc//hg1lOBj1qibA=; b=kHTen0vEandVyhc3SH/VtrH7ShNZpZTZGNH3x4ofeAbGn0E+ACZOLro396TOWIHn0b nS9y2uQ0uCb9os4dWAXN51kv4kMzJfI903cZ7rt5ATxyKeawfhRpmHjTfJ8SUQ7EPexs oqTgbYuu57tYq1jeZxbwPgOj/yh2jkTej1sAiFlDMYWaSHDlN1oE797lmGejODJwl8DL y4+wvlMFMtjR+0aWWAeTXkKyEBMXU8+5uLt9n4HAxSlKJ+K7MPdeuXSe+UGIpLZ3ygiP spQ1mWnR69jtmRD/SQBRAf+XP+kwpdb1ASvNZRiKFW5FHz2+gvXLcZqfDyE9npfQ3fkK M9NA== X-Forwarded-Encrypted: i=1; AJvYcCV634QUeoPdmHR5JqY+Me/CjSxTr7ojS0jasYNqIu8BiPwdtJrfQP9B9Qt5g4VYMnHJD/7SBdonSUmMqmk=@vger.kernel.org X-Gm-Message-State: AOJu0Yw9hq53AyfOh86n/X+knJL53MujT30vcCwy19ySoP0WocR4qdek Bq5GkNB0+DH42xlYzhbPRdF/oAwgCri+D4DvV4IGcpA0a7ZiOBoEDUt3KEkkwiO00kheHGk2RQg +jg0zlpXMq62LJBGJLw== X-Google-Smtp-Source: AGHT+IH9zRUnvVJnJ2rKg3ul1/L1v9CwXrOUbkfQHeRTwHBdeUKC3Y5EGru7TMDFalytr+scT+ACzRCj8l6otsM= X-Received: from wmri12-n1.prod.google.com ([2002:a05:600c:8a0c:10b0:46e:1110:d730]) (user=aliceryhl job=prod-delivery.src-stubby-dispatcher) by 2002:a05:600c:1395:b0:46e:27fb:17f0 with SMTP id 5b1f17b1804b1-46fa9aa204cmr1824285e9.9.1759854115350; Tue, 07 Oct 2025 09:21:55 -0700 (PDT) Date: Tue, 7 Oct 2025 16:21:36 +0000 In-Reply-To: <20251002075202.11306-1-acsjakub@amazon.de> Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: Mime-Version: 1.0 References: <20251002075202.11306-1-acsjakub@amazon.de> X-Mailer: git-send-email 2.51.0.618.g983fd99d29-goog Message-ID: <20251007162136.1885546-1-aliceryhl@google.com> Subject: [PATCH] mm: use enum for vm_flags From: Alice Ryhl To: acsjakub@amazon.de Cc: akpm@linux-foundation.org, axelrasmussen@google.com, chengming.zhou@linux.dev, david@redhat.com, linux-fsdevel@vger.kernel.org, linux-kernel@vger.kernel.org, linux-mm@kvack.org, peterx@redhat.com, xu.xin16@zte.com.cn, rust-for-linux@vger.kernel.org, Alice Ryhl Content-Transfer-Encoding: quoted-printable Content-Type: text/plain; charset="utf-8" The bindgen tool is better able to handle BIT(_) declarations when used in an enum. Signed-off-by: Alice Ryhl --- Hi Jakub, what do you think about modifying the patch like this to use an enum? It resolves the issues brought up in https://lore.kernel.org/all/CAH5fLghTu-Zcm9e3Hy07nNtvB_-hRjojAWDoq-hhBYGE7= LPEbQ@mail.gmail.com/ Feel free to squash this patch into your patch. include/linux/mm.h | 90 +++++++++++++++++---------------- rust/bindings/bindings_helper.h | 1 - 2 files changed, 46 insertions(+), 45 deletions(-) diff --git a/include/linux/mm.h b/include/linux/mm.h index 7916d527f687..69da7ce13e50 100644 --- a/include/linux/mm.h +++ b/include/linux/mm.h @@ -273,57 +273,58 @@ extern unsigned int kobjsize(const void *objp); * vm_flags in vm_area_struct, see mm_types.h. * When changing, update also include/trace/events/mmflags.h */ -#define VM_NONE 0 +enum { + VM_NONE =3D 0, =20 -#define VM_READ BIT(0) /* currently active flags */ -#define VM_WRITE BIT(1) -#define VM_EXEC BIT(2) -#define VM_SHARED BIT(3) + VM_READ =3D BIT(0), /* currently active flags */ + VM_WRITE =3D BIT(1), + VM_EXEC =3D BIT(2), + VM_SHARED =3D BIT(3), =20 /* mprotect() hardcodes VM_MAYREAD >> 4 =3D=3D VM_READ, and so for r/w/x b= its. */ -#define VM_MAYREAD BIT(4) /* limits for mprotect() etc */ -#define VM_MAYWRITE BIT(5) -#define VM_MAYEXEC BIT(6) -#define VM_MAYSHARE BIT(7) + VM_MAYREAD =3D BIT(4), /* limits for mprotect() etc */ + VM_MAYWRITE =3D BIT(5), + VM_MAYEXEC =3D BIT(6), + VM_MAYSHARE =3D BIT(7), =20 -#define VM_GROWSDOWN BIT(8) /* general info on the segment */ + VM_GROWSDOWN =3D BIT(8), /* general info on the segment */ #ifdef CONFIG_MMU -#define VM_UFFD_MISSING BIT(9) /* missing pages tracking */ + VM_UFFD_MISSING =3D BIT(9), /* missing pages tracking */ #else /* CONFIG_MMU */ -#define VM_MAYOVERLAY BIT(9) /* nommu: R/O MAP_PRIVATE mapping that might= overlay a file mapping */ + VM_MAYOVERLAY =3D BIT(9), /* nommu: R/O MAP_PRIVATE mapping that might o= verlay a file mapping */ #define VM_UFFD_MISSING 0 #endif /* CONFIG_MMU */ -#define VM_PFNMAP BIT(10) /* Page-ranges managed without "struct page", j= ust pure PFN */ -#define VM_UFFD_WP BIT(12) /* wrprotect pages tracking */ - -#define VM_LOCKED BIT(13) -#define VM_IO BIT(14) /* Memory mapped I/O or similar */ - - /* Used by sys_madvise() */ -#define VM_SEQ_READ BIT(15) /* App will access data sequentially */ -#define VM_RAND_READ BIT(16) /* App will not benefit from clustered reads= */ - -#define VM_DONTCOPY BIT(17) /* Do not copy this vma on fork */ -#define VM_DONTEXPAND BIT(18) /* Cannot expand with mremap() */ -#define VM_LOCKONFAULT BIT(19) /* Lock the pages covered when they are fa= ulted in */ -#define VM_ACCOUNT BIT(20) /* Is a VM accounted object */ -#define VM_NORESERVE BIT(21) /* should the VM suppress accounting */ -#define VM_HUGETLB BIT(22) /* Huge TLB Page VM */ -#define VM_SYNC BIT(23) /* Synchronous page faults */ -#define VM_ARCH_1 BIT(24) /* Architecture-specific flag */ -#define VM_WIPEONFORK BIT(25) /* Wipe VMA contents in child. */ -#define VM_DONTDUMP BIT(26) /* Do not include in the core dump */ + VM_PFNMAP =3D BIT(10), /* Page-ranges managed without "struct page", jus= t pure PFN */ + VM_UFFD_WP =3D BIT(12), /* wrprotect pages tracking */ + + VM_LOCKED =3D BIT(13), + VM_IO =3D BIT(14), /* Memory mapped I/O or similar */ + + /* Used by sys_madvise() */ + VM_SEQ_READ =3D BIT(15), /* App will access data sequentially */ + VM_RAND_READ =3D BIT(16), /* App will not benefit from clustered reads */ + + VM_DONTCOPY =3D BIT(17), /* Do not copy this vma on fork */ + VM_DONTEXPAND =3D BIT(18), /* Cannot expand with mremap() */ + VM_LOCKONFAULT =3D BIT(19), /* Lock the pages covered when they are faul= ted in */ + VM_ACCOUNT =3D BIT(20), /* Is a VM accounted object */ + VM_NORESERVE =3D BIT(21), /* should the VM suppress accounting */ + VM_HUGETLB =3D BIT(22), /* Huge TLB Page VM */ + VM_SYNC =3D BIT(23), /* Synchronous page faults */ + VM_ARCH_1 =3D BIT(24), /* Architecture-specific flag */ + VM_WIPEONFORK =3D BIT(25), /* Wipe VMA contents in child. */ + VM_DONTDUMP =3D BIT(26), /* Do not include in the core dump */ =20 #ifdef CONFIG_MEM_SOFT_DIRTY -# define VM_SOFTDIRTY BIT(27) /* Not soft dirty clean area */ + VM_SOFTDIRTY =3D BIT(27), /* Not soft dirty clean area */ #else # define VM_SOFTDIRTY 0 #endif =20 -#define VM_MIXEDMAP BIT(28) /* Can contain "struct page" and pure PFN pag= es */ -#define VM_HUGEPAGE BIT(29) /* MADV_HUGEPAGE marked this vma */ -#define VM_NOHUGEPAGE BIT(30) /* MADV_NOHUGEPAGE marked this vma */ -#define VM_MERGEABLE BIT(31) /* KSM may merge identical pages */ + VM_MIXEDMAP =3D BIT(28), /* Can contain "struct page" and pure PFN pages= */ + VM_HUGEPAGE =3D BIT(29), /* MADV_HUGEPAGE marked this vma */ + VM_NOHUGEPAGE =3D BIT(30), /* MADV_NOHUGEPAGE marked this vma */ + VM_MERGEABLE =3D BIT(31), /* KSM may merge identical pages */ =20 #ifdef CONFIG_ARCH_USES_HIGH_VMA_FLAGS #define VM_HIGH_ARCH_BIT_0 32 /* bit only usable on 64-bit architectures */ @@ -333,14 +334,15 @@ extern unsigned int kobjsize(const void *objp); #define VM_HIGH_ARCH_BIT_4 36 /* bit only usable on 64-bit architectures */ #define VM_HIGH_ARCH_BIT_5 37 /* bit only usable on 64-bit architectures */ #define VM_HIGH_ARCH_BIT_6 38 /* bit only usable on 64-bit architectures */ -#define VM_HIGH_ARCH_0 BIT(VM_HIGH_ARCH_BIT_0) -#define VM_HIGH_ARCH_1 BIT(VM_HIGH_ARCH_BIT_1) -#define VM_HIGH_ARCH_2 BIT(VM_HIGH_ARCH_BIT_2) -#define VM_HIGH_ARCH_3 BIT(VM_HIGH_ARCH_BIT_3) -#define VM_HIGH_ARCH_4 BIT(VM_HIGH_ARCH_BIT_4) -#define VM_HIGH_ARCH_5 BIT(VM_HIGH_ARCH_BIT_5) -#define VM_HIGH_ARCH_6 BIT(VM_HIGH_ARCH_BIT_6) + VM_HIGH_ARCH_0 =3D BIT(VM_HIGH_ARCH_BIT_0), + VM_HIGH_ARCH_1 =3D BIT(VM_HIGH_ARCH_BIT_1), + VM_HIGH_ARCH_2 =3D BIT(VM_HIGH_ARCH_BIT_2), + VM_HIGH_ARCH_3 =3D BIT(VM_HIGH_ARCH_BIT_3), + VM_HIGH_ARCH_4 =3D BIT(VM_HIGH_ARCH_BIT_4), + VM_HIGH_ARCH_5 =3D BIT(VM_HIGH_ARCH_BIT_5), + VM_HIGH_ARCH_6 =3D BIT(VM_HIGH_ARCH_BIT_6), #endif /* CONFIG_ARCH_USES_HIGH_VMA_FLAGS */ +}; =20 #ifdef CONFIG_ARCH_HAS_PKEYS # define VM_PKEY_SHIFT VM_HIGH_ARCH_BIT_0 diff --git a/rust/bindings/bindings_helper.h b/rust/bindings/bindings_helpe= r.h index 2e43c66635a2..04b75d4d01c3 100644 --- a/rust/bindings/bindings_helper.h +++ b/rust/bindings/bindings_helper.h @@ -108,7 +108,6 @@ const xa_mark_t RUST_CONST_HELPER_XA_PRESENT =3D XA_PRE= SENT; =20 const gfp_t RUST_CONST_HELPER_XA_FLAGS_ALLOC =3D XA_FLAGS_ALLOC; const gfp_t RUST_CONST_HELPER_XA_FLAGS_ALLOC1 =3D XA_FLAGS_ALLOC1; -const vm_flags_t RUST_CONST_HELPER_VM_MERGEABLE =3D VM_MERGEABLE; =20 #if IS_ENABLED(CONFIG_ANDROID_BINDER_IPC_RUST) #include "../../drivers/android/binder/rust_binder.h" --=20 2.51.0.618.g983fd99d29-goog