From nobody Sat Oct 4 20:52:44 2025 Received: from mx0b-00069f02.pphosted.com (mx0b-00069f02.pphosted.com [205.220.177.32]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 66CF92F5304; Tue, 12 Aug 2025 15:48:12 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=fail smtp.client-ip=205.220.177.32 ARC-Seal: i=2; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1755013694; cv=fail; b=IwDRMwRXGcoZttBTXEJqBx+W4WvHES+0TKBlYLIAwzju6cOIjDVOpU1RF7zCs69BTkoUa7E/I9tkv8jhW+P0ja0fKfrEraZfeA+k2pMhDpvBIWGw9O+3RPAfN0hxqaZBefWc8tJBTHWXQ/TrG5gaepDzcoYSKzl9uCPET45uY0I= ARC-Message-Signature: i=2; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1755013694; c=relaxed/simple; bh=/kcuBel8AfZ9uWg+I8mDEBGOWP1P87sR4rCymJDU5dU=; h=From:To:Cc:Subject:Date:Message-ID:In-Reply-To:References: Content-Type:MIME-Version; b=Xspyocpssx8HaKCujJPsvxH0S3TvzoAKrXzR9YqrW56EE4RUFWapWvDRxxJm+vSRePDchNaGnFuGRAC6Yw2+qwkvwF2qzDcbgehAEJ5TpQ4oaIdM7rc12taHAjPZiIZuYyX8Yc6hfUaSnBMbDLSysupkhedSsIkBwcftydCt9oA= ARC-Authentication-Results: i=2; smtp.subspace.kernel.org; dmarc=pass (p=reject dis=none) header.from=oracle.com; spf=pass smtp.mailfrom=oracle.com; dkim=pass (2048-bit key) header.d=oracle.com header.i=@oracle.com header.b=RA4RA8Xz; dkim=pass (1024-bit key) header.d=oracle.onmicrosoft.com header.i=@oracle.onmicrosoft.com header.b=zW/Ue0YC; arc=fail smtp.client-ip=205.220.177.32 Authentication-Results: smtp.subspace.kernel.org; dmarc=pass (p=reject dis=none) header.from=oracle.com Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=oracle.com Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=oracle.com header.i=@oracle.com header.b="RA4RA8Xz"; dkim=pass (1024-bit key) header.d=oracle.onmicrosoft.com header.i=@oracle.onmicrosoft.com header.b="zW/Ue0YC" Received: from pps.filterd (m0333520.ppops.net [127.0.0.1]) by mx0b-00069f02.pphosted.com (8.18.1.2/8.18.1.2) with ESMTP id 57CDC09Y015993; Tue, 12 Aug 2025 15:47:33 GMT DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=oracle.com; h=cc :content-transfer-encoding:content-type:date:from:in-reply-to :message-id:mime-version:references:subject:to; s= corp-2025-04-25; bh=RBhLiraoB2T2DKQeMEXAqouspW3wBSInMRRtPVdA47o=; b= RA4RA8Xz1DPmDro2SbUpz5hbfJS03bDfzLvi0tcszzvrpGEhsc1Kv9S/QyyNYyRC CM9M0Zk/sp2PpC/EttF+KUqU1yLkKmPTVaN7CDHfkmUT4z7G3pSokLAWsrvIG2id RiBTWQvybJYfAAQNAqr9iOOsWksbUjNVotXXwr/5oX7qYFERmj/aWIODVEdko/Hf bKsgpShwpkbD/6TBdsmWgtIpoQJHYpE6hrHgIAihsBv7YQpYQMEVlmy/BAD6rNjd sAnejYGU5ZRYn8ZUIvruLT7uhfUksLa+Rws2TF2xIsy2ZRKwI4escgk4U8uZPk9i Vtm9/OZDCiUNyLnXGV4Uzg== Received: from phxpaimrmta01.imrmtpd1.prodappphxaev1.oraclevcn.com (phxpaimrmta01.appoci.oracle.com [138.1.114.2]) by mx0b-00069f02.pphosted.com (PPS) with ESMTPS id 48dxcf53kt-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK); Tue, 12 Aug 2025 15:47:33 +0000 (GMT) Received: from pps.filterd (phxpaimrmta01.imrmtpd1.prodappphxaev1.oraclevcn.com [127.0.0.1]) by phxpaimrmta01.imrmtpd1.prodappphxaev1.oraclevcn.com (8.18.1.2/8.18.1.2) with ESMTP id 57CEfKQF032734; Tue, 12 Aug 2025 15:47:32 GMT Received: from nam12-mw2-obe.outbound.protection.outlook.com (mail-mw2nam12on2042.outbound.protection.outlook.com [40.107.244.42]) by phxpaimrmta01.imrmtpd1.prodappphxaev1.oraclevcn.com (PPS) with ESMTPS id 48dvsa54g9-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK); Tue, 12 Aug 2025 15:47:32 +0000 ARC-Seal: i=1; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=none; b=vGWrssWz9zJZjOlgb2cNWSXdiaVl6XpyN58QvQd+FkSRiStnv/X1qlxwsTA2o2DszBZTHgXbTRfhKjLrswzsg8tg5x5+i5kRX1SbaMyzqrB+doxQhm9Rot0VRl1JZ6SNbhB8KrmRaQM6QnVOvaDIcZlbvzSeENOOjCmRX/5Wa4ZW4a3m0630G8bmb0yEYUYlN3q529dAqb688fPQ9iF2XioujlBaaCnuFPtAKdxPJQC9eNAnnSckEPnjlPFfNH/Xk0QoAnpGNzYAlvGXmFuX7VIcvYv5O5mAC6qnNCwRhifaODoBQjNZmgI8eTwRuaXP6EEhyG2igDrM1UC3OY7xHQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector10001; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=RBhLiraoB2T2DKQeMEXAqouspW3wBSInMRRtPVdA47o=; b=cc2JmCX82IOH0qfjHu+u4vgJb7/DyQFyCui21eBWD8SGI1K07MEDXNEUIv5gPguGn375bmBQ7iAylqdo/L/Rzn/cXE/KjeVU3MD7yPm3evfj/U1BwqHhh4XLYF3Y6mf0in+M4rldFCMdHokWziqE5ZU+VmWifDb/DmUQQkPsVY9unSbBFT5miObCa8AXkHjsi6Q7MNnDzgWz39AQSEdPIjF1SRAFusJSwZDecWEFP5JW5VxDp5Yh5z9/YwfamkbEovWSNoZYn60rME/jUih6h8lhEkBZk16EJhruhuBOJ0v8iEqEb+IP4C11SkNeG+LVrhCpPgL95YRLFh5R+pcwlg== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=oracle.com; dmarc=pass action=none header.from=oracle.com; dkim=pass header.d=oracle.com; arc=none DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=oracle.onmicrosoft.com; s=selector2-oracle-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=RBhLiraoB2T2DKQeMEXAqouspW3wBSInMRRtPVdA47o=; b=zW/Ue0YCSFZ/idbXnp6sFYe9J1b0BGwEjJbqVya9P5rIpznp780hXYXF+xyPdjD2rEv/kpnJpN0Ob0+0eq/onPzr5XjlwKEGMK4dOk9dCPqudfqxDg0xh+jCHlkHwGwzHl6Gi0lGhcF2Bj0eDGKltPHhfJsu080L/8lCtmk51sU= Received: from DM4PR10MB8218.namprd10.prod.outlook.com (2603:10b6:8:1cc::16) by SN7PR10MB6329.namprd10.prod.outlook.com (2603:10b6:806:273::20) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.9009.21; Tue, 12 Aug 2025 15:47:28 +0000 Received: from DM4PR10MB8218.namprd10.prod.outlook.com ([fe80::2650:55cf:2816:5f2]) by DM4PR10MB8218.namprd10.prod.outlook.com ([fe80::2650:55cf:2816:5f2%5]) with mapi id 15.20.9031.012; Tue, 12 Aug 2025 15:47:28 +0000 From: Lorenzo Stoakes To: Andrew Morton Cc: Alexander Gordeev , Gerald Schaefer , Heiko Carstens , Vasily Gorbik , Christian Borntraeger , Sven Schnelle , "David S . Miller" , Andreas Larsson , Dave Hansen , Andy Lutomirski , Peter Zijlstra , Thomas Gleixner , Ingo Molnar , Borislav Petkov , "H . Peter Anvin" , Alexander Viro , Christian Brauner , Jan Kara , Kees Cook , David Hildenbrand , Zi Yan , Baolin Wang , "Liam R . Howlett" , Nico Pache , Ryan Roberts , Dev Jain , Barry Song , Xu Xin , Chengming Zhou , Vlastimil Babka , Mike Rapoport , Suren Baghdasaryan , Michal Hocko , David Rientjes , Shakeel Butt , Arnaldo Carvalho de Melo , Namhyung Kim , Mark Rutland , Alexander Shishkin , Jiri Olsa , Ian Rogers , Adrian Hunter , Kan Liang , Masami Hiramatsu , Oleg Nesterov , Juri Lelli , Vincent Guittot , Dietmar Eggemann , Steven Rostedt , Ben Segall , Mel Gorman , Valentin Schneider , Jason Gunthorpe , John Hubbard , Peter Xu , Jann Horn , Pedro Falcato , Matthew Wilcox , Mateusz Guzik , linux-s390@vger.kernel.org, linux-kernel@vger.kernel.org, sparclinux@vger.kernel.org, linux-fsdevel@vger.kernel.org, linux-mm@kvack.org, linux-trace-kernel@vger.kernel.org, linux-perf-users@vger.kernel.org Subject: [PATCH 01/10] mm: add bitmap mm->flags field Date: Tue, 12 Aug 2025 16:44:10 +0100 Message-ID: <9de8dfd9de8c95cd31622d6e52051ba0d1848f5a.1755012943.git.lorenzo.stoakes@oracle.com> X-Mailer: git-send-email 2.50.1 In-Reply-To: References: Content-Transfer-Encoding: quoted-printable X-ClientProxiedBy: GV2PEPF00003827.SWEP280.PROD.OUTLOOK.COM (2603:10a6:144:1:0:5:0:6) To DM4PR10MB8218.namprd10.prod.outlook.com (2603:10b6:8:1cc::16) Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 X-MS-PublicTrafficType: Email X-MS-TrafficTypeDiagnostic: DM4PR10MB8218:EE_|SN7PR10MB6329:EE_ X-MS-Office365-Filtering-Correlation-Id: 4c2eac0d-42e1-4809-6e7e-08ddd9b78a7a X-MS-Exchange-SenderADCheck: 1 X-MS-Exchange-AntiSpam-Relay: 0 X-Microsoft-Antispam: BCL:0;ARA:13230040|1800799024|376014|7416014|366016; X-Microsoft-Antispam-Message-Info: =?us-ascii?Q?6QIgemlIVx1AG6WbCyOTXd5FNiyqhSSpuGFE8+evn8LKeV6D1ICnrzVkSdwk?= =?us-ascii?Q?WkmC4ByS2c26rlJMtFTxkwICSai2fWz0gT1uuSsvmBg2NXq0oRcy5gg6xiO9?= =?us-ascii?Q?lRRcsxTy1JqWPBGBOAyVbWTLlylzIxaGbC3iUEpPPMIH0Z+tPmyjmHTHFaHF?= =?us-ascii?Q?2LO0Ev4BWAGcGOd9mLmr9LtAeN26ugappBF4BhMBwADJ0pCdXA6zWUXvGKQ/?= =?us-ascii?Q?Cfl9TKyoUhN8Yu7M8+QDyZLTm33TGCuzMd1JCX1TVtr0kDru/acX0sjdZPtb?= =?us-ascii?Q?zRumoB2fML2CWS1J7dbtPO2E9DxkAdg5rHUjyRIIfqa2o+ZI+SV3acVH6hfm?= =?us-ascii?Q?LDBSe1WMSKUJn0VERiDlYnYYi3RV7R58bfhIYU9vRrF2nrGFih8u90hStfsr?= =?us-ascii?Q?Plxm5HZ8mVVeBIAiUGAdd7uMNxD1WZWdOXe0mX5XGqFAObxs8PjcCF3lcPua?= =?us-ascii?Q?AgMYbA7KleRE+M0Jmw2lDDffY6apyjs3hgva/wHVZkkRUaio7Hr6mnDDhMCR?= =?us-ascii?Q?uWySTcq7jkm8/Jer0dz8l8/KIAEyj/9ozqZHbAA+Yt0uiQeOX3Q/IS47niZS?= =?us-ascii?Q?mdgy4D5TtYObNHy73+MzmU2LbrISeYHcdxZs35UEkQFGjM0dQgQXEZYZp0r9?= =?us-ascii?Q?IkrA2GX8Vm/+vcpQmaOyDGS6ujOiJbVQZnflOhE/0cQ3x/L1Dgdnn3Z/w+AT?= =?us-ascii?Q?Ngtw+NMzGLHNy4449K0gXZnIoDUA6T30B+7JmxAIpPsRWE0S/wAJq7BLxkgv?= =?us-ascii?Q?/Fv2PZgGr1CCUtbb3BP7Dg/xdsqYNs5CNKatIgGZ1VXz2r5HVHK23aadPiGs?= =?us-ascii?Q?P0fgmMHQsWWt1pn7JbuwScn8YuRzl/mhiqqZENXE9MGLPaaf18xKGQQRBrap?= =?us-ascii?Q?2Yg75UG870DllGJz/3LsTEr6+2Ii8yIeATmLL3ZPT7zaYcZA2Rtozoy7PZRh?= =?us-ascii?Q?SEUgEuo8knGXHaoqNUl2+mS8JMsN3/WVX0ayg47SyQ9anr6mmXZ0sEyL8fPx?= =?us-ascii?Q?o/clM/d5vJToeaxa/cNJUDoSMaH7m+SNdLugRu9MVYovdtPq+t9CuML8XLd5?= =?us-ascii?Q?j5x0racxVTnJzjsgYvinsX2jEWLoo3hSD3QIn8ObAVoCy4cF0yQ8P8TThHn8?= =?us-ascii?Q?jEzFagAgr6YUVLEbeB3JxoZe7W0tIxw6Uqm8nK95Z5GqLaeBuT3pzlq6fDDV?= =?us-ascii?Q?yjlY8HPwqOJMhmexDOxuCJMcWqBNnAGrhvCW5d49kroX/SuwDKPyWWh4vg8P?= =?us-ascii?Q?WnuXicH7hKMFjKHJICy/B3Q+n2fBlKqdehN3CsTq+6R4w/cOEUuXWG3dV9dI?= =?us-ascii?Q?9DFjmE8qoQeaQZv+PqMCmJSQQEcw4GGaS9sczf9kG0k+BcplCdZZsabvc/RJ?= =?us-ascii?Q?KzVs3h6kGkT20ZCvXIX7QzGZA2N1hU0eGqhk0bd65mqb3CpockMoq0M/8HzV?= =?us-ascii?Q?8F58ekLbWko=3D?= X-Forefront-Antispam-Report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:DM4PR10MB8218.namprd10.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230040)(1800799024)(376014)(7416014)(366016);DIR:OUT;SFP:1101; X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1 X-MS-Exchange-AntiSpam-MessageData-0: =?us-ascii?Q?D5qn/y64FjlL1umbiXCu12RGMJJuj/ZzHtBFyJnfRcOSTcvKYNrUITOUkTub?= =?us-ascii?Q?Dx9kcDsLQmUd7TchbrM11DSloEiezYLOYQtIOgbxpgE0a8GqPtWYi7uf4rqF?= =?us-ascii?Q?XxYKRs8jy88FIDV2361GVhG9EZvo0e6STNt+eWEyagTCc0C8e07Q7ty6+RgJ?= =?us-ascii?Q?V8sdBUPguwmVPLDPRS3Sf1LewjMdOjPU5Ig1Pe4P4nVlla2abvTqwAJJaPim?= =?us-ascii?Q?UDl9rpq2JDEAWTDOtMHrjAkwUo76hNzT8Zg2stfUby3J1AZKUf3IDwBchQEX?= =?us-ascii?Q?xfQCXppEUrEPlHTrYuux2FYtM/k2kXj02QllWUcAv62i+5Gqje+70E4z8tp0?= =?us-ascii?Q?PAnIhK8gcPi7D/Q7sJoKhoDBkM31UTUn15F4r9vQ2pLH0vw9jtxZfjNHbUbe?= =?us-ascii?Q?Q3+aDkToeJfdhqIyKHH93O/eO/VeEUlmu59s5z5QJ1wNUGexkuoqc123Dq2F?= =?us-ascii?Q?PvNVodZu13Igdj5+LR149dRO30XkeCYyQZ8hg1zweAnMqi5s22cYLivTUKOF?= =?us-ascii?Q?YGSOQJhTYaTQeM7FbLxKn62oGqvVaq6ujIe7te7hOcesZHknsaUsmXEY4Lo/?= =?us-ascii?Q?bUA3QRSZDYFGTxR5MAcc6Bm5sgeDMsjqyorC6dHEIqu79AfQr0MKMq18s7A5?= =?us-ascii?Q?Hc3omX/a4nUQ1Zuj0HqoijCvs3TIuCl4taHSnsrkBbW/VGue6bZZ4tgz6935?= =?us-ascii?Q?ck0QcEhhEi8e5fcx7VGzTXZgDAfT7lG2edNCwmiv8WnFMUw8yPglGGfzv4iG?= =?us-ascii?Q?dGfTM/F1g3+v2KC04/QAEdbLeR8Mcyw9jWe8NKzOXYHxiPyhds3J+XahJCTk?= =?us-ascii?Q?x3Kjc6euxcEqcI9gdPM8/slNY2csf6a0S5/xt4Cg1Z5WPX4BPifkUWS7NlKJ?= =?us-ascii?Q?lNJkgN0mo7XhKj7xCdiONwJSCm6H/1UqrvIeu6aqTQ8VMofq2bxN3NWQYmUW?= =?us-ascii?Q?GXe5mjzwqA8T4AazKdrdGUMGhzBSb2207j80ifz2TmyMx8r4Qv07qYuQmNi9?= =?us-ascii?Q?Gct3QeSG2c8zN6X3kmZXLNEtPQ8GjytLS2EB0SFV1KrrG2QT1lWmkmQ/ft4i?= =?us-ascii?Q?o3/mNIsuv+jXfNi/zjNlpiTkilc5bqVSfI3WJ4ZoW8zTn8pavXySblxePybx?= =?us-ascii?Q?DGGWYkbqC9DDtynCs4eYMYySNQTDQYSh7BlgK65L4O/7hyL1IwAPC8M2dtJG?= =?us-ascii?Q?+AjNo9DVTJ02m8ZhoTXy+Rxq4TJ9OHaxmgWQJfSEa75kbp94VsPEAav0tyS1?= =?us-ascii?Q?d6JB5JUXfO6E2qP6uBy/VbwgP1IwzPzRkwk2wo6Lg5m2bhh6y7c3334hs0zc?= =?us-ascii?Q?M4YI//Rbjkon8TAg3Hn9nxHkwp1O8ICE1dEoby/CYmHC0cC2zYV9RxXB9aLh?= =?us-ascii?Q?7kQLdNnvcB3YDqODfoJDGGTt3oGcNHfufgtE8EzuJsGKBdmQ1lSt3H5jFE7b?= =?us-ascii?Q?xVfe8XKs9/HJlO19wdCOUDcLzznzd+ev3Isr5360NR6X6isHKJCrDNSqVAgJ?= =?us-ascii?Q?aDgRPRHbuzihD1ilZ3dgj687wOivjUk74br9lvh3X54UqKQJmk2SUKIwErAX?= =?us-ascii?Q?ESCFdZoaqBV/2afxTW8OmclnErl0FjwYlEVUULqwnND7Eju/jQsAnrQeWniS?= =?us-ascii?Q?AA=3D=3D?= X-MS-Exchange-AntiSpam-ExternalHop-MessageData-ChunkCount: 1 X-MS-Exchange-AntiSpam-ExternalHop-MessageData-0: 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 X-OriginatorOrg: oracle.com X-MS-Exchange-CrossTenant-Network-Message-Id: 4c2eac0d-42e1-4809-6e7e-08ddd9b78a7a X-MS-Exchange-CrossTenant-AuthSource: DM4PR10MB8218.namprd10.prod.outlook.com X-MS-Exchange-CrossTenant-AuthAs: Internal X-MS-Exchange-CrossTenant-OriginalArrivalTime: 12 Aug 2025 15:47:28.3022 (UTC) X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted X-MS-Exchange-CrossTenant-Id: 4e2c6054-71cb-48f1-bd6c-3a9705aca71b X-MS-Exchange-CrossTenant-MailboxType: HOSTED X-MS-Exchange-CrossTenant-UserPrincipalName: ZX/UzCyytmcCiUNwlQsuUZsthRiL3wey7PVZCLuIfDbOCuGWanK183Qr1QY7Fvws91WL3cotbiQt8QzavAdpy9fQEnkZZgp08IAt0JCdFSo= X-MS-Exchange-Transport-CrossTenantHeadersStamped: SN7PR10MB6329 X-Proofpoint-Virus-Version: vendor=baseguard engine=ICAP:2.0.293,Aquarius:18.0.1099,Hydra:6.1.9,FMLib:17.12.80.40 definitions=2025-08-12_07,2025-08-11_01,2025-03-28_01 X-Proofpoint-Spam-Details: rule=notspam policy=default score=0 phishscore=0 adultscore=0 malwarescore=0 spamscore=0 bulkscore=0 mlxlogscore=629 mlxscore=0 suspectscore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.12.0-2507300000 definitions=main-2508120152 X-Proofpoint-GUID: wPfyRZnAJroBCTKWL7YxEcON6-WBtGNS X-Proofpoint-Spam-Details-Enc: AW1haW4tMjUwODEyMDE1MiBTYWx0ZWRfX+dIsU7pEqjrL g8A02t+kPVAb9pz5XbzrIY6YijW9XfnFGFdFNa6+/tsPywgEnhGhKJxAyZB4tbgIWUrNznh7V6z 5G7AZ4iNitzRRHu/r77fI3eAITuL/YruJsJ/AVOsu+tu6m55hr6pSsvuZmK9Wdou21tGdP2tdXD 9k2C90sXuCGC7brzbD3J4zunDHlGTkpjJvNQmxBSpDeruJWtmT3uRJqSUXL9JNe2diny9rBfu4/ y+D0KfSd3Zamndhf3C1vFMcpt1BOsTlJHlZaTl6wPLDGjmAFMUQWHFYLEPbJq9tVtV/NwEgTB1o zpAE7laYvtjXMs64xk+678dFKFkO8OWeKmeSXi+KoH7XsxzxATRTru8r6XeBHI+muI4g3DH6hgc o3gFdrEGPREU939RVrRvI9bSjR6E25Z5GrHehAe3WWJDrD3LWU1OJV2dUElsepS4S7SksIT1 X-Authority-Analysis: v=2.4 cv=W8M4VQWk c=1 sm=1 tr=0 ts=689b6215 cx=c_pps a=XiAAW1AwiKB2Y8Wsi+sD2Q==:117 a=XiAAW1AwiKB2Y8Wsi+sD2Q==:17 a=6eWqkTHjU83fiwn7nKZWdM+Sl24=:19 a=z/mQ4Ysz8XfWz/Q5cLBRGdckG28=:19 a=lCpzRmAYbLLaTzLvsPZ7Mbvzbb8=:19 a=wKuvFiaSGQ0qltdbU6+NXLB8nM8=:19 a=Ol13hO9ccFRV9qXi2t6ftBPywas=:19 a=xqWC_Br6kY4A:10 a=2OwXVqhp2XgA:10 a=GoEa3M9JfhUA:10 a=yPCof4ZbAAAA:8 a=mgqRkMkFT7LrGRq-0ZgA:9 X-Proofpoint-ORIG-GUID: wPfyRZnAJroBCTKWL7YxEcON6-WBtGNS Content-Type: text/plain; charset="utf-8" We are currently in the bizarre situation where we are constrained on the number of flags we can set in an mm_struct based on whether this is a 32-bit or 64-bit kernel. This is because mm->flags is an unsigned long field, which is 32-bits on a 32-bit system and 64-bits on a 64-bit system. In order to keep things functional across both architectures, we do not permit mm flag bits to be set above flag 31 (i.e. the 32nd bit). This is a silly situation, especially given how profligate we are in storing metadata in mm_struct, so let's convert mm->flags into a bitmap and allow ourselves as many bits as we like. To keep things manageable, firstly we introduce the bitmap at a system word system as a new field mm->_flags, in union. This means the new bitmap mm->_flags is bitwise exactly identical to the existing mm->flags field. We have an opportunity to also introduce some type safety here, so let's wrap the mm flags field as a struct and declare it as an mm_flags_t typedef to keep it consistent with vm_flags_t for VMAs. We make the internal field privately accessible, in order to force the use of helper functions so we can enforce that accesses are bitwise as required. We therefore introduce accessors prefixed with mm_flags_*() for callers to use. We place the bit parameter first so as to match the parameter ordering of the *_bit() functions. Having this temporary union arrangement allows us to incrementally swap over users of mm->flags patch-by-patch rather than having to do everything in one fell swoop. Signed-off-by: Lorenzo Stoakes Acked-by: David Hildenbrand Reviewed-by: Liam R. Howlett --- include/linux/mm.h | 32 ++++++++++++++++++++++++++++++++ include/linux/mm_types.h | 39 ++++++++++++++++++++++++++++++++++++++- 2 files changed, 70 insertions(+), 1 deletion(-) diff --git a/include/linux/mm.h b/include/linux/mm.h index 3868ca1a25f9..4ed4a0b9dad6 100644 --- a/include/linux/mm.h +++ b/include/linux/mm.h @@ -34,6 +34,8 @@ #include #include #include +#include +#include =20 struct mempolicy; struct anon_vma; @@ -720,6 +722,36 @@ static inline void assert_fault_locked(struct vm_fault= *vmf) } #endif /* CONFIG_PER_VMA_LOCK */ =20 +static inline bool mm_flags_test(int flag, const struct mm_struct *mm) +{ + return test_bit(flag, ACCESS_PRIVATE(&mm->_flags, __mm_flags)); +} + +static inline bool mm_flags_test_and_set(int flag, struct mm_struct *mm) +{ + return test_and_set_bit(flag, ACCESS_PRIVATE(&mm->_flags, __mm_flags)); +} + +static inline bool mm_flags_test_and_clear(int flag, struct mm_struct *mm) +{ + return test_and_clear_bit(flag, ACCESS_PRIVATE(&mm->_flags, __mm_flags)); +} + +static inline void mm_flags_set(int flag, struct mm_struct *mm) +{ + set_bit(flag, ACCESS_PRIVATE(&mm->_flags, __mm_flags)); +} + +static inline void mm_flags_clear(int flag, struct mm_struct *mm) +{ + clear_bit(flag, ACCESS_PRIVATE(&mm->_flags, __mm_flags)); +} + +static inline void mm_flags_clear_all(struct mm_struct *mm) +{ + bitmap_zero(ACCESS_PRIVATE(&mm->_flags, __mm_flags), NUM_MM_FLAG_BITS); +} + extern const struct vm_operations_struct vma_dummy_vm_ops; =20 static inline void vma_init(struct vm_area_struct *vma, struct mm_struct *= mm) diff --git a/include/linux/mm_types.h b/include/linux/mm_types.h index cf94df4955c7..46d3fb8935c7 100644 --- a/include/linux/mm_types.h +++ b/include/linux/mm_types.h @@ -20,6 +20,7 @@ #include #include #include +#include =20 #include =20 @@ -927,6 +928,15 @@ struct mm_cid { }; #endif =20 +/* + * Opaque type representing current mm_struct flag state. Must be accessed= via + * mm_flags_xxx() helper functions. + */ +#define NUM_MM_FLAG_BITS BITS_PER_LONG +typedef struct { + __private DECLARE_BITMAP(__mm_flags, NUM_MM_FLAG_BITS); +} mm_flags_t; + struct kioctx_table; struct iommu_mm_data; struct mm_struct { @@ -1109,7 +1119,11 @@ struct mm_struct { /* Architecture-specific MM context */ mm_context_t context; =20 - unsigned long flags; /* Must use atomic bitops to access */ + /* Temporary union while we convert users to mm_flags_t. */ + union { + unsigned long flags; /* Must use atomic bitops to access */ + mm_flags_t _flags; /* Must use mm_flags_* helpers to access */ + }; =20 #ifdef CONFIG_AIO spinlock_t ioctx_lock; @@ -1219,6 +1233,29 @@ struct mm_struct { unsigned long cpu_bitmap[]; }; =20 +/* Read the first system word of mm flags, non-atomically. */ +static inline unsigned long __mm_flags_get_word(struct mm_struct *mm) +{ + unsigned long *bitmap =3D ACCESS_PRIVATE(&mm->_flags, __mm_flags); + + return bitmap_read(bitmap, 0, BITS_PER_LONG); +} + +/* Set the first system word of mm flags, non-atomically. */ +static inline void __mm_flags_set_word(struct mm_struct *mm, + unsigned long value) +{ + unsigned long *bitmap =3D ACCESS_PRIVATE(&mm->_flags, __mm_flags); + + bitmap_copy(bitmap, &value, BITS_PER_LONG); +} + +/* Obtain a read-only view of the bitmap. */ +static inline const unsigned long *__mm_flags_get_bitmap(const struct mm_s= truct *mm) +{ + return (const unsigned long *)ACCESS_PRIVATE(&mm->_flags, __mm_flags); +} + #define MM_MT_FLAGS (MT_FLAGS_ALLOC_RANGE | MT_FLAGS_LOCK_EXTERN | \ MT_FLAGS_USE_RCU) extern struct mm_struct init_mm; --=20 2.50.1 From nobody Sat Oct 4 20:52:45 2025 Received: from mx0a-00069f02.pphosted.com (mx0a-00069f02.pphosted.com [205.220.165.32]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id ED5DA30AAC0; Tue, 12 Aug 2025 15:48:19 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=fail smtp.client-ip=205.220.165.32 ARC-Seal: i=2; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1755013702; cv=fail; b=GWgPzWFFcVvWjoaw0p50p1Qp93IcOTUkoYZwG9ks2rxuZaICDTmUi24/SiELMfyppAv/MOBBEl9CBSFpb1w475Oury28e5Vbidc1Z0vutgVFs+I7sC/3NbMw/d68BxTqxaAaXWRSsFoXihecKtS6J7+UyrFYvEPX6jYGx9FNbSM= ARC-Message-Signature: i=2; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1755013702; c=relaxed/simple; bh=NEoIhXNxv6GAtIjIEIunznxdbs5Zidu+m8WxkAl4U7k=; h=From:To:Cc:Subject:Date:Message-ID:In-Reply-To:References: Content-Type:MIME-Version; b=F8p+7aGsgZPhZ/XXMs0kbASTrK0UM0jCCYHpj2qiySSJ8NZPvMheenkLluFHXPMxAZFh5e846FEU88f96xlyHir2UByggzAkB/p9l5LggkW1UhBv57ZxoO9SNpXlaQ8WS6B+zZ6YabRRy+wR6jlhkUhpKi5uEj0L8MukhB2ORjE= ARC-Authentication-Results: i=2; smtp.subspace.kernel.org; dmarc=pass (p=reject dis=none) header.from=oracle.com; spf=pass smtp.mailfrom=oracle.com; dkim=pass (2048-bit key) header.d=oracle.com header.i=@oracle.com header.b=cAZGbHLq; dkim=pass (1024-bit key) header.d=oracle.onmicrosoft.com header.i=@oracle.onmicrosoft.com header.b=WjL/KqSh; arc=fail smtp.client-ip=205.220.165.32 Authentication-Results: smtp.subspace.kernel.org; dmarc=pass (p=reject dis=none) header.from=oracle.com Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=oracle.com Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=oracle.com header.i=@oracle.com header.b="cAZGbHLq"; dkim=pass (1024-bit key) header.d=oracle.onmicrosoft.com header.i=@oracle.onmicrosoft.com header.b="WjL/KqSh" Received: from pps.filterd (m0246629.ppops.net [127.0.0.1]) by mx0b-00069f02.pphosted.com (8.18.1.2/8.18.1.2) with ESMTP id 57CDC76X006416; Tue, 12 Aug 2025 15:47:37 GMT DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=oracle.com; h=cc :content-transfer-encoding:content-type:date:from:in-reply-to :message-id:mime-version:references:subject:to; s= corp-2025-04-25; bh=axqt4Jigtq9HdNTBq545zwaHLTgEbnTXiODYZ7GDfg8=; b= cAZGbHLqnQZYSSGf5i5gy2Zz96LnMoPkpvX0O6VJUa+wYsXf2gGmzaaCLbTUf23U 7eGkOsyoNA8x79z7sLGKMRvnqomYtn0yoO0B7PcLU0v2/d9DxWU3PygKaB/AaE1G bWCccxjtQH/ze5LQliBsUOLbCrYLzVhbbf7WzuvRm9jxer6gLlKFGUkmMQXMFgM9 VK43fDu7giEDILze75TTJKGOrrlHo/44yTykrD7BZZkq3b0RG+Afm7JRf2IiOWJl +HFqtz1HuU45ZJ+KopV/FOPF4Homt079/xsqrijxZok2UpEla2XXCdTrJUCTzkR3 T4K0zQPZXMF/IYn560lJZQ== Received: from phxpaimrmta02.imrmtpd1.prodappphxaev1.oraclevcn.com (phxpaimrmta02.appoci.oracle.com [147.154.114.232]) by mx0b-00069f02.pphosted.com (PPS) with ESMTPS id 48dx7dmx4b-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK); Tue, 12 Aug 2025 15:47:36 +0000 (GMT) Received: from pps.filterd (phxpaimrmta02.imrmtpd1.prodappphxaev1.oraclevcn.com [127.0.0.1]) by phxpaimrmta02.imrmtpd1.prodappphxaev1.oraclevcn.com (8.18.1.2/8.18.1.2) with ESMTP id 57CEYARh030376; Tue, 12 Aug 2025 15:47:35 GMT Received: from nam12-mw2-obe.outbound.protection.outlook.com (mail-mw2nam12on2079.outbound.protection.outlook.com [40.107.244.79]) by phxpaimrmta02.imrmtpd1.prodappphxaev1.oraclevcn.com (PPS) with ESMTPS id 48dvsa50f4-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK); Tue, 12 Aug 2025 15:47:35 +0000 ARC-Seal: i=1; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=none; b=czzlRTcnJhETPdXsZFClSRTUSnawW/KesEc50X90JCKT2LMh8aiFUpPfaEcNhEzVp/Pl4rC54n+JHOsHnHmDv4lQ1cT6GmuTCRCb6ozZw6w4N3VNcqW5dkzbhXQLzQudMI3zQSTEPjxM0lok15sCjNGbcY9fUOruXGg2yuMWk5mQTIz5WTJQdnVArB4O4oamP8UM5CtILCzXsDL81VHKSCPDZgnS0mz90VJ3ItqBeE9F72Bq6/ktrEjo0x0FYu/l2zZV4hsbW3mJ5b3mUaix1z2sk0iKAQBCO4usgNpDR9IW29Ml84Hb+VyHb07CtC5EhXn5FNoqkFw/mFPwdyIw0w== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector10001; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=axqt4Jigtq9HdNTBq545zwaHLTgEbnTXiODYZ7GDfg8=; b=KMguumGS0A+5okHj/qJQjKzEqtKNR6hfvEpp9Hq1VWxuaLy8qZHeAZSUUPHdk22fVnKrTJOpPtwrwzqT01Eb68wLpu3KtaxJuhPP41w9d37k3HHt7qxr95wXxvyUR4I/yATmdDE6OBASd9pjDmslQ8A6MmGBfNFcMKmP6Fb3rkv3woEbMgZiWLOqWbYL7cO7+NxBSwQP1w31+9aeV9JY0eArsykSGZt+yuydzjWAcnzxNh5I0dnl0Le7K1vCiXrfmqgEaHe/z3a56ClpmdMsd3SzEno95HeM6wcz4q9dSv7D5N7LtjsNBp6pnGhgf7RnnlJ/PBAuoV4spQu1tkgNHQ== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=oracle.com; dmarc=pass action=none header.from=oracle.com; dkim=pass header.d=oracle.com; arc=none DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=oracle.onmicrosoft.com; s=selector2-oracle-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=axqt4Jigtq9HdNTBq545zwaHLTgEbnTXiODYZ7GDfg8=; b=WjL/KqShuMpkDE7SX0brY7xMzyvstAUW/OOGLd8wlyEQ+yXEnTGLCapRXKJNBI2m1pkY33Dj7OFsTNWgeHDgKSwmo64rRS/zrwCk8N6vIWOUBrlg8AOJnWPNzEjBUw1LpPqPoXUQsec34CCRm7QD8Kt3YFfs/3gilpuRoQ4h1xQ= Received: from DM4PR10MB8218.namprd10.prod.outlook.com (2603:10b6:8:1cc::16) by SN7PR10MB6329.namprd10.prod.outlook.com (2603:10b6:806:273::20) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.9009.21; Tue, 12 Aug 2025 15:47:32 +0000 Received: from DM4PR10MB8218.namprd10.prod.outlook.com ([fe80::2650:55cf:2816:5f2]) by DM4PR10MB8218.namprd10.prod.outlook.com ([fe80::2650:55cf:2816:5f2%5]) with mapi id 15.20.9031.012; Tue, 12 Aug 2025 15:47:32 +0000 From: Lorenzo Stoakes To: Andrew Morton Cc: Alexander Gordeev , Gerald Schaefer , Heiko Carstens , Vasily Gorbik , Christian Borntraeger , Sven Schnelle , "David S . Miller" , Andreas Larsson , Dave Hansen , Andy Lutomirski , Peter Zijlstra , Thomas Gleixner , Ingo Molnar , Borislav Petkov , "H . Peter Anvin" , Alexander Viro , Christian Brauner , Jan Kara , Kees Cook , David Hildenbrand , Zi Yan , Baolin Wang , "Liam R . Howlett" , Nico Pache , Ryan Roberts , Dev Jain , Barry Song , Xu Xin , Chengming Zhou , Vlastimil Babka , Mike Rapoport , Suren Baghdasaryan , Michal Hocko , David Rientjes , Shakeel Butt , Arnaldo Carvalho de Melo , Namhyung Kim , Mark Rutland , Alexander Shishkin , Jiri Olsa , Ian Rogers , Adrian Hunter , Kan Liang , Masami Hiramatsu , Oleg Nesterov , Juri Lelli , Vincent Guittot , Dietmar Eggemann , Steven Rostedt , Ben Segall , Mel Gorman , Valentin Schneider , Jason Gunthorpe , John Hubbard , Peter Xu , Jann Horn , Pedro Falcato , Matthew Wilcox , Mateusz Guzik , linux-s390@vger.kernel.org, linux-kernel@vger.kernel.org, sparclinux@vger.kernel.org, linux-fsdevel@vger.kernel.org, linux-mm@kvack.org, linux-trace-kernel@vger.kernel.org, linux-perf-users@vger.kernel.org Subject: [PATCH 02/10] mm: convert core mm to mm_flags_*() accessors Date: Tue, 12 Aug 2025 16:44:11 +0100 Message-ID: <1eb2266f4408798a55bda00cb04545a3203aa572.1755012943.git.lorenzo.stoakes@oracle.com> X-Mailer: git-send-email 2.50.1 In-Reply-To: References: Content-Transfer-Encoding: quoted-printable X-ClientProxiedBy: GVZP280CA0014.SWEP280.PROD.OUTLOOK.COM (2603:10a6:150:272::7) To DM4PR10MB8218.namprd10.prod.outlook.com (2603:10b6:8:1cc::16) Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 X-MS-PublicTrafficType: Email X-MS-TrafficTypeDiagnostic: DM4PR10MB8218:EE_|SN7PR10MB6329:EE_ X-MS-Office365-Filtering-Correlation-Id: 364e8605-3e85-4709-8349-08ddd9b78c9c X-MS-Exchange-SenderADCheck: 1 X-MS-Exchange-AntiSpam-Relay: 0 X-Microsoft-Antispam: BCL:0;ARA:13230040|1800799024|376014|7416014|366016; X-Microsoft-Antispam-Message-Info: =?us-ascii?Q?k3tD0gmLpP+R5pej+SvibDlElOsSFnEUhXH3zAfWnHZZXzqog1e3ZhIzfcgf?= =?us-ascii?Q?66bzNSUD7+RcJA8rD4HLFTNgQEECwclDn0329Mme8NEwJ3XAPGN/HcVt2LWk?= =?us-ascii?Q?VJbOXc3qZ3VWNFO01ZG0nIRkHdsTaRqJ5FWGg1pWU/hL4yBt46RJcx8QwDbP?= =?us-ascii?Q?hD7aK8JeyYmakoPuQaGsJZoLHMnF9ZW2nLieVi7GUah3IHB47JxBudKRGZhw?= =?us-ascii?Q?FvHDMgkN1AcQUcGKpRWmvd7PNLCLhDUXaTo80PlKUPtQVyE2Tsm+/ZKwzrhw?= =?us-ascii?Q?T7ttw7xlJyExX7bW+VwDS6n7mzLAcE4tuHAJtTPnIJrcG5R3F7pLCTTJBSp6?= =?us-ascii?Q?VWwW/r10XY+33UVarDANshy1nZajDNG3g8gNlcYWKiHgOBXD4tWDuw2n4o5U?= =?us-ascii?Q?s+/amK0E4PM0O6Hx7HHwdckGv4doeE5HOwzM+Eofc259xvE3rZvHmUITHMmO?= =?us-ascii?Q?Y85V2mWCh3O7RoodQRLNXoBZU+Zk55m+JWfTTpb6yia19AHWT1Sua91O9SQW?= =?us-ascii?Q?5qM50uKsLxyFkyZP8OsdS3PyA5bZyF0JAGACCcFaLHGtmrnqg0Qd/NNemU/R?= =?us-ascii?Q?Ep/szXltKg9ppHTVmPcq1GGzO4ENrivUf/bHQVv99wiDiFdJPpHV3oNzaWCk?= =?us-ascii?Q?bpeM8iQNlXFw1EaGlG9qpsc7lgAjSPvXGoU6T7HFoZ3vpXfE5/3lvX9NceWo?= =?us-ascii?Q?0HbXXuqnYMlyKRcG2keI0yFcR55aKigKnhrS9p4WJch5u29nsf0+Zijii2rf?= =?us-ascii?Q?F0zk5MGr69chNi6g+YtGqAlG4bSxgjTZKq2tEblxFEr21f8mhNblequ4+LMT?= =?us-ascii?Q?ZsHDckeMNl0Mut0PdOpw9q8pYBsUfPAS456EIkNguY/Uk7blcmIWnpebdqAy?= =?us-ascii?Q?ErboP+Wm5ARO+nQh12Cdu4KXrF9BTI5rd4j49/cghNKHIz5gCbZWDidPDC0s?= =?us-ascii?Q?urQgz0VeexCJkxjwPOoGZvAk57TkbofS+cwSnOqB82qHbr4NNlVeKxDN6SOl?= =?us-ascii?Q?kCbphSwZDrA6jiat5ErtAm3/KlkVf8UD3RA6kHKz11JayAljTiFT3W8mW5VB?= =?us-ascii?Q?Lh8/uYE37ogrJcX0AAUqsXl8PWOW/RSfoKaLO647IvMgdPsW6968HBcEw1hb?= =?us-ascii?Q?p4tT7Prt+l4Hj9ykUhfJt3T//whVPLzKnuGvLGFHxBfPf5QU4ov7Ry5ceQhs?= =?us-ascii?Q?1qRmoGKJneB9roaO0L8HxM2lf2H2K4KbvlsmkNqgM901e/Z15w4MgO5ht+Ek?= =?us-ascii?Q?mHH9y3luqjbJLQ5e6s3P+5lhs7p+gYY9PaBVPdJnUaK/tKx3gUK//Ggstn3a?= =?us-ascii?Q?Y8BY2cUxGpkTkD5ak3bZQbFBQdeYjdYm1856btDSA+PH+MObww54OzxO775M?= =?us-ascii?Q?/Sz1Yek6T964rZq8y//OkSLDcuexD1Lr3qf1vutzzblbpVkIzA=3D=3D?= X-Forefront-Antispam-Report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:DM4PR10MB8218.namprd10.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230040)(1800799024)(376014)(7416014)(366016);DIR:OUT;SFP:1101; X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1 X-MS-Exchange-AntiSpam-MessageData-0: =?us-ascii?Q?8loGPCBAALfU3aLIs4PqcuRS2HXC2AlcpSzeq6Fy1Zwx5rtmSwyeB01sxMg5?= =?us-ascii?Q?W3hIxJgMGtYp1GpPa9gy4iQrPIe6EJbgWCOd55REzSOrXB40Dm2turg8ofma?= =?us-ascii?Q?t6NtEtRNG8SecnddWkNnU6zpdIAjz0fbGMAT7NCjFNhuvgSe9rQrtBf6X846?= =?us-ascii?Q?7W7Qa8zROihvXn3TUwIl4U1xkvF3p86rx/NNounjTW2MgMt0l/DMp7Bp5k6M?= =?us-ascii?Q?BkGFTSg3fGDtuMMSnnvTvkvObEyA5VwXXsijoKrnHeTuGovCPPT43FrUW9Zr?= =?us-ascii?Q?n+HeCG4FcUuNKm5tvUsEhln0MzdrboGCEgJ2EGeHNlISaL3sjfqY53Fd+tPD?= =?us-ascii?Q?3KhCuTWmro5Y1K2x6g6+Nm+VdykN55htFvJQjR5MMJxT7beWlyE2J2ULBGuj?= =?us-ascii?Q?Ma0PestllIECOMKDbHFY6pqc/958gjuWCDWmtwNmm+vJXsUjwfWKF6lP6lgW?= =?us-ascii?Q?tvH+CgrJlnWjzZKA78lvb/6Vj2dlKAf98JbseIJ0BLair0tLlqjIvy8OCdD2?= =?us-ascii?Q?VjcxdDv8Fj1XNnTJTakVmV/yoxpXu5MFj1pnzPS+Xd37M1dfdChNUk2TwtIn?= =?us-ascii?Q?5IjnSEq92ZYmt4DfuQU25PKX/B5xMuTqoMeddW41AQ6UnKZVRSQ5Vuck/1gW?= =?us-ascii?Q?dXS6cOYUf29K7PMMBc1gJ7UIjV+CheaJ3K6k8TNz8I7PoDeaijrVS8zTxDfH?= =?us-ascii?Q?S/JlrOTbeo0wOZX59v7Y4X5maL8m39N6lqCsjf35GeZfihbtGr8T8sJ6rNya?= =?us-ascii?Q?RihA8AyLWVoTbYDV1bUo3kOe9k9WgJXwJUhsTjIGnrFG4LWxmIWRIe1OUXHg?= =?us-ascii?Q?1o4vX+E6nQlV/ub2XuXBCC4+n/gNcbqfsiVy0Z5D8HHhktGuQMumHfwPHlsr?= =?us-ascii?Q?x9FM9RnUJxrgcHnugYsBMN8IFXEmFU35eGjZjLnLEp11dfWwYPLJnmSXOCfP?= =?us-ascii?Q?lJFZ0CdHbKETMCZMzLnwkQHF0W706fjTtwjqyHhYZAL3m9qI0N2gGfopZTlu?= =?us-ascii?Q?b8WmEc8KHmg5vrpKm/w/edvPyOinHfq4lZ5gRdGZLYE4aQW6+YoDENkVTJQE?= =?us-ascii?Q?G29XZRQ1JzXpnXynD1YDyf3PGD2Zvc8yBJhLlzuGmsCMAmEnsWmkRgOb3mm/?= =?us-ascii?Q?mKuwvYYDfW6RhiDZzeef/BqO9G1qL00+Rhs4QfI1OsqCNTAPLtyv3e3+dL3e?= =?us-ascii?Q?mDdzIVnjN/PDHaeNBXyv8gSGO3pygYi9wYRVbTVeKDn+OpLt/vNsiBO4EJK2?= =?us-ascii?Q?FGun5jy463gGjfQFotLeEIgbdLlFzSpP9NaBT0DhdfKfBxX8p/iqv4OuoCZL?= =?us-ascii?Q?PNR6TSzl1Ai+plrI3HA04l+3/QyI92oPQyVj2kVvfa0JfbVNIVHAejBMgBcf?= =?us-ascii?Q?sygDicdKMtbqbKSIAj6M3N0uvUwpE7tOTeKK9/MqUjZ4dgjCkX+DJt17oTD9?= =?us-ascii?Q?tdzfS+wmuXEYHxl5XDExHlU1SBRsq8LMBVPrcGIrToWLCWBZo4xmxgUYSe4B?= =?us-ascii?Q?7SO7ux96VCFUFy0ETE8SnHlP790M9DM9PLqXJFWnjRqm6sg6aQG3QFlR/OKh?= =?us-ascii?Q?nUG9Eg8ty0wnMufIqawwwzyFo//6pBjq3/NAbEdXnQvR7mo7c6I1N3gJ71OA?= =?us-ascii?Q?QA=3D=3D?= X-MS-Exchange-AntiSpam-ExternalHop-MessageData-ChunkCount: 1 X-MS-Exchange-AntiSpam-ExternalHop-MessageData-0: 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 X-OriginatorOrg: oracle.com X-MS-Exchange-CrossTenant-Network-Message-Id: 364e8605-3e85-4709-8349-08ddd9b78c9c X-MS-Exchange-CrossTenant-AuthSource: DM4PR10MB8218.namprd10.prod.outlook.com X-MS-Exchange-CrossTenant-AuthAs: Internal X-MS-Exchange-CrossTenant-OriginalArrivalTime: 12 Aug 2025 15:47:31.9183 (UTC) X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted X-MS-Exchange-CrossTenant-Id: 4e2c6054-71cb-48f1-bd6c-3a9705aca71b X-MS-Exchange-CrossTenant-MailboxType: HOSTED X-MS-Exchange-CrossTenant-UserPrincipalName: iEvMcqdhy+EqXpt9LhrXfYXC2KZrdm8uwidzryRL//6I3HzQfSL4DJ1vP2YlWyccdo63s6a+wdYJ6+wTsPn5bCSOka4oXYtRLmrRG1peSPU= X-MS-Exchange-Transport-CrossTenantHeadersStamped: SN7PR10MB6329 X-Proofpoint-Virus-Version: vendor=baseguard engine=ICAP:2.0.293,Aquarius:18.0.1099,Hydra:6.1.9,FMLib:17.12.80.40 definitions=2025-08-12_07,2025-08-11_01,2025-03-28_01 X-Proofpoint-Spam-Details: rule=notspam policy=default score=0 malwarescore=0 phishscore=0 adultscore=0 mlxscore=0 bulkscore=0 spamscore=0 mlxlogscore=999 suspectscore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.12.0-2507300000 definitions=main-2508120152 X-Proofpoint-ORIG-GUID: 12H9nH2U_juaHB_6SoGLpUiKX2aYr6TM X-Authority-Analysis: v=2.4 cv=WecMa1hX c=1 sm=1 tr=0 ts=689b6218 cx=c_pps a=OOZaFjgC48PWsiFpTAqLcw==:117 a=OOZaFjgC48PWsiFpTAqLcw==:17 a=6eWqkTHjU83fiwn7nKZWdM+Sl24=:19 a=z/mQ4Ysz8XfWz/Q5cLBRGdckG28=:19 a=lCpzRmAYbLLaTzLvsPZ7Mbvzbb8=:19 a=wKuvFiaSGQ0qltdbU6+NXLB8nM8=:19 a=Ol13hO9ccFRV9qXi2t6ftBPywas=:19 a=xqWC_Br6kY4A:10 a=2OwXVqhp2XgA:10 a=GoEa3M9JfhUA:10 a=yPCof4ZbAAAA:8 a=FullupDOrDUTRcva600A:9 X-Proofpoint-GUID: 12H9nH2U_juaHB_6SoGLpUiKX2aYr6TM X-Proofpoint-Spam-Details-Enc: AW1haW4tMjUwODEyMDE1MiBTYWx0ZWRfXxzDTgGibox1k sTWLU8PXwUmJYm9LsnV14pI+9wEArEWwWp14IwCKcUAZwgC3N6vslCoruu8KmHWm8WGypE0eo2t sjmrrf0EBbvXXom+nZIySZbiH00vOLTw5eS/MgO97NLND39MvoUYcg0/K8nlSQQSPPzI7kXwxQh YM+LPiGj9TN53ekcYY/0NGyPkfSGYBulpq9+xqqAh0OZMABQTG+ndsfb9MgOkTYn4rpJXToQ3mi qC1WG5gu77HDPzNzJuco2nKmTRSx6K5DW3iY6zboMqhPfAp80I9AcwwnFaMU2YyqlsymQTL73iw /PCIS8/hM0xJKb42BAPfaRln3iVnaAjfkwC9qJGZIelm3oQvpFjowc6FUD3gU/S5m7m9mAowHKV xoYpKTdIIPml6Ae0CNobNdyfjcVToCwnorhyt9NQ+5fM17y0ZpDuQQP6nqfUa0G1Bblvjz6C Content-Type: text/plain; charset="utf-8" As part of the effort to move to mm->flags becoming a bitmap field, convert existing users to making use of the mm_flags_*() accessors which will, when the conversion is complete, be the only means of accessing mm_struct flags. This will result in the debug output being that of a bitmap output, which will result in a minor change here, but since this is for debug only, this should have no bearing. Otherwise, no functional changes intended. Signed-off-by: Lorenzo Stoakes Acked-by: David Hildenbrand Reported-by: Chris Mason Reviewed-by: Baolin Wang Reviewed-by: Liam R. Howlett Reviewed-by: Mike Rapoport (Microsoft) --- include/linux/huge_mm.h | 2 +- include/linux/khugepaged.h | 6 ++++-- include/linux/ksm.h | 6 +++--- include/linux/mm.h | 2 +- include/linux/mman.h | 2 +- include/linux/oom.h | 2 +- mm/debug.c | 4 ++-- mm/gup.c | 10 +++++----- mm/huge_memory.c | 8 ++++---- mm/khugepaged.c | 10 +++++----- mm/ksm.c | 32 ++++++++++++++++---------------- mm/mmap.c | 8 ++++---- mm/oom_kill.c | 26 +++++++++++++------------- mm/util.c | 6 +++--- 14 files changed, 63 insertions(+), 61 deletions(-) diff --git a/include/linux/huge_mm.h b/include/linux/huge_mm.h index 14d424830fa8..84b7eebe0d68 100644 --- a/include/linux/huge_mm.h +++ b/include/linux/huge_mm.h @@ -327,7 +327,7 @@ static inline bool vma_thp_disabled(struct vm_area_stru= ct *vma, * example, s390 kvm. */ return (vm_flags & VM_NOHUGEPAGE) || - test_bit(MMF_DISABLE_THP, &vma->vm_mm->flags); + mm_flags_test(MMF_DISABLE_THP, vma->vm_mm); } =20 static inline bool thp_disabled_by_hw(void) diff --git a/include/linux/khugepaged.h b/include/linux/khugepaged.h index ff6120463745..eb1946a70cff 100644 --- a/include/linux/khugepaged.h +++ b/include/linux/khugepaged.h @@ -2,6 +2,8 @@ #ifndef _LINUX_KHUGEPAGED_H #define _LINUX_KHUGEPAGED_H =20 +#include + extern unsigned int khugepaged_max_ptes_none __read_mostly; #ifdef CONFIG_TRANSPARENT_HUGEPAGE extern struct attribute_group khugepaged_attr_group; @@ -20,13 +22,13 @@ extern int collapse_pte_mapped_thp(struct mm_struct *mm= , unsigned long addr, =20 static inline void khugepaged_fork(struct mm_struct *mm, struct mm_struct = *oldmm) { - if (test_bit(MMF_VM_HUGEPAGE, &oldmm->flags)) + if (mm_flags_test(MMF_VM_HUGEPAGE, oldmm)) __khugepaged_enter(mm); } =20 static inline void khugepaged_exit(struct mm_struct *mm) { - if (test_bit(MMF_VM_HUGEPAGE, &mm->flags)) + if (mm_flags_test(MMF_VM_HUGEPAGE, mm)) __khugepaged_exit(mm); } #else /* CONFIG_TRANSPARENT_HUGEPAGE */ diff --git a/include/linux/ksm.h b/include/linux/ksm.h index c17b955e7b0b..22e67ca7cba3 100644 --- a/include/linux/ksm.h +++ b/include/linux/ksm.h @@ -56,13 +56,13 @@ static inline long mm_ksm_zero_pages(struct mm_struct *= mm) static inline void ksm_fork(struct mm_struct *mm, struct mm_struct *oldmm) { /* Adding mm to ksm is best effort on fork. */ - if (test_bit(MMF_VM_MERGEABLE, &oldmm->flags)) + if (mm_flags_test(MMF_VM_MERGEABLE, oldmm)) __ksm_enter(mm); } =20 static inline int ksm_execve(struct mm_struct *mm) { - if (test_bit(MMF_VM_MERGE_ANY, &mm->flags)) + if (mm_flags_test(MMF_VM_MERGE_ANY, mm)) return __ksm_enter(mm); =20 return 0; @@ -70,7 +70,7 @@ static inline int ksm_execve(struct mm_struct *mm) =20 static inline void ksm_exit(struct mm_struct *mm) { - if (test_bit(MMF_VM_MERGEABLE, &mm->flags)) + if (mm_flags_test(MMF_VM_MERGEABLE, mm)) __ksm_exit(mm); } =20 diff --git a/include/linux/mm.h b/include/linux/mm.h index 4ed4a0b9dad6..34311ebe62cc 100644 --- a/include/linux/mm.h +++ b/include/linux/mm.h @@ -1949,7 +1949,7 @@ static inline bool folio_needs_cow_for_dma(struct vm_= area_struct *vma, { VM_BUG_ON(!(raw_read_seqcount(&vma->vm_mm->write_protect_seq) & 1)); =20 - if (!test_bit(MMF_HAS_PINNED, &vma->vm_mm->flags)) + if (!mm_flags_test(MMF_HAS_PINNED, vma->vm_mm)) return false; =20 return folio_maybe_dma_pinned(folio); diff --git a/include/linux/mman.h b/include/linux/mman.h index de9e8e6229a4..0ba8a7e8b90a 100644 --- a/include/linux/mman.h +++ b/include/linux/mman.h @@ -201,7 +201,7 @@ static inline bool arch_memory_deny_write_exec_supporte= d(void) static inline bool map_deny_write_exec(unsigned long old, unsigned long ne= w) { /* If MDWE is disabled, we have nothing to deny. */ - if (!test_bit(MMF_HAS_MDWE, ¤t->mm->flags)) + if (!mm_flags_test(MMF_HAS_MDWE, current->mm)) return false; =20 /* If the new VMA is not executable, we have nothing to deny. */ diff --git a/include/linux/oom.h b/include/linux/oom.h index 1e0fc6931ce9..7b02bc1d0a7e 100644 --- a/include/linux/oom.h +++ b/include/linux/oom.h @@ -91,7 +91,7 @@ static inline bool tsk_is_oom_victim(struct task_struct *= tsk) */ static inline vm_fault_t check_stable_address_space(struct mm_struct *mm) { - if (unlikely(test_bit(MMF_UNSTABLE, &mm->flags))) + if (unlikely(mm_flags_test(MMF_UNSTABLE, mm))) return VM_FAULT_SIGBUS; return 0; } diff --git a/mm/debug.c b/mm/debug.c index b4388f4dcd4d..64ddb0c4b4be 100644 --- a/mm/debug.c +++ b/mm/debug.c @@ -182,7 +182,7 @@ void dump_mm(const struct mm_struct *mm) "start_code %lx end_code %lx start_data %lx end_data %lx\n" "start_brk %lx brk %lx start_stack %lx\n" "arg_start %lx arg_end %lx env_start %lx env_end %lx\n" - "binfmt %px flags %lx\n" + "binfmt %px flags %*pb\n" #ifdef CONFIG_AIO "ioctx_table %px\n" #endif @@ -211,7 +211,7 @@ void dump_mm(const struct mm_struct *mm) mm->start_code, mm->end_code, mm->start_data, mm->end_data, mm->start_brk, mm->brk, mm->start_stack, mm->arg_start, mm->arg_end, mm->env_start, mm->env_end, - mm->binfmt, mm->flags, + mm->binfmt, NUM_MM_FLAG_BITS, __mm_flags_get_bitmap(mm), #ifdef CONFIG_AIO mm->ioctx_table, #endif diff --git a/mm/gup.c b/mm/gup.c index adffe663594d..331d22bf7b2d 100644 --- a/mm/gup.c +++ b/mm/gup.c @@ -475,10 +475,10 @@ EXPORT_SYMBOL_GPL(unpin_folios); * lifecycle. Avoid setting the bit unless necessary, or it might cause w= rite * cache bouncing on large SMP machines for concurrent pinned gups. */ -static inline void mm_set_has_pinned_flag(unsigned long *mm_flags) +static inline void mm_set_has_pinned_flag(struct mm_struct *mm) { - if (!test_bit(MMF_HAS_PINNED, mm_flags)) - set_bit(MMF_HAS_PINNED, mm_flags); + if (!mm_flags_test(MMF_HAS_PINNED, mm)) + mm_flags_set(MMF_HAS_PINNED, mm); } =20 #ifdef CONFIG_MMU @@ -1693,7 +1693,7 @@ static __always_inline long __get_user_pages_locked(s= truct mm_struct *mm, mmap_assert_locked(mm); =20 if (flags & FOLL_PIN) - mm_set_has_pinned_flag(&mm->flags); + mm_set_has_pinned_flag(mm); =20 /* * FOLL_PIN and FOLL_GET are mutually exclusive. Traditional behavior @@ -3210,7 +3210,7 @@ static int gup_fast_fallback(unsigned long start, uns= igned long nr_pages, return -EINVAL; =20 if (gup_flags & FOLL_PIN) - mm_set_has_pinned_flag(¤t->mm->flags); + mm_set_has_pinned_flag(current->mm); =20 if (!(gup_flags & FOLL_FAST_ONLY)) might_lock_read(¤t->mm->mmap_lock); diff --git a/mm/huge_memory.c b/mm/huge_memory.c index b8bb078a1a34..a2f476e7419a 100644 --- a/mm/huge_memory.c +++ b/mm/huge_memory.c @@ -251,13 +251,13 @@ struct folio *mm_get_huge_zero_folio(struct mm_struct= *mm) if (IS_ENABLED(CONFIG_PERSISTENT_HUGE_ZERO_FOLIO)) return huge_zero_folio; =20 - if (test_bit(MMF_HUGE_ZERO_FOLIO, &mm->flags)) + if (mm_flags_test(MMF_HUGE_ZERO_FOLIO, mm)) return READ_ONCE(huge_zero_folio); =20 if (!get_huge_zero_folio()) return NULL; =20 - if (test_and_set_bit(MMF_HUGE_ZERO_FOLIO, &mm->flags)) + if (mm_flags_test_and_set(MMF_HUGE_ZERO_FOLIO, mm)) put_huge_zero_folio(); =20 return READ_ONCE(huge_zero_folio); @@ -268,7 +268,7 @@ void mm_put_huge_zero_folio(struct mm_struct *mm) if (IS_ENABLED(CONFIG_PERSISTENT_HUGE_ZERO_FOLIO)) return; =20 - if (test_bit(MMF_HUGE_ZERO_FOLIO, &mm->flags)) + if (mm_flags_test(MMF_HUGE_ZERO_FOLIO, mm)) put_huge_zero_folio(); } =20 @@ -1145,7 +1145,7 @@ static unsigned long __thp_get_unmapped_area(struct f= ile *filp, =20 off_sub =3D (off - ret) & (size - 1); =20 - if (test_bit(MMF_TOPDOWN, ¤t->mm->flags) && !off_sub) + if (mm_flags_test(MMF_TOPDOWN, current->mm) && !off_sub) return ret + size; =20 ret +=3D off_sub; diff --git a/mm/khugepaged.c b/mm/khugepaged.c index 6b40bdfd224c..6470e7e26c8d 100644 --- a/mm/khugepaged.c +++ b/mm/khugepaged.c @@ -410,7 +410,7 @@ static inline int hpage_collapse_test_exit(struct mm_st= ruct *mm) static inline int hpage_collapse_test_exit_or_disable(struct mm_struct *mm) { return hpage_collapse_test_exit(mm) || - test_bit(MMF_DISABLE_THP, &mm->flags); + mm_flags_test(MMF_DISABLE_THP, mm); } =20 static bool hugepage_pmd_enabled(void) @@ -445,7 +445,7 @@ void __khugepaged_enter(struct mm_struct *mm) =20 /* __khugepaged_exit() must not run from under us */ VM_BUG_ON_MM(hpage_collapse_test_exit(mm), mm); - if (unlikely(test_and_set_bit(MMF_VM_HUGEPAGE, &mm->flags))) + if (unlikely(mm_flags_test_and_set(MMF_VM_HUGEPAGE, mm))) return; =20 mm_slot =3D mm_slot_alloc(mm_slot_cache); @@ -472,7 +472,7 @@ void __khugepaged_enter(struct mm_struct *mm) void khugepaged_enter_vma(struct vm_area_struct *vma, vm_flags_t vm_flags) { - if (!test_bit(MMF_VM_HUGEPAGE, &vma->vm_mm->flags) && + if (!mm_flags_test(MMF_VM_HUGEPAGE, vma->vm_mm) && hugepage_pmd_enabled()) { if (thp_vma_allowable_order(vma, vm_flags, TVA_ENFORCE_SYSFS, PMD_ORDER)) @@ -497,7 +497,7 @@ void __khugepaged_exit(struct mm_struct *mm) spin_unlock(&khugepaged_mm_lock); =20 if (free) { - clear_bit(MMF_VM_HUGEPAGE, &mm->flags); + mm_flags_clear(MMF_VM_HUGEPAGE, mm); mm_slot_free(mm_slot_cache, mm_slot); mmdrop(mm); } else if (mm_slot) { @@ -1459,7 +1459,7 @@ static void collect_mm_slot(struct khugepaged_mm_slot= *mm_slot) /* * Not strictly needed because the mm exited already. * - * clear_bit(MMF_VM_HUGEPAGE, &mm->flags); + * mm_clear(mm, MMF_VM_HUGEPAGE); */ =20 /* khugepaged_mm_lock actually not necessary for the below */ diff --git a/mm/ksm.c b/mm/ksm.c index 160787bb121c..2ef29802a49b 100644 --- a/mm/ksm.c +++ b/mm/ksm.c @@ -1217,8 +1217,8 @@ static int unmerge_and_remove_all_rmap_items(void) spin_unlock(&ksm_mmlist_lock); =20 mm_slot_free(mm_slot_cache, mm_slot); - clear_bit(MMF_VM_MERGEABLE, &mm->flags); - clear_bit(MMF_VM_MERGE_ANY, &mm->flags); + mm_flags_clear(MMF_VM_MERGEABLE, mm); + mm_flags_clear(MMF_VM_MERGE_ANY, mm); mmdrop(mm); } else spin_unlock(&ksm_mmlist_lock); @@ -2620,8 +2620,8 @@ static struct ksm_rmap_item *scan_get_next_rmap_item(= struct page **page) spin_unlock(&ksm_mmlist_lock); =20 mm_slot_free(mm_slot_cache, mm_slot); - clear_bit(MMF_VM_MERGEABLE, &mm->flags); - clear_bit(MMF_VM_MERGE_ANY, &mm->flags); + mm_flags_clear(MMF_VM_MERGEABLE, mm); + mm_flags_clear(MMF_VM_MERGE_ANY, mm); mmap_read_unlock(mm); mmdrop(mm); } else { @@ -2742,7 +2742,7 @@ static int __ksm_del_vma(struct vm_area_struct *vma) vm_flags_t ksm_vma_flags(const struct mm_struct *mm, const struct file *fi= le, vm_flags_t vm_flags) { - if (test_bit(MMF_VM_MERGE_ANY, &mm->flags) && + if (mm_flags_test(MMF_VM_MERGE_ANY, mm) && __ksm_should_add_vma(file, vm_flags)) vm_flags |=3D VM_MERGEABLE; =20 @@ -2784,16 +2784,16 @@ int ksm_enable_merge_any(struct mm_struct *mm) { int err; =20 - if (test_bit(MMF_VM_MERGE_ANY, &mm->flags)) + if (mm_flags_test(MMF_VM_MERGE_ANY, mm)) return 0; =20 - if (!test_bit(MMF_VM_MERGEABLE, &mm->flags)) { + if (!mm_flags_test(MMF_VM_MERGEABLE, mm)) { err =3D __ksm_enter(mm); if (err) return err; } =20 - set_bit(MMF_VM_MERGE_ANY, &mm->flags); + mm_flags_set(MMF_VM_MERGE_ANY, mm); ksm_add_vmas(mm); =20 return 0; @@ -2815,7 +2815,7 @@ int ksm_disable_merge_any(struct mm_struct *mm) { int err; =20 - if (!test_bit(MMF_VM_MERGE_ANY, &mm->flags)) + if (!mm_flags_test(MMF_VM_MERGE_ANY, mm)) return 0; =20 err =3D ksm_del_vmas(mm); @@ -2824,7 +2824,7 @@ int ksm_disable_merge_any(struct mm_struct *mm) return err; } =20 - clear_bit(MMF_VM_MERGE_ANY, &mm->flags); + mm_flags_clear(MMF_VM_MERGE_ANY, mm); return 0; } =20 @@ -2832,9 +2832,9 @@ int ksm_disable(struct mm_struct *mm) { mmap_assert_write_locked(mm); =20 - if (!test_bit(MMF_VM_MERGEABLE, &mm->flags)) + if (!mm_flags_test(MMF_VM_MERGEABLE, mm)) return 0; - if (test_bit(MMF_VM_MERGE_ANY, &mm->flags)) + if (mm_flags_test(MMF_VM_MERGE_ANY, mm)) return ksm_disable_merge_any(mm); return ksm_del_vmas(mm); } @@ -2852,7 +2852,7 @@ int ksm_madvise(struct vm_area_struct *vma, unsigned = long start, if (!vma_ksm_compatible(vma)) return 0; =20 - if (!test_bit(MMF_VM_MERGEABLE, &mm->flags)) { + if (!mm_flags_test(MMF_VM_MERGEABLE, mm)) { err =3D __ksm_enter(mm); if (err) return err; @@ -2912,7 +2912,7 @@ int __ksm_enter(struct mm_struct *mm) list_add_tail(&slot->mm_node, &ksm_scan.mm_slot->slot.mm_node); spin_unlock(&ksm_mmlist_lock); =20 - set_bit(MMF_VM_MERGEABLE, &mm->flags); + mm_flags_set(MMF_VM_MERGEABLE, mm); mmgrab(mm); =20 if (needs_wakeup) @@ -2954,8 +2954,8 @@ void __ksm_exit(struct mm_struct *mm) =20 if (easy_to_free) { mm_slot_free(mm_slot_cache, mm_slot); - clear_bit(MMF_VM_MERGE_ANY, &mm->flags); - clear_bit(MMF_VM_MERGEABLE, &mm->flags); + mm_flags_clear(MMF_VM_MERGE_ANY, mm); + mm_flags_clear(MMF_VM_MERGEABLE, mm); mmdrop(mm); } else if (mm_slot) { mmap_write_lock(mm); diff --git a/mm/mmap.c b/mm/mmap.c index 7306253cc3b5..7a057e0e8da9 100644 --- a/mm/mmap.c +++ b/mm/mmap.c @@ -802,7 +802,7 @@ unsigned long mm_get_unmapped_area_vmflags(struct mm_st= ruct *mm, struct file *fi unsigned long pgoff, unsigned long flags, vm_flags_t vm_flags) { - if (test_bit(MMF_TOPDOWN, &mm->flags)) + if (mm_flags_test(MMF_TOPDOWN, mm)) return arch_get_unmapped_area_topdown(filp, addr, len, pgoff, flags, vm_flags); return arch_get_unmapped_area(filp, addr, len, pgoff, flags, vm_flags); @@ -1284,7 +1284,7 @@ void exit_mmap(struct mm_struct *mm) * Set MMF_OOM_SKIP to hide this task from the oom killer/reaper * because the memory has been already freed. */ - set_bit(MMF_OOM_SKIP, &mm->flags); + mm_flags_set(MMF_OOM_SKIP, mm); mmap_write_lock(mm); mt_clear_in_rcu(&mm->mm_mt); vma_iter_set(&vmi, vma->vm_end); @@ -1859,14 +1859,14 @@ __latent_entropy int dup_mmap(struct mm_struct *mm,= struct mm_struct *oldmm) mas_set_range(&vmi.mas, mpnt->vm_start, mpnt->vm_end - 1); mas_store(&vmi.mas, XA_ZERO_ENTRY); /* Avoid OOM iterating a broken tree */ - set_bit(MMF_OOM_SKIP, &mm->flags); + mm_flags_set(MMF_OOM_SKIP, mm); } /* * The mm_struct is going to exit, but the locks will be dropped * first. Set the mm_struct as unstable is advisable as it is * not fully initialised. */ - set_bit(MMF_UNSTABLE, &mm->flags); + mm_flags_set(MMF_UNSTABLE, mm); } out: mmap_write_unlock(mm); diff --git a/mm/oom_kill.c b/mm/oom_kill.c index 25923cfec9c6..17650f0b516e 100644 --- a/mm/oom_kill.c +++ b/mm/oom_kill.c @@ -1,7 +1,7 @@ // SPDX-License-Identifier: GPL-2.0-only /* * linux/mm/oom_kill.c - *=20 + * * Copyright (C) 1998,2000 Rik van Riel * Thanks go out to Claus Fischer for some serious inspiration and * for goading me into coding this file... @@ -218,7 +218,7 @@ long oom_badness(struct task_struct *p, unsigned long t= otalpages) */ adj =3D (long)p->signal->oom_score_adj; if (adj =3D=3D OOM_SCORE_ADJ_MIN || - test_bit(MMF_OOM_SKIP, &p->mm->flags) || + mm_flags_test(MMF_OOM_SKIP, p->mm) || in_vfork(p)) { task_unlock(p); return LONG_MIN; @@ -325,7 +325,7 @@ static int oom_evaluate_task(struct task_struct *task, = void *arg) * any memory is quite low. */ if (!is_sysrq_oom(oc) && tsk_is_oom_victim(task)) { - if (test_bit(MMF_OOM_SKIP, &task->signal->oom_mm->flags)) + if (mm_flags_test(MMF_OOM_SKIP, task->signal->oom_mm)) goto next; goto abort; } @@ -524,7 +524,7 @@ static bool __oom_reap_task_mm(struct mm_struct *mm) * should imply barriers already and the reader would hit a page fault * if it stumbled over a reaped memory. */ - set_bit(MMF_UNSTABLE, &mm->flags); + mm_flags_set(MMF_UNSTABLE, mm); =20 for_each_vma(vmi, vma) { if (vma->vm_flags & (VM_HUGETLB|VM_PFNMAP)) @@ -583,7 +583,7 @@ static bool oom_reap_task_mm(struct task_struct *tsk, s= truct mm_struct *mm) * under mmap_lock for reading because it serializes against the * mmap_write_lock();mmap_write_unlock() cycle in exit_mmap(). */ - if (test_bit(MMF_OOM_SKIP, &mm->flags)) { + if (mm_flags_test(MMF_OOM_SKIP, mm)) { trace_skip_task_reaping(tsk->pid); goto out_unlock; } @@ -619,7 +619,7 @@ static void oom_reap_task(struct task_struct *tsk) schedule_timeout_idle(HZ/10); =20 if (attempts <=3D MAX_OOM_REAP_RETRIES || - test_bit(MMF_OOM_SKIP, &mm->flags)) + mm_flags_test(MMF_OOM_SKIP, mm)) goto done; =20 pr_info("oom_reaper: unable to reap pid:%d (%s)\n", @@ -634,7 +634,7 @@ static void oom_reap_task(struct task_struct *tsk) * Hide this mm from OOM killer because it has been either reaped or * somebody can't call mmap_write_unlock(mm). */ - set_bit(MMF_OOM_SKIP, &mm->flags); + mm_flags_set(MMF_OOM_SKIP, mm); =20 /* Drop a reference taken by queue_oom_reaper */ put_task_struct(tsk); @@ -670,7 +670,7 @@ static void wake_oom_reaper(struct timer_list *timer) unsigned long flags; =20 /* The victim managed to terminate on its own - see exit_mmap */ - if (test_bit(MMF_OOM_SKIP, &mm->flags)) { + if (mm_flags_test(MMF_OOM_SKIP, mm)) { put_task_struct(tsk); return; } @@ -695,7 +695,7 @@ static void wake_oom_reaper(struct timer_list *timer) static void queue_oom_reaper(struct task_struct *tsk) { /* mm is already queued? */ - if (test_and_set_bit(MMF_OOM_REAP_QUEUED, &tsk->signal->oom_mm->flags)) + if (mm_flags_test_and_set(MMF_OOM_REAP_QUEUED, tsk->signal->oom_mm)) return; =20 get_task_struct(tsk); @@ -892,7 +892,7 @@ static bool task_will_free_mem(struct task_struct *task) * This task has already been drained by the oom reaper so there are * only small chances it will free some more */ - if (test_bit(MMF_OOM_SKIP, &mm->flags)) + if (mm_flags_test(MMF_OOM_SKIP, mm)) return false; =20 if (atomic_read(&mm->mm_users) <=3D 1) @@ -977,7 +977,7 @@ static void __oom_kill_process(struct task_struct *vict= im, const char *message) continue; if (is_global_init(p)) { can_oom_reap =3D false; - set_bit(MMF_OOM_SKIP, &mm->flags); + mm_flags_set(MMF_OOM_SKIP, mm); pr_info("oom killer %d (%s) has mm pinned by %d (%s)\n", task_pid_nr(victim), victim->comm, task_pid_nr(p), p->comm); @@ -1235,7 +1235,7 @@ SYSCALL_DEFINE2(process_mrelease, int, pidfd, unsigne= d int, flags) reap =3D true; else { /* Error only if the work has not been done already */ - if (!test_bit(MMF_OOM_SKIP, &mm->flags)) + if (!mm_flags_test(MMF_OOM_SKIP, mm)) ret =3D -EINVAL; } task_unlock(p); @@ -1251,7 +1251,7 @@ SYSCALL_DEFINE2(process_mrelease, int, pidfd, unsigne= d int, flags) * Check MMF_OOM_SKIP again under mmap_read_lock protection to ensure * possible change in exit_mmap is seen */ - if (!test_bit(MMF_OOM_SKIP, &mm->flags) && !__oom_reap_task_mm(mm)) + if (mm_flags_test(MMF_OOM_SKIP, mm) && !__oom_reap_task_mm(mm)) ret =3D -EAGAIN; mmap_read_unlock(mm); =20 diff --git a/mm/util.c b/mm/util.c index f814e6a59ab1..d235b74f7aff 100644 --- a/mm/util.c +++ b/mm/util.c @@ -471,17 +471,17 @@ void arch_pick_mmap_layout(struct mm_struct *mm, stru= ct rlimit *rlim_stack) =20 if (mmap_is_legacy(rlim_stack)) { mm->mmap_base =3D TASK_UNMAPPED_BASE + random_factor; - clear_bit(MMF_TOPDOWN, &mm->flags); + mm_flags_clear(MMF_TOPDOWN, mm); } else { mm->mmap_base =3D mmap_base(random_factor, rlim_stack); - set_bit(MMF_TOPDOWN, &mm->flags); + mm_flags_set(MMF_TOPDOWN, mm); } } #elif defined(CONFIG_MMU) && !defined(HAVE_ARCH_PICK_MMAP_LAYOUT) void arch_pick_mmap_layout(struct mm_struct *mm, struct rlimit *rlim_stack) { mm->mmap_base =3D TASK_UNMAPPED_BASE; - clear_bit(MMF_TOPDOWN, &mm->flags); + mm_flags_clear(MMF_TOPDOWN, mm); } #endif #ifdef CONFIG_MMU --=20 2.50.1 From nobody Sat Oct 4 20:52:45 2025 Received: from mx0b-00069f02.pphosted.com (mx0b-00069f02.pphosted.com [205.220.177.32]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id CF53830E82A; Tue, 12 Aug 2025 15:48:21 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=fail smtp.client-ip=205.220.177.32 ARC-Seal: i=2; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1755013704; cv=fail; b=cteljDLK3xXv72PZZSpmF4uxBjYAIPQrOMs0D6o7EGANvPFhXWTwLUwaLAGgA1dmwEEPcCaO1a6PMMYhAwNzkd6nxVPxWyUZsSphJm2Pp8RoiMo4QrJk1qKLdsud4zb6+SjjwEqJutcmlZVdUwcIoz2W6vCUeDuL4YSVVFNXIRY= ARC-Message-Signature: i=2; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1755013704; c=relaxed/simple; bh=yTkbJuRXZcOD2jeOPKx7mjnGXgLx4st9gMllfroTFg8=; h=From:To:Cc:Subject:Date:Message-ID:In-Reply-To:References: Content-Type:MIME-Version; b=fu/RTVk31x8xPef0jxhpVxANw402Du5zkITUGvscSnpBd+fGvQuG76eUSp+Nfv94R/50tzN0rC8nD3LPnpetOmounrceMg4sDPIiByFtpRwxW0vVajUZyWIOR1P6e1G2YZyXMrEL1AHyn/OBFFVsJHaROHqsNmjG36YuaNxCJWc= ARC-Authentication-Results: i=2; smtp.subspace.kernel.org; dmarc=pass (p=reject dis=none) header.from=oracle.com; spf=pass smtp.mailfrom=oracle.com; dkim=pass (2048-bit key) header.d=oracle.com header.i=@oracle.com header.b=UD4lqSx3; dkim=pass (1024-bit key) header.d=oracle.onmicrosoft.com header.i=@oracle.onmicrosoft.com header.b=bfKZ5V7L; arc=fail smtp.client-ip=205.220.177.32 Authentication-Results: smtp.subspace.kernel.org; dmarc=pass (p=reject dis=none) header.from=oracle.com Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=oracle.com Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=oracle.com header.i=@oracle.com header.b="UD4lqSx3"; dkim=pass (1024-bit key) header.d=oracle.onmicrosoft.com header.i=@oracle.onmicrosoft.com header.b="bfKZ5V7L" Received: from pps.filterd (m0246631.ppops.net [127.0.0.1]) by mx0b-00069f02.pphosted.com (8.18.1.2/8.18.1.2) with ESMTP id 57CDBwIp012373; Tue, 12 Aug 2025 15:47:42 GMT DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=oracle.com; h=cc :content-transfer-encoding:content-type:date:from:in-reply-to :message-id:mime-version:references:subject:to; s= corp-2025-04-25; bh=JwNnwgB6+dl8aPL3GOfeh1k1dY8JCAuFZYHk4vJh5UQ=; b= UD4lqSx3/JYN85kkHIvMtlhfdpIyBpsutyV8TtfFNtDwjbiWRXRj3B6qwptX9zDp CNyVWYBpaaHboVNYIZe2O9nyOUFKfbEayav5iRek3nUF1Lzc7Ino68vXwLDg2rc1 2WiWq//rQgq8RqYdhIUlDWCcdfzl8YHUQd7N3O6g2SozEbB4AlPI4gQAFCIvhBbp K14u7BJgFgUOaj6YwfA2hTpPAKMAPMrB19eNBP02sGqJ54dEtE2or8F6nGSr1JLP IbNRNqwpmEvxfvbYFiEhyswt6k+1EdnC/kDQvotTPYZHclDYkmhJFNEgrU2aJ8Zs tA4X/37keyzHN+sodWuJVQ== Received: from phxpaimrmta03.imrmtpd1.prodappphxaev1.oraclevcn.com (phxpaimrmta03.appoci.oracle.com [138.1.37.129]) by mx0b-00069f02.pphosted.com (PPS) with ESMTPS id 48dw44w2u9-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK); Tue, 12 Aug 2025 15:47:41 +0000 (GMT) Received: from pps.filterd (phxpaimrmta03.imrmtpd1.prodappphxaev1.oraclevcn.com [127.0.0.1]) by phxpaimrmta03.imrmtpd1.prodappphxaev1.oraclevcn.com (8.18.1.2/8.18.1.2) with ESMTP id 57CFiZln017414; Tue, 12 Aug 2025 15:47:40 GMT Received: from nam12-mw2-obe.outbound.protection.outlook.com (mail-mw2nam12on2085.outbound.protection.outlook.com [40.107.244.85]) by phxpaimrmta03.imrmtpd1.prodappphxaev1.oraclevcn.com (PPS) with ESMTPS id 48dvsa4y3t-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK); Tue, 12 Aug 2025 15:47:40 +0000 ARC-Seal: i=1; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=none; b=kU+ue57x4YBQiZThU6CyyBG7dLmw6OxmjF1hMxwgIx1fta2fB0zhvGA43UN/r4SG4TtIp9g3a/egD3oz1XJBtFfIl21eMLi6o1ZY3Bs7eoDLiGKsUj/2mmAEOXI566nKxXDEVPKRWM8RH8vWycL6RKEIIokHRNShfNAyARRB0DvVroq7IS7eUs+VK6kSDBYQSNqdbxN3j6uBila8z9xfD99LcgiuEI6THrLH1ETwh0NR053HykfE+IS4SEZ19mhW/dLRlCvkqrsPqoK+w36clguor0bdyX3dpfsKMtggDNeCBQe2LIFB65beyBTqLFDeGAKnscmkqf57jjbcV5VUkw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector10001; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=JwNnwgB6+dl8aPL3GOfeh1k1dY8JCAuFZYHk4vJh5UQ=; b=ua6v4ZWwQaVXNGfkiqWUT1KmyBALLjmVf2IOmac/ZeAKiS+shU3ihVzAooqPIp9ndg8XauLe96qZzy5dnBo/x/wtarhNrMriMAkkdqtMY8Qd2suk+u/0/OAc3NpHDZhcZhbHGXfQ8Y5sp379XusWsDZIgmKHMgIiwarBQf+/5UdvouGubonlo9i8VwM4DYeNVP90tWZVoaKmsvnWziFO491QMb12TyWUc90pBavQAI2rz9shiLXElNGg4o5UfK40PwtLm5wl3fvTGBbHWY0LTDBHfLZGk9CaUeFAsv9K3BxNtFACh5xoCreqQk9eViONmQeO/yhm2dIknOm4OOEJ6Q== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=oracle.com; dmarc=pass action=none header.from=oracle.com; dkim=pass header.d=oracle.com; arc=none DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=oracle.onmicrosoft.com; s=selector2-oracle-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=JwNnwgB6+dl8aPL3GOfeh1k1dY8JCAuFZYHk4vJh5UQ=; b=bfKZ5V7LKlN5MaCzM/V5DNi1aW4HZOwBlXlesQ8rjezu3DLf99WzeXcColVzoptnz0GuixUO3rdhojiNb2rK31vmRtaoMEJ2nGNUlMA4yq0ahLT2jMop6Dayvmxp+IC2Afk9fb2jy2Z5VEXqTRo5SJqBrPuZiodtAZ0NHFF+JdQ= Received: from DM4PR10MB8218.namprd10.prod.outlook.com (2603:10b6:8:1cc::16) by SN7PR10MB6329.namprd10.prod.outlook.com (2603:10b6:806:273::20) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.9009.21; Tue, 12 Aug 2025 15:47:36 +0000 Received: from DM4PR10MB8218.namprd10.prod.outlook.com ([fe80::2650:55cf:2816:5f2]) by DM4PR10MB8218.namprd10.prod.outlook.com ([fe80::2650:55cf:2816:5f2%5]) with mapi id 15.20.9031.012; Tue, 12 Aug 2025 15:47:36 +0000 From: Lorenzo Stoakes To: Andrew Morton Cc: Alexander Gordeev , Gerald Schaefer , Heiko Carstens , Vasily Gorbik , Christian Borntraeger , Sven Schnelle , "David S . Miller" , Andreas Larsson , Dave Hansen , Andy Lutomirski , Peter Zijlstra , Thomas Gleixner , Ingo Molnar , Borislav Petkov , "H . Peter Anvin" , Alexander Viro , Christian Brauner , Jan Kara , Kees Cook , David Hildenbrand , Zi Yan , Baolin Wang , "Liam R . Howlett" , Nico Pache , Ryan Roberts , Dev Jain , Barry Song , Xu Xin , Chengming Zhou , Vlastimil Babka , Mike Rapoport , Suren Baghdasaryan , Michal Hocko , David Rientjes , Shakeel Butt , Arnaldo Carvalho de Melo , Namhyung Kim , Mark Rutland , Alexander Shishkin , Jiri Olsa , Ian Rogers , Adrian Hunter , Kan Liang , Masami Hiramatsu , Oleg Nesterov , Juri Lelli , Vincent Guittot , Dietmar Eggemann , Steven Rostedt , Ben Segall , Mel Gorman , Valentin Schneider , Jason Gunthorpe , John Hubbard , Peter Xu , Jann Horn , Pedro Falcato , Matthew Wilcox , Mateusz Guzik , linux-s390@vger.kernel.org, linux-kernel@vger.kernel.org, sparclinux@vger.kernel.org, linux-fsdevel@vger.kernel.org, linux-mm@kvack.org, linux-trace-kernel@vger.kernel.org, linux-perf-users@vger.kernel.org Subject: [PATCH 03/10] mm: convert prctl to mm_flags_*() accessors Date: Tue, 12 Aug 2025 16:44:12 +0100 Message-ID: X-Mailer: git-send-email 2.50.1 In-Reply-To: References: Content-Transfer-Encoding: quoted-printable X-ClientProxiedBy: GV2PEPF00003841.SWEP280.PROD.OUTLOOK.COM (2603:10a6:144:1:0:5:0:16) To DM4PR10MB8218.namprd10.prod.outlook.com (2603:10b6:8:1cc::16) Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 X-MS-PublicTrafficType: Email X-MS-TrafficTypeDiagnostic: DM4PR10MB8218:EE_|SN7PR10MB6329:EE_ X-MS-Office365-Filtering-Correlation-Id: 95effaa6-a12e-4195-71c9-08ddd9b78f3d X-MS-Exchange-SenderADCheck: 1 X-MS-Exchange-AntiSpam-Relay: 0 X-Microsoft-Antispam: BCL:0;ARA:13230040|1800799024|376014|7416014|366016; X-Microsoft-Antispam-Message-Info: =?us-ascii?Q?6u09RjgNCgrxDltYBA33q/jfIiEZuLvzpyjrU7fZ6xHncu78aSvd3Bs503ic?= =?us-ascii?Q?rujq4e+wTvq2ESrc5YgSIHX8ZEa63El0cpJ/G70Aw0C9XmyYTOEuMBd7JC9o?= =?us-ascii?Q?C3rz2g+QkU06ZXVpdLExm5MZdYoC0KEFZwtzSilhMvw4xKsAP+HXzIMlWfhY?= =?us-ascii?Q?zV3js2JJK5k9ePh1uC74q0XKJzD9jgg6OQf2FBVrPw1K8o8OGe3DQS+YuZzF?= =?us-ascii?Q?RumjsM3+VsO7Wda1qsFH3vAEiD1NAotdRabWlT3webYJASzrs1VQfikhWSsB?= =?us-ascii?Q?Rswx3Fwlzn0W8OfzpZW2q0kDJuzwZmIZK+5Kejv59EwwoSYBpxCEYTgOAvJE?= =?us-ascii?Q?UmXWskp8U9077Wqe7g1M+65NA056NqhnFk+m8rYX23j7gBWdGcdUZBNZf7Cs?= =?us-ascii?Q?bgUp1xDHNFloNMKxtytlhgHEUSj+NtKpbOUgQb89R3L3/drfLI/BCbtRLUSr?= =?us-ascii?Q?TQWLsakOFCIF+cTq2LhHGFdjjYnSiULPgywGWSS7OzRYrzV3JansqLLj3ZAr?= =?us-ascii?Q?4tW8D7KVqZ7oXYxx6kn2TloUr6x2zbvPq6GVlJQQskFor31fU+LcLgMI7yVf?= =?us-ascii?Q?pKzLSLAEuJyvZrTa4T/ieOuWOi5jmrxgb6liGattVvhE8r9XZTHX3x3m0ZBU?= =?us-ascii?Q?RTR8m2jbmTHM9hLozP1JUQNNLDL1zSUA5JzkDepUnobcy1dBCbpJbeI0E6Yy?= =?us-ascii?Q?w0hdxfMDMy0B4hMHdqdaChVILVhxjP2t4Z88bHUfTYmQriUZe/qqm2gz2dML?= =?us-ascii?Q?Gxci30lzivyJN7eTT5HFd2vDeekK8GEg2b2UPVAg6vZ/0gQPljVFua8nOEMA?= =?us-ascii?Q?h/1XsI8oJi2SdsF5a1MaQrKAk74qP5Ua1OgFr1a2KC9ka+aP7kTyDfq6NfI/?= =?us-ascii?Q?Va6exw6/goQETe3RnbYv6VPWCpu/HZXhmvs8201qndrGnPoUHFydqWoqUGNC?= =?us-ascii?Q?0Dr7gJG6KE6C54sW5YfHAER2AwBUaNDtckBGUsx/X2leqElbzMHLRlxqL8o9?= =?us-ascii?Q?zdafJdQ3j2T3b2prvlewxk8LKzSp1RbioH2D5guOHfx+HdoY9ElRIuPc0D9+?= =?us-ascii?Q?0IVNA81pWwAL4e/MWXmUtdxp7kXaeiwqLEsk/uvMUizbwjf1zfCo27TR8meh?= =?us-ascii?Q?z1NAg0yTqZPX0o5zO7JP/tz82TaslSzuLsAe+gynklV0yU8WUlE89vFuhF7n?= =?us-ascii?Q?W1kJkEqpKm4sZva7sgCGExtsManvOfMuBXIrb5+0UGEfYd69vJ3JSm9o97Lg?= =?us-ascii?Q?GIHpfAqvHN987er/klfjYHbRY8K+sL0wE0Q7rWbYNuYrrnDL/LLA9eyYY064?= =?us-ascii?Q?/Ik5fmp/pbISXG5AAu9AQ76eb+BGQJZe26MZtGnyxCab4uQf/eVgd8y3U+ce?= =?us-ascii?Q?a6hxg4PQUQ8dytj/1hZdUkHrNoc3gE42cJZbSEYfOYuC61XFmQ=3D=3D?= X-Forefront-Antispam-Report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:DM4PR10MB8218.namprd10.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230040)(1800799024)(376014)(7416014)(366016);DIR:OUT;SFP:1101; X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1 X-MS-Exchange-AntiSpam-MessageData-0: =?us-ascii?Q?f2KbOb21PtjJlkewAenJiIdBAtWtc8/u5UsLQA6tGZvXdoODIcbBPjpfuxWP?= =?us-ascii?Q?jyNRQ2ZDsCKinwl/CEHB3MJZbbX6wRruNwPdO9TGo/oZY9NgTyjbzsNlWoti?= =?us-ascii?Q?+xmukOq1+INnMUGBikeQzFszWIs4XyF8vVaA6k3s1Qt0vPIIK26cxNnrquhV?= =?us-ascii?Q?/87xHOd/aOu53LEzyWwlpJRRbbk/Ar7kKYacNBsmrTr0ckDJJLynCJMMz7Vi?= =?us-ascii?Q?R8PyYe6hlzRn67FqqgP5DT9nXwHSHwnzsCBGEyftWHO9uKm29IW4yRJ7Jka2?= =?us-ascii?Q?YMlHGouD4XfykhjEmnAO4D2mCnQJUjleMGAF4A3ZWgMxOtBXr0S3sXSdOriE?= =?us-ascii?Q?NRhyu6nZ/DOrkUublOPS5KoMH9yV14dj129whWt0OpbAN1FBkTiz4bBrk6tS?= =?us-ascii?Q?+40i0/XPH3hCizKTpPHG604OFwBKddz1KQVMTCxutjdOT+Xw/TjYR8Q6QOKj?= =?us-ascii?Q?Ayj3RZrbsG3huaubIDzP0xTBePgAAI0EEMP7HX7VTMgJ0r4DzDoxOSbrsOYU?= =?us-ascii?Q?BCPJrDe4MxNttfo2TG5LsFWLvCA/d/ru0cLWZDfof7mUig/b5e9GagbckTmY?= =?us-ascii?Q?A8Yc0rlD7LrEIbPMx0n8rs/gqGFqQ9afZijZo6Dl0Cb9ZTmm5BCL2vVelWwd?= =?us-ascii?Q?nWzGq4Pl5eO2zjZKMxW1vW0C2BvVG+lfO60AB75DPopCSeCUHwrkvf3j7a05?= =?us-ascii?Q?lEJhTbKBhdCjCVZ4Be2XsVM3bjXP4FYHZjdXc+p4GDg/A8f7JmaqTdw6x+IY?= =?us-ascii?Q?kwLSXz+IkDh8INCjT7Pk7MnsVE+PWwMCjx42hbFSZjP2PR1u0tBTFMlAR8dD?= =?us-ascii?Q?g6MbYcsWENLgRcSw0KJXUSsiSVd9baECj7TLP2aCRBzyqJB0JZt949R4pE9+?= =?us-ascii?Q?86ieJRREvAZk8LKWCuwqe+FRXWcysnnPaC6jDWDG3MUrgX1BMtZJ0FdGnAnR?= =?us-ascii?Q?K5wsoJz9sQAd8Lt68SQbfmMozm/ZvuJ7kpjmjvPf56lr2nywaA5YdtOSY+TA?= =?us-ascii?Q?u6RvQ+d8rUQBWv5datAon0Yfuq+MYu27+eUeQirkcDgNwR0T4Ul+qexl1rOx?= =?us-ascii?Q?/4JYrWvr+SVLJ5qt2CuYXjuxXmSNLZAYD42bBd3sh8FiIfoxV0TyHH3PfqR7?= =?us-ascii?Q?cYtTvVePxqcX1pAIW1LomqdxK0HZ95ITuNgMucQmhGdukccA6MMZAu/hPNmA?= =?us-ascii?Q?kt3LfYPJe3U/tw2bQjMO0DtaMUcmeMneH5DP8ly0LLspKlOn4sjFGQ/oQQMH?= =?us-ascii?Q?vJ6Sp9keV3NAFvATez6m1TocKp00OGceRT+OfWXNqxV+/3Q4xTQr8W3m7O18?= =?us-ascii?Q?jc3+dmL/iGKT8K0P4cd0mNb2SB+Z+VZuFgkYu/Omd4zZPLDDV0kaSlmvTS05?= =?us-ascii?Q?9BV4faRiyxT7bu1yYxOufQLlX2sUIXL04HQkbYr4wwh3Fccltgzr+UhM3Iud?= =?us-ascii?Q?bDqPDQ7GMWEeeQe6aWQnJ3OmWt7FQhYSHLECuW5p/v4PKLNXRJOyVd4VDyUJ?= =?us-ascii?Q?svw67uScfQwzi7JYdMDAsKx3l2vk/HKNBbsqM3KzqTmbuXk3Wmg04osG72IM?= =?us-ascii?Q?u3fymcqArBQqU1oV23Tyfaqa40xnoXyV1QEy+DLg3nHq/XLMbBn+ED3rmksv?= =?us-ascii?Q?bw=3D=3D?= X-MS-Exchange-AntiSpam-ExternalHop-MessageData-ChunkCount: 1 X-MS-Exchange-AntiSpam-ExternalHop-MessageData-0: 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 X-OriginatorOrg: oracle.com X-MS-Exchange-CrossTenant-Network-Message-Id: 95effaa6-a12e-4195-71c9-08ddd9b78f3d X-MS-Exchange-CrossTenant-AuthSource: DM4PR10MB8218.namprd10.prod.outlook.com X-MS-Exchange-CrossTenant-AuthAs: Internal X-MS-Exchange-CrossTenant-OriginalArrivalTime: 12 Aug 2025 15:47:36.3918 (UTC) X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted X-MS-Exchange-CrossTenant-Id: 4e2c6054-71cb-48f1-bd6c-3a9705aca71b X-MS-Exchange-CrossTenant-MailboxType: HOSTED X-MS-Exchange-CrossTenant-UserPrincipalName: ri0kHYAUMgqtE/91pleVb5hJk9jK1MnFnw9t/OF4AsP6CWg2/TycERggbbsSvJ5Bb0xbnLtW7Fc5f2arFpixanlzsbf7iLlg1tyj3IXZ8S4= X-MS-Exchange-Transport-CrossTenantHeadersStamped: SN7PR10MB6329 X-Proofpoint-Virus-Version: vendor=baseguard engine=ICAP:2.0.293,Aquarius:18.0.1099,Hydra:6.1.9,FMLib:17.12.80.40 definitions=2025-08-12_07,2025-08-11_01,2025-03-28_01 X-Proofpoint-Spam-Details: rule=notspam policy=default score=0 mlxscore=0 malwarescore=0 bulkscore=0 phishscore=0 suspectscore=0 mlxlogscore=999 adultscore=0 spamscore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.12.0-2507300000 definitions=main-2508120152 X-Proofpoint-ORIG-GUID: piJcVP7OPqC2tdJSicvQmrl62AY4j_Lu X-Proofpoint-Spam-Details-Enc: AW1haW4tMjUwODEyMDE1MiBTYWx0ZWRfX//u0lHlUxWo7 jQG8f8TodRHcmseiwMngLpEDj2rlcn11/8Ytm75Y2rDnXLKANUNztzYpvXiW4MS0HvBr/rLHGBZ pg68wZLQakE9LRw5M8Rb5Ong22Rr5wpFTZm3q07tl4MG1juwDy966c70bF5H8m9ZRhw04uySLS/ IE87vXbIL7XArEiIxeNobh5rLcBtQ0V1fztK+qMndL8lyWnoG00xW5DPl0mnlC1HEEWrLVh1wGB CRlh/Z7SNaNDPnL9SRa4pIxiokWFcUAgWFT+0pUPLfXmzIjN0Ny/mG1fZPRlYvKeZac/D/8biDx ULkTIWU/VR1WwEsLNTLo1E0j1oXmCI6xrS71ThaYincjcOx4SW+nQZs13l4O0cIFrt7Tdiib6/S /nL501Wp0mQprDz17oyL62Ix6j2pps5avKNNEtd4hGYjkolNMwZsIJ7HFjZ43q6sfKWpw4vU X-Authority-Analysis: v=2.4 cv=X9FSKHTe c=1 sm=1 tr=0 ts=689b621d b=1 cx=c_pps a=WeWmnZmh0fydH62SvGsd2A==:117 a=WeWmnZmh0fydH62SvGsd2A==:17 a=6eWqkTHjU83fiwn7nKZWdM+Sl24=:19 a=z/mQ4Ysz8XfWz/Q5cLBRGdckG28=:19 a=lCpzRmAYbLLaTzLvsPZ7Mbvzbb8=:19 a=wKuvFiaSGQ0qltdbU6+NXLB8nM8=:19 a=Ol13hO9ccFRV9qXi2t6ftBPywas=:19 a=xqWC_Br6kY4A:10 a=2OwXVqhp2XgA:10 a=GoEa3M9JfhUA:10 a=yPCof4ZbAAAA:8 a=Dmo_WeIGsy9f1n_2DrgA:9 X-Proofpoint-GUID: piJcVP7OPqC2tdJSicvQmrl62AY4j_Lu Content-Type: text/plain; charset="utf-8" As part of the effort to move to mm->flags becoming a bitmap field, convert existing users to making use of the mm_flags_*() accessors which will, when the conversion is complete, be the only means of accessing mm_struct flags. No functional change intended. Signed-off-by: Lorenzo Stoakes Acked-by: David Hildenbrand Reviewed-by: Liam R. Howlett Reviewed-by: Mike Rapoport (Microsoft) --- kernel/sys.c | 16 ++++++++-------- 1 file changed, 8 insertions(+), 8 deletions(-) diff --git a/kernel/sys.c b/kernel/sys.c index 1e28b40053ce..605f7fe9a143 100644 --- a/kernel/sys.c +++ b/kernel/sys.c @@ -2392,9 +2392,9 @@ static inline unsigned long get_current_mdwe(void) { unsigned long ret =3D 0; =20 - if (test_bit(MMF_HAS_MDWE, ¤t->mm->flags)) + if (mm_flags_test(MMF_HAS_MDWE, current->mm)) ret |=3D PR_MDWE_REFUSE_EXEC_GAIN; - if (test_bit(MMF_HAS_MDWE_NO_INHERIT, ¤t->mm->flags)) + if (mm_flags_test(MMF_HAS_MDWE_NO_INHERIT, current->mm)) ret |=3D PR_MDWE_NO_INHERIT; =20 return ret; @@ -2427,9 +2427,9 @@ static inline int prctl_set_mdwe(unsigned long bits, = unsigned long arg3, return -EPERM; /* Cannot unset the flags */ =20 if (bits & PR_MDWE_NO_INHERIT) - set_bit(MMF_HAS_MDWE_NO_INHERIT, ¤t->mm->flags); + mm_flags_set(MMF_HAS_MDWE_NO_INHERIT, current->mm); if (bits & PR_MDWE_REFUSE_EXEC_GAIN) - set_bit(MMF_HAS_MDWE, ¤t->mm->flags); + mm_flags_set(MMF_HAS_MDWE, current->mm); =20 return 0; } @@ -2627,7 +2627,7 @@ SYSCALL_DEFINE5(prctl, int, option, unsigned long, ar= g2, unsigned long, arg3, case PR_GET_THP_DISABLE: if (arg2 || arg3 || arg4 || arg5) return -EINVAL; - error =3D !!test_bit(MMF_DISABLE_THP, &me->mm->flags); + error =3D !!mm_flags_test(MMF_DISABLE_THP, me->mm); break; case PR_SET_THP_DISABLE: if (arg3 || arg4 || arg5) @@ -2635,9 +2635,9 @@ SYSCALL_DEFINE5(prctl, int, option, unsigned long, ar= g2, unsigned long, arg3, if (mmap_write_lock_killable(me->mm)) return -EINTR; if (arg2) - set_bit(MMF_DISABLE_THP, &me->mm->flags); + mm_flags_set(MMF_DISABLE_THP, me->mm); else - clear_bit(MMF_DISABLE_THP, &me->mm->flags); + mm_flags_clear(MMF_DISABLE_THP, me->mm); mmap_write_unlock(me->mm); break; case PR_MPX_ENABLE_MANAGEMENT: @@ -2770,7 +2770,7 @@ SYSCALL_DEFINE5(prctl, int, option, unsigned long, ar= g2, unsigned long, arg3, if (arg2 || arg3 || arg4 || arg5) return -EINVAL; =20 - error =3D !!test_bit(MMF_VM_MERGE_ANY, &me->mm->flags); + error =3D !!mm_flags_test(MMF_VM_MERGE_ANY, me->mm); break; #endif case PR_RISCV_V_SET_CONTROL: --=20 2.50.1 From nobody Sat Oct 4 20:52:45 2025 Received: from mx0b-00069f02.pphosted.com (mx0b-00069f02.pphosted.com [205.220.177.32]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 5DDBD3074B6; Tue, 12 Aug 2025 15:48:18 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=fail smtp.client-ip=205.220.177.32 ARC-Seal: i=2; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1755013700; cv=fail; b=itSTz6Jb/6qhFqnJ62w1ISkJW+PfXlLXmdJMR1NEM86SIngYgreOu3YQnEpVAv5p+E5/TFEBu11KqoD1qquTDwBRdHpU1VSjmb2kpgoZ4x4NWyIyhVfJHZlFLNVjdrduaIA4KmVxExJkeci2dAefhgjV+0GLYPPewkO+VPJ+pmU= ARC-Message-Signature: i=2; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1755013700; c=relaxed/simple; bh=cixjAYe3RjZh4/efrNGcNfKEhv2fk/tqRXNWa6Pa0AA=; h=From:To:Cc:Subject:Date:Message-ID:In-Reply-To:References: Content-Type:MIME-Version; b=XM/JtJdXpQ3ind6U16zihkpLf75ui7MUAizVGRjlP8TrbblCJXwa0atJ7JIOuzD7mD2GXM4Xj+X6KOFK5Kg7Xd1G1HI6MEYyE6lHTK2kg2o+LOdtlF2uhAzsgy5db5DQ0vf/uTSL+/AWqJKwS479foQI7DUiFCxzeU/X556XD4U= ARC-Authentication-Results: i=2; smtp.subspace.kernel.org; dmarc=pass (p=reject dis=none) header.from=oracle.com; spf=pass smtp.mailfrom=oracle.com; dkim=pass (2048-bit key) header.d=oracle.com header.i=@oracle.com header.b=RM42DcKX; dkim=pass (1024-bit key) header.d=oracle.onmicrosoft.com header.i=@oracle.onmicrosoft.com header.b=wzT+rkWz; arc=fail smtp.client-ip=205.220.177.32 Authentication-Results: smtp.subspace.kernel.org; dmarc=pass (p=reject dis=none) header.from=oracle.com Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=oracle.com Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=oracle.com header.i=@oracle.com header.b="RM42DcKX"; dkim=pass (1024-bit key) header.d=oracle.onmicrosoft.com header.i=@oracle.onmicrosoft.com header.b="wzT+rkWz" Received: from pps.filterd (m0246631.ppops.net [127.0.0.1]) by mx0b-00069f02.pphosted.com (8.18.1.2/8.18.1.2) with ESMTP id 57CDCPHI013189; Tue, 12 Aug 2025 15:47:45 GMT DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=oracle.com; h=cc :content-transfer-encoding:content-type:date:from:in-reply-to :message-id:mime-version:references:subject:to; s= corp-2025-04-25; bh=kvIl1wwqB4xCBVSduPHr+/FwnBDRvwG0uk/KaklWS0o=; b= RM42DcKXLjK5sU8IyHdqmg+KFecVwXb8SZXkFB+4H1y/RcRojv/0Uyb4mzCMt4f2 vfzkRc09zelXFPQx3v0UNtSA5V5dyA8A1d+wQh9aoy3a3vbk7bBsaB3k2SMxnajH ixM3rgbGm1nMMRurxRknZAYWhgrBhjfnK/Bd48VrpHua1Sy58VHlQrCZn8ikAz4T KogpiMHuyTt2Sou/rS0TrBE3+C4OSRcAqrpZpilSEFfrDhJfNsVKQKkn0kG9YWaT DLRT1m/1PrWoTHmRPzyzLY6jr6oj7shPdRmiXy8SybGjnUlKD8Fa/lNVGnBgoGUq MTnUZqqgwGiy3nnq03i4sw== Received: from iadpaimrmta03.imrmtpd1.prodappiadaev1.oraclevcn.com (iadpaimrmta03.appoci.oracle.com [130.35.103.27]) by mx0b-00069f02.pphosted.com (PPS) with ESMTPS id 48dw44w2ue-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK); Tue, 12 Aug 2025 15:47:44 +0000 (GMT) Received: from pps.filterd (iadpaimrmta03.imrmtpd1.prodappiadaev1.oraclevcn.com [127.0.0.1]) by iadpaimrmta03.imrmtpd1.prodappiadaev1.oraclevcn.com (8.18.1.2/8.18.1.2) with ESMTP id 57CFG3PI038544; Tue, 12 Aug 2025 15:47:44 GMT Received: from nam11-dm6-obe.outbound.protection.outlook.com (mail-dm6nam11on2060.outbound.protection.outlook.com [40.107.223.60]) by iadpaimrmta03.imrmtpd1.prodappiadaev1.oraclevcn.com (PPS) with ESMTPS id 48dvsgp926-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK); Tue, 12 Aug 2025 15:47:44 +0000 ARC-Seal: i=1; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=none; b=hEWOeCHdA02l5cGKvYpoMxnVUxVchqpI+8rpY9BqTtezqGItePH6HR80wnpvOCa9rKY6ryPI36nNsXGuFJvzAh0AsutFA7Yg1ESLU8C7zCRys8AZzLpiHf325z/KRD4huAIjk+F30TfITW5n8PFGLAV1hUdKWvW093A+0qyP0p3scbfBbFbjmGXoq6y9O6463P3Cg6t+ziuDL3ZoAyKHit0jjzftDWu7iqVynVLH+verBjNGbvmEm8/EoFZcLe/t+bupLtR5Lb5DPc3cDro9rP68s28iTtSGrBX+NIcoOfCkCXZrTrL4yxzMSFe2f7y9LDbzmWMsXWUy4XhfKMkfGA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector10001; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=kvIl1wwqB4xCBVSduPHr+/FwnBDRvwG0uk/KaklWS0o=; b=VyY+RLkTydbcR3GnJV508st9byKx7MFQTpCrmM9EK9/OVY6ohubCn4IySlDv1ytIjz21eoVz5EuhO8G2GJfWuI2aUqOFKXKd+FrR3uR6V0vgUQ7VToK+tpMT9dqktP3dfTS+lW0ktX+itCizgK65I8HQEy/m5r9GiL4zrjNjwocy0nsXm6S/Iw+qtDxkUSvAUYizxV5chjD1fA3RKrEVbUhhLoCaSU0+yXgXkP0KXhkxwfPLRo8Brjje2ErnORGkEQNQPt5Sa68yA1ukgYTg3NnOL+Vr9ZHeZw32YnES7+5+E/u5b+NfZ0tu2nLCCJ5Y5hFbdZO/+6O3Z4puVTWkQA== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=oracle.com; dmarc=pass action=none header.from=oracle.com; dkim=pass header.d=oracle.com; arc=none DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=oracle.onmicrosoft.com; s=selector2-oracle-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=kvIl1wwqB4xCBVSduPHr+/FwnBDRvwG0uk/KaklWS0o=; b=wzT+rkWzkiGNvRXslwT3nXKejJf2T8oXHM66oNULah0CONEtnWK08IctSJehk79T92WQzXgm8e+fJkqNwE/D04Qxu+/mvbVCKcAWxtnZhYS+5X47tJ7pqA34o9YcI3AKpFPVQBNSGOlljPmHA8/q+kmZOHkws1RauYI5F3FFAcU= Received: from DM4PR10MB8218.namprd10.prod.outlook.com (2603:10b6:8:1cc::16) by SN7PR10MB6329.namprd10.prod.outlook.com (2603:10b6:806:273::20) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.9009.21; Tue, 12 Aug 2025 15:47:40 +0000 Received: from DM4PR10MB8218.namprd10.prod.outlook.com ([fe80::2650:55cf:2816:5f2]) by DM4PR10MB8218.namprd10.prod.outlook.com ([fe80::2650:55cf:2816:5f2%5]) with mapi id 15.20.9031.012; Tue, 12 Aug 2025 15:47:40 +0000 From: Lorenzo Stoakes To: Andrew Morton Cc: Alexander Gordeev , Gerald Schaefer , Heiko Carstens , Vasily Gorbik , Christian Borntraeger , Sven Schnelle , "David S . Miller" , Andreas Larsson , Dave Hansen , Andy Lutomirski , Peter Zijlstra , Thomas Gleixner , Ingo Molnar , Borislav Petkov , "H . Peter Anvin" , Alexander Viro , Christian Brauner , Jan Kara , Kees Cook , David Hildenbrand , Zi Yan , Baolin Wang , "Liam R . Howlett" , Nico Pache , Ryan Roberts , Dev Jain , Barry Song , Xu Xin , Chengming Zhou , Vlastimil Babka , Mike Rapoport , Suren Baghdasaryan , Michal Hocko , David Rientjes , Shakeel Butt , Arnaldo Carvalho de Melo , Namhyung Kim , Mark Rutland , Alexander Shishkin , Jiri Olsa , Ian Rogers , Adrian Hunter , Kan Liang , Masami Hiramatsu , Oleg Nesterov , Juri Lelli , Vincent Guittot , Dietmar Eggemann , Steven Rostedt , Ben Segall , Mel Gorman , Valentin Schneider , Jason Gunthorpe , John Hubbard , Peter Xu , Jann Horn , Pedro Falcato , Matthew Wilcox , Mateusz Guzik , linux-s390@vger.kernel.org, linux-kernel@vger.kernel.org, sparclinux@vger.kernel.org, linux-fsdevel@vger.kernel.org, linux-mm@kvack.org, linux-trace-kernel@vger.kernel.org, linux-perf-users@vger.kernel.org Subject: [PATCH 04/10] mm: convert arch-specific code to mm_flags_*() accessors Date: Tue, 12 Aug 2025 16:44:13 +0100 Message-ID: <6e0a4563fcade8678d0fc99859b3998d4354e82f.1755012943.git.lorenzo.stoakes@oracle.com> X-Mailer: git-send-email 2.50.1 In-Reply-To: References: Content-Transfer-Encoding: quoted-printable X-ClientProxiedBy: GV3PEPF00002BA8.SWEP280.PROD.OUTLOOK.COM (2603:10a6:144:1:0:6:0:1a) To DM4PR10MB8218.namprd10.prod.outlook.com (2603:10b6:8:1cc::16) Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 X-MS-PublicTrafficType: Email X-MS-TrafficTypeDiagnostic: DM4PR10MB8218:EE_|SN7PR10MB6329:EE_ X-MS-Office365-Filtering-Correlation-Id: a6afb426-fd17-4e3d-4a69-08ddd9b791b5 X-MS-Exchange-SenderADCheck: 1 X-MS-Exchange-AntiSpam-Relay: 0 X-Microsoft-Antispam: BCL:0;ARA:13230040|1800799024|376014|7416014|366016; X-Microsoft-Antispam-Message-Info: =?us-ascii?Q?pDbMVEmQsSMoveAavRzr6f2RBdfsUablwnCn4gWaP9TsB11cciLcxQ/NjvNd?= =?us-ascii?Q?G8eQ1fNoJdxi+U9rGp4obJa66GK4Rt+ZGINcGgtDvsB3BKwc36pfBlPBrOkx?= =?us-ascii?Q?NMFUgB20Lp6ybme58BtAwNhJkbOjEx2fLUA0fMr9xVH4QMFNtvNL0FchfgZx?= =?us-ascii?Q?GaCbGv/L3j7/18sJJQsyjyiPRDzYLRsqgK7oAUCUJ1xB8vmUby9xyXLiZ4Jv?= =?us-ascii?Q?BLhmqTniZDYcmhoz+myUApvO55/5B2we/d9/IYpJ1W/lAMdpdMy6jhLyua/y?= =?us-ascii?Q?nV0aCb2693PX6KDXwuTrgr0Vv8qvVu54DO7IK2lhujrBDTar3Xx5vE6vJttL?= =?us-ascii?Q?HmWoAWJKT2VslsFwMAxfEseYoYAmAYoqPIZCGNPxEgCQvoKkOFYUk3dvXCQA?= =?us-ascii?Q?TBHVf0046g+NPx33ahrqNgGV8S2juTfHJG7DIm4oIrg7CBxcCfuOjuGlGLzC?= =?us-ascii?Q?uZhdEbra/8wLERi+lt/iKLIC+0VQarlA1wUUP1myp4Dxmbs8sz7JTJa2LX2k?= =?us-ascii?Q?kqqyYB/DZd7eSTkmoxO4fq3hBE5L8cg3By6v6ZGqZ9MUkUrJPVebk6kTh3sl?= =?us-ascii?Q?YB5NPyGEvgtbI8V0osNRv8pchCuonIh52o3DayZVv7U+YLvxAf1adInZqFdl?= =?us-ascii?Q?oE/UIgzfOBZUj9jTAqNhrBaEUj/JGQ/3GMCIjh6PstWBbRHIV+njNJ7D8mhF?= =?us-ascii?Q?VFaUQbyls+CHA7pA8U9DASpHh3U4rQM1cE6gGWuuG84QdI0KLIIcvLXpvTXh?= =?us-ascii?Q?xrYakwcv7eL5FOD5ek4j/hz/hLz8+Q4iF1gDI91Pj52jkjnbUg+sEc5dRmtV?= =?us-ascii?Q?C4Tyc5wza5ZulM6oEoV4tQR7/OxF1uS7LGo5mQQOIuvR8hbScpml/jxBFrKt?= =?us-ascii?Q?vOUTWERXVtGao9UEuKQpRwKs63bLRv8m5QCVrxV6cm9nl2ipyilpXpwTaD5l?= =?us-ascii?Q?kODa9rOWBorwttbEHI81A3b/zB1aGMJHnZ58ONHXwO+4CEFKoALW3CZb08Xd?= =?us-ascii?Q?WiYHP9T60mFWdoUouUIvaHGaiBJ3/zgc1WWc3qOSLQwsj797JkzK4Jw755nZ?= =?us-ascii?Q?rCwQ5oXfcZQYhyly2bDXMfD8hicBXzD9G91shHvKqHU95/sRvZEHYBs3rr63?= =?us-ascii?Q?oTyNa/1VLAXzFKAh5HsuZnCcz/mOKWG9AXJXxBU4QO4TpENlA9jka1qNJMdj?= =?us-ascii?Q?6hDwrAAG/AkIO0PsZBUpvAsuhLx1hIIxK4hv4rZVF+DQbtt0ZMbQ12FSIKKd?= =?us-ascii?Q?Ur1tJBrI9aEpaR8+IF9IEqmNaBJFXbV1+/iNosP3+ti10EHou5CR4kTHBCyX?= =?us-ascii?Q?I1Ufmvl0Jdiv45/PUS1ZxQQGe/Te9MgEy2GgwT50YBK08Nysom1dRDpZCcQE?= =?us-ascii?Q?wXphW7qNXm2IeWsyWbjb4xb/b6+upKvQ43496trLu9VBgjmg+rTvqxbvROZd?= =?us-ascii?Q?h6EVnFSfRWc=3D?= X-Forefront-Antispam-Report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:DM4PR10MB8218.namprd10.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230040)(1800799024)(376014)(7416014)(366016);DIR:OUT;SFP:1101; X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1 X-MS-Exchange-AntiSpam-MessageData-0: =?us-ascii?Q?pMtemaMO630wAn0s69tqL6FKw42V7ot/VPE2Bcrsrj4Y5iYl+sTKa8OYsCnt?= =?us-ascii?Q?6j8xSd+U4xiESPSYGnN7SHKDW/XnCopCqy2FG0yWLIEfX1aQSRHS0tJsGI/O?= =?us-ascii?Q?Bw8o2VmQz+PSZ8kyGv4OkvTkmnJl6JcyiEu/Ntk6eTtg18A1RV/FaDHZMZS1?= =?us-ascii?Q?sxg7MiOo7HFhz7YaSlR6JR3vI4dhqzSQnZ4wZQ1Uxmeds5qxzX6RBfThCCPs?= =?us-ascii?Q?wpBOKokiRkktuOK+AWudieOSnG2Q2GmzvCU78zuPzpauhAAPi4+bFgquh5ss?= =?us-ascii?Q?y6VK5cFquX9I8/8o9RwoSkg2H+TBo4BcvQbgKqaJWUVDAykqX0zVzLW8kD59?= =?us-ascii?Q?slr5LTBhko18L/zQz1Fnvjep8EKLEJ3R6o7EzzyyINiHYHXlbLyjBosmrF1M?= =?us-ascii?Q?3tEjP/QaxI14JfMVarBjUMGpXSUIsICfCwoRCUNu7s429T7CyMA0xV/dOgXj?= =?us-ascii?Q?S4WtCp06k1azCpKZLPMMCql+tk7Pr4Xb1e1b64jbvLm1CkpFk2lU8O3vzCOt?= =?us-ascii?Q?HeyBxNBjhJ4X/4zg99Rv+XOjrREj2YjOEH1LddN8o+Qc9yTMzAfvOjJNUOc9?= =?us-ascii?Q?id+w11rbtVL51gvxiFirlHZjJAYEX4XM4UnuqLyB8Nt5wOE8cwwIIhIdWsOy?= =?us-ascii?Q?RaOTXp640TdfhvgC8uHHsdFDkX+k9tCyNov92zisqZuhvbU5tFdU0goEoUSX?= =?us-ascii?Q?Z4hgILQ4W/yKzijtcduXDYQ8V9W3ZIYMFPNzWz9dbAU8VtJkatn9F8NjptxK?= =?us-ascii?Q?9ndNPI4EKGV24kayrOoHAwretRDcnac9T/kH4Tq4PQFnKRkXFYifGUNoZiCx?= =?us-ascii?Q?xtTDyCIfOILLi5KGcuJo8VFXSD4gRbHB6h9tF8N7KDqUAv+iRNICF+K6fW2W?= =?us-ascii?Q?G2loluJeQytY31QTRBGG/7rQasAhI2h5DgI+zMR9xe0ZolAuzPwKWkvC8Jrl?= =?us-ascii?Q?qo9InZuJWiqEr66dZRHpYkAz96oqTQ2dJVJoJ/zW1H/P9iyZ2/YXXu49UOpV?= =?us-ascii?Q?XdDlhvkpZU3AQaQZDOBD3LGW6vRE7Un3+cHPOCGGmyCVRcV5nf9I2Fr8q2Ti?= =?us-ascii?Q?FvM3M90O1fFH3GNrD1iOIWifk6EIjGawUWP0O+mTkL5qHzc8BsJGRctVEaiw?= =?us-ascii?Q?KV9xf61HUE3FlCCsbYqcnD0m0Pn53LX6X3FGlSFLRNK0hHCm+xVfNJTlJDwy?= =?us-ascii?Q?FB3FWYPY/aTaYU3t0ad4meyZiOakBpwuH1A6BtbkcHIwkO5rCsGAW1s5ly2i?= =?us-ascii?Q?kKv1tbQuWtOr1CoZfSzJ60o/liYQxV5XVGJd7zVthUPEHacOFO3H7ty8LZOg?= =?us-ascii?Q?VENvdGkHIAtoGxhfSGLScQL1RCJDKe/SAjofkOnDjJlGM87v4bCD9rBOdvfu?= =?us-ascii?Q?Fmf+4xa6KwsCS4O7g0SAAnLz3DLUEolxYLFVECs92GezKIRmp0J9wNkqQzvF?= =?us-ascii?Q?uHB+WYysU3qRnLbt7wQKSU87MHKV9KWuGLeVfeyUgYK9b/lc9m+uRgxbzixY?= =?us-ascii?Q?ha6EpmjOgFvVF1Kw5lQaycWHd76EgPAmQk7AcJnOiYfrKnDK6zGD9wNtrJAu?= =?us-ascii?Q?2Y2y9FAljdjlwHohyxAOKa9UmcVt0IOCKYXrTfO6+3Lt+jywB94RgNjcvRVN?= =?us-ascii?Q?ew=3D=3D?= X-MS-Exchange-AntiSpam-ExternalHop-MessageData-ChunkCount: 1 X-MS-Exchange-AntiSpam-ExternalHop-MessageData-0: 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 X-OriginatorOrg: oracle.com X-MS-Exchange-CrossTenant-Network-Message-Id: a6afb426-fd17-4e3d-4a69-08ddd9b791b5 X-MS-Exchange-CrossTenant-AuthSource: DM4PR10MB8218.namprd10.prod.outlook.com X-MS-Exchange-CrossTenant-AuthAs: Internal X-MS-Exchange-CrossTenant-OriginalArrivalTime: 12 Aug 2025 15:47:40.5613 (UTC) X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted X-MS-Exchange-CrossTenant-Id: 4e2c6054-71cb-48f1-bd6c-3a9705aca71b X-MS-Exchange-CrossTenant-MailboxType: HOSTED X-MS-Exchange-CrossTenant-UserPrincipalName: nW8EWpbqfFTpR6ZhzU4HCAxiUT7LK98Zmo7s37Y3S29W8jDet3zYx9q0mYmMktAJ6sqStA7yn7k7YINxh9ICJ3j4TWTY75MdeOOCZ9/cR2g= X-MS-Exchange-Transport-CrossTenantHeadersStamped: SN7PR10MB6329 X-Proofpoint-Virus-Version: vendor=baseguard engine=ICAP:2.0.293,Aquarius:18.0.1099,Hydra:6.1.9,FMLib:17.12.80.40 definitions=2025-08-12_07,2025-08-11_01,2025-03-28_01 X-Proofpoint-Spam-Details: rule=notspam policy=default score=0 bulkscore=0 mlxscore=0 phishscore=0 spamscore=0 suspectscore=0 mlxlogscore=999 adultscore=0 malwarescore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.12.0-2507300000 definitions=main-2508120152 X-Proofpoint-ORIG-GUID: 2WjLIrO1VfdG14HOxDuEEVrB97TH8sd4 X-Proofpoint-Spam-Details-Enc: AW1haW4tMjUwODEyMDE1MiBTYWx0ZWRfX2JI5w3Zqedxf PAew3KhQksY94q3yP2sX+u85vVfOIVJTwRwstUafeAhXtOKl0SOLuOVED5Eo1K3VpTP9VlwpDIr UKdoUVVvd7ZU0UnDMS7jxhMmDcMwc2tWYvmCkVRUdhpsptmfqJhH8pjMurjRak/UOHhjCfsK157 2Dmy7kNz/wRyWznmmZNNTX6K45WDlAfIzWXEViRg7lUSkkoYP96JIXQHw7BrFQ+vcpVMi+7erhN XssoMNg7RiEMA3JAttdMULdupvd4E3ATgFXk1cNqUVerQ7VPYmZ3ah/hmwSXzqMQ/5w3A00hTii RwdmUVMFJBaZzV4agd0fzbOZkaPpvT5BY85fr/F67R5TfK2N2WDF/lBtMAcBuK+kcP20Vw3bZvA XIpz7LOrggUOXsfQybRGAlcJdFvYnVDSslATIClRhadCAxGHUG2ZjkK52bVGiapBlxMgvrsJ X-Authority-Analysis: v=2.4 cv=X9FSKHTe c=1 sm=1 tr=0 ts=689b6220 b=1 cx=c_pps a=qoll8+KPOyaMroiJ2sR5sw==:117 a=qoll8+KPOyaMroiJ2sR5sw==:17 a=6eWqkTHjU83fiwn7nKZWdM+Sl24=:19 a=z/mQ4Ysz8XfWz/Q5cLBRGdckG28=:19 a=lCpzRmAYbLLaTzLvsPZ7Mbvzbb8=:19 a=wKuvFiaSGQ0qltdbU6+NXLB8nM8=:19 a=Ol13hO9ccFRV9qXi2t6ftBPywas=:19 a=xqWC_Br6kY4A:10 a=2OwXVqhp2XgA:10 a=GoEa3M9JfhUA:10 a=yPCof4ZbAAAA:8 a=D9yTlg5YotqNTrSC_pQA:9 cc=ntf awl=host:12070 X-Proofpoint-GUID: 2WjLIrO1VfdG14HOxDuEEVrB97TH8sd4 Content-Type: text/plain; charset="utf-8" As part of the effort to move to mm->flags becoming a bitmap field, convert existing users to making use of the mm_flags_*() accessors which will, when the conversion is complete, be the only means of accessing mm_struct flags. No functional change intended. Signed-off-by: Lorenzo Stoakes Acked-by: David Hildenbrand Reported-by: kernel test robot Reviewed-by: Liam R. Howlett Reviewed-by: Mike Rapoport (Microsoft) --- arch/s390/mm/mmap.c | 4 ++-- arch/sparc/kernel/sys_sparc_64.c | 4 ++-- arch/x86/mm/mmap.c | 4 ++-- 3 files changed, 6 insertions(+), 6 deletions(-) diff --git a/arch/s390/mm/mmap.c b/arch/s390/mm/mmap.c index 40a526d28184..c884b580eb5e 100644 --- a/arch/s390/mm/mmap.c +++ b/arch/s390/mm/mmap.c @@ -182,10 +182,10 @@ void arch_pick_mmap_layout(struct mm_struct *mm, stru= ct rlimit *rlim_stack) */ if (mmap_is_legacy(rlim_stack)) { mm->mmap_base =3D mmap_base_legacy(random_factor); - clear_bit(MMF_TOPDOWN, &mm->flags); + mm_flags_clear(MMF_TOPDOWN, mm); } else { mm->mmap_base =3D mmap_base(random_factor, rlim_stack); - set_bit(MMF_TOPDOWN, &mm->flags); + mm_flag_set(MMF_TOPDOWN, mm); } } =20 diff --git a/arch/sparc/kernel/sys_sparc_64.c b/arch/sparc/kernel/sys_sparc= _64.c index c5a284df7b41..785e9909340f 100644 --- a/arch/sparc/kernel/sys_sparc_64.c +++ b/arch/sparc/kernel/sys_sparc_64.c @@ -309,7 +309,7 @@ void arch_pick_mmap_layout(struct mm_struct *mm, struct= rlimit *rlim_stack) gap =3D=3D RLIM_INFINITY || sysctl_legacy_va_layout) { mm->mmap_base =3D TASK_UNMAPPED_BASE + random_factor; - clear_bit(MMF_TOPDOWN, &mm->flags); + mm_flags_clear(MMF_TOPDOWN, mm); } else { /* We know it's 32-bit */ unsigned long task_size =3D STACK_TOP32; @@ -320,7 +320,7 @@ void arch_pick_mmap_layout(struct mm_struct *mm, struct= rlimit *rlim_stack) gap =3D (task_size / 6 * 5); =20 mm->mmap_base =3D PAGE_ALIGN(task_size - gap - random_factor); - set_bit(MMF_TOPDOWN, &mm->flags); + mm_flags_set(MMF_TOPDOWN, mm); } } =20 diff --git a/arch/x86/mm/mmap.c b/arch/x86/mm/mmap.c index 5ed2109211da..708f85dc9380 100644 --- a/arch/x86/mm/mmap.c +++ b/arch/x86/mm/mmap.c @@ -122,9 +122,9 @@ static void arch_pick_mmap_base(unsigned long *base, un= signed long *legacy_base, void arch_pick_mmap_layout(struct mm_struct *mm, struct rlimit *rlim_stack) { if (mmap_is_legacy()) - clear_bit(MMF_TOPDOWN, &mm->flags); + mm_flags_clear(MMF_TOPDOWN, mm); else - set_bit(MMF_TOPDOWN, &mm->flags); + mm_flags_set(MMF_TOPDOWN, mm); =20 arch_pick_mmap_base(&mm->mmap_base, &mm->mmap_legacy_base, arch_rnd(mmap64_rnd_bits), task_size_64bit(0), --=20 2.50.1 From nobody Sat Oct 4 20:52:45 2025 Received: from mx0b-00069f02.pphosted.com (mx0b-00069f02.pphosted.com [205.220.177.32]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 7388A23D7CB; Tue, 12 Aug 2025 15:48:26 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=fail smtp.client-ip=205.220.177.32 ARC-Seal: i=2; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1755013708; cv=fail; b=PZx8/m7zMI2YIf+fVzEqXrHC6Ih+8f+Nc81iYShMb0Vpp7cygAcxzcRUZLqLdbcEHcXQunMVx6lPSd4MHjqDElKYxmN0X1c7eM1X8u628Fv6iUbkr4GOFA/wXr+IXiuleScLHSNLbkaz0zqi5VKmwsEyb59zb8azRxzyc6sk0rA= ARC-Message-Signature: i=2; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1755013708; c=relaxed/simple; bh=jKOy5/Gx1zb09cbsjz4MCPUFiXjXlxNsej/4/XzXa54=; h=From:To:Cc:Subject:Date:Message-ID:In-Reply-To:References: Content-Type:MIME-Version; b=tVmP3R9GhwOkFnLM6mmAR9J//5K2ipJVuaEvS1ngUocxLcSnkg7ILr6jDVztCwzd+8cLN+VXZmkpTK6lsWjcyFXZM91TUi5Y/NRoH6FSoWpezj0JlHruByBYe8K+2y3JQlI0ZLcstgtBKOHK5bK/cp7NvJ+s1YhhaFlY+z3lNZY= ARC-Authentication-Results: i=2; smtp.subspace.kernel.org; dmarc=pass (p=reject dis=none) header.from=oracle.com; spf=pass smtp.mailfrom=oracle.com; dkim=pass (2048-bit key) header.d=oracle.com header.i=@oracle.com header.b=iwHEKhDe; dkim=pass (1024-bit key) header.d=oracle.onmicrosoft.com header.i=@oracle.onmicrosoft.com header.b=gdEK1Sqw; arc=fail smtp.client-ip=205.220.177.32 Authentication-Results: smtp.subspace.kernel.org; dmarc=pass (p=reject dis=none) header.from=oracle.com Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=oracle.com Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=oracle.com header.i=@oracle.com header.b="iwHEKhDe"; dkim=pass (1024-bit key) header.d=oracle.onmicrosoft.com header.i=@oracle.onmicrosoft.com header.b="gdEK1Sqw" Received: from pps.filterd (m0246631.ppops.net [127.0.0.1]) by mx0b-00069f02.pphosted.com (8.18.1.2/8.18.1.2) with ESMTP id 57CDBwIs012373; Tue, 12 Aug 2025 15:47:49 GMT DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=oracle.com; h=cc :content-transfer-encoding:content-type:date:from:in-reply-to :message-id:mime-version:references:subject:to; s= corp-2025-04-25; bh=p4WrW+v3s50+o12gso1QihZZVzhU+GSopk9B80MDx9E=; b= iwHEKhDenoU/uXX2Z/Fmj/IzS/ioi9o5wYHGRcDpjNnyw0buuumeMYXpB6KmYFFM Y/FjMY2Pmv3o02kVbV3JE433knwsl1bDdhcViyZ9wE9g/H4May3cCPW4Pbymt6VM pSU/WBONbEkjWF2zsavCo2XWWYUHaeX203iom+kAL/W0qL0dtcaJG6iNeb12C+mL VFmgU1Fmhp3JphwYHkHPVpjiLPbgVqXJT+mEjBW+lGvXFsltmjYGgWSr3BpLdbZY x342mRN2lTLyHFWfIuuq9k9vRRuDJL+3zNcLrZ3dF92xg3W6PJxN/+vJ++X9FAYz /WOsL/wv9ajhYMt6SeXJ7g== Received: from iadpaimrmta03.imrmtpd1.prodappiadaev1.oraclevcn.com (iadpaimrmta03.appoci.oracle.com [130.35.103.27]) by mx0b-00069f02.pphosted.com (PPS) with ESMTPS id 48dw44w2um-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK); Tue, 12 Aug 2025 15:47:49 +0000 (GMT) Received: from pps.filterd (iadpaimrmta03.imrmtpd1.prodappiadaev1.oraclevcn.com [127.0.0.1]) by iadpaimrmta03.imrmtpd1.prodappiadaev1.oraclevcn.com (8.18.1.2/8.18.1.2) with ESMTP id 57CF3CwW038739; Tue, 12 Aug 2025 15:47:48 GMT Received: from nam02-dm3-obe.outbound.protection.outlook.com (mail-dm3nam02on2083.outbound.protection.outlook.com [40.107.95.83]) by iadpaimrmta03.imrmtpd1.prodappiadaev1.oraclevcn.com (PPS) with ESMTPS id 48dvsgp95a-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK); Tue, 12 Aug 2025 15:47:48 +0000 ARC-Seal: i=1; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=none; b=RMkfGoE95bR9a8W5FTtZNspMFy2W4almV2zwQedGMdvWlcvWqZ3fTrqkoIFpgkyOFYFfnzdv4mmW9EnKDUiIo0/9Ox3OfDW++q9YTLVaC8uoNSHDUe8QbuSkaD+1EqyKbgOFFdizU7Jf+eB+46Ujf/xOEi1pFoq5U1IpHZNKsKYgw9rFR78gRyTFBiHPKgmRzoIWYc8AbBEj3u38u2ItQrScuRzVE2+1y3lUlfwab3XRWyLJcCBTbbVVXhNFnz8rkzsZrakbBbwjAonJ9XCMX9uIbJGEBkmbXbFap83fChYVOfcAKdnUpyHGOzCcip+8fYE6QqVhzV3U9Uhnr75C/w== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector10001; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=p4WrW+v3s50+o12gso1QihZZVzhU+GSopk9B80MDx9E=; b=Buv50QqeD6xMrjkuCqJiRW9rsu7MeEpR4a/GfG3uQOfYcgNbJjcRNztqtZir1wzbsjsDwh5NovKIP0jFRxPxh+X6ZmrCD2bWJBDhkXkFzcGOHbt6JM7rfi/Ql+AkDEgoYAI3DbH6gyTFmNbyirVLqOFJ5TwKmrVDIb0ucshJRHX4f9vvBdrIh4FvLApb/K8xOxpJmK0rl273953+D9kpV7sOCCEAYZYddud/wFCB9k4J4d1zM8E0OZ3ImS3Okezp73jnAbbff6onXuPTzAuy7IfwdFyMyXI/r2PYKbHTjLzQ5AMRhleO8AN9Dmr5IYOu8VgX10OMWmASdBhZeTZu1g== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=oracle.com; dmarc=pass action=none header.from=oracle.com; dkim=pass header.d=oracle.com; arc=none DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=oracle.onmicrosoft.com; s=selector2-oracle-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=p4WrW+v3s50+o12gso1QihZZVzhU+GSopk9B80MDx9E=; b=gdEK1Sqw0f4ZsULN948OFEZTspASP38bsU91wLGvm9tTqXszv+IPhF96HOaw9wHJ9HRn1VQ6Q9NW3Zzf+9oaiGYPnniLzFCK/LoNEs1R5j3I7hqsNA+/H91gpbafdGYqNyOxxZGuvwDKzCSWi7RzJAMX+yi6QWMuIvuVbD8ePug= Received: from DM4PR10MB8218.namprd10.prod.outlook.com (2603:10b6:8:1cc::16) by SN7PR10MB6383.namprd10.prod.outlook.com (2603:10b6:806:26d::18) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.9031.13; Tue, 12 Aug 2025 15:47:44 +0000 Received: from DM4PR10MB8218.namprd10.prod.outlook.com ([fe80::2650:55cf:2816:5f2]) by DM4PR10MB8218.namprd10.prod.outlook.com ([fe80::2650:55cf:2816:5f2%5]) with mapi id 15.20.9031.012; Tue, 12 Aug 2025 15:47:44 +0000 From: Lorenzo Stoakes To: Andrew Morton Cc: Alexander Gordeev , Gerald Schaefer , Heiko Carstens , Vasily Gorbik , Christian Borntraeger , Sven Schnelle , "David S . Miller" , Andreas Larsson , Dave Hansen , Andy Lutomirski , Peter Zijlstra , Thomas Gleixner , Ingo Molnar , Borislav Petkov , "H . Peter Anvin" , Alexander Viro , Christian Brauner , Jan Kara , Kees Cook , David Hildenbrand , Zi Yan , Baolin Wang , "Liam R . Howlett" , Nico Pache , Ryan Roberts , Dev Jain , Barry Song , Xu Xin , Chengming Zhou , Vlastimil Babka , Mike Rapoport , Suren Baghdasaryan , Michal Hocko , David Rientjes , Shakeel Butt , Arnaldo Carvalho de Melo , Namhyung Kim , Mark Rutland , Alexander Shishkin , Jiri Olsa , Ian Rogers , Adrian Hunter , Kan Liang , Masami Hiramatsu , Oleg Nesterov , Juri Lelli , Vincent Guittot , Dietmar Eggemann , Steven Rostedt , Ben Segall , Mel Gorman , Valentin Schneider , Jason Gunthorpe , John Hubbard , Peter Xu , Jann Horn , Pedro Falcato , Matthew Wilcox , Mateusz Guzik , linux-s390@vger.kernel.org, linux-kernel@vger.kernel.org, sparclinux@vger.kernel.org, linux-fsdevel@vger.kernel.org, linux-mm@kvack.org, linux-trace-kernel@vger.kernel.org, linux-perf-users@vger.kernel.org Subject: [PATCH 05/10] mm: convert uprobes to mm_flags_*() accessors Date: Tue, 12 Aug 2025 16:44:14 +0100 Message-ID: <1d4fe5963904cc0c707da1f53fbfe6471d3eff10.1755012943.git.lorenzo.stoakes@oracle.com> X-Mailer: git-send-email 2.50.1 In-Reply-To: References: Content-Transfer-Encoding: quoted-printable X-ClientProxiedBy: GVYP280CA0046.SWEP280.PROD.OUTLOOK.COM (2603:10a6:150:f9::16) To DM4PR10MB8218.namprd10.prod.outlook.com (2603:10b6:8:1cc::16) Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 X-MS-PublicTrafficType: Email X-MS-TrafficTypeDiagnostic: DM4PR10MB8218:EE_|SN7PR10MB6383:EE_ X-MS-Office365-Filtering-Correlation-Id: 509df06e-6089-4fb9-e724-08ddd9b79402 X-MS-Exchange-SenderADCheck: 1 X-MS-Exchange-AntiSpam-Relay: 0 X-Microsoft-Antispam: BCL:0;ARA:13230040|376014|366016|7416014|1800799024; X-Microsoft-Antispam-Message-Info: =?us-ascii?Q?xXM8+g64K/mRmjl6V2sN5wGsg9UPOwTucy2XYi5lI4x1hXqnxkzFB3QhJeMp?= =?us-ascii?Q?ddyszIlY7FLp9a9O3GV2efH2tXHXEfTvAiPfouwFKQ4l7Y+s+gghFbNGXVkv?= =?us-ascii?Q?fK5NTJEIyGQxFeBSzBa8D6mTunNoeN12+8FfQWNYokAczCkLNwvkKljnFZrD?= =?us-ascii?Q?zG3slyOhiHCbNJrmzu6ROt0msGOjZS14Y8ttpCshGHOvRcKm5ksH0kPXEOGa?= =?us-ascii?Q?jfas5Gd9W0E03+dwlWf0WPLkl1KYP/4/1rCBLLPehml3P/dJMJrfc35euBMK?= =?us-ascii?Q?gjyOMVaUJ2j5CQM7V94G/qhgKIgu6UphR1i1Cot5hVrbtMPfLiM7o816kMDe?= =?us-ascii?Q?wIrfS9eHEpOA6kLVjBIr4Lw4PfFw+dIu5XaXzEXcHQEGh57COasY1BDtwdfV?= =?us-ascii?Q?g+pjtinNUSXh+KVtuou1ymSyMxUzCDNbAyjdAD5AaJINcTLNjgfrL8r6EM+e?= =?us-ascii?Q?g9/ekD+rWib9obFAbuHhvgZkbt5b6f8CZm6YAwLat7KtqeNOlZHXIBNqc3RZ?= =?us-ascii?Q?5ApPpz60PjMltbbJtuAePCSZjIdSj3iayYgWxhb85xUqEGkVzFjYAcOD9Nnf?= =?us-ascii?Q?aExv/iftD2BLa+JZr8il8egMqFHLay45STBv2SNhNOOpxGPLHgPffJKVvVHt?= =?us-ascii?Q?KMvRAUd7h2YBHEE88Knvh6G7N81t9FPxvm/KwyJtL2PctddKuQic0RXHoGVx?= =?us-ascii?Q?rZsBIDX+UJWu+MGMGz6LzYIYwpQ5hMTfPZD7LCjK/8QQGeB8sEIvQy5vSEvM?= =?us-ascii?Q?0MUxCgz2dG3Q425G3SQEcxVnTMDR8jydCO0cvGzX+JEu1Wg/SdEBgQZHatxa?= =?us-ascii?Q?7g7xbZCNOLl9z6hdoTkQbBJKB2teYUFDfJEJOy/odpQ5C39parGZQov242ZD?= =?us-ascii?Q?dDVmkXUhI4Bm02z8G6Z8qJEBbFs62gqv22MIQsMYj/tU3DuLApyAhpx2mf8X?= =?us-ascii?Q?LEIbBBUOraTT+6go2Lenr9zavhx2/O1gAci37I55iB7tbs/JnKfgSKSVracw?= =?us-ascii?Q?JEBxx4+zw+A/TZA8o0VAri87GiEcqS6C2IqlVYH3oPOZrFmJkkvoDqPhkuKD?= =?us-ascii?Q?BXWObAgTIAw576QDRi+WSgWbhlyGHFi+XfG57pT+jA99CAAS9gDSF5h1/cTt?= =?us-ascii?Q?mIweeLHUcu+ZHQkMzD5XwnVJD1HaTTNSmpfxK5gZj4QcQxxU22wh5Uc/jAAS?= =?us-ascii?Q?BlOVKCBJGdiDz7FnNH5mDCjO/kFrQjEvHuIGqrZOl/5nrMPNfA/g1xf4jys+?= =?us-ascii?Q?XahBB8N645yf2u2SnXcBwLhpmvNnAd96RTUUoPutwrZGF+E2Yj9MJ9z7Ejr7?= =?us-ascii?Q?Rcc4Vx6Dzwo48a72B4bdqdG53Qx5oAazPvoeQRGbOd52Blsgt6aArRs1Rdpk?= =?us-ascii?Q?jFMjknJiSbv52qO8FYWjGWzbT15a7Z3pn7+szvBZmGJcWFC1JVJVTml7pIE/?= =?us-ascii?Q?jKb7DrPW/Pk=3D?= X-Forefront-Antispam-Report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:DM4PR10MB8218.namprd10.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230040)(376014)(366016)(7416014)(1800799024);DIR:OUT;SFP:1101; X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1 X-MS-Exchange-AntiSpam-MessageData-0: =?us-ascii?Q?j/sRh3lCpY6zlzufN0sZAeXPGTAUpYBbBkezF+LtZFOLADhWcu/+jPKni+OI?= =?us-ascii?Q?iUBaErnplGJ40KTktLwPly/0/PNmngTPHOzfPM4Dgwdd9jhaUiyrSeNB105U?= =?us-ascii?Q?6hpr6xtudiF3BSZNXa7Zdal4wcLMItWtyXASqsbRnnJyWUtm/s/D4s+/K+b1?= =?us-ascii?Q?6+AzE+qKBUMISO/YDfVs52hiMML6UWtoOgVltOsMdvaLwXSKTcgyFsyXvDGl?= =?us-ascii?Q?eFy1eiqqf0JLK7G8REKNdyvJaLgCYxDF34R2+a8IHgG2r+86XjSHwOwNhkAb?= =?us-ascii?Q?qmfJtuVcE/R5rjovjwoac4mT+7wJ4W9sVRgSgcjurc2qMF1tKgTZRZd0/Ot9?= =?us-ascii?Q?XlU6ZdDQQMdt/yAAy/Jp3eoUnThFGmdZFBJc8lt+qIC4WwLxmxGFvgBJ2Mcs?= =?us-ascii?Q?P8ha7H1lmJhKTmEAdK9Kw1StiLOZPYmfMJvb0ASxCCp9Mv0aWQQ0FFgCgp9U?= =?us-ascii?Q?H118Ul0CMpqRF4c2wWCiwjEJ66ua9ZYbgmfgnSi8jI0LMcrbCt/HVbGnkNnM?= =?us-ascii?Q?PAsP8f3BVlVyyNot28lluBmhzywI+bXvlIUPJQaTtjBzE54HYnIoO9XtOg9L?= =?us-ascii?Q?Cp2jKHgpEerPImXMuM4VGzv2gN4+fs3vhlfCLHatNJ3T+vNqvr00/TBWxSOA?= =?us-ascii?Q?9ytqrEAdkdjV5p8MFEBUs9Z5g0ENFR/w7wuQDoBeejx4jFfM/TriWHqbndDn?= =?us-ascii?Q?t3jJBMsUT3N+wyRPS/7Og4KZjSyKf9LbLTctXNf6r3wgPoMV+CUqe22wQR0U?= =?us-ascii?Q?fT8tqkNOKgVKlOGOHCAMj2YNp5aJngzzbi5zNdK+P+/kRSv3owKVRR5G/tiN?= =?us-ascii?Q?HUgc4sKRHiJPqzNMW//hHfbbRzPCLvAzJidOMPcAXaY1wt+UYrtJc7rW4TzH?= =?us-ascii?Q?jdAQ+CoWQ0s+UVMRkqIb+RaWRLGCpX2YhF2RGP9Qjl6YpUlScMXFUVSDb+uB?= =?us-ascii?Q?v22z7zWtW+4OMwCavlcRj55+tXb9W73uz3BSriwFURK21cDDc/rPAVw2O1Ud?= =?us-ascii?Q?x4Ib2pn+PJNph3SICB9LU+86vrfbC0+gc2hk3vR/HQTte8AJULNedLL1m6A+?= =?us-ascii?Q?uTx3gIXoTOvw8pBE+JQq5WBW6I/e6qVGFSsUgJc/R6neCjc8HKkfGXvo+ZwV?= =?us-ascii?Q?9dib3kQAVttKKIpsbkPAV+iHKQzUvTLtbAt5oolii6mqyVswspwB39SlKCle?= =?us-ascii?Q?mFfyNhqNiAdOfKtk+Sm2wgKx9YemiII+Xqk0jMawFDt1Meu66TQY/C/kAjIR?= =?us-ascii?Q?7XxSjpYi1Nl+MoKJDYO0MQgxJnl7ZYielgrWp/aE0uUQHTLRqgAkqakjdHWJ?= =?us-ascii?Q?GeTExkqBr5T7BAX38Vt77EjWq9pz+MGmg3b/70blaQmRPAws4P2TAhndf1Sh?= =?us-ascii?Q?Ha87xJg7pOjK1YK7bUlXeO0DKprh+pxUnEBuhhhBAo5P/ZcJGkLWwNppDC8V?= =?us-ascii?Q?86b1PtyEJ+8jYV4D0esLOxZpCJ4EthOc+UzGzjKctHHDPN2J3gO6T9CtNb74?= =?us-ascii?Q?ww9ODgc2uU50jqJUHHllqxnBzTJiUZNGXqfSx/09fT05DALhJvC+/1pRXXZ0?= =?us-ascii?Q?uatTJkNAAV+PD7JatnVSE3ge48Am2XIo+FIebmAgIU3nyA2x2AtS0lyNEfXz?= =?us-ascii?Q?1w=3D=3D?= X-MS-Exchange-AntiSpam-ExternalHop-MessageData-ChunkCount: 1 X-MS-Exchange-AntiSpam-ExternalHop-MessageData-0: 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 X-OriginatorOrg: oracle.com X-MS-Exchange-CrossTenant-Network-Message-Id: 509df06e-6089-4fb9-e724-08ddd9b79402 X-MS-Exchange-CrossTenant-AuthSource: DM4PR10MB8218.namprd10.prod.outlook.com X-MS-Exchange-CrossTenant-AuthAs: Internal X-MS-Exchange-CrossTenant-OriginalArrivalTime: 12 Aug 2025 15:47:44.2759 (UTC) X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted X-MS-Exchange-CrossTenant-Id: 4e2c6054-71cb-48f1-bd6c-3a9705aca71b X-MS-Exchange-CrossTenant-MailboxType: HOSTED X-MS-Exchange-CrossTenant-UserPrincipalName: V3dBsR3ewrMfXy80EC6RjS9fizEuxXea7TvrFKES3mqoNJMOO3ae+/doxHnTgmtswmmadNwWXN8u2mx7WyEXuxQifTHDYWN6xoTbrZWepew= X-MS-Exchange-Transport-CrossTenantHeadersStamped: SN7PR10MB6383 X-Proofpoint-Virus-Version: vendor=baseguard engine=ICAP:2.0.293,Aquarius:18.0.1099,Hydra:6.1.9,FMLib:17.12.80.40 definitions=2025-08-12_07,2025-08-11_01,2025-03-28_01 X-Proofpoint-Spam-Details: rule=notspam policy=default score=0 bulkscore=0 mlxscore=0 phishscore=0 spamscore=0 suspectscore=0 mlxlogscore=999 adultscore=0 malwarescore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.12.0-2507300000 definitions=main-2508120152 X-Proofpoint-ORIG-GUID: YBNnHr4N9GnYNowe9gLGzfB2JhDlAPAJ X-Proofpoint-Spam-Details-Enc: AW1haW4tMjUwODEyMDE1MiBTYWx0ZWRfX9wnRKQ6ooeCK fhLN/io0QuFetlbZKbCCLuA6VmbRlWi0p38Rg8Z+9LoEwL4GyPCjY6ViUmgyi52DHCRwjRE5F+l 6bkTfyjK1xfGBNCIuxIMgiFjsZp0PiF7hchWwGCbH6Qx4exGFvduWJgxLrZClYbmkOUAztVoCDW s6u2OoOoEvexzCjpZHVM+qeqWG+H0H+wS1BXdpKNJbjjyTIOyISdak+klylOeUxf6XHcN0K873e Y6KTs4DV8NbTlhMR2XGK9FMnTCl/zXpCr70dBTmMANRnozfwIE/HSSAXwdfmPAMxRcWELWjoQZ+ x3Hs3tGaybCcxjm9cjo8NI902HJH+fD5yVxrhk44ZaZrKIbSt3V4c5M6InwAu/mv1H8QyzugY0s cDexnWdnoaToioh7AY2MDuYrWPJeeqpoyJc+ZsZk5to0jxZlmikxMcYvw3EdK2IjqCEhOHIh X-Authority-Analysis: v=2.4 cv=X9FSKHTe c=1 sm=1 tr=0 ts=689b6225 b=1 cx=c_pps a=qoll8+KPOyaMroiJ2sR5sw==:117 a=qoll8+KPOyaMroiJ2sR5sw==:17 a=6eWqkTHjU83fiwn7nKZWdM+Sl24=:19 a=z/mQ4Ysz8XfWz/Q5cLBRGdckG28=:19 a=lCpzRmAYbLLaTzLvsPZ7Mbvzbb8=:19 a=wKuvFiaSGQ0qltdbU6+NXLB8nM8=:19 a=Ol13hO9ccFRV9qXi2t6ftBPywas=:19 a=xqWC_Br6kY4A:10 a=2OwXVqhp2XgA:10 a=GoEa3M9JfhUA:10 a=yPCof4ZbAAAA:8 a=2hV2yruqUzzz4P05FaUA:9 cc=ntf awl=host:12070 X-Proofpoint-GUID: YBNnHr4N9GnYNowe9gLGzfB2JhDlAPAJ Content-Type: text/plain; charset="utf-8" As part of the effort to move to mm->flags becoming a bitmap field, convert existing users to making use of the mm_flags_*() accessors which will, when the conversion is complete, be the only means of accessing mm_struct flags. No functional change intended. Signed-off-by: Lorenzo Stoakes Acked-by: David Hildenbrand Reviewed-by: Liam R. Howlett Reviewed-by: Mike Rapoport (Microsoft) --- kernel/events/uprobes.c | 32 ++++++++++++++++---------------- 1 file changed, 16 insertions(+), 16 deletions(-) diff --git a/kernel/events/uprobes.c b/kernel/events/uprobes.c index 7ca1940607bd..31a12b60055f 100644 --- a/kernel/events/uprobes.c +++ b/kernel/events/uprobes.c @@ -1153,15 +1153,15 @@ static int install_breakpoint(struct uprobe *uprobe= , struct vm_area_struct *vma, * set MMF_HAS_UPROBES in advance for uprobe_pre_sstep_notifier(), * the task can hit this breakpoint right after __replace_page(). */ - first_uprobe =3D !test_bit(MMF_HAS_UPROBES, &mm->flags); + first_uprobe =3D !mm_flags_test(MMF_HAS_UPROBES, mm); if (first_uprobe) - set_bit(MMF_HAS_UPROBES, &mm->flags); + mm_flags_set(MMF_HAS_UPROBES, mm); =20 ret =3D set_swbp(&uprobe->arch, vma, vaddr); if (!ret) - clear_bit(MMF_RECALC_UPROBES, &mm->flags); + mm_flags_clear(MMF_RECALC_UPROBES, mm); else if (first_uprobe) - clear_bit(MMF_HAS_UPROBES, &mm->flags); + mm_flags_clear(MMF_HAS_UPROBES, mm); =20 return ret; } @@ -1171,7 +1171,7 @@ static int remove_breakpoint(struct uprobe *uprobe, s= truct vm_area_struct *vma, { struct mm_struct *mm =3D vma->vm_mm; =20 - set_bit(MMF_RECALC_UPROBES, &mm->flags); + mm_flags_set(MMF_RECALC_UPROBES, mm); return set_orig_insn(&uprobe->arch, vma, vaddr); } =20 @@ -1303,7 +1303,7 @@ register_for_each_vma(struct uprobe *uprobe, struct u= probe_consumer *new) /* consult only the "caller", new consumer. */ if (consumer_filter(new, mm)) err =3D install_breakpoint(uprobe, vma, info->vaddr); - } else if (test_bit(MMF_HAS_UPROBES, &mm->flags)) { + } else if (mm_flags_test(MMF_HAS_UPROBES, mm)) { if (!filter_chain(uprobe, mm)) err |=3D remove_breakpoint(uprobe, vma, info->vaddr); } @@ -1595,7 +1595,7 @@ int uprobe_mmap(struct vm_area_struct *vma) =20 if (vma->vm_file && (vma->vm_flags & (VM_WRITE|VM_SHARED)) =3D=3D VM_WRITE && - test_bit(MMF_HAS_UPROBES, &vma->vm_mm->flags)) + mm_flags_test(MMF_HAS_UPROBES, vma->vm_mm)) delayed_ref_ctr_inc(vma); =20 if (!valid_vma(vma, true)) @@ -1655,12 +1655,12 @@ void uprobe_munmap(struct vm_area_struct *vma, unsi= gned long start, unsigned lon if (!atomic_read(&vma->vm_mm->mm_users)) /* called by mmput() ? */ return; =20 - if (!test_bit(MMF_HAS_UPROBES, &vma->vm_mm->flags) || - test_bit(MMF_RECALC_UPROBES, &vma->vm_mm->flags)) + if (!mm_flags_test(MMF_HAS_UPROBES, vma->vm_mm) || + mm_flags_test(MMF_RECALC_UPROBES, vma->vm_mm)) return; =20 if (vma_has_uprobes(vma, start, end)) - set_bit(MMF_RECALC_UPROBES, &vma->vm_mm->flags); + mm_flags_set(MMF_RECALC_UPROBES, vma->vm_mm); } =20 static vm_fault_t xol_fault(const struct vm_special_mapping *sm, @@ -1823,10 +1823,10 @@ void uprobe_end_dup_mmap(void) =20 void uprobe_dup_mmap(struct mm_struct *oldmm, struct mm_struct *newmm) { - if (test_bit(MMF_HAS_UPROBES, &oldmm->flags)) { - set_bit(MMF_HAS_UPROBES, &newmm->flags); + if (mm_flags_test(MMF_HAS_UPROBES, oldmm)) { + mm_flags_set(MMF_HAS_UPROBES, newmm); /* unconditionally, dup_mmap() skips VM_DONTCOPY vmas */ - set_bit(MMF_RECALC_UPROBES, &newmm->flags); + mm_flags_set(MMF_RECALC_UPROBES, newmm); } } =20 @@ -2370,7 +2370,7 @@ static void mmf_recalc_uprobes(struct mm_struct *mm) return; } =20 - clear_bit(MMF_HAS_UPROBES, &mm->flags); + mm_flags_clear(MMF_HAS_UPROBES, mm); } =20 static int is_trap_at_addr(struct mm_struct *mm, unsigned long vaddr) @@ -2468,7 +2468,7 @@ static struct uprobe *find_active_uprobe_rcu(unsigned= long bp_vaddr, int *is_swb *is_swbp =3D -EFAULT; } =20 - if (!uprobe && test_and_clear_bit(MMF_RECALC_UPROBES, &mm->flags)) + if (!uprobe && mm_flags_test_and_clear(MMF_RECALC_UPROBES, mm)) mmf_recalc_uprobes(mm); mmap_read_unlock(mm); =20 @@ -2818,7 +2818,7 @@ int uprobe_pre_sstep_notifier(struct pt_regs *regs) if (!current->mm) return 0; =20 - if (!test_bit(MMF_HAS_UPROBES, ¤t->mm->flags) && + if (!mm_flags_test(MMF_HAS_UPROBES, current->mm) && (!current->utask || !current->utask->return_instances)) return 0; =20 --=20 2.50.1 From nobody Sat Oct 4 20:52:45 2025 Received: from mx0a-00069f02.pphosted.com (mx0a-00069f02.pphosted.com [205.220.165.32]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id C32A32F7452; Tue, 12 Aug 2025 15:48:38 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=fail smtp.client-ip=205.220.165.32 ARC-Seal: i=2; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1755013720; cv=fail; b=XzL/LhNqHb4N45kMGqdAxNGtLg0C0nkzww5ajjVRJG0vJ0q/K9EHTYskh62zxQHqI3YL/CzDi/aH5LcpQ24UVEXL0eTZkE1ZZ2QldhDtxTFt5Xy/GWQo7dPO8R8gsZ/bR1hDwJ4ik1ey2BllwKezbqVQVgQFuibxMjyWkpNoBUE= ARC-Message-Signature: i=2; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1755013720; c=relaxed/simple; bh=Wg/WB6tcG0IKIX2RlDJaXaQhJdOIuNuLF6WFwBVYopo=; h=From:To:Cc:Subject:Date:Message-ID:In-Reply-To:References: Content-Type:MIME-Version; b=pPtkVdq0aOKdIkJqz1E+HmFWoZOS8zw9wNpQBMEt31KF/4yMTd+3b4+h7Gm3S4bD0KV4NVs33UcYoOXdKtR4HuUbf4c1vmjPTBDqXhJC1bq3X8/f8Pbx7io0vQUWbmNKYRPCTDbjuyG6XZvM+mGjNUDpHSFQpU9jdkzQR7fuDSQ= ARC-Authentication-Results: i=2; smtp.subspace.kernel.org; dmarc=pass (p=reject dis=none) header.from=oracle.com; spf=pass smtp.mailfrom=oracle.com; dkim=pass (2048-bit key) header.d=oracle.com header.i=@oracle.com header.b=DmMqjwsz; dkim=pass (1024-bit key) header.d=oracle.onmicrosoft.com header.i=@oracle.onmicrosoft.com header.b=klx0pzl0; arc=fail smtp.client-ip=205.220.165.32 Authentication-Results: smtp.subspace.kernel.org; dmarc=pass (p=reject dis=none) header.from=oracle.com Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=oracle.com Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=oracle.com header.i=@oracle.com header.b="DmMqjwsz"; dkim=pass (1024-bit key) header.d=oracle.onmicrosoft.com header.i=@oracle.onmicrosoft.com header.b="klx0pzl0" Received: from pps.filterd (m0246627.ppops.net [127.0.0.1]) by mx0b-00069f02.pphosted.com (8.18.1.2/8.18.1.2) with ESMTP id 57CDC04G021868; Tue, 12 Aug 2025 15:47:58 GMT DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=oracle.com; h=cc :content-transfer-encoding:content-type:date:from:in-reply-to :message-id:mime-version:references:subject:to; s= corp-2025-04-25; bh=wpMTDBj67IGcrceFB07qs/Qs9DxiWzedQjqpIqKoUFg=; b= DmMqjwszgfGTvxbE+KU3tijpgiRHXaAhGoW5W518C5j2eH3+SwVGCS12xgWbbt9X mv7kon9Hhpk01c9a3oScdyrEo6PNtFqV+XGJxDGUrq5393A+NrNR9+E4Fa6CvtLj d5pHuMUh591x9CbgyKNTfu+KfSDxVc/8NicgbZ9IvF0bwKTJI9dsVF300o/JYtq0 fuGjVJBfWozAU5DcDQe75H+TOOBLKVuZhti85E0v+dr/9aA8bZuiOSo2rPMjacUT U+iSRkvd9BeL9KY5L7gGeZ7EoeM7OzZXwJklm5fTku0xBsfBnIsUFwNDwkH7cKFh ZlAAE3sN1dtwkkCRFAuVSA== Received: from iadpaimrmta03.imrmtpd1.prodappiadaev1.oraclevcn.com (iadpaimrmta03.appoci.oracle.com [130.35.103.27]) by mx0b-00069f02.pphosted.com (PPS) with ESMTPS id 48dvx4d1mn-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK); Tue, 12 Aug 2025 15:47:57 +0000 (GMT) Received: from pps.filterd (iadpaimrmta03.imrmtpd1.prodappiadaev1.oraclevcn.com [127.0.0.1]) by iadpaimrmta03.imrmtpd1.prodappiadaev1.oraclevcn.com (8.18.1.2/8.18.1.2) with ESMTP id 57CEKIuw038606; Tue, 12 Aug 2025 15:47:56 GMT Received: from nam11-bn8-obe.outbound.protection.outlook.com (mail-bn8nam11on2044.outbound.protection.outlook.com [40.107.236.44]) by iadpaimrmta03.imrmtpd1.prodappiadaev1.oraclevcn.com (PPS) with ESMTPS id 48dvsgp972-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK); Tue, 12 Aug 2025 15:47:56 +0000 ARC-Seal: i=1; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=none; b=qqLi5pn5ZCOo49TpxM8VBeDvvzr9pXagp0RVlyGbptqBuJ2088o99tyfXcp8qg3kPNDD0V5koNH4rdR4eiyMjkE+F64htkDFbNXAV10BWNkOLFQgWNAE/crd4yc7WJaAy5GEK/8d/5Hio7YZ4ZOSFzA7MEUMSujnUcvNyii98ytGrFSycnwob9SUstoRmPeZ81R940J3pqn+WGGAn5tvBnQqE0b9R6WG+UcBv52TF3W3diofVaidWJB4bGQhlebuvcs1qnyb6rwVY3LoIA8UeGJvRRaq1sWtCCa7d2M+dX9dC/g8a0BhAG1UBU2+IBGP3CtqhydUR4KklmcE9uYrow== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector10001; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=wpMTDBj67IGcrceFB07qs/Qs9DxiWzedQjqpIqKoUFg=; b=jyZIC5kePct+HTEXw7z7ZbbNu5yZ3VAlUhrhM7LkQQo2Png39ZY6vycAEIJxaVQdaCCrn1JGC6BG4BT9x2g2RHr9W9pmK1PYXRsYCcRhCvTq8O6+sV5hbu4T011Y5YCCj/f01DeG8lNcZdtsQjiipXujR9lPRuPvJ0utyqhTxkmVLZ4Wh0TMhsmqIheRSFsyg9uiLZKfxAg+V6yK1DKT30XLf1SvGRzaizknU3aqyz7qRwqI4bRf18AArzkwEM/pDylYg5YxxLLV2Srdm1OIu0uZtQvrpeA5YXiESH4/FWn+u79FO2PBNUAtzFJmJ5pkhE0jqaww3jgNF8n220HA1A== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=oracle.com; dmarc=pass action=none header.from=oracle.com; dkim=pass header.d=oracle.com; arc=none DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=oracle.onmicrosoft.com; s=selector2-oracle-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=wpMTDBj67IGcrceFB07qs/Qs9DxiWzedQjqpIqKoUFg=; b=klx0pzl0lM2+5PoduzxGBJ0lq8+X8BnnYyzqQidvxa1+P4BscUerud8nn7lLDKXa7JaYGJ9/6iZCWHviMx8Ja/SM6oF5NcIM2GvU9Qzslcrb+CcXco3A+TD1Q1qhCx5K+YVUYywjpCfWCJym1F6Gw4L4zWfXQ1rkh2T79vEjR4Y= Received: from DM4PR10MB8218.namprd10.prod.outlook.com (2603:10b6:8:1cc::16) by SN7PR10MB6383.namprd10.prod.outlook.com (2603:10b6:806:26d::18) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.9031.13; Tue, 12 Aug 2025 15:47:48 +0000 Received: from DM4PR10MB8218.namprd10.prod.outlook.com ([fe80::2650:55cf:2816:5f2]) by DM4PR10MB8218.namprd10.prod.outlook.com ([fe80::2650:55cf:2816:5f2%5]) with mapi id 15.20.9031.012; Tue, 12 Aug 2025 15:47:48 +0000 From: Lorenzo Stoakes To: Andrew Morton Cc: Alexander Gordeev , Gerald Schaefer , Heiko Carstens , Vasily Gorbik , Christian Borntraeger , Sven Schnelle , "David S . Miller" , Andreas Larsson , Dave Hansen , Andy Lutomirski , Peter Zijlstra , Thomas Gleixner , Ingo Molnar , Borislav Petkov , "H . Peter Anvin" , Alexander Viro , Christian Brauner , Jan Kara , Kees Cook , David Hildenbrand , Zi Yan , Baolin Wang , "Liam R . Howlett" , Nico Pache , Ryan Roberts , Dev Jain , Barry Song , Xu Xin , Chengming Zhou , Vlastimil Babka , Mike Rapoport , Suren Baghdasaryan , Michal Hocko , David Rientjes , Shakeel Butt , Arnaldo Carvalho de Melo , Namhyung Kim , Mark Rutland , Alexander Shishkin , Jiri Olsa , Ian Rogers , Adrian Hunter , Kan Liang , Masami Hiramatsu , Oleg Nesterov , Juri Lelli , Vincent Guittot , Dietmar Eggemann , Steven Rostedt , Ben Segall , Mel Gorman , Valentin Schneider , Jason Gunthorpe , John Hubbard , Peter Xu , Jann Horn , Pedro Falcato , Matthew Wilcox , Mateusz Guzik , linux-s390@vger.kernel.org, linux-kernel@vger.kernel.org, sparclinux@vger.kernel.org, linux-fsdevel@vger.kernel.org, linux-mm@kvack.org, linux-trace-kernel@vger.kernel.org, linux-perf-users@vger.kernel.org Subject: [PATCH 06/10] mm: update coredump logic to correctly use bitmap mm flags Date: Tue, 12 Aug 2025 16:44:15 +0100 Message-ID: <2a5075f7e3c5b367d988178c79a3063d12ee53a9.1755012943.git.lorenzo.stoakes@oracle.com> X-Mailer: git-send-email 2.50.1 In-Reply-To: References: Content-Transfer-Encoding: quoted-printable X-ClientProxiedBy: GVZP280CA0074.SWEP280.PROD.OUTLOOK.COM (2603:10a6:150:274::15) To DM4PR10MB8218.namprd10.prod.outlook.com (2603:10b6:8:1cc::16) Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 X-MS-PublicTrafficType: Email X-MS-TrafficTypeDiagnostic: DM4PR10MB8218:EE_|SN7PR10MB6383:EE_ X-MS-Office365-Filtering-Correlation-Id: 168193fa-7b82-4c83-1a0e-08ddd9b7964e X-MS-Exchange-SenderADCheck: 1 X-MS-Exchange-AntiSpam-Relay: 0 X-Microsoft-Antispam: BCL:0;ARA:13230040|376014|366016|7416014|1800799024; X-Microsoft-Antispam-Message-Info: =?us-ascii?Q?CmSc1FTeRKEQ9iDC8FSBe01v51/+65r39YLq7mCbd4w/DBo9XVCoUA46O1Ad?= =?us-ascii?Q?jn6be6/cNTLfqvGIJpUyMx5zqT/jc4JWKoNmH1pQKhAyMLLh4X3PBjVIl9+N?= =?us-ascii?Q?MO/Eo+92FU5Pzz2O1cwpmZZoG0EkOfO4Akd18/SMlVriHCIvBrz2v0EzLn1k?= =?us-ascii?Q?klJgB0HfuolMatY9aqaSdhfquGa8SQpfYFc60YpfeW7z75+AICG9ilQT2xTi?= =?us-ascii?Q?IzCjLM5DVqwnqZHCaODVDLoi+At70j9hpXmHXm9NURIEU3A0FQ3DWsg800Pb?= =?us-ascii?Q?a/IAaD5zeQsdo7aPgy4nhM58hCvx3bRU7fCD8Vog+Qm+XX6bwlueYuq9I3uO?= =?us-ascii?Q?m2nO12SYlMmkdpIhqv+GfOi9g3RpE2xBJeKE5jmp2QJmpgvTXvT7NfFhHwNS?= =?us-ascii?Q?eeZsYZhPyADqboVo2YamLh9jfkaTZ5/FxaxsO9ifqXZ/CzCYRHGiBflUboua?= =?us-ascii?Q?hLyQ10Ol95VRvh+7/V3YO/ungykOYB9PcIN1jK1mGPuBg6RIuSJqOOePmkP+?= =?us-ascii?Q?O26TZJ4nm2r+sr7ZDJAvhjdNgVK5pVM8/O7n4N258aPuu/frD+31iVnpyJNb?= =?us-ascii?Q?jqfUWd9jPB/4Qc6+uxjJXsHUSBFINqV57hTcys9AcXvpVe0OZ7JLl4+bL+8q?= =?us-ascii?Q?gQidxESg1smxbsiIHXTIsxYTXq7zdwF5IGNMIY6YbnxRqLBiVWfyMcKKLvP5?= =?us-ascii?Q?ZkNcGYHix/BRe4DVwWrifvPPz1tg3aYH5LxequU4p8oB2f3Mj1mRACd5HrQU?= =?us-ascii?Q?tmcsXPTwLQzOOq4aYofHHqbcs7DfieVlT6txsx/NMR8lSPNBt/v/ZD4247Z9?= =?us-ascii?Q?koKcfhH/I5Fn8XrekXr4EONNGwg7MmbfpAzdTdUFmTtq/7qfWurnp9c3jlDx?= =?us-ascii?Q?7rqRgcwejmlxtjCZdznIWzEiL+9L797gCniUExfTIZMtAaLC66W9qYH5UCOn?= =?us-ascii?Q?HDbLMiToq8iE/ojuXOklP80buPqnW0X71lbbfG9psW0o7vWURTWROoh+dRay?= =?us-ascii?Q?lHfi9xnY5+e/YflNXaNYuTlYXoDNeZYrepnmC690uDAkfmzghO4qGca3qbJ+?= =?us-ascii?Q?InQkTPAQ0klq5AcJOscEumCH+CUZmM/UbNqkQA1D0ZVMKcWLDRjCZzi5oP0A?= =?us-ascii?Q?eJ0wqI7K83P+WRgYoLGpO2QMGZwRY/0sqlbHTFmfT7hkuIaBX2Vn6ZCezjYR?= =?us-ascii?Q?LKDaCFiZISrx9/8ed6rmZUAVgY6q7xRmUK7eHv5FGLuLNpuWWyubQ9MCfZ4i?= =?us-ascii?Q?k9DM77fqvVxNOxe3D38mqKgML7mGeJuGTD53D08uIdB27hZJOsfmNcjYzWiN?= =?us-ascii?Q?H+LduHjKz72tMqKzccYgr2TCydeqAC1E9w6KfDbg+Di4/TBSfAmP0EZ0X3/2?= =?us-ascii?Q?PsAoJNA8KPcbrs4zf2H3B4gzkMAdzt6MDVNkQYDf3W9WJzGk2CQKnpBbKqSw?= =?us-ascii?Q?LA11Hy+dwS8=3D?= X-Forefront-Antispam-Report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:DM4PR10MB8218.namprd10.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230040)(376014)(366016)(7416014)(1800799024);DIR:OUT;SFP:1101; X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1 X-MS-Exchange-AntiSpam-MessageData-0: =?us-ascii?Q?8N0Amv14YwKbgsLmG4SwnS0k0ST93LFiueOwCRIkojUn5W26BYHt5BCn69dE?= =?us-ascii?Q?91IpxDesiTzAl1fW7PPotwH/sVBORmwjbtblW6hyyBSddkSxyKjIFZQbwf3u?= =?us-ascii?Q?YN30X0qM5P9pQQNuIxD/1QfjbCtLYqs2CwjGYXlVoWdGAqp4gl4ZIiku6I/i?= =?us-ascii?Q?WRhzdRxSjxmGhceOllDQBJn64MdOMnzfk5KgTUDIoz7DvuD+AAj8TNV6Z8KX?= =?us-ascii?Q?HKrfE/Gxc8qzGZ4LG6R94tTI2d9kacZqM6HhTJYyhIaMwW/U0p4Do9rTZQUc?= =?us-ascii?Q?nJDzCgGnMCj7CSZ+zlvwQ6laULKEQjnftZJY/8jAwlaJqu3to9K+SrOsuc3b?= =?us-ascii?Q?8eSXmDWOZ/e3rPvQHHVCpQHUudF64+DCUV4ZGaKE/p70wA/03lCwOrfe80RM?= =?us-ascii?Q?AAn0sv/YoTZhhx9O9UKweYfoKKjT6Vko5LQq6XXQAW9ztstriqh+SgNQ2emS?= =?us-ascii?Q?7XWQ2F+GglT8La0uqAVBxcSEHO5Tm1rdc1mP8Sm3NjlR0R6kF1BdPMreI4y2?= =?us-ascii?Q?SUw3l8/wVuiBje9KJA1JY6y/vNrshPADG7Y7S4qPu4CRuadAsRvvArgEUlWF?= =?us-ascii?Q?lBt3SdNMlujmGGPAZb+iRpXHuCW1EJWr0qEmHfrXf0LeqymazDx4WQ9iwDtS?= =?us-ascii?Q?ubfkvsNgNGA1CT6PoDtmlbfSlAmaHayUCQtROIAmnU8nzvzU0PL7NNfrKaGE?= =?us-ascii?Q?ILRxTTbyo6zME2NAM8tRT+GZ2i44mws823nYfQuAfxFD0XOYCBKEhGb2Y/qJ?= =?us-ascii?Q?f/yy+BMlp5uAVwtpLcqJfgiHJ96cND0eW14c8q/h7Ny8hLR6wHHqb9zMPu0Q?= =?us-ascii?Q?tq7cKDD8CYnW56hho6bcWfgcKpL4bs7ObzsYoVVACwlUYkEtngwxeJBguDTR?= =?us-ascii?Q?B5SrJITM4M46430VE2u1X567MLqVJQxdfDV0vxyWcFishxrDJBufiCJvtfMn?= =?us-ascii?Q?y/YUjwLzloCpfNh6H11acf/J1tZMpln4X1cfPopa1P8oWpxglqVj+WUM7NgB?= =?us-ascii?Q?81B//oxKAM8e7a1JNbWpAFf61UR3CvuF/HySwpoDBOqmKYDquA98t5sqzTqH?= =?us-ascii?Q?hXeyzIbcrivUFwy4POm3dwbh9OkfdPeqyoANsS6vJElg6iBI813gBvIv/yR3?= =?us-ascii?Q?wKK9KZ4gF8Q7pilXGC2glpC70mm12leuGQy/hpUrt4H8jEMRz2tGxrfrb3g4?= =?us-ascii?Q?yZ+JDUID3QVUwlPfd+ucYKRYV7hZ9zsuv3Buk7MxASUkvTipR7ilrkX774VU?= =?us-ascii?Q?VtuIRA9Tjl2nQzgQlGKbFTKy0Nwnfvf+pA5HFBUTp59t8w9d10Cq0jvKFxau?= =?us-ascii?Q?QqZcdbmLtR0K3E4LP/e7wOQxl61mPn5rhHS70b/WFgW8j4eduFR+psCq3vjm?= =?us-ascii?Q?miuCF/mCwB0c9DCo8hDHd8q2RBYHNUcvuDkC7Qzwgi6JTbSrFpaYXMwdwJbV?= =?us-ascii?Q?iU8L+P0zyfnY2eIV3hKjxFfS5Jnx61NMWNIcMKD9gUYora+c5VP27BPDuE51?= =?us-ascii?Q?XIqiiaKyTRwbR855wZbron4zr0VqPabfw9z+oTn8wB5Ytzkc2CxmOC3qMmYb?= =?us-ascii?Q?F71IzyEXg7oa49FEaw4is4cnvEMDp9WGkzkscutecIQ2VCTjdu3gHK7hbixs?= =?us-ascii?Q?FA=3D=3D?= X-MS-Exchange-AntiSpam-ExternalHop-MessageData-ChunkCount: 1 X-MS-Exchange-AntiSpam-ExternalHop-MessageData-0: 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 X-OriginatorOrg: oracle.com X-MS-Exchange-CrossTenant-Network-Message-Id: 168193fa-7b82-4c83-1a0e-08ddd9b7964e X-MS-Exchange-CrossTenant-AuthSource: DM4PR10MB8218.namprd10.prod.outlook.com X-MS-Exchange-CrossTenant-AuthAs: Internal X-MS-Exchange-CrossTenant-OriginalArrivalTime: 12 Aug 2025 15:47:48.2371 (UTC) X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted X-MS-Exchange-CrossTenant-Id: 4e2c6054-71cb-48f1-bd6c-3a9705aca71b X-MS-Exchange-CrossTenant-MailboxType: HOSTED X-MS-Exchange-CrossTenant-UserPrincipalName: bsjPoD3dTNhNwRBwr/OcAcsT6g1HBXKGAxvt5hnnOqnGvvjDkHH876XchGKnEW43lm0WVaJO4Y0dupZ8HQJqkuCaXJV0Tah9JVI1+7O+LoI= X-MS-Exchange-Transport-CrossTenantHeadersStamped: SN7PR10MB6383 X-Proofpoint-Virus-Version: vendor=baseguard engine=ICAP:2.0.293,Aquarius:18.0.1099,Hydra:6.1.9,FMLib:17.12.80.40 definitions=2025-08-12_07,2025-08-11_01,2025-03-28_01 X-Proofpoint-Spam-Details: rule=notspam policy=default score=0 bulkscore=0 mlxscore=0 phishscore=0 spamscore=0 suspectscore=0 mlxlogscore=999 adultscore=0 malwarescore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.12.0-2507300000 definitions=main-2508120152 X-Proofpoint-Spam-Details-Enc: AW1haW4tMjUwODEyMDE1MiBTYWx0ZWRfX7XJtAgG43UKT 9somc2nmKMxwfyLzmkY/ADAB8waMG8Na5sVan22G3c1BOCssxO1PMYnNv024U+b//uH5WJruAkr bqdJ5csjZyi9PbI+67I7ryrLVdZFvOOlnvYI8/yKTb2EAcGWI4RHcsY3KuFDbwl/cu3Mixifsmk mYwJheEY3TOHay+rJ5j3miXUi2BP0yqwL2Bsd0Sk0xNAgUEBQTS0fFHios/HBHcBD6Z0Ntd6Gwi EM6ekVLeKLNyaDvmBmTvCt/Awrc3wicDDholOi1h47F7lVO8H/rGL63RYZjNeNM4FyGkpv54Uw+ jphfIAiNRPsAhN5ZvBSSg0FpKN0+qdPIK9rsjNFn1XIWPE82fFuSq/IKdIKkdIcLSE7coAGV2TX WEkBZjFbE4xCUxPNwP3RtSyGyZ7nb/LZ/ZhfqKRGfahYbW7VOoHOLedjGheFNM28v63CYYhb X-Authority-Analysis: v=2.4 cv=eIsTjGp1 c=1 sm=1 tr=0 ts=689b622d b=1 cx=c_pps a=qoll8+KPOyaMroiJ2sR5sw==:117 a=qoll8+KPOyaMroiJ2sR5sw==:17 a=6eWqkTHjU83fiwn7nKZWdM+Sl24=:19 a=z/mQ4Ysz8XfWz/Q5cLBRGdckG28=:19 a=lCpzRmAYbLLaTzLvsPZ7Mbvzbb8=:19 a=wKuvFiaSGQ0qltdbU6+NXLB8nM8=:19 a=Ol13hO9ccFRV9qXi2t6ftBPywas=:19 a=xqWC_Br6kY4A:10 a=2OwXVqhp2XgA:10 a=GoEa3M9JfhUA:10 a=yPCof4ZbAAAA:8 a=gS-fvTtYXd3W2WFUJ4AA:9 cc=ntf awl=host:12070 X-Proofpoint-GUID: HqDQJJz2n-lCQ92JNMDhIgR-IxT1u8qM X-Proofpoint-ORIG-GUID: HqDQJJz2n-lCQ92JNMDhIgR-IxT1u8qM Content-Type: text/plain; charset="utf-8" The coredump logic is slightly different from other users in that it both stores mm flags and additionally sets and gets using masks. Since the MMF_DUMPABLE_* flags must remain as they are for uABI reasons, and of course these are within the first 32-bits of the flags, it is reasonable to provide access to these in the same fashion so this logic can all still keep working as it has been. Therefore, introduce coredump-specific helpers __mm_flags_get_dumpable() and __mm_flags_set_mask_dumpable() for this purpose, and update all core dump users of mm flags to use these. Signed-off-by: Lorenzo Stoakes Acked-by: David Hildenbrand Reported-by: kernel test robot Reviewed-by: Christian Brauner Reviewed-by: Liam R. Howlett Reviewed-by: Mike Rapoport (Microsoft) --- fs/coredump.c | 4 +++- fs/exec.c | 2 +- fs/pidfs.c | 7 +++++-- fs/proc/base.c | 8 +++++--- include/linux/sched/coredump.h | 21 ++++++++++++++++++++- 5 files changed, 34 insertions(+), 8 deletions(-) diff --git a/fs/coredump.c b/fs/coredump.c index fedbead956ed..e5d9d6276990 100644 --- a/fs/coredump.c +++ b/fs/coredump.c @@ -1103,8 +1103,10 @@ void vfs_coredump(const kernel_siginfo_t *siginfo) * We must use the same mm->flags while dumping core to avoid * inconsistency of bit flags, since this flag is not protected * by any locks. + * + * Note that we only care about MMF_DUMP* flags. */ - .mm_flags =3D mm->flags, + .mm_flags =3D __mm_flags_get_dumpable(mm), .vma_meta =3D NULL, .cpu =3D raw_smp_processor_id(), }; diff --git a/fs/exec.c b/fs/exec.c index 2a1e5e4042a1..dbac0e84cc3e 100644 --- a/fs/exec.c +++ b/fs/exec.c @@ -1999,7 +1999,7 @@ void set_dumpable(struct mm_struct *mm, int value) if (WARN_ON((unsigned)value > SUID_DUMP_ROOT)) return; =20 - set_mask_bits(&mm->flags, MMF_DUMPABLE_MASK, value); + __mm_flags_set_mask_dumpable(mm, value); } =20 SYSCALL_DEFINE3(execve, diff --git a/fs/pidfs.c b/fs/pidfs.c index edc35522d75c..5148b7646b7f 100644 --- a/fs/pidfs.c +++ b/fs/pidfs.c @@ -357,8 +357,11 @@ static long pidfd_info(struct file *file, unsigned int= cmd, unsigned long arg) =20 if ((kinfo.mask & PIDFD_INFO_COREDUMP) && !(kinfo.coredump_mask)) { task_lock(task); - if (task->mm) - kinfo.coredump_mask =3D pidfs_coredump_mask(task->mm->flags); + if (task->mm) { + unsigned long flags =3D __mm_flags_get_dumpable(task->mm); + + kinfo.coredump_mask =3D pidfs_coredump_mask(flags); + } task_unlock(task); } =20 diff --git a/fs/proc/base.c b/fs/proc/base.c index 62d35631ba8c..f0c093c58aaf 100644 --- a/fs/proc/base.c +++ b/fs/proc/base.c @@ -2962,8 +2962,10 @@ static ssize_t proc_coredump_filter_read(struct file= *file, char __user *buf, ret =3D 0; mm =3D get_task_mm(task); if (mm) { + unsigned long flags =3D __mm_flags_get_dumpable(mm); + len =3D snprintf(buffer, sizeof(buffer), "%08lx\n", - ((mm->flags & MMF_DUMP_FILTER_MASK) >> + ((flags & MMF_DUMP_FILTER_MASK) >> MMF_DUMP_FILTER_SHIFT)); mmput(mm); ret =3D simple_read_from_buffer(buf, count, ppos, buffer, len); @@ -3002,9 +3004,9 @@ static ssize_t proc_coredump_filter_write(struct file= *file, =20 for (i =3D 0, mask =3D 1; i < MMF_DUMP_FILTER_BITS; i++, mask <<=3D 1) { if (val & mask) - set_bit(i + MMF_DUMP_FILTER_SHIFT, &mm->flags); + mm_flags_set(i + MMF_DUMP_FILTER_SHIFT, mm); else - clear_bit(i + MMF_DUMP_FILTER_SHIFT, &mm->flags); + mm_flags_clear(i + MMF_DUMP_FILTER_SHIFT, mm); } =20 mmput(mm); diff --git a/include/linux/sched/coredump.h b/include/linux/sched/coredump.h index 6eb65ceed213..19ecfcceb27a 100644 --- a/include/linux/sched/coredump.h +++ b/include/linux/sched/coredump.h @@ -2,12 +2,29 @@ #ifndef _LINUX_SCHED_COREDUMP_H #define _LINUX_SCHED_COREDUMP_H =20 +#include #include =20 #define SUID_DUMP_DISABLE 0 /* No setuid dumping */ #define SUID_DUMP_USER 1 /* Dump as user of process */ #define SUID_DUMP_ROOT 2 /* Dump as root */ =20 +static inline unsigned long __mm_flags_get_dumpable(struct mm_struct *mm) +{ + /* + * By convention, dumpable bits are contained in first 32 bits of the + * bitmap, so we can simply access this first unsigned long directly. + */ + return __mm_flags_get_word(mm); +} + +static inline void __mm_flags_set_mask_dumpable(struct mm_struct *mm, int = value) +{ + unsigned long *bitmap =3D ACCESS_PRIVATE(&mm->_flags, __mm_flags); + + set_mask_bits(bitmap, MMF_DUMPABLE_MASK, value); +} + extern void set_dumpable(struct mm_struct *mm, int value); /* * This returns the actual value of the suid_dumpable flag. For things @@ -22,7 +39,9 @@ static inline int __get_dumpable(unsigned long mm_flags) =20 static inline int get_dumpable(struct mm_struct *mm) { - return __get_dumpable(mm->flags); + unsigned long flags =3D __mm_flags_get_dumpable(mm); + + return __get_dumpable(flags); } =20 #endif /* _LINUX_SCHED_COREDUMP_H */ --=20 2.50.1 From nobody Sat Oct 4 20:52:45 2025 Received: from mx0b-00069f02.pphosted.com (mx0b-00069f02.pphosted.com [205.220.177.32]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id A6C3D307AD7; Tue, 12 Aug 2025 15:48:33 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=fail smtp.client-ip=205.220.177.32 ARC-Seal: i=2; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1755013715; cv=fail; b=Mmj69L/cS6EyA+f0WYgCyBlS0UIw6FQkJNMtick3uW+5/WF6bixC8mI6v6wq4e4BE/oETZfN5lB+vQEG0i8WI1JeZxJ8x9F2SlWbjYoMf/WCwqC0Bg/WOJCrWwlt3qefc+8g3iT20OTvXhv3FtSWdNqhLravGHOSqqBdBkbe0Kw= ARC-Message-Signature: i=2; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1755013715; c=relaxed/simple; bh=CfqhRO3B9mLEHXT/NeVlYqJbyw/i7qeKlnkLr4stpzE=; h=From:To:Cc:Subject:Date:Message-ID:In-Reply-To:References: Content-Type:MIME-Version; b=qcw4V2YOCl7oV19qUuPoBel5A1sjLQRboDVX0k2/2CnPDrfkTSgju+VGe3JpyGyZIAFaDk3jmMfajPf4A9mY3W4QbzKsmhTDZzZ48AfcMKI8/qOv4/4R7lidyqBgn8u85+IjCMjCqKI/yN8QnvzFdZXpC7cz6RLXyf6Zf8QS7WI= ARC-Authentication-Results: i=2; smtp.subspace.kernel.org; dmarc=pass (p=reject dis=none) header.from=oracle.com; spf=pass smtp.mailfrom=oracle.com; dkim=pass (2048-bit key) header.d=oracle.com header.i=@oracle.com header.b=YXDCxfsg; dkim=pass (1024-bit key) header.d=oracle.onmicrosoft.com header.i=@oracle.onmicrosoft.com header.b=xySGBnGU; arc=fail smtp.client-ip=205.220.177.32 Authentication-Results: smtp.subspace.kernel.org; dmarc=pass (p=reject dis=none) header.from=oracle.com Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=oracle.com Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=oracle.com header.i=@oracle.com header.b="YXDCxfsg"; dkim=pass (1024-bit key) header.d=oracle.onmicrosoft.com header.i=@oracle.onmicrosoft.com header.b="xySGBnGU" Received: from pps.filterd (m0246630.ppops.net [127.0.0.1]) by mx0b-00069f02.pphosted.com (8.18.1.2/8.18.1.2) with ESMTP id 57CDBx1x002291; Tue, 12 Aug 2025 15:47:58 GMT DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=oracle.com; h=cc :content-transfer-encoding:content-type:date:from:in-reply-to :message-id:mime-version:references:subject:to; s= corp-2025-04-25; bh=EKTMWV+MizZ9KXsCmUXRWPkCH6B6O8dZ3cApczo27qU=; b= YXDCxfsge9cnddrNo6W0j7W4On55T6X6NSW3wnEG6lDsefZz+1OjrWOMrf5xSB6W dSwl01D4g68KW0FKXywdTjdUXqvqg23gocqhM1FHbZgQ1ZKGOMl4H5grU1b9d3BU vxKdTlasYjKvpskP+dBJiivz2WTIKIzVyxMpZ5ro914K3CaTBv7O5Sa1jX7rb1Ln PUx2gqsyQbUf4NefPz5X0QlJ1ePH7i8bO7vqu1PhkgujpWvBovuOeUsr6OfEYy2T ibmd5cvESruEzRH1onct8mGXpjIfM3j6j7BZ84d+0dslAKNCsRwcETFq735Bymr/ 7DVOLIzy/Y2lOhA3TnSEIw== Received: from iadpaimrmta03.imrmtpd1.prodappiadaev1.oraclevcn.com (iadpaimrmta03.appoci.oracle.com [130.35.103.27]) by mx0b-00069f02.pphosted.com (PPS) with ESMTPS id 48dvrfw1m8-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK); Tue, 12 Aug 2025 15:47:58 +0000 (GMT) Received: from pps.filterd (iadpaimrmta03.imrmtpd1.prodappiadaev1.oraclevcn.com [127.0.0.1]) by iadpaimrmta03.imrmtpd1.prodappiadaev1.oraclevcn.com (8.18.1.2/8.18.1.2) with ESMTP id 57CEKIv0038606; Tue, 12 Aug 2025 15:47:57 GMT Received: from nam11-bn8-obe.outbound.protection.outlook.com (mail-bn8nam11on2044.outbound.protection.outlook.com [40.107.236.44]) by iadpaimrmta03.imrmtpd1.prodappiadaev1.oraclevcn.com (PPS) with ESMTPS id 48dvsgp972-2 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK); Tue, 12 Aug 2025 15:47:57 +0000 ARC-Seal: i=1; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=none; b=r1EESGTC+lWRyxB8E5b3VOuBHXir0gKNJOoPTt8zMn1Wj5xvcHQWCNv3qpOmgI3qMv80Sh76RtNeyxwOFcUixaPOC1e/Ziagev9QxKwDn8mGh9jVGSH+np+uBozbQcjdrPcUdmR0WrquE44vaaujuZomITQ9PmsAZRiHcZA8/bfXQLY6OqM5SbP0OEZNY7IAj4SYp19Hp8M0zJqoze4pfbvNgOiEsjBlvM/z+UGiwoOO2Gh0/wKwsZ9wjRZeQftS0y31BI9a6rGv0v+LaCVMr9R13MVstA5m5sgXOzQQoqv73nLdgmQhxftxORB+29H6E9X2gjndEeZ3UeLCz3rqpQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector10001; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=EKTMWV+MizZ9KXsCmUXRWPkCH6B6O8dZ3cApczo27qU=; b=Xsr112JuQJaBFiEvkx99iDa3cZkrYk7HmQd/DwMMkK4arfGa1+3hbAuuoM/1CV0KsWRBuhxvBjgUaW64XVL3cKvw+dZ2aCOmci4dzeFJ4BPHQC0piQo4ReP+xz+laKu5IIZ4ygo1459m0vEUvNN3B2MUfSD5F9CuAdgbamuiAG87Q3pdWDJniV4eaoPh8+PooeNXuZKMfWuhMiX3t9DiWsasDOW/VLyy9ndqrFqAwGnzqmxc2vd4zsbP21zsCaMIRX+U1JSt/PLF0Mm1nUIGjVA4nRpSciZRShaWg0CTFFPhiiCRrz1xvfQdKlkqpHfVmbMbI2nyqXXH3iHV66xIrw== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=oracle.com; dmarc=pass action=none header.from=oracle.com; dkim=pass header.d=oracle.com; arc=none DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=oracle.onmicrosoft.com; s=selector2-oracle-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=EKTMWV+MizZ9KXsCmUXRWPkCH6B6O8dZ3cApczo27qU=; b=xySGBnGUsROrwcJM6+EoIDBpIK1H2KnpMBbUVNx5bQyS+WCAL/1xzhHW+YaBa9Z2gSNSdeWly45e6uRa+a1bOI1irLhGX3XIChCFx0G/fCchIGz+YDfVOqEnLTcQnMDM2eEM0DsJxF/9MS+h3hzfdIBLPyvPxYzZPKB1d7LxrLk= Received: from DM4PR10MB8218.namprd10.prod.outlook.com (2603:10b6:8:1cc::16) by SN7PR10MB6383.namprd10.prod.outlook.com (2603:10b6:806:26d::18) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.9031.13; Tue, 12 Aug 2025 15:47:52 +0000 Received: from DM4PR10MB8218.namprd10.prod.outlook.com ([fe80::2650:55cf:2816:5f2]) by DM4PR10MB8218.namprd10.prod.outlook.com ([fe80::2650:55cf:2816:5f2%5]) with mapi id 15.20.9031.012; Tue, 12 Aug 2025 15:47:52 +0000 From: Lorenzo Stoakes To: Andrew Morton Cc: Alexander Gordeev , Gerald Schaefer , Heiko Carstens , Vasily Gorbik , Christian Borntraeger , Sven Schnelle , "David S . Miller" , Andreas Larsson , Dave Hansen , Andy Lutomirski , Peter Zijlstra , Thomas Gleixner , Ingo Molnar , Borislav Petkov , "H . Peter Anvin" , Alexander Viro , Christian Brauner , Jan Kara , Kees Cook , David Hildenbrand , Zi Yan , Baolin Wang , "Liam R . Howlett" , Nico Pache , Ryan Roberts , Dev Jain , Barry Song , Xu Xin , Chengming Zhou , Vlastimil Babka , Mike Rapoport , Suren Baghdasaryan , Michal Hocko , David Rientjes , Shakeel Butt , Arnaldo Carvalho de Melo , Namhyung Kim , Mark Rutland , Alexander Shishkin , Jiri Olsa , Ian Rogers , Adrian Hunter , Kan Liang , Masami Hiramatsu , Oleg Nesterov , Juri Lelli , Vincent Guittot , Dietmar Eggemann , Steven Rostedt , Ben Segall , Mel Gorman , Valentin Schneider , Jason Gunthorpe , John Hubbard , Peter Xu , Jann Horn , Pedro Falcato , Matthew Wilcox , Mateusz Guzik , linux-s390@vger.kernel.org, linux-kernel@vger.kernel.org, sparclinux@vger.kernel.org, linux-fsdevel@vger.kernel.org, linux-mm@kvack.org, linux-trace-kernel@vger.kernel.org, linux-perf-users@vger.kernel.org Subject: [PATCH 07/10] mm: correct sign-extension issue in MMF_* flag masks Date: Tue, 12 Aug 2025 16:44:16 +0100 Message-ID: X-Mailer: git-send-email 2.50.1 In-Reply-To: References: Content-Transfer-Encoding: quoted-printable X-ClientProxiedBy: GV2PEPF00007574.SWEP280.PROD.OUTLOOK.COM (2603:10a6:158:401::3ed) To DM4PR10MB8218.namprd10.prod.outlook.com (2603:10b6:8:1cc::16) Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 X-MS-PublicTrafficType: Email X-MS-TrafficTypeDiagnostic: DM4PR10MB8218:EE_|SN7PR10MB6383:EE_ X-MS-Office365-Filtering-Correlation-Id: 85f640c4-4b1d-45af-29c8-08ddd9b798fb X-MS-Exchange-SenderADCheck: 1 X-MS-Exchange-AntiSpam-Relay: 0 X-Microsoft-Antispam: BCL:0;ARA:13230040|376014|366016|7416014|1800799024; X-Microsoft-Antispam-Message-Info: =?us-ascii?Q?AxZK819cjwOkYg17E/ez0PZ71KjSTwLsHGcnojx/1xEoFhhgu0K3ggopyC/k?= =?us-ascii?Q?StYANlTmN5gLUEsh0zJmYtlYjqXeuUFMyGL4LVizmog2FQVnSTBS1xbTHlbH?= =?us-ascii?Q?j4poLvbfa2RnE/nsf7yUltHF0OMlMki/wT6eX8oLPMi5J5kw6D1Ra8x4gaoY?= =?us-ascii?Q?MyauUdWjfZjjk8DjJAHq9Hs2erpS6mkWCOZOuFmQLbBXK7i+GXKGUUeZ1i05?= =?us-ascii?Q?pb1v0SC/j7nMoI+xNWnWeloKu060+wCyiDTWBKwb1XSgsN/1WYE+LKwl2PqL?= =?us-ascii?Q?Jo3Q+lo2il76+SKZU4FVdmkDCwRKXA1WMznuQnevgoHV6aCKrHWnxZA+3rhv?= =?us-ascii?Q?hABtj/+GtyusKag2A5LHCzXcKFpEOgRJUG/qXR3QrOF5wokc9ARWSXt+U9Kx?= =?us-ascii?Q?u5AhfIiYlqOly5LMe5UeeKAg6wB2Gprc7/JoQlcdxVeT7lBObz9p5SsARVd0?= =?us-ascii?Q?bwgCtP+NCU6pZcX9MT+a0OFipcvnrqLyIZ3gsR76m1Whejp6L8iWbwarS75q?= =?us-ascii?Q?mSNYUrZSbsZ3tsrG0RmHfyuytChGKaILQxNC3lli11CeErJt58KqXtlufs7g?= =?us-ascii?Q?TzwT4rsLTFqCt6qx224I6nSo7VxzYW343qtHJM1N9sXwXhOZcBpm79Ua0r0m?= =?us-ascii?Q?iqjdAvdSjymhjJ8K6lPuDIbNimSHIdP0gRKfYBK68jpe+VrVMaiqlW2rbkig?= =?us-ascii?Q?BbxGM1OtgXe3f1kJw9eyobbEGucbsTHyWLtaWPMLjNoJFBJ+XmFQVt0iyF6u?= =?us-ascii?Q?fYFA8uMB7vKYMFG3FfR0x/x/1R5xlwDKqPXUropy76ZRyQ/BlXlWBqO2nAH4?= =?us-ascii?Q?6PbrDG0xq8eSyi90OKm0VzdeyBqbZq2sOvF+J45Ac+yNFpcQg4CqmEtKRQb/?= =?us-ascii?Q?qVfiZT0Hi40tQH+zw6Ps9uXrnTMR1kHrOAlBIdrSCms0PcVegj18uccm4eFI?= =?us-ascii?Q?seeBRdqCXWrIWtE5Itk3o+r04T6ee/g7dX5Lso6sjr4mHkQGYk40jRNfBaS6?= =?us-ascii?Q?Z+Id+wecz2qH4IN2LbGXABhtReyQ36iScMqxHtYGZhb1DhpTPE1805/r2MJq?= =?us-ascii?Q?QWzua2Wv7V2mXA9BJmgGDSFE0CXOhJUegCDzFOT24SSKhUkRsia3YwQbK00b?= =?us-ascii?Q?1ladlNv3x3+VS4+RKvb2yRKPE4aoglTn7hIj7cE1u8GjpaOW8oZzflW8hDPw?= =?us-ascii?Q?qoOHLonMKt+2iVJR9R3oey+ZlkXjfglFidHYopndsrafO7MzDDRqeZpgqJYi?= =?us-ascii?Q?nSg7gh6KT/7uY8zi9GrmpCrsvcxslqm11xO8VNuofF4uvv6R4M21awt3JZNP?= =?us-ascii?Q?4O6lVheRqWY5KMHLeUFG/SAK4r0xRt123UYXrLS5zqVHA7OtT2p+7qQbeQe7?= =?us-ascii?Q?x05zifaR+QZ40YFlbrdZeGzrA9VQoocIQKe7AuTaS/6yjWU8Wj0wydAsJeLH?= =?us-ascii?Q?1YjvtQPhvKc=3D?= X-Forefront-Antispam-Report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:DM4PR10MB8218.namprd10.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230040)(376014)(366016)(7416014)(1800799024);DIR:OUT;SFP:1101; X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1 X-MS-Exchange-AntiSpam-MessageData-0: =?us-ascii?Q?2L4h3MItWGWrkvAHNPq6U2oIlNKw3GBv/XKJs1gq7vy4vfcV61cRaV9plxqY?= =?us-ascii?Q?g56IJUJakOX1kJqsnJGQjlsMj/mJuetb30hhpciIstBJvz/cg/UlMdakmFjf?= =?us-ascii?Q?GJmhgoyAJ84SYbxu+fHhvpL+zNJHgKbLSmK+Uh0iQPRlbCOCeov35uziyAWo?= =?us-ascii?Q?e7gb7IkHwFH2WpBoEh/NEDynj+imFvji5QlWQpTXR1b0Co4jYObBYTcEEMMh?= =?us-ascii?Q?ZAmAcWNArubLOHsDc74GSRE5d9XBMy2Ds81yqT7RG94UYLNAWngwT7Bbmwnz?= =?us-ascii?Q?sSC5ixN4jBU+7UgSkGc4Ovbi9Br3Gsrhzgq1dvUk3qP9HR9KQW4XsUjadf4y?= =?us-ascii?Q?QUa+0wKFNDaHTdopfzDXzJb/j/py2phY59cEftcX+gSe+TXUQ2dv4b46uy7C?= =?us-ascii?Q?OQRcFtKR56Qom4SUJARzWZi0TI6VZy48EaMNHhRxQGhkSM8KJGMzIAQUGBjW?= =?us-ascii?Q?BzO6t7JgTbYd9E2cXQ3zuzGIu6w8W3vHNvsPJUGYDCl0z1MiKGKcPq5P6Mqm?= =?us-ascii?Q?Rc1nmiWfdo5wEWa0BCtXqA92R388+4PMr0EIVsVM585WUWH/ovTwGhUkbg5s?= =?us-ascii?Q?yYVCgy8eklX7KiTDJ9AL8bEHc5A2XAh+tbw2eTTF4rlsd8gW7GD9WY8MF/6F?= =?us-ascii?Q?u9Q0QjZw+fb6OHvloa9FVZIPG0oilXHogZegZf+aLqWk0dEnRtlvThvLhOoK?= =?us-ascii?Q?QyABLiEeBGAEJgDx89XXJPOzAcVt1+OteU8ppsQ5jxq0dBE8E8IXkY9u7xAv?= =?us-ascii?Q?TAuK+gpe7fH1YnyimK9+yP8h3VOFd2DfkobDI45Yi1JQ+cwl1iVxmGK/vcXG?= =?us-ascii?Q?wKMPI1r8ZOFFNqpt5MRHAajI3p/hmsSlogqtirjWCxqneLKjpnUY8VkMP4wn?= =?us-ascii?Q?mw0hcE33MMAIxoQ5ry4MrK8a7qlagErarIt9VfZgfvsS72kw+Le+ymkmRRbJ?= =?us-ascii?Q?hkVMTCOKlixIfp2D4F/8puMQBoT2u1Eg4JVhftdu90q8XT9+Mkvc2jp+FUVZ?= =?us-ascii?Q?x+nHlDC0C4wlJJ19a67fuVD5RHlHEceelz8pfLXjc7xPnRw6pz2VU43kyZrr?= =?us-ascii?Q?UiOv5yVm91PM9WhVNM4mKgt4MFR9sW3BXZkiaHxuWc/rAGwjZrmHWO4TBvj6?= =?us-ascii?Q?4Otn1ckBAVQ3efdH0ErJzxkoSHAkk3LngVFaLH+K1slML29gYZTWZ6HZMEWl?= =?us-ascii?Q?MTakDyyMmuB6kmgH6T8/+u7n/9T/znlGjrToBkcmFJIKGwvNpqZDg6G2TQCE?= =?us-ascii?Q?vN6QOOhoXdTHlfm379ddekKJHXxvm3vd9fP9KtrpCh8ElFoH+c+xGPPGSdYW?= =?us-ascii?Q?VcJPml+c+ahpcDFm+JTUwEE9U/1FqZEjfqkK5WMDGUseWIyIhDUEuUUNoHep?= =?us-ascii?Q?8+rLsdLHHDBvsVKXswrJaP5A2eq7vt1HZvlg/njR+AJKJauyU1sJgSnck2Rl?= =?us-ascii?Q?+kSiy5Pu9DozDmxiaWJMByagMvcR9RHJ13Oo6D53YLvQd4jrPQwQ+J9M0I6E?= =?us-ascii?Q?/vC+botSa3Y1tZZDpvquRodIa641c1kcm3O5EI52vYhgBJhhNtXA1kVfBkah?= =?us-ascii?Q?yMPNHED1SFQ1mFfSZGAlA6N0wKSCCDKmnuwvaw7zVIOmClmTbzni3A73PTSZ?= =?us-ascii?Q?yA=3D=3D?= X-MS-Exchange-AntiSpam-ExternalHop-MessageData-ChunkCount: 1 X-MS-Exchange-AntiSpam-ExternalHop-MessageData-0: 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 X-OriginatorOrg: oracle.com X-MS-Exchange-CrossTenant-Network-Message-Id: 85f640c4-4b1d-45af-29c8-08ddd9b798fb X-MS-Exchange-CrossTenant-AuthSource: DM4PR10MB8218.namprd10.prod.outlook.com X-MS-Exchange-CrossTenant-AuthAs: Internal X-MS-Exchange-CrossTenant-OriginalArrivalTime: 12 Aug 2025 15:47:52.6547 (UTC) X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted X-MS-Exchange-CrossTenant-Id: 4e2c6054-71cb-48f1-bd6c-3a9705aca71b X-MS-Exchange-CrossTenant-MailboxType: HOSTED X-MS-Exchange-CrossTenant-UserPrincipalName: H6bdEbO3ycJl07j3fhNMtuO3SoJmUu0/Iu91fFSkIuOpt0MBaG6L2xdPM0I6CWA6WiDVEcgmKYLYFbNr51mKiIt3eM5fdV8jZh+49lrOzRo= X-MS-Exchange-Transport-CrossTenantHeadersStamped: SN7PR10MB6383 X-Proofpoint-Virus-Version: vendor=baseguard engine=ICAP:2.0.293,Aquarius:18.0.1099,Hydra:6.1.9,FMLib:17.12.80.40 definitions=2025-08-12_07,2025-08-11_01,2025-03-28_01 X-Proofpoint-Spam-Details: rule=notspam policy=default score=0 bulkscore=0 mlxscore=0 phishscore=0 spamscore=0 suspectscore=0 mlxlogscore=999 adultscore=0 malwarescore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.12.0-2507300000 definitions=main-2508120152 X-Authority-Analysis: v=2.4 cv=B/S50PtM c=1 sm=1 tr=0 ts=689b622e b=1 cx=c_pps a=qoll8+KPOyaMroiJ2sR5sw==:117 a=qoll8+KPOyaMroiJ2sR5sw==:17 a=6eWqkTHjU83fiwn7nKZWdM+Sl24=:19 a=z/mQ4Ysz8XfWz/Q5cLBRGdckG28=:19 a=lCpzRmAYbLLaTzLvsPZ7Mbvzbb8=:19 a=wKuvFiaSGQ0qltdbU6+NXLB8nM8=:19 a=Ol13hO9ccFRV9qXi2t6ftBPywas=:19 a=xqWC_Br6kY4A:10 a=2OwXVqhp2XgA:10 a=GoEa3M9JfhUA:10 a=yPCof4ZbAAAA:8 a=ClgePVbc09Q9qcuFiq0A:9 cc=ntf awl=host:12070 X-Proofpoint-ORIG-GUID: VjVhl5aR6Zk1nkCxh-y5Z2u8d97ai6JT X-Proofpoint-Spam-Details-Enc: AW1haW4tMjUwODEyMDE1MiBTYWx0ZWRfX6iJ8U7BK9B8f ztD8z0F80aKrX6xSKqMLhAi2MKDrUEQOHNrtQqQ5bR4hAvLj0wpa1+GhqXeHGJJDfythgcGK2d0 H3bRpGQz8UbRGnOjVPuh4YnlU2IvuASrnyL9LJbf5TSQOzvrlaSWfS07kPuKKLXCmaG/AC6V8aN kbhpe4SJAIMV1U4UgfyumHcmL7l9RzbU/FY7HsB1Vbe1pcXA+vUSKgC+Inb0cvJiTp8BLooiNyf QIGG1VF6lOUcplLKWfwrUAMeJzoN/OMDISB/i5S3TMfhbelu+V58oUrICtWKNNTze76bAvqBMZ6 eagYQZfG8NHCDLvkcv6Lh6IYR4XT3fmYSqt8+JC8xiwBExl9BaO2/3EmDpcxHEoejvIm001HAUE 1KElHzZbQMmQQTKrWdiTRW+EGHpT5tRckI+NO8y7RtKqe0mP9vPoZEufb1MJgIaDDV4cTIau X-Proofpoint-GUID: VjVhl5aR6Zk1nkCxh-y5Z2u8d97ai6JT Content-Type: text/plain; charset="utf-8" There is an issue with the mask declarations in linux/mm_types.h, which naively do (1 << bit) operations. Unfortunately this results in the 1 being defaulted as a signed (32-bit) integer. When the compiler expands the MMF_INIT_MASK bitmask it comes up with: (((1 << 2) - 1) | (((1 << 9) - 1) << 2) | (1 << 24) | (1 << 28) | (1 << 30) | (1 << 31)) Which overflows the signed integer to -788,527,105. Implicitly casting this to an unsigned integer results in sign-expansion, and thus this value becomes 0xffffffffd10007ff, rather than the intended 0xd10007ff. While we're limited to a maximum of 32 bits in mm->flags, this isn't an issue as the remaining bits being masked will always be zero. However, now we are moving towards having more bits in this flag, this becomes an issue. Simply resolve this by using the _BITUL() helper to cast the shifted value to an unsigned long. Signed-off-by: Lorenzo Stoakes Reviewed-by: Liam R. Howlett Reviewed-by: Mike Rapoport (Microsoft) --- include/linux/mm_types.h | 19 +++++++++---------- 1 file changed, 9 insertions(+), 10 deletions(-) diff --git a/include/linux/mm_types.h b/include/linux/mm_types.h index 46d3fb8935c7..38b3fa927997 100644 --- a/include/linux/mm_types.h +++ b/include/linux/mm_types.h @@ -1756,7 +1756,7 @@ enum { * the modes are SUID_DUMP_* defined in linux/sched/coredump.h */ #define MMF_DUMPABLE_BITS 2 -#define MMF_DUMPABLE_MASK ((1 << MMF_DUMPABLE_BITS) - 1) +#define MMF_DUMPABLE_MASK (_BITUL(MMF_DUMPABLE_BITS) - 1) /* coredump filter bits */ #define MMF_DUMP_ANON_PRIVATE 2 #define MMF_DUMP_ANON_SHARED 3 @@ -1771,13 +1771,13 @@ enum { #define MMF_DUMP_FILTER_SHIFT MMF_DUMPABLE_BITS #define MMF_DUMP_FILTER_BITS 9 #define MMF_DUMP_FILTER_MASK \ - (((1 << MMF_DUMP_FILTER_BITS) - 1) << MMF_DUMP_FILTER_SHIFT) + ((_BITUL(MMF_DUMP_FILTER_BITS) - 1) << MMF_DUMP_FILTER_SHIFT) #define MMF_DUMP_FILTER_DEFAULT \ - ((1 << MMF_DUMP_ANON_PRIVATE) | (1 << MMF_DUMP_ANON_SHARED) |\ - (1 << MMF_DUMP_HUGETLB_PRIVATE) | MMF_DUMP_MASK_DEFAULT_ELF) + (_BITUL(MMF_DUMP_ANON_PRIVATE) | _BITUL(MMF_DUMP_ANON_SHARED) | \ + _BITUL(MMF_DUMP_HUGETLB_PRIVATE) | MMF_DUMP_MASK_DEFAULT_ELF) =20 #ifdef CONFIG_CORE_DUMP_DEFAULT_ELF_HEADERS -# define MMF_DUMP_MASK_DEFAULT_ELF (1 << MMF_DUMP_ELF_HEADERS) +# define MMF_DUMP_MASK_DEFAULT_ELF _BITUL(MMF_DUMP_ELF_HEADERS) #else # define MMF_DUMP_MASK_DEFAULT_ELF 0 #endif @@ -1797,7 +1797,7 @@ enum { #define MMF_UNSTABLE 22 /* mm is unstable for copy_from_user */ #define MMF_HUGE_ZERO_FOLIO 23 /* mm has ever used the global huge ze= ro folio */ #define MMF_DISABLE_THP 24 /* disable THP for all VMAs */ -#define MMF_DISABLE_THP_MASK (1 << MMF_DISABLE_THP) +#define MMF_DISABLE_THP_MASK _BITUL(MMF_DISABLE_THP) #define MMF_OOM_REAP_QUEUED 25 /* mm was queued for oom_reaper */ #define MMF_MULTIPROCESS 26 /* mm is shared between processes */ /* @@ -1810,16 +1810,15 @@ enum { #define MMF_HAS_PINNED 27 /* FOLL_PIN has run, never cleared */ =20 #define MMF_HAS_MDWE 28 -#define MMF_HAS_MDWE_MASK (1 << MMF_HAS_MDWE) - +#define MMF_HAS_MDWE_MASK _BITUL(MMF_HAS_MDWE) =20 #define MMF_HAS_MDWE_NO_INHERIT 29 =20 #define MMF_VM_MERGE_ANY 30 -#define MMF_VM_MERGE_ANY_MASK (1 << MMF_VM_MERGE_ANY) +#define MMF_VM_MERGE_ANY_MASK _BITUL(MMF_VM_MERGE_ANY) =20 #define MMF_TOPDOWN 31 /* mm searches top down by default */ -#define MMF_TOPDOWN_MASK (1 << MMF_TOPDOWN) +#define MMF_TOPDOWN_MASK _BITUL(MMF_TOPDOWN) =20 #define MMF_INIT_MASK (MMF_DUMPABLE_MASK | MMF_DUMP_FILTER_MASK |\ MMF_DISABLE_THP_MASK | MMF_HAS_MDWE_MASK |\ --=20 2.50.1 From nobody Sat Oct 4 20:52:45 2025 Received: from mx0a-00069f02.pphosted.com (mx0a-00069f02.pphosted.com [205.220.165.32]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id C32EB2F7453; Tue, 12 Aug 2025 15:48:38 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=fail smtp.client-ip=205.220.165.32 ARC-Seal: i=2; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1755013720; cv=fail; b=iZerwHJ1mKbWinr2IuTjio0FMEF+IVgK4+6BHTm9uMp3sJs7DlU8aOT5QiGqwWmQKV9UZm11TOtRuMUMdLbqhktpTrrF6WQ09yN++oQe0DG/aaGpJ/JsUEo+1eC4d1ACOPJ4ji3PwwcpboTc6nhoH+AvHRZFPCiQdBNZFLtkdp8= ARC-Message-Signature: i=2; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1755013720; c=relaxed/simple; bh=2uH0V+DOV3aGmsVIPri/EZvdpj1HZWRkxFc9pR1QrIU=; h=From:To:Cc:Subject:Date:Message-ID:In-Reply-To:References: Content-Type:MIME-Version; b=rpy06R0YvVO1FTJLiS0LMoDitTy+cIyKq4OX0bTeL4KVoyQUEGV4cU5KZphKoVCQDjJqxxe4wZWWsmheFln9aV2RFYGvGq9x444u1nLmqhQGlhMneNSzvPY9z45iVSbhdwMV5S4XqPgXkp+YP2uoZFkuRI7lDRdd+g4sy8Vzsw8= ARC-Authentication-Results: i=2; smtp.subspace.kernel.org; dmarc=pass (p=reject dis=none) header.from=oracle.com; spf=pass smtp.mailfrom=oracle.com; dkim=pass (2048-bit key) header.d=oracle.com header.i=@oracle.com header.b=WZ8ZWODT; dkim=pass (1024-bit key) header.d=oracle.onmicrosoft.com header.i=@oracle.onmicrosoft.com header.b=xIs3FiuX; arc=fail smtp.client-ip=205.220.165.32 Authentication-Results: smtp.subspace.kernel.org; dmarc=pass (p=reject dis=none) header.from=oracle.com Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=oracle.com Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=oracle.com header.i=@oracle.com header.b="WZ8ZWODT"; dkim=pass (1024-bit key) header.d=oracle.onmicrosoft.com header.i=@oracle.onmicrosoft.com header.b="xIs3FiuX" Received: from pps.filterd (m0246617.ppops.net [127.0.0.1]) by mx0b-00069f02.pphosted.com (8.18.1.2/8.18.1.2) with ESMTP id 57CDBxpc007830; Tue, 12 Aug 2025 15:48:02 GMT DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=oracle.com; h=cc :content-transfer-encoding:content-type:date:from:in-reply-to :message-id:mime-version:references:subject:to; s= corp-2025-04-25; bh=WSvLrpSRd21C8AAsJ+WZWD7g1XGXisq6bGAA/zFNeHM=; b= WZ8ZWODTATFk/ygXpLlislZlYgfZNjFXZUp6FNaErNRkPvoWXcpZJheLT+QXXp1E m/xjRAmKkDmpxae4NDGLml33onx8Hqp0c8HKo0a01JUuDhDum+S9w9KqVfdFJlx/ 26p8fN9giBxbas2OnOcnuJbdg6uPNp0gpTmUDI5vgPx0c/9/DsvML2lp+n2l3bG/ o2S+ibXGWadlwCZHAbLnvQbH5mWFyfh177S/nPPPHJRitV2jqrK4rqjJq5x42RRV 2migbLfLWmiIpdbCrc4HSSubF0jOEhVbLvor86ARkYrrqRPWVXTX7/KGOcIvcS50 dlBMPP5CCnh1xuVQ/tMQ5Q== Received: from iadpaimrmta01.imrmtpd1.prodappiadaev1.oraclevcn.com (iadpaimrmta01.appoci.oracle.com [130.35.100.223]) by mx0b-00069f02.pphosted.com (PPS) with ESMTPS id 48dxvwvx9a-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK); Tue, 12 Aug 2025 15:48:01 +0000 (GMT) Received: from pps.filterd (iadpaimrmta01.imrmtpd1.prodappiadaev1.oraclevcn.com [127.0.0.1]) by iadpaimrmta01.imrmtpd1.prodappiadaev1.oraclevcn.com (8.18.1.2/8.18.1.2) with ESMTP id 57CEOHva009872; Tue, 12 Aug 2025 15:48:00 GMT Received: from nam11-bn8-obe.outbound.protection.outlook.com (mail-bn8nam11on2056.outbound.protection.outlook.com [40.107.236.56]) by iadpaimrmta01.imrmtpd1.prodappiadaev1.oraclevcn.com (PPS) with ESMTPS id 48dvsgensh-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK); Tue, 12 Aug 2025 15:48:00 +0000 ARC-Seal: i=1; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=none; b=KQrmweJQLhuvaYpGhJsBiprW///6xs4FoxuOWDsDBUDYbYFaKpbsPJWHa5rAMVng8NRr/oiYU44RdHe4FKSfAHMZO5OLIwrLpd/8evHanvzZT63w4YWa13GH+rhpprDdEFkp6G7PpyQTRmDh0rNjHtPOqMdlUtOE1Odmxg5QK6g2Sr/vvgPKDsMsvIYcmE5xc+zt7tJOjM3Ot5Uup3RhRSo4/VFnCz2vPGwQOHrdDj7vu7m51ZTYfa7CvHcsIzmeiHY9kPFpp9dGFRL7pPN6tEnSggesgKrRgchhflNqov2exWCV5QTdDGxWJkct6RQk9hLBPZtysCtGtyHwI91e7w== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector10001; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=WSvLrpSRd21C8AAsJ+WZWD7g1XGXisq6bGAA/zFNeHM=; b=oqijFRITr++vKZVjG85X+9+LbIeyWFQGinDctWpjGEl0T2WPHlSg6H6AWkcC0sZhEOZGtLE80LS9rPV44tRJf6efmmgVta6SR9W8kZFg53WlwD2J37X4mcWXsst450fJRRa641ZXmsH4u61Nd9H0dwC4jag8N4bsROz4qYntPbfHUaNB8Nry0TiJGMKHKrOK4zF/tONoSAQVjPqTYKEjNIJvAZlzrnKX/GFgbWj/aDjRMYt58MDf6C/6jO17FVhYf/PbFp84EXVXmBvvILoIx2UF5dWO59TiM0jFignySFJwsYPKy/qWyzDylJwbzzHG8pSWKZiygF2p395C5gCv4w== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=oracle.com; dmarc=pass action=none header.from=oracle.com; dkim=pass header.d=oracle.com; arc=none DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=oracle.onmicrosoft.com; s=selector2-oracle-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=WSvLrpSRd21C8AAsJ+WZWD7g1XGXisq6bGAA/zFNeHM=; b=xIs3FiuXiaZzAlEJlwkBD4kk2LD6iEy4zXFURRZbpOLFFqkJO6fsoBTDCTAkla5xwbRDAwMVeK7+EMOvteifz5ltxltdfbuELrRYbyk9F1FM8urzZkyk+lvZGCRep14PZTp3Tl8AmPtpp3YahSpNo/7k1uhwJ0Tub8pRI6FbBv8= Received: from DM4PR10MB8218.namprd10.prod.outlook.com (2603:10b6:8:1cc::16) by SN7PR10MB6383.namprd10.prod.outlook.com (2603:10b6:806:26d::18) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.9031.13; Tue, 12 Aug 2025 15:47:57 +0000 Received: from DM4PR10MB8218.namprd10.prod.outlook.com ([fe80::2650:55cf:2816:5f2]) by DM4PR10MB8218.namprd10.prod.outlook.com ([fe80::2650:55cf:2816:5f2%5]) with mapi id 15.20.9031.012; Tue, 12 Aug 2025 15:47:57 +0000 From: Lorenzo Stoakes To: Andrew Morton Cc: Alexander Gordeev , Gerald Schaefer , Heiko Carstens , Vasily Gorbik , Christian Borntraeger , Sven Schnelle , "David S . Miller" , Andreas Larsson , Dave Hansen , Andy Lutomirski , Peter Zijlstra , Thomas Gleixner , Ingo Molnar , Borislav Petkov , "H . Peter Anvin" , Alexander Viro , Christian Brauner , Jan Kara , Kees Cook , David Hildenbrand , Zi Yan , Baolin Wang , "Liam R . Howlett" , Nico Pache , Ryan Roberts , Dev Jain , Barry Song , Xu Xin , Chengming Zhou , Vlastimil Babka , Mike Rapoport , Suren Baghdasaryan , Michal Hocko , David Rientjes , Shakeel Butt , Arnaldo Carvalho de Melo , Namhyung Kim , Mark Rutland , Alexander Shishkin , Jiri Olsa , Ian Rogers , Adrian Hunter , Kan Liang , Masami Hiramatsu , Oleg Nesterov , Juri Lelli , Vincent Guittot , Dietmar Eggemann , Steven Rostedt , Ben Segall , Mel Gorman , Valentin Schneider , Jason Gunthorpe , John Hubbard , Peter Xu , Jann Horn , Pedro Falcato , Matthew Wilcox , Mateusz Guzik , linux-s390@vger.kernel.org, linux-kernel@vger.kernel.org, sparclinux@vger.kernel.org, linux-fsdevel@vger.kernel.org, linux-mm@kvack.org, linux-trace-kernel@vger.kernel.org, linux-perf-users@vger.kernel.org Subject: [PATCH 08/10] mm: update fork mm->flags initialisation to use bitmap Date: Tue, 12 Aug 2025 16:44:17 +0100 Message-ID: <9fb8954a7a0f0184f012a8e66f8565bcbab014ba.1755012943.git.lorenzo.stoakes@oracle.com> X-Mailer: git-send-email 2.50.1 In-Reply-To: References: Content-Transfer-Encoding: quoted-printable X-ClientProxiedBy: GVZP280CA0073.SWEP280.PROD.OUTLOOK.COM (2603:10a6:150:274::14) To DM4PR10MB8218.namprd10.prod.outlook.com (2603:10b6:8:1cc::16) Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 X-MS-PublicTrafficType: Email X-MS-TrafficTypeDiagnostic: DM4PR10MB8218:EE_|SN7PR10MB6383:EE_ X-MS-Office365-Filtering-Correlation-Id: a6413413-6afc-40ab-4218-08ddd9b79b92 X-MS-Exchange-SenderADCheck: 1 X-MS-Exchange-AntiSpam-Relay: 0 X-Microsoft-Antispam: BCL:0;ARA:13230040|376014|366016|7416014|1800799024; X-Microsoft-Antispam-Message-Info: =?us-ascii?Q?iyCU69hVXVi8sGkcxzZPgEkM8sUuWj4XC9HycJ39isbF+Mg8HPc26ebGTO6v?= =?us-ascii?Q?oNU98o2mr6zLfcLB5wRA3Fbzzxx6qYiaRmH7jjFsa2qsD1TJv4ZfG+3MJMdX?= =?us-ascii?Q?6x/Nu3EOxKJri3KYhy9hudBYgPOLXsLb3fI+lRwC4L6dHguRvG+XgWfU3KQi?= =?us-ascii?Q?vIIIBT0varByxAUP4tsDVO8qP/iBvIwk31786eTIuUj6i6dnmKPv4skIRv//?= =?us-ascii?Q?AwKSt9eA2g2j1czBlIwztwQZxfkicn59u2VOKAlf7kH7utaPDYYMQv2eoH1Y?= =?us-ascii?Q?4t2tNgcVLAb/kKdYKY2BkxTC5NSdzK5Oru/Dr4dBA1JxkVuZNm7e1x9bUDBg?= =?us-ascii?Q?rtfW6yEoqE0klkbYiq0H3IilhD8eYX1KQrDulGGfKnmyuJMOQpXNqP88LLEL?= =?us-ascii?Q?Pf5dPH2V+9LBJoLS0oZQyTrhI5Wq49d/oxck4+mWu9Cil+rjfugDO0CXf5tm?= =?us-ascii?Q?iHty1BDb1cFWUPvNPJ/D7Zf2BoNe8DrhUhgVfBFlVJLtB9a/IYv5G0JOf1TF?= =?us-ascii?Q?xaVXm1gbNxhCHdYloySrkinNkP8zwpqXjlQmocSxS31UO99S7vsvoJpeaX+3?= =?us-ascii?Q?908XbE9gQTAM+gE6h+syVaycqr4eIKmkbGPBawZNpDJH4PlE1eWBCfqUGYLW?= =?us-ascii?Q?c40PSZ3gAXOZunpqMjtNaTte6nIgfza3b9FyTF/btwZu4dZSgKfltOlRqYHB?= =?us-ascii?Q?rapYaes3LSBYbDENyF8aKS3vfdOdDjDju6gzHog3avnI9Tw8tOJYY7LptoUz?= =?us-ascii?Q?jYkKuz3xqut1IWT9qiYl9983PuG0yHc/ioLwAPVNSglUUjWNSnx+dPq3auOG?= =?us-ascii?Q?A5ZeQwh/qeO8J8iPBhwRKvPbZH0Tiq1culca5EoZz0e4ERKybc3j7skbFa59?= =?us-ascii?Q?dTwWh6agSp9gvzLoH1Ro931tyHb9ob8POEL3YC+sWt98DnWsvLegAl6MoP9O?= =?us-ascii?Q?EhuG7RVVsGByXrwOJ531xzJuSiRzTFuqDq37JWU6p/X42zqhdJLprg5x/9cs?= =?us-ascii?Q?HpkOKlaAKmpWP1ZSgYfQ4RScibqb0JggnwzlViZao6IN48nXk6bBZVG51YZs?= =?us-ascii?Q?xJG4RyKLZVj5Ekjt3749AnWNeT9Lw1XBzOp9o7w9ErCRsIyK9l7oDvWH/Q0c?= =?us-ascii?Q?YBmqD+j6yW1E1xQSI6CIPWbamtuftj2iq28y8Bg9nMRqqix3VTsjwfnPhPKJ?= =?us-ascii?Q?b8a/rWe18BJOPshwYCLm5DA5U6MJw8fBjpf7WD6Hj0zuIPbYPeSojRaLz4Nm?= =?us-ascii?Q?vwo+4ONqQ+Wfalc4Wd1KWhDW8EAmlJHK88ixaBkWUqYzkwxFTaprVkaG3OMe?= =?us-ascii?Q?HoMzdXoGN6RAyUHS0UDpvwmWSPB5c8yVIR1BXPckYMP2iyxDs9K4lJb4aEX5?= =?us-ascii?Q?BzjW5fM23EcRcRtPaKqDQUI8NR4bquKf8m0P4jhcFTcdwgxetFNwZqxpN2hV?= =?us-ascii?Q?ItwKp3Oybd4=3D?= X-Forefront-Antispam-Report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:DM4PR10MB8218.namprd10.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230040)(376014)(366016)(7416014)(1800799024);DIR:OUT;SFP:1101; X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1 X-MS-Exchange-AntiSpam-MessageData-0: =?us-ascii?Q?juwhf5TCuy3kCxXqmJL/pM5Mw38bzP1ho1EgnwUH3Jd8dBJS2/GfqAQPnc/Q?= =?us-ascii?Q?ji4DRr76hxSlQplvt+Uen2qfOU7GGnmZLhvk9O9/a/waOpDBz9mr+8J/U1Ug?= =?us-ascii?Q?XR+Yt/k2jmknffX3+9XInlgI3REqOmPmTdWduU6DwfH5Q3/El73RbAs70MNg?= =?us-ascii?Q?F7aHq+eNEX/Vik1umAtEKDbG09ByzdOzLMB2pePKUvQRmp0FVUFBz6TW23FV?= =?us-ascii?Q?nHA2hvojIseGHgqHFTEimdSZS/Pj123AhDSovIqu9q/KM1SWMb9j5BLwAt3/?= =?us-ascii?Q?iYzb2dF08g7vSAIgr4P7CKH7gCBwCG+gSYyFNxLYzQaqBeECILouLgHE1mY0?= =?us-ascii?Q?5t7Pf0h6NDs5GSi/BMsFuLH6MaS5/HOIh0w1/vzxTiL3boNP6fUj5A4DUIF0?= =?us-ascii?Q?hWl09WxBKj9ZtbBmdDaoCxBiMFhsAoIiOxTh9Tk1tjfvluzhMKzQeZMlQtKz?= =?us-ascii?Q?cTUwvXr11Y/W4+gRIi6OGzJf5t5Y+w6YMIKSKF7ulujJMaM5uyME7Qmq3tA7?= =?us-ascii?Q?PamR2yhM5xzrPfwupZ1o/qh4sQcvyfb2hgzrIvkuWyytCgerHsRPss9XaA2P?= =?us-ascii?Q?/u4X0g92SefpQ1j4eT9tHQklgNiKVk9gXvW59AXMMY8W2JyCXaVeLW/yXoC3?= =?us-ascii?Q?L3iVFpl0pAWivKr8caadIiRMABXaz3KS0M19YYltd8b0XXRO+3aeMut44fDY?= =?us-ascii?Q?3GHMI1UFPXu17l3GgemM/q5NAXxtFygwJnxUW6ZnZB55m2l5jZgh3plrOHsS?= =?us-ascii?Q?VLTxsS17WCaDmUW5oUp/kvIozrX40q9rU23S5vIEbHOxwOp3jF2Z0H1dfPJt?= =?us-ascii?Q?SXxnuV+EKThYb/LakKYKo3MS/CRmSMtn0WLBG3nSJR8+g+hN/MNEA8p5XwKO?= =?us-ascii?Q?0Yj3lhqOMRyyXYfA3lOqTs/ygAEqMU1faK25WKzgnmNmInh/GDn1uA9CezyW?= =?us-ascii?Q?IBb8eOUocNLp25vvW4iCCQgRzYFE7L8KAMrUkxH/luxb5NBTmUJg7e8xGZ4P?= =?us-ascii?Q?FUKM5vvFLPyy218iZOZRBpkRRK4UMEXUJNiTAg48Rh/7Ks5inHR5m6YJLnL4?= =?us-ascii?Q?PDWW10sfiCQ8/aPzeExiABe4S3hEvzwK6X39EQmab65DUtwtNwpjVqaP8zUk?= =?us-ascii?Q?EIba8A03XVaZXBzbx/H1Tp0+WKEqY3flsUYiPmlwvXxYMHEcpUH2iP4igski?= =?us-ascii?Q?PDBeJxWNAT3Mm7jUYaAEXU8xlM+kHmhuVjCoWzdr/GBtlFPgFa6K8kLs5m1M?= =?us-ascii?Q?tri4xgTsd0tQYbu1hcm4d6lLegGIix9qfa+am+LJUFU5KQskYddmxw02CB6T?= =?us-ascii?Q?QCJjwAU8vThmU2bWGjjmlO73rHq5isivlaowSgpCHow8mhHYysrHb0f34Oxz?= =?us-ascii?Q?rjq9MsOf8F+lOMG0RNRdDTijcAv2IGxtLZUTpYLlJGpXpWIy/LVIcOcufDZP?= =?us-ascii?Q?4+/GVGdqJNdV4jKND4wxS/zpBPoaqeBWbfei3rzPmBpMu/w5a12592xeIyhq?= =?us-ascii?Q?FM3CSnOgn2bJkH8KVaElA12HojehCQ5snDkCN/27E63ET1JTJIcy1M0mVPZn?= =?us-ascii?Q?4+oioDALO7QIHhioHfmzxebauVcU0DOCZfV57k5qxZ9g+/aJeGbLPZ5KWeWK?= =?us-ascii?Q?cA=3D=3D?= X-MS-Exchange-AntiSpam-ExternalHop-MessageData-ChunkCount: 1 X-MS-Exchange-AntiSpam-ExternalHop-MessageData-0: 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 X-OriginatorOrg: oracle.com X-MS-Exchange-CrossTenant-Network-Message-Id: a6413413-6afc-40ab-4218-08ddd9b79b92 X-MS-Exchange-CrossTenant-AuthSource: DM4PR10MB8218.namprd10.prod.outlook.com X-MS-Exchange-CrossTenant-AuthAs: Internal X-MS-Exchange-CrossTenant-OriginalArrivalTime: 12 Aug 2025 15:47:56.9446 (UTC) X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted X-MS-Exchange-CrossTenant-Id: 4e2c6054-71cb-48f1-bd6c-3a9705aca71b X-MS-Exchange-CrossTenant-MailboxType: HOSTED X-MS-Exchange-CrossTenant-UserPrincipalName: ACDDcOWKJECKXi1RXCid1xtr0XRRZ328h03Ydnyqf1eEmSzpBZ6dhjeLLhg6I7cRqIBoRHf53I19nsRj2lggtz7zIK7ST/JH+1QCmR4XAqI= X-MS-Exchange-Transport-CrossTenantHeadersStamped: SN7PR10MB6383 X-Proofpoint-Virus-Version: vendor=baseguard engine=ICAP:2.0.293,Aquarius:18.0.1099,Hydra:6.1.9,FMLib:17.12.80.40 definitions=2025-08-12_07,2025-08-11_01,2025-03-28_01 X-Proofpoint-Spam-Details: rule=notspam policy=default score=0 mlxlogscore=999 bulkscore=0 adultscore=0 mlxscore=0 phishscore=0 spamscore=0 suspectscore=0 malwarescore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.12.0-2507300000 definitions=main-2508120152 X-Proofpoint-GUID: lwzUYi2wxpVI0gFOEsczmjENRs2H_s6D X-Proofpoint-ORIG-GUID: lwzUYi2wxpVI0gFOEsczmjENRs2H_s6D X-Proofpoint-Spam-Details-Enc: AW1haW4tMjUwODEyMDE1MiBTYWx0ZWRfXyhaZM79ESjhD gW7op/vg7tAd4ZcXUKZ1h1fOJLZGmP7tZHoiCwcD6g+Rb+yRW4uXFhxfHcGj6+AKgcGb2d19FrB YpLxguPkBmFT8A+VzCnxHLk+tm7XksonWvJnRZ2s5RCpdP41p5xhLCQC3gHymvNWvym3ahIWVKm +KFTTJqg8RjCORVMJeO6iKVV9KZi4TzFztojC+IIvYRnbG+u6pMs7CY47INNX2UYuKF0Z7wScFG ijNG1CpX4RhO0UMCvAD1PhuET3tMb2RkfQC8jQAzSDV4TueRkBld7X2TABAiL9lUvuBxGXNLTNq 5e2GExuuUr+g4BNDeIg4K/LCB3eqEYAjm5M0ZPZRmSUWUbtv0D8hG+dL5K5TKSAq25A7bKMN8zw L4tzesDJROtUfw5WhlO1VWUT+lDhbBlapvaKRuO3GBS+ZTDnAHr7fYyX1Nf5AeQZk7siGMT4 X-Authority-Analysis: v=2.4 cv=dpnbC0g4 c=1 sm=1 tr=0 ts=689b6231 b=1 cx=c_pps a=zPCbziy225d3KhSqZt3L1A==:117 a=zPCbziy225d3KhSqZt3L1A==:17 a=6eWqkTHjU83fiwn7nKZWdM+Sl24=:19 a=z/mQ4Ysz8XfWz/Q5cLBRGdckG28=:19 a=lCpzRmAYbLLaTzLvsPZ7Mbvzbb8=:19 a=wKuvFiaSGQ0qltdbU6+NXLB8nM8=:19 a=Ol13hO9ccFRV9qXi2t6ftBPywas=:19 a=xqWC_Br6kY4A:10 a=2OwXVqhp2XgA:10 a=GoEa3M9JfhUA:10 a=yPCof4ZbAAAA:8 a=lIc7FA3TbVCleBZhzpoA:9 cc=ntf awl=host:12069 Content-Type: text/plain; charset="utf-8" We now need to account for flag initialisation on fork. We retain the existing logic as much as we can, but dub the existing flag mask legacy. These flags are therefore required to fit in the first 32-bits of the flags field. However, further flag propagation upon fork can be implemented in mm_init() on a per-flag basis. We ensure we clear the entire bitmap prior to setting it, and use __mm_flags_get_word() and __mm_flags_set_word() to manipulate these legacy fields efficiently. Signed-off-by: Lorenzo Stoakes Acked-by: David Hildenbrand Reviewed-by: Liam R. Howlett Reviewed-by: Mike Rapoport (Microsoft) --- include/linux/mm_types.h | 13 ++++++++++--- kernel/fork.c | 7 +++++-- 2 files changed, 15 insertions(+), 5 deletions(-) diff --git a/include/linux/mm_types.h b/include/linux/mm_types.h index 38b3fa927997..25577ab39094 100644 --- a/include/linux/mm_types.h +++ b/include/linux/mm_types.h @@ -1820,16 +1820,23 @@ enum { #define MMF_TOPDOWN 31 /* mm searches top down by default */ #define MMF_TOPDOWN_MASK _BITUL(MMF_TOPDOWN) =20 -#define MMF_INIT_MASK (MMF_DUMPABLE_MASK | MMF_DUMP_FILTER_MASK |\ +#define MMF_INIT_LEGACY_MASK (MMF_DUMPABLE_MASK | MMF_DUMP_FILTER_MASK |\ MMF_DISABLE_THP_MASK | MMF_HAS_MDWE_MASK |\ MMF_VM_MERGE_ANY_MASK | MMF_TOPDOWN_MASK) =20 -static inline unsigned long mmf_init_flags(unsigned long flags) +/* Legacy flags must fit within 32 bits. */ +static_assert((u64)MMF_INIT_LEGACY_MASK <=3D (u64)UINT_MAX); + +/* + * Initialise legacy flags according to masks, propagating selected flags = on + * fork. Further flag manipulation can be performed by the caller. + */ +static inline unsigned long mmf_init_legacy_flags(unsigned long flags) { if (flags & (1UL << MMF_HAS_MDWE_NO_INHERIT)) flags &=3D ~((1UL << MMF_HAS_MDWE) | (1UL << MMF_HAS_MDWE_NO_INHERIT)); - return flags & MMF_INIT_MASK; + return flags & MMF_INIT_LEGACY_MASK; } =20 #endif /* _LINUX_MM_TYPES_H */ diff --git a/kernel/fork.c b/kernel/fork.c index c4ada32598bd..b311caec6419 100644 --- a/kernel/fork.c +++ b/kernel/fork.c @@ -1056,11 +1056,14 @@ static struct mm_struct *mm_init(struct mm_struct *= mm, struct task_struct *p, mm_init_uprobes_state(mm); hugetlb_count_init(mm); =20 + mm_flags_clear_all(mm); if (current->mm) { - mm->flags =3D mmf_init_flags(current->mm->flags); + unsigned long flags =3D __mm_flags_get_word(current->mm); + + __mm_flags_set_word(mm, mmf_init_legacy_flags(flags)); mm->def_flags =3D current->mm->def_flags & VM_INIT_DEF_MASK; } else { - mm->flags =3D default_dump_filter; + __mm_flags_set_word(mm, default_dump_filter); mm->def_flags =3D 0; } =20 --=20 2.50.1 From nobody Sat Oct 4 20:52:45 2025 Received: from mx0b-00069f02.pphosted.com (mx0b-00069f02.pphosted.com [205.220.177.32]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 9CF55307AC9; Tue, 12 Aug 2025 15:48:41 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=fail smtp.client-ip=205.220.177.32 ARC-Seal: i=2; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1755013723; cv=fail; b=lCRcRpIusiJyOMUbN2XI08ZLSE6ebSjB3imgT8U1v4M3iSok0ZIwYekBNh93NLSsXvBA5OUl01NQvQs/Eul35mVPW+2+ud2SIBEquVX7lOp/1/rqowyYP9kIuSl/F6AtftRRu0scK7LI96JU/aW58VrVF9SJI1oD0F4IyyIYGSk= ARC-Message-Signature: i=2; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1755013723; c=relaxed/simple; bh=Ucb8mPw8SNMTfAuB+S27eb45fRPyxy9Bpb2pZb1I0tM=; h=From:To:Cc:Subject:Date:Message-ID:In-Reply-To:References: Content-Type:MIME-Version; b=HXVCiLsJncY0WQpmLkO5zdNl+eYkmu7G/LRNK2CrCxJr1KI7hMY/Nuzm+j6t8lUvF3/Gzu6o+G1At8+8IOs1Zol29/mox4QTAUgIv8L7tA6VUsF6xMmplbURFGB+y/iFMiwEDqfiLitcnG7giQ6RUhzy7FFDoUW23q9XUdxaDNI= ARC-Authentication-Results: i=2; smtp.subspace.kernel.org; dmarc=pass (p=reject dis=none) header.from=oracle.com; spf=pass smtp.mailfrom=oracle.com; dkim=pass (2048-bit key) header.d=oracle.com header.i=@oracle.com header.b=VJUmmNEK; dkim=pass (1024-bit key) header.d=oracle.onmicrosoft.com header.i=@oracle.onmicrosoft.com header.b=FusTsk2N; arc=fail smtp.client-ip=205.220.177.32 Authentication-Results: smtp.subspace.kernel.org; dmarc=pass (p=reject dis=none) header.from=oracle.com Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=oracle.com Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=oracle.com header.i=@oracle.com header.b="VJUmmNEK"; dkim=pass (1024-bit key) header.d=oracle.onmicrosoft.com header.i=@oracle.onmicrosoft.com header.b="FusTsk2N" Received: from pps.filterd (m0246632.ppops.net [127.0.0.1]) by mx0b-00069f02.pphosted.com (8.18.1.2/8.18.1.2) with ESMTP id 57CDBweY025255; Tue, 12 Aug 2025 15:48:05 GMT DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=oracle.com; h=cc :content-transfer-encoding:content-type:date:from:in-reply-to :message-id:mime-version:references:subject:to; s= corp-2025-04-25; bh=ufr7W+sTl/1LuOsSG7ZNmW6pdNfc/pMlp4wqRssUxv4=; b= VJUmmNEKnN0trbxrc1JkkW+3/ppZhLhOtK7OlaezPsMN4HqKXyOaQusJZ97UVRQ3 ig/skzD0m4e/o3zdTK8TZNoUxWJIJ74aa53r/kYCaABYnH+3cIxqpFGbTqo3yB79 2hAbsdEQ0pIb6BL56ycjR5cOlnlLCUItgdpPTCy2bpbelzzMjQwYhI2W49CACuFe IbZmfR/HTsCWMIveNYOnsrqCI/iK4qMPDeZ9HgW6S9DAMUwhykfWt47LLWGgbBao rjA+CR9VDbvvyOXIcWFaMCH2I2XGuGJdwcbpJStPnAN0uxI7kEKJQF9Ft/LDlioD FKf2jbuz+yqbVfU1YTWstw== Received: from iadpaimrmta01.imrmtpd1.prodappiadaev1.oraclevcn.com (iadpaimrmta01.appoci.oracle.com [130.35.100.223]) by mx0b-00069f02.pphosted.com (PPS) with ESMTPS id 48dwxv50m7-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK); Tue, 12 Aug 2025 15:48:04 +0000 (GMT) Received: from pps.filterd (iadpaimrmta01.imrmtpd1.prodappiadaev1.oraclevcn.com [127.0.0.1]) by iadpaimrmta01.imrmtpd1.prodappiadaev1.oraclevcn.com (8.18.1.2/8.18.1.2) with ESMTP id 57CFIdxq009646; Tue, 12 Aug 2025 15:48:03 GMT Received: from nam11-bn8-obe.outbound.protection.outlook.com (mail-bn8nam11on2042.outbound.protection.outlook.com [40.107.236.42]) by iadpaimrmta01.imrmtpd1.prodappiadaev1.oraclevcn.com (PPS) with ESMTPS id 48dvsgenuu-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK); Tue, 12 Aug 2025 15:48:03 +0000 ARC-Seal: i=1; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=none; b=dBfytWdB15wybY24V3oQ0TxaXL/Oncv+IRZw1n6M5TnCLYrQfD7LjSuwNFzHsulYrRkxnkXO2qWjdYWqW5P1X7/ro16VaOfG0WndglHwYa/0XwGZpOSsMpUYrM9ogSpdLX4cdL8QaXp7/dO0zdvThMfBoy49qeKKUsji3VbsmvLGBGYp9BELwGBK9JP06dE1kiALXdIWNw9T0aWG4Xnbn6cYs7byXOXC8uF29FRcTfHdaLl9j/DPTazqGGdWzHGzVKSWMSbJPofPU2sCkW8V5scm0AQ6sGf6G2XMCEoqrpjnNdByY+0678XNKlqhurFN4QFyXYYosmAOgqKyMgHC9w== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector10001; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=ufr7W+sTl/1LuOsSG7ZNmW6pdNfc/pMlp4wqRssUxv4=; b=hBY3y+j7zqCkqyrZnqeB6Z9G4GLqmwWiBSRm1Ki5vHxOYeEFCl8gAxXZ2ornYwiI/lHWvOjF7eQ5kkRfyNB+Jb3nFntJhJe0dybUMSpJfRI4KWENWtitG4CNHKG32oJgxSQHmtiSlTRt7S8VrBDGdqIenXae52cpORQKneXWT18o1qQ2rijXuJLEmcqZ6JxK6VDYk9rrXsvOoDGL+mPkq7s6eL3Wn94/ggEiBh6EgRSc52TeK+08XiIXTow/iRVVGSQshFOy5ie2Cd/Y2dk1512JrMgFlPj3hYdGmeQNRdtvXct0Y0rdEWWzbRe9fWAzHUVbbyNuPBgfrsSOH/m6Qg== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=oracle.com; dmarc=pass action=none header.from=oracle.com; dkim=pass header.d=oracle.com; arc=none DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=oracle.onmicrosoft.com; s=selector2-oracle-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=ufr7W+sTl/1LuOsSG7ZNmW6pdNfc/pMlp4wqRssUxv4=; b=FusTsk2NRp/qkgteTPMf10GUdAxhNhtnM82KElKk8kdJ73lqkQAVTN7HUHfulAsVFlmYP3XijAYnoP7TCk0yuh9YRGZGyfoKLJIkSn6CYlrYNQjBdHJIHyoDdWuK14Vzz5EsGnbk5De9v13AVUQQSj02gnnGiCIgAoNO+JXvuXA= Received: from DM4PR10MB8218.namprd10.prod.outlook.com (2603:10b6:8:1cc::16) by SN7PR10MB6383.namprd10.prod.outlook.com (2603:10b6:806:26d::18) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.9031.13; Tue, 12 Aug 2025 15:48:00 +0000 Received: from DM4PR10MB8218.namprd10.prod.outlook.com ([fe80::2650:55cf:2816:5f2]) by DM4PR10MB8218.namprd10.prod.outlook.com ([fe80::2650:55cf:2816:5f2%5]) with mapi id 15.20.9031.012; Tue, 12 Aug 2025 15:48:00 +0000 From: Lorenzo Stoakes To: Andrew Morton Cc: Alexander Gordeev , Gerald Schaefer , Heiko Carstens , Vasily Gorbik , Christian Borntraeger , Sven Schnelle , "David S . Miller" , Andreas Larsson , Dave Hansen , Andy Lutomirski , Peter Zijlstra , Thomas Gleixner , Ingo Molnar , Borislav Petkov , "H . Peter Anvin" , Alexander Viro , Christian Brauner , Jan Kara , Kees Cook , David Hildenbrand , Zi Yan , Baolin Wang , "Liam R . Howlett" , Nico Pache , Ryan Roberts , Dev Jain , Barry Song , Xu Xin , Chengming Zhou , Vlastimil Babka , Mike Rapoport , Suren Baghdasaryan , Michal Hocko , David Rientjes , Shakeel Butt , Arnaldo Carvalho de Melo , Namhyung Kim , Mark Rutland , Alexander Shishkin , Jiri Olsa , Ian Rogers , Adrian Hunter , Kan Liang , Masami Hiramatsu , Oleg Nesterov , Juri Lelli , Vincent Guittot , Dietmar Eggemann , Steven Rostedt , Ben Segall , Mel Gorman , Valentin Schneider , Jason Gunthorpe , John Hubbard , Peter Xu , Jann Horn , Pedro Falcato , Matthew Wilcox , Mateusz Guzik , linux-s390@vger.kernel.org, linux-kernel@vger.kernel.org, sparclinux@vger.kernel.org, linux-fsdevel@vger.kernel.org, linux-mm@kvack.org, linux-trace-kernel@vger.kernel.org, linux-perf-users@vger.kernel.org Subject: [PATCH 09/10] mm: convert remaining users to mm_flags_*() accessors Date: Tue, 12 Aug 2025 16:44:18 +0100 Message-ID: X-Mailer: git-send-email 2.50.1 In-Reply-To: References: Content-Transfer-Encoding: quoted-printable X-ClientProxiedBy: GV2PEPF00007566.SWEP280.PROD.OUTLOOK.COM (2603:10a6:158:401::3f4) To DM4PR10MB8218.namprd10.prod.outlook.com (2603:10b6:8:1cc::16) Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 X-MS-PublicTrafficType: Email X-MS-TrafficTypeDiagnostic: DM4PR10MB8218:EE_|SN7PR10MB6383:EE_ X-MS-Office365-Filtering-Correlation-Id: 2fb71452-b93b-4631-98ff-08ddd9b79dbd X-MS-Exchange-SenderADCheck: 1 X-MS-Exchange-AntiSpam-Relay: 0 X-Microsoft-Antispam: BCL:0;ARA:13230040|376014|366016|7416014|1800799024; X-Microsoft-Antispam-Message-Info: =?us-ascii?Q?6QV5CdsXwIM9BzsTKhHEQXQQrqeIDztaVTkE/yrlC+b7Eiv7I3SU6MNKZliF?= =?us-ascii?Q?i8DOXvZYT4jtCX6vVTwF22Ak8t1pw5clW78plInhi/KHLWmZHf1UT4w//f8o?= =?us-ascii?Q?lAdeM/IRnl5sZOwI6SKD5fkD4cK/bPKtIAF1o1eI0xwH1Co8F1/7pDiaucEE?= =?us-ascii?Q?UiipuCKVNcwlXb+cPG5RdpKWWZS0jSYMUvL4nHN9au9/Kh7Zt80iXG0vgIHM?= =?us-ascii?Q?+IjVwo2k8Hhl4BOzD2To5EdGTu3/dLH4oimI8GW9339dNT+J+TumPd4WDqPN?= =?us-ascii?Q?xeChc6JuVkoR6viTo7wAT/XuFrtuLXsFDdWR5Z65ZoWBWN2F+22d4+53NB6M?= =?us-ascii?Q?nerV+f+13hfudA1vi+3wOu0IqJ1UeTyhTDb0Lj2PYPt1ncDJk7ipqLt/X/M8?= =?us-ascii?Q?IUaQRAEcEARSoM89bMdbW2CZlhKSWbyqPfZX1GKkngKbpJbfLXbXeDd9NCWW?= =?us-ascii?Q?7uv2hOD2XyJ6jDrJmQUBXTKrWPJWVpKY2xCKx8kyFbBUzD55yUB3iWZZWJPU?= =?us-ascii?Q?BXfpCJ28g+1iff0WXODjprlw9xoXYxewZo/V0LYThcRDloqfcVJLGed2zb/J?= =?us-ascii?Q?Ibe2ImdsAYnBRCV4WX+s11F5aImO+b1gsfzOy1J9Wt3KWPYXC8Ss4ngg6cUe?= =?us-ascii?Q?SscPWBQNnq6eLC82BNMdbpu8K01Ij4ZUUSQLsLBk89d6JH6v3qnv+03iuFAp?= =?us-ascii?Q?Sz4D6FmBpUMQ6ggtHKk0l6KyNJtkwd530IROBW5WOdRl9rEH7V+nLYL+Op3S?= =?us-ascii?Q?tMVZ/K128pUnmF8Ua8CSWCmpXdvLHebR3GxjJQ4eFwZ/CBl+no7DIrBJIuGt?= =?us-ascii?Q?r8tsLXjmKGY1JbRdLj/P5Xereo6Y4qHeqiZXOWJFX6aTsMNHsySCUE5wlBFs?= =?us-ascii?Q?eagd9ILURzRhT0eSrF648i/ST1hsfYmKwDpFDcd6Gg8RP8TdtHR61aROXUwb?= =?us-ascii?Q?VYZN7zqzs+5/4rWnG2DUucvUszs6NQ/2prTYwKFiFrq3rC4onXzmsOKDoy2F?= =?us-ascii?Q?F1TWxsuxRqNHTfHMicUGBv5Z5hsXtbUm3o65FRsm3hvP0CKLAVucFONZVEjW?= =?us-ascii?Q?Yq5IQqizrpBE0mGSWc7R6nhTXR1l9UQj7Yow8U1zoLAmnh/JHEY4flLvDG2d?= =?us-ascii?Q?KwV55OZH19bCoJalJ/FjYRurQ11+HKem9/Jbh5KOwbXCv4LM1h2s+gsBh9A0?= =?us-ascii?Q?kzJ0je64xxE7L5hYcx+INYMdlrR84YDa9WOXnRn7vyhG1WcdaXk9/lMCNHIN?= =?us-ascii?Q?oJKjNNG8QvjClJg6i1ENtj+j+3h3U3xuqvYFyZkHd+QghbyaOnu8Su7pgyOE?= =?us-ascii?Q?S7JPPY9yPmGmHYmmj+3KHGi2vWchXp0T17Nwo5m0RDBuyjH54ckYKHSqXPL9?= =?us-ascii?Q?xfi7bajSvXz1dFybT4bGobYWQECE7VmWo03aGF+79KCsDLYJiLGrEVfl1Dn2?= =?us-ascii?Q?V+oW01vdwoo=3D?= X-Forefront-Antispam-Report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:DM4PR10MB8218.namprd10.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230040)(376014)(366016)(7416014)(1800799024);DIR:OUT;SFP:1101; X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1 X-MS-Exchange-AntiSpam-MessageData-0: =?us-ascii?Q?J8ZUeLvlFiKN7U5w0gryC2b0IT47SpDo+U82Kqb8xHLCwMmIn17OlM+vB29H?= =?us-ascii?Q?PQFLgMll9ZS1mPv6GoKVDnLyAa2qvfYPUj59tfbTN+8njukypr33MfGQASuh?= =?us-ascii?Q?DTjdVptbdSPWx0I/Jd0Ook+7LuaOde4/P5VQbtjQAzWogrn65ooXpoBjRIf8?= =?us-ascii?Q?ymaSucMqBHZ2xG97BoLqXBaDtq7s8MA4hJz2q6flOkWkl6uLRajUVSAMFwG/?= =?us-ascii?Q?wgWfHRcg0KoCZE/V7EcMlpR5E56pSQuSjfcoE81IP+CEMGfuoPgcm/xX9B8R?= =?us-ascii?Q?wMnWt8BFg1nl2CcXdIyAXfRMvO9KkjCWcL0onZGipadMGyygk0xtkWb5NNl+?= =?us-ascii?Q?AU03vcW8qgTNF0BESizqPiUp4QgZWp7zFXEWj/9ZBfHioHBvyIDdi7Uplcdn?= =?us-ascii?Q?Pqmks0aZbZmfS9JhkBlDGfdtnvzBLXDlOcWS20Ny3J3FY/NCNDlkiuf1Nk2E?= =?us-ascii?Q?sO3zjxtl3BYGeM08vVx5IgeZuLDCfyht2pnHJwIvNh5bIORqmRTXpHPESuka?= =?us-ascii?Q?l7Z3Pinf9xxoQIfryoXqy0kyLTyrUwMylD1jXC9QCfUoZaesPzeQEDesX66X?= =?us-ascii?Q?RfFITPfkqZpguh7UPXXQKItqce8jRzJ2LTFQE9z9XKKjUcttJyjDN8YStfyi?= =?us-ascii?Q?RSj1sTb7FBKiH/8Xl15orvwEoeGzbHlXzA2FbUNsTkv2QSipzd8X0VhekRNu?= =?us-ascii?Q?fPDxb7IJSyI8fbMhzIC0+vpjw7Qj4c+kb/eoRkeQ+d1ZKDp+RlED16IghSfn?= =?us-ascii?Q?zjjWsnec/jYPi4TGpDs3dYq1ZdXjpr1G5E720C+h1b7K971eO3NLzWPM25y7?= =?us-ascii?Q?0+ejNQkfpkWHWqM95f69Lh1vUlGm7qAq6CYCciGMFbDXeOU+YJgK1OGnoO2S?= =?us-ascii?Q?SSkNwqS2ALB+GLyrhNWmRsTRN6dlUao5IVjSC2kqHpWxPRVc3ncPcexiu8Xz?= =?us-ascii?Q?BJYswcxqpNHuQgAxTJzpBsGF7/ePyVHFvjQuU4ftDNMGK4V0rprTzdBm3FJu?= =?us-ascii?Q?Gj60OuijGURX/t82X1n20FZZg4FTsFHpvjX5AJCXOy7qLlXA0IEGavEB1Qip?= =?us-ascii?Q?1KFJ63Aj/YfbCnCEz2mei2LGlZtrVlshEGqLVyTmZ7IDsh50w1SBDOU6Xrbh?= =?us-ascii?Q?fFl0IZ8mecXDOQoNKzv2vmP4nASexOyv+4R431d/HtXe/yrHEqtc5YdtnHTd?= =?us-ascii?Q?+LNLmAJYi/3vYNuXp3hZv1+7T2WRmX926nU8pujRdSxCheIKYRtKXFJa5xVy?= =?us-ascii?Q?pnVNOYUHozjt+4DajnrEwAyweDHINXpV1+dvGgzNdXAr6mqU4a6BoqqXux71?= =?us-ascii?Q?ZDfDBsx1PdWlaLhlvi7jNnEGDGz3WWdvGr7VePFb6pfia8K4JkktRoQz/qiM?= =?us-ascii?Q?HRaLrmF+jkWAwqB4sz9cKYmz48IjmlbEtO4oV1x9uWxKtmHndkzS2NSKR66f?= =?us-ascii?Q?ZiZ0WSmFPAcw42lv516HAn4LIB+jfcOBRl2IRCAmmFZZOTAy9dravUOiJY6R?= =?us-ascii?Q?YyX13EmnGGLNWkLvHI3Gs1EuQdP7Fzvy8r1yZQF/EJyr0tmyDI9XiYNixqkf?= =?us-ascii?Q?6LHW3I+wCQhaM2VN958NBckgYILeh/oRA/ukvCio1iYxvJW6xzYGbJPNajBC?= =?us-ascii?Q?mg=3D=3D?= X-MS-Exchange-AntiSpam-ExternalHop-MessageData-ChunkCount: 1 X-MS-Exchange-AntiSpam-ExternalHop-MessageData-0: 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 X-OriginatorOrg: oracle.com X-MS-Exchange-CrossTenant-Network-Message-Id: 2fb71452-b93b-4631-98ff-08ddd9b79dbd X-MS-Exchange-CrossTenant-AuthSource: DM4PR10MB8218.namprd10.prod.outlook.com X-MS-Exchange-CrossTenant-AuthAs: Internal X-MS-Exchange-CrossTenant-OriginalArrivalTime: 12 Aug 2025 15:48:00.5885 (UTC) X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted X-MS-Exchange-CrossTenant-Id: 4e2c6054-71cb-48f1-bd6c-3a9705aca71b X-MS-Exchange-CrossTenant-MailboxType: HOSTED X-MS-Exchange-CrossTenant-UserPrincipalName: U0LwZXm3wVtnZGJZEpa/eKH5lXd+Z7X7OoETBNPXYwm9FIsSiKFz/a60lErSfSdwUWifQ7R45w3WJOMeuPfT0FOw67ZCe4syI7hpJOxdDLQ= X-MS-Exchange-Transport-CrossTenantHeadersStamped: SN7PR10MB6383 X-Proofpoint-Virus-Version: vendor=baseguard engine=ICAP:2.0.293,Aquarius:18.0.1099,Hydra:6.1.9,FMLib:17.12.80.40 definitions=2025-08-12_07,2025-08-11_01,2025-03-28_01 X-Proofpoint-Spam-Details: rule=notspam policy=default score=0 mlxlogscore=999 bulkscore=0 adultscore=0 mlxscore=0 phishscore=0 spamscore=0 suspectscore=0 malwarescore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.12.0-2507300000 definitions=main-2508120152 X-Proofpoint-GUID: cIR_ZM1-eCJeAIySKiy1liZ2enG8cFK5 X-Proofpoint-ORIG-GUID: cIR_ZM1-eCJeAIySKiy1liZ2enG8cFK5 X-Proofpoint-Spam-Details-Enc: AW1haW4tMjUwODEyMDE1MiBTYWx0ZWRfX5h5kF84y3kib JvT+p4jTruPlgRSMS0YHhjeIyQl7QxcIzss3Scg4dNlP+QCjHAAEa3o/Z8JXEntzMesH2wAkVaD KHbdKDtIqDPpDDaIntVv0JGGXDsh1YUHEf8GoMKjXoYV5oItCz9JngWjOrXuIK++azbxToVoFaF od9hwwjBxkzPvkxizcX4hMg8utBaiLOeNIQra+9vwLFs2un9vS4ZM2g2ayu/U70ExAa6czsfNlO bY/WPN7pkFNmnRE52ZoWOB8SXmRkdLqaLVEtc2zcvxTo4C9WtDtyhvKdVn/jf+SrYdTCRBCNKDm hJZ96RanJ+Nfu4Lmu96CqDB+Serg0BV1FsX2sYNmVHzgiqGEKTmldUUg7cadMczNCC7TWe3NRD5 OVJkG1Mei6plrvjUFeY9CSYJGMRWE8PnAx9tbDC9Em+1v1NYbLNcGMHoCig0J4s4XEmGoTTc X-Authority-Analysis: v=2.4 cv=KJZaDEFo c=1 sm=1 tr=0 ts=689b6234 b=1 cx=c_pps a=zPCbziy225d3KhSqZt3L1A==:117 a=zPCbziy225d3KhSqZt3L1A==:17 a=6eWqkTHjU83fiwn7nKZWdM+Sl24=:19 a=z/mQ4Ysz8XfWz/Q5cLBRGdckG28=:19 a=lCpzRmAYbLLaTzLvsPZ7Mbvzbb8=:19 a=wKuvFiaSGQ0qltdbU6+NXLB8nM8=:19 a=Ol13hO9ccFRV9qXi2t6ftBPywas=:19 a=xqWC_Br6kY4A:10 a=2OwXVqhp2XgA:10 a=GoEa3M9JfhUA:10 a=yPCof4ZbAAAA:8 a=urWiDTc8nT0oivSZmOMA:9 cc=ntf awl=host:12069 Content-Type: text/plain; charset="utf-8" As part of the effort to move to mm->flags becoming a bitmap field, convert existing users to making use of the mm_flags_*() accessors which will, when the conversion is complete, be the only means of accessing mm_struct flags. No functional change intended. Signed-off-by: Lorenzo Stoakes Acked-by: David Hildenbrand Reviewed-by: Liam R. Howlett Reviewed-by: Mike Rapoport (Microsoft) --- fs/proc/array.c | 2 +- fs/proc/base.c | 4 ++-- fs/proc/task_mmu.c | 2 +- kernel/fork.c | 2 +- 4 files changed, 5 insertions(+), 5 deletions(-) diff --git a/fs/proc/array.c b/fs/proc/array.c index d6a0369caa93..c286dc12325e 100644 --- a/fs/proc/array.c +++ b/fs/proc/array.c @@ -422,7 +422,7 @@ static inline void task_thp_status(struct seq_file *m, = struct mm_struct *mm) bool thp_enabled =3D IS_ENABLED(CONFIG_TRANSPARENT_HUGEPAGE); =20 if (thp_enabled) - thp_enabled =3D !test_bit(MMF_DISABLE_THP, &mm->flags); + thp_enabled =3D !mm_flags_test(MMF_DISABLE_THP, mm); seq_printf(m, "THP_enabled:\t%d\n", thp_enabled); } =20 diff --git a/fs/proc/base.c b/fs/proc/base.c index f0c093c58aaf..b997ceef9135 100644 --- a/fs/proc/base.c +++ b/fs/proc/base.c @@ -1163,7 +1163,7 @@ static int __set_oom_adj(struct file *file, int oom_a= dj, bool legacy) struct task_struct *p =3D find_lock_task_mm(task); =20 if (p) { - if (test_bit(MMF_MULTIPROCESS, &p->mm->flags)) { + if (mm_flags_test(MMF_MULTIPROCESS, p->mm)) { mm =3D p->mm; mmgrab(mm); } @@ -3276,7 +3276,7 @@ static int proc_pid_ksm_stat(struct seq_file *m, stru= ct pid_namespace *ns, seq_printf(m, "ksm_merging_pages %lu\n", mm->ksm_merging_pages); seq_printf(m, "ksm_process_profit %ld\n", ksm_process_profit(mm)); seq_printf(m, "ksm_merge_any: %s\n", - test_bit(MMF_VM_MERGE_ANY, &mm->flags) ? "yes" : "no"); + mm_flags_test(MMF_VM_MERGE_ANY, mm) ? "yes" : "no"); ret =3D mmap_read_lock_killable(mm); if (ret) { mmput(mm); diff --git a/fs/proc/task_mmu.c b/fs/proc/task_mmu.c index e64cf40ce9c4..e8e7bef34531 100644 --- a/fs/proc/task_mmu.c +++ b/fs/proc/task_mmu.c @@ -1592,7 +1592,7 @@ static inline bool pte_is_pinned(struct vm_area_struc= t *vma, unsigned long addr, return false; if (!is_cow_mapping(vma->vm_flags)) return false; - if (likely(!test_bit(MMF_HAS_PINNED, &vma->vm_mm->flags))) + if (likely(!mm_flags_test(MMF_HAS_PINNED, vma->vm_mm))) return false; folio =3D vm_normal_folio(vma, addr, pte); if (!folio) diff --git a/kernel/fork.c b/kernel/fork.c index b311caec6419..68c81539193d 100644 --- a/kernel/fork.c +++ b/kernel/fork.c @@ -1887,7 +1887,7 @@ static void copy_oom_score_adj(u64 clone_flags, struc= t task_struct *tsk) =20 /* We need to synchronize with __set_oom_adj */ mutex_lock(&oom_adj_mutex); - set_bit(MMF_MULTIPROCESS, &tsk->mm->flags); + mm_flags_set(MMF_MULTIPROCESS, tsk->mm); /* Update the values in case they were changed after copy_signal */ tsk->signal->oom_score_adj =3D current->signal->oom_score_adj; tsk->signal->oom_score_adj_min =3D current->signal->oom_score_adj_min; --=20 2.50.1 From nobody Sat Oct 4 20:52:45 2025 Received: from mx0b-00069f02.pphosted.com (mx0b-00069f02.pphosted.com [205.220.177.32]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id CAC802F8BE9; Tue, 12 Aug 2025 15:48:46 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=fail smtp.client-ip=205.220.177.32 ARC-Seal: i=2; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1755013728; cv=fail; b=pz7OduNy9FBf+k0Vwc7KgwhFcNSXKcZOTOboso8I4+ox+6VI2EAGKnThU0iJuvwuhSefWJ6O75rcsBAvsRdcoOwrhXb1uVYfGir0flzwvHnzs38Vef2N2y9Gjc8cde1kTIt8h8GrZSWYPVLwZ33JbJssEn3ppg3q9AoMnJQHCJE= ARC-Message-Signature: i=2; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1755013728; c=relaxed/simple; bh=aMags+nGUKy3j7VASY5vq5Nf6vaQHE80uZQGS5J2QXI=; h=From:To:Cc:Subject:Date:Message-ID:In-Reply-To:References: Content-Type:MIME-Version; b=qO//d1+nvtXKZYmV+moAtpqhcOdMX3MjPG8TdDY7KAvGoixxunt9pZFsz7/HJ+qev6HxmXfGpu9z0xH7jHscAN+NH0D5x1Q5NFnUoYltkAaoKpIU3ISh2heap/StnEMCdXD37+ybmOBvcNwoS/JnHmBgJWwIdV7NSgadsl+e7kc= ARC-Authentication-Results: i=2; smtp.subspace.kernel.org; dmarc=pass (p=reject dis=none) header.from=oracle.com; spf=pass smtp.mailfrom=oracle.com; dkim=pass (2048-bit key) header.d=oracle.com header.i=@oracle.com header.b=P/W5/XPH; dkim=pass (1024-bit key) header.d=oracle.onmicrosoft.com header.i=@oracle.onmicrosoft.com header.b=HHfUOi1L; arc=fail smtp.client-ip=205.220.177.32 Authentication-Results: smtp.subspace.kernel.org; dmarc=pass (p=reject dis=none) header.from=oracle.com Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=oracle.com Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=oracle.com header.i=@oracle.com header.b="P/W5/XPH"; dkim=pass (1024-bit key) header.d=oracle.onmicrosoft.com header.i=@oracle.onmicrosoft.com header.b="HHfUOi1L" Received: from pps.filterd (m0246630.ppops.net [127.0.0.1]) by mx0b-00069f02.pphosted.com (8.18.1.2/8.18.1.2) with ESMTP id 57CDBx2u002271; Tue, 12 Aug 2025 15:48:09 GMT DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=oracle.com; h=cc :content-transfer-encoding:content-type:date:from:in-reply-to :message-id:mime-version:references:subject:to; s= corp-2025-04-25; bh=B2aS6BDl/QFPmni7CBmM43BqGZ2pwQ8wQmhHEe2pv/A=; b= P/W5/XPHh2H8rgXdvb5QtCm3rnhZtKiK4WQ9hCrB4jrhsR+u5+oqy1uPpcYZUow+ pvVFP2m2TgvJsoQ4MNQ2h5UfI/0A4HdH1FfRez4PjOePLYf3BSNBj5rTjZ7MeU/1 5k9SQZuJ/bHcBByaUxknwfPKTXyDBCUzHw6OMrXoZp0GJra8pqg+gkIZOByeiKhE paqXo1kGmhNcvY2wPtlzlpDQZ7gcg6rj6S+JDvctYyyQk9f/8iCzYJ79ckDTKtlC IOibKE/dLT6tKnGoSWDVoK4Nh3w7yr97YBCF2kEtZxRomA6bPF21leC+wzmBitqR ZV4vdNvcti7WDApjgvcS2A== Received: from phxpaimrmta02.imrmtpd1.prodappphxaev1.oraclevcn.com (phxpaimrmta02.appoci.oracle.com [147.154.114.232]) by mx0b-00069f02.pphosted.com (PPS) with ESMTPS id 48dvrfw1my-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK); Tue, 12 Aug 2025 15:48:08 +0000 (GMT) Received: from pps.filterd (phxpaimrmta02.imrmtpd1.prodappphxaev1.oraclevcn.com [127.0.0.1]) by phxpaimrmta02.imrmtpd1.prodappphxaev1.oraclevcn.com (8.18.1.2/8.18.1.2) with ESMTP id 57CEQu2o030118; Tue, 12 Aug 2025 15:48:07 GMT Received: from nam11-co1-obe.outbound.protection.outlook.com (mail-co1nam11on2052.outbound.protection.outlook.com [40.107.220.52]) by phxpaimrmta02.imrmtpd1.prodappphxaev1.oraclevcn.com (PPS) with ESMTPS id 48dvsa515e-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK); Tue, 12 Aug 2025 15:48:07 +0000 ARC-Seal: i=1; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=none; b=iw0sviBedHRUPjygN+Oh5AwsZpf76vUEESC8Ay+5WxS+YQnMPUKvL+x8G9wzElyvFMK7Q/DG5QMDlpLmwE4TQNq5uTJCWvHjWsnwLrS0amZeTUc9cTXYqHgtlUdIPqegVX6z+wBWlPnOVfmCJThQ+jK5a5t1xXwHKlS819r25YSJb/Py0n/eI79tETELmGXtdVzZfewnHmP+k7Qi5jJTdlZE+KNhTTgBsdrGxTEK85zC+6FsFvoMXbtZPut2UH5xTOiyX2YAA1vpPmSkHtq3m27oM3cTBav88fVxMoh/qJ3YkbQSH8Uixry2Lo7xB2QAU7NltTVaNu11Jil0oqWU2g== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector10001; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=B2aS6BDl/QFPmni7CBmM43BqGZ2pwQ8wQmhHEe2pv/A=; b=J1akrVV3jT74KKUo7rxpAuoYuRjNDfQOmBG1Dyd9bH3At+rjgZUZqLwFV2C4ZdU09nFWhG5ThGF1ldBmZtndNLP1GujwJAU115JqrGrYPG8AR1M0pftWOrkwLKKbCG02JVW1TYUn0bOOFscDviCx7eNNHPXIG00uejJb/9zZxRGU9AGCIaDNaAuBwOh0FI5UvqJtGE7y2OfbDqvJnSk907kUFqvXofrUtOhkjjZ+69NPERR9SdYshX1ehE3toXdGU3UCTEL5zEiq/gh6uzuyTPjb9SKjrkPa+RdzyjpHN/rIqAvGEhTXo9hS11U7deQjydXgb1CvIssv+H6mRbutNw== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=oracle.com; dmarc=pass action=none header.from=oracle.com; dkim=pass header.d=oracle.com; arc=none DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=oracle.onmicrosoft.com; s=selector2-oracle-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=B2aS6BDl/QFPmni7CBmM43BqGZ2pwQ8wQmhHEe2pv/A=; b=HHfUOi1LVrrlIsGFJui/AjFyzv4iRYpN3rtK/jrsVXzu0DBMB6FWme98jA8BYNX3X+AiJ+D2SPaxMzy1Qlq7T51TYX18RK+3vCG9veEmxf27zq279yQ2s4fjUVXY5isQHCXRLlroPaqWvBEDR3FeL2tUKolSyJ56hPs87RubzQ8= Received: from DM4PR10MB8218.namprd10.prod.outlook.com (2603:10b6:8:1cc::16) by SN7PR10MB6383.namprd10.prod.outlook.com (2603:10b6:806:26d::18) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.9031.13; Tue, 12 Aug 2025 15:48:04 +0000 Received: from DM4PR10MB8218.namprd10.prod.outlook.com ([fe80::2650:55cf:2816:5f2]) by DM4PR10MB8218.namprd10.prod.outlook.com ([fe80::2650:55cf:2816:5f2%5]) with mapi id 15.20.9031.012; Tue, 12 Aug 2025 15:48:04 +0000 From: Lorenzo Stoakes To: Andrew Morton Cc: Alexander Gordeev , Gerald Schaefer , Heiko Carstens , Vasily Gorbik , Christian Borntraeger , Sven Schnelle , "David S . Miller" , Andreas Larsson , Dave Hansen , Andy Lutomirski , Peter Zijlstra , Thomas Gleixner , Ingo Molnar , Borislav Petkov , "H . Peter Anvin" , Alexander Viro , Christian Brauner , Jan Kara , Kees Cook , David Hildenbrand , Zi Yan , Baolin Wang , "Liam R . Howlett" , Nico Pache , Ryan Roberts , Dev Jain , Barry Song , Xu Xin , Chengming Zhou , Vlastimil Babka , Mike Rapoport , Suren Baghdasaryan , Michal Hocko , David Rientjes , Shakeel Butt , Arnaldo Carvalho de Melo , Namhyung Kim , Mark Rutland , Alexander Shishkin , Jiri Olsa , Ian Rogers , Adrian Hunter , Kan Liang , Masami Hiramatsu , Oleg Nesterov , Juri Lelli , Vincent Guittot , Dietmar Eggemann , Steven Rostedt , Ben Segall , Mel Gorman , Valentin Schneider , Jason Gunthorpe , John Hubbard , Peter Xu , Jann Horn , Pedro Falcato , Matthew Wilcox , Mateusz Guzik , linux-s390@vger.kernel.org, linux-kernel@vger.kernel.org, sparclinux@vger.kernel.org, linux-fsdevel@vger.kernel.org, linux-mm@kvack.org, linux-trace-kernel@vger.kernel.org, linux-perf-users@vger.kernel.org Subject: [PATCH 10/10] mm: replace mm->flags with bitmap entirely and set to 64 bits Date: Tue, 12 Aug 2025 16:44:19 +0100 Message-ID: X-Mailer: git-send-email 2.50.1 In-Reply-To: References: Content-Transfer-Encoding: quoted-printable X-ClientProxiedBy: GV2PEPF0000756B.SWEP280.PROD.OUTLOOK.COM (2603:10a6:158:401::3e9) To DM4PR10MB8218.namprd10.prod.outlook.com (2603:10b6:8:1cc::16) Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 X-MS-PublicTrafficType: Email X-MS-TrafficTypeDiagnostic: DM4PR10MB8218:EE_|SN7PR10MB6383:EE_ X-MS-Office365-Filtering-Correlation-Id: 13c574ed-4ce1-4b37-4f4b-08ddd9b79ff5 X-MS-Exchange-SenderADCheck: 1 X-MS-Exchange-AntiSpam-Relay: 0 X-Microsoft-Antispam: BCL:0;ARA:13230040|376014|366016|7416014|1800799024; X-Microsoft-Antispam-Message-Info: =?us-ascii?Q?FE3fa0s9JdaUEkx4jovNwPs6th6kTBEdweMn/hz4BBilA3k5Bio4UUMjOIr9?= =?us-ascii?Q?aoxPbyj1KwuPQlyOUFu5tAfp3DA5Peg5XH3Eqd+I/BTSZ/FgV0DXJ8xD8JM+?= =?us-ascii?Q?AbDiTV3RksN0vWskvXcN3LS56d2YFFk8U4hgZ/wID+DhdsBNWDBClyMQa1x7?= =?us-ascii?Q?1b01S/03YysbA0C58LIAKyvPVEJFJQaU+E0lZTcr3O6AoXmkEcwbqR8Czju5?= =?us-ascii?Q?2LGxpdFERycYFocniDRJriishZUjlhHO/nv9nP4bsgLRfplwdpn7Z5e35UQp?= =?us-ascii?Q?wF3bdA5U38qUEo01VYpHmU9pt4eEvdsR0yoiMl2cb8ujK9pfFuF2h3OeGT2o?= =?us-ascii?Q?5FN1xflGvQ40nUodAZufFm84t++CyAt36zdzwZcl3TW0a2AxjvVLudKEbjZ0?= =?us-ascii?Q?TpLKFbi0e2U39YFP70ffzzqbi7PDRPwd3NfNgyuSchsakEbKvWCAQumfp6+u?= =?us-ascii?Q?Wum2ntrL3yVO5npE1Zprybi5XbrkXKkQDe6PplbtXrBs+zJ94bOFyZ7RjJdE?= =?us-ascii?Q?5l0qvMQLkl7stOyGffjz/XpxwiGoAXFlXMH5VRloSWq3GLsh6bI96FhM8O1X?= =?us-ascii?Q?wA6yeYTYuwjMHLiNBKMCdshYFiPrwAE2iBggSZF25mm73PrhS0Zh3S8qcW//?= =?us-ascii?Q?Np4/5idesYSFkb1zZR+vT+kwsoxPMcTTlDdqppMPG0QSfOQNWy35FcG6hSVI?= =?us-ascii?Q?t9sYMFSzZef/zo6M384Zycfaxab5ahsS+yQYlYZhnhrn626o+eMHeDxGEqOr?= =?us-ascii?Q?ABH/7TCLwj7yZn1K7cZLpJPPoJSPDBdgEBkpho7TbLuyq8AEolaVMVWrUH9Q?= =?us-ascii?Q?AtBZZpBBbmvFEO3MRe6PtT5krMjYfpKnAuBBwcjFGQo82ENu8TW0zE2cgRuy?= =?us-ascii?Q?pddLqMidnaRHEvIsb82sANQVixQxj3yFbvCYullAucAXzmKTQOLWx+lF9LWO?= =?us-ascii?Q?TD/o6W5KiDUcJVkDtenmM/logUsMyM/lcvveeTWAiG/N4vmr1q3HgSOMsP4O?= =?us-ascii?Q?39XgGNDMA3B12jUsDffujADLwH4RnIrwRCW+S6EeyzDUhPWAgmv7f8mU/dYK?= =?us-ascii?Q?PJcBTyknjmndMjILG3JRWl7+hEikYVmoTQUviKXn3EIbtDNBOsaW7/e9g74u?= =?us-ascii?Q?5T8WtDOs43k4epSryb60/4ldRjjtzYQE9tcFnPeGLBlc+49XumcvCJWzjb9R?= =?us-ascii?Q?rWFgAobIpgxWPn8HF5M+s4noT+J+gu4jLPJ2MQ/JtFVYd47BHqGKXtrBaexW?= =?us-ascii?Q?+b8Ngfo4aeOaTZflTyfO3OrmznoosVNtqWqLe6HZCwmTnvvbj/97v1E6ZhiU?= =?us-ascii?Q?wbNCPNtgIATR2cmk8cnLzN7ihiEoodnscCMGSmRjRVCesb5XHKbJXGGmmZTn?= =?us-ascii?Q?t1c5gpfZXmrnDWUZnj5MSU0fKa0hIDolfEqku+BfWiY8g2fn/LEIixj2Yn6U?= =?us-ascii?Q?d5kIfwQOIU4=3D?= X-Forefront-Antispam-Report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:DM4PR10MB8218.namprd10.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230040)(376014)(366016)(7416014)(1800799024);DIR:OUT;SFP:1101; X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1 X-MS-Exchange-AntiSpam-MessageData-0: =?us-ascii?Q?ffR8MNhC+UHq/zcM5ukbznhozjAO3Y8C9nem5bA10xes3qJgnX7wVaHrgBIz?= =?us-ascii?Q?t/hA0apiE35PiDa9ENVXZHLpD7PqItF37FaznRkVKmV0qeuKOulqyOAp8xez?= =?us-ascii?Q?faUqJ465mS7AlL/RC2Os5TNdGFxY/gIahXQribWULb6533bGjEPudzge2k0B?= =?us-ascii?Q?VmjNB6XgAra6yyOKQfrWC4fw41366YGAGjolp3Wx2O5bRF01F50/eVE44DO+?= =?us-ascii?Q?21yBR3NOlg2KUmAuQDgnsxxlaASTAKDMdckUrSdnpMMAUItUnVpGx7w8/zhh?= =?us-ascii?Q?1roFBqSwMkIBVP2rjgKWGG5kFBDWvi5FLRCnWYe8daZbTl97Y8lLyy8IK1R7?= =?us-ascii?Q?T22+UjqKXa2B/FmvgNI0WySCP0+aPL0PNVQlSCqialKvcVtRG86fVnMKHMOQ?= =?us-ascii?Q?BVMcdmo9ntngHLEbtJ2JXqOmvZCUFdHgnuM/vBxLIdSBVYj0N8ni4tDAUG4X?= =?us-ascii?Q?8dl48rx8p2gyGVp3U2zOIIKCn7j+OJSRnjw4tjtRV9DJ3bt58cvM+7h3MuxS?= =?us-ascii?Q?SQe+gaa30Iv7euHVoRAhNGiu2V3qb9B9i39PVBmUPOyq2/jIw+oaYVVWpQaL?= =?us-ascii?Q?4nWfmF/6glOgJBPugkd/A0dXW3nEQiE/yNkIrXXr6ItIh47IZpeCARGyT/CT?= =?us-ascii?Q?+dhx2V+y1CzU7/v9M68VdpvmliZf1uMlpZpmwnCXwkJ2wPoCNzQwwhANfvNV?= =?us-ascii?Q?zku2oPqEuVqnurBDjaZzpmLyFuRZHvADhSnn1Oi6sXyNmrxfQCjvfmWqqgdE?= =?us-ascii?Q?TKUyv05E0iab0LV1gLydjLHyco4IkqiYnBfYx5iA7wvgrb8OURVO/PunoON1?= =?us-ascii?Q?azYCYAqKcYgzO7uiWUX+9Hnu82jgcEtl5DXtgiQt2xk6KF35ZAAEZdmMwrmK?= =?us-ascii?Q?sCDMNQ9+ORpzQ2RTHUikWIT8J6PueaKq9aCMsLLYzg9W0jeyXfTa8SJvyIwH?= =?us-ascii?Q?S/S+4fDUt9DLlu6MJNjEgm/P7yEZfAL1PgWr2tJ/Sz6FCcZgmw5qJDaXwDBw?= =?us-ascii?Q?PHZg2+d3Tn/j/IN2atwIorG8LRRkr1lqEObQuPjWO/j9CjRdR0KMgShwNfav?= =?us-ascii?Q?IzTW/Y7lfiChn1FnEwJvowDN1pv/8YSe06z4rFq2aj1BD/EenNrqcyrMMU43?= =?us-ascii?Q?PIb5HcCsp9kR2U9nHqza1IyL7t2Je0cWP8Njp780odC0OLiGKnK5jmGZslAg?= =?us-ascii?Q?cEJSWWPS+oLgc1MLfJEQCgSHJ8GOg9mFRONPbjFcEPYEKtsIi5OjOd516zGq?= =?us-ascii?Q?FPYCPblhuNupTXubIjIjpKZ6MdkSziWznQp3gFTcoXyTlBBHUvteB3sJ7WWF?= =?us-ascii?Q?6m05UrlDEcTH90vsuNdnQBApeFt0trfNgnmdNF4bsYsy0aUDqB986b73L4l/?= =?us-ascii?Q?l8uCcT0Vz6I6zk4bLgPjr2RWjG8ryxlz2cfWvDn//VVfco4DSS5Mt89/8eaV?= =?us-ascii?Q?ZvyFfa22Kvq2kJ1E/iMra0VPf9Pztk6UGGpQxSWVWVCzvWq6RbWCwQ+KjvBz?= =?us-ascii?Q?lB8sGOZfhhyTr8vr9ow/RvuEkpaiyEsB6FNK6yV/CISChCaAkZApB8O3/KMn?= =?us-ascii?Q?KTnBlRJzoFph+G7snDTuwq8BmGXygKubYeXKnQhBd0H5exCcGCz6Hjf6z0zy?= =?us-ascii?Q?uA=3D=3D?= X-MS-Exchange-AntiSpam-ExternalHop-MessageData-ChunkCount: 1 X-MS-Exchange-AntiSpam-ExternalHop-MessageData-0: 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 X-OriginatorOrg: oracle.com X-MS-Exchange-CrossTenant-Network-Message-Id: 13c574ed-4ce1-4b37-4f4b-08ddd9b79ff5 X-MS-Exchange-CrossTenant-AuthSource: DM4PR10MB8218.namprd10.prod.outlook.com X-MS-Exchange-CrossTenant-AuthAs: Internal X-MS-Exchange-CrossTenant-OriginalArrivalTime: 12 Aug 2025 15:48:04.4131 (UTC) X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted X-MS-Exchange-CrossTenant-Id: 4e2c6054-71cb-48f1-bd6c-3a9705aca71b X-MS-Exchange-CrossTenant-MailboxType: HOSTED X-MS-Exchange-CrossTenant-UserPrincipalName: Fax5G7ZjwF52ACdH4S0E7DShD/dtE0LQEQkrZKonhUN40lbV5cXzJINrr4Jwr3NZxIX6CkKP7G0iBJsnAzg95WkgErLKBEzfXLC08TSbh5M= X-MS-Exchange-Transport-CrossTenantHeadersStamped: SN7PR10MB6383 X-Proofpoint-Virus-Version: vendor=baseguard engine=ICAP:2.0.293,Aquarius:18.0.1099,Hydra:6.1.9,FMLib:17.12.80.40 definitions=2025-08-12_07,2025-08-11_01,2025-03-28_01 X-Proofpoint-Spam-Details: rule=notspam policy=default score=0 malwarescore=0 phishscore=0 adultscore=0 mlxscore=0 bulkscore=0 spamscore=0 mlxlogscore=999 suspectscore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.12.0-2507300000 definitions=main-2508120152 X-Authority-Analysis: v=2.4 cv=B/S50PtM c=1 sm=1 tr=0 ts=689b6238 cx=c_pps a=OOZaFjgC48PWsiFpTAqLcw==:117 a=OOZaFjgC48PWsiFpTAqLcw==:17 a=6eWqkTHjU83fiwn7nKZWdM+Sl24=:19 a=z/mQ4Ysz8XfWz/Q5cLBRGdckG28=:19 a=lCpzRmAYbLLaTzLvsPZ7Mbvzbb8=:19 a=wKuvFiaSGQ0qltdbU6+NXLB8nM8=:19 a=Ol13hO9ccFRV9qXi2t6ftBPywas=:19 a=xqWC_Br6kY4A:10 a=2OwXVqhp2XgA:10 a=GoEa3M9JfhUA:10 a=yPCof4ZbAAAA:8 a=HEFxLipkG5v1IfcSOxQA:9 X-Proofpoint-ORIG-GUID: SSDk9o-HNJM6qbTY5FCS92usSTuMdn9d X-Proofpoint-Spam-Details-Enc: AW1haW4tMjUwODEyMDE1MiBTYWx0ZWRfXwBIM6TOeMvdc Zqc8dMzHtbbQPA46OXNOhSjU6B9CZAO8qbwLFZ9aJPZbR7On21/rhC21FqWCaAOTCj1xkmAMPvR IfsojzxQ0v2xzHnug5stAysbEY/kdvbfmauYqw3EfLDnK9vuwjlbYgQxkuJ3Oi5MCatSZPku89r 6dUruWvfEniw+ercT17Q/sSOm8mAtyh7dwj5Q/T2EMZkAKrl7fxUcg0KHMMZj97DbovO9zUz4pL Q7eBriwGMoNPMRpwaSaERKXN1NP0YgzxCDKzZP0/XrmavCeI5gwGo0AP9YCyILO147Pw2fTvPy4 AV90qgWfjyWyS2LTbnjL0hRuNxeCuL3g/NH2RuEZtltky7EVo7VG6yhF1zop/h+mc2IK21ur8oK SrEv4d4ki4/y98J2z0t8yNnkHCSKHL8o/m2CWq1JF6kVKzemZdjtYsKMAsPBcqjS10fwdYmM X-Proofpoint-GUID: SSDk9o-HNJM6qbTY5FCS92usSTuMdn9d Content-Type: text/plain; charset="utf-8" Now we have updated all users of mm->flags to use the bitmap accessors, repalce it with the bitmap version entirely. We are then able to move to having 64 bits of mm->flags on both 32-bit and 64-bit architectures. We also update the VMA userland tests to ensure that everything remains functional there. No functional changes intended, other than there now being 64 bits of available mm_struct flags. Signed-off-by: Lorenzo Stoakes Acked-by: David Hildenbrand Reviewed-by: Liam R. Howlett Reviewed-by: Mike Rapoport (Microsoft) --- include/linux/mm.h | 12 ++++++------ include/linux/mm_types.h | 14 +++++--------- include/linux/sched/coredump.h | 2 +- tools/testing/vma/vma_internal.h | 19 +++++++++++++++++-- 4 files changed, 29 insertions(+), 18 deletions(-) diff --git a/include/linux/mm.h b/include/linux/mm.h index 34311ebe62cc..b61e2d4858cf 100644 --- a/include/linux/mm.h +++ b/include/linux/mm.h @@ -724,32 +724,32 @@ static inline void assert_fault_locked(struct vm_faul= t *vmf) =20 static inline bool mm_flags_test(int flag, const struct mm_struct *mm) { - return test_bit(flag, ACCESS_PRIVATE(&mm->_flags, __mm_flags)); + return test_bit(flag, ACCESS_PRIVATE(&mm->flags, __mm_flags)); } =20 static inline bool mm_flags_test_and_set(int flag, struct mm_struct *mm) { - return test_and_set_bit(flag, ACCESS_PRIVATE(&mm->_flags, __mm_flags)); + return test_and_set_bit(flag, ACCESS_PRIVATE(&mm->flags, __mm_flags)); } =20 static inline bool mm_flags_test_and_clear(int flag, struct mm_struct *mm) { - return test_and_clear_bit(flag, ACCESS_PRIVATE(&mm->_flags, __mm_flags)); + return test_and_clear_bit(flag, ACCESS_PRIVATE(&mm->flags, __mm_flags)); } =20 static inline void mm_flags_set(int flag, struct mm_struct *mm) { - set_bit(flag, ACCESS_PRIVATE(&mm->_flags, __mm_flags)); + set_bit(flag, ACCESS_PRIVATE(&mm->flags, __mm_flags)); } =20 static inline void mm_flags_clear(int flag, struct mm_struct *mm) { - clear_bit(flag, ACCESS_PRIVATE(&mm->_flags, __mm_flags)); + clear_bit(flag, ACCESS_PRIVATE(&mm->flags, __mm_flags)); } =20 static inline void mm_flags_clear_all(struct mm_struct *mm) { - bitmap_zero(ACCESS_PRIVATE(&mm->_flags, __mm_flags), NUM_MM_FLAG_BITS); + bitmap_zero(ACCESS_PRIVATE(&mm->flags, __mm_flags), NUM_MM_FLAG_BITS); } =20 extern const struct vm_operations_struct vma_dummy_vm_ops; diff --git a/include/linux/mm_types.h b/include/linux/mm_types.h index 25577ab39094..47d2e4598acd 100644 --- a/include/linux/mm_types.h +++ b/include/linux/mm_types.h @@ -932,7 +932,7 @@ struct mm_cid { * Opaque type representing current mm_struct flag state. Must be accessed= via * mm_flags_xxx() helper functions. */ -#define NUM_MM_FLAG_BITS BITS_PER_LONG +#define NUM_MM_FLAG_BITS (64) typedef struct { __private DECLARE_BITMAP(__mm_flags, NUM_MM_FLAG_BITS); } mm_flags_t; @@ -1119,11 +1119,7 @@ struct mm_struct { /* Architecture-specific MM context */ mm_context_t context; =20 - /* Temporary union while we convert users to mm_flags_t. */ - union { - unsigned long flags; /* Must use atomic bitops to access */ - mm_flags_t _flags; /* Must use mm_flags_* helpers to access */ - }; + mm_flags_t flags; /* Must use mm_flags_* hlpers to access */ =20 #ifdef CONFIG_AIO spinlock_t ioctx_lock; @@ -1236,7 +1232,7 @@ struct mm_struct { /* Read the first system word of mm flags, non-atomically. */ static inline unsigned long __mm_flags_get_word(struct mm_struct *mm) { - unsigned long *bitmap =3D ACCESS_PRIVATE(&mm->_flags, __mm_flags); + unsigned long *bitmap =3D ACCESS_PRIVATE(&mm->flags, __mm_flags); =20 return bitmap_read(bitmap, 0, BITS_PER_LONG); } @@ -1245,7 +1241,7 @@ static inline unsigned long __mm_flags_get_word(struc= t mm_struct *mm) static inline void __mm_flags_set_word(struct mm_struct *mm, unsigned long value) { - unsigned long *bitmap =3D ACCESS_PRIVATE(&mm->_flags, __mm_flags); + unsigned long *bitmap =3D ACCESS_PRIVATE(&mm->flags, __mm_flags); =20 bitmap_copy(bitmap, &value, BITS_PER_LONG); } @@ -1253,7 +1249,7 @@ static inline void __mm_flags_set_word(struct mm_stru= ct *mm, /* Obtain a read-only view of the bitmap. */ static inline const unsigned long *__mm_flags_get_bitmap(const struct mm_s= truct *mm) { - return (const unsigned long *)ACCESS_PRIVATE(&mm->_flags, __mm_flags); + return (const unsigned long *)ACCESS_PRIVATE(&mm->flags, __mm_flags); } =20 #define MM_MT_FLAGS (MT_FLAGS_ALLOC_RANGE | MT_FLAGS_LOCK_EXTERN | \ diff --git a/include/linux/sched/coredump.h b/include/linux/sched/coredump.h index 19ecfcceb27a..079ae5a97480 100644 --- a/include/linux/sched/coredump.h +++ b/include/linux/sched/coredump.h @@ -20,7 +20,7 @@ static inline unsigned long __mm_flags_get_dumpable(struc= t mm_struct *mm) =20 static inline void __mm_flags_set_mask_dumpable(struct mm_struct *mm, int = value) { - unsigned long *bitmap =3D ACCESS_PRIVATE(&mm->_flags, __mm_flags); + unsigned long *bitmap =3D ACCESS_PRIVATE(&mm->flags, __mm_flags); =20 set_mask_bits(bitmap, MMF_DUMPABLE_MASK, value); } diff --git a/tools/testing/vma/vma_internal.h b/tools/testing/vma/vma_inter= nal.h index cb1c2a8afe26..f13354bf0a1e 100644 --- a/tools/testing/vma/vma_internal.h +++ b/tools/testing/vma/vma_internal.h @@ -249,6 +249,14 @@ struct mutex {}; #define DEFINE_MUTEX(mutexname) \ struct mutex mutexname =3D {} =20 +#define DECLARE_BITMAP(name, bits) \ + unsigned long name[BITS_TO_LONGS(bits)] + +#define NUM_MM_FLAG_BITS (64) +typedef struct { + __private DECLARE_BITMAP(__mm_flags, NUM_MM_FLAG_BITS); +} mm_flags_t; + struct mm_struct { struct maple_tree mm_mt; int map_count; /* number of VMAs */ @@ -260,7 +268,7 @@ struct mm_struct { =20 unsigned long def_flags; =20 - unsigned long flags; /* Must use atomic bitops to access */ + mm_flags_t flags; /* Must use mm_flags_* helpers to access */ }; =20 struct vm_area_struct; @@ -1333,6 +1341,13 @@ static inline void userfaultfd_unmap_complete(struct= mm_struct *mm, { } =20 +# define ACCESS_PRIVATE(p, member) ((p)->member) + +static inline bool mm_flags_test(int flag, const struct mm_struct *mm) +{ + return test_bit(flag, ACCESS_PRIVATE(&mm->flags, __mm_flags)); +} + /* * Denies creating a writable executable mapping or gaining executable per= missions. * @@ -1363,7 +1378,7 @@ static inline void userfaultfd_unmap_complete(struct = mm_struct *mm, static inline bool map_deny_write_exec(unsigned long old, unsigned long ne= w) { /* If MDWE is disabled, we have nothing to deny. */ - if (!test_bit(MMF_HAS_MDWE, ¤t->mm->flags)) + if (mm_flags_test(MMF_HAS_MDWE, current->mm)) return false; =20 /* If the new VMA is not executable, we have nothing to deny. */ --=20 2.50.1