From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from kanga.kvack.org (kanga.kvack.org [205.233.56.17]) by smtp.lore.kernel.org (Postfix) with ESMTP id 8F655C83F1B for ; Wed, 16 Jul 2025 17:38:50 +0000 (UTC) Received: by kanga.kvack.org (Postfix) id 268228D0007; Wed, 16 Jul 2025 13:38:44 -0400 (EDT) Received: by kanga.kvack.org (Postfix, from userid 40) id 1559F8D0001; Wed, 16 Jul 2025 13:38:44 -0400 (EDT) X-Delivered-To: int-list-linux-mm@kvack.org Received: by kanga.kvack.org (Postfix, from userid 63042) id EE98B8D0007; Wed, 16 Jul 2025 13:38:43 -0400 (EDT) X-Delivered-To: linux-mm@kvack.org Received: from relay.hostedemail.com (smtprelay0016.hostedemail.com [216.40.44.16]) by kanga.kvack.org (Postfix) with ESMTP id CDA528D0001 for ; Wed, 16 Jul 2025 13:38:43 -0400 (EDT) Received: from smtpin16.hostedemail.com (a10.router.float.18 [10.200.18.1]) by unirelay06.hostedemail.com (Postfix) with ESMTP id 94D8410FCCE for ; Wed, 16 Jul 2025 17:38:43 +0000 (UTC) X-FDA: 83670837726.16.32FF22A Received: from mx0b-00069f02.pphosted.com (mx0b-00069f02.pphosted.com [205.220.177.32]) by imf02.hostedemail.com (Postfix) with ESMTP id 3437380005 for ; Wed, 16 Jul 2025 17:38:40 +0000 (UTC) Authentication-Results: imf02.hostedemail.com; dkim=pass header.d=oracle.com header.s=corp-2025-04-25 header.b=FioIvDL7; dkim=pass header.d=oracle.onmicrosoft.com header.s=selector2-oracle-onmicrosoft-com header.b=vlXrU617; dmarc=pass (policy=reject) header.from=oracle.com; spf=pass (imf02.hostedemail.com: domain of lorenzo.stoakes@oracle.com designates 205.220.177.32 as permitted sender) smtp.mailfrom=lorenzo.stoakes@oracle.com; arc=pass ("microsoft.com:s=arcselector10001:i=1") ARC-Seal: i=2; s=arc-20220608; d=hostedemail.com; t=1752687520; a=rsa-sha256; cv=pass; b=raw5EDERMxJ6tAX8woJUPfZ4hN2Tdoa3C+QrL4nC4T51e9qTjb9Ng1o6c6+k+5ZH6ioAeZ hR3G1ASCGXZeUOsqAzcOcheI2y4ZRIqyBYfs49T89P+X88Q03wdcjNzzI8gY6PPdllVvbw 2ix4ssrheB6bAmt+DA5DRwlzP6ukpjo= ARC-Authentication-Results: i=2; imf02.hostedemail.com; dkim=pass header.d=oracle.com header.s=corp-2025-04-25 header.b=FioIvDL7; dkim=pass header.d=oracle.onmicrosoft.com header.s=selector2-oracle-onmicrosoft-com header.b=vlXrU617; dmarc=pass (policy=reject) header.from=oracle.com; spf=pass (imf02.hostedemail.com: domain of lorenzo.stoakes@oracle.com designates 205.220.177.32 as permitted sender) smtp.mailfrom=lorenzo.stoakes@oracle.com; arc=pass ("microsoft.com:s=arcselector10001:i=1") ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=hostedemail.com; s=arc-20220608; t=1752687520; h=from:from:sender:reply-to:subject:subject:date:date: message-id:message-id:to:to:cc:cc:mime-version:mime-version: content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references:dkim-signature; bh=nRXAw/ySxM0kZIdLqpkIstosYWCmyi9ku3bEi5jfmoM=; b=6kD7ZyXdhFioqPWfjw+Fg1yJxqsQ/Na6jewi2B5EUH6LGuJJCf7+Jb66y/8bgR3pqOUVkR bAqEt+JU8gJI/YblU/hroCnj0UCAxC1imZFglCo7jc0nLDrvdsUDJWV3shOgDcc2RmNEUm dBQfk96N6rMgF1ixeZh2XHYzSPapS2E= Received: from pps.filterd (m0246632.ppops.net [127.0.0.1]) by mx0b-00069f02.pphosted.com (8.18.1.2/8.18.1.2) with ESMTP id 56GFqQSI025000; Wed, 16 Jul 2025 17:38:38 GMT DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=oracle.com; h=cc :content-transfer-encoding:content-type:date:from:in-reply-to :message-id:mime-version:references:subject:to; s= corp-2025-04-25; bh=nRXAw/ySxM0kZIdLqpkIstosYWCmyi9ku3bEi5jfmoM=; b= FioIvDL7czuJY99oTFBDj6TH48eFh02vk5hgNsPjWQgYwoAlmZF2kHYVZJxj86eJ CW6SfXoE45vLAuXlsJVY5ZAFDKTGK9pHgEo39T+XhEFDM45UUsaOrJTfTKaH4gkn SStRBFk2p/1dwy6S7Z0J0G58Sh6goeWKfv8zDBy5OwTrxOz7QXR9f69Pd4+Cp0kw UmdGUgNfX5j6XnkofLPSYllAjj5hmeFqww8Bpu7UrmagBJkw1e8UQBoXvaPl7zIi SpDXE8YDVKKHoID50NV5JrwICC3U7+wD78wdvMUiOs6vBqgG7m+X9WkYwsI2zgts F+i8ZEl2ax7t9/cvguIwlA== Received: from phxpaimrmta02.imrmtpd1.prodappphxaev1.oraclevcn.com (phxpaimrmta02.appoci.oracle.com [147.154.114.232]) by mx0b-00069f02.pphosted.com (PPS) with ESMTPS id 47uhx81nsr-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK); Wed, 16 Jul 2025 17:38:37 +0000 (GMT) Received: from pps.filterd (phxpaimrmta02.imrmtpd1.prodappphxaev1.oraclevcn.com [127.0.0.1]) by phxpaimrmta02.imrmtpd1.prodappphxaev1.oraclevcn.com (8.18.1.2/8.18.1.2) with ESMTP id 56GGjssd029769; Wed, 16 Jul 2025 17:38:36 GMT Received: from nam04-dm6-obe.outbound.protection.outlook.com (mail-dm6nam04on2054.outbound.protection.outlook.com [40.107.102.54]) by phxpaimrmta02.imrmtpd1.prodappphxaev1.oraclevcn.com (PPS) with ESMTPS id 47ue5bcnq0-4 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK); Wed, 16 Jul 2025 17:38:36 +0000 ARC-Seal: i=1; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=none; b=g4N7+W4Nely9bt3udLR5SDlXz81/P1aUFnMOHMpXb3wjcsziYRsy4Br5/0gfjVtz4KZ6/4JKj2Nch0vXupb05uHvJebsagCyvvOl7hrf7fc96qRN5eLF+KNHib7fvQ3capYX4JRDlE9ZUHf9nctAhrwLimP133SpqWFJHhA3iCEiE4toIHruJh60FIQXldxGhigmd5H3eGECOOxt5I9R/YNamUh7UMBT0MqB9AXbId1/+4ahurjf2Hm0hwB+oJt5r1AvDHIPK4CLURb8YhTRtYi5ZPQC9QABtqVEacyCKjPuncw2EA6sWDifmjPGiOSXiyLNPPTVXxC8dQU4bsyjDg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector10001; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=nRXAw/ySxM0kZIdLqpkIstosYWCmyi9ku3bEi5jfmoM=; b=plo6uE9pku5w4H1sgNN0Qht8WqjFJSRdjOIAuwzMEyB0H9T0JiTOGfVL5YqygkxUrITqXS/63h1LNFt7HVUSHKQ9HqN+a0vyEpHOXGQoEb6J9Onmo8DhqvFXnoHQhLlS1WDGkdilI6lrL1gLf6T3smbhQ0Je1GIdEWVxV2bpH1paCmtAYzFWW0NVvW0hleyWhj3mZc3WqpwH50fe/+c6flqdb31LgyDwDLf8oErRX1pOF4OZwj1J9iTX34tWE5i/oW92HfuA0qLWeaVpnirG6AeN0JgOIflntDjq0hLFBZcsWhSjVcHUHWuBj/Fsqcm32vm5JXA+wgMzeyf37EMLxg== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=oracle.com; dmarc=pass action=none header.from=oracle.com; dkim=pass header.d=oracle.com; arc=none DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=oracle.onmicrosoft.com; s=selector2-oracle-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=nRXAw/ySxM0kZIdLqpkIstosYWCmyi9ku3bEi5jfmoM=; b=vlXrU6179Fh30xTY2+J652DIscC2K8S3HIXw1UCaowj5DbAW28grvgv46ZflD6hNSQJuhb/8ilhh3J0fbPB7JP2WOO+CS091Igur4ti7w5j/YKQUMMejVJAfBbTQO7kyQwvSblUY5rFFDkvvgrrQjTauKoFVDz8z3dbApL28OqA= Received: from BL4PR10MB8229.namprd10.prod.outlook.com (2603:10b6:208:4e6::14) by SA1PR10MB7683.namprd10.prod.outlook.com (2603:10b6:806:386::12) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.8880.16; Wed, 16 Jul 2025 17:38:34 +0000 Received: from BL4PR10MB8229.namprd10.prod.outlook.com ([fe80::552b:16d2:af:c582]) by BL4PR10MB8229.namprd10.prod.outlook.com ([fe80::552b:16d2:af:c582%3]) with mapi id 15.20.8901.036; Wed, 16 Jul 2025 17:38:34 +0000 From: Lorenzo Stoakes To: Andrew Morton Cc: "Liam R . Howlett" , David Hildenbrand , Vlastimil Babka , Jann Horn , Pedro Falcato , linux-mm@kvack.org, linux-kernel@vger.kernel.org, Jeff Xu Subject: [PATCH v3 3/5] mm/mseal: small cleanups Date: Wed, 16 Jul 2025 18:38:04 +0100 Message-ID: X-Mailer: git-send-email 2.50.1 In-Reply-To: References: Content-Transfer-Encoding: 8bit Content-Type: text/plain X-ClientProxiedBy: LO4P123CA0446.GBRP123.PROD.OUTLOOK.COM (2603:10a6:600:1a9::19) To DM4PR10MB8218.namprd10.prod.outlook.com (2603:10b6:8:1cc::16) MIME-Version: 1.0 X-MS-PublicTrafficType: Email X-MS-TrafficTypeDiagnostic: BL4PR10MB8229:EE_|SA1PR10MB7683:EE_ X-MS-Office365-Filtering-Correlation-Id: 9dcabc9f-aee3-440b-ef4d-08ddc48f919b X-MS-Exchange-SenderADCheck: 1 X-MS-Exchange-AntiSpam-Relay: 0 X-Microsoft-Antispam: BCL:0;ARA:13230040|1800799024|366016|376014; X-Microsoft-Antispam-Message-Info: =?us-ascii?Q?/p2DlczqscLR8wmrcU1TuuC3cBWOazaWdf4IhSiIXPgGCDA2mExEzj04kPIi?= =?us-ascii?Q?KwcgS6ABd7o51B5hFkrvY0pGCrwlbeTg2agDfGVmKgd/gIPgc/E9y4upgBXV?= =?us-ascii?Q?RnYfdq0YrrDAgxLETK/qgvHYkd3wTQxzw0TlT8+qQ4g6Q+I7BlrJDCODWHte?= =?us-ascii?Q?nkN7gcYvZJR+qbjmpaGgYjJOjv2LBM1DfKggRtdzfLO4wzPdVZhMrqeV2YJC?= =?us-ascii?Q?21bvxZ9vOgUZTfWJEROqQ3SRtTHx5sW0sqMzKq12kkdy7baxRhlIXdxE+N3K?= =?us-ascii?Q?eadO8oRcGCI/2BDM7Rkl/IwmfP+lHW+QKguwtI8A+bn/RkwPWGA7sh1w2zY0?= =?us-ascii?Q?jzlqjPUUx6G15UMnKkBNA4x/NjaZoHXZ/Yg8bEJ9P71WqZpnR8CX8NROIIAh?= =?us-ascii?Q?6LgdF8HZ75BHzT7UEJ9WYaL623PJpBmdU8pkCPo2Yk8vJAgVzyAKbcRfMAAM?= =?us-ascii?Q?dvOjB7JygPlQFJyVnHOSO4SYmmNBZr3qOOnm6srK4zwyzjWc3fqe4UnwaKCd?= =?us-ascii?Q?gcMUhLYc1HKXm9micXfKAtU1FdHjG8FwuQ8zyvCfQvIIaAPAt3XnThzt4tM9?= =?us-ascii?Q?oDPZVkZVuX1uj3XvhvAQqUlnxmVjqtR7/Pcq/x+9wzmdFwfTM81ZrHVtgdWh?= =?us-ascii?Q?uFQkqdfCOZpvCbJvW2vB5laYMj4LrYJMi1rM8Y5xdq3kxNivoYax/eI74z8v?= =?us-ascii?Q?ofYpQP1OTbfH6ovU2EzsPOMaRrruk8+uxw44lvVizQw4mxpAhLsilYpqalaE?= =?us-ascii?Q?i6RmPQ2fQHRbKJ0cPJLQhC1IUo3QjQvt5Rk5QCHhTb0Ycmhevr+RSmXZtN71?= =?us-ascii?Q?FNkp/LtcJUoNdY53XeYnvwuLxnrB5jYHWW7fSu15dIdZpiMMfoBsnEXs6tX6?= =?us-ascii?Q?FgXIOMRHY8BiA9/UELfYH5lh3dPRn0X3tQAYZ5hGWAjCyMPSjfz0e0RySg0s?= =?us-ascii?Q?jd+QLAS+bLTQTSwF/6TGax+nYvA9Ar7WS0gQo/c08DmFQbxg/IgVpdJ+PdwD?= =?us-ascii?Q?69Kzxq4rccHod738z2bkTC+/f4hFInYQtLZPKePk6cQbjf1NhFdJbwXZEfHY?= =?us-ascii?Q?+T9VgttGEEYQMbZQ2Rg2CNppYdQQmxXgJVR8TOkUOsLBLxkg8UGDqxj0OZuy?= =?us-ascii?Q?XuvK8uL7gRCoPbSi/wWhc4hw7rqm899DrFBIB7az9zDxwmf/wBQBV9zIOt4o?= =?us-ascii?Q?VJqy+SbiewnAk9jIUUkUuSiYl34ORSyDmssec5sLcUdQwANHuRc915QN7msH?= =?us-ascii?Q?Ep0H2zjpUTDN7z5wOVloannXYHYAqwsuRpKo2kjYmzjkc5sPcOvGxIhr16Hh?= =?us-ascii?Q?Ec66stNGmvUUYxlszBXmxpsjJU5zT2Vq3vPu4YF2WHE+Q5H1toW51C4uDzqp?= =?us-ascii?Q?LR0UkhIploK3nTPnaYrmljfKLOPvTnzrVn1wpdx2Zwh2CpAq8DXx3CEA0NKh?= =?us-ascii?Q?Pd3gcV5H4Qc=3D?= X-Forefront-Antispam-Report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:BL4PR10MB8229.namprd10.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230040)(1800799024)(366016)(376014);DIR:OUT;SFP:1101; X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1 X-MS-Exchange-AntiSpam-MessageData-0: =?us-ascii?Q?w1YjCwsn1AFrvCyb4Ud2qKaCJYQFCwV/n1bze9A5Azx4NSQ72BX0cjCQZjRP?= =?us-ascii?Q?nydU4d+yWsnWzNmRnMBozR/iW70L61ax9WSWpi2/aZnkIiBlpLAopYaraggp?= =?us-ascii?Q?tx0UvjxKNgIl+Hp/9gBpVW3ghV/2B03k5l1Oek7Wmwyc3YrdP9KpbSutkz8/?= =?us-ascii?Q?0JmjD8XLLAHeiQAydeYYKwjB7B7BS1d2Yz3QRqOSsukg+9SjBPd7Ml2IsfdE?= =?us-ascii?Q?O9YCzmb/UsR46yU1zH1VGaM0WM8MmO/GBkprxNbJ4977DvIGHxhHSxMybZEA?= =?us-ascii?Q?wtSviQ9L/NS/gy1o1KaCCO46L4vqNGkIK7yAGQ3qbM91ipltIKlCpxFS3pDd?= =?us-ascii?Q?CAMJtzFizjXLQK1vz0XMSjRPxgwnoXw/gDJU9dHp39YQ54qcMEHn1WtiN3yq?= =?us-ascii?Q?IxxDMFxZezFxdheboNUpNnW9HiHzm05MH9jVSbwkZXA0qEKVebFUoz7PaJ/K?= =?us-ascii?Q?4VdpPSQtDH6AvwvwOtCTIFwU4oVrxQJON7V4E5blDBlhuSY9tVJVAiY0rW7G?= =?us-ascii?Q?aPm07gb9nfRMeW/gKITtHQ7dfkVqTnmqwyf+cNJNtcBrzRNAdaX6JYCVSSLu?= =?us-ascii?Q?SctzjIaYu7E3QNenhFgROKx/uSFeO4gupQVN4awwzeYCqo90nGZW7npv+oWC?= =?us-ascii?Q?LgL3dlf5aB7p41aJwbdItl+0EMf/NVI5AavwR5a6xJVkP8wqkvlrJKZmyA+c?= =?us-ascii?Q?pFGPPXavlZyH8XjYQ6pwkLfm1o58oakK2v1eoEjVYOclY2KZkgtLF3sKqf9s?= =?us-ascii?Q?tRNdHl0WUTGSr5UYizigt5CRYpQRdepWKLV2YZSEG7k8aSp56x+dcFmkiodE?= =?us-ascii?Q?S2ZfLU5SCz4rDx/s01eXJe+OJqUIApixpYQjYIUL5P7N9QGXGIDEYtej5Lze?= =?us-ascii?Q?Zi0JkuTdDYgRmns0giDd3krbZTDMb1uAhteELXeF/y2fXffiGHpZAd6aLsqc?= =?us-ascii?Q?S5hx/q0tFFVVh8s1f1FdLIVRbXd62aorWkKaOHFgmCW8/PiQAtb/OU2dmxw0?= =?us-ascii?Q?F7KEGNvHkqZ5tfTbg8pIh3Od9nIWNnnSh/ca+SnLmannzHiQJ6iJUr5zamUC?= =?us-ascii?Q?4RvYlSnjV2Nl/aKZFNrtupIAm6LO7vgPi0YYG96vzkZXdBITuG1OyGEY4UeF?= =?us-ascii?Q?wAuUO1job0iOehwCZ2vURURPQ9vqaz/26LgxOjTCtv4wnwiSIKNVaFzLoaOH?= =?us-ascii?Q?ndys8u+c+UO2oIXVK40ls9fzAxHvvzXCwy5p+vfb7lTE697N+lUHppmBL81M?= =?us-ascii?Q?aIdcqZzNNnyY1jOUKG30IzEFR0Xp8tSepP0LIyMGCbRn3mRSrUvSgi5W4Ial?= =?us-ascii?Q?nDtMI+cn+l7eDcJRJi4G6al3J6CTjKKB41rnBRBYiP+jo4Vmfg5CSoJKrMOb?= =?us-ascii?Q?ii5pOlYht93BcKihPRFzURt7DYJNW4lDATk21wsms2beUiOXULK3wSDoP8a8?= =?us-ascii?Q?7bpVP3qvuDQNJ6546gnviaL7X3Tpz7k8IM75mES/LVN+R8bUj2RB2ZoOQaBA?= =?us-ascii?Q?TxCop875xeZZeUA+X1nvdWI2pRLUQzbaHqcwP/cSwE8Ajbg9A7osy3v3zT20?= =?us-ascii?Q?bvTCqTfsJsU73MMLdnTHHEG17Vd+zgesMEK8YivU4/NT15RNjEGI+iaNSvV2?= =?us-ascii?Q?Lg=3D=3D?= X-MS-Exchange-AntiSpam-ExternalHop-MessageData-ChunkCount: 1 X-MS-Exchange-AntiSpam-ExternalHop-MessageData-0: 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 X-OriginatorOrg: oracle.com X-MS-Exchange-CrossTenant-Network-Message-Id: 9dcabc9f-aee3-440b-ef4d-08ddc48f919b X-MS-Exchange-CrossTenant-AuthSource: DM4PR10MB8218.namprd10.prod.outlook.com X-MS-Exchange-CrossTenant-AuthAs: Internal X-MS-Exchange-CrossTenant-OriginalArrivalTime: 16 Jul 2025 17:38:34.5901 (UTC) X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted X-MS-Exchange-CrossTenant-Id: 4e2c6054-71cb-48f1-bd6c-3a9705aca71b X-MS-Exchange-CrossTenant-MailboxType: HOSTED X-MS-Exchange-CrossTenant-UserPrincipalName: A8/pzD/+qOPMLziHq6iQ0m2l/DudbzUXYoDQF4OBxwanOm37vxdab6rEwGNhbXcVHUqAh5WbyKKHjr5ubsykmUgMyWzAiF8ZEHQIlQ2J0qY= X-MS-Exchange-Transport-CrossTenantHeadersStamped: SA1PR10MB7683 X-Proofpoint-Virus-Version: vendor=baseguard engine=ICAP:2.0.293,Aquarius:18.0.1099,Hydra:6.1.9,FMLib:17.12.80.40 definitions=2025-07-16_03,2025-07-16_02,2025-03-28_01 X-Proofpoint-Spam-Details: rule=notspam policy=default score=0 phishscore=0 mlxscore=0 spamscore=0 suspectscore=0 adultscore=0 mlxlogscore=999 bulkscore=0 malwarescore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.12.0-2505160000 definitions=main-2507160159 X-Authority-Analysis: v=2.4 cv=auKyCTZV c=1 sm=1 tr=0 ts=6877e39d cx=c_pps a=OOZaFjgC48PWsiFpTAqLcw==:117 a=OOZaFjgC48PWsiFpTAqLcw==:17 a=6eWqkTHjU83fiwn7nKZWdM+Sl24=:19 a=lCpzRmAYbLLaTzLvsPZ7Mbvzbb8=:19 a=wKuvFiaSGQ0qltdbU6+NXLB8nM8=:19 a=Ol13hO9ccFRV9qXi2t6ftBPywas=:19 a=xqWC_Br6kY4A:10 a=Wb1JkmetP80A:10 a=GoEa3M9JfhUA:10 a=yPCof4ZbAAAA:8 a=20KFwNOVAAAA:8 a=m8tF4krmssD7b1Yu0uMA:9 X-Proofpoint-ORIG-GUID: N7kaRjSeQsqZnJaFIKpHwLYLu_HOTj_c X-Proofpoint-Spam-Details-Enc: AW1haW4tMjUwNzE2MDE1OSBTYWx0ZWRfX1F3/qTLAzkrx A+aeleF7eAGLevdAn9nKszEwcbQHfMDrqdo0Nm74HyLAkNLeHenMkitPcLzEcm+M7AL6Gm/tL4X Emtw+U6IHbQteVmsSYuC69ziBj0NCzjaOwbHzY0Um90ixHAJf1xkwyfX89RboQAEmKgsHg+xv9v gIoSUWgDdD5wkNYaJ17Yjz8kNaXnHmZaUjeR+lnHd134d/7vgirt6x5qerlYuPPqYO0yprjgbij jJBpOtbesVIqW+GPHuEJ4IXuAYHe1tYNpkubIX+t3xqrqWmjnQFdEjPhsJXkqRJB2WWXjQwgZpq OgqPw9nHWTlNP5TsfmpXnPOdr2tCrx4jXxDu/6Myz1qtiTB1SUuAqrINHly+3X9foz6PU2SMX08 pZ+iqFHJmHMzjPzyGy9G4te032dxjLUevpBf+fBxuk/6FK+487ujsq1nImmB84dlJ4Bt2Bi3 X-Proofpoint-GUID: N7kaRjSeQsqZnJaFIKpHwLYLu_HOTj_c X-Rspamd-Server: rspam12 X-Rspamd-Queue-Id: 3437380005 X-Stat-Signature: ei6oba1go6t38itd9uwnift5s4x6uhhw X-Rspam-User: X-HE-Tag: 1752687520-413114 X-HE-Meta: U2FsdGVkX1+6NIFQ13DvSNouMVUTotwiP9jz1hJ/2rWuN1bFwwjvxleNDM8EtcGF7V/eYB2atq/YjKdSvM/qVaT2fPkYcKvC2WMdT1pjP2YV/9e6J1lcFbj0Hmcyp9hovhBdjNvyAXhi/LvzYP0YX1Hrz0oFUSpSPXZfX4yzmxf4KRDm3jv8T6nERcI9qzHvtUj4F3XT4Wz6zM6I+by2sIYq99dTEIhrkFcUgePE/o+4z3vJu6gYuzvQW01UEZTlfqUmjDdL2yIi4BLJYhii64toFTIACJegJYlDagJK6Rx2TaXwNCHYmanUVUv06zcSXqyU9Vo3IwKVUHGu5qY3DdQadMg5ptGnD8rxa7vIu+iZViMxMJlujyhpDxEiDGaICdULjmH7p+Q9Ple1oMirTWUKG81DM7NxKSBwQPxvwVqCmgQN35UAfu9efMqgwi2e9lU1PtAx1h6+oFYsXrwvqZj7fb6K3TtNCzCordUtV2TN/pqbsv4968UDXgNpKjnJex9lDXHSb55brxUgA6vWORRetz3P16y3Yiuf7JOtMUsH+qAHgJ4s8wRgttUxqaWGGFsHqukEHyCKLQKBm3FOA2KyoZjLB1e/oBA7p9pKudk3bwE0xcqgBjM5SHgMvZ7M4j3VYiV2ShKy8g+0AVty1eH1LmVJb2D9aaHPITbnvLPzoOczI0PcLkFAEaaGRajVKkT2EFtZ0/+WDYHGNWdk7FOOby3wCFo/pxc65OJkM5S1E4FduRaUV41bA7shN7p4OqvzAQ0rbSF/C58cE2odPi3ZW4IMzhwCNCaNFzk3m4wy3odpTtx3YXyhRr57ZoDT3qod69bghSSvsp/bj5QDH2VSefYUxX8K1OFpnFLBjTIEPAz2MYhfn2u6VaBgCcJffIHqw6i8u9NniylNVYfIdLe/kWEjwEE12bRGzs02SN/XDkgSqvet/IjrSnUT1ordzCf6ORCCo9Ajx89/Xml 6McXS+Pv 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 X-Bogosity: Ham, tests=bogofilter, spamicity=0.000000, version=1.2.4 Sender: owner-linux-mm@kvack.org Precedence: bulk X-Loop: owner-majordomo@kvack.org List-ID: List-Subscribe: List-Unsubscribe: Drop the wholly unnecessary set_vma_sealed() helper(), which is used only once, and place VMA_ITERATOR() declarations in the correct place. Retain vma_is_sealed(), and use it instead of the confusingly named can_modify_vma(), so it's abundantly clear what's being tested, rather then a nebulous sense of 'can the VMA be modified'. No functional change intended. Signed-off-by: Lorenzo Stoakes Reviewed-by: Liam R. Howlett Reviewed-by: Pedro Falcato Acked-by: David Hildenbrand --- mm/madvise.c | 2 +- mm/mprotect.c | 2 +- mm/mremap.c | 2 +- mm/mseal.c | 9 +-------- mm/vma.c | 4 ++-- mm/vma.h | 20 ++------------------ 6 files changed, 8 insertions(+), 31 deletions(-) diff --git a/mm/madvise.c b/mm/madvise.c index dc3d8497b0f4..da6e0e7c00b5 100644 --- a/mm/madvise.c +++ b/mm/madvise.c @@ -1286,7 +1286,7 @@ static bool can_madvise_modify(struct madvise_behavior *madv_behavior) struct vm_area_struct *vma = madv_behavior->vma; /* If the VMA isn't sealed we're good. */ - if (can_modify_vma(vma)) + if (!vma_is_sealed(vma)) return true; /* For a sealed VMA, we only care about discard operations. */ diff --git a/mm/mprotect.c b/mm/mprotect.c index 88709c01177b..807939177065 100644 --- a/mm/mprotect.c +++ b/mm/mprotect.c @@ -605,7 +605,7 @@ mprotect_fixup(struct vma_iterator *vmi, struct mmu_gather *tlb, unsigned long charged = 0; int error; - if (!can_modify_vma(vma)) + if (vma_is_sealed(vma)) return -EPERM; if (newflags == oldflags) { diff --git a/mm/mremap.c b/mm/mremap.c index 5b7fe8f36074..8e93eca86721 100644 --- a/mm/mremap.c +++ b/mm/mremap.c @@ -1649,7 +1649,7 @@ static int check_prep_vma(struct vma_remap_struct *vrm) return -EFAULT; /* If mseal()'d, mremap() is prohibited. */ - if (!can_modify_vma(vma)) + if (vma_is_sealed(vma)) return -EPERM; /* Align to hugetlb page size, if required. */ diff --git a/mm/mseal.c b/mm/mseal.c index 1308e88ab184..adbcc65e9660 100644 --- a/mm/mseal.c +++ b/mm/mseal.c @@ -15,11 +15,6 @@ #include #include "internal.h" -static inline void set_vma_sealed(struct vm_area_struct *vma) -{ - vm_flags_set(vma, VM_SEALED); -} - static int mseal_fixup(struct vma_iterator *vmi, struct vm_area_struct *vma, struct vm_area_struct **prev, unsigned long start, unsigned long end, vm_flags_t newflags) @@ -36,7 +31,7 @@ static int mseal_fixup(struct vma_iterator *vmi, struct vm_area_struct *vma, goto out; } - set_vma_sealed(vma); + vm_flags_set(vma, VM_SEALED); out: *prev = vma; return ret; @@ -53,7 +48,6 @@ static int check_mm_seal(unsigned long start, unsigned long end) { struct vm_area_struct *vma; unsigned long nstart = start; - VMA_ITERATOR(vmi, current->mm, start); /* going through each vma to check. */ @@ -78,7 +72,6 @@ static int apply_mm_seal(unsigned long start, unsigned long end) { unsigned long nstart; struct vm_area_struct *vma, *prev; - VMA_ITERATOR(vmi, current->mm, start); vma = vma_iter_load(&vmi); diff --git a/mm/vma.c b/mm/vma.c index fc502b741dcf..75fd2759964b 100644 --- a/mm/vma.c +++ b/mm/vma.c @@ -1351,7 +1351,7 @@ static int vms_gather_munmap_vmas(struct vma_munmap_struct *vms, } /* Don't bother splitting the VMA if we can't unmap it anyway */ - if (!can_modify_vma(vms->vma)) { + if (vma_is_sealed(vms->vma)) { error = -EPERM; goto start_split_failed; } @@ -1371,7 +1371,7 @@ static int vms_gather_munmap_vmas(struct vma_munmap_struct *vms, for_each_vma_range(*(vms->vmi), next, vms->end) { long nrpages; - if (!can_modify_vma(next)) { + if (vma_is_sealed(next)) { error = -EPERM; goto modify_vma_failed; } diff --git a/mm/vma.h b/mm/vma.h index 85db5e880fcc..b123a9cdedb0 100644 --- a/mm/vma.h +++ b/mm/vma.h @@ -559,31 +559,15 @@ struct vm_area_struct *vma_iter_next_rewind(struct vma_iterator *vmi, } #ifdef CONFIG_64BIT - static inline bool vma_is_sealed(struct vm_area_struct *vma) { return (vma->vm_flags & VM_SEALED); } - -/* - * check if a vma is sealed for modification. - * return true, if modification is allowed. - */ -static inline bool can_modify_vma(struct vm_area_struct *vma) -{ - if (unlikely(vma_is_sealed(vma))) - return false; - - return true; -} - #else - -static inline bool can_modify_vma(struct vm_area_struct *vma) +static inline bool vma_is_sealed(struct vm_area_struct *vma) { - return true; + return false; } - #endif #if defined(CONFIG_STACK_GROWSUP) -- 2.50.1