Received: by 2002:ac0:a594:0:0:0:0:0 with SMTP id m20-v6csp1549886imm; Tue, 15 May 2018 22:45:44 -0700 (PDT) X-Google-Smtp-Source: AB8JxZrrO8HjqJXUL5J/ek2xTOHoay4ZBSSX/KB20h7ivD6wpq3WG8HNLHYwDPgXXWfzF6oizeyI X-Received: by 2002:a62:a044:: with SMTP id r65-v6mr17896691pfe.235.1526449544487; Tue, 15 May 2018 22:45:44 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1526449544; cv=none; d=google.com; s=arc-20160816; b=krJ9jo6uHOO46Vjsq7IjlRTWKY2pVCab2za5oxDcNJKMMVtLKiFVXqvLMzIS45OJpK cxx0tFDuaJhxQjC0OsDDxnIDLQ4BrTtOsZ6S8FfrHy6psMOnUFotum83Q7satRn9pAN4 YsZyGwEzPKeGL0vIhSr6LSLNErsMly7MfsxX6Ukd4/90m8y1LHBlSsaQULyguBXjA6Vx dn/dozEm5419b5LEKSjNK9hnVtrY8QYbkAwS6ByZS8pRqYL7PVD0G6eBi9Wll5n9Ou8p Q2XR3DNCk2VpTP5+M9hI8ioXD8D00t8w5VBkMrgssVSgsZv1209unx04bdjpFY1guvOZ Z/iw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:references:in-reply-to:message-id:date :subject:cc:to:from:dkim-signature:arc-authentication-results; bh=VGbjLoHXZIXle6JGDHpldaZpPb5Hn8l7Pq6ebApXQYg=; b=qYje4ORL9qSsngOavOCR7H7Gusfv3EO29vZ0Y1sipj/2c4GkxqIRDNLFHHxEO0EWQ+ s4dQI8TYd6zLqZyGB4L1pSr1hqW9kbTun+kHzahm9y/3oEMPBCcnlLCUFtpX/u4PL2Y+ 6G2HhqG8toJpXDqXE5KNEjXUWseAdYoTVU+VgIjVl33X3MsAaQ0TFlfcj7H9/QMiBwSt OXd7UHkpNcoc9k5p7B+XqDLhfauoaYVVgk3q3BNjWOfBX4uuseDlGZV0xI3L5hmZ+eht WHOMAHaFQo4Q8poLiO4AI/Uadx5Q/hPRi2nUjCK/GjU6XknLzqeSwCz9Nwj9YSUudHHC 4frA== ARC-Authentication-Results: i=1; mx.google.com; dkim=fail header.i=@infradead.org header.s=bombadil.20170209 header.b=qVLWCKHs; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id j72-v6si1459973pgc.465.2018.05.15.22.45.29; Tue, 15 May 2018 22:45:44 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=fail header.i=@infradead.org header.s=bombadil.20170209 header.b=qVLWCKHs; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1752725AbeEPFpC (ORCPT + 99 others); Wed, 16 May 2018 01:45:02 -0400 Received: from bombadil.infradead.org ([198.137.202.133]:58256 "EHLO bombadil.infradead.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1752508AbeEPFo7 (ORCPT ); Wed, 16 May 2018 01:44:59 -0400 DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=infradead.org; s=bombadil.20170209; h=References:In-Reply-To:Message-Id: Date:Subject:Cc:To:From:Sender:Reply-To:MIME-Version:Content-Type: Content-Transfer-Encoding:Content-ID:Content-Description:Resent-Date: Resent-From:Resent-Sender:Resent-To:Resent-Cc:Resent-Message-ID:List-Id: List-Help:List-Unsubscribe:List-Subscribe:List-Post:List-Owner:List-Archive; bh=VGbjLoHXZIXle6JGDHpldaZpPb5Hn8l7Pq6ebApXQYg=; b=qVLWCKHsQId9rW4L41Ko7xPLp la1bQhb4lhQlPDyAOJbsCNen4Fah4AsrYmcT+r1+PvS/3BLjqfT8I8qy4n18bhJi16iMcErWAqcn5 +eyyRW2yUSpxowXGKPtetyxwU3v/ZqWBoXMPCzdEE30aoCqdL9jAJVJuPkJk64s30qEE0us/tXQMq sGDs6W0QNiY8Qe0ijYFdSQiHQcXEtowe0GLxTpSEqOtwoIHvrAQ388wXliPcDFrLVgWIDgKRk1Am2 mlyRPyKesxXzlCn18FlWJVX2iPMF8MavnCV8+09a2yHnfNw4h8dr9+8sk4qpZ1adGMKQsKZwR+6n1 SgMcjP+aw==; Received: from [93.83.86.253] (helo=localhost) by bombadil.infradead.org with esmtpsa (Exim 4.90_1 #2 (Red Hat Linux)) id 1fIpEr-0008Hf-33; Wed, 16 May 2018 05:44:37 +0000 From: Christoph Hellwig To: Souptick Joarder , Matthew Wilcox Cc: linux-fsdevel@vger.kernel.org, linux-mm@kvack.org, linux-kernel@vger.kernel.org, devel@lists.orangefs.org, ceph-devel@vger.kernel.org, linux-btrfs@vger.kernel.org, linux-ext4@vger.kernel.org, ocfs2-devel@oss.oracle.com, linux-mtd@lists.infradead.org, dri-devel@lists.freedesktop.org, lustre-devel@lists.lustre.org, linux-arm-kernel@lists.infradead.org, linux-s390@vger.kernel.org Subject: [PATCH 13/14] mm: move arch specific VM_FAULT_* flags to mm.h Date: Wed, 16 May 2018 07:43:47 +0200 Message-Id: <20180516054348.15950-14-hch@lst.de> X-Mailer: git-send-email 2.17.0 In-Reply-To: <20180516054348.15950-1-hch@lst.de> References: <20180516054348.15950-1-hch@lst.de> X-SRS-Rewrite: SMTP reverse-path rewritten from by bombadil.infradead.org. See http://www.infradead.org/rpr.html Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Various architectures define their own internal flags. Not sure a public header like mm.h is a good place, but keeping them inside the arch code with possible conflicts also seems like a bad idea. Maybe we just need to stop overloading the value instead. Signed-off-by: Christoph Hellwig --- arch/arm/mm/fault.c | 3 --- arch/arm64/mm/fault.c | 3 --- arch/s390/mm/fault.c | 6 ------ arch/unicore32/mm/fault.c | 3 --- include/linux/mm.h | 7 +++++++ 5 files changed, 7 insertions(+), 15 deletions(-) diff --git a/arch/arm/mm/fault.c b/arch/arm/mm/fault.c index 32034543f49c..b696eabccf60 100644 --- a/arch/arm/mm/fault.c +++ b/arch/arm/mm/fault.c @@ -201,9 +201,6 @@ void do_bad_area(unsigned long addr, unsigned int fsr, struct pt_regs *regs) } #ifdef CONFIG_MMU -#define VM_FAULT_BADMAP 0x010000 -#define VM_FAULT_BADACCESS 0x020000 - /* * Check that the permissions on the VMA allow for the fault which occurred. * If we encountered a write fault, we must have write permission, otherwise diff --git a/arch/arm64/mm/fault.c b/arch/arm64/mm/fault.c index 91c53a7d2575..3d0b1f8eacce 100644 --- a/arch/arm64/mm/fault.c +++ b/arch/arm64/mm/fault.c @@ -318,9 +318,6 @@ static void do_bad_area(unsigned long addr, unsigned int esr, struct pt_regs *re } } -#define VM_FAULT_BADMAP 0x010000 -#define VM_FAULT_BADACCESS 0x020000 - static int __do_page_fault(struct mm_struct *mm, unsigned long addr, unsigned int mm_flags, unsigned long vm_flags, struct task_struct *tsk) diff --git a/arch/s390/mm/fault.c b/arch/s390/mm/fault.c index e074480d3598..48c781ae25d0 100644 --- a/arch/s390/mm/fault.c +++ b/arch/s390/mm/fault.c @@ -44,12 +44,6 @@ #define __SUBCODE_MASK 0x0600 #define __PF_RES_FIELD 0x8000000000000000ULL -#define VM_FAULT_BADCONTEXT 0x010000 -#define VM_FAULT_BADMAP 0x020000 -#define VM_FAULT_BADACCESS 0x040000 -#define VM_FAULT_SIGNAL 0x080000 -#define VM_FAULT_PFAULT 0x100000 - enum fault_type { KERNEL_FAULT, USER_FAULT, diff --git a/arch/unicore32/mm/fault.c b/arch/unicore32/mm/fault.c index 381473412937..6c3c1a82925f 100644 --- a/arch/unicore32/mm/fault.c +++ b/arch/unicore32/mm/fault.c @@ -148,9 +148,6 @@ void do_bad_area(unsigned long addr, unsigned int fsr, struct pt_regs *regs) __do_kernel_fault(mm, addr, fsr, regs); } -#define VM_FAULT_BADMAP 0x010000 -#define VM_FAULT_BADACCESS 0x020000 - /* * Check that the permissions on the VMA allow for the fault which occurred. * If we encountered a write fault, we must have write permission, otherwise diff --git a/include/linux/mm.h b/include/linux/mm.h index 338b8a1afb02..64d09e3afc24 100644 --- a/include/linux/mm.h +++ b/include/linux/mm.h @@ -1250,6 +1250,13 @@ static inline void clear_page_pfmemalloc(struct page *page) * and needs fsync() to complete (for * synchronous page faults in DAX) */ +/* Only for use in architecture specific page fault handling: */ +#define VM_FAULT_BADMAP 0x010000 +#define VM_FAULT_BADACCESS 0x020000 +#define VM_FAULT_BADCONTEXT 0x040000 +#define VM_FAULT_SIGNAL 0x080000 +#define VM_FAULT_PFAULT 0x100000 + #define VM_FAULT_ERROR (VM_FAULT_OOM | VM_FAULT_SIGBUS | VM_FAULT_SIGSEGV | \ VM_FAULT_HWPOISON | VM_FAULT_HWPOISON_LARGE | \ VM_FAULT_FALLBACK) -- 2.17.0