lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <gcnaaaub4elpm2iauij3pejsb6dlnyij3qmbwha6vp2k5rsm53@yatvcjchxhbi>
Date: Mon, 9 Feb 2026 20:23:04 +0000
From: "Liam R. Howlett" <Liam.Howlett@...cle.com>
To: Lorenzo Stoakes <lorenzo.stoakes@...cle.com>
Cc: Andrew Morton <akpm@...ux-foundation.org>,
        Jarkko Sakkinen <jarkko@...nel.org>,
        Dave Hansen <dave.hansen@...ux.intel.com>,
        Thomas Gleixner <tglx@...nel.org>, Ingo Molnar <mingo@...hat.com>,
        Borislav Petkov <bp@...en8.de>, x86@...nel.org,
        "H . Peter Anvin" <hpa@...or.com>, Arnd Bergmann <arnd@...db.de>,
        Greg Kroah-Hartman <gregkh@...uxfoundation.org>,
        Dan Williams <dan.j.williams@...el.com>,
        Vishal Verma <vishal.l.verma@...el.com>,
        Dave Jiang <dave.jiang@...el.com>,
        Maarten Lankhorst <maarten.lankhorst@...ux.intel.com>,
        Maxime Ripard <mripard@...nel.org>,
        Thomas Zimmermann <tzimmermann@...e.de>,
        David Airlie <airlied@...il.com>, Simona Vetter <simona@...ll.ch>,
        Jani Nikula <jani.nikula@...ux.intel.com>,
        Joonas Lahtinen <joonas.lahtinen@...ux.intel.com>,
        Rodrigo Vivi <rodrigo.vivi@...el.com>,
        Tvrtko Ursulin <tursulin@...ulin.net>,
        Christian Koenig <christian.koenig@....com>,
        Huang Rui <ray.huang@....com>, Matthew Auld <matthew.auld@...el.com>,
        Matthew Brost <matthew.brost@...el.com>,
        Alexander Viro <viro@...iv.linux.org.uk>,
        Christian Brauner <brauner@...nel.org>, Jan Kara <jack@...e.cz>,
        Benjamin LaHaise <bcrl@...ck.org>, Gao Xiang <xiang@...nel.org>,
        Chao Yu <chao@...nel.org>, Yue Hu <zbestahu@...il.com>,
        Jeffle Xu <jefflexu@...ux.alibaba.com>,
        Sandeep Dhavale <dhavale@...gle.com>,
        Hongbo Li <lihongbo22@...wei.com>, Chunhai Guo <guochunhai@...o.com>,
        Theodore Ts'o <tytso@....edu>,
        Andreas Dilger <adilger.kernel@...ger.ca>,
        Muchun Song <muchun.song@...ux.dev>,
        Oscar Salvador <osalvador@...e.de>,
        David Hildenbrand <david@...nel.org>,
        Konstantin Komarov <almaz.alexandrovich@...agon-software.com>,
        Mike Marshall <hubcap@...ibond.com>,
        Martin Brandenburg <martin@...ibond.com>,
        Tony Luck <tony.luck@...el.com>,
        Reinette Chatre <reinette.chatre@...el.com>,
        Dave Martin <Dave.Martin@....com>, James Morse <james.morse@....com>,
        Babu Moger <babu.moger@....com>, Carlos Maiolino <cem@...nel.org>,
        Damien Le Moal <dlemoal@...nel.org>,
        Naohiro Aota <naohiro.aota@....com>,
        Johannes Thumshirn <jth@...nel.org>,
        Matthew Wilcox <willy@...radead.org>, Vlastimil Babka <vbabka@...e.cz>,
        Mike Rapoport <rppt@...nel.org>,
        Suren Baghdasaryan <surenb@...gle.com>, Michal Hocko <mhocko@...e.com>,
        Hugh Dickins <hughd@...gle.com>,
        Baolin Wang <baolin.wang@...ux.alibaba.com>, Zi Yan <ziy@...dia.com>,
        Nico Pache <npache@...hat.com>, Ryan Roberts <ryan.roberts@....com>,
        Dev Jain <dev.jain@....com>, Barry Song <baohua@...nel.org>,
        Lance Yang <lance.yang@...ux.dev>, Jann Horn <jannh@...gle.com>,
        Pedro Falcato <pfalcato@...e.de>, David Howells <dhowells@...hat.com>,
        Paul Moore <paul@...l-moore.com>, James Morris <jmorris@...ei.org>,
        "Serge E . Hallyn" <serge@...lyn.com>,
        Yury Norov <yury.norov@...il.com>,
        Rasmus Villemoes <linux@...musvillemoes.dk>, linux-sgx@...r.kernel.org,
        linux-kernel@...r.kernel.org, nvdimm@...ts.linux.dev,
        linux-cxl@...r.kernel.org, dri-devel@...ts.freedesktop.org,
        intel-gfx@...ts.freedesktop.org, linux-fsdevel@...r.kernel.org,
        linux-aio@...ck.org, linux-erofs@...ts.ozlabs.org,
        linux-ext4@...r.kernel.org, linux-mm@...ck.org, ntfs3@...ts.linux.dev,
        devel@...ts.orangefs.org, linux-xfs@...r.kernel.org,
        keyrings@...r.kernel.org, linux-security-module@...r.kernel.org,
        Jason Gunthorpe <jgg@...dia.com>
Subject: Re: [PATCH v2 13/13] tools/testing/vma: add VMA userland tests for
 VMA flag functions

* Lorenzo Stoakes <lorenzo.stoakes@...cle.com> [260122 16:06]:
> Now we have the capability to test the new helpers for the bitmap VMA flags
> in userland, do so.
> 
> We also update the Makefile such that both VMA (and while we're here)
> mm_struct flag sizes can be customised on build. We default to 128-bit to
> enable testing of flags above word size even on 64-bit systems.
> 
> We add userland tests to ensure that we do not regress VMA flag behaviour
> with the introduction when using bitmap VMA flags, nor accidentally
> introduce unexpected results due to for instance higher bit values not
> being correctly cleared/set.
> 
> As part of this change, make __mk_vma_flags() a custom function so we can
> handle specifying invalid VMA bits. This is purposeful so we can have the
> VMA tests work at lower and higher number of VMA flags without having to
> duplicate code too much.
> 
> Signed-off-by: Lorenzo Stoakes <lorenzo.stoakes@...cle.com>

Reviewed-by: Liam R. Howlett <Liam.Howlett@...cle.com>

> ---
>  tools/testing/vma/Makefile         |   3 +
>  tools/testing/vma/include/custom.h |  16 ++
>  tools/testing/vma/include/dup.h    |  11 +-
>  tools/testing/vma/tests/vma.c      | 300 +++++++++++++++++++++++++++++
>  tools/testing/vma/vma_internal.h   |   4 +-
>  5 files changed, 322 insertions(+), 12 deletions(-)
> 
> diff --git a/tools/testing/vma/Makefile b/tools/testing/vma/Makefile
> index 50aa4301b3a6..e72b45dedda5 100644
> --- a/tools/testing/vma/Makefile
> +++ b/tools/testing/vma/Makefile
> @@ -9,6 +9,9 @@ include ../shared/shared.mk
>  OFILES = $(SHARED_OFILES) main.o shared.o maple-shim.o
>  TARGETS = vma
>  
> +# These can be varied to test different sizes.
> +CFLAGS += -DNUM_VMA_FLAG_BITS=128 -DNUM_MM_FLAG_BITS=128
> +
>  main.o: main.c shared.c shared.h vma_internal.h tests/merge.c tests/mmap.c tests/vma.c ../../../mm/vma.c ../../../mm/vma_init.c ../../../mm/vma_exec.c ../../../mm/vma.h include/custom.h include/dup.h include/stubs.h
>  
>  vma:	$(OFILES)
> diff --git a/tools/testing/vma/include/custom.h b/tools/testing/vma/include/custom.h
> index f567127efba9..802a76317245 100644
> --- a/tools/testing/vma/include/custom.h
> +++ b/tools/testing/vma/include/custom.h
> @@ -101,3 +101,19 @@ static inline void vma_lock_init(struct vm_area_struct *vma, bool reset_refcnt)
>  	if (reset_refcnt)
>  		refcount_set(&vma->vm_refcnt, 0);
>  }
> +
> +static inline vma_flags_t __mk_vma_flags(size_t count, const vma_flag_t *bits)
> +{
> +	vma_flags_t flags;
> +	int i;
> +
> +	/*
> +	 * For testing purposes: allow invalid bit specification so we can
> +	 * easily test.
> +	 */
> +	vma_flags_clear_all(&flags);
> +	for (i = 0; i < count; i++)
> +		if (bits[i] < NUM_VMA_FLAG_BITS)
> +			vma_flag_set(&flags, bits[i]);
> +	return flags;
> +}
> diff --git a/tools/testing/vma/include/dup.h b/tools/testing/vma/include/dup.h
> index ed8708afb7af..31ee02f709b2 100644
> --- a/tools/testing/vma/include/dup.h
> +++ b/tools/testing/vma/include/dup.h
> @@ -838,16 +838,7 @@ static inline void vm_flags_clear(struct vm_area_struct *vma,
>  	vma_flags_clear_word(&vma->flags, flags);
>  }
>  
> -static inline vma_flags_t __mk_vma_flags(size_t count, const vma_flag_t *bits)
> -{
> -	vma_flags_t flags;
> -	int i;
> -
> -	vma_flags_clear_all(&flags);
> -	for (i = 0; i < count; i++)
> -		vma_flag_set(&flags, bits[i]);
> -	return flags;
> -}
> +static inline vma_flags_t __mk_vma_flags(size_t count, const vma_flag_t *bits);
>  
>  #define mk_vma_flags(...) __mk_vma_flags(COUNT_ARGS(__VA_ARGS__), \
>  					 (const vma_flag_t []){__VA_ARGS__})
> diff --git a/tools/testing/vma/tests/vma.c b/tools/testing/vma/tests/vma.c
> index 6d9775aee243..c54ffc954f11 100644
> --- a/tools/testing/vma/tests/vma.c
> +++ b/tools/testing/vma/tests/vma.c
> @@ -1,5 +1,25 @@
>  // SPDX-License-Identifier: GPL-2.0-or-later
>  
> +static bool compare_legacy_flags(vm_flags_t legacy_flags, vma_flags_t flags)
> +{
> +	const unsigned long legacy_val = legacy_flags;
> +	/* The lower word should contain the precise same value. */
> +	const unsigned long flags_lower = flags.__vma_flags[0];
> +#if NUM_VMA_FLAGS > BITS_PER_LONG
> +	int i;
> +
> +	/* All bits in higher flag values should be zero. */
> +	for (i = 1; i < NUM_VMA_FLAGS / BITS_PER_LONG; i++) {
> +		if (flags.__vma_flags[i] != 0)
> +			return false;
> +	}
> +#endif
> +
> +	static_assert(sizeof(legacy_flags) == sizeof(unsigned long));
> +
> +	return legacy_val == flags_lower;
> +}
> +
>  static bool test_copy_vma(void)
>  {
>  	vm_flags_t vm_flags = VM_READ | VM_WRITE | VM_MAYREAD | VM_MAYWRITE;
> @@ -33,7 +53,287 @@ static bool test_copy_vma(void)
>  	return true;
>  }
>  
> +static bool test_vma_flags_unchanged(void)
> +{
> +	vma_flags_t flags = EMPTY_VMA_FLAGS;
> +	vm_flags_t legacy_flags = 0;
> +	int bit;
> +	struct vm_area_struct vma;
> +	struct vm_area_desc desc;
> +
> +
> +	vma.flags = EMPTY_VMA_FLAGS;
> +	desc.vma_flags = EMPTY_VMA_FLAGS;
> +
> +	for (bit = 0; bit < BITS_PER_LONG; bit++) {
> +		vma_flags_t mask = mk_vma_flags(bit);
> +
> +		legacy_flags |= (1UL << bit);
> +
> +		/* Individual flags. */
> +		vma_flags_set(&flags, bit);
> +		ASSERT_TRUE(compare_legacy_flags(legacy_flags, flags));
> +
> +		/* Via mask. */
> +		vma_flags_set_mask(&flags, mask);
> +		ASSERT_TRUE(compare_legacy_flags(legacy_flags, flags));
> +
> +		/* Same for VMA. */
> +		vma_set_flags(&vma, bit);
> +		ASSERT_TRUE(compare_legacy_flags(legacy_flags, vma.flags));
> +		vma_set_flags_mask(&vma, mask);
> +		ASSERT_TRUE(compare_legacy_flags(legacy_flags, vma.flags));
> +
> +		/* Same for VMA descriptor. */
> +		vma_desc_set_flags(&desc, bit);
> +		ASSERT_TRUE(compare_legacy_flags(legacy_flags, desc.vma_flags));
> +		vma_desc_set_flags_mask(&desc, mask);
> +		ASSERT_TRUE(compare_legacy_flags(legacy_flags, desc.vma_flags));
> +	}
> +
> +	return true;
> +}
> +
> +static bool test_vma_flags_cleared(void)
> +{
> +	const vma_flags_t empty = EMPTY_VMA_FLAGS;
> +	vma_flags_t flags;
> +	int i;
> +
> +	/* Set all bits high. */
> +	memset(&flags, 1, sizeof(flags));
> +	/* Try to clear. */
> +	vma_flags_clear_all(&flags);
> +	/* Equal to EMPTY_VMA_FLAGS? */
> +	ASSERT_EQ(memcmp(&empty, &flags, sizeof(flags)), 0);
> +	/* Make sure every unsigned long entry in bitmap array zero. */
> +	for (i = 0; i < sizeof(flags) / BITS_PER_LONG; i++) {
> +		const unsigned long val = flags.__vma_flags[i];
> +
> +		ASSERT_EQ(val, 0);
> +	}
> +
> +	return true;
> +}
> +
> +/*
> + * Assert that VMA flag functions that operate at the system word level function
> + * correctly.
> + */
> +static bool test_vma_flags_word(void)
> +{
> +	vma_flags_t flags = EMPTY_VMA_FLAGS;
> +	const vma_flags_t comparison =
> +		mk_vma_flags(VMA_READ_BIT, VMA_WRITE_BIT, 64, 65);
> +
> +	/* Set some custom high flags. */
> +	vma_flags_set(&flags, 64, 65);
> +	/* Now overwrite the first word. */
> +	vma_flags_overwrite_word(&flags, VM_READ | VM_WRITE);
> +	/* Ensure they are equal. */
> +	ASSERT_EQ(memcmp(&flags, &comparison, sizeof(flags)), 0);
> +
> +	flags = EMPTY_VMA_FLAGS;
> +	vma_flags_set(&flags, 64, 65);
> +
> +	/* Do the same with the _once() equivalent. */
> +	vma_flags_overwrite_word_once(&flags, VM_READ | VM_WRITE);
> +	ASSERT_EQ(memcmp(&flags, &comparison, sizeof(flags)), 0);
> +
> +	flags = EMPTY_VMA_FLAGS;
> +	vma_flags_set(&flags, 64, 65);
> +
> +	/* Make sure we can set a word without disturbing other bits. */
> +	vma_flags_set(&flags, VMA_WRITE_BIT);
> +	vma_flags_set_word(&flags, VM_READ);
> +	ASSERT_EQ(memcmp(&flags, &comparison, sizeof(flags)), 0);
> +
> +	flags = EMPTY_VMA_FLAGS;
> +	vma_flags_set(&flags, 64, 65);
> +
> +	/* Make sure we can clear a word without disturbing other bits. */
> +	vma_flags_set(&flags, VMA_READ_BIT, VMA_WRITE_BIT, VMA_EXEC_BIT);
> +	vma_flags_clear_word(&flags, VM_EXEC);
> +	ASSERT_EQ(memcmp(&flags, &comparison, sizeof(flags)), 0);
> +
> +	return true;
> +}
> +
> +/* Ensure that vma_flags_test() and friends works correctly. */
> +static bool test_vma_flags_test(void)
> +{
> +	const vma_flags_t flags = mk_vma_flags(VMA_READ_BIT, VMA_WRITE_BIT,
> +					       VMA_EXEC_BIT, 64, 65);
> +	struct vm_area_struct vma;
> +	struct vm_area_desc desc;
> +
> +	vma.flags = flags;
> +	desc.vma_flags = flags;
> +
> +#define do_test(...)						\
> +	ASSERT_TRUE(vma_flags_test(&flags, __VA_ARGS__));	\
> +	ASSERT_TRUE(vma_desc_test_flags(&desc, __VA_ARGS__))
> +
> +#define do_test_all_true(...)					\
> +	ASSERT_TRUE(vma_flags_test_all(&flags, __VA_ARGS__));	\
> +	ASSERT_TRUE(vma_test_all_flags(&vma, __VA_ARGS__))
> +
> +#define do_test_all_false(...)					\
> +	ASSERT_FALSE(vma_flags_test_all(&flags, __VA_ARGS__));	\
> +	ASSERT_FALSE(vma_test_all_flags(&vma, __VA_ARGS__))
> +
> +	/*
> +	 * Testing for some flags that are present, some that are not - should
> +	 * pass. ANY flags matching should work.
> +	 */
> +	do_test(VMA_READ_BIT, VMA_MAYREAD_BIT, VMA_SEQ_READ_BIT);
> +	/* However, the ...test_all() variant should NOT pass. */
> +	do_test_all_false(VMA_READ_BIT, VMA_MAYREAD_BIT, VMA_SEQ_READ_BIT);
> +	/* But should pass for flags present. */
> +	do_test_all_true(VMA_READ_BIT, VMA_WRITE_BIT, VMA_EXEC_BIT, 64, 65);
> +	/* Also subsets... */
> +	do_test_all_true(VMA_READ_BIT, VMA_WRITE_BIT, VMA_EXEC_BIT, 64);
> +	do_test_all_true(VMA_READ_BIT, VMA_WRITE_BIT, VMA_EXEC_BIT);
> +	do_test_all_true(VMA_READ_BIT, VMA_WRITE_BIT);
> +	do_test_all_true(VMA_READ_BIT);
> +	/*
> +	 * Check _mask variant. We don't need to test extensively as macro
> +	 * helper is the equivalent.
> +	 */
> +	ASSERT_TRUE(vma_flags_test_mask(&flags, flags));
> +	ASSERT_TRUE(vma_flags_test_all_mask(&flags, flags));
> +
> +	/* Single bits. */
> +	do_test(VMA_READ_BIT);
> +	do_test(VMA_WRITE_BIT);
> +	do_test(VMA_EXEC_BIT);
> +#if NUM_VMA_FLAG_BITS > 64
> +	do_test(64);
> +	do_test(65);
> +#endif
> +
> +	/* Two bits. */
> +	do_test(VMA_READ_BIT, VMA_WRITE_BIT);
> +	do_test(VMA_READ_BIT, VMA_EXEC_BIT);
> +	do_test(VMA_WRITE_BIT, VMA_EXEC_BIT);
> +	/* Ordering shouldn't matter. */
> +	do_test(VMA_WRITE_BIT, VMA_READ_BIT);
> +	do_test(VMA_EXEC_BIT, VMA_READ_BIT);
> +	do_test(VMA_EXEC_BIT, VMA_WRITE_BIT);
> +#if NUM_VMA_FLAG_BITS > 64
> +	do_test(VMA_READ_BIT, 64);
> +	do_test(VMA_WRITE_BIT, 64);
> +	do_test(64, VMA_READ_BIT);
> +	do_test(64, VMA_WRITE_BIT);
> +	do_test(VMA_READ_BIT, 65);
> +	do_test(VMA_WRITE_BIT, 65);
> +	do_test(65, VMA_READ_BIT);
> +	do_test(65, VMA_WRITE_BIT);
> +#endif
> +	/* Three bits. */
> +	do_test(VMA_READ_BIT, VMA_WRITE_BIT, VMA_EXEC_BIT);
> +#if NUM_VMA_FLAG_BITS > 64
> +	/* No need to consider every single permutation. */
> +	do_test(VMA_READ_BIT, VMA_WRITE_BIT, 64);
> +	do_test(VMA_READ_BIT, VMA_WRITE_BIT, 65);
> +
> +	/* Four bits. */
> +	do_test(VMA_READ_BIT, VMA_WRITE_BIT, VMA_EXEC_BIT, 64);
> +	do_test(VMA_READ_BIT, VMA_WRITE_BIT, VMA_EXEC_BIT, 65);
> +
> +	/* Five bits. */
> +	do_test(VMA_READ_BIT, VMA_WRITE_BIT, VMA_EXEC_BIT, 64, 65);
> +#endif
> +
> +#undef do_test
> +#undef do_test_all_true
> +#undef do_test_all_false
> +
> +	return true;
> +}
> +
> +/* Ensure that vma_flags_clear() and friends works correctly. */
> +static bool test_vma_flags_clear(void)
> +{
> +	vma_flags_t flags = mk_vma_flags(VMA_READ_BIT, VMA_WRITE_BIT,
> +					 VMA_EXEC_BIT, 64, 65);
> +	vma_flags_t mask = mk_vma_flags(VMA_EXEC_BIT, 64);
> +	struct vm_area_struct vma;
> +	struct vm_area_desc desc;
> +
> +	vma.flags = flags;
> +	desc.vma_flags = flags;
> +
> +	/* Cursory check of _mask() variant, as the helper macros imply. */
> +	vma_flags_clear_mask(&flags, mask);
> +	vma_flags_clear_mask(&vma.flags, mask);
> +	vma_desc_clear_flags_mask(&desc, mask);
> +	ASSERT_FALSE(vma_flags_test(&flags, VMA_EXEC_BIT, 64));
> +	ASSERT_FALSE(vma_flags_test(&vma.flags, VMA_EXEC_BIT, 64));
> +	ASSERT_FALSE(vma_desc_test_flags(&desc, VMA_EXEC_BIT, 64));
> +	/* Reset. */
> +	vma_flags_set(&flags, VMA_EXEC_BIT, 64);
> +	vma_set_flags(&vma, VMA_EXEC_BIT, 64);
> +	vma_desc_set_flags(&desc, VMA_EXEC_BIT, 64);
> +
> +	/*
> +	 * Clear the flags and assert clear worked, then reset flags back to
> +	 * include specified flags.
> +	 */
> +#define do_test_and_reset(...)					\
> +	vma_flags_clear(&flags, __VA_ARGS__);			\
> +	vma_flags_clear(&vma.flags, __VA_ARGS__);		\
> +	vma_desc_clear_flags(&desc, __VA_ARGS__);		\
> +	ASSERT_FALSE(vma_flags_test(&flags, __VA_ARGS__));	\
> +	ASSERT_FALSE(vma_flags_test(&vma.flags, __VA_ARGS__));	\
> +	ASSERT_FALSE(vma_desc_test_flags(&desc, __VA_ARGS__));	\
> +	vma_flags_set(&flags, __VA_ARGS__);			\
> +	vma_set_flags(&vma, __VA_ARGS__);			\
> +	vma_desc_set_flags(&desc, __VA_ARGS__)
> +
> +	/* Single flags. */
> +	do_test_and_reset(VMA_READ_BIT);
> +	do_test_and_reset(VMA_WRITE_BIT);
> +	do_test_and_reset(VMA_EXEC_BIT);
> +	do_test_and_reset(64);
> +	do_test_and_reset(65);
> +
> +	/* Two flags, in different orders. */
> +	do_test_and_reset(VMA_READ_BIT, VMA_WRITE_BIT);
> +	do_test_and_reset(VMA_READ_BIT, VMA_EXEC_BIT);
> +	do_test_and_reset(VMA_READ_BIT, 64);
> +	do_test_and_reset(VMA_READ_BIT, 65);
> +	do_test_and_reset(VMA_WRITE_BIT, VMA_READ_BIT);
> +	do_test_and_reset(VMA_WRITE_BIT, VMA_EXEC_BIT);
> +	do_test_and_reset(VMA_WRITE_BIT, 64);
> +	do_test_and_reset(VMA_WRITE_BIT, 65);
> +	do_test_and_reset(VMA_EXEC_BIT, VMA_READ_BIT);
> +	do_test_and_reset(VMA_EXEC_BIT, VMA_WRITE_BIT);
> +	do_test_and_reset(VMA_EXEC_BIT, 64);
> +	do_test_and_reset(VMA_EXEC_BIT, 65);
> +	do_test_and_reset(64, VMA_READ_BIT);
> +	do_test_and_reset(64, VMA_WRITE_BIT);
> +	do_test_and_reset(64, VMA_EXEC_BIT);
> +	do_test_and_reset(64, 65);
> +	do_test_and_reset(65, VMA_READ_BIT);
> +	do_test_and_reset(65, VMA_WRITE_BIT);
> +	do_test_and_reset(65, VMA_EXEC_BIT);
> +	do_test_and_reset(65, 64);
> +
> +	/* Three flags. */
> +
> +#undef do_test_some_missing
> +#undef do_test_and_reset
> +
> +	return true;
> +}
> +
>  static void run_vma_tests(int *num_tests, int *num_fail)
>  {
>  	TEST(copy_vma);
> +	TEST(vma_flags_unchanged);
> +	TEST(vma_flags_cleared);
> +	TEST(vma_flags_word);
> +	TEST(vma_flags_test);
> +	TEST(vma_flags_clear);
>  }
> diff --git a/tools/testing/vma/vma_internal.h b/tools/testing/vma/vma_internal.h
> index e3ed05b57819..0e1121e2ef23 100644
> --- a/tools/testing/vma/vma_internal.h
> +++ b/tools/testing/vma/vma_internal.h
> @@ -36,11 +36,11 @@
>   * ahead of all other headers.
>   */
>  #define __private
> -#define NUM_MM_FLAG_BITS (64)
> +/* NUM_MM_FLAG_BITS defined by test code. */
>  typedef struct {
>  	__private DECLARE_BITMAP(__mm_flags, NUM_MM_FLAG_BITS);
>  } mm_flags_t;
> -#define NUM_VMA_FLAG_BITS BITS_PER_LONG
> +/* NUM_VMA_FLAG_BITS defined by test code. */
>  typedef struct {
>  	DECLARE_BITMAP(__vma_flags, NUM_VMA_FLAG_BITS);
>  } __private vma_flags_t;
> -- 
> 2.52.0
> 

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ