svn commit: r340159 - head/sys/riscv/riscv
John Baldwin
jhb at FreeBSD.org
Mon Nov 5 20:00:37 UTC 2018
Author: jhb
Date: Mon Nov 5 20:00:36 2018
New Revision: 340159
URL: https://svnweb.freebsd.org/changeset/base/340159
Log:
Rework setting PTE_D for kernel mappings.
Rather than unconditionally setting PTE_D for all writeable kernel
mappings, set PTE_D for writable mappings of unmanaged pages (whether
user or kernel). This matches what amd64 does and also matches what
the RISC-V spec suggests (preset the A and D bits on mappings where
the OS doesn't care about the state).
Suggested by: alc
Reviewed by: alc, markj
Sponsored by: DARPA
Modified:
head/sys/riscv/riscv/pmap.c
Modified: head/sys/riscv/riscv/pmap.c
==============================================================================
--- head/sys/riscv/riscv/pmap.c Mon Nov 5 19:51:16 2018 (r340158)
+++ head/sys/riscv/riscv/pmap.c Mon Nov 5 20:00:36 2018 (r340159)
@@ -2098,13 +2098,20 @@ pmap_enter(pmap_t pmap, vm_offset_t va, vm_page_t m, v
new_l3 |= PTE_W;
if ((va >> 63) == 0)
new_l3 |= PTE_U;
- else if (prot & VM_PROT_WRITE)
- new_l3 |= PTE_D;
new_l3 |= (pn << PTE_PPN0_S);
if ((flags & PMAP_ENTER_WIRED) != 0)
new_l3 |= PTE_SW_WIRED;
- if ((m->oflags & VPO_UNMANAGED) == 0)
+
+ /*
+ * Set modified bit gratuitously for writeable mappings if
+ * the page is unmanaged. We do not want to take a fault
+ * to do the dirty bit accounting for these mappings.
+ */
+ if ((m->oflags & VPO_UNMANAGED) != 0) {
+ if (prot & VM_PROT_WRITE)
+ new_l3 |= PTE_D;
+ } else
new_l3 |= PTE_SW_MANAGED;
CTR2(KTR_PMAP, "pmap_enter: %.16lx -> %.16lx", va, pa);
More information about the svn-src-all
mailing list