svn commit: r352930 - head/sys/arm64/arm64

Alan Cox alc at FreeBSD.org
Tue Oct 1 15:33:47 UTC 2019


Author: alc
Date: Tue Oct  1 15:33:47 2019
New Revision: 352930
URL: https://svnweb.freebsd.org/changeset/base/352930

Log:
  In short, pmap_enter_quick_locked("user space", ..., VM_PROT_READ) doesn't
  work.  More precisely, it doesn't set ATTR_AP(ATTR_AP_USER) in the page
  table entry, so any attempt to read from the mapped page by user space
  generates a page fault.  This problem has gone unnoticed because the page
  fault handler, vm_fault(), will ultimately call pmap_enter(), which
  replaces the non-working page table entry with one that has
  ATTR_AP(ATTR_AP_USER) set.
  
  This change reduces the number of page faults during a "buildworld" by
  about 19.4%.
  
  Reviewed by:	andrew, markj
  MFC after:	1 week
  Differential Revision:	https://reviews.freebsd.org/D21841

Modified:
  head/sys/arm64/arm64/pmap.c

Modified: head/sys/arm64/arm64/pmap.c
==============================================================================
--- head/sys/arm64/arm64/pmap.c	Tue Oct  1 15:10:35 2019	(r352929)
+++ head/sys/arm64/arm64/pmap.c	Tue Oct  1 15:33:47 2019	(r352930)
@@ -3752,8 +3752,8 @@ pmap_enter_quick_locked(pmap_t pmap, vm_offset_t va, v
 	    ATTR_AP(ATTR_AP_RO) | L3_PAGE;
 	if ((prot & VM_PROT_EXECUTE) == 0 || m->md.pv_memattr == DEVICE_MEMORY)
 		l3_val |= ATTR_XN;
-	else if (va < VM_MAXUSER_ADDRESS)
-		l3_val |= ATTR_PXN;
+	if (va < VM_MAXUSER_ADDRESS)
+		l3_val |= ATTR_AP(ATTR_AP_USER) | ATTR_PXN;
 
 	/*
 	 * Now validate mapping with RO protection


More information about the svn-src-head mailing list