Module Name: src
Committed By: ryo
Date: Sat Sep 7 09:57:37 UTC 2019
Modified Files:
src/sys/arch/aarch64/aarch64: pmap.c
Log Message:
- remove incorrect KASSERT. mmap(2) with prot=PROT_WRITE calls pmap_enter(...,
PROT_WRITE) internally.
- fix to update page reference flags when only PROT_WRITE or PROT_EXECUTE
specified
To generate a diff of this commit:
cvs rdiff -u -r1.43 -r1.44 src/sys/arch/aarch64/aarch64/pmap.c
Please note that diffs are not public domain; they are subject to the
copyright notices on the relevant files.
Modified files:
Index: src/sys/arch/aarch64/aarch64/pmap.c
diff -u src/sys/arch/aarch64/aarch64/pmap.c:1.43 src/sys/arch/aarch64/aarch64/pmap.c:1.44
--- src/sys/arch/aarch64/aarch64/pmap.c:1.43 Thu Aug 15 10:24:26 2019
+++ src/sys/arch/aarch64/aarch64/pmap.c Sat Sep 7 09:57:37 2019
@@ -1,4 +1,4 @@
-/* $NetBSD: pmap.c,v 1.43 2019/08/15 10:24:26 skrll Exp $ */
+/* $NetBSD: pmap.c,v 1.44 2019/09/07 09:57:37 ryo Exp $ */
/*
* Copyright (c) 2017 Ryo Shimizu <[email protected]>
@@ -27,7 +27,7 @@
*/
#include <sys/cdefs.h>
-__KERNEL_RCSID(0, "$NetBSD: pmap.c,v 1.43 2019/08/15 10:24:26 skrll Exp $");
+__KERNEL_RCSID(0, "$NetBSD: pmap.c,v 1.44 2019/09/07 09:57:37 ryo Exp $");
#include "opt_arm_debug.h"
#include "opt_ddb.h"
@@ -1718,9 +1718,8 @@ _pmap_enter(struct pmap *pm, vaddr_t va,
/*
* read permission is treated as an access permission internally.
* require to add PROT_READ even if only PROT_WRITE or PROT_EXEC
- * for wired mapping.
*/
- if ((flags & PMAP_WIRED) && (prot & (VM_PROT_WRITE|VM_PROT_EXECUTE)))
+ if (prot & (VM_PROT_WRITE|VM_PROT_EXECUTE))
prot |= VM_PROT_READ;
mdattr = VM_PROT_READ | VM_PROT_WRITE;
@@ -1748,7 +1747,7 @@ _pmap_enter(struct pmap *pm, vaddr_t va,
if (pg != NULL) {
/* update referenced/modified flags */
VM_PAGE_TO_MD(pg)->mdpg_flags |=
- (flags & (VM_PROT_READ | VM_PROT_WRITE));
+ (prot & (VM_PROT_READ | VM_PROT_WRITE));
mdattr &= VM_PAGE_TO_MD(pg)->mdpg_flags;
}
@@ -1818,8 +1817,6 @@ _pmap_enter(struct pmap *pm, vaddr_t va,
int
pmap_enter(struct pmap *pm, vaddr_t va, paddr_t pa, vm_prot_t prot, u_int flags)
{
- KASSERT((prot & VM_PROT_READ) || !(prot & VM_PROT_WRITE));
-
return _pmap_enter(pm, va, pa, prot, flags, false);
}