Date: Sat, 4 Apr 2009 23:12:14 +0000 (UTC) From: Alan Cox <alc@FreeBSD.org> To: cvs-src-old@freebsd.org Subject: cvs commit: src/sys/arm/include vmparam.h src/sys/i386/include vmparam.h src/sys/vm vm_mmap.c Message-ID: <200904042313.n34NDTNN039993@repoman.freebsd.org>
next in thread | raw e-mail | index | archive | help
alc 2009-04-04 23:12:14 UTC
FreeBSD src repository
Modified files:
sys/arm/include vmparam.h
sys/i386/include vmparam.h
sys/vm vm_mmap.c
Log:
SVN rev 190705 on 2009-04-04 23:12:14Z by alc
Retire VM_PROT_READ_IS_EXEC. It was intended to be a micro-optimization,
but I see no benefit from it today.
VM_PROT_READ_IS_EXEC was only intended for use on processors that do not
distinguish between read and execute permission. On an mmap(2) or
mprotect(2), it automatically added execute permission if the caller
specified permissions included read permission. The hope was that this
would reduce the number of vm map entries needed to implement an address
space because there would be fewer neighboring vm map entries that differed
only in the presence or absence of VM_PROT_EXECUTE. (See vm/vm_mmap.c
revision 1.56.)
Today, I don't see any real applications that benefit from
VM_PROT_READ_IS_EXEC. In any case, vm map entries are now organized
as a self-adjusting binary search tree instead of an ordered list. So,
the need for coalescing vm map entries is not as great as it once was.
Revision Changes Path
1.14 +0 -2 src/sys/arm/include/vmparam.h
1.49 +0 -4 src/sys/i386/include/vmparam.h
1.229 +0 -12 src/sys/vm/vm_mmap.c
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?200904042313.n34NDTNN039993>
