Print this page
segop_getpolicy already checks for a NULL op

Split Close
Expand all
Collapse all
          --- old/usr/src/uts/common/vm/seg_kmem.c
          +++ new/usr/src/uts/common/vm/seg_kmem.c
↓ open down ↓ 742 lines elided ↑ open up ↑
 743  743           */
 744  744          if (segkp_bitmap && seg == &kvseg &&
 745  745              BT_TEST(segkp_bitmap, btop((uintptr_t)(addr - seg->s_base))))
 746  746                  return (segop_getmemid(segkp, addr, memidp));
 747  747  
 748  748          panic("segkmem badop");
 749  749          return (0);
 750  750  }
 751  751  
 752  752  /*ARGSUSED*/
 753      -static lgrp_mem_policy_info_t *
 754      -segkmem_getpolicy(struct seg *seg, caddr_t addr)
 755      -{
 756      -        return (NULL);
 757      -}
 758      -
 759      -/*ARGSUSED*/
 760  753  static int
 761  754  segkmem_capable(struct seg *seg, segcapability_t capability)
 762  755  {
 763  756          if (capability == S_CAPABILITY_NOMINFLT)
 764  757                  return (1);
 765  758          return (0);
 766  759  }
 767  760  
 768  761  static struct seg_ops segkmem_ops = {
 769  762          .fault          = segkmem_fault,
 770  763          .setprot        = segkmem_setprot,
 771  764          .checkprot      = segkmem_checkprot,
 772  765          .kluster        = segkmem_kluster,
 773  766          .dump           = segkmem_dump,
 774  767          .pagelock       = segkmem_pagelock,
 775  768          .getmemid       = segkmem_getmemid,
 776      -        .getpolicy      = segkmem_getpolicy,
 777  769          .capable        = segkmem_capable,
 778  770  };
 779  771  
 780  772  int
 781  773  segkmem_zio_create(struct seg *seg)
 782  774  {
 783  775          ASSERT(seg->s_as == &kas && RW_WRITE_HELD(&kas.a_lock));
 784  776          seg->s_ops = &segkmem_ops;
 785  777          seg->s_data = &zvp;
 786  778          kas.a_size += seg->s_size;
↓ open down ↓ 835 lines elided ↑ open up ↑
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX