Displaying 8 results from an estimated 8 matches for "map_lock".
Did you mean:
kmap_lock
2013 May 14
7
tools/misc/xencov.c: build failure on NetBSD
Hi,
tools/misc/xencov.c fails to build.
NetBSD does not have MAP_LOCKED.
Christoph
2019 Sep 05
0
DANGER WILL ROBINSON, DANGER
...nfrastructure without justification of
> > > why we need to avoid round trip is just too much really.
> >
> > Thinking a bit more about this, you can achieve the same thing without
> > adding a single line to any mm code. Instead of having mmap with
> > PROT_NONE | MAP_LOCKED you have userspace mmap some kvm device
> > file (i am assuming this is something you already have and can control the
> > mmap callback).
> >
> > So now kernel side you have a vma with a vm_operations_struct under your
> > control this means that everything you wan...
2011 Aug 24
0
Bug#639112: xen: DomU access to dual-ported RAM area on PCI card fails
...ss the DPM area like this (pseudo code):
fd = open("/dev/uio0");
dpm_addr = uio_get_addr("/sys/class/uio/uio0/maps/map0/addr");
dpm_size = uio_get_size("/sys/class/uio/uio0/maps/map0/size");
dpm_base = mmap(NULL, dpm_size, PROT_READ | PROT_WRITE,
MAP_LOCKED | MAP_POPULATE | MAP_SHARED,
fd, 0);
readl(dpm_base);
Although the "mmap()" function does not report an error, the following
is printed to the DomU console:
[ 357.817723] 1 multicall(s) failed: cpu 0
[ 357.820021] Pid: 636, comm: map_dpm Not tainted 2.6.32-5-xen-686 #1
[ 357....
2013 Feb 07
5
[PATCH v8] gcov: Coverage support
Updated set of patches for coverage.
Changes:
- change copyright lines
- use gcov: instead of cover: in commit comment
- use #ifdef in xen/common/sysctl.c instead of dummy inline function
- added base documentation in docs/misc
- added -h option to xencov
2020 Sep 10
9
[PATCH v3 0/7] mm/memory_hotplug: selective merging of system ram resources
Some add_memory*() users add memory in small, contiguous memory blocks.
Examples include virtio-mem, hyper-v balloon, and the XEN balloon.
This can quickly result in a lot of memory resources, whereby the actual
resource boundaries are not of interest (e.g., it might be relevant for
DIMMs, exposed via /proc/iomem to user space). We really want to merge
added resources in this scenario where
2019 Aug 09
6
[RFC PATCH v6 71/92] mm: add support for remote mapping
...own VM will map pages from the
introspected guest in order to eliminate round trips to the host kernel
(read/write guest pages).
The flow is as follows: the introspector identifies a guest physical
address where some information of interest is located. It creates a one
page anonymous mapping with MAP_LOCKED | MAP_POPULATE and calls the
kernel via an IOCTL on /dev/kvmmem giving the map virtual address and
the guest physical address as arguments. The kernel converts the map
va into a physical page (gpa in KVM-speak) and passes it to the host
kernel via a hypercall, along with the introspected guest gp...
2019 Aug 09
117
[RFC PATCH v6 00/92] VM introspection
The KVM introspection subsystem provides a facility for applications running
on the host or in a separate VM, to control the execution of other VM-s
(pause, resume, shutdown), query the state of the vCPUs (GPRs, MSRs etc.),
alter the page access bits in the shadow page tables (only for the hardware
backed ones, eg. Intel's EPT) and receive notifications when events of
interest have taken place
2019 Aug 09
117
[RFC PATCH v6 00/92] VM introspection
The KVM introspection subsystem provides a facility for applications running
on the host or in a separate VM, to control the execution of other VM-s
(pause, resume, shutdown), query the state of the vCPUs (GPRs, MSRs etc.),
alter the page access bits in the shadow page tables (only for the hardware
backed ones, eg. Intel's EPT) and receive notifications when events of
interest have taken place