/qemu/tests/tcg/multiarch/gdbstub/ |
H A D | test-proc-mappings.py | 1 """Test that gdbstub has access to proc mappings. 16 mappings = gdb.execute("info proc mappings", False, True) 17 report(isinstance(mappings, str), "Fetched the mappings from the inferior") 19 # report("/sha1" in mappings, "Found the test binary name in the mappings")
|
/qemu/util/ |
H A D | vfio-helpers.c | 86 * - Fixed mappings of HVAs are assigned "low" IOVAs in the range of 93 * mappings. At each qemu_vfio_dma_reset_temporary() call, the whole area 95 * mappings are completed before calling. 99 IOVAMapping *mappings; member 509 * VFIO may pin all memory inside mappings, resulting it in pinning in qemu_vfio_open_pci() 532 trace_qemu_vfio_dump_mapping(s->mappings[i].host, in qemu_vfio_dump_mappings() 533 s->mappings[i].iova, in qemu_vfio_dump_mappings() 534 s->mappings[i].size); in qemu_vfio_dump_mappings() 547 IOVAMapping *p = s->mappings; in qemu_vfio_find_mapping() 570 } else if (mid < &s->mappings[s->nr_mappings - 1] in qemu_vfio_find_mapping() [all …]
|
H A D | mmap-alloc.c | 97 * shared mappings. For shared mappings, all mappers have to specify in map_noreserve_effective() 106 * Accountable mappings in the kernel that can be affected by MAP_NORESEVE in map_noreserve_effective() 107 * are private writable mappings (see mm/mmap.c:accountable_mapping() in in map_noreserve_effective() 108 * Linux). For all shared or readonly mappings, MAP_NORESERVE is always in map_noreserve_effective() 118 * MAP_NORESERVE is globally ignored for applicable !hugetlb mappings when in map_noreserve_effective() 158 * On ppc64 mappings in the same segment (aka slice) must share the same in mmap_reserve() 240 /* Mappings in the same segment must share the same page size */ in mmap_guard_pagesize()
|
/qemu/linux-headers/asm-generic/ |
H A D | mman.h | 18 #define MCL_CURRENT 1 /* lock all current mappings */ 19 #define MCL_FUTURE 2 /* lock all future mappings */
|
/qemu/docs/devel/ |
H A D | tcg.rst | 118 * The direct branch cannot cross a page boundary. Memory mappings 179 mappings change, all caches in QEMU are physically indexed. This 182 In order to avoid invalidating the basic block chain when MMU mappings 200 map files. ``-perfmap`` is lightweight and produces only guest-host mappings. 214 Note that qemu-system generates mappings only for ``-kernel`` files in ELF
|
/qemu/linux-headers/asm-mips/ |
H A D | mman.h | 57 #define MS_INVALIDATE 0x0002 /* invalidate mappings & caches */ 63 #define MCL_CURRENT 1 /* lock all current mappings */ 64 #define MCL_FUTURE 2 /* lock all future mappings */
|
/qemu/tests/tcg/multiarch/ |
H A D | Makefile.target | 92 run-gdbstub-proc-mappings: sha1 96 --bin $< --test $(MULTIARCH_SRC)/gdbstub/test-proc-mappings.py, \ 97 proc mappings support) 153 run-gdbstub-proc-mappings run-gdbstub-thread-breakpoint \
|
/qemu/include/hw/xen/interface/ |
H A D | grant_table.h | 144 * @trans_grant in @trans_domid. No mappings are allowed. 154 * GTF_readonly: Restrict @domid to read-only mappings and accesses. [GST] 159 * mappings of the grant [GST] 322 * 3. Mappings should only be destroyed via GNTTABOP_unmap_grant_ref. If a 341 * GNTTABOP_unmap_grant_ref: Destroy one or more grant-reference mappings 349 * mappings will remain in the device or host TLBs. 480 * GNTTABOP_unmap_and_replace: Destroy one or more grant-reference mappings 488 * mappings will remain in the device or host TLBs.
|
H A D | arch-arm.h | 393 /* Virtio MMIO mappings */ 398 * vGIC mappings: Only one set of mapping is used by the guest. 402 /* vGIC v2 mappings */ 408 /* vGIC v3 mappings */ 428 /* PL011 mappings */
|
/qemu/tests/unit/ |
H A D | test-vmstate.c | 855 GTree *mappings; member 890 g_tree_destroy(domain->mappings); in destroy_domain() 898 domain->mappings = g_tree_new_full((GCompareDataFunc)interval_cmp, in domain_preload() 919 VMSTATE_GTREE_V(mappings, TestGTreeDomain, 1, 976 0x00, 0x0, 0x0, 0x2, /* 2 mappings */ 1020 domain->mappings = g_tree_new_full((GCompareDataFunc)interval_cmp, NULL, in create_first_domain() 1023 g_tree_insert(domain->mappings, a, map_a); in create_first_domain() 1024 g_tree_insert(domain->mappings, b, map_b); in create_first_domain() 1091 compare_trees(d1->mappings, d2->mappings, match_interval_mapping_node); in diff_domain() 1150 0x1, /* start of mappings */ [all …]
|
/qemu/hw/virtio/ |
H A D | virtio-iommu.c | 51 GTree *mappings; member 312 g_tree_foreach(domain->mappings, virtio_iommu_notify_unmap_cb, in virtio_iommu_detach_endpoint_from_domain() 368 domain->mappings = g_tree_new_full((GCompareDataFunc)interval_cmp, in virtio_iommu_get_domain() 386 g_tree_destroy(domain->mappings); in virtio_iommu_put_domain() 757 /* Replay domain mappings on the associated memory region */ in virtio_iommu_attach() 758 g_tree_foreach(domain->mappings, virtio_iommu_notify_map_cb, in virtio_iommu_attach() 825 mapping = g_tree_lookup(domain->mappings, (gpointer)interval); in virtio_iommu_map() 837 g_tree_insert(domain->mappings, interval, mapping); in virtio_iommu_map() 873 while (g_tree_lookup_extended(domain->mappings, &interval, in virtio_iommu_unmap() 883 g_tree_remove(domain->mappings, iter_key); in virtio_iommu_unmap() [all …]
|
H A D | vhost-iova-tree.c | 120 * Remove existing mappings from the IOVA-only and IOVA->HVA trees 182 * Remove existing mappings from the IOVA-only and GPA->IOVA trees
|
/qemu/docs/devel/testing/ |
H A D | main.rst | 475 mappings to distribution package names for a wide variety of third 476 party projects. ``lcitool`` applies the mappings to a list of build 506 ``lcitool/facts/mappings.yml``, listing its native package name on as 510 * Commit the ``mappings.yml`` change together with the regenerated test 515 * CI pipeline will run to validate that the changes to ``mappings.yml`` 521 contains the ``mappings.yml`` update. Then add the prerequisite and 531 Python runtime, QEMU uses a separate set of mappings that work with more 532 recent versions. These can be found in ``tests/lcitool/mappings.yml``. 566 * Edit the ``lcitool/facts/mappings.yml`` change to add entries for 576 * CI pipeline will run to validate that the changes to ``mappings.yml`` [all …]
|
/qemu/hw/xen/ |
H A D | xen-mapcache.c | 177 * Grant mappings must use XC_PAGE_SIZE granularity since we can't in xen_map_cache_init() 227 * and allow the kernel to destroy the previous mappings by replacing in xen_remap_bucket() 275 * We don't yet support upgrading mappings from RO to RW, to handle in xen_remap_bucket() 276 * models using ordinary address_space_rw(), foreign mappings ignore in xen_remap_bucket() 291 * We create dummy mappings where we are unable to create a foreign in xen_remap_bucket() 475 * QEMU generally doesn't expect these mappings to ever fail, so in xen_map_cache()
|
/qemu/hw/block/ |
H A D | pflash_cfi02.c | 78 uint8_t mappings; member 162 * Set up replicated mappings of the same region. 169 memory_region_init(&pfl->mem, OBJECT(pfl), "pflash", pfl->mappings * size); in pflash_setup_mappings() 170 pfl->mem_mappings = g_new(MemoryRegion, pfl->mappings); in pflash_setup_mappings() 171 for (i = 0; i < pfl->mappings; ++i) { in pflash_setup_mappings() 920 if (pfl->mappings > 1) { in pflash_cfi02_realize() 953 DEFINE_PROP_UINT8("mappings", PFlashCFI02, mappings, 0), 1017 qdev_prop_set_uint8(dev, "mappings", nb_mappings); in type_init()
|
/qemu/include/qemu/ |
H A D | iova-tree.h | 93 * Remove mappings from the tree that are covered by the map range 95 * all the mappings that are included in the provided range will be
|
H A D | cacheflush.h | 19 * mappings of the same physical page(s).
|
/qemu/hw/vfio/ |
H A D | listener.c | 85 * Sizing an enabled 64-bit BAR can cause spurious mappings to in vfio_listener_skipped_section() 286 * exceed the maximum number of possible DMA mappings over time. We assume in vfio_ram_discard_register_listener() 295 * also consuming DMA mappings. in vfio_ram_discard_register_listener() 319 warn_report("%s: possibly running out of DMA mappings. E.g., try" in vfio_ram_discard_register_listener() 321 " Maximum possible DMA mappings: %d, Maximum possible" in vfio_ram_discard_register_listener() 612 /* Allow unexpected mappings not to be fatal for RAM devices */ in vfio_container_region_add() 679 * remove any individual page mappings in the IOMMU which in vfio_listener_region_del() 1110 * Sync the whole mapped region (spanning multiple individual mappings) in vfio_ram_discard_query_dirty_bitmap()
|
/qemu/docs/system/ |
H A D | keys.rst.inc | 21 Switch to virtual console 'n'. Standard console mappings are:
|
/qemu/bsd-user/ |
H A D | bsd-mem.h | 163 * turns private file-backed mappings into anonymous mappings. in do_bsd_madvise() 164 * If all guest pages have PAGE_PASSTHROUGH set, mappings have the in do_bsd_madvise()
|
/qemu/tests/lcitool/ |
H A D | mappings.yml | 1 mappings:
|
/qemu/tests/functional/ |
H A D | test_aarch64_xlnx_versal.py | 34 self.wait_for_console_pattern('Checked W+X mappings: passed')
|
/qemu/ |
H A D | hmp-commands-info.hx | 204 .help = "show virtual to physical memory mappings", 211 Show virtual to physical memory mappings. 219 .help = "show the active virtual memory mappings", 226 Show the active virtual memory mappings.
|
/qemu/hw/alpha/ |
H A D | dp264.c | 4 * Choose CLIPPER IRQ mappings over, say, DP264, MONET, or WEBBRICK 88 * Init the chipset. Because we're using CLIPPER IRQ mappings, in clipper_init()
|
/qemu/include/system/ |
H A D | memory_mapping.h | 36 /* point-in-time snapshot of guest-visible physical mappings */
|