On Tue, Apr 27, 2010 at 08:32:27AM -0600, Cam Macdonell wrote:
> >
> > +ram_addr_t qemu_ram_map(ram_addr_t size, void *host)
> > +{
> > + RAMBlock *new_block;
> > +
> > + size = TARGET_PAGE_ALIGN(size);
> > + new_block = qemu_malloc(sizeof(*new_block));
> > +
> > + new_block->host = host;
> > +
> > + new_block->offset = last_ram_offset;
> > + new_block->length = size;
> > +
> > + new_block->next = ram_blocks;
> > + ram_blocks = new_block;
> > +
> > + phys_ram_dirty = qemu_realloc(phys_ram_dirty,
> > + (last_ram_offset + size) >> TARGET_PAGE_BITS);
> > + memset(phys_ram_dirty + (last_ram_offset >> TARGET_PAGE_BITS),
> > + 0xff, size >> TARGET_PAGE_BITS);
> > +
> > + last_ram_offset += size;
> > +
> > + if (kvm_enabled())
> > + kvm_setup_guest_memory(new_block->host, size);
> > +
> > + return new_block->offset;
> > +}
> > +
> > ram_addr_t qemu_ram_alloc(ram_addr_t size)
> > {
> > RAMBlock *new_block;
> > --
> > 1.6.6.1
> >
>
> Sorry for being late to reply, is there a strong reason not to have
> the function handle the mmap itself? As As Anthony points out, that
> way we don't have worry about realloc changing the pointer in the
> function.
The caller might want a different protection for the memory map.
--
To unsubscribe from this list: send the line "unsubscribe kvm" in
the body of a message to [email protected]
More majordomo info at http://vger.kernel.org/majordomo-info.html