A good example to look at is the pci/xrpu.c file, that driver
barely does anything but a mmap.

Poul-Henning

In message <[EMAIL PROTECTED]>, Peter Edwards writes:
>Hi,
>Just trying to take some of the aforementioned "magic" out of i386_btop
>/ vtop :-)
>
>>    return( atop(vtophys(bktr->bigbuf) + offset) );
>
>atop  (I assume) stands for "address to page" (given a pointer, give the
>number of the page it is in)
>vtophys is "virtual to physical". (given a pointer in a virtual address
>space, find out the physical address of the backing memory.)
>
>My understanding is that mmap(2) will allocate a portion of the calling
>process's address space, and for each page it needs to map, will call
>the device's mmap function, giving it the calculated offset (and the
>protection attributes).
>
>The device's mmap returns the index of the physical page of the memory
>to be inserted under the virtual addresses the process sees.
>
>simplified_mmap_syscall_for_device(dev_t device, size_t len, off_t
>offset)
>{
>       caddr_t ptr = alloc_address_space(len);
>
>       assert(ptr % PAGESIZE == 0);
>
>       while (len) {
>               pageno = device->mmap(offset); /* Call device's mmap */
>               map_address_to_page(ptr, pageno);
>               len -= PAGESIZE;
>               offset += PAGESIZE;
>               ptr += PAGESIZE;
>       }
>}
>
>So, the call above is returning the page number (of the physical address
>(of bktr->bigbuf)).
>
>Of course, My ignorance will probably be corrected in due course!
>--
>Peter.
>
>
>To Unsubscribe: send mail to [EMAIL PROTECTED]
>with "unsubscribe freebsd-hackers" in the body of the message
>

--
Poul-Henning Kamp       | UNIX since Zilog Zeus 3.20
[EMAIL PROTECTED]         | TCP/IP since RFC 956
FreeBSD coreteam member | BSD since 4.3-tahoe    
Never attribute to malice what can adequately be explained by incompetence.


To Unsubscribe: send mail to [EMAIL PROTECTED]
with "unsubscribe freebsd-hackers" in the body of the message

Reply via email to