On 4/20/07, pradeep singh <2500.pradeep@xxxxxxxxx
> wrote:
On 4/20/07, Adil Mujeeb <mujeeb.adil@xxxxxxxxx > wrote:
>
>
>
> On 4/19/07, pradeep singh <2500.pradeep@xxxxxxxxx> wrote:
> > On 4/19/07, Rajat Jain < rajat.noida.india@xxxxxxxxx> wrote:
> > > Hi,
> > >
> > > > ... the kernel thread is as sensitive as the kernel itself
> > > > for the page faults. It _should not_ fault, unless ofcourse if its a
> > > > vmalloc'ed area .. and that happens every other kernel path anyway....
> > >
> > > I have a doubt about the vmalloc'ed memory. Is the vmalloced chunk of
> > > memory allowed to be swapped out? Can it / Does it?
> > No, it is not swappable, you get non contigous chunks of memory
> > allocated using kmalloc actually. Therefore, IMHO it is not swappable.
> > please CMIIW.
>
>
> Pradeep it should be vmalloc rather than kmalloc???
Nope, i meant you get chunks of memory, each chunk allocated using
kmalloc and then given to you as a virtually contigous memory. All
this happends inside vmalloc you can say :).
HTH
~psr
>
> > My doubt arises
> > > from the fact that the memory for the loadable modules at module load
> > > time is allocated using vmalloc() ...
> > Yes, looks to me too :).But here is another question to all.
> > Why vmalloc is used to allocate memory for modules and not kmalloc?
> > Even though memory we can get using vmalloc is from a scarce pool.
> >
> > TIA
> > ~psr
> > >
> > > Thanks,
> > >
> > > Rajat
> > >
> > > --
> > > To unsubscribe from this list: send an email with
> > > "unsubscribe kernelnewbies" to ecartis@xxxxxxxxxxxx
> > > Please read the FAQ at http://kernelnewbies.org/FAQ
> > >
> > >
> >
> >
> > --
> > play the game
> >
> > --
> > To unsubscribe from this list: send an email with
> > "unsubscribe kernelnewbies" to ecartis@xxxxxxxxxxxx
> > Please read the FAQ at http://kernelnewbies.org/FAQ
> >
> >
>
>
--
play the game
--
To unsubscribe from this list: send an email with
"unsubscribe kernelnewbies" to ecartis@xxxxxxxxxxxx
Please read the FAQ at http://kernelnewbies.org/FAQ