+sphinx.addnodesdocument)}( rawsourcechildren]( translations LanguagesNode)}(hhh](h pending_xref)}(hhh]docutils.nodesTextChinese (Simplified)}parenthsba attributes}(ids]classes]names]dupnames]backrefs] refdomainstdreftypedoc reftarget-/translations/zh_CN/admin-guide/mm/nommu-mmapmodnameN classnameN refexplicitutagnamehhh ubh)}(hhh]hChinese (Traditional)}hh2sbah}(h]h ]h"]h$]h&] refdomainh)reftypeh+ reftarget-/translations/zh_TW/admin-guide/mm/nommu-mmapmodnameN classnameN refexplicituh1hhh ubh)}(hhh]hItalian}hhFsbah}(h]h ]h"]h$]h&] refdomainh)reftypeh+ reftarget-/translations/it_IT/admin-guide/mm/nommu-mmapmodnameN classnameN refexplicituh1hhh ubh)}(hhh]hJapanese}hhZsbah}(h]h ]h"]h$]h&] refdomainh)reftypeh+ reftarget-/translations/ja_JP/admin-guide/mm/nommu-mmapmodnameN classnameN refexplicituh1hhh ubh)}(hhh]hKorean}hhnsbah}(h]h ]h"]h$]h&] refdomainh)reftypeh+ reftarget-/translations/ko_KR/admin-guide/mm/nommu-mmapmodnameN classnameN refexplicituh1hhh ubh)}(hhh]hSpanish}hhsbah}(h]h ]h"]h$]h&] refdomainh)reftypeh+ reftarget-/translations/sp_SP/admin-guide/mm/nommu-mmapmodnameN classnameN refexplicituh1hhh ubeh}(h]h ]h"]h$]h&]current_languageEnglishuh1h hh _documenthsourceNlineNubhsection)}(hhh](htitle)}(hNo-MMU memory mapping supporth]hNo-MMU memory mapping support}(hhhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhhhG/var/lib/git/docbuild/linux/Documentation/admin-guide/mm/nommu-mmap.rsthKubh paragraph)}(hXThe kernel has limited support for memory mapping under no-MMU conditions, such as are used in uClinux environments. From the userspace point of view, memory mapping is made use of in conjunction with the mmap() system call, the shmat() call and the execve() system call. From the kernel's point of view, execve() mapping is actually performed by the binfmt drivers, which call back into the mmap() routines to do the actual work.h]hXThe kernel has limited support for memory mapping under no-MMU conditions, such as are used in uClinux environments. From the userspace point of view, memory mapping is made use of in conjunction with the mmap() system call, the shmat() call and the execve() system call. From the kernel’s point of view, execve() mapping is actually performed by the binfmt drivers, which call back into the mmap() routines to do the actual work.}(hhhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhKhhhhubh)}(hMemory mapping behaviour also involves the way fork(), vfork(), clone() and ptrace() work. Under uClinux there is no fork(), and clone() must be supplied the CLONE_VM flag.h]hMemory mapping behaviour also involves the way fork(), vfork(), clone() and ptrace() work. Under uClinux there is no fork(), and clone() must be supplied the CLONE_VM flag.}(hhhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhK hhhhubh)}(hThe behaviour is similar between the MMU and no-MMU cases, but not identical; and it's also much more restricted in the latter case:h]hThe behaviour is similar between the MMU and no-MMU cases, but not identical; and it’s also much more restricted in the latter case:}(hhhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhKhhhhubh block_quote)}(hX(#) Anonymous mapping, MAP_PRIVATE In the MMU case: VM regions backed by arbitrary pages; copy-on-write across fork. In the no-MMU case: VM regions backed by arbitrary contiguous runs of pages. (#) Anonymous mapping, MAP_SHARED These behave very much like private mappings, except that they're shared across fork() or clone() without CLONE_VM in the MMU case. Since the no-MMU case doesn't support these, behaviour is identical to MAP_PRIVATE there. (#) File, MAP_PRIVATE, PROT_READ / PROT_EXEC, !PROT_WRITE In the MMU case: VM regions backed by pages read from file; changes to the underlying file are reflected in the mapping; copied across fork. In the no-MMU case: - If one exists, the kernel will re-use an existing mapping to the same segment of the same file if that has compatible permissions, even if this was created by another process. - If possible, the file mapping will be directly on the backing device if the backing device has the NOMMU_MAP_DIRECT capability and appropriate mapping protection capabilities. Ramfs, romfs, cramfs and mtd might all permit this. - If the backing device can't or won't permit direct sharing, but does have the NOMMU_MAP_COPY capability, then a copy of the appropriate bit of the file will be read into a contiguous bit of memory and any extraneous space beyond the EOF will be cleared - Writes to the file do not affect the mapping; writes to the mapping are visible in other processes (no MMU protection), but should not happen. (#) File, MAP_PRIVATE, PROT_READ / PROT_EXEC, PROT_WRITE In the MMU case: like the non-PROT_WRITE case, except that the pages in question get copied before the write actually happens. From that point on writes to the file underneath that page no longer get reflected into the mapping's backing pages. The page is then backed by swap instead. In the no-MMU case: works much like the non-PROT_WRITE case, except that a copy is always taken and never shared. (#) Regular file / blockdev, MAP_SHARED, PROT_READ / PROT_EXEC / PROT_WRITE In the MMU case: VM regions backed by pages read from file; changes to pages written back to file; writes to file reflected into pages backing mapping; shared across fork. In the no-MMU case: not supported. (#) Memory backed regular file, MAP_SHARED, PROT_READ / PROT_EXEC / PROT_WRITE In the MMU case: As for ordinary regular files. In the no-MMU case: The filesystem providing the memory-backed file (such as ramfs or tmpfs) may choose to honour an open, truncate, mmap sequence by providing a contiguous sequence of pages to map. In that case, a shared-writable memory mapping will be possible. It will work as for the MMU case. If the filesystem does not provide any such support, then the mapping request will be denied. (#) Memory backed blockdev, MAP_SHARED, PROT_READ / PROT_EXEC / PROT_WRITE In the MMU case: As for ordinary regular files. In the no-MMU case: As for memory backed regular files, but the blockdev must be able to provide a contiguous run of pages without truncate being called. The ramdisk driver could do this if it allocated all its memory as a contiguous array upfront. (#) Memory backed chardev, MAP_SHARED, PROT_READ / PROT_EXEC / PROT_WRITE In the MMU case: As for ordinary regular files. In the no-MMU case: The character device driver may choose to honour the mmap() by providing direct access to the underlying device if it provides memory or quasi-memory that can be accessed directly. Examples of such are frame buffers and flash devices. If the driver does not provide any such support, then the mapping request will be denied. h]henumerated_list)}(hhh](h list_item)}(hAnonymous mapping, MAP_PRIVATE In the MMU case: VM regions backed by arbitrary pages; copy-on-write across fork. In the no-MMU case: VM regions backed by arbitrary contiguous runs of pages. h](h)}(hAnonymous mapping, MAP_PRIVATEh]hAnonymous mapping, MAP_PRIVATE}(hhhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhKhhubh)}(hIn the MMU case: VM regions backed by arbitrary pages; copy-on-write across fork. In the no-MMU case: VM regions backed by arbitrary contiguous runs of pages. h](h)}(hQIn the MMU case: VM regions backed by arbitrary pages; copy-on-write across fork.h]hQIn the MMU case: VM regions backed by arbitrary pages; copy-on-write across fork.}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhKhjubh)}(hLIn the no-MMU case: VM regions backed by arbitrary contiguous runs of pages.h]hLIn the no-MMU case: VM regions backed by arbitrary contiguous runs of pages.}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhKhjubeh}(h]h ]h"]h$]h&]uh1hhhhKhhubeh}(h]h ]h"]h$]h&]uh1hhhubh)}(hX Anonymous mapping, MAP_SHARED These behave very much like private mappings, except that they're shared across fork() or clone() without CLONE_VM in the MMU case. Since the no-MMU case doesn't support these, behaviour is identical to MAP_PRIVATE there. h](h)}(hAnonymous mapping, MAP_SHAREDh]hAnonymous mapping, MAP_SHARED}(hj2hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhKhj.ubh)}(hThese behave very much like private mappings, except that they're shared across fork() or clone() without CLONE_VM in the MMU case. Since the no-MMU case doesn't support these, behaviour is identical to MAP_PRIVATE there. h]h)}(hThese behave very much like private mappings, except that they're shared across fork() or clone() without CLONE_VM in the MMU case. Since the no-MMU case doesn't support these, behaviour is identical to MAP_PRIVATE there.h]hThese behave very much like private mappings, except that they’re shared across fork() or clone() without CLONE_VM in the MMU case. Since the no-MMU case doesn’t support these, behaviour is identical to MAP_PRIVATE there.}(hjDhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhKhj@ubah}(h]h ]h"]h$]h&]uh1hhhhKhj.ubeh}(h]h ]h"]h$]h&]uh1hhhubh)}(hXZFile, MAP_PRIVATE, PROT_READ / PROT_EXEC, !PROT_WRITE In the MMU case: VM regions backed by pages read from file; changes to the underlying file are reflected in the mapping; copied across fork. In the no-MMU case: - If one exists, the kernel will re-use an existing mapping to the same segment of the same file if that has compatible permissions, even if this was created by another process. - If possible, the file mapping will be directly on the backing device if the backing device has the NOMMU_MAP_DIRECT capability and appropriate mapping protection capabilities. Ramfs, romfs, cramfs and mtd might all permit this. - If the backing device can't or won't permit direct sharing, but does have the NOMMU_MAP_COPY capability, then a copy of the appropriate bit of the file will be read into a contiguous bit of memory and any extraneous space beyond the EOF will be cleared - Writes to the file do not affect the mapping; writes to the mapping are visible in other processes (no MMU protection), but should not happen. h](h)}(h5File, MAP_PRIVATE, PROT_READ / PROT_EXEC, !PROT_WRITEh]h5File, MAP_PRIVATE, PROT_READ / PROT_EXEC, !PROT_WRITE}(hjbhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhK"hj^ubh)}(hXIn the MMU case: VM regions backed by pages read from file; changes to the underlying file are reflected in the mapping; copied across fork. In the no-MMU case: - If one exists, the kernel will re-use an existing mapping to the same segment of the same file if that has compatible permissions, even if this was created by another process. - If possible, the file mapping will be directly on the backing device if the backing device has the NOMMU_MAP_DIRECT capability and appropriate mapping protection capabilities. Ramfs, romfs, cramfs and mtd might all permit this. - If the backing device can't or won't permit direct sharing, but does have the NOMMU_MAP_COPY capability, then a copy of the appropriate bit of the file will be read into a contiguous bit of memory and any extraneous space beyond the EOF will be cleared - Writes to the file do not affect the mapping; writes to the mapping are visible in other processes (no MMU protection), but should not happen. h](h)}(hIn the MMU case: VM regions backed by pages read from file; changes to the underlying file are reflected in the mapping; copied across fork.h]hIn the MMU case: VM regions backed by pages read from file; changes to the underlying file are reflected in the mapping; copied across fork.}(hjthhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhK$hjpubh)}(hIn the no-MMU case:h]hIn the no-MMU case:}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhK'hjpubh)}(hX?- If one exists, the kernel will re-use an existing mapping to the same segment of the same file if that has compatible permissions, even if this was created by another process. - If possible, the file mapping will be directly on the backing device if the backing device has the NOMMU_MAP_DIRECT capability and appropriate mapping protection capabilities. Ramfs, romfs, cramfs and mtd might all permit this. - If the backing device can't or won't permit direct sharing, but does have the NOMMU_MAP_COPY capability, then a copy of the appropriate bit of the file will be read into a contiguous bit of memory and any extraneous space beyond the EOF will be cleared - Writes to the file do not affect the mapping; writes to the mapping are visible in other processes (no MMU protection), but should not happen. h]h bullet_list)}(hhh](h)}(hIf one exists, the kernel will re-use an existing mapping to the same segment of the same file if that has compatible permissions, even if this was created by another process. h]h)}(hIf one exists, the kernel will re-use an existing mapping to the same segment of the same file if that has compatible permissions, even if this was created by another process.h]hIf one exists, the kernel will re-use an existing mapping to the same segment of the same file if that has compatible permissions, even if this was created by another process.}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhK)hjubah}(h]h ]h"]h$]h&]uh1hhjubh)}(hIf possible, the file mapping will be directly on the backing device if the backing device has the NOMMU_MAP_DIRECT capability and appropriate mapping protection capabilities. Ramfs, romfs, cramfs and mtd might all permit this. h]h)}(hIf possible, the file mapping will be directly on the backing device if the backing device has the NOMMU_MAP_DIRECT capability and appropriate mapping protection capabilities. Ramfs, romfs, cramfs and mtd might all permit this.h]hIf possible, the file mapping will be directly on the backing device if the backing device has the NOMMU_MAP_DIRECT capability and appropriate mapping protection capabilities. Ramfs, romfs, cramfs and mtd might all permit this.}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhK-hjubah}(h]h ]h"]h$]h&]uh1hhjubh)}(hIf the backing device can't or won't permit direct sharing, but does have the NOMMU_MAP_COPY capability, then a copy of the appropriate bit of the file will be read into a contiguous bit of memory and any extraneous space beyond the EOF will be cleared h]h)}(hIf the backing device can't or won't permit direct sharing, but does have the NOMMU_MAP_COPY capability, then a copy of the appropriate bit of the file will be read into a contiguous bit of memory and any extraneous space beyond the EOF will be clearedh]hXIf the backing device can’t or won’t permit direct sharing, but does have the NOMMU_MAP_COPY capability, then a copy of the appropriate bit of the file will be read into a contiguous bit of memory and any extraneous space beyond the EOF will be cleared}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhK2hjubah}(h]h ]h"]h$]h&]uh1hhjubh)}(hWrites to the file do not affect the mapping; writes to the mapping are visible in other processes (no MMU protection), but should not happen. h]h)}(hWrites to the file do not affect the mapping; writes to the mapping are visible in other processes (no MMU protection), but should not happen.h]hWrites to the file do not affect the mapping; writes to the mapping are visible in other processes (no MMU protection), but should not happen.}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhK7hjubah}(h]h ]h"]h$]h&]uh1hhjubeh}(h]h ]h"]h$]h&]bullet-uh1jhhhK)hjubah}(h]h ]h"]h$]h&]uh1hhhhK)hjpubeh}(h]h ]h"]h$]h&]uh1hhhhK$hj^ubeh}(h]h ]h"]h$]h&]uh1hhhubh)}(hXFile, MAP_PRIVATE, PROT_READ / PROT_EXEC, PROT_WRITE In the MMU case: like the non-PROT_WRITE case, except that the pages in question get copied before the write actually happens. From that point on writes to the file underneath that page no longer get reflected into the mapping's backing pages. The page is then backed by swap instead. In the no-MMU case: works much like the non-PROT_WRITE case, except that a copy is always taken and never shared. h](h)}(h4File, MAP_PRIVATE, PROT_READ / PROT_EXEC, PROT_WRITEh]h4File, MAP_PRIVATE, PROT_READ / PROT_EXEC, PROT_WRITE}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhK;hjubh)}(hXIn the MMU case: like the non-PROT_WRITE case, except that the pages in question get copied before the write actually happens. From that point on writes to the file underneath that page no longer get reflected into the mapping's backing pages. The page is then backed by swap instead. In the no-MMU case: works much like the non-PROT_WRITE case, except that a copy is always taken and never shared. h](h)}(hXIn the MMU case: like the non-PROT_WRITE case, except that the pages in question get copied before the write actually happens. From that point on writes to the file underneath that page no longer get reflected into the mapping's backing pages. The page is then backed by swap instead.h]hXIn the MMU case: like the non-PROT_WRITE case, except that the pages in question get copied before the write actually happens. From that point on writes to the file underneath that page no longer get reflected into the mapping’s backing pages. The page is then backed by swap instead.}(hj)hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhK=hj%ubh)}(hqIn the no-MMU case: works much like the non-PROT_WRITE case, except that a copy is always taken and never shared.h]hqIn the no-MMU case: works much like the non-PROT_WRITE case, except that a copy is always taken and never shared.}(hj7hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhKBhj%ubeh}(h]h ]h"]h$]h&]uh1hhhhK=hjubeh}(h]h ]h"]h$]h&]uh1hhhubh)}(hX%Regular file / blockdev, MAP_SHARED, PROT_READ / PROT_EXEC / PROT_WRITE In the MMU case: VM regions backed by pages read from file; changes to pages written back to file; writes to file reflected into pages backing mapping; shared across fork. In the no-MMU case: not supported. h](h)}(hGRegular file / blockdev, MAP_SHARED, PROT_READ / PROT_EXEC / PROT_WRITEh]hGRegular file / blockdev, MAP_SHARED, PROT_READ / PROT_EXEC / PROT_WRITE}(hjUhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhKEhjQubh)}(hIn the MMU case: VM regions backed by pages read from file; changes to pages written back to file; writes to file reflected into pages backing mapping; shared across fork. In the no-MMU case: not supported. h](h)}(hIn the MMU case: VM regions backed by pages read from file; changes to pages written back to file; writes to file reflected into pages backing mapping; shared across fork.h]hIn the MMU case: VM regions backed by pages read from file; changes to pages written back to file; writes to file reflected into pages backing mapping; shared across fork.}(hjghhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhKGhjcubh)}(h"In the no-MMU case: not supported.h]h"In the no-MMU case: not supported.}(hjuhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhKKhjcubeh}(h]h ]h"]h$]h&]uh1hhhhKGhjQubeh}(h]h ]h"]h$]h&]uh1hhhubh)}(hXMemory backed regular file, MAP_SHARED, PROT_READ / PROT_EXEC / PROT_WRITE In the MMU case: As for ordinary regular files. In the no-MMU case: The filesystem providing the memory-backed file (such as ramfs or tmpfs) may choose to honour an open, truncate, mmap sequence by providing a contiguous sequence of pages to map. In that case, a shared-writable memory mapping will be possible. It will work as for the MMU case. If the filesystem does not provide any such support, then the mapping request will be denied. h](h)}(hJMemory backed regular file, MAP_SHARED, PROT_READ / PROT_EXEC / PROT_WRITEh]hJMemory backed regular file, MAP_SHARED, PROT_READ / PROT_EXEC / PROT_WRITE}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhKMhjubh)}(hXIn the MMU case: As for ordinary regular files. In the no-MMU case: The filesystem providing the memory-backed file (such as ramfs or tmpfs) may choose to honour an open, truncate, mmap sequence by providing a contiguous sequence of pages to map. In that case, a shared-writable memory mapping will be possible. It will work as for the MMU case. If the filesystem does not provide any such support, then the mapping request will be denied. h](h)}(h/In the MMU case: As for ordinary regular files.h]h/In the MMU case: As for ordinary regular files.}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhKOhjubh)}(hXIn the no-MMU case: The filesystem providing the memory-backed file (such as ramfs or tmpfs) may choose to honour an open, truncate, mmap sequence by providing a contiguous sequence of pages to map. In that case, a shared-writable memory mapping will be possible. It will work as for the MMU case. If the filesystem does not provide any such support, then the mapping request will be denied.h]hXIn the no-MMU case: The filesystem providing the memory-backed file (such as ramfs or tmpfs) may choose to honour an open, truncate, mmap sequence by providing a contiguous sequence of pages to map. In that case, a shared-writable memory mapping will be possible. It will work as for the MMU case. If the filesystem does not provide any such support, then the mapping request will be denied.}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhKQhjubeh}(h]h ]h"]h$]h&]uh1hhhhKOhjubeh}(h]h ]h"]h$]h&]uh1hhhubh)}(hXMemory backed blockdev, MAP_SHARED, PROT_READ / PROT_EXEC / PROT_WRITE In the MMU case: As for ordinary regular files. In the no-MMU case: As for memory backed regular files, but the blockdev must be able to provide a contiguous run of pages without truncate being called. The ramdisk driver could do this if it allocated all its memory as a contiguous array upfront. h](h)}(hFMemory backed blockdev, MAP_SHARED, PROT_READ / PROT_EXEC / PROT_WRITEh]hFMemory backed blockdev, MAP_SHARED, PROT_READ / PROT_EXEC / PROT_WRITE}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhKXhjubh)}(hX*In the MMU case: As for ordinary regular files. In the no-MMU case: As for memory backed regular files, but the blockdev must be able to provide a contiguous run of pages without truncate being called. The ramdisk driver could do this if it allocated all its memory as a contiguous array upfront. h](h)}(h/In the MMU case: As for ordinary regular files.h]h/In the MMU case: As for ordinary regular files.}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhKZhjubh)}(hIn the no-MMU case: As for memory backed regular files, but the blockdev must be able to provide a contiguous run of pages without truncate being called. The ramdisk driver could do this if it allocated all its memory as a contiguous array upfront.h]hIn the no-MMU case: As for memory backed regular files, but the blockdev must be able to provide a contiguous run of pages without truncate being called. The ramdisk driver could do this if it allocated all its memory as a contiguous array upfront.}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhK\hjubeh}(h]h ]h"]h$]h&]uh1hhhhKZhjubeh}(h]h ]h"]h$]h&]uh1hhhubh)}(hXMemory backed chardev, MAP_SHARED, PROT_READ / PROT_EXEC / PROT_WRITE In the MMU case: As for ordinary regular files. In the no-MMU case: The character device driver may choose to honour the mmap() by providing direct access to the underlying device if it provides memory or quasi-memory that can be accessed directly. Examples of such are frame buffers and flash devices. If the driver does not provide any such support, then the mapping request will be denied. h](h)}(hEMemory backed chardev, MAP_SHARED, PROT_READ / PROT_EXEC / PROT_WRITEh]hEMemory backed chardev, MAP_SHARED, PROT_READ / PROT_EXEC / PROT_WRITE}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhKahj ubh)}(hXIn the MMU case: As for ordinary regular files. In the no-MMU case: The character device driver may choose to honour the mmap() by providing direct access to the underlying device if it provides memory or quasi-memory that can be accessed directly. Examples of such are frame buffers and flash devices. If the driver does not provide any such support, then the mapping request will be denied. h](h)}(h/In the MMU case: As for ordinary regular files.h]h/In the MMU case: As for ordinary regular files.}(hj!hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhKchjubh)}(hXXIn the no-MMU case: The character device driver may choose to honour the mmap() by providing direct access to the underlying device if it provides memory or quasi-memory that can be accessed directly. Examples of such are frame buffers and flash devices. If the driver does not provide any such support, then the mapping request will be denied.h]hXXIn the no-MMU case: The character device driver may choose to honour the mmap() by providing direct access to the underlying device if it provides memory or quasi-memory that can be accessed directly. Examples of such are frame buffers and flash devices. If the driver does not provide any such support, then the mapping request will be denied.}(hj/hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhKehjubeh}(h]h ]h"]h$]h&]uh1hhhhKchj ubeh}(h]h ]h"]h$]h&]uh1hhhubeh}(h]h ]h"]h$]h&]enumtypearabicprefix(suffix)uh1hhhubah}(h]h ]h"]h$]h&]uh1hhhhKhhhhubh)}(hhh](h)}(hFurther notes on no-MMU MMAPh]hFurther notes on no-MMU MMAP}(hj^hhhNhNubah}(h]h ]h"]h$]h&]uh1hhj[hhhhhKmubh)}(hXs (#) A request for a private mapping of a file may return a buffer that is not page-aligned. This is because XIP may take place, and the data may not be paged aligned in the backing store. (#) A request for an anonymous mapping will always be page aligned. If possible the size of the request should be a power of two otherwise some of the space may be wasted as the kernel must allocate a power-of-2 granule but will only discard the excess if appropriately configured as this has an effect on fragmentation. (#) The memory allocated by a request for an anonymous mapping will normally be cleared by the kernel before being returned in accordance with the Linux man pages (ver 2.22 or later). In the MMU case this can be achieved with reasonable performance as regions are backed by virtual pages, with the contents only being mapped to cleared physical pages when a write happens on that specific page (prior to which, the pages are effectively mapped to the global zero page from which reads can take place). This spreads out the time it takes to initialize the contents of a page - depending on the write-usage of the mapping. In the no-MMU case, however, anonymous mappings are backed by physical pages, and the entire map is cleared at allocation time. This can cause significant delays during a userspace malloc() as the C library does an anonymous mapping and the kernel then does a memset for the entire map. However, for memory that isn't required to be precleared - such as that returned by malloc() - mmap() can take a MAP_UNINITIALIZED flag to indicate to the kernel that it shouldn't bother clearing the memory before returning it. Note that CONFIG_MMAP_ALLOW_UNINITIALIZED must be enabled to permit this, otherwise the flag will be ignored. uClibc uses this to speed up malloc(), and the ELF-FDPIC binfmt uses this to allocate the brk and stack region. (#) A list of all the private copy and anonymous mappings on the system is visible through /proc/maps in no-MMU mode. (#) A list of all the mappings in use by a process is visible through /proc//maps in no-MMU mode. (#) Supplying MAP_FIXED or a requesting a particular mapping address will result in an error. (#) Files mapped privately usually have to have a read method provided by the driver or filesystem so that the contents can be read into the memory allocated if mmap() chooses not to map the backing device directly. An error will result if they don't. This is most likely to be encountered with character device files, pipes, fifos and sockets. h]h)}(hhh](h)}(hA request for a private mapping of a file may return a buffer that is not page-aligned. This is because XIP may take place, and the data may not be paged aligned in the backing store. h]h)}(hA request for a private mapping of a file may return a buffer that is not page-aligned. This is because XIP may take place, and the data may not be paged aligned in the backing store.h]hA request for a private mapping of a file may return a buffer that is not page-aligned. This is because XIP may take place, and the data may not be paged aligned in the backing store.}(hjwhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhKohjsubah}(h]h ]h"]h$]h&]uh1hhjpubh)}(hX>A request for an anonymous mapping will always be page aligned. If possible the size of the request should be a power of two otherwise some of the space may be wasted as the kernel must allocate a power-of-2 granule but will only discard the excess if appropriately configured as this has an effect on fragmentation. h]h)}(hX=A request for an anonymous mapping will always be page aligned. If possible the size of the request should be a power of two otherwise some of the space may be wasted as the kernel must allocate a power-of-2 granule but will only discard the excess if appropriately configured as this has an effect on fragmentation.h]hX=A request for an anonymous mapping will always be page aligned. If possible the size of the request should be a power of two otherwise some of the space may be wasted as the kernel must allocate a power-of-2 granule but will only discard the excess if appropriately configured as this has an effect on fragmentation.}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhKshjubah}(h]h ]h"]h$]h&]uh1hhjpubh)}(hXQThe memory allocated by a request for an anonymous mapping will normally be cleared by the kernel before being returned in accordance with the Linux man pages (ver 2.22 or later). In the MMU case this can be achieved with reasonable performance as regions are backed by virtual pages, with the contents only being mapped to cleared physical pages when a write happens on that specific page (prior to which, the pages are effectively mapped to the global zero page from which reads can take place). This spreads out the time it takes to initialize the contents of a page - depending on the write-usage of the mapping. In the no-MMU case, however, anonymous mappings are backed by physical pages, and the entire map is cleared at allocation time. This can cause significant delays during a userspace malloc() as the C library does an anonymous mapping and the kernel then does a memset for the entire map. However, for memory that isn't required to be precleared - such as that returned by malloc() - mmap() can take a MAP_UNINITIALIZED flag to indicate to the kernel that it shouldn't bother clearing the memory before returning it. Note that CONFIG_MMAP_ALLOW_UNINITIALIZED must be enabled to permit this, otherwise the flag will be ignored. uClibc uses this to speed up malloc(), and the ELF-FDPIC binfmt uses this to allocate the brk and stack region. h](h)}(hThe memory allocated by a request for an anonymous mapping will normally be cleared by the kernel before being returned in accordance with the Linux man pages (ver 2.22 or later).h]hThe memory allocated by a request for an anonymous mapping will normally be cleared by the kernel before being returned in accordance with the Linux man pages (ver 2.22 or later).}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhKyhjubh)}(hXIn the MMU case this can be achieved with reasonable performance as regions are backed by virtual pages, with the contents only being mapped to cleared physical pages when a write happens on that specific page (prior to which, the pages are effectively mapped to the global zero page from which reads can take place). This spreads out the time it takes to initialize the contents of a page - depending on the write-usage of the mapping.h]hXIn the MMU case this can be achieved with reasonable performance as regions are backed by virtual pages, with the contents only being mapped to cleared physical pages when a write happens on that specific page (prior to which, the pages are effectively mapped to the global zero page from which reads can take place). This spreads out the time it takes to initialize the contents of a page - depending on the write-usage of the mapping.}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhK}hjubh)}(hXIn the no-MMU case, however, anonymous mappings are backed by physical pages, and the entire map is cleared at allocation time. This can cause significant delays during a userspace malloc() as the C library does an anonymous mapping and the kernel then does a memset for the entire map.h]hXIn the no-MMU case, however, anonymous mappings are backed by physical pages, and the entire map is cleared at allocation time. This can cause significant delays during a userspace malloc() as the C library does an anonymous mapping and the kernel then does a memset for the entire map.}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhKhjubh)}(hXRHowever, for memory that isn't required to be precleared - such as that returned by malloc() - mmap() can take a MAP_UNINITIALIZED flag to indicate to the kernel that it shouldn't bother clearing the memory before returning it. Note that CONFIG_MMAP_ALLOW_UNINITIALIZED must be enabled to permit this, otherwise the flag will be ignored.h]hXVHowever, for memory that isn’t required to be precleared - such as that returned by malloc() - mmap() can take a MAP_UNINITIALIZED flag to indicate to the kernel that it shouldn’t bother clearing the memory before returning it. Note that CONFIG_MMAP_ALLOW_UNINITIALIZED must be enabled to permit this, otherwise the flag will be ignored.}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhKhjubh)}(houClibc uses this to speed up malloc(), and the ELF-FDPIC binfmt uses this to allocate the brk and stack region.h]houClibc uses this to speed up malloc(), and the ELF-FDPIC binfmt uses this to allocate the brk and stack region.}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhKhjubeh}(h]h ]h"]h$]h&]uh1hhjpubh)}(hrA list of all the private copy and anonymous mappings on the system is visible through /proc/maps in no-MMU mode. h]h)}(hqA list of all the private copy and anonymous mappings on the system is visible through /proc/maps in no-MMU mode.h]hqA list of all the private copy and anonymous mappings on the system is visible through /proc/maps in no-MMU mode.}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhKhjubah}(h]h ]h"]h$]h&]uh1hhjpubh)}(hcA list of all the mappings in use by a process is visible through /proc//maps in no-MMU mode. h]h)}(hbA list of all the mappings in use by a process is visible through /proc//maps in no-MMU mode.h]hbA list of all the mappings in use by a process is visible through /proc//maps in no-MMU mode.}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhKhj ubah}(h]h ]h"]h$]h&]uh1hhjpubh)}(hZSupplying MAP_FIXED or a requesting a particular mapping address will result in an error. h]h)}(hYSupplying MAP_FIXED or a requesting a particular mapping address will result in an error.h]hYSupplying MAP_FIXED or a requesting a particular mapping address will result in an error.}(hj'hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhKhj#ubah}(h]h ]h"]h$]h&]uh1hhjpubh)}(hXVFiles mapped privately usually have to have a read method provided by the driver or filesystem so that the contents can be read into the memory allocated if mmap() chooses not to map the backing device directly. An error will result if they don't. This is most likely to be encountered with character device files, pipes, fifos and sockets. h]h)}(hXTFiles mapped privately usually have to have a read method provided by the driver or filesystem so that the contents can be read into the memory allocated if mmap() chooses not to map the backing device directly. An error will result if they don't. This is most likely to be encountered with character device files, pipes, fifos and sockets.h]hXVFiles mapped privately usually have to have a read method provided by the driver or filesystem so that the contents can be read into the memory allocated if mmap() chooses not to map the backing device directly. An error will result if they don’t. This is most likely to be encountered with character device files, pipes, fifos and sockets.}(hj?hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhKhj;ubah}(h]h ]h"]h$]h&]uh1hhjpubeh}(h]h ]h"]h$]h&]jOjPjQjRjSjTuh1hhjlubah}(h]h ]h"]h$]h&]uh1hhhhKohj[hhubeh}(h]further-notes-on-no-mmu-mmapah ]h"]further notes on no-mmu mmapah$]h&]uh1hhhhhhhhKmubh)}(hhh](h)}(hInterprocess shared memoryh]hInterprocess shared memory}(hjjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhjghhhhhKubh)}(hBoth SYSV IPC SHM shared memory and POSIX shared memory is supported in NOMMU mode. The former through the usual mechanism, the latter through files created on ramfs or tmpfs mounts.h]hBoth SYSV IPC SHM shared memory and POSIX shared memory is supported in NOMMU mode. The former through the usual mechanism, the latter through files created on ramfs or tmpfs mounts.}(hjxhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhKhjghhubeh}(h]interprocess-shared-memoryah ]h"]interprocess shared memoryah$]h&]uh1hhhhhhhhKubh)}(hhh](h)}(hFutexesh]hFutexes}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhjhhhhhKubh)}(hXFutexes are supported in NOMMU mode if the arch supports them. An error will be given if an address passed to the futex system call lies outside the mappings made by a process or if the mapping in which the address lies does not support futexes (such as an I/O chardev mapping).h]hXFutexes are supported in NOMMU mode if the arch supports them. An error will be given if an address passed to the futex system call lies outside the mappings made by a process or if the mapping in which the address lies does not support futexes (such as an I/O chardev mapping).}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhKhjhhubeh}(h]futexesah ]h"]futexesah$]h&]uh1hhhhhhhhKubh)}(hhh](h)}(h No-MMU mremaph]h No-MMU mremap}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhjhhhhhKubh)}(hX7The mremap() function is partially supported. It may change the size of a mapping, and may move it [#]_ if MREMAP_MAYMOVE is specified and if the new size of the mapping exceeds the size of the slab object currently occupied by the memory to which the mapping refers, or if a smaller slab object could be used.h](hdThe mremap() function is partially supported. It may change the size of a mapping, and may move it }(hjhhhNhNubhfootnote_reference)}(h[#]_h]h1}(hjhhhNhNubah}(h]id1ah ]h"]h$]h&]autoKrefidid2docnameadmin-guide/mm/nommu-mmapuh1jhjresolvedKubh if MREMAP_MAYMOVE is specified and if the new size of the mapping exceeds the size of the slab object currently occupied by the memory to which the mapping refers, or if a smaller slab object could be used.}(hjhhhNhNubeh}(h]h ]h"]h$]h&]uh1hhhhKhjhhubh)}(h}MREMAP_FIXED is not supported, though it is ignored if there's no change of address and the object does not need to be moved.h]hMREMAP_FIXED is not supported, though it is ignored if there’s no change of address and the object does not need to be moved.}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhKhjhhubh)}(huShared mappings may not be moved. Shareable mappings may not be moved either, even if they are not currently shared.h]huShared mappings may not be moved. Shareable mappings may not be moved either, even if they are not currently shared.}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhKhjhhubh)}(hXThe mremap() function must be given an exact match for base address and size of a previously mapped object. It may not be used to create holes in existing mappings, move parts of existing mappings or resize parts of mappings. It must act on a complete mapping.h]hXThe mremap() function must be given an exact match for base address and size of a previously mapped object. It may not be used to create holes in existing mappings, move parts of existing mappings or resize parts of mappings. It must act on a complete mapping.}(hj hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhKhjhhubhfootnote)}(hNot currently supported. h](hlabel)}(hhh]h1}(hj!hhhNhNubah}(h]h ]h"]h$]h&]uh1jhjhhhNhNubh)}(hNot currently supported.h]hNot currently supported.}(hj.hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhKhjubeh}(h]jah ]h"]1ah$]h&]jajKjjuh1jhhhKhjhhubeh}(h] no-mmu-mremapah ]h"] no-mmu mremapah$]h&]uh1hhhhhhhhKubh)}(hhh](h)}(h,Providing shareable character device supporth]h,Providing shareable character device support}(hjNhhhNhNubah}(h]h ]h"]h$]h&]uh1hhjKhhhhhKubh)}(hXdTo provide shareable character device support, a driver must provide a file->f_op->get_unmapped_area() operation. The mmap() routines will call this to get a proposed address for the mapping. This may return an error if it doesn't wish to honour the mapping because it's too long, at a weird offset, under some unsupported combination of flags or whatever.h]hXhTo provide shareable character device support, a driver must provide a file->f_op->get_unmapped_area() operation. The mmap() routines will call this to get a proposed address for the mapping. This may return an error if it doesn’t wish to honour the mapping because it’s too long, at a weird offset, under some unsupported combination of flags or whatever.}(hj\hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhKhjKhhubh)}(hThe driver should also provide backing device information with capabilities set to indicate the permitted types of mapping on such devices. The default is assumed to be readable and writable, not executable, and only shareable directly (can't be copied).h]hXThe driver should also provide backing device information with capabilities set to indicate the permitted types of mapping on such devices. The default is assumed to be readable and writable, not executable, and only shareable directly (can’t be copied).}(hjjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhKhjKhhubh)}(hThe file->f_op->mmap() operation will be called to actually inaugurate the mapping. It can be rejected at that point. Returning the ENOSYS error will cause the mapping to be copied instead if NOMMU_MAP_COPY is specified.h]hThe file->f_op->mmap() operation will be called to actually inaugurate the mapping. It can be rejected at that point. Returning the ENOSYS error will cause the mapping to be copied instead if NOMMU_MAP_COPY is specified.}(hjxhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhKhjKhhubh)}(hThe vm_ops->close() routine will be invoked when the last mapping on a chardev is removed. An existing mapping will be shared, partially or not, if possible without notifying the driver.h]hThe vm_ops->close() routine will be invoked when the last mapping on a chardev is removed. An existing mapping will be shared, partially or not, if possible without notifying the driver.}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhKhjKhhubh)}(hX&It is permitted also for the file->f_op->get_unmapped_area() operation to return -ENOSYS. This will be taken to mean that this operation just doesn't want to handle it, despite the fact it's got an operation. For instance, it might try directing the call to a secondary driver which turns out not to implement it. Such is the case for the framebuffer driver which attempts to direct the call to the device-specific driver. Under such circumstances, the mapping request will be rejected if NOMMU_MAP_COPY is not specified, and a copy mapped otherwise.h]hX*It is permitted also for the file->f_op->get_unmapped_area() operation to return -ENOSYS. This will be taken to mean that this operation just doesn’t want to handle it, despite the fact it’s got an operation. For instance, it might try directing the call to a secondary driver which turns out not to implement it. Such is the case for the framebuffer driver which attempts to direct the call to the device-specific driver. Under such circumstances, the mapping request will be rejected if NOMMU_MAP_COPY is not specified, and a copy mapped otherwise.}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhKhjKhhubh important)}(hXSome types of device may present a different appearance to anyone looking at them in certain modes. Flash chips can be like this; for instance if they're in programming or erase mode, you might see the status reflected in the mapping, instead of the data. In such a case, care must be taken lest userspace see a shared or a private mapping showing such information when the driver is busy controlling the device. Remember especially: private executable mappings may still be mapped directly off the device under some circumstances!h](h)}(hSome types of device may present a different appearance to anyone looking at them in certain modes. Flash chips can be like this; for instance if they're in programming or erase mode, you might see the status reflected in the mapping, instead of the data.h]hXSome types of device may present a different appearance to anyone looking at them in certain modes. Flash chips can be like this; for instance if they’re in programming or erase mode, you might see the status reflected in the mapping, instead of the data.}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhKhjubh)}(hXIn such a case, care must be taken lest userspace see a shared or a private mapping showing such information when the driver is busy controlling the device. Remember especially: private executable mappings may still be mapped directly off the device under some circumstances!h]hXIn such a case, care must be taken lest userspace see a shared or a private mapping showing such information when the driver is busy controlling the device. Remember especially: private executable mappings may still be mapped directly off the device under some circumstances!}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhKhjubeh}(h]h ]h"]h$]h&]uh1jhjKhhhhhNubeh}(h],providing-shareable-character-device-supportah ]h"],providing shareable character device supportah$]h&]uh1hhhhhhhhKubh)}(hhh](h)}(h.Providing shareable memory-backed file supporth]h.Providing shareable memory-backed file support}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhjhhhhhKubh)}(hX Provision of shared mappings on memory backed files is similar to the provision of support for shared mapped character devices. The main difference is that the filesystem providing the service will probably allocate a contiguous collection of pages and permit mappings to be made on that.h]hX Provision of shared mappings on memory backed files is similar to the provision of support for shared mapped character devices. The main difference is that the filesystem providing the service will probably allocate a contiguous collection of pages and permit mappings to be made on that.}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhKhjhhubh)}(hIt is recommended that a truncate operation applied to such a file that increases the file size, if that file is empty, be taken as a request to gather enough pages to honour a mapping. This is required to support POSIX shared memory.h]hIt is recommended that a truncate operation applied to such a file that increases the file size, if that file is empty, be taken as a request to gather enough pages to honour a mapping. This is required to support POSIX shared memory.}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhKhjhhubh)}(hkMemory backed devices are indicated by the mapping's backing device info having the memory_backed flag set.h]hmMemory backed devices are indicated by the mapping’s backing device info having the memory_backed flag set.}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMhjhhubeh}(h].providing-shareable-memory-backed-file-supportah ]h"].providing shareable memory-backed file supportah$]h&]uh1hhhhhhhhKubh)}(hhh](h)}(h(Providing shareable block device supporth]h(Providing shareable block device support}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhjhhhhhM ubh)}(hProvision of shared mappings on block device files is exactly the same as for character devices. If there isn't a real device underneath, then the driver should allocate sufficient contiguous memory to honour any supported mapping.h]hProvision of shared mappings on block device files is exactly the same as for character devices. If there isn’t a real device underneath, then the driver should allocate sufficient contiguous memory to honour any supported mapping.}(hj&hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhM hjhhubeh}(h](providing-shareable-block-device-supportah ]h"](providing shareable block device supportah$]h&]uh1hhhhhhhhM ubh)}(hhh](h)}(h!Adjusting page trimming behaviourh]h!Adjusting page trimming behaviour}(hj?hhhNhNubah}(h]h ]h"]h$]h&]uh1hhj<hhhhhMubh)}(hXNOMMU mmap automatically rounds up to the nearest power-of-2 number of pages when performing an allocation. This can have adverse effects on memory fragmentation, and as such, is left configurable. The default behaviour is to aggressively trim allocations and discard any excess pages back in to the page allocator. In order to retain finer-grained control over fragmentation, this behaviour can either be disabled completely, or bumped up to a higher page watermark where trimming begins.h]hXNOMMU mmap automatically rounds up to the nearest power-of-2 number of pages when performing an allocation. This can have adverse effects on memory fragmentation, and as such, is left configurable. The default behaviour is to aggressively trim allocations and discard any excess pages back in to the page allocator. In order to retain finer-grained control over fragmentation, this behaviour can either be disabled completely, or bumped up to a higher page watermark where trimming begins.}(hjMhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMhj<hhubh)}(hLPage trimming behaviour is configurable via the sysctl ``vm.nr_trim_pages``.h](h7Page trimming behaviour is configurable via the sysctl }(hj[hhhNhNubhliteral)}(h``vm.nr_trim_pages``h]hvm.nr_trim_pages}(hjehhhNhNubah}(h]h ]h"]h$]h&]uh1jchj[ubh.}(hj[hhhNhNubeh}(h]h ]h"]h$]h&]uh1hhhhMhj<hhubeh}(h]!adjusting-page-trimming-behaviourah ]h"]!adjusting page trimming behaviourah$]h&]uh1hhhhhhhhMubeh}(h]no-mmu-memory-mapping-supportah ]h"]no-mmu memory mapping supportah$]h&]uh1hhhhhhhhKubeh}(h]h ]h"]h$]h&]sourcehuh1hcurrent_sourceN current_lineNsettingsdocutils.frontendValues)}(hN generatorN datestampN source_linkN source_urlN toc_backlinksentryfootnote_backlinksK sectnum_xformKstrip_commentsNstrip_elements_with_classesN strip_classesN report_levelK halt_levelKexit_status_levelKdebugNwarning_streamN tracebackinput_encoding utf-8-siginput_encoding_error_handlerstrictoutput_encodingutf-8output_encoding_error_handlerjerror_encodingutf-8error_encoding_error_handlerbackslashreplace language_codeenrecord_dependenciesNconfigN id_prefixhauto_id_prefixid dump_settingsNdump_internalsNdump_transformsNdump_pseudo_xmlNexpose_internalsNstrict_visitorN_disable_configN_sourceh _destinationN _config_files]7/var/lib/git/docbuild/linux/Documentation/docutils.confafile_insertion_enabled raw_enabledKline_length_limitM'pep_referencesN pep_base_urlhttps://peps.python.org/pep_file_url_templatepep-%04drfc_referencesN rfc_base_url&https://datatracker.ietf.org/doc/html/ tab_widthKtrim_footnote_reference_spacesyntax_highlightlong smart_quotessmartquotes_locales]character_level_inline_markupdoctitle_xform docinfo_xformKsectsubtitle_xform image_loadinglinkembed_stylesheetcloak_email_addressessection_self_linkenvNubreporterNindirect_targets]substitution_defs}substitution_names}refnames}refids}j]jasnameids}(jjjdjajjjjjHjEjjjjj9j6jjj@ju nametypes}(jjdjjjHjjj9jj@uh}(jhjaj[jjgjjjEjjjjjjjKjjj6jjj<u footnote_refs} citation_refs} autofootnotes]jaautofootnote_refs]jasymbol_footnotes]symbol_footnote_refs] footnotes] citations]autofootnote_startKsymbol_footnote_startK id_counter collectionsCounter}jKsRparse_messages]transform_messages] transformerN include_log] decorationNhhub.