mem(4d) 맨 페이지 - 윈디하나의 솔라나라
|
svcadm(8)
을 검색하려면 섹션에서
8
을 선택하고, 맨 페이지 이름에
svcadm
을 입력하고 검색을 누른다.Device Drivers & /dev files mem(4D) NAME mem, kmem, allkmem - physical or virtual memory access SYNOPSIS /dev/mem /dev/kmem /dev/allkmem DESCRIPTION The file /dev/mem is a special file that provides access to the physi‐ cal memory of the computer. The file /dev/kmem is a special file that provides access to the vir‐ tual address space of the operating system kernel, excluding memory that is associated with an I/O device. The file /dev/allkmem is a special file that provides access to the virtual address space of the operating system kernel, including memory that is associated with an I/O device. You can use any of these devices to examine and modify the system. Byte addresses in /dev/mem are interpreted as physical memory addresses. Byte addresses in /dev/kmem and /dev/allkmem are interpreted as kernel virtual memory addresses. A reference to a non-existent loca‐ tion returns an error. See ERRORS for more information. The file /dev/mem accesses physical memory; the size of the file is equal to the amount of physical memory in the computer. A 32-bit process using large file interfaces can access memory beyond 4GB using a series of read(2) and write(2) calls, a pread64() or pwrite64() call, or a combination of llseek(2) and read(2) or write(2). ERRORS EFAULT Occurs when trying to write(2) a read-only location (allk‐ mem), read(2) a write-only location (allkmem), or read(2) or write(2) a non-existent or unimplemented location (mem, kmem, allkmem). EIO Occurs when trying to read(2) or write(2) a memory location that is associated with an I/O device using the /dev/kmem special file. ENXIO Results from attempting to mmap(2) a non-existent physical (mem) or virtual (kmem, allkmem) memory address. FILES /dev/mem Provides access to the computer's physical memory. /dev/kmem Provides access to the virtual address space of the operating system kernel, excluding memory that is asso‐ ciated with an I/O device. /dev/allkmem Provides access to the virtual address space of the operating system kernel, including memory that is asso‐ ciated with an I/O device. SEE ALSO llseek(2), mmap(2), read(2), write(2) WARNINGS Using these devices to modify (that is, write to) the address space of a live running operating system or to modify the state of a hardware device is extremely dangerous and may result in a system panic if ker‐ nel data structures are damaged or if device state is changed. Oracle Solaris 11.4 11 Dec 2020 mem(4D)맨 페이지 내용의 저작권은 맨 페이지 작성자에게 있습니다.
RSS ATOM XHTML 5 CSS3 |
Copyright © 2004-2025 Jo HoSeok. All rights reserved. |