Deleted Added
full compact
kernmalloc.t (1639) kernmalloc.t (18715)
1.\" Copyright (c) 1988 The Regents of the University of California.
2.\" All rights reserved.
3.\"
4.\" Redistribution and use in source and binary forms, with or without
5.\" modification, are permitted provided that the following conditions
6.\" are met:
7.\" 1. Redistributions of source code must retain the above copyright
8.\" notice, this list of conditions and the following disclaimer.

--- 16 unchanged lines hidden (view full) ---

25.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
26.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
27.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
28.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
29.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
30.\" SUCH DAMAGE.
31.\"
32.\" @(#)kernmalloc.t 5.1 (Berkeley) 4/16/91
1.\" Copyright (c) 1988 The Regents of the University of California.
2.\" All rights reserved.
3.\"
4.\" Redistribution and use in source and binary forms, with or without
5.\" modification, are permitted provided that the following conditions
6.\" are met:
7.\" 1. Redistributions of source code must retain the above copyright
8.\" notice, this list of conditions and the following disclaimer.

--- 16 unchanged lines hidden (view full) ---

25.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
26.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
27.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
28.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
29.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
30.\" SUCH DAMAGE.
31.\"
32.\" @(#)kernmalloc.t 5.1 (Berkeley) 4/16/91
33.\" $Id$
33.\"
34.\" reference a system routine name
35.de RN
36\fI\\$1\fP\^(\h'1m/24u')\\$2
37..
38.\" reference a header name
39.de H
40.NH \\$1

--- 554 unchanged lines hidden (view full) ---

595the front of the list,
596return of elements from pages at the back would eventually
597allow pages later in the list to be freed.
598.PP
599Two of the traditional UNIX
600memory allocators remain in the current system.
601The terminal subsystem uses \fIclist\fP\^s (character lists).
602That part of the system is expected to undergo major revision within
34.\"
35.\" reference a system routine name
36.de RN
37\fI\\$1\fP\^(\h'1m/24u')\\$2
38..
39.\" reference a header name
40.de H
41.NH \\$1

--- 554 unchanged lines hidden (view full) ---

596the front of the list,
597return of elements from pages at the back would eventually
598allow pages later in the list to be freed.
599.PP
600Two of the traditional UNIX
601memory allocators remain in the current system.
602The terminal subsystem uses \fIclist\fP\^s (character lists).
603That part of the system is expected to undergo major revision within
603the the next year or so, and it will probably be changed to use
604the next year or so, and it will probably be changed to use
604\fImbuf\fP\^s as it is merged into the network system.
605The other major allocator that remains is
606.RN getblk ,
607the routine that manages the filesystem buffer pool memory
608and associated control information.
609Only the filesystem uses
610.RN getblk
611in the current system;

--- 38 unchanged lines hidden ---
605\fImbuf\fP\^s as it is merged into the network system.
606The other major allocator that remains is
607.RN getblk ,
608the routine that manages the filesystem buffer pool memory
609and associated control information.
610Only the filesystem uses
611.RN getblk
612in the current system;

--- 38 unchanged lines hidden ---