kernmalloc.t (1639) | kernmalloc.t (18715) |
---|---|
1.\" Copyright (c) 1988 The Regents of the University of California. 2.\" All rights reserved. 3.\" 4.\" Redistribution and use in source and binary forms, with or without 5.\" modification, are permitted provided that the following conditions 6.\" are met: 7.\" 1. Redistributions of source code must retain the above copyright 8.\" notice, this list of conditions and the following disclaimer. --- 16 unchanged lines hidden (view full) --- 25.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS 26.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) 27.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT 28.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY 29.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF 30.\" SUCH DAMAGE. 31.\" 32.\" @(#)kernmalloc.t 5.1 (Berkeley) 4/16/91 | 1.\" Copyright (c) 1988 The Regents of the University of California. 2.\" All rights reserved. 3.\" 4.\" Redistribution and use in source and binary forms, with or without 5.\" modification, are permitted provided that the following conditions 6.\" are met: 7.\" 1. Redistributions of source code must retain the above copyright 8.\" notice, this list of conditions and the following disclaimer. --- 16 unchanged lines hidden (view full) --- 25.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS 26.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) 27.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT 28.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY 29.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF 30.\" SUCH DAMAGE. 31.\" 32.\" @(#)kernmalloc.t 5.1 (Berkeley) 4/16/91 |
33.\" $Id$ |
|
33.\" 34.\" reference a system routine name 35.de RN 36\fI\\$1\fP\^(\h'1m/24u')\\$2 37.. 38.\" reference a header name 39.de H 40.NH \\$1 --- 554 unchanged lines hidden (view full) --- 595the front of the list, 596return of elements from pages at the back would eventually 597allow pages later in the list to be freed. 598.PP 599Two of the traditional UNIX 600memory allocators remain in the current system. 601The terminal subsystem uses \fIclist\fP\^s (character lists). 602That part of the system is expected to undergo major revision within | 34.\" 35.\" reference a system routine name 36.de RN 37\fI\\$1\fP\^(\h'1m/24u')\\$2 38.. 39.\" reference a header name 40.de H 41.NH \\$1 --- 554 unchanged lines hidden (view full) --- 596the front of the list, 597return of elements from pages at the back would eventually 598allow pages later in the list to be freed. 599.PP 600Two of the traditional UNIX 601memory allocators remain in the current system. 602The terminal subsystem uses \fIclist\fP\^s (character lists). 603That part of the system is expected to undergo major revision within |
603the the next year or so, and it will probably be changed to use | 604the next year or so, and it will probably be changed to use |
604\fImbuf\fP\^s as it is merged into the network system. 605The other major allocator that remains is 606.RN getblk , 607the routine that manages the filesystem buffer pool memory 608and associated control information. 609Only the filesystem uses 610.RN getblk 611in the current system; --- 38 unchanged lines hidden --- | 605\fImbuf\fP\^s as it is merged into the network system. 606The other major allocator that remains is 607.RN getblk , 608the routine that manages the filesystem buffer pool memory 609and associated control information. 610Only the filesystem uses 611.RN getblk 612in the current system; --- 38 unchanged lines hidden --- |