IMPLEMENTATION NOTES back to NOTES.

This commit is contained in:
jruoho 2010-05-16 05:18:35 +00:00
parent 20136dbf99
commit 4dc3500d9a
3 changed files with 9 additions and 9 deletions

View File

@ -1,4 +1,4 @@
.\" $NetBSD: kmem.9,v 1.9 2010/05/14 18:52:46 jruoho Exp $
.\" $NetBSD: kmem.9,v 1.10 2010/05/16 05:18:35 jruoho Exp $
.\"
.\" Copyright (c)2006 YAMAMOTO Takashi,
.\" All rights reserved.
@ -25,7 +25,7 @@
.\" SUCH DAMAGE.
.\"
.\" ------------------------------------------------------------
.Dd May 14, 2010
.Dd May 16, 2010
.Dt KMEM 9
.Os
.\" ------------------------------------------------------------
@ -136,7 +136,7 @@ Freeing
.Dv NULL
is illegal.
.\" ------------------------------------------------------------
.Sh IMPLEMENTATION NOTES
.Sh NOTES
Making
.Dv KM_SLEEP
allocations while holding mutexes or reader/writer locks is discouraged, as the

View File

@ -1,4 +1,4 @@
.\" $NetBSD: sysctl.9,v 1.16 2010/05/14 18:52:46 jruoho Exp $
.\" $NetBSD: sysctl.9,v 1.17 2010/05/16 05:18:35 jruoho Exp $
.\"
.\" Copyright (c) 2004 The NetBSD Foundation, Inc.
.\" All rights reserved.
@ -27,7 +27,7 @@
.\" ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
.\" POSSIBILITY OF SUCH DAMAGE.
.\"
.Dd May 14, 2010
.Dd May 16, 2010
.Dt SYSCTL 9
.Os
.Sh NAME
@ -613,7 +613,7 @@ and
.Fa oldp
are interpreted as kernel addresses, and access is performed as for
the superuser.
.Sh IMPLEMENTATION NOTES
.Sh NOTES
It is expected that nodes will be added to (or removed from) the tree
during the following stages of a machine's lifetime:
.Pp

View File

@ -1,4 +1,4 @@
.\" $NetBSD: xcall.9,v 1.5 2010/05/14 18:52:46 jruoho Exp $
.\" $NetBSD: xcall.9,v 1.6 2010/05/16 05:18:35 jruoho Exp $
.\"
.\" Copyright (c) 2010 The NetBSD Foundation, Inc.
.\" All rights reserved.
@ -27,7 +27,7 @@
.\" ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
.\" POSSIBILITY OF SUCH DAMAGE.
.\"
.Dd May 14, 2010
.Dd May 16, 2010
.Dt XCALL 9
.Os
.Sh NAME
@ -81,7 +81,7 @@ context, and not from a software interrupt, so it can ensure that it is
not interrupting other code running on the CPU, and so has exclusive
access to the CPU.
Keep in mind that unless disabled, it may cause a kernel preemption.
.Sh IMPLEMENTATION NOTES
.Sh NOTES
Functions being called should be relatively lightweight.
They may block on locks, but carefully and minimally, to not interfere
with other cross calls in the system.