Lines Matching +full:implementation +full:- +full:defined
2 .\" SPDX-License-Identifier: BSD-2-Clause
23 In some cases, it is also a source of truth for the implementation details
29 OS-level concepts and practices.
35 source code itself, is forever a work-in-progress.
42 piece of code that, paired with its implementation, fully informs the reader of
47 describe types, global variables, macros, or high-level concepts.
58 There are implementations for many well-known data structures available in the
60 .Bl -tag -width "Xr bitstring 3"
62 Simple bitmap implementation.
64 An SMP-safe general-purpose counter implementation.
66 Hash map implementation.
70 Singly-linked and doubly-linked lists, and queues.
72 An SMP-safe implementation of reference counts.
76 A scatter/gather list implementation.
84 sub-sections below.
89 Endian-swapping functions:
100 Non-recoverable errors in the kernel should trigger a
102 Run-time assertions can be verified using the
105 Compile-time assertions should use
109 executed during start-up and shutdown; see
130 facilities are used to create lock-free data structures.
140 .\" high-level page which points to the following contents instead.
145 .Bd -ragged -offset indent
167 The machine-dependent portion of the virtual memory stack is the
182 is the abstract and filesystem-independent representation of a file,
183 directory, or other file-like entity within the kernel.
185 The implementation of access control lists for filesystems is described by
223 The front-end for interfacing with network sockets from within the kernel is
226 The back-end interface for socket implementations is
229 The low-level packet filter interface is described by
246 .\" would be helpful in laying out the high-level concepts of FreeBSD's device
275 Drivers can request and manage their resources (e.g. memory-space or IRQ
277 .Bd -ragged -offset indent
296 A few global time variables, such as system up-time, are described by
328 For low-latency callback handling, the
332 Dynamic handlers for pre-defined event hooks are registered and invoked using
337 The machine-independent interface to a context switch is
396 supporting dynamically-registered security modules;
414 describes the machine-independent portion of the interrupt framework
432 kernel debugger are defined with the
439 These tracepoints are defined using the macros described by
442 Static probes for DTrace are defined using the
450 Kernel sanitizers can perform additional compiler-assisted checks against
452 These runtimes are capable of detecting difficult-to-identify classes of bugs,
465 Defined functions/APIs for specific types of devices.
466 .Bl -tag -width "Xr usbdi 9"
474 Pulse-Width Modulation (PWM) bus interface methods.
481 Dynamic per-CPU variables:
490 Contexts for CPU floating-point registers are managed by the
511 The kernel object implementation is described by
518 .%U https://docs.freebsd.org/en/books/arch-handbook/