From owner-freebsd-hackers@FreeBSD.ORG Mon Nov 10 03:20:21 2008 Return-Path: Delivered-To: freebsd-hackers@freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:4f8:fff6::34]) by hub.freebsd.org (Postfix) with ESMTP id 5F5F41065670 for ; Mon, 10 Nov 2008 03:20:21 +0000 (UTC) (envelope-from gonzo@bluezbox.com) Received: from core.tav.kiev.ua (tavex.colocall.com [62.149.10.42]) by mx1.freebsd.org (Postfix) with ESMTP id DC15B8FC0A for ; Mon, 10 Nov 2008 03:20:19 +0000 (UTC) (envelope-from gonzo@bluezbox.com) Received: from s01060021299bf294.vc.shawcable.net ([24.87.45.120] helo=jeeves.bluezbox.com) by core.tav.kiev.ua with esmtpsa (TLSv1:AES256-SHA:256) (Exim 4.52 (FreeBSD)) id 1KzMjc-000HSt-Kh; Mon, 10 Nov 2008 04:42:37 +0200 Message-ID: <49179F7C.7020200@bluezbox.com> Date: Sun, 09 Nov 2008 18:42:04 -0800 From: Oleksandr Tymoshenko User-Agent: Thunderbird 2.0.0.16 (X11/20080831) MIME-Version: 1.0 To: shilp.kamal@yahoo.com References: <864116.63596.qm@web45402.mail.sp1.yahoo.com> In-Reply-To: <864116.63596.qm@web45402.mail.sp1.yahoo.com> Content-Type: text/plain; charset=ISO-8859-1; format=flowed Content-Transfer-Encoding: 7bit X-Core-Spam-Level: - X-Core-Spam-Report: Spam detection software, running on the system "core.tav.kiev.ua", has identified this incoming email as possible spam. The original message has been attached to this so you can view it (if it isn't spam) or label similar future email. If you have any questions, see the administrator of that system for details. Content preview: Kamlesh Patel wrote: > Hi Friends, > > I am working on FreeBSD Virtual Memory improvement algorithm. > How VM allocate pages first time when system boot? > How phys_avail[] have values in sys/vm/vm_Page.c line 228? It's set by machine-dependent part of code. grep for phys_avail[] in i386/amd64/arm/etc.. [...] Content analysis details: (-1.6 points, 5.0 required) pts rule name description ---- ---------------------- -------------------------------------------------- -1.8 ALL_TRUSTED Passed through trusted hosts only via SMTP -0.2 BAYES_40 BODY: Bayesian spam probability is 20 to 40% [score: 0.2533] 1.5 DNS_FROM_SECURITYSAGE RBL: Envelope sender in blackholes.securitysage.com -1.2 AWL AWL: From: address is in the auto white-list Cc: freebsd-hackers@freebsd.org, mayur.shardul@gmail.com Subject: Re: What happen when FreeBSD boot first time???????? X-BeenThere: freebsd-hackers@freebsd.org X-Mailman-Version: 2.1.5 Precedence: list List-Id: Technical Discussions relating to FreeBSD List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Mon, 10 Nov 2008 03:20:21 -0000 Kamlesh Patel wrote: > Hi Friends, > > I am working on FreeBSD Virtual Memory improvement algorithm. > How VM allocate pages first time when system boot? > How phys_avail[] have values in sys/vm/vm_Page.c line 228? It's set by machine-dependent part of code. grep for phys_avail[] in i386/amd64/arm/etc..