Question

In: Computer Science

Operating System Management kmalloc() Can be used by regular processes as a faster, lower-level version of...

Operating System Management

  1. kmalloc()
    • Can be used by regular processes as a faster, lower-level version of malloc
    • Allocates memory in the kernel with different priorities
    • Only accepts allocation requests that are evenly divisible by the page size
    • Returns the physical address of allocated memory
    • All of the above

Solutions

Expert Solution

kmalloc()

  • Can be used by regular processes as a faster, lower-level version of malloc
  • Allocates memory in the kernel with different priorities (correct answer)
  • Only accepts allocation requests that are evenly divisible by the page size
  • Returns the physical address of allocated memory
  • All of the above

Explanation

1.Can be used by regular processes as a faster, lower-level version of malloc

-kmalloc() is not faster. kmalloc() is similar to malloc() but not lower version of malloc()

---------------------------------------------------------------------------------------------------------------------------------------

2.Allocates memory in the kernel with different priorities

-kmalloc() uses flags to set different priorities.

-----------------------------------------------------------------------------------------------------------------------------------------

3.Only accepts allocation requests that are evenly divisible by the page size

-In kmalloc() , allocator is page based. It will round up the requested memory to fit into available memory.

-------------------------------------------------------------------------------------------------------------------------------------

4. Returns the physical address of allocated memory​​​​​​​

-kmalloc() will return the virtual address but not physical address. MMU(memory management unit) will translate the virtual address into physical address.

---------------------------------------------------------------------------------------------------------------------------------------​​​​​​​


Related Solutions

. Explain in detail the two types of processes in an operating system and explain the...
. Explain in detail the two types of processes in an operating system and explain the advantages of them.
Your organization plans to upgrade its operating system to the newest version. The IT department identifies...
Your organization plans to upgrade its operating system to the newest version. The IT department identifies several legacy applications that will require significant modifications to run under the new OS. You suggest instead that they should consider supporting both the old and the new operating system by using one of the following three options: a. virtualization b. exokernels c. microkernels Briefly explain how each option could provide the needed support.
Discuss TWO findings at the Operations management level (Inventory Department) that can be used to justify...
Discuss TWO findings at the Operations management level (Inventory Department) that can be used to justify the Metro-E and VPN solutions. From the following models - subscriptions (usually all you can eat), a la carte (pay for what you use) and “freemium” (uses advertising revenue to provide content for free), make TWO recommendations on ways to start generating more revenue via an eCommerce website.
A person can Lower there cholesterol level upon exercise because
A person can Lower there cholesterol level upon exercise because
The key to managing operating exposure at the strategic level is for management to recognize a...
The key to managing operating exposure at the strategic level is for management to recognize a disequilibrium in parity conditions when it occurs and to be pre-positioned to react most appropriately. How can this task best be accomplished?
Write a version of the binary search algorithm that can be used to search a string...
Write a version of the binary search algorithm that can be used to search a string vector object. Also, write a program to test your algorithm. (Use the selection sort algorithm you developed in Programming Exercise 12 to sort the vector.) Your program should prompt the user to input a series of strings, ending the input stream with zzz. The program should then prompt the user to search for a specific string in the list. If the string is found...
Design {block diagram level} a navigation system which can be used on the desert surfaceand also...
Design {block diagram level} a navigation system which can be used on the desert surfaceand also for operations 100 meters underground minee. The required position accuracy ib 10m on the .surface and 5m on the underground.Justify the choice of sencors with its detailed working principle and complete specifications for the mentioned scenario
What kind of testing methods can be used for an airline reservation management system and justify...
What kind of testing methods can be used for an airline reservation management system and justify the reasons for selecting the testing methods in detail.
Describe at least 3 basic defenses operating to prevent lower respiratory system infections
Describe at least 3 basic defenses operating to prevent lower respiratory system infections
The five major activities of an operating system in regard to process management are?
The five major activities of an operating system in regard to process management are?
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT