From owner-freebsd-hackers Fri Mar 15 09:35:00 1996 Return-Path: owner-hackers Received: (from root@localhost) by freefall.freebsd.org (8.7.3/8.7.3) id JAA13950 for hackers-outgoing; Fri, 15 Mar 1996 09:35:00 -0800 (PST) Received: from tfs.com (tfs.com [140.145.250.1]) by freefall.freebsd.org (8.7.3/8.7.3) with SMTP id JAA13936 for ; Fri, 15 Mar 1996 09:34:56 -0800 (PST) Received: from critter.tfs.com by tfs.com (smail3.1.28.1) with SMTP id m0txdOw-0003weC; Fri, 15 Mar 96 09:34 PST Received: from localhost.tfs.com (localhost.tfs.com [127.0.0.1]) by critter.tfs.com (8.6.12/8.6.12) with SMTP id RAA27742; Fri, 15 Mar 1996 17:34:49 GMT X-Authentication-Warning: critter.tfs.com: Host localhost.tfs.com didn't use HELO protocol To: John Fieber cc: "Eric L. Hernes" , hackers@freebsd.org Subject: Re: new malloc/libc... In-reply-to: Your message of "Fri, 15 Mar 1996 12:26:22 EST." Date: Fri, 15 Mar 1996 17:34:48 +0000 Message-ID: <27740.826911288@critter.tfs.com> From: Poul-Henning Kamp Sender: owner-hackers@freebsd.org X-Loop: FreeBSD.org Precedence: bulk > > Has anyone on the core team talked to Xinside about this? > > They said that you (core) were working on it. If it's just > > a matter of -lgnumalloc, or -lphkmalloc (which isn't in 2.1 in > > any way shape or form right?) then it seems that they could just > > use a better malloc and release it right? > > Or, is there any more specific info on nature of the leak? I compiled I have contacted Xinside and will look at the problem. -- Poul-Henning Kamp | phk@FreeBSD.ORG FreeBSD Core-team. http://www.freebsd.org/~phk | phk@login.dknet.dk Private mailbox. whois: [PHK] | phk@ref.tfs.com TRW Financial Systems, Inc. Future will arrive by its own means, progress not so.