From owner-freebsd-hackers Thu Mar 12 15:44:03 1998 Return-Path: Received: (from majordom@localhost) by hub.freebsd.org (8.8.8/8.8.8) id PAA28375 for freebsd-hackers-outgoing; Thu, 12 Mar 1998 15:44:03 -0800 (PST) (envelope-from owner-freebsd-hackers@FreeBSD.ORG) Received: from gaia.coppe.ufrj.br (cisigw.coppe.ufrj.br [146.164.5.200]) by hub.freebsd.org (8.8.8/8.8.8) with ESMTP id PAA28309 for ; Thu, 12 Mar 1998 15:43:54 -0800 (PST) (envelope-from jonny@coppe.ufrj.br) Received: (from jonny@localhost) by gaia.coppe.ufrj.br (8.8.8/8.8.8) id UAA04599; Thu, 12 Mar 1998 20:43:18 -0300 (EST) (envelope-from jonny) From: Joao Carlos Mendes Luis Message-Id: <199803122343.UAA04599@gaia.coppe.ufrj.br> Subject: Re: SYSVMEM leak? In-Reply-To: <012d01bd4d55$59c84d20$0600a8c0@win95.local.sunyit.edu> from Alfred Perlstein at "Mar 11, 98 08:22:39 pm" To: perlsta@cs.sunyit.edu (Alfred Perlstein) Date: Thu, 12 Mar 1998 20:43:18 -0300 (EST) Cc: hackers@FreeBSD.ORG X-Mailer: ELM [version 2.4ME+ PL32 (25)] MIME-Version: 1.0 Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit Sender: owner-freebsd-hackers@FreeBSD.ORG Precedence: bulk X-Loop: FreeBSD.ORG #define quoting(Alfred Perlstein) // i've been playing with a bunch of programs and they all seem to like to // leave around SYSVSHM segments, this is especially problematic in programs // running under the linux emulation. // // i get a lot of messages on the consol: // linux-emu(1040) - setup() not implemented. SYSSHM memory should be politely released by the program, as it's not done at exit(). If the program has simply aborted, chances are that the shmem is not being release. Take a look at ipcrm(1). Jonny -- Joao Carlos Mendes Luis jonny@gta.ufrj.br +55 21 290-4698 jonny@coppe.ufrj.br Universidade Federal do Rio de Janeiro UFRJ/COPPE/CISI PGP fingerprint: 29 C0 50 B9 B6 3E 58 F2 83 5F E3 26 BF 0F EA 67 To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-hackers" in the body of the message