Date: Wed, 10 Feb 1999 22:26:56 -0800 (PST) From: Matthew Dillon <dillon@apollo.backplane.com> To: Peter Jeremy <peter.jeremy@auss2.alcatel.com.au> Cc: tlambert@primenet.com, hackers@FreeBSD.ORG Subject: Re: portability of shm, mmap, pipes and socket IPC Message-ID: <199902110626.WAA88637@apollo.backplane.com> References: <99Feb11.122748est.40371@border.alcanet.com.au>
next in thread | previous in thread | raw e-mail | index | archive | help
:they have on applications using SysV semaphores.
:
:I have an application (running on 3.0-RELEASE) that relies on the
:kernel correctly tracking SEM_UNDO's. (Basically I have a wrapper
:that seizes a semaphore with sem_op = -1, sem_flg = SEM_UNDO and then
:execs a process that knows nothing about the semaphores.) I was
:seeing some wierd behaviour, but I thought that was a (now fixed) bug
:in the kernel handling of SEMUME and SEMUSZ (see PR kern/9068).
:
:Peter
I think the key issue here is to be able to reproduce the weird
behavior deterministically. If that can be done, the problem can
be fixed fairly easily.
-Matt
Matthew Dillon
<dillon@backplane.com>
To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-hackers" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?199902110626.WAA88637>
