Date: Wed, 10 Feb 1999 22:26:56 -0800 (PST) From: Matthew Dillon <dillon@apollo.backplane.com> To: Peter Jeremy <peter.jeremy@auss2.alcatel.com.au> Cc: tlambert@primenet.com, hackers@FreeBSD.ORG Subject: Re: portability of shm, mmap, pipes and socket IPC Message-ID: <199902110626.WAA88637@apollo.backplane.com> References: <99Feb11.122748est.40371@border.alcanet.com.au>
next in thread | previous in thread | raw e-mail | index | archive | help
:they have on applications using SysV semaphores. : :I have an application (running on 3.0-RELEASE) that relies on the :kernel correctly tracking SEM_UNDO's. (Basically I have a wrapper :that seizes a semaphore with sem_op = -1, sem_flg = SEM_UNDO and then :execs a process that knows nothing about the semaphores.) I was :seeing some wierd behaviour, but I thought that was a (now fixed) bug :in the kernel handling of SEMUME and SEMUSZ (see PR kern/9068). : :Peter I think the key issue here is to be able to reproduce the weird behavior deterministically. If that can be done, the problem can be fixed fairly easily. -Matt Matthew Dillon <dillon@backplane.com> To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-hackers" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?199902110626.WAA88637>