From owner-freebsd-current@FreeBSD.ORG Wed Jun 14 18:05:33 2006 Return-Path: X-Original-To: freebsd-current@freebsd.org Delivered-To: freebsd-current@freebsd.org Received: from mx1.FreeBSD.org (mx1.freebsd.org [216.136.204.125]) by hub.freebsd.org (Postfix) with ESMTP id 27CF216A47E; Wed, 14 Jun 2006 18:05:33 +0000 (UTC) (envelope-from jhb@freebsd.org) Received: from server.baldwin.cx (66-23-211-162.clients.speedfactory.net [66.23.211.162]) by mx1.FreeBSD.org (Postfix) with ESMTP id 801C543D48; Wed, 14 Jun 2006 18:05:32 +0000 (GMT) (envelope-from jhb@freebsd.org) Received: from localhost.corp.yahoo.com (john@localhost [127.0.0.1]) (authenticated bits=0) by server.baldwin.cx (8.13.4/8.13.4) with ESMTP id k5EI5Ssi035896; Wed, 14 Jun 2006 14:05:29 -0400 (EDT) (envelope-from jhb@freebsd.org) From: John Baldwin To: Paul Allen Date: Wed, 14 Jun 2006 13:58:46 -0400 User-Agent: KMail/1.9.1 References: <448FC3AF.9060606@bulinfo.net> <449048C7.6090109@FreeBSD.org> <20060614175352.GI28128@groat.ugcs.caltech.edu> In-Reply-To: <20060614175352.GI28128@groat.ugcs.caltech.edu> MIME-Version: 1.0 Content-Type: text/plain; charset="iso-8859-1" Content-Transfer-Encoding: 7bit Content-Disposition: inline Message-Id: <200606141358.47527.jhb@freebsd.org> X-Greylist: Sender succeeded SMTP AUTH authentication, not delayed by milter-greylist-2.0.2 (server.baldwin.cx [127.0.0.1]); Wed, 14 Jun 2006 14:05:29 -0400 (EDT) X-Virus-Scanned: ClamAV 0.87.1/1539/Wed Jun 14 10:21:49 2006 on server.baldwin.cx X-Virus-Status: Clean X-Spam-Status: No, score=-4.4 required=4.2 tests=ALL_TRUSTED,BAYES_00 autolearn=ham version=3.1.0 X-Spam-Checker-Version: SpamAssassin 3.1.0 (2005-09-13) on server.baldwin.cx Cc: freebsd-current@freebsd.org, Jason Evans , Krassimir Slavchev Subject: Re: memory leak in free() X-BeenThere: freebsd-current@freebsd.org X-Mailman-Version: 2.1.5 Precedence: list List-Id: Discussions about the use of FreeBSD-current List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Wed, 14 Jun 2006 18:05:33 -0000 On Wednesday 14 June 2006 13:53, Paul Allen wrote: > From Jason Evans , Wed, Jun 14, 2006 at 10:35:03AM -0700: > > This is on a 32-bit system, right? If so, what's happening is that the > > brk-managed space (data segment) is being fragmented, such that the > > address space isn't returned to the OS. However, this is not really a > > memory leak, since madvise() is called in order to let the kernel know > > that the unused space need not be swapped out. > > And in particular this should manifest itself as 'RES' declining but 'SIZE' > in top remaining unchanged. Until an over-commit hating individual manages > to get a patch into the tree, this should not be a concern at all. And any such patch would have to have a knob that defaulted to keeping overcommit on anyway. :-) -- John Baldwin