Sponsored Content
Operating Systems AIX Purified binary is not leaking Post 302138931 by jeet_xp on Thursday 4th of October 2007 01:51:47 AM
Old 10-04-2007
Purified binary is not leaking

Hi,
I am working on a project which uses 64-bit capability of AIX. This is
very recently ported to 64-bit and leaking like anything now. I purified
the program on 64-bit and ran it, purify is not showing any leak.
Even memory usage has become very normal in purified binary compared to my
binary which leaks 100 MB in span of 10 mins. Any idea what is the problem,
I feel something terribly wrong with my program.
I am working on AIX 5.3 and PurifyPlus version is purify.aix.7.0.0.0-008.
 

10 More Discussions You Might Find Interesting

1. UNIX for Dummies Questions & Answers

Where is M4 binary?

Hello, I am configurating Sendmail on Mac OS 10.x terminal. I tried to execute m4 to generate a new sendmail.cf. It complains "Command not found". Anybody knows where the m4 binary is? Is it something coming along with Unix or Sendmail? Appreciate any help. Thanks in advance. pw (2 Replies)
Discussion started by: hypamw
2 Replies

2. UNIX for Dummies Questions & Answers

binary file

please let me know how can i mail the binary files is it can be done thru pine? is there any other way to do it? wat are the changes in system i have to make and one more thing i am sending data to a message queue and then retriving the data from the queue but when i do the ipcs... (1 Reply)
Discussion started by: ramneek
1 Replies

3. UNIX for Dummies Questions & Answers

binary file

when using telnet localhost 25 I can cat ASCII files into the email body and an attachment, but how do i get a non-ASCII file into it, like a picture or a word document (.doc not rtf). uuencode, just stalls. Any ideas? :confused: (1 Reply)
Discussion started by: markms
1 Replies

4. Solaris

compiled binary file gives "cannot execute binary file"

Hi, I have two Solaris machines. 1. SunOS X 5.8 Generic_108528-29 sun4u sparc SUNW,Sun-Blade-1500 2. SunOS Y 5.8 Generic_108528-13 sun4u sparc SUNW,Ultra-60 I am trying to buiild a project on both these machines. The Binary output file compiled on machine 2 runs on both the machines. Where... (0 Replies)
Discussion started by: scgupta
0 Replies

5. UNIX for Advanced & Expert Users

Application-managed pthreads stacks leaking

I'm trying to use application-managed stacks, i.e. allocating the stack myself and passing it to the pthread creation attributes through pthread_setstack -function. My problem is that the memory allocated for the stack seems to leak after the thread terminates. Only information I have been able... (2 Replies)
Discussion started by: lassel
2 Replies

6. Shell Programming and Scripting

dd - binary file

I have a task that says: make a file (called binaryfile ) that contains 4 bytes of NULL data 6 bytes of random data 8 bytes of 1 10 bytes of 5 and 12 bytes of 9. For the first 2, I can used : dd if=/dev/null of=binaryfile bs=8 count =4 and dd if=/dev/urandom of=binaryfile bs=8... (3 Replies)
Discussion started by: spiriad
3 Replies

7. Red Hat

memory leaking

I use linux and unix and run aplication. How I can use command top , vmstat ,free ...etc existing command to find out there is memory leaking ??? Please give me example . It is not allow to use compiler to compile the program /tool. (2 Replies)
Discussion started by: chuikingman
2 Replies

8. IP Networking

LAN traffic leaking on to WAN

Network map: WAN external interface 192.0.0.0 network | WAN internal interface 192.0.3.0 network | 192.0.3.0 LAN | wireless router 192.0.3.1 | DSL modem 192.0.3.2 The problem I am having is that some traffic from the 192.0.3.0 LAN seems to be "leaking" onto the 192.0.0.0 WAN. I... (0 Replies)
Discussion started by: herot
0 Replies

9. Shell Programming and Scripting

Convert binary file to csv and then back to the binary format

Hello *nix specialists, Im working for a non profit organisation in Germany to transport DSL over WLAN to people in areas without no DSL. We are using Linksys WRT 54 router with DD-WRT firmware There are at the moment over 180 router running but we have to change some settings next time. So my... (7 Replies)
Discussion started by: digidax
7 Replies

10. Red Hat

Memory leaking

Hi All Would someone help me to find the detailed report on memory leak. any commands to get detailed report for OS level and applications As we are using REDHAT LINUX 5.9 Thanks Murali Muppa (2 Replies)
Discussion started by: murali969
2 Replies
CAP_GET_FILE(3) 					     Linux Programmer's Manual						   CAP_GET_FILE(3)

NAME
cap_get_file, cap_set_file, cap_get_fd, cap_set_fd - capability manipulation on files SYNOPSIS
#include <sys/capability.h> cap_t cap_get_file(const char *path_p); int cap_set_file(const char *path_p, cap_t cap_p); cap_t cap_get_fd(int fd); int cap_set_fd(int fd, cap_t caps); Link with -lcap. DESCRIPTION
cap_get_file() and cap_get_fd() allocate a capability state in working storage and set it to represent the capability state of the pathname pointed to by path_p or the file open on descriptor fd. These functions return a pointer to the newly created capability state. The effects of reading the capability state from any file other than a regular file is undefined. The caller should free any releasable mem- ory, when the capability state in working storage is no longer required, by calling cap_free() with the used cap_t as an argument. cap_set_file() and cap_set_fd() set the values for all capability flags for all capabilities for the pathname pointed to by path_p or the file open on descriptor fd, with the capability state identified by cap_p. The new capability state of the file is completely determined by the contents of cap_p. A NULL value for cap_p is used to indicate that capabilities for the file should be deleted. For these func- tions to succeed, the calling process must have the effective capability, CAP_SETFCAP, enabled and either the effective user ID of the process must match the file owner or the calling process must have the CAP_FOWNER flag in its effective capability set. The effects of writing the capability state to any file type other than a regular file are undefined. RETURN VALUE
cap_get_file() and cap_get_fd() return a non-NULL value on success, and NULL on failure. cap_set_file() and cap_set_fd() return zero on success, and -1 on failure. On failure, errno is set to EACCES, EBADFD, ENAMETOOLONG, ENOENT, ENOMEM, ENOTDIR, EPERM, or EROFS. CONFORMING TO
These functions are specified by withdrawn POSIX.1e draft specification. NOTES
Support for file capabilities is provided on Linux since version 2.6.24. On Linux, the file Effective set is a single bit. If it is enabled, then all Permitted capabilities are enabled in the Effective set of the calling process when the file is executed; otherwise, no capabilities are enabled in the process's Effective set following an execve(2). Because the file Effective set is a single bit, if any capability is enabled in the Effective set of the cap_t given to cap_set_file() or cap_set_fd(), then all capabilities whose Permitted or Inheritable flag is enabled must also have the Effective flag enabled. Conversely, if the Effective bit is enabled on a file, then the cap_t returned by cap_get_file() and cap_get_fd() will have the Effective flag enabled for each capability that has the Permitted or Inheritable flag enabled. SEE ALSO
libcap(3), cap_clear(3), cap_copy_ext(3), cap_from_text(3), cap_get_proc(3), cap_init(3), capabilities(7) 2008-05-11 CAP_GET_FILE(3)
All times are GMT -4. The time now is 04:57 PM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy