>GFS trace data can be used to detect this sort of thing.  If you search the 
>web for "GFS trace" you should be able to find what you need to know.  You can 
>map the trace records with IPCS.  But you should consider using a program to 
>process the trace records to expose the leak.

ITYM GTF trace.
-
Ted MacNEIL
eamacn...@yahoo.ca
Twitter: @TedMacNEIL

----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html

Reply via email to