>GFS trace data can be used to detect this sort of thing. If you search the >web for "GFS trace" you should be able to find what you need to know. You can >map the trace records with IPCS. But you should consider using a program to >process the trace records to expose the leak.
ITYM GTF trace. - Ted MacNEIL eamacn...@yahoo.ca Twitter: @TedMacNEIL ---------------------------------------------------------------------- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html