THIS IS AN AUTOMATED MESSAGE, DO NOT REPLY.
A new Flyspray task has been opened. Details are below.
User who did this - Hugh Waite (hugh.waite)
Attached to Project - sip-router
Summary - Websocket module leaks tcp connection buffers
Task Type - Bug Report
Category - tcp
Status - Unconfirmed
Assigned To -
Operating System - All
Severity - Low
Priority - Normal
Reported Version - Development
Due in Version - Undecided
Due Date - Undecided
Details - The websocket module uses the tcpconn_get function when it needs to lookup the
tcp connection from a websocket connection structure.
The tcpconn_get function increases to reference count of the connection, and the
structure, including the buffer, is not freed while this count is positive.
I have tried solve this by adding a tcpconn_put function at the end of each function that
did a get, but the system is still leaking buffers.
These buffers are not visible in the tcp.dump output because the connection has been
closed, but they can be seen in a memory dump (the buffer is 1MB on our system)
More information can be found at the following URL:
http://sip-router.org/tracker/index.php?do=details&task_id=326
You are receiving this message because you have requested it from the Flyspray bugtracking
system. If you did not expect this message or don't want to receive mails in future,
you can change your notification settings at the URL shown above.