[sr-dev] [tracker] Comment added: Possible memory leak when processing sht_reload

sip-router bugtracker at sip-router.org
Wed Jan 8 11:28:01 CET 2014


THIS IS AN AUTOMATED MESSAGE, DO NOT REPLY.

The following task has a new comment added:

FS#385 - Possible memory leak when processing sht_reload
User who did this - i (takeshi)

----------
Daniel, thanks.
I confirmed expected behavior on this version:

# kamctl fifo version
Server:: kamailio (4.2.0-dev0 (x86_64/linux))
Build:: mi_core.c compiled on 13:43:19 Jan  8 2014 with gcc 4.6.3
Flags:: STATS: Off, USE_TCP, USE_TLS, TLS_HOOKS, USE_RAW_SOCKS, DISABLE_NAGLE, USE_MCAST, DNS_IP_HACK, SHM_MEM, SHM_MMAP, PKG_MALLOC, DBG_QM_MALLOC, USE_FUTEX, FAST_LOCK-ADAPTIVE_WAIT, USE_DNS_CACHE, USE_DNS_FAILOVER, USE_NAPTR, USE_DST_BLACKLIST, HAVE_RESOLV_RES
GIT:: b39365

# for i in $(seq 0 10000);do echo $i; kamctl fifo sht_reload domain; done
... abridged ...
9996
9997
9998
9999
10000

----------

More information can be found at the following URL:
http://sip-router.org/tracker/index.php?do=details&task_id=385#comment1275

You are receiving this message because you have requested it from the Flyspray bugtracking system.  If you did not expect this message or don't want to receive mails in future, you can change your notification settings at the URL shown above.



More information about the sr-dev mailing list