[sr-dev] [kamailio/kamailio] Kamailio memory leak - versions 5.1.4 and 5.1.7 (#1895)
eschmidbauer at gmail.com
Wed Jun 12 13:59:29 CEST 2019
FYI- we have to build our own debian9 pkgs due to the openssl mem leak
not sure why this isn't in the kamailio's debian build system yet because
im pretty sure there is an issue on GH related to it
this is from our `build.sh` container:
# fix for libssl bug
apt-get -y purge libssl-dev && apt-get -y -qq install libssl1.0-dev
sed -ie 's/libssl-dev/libssl1.0-dev/g' pkg/kamailio/deb/debian/control
On Wed, Jun 12, 2019 at 2:33 AM Daniel-Constantin Mierla <
notifications at github.com> wrote:
> Adding also that the mysql timeout might not work always, as presented in
> - https://dev.mysql.com/doc/refman/5.5/en/mysql-options.html
> MYSQL_OPT_READ_TIMEOUT (argument type: unsigned int *)
> The timeout in seconds for each attempt to read from the server. There are retries if necessary, so the total effective timeout value is three times the option value. You can set the value so that a lost connection can be detected earlier than the TCP/IP Close_Wait_Timeout value of 10 minutes.
> Implementation of this timeout uses mechanisms that may not be available on all platforms. On such a platform, a client that issues a read call might under certain circumstances wait without timing out. For example, a client might not time out if the server is not responding because it is waiting for a “disk full” condition to clear.
> Therefore you should also check if there are problems with mysql server.
> You are receiving this because you were mentioned.
> Reply to this email directly, view it on GitHub
> or mute the thread
> Kamailio (SER) - Development Mailing List
> sr-dev at lists.kamailio.org
-------------- next part --------------
An HTML attachment was scrubbed...
More information about the sr-dev