THIS IS AN AUTOMATED MESSAGE, DO NOT REPLY.
A new Flyspray task has been opened. Details are below.
User who did this - Hugh Waite (hugh.waite)
Attached to Project - sip-router Summary - Websocket module leaks tcp connection buffers Task Type - Bug Report Category - tcp Status - Unconfirmed Assigned To - Operating System - All Severity - Low Priority - Normal Reported Version - Development Due in Version - Undecided Due Date - Undecided Details - The websocket module uses the tcpconn_get function when it needs to lookup the tcp connection from a websocket connection structure.
The tcpconn_get function increases to reference count of the connection, and the structure, including the buffer, is not freed while this count is positive.
I have tried solve this by adding a tcpconn_put function at the end of each function that did a get, but the system is still leaking buffers. These buffers are not visible in the tcp.dump output because the connection has been closed, but they can be seen in a memory dump (the buffer is 1MB on our system)
More information can be found at the following URL: http://sip-router.org/tracker/index.php?do=details&task_id=326
You are receiving this message because you have requested it from the Flyspray bugtracking system. If you did not expect this message or don't want to receive mails in future, you can change your notification settings at the URL shown above.