THIS IS AN AUTOMATED MESSAGE, DO NOT REPLY.
The following task has a new comment added:
FS#385 - Possible memory leak when processing sht_reload
User who did this - i (takeshi)
----------
Daniel, thanks.
I confirmed expected behavior on this version:
# kamctl fifo version
Server:: kamailio (4.2.0-dev0 (x86_64/linux))
Build:: mi_core.c compiled on 13:43:19 Jan 8 2014 with gcc 4.6.3
Flags:: STATS: Off, USE_TCP, USE_TLS, TLS_HOOKS, USE_RAW_SOCKS, DISABLE_NAGLE, USE_MCAST,
DNS_IP_HACK, SHM_MEM, SHM_MMAP, PKG_MALLOC, DBG_QM_MALLOC, USE_FUTEX,
FAST_LOCK-ADAPTIVE_WAIT, USE_DNS_CACHE, USE_DNS_FAILOVER, USE_NAPTR, USE_DST_BLACKLIST,
HAVE_RESOLV_RES
GIT:: b39365
# for i in $(seq 0 10000);do echo $i; kamctl fifo sht_reload domain; done
... abridged ...
9996
9997
9998
9999
10000
----------
More information can be found at the following URL:
http://sip-router.org/tracker/index.php?do=details&task_id=385#comment1…
You are receiving this message because you have requested it from the Flyspray bugtracking
system. If you did not expect this message or don't want to receive mails in future,
you can change your notification settings at the URL shown above.