[asterisk-bugs] [Asterisk 0013331]: chan_sip is leaking in build_peer
Asterisk Bug Tracker
noreply at bugs.digium.com
Thu Oct 23 04:38:02 CDT 2008
A NOTE has been added to this issue.
======================================================================
http://bugs.digium.com/view.php?id=13331
======================================================================
Reported By: sergee
Assigned To:
======================================================================
Project: Asterisk
Issue ID: 13331
Category: Channels/chan_sip/General
Reproducibility: always
Severity: major
Priority: normal
Status: acknowledged
Asterisk Version: SVN
SVN Branch (only for SVN checkouts, not tarball releases): 1.6.0
SVN Revision (number only!): 138147
Disclaimer on File?: N/A
Request Review:
======================================================================
Date Submitted: 2008-08-18 03:26 CDT
Last Modified: 2008-10-23 04:38 CDT
======================================================================
Summary: chan_sip is leaking in build_peer
Description:
I'm using RealTime setup with 1.6.0 branch. Asterisk runs out of memory in
a 2 days.
======================================================================
----------------------------------------------------------------------
(0094192) sergee (reporter) - 2008-10-23 04:38
http://bugs.digium.com/view.php?id=13331#c94192
----------------------------------------------------------------------
Actualy there were 3 leaks
The major leak was introduced in revision 123547
http://svn.digium.com/view/asterisk?view=rev&revision=123547
ast_free(peer); was removed from
static void sip_destroy_peer(struct sip_peer *peer)
Two minor leaks were in st_get_mode() and st_get_se() somebody forgot to
call unref_peer() and unref_user() - this 2 leaks aren't present in trunk.
Patches for 1.6.0 and trunk are available.
Issue History
Date Modified Username Field Change
======================================================================
2008-10-23 04:38 sergee Note Added: 0094192
======================================================================
More information about the asterisk-bugs
mailing list