[asterisk-bugs] [Asterisk 0013785]: [patch] Memory leak while reloading chan_mgcp.so

Asterisk Bug Tracker noreply at bugs.digium.com
Tue Oct 28 16:27:38 CDT 2008


The following issue has been RESOLVED. 
====================================================================== 
http://bugs.digium.com/view.php?id=13785 
====================================================================== 
Reported By:                eliel
Assigned To:                Corydon76
====================================================================== 
Project:                    Asterisk
Issue ID:                   13785
Category:                   Channels/chan_mgcp
Reproducibility:            have not tried
Severity:                   minor
Priority:                   normal
Status:                     resolved
Asterisk Version:           SVN 
SVN Branch (only for SVN checkouts, not tarball releases):  trunk 
SVN Revision (number only!): 151979 
Disclaimer on File?:        N/A 
Request Review:              
Resolution:                 fixed
Fixed in Version:           
====================================================================== 
Date Submitted:             2008-10-26 01:41 CDT
Last Modified:              2008-10-28 16:27 CDT
====================================================================== 
Summary:                    [patch] Memory leak while reloading chan_mgcp.so
Description: 
When reloading chan_mgcp.so, we are not closing mgcpsock and (if the file
didn change) so not calling ast_io_remove (if the file didn't change), so
we dont need to call again ast_io_add unless mgcpsock_read_id is set to
NULL.

====================================================================== 

Issue History 
Date Modified    Username       Field                    Change               
====================================================================== 
2008-10-28 16:27 svnbot         Status                   assigned => resolved
2008-10-28 16:27 svnbot         Resolution               open => fixed       
======================================================================




More information about the asterisk-bugs mailing list