[asterisk-bugs] [Asterisk 0018457]: moh reload leaks file descriptors to dahdi timing channel

Asterisk Bug Tracker noreply at bugs.digium.com
Thu Dec 16 20:24:31 UTC 2010


The following issue has been UPDATED. 
====================================================================== 
https://issues.asterisk.org/view.php?id=18457 
====================================================================== 
Reported By:                mcallist
Assigned To:                
====================================================================== 
Project:                    Asterisk
Issue ID:                   18457
Category:                   Resources/res_musiconhold
Reproducibility:            always
Severity:                   major
Priority:                   normal
Status:                     acknowledged
Asterisk Version:           1.4.38 
JIRA:                        
Regression:                 No 
Reviewboard Link:            
SVN Branch (only for SVN checkouts, not tarball releases): N/A 
SVN Revision (number only!):  
Request Review:              
====================================================================== 
Date Submitted:             2010-12-10 15:17 CST
Last Modified:              2010-12-16 14:24 CST
====================================================================== 
Summary:                    moh reload leaks file descriptors to dahdi timing
channel
Description: 
Issuing an moh reload or even unload/load on res_musiconhold.so causes
DAHDI_FILE_PSEUDO to be opened, and the old reference to the open file to
be leaked.

This eventually can lead to exhaustion of the DAHDI channels and locking
out of meetme usage.
====================================================================== 

Issue History 
Date Modified    Username       Field                    Change               
====================================================================== 
2010-12-16 14:24 lmadsen        Description Updated                          
2010-12-16 14:24 lmadsen        Additional Information Updated                  
 
======================================================================




More information about the asterisk-bugs mailing list