I am using Asterisk 11.6.0 built by root @ linux-t784 on a x86_64 The issue is a huge UDP handle leak, presumably coming fro ooh323 With 45 calls open calls (ooh323 to SIP), I have netstat -anp | grep asterisk | wc -l 6669
lsof -p 6785 -i -n -P | grep UDP | wc -l 6567 The machine needs to be rebooted as soon as Asterisk eats up all the handles. The question is, how can I further debug this? How do I know if this is in fact ooh323 or SIP or something else? Is ooh323 still supported? What kind of trace should I capture if I decide to file a bug? Would Valgrind help? Thanks for your help -- _____________________________________________________________________ -- Bandwidth and Colocation Provided by http://www.api-digital.com -- New to Asterisk? Join us for a live introductory webinar every Thurs: http://www.asterisk.org/hello asterisk-users mailing list To UNSUBSCRIBE or update options visit: http://lists.digium.com/mailman/listinfo/asterisk-users
