[Mono-bugs] [Bug 62653][Maj] Changed - [TESTCASE] Memory leak accessing S.W.S
bugzilla-daemon@bugzilla.ximian.com
bugzilla-daemon@bugzilla.ximian.com
Tue, 21 Sep 2004 08:18:41 -0400 (EDT)
Please do not reply to this email- if you want to comment on the bug, go to the
URL shown below and enter your comments there.
Changed by bmaurer@users.sf.net.
http://bugzilla.ximian.com/show_bug.cgi?id=62653
--- shadow/62653 2004-09-21 01:24:06.000000000 -0400
+++ shadow/62653.tmp.11571 2004-09-21 08:18:41.000000000 -0400
@@ -24,6 +24,18 @@
Created an attachment (id=8938)
testcase
------- Additional Comments From miguel@ximian.com 2004-09-21 01:24 -------
Ben, maybe this test case can help find the leak?
+
+------- Additional Comments From bmaurer@users.sf.net 2004-09-21 08:18 -------
+Miguel, yeah, my bet is that this is "the leak".
+
+kangaroo -- can you run xsp (or mod_mono) and hit webhandler.ashx
+alot (it is in the demo folder, on linux it is in /u/s/doc/xsp/test).
+I can get that to leak horrifically. YOu need to send it like 10k
+requeses.
+
+Your case might leak faster because it sends back more data. When I
+put /usr/share/dict/words in a folder for xsp to server, i leaked
+much faster.