[Mono-bugs] [Bug 62653][Maj] Changed - [TESTCASE] Memory leak accessing S.W.S

bugzilla-daemon@bugzilla.ximian.com bugzilla-daemon@bugzilla.ximian.com
Tue, 21 Sep 2004 08:18:41 -0400 (EDT)

Please do not reply to this email- if you want to comment on the bug, go to the
URL shown below and enter your comments there.

Changed by bmaurer@users.sf.net.


--- shadow/62653	2004-09-21 01:24:06.000000000 -0400
+++ shadow/62653.tmp.11571	2004-09-21 08:18:41.000000000 -0400
@@ -24,6 +24,18 @@
 Created an attachment (id=8938)
 ------- Additional Comments From miguel@ximian.com  2004-09-21 01:24 -------
 Ben, maybe this test case can help find the leak?
+------- Additional Comments From bmaurer@users.sf.net  2004-09-21 08:18 -------
+Miguel, yeah, my bet is that this is "the leak".
+kangaroo -- can you run xsp (or mod_mono) and hit webhandler.ashx 
+alot (it is in the demo folder, on linux it is in /u/s/doc/xsp/test). 
+I can get that to leak horrifically. YOu need to send it like 10k 
+Your case might leak faster because it sends back more data. When I 
+put /usr/share/dict/words in a folder for xsp to server, i leaked 
+much faster.