-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 I finally tracked it down and found why the memory usages increased too much when there were too many failed connections (bad uri). It's not a memory leak, but the delay in the stats thread that avoid to maintain the pace cleaning the events' queue, which results in a door to DoS attacks. Find the one liner patch to solve it. Regards, <p>- -- ricardo galli GPG id C8114D34 -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.2.1 (GNU/Linux) iD8DBQE+MS06XZ2eFsgRTTQRAgljAJ9IlcikWqIHlF4Cfisw9vFAG+7liQCfZdF2 7WO35SWU5wl76h446uCDPg4=vgLQ -----END PGP SIGNATURE----- -------------- next part -------------- A non-text attachment was scrubbed... Name: update3.diff Type: text/x-diff Size: 545 bytes Desc: update3.diff Url : http://lists.xiph.org/pipermail/icecast-dev/attachments/20030124/541dd46a/update3.bin