Solutions

The following message is an internal debugging message that is printed at REMOTE verbosity level: COMMENDSrWriterService_onSubmessage:!ACK ignored: number of active RR is > 1, but sum of RR at is 0 Seeing this message is expected during normal operation and it does not indicate that something is ...
100 reads — 0 comments
When enabling RTI Monitoring library via the QoS file, a Connext DDS application might report a memory leak when using valgrind for memory usage analysis. An example of the valgrind output for this memory leak is found at the end of this article. An example of the QoS XML used to load RTI ...
508 reads — 0 comments
Note : Applies to RTI Connext 5.2.x and above. When you run an RTI Connext DDS host installer, the installation directory will always be like this: <default install path or user defined installation path>/rti_connext_dds-x.x.x . The installer itself adds the “ rti_connext_dds-x.x.x ”. If you ...
578 reads — 0 comments
Note: Applies to RTI Connext DDS 5.3.x If Persistence Service closes ungracefully (via Ctrl-C or the kill -9 command), a new Persistence Service instance will not be able to run. It will show the following error message: Database is already in use by another RTI Persistence Service or was ...
675 reads — 0 comments
Starting with Connext DDS 5.3.0, all Connext DDS libraries for Windows platforms (static release/debug, dynamic release/debug) now link with the dynamic Windows C Runtime (CRT). If you have previous Windows projects that were linking with the Connext DDS static libraries, it will be necessary to ...
962 reads — 0 comments
QoS configurations for transport when starting applications with network interfaces disabled for IP mobility use case With the introduction of version 5.3.0, Connext DDS supports Locator change at runtime. The IP mobility feature allows DDS applications to start without enabled network interfaces. ...
1227 reads — 0 comments
At the beginning of 2018, the computing world was witness to the publication of the Meltdown and Spectre vulnerabilities which affect a wide range of systems all over the world. Exploits of these vulnerabilities target specific behavior of the hardware (not the OS, nor program code) in order to ...
1071 reads — 0 comments

Pages