Hello,

seem the leak is in snmpstats, I see lot of allocations like:

ALERT: qm_status: 37599. N address=0xf30cdf74 frag=0xf30cdf5c size=20 used=1 ALERT: qm_status: alloc'd from snmpstats: interprocess_buffer.c: handleContactCallbacks(143) ALERT: qm_status: start check=f0f0f0f0, end check= c0c0c0c0, abcdefed ALERT: qm_status: 37600. N address=0xf30cdfb8 frag=0xf30cdfa0 size=16 used=1 ALERT: qm_status: alloc'd from snmpstats: utilities.c: convertStrToCharString(62) ALERT: qm_status: start check=f0f0f0f0, end check= c0c0c0c0, abcdefed

There are some from usrloc, but very likely they are ok, because they are persistent in shm for long time, unless snmpstats asks for some clones of the structures from usrloc and forgets to free them (i see one allocation is from handleContactCallbacks).

No time to look in the sources, but this is a lead to follow if you want to investigate further.

In general, fr a memleak you have to look at allocated chunks that are done from same place in the code and there are many of them. The decide whether it is something that should be there for long time (like usrloc records) or they should be freed quicker comparing with the number of allocations.

Pkg log looks very clean, allocations only from startup time (maybe is the main process).

Cheers,
Daniel

On 10/6/11 5:31 PM, Klaus Darilion wrote:
Indeed, DBG_QM_MALLOC is defined. So I have set memlog=1 and dumped mem_info with:
sercmd cfg.set_now_int core mem_dump_pkg 13286
sercmd cfg.set_now_int core mem_dump_shm 13286

The dumps were done after ~1h uptime. I can not offload the traffic and wait until transactions are freed, thus the logs are quite huge (~15MByte)

http://pernau.at/kd/memlog.zip

I have no idea for what I should look for - any hints how to analyze the mem_dump?

Thanks
Klaus


On 06.10.2011 13:07, Daniel-Constantin Mierla wrote:
Hello,

On 10/5/11 11:18 AM, Klaus Darilion wrote:


On 04.10.2011 14:03, Daniel-Constantin Mierla wrote:
Hello,

On 10/4/11 12:27 PM, Klaus Darilion wrote:
Meanwhile the server was restarted and the DB problems were fixed. As
it is a production server I can not reproduce anymore.

So, once it started it didn't recovered, continued always with that
error? How much of shm did you configure?

You can try to attach from time to time to one process (can be even the
main one to avoid blocking a sip worker) and walk through the shm
allocated chunks, in order to see if there are some unexpected
repetitions of allocation from same place in sources.

I posted the gdb script for walking through pkg at some point, the
difference will be to start from the head of shm list (i.e., starting
with shm_block->first_frag instead of mem_block->first_frag):

http://www.kamailio.org/dokuwiki/doku.php/troubleshooting:memory#walking_through_pkg_with_gdb


Hi Daniel!

After reading this wiki page I came to the conclusion that for further
debugging I have to recompile Kamailio (using DBG_QM_MALLOC memory
manager instead of F_MALLOC). With the default memory manager it is
not possible to debug the problem. Is it correct?
in 3.1 malloc debug was left on (with the goal of catching buffer
overflows quickly after several years of development of no using this
flag in production), so unless you switched if off, you should get the
reports. you can check in the output of kamailio -V

Cheers,
Daniel


--
Daniel-Constantin Mierla -- http://www.asipto.com
Kamailio Advanced Training, Dec 5-8, Berlin: http://asipto.com/u/kat
http://linkedin.com/in/miconda -- http://twitter.com/miconda


_______________________________________________
SIP Express Router (SER) and Kamailio (OpenSER) - sr-users mailing list
sr-users@lists.sip-router.org
http://lists.sip-router.org/cgi-bin/mailman/listinfo/sr-users

Reply via email to