Hello,
seem the leak is in snmpstats, I see lot of allocations like:
ALERT: qm_status: 37599. N address=0xf30cdf74 frag=0xf30cdf5c size=20 used=1 ALERT: qm_status: alloc'd from snmpstats: interprocess_buffer.c: handleContactCallbacks(143) ALERT: qm_status: start check=f0f0f0f0, end check= c0c0c0c0, abcdefed ALERT: qm_status: 37600. N address=0xf30cdfb8 frag=0xf30cdfa0 size=16 used=1 ALERT: qm_status: alloc'd from snmpstats: utilities.c: convertStrToCharString(62) ALERT: qm_status: start check=f0f0f0f0, end check= c0c0c0c0, abcdefed
There are some from usrloc, but very likely they are ok, because they are persistent in shm for long time, unless snmpstats asks for some clones of the structures from usrloc and forgets to free them (i see one allocation is from handleContactCallbacks).
No time to look in the sources, but this is a lead to follow if you want to investigate further.
In general, fr a memleak you have to look at allocated chunks that are done from same place in the code and there are many of them. The decide whether it is something that should be there for long time (like usrloc records) or they should be freed quicker comparing with the number of allocations.
Pkg log looks very clean, allocations only from startup time (maybe is the main process).
Cheers, Daniel
On 10/6/11 5:31 PM, Klaus Darilion wrote:
Indeed, DBG_QM_MALLOC is defined. So I have set memlog=1 and dumped mem_info with: sercmd cfg.set_now_int core mem_dump_pkg 13286 sercmd cfg.set_now_int core mem_dump_shm 13286
The dumps were done after ~1h uptime. I can not offload the traffic and wait until transactions are freed, thus the logs are quite huge (~15MByte)
http://pernau.at/kd/memlog.zip
I have no idea for what I should look for - any hints how to analyze the mem_dump?
Thanks Klaus
On 06.10.2011 13:07, Daniel-Constantin Mierla wrote:
Hello,
On 10/5/11 11:18 AM, Klaus Darilion wrote:
On 04.10.2011 14:03, Daniel-Constantin Mierla wrote:
Hello,
On 10/4/11 12:27 PM, Klaus Darilion wrote:
Meanwhile the server was restarted and the DB problems were fixed. As it is a production server I can not reproduce anymore.
So, once it started it didn't recovered, continued always with that error? How much of shm did you configure?
You can try to attach from time to time to one process (can be even the main one to avoid blocking a sip worker) and walk through the shm allocated chunks, in order to see if there are some unexpected repetitions of allocation from same place in sources.
I posted the gdb script for walking through pkg at some point, the difference will be to start from the head of shm list (i.e., starting with shm_block->first_frag instead of mem_block->first_frag):
http://www.kamailio.org/dokuwiki/doku.php/troubleshooting:memory#walking_thr...
Hi Daniel!
After reading this wiki page I came to the conclusion that for further debugging I have to recompile Kamailio (using DBG_QM_MALLOC memory manager instead of F_MALLOC). With the default memory manager it is not possible to debug the problem. Is it correct?
in 3.1 malloc debug was left on (with the goal of catching buffer overflows quickly after several years of development of no using this flag in production), so unless you switched if off, you should get the reports. you can check in the output of kamailio -V
Cheers, Daniel