THIS IS AN AUTOMATED MESSAGE, DO NOT REPLY.

A new Flyspray task has been opened.  Details are below. 

User who did this - Morten Tryfoss (mtryfoss) 

Attached to Project - sip-router
Summary - Memory leak in tm module?
Task Type - Bug Report
Category - tm
Status - Unconfirmed
Assigned To - 
Operating System - Linux
Severity - Medium
Priority - Normal
Reported Version - 4.1
Due in Version - Undecided
Due Date - Undecided
Details - We have got a production system with a slow but steady increase of 
shared memory use when routing calls.

The kamailio version is 4.1.1.


I'm able to reproduce this in a lab. The call scenario is like this:
Call from asterisk using udp to kamailio, which looks up the registered user 
(tested both udp and tls) and forwards using t_relay().
The call is then either answered or canceled.

When I stop kamailio I get two of those lines for each call that has been 
routed:
Aug 25 15:23:55 sip1stage /usr/sbin/kamailio[14285]: qm_status:    8372. N  
address=0x7fc21369f348 frag=0x7fc21369f318 size=56 used=1
Aug 25 15:23:55 sip1stage /usr/sbin/kamailio[14285]: qm_status:           
alloc'd from tm: t_fwd.c: prepare_new_uac(574)
Aug 25 15:23:55 sip1stage /usr/sbin/kamailio[14285]: qm_status:          start 
check=f0f0f0f0, end check= c0c0c0c0, abcdefed
Aug 25 15:23:55 sip1stage /usr/sbin/kamailio[14285]: qm_status:    8373. N  
address=0x7fc21369f3e0 frag=0x7fc21369f3b0 size=24 used=1
Aug 25 15:23:55 sip1stage /usr/sbin/kamailio[14285]: qm_status:           
alloc'd from tm: t_fwd.c: prepare_new_uac(589)
Aug 25 15:23:55 sip1stage /usr/sbin/kamailio[14285]: qm_status:          start 
check=f0f0f0f0, end check= c0c0c0c0, abcdefed

When the call is initiated, two of these lines appear in the log:
Aug 25 15:23:40 sip1stage /usr/sbin/kamailio[14286]: <core> 
[mem/q_malloc.c:369]: qm_malloc(): qm_malloc(0x7fc2132db000, 21) called from 
tm: t_fwd.c: prepare_new_uac(574)
Aug 25 15:23:40 sip1stage /usr/sbin/kamailio[14286]: <core> 
[mem/q_malloc.c:415]: qm_malloc(): qm_malloc(0x7fc2132db000, 24) returns 
address 0x7fc21369f348 frag. 0x7fc21369f318 (size=56) on 1 -th hit
Aug 25 15:23:40 sip1stage /usr/sbin/kamailio[14286]: <core> 
[mem/q_malloc.c:369]: qm_malloc(): qm_malloc(0x7fc2132db000, 20) called from 
tm: t_fwd.c: prepare_new_uac(589)
Aug 25 15:23:40 sip1stage /usr/sbin/kamailio[14286]: <core> 
[mem/q_malloc.c:415]: qm_malloc(): qm_malloc(0x7fc2132db000, 24) returns 
address 0x7fc21369f3e0 frag. 0x7fc21369f3b0 (size=24) on 1 -th hit


More information can be found at the following URL:
http://sip-router.org/tracker/index.php?do=details&task_id=464

You are receiving this message because you have requested it from the Flyspray 
bugtracking system.  If you did not expect this message or don't want to 
receive mails in future, you can change your notification settings at the URL 
shown above.

_______________________________________________
sr-dev mailing list
[email protected]
http://lists.sip-router.org/cgi-bin/mailman/listinfo/sr-dev

Reply via email to