After adding
----------------------------------------------------------------------------------------------------
if (($tU !~ "'") && ($td !~ "'") && ($ct !~ "'")) {
avp_db_query("DELETE FROM location WHERE username='$tU' and domain='$td' and contact='$ct.fields(uri)' and path like '%sip:$si:$sp;%'");
}
----------------------------------------------------------------------------------------------------
for REGISTER call to scenario, I've get shmem memory leak about 250 Mb in 4 hours on system with about 30k regs.
My suspicions is on $ct.fields(url). But I don't know exactly.
Hi Nick,
are you sure the leak is in SHM mem ? as non of the parsing (variables) or db ops are using the shm mem - they are using pkg.
Regards,
Bogdan
I'm really sure.
1) please enable the memory debugging in order to get a mem dump (set memlog=6 and memdump=1 - in this order).
2) try cornering the "leak" - run the query but without any variables inside; add them one by one ; see when the leak appears.
Thanks and regards,
Bogdan
The leak is in snmp_stats module. When it's disabled, no leak.
Also process with it eats 100% CPU.
Nick, thanks for the update - any way of reproducing this ? Do you also have a mem dump to see the leaked chunks ? Is the 100% usage triggered by a certain SNMP val ?
Regards,
Bogdan